Circuits Split Over Application of Computer Fraud Law
9th Circuit says employee had company authorization to e-mail information to himself.
November 30, 2009 at 07:00 PM
19 minute read
Ever since John McCain's aides tattled on her after the 2008 election, Sarah Palin has tried to make “going rogue” something to be admired. But the issue of “rogue workers,” or employees using company assets to advance their own agendas, is something no employer wants to be associated with.
Now in its decision in LVRC v. Brekka, the 9th Circuit has made life even more difficult for companies that believe an employee used digital company material for noncompany purposes.
The case pitted LVRC Holdings, a Nevada-based residential treatment center for addicts, against Christopher Brekka, whom the company hired for Internet-related marketing activities for the company. Brekka lived in Florida and owned two businesses in Florida and Nevada that engaged in work similar to his work at LVRC. After he obtained an administrative log-in for LVRC's Web site, Brekka had access to company material on the computer that he used at LVRC headquarters. He e-mailed some of this material to his and his wife's personal e-mail addresses.
Brekka had been in negotiations to purchase an ownership stake in LVRC, but negotiations broke down and he left the company. Believing that Brekka had accessed company information after leaving, LVRC sued him, alleging civil violations of the Computer Fraud and Abuse Act of 1984 (CFAA) while he was an employee and afterward.
Judge Sandra Ikuta, writing for the three-judge 9th Circuit panel, upheld on Sept. 15 a federal district court's summary judgment in Brekka's favor. Both courts found Brekka was an employee of LVRC who had company authorization to access the information he e-mailed to himself and his wife. The district court ruled that LVRC had presented no evidence that could
reasonably demonstrate to a jury that Brekka had obtained company information after he left the firm.
“Certainly in the 9th Circuit, it makes it more difficult for employers to use the act to defend against rogue employees who download material before leaving employment and use it for nonbusiness purposes,” says David Enzminger, a partner at O'Melveny & Myers.
Employers view CFAA, a criminal statute with a private right of action, as a supplement to state laws against theft of trade secrets, Enzminger says. A trade secrets case requires proof that the company had made reasonable efforts to keep proprietary information secret and that the information had value because it was secret. Congress aimed CFAA at computer hackers operating outside the company, but it provides employers with a potential weapon when cases don't meet the requirements of trade secret laws.
“You don't have to prove it was valuable; you don't have to prove it was a secret,” Enzminger says.
Citrin Conflict
But under terms of CFAA, an employer does have to prove that an employee was unauthorized to download the information or exceeded authorization, the 9th Circuit ruled, and LVRC had no employee policy prohibiting Brekka from e-mailing company material to himself. “In this case, there is no dispute that Brekka had permission to access the computer; indeed, his job required him to use the computer,” Judge Ikuta wrote.
In discussing the concept of “authorization” in CFAA, the 9th Circuit expressly declined to follow guidance the 7th Circuit outlined in International Airport Centers v. Citrin, which considered the motivation of the employee. Citrin concerned a disloyal employee of International Airport Centers (IAC) who decided to go into business for himself. Before he quit IAC, he deleted company material from his laptop, including evidence of his improper behavior as an employee. IAC sued under CFAA.
The 7th Circuit, in an opinion authored by Judge Richard Posner, held that the employee's authorized access to a company computer, as defined by CFAA, was automatically voided when his actions violated his common law duties to loyal service as an agent of the company.
Setting Posner's ruling aside, the 9th Circuit held in Brekka that “authorization depends on whether the employee had permission to access the computer or computerized data, rather than why he was accessing it or how he used it,” says Christine Lyon, a partner at Morrison & Foerster.
Policy Provisions
Robert Fischer, a partner at Jackson Lewis, believes Posner got it right in Citrin and that the conflict between the two circuits bears watching. “There is no question there is a conflict,” he said. “Citrin says that once you're disloyal, you have ended the basis on which you gained access, which makes sense.”
But whether or not the Supreme Court resolves the circuit conflict over employee intent (see “Loyalty Language”), clear internal policies are vital.
“Brekka underscores the importance of technology-use policies that clearly define the purposes for which the employer's computer and communications facilities may and may not be used,” says Charles Kennedy, of counsel at Morrison & Foerster. Fischer recommends translating the Citrin duty of loyalty standard into the company policy.
“Employees should be specifically prevented from using computers or any other employer equipment for any purpose other than their good faith, loyal work for the employer,” he says.
Ever since John McCain's aides tattled on her after the 2008 election, Sarah Palin has tried to make “going rogue” something to be admired. But the issue of “rogue workers,” or employees using company assets to advance their own agendas, is something no employer wants to be associated with.
Now in its decision in LVRC v. Brekka, the 9th Circuit has made life even more difficult for companies that believe an employee used digital company material for noncompany purposes.
The case pitted LVRC Holdings, a Nevada-based residential treatment center for addicts, against Christopher Brekka, whom the company hired for Internet-related marketing activities for the company. Brekka lived in Florida and owned two businesses in Florida and Nevada that engaged in work similar to his work at LVRC. After he obtained an administrative log-in for LVRC's Web site, Brekka had access to company material on the computer that he used at LVRC headquarters. He e-mailed some of this material to his and his wife's personal e-mail addresses.
Brekka had been in negotiations to purchase an ownership stake in LVRC, but negotiations broke down and he left the company. Believing that Brekka had accessed company information after leaving, LVRC sued him, alleging civil violations of the Computer Fraud and Abuse Act of 1984 (CFAA) while he was an employee and afterward.
Judge Sandra Ikuta, writing for the three-judge 9th Circuit panel, upheld on Sept. 15 a federal district court's summary judgment in Brekka's favor. Both courts found Brekka was an employee of LVRC who had company authorization to access the information he e-mailed to himself and his wife. The district court ruled that LVRC had presented no evidence that could
reasonably demonstrate to a jury that Brekka had obtained company information after he left the firm.
“Certainly in the 9th Circuit, it makes it more difficult for employers to use the act to defend against rogue employees who download material before leaving employment and use it for nonbusiness purposes,” says David Enzminger, a partner at
Employers view CFAA, a criminal statute with a private right of action, as a supplement to state laws against theft of trade secrets, Enzminger says. A trade secrets case requires proof that the company had made reasonable efforts to keep proprietary information secret and that the information had value because it was secret. Congress aimed CFAA at computer hackers operating outside the company, but it provides employers with a potential weapon when cases don't meet the requirements of trade secret laws.
“You don't have to prove it was valuable; you don't have to prove it was a secret,” Enzminger says.
Citrin Conflict
But under terms of CFAA, an employer does have to prove that an employee was unauthorized to download the information or exceeded authorization, the 9th Circuit ruled, and LVRC had no employee policy prohibiting Brekka from e-mailing company material to himself. “In this case, there is no dispute that Brekka had permission to access the computer; indeed, his job required him to use the computer,” Judge Ikuta wrote.
In discussing the concept of “authorization” in CFAA, the 9th Circuit expressly declined to follow guidance the 7th Circuit outlined in International Airport Centers v. Citrin, which considered the motivation of the employee. Citrin concerned a disloyal employee of International Airport Centers (IAC) who decided to go into business for himself. Before he quit IAC, he deleted company material from his laptop, including evidence of his improper behavior as an employee. IAC sued under CFAA.
The 7th Circuit, in an opinion authored by Judge Richard Posner, held that the employee's authorized access to a company computer, as defined by CFAA, was automatically voided when his actions violated his common law duties to loyal service as an agent of the company.
Setting Posner's ruling aside, the 9th Circuit held in Brekka that “authorization depends on whether the employee had permission to access the computer or computerized data, rather than why he was accessing it or how he used it,” says Christine Lyon, a partner at
Policy Provisions
Robert Fischer, a partner at
But whether or not the Supreme Court resolves the circuit conflict over employee intent (see “Loyalty Language”), clear internal policies are vital.
“Brekka underscores the importance of technology-use policies that clearly define the purposes for which the employer's computer and communications facilities may and may not be used,” says Charles Kennedy, of counsel at
“Employees should be specifically prevented from using computers or any other employer equipment for any purpose other than their good faith, loyal work for the employer,” he says.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'The Show Must Go On': Solo-GC-of-Year Kevin Colby Pulls Off Perpetual Juggling Act
Contract Software Unicorn Ironclad Hires Former Pinterest Lawyer as GC
2 minute readHow Amy Harris Leverages Diversity to Give UMB Financial a Competitive Edge
5 minute readAuditor Finds 'Significant Deficiency' in FTC Accounting to Tune of $7M
4 minute readTrending Stories
- 1Gibson Dunn Sued By Crypto Client After Lateral Hire Causes Conflict of Interest
- 2Trump's Solicitor General Expected to 'Flip' Prelogar's Positions at Supreme Court
- 3Pharmacy Lawyers See Promise in NY Regulator's Curbs on PBM Industry
- 4Outgoing USPTO Director Kathi Vidal: ‘We All Want the Country to Be in a Better Place’
- 5Supreme Court Will Review Constitutionality Of FCC's Universal Service Fund
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250