ORDER DENYING MOTIONS FOR PARTIAL SUMMARY JUDGMENT
Before this Court are the Motion by NEC Electronics, Inc. for Summary Judgment on Plaintiffs’ Claims Under 18 U.S.C. § 1080 [56] and Defendant Toshiba America Information Systems, Inc. ⅛ Motion for Partial Summary Judgment on 18 U.S.C. § 1080 and Brief in Support [58], Having considered the motions, the responses, the replies to the responses, and the arguments of counsel, this Court DENIES the Motion by NEC Electronics, Inc. for Summary Judgment on Plaintiffs’ Claims Under 18 U.S.C. § 1080 [56] and Defendant Toshiba America Information Systems, Inc. ⅛ Motion for Partial Summary Judgment on 18 U.S.C. § 1030 and Brief in Support [58].
1. Facts and Procedural History
On March 5, 1999 Ethan Shaw and Clive D. Moon (collectively referred to as “Plaintiffs”) filed this class-action complaint on behalf of themselves and all others similarly situated against Toshiba America Information Systems, Inc. (“Toshiba”) and NEC Electronics, Inc. (“NECEL”). Why? Plaintiffs allege Toshiba and NECEL designed, manufactured, created, distributed, sold, transmitted, and marketed faulty, floppy-diskette controllers (“FDC’s”). How are they faulty? “An FDC designed and manufactured pursuant to relevant specifications will detect data errors and allow the control program to rewrite the affected data correctly. The FDC’s at issue in this case, instead, fail to detect the error, resulting in the storage of corrupt data or the destruction of data without the user’s knowledge.” Plaintiffs’ Second Amended Class Complaint [97] 8. Plaintiffs dub this a “boundary error.” Still a bit vague?
A properly designed and manufactured FDC that meets manufacturer specifications, however, will detect the boundary error conditions and assert an error status, which triggers the control program to rewrite the affected data correctly. Because of the defective microcode, Defendants’ defective FDC’s instead verify the erroneous data as correct without an error status, resulting in the storage of corrupt data or the destruction of data without notice to the control program or operating system and without the operator’s knowledge.
Local are network interface cards and sound cards are two examples of common DMA devices.
If a defective FDC is made to wait for data a few microseconds too long, because of competition for DMA, the defective FDC can cause corruption of data written to the attached device. If the wait for data is longer, a defective FDC can write the delayed data as the first byte 1 of the next physically adjacent data sector of a floppy diskette and destroy or “zero out” the remainder of data in that sector — all without reporting any error or notifying the control program or computer operator that data has been corrupted or destroyed. 2
Id. at 9-10. Indeed, the possibility of this boundary-error problem occurring increased when computers became capable of “multi-tasking” — that is, capable of performing several computer tasks at the same time. So Plaintiffs allege that if a computer is doing a bunch of stuff at the *929 same time the faulty FDC might stick the data in the wrong place; and it might stick it on top оf other data which, consequently, gets messed up by the misplaced, overwritten data. Finally, all of this data garbling goes undetected by the allegedly faulty FDC’s; this, in turn, means it goes undetected by the person sitting in front of the computer. “Therefore, Defendants’ FDC’s are not capable of notifying the control program of data corruption. Worse yet, defective FDC’s write corrupted data to the disk or other storage device and report to the computer operator that the data transfer was performed successfully.” Id. at 10.
On July 15, 1999 NECEL filed its Motion by NEC Electronics, Inc. for Summary Judgment on Plaintiffs’ Claims Under 18 U.S.C. § 1030 (“NECEL’s Motion for Summary Judgment”) [56] and Toshiba filed Defendant Toshiba America Information Systems, Inc. ⅛ Motion for Partial Summary Judgment on 18 U.S.C. § 1030 and Brief in Support (“Toshiba’s Motion for Summary Judgment”) [58]. 3 In these motions, NECEL and Toshiba urge this Court to grant partial summary judgment as to Plaintiffs’ claims under 18 U.S.C. § 1030 since there is no “transmission” of code. In the alternative, Toshiba urges this Court to grant partial summary judgment as to Plaintiffs’ claims under 18 U.S.C. § 1030 since Plaintiffs — as current owners of Toshiba’s computers — are not entitled to injunctive relief that would theoretically benefit future buyers of Toshiba’s computers. Toshiba’s Motion for Summary Judgment [58] 1-2. Finally, NECEL also urges it is entitled to summary judgment since “[t]here simply is no connection between Plaintiffs and NECEL on which to base liability.” 4 Toshiba’s Motion for Summary Judgment [56] 2 (emphasis in original). NECEL’s and Toshiba’s motions endorse an overly restrictive view of 18 U.S.C. § 1030 and a misunderstanding of the standing requirement for the facts presented; 5 and NECEL’s argument that there is “no connection” between it and the Plaintiffs is not entirely correct. So, the motions are denied.
2. Summary Judgment Standard
Rule 56(b) of the Federal Rules of Civil Procedure says: “A party against whom a claim, counterclaim, or cross-claim is asserted or a declaratory judgment is sought may, at any time, move with or without supporting affidavits for a summary judgment in the party’s favor as to all or any part thereof.”
Celotex Corp. v. Catrett,
The non-moving party does not overcome the absence of a genuine issue of material fact by simply “creating some metaphysical doubt as to the material facts,”
Matsushita Elec. Indus. Co. v. Zenith Radio Corp.,
3. Title 18 U.S.C. § 1030—
The Computer Fraud and Abuse Act
Title 18 U.S.C. § 1030 is the “Computer Fraud and Abuse Act.” Subsection 1030(a) (itself titled “Fraud and related activity in connection with computers”) sets out the particular, substantive offenses proscribed by the statute. 6 As Toshiba notes, Plaintiffs (for whatever reason) do not specify which of the seven subsections of § 1030(a) that Defendants allegedly violated. However, a brief review of the statute makes clear that Plaintiffs’ Second Amended Class Complaint [97] could only purport to allege a violation of subsection 1030(a)(5). 7
Subsection 1030(a)(5)(A) says:
Whoever ... knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage 8 without authorization, to a protect *931 ed computer 9 ... shall be punished in subsection (c) of this section.
Title 18 U.S.C. § 1030(a)(5)(A). This is a criminal statute; however, § 1030 creates a private right of action for activity found to violate it:
Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief.
Title 18 U.S.C. § 1030(g). So, this criminal statute creates a private right of action. 10 But does Defendants’ activity arguably violate Title 18 U.S.C. § 1030, thereby subjecting them to Plaintiffs’ private right of action? Specifically, does Title 18 U.S.C. § 1030(a)(5)(A) prohibit Defendants’ design, manufacture, creation, distribution, sale, transmission, and marketing of floppy-diskette controllers (“FDC’s”) allegedly made faulty by defective microcode? 11 Yes, it does.
This Court’s goal in interpreting the language of this particular statute — or any Congressional statute for that matter — is to give effect to Congress’ intent. Not surprisingly, “[t]he starting point for interpreting a statute is the language of the statute itself.”
Consumer Prod. Safety Comm’n v. GTE Sylvania, Inc.,
As Toshiba so eloquently notes,
12
“[fidelity to the plain meaning of the text is not boundless.”
Toshiba’s Motion for Summary Judgment
[58] 14. However, departure from the plain meaning of the text is not casually undertaken. If this Court “find[s] the terms of a statute unambiguous, judicial inquiry is complete, except in ‘rare and exceptional eircum-
*932
stances.’ ”
Garcia v. United States,
1. Transmission or No Transmission? Transmission.
Both NECEL and Toshiba argue Plaintiffs have failed to state a cause of action under Title 18 U.S.C. § 1030. Both Defendants argue the requisite “transmission” does not exist since a “transmission is not a code or command that originates and ends within a single computer.” See NECEL’s Motion for Summary Judgment [56] 16; see also Toshiba’s Motion for Summary Judgment [58] 2. Plaintiffs respond that they “state a cause of action under 18 U.S.C. § 1030 by alleging in their First Amended Complaint that Defendants did in fact knowingly transmit and are still transmitting microcode or instructions contained in floppy disk controllers [FDC’s], which microcode or instructions Defendants knew would cause the loss and corruрtion of data on computers used in interstate commerce.” Plaintiffs’ Response to Toshiba America Infomation Systems Inc. ⅛ Motion for Partial Summary Judgment Regarding 18 U.S.C. § 1030 (“Plaintiffs’ Response”) [73] 6 (emphasis in original). How? “TAIS [Toshiba] still transmits the microcode in the laptop computers they sell every day. Each new sale of a Toshiba computer is a new know *933 ing transmission of this defective FDC code to another unsuspecting consumer.” 13 Id. (emphasis in original). So, “for purposes of 18 U.S.C. § 1030, the issue is: ‘Who caused the transmission of the microcode at issue in this lawsuit from its author in Japan to each of the Toshiba laptop computers in the United States.’ ” Id. at 8 (emphasis in original). Well, under 18 U.S.C. § 1030(a)(5)(A) does a “transmission” of microcode have to be from one computer to another computer— i.e., a “hacking” into another computer? Or may a “transmission” of microcode under 18 U.S.C. § 1030(a)(5)(A) be from the drafting of defective microcode and the subsequent sale of FDC’s containing that microcode to consumers — i.e., a marketing of FDC’s allegedly made faulty by defective microcode?
First, this Court notes that to “transmit” means, in plain English, “to send or convey from one person or place to another ... to cause or allow to spread ... to convey (infection) abroad or to another.”
Webster’s Collegiate Dictionary,
10th ed. (1993). This is a rather broad definition— for it encompasses an inter-computer transfer of code (Defendants’ argument), an intra-computer transfer of code (Defendants’ initial interpretation of Plaintiffs’ argument),
14
and a marketplace transfer of code (Plaintiffs’ argument). That is, this definition of transmission would allow all three methods of “transmission” to potentially fall under Title 18 U.S.C. § 1030(a)(5)(A). However, merely opening the dictionary and quoting Webster would not follow the directives issued by the Supreme Court and the Fifth Circuit. The Supreme Court instructs this Court to define particular terms with reference to the specific context in which they are used.
Robinson v. Shell Oil Co.,
Thankfully, two other courts have already looked Title 18 U.S.C. § 1030(a)(5)(A) square in the eye — with particular focus on defendants’ attempts to define themselves out of the statute via narrow construction of the term “transmission.” The first case was
North Texas Preventative Imaging v. Eisenberg,
Under a previous version of Title 18 U.S.C. § 1030(a)(5)(A) — a version arguably more favorable to Defendants than the current version 15 — the district court examined the legislative history and found:
By casting the net broadly to include many different “transmission” techniques, the 1994 amendment shifted the CFAA’s focus from the act of unauthorized access to the intent of the defendant. The transmission of a disabling code by floppy computer disk may fall within the new language, if accompanied by the intent to cause harm.
Id. at *6. That is, the district court found “transmission” to include the development of destructive microcode in California, shipment of that destructive microcode via disk to a Dallas-based company, and downloading of that destructive microcode from the disk onto the Dallas-based company’s computer. Defendant MDI had not “hacked” into Plaintiff NTPI’s computers and installed the time bomb. Rather, Defendant MDI surreptitiously included the time bomb in one its regular “update disks” that Plaintiff NTPI itself loaded onto its own computer. Thus, Title 18 U.S.C. § 1030’s “transmission” included creation of destructive microcode in California, the shipment of that destructive microcode via computer disk to Texas, and the down-loading of that destructive microcode from the disk onto the computer in Texas.
The second case is Gomar Manf. Co. v. Novelli, C.A. No. 96-4000 (D.N.J. Jan. 28, 1998). In that case, the district court (like this Court) faced a motion for partial summary judgment on the plaintiffs claims under the Title 18 U.S.C. § 1030(a)(5)(A), the Computer Fraud and Abuse Act. In May of 1994, Plaintiff Gomar Manufacturing Company, Inc. (“Gomar”) bought a computer-controlled laminating machine from Defendant Geometric Machine & Design, Inc. (“Geometric”). Things got a little sticky when Plaintiff Gomar started having some problems with Defendant Geometric’s laminating machine, and Defendant Gomar started having some problems with Plaintiff Gomar’s payments (namely not getting them). Gomar alleged that, prior to delivery of the machine, Geo *935 metric surreptitiously loaded a “time bomb” onto the machine with a resettable trigger date which, if not continually advanced, would cause the laminating machine to malfunction. Gomar alleged that in November of 1995 the laminating machine — now victim to the exploded time bomb — suddenly and repeatedly failed. Plaintiff Gomar sued Defendant Geometric under various causes of action-one of which was a violation of Title 18 U.S.C. § 1080(a)(5)(A), the Computer Fraud and Abuse Act (the “CFAA”).
Under a previous version of Title 18 U.S.C. § 1030(a)(5)(A) — again a version arguably more favorable to Defendants 16 — the district court examined the statutory language, the legislative history, and the North Preventative decision and found:
no basis for concluding that disabling codes in the commercial context, even to prevent unauthorized use, are generally еxempt from the CFAA. Senator Le-ahy’s comments suggest, as the court in Noth Texas [North Preventative ] concluded, that undisclosed disabling codes such as the disabling code at issue here were intended to be covered by the Act. That reading of the legislative history is consistent with the plain language of the Act as amended in 1994 to impose liability for damaging transmissions made “without the authorization of the persons or entities who own or are responsible for the computer system receiving the program, information or code or command ...”
Gomar Manf. Co. v. Novelli, C.A. No. 96-4000 (D.N.J. Jan. 28, 1998).
That is, the district court found “transmission” to include Defendant Geometric’s loading of destructive microcode onto a computer laminating machine prior to the shipment and delivery of that laminating machine to Plaintiff Gomar. Defendant Geometric had not “hacked” into Plaintiff Gomar’s computer laminating machine and installed the destructive microcode. Rather, Defendant Geometric actuаlly loaded the destructive microcode onto the machine prior to the shipment and delivery of that machine to Plaintiff Gomar. Thus, Title 18 U.S.C. § 1030’s “transmission” included the shipment and delivery of pre-installed, destructive microcode, and the subsequent, automatic enablement of that pre-installed, destructive microcode.
First, this Court joins the
North Preventative
court in noting there are “very few cases which construe 18 U.S.C. § 1030 at all.”
North Texas Preventative Imaging v. Eisenberg,
Toshiba argues Congress never intended the CFAA to reach manufacturers; rather, the CFAA is geared toward criminalizing computer “hacking.” Setting the North Preventative and Gomar decisions aside, this Court does not see a blanket exemption for manufacturers in Title 18 U.S.C. § 1030; nor does it see the term “hacking” anywhere in this statute. Again, Subsection 1030(a)(5)(A) says:
Whoever ... knowingly causes the transmission of a program, information, code, or command, and as a result of such conduсt, intentionally causes damage without authorization, to a protected computer ... shall be punished in subsection (c) of this section.
Title 18 U.S.C. § 1030(a)(5)(A). First, Toshiba argues:
Plaintiffs interpretation ... removes the requirement that it be the “transmission” that results in damage. According to Plaintiffs, the statute is violated if a component containing a bug in the microcode — which could cause “damage” to a computer no matter where the computer is located — is transported from one location to another ... Presumably ... a component that is not placed into interstate commerce, but which contains a bug in the microcode, would not give rise to liability, because there has ostensibly been no “transmission” of the component — even though the microcode could still “damage” the user’s computer.
Defendant Toshiba America Information Systems, Inc.’s Reply to Plaintiffs’ Response to TAIS’ Motion for Partial Summary Judgment (“Toshiba’s Reply”)
[73] 4. Not nеcessarily. Toshiba urges an all or nothing interpretation of “transmission” — either transmission is wholly
outside computers
via marketplace transfer or wholly
inside computers
via inter-computer communication.
18
Well, if the requisite intent is there, why not both? “The principle of strict construction of criminal statutes does not mean that they must be given their narrowest possible meaning.”
Singer v. United States,
2. Plaintiffs Have Standing.
Plaintiffs seek an injunction requiring Toshiba “to advise all potential purchasers that computers they have manufactured can corrupt and destroy data without warning ...” Plaintiffs’ Second Amended Complaint [97] 13. Toshiba argues Plaintiffs do not have standing to seek this requested, injunctive relief. “[N]either of the two named Plaintiffs are ‘potential’ purchasers; both have allegedly purchased computers manufactured by one or both of the defendants. As a result, Plaintiffs do not have standing to seek injunctive relief on behalf of ‘potential purchasers’ of the defendants’ computers.” Toshiba’s Motion for Summary Judgment [58] 21.
Plaintiffs respond that Title 18 U.S.C. § 1030(g) specifically authоrizes their request for injunctive relief:
any person who suffers damage or loss by reason of a violation of the section ... may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief.
Title 18 U.S.C. § 1030(g) (emphasis added). But authorization for injunctive relief and standing to assert it are not one in the same. To bring a claim for injunctive relief, a plaintiff must “show that he ‘has sustained or is immediately in danger of sustaining some direct injury’ as a result of the challenged ... conduct.”
Armstrong v. Turner Indus., Inc.,
Here, Plaintiffs have both authority to seek injunctive relief and standing to assert it. First, Plaintiffs are presently in the pool of prospective purchasers of Defendants’ personal computers. Apparently, Toshibа would have this Court hold Plaintiffs do not have standing to assert a *938 claim under Title 18 U.S.C. § 1030 as “potential purchasers” merely because they already purchased Defendants’ computers. But Plaintiffs’ proposed class includes “potential purchasers” for a very simple reason: had Plaintiffs’ proposed class sought to include “current owners” of Toshiba computers, Defendants could simply argue Plaintiffs lack standing to seek the requested relief of notice since they already know about the allegedly defective FDC (for how else could they complain about the defect if they didn’t already know about it?). To prevent this catch — 22, the proposed class includes “potential purchasers,” and Plaintiffs are precisely that— potential purchasers of Defendants’ computers. 21 More important, Plaintiffs’ exposure to the allegedly corrupted data from other Toshiba computers is ever present. Plaintiffs allege:
The damage caused by the FDC’s faulty microcode would include an impаirment of the integrity or availability of data, or information that impairs or potentially impairs the medical examination, diagnosis, treatment, or care of one or more individuals or threatens the public health or safety. When doctors cannot trust the medical data in their computers or the test results they receive from the lab; when engineers cannot depend on the data they use to design our bridges, skyscrapers, dams, and commercial airliners, Defendants pose a clear risk to public health and safety.
Plaintiffs’ Response to Toshiba’s Motion for Summary Judgment [73] 23. Toshiba is currently the number-one provider of laptop computers in the United States. Toshiba’s dominance of the computer market, combined with the considerable penetration of the defective microcode into computers via the ubiquitous FDC’s allegedly containing the defective microcode, ensures Plaintiffs’ exposure to the effects of faulty data allegedly generated by Defendants’ conduct. It is unnecessary for someone to lack a computer in order to be a “potential purchaser” of one. Similarly, it is not necessary for someone to actually own a defective computer in order to experience continuing, adverse effects from it. 22
3. NECEL’s Connection to the Plaintiffs — Computer History 101.
NECEL joins Toshiba in arguing Title 18 U.S.C. § 1030’s application reaches only computer “hackers” and not manufacturers; but it departs Toshiba in arguing “[t]here simply is no connection between Plaintiffs and NECEL on which to base liability.” NECEL’s Motion for Summary Judgment [56] 2 (emphasis in original). NECEL is a California corporation in the business of selling semiconductor devices manufactured by its parent corporation, NEC Corporation of Tokyo, Japan (“NEC-TOK”). NECEL has sold FDC’s, but never to Toshiba or any Toshiba affiliate. NECEL has never designed an FDC; and, except for packaging, it has never manufactured an FDC. So what’s NECEL doing in this lawsuit?
NECTOK first produced the (micro)PD765 FDC in 1978 — -the dawn of the computer age. Apple, Commodore, and Tandy had just introduced the personal computer in 1977; and IBM would not enter the personal computer market for another three years. In December of 1986, NECTOK first became aware of the boundary-error problem within its (micro)PD765 FDC — -which by then included model numbers (micro)PD765A, (micro)PD765A-2, and 72065 (collectively referred to as the “A-version FDC’s”). 23 In *939 March 1987, NECTOK notified NECEL’s largest customer, IBM, of the boundary-error problem and NECTOK’s plan to fix it. 24 On October 2, 1987 NECTOK and its overseas affiliates notified all FDC customers of the boundary-error problem. They also posted notice on NECTOK’s communications network and later on its website, <http://nesdisw.ic.nec.co.jp>, where it remains today in both Japanese and English. Then, in late 1987, NECTOK produced the “B-version” of the (micro)PD765 FDC — a version which fixed the boundary-error problem experienced by the “A-version” FDC’s. Volume production of the new “B-version” of the (micro)PD765 FDC ((micro)PD765B and 72065B) began in 1988. But some customers elected to continue using the “A-vеrsion” FDC’s, understanding they needed to keep their systems within certain timing specifications to avoid the boundary-error problem still contained within their older, “A-version” FDC’s driven by the defective microcode. 25
In 1990 NECEL began marketing its latest “B-version” of NECTOK’s FDC (embodied in the further improved (micro)PD72064) as multitasking 26 ready, whereas its imitators were not. In November 1990 NECEL launched a colorful “Multitasking Murder Mystery” advertising campaign that warned computer-system manufacturers that some “765-com-patible” FDC’s had a “killer bug” that could result in “Dastardly deeds done in disk drives.” For customers moved by the ad, NECEL provided a diagnostic disk to test whether the FDC’s they were using had the defective microcode and, consequently, were subject to the boundary-error problem. The solution, of course, was to switch to NEC’s new FDC’s which did not have the defective microcode and, consequently, were capable of taking on the challenges of multitasking. The advertising campaign ended in Nоvember of 1991; and NECEL sold its last batch of “Aversion” FDC’s in 1993, when it sold two hundred and thirty (230) pieces. Today, NECEL makes only semiconductors containing the “B-version” FDC’s. As for the older “A-version” FDC’s, NECEL merely keeps a few, old parts to provide replacements to customers who continued to use the “A-version” FDC’s despite the boundary-error problem. So, it seems like NECEL should not be in this lawsuit. So it seems ...
NECEL’s 765 FDC’s were immensely popular in the 1980’s; and NECEL suspected many companies, like Toshiba, were copying the NECTOK (micro)PD765 FDC. So, in 1985 NECTOK accused Toshiba of illegally copying its (micro)PD765 FDC; of course, Toshiba denied this allegation. But in 1986 NECTOK and Toshiba executed an agreement settling their dispute. This agreement provided that neither would sue or assert its patent, copyright, or maskwork rights against the other’s FDC’s specified in the agreement 27 Under this “antipirating-type agreement,” Toshiba agreed to pay NECTOK an eight percent (8%) royalty on its internal and external sales of specified FDC’s. Later, in *940 1989, the parties amеnded the agreement to include Toshiba’s newer FDC’s and provided a royalty of seven percent (7%) for Toshiba’s newer FDC’s and semiconductors based on the accused, pirated core. Of course, as NECTOK’s chips were allegedly “pirated” by Toshiba, NECEL did not provide any FDC designs to Toshiba; nor did NECEL review or approve any Toshiba designs; nor did NECEL test any FDC’s for Toshiba; nor did NECEL permit Toshiba to put the NEC name on any Toshiba products or authorize Toshiba to represent that its FDC’s were “NEC-compatible” or “765-compatible.”
So, is there a connection between NECEL and the Plaintiffs? Yes, there is. At this point it’s necessary to return to the statute at issue in this litigation — Title 18 U.S.C. § 1030. This is a criminal statute. “It is a general principle of causation in criminal law that an individual (with the necessary intent) may be held liable if he is a cause in fact of the criminal violation, even though the result which the law condemns is achieved through the actions of innocent intеrmediaries.”
United States v. Kelner,
NECEL seeks exclusion from this lawsuit because it never designed, manufactured, or owned any intellectual property rights to any FDC design. Well that’s a red herring. The issue in this case is not the transmission of FDC’s— it’s the transmission of defective microcode subsequently contained within the FDC’s. NECEL’s incredible success with its “A-version” FDC’s — FDC’s containing the allegedly defective microcode — apparently spawned copy-cat versions themselves containing the defective microcode. Indeed, the “anti-pirating” agreement between NECTOK and Toshiba fosters the continued transmission of the defectivе microcode to this very day. Apparently, NECTOK and, most likely, NECEL have profited and continue to profit from the royalties earned from the NECTOK-To-shiba “anti-pirating” agreement. Regardless whether NECTOK and NECEL profited from the sale of FDC’s allegedly containing the defective microcode, it seems most plausible that NECTOK and NECEL could have foreseen the transmission of the defective microcode via the marketplace transfer of FDC’s containing the very same, defective microcode NEC-TOK had just claimed was “illegally copied” from it by Toshiba. 28 So NECEL did not provide any FDC designs to Toshiba; so NECEL did not review or approve any Toshiba designs; so NECEL *941 did not test any FDC’s for Toshiba; so NECEL did not permit Toshiba to put the NEC name on any Toshiba products or authorize Toshiba to represent that its FDC’s were “NEC-compatible” or “765-compatible.” So what. NECTOK and NECEL could have foreseen the transmission of the defective microcode via the mаrketplace transfer of FDC’s containing the very same, defective microcode NEC-TOK had just claimed was “illegally copied” from it by Toshiba. The fact that an intermediary — Toshiba (be it innocent or not) — was used to allegedly violate Title 18 U.S.C. § 1030 does not relieve NE-CEL from liability since it could have reasonably anticipated the subsequent transmission of the defective microcode. 29
4. Conclusion
First, NECEL’s and Toshiba’s motions endorse an overly restrictive view of Title 18 U.S.C. § 1030’s “transmission.” “Transmission” includes the design, manufacture, creation, distribution, sale, transmission, and marketing of floppy-diskette controllers (“FDC’s”) allegedly made faulty by defective microcode. Setting the North Preventative and Gomar decisions aside, this Court refuses to hog-tie Title 18 U.S.C. § 1030 — and, consequently, Congress — with overly restrictive, statutory interpretations generated by semantic parsing designed to inject technicalities where none exist. Further, Toshiba’s motion reflects a misunderstanding .of the standing requirement for the faсts presented. Toshiba’s dominance of the computer market, combined with the considerable penetration of the allegedly defective microcode into these computers via the FDC’s, ensures Plaintiffs’ exposure to the effects' of faulty data allegedly generated by Defendants’ conduct — regardless whether Plaintiffs currently own one of Defendants’ computers, are thinking about buying one of Toshiba’s computers, or are commuting to work over a bridge with design specifications tainted by allegedly faulty FDC’s misguided by the defective microcode. Finally, NECEL’s argument that there is “no connection” between it and the Plaintiffs is simply incorrect. NE-CEL marketed defective microcode which its parent, NECTOK, generated. According to NECEL, Toshiba “illegally copied” this defective microcode and incorporated it into its FDC’s. As a result of the popularity of its “A-version” FDC’s, NECTOK executed a royalty agreement which аctually rewarded NECTOK and, quite possibly, NECEL for the transmission of the allegedly faulty microcode — albeit under the guise of the Toshiba name. Even if NECEL did not profit from this royalty agreement, it most likely benefitted from Toshiba’s decreased sales hampered by the sale of computers with defective microcode *942 initially generated by NECTOK, marketed by NECEL, and then “fixed” by NEC-TOK’s “B-version” FDC’s marketed by NECEL as correcting a problem that, in reality, NECTOK had created and NE-CEL had marketed.
For these reasons, this Court DENIES the Motion by NEC Electronics, Inc. for Summary Judgment on Plaintiffs’ Claims Under 18 U.S.C. § 1080 [56] and Defendant Toshiba America Information Systems, Inc. ⅛ Motion for Partial Summary Judgment on 18 U.S.C. and Brief in Support [58].
It is SO ORDERED.
Notes
. A byte is an eight-bit segment of data. In typical computer usage, it usually represents one character, such as "A” or "z” or "7.”
. So, the competition between a CD and a defective FDC for the DMA can cause the defective FDC to zero-out data.
. On the same day NECEL filed its Motion by NEC Electronics, Inc. for Summary Judgment on Plaintiffs' Claims for Breach of Contract, Breach of Warranty, and Revocаtion of Acceptance [55]. This Court addresses NECEL's Motion by NEC Electronics, Inc. for Summary Judgment on Plaintiffs’ Claims for Breach of Contract, Breach of Warranty, and Revocation of Acceptance [55] in a separate order.
. The arguments presented by NECEL and Toshiba overlap considerably, but not completely. For example, both NECEL and Toshiba argue Plaintiffs fail to meet Title 18 U.S.C. § 1030’s requisite transmission since the statute was only intended to reach computer "hackers.” However, Toshiba individually argues Plaintiffs do not have standing to seek their requested, injunctive relief; while NECEL individually argues there is “no connection” between it and the Plaintiffs.
.A standing mis-understanding, if you will.
. This particular statute was actually born in 1984 as the "Counterfeit Access Device and Computer Fraud and Abuse Act of 1984." Pub.L. No. 98-473, 98 Stat. 2190. Prior to 1984, Congress relied on the mail and wire-fraud statutes to combat computer crime. However, the mail and wire-fraud statutes were often incapable of combating computer crime that did not invоlve interstate commerce. Thus, Congress enacted Title 18 U.S.C. § 1030; and it amended it in 1986, 1988, 1989, 1990, 1994, and 1996.
. As Toshiba points out, there simply are no allegations in Plaintiffs’ Original Class Complaint [1] to support the violation of any other subsection of § 1030. Subsections 1030(a)(1) through 1030(a)(4) do not apply because each requires Defendants to have knowingly or intentionally "accessed” a computer without authorization (or exceeding the scope of authorization) and obtained sensitive information. Title 18 U.S.C. § 1030(a)(l)-(4). Moreover, there is no allegation that Defendants improperly obtained the specific types of information protected by subsections 1030(a)(1) through 1030(a)(4). Id. Subsection 1030(a)(6) does not apply because there are no allegations that Defendants intended to "traffic[ ] ... in any password or similar information through which a computer may be accessed without authorization.” Id. Finally, subsection 1030(a)(7) does not apply because there are no allegations that Defendants intended to "extort ... any money or other thing of value” and subsequently transmitted "any communication containing any threat to cause damage to a protected computer.” Id. This leaves subsection 1030(a)(5) — and there are allegations to support the violation of this subsection.
."Damage” is the “any impairment to the integrity or availability of data, a program, a system, or information ...” that causes an aggregate loss of five thousand dollars ($5,000.00) in a one-year period. Title 18 U.S.C. § 1030(e)(8).
. A "protected computer” includes a computer "which is used in interstate or foreign commerce or communication.” Title 18 U.S.C. § 1030(e)(2)(B).
. Obviously, everyone concedes Title 18 U.S.C. § 1030 creates a private right of action. The dispute lies in whether Defendants' activity falls under this statute — not whether a private right of action actually exists under it.
. Incidentally, for purposes of this summary judgment motion, NECEL concedes the existence of the boundary-error prоblem. See NECEL's Motion for Summary Judgment [56] 3 ("... for purposes of this summary judgment motion, it [NECEL] will concede an 'overrun' detection bug or defect.”).
. All parties submitted exceptional briefs.
. It is noteworthy that Defendants interpret "transmission” narrowly — with particular emphasis on the technicalities of computer programming. On the other hand, Plaintiffs interpret "transmission” more broadly — with particular emphasis on the pragmatics of applying the statute to defendants’ activity.
. Apparently, Defendants first read Plaintiffs' allegations as the requisite "transmission” occurring within a single computer as the defective microcode communicated with the FDC, which, in turn, improperly communicated to the attached device (i.e., the floppy disk). Subsequent briefing by Plaintiffs clarified that the requisite "transmission” encompassed the transmission of the defective microcode itself.
. In 1994 Title 18 U.S.C. § 1030(a)(5)(A) read:
[Whoever] through means of a computer used in interstate commerce or communications knowingly causes the transmission of a program, information, сode, or command to a computer or computer system ... [commits an offense if other conditions are met]
Title 18 U.S.C. § 1030(a)(5)(A) (1994 version) (emphasis added). In 1996 Congress amended subsection 1030(a)(5)(A) by deleting the qualifying phrase "through means of a computer used in interstate commerce or communications.” Although this Court finds the statute unambiguous and an examination of the legislative history improper, it notes in passing that Congress' deletion of this qualifying phrase arguably removed the need for computer-to-computer ‘ 'transmission."
. See supra., fn. 15.
. Again, although the statute is unambiguous and examination of the legislative history is improper, it notes in passing that Congress considered the fluid nature of computer crime and the difficulty in drafting a rigid law capable of catching all defendants with technical *936 ingenuity and the requisite intent. In the 1989 subcommittee hearings, Senator Leahy noted "hidden programs can destroy and alter data.” The Impact of Computer Viruses and other Forms of Computer Sabotage and Exploitation on Computer Information Systems and Networks: Hearing Before the Subcommittee on Technology and the Law of the Committee on the Judiciary, 101st Cong. (1989), at 1. He remarked: "You know, this is an area that changes all the time. Answers we have today may well be different a year or so from now. The questions, I am sure, will be different.” 1989 Hearings, at 12. Senator Leahy continued:
On the day that we pass a law, we are, in effect, taking a snapshot of what we know that day.
But however we draw it, somebody is going to sit down and say, well, look, I am just going to create a variation not covered by the statute. I am not sure all of us, putting our best minds together, could come up with every variation on a law that might get enacted some time this year to cover some new variation next year.
1989 Hearings, at 34.
. For example, Defendants argue a computer that contains destructive microcode could avoid having "transmitted” the microcode if the computer is never shipped in interstate commerce. Aside from the fact that this hypothetical computer necessarily moved in interstate commerce prior to the transmission of the damaging microcode, the emphasis should be on the transmission of the destructive microcode — not the physical location of the computer that contains it. If the destructive microcode is transmitted to or from that computer by a defendant with the requisite intent, then such activity would properly fall under the statute regardless whether the defendant actually put the computer in his car and drove it up and down the interstate highway across state lines.
. Toshiba alternatively argues that even if a code or command within a single computer constitutes a “transmission,” the FDC’s allegedly “failed to send code or commands to other components ... [and][a] ‘transmission’ is not a failure to send a particular code or command.” Id. Again, the emphasis should be on the transmissiоn of the damaging microcode, whether it be in the form of a floppy disk loaded with destructive microcode, a laminating machine loaded with destructive microcode, or FDC's loaded with destructive microcode. The reason the FDC "failed” to send code to other components, is because defective microcode was allegedly authored in Japan and transmitted to computers in the United States.
. And lo, the hog is set free.
.It goes without saying (or maybe not) that Plaintiffs, although current owners of Defendants’ computers, may indeed be future purchasers of other computers containing FDC's allegedly infected with the defective microcode.
. It the nay-sayers and army surplus vendors are right, just wait until Y2K to see this proposition proven true with a vengeance.
. NECEL calls the boundary-error problem an "overrun detection defect or bug.” See NECEL’s Motion for Summary Judgment [56] 3. For simplicity, this Court will continue to *939 refer to the defect as a "boundary-error problem.” See supra, pp. 928-29.
. Why IBM? The boundary-error problem was particularly important to IBM since it was working on the OS/2 operating system — a system capable of multi-tasking and, consequently, increasing the possibility for the boundary-error problem to occur. See supra, p. 929.
. Specifically, customers continuing to use the defective "A-version” FDC’s needed to keep their systems’ data request (“DRQ”)— data acknowledgment ("DACK”) signals strictly within the NEC timing specifications. The NEC User’s Manuals for the (micro)PD765A/765B and (micro)PD765/72065B explained the boundary-error problem in the "A-version” FDC's and cautioned customers to stay within NEC’s timing specifications.
. See supra, p. 929.
. Plaintiffs’ counsel, Mr. Hubert Oxford, accurately described the NECTOK-Toshiba agreement as a "you won’t sue me for using these chips, an antipirating-type agreement.” Transcript of June 24, 1999 Hearing on Objections to Initial Disclosures at p. 31, II. 14-15.
. How convenient for NECTOK to create, and NECEL to market, the "A-version” FDC's with defective microcode, have those FDC's copied by competitors, and enter into antipi-rating-type agreements to actually get paid for competitors using defective microcode that NECTOK and NECEL сreated and marketed. How even more convenient for NECTOK and NECEL to detect the boundary-error problem, correct it with its new "B-version” FDC’s, and market these new "FDC's as correcting the 'competitors'" boundary-error problem amplified by the development of multitasking — a boundary-error problem that NECTOK and NECEL created, marketed, and passed on to its competitors. All of sudden the "Multitasking Murder Mystery” is not such a mystery after all.
. Indeed, not only could NECEL have anticipated the subsequent transmission of the defective microcode, it had proof-positive that transmission had occurred. How’s that? The only way NECTOK and NECEL could get royalty checks from Toshiba would be for the sale of FDC’s — FDC's that allegedly contained the "illegally-copied,” defective microcode created by NECTOK and marketed by NECEL. In a way, Toshiba actually paid NECTOK and NECEL to transmit defective microcode. NECEL argues it would not intentionally market this defective microcode since, to do so, would be "suicide” in the computer market. Well, as NECEL points out, it was Tоshiba’s name plastered all over the FDC’s allegedly containing the defective microcode. NECEL, in the business of selling laptop computers, wants to sell more of those laptop computers. If Toshiba’s (and other competitors’) sale of computers falls due to a reputation damaged by concern over FDC’s allegedly made faulty by defective microcode (defective microcode created and passed on by NECTOK and NECEL, nonetheless), then NECEL gets to sell that many more laptop computers, all while touting the superiority of its "B-version” FDC’s in light of the inferior “A-version” FDC’s which, although created by NECTOK and marketed by NECEL, have the Toshiba name plastered all over it. Certainly, the White Star Line would have happily painted "Carnival Cruise Lines” all over the Titanic had it known the ship’s rudder was too small, there were too few lifeboats, and the captain was going to speed in the dark of night through the Atlantic shipping lane which, at that time, was an impassable slalom course of icebergs.
