A recent district court opinion relied on employment agreement restrictions to determine whether the employees exceeded their authorized access to the employer’s computers. In doing so, the court used the Intended-Use Theory of access to determine whether there may have been a violation of the Computer Fraud and Abuse Act (CFAA), highlighting the need for companies to have well-written agreements that objectively establish such intended use.
Specifically, the court looked to two restrictions in the employment agreements that happen to be the same restrictions I make sure my clients have in their employment agreements:
- the employee’s use of the computer and data was restricted to the period of employment (limited duration); and
- the employee’s use of the computer and data was restricted to being only for the benefit of employer (intended use).
Notice the italicized text “and data” — that is another restriction that I include in these agreements. Why? Because, most of the agreements that are litigated under the CFAA involve restrictions on the access to and use of the computers but most of the underlying factual scenarios for those same cases involve the usage of the data obtained by the access — not just the access to the computer. The case discussed here is Custom Hardware Engineering & Consulting, Inc. v. Dowell, 2013 WL 252945 (E.D. Mo. Jan. 23, 2013), and it exemplifies this point quite well.
While it is always important to have well written employment agreements and/or acceptable computer use policies, it is even more important to have these in jurisdictions that follow the Intended-Use Theory of access because under this theory the courts look to the restrictions placed upon and known by the employee to determine whether authorized access is exceeded. In United States v. John, 597 F.3d 263, 271 (5th Cir. 2010), the court explained its “intended-use analysis” as follows: access to a computer and data that can be obtained from that access may be exceeded if the purposes for which access has been given is exceeded and the employee is actually aware of those limitations on purpose through policies or contractual agreements.
Trilogy of Access Theories
There are three theories of access under the Computer Fraud and Abuse Act: Intended-Use Theory, Strict Access Theory, and Agency Theory. I explain this trilogy of access theories with more detail in this post: New “Employment” Computer Fraud and Abuse Act case … but with a twist! though the cases under the Strict Access Theory have changed since that time.
The Intended-Use Theory is followed by the following jurisdictions (as of this writing): Fifth Circuit (United States v. John and United States v. Phillips), Eleventh Circuit (United States v. Rodriguez), Eighth Circuit, which includes Missouri (United States v. Teague), Third Circuit (United States v. Tolliver) and possibly the First Circuit (United States v. Morris, United States v. Czubinski) as the rationale for the Intended-Use Theory is derived from the second factor in Morris.
The Agency Theory is followed by the Seventh Circuit (International Airport Centers, LLC v. Citrin).
TAKEAWAYS: The important takeaways from the Custom Hardware Engineering & Consulting, Inc. v. Dowell case are that your business really needs to have solid employment agreements or acceptable use policies that restrict (1) the duration for which access is authorized, (2) the intended-use for which access is authorized, and (3) that these restrictions apply to not only the computers but also the data that is accessible from those computers.
If you would like to talk with me about legal issues concerning computer fraud, data security or privacy, please feel free to give me a call (469.635.1335) or email me (email@example.com).
- Current Employee May Have Violated Computer Fraud and Abuse Act by Downloading for Secret New Employer (shawnetuma.com)
- More Tightening of the Computer Fraud and Abuse Act – Holding it to Rule 9(b) Heightened Pleading Standard (shawnetuma.com)
- Fifth Circuit Finds Company Not Liable for Alleged Violations of CFAA and ECPA by Its Regional Manager (shawnetuma.com)
- Can You Be Outraged By The Prosecution of Aaron Swartz Under Computer Fraud and Abuse Act But Not Sandra Teague? (shawnetuma.com)