Employers Take Advantage of Computer Fraud Law
Suspicious that Jacob Citrin was misappropriating IAC's proprietary information in his new venture, IAC filed suit against him in 2003 alleging a breach of contract.
April 30, 2006 at 08:00 PM
15 minute read
As a managing director of acquisitions for International Airport Centers (IAC), an Illinois-based company that locates warehouse space for shipping companies near airports, Jacob Citrin's job was to scout new properties and acquire them for his company. To facilitate this, IAC gave Citrin a laptop to record information about potential acquisitions.
Unbeknownst to IAC, Citrin began concocting plans to take some of the knowledge he gained while working for IAC and start his own business. He soon quit IAC and turned over his laptop.
Company officials noticed files relating to Citrin's acquisitions were missing. Not even a thorough scan of the hard drive could turn up the documents.
Citrin had used a special piece of software that enabled a secure delete to render the information unrecoverable.
Suspicious that Citrin was misappropriating IAC's proprietary information in his new venture, IAC filed suit against him in 2003 alleging a breach of contract. Yet because Citrin scrubbed his hard drive, proving a breach of contract was nearly impossible. So IAC got creative. It decided to also sue Citrin under the federal Computer Fraud And Abuse Act (CFAA), alleging that his secure deletion constituted a violation of the law, which provides civil and criminal penalties. Congress enacted the CFAA in 1984 to reduce hacking of government computers. Over the past two decades, Congress has amended the statute to expand its application.
After the District Court rejected the claim, the 7th Circuit reinstituted the CFAA cause of action on March 8 and remanded the case.
This decision has established a new precedent, one that empowers employers with a new weapon to wield against departing employees who steal proprietary information and erase the evidence.
“This decision has further broadened the CFAA and gives an independent cause of action that allows the employer to go after former employees just by virtue that they have used a computer program to completely erase files,” says Norma Zeitler, a partner at Barnes & Thornburg in Chicago.
Broadening Statute
The 7th Circuit's decision further broadens a statute that, over the past two decades, has become increasingly far-reaching.
“When the CFAA was first written back in the 1980s, it was intended to be a national security statute, making it a federal crime for someone to hack into a federal computer and do something bad,” says Brent Caslin, a partner at Kirkland & Ellis in Los Angeles. “It has been amended several times over the years and slowly went from being a statute that criminalized hacking into government computers to applying to anything.”
At issue in IAC v. Citrin were two provisions of the CFAA. The first was a question of authorization. Under the CFAA, a violation must consist of someone intentionally accessing a protected computer without authorization. Because Citrin was an employee and the company willingly granted him access to the computer, IAC's counsel had to find a way to convince the court that Citrin's computer use was unauthorized.
“The minute the employee starts acting on his own and doing his business rather than the employer's, he has no right of access as defined by the statute because he is now adverse to his employer,” says Don Reuben, who represented IAC and is of counsel at Kane & Carbonara. “That's how the judge dealt with the issue.”
Defining Transmission
The other issue was that of transmission. Prior to this case, courts typically viewed “transmission” under the CFAA to apply to damage rendered via the Internet, such as viruses and worms. Yet it was likely that Citrin used a piece of software, not the Internet, to accomplish the secure delete. In response to this possibility, the 7th Circuit clarified the definition of transmission, and in doing so expanded its applicability.
“In this case it actually includes somebody who loads a program onto a computer, either through an external drive, an internal drive or the Internet,” says Michael Wexler, a partner at Seyfarth Shaw.
By expanding the definition of transmission and clarifying authorization, the 7th Circuit broadened the scope of the CFAA. Now employers in the 7th Circuit that want to collect damages against an employee who engaged in misconduct have a new weapon of recourse if the employee deleted the evidence of his or her wrongdoing.
“When an employee or former employee does something like delete all of his or her files, essentially the employee has taken away all the evidence that the employer had to prove any misconduct before the employee left,” Zeitler says. “Now this Act allows employers to file civil action and collect compensatory, injunctive and equitable relief.”
However, the ruling doesn't apply in all situations where an employee deletes files from a company computer. Whereas deleting company information may constitute a violation of the CFAA, the deletion of an employee's personal information may not.
“If someone is leaving an organization, it is one thing to pull off your personal files, like your r?sum? or the March Madness office pool,” Wexler says. “But when someone takes a software program and runs it to deliberately destroy information, you have to wonder why someone is doing that.”
Although deletion of employees' personal files isn't barred under CFAA, it is likely that the statute will continue to broaden in scope.
“This case further refines exactly how you define destruction, authorization and transmission,” Wexler says.
As a managing director of acquisitions for International Airport Centers (IAC), an Illinois-based company that locates warehouse space for shipping companies near airports, Jacob Citrin's job was to scout new properties and acquire them for his company. To facilitate this, IAC gave Citrin a laptop to record information about potential acquisitions.
Unbeknownst to IAC, Citrin began concocting plans to take some of the knowledge he gained while working for IAC and start his own business. He soon quit IAC and turned over his laptop.
Company officials noticed files relating to Citrin's acquisitions were missing. Not even a thorough scan of the hard drive could turn up the documents.
Citrin had used a special piece of software that enabled a secure delete to render the information unrecoverable.
Suspicious that Citrin was misappropriating IAC's proprietary information in his new venture, IAC filed suit against him in 2003 alleging a breach of contract. Yet because Citrin scrubbed his hard drive, proving a breach of contract was nearly impossible. So IAC got creative. It decided to also sue Citrin under the federal Computer Fraud And Abuse Act (CFAA), alleging that his secure deletion constituted a violation of the law, which provides civil and criminal penalties. Congress enacted the CFAA in 1984 to reduce hacking of government computers. Over the past two decades, Congress has amended the statute to expand its application.
After the District Court rejected the claim, the 7th Circuit reinstituted the CFAA cause of action on March 8 and remanded the case.
This decision has established a new precedent, one that empowers employers with a new weapon to wield against departing employees who steal proprietary information and erase the evidence.
“This decision has further broadened the CFAA and gives an independent cause of action that allows the employer to go after former employees just by virtue that they have used a computer program to completely erase files,” says Norma Zeitler, a partner at
Broadening Statute
The 7th Circuit's decision further broadens a statute that, over the past two decades, has become increasingly far-reaching.
“When the CFAA was first written back in the 1980s, it was intended to be a national security statute, making it a federal crime for someone to hack into a federal computer and do something bad,” says Brent Caslin, a partner at
At issue in IAC v. Citrin were two provisions of the CFAA. The first was a question of authorization. Under the CFAA, a violation must consist of someone intentionally accessing a protected computer without authorization. Because Citrin was an employee and the company willingly granted him access to the computer, IAC's counsel had to find a way to convince the court that Citrin's computer use was unauthorized.
“The minute the employee starts acting on his own and doing his business rather than the employer's, he has no right of access as defined by the statute because he is now adverse to his employer,” says Don Reuben, who represented IAC and is of counsel at Kane & Carbonara. “That's how the judge dealt with the issue.”
Defining Transmission
The other issue was that of transmission. Prior to this case, courts typically viewed “transmission” under the CFAA to apply to damage rendered via the Internet, such as viruses and worms. Yet it was likely that Citrin used a piece of software, not the Internet, to accomplish the secure delete. In response to this possibility, the 7th Circuit clarified the definition of transmission, and in doing so expanded its applicability.
“In this case it actually includes somebody who loads a program onto a computer, either through an external drive, an internal drive or the Internet,” says Michael Wexler, a partner at
By expanding the definition of transmission and clarifying authorization, the 7th Circuit broadened the scope of the CFAA. Now employers in the 7th Circuit that want to collect damages against an employee who engaged in misconduct have a new weapon of recourse if the employee deleted the evidence of his or her wrongdoing.
“When an employee or former employee does something like delete all of his or her files, essentially the employee has taken away all the evidence that the employer had to prove any misconduct before the employee left,” Zeitler says. “Now this Act allows employers to file civil action and collect compensatory, injunctive and equitable relief.”
However, the ruling doesn't apply in all situations where an employee deletes files from a company computer. Whereas deleting company information may constitute a violation of the CFAA, the deletion of an employee's personal information may not.
“If someone is leaving an organization, it is one thing to pull off your personal files, like your r?sum? or the March Madness office pool,” Wexler says. “But when someone takes a software program and runs it to deliberately destroy information, you have to wonder why someone is doing that.”
Although deletion of employees' personal files isn't barred under CFAA, it is likely that the statute will continue to broaden in scope.
“This case further refines exactly how you define destruction, authorization and transmission,” Wexler says.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'We Are Far From Finished': Amazon Pro Bono Program Raises Sights After Championing Justice From West Virginia to Ukraine
5 minute readAdvertising Tech Likely to Draw More Scrutiny in 2025 Over Consumers' Data, Lawyers Say
5 minute readIn-House Moves of the Month: Boeing Loses Another Lawyer, HubSpot Legal Chief Out After 2 Years
5 minute readTrending Stories
- 1Data Breach Lawsuit Against Byte Federal Among 1,500 Targeting Companies in 2024
- 2Counterfeiters Ride Surge in Tabletop Games’ Popularity, Challenging IP Owners to Keep Up
- 3Health Care Data Breach Class Actions Saw December Surge in NY Courts
- 4Florida Supreme Court Disbars 3, Suspends 11, Reprimands 1 in Final Disciplinary Order of 2024
- 5Chief Justice Roberts Ends Year With Defense Against 'Illegitimate' Attacks on Judiciary
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250