Monday, November 25, 2024
Lawyers Run The WorldFederal Court Adopts Broad Interpretation of Computer Fraud...

Federal Court Adopts Broad Interpretation of Computer Fraud and Abuse Act

-

- Advertisment -spot_img

Plaintiff American Furukawa Inc. brought Computer Fraud and Abuse Act and related claims against an employee who took a job with a competitor and subsequently spent several weeks downloading corporate files.  The former employee downloaded a number of files in the first week of the relevant time period, then took a leave of absence for four weeks while continuing to download files.  The employee returned to work for one more week before resigning and had already started working for his new employer while on leave.

The CFAA is primarily a criminal statute that was originally enacted in 1984 to prevent computer hacking.  The statute permits a private party who suffers damage or loss by reason of a violation of the statute to bring a civil action to obtain compensatory damages and injunctive relief or other equitable relief.

A person may be held civilly liable under the CFAA when that person, among other things: (1) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer; (2) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value; or (3) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage, or causes damage and loss.

There exists a split of authority regarding the issue of accessing computer systems “without authorization” when, after a plaintiff provided a defendant with access to plaintiff’s computer systems, a defendant allegedly uses that access to misappropriate trade secret and confidential corporate information.  Some courts have held that an employee exceeds authorized use by transferring trade secrets to a competitor knowing that it was in contravention of a duty of loyalty.

Other courts have held that no violation of the CFAA exists when a defendant is initially granted authorization to access the system.  Those courts reason that the plain language of the CFAA expressly prohibits improper “access” of computer information, not misuse or misappropriation.

Here, the U.S. District Court for the Eastern District of Michigan held that the departing employee exceeded authorized access to his company’s computer systems by downloading the files to a personal external hard drive.  See Am. Furukawa, Inc. v. Hossain, E.D. Mich., No. 2:14-cv-13633-GAD-MJH (May 6, 2015).  In doing so, the court stated that the downloads violated the company’s removable media policy and thus exceeded authorized access to the documents.

The court found that the defendant accessed files without authorization during the period that he was on leave, because he was not permitted to do work at all during that period of time.  The first week of downloads, though, were not done “without authorization” under the CFAA.

In short, the court said that the “exceeds authorized access” provision of the CFAA is facially broad enough to cover employer purpose and use restrictions such as the plaintiff’s removable media policy.  This decision serves to expand the split of authority over the scope of the phrases “without authorization” and “exceeds authorized access” under the CFAA.

This decision should be of particular interest to any company considering the development and implementation of corporate confidentiality and media use policies, including corporate counsel.

Information conveyed in this article is provided for informational purposes only and does not constitute, nor should it be relied upon, as legal advice. No person should act or rely on any information in this article without seeking the advice of an attorney.

Richard B. Newman
Richard B. Newmanhttp://www.hinchnewman.com
Richard B. Newman is an Internet Lawyer at Hinch Newman LLP focusing on advertising law, Internet marketing compliance, regulatory defense and digital media matters. His practice involves conducting legal compliance reviews of advertising campaigns across all media channels, regularly representing clients in high-profile investigative proceedings and enforcement actions brought by the Federal Trade Commission and state attorneys general throughout the country, advertising and marketing litigation, advising on email and telemarketing best practice protocol implementation, counseling on eCommerce guidelines and promotional marketing programs, and negotiating and drafting legal agreements.

What's your opinion?

Latest news

Disney Gets Dirty: Playing in Programmatic’s Muddy Waters

Once upon a time, Disney stood as the epitome of wholesome family entertainment. But now, the House of Mouse...

The Trade Desk’s Ventura: Shaking Up CTV or Just Stirring the Pot?

Connected TV (CTV) just got a wake-up call—or maybe a Molotov cocktail. The Trade Desk has announced Ventura, its new...

From Big Ideas to Tiny Banners: How #Adtech Shrinks the Dream

When I resurrected this newsletter from the ashes of my previous endeavor—dusted it off like some overambitious Frankenstein experiment—I...

The Ad Tech Racket: How The Trade Desk is Taxing Your Campaigns Into Oblivion

Let’s talk about The Trade Desk (TTD) and their latest contribution to the world of advertising—what can only be...

PubMatic Bets Big on Elon’s X: Bold Innovation or PR Suicide?

PubMatic has officially stepped into the lion’s den, announcing its partnership with Elon Musk’s X (formerly Twitter) as its...

The AdTech Wizard of Odds: Gareth Holmes on Streaming Ads, Helicopters, and Unleashing Sweden’s Secret Sauce 

Adtech is often described as a wild west, but Gareth Holmes makes it sound more like Cirque du Soleil—complete...

Must read

The Trade Desk’s Ventura: Shaking Up CTV or Just Stirring the Pot?

Connected TV (CTV) just got a wake-up call—or maybe...

From Big Ideas to Tiny Banners: How #Adtech Shrinks the Dream

When I resurrected this newsletter from the ashes of...

You might also likeRELATED
Recommended to you