3 Steps to Enable Companies to Use the CFAA’s Remedies for Misuse of Computers and Info – Even in the 9th Cir

Steps
3 Steps!

Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable steps to actively resist and prevent such misuses, and (3) clearly notifying the transgressor that his authorization has been terminated.

In the last couple of years the Ninth Circuit has done more work than any other circuit on refining its “narrow” or “access means access” approach to determining whether an access “exceeds authorized access” or is “without authorization” for purposes of the Computer Fraud and Abuse Act. The district courts in the Ninth Circuit are now taking those principles and applying them at the trial court level. Over the last few weeks we have seen two of those cases that, when compared to each other, do a really nice job of plotting the points for how this “narrow” approach really works.

The cases are Craigslist Inc. v. 3Taps Inc., 2013 WL 447520 (ND Ca. Aug. 16, 2013) and Spam Arrest, LLC v. Replacements, Ltd., 2013 WL 4675919 (W.D. Wa. Aug. 29, 2013). A brief summary of both cases can be found on the CFAA digest (my latest project). Here are the key points:

Access.  The plaintiffs in both cases provided unrestricted access to their computers. Craigslist provided a website that was accessible to anyone in the world; Spam Arrest provided an email server that was accessible to anyone in the world who wanted to send emails to its customers.

Contractual Use Restrictions.  The plaintiffs in both cases had contractual use restrictions that prohibited the defendants from doing what they ultimately did with the computers. Craigslist’s has a Terms of Use that prohibits the collection of data from its site; Spam Arrest’s agreement required the defendant to promise not to use the computer to send spam.

Prohibited Use.  The defendants in both cases used those computers for purposes that were prohibited by the contractual restrictions. In Craigslist, the defendant used a program to scrape the plaintiff’s website and basically rip off all of its content; in Spam Arrest, the defendant used the email server to send spam email to the plaintiff’s customers — the plaintiff sold anti-spam services and, quite understandably so, was not pleased.

Ninth Circuit Law.  “[T]he phrase ‘exceeds authorized access’ in the CFAA does not extend to violations of use restrictions. . . . Therefore, we hold that ‘exceeds authorized access’ in the CFAA is limited to violations of restrictions on access to information, and not restrictions on its use.'” United States v. Nosal (Nosal II), 676 F.3d 854, 863 (9th Cir. 2012).

Same Outcome?  At this point, it seems like both cases should have the same outcome, correct? Yes, they should, based on the information I have provided so far — based on this information it sounds like both plaintiffs’ claims under the Computer Fraud and Abuse Act should fail. The there is more …

Active Resistance. Spam Alert simply sat back and relied on its contractual use restrictions as its only efforts to prevent the misuse of its computer; Craigslist did more. After learning about 3 Taps’ activities, Craigslist took two important steps:

(1) it sent a cease-and-desist letter to 3Taps informing it that “[t]his letter notifies you that you and your agents, employees, affiliates, and/or anyone acting on your behalf are no longer authorized to access, and/or prohibited from accessing Craigslist ‘s website or services for any reason”;

(2) Craigslist configured its website to block access from IP addresses associated with 3Taps.

Because Craigslist took these steps to actively resist the misuse of its website, the court framed the issue as whether a plaintiff, who had made its website publicly available and authorized the world to access it, could revoke that permission on a case-by-case basis through its cease-and-desist letter and IP blocking measures. The court held that “authorization” turns on the decision of the “authority” that grants or prohibits access and Craigslist, as owner of the website, rescinded that permission for 3Taps; further access by 3Taps after that rescission was “without authorization.”

What these two cases show is that, even in the Ninth Circuit (and Fourth), a company can use the Computer Fraud and Abuse Act as a tool to combat the misuse of its computers, and the information available thereon, if it actively monitors for such misuses and, upon discovering them, takes reasonable steps to actively resist and prevent such misuses by terminating the transgressor’s ability to access the computers and clearly and conspicuously notifying him that such authorization has been terminated. But what does that mean, in the the real-world of business, you may be wondering?

Practical Scenarios

Here are a couple of the most common scenarios where a business would want to follow this 3 step approach of monitoring, notifying, and protecting:

Employee is downloading company trade secrets in preparation to go work for a competitor. What are the 3 steps?

1. Monitor: Company should actively monitor its computer system for unusual and suspicious activity by both insiders and outsiders and investigate such activity to determine why such activity is taking place.

2. Notify: If company’s investigation verifies that there may be concerns though it is not conclusive enough to rise to the level to require termination, company should provide the employee with a clear and direct written notification that she does not have authorization to access the files, folders, databases, or other parts of the computer system where the trade secret information is stored.

3. Protect: Company should then have its IT Department implement reasonable technological restrictions to prevent employee from accessing those areas of the computer system.

Employee gives two week notice of intention to terminate employment.

1. Monitor: Monitoring is not necessarily a step here because company is already aware that employee is leaving, so company should go directly to the Notify stage as soon as the notice is given.

2. Notify: Company should provide employee with a clear and direct written notification that his authorization has been terminated and he is no longer allowed to access those areas of the computer system containing proprietary information.

3. Protect:  Company should then have its IT Department implement reasonable technological restrictions to prevent employee from accessing those areas of the computer system.

Published by Shawn E. Tuma

Shawn Tuma is an attorney who is internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for nearly two decades. He is a Partner at Spencer Fane, LLP where he regularly serves as outside cybersecurity and privacy counsel to a wide range of companies from small to midsized businesses to Fortune 100 enterprises. You can reach Shawn by telephone at 972.324.0317 or email him at stuma@spencerfane.com.

Join the Conversation

1 Comment

Leave a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Business Cyber Risk

Subscribe now to keep reading and get access to the full archive.

Continue reading