436 Mass. 118 | Mass. | 2002
After a jury-waived trial, a judge in the Superior Court found that the defendants, Source One Associates, Inc., add Peter Easton, since at least 1994 and through 1997,
1. Background. The judge’s memorandum of decision
Edward L. Amaral, Jr., a Massachusetts attorney who operates a business called “Asset Searches Plus,” was one of the defendants’ customers from 1995 through 1997. Amaral sold asset information to attorneys, investigators, and others who hired him to perform asset research. He hired and paid Source One to obtain financial information from third parties, providing Source One a facsimile document containing only the search target’s name, last known address, and Social Security number (if known). The financial information sought was provided by Source One generally on the same facsimile sheet used by Ama-ral, and often on the same day as the request. Amaral did not inform the search targets of the search or obtain their consent and did not know how Source One obtained their bank account and other financial information. When asked, Easton told Ama-ral that he did not obtain credit reports of search targets and did not engage in other deceptive practices to obtain the information.
Source One was Amaral’s sole source of financial information from 1995 through 1997. Amaral’s records for the time
The transactions between Amaral and the defendants were similar to those involving another Massachusetts asset search firm, Bearak Reports, Inc. During 1995, Irene Davis, a consultant with Bearak Reports, made over 500 requests to the defendants for financial information, and the defendants provided Davis with the financial information sought approximately 400 times. The defendants charged at least $100 for each of these searches.
The records of Amaral and Davis revealed the names of hundreds of individuals whose private financial information was sold by the defendants to Amaral or Davis. Three of those persons, Edward Cohen, Peter Dwyer, and Bruce Rogal, testified at trial. Cohen, Dwyer, and Rogal testified that they did not authorize the defendants or anyone else to obtain their bank account information or credit reports.
The testimony of two witnesses, the director of corporate assets recovery for BankBoston (an expert in financial privacy policies and security of financial institutions) and a Framingham Cooperative Bank security officer responsible for information security, described in detail the policies of their respective institutions to secure confidentiality of account information and prevent those who were not customers from obtaining this information.
Usually, Easton’s first step in acquiring financial information was to obtain the targets’ credit reports. To do so, the defendants used their privileges as customers of a credit reporting agency, Equifax Consumer Information Services (Equifax).' The
Over the defendants’ objection, the judge permitted testimony on subsequent similar conduct by the defendants in other jurisdictions. John McCloskey, a security officer with Fidelity Security Services, Inc., a subsidiary company of FMR (Fidelity), testified that Easton made several telephone calls from Source One in New York to a toll-free number of Fidelity, and used fictitious names and titles to obtain private information on accounts of Fidelity customers.
After weighing the evidence, the judge found that the only way the defendants could have obtained such a volume of private financial information from banks and other financial institutions was through the use of deception and trickery, including impersonation of account holders. He then concluded that obtaining private financial information by pretext (pretext calling)
2. General Laws c. 93A claim. The defendants claim that the Commonwealth failed to show a violation of the Federal statutes or any unfair or deceptive conduct within the meaning of G. L. c. 93A.
a. Standard of review. The judge’s findings will not be set aside “unless clearly erroneous, and due regard shall be given to the opportunity of the trial court to judge of the credibility of the witnesses.” Mass. R. Civ. P. 52 (a), as amended, 423 Mass. 1402 (1996). We apply this standard to findings of subsidiary facts and to ultimate findings. Starr v. Fordham, 420 Mass. 178, 182 (1995). The inquiry is not whether we would have reached the same result as the judge but rather whether, on the entire evidence, we are “left with the definite and firm conviction that a mistake has been committed.” Id. at 186, quoting First Pa. Mtge. Trust v. Dorchester Sav. Bank, 395 Mass. 614, 621 (1985). The burden rests on the appellant to show such an error. First Pa. Mtge. Trust v. Dorchester Sav. Bank, supra at 622.
b. Fair Credit Reporting Act. The defendants argue that the Commonwealth failed to show that their conduct violated the Act, because the Commonwealth did not sustain its burden of eliminating each possible legitimate reason the defendants may have had for obtaining the credit reports of the three individuals
Pursuant to the Act, a consumer reporting agency may only furnish a consumer report under limited circumstances, such as in response to a court order or a request of the consumer, or in certain situations related to a credit transaction involving the consumer, employment purposés, the underwriting of insurance involving the consumer, the eligibility of the consumer for certain licenses, or certain other “legitimate business need[s].” 15 U.S.C. § 1681b. A person may neither knowingly and wil-fully obtain a consumer report under false pretenses, 15 U.S.C. § 1681q, nor obtain a credit report for an impermissible purpose, 15 U.S.C. § 1681b. “Obtaining a consumer report for an impermissible purpose under the FCRA, without disclosing that impermissible purpose, constitutes obtaining the report under false pretenses.” Ali v. Vikar Mgt. Ltd., 994 F. Supp. 492, 498 (S.D.N.Y. 1998).
The judge found that in the defendants’ bank searches, “the defendants repeatedly used credit reports for the purpose of developing additional private financial information about [search targets], where the defendants had no knowledge of the reason for or the purpose of the search.” The judge ruled that this was not a permissible purpose under the Act. 15 U.S.C. § 1681b. The judge also found that the defendants falsely represented to Equifax that credit reports would be used only in connection with credit transactions involving the consumer. The judge concluded that this conduct violated 15 U.S.C. §§ 1681b and 1681q. The judge’s findings are warranted and there is no error in his rulings.
The judge properly rejected the defendants’ contention that the three individuals who testified (Cohen, Dwyer, and Rogal) may have had their credit reports obtained for a permissible purpose, and that, therefore, the defendants themselves appropriately obtained the credit reports. The defendants argue that, where Cohen and Dwyer had mortgage disputes and Rogal had an employment contract with his former employer, their expectation of privacy in their credit reports diminished, as these are permissible purposes for obtaining reports under the
c. Unlawful techniques used to obtain private financial information from banks. The defendants challenge the judge’s finding that “it [was] more likely than not” that the defendants obtained their search targets’ private financial bank information through deceit or trickery. The defendants argue that other legitimate means for obtaining this information were suggested by the evidence: (1) the possibility of “dumpster divers” obtaining private bank account information from discarded automatic teller machines (ATM) receipts and the like; (2) the possibility of banks selling certain information to marketers; and (3) “some other source,” because one of the Commonwealth’s witnesses, a bank employee, testified that no one from his bank would have given bank account information to one who was not an account holder. The judge considered and rejected these alternative means as being sporadic, disorganized, and unavailable as a regular source of information. The judge concluded that the defendants would not be able to supply personal financial information on demand to its customers by relying on such sources. There was no error.
The defendants concede here that the judge did not err in rejecting the “dumpster diver” defense. The defendants agree
The defendants argue more generally that the Commonwealth has failed to prove illegality with regard to the victims whose records appear in the Amaral or Davis files. Despite the defendants’ arguments to the contrary, the judge found that the information in those files was properly authenticated. The judge accepted the records not as evidence of the accuracy or truth of particular amounts contained in accounts, but rather to show that the defendants were seeking, obtaining, and transmitting personal financial bank information. The defense had ample op
In sum, the evidence warranted the judge’s finding that the defendants obtained private bank information of their search targets through the use of deception or trickery.
3. Subsequent bad acts. The defendants contend that the judge’s admission of the subsequent similar pretext calls to Fidelity was erroneous because these calls were made after the period of time at issue, and that, because these calls were made to and from locations outside of Massachusetts, they had no bearing on Massachusetts search subjects and were introduced only as evidence of subsequent bad acts to prove Easton’s bad character. As such, the defendants claim this evidence was irrelevant and prejudicial.
Although this is a case of civil enforcement, analogous law
We cannot conclude that the judge erred in admitting this evidence. The judge carefully kept the trial focused on the specific claims alleged. See Commonwealth v. Helfant, supra at 226 (instruction that evidence could only be considered for limited purpose of whether it tends to prove existence of plan, scheme, or state of mind of defendant). He ruled that the evidence was received for the limited purpose of tending to show that the defendants were familiar with the technique of using ruses and false pretenses in order to obtain personal financial information.
Regardless of where the prohibited conduct occurred, it was admissible to show the defendants’ modus operandi, i.e., their means of obtaining personal financial information by using
Although the Fidelity telephone calls occurred subsequent to the period in question, the length of time between the two is not so temporally remote as to preclude admission of the subsequent acts. See Commonwealth v. Kater, supra at 416, citing Commonwealth v. Helfant, supra at 228 n.13 (no bright-line test for determining remoteness of evidence of prior misconduct). In fact, the judge found a continuing course of conduct between the alleged claims and the subsequent acts. We, therefore, reject the defendants’ argument on remoteness of time.
4. Knowing violation of G. L. c. 93A, § 2 (a). We turn to the defendants’ alternative argument concerning the imposition of civil penalties. The defendants maintain that the Commonwealth failed to show that they knowingly violated G. L. c. 93A, § 2 (a), and therefore that they should not have been found liable for civil penalties under G. L. c. 93A, § 4. We disagree.
The penalty provision of G. L. c. 93A, § 4, provides in part: “If the court finds that a person has employed any method, act or practice which he knew or should have known to be in violation of said section two, the court may require such person to pay to the commonwealth a civil penalty.” Thus, it is necessary to establish that the defendants intended to commit the acts and knew that such acts were deceptive. The judge found that Eas-ton knew while he was dealing with Amaral and Davis “that his actions were unlawful and unfair and deceptive acts or
While the defendants were providing Amaral and Davis with search target information, Amaral alerted the defendants to the Commonwealth’s lawsuit against Bearak Reports, Inc. Amaral sent the Bearak pleadings to Source One in 1997 and explained that he had been obtaining financial information through Source One and was concerned about the legality of obtaining such information. Easton falsely assured Amaral that, unlike Bearak Reports, Inc., Source One acquired search target information in accordance with State and Federal law. Easton denied use of the precise methods that the Commonwealth has proved Source One used to obtain such information.
Further, the defendants falsely represented to Equifax their reason for obtaining credit reports. The defendants asserted in their application for membership with Equifax that “[cjredit reports will be used for collection purposes only. This firm will use the reports for locating judgment [debtors] and their assets for collection of judgments.” The evidence regarding Easton’s pretext calls to Fidelity also tended to show the defendants’ familiarity with the use of ruses for obtaining personal financial information. Accordingly, the judge was warranted in attributing knowledge to the defendants from the evidence presented.
Judgment affirmed.
The complaint alleged that the defendants engaged in such conduct during said time period. The judge’s findings refer to various dates within this time. For purposes of this appeal, any minor discrepancy in dates is irrelevant.
The judge defined “financial information” for purposes of the injunction as “any information regarding the type, balance, identity of transactions in, or other information regarding any checking account, savings account, certificate of deposit, money market account, brokerage account, securities portfolio, retirement account, safety deposit box, or other financial account, or information about a person’s insurance policies.”
After becoming aware of a lawsuit brought against Bearak Reports, Inc., another asset search firm, for conduct similar to that of the defendants here, Amaral became concerned about the legality of Source One’s operations. Amaral approached the Attorney General’s office, explained that he had been obtaining financial information through the defendants, and cooperated with the Attorney General’s office, including providing all his records from December, 1993, through November 5, 1997. Amaral entered into a settlement with the Commonwealth.
To prevent undue risk of private credit report misuse, Equifax has a policy not to serve private investigators and firms that resell its credit information.
Fidelity is an investment management company. Its policies prohibit the release of any account or other information, including an account number, account balances, or the existence of any Fidelity accounts to anyone who is not a customer unless Fidelity is required to do so by subpoena or Fidelity has written consent of the account holder to release the information to a designated individual. Employees are informed of these policies and trained to implement them.
At trial, Amaral identified the voice on the tapes as that of Easton, the man he had dealt with at Source One on the telephone.
“Pretext phone calling” has been described as the use of deception and trickery to obtain an individual’s private financial information from banks and other financial institutions for resale to others. See Seltzer, The New Threats to Financial Privacy: Is There Liability for Financial Institutions and Their New Antagonists, the Information Brokers, 43 B.B.J. 8 (1999).
Although the judge found that the defendants’ conduct violated both the Federal Fair Credit Reporting Act (Act) and our State counterpart, G. L. c. 93, §§ 50 et seq., in the remainder of the opinion we discuss the Act, as the Federal statute is the focus of the defendants’ argument on appeal.
The Financial Modernization Act of 1999, which criminalizes “pretext calling,” was adopted after the trial was completed in this case. See 15 U.S.C. §§ 6821(a), 6823(a) (2000).
The defendants argue in a cursory manner that the judge erred in his “wholesale prohibition of the sale of [the search targets’ private financial] information.” The defendants contend that the sale of such information is not unlawful. The precedent offered to support this assertion is misplaced, as the facts are distinguishable from those at bar. See Innovative Database Sys. v. Morales, 990 F.2d 217 (5th Cir. 1993) (Texas statute prohibiting sale of motor vehicle accident information obtained from public records of law enforcement agency was unconstitutional restriction of free commercial speech where statute made no distinction between information of public record and information not of public record, information lawfully obtained and information not lawfully obtained, and truthful information and untruthful information). Here, even if the sale of private financial information was protected by commercial free speech, the defendants would not be entitled to protection under the First Amendment to the United States Constitution, because they used deceptive and unlawful conduct to obtain this information. See id. at 220, quoting Zauderer v. Office of Disciplinary Counsel, 471 U.S. 626, 638 (1985).
The defendants called no witnesses, and Easton claimed his right not to testify under the Fifth Amendment to the United States Constitution in response to all material questions in his deposition. The judge correctly stated that a reasonable inference adverse to the defendants may be drawn from the refusal to testify on the ground of self-incrimination. Labor Relations Comm’n v. Fall River Educators’ Ass’n, 382 Mass. 465, 471 (1981), and cases cited.
Our opinions in this context generally refer to the admissibility of evidence of “prior bad acts.” The principles are the same, however, whether the bad acts are prior or subsequent to the events involved in the case before the court. See Commonwealth v. Brusgulis, 406 Mass. 501, 502 n.1 (1990). The Fidelity acts involved in this case occurred after the events alleged in the complaint.
The defendants sent a letter to their clients to answer questions raised concerning the legality of their asset searches. The letter states, in part:
“This firm does not conduct CREDIT REPORT SEARCHES. We do not receive in any form any individual’s credit history either in written form or orally, without the individual’s written authorization. We do not take any action in violation of the Fair Credit Reporting Act or the Federal Fair Debt Collection And Practice Act or any state or federal code in gathering information.”