Epic Systems Corporation v. Tata Consultancy Services Limi ( 2020 )


Menu:
  •                                In the
    United States Court of Appeals
    For the Seventh Circuit
    ____________________
    Nos. 19‐1528 & 19‐1613
    EPIC SYSTEMS CORP.,
    Plaintiff/Counterclaim Defendant‐Appellee/Cross‐Appellant,
    v.
    TATA CONSULTANCY SERVICES LTD. & TATA AMERICA
    INTERNATIONAL CORP. d/b/a TCS AMERICA,
    Defendants/Counterclaim Plaintiffs‐Appellants/Cross‐Appellees.
    ____________________
    Appeal from the United States District Court for the
    Western District of Wisconsin.
    No. 14‐cv‐748 — William M. Conley, Judge.
    ____________________
    ARGUED JANUARY 16, 2020 — DECIDED AUGUST 20, 2020
    AMENDED NOVEMBER 19, 2020
    ____________________
    Before FLAUM, MANION, and KANNE, Circuit Judges.
    KANNE, Circuit Judge. Without permission from Epic Sys‐
    tems, Tata Consultancy Services (“TCS”)1 downloaded, from
    1 Tata Consultancy Services Limited is an Indian company; Tata
    America International Corp. is a New York corporation that is wholly
    2                                           Nos. 19‐1528 & 19‐1613
    2012 to 2014, thousands of documents containing Epic’s con‐
    fidential information and trade secrets. TCS used some of this
    information to create a “comparative analysis”—a spread‐
    sheet comparing TCS’s health‐record software (called “Med
    Mantra”) to Epic’s software. TCS’s internal communications
    show that TCS used this spreadsheet in an attempt to enter
    the United States health‐record‐software market, steal Epic’s
    client, and address key gaps in TCS’s own Med Mantra soft‐
    ware.
    Epic sued TCS, alleging that TCS unlawfully accessed and
    used Epic’s confidential information and trade secrets. A jury
    ruled in Epic’s favor on all claims, including multiple Wiscon‐
    sin tort claims. The jury then awarded Epic $140 million in
    compensatory damages, for the benefit TCS received from us‐
    ing the comparative‐analysis spreadsheet; $100 million for the
    benefit TCS received from using Epic’s other confidential in‐
    formation; and $700 million in punitive damages for TCS’s
    conduct.
    Ruling on TCS’s motions for judgment as a matter of law,
    the district court upheld the $140 million compensatory
    award and vacated the $100 million award. It then reduced
    the punitive‐damages award to $280 million, reflecting Wis‐
    consin’s statutory punitive‐damages cap. Both parties ap‐
    pealed different aspects of the district court’s rulings.
    We agree with the district court that there is sufficient ev‐
    idence for the jury’s $140 million verdict based on TCS’s use
    of the comparative analysis, but not for the $100 million ver‐
    dict for uses of “other information.” We also agree with the
    owned by Tata Consultancy Services. We refer to these companies collec‐
    tively as “TCS.”
    Nos. 19‐1528 & 19‐1613                                        3
    district court that the jury could punish TCS by imposing pu‐
    nitive damages. But the $280 million punitive‐damages award
    is constitutionally excessive, so we remand to the district
    court with instructions to reduce the punitive‐damages
    award.
    I. BACKGROUND
    Epic Systems is a leading developer of electronic‐health‐
    record software. This software aims to improve patients’ qual‐
    ity of care by keeping relevant information about patients—
    like patient schedules and billing records—in a central loca‐
    tion. Epic provides versions of this software to some of the top
    hospitals in the United States. Each customer licenses from
    Epic software applications (modules) to fit the customer’s spe‐
    cific needs. The customer can then customize the software to
    ensure it operates properly within the customer’s organiza‐
    tional structure.
    The complexity of Epic’s health‐record system requires
    Epic’s customers to consistently update and test their sys‐
    tems. To facilitate this process, Epic provides its customers
    with access to a web portal called “UserWeb.” UserWeb pro‐
    vides various resources—including administrative guides,
    training materials, and software updates—and it also sup‐
    plies an online forum where Epic’s customers can share infor‐
    mation.
    Along with these helpful resources, UserWeb contains
    confidential information about Epic’s health‐record software.
    To protect this information, Epic restricts who can access the
    UserWeb portal. Epic’s customers, who have access, are re‐
    quired to maintain the confidentiality of this information, and
    4                                      Nos. 19‐1528 & 19‐1613
    they are expected to allow specific individuals access to this
    sensitive information on a “need‐to‐know” basis only.
    To guard this confidentiality, Epic allows only creden‐
    tialed users to access UserWeb; to get credentialed, users must
    prove they are either a customer or a consultant. Customers
    get access to all features and documents related to the mod‐
    ules they license from Epic. Consultants—who are hired by
    customers to implement and test Epic’s software—cannot ac‐
    cess features like the discussion forum and training materials.
    In 2003, Kaiser Permanente—the largest managed‐
    healthcare organization in the United States—obtained a li‐
    cense from Epic to use KP HealthConnect, a Kaiser‐specific
    version of Epic’s electronic‐health‐record software. Because of
    Kaiser’s size, implementation of KP HealthConnect is highly
    complex; testing and tweaking it after each update is compli‐
    cated and time consuming.
    For help with these tasks, Kaiser hired TCS in 2011. TCS
    provides information‐technology services, like software test‐
    ing and consulting, on a global basis. But TCS also has its own
    electronic‐health‐record software, Med Mantra, which at the
    time was predominately sold in India.
    Epic was aware of this conflict of interest and was con‐
    cerned about TCS’s relationship with Kaiser. Still, Kaiser used
    TCS to test KP HealthConnect. But to fulfill its obligation of
    confidentiality to Epic, Kaiser imposed rules for TCS to follow
    while working on Kaiser’s account.
    First, TCS was required to perform all services related to
    KP HealthConnect at Kaiser offices in the United States or off‐
    shore development centers—approved facilities outside the
    United States.
    Nos. 19‐1528 & 19‐1613                                         5
    Second, TCS was required to follow strict security proto‐
    cols at the offshore development centers. Desktop computers
    used to work on KP HealthConnect could be used only for
    Kaiser‐related work. To ensure these computers could not ac‐
    cess the internet or TCS’s email system, a firewall was in‐
    stalled. Other computers at the offshore facilities could access
    TCS’s network and email system but were not allowed to ac‐
    cess KP HealthConnect material.
    TCS, while operating under these strict requirements, pro‐
    vided testing and support services to Kaiser. But TCS employ‐
    ees claimed they could perform the required tasks more effi‐
    ciently if they had full access to UserWeb. Kaiser repeatedly
    asked Epic to grant TCS this access; Epic repeatedly declined
    to do so.
    Unsatisfied with this lack of access, in late 2011, TCS found
    a way to gain unfettered access to all the information available
    on UserWeb: the key was Ramesh Gajaram. TCS hired Gaja‐
    ram to work on the Kaiser account from an offshore develop‐
    ment center in Chennai, India. Before working for TCS, Gaja‐
    ram worked for a different company that also helped Kaiser
    test KP HealthConnect. While working for that company,
    Gajaram falsely identified himself to Epic as a Kaiser em‐
    ployee, and Epic granted Gajaram full access to UserWeb.
    Gajaram informed his superior at TCS, Mukesh Kumar,
    that he still had access to UserWeb. At Kumar’s request, Gaja‐
    ram accessed the UserWeb portal. Gajaram also shared his
    login credentials with other employees at the Chennai off‐
    shore development center. A few years later, Gajaram trans‐
    ferred to TCS’s Portland, Oregon office; he again shared his
    UserWeb login credentials with at least one other TCS em‐
    ployee.
    6                                      Nos. 19‐1528 & 19‐1613
    Thanks to Gajaram’s actions, dozens of TCS employees
    gained unauthorized access to UserWeb. And from 2012 to
    2014, TCS employees accessed UserWeb thousands of times
    and downloaded over 6,000 documents (1,600 unique docu‐
    ments) totaling over 150,000 pages. These documents con‐
    tained Epic’s confidential information, including some of its
    trade secrets. And not all of this information related to TCS’s
    work for Kaiser; employees downloaded information related
    to a medical‐laboratory module that Kaiser does not license
    from Epic.
    This unauthorized access came to light in early 2014, when
    Philip Guionnet, a TCS employee, attended meetings concern‐
    ing the Med Mantra software. At the first meeting, Guionnet
    observed a demonstration of Med Mantra for Kaiser execu‐
    tives. Guionnet was “astounded”; he had seen Med Mantra
    several times before and believed the software had dramati‐
    cally improved.
    After this meeting, Guionnet was concerned that “some of
    the information from Kaiser had been used to improve Med
    Mantra.” So, Guionnet visited the Med Mantra product devel‐
    opment team. During his visit, a TCS employee showed
    Guionnet a spreadsheet that compared Med Mantra to Epic’s
    electronic‐health‐record software. The spreadsheet com‐
    pared, in some detail, the functionalities of the two products.
    Guionnet believed this spreadsheet confirmed his suspicion
    that information regarding Kaiser’s version of Epic’s software
    had been used to improve Med Mantra. Guionnet then asked
    for a copy of this spreadsheet. What he received instead was
    a less‐detailed document referred to as the “comparative anal‐
    ysis.”
    Nos. 19‐1528 & 19‐1613                                                 7
    The comparative analysis—a key document in this ap‐
    peal—was created as a part of TCS’s effort to see if it could
    sell Med Mantra in the United States. Specifically, TCS
    wanted to sell Med Mantra directly to Kaiser, who was using
    Epic’s software, and wanted to be sure that “key gaps” in Med
    Mantra were addressed before this attempted sale. So, TCS
    gave a consultant from the Med Mantra team the task of cre‐
    ating a comparison between Med Mantra and Epic’s software.
    In doing so, this employee worked with “Subject Matter Ex‐
    perts”—employees who had experience with Epic’s soft‐
    ware—and created the comparative analysis that was ulti‐
    mately sent to Guionnet.
    The comparative analysis is an 11‐page spreadsheet that
    compares Med Mantra to Epic’s software. The first page lists
    33 modules, and it notes whether the module is available in
    Med Mantra and Epic’s software; the next 10 pages list Med
    Mantra’s functions and note whether Epic’s software contains
    the same functions. Multiple TCS employees confirmed that
    the information used in this comparative analysis is not pub‐
    licly available.2
    Guionnet—after attending these meetings and viewing
    the comparative analysis—reported his concerns in June 2014
    to TCS, Kaiser, and Epic employees. Epic and Kaiser immedi‐
    ately investigated Guionnet’s claim and discovered that TCS
    employees had gained unauthorized access to UserWeb. But
    TCS employees were less than forthcoming during Kaiser’s
    2 In fact, TCS was barred from arguing that the comparative analysis
    was created from information in publicly available sources because it
    failed to “direct the court to any evidence that the comparative analysis
    was created from such sources.”
    8                                       Nos. 19‐1528 & 19‐1613
    investigation; multiple TCS employees lied to investigators
    about TCS’s access to UserWeb.
    A few months later, Epic filed suit against TCS, alleging
    that TCS used fraudulent means to access and steal Epic’s
    trade secrets and other confidential information. During a
    contentious year‐and‐a‐half discovery process, Epic learned
    that TCS had failed to preserve relevant evidence. The district
    court sanctioned TCS for its discovery failures by ultimately
    providing the jury with an adverse‐inference instruction:
    If you find by a preponderance of the evidence that
    Epic has proven TCS both: (1) intentionally de‐
    stroyed evidence (or intentionally caused evidence
    to be destroyed), and (2) caused the evidence to be
    destroyed in bad faith, then you may assume that
    this evidence contained information helpful to Epic
    and harmful to TCS.
    The district court bifurcated proceedings into a liability
    phase and a damages phase. The liability phase began in April
    2016. The jury returned a verdict in favor of Epic on all claims,
    including those under Wisconsin law for breach of contract,
    fraudulent misrepresentation, misappropriation of trade se‐
    crets, unfair competition, deprivation of property, and unjust
    enrichment.
    Before the damages phase of trial, Epic presented the dis‐
    trict court with evidence it sought to present to the jury re‐
    garding the benefit TCS received by using Epic’s confidential
    information and trade secrets. Epic’s expert, Thomas Britven,
    initially based his damages calculation on costs Epic incurred
    developing the modules underlying all the documents TCS
    stole. But the district court concluded that the evidence did
    not support Epic’s broad claims of the use to which TCS put
    Nos. 19‐1528 & 19‐1613                                       9
    the stolen information. The district court accordingly rejected
    Epic’s initial damages proffer but gave Epic another oppor‐
    tunity to present evidence of TCS’s uses of the stolen infor‐
    mation and the value of those uses to TCS.
    Epic went back to the drawing board and returned to the
    district court with a new, more limited theory of damages.
    Britven based his new calculation on only the confidential in‐
    formation and trade secrets that were incorporated into the
    comparative analysis spreadsheet. This calculation still used
    a proxy for the benefit TCS received: the costs Epic incurred
    in developing these specific software modules—accounting
    for coding costs that did not benefit TCS and technology de‐
    cay over time. The district court accepted this “ratchet[ed]
    back” damages theory, noting the new calculation “more ap‐
    proximates what was actually received and apparently used
    by [TCS] both in the comparative model but also what were
    ongoing discussions by marketing people within [TCS].”
    During the damages trial, Epic presented two witnesses:
    Stirling Martin and Britven. Martin used a chart that both
    identified which Epic modules were reflected in TCS’s down‐
    loads and identified, with a checkmark, which of these mod‐
    ules were reflected in the comparative analysis. Martin testi‐
    fied about what stolen information was incorporated into the
    comparative analysis. Britven then presented a calculation of
    the value TCS received by avoiding research and develop‐
    ment costs they would have incurred without the stolen in‐
    formation. First, Britven identified how much it cost Epic to
    develop the modules related to the trade secrets and confiden‐
    tial information that made their way into the comparative
    analysis. Then, Britven adjusted this number based on certain
    coding costs (which conferred no benefit on TCS) and the
    10                                      Nos. 19‐1528 & 19‐1613
    decay in the value of technology over time. He reached an ap‐
    proximate benefit to TCS of about $200 million.
    TCS called its damages expert—Brent Bersin—to testify
    about the value of the benefit TCS received related to the com‐
    parative analysis. Bersin testified that Epic was not entitled to
    an award of economic damages, but he also testified that
    Britven incorrectly calculated the damages. Specifically, Ber‐
    sin pointed out that Britven’s calculation failed to account for
    reduced labor costs in India; TCS could pay its India‐based
    engineers about 30% to 40% less than Epic would have to pay
    its engineers to develop the same software.
    At the end of the damages trial, the district court gave the
    jury a special‐verdict form concerning compensatory dam‐
    ages. The jury was asked to determine the amount of dam‐
    ages, if any, to which Epic was entitled based on (a) the “Ben‐
    efit of TCS’s Use of [the] Comparative Analysis,” and (b) the
    “Benefit of TCS’s Use of Other Confidential Information.” The
    jury was also asked to determine whether Epic should be
    awarded punitive damages, and if so, in what amount.
    The jury returned a $940 million total damages award:
    $140 million for uses of the comparative analysis, $100 million
    for uses of “other” confidential information, and $700 million
    in punitive damages. The district court entered an injunction
    prohibiting TCS from using, possessing, or retaining any of
    Epic’s trade secrets or confidential information.
    The court then addressed several post‐trial motions, in‐
    cluding TCS’s three motions for judgment as a matter of law
    on liability and damages. Fed. R. Civ. P. 50(a). The district
    court upheld the jury’s liability verdict and its $140 million
    compensatory‐damages award based on TCS’s uses of the
    Nos. 19‐1528 & 19‐1613                                        11
    comparative analysis, which contained Epic’s information.
    But the district court struck the $100 million compensatory
    award for “other uses” of Epic’s confidential information and
    also reduced the punitive‐damages award to $280 million
    based on a Wisconsin statutory cap on punitive damages. See
    Wis. Stat. § 895.043(6).
    TCS then filed a post‐judgment motion under Rules 50(b)
    and 59, again seeking judgment as a matter of law, or in the
    alternative, a new trial. But this motion “largely repeat[ed] the
    same arguments previously raised in [TCS’s] Rule 50(a) mo‐
    tion.” The district court denied this new motion, leaving in‐
    tact the $140 million compensatory award based on the com‐
    parative analysis. It also upheld the previously reduced $280
    million punitive‐damages award, noting that its prior deci‐
    sion to vacate part of the compensatory‐damages award
    “does not undermine the jury’s award of punitive damages.”
    II. ANALYSIS
    Both parties appealed different aspects of the district
    court’s post‐trial rulings. TCS challenges the district court’s
    decision to leave intact the $140 million compensatory award
    related to the comparative analysis. TCS also challenges the
    district court’s punitive damages decisions. On cross‐appeal,
    Epic challenges the district court’s decision to vacate the $100
    million compensatory award based on “other uses” of Epic’s
    confidential information.
    We first note what law applies to these appeals. Jurisdic‐
    tion in this case is based on diversity of citizenship and a fed‐
    eral question (with supplemental jurisdiction over the state‐
    law claims). When hearing state‐law claims that arise under
    diversity jurisdiction, 28 U.S.C. § 1332, or supplemental
    12                                      Nos. 19‐1528 & 19‐1613
    jurisdiction
    , id. § 1367, federal
    courts are “obliged to follow
    state decisional law, as well as all other state law.” Houben v.
    Telular Corp., 
    309 F.3d 1028
    , 1032 (7th Cir. 2002). And when a
    federal jury awards compensatory damages based on a state‐
    law claim, state law applies to our review of that damages
    award. Kaiser v. Johnson & Johnson, 
    947 F.3d 996
    , 1019 (7th Cir.
    2020). Similarly, when state law provides the basis for liabil‐
    ity, the punitive‐damages award must be consistent with state
    law. See Kapelanski v. Johnson, 
    390 F.3d 525
    , 534 (7th Cir. 2004).
    Epic’s damages award for unjust enrichment was based on
    its claims under Wisconsin law for misappropriation of its
    trade secrets and confidential information. And its award of
    punitive damages had to be based on Epic’s Wisconsin law
    “trade secrets, fraudulent misrepresentation[,] and unfair
    competition claims.”
    Wisconsin law therefore applies to the parties’ substantive
    challenges of these damages awards. With that in mind, we
    address the parties’ challenges to the district court’s decisions
    regarding compensatory damages. We then turn to TCS’s ar‐
    guments concerning punitive damages.
    A. “Comparative Analysis” Compensatory Award
    The jury awarded Epic $140 million in compensatory dam‐
    ages based on the benefit TCS derived from using the com‐
    parative analysis, which contained some of Epic’s confidential
    information. The district court upheld this award on two oc‐
    casions: first, when ruling on TCS’s post‐trial motion for judg‐
    ment as a matter of law, Fed. R. Civ. P. 50(a); and second,
    when ruling on TCS’s renewed motion for judgment as a mat‐
    ter of law
    , id. 50(b),
    and motion for a new trial
    , id. 59.
    Nos. 19‐1528 & 19‐1613                                          13
    We review a district court’s denial of a motion for judg‐
    ment as a matter of law de novo. Empress Casino Joliet Corp. v.
    Balmoral Racing Club, Inc., 
    831 F.3d 815
    , 822 (7th Cir. 2016); see
    also Abellan v. Lavelo Prop. Mgmt., LLC, 
    948 F.3d 820
    , 827 (7th
    Cir. 2020) (applying Rule 50 and reviewing the district court’s
    decision de novo when state substantive law applied). “Thus,
    like the district court, we decide whether the jury had ‘a le‐
    gally sufficient evidentiary basis’ for its verdict.” May v.
    Chrysler Grp., LLC, 
    716 F.3d 963
    , 971 (7th Cir. 2013) (per cu‐
    riam) (quoting Fed. R. Civ. P. 50(a)(1)). In doing so, we con‐
    strue all evidence in the record—and inferences that can be
    reasonably drawn from that evidence—in favor of the party
    that prevailed at trial on the issue; that party here is Epic. 
    May, 716 F.3d at 971
    . This is a high burden for the moving party to
    satisfy: we reverse the verdict “only if no rational jury could
    have found in [Epic’s] favor.” Andy Mohr Truck Ctr., Inc. v.
    Volvo Trucks N. Am., 
    869 F.3d 598
    , 602 (7th Cir. 2017). Addi‐
    tionally, we review a district court’s denial of a motion for a
    new trial under Rule 59 for an abuse of discretion. 
    Abellan, 948 F.3d at 830
    .
    TCS argues it is entitled to judgment as a matter of law on
    this compensatory‐damages award because there is no logical
    connection between the basis for liability and the jury’s dam‐
    ages verdict. Specifically, TCS argues that a reasonable jury
    could not find that TCS received a $140 million benefit by in‐
    corporating Epic’s confidential information and trade secrets
    into what TCS characterizes as a “stale marketing document.”
    Unjust enrichment damages are available as a remedy for
    a defendant’s misappropriation of trade secrets, Wis. Stat.
    § 134.90, and are also available as a remedy for Wisconsin tort
    claims, see Pro‐Pac, Inc. v. WOW Logistics Co., 
    721 F.3d 781
    , 786
    14                                       Nos. 19‐1528 & 19‐1613
    (7th Cir. 2013). An action for recovery seeking unjust enrich‐
    ment damages is “grounded on the moral principle that one
    who has received a benefit has a duty to make restitution
    where retaining such a benefit would be unjust.” Watts v.
    Watts, 
    405 N.W.2d 303
    , 313 (Wis. 1987).
    Because the recovery of unjust enrichment damages is
    grounded in equitable principles, Wisconsin law limits the
    measure of unjust enrichment damages to the value of the
    “benefit conferred upon the defendant.” Mgmt. Comput.
    Servs., Inc. v. Hawkins, Ash, Baptie & Co., 
    557 N.W.2d 67
    , 79–80
    (Wis. 1996); cf. Halverson v. River Falls Youth Hockey Ass’n, 
    593 N.W.2d 895
    , 900 (Wis. Ct. App. 1999) (“Making improvements
    alone does not prove the [defendant] received any benefit
    from them.”). Unjust enrichment damages must be proven
    with reasonable certainty, Mgmt. Comput. 
    Servs., 557 N.W.2d at 80
    , and any costs the plaintiff may have incurred are “gen‐
    erally irrelevant,” Lindquist Ford, Inc. v. Middleton Motors, Inc.,
    
    557 F.3d 469
    , 477 (7th Cir. 2009).
    But the reasonable value of the benefit conferred on a de‐
    fendant can be measured in a variety of ways. In ordinary un‐
    just enrichment cases involving money or services, the
    amount of recovery “is the amount of money advanced or the
    reasonable value of the services rendered.” Shulse v. City of
    Mayville, 
    271 N.W. 643
    , 647 (Wis. 1937). In other cases, a ben‐
    efit is conferred under circumstances in which the “benefactor
    reasonably believes that he will be paid,” so the benefactor
    may be entitled to receive damages equaling “the market
    value of the benefit.” Cosgrove v. Bartolotta, 
    150 F.3d 729
    , 734
    (7th Cir. 1998). And the Restatement of Restitution and Unjust
    Enrichment—which Wisconsin courts treat as persuasive au‐
    thority, see, e.g., Buckett v. Jante, 
    767 N.W.2d 376
    , 382–83 (Wis.
    Nos. 19‐1528 & 19‐1613                                        15
    Ct. App. 2009)—provides many examples of how to calculate
    the benefit conferred on a defendant depending on the con‐
    text in which that benefit is received. See, e.g., Restatement
    (Third) of Restitution and Unjust Enrichment § 41 (2011)
    (providing guidance on how to calculate the benefit conferred
    on the defendant in cases involving the misappropriation of
    financial assets).
    Simply put, there is no single way to measure the benefit
    conferred on a defendant; the measurement is context de‐
    pendent. The important considerations are that a judge or jury
    calculates the benefit to the defendant—not the loss to the
    plaintiff—and that this calculation is done with reasonable
    certainty. See, e.g., Mgmt. Comput. 
    Servs., 557 N.W.2d at 80
    (holding that evidence of lost profits is insufficient for a “fair
    and reasonable approximation of unjust enrichment dam‐
    ages” because “unjust enrichment is not measured by the
    plaintiff’s loss”); W.H. Fuller Co. v. Seater, 
    595 N.W.2d 96
    , 100
    (Wis. Ct. App. 1999) (remanding with instructions for the trial
    court to first determine which of the plaintiff’s services the de‐
    fendant actually benefited from and then determine the value
    of that benefit).
    Following this general approach, we have noted at least
    one way a plaintiff may prove the amount of benefit conferred
    on the defendant when the case involved misappropriation of
    trade secrets. In 3M v. Pribyl, we upheld the jury’s liability
    finding concerning the defendant’s misappropriation of 3M’s
    trade secret (operating procedures and manuals). 
    259 F.3d 587
    , 595–97 (7th Cir. 2001) (applying Wisconsin trade secret
    law). We found in the record sufficient evidence that the de‐
    fendants used the misappropriated operating procedures and
    manuals to gain “a significant head start in their operation.”
    16                                       Nos. 19‐1528 & 19‐1613
    Id. at 596.
    While this trade secret was not used directly to de‐
    velop a new product and was not tied to any of the defend‐
    ant’s specific profits, we affirmed the jury’s liability verdict,
    and also noted that damages were awarded based on “what
    it would have cost the defendants to independently develop
    the trade secrets at issue.”
    Id. at 607.
        So, avoided research and development costs have been
    awarded when the defendants gained a significant head start
    in their operations.
    TCS believes that avoided research and development costs
    are not a reasonable proxy for the benefit it received from the
    comparative analysis. TCS assumes that Epic could prove
    only that the comparative analysis was used as a “stale mar‐
    keting document.” Additionally, TCS argues that Britven—
    Epic’s damages expert—made a fundamental error under
    Wisconsin law: he based his unjust enrichment damages on
    Epic’s cost rather than TCS’s benefit. So, TCS reasons, the dam‐
    ages awarded based on this calculation must fail as a matter
    of law.
    We disagree. Calculating the benefit conferred on a de‐
    fendant to determine unjust enrichment damages is a context‐
    specific analysis. Under Wisconsin law, the jury could award
    avoided research and development costs based on TCS gain‐
    ing a “significant head start in [its] operation.”
    Id. at 596.
    And,
    viewing the evidence in the light most favorable to Epic, the
    jury would have a sufficient basis to award Epic $140 million
    in compensatory damages based on the “head start” TCS
    gained in development and competition. That “head start,”
    the jury could conclude, came from TCS’s use of the compar‐
    ative analysis and thus the stolen information incorporated
    into that analysis. Furthermore, the jury could base its award
    Nos. 19‐1528 & 19‐1613                                        17
    on the benefit TCS received from avoided research and devel‐
    opment costs, not the cost Epic incurred when creating the
    same information.
    Let’s turn from the legal theory that supports the jury ver‐
    dict to the evidence that supports the damages award. First,
    Epic presented evidence that TCS stole confidential infor‐
    mation and trade secrets from Epic’s UserWeb. Gajaram, a
    TCS employee, testified that he improperly obtained creden‐
    tials that allowed him to view UserWeb in its entirety. Gaja‐
    ram also testified that he shared his credentials with other
    TCS employees. Stirling Martin, Epic’s senior vice president,
    testified that he determined TCS employees downloaded at
    least 1,600 unique files from UserWeb in two years. Martin
    confirmed that these files contained confidential information,
    including trade secrets.
    The jury also saw slides from a TCS PowerPoint presenta‐
    tion showing that TCS strategized as to how it could start sell‐
    ing electronic‐health‐record software in the United States.
    TCS noted in this PowerPoint, however, that there were “key
    gaps” in Med Mantra that TCS would need to address before
    selling it to United States companies. In a deposition played
    for the jury, a TCS employee confirmed that TCS wanted to
    “implement” Med Mantra at Kaiser, one of Epic’s biggest cus‐
    tomers, and that he was asked to create the comparative anal‐
    ysis to help achieve this goal. This employee also testified that
    he refused to create the comparative analysis because he did
    not want to get in trouble for disclosing Epic’s confidential in‐
    formation. Still, the jury saw internal emails showing that TCS
    found a willing participant and the comparative analysis was
    created.
    18                                     Nos. 19‐1528 & 19‐1613
    The jury also heard Guionnet testify that TCS wanted to
    find a way to implement “Med Mantra, either as a whole or
    in modules, in the U.S.” To that end, Guionnet testified that
    TCS worked with DaVita to develop a lab module. And the
    PowerPoint slides shown to the jury show that TCS—as a part
    of its United States entry strategy—would use DaVita “as a
    reference site to promote Lab Management solution[s] to Hos‐
    pitals and Independent Laboratories.” This lab module was a
    success; an email shown to the jury indicated that TCS
    planned on “marketing the [l]ab product as a starter immedi‐
    ately to position [itself] in the Provider space.”
    Additionally, Epic presented evidence that, based on
    TCS’s discovery violations, would allow it to draw an adverse
    inference against TCS. The jury heard evidence that TCS
    failed to preserve proxy logs that would have indicated who
    accessed UserWeb and when. It also heard that TCS failed to
    preserve the contents of its computer hard drives. So, the jury
    could conclude that TCS destroyed evidence of additional
    downloaded documents that “contained information helpful
    to Epic and harmful to TCS.”
    The jury could conclude, based on all the evidence we’ve
    described, that TCS used Epic’s stolen confidential infor‐
    mation, including trade secrets, to create the comparative
    analysis. Then, the jury could infer from the evidence that the
    comparative analysis was used for a variety of purposes.
    These purposes include: attempting to sell Med Mantra to
    Kaiser, one of Epic’s largest customers; attempting to enter the
    United States market and compete directly with Epic; and ad‐
    dressing any key gaps in Med Mantra, potentially by improv‐
    ing the product. These findings are bolstered by the adverse
    Nos. 19‐1528 & 19‐1613                                      19
    inference against TCS—an inference that would allow the jury
    to conclude that more documents harmful to TCS existed.
    The jury could therefore find that TCS’s benefit, based on
    TCS’s use of the comparative analysis, was a “head start” in
    competition and development. Indeed, the evidence allowed
    a jury to conclude that TCS used Epic’s confidential infor‐
    mation to thoroughly evaluate what it would take to compete
    in a new market. In other words, a jury could conclude that
    TCS had a free shot—using stolen information—to determine
    whether it would be profitable to improve Med Mantra and
    implement a variety of tactics to enter the United States elec‐
    tronic‐health‐record market. Based on these intermediate
    findings, a jury could determine that a reasonable valuation
    of this benefit is the cost TCS avoided by not having to de‐
    velop this information by itself.
    And the jury could value that benefit—avoided research
    and development costs—at $140 million. Martin testified that
    information taken from UserWeb was incorporated into the
    comparative analysis. He explained that the stolen infor‐
    mation corresponded to specific modules of Epic’s software;
    so, Martin broke down for the jury which information, corre‐
    sponding to specific modules, had been embedded in the
    comparative analysis. Martin then showed the jury an exhibit
    on which he placed a checkmark by each module of Epic’s
    software that he believed made its way into the comparative
    analysis.
    Britven then calculated TCS’s benefit from avoiding the
    cost of researching and developing the stolen modules that
    were incorporated into the comparative analysis. He started
    by calculating Epic’s cost in developing all of the information
    taken by TCS; he then reduced that number to reflect only the
    20                                     Nos. 19‐1528 & 19‐1613
    cost Epic incurred from developing modules incorporated
    into the comparative analysis. A few more reductions were
    made: one subtracting the costs of Epic’s coding that TCS did
    not receive, and one reflecting the decayed value of technol‐
    ogy over time. Britven concluded, based on this calculation,
    that TCS received a $200 million benefit even though “Epic
    incurred [$]306 million to develop those same trade secrets
    and confidential information.”
    TCS’s expert, Bersin, testified about what he believed to be
    missing from Britven’s calculation: a labor‐cost reduction. He
    explained that Med Mantra’s development team is located in
    India, where labor costs are 30–40% less than in the United
    States, where Epic developed its software. So, he reasoned,
    TCS’s avoided research and development costs should be 30–
    40% less than the $200 million Britven calculated. And apply‐
    ing a 30% reduction to Britven’s $200 million benefit value
    leaves you with an estimated $140 million in avoided research
    and development costs—the exact amount of damages
    awarded by the jury.
    In sum, the jury had a sufficient basis to reach the $140
    million “comparative analysis” compensatory award. TCS’s
    argument to the contrary relies on the assumption that the
    comparative analysis was used as nothing more than a stale
    marketing document. But the jury was presented with evi‐
    dence that would allow it to conclude the comparative analy‐
    sis was not just a stale marketing document; the comparative
    analysis—and therefore Epic’s information—was used to help
    TCS evaluate its United States entry strategy and potentially
    even address key gaps in Med Mantra by improving the prod‐
    uct. The evidence also allowed the jury to conclude that
    avoided research and development costs were a reasonable
    Nos. 19‐1528 & 19‐1613                                         21
    valuation of the benefit TCS received from using the compar‐
    ative analysis, which contained stolen information. Likewise,
    using avoided research and development costs as the valua‐
    tion of TCS’s benefit, the jury could have reached a $140 mil‐
    lion compensatory award. Importantly, it could do so without
    equating Epic’s development costs ($306 million, by Britven’s
    estimate) to TCS’s benefit from using Epic’s information in the
    comparative analysis. So, we agree with the district court’s
    decisions to uphold this damages verdict and deny TCS’s mo‐
    tion for a new trial.
    TCS’s next argument concerns the punitive‐damages
    award. But before we shift to punitive damages, we address
    Epic’s cross‐appeal of the district court’s decision to vacate the
    jury’s $100 million compensatory‐damages award for TCS’s
    “other uses” of Epic’s confidential information.
    B. “Other Confidential Information” Compensatory Award
    The district court presented the jury with a special‐verdict
    form that allowed it to award damages based on (a) the bene‐
    fit of TCS’s use of the comparative analysis and (b) the benefit
    of TCS’s use of other confidential information. The district
    court included “part b” of the verdict because “there was
    some evidence that other confidential information was dis‐
    seminated ‘out beyond the specific people who discussed the
    comparative analysis.’”
    The jury initially awarded $100 million for “the benefit of
    TCS’s use of other confidential information” in addition to the
    $140 million awarded for the “benefit of TCS’s use of [the]
    comparative analysis.” But, in partially granting TCS’s Rule
    50 motion for judgment as a matter of law, the district court
    held that this $100 million award for benefits from “other
    22                                      Nos. 19‐1528 & 19‐1613
    information” was too speculative and was “tied to no evi‐
    dence of specific use at all.”
    We review a district court’s decision to grant judgment as
    a matter of law de novo. Passananti v. Cook County, 
    689 F.3d 655
    ,
    659 (7th Cir. 2012). “Our job is to assure that the jury had a
    legally sufficient evidentiary basis for its verdict.” Filipovich v.
    K & R Express Sys., Inc., 
    391 F.3d 859
    , 863 (7th Cir. 2004). In
    deciding a Rule 50 motion, we “construe[] the evidence
    strictly in favor of the party who prevailed before the jury”
    and we do not make credibility determinations or reweigh the
    evidence. 
    Passananti, 689 F.3d at 659
    . Still, “a verdict sup‐
    ported by no evidence or a mere scintilla of evidence will not
    stand.” Martin v. Milwaukee County, 
    904 F.3d 544
    , 550 (7th Cir.
    2018).
    The specific verdict at issue here is the jury’s award of
    compensatory damages apart from those based on the com‐
    parative analysis. Under Wisconsin law, compensatory dam‐
    ages must be “proved with reasonable certainty.” Novo Indus.
    Corp. v. Nissen, 
    140 N.W.2d 280
    , 284 (Wis. 1966). This does not
    require the plaintiff to prove damages with “mathematical
    precision; rather, evidence of damages is sufficient if it ena‐
    bles the jury to make a fair and reasonable approximation.”
    Mgmt. Comput. 
    Servs., 557 N.W.2d at 80
    .
    Epic—to prove it was entitled to unjust enrichment dam‐
    ages for TCS’s use of other confidential information—needed
    to show that TCS used confidential information that was not
    incorporated into the comparative analysis. Epic says the jury
    heard evidence that would allow it to conclude that other con‐
    fidential information—that was not incorporated into the
    comparative analysis—was used to improve Med Mantra.
    Epic points to Guionnet’s testimony, testimony that TCS
    Nos. 19‐1528 & 19‐1613                                      23
    assigned a Med Mantra team member to the Kaiser account,
    testimony about TCS’s downloading of information unrelated
    to its work for Kaiser, and the adverse‐inference jury instruc‐
    tion in support of this theory. Epic also points to evidence it
    believes the jury could have used to reasonably determine
    that TCS received a $100 million benefit based on its use of
    this alleged other confidential information. But we believe the
    evidence isn’t enough to support the jury’s $100 million
    award.
    Let’s start with Guionnet’s testimony. Guionnet—a TCS
    manager responsible for the Kaiser account—testified that he
    attended a meeting where Med Mantra was presented to Kai‐
    ser executives. He left the meeting “astounded”; Med Mantra
    had improved significantly since the last time he had seen the
    software, and he “was concerned that some of the information
    from Kaiser had been used to improve Med Mantra.” Guion‐
    net then met with members of the Med Mantra team. A TCS
    employee—introduced to Guionnet as the “interface between
    Med Mantra” and the Kaiser team—showed Guionnet a
    “comparison … between Med Mantra and Epic.” Guionnet
    “basically … knew” at that point that TCS had improperly
    used Epic’s information.
    In a portion of Guionnet’s deposition played for the jury,
    Guionnet confirmed that he more than suspected that Epic’s
    information was used to improve Med Mantra: “it’s
    knowledge.” He stated that Epic’s “workflow, data model,
    functionalities, [and] test scripts” were used in Med Mantra’s
    development. But when pressed about how he knew Epic’s
    information was used to improve Med Mantra, Guionnet con‐
    sistently responded by saying “I don’t remember,” “I don’t
    24                                     Nos. 19‐1528 & 19‐1613
    remember the details,” or by saying he would have to go back
    and look at his emails.
    Guionnet then confronted TCS’s president with infor‐
    mation about TCS’s misconduct. But rather than initiating an
    investigation, TCS’s president transitioned Guionnet away
    from the Kaiser account and told him that if he did not tran‐
    sition “peacefully,” he would be “put … in a corner” and TCS
    would “make [his] life miserable.”
    This evidence is missing something: any proof that TCS
    used any confidential information besides the information in‐
    corporated into the comparative analysis. Guionnet testified
    that he knew TCS used Epic’s information to improve Med
    Mantra, but the evidence indicated that his knowledge came
    from reviewing the comparative analysis, only. And when
    pressed at his deposition about how he knew that Med Man‐
    tra improved, Guionnet provided nothing but a lack of
    memory and some general statements that Med Mantra had
    improved. Basically, Guionnet was unable to tie what he per‐
    ceived to be Med Mantra’s significant improvements to any
    “other information” besides the comparative analysis.
    Guionnet’s testimony about his meeting with the Med
    Mantra team does not add any support for the verdict. Guion‐
    net testified that at this meeting, he received a detailed run‐
    down of Med Mantra’s functionality. Additionally, a TCS em‐
    ployee showed him a spreadsheet comparing Med Mantra to
    Epic’s software. But this information is related to TCS’s use of
    the comparative analysis; it has nothing to do with Epic’s
    other confidential information. Guionnet’s testimony thus
    supports an inference that TCS used Epic’s confidential infor‐
    mation, but only the information that was incorporated into
    the comparative analysis.
    Nos. 19‐1528 & 19‐1613                                      25
    Epic next points to evidence that TCS assigned members
    of the Med Mantra team to the Kaiser account. Guionnet tes‐
    tified that “DV” Prasad “was a member of the Med Mantra
    team who was planted in [the Kaiser] organization.” And in a
    deposition played for the jury, Prasad stated that Reddy, a
    senior TCS executive, asked him to prepare a presentation
    comparing Med Mantra and Epic. Prasad then confirmed that
    he “never did” prepare the presentation because he knew it
    was “not right.” But even without Prasad’s compliance,
    Reddy found a willing employee and created the comparative
    analysis.
    Guionnet testified that he later caught wind that Prasad—
    a member of the Med Mantra team—was planted in the Kaiser
    organization. Guionnet attempted to get rid of Prasad imme‐
    diately; the head of TCS’s healthcare unit denied this request,
    leaving this “plant” on the Kaiser team.
    This evidence, contrary to Epic’s argument, has nothing to
    do with TCS’s uses of “other information.” Reddy made his
    intentions clear: Prasad was to use Epic’s confidential infor‐
    mation to compare Med Mantra to Epic’s software before at‐
    tempting to sell Med Mantra to Kaiser. This evidence shows
    only that Epic’s confidential information made its way into
    the comparative analysis, which was then used as part of an
    overall market‐entry strategy. Rather than proving that
    “other information” was used, this evidence simply provides
    additional support for the jury’s compensatory‐damages
    award for TCS’s use of the comparative analysis. So again, we
    see no evidence tying any of Epic’s other stolen confidential
    information to any use outside of the comparative analysis.
    In another attempt to show TCS used other confidential
    information to improve Med Mantra, Epic points to evidence
    26                                     Nos. 19‐1528 & 19‐1613
    regarding TCS’s laboratory module. First, Epic points to
    TCS’s PowerPoint, which acknowledges that there were key
    gaps in Med Mantra that needed to be addressed. And Martin
    testified that TCS employees stole information regarding
    Epic’s laboratory product, Beaker. Guionnet testified that TCS
    had partnered with DaVita to create its own laboratory mod‐
    ule. This project, however, fell behind and was described as
    “well below average” by an independent third party. Still, an
    email from a TCS employee showed that TCS was “very seri‐
    ously thinking” about “marketing the Lab product as a starter
    immediately to position [TCS] in the Provider space.” TCS
    later licensed the DaVita laboratory module to another United
    States company, Quest Diagnostics.
    But this is where evidence concerning Beaker ends. Epic
    asserts that the mere fact that TCS downloaded information
    about Beaker shows that “TCS used [its] confidential infor‐
    mation and trade secret information to improve the lab prod‐
    uct it developed for DaVita.” Yet Epic fails to provide any ex‐
    amples of how Epic’s modules or information, including the
    Beaker module, could be tied to uses or improvements involv‐
    ing the DaVita project. So, Epic presented evidence only that
    TCS downloaded information concerning Beaker; but it does
    not present evidence that TCS actually used this information.
    Without a link from this information to any use, Epic’s evi‐
    dence does not support a finding that TCS used “other confi‐
    dential information.”
    Epic attempts to plug the evidentiary holes described
    above by pointing to the adverse‐inference instruction. It’s
    true that—given the district court’s instruction—the jury
    heard evidence supporting an inference that TCS destroyed
    documents that were harmful to TCS and helpful to Epic. But
    Nos. 19‐1528 & 19‐1613                                           27
    even with this inference, there is still no concrete evidence
    showing that TCS used Epic’s “other information.”
    Epic is thus left asking a jury to award damages based
    solely on speculation as to what might be contained in the de‐
    stroyed documents. And if this type of broad adverse infer‐
    ence based on the destruction of evidence—standing alone—
    were enough to support a jury’s damages verdict, a jury could
    hypothetically award a plaintiff any amount of damages
    based on any theory of liability. This would be antithetical to
    the purpose of adverse‐inference instructions: sanctioning
    misconduct while leveling the evidentiary playing field. See
    Silvestri v. General Motors Corp., 
    271 F.3d 583
    , 590 (4th Cir.
    2001).
    To be clear, evidence supporting an adverse inference,
    combined with other relevant circumstantial evidence, may
    be a sufficient evidentiary basis for a jury’s verdict. See Aspen
    Tech., Inc. v. M3 Tech., Inc., 569 F. App’x 259, 266 (5th Cir. 2014)
    (finding the jury had a legally sufficient basis for its verdict
    based on circumstantial evidence and two adverse‐inference
    instructions); cf. Kronisch v. United States, 
    150 F.3d 112
    , 128 (2d
    Cir. 1998) (“[A]t the margin, where the innocent party has
    produced some (not insubstantial) evidence in support of his
    claim, the intentional destruction of relevant evidence … may
    push a claim that might not otherwise survive summary judg‐
    ment over the line.”). But the destruction of evidence—by it‐
    self—is insufficient to support a jury’s verdict as a matter of
    law. Cf. 
    Kronisch, 150 F.3d at 128
    (“We do not suggest that the
    destruction of evidence, standing alone, is enough to allow a
    party who has produced no evidence—or utterly inadequate
    evidence—in support of a given claim to survive summary
    judgment on that claim.”). See generally HK Sys., Inc. v. Eaton
    28                                          Nos. 19‐1528 & 19‐1613
    Corp., 
    553 F.3d 1086
    , 1088 (7th Cir. 2009) (noting that the
    standard is the same for summary judgment and for judg‐
    ment as a matter of law).
    So, if Epic were truly using the adverse inference to plug
    evidentiary holes, this verdict might survive. But the other ev‐
    idence on which Epic relies provides “utterly inadequate”
    support for a finding that TCS used confidential information
    apart from that incorporated into the comparative analysis.
    
    Kronisch, 150 F.3d at 128
    . As a result, Epic seeks to use the ad‐
    verse inference not just to plug evidentiary holes but to hold
    all the water for a finding that TCS used other confidential in‐
    formation. But Epic cannot rely on an adverse inference to do
    so much.
    In sum, Epic has not provided more than a mere scintilla
    of evidence in support of its theory that TCS used any of its
    other confidential information. This portion of the jury’s dam‐
    ages award cannot stand. With compensatory damages sorted
    out, we now turn to punitive damages.
    C. Punitive Damages
    In addition to the $240 million awarded in compensatory
    damages, the jury initially awarded Epic $700 million in pu‐
    nitive damages. The district court cut that award to $280 mil‐
    lion based on a Wisconsin law capping statutory damages at
    two times the amount of compensatory damages, Wis. Stat.
    § 895.043(6). 3 The district court then denied TCS’s renewed
    motion for judgment as a matter of law under Rule 50(b) and
    TCS’s motion for a new trial under Rule 59; the court
    3Recall that the district court also reduced the compensatory award
    by $100 million, leaving $140 million in compensatory damages and $280
    million in punitive damages.
    Nos. 19‐1528 & 19‐1613                                          29
    accordingly left the $280 million punitive‐damages award in‐
    tact, reasoning in part that its decision to vacate the jury’s $100
    million compensatory award for use of “other information”
    did not affect the jury’s punitive damages verdict.
    Whether the district court erred in denying TCS’s Rule 50
    motion is a question of law that we review de novo. Valdivia v.
    Twp. High Sch. Dist. 214, 
    942 F.3d 395
    , 396 (7th Cir. 2019). In
    reviewing this decision, “[w]e view the facts and evidence in
    the light most favorable to [Epic], as the litigant who pre‐
    vailed before the jury.”
    Id. To the extent
    TCS asked the district
    court for a new trial regarding punitive damages under Rule
    59, we review the district court’s decision to deny this motion
    for an abuse of discretion. 
    Abellan, 948 F.3d at 830
    . And be‐
    cause the punitive damages stand on Wisconsin causes of ac‐
    tion, the punitive‐damages award must be consistent with
    Wisconsin law. See 
    Kapelanski, 390 F.3d at 534
    .
    TCS presents four arguments challenging the $280 million
    punitive‐damages award: First, TCS argues that, to receive
    punitive damages under Wisconsin law, the plaintiff must
    prove an actual injury—which Epic did not do. Second, TCS
    argues that the punitive‐damages award here must be set
    aside because it may have been based on a claim that cannot
    support punitive damages as a matter of law. Third, TCS ar‐
    gues that the punitive‐damages award must be vacated and
    retried in light of the district court’s decision to vacate the
    $100 million compensatory‐damages award. Finally, TCS ar‐
    gues the punitive‐damages award is constitutionally exces‐
    sive. We take each in turn.
    1. “Actual Injury” Requirement
    30                                       Nos. 19‐1528 & 19‐1613
    TCS argues that the punitive‐damages award fails as a
    matter of law because Epic failed to prove an “actual injury.”
    TCS contends that under Wisconsin law, an actual injury and
    a damages award reflecting redress for this injury are “thresh‐
    old requirements before punitive damages may be awarded.”
    TCS reasons that, because Epic did not suffer an actual injury
    and instead was awarded damages solely based on the benefit
    TCS received, Epic cannot receive punitive damages.
    But Wisconsin law is not as exacting as TCS argues. Ra‐
    ther, Wisconsin law requires—for punitive damages to be
    awarded—the imposition of compensatory damages. TCS
    first cites to Tucker v. Marcus for the proposition that a plaintiff
    must prove “some actual injury which would justify an award of
    actual or compensatory damages before punitive damages may
    be awarded. ” 
    418 N.W.2d 818
    , 823 (Wis. 1988) (quoting Han‐
    son v. Valdivia, 
    187 N.W.2d 151
    , 155 (Wis. 1971)). However,
    Tucker makes clear that the threshold requirement for puni‐
    tive damages is an “‘award’ of actual or compensatory dam‐
    ages” rather than an injury to the plaintiff. 
    Tucker, 418 N.W.2d at 827
    . In fact, the Wisconsin Supreme Court specifically held
    that—even though the jury found “there had been injury suf‐
    fered”—“punitive damages were inappropriately allowed in
    this case” because the plaintiff could not recover “actual dam‐
    ages.”
    Id. at 823.
        In a more recent decision, the Wisconsin Supreme Court
    affirmed that compensatory damages are a sufficient predi‐
    cate for punitive damages. “[W]e have held that ‘where there
    exists a “cause of action,” but the action is not one for which
    the recovery of compensatory damages is justified, punitive dam‐
    ages cannot be awarded.’” Groshek v. Trewin, 
    784 N.W.2d 163
    ,
    173 (Wis. 2010) (emphasis added) (quoting Tucker, 418 N.W.2d
    Nos. 19‐1528 & 19‐1613                                        31
    at 824). Groshek, like Tucker, holds that the availability of pu‐
    nitive damages is governed by whether compensatory dam‐
    ages are recoverable, and not by whether an “actual injury”
    has been inflicted. See 
    Groshek, 784 N.W.2d at 173
    ; cf. 
    Tucker, 418 N.W.2d at 830
    (Heffernan, C.J., dissenting) (“Today’s ma‐
    jority holds that [actual damages] should be defined in a man‐
    ner that no punitive damages may be awarded in the absence
    of a recovery for compensatory damages.”).
    Since Groshek, we have further expounded on when puni‐
    tive damages are appropriate under Wisconsin law. In Pro‐
    Pac, Inc. v. WOW Logistics Co., we stated that punitive dam‐
    ages are recoverable under Wisconsin law regardless of
    whether damages are based on “gain to [the defendant] (i.e.,
    restitutionary damages) or loss to [the plaintiff] (i.e., compen‐
    satory damages).” 
    721 F.3d 781
    , 788 (7th Cir. 2013). This is true
    because Wisconsin law allows “awards of punitive damages
    when ‘compensatory damages’ are imposed,” and Wisconsin
    defines compensatory damages to include compensation, in‐
    demnity, and restitution.
    Id. So, TCS is
    incorrect that Wisconsin law requires Epic to
    prove an “actual injury” to obtain punitive damages. Instead,
    punitive damages are available when compensatory damages
    are imposed, as they were in this case. Epic is therefore not
    barred from recovering punitive damages simply because
    compensatory damages were awarded for TCS’s benefit ra‐
    ther than any injury Epic sustained.
    2. Claims that Support Punitive Damages
    TCS next argues that the punitive‐damages award must be
    set aside because it might have been based on one of Epic’s
    claims that does not support punitive damages as a matter of
    32                                      Nos. 19‐1528 & 19‐1613
    law. Specifically, TCS points out that Epic’s unjust enrichment
    claim does not support punitive damages, and there is no way
    to know—based on the generality of the jury’s punitive‐dam‐
    ages verdict—if that is the claim the jury used to support pu‐
    nitive damages.
    We can quickly dispose of this argument. The jury was
    specifically instructed that it could only award punitive dam‐
    ages “with respect to Epic’s trade secrets, fraudulent misrep‐
    resentation[,] and unfair competition claims.” “Jurors are pre‐
    sumed to follow a court’s instructions.” Seifert ex rel. Scoptur
    v. Balink, 
    869 N.W.2d 493
    , 504 (Wis. Ct. App. 2015); see also
    Schandelmeier‐Bartels v. Chi. Park Dist., 
    634 F.3d 372
    , 388 (7th
    Cir. 2011) (“[W]e presume that juries follow the instructions
    they are given.”). So we may presume that the jury based its
    punitive‐damages award on these claims, and not on the un‐
    just enrichment claim.
    And Epic’s claims for trade secrets, fraudulent misrepre‐
    sentation, and unfair competition all allow recovery of dam‐
    ages on a theory of gain to the defendant. Wis. Stat. § 134.90(4)
    (damages for a violation of Wisconsin’s trade secrets act in‐
    clude “unjust enrichment caused by the violation”); 
    Pro‐Pac, 721 F.3d at 786
    (restitutionary damages, i.e. damages based on
    the defendant’s benefit, are recoverable “as compensation for
    tort claims”). As discussed above, punitive damages can be
    awarded when compensatory damages—including damages
    based on a defendant’s gain—are imposed. 
    Pro‐Pac, 721 F.3d at 788
    .
    TCS does not dispute that Epic’s trade secrets, fraudulent
    misrepresentation, and unfair competition claims support an
    award of punitive damages; in fact, it admits these claims
    “could support punitive damages.” And because the jury was
    Nos. 19‐1528 & 19‐1613                                        33
    instructed to base punitive damages on these claims only, the
    punitive‐damages award was not based on a claim that does
    not support punitive damages as a matter of law.
    3. Conduct on which Punitive Award is Based
    TCS next argues that the punitive‐damages award must be
    vacated and retried in light of the district court’s decision—
    which we affirm—to vacate the $100 million damages award
    for TCS’s uses of other confidential information. TCS argues
    that when the jury determined punitive damages, it had in
    mind a broader range of conduct “than was legally sustaina‐
    ble.” And because we cannot know whether the jury’s puni‐
    tive‐damages decision was based on “a permissible or imper‐
    missible claim or theory,” we must vacate the punitive award
    and remand for the issue to be retried.
    But this argument fundamentally misunderstands puni‐
    tive damages. Punitive damages are imposed to “punish[] un‐
    lawful conduct and deter[] its repetition.” Trinity Evangelical
    Lutheran Church v. Tower Ins. Co., 
    661 N.W.2d 789
    , 798 (Wis.
    2003) (emphasis added); see also Kemezy v. Peters, 
    79 F.3d 33
    ,
    34 (7th Cir. 1996) (“The standard judicial formulation of the
    purpose of punitive damages is that it is to punish the defend‐
    ant for reprehensible conduct and to deter [the defendant]
    and others from engaging in similar conduct.”). Stated differ‐
    ently, punitive damages are based on the defendant’s conduct
    underlying a plaintiff’s claims, not on the claims themselves.
    And the cases TCS cites in support of its argument provide
    further support for this understanding of punitive damages.
    Take Robertson Oil Co. v. Phillips Petroleum Co., 
    871 F.2d 1368
    (8th Cir. 1989), as an example. The jury in that case found Phil‐
    lips Petroleum liable for fraud, breach of the duty of good
    34                                      Nos. 19‐1528 & 19‐1613
    faith and fair dealing, tortious interference, and negligence.
    Id. at 1370.
    The jury also awarded Robertson Oil punitive
    damages.
    Id. But on appeal,
    the Eighth Circuit affirmed only
    the theory of tortious interference with a business relation‐
    ship.
    Id. at 1375.
    And Phillips’s conduct “relevant to an award
    of punitive damages necessarily differ[ed] according to the
    various theories of liability on which the jury based its ver‐
    dict.”
    Id. at 1376.
    So, because the court could not “ascertain
    what conduct of Phillips was determined by the jury to merit
    punitive damages,” the Eighth Circuit ordered the district
    court to retry punitive damages.
    Id. The Eighth Circuit
    in Robertson Oil did not require a retrial
    of punitive damages simply because it found that some of the
    theories of liability failed as a matter of law. Instead, the em‐
    phasis was on the conduct underlying these theories. Because
    the court could not be sure which of Phillips’s conduct led the
    jury to believe punitive damages were necessary, and some of
    that conduct did not warrant damages as a matter of law, a
    new trial was necessary. This understanding of punitive dam‐
    ages holds true throughout the cases TCS cites in support of
    its argument. See, e.g., CGB Occupational Therapy, Inc. v. RHA
    Health Servs. Inc., 
    357 F.3d 375
    , 390 (3d Cir. 2004) (reversing
    punitive damages because it was unclear which act of tortious
    interference formed the basis of punitive damages when the
    plaintiff interfered with two distinct contracts); Marrero v.
    Goya of P.R., Inc., 
    304 F.3d 7
    , 30 (1st Cir. 2002) (affirming a har‐
    assment claim, reversing a retaliation claim because there was
    no evidence of an adverse personnel action, and requiring a
    new trial on punitive damages because the court could not be
    sure if punitive damages were based on the erroneous retali‐
    ation finding).
    Nos. 19‐1528 & 19‐1613                                         35
    So, a punitive‐damages award requires a new trial only
    when (1) the claims of liability supporting punitive damages
    are based on different underlying conduct by the defendant,
    and (2) one of those claims (and therefore the conduct under‐
    lying that claim) is found to be unsupported as a matter of
    law. TCS argues that different conduct underlies the two sep‐
    arate compensatory‐damages awards, and we cannot know
    which conduct led the jury to award punitive damages.
    But the conduct underlying both compensatory‐damages
    awards was the same. One compensatory‐damages award
    was based on the “benefit of TCS’s use of [the] comparative
    analysis” and the other was based on the “benefit of TCS’s use
    of other confidential information.” The key distinction be‐
    tween these two compensatory awards is information, not con‐
    duct. By awarding damages for TCS’s uses of “other confiden‐
    tial information,” the jury did not have to find any uses—or
    any conduct—that differed from the uses and conduct under‐
    lying the comparative‐analysis portion of the compensatory
    award. Based on reasonable inferences drawn in Epic’s favor,
    a jury could conclude that TCS used the comparative analysis
    (and therefore Epic’s information incorporated into that anal‐
    ysis) to improve its marketing strategy, to try to enter the
    United States market, and to generally improve Med Mantra
    before attempting to sell it to Kaiser. And these are the only
    uses that can be found in the record; TCS does not point us to
    a single use of Epic’s information that is not also a use that the
    jury could reasonably infer stemmed from the comparative
    analysis.
    So, the overall conduct underlying these two verdicts is
    the same. TCS stole thousands of Epic’s documents, lied about
    it, covered it up, and used Epic’s information in a variety of
    36                                      Nos. 19‐1528 & 19‐1613
    ways. This course of conduct is the same regardless of
    whether the jury incorrectly found that this course of conduct
    included the use of a few more pieces of Epic’s information.
    Whether the jury found that TCS received an additional ben‐
    efit based on other confidential information does not affect the
    jury’s assessment of TCS’s overall conduct. So, our determi‐
    nation that TCS did not use “other confidential information”
    does not disturb the jury’s punitive‐damages award.
    4. Constitutionality of the Punitive‐Damages Award
    TCS finally argues that the punitive‐damages award of
    $280 million violates its due process rights under the federal
    constitution and Wisconsin law. We review these questions de
    novo. Rainey v. Taylor, 
    941 F.3d 243
    , 254 (7th Cir. 2019); Trinity
    Evangelical Lutheran 
    Church, 661 N.W.2d at 799
    .
    As we reminded the litigants in Saccameno, “the Constitu‐
    tion is not the most relevant limit to a federal court when as‐
    sessing punitive damages, as it comes into play ‘only after the
    assessment has been tested against statutory and common‐
    law principles.’” Saccameno v. U.S. Bank Nat’l Ass’n, 
    943 F.3d 1071
    , 1086 (7th Cir. 2019) (quoting Perez v. Z Frank Oldsmobile,
    Inc., 
    223 F.3d 617
    , 625 (7th Cir. 2000)). “The Constitution is the
    only federal restraint on a state court’s award of punitive
    damages,” but federal judges are not restricted to reducing
    punitive damages in a federal case.
    Id. (citing Perez, 223
    F.3d
    at 625). Indeed, “[a] federal court … can (and should) reduce
    a punitive damages award sometime before it reaches the
    outermost limits of due process.”
    Id. (citing Perez, 223
    F.3d at
    625; Payne v. Jones, 
    711 F.3d 85
    , 97–100 (2d Cir. 2013)).
    The Due Process Clause of the Fourteenth Amendment
    imposes constitutional limitations on punitive damages. State
    Nos. 19‐1528 & 19‐1613                                                   37
    Farm Mut. Auto. Ins. Co. v. Campbell, 
    538 U.S. 408
    , 416–17
    (2003). Punitive damages may be imposed to further a state’s
    legitimate interests in imposing punishment for and deterring
    illegal conduct, but punitive damages violate due process
    when the award is “‘grossly excessive’ in relation to these in‐
    terests.” BMW of N. Am., Inc. v. Gore, 
    517 U.S. 559
    , 568 (1996).
    The Supreme Court, in testing awards of punitive damages
    for compliance with due process, has established three
    “guideposts”: “(1) the reprehensibility of the defendant’s con‐
    duct; (2) the disparity between the actual harm suffered and
    the punitive award; and (3) the difference between the award
    authorized by the jury and the penalties imposed in compa‐
    rable cases.” 
    Rainey, 941 F.3d at 254
    (citing 
    Gore, 517 U.S. at 575
    ). Wisconsin courts apply a “virtually identical test.” Trin‐
    ity Evangelical Lutheran 
    Church, 661 N.W.2d at 800
    . 4
    The Supreme Court’s first guidepost—reprehensibility of
    the defendant’s conduct—is the most important. 
    Gore, 517 U.S. at 575
    . In determining the reprehensibility of the defend‐
    ant’s conduct, we consider five factors: whether
    the harm caused was physical as opposed to eco‐
    nomic; the tortious conduct evinced an indifference
    to or a reckless disregard of the health or safety of
    others; the target of the conduct had financial vul‐
    nerability; the conduct involved repeated actions or
    4 Wisconsin courts consider the factors most relevant to the case at
    hand, with those factors coming from the following list: (1) the grievous‐
    ness of the acts, (2) the degree of malicious intent, (3) whether the award
    bears a reasonable relationship to the award of compensatory damages,
    (4) the potential damage that might have been caused by the act, (5) the
    ration of the award to civil or criminal penalties that could be imposed for
    comparable misconduct, and (6) the wealth of the wrongdoer. Trinity
    Evangelical Lutheran 
    Church, 661 N.W.2d at 800
    .
    38                                         Nos. 19‐1528 & 19‐1613
    was an isolated incident; and the harm was the result
    of intentional malice, trickery, or deceit, or mere ac‐
    cident.
    
    Campbell, 538 U.S. at 419
    . If none of these factors weigh in fa‐
    vor of the plaintiff, the award is “suspect.”
    Id. And even if
    one
    factor weighs in the plaintiff’s favor, that may not be enough
    to sustain the punitive award.
    Id. And finally, since
    a plaintiff
    is presumed to be made whole by the compensatory award,
    punitive damages should be awarded only if the defendant’s
    conduct is “so reprehensible as to warrant the imposition of
    further sanctions to achieve punishment or deterrence.”
    Id. The first factor
    asks us to consider if the harm was physical
    as opposed to economic.
    Id. Conduct producing physical
    harm is more reprehensible than conduct producing eco‐
    nomic harm. See 
    Gore, 517 U.S. at 576
    . Epic did not suffer phys‐
    ical harm as a result of TCS’s conduct. So this factor weighs
    against finding TCS’s conduct reprehensible.
    Turning to the second factor, we do not believe that TCS’s
    conduct evinced an indifference to or a reckless disregard of
    the safety of others. Epic does not attempt to persuade us oth‐
    erwise. This factor also weighs against finding TCS’s conduct
    reprehensible.
    The third factor—the financial vulnerability of the target
    of the defendant’s conduct—stands for the proposition that
    conduct is more reprehensible if it impacts financially vulner‐
    able plaintiffs. See, e.g., 
    Saccameno, 943 F.3d at 1087
    ; EEOC v.
    AutoZone, Inc., 
    707 F.3d 824
    , 839 (7th Cir. 2013). Epic, one of
    the largest producers of electronic‐health‐record software, is
    not financially vulnerable. This factor again weighs against
    finding TCS’s conduct reprehensible.
    Nos. 19‐1528 & 19‐1613                                        39
    Applying the fourth factor, TCS’s conduct did involve a
    repeated course of wrongful acts. Epic presented evidence
    that TCS knew it lacked authority to access confidential infor‐
    mation from UserWeb. Yet TCS employees still accessed and
    downloaded Epic’s confidential information for years, down‐
    loading over 1,600 unique documents from UserWeb and
    gaining access to information that Epic specifically forbid TCS
    from accessing. This factor weighs in favor of finding TCS’s
    conduct reprehensible and provides support for some award
    of punitive damages.
    As for the last factor—whether the harm was the result of
    intentional malice, trickery or deceit, or mere accident—TCS
    argues that Epic suffered no harm. Specifically, TCS contends
    that because Epic was not deprived of the enjoyment of its
    software, did not lose business, and did not face any new
    competition, there could not have been any harm to Epic. But
    even though it is hard to quantify, Epic likely suffered a com‐
    petitive harm; TCS, a potential competitor, had access to
    Epic’s confidential information for years without Epic’s
    knowledge. This gave TCS insight into the strengths and
    weaknesses of Epic’s software, regardless of whether TCS was
    able to turn that knowledge into a direct economic harm to
    Epic. Cf. United Tech. Corp. v. U.S. Dept. of Def., 
    601 F.3d 557
    ,
    564 (D.C. Cir. 2010) (discussing, for purposes of what consti‐
    tutes “confidential information” under an exemption to the
    Freedom of Information Act, what constitutes substantial
    competitive harm). We can also think of at least one economic
    harm, albeit minor, that Epic suffered as a result of TCS’s con‐
    duct. Epic, after it became aware of TCS’s unlawful access to
    UserWeb, had to expend time and resources investigating the
    extent to which TCS had accessed Epic’s confidential infor‐
    mation and trade secrets.
    40                                     Nos. 19‐1528 & 19‐1613
    And these harms were the result of TCS’s repeated, inten‐
    tional attempts to deceive Epic. See 
    Gore, 517 U.S. at 576
    (not‐
    ing that deceit is more reprehensible than negligence). Epic
    repeatedly denied Kaiser’s and TCS’s requests to allow TCS
    access to UserWeb. But TCS gained access to UserWeb
    through other means, using Gajaram’s account, which he ob‐
    tained by falsely identifying as a Kaiser employee. The jury
    heard testimony that Gajaram’s account information was
    shared throughout TCS and was frequently used to download
    and share Epic’s confidential information.
    TCS employees also lied to prevent Kaiser and Epic from
    discovering that TCS had access to Epic’s UserWeb. A TCS
    employee testified that his manager told him to hide the truth
    from investigators. This employee obeyed these instructions
    and lied to investigators, telling them that he had only ac‐
    cessed UserWeb one time when he knew he had accessed it
    more than once.
    The harms to Epic resulted from TCS’s deceitful conduct.
    This factor weighs in favor of finding TCS’s conduct repre‐
    hensible and supports some award of punitive damages.
    In sum, we agree with the district court that TCS’s conduct
    warrants punishment. But TCS’s conduct was not reprehensi‐
    ble “to an extreme degree.” 
    Saccameno, 943 F.3d at 1088
    . TCS
    caused no physical harm to Epic. TCS also did not recklessly
    disregard the safety of others. And Epic is not a financially
    vulnerable plaintiff. But TCS’s conduct consisted of a re‐
    peated course of wrongful actions spanning multiple years.
    TCS’s conduct was also intentional and deceitful, not negli‐
    gent. We therefore conclude that TCS’s conduct justifies pun‐
    ishment, though not in the amount of a $280 million punitive‐
    damages award.
    Nos. 19‐1528 & 19‐1613                                        41
    Turning to the Supreme Court’s second guidepost, we an‐
    alyze the ratio of punitive damages to the “harm, or potential
    harm” inflicted on the plaintiff. 
    Campbell, 538 U.S. at 424
    . In
    most cases, the compensatory‐damages award approximates
    the plaintiff’s harm. In those cases, identifying the ratio is
    straightforward: we compare compensatory and punitive‐
    damages awards. See, e.g., 
    Rainey, 941 F.3d at 255
    . But in some
    cases, the jury’s compensatory‐damages award does not re‐
    flect the plaintiff’s quantifiable harm. Still, we may account
    for that harm in the harm‐to‐punitive‐damages ratio. See Som‐
    merfield v. Knasiak, No. 18‐2045, 
    2020 WL 4211297
    , at *5 (7th
    Cir. July 23, 2020).
    The circumstances of this case, however, present an unu‐
    sual issue in determining the amount of “harm” under this
    guidepost. The jury awarded $140 million in compensatory
    damages based on the benefit to TCS, not because of any harm
    suffered by Epic. This award, then, does not reflect Epic’s
    harm. And if Epic suffered quantifiable economic harm, that
    harm is significantly smaller than $140 million, which would
    in turn drastically change the relevant ratio. If we had to
    quantify that harm to arrive at the appropriate ratio, applying
    the second due‐process guidepost would pose a challenging
    task.
    But TCS makes no argument here—and did not argue to
    the district court—that we should compare any number be‐
    sides compensatory damages to the punitive‐damages award.
    See Puffer v. Allstate Ins. Co., 
    675 F.3d 709
    , 718 (7th Cir. 2012)
    (underdeveloped arguments are waived). In fact, most of its
    argument under this guidepost emphasizes the size of the
    compensatory award as a reason the punitive‐damages award
    violates due process. TCS has thus waived any argument that
    42                                      Nos. 19‐1528 & 19‐1613
    the compensatory award is the incorrect denominator in the
    ratio analysis. And at least one other court has compared an
    unjust enrichment award to the punitive‐damages award un‐
    der this guidepost when state law allowed punitive damages
    to be imposed for the underlying claim. See Rhone‐Poulenc
    Agro, S.A. v. DeKalb Genetics Corp., 
    272 F.3d 1335
    , 1351 (Fed.
    Cir. 2001) (concluding it is appropriate to base punitive dam‐
    ages on an unjust enrichment award when the defendant’s
    gain “is logically related” to the plaintiff’s “harm or potential
    harm”), vacated, 
    538 U.S. 974
    (2003), remanded to 
    345 F.3d 1366
    (2003) (reaching the same result as to punitive damages). So,
    we will conduct the ratio analysis using the $140 million com‐
    pensatory award as the denominator.
    In conducting this analysis, the Supreme Court has de‐
    clined to set a fixed ratio limiting punitive damages. 
    Campbell, 538 U.S. at 425
    (“[T]here are no rigid benchmarks that a puni‐
    tive damages award may not surpass … .”). The Supreme
    Court has, however, noted that “few awards exceeding a sin‐
    gle‐digit ratio between punitive and compensatory damages
    … will satisfy due process.”
    Id. The punitive award
    in this case—after the district court
    lowered it to comply with Wisconsin’s statutory cap on puni‐
    tive damages—is two times the ultimate compensatory
    award. Our court and Wisconsin courts have upheld signifi‐
    cantly higher ratios. See, e.g., 
    Rainey, 941 F.3d at 255
    (affirming
    a 6:1 ratio); Mathias v. Accor Econ. Lodging, Inc., 
    347 F.3d 672
    ,
    676–78 (7th Cir. 2003) (affirming a 37:1 ratio); Kimble v. Land
    Concepts, Inc., 
    845 N.W.2d 395
    , 412 (Wis. 2014) (finding a 3:1
    ratio appropriate and constitutional); Trinity Evangelical Lu‐
    theran 
    Church, 661 N.W.2d at 803
    (affirming a 7:1 ratio).
    Nos. 19‐1528 & 19‐1613                                                      43
    But the compensatory damages here are high. The Su‐
    preme Court has noted that “[w]hen compensatory damages
    are substantial, then a lesser ratio, perhaps only equal to com‐
    pensatory damages, can reach the outermost limit of the due
    process guarantee.” 
    Campbell, 538 U.S. at 425
    . And the $140
    million award in this case far exceeds what other courts have
    considered “substantial.” See Lompe v. Sunridge Partners, LLC,
    
    818 F.3d 1041
    , 1069 (10th Cir. 2016) (“[I]n many cases, com‐
    pensatory damages less than $1,000,000 have also been con‐
    sidered substantial.”). In fact, neither party points us to any
    comparable cases in which any court has upheld a 2:1‐or‐
    higher ratio resulting in over $200 million in punitive dam‐
    ages.5
    Many courts have instead found awards “substantial” and
    imposed a 1:1 ratio based on significantly lower compensa‐
    tory awards. See 
    Saccameno, 943 F.3d at 1090
    (gathering cases
    where courts have imposed a 1:1 ratio when the compensa‐
    tory award is less than $1 million); cf. Estate of Moreland v. Di‐
    eter, 
    395 F.3d 747
    , 756–57 (7th Cir. 2005) (affirming a $15 mil‐
    lion punitive‐damages award that was “a fraction of the un‐
    derlying compensatory damages award” and was based on
    5 Epic only cites to one case with a relatively comparable award, Yung
    v. Grant Thornton, LLP, 
    563 S.W.3d 22
    , 73 (Ky. 2018) (upholding $80 million
    in punitive damages, resulting in a 4:1 ratio). It’s true that in Yung, like in
    this case, only the last two reprehensibility factors weighed in favor of al‐
    lowing punitive damages.
    Id. at 67.
    But the economic harm suffered by the
    plaintiffs in Yung distinguishes that case from the circumstances here. In
    Yung, the plaintiffs suffered substantial, quantifiable economic harm, in‐
    cluding millions of dollars in taxes, interest, and fees owed to the IRS.
    Id. at 57.
    Here, there is hardly evidence that Epic suffered any economic
    harm; the compensatory award was based on TCS’s benefit. And any po‐
    tential future economic harm has not been quantified.
    44                                       Nos. 19‐1528 & 19‐1613
    “truly reprehensible” conduct). Still, the precise award must
    be based on “the facts and circumstances of the defendant’s
    conduct and the harm to the plaintiff.” 
    Campbell, 538 U.S. at 425
    ; cf. Sommerfield, 
    2020 WL 4211297
    , at *6 (noting that sanc‐
    tions should be based on the wrong done rather than the de‐
    fendant’s wealth).
    The facts and circumstances of this case do not justify
    awarding $280 million in punitive damages. As noted above,
    three of the five reprehensibility factors weigh against the rep‐
    rehensibility of TCS’s conduct. TCS’s conduct was reprehen‐
    sible, but not to an extreme degree. See, e.g., Bridgeport Music,
    Inc. v. Justin Combs Publ’g, 
    507 F.3d 470
    , 490 (6th Cir. 2007)
    (based on “the low level of reprehensibility of defendants’
    conduct, a ratio of closer to 1:1 or 2:1 is all that due process
    can tolerate in this case”). But see, e.g., 
    Rainey, 941 F.3d at 255
    (“the truly egregious nature” of the defendant’s acts of sexual
    objectification and assault justified “the size of [the] punitive
    award even with [a] significant compensatory award”); Ma‐
    
    thias, 347 F.3d at 675
    –78 (affirming a 37:1 ratio in part because
    the motel company refused to have bed bugs in hotel rooms
    exterminated when it was aware of the risk to its customers).
    And although TCS’s actions did harm Epic, that harm
    does not support the size of the punitive‐damages award. Cf.
    
    Rainey, 941 F.3d at 254
    –55 (affirming a punitive‐damages
    award six times larger than the $1.13 million compensatory
    award in part because the plaintiff suffered “pain and humil‐
    iation” as a result of the defendant’s groping and acts of sex‐
    ual objectification); In re Exxon Valdez, 
    472 F.3d 600
    , 623–25
    (9th Cir. 2006), amended 
    490 F.3d 1066
    , (reducing punitive
    damages to $2.5 billion, reflecting a 5:1 ratio with compensa‐
    tory damages, where the plaintiff caused severe economic
    Nos. 19‐1528 & 19‐1613                                       45
    harm and emotional harm to thousands of people by spilling
    11 million gallons of crude oil into United States waters).
    We therefore conclude that a 2:1 ratio exceeds the outer‐
    most limit of the due process guarantee in this case because
    TCS’s conduct, while reprehensible, was not egregious, and
    multiplying the substantial compensatory award—calculated
    on the basis of TCS’s benefit rather than Epic’s loss—is unnec‐
    essary to reflect Epic’s uncertain economic harm. See 
    Campbell, 538 U.S. at 425
    ; 
    Saccameno, 943 F.3d at 1090
    . Instead, the ratio
    relative to the $140 million compensatory award should not
    exceed 1:1 in this case. See 
    Saccameno, 943 F.3d at 1090
    (con‐
    cluding that the ratio “should not exceed 1:1” where the com‐
    pensatory award was “substantial”). It should be noted,
    though, that “[w]hat counts as substantial depends on the
    facts of the case, and an award of this size (or larger) might
    not mandate a 1:1 ratio on another set of facts.”
    Id. We now turn
    to the final guidepost: the difference between
    the punitive award authorized by the jury and civil penalties
    imposed in comparable cases. Although “this guidepost gen‐
    erally deserves less weight than the other two,” 
    Rainey, 941 F.3d at 255
    , it serves an important purpose: to “allow[] courts
    to show ‘substantial deference to legislative judgments con‐
    cerning appropriate sanctions for the conduct at issue.’” Auto‐
    
    Zone, 707 F.3d at 840
    (7th Cir. 2013) (quoting 
    Gore, 517 U.S. at 583
    ).
    TCS has made no argument about this guidepost and has
    thus waived any argument that it points toward the award
    being unconstitutional. Although TCS has not pointed us to a
    single relevant civil penalty for comparison, we recognize that
    both the $280 million award the district court entered, and a
    $140 million award that would reflect a 1:1 ratio, comply with
    46                                             Nos. 19‐1528 & 19‐1613
    Wisconsin’s statutory cap on punitive damages. That cap is
    one indication of what the Wisconsin legislature has judged
    to be an inappropriate sanction for reprehensible conduct:
    any punitive award exceeding a 2:1 ratio is inappropriate.
    Wis. Stat. § 895.043(6); see Auto
    Zone, 707 F.3d at 840
    (“We rec‐
    ognize that this statutory cap suggests that an award of dam‐
    ages at the capped maximum is not outlandish.”).6 So, the fi‐
    nal guidepost does not point toward a $280 million or $140
    million punitive‐damages award being unconstitutional.
    In sum, considering the factors together, we conclude that
    the maximum permissible award of punitive damages in this
    case is $140 million—a 1:1 ratio relative to the compensatory
    award. And TCS only mentions Wisconsin law to point out
    that Wisconsin courts apply a test substantively identical to
    the federal test analyzed above. So, TCS has waived any argu‐
    ment that Wisconsin law might produce a different result. We
    therefore remand for the district court to amend its judgment
    and reduce punitive damages to, at most, $140 million.
    III. CONCLUSION
    The jury heard plenty of evidence that TCS stole Epic’s
    confidential information and incorporated it into a compara‐
    tive‐analysis spreadsheet. And, drawing all inferences in fa‐
    vor of Epic, the jury could conclude that TCS used the com‐
    parative analysis for a variety of purposes, including the
    6 TCS does not challenge the constitutionality of the Wisconsin statute
    that sets this cap, and we do not question it either. The protections af‐
    forded by the Constitution are not fixed to a particular ratio. See 
    Campbell, 538 U.S. at 425
    . As such, the due‐process guarantee may be more protec‐
    tive than a statutory cap in one case but less protective in another. Today,
    we hold only that, although the Wisconsin statute permits a 2:1 ratio, the
    constitutional protection under these circumstances goes further.
    Nos. 19‐1528 & 19‐1613                                     47
    improvement of Med Mantra. However, the jury did not hear
    any evidence that would allow it to infer that any of Epic’s
    other information was used by TCS.
    Pursuant to the reasoning set forth above, the judgment of
    the district court upholding the jury’s $140 million compen‐
    satory‐damages award connected to the comparative analysis
    is AFFIRMED; and, the judgment of the district court vacating
    the jury’s $100 million compensatory damages award for
    TCS’s use of other information is also AFFIRMED.
    Further, the judgment of the district court awarding $280
    million in punitive damage is VACATED as it exceeds the
    outermost limit of the Due Process guarantee in the Constitu‐
    tion; and, the issue of the amount of punitive damages is
    REMANDED with instruction to the district court to reduce
    the punitive‐damages award consistent with the analysis in
    this opinion.
    

Document Info

Docket Number: 19-1613

Judges: Kanne

Filed Date: 11/19/2020

Precedential Status: Precedential

Modified Date: 11/19/2020

Authorities (32)

Marrero v. Goya of Puerto Rico, Inc. , 304 F.3d 7 ( 2002 )

gloria-kronisch-of-the-estate-of-stanley-milton-glickman-v-united-states , 150 F.3d 112 ( 1998 )

Barry C. Cosgrove, Cross-Appellee v. Joseph Bartolotta and ... , 150 F.3d 729 ( 1998 )

Mark N. Silvestri v. General Motors Corporation, Dfendant-... , 271 F.3d 583 ( 2001 )

Bridgeport Music, Inc. v. Justin Combs Publishing , 507 F.3d 470 ( 2007 )

cgb-occupational-therapy-inc-dba-cgb-rehab-inc-v-rha-health-services , 357 F.3d 375 ( 2004 )

Minnesota Mining & Manufacturing Company v. Ronald Pribyl, ... , 259 F.3d 587 ( 2001 )

Miguel Perez v. Z Frank Oldsmobile, Inc., Cross-Appellee , 223 F.3d 617 ( 2000 )

Grace M. Kapelanski and Stanley J. Kapelanski v. Scott ... , 390 F.3d 525 ( 2004 )

Momcilo Filipovich v. K & R Express Systems, Inc., Cross-... , 391 F.3d 859 ( 2004 )

estate-of-christopher-a-moreland-deceased-by-gary-r-moreland-and-linda , 395 F.3d 747 ( 2005 )

Susan Cooper Houben v. Telular Corporation , 309 F.3d 1028 ( 2002 )

Lindquist Ford, Inc. v. Middleton Motors, Inc. , 557 F.3d 469 ( 2009 )

burl-mathias-and-desiree-matthias-plaintiffs-appelleescross-appellants-v , 347 F.3d 672 ( 2003 )

Robertson Oil Company, Inc. v. Phillips Petroleum Company , 871 F.2d 1368 ( 1989 )

in-re-the-exxon-valdez-grant-baker-sea-hawk-seafoods-inc-cook-inlet , 472 F.3d 600 ( 2006 )

Jeffrey Kemezy v. James Peters , 79 F.3d 33 ( 1996 )

HK Systems, Inc. v. Eaton Corp. , 553 F.3d 1086 ( 2009 )

Schandelmeier-Bartels v. Chicago Park District , 634 F.3d 372 ( 2011 )

Puffer v. Allstate Insurance , 675 F.3d 709 ( 2012 )

View All Authorities »