Access vs. Use: The CFAA in the Age of the DTSA
Employment Law columnists Jeffrey S. Klein and Nicholas J. Pappas write: Once the only reliable statutory argument for federal-question jurisdiction in a trade secret dispute, the CFAA now acts as a complement to the DTSA by protecting sensitive information from a different perspective. This being said, several circuits are split on the scope of the protections afforded to employers under the CFAA, limiting the statute's effectiveness in certain jurisdictions.
February 06, 2018 at 02:45 PM
10 minute read
Since its introduction in May 2016, the Defend Trade Secrets Act (the DTSA) has captured the focus of employers as the foremost source of statutory protection against trade secret misappropriation, leading many employers to revise separation and confidentiality agreement templates and rework employee policies to include language specific to the statute. Somewhat forgotten in this focus on the DTSA, however, has been the Computer Fraud and Abuse Act (the CFAA).
Once the only reliable statutory argument for federal-question jurisdiction in a trade secret dispute, the CFAA now acts as a complement to the DTSA by protecting sensitive information from a different perspective. This being said, several circuits are split on the scope of the protections afforded to employers under the CFAA, limiting the statute's effectiveness in certain jurisdictions. Even so, employers in all jurisdictions should not forget the CFAA when considering the litany of available remedies to protect sensitive information from misappropriation or dissemination, as well as when shaping personnel policies.
Background
The CFAA was originally enacted as the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, and was initially directed at protecting classified information and financial records contained on computers belonging to the government and to financial institutions. Congress then passed the Computer Fraud and Abuse Act Amendments of 1994, expanding the scope to cover “protected computers” used in interstate commerce, and creating a private right of action. But not until 2000 did the statute begin to be applied to trade secret claims. See, e.g., Shurgard Storage Ctrs v. Safeguard Self Storage, 119 F. Supp. 2d 1121 (W.D. Washington 2000).
The CFAA imposes civil liability on any person who “intentionally accesses a computer without authorization” or “exceeds authorized access” and, in doing so, accesses or obtains information from any protected computer. See 18 U.S.C. §§1030(a)(2), 1030(a)(4), 1030(a)(5)(B)-(C). The term “without authorization” is undefined, but the CFAA defines “exceeds authorized access” as “access[ing] a computer with authorization and [using] such access to obtain or alter information in the computer that the accessor is not entitled to obtain or alter.” 18 U.S.C. §1030(e)(6).
The language of the CFAA places the focus on how the individual accessed the information, rather than what the individual did with the information once accessed. This is in stark contrast to the DTSA, which provides a civil right of action to “[a]n owner of a trade secret that is misappropriated” (emphasis added). 18 U.S.C. §1836(b)(1). Misappropriation, as defined under the DTSA, requires “acquisition of a trade secret by another by a person who knows or has reason to know that the trade secret was acquired by improper means,” or “disclosure” or “use” of a trade secret that was acquired by improper means. 18 U.S.C. §1839(5). The DTSA also applies to threatened misappropriation when a plaintiff is seeking injunctive relief. See 18 U.S.C. §1836(b)(3)(A). (It remains an open question whether the “inevitable disclosure” doctrine most famously discussed in PepsiCo v. Redmond, 54 F.3d 1262, 1263 (7th Cir. 1995) is also sufficient to state a claim under the DTSA.)
CFAA Circuit Split
As one might guess from the wording of the CFAA, there has been significant litigation surrounding the interpretation of the phrases “without authorization” and “exceeds authorized access.” This has led to a split among the circuit courts regarding what conduct constitutes a violation of the CFAA.
Expansive View. In U.S. v. Rodriguez, the Eleventh Circuit considered the case of a former employee of the Social Security Administration who had accessed the personal records of 17 different individuals for nonbusiness reasons while still employed by the SSA. 628 F.3d 1258 (11th Cir. 2010). The defendant argued that he had not violated the CFAA because when he accessed the personal records of the individuals, he was authorized to access the database and the information contained therein, and therefore did not “obtain or alter information in the computer that [he was] not entitled to obtain or alter.” Id. The Eleventh Circuit disagreed, holding that “Rodriguez exceeded his authorized access and violated the [CFAA] when he obtained personal information for a nonbusiness reason” in violation of an established SSA policy. Id.
Other circuits have similarly held that violation of an employer's use policy constituted unauthorized access under the CFAA. In U.S. v. John, a Citigroup employee accessed and copied information pertaining to corporate customer accounts and provided the information to a relative that would then incur fraudulent charges. 597 F.3d 263 (5th Cir. 2010). The Fifth Circuit held that evidence had established that Citigroup had a policy prohibiting misuse of the company's internal computer systems and confidential information, and therefore the defendant had exceeded his authorized use when she accessed the information with the express purpose of facilitating fraud. Id. The First Circuit held in EF Cultural Travel BV v. Explorica that an executive violated the CFAA by providing confidential information to third parties in violation of a company policy. 274 F.3d 577 (1st Cir. 2001). In Int'l Airport Ctrs. v. Citrin, the Seventh Circuit held that when an employee of a real estate business deleted data regarding potential acquisition properties and proof that he had engaged in improper conduct from his company laptop, the destruction of information breached the defendant's duty of loyalty and therefore terminated the employee's authorization to access the computer. 440 F.3d 418 (7th Cir. 2006).
Restrictive View. In contrast to the First, Fifth, Seventh, and Eleventh Circuits, other circuits have held that so long as an employee is authorized to access and obtain certain information, their later misuse of that information does not constitute a violation of the CFAA. In U.S. v. Nosal, shortly after leaving an executive search firm, a former employee convinced former colleagues who were still working for the firm to help him start a competing business. 676 F.3d 854 (9th Cir. 2012). The accomplices used their log-ins to download client information and send it to the defendant in violation of a policy prohibiting the disclosure of confidential information. Id. The Ninth Circuit held that these activities did not constitute a violation of the CFAA because the accomplices were authorized to access the information, even if their subsequent use of the information violated the employer's policies. Id. The Ninth Circuit stated their belief that a broader interpretation of the statute would expand the scope of criminal liability to everyone who uses a computer in violation of computer use restrictions, no matter how minor the violation. Id.
The Second and Fourth Circuits have adopted similar interpretations. In U.S. v. Valle, a police officer was charged with using his access to criminal databases to conduct a search for an individual with no law enforcement purpose. 807 F.3d 508 (2d Cir. 2015). The Second Circuit cited legislative history that it believed showed the statute was geared towards hacking and held that the defendant's subsequent misuse of information did not render his access to the information unauthorized. The Fourth Circuit joined the Second and Ninth Circuits in WEC Carolina Energy Solutions v. Miller, holding that improper use of information validly accessed did not qualify as “unauthorized access” or “exceeding authorized access” within the meaning of the statute. 687 F.3d 199 (4th Cir. 2012).
District Courts in Undecided Circuits. Some district courts have trended towards the more restrictive view. In Central Bank & Trust v. Smith, the District of Wyoming held that district courts in the Tenth Circuit have universally adopted the more restrictive view espoused by the Second, Fourth, and Ninth Circuits. 215 F. Supp. 3d 1226 (D. Wyoming 2016). The District Court for the District of Columbia recently held similarly, stating that while it recognizes that the statutory definition of “exceeds authorized access” is “not crystal clear,” it believed that the Second, Fourth and Ninth Circuits have identified “the more persuasive reading of that phrase.” Hedgeye Risk Management v. Heldman, Case No. 16-935 (RDM), 2017 WL 4250506 (D.D.C. Sept. 23, 2017); see also Cranel v. Pro Image Consultants Group, 57 F. Supp. 3d 838 (S.D. Ohio 2014) (once an employee is granted “authorization” to access an employer's computer and the confidential information therein, a subsequent misuse of the information does not violate the CFAA); Sebrite Agency v. Platt, 884 F. Supp. 2d 912 (D. Minn. 2012) (the misappropriation of confidential information stored on a computer to which the defendant has authority to access does not give rise to liability under the CFAA).
Precedent in the Third Circuit has been more mixed. The Western District of Pennsylvania held in USG Insurance Services v. Bacon that an employer failed to state a claim under the CFAA where the employer alleged that the defendant had accessed confidential data with the intention of soliciting business from the plaintiff's clients on behalf of his new employer, because the employer did not plead that the employee accessed or altered any information which he was not allowed to access or alter while employed. Case No. 2:16-cv-01024, 2016 WL 6901332 (W.D.P.A., Nov. 22, 2016). A recent opinion in the District of New Jersey held differently, denying a motion to dismiss where the employer alleged that a group of former employees accessed and obtained confidential information from the employer's computer systems in violation of company policies with the intention of soliciting the employer's other employees. Chubb Ina Holdings v. Chang, No. CV 16-2354-BRM-DEA, 2017 WL 499682 (D.N.J. Feb. 7, 2017).
Effective Use of CFAA Protections
In contrast to the DTSA, there are no specific disclaimers or other language that an employer must use in its agreements or policies in order to take full advantage of the protections of the CFAA. However, employers may wish to cover certain themes and topics in their policies, procedures, handbooks, and other materials that are geared towards the CFAA:
• Employers may want to consider ensuring that their information use policies prohibit unauthorized access in addition to prohibiting unauthorized use or disclosure. For example, rather than merely stating that employees are prohibited from using or disclosing confidential information for non-business purposes, an employer may also wish to state that employees are authorized to access confidential information only for business purposes.
• Employers may want to consider inserting language into employment agreements, offer letters, and/or information use policies that state that an employee's authorization to use the company's computer systems or networks is automatically revoked upon any violation of the employee's duty of loyalty, regardless of whether the company becomes aware of the violation at that time.
• Employers may want to ensure policies are clear in prohibiting sharing of passwords, and that an individual's authorization to use company systems and networks may not be extended to any other individuals.
Jeffrey S. Klein and Nicholas J. Pappas are partners at Weil, Gotshal & Manges, in the employment litigation practice group. Thomas McCarthy, an associate in the group, assisted in the preparation of this article.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllJudgment of Partition and Sale Vacated for Failure To Comply With Heirs Act: This Week in Scott Mollen’s Realty Law Digest
Artificial Wisdom or Automated Folly? Practical Considerations for Arbitration Practitioners to Address the AI Conundrum
9 minute readTrending Stories
- 1Litigators of the Week: A $630M Antitrust Settlement for Automotive Software Vendors—$140M More Than Alleged Overcharges
- 2Litigator of the Week Runners-Up and Shout-Outs
- 3Linklaters Hires Four Partners From Patterson Belknap
- 4Law Firms Expand Scope of Immigration Expertise, Amid Blitz of Trump Orders
- 5Latest Boutique Combination in Florida Continues Am Law 200 Merger Activity
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250