Oracle America, Inc. v. Service Key, LLC

cyber security case reporter

ORACLE AMERICA, INC., a Delaware corporation, Plaintiff,
v.
SERVICE KEY, LLC, a Georgia limited liability company;
ANGELA VINES; DLT FEDERAL BUSINESS SYSTEMS CORPORATION,
a Delaware corporation; and DOES 1-50, Defendants.
Case No: C 12-00790 SBA
UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA OAKLAND DIVISION
Dated: November 30, 2012

ORDER GRANTING IN PART AND DENYING IN PART DEFENDANT'S MOTION FOR PARTIAL DISMISSAL OF PLAINTIFF'S AMENDED COMPLAINT

        Plaintiff, Oracle America, Inc. ("Oracle"), brings the instant action against Defendants, Service Key, LLC ("Service Key") and its President and co-owner, Angela Vines, and DLT Federal Business Systems Corporation ("DLT"), inter alia, under the Federal Copyright Act, 17 U.S.C. §§ 101 et seq., the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. §§ 1030 et seq., and the Lanham Act, 15 U.S.C. § 1125(a)(1)(B). The Court has original jurisdiction over Oracle's federal claims, 28 U.S.C. § 1331, and supplemental jurisdiction over its state law causes of action, 28 U.S.C. § 1367.

        The parties are presently before the Court on DLT's Motion for Partial Dismissal of Plaintiff's Amended Complaint, pursuant to Federal Rule of Civil Procedure 12(b)(6). Dkt. 19. Having read and considered the papers filed in connection with this matter and being fully informed, the Court hereby GRANTS IN PART and DENIES IN PART the motion to dismiss for the reasons set forth below. The Court, in its discretion, finds this matter suitable for resolution without oral argument. See Fed. R. Civ. P. 78(b); N.D. Cal. Civ. L.R. 7-1(b).

I. BACKGROUND

        A. FACTUAL SUMMARY

        The following summary is taken from the First Amended Complaint ("FAC"), which is the operative pleading before the Court. For purposes of the instant motion, the well-pleaded factual allegations of the FAC are taken as true.

        Oracle is supplier of enterprise hardware and software systems. First Am. Compl. ("FAC") ¶ 22, Dkt. 22. Customers who purchase Oracle hardware have the option of purchasing an annual contract for technical support services. Id. ¶ 24. As part of those services, Oracle provides software updates, including patches and fixes, for its proprietary firmware and its Solaris operating system software. Id. Customers who enter into a technical support agreement are provided with access credentials (i.e., a log-in and password) which allow them access to Oracle's support websites, such as My Oracle Support ("MOS"), to download support software. Id. ¶¶ 24, 26. Access to these websites is subject to Oracle's Terms of Use. Id. ¶¶ 27-33. Only users who have a support agreement with Oracle are authorized to receive software updates from Oracle's websites. Id.

        In or about February 2011, DLT became a member of the Oracle Partner Network ("OPN"). Id. ¶ 11. The OPN is a membership program for third party companies interested in reselling Oracle hardware and/or software. Id. To facilitate their role as resellers, OPN members receive log-in credentials to access Oracle's support websites. Id. According to Oracle, DLT fraudulently used such access to obtain Oracle's proprietary software patches and updates which it then provided to its customers even though they lacked support agreements with Oracle. Id. ¶ 39. In addition, DLT allegedly distributed and/or facilitated the distribution of access credentials to Oracle's website to third parties who were unaware that DLT lacked the authority to distribute such credentials. Id. On November 7, 2011, Oracle terminated DLT's membership in the OPN due to its alleged violation of the OPN Agreement. Id. ¶ 12.

        B. PROCEDURAL HISTORY

        Oracle filed its original Complaint in this Court on February 17, 2012, and a FAC on April 19, 2012. Dkt. 1, 17. The FAC alleges eleven claims against the Defendants, styled as follows: (1) Copyright Infringement; (2) Violation of the CFAA, 18 U.S.C. § 1030(a)(2)(C), (a)(4) and (a)(6)(A); (3) False Advertising under the Lanham Act, 15 U.S.C. § 1125(a)(1)(B); (4) Breach of Contract; (5) Inducing Breach of Contract; (6) Fraudulent Inducement (against DLT); (7) Fraudulent Inducement (against Service Key); (8) Unfair Competition, Cal. Bus. & Prof. Code § 17200; (9) Intentional Interference with Prospective Economic Relations; (10) Unjust Enrichment/Restitution; and (11) An Accounting.

        On May 3, 2012, DLT filed the instant motion for partial dismissal, which seeks the dismissal of Oracle's second, fifth, sixth, eighth, ninth, tenth and eleventh claims for violation of the CFAA, inducing breach of contract, fraudulent inducement, unfair competition, intentional interference with prospective economic relations, and an accounting, respectively. Oracle timely filed an opposition and DLT timely filed its reply. The matter is now fully briefed.1

II. LEGAL STANDARD

        A motion to dismiss under Federal Rule of Civil Procedure 12(b)(6) "tests the legal sufficiency of a claim." Navarro v. Block, 250 F.3d 729, 732 (9th Cir. 2001). A complaint may be dismissed under Rule 12(b)(6) for failure to state a claim if the plaintiff fails to state a cognizable legal theory, or has not alleged sufficient facts to support a cognizable legal theory. Balistreri v. Pacifica Police Dep't, 901 F.2d 696, 699 (9th Cir. 1990). In deciding a Rule 12(b)(6) motion, courts generally "consider only allegations contained in the pleadings, exhibits attached to the complaint, and matters properly subject to judicial notice." Swartz v. KPMG LLP, 476 F.3d 756, 763 (9th Cir. 2007). The court is to "accept all factual allegations in the complaint as true and construe the pleadings in the light most favorable to the nonmoving party." Outdoor Media Group, Inc. v. City of Beaumont, 506 F.3d 895, 899-900 (9th Cir. 2007).

        To survive a motion to dismiss for failure to state a claim, the plaintiff must allege "enough facts to state a claim to relief that is plausible on its face." Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007). The allegations made in a complaint must be both "sufficiently detailed to give fair notice to the opposing party of the nature of the claim so that the party may effectively defend against it" and "sufficiently plausible" such that "it is not unfair to require the opposing party to be subjected to the expense of discovery." Starr v. Baca, 633 F.3d 1191, 1204 (9th Cir. 2011). "Threadbare recitals of the elements of a cause of action, supported by mere conclusory statements, do not suffice." Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009). Where a complaint or claim is dismissed, leave to amend generally is granted, unless further amendment would be futile. Chaset v. Fleer/Skybox Int'l, 300 F.3d 1083, 1087-88 (9th Cir. 2002). "A district court may deny a plaintiff leave to amend if it determines that allegation of other facts consistent with the challenged pleading could not possibly cure the deficiency[.]" Alvarez v. Chevron Corp., 656 F.3d 925, 935 (9th Cir. 2011) (internal quotations omitted).

III. DISCUSSION

        A. CFAA

        The CFAA was enacted "to enhance the government's ability to prosecute computer crimes," and is "designed to target hackers who accessed computers to steal information or to disrupt or destroy computer functionality, as well as criminals who possessed the capacity to access and control high technology processes vital to our everyday lives." LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1130 (9th Cir. 2009). The Act proscribes various computer crimes, "the majority of which involve accessing computers without authorization or in excess of authorization, and then taking specified forbidden actions, ranging from obtaining information to damaging a computer or computer data." Id. The CFAA only reaches computer hacking that is intended to procure or alter information, not the misappropriation of such information. United States v. Nosal, 676 F.3d 854, 862-63 (9th Cir. 2012) (en banc).

        Although primarily a criminal statute, the CFAA also creates a private right of action for persons injured by conduct prohibited thereunder. See 18 U.S.C § 1030(g). To prevail on a civil claim under section 1030(g), "a private plaintiff must prove that the defendant violated one of the provisions of [section] 1030(a)(1)-(7), and that the violation involved one of the factors listed in [section] 1030(a)(5)(B)." Brekka, 581 F.3d at 1131. Those factors are as follows: (1) "loss to 1 or more persons during any 1-year period . . . aggregating at least $5,000 in value"; (2) "the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals"; (3) "physical injury to any person"; (4) "a threat to public health or safety"; and (5) "damage affecting a computer used by or for an entity of the United States Government in furtherance of the administration of justice, national defense, or national security." 18 U.S.C. §§ 1030(c)(4)(A)(i).

        Here, the FAC alleges that DLT violated the CFAA (1) by accessing Oracle's websites to obtain updates and patches in order to provide unauthorized support services to DLT's customers, and (2) by disseminating access credentials to third parties and thereby allowing direct access to the websites. FAC ¶¶ 39, 77-83. The FAC alleges that such conduct violates 18 U.S.C. § 1030(a)(2), (a)(2) and (a)(6)(A), which prohibit the following actions:

• "intentionally access[ing] a computer without authorization or exceed[ing] authorized access, and thereby obtain[ing] . . . information from any protected computer." 18 U.S.C. § 1030(a)(2).

• "knowingly and with intent to defraud, access[ing] a protected computer without authorization, or exceed[ing] authorized access, and by means of such conduct further[ing] the intended fraud and obtain[ing] anything of value . . . ." Id. § 1030(a)(4).

• "knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if— [¶] . . . such trafficking affects interstate or foreign commerce[.]" Id. § 1030(a)(6)(A).

        In its motion to dismiss, DLT contends that Oracle's CFAA claim should be dismissed on the grounds that: (1) Oracle has failed to properly allege damages that are cognizable under the CFAA; (2) it is barred by the Ninth Circuit's en banc decision in Nosal; and (3) the claim fails to comport with the heightened pleading requirements of Federal Rule of Civil Procedure 9(b). The Court discusses each of these arguments, in turn.

1. Failure to Allege Damages

        DLT contends that Oracle's CFAA claim is subject to dismissal for failure to properly allege damages. Mot. at 12. This contention lacks merit. The CFAA provides a civil remedy for "[a]ny person who suffers damage or loss by reason of a violation of this section. . . ." 18 U.S.C. § 1030(g) (emphasis added). The Act defines the term "damage" to mean "any impairment to the integrity or availability of data, a program, a system, or information[.]" 18 U.S.C. § 1030(e)(8). "[T]he term 'loss' means any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service." 18 U.S.C. § 1030(e)(11). In the present case, the FAC alleges that Oracle incurred costs as a result of investigating and conducting a damage assessment in response to DLT's actions. See FAC ¶ 82. This is sufficient for purposes of alleging loss under the CFAA.

        Equally without merit is DLT's ancillary argument that Oracle has not alleged that it sustained damages of at least $5,000. Mot. at 12. Subsection 1030(a)(4) prohibits certain access "and by means of such conduct furthering] the intended fraud and obtain[ing] anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period." 18 U.S.C. § 1030(a)(4) (emphasis added). The $5,000 figure refers to the value of the computer use, and is not meant as a measure of "damages," as defined in subsection 1030(e)(8). Moreover, Oracle alleges that in violating subsection 1030(a)(4), DLT "obtained one or more things of value, including, but not limited to, Oracle's software." FAC ¶ 81. Because Oracle alleges that DLT obtained something of value beyond solely the use of the computer, the $5,000 requirement on DLT's argument relies is inapposite. Accordingly, the Court rejects DLT's contention that Oracle's CFAA claim is subject to dismissal for failure to properly allege damages.

2. Nosal

        Next, DLT contends that Oracle's CFAA claim is completely barred by the Ninth Circuit's decision in Nosal. In Nosal, the defendant left his position at Korn/Ferry, an executive search firm. Shortly after leaving the company, he convinced some of his former colleagues to use their log-in credentials to download customer information from the company's confidential computerized database. In violation of company policy, the employees subsequently transferred that information to the defendant, who was launching a competing business. The government filed a twenty-count indictment against the defendant which included charges of theft of trade secrets, mail fraud, conspiracy and violations of the CFAA.

        The CFAA counts charged the defendant with violations of 18 U.S.C. § 1030(a)(4) for aiding and abetting the Korn/Ferry employees in "exceed[ing their] authorized access" with intent to defraud. The defendant filed a motion to dismiss the CFAA counts, claiming that the CFAA targets only hackers, not individuals who access a computer with authorization but then misuse or misappropriate information they obtain by means of such access. The district court initially denied the motion, but reconsidered and dismissed the counts based on the Ninth Circuit's narrow construction of "without authorization" and "exceeds authorized access" in Brekka.

        On appeal, a three-judge panel initially reversed and remanded, Nosal, 642 F.3d 781; however, the court subsequently granted rehearing en banc, 661 F.3d 1180. The en banc panel of the Ninth Circuit affirmed the district court's dismissal of the CFAA counts, holding that the plain language of the CFAA targets the unauthorized procurement or alteration of information—i.e., computer "hacking"—not the misuse or misappropriation of such information. 676 F.3d at 863. Since the Korn/Ferry employees were authorized to access the confidential information, the court found that they did not exceed their authorized access by accessing the company database. Id. at 864. In other words, the sharing of confidential information by employees, even if obtained and distributed in violation of company policy, was not actionable under the CFAA. Id. The court reasoned that to conclude otherwise "would transform the CFAA from an anti-hacking statute into an expansive misappropriation statute." Id. at 857.

        Oracle first argues that Nosal is inapposite to its claim under subsection 1030(a)(6). Opp'n at 3. As noted, that subsection prohibits a person from fraudulently trafficking in "any password or similar information through which a computer may be accessed without authorization" where such trafficking affects interstate or foreign commerce. 18 U.S.C. § 1030(a)(6). As Oracle correctly points out, Nosal addressed the meaning of the term "exceeds authorized access," which is used in subsections 1030(a)(1), (2), (4) and (7), but not in subsection 1030(a)(6). DLT responds that Nosal is not limited to subsection 1030(a)(4), but applies to the entirety of the CFAA. Perhaps so, but that is entirely beside the point. Oracle's claim under subsection 1030(a)(6) is not dependent upon whether DLT "hacked" into Oracle's websites; rather, Oracle is alleging that DLT distributed and/or facilitated the distribution of access credentials to Oracle's support websites to "unauthorized third parties." FAC ¶ 39. Thus, Nosal interpretation of "exceeds authorized access" is not germane to and does not preclude Oracle from proceeding with a claim under subsection 1030(a)(6).

        The result is different, however, with respect to Oracle's claim under subsections 1030(a)(2)(C) and (a)(4). In Nosal, the court held that the Korn/Ferry employees did not exceed their authorized access because they had permission to access the company's computers. Attempting to distinguish its claim from Nosal, Oracle contends that it has specifically alleged in its FAC that DLT "accessed Oracle's websites without authorization" and that such conduct is actionable. Opp'n at 3 (citing FAC ¶¶ 11, 24, 29). The problem for Oracle is that the FAC alleges no such thing. In paragraph 39 of the FAC, Oracle alleges that DLT used its "access credentials for Oracle's support websites for the unauthorized purpose of accessing and taking Oracle's proprietary software products, such as certain software patches and updates," and, in turn, used and distributed these products to provide support services to third parties "who could not legally receive them[.]" FAC ¶ 39 (emphasis added). Such allegations, even if taken as true, are not actionable under CFAA. The FAC does not allege that DLT accessed Oracle's website without authorization. To the contrary, Oracle expressly avers that DLT was authorized to access its websites. What Oracle takes exception to is DLT's accessing the websites for the ostensibly improper "purpose" of using its authorized access to provide support services to third parties. Id. This conduct—using legitimate access credentials to access websites and then distributing information obtained from such access to third parties who have no right to receive such information—is precisely the type of conduct that Nosal held was beyond the scope of the CFAA. Thus, the Court finds that Oracle's claims under subsections 1030(a)(2)(C) and (a)(4) must be dismissed under Nosal.

3. Particularity under Rule 9(b)

        Finally, DLT argues Oracle's CFAA claim fails to comport with Rule 9(b), which provides, in relevant part, that "[i]n alleging fraud or mistake, a party must state with particularity the circumstances constituting fraud or mistake." Fed. R. Civ. P. 9(b). "The purpose of this rule is to ensure that defendants accused of the conduct specified have adequate notice of what they are alleged to have done, so that they may defend against the accusations. Without such specificity, defendants in these cases would be put to an unfair disadvantage, since at the early stages of the proceedings they could do no more than generally deny any wrongdoing." Concha v. London, 62 F.3d 1493, 1502 (9th Cir. 1995).

        Oracle contends that Rule 9(b) does not apply to the CFAA. This Circuit has not yet addressed the question of whether a CFAA claim must be pled with particularity. Nonetheless, in Kearns v. Ford Motor Co., 567 F.3d 1120 (9th Cir. 2009), a decision cited by neither party, the Ninth Circuit held that even where fraud is not a necessary element of a claim, Rule 9(b) nonetheless applies where "a unified course of fraudulent conduct is alleged" as the basis of the claim. Id. at 1125. Such claims are "said to be 'grounded in fraud' or to 'sound in fraud,' and the pleading as a whole must satisfy the particularity requirement of Rule 9(b)." Id. (internal quotations and citation omitted).

        In the instant case, the Court finds that Oracle's claim under the CFAA is subject to the heightened pleading requirements of Rule 9(b). As an initial matter, subsection 1030(a)(4) is violated only if a defendant acts "with intent to defraud" and its conduct "furthers the intended fraud." 18 U.S.C. § 1030(a)(4).2 Although the intent to defraud (or "scienter") may be alleged generally, see Odom v. Microsoft Corp., 486 F.3d 541, 554 (9th Cir. 2007), Rule 9(b) plainly applies to section 1030(a)(4)'s requirement that the defendant's acts further the intended fraud. That aside, Oracle's allegations clearly are "grounded in fraud" or otherwise "sound in fraud." Kearns, 567 F.3d at 1125. Among other things, Oracle avers that DLT fraudulently induced customers of Oracle to cancel their support agreements with Oracle by claiming that it could provide support services at a lower cost than Oracle. See id. ¶ 41. In addition, DLT is alleged to have "falsely represented to its customers and potential customers that they could still obtain—from [DLT]—software patches and updates for their Oracle computer products[.]" See id. ¶ 42. To facilitate its scheme, DLT allegedly accessed Oracle's support websites and engaged in the fraudulent trafficking of passwords to facilitate third-party access to those websites and update so that DLT could provide support services to these customers. See id. ¶¶ 79, 81. In view of these allegations, the Court finds that under Kearns, Oracle's CFAA claims are subject to the particularity requirements of Rule 9(b).

        The district court cases cited by Oracle for the proposition that Rule 9(b) is inapplicable to claims brought under the CFAA are not persuasive. In eBay Inc. v. Digital Point Solutions, Inc., 608 F. Supp. 2d 1156 (N.D. Cal. 2009), Judge Fogel declined to apply Rule 9(b) to the plaintiff's claim under subsection 1030(a)(4), reasoning that "fraud 'under the CFAA only requires a showing of unlawful access [and therefore] there is no need to plead the elements of common law fraud to state a claim under the Act.'" Id. at 1164. As support, the court cited Hanger Prosthetics & Orthotics, Inc. v. Capstone Orthopedic, Inc., 556 F. Supp. 2d 1122 (E.D. Cal. 2008) ("Hanger Prosthetics"), which noted that "[t]he term 'defraud' for purposes of § 1030(a)(4) simply means wrongdoing and does not require proof of common law fraud." Id. at 1131. However, the motions at issue in Hanger Prosthetics were the defendant's summary judgment motions; the court did not address the issue of whether claims under the CFAA must meet the heightened pleading requirements of Rule 9(b). Moreover, the court in eBay failed to take into account the Ninth Circuit's decision in Kearns, which, as discussed, holds that Rule 9(b) applies not only to fraud claims, but also to claims that are "grounded in fraud" or "sound in fraud."

        Alternatively, Oracle argues that even if Rule 9(b) is applicable, it has provided sufficient detail to meet such heightened pleadings requirements. Not so. To satisfy the heightened pleading requirements for fraud or fraud-based claims, the pleadings must allege "the who, what, when, where, and how" of the alleged fraudulent conduct, Cooper v. Pickett, 137 F.3d 616, 627 (9th Cir. 1997), and "set forth an explanation as to why [a] statement or omission complained of was false and misleading," In re GlenFed, Inc. Sec. Litig., 42 F.3d 1541, 1548 (9th Cir. 1994) (en banc). Oracle does, in fact, provide some specific instances of DLT's allegedly fraudulent conduct. Those allegations, however, are offered merely as examples, as opposed to the constellation of fraudulent conduct that forms the basis of Oracle's claim. To comply with Rule 9(b), Oracle must allege, with specificity, each incident of fraudulent conduct that comprises its CFAA claim against DLT. The Court will therefore grant Oracle leave to provide the requisite facts, consistent with Rule 9(b).

4. Summary

        Oracle's claims under subsections 1030(a)(2)(C) and (a)(4), as presently alleged, are barred by Nosal. In addition, the Court finds that Rule 9(b)'s heightened pleading requirements apply to Oracle's CFAA claim generally, and that the allegations presented fail to pass muster under that Rule. Because Oracle's claim under subsection 1030(a)(6) is grounded in fraud, said claim is dismissed with leave to amend to comport with Rule 9(b). Oracle's claims under subsections 1030(a)(2)(C) and (a)(4), as currently pled, are not actionable, and therefore, are dismissed. Oracle is granted leave to amend these claims, but only to the extent it is able to do so in a manner consistent with both the FAC, see Alvarez, 656 F.3d at 935, and Federal Rule of Civil Procedure 11.

        B. INDUCING BREACH OF CONTRACT

        The elements of inducing breach of contract, more formally known as interference with contractual relations, are "(1) a valid contract between plaintiff and a third party; (2) defendant's knowledge of this contract; (3) defendant's intentional acts designed to induce a breach or disruption of the contractual relationship; (4) actual breach or disruption of the contractual relationship; and (5) resulting damage." Quelimane Co. v. Stewart Title Guar. Co., 19 Cal.4th 26, 55 (1998).3

        DLT contends that the allegations in support of Oracle's claim are too vague to satisfy Twombly and its progeny. The Court agrees. The pleadings fail to identify the particular third parties that DLT purportedly induced to breach Oracle's agreements. Rather, Oracle avers only that Defendants induced "other Oracle customers and third parties" to breach Oracle's Terms of Use agreements. FAC ¶ 105, 107, 108. The only third parties identified by name are the United States Navy and the United States Food and Drug Administration, both of which are merely cited as examples. Id. ¶ 107. Oracle also has not identified the specific provisions of those agreements that allegedly were breached. The absence of such allegations deprives DLT of "fair notice of what the claim is and the grounds upon which it rests[.]" Twombly, 550 U.S. at 554-55. Accordingly, the Court dismisses Oracle's fifth claim with leave to amend.

        C. FRAUDULENT INDUCEMENT

        "'Promissory fraud' is a subspecies of the action for fraud and deceit. A promise to do something necessarily implies the intention to perform; hence, where a promise is made without such intention, there is an implied misrepresentation of fact that may be actionable fraud." Lazar v. Super. Ct., 12 Cal. 4th 631, 638 (1996). Under California law, the elements for a fraudulent inducement claim are: (1) a misrepresentation; (2) knowledge of the falsity of the representation; (3) intent to induce reliance; (4) justifiable reliance; and (5) damage. Stewart v. Ragland, 934 F.2d 1033, 1043 (9th Cir. 1991).

1. Scienter

        DLT first argues that Oracle has failed to allege any facts demonstrating an intent to defraud when it entered into the OPM Agreement. Mot. at 16. "While the factual circumstances of the fraud itself must be alleged with particularity, the state of mind—or scienter—of the defendants may be alleged generally." Odom, 486 F.3d at 554. Nonetheless, scienter still must be pleaded sufficiently to make entitlement to relief plausible. Eclectic Properties East, LLC v. The Marcus & Millichap Co., No. C-09-00511 RMW, 2012 WL 713289, at *11 (N.D. Cal. Mar. 5, 2012) (finding that after Twombly, a plaintiff alleging fraud cannot plead intent to defraud "simply by saying that scienter existed").

        The FAC alleges that when DLT entered into the OPM Agreement, "[it] intentionally failed to disclose that it planned to use its access to MOS and Oracle's software to provide support to its customers by making available access credentials for Oracle's websites and materials downloaded from Oracle's websites to customers who did not have authorization from Oracle to access MOS or download Oracle software." FAC ¶¶ 120-121. While perhaps not particularly detailed, this general allegation is sufficient to establish, for pleading purposes, a plausible scheme to defraud Oracle.

2. Reliance

        Next, DLT challenges the sufficiency of Oracle's allegations of reliance. According to DLT, Oracle cannot legitimately claim that it relied on any representations or promises because the contract was one of adhesion since it was offered on a "take-it-or-leave-it" basis. Mot. at 17.4 Whether Oracle's OPN agreement is, in fact, one of adhesion is beyond the scope of the pleadings, which therefore cannot be resolved on a Rule 12(b)(6) motion. In addition, DLT cites no legal authority to support the proposition that a party alleging a promissory fraud claim is foreclosed from claiming reliance where the contract is one of adhesion.

3. Election of Remedies

        As an ancillary matter, DLT argues that Oracle cannot simultaneously pursue claims for breach of contract and fraudulent inducement, and that it must elect between the two claims. Mot. at 18; Reply at 10.5 Although DLT briefly touched upon the above argument in its moving papers, see Mot. at 17-18, DLT waited until its reply brief to fully develop its analysis on this issue, see Reply at 10. The Court does not consider issues unless they "are argued specifically and distinctly in a party's opening brief," since to do otherwise deprives the nonmoving party the opportunity to fully respond. Ind. Towers of Wash., 350 F.3d at 929. DLT may raise the issue in a subsequent motion, provided that it first makes a good faith attempt to meet and confer with Oracle in attempt to resolve the matter without the need for further judicial intervention.

        In sum, based on the arguments presented in its motion, DLT has failed to persuade the Court that dismissal of Oracle's sixth claim for fraudulent inducement is warranted at this time.

        D. UNFAIR COMPETITION

        California's Unfair Competition Law ("UCL") makes actionable any "unlawful, unfair or fraudulent business act or practice." Cal. Bus. & Prof. Code § 17200. "Each prong of the UCL is a separate and distinct theory of liability." Birdsong v. Apple, Inc., 590 F.3d 955, 959 (9th Cir. 2009). With respect to the unlawful prong, the UCL incorporates other laws and treats violations of those laws as unlawful business practices independently actionable under state law. Chabner v. United Omaha Life Ins. Co., 225 F.3d 1042, 1048 (9th Cir.2000). A business practice that is not unlawful may nonetheless be actionable as an "unfair" business practice. Alvarez v. Chevron Corp., 656 F.3d 925, 933 n.8 (9th Cir. 2011). An unfair business practice under the UCL is "one that either offends an established public policy or is immoral, unethical, oppressive, unscrupulous, or substantially injurious to consumers." McDonald v. Coldwell Banker, 543 F.3d 498, 506 (9th Cir. 2008). A claim under the fraudulent prong of the UCL is based on the reasonable consumer standard, which requires the plaintiff to "show that members of the public are likely to be deceived." Williams v. Gerber Prods. Co., 552 F.3d 934 (9th Cir. 2008) (internal quotation marks omitted).

        DLT contends that Oracle's UCL claim is "defective in toto because it is preempted by the U.S. Copyright Act." Mot. at 18. Section 301(a) of the Copyright Act "expressly preempts state claims where the plaintiff's work 'come[s] within the subject matter of copyright' and the state law grants 'legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright.'" Montz v. Pilgrim Films & Tel., Inc., 649 F.3d 975, 979 (9th Cir. 2011) (en banc). The Ninth Circuit has adopted a two-part test to determine whether a state law claim is preempted by the Copyright Act: (1) courts must first determine whether the subject matter of the state law claims falls within the subject matter of copyright as described by 17 U.S.C. §§ 102 and 103, and (2) whether the rights asserted under state law are equivalent to the rights contained in 17 U.S.C. § 106. Laws v. Sony Music Entm't, Inc., 448 F.3d 1134, 1137-38 (9th Cir. 2006). "To survive preemption, a state cause of action must assert rights that are qualitatively different from the rights protected by copyright." Montz, 649 F.3d at 980.

        Here, Oracle's UCL claim is based on the unfair and unlawful prongs of the UCL. FAC ¶¶ 127-131. DLT's allegedly unlawful business practices are identified as violations of the CFAA and the Lanham Act. See id. ¶ 130. Oracle does not allege any violations of the Copyright Act as the basis of its unlawful practices claim under the UCL. DLT does not dispute this, nor does it dispute that claims under the Copyright Act involve rights that are qualitatively different from those protected under the CFAA and the Lanham Act. In its reply, however, DLT counters that Oracle's "copyright issues" are so "central to every allegation in its over-pled complaint" that, for all intents and purposes, all of its claims should be deemed preempted. Reply at 11. DLT cites no authority for its extraordinary assertion that a claim under the CFAA or the Lanham may be transmuted into one under the Copyright Act simply because there may be some factual overlap in their claims. Accordingly, the Court declines to dismiss Oracle's seventh claim for violation of the UCL.

        E. UNJUST ENRICHMENT

        Oracle's tenth claim alleges a claim for unjust enrichment. Although the parties dispute whether this claim is preempted by section 301(a) of the Copyright Act, the Court notes that there is no independent cause of action for unjust enrichment. See Levine v. Blue Shield of Cal., 189 Cal.App.4th 1117, 1138 (2010) ("'[t]here is no cause of action in California for unjust enrichment") (internal quotations and citations omitted). In addition, neither party acknowledges that this Court has previously dismissed unjust enrichment claims on that basis. Newsom v. Countrywide Home Loans, Inc., 714 F.Supp.2d 1000, 1009-1010 (N.D. Cal. 2010); accord Barocio v. Bank of Am., N.A., No. C 11-5636 SBA, 2012 WL 3945535, at *4 (N.D. Cal., Sept. 10, 2012). Accordingly, the Court dismisses Oracle's claim for unjust enrichment without leave to amend.

        F. ACCOUNTING

        In its eleventh and final claim, Oracle seeks an accounting of all sums "Defendants have received . . . as a result of the [alleged] misconduct." FAC ¶ 150. An accounting is an equitable proceeding which is proper where there is an unliquidated and unascertained amount owing that cannot be determined without an examination of the debits and credits on the books to determine what is due and owing. St. James Church v. Super. Ct., 135 Cal.App.2d 352, 359 (1955). DLT contends that there is no fiduciary relationship between it and Oracle, and therefore, a claim for an accounting is improper. Mot. at 21. This contention lacks merit:
[A] fiduciary relationship between the parties is not required to state a cause of action for accounting. All that is required is that some relationship exists that requires an accounting. The right to an accounting can arise from the possession by the defendant of money or property which, because of the defendant's relationship with the plaintiff, the defendant is obliged to surrender.
Teselle v. McLoughlin, 173 Cal.App.4th 156, 179-180 (2009) (emphasis added). The right to an accounting is contingent upon the existence of a relationship, fiduciary or otherwise, that "calls for an accounting." Ford v. Lehman Bros. Bank, FSB, No. C 12-00842 CRB, 2012 WL 2343898, at *14 (N.D. Cal. June 20, 2012) (citing Teselle, 173 Cal.App.4th at 179). Here, the FAC fails to allege the precise nature of the relationship that purportedly gives rise to Oracle's alleged right to an accounting. Under Twombly, DLT is entitled to fair notice of the nature of said relationship. Therefore, the Court dismisses Oracle's eleventh claim for an accounting with leave to amend.

IV. CONCLUSION

        For the reasons set forth above,

        IT IS HEREBY ORDERED THAT:

        1. Defendant's Motion to Dismiss is GRANTED IN PART and DENIED IN PART. The motion is granted as to Oracle's claims for violation of the CFAA, inducing breach of contract, unjust enrichment and an accounting. The motion is denied as to Oracle's claims for fraudulent inducement and unfair competition. Oracle is granted leave to amend its claims under the CFAA, for inducing breach of contract and for an accounting. Oracle shall file its Second Amended Complaint within fourteen (14) day from the date this Order is filed.

        2. The parties shall appear for a telephonic Case Management Conference on January 17, 2013 at 3:00 p.m. Prior to the date scheduled for the conference, the parties shall meet and confer and prepare a joint Case Management Conference Statement which complies with the Standing Order for All Judges of the Northern District of California and the Standing Orders of this Court. Plaintiff shall assume responsibility for filing the joint statement no less than seven (7) days prior to the conference date. Plaintiff's counsel is to set up the conference call with all the parties on the line and call chambers at (510) 637-3559. NO PARTY SHALL CONTACT CHAMBERS DIRECTLY WITHOUT PRIOR AUTHORIZATION OF THE COURT.

        3. This Order terminates Docket 19.

        IT IS SO ORDERED.

--------
Notes:
        1. The Court notes that DLT's reply is thirteen pages in length, which exceeds the page limits set forth in the Court's Standing Orders. See Case Management Scheduling Order for Reassigned Cases, Dkt. 31. To expedite resolution of the motion, the Court will consider DLT's non-compliant brief. Further transgressions of the Court's procedural rules and/or Standing Orders may result in the imposition of sanctions.
        2. Subsection 1030(a)(6) likewise requires a showing of an "intent to defraud." 18 U.S.C. § 1030(a)(6). In contrast, subsection 1030(a)(2) does not require a showing of fraud or an intent to defraud.
        3. The parties' motion and opposition papers do not recite the elements of or any legal authority with respect to each claim at issue. The parties are reminded of their legal obligation to provide such authority, as it is not the Court's role to do their work for them. See Indep. Towers of Wash. v. Wash., 350 F.3d 925, 929 (9th Cir. 2003) ("Our adversarial system relies on the advocates to inform the discussion and raise the issues to the court.").
        4. An adhesion contract is one that is "imposed upon the subscribing party without an opportunity to negotiate the terms[.]" Such an agreement is valid and enforceable. See Marin Storage & Trucking, Inc. v. Benco Contracting and Eng'g, Inc., 89 Cal.App.4th 1042, 1052 (2001).
        5. Under California law, to maintain a fraud claim based on the same factual allegations as a breach of contract claim, a plaintiff must show that "the duty that gives rise to tort liability is either completely independent of the contract or arises from conduct which is both intentional and intended to harm." Robinson Helicopter Co., Inc. v. Dana Corp., 34 Cal.4th 989, 990 (2004) (quoting Erlich v. Menezes, 21 Cal.4th 543, 552 (1999)); see also Lazar v. Super. Ct., 12 Cal.4th 631, 645 (1996) ("It has long been the rule that where a contract is secured by fraudulent representations, the injured party may elect to affirm the contract and sue for the fraud.").

State
Case Type
Case Division