Appellate Case: 16-4048 Document: 01019892548 Date Filed: 10/30/2017 Page: 1 FILED United States Court of Appe; PUBLISH Tenth Circuit UNITED STATES COURT OF APPEALS OctOber 30: 2017 Elisabeth A. Shumaker FOR THE TENTH CIRCUIT Clerk of Court THE SCO GROUP, INC., Plaintiff Counterclaim Defendant - Appellant, v. No. 16?4040 INTERNATIONAL BUSINESS MACHINES CORPORATION, Defendant Counterclaimant - Appellee. Appeal from the United States District Court for the District of Utah (D.C. No. Edward Normand, Boies, Schiller Flexner LLP, Armonk, New York (Jason C. Cyrulnik, Boies, Schiller Flexner LLP, Armonk, New York, Stuart H. Singer, Boies, Schiller, Flexner LLP, Fort Lauderdale, Florida, Brent 0. Hatch and Mark F. James, Hatch, James Dodge P.C., Salt Lake City, Utah, with him on the briefs), for Plaintiff Counterclaim Defendant-Appellant. David Marriott, Cravath, Swaine Moore LLP, New York, New York (Evan R. Chesler, Cravath, Swaine Moore LLP, New York, New York, Amy F. Sorenson and Amber M. Mettler, Snell Wilmer L.L.P., Salt Lake City, Utah, with him on the briefs), for Defendant Counterclaimant?Appellee. Before KELLY, EBEL, and BACHARACH, Circuit Judges. EBEL, Circuit Judge. Appellate Case: 16-4040 Document 01019892548 Date Filed" 10130/2017 Page: 2 This case arises out of a business deal gone wrong. The Santa Cruz Operation, Inc. (Santa Cruz) entered into a business arrangement with International Business Machines Corp. (IBM) to develop a new operating system that would run on a more advanced processor manufactured by Intel Corporation (Intel). The parties signed an agreement memorializing this collaborative effort and called it Project Monterey. Another technology company, The SCO Group, Inc. (SCO), then acquired Santa Cruz?s intellectual property assets and now brings this lawsuit for alleged misconduct during and immediately after Project Monterey. Project Monterey involved mutual contributions by IBM and Santa Cruz of proprietary materials, including computer code for their respective operating systems. SCO believes that IBM merely pretended to go along with the arrangement in order to gain access to Santa Cruz?s coveted source code. SCO, the successor?in?interest to Santa Cruz?s intellectual property assets, accused IBM of stealing and improperly using this source code to strengthen its own operating system, thereby committing the tort of unfair competition by means of misappropriation. The district court awarded summary judgment to IBM on this claim based on the independent tort doctrine, which bars a separate tort action where there is no violation of a duty independent of a party?s contractual obligations. SCO also accused IBM of disclosing Santa Cruz?s proprietary materials to the computer programming community for inclusion in an open-source operating system called Linux. When SCO acquired Santa Cruz?s assets involved in Project Monterey and then sought licensing agreements from various technology companies, IBM allegedly 2 Appeilate Case: 16-4040 Document: 01019892548 Date Filed 1080/2017 Page: 3 instructed business af?liates and investors to cut ties with SCO. These alleged efforts to disrupt business relationships, together with the purportedly improper Linux disclosures, prompted SCO also to ?le suit against IBM for tortious interference of contract and business relations. In a separate order, ?nding insuf?cient evidence of actionable interference by IBM, the district court granted summary judgment in favor of IBM on these tortious interference claims. Finally, after the deadline for amended pleadings in this case, SCO sought leave to add a new claim for copyright infringement based on the allegedly stolen source code from Project Monterey. SCO claimed it had only discovered the essential facts to support this claim in most recent discovery disclosures. The district court rejected proposed amendment for failure to show good cause. SCO now appeals all three decisions by the district court: (1) the summary judgment order on the misappropriation claim; (2) the separate summary judgment order on the tortious interference claims, and (3) the denial of leave to amend the complaint. We REVERSE and REMAND the district court?s summary judgment order on the misappropriation claim, and AFFIRM as to the remaining issues. Appellate Case: 16?4040 Document? 01019892548 Date Filed: 10/30/2017 Page: 4 I. BACKGROUND A. UNIX Operating System and Intel Processors UNIX is a computer software operating system that is widely used in the business or ?enterprise? computing environment.1 In the late 19605, Technologies developed UNIX and began licensing it for widespread enterprise use, and those licensees in turn developed and distributed their own variations of the UNIX platform. One of those distributors, Santa Cruz, created a UNIX variation which eventually dominated the market for UNIX?based operating systems running on Intel processors. During the 19803, most other companies were running their UNIX variations on more expensive non-Intel architectures. Santa Cruz, however, recognized early on that transistors were getting smaller over time, so Intel?s cheaper processors were becoming faster and thus more capable of handling the demands of high?power enterprise computing. Santa Cruz predicted that Intel?s less?expensive processors would soon be able to run the UNIX operating system more effectively than earlier iterations of the hardware. By 1998, Intel processors had become as capable as the more expensive alternatives, and Santa Cruz had ultimately become the worldwide market leader for UNIX-on?Intel with 80 percent share of the market. In contrast to Santa Cruz, IBM had almost no presence in the UNIX-on-Intel market. Instead, IBM distributed its own UNIX derivative called AIX, which was designed to operate on own proprietary Power processors. The product was thus 1 An operating system serves as the link between the computer hardware and the various software programs or applications that run on the computer. Appellate Case? 16-4049 Document: 01019892548 Date Piied: 10/30/2617 Page: 5 suitably known as AIX for Power. Recognizing that Santa Cruz had positioned itself as the market leader for UNIX-based systems on the increasingly desirable Intel architecture, IBM began considering the bene?ts of collaborating with Santa Cruz. Further, IBM knew that Santa Cruz?s operating system was based on a more advanced version of the UNIX operating system: UnixWare System Release 4 own AIX platform was based on an earlier and less advanced code, so the opportunity to work with SCO and gain access to the code may have been appealing. Santa Cruz, for its part, also appreciated the advantages of working with IBM, which was a larger company with more resources, retail relationships, and marketing outlets. So the stage was set for a mutually bene?cial cooperative venture. B. Proiect Monterev and the Joint Development Agreement Before IBM and Santa Cruz began working together, most processors (including Intel?s chips) operated only at a 32?bit capacity, but in 1994, Intel announced its intention to develop a higher?capacity 64-bit chip called Itanium. Anticipating Intel?s forthcoming Itanium architecture, Santa Cruz and IBM jointly endeavored to build a new UNIX-based operating system that would run on the faster processor. In October 1998, Santa Cruz and IBM entered into a Joint Development Agreement (IDA) that would govern the mechanics of their collaboration, including licenses, royalties, and project management responsibilities. This endeavor became known as Project Monterey. As part of the IDA, each party granted the other a limited license to its own respective technologies for the purpose of developing the Product. 5 Appeilate Case: 164040 Document: 01019892548 Date Filed' 10/30/2017 Page: 6 After signing the JDA, the parties entered into a Project Supplement that provided: ?The Licensed Materials . . . are to be used solely for development of the IA-64 Product.? Aplt. App. 884 (emphasis added). According to SCO, this provision imposed a default rule that IBM could not use Santa Cruz?s contributed materials in its own AIX for Power. That Supplement, however, also included a caveat: ?Notwithstanding [that limitation], any such Licensed Material included in the IA-64 Product Release 1 shall be licensed pursuant to the terms and conditions set forth in the Aplt. App. 884 (emphasis added). In other words, any Santa Cruz materials that ultimately found their way into the Product Release 1? would be licensed to IBM pursuant to the JDA, which in turn granted IBM a ?worldwide, non-exclusive, royalty free? right of use, Aplt. App. 3085, DA Under these provisions, IBM would have known that if it wanted to use Santa Cruz?s materials in AIX for Power, there must be a Product Release 1? containing those materials. SCO further points out that a product release is only regarded as the Product Release 1? if the product is made generally available. This requirement is based on Amendment 5 to the JDA, which provided that if IBM wanted to distribute a ?Pre- Release Product? for testing purposes, that pre?release sublicense would terminate at least by the date of ?general availability of the IA-64 Product Release Aplt. App. 5157. Otherwise stated, any distribution of the Monterey system before the product became generally available was regarded merely as a ?Pre?Release IA-64 Product,? not the actual Product Release 1? itself. Thus, to the extent that IBM wanted a ?worldwide, non-exclusive, royalty free? license to the coveted code, it needed to 6 Appeilate Case: 1641840 Secument? 01019892548 Date Filed' 10/30/2017 Page' 7 wait until there was a generally available release of the Product which included that code.2 C. IBM Transitions Focus from Proiect Monterev to the Linux Operating System The success of Project Monterey hinged on the forthcoming availability of Intel?s 64-bit Itanium chip. But Intel was behind schedule in developing and delivering Itanium to market. Intel announced a target date of 1999, but was substantially delayed, and continued to have development dif?culties throughout 1999 and 2000. These delays caused a decrease in market interest in the IA-64 Product under construction through Project Monterey. The slump in market interest for the IA-64 Product caused IBM to transition its focus to a competing open?source operating system called Linux.3 At the time, Linux occupied the lower end of the computing market as it was designed for lower-capacity desktop computing. But IBM began to strengthen the Linux platform so that Linux could compete in the enterprise market, which was the focus of Project Monterey?s forthcoming UNIX-based product. 2 IBM does not appear to dispute this interpretation. Moreover, SCO offered evidence that IBM shared this understanding during the course of Project Monterey. For example, an internal IBM memo indicated that IBM believed withdrawal from Project Monterey would mean forfeiting access to Santa Cruz?s code. Aplt. App. 9059?60. 3 Unlike other UNIX-based systems, Linux is distributed without a fee to users, and the programming code is publicly available to all who want to access or customize it. 7 Appellate Case. 164040 Document: 01019892548 Date Filed 18/30/2017 Page: 8 As part of its contributions to Linux, as early as February 2000, IBM began disclosing some of Santa Cruz?s proprietary UNIX technologies?acquired through Project Monterey?to the Linux community for the purpose of fortifying Linux as a commercially viable option for enterprise use. The evidence suggests that revenues decline[d] precipitously in 2000 through 2002, dropping 74%, immediately after the ?rst alleged contributions of IBM in February of 2000.? Aplt. App. 73 84. sales dropped as customers migrated to Linux, which has been referred to as a ?free UNIX clone.? Aplt. App. 7389. Because of these declining revenues, SCO relies on Linux disclosures as part of the basis for its tortious-interference claim. general support for Linux, however, was no secret. As early as March 1999, IBM publicly announced its support of Linux at a LinuxWorld conference. But scaling up Linux to compete in the enterprise market posed a potential con?ict with Project Monterey. To assuage concerns, IBM began re-assuring the public and Santa Cruz that Linux and the IA-64 Product would compete in di?erent markets, so there was no con?ict. For example, in August 1999, IBM officers explained publicly that the Monterey Product would target enteiprise?level computing needs while Linux was designed for the smaller-scale computing market. IBM made similar representations in a private meeting with Santa Cruz officers in January 2000. But at least one IBM executive recognized that such a distinction was fragile: The distinction used to position Monterey versus Linux is that Monterey is targetted [sic] for high-end servers, where as Linux comes in at the lower to mid range of servers. However, this distinction is a fragile one, since IBM is Appeilate Case: 16-4040 Document: 01019892548 Date Fiied: Page: 9 working as fast as it can to bolster Linux ?3 ability to compete in the mid to high end range of servers. Aplt. App. 5693 (emphasis added). Construing the evidence in favor, it may be that IBM led Santa Cruz to believe its Linux product would not compete against enterprise-level developers?but IBM was actually working quickly, and without Santa Cruz?s knowledge, to scale up Linux to compete in the enterprise space. Meanwhile, IBM maintained that it was fully committed to Project Monterey. It reaf?rmed that commitment in the January 2000 meeting and, as late as December 2000, IBM stated publicly that its devotion to the success of the Product remained strong. But a jury could ?nd that heart was not in Project Monterey. Throughout late 1999 and early 2000, IBM executives began recommending ?internally that IBM take more de?nitive steps to drop Project Monterey and transition even more support to [Linux].? Aplt. App. 9591, Dist. Ct. Op. at 24. In July 2000, another IBM internal report recommended a ?signi?cant reduction in emphasis? in Project Monterey. Aplt. App. 6202. Further, effort to bolster Linux as a potential competitor in the enterprise space could indicate to a jury that IBM was not fully committed to the success of Project Monterey, despite its public assurances to the contrary. D. Alleged Misappropriation of Santa Cruz?s Code In October 2000, IBM used some of the code in a test version of its own AIX for Power product, which was intended for certi?ed software developers and ?not intended for general production use.? Aplt. App. 8610. This appears to have been a preparatory step in anticipation of later releasing an upgraded AIX for Power product for 9 Appellate Case: 16?4040 Document: 01019892548 Date Filed: 10/30/2017 Page: 10 general distribution. But again, IBM would need to make generally available the Monterey operating system including the code before IBM would acquire the royalty-free license for general distribution of that code in its own products. With that in mind, IBM announced in April 2001 a forthcoming IA-64 Product, which included the code, and planned to make it available on May 4, 2001. As scheduled, IBM released a version of the Monterey operating system on May 4, 2001 as a Programming Request for Price Quote (PRPQ), which is the term used internally at IBM to describe beta test releases. This release lacked what is known as a compiler, which in this case refers to a software program that translates programming code into a language readable by the computer processor. Without a compiler, an operating system cannot be executed by the processing hardware, but it does not seem that IBM had a con?rmed plan to include a compiler in the product. Moreover, this Monterey release was offered free of charge and without support, was not on price lists, and was not marketed. In light of these characteristics, a reasonable jury could ?nd that this PRPQ version was not a generally available release of the product and thus did not entitle IBM to a royalty?free license to the code included therein.4 4 One internal e?mail from an IBM executive defending the PRPQ release cuts in the other direction, explaining that IBM had ?a very positive product to deliver? that was ?not under-function for this target delivery? and was ?stable and worth release.? Aplt. App. 5167. But this is a disputed issue of material fact. On summary judgment we adopt the version of the facts most favorable to SCO, which suggests that May 4, 2001 PRPQ of the Monterey product was not equivalent to a generally available release. 10 Appeilate Case: 16-4040 Document: 01019892548 Date Filed: 10/301201? Page. 11 Moreover, the evidence suggests that IBM was conscious of the inadequacies of this May 4, 2001 release of the Monterey product. For example, an IBM project manager stated in an internal e-mail: think the compiler MUST be available in some form or the whole thing just doesn?t make sense (is [Santa Cruz] won buy Aplt. App. 5194 (italicized emphasis added). And another internal IBM strategy document explained that there was ?no con?rmed compiler plan? and that IBM would ?[c]ontinue to ship AIX 5L as a which would be in ?[s]tealth mode only.?5 Aplt. App. 5170. That document also indicated that IBM would the appropriate time announce plan not to GA AIX 5L and withdraw the sometime during the ?July/August timeframe.?6 I_d. What is more, one piece of evidence suggests that IBM appears to have known that the May 4, 2001 PRPQ version might not have been suf?cient to acquire the license. In one internal e-mail, an IBM employee stated: ?As you know, we need to GA this PRPQ to gain rights to [Santa Cruz] code we want for our base AIX product delivery . . . I know the ?ne lines we are walking here.? Aplt. App. 5167. Nevertheless, despite the de?ciencies in the May 4, 2001 release of the Monterey operating system and despite apparent knowledge of the problem, that very same day IBM released for general distribution a version of its own proprietary AIX for Power product that included the code. SCO thus argues that IBM released a ?sham? 5 The reference to appears to be shorthand for the product released for operation on Intel?s IA-64 processor. 6 We assume the acronym to be a reference to ?general availability? of the 64 Product. 11 Appellate Case: 1.64040 {Document 01019892548 Date Filed; 10/30f2017 Page: 12 version of the Monterey system in order to legitimize its own general distribution of the AIX for Power product containing Santa Cruz?s code. (Aplt. Br. 2, 13.) This is the essence of misappropriation claim.7 E. Santa Cruz Transfers Assets to Caldera International Santa Cruz owned a license to use, develop, and distribute its UNIX-based technology.8 During the life of Project Monterey, however, Santa Cruz decided to sell its UNIX business to SCO.9 In mid-June 2000, Santa Cruz sent IBM an of?cial notice of the 7 initial claim of misappropriation was based not on the allegedly stolen code, but rather on the improper Linux disclosures discussed earlier. SCO says it discovered the code in the AIX for Power product late in the discovery process after filing this lawsuit, which is why the current misappropriation theory differs from the original theory. IBM does not appear to dispute, however, that a party can change its theory for a particular existing cause of action as new evidence comes to light during the discovery process. Moreover, the language of operative complaint encompasses this revised theory. The cause of action is labeled ?unfair competition? and it is based, in part, on ?[m]isappropriation of source code, methods, and confidential information of plaintif as well as ?[u]se of deceptive means and practices in dealing with plaintiff with respect to its software development Aplt. App. 156. 8 A company called Novell, Inc. (Novell) purchased the UNIX assets and intellectual property rights from (the original developer) in 1993, and later sold its UNIX business to Santa Cruz in 1995. As described in two earlier decisions of this Court, Santa Cruz did not receive the full panoply of intellectual property rights in that 1995 transaction, but rather received only a license to use, develop, and distribute Novell?s copyrighted UNIX technologies. See SCO Group, Inc., v. Novell, Inc., 439 F. App?x 688, 691?93 (10th Cir. 2011) (unpublished); SCO Group, Inc. v. Novell. Inc., 578 F.3d 1201, 1204-06 (10th Cir. 2009). 9 At the time of this transaction, plaintiff SCO went by the name Caldera International. For consistency and convenience, we use the SCO label to describe plaintiff even at the time that it acquired Santa Cruz?s intellectual property rights. 12 Appellate Case: 10?4040 Document: 01019892548 Date Filed: 10/301201? Page; 13 forthcoming asset transfer to SCO.10 Hearing no formal objection from IBM, Santa Cruz followed through with the agreement and, on May 7, 2001, ?nalized the deal with SCO. On June 6, 2001, Santa Cruz informed IBM of the consummation of the sale and the assignment of the rights under the IDA. IBM then responded on June 19, 2001, formally objecting to the assignment and of?cially terminating the JDA, thereby putting a formal end to Project Monterey. F. Alleged Direct Interference With Business Relationships In late 2002 and early 2003, SCO began investigating the intellectual property within Linux and discovered that Linux customers were using proprietary UNIX technologies. SCO then devised a licensing strategy whereby Linux users would purchase from SCO a license to use Linux, as enhanced by proprietary technologies. SCO presented this licensing plan to multiple partners, including Oracle, Intel, and Computer Associates, all of which responded favorably. IBM, on the other hand, objected to the proposed strategy. IBM asked SCO not to issue its press release announcing and initiating the licensing plan. Nevertheless, in January 2003, SCO announced a new business division, SCOsource, to manage the licensing of its UNIX technologies for Linux customers. The 10 The JDA governing Project Monterey required Santa Cruz to give IBM notice if Santa Cruz received an offer by another company to purchase substantially all of Santa Cruz?s assets. Aplt. App. 3109, IDA 16.1. This requirement was apparently designed to give IBM a reasonable period of time to submit a counteroffer. IDA 16.2. 13 Appeilate Case: 16?4040 Document: 01019892548 Date Fitted: 10/383017 Page: 14 next day, IBM executive Karen Smith told CEO Darl McBride that she expected approach to ?kill Linux.? Aplt. App. 4095. She further threatened: [I]f did not drop [its] library licensing program and [its] investigation of Linux and withdraw [its] press release . . . that IBM was going [to] cut off all business from and they were going to encourage partners and customers from doing any business with SCO as well. at 4095. SCO did not back down. That afternoon, Smith met with Hewlett~Packard executive Richard Becker. According to Becker?s deposition, [Smith] indicated to [him] that IBM was going to withdraw all their business activities from SCO, and that in the interest of the best outcome for and Hewlett-Packard?s] joint Linux initiatives that she was going to suggest that HP, and [he] was representing HP, and following [him], Intel should do the same. Aplt. App. 2352. SCO believes that, in addition to Hewlett?Packard, IBM directly communicated with other SCO business affiliates and investors in an effort to persuade those entities to refrain from doing business with SCO. Those entities included Oracle, Computer Associates, Intel, and Baystar. SCO presented evidence that, after SCO began implementing its licensing strategy, these entities began withdrawing or reducing their business dealings with SCO. IBM responded, however, with sworn declarations by executives representing each entity indicating that, to the best of their knowledge, IBM never approached them about cutting ties with SCO and that any change in business dealings with SCO was not the result of statements or actions. Nevertheless, SCO l4 Appetlate Case: 16-4040 Document: 01019892548 Date Filed; 10/30/2017 Page: 15 asserts that IBM directly interfered with business relationships by inducing key investors and af?liates to cease doing business with SCO. G. Procedural Background We are now almost ?fteen years into this litigation. SCO ?led the initial Complaint on March 6, 2003, which included nine claims against IBM.11 After twice amending its Complaint, SCO sought leave to amend a third time in October 2004, after the deadline for amended pleadings, for the purpose of adding a tenth cause of action for copyright infringement based on alleged misuse of the code. The district court denied that motion, ?nding insuf?cient cause to permit the untimely addition of the claim. The case then proceeded but was administratively closed in 2007 after SCO ?led for bankruptcy. Alongside its suit against IBM, SCO also ?led suit against another company called Novell, which had publicly claimed that it, rather than SCO, owned the UNIX copyrights. Novell entered into an asset purchase agreement with Santa Cruz in 1995 wherein Novell transferred a license to the UNIX technology to Santa Cruz. Santa Cruz believed that it had received through this asset transfer the UNIX copyrights, and thus the right to license 11 Counts 1 through 4 alleged breaches of the original software and sublicensing agreements between IBM and (the original UNIX developer), and between Sequent Computer Systems, Inc. (which was later acquired by IBM) and Count 5 alleged copyright infringement based on later?disproven belief that it owned the UNIX copyrights. Count 6 alleged unfair competition by means of, in part, misappropriation. Count 7 alleged tortious interference of contracts with Linux users and licensees. Count 8 alleged tortious interference of asset purchase agreement with Novell executed in 1995. Count 9 alleged tortious interference of specific business relationships. 15 Appellate Case; 16-4040 Document: 01019892548 Date Filed: 10/30/2017 Page: 16 all derivations and variations of the UNIX system. That belief, however, ended up being wrong. In 2011, this Court af?rmed a jury verdict that found Santa Cruz did not, in fact, receive the UNIX copyrights in that deal, rather it merely received a license to use, develop, and distribute the UNIX technology. See SCO Group, Inc. v. Novell, Inc., 439 F. App?x 688 (10th Cir. 2011) (outlining this background). When the bankruptcy stay was lifted in this case, the district court here re-opened the case in 2013. Because the Novell litigation had established that SCO did not own the copyrights to the UNIX technologies, SCO voluntarily dismissed many of its claims against IBM that were predicated upon that faulty assumption. All that remained of case against IBM were allegations that IBM (1) committed unfair competition by means of misappropriation, and (2) tortiously interfered with business relationships.12 On February 5, 2016, the district court awarded summary judgment to IBM on the misappropriation claim. In a separate order, on February 8, 2016, the district court also awarded IBM summary judgment on the tortious interference claims. SCO brings three issues to this Court for appeal: (1) the district court?s summary judgment order on the misappropriation claim; (2) the district court?s separate summary judgment order on the tortious interference claims; and (3) the district court?s denial of leave for SCO to add a claim for copyright infringement after the deadline for amended pleadings. We address these issues in turn. 12 Count 6 encompassed the misappropriation claim; Counts 7 and 9 represented the remaining claims for tortious interference. l6 Appellate Case; 16-4040 Document; 01019892548 Date Filed: 1013012617 Page: 17 II. DISCUSSION A. Misappropriation 1 . Applicable Law The parties could not agree on which State?s law governs misappropriation claim. Instead they have stipulated that either the laws of Utah or New York should control, believing there are no material differences in the relevant legal principles. The district court similarly relied on both Utah and New York law to ground its analysis of this claim. We cannot, however, analyze this claim without first deciding which State?s law should govern. The JDA provides: ?This Agreement shall be governed by, and the legal relations between the parties hereto shall be determined in accordance with, the substantive laws of the State of New York.? Aplt. App. 3112, JDA 22.3. Whether claim ultimately sounds in contract or tort, this provision mandates that ?the legal relations between the parties? be adjudicated pursuant to New York law. I_d. That phrase is sufficiently broad to encompass a claim by one party of unfair competition based on misappropriation.? Thus, we rely on New York substantive law to resolve the propriety of summary judgment on misappropriation claim. 13 Moreover, the parties? consensus that the laws of New York and Utah are materially the same on this issue further confirms that our application of New York law should be acceptable to the parties. 17 Appellate Case: 164040 Document: 01019892548 Date Filed: 10130/2017 Page: 18 New York courts recognize ?two theories of common?law unfair competition: palming off and misappropriation.?14 ITC Ltd. V. Punchgini, Inc., 880 852, 858 (NY. 2007). The gravamen of claim is misappropriation, which ?concerns the taking and use of the plaintiff?s property to compete against the plaintiff?s own use of the same property.? Sidney Frank Importing Co., Inc. V. Beam Ing, 998 F. Supp. 2d 193, 208?9 (S.D.N.Y. 2014) (internal quotation marks omitted) (interpreting New York law); accord Punchgini, 880 at 859. ?To state a claim for the misappropriation theory of unfair competition, a plaintiff must allege that the defendant: (1) misappropriated the plaintiff?s labors, skills, expenditures, or goodwill; and (2) displayed some element of bad faith in doing so.? Sidney Frank Importing, 998 F. Supp. 2d at 209 (internal quotation marks, citations omitted). Tracking these requirements, SCO claims that IBM misappropriated the code for its own commercial advantage and exhibited bad faith in doing so by pretending to support Project Monterey and releasing a sham version of the IA-64 Product in order to legitimize its use of code. 14 Relying on an unpublished case from the Second Circuit, SCO argues ?the tort of unfair competition is a broad and ?exible doctrine that has been described as encompassing any form of commercial Big Vision Private Ltd. V. BL du Pont de Nemours Co., 610 F. App?x 69, 70 (2d Cir. 2015) (unpublished) (internal quotation marks omitted) (interpreting New York law). SCO says, therefore, that unfair competition is not limited only to palming off and misappropriation, but is much broader. The interpretation of New York?s highest court, however, controls over that of a federal court expressed in an unpublished case. Because New York limits its unfair-competition tort to palming off and misappropriation, Punchgini, 880 at 858, we confine our understanding of the tort to those theories alone. 18 Appetlate Case: 15-4040 Document: 01019892548 Date Fiied; 10t3t?t2017 Page: 19 2. Independent ort Doctrine The district court granted motion for summary judgment after concluding that the ?independent tort doctrine? precluded the misappropriation claim. The independent tort doctrine provides that ?a simple breach of contract is not to be considered a tort unless a legal duty independent of the contract itself has been violated.? Clark~Fitzpatrick, Inc. V. Long Island RR. C0., 516 190, 193 (NY. 1987). This separate duty must ?spring from circumstances extraneous to, and not constituting elements of, the contract, although it may be connected with and dependent upon the contract.? at 194 (emphasis added). When the plaintiff is ?essentially seeking enforcement of the bargain,? rather than a societal policy or law that gives rise to a duty of care, ?the action should proceed under a contract theory.? Sommer v. Fed. Signal Com, 593 1365, 1369 (NY. 1992); see also Abacus Fed. Savings Bank v. ADT Sec. Serve, Inc., 967 666 (NY. 2012) (?nding no separate liability in tort when the gravamen of the claim was the defendant?s failure to make good on its promise to offer functional security services that would prevent a bank burglary). In other words, when the defendant has a duty ?separate and apart from its contract obligations,? then an action in tort will lie. N.Y. Univ. v. Continental Ins. Co., 662 763, 768 (NY. 1995) (?nding no separate liability in tort when the breach of an insurance policy also violated New York statutory insurance law because ?the provisions of the Insurance Law are properly viewed as measures regulating the insurer?s performance of its contractual obligationslegislative imposition of a separate duty of reasonable care?). 19 Appellate Case: 164040 Document: 01019892548 Date Filed: 10/301201? Page: 20 For this analysis, we focus not on the conduct which might constitute a breach of contract, but instead on the defendant?s duties. As an intermediate New York appellate court helpfully explained: [T]he focus is not . . . on whether the tortious conduct is separate and distinct from the defendants? breach of contractual duties, for it has long been recognized that liability in tort may arise from and be inextricably intertwined with that conduct which also constitutes a breach of contractual obligations. Rather, the focus is on Whether a noncontractual duty was violated; a duty imposed on individuals as a matter of social policy, as opposed to those imposed consensually as a matter of contractual agreement. Apple Records, Inc. v. Capitol Records, Inc., 529 279, 281?82 (N.Y. App. Div. 1988) (emphasis added) (internal citations omitted). To illustrate, consider a scenario where two parties reach an agreement that one shall not assault the other. If an assault occurs, we would not say that the victim is limited to a breach-of?contract remedy?of course he would also have a claim for tortious assault. That is because society imposes a duty not to assault others which is independent of the contractual promise made by the parties. With this in mind, we turn to the misappropriation claim here. The district court held that the independent tort doctrine barred claim, but in doing so the district court focused too narrowly on allegedly wrongful conduct, observing that the same conduct would constitute both an unfair?competition claim and a breach of the IDA. But that analysis misses the point. What matters is not whether ?use of the code? violated the contract, but rather whether IBM violated some separate and independent non-contractual duty in using that code. 20 Appeilate Case: 16?4040 Document: 01019892548 Date Fiied: 19/30/2017 Page: 21 To be sure, the district court devoted some attention to this question, but it restricted its inquiry to whether there existed a?duciary relationship between the parties, a joint venture or partnership, giving rise to a heightened duty of care. The JDA clearly provides that ?[t]his Agreement shall not be construed to establish any form of partnership, agency, franchise or joint venture of any kind between SCO and IBM, . . [nor] to provide for any sharing of pro?ts or losses between the parties.? Aplt. App. 3113, IDA 22.5. So the district court correctly concluded that the parties were dealing with each other at arms? length and had no fiduciary or heightened duty toward one another. But New York does not appear to require a heightened duty incident to a partnership or fiduciary relationship as a predicate to an unfair competition claim? any common-law or statutory duty will suffice. For example, in Sidney Frank Importing Co., Inc. v. Beam Inc., 998 F. Supp. 2d at 210, a federal court applying New York law permitted a whiskey distributor to bring a misappropriation claim against its supplier even though the supply contract addressed the wrongful conduct, and there was no specially recognized relationship between those two entities other than the fact that they did business together. In another case, Cargill, Inc. v. Sears Petroleum Transport Corn, 388 F. Supp. 2d 37, 65 (S.D.N.Y. 2005) (interpreting New York law), a misappropriation claim survived alongside a breach-of?contract claim when the breached agreement specifically governed the use of confidentially shared information between the parties, and the parties had not formalized any joint venture between themselves. 21 Appellate Case. 16?4048 Document: 01019892548 {Date Filed: 10/30/2017 Page: 22 Similarly, in this case, while IBM and SCO may not have had a formal partnership or joint venture as a matter of law, they surely enjoyed a business relationship in which each reposed a degree of trust and confidence in the other. In that situation, there exists a duty not to take a business collaborator?s property in bad faith and without his consent in order to compete against that owner?s use of the same property. Because that duty is separate from the I DA, even though the JDA addresses the same topic, the independent tort doctrine does not bar misappropriation claim. Accordingly, the district court?s order cannot be affirmed on this ground. 3. Standing as Assignee ofSanta Cruz ?5 Claim IBM offers alternative reasons to af?rm the summary judgment order. It ?rst contends that SCO lacks standing to pursue its misappropriation claim. SCO was not a party to the JDA, rather it was the successor-in-interest to Santa Cruz?s intellectual property rights. In 2000, Santa Cruz assigned to SCO all of its ?right, title and interest? in the UNIX technologies, Aplt. App. 5311, including the ?rights and privileges pertaining to? the intellectual property, at 5312, and all ?rights to enforce con?dentiality or similar obligations? in relation to the transferred assets, The I DA, however, contained a provision limiting Santa Cruz?s assignment power: ?[n]either party may assign, or otherwise transfer, its rights . . . under this Agreement without the prior written consent of the other party.? Aplt. App. 3114, JDA 22.12. 22 Appellate Case: 16-4040 Document: 01019892548 Date Filed: 10/30/2017 Page; 23 Because IBM never gave its prior written consent to Santa Cruz?s assignment, it argues that SCO did not validly acquire any right from Santa Cruz to sue for misappropriation. This argument falls flat for two reasons. First, under New York law, a non? assignment provision that merely prohibits assignment?and does not expressly declare that such assignments are void or invalid??merely entitles the aggrieved party to damages. See Sullivan v. Int?l Fidelity Ins. Co., 465 235, 237-38 (NY. App. Div. 1983) (citing cases). Without such a clear and express statement of invalidity of assignments included in the contract, the assignment survives and the assignee can enforce the transferred rights against the third party. It}, In this case, the DA merely prohibits assignment without consent?it does not state that nonconsensual assignments are void. Second, and more importantly, the non-assignment provision here speci?cally forbids the transference of rights ?under this Agreement.? Aplt. App. 3114, JDA 22.12. We have already held that lawsuit is not to vindicate rights under the JDA itself, but is instead to vindicate a tort arising from a duty separate and apart from that contract. Accordingly, even if this non-assignment provision operated to invalidate nonconsensual contractual assignments, the assignment of rights at issue here is outside the scope of that provision. SCO therefore has standing to bring its misappropriation claim against IBM as an assignee of Santa Cruz?s rights.15 15 IBM cites one unpublished federal case, TeeVee Toons, Inc. v. Gerhard Schubert GmbH, No. 00 Civ. 5189, 2006 WL 2463537 (S.D.N.Y. Aug. 23, 2006), for the proposition that a non-party to a contract lacks standing to sue on the contract. But 23 Appeilate Case; 16?4040 Document: 01019892548 Date Filed: 1080/2017 Page; 24 4. Limitations Period IBM next contends that misappropriation claim is untimely under the contractual limitations period. The JDA provided: ?Any legal or other action related to a breach of this Agreement must be commenced no later than two (2) years from the date of the breach . . . Aplt. App. 3113, JDA 22.3 (emphasis added). At the outset, SCO objects to the application of this provision to its tort claim which, as earlier discussed, is separate from the contract. We may assume, without deciding, that the contractual language applies not only to breach-of?contract claims, but also to ?[a]ny legal or other action related to a breach? of the JDA. I_d. (emphasis added). Even as a separate tort action, there is no question that misappropriation claim is ?related to? a breach of the JDA because the JDA expressly deals with the use of licensed materials. We thus apply the two-year limitations period to misappropriation claim, which SCO initially filed on March 6, 2003. Nevertheless, SCO complied with the contractual limitations period because it filed suit less than two years after its claim accrued. Under New York law, tort claim accrues as soon as the claim becomes enforceable, when all elements of the tort can be truthfully alleged in a IDT Corp. v. Morgan Stanley Dean Witter Co., 907 268, 273 (NY. 2009) (internal quotation marks, citation omitted). Recall that the elements of a misappropriation claim are that the TeeVee Toons is materially different from the case before us: it did not involve any assignment or transfer of rights to a third party. 24 Appellate Case: 16-4040 Document: 01019892548 Date Filed: 10/30l201'7 Page. 25 defendant misappropriated the plaintiff?s labors, skills, expenditures, or good will[,] and (2) displayed some element of bad faith in doing so.? Sidney Frank Importing, 998 F. Supp. 2d at 209. misappropriation theory is predicated on the improper inclusion of the code in AIX for Power product.16 That claim accrued when IBM released the AIX for Power operating system containing the code on May 4, 2001, which was less than two years before SCO filed its complaint. This release was allegedly undertaken in bad faith because IBM attempted to legitimize its distribution of the SVr4?enhanced AIX product based on a ?sham? release of the Monterey operating system made available on a limited basis that very same day. (Aplt. Br. 13.) Thus, May 4, 200], is the date upon which ?all elements ofthe tort [could] be truthfully alleged in a complaint? against IBM. IDT Corp, 907 at 273 (internal quotation marks omitted). To be sure, IBM included the code in a beta test version of AIX for Power in October 2000, but there was nothing improper about that because IBM was expected to take preparatory steps toward eventually releasing a functional and publicly available version of its AIX for Power product containing the code. 16 initial theory of misappropriation was based on alleged disclosure of confidential materials, acquired through Project Monterey, to the Linux community in order to make Linux competitive in the enterprise computing market. However, SCO specifically asserts that it only learned of improper use ofthe code during discovery in this case, at which point its theory shifted to focus on the improper use of that code, rather than the Linux disclosures. 25 Appetlate Case: 16?4040 Document: 01019892548 Date Filed; 10/301201? Page: 26 claim therefore did not accrue at that time. IBM counters that SCO instructed its own expert to calculate damages for the misappropriation claim beginning on October 1, 2000. But we decline to assign that fact any significance, as SCO cannot unilaterally change the claim accrual date any more than IBM can change it?and were SCO to prevail at trial on this claim, a factfinder could certainly disagree with damages calculations. Accordingly, claim for misappropriation based on improper use of the code in the AIX for Power product accrued on May 4, 2001, well within the contractual limitations period. 5. Copyright Preemption IBM argues that misappropriation claim is preempted by federal copyright law. Section 301 of the federal Copyright Act provides: ?[A]ll legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright . . . and come within the subject matter of copyright . . . are governed exclusively by? federal copyright law. 17 U.S.C. 301(a). In other words, the Copyright Act ?preempts a state common law or statutory claim if: (1) the work is within the scope of the subject matter of copyright . . . and (2) the rights granted under state law are equivalent to any exclusive rights within the scope of federal copyright . . . Harold Stores, Inc. v. Dillard Dep?t Stores, Inc., 82 F.3d 1533, 1542-43 (10th Cir. 1996) (internal quotation marks, citations omitted). The parties do not dispute that the code at issue here is copyrightable subject matter, s? Lexmark Int?l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 533 (6th Cir. 26 Appellate Case: 16-4040 Document: 01019892548 Date Filed: 1080/2017 Page; 27 2004), so we proceed on that assumption. The real battleground is whether misappropriation claim is ?equivalent? to any of the exclusive rights granted by federal copyright law. 17 U.S.C. 301(a). Section 301 ?preempts only those state law rights that may be abridged by an act which, in and of itself, would infringe one of the exclusive rights provided by federal copyright law.? Harolds Stores, 82 F.3d at 1543 (quoting Computer Assocs. Int?l v. Altai, Inc. 982 F.2d 693, 716 (2d Cir. 1992)). Those exclusive rights include the rights to reproduce the work, prepare derivative works, distribute copies, and perform or display the work publicly. See 17 U.S.C. 106; see also Harolds Stores, 82 F.3d at 1543. Accordingly, ?if a state cause of action requires an extra element, beyond mere copying, preparation of derivative works, performance, distribution or display, then the state cause of action is qualitatively different from, and not subsumed within, a copyright infringement claim and federal law will not preempt the state action.? Gates Rubber Co. v. Bando Chemical Indus, Ltd., 9 F.3d 823, 847 (10th Cir. 1993) (emphasis added). The dispositive question, then, is whether a misappropriation claim under New York law has an ?extra element? beyond the elements of a federal copyright infringement claim. We hold that it does. Misappropriation claims in New York require the victim to demonstrate that the defendant acted with badfairh. See, Schroeder v. Pinterest Inc., 17 678, 693 (N.Y. App. Div. 2015); Abe?s Rooms, Inc. v, Space Hunters, Inc., 833 138, 140 (NY. App. Div. 2007); Saratoga Vichy Spring Co., Inc. v. Lehman, 625 F.2d 1037, 1044 (2d Cir. 1980) (observing that the ?element of bad 27 Appeilate Case: 16?4048 Document: 01019892548 {Date Filed: 10/301'2017 Page: 28 faith? is central to the misappropriation theory of unfair competition under New York law); see also 104 NY. Jur. 2d Trade Regulation 248 (Aug. 2017) (?The gravamen, or essence, of unfair competition under New York law is the bad faith misappropriation? of another?s property. (footnotes omitted)). By contrast, federal copyright infringement does not require proof of bad faith. A plaintiff seeking relief for federal copyright infringement must prove only that he ?owns a valid copyright? and that the defendant ?copied protectable elements of the copyrighted work.? Pavcom Payroll, LLC V. Richison, 758 F.3d 1198, 1204 (10th Cir. 2014) (internal quotation marks, citation omitted). Because misappropriation under New York law has the extra element of bad faith, claim is not ?equivalent? to a federal copyright infringement claim. Accordingly, it is not preempted by the Section 301 of the Copyright Act.17 17 IBM argues that the district court?s denial of attempt to add a copyright infringement claim should be relevant in determining whether the Copyright Act preempts misappropriation theory. It is not. The district court precluded amendment of complaint for procedural had failed to demonstrate good cause for why the copyright claim was not included in the initial complaint. That does not mean that misappropriation under New York law is ?equivalent? to a copyright infringement claim for preemption purposes. Nor does unsuccessful attempt to amend its complaint prevent SCO from using facts learned during the discovery stage as the basis for its existing causes of action, misappropriation. As explained earlier, that is apparently what SCO did here. After it discovered the presence of the code in AIX for Power product, that discovery became the predominant basis for its existing misappropriation claim, displacing its earlier theory of misappropriation which focused on the confidential materials which IBM allegedly disclosed to the Linux community. 28 Appe?ate Case: 1631-4040 Document: 01019892548 Date Fiied: 10/30/2017 Page: 29 B. Tortious Interference 1. Applicable Law The parties have apparently agreed that Utah law governs tortious interference claims.18 Although the DA requires that the ?legal relations between the parties? are governed by New York law, Aplt. App. 3112, JDA 22.3, alleged intermeddling does not concern the legal relations between IBM and SCO. Moreover, headquarters and principal place of business is in Utah, so that is where it suffered the alleged injury. Accordingly, we apply the law from the State of Utah in evaluating tortious interference claims. Under Utah law, the elements of tortious interference are: (1) intentional interference with plaintiff?s existing or potential business relationships, (2) the interference is accomplished by improper means, and (3) injury suffered by plaintiff. Eldridge V. ohndrow, 345 P.3d 553, 556 (Utah 2015).19 With these elements in mind, SCO offers two theories of tortious interference. First, SCO alleges that IBM indirectly interfered with business relationships generally in the UNIX-on-Intel market by 18 The district court relied on Utah authorities, and the parties cite Utah cases throughout their briefs before this Court, as they did in the district court. 19 Before Eldridge v. ohndrow was decided in 2015, Utah courts permitted a plaintiff to prove tortious interference even without improper means, so long as the defendant harbored a predominant improper purpose. 53,5; 345 P.3d at 556; see also Anderson Dev. Co. v. Tobias, 116, P.3d 323, 331 (Utah 2005) one alternative, either improper purpose or improper means, need be established; a plaintiff need not prove both?). Eldridge changed the law by repudiating the improper?purpose alternative and requiring improper means to establish a claim for tortious interference. 345 P.3d at 565 (?We therefore conclude that the improper-purpose doctrine has not worked well in practice, . . . . It should therefore be abandoned.? (internal citation omitted)). 29 Appellate Base: 164040 Document: 01019892548 Date FiEed: 10/30/2017 Page. 30 improperly disclosing Santa Cruz?s proprietary materials to the Linux community, thereby causing customers to prefer Linux over fee?based UNIX platform. Second, SCO claims that IBM directly interfered with business relationships by inducing af?liates to cut ties with SCO. We address these in turn. 2. Indirect Interference [trough Improper Linux Disclosures The district court found that theory of indirect interference based on Linux disclosures is not actionable under Utah law. SCO asserts that wrongful disclosures of proprietary UNIX materials to the open?source community drove potential customers away from its fee-based products and toward the free Linux alternative, resulting in substantially diminished sales in the UNIX-on-Intel market. In other words, this theory is predicated upon a defendant?s alleged market? based activities which may have caused potential customers to refrain from doing business with the plaintiff. Whether Utah courts would recognize such a theory as a tortious?interference claim is an unsettled question of state law. ?[W]hen an appeal presents an unsettled question of state law, we must ordinarily 37! ?attempt to predict how the highest court would interpret the issue. Belnap v. Iasis Healthcare, 844 F.3d 1272, 1295 (10th Cir. 2017) (alterations omitted) (quoting Cornhusker Cas. Co. v. Skai, 786 F.3d 842, 852 (10th Cir. 2015)). ?Further, ?We are generally reticent to expand state law without clear guidance from the highest court. I_d. (quoting Schrock V. Wyeth, Inc., 727 F.3d 1273, 1284 (10th Cir. 2013)). In fact, we have indicated that a party encouraging a federal court to apply a new legal principle under 30 Appeiiate Case; 16?4040 Document: 01019892548 Bate Fiied: 10/30/2017 Page; 31 state law must make a ?strong showing? that the highest court of that state would adopt that principle if presented with the question. I_d. at 1295 (?Absent a strong showing to the contrary, we are disinclined to predict that the Utah Supreme Court would recognize? another theory of estoppel); at 1296 (?And Defendants fail to make such a strong showing?). With this in mind, we turn to Utah law. Utah law clearly embraces a theory of intentional interference based on evidence that potential or prospective customers?rather than merely existing customers?were driven away by the defendant?s improper intermeddling. See, e. g. Anderson Dev. Co. V. M, 116 P.3d 323, 331 (Utah 2005) claim for intentional interference with economic relations protects both existing contractual relationships and prospective relationships of economic advantage not yet reduced to a formal contract.? (internal quotation marks, citation omitted)); Leigh Furniture Carpet Co. v. Isom, 657 P.2d 293, 306 (Utah 1982), overruled on other grounds by Eldridge, 345 P.3d at 553 (?Driving away an individual?s existing or potential customers is the archetypical injury this cause of action was devised to remedy.? (citations omitted)). Furthermore, Utah law does not require that a defendant directly confront the third party to induce that person to cut economic ties with the plaintiff. The Utah Supreme Court?s seminal decision in Leigh Furniture Carpet Co. v. Isom, illustrates this point. In that case, the defendant committed tortious interference when its representatives frequently visited plaintiff? 5 ?store during business hours to confront him, question him, and make demands and inquiries regarding the manner in which he was conducting his business.? Leigh Furniture, 657 P.2d at 306. These disruptive intrusions ?repeatedly 31 Appellate Case. 16-4040 Document: 01019892348 Date Filed: lO/30l2017 Page: 32 interrupted sales activities, caused [plaintif??s customers to comment and complain, and more than once caused a customer to leave the store.? L1. Although there was no direct communication between defendant and the third-party customers who were driven away from plaintiff?s business, the Utah Supreme Court nevertheless found this to be actionable interference by the defendant. But theory of indirect interference goes substantially further than the facts of Leigh Furniture. In this case, alleged improper conduct was directed toward the public and the market generally. The evidence, when construed in favor, suggests that IBM improperly disclosed con?dential Monterey materials to a public community of interested software developers who then used those contributions to strengthen the open? source Linux platform, which ultimately became a preferable alternative to fee- based UNIX product, thereby diminishing customer base. To be sure, Leigh Furniture endorsed a tortious?interference claim based on potential customers who were not directly contacted by the defendant, but it does not follow clearly from Leigh Furniture that any improper conduct directed toward the public and the general market would be actionable as a claim for tortious interference whenever a competitor?s business relationships suffer as a result of the improper conduct. That, in effect, would convert almost any claim for illegal market?based activities into a tortious? interference claim, and we ?nd no indication in Utah case law that the state supreme court would accept such an expansive interpretation. At the very least, because SCO has not cited any controlling case on point, it has failed to make a ?strong showing? that the Utah Supreme Court would validate this theory if presented with the issue. Belnap, 844 32 Appellate Case: 16-4040 Document: 01019892548 Sate Flied: 10/381201? Page: 33 F.3d at 1295, 1296. Accordingly, we agree with the district court that indirect- interference theory is not actionable under Utah law. 3. Direct Interference by Inducing Business Partners to Cut Ties With SCO The district court also granted summary judgment on direct-interference theory based on alleged efforts to persuade business partners and investors to cut ties with SCO. The district court ?rst concluded that, with the exception of communications with Hewlett?Packard, there was inadequate evidence to support a ?nding of direct interference with business relationships. But even the Hewlett? Packard evidence was not suf?cient because, according to the district court, there was no causal link between alleged intermeddling with any of the relationships and injury. Further, IBM offers an alternative ground to af?rm the decision below: that the evidence does not support even an inference that IBM acted with improper means, a required element of tortious interference under Utah law. The improper-means requirement ?is satis?ed where the means used to interfere with a party?s economic relations are contrary to law, such as violations of statutes, regulations, or recognized common-law rules.? Leigh Furniture, 657 P.2d at 308. ?Commonly included among improper means are violence, threats or other intimidation, deceit or misrepresentation, bribery, unfounded litigation, defamation, or disparaging falsehood.? Id, (internal quotation marks, citation omitted). In other words, merely 33 Appellate Case: 164040 Document: 01019892548 {Date Fi?ed: 10/30/2017 Page: 34 persuading another company to withdraw its business from a competitor is not, without more, an improper means under Utah law. Turning to the facts of this case, we agree with the district court that a jury could ?nd IBM attempted to interfere with relationship with Hewlett-Packard. After SCO announced its Linux licensing strategy, IBM executive Karen Smith told CEO that she was going to encourage partners and customers not to do business with SCO. Smith then followed through with that threat the same day when she suggested to Hewlett-Packard executive Richard Becker that Hewlett-Packard ?withdraw all [its] business activities from Aplt. App. 2352. The other business relationships are a different story. We agree with the district court that there is not enough evidence in this record to conclude that IBM actually interfered with relationships with Oracle, Computer Associates, Intel, and Baystar.20 There is simply no admissible direct evidence that IBM ever confronted these companies. To the contrary, executives representing each of these companies stated in a sworn declaration that, to the best of their knowledge, IBM never approached them about cutting ties with SCO and that any change in business dealings with SCO was not the 20 SCO did offer some evidence that IBM had attempted to persuade a managing member of Baystar named Lawrence Goldfarb to discontinue Baystar?s investment in SCO. chief executive Darl McBride submitted a declaration stating that Goldfarb told McBride ?that IBM had been ?on him, on him, on him? to retract his support from Aplt. App. 5586. But that evidence would have been inadmissible hearsay, as it was offered out of court to prove the truth of the matter asserted and SCO has not pointed to any hearsay exception on appeal that would have salvaged the statement from exclusion at trial. Nor can the Court think of an applicable exception. Thus, a jury would not have been entitled to consider this statement so it is not proper to include it in our analysis for the purpose of summary judgment. 34 Appellate Case: 164040 Document; 01019892548 Date Hied: 18/30/2017 Page: 35 result of statements or actions. SCO, for its part, counters that circumstantial evidence should trump these self-serving declarations, at least enough to create a triable issue of fact. Even if that were true, however, alternative argument nevertheless compels us to dispose of all the allegations of direct interference, including those involving Hewlett-Packard and these other entities. Under Utah law, ?no tortious interference claim can succeed without evidence of improper means.? Eldridge, 345 P.3d at 555. That requires that the means be ?contrary to law, such as violations of statutes, regulations, or recognized common-law rules.? Leigh Furniture, 657 P.2d at 308. A competitor?s attempt merely to convince third parties not to deal with a plaintiff does not meet this requirement. To con?nn that point, the Utah Supreme Court cautioned that the intentional-interference tort ought not sweep within its scope ?efforts to persuade others not to . . . deal with certain entities? because that would be a legitimate form of third- party in?uence. at 303. Thus, even if we assume that IBM actually followed through with its threat to persuade industry players not to do business with it did with Hewlett- Packard?that conduct would not have been ?improper? within the meaning of the Utah tort of intentional interference. The district court therefore appropriately granted summary judgment on this claim.21 21 Because we resolve this claim on the improper?means requirement, we do not address the district court?s determination that SCO failed to demonstrate adequate causation for its injury on summary judgment. 35 Appellate Case: 16-4040 Document: 01019892548 Date Filed: 10/30l2017 Page: 36 C. Amendment of Complaint After the deadline for amended pleadings, SCO attempted to add a claim for copyright infringement against IBM based on its late discovery of allegedly unauthorized distribution of the code in the AIX for Power product.22 The district court denied request as untimely and likely to expand the litigation. We review a denial of leave to amend a complaint for abuse of discretion. E.g. Wessel v. City of Albuguergue, 299 F.3d 1186, 1197 (10th Cir. 2002). Under that deferential standard, we af?rm the district court?s order on this issue. A brief procedural overview will facilitate the analysis. SCO ?led its initial complaint on March 6, 2003, and then timely amended its complaint on July 22, 2003. IBM responded with counterclaims of its own on August 6, 2003, and then timely amended those on September 25, 2003. The district court set a deadline of February 4, 2004 for amended pleadings, but allowed SCO and IBM each to ?le second amended pleadings on February 27, 2004 and March 29, 2004, respectively. In March and April 2004, IBM produced almost a million pages of documents and dozens of CDs of source code included in AIX. When SCO reviewed these discovery materials, SCO claims that it learned for the ?rst time that AIX contained the code 22 The original complaint contained a claim for copyright infringement, but that appears to be based on mistaken belief that it owned the copyrights to all the UNIX technologies, so any unauthorized use of a UNIX variation might have been vulnerable to the copyright owner?s challenge. This later-added copyright claim is based on discovery that IBM had improperly used code specifically?a claim that is different from misappropriation claim because the copyright theory does not depend upon proof of bad faith, while misappropriation does. 36 Appeilate Case; 3.641040 Document: 01019892548 Date Filed: 10/30/2017 Page: 37 which had been copied from Santa Cruz?s contributions to Project Monterey. After analyzing this voluminous document production, SCO sought again to amend its complaint on October 14, 2004 to add a claim for copyright infringement based on the unauthorized use of the code.23 The federal rules of civil procedure provide that schedule may be modi?ed only for good cause and with the judge?s consent.? Fed. R. Civ. P. 16(b)(4) (emphasis added). Thus, good cause must be shown in order to submit a pleading beyond the deadline set by the district court?s scheduling order, which was February 4, 2004 in this case. Rule 15(a)(2) further indicates that ?[t]he court should freely give leave [to amend pleadings] when justice so requires.? Fed. R. Civ. P. Consistent with this rule, we have held that ?[t]he purpose of [Rule is to provide litigants the maximum opportunity for each claim to be decided on its merits rather than on procedural niceties.? Minter V. Prime Equipment Co., 451 F.3d 1196, 1204 (10th Cir. 2006) (internal quotation marks, citation omitted); 6 Charles Alan Wright Arthur R. Miller, Eed_e1@ Practice Procedure 1484 (3d ed. 2010). We turn now to the arguments and the district court?s reasoning. In defending its attempt to add a claim after the February 4, 2004 deadline, SCO contended that IBM would not be prejudiced because IBM had already asserted a counterclaim for declaratory 23 It also seems that this late-stage discovery is the event that prompted SCO to shift its theory on its existing cause of action for misappropriation. As explained earlier, while the initial misappropriation theory was predicated on alleged Linux disclosures, current misappropriation theory is based on the allegedly stolen code. 37 Appellate Case: 16-4040 Document: 011019892548 Date Filed: 10/301201? Page. 38 judgment on copyrights. That counterclaim provided: does not infringe, induce the infringement of, or contribute to the infringement of any SCO copyright through the reproduction, improvement, and distribution of AIX and Dynix, and that some or all of purported copyrights in UNIX are invalid and unenforceable.?24 Aplt. App. 233. The district court, however, reasoned that copyright counterclaim was not intended to encompass literally any SCO copyright, but rather it sought a more limited declaration that IBM was not violating copyrights to the original UNIX technologies because Santa Cruz never received the UNIX copyrights in the Novell agreement. After all, SCO had initially ?led a copyright infringement claim against IBM on that theory, and responsive counterclaim should be construed in that context. The district court then reasoned: ?Having determined that the Counterclaim was not intended to sweep so broadly, proposed amendment is no longer the mirror- image of [copyright] Counterclaim. To permit the proposed amendment would expand this already sizable and complex litigation and would serve only to delay its resolution.? Aplt. App. 1836-37, Dist Ct. Order at 3?4 (emphasis added). Switching course, the district court stated without explanation that SCO had unduly delayed in asserting the proposed cause of action: ?It appears that its predecessor?either knew or should have known about the conduct at issue before it ?led its original 24 ?Dynix? is a reference to the UNIX variation developed by Sequent, a company that was subsequently merged into IBM. 38 Appeilate Case; 16~4040 Document: 01019892548 Date Fiied. Page: 39 Complaint.? Aplt. App. 1837, Dist. Ct. Order at 4 (emphasis added). For these two reasons, the district court denied motion to amend. Notwithstanding the liberal treatment courts ordinarily afford these requests, we cannot say that the district court abused its discretion in ?nding the absence of ?good cause? for the proposed amendment. The parties had already modi?ed the scheduling order previously and the litigation was certainly sizable and complex at the time. Moreover, while SCO may have genuinely realized the existence of the code late in the game, it is not unreasonable to conclude that SCO could have investigated the matter before it filed its original complaint, or at least alleged the claim based on information and belief.25 Accordingly, we af?rm the denial of leave to amend because the district court did not act outside its broad range of discretion. CONCLUSION The district court?s order awarding IBM summary judgment on the misappropriation claim is REVERSED, and the matter is REMANDED for further proceedings consistent with this opinion. 25 This is not inconsistent with our earlier determination regarding compliance with the two?year contractual limitations period. We held that the misappropriation claim, which is based on the allegedly unauthorized use of the code acquired through Project Monterey, did not accrue until May 4, 2001 because that is the date on which IBM released a purportedly ?sham? version of the IA-64 Product to legitimize its use of the code in its own AIX for Power product released that very same day, thereby satisfying the requisite element of bad faith under New York law. 39 Appe?late (Jase: 3.6?4840 Document: 01019892548 Date Filed: 30/301201?? Page: 40 The district court?s order awarding IBM summary judgment on the tortious interference claims is AFFIRMED. The district court?s order denying SCO leave to amend its complaint is also AFFIRMED.26 26 On August 31, 2016, Appellant filed an ?Unopposed Motion for Permission to File Opening Brief and Appendix Under Seal.? On September 12, 2016, Appellant filed a supplement to that motion entitled ?Appellant?s Supplement to its Unopposed Motion for Permission to File Opening Brief and Appendix Under Seal,? and on September 16, 2016, Appellant ?led a second supplement to that motion entitled ?Appellant?s Second Supplement to its Unopposed Motion for Permission to File Opening Brief and Appendix Under Seal.? On September 16, 2016, this Court entered an Order ruling on all three motions, largely denying them. However, as our Order makes clear, the matters identified in paragraph 4 in ?Appellant?s Supplement to its Unopposed Motion for Permission to File Opening Brief and Appendix Under Seal? filed on September 12, 2016, were to remain ?provisionally sealed? subject to a further ruling by the merits panel. Those documents are identified as the following appendix volumes: 6, 7, 8, 9, 12, 14,18,19, 20, 21, 22, 25, 36, 37, 38, 39, 40, 43, 44, 45, 46, 47, 48, 52, 53, 54, 55, 56, 61, 62, 63, 64, and 66. Appellant represents, and Appellee does not oppose, that these materials contain sensitive confidential revenue and profitability information, as well as strategic business and marketing plans. All record material relevant to our opinion has been disclosed in the opinion itself. The Court sees no need to require further public disclosure of these confidential materials. Accordingly, the Court affirms its previous provisional order accepting the materials listed above under seal. This disposes of all open or provisional rulings pertaining to motions to seal in this case. 40