954 F. Supp. 2d 769 | C.D. Ill. | 2013
ORDER & OPINION
This matter is before the Court on Defendant Kevin Morgan’s Motion for Summary Judgment as to Plaintiffs claims against him under Count I of the Amended Complaint. (Doe. 273). For the reasons stated below, the Motion is granted. In addition, the Court herein clarifies the current status of Count III of the First Amended Complaint.
Legal Standard
Summary judgment should be granted where “the pleadings, the discovery and disclosure materials on file, and any affidavits show that there is no genuine issue as to any material fact and that the movant is entitled to judgment as a matter of law.” Fed. R. Crv. P. 56(c).
In his First Amended Complaint, Plaintiff claims that Defendants violated the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2511, the Illinois Eavesdropping Statute, 720 III. Comp. Stat. § 5/14-1 et seq., and the Stored Communications Act (“SCA”), 18 U.S.C. § 2701 by intercepting, monitoring, and/or accessing (1) his Access2Go-provided email account, (2) his Yahoo! web-based email account, and (3) his text messages on his Blackberry device.
Count I: ECPA
—Whether Access2Go authorized Defendants’ interception of Plaintiffs Access2Go email such that the interception was in the ordinary course of Access2Go’s business
—Whether Plaintiff consented to interception of either the Access2Go or Yahoo! email accounts
Count II: Illinois Eavesdropping Statute
—Whether Plaintiff had a reasonable expectation of privacy in any of the communications
Count III: SCA
—Whether Defendants accessed Plaintiffs Yahoo! email
The instant Motion for Summary Judgment addresses Plaintiffs claims under Count I against Defendant Morgan. As discussed further below, throughout this litigation the claims against Defendant Morgan have revolved around theories of “secondary” liability; Plaintiff has alleged that Morgan directed the other Defendants to engage in the various forms of monitoring alleged. The Court has had occasion to mention this “secondary” liability in other Orders, and has assumed, because neither party disputed it, that such liability could be available; the Court has never addressed the question now at issue, whether the ECPA actually provides for “secondary” civil liability.
I. Nature of Defendant Morgan’s Motion for Summary Judgment
Responding to Defendant Morgan’s Motion for Summary Judgment, Plaintiff first complains that Defendant Morgan has failed to include within his Motion for Summary Judgment a list of undisputed material facts as required by Local Rule 7.1(D), and argues that the Motion should be denied because of this “violation.” Defendant responds by pointing out that he raises only a pure legal question of statutory interpretation, to which no facts are material. The Court agrees that no facts are material to the determination of whether “procurement” is a violation of the ECPA. Whether the ECPA includes civil “procurement” liability does not require any consideration of how such “procurement” might have occurred in this case, or of any other facts particular to this case. Summary judgment is an appropriate vehicle for the resolution of legal
Local Rule 7.1(D) does not require a party moving for summary judgment to vainly list a group of immaterial facts in order to meet some technical requirement; indeed, the Rule requires the listing only of “each undisputed material fact which is the basis for the motion for summary judgment” (emphasis added), and notes that “[m]aterial facts are only those facts which bear directly on the legal issue raised by the motion.” If the Motion is not based on a particular factual situation and the Court’s decision does not require the consideration of any facts, as in the ease of a pure question of statutory interpretation, then no facts should be listed.
II. Whether the ECPA Includes Civil “Procurement” Liability
As explained above, Plaintiff alleges that Defendant Morgan violated the ECPA by directing others to intercept his communications; § 2511(1) of the ECPA provides that it is a violation of the statute to “procure” a person to unlawfully “intercept” communications.
Prior to 1986, § 2520 provided:
Any person whose wire or oral communication is intercepted, disclosed, or used in violation of this chapter shall (1) have a civil cause of action against any person who intercepts, discloses, or uses, or procures any other person to intercept, disclose, or use such communications, and (2) be entitled to recover from any such person [damages, attorney’s fees, and costs].
18 U.S.C. § 2520 (1970) (emphasis added). In 1986, though, Congress amended the statute so that it now reads:
*775 [A]ny person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity, other than the United States, which engaged in that violation such relief as may be appropriate.
18 U.S.C. § 2520(a). The clause “or procures any other person to intercept, disclose, or use such communications” was removed from the portion of the statute providing a civil remedy. Plaintiff claims that this alteration to the statute’s text does not affect his ability to recover from Defendant Morgan for “procuring” the interception of his communications, while Defendants argue that the alteration reflects Congress’ intent to eliminate such liability.
In Peavy v. WFAA-TV, Inc., the Fifth Circuit, addressing what appeared to be an issue of first impression, looked to the plain text of the statute to determine that the alteration was intended to eliminate the ability to sue one who only “procures” another to intercept a plaintiffs communications. 221 F.3d at 168-69. As that court explained, “[t]he amended provision does not have the ‘procures any other person’ language, extending civil liability to ‘the person or entity which engaged in that violation.’ And, the referenced ‘violation’ is ‘intercepted, disclosed, or intentionally used;’ there is no mention of ‘procures.’ ” Id. at 168-69 (emphases in original). The Fifth Circuit, citing the familiar rule that amendments to statutes are presumed to be meaningful, held that Congress intended to excise civil “procurement” liability from the ECPA. Id. at 169 (citing, inter alia, Stone v. I.N.S., 514 U.S. 386, 397, 115 S.Ct. 1537, 131 L.Ed.2d 465 (1995); Park ‘N Fly, Inc. v. Dollar Park & Fly, Inc., 469 U.S. 189, 194, 105 S.Ct. 658, 83 L.Ed.2d 582 (1985)).
Following Peavy, both the Tenth Circuit and the District Court for the District of Columbia agreed that § 2520(a), as amended in 1986, does not impose civil liability on one who merely “procures” another to illegally intercept communications. Kirch v. Embarq Management Co., 702 F.3d 1245, 1246-47 (10th Cir.2012); Gaubatz, 891 F.Supp.2d at 23-24. The Gaubatz court, citing’ Peavy and several district court cases, engaged in its own analysis of the statutory text and’ determined that “the plain language of the statute limits civil liability to interception, disclosure, and use.” 891 F.Supp.2d at 24 (citing Peavy v. WFAA-TV, Inc., 221 F.3d 158, 169 (5th Cir.2000); Lonegan v. Hasty, 436 F.Supp.2d 419, 427-28 (E.D.N.Y.2006); Hurst v. Phillips, No. 04-2591 M1/P, 2005 WL 2436712, *3 (W.D.Tenn. Sept. 30, 2005); Gunderson v. Gunderson, No. 02-1078-CVW-ODS, 2003 WL 1873912, *2 (W.D.Mo. Apr. 14, 2003); Buckingham v. Gailor, No. 00-CV-1568, 2001 WL 34036325, *6 (D.Md. Mar. 27, 2001)). The Tenth Circuit has also followed the majority position in “presuming] that this deletion [of the ‘procures’ clause] was intended to change the statute’s meaning.” Kirch, 702 F.3d at 1247.
Both the Gaubatz and Kirch courts, as well as both Plaintiff and Defendant Morgan in this case, recognize that the Eastern District of New York appears to be the lone outlier in interpreting the 1986 amendment to § 2520(a). In Lonegan v. Hasty, that court disagreed with the Peavy interpretation because it believed that
the more natural reading of the amended statute shows no intent on the part of Congress to eliminate the private right of action for procurement violations.... Pursuant to Section 2511(l)(a), the class of persons whose communications are intercepted in violation of the Wiretap*776 Act includes those persons whose communications are intercepted by someone who was procured to do so by a third party. In such case, both the person who actually intercepted the communications and the person who procured the interception have violated the Act, and the victim is authorized to sue any person or entity who engaged in that violation.
436 F.Supp.2d 419, 428 (E.D.N.Y.2006). The Lonegan court explained that its reading of the legislative history suggested that the 1986 changes “were cosmetic rather than substantive.” Id. (citing S.Rep. No. 95-797, at 26-27 (1986), as reprinted in 1986 U.S.C.C.A.N. 3555, 3580-81). Importantly, though, the Lonegan court did not rely on this interpretation of § 2520(a) in disposing of the motion to dismiss before it, since, “[a]s an alternative to their procurement theory of liability, plaintiffs assert that [the defendant] intercepted their communications directly. Therefore, even if the procurement theory fails, the direct interception theory is sufficient to support the claims.” Id. (citing DIRECTV Inc. v. Barrett, 311 F.Supp.2d 1143, 1146 (D.Kan.2004) (also avoiding the question of whether § 2520(a) retains “procurement” liability)). Because its interpretation of § 2520(a) was not essential to the court’s ruling, the Lonegan court’s interpretation is merely dicta.
The Peavy court and the courts following it have reached a reasonable understanding of the relevant statutory language. Though this Court believes the Lonegan court’s interpretation of the language is also reasonable, the weight of persuasive authority, and especially the history of the statute’s amendment, compel the Court to agree with the Peavy interpretation. To allow civil “procurement” liability would render meaningless Congress’ 1986 removal of “procures any other person” from that section. Moreover, the Fifth Circuit’s Peavy decision has been on the books for nearly thirteen years, and has since been followed by the Tenth Circuit and by District Courts in other Circuits, but Congress has not chosen to amend the statute in order to correct Peavy’s interpretation. Even the Lonegan court disagreed with the Peavy interpretation only in dicta. Therefore, because one who merely “procures” the interception of communications is not civilly liable under the ECPA, summary judgment is granted in favor of Defendant Morgan on this narrow question. He cannot be held liable merely for “procuring” others to intercept Plaintiffs communications.
The Court acknowledges that it previously addressed Plaintiffs ECPA “conspiracy” allegation against Morgan, and denied Defendants’ Motion for Summary Judgment concerning it, assuming that such liability may be available. (Doc. 209 at 34-36).
It is now clear that “procurement” cannot support civil ECPA liability, and it is likewise clear that there can be no civil “conspiracy” (or “aiding and abetting” or “agency”) liability under the ECPA, as such forms of liability would permit plaintiffs to circumvent Congress’ intent to limit civil liability to those who have actually engaged in the prohibited practices; anyone who “procures” an interception could also be called a “conspirator,” an “aider and abettor,” or a “principal” in an agency relationship. Plaintiff is incorrect in stating that the District Court for the District of Columbia recognized an agency-type theory of liability under the ECPA in Gaubatz. There the plaintiffs had alleged a “conspiracy” or “aiding and abetting” form of liability, while the defendants argued that no such “secondary liability” was cognizable under the ECPA. Gaubatz, 891 F.Supp.2d at 24. Because the plaintiffs failed to put forth a meaningful response to the defendants’ arguments the court treated the argument as conceded, but it also noted that “secondary liability” under the ECPA was untenable for the same reasons the court rejected “secondary liability” under the SCA: that Congress had not included such liability under the statute. Id. at 25-27. Gaubatz in fact states in dicta that no form of civil “procurement,” “agency,” or “conspiracy” liability would be available under the ECPA. See also Kirch, 702 F.3d at 1247 (“ § 2520 does not impose civil liability on aiders or abettors”).
The Court thus concludes that Defendant Morgan cannot be held liable under the ECPA under “procurement,” “agency,” “conspiracy,” or any other “secondary” theories of liability, and grants summary judgment in his favor on this question.
III. Whether Plaintiff May Proceed with Claims of Illegal “Use” or “Disclosure” of His Intercepted Communications Against Defendant Morgan
As an alternative to his unsuccessful argument that the ECPA contemplates civil “procurement” liability, Plaintiff argues that he can nonetheless proceed with an ECPA claim against Defendant Morgan for “use” or “disclosure” of his illegally intercepted communications. As noted above, this question was not raised by Defendant Morgan’s instant Motion for Summary Judgment, and so Plaintiffs evidence as to those questions need not be considered. However, given that Plaintiffs brief seems to indicate an intention to proceed at trial with these claims, the Court must discuss their status.
In Plaintiffs First Amended Complaint, as well as throughout the litigation of this case, Plaintiff has always alleged only “interception,” and, in the case of Defendant Morgan, “direction” of others to intercept (also known as “procurement,” discussed above), as the violations of the ECPA he seeks to redress. (Doc. 38 at 12-13). Plaintiff, Defendants, and the Court have repeatedly characterized the claims as concerning “interception,” and have never addressed the questions of “use” or “disclosure” under the ECPA. Plaintiff cites to evidence acquired throughout the litigation that he now argues showed “use” or “disclosure” by Morgan, but it is hornbook law that he cannot amend his pleadings via summary judgment briefing. See, e.g., Anderson v. Do
IV. Status of Count III
As a final matter, the Court must address an issue concerning Count III, which arises under the Stored Communications Act (“SCA”). In earlier orders, the Court rejected Plaintiffs SCA claims relating to his Access2Go email account and his text messages; Aceess2Go authorized the accession of Plaintiffs Aceess2Go email messages, and the Defendants did not access the text messages from storage as those terms are used in the SCA. (Docs. 249 & 268).
On February 20, 2013, the Court directed Plaintiff to indicate whether he intended to pursue his claim for Defendants’ alleged accession of his personal Yahoo! email account, as his earlier brief on damages seemed to imply that he had dropped that last-remaining SCA claim by failing to mention it at all or to give a damages estimate for the claim as directed. (Doc. 269). On February 28, in response to this Order, Plaintiff filed a “Notification.”
In his “Notification,” Plaintiff also asked the Court to “preserve Count III of the First Amended Verified Complaint in the event that evidence admitted at trial supports liability against Defendants pursuant to the Stored Communications Act.” (Doc. 270 at 3). To the extent Plaintiff wishes to retain the ability to present his SCA claims (or any other previously-rejected claims) to the jury in the upcoming trial, such a request is rejected. The Court has already ruled, via summary judgment, that neither the Access2Go email claim nor the text message claim under that statute are viable as a matter of law. (Docs. 249 & 268). Summary judgment is not a preliminary ruling that may be set aside to allow another attempt at trial, but is a final ruling. It is, as the Seventh Circuit has put it, the “put up or shut up” moment in a case, at which plaintiffs must put on the best ease they have to defeat a defendant’s motion. See, e.g., Delapaz v. Richardson, 634 F.3d 895, 900 (7th Cir.2011) (citing Goodman v. National Sec. Agency, Inc., 621 F.3d 651, 654 (7th Cir.2010)). Since Plaintiff failed to defeat Defendants’ Motions for Summary Judgment as to the Aecess2Go email and text message claims under the SCA, he cannot go forward to try those claims to the jury. To permit that would be to undermine the entire purpose of summary judgment. If Plaintiff disagrees with the Court’s rulings in its summary judgment orders, he is free to appeal them after the trial. At this level, though, they are final. Plaintiff is warned against attempting to reassert his rejected claims under Count III in the final pretrial order or before the jury. See Serritella v. Markum, 119 F.3d 506, 512-13 (7th Cir.1997) (citing Bastian v. Petren Resources Corp., 892 F.2d 680, 682 (7th Cir.1990)).
Conclusion
For the foregoing reasons, Defendant Morgan’s Motion for Summary Judgment (Doc. 273) is GRANTED. Plaintiff MAY NOT PROCEED on a “procurement” claim under the ECPA. In addition, Plaintiff MAY NOT PROCEED on “use” or “disclosure” claims under the ECPA against any of the Defendants. Finally, the Court herein DETERMINES that Plaintiff has implicitly indicated his abandonment of the Yahoo! email claim under the SCA, such that Count III has been completely resolved in Defendants’ favor. Plaintiff has not waived his right to appeal the Court’s rulings as to the Aecess2Go and text message claims under the SCA, but MAY NOT REASSERT those claims at trial. This matter remains set for final pretrial conference on July 10, 2013, and jury trial beginning August 5, 2013.
IT IS SO ORDERED.
ORDER & OPINION
This matter is before the Court on a sua sponte effort to “simplify the issues” for trial as suggested in Federal Rule of Civil Procedure 16, as well as a Motion for Reconsideration by Plaintiff. In the proposed Final Pretrial Order and proposed jury instructions submitted by the parties, Defendants raised the question of whether the basis of Plaintiffs Count II, the Illinois Eavesdropping Act, includes a civil cause of action for eavesdropping on electronic communications as Plaintiff alleges. Plaintiffs Motion for Reconsideration challenges the Court’s order barring him from presenting claims for “use” or “disclosure” of his communications under the Electronic Communications Privacy Act. (Doc. 285).
In his First Amended Complaint, Plaintiff claims that Defendants violated the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2511, the Illinois
Illinois Eavesdropping Act
The first issue now before the Court turns on whether 720 Ill.Comp.Stat. 5/14— 6, the civil remedy provision of the IEA includes a claim for eavesdropping upon “electronic communications,” rather than only oral “conversations.” While the definition of a criminal violation under the IEA covers such eavesdropping, the text of the civil provision does not; it only addresses “conversations.” 720 Ill.Comp. Stat. 5/14-2 & 5/14-6. The proposed Final Pretrial Order included the question of whether the IEA covers Plaintiffs allegations as a disputed legal issue, and it was incorporated into Defendants’ proposed jury instructions by asking the jury to determine whether Defendants had eavesdropped upon any of Plaintiffs oral “conversations.” Reviewing these submissions, the Court realized that this was an issue of law that the Court should deal with prior to trial, since it would either have to be addressed during the trial in consideration of the proposed jury instructions, or by the Court in a post-trial motion.
Defendants argue that the IEA’s plain text, as well as its statutory history, shows that the Illinois legislature did hot intend to create a private civil cause of action for eavesdropping upon “electronic communications.” Plaintiff argues in opposition that the statute is ambiguous and the statute’s legislative history shows that the legislature intended to include a civil cause of action for the injuries he alleges, and that, even if the statute cannot be read to include a civil cause of action for eavesdropping upon “electronic communications,” the Court should find that there is an “implied” cause of action. If the Court determines that Plaintiff cannot rely upon the IEA, Plaintiff requests that he be permitted to amend his complaint to include common law causes of action, including intrusion upon seclusion.
Plaintiff also asks the Court, if it determines that the IEA’s civil cause of
I. Statutory Text
The IEA is found within Chapter 720 of Illinois’ statutory code, which is devoted to criminal offenses. The statute, in relevant part, provides that “(a) A person commits eavesdropping when he: (1) Knowingly and intentionally uses an eavesdropping device for the purpose of hearing or recording all or any part of any conversation or intercepts, retains, or transcribes electronic communication.” 720 Ill.Comp.Stat. 5/14-2. In a separate section, the IEA also provides for a civil remedy, stating that “(1) Any or all parties to any conversation upon which eavesdropping is practiced contrary to this Article shall be entitled to” certain remedies. 720 Ill.Comp. Stat. 5/14-6. Both “conversation” and “electronic communication” are defined in the statute: as important to the instant analysis, a “conversation” is “any oral communication between 2 or more persons”, while an “electronic communication” is “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or part by a ... computer.” 720 Ill.Comp.Stat. 5/14-
1(d) & (e). The parties here do not dispute that Plaintiffs allegations only concern “electronic communications,” and not “conversations” in the sense of “oral communications” as defined in the IEA. By the plain text of the statute, then, the IEA provides for criminal liability for those who eavesdrop upon both oral communications (“conversations”) and emails and text messages (“electronic communications”), but only offers a civil remedy to those whose oral communications are eavesdropped-upon. Defendants thus argue that Plaintiff has no statutory authority on which to base his IEA claim.
“In construing a statute, [the Court’s] primary objective is to give effect to the intent of the legislature. The most reliable indicator of that intent is the statutory language itself, which must be given its plain and ordinary meaning.” Snyder v. Heidelberger, 352 Ill.Dec. 176, 953 N.E.2d 415, 420-21 (Ill.2011) (citing Blum v. Koster, 235 Ill.2d 21, 335 Ill.Dec. 614, 919 N.E.2d 333 (Ill.2009); Illinois Department of Healthcare & Family Services v. Warner, 227 Ill.2d 223, 317 Ill.Dec. 677, 882 N.E.2d 557 (Ill.2008)).
Plaintiffs primary argument is that the statute’s use of “conversation” and “electronic communications” is ambiguous because, in three subsections, the statute refers to both “oral conversations” and “electronic communications.” (Doc. 284 at 6-7). Plaintiff asserts that, because “conversation” is defined in the definitions section of the statute by reference to the word “oral,” such usage assumes that there might be non-oral “conversations,”
Moreover, the exclusion of “electronic communications” from the civil remedy provision is not an absurd or even unreasonable effect of the statute. It is not unreasonable to find that the legislature intended to keep civil liability under the statute to a minimum by not including electronic communications within the civil remedy provision. Conversely, it is also not unreasonable to assume that the legislature felt that only eavesdropping upon oral conversations created the sort of harms that should be remedied by damages, while electronic communications were adequately protected by the criminal provision.
The Court therefore finds that the IEA, as written, is clear in distinguishing between oral conversations and written electronic communications such as emails and text messages, and in providing no civil remedy for eavesdropping upon electronic communications.
II. Legislative History
Courts only turn to legislative history for aid in interpreting a statute when the text of a statute is ambiguous. People v. Jones, 214 Ill.2d 187, 291 Ill.Dec. 663, 824 N.E.2d 239, 242 (Ill.2005) (citing People v. Whitney, 188 Ill.2d 91, 241 Ill.Dec. 770, 720 N.E.2d 225 (Ill.1999)) (“Where the legislature’s intent is not clear from the statute’s plain language, the court may examine the legislative history.”). As explained above, Plaintiffs attempt to find an ambiguity that would justify resort to legislative history fails — the statute could not be clearer, and so the Court need not look to the legislative history. In this case, though, the legislative history is at least as supportive of Defendants’ position as Plaintiffs, and in fact appears to confirm the plain text of the statute.
Prior to 2000, civil liability under the IEA was co-extensive with the statute’s criminal prohibition; both sections addressed eavesdropping on “conversations.” In that year, though, the Illinois legislature made eavesdropping on “electronic communications” a criminal offense, and added the relevant definition of that term to § 5/14-1 of the statute via Public Act 91-657, which originated as House Bill 526, “An Act concerning criminal law.” No change was made to the civil remedy provision found at § 5/14-6.
As originally introduced in the Illinois House of Representatives, House Bill 526 added language that would have covered electronic communications to the definition
As Plaintiff points out, “there is no dispute between the parties that, if House Bill 526 as engrossed had been approved and become law, the civil cause of action would have provided a civil remedy to an individual for any crime committed pursuant to the IEA.” (Doc. 284 at 9). Contrary to Plaintiffs argument, though, the fate of House Bill 526 cuts in favor of Defendants. Courts must apply the law as it is, not as it might have been, and, as Plaintiff concedes, House Bill 526 “as engrossed” did not become law. House Bill 526 “as enrolled” became law, and this version of the bill did not include a civil remedy for eavesdropping upon electronic communications; the version enacted does not change the scope of the civil remedy provision, and the version that was rejected would have done so. Plaintiff argues that this was due to an oversight, noting that the legislators apparently did not debate the decision to separately define “electronic communications” and include them only within the criminal offense. While this is a possible interpretation, the text actually reflects the more-likely possibility that the legislature intentionally separated “conversations” from “electronic communications,” and protected the latter only via the criminal law; since this alteration to the bill more-clearly carried out the legislature’s intent, there was no need to specifically debate it. The Court cannot “read in” that which the legislature appears to have intentionally left out. Not only is the statute unambiguous, the legislative history does not support Plaintiffs argument.
The unambiguous use of “any conversation” in § 5/14-6 and both “oral conversation” and “electronic conversation” in §§ 5/14-1, 5/14-2, and 5/14-4 is clarified by the legislative history. As noted above, the civil remedy provision was not changed by the 2000 amendment, so the use of “any conversation” in § 5/14-6 could not have been motivated by a desire to include both “conversations” and “electronic communications” within that section’s coverage, since that language predated the inclusion of “electronic communications” in the IEA. Likewise, the word “oral” was used to modify “conversation” in § 5/14-1 as the statute existed prior to the 2000 amendment, and was added to §§ 5/14-2 and 5/14-4 by the 2000 amendment, when the term “electronic communication” was also added to those sections. The use of the term “oral conversation” in some sections of the IEA, then, does not imply that the unmodified use of “conversation” in § 5/14-6 should be read to include both “conversations” and “electronic communications,” since “oral conversation” was unambiguously used in the statute prior to 2000.
The history of Public Act 91-657 helps to explain why the legislature focused only on expanding the scope of the criminal offense. The legislative history documents the parties have submitted indicate that the amendments were requested by the Cook County State’s Attorney’s Office in order to allow it to combat criminal gangs’ use of electronic devices to intercept law enforcement communications. (Doc. 283, Ex. A at 1, Ex. B at 2, Ex. C at 1). The legislature was simply not concerned with
Though the text of the statute was clear, and there was no need to resort to the IEA’s legislative history, the Court’s review of that history confirms the plain reading of the statute’s text: the IEA’s civil cause of action does not permit recovery for eavesdropping upon “electronic communications,” though such eavesdropping is a criminal offense.
III. Implied Cause of Action
Finally, Plaintiff argues that the Court should find that there is an implied civil cause of action for eavesdropping upon electronic communications under the IEA, and thereby allow him to proceed with his Count II. Plaintiff cites no case in which any court has implied such a cause of action under the IEA, and the Court’s research has not revealed any, either. The cases Plaintiff does cite, and which the Court has reviewed in its research, indicate that it would be inappropriate to imply a cause of action in this case.
The Illinois courts will imply a civil remedy to redress injuries under statutes that do not explicitly provide for such remedies, but there are limits to such implied causes of action.
Implication of a private right of action is appropriate if: (1) the plaintiff is a member of the class for whose benefit the statute was enacted;(2) the plaintiffs injury is one the statute was designed to prevent; (3) a private right of action is consistent with the underlying purpose of the statute; and (4) implying a private right of action is necessary to provide an adequate remedy for violations of the statute.
Fisher v. Lexington Health Care, Inc., 188 Ill.2d 455, 243 Ill.Dec. 46, 722 N.E.2d 1115, 1117-18 (Ill.1999). The fourth factor is the most important limitation on the power of courts to imply a cause of action: a cause of action may be implied “only in cases where the statute would be ineffective, as a practical matter, unless such an action were implied.” Fisher v. Lexington Health Care, Inc., 188 Ill.2d 455, 243 Illl.Dec. 46, 722 N.E.2d 1115, 1120 (Ill.1999) (citing Abbasi ex rel. Abbasi v. Paraskevoulakos, 187 Ill.2d 386, 240 Ill.Dec. 700, 718 N.E.2d 181, 186 (Ill.1999)) (emphasis added). See also Cima v. Wellpoint Healthcare Networks, Inc., No. 05-CV-4127-JPG, 2006 WL 1914107, *5 (S.D.Ill. Jul. 11, 2006) (characterizing this as most important factor). Thus, the absence of this factor alone will prevent a court from implying a cause of action. Abbasi, 240 Ill.Dec. 700, 718 N.E.2d at 185 (quoting Board of Education v. A, C & S, Inc., 131 Ill.2d 428, 137 Ill.Dec. 635, 546 N.E.2d 580, 600 (1989)) (unnecessary to consider first three factors where fourth is lacking). Applying this test, it appears that Plaintiff is likely a member of the class to be protected under the IEA, and that his alleged injury is likely one that the statute was intended to prevent.
This Court finds that the fact that the legislature did create both criminal liability for Plaintiffs alleged injury and an explicit cause of action for different violations of the IEA indicates that it is inappropriate to imply a private cause of action for eavesdropping upon “electronic communications” here. The fact that it did not choose to expand the private cause of action to include “electronic communications” when it amended the criminal offense indicates that it does not intend for there to be a civil cause of action for eavesdropping upon “electronic communications.” Where a legislature specifically provides for one type of recovery, but excludes others, a court can infer that such exclusion was intentional, especially in circumstances such as this, where excluded cause of action is otherwise addressed in the statute. See Davis, 136 Ill.Dec. 1015, 545 N.E.2d at 541 (legislature’s provision of limited remedies indicates an intent to limit remedies to those provided). Since Illinois’ willingness to imply a cause of action into a statute is predicated on its compatibility with the legislature’s intent, the Court cannot add a type of recovery that was specifically excluded by the legislature.
Finally, the fourth and most important factor is missing; the statute’s protection against eavesdropping upon “electronic communications” can be effectively enforced via criminal prosecutions under § 5/14-2 such that the statute is effective even without a private civil cause of action against such eavesdropping. Moreover, as demonstrated by Plaintiffs instant suit
There is no per se rule that the existence of a criminal enforcement provision bars the implication of a private cause of action for a statute under the fourth factor, but Illinois courts consider the nature of the statute, whether its purpose can be accomplished without the implication of a private cause of action, and whether the plaintiffs injury can otherwise be remedied. Rhodes v. Mill Race Inn, Inc., 126 Ill.App.3d 1024, 81 Ill.Dec. 793, 467 N.E.2d 915, 917 (Ill.App.Ct.1984) (citing Heimgaertner v. Benjamin Electric Mfg. Co., 6 Ill.2d 152, 128 N.E.2d 691 (Ill.1955); Burton v. McClellan, 3 Ill. 434, 437 (Ill.1840)). Applying those considerations to this case, it would be inappropriate to imply a cause of action for eavesdropping upon “electronic communications.”
The IEA is primarily a criminal statute, and eavesdropping upon “electronic communications” is a felony offense. 720 Ill.Comp.Stat. 5/14-4. It does appear that there has been no attempt at prosecution in this case, but none of the cited Illinois cases considering statutes containing public enforcement mechanisms turned on whether the designated enforcement agencies had actually prosecuted or imposed a regulatory penalty. The question is whether the statute as written can be effected, not whether it was effective to prevent or redress the alleged harm in the instant case. The fact that the state’s attorney has apparently chosen not to attempt a prosecution in this case is simply an exercise of prosecutorial discretion, and does not prove that the statute is ineffective. The IEA’s purpose of preventing eavesdropping upon “electronic communications” can be accomplished through its criminal enforcement mechanism. The Court thus “cannot say that the statutory framework the legislature did provide is so deficient that it is necessary to imply a private right of action for [Plaintiff] in order to effectuate the purpose of the” IEA. Fisher, 243 Ill.Dec. 46, 722 N.E.2d at 1121.
It also relevant whether those who are victims of the statutory violation have other available means of vindicating their injuries. In Asllani v. Board of Education, the Northern District of Illinois based its decision not to imply a private cause of action, in part, on the fact that the plaintiff could recover under the Illinois Human Rights and Title VII if her claims were meritorious. 845 F.Supp. 1209, 1224 (N.D.Ill.1993). Similarly, the Cima court relied on the fact that the “plaintiffs have alternative avenues to vindicate their rights” in determining that an implied cause of action was not necessary. 2006 WL 1914107, 11 (citing Asllani, 845 F.Supp. at 1225; Corgan v. Muehling, 143 Ill.2d 296, 158 Ill.Dec. 489, 574 N.E.2d 602, 610 (Ill.1991)). Here, as Plaintiffs claims and instant requests to amend show, there are several applicable federal statutes and common law theories of recovery of which a victim of eavesdropping upon “electronic communications” could avail himself. The fact that these theories may not ultimately pan out for a plaintiff does not mean that a court must create a cause of action that will give him a victory. In holding that it is not necessary to imply a cause of action for a victim of a statutory violation, courts look to whether the violation of the statute can be redressed under other theories, not whether they would actually be successful for the particular plaintiff in the case before them.
The Court therefore cannot imply a private cause of action under the IEA to
Plaintiff’s Motion for Reconsideration
In his Motion for Reconsideration, Plaintiff asks the Court to reconsider its decision to bar him from presenting claims based on “use” or “disclosure” of his communications under the ECPA. (Doc. 285). In his Response to Defendant Morgan’s Motion for Summary Judgment on the question of whether he could be held civilly liable under the ECPA on a “procurement” theory, Plaintiff, for the first time, stated that he intended to proceed on an ECPA claim for “use” and/or “disclosure” of his communications against at least Defendant Morgan. (Doc. 276 at 10-11). The Court noted that
[I]n Plaintiffs First Amended Complaint, as well as throughout the litigation of this case, Plaintiff has always alleged only “interception,” and, in the case of Defendant Morgan, “direction” of others to intercept (also known as “procurement,” discussed above), as the violations of the ECPA he seeks to redress. (276 at 10). Plaintiff, Defendants, and the Court have repeatedly characterized the claims as concerning “interception,” and have never addressed the questions of “use” or “disclosure” under the ECPA.
(Doc. 276 at 10-11). The fact that Plaintiff had apparently collected evidence, or even admissions, of “use” or “disclosure” was “not sufficient to put Defendant Morgan (or any of the other Defendants) on notice that they may have to defend claims for “use” or “disclosure,” or to inform the Court that such claims were at issue.” (Doc. 276 at 11). The Court therefore determined that Plaintiff had forfeited these claims by failing to make them more explicit.
In his instant Motion for Reconsideration, Plaintiff argues that Defendants had adequate notice of his intention to pursue claims based on “use” or “disclosure” because evidence was gathered in discovery and cited in summary judgment briefing that Defendants in fact “used” or “disclosed” Plaintiffs communications. The Court has already considered this argument, finding that “it is neither Defendants’ nor the Court’s duty to scour his briefs for hints as to additional claims he might be interested in raising.” (Doc. 276 at 11). When it became apparent that the parties and the Court understood Plaintiffs ECPA claims to be limited to injuries arising from “interception” of his communications (or its “procurement,” in the case of Morgan), Plaintiff should have informed the Court that he also intended to seek redress for his alleged injuries caused by Defendants’ “use” or “disclosure” of his communications. Instead, he allowed Defendants and the Court to persist in the belief that only “interception” or its “procurement” were at issue, complaining only when his “procurement” claim against Morgan eventually foundered on the rocks of the statutory text.
Finally, contrary to Plaintiffs warnings, there will be no need to amend the complaint after trial in order to “conform the pleadings to the evidence,” because Federal Rule of Civil Procedure 15(b)(2) provides that such post-trial amendment occurs only “[wjhen an issue not raised by the pleadings is tried by the parties’ express or implied consent.” Here, there cannot have been any “express or implied consent of the parties” to try the issues of “use” or “disclosure,” as those issues have never been affirmatively presented or litigated. As discussed further below, nothing prevented Plaintiff from moving to amend his complaint as soon as he had gathered the evidence to support these
Plaintiffs Motion for Reconsideration is thus denied. Plaintiffs request to amend his complaint to add a ECPA claims for “use” or “disclosure” is discussed below.
Plaintiff’s Requests to Amend
In the event that the Court determines that Plaintiff cannot proceed with an IEA claim, Plaintiff requests leave to amend his complaint to add state common law theories, including intrusion upon seclusion and invasion of privacy. Similarly, if the Court declines to reconsider its determination that Plaintiffs First Amended Complaint does not include claims based on “use” or “disclosure,” Plaintiff requests leave to add those claims to a new complaint. He asserts that the addition of these theories would require no new discovery, but would instead be predicated solely on facts he has already gathered.
Federal Rule of Civil Procedure 15(a)(2) provides that “The court should freely give leave [to amend a complaint] when justice so requires.” However, it is well-established that “[district courts have broad discretion to deny leave to amend where there is undue delay, bad faith, dilatory motive, repeated failure to cure deficiencies, undue prejudice to the defendants, or where the amendment would be futile.” Hukic v. Aurora Loan Services, 588 F.3d 420, 432 (7th Cir.2009) (citing Arreola v. Godinez, 546 F.3d 788, 796 (7th Cir.2008)). The Court denies Plaintiffs request to amend his complaint to add new theories and claims.
Plaintiff initiated the instant suit in April 2010, well over three years ago. Pursuant to a scheduling order, all discovery was to have been completed by March 15, 2012. (Doc. 153). Plaintiff now asserts that he adduced all the evidence needed to support his proposed new theories during discovery, such that additional discovery would not be needed. The obvious implication of this is that Plaintiff had all the evidence needed to amend his complaint as he now proposes in March 2012, one year and four months ago. Plaintiff offers no real explanation for his delay; he merely argues that the Court’s rulings since January 2013 somehow necessitate the addition of the new theories.
Essentially, Plaintiff asks the Court to allow him to restructure his case now that he knows that some of his original theories and claims will not be successful. Plaintiff contends that this is only fair because the Court’s recent rulings have considerably cut back on his potential to recover. His basic argument is “what’s good for the goose is good for the gander:” if Defendants have been allowed to file motions attacking the sufficiency of his claims at a late date, he should be allowed to remedy this damage to his case by stating new, more-viable claims or legal theories. Adding new theories and claims, though, is different from eliminating issues prior to trial. The elements of Plaintiffs claims have always been at issue in this litigation — whether they were resolved prior to trial or by a jury, they have to be resolved,
The Court is of course cognizant of the fact that federal plaintiffs need not plead legal theories in their complaints, and that the addition of a new theory of recovery, if based on the same alleged injury, does not necessarily add a new “claim.” The implication of this is that a new legal theory (unlike a new claim) does not fundamentally change the complaint, and cannot be considered an unfair “surprise” to a defendant.
Moreover, despite Plaintiffs contentions, the Court would almost certainly have to allow Defendants time to conduct additional discovery if it allowed Plaintiff to amend, in order to develop any applicable defenses they may have to the new theories, and Defendants would have to be permitted to file new dispositive motions if there were any issues appropriate for the Court’s resolution. Plaintiffs proposed amendments would certainly significantly delay the trial. Again, the fact that Defendants’ January 2013 Motion for Summary Judgment also delayed the trial is a completely separate issue, as the elements of Plaintiffs claims are always at issue, while the addition of new theories introduces new issues to the case.
Conclusion
For the foregoing reasons, Plaintiffs Count II is DISMISSED WITH PREJUDICE, and Plaintiffs Motion for Reconsideration (Doc. 285) is DENIED. This matter will proceed with the Final Pretrial Conference on July 24, 2013 at 11:00 A.M., and jury trial beginning August 5, 2013.
. Plaintiff also initially made a claim pursuant to the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, but it was rejected after the first Motion for Summary Judgment attacking it, and has not been at issue since that ruling. (Doc. 209 at 32-34).
. Likewise, the Court has assumed that "secondary” liability may be available under the SCA, though the District Court for the District of Columbia’s decision in Council on American-Islamic Relations Action Network, Inc. v. Gaubatz calls this assumption into question. 891 F.Supp.2d 13, 26-27 (D.D.C.2012)
. Contrary to Plaintiffs view, this Court's opinion in the case of Moran v. United States does not support Plaintiff's contention that Defendant’s Motion is in violation of the Local Rules and should be rejected. In Moran, the Court noted that a party responding to a motion for summary judgment, if that party has the burden of proof at trial, bears the “onus ... to present ... 'specific facts showing a genuine issue for trial,’ ” and that Local Rule 7.1 explains the proper manner in which to present these facts. No. 07-cv-4077, 2010 WL 744299, *2 (C.D.Ill. Feb. 25, 2010). Moran does not stand for the proposition that in all cases a defendant must include a statement of facts with its motion for summary judgment based on a question of pure statutory interpretation.
. In his First Amended Complaint, Plaintiff specifically alleged that “Defendants ... directed ... the installation of spyware ... for the purpose of intercepting” his communications, "Petrakis intercepted,” and "Defendants intercepted.” (Doc. 38 at 12). He does not use the term “procures,” though the "directed ... the installation” allegation would suffice to indicate such a claim.
. Plaintiff cites to the Court’s discussion of his SCA claim against Morgan at pages 37-38 of the November 29, 2011 Order on Defendants' Motion for Summary Judgment (Doc. 209), which is of course inapplicable to the ECPA claim. As discussed below, however, there are no remaining claims under the SCA, so the Court need not address the question of whether "secondary” liability is available under the SCA.
. On its initial reading, the Court misunderstood the requests made in the "Notification,” and issued an Order discussing the damages available on the Yahoo! email SCA claim; in light of the instant discussion, that Order is stricken as moot. (Doc. 272).
. Plaintiff's assertions in the "Notification” relate primarily to whether Defendants accessed his Access2Go email from storage, but the Court’s rejection of his claim was based on the fact that Defendants had authorization from Access2Go, the provider of the email system, to access the messages, not on whether they actually undertook such access. (Doc. 249).
. Plaintiff also initially made a claim pursuant to the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, but it was rejected after the first Motion for Summary Judgment attacking it, and has not been at issue since that ruling. (Doc. 209 at 32-34).
. Neither party had previously pointed out this discrepancy between the criminal and civil provisions.
. In interpreting a state statute, a federal court must apply that state’s statutory construction principles. See Brownsburg Area Patrons Affecting Change v. Baldwin, 137 F.3d 503, 507 (7th Cir.1998).
. As discussed further below, the legislative history emphatically supports this clear reading.
. The legislative history discussed above can be read as calling this assumption into question: if the legislature’s goal in amending the IEA in 2000 was to address the problem of gangs’ eavesdropping upon law enforcement communications, as appears to have been the case, then the IEA’s protection of “electronic communications” was not intended to protect Plaintiff or his "electronic communications.” See Fisher, 243 Ill.Dec. 46, 722 N.E.2d at 1117-18 (discussing legislative history to limit class of protected individuals). The Court’s
. In Cima, the plaintiffs cited an Illinois Appellate Court decision implying a cause of action where the administrative agency charged with enforcement of the statute provided a letter stating that it did not enforce the relevant provision. 2006 WL 1914107, *8 (citing Casualty Ins. Co. v. Hill Mech. Group, 323 Ill.App.3d 1028, 257 Ill.Dec. 175, 753 N.E.2d 370, 378 (Ill.App.Ct.2001)). In light of the agency’s policy of non-enforcement, the state court found that the statute was ineffective. Id. (citing Casualty Ins. Co., 257 Ill.Dec. 175, 753 N.E.2d at 378). There is no indication in this case that the State's Attorney has a policy of non-enforcement of the IEA’s criminal provisions.
. As it stands, the forfeiture of the "use” and "disclosure” claims only affects Plaintiff’s claims against Defendant Morgan, as the Court has already determined that the other Defendants "intercepted” Plaintiff's communications within the meaning of the ECPA. The "use” and "disclosure” claims, like the "interception” claim, are subject to the exemptions for consent and actions in the ordinary course of business that will be the subject of the upcoming jury trial, such that Defendants Petrakis and Huffman will be subject to the same liability under "interception” as they would if Plaintiff were allowed to proceed with "use” or "disclosure” claims against them.
. This distinction is applicable only to the new common law theories, as they could be limited to the same actions and injuries forming the base of Plaintiff’s suit thus far. On the other hand, the “use” and "disclosure” allegations would constitute new claims, as they complain of different conduct and different resulting injuries.
. Even if the Court had declined to consider Defendants' recently-raised arguments, the Court would have had a duty to ensure that the instructions presented to the jury stated the law correctly — Plaintiff might have been able to present all the arguments and evidence he wished, but the jury instructions would have led to the same results that have now been obtained through the Court’s rulings. For the sake of simplicity, clarity, and thoroughness of disposition, it is preferable to resolve these legal questions through briefing and written orders, rather than in jury instruction conferences.
. The Court does not herein intend to express its approval of Defendants’ late-filed Motions for Summary Judgment and recent introduction of the question regarding the applicability of the IEA within the proposed Final Pretrial Order and proposed jury instructions, but merely to distinguish between