Lead Opinion
Holly Broome was sued civilly for hacking Lee Jennings’ Yahoo! e-mail account. The circuit court granted summary judgment in favor of Broome on all claims, including violation of the federal Stored Communications Act (SCA), 18 U.S.C. §§ 2701-12. The court of appeals reversed, finding that the emails she obtained from hacking Jennings’ account were in electronic storage and thus covered by the SCA. We reverse.
FACTUAL/PROCEDXJRAL BACKGROUND
The computer hacking at issue here emanated from a domestic dispute. After finding a card for flowers for another woman in her husband’s car, Gail Jennings confronted him. Jennings confessed he had fallen in love with someone else, and although he refused to divulge her name, he admitted the two had been corresponding via e-mail for some time. Gail confided this situation to her daughter-in-law, Holly Broome.
When Jennings discovered his e-mail account had been hacked, he filed suit against Gail, Broome, and Cooke, individually and as shareholder of B JR International Detective Agency, Inc., for invasion of privacy, conspiracy, and violations of the South Carolina Homeland Security Act, South Carolina Code Ann. § 17-80-135 (2010). He later amended his complaint to include an allegation that the defendants violated the SCA. Jennings also moved to add Neal as a defendant. The circuit court denied this motion and granted summary judgment in favor of the defendants on all claims, including the allegations under the SCA. Jennings appealed. The court of appeals affirmed the grant of summary judgment as to Gail, Cooke, and BJR. Jennings v. Jennings,
ISSUE PRESENTED
Did the court of appeals err in reversing the circuit court’s grant of summary judgment because the e-mails in question were not in “electronic storage” as defined by 18 U.S.C. § 2510?
LAW/ANALYSIS
In arguing the court of appeals erred by holding the e-mails were in electronic storage, Broome contends the court misunderstood the definition of electronic storage under the Act and incorrectly concluded the e-mails had been stored for the purpose of backup protection. We agree.
“Determining the proper interpretation of a statute is a question of law, and this Court reviews questions of law de novo.” Town of Summerville v. City of N. Charleston,
Under section 2701(a) of the SCA, anyone who:
(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or
*5 (2) intentionally exceeds an authorization to access that facility;
and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.
18 U.S.C. § 2701(a). This section thus proscribes the unauthorized accessing of an electronic communication while it is in “electronic storage.” The SCA defines “electronic storage” as “(A) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and (B) any storage of such communication by an electronic communication service for the purposes of backup protection of such communication.” 18 U.S.C. § 2510(17). For Jennings to succeed in his claim against Broome under the SCA, he must prove the e-mails she accessed were in electronic storage as defined in section 2510(17). His argument in this regard extends only to subsection (B) of the Act; Jennings has never argued that the e-mails in questions were in electronic storage pursuant to subsection (A).
The court of appeals agreed with Jennings and held the emails were in “electronic storage” because they were stored for backup protection pursuant to subsection (B). Broome argues this conclusion was based upon an improper interpretation of section 2510(17), asserting that the definition of “electronic storage” within the SCA requires that it must be both temporary and intermediate storage incident to transmission of the communication and storage for the purposes of backup protection. She therefore contends that an e-mail must meet both subsection (A) and subsection (B) to be covered by the SCA. We acknowledge that this reading is the interpretation espoused by the Department of Justice as the “traditional interpretation” of section 2510(17). However, it has been rejected by the majority of courts in favor of a construction that an e-mail can be in electronic storage if it meets either (A) or (B). See, e.g., Theofel v. Farey-Jones,
In finding the e-mails were stored for “purposes of backup protection” and thus subject to subsection (B), the court of appeals relied heavily on Theofel, a case from the United States Court of Appeals for the Ninth Circuit. In Theofel, Integrated Capital Associates (ICA) was involved in commercial litigation with Farey-Jones. Theofel,
Accordingly, we find these e-mails were not in electronic storage. We emphasize that although we reject the contention that Broome’s actions give rise to a claim under the SCA, this should in no way be read as condoning her behavior. Instead, we only hold that she is not liable under the SCA because the e-mails in question do not meet the definition of “electronic storage” under the Act.
CONCLUSION
Based on the foregoing, we reverse the court of appeals’ opinion and reinstate the circuit court’s order granting summary judgment in favor of Broome.
Notes
. Broome is married to Gail's son from a previous marriage.
. The definitions of section 2510 pertaining to the Wiretap Act are incorporated into the SCA. 18 U.S.C § 2711(1).
Concurrence Opinion
I concur in result, but write separately to express my concern with Justice Hearn’s adoption of the approach taken in United States v. Weaver,
Justice Hearn relies on the Merriam-Webster Dictionary to argue that the definition of “backup” requires that there must be more than one copy of the email. The exact definition of “backup” varies from dictionary to dictionary. See, e.g., Webster’s Third International Dictionary, Unabridged 120 (3rd ed.2002). Assuming for the sake of analysis that the definition of “backup” is “one that serves as a substitute or support,” as Justice Hearn contends, this definition would suggest that an email message on an ISP’s server could be stored for support in the event that the user needs to retrieve it. As such, even if there is no second copy, the email could still constitute “backup protection.”
Nevertheless, even if I could interpret “backup” in this matter, in a statute such as this, I am reluctant to read the word “backup” in isolation, but instead the phrase “backup protection” should be viewed in a statutory and historical context. As Professor Kerr explains:
An understanding of the structure of the SCA indicates that the backup provision of the definition of electronic storage, see id. § 2510(17)(B), exists only to ensure that the govern*9 ment cannot make an end-run around the privacy-protecting ECS rules by attempting to access backup copies of unopened e-mails made by the ISP for its administrative purposes. ISPs regularly generate backup copies of their servers in the event of a server crash or other problem, and they often store these copies for the long term. Section 2510(17)(B) provides that backup copies of unopened e-mails are protected by the ECS....
There are many statutory signals that support this reading. Several were raised by the United States as amicus and rejected by the Theofel court, see Theofel,359 F.3d at 1076-77 , but a host of other arguments remain. I think the most obvious statutory signal is the text of 18 U.S.C. § 2704, entitled “Backup Preservation.” See 18 U.S.C. § 2704 (2000). Section 2704 makes clear that the SCA uses the phrase “backup copy” in a very technical way to mean a copy made by the service provider for administrative purposes. See id. The statutory focus on backup copies in the SCA was likely inspired by the 1985 Office of Technology Assessment report that had helped inspire the passage of the SCA. See Office of Tech. Assessment, Federal Government Information Technology: Electronic Surveillance and Civil Liberties (1985). The report highlighted the special privacy threats raised by backup copies, which the report referred to as copies “[rjetained by the [ejlectronic [mjail [cjompany for [ajdministrative [pjurposes.” Id. at 50.
Orin Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, 72 Geo. Wash. L.Rev. 1208, 1217 n. 61 (2004); see also Pure Power Boot Camp v. Warrior Fitness Boot Camp,
Furthermore, I am concerned that Justice Hearn’s position on “backup protection” potentially leads to illogical results. Weaver, itself, concluded that the outcome would be different if a Hotmail user “opt[edj to connect an e-mail program, such as Microsoft Outlook, to his or her Hotmail account and
Instead, I advocate a rejection of Theofel entirely and the adoption of the “traditional interpretation” of the SCA, which tracks the statutory language and comports with legislative history. Prosecuting Computer Crimes, DOJML Comment 9-3.000, 5 Department of Justice Manual (Supp.2011-13) [hereinafter DOJML Comment 9-3.000]; see also Kerr, supra, at
(17) “electronic storage” means—
(A) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and
(B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication;
18 U.S.C. § 2510(17) (Supp.2011) (emphasis added).
I disagree with Justice Hearn’s position that an e-mail is covered under section 2701(a) of the SCA if it meets the criteria of “either subsection (A) or subsection (B).” (emphasis in original). Plainly read, the definition of electronic storage encompasses both subsections A and B. I do not rely on Broome’s over-analysis of the word “such” in the phrase “such communication” to reach this conclusion. Rather, I turn to the structure of the statutory text and also to the unambiguous use of the conjunctive “and.” Both subsections A and B are subsumed under section 17, which starts out with the phrase “ ‘electronic storage’ means — ,” suggesting that the definition of electronic storage encompasses both subsections A and B. Furthermore, subsections A and B are connected by the conjunctive “and” indicating that they must be read together. See Bruesewitz v. Wyeth LLC, 562 U.S. -,
Thus, in my view, electronic storage refers only to temporary storage, made in the course of transmission, by an ECS provider, and to backups of such intermediate communications. Under this interpretation, if an e-mail has been received by a recipient’s service provider but has not yet been opened by the recipient, it is in electronic storage. Steve Jackson Games, Inc. v. United States Secret Serv.,
In this case, the circuit court judge found that the e-mails were “received, opened and read by [Jennings].... ” Because the e-mails were already opened by Jennings when they were retrieved and printed out by Broome, they reached their final destination and fell outside the scope of the definition of electronic storage under the statute, which requires the emails to be in “temporary, intermediate storage ... incidental to the electronic transmission thereof.” 18 U.S.C. § 2510(17).
Much of the difficulty in applying the SCA to cases such as this arises because of the discrepancy between current tech
Electronic mail is a form of communication by which private correspondence is transmitted over public and private telephone lines. In its most common form, messages are typed into a computer terminal, and then transmitted over telephone lines to a recipient computer operated by an electronic mail company. If the intended addressee subscribes to the service, the message is stored by the company’s computer “mail box” until the subscriber calls the company to retrieve its mail, which is then routed over the telephone system to the recipient’s computer. If the addressee is not a subscriber to the service, the electronic mail company can put the message onto paper and then deposit it in the normal postal system.
S.Rep. No. 99-541, at 7 (1986). Viewing the statutory language of the SCA in this context, the traditional definition of electronic storage becomes more reasonable. The SCA is ill-fitted to address many modern day issues, but it is this Court’s duty to interpret, not legislate. Moreover, I agree with Justice Hearn that it is prudent to limit our analysis to the language before us and give the language its literal meaning. However, I believe doing so requires us to adopt the traditional interpretation of 18 U.S.C. § 2510(17) rather than rely on the reasoning advanced by United States v. Weaver.
. Theofel stated in dicta, "A remote computing service might be the only place a user stores his messages; in that case, the messages are not stored for backup purposes.”
Concurrence Opinion
I concur in result. I agree with Chief Justice Toal that “electronic storage” under the Stored Communications Act (SCA) refers to temporary storage of communications during the course of transmission, 18 U.S.C. § 2510(17)(A), and to backups of those communications, § 2510(17)(B). However, I view these two types of storage as necessarily distinct from one another: one is temporary and incidental to transmission; the other is a secondary copy created for backup purposes by the service provider.
. The "backup” covered by subsection (B) is a copy made by the service provider to back up its own servers. It does not include an original email that has been transmitted to the recipient and remains on the provider’s server after the recipient has opened or downloaded it. See Orin Ken, A User’s Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 Geo. Wash. L.Rev. 1208, 1217 n. 61 (2004), quoted by Chief Justice Toal, supra (noting the technical meaning of "backup copy” as used in the SCA); Powerex Corp. v. Reliant Energy Services, Inc.,
. Thus, I agree with Justice Hearn that we must interpret the language of subsection (B) and with her conclusion that the e-mails in this case were not protected.
