EF CULTURAL TRAVEL BV, EF Cultural Tours BV, EF Institute for Cultural Exchange, Inc., EF Cultural Services BV, and Go Ahead Vacations, Inc., Plaintiffs, Appellees, v. EXPLORICA, INC., Olle Olsson, Peter Nilsson, Philip Gormley, Alexandra Bernadotte, Anders Eriksson, Deborah Johnson, and Stefan Nilsson, Defendants, Appellants.
No. 01-2000
United States Court of Appeals, First Circuit.
Decided Dec. 17, 2001.
274 F.3d 577
Heard Oct. 1, 2001.
For one thing, the intervenors’ failure to furnish a privilege log cannot plausibly be said to have resulted from the lack of an explicit ruling on the motion for immunity. Roe and Moe could have submitted a privilege log by proffer or over an attorney‘s signature without in any way compromising their Fifth Amendment rights.
For another thing, although it is plainly the better practice for a trial court to rule explicitly on every substantial motion, it has long been accepted that a trial court may implicitly deny a motion by entering judgment inconsistent with it. Wimberly v. Clark Controller Co., 364 F.2d 225, 227 (6th Cir.1966). In this case, the district court‘s rejection of the motion to quash effectively denied the intervenors’ motion for a grant of immunity. That ruling hardly can be questioned on the merits. The intervenors point to no case authorizing a grant of judicial immunity to a grand jury target in order to facilitate the presentation of a privilege claim, and they offer no persuasive reason why this case should be the first.
What remains is the intervenors’ unhappiness with what they characterize as the district court‘s rush to judgment. The facts are simple: the district court convened a status conference and then converted the status conference into a non-evidentiary hearing on the merits of the intervenors’ privilege claims. The proper time to raise an objection to this procedure was directly after the court‘s announcement of its intention to proceed to the merits, but the intervenors stood mute. Having neither contemporaneously objected to the court‘s procedural ruling nor sought a continuance, the intervenors have waived any right to complain about the court‘s timing. See In re United States (Franco), 158 F.3d 26, 32 n. 3 (1st Cir. 1998); United States v. Diaz-Villafane, 874 F.2d 43, 47 (1st Cir.1989).
IV. CONCLUSION
We need go no further. We hold that the intervenors’ claims of privilege fail because the oral joint defense agreement on which they rely cannot defeat Oldco‘s express waiver of privilege, and, alternatively, because the intervenors failed without justification to produce a privilege log (thereby waiving the underlying attorney-client and work product privileges). Similarly, the district court did not err either in refusing to convene an evidentiary hearing or in ruling simultaneously on the motion to quash and the motion for immunity. Accordingly, the order refusing to nullify the grand jury subpoena is unimpugnable.
Affirmed.
Nathaniel H. Akerman, with whom Seyfarth Shaw was on brief, for appellees.
Before BOUDIN, Chief Judge, COFFIN, Senior Circuit Judge, and LYNCH, Circuit Judge.
COFFIN, Senior Circuit Judge.
Appellant Explorica, Inc. (“Explorica“) and several of its employees1 challenge a preliminary injunction issued against them for alleged violations of the Computer Fraud and Abuse Act (“CFAA“),
I. Background
Explorica was formed in 2000 to compete in the field of global tours for high school students. Several of Explorica‘s employees formerly were employed by appellee EF,1 which has been in business for more than thirty-five years. EF and its partners and subsidiaries make up the world‘s largest private student travel organization.
Shortly after the individual defendants left EF in the beginning of 2000, Explorica began competing in the teenage tour market. The company‘s vice president (and former vice president of information strategy at EF), Philip Gormley, envisioned that Explorica could gain a substantial advantage over all other student tour companies, and especially EF, by undercutting EF‘s already competitive prices on student tours. Gormley considered several ways to obtain and utilize EF‘s prices: by manually keying in the information from EF‘s brochures and other printed materials; by using a scanner to record that same information; or, by manually searching for each tour offered through EF‘s website. Ultimately, however, Gormley engaged Zefer, Explorica‘s Internet consultant, to design a computer program called a “scraper” to glean all of the necessary information from EF‘s website. Zefer designed the program in three days.
The scraper has been likened to a “robot,” a tool that is extensively used on the Internet. Robots are used to gather information for countless purposes, ranging from compiling results for search engines such as Yahoo! to filtering for inappropriate content. The widespread deployment of robots enables global Internet users to find comprehensive information quickly and almost effortlessly.
Like a robot, the scraper sought information through the Internet. Unlike other robots, however, the scraper focused solely on EF‘s website, using information that other robots would not have. Specifically, Zefer utilized tour codes whose significance was not readily understandable to the public. With the tour codes, the scraper accessed EF‘s website repeatedly and easily obtained pricing information for those specific tours. The scraper sent more than 30,000 inquiries to EF‘s website and recorded the pricing information into a spreadsheet.2
The development and use of the scraper came to light about a year and a half later during state-court litigation regarding appellant Olsson‘s departure from appellee EFICE. EF then filed this action, alleging violations of the CFAA; the Copyright Act of 1976,
On May 30, 2001, the district court granted a preliminary injunction against Explorica based on the CFAA, which criminally and civilly prohibits certain access to computers. See
The district court first relied on EF‘s use of a copyright symbol on one of the pages of its website and a link directing users with questions to contact the company,6 finding that “such a clear statement should have dispelled any notion a reason able person may have had that the ‘pre sumption of open access’ applied to information on EF‘s website.” The court next found that the manner by which Explorica accessed EF‘s website likely violated a confidentiality agreement between appellant Gormley and EF, because Gormley provided to Zefer technical instructions concerning the creation of the scraper. Finally, the district court noted without elaboration that the scraper bypassed technical restrictions embedded in the
II. Standard of Review
A district court may issue a preliminary injunction only upon considering “(1) the likelihood of success on the merits; (2) the potential for irreparable harm if the injunction is denied; (3) the balance of relevant impositions...; and (4) the effect (if any) of the court‘s ruling on the public interest.” Ross-Simons of Warwick, Inc. v. Baccarat, Inc., 102 F.3d 12, 15 (1st Cir.1996). Appellants challenge only the district court‘s finding that appellees are likely to succeed on the merits, and we thus confine our review to that factor. As in any other appeal, we review the merits of a preliminary injunction depending on the issue under consideration. “Generally speaking, pure issues of law (e.g., the construction of a statute) are reviewed de novo, findings of fact for clear error, and ‘judgment calls’ with considerable deference....” Langlois v. Abington Hous. Auth., 207 F.3d 43, 47 (1st Cir.2000). Each of these is applicable here, where the district court‘s judgment relied on both its analysis of the CFAA and its assessment of the voluminous documentary evidence.
III. The Computer Fraud and Abuse Act
Although appellees alleged violations of three provisions of the CFAA, the district court found that they were likely to succeed only under section
[Whoever] knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value... shall be punished.
Appellees allege that the appellants knowingly and with intent to defraud accessed the server hosting EF‘s website more than 30,000 times to obtain proprietary pricing and tour information, and confidential information about appellees’ technical abilities. At the heart of the parties’ dispute is whether appellants’ actions either were “without authorization” or “exceed[ed] authorized access” as defined by the CFAA.9 We conclude that because of the broad confidentiality agreement appellants’ actions “exceed[ed] authorized access,” and so we do not reach the more general arguments made about statutory
A. ”Exceeds authorized access”
Congress defined “exceeds authorized access,” as accessing “a computer with authorization and [using] such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.”
Employee agrees to maintain in strict confidence and not to disclose to any third party, either orally or in writing, any Confidential or Proprietary Information ... and never to at any time (i) directly or indirectly publish, disseminate or otherwise disclose, deliver or make available to anybody any Confidential or Proprietary Information or (ii) use such Confidential or [P]roprietary Information for Employee‘s own benefit or for the benefit of any other person or business entity other than EF.
***
As used in this Agreement, the term “Confidential or Proprietary Information” means (a) any trade or business secrets or confidential information of EF, whether or not reduced to writing ...; (b) any technical, business, or financial information, the use or disclosure of which might reasonably be construed to be contrary to the interests of EF.
The record contains at least two communications from Gormley to Zefer seeming to rely on information about EF to which he was privy only because of his employment there. First, in an email to Zefer employee Joseph Alt exploring the use of a scraper, Gormley wrote: “[m]ight one of the team be able to write a program to automatically extract prices ... ? I could work with him/her on the specification.” Gormley also sent the following email to Zefer employee John Hawley:
Here is a link to the page where you can grab EF‘s prices. There are two important drop down menus on the right.... With the lowest one you select one of about 150 tours. * * * You then select your origin gateway from a list of about 100 domestic gateways (middle drop down menu). When you select your origin gateway a page with a couple of tables comes up. One table has 1999-2000 prices and the other has 2000-2001 prices. * * * On a high speed connection it is possible to move quickly from one price table to the next by hitting backspace and then the down arrow.
This documentary evidence points to Gormley‘s heavy involvement in the conception of the scraper program. Furthermore, the voluminous spreadsheet containing all of the scraped information includes the tour codes, which EF claims are pro-
Explorica argues that none of the information Gormley provided Zefer was confidential and that the confidentiality agreement therefore is irrelevant.12 The case on which they rely, Lanier Professional Services, Inc. v. Ricci, 192 F.3d 1, 5 (1st Cir.1999), focused almost exclusively on an employee‘s non-compete agreement. The opinion mentioned in passing that there was no actionable misuse of confidential information because the only evidence that the employee had taken protected information was a “practically worthless” affidavit from the employee‘s successor. Id. at 5.
Here, on the other hand, there is ample evidence that Gormley provided Explorica proprietary information about the structure of the website and the tour codes. To be sure, gathering manually the various codes through repeated searching and deciphering of the URLs13 theoretically may be possible. Practically speaking, however, if proven, Explorica‘s wholesale use of EF‘s travel codes to facilitate gathering EF‘s prices from its website reeks of use—and, indeed, abuse—of proprietary information that goes beyond any authorized use of EF‘s website.14
Gormley voluntarily entered a broad confidentiality agreement prohibiting his disclosure of any information “which might reasonably be construed to be contrary to the interests of EF.”15 Appellants would face an uphill battle trying to argue that it was not against EF‘s interests for appellants to use the tour codes to mine EF‘s pricing data. See Anthony‘s Pier Four, Inc. v. HBC Assoc., 411 Mass. 451, 471, 583 N.E.2d 806, 820 (1991) (imposing a duty of good faith and fair dealing in all contracts under Massachusetts law). If EF‘s allegations are proven, it will likely prove that whatever authorization Explorica had to navigate around EF‘s site (even in a competitive vein), it exceeded that authorization by providing proprietary information and know-how to Zefer to create the scraper.16 Accordingly, the district
B. Damage or Loss under section 1030(g)
Appellants also challenge the district court‘s finding that the appellees would likely prove they met the CFAA‘s “damage or loss” requirements. Under the CFAA, EF may maintain a private cause of action if it suffered “damage or loss.”
The district court held that although EF could not show any “damage” it would likely be able to show “loss” under the statute. It reasoned that a general understanding of the word “loss” would fairly encompass a loss of business, goodwill, and the cost of diagnostic measures that EF took after it learned of Explorica‘s access to its website.17 Appellants respond that such diagnostic measures cannot be included in the $5,000 threshold because their actions neither caused any physical damage nor placed any stress on EF‘s website.
Few courts have endeavored to resolve the contours of damage and loss under the CFAA. See, e.g., Shaw v. Toshiba Am. Info. Sys., 91 F.Supp.2d 926 (E.D.Tex.1999) (noting the paucity of decisions construing the Act). Two district courts that have addressed the issue have found that expenses such as those borne by EF do fall under the statute. In Shurgard Storage Centers v. Safeguard Self Storage, Inc., 119 F.Supp.2d 1121 (W.D.Wa.2000), the district court found that the need to assess whether a defendant‘s actions compromised the plaintiff‘s computers was compensable under the CFAA because the computer‘s integrity was called into question. The court based its finding on the legislative history of the 1996 amendments to the CFAA:
The 1994 Amendment required both “damage” and “loss,” but it is not always clear what constitutes “damage.” For example, intruders often alter existing log-on programs so that user passwords are copied to a file which the hackers can retrieve later. After retrieving the newly created password file, the intruder restores the altered log-on file to its original condition. Arguably, in such a situation, neither the computer nor its information is damaged. Nonetheless, this conduct allows the intruder to accumulate valid user passwords to the system, requires all system users to change their passwords, and requires the system administrator to devote resources to re-securing the system. Thus, although there is arguably no “damage,” the victim does suffer “loss.” If the loss to the victim meets the required monetary threshold, the conduct should be criminal, and the victim should be entitled to relief.
We agree with this construction of the CFAA. In the absence of a statutory definition for “loss,” we apply the well-known rule of assigning undefined words their normal, everyday meaning. See Inmates of Suffolk Cty. Jail v. Rouse, 129 F.3d 649, 653-54 (1st Cir.1997). The word “loss” means “detriment, disadvantage, or deprivation from failure to keep, have or get.” The Random House Dictionary of the English Language 1137 (2d ed.1983). Appellees unquestionably suffered a detriment and a disadvantage by having to expend substantial sums to assess the extent, if any, of the physical damage to their website caused by appellants’ intrusion. That the physical components were not damaged is fortunate, but it does not lessen the loss represented by consultant fees. Congress‘s use of the disjunctive, “damage or loss,” confirms that it anticipated recovery in cases involving other than purely physical damage. But see In re Intuit Privacy Litig., 138 F.Supp.2d 1272, 1281 (C.D.Ca.2001) (loss means “irreparable damage” and any other interpretation “would render the term ‘damage’ superfluous“); Register.com, Inc. v. Verio, Inc., 126 F.Supp.2d 238, 252 n. 12 (S.D.N.Y. 2000) (lost business or goodwill could not constitute loss absent the impairment or unavailability of data or systems). To parse the words in any other way would not only impair Congress‘s intended scope of the Act, but would also serve to reward sophisticated intruders. As we move into an increasingly electronic world, the instances of physical damage will likely be fewer while the value to the victim of what has been stolen and the victim‘s costs in shoring up its security features undoubtedly will loom ever-larger. If we were to restrict the statute as appellants urge, we would flout Congress‘s intent by effectively permitting the CFAA to languish in the twentieth century, as violators of the Act move into the twenty-first century and beyond.
We do not hold, however, that any loss is compensable. The CFAA provides recovery for “damage” only if it results in a loss of at least $5,000. We agree with the court in In re DoubleClick Inc. Privacy Litigation, 154 F.Supp.2d 497 (S.D.N.Y. 2001), that Congress could not have intended other types of loss to support recovery unless that threshold were met. Indeed, the Senate Report explicitly states that “if the loss to the victim meets the required monetary threshold,” the victim is entitled to relief under the CFAA. S. Rep. 104-357, at 11. We therefore conclude that expenses of at least $5,000 resulting from a party‘s intrusion are “losses” for purposes of the “damage or loss” requirement of the CFAA.
IV. Conclusion
For the foregoing reasons, we agree with the district court that appellees will likely succeed on the merits of their CFAA claim under
Affirmed.
Notes
- Open an Excel spreadsheet. The spreadsheet initially contains EFTours gateway and destination city codes, which are available on the EFTours web site.
- Identify the first gateway and destination city codes [on the] Excel spreadsheet.
- Create a [website address] request for the EFTours tour prices page based on a combination of gateway and destination city. Example: show me all the prices for a London trip leaving JFK.
- View the requested web page which is retained in the random access memory of the requesting computer in the form of HTML [computer language] code. ***
- Search the HTML for the tour prices for each season, year, etc.
- Store the prices into the Excel spreadsheet.
- Identify the next gateway and city codes in the spreadsheet. Repeat steps 3-7 for all gateway and destination city combinations.
Copyright © 2000 EF Cultural Travel BV
EF Educational Tours is a member of the EF group of companies.
Questions? Please contact us.
Below is the information needed to log into EF‘s site as a tour leader. Please use this to gather competitor information from both a business and experience design perspective. We may also be able to glean knowledge of their technical abilities. As with all of our information, this is extremely confidential. Please do not share it with anyone.
