Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In a recent decision written by Judge Richard Posner, The United States Court of Appeals for the Seventh Circuit determined that the Computer Fraud and Abuse Act (CFAA) may be used to bring a private cause of action against a former employee who permanently erased confidential data from his company-issued laptop before returning it to the company. International Airport Centers, L.L.C. v. Citrin, (Slip Op.) No. 05-1522 (7th Cir. March 8, 2006). In so holding, the Seventh Circuit has joined the current tide of federal courts that have permitted companies to use the CFAA as a means with which to defend themselves against the malicious and competitive acts of departing employees.
Since passing the CFAA in 1984 to criminalize 'classic' attacks on government computer databases by hackers, Congress has expanded its scope to include a private right of action covering not only government-owned computers, but also 'protected computers' used in interstate commerce. (According to the CFAA's express terms, a 'protected computer' is defined as one that 'is used in interstate or foreign commerce or communication, including a computer located outside the Untied States that is used in a manner that affects interstate or foreign commerce or communication of the United States.' 18 U.S.C. ' 1030(e)(2)(B).) As a result, individuals and companies may now bring civil claims alleging violations of the CFAA to seek compensatory damages, injunctive and other equitable relief.
The CFAA's scope has also been extended beyond computer hacking activities to encompass all manner of sins. Plaintiffs have sued individuals under the CFAA for placing 'cookies' on a business's computers in order to gather personal and confidential information, see, eg, In re Doubleclick Privacy Litig., 154 F. Supp. 2d 497 (S.D.N.Y. 2001), for infecting a business's e-mail network with unsolicited commercial bulk e-mails (ie, 'spam'); America Online, Inc. v. National Health Care Discount, Inc., 121 F. Supp. 2d 1255, 1267 (D. Iowa 2000) and for taking confidential and proprietary information from a former employer's computers for delivery to their new employers, see, eg, Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc., 199 F. Supp. 2d 1121 (W.D. Wash. 2000).
Four Elements of Private Right of Action
To bring a civil claim under ' 1030(a) of the CFAA, a party must establish that:
Making the Case
In International Airport Centers, IAC hired Jacob Citrin to identify potential real estate properties for the company and to assist it in acquiring those properties. In order to collect data on prospective properties, IAC lent Citrin a laptop computer to use in the course of his employment. After working for IAC for several years, Citrin decided to quit his job in order to start a competing business, in breach of his employment contract with IAC. Before returning the laptop to IAC, Citrin loaded a secure-erasure program, and permanently erased all of the data on it ' including the data he had collected in the course of his employment, and presumably, evidence of his disloyalty in planning a competing business while still working for IAC. In this case, the Sixth Circuit simply assumed without discussion that the company-issued laptop IAC loaned to Citrin was a 'protected computer' within the meaning of the CFAA.
In deciding on Citrin's use of the protected computer to be 'without authorization or exceeding authorization,' Judge Posner noted that Citrin's authority to access the laptop was based solely on his employment relationship as an agent of IAC. Accordingly, when he uploaded the secure erasure program onto his company-issued laptop for the purpose of deleting his employer's confidential information, his agency relationship terminated, and he was completely 'without authorization' to access the information stored on the company's computer.
In proving Citrin's misconduct, the IAC relied on the CFAA provision that deals with unauthorized access of a computer resulting in damage to that computer, specifically, 'whoever knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization to a protected computer.' The court noted that Citrin's transmission of 'a program intended to cause damage' to a computer's files met the CFAA requirement of damage which includes 'any impairment to the integrity or availability of data, a program a system or information.'
Finally, in addition to the elements listed above, a plaintiff must also prove that defendant's misconduct resulted in at least $5000 in damages within a 1-year period. Under the statute, 'loss' is defined as 'any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.' 18 U.S.C. 1020(e)(11). It is important to note that while the $5000 jurisdictional threshold is met in a majority of cases, lost revenue is a 'loss' as defined by the CFAA only when the revenue is lost as a result of an interruption of service ' for example, when a company's network is damaged or impaired. Nexans Wires SA v. Sark-USA, Inc., 2006 U.S. App. LEXIS 3619 (2d Cir. 2006).
Protection Under the Law
Individuals and companies can look to the expansive reading of the CFAA by the Seventh Circuit as welcome news in the defense against computer crimes by known and unknown attackers. As companies rely more and more on computers to create and store intellectual property and proprietary work product, the CFAA offers protection to safeguard the information on which business is built.
Christopher B. Hitchcock, a partner at Ohrenstein & Brown, LLP, concentrates his practice in business litigation and professional liability with a focus on employment issues, trade secret disputes, insurance coverage matters, shareholder claims and breach of contract actions. Amber W. Locklear, an associate with the firm, focuses her practice in commercial litigation.
In a recent decision written by Judge Richard Posner, The United States Court of Appeals for the Seventh Circuit determined that the Computer Fraud and Abuse Act (CFAA) may be used to bring a private cause of action against a former employee who permanently erased confidential data from his company-issued laptop before returning it to the company. International Airport Centers, L.L.C. v. Citrin, (Slip Op.) No. 05-1522 (7th Cir. March 8, 2006). In so holding, the Seventh Circuit has joined the current tide of federal courts that have permitted companies to use the CFAA as a means with which to defend themselves against the malicious and competitive acts of departing employees.
Since passing the CFAA in 1984 to criminalize 'classic' attacks on government computer databases by hackers, Congress has expanded its scope to include a private right of action covering not only government-owned computers, but also 'protected computers' used in interstate commerce. (According to the CFAA's express terms, a 'protected computer' is defined as one that 'is used in interstate or foreign commerce or communication, including a computer located outside the Untied States that is used in a manner that affects interstate or foreign commerce or communication of the United States.' 18 U.S.C. ' 1030(e)(2)(B).) As a result, individuals and companies may now bring civil claims alleging violations of the CFAA to seek compensatory damages, injunctive and other equitable relief.
The CFAA's scope has also been extended beyond computer hacking activities to encompass all manner of sins. Plaintiffs have sued individuals under the CFAA for placing 'cookies' on a business's computers in order to gather personal and confidential information, see, eg, In re Doubleclick Privacy Litig., 154 F. Supp. 2d 497 (S.D.N.Y. 2001), for infecting a business's e-mail network with unsolicited commercial bulk e-mails (ie, 'spam');
Four Elements of Private Right of Action
To bring a civil claim under ' 1030(a) of the CFAA, a party must establish that:
Making the Case
In International Airport Centers, IAC hired Jacob Citrin to identify potential real estate properties for the company and to assist it in acquiring those properties. In order to collect data on prospective properties, IAC lent Citrin a laptop computer to use in the course of his employment. After working for IAC for several years, Citrin decided to quit his job in order to start a competing business, in breach of his employment contract with IAC. Before returning the laptop to IAC, Citrin loaded a secure-erasure program, and permanently erased all of the data on it ' including the data he had collected in the course of his employment, and presumably, evidence of his disloyalty in planning a competing business while still working for IAC. In this case, the Sixth Circuit simply assumed without discussion that the company-issued laptop IAC loaned to Citrin was a 'protected computer' within the meaning of the CFAA.
In deciding on Citrin's use of the protected computer to be 'without authorization or exceeding authorization,' Judge Posner noted that Citrin's authority to access the laptop was based solely on his employment relationship as an agent of IAC. Accordingly, when he uploaded the secure erasure program onto his company-issued laptop for the purpose of deleting his employer's confidential information, his agency relationship terminated, and he was completely 'without authorization' to access the information stored on the company's computer.
In proving Citrin's misconduct, the IAC relied on the CFAA provision that deals with unauthorized access of a computer resulting in damage to that computer, specifically, 'whoever knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization to a protected computer.' The court noted that Citrin's transmission of 'a program intended to cause damage' to a computer's files met the CFAA requirement of damage which includes 'any impairment to the integrity or availability of data, a program a system or information.'
Finally, in addition to the elements listed above, a plaintiff must also prove that defendant's misconduct resulted in at least $5000 in damages within a 1-year period. Under the statute, 'loss' is defined as 'any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.'
Protection Under the Law
Individuals and companies can look to the expansive reading of the CFAA by the Seventh Circuit as welcome news in the defense against computer crimes by known and unknown attackers. As companies rely more and more on computers to create and store intellectual property and proprietary work product, the CFAA offers protection to safeguard the information on which business is built.
Christopher B. Hitchcock, a partner at
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.