EarthCam, Inc. v. OxBlue Corporation , 703 F. App'x 803 ( 2017 )


Menu:
  •              Case: 15-11893    Date Filed: 07/27/2017   Page: 1 of 25
    [DO NOT PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________
    No. 15-11893
    ________________________
    D.C. Docket No. 1:11-cv-02278-WSD
    EARTHCAM, INC.,
    a Delaware corporation,
    Plaintiff - Counter
    Defendant - Appellant,
    versus
    OXBLUE CORPORATION,
    a Georgia corporation,
    CHANDLER MCCORMACK,
    Individually,
    JOHN PAULSON,
    Individually,
    BRYAN MATTERN,
    Individually,
    Defendants - Counter
    Claimant - Appellees,
    RICHARD P. HERMANN, II,
    Defendant - Appellee.
    Case: 15-11893       Date Filed: 07/27/2017      Page: 2 of 25
    ________________________
    Appeal from the United States District Court
    for the Northern District of Georgia
    ________________________
    (July 27, 2017)
    Before ED CARNES, Chief Judge, JORDAN, Circuit Judge, and SMITH, * District
    Judge.
    PER CURIAM:
    EarthCam, Inc., appeals the summary judgment entered in favor of OxBlue
    Corporation, Chandler McCormack, and Bryan Mattern (collectively known as the
    “OxBlue Defendants”), and Richard Hermann. EarthCam contends that the district
    court erred by (1) granting summary judgment on its trade secrets misappropriation
    claim against the OxBlue Defendants on grounds they allegedly never raised; (2)
    concluding that it had failed to assert a claim for injunctive relief; (3) granting
    summary judgment on its claim of unauthorized computer access despite a genuine
    issue over whether the OxBlue Defendants had accessed its computer system
    without or in excess of authorization; and (4) granting summary judgment on its
    trade secrets misappropriation claim against Mr. Hermann. EarthCam also appeals
    the district court’s denial of its motion to reopen forensic discovery, arguing that it
    *
    Honorable C. Lynwood Smith, Jr., United States District Judge for the Northern District
    of Alabama, sitting by designation.
    2
    Case: 15-11893   Date Filed: 07/27/2017   Page: 3 of 25
    should be allowed to ascertain whether certain forensic information was withheld
    and altered.
    Following a review of the record and the parties’ briefs, and with the benefit
    of oral argument, we affirm.
    I
    We exercise plenary review over a district court’s grant of summary
    judgment. See Moton v. Cowart, 
    631 F.3d 1337
    , 1341 (11th Cir. 2011). In doing
    so, we draw all inferences and review all of the evidence in the light most
    favorable to the non-moving party. 
    Id.
     The party moving for summary judgment
    bears the burden of demonstrating that there is no genuine dispute of any material
    fact and that it is entitled to judgment as a matter of law. 
    Id.
     If the evidence
    supporting the nonmoving party is merely colorable or not significantly probative,
    summary judgment may be granted. See Anderson v. Liberty Lobby, Inc., 
    477 U.S. 242
    , 249–50 (1986).
    We review the district court’s denial of a motion to reopen discovery for
    abuse of discretion. See Artistic Entm’t, Inc. v. City of Warner Robins, 
    331 F.3d 1196
    , 1202 (11th Cir. 2003).
    II
    EarthCam raises five issues in its initial brief. We address the specific
    arguments advanced by EarthCam and nothing more. See Access Now, Inc. v. Sw.
    3
    Case: 15-11893     Date Filed: 07/27/2017   Page: 4 of 25
    Airlines Co., 
    385 F.3d 1324
    , 1330 (11th Cir. 2004) (“[A] legal claim or argument
    that has not been briefed before the court is deemed abandoned and its merits will
    not be addressed.”). Because we write for the parties, we set out only what is
    necessary to explain our decision.
    A
    EarthCam argues that the district court erroneously granted summary
    judgment on its trade secrets misappropriation claim against the OxBlue
    Defendants under the Georgia Trade Secrets Act, O.C.G. § 10-1-760 et seq.
    Specifically, with respect to two instances of alleged misappropriation (the so-
    called “brute force attack” and the “OxBlue 3019” file), EarthCam contends that
    the district court’s order was based on arguments not raised by the OxBlue
    Defendants: (1) that the information obtained in the 2006 brute force attack lacked
    economic value; and (2) that the data in the OxBlue 3019 file was not a trade
    secret. The lack of notice, EarthCam contends, deprived it of an opportunity to
    respond, in violation of Federal Rule of Civil Procedure 56(f).
    The district court’s order and the motion filed by the OxBlue Defendants
    belie EarthCam’s cry of summary judgment by ambush. In the portion of the
    summary judgment motion attacking EarthCam’s trade secrets misappropriation
    claim, the OxBlue Defendants maintained that EarthCam had to prove “(a) the
    existence of a trade secret[ ] (b) that was misappropriated.” D.E. 228-1 at 7. After
    4
    Case: 15-11893    Date Filed: 07/27/2017   Page: 5 of 25
    defining a “trade secret” as information that derives economic value from not
    being generally known to others and that is the subject of reasonable efforts to
    keep secret, see id. at 8 (citing O.C.G. § 10-1-761(4)), the OxBlue Defendants
    generally argued that none of the information EarthCam identified—including
    information obtained in the 2006 brute force attack and the OxBlue 3019 data, see
    D.E. 228-20 ¶¶ 2, 5, 8—constituted “trade secrets” because the information was
    “public,” belonged to third parties, or was general customer or business
    information. See D.E. 228-1 at 7.
    If this general assertion were not enough, the OxBlue Defendants then
    lodged specific attacks against the 2006 brute force attack and the OxBlue 3019
    data. With respect to the brute force attack, the OxBlue Defendants maintained
    that any information they “scraped” from EarthCam’s website was regularly made
    public by EarthCam, often for marketing purposes.         See id. at 9–10.    And
    information intentionally publicized by EarthCam could not have derived its
    economic value from secrecy, as required by § 10-1-761(4). See id. The district
    court agreed with this argument, ruling against EarthCam in part because it “ha[d]
    not presented any evidence to support that the information gathered in [the brute
    force attack of] 2006 even potentially derived economic value from not being
    generally known.” D.E. 292 at 31. The district court, in other words, based its
    decision in part on an argument explicitly raised by the OxBlue Defendants.
    5
    Case: 15-11893     Date Filed: 07/27/2017   Page: 6 of 25
    The OxBlue Defendants similarly contested OxBlue 3019’s status as a trade
    secret, insisting throughout the motion that EarthCam had failed to identify what
    exactly in the OxBlue 3019 file constituted a trade secret. See D.E. 228-1 at 11–12
    (arguing that none of the information Mr. Hermann allegedly gave to OxBlue,
    including the OxBlue 3019 file, was a trade secret), 12 n.13 (“[EarthCam] has not
    specified what information contained [in OxBlue 3019] is a ‘trade secret.’”)
    (citing the OxBlue Defendants’ statement of undisputed material facts in support of
    their renewed motion for summary judgment, D.E. 228-2).
    In sum, we conclude that EarthCam was sufficiently on notice that it had to
    respond to the contention that the information obtained in the 2006 brute force
    attack and the OxBlue 3019 data were not trade secrets under the GTSA. Because
    we reject the only two grounds raised by EarthCam for reversing the summary
    judgment granted on its trade secrets claim against the OxBlue Defendants, see Br.
    of Appellant at 12–13, we affirm that portion of the district court’s order.
    B
    According to EarthCam, the OxBlue Defendants moved for summary
    judgment solely as to the damages portion of its GTSA claim, so EarthCam
    responded in part by arguing that it also sought an injunction prohibiting future use
    or disclosure of trade secrets. The district court allegedly refused to consider this
    argument on the ground that it was a “newly raised claim.” Br. of Appellant at 23
    6
    Case: 15-11893   Date Filed: 07/27/2017   Page: 7 of 25
    (quoting D.E. 292 at 35). EarthCam argues that the district court was incorrect
    because the request for injunctive relief had previously appeared in the second
    amended complaint. See D.E. 117.
    The OxBlue Defendants dispute EarthCam’s characterization of the district
    court’s decision. See Br. of Appellees at 27–30. But even assuming everything
    played out as EarthCam says it did, reversal is unwarranted because this issue is
    mooted by our affirmance of the district court’s grant of summary judgment on the
    merits of the GTSA claim against the OxBlue Defendants. By failing on the
    merits, EarthCam cannot obtain any relief whatsoever under the GTSA.
    C
    EarthCam contends that the OxBlue Defendants violated the Computer
    Fraud and Abuse Act, 
    18 U.S.C. § 1030
    , in May of 2011 when they accessed the
    account webpage of an EarthCam customer, Forest City Ratner.           The CFAA
    prohibits, among other things, “intentionally access[ing] a computer without
    authorization or [in excess of] authorized access, and . . . obtain[ing] . . .
    information.” § 1030(a)(2)(C). EarthCam says that OxBlue personnel captured
    and downloaded screenshots of the graphical user-interface running on FCR’s
    7
    Case: 15-11893     Date Filed: 07/27/2017    Page: 8 of 25
    account webpage. See D.E. 255-4 at 4 ¶ 12 (describing the screenshots allegedly
    captured by OxBlue personnel). 1
    It turns out (and it is undisputed), however, that a man by the name of Chip
    Foley, who was with FCR, had asked the OxBlue Defendants to troubleshoot
    certain issues FCR was having with EarthCam equipment and had provided
    OxBlue personnel his account login credentials to do so. See D.E. 255-1 at 47–51
    ¶¶ 11–23, at 66–67 ¶¶ 93–98. The district court found no CFAA violation given
    this evidence, reasoning that the OxBlue Defendants had accessed the account
    webpage with FCR’s authorization. The district court also concluded that nothing
    in the End-User License Agreement applicable to FCR’s account prohibited FCR
    from sharing its login credentials, and that the OxBlue Defendants did not
    knowingly violate the EULA’s terms because there was “no evidence that the
    OxBlue Defendants were familiar with the EULA, or that the OxBlue Defendants
    viewed the EULA when they accessed FCR’s EarthCam account [on May 20 and
    21, 2011].” D.E. 292 at 38.
    EarthCam does not dispute that the OxBlue Defendants accessed the account
    webpage under FCR’s authorization, and that the EULA did not prohibit FCR from
    sharing its login credentials. Even so, EarthCam claims summary judgment was
    incorrectly granted for two reasons.
    1
    This is the only alleged instance of unauthorized access at issue on appeal. See Br. of
    Appellant at 25–26 & n.27 (relying on the FCR access as the basis for the CFAA claim).
    8
    Case: 15-11893     Date Filed: 07/27/2017   Page: 9 of 25
    First, EarthCam argues that the access of the OxBlue Defendants was
    without authorization because, in order to log on to FCR’s account, they
    knowingly circumvented EarthCam’s security measures aimed at blocking OxBlue
    personnel from accessing its webpage. See Br. of Appellant at 27. There is
    evidence in the record that Mr. McCormack acknowledged that EarthCam was
    blocking OxBlue’s IP address and that OxBlue personnel got around this by
    masking their IP address. The OxBlue Defendants maintain, however, that this
    argument is a complete nonstarter because it was never raised below. See Br. of
    Appellees at 34 & n.21.         EarthCam, in response, urges us not to disregard
    OxBlue’s furtive evasion of its security measures, arguing that it properly
    preserved that argument by presenting the facts to the district court in its response
    to the OxBlue Defendants’ motion for summary judgment. See Reply Br. at 17–18
    & n.8.
    We agree with the OxBlue Defendants that EarthCam failed to preserve this
    argument. EarthCam briefly addressed the OxBlue Defendants’ CFAA arguments
    at summary judgment in Part III.B of its response. See D.E. 255 at 21–22. That
    portion of the response made only two arguments: (1) that the OxBlue Defendants’
    access was unauthorized, even though it was under the auspices of FCR’s
    authority, because it violated the EULA; and (2) that there was sufficient evidence
    in the record demonstrating that OxBlue personnel had previously viewed and
    9
    Case: 15-11893    Date Filed: 07/27/2017   Page: 10 of 25
    accepted the EULA. See id. The IP-masking argument, as a basis for CFAA
    liability, is nowhere to be found. Because EarthCam failed to press that below, we
    will not consider it now. See Resolution Trust Corp. v. Dunmar Corp., 
    43 F.3d 587
    , 599 (11th Cir. 1995).
    Second, EarthCam contends that there is a genuine dispute over whether the
    OxBlue Defendants were “‘presumably familiar with the terms’ of the EULA”
    applicable to FCR’s account, Br. of Appellant at 30 (quoting State Analysis, Inc. v.
    Am. Fin. Servs. Assoc., 
    621 F. Supp. 2d 309
    , 316 (E.D. Va. 2009)), such that they
    can be said to have knowingly violated the EULA’s prohibition against
    “downloading screenshots of EarthCam’s software.” 
    Id.
     At the end of the day, we
    are not persuaded.
    EarthCam relies on State Analysis for the proposition that knowingly
    violating the terms of a licensing agreement renders access unauthorized. See Br.
    of Appellant at 30. But that case is not exactly on point. The licensing agreement
    in State Analysis prohibited licensees from sharing their login credentials. See
    State Analysis, 
    621 F. Supp. 2d at 316
     (“[The plaintiff-licensor] has pled that under
    the terms of their contract, only clients were authorized to use [its] subscription
    services . . . .”). And the defendant unquestionably knew this because it had once
    been a client of the licensor’s and subject to the same licensing agreement. See 
    id.
    10
    Case: 15-11893    Date Filed: 07/27/2017   Page: 11 of 25
    The district court concluded that, because the defendant knew of this prohibition, it
    could not “hide” behind any authorization derived from the licensee. See 
    id.
    FCR, on the other hand, was not prohibited from sharing its login
    credentials. In fact, FCR could have made its account webpage public if it wished.
    See D.E. 255-1 at 46 ¶ 5 (citing D.E. 255-4 at 8 ¶ 28). So, in contrast to State
    Analysis, where the third-party access was unauthorized from inception by the
    licensing agreement, this case presents the much more difficult question of whether
    a person who otherwise has authorized access to a computer (as the OxBlue
    Defendants undoubtedly had when FCR gave them permission to access its
    account) exceeds authorization if he or she uses that access in a way that
    contravenes any policy or term of use governing the computer in question (here,
    the EULA’s prohibition against downloading screenshots, see Br. of Appellant at
    30).
    The CFAA does not define the phrase “without authorization,” but it defines
    “exceeds authorized access” as “to access a computer with authorization and to use
    such access to obtain or alter information in the computer that the accesser is not
    entitled so to obtain or alter.” 
    18 U.S.C. § 1030
    (e)(6). We have, in one published
    opinion, expounded on what it means to “exceed authorized access.” See United
    States v. Rodriguez, 
    628 F.3d 1258
     (11th Cir. 2010). In Rodriguez, the defendant
    had access, through his work as a TeleService representative for the Social
    11
    Case: 15-11893       Date Filed: 07/27/2017      Page: 12 of 25
    Security Administration, to certain SSA databases containing sensitive personal
    information. SSA policy authorized the defendant’s access to the databases only
    for official business purposes. The defendant knew this, but chose to access the
    database and obtain information for nonbusiness reasons. See 
    id. at 1263
    . We
    concluded that the defendant’s access, which had been in furtherance of
    nonbusiness purposes, exceeded the authorization the SSA had given him, and
    affirmed his conviction under the CFAA. See 
    id.
     at 1263–64.
    Although it is not entirely clear, one of the lessons from Rodriguez may be
    that a person exceeds authorized access if he or she uses the access in a way that
    contravenes any policy or term of use governing the computer in question. So,
    assuming that the OxBlue Defendants actually violated the EULA, there is an
    argument that downloading the screenshots “exceeded authorized access” under
    Rodriguez.2
    Even if this is a valid reading of Rodriguez, there is insufficient evidence
    that the OxBlue Defendants knowingly violated the EULA, which is (and has been)
    EarthCam’s theory of CFAA liability and, therefore, the only argument we are
    2
    We decided Rodriguez in 2010 without the benefit of a national discourse on the CFAA. Since
    then, several of our sister circuits have roundly criticized decisions like Rodriguez because, in
    their view, simply defining “authorized access” according to the terms of use of a software or
    program risks criminalizing everyday behavior. See United States v. Valle, 
    807 F.3d 508
    , 527
    (2d Cir. 2015); WEC Carolina Energy Sols. LLC v. Miller, 
    687 F.3d 199
    , 206 (4th Cir. 2012);
    United States v. Nosal, 
    676 F.3d 854
    , 862–63 (9th Cir. 2012) (en banc). Neither the text, nor the
    purpose, nor the legislative history of the CFAA, those courts maintain, requires such a
    draconian outcome. We are, of course, bound by Rodriguez, but note its lack of acceptance.
    12
    Case: 15-11893   Date Filed: 07/27/2017    Page: 13 of 25
    obligated to address on appeal. See Access Now, 
    385 F.3d at 1330
    . Under that
    theory, we think that EarthCam’s contention that the OxBlue Defendants
    “presumably” knew the terms of the EULA governing FCR’s license is too much
    of an inferential leap to withstand summary judgment.
    Everyone agrees that OxBlue personnel did not encounter and accept the
    EULA when they troubleshot FCR’s issues on May 20 and 21, 2011. See Reply
    Br. at 18. But EarthCam says that OxBlue personnel had done so before, as
    evidenced by log files showing that users with OxBlue IP addresses had “viewed
    and accepted the EULA restrictions ‘numerous’ times between May 2010 and May
    2011.” Br. of Appellant at 28 (quoting D.E. 255-4 at 5–6 ¶¶ 17–18). And so, the
    argument goes, since OxBlue personnel had accepted the EULA in the past while
    accessing other users’ accounts, they must have known that the EULA applied to
    FCR’s account on May 20 and 21, 2011. See Reply Br. at 18 (conceding that the
    relevant “intrusion” occurred on May 20 and 21, 2011, and that there is no direct
    evidence that OxBlue personnel accepted the EULA on those dates). See also D.E.
    255-1 at 49 ¶ 19 (describing EarthCam’s access onto FCR’s account as the “May
    2011 intrusion”).
    Bill Sharp, EarthCam’s vice president of technology, explained how the
    EULA worked. He testified that all users with an EarthCam account must accept
    the EULA the very first time they log on to their accounts. See D.E. 255-19 at
    13
    Case: 15-11893    Date Filed: 07/27/2017   Page: 14 of 25
    147–48. EarthCam’s system automatically prompts them. See 
    id.
     After accepting
    it once, the system does not prompt users again unless there is a change in terms.
    See 
    id.
     But there is no evidence that the OxBlue Defendants knew any of this. The
    log files, even in the light most favorable to EarthCam, only indicate that users
    with OxBlue’s IP address had accepted the EULA in the past. See D.E. 255-1 at
    48 ¶ 16. It is unclear whether the version those users accepted is the same version
    that applied to FCR’s account on May 20 and 21, 2011. But even if it was the
    same version, nothing in the record indicates that the OxBlue Defendants knew
    that the EULA governing FCR’s account was the same one they had previously
    accepted. It would not be odd, for instance, if the terms of the EULA varied by
    customer, depending on the customer’s needs and bargaining power.
    Unlike the surefire evidence establishing knowledge in State Analysis,
    EarthCam’s assertion that the OxBlue Defendants had knowledge of the EULA’s
    terms hinges on layers of inference. From the simple fact that users with an
    OxBlue IP address had previously accepted the EULA, EarthCam wants us to
    allow a jury to find that the OxBlue Defendants knew the specifics of the EULA
    governing FCR’s account. In between those two points, however, are a string of
    inferences about EarthCam’s knowledge, including knowing that every EarthCam
    customer was subject to an EULA, that all customers were all subject to the same
    EULA, and that there had not been a new version between logins. We believe this
    14
    Case: 15-11893   Date Filed: 07/27/2017   Page: 15 of 25
    too attenuated to create a jury question on knowledge. See Salter v. Westra, 
    904 F.2d 1517
    , 1525 (11th Cir. 1990) (“When inferences are built upon inferences, the
    probability of the last or ultimate inference is attenuated by each underlying
    inference.”).
    Accordingly, we affirm the district court’s grant of summary judgment on
    EarthCam’s CFAA claim.
    D
    EarthCam next argues that the district court erroneously granted summary
    judgment on its GTSA claim against Mr. Hermann. The district court made two
    rulings as to this particular claim. First, the district court found that EarthCam and
    Mr. Hermann had executed a general release on August 13, 2008, that now
    precluded EarthCam from relying on any pre-release conduct to substantiate its
    GTSA claim.        Second, the district court analyzed the email correspondence
    between Mr. Hermann and the OxBlue Defendants after August 13, 2008, and
    concluded that none of the information exchanged constituted a trade secret.
    EarthCam does not challenge the district court’s interpretation of the general
    release. See Br. of Appellant at 31. Instead, EarthCam only appeals the district
    15
    Case: 15-11893       Date Filed: 07/27/2017      Page: 16 of 25
    court’s conclusion that none of the information Mr. Hermann allegedly provided to
    OxBlue in emails after August 13, 2008, constituted a trade secret. 3
    Under the GTSA, a plaintiff must prove that “(1) it had a trade secret and (2)
    the opposing party misappropriated the trade secret.”              Camp Creek Hosp. Inns,
    Inc. v. Sheraton Franchise Corp., 
    139 F.3d 1396
    , 1410 (11th Cir. 1998). The
    GTSA defines trade secret as information that derives economic value from not
    being well known to others and is the subject of reasonable efforts to maintain its
    secrecy. See O.C.G. § 10-1-761(4). “Whether a particular type of information
    constitutes a trade secret is a question of fact.” Camp Creek, 
    139 F.3d at
    1410–11.
    See also Outside Carpets, Inc. v. Indus. Rug Co., 
    228 Ga. 263
    , 267 (1971). That
    being said, we have “consistently held that conclusory allegations without specific
    3
    In addition to the various emails exchanged after August 13, 2008, EarthCam also argues that
    Mr. Hermann gave the OxBlue Defendants trade secrets in a file called OxBlue 3019. The
    parties dispute exactly when the OxBlue Defendants obtained the 3019 file. EarthCam says it
    was in June of 2009, while the OxBlue Defendants contend that it was in July of 2008. See Br.
    of Appellant at 6; Br. of Mr. Hermann at 9. The date of the transfer is important because it
    determines whether the general release applies, such that EarthCam may rely on the 3019 file to
    substantiate its GTSA claim against Mr. Hermann.
    EarthCam’s theory on the date of the transfer stems from an email sent on June 19, 2009, in
    which Mr. Hermann asked Mr. McCormack for an FTP site to upload several files. FTP sites,
    according to EarthCam, are used to transfer large amounts of data. The 3019 file being a very
    large file, EarthCam argues that the “logical[ ] infer[ence]” is that Mr. Hermann transferred the
    3019 file using the FTP site, in 2009. See Br. of Appellant at 6.
    Yet again, EarthCam overreaches. On its face, the email does not reference the 3019 data. The
    capabilities of an FTP site tell us nothing about what the medium was actually used for. Making
    conclusions about the 3019 data, without more, is nothing more than sheer speculation. Mr.
    McCormack, in contrast, affirmatively testified that he acquired the 3019 file in 2008. See D.E.
    256-33 at 373. In short, we agree with the district court that the June 19 email is not enough to
    create a jury question on whether the 3019 data was transferred in 2009.
    16
    Case: 15-11893    Date Filed: 07/27/2017   Page: 17 of 25
    supporting facts have no probative value for a party resisting summary judgment.”
    Bazemore v. Jefferson Capital Sys., LLC, 
    827 F.3d 1325
    , 1333 (11th Cir. 2016)
    (internal quotation marks omitted).
    The district court granted summary judgment after concluding that the
    emails only contained general information that Mr. Hermann had learned during
    his tenure with EarthCam. Information stored in an employee’s mind, the district
    court explained, was not protected by the GTSA. See Manuel v. Convergys Corp.,
    
    430 F.3d 1132
    , 1140 (11th Cir. 2005) (collecting Georgia cases holding that the
    GTSA does not prohibit a former employee from exploiting the knowledge he or
    she accumulated during the prior employment). EarthCam, citing several emails as
    evidence, argues that the district court incorrectly characterized the exchanges as
    information “in [Mr. Hermann’s] head.” Br. of Appellant at 32.
    The debate over whether the information was truly in Mr. Hermann’s head is
    a sideshow because, as the district court recognized, even if we agree that Mr.
    Hermann was not merely recalling general information from memory, EarthCam
    did not provide sufficient evidence demonstrating that the email correspondence
    after August 13, 2008, contained trade secrets. See D.E. 292 at 53 (describing the
    17
    Case: 15-11893       Date Filed: 07/27/2017     Page: 18 of 25
    email correspondence from 2009–2010 as suffering from the same flaw as the
    other evidence presented by EarthCam). 4
    Almost exclusively, EarthCam relies on an affidavit by Mr. Sharp to
    establish that the emails contained trade secrets. See D.E. 256-3. See also D.E.
    256-1. His affidavit is littered with conclusory allegations, all following the same
    script. First, Mr. Sharp vaguely alleges that Mr. Hermann gave away some kind of
    information, such as EarthCam’s “revenue sources and income model.” D.E. 256-
    3 at 17 ¶ 54. Then, he labels the information a “proprietary trade secret.” 
    Id.
     at
    16–18 ¶¶ 53–55, 58–62. And finally, instead of fleshing out what he means, Mr.
    Sharp flatly declares that the particular piece of information “was not publicly
    available and gave EarthCam a competitive advantage.” 
    Id.
     at 16–19 ¶¶ 53–62.
    This sort of conclusory labeling and bare recitation of a statutory definition is
    precisely the kind of evidence that we have held cannot withstand summary
    judgment. See Bazemore, 827 F.3d at 1333.
    As an example of the circular nature of EarthCam’s evidence, take an email
    sent by Mr. Hermann referencing EarthCam’s use of timers in its solar system. See
    D.E. 230-21. The parties dispute whether this information is a trade secret. At
    summary judgment, Mr. Hermann argued that the information is not a trade secret
    4
    For purposes of our review of EarthCam’s GTSA claim against Mr. Hermann, these post-
    release emails are the only evidence EarthCam has left to substantiate its claim and survive
    summary judgment. Recall that EarthCam has abandoned a GTSA claim against Mr. Hermann
    based on pre-release misappropriation, and that we have agreed with the district court that no
    reasonable juror could find that the OxBlue 3019 file was transferred after the release.
    18
    Case: 15-11893    Date Filed: 07/27/2017   Page: 19 of 25
    because any purchaser of an EarthCam camera would know about the timer. To
    support his contention, Mr. Hermann cited the deposition of Mr. McCormack, in
    which he explained that the use of timers in these systems is “standard” and that
    OxBlue itself had an integrated timer for purposes of making its systems more
    efficient. See D.E. 230-1 at 4 ¶ 28 (citing D.E. 230-7 at 12). Mr. McCormack
    further explained that the timers themselves are made by a company called Dial,
    and that the integrated timer is provided by SunWize. See D.E. 230-7 at 13. If
    these factual allegations are true, then the information disclosed by Mr. Hermann is
    not protected because information available in the public domain, such as
    information sold to customers or known throughout the industry, does not
    constitute a trade secret. See Roboserve, Ltd. v. Tom’s Foods, Inc., 
    940 F.2d 1441
    ,
    1454 (11th Cir. 1991) (explaining that placing information in the public domain
    destroys any reasonable expectation of privacy and is not protected by Georgia
    law). Without a genuine dispute as to these facts, then, Mr. Hermann would be
    entitled to summary judgment on EarthCam’s GTSA claim.
    EarthCam responded by alleging, in relevant part, that Mr. Hermann
    “provide[d] OxBlue information that EarthCam considered confidential.” D.E.
    256-1 at 10. And it supported this allegation with a citation to its own statement of
    material facts that reads:
    On October 12, 2009, Hermann provided information EarthCam
    considered confidential on EarthCam’s solar timer system and the
    19
    Case: 15-11893     Date Filed: 07/27/2017    Page: 20 of 25
    way in which EarthCam received better run times and performance
    from their systems.
    
    Id.
     at 33 ¶ 88.     But allegations in a party’s statement of material facts are
    themselves not evidence. See Fed. R. Civ. P. 56(c)(1)(A). Such statements require
    a foundation in the record. See 
    id.
     The only record support cited by EarthCam was
    to the very same email at issue. See D.E. 256-1 at 33 ¶ 88 (citing Exhibit 45, D.E.
    256-50); D.E. 256-50. That email tells us what Mr. Hermann communicated to
    Mr. McCormack, but it does not explain why the information is a trade secret, nor
    does it refute Mr. McCormack’s testimony (cited by Mr. Hermann) that the timers
    were industry standard, that OxBlue’s systems already used integrated timers, and
    that the timers were manufactured and provided by third-party vendors.
    EarthCam’s other allegations about the timer similarly fail to create a
    genuine dispute. Immediately after it asserted (with no evidentiary support) that
    the timer was “confidential,” EarthCam repeated its usual incantation that the
    information on the timer “was not publicly available and gave EarthCam a
    competitive advantage.” D.E. 256-1 at 33 ¶ 89. And, in support, it cites none
    other than Mr. Sharp’s own verbatim recitation of this conclusory statement. See
    
    id.
     (citing Exhibit 3, D.E. 256-3, ¶ 61); D.E. 256-3 at 19 ¶ 61.
    This exercise in tautology is not limited to the disclosure of the timer.
    Nearly every assertion on the information disclosed in the post-release emails
    eventually makes its way back to Mr. Sharp’s affidavit. See, e.g., D.E. 256-1 at
    20
    Case: 15-11893    Date Filed: 07/27/2017    Page: 21 of 25
    29–33 ¶¶ 61, 63, 67, 69, 71, 77, 79, 81, 83, 85, 89, 91. Declaring that something
    is confidential and a trade secret is not the same thing as providing evidence that
    the information (a) “is not commonly known by or available to the public,” (b)
    “[d]erives economic value . . . from not being generally known,” and (c) “[i]s the
    subject of efforts that are reasonable under the circumstances to maintain its
    secrecy.” See O.C.G. § 10-1-761. And so, we agree with the district court that
    EarthCam has failed to provide sufficient evidence from which a reasonable juror
    could conclude that Mr. Hermann disclosed, in the email correspondence after
    August 13, 2008, EarthCam’s trade secrets.
    E
    EarthCam appeals the denial of its motion to reopen discovery. According
    to EarthCam, it was entitled to reopen discovery because John deCraen, the
    OxBlue Defendants’ computer forensic expert, violated the forensic investigation
    protocol the parties had agreed upon in several ways: first, by failing to turn over
    all of the 3019 data he encountered during his forensic analysis; second, for the
    3019 data he did produce, by providing an incomplete image of the device that
    contained the data, which made it impossible for EarthCam’s expert to determine
    what exactly was done with the data; and third, by not following and applying
    industry standard practices in his analysis. We conclude that the district court did
    not abuse its discretion in denying EarthCam’s motion.
    21
    Case: 15-11893   Date Filed: 07/27/2017   Page: 22 of 25
    When a party fails to complete discovery in time, it may move to reopen
    discovery and the court may, “for good cause,” grant the motion if the party shows
    that it failed “because of excusable neglect.” Fed. R. Civ. P. 6(b)(1)(2). The
    Supreme Court has generally instructed courts to consider four factors in
    determining whether a party has shown excusable neglect: (1) the danger of
    prejudice to the nonmovant; (2) the length of the delay and its potential impact on
    judicial proceedings; (3) the reason for the delay, including whether it was within
    the reasonable control of the movant; and (4) whether the movant acted in good
    faith. See Pioneer Inv. Servs. Co. v. Brunswick Assocs. Ltd. P'ship, 
    507 U.S. 380
    ,
    395 (1993).
    EarthCam bears significant responsibility for failing to complete forensic
    discovery within the original period prescribed by the district court. EarthCam
    filed this lawsuit on July 12, 2011, and discovery did not end until August 30,
    2013, after several extensions by the district court. See, e.g., D.E. 27; D.E. 189;
    D.E. 202. Forensic discovery was pursuant to an investigation protocol that the
    parties, together with a court-appointed computer forensic mediator, had negotiated
    and agreed upon.     See D.E. 249-8.      The OxBlue Defendants produced the
    information required by the protocol in May of 2013, but EarthCam did not move
    to reopen discovery until October 1, 2013.
    22
    Case: 15-11893    Date Filed: 07/27/2017   Page: 23 of 25
    Part of EarthCam’s justification for the delay was that it did not know of
    several alleged shortcomings in the OxBlue Defendants’ forensic production until
    it deposed Mr. deCraen. See D.E. 292 at 71. It is not entirely clear why EarthCam
    could not figure out the alleged shortcomings sooner, especially since it had
    already retained its own computer forensic expert, Jim Persinger. Mr. Persinger, at
    least as contemplated by the investigation protocol, played a significant role in
    reviewing Mr. deCraen’s production.       More importantly, as the district court
    pointed out, EarthCam chose to depose Mr. deCraen on the last day of discovery.
    See 
    id.
     So even if a deposition was necessary, it was EarthCam’s fault for not
    deposing him sooner.
    Additionally, at the time of the motion, the OxBlue Defendants had already
    filed two fully-briefed motions for summary judgment. The district court had
    previously denied, without prejudice, the OxBlue Defendants’ motion for summary
    judgment after it granted EarthCam’s motion to expand discovery and designate
    Mr. Persinger (whom the district court allowed EarthCam to designate after the
    initial discovery period, see D.E. 189 at 10, 12–14) as its computer forensic expert
    witness. See D.E. 202 at 2 n.1. Like their first motion, the OxBlue Defendants’
    second motion would most likely have been rendered moot by additional
    discovery. In light of EarthCam’s unjustified delay, it would have been prejudicial
    23
    Case: 15-11893   Date Filed: 07/27/2017   Page: 24 of 25
    to require the OxBlue Defendants to brief and file a third motion for summary
    judgment.
    We also doubt EarthCam’s contention that Mr. deCraen’s performance was
    substandard. Mr. deCraen’s forensic production was pursuant to a protocol that he
    crafted along with Mr. Persinger and a neutral court expert.        Mr. deCraen’s
    techniques, and any problems EarthCam may have had with them, could and
    should have been addressed upfront. Yet EarthCam never challenged, by way of a
    Daubert motion, Mr. deCraen’s capabilities as an expert at any time before the
    district court. It cannot do so now in stoppage time.
    Finally, try as it may to paint its request for additional discovery as a
    necessary byproduct of austere discovery orders, we are not convinced by
    EarthCam’s arguments. Because the impact on judicial proceedings of extending
    discovery varies from case to case, district courts have considerable leeway in
    handling discovery matters. The district court in this case struck a careful balance
    between unwieldy discovery costs and the search for truth. It allowed considerable
    and lengthy forensic discovery of several computer devices that EarthCam
    believed to be involved in the alleged computer attacks. And it did so with the aid
    of both neutral and partisan experts (four computer forensic experts have worked
    on this case at one point or another), several of whom filed expert reports in this
    case.
    24
    Case: 15-11893     Date Filed: 07/27/2017   Page: 25 of 25
    On this record, and given the protracted nature of this litigation and the
    district court’s thorough order, we do not find an abuse of discretion. See Macklin
    v. Singletary, 
    24 F.3d 1307
    , 1311 (11th Cir. 1994) (explaining that the abuse of
    discretion standard allows a “range of choice” for the district court as long as there
    is no “clear error of judgment”) (citation and internal quotation marks omitted).
    III
    For these reasons, we affirm the district court’s grant of summary judgment.
    AFFIRMED.
    25