Sherman & Co. v. Salton Maxim Housewares, Inc.

Decision Date31 January 2000
Docket NumberNo. 99-CV-70548.,99-CV-70548.
Citation94 F.Supp.2d 817
PartiesSHERMAN & COMPANY, Plaintiff/Counter-Defendant, v. SALTON MAXIM HOUSEWARES, INC., Defendant/Counter-Plaintiff.
CourtU.S. District Court — Eastern District of Michigan

Irwin M. Alterman, Kemp, Klein, Troy, MI, for plaintiff.

Morley Witus, Barris, Sott, Detroit, MI, for defendant.

ORDER DENYING IN PART AND GRANTING IN PART DEFENDANT/COUNTER-PLAINTIFF'S MOTION TO AMEND COUNTERCLAIM

PEPE, United States Magistrate Judge.

Plaintiff/counter-defendant Sherman and Company ("Sherman")1 filed a complaint on February 9, 1999, under this Court's diversity jurisdiction, asserting several breaches of a sales representative contract and seeking damages for unpaid commissions. Defendant/counter-plaintiff Salton Maxim Housewares, Inc. ("Salton") filed its answer and affirmative defenses on April 15, 1999, and also filed a counterclaim seeking declaratory relief that the contract was cancelled. Sherman filed its affirmative defenses to the counterclaim on May 3, 1999, and amended its complaint, answer, and affirmative defenses on July 2, 1999. Salton subsequently filed an answer and affirmative defenses to the amended complaint on August 24, 1999.

On November 9, 1999, Salton moved to amend its counterclaim to include a federal claim under the Electronic Communications Privacy Act ("ECPA") and a Michigan state law claim of misappropriation of trade secrets. Sherman filed its response on December 27, 1999, and Salton replied on January 7, 2000. This matter was referred to the undersigned in December 1999 for hearing and determination under 28 U.S.C. § 636(b)(1)(A). The undersigned held a hearing on Salton's motion on January 21, 2000, and a supplement to the proposed amended counterclaim was thereafter submitted.2 Because Salton fails to state a claim upon which relief can be granted under the ECPA, its motion is granted solely to add a claim under Michigan law on misappropriation of trade secrets.

I. BACKGROUND

In January 1997, defendant/counter-plaintiff Salton won a multi-year contract to sell kitchen and small household appliances under the mark of "White Westinghouse" to Kmart. Plaintiff/counter-defendant Sherman entered into a contract with Salton in May 1997, whereby Sherman would act as a manufacturer's representative to Kmart. Sherman was also a product representative to Kmart for other companies than Salton including Windmere. Salton alleges that Sherman's performance was deficient and that Sherman "alienated and antagonized" several Kmart buyers and contacts. In June 1998 Sherman stopped working for Salton, allegedly at Kmart's request and Salton's insistence. Sherman continued to act as a manufacturing representative for Windmere for other electric products.

In its original counterclaim for relief, defendant/counter-plaintiff Salton asserted that Sherman materially breached its contract and sought a declaratory judgment "that the contract between Sherman and Salton is canceled and Salton is relieved of any obligations or liabilities under the contract." There was no demand for money damages or injunctive relief. Salton now seeks to add claims that Sherman (1) intentionally accessed unauthorized information in violation of the ECPA, 18 U.S.C. § 2701 et seq., and (2) misappropriated a trade secret in violation of M.C.L. § 445.1902(b)(ii)(A). In the proposed amended counterclaim it seeks declaratory relief and "actual, statutory, and punitive damages and reasonable attorney fees and other litigation costs, and any profits made by Sherman as a result of the violation."

Salton alleges that after James Sherman no longer worked for it, he used a computer access code that Kmart provided him when he worked for Salton to gain access to certain Salton sales data in the Kmart computer system and thereafter provided that information to Windmere. Salton claims that it had instructed Kmart to cut off Sherman's access to Salton's data, but apparently that denial of access was not done until later. Thus, Salton's data was available to James Sherman using the computer access code Kmart provided him. Salton alleges that even though "Sherman did have authorization to log on to the Kmart computer system to access information about various venders and their products that he was representing" and that "in fact Kmart continued to provide [James Sherman] access to Salton information in addition to information about his other vendors," that "Salton certainly did not authorize him to view this information, and he knew he was not so authorized." Supplemental Statement at 1-2. While James Sherman disputes this and believed he had access and authorization,3 for purposes of this motion, which is reviewed under a similar standard as a Fed.R.Civ.P. 12(b)(6) motion, Salton's allegations are accepted as true. Salton contends that this actual access that Sherman had and used was "unauthorized" under the ECPA.

Salton argues in its motion to amend that (1) there has been no undue delay, bad faith, or dilatory motive because it learned of the alleged unauthorized access and misappropriation shortly before the October 20, 1999, deposition and promptly filed its motion to amend on November 9, 1999, after verifying the information at the deposition; and (2) there would be no prejudice to Sherman because the discovery cut-off date has been extended to March 1, 2000.

Plaintiff/counter-defendant Sherman rejoins in its brief in opposition that amendment would be futile and unduly prejudicial. Sherman maintains that the Kmart network system allows access to information on all vendors and does not require a separate access code for each specific vendor. Sherman asserts that the counterclaim does not allege that Kmart revoked authorization before Sherman accessed the information and such access would not be a criminal violation of the anti-hacking statute, and therefore the amendment would be futile. The plaintiff/counter-defendant also argues that the data taken from the Kmart network about Salton was otherwise available to Windmere and had no independent economic value and thus does not constitute a "trade secret" under M.C.L. § 445.1902(d). In its reply brief, Salton responds to the various claims of futility and prejudice raised by Sherman.

II. ANALYSIS

Under Fed.R.Civ.P. 15(a), "[a] party may amend the party's pleading once as a matter of course at any time before a responsive pleading is served.... Otherwise a party may amend the party's pleading only by leave of court or by written consent of the adverse party; and leave shall be freely given when justice so requires." In Foman v. Davis, 371 U.S. 178, 182, 83 S.Ct. 227, 9 L.Ed.2d 222 (1962), the Supreme Court stated that:

[i]f the underlying facts or circumstances relied upon by a plaintiff may be a proper subject of relief, he ought to be afforded an opportunity to test his claim of the merits. In the absence of any apparent or declared reason — such as undue delay, bad faith or dilatory motive on the part of the movant, repeated failure to cure deficiencies by amendments previously allowed, undue prejudice to the opposing party by virtue of allowance of the amendment, futility of amendment, etc. — the leave sought should, as the rules require, be "freely given."

As the Supreme Court noted, however, leave to amend may be denied if the proposed amendment is futile. Id. A number of courts have subsequently held that an amendment need not be permitted if it is frivolous or would be subject to dismissal.4

A. Salton's ECPA Claim

The general purpose of the ECPA was to create a cause of action against "computer hackers (e.g., electronic trespassers)." State Wide Photocopy Corp. v. Tokai Financial Services, Inc., 909 F.Supp. 137, 145 (S.D.N.Y.1995). The provisions of section 2701 of the Act apply to persons or entities in general and prohibit intentional accessing of electronic data without authorization or in excess of authorization. Section 2702 prohibits disclosure of electronic data, but this prohibition is limited to persons or entities that (1) provide an electronic communication service to the public; or (2) provide remote computing service to the public. In this case there is no indication that Sherman falls under either of the two limited categories of covered persons or entities of section 2702. Thus, if Salton has a viable claim against Sherman under the ECPA, it will have to fall under section 2701 of that Act.5

Salton alleges in Count II of its proposed amended complaint that Sherman obtained Salton sales information and disclosed it to a competitor, Windmere. Yet, unlike section 2702, section 2701(a) of the ECPA does not prohibit the disclosure or use of information gained without authorization. Wesley College v. Pitts, 974 F.Supp. 375, 389 (D.Del.1997) (finding that the ECPA "does not censure the disclosure or use of the contents of those stored communications unless the disclosing party or using party is the provider of an electronic communication service" as defined in section 2702). Rather, section 2701(a) prohibits the intentional unauthorized access of an electronic communication service and the subsequent obtainment, alteration or prevention of authorized access to the service. Because the language of section 2701(a) specifically refers to "access" and not disclosure or use, "a person who does not provide an electronic communication service ... can disclose or use with impunity the contents of an electronic communication unlawfully obtained from electronic storage." Id. While at least one district court has found this gap troubling, it is the role of Congress to address this deficiency and not the courts. Id.

The ECPA's prohibition on intentional exceeding of authorized access anticipates that a person with authorization to a computer database or certain public portions of a database is not thereby authorized to visit "private" zones of data in the system. See Raphael Winick, Searches and Seizures of Computers...

To continue reading

Request your trial
33 cases
  • In re Doubleclick Inc. Privacy Litigation
    • United States
    • U.S. District Court — Southern District of New York
    • March 28, 2001
    ...prevent hackers from obtaining, altering or destroying certain stored electronic communications. See Sherman & Co. v. Salton Maxim Housewares, Inc., 94 F.Supp.2d 817, 820 (E.D.Mich.2000) ("the ECPA was primarily designed to provide a cause of action against computer hackers") (quoting State......
  • Yukos Capital S.A.R.L. v. Feldman
    • United States
    • U.S. Court of Appeals — Second Circuit
    • October 8, 2020
    ...improper uses of electronic communications that are obtained with valid authorization. See, e.g. , Sherman & Co. v. Salton Maxim Housewares, Inc. , 94 F. Supp. 2d 817, 821 (E.D. Mich. 2000) (no violation "for a person with authorized access to the database no matter how malicious or larceno......
  • Konop v. Hawaiian Airlines, Inc.
    • United States
    • U.S. Court of Appeals — Ninth Circuit
    • August 23, 2002
    ...F.Supp.2d 497 at 507 (S.D.N.Y. 2001) (finding that Title II of ECPA was aimed at computer hackers); Sherman & Co. v. Salton Maxim Housewares, Inc., 94 F.Supp.2d 817, 820 (E.D.Mich.2000) (explaining that the general purpose of the ECPA was to create a cause of action against computer hackers......
  • Intern. Ass'n of Machinists v. Werner-Masuda
    • United States
    • U.S. District Court — District of Maryland
    • September 16, 2005
    ...... was to create a cause of action against `computer hackers (e.g., electronic trespassers).'" Sherman & Co. v. Salton Maxim Housewares, Inc. 94 F.Supp.2d 817, 820 (E.D.Mich.2000) (quoting State Wide Photocopy Corp. v. Tokai Fin. Servs., Inc., 909 F.Supp. 137, 145 (S.D.N.Y.1995) (discussin......
  • Request a trial to view additional results
4 books & journal articles
  • § 8.03 Stored Communications Act (SCA)
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 8 The Electronic Communications Privacy Act (ECPA)
    • Invalid date
    ...or disclosure of information obtained from authorized access to a facility"). See also Sherman & Co. v. Salton Maxim Housewares, Inc., 94 F. Supp. 2d 817, 821 (E.D. Mich. 2000) (finding that a defendant does not violate the SCA as long as he has authorized access to information "no matter h......
  • The legal status of spyware.
    • United States
    • Federal Communications Law Journal Vol. 59 No. 1, December - December 2006
    • December 1, 2006
    ...facility. (223.) See 18 U.S.C. [section] 2510(17)(A) (2000). (224.) Id. (225.) See Sherman & Co. v. Salton Maxim Housewares, Inc., 94 F. Supp. 2d 817 (E.D. Mich. 2000). In Sherman the court found that the appliance manufacturer failed to state a claim against its former sales representa......
  • 4-6 ADDITIONAL CAUSES OF ACTION OFTEN ASSOCIATED WITH TRADE SECRET CLAIMS
    • United States
    • Full Court Press Texas Trade Secret Litigation Title Chapter 4 Planning and Initiating a Trade Secret Lawsuit
    • Invalid date
    ...third parties or other 'high-tech' criminals, rather than the rogue employee"); Sherman & Co. v. Salton Maxim Housewares, Inc., 94 F.Supp. 2d 817, 820 (E.D. Mich. 2000) ("Because section 2701 of the ECPA prohibits only unauthorized access and not the misappropriation or disclosure of inform......
  • The Code-based Interpretation of Authorization: an Incomplete Picture
    • United States
    • University of Whashington School of Law Journal of Law, Technology & Arts No. 10-3, March 2015
    • Invalid date
    ...56. Id. 57. Id. at 216. 58. Id. at 217. 59. Id. at 214-15. 60. Id. at 221 (citing Sherman and Co. v. Salton Maxim Housewares, Inc., 94 F. Supp. 2d 817 (E.D. Mich. 61. Id. at 221. 62. 766 F. Supp. 2d 919 (W.D. Ark. 2011). 63. A key-logger program is a program that, once installed, runs in th......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT