*551 ORDER
The plaintiffs’ motion for a preliminary injunction is denied without prejudice to renewal.
The parties were authorized to begin expedited discovery on or after October 13, 2008. The parties should provide the Court with a Scheduling Order by October 29, 2008.
The Court has reviewed the Report and Recommendation of Magistrate Judge Katz dated August 22, 2008. No objections have been filed and the time for objections has passed. Moreover, the Court finds that the Report and Recommendation is thorough and well founded and the Court therefore adopts it. Accordingly, the Court orders that the thirty-four of defendant Alexander Fell’s e-mails obtained by the plaintiffs be precluded from use in the litigation, but not for impeachment purposes should the defendants open the door. The plaintiffs are also directed to return or destroy all copies of Email 28, and so certify.
SO ORDERED.
Report and Recommendation
Plaintiffs bring this action seeking an injunction and damages, accusing Defendants of (1) stealing Plaintiffs’ business model, customers, and internal documents, (2) breaching employee fiduciary duties, and (3) infringing Plaintiffs’ trademarks, trade-dress, and copyrights. This case was referred to this Court for general pretrial management.
Currently before the Court is Defendants’ motion to preclude the use or disclosure of thirty-four of Defendant Alexander Fell’s (“Fell”) e-mails, obtained by Lauren Brenner (“Brenner”), the principal and owner of the Plaintiff corporations (“Plaintiffs”), and Fell’s fоrmer employer. Defendants also seek an order requiring the e-mails’ immediate return and attorneys’ fees and costs.
The parties have fully briefed the issues, and, on July 18, 2008, the Court heard oral argument on the motion. Although the preclusion of evidence as a discovery sanction might normally be a non-dispositive matter for the Court to decide as part of its general pretrial supervision of a case, in this case, because of the potentially dispos-itive nature of the instant motion and its evidentiary implications for matters before the District Court, the District Court has requested that this Court provide a Report and Recommendation containing findings of fact, an analysis of the legal issues, and a discussion of the range of possible remedies available to the Court.
As explained in greater detail below, the Court concludes that Brenner accessed Fell’s e-mails without authorization, in what would be a violation of the Stored Communications Act, 18 U.S.C. § 2707, had a cause of action been brought pursuant to that statute. The Court also concludes that, pursuant to its inherent equitable authority over the litigation process, the e-mails should be precluded, in part or in whole. Finally, the Court concludes *552 that one e-mail is protected by the attorney-client privilege and should be returned to Defendants.
BACKGROUND
Fell was hired by Brenner in August of 2005, and worked at Pure Power Boot Camp (“PPBC”), a рhysical fitness center, until March 16, 2008, when Brenner fired him. On April 1, 2008, Defendant Ruben Belliard (“Belliard”), who is now Fell’s business partner, and was also employed at PPBC, entered Brenner’s office when she was not there, stayed there for half an hour, called Brenner on her office telephone, and quit. 1 A few months before he left his employ at PPBC, Belliard entered Brenner’s office, again when she was not present, removed a copy of a restrictive covenant he had signed, and shredded it. (See Belliard Aff. ¶ 31.) Soon after Fell and Belliard left PPBC, they opened a competing fitness center, Warrior Fitness Boot Camp (“WFBC”), together with their girlfriends — Defendants Jennifer Lee (“Lee”) and Nancy Baynard (“Baynard”).
After Fell and Belliard were no longer working at PPBC, Brenner, on April 28, 2008, and for a week thereafter, accessed and printed e-mails from three of Fell’s personal accounts: “kappamarine@ hotmail.com” (“Hotmail account”), “kappamarine@gmail.com” (“Gmail account”), and “alex@warriorfitness bootcamp.com” (“WFBC account”). (See Brenner July 10 Aff. ¶ 22; see also Exhibit (“Ex.”) A, annexed to Declaration of Daniel Schnapp, Esq. (“Schnapp Deck”), dated July 1, 2008, E-mails 1-34; Transcript of Oral Argument, dated July 18, 2008 (“Tr.”), at 14-15.) 2
Brenner states that she was able to access Fell’s Hotmail account because he left his username and password information stored on PPBC’s computers, such that, when the Hotmail website was accessed, the username and password fields were automatically populated, (See Brenner July 10 Aff. ¶ 13.) She also alleges that Fell gave his username and password to another PPBC employee, Elizabeth Lorenzi, so that she could check on an Ebay sale he was conducting. (See Affidavit of Elizabeth Lorenzi, dated July 10, 2008 (“Lorenzi Aff.”), ¶¶3, 6.) Plaintiffs allege, and Fell does not deny, that Fell accessed his Hotmail account while at work at PPBC, which is how his username and password came to be stored on the company’s computers. At oral argument, Plaintiffs admitted that Brenner was able to access Fell’s Gmail account because the username and password for the Gmail account were sent to Fell’s Hotmail account, which Brenner accessed. (See Tr. at 17.) Brenner also explained that she was able to access Fell’s WFBC account by making a “lucky guess” at his password, which turned out to be the same password he used for his other accounts. (See id. at 15-16.)
Plaintiffs have an Employee Handbook which explicitly addresses e-mail access on company computers. It states:
“e-mail users have no right of personal privacy in any matter stored in, created on, received from, or sent through or over the system. This includes the use of personal e-mail accounts on Company equipment. The Company, in its discretion as owner of the E-Mail system, reserves the right to review, monitor,, access, retrieve, *553 and delete any matter stored in, created on, received from, or sent through the system, for any reason, without the permission of any system user, and without notice.”
(Ex. A, annexed to Supplemental Affidavit of Lauren Brenner, dated June 6, 2008 (“Brenner June 6 Aff.”) (emphasis added).) An additional part of the policy states: “Internet access shall not be utilized for shopping or for conducting other transactions or personal business matters.” (Id.) Plaintiffs have not conducted a forensic evaluation of the company computers to determine what e-mails Fell actually received, sent through, read, or accessed from the company’s computers. (See Tr. at 22,)
E-mails 1-26 and 28, were obtained from Fell’s Hotmail account; of those, E-mails 1-13 and 16 are dated prior to March 16, 2008, the date Fell stopped working at PPBC, E-mails 27, 29-31, 33, and 34 were obtained from Fell’s Gmail account. Email 32 was obtained from Fell’s e-mail account at WFBC.
Fell states in his affidavit that all of the e-mails were drafted or received on his own home computer. (See Affidavit of Alex Fell, dated July 1, 2008 (“Fell Aff.”), ¶ 5.) Fell denies that he ever gave his Hotmail information to anyone at PPBC. (See id. ¶ 4.) Fell does not deny, however, that he may have viewed some of his emails on PPBC’s computers while he was working there.
While it is not possible to determine from the submissions when the e-mails were read, they do indicate the date and time they were sent. E-mails sent by Fell indicate that they were sent at all times during the day, on various days of the week. For example, E-mail 4 shows that Fell sent a message on Monday, February 11, 2008 at 3:09 p.m. in the afternoon. Email 6 was sent on Wednesday, February 20, 2008 at 2:37 p.m. On Thursday, February 28, 2008, Fell sent E-mail 9 at 3:35 in the morning. E-mail 16 wаs sent the day before Fell was fired, Saturday, March 15, 2008 at 5:06 p.m. Each of these e-mails relates to, or discusses his efforts to set up his competing business — WFBC. 3
Plaintiffs have relied heavily upon the emails and have considered them critical to their case. The e-mails provide a detailed picture of Fell’s and Belliard’s efforts to set up WFBC before they left PPBC, the work that Lee and Baynard did to support those efforts — including recruiting PPBC clients for WFBC while they themselves were still clients of PPBC, and the fallout after Fell and Belliard left PPBC. For example, E-mail 29 is a candid admission that Belliard shredded his non-compete contract with PPBC, a fact Defendants attempted to avoid revealing during prior state court proceedings. (See Ex. B annexed'to Declaration of Daniel Schnapp, dated July 3, 2008, transcript of proceedings before Hon. Helen Freedman, New York Supreme Court, dated May 8, 2008 (“NY Tr.”), at 28.) E-mail 21 shows a dramatic expansion of WFBC’s customer list, and includes a large number of former PPBC clients and their e-mail addresses, which Plaintiffs rely upon to show that Belliard stole PPBC’s client list. (See Declaration of Richard Herzfeld, Esq., dated July 11, 2008, ¶ 25.)
Some of the e-mails were sent to, or received from, Defendants’ attorneys. (See E-mails 12, 13, 14, 28.) 4 E-mail 13 *554 was sent from a legal assistant at Fox Rothschild, Defendants’ counsel, attaching an IRS document containing WFBC’s employer ID number. E-mail 14, from the same paralegal, attached WFBC’s Articles of Organization, аnd informed Fell that they were filed with the State of New York. E-mail 28 is from an attorney at Fox Rothschild, and appears to have been printed from Fell’s “sent” file; it is part of an e-mail chain consisting of back-and-forth e-mails from the same Fox Rothschild attorney, and contains advice about how to handle telephone calls from Brenner.
When Plaintiffs first filed suit seeking a temporary restraining order and preliminary injunction in state court, they used the challenged e-mails as exhibits. However, at the time the e-mails were provided to Defendants, the bottom part of the page, which shows when an e-mail was printed, was obscured or removed. (See all e-mails in Ex. A.) Defendants allege that this amounts to spoliation of evidence. In response, during oral argument, Plaintiffs stated that they had the original copies of the e-mails, showing when they were printed, and agreed to provide unredacted copies to Defendants. (See Tr. at 33-34.)
DISCUSSION
Defendants seek the preclusion and return of Fell’s e-mails, claiming that Brenner violated the Electronic Communications Privacy Act, 18 U.S.C. § 2510 (“ECPA”), the Stored Communications Act, 18 U.S.C. § 2707 (“SCA”), and New York Penal Law § 250.05, when she accessed Fell’s e-mail accounts. Defendants also argue that some e-mails are protected by attorney-client privilege. Finally, Defendants argue that Plaintiffs’ production of the e-mails with the dates on which they were printed obscured, amounts to spoliatiоn of evidence, further justifying preclusion.
Plaintiffs argue that the ECPA and New York Penal Law do not apply, and that, in any event, Fell gave implied consent which authorized Brenner’s access. Plaintiffs also argue that the crime-fraud exception to confidentiality should apply not only to any e-mails covered by the attorney-client privilege, but to all the e-mails accessed by Brenner. Finally, Plaintiffs argue that the redaction of the printing dates does not constitute sanctionable spoliation.
It is important to note from the outset, that this is not a situation in which an employer is attempting to use e-mails obtained from the employer’s own computers or systems. Rather, the e-mails at issue here were stored and accessed directly from accounts maintained by outside electronic communication service providers. Furthermore, Defendants have not directly asserted any claims under the statutes they allege Brenner violated, and instead, appeal only to the Court’s inherent equitable authority to preclude evidence wrongfully obtained, outside of the litigation process, from being used in the litigation. Thus, while Defendants invoke federal and state law, those laws are invoked solely for the Court to consider as part of the process of weighing the competing equitable considerations raised by the conduct of both sides to this dispute.
I. The Statutes
All three of thе statutes Defendants rely upon are criminal statutes that also provide relief to aggrieved parties in civil causes of action. Of the three statutes, however, only the Stored Communications Act is applicable.
*555 A. The Stored Communications Act
The Stored Communications Act, 18 U.S.C. § 2701, et seq. (“SCA”), part of the Wiretap Act, provides in part:
(a) Offense. — Except as provided in subsection (c) of this section whoever—
(1) intentionally accesses without authorization a facility through lohich an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.
18 U.S.C.A. § 2701 (emphasis added). The Act “aims to prevent hackers from obtaining, altering or destroying certain stored electronic communications.”
In re Doubleclick Inc. Privacy Litigation,
“Electronic storage,” defined in an earlier part of the Wiretap Act is: “(A) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and (B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication ....” 18 U.S.C. §§ 2510(17), 2711(1) (definitions of Wiretap Act applicable to Stored Communications Act).
The majority of courts which have addressed the issue have determined that email stored on an electronic communication service provider’s systems after it has been delivered, as opposed to e-mail stored on a personal computer, is a stored communication subject to the SCA.
See United States v. Councilman,
In a case analogous to this one,
Bailey v. Bailey,
No. 07 Civ. 11672,
In this case, Brenner obtained Fell’s username and pаssword to his Hotmail account because he left that information stored on Plaintiffs’ computers. She then used that information to go into his Hot-mail account, and read and printed his emails. Some of those e-mails may have been read by Fell while he was at work, but there is no evidence indicating which *556 e-mails he may have viewed on Plaintiffs’ computers, and there is no evidence that the e-mails were downloaded onto PPBC’s computers. At most, only e-mails dated prior to his last day of work could have been viewed by him and thus potentially stored on the company’s systems.
In any event, Brenner did not use an examination of PPBC’s computer’s memory to determine what Fell accessed at work. Instead, she logged directly onto Microsoft’s Hotmail system where the emails were stored, and viewed and printed them directly off of Hotmail’s system. She accessed Fell’s other accounts in the same manner, and there is no evidence indicating that Fell accessed his Gmail or WFBC accounts at any time while he worked at PPBC. By Plaintiffs’ own admission, Brenner obtained the username and password for the Gmail account from Fell’s Hotmail account, and made a “lucky guess” that Fell would use the same password for all three accounts, including his WFBC account.
Thus, Brenner accessed three separate electronic communication services, and she obtained Fell’s e-mails while they were in storage on those service providers’ systems. Either of those actions, if done without authorization, would be a violation of the SCA.
See Wyatt Technology Corp. v. Smithson,
No. CV 05-1309(DT),
B. The Electronic Communications Privacy Act
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510-2511 (“ECPA”), creates criminal sanctions and a civil cause of action against persons who “intercept” electronic communications.
5
In the context of unauthorized access to email, the question that courts have struggled with is determining whether one can “intercept” an e-mail that has already been delivered. The Second Circuit has not directly addressed this question, but has discussed the issue in at least one case.
See Hall,
In
Hall,
the Second Circuit held that the ECPA was applicable to the e-mails at issue because “the case involve[d] the
continued receipt
of e-mail messages rather than the acquisition of
previously stored
electronic communication.”
Hall is itself factually distinguishable from this case. Hall involved the contin *557 ued and contemporaneous acquisition of emails as part of the ordinary course of the defendant’s business — which was the internet communication service provider for the e-mails in question. See id. Here, PPBC is not an internet communications provider, and Brenner did not access the e-mails on a continuous basis, contemporaneous with their transmission. Rather, by the time Brenner viewed the e-mails, they had been delivered to Fell’s accounts, and may have already been viewed by him; thus, they were “previously stored electronic communications” — precisely the situation which Hall relied upon to distinguish the decisions the defendants relied upon in that case. See id.
Other courts which have considered the question of whether accessing an electronic communication that has already been delivered is “intercepted,” have found that the ECPA does not apply.
See Fraser,
As the court in
Bailey
explained: “The general reasoning behind these decisions is that based on the statutory definition and distinction between ‘wire communication’ and ‘electronic communication,’ the latter of which conspicuously does not include electronic storage, Congress intended for electronic communications in storage to be handled solely by the Stored Communications Act.”
Bailey,
Defendants concede that the ECPA has a requirement of contemporaneous interception. (See Tr. at 12.) Nonetheless, Defendants suggest that Brenner’s access to Fell’s e-mail was “contemporaneous” if it occurred during some undefined, short period of time after the e-mail had been delivered. (See Tr. at 12-13.) However, they have not provided any authority for that proposition, nor have they suggested how long a “contemporaneous time frame” would be. (Id.) In any event, there is no evidence of when Brenner accessed Fell’s e-mails, but its clear that the majority of the e-mails were sent or received prior to April 28, 2008, the earliest date that Brenner admits that she accessed and printed them. Additionally, there is no evidence that the later e-mails were intercepted at the same time that they were delivered. Rather, the evidence indicates that Brenner periodically accessed Fell’s e-mail accounts and printed e-mails after they had been delivered.
Applying the definition of “intercept” accepted by the majority of courts to have examined the issue, the Court concludes that Brenner did not access and print
*558
Fell’s e-mails contemporaneous with their transmission.
See Fraser,
C. New York Eavesdropping and Civil Procedure Laws
Defendants argue that Brenner also violated New York’s eavesdropping law, and, pursuant to a New York procedural rule, Fell’s e-mails should be precluded. New York Penal Law § 250.05 makes it a crime for a person to “unlawfully engage in wiretapping, ... or intercepting or accessing [an] electronic communication.” N.Y. Penal Law § 250.05 (McKinney 2008). New York Civil Practice Law and Rule § 4506 (“CPLR § 4506”) states:
“The contents of any overheard or recorded communication, conversation or discussion, or evidence derived therefrom, which has been obtained by conduct constituting the crime of eavesdropping, as defined by section 250.05 of the penal law, may not be received in evidence in any trial, hearing or proceeding before any court .... ”
N.Y. C.P.L.R. § 4506 (Consol.2008).
If a party to a civil action seeks preclusion pursuant to § 4506, it must bring a motion “before a justice of the supreme court-” Id. at § 4506(4). In contrast to the federal laws, New York’s rule does not provide a separate civil cause of action, but, rather, is only a vehicle through which evidence may be excluded in an underlying case. See id. It also does not provide for damages, attorneys’ fees, costs, or any remedy other than exclusion of the evidence. See id.
There is a notable dearth of state law construing CPLR § 4506. Defendants have not cited, and the Court has not found, any published cases applying CPLR § 4506 to unauthorized access to e-mail. On its face, however, the statute does not appear to apply in this situation. The plain language of the statute seems to limit its application to the contents of an “overheard or recorded communication.” CPLR § 4506. Furthermore an aggrieved person is defined as one whose “communication, conversation or discussion was unlawfully overheard or recorded.” Id. at § 4506(3)(a). In addition, the statute only makes reference to “telephonic or telegraphic communicationfs],” not electronic communications. Id. at § 4506(2)(a). This language seems to limit the application of the statute to communications obtained aurally, rather than to electronic communications such as e-mail. 6
Furthermore, neither party has briefed the fundamental and more complex issue of whether CPLR § 4506, a rule governing the exclusion of evidence in New York state courts, ought to be applied by this Court pursuant to
Erie R. Co. v. Tompkins,
Ultimately, a determination of the meaning of CPLR § 4506 is unnecessary, and better left to the New York state courts. The Court could preclude use of the emails pursuant to the SCA or its inherent authority, without applying CPLR § 4506. Thus, there is no need to resolve the issues *559 of whether CPLR § 4506 is applicable to this action and, if so, whether it mandates the preclusion of the e-mails.
D. Authorization
Accessing and obtaining e-mails directly from an electronic communication service provider is a violation of the SCA if done without authorization. Having determined that the SCA is applicable to Brenner’s conduct, she therefore may not have violated the SCA if she was authorized to access Fell’s e-mail accounts.
Plaintiffs argue that Brenner was authorized to view and print Fell’s e-mails, and assert two theories in support of this position. First, Plaintiffs claim that PPBC’s e-mail policy put Fell on nоtice that his e-mails could be viewed by Brenner, and thus he had no expectation of privacy in his Hotmail account. Second, Plaintiffs argue that even if he had an expectation of privacy, Fell, by leaving his username and password on PPBC’s computers, gave Brenner implied consent to access his accounts.
Defendants respond by denying that Fell gave PPBC, or any of its agents or employees, authorization to access his accounts, and specifically deny that Fell gave his username and password to Brenner’s assistant. Defendants also deny that PPBC had its e-mail policy in place during Fell’s employment, and suggest that it is a recent creation by Brenner. (See Tr. at 4-5.) In any event, they argue that it does not cover e-mails sent after Fell left PPBC’s employ.
Brenner claims Fell had no expectation of privacy in his e-mails and that Fell gave implied consent to unlimited access to all of Fell’s personal e-mail accounts, with no time constraints (not even for the period after Fell’s employment at PPBC ended), based on her assertion that Fell accessed his personal Hotmail account, at least once, on Plaintiffs’ computer. These arguments have no sound basis in fact, law, or logic.
As an initial matter, Plaintiffs’ position is not supported by PPBC’s policy. PPBC’s e-mail policy — the basis of Plaintiffs’ consent defense — -is, by its own terms, limited to “Company equipment.” The reservаtion of rights is explicitly limited to “any matter stored in, created on, received from, or sent through [PPBC’s] system.” 8 Therefore, it could not apply to e-mails on systems maintained by outside entities such as Microsoft or Google. In addition, there is no evidence that the emails in issue were created on, sent through, or received from PPBC’s computers. Moreover, Plaintiffs’ position makes no distinction between the Hotmail account Fell accessed while at work, and the other accounts, which by all appearances were never accessed by Fell at work, and may not even have existed until after he left PPBC’s employ.
Plaintiffs’ position-that Brenner was authorized to access Fell’s e-mails on his personal e-mail service providers’ systems through his implied consent — -also has no support in the law. To understand the basis of Plaintiffs’ argument, and why it has no legal support, it is important to first understand the framework within which the typical employee e-mail case usually arises. Courts have routinely found that employees have no reasonable expectation of privacy in their workplace computers,
*560
where the employer has a policy which clearly informs employees that company computers cannot be used for personal email activity, and that they will be monitored.
See United States v. Simons,
This is not, however, a case where an employee was using an employer’s computer or e-mail system, and then claimed that the e-mails contained on the employer’s computers are private. Here, the employee — Fell—did not store any of the communications which his former employer now seeks to use against him on the employer’s computers, servers, or systems; nor were they sent from or received on the company e-mail system or computer. These e-mails were located on, and accessed from, third-party communication service provider systems. There is not even an implication that Fell’s personal email accounts were used for PPBC work, or that PPBC paid or supported Fell’s maintenance of those accounts.
See, e.g., Rozell v. Ross-Hoist,
No. 05 Civ. 2936(JGK)(JCF),
Even in cases involving an employer’s search of an employee’s work computer, courts have held that, under certain circumstances, employees have a reasonable expectation of privacy in the contents of their work computer. For example, in
Leventhal v. Knapek,
In
Curto v. Medical World Communications,
No. 03 Civ. 6327 (DRH) (MLO),
And, in a recent case from the Ninth Circuit Court of Appeals, in which violations of both the SCA and the Fourth Amendment were alleged, that court held that a police officer had a reasonable expectation of privacy in text messages sent using a city-owned pager.
See Quon v. Arch Wireless,
Here, Fell had a subjective belief that his personal e-mail accounts, stored on third-party computer systems, protected (albeit ineffectively) by passwords, would be private. That expectation of privacy was also reasonable, as nothing in PPBC’s policy suggests that it could extend beyond Plaintiffs’ own systems, and beyond the employment relationship. Furthermore, there is no evidence that PPBC’s policy was clearly communicated to its employees, or that it was consistently enforced in a manner that would have alerted employees to the possibility that their private email accounts, such as Hotmail, could also be accessed and viewed by their employer.
Because Fell had a reasonable expectation of privacy in his e-mail accounts, Brenner could only be authorized to access those accounts if Fell had given consent. She argues that Fell gave her implied consent to search his e-mails because he left his login information stored on PPBC’s computers where it could be discovered and used by Brenner. The Court does not accept Plaintiffs’ argument.
There is no sound basis to argue that Fell, by inadvertently leaving his Hotmail password accessible, was thereby authorizing access to all of his Hotmail e-mails, no less the e-mails in his two other accounts. If he had left a key to his house on the front desk at PPBC, one could not reasonably argue that he was giving consent to whoever found the key, to use it to enter his house and rummage through his belongings. And, to take the analogy a step further, had the person rummaging through the belongings in Fell’s house found the key to Fell’s country house, could that be taken as authorization to search his country house. We think not. The Court rejects the notion that carelessness equals consent.
See Lipin v. Bender,
Implied consent, at a minimum, requires clear notice that one’s conduct may result in a search being conducted of areas which the person has been warned are subject to search.
Cf. United States v. Workman,
In this case, Fell only had notice that PPBC’s computers could be searсhed for evidence of personal e-mail use, not that his Hotmail, Gmail, or WFBC e-mail accounts would also be searched. He was also never given the opportunity to refuse Brenner any authorization to search his emails. At most, one could argue that Fell have consented to Brenner viewing his password. But he did not consent to her to using it. Absent clear knowledge of the extent of what could be searched, and the opportunity to refuse or withdraw his consent, the Court rejects Plaintiffs’ argument that Fell gave implied consent to Brenner to search his Hotmail account simply by leaving his password on her computer.
Even less sustainable is the proposition that correctly “guessing” a person’s password, as Brenner did, amounts to authorization to access all accounts which use that password. Were that the case, computer hackers across the country could escape liability for breaking into computer systems by correctly “guessing” the codes and passwords of their victims. This absurd result stands in direct conflict with the entire purpose of the SCA and basic principles of privacy.
See In re DoubleClick,
The Court is convinced that Fell accessed his Hotmail account at some point when he was working at PPBC, and left his username and password stored on PPBC’s computer. Otherwise, Brenner could not have obtained Fell’s password, thereby making it possible for her to acсess his Hotmail account. 9 Nonetheless, the Court concludes that Brenner’s access to Fell’s Hotmail account violated the SCA and Fell’s privacy. While Fell arguably “authorized” access to any e-mails which he viewed and saved on PPBC’s computers, Brenner was not authorized to access those e-mails directly from Fell’s Hotmail account, and was clearly not authorized to access e-mails from Fell’s Gmail and WFBC accounts.
II. Privilege and the Crime-Fraud Exception
Independent of whether the e-mails should be precluded because they were improperly secured, Defendants also assert that certain of these e-mails should be precluded, and they should be returned, *563 because they are subject to the attorney-client privilege.
Plaintiffs’ respond that the e-mails in question are not privileged communications. Plaintiffs also argue that Fell forfeited any right of privacy to all of his emails because those e-mails were in furtherance of what Plaintiffs describe as “civil and criminal misconduct.” (Plaintiffs’ Memorandum of Law in Opposition to the Motion to Preclude Use of E-mails (“Pis.’ Mem.”), at 9.) Thus, Plaintiffs invoke the crime-fraud exception to confidentiality, normally applicable to attorney-client privilege claims, and assert that Fell forfeited his right to privacy in all of his emails, including, but not limited to, e-mails covered by the attorney-client privilege.
The attorney-client privilege affords confidentiality to communications among clients and their attorneys, for the purрose of seeking and rendering an opinion on law or legal services, or assistance in some legal proceeding, so long as the communications were intended to be, and were in fact, kept confidential.
See United States v. Int’l Bhd. of Teamsters,
The attorney-client privilege is waived if the holder of the privilege voluntarily discloses or consents to disclosure of any significant part of the communication to a third party or stranger to the attorney-client relationship.
See In re Grand Jury Proceedings,
No. M-11-189 (LAP),
A. E-mails Protected by Attorney-Client Privilege
Defendant claims that E-mails 12,13,14, and 28 are protected by the attorney-client *564 privilege. E-mail 12, though referred to by the parties, was not provided with Defendants’ motion papers. Defendants’ counsel represents that it is an e-mail sent to Fell by a legal assistant at Fox Rothschild, the law firm representing Defendants. E-mail 13 was sent to Fell from a paralegal at Fox Rothschild, merely transmitting WFBC’s employer ID number; attached is correspondence from the IRS. Email 14, from the same paralegal, indicates that WFBC’s Articles of Organization were filed with the State of New York, and the Articles are attached. E-mail 28 is from an attorney at Fox Rothschild, and appears to be printed from Fell’s “sent” file because the first part of the e-mail is a message from Fell to the attorney, as the end of a chain of baek-and-forth e-mails from the same attorney. The e-mail contains advice about how to handle telephone calls from Brenner.
E-mails 13 and 14, sent to Fell from a paralegal at Fox Rothschild, are not communications seeking or rendering an opinion on law or legal services, and the information they contain is business information that is a matter of public record. The fact that the e-mails contain a warning indicating they contain “PRIVILEGED AND CONFIDENTIAL INFORMATION,” does not transform them from non-privileged communications into privileged communications.
See In re Grand Jury Proceedings,
Defendants have not met their burden of demonstrating that E-mail 12 should be protected by the attorney-client privilege. This e-mail has not been provided to the Court for review, and the description provided in Defendants’ memorandum of law is far too vague, and simply makes the conclusory assertion that it is subject to attorney-client privilege. Accordingly, the Court concludes that E-mail 12 is not privileged. See Fed.R.Civ.P. 26(b)(5)(A)(ii) (“the party must ... describe the nature of the documents, communications, ... and do so in a manner that ... will enable other parties to assess the claim”).
E-mail 28 is different. That e-mail is actually a series of communications, sent a month after Fell left PPBC, in which Fell, using his Hotmail account, sought advice from a Fox Rothschild attorney about how to handle telephone calls from Brenner. The attorney responds by providing advice and seeking additional information. Fell then responds with the additional information, and the attorney again provides specific legal advice. The communication ends with Fell thanking the attorney for the advice.
The Court concludes that this e-mail is protected by attorney-client privilege. It was clеarly conveying information and legal advice, as well as the attorney’s thoughts and impressions about the strengths of Fell’s, and the other Defendants’, legal position. There is some question, however, about the measures Fell took to keep the communications confidential, and whether it was objectively reasonable for him to expect that his communications would be kept private.
On the one hand, according to his affidavit, Fell was using his own personal home computer to communicate with his attorney on a private e-mail account. It is generally accepted that lawyers and clients may communicate confidential information through unencrypted e-mail and reasonably maintain an expectation that the communications are private and confidential.
See In re Asia Global Crossing,
On the other hand, Fell left his Hotmail acсount vulnerable to the prying eyes of other parties by leaving his password stored on PPBC’s computer, and possibly by giving his login and password information to a PPBC employee.
Nonetheless, the Court has already concluded above that Fell had a reasonable subjective and objective belief that his communications would be kept confidential — and this includes his communications with his attorney. Even if Fell was fully aware of Plaintiffs’ policy concerning email, there is nothing in that policy that would have alerted him that, after he left Plaintiffs’ employ, Brenner might search his personal e-mails sent though his personal computer, and stored on his personal internet providers’ systems. Although Fell ultimately failed to properly protect his Hotmail password, there is no evidence that leaving it on PPBC’s computers was anything but inadvertent. Thus, it remained reasonable for him to expect that the contents of his personal e-mails, particularly those written and sent after his employment at PPBC had ended, would be kept private when he sought the advice of his attorney.
See In re County of Erie,
However, finding E-mail 28 is protected by the attorney-client privilege does not end the inquiry. Plaintiffs also argue that the privilege should be overcome based on the crime-fraud exception.
B. The Crime-Fraud Exception
The protections of the attorney-client privilege may be lost if the crime-fraud exception applies. “[T]he purpose of the crime-fraud exception to the attorney-client privilege [is] to assure that the ‘seal of secrecy,’ between lawyer and client does not extend to communications ‘made for the purpose of getting advice for the commission of a fraud’ or crime.”
United States v. Zolin,
“A party wishing to invoke the crime-fraud exception must demonstrate that there is a factual basis for a showing of probable cause to believe that a fraud or crime has been committed and that the communications in question were in furtherance of the fraud or crime.”
United States v. Jacobs,
*566 1. Application to E-mail 28
Having reviewed the contents of E-mail 28, the Court concludes that there is no evidence that it was sent in furtherance of a fraud or crime. The communication clearly addresses the legal issues which Fell and other Defendants face, and the advice is limited to addressing those legal issues, and indicates how Fell and other Defendants should respond to Brenner, with whom a legal conflict had arisen. The fact that the communication arose in the larger context of the Defendants’ attempt to set up a competing business, and discusses matters which might, in Plaintiffs’ eyes, constitute past criminal or fraudulent actions, does not transform this particular communication into one which furthers a crime or fraud. Accordingly, the Court concludes that E-mail 28 is protected by the attorney-client privilege, should be precluded from use by Plaintiffs, and should be returned to Defendants. Further, Plaintiffs should certify that all copies have been returned or destroyed. See Fed.R.Civ.P. 26(b)(5)(B).
2. Application to All E-mails
Plaintiffs’ crime-fraud exception argument is not limited, however, to only those e-mails for which attorney-client privilege was asserted. Plaintiffs also ask the Court to extend the principles underlying the crime-fraud exception to all of the e-mails in order to justify, and thereby excuse, Brenner’s wrongful access to Fell’s e-mail accounts. The Court declines to do so.
First, Plaintiffs’ have not presented any authority for extending the crime-fraud exception beyond the borders of its standard application to material covered by the attorney-client privilege. Second, had Brenner waited and acted appropriately, she would have had access to all of Fell’s emails, as well as all of the other Defendants’ e-mails, in the normal course of pretrial discovery. While Brenner’s fears that Defendants might attempt to conceal evidence cannot, in this case, be written off as unfounded paranoia, neither federal law nor the Federal Rules of Civil Procedure can be ignored simply because a party believes herself to be wronged by the actions of a dishonest person. If the Court were to adopt Plaintiffs’ suggestion, the crime-fraud exception would engulf all of the rules designed to ensure orderly and legal discovery of evidence, and could be invoked to justify any party’s resort to illegal, extra-judicial measures to secure evidence. Accordingly, the Court rejects Plaintiffs’ suggestion that the crime-fraud exception should excuse Brenner’s violations of the SCA.
III. Spoliation
Defendants’ final argument is that Plaintiffs’ initial production of the e-mails, with their print date obscured, amounts to spoliation of evidence, justifying sanctions, including preclusion. The Court does not agree,
‘“Spoliation is the destruction or significant alteration of evidence, or failure to preserve property for another’s use as evidence in pending or reasonably foreseeable litigation.’ ”
Allstate Ins. Co. v. Hamilton Beach/Proctor Silex, Inc.,
When the nature of the breach is non-production of evidence, as opposed to actual destruction or significant alteration, a district court “has broad discretion in fashioning an appropriate sanction”.
Residential Funding Corp.,
In this casе, the original e-mails were not destroyed or altered, and Defendants inspected them prior to making their final argument to the District Court, regarding the motion for a preliminary injunction. The date the e-mails were printed was made known to Defendants and the Court before the preliminary injunction hearing. Thus, at most, Defendants could argue that production was delayed. However, Defendants were not harmed by the delay, as they were not prevented from addressing the evidence or making any arguments related to the e-mails — including the current preclusion motion.
10
Cf. Residential Funding Corp.,
This is not to say that altering evidence, as Plaintiffs did, and delaying production of unaltered evidence until the day of the hearing, is excusable. However, Plaintiffs’ current counsel has represented that prior counsel provided the e-mails in the state court litigation, and was responsible for obscuring the dates. (See Tr. at 14-15.) His explanation for doing so is unknown. Accordingly, the Court finds that obscuring the dates, alone, does not amount to spoliation warranting the imposition of sanctions, let alone total preclusion.
IV. Remedies
A. Authority to Impose Sanctions
The SCA allows a person who is “aggrieved by any violation of this chapter” to obtain “such relief as may be appropriate” in a civil cause of action. 18 U.S.C. § 2707(a). The statute further provides in sub-section (b): “appropriate relief includes — (1) such preliminary and other equitable or declaratory rеlief as may be appropriate; (2) damages under subsection (c); and (3) a reasonable attorney’s fee and other litigation costs reasonably incurred.” Id. However, Defendants have not asserted a claim under the SCA; therefore, these provisions do not define or limit the sanctions the Court may impose in this case. Rather, Defendants appeal to the Court’s inherent equitable authority to *568 fashion appropriate sanctions for Brenner’s actions.
Federal courts do have “inherent ‘equitable powers of courts of law over their own process, to prevent abuses, oppression, and injustices,’ ”
International Prods. Corp. v. Koons,
In this situation, the sanctions available under the Federal Rules of Civil Procedure are not directly applicable, since Brenner’s misconduct occurred prior to the filing of the litigation and outside the normal discovery process, and did not violate any court orders.
See Fayemi v. Hambrecht and Quist, Inc.,
In another analogous case,
Herrera v. The Clipper Group, L.P.,
Nos. 97 Civ. 560 & 561(SAS),
B. Bad Faith
The Second Circuit “has required a finding of bad faith for the imposition of sanctions under the inherent power doctrine.”
Herrera,
But it is precisely this conduct which is the subject of this litigation and for which, if proved, Brenner has adequate legal remedies. Her actions — accessing of Fell’s Hotmail account, and using that access to open his Gmail account, and then resorting
*569
to “guessing” a password in order to gain access to Fell’s WFBC account — violated federal law and offend general notions of personal privacy. Furthermore, her use of that information in this litigation taints the judicial process. Thus, even though Brenner’s improper actions took place prior to the filing of the litigation, the fruits of Brenner’s improper conduct have been heavily relied upon by Plaintiffs in pleading and arguing the merits of their case. The Court may therefore fashion sanctions for Brenner’s wrongful access to Fell’s personal e-mail accounts.
See Herrera,
C. Sanctions
Defendants seek the complete preclusion of all of the e-mails, including their use in support of motions, at trial, and even for impeachment purposes. There are a variety of options, however, that are available to the Court.
On the mild side of the spectrum, the Court could preclude the use of e-mails obtained from Fell’s accounts, but not emails properly obtained in the course of discovery from other Defendants or parties — even if the permitted e-mails might, in actuality, be the same as those precluded. Although this would amount to imposing almost no sanction, it recognizes the fact that the evidence would be otherwise discoverable. 11
However, the notion that the evidence would be otherwise discoverable also cuts in the other direction. Had Brenner allowed the litigation process to move forward, and not violated federal law to bypass the rules of discovery, she could have properly obtained the e-mails in question. Moreover, many of the e-mails in issue were authored by other people and sent to Fell, and in those cases, those individuals were also aggrieved by Brenner’s intrusion into Fell’s e-mail accounts. Permitting precluded e-mails to be admitted from other sources would therefore fail to take into account the fact that Brenner’s actions also violated the privacy rights of everyone with whom Fell communicated. As discussed, parties should not be excused from complying with the law and following the rules because of outrage, legitimate or otherwise, over another party’s actions.
On the harsh side of the spectrum, the Court could completely preclude use of the e-mails for all purposes, in any context, regardless of whether they could be secured from some other source. This option could be tempered, however, by allowing the e-mails to be used for impeachment purposes. 12 Thus, while precluding the use of the e-mails as affirmative evidence, the Court would not permit Fell or others to testify falsely, or open the door to a line of testimony that is contradicted by the emails, knowing that the e-mails could not be used to impeach or rebut their testimony. Additionally, if there are e-mail chains between Defendants that merely contain a precluded e-mail from Fell, the chain of *570 conversation would be admissible, and only the precluded e-mail would be redacted.
Alternatively, selective preclusion of the e-mails could also be accomplished by carving out categories of e-mails. For example, e-mails dated before March 16, 2008, the last date of Fell’s employment with PPBC, could be allowed in evidence, but later e-mails could be precluded; in fact, Defendants recognized this categorical distinction during oral argument.
(See
Tr. at 27.) Alternatively, only Gmail and WFBC account e-mails could be precluded, but not Hotmail account e-mails, since Fell clearly accessed his Hotmail account on Plaintiffs’ computers and left his Hotmail password on PPBC’s computers. Limited preclusion, such as one based on the date on which the e-mail was written (for example, e-mails sent after Fell left PPBC), or the type of account from which it was retrieved (e-mails from the Gmail or WFBC accounts), might be justified by the fact that both parties appear to have “unclean hands;” such a sanction would punish Brenner’s wrongful acts, while limiting an evidentiary “windfall” going to Defendants, who also engaged in wrongful behavior.
See Fayemi,
The problem with this alternative is that, ultimately, there is little justifiable basis to distinguish the e-mails according to their source or date. Brenner was not authorized to access any of Fell’s e-mails directly from accounts maintained by third-party electronic communication service providers. Thus, while it is possible to create categories of e-mails, it is difficult to justify why one category should be precluded, while another should be admissible.
Finally, the Court could impose financial sanctions such as payment of the costs and fees incurred in bringing the instant motion.
13
These could be imposed in conjunction with a preclusion sanction, or, as the court did in
Herrera,
as an alternative to preclusion. Monetary sanctions, as opposed to full preclusion, would serve the Court’s interest in favoring full disclosure of evidence. In the context of lifting a protective order, the Second Circuit has notеd that “full disclosure of all evidence that might conceivably be relevant [is an] objective representing] the cornerstone of our administration of civil justice.”
Martindell v. International Tel. and Tel. Corp.,
The disadvantage of imposing a monetary sanction is that it does not really address the underlying injury to Fell’s privacy. Furthermore, preclusion of the emails is the remedy most compatible with maintaining the integrity of the litigation process. As one court noted: “The [c]ourt is concerned with preserving the integrity of this judicial proceeding. What matters is balancing the scales. That can be done by prohibiting [a party] from making any use of the [wrongfully obtained] documents -”
In re Shell Oil Refinery,
CONCLUSION
In fashioning a remedy pursuant to its inherent equitable powers, the Court has a great deal of discretion.
See DLC Mgmt.,
*571
Nevertheless, at this stage in the litigation, the Court has not resolved the merits of Plaintiffs’ claims, which will determine just how much dirt is on Defendants’ hands. While the day may come when Defendants will face the consequences for their alleged misconduct, Brenner’s wrongdoing has been established, and should not be counter-balanced by, as-yet, unproven allegations of wrongdoing on the part of Defendants. Accordingly, the imposition of sanctions against Plaintiffs is justified.
In the end, the one thing that should remain unsullied is the integrity of the judicial process. In this Court’s view, that integrity is threatened by admitting evidence wrongfully, if not unlawfully, secured.
See REP MCR Realty, L.L.C. v. Lynch,
Pursuant to 28 U.S.C. § 636(b)(1)(C) and Rule 72 of the Federal Rules of Civil Procedure, the parties shall have ten (10) days from service of this Report to file written objections.
See also
Fed.R.Civ.P. 6(a) and (d). Such objections shall be filed with the Clerk of the Court, with extra copies delivered to the chambers of the Honorable John H. Koeltl, United States District Judge, and to the chambers of the undersigned, Room 1660. Any requests for an extension of time for filing objections must be directed to Judge Koeltl. Failure to file objections will result in a waiver of those objections for purposes of appeal.
See Thomas v. Arn,
August 22, 2008.
Notes
. Brenner alleges that Belliard stole PPBC's client list and other items while he was in her office. (See Affidavit of Lauren Brenner, dated July 10, 2008 ("Brenner July 10 Aff.”), ¶ 16.) Belliard denies he stole anything. (See Affidavit of Rubin Belliard, dated July 29, 2008 ("Belliard Aff.”), ¶ 33.)
. All references to e-mails are to the e-mails annexed to Schnapp’s Declaration.
. Fell makes a general claim that he never did any work related to WFBC while he was at PPBC or on PPBC computers. (See Fell Aff. ¶ 6.) However, he has not provided his PPBC work schedule, so there is no way to confirm whether or not he was at PPBC when he sent any of these e-mails.
. Defendants did not include "E-mail 12” in their submissions, although it is described and referred to in the pleadings. (See Defen *554 dants’ Memorandum of Law in Support of Their Motion for an Order Precluding the Use or Disclosure of Specific Emails ("Defs.' Mem.”), at 7.) According to Defendants, Email 12 is a privileged e-mail from Defendants’ attorneys. (See id.)
. 18 U.S.C.A. § 2515 reads;
Whenever any wire or oral communication has been intercepted, no part of the contents of such communication and no evidence derived therefrom may be received in evidence in any trial, hearing, or other proceeding in or before any court, grand jury, department, officer, agency, regulatory body, legislative committee, or other authority of the United States, a State, or a political subdivision thereof if the disclosure of that information would be in violation of this chapter.
. The Court also notes that Penal Law § 250.05 explicitly includes "electronic communications” while CPLR § 4506 does not, suggesting that e-mails obtained in violation of Penal Law § 250.05 are not subject to exclusion under CPLR § 4506.
. There are both federal and state law substantive claims in this action.
. Even the case Plaintiffs rely upon, in support of the argument that Fell waived his right to privacy in his Hotmail account, acknowledges that an employer’s e-mail policy is limited only to e-mails viewed by employees while at work.
See Scott v. Beth Israel Med. Ctr. Inc.,
. Defendants' suggestion that Brenner used a keystroke logging program is rank speculation, and, even if it were true, would only confirm that Fell entered his Hotmail password into PPBC’s computers to access his Hotmail account.
. Defendants only claim as to the relevance that the obscured dates would have to their claims is that the dates the e-mails were printed might show contemporaneous "interception” under the ECPA. However, the Court has concluded that the ECPA does not apply to delivered e-mails, and the date the e-mails were printed is not relevant to the analysis because only delivered e-mails could be printed.
. In the Fourth Amendment context, the Independent Source Exception and the Inevitable Discovery Exception both allow evidence otherwise illegally obtained to be admissible in a criminal case if it could and would have been lawfully obtained anyway.
See Murray v. United States
. Defendants urge the Court to reject an impeachment exception to preclusion, and cite to a Sixth Circuit case which explicitly holds that the ECPA does not provide for one.
See United States v. Wuliger,
. Defendants have not specified precisely the costs or fees they are seeking. The SCA permits awarding fees and costs, and, if the violation was willful, the imposition of punitive damages.
See
18 U.S.C. § 2707(c);
see also Wyatt Technology Corp.,
