What is the Proper Jurisdiction for an International Computer Fraud Lawsuit?

The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the defendant knew the location of the computer server.

Jurisdiction for Computer FraudThis issue was analyzed by the United States Court of Appeals for the Second Circuit in its opinion in MacDermid, Inc. v. Deiter, 2012 WL 6684580 (2nd Cir. Dec. 26, 2012). MacDermid is a company located in Connecticut. Deiter was an employee of MacDermid who worked remotely from Canada. Deiter learned she was about to be terminated but, before she was actually terminated, she used her MacDermid email account to forward to her personal email account MacDermid’s confidential and proprietary data files from its computer servers. The computer servers were located in Waterbury, Connecticut. Deiter was fully aware of the location of the computer servers and this fact proved to be important in the court’s rationale for its decision.

MacDermid sued Deiter in the United States District Court for the District of Connecticut for a state law claims of misuse of a computer and misappropriation of trade secrets. MacDermid did not sue under the Computer Fraud and Abuse Act. (To be candid, when I first read this case, it was because my friend Michael Maslanka forwarded it to me which reminded me that I wanted figure out why there was no CFAA claim — I still do not know the answer!) Jurisdiction was based on diversity of citizenship and the Connecticut long-arm statute. Deiter filed a 12(b)(6) Motion to Dismiss claiming Connecticut did not have personal jurisdiction over her. The District Court agreed and dismissed the case. On appeal, the Second Circuit determined there was personal jurisdiction over Deiter in Connecticut based on its long-arm statute and the fact that Deiter knew MacDermid’s computer servers — which she knowingly accessed — were located in Connecticut.

The Long-Arm Statute

The Connecticut long-arm statute permits the exercise of jurisdiction over anyone who uses a computer or a computer network located within the state. While Deiter was not present in Connecticut when she sent the offending emails, the way the computer system operated, in order to use her MacDermid email account and obtain the confidential and proprietary data, she had to access computer servers located in MacDermid’s offices in Connecticut. The computer servers are encompassed within the definition of computers under the long-arm statute, thus, her access and use of those computers by remote means constituted a use of the computer within the state.

Due Process

After determining the long-arm statute encompassed Deiter’s activities, the court next examined whether the exercise of jurisdiction over Deiter would comport with due process. This required looking at Deiter’s minimum contacts with Connecticut to determine whether the maintenance of the suit would offend traditional notions of fair play and substantial justice. This step is satisfied if the defendant purposefully directed her activities at residents of the forum state and the arising injuries relate to those activities. Where a defendant knows computer servers are located in a forum state and intentionally commits computer fraud against those servers, the defendant meets this purposeful availment requirement: “Deiter purposefully availed herself of the privilege of conducting activities within Connecticut because she was aware ‘of the centralization and housing of the companies’ e-mail system and the storage of confidential, proprietary information and trade secrets’ in Waterbury, Connecticut, and she used that email system and its Connecticut servers in retrieving and emailing confidential files.” The court’s rationale made it clear that Deiter’s knowledge of the location of the computer servers was the linchpin of this decision.

Reasonableness of Exercising Jurisdiction

Satisfied that due process permitted the exercise of jurisdiction, the court then looked to whether the exercise of jurisdiction was reasonable. It looked to the five Asahi Metal Factors and determined that under those factors it was reasonable, primarily because the burden for Deiter to travel there was not too great and both Connecticut and MacDermid had significant interests in resolving the matter in Connecticut. “Further, efficiency and social policies against computer-based theft are generally best served by adjudication in the state from which computer files have been misappropriated.” I agree.

The rule of this case is that the proper jurisdiction for suing someone for computer fraud from a foreign country, directed at companies in the United States, is the place where the wrongfully accessed computer server is located if the person knows the location of the computer server. But, what is the takeaway?

Takeaway: If your company has people accessing its computer system from international locations, make sure they know and understand where the computer server is located. So, how about you just put this information in your company’s computer use policy!

If you or anyone you know need assistance in dealing with possible claims of computer fraud or just want to talk about the law in general, please feel free to give me a call (469.635.1335) or email me (stuma@brittontuma.com) and I will be more than happy to talk with you!

-Shawn E. Tuma

Published by Shawn E. Tuma

Shawn Tuma is an attorney who is internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for nearly two decades. He is a Partner at Spencer Fane, LLP where he regularly serves as outside cybersecurity and privacy counsel to a wide range of companies from small to midsized businesses to Fortune 100 enterprises. You can reach Shawn by telephone at 972.324.0317 or email him at stuma@spencerfane.com.

Join the Conversation

2 Comments

  1. An interesting case. I wonder if a suit under CFAA wasn’t filed because McDermid thought they had a weaker case here, so they’d expend the weaker basis to learn about defence tactics before going in under CFAA, and “got lucky” with the finding? Or am I letting my military thought process leak in here? 😉

    1. That is an interesting thought John and, honestly, you never really know what strategy the attorney had. I did finally reviewed the original Complaint in this case and confirm that there was no CFAA claim brought; my hunch is they probably were a little bit gun shy about bringing the claim because there was so much case law applying it in a negative way (recently) and they did not want to pick that fight so, instead, they opted to focus on just the state law claim which may prove to be a wise decision. Thanks for your insightful comment – I hope all is going well for you!

Leave a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Business Cyber Risk

Subscribe now to keep reading and get access to the full archive.

Continue reading