The Continuing Split Of Authority In The Interpretation Of The Computer Fraud And Abuse Act

One of my recent blog posts highlighted how the United States Supreme Court's dismissal of the petition for writ of certiorari seeking review of the Fourth Circuit's opinion in WEC Carolina Energy Solutions, LLC v. Miller, 687 F.3d 199 (4th Cir. 2012), dashed the latest hope for the resolution of the Circuit split over the scope of the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030. Click here to read prior blog entry. A recent decision out of the United States District Court for the Southern District of New York demonstrates that differing opinions on the scope of the CFAA continue to exist even, in some cases, within the same federal judicial district.

The CFAA, primarily a criminal statute, was originally enacted in 1984 to prevent computer hacking. The CFAA permits a private party "who suffers damage or loss by reason of a violation of [the statute]" to bring a civil action "to obtain compensatory damages and injunctive relief or other equitable relief." 18 U.S.C. § 1030(g). A person may be held civilly liable under the CFAA when that person, among other things, (1) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer; (2) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value; or (3) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage, or causes damage and loss.

In Advanced Aerofoil Technologies, A.G. v. Todaro, the plaintiffs alleged that the defendants conspired to steal confidential and proprietary information and technology during their employment with plaintiffs, and used the information and technology to form a competing business. 2013 U.S. Dist. LEXIS 25711 (S.D.N.Y. Jan. 31, 2013). The issue before the Court was whether the defendants had accessed the plaintiff's computer systems "without authorization" when, after plaintiff provided defendants with access to plaintiff's computer systems, defendants allegedly used that access to misappropriate trade secret and confidential information belonging to the plaintiff.

The Court highlighted how other courts within the Southern District of New York to have considered the issue had reached opposite conclusions. See Mktg. Tech. Solutions, Inc. v. Medizine LLC, 2010...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT