throbber
Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 1 of 22 PageID #: 1
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF MISSOURI
`EASTERN DIVISION
`
`
`
`SECURE DATA TECHNOLOGIES, INC.
`
`
`
`
`
`
`Plaintiff
`
`
`
`
`
`
`
`
`v.
`
`
`
`
`
`
`
`
`
`
`JAMIE STEPHANIE GUILFORD
`
`
`
`
`
`
`&
`
`
`
`
`
`
`
`
`
`GUILFORD TECHNOLOGIES, LLC
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Defendants
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`COMPLAINT
`
`The Parties
`
`CASE NO. 4:20-1228
`
`JURY DEMAND
`
`1.
`
`Plaintiff Secure Data Technologies, Inc. (referred to herein as “Secure Data” and
`
`“Plaintiff”) is an Illinois Corporation and citizen with its primary place of business located at
`
`1392 Frontage Road, O’Fallon, St. Clair County, Illinois.
`
`2.
`
`Defendant Jamie Stephanie Guilford (referred to herein as “Guilford”) is a
`
`resident and citizen of Missouri, 856 Autumn Grove Dr., O’Fallon, Missouri 63365.
`
`3.
`
`Defendant Guilford Technologies, LLC (“hereto refereed as Guilford
`
`Technologies”) is a Missouri Limited Liability Corporation, a citizen of the State of Missouri,
`
`formed in May, 2020, with its primary place of business located at 856 Autumn Grove Dr.,
`
`O’Fallon, Missouri 63365. Defendant Jamie Guilford is its CEO and registered agent.
`
`1
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 2 of 22 PageID #: 2
`
`Nature of the Action
`
`4.
`
`This civil action is for Breach of Contract (Count I), Tortious Interference
`
`with Plaintiff's Contracts and/or Business Expectancies (Count II), Unjust Enrichment
`
`(Count III), Misappropriation of Trade Secrets in Violation of the Illinois Uniform Trade
`
`Secrets Act, (“ITSA”) (765 ILCS 1065/1 et seq)). (Count IV), Violations of Stored Wire and
`
`Electronic Communications Act ("SECA"), 18 U.S.C. § 2701, et seq. (Count V), Violations
`
`of Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. (Count VI),
`
`Violation of the Missouri Statute Against Tampering with Computer Data and
`
`Equipment, R.S. Mo. § 537.525, and the Missouri Statute Against Tampering with
`
`Computer Equipment, R.S. Mo. § 569.097 (Count VII).
`
`Jurisdiction and Venue
`
`5.
`
`This Court has original diversity jurisdiction of the instant matter pursuant to 28
`
`U.S.C.§1332 for it is a civil action where the matter in controversy exceeds the sum or value of
`
`$75,000, exclusive of interest and costs, and is between citizens of different States. Plaintiff
`
`Secure Data is a citizen of Illinois. Defendants Guilford and Guilford Technologies are Missouri
`
`citizens. Additionally, This Court also has federal question jurisdiction over Counts VI and VII
`
`of this Complaint, which are claims under the Stored Wire and Electronic Communications Act
`
`(“SECA”), 18 U.S.C. § 2701 et seq. and the Computer Fraud & Abuse Act (“CFAA), 18 U.S.C.§ 1030
`
`ei seq, respectively. This Court has supplemental jurisdiction over the remaining Counts.
`
`6.
`
`Venue is appropriate in this Court inasmuch as the Plaintiff and Defendant
`
`Guilford resides or otherwise can be found within the District, the subject matter leading to the
`
`formation of his consulting business, a Missouri Limited Liability Company, was engaged in by
`
`Defendant Guilford within this District, the tampering with a computer occurred within this
`
`2
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 3 of 22 PageID #: 3
`
`district, and the causes of action against Defendant Guilford arise from multiple acts committed
`
`by Guilford in Missouri. This Court has personal jurisdiction over the Defendant who is a citizen
`
`of Missouri, residing in the Judicial District of the Eastern District of Missouri.
`
`Facts Common to all Counts
`
`7.
`
`Plaintiff Secure Data is an infrastructure technology company, which provides
`
`clients with hardware, software, managed services and professional services in four areas:
`
`Collaboration, Data Center, Network and Security.
`
`8.
`
`Defendant Jamie Stephanie Guilford (referred to herein as “Guilford”) was a
`
`salaried Senior Consulting System Engineer. Part of Guilford’s job was to interface with secure
`
`data’s client base, to work with wireless, security and Data center design, set up and integration.
`
`9.
`
`Defendant Guilford Technologies is a direct competitor of Secure Data, formed
`
`and maintained by Guilford to provide consultative, infrastructure technology services.
`
`10.
`
`Defendant Guilford work for Secure Data from the period of approximately July
`
`9, 2018 to February 23, 2020 (beginning under her previous name Stephen Guilford), and now is
`
`employed by Guilford Technologies.
`
`Guilford Illegally Hacked into Company Email
`
`11.
`
`During the period of Guilford’s employment with secure Data for which she was
`
`receiving salary, there were concerns raised within the company that Guilford improperly and
`
`without authorization hacked into the email accounts of Secure Data management.
`
`12.
`
`Secure Data confirmed that prior to her termination, Guilford improperly and
`
`illegally hacked into Secure Data’s communications system to review sensitive email
`
`exchanged among Secure Data’s management team.
`
`3
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 4 of 22 PageID #: 4
`
`13.
`
`On the evening of February 23, 2020, Jeff Young of Secure Data was alerted to a
`
`possible security breach of Secure Data’s email system. Upon reviewing audit logs, Young
`
`noticed that Guilford had provided herself unapproved access to the mailboxes of CEO Dana
`
`Steffey, CFO Derek Herbison and employee Simonne Meszaros
`
`14.
`
`After additional review, Young confirmed that Guilford also accessed Young’s
`
`own email mailbox without approval on February 21, 2020 and multiple other times the week of
`
`February 17, 2020.
`
`15.
`
`On the evening of February 23, 2020, Young of Secure Data was alerted to a
`
`possible security breach of Secure Data’s email system. Upon reviewing audit logs, Young
`
`noticed that Guilford had provided herself unapproved access to the mailboxes of CEO Dana
`
`Steffey, CFO Derek Herbison and employee Simonne Meszaros
`
`16.
`
`After additional review, Young confirmed that Guilford also accessed Young’s
`
`own email mailbox without approval on February 21, 2020 and multiple other times the week of
`
`February 17, 2020.
`
`17.
`
`Attached hereto as Exhibit 2 and incorporated herein is an admission by Guilford
`
`that she illegally hacked into Secure Data’s confidential emails.
`
`18.
`
`Guilford was terminated from Secure Data as a result of her improper conduct.
`
`The Non-Compete Agreement
`
`19.
`
`Attached hereto as Exhibit 1 is an Employee Non-Compete Agreement entered
`
`into by Guilford with Secure Data on June 22, 2018.
`
`20.
`
`Section 2 of said Non-Compete Agreement has the following terms in place
`
`concerning “Confidential Information”:
`
`4
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 5 of 22 PageID #: 5
`
`
`
`21.
`
`On March 2, 2020, Secure Data sent a letter via Certified Mail to Guilford, with a
`
`copy of the Non-Compete Agreement attached. The letter stated in part:
`
`
`
`
`Per paragraph 4, you are required to provide a copy of the Agreement to any
`prospective employer so that any such employer would not inadvertently cause the
`violation of the Agreement. I have provided a copy of the Agreement, so that you will
`be able to provide it to any current or prospective employer.
`
`As you can see, Paragraph 1 of the Agreement provides that for a period of one year
`following your departure from Secure Data, you will (a) not solicit or accept business
`from any entity that is a past, current or prospective customer of Secure Data; and (b)
`will not solicit or induce any person to leave the employ of Secure Data. Further,
`paragraph 2 provides that you will not divulge or use Secure Data’s confidential
`information.
`
`
`5
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 6 of 22 PageID #: 6
`
`Your departure date from Secure Data was February 23, 2020. In your time at Secure
`Data, you acted as an engineer and has had contact with all of Secure Data’s clients and
`had access to Secure Data’s customer lists. Per the Agreement, you are to turn over all
`documents related to his work with Secure Data, including all customer information.
`Please ensure that you have done so, and that you will not use your knowledge of
`Secure Data Customers derived from Secure Data’s proprietary information while you
`are either under the employ of any third party or acting as an independent contractor.
`
`
`
`
`Guilford’s Access to Confidential Information
`
`22.
`
`During her remaining days with Secure Data time period, Guilford had the
`
`advantage of reviewing, choosing and storing relevant information to take from Secure Data to
`
`use after she departed from Secure Data’s employ for the benefit of starting a competitive
`
`business.
`
`23.
`
`On information and belief, towards the end of her employment, Guilford gained
`
`access to the proprietary and confidential internet cloud based information, including Secure
`
`Data’s information.
`
`24.
`
`Said confidential and proprietary information was kept by Guilford for Guilford
`
`to use to subsequently offer competing services to Secure Data’s customers.
`
`Guilford’s Offer of Services to Secure Data’s Customer Tacony
`
`25.
`
`One of the customers to which Guilford is offering competing services is Tacony
`
`Corporation (“Tacony”).
`
`26.
`
`Tacony was a major client of Secure Data, for multiple years, starting in 2013. In
`
`2019, alone, Secure Data received $ 378,557 in revenue.
`
`27.
`
`Guilford was aware of the secure Data/Tacony relationship, and worked with
`
`Secure Data on Tacony projects.
`
`6
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 7 of 22 PageID #: 7
`
`28.
`
`Guilford maintained and used the Confidential Information related to the Tacony
`
`projects after parting from Secure Data, in order to have his newly formed company, Guilford
`
`Tachnologies contract with Tacony and offer a competing set of services, based on the original
`
`services provided by secure Data.
`
`29.
`
`During Secure Data’s daily review of their client Tacony’s Veeam infrastructure,
`
`which is covered under their managed services, Secure Data became aware that some
`
`information regarding Jamie Guilford, was added after Guilford’s departure from Secure Data.
`
`30. When Secure Data attempted to connect to their Veeam server via remote desktop
`
`it was observed that a user (main\jguilford) was connected to the machine (jguilford-rdp.jpg).
`
`31.
`
`Upon Secure Data’s review of the Tacony status of backups it was noticed that
`
`new job was created by “main\jguilford” on August 24, 2020 (jguilford-backupjob.png).
`
`32.
`
`Upon noticing this job creation Secure Data recalled a ticket (#51168 bundled
`
`with ticket #51018) being created in its system on August 26, 2020 for failed jobs. On this ticket
`
`Secure Data notified Tacony that Secure Data was looking into this. Tacony’s representative
`
`responded that the alert issued by Secure Data requested should be disregarded, and that Tacony
`
`would work out the issue without Secure Data’s involvement.
`
`33.
`
`Around the same period of time that the “main\jguilford” data was observed
`
`within the Tacony system, Secure Data became aware of a change in the relationship between
`
`secure Data and Tacony, which included a loss of expected revenue from the relationship.
`
`COUNT I- Breach of Contract- Guilford
`
`34.
`
`Plaintiff incorporates by reference Paragraphs 1 through 33 into this Count I of
`
`Plaintiff’s Complaint.
`
`
`
`
`
`
`7
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 8 of 22 PageID #: 8
`
`35.
`
`Guilford’s Non-Compete Agreement (Exhibit 1) is a valid and enforceable
`
`contract.
`
`36.
`
`The confidentiality covenants and other provisions contained in the Non-Compete
`
`Agreement are reasonably necessary to protect legitimate protectable interests in trade secrets,
`
`confidential information, customer relationships, work force and goodwill.
`
`37.
`
`Secure Data has fully performed all of its obligations under the Non-Compete
`
`Agreement.
`
`38.
`
`Guilford breached and threatens to continue to breach the Non-Compete
`
`Agreement in at least one of the following ways by: A. Using an appropriating Secure Data’s
`
`proprietary and secret data concerning its client Tacony, and other clients; B. by forming a
`
`competitor company to use said Confidential information; C. by soliciting clients of Secure Data
`
`(including Tacony); D. By entering into service agreements, and being employed by a company
`
`that enters into service agreements, with Secure Data’s clients (including Tacony) to provide
`
`services related to Secure Data’s proprietary information and services; E. By using Secure
`
`Data’s proprietary Information in competition against Secure Data concerning the service of on-
`
`going clients of Secure Data; F. by sharing Secure Data’s proprietary information with a
`
`competitor, Guilford Technologies, for it to compete directly against Secure Data.
`
`39.
`
`As a result of anyone of these breaches of the Non-Compete Agreement, Secure
`
`Data has been injured and faces additional injury.
`
`40.
`
`Secure Data lost and is threatened with losing customers, technology, its
`
`competitive advantage, its trade secrets and goodwill.
`
`
`
`
`
`
`8
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 9 of 22 PageID #: 9
`
`WHEREFORE, Plaintiff requests that this court issue an order in its favor and against
`
`Defendant Guilford as to Guilford’s’ breach of contract, to award damages concerning said
`
`breach, costs, attorneys’ fees and all other relief the Court finds appropriate.
`
`Additionally, Plaintiff requests that (a) Defendants be temporarily, preliminarily, and
`
`permanently enjoined and restrained as follows: (1) That Defendants will keep at all times
`
`confidential and shall not divulge, reveal or disclose any of Secure Data’s trade secrets,
`
`confidential or proprietary information including, but not limited to, discoveries, patentable and
`
`non- patentable ideas, concepts, software in various stages of development, design, drawings,
`
`formulae, specifications, techniques, technology, processes, procedures, “know how”, marketing
`
`techniques and materials, marketing and development plans, customer names and other
`
`information related to customers, price lists, pricing policies and financial information, as well
`
`as any information described above which Secure Data treats as proprietary or Confidential
`
`Information. (2) That Defendants shall return to Secure Data all originals and all copies of
`
`documents (electronic or otherwise) that are proprietary, confidential, and/or trade secret
`
`information, including trade secrets documents concerning Secure Data’s clients, that Defendants
`
`obtained, learned, created, or was made aware of during his employment with Secure Data.
`
`(3)That Defendants are prohibited from using, relying upon, or disclosing to Guilford
`
`Technologies or any affiliate or any other person or legal entity any Trade Secret Information or
`
`confidential information of Secure Data acquired by Guilford in the course of or arising out of
`
`their employment by Secure Data. (4) For an accounting of all monies and profits realized by
`
`Guilford as a result of the conduct alleged herein and for other damages that may be determined
`
`and fixed by this Court. (5) For an Order restraining Defendants from duplicating or copying any
`
`9
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 10 of 22 PageID #: 10
`
`of Secure Data’s electronic information. (6) For an Order requiring Defendants to immediately
`
`return all Secure Data information currently in their possession, whether in electronic or hard
`
`copy form.
`
`(b)
`
`For monetary damages in an amount equal to the loss sustained by Secure Data as
`
`a result of Defendants’ misappropriation and wrongful use or disclosure of Secure Data’s trade
`
`secrets, according to proof at trial, including lost profits to Secure Data;
`
`(c)
`
`Punitive damages and for attorney’s fees in an amount fair and reasonable under
`
`the circumstances and to deter Defendants and others from any continuation, repetition, related
`
`misconduct in violation of Secure Data’s rights and interests in Secure Data’s trade secrets or
`
`other electronic information to the extent Defendants engaged in any fraudulent or intentional
`
`misconduct; and
`
`(d) For further relief the Court deems just and reasonable.
`
`
`
`COUNT II- Tortious Interference with a Contract- Guilford and Guilford Technologies
`
`41.
`
`Plaintiff incorporates by reference Paragraphs 1 through 40 into this Count II of
`
`Plaintiff’s Complaint.
`
`42.
`
`Guilford and Guilford Technologies breached and threatens to continue to breach
`
`the contract in at least one of its client’s (Tacony’s) contracts and/or business expectancies.
`
`43.
`
`Guilford had knowledge of the agreement and services provided by Secure Data
`
`to Tacony based on the Confidential Information he acquired while employed with Secure Data.
`
`
`
`
`
`
`10
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 11 of 22 PageID #: 11
`
`44.
`
`Guilford and Guilford Technologies used the Confidential Information acquired
`
`with Secure Data to contract with Tacony to offer competitive services, directly in contravention
`
`with his Non-Compete Agreement.
`
`45.
`
`Guilford and Guilford Technologies intentionally and unjustifiably induced
`
`breach of the agreement and business expectations that Secure Data shared with Tacony; and
`
`Defendants used the Confidential Information received surreptitiously from Secure Data for
`
`competitive purposes against Secure Data, in direct violation of the agreement.
`
`46.
`
`As a result of the tortious interference with Secure Data’s contract and business
`
`expectancy with Tacony, Secure Data has been injured and faces additional injury.
`
`47.
`
`Secure Data lost and is additionally threatened with losing customer sales and
`
`services, its competitive advantage, its trade secrets and goodwill, as result of Guilford and
`
`Guilford Technologies’ conduct.
`
`48.
`
`Guilford’s conduct as to the misappropriation of Secure Data’s trade secrets in
`
`relation to inducing a secretive business agreement with Tacony is contrary to the terms of the
`
`agreement Guilford entered into with Secure Data. Said conduct has been willful and malicious,
`
`as Guilford’s conduct occurred, intentionally surreptitiously, after Guilford was fully cognizant
`
`that she was seeking business with Tacony based on ill-gotten competitive information.
`
`Therefore, Plaintiffs are entitled to an award of punitive damages.
`
`WHEREFORE, Plaintiff requests that this court issue an order in its favor and against
`
`Defendants Guilford and Guilford Technologies as to inducing a breach of contract and/or
`
`reduction in business expectancies, to award actual and punitive damages in excess of $ 75,000
`
`concerning said breach, costs, attorneys’ fees and all other relief the Court finds appropriate.
`
`11
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 12 of 22 PageID #: 12
`
`COUNT III -Unjust Enrichment
`
`49.
`
`Plaintiff incorporates by reference Paragraphs 1 through 48 into this Count III of
`
`Plaintiff’s Complaint.
`
`50.
`
`Defendants will be unjustly enriched by the misappropriation of Secure Data’s
`
`trade secrets and confidential information, and, unless restrained, will continue to threaten to use,
`
`actually use, divulge, and threaten to disclose, acquire and/or otherwise misappropriate Secure
`
`Data's trade secrets and confidential information.
`
`51.
`
`Defendant's misappropriation has been willful and malicious in light of Guilford’s
`
`execution of a contract prohibiting his current conduct and his deliberate violation of the
`
`contractual obligations, and secretive application and acceptance of a job offer to work for a
`
`competitor, and selection, download and use of Secure Data’s Confidential Information.
`
`Plaintiffs are entitled to an award of punitive damages.
`
`WHEREFORE, Plaintiff requests that this court issue an order in its favor and against
`
`Defendants Guilford and Guilford Technologies, to award actual and punitive damages in excess
`
`of $ 75,000 concerning said breach, costs, attorneys’ fees and all other relief the Court finds
`
`appropriate.
`
`COUNT IV- Violation of the Illinois Trade Secrets Act
`
`- Guilford & Guilford Technologies
`
`52.
`
`Plaintiff incorporates by reference Paragraphs 1 through 51 into this Count I of
`
`Plaintiff’s Complaint.
`
`53.
`
`Under Illinois law, an employer's trade secrets are a protectable interest.
`
`
`
`
`
`
`12
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 13 of 22 PageID #: 13
`
`54.
`
`Defendants misappropriated Secure Data’s trade secrets in violation of the Illinois
`
`Trade Secrets Act (“ITSA”) (765 ILCS 1065/1 et seq)).
`
`55.
`
` The ITSA, in relevant part, provides: `Trade secret' means information, including
`
`but not limited to, technical or non-technical data, a formula, pattern, compilation, program,
`
`device, method, technique, drawing, process, financial data, or list of actual or potential
`
`customers or suppliers that: (1) is sufficiently secret to derive economic value, actual or
`
`potential, from not being generally known to other persons who can obtain economic value from
`
`its disclosure or use; and (2) is the subject of efforts that are reasonable under the circumstances
`
`to maintain its secrecy or confidentiality." 765 ILCS 1065/2(d) (West 2002).
`
`56.
`
`Secure Data has expended considerable time, resources and expense to develop
`
`and market its products, to develop substantial relationships and goodwill with its customers,
`
`suppliers, prospective customers, and brokers, and to develop its goodwill and name.
`
`57.
`
`Secure Data considers certain confidential customer, production and business
`
`information to be trade secrets (hereinafter “Trade Secret Information”), This Trade Secret
`
`Information includes but is not limited to certain reports (which contain specific information
`
`regarding customers), customer lists, prospect lists, pricing information, customer preferences,
`
`costs and processes, proprietary vendors, profit margins, proprietary processes, and formulae.
`
`58.
`
`The Trade Secret Information is not generally known to the public nor readily
`
`ascertainable by proper means.
`
`59.
`
`The Trade Secret Information, including the confidential customer information
`
`contained in the reports was developed at considerable cost and expense over a period of years. It
`
`would require, at a minimum, a number of years, and considerable time and expense, to recreate
`
`13
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 14 of 22 PageID #: 14
`
`even a portion of this Trade Secret Information through lawful means. The possession and/or use
`
`of such information would give Secure Data’s competitors an unfair economic advantage in
`
`developing, marketing and selling their products.
`
`60.
`
`Secure Data used, and continues to use, reasonable and diligent efforts to maintain
`
`the secrecy and protect its Trade Secret Information. These efforts include but are not limited to
`
`prohibiting access to the information by the general public, adopting employment policies,
`
`including confidentiality, return of property, and electronic media policies, to protect the
`
`confidentiality of the Trade Secret Information. In addition, Secure Data maintains extensive
`
`security at its facility. Among the steps taken by Secure Data to protect its proprietary customer
`
`information was to enter into agreements with all of its sales force to keep such information
`
`confidential; to store the information on a limited access computer system, and only allow those
`
`who have acknowledged the secret and proprietary nature of the information to use it, and to
`
`intentionally not publish the information to the public.
`
`61.
`
`The Trade Secret Information derives independent economic value from not being
`
`generally known to, and not being readily ascertainable by proper means, by other persons who
`
`can obtain economic value from its disclosure or use. By reason of the above, the Trade Secret
`
`Information and/or portions thereof, constitute trade secrets within the meaning of the Illinois
`
`Uniform Trade Secrets Act.
`
`62.
`
`Guilford’s Non-Compete Agreement specifically provides “From and after the
`
`date of this agreement (without limitation as to time), Employee shall treat as the Company’s
`
`Confidential Information (‘Confidential Information) all data, customer lists, information…and
`
`14
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 15 of 22 PageID #: 15
`
`papers which the company has not made public under the direction of the company’s
`
`management.
`
`63.
`
`Among the Trade Secrets/ Confidential Information taken by Guilford to her new
`
`employer, Guilford Technologies, are, inter alia, materials specifically deemed confidential
`
`under the Non-Compete Agreement, including the identity of its customers (Tacony and others),
`
`the Company’s estimates and costing procedures and the cost and gross prices charged by Secure
`
`Data for its services, and sales and promotional policies.
`
`64.
`
`In the instant case, Guilford secretly retrieved and took trade secrets maintained
`
`by Secure Data before departing its employment. Prior to her departure, Guilford retrieved from
`
`Secure Data’s proprietary software system information concerning its customers (Tacony and
`
`others).
`
`65.
`
`Secure Data has an ascertainable right to the information taken—specifically that
`
`the customer lists, bids, service history (to Tacony and others) and sales quotations that
`
`Defendants misappropriated.
`
`66.
`
`The sales and other related data taken is sufficiently secret to derive economic
`
`value, actual or potential, from not being generally known to other persons who can obtain
`
`economic value from its disclosure or use.
`
`67.
`
`The sales and other related data taken is the subject of efforts that are reasonable
`
`under the circumstances to maintain its secrecy or confidentiality.
`
`68.
`
`The sales and other related data taken could not be easily acquired or duplicated
`
`by others.
`
`
`
`
`
`
`15
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 16 of 22 PageID #: 16
`
`69.
`
`On information and belief, in her new employment with Guilford Technologies,
`
`Guilford through the auspices of Guilford Technologies is calling on the clients and potential
`
`clients of Secure Data, and using the competitive information taken.
`
`70.
`
`Defendants’ willful misappropriation of Secure Data’s trade secrets was
`
`intentional and motivated by malice and in conscious disregard of Secure Data’s rights.
`
`71.
`
`Under the ITSA, the statute specifies, "[a]ctual or threatened misappropriation
`
`may be enjoined." 765 ILCS 1065/3 (West 2002).
`
`72.
`
`Also, under Illinois law, courts may also grant injunctive relief to prevent the
`
`inevitable use or disclosure of misappropriated trade secrets.
`
`73.
`
`Among other things, there is a real threat Guilford will use Secure Data’s
`
`information, which includes customer information, including customer service information,
`
`pricing and other customer information, to underbid Secure Data.
`
`74.
`
`Under the circumstances, there is a danger of irreparable harm and the absence of
`
`an adequate remedy at law as to future use of Secure Data’s data by Guilford and Guilford
`
`Technologies.
`
`75.
`
` In this case, plaintiff seeks a preliminary and permanent injunction to prevent
`
`further or inevitable disclosure or use of the trade secrets Guilford misappropriated.
`
`76.
`
`The data acquired by Guilford will inevitably be used by Defendants to further
`
`Guilford Technologies’ business interests, to the detriment of Secure Data.
`
`77.
`
`Under the circumstances described herein, there is irreparable harm and lack of an
`
`adequate remedy concerning the threat of conversion of Secure Data business, including the
`
`prospect that Defendants could strategically underbid Secure Data when competing for future
`
`16
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 17 of 22 PageID #: 17
`
`contracts. Secure Data is threatened with losing customers, technology, its competitive
`
`advantage, its trade secrets and goodwill in amounts which may be impossible to determine,
`
`unless Defendants are enjoined and restrained by order of this Court.
`
`78.
`
`The type of competitive losses alleged here often inflict irreparable injury and
`
`lack an adequate remedy at law, due to the difficulty in calculating the loss of existing and future
`
`business.
`
`WHEREFORE, Plaintiff requests that this court enter a preliminary and permanent
`
`injunction against Defendants prohibiting Defendants and their subsidiaries, officers, directors,
`
`agents, servants, employees, licensees, successors, and assigns, and those in active concert, from
`
`benefiting from the misappropriation of Plaintiffs’ trade secrets and against such continued
`
`misappropriation of Plaintiffs’ trade secrets, and enter preliminary and permanent injunction to
`
`prevent the Defendant from gaining competitive advantage through the unlawful
`
`misappropriation. Further, Plaintiff requests that this Court enter judgment against Defendants
`
`finding that they violated the Illinois Trade Secrets Act; order that Defendants be required to
`
`give an accounting of all gains for profit, and advantage derived through the use of the Secure
`
`Data’s trade secrets; that judgment be entered for Plaintiff and against Defendants for Plaintiff’s
`
`actual damages in an amount in excess of $ 75,000, for gains, profits, or advantages attributed to
`
`Defendants’ violation of the Illinois Trade Secrets Act, according to best available proof; award
`
`increased and exemplary damages for Defendants’ willful misappropriation of Plaintiffs’ trade
`
`secrets, which was intentional and motivated by malice and in conscious disregard of Plaintiffs’
`
`rights; and for all other relief just and available under the circumstances.
`
`COUNT V -VIOLATIONS OF STORED WIRE AND ELECTRONIC
`COMMUNICATIONS ACT (“SECA”1, 18 U.S.C. § 2701 et. seq.).
`
`17
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 18 of 22 PageID #: 18
`
`
`Secure Data incorporates by reference as if fully restated herein its allegations
`
`79.
`
`contained in Paragraphs 1-78 above.
`
`80.
`
`18 U.S.C. § 2701(a) of SECA provides that: “whoever (1) intentionally
`
`accesses without authorization a facility through which an electronic communication service
`
`is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby
`
`obtains, alters, or prevents authorized access to a wire or electronic communication while it is
`
`in electronic storage in such system shall be punished as provided in subsection (b) of this
`
`section.”
`
`81.
`
`18 U.S.C. § 2707 provides a civil cause for any violation of SECA. See 18
`
`U.S.C. § 2707(a) ("any provider of electronic communication service, subscriber, or other
`
`person aggrieved by any violation of this chapter [18 U.S.C. §§ 2701 et seq.] in which the
`
`conduct constituting the violation is engaged in with a knowing or intentional state of mind
`
`may, in a civil action, recover from the person or entity, ... which engaged in that violation
`
`such relief as may be appropriate").
`
`82.
`
`Guilford intentionally accessed without authorization or otherwise exceeded her
`
`authorization to access a facility through which an electronic communication service is provided
`
`and thereby gained unauthorized access to Secure Data’s protected Trade Secret Information.
`
`83.
`
`Guilford’s actions allowed her to obtain authorized access to electronic
`
`communications (specifically Secure Data’s Trade Secret Information) while the Information
`
`was in electronic storage.
`
`84.
`
`Guilford’s actions were in violation of SECA, 18 U.S.C. § 2701(a).
`
`18
`
`
`
`
`
`
`

`

`Case: 4:20-cv-01228 Doc. #: 1 Filed: 09/10/20 Page: 19 of 22 PageID #: 19
`
`85. WHEREFORE, Plaintiff, Secure Data prays for judgment in its favor and against
`
`Defendant Guilford as Count V of Plaintiff s Complaint as follows: (a) Enter a temporary,
`
`preliminary, and permanent injunction requiring Defendants to return all and not retain any
`
`copies of information they unlawfully obtained from Secure Data; (b) Award damages in an
`
`amount to be determined at trial; (c) Award attorneys’ fees and costs incurred by Secure Data in
`
`pursuit of this litigation; and (d) For further relief the Court d

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket