ORDER
Pending is Defendants’ Motion to Dismiss. (Doc. 17.) This motion requires the Court to interpret the meaning of the terms “without authorization” and “ex *963 ceeds authorized access” in the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. The Court concludes that a violation for accessing a protected computer “without authorization” occurs only when initial access is not permitted. And, an “exceeds authorized access” violation occurs only when initial access to a protected computer is permitted but the access of certain information is not permitted. Thus, Defendants’ Motion to Dismiss will be granted.
BACKGROUND
Plaintiff Shamrock Foods Company (“Shamrock”) alleges that Defendant Jeff Gast began working for Shamrock in September 2000. (Compl. ¶ 19.) As an employee of Shamrock, Gast signed a Confidentiality Agreement, agreeing not to use or disclose “any trade secrets, confidential information, knowledge or data relating or belonging to” Shamrock. (Id.) On December 20, 2007, Gast was promoted to Regional Sales Manager of Southern Arizona. (Id. ¶ 28.) Around this time, Gast began employment negotiations with Defendant Sysco Food Services of Arizona, Inc. (“Sysco”), a competitor of Shamrock. (Id. ¶ 31.) On January 4 and 7, 2008, Gast emailed numerous documents containing Shamrock’s confidential and proprietary information to his personal email account. (Id. ¶¶ 32, 36.) The next day, Gast informed his manager that he was considering leaving Shamrock. (Id. ¶ 40.) On January 14, 2008, Gast told his manager that he was going to work for Sysco, and, on January 15, 2008, submitted a written resignation. (Id. ¶¶ 42-45.) Gast began employment with Sysco on January 18, 2008. (Id. ¶ 55.)
After Gast left Shamrock on January 15, 2008, Shamrock performed a forensic analysis of Gast’s computer at a cost exceeding $5,000.00 and discovered the emails that Gast sent to himself. (Id. ¶ 49.) Shamrock alleges that Gast was acting as an agent of Sysco when he assessed and emailed the confidential information. (Id. ¶¶ 50-52.) Further, Shamrock alleges that Gast provided this confidential information to Sysco and that Sysco is using this information to Shamrock’s detriment. (Id. ¶¶ 52-53.)
On February 3, 2008, Shamrock filed a complaint and motion for temporary restraining order. The complaint asserts that this Court has federal-question jurisdiction under the CFAA. Specifically, Shamrock brings CFAA claims under § 1030(a)(2), (4), and (5)(A)(iii). In addition to the CFAA claims, Shamrock brings a host of state common law and statutory claims. Defendants moved to dismiss the CFAA claims for failure to state a claim and the remaining state law claims for lack of subject matter jurisdiction.
STANDARD
“A Rule 12(b)(6) motion tests the legal sufficiency of a claim.”
Navarro v. Block,
DISCUSSION
I. Computer Fraud and Abuse Act
The CFAA makes it a federal criminal offense to engage in any one of seven prohibited activities. 18 U.S.C. § 1030(a). While the CFAA is primarily a criminal statute, it also provides a civil cause of action under § 1030(g):
Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the *964 violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in clause (i), (ii), (iii), (iv), or (v) of subsection (a)(5)(B).
The Ninth Circuit has clarified that subsection (g) enables a party to bring a private cause of action for any violation under the CFAA.
Theofel v. Farey-Jones,
It is a violation of § 1030(a)(2) when a person “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains ... information from any protected computer if the conduct involved an interstate or foreign communication.” Section 1030(a)(4) is violated when a person “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value.... ” Section (a)(5)(A)(iii) is violated when a person “intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage.... ” Thus, to state a claim under (a)(2) and (a)(4), Shamrock must allege conduct showing that Gast accessed a protected computer without authorization or exceeded authorized access. Unlike (a)(2) and (a)(4), which also prohibit a person from exceeding authorized access, (a)(5)(A)(iii) only prohibits access without authorization. Thus, to state a claim under (a)(5)(A)(iii), Shamrock must allege conduct showing that Gast accessed a protected computer without authorization.
Defendants do not deny that Gast accessed a protected computer. Instead, they argue that Gast was authorized to access the computer and information at issue. Shamrock concedes that “Gast may very well be correct that he was entitled to access Shamrock’s confidential and proprietary information while he was an employee.” (Doc. 28 at 9.) Nevertheless, Shamrock argues that Gast was no longer authorized to access its confidential information once he acquired the improper purpose to use this information to benefit himself and Sysco.
The parties’ dispute reflect two lines of cases interpreting the meaning of “authorization.” Some courts have applied principles of agency law to the CFAA and have held that an employee accesses a computer “without authorization” whenever the employee, without knowledge of the employer, acquires an adverse interest or is guilty of a serious breach of loyalty.
See e.g., Int’l Airport Ctrs., L.L.C. v. Citrin,
First, the plain language supports a narrow reading of the CFAA. The CFAA does not define the term “without authorization.” Nevertheless, “ ‘authorization’ is commonly understood as ‘[t]he act of conferring authority; permission.’ ”
Lockheed Martin Corp.,
Section 1030(e)(6) contemplates that an “exceeds authorized access” violation occurs where the defendant first has initial “authorization” to access the computer. But, once the computer is permissibly accessed, the use of that access is improper because the defendant accesses information to which he is not entitled. Under Citrin and Shurgard, however, that distinction is overlooked. Under their reasoning, an employee who accesses a computer with initial authorization but later acquires (with an improper purpose) files to which he is not entitled — and in so doing, breaches his duty of loyalty' — is “without authorization,” despite the Act’s contemplation that such a situation constitutes accessing “with authorization” but by “exceeding] authorized access.” 18 U.S.C. § 1030(e)(6). The construction of Citrin and Shurgard thus conflates the meaning of those two distinct phrases and overlooks their application in § 1030(e)(6).
Second, the legislative history supports a narrow view of the CFAA. The CFAA— originally called the Counterfeit Access Device and Computer Fraud and Abuse Act — was enacted in 1984. Pub.L. No. 98-473, § 2102(a), 98 Stat. 1937 (1984). The general purpose of the CFAA “was to create a cause of action against computer hackers (e.g., electronic trespassers).”
Werner-Masuda,
In 1986, “Congress amended the CFAA to substitute the phrase ‘exceeds authorized access’ for the phrase ‘or having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend.’ ”
Werner-Masuda,
By enacting this amendment, and providing an express definition for “exceeds authorized access,” the intent was to “eliminate coverage for authorized access that aims at ‘purposes to which such authorization does not extend,’ ” thereby “removing] from the sweep of the statute one of the murkier grounds of liability, under which a [person’s] access to computerized data might be legitimate in some circumstances, but criminal in other (not clearly distinguishable) circumstances that might be held to exceed his authorization.”
Id. at 499 n. 12 (quoting S. Rep. No. 99-432, at 21, 1986 U.S.C.C.A.N. at 2494-95) (alterations in original). This core language, basing violation of the CFAA on access without authorization and access exceeding authorization, remains unchanged. Compare Pub.L. No. 99-474, 100 Stat. 1213 (1986), with 18 U.S.C. § 1030.
While courts have struggled to distinguish between the terms “without authorization” and “exceeds authorized access,”
see, e.g., Citrin,
Finally, principles of statutory construction persuade the Court to adopt a narrower view of the CFAA. The rule of lenity guides the Court’s interpretation of the CFAA because it has both criminal and noncriminal applications.
See Leocal v. Ashcroft,
Given the plain language, legislative history, and principles of statutory construction, the restrictive view of “authorization” is adopted. “[A] violation for accessing ‘without authorization’ occurs only where initial access is not permitted. And a violation for ‘exceeding authorized access’ occurs where initial access is permitted but the access of certain information is not permitted.”
Davidson,
*968
Here, Gast was authorized to initially access the computer he used at Shamrock. Further, Shamrock conceded that Gast was permitted to view the specific files he allegedly emailed to himself. Gast did not access the information at issue “without authorization” or in a manner that “exceed[ed] authorized access.”
See Davidson,
II. State Law Claims
A district court may decline to exercise supplemental jurisdiction over state law claims if:
(1) the claim raises a novel or complex issue of State law,
(2) the claim substantially predominates over the claim or claims over which the district court has original jurisdiction,
(3) the district court has dismissed all claims over which it has original jurisdiction, or
(4) in exceptional circumstances, there are other compelling reasons for declining jurisdiction.
28 U.S.C. § 1367(c). This case raises a novel issue of state law regarding the inevitable disclosure doctrine; the state law claims substantially predominate over the CFAA claims; and the Court has dismissed all claims over which it has original jurisdiction. Therefore, the court will not exercise supplemental jurisdiction and will dismiss the state law claims for lack of subject matter jurisdiction.
Accordingly,
IT IS ORDERED Defendants’ Motion to Dismiss (Doc. 17) is GRANTED.
IT IS FURTHER ORDERED Plaintiffs Amended Emergency Motion for Temporary Restraining Order and Preliminary Injunction (Doc. 11) is DENIED AS MOOT.
IT IS FURTHER ORDERED the Clerk of Court shall close this case.
Notes
. It should also be noted that
Citrin,
This case is also factually distinguishable from
Citrin.
Here, the information accessed by Gast was not altered, damaged, or destroyed. Instead, it was allegedly used in an improper manner. Further, the employee in
Citrin
was not permitted to delete all the files on the laptop, only those containing confidential information.
