Scherer Design Group, LLC v. Ahead Engineering LLC ( 2019 )


Menu:
  •                                                                   NOT PRECEDENTIAL
    UNITED STATES COURT OF APPEALS
    FOR THE THIRD CIRCUIT
    ______________
    No. 18-2835
    ______________
    SCHERER DESIGN GROUP, LLC
    v.
    AHEAD ENGINEERING LLC; FAR FIELD TELECOM LLC; KYLE MCGINLEY;
    DANIEL HERNANDEZ; RYAN WALDRON; CHAD SCHWARTZ
    Appellants
    ______________
    Appeal from the United States District Court
    for the District of New Jersey
    (D.C. No. 3-18-cv-03540)
    District Judge: Hon. Anne E. Thompson
    _____________
    Argued January 7, 2019
    ______________
    Before: AMBRO, SHWARTZ, and FUENTES, Circuit Judges.
    (Filed: February 25, 2019)
    ______________
    OPINION
    ______________
    Ronald D. Coleman, Esq. [ARGUED]
    Brian Block, Esq.
    Mandelbaum Salsburg
    3 Becker Farm Road
    
    This disposition is not an opinion of the full Court and, pursuant to I.O.P. 5.7,
    does not constitute binding precedent.
    Suite 105
    Roseland, NJ 07068
    Counsel for Appellee
    David Kistler, Esq. [ARGUED]
    Blank Rome
    300 Carnegie Center
    Suite 220
    Princeton, NJ 08540
    Michael A. Iannucci, Esq.
    Blank Rome
    130 North 18th Street
    One Logan Square
    Philadelphia, PA 19103
    Counsel for Appellants
    SHWARTZ, Circuit Judge.
    Scherer Design Group, LLC (“SDG”), obtained a preliminary injunction that
    stopped its former employees, Defendants Daniel Hernandez, Ryan Waldron, Chad
    Schwartz, and Kyle McGinley, from contacting SDG’s clients and destroying information
    taken from SDG. Defendants assert that SDG surreptitiously monitored Hernandez’s
    Facebook activity after he left SDG, and claim this constitutes unclean hands barring
    SDG from obtaining equitable relief. Because the Court acted within its discretion in
    declining to apply the unclean hands doctrine, we will affirm.
    2
    I1
    SDG is an engineering firm that provides services to wireless carriers and other
    vendors in the telecommunications business. Schwartz alleges that he was promised a
    partnership in SDG. During discussions about a potential ownership stake, Schwartz
    informed SDG that if he did not reach an agreement with SDG, he would start a
    competing engineering firm. SDG asked Schwartz to enter a noncompete agreement, but
    he declined, and, in November 2017, Schwartz resigned and started two competing
    engineering firms, Defendants Ahead Engineering and Far Field Telecom.
    Schwartz thereafter recruited Hernandez, McGinley, and Waldron to join his
    firms. While Hernandez, McGinley, and Waldron were still employed by SDG, they
    (1) discussed their new venture using, at least in part, Facebook, and (2) transmitted
    SDG’s documents and information to Schwartz’s firms.
    During the 2017 Christmas vacation period, Schwartz accepted a project from one
    of SDG’s largest clients, ExteNet, which SDG had allegedly declined because SDG
    would be closed through the New Year. Schwartz asked Waldron, who was on vacation
    from SDG at the time, to assist him with the project. ExteNet eventually left SDG and
    became Schwartz’s client.
    Hernandez, McGinley, and Waldron resigned from SDG in January 2018.
    Hernandez testified that while he worked at SDG, he accessed his Facebook account from
    1
    “In an appeal from the grant or denial of a preliminary injunction, we typically
    view the facts in the light most favorable to the prevailing party.” Arrowpoint Capital
    Corp. v. Arrowpoint Asset Mgmt., LLC, 
    793 F.3d 313
    , 316 n.1 (3d Cir. 2015).
    3
    his SDG laptop, and “would log off sometimes and leave it open sometimes,” but that on
    the day he resigned from SDG—at the direction of his co-Defendants—he “closed out of
    Facebook” by clearing the history on the internet browsers on his SDG laptop, App. 227,
    334 (“I cleared the passwords which logs you out.”).
    After the mass resignation and loss of ExteNet as a client, SDG’s network
    administrator was instructed to examine Defendants’ SDG computers.2 The
    administrator (1) reviewed Hernandez’s browser history using software that allowed him
    to access deleted activity, (2) asserts that he accessed Hernandez’s Facebook account
    without a password because Hernandez had not cleared it from the computer,3 and
    (3) installed software that allowed him to monitor Hernandez’s Facebook activity without
    detection. From February through mid-March 2018, the administrator accessed
    Hernandez’s Facebook account “very often” from Hernandez’s SDG laptop, App. 210,
    and saw messages that revealed Defendants’ plans and the actions that they took to secure
    SDG’s client information and other intellectual property.
    SDG sent Defendants cease and desist letters, and thereafter filed a complaint in
    the New Jersey Superior Court alleging, among other things, breach of the duty of
    loyalty, tortious interference with prospective business relationships, and
    misappropriation of trade secrets. With the complaint, SDG sought a temporary
    2
    At the time of Defendants’ employment, SDG had no policies informing
    employees that SDG retained the right to monitor their use of SDG computers, and did
    not remind departing employees to log out of personal accounts prior to their departure.
    3
    SDG’s network administrator attempted to review the other Defendants’
    browsing histories but was unable to do so “[b]ecause they cleared all of their
    information and were logged out of all of their accounts.” App. 221.
    4
    restraining order (“TRO”) and a preliminary injunction. Defendants removed the case to
    the United States District Court for the District of New Jersey.
    After granting SDG’s request for a TRO, the District Court allowed the parties to
    conduct expedited discovery and then it held argument on SDG’s injunction request.
    Defendants produced, among other things, testimony from Hernandez, who insisted that
    he logged out of his Facebook account before he returned his computer to SDG, and a
    report from a computer forensics expert, who opined that (1) “it is highly unlikely” that
    Hernandez’s Facebook account “remained logged on the SDG laptop after January 17,
    2018” and (2) SDG accessed the Facebook account using Hernandez’s password. App.
    245. In response, SDG produced a supplemental declaration from its network
    administrator stating that he did not have Hernandez’s password and that Hernandez
    “likely . . . misremembered logging out of his Facebook account” or may have “thought”
    he logged out but did not do so because of Facebook’s “persistent” picture login
    “feature,” which requires additional steps to completely log out. App. 342-46.
    The District Court acknowledged that the parties “hotly dispute” how SDG gained
    access to Hernandez’s Facebook account but, without resolving this factual dispute,
    determined that the unclean hands doctrine did not bar injunctive relief because (1) it
    “may be reasonable” for an employer such as SDG to access password-protected content
    on a company laptop; (2) SDG’s conduct “is arguably not related to the litigation”
    because “[w]hile it goes to Plaintiff’s full knowledge of the underlying facts,”
    Defendants’ alleged breaches of loyalty, tortious interference, and/or trade secret
    violations predate SDG’s alleged hacking of Hernandez’s account and SDG’s actions did
    5
    not “affect” the Defendants’ alleged violations; and (3) “[o]n balance,” the Court was not
    persuaded that “unclean hands” should bar SDG’s right to pursue injunctive relief. App.
    9. The Court then considered the preliminary injunction factors, determining that SDG
    “demonstrated a strong likelihood of success on the merits of its breach of the duty of
    loyalty claim” and that SDG would be irreparably harmed without an injunction barring
    Defendants from soliciting SDG’s clients and from destroying information taken from
    SDG. App. 18-22. Defendants appeal the Court’s decision not to apply the unclean
    hands doctrine.
    II4
    The unclean hands doctrine is “derived from the unwillingness of a court,
    originally and still nominally one of conscience, to give its peculiar relief to a suitor who
    in the very controversy has so conducted himself as to shock the moral sensibilities of the
    judge.” Gaudiosi v. Mellon, 
    269 F.2d 873
    , 882 (3d Cir. 1959) (quotation marks and
    citation omitted). The doctrine “applies when a party seeking relief has committed an
    unconscionable act immediately related to the equity the party seeks in respect to the
    litigation.” Highmark, Inc. v. UPMC Health Plan, Inc., 
    276 F.3d 160
    , 174 (3d Cir. 2001)
    4
    The District Court had jurisdiction over SDG’s claims against Defendants. 28
    U.S.C. §§ 1331, 1367. We have jurisdiction to review the Court’s order granting a
    preliminary injunction under 28 U.S.C. § 1292(a). The decision to grant or deny a
    preliminary injunction is within the sound discretion of the district court. Winter v. Nat.
    Res. Def. Council, Inc., 
    555 U.S. 7
    , 24, 33 (2008). “Ordinarily, an abuse of discretion
    standard applies to our review of the district court’s application of the unclean hands
    doctrine. However, the parameters of the unclean hands doctrine implicate a matter of
    law,” Ne. Women’s Ctr., Inc. v. McMonagle, 
    868 F.2d 1342
    , 1354 (3d Cir. 1989), which
    we review de novo, K.A. ex rel. Ayers v. Pocono Mountain Sch. Dist., 
    710 F.3d 99
    , 105
    (3d Cir. 2013).
    6
    (citing Keystone Driller Co. v. Gen. Excavator Co., 
    290 U.S. 240
    , 245 (1933)). Thus, a
    party seeking to invoke the doctrine must show: (1) the party seeking equitable relief
    committed an unconscionable act; and (2) the act is related to the claim upon which
    equitable relief is sought.5
    The unclean hands doctrine “is not an automatic or absolute bar to relief; [rather,]
    it is only one of the factors the court must consider when deciding whether to exercise its
    discretion and grant an injunction.” 11A Charles Alan Wright & Arthur R. Miller,
    Federal Practice and Procedure § 2946 (3d ed. 1998) (citing Johnson v. Yellow Cab
    Transit Co., 
    321 U.S. 383
    , 387 (1944) (explaining that the unclean hands doctrine “is not
    a rigid formula which ‘trammels the free and just exercise of discretion’”); Shondel v.
    McDermott, 
    775 F.2d 859
    , 868 (7th Cir. 1985) (“Today, ‘unclean hands’ really just
    means that in equity as in law the plaintiff’s fault, like the defendant’s, may be relevant to
    the question of what if any remedy the plaintiff is entitled to.”); and Houston Oilers, Inc.
    v. Neely, 
    361 F.2d 36
    (10th Cir. 1966)). Thus, a court retains the discretion to grant
    equitable relief even where the elements of the unclean hands doctrine are met. See
    
    Johnson, 321 U.S. at 387
    (explaining that while “a federal court should not, in an
    ordinary case, lend its judicial power to a plaintiff who seeks to invoke that power for the
    purpose of consummating a transaction in clear violation of law” courts need not “always
    permit a defendant wrongdoer to retain the profits of his wrongdoing merely because the
    plaintiff himself is possibly guilty of transgressing the law in the transactions involved”);
    5
    Under our jurisprudence, proof of injury is not required. See, e.g., In re New
    Valley Corp., 
    181 F.3d 517
    , 526 (3d Cir. 1999) (citing 
    Gaudiosi, 269 F.2d at 881-82
    ).
    7
    In re New Valley Corp., 
    181 F.3d 517
    , 525 (3d Cir. 1999) (even where there is a
    “relationship between the inequitable conduct and the claims brought . . . the court has
    discretion to limit the reach of the doctrine”).
    Even if SDG’s monitoring of Hernandez’s Facebook constituted the kind of act
    that would be viewed as unconscionable,6 the District Court did not err in concluding the
    6
    “To prevail on an unclean hands defense, the defendant must show fraud,
    unconscionability, or bad faith on the part of the plaintiff.” S & R Corp. v. Jiffy Lube
    Int’l, Inc., 
    968 F.2d 371
    , 377 n.7 (3d Cir. 1992). The misconduct, however, “need not
    necessarily have been of such a nature as to be punishable as a crime or as to justify legal
    proceedings of any character. Any willful act concerning the cause of action which
    rightfully can be said to transgress equitable standards of conduct is sufficient cause for
    the invocation of the maxim . . . .” Monsanto Co. v. Rohm & Haas Co., 
    456 F.2d 592
    ,
    598 (3d Cir. 1972). Because showing unclean hands requires two elements, establishing
    that an act is illegal or “transgress[es] equitable standards” is a necessary but insufficient
    condition for the doctrine’s application. See Ciba-Geigy Corp. v. Bolar Pharm. Co., 
    747 F.2d 844
    , 855 (3d Cir. 1984) (holding unclean hands did not preclude injunction because
    plaintiff’s alleged regulatory violations did “not implicate transgressions so egregious as
    to merit the preclusion of an injunction” against manufacturer of generic drug found to
    have violated trademark laws).
    Because the District Court did not clearly err by disposing of the unclean hands
    argument on relatedness grounds, we need not decide whether SDG violated New Jersey
    privacy law because the alleged “violation is at most collateral” to the causes of action
    “involved in this lawsuit.” See Ne. Women’s 
    Ctr., 868 F.2d at 1353
    . In any event, our
    dissenting colleague’s discussion about privacy and computers mistakenly asserts that
    (1) an employer may only access personal password-protected content that an employee
    viewed on a work computer “so long as the employer’s policies clearly communicate[]
    that such content may be monitored,” Dissent Op. at 3, and (2) “mere use of a password
    to protect an account or files generally conveys a clear intent to prevent others’ access,”
    Dissent Op. at 6-7. The first point overstates the holding of Stengart v. Loving Care
    Agency, Inc., 
    990 A.2d 650
    (N.J. 2010). In that case, the New Jersey Supreme Court
    held that an employee who “plainly took steps to protect privacy of . . . emails” she sent
    to her attorney through a third-party program on her company laptop, had a reasonable
    expectation of privacy in those emails. 
    Id. at 663,
    664. The Stengart Court found that the
    employee had (1) a subjective expectation of privacy based on her own affirmative
    actions to protect her privacy, and (2) an objective expectation of privacy based on the
    attorney-client nature of the communications and the company’s electronic
    communications policy, which did not discuss the use of personal accounts on company
    8
    conduct was not related to the claim upon which equitable relief was sought. For the
    unclean hands doctrine to apply, “there must be a relationship between the inequitable
    conduct and the claims brought before the court.” New Valley 
    Corp., 181 F.3d at 525
    (citations omitted). In describing the “relationship” element, we have said that the
    unclean hands doctrine will bar recovery when such conduct “has immediate and
    necessary relation” to the equity sought. 
    Id. (quoting Keystone,
    290 U.S. at 245). Thus,
    the doctrine “only applies when there is a direct nexus between the bad conduct and the
    activities sought to be enjoined.” Id.; see also Ne. Women’s Ctr., Inc. v. McMonagle,
    
    868 F.2d 1342
    , 1354, 1356 (3d Cir. 1989) (reversing district court’s determination that
    unclean hands precluded issuance of injunction in favor of plaintiff women’s health clinic
    because a physician’s failure to comply with state fetal tissue inspection law had no
    relationship with defendant antiabortion protesters’ liability under the RICO, contract
    interference, and trespass counts); Ciba-Geigy Corp. v. Bolar Pharm. Co., 
    747 F.2d 844
    ,
    855-56 (3d Cir. 1984) (affirming grant of permanent injunction and rejection of unclean
    computers. 
    Id. at 663-64.
    The presence of a policy was a consideration but certainly was
    not dispositive. 
    Id. at 662-63.
    Indeed, the Stengart Court emphasized the plaintiff’s
    affirmative actions to protect her privacy on her work computer, including by not saving
    her personal account password on it. 
    Id. at 663,
    665. Stengart is also distinguishable
    from this case because Stengart involved emails to plaintiff-employee’s attorney and this
    case involves review of browsing history on SDG’s computer, where there is a lesser
    expectation of privacy. Liebeskind v. Rutgers Univ., No. A-0544-12T1, 
    2014 WL 7662032
    , at *7 (N.J. Super. Ct. App. Div. Jan. 22, 2015) (“The browsing history on
    plaintiff’s workplace computer does not hold the same expectations of privacy that emails
    to an attorney hold.”). The second point is based on a collection of various cases from
    outside New Jersey that do not involve employees’ work computers, or the employers’
    access to personal accounts the employee accessed from his work computer, or
    circumstances where the employee saved login information on the employer’s computers.
    9
    hands argument where “the alleged wrongdoings [did] not relate to the subject matter of
    [the] claim”); Monsanto Co. v. Rohm & Haas Co., 
    456 F.2d 592
    , 598 (3d Cir. 1972)
    (applying unclean hands doctrine to bar equitable remedies in patent infringement case
    where patents at issue were procured through misrepresentations in the patent
    application).7
    “Unless courts insist on a tight connection between the object of the injunction and
    the misconduct of the plaintiff . . . . the right to injunctive relief . . . would have little
    value [and] the defendant could divert the proceeding into the byways of collateral
    misconduct.” 
    Shondel, 775 F.2d at 869
    . Such misdeeds are “‘collateral’ . . . when the
    right for which the plaintiff seeks protection in the injunction suit did not accrue to him
    because of the misdeed.” Restatement (Second) of Torts § 940 cmt. c (Am. Law Inst.
    1979).
    The District Court applied these legal principles and declined to invoke the
    unclean hands doctrine because SDG’s access of Hernandez’s Facebook account “does
    7
    We have also described the “relationship” element in somewhat looser terms.
    See, e.g., Precision Instrument Mfg. Co. v. Auto. Maint. Mach. Co., 
    324 U.S. 806
    , 814-
    15 (1945) (“[W]hile equity does not demand that its suitors shall have led blameless
    lives, as to other matters, it does require that they shall have acted fairly and without
    fraud or deceit as to the controversy in issue.”) (quotation marks and citations omitted)
    (emphasis added)). Regardless of the phrasing, each articulation has a common thread:
    the doctrine applies only where the unclean “conduct relat[es] to the matter in litigation,”
    Ne. Women’s 
    Ctr., 868 F.3d at 1355
    , and “[t]he nexus ‘between the misconduct and the
    claim must be close,’” 
    Highmark, 276 F.3d at 174
    (quoting New Valley 
    Corp., 181 F.3d at 525
    ). The fact that a different framing of the relationship element is possible and the
    District Court chose a narrower articulation does not mean that the Court erred. See
    Hohe v. Casey, 
    868 F.2d 69
    , 70 (3d Cir. 1989).
    10
    not affect the potential breaches of loyalty, tortious interference, and/or trade secret
    violations that are the subject of the litigation and which occurred prior to Plaintiff’s
    alleged hacking of Hernandez’s account.” App. 9. This conclusion was sound for three
    reasons. First, SDG did not dirty its hands to “acquire[ the] rights” it asserts in its
    complaint. S. Cal. Darts Ass’n v. Zaffina, 
    762 F.3d 921
    , 933 (9th Cir. 2014); see also
    Restatement (Second) of Torts § 940 cmt. c (“equity will not aid a person to reap the
    benefits of his own misconduct”). Unlike a patent holder who obtains patent rights based
    upon a fraudulent patent application, 
    Monsanto, 456 F.2d at 598
    , SDG did not monitor
    Hernandez’s Facebook account so it could obtain a right that SDG did not otherwise
    have. Defendants owed a duty of loyalty to SDG long before the Facebook monitoring
    occurred.
    Second, while SDG obtained proof of its duty of loyalty claim from its
    monitoring, and thus it benefitted from its activity, SDG had a right to Defendants’
    loyalty and could prove their breach of that duty without relying on the surreptitiously
    obtained Facebook messages.8 Put differently, SDG’s alleged misconduct has a link with
    Defendants’ breach of loyalty claim insofar as SDG’s conduct led it to proof of its duty of
    loyalty claim, see App. 52 (Verified Compl. ¶ 75 (“To the extent these discussions
    referred to downloads by Hernandez, McGinley and Waldron from the SDG computer
    network, SDG was able to corroborate virtually all of them with the removal of portable
    storage devices such as flash drives from users’ computers as logged by the auditing
    8
    That said, the Facebook messages would have been discoverable.
    11
    function of SDG’s Windows domain operating system.”)), but this conduct did not give
    rise to the claim upon which SDG seeks relief. Thus, SDG’s monitoring of the Facebook
    messages is not related to “whether [Defendants], at some earlier point, stole [SDG’s]
    property.” Sullens v. Graham, No. 14 CV 866, 
    2014 WL 6765138
    , at *2 (N.D. Ill. Dec.
    1, 2014).
    Third, SDG’s alleged privacy violation and Defendants’ alleged breach of the duty
    of loyalty are causes of action “governed by distinct bodies of law that provide their own
    separate remedies for misconduct.”9 Intertek USA Inc. v. AmSpec, LLC, No. 14 CV
    6160, 
    2014 WL 4477933
    , at *7 (N.D. Ill. Sept. 11, 2014).
    In sum, because relatedness is a “critical element of the unclean hands doctrine,”
    New Valley 
    Corp., 181 F.3d at 524
    , and SDG’s allegedly unclean conduct is not directly
    related to Defendants’ breach of the duty of loyalty, the District Court did not abuse its
    discretion in declining to apply the unclean hands doctrine to deny SDG’s request for
    equitable relief.
    III
    For the foregoing reasons, we will affirm.
    9
    Not only is the law distinct but the impact of the alleged conduct differs. Unlike
    SDG’s Facebook monitoring, which has ceased, Defendants’ alleged theft of SDG’s
    client information and other intellectual property could result in future economic harm.
    12
    AMBRO, Circuit Judge, dissenting
    The District Court’s decision to issue a preliminary injunction preventing SDG’s
    former employees from communicating with SDG clients or using SDG documents might
    be the correct outcome in this case. And if, as my colleagues conclude, the Court
    determined that SDG’s conduct was not sufficiently related to trigger unclean hands, I
    agree affirmance may be appropriate. But because I am not sure it made such a
    determination, and I think its privacy analysis is faulty, I am uncomfortable affirming at
    this time.
    Unclean hands law prevents injunctive relief to one who otherwise would merit it.
    Inequity cancels out equity. Under our precedent, unclean hands applies when (1) the
    conduct of one seeking to enjoin another offends the court’s conscience and (2) “in some
    measure affect[s] the equitable relations between the parties in respect of something
    brought before the court for adjudication[, which typically goes by the term relatedness].”
    Highmark, Inc. v. UPMC Health Plan, Inc., 
    276 F.3d 160
    , 174 (3d Cir. 2001) (quoting
    Keystone Driller Co. v. General Excavator Co., 
    290 U.S. 240
    , 245 (1933)). We
    ordinarily review an unclean hands ruling for abuse of discretion, but conduct plenary
    review of a district court’s offensiveness and relatedness determinations to the extent they
    implicate a matter of law. Ne. Women’s Ctr., Inc. v. McMonagle, 
    868 F.2d 1342
    , 1353–
    54 (3d Cir. 1989).
    The District Court observed that SDG’s “conduct is arguably not related to the
    litigation to find unclean hands. While it goes to [SDG’s] full knowledge of the
    underlying facts, it does not affect the potential breaches of loyalty, tortious interference,
    and/or trade secret violations that are the subject of the litigation and which occurred
    prior to [SDG’s] alleged hacking of Hernandez’s account.” App. at 9. Though the Court
    notes that this is “arguably” correct, it is not definitive. I have the same lack of certainty.
    For offensiveness, however, I part ways with the District Court and my colleagues.
    The Court states that “it may be reasonable and does not necessarily amount to an
    intrusion upon seclusion for an employer to have access to and view password-protected
    content on a company laptop.” Id.1 I believe an incorrect view of New Jersey privacy law
    affected the Court’s thinking as to whether SDG’s conduct—including accessing a
    former employee’s password-protected PNC bank account and actively monitoring his
    Facebook Messenger account—is offensive.
    Reasonable minds can interpret differently the Court’s ruling that, “[o]n balance,
    [it] is not persuaded that Plaintiff’s ‘unclean hands’ should bar its right to pursue
    injunctive relief.” 
    Id. But if
    its privacy analysis to get to that conclusion misses the
    mark, a redo is in order. Hence I write separately to explain why I believe it is unlawful
    1
    The opinion also refers to a discussion at the April 3 oral argument, which likewise
    shows the Court is very skeptical that SDG’s conduct is concerning.
    MR. KISTLER: . . . . Your Honor, they continued to monitor and look at
    these communications after all of these individuals left the company on
    January 18th for another six weeks.
    THE COURT: Of course they would. Why wouldn’t they?
    MR. KISTLER: Because it’s illegal I would submit, Your Honor.
    THE COURT: I’m not at all persuaded of that. . . .
    Apr. 3, 2018 TRO Tr. at 43:11–44:3 (emphases added).
    2
    to access a former employee’s password-protected bank account and actively monitor his
    private digital communications months after he resigned.
    I.      SDG’s access of Hernandez’s accounts was unlawful and offensive conduct
    A. Employer monitoring under New Jersey Law
    The District Court cites to Stengart v. Loving Care Agency, Inc., 
    990 A.2d 650
    (N.J. 2010), to support its view that SDG’s conduct “may be reasonable and does not
    necessarily amount to an intrusion upon seclusion.” App. at 9. I don’t read Stengart that
    way. It held that an employer may not view password-protected attorney-client emails
    that an employee sent from a company computer and which it subsequently 
    recovered. 990 A.2d at 665
    . In so ruling, the Court stated not only that the computer-use policy of
    the employer failed to disclose the monitoring of employee activities on company
    computers, 
    id. at 659,
    but also concluded that these emails would still be privileged and
    access to them unenforceable even if the company had such a policy, 
    id. at 665.
    The
    employee in Stengart had a subjective expectation of privacy in her use of personal,
    password-protected accounts on her company laptop and an “objectively reasonable
    expectation” of privacy based on “the language of the Policy and the attorney-client
    nature of the communications.” 
    Id. at 663.
    Though SDG accessed content that was not attorney-client privileged, it was
    clearly private. SDG accessed that content not by recovering from Hernandez’s company
    computer copies of the messages he viewed or sent but rather by infiltrating his personal,
    password-protected accounts. In other words, SDG went on an external fishing
    expedition rather than merely conducting a review of activity on its own physical assets.
    3
    
    Stengart, 990 A.2d at 665
    . And SDG also didn’t have any policies disclosing its
    monitoring practices.2 Thus nothing in Stengart nor any subsequent New Jersey case
    suggests SDG’s conduct is permissible.
    SDG concedes these facts. Its head of Information Technology, Jason
    Gerstenfeld, reviewed the browser history from Hernandez’s old SDG laptop roughly a
    month after Hernandez resigned. While viewing it, Gerstenfeld clicked on links to many
    of Hernandez’s personal, password-protected, and off-premises accounts. He
    successfully bypassed the log-in requirements for three of them: Hernandez’s personal
    PNC Bank Account, his Dropbox account (associated with his SDG email), and his
    Facebook Messenger account. From February 15 through March 15, Gerstenfeld and
    SDG’s founder, Glenn Scherer, monitored many times a day Hernandez’s Facebook
    Messenger activity, which is both password-protected and end-to-end encrypted. To
    repeat, SDG had no computer-use policies disclosing that the company might monitor
    employee activity on its computers or access personal accounts of employees after they
    left the company.
    2
    Indeed, a non-precedential New Jersey Superior Court case interpreting Stengart
    suggests that even a clear policy may not permit an employer to retrieve and view
    password-protected personal communications or accounts that the employee accessed on
    a work computer. In Liebeskind v. Rutgers Univ., No. A-0544-12T1, 
    2014 WL 7662032
    ,
    at *7 (N.J. Super. Ct. App. Div. Jan. 22, 2015), the Court held that an employee lacked an
    expectation of privacy in his non-password-protected browsing history on his company
    computer where Rutgers had a clear policy that it “reserve[d] the right to examine
    material stored on or transmitted through its facilities.” The Court emphasized, however,
    that, “[i]mportantly, there is no competent evidence that defendants tried to access the
    content of personal, password-protected emails or personal accounts.” 
    Id. 4 This
    conduct surely is beyond the scope of permissible conduct that Stengart
    recognizes. SDG infiltrated password-protected accounts hosted on third-party servers
    and networks without any authorization. It had no connection to or right to view the
    information in these private accounts (except through the traditional discovery process,
    which has procedural safeguards on information acquisition and use). And neither the
    parties nor my colleagues can identify any authority under New Jersey law that suggests a
    mere computer-use policy may permit a company to acquire password-protected
    information not already stored on a company computer.
    B. Access to personal, password-protected accounts as intrusions upon seclusion
    A traditional intrusion analysis leads me to believe that SDG’s conceded conduct
    is tortious. Under New Jersey law, the elements of a privacy claim based on intrusion
    upon seclusion are (1) intentional conduct that (2) intrudes into a private space and (3) is
    “highly offensive” to a reasonable person. In re Nickelodeon Consumer Privacy Litig.,
    
    827 F.3d 262
    , 293 (3d Cir. 2016) (citing Hennessey v. Coastal Eagle Point Oil Co., 
    609 A.2d 11
    , 17 (1992)). Let’s look at each element.
    i.     Intentional conduct
    A person acts intentionally if he knows he lacks either legal or personal permission
    to intrude into a private space. 
    Id. (citing O’Donnell
    v. United States, 
    891 F.2d 1079
    , 1083
    (3d Cir. 1989)). In other words, if an intruder searches another’s private space and is
    uncertain whether her search is lawful but knows it was without consent, the intruder acts
    intentionally. 
    Id. As Hernandez
    never gave his permission for SDG to access his
    password-protected accounts, it acted intentionally.
    5
    ii.    Intrusion into private space
    An intrusion must invade a private space, meaning the victim must have a
    reasonable expectation of privacy in the intruded space. Kline v. Sec. Guards, Inc., 
    386 F.3d 246
    , 260 (3d Cir. 2004) (citing Restatement (Second) of Torts § 652B).3 Individuals
    have a reasonable expectation of privacy in password-protected online accounts and
    communications. See, e.g., United States v. Stabile, 
    633 F.3d 219
    , 233 (3d Cir. 2011)
    (observing that employing a password on a shared computer can protect a user’s privacy
    rights vis a vis a third-party to whom a co-owner grants access); Trulock v. Freeh, 
    275 F.3d 391
    , 403 (4th Cir. 2001) (“Trulock’s password-protected files are analogous to the locked
    footlocker inside the bedroom. By using a password, Trulock affirmatively intended to
    exclude Conrad and others from his personal files.”).
    A cursory review of our sister circuits shows that the mere use of a password to
    protect an account or files generally conveys a clear intent to prevent others’ access. This
    preserves a user’s reasonable expectation of privacy as to the bypassing intruder. See, e.g.,
    United States v. Thomas, 
    818 F.3d 1230
    , 1241–42 (11th Cir. 2016) (stating that use of a
    separate, unshared password or encryption will preserve a user’s expectation of privacy as
    to a third party who happens to access the account); United States v. Heckenkamp, 
    482 F.3d 1142
    , 1146–47 (9th Cir. 2007) (concluding that a student’s use of a “screen-saver
    3
    While Kline applies Pennsylvania law, we have observed that “[s]ince the highest
    courts of both New Jersey and Pennsylvania have looked to the same treatise, we are
    comfortable adopting” the same standards in the intrusion context. 
    Nickelodeon, 827 F.3d at 293
    n.194.
    6
    password” preserved his objective and subjective expectations of privacy); United States
    v. Andrus, 
    483 F.3d 711
    , 719 (10th Cir. 2007) (ruling that a user retains an expectation of
    privacy in a computer where the password’s protections are bypassed so long as the
    bypasser reasonably knew the account was password-protected).
    What if Hernandez hadn’t cleared his browser history? He attests that he did, but
    would it matter if he forgot or simply had no way to stop however SDG accessed his
    accounts?4   No, for borrowing a person’s jacket and discovering a notecard with
    handwritten passwords to an email or bank account does not make the information on those
    accounts any less private. In the intrusion context, mere lapses of mind or capacity are
    insufficient to waive a privacy interest in password-protected accounts. See K-Mart Corp.
    Store No. 7441 v. Trotti, 
    677 S.W.2d 632
    , 638 (Tex. App. 1984) (where an employer
    intrudes upon an employee’s seclusion by searching her locked locker, “it is immaterial
    whether the [employee] actually securely locked her locker or not”) (emphasis added); see
    also, e.g., Hernandez v. Hillsides, Inc., 
    211 P.3d 1063
    , 1076 (Cal. 2009) (employees
    maintain reasonable expectations of privacy from covert monitoring even though
    “colleagues, supervisors, visitors, and security and maintenance personnel have varying
    degrees of access” to shared office).
    4
    SDG’s forensic report suggests that Hernandez did delete his browser history, but that
    local files stored on the SDG system gave SDG a backdoor way into his account. “Given
    the volume and granularity of Internet History records, cached web pages, form fill data,
    and file access information, available in [SDG’s local] dhernandez user profile, efforts to
    clear the Internet History were unsuccessful[,] leaving session cookies, login information,
    and other cached data available for another user.” App. at 381 (emphasis added). The
    record does not address whether Hernandez could view or delete these files.
    7
    Stengart aligns with these principles. SDG used a former employee’s browsing
    history to access and actively monitor his external, password-protected accounts. This is
    an intrusion into private space.
    iii.   Highly offensive
    An intentional intrusion into a private space must also be highly offensive to a
    reasonable person, a determination usually made by juries. See, e.g., 
    Nickelodeon, 827 F.3d at 295
    ; In re Google Inc. Cookie Placement Consumer Privacy Litig., 
    806 F.3d 125
    ,
    151 (3d Cir. 2015). When pressed, as here, to articulate whether an intrusion is highly
    offensive as a matter of law, courts generally balance interests. See, e.g., Borse v. Piece
    Goods Shop, Inc., 
    963 F.2d 611
    , 625 (3d Cir. 1992) (predicting the Pennsylvania
    Supreme Court would consider all facts surrounding a drug screening program and weigh
    the employee’s privacy interest against the employer’s interest in maintaining a drug-free
    workplace); Safari Club Int’l v. Rudolph, 
    862 F.3d 1113
    , 1127 (9th Cir. 2017) (holding
    that under California law an intrusion is highly offensive if it satisfies a balancing test
    with relevant factors that include “the degree and setting of the intrusion[] and the
    intruder’s motives and objectives”).
    From my review of the conceded facts, I conclude that SDG’s conduct was highly
    offensive given the types of information accessed along with the manner of its intrusions.
    And, to make matters worse, SDG had a way through discovery to acquire legally all
    information relevant to its former employees’ alleged misconduct.
    8
    a.     Type of information accessed
    The Second Restatement of Torts lists unconsented access to private
    correspondence, bank accounts, and safes as examples of highly offensive intrusions. See
    Restatement (Second) of Torts § 652B cmt b (explaining that tortious intrusions are
    committed, for example, “as by opening his private and personal mail, searching his safe
    or his wallet, examining his private bank account, or compelling him by forged court order
    to permit an inspection of his personal documents”). Indeed, SDG’s access of Hernandez’s
    private bank account appears to violate the Computer Fraud and Abuse Act. See, e.g., 18
    U.S.C. § 1030 (a)(2)(A), (c)(2)(A) (providing for fines and imprisonment of not more than
    one year for anyone who “intentionally accesses a computer without authorization or
    exceeds authorized access, and thereby obtains . . . information contained in a financial
    record of a financial institution . . . .”); United States v. Tolliver, 451 F. App’x 97, 103 (3d
    Cir. 2011).5
    The personal communications here were private and must not be viewed absent
    legal mandate or clear and knowing consent by the sender or a named recipient. Today
    private communications are perhaps the most common way for people to build authentic
    relationships, share intimate facts, and expose to another ideas or habits that are works in
    progress.6 Private communications are also critical to human organization. People use
    5
    Federal statutes, not implicated here, also criminalize unauthorized access to personal
    communications. See, e.g., 18 U.S.C. § 1702 (unconsented access to another’s mail); 18
    U.S.C. §§ 2511(1), (4)–(5) (interception of another’s electronic communications).
    6
    For this reason, private communications have been a particular concern since the
    privacy movement began in the United States. See, e.g., Samuel D. Warren & Louis D.
    9
    private messages to plan and advance commercial opportunities (as we see here), political
    campaigns, and academic research, to name a few. Permitting third parties to monitor
    private communications without clear permission or legal authorization poses grave and
    profound risks to a free society.
    b.     The manner of SDG’s intrusion
    The way SDG intruded—with covert, sustained, and overbroad monitoring of its
    former employees’ communications—is also highly concerning. It took steps to obscure
    its monitoring when Gerstenfeld installed the application “fbunseen,” which permitted the
    company to review Hernandez’s Facebook Messenger conversations without the other
    participants knowing.
    Once in the account, SDG’s search for useful information lasted roughly a month.
    Both alongside Scherer and on his own, Gerstenfeld monitored Hernandez’s Facebook
    messages many times a day for a month. He continued to monitor actively Hernandez’s
    Facebook Messenger account until March 15, roughly a week after SDG filed suit.
    Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890) (“The common law secures to
    each individual the right of determining, ordinarily, to what extent his thoughts,
    sentiments, and emotions shall be communicated to others”); Millar v. Taylor, 4 Burr.
    2303, 2379 (1769) (“It is certain every man has a right to keep his own sentiments, if he
    pleases. He has certainly a right to judge whether he will make them public, or commit
    them only to the sight of his friends.”); see also Bradley A. Areheart & Jessica L.
    Roberts, GINA, Big Data, and the Future of Employee Privacy, 128 Yale L.J. 710, 779
    (2019) (“Privacy has independent moral value because it allows us to define our
    relationships through what we keep secret and what we disclose. . . . With respect to
    intrinsic privacy harms, the detriment is the invasion itself, regardless of whether the
    intruder actually acts on that information.”) (citations omitted).
    10
    And nothing in the record suggests the scope of SDG’s review and acquisition of
    Hernandez’s communications was narrow.            SDG snooped on conversations between
    Hernandez and other friends not related to this litigation. SDG also does not dispute the
    account of Chad Schwartz, one of the ventures’ founders, who declared under penalty of
    perjury that it reviewed and downloaded privileged attorney communications from
    Hernandez’s account. From the breadth and duration of the search, we may fairly infer
    that SDG looked for any information that might be useful to its investigation and litigation,
    its awareness of its competitors’ commercial strategies, or gaining understanding of their
    founders’ activities. This monitoring is offensive to anyone’s reasonable expectation of
    privacy.
    c.     SDG didn’t need to act so brazenly
    We have litigation to resolve disputes by a legal process, which includes discovery.
    And indeed SDG had expedited discovery. And yet for SDG that wasn’t enough. To the
    extent Hernandez’s accounts held relevant information, I repeat that this information
    should only have come to light through discovery rather than prior misconduct.
    Balancing the interests here, I have no doubt that SDG’s conduct was sufficiently
    offensive for purposes of an unclean hands inquiry.
    II.    Relatedness
    That conduct is unlawful or otherwise offensive to the court’s conscience does not
    mean unclean hands necessarily bars equitable relief. It must also bear a sufficient
    relationship to either the litigation or claims for equitable relief. As implied above, I
    11
    think the District Court could have concluded that SDG’s conduct was not related to the
    equitable relief it sought. Or it could have ruled the other way.
    Our Court has described the relatedness requirement in various ways over the
    years. From my review, the three articulations we have most frequently endorsed are:
    1. That courts “close their doors” “only for such violations of conscience as in
    some measure affect the equitable relations between the parties in respect of
    something brought before the court for adjudication.’” Highmark, Inc. v.
    UPMC Health Plan, Inc., 
    276 F.3d 160
    , 174 (3d Cir. 2001) (quoting 
    Keystone, 290 U.S. at 245
    ).
    2. That there must be an “‘immediate and necessary relation to the equity that’
    the party seeks.” In re New Valley Corp., 
    181 F.3d 517
    , 525 (3d Cir. 1999)
    (citing 
    Keystone, 290 U.S. at 245
    ).
    3. That “the nexus ‘between the misconduct and the claim must be close.’”
    
    Highmark, 276 F.3d at 174
    (quoting In re New Valley 
    Corp., 181 F.3d at 525
    ).
    This is not an exhaustive list, and we are not alone in recognizing many standards
    of relatedness, a practice that dates back over a century. See generally Pomeroy, Equity
    Jurisprudence §§ 397, 399–403 (5th ed. 2002) (discussing the broad principles that
    govern unclean hands, its limitations, and distinct analyses in various contexts). As the
    majority notes, “that a different framing of the relationship element is possible and the
    District Court chose a narrower articulation does not mean that the Court erred.”
    Majority Op. at 10 n.7. I would only add “necessarily” before “mean.”
    In its ruling, the District Court applied a two-part test—to be related, the plaintiff’s
    conduct must (1) “bear direct relation to the matter in litigation/before the Court . . . [and
    (2)] affect the balance of equities.” SDG includes in its complaint snapshots of
    Hernandez’s private messages. This satisfies the first requirement. The second
    12
    requirement is vague by design and gives district courts discretion to determine when
    misconduct, already connected to the litigation, is sufficiently related for unclean hands
    to bar equitable relief. See, e.g., Keystone Driller Co. v. Gen. Excavator Co., 
    290 U.S. 240
    , 245–46 (1933) (“[Courts] do not close their doors because of plaintiff’s misconduct,
    whatever its character, that has no relation to anything involved in the suit, but only for
    such violations of conscience as in some measure affect the equitable relations between
    the parties in respect of something brought before the court for adjudication. . . . They
    are not bound by formula or restrained by any limitation that tends to trammel the free
    and just exercise of discretion.”). Thus the District Court could conclude that SDG’s
    conduct affected the balance of the equities between the parties.
    One way this is possible is if the Court found that the similarity of SDG’s conduct
    to the conduct it challenges affected the balance of equities between the parties—in
    effect, “a pox on both their houses.” The Court stated that Defendants’ acquisition of
    SDG documents is the central basis for the lone claim triggering a preliminary injunction
    (a breach of New Jersey’s duty of loyalty). SDG responded to this activity by accessing
    Hernandez’s external, password-protected accounts and taking information related to
    him, SDG’s new competitors, and their founders. Thus both parties unlawfully acquired
    from the other information relevant to their competing businesses. Further, each also
    “abused” Hernandez’s relationship with SDG: Hernandez used his employment to
    acquire SDG information; SDG used Hernandez’s activity as an employee to acquire his
    information. Given these similarities, I think the District Court could have concluded
    13
    that SDG’s conduct affected the balance of equities between the parties. See Ciba-Geigy
    Corp. v. Bolar Pharm. Co., 
    747 F.2d 844
    , 855 (3d Cir. 1984).
    Though SDG’s conduct was offensive and highly so, the District Court here was
    within its discretion to rule either way as to whether SDG’s access to private accounts
    was related to the equitable remedies it sought. Thus it could have granted equitable
    relief in full, as to only certain claims and defendants, or not at all.
    But what the Court decided on relatedness was not definitive. It concluded only
    that SDG’s conduct was “arguably not related,” and that, “[o]n balance,” unclean hands
    should not apply to bar a preliminary injunction in favor of SDG. Because I think the
    Court erred in its privacy analysis and this—at least in part—informed its decision not to
    apply unclean hands, I cannot affirm at this time. See, e.g., Sprint/United Mgmt. Co. v.
    Mendelsohn, 
    552 U.S. 379
    , 386–88 (2008) (where a district court’s decision is reviewed
    for abuse of discretion and may stem from underlying error, the proper course is to clarify
    the operative legal inquiry and remand unless the record permits only one resolution of
    the issue). I would clarify the privacy law issue, vacate and remand, and preserve the
    status quo between the parties so the District Court could consider the unclean hands
    question within that legal framework.
    Thus I respectfully dissent.
    14
    

Document Info

Docket Number: 18-2835

Filed Date: 2/25/2019

Precedential Status: Non-Precedential

Modified Date: 4/17/2021

Authorities (24)

Houston Oilers, Inc. v. Ralph Neely , 361 F.2d 36 ( 1966 )

United States v. Ray Andrus , 483 F.3d 711 ( 2007 )

Sarah Borse v. Piece Goods Shop, Inc , 963 F.2d 611 ( 1992 )

United States v. Stabile , 633 F.3d 219 ( 2011 )

in-re-new-valley-corporation-debtor-new-valley-corporation-co-brooke , 181 F.3d 517 ( 1999 )

Monsanto Company v. Rohm & Haas Company , 456 F.2d 592 ( 1972 )

daulph-kline-terry-kline-individually-and-on-behalf-of-all-others , 386 F.3d 246 ( 2004 )

Thomas J. O'DOnnell v. United States , 891 F.2d 1079 ( 1989 )

Highmark, Incorporated v. Upmc Health Plan, Incorporated , 276 F.3d 160 ( 2001 )

notra-trulock-iii-linda-conrad-v-louis-j-freeh-in-his-personal-capacity , 275 F.3d 391 ( 2001 )

hohe-mary-a-cassel-timothy-l-clover-joseph-f-iii-clover-vickie-m , 868 F.2d 69 ( 1989 )

louis-gaudiosi-charles-schwartz-and-randolph-phillips-individually-and , 269 F.2d 873 ( 1959 )

northeast-womens-center-inc-in-no-88-1268-v-michael-mcmonagle-joseph , 868 F.2d 1342 ( 1989 )

s-r-corporation-and-steven-durst-v-jiffy-lube-international-inc-a , 968 F.2d 371 ( 1992 )

Donna Shondel and Mark J. McKechnie v. Thomas M. McDermott ... , 775 F.2d 859 ( 1985 )

United States v. Jerome T. Heckenkamp, United States of ... , 482 F.3d 1142 ( 2007 )

Precision Instrument Manufacturing Co. v. Automotive ... , 65 S. Ct. 993 ( 1945 )

Stengart v. Loving Care Agency, Inc. , 201 N.J. 300 ( 2010 )

Keystone Driller Co. v. General Excavator Co. , 54 S. Ct. 146 ( 1933 )

Hennessey v. Coastal Eagle Point Oil Co. , 129 N.J. 81 ( 1992 )

View All Authorities »