Robert C. KONOP, Plaintiff-Appellant, v. HAWAIIAN AIRLINES, INC., Defendant-Appellee.
No. 99-55106
United States Court of Appeals, Ninth Circuit
Argued and Submitted June 8, 2000. Filed Jan. 8, 2001. Opinion Withdrawn Aug. 28, 2001. Filed Aug. 23, 2002.
302 F.3d 868
Marianne Shipp, Gibson, Dunn & Crutcher, Irvine, CA, for the defendant-appellee.
Before BOOCHEVER, REINHARDT, and PAEZ, Circuit Judges.
Opinion by Judge BOOCHEVER; Partial Concurrence and Partial Dissent by Judge REINHARDT.
OPINION
BOOCHEVER, Circuit Judge.
Robert Konop brought suit against his employer, Hawaiian Airlines, Inc. (“Hawaiian“), alleging that Hawaiian viewed Konop‘s secure website without authorization, disclosed the contents of that website, and took other related actions in violation of the federal Wiretap Act, the Stored Communications Act, and the Railway Labor Act. Konop also alleged several state tort claims. The district court granted summary judgment against Konop on all claims, except his retaliation claim under the Railway Labor Act. On the retaliation claim, the district court entered judgment against Konop following a bench trial. Konop appeals the district court‘s judgement on all claims, except on those brought under state tort law.
On January 8, 2001, we issued an opinion, reversing the district court‘s decision on Konop‘s claims under the Wiretap Act and the Stored Communications Act, and on several of his claims under the Railway Labor Act. Konop v. Hawaiian Airlines, Inc., 236 F.3d 1035 (9th Cir.2001). Hawaiian filed a petition for rehearing, which became moot when we withdrew our previous opinion. Konop v. Hawaiian Airlines, Inc., 262 F.3d 972 (9th Cir.2001). We now affirm the judgment of the district court with respect to Konop‘s Wiretap Act claims and his retaliation claim under the Railway Labor Act. We reverse the district court‘s judgment with respect to Konop‘s claims under the Stored Communications Act and his remaining claims under the Railway Labor Act.
FACTS
Konop, a pilot for Hawaiian, created and maintained a website where he posted bulletins critical of his employer, its officers, and the incumbent union, Air Line Pilots Association (“ALPA“). Many of those criticisms related to Konop‘s opposition to labor concessions which Hawaiian sought from ALPA. Because ALPA supported the concessions, Konop, via his website, encouraged Hawaiian employees to consider alternative union representation.
Konop controlled access to his website by requiring visitors to log in with a user name and password. He created a list of people, mostly pilots and other employees of Hawaiian, who were eligible to access the website. Pilots Gene Wong and James Gardner were included on this list. Konop programmed the website to allow access when a person entered the name of an eligible person, created a password, and clicked the “SUBMIT” button on the
In December 1995, Hawaiian vice president James Davis asked Wong for permission to use Wong‘s name to access Konop‘s website. Wong agreed. Davis claimed he was concerned about untruthful allegations that he believed Konop was making on the website. Wong had not previously logged into the website to create an account. When Davis accessed the website using Wong‘s name, he presumably typed in Wong‘s name, created a password, and clicked the “SUBMIT” button indicating acceptance of the terms and conditions.
Later that day, Konop received a call from the union chairman of ALPA, Reno Morella.1 Morella told Konop that Hawaiian president Bruce Nobles had contacted him regarding the contents of Konop‘s website. Morella related that Nobles was upset by Konop‘s accusations that Nobles was suspected of fraud and by other disparaging statements published on the website. From this conversation with Morella, Konop believed Nobles had obtained the contents of his website and was threatening to sue Konop for defamation based on statements contained on the website.
After speaking with Morella, Konop took his website offline for the remainder of the day. He placed it back online the next morning, however, without knowing how Nobles had obtained the information discussed in the phone call. Konop claims to have learned only later from the examination of system logs that Davis had accessed the website using Wong‘s name.
In the meantime, Davis continued to view the website using Wong‘s name. Later, Davis also logged in with the name of another pilot, Gardner, who had similarly consented to Davis’ use of his name. Through April 1996, Konop claims that his records indicate that Davis logged in over twenty times as Wong, and that Gardner or Davis logged in at least fourteen more times as Gardner.
Konop filed suit alleging claims under the federal Wiretap Act, the Stored Communications Act, the Railway Labor Act, and state tort law, arising from Davis’ viewing and use of Konop‘s secure website. Konop also alleged that Hawaiian placed him on medical suspension in retaliation for his opposition to the proposed labor concessions, in violation of the Railway Labor Act. The district court granted summary judgment to Hawaiian on all but the retaliatory suspension claim, and entered judgment against Konop on that claim after a short bench trial.
Konop appeals, arguing that the district court erred in granting summary judgment to Hawaiian on his federal claims under the Wiretap Act, Stored Communications Act, and Railway Labor Act. In addition, Konop urges us to reverse the district court‘s judgment on the retaliation claim following the bench trial, because he claims the district court improperly quashed subpoenas for witnesses Konop sought to have testify at trial.
DISCUSSION
The district court‘s grant of summary judgment is reviewed de novo. Lopez v. Smith, 203 F.3d 1122, 1131 (9th Cir.2000) (en banc). Viewing the evidence in the light most favorable to Konop, we must determine whether there are any genuine
I. Electronic Communications Privacy Act Claims
We first turn to the difficult task of determining whether Hawaiian violated either the Wiretap Act,
As we have previously observed, the intersection of these two statutes “is a complex, often convoluted, area of the law.” United States v. Smith, 155 F.3d 1051, 1055 (9th Cir.1998). In the present case, the difficulty is compounded by the fact that the ECPA was written prior to the advent of the Internet and the World Wide Web. As a result, the existing statutory framework is ill-suited to address modern forms of communication like Konop‘s secure website. Courts have struggled to analyze problems involving modern technology within the confines of this statutory framework, often with unsatisfying results. See, e.g., Robert A. Pikowsky, Legal and Technological Issues Surrounding Privacy of Attorney Client Communication Via Email, Advocate, Oct. 2000, at 17-19 (discussing the uncertainty over email privacy caused by the ECPA and judicial interpretations thereof); Lieutenant Colonel LeEllen Coacher, Permitting Systems Protection Monitoring: When the Government Can Look and What It Can See, 46 A.F. L. Rev. 155, 171-74 (1999) (same); Tatsuya Akamine, Note, Proposal for a Fair Statutory Interpretation: E-mail Stored in a Service Provider Computer Is Subject to an Interception Under the Federal Wiretap Act, 7 J.L. & Pol‘y 519, 521-29, 561-68 (1999) (criticizing the judiciary‘s interpretation of the ECPA). We observe that until Congress brings the laws in line with modern technology, protection of the Internet and websites such as Konop‘s will remain a confusing and uncertain area of the law.
A. The Internet and Secure Websites
The Internet is an international network of interconnected computers that allows millions of people to communicate and exchange information. See Reno v. ACLU, 521 U.S. 844, 849-50, 117 S.Ct. 2329, 138 L.Ed.2d 874 (1997); In re DoubleClick Inc. Privacy Litig., 154 F.Supp.2d 497, 501 (S.D.N.Y.2001). The World Wide Web, the best known category of communication over the Internet, consists of a vast number of electronic documents stored in different computers all over the world. Reno v. ACLU, 521 U.S. at 852, 117 S.Ct. 2329. Any person or organization with a computer connected to the Internet can “publish” information on the Web in the form of a “web page” or “website.” See id. at 853 & n. 9, 95 S.Ct. 2051. A website consists of electronic information stored by a hosting service computer or “server.” The owner
While most websites are public, many, such as Konop‘s, are restricted. For instance, some websites are password-protected, require a social security number, or require the user to purchase access by entering a credit card number. See Reno, 521 U.S. at 852-53, 856, 117 S.Ct. 2329. The legislative history of the ECPA suggests that Congress wanted to protect electronic communications that are configured to be private, such as email and private electronic bulletin boards. See S.Rep. No. 99-541, at 35-36, 1986 U.S.C.C.A.N. at 3599 (“This provision [the SCA] addresses the growing problem of unauthorized persons deliberately gaining access to ... electronic or wire communications that are not intended to be available to the public.“); H.R.Rep. No. 99-647 at 41, 62-63 (1986) (describing the Committee‘s understanding that the configuration of the electronic communications system would determine whether or not an electronic communication was readily accessible to the public). The nature of the Internet, however, is such that if a user enters the appropriate information (password, social security number, etc.), it is nearly impossible to verify the true identity of that user. Cf. Reno, 521 U.S. at 855-56, 117 S.Ct. 2329 (discussing the difficulty of verifying the age of a website user by requiring a credit card number or password).
We are confronted with such a situation here. Although Konop took certain steps to restrict the access of Davis and other managers to the website,3 Davis was nev-
B. Wiretap Act
Konop argues that Davis’ conduct constitutes an interception of an electronic communication in violation of the Wiretap Act. The Wiretap Act makes it an offense to “intentionally intercept[] ... any wire, oral, or electronic communication.”
An “electronic communication” is defined as “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system.”
The Wiretap Act, however, prohibits only “interceptions” of electronic communications. “Intercept” is defined as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.”
In Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457 (5th Cir.1994), the Fifth Circuit held that the government‘s acquisition of email messages stored on an electronic bulletin board system, but not yet retrieved by the intended recipients, was not an “interception” under the Wiretap Act. The court observed that, prior to the enactment of the ECPA, the word “intercept” had been interpreted to mean the acquisition of a communication contemporaneous with transmission. Id. at 460 (citing United States v. Turk, 526 F.2d 654, 658 (5th Cir.1976)). The court further observed that Congress, in passing the ECPA, intended to retain the previous definition of “intercept” with respect to wire and oral communications,4 while amending the Wiretap Act to cover interceptions of electronic communications. See Steve Jackson Games, 36 F.3d at 462; S.Rep. No. 99-541, at 13;
Critical to the issue before us is the fact that, unlike the definition of “wire communication,” the definition of “electronic communication” does not include electronic storage of such communications.... Congress’ use of the word “transfer” in the definition of “electronic communication,” and its omission in that definition of the phrase “any electronic storage of such communication” ... reflects that Congress did not intend for “intercept” to apply to “electronic communications” when those communications are in “electronic storage.”
Steve Jackson Games, 36 F.3d at 461-62; Wesley Coll. v. Pitts, 974 F.Supp. 375, 386 (D.Del.1997) (“[B]y including the electronic storage of wire communications within the definition of such communications but declining to do the same for electronic communications ... Congress sufficiently evinced its intent to make acquisitions of electronic communications unlawful under the Wiretap Act only if they occur contemporaneously with their transmissions.“), aff‘d, 172 F.3d 861 (3d Cir.1998); United States v. Reyes, 922 F.Supp. 818, 836 (S.D.N.Y.1996) (“Taken together, the definitions thus imply a requirement that the acquisition of [electronic communications] be simultaneous with the original transmission of the data.“); Bohach v. City of Reno, 932 F.Supp. 1232, 1236-37 (D.Nev.1996) (requiring acquisition during transmission). The Steve Jackson Court further noted that the ECPA was deliberately structured to afford electronic communications in storage less protection than other forms of communication. See Steve Jackson Games, 36 F.3d at 462-64.
The Ninth Circuit endorsed the reasoning of Steve Jackson Games in United States v. Smith, 155 F.3d at 1051. The question presented in Smith was whether the Wiretap Act covered wire communications in storage, such as voice mail messages, or just wire communications in transmission, such as ongoing telephone conversations. Relying on the same textual distinction as the Fifth Circuit in Steve Jackson Games, we concluded that wire communications in storage could be “intercepted” under the Wiretap Act. We found that Congress’ inclusion of storage in the definition of “wire communication” militated in favor of a broad definition of the term “intercept” with respect to wire communications, one that included acquisition of a communication subsequent to transmission. We further observed that, with respect to wire communications only, the prior definition of “intercept“—acquisition contemporaneous with transmission—had been overruled by the ECPA. Smith, 155 F.3d at 1057 n. 11. On the other hand, we suggested that the narrower definition of “intercept” was still appropriate with regard to electronic communications:
[I]n cases concerning “electronic communications“—the definition of which specifically includes “transfers” and specifically excludes “storage“—the “narrow” definition of “intercept” fits like a glove; it is natural to except non-contemporaneous retrievals from the scope of the Wiretap Act. In fact, a number of courts adopting the narrow interpretation of “interception” have specifically premised their decisions to do so on the distinction between § 2510‘s definitions of wire and electronic communications.
Smith, 155 F.3d at 1057 (citations and alterations omitted).
We agree with the Steve Jackson and Smith courts that the narrow definition of “intercept” applies to electronic communications. Notably, Congress has since amended the Wiretap Act to eliminate storage from the definition of wire communication, see USA PATRIOT Act § 209, 115 Stat. at 283, such that the textual distinction relied upon by the Steve Jackson and Smith courts no longer exists. This change, however, supports the analysis of those cases. By eliminating storage from the definition of wire communication, Congress essentially reinstated the pre-ECPA definition of “intercept“—acquisition contemporaneous with transmission—with respect to wire communications. See Smith, 155 F.3d at 1057 n. 11. The purpose of the recent amendment was to reduce protection of voice mail messages to the lower level of protection provided other electronically stored communications. See H.R. Rep. 107-236(I), at 158-59 (2001). When Congress passed the USA PATRIOT Act, it was aware of the narrow definition courts had given the term “intercept” with respect to electronic communications, but chose not to change or modify that definition. To the contrary, it modified the statute to make that definition applicable to voice mail messages as well. Congress, therefore, accepted and implicitly approved the judicial definition of “intercept” as acquisition contemporaneous with transmission.
We therefore hold that for a website such as Konop‘s to be “intercepted” in violation of the Wiretap Act, it must be acquired during transmission, not while it is in electronic storage.6 This conclusion is consistent with the ordinary meaning of “intercept,” which is “to stop, seize, or interrupt in progress or course before arrival.” Webster‘s Ninth New Collegiate Dictionary 630 (1985). More importantly, it is consistent with the structure of the ECPA, which created the SCA for the
Because we conclude that Davis’ conduct did not constitute an “intercep-
C. Stored Communications Act
Konop also argues that, by viewing his secure website, Davis accessed a stored electronic communication without authorization in violation of the SCA. The SCA makes it an offense to “intentionally access[] without authorization a facility through which an electronic communication service is provided ... and thereby obtain[] ... access to a wire or electronic communication while it is in electronic storage in such system.”
The parties agree that the relevant “electronic communications service” is Konop‘s website, and that the website was in “electronic storage.” In addition, for the purposes of this opinion, we accept the parties’ assumption that Davis’ conduct constituted “access without authorization”8
We therefore address only the narrow question of whether the district court properly found Hawaiian exempt from liability under
The district court concluded that Wong and Gardner had the authority under
Nevertheless, the plain language of
Based on the common definition of the word “use,” we cannot find any evidence in the record that Wong ever used Konop‘s website. There is some evidence, however, that Gardner may have used the website, but it is unclear when that use occurred. At any rate, the district court did not make any findings on whether Wong and Gardner actually used Konop‘s website—it simply assumed that Wong and Gardner, by virtue of being eligible to view the website, could authorize Davis’ access. The problem with this approach is that it essentially reads the “user” requirement out of
II. Railway Labor Act Claims
Konop also appeals the district court‘s grant of summary judgment to Hawaiian on his claims under the Railway Labor Act,
Konop asserts three claims under
A. Subject Matter Jurisdiction
Federal courts lack subject matter jurisdiction over disputes which are “grounded in the [collective bargaining agreement],” Hawaiian Airlines, Inc. v. Norris, 512 U.S. 246, 256, 114 S.Ct. 2239, 129 L.Ed.2d 203 (1994), and “involve controversies over the meaning of an existing collective bargaining agreement in a particular fact situation,” id. at 253, 114 S.Ct. 2239 (internal quotation marks omitted). Such disputes, labeled “minor” disputes under the RLA, are subject to mandatory arbitration. Id. Hawaiian argues, and the district court agreed, that Konop‘s RLA claims are grounded in the collective bargaining agreement (“CBA“) and are therefore subject to mandatory arbitration. We disagree.
In Fennessy v. Southwest Airlines, 91 F.3d 1359 (9th Cir.1996), we addressed whether the district court had jurisdiction over the plaintiff‘s statutory claim under the RLA. The plaintiff in Fennessy alleged that the carrier violated
Hawaiian argues that, unlike the statutory claim in Fennessy, Konop‘s statutory claims are grounded in and dependent on the CBA. To support this position, Hawaiian focuses on conduct which Konop explicitly alleged in his complaint as violating the CBA. Specifically, in the RLA section of the complaint, Konop alleged that Hawaiian violated the CBA by suspending him from work, reducing his employee benefits, requiring him to submit to physical and psychological testing, and giving certain pilots paid opportunities to campaign in favor of the concessionary contract.
Accordingly, we hold that the RLA claims which Konop presses on appeal are not grounded in the CBA, are not subject to mandatory arbitration and, therefore, fall within the court‘s jurisdiction.
B. Protected Activity
Hawaiian contends that even if Hawaiian managers accessed Konop‘s website under false pretenses, conveyed this information to a rival union leader, and threatened to sue Konop for defamation, such conduct did not violate the RLA because it did not interfere with any protected organizing activity. The organizing activity in which Konop engaged principally involved the publication of articles on a secure website. As discussed above, Konop limited access to pilots and other employees on the eligible list and prohibited users from disclosing the contents of the website to others. He also categorically excluded managers. Konop‘s website publication vigorously criticized Hawaiian management and its proposal for wage concessions in the existing collective bargaining agreement. Because the incumbent union, ALPA, supported the concessionary contract, Konop sought to encourage consideration of alternative union representation.
There is no dispute that Konop‘s website publication would ordinarily constitute protected union organizing activity under the RLA. Hawaiian argues, however, that Konop forfeited any protection he would otherwise enjoy because his articles contained malicious, defamatory and insulting material known to be false. In Linn v. United Plant Guard Workers, Local 114, 383 U.S. 53, 61, 86 S.Ct. 657, 15 L.Ed.2d 582 (1966), the Supreme Court held that a party forfeits his protection under the National Labor Relations Act (NLRA) by “circulating defamatory or insulting material known to be false.”10 See also Old Dominion Branch No. 496, Nat‘l Ass‘n of Letter Carriers v. Austin, 418 U.S. 264, 282-83, 94 S.Ct. 2770, 41 L.Ed.2d 745 (1974); San Antonio Comm. Hosp. v. S. Cal. Dist. Council of Carpenters, 125 F.3d 1230, 1237 (9th Cir.1997).
We assume Hawaiian is referring to the alleged defamatory statements contained in the “Facts” section of its brief. There, Hawaiian indicates that Konop published the following false statements: (1) Nobles does his “dirty work ... like the Nazis during World War II“; (2) “Soviet Negotiating Style Essential to Nobles Plan!“; (3) Nobles is “one incompetent at the top“; (4)
The first two statements, referencing the Nazis and Soviets, are simply “rhetorical hyperbole” protected by federal labor laws. See Letter Carriers, 418 U.S. at 286, 94 S.Ct. 2770. The second two statements, commenting on Nobles’ competence and people skills, are opinions also protected by federal labor laws. See id. at 284, 94 S.Ct. 2770; San Antonio Comm. Hosp., 125 F.3d at 1237. Konop did not forfeit his protection under the Railway Labor Act, as Hawaiian suggests, simply by publishing statements that were critical of and insulting to Nobles. “[F]ederal law gives a union license to use intemperate, abusive, or insulting language without fear of restraint or penalty....” San Antonio Comm. Hosp., 125 F.3d at 1235 (quoting Letter Carriers, 418 U.S. at 283, 94 S.Ct. 2770) (emphasis added); see also Linn, 383 U.S. at 58, 86 S.Ct. 657 (“[R]epresentation campaigns are frequently characterized by bitter and extreme charges, countercharges, unfounded rumors, vituperations, personal accusations, misrepresentations and distortions.“).11
With respect to the final challenged statement, indicating that Nobles was suspected of fraud, Hawaiian fails to argue or present any evidence that Konop published the statement with knowledge of its falsity or with reckless disregard for the truth. Federal labor law protects even false and defamatory statements unless such statements are made with actual malice—i.e., knowledge of falsity or with reckless disregard for the truth. See Letter Carriers, 418 U.S. at 281, 94 S.Ct. 2770; Linn, 383 U.S. at 61, 86 S.Ct. 657 (protection under labor law existed “even though the statements [were] erroneous and defame[d] one of the parties to the dispute“). With no evidence or argument that Konop acted with actual malice, Hawaiian cannot demonstrate as a matter of law that Konop forfeited his protection under the RLA.
NLRB v. Pincus Bros., Inc.-Maxwell, 620 F.2d 367 (3d Cir.1980) (as amended), upon which Hawaiian principally relies, provides little support for Hawaiian‘s position. In Pincus Bros., the Third Circuit, in considering whether the NLRB abused its discretion by declining to defer to an arbitration award, merely concluded it was “at least arguable” that the employee published a defamatory statement known to be false. Id. at 376. For Hawaiian to prevail on summary judgment, however, it must do more than show it is “at least arguable” that Konop knew the challenged statement was false. It must demonstrate this as a matter of law. As Hawaiian presents no evidence or argument that Konop acted with the requisite malice, Hawaiian falls short of satisfying this burden.
Accordingly, we find that Konop has raised a triable issue of fact with respect to whether the development and maintenance of his website constituted protected activity under the RLA.
C. Specific Violations
Konop argues that Hawaiian managers: (1) interfered with Konop‘s organizing efforts by viewing the website under false pretenses, (2) wrongfully supported one labor group in favor of another by informing the opposing labor faction of the website‘s contents, and (3) engaged in coercion and intimidation by threatening to sue Konop for defamation, all in violation of the RLA. Hawaiian argues, and the district court agreed, that Konop failed to present sufficient evidence to withstand summary judgment on these claims. We disagree.
1. Access of Website
Konop argues that Davis interfered with Konop‘s organizing efforts by viewing the website under false pretenses. Absent a legitimate justification, employers are generally prohibited from engaging in surveillance of union organizing activities. Cal. Acrylic Indus. v. NLRB, 150 F.3d 1095, 1099-1100 (9th Cir.1998). The reason for this general proscription is that employer surveillance “tends to create fear among employees of future reprisal” and, thus, “chills an employee‘s freedom to exercise” his rights under federal labor law. Id. at 1099.
In NLRB v. Unbelievable, Inc., 71 F.3d 1434 (9th Cir.1995), we upheld the Board‘s finding that the employer “engaged in unfair labor practices by eavesdropping on private conversations between employees and [a] Union representative,” which occurred in the employee break room. Id. at 1438-39. We see no principled distinction between the employer‘s eavesdropping in Unbelievable and Hawaiian‘s access of Konop‘s secure website.
Hawaiian suggests that Davis had a legitimate reason to access Konop‘s website—to identify and correct any false or misleading statements. Assuming such a concern could justify Davis’ monitoring of private union organizing activities, Hawaiian has presented little evidence to suggest that any statements on Konop‘s website were actually defamatory. Moreover, as discussed below, there are triable issues whether Hawaiian used information it obtained from the website to assist one union faction over another, and to coerce and intimidate Konop. Under these circumstances, we conclude that Konop has raised a triable issue that Hawaiian‘s access of Konop‘s website was not justified.
Hawaiian also argues that Davis’ access did not violate the RLA because it did not appreciably limit Konop‘s organizing activities. Hawaiian emphasizes that, after learning about Davis’ access to the website, Konop restricted access for a mere half-day and declined to temper the language in his articles. Hawaiian, however, presents no authority indicating that employees subject to surveillance or eavesdropping must also demonstrate that they consequently limited their organizing activity. It is the tendency to chill protected activities, not the actual chilling of protected activities, that renders eavesdropping and surveillance generally objectionable under federal labor law. See, e.g., Cal. Acrylic, 150 F.3d at 1099-1100. That a hardy individual might continue his organizing activities undeterred, despite an employer‘s surveillance, does not render the employer‘s conduct any less of a violation.12
Accordingly, we find that Konop has raised a triable issue of fact that Hawaiian interfered with Konop‘s union organizing activity in violation of the RLA by accessing Konop‘s website.
2. Disclosure to Opposing Union
Konop argues that Nobles unlawfully assisted Reno Morella, the union leader who supported the concessionary contract, by disclosing the contents of Konop‘s website. Generally, the RLA prohibits employers from providing assistance to a union or labor faction. See Barthelemy v. Air Lines Pilots Ass‘n, 897 F.2d 999, 1009 (9th Cir.1990) (per curiam); see also NLRB v. Finishline Indus., 451 F.2d 1280, 1281-82 (9th Cir.1971) (NLRA prohibits employer from telling workers to withdraw from one union and join another); NLRB v. L. Ronney & Sons Furniture Mfg. Co., 206 F.2d 730, 734-35 (9th Cir.1953) (NLRA prohibits employer from initiating membership drive among his employees for employer-favored union).
Konop argues that Nobles disclosed useful intelligence to a rival union faction in an effort to ensure that Konop‘s faction, which opposed the concessionary contract, would not prevail. Hawaiian does not seriously dispute that disclosure of the contents of Konop‘s website to Morella would constitute improper assistance. Instead, Hawaiian argues that Konop failed to present sufficient evidence that Nobles made any such disclosure or that Nobles was even familiar with the contents of Konop‘s website when he spoke to Morella.
Morella, however, states in his declaration that Nobles contacted him on December 14, 1995 and informed him “that he had just reviewed information which was posted on an internet communications system operated by Hawaiian Airlines Pilot Robert Konop.” In addition, Morella states that Nobles also “disclosed to me that Konop‘s internet communications system contained a third written article concerning Konop‘s efforts to obtain union representation by a labor organization other than the Air Line Pilots Association.” This evidence creates a genuine issue of fact whether Nobles was familiar with the contents of Konop‘s website and whether Nobles disclosed the contents of the website to Morella.
Moreover, Nobles confirmed in his declaration that he contacted Morella because he “felt that Reno Morella, the Chairman of the ALPA Master Executive Council, should be aware of the newsletter because of its inaccurate attack on the proposed labor agreements and the unfair effect it could have on the ratification process.” Nobles thus effectively concedes that he interceded to help ensure that Morella‘s faction—which favored ratification of the concessionary contract—would prevail over Konop‘s faction, which opposed the agreement.
Accordingly, we find that Konop has raised a triable issue of fact whether Nobles improperly assisted one union faction over another in violation of the RLA.
3. Threat of Defamation Suit
Konop argues that Nobles engaged in unlawful coercion and intimidation by threatening to file a defamation suit against Konop based on statements on Konop‘s website. An employer‘s filing or threatened filing of a lawsuit against an employee concerning union organizing activities may, under certain circumstances, violate the RLA. See, e.g., Diamond Walnut Growers, Inc. v. NLRB, 53 F.3d 1085, 1089-90 (9th Cir.1995) (finding employer‘s defamation lawsuit against union violated NLRA); GHR Energy Corp., 294 N.L.R.B. 1011, 1014 (1989) (analyzing whether employer‘s threat to sue employee for defamation violated NLRA), aff‘d, 924 F.2d 1055 (5th Cir.1991).
Hawaiian does not argue that Nobles would be justified in threatening to sue Konop for defamation. Instead, Hawaiian contends that Konop failed to present sufficient evidence that Nobles ever made such a threat. Nobles stated in his
Morella, however, indicates otherwise. Morella states in his declaration, “Nobles advised me that Konop should be cautioned, or informed, of the possibility of a defamation lawsuit by Nobles.” Morella also testified, “[I]t was my impression and conclusion that Nobles intended for me to contact Konop, or take other action, for the purpose of opposing Konop‘s efforts to seek alternative union representation.” Morella then “informed Konop of Mr. Nobles’ statements ... regarding caution with respect to a possible lawsuit against Konop for defamation.” Konop confirms the same in his declaration. This evidence is sufficient to raise a triable issue of fact whether Nobles threatened to sue Konop for defamation.
Accordingly, we find that Konop has raised a triable issue of fact whether Nobles engaged in coercion and intimidation in violation of the RLA by threatening to sue Konop for defamation.
D. Bench Trial on Retaliation Claim
Konop‘s retaliation claim under the RLA was tried to the district court. The district court entered judgment against him on this claim, which involved his allegation that Hawaiian violated the RLA when it placed him on sick leave in retaliation for protected labor activities. Konop challenges the district court‘s judgment on this claim on the ground that his subpoenas for corroborating witnesses were improperly quashed. We review a district court‘s order quashing subpoenas for an abuse of discretion, United States v. Berberian, 767 F.2d 1324, 1324 (9th Cir.1985). A litigant whose subpoenas have been improperly quashed
There is some dispute whether the district court‘s remarks in a pretrial hearing constituted an order to quash subpoenas at all. Assuming, however, that the district court did quash Konop‘s subpoenas, Konop has not suggested what relevant evidence the subpoenaed witnesses might have provided had they been compelled to testify. Konop has consequently failed to show that he was prejudiced. Accordingly, the district court‘s judgment against Konop on his retaliation claim under the RLA is affirmed.
CONCLUSION
For the foregoing reasons, we affirm the district court‘s judgment with respect to Konop‘s Wiretap Act claims and his retaliation claim under the Railway Labor Act. We reverse the district court‘s judgment on Konop‘s Stored Communications Act claims and his claims under the Railway Labor Act for interference with organizing activities, wrongful support of a union faction, and coercion and intimidation.
AFFIRMED IN PART, REVERSED IN PART, and REMANDED.
REINHARDT, Circuit Judge, concurring in part, dissenting in part.
I concur in Part C of Section I of the majority opinion regarding Konop‘s claims under the Stored Communications Act, and Section II of the majority opinion regarding Konop‘s claims under the Railway Labor Act. I dissent, however, from Part B of Section I, which holds that the term “intercept” in the Wiretap Act, as applied to electronic communications, refers solely to contemporaneous acquisition. I conclude instead that “stored electronic
Because I recognize that any reading of the relevant statutory provisions raises some difficulties and introduces some inconsistencies, the question becomes: which reading is more coherent and more consistent with Congressional intent? The majority reasons, and I agree, that stored electronic communications are covered under the definition of “electronic communications” in the Wiretap Act. However, having made that determination, the majority proceeds to introduce unnecessary confusion and incoherence into the statute by holding that “intercept” encompasses only contemporaneous acquisition of electronic communications, and thus that it is not possible to “intercept” a stored electronic communication. We have already rejected just such a contemporaneity requirement with respect to the acquisition of stored wire communications, and there is no justification for reviving it with respect to stored electronic communications. United States v. Smith, 155 F.3d 1051, 1057 n. 11, 1058 (9th Cir.1998).
The contemporaneity requirement for interception first appeared in United States v. Turk, 526 F.2d 654 (5th Cir.1976), in which the Fifth Circuit held that the definition of “intercept” in the statute “require[s] participation by the one charged with an ‘interception’ in the contemporaneous acquisition of the communication through the use of [a] device.” 526 F.2d at 658 (emphasis added). In Turk, however, the Fifth Circuit was interpreting a version of the Wiretap Act that predates the one at issue in Smith and in this case. That version did not cover interception of
Thereafter, in Smith, 155 F.3d at 1057 n. 11, 1058, this court held, in a case involving the acquisition of stored voicemail messages, that Turk‘s contemporaneity requirement had been “statutorily overruled,” at least with respect to wire communications, by the changes in the statute which brought stored wire communications within its purview. The Smith court reasoned that “intercept” must necessarily include non-contemporaneous acquisition of stored wire communications because Congress had deliberately inserted stored wire communications into the intercept provision despite the fact that contemporaneous acquisition of stored wire communications is, by definition, impossible. 155 F.3d at 1058. To read “intercept” to include only contemporaneous acquisition would, of course, have rendered the intercept prohibition with respect to stored wire communications meaningless. Id.
Here, the majority‘s definition of “intercept” renders that prohibition meaningless with respect to stored electronic communications. The majority opinion would result in eliminating stored electronic communications from the purview of the intercept prohibition altogether, because a stored communication cannot be acquired contemporaneously with its transmission—it has already been transmitted.
To read a contemporaneity requirement into the definition of “intercept” renders the prohibition against the electronic communication interception largely superfluous, and violates the precept against interpreting one provision of a statute to negate another. See e.g., Sorenson v. Secretary of the Treasury, 475 U.S. 851, 106 S.Ct. 1600, 89 L.Ed.2d 855 (1986) (applying the whole act rule to the Omnibus Budget Reconciliation Act of 1981). Intercept of electronic communications is defined as any “acquisition of the contents of any ... electronic ... communication through the use of any ... device.”
The majority asserts that it is reasonable that the term “intercept” would describe different conduct with respect to wire communications than with respect to electronic communications because different actions are required to intercept different kinds of communications. This reasoning fails because, although wire communications and electronic communications are quite different, stored wire communications are technologically equivalent to stored electronic communications. Thus it would make little sense to treat them differently. See
The Non-Contemporaneous Acquisition Reading Permits a Coherent Reading of the Wiretap Act and the Stored Communications Act Together, Consistent with Congressional Intent
Congress‘s clear intent, when amending the statute in 1986, was to regulate access to and acquisition of stored electronic communications. See S.Rep. No. 99-541 at 3-4 (1986), reprinted in 1986 U.S.C.C.A.N.
On the other hand, section 2703 (the structure of which the panel claims supports a “contemporaneous acquisition” reading of the text) sets out the parameters under which governmental authorities can gain “access” to the “contents” of stored electronic communications. That section provides that governmental authorities may obtain a search warrant to compel electronic communication service providers to disclose the contents of stored electronic communications. By its plain terms, it does not provide a judicial means by which government authorities can independently intercept or acquire the contents of electronic communications. That is covered under
Furthermore, contrary to the arguments of Hawaiian Airlines and its amici, the drafting of a separate act specifically governing the contents of stored electronic communications (Stored Communications Act.
Second, it is in the nature of electronic communication to be stored (both temporarily and permanently, as Congress indicated in the definition of electronic storage,
Third, the Stored Communications Act is necessary to police the unauthorized access to electronic and wire communications facilities that is a necessary antecedent to illegal interception of those communications in storage. Were Congress to prohibit only actual acquisition of the contents of communications in storage, law enforcement would be powerless to do anything about persons who gained unauthorized
In sum, a reading of the Wiretap Act that includes stored electronic communications in the statute‘s “intercept” prohibition is consistent with the nature of the technology at issue, leaves no unexplained statutory gaps, and renders none of the myriad provisions of either the Wiretap Act or the Stored Communications Act superfluous. Under such a reading, the Wiretap Act would prohibit the interception of electronic communications, both stored and en route, and subject violators to serious penalties. It would permit law enforcement to intercept such communications using a court order as indicated in
Prior Precedent on the Wiretap Act and the Stored Communications Act Does Not Preclude the Non-Contemporaneous Acquisition Reading
This is a case of first impression in this circuit, and there is no binding authority on the regulation of stored electronic communications. There are no Supreme Court cases interpreting the provisions of the Wiretap Act and the Stored Communications Act as they relate to electronic communications, and the court of appeals decisions, in our circuit and others, either do not deal with stored electronic communications, or are superseded by changes in law and technology, or both. United States v. Turk predates the addition of the electronic provisions and language to the statute, and therefore is of little relevance. 526 F.2d 654 (5th Cir.1976). More important, its contemporaneity requirement was expressly repudiated in United States v. Smith. 155 F.3d 1051, 1057 n. 11, 1058 (9th Cir.1998) (“[T]o the extent that Turk stands for a definition of “intercept” that necessarily entails contemporaneity, it has been statutorily overruled.“). Steve Jackson Games is the only circuit court
Conclusion
In conclusion, because I believe that reading the Wiretap Act to prohibit interception of “stored electronic communications” provides a more coherent construction of the Act and is more consistent with the text of the statute as well as with the Congressional intent underlying both the Wiretap Act and the Stored Communications Act, I respectfully dissent from Part B of Section I of the majority opinion.
v.
Bert RICE, Warden, Respondent-Appellee.
No. 99-17311.
United States Court of Appeals, Ninth Circuit.
Argued and Submitted June 5, 2001. Filed Sept. 12, 2001. Withdrawn and Filed Sept. 4, 2002.*
* This appeal was submitted following oral argument on June 5, 2001, and the panel filed an opinion on September 12, 2001, which is published at 265 F.3d 878 (9th Cir.2001). The mandate was stayed on December 10, 2001, pending the Supreme Court‘s decision in Mickens v. Taylor, 535 U.S. 162, 122 S.Ct. 1237, 152 L.Ed.2d 291 (2002). We now withdraw our prior opinion and file this opinion.
Notes
This is the gateway for NEWS UPDATES and EDITORIAL COMMENTS directed only toward Hawaiian Air‘s pilots and other employees, not including HAL management. By entering, you acknowledge and agree to the terms and conditions of use as specified below. You must read this entire page before entry. Others should simply find something else to do with their time. If you are already a registered user, you may fill in your name along with the other information required below, then enter the system. If you want to visit the system, and you belong to the authorized group, you must supply the proper information before you will be allowed to enter. Make note of the password you enter for your first visit, otherwise future visits may be delayed. Visits by others will be strictly prohibited.
Beneath this language, Konop provided boxes for a person‘s name, occupation, email address and password. Below the boxes were two buttons: one said “SUBMIT,” the other said “CLEAR.” The advisement continued:
All name and contact information will be kept strictly confidential. Any effort to defeat, compromise or violate the security of this website will be prosecuted to the fullest extent of the law.
WARNING!
The information contained herein is CONFIDENTIAL, and it is not intended for public dissemination! By requesting entry in the system, you must agree not to furnish any of the information contained herein to any other person or for any other use. Republication or redistribution of this information to any other person is strictly prohibited. Anyone found to disseminate this information to any other than those specifically named and allowed here will be banned from this website and held liable to prosecution for violation of the terms and conditions of use and for violation of this contract.
