ROYAL TRUCK & TRAILER SALES AND SERVICE, INC., Plaintiff-Appellant, v. MIKE KRAFT; KELLY MATTHEWS, Defendants-Appellees.
No. 19-1235
United States Court of Appeals for the Sixth Circuit
September 9, 2020
974 F.3d 756
Before: GILMAN, KETHLEDGE, and READLER, Circuit Judges.
RECOMMENDED FOR PUBLICATION Pursuant to Sixth Circuit I.O.P. 32.1(b). File Name: 20a0301p.06. Appeal from the United States District Court for the Eastern District of Michigan at Port Huron. No. 3:18-cv-10986—Robert H. Cleland, District Judge. Argued: December 12, 2019.
ARGUED: Anthony M. Sciara, KOTZ SANGSER WYSOCKI P.C., Detroit, Michigan, for Appellant. Salvatore J. Vitale, VARNUM LLP, Novi, Michigan, for Appellees. ON BRIEF: Anthony M. Sciara, Mark F.C. Johnson, KOTZ SANGSER WYSOCKI P.C., Detroit, Michigan, for Appellant. Salvatore J. Vitale, Richard T. Hewlett, VARNUM LLP, Novi, Michigan, for Appellees.
OPINION
CHAD A. READLER, Circuit Judge. Following the abrupt resignation of two employees, Royal Truck & Trailer discovered that the employees, prior to resigning, had
The conduct at issue might violate company policy, state law, perhaps even another federal law. But because Royal concedes that the employees were authorized to access the information in question, it has failed to satisfy the statutory requirements for stating a claim under the CFAA. Accordingly, we AFFIRM the district court‘s judgment.
BACKGROUND
Royal employed Defendants Mike Kraft and Kelly Matthews as a part of the company‘s sales team. In conjunction with their employment, Defendants received a copy of Royal‘s employee handbook. With respect to the use of company equipment, the handbook prohibited a range of conduct, including: personal activities; unauthorized use, retention, or disclosure of any of Royal‘s resources or property; and sending or posting trade secrets or proprietary information outside the organization. Royal also had a cell phone “GPS Tracking Policy.” In accordance with that policy, “[e]mployees may not disable or interfere with the GPS (or any other) functions on a company issued cell phone,” nor may employees “remove any software, functions or apps.” R.8, Am. Compl., ¶ 18.
Kraft and Matthews abruptly resigned from Royal to take up employment with T-N-T Trailer Sales, one of Royal‘s Detroit-area competitors. Fearing that confidential company information might have been compromised, Royal launched an investigation. That hunch, the investigation later revealed, proved prescient. Shortly before his resignation, Kraft forwarded from his Royal email account to his personal one quotes for two Royal customers as well as two Royal paystubs. Kraft also contacted one of Royal‘s customers through Royal‘s email server to ask the customer to send “all the new vendor info” to Kraft‘s personal email account. With that, Kraft then deleted and reinstalled the operating system on his company-issued laptop, rendering all of its data unrecoverable. Eventually, Royal officials went to Kraft‘s home and took possession of the laptop as well as Kraft‘s company-issued cell phone.
Unamused, Royal hired a “forensics expert” to conduct a “comprehensive and costly damage assessment” in an effort to restore the deleted data on the now former employees’ devices. R.8, Am. Compl., ¶¶ 25–26. It later filed suit against Kraft and Matthews in federal court, alleging that their conduct violated the CFAA as well as Michigan law.
The district court, however, did not see things Royal‘s way. It concluded that because Kelly and Matthews were authorized to access the information obtained from their company-issued computers and cell phones, the two did not “exceed[]” their “authorized access,” as those terms are used in the CFAA, by later using the information accessed on those devices in violation of company policy. Royal filed a timely appeal.
ANALYSIS
Under our familiar standard for reviewing a district court‘s decision granting a motion to dismiss, we “construe the complaint in the light most favorable to the plaintiff, accept its allegations as true, and draw all reasonable inferences in favor of the plaintiff.” Jones v. City of Cincinnati, 521 F.3d 555, 559 (6th Cir. 2008) (quoting Directv, Inc. v. Treesh, 487 F.3d 471, 476 (6th Cir. 2007)). Against that backdrop, we ask whether the complaint “contain[s] sufficient factual matter . . . to ‘state a claim to relief that is plausible on its face.‘” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 570 (2007)).
The CFAA claims. As the basis for its federal claims against Kraft and Matthews, Royal invokes
1. Taking all of this together, to allege a violation of
We can narrow our focus even more. Royal acknowledges that Defendants had authorization to access company information through their company email accounts, and thus does not assert that Defendants’ access was without authorization. What remains for our resolution then is whether Defendants nonetheless “exceed[ed] [their] authorized access” by misusing the accessed information in violation of company policy.
In answering that question, we begin with the CFAA‘s definitional provisions. The Act defines “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain
Now the term “access.” It is commonly defined as some variation of “entry,” generally the initial entry into something. Dictionaries include several variations of “access,” one of which is “[t]he power, opportunity, permission, or right to come near or into contact with someone or something; admittance; admission.” Access, Oxford English Dictionary Online (3d ed. 2011). Another definition describes how “access” customarily is used in a digital setting: “[t]he opportunity, means, or permission to gain entrance to or use a system, network, file, etc.” A related definition describes “access” as “[t]he process or act of obtaining or retrieving data from storage.” Id. Further reflecting how “access” is used in our technology-based society, Oxford includes a sample use of the term, defining “[h]acking” as “the practice of gaining illegal or unauthorized access to other people‘s computers.” Id. (emphasis in original).
Reading these definitional provisions together, it follows that in utilizing the phrase “exceeds authorized access,” the CFAA targets one who initially “gain[s] entrance to . . . a system, network, or file” with “sanction or permission,” and then “gain[s] or attain[s]” “information” that, in the words of the statute, she is “not entitled so to obtain . . . .”
The CFAA‘s “damages” and “loss” provisions further confirm the Act‘s narrow scope. They too appear aimed at preventing the typical consequences of hacking, rather than the misuse of corporate information in the manner alleged by Royal. “Damages” is defined with reference to the “impairment to the integrity or availability” of data, programs, systems, or information.
Collectively, these interpretive clues defeat Royal‘s CFAA claims. The CFAA prohibits accessing data one is not authorized to access. United States v. Nosal, 676 F.3d 854, 858 (9th Cir. 2012). And Royal has not contested either Kraft‘s or Matthews‘s authorization to access the company files in question. Because Defendants had authorization to access that information, their conduct did not “exceed” their “authorized access,” as those terms are used in
Indeed, Congress surely knew how to say “exceeds authorized use” or otherwise proscribe using data for unauthorized purposes. See, e.g.,
We arrived at a similar conclusion as to the CFAA‘s scope in interpreting the phrase “without authorization” as used in
Given this plain understanding of the CFAA‘s terms, we need not rely on the rule of lenity, as Defendants urge. Statutory interpretation starts (and customarily ends) with the text of the statute. Out of respect for Congress‘s textual choices, we turn to the rule of lenity only when, unlike here, statutory language cannot otherwise be reconciled. See United States v. Adams, 722 F.3d 788, 804 n.8 (6th Cir. 2013) (the rule of lenity “comes into operation at the end of the process of construing what Congress has expressed, not at the beginning” (quoting Callanan v. United States, 364 U.S. 587, 596 (1961))). Nor is there need to resort to legislative history, an often treacherous path in its own right. See United States v. Woods, 571 U.S. 31, 46 n.5 (2013) (“Whether or not legislative history is ever relevant, it need not be consulted when, as here, the statutory text is unambiguous.“); Conroy v. Aniskoff, 507 U.S. 511, 519 (1993) (Scalia, J., concurring) (“[Legislative history] is not merely a waste of research time and ink; it is a false and disruptive lesson in the law. . . . The greatest defect of legislative history is its illegitimacy.“). But see United States v. Valle, 807 F.3d 508, 525 (2d Cir. 2015) (utilizing legislative history to conclude that the CFAA was intended to address hacking, as that history consistently references “trespass” into computer systems or data as the problem the Act was meant to remedy).
2. Our interpretation today, we acknowledge, might not be the final word. The Supreme Court recently granted certiorari in Van Buren v. United States, 940 F.3d 1192 (11th Cir. 2019),
That the Supreme Court agreed to hear Van Buren is likely a reflection of the lower court‘s dueling interpretations of this critical passage in the CFAA.
That said, today‘s decision is in tension with those from the First, Fifth, Seventh, Eighth, and Eleventh Circuits, all of whom have more broadly interpreted “exceeds authorized access.” Those courts read § 1030‘s statutory terms as encompassing situations where an employee has authorization to access company information but uses that information in violation of company policy. See United States v. Rodriguez, 628 F.3d 1258, 1263–64 (11th Cir. 2010) (holding that an employee exceeded authorized access by obtaining company information for non-business purposes); Int‘l Airport Ctrs., LLC. v. Citrin, 440 F.3d 418, 420 (7th Cir. 2006) (utilizing principles of agency law to find that an employee accessed his computer “without authorization” where his authorized access was terminated once he used the information improperly); United States v. John, 597 F.3d 263, 271–72 (5th Cir. 2010) (finding an employee liable for exceeding authorized access even where he had access for other purposes); EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 581–83 (1st Cir. 2001) (holding that a former employee exceeded authorized access by violating a confidentiality agreement and accessing his former employer‘s website).
In addition to being less faithful to § 1030‘s text, this latter interpretation has the odd effect of allowing employers, rather than Congress, to define the scope of criminal liability by operation of their employee computer-use policies. Had Congress intended the seemingly
Data deletion. One additional issue of federal law deserves mention. Royal also alleges that Kraft and Matthews deleted data from their work devices. And unlike the Royal customer information Kraft and Matthews were authorized to access for some purposes, Royal contends that Kraft and Matthews had no authorization to engage in data deletion.
As compared to misusing confidential information one is at least authorized to obtain, data deletion, in some circumstances, might fairly be characterized as more akin to “exceed[ing one‘s] authorized access.” But even if Kraft and Matthews “excee[ded their] authorized access” by deleting data from their company devices, Royal‘s complaint does not allege that the two “thereby obtain[ed] information from [a] protected computer,” a required element under
State-law claims. In the absence of a viable federal claim by Royal, the district court dismissed Royal‘s state-law claims without prejudice. It did so in accordance with the settled rule that when a district court dismisses all claims over which it has original jurisdiction (here the CFAA claims), it may also dismiss any state-law claims before it based on supplemental jurisdiction.
CONCLUSION
For the aforementioned reasons, we AFFIRM the judgment of the district court.
