It's a dangerous business, reading the fine print. Nearly every website we visit features Terms of Service ("ToS"), those
I. BACKGROUND
This case centers on a few sections of the Computer Fraud and Abuse Act (CFAA), a law dedicated to "deterring the criminal element from abusing computer technology." H.R. Rep. No. 98-894, at 4 (1984). Plaintiffs directly challenge one section, referred to here as the Access Provision, which sweeps in the greatest amount of conduct. The Access Provision states that "[w]hoever ... intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains ... information from any protected computer ... shall be punished as provided in subsection (c) of this section."
The CFAA provides for a fine and/or imprisonment for up to one year upon a first violation of the Access Provision, or up to ten years for any further offenses.
Plaintiffs in this case are four professors and a media organization: Christian W. Sandvig of the University of Michigan; Kyratso "Karrie" Karahalios of the University of Illinois; Alan Mislove of Northeastern University; Christopher "Christo" Wilson of Northeastern University; and First
One way to determine whether members of protected classes are being discriminated against is to engage in "outcomes-based audit testing."
Plaintiffs plan to engage, and are engaging, in such audit testing. Sandvig and Karahalios are investigating whether computer programs that decide what to display on real estate websites discriminate against users based on race or other factors.
Similarly, Mislove and Wilson plan to conduct a study to see whether hiring websites' algorithms end up discriminating against job seekers based on protected statuses like race or gender.
Media Works and its journalists seek to investigate online companies, websites, and platforms, including by examining any discriminatory effects of their use of algorithms.
Mislove and Wilson plan to publish their findings in academic papers, and to bring the results of their research to the public.
Plaintiffs are all aware that their activities will violate certain website ToS.
Plaintiffs claim that they must either refrain from conducting research, testing, and investigations that (they argue) constitute protected speech or expressive activity, or else expose themselves to the risk of prosecution under the Access Provision of the CFAA.
II. DISCUSSION
We begin with the familiar standards that govern Rule 12(b) analysis. When facing a Rule 12(b)(1) motion to dismiss for lack of subject-matter jurisdiction, a plaintiff "bears the burden of showing that he has standing." Summers v. Earth Island Inst.,
To survive a motion to dismiss for failure to state a claim under Rule 12(b)(6), a complaint must "contain sufficient factual matter, accepted as true, to 'state a claim to relief that is plausible on its face.' " Ashcroft v. Iqbal,
A. THE INTERNET AS PUBLIC FORUM
At the outset, it is necessary to answer a question that affects both the standing and the merits inquiries in this case: what is the First Amendment status of the Internet? And, more particularly, what powers does the government possess to regulate activity on individual websites?
The government bases much of its argument that plaintiffs do not have standing, and that they have not alleged a First Amendment violation, on the premise that this case is about "a private actor's abridgment of free expression in a private forum." Reply in Supp. of Def.'s Mot. to Dismiss ("Def.'s Reply") [ECF No. 15] at 2; see Mem. of P. & A. in Supp. of Def.'s Mot. to Dismiss ("Def.'s Mem.") [ECF No. 10-1] at 10-13, 22-24. This argument finds some support in Supreme Court case law, which has rejected the First Amendment claims of individuals who wished to distribute handbills or advertise a strike in shopping centers against the wishes of the property owners. See Hudgens v. NLRB,
The answer is that, quite simply, the Internet is different. The Internet is a "dynamic, multifaceted category of communication"
With this special status comes special First Amendment protection. The Packingham Court applied public forum analysis to a North Carolina law that banned former sex offenders from using social media websites, employing intermediate scrutiny because the law was content-neutral. See
An analogy to the real world, while necessarily imperfect, may help illustrate the point. Stroll out onto the National Mall on any day with decent weather and you will discover a phalanx of food trucks lining the streets. Those food trucks are privately owned businesses. Customers interact with them for the private purpose of buying a meal. If they were a brick-and-mortar store on private property, they would encounter no First Amendment barrier to removing a patron who created a ruckus. Yet if a customer standing on a public sidewalk tastes her food and then yells at those in line behind her that they should avail themselves of the myriad other culinary options nearby, the truck could not call the police to arrest her for her comments. She is in a public forum, and her speech remains protected even when she interacts with a private business located within that forum.
It makes good sense to treat the Internet in this manner. "Each medium of expression ... must be assessed for First Amendment purposes by standards suited to it, for each may present its own problems." Se. Promotions, Ltd. v. Conrad,
At the same time, however, it would be ill-advised to "equate the entirety of the [I]nternet with public streets and parks."
What separates these examples from the social media sites in Packingham is that the owners of the information at issue have taken real steps to limit who can access it. But simply placing contractual conditions on accounts that anyone can create, as social media and many other sites do, does not remove a website from the First Amendment protections of the public Internet. If it did, then Packingham-which examined a law that limited access to websites that require user accounts for full functionality-would have come out the other way.
B. STANDING
Before reaching the merits of plaintiffs' claims, the Court must assure itself that they have standing-a sufficient stake to transform this dispute into one of the "Cases" or "Controversies" on which federal courts may pass judgment. U.S. Const. art. III, § 2. "The 'irreducible constitutional minimum of standing contains three elements': (1) injury-in-fact, (2) causation, and (3) redressability." Rainbow/PUSH Coal. v. FCC,
Because this is a pre-enforcement challenge, plaintiffs must meet more specific conditions to satisfy the injury-in-fact requirement. They must plausibly allege "an intention to engage in a course of conduct [1] arguably affected with a constitutional interest, but [2] proscribed by a statute, and [3] [that] there exists a credible threat of prosecution thereunder." Susan B. Anthony List v. Driehaus, --- U.S. ----,
Generally speaking, a court's standing analysis must be "especially rigorous when reaching the merits of the
1. "Arguably Affected With a Constitutional Interest"
Plaintiffs assert that their conduct falls within three categories of First Amendment-protected activity. Scraping data from their target websites, they allege, is subject to the First Amendment right to record or preserve information. Pls.' Mem. at 10-14. Moreover, employing bots and sock puppets and creating false user accounts constitute harmless false speech. Id. at 14-17. And their planned post-research activities are protected by the right to publish. Id. at 17-18. All of these claims are sufficiently plausible to conclude that plaintiffs' proposed conduct is "arguably affected with a constitutional interest." Driehaus,
First, scraping plausibly falls within the ambit of the First Amendment. "[T]he First Amendment goes beyond protection of the press and the self-expression of individuals to prohibit government from limiting the stock of information from which members of the public may draw." First Nat. Bank of Boston v. Bellotti,
Second, plaintiffs have a First Amendment interest in harmlessly misrepresenting their identities to target websites. The complaint alleges that plaintiffs' research requires them to create false employer and job-seeker profiles on employment websites, and to use sock puppets to make it appear to a number of housing and employment sites that multiple people are accessing the information they have made available. Compl. ¶¶ 88-93, 114-21. Because "some false statements are inevitable if there is to be an open and vigorous expression of views in public and private conversation," and because "[t]he Government has not demonstrated that false statements generally should constitute a new category of unprotected speech," false claims that are not "made to effect a fraud or secure moneys or other valuable considerations" fall within First Amendment protection. United States v. Alvarez,
Third, plaintiffs contend that they have the right, and the desire, to publish the results of their research, and that some sites' ToS prohibit them from doing so without prior permission or else employ anti-disparagement clauses. Pls.' Mem. at 17. The Supreme Court has made very clear that the right to publish falls within the core of the First Amendment's protections. See, e.g., Bartnicki v. Vopper,
The government raises two overarching objections to all of these alleged rights. It initially claims that the First Amendment does not regulate the decisions that private entities make about how to control access to their private websites-in other words, that there is no state action here. See Def.'s Mem. at 21-24; Def.'s Reply at 6-12; see also Columbia Broad. Sys., Inc. v. Democratic Nat. Comm.,
The government also claims that the First Amendment does not protect plaintiffs' conduct because, under Zemel v. Rusk,
Here, plaintiffs are not asking the Court to force private websites to provide them with information that others cannot get. Instead, they seek only to prevent the government from prosecuting them for obtaining or using information that the general public can access-though they wish to do so in a manner that could have private consequences, such as a website banning them or deleting their accounts. See Compl. ¶ 4 ("[Plaintiffs] have no intent ... to access any data or information that is not made available to the public."). Because plaintiffs neither want a special privilege of access nor seek to force websites
2. "Proscribed by a Statute"
Under D.C. Circuit precedent, "at the motion to dismiss stage, a plaintiff's non-frivolous contention regarding the meaning of a statute must be taken as correct for purposes of standing." Info. Handling Servs., Inc. v. Def. Automated Printing Servs.,
The government contests this conclusion in only one instance. In two sentences in its reply brief, the government claims that plaintiffs lack standing for any injuries relating to their ability to publish. As the government sees it, "[t]he Complaint contains no allegation that any website on which plaintiffs intend to conduct their activity contains" a restriction on future publication, "and plaintiffs lack standing to assert claims based on hypothetical circumstances." Def.'s Reply at 12.
This argument is unavailing. True, plaintiffs do not explicitly allege that their target websites restrict subsequent publication. But the complaint does allege that "[p]laintiffs wish to ... report on their findings to the public," and that "[t]he research, testing, and investigative methods they have designed would, if carried out, violate the [Access] Provision, because they all require violating the [ToS] of the targeted website." Compl. ¶¶ 134-35 (emphasis added); see also id. ¶ 160 ("Plaintiffs wish to have the option of publishing the results of their research, including any findings of discrimination, even if a target website's ToS prohibit doing so."). "[O]n a motion to dismiss we presum[e] that general allegations embrace those specific facts that are necessary to support the claim." Food & Water Watch, Inc. v. Vilsack,
3. "Credible Threat of Prosecution"
Even if plaintiffs' intended conduct is arguably affected with a constitutional interest, and is prohibited by the CFAA, plaintiffs still must show that there is a credible threat of prosecution for that conduct under the statute. See Driehaus,
However, both Supreme Court and D.C. Circuit precedent create a low standing bar in cases like this one. Because plaintiffs "challenge [a] law[ ] burdening expressive rights," and because their complaint provides "a credible statement ... of intent to commit violative acts," plaintiffs may rely on the "conventional background expectation that the government will enforce the law." U.S. Telecom Ass'n,
Here, there are sufficient indications of a credible threat to enforce the Access Provision, both in general and as applied to plaintiffs' activities. To begin with, the parties have sparred over whether DOJ has enforced the Access Provision specifically against harmless ToS violations. See Compl. ¶ 31; Def.'s Mem. at 14-17; Pls.' Mem. at 3-4, 25. Yet a number of cases have looked to whether the statutory provision as a whole-or at least the particular term being challenged-has been enforced through prosecutions, without asking whether the facts were similar to those the plaintiffs alleged. See, e.g., Holder v. Humanitarian Law Project,
Even looking more closely at similar factual scenarios, plaintiffs have shown that prosecutions have stemmed from close enough facts that it would be credible to fear a future prosecution for their own activities. Plaintiffs cite two cases in which individuals were prosecuted under the Access Provision for violating ToS agreements: United States v. Lowson, No. 10-cr-114 (KSH),
That the government brought the Drew case without enough evidence to ultimately prove the added harm required for a felony conviction, and chose to include a misdemeanor count for harmless ToS violations, lends some credibility to plaintiffs' fears of prosecution. The government also does not know whether prosecutors may have employed the Access Provision to obtain plea agreements in which defendants admitted to harmless ToS violations. See Tr. of Mot. Hr'g [ECF No. 20] at 17:15-18:13.
Finally, the government has not expressly disavowed any intent to prosecute plaintiffs, which would defeat the normal expectation of enforcement. The government points to a 2014 memorandum that the Attorney General sent to United States Attorneys regarding charging policy under the CFAA, which the government claims is the current "binding guidance" on this issue. Def.'s Reply at 14. According to the government, plaintiffs' fear of prosecution is "implausible" because (1) the charging policy focuses on several factors that would not apply to harmless ToS violations, (2) prosecutions based solely on such violations are discouraged, and (3) attorneys must consult with the Criminal Division of DOJ before making CFAA charging decisions.
One final point. Until now, this standing analysis has focused on plaintiffs' First Amendment challenge. But plaintiffs also bring due process claims. In Seegars v. Gonzales,
C. INTERPRETING THE STATUTE
Plaintiffs allege only constitutional claims in this case. Likely because they are bringing a pre-enforcement challenge, they are not claiming that the statute, properly read, does not apply to them. However, nearly all of their claims require the Court to determine the reach of the Access Provision before deciding the constitutional question. Since the Court does not accept plaintiffs' legal conclusions as true for purposes of a motion to dismiss under Rule 12(b)(6), see Doe v. Rumsfeld,
Courts are split as to how to read the relevant provisions. The CFAA defines the phrase "exceeds authorized access" as "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter."
At one point in their briefing, plaintiffs suggest a different dividing line: a limiting construction that carves out harmless ToS violations from the statute. Pls.' Mem. at 31-33, 35. However, "[t]he text will not bear such a reading." INS v. Yueh-Shaio Yang,
The question thus remains whether "exceeds authorized access" refers to access alone or to access, use, and other violations. The Court finds the narrow interpretation adopted by the Second, Fourth, and Ninth Circuits-and by numerous other district judges in this Circuit-to be the best reading of the statute. First, the text itself more naturally reads as limited to violations of the spatial scope of one's permitted access. To "exceed[ ] authorized access," one must have permission to access the computer at issue, and must "use such access"-i.e., one's authorized presence on the computer-"to obtain or alter information in the computer."
Legislative history also points to an access-based, rather than an intended-use-based, reading of "exceeds authorized access." The Second Circuit has already canvassed in great detail the congressional intent and history behind the definition of "exceeds authorized access," see Valle,
The amendment history of the definition supports this reading. The initial language of the CFAA applied to anyone who, knowingly "having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend, and thereby obtains information." Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, tit. II, ch. 21, § 2102(a),
Finally, plaintiffs raise numerous First and Fifth Amendment concerns with the Access Provision that would arise out of reading "exceeds authorized access" to include the purpose or use restrictions that appear in many ToS. When a court is "deciding which of two plausible statutory constructions to adopt," and when "one of them would raise a multitude of constitutional problems, the other should prevail." Clark v. Martinez,
Here, significant risks abound. By providing for both civil and criminal enforcement of websites' limitless ToS-including enforcement by the same entities that write the ToS-a broader reading of the CFAA "would appear to criminalize a broad range of day-to-day activity" and "subject individuals to the risk of arbitrary or discriminatory prosecution and conviction," raising Fifth Amendment concerns. United States v. Kozminski,
All of these factors, therefore, lead the Court to adopt a narrow reading of the term "exceeds authorized access."
This interpretation gets us far, but not all the way. At oral argument, both parties agreed that the Access Provision applies only to access restrictions. See Tr. of Mot. Hr'g at 19:17-20:3, 34:10-35:22. But they have very different ideas about what that means. The government treats this difference as a largely temporal one. It argues that "the moment the violation occurs is on access," so that subsequent usage of information lawfully obtained does not constitute a CFAA violation.
Applying this standard, it becomes clear that most of plaintiffs' proposed activities fall outside the CFAA's reach. Scraping or otherwise recording data from a site that is accessible to the public is merely a particular use of information
Out of plaintiffs' proposed activities, then, only Mislove and Wilson's plan to create fictitious user accounts on employment sites would violate the CFAA. Unlike plaintiffs' other conduct, which occurs on portions of websites that any visitor can view, creating false accounts allows Mislove and Wilson to access information on those sites that is both limited to those who meet the owners' chosen authentication requirements and targeted to the particular preferences of the user.
D. FREEDOM OF SPEECH AND FREEDOM OF THE PRESS
Plaintiffs first claim that the Access Provision violates the First Amendment's guarantees of freedom of speech and of the press.
1. Facial Overbreadth
Plaintiffs allege that the Access Provision "creates virtually limitless restrictions on speech and expressive activity," such that the statute "is unconstitutionally overbroad on its face." Compl. ¶ 183. In a typical facial challenge, plaintiffs must show " 'that no set of circumstances exists under which [the Access Provision] would
The government argues that plaintiffs have failed to state a plausible overbreadth claim. See Def.'s Reply at 18-19. The Court agrees. "The first step in overbreadth analysis is to construe the challenged statute; it is impossible to determine whether a statute reaches too far without first knowing what the statute covers." United States v. Williams,
Plaintiffs concede that a limiting construction would address their overbreadth concerns-though they contend that the Access Provision would need to be "construed not to reach [ToS] violations alone." Pls.' Mem. at 35. While the Court's reading of "exceeds authorized access" is not as narrow as the reading plaintiffs might prefer, it does eliminate many of the potentially unconstitutional applications of the Access Provisions. To be overbroad, a statute's unconstitutional scope must be "substantial, not only in an absolute sense, but also relative to the statute's plainly legitimate sweep." Williams,
2. As-Applied Challenge
Plaintiffs allege that, "[a]s applied to the[m]," the Access Provision "unconstitutionally restricts their protected speech." Compl. ¶ 184. "[T]o prevail on an as-applied First Amendment challenge," plaintiffs "must show that the [Access Provision is] unconstitutional as applied to their particular speech activity." Edwards v. District of Columbia,
Aside from the overarching objections that the Court has already rejected, the government's primary response to plaintiffs' as-applied claim is that the Access Provision regulates conduct, rather than speech, and is therefore subject to
Plaintiffs claim that the Access Provision allows websites to impose direct speech restrictions, including content-based restrictions, and that it is therefore subject to strict scrutiny. Pls.' Mem. at 34-35. However, the statute itself does not target speech, or impose content-based regulations, on its face. Nor have plaintiffs plausibly alleged that the government's purpose is to restrict speech based on its content or viewpoint. Indeed, while the government has not yet been able to proffer much evidence of the purposes behind the provision, the legislative history indicates that Congress was interested in passing the Access Provision to prevent the digital equivalent of theft. See S. Rep. 104-357, at 7 ("The proposed subsection 1030(a)(2)(C) is intended to protect against the interstate or foreign theft of information by computer.... This subsection would ensure that the theft of intangible information by the unauthorized use of a computer is prohibited in the same way
From the information available so far, significant interests appear to underlie the Access Provision. In addition to the legislative history regarding theft prevention, the government suggests that the Court analogize the CFAA to trespass law, arguing that Congress was also trying to prohibit the digital equivalent of trespassing. Def.'s Reply at 3-5. While plaintiffs dispute the trespass analogy, they recognize that the CFAA was passed to prevent computer theft and other cybercrime, and have not disputed that this is a significant interest. Pls.' Mem. at 31. The question is thus whether the statute fails narrow tailoring as applied to Mislove and Wilson's plan to "creat[e] profiles containing false information," Compl. ¶ 124, and "access[ ] websites using artificial tester profiles, in violation of [ToS] that prohibit providing false information," id. ¶ 154.
"To satisfy narrow tailoring, the [government] must prove the challenged regulations directly advance its asserted interests." Edwards,
Indeed, presuming the allegations in the complaint to be true, it appears that the government's interest "is not implicated on these facts" at all. Johnson,
E. RIGHT TO PETITION
In addition to their free speech and press claims, plaintiffs allege that the
These allegations are focused on ToS that restrict subsequent speech: disparagement, for instance, or use of the sites' information in court. However, such ToS constitute restrictions on the use of information, not on access to it. They therefore do not fall within the Access Provision's ambit, as properly interpreted. But even if one assumes that plaintiffs allege that access restrictions criminalized by the Access Provision violate the Petition Clause, see Compl. ¶ 162, plaintiffs' petition challenge is, at best, no stronger than their free speech challenge. Speech and petition rights are "generally subject to the same constitutional analysis," Wayte v. United States,
And it is on that free speech claim that plaintiffs' First Amendment case must rise or fall. The Speech and Press Clauses, rather than the Petition Clause, provide the more natural home for plaintiffs' concerns about the Access Provision. Plaintiffs assert that the CFAA "prevents them from engaging in" petitioning because some websites' ToS (and thus the Access Provision) "prohibit the speech necessary to engage in ... petitioning." Pls.' Mem. at 43. The real concern, then, is the Access Provision's alleged restrictions on speech, which have ripple effects in a variety of contexts. The application of the Access Provision to the petitioning process constitutes one small subset of the speech and conduct the provision allegedly prohibits. Any effect the statute might have on plaintiffs' petition rights, then, is an extra step removed from the central speech harm, and is thus too attenuated to state a plausible claim for relief.
Ultimately, "the Petition Clause protects the right of individuals to appeal to courts and other forums established by the government for resolution of legal disputes," and "[i]nterpretation of the Petition Clause must be guided by the objectives and aspirations that underlie the right." Borough of Duryea,
F. VAGUENESS
Plaintiffs next allege that the Access Provision violates the Due Process Clause because it is unconstitutionally vague. A statute is void if it is "[1] so vague that it fails to give ordinary people fair notice of the conduct it punishes, or [2] so standardless that it invites arbitrary enforcement." Johnson v. United States, --- U.S. ----,
Properly interpreted, however, the Access Provision is not unconstitutionally vague. "A plaintiff whose speech is clearly proscribed cannot raise a successful vagueness claim" based on a lack of fair notice. Expressions Hair Design v. Schneiderman, --- U.S. ----,
Nor can plaintiffs plausibly allege that the Access Provision invites arbitrary enforcement. "[A] statute's vagueness is either susceptible to judicial construction or is void for vagueness based on the application of traditional rules for statutory interpretation." United States v. Bronstein,
G. NONDELEGATION DOCTRINE
Finally, plaintiffs allege that the Access Provision violates the Fifth Amendment because it delegates the content of criminal law to private parties. Compl.
The D.C. Circuit has gleaned two rules from these cases. First, "[f]ederal lawmakers cannot delegate regulatory authority to a private entity." Ass'n of Am. R.Rs. v. U.S. Dep't of Transp. (Ass'n of Am. R.Rs. I),
Plaintiffs raise an intriguing argument, but it is ultimately an unsuccessful one. As with First Amendment overbreadth and vagueness, the courts can avoid nondelegation concerns by "giving narrow constructions to statutory delegations that might otherwise be thought to be unconstitutional." Mistretta v. United States,
Indeed, when read narrowly, the Access Provision looks similar to many criminal laws that are rendered operative by a private party's decision whether to authorize certain conduct. Examples cited in the government's brief, see Def.'s Mem. at 32-33, include criminal trespass laws, see
CONCLUSION
This case raises important questions about the government's ability to criminalize vast swaths of everyday activity on the Internet. However, the Court need not answer all of them today, because it concludes that the CFAA prohibits far less than the parties claim (or fear) it does. For the reasons explained above, plaintiffs have plausibly alleged that they have standing to sue, and that the Access Provision violates the Free Speech and Free Press Clauses of the First Amendment as applied to them. The government's motion to dismiss for lack of standing and on this single as-applied claim will therefore be denied. But the Access Provision, as the Court reads it, does not sweep widely enough to render plausible plaintiffs' First Amendment overbreadth and petition claims, or their Fifth Amendment vagueness and nondelegation claims. The government's motion to dismiss those claims, therefore, will be granted. A separate order will issue on this date.
Notes
This second step involves both crawling the profiles of ranked candidates to determine their demographic data and scraping to record the overall rankings. Compl. ¶¶ 114-16.
See Facebook, Facebook Ads, https://www.facebook.com/business/products/ads; Facebook, Marketplace, https://www.facebook.com/marketplace/learn-more.
See Packingham,
See Gericke v. Begin,
The government counters that Alvarez and the cases that follow it do not "address facially neutral statutes of general applicability, such as the CFAA." Def.'s Reply at 10. However, that goes to the standard of review on the merits rather than to whether plaintiffs' activities are imbued with any First Amendment interest at all.
For some other recent examples, see United States v. Batti,
It also matters that the CFAA is a civil as well as a criminal statute. The possibility of administrative or private civil actions, even without a threat of criminal prosecution, may buttress-or perhaps independently provide-standing for pre-enforcement challenges. See, e.g., Babbitt,
The government also offers the statement of the Deputy Assistant Attorney General for the Criminal Division before a congressional subcommittee in 2015, in which the DAAG stated that DOJ "has no interest in prosecuting harmless violations of use restrictions" and suggested amending the CFAA so that it would essentially only apply to the acts that currently give rise to a felony under the Access Provision. Statement of David M. Bitkower, Deputy Ass't Att'y Gen., Crim. Div., Dep't of Justice, Before the Subcomm. On Crime and Terrorism, S. Comm. on the Judiciary (July 8, 2015) [ECF No. 10-3] at 6. However, this is no stronger a disavowal than is DOJ's statement in its charging policy. Moreover, Congress never adopted DOJ's proposed amendments.
Compare Facebook, Inc. v. Power Ventures, Inc.,
Nor does the word "so," which has inspired a good deal of exegesis in prior opinions, see WEC Carolina,
A number of other courts have applied the rule of lenity to limit the scope of "exceeds authorized access." See Valle,
Professor Kerr argues that "a website that appears to require a username and password to access the contents of the site, but that actually grants access for any username and password combination," should not be seen as creating an access restriction, because it "would appear to a user to regulate by code, but would actually work more like a system of regulation by contract." Kerr, Cybercrime's Scope, supra, at 1646. The distinction between code-based and contract-based barriers matters for First Amendment analysis, see supra Part II.A, but it does not quite line up with the Court's reading of the CFAA. Social media sites like Facebook, for instance, grant access for any username and password combination, but they still allow those with accounts to access data that those who merely visit the site without signing up cannot. Hence, conditions placed on account creation can still be access restrictions.
Courts normally subject free speech and free press claims to the same level of scrutiny. See, e.g., Citizens United,
The standard that governs expressive conduct prohibitions with "incidental limitations on First Amendment freedoms," see United States v. O'Brien,
