LIME CRUNCH INC. and NOW MARKETING SERVICES INC. v. CHRISTOPHER JOHANSEN
No. 20 C 5709
IN THE UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION
September 30, 2022
Judge Virginia M. Kendall
Case: 1:20-cv-05709 Document #: 43 Filed: 09/30/22 Page 1 of 12 PageID #:857
MEMORANDUM OPINION AND ORDER
At one point in time, Matthew Hanni and Defendant Christopher Johansen had a solid working relationship. Hanni had two web design companies and Johansen was a salesman for those companies and was paid on commission. For some reason, their working relationship ended on unfriendly terms and Hanni has filed a number of lawsuits against Johansen. In this most recent litigation, Plaintiffs, Lime Crunch, Inc. (“Lime Crunch”) and Now Marketing Services, Inc. (“Now Marketing”), sued Johansen for violating the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (“CAN-SPAM Act”),
BACKGROUND
Matthew Hanni owns both Plaintiff corporations, Lime Crunch, Inc. (“Lime Crunch”) and Now Marketing Services, Inc. (“Now Marketing”). (Dkt. 31 ¶ 1). Hanni operates the businesses from his personal residence and does not hold a degree in computer science or computer security.
Following Johansen‘s “less than amicable split”1 from Now Marketing, he sent the following email to a list of 102 contacts2 from his personal Gmail account:
Hi,
As you have probably heard I am no longer with Now Marketing Services, Inc. I wish them the best in their endeavors.
I am currently going out on my own so I can provide cutting edge digital marketing services and more to my clients and local business owners.
If you have time to meet in the next few weeks I would love to get together with you in person to discuss your current marketing goals and help you achieve those.
Committed to your Success,
Christopher Johansen.
(Id. ¶ 8; Dkt. 26-1 Ex. 1). Included amongst the recipients of this email were corporate email
Johansen‘s login credentials for the assigned email, cjohansen@nowms.com, were revoked after his split from Now Marketing. (Id. ¶ 11). As a result, his email stopped working on his personal laptop and cell phone. (Id.). Defendant claims he did not “go back into the Microsoft Outlook settings on his devices in order to disable the auto-connect features related to his former work email account. As Defendant now understands the facts, his old email thus continued to automatically ‘ping’ the Plaintiffs’ email server looking to connect every time Defendant opened his Microsoft Outlook program.” (Id. ¶ 12). Plaintiffs responded in their Rule 56.1 answers: “Disputed in part. Plaintiffs lack knowledge sufficient to form a belief as to what Defendant‘s understanding is.” (Dkt. 31 ¶ 12). Plaintiffs do admit the underlying substance of this claim in their response memorandum, however, stating one of the agreed upon facts is: “Defendant‘s phone or other devices attempted to access [Now Marketing‘s] email server thousands of times subsequent to the termination of his business relationship with the Company.” (Dkt. 30 at 3).
The Defendant requested from each Plaintiff “[a]ll receipts, proofs of payment invoices, payroll records, and other documents relating, or in any way supporting, [their] claim of financial damage or injury in [this case].” (Dkt. 31 ¶ 15; Dkt. 26 Ex. 2; Dkt. 26 Ex. 3). In response, Plaintiffs produced forty-three invoices to LimeCrunch from ‘CloudLinux’ for subscription purchases billed to matt@limecrunch.com, ranging from $1.40 per month to $45 per month.4 (Dkt. 31 ¶ 16; Dkt.
STANDARD OF REVIEW
Summary judgment is proper when “the pleadings, the discovery and disclosure materials on file, and any affidavits show that there is no genuine issue as to any material fact and that the movant is entitled to judgment as a matter of law.”
DISCUSSION
A. Count I: Violations of CAN-SPAM Act of 2003, 15 U.S.C. § 7704
Plaintiff Lime Crunch alleges in Count I that Defendant violated the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (“CAN-SPAM Act”).
The term “Internet access service” is defined in the CAN-SPAM Act as “a service that enables users to access content, information, electronic mail, or other services offered over the Internet, and may also include access to proprietary content, information, and other services as part of a package of services offered to consumers.”
Congress requires an IAS provider filing suit under the CAN-SPAM Act be “adversely affected” by a violation of
For support, Lime Crunch points to Johansen‘s admission that he sent multiple emails to Lime Crunch‘s server, including one that lacked the opt-out provisions and physical address required by the Act. (Dkt. 30). Lime Crunch argues that because the statutory language sets no minimum number of emails for liability, the Court should deny summary judgment and allow Plaintiffs to move forward with electronic discovery on how many emails Johansen sent. (Id.). Certainly,
In passing the CAN-SPAM Act, Congress intended “to limit enforcement actions to those best suited to detect, investigate, and, if appropriate, prosecute violations of the CAN-SPAM Act those well-equipped to efficiently and effectively pursue legal actions against persons engaged in unlawful practices and enforce federal law for the benefit of all consumers.” See Gordon, 575 F.3d at 1050. If Lime Crunch operates as an IAS provider, the corporation should be able to put forward evidence of a “pattern or practice” at this point in the litigation.
Lime Crunch alleges in the Complaint that the emails sent by Defendant “adversely affected Lime Crunch‘s server response time, led to higher bandwidth utilization, and forced the company to devote its limited human resources and labor to assess and mitigate the impact of these
The Ninth Circuit explained a harm under the CAN-SPAM Act should be “something beyond the mere annoyance of spam and greater than the negligible burdens typically borne by an IAS provider in the ordinary course of business. . . . We expect a legitimate service provider to secure adequate bandwidth and storage capacity and take reasonable precautions, such as implementing spam filters, as part of its normal operations.” Gordon, 575 F.3d at 1054; see also ASIS Internet Services v. Azoogle.com, Inc., 2009 WL 4841119, at *1 (9th Cir. Dec. 2, 2009) (“While Plaintiff argues that employee time was spent on spam-related issues, Plaintiff concedes that it has no records detailing employee time. Plaintiff also spent money on email filtering, though the cost of email filtering did not increase due to the emails at issue. Such ordinary filtering costs do not constitute a harm.”).
It is beyond common sense that an adversely affected IAS provider could not present evidence of the harm beyond mere allegations. This Court has before it no reports or data demonstrating harm to the computers or servers at issue nor specifics about an alleged redirection of human resources. Damage to customer confidence is clearly not the type of harm Congress intended to address in passing the CAN-SPAM Act. Hanni‘s claim that he only learned of the three “spam emails” in the Complaint when clients advised him of their receipt of the emails further
“To survive summary judgment, the non-moving party must show evidence sufficient to establish every element that is essential to its claim and for which it will bear the burden of proof at trial.” Life Plans, Inc. v. Security Life of Denver Ins. Co., 800 F.3d 343, 349 (7th Cir. 2015). “[T]he plain language of
Lime Crunch cannot survive summary judgment by simply arguing against Defendant‘s claims without providing evidence to the contrary. See Diedrich v. Ocwen Loan Servicing, LLC, 839 F.3d 583, 591 (7th Cir. 2016). Lime Crunch fails to provide sufficient evidence to support a
B. Counts II & III: Violations of the CFAA of 1986, 18 U.S.C. § 1030
Plaintiff Now Marketing brings Count II and Count III under the Computer Fraud and Abuse Act of 1986 (“CFAA”).
Congress designed and narrowly tailored the CFAA to computer crimes that rise to a level where a compelling federal interest exists. See In re DoubleClick Inc. Privacy Litigation, 154 F. Supp. 2d 497, 523–24, fn. 30 (S.D.N.Y. 2001) (citing 132 Cong. Rec. S14453 (daily ed. Oct. 1, 1986) (statement of co-sponsor Sen. Trible) (“This bill will assert Federal jurisdiction over computer crimes only in those cases in which there is a compelling Federal interest. This reflects my belief and the Judiciary Committee‘s belief that the States can and should handle most such crimes, and that Federal jurisdiction in this area should be asserted narrowly.”)); see also In re Dealer Management Systems Antitrust Litigation, 2019 WL 4166864 at *12 (N.D. Ill. Sept. 3, 2019).
- loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $5,000 in value;
- the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals;
- physical injury to any person;
- a threat to public health or safety;
- damage affecting a computer used by or for an entity of the United States Government in furtherance of the administration of justice, national defense, or national security.
The term “loss” is defined as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.”
Plaintiff‘s memorandum response offers only, “the Record consists of credible, specific evidence that Plaintiffs sustained damage or loss as a consequence of the conduct alleged in Counts II and III of the Complaint,” citing to three paragraphs in Hanni‘s declaration. In this portion of Hanni‘s declaration he claims:
20. These consistent brute force attacks on the nowms.com email server required me to dedicate—at NOWMS‘s expense—a conservative estimate of an additional 1.0 hour per week for the nearly three years that they persisted. The value of that additional labor alone, at my normal rate of $95 per hour, is equal to approximately $14,250.00.
29. Thus, it was necessary to dedicate approximately 2 hours weekly at a cost of $95 per hour to the analysis of server vulnerabilities and access logs, a practice which remains ongoing due to the continued—but now anonymously sourced—attacks on the server. Accordingly, the value of my labor devoted to the prevention of a crippling attack to my companies is equal to approximately $25,000 to date
30. I also made expenditures to upgrade to a hardened operating system ($540 annually), purchased additional security software and bulk IP lookup subscriptions (approximately $372 annually), and developed scripts to identify IP addresses from which attacks were originating ($200).
(Dkt. 31 Ex. 1 ¶¶ 20, 29–30).
Hanni‘s allegations made without any supporting evidence are entirely insufficient to survive summary judgment, the point in litigation where the non-moving party “must show evidence sufficient to establish every element that is essential to its claim and for which it will bear the burden of proof at trial.” Life Plans, Inc., 800 F.3d at 349. Now Marketing does not place into the record any invoices, time logs, or further details about the work that was supposedly conducted by Hanni amounting to the alleged costs. Furthermore, while Hanni disputes the pings were
CONCLUSION
For the foregoing reasons, Defendant‘s motion for summary judgment [25] is granted. Plaintiffs Lime Crunch and Now Marketing fails to establish the elements required for standing under the CFAA and CAN-SPAM Act.
Virginia M. Kendall
United States District Judge
Date: September 30, 2022
