arrow left
arrow right
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
  • SAMA, CHAITHANYA V KHAZI, ZAKI AHMED SIDDIQUI SHAREHOLDER DERIVATIVE ACTION document preview
						
                                

Preview

Filing # 132885316 E-Filed 08/17/2021 10:53:45 PM IN THE CIRCUIT COURT OF THE FIFTEENTH JUDICIAL CIRCUIT IN AND FOR PALM BEACH COUNTY, FLORIDA CASE NO.: 50-2021-CA-6978-XXXX-MB CHAITHANYA SAMA, derivatively on behalf of BPMLINKS LLC, Plaintiff, Vs. ZAKI AHMED SIDDIQUI KHAZI, SATHIANARAYANAN AVANASHILINGAM, and aannrarrr UUrLNAL NARAYANASAMYRAJAGOPAL, individually, Defendants, and BPMLINKS LLC, a Florida limited liability company, Nominal Defendant. / DEFENDANTS’ MOTION TO DISMISS FIRST AMENDED DERIVATIVE COMPLAINT. Defendants, ZAKI AHMED SIDDIQUI KHAZI, SATHIANARAYANAN AVANASHILINGAM and GOPINATH NARAYANASAMYRAJAGOPAL, by and through their undersigned counsel, file this their Motion to Dismiss First Amended Derivative Complaint, and in support thereof states as follows: INTRODUCTION This case involves the typical scenario of business partners in a dispute over operation of a hnecinacc Dlaintiff wha ic fifty (SNA) nercant mamher af RPMI INK facies, W. ainy \ousoy perccue Denies aon wyatt TIC (RPM wy (ee J LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021 CHEN. DAIAARCACUAAIINTY Cl INCEDU ARDIIV7ZN FLED NaN7nnns 4n-62-45 DNA HILLY. PAL DLA VUUINE TT, PL, VUOL IE mDNUeey, ULUIAN, Yorieue! bu.u.ty civ(Defendants collectively are the other fifty (50%) percent members), ran to the company’s attorneys (as often happens in such disputes) and had this “member derivative lawsuit” prepared alleging a “parade of horribles” committed by Defendants with respect to BPM’s business and customers. To avoid compliance with the requirement of pre-suit demand, Plaintiff alleges demand would be futile because Defendants cannot independently determine if this lawsuit should proceed since they are the target of the claims. Plaintiff has used this bare-bones futility claim to shut Defendants out of BPM, effectively crowning himself “king”, and now holds the company hostage. Defendants have been denied access to the company’s bank accounts and their e-mail access has been cut off which is causing difficulty with their continuing to service BPM’s clients. Yet, Plaintiff seems content to have Defendants continue to do work for BPM bringing revenue into the company, including Defendants recently renewing a significant contract with one of BPM’s clients. Since Defendants have quite a bit of evidence of Plaintiff’s wrongdoing which has caused harm to BPM, including his diverting business opportunities to other companies in which he is an owner and his starting competing companies which he did not disclose to Detendants, Plaintiff's own improper conduct perhaps explains his failure to make demand as the results of an independent investigation may not prove favorable for him. And that is the reason demand is necessary in this case — to obtain a full picture of what is being done by all members of BPM. Thus, the empty shell of this futility claim does not cut it to satisfy the pre-suit demand requirement. I. Derivative Demand Futility Not Met Gantinn LAE NONI Dlasida Gtaty SUCUCH UUS.voUZ, F10TiGa Satu 2 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021A member may maintain a derivative action to enforce a right of a limited liability company if (1) The member first makes a demand on the other members in a member-managed limited liability company or the managers of a manager- managed limited liability company requesting that the managers or other members cause the company to take suitable action to enforce the right, and the managers or other members do not take the action within a reasonable time, not to exceed 90 days; or (2) A demand under subsection (1) would be futile, or irreparable injury would result to the company by waiting for the other members or the managers to take action to enforce the right in accordance with subsection (1). See Section 605.0802 (emphasis added). Plaintiff did not make a demand upon Defendants before filing this lawsuit, instead alleging that demand would be futile because “Defendants lack the sufficient independence with which to render a disinterested decision on whether to pursue the derivative claims” because Defendants are alleged to be engaging in misconduct. See §{] 55-56 of Amended Complaint. If that were the standard to be applied — a Plaintiff simply alleges other members or shareholders are engaged in wrongdoing so no demand needs to be made as it would be futile — the demand requirement would be rendered meaningless. See Guttman v. Huang, 823 A.2d 492, 500 (Del. Ch. 2003)(“If the legal rule was that demand was excused whenever, by mere notice pleading, the plaintifts couid state a breach of fiduciary duty claim against a majority of the board, the demand requirement of the law would be weakened and the settlement value of so-called ‘strike suits’ would greatly increase.”). Florida appellate courts do not appear to have addressed the standard for claiming futility of demand under Section 605.0802 of the Revised LLC Act, and the language of the statute offers no insight. However, demand requirements in the corporate context are instructive. See Firehouse Gallery, LLC v. Phillips, 2009 WL 4015575, at *5 (M.D. Fla. Nov. 19, 2009)(dismissing derivative 3 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021claim of Complaint where futility was not properly pled and noting that “[w]hile this case involves an LLC, such a business organization is analogous to a corporation.”) Section 607.0742, Florida Statutes sets forth the requirements for demand on a corporation which includes a) the complaint must allege “with particularity” the demand made upon the board or [‘t]he reason or reasons the shareholder did not make the effort to obtain the desired action from the board of directors or comparable authority”. See Section 607.0742(2)(c). The fault with Plaintiffs contrived notion of futility is that it falsely presumes demand upon Defendants to decide whether to investigate Plaintiffs claims is the only path. Nothing precluded Plaintiff from requesting an independent investigation be conducted so that Defendants would have some semblance of corporate due process, as opposed to the “lock the door and kick them out” approach Plaintiff took in usurping control of BPM in the name of “futility” of demand. Section 607.0744 provides for such an independent process: (1) A derivative proceeding may be dismissed, in whole or in part, by the court on motion by the corporation if a group specified in subsection (2) or subsection (3) has determined in good faith, after conducting a reasonable inquiry upon which its conclusions are based, that the maintenance of the derivative proceeding is not in the best interests of the corporation. In all such cases, the corporation has the burden of proof regarding the qualifications, good faith, and reasonable inquiry of the group making the determination... (3) Upon motion by the corporation, the court may appoint a panel consisting of one or more disinterested and independent individuals to make a determination required in subsection (1). Ta. can anaa sc. 1G, AL OU/.U/44 (6) 44_ ay jaded). Florida courts often look to Delaware case law for guidance on matters of corporate law. See Williams v. Stanford, 977 So. 2d 722, 727-28 (Fla. 1st DCA 2008)(noting that “Florida courts routinely consult Delaware case law when construing Florida statutory law governing corporations”)(citing Boettcher v. IMC Mortgage Co., 871 So. 2d 1047, 1052 (Fla. 2d DCA 4 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 330212004)). According to the Delaware Chancery Court, the demand futility requirement “serves an important policy function of promoting internal resolution, as opposed to litigation, of corporate disputes and grants the corporation a degree of control over any litigation brought for its benefit”. See Rattner v. Bidzos, 2003 WL 22284323, at *7 (Del. Ch. Sept. 30, 2003). See also Grimes v. Donald, 673 A.2d 1207, 1216 (Del. 1996) (“By requiring exhaustion of intracorporate remedies, the demand requirement invokes a species of alternative dispute resolution procedure which might avoid litigation altogether.”), overruled on other grounds by Brehm y. Eisner, 746 A.2d 244 (Del. 2000). In Silver Crown Investments, LLC v. Team Real Estate Mgt., LLC, 349 F. Supp. 3d 1316 (S.D. Fla. Sept. 29 2018), the district court addressed whether futility of demand as to a claim for breach of fiduciary duty under the Revised LLC Act was properly pled. The district court initially pointed out that the purpose of the pre-suit demand is “‘to give corporate directors an opportunity to correct any internal abuses without lawsuit’ thereby conserving company and judicial resources.” Id. at 1327 (quoting McCabe v. Foley, 424 F. Supp. 2d 1315, 1319 (M.D. Fla. 2006)). In dismissing the claim, the district court concluded that: Here, Piaintiffs simply aliege that a § 605.0802 pre-suit demand to Defendants would have been futile because Defendants had a guilty participation in the wrongs complained of. (ECF. No. 40, § 68). Plaintiffs however, do not allege what specific acts each Defendant committed which contributed to Plaintiff's injury. This is analogous to stating that Defendants ‘faced a substantial likelihood of liability’ which, by itself, is insufficient to establish that a pre-suit demand would be futile. Id. at 1328. In Long v. Odland, 2012 WL 13019034 (S.D. Fla. Aug. 15, 2012), the district court dismissed a derivative lawsuit for failure to properly plead futility. Jd. at *8. The Complaint allanad that: “tha antiva Affine Dannt Raard and canine manacamant nartisinated in tha weanac @ucgeG ula ue Cure Uaice Vepor wOarG ana Senior managenieme paruciparca ia ule Wrongs 5 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021complained of,’ and the directors are ‘not disinterested or independent,’ as they are ‘interested in maintaining their positions on the Board so as to safeguard their substantial compensation and stock options’ and also ‘their actions have subjected Office Depot to...potential liability for violations of applicable securities laws.”” Jd. at *3. Rejecting that such allegations were sufficient to demonstrate futility, the district court stressed that: “Plaintiff cannot ‘bootstrap allegations of futility’ by merely pleading that directors on the Board ‘participated in the challenged transaction or that they would be reluctant to sue themselves’...’Nor can mere allegations that the directors would act to preserve their positions satisfy the requirements of demand futility pleading.’” Jd. at *8 (quoting Story v. Kang, 2006 WL 163078, at *2 (M.D. Fla. Jan. 20, 2006)). Here, Plaintiff's allegations in support of futility of demand are insufficient, conclusory and fail to show that demand would have been futile. The allegations fail to identify what each individual Defendant did or why each is incapable of independent evaluation of a demand. Instead, Plaintiff lumps Defendants together for the alleged acts of wrongdoing offered for the purported futility of pre-suit demand. Accordingly, as futility has not been properly alleged for the pre-suit demand requirement, thts lawsuit should be dismissed. Il. Counts II-TV Fraudulent Concealment In Counts II, III and IV, Plaintiff alleges Fraudulent Concealment against each individual Defendant premised upon Defendants misrepresenting that certain employees were terminated or resigned due to poor job performance or cost cutting measures, when the true reason was a plan to divert those employees to Clarium Tech and Clarium Managed Services — two companies with which Plaintiff alleges Defendants are involved as owners and employees. See {| 73-74, 80-81 and 00_ON Af Amandad Cam ana o7-7u G1 ninenaca Corn 6 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021For the Fraudulent Concealment claims Plaintiff must allege that: 1) Defendants “concealed or failed to disclose a material fact”, 2) “knew or should have known the material fact should be disclosed”, 3) “concealment of or failure to disclose the material fact would induce the plaintiffs to act”, and 4) detrimental reliance on the misinformation. See RJ Reynolds Tobacco v. Martin, 53 So. 3d 1060, 1068 (Fla. Ist DCA 2010)(citations omitted). Plaintiff fails to allege any facts to support how he relied upon the representation of employees being terminated or resigning to his detriment. Thus, essential elements of the claim, but for alleging the appropriate buzz words, have not been sufficiently alleged. Tl. | Count V—Computer Fraud Abuse Act In Count V, Plaintiff alleges that Defendants violated the Computer Fraud and Abuse Act because they “knowingly, intentionally, and with the intent to defraud BPM directly and/or indirectly accessed BPM’s computers, data, architectural documents and design, frameworks, Azure cloud, AWS cloud, source codes and trade secrets.” See 96 of Amended Complaint. The alleged “intend to defraud” is based on 18 U.S.C. § 1030 which makes it a violation of the CFAA for anyone who: knowingiy and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1- year period. tr ANIAL_ASAN F_- a. 10Tran eo 1 OEE 10 U.D.L. 9 LUDULa)(4) (emp 44. 4y added). As alleged in the Amended Complaint, Defendants are members, officers and employees of BPM: 12. Sathia...is a member and Chief Technology Officer of BPM. 13. Zaki...is a member and Chief Information Officer of BPM. 1 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 3302114. Gopi is...a member and the Chief Operating Officer and Chief Digital Officer of BPM. 37. Defendants Sathia and Gopi were not only receiving from BPM approximately double the salaries they received from their previous employers, but each also became a 16.67% owner in BPM without contributing any capital to the company. See J{ 12, 13, 14 and 37 of Amended Complaint. As members and officers of BPM, Defendants who collectively have the same membership percentage as Plaintiff, are authorized to access BPM’s computers and any information contained within the company’s computers. Therefore, the legal basis of this claim conflicts with the facts alleged and necessarily fails. The key terms for this claim from the portion of the CFAA cited above are “without authorization” and “exceeds authorized access”. In June of this year, the Supreme Court in Van Buren v. U.S., 141 S.Ct. 1648 (2021) addressed the scope of conduct which constitutes a violation of the CFAA as to those very terms. Van Buren, a former police officer, conducted a license plate search in a law enforcement computer database in exchange for money. /d. at 1652. Van Buren was convicted of violating the CFAA and appealed to the Eleventh Circuit arguing that the term “exceeds authorized access” only applies to persons who obtain information from a computer beyond their permitted access, not to someone who misuses authorized access. Jd. at 1653. Noting that several Circuit Courts of Appeal agree with Van Buren’s narrow view of the CFAA, and the Eleventh Circuit and other Circuits having taken a broader view, the Supreme Court granted Certiorari to Fesoive ine coniict among ine Circuits. a. at 1053- 1054. Finding Van Buren’s narrow approach to access to be more sensible, the Supreme Court concluded that: In sum, an individual ‘exceeds authorized access’ when he accesses a pawnuton with nuthavication hat than nhtiaing jnfaumation Ineatad in Compuier Wik Guinicrilaucn Cue mien Ceidins yormaicon waa in particular areas of the computer—such as files, folders, or databases—that 8 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021are off limits to him. The parties agree that Van Buren accessed the law enforcement database system with authorization. The only question is whether Van Buren could use the system to retrieve license-plate information. Both sides agree that he could. Van Buren accordingly did not ‘excee[d] authorized access’ to the database, as the CFAA defines that Phrase, even though he obtained information from the database for an improper purpose. We therefore reverse the contrary judgment of the Eleventh Circuit and remand the case for further proceedings consistent with this opinion. Id. at 1662 (emphasis added). In Royal Truck & Trailer Sales and Service, Inc. v. Kraft, 974 F.3d 756 (6th Cir. 2020), a case cited by the Van Buren Court as being from one of the Circuits taking a narrow view of application of the CFAA, the definition of “exceeds authorized access” was discussed: The Act defines ‘exceeds authorized access’ as ‘to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.’ 18 U.S.C. § 1030(e)(6). Critical to that formulation are the terms ‘access,’ ‘authorization, ’ and ‘obtain or alter.’ We have previously defined the term ‘authorization,’ at least in the inverse: ‘[A/ defendant who accesses a computer ‘without authorization,’’ we have said, ‘does so without sanction or permission.’ Pulte Homes, 648 F.3d at 304 (citing LVRC Holdings, LLC v. Brekka, 581 F.3d 1127, 1132-33 (9th Cir. 2009)). ‘Authorization’ thus means to have sanction or permission. Id. at 759 (emphasis added). In affirming dismissal of the CFAA claim, the Sixth Circuit reasoned that: The CFAA prohibits accessing data one is not authorized to access. United States v. Nosal, 676 F.3d 854, 858 (9th Cir. 2012). And Royal has not contested either Kraft’s or Matthews’s authorization to access the company files in question. Because Defendants had authorization to access that injormation, ineiF conauci aid noi ‘exceed’ ineiF ‘auinorizea access,’ as those terms are used in § 1030(a)(2). To be sure, Royal does allege that Kraft and Matthews later misused the information they accessed. But the CFAA does not reach that conduct. Id. at 760 (emphasis added). See also LVRC Holdings LCC v. Brekka, 581 F.3d 1127, 1133 (9th Cie INARA 1 UI. 2uuz UNG arts TUDO. » OTUs WvIAL 3 ar 9 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021computer ceases when an employee resolves to use the computer contrary to the employer’s interest. Rather, the definition of ‘exceeds authorized access’ in § 1030(e)(6) indicates that Congress did not intend to include such an implicit limitation in the word "authorization.”). One purpose of the narrow interpretation of the CFAA was explained by the Fourth District in WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199 (4th Cir. 2012) — another case cited by the Van Buren Court: Where, as here, our analysis involves a statute whose provisions have both civil and criminal application, our task merits special attention because our interpretation applies uniformly in both contexts. See Leocal v. Ashcroft, 543 U.S. 1, 11 n. 8, 125 S.Ct. 377, 160 L.Ed.2d 271 (2004). Thus, we follow ‘the canon of strict construction of criminal statutes, or rule of lenity.’ United States v. Lanier, 520 U.S. 259, 266, 117 S.Ct. 1219, 137 L.Ed.2d 432 (1997). In other words, in the interest of providing fair warning ‘of what the law intends to do if a certain line is passed,’ Babbitt v. Sweet Home Chapter of Communities for a Great Or., 515 U.S. 687, 704 n. 18, 115 S.Ct. 2407, 132 L.Ed.2d 597 (1995) (quoting United States v. Bass, 404 U.S. 336, 348, 92 S.Ct. 515, 30 L.Ed.2d 488 (1971)) (internal quotation marks omitted), we will construe this criminal statute strictly and avoid interpretations not ‘clearly warranted by the text,’ Crandon vy. United States, 494 U.S. 152, 160, 110 S.Ct. 997, 108 L.Ed.2d 132 (1990). Td. at 204. A few months prior to the Supreme Court issuing its opinion in Van Buren, the district court in United Federation of Churches, LLC v. Johnson, 2021 WL 764670 (W.D. Wash. Feb. 26, 2021) aptly described the interplay between the terms “without authorization” and “exceeds authorized access” under the CFAA which underscores the reason that Plaintiff's claim here must be disiissed: Violating a company’s terms of use (here, the Code of Conduct) is insufficient to state a CFAA claim. The Ninth Circuit made that clear in United States v. Nosal, 676 F.3d 854, 857, 863 (9th Cir. 2012) (en banc). There, the court held that, under the CFAA, the phrase ‘exceeds authorized access “applies only to ‘violations of restrictions on access to information, ead on sea PTA nt QK2 KA lamnhncic viginal) These Grid HOE PES ICONS Gi 1S USC." 14, Gi 665-64 (eiipnasis it GFiZiiGiy. Tris, 10 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021it held that the CFAA ‘does not extend to violations of [a company's computer] use restrictions.’ Id. At most, The Satanic Temple alleges that Defendants have misappropriated the authority granted to them... But the CFAA is an ‘anti-hacking statute,’ not a ‘misappropriation statute.’ Nosal, 676 F.3d at 857. Defendants may have very well abused their authority, but The Satanic Temple has not alleged that they exceeded it... United States v. Nosal, 844 F.3d 1024, 1029 (9th Cir. 2016) (“Nosal IT”) (‘[A] person uses a computer ‘without authorization’ under [the CFAA] ... when the employer has rescinded permission to access the computer and the defendant uses the computer anyway.’) (internal quotation marks omitted) (quoting LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009)). Id. at *3-4. See also U.S. v. Nosal, 676 F.3d 854, 863-64 (9th Cir. 2012)(“This narrower interpretation is also a more sensible reading of the text and legislative history of a statute whose general purpose is to punish hacking—the circumvention of technological access barriers—not misappropriation of trade secrets—a subject Congress has dealt with elsewhere... Therefore, we hold that ‘exceeds authorized access’ in the CFAA is limited to violations of restrictions on access to information, and not restrictions on its use.”). Most applicable to the situation here of alleged accessing and misappropriating trade secrets, the district court in Grow Fin. Fed. Credit Union v. GTE Fed. Credit Union, 2017 WL M.D. Fia. Aug. i5, 2017) dismissed a similar claim as the one alleged in this case: The term, ‘exceeds authorized access’ is defined in the CFAA as ‘access to a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled to obtain or alter.’ Id. at 1030(e)(6). Here, Grow Financial alleges that access to the subject information was necessary for Holliday to > perform her. job duties. rm. 2 a. information that she accessed when she provided it to GTE Financial while she was still employed at Grow Financial. But, as this Court has previously held, an improper use of data is not tantamount to exceeding authorization under the CFAA. See Maintenx Mgmt., Inc. v. Lenkowski, No. 8:14-cv-2440-T-30MAP, 2015 WL 310543, *2-*3 (M.D. Fla. Jan. 25, 2015) (‘The facts put forth by Maintenx support the notion that ad Anta ha ahtainad bunw Mn cu Gala ne GULUIneE yrom wa he somehow exceeded his seemingly unfettered access.’)... le nawinutous nat that iiteTS, HOt inicat ll LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021Notably, if the Court were to apply the CFAA to an employee like Holliday, who allegedly divulged trade secrets that she was actually permitted to access, or who violated computer usage policies, the Court would be taking the CFAA beyond ‘its original purpose of targeting computer hackers.’ Enhanced Recovery 2015 WL 1470852 at *8 (citations omitted). Under this broad interpretation, the CFAA would be potentially violated each time an employee accessed an employer's ‘confidential’ information for an improper purpose. The Court will not construe the statute in this broad manner. Id, at *2 (emphasis added). An additional defect of this claim is the premise of civil liability under the CFAA. Section 1030(g) state that: “Any person who suffers damage or loss by reason ofa violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief.” (emphasis added). Section 1030(e)(8) defines the term “damage” as “any impairment to the integrity or availability of data, a program, a system, or information”. The term “loss” is defined as: any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service”. In | 99 of the Amended Complaint, Plaintiff alleges that due to Defendants accessing or misappropriating documents, “BPM has sustained monetary damages including, but not limited to, loss of capital, loss of valuable business, loss of profits and future profits, and loss of goodwill, which damages are ongoing and continue at the time of filing this Complaint.” Plaintiff does not allege damage or loss resulting from any impairment of the data contained on BPM’s computers or interruption of service. To this point, the Van Buren court observed that: alacianl CnnowoZiCar harms—such as the corruption of files—of the type unauthorized users 12 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021cause to computer systems and data. Limiting ‘damage’ and ‘loss’ in this way makes sense in a scheme “aimed at preventing the typical consequences of hacking.” Royal Truck, 974 F. 3d at 760. The term’s definitions are ill fitted, however, to remediating “misuse” of sensitive information that employees may permissibly access using their computers. Ibid. Van Buren’s situation is illustrative: His run of the license plate did not impair the ‘integrity or availability’ of data, nor did it otherwise harm the database system itself. Van Buren, 141 S.Ct. at 1660 (emphasis added). Thus, Plaintiff here has not, and in this circumstance cannot, allege damage or loss that affords him a claim under the CFAA. In light of the Supreme Court’s recent decision in Van Buren, Plaintiff has not alleged a viable claim under the CFAA as to any alleged accessing of information by other memebrs of the company on equal footing as he is to access such information, and has not alleged any damage or loss compensable under the CFAA. This claim must be dismissed. IV. Count VI — Tortious Interference With Advantageous Business Relationships The elements of tortious interference with a business relationship are: “(1) the existence of a business relationship, not necessarily evidenced by an enforceable contract, under which the plaintiff has legal rights; (2) the defendant’s knowledge of the relationship; (3) an intentional and unjustified interference with the relationship by the defendant; and (4) damage to the plaintiff as a result of the interference.” See Salit v. Ruden, McClosky, Smith, Schuster & Russell, P.A., 742 So. 2d 381, 385 (Fla. 4th DCA 1999). “For the interference to be unjustified, the interfering defendant must be a third party, a stranger to the business relationship.” Jd. at 386. See also ana. 44 1 ANAND ANA 1a NAA ANOVA A Dorie vy. White Mouniains dis. Groiip, Lid., 2 4200. 50 1041, 1 LU4y (Pld. ISLULA LIFT) A iortious interference claim exists only against persons or entities who are not parties to the contractual relationship.”); Sobi v. Fairfield Resorts, Inc., 846 So. 2d 1204, 1208 (Fla. Sth DCA 2003)(“Under Florida law, a cause of action for tortious interference does not exist against one who is himself a 13 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021party to the business relationship allegedly interfered with.”)(quoting Genet Co. v. Annheuser- Busch, Inc., 498 So. 2d 683, 684 (Fla. 3d DCA 1986)). As alleged in the Amended Complaint, Defendants are members, officers and employees of BPM. See §{ 12, 13, 14 and 37 of Amended Complaint. Plaintiff claims that Defendants tortiously interfered with BPM’s business relationship by a) diverting certain employees from BPM to Clarium Tech and b) having clients of BPM reduce their work with the company to instead conduct that business through Clarium Tech. See { 106 of Amended Complaint. “Under Florida law, a defendant is not a stranger to a business relationship, and thus cannot be held liable for tortious interference, when it has a supervisory interest in how the relationship is conducted or a potential financial interest in how a contract is performed.” Palm Beach Health Care v. Prof. Med. Educ., 13 So. 3d 1090, 1094 (Fla. 4th DCA 2009). Defendants who are alleged to be members and officers of BPM most certainly have both a supervisory interest in BPM’s business relationships and financial interest in the contracts with BPM’s customers. Hence, they are not strangers to the business relationships at issue. In Bridge Fin. v. J. Fischer & Assoc., 310 So. 3d 45, 50 (Fla. 4th DCA 2020), the Fourth District addressed a tortious interference ciaim tn the same context here as brought against part owners of a company: We agree with the trial court that, as a shareholder in JFA with a 5% interest in the company, Adam Palas could not interfere in a business relationship with himself. ULQ, LLC v. Meder, 293 Ga. App. 176, 666 om 94719 ranno 0.0.24 /1) (4UU0), ye aueged a against a former officer, who still had a 10% ownership interest in the company, for tortious interference with contractual and business relationships arising out of his actions following his termination. Id. at 715. The appellate court found that the tortious interference claim failed because the former officer was not a stranger to the business or contractual relationships. Id. at 720. The court explained that ‘[w]here a defendant has a fia the defendant is not a stranger to the contract or business relationship, even 14 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021though it is not a signatory to the contract.’ Id. (citation omitted). Because the former officer ‘was admittedly a ten percent owner in [the company] (a party to the business relationships or contracts) at the time he allegedly interfered, and therefore could not have been a _ stranger.’ Id.; see also Morris vy. Buvermo Props., Inc., 510 F. Supp. 2d 112, 120 (D.D.C. 2007) (‘As a part owner of [the corporation, the defendant] is a party to the contract ... and thus cannot be sued for tortious interference with his own contract.’). Similarly, in this case, because Adam Palas was a partial owner in JFA, he was not a stranger to a business relationship, and thus cannot be held liable for tortious interference. Id. at 50 (emphasis added). The claim as to allegedly diverting BPM’s employees also fails because “[t]he general rule is that an action for tortious interference will not lie where a party interferes with an at will contract...”). See Ferris v. South Fla. Stadium Corp., 926 So. 2d 399, 402 (Fla. 3d DCA 2006)(citing U.S. Sav. Bank v. Pittman, 86 So. 567, 573 (Fla. 1920)). The reason is that “when a contract is terminable at will there is only an expectancy that the relationship will continue.” See Greenberg v. Mount Sinai Med. Ctr., 629 So. 2d 252, 255 (Fla. 3d DCA 1993). Plaintiff does not allege the business relationship with the employees at issue was anything other than the standard form under Florida law — an at-will relationship that was terminable at any time. V. Count VII — Misappropriation of Trade Secrets Claim Preempts Other Claims Section 688.008, Florida Statutes, which is contained in Florida’s Uniform Trade Secret Act, provides the parameters for preemption of other claims when a plaintiff alleges a claim for Misappropriation of Trade Secrets under the Act: (1) Except as provided in subsection (2), ss. conflicting tort, restitutory, and other law of this state providing civil remedies for misappropriation of a trade secret. (2) This act does not affect: (a) Contractual remedies, whether or not based upon misappropriation of a trade secret; (b) Other civil remedies that are not based upon misappropriation of a irade secret; or 15 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021(c) Criminal remedies, whether or not based upon misappropriation of a trade secret. See Section 688.008. Florida State appellate courts have done little to address the test for preemption under the Act, however, as Uniform Trade Secret Acts are adopted around the country with similar preemption schemes, federal courts have weighed in rather extensively on the matter in construing Section 688.008 or similar provisions from other states. In one of the earliest cases from this district to address the issue, Allegiance Healthcare Corp. v. Coleman, 232 F. Supp. 2d 1329 (S.D. Fla. 2002), Judge Moreno determined that for preemption sake, “the issue becomes whether allegations of trade secret misappropriation alone comprise the underlying wrong; if so, the cause of action is barred by § 688.008.” Jd. at 1335-1336 (quoting Coulter Corp. v. Leinert, 869 F. Supp. 732, 734 (E.D. Mo. 1994)). See also New Lenox Indus., Inc. v. Fenton, 510 F. Supp. 2d 893, 908 (M.D. Fla. 2007)(“other torts involving the same underlying factual allegations as a claim for trade secret misappropriation will be preempted by FUTSA”, but if there are “material distinctions between the allegations comprising the additional torts and the allegations supporting the FUTSA claim,” the other tort claims are not preempted)(citing Allegiance Healthcare, 232 F. Supp. 2d at 1335-1336)). In the Misappropriation of Trade Secrets claim, the term “Trade Secrets” is defined as: 109. _...pricing structure, solicitation activities, financial information, operating procedures, data, frameworks, design documents, diagrams, software development project plans, test plans, requirement documents, project communications, Azure cloud, AWS cloud, SOW’s, and source codes for its software development and mobile applications, and customer information (pricing, margins, addresses, and other personal information) including names of contacts, decision makers, and requirements of same (“Trade Secrets”). See ¥ i095 of Amended Compiaint. 16 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021In Count VI (Tortious Interference) Plaintiff alleges that: . Defendants had knowledge of BPM’s relationships with its clients and employees. ({ 103) . Defendants interfered with “BPM’s business relationships by diverting employees to Clarium Tech and having BPM’s clients “reduce their business with BPM to conduct business directly with Clarium Tech and/or Clarium Managed Services”. ({ 104) Since customer information is alleged to be a trade secret in the Misappropriation claim, and customers are alleged to have been interfered with in Count VI, there is no distinction between these two claims, thus the Tortious Interference claim is preempted. See Pelfrey v. Mahaffy, 2018 WL 3110797, at *4 (S.D. Fla. Feb. 7, 2018)(finding tortious interference claim preempted where employee was alleged to have used trade secret information to solicit business for a company employee set up to unlawfully compete); Digiport, Inc. v. Foram Dev. BFC, LLC, 314 So. 3d 550 (Fla. 3d DCA 2020)(affirming summary judgment finding misappropriation of business idea claim preempted which alleged that business idea was developed and disclosed to Foram Group which “misappropriated the idea by disclosing its plans to other companies for its own benefit”). The Conspiracy Claim (Count VIII) is similarly premised upon use of trade secrets including that Defendants: . employed “devices, scheme and artifice to misappropriate BPM’s confidential information and trade secrets” as alleged in the Misappropriation claim. ({ 119 a)) . engaging in overt acts “including working for, and having a financial and ownership interest, in a competing company, Ciarium Tech, and tortiousiy interfering with BPM’s advantageous business relationships.” ({ 119 b)) Consequently, the Conspiracy claim is also preempted under Section 688.008. See Taxinet Corp. v. Leon, 2018 WL 3405243, at *4 (S.D. Fla. July 12, 2018)(fraud claim which relied “at ieast in part ona misappropriation of a trade secret” and faise statements that were made to obtain 17 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021“confidential business information” was “too intertwined with the Uniform Trade Secrets Act” and thus warranted dismissal based on preemption); Measured Wealth Private Client Group, LLC v. Foster, 2020 WL 3963716 (S.D. Fla. July 13, 2020)(finding FDUTPA claims based on allegations that defendants induced Measured Wealth’s clients to become their own through other entities, used deceptive means to obtain and concealed the misappropriation of confidential information which they provided to other entities, were preempted as “reframed allegations from the claims for misappropriation of trade secrets”). Tn Count X (Unjust Enrichment) Plaintiff alleges that: ° BPM conferred a benefit upon Defendants by “providing significant confidential information and trade secrets, client information, business relationships, marketing, training and other opportunities”. ({ 129) . Defendants are “using BPM’s significant confidential information and trade secrets, clients information, business relationships, marketing, training and other opportunities to start a competing business, Clarium Tech.” ({ 130) . “Defendants have been enriched by the confidential information and trade secrets, clients information, business relationships, marketing, training and other opportunities provided by BPM.” (4 131) There is no material distinction between the Misappropriation and Unjust Enrichment claims as both are premised upon usage of alleged trade secret information. Thus, the Unjust Enrichment claim is also preempted under Section 688.008. See Developmental Technologies, LLC vy. Mitsui Chemicals, Inc., 2019 WL 1598808, at *4 (M.D. Fla. Apr. 15, 2019)(“The underlying factual allegations that pertain to Plaintiff's FDUTPA claim involve the disclosure of trade secrets subsequent to the parties’ execution of their NDA. These allegations underpin Plaintiffs misappropriation of trade secret claims (Id. { 82) and are therefore preempted by FUTSA.”). 18 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021Since Counts VI, VIII and X are preempted by Section 688.008, those claims must be dismissed. VI. Count VIII — Conspiracy As explained by the Eleventh Circuit in McAndrew v. Lockheed Martin Corp., 206 F.3d 1031 (11th Cir. 2000): The intracorporate conspiracy doctrine holds that acts of corporate agents are attributed to the corporation itself, thereby negating the multiplicity of actors necessary for the formation of a conspiracy. Simply put, under the doctrine, a corporation cannot conspire with its employees, and its employees, when acting in the scope of their employment, cannot conspire among themselves. Id. at 1036. See also Nassar v. Fla. Dept. of Agriculture, 754 Fed.Appx. 903, 907 (11th Cir. 2018)(“under the intracorporate conspiracy doctrine, the employees of a corporation or government agency cannot form a conspiracy among themselves because the organization and its employees are treated as a single legal actor.”). Since the only persons alleged to be involved in the conspiracy are employees of BPM, this claim is barred by the intracorporate conspiracy doctrine. See Denney v. City of Albany, 247 F.3d 1172 (11th Cir. 2001)(affirming summary judgment on conspiracy claim under intracorporate conspiracy doctrine where only two named conspirators were city employees and the object of the conspiracy related to their official work duties). CONCLUSION -£ 42.-.4 mi OL Gemana, rial requirement for filing a derivative Complaint and this lawsuit should be dismissed in its entirety. Plaintiff has failed to properly allege the required elements of Fraudulent Concealment as no facts are alleged to support reliance and detriment based on the reasons for termination of resignation of employees. 19 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021The Computer Fraud and Abuse Act claim must be dismissed in light of the Supreme Court’s recent decision in Van Buren as Plaintiff cannot show that Defendants acted without authorization or exceeded authorized access as to information on BPM’s computers, which as members of the company they are entitled to access, and alleged misuse of such information is not actionable under the CFAA. Further, Plaintiff has not and cannot allege a form of damage or loss as those terms are defined under the CFAA. The Tortious Interference claim fails as Defendants, who are members of BPM, are not strangers to the business relationships, thus they cannot interfere with relationships to which they are parties. The Misappropriation of Trade Secrets claim preempts the Tortious Interference, Conspiracy and Unjust Enrichment claims which are also premised upon trade secrets. Finally, the Conspiracy claim is subject to dismissal under the intracorporate conspiracy doctrine as Defendants, who are employees of BPM, cannot conspire among themselves. WHEREFORE, Defendants respectfully request this Honorable Court grant their Motion to Dismiss First Amended Derivative Complaint, and for all such other relief as this Court deems just and proper. 20 LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021Signed on this 17th day of August, 2021. Respectfully submitted, Law Offices of Jason Gordon, P.A. 3440 Hollywood Blvd., Suite 415 Hollywood, Florida 33021 Telephone: (954) 241-4207 Facsimile: (954) 241-4236 FOR SERVICE OF COURT FILINGS: jg@jgordonlegal.com service@jgordonlegal.com By:__/s/ Jason Gordon Jason Gordon, Esq. Fla. Bar No. 0012973 CERTIFICATE OF SERVICE I HEREBY CERTIFY that a true and correct copy of the foregoing was served this 17th day of August, 2021 via Fiortda’s e-filing portai to: Alen H. Hsu, Esq., Weiss Serota Heitman Cole & Bierman, P.L., 1200 N. Federal Highway, Suite 312, Boca Raton, Florida 33432. 21 /s/ Jason Gordon Jason Gordon, Esq. LAW OFFICES OF JASON GORDON, P.A. 3440 HOLLYWOOD BLVD., SUITE 415 HOLLYWOOD, FLORIDA 33021