HIQ LABS, INC., Plaintiff-Appellee, v. LINKEDIN CORPORATION, Defendant-Appellant.
No. 17-16783
UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
April 18, 2022
D.C. No. 3:17-cv-03301-EMC. On Remand from the United States Supreme Court. Argued and Submitted October 18, 2021 San Francisco, California. Before: J. Clifford Wallace and Marsha S. Berzon, Circuit Judges, and Terrence Berg, District Judge. Opinion by Judge Berzon.
SUMMARY**
Preliminary Injunction / Computer Fraud and Abuse Act
On remand from the United States Supreme Court, the panel affirmed the district court‘s order preliminarily enjoining LinkedIn Corp. from denying hiQ Labs, Inc., a data analytics company, access to publicly available member profiles on LinkedIn‘s professional networking website.
The panel previously affirmed the preliminary injunction. The Supreme Court granted certiorari, vacated the panel‘s judgment, and remanded for further consideration in light of Van Buren v. United States, 141 S. Ct. 1648 (2021). On remand, the panel again affirmed the preliminary injunction, concluding that Van Buren reinforced its determination that hiQ had raised serious questions about whether LinkedIn may invoke the Computer Fraud and Abuse Act (“CFAA”) to preempt hiQ‘s possibly meritorious tortious interference claim.
The panel held that a plaintiff seeking a preliminary injunction must establish that it is likely to succeed on the merits, that it is likely to suffer irreparable harm in the absence of preliminary relief, that the balance of equities tips in its favor, and that an injunction is in the public interest. The court uses a “sliding scale” approach to these factors, so that when the balance of hardships tips sharply in the plaintiff‘s favor, it need demonstrate only serious questions going to the merits. Applying this approach, the district court concluded that the balance of hardships tipped sharply in hiQ‘s favor and that hiQ raised serious questions on the merits.
The panel held that the district court did not abuse its discretion in concluding on the preliminary injunction record that hiQ currently had no viable way to remain in business other than using LinkedIn public profile data for its “Keeper” and “Skill Mapper” analytics services, and that hiQ therefore had demonstrated a likelihood of irreparable harm absent a preliminary injunction.
The panel concluded that the district court properly determined that the balance of hardships tipped sharply in hiQ‘s favor, when weighing the likelihood that hiQ would go out of business against LinkedIn‘s assertion that an injunction threatened its members’ privacy and therefore put at risk the goodwill that LinkedIn had developed with its members.
The panel concluded that hiQ showed a sufficient likelihood of establishing the elements of its claim for intentional interference with contract, and it raised a serious question on the merits of LinkedIn‘s affirmative justification defense. Further, hiQ raised serious questions about whether LinkedIn could invoke the CFAA to preempt hiQ‘s possibly meritorious tortious interference claim. The CFAA prohibits accessing a “protected computer” without authorization. The panel concluded that to scrape LinkedIn data, hiQ needed to access LinkedIn servers, which were “protected computers.” At issue was whether, once hiQ received LinkedIn‘s cease-and-desist letter, any further scraping and use of LinkedIn‘s data was “without authorization” within the meaning of the CFAA. The panel concluded that hiQ raised a serious question as to whether the CFAA “without authorization” concept is inapplicable where, as here, prior authorization is not generally required but a particular person—or bot—is refused access. The panel concluded that the reasoning of Van Buren reinforced its interpretation of the CFAA, although Van Buren did not directly address the CFAA‘s “without authorization” clause, but rather considered the statute‘s “exceeds authorized access” clause.
Finally, the panel concluded that the district court properly determined that, on balance, the public interest favored hiQ‘s position.
The panel affirmed the district court‘s determination that hiQ had established the elements required for a preliminary injunction and remanded for further proceedings.
COUNSEL
Donald B. Verrilli Jr. (argued), Chad I. Golder, Rosemarie T. Ring, and Jonathan S. Meltzer, Munger Tolles & Olson LLP, Washington, D.C.; Jonathan H. Blavin, Nicholas Fram, and Elia Herrera, Munger Tolles & Olson LLP, San Francisco, California; E. Joshua Rosenkranz, Orrick Herrington & Sutcliffe LLP, New York, New York; Eric A. Shumsky, Orrick Herrington & Sutcliffe LLP, Washington, D.C.; for Defendant-Appellant.
Renita Sharma (argued) and Richard Corey, Quinn Emmanuel Urquhart & Sullivan LLP, New York, New York; Terry Wit, Quinn Emmanuel Urquhart & Sullivan LLP, San Francisco, California; Aaron M. Panner, Gregory G. Rapawy, and T. Dietrich Hill, Kellogg Hansen Todd Figel & Frederick PLLC, Washington, D.C.; C. Brandon Wisoff, Deepak Gupta, Jeffrey G. Lau, and Rebecca H. Stephens, Farella Braun & Martell LLP, San Francisco, California; Laurence H. Tribe, Cambridge, Massachusetts; for Plaintiff-Appellee.
Nicholas J. Boyle, John S. Williams, and Eric J. Hamilton, Williams & Connolly LLP, Washington, D.C., for Amicus Curiae CoStar Group Inc.
Perry J. Viscounty, Latham & Watkins LLP, San Francisco, California; Gregory G. Garre, Latham & Watkins LLP, Washington, D.C.; for Amicus Curiae Craigslist Inc.
Alan J. Butler and Marc Rotenberg, Electronic Privacy Information Center, Washington, D.C., for Amicus Curiae Electronic Privacy Information Center (EPIC).
Mukund Rathi, Aaron Mackey, Kurt Opsahl, Jamie Williams, Corynne McSherry, Cindy Cohn, Nathan Cardozo, Electronic Frontier Foundation, San Francisco, California, for Amici Curiae Electronic Frontier Foundation, DuckDuckGo, and Internet Archive.
Thomas V. Christopher, Law Offices of Thomas V. Christopher, San Francisco, California, for Amicus Curiae 3taps Inc.
Kenneth L. Wilton and James M. Harris, Seyfarth Shaw LLP, Los Angeles, California; Carrie P. Price, Seyfarth Shaw LLP, San Francisco, California; for Amicus Curiae Scraping Hub Ltd.
Katie Townsend, Bruce D. Brown, Gabe Rottman, Grayson Clary, and Mailyn Fidler, Reporters Committee for Freedom of the Press, Washington, D.C., for Amici Curiae Reporters Committee for Freedom of the Press and 30 News Media Organizations.
OPINION
BERZON, Circuit Judge:
We first issued an opinion in this case in September 2019, addressing the question whether LinkedIn, the professional networking website, could prevent a competitor, hiQ, from collecting and using information that LinkedIn users had shared on their public profiles, available for viewing by anyone with a web browser. hiQ Labs, Inc. v. LinkedIn Corp., 938 F.3d 985 (9th Cir. 2019). HiQ, a data analytics company, had obtained a preliminary injunction forbidding LinkedIn from denying hiQ access to publicly available LinkedIn member profiles. At the preliminary injunction stage, we did not resolve the companies’ legal dispute definitively, nor did we address all the claims and defenses they had pleaded in the district court. Instead, we
The Supreme Court granted LinkedIn‘s petition for writ of certiorari, vacated the judgment, and remanded this case for further consideration in light of Van Buren v. United States, 141 S. Ct. 1648 (2021). LinkedIn Corp. v. hiQ Labs, Inc., 141 S. Ct. 2752 (2021). We ordered supplemental briefing and held oral argument on the effect of Van Buren on this appeal. Having concluded that Van Buren reinforces our determination that hiQ has raised serious questions about whether LinkedIn may invoke the Computer Fraud and Abuse Act (“CFAA”) to preempt hiQ‘s possibly meritorious tortious interference claim, we once again affirm the preliminary injunction.
I.
Founded in 2002, LinkedIn is a professional networking website with over 500 million members.1 Members post resumes and job listings and build professional “connections” with other members. LinkedIn specifically disclaims ownership of the information users post to their personal profiles: according to LinkedIn‘s User Agreement, members own the content and information they submit or post to LinkedIn and grant LinkedIn only a non-exclusive license to “use, copy, modify, distribute, publish, and process” that information.
LinkedIn allows its members to choose among various privacy settings. Members can specify which portions of their profile are visible to the general public (that is, to both LinkedIn members and nonmembers), and which portions are visible only to direct connections, to the member‘s “network” (consisting of LinkedIn members within three degrees of connectivity), or to all LinkedIn members.2 This
case deals only with profiles made visible to the general public.
LinkedIn also offers all members—whatever their profile privacy settings—a “Do Not Broadcast” option with respect to every change they make to their profiles. If a LinkedIn member selects this option, her connections will not be notified when she updates her profile information, although the updated information will still appear on her profile page (and thus be
LinkedIn has taken steps to protect the data on its website from what it perceives as misuse or misappropriation. The instructions in LinkedIn‘s “robots.txt” file—a text file used by website owners to communicate with search engine crawlers and other web robots—prohibit access to LinkedIn servers via automated bots, except that certain entities, like the Google search engine, have express permission from LinkedIn for bot access.3 LinkedIn also employs several technological systems to detect suspicious activity and restrict automated scraping.4 For example, LinkedIn‘s Quicksand system detects non-human activity indicative of scraping; its Sentinel system throttles (slows or limits) or even blocks activity from suspicious IP addresses;5 and its
Org Block system generates a list of known “bad” IP addresses serving as large-scale scrapers. In total, LinkedIn blocks approximately 95 million automated attempts to scrape data every day, and has restricted over 11 million accounts suspected of violating its User Agreement,6 including through scraping.
HiQ offers two such analytics. The first, Keeper, purports to identify employees at the greatest risk of being recruited away. According to hiQ, the product enables employers to offer career development opportunities, retention bonuses, or other perks to retain valuable employees. The second, Skill Mapper, summarizes employees’ skills in the aggregate. Among other things, the tool is supposed to help employers identify skill gaps in their
workforces so that they can offer internal training in those areas, promoting internal mobility and reducing the expense of external recruitment.
HiQ regularly organizes “Elevate” conferences, during which participants discuss hiQ‘s business model and share best practices in the people analytics field. LinkedIn representatives participated in Elevate conferences beginning in October 2015. At least ten LinkedIn representatives attended the conferences. LinkedIn employees have also spoken at Elevate conferences. In 2016, a LinkedIn employee was awarded the Elevate “Impact Award.” LinkedIn employees thus had an opportunity to learn about hiQ‘s products, including “that [one of] hiQ‘s product[s] used data from a variety of sources—internal and external—to predict employee attrition” and that hiQ “collected skills data from public professional profiles in order to provide hiQ‘s customers information about their employees’ skill sets.”
In recent years, LinkedIn has explored ways to capitalize on the vast amounts of data contained in LinkedIn profiles by marketing new products. In June 2017, LinkedIn‘s Chief Executive Officer (“CEO”), Jeff Weiner, appearing on CBS, explained that LinkedIn hoped to “leverage all this extraordinary data we‘ve been able to collect by virtue of having 500 million people join the site.” Weiner mentioned as possibilities providing employers with data-driven insights about what skills they will need to grow and where they can find employees with those skills. Since then, LinkedIn has announced a new product, Talent Insights,
which analyzes LinkedIn data to provide companies with such data-driven information.7
In May 2017, LinkedIn sent hiQ a cease-and-desist letter, asserting that hiQ was in violation of LinkedIn‘s User Agreement and demanding that hiQ stop accessing and copying data from LinkedIn‘s server. The letter stated that if hiQ accessed LinkedIn‘s data in the future, it would be violating state and federal law, including the CFAA, the Digital Millennium Copyright Act (“DMCA”),
also filed a request for a temporary restaining order, which the parties subsequently agreed to convert into a motion for a preliminary injunction.
The district court granted hiQ‘s motion. It ordered LinkedIn to withdraw its cease-and-desist letter, to remove any existing technical barriers to hiQ‘s access to public profiles, and to refrain from putting in place any legal or technical measures with the effect of blocking hiQ‘s access to public profiles. LinkedIn timely appealed.
II.
“A plaintiff seeking a preliminary injunction must establish that he is likely to succeed on the merits, that he is likely to suffer irreparable harm in the absence of preliminary relief, that the balance of equities tips in his favor, and that an injunction is in the public interest.” Winter v. Nat. Res. Def. Council, Inc., 555 U.S. 7, 20 (2008). All four elements must be satisfied. See, e.g., Am. Trucking Ass‘n v. City of Los Angeles, 559 F.3d 1046, 1057 (9th Cir. 2009). We use a “sliding scale” approach to these factors, according to which “a stronger showing of one element may offset a weaker showing of another.” Alliance for the Wild Rockies v. Cottrell, 632 F.3d 1127, 1131 (9th Cir. 2011). So, when the balance of hardships tips sharply in the plaintiff‘s favor, the plaintiff need demonstrate only “serious questions going to the merits.” Id. at 1135.
Applying that sliding scale approach, the district court granted hiQ a preliminary injunction, concluding that the balance of hardships tips sharply in hiQ‘s favor and that hiQ raised serious questions on the merits. We review the district court‘s decision to grant a preliminary injunction for abuse of discretion. The grant of a preliminary injunction constitutes an abuse of discretion if the district court‘s
evaluation or balancing of the pertinent factors is “illogical, implausible, or without support in the record.” Doe v. Kelly, 878 F.3d 710, 713 (9th Cir. 2017).
A. Irreparable Harm
We begin with the likelihood of irreparable injury to hiQ if preliminary relief were not granted.
“[M]onetary injury is not normally considered irreparable.” Los Angeles Mem‘l Coliseum Comm‘n v. Nat‘l Football League, 634 F.2d 1197, 1202 (9th Cir. 1980). Nonetheless, “[t]he threat of being driven out of business is sufficient to establish irreparable harm.” Am. Passage Media Corp. v. Cass Commc‘ns, Inc., 750 F.2d 1470, 1474 (9th Cir. 1985). As the Second Circuit has explained, “[t]he loss of . . . an ongoing business representing many years of effort and the livelihood of its . . . owners, constitutes irreparable harm. What plaintiff stands to lose cannot be fully compensated by subsequent monetary damages.” Roso Lino Beverage Distributors, Inc. v. Coca Cola Bottling Co. of New York, Inc., 749 F.2d 124, 125–26 (2d Cir. 1984) (per curiam). Thus, showing a threat of “extinction” is enough to establish irreparable harm, even when damages may be available and the amount of direct financial harm is ascertainable. Am. Passage Media Corp., 750 F.2d at 1474.
The district court found credible hiQ‘s assertion that the survival of its business is threatened absent a preliminary
According to hiQ‘s CEO, “hiQ‘s entire business depends on being able to access public LinkedIn member profiles,” as “there is no current viable alternative to LinkedIn‘s member database to obtain data for hiQ‘s Keeper and Skill
Mapper services.” Without access to LinkedIn public profile data, the CEO averred, hiQ will likely be forced to breach its existing contracts with clients such as eBay, Capital One, and GoDaddy, and to pass up pending deals with prospective clients. The harm hiQ faces absent a preliminary injunction is not purely hypothetical. HiQ was in the middle of a financing round when it received LinkedIn‘s cease-and-desist letter. The CEO reported that, in light of the uncertainty about the future viability of hiQ‘s business, that financing round stalled, and several employees left the company. If LinkedIn prevails, hiQ‘s CEO further asserted, hiQ would have to “lay off most if not all its employees, and shutter its operations.”
LinkedIn maintains that hiQ‘s business model does not depend on access to LinkedIn data. It insists that alternatives to LinkedIn data exist, and points in particular to the professional data some users post on Facebook. But hiQ‘s model depends on access to publicly available data from people who choose to share their information with the world. Facebook data, by contrast, is not generally accessible, see infra pp. 37, and therefore is not an equivalent alternative source of data.
LinkedIn also urges that even if there is no adequate alternative database, hiQ could collect its own data through employee surveys. But hiQ is a data analytics company, not a data collection company. Suggesting that hiQ could fundamentally change the nature of its business, not simply the manner in which it conducts its current business, is a recognition that hiQ‘s current business could not survive without access to LinkedIn public profile data. Creating a data collection system would undoubtedly require a considerable amount of time and expense. That hiQ could feasibly remain in business with no products to sell while
raising the required capital and devising and implementing an entirely new data collection system is at least highly dubious.
In short, the district court did not abuse its discretion in concluding on the preliminary injunction record that hiQ currently has no viable way to remain in business other than using LinkedIn public profile data for its Keeper and Skill Mapper services, and that HiQ therefore has demonstrated a likelihood of irreparable harm absent a preliminary injunction.
B. Balance of the Equities
Next, the district court “balance[d] the interests of all parties and weigh[ed] the damage to each in determining the balance of the equities.” CTIA - The Wireless Ass‘n v. City of Berkeley, Calif., 928 F.3d 832, 852 (9th Cir. 2019) (internal quotation marks and citation omitted). Again, it did not abuse its discretion in doing so.
On one side of the scale is the harm to hiQ just discussed: the likelihood that, without an injunction, it will go out of business. On the other side, LinkedIn asserts that the injunction threatens its members’ privacy and therefore puts at risk the goodwill LinkedIn has developed with its members. As the district court observed, “the fact that a user has set his profile to public does not imply that he wants any third parties to collect and use that data for all purposes.” LinkedIn points in particular to the more than 50 million members who have used the “Do Not Broadcast” feature to ensure that other users are not notified when the member
know they may be searching for a new job. An employer who learns that an employee may be planning to leave will not necessarily reward that employee with a retention bonus. Instead, the employer could decide to limit the employee‘s access to sensitive information or even to terminate the employee.
There is support in the record for the district court‘s connected conclusions that (1) LinkedIn‘s assertions have some merit; and (2) there are reasons to discount them to some extent. First, there is little evidence that LinkedIn users who choose to make their profiles public actually maintain an expectation of privacy with respect to the information that they post publicly, and it is doubtful that they do. LinkedIn‘s privacy policy clearly states that “[a]ny information you put on your profile and any content you post on LinkedIn may be seen by others” and instructs users not to “post or add personal data to your profile that you would not want to be public.”
Second, there is no evidence in the record to suggest that most people who select the “Do Not Broadcast” option do so to prevent their employers from being alerted to profile changes made in anticipation of a job search. As the district court stated, there are other reasons why users may choose that option—most notably, many users may simply wish to avoid sending their connections annoying notifications each time there is a profile change. In any event, employers can always directly consult the profiles of users who chose to make their profiles public to see if any recent changes have been made. Employees intent on keeping such information from their employers can do so by rejecting public exposure of their profiles and eliminating their employers as contacts.
Finally, LinkedIn‘s own actions undercut its argument that users have an expectation of privacy in public profiles.
LinkedIn‘s “Recruiter” product enables recruiters to “follow” prospects, get “alert[ed] when prospects make changes to their profiles,” and “use those [alerts] as signals to reach out at just the right moment,” without the prospect‘s knowledge.8 And subscribers to LinkedIn‘s “talent recruiting, marketing and sales solutions” can export data from members’ public profiles, such as “name, headline, current company, current title, and location.”
In short, even if some users retain some privacy interests in their information notwithstanding their decision to make their profiles public, we cannot, on the record before us, conclude that those interests—or more specifically, LinkedIn‘s interest in preventing hiQ from scraping those profiles—are significant enough to outweigh hiQ‘s interest in continuing its business, which depends on accessing, analyzing, and communicating information derived from public LinkedIn profiles.
Nor do the other harms asserted by LinkedIn tip the balance of harms with regard to preliminary relief. LinkedIn invokes an interest in preventing “free riders” from using profiles posted on its platform. But LinkedIn has no protected property interest in the data contributed by its users, as the users retain ownership over their profiles. And as to the publicly available profiles, the users quite evidently intend them to be accessed by others, including for commercial purposes—for example, by employers seeking to hire individuals
the public access option, albeit at a cost to the preferences of many users and, possibly, to its own bottom line.
We conclude that the district court‘s determination that the balance of hardships tips sharply in hiQ‘s favor is not “illogical, implausible, or without support in the record.” Kelly, 878 F.3d at 713.
C. Likelihood of Success
Because hiQ has established that the balance of hardships tips decidedly in its favor, the likelihood-of-success prong of the preliminary injunction inquiry focuses on whether hiQ has raised “serious questions going to the merits.” Alliance for the Wild Rockies, 632 F.3d at 1131. It has.
As usual, we consider only the claims and defenses that the parties press on appeal. We recognize that the companies have invoked additional claims and defenses in the district court, and we express no opinion as to whether any of those claims or defenses might ultimately prove meritorious. Thus, while hiQ advanced several affirmative claims in support of its request for preliminary injunctive relief, here we consider only whether hiQ has raised serious questions on the merits of its claims either for intentional interference with contract or unfair competition, under California‘s Unfair Competition Law,
Likewise, while LinkedIn has asserted that it has “claims under the Digital Millennium Copyright Act and under trespass and misappropriation doctrines,” it has chosen for present purposes to focus on a defense based on the CFAA, so that is the sole defense to hiQ‘s claims that we address here.
1. Tortious Interference with Contract
HiQ alleges that LinkedIn intentionally interfered with hiQ’s contracts with third parties. “The elements which a plaintiff must plead to state the cause of action for intentional interference with contractual relations are (1) a valid contract between plaintiff and a third party; (2) defendant’s knowledge of this contract; (3) defendant’s intentional acts designed to induce a breach or disruption of the contractual relationship; (4) actual breach or disruption of the contractual relationship; and (5) resulting damage.” Pac. Gas & Elec. Co. v. Bear Stearns & Co., 50 Cal. 3d 1118, 1126 (1990).9
HiQ has shown a sufficient likelihood of establishing each of these elements. First, LinkedIn does not contest hiQ’s evidence that contracts exist between hiQ and some customers, including eBay, Capital One, and GoDaddy.
Second, hiQ will likely be able to establish that LinkedIn knew of hiQ’s scraping
Third, LinkedIn’s threats to invoke the CFAA and implementation of technical measures selectively to ban hiQ bots could well constitute “intentional acts designed to induce a breach or disruption” of hiQ’s contractual relationships with third parties. Pac. Gas & Elec. Co., 50 Cal. 3d at 1126; cf. Winchester Mystery House, LLC v. Global Asylum, Inc., 210 Cal. App. 4th 579, 597 (2012) (indicating that “cease-and-desist letters . . . refer[ring] to a[] contractual or other economic relationship between plaintiff and any third party” could “establish . . . the . . . intent element[] of the interference claim[]”).
Fourth, the contractual relationships between hiQ and third parties have been disrupted and “now hang[] in the balance.” Without access to LinkedIn data, hiQ will likely be unable to deliver its services to its existing customers as promised. Last, hiQ is harmed by the disruption to its existing contracts and interference with its pending contracts. Without the revenue from sale of its products, hiQ will likely go out of business. See supra pp. 15–17.
LinkedIn does not specifically challenge hiQ’s ability to make out any of these elements of a tortious interference claim. Instead, LinkedIn maintains that it has a “legitimate business purpose” defense to any such claim. Cf. Quelimane Co. v. Stewart Title Guar. Co., 19 Cal. 4th 26, 57 (1998), as modified (Sept. 23, 1998). That contention is an affirmative justification defense for which LinkedIn bears the burden of proof. See id.
Under California law, a legitimate business purpose can indeed justify interference with contract, but not just any such purpose suffices. See id. at 55–56. Where a contractual relationship exists, the societal interest in “contractual stability is generally accepted as of greater importance than competitive freedom.” Imperial Ice Co. v. Rossier, 18 Cal. 2d 33, 36 (1941). Emphasizing the “distinction between claims for the tortious disruption of an existing contract and claims that a prospective contractual or economic relationship has been interfered with by the defendant,” the California Supreme Court instructs that we must “bring[] a greater solicitude to those relationships that have ripened into agreements.” Della Penna v. Toyota Motor Sales, U.S.A., Inc., 11 Cal. 4th 376, 392 (1995). Thus, interference with an existing contract is not justified simply because a competitor “seeks to further his own economic advantage at the expense of another.” Imperial Ice, 18 Cal. 2d at 36; see id. at 37 (“A party may not . . . under the guise of competition . . . induce
Accordingly, California courts apply a balancing test to determine whether the interests advanced by interference with contract outweigh the societal interest in contractual stability:
Whether an intentional interference by a third party is justifiable depends upon a balancing of the importance, social and private, of the objective advanced by the interference against the importance of the interest interfered with, considering all circumstances including the nature of the actor’s conduct and the relationship between the parties.
Herron v. State Farm Mut. Ins. Co., 56 Cal. 2d 202, 206 (1961). Considerations include whether “the means of interference involve no more than recognized trade practices,” Buxbom v. Smith, 23 Cal. 2d 535, 546 (1944), and whether the conduct is “within the realm of fair competition,” Inst. of Veterinary Pathology, Inc. v. Cal. Health Labs., Inc., 116 Cal. App. 3d 111, 127 (Cal. Ct. App. 1981). The “determinative question” is whether the business interest is pretextual or “asserted in good faith.” Richardson v. La Rancherita, 98 Cal. App. 3d 73, 81 (Cal. Ct. App. 1979).
Balancing the interest in contractual stability and the specific interests interfered with against the interests advanced by the interference, we agree with the district court that hiQ has at least raised a serious question on the merits of LinkedIn’s affirmative justification defense. First, hiQ has a strong commercial interest in fulfilling its contractual obligations to large clients like eBay and Capital One. Those companies benefit from hiQ’s ability to access, aggregate, and analyze data from LinkedIn profiles.
Second, LinkedIn’s means of interference is likely not a “recognized trade practice” as California courts have understood that term. “Recognized trade practices” include such activities as “advertising,” “price-cutting,” and “hir[ing] the employees of another for use in the hirer’s business,” Buxbom, 23 Cal. 2d at 546–47—all practices which may indirectly interfere with a competitor’s contracts but do not fundamentally undermine a competitor’s basic business model. LinkedIn’s proactive technical measures to selectively block hiQ’s access to the data on its site are not similar to trade practices previously recognized as acceptable justifications for contract interference.
Further, LinkedIn’s conduct may well not be “within the realm of fair competition.” Inst. of Veterinary Pathology, 116 Cal. App. 3d at 127. HiQ has raised serious questions about whether LinkedIn’s actions to ban hiQ’s bots were taken in furtherance of LinkedIn’s own plans to introduce a competing professional data analytics tool. There is evidence from which it can be inferred that LinkedIn knew about hiQ and its reliance on external data for several years before the present controversy. Its decision to send a cease-and-desist letter occurred within a month of the announcement by LinkedIn’s CEO that LinkedIn planned to leverage the data on its platform to create a new product for employers with some similarities to hiQ’s Skill Mapper product. If companies like LinkedIn, whose servers hold vast amounts of public data, are permitted selectively to ban only potential competitors from accessing and using that otherwise public data, the result—complete
Finally, LinkedIn’s asserted private business interests—“protecting its members’ data and the investment made in developing its platform” and “enforcing its User Agreements’ prohibitions on automated scraping”—are relatively weak. LinkedIn has only a non-exclusive license to the data shared on its platform, not an ownership interest. Its core business model—providing a platform to share professional information—does not require prohibiting hiQ’s use of that information, as evidenced by the fact that hiQ used LinkedIn data for some time before LinkedIn sent its cease-and-desist letter. As to its members’ interests in their data, for the reasons already explained, see supra pp. 17–20, we agree with the district court that members’ privacy expectations regarding information they have shared in their public profiles are “uncertain at best.” Further, there is evidence that LinkedIn has itself developed a data analytics tool similar to HiQ’s products, undermining LinkedIn’s claim that it has its members’ privacy interests in mind. Finally, LinkedIn has not explained how it can enforce its user agreement against hiQ now that its user status has been terminated.
For all these reasons, LinkedIn may well not be able to demonstrate a “legitimate business purpose” that could justify the intentional inducement of a contract breach, at least on the record now before us. We therefore conclude that hiQ has raised at least serious questions going to the merits of its tortious interference with contract claim. Because such a showing on the tortious interference claim is sufficient to support an injunction prohibiting LinkedIn from selectively blocking hiQ’s access to public member profiles, we do not reach hiQ’s unfair competition claim.11
2. Computer Fraud and Abuse Act (CFAA)
Our inquiry does not end, however, with the state law tortious interference claim. LinkedIn argues that even if hiQ can show a likelihood of success on any of its state law causes of action, all those causes of action are preempted by the CFAA,
The CFAA states that “[w]hoever . . . intentionally accesses a computer without authorization or exceeds authorized access,
The pivotal CFAA question here is whether once hiQ received LinkedIn’s cease-and-desist letter, any further scraping and use of LinkedIn’s data was “without authorization” within the meaning of the CFAA and thus a violation of the statute.
We have held in another context that the phrase “‘without authorization’ is a non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.”13 Nosal II, 844 F.3d at 1028. Nosal II involved an employee accessing without permission an employer’s private computer for which access permissions in the form of user accounts were required. Id. at 1028–29. Nosal II did not address whether access can be “without authorization” under the CFAA where, as here, prior authorization is not generally required, but a particular person—or bot—is refused access. HiQ’s position is that Nosal II is consistent with the conclusion that where access is open to the general public, the CFAA “without authorization” concept is inapplicable. At the very least, we conclude, hiQ has raised a serious question as to this issue.
First, the wording of the statute, forbidding “access[] . . . without authorization,”
Second, even if this interpretation is debatable, the legislative history of the statute confirms our understanding. “If [a] statute’s terms are ambiguous, we may use . . . legislative history[] and the statute’s overall purpose to illuminate Congress’s intent.” Jonah R. v. Carmona, 446 F.3d 1000, 1005 (9th Cir. 2006).
The CFAA was enacted to prevent intentional intrusion onto someone else’s computer—specifically, computer hacking. See United States v. Nosal (Nosal I), 676 F.3d 854, 858 (9th Cir. 2012) (citing S. Rep. No. 99-432, at 9 (1986) (Conf. Rep.)).
The 1984 House Report on the CFAA explicitly analogized the conduct prohibited by section 1030 to forced entry: “It is noteworthy that section 1030 deals with an ‘unauthorized access’ concept of computer fraud rather than the mere use of a computer. Thus, the conduct prohibited is analogous to that of ‘breaking and entering’ . . . .” H.R. Rep. No. 98-894, at 20 (1984); see also id. at 10 (describing the problem of “‘hackers’ who have been able to access (trespass into) both private and public computer systems”). Senator Jeremiah Denton similarly characterized the CFAA as a statute designed to prevent unlawful intrusion into otherwise inaccessible computers, observing that “[t]he bill makes it clear that unauthorized access to a Government computer is a trespass offense, as surely as if the offender had entered a restricted Government compound without proper authorization.”14 132 Cong. Rec. 27639 (1986) (emphasis added). And when considering amendments to the CFAA two years later, the House again linked computer intrusion to breaking and entering. See H.R. Rep. No. 99-612, at 5–6 (1986) (describing “the expanding group of electronic trespassers,” who trespass “just as much as if they broke a window and crawled into a home while the occupants were away”).
In recognizing that the CFAA is best understood as an anti-intrusion statute and not as a “misappropriation statute,” Nosal I, 676 F.3d at 857–58, we rejected the contract-based interpretation of the CFAA’s “without authorization” provision adopted by some of our sister circuits. Compare Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1067 (9th Cir. 2016), cert. denied, 138 S. Ct. 313 (2017) (“[A] violation of the terms of use of a website—without more—cannot establish liability under the CFAA.”); Nosal I, 676 F.3d at 862 (“We remain unpersuaded by the decisions of our sister circuits that interpret the CFAA broadly to cover violations of corporate computer use restrictions or violations of a duty of loyalty.”), with EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 583–84 (1st Cir. 2001) (holding that violations of a confidentiality agreement or other contractual restraints could give rise to a claim for unauthorized access under the CFAA); United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010) (holding that a defendant “exceeds authorized access” when violating policies governing authorized use of databases). Van Buren, interpreting the CFAA’s “exceeds
We therefore look to whether the conduct at issue is analogous to “breaking and entering.” H.R. Rep. No. 98-894, at 20. Significantly, the version of the CFAA initially enacted in 1984 was limited to a narrow range of computers—namely, those containing national security information or financial data and those operated by or on behalf of the government. See Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, § 2102, 98 Stat. 2190, 2190–91. None of the computers to which the CFAA initially applied were accessible to the general public; affirmative authorization of some kind was presumptively required.
When section 1030(a)(2)(C) was added in 1996 to extend the prohibition on unauthorized access to any “protected computer,” the Senate Judiciary Committee explained that the amendment was designed “to increase protection for the privacy and confidentiality of computer information.” S. Rep. No. 104-357, at 7 (emphasis added).15 The legislative history of section 1030 thus makes clear that the prohibition on unauthorized access is properly understood to apply only to private information—information delineated as private through use of a permission requirement of some sort. As one prominent commentator has put it, “an authentication requirement, such as a password gate, is needed to create the necessary barrier that divides open spaces from closed spaces on the Web.” Orin S. Kerr, Norms of Computer Trespass, 116 Colum. L. Rev. 1143, 1161 (2016). Moreover, elsewhere in the statute, password fraud is cited as a means by which a computer may be accessed without authorization, see
We therefore conclude that hiQ has raised a serious question as to whether the reference to access “without authorization” limits the scope of the statutory coverage to computers for which authorization or access permission, such as password authentication, is generally required. Put differently, the CFAA contemplates the existence of three kinds of computer systems: (1) computers for which access is open to the general public and permission
The reasoning of Van Buren reinforces our interpretation of the CFAA, although it did not directly address the statute’s “without authorization” clause. Van Buren held that a police sergeant did not violate the CFAA when he “ran a license-plate search in a law enforcement computer database in exchange for money.” 141 S. Ct. at 1652. Interpreting the “exceeds authorized access” clause of section 1030(a)(2), the Court held that the CFAA “covers those who obtain information from particular areas in the computer—such as files, folders, or databases—to which their computer access does not extend. It does not cover those who, like Van Buren, have improper motives for obtaining information that is otherwise available to them.” Id.
Van Buren found the “interplay between the ‘without authorization’ and ‘exceeds authorized access’ clauses of subsection (a)(2) . . . particularly probative.” Id. at 1658. “The ‘without authorization’ clause . . . protects computers themselves by targeting so-called outside hackers—those who ‘acces[s] a computer without any permission at all.’” Id. (quoting LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1133 (9th Cir. 2009)). The “‘exceeds authorized access’ clause . . . provide[s] complementary protection for certain information within computers . . . by targeting so-called inside hackers—those who access a computer with permission, but then ‘“exceed” the parameters of authorized access by entering an area of the computer to which [that] authorization does not extend.’” Id. (quoting United States v. Valle, 807 F.3d 508, 524 (2d Cir. 2015)). “[L]iability under both clauses stems from a gates-up-or-down inquiry—one either can or cannot access a computer system, and one either can or cannot access certain areas within the system.” Id. at 1658–59.
Van Buren’s “gates-up-or-down inquiry” is consistent with our interpretation of the CFAA as contemplating three categories of computer systems. See supra p. 33–34. Discussing the “without authorization” clause, Van Buren explained that a computer user who has “authorization” is one who “can . . . access a computer system,” 141 S. Ct. at 1658, where “access” means “the act of entering a computer ‘system itself,’” id. at 1657 (citation omitted). In other words, a user with “authorization” is not subject to “limitations on access,” whether those limitations are “code-based” or “contained in contracts or policies.” Id. at 1659 n.8. Van Buren stated that the CFAA’s password-trafficking provision, section 1030(a)(6), which also uses the word “authorization,” “contemplates a ‘specific type of authorization—that is, authentication,’ which turns on whether a user’s credentials allow him to proceed past a computer’s access gate, rather than on other, scope-based restrictions.” Id. at 1659 n.9 (quoting Patricia L. Bellia, A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act, 84 Geo. Wash. L. Rev. 1442, 1470 (2016)).
Van Buren’s distinction between computer users who “can or cannot access a computer system,” id. at 1658, suggests a
Additionally, neither of the cases LinkedIn principally relies upon casts doubt on our interpretation of the statute. LinkedIn first cites Nosal II, 844 F.3d 1024. As we have already stated, Nosal II held that a former employee who used current employees’ login credentials to access company computers and collect confidential information had acted “‘without authorization’ in violation of the CFAA.” 844 F.3d at 1038. The computer information the defendant accessed in Nosal II was thus plainly one which no one could access without authorization.
So too with regard to the system at issue in Power Ventures, 844 F.3d 1058, the other precedent upon which LinkedIn relies. In that case, Facebook sued Power Ventures, a social networking website that aggregated social networking information from multiple platforms, for accessing Facebook users’ data and using that data to send mass messages as part of a promotional campaign. Id. at 1062–63. After Facebook sent a cease-and-desist letter, Power Ventures continued to circumvent IP barriers and gain access to password-protected Facebook member profiles. Id. at 1063. We held that after receiving an individualized cease-and-desist letter, Power Ventures had accessed Facebook computers “without authorization” and was therefore liable under the CFAA. Id. at 1067–68. But we specifically recognized that “Facebook has tried to limit and control access to its website” as to the purposes for which Power Ventures sought to use it. Id. at 1063. Indeed, Facebook requires its users to register with a unique username and password, and Power Ventures required that Facebook users provide their Facebook username and password to access their Facebook data on Power Ventures’ platform. Facebook, Inc. v. Power Ventures, Inc., 844 F. Supp. 2d 1025, 1028 (N.D. Cal. 2012). While Power Ventures was gathering user data that was protected by Facebook’s username and password authentication system, the data hiQ was scraping was available to anyone with a web browser.
In sum, Nosal II and Power Ventures control situations in which authorization generally is required and has either never been given or has been revoked. As Power Ventures indicated, the two cases do not control the situation present here, in which information is “presumptively open to all comers.” Power Ventures, 844 F.3d at 1067 n.2. As to the computers at issue in those cases, the authorization gate was “down.”
Our understanding that the CFAA is premised on a distinction between information presumptively accessible to the general public and information for which authorization
Addressing the “without authorization” provision of the SCA, we have distinguished between public websites and non-public or “restricted” websites, such as websites that “are password-protected . . . or require the user to purchase access by entering a credit card number.” Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 875 (9th Cir. 2002); see also id. at 879 n.8. As we explained in Konop, in enacting the SCA, “Congress wanted to protect electronic communications that are configured to be private” and are “‘not intended to be available to the public.’” Id. at 875 (quoting S. Rep. No. 99-541, at 35–36 (1986)). The House Committee on the Judiciary stated, with respect to the section of the SCA at issue, section 2701, that “[a] person may reasonably conclude that a communication is readily accessible to the general public if the . . . means of access are widely known, and if a person does not, in the course of gaining access, encounter any warnings, encryptions, password requests, or other indicia of intended privacy.” H.R. Rep. No. 99-647, at 62 (1986). The Committee further explained that “electronic communications which the service provider attempts to keep confidential would be protected, while the statute would impose no liability for access to features configured to be readily accessible to the general public.” Id. at 63.
Both the legislative history of section 1030 of the CFAA and the legislative history of section 2701 of the SCA, with its similar “without authorization” provision, then, support the district court’s distinction between “private” computer networks and websites, protected by a password authentication system and “not visible to the public,” and websites that are accessible to the general public.
Finally, the rule of lenity favors our narrow interpretation of the “without authorization” provision in the CFAA. The statutory prohibition on unauthorized access applies both to civil actions and to criminal prosecutions—indeed, “§ 1030 is primarily a criminal statute.” LVRC Holdings, 581 F.3d at 1134. “Because we must interpret the statute consistently, whether we encounter its application in a criminal or noncriminal context, the rule of lenity applies.” Leocal v. Ashcroft, 543 U.S. 1, 11 n.8 (2004). As we explained in Nosal I, we therefore favor a narrow interpretation
For all these reasons, it appears that the CFAA’s prohibition on accessing a computer “without authorization” is violated when a person circumvents a computer’s generally applicable rules regarding access permissions, such as username and password requirements, to gain access to a computer. It is likely that when a computer network generally permits public access to its data, a user’s accessing that publicly available data will not constitute access without authorization under the CFAA. The data hiQ seeks to access is not owned by LinkedIn and has not been demarcated by LinkedIn as private using such an authorization system. HiQ has therefore raised serious questions about whether LinkedIn may invoke the CFAA to preempt hiQ’s possibly meritorious tortious interference claim.20
Entities that view themselves as victims of data scraping are not without resort, even if the CFAA does not apply: state law trespass to chattels claims may still be available.21 And other causes of action, such as copyright infringement, misappropriation, unjust enrichment, conversion, breach of contract, or breach of privacy, may also lie. See, e.g., Associated Press v. Meltwater U.S. Holdings, Inc., 931 F. Supp. 2d 537, 561 (S.D.N.Y. 2013)
D. Public Interest
Finally, we must consider the public interest in granting or denying the preliminary injunction. Whereas the balance of equities focuses on the parties, “[t]he public interest inquiry primarily addresses impact on non-parties rather than parties,” and takes into consideration “the public consequences in employing the extraordinary remedy of injunction.” Bernhardt v. Los Angeles Cnty., 339 F.3d 920, 931–32 (9th Cir. 2003) (citations omitted).
As the district court observed, each side asserts that its own position would benefit the public interest by maximizing the free flow of information on the Internet. HiQ points out that data scraping is a common method of gathering information, used by search engines, academic researchers, and many others. According to hiQ, letting established entities that already have accumulated large user data sets decide who can scrape that data from otherwise public websites gives those entities outsized control over how such data may be put to use.
For its part, LinkedIn argues that the preliminary injunction is against the public interest because it will invite malicious actors to access LinkedIn’s computers and attack its servers. As a result, the argument goes, LinkedIn and other companies with public websites will be forced to choose between leaving their servers open to such attacks or protecting their websites with passwords, thereby cutting them off from public view.
Although there are significant public interests on both sides, the district court properly determined that, on balance, the public interest favors hiQ’s position. We agree with the district court that giving companies like LinkedIn free rein to decide, on any basis, who can collect and use data—data that the companies do not own, that they otherwise make publicly available to viewers, and that the companies themselves collect and use—risks the possible creation of information monopolies that would disserve the public interest.
Internet companies and the public do have a substantial interest in thwarting denial-of-service attacks22 and blocking abusive users, identity thieves, and other ill-intentioned actors. But we do not view the district court’s injunction as opening the door to such malicious activity. The district court made clear that the injunction does not preclude LinkedIn from continuing to engage in “technological self-help” against bad actors—for example, by employing “anti-bot measures to prevent, e.g., harmful intrusions or attacks on its server.” Although an injunction preventing a company from securing even the public parts of its website from malicious actors would raise serious concerns, such concerns are not present here.23
The district court’s conclusion that the public interest favors granting the preliminary injunction was appropriate.
CONCLUSION
We AFFIRM the district court’s determination that hiQ has established the elements
