ROSENBAUM, Circuit Judge:
The Founders of our country had great faith in the jury system. See U.S. Const. amend. VII. So did the Congress that enacted the Stored Communications Act, 18 U.S.C. §§ 2701-2712 (the "SCA" or "Act"), choosing to leave the award of damages under the Act's civil provisions almost entirely to the jury.
In this SCA case, the jury concluded that Defendant-Appellee-Cross-Appellant Terri Burkett violated the Act when, in accordance with her lawyer's advice, she viewed her ex-husband Plaintiff-Appellant-Cross-Appellee Franklin Burkett's emails in an effort to prove to the divorce court that Franklin
Dissatisfied with the jury's verdict, Franklin appealed to the district judge to award him hundreds of thousands of dollars in statutory damages. The district judge declined, awarded a more modest amount, and refused to award Franklin attorney's fees.
Now Franklin asks us to give him punitive damages, increase his award of statutory damages to at least $450,000, and award him attorney's fees. But the jury and Congress have spoken. And we have no authority to award actual or punitive damages when the jury has rejected the entry of such an award. Nor, under the SCA, do we (or the district court) have authority to award statutory damages in the absence of actual damages. For these reasons, we affirm the determination of the district court not to award punitive damages, and we vacate the district court's judgment to the extent that the court awarded statutory damages in the absence of actual damages. Finally, we find no abuse of discretion in the district court's denial of attorney's fees, so we affirm that ruling.
Franklin and Terri Burkett were married on January 21, 1995. The Burketts had their share of turmoil during their marriage, although they were able to stay together for as long as they did with the assistance of counseling. According to Terri, as part of the counseling, the Burketts' counselor recommended that the couple share everything, including passwords to email accounts in an effort to make their marriage an "open book." So Franklin gave Terri his password to his Vista web mail account and authorized her to access it.
Time passed, and a few years later, after discovering that Franklin allegedly had an extramarital affair, Terri filed for divorce on February 17, 2010. The divorce proceedings were extremely contentious, lasting over three years, with great animosity between the Burketts. As Franklin explained in his own words, "I will stay the course, fight for every penny I can get at all costs. . . ." Franklin threatened to leave his wife "penniless" even though the couple had three children together,
During the divorce proceedings, the valuation of Vista became a primary issue. Previously, in 2007, the Burketts had established Vista, a telemarketing company. Franklin was the managing member of Vista. As for Terri, while she described herself as an owner of Vista, she was not a managing member, director, or employee of the company. Nevertheless, Terri assisted in the formation of Vista by helping to find a location for the business, contributing to furnishing the office space, and writing scripts for the telemarketers to use during business calls.
In late September of 2011, Franklin filed a financial affidavit in which he asserted that Vista was likely going to close due to a continued downturn in its sales and losses and invoked this alleged circumstance as a reason to reduce his support obligations. In response, the divorce court held a hearing on October 4, 2011, during which Franklin testified that Vista had
Terri suspected that her estranged husband was lying about the financial status of Vista and sought to obtain information to prove that Vista was a thriving business. She recalled the Vista web mail account and decided to begin accessing her husband's Vista email account, frank@vistamktg.net. According to Terri, she had had the password since 2007, when the business first opened, and had accessed the email previously during their marriage.
Terri began regularly accessing the Vista web mail account to read her husband's emails from October 2011 until May 2012. As Terri explained her practice in reviewing the emails, she "may have" looked at emails before Franklin opened them, "but most of the time" she did not read them until after he had opened them first.
After viewing the emails, Terri concluded that Franklin had been lying about Vista's financial health. As Terri described the emails, they showed that Franklin had signed new contracts, and they evidenced discussions between Franklin and his brother about switching salaries, taking business offshore, and opening new offices.
Terri informed her divorce attorney, Park, that she had been accessing her husband's work emails through Franklin's email password. When Park asked Terri for how long she had had access to the emails, Terri responded, "Since 2007." After a discussion, Park advised Terri that she could legally continue to access the email account as long as she did not read any communications between Franklin and his divorce attorney. Park also instructed Terri to print all relevant emails and place them in a notebook organized by subject and date.
Terri followed Park's instructions and later gave the emails to Park, who then provided them to an expert to value the marital assets, including assessing the financial health of Vista. Contrary to Franklin's contentions that Vista was virtually worthless, Terri's expert in the divorce proceedings valued the business at approximately $3 million, after reviewing the emails and other materials.
During Terri's May 8, 2012, deposition, Park provided Franklin's counsel with a binder containing copies of all of the Vista emails that Franklin had accessed.
Following the production of the emails, Franklin's divorce lawyer sought for Terri to produce the computer on which she had accessed Franklin's emails. Terri was unable to produce the hard drive since her stepfather Robert Fischer had disposed of it. She had asked her stepfather to take her personal computer to a computer business to have it "cleaned" on the day of her May 10, 2012, deposition. Id. Fischer took the computer to Safety Harbor Computers to obtain a new hard drive, and he disposed of the old hard drive by throwing it out in a dumpster. No backup copy existed. Id. Terri stated that she neither instructed nor intended for her stepfather to dispose of the old hard drive. Rather, she sought to "clean" the computer of certain materials that her husband had placed on it so that her children would be able to use the computer. She further indicated that she thought that the old hard drive had been "backed up."
On June 28, 2013, the divorce court entered a final judgment of dissolution of marriage. In its judgment, the divorce court found that both Burketts owned Vista. The divorce court valued the business
Elsewhere in the Judgment, the divorce court noted that it had examined the emails and text messages. Based on its review and the evidence adduced at trial, the divorce court concluded that Franklin had "[l]ied and misled the [divorce court] by testifying that [Vista] had `closed' even though there was evidence that it continued to operate" and that Franklin had "swor[n] that his income had significantly decreased when in fact there was written evidence that his income remained the same throughout the applicable time period." The divorce court further found that during the time when he claimed Vista would be closing and his income was diminishing, Franklin was actually shopping for homes valued between $800,000 and $975,000; traveling extensively, including to Monaco and the French Riviera; and seeking to buy an engagement ring valued at more than $100,000 for his girlfriend. In addition, the divorce court determined that Franklin had "[m]anipulated witness testimony during his brother, Tom Burkett's, deposition by text messaging him the desired answers from another room" and had engaged in other deceitful behavior during the course of the divorce proceedings. Finally, the divorce court found that Franklin had "[c]onspired to secrete and dissipate assets by moving them to offshore accounts."
Franklin appealed the Judgment of the divorce court, and Florida's Second District Court of Appeal later affirmed.
About a month after the divorce court entered its final judgment, on July 23, 2012, Vista sued Terri, alleging that she violated the Stored Communications Act, 18 U.S.C. §§ 2701-2712, when she accessed Vista's web mail account and Franklin's Vista email account during the divorce proceedings.
The case proceeded to a three-day jury trial. Prior to trial, however, Terri filed a motion in limine seeking to prevent Vista from introducing at trial testimony or exhibits on the issues for which its Rule 30(b)(6), Fed.R.Civ.P., corporate representative was unable to provide testimony. Terri contended that, during his Rule 30(b)(6) deposition, Franklin, as the corporate representative of Vista, was unable to provide information regarding the operation of Vista's web mail account or its account information. According to Terri, Franklin was also unable to provide testimony on other issues regarding Vista's procedures with respect to its web mail
Vista also filed a pretrial motion, seeking to exclude evidence based on the divorce proceedings. More specifically, Vista asked the district court to enter an order precluding Terri from entering into evidence the final judgment from the divorce proceedings or from testifying to the fact that the divorce court found Terri to be an owner of Vista. Terri opposed the motion, contending that the final judgment demonstrated that Terri was authorized to access its emails. The district court granted Vista's motion to exclude the divorce judgment.
The trial began on June 23, 2014. Vista elicited testimony seeking to establish that Terri was not an owner of Vista, while Terri testified to the opposite effect. Over Terri's objection, Vista also offered the testimony of its former information-technology directors, William Somma and Jeff Gjoen. The two men testified regarding how Vista's email account was set up and how it functioned.
During his testimony, Gjoen explained that CrystalTech was the online host for Vista's email account. According to Gjoen, Franklin's Vista emails went to Crystal-Tech, which held the emails until the Outlook program on Franklin's computer requested the emails that had not previously been received. At that time, Outlook would "reach out" to CrystalTech to get Franklin's emails. CrystalTech then sent any emails not previously transmitted to Franklin's computer. Gjoen further noted that CrystalTech stored the emails online as a backup in case Franklin's computer crashed. So, if Franklin accidentally deleted an email, that email would not be deleted from CrystalTech's online storage. In technical terms, Gjoen and Somma testified that the Vista email system was a POP3 account (which leaves the data on the server and sends a copy to Outlook) that maintains a copy for backup.
At the close of Vista's case, Terri moved for judgment as a matter of law pursuant to Rule 50(a), Fed.R.Civ.P. In support of her motion, Terri argued that the accessed emails were not in "electronic storage" and that Vista could not recover statutory damages because it failed to demonstrate that it had suffered any actual damages. The district court reserved ruling and allowed the case to proceed.
Following deliberations, the jury found that Terri had violated the SCA when she accessed her husband's emails. It further concluded that Terri had committed 450 violations of the SCA. But the jury determined that Vista had sustained no actual damages as a result of Terri's actions. And, although the jury found that Terri's conduct was "willful, wanton, or malicious for the purposes of assessing punitive damages," it awarded no punitive damages to Vista. In summary, Vista recovered nothing.
A few weeks after the jury returned its verdict, at Franklin's urging, the district court conducted a hearing to determine whether it would award statutory damages to Vista. Vista argued that it was entitled to $450,000 in statutory damages—$1,000 for each violation of the SCA. In contrast, Terri contended that the district court should not award any statutory damages to Vista because the jury found that it had not suffered any actual damages. Ultimately, the district court, in an exercise of discretion, awarded Vista $50,000 in statutory damages. It also declined to award Vista punitive damages or attorney's fees,
In the same order, the district court denied Terri's Rule 50(b), Fed.R.Civ.P., motion for judgment as a matter of law. In denying the Rule 50(b) motion, the district court concluded that Vista's email system fell within the SCA's definition of "electronic communication service." It further determined that the emails that Terri viewed were maintained within "electronic storage," as the SCA defines the term. The district court also rejected Terri's argument that Vista was required to prove actual damages in order to recover statutory damages.
Vista timely appealed the district court's order awarding damages. Terri then timely filed her cross-appeal. Between Franklin's appeal and Terri's cross-appeal, this case raises issues relating to the following matters: (1) the interpretation and application of the SCA; (2) jury instructions; and (3) evidentiary rulings.
We begin with the five issues that the appeals raise related to the interpretation and application of the SCA: (1) whether Terri accessed a facility through which an electronic communication service was provided and thereby obtained access to an electronic communication while it was in "electronic storage"; (2) whether statutory damages may be awarded under the SCA, in the absence of actual damages, and, if so, how much; (3) whether the district court's instructions to the jury regarding Vista's SCA claim and damages were erroneous; (4) whether Vista was entitled to punitive damages, despite the jury's verdict declining to award such damages; and (5) whether the district court erred in not awarding Vista punitive damages and attorney's fees.
Many of these issues raise questions of statutory interpretation. The interpretation of a statute, in turn, presents a question of law, subject to de novo review. Rine v. Imagitas, Inc., 590 F.3d 1215, 1222 (11th Cir.2009).
In reviewing the facts to which we apply the law, we consider all of the evidence in the record, drawing all reasonable inferences in favor of Franklin, since Terri raised most of these issues in a Rule 50 motion. See Reeves v. Sanderson Plumbing Prods., Inc., 530 U.S. 133, 150, 120 S.Ct. 2097, 2110, 147 L.Ed.2d 105 (2000). We neither make credibility determinations nor weigh the evidence. Id. Finally, we "disregard all evidence favorable to [Terri] that the jury [was] not required to believe." Id. at 151, 120 S.Ct. at 2110.
Vista relied on 18 U.S.C. § 2701(a)(1) to establish Terri's liability. As relevant here, that provision makes liable anyone who "intentionally accesses without authorization a facility through which an electronic communication service is provided;. . . and thereby obtains . . . access to a wire or electronic communication while it is in electronic storage in such system. . . ." 18 U.S.C. § 2701(a)(1).
Terri asserts that when she reviewed Franklin's emails, she did not use a facility through which an electronic communication service ("ECS") was provided, and she did not access electronic communications that were in "electronic storage" at the time of access. To understand Terri's argument, knowledge of some statutory definitions is necessary. "Electronic communication service" is defined as "any service which provides to users thereof the ability to send or receive wire or electronic communications."
18 U.S.C. § 2510(17). Finally, the term "remote computing service" ("RCS") means "the provision to the public of computer storage or processing services by means of an electronic communications system." 18 U.S.C. § 2711(2).
Based on the statutory definition of "electronic storage," Terri argues that § 2701(a)'s requirement that information be accessed while it is in "electronic storage" with an ECS means that the provision protects emails only while they are still pending delivery to the addressee—or, in other words, before the emails have been opened. In support of this contention, Terri invokes the definition of "electronic storage" under § 2710(17). She asserts that, by its terms, § 2510(17)(A) applies to only those email transmissions still pending delivery, and § 2510(17)(B) covers information stored for only the purposes of providing backup protection for the delivery of pending email. As a result, Terri reasons, once the email has been delivered and opened, the continued storage of it ceases to serve the purpose of backing up the email transmission until delivery has been completed. Instead, Terri urges, the service provider begins to operate as an RCS, simply storing the already-delivered emails until they are deleted. And, Terri asserts, information stored on an RCS is not protected by § 2701(a). Finally, Terri argues that since the emails she read had already been opened by Franklin, they were not in "electronic storage" but rather were in an unprotected RCS.
Much debate surrounds the issues that Terri raises. See, e.g., Theofel v. Farey-Jones, 341 F.3d 978 (9th Cir.2003), as amended by 359 F.3d 1066 (9th Cir.2004); In re DoubleClick Inc. Privacy Litig., 154 F.Supp.2d 497, 511-12 (S.D.N.Y.2001); Cheng v. Romo, No. 11-10007-DJC, 2013 WL 6814691, *3-4 (D.Mass. Dec. 20, 2013); Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548, 555-56 (S.D.N.Y.2008); Office of Legal Education, Executive Office for U.S. Attorneys, Searching and Seizing Computers and Obtaining Elec. Evidence in Criminal Investigations, at 124; Orin Kerr, A User's Guide to the Stored Commc'ns Act, and a Legislator's Guide to Amending It, 72 Geo. Wash. L.Rev. 1208 (2004). But we need not wade into the discussion because Terri's trial testimony moots her argument.
During trial, Terri conceded that, at least some of the time, she reviewed Franklin's emails before he opened them. The parties do not appear to dispute that emails that had not been opened by Franklin were maintained in "electronic storage" by a service operating as an ECS. We agree.
The language of the statutory definitions of "electronic communication service" and "electronic storage" dictates this result. See United States v. Steele, 147 F.3d 1316, 1318 (11th Cir.1998) (en banc) (citation and quotation marks omitted) ("In construing a statute we must begin, and often should end as well with the language of the statute itself."). On this record, CrystalTech qualified as an ECS because it was a service that provided Vista's employees with the ability to send and receive electronic
And, for the reasons we discuss in Section II.B, it makes no difference to the judgment in this particular case whether Terri violated the SCA once or 450 times. Consequently, the fact that Terri accessed at least one protected email moots the issue Terri raises about whether the emails were maintained by an ECS in electronic storage when she read them after Franklin had already opened them.
Next, both Franklin and Terri challenge the district court's interpretation of the damages provision applicable to violations of § 2701(a). Section 2707 governs civil actions brought under the SCA and sets forth available relief for violations of § 2701(a). It provides, in relevant part,
18 U.S.C. § 2707.
Franklin argues that § 2707(c) required the district court to award him $1,000 in statutory damages for each of the 450 violations that the jury found—or $450,000. Terri, on the other hand, asserts that that the statute precluded the district court from awarding Franklin any money in statutory damages because the jury returned a verdict reflecting that Franklin incurred no actual damages as a result of the 450 violations, and statutory damages may be awarded only upon a finding of
Several canons of statutory construction guide us in our analysis. Of course, we once again begin our statutory interpretation with the language of the statute we are construing. See Steele, 147 F.3d at 1318. In evaluating the language, we assume that Congress employed the common and ordinary meaning of the terms in the statute, and we give full effect to each of the provisions. United States v. DBB, Inc., 180 F.3d 1277, 1281 (11th Cir. 1999). We must consider any specific terms and the particular provision at issue in light of the entire statutory context. Id.
Our determination of whether a litigant must prove actual damages to receive statutory damages hinges on the meaning of the phrase "person entitled to recover," which appears in the first sentence of § 2707(c). Notably, in Doe v. Chao, 540 U.S. 614, 124 S.Ct. 1204, 157 L.Ed.2d 1122 (2004), the Supreme Court construed the materially indistinguishable phrase "person entitled to recovery" under the Privacy Act, 5 U.S.C. § 552a, to require a finding of actual damages before statutory damages may be awarded. Although the Court accounted in its analysis for general tort law and the legislative history of the Privacy Act, the Court relied heavily on the language and grammatical structure of the statute, as well as the concern for endowing every word of the statute with meaning.
The Privacy Act provision at issue in Doe was 5 U.S.C. § 552a(g)(4):
(emphasis added). The Supreme Court made three observations about the language of the Privacy Act's damages provision that are directly applicable in our analysis of the language of the SCA.
First, the Supreme Court opined that the "simplest reading" of the phrase "person entitled to recovery" in § 552a(g)(4)(a) "looks back to the immediately preceding provision for recovering actual damages," which appears earlier in the same sentence. See Doe, 540 U.S. 614, 620, 124 S.Ct. 1204, 1208 (2004). So under "a straightforward textual analysis" of the damages provision at issue in Doe, "[w]hen the statute gets to the point of guaranteeing the $1,000 minimum [in § 552a(g)(4)], it . . . has provided expressly for liability to . . . victims for `actual damages sustained.'" Id.
The SCA damages provision includes exactly the same phrase—"but in no case shall a person entitled to recovery receive less than the sum of $1,000"—as the Privacy Act damages provision. And just as with the Privacy Act damages provision (which specifies the kind of damages to be awarded upon a finding of intentional or willful action), the "but in no case . . ." clause in § 2707(c) of the SCA's damages provision immediately follows a statement
Second, the Supreme Court noted that its interpretation of the Privacy Act's damages provision accounted for the phrase "entitled to recovery," which appears in § 552a(g)(4)(a), but a construction of the damages provision to allow for statutory damages without actual damages would necessarily ignore the phrase "entitled to recovery." Id. at 623, 124 S.Ct. at 1210. As the Supreme Court explained, if Congress had intended for any person who proved a Privacy Act violation to recover statutory damages without respect to whether that person had received any other type of damages relief, it could have omitted the phrase "entitled to recovery" and provided simply for "actual damages sustained by the individual as a result of the refusal or failure, but in no case shall a person receive less than the sum of $1,000." Id. Since Congress chose not to write the statute that way, courts should give meaning to the words "entitled to recovery" because that may be done reasonably. See id.
As with the Privacy Act's damages provision, construing the SCA damages provision to allow for statutory damages upon a finding of violation without a corresponding finding of specified damages would render the phrase "person entitled to recover" meaningless. Had Congress intended to allow for recovery of statutory damages under § 2707(c) in the absence of proof of specified damages, it could have deleted the phrase "entitled to recover," just as it could have in the Privacy Act's damages provision.
Third, in Doe, the Supreme Court found that the location of Congress's placement of the "entitled to recovery" language in § 552a(g)(4)(A) provided further indication of congressional intent that the phrase "person entitled to recovery" refer to only a person who proves actual damages, not to a person who simply demonstrates a violation of the statute. Doe, 540 U.S. at 620-21, 124 S.Ct. at 1208-09. As the Supreme Court explained, if a willful and intentional violation of the Privacy Act were, in and of itself, enough to entitle a person to recovery of statutory damages, "Congress could have conditioned the entire subsection (g)(4)(A) as applying only to `a person entitled to recovery.'" Id. at 621 n.2, 124 S.Ct. at 1209 n.2. In other words, Congress could have written subsection (g)(4)(A) to say, "For a person entitled to recovery, actual damages sustained by the individual as a result of the refusal or failure, but in no case less than the sum of $1,000." But Congress did not do that. Instead, Congress deployed the "entitled to recovery" modifier "only after referring to an individual's actual damages, indicating that `actual damages' is a further touchstone of the entitlement" to statutory damages. Id.
Relatedly, the Supreme Court observed that the Privacy Act's damages provision "does not speak of liability [for statutory damages] (and consequent entitlement to recovery) in a freestanding, unqualified way, but in a limited way, by reference to enumerated damages." Id. at 620-21, 124 S.Ct. at 1208-09. In other words, as the Privacy Act uses the term "liability," it necessarily links liability for statutory damages with proof of actual damages. Notably, the Privacy Act's damages provision separately links the meaning of "liab[ility]" for a willful or intentional violation
The SCA, like the Privacy Act, does not equate a defendant's freestanding, unqualified liability in general with a plaintiff's "entitle[ment] to recover" statutory damages. Instead, as in the Privacy Act, Congress placed the "entitled to recover" limitation in the first sentence of § 2707(c) after its reference to actual damages or a violator's profits, indicating that actual damages or profits are further touchstones of a plaintiff's entitlement to statutory damages. Also like the Privacy Act, the SCA (and § 2707(c) in particular) provides for the availability of other types of relief, including the following, in separate sentences that are not modified by the phrase "entitled to recover": "In the case of a
Put simply, to give effect to all of the language in § 2707(c), we understand the phrase "entitled to recover" to refer to something different than "liability" as the terms are employed in the SCA. Had Congress intended for "entitled to recover" to mean the same thing as proof of general liability for a violation of the SCA, there would have been no reason to use these separate phrases in the same subsection of the SCA's damages provision.
Besides the statutory language, we find the relationship of the SCA to the Wiretap Act to bear on the framework of our textual analysis. The SCA was enacted as Title II of the Electronic Communications Privacy Act of 1986 ("ECPA"), legislation that also included amendments to the Wiretap Act, 18 U.S.C. § 2510, et seq., and created the Pen Register and Trap and Trace Devices statute, 18 U.S.C. §§ 3121-3126.
Through the ECPA, Congress endeavored to modernize the Wiretap Act and to provide protection for forms of communication that did not generally exist in 1968, when the Wiretap Act was originally enacted. H.R.Rep. No. 99-647, at 17 (1986). As the House Committee on the Judiciary explained, the Wiretap Act originally protected "telephone conversations and face-to-face oral communications [] against electronic eavesdropping" and "limited the concept of interception to the `aural acquisition' of the contents of a communication." Id. It made no effort to protect against the "interception of text, digital or machine communication." Id. Among other purposes, Congress intended for the ECPA to fill this gap. Id.
Because the SCA and the amended Wiretap Act were both a part of the ECPA, meaning that they were enacted together and they were designed to work together, the damages provision of the amended Wiretap Act provides helpful insight into the meaning of the damages provision of the SCA. As amended by the 1986 legislation, the Wiretap Act's damages provision stated, in relevant part,
18 U.S.C. § 2520 (1986).
Comparison of the SCA and Wiretap Act damages provisions enacted in the same piece of legislation reveals that the general structure of both statutes is the same. We find this fact to be of particular significance, since Congress essentially scrapped the prior damages provision of the Wiretap Act and started over when it amended the Wiretap Act in 1986. As a result, it is clear that the disparities between the contemporaneously enacted 1986 version of the Wiretap Act's damages provision and the SCA's damages provision are distinctions with meaningful differences.
Beginning with the similarities in structure between the two provisions, in both damages sections, subsection (a) establishes a victim's right to recover "such relief as may be appropriate," a term that is defined by subsection (b). Subsection (b) of each statute, in turn, articulates the general categories of "appropriate relief" that may be awarded. Notably, the categories set forth in subsection (b) of the SCA line up closely with those identified in subsection (b) of the Wiretap Act. Finally, subsection (c) of each statute elaborates on the meaning of "damages" as set forth in subsection (b) of each statute.
But this is where the statutes diverge, "[a]nd that [makes] all the difference."
If, as Franklin argues, Congress intended for the SCA to allow a party to choose between actual damages and statutory damages, the contemporaneously enacted amendments to the Wiretap Act certainly demonstrate that Congress knew how to say so. But Congress did not do that. The wording of the damages provisions of the Wiretap Act and the SCA is not the same, and we must give effect to the differences
Nor is it surprising that in 1986, when the ECPA was enacted, Congress chose to create different remedies for the Wiretap Act and the SCA. Unlike wire communications, which had been in mainstream use for many years and which had an established role in our society in 1986, email use was neither widespread nor even well-known in the general community at the time that Congress enacted the SCA.
In addition, the SCA's damages provision must be understood in comparison to Congress's overall treatment of the Wiretap Act versus the SCA. The Wiretap Act concerns itself with the interception of real-time communications, whereas the SCA addresses stored communications. The legislative history of the 1986 amendments suggests (and we agree) that the Fourth Amendment demands that the government demonstrate probable cause both to intercept real-time wire, oral, and electronic communications and to review the content of stored electronic communications. See, e.g., id. at 22 ("It appears likely, however, that the courts would find that the parties to an e-mail transmission have a `reasonable expectation of privacy' and that a warrant of some kind is required."); United States v. Warshak, 631 F.3d 266, 288 (6th Cir.2010) (holding that "a subscriber enjoys a reasonable expectation of privacy in the contents of emails `that are stored with, or sent or received through, a commercial ISP'"); see also United States v. Davis, 785 F.3d 498, 528-29 (11th Cir.2015) (Rosenbaum, J., concurring) (noting that "our expectation of privacy in our personal communications has not changed from what it was when we only wrote letters to what it is now that we. . . happen to use email to personally communicate.").
Despite the equal protection that the Constitution gives to the two types of communications, Congress has chosen to subject the government's real-time interceptions of wire, oral, and electronic communications to more stringent requirements than the Fourth Amendment requires and than it has imposed on government
In addition, to obtain a wiretap order, the government must show not only probable cause of a criminal violation and probable cause that evidence of that violation will be found in the communications to be intercepted-all that the Fourth Amendment itself requires. It must also provide all of the following:
18 U.S.C. § 2518(1). The judge considering the wiretap application may also "require the applicant to furnish additional testimony or documentary evidence in support of the application." 18 U.S.C. § 2518(2).
But with respect to review of the content of stored electronic communications, the SCA imposes no requirements on the government beyond obtaining a warrant, which the Fourth Amendment already generally requires, anyway.
In light of this fact, it would be inconsistent, to say the least, if Congress treated civil violations of the SCA more severely than civil violations of the Wiretap Act. But Franklin's proposed construction of the SCA—that it provides for $1,000 in statutory damages for each violation—would do just that.
We are not the first court to hold that the SCA does not authorize an award of statutory damages in the absence of an award for actual damages or profits realized by the offender. The Fourth Circuit has reached this same conclusion. See Van Alstyne v. Elec. Scriptorium, Ltd., 560 F.3d 199 (4th Cir.2009).
While Vista argues that Van Alstyne "has repeatedly been called into question for faulty reasoning," we are not persuaded by the rationales of the district-court and state-court opinions on which Vista relies. Other courts have disagreed with the result that we and Van Alstyne reach, based on their views of the language of § 2707(c), the legislative history of the provision, and policy reasons. We consider their reasoning and explain below why we respectfully disagree with it and therefore with Vista.
With regard to the statutory language, other courts that have concluded that statutory damages are available in the absence of actual damages have attempted to distinguish Doe's interpretation of the Privacy Act language by reasoning, "In [the Privacy Act], the restrictive language shall be liable seems to dictate actual damages as the only remedy in that clause, whereas in § 2707(c), the language that the court may assess the sum of actual damages and any profits seems to offer that formula as one means of calculation." Shefts v. Petrakis, 931 F.Supp.2d 916, 918 (C.D.Ill. 2013).
But the Supreme Court did not ground its determination that the Privacy Act precluded statutory damages in the absence of actual damages, on the mandatory nature of an award of actual damages under the Privacy Act. Rather, the Court based its textual reading of the Privacy Act's damages provision on the sentence structure of the sentence containing the "but in no case" clause—the same sentence structure that exists in the SCA's damages provision. And the reading of the SCA's damages provision proposed in these other opinions conflicts directly with the Supreme Court's "straightforward textual analysis" of the materially indistinguishable language of the Privacy Act's damages provision. See Doe, 540 U.S. at 620, 124 S.Ct. at 1208.
Moreover, we respectfully disagree that the language of the Privacy Act is distinguishable on the grounds suggested by these other cases. Indeed, even some of the courts that have concluded that the SCA authorizes an award of statutory damages without proof of actual damages have conceded that the language of the
Nor do we find anything inconsistent in the use of the word "may" in § 2707(c) and the notion that the statute limits the availability of statutory damages to those who have showed actual damages or profits by the violator. Rather, use of the word "may" in the first sentence of § 2707(c) conveys only that, where actual damages or a violator's profits exist, a court has discretion to decide whether to award to the plaintiff actual damages or profits of the violator, or both or neither, when these damages exceed $1,000, instead of awarding just $1,000 in statutory damages.
Some courts have also attempted to distinguish the language of the Privacy Act from that of the SCA on the following basis:
In re Hawaiian Airlines, Inc., 355 B.R. at 230. We respectfully disagree with this reasoning because subsection (a) does not end with the phrase "in that violation." And the language omitted from the opinion's recitation of subsection (a)—that a "person aggrieved by any violation of this chapter . . . may . . . recover . . .
The opinions on which Vista relies have identified two reasons why the legislative history of § 2707 purportedly supports the determination that no actual damages are required for an award of statutory damages: (1) in Doe, "the Supreme Court distinguished the SCA as irrelevant to the interpretation of the Privacy Act" based on the two statutes' respective legislative histories; and (2) the House and Senate Reports supporting the SCA legislation support the conclusion that Congress intended for statutory damages to be available even in the absence of actual damages and a violator's profits. See Shefts, 931 F.Supp.2d at 918-919. We are not convinced by either reason.
First, while Doe did decline to consider the legislative history of the SCA in construing the meaning of the Privacy Act, it did so because the SCA was a separate statute "passed well after the Privacy Act." Doe, 540 U.S. at 626, 124 S.Ct. at 1212. As the Supreme Court explained, "subsequent legislative history will rarely override a reasonable interpretation of a statute that can be gleaned from its language and legislative history prior to its
Second, with regard to the legislative history of the SCA, we note at the outset that we do not consider a statute's legislative history where the statute's text is clear. CBS Inc. v. PrimeTime 24 Joint Venture, 245 F.3d 1217, 1227 (11th Cir. 2001). But even to the extent that, after Doe, the language employed in § 2707(c) may be viewed as ambiguous,
Courts concluding that the SCA's legislative history indicates that Congress intended for statutory damages to be available in the absence of actual damages point to the House Report and the Senate Report in support of its point. With respect to the Senate Report, these courts point to the following language: § 2707(c) provides for "damages . . . including the sum of actual damages suffered by the plaintiff and any profits made by the violator as the result of the violation as provided in (c) with minimum statutory damages of $1,000." See Shefts, 931 F.Supp.2d at 918-919 (quoting S.Rep. No. 99-541, at 43, 1986 U.S.C.C.A.N. 3555, 3597).
This sentence construes the Senate version of the bill, which ultimately did not become § 2707(c). Compare S.Rep. No. 99-541, at 82 and 18 U.S.C. § 2707(c) (1986). Significantly, the Senate version of the bill did not authorize punitive damages, but the enacted version of § 2707(c) does. While we have been unable to find an express explanation in the legislative history for why Congress chose the version of § 2707(c) that provided for punitive damages over the version that did not when it enacted the SCA, the difference is significant. It allows the statute to serve as a deterrent to would-be violators even when they think their violations will inflict no actual damages, and it permits victims to recover in an appropriate case even when they can prove no actual damages. See Van Alstyne, 560 F.3d at 209 (holding that the SCA includes statutory language making punitive damages recoverable even in the absence of proof of actual damages).
But even setting aside the fact that the cited legislative history comes from the version of the bill that was not enacted, it simply cannot bear the weight that it must carry to provide clear evidence of congressional intent that statutory damages be available in the absence of actual damages. Presumably, the courts citing this language rest their reasoning on the Senate Report's use of the word "with" in the phrase "damages . . . including the sum of actual damages suffered by the plaintiff and any profits made by the violator as the result of the violation as provided in (c) with minimum statutory damages of $1,000."
But "with" could mean "in addition to," among other common definitions, "with" can also be "[u]sed as a function word to indicate accompanying detail or condition: just sat there with his mouth open." With, The Am. Heritage Dictionary of English Language (4th ed.2000). Under this definition, "with" does nothing more in the quoted sentence of the Senate Report than detail the minimum award for actual damages and a violator's profits, where actual damages or a violator's profits exist in the first place.
As for the House Report, opinions concluding that Congress intended for statutory damages to be available in the absence of actual damages rely on the following passage:
Shefts, 931 F.Supp.2d at 918. Most respectfully, it is not apparent to us how the use of the term "measure" indicates that Congress intended statutory damages to be available in the absence of actual damages or a violator's profits. $0 in statutory damages in the absence of actual damages or a violator's profits is just as much a measure of damages as $1,000 in statutory damages where actual damages or a violator's profits, or both, exist but total less than $1,000, or an award in excess of $1,000 where actual damages or a violator's profits, or both, exceed $1,000.
With regard to the word "include," we first note that it can introduce an exclusive list or a partial list. But even assuming that Congress intended the second meaning, the sentence using the word "include" does not set forth all types of damages that § 2707(c) expressly authorizes. Rather, § 2707(c) also expressly provides for the imposition of punitive damages. So the form of damages missing from the list in the House Report could just as easily refer to punitive damages.
Particularly in view of the legislative history of the ECPA as a whole—and the apparent deliberate difference between the damages provisions of the Wiretap Act and the SCA, we do not find the quoted sentences from the House and Senate Reports to shed any light on, much less give a clear indication of, congressional intent.
Some opinions on which Vista relies also invoke a policy reason for allowing an award of statutory damages without actual damages or profits. They explain, "[A]ctual damages may often be very difficult to
For all of these reasons, we respectfully disagree with Vista that Van Alstyne is based on "faulty reasoning" or that it is undermined by the reasoning of opinions reaching the opposite conclusion.
Terri challenges two jury instructions on appeal: (1) Jury Instruction No. 8, relating to the definition of "electronic storage" under the SCA, and (2) Jury Instruction No. 9, regarding damages under the SCA. But Terri failed to object to these instructions before the jury deliberated.
Rule 51, Fed.R.Civ.P., provides that objections to jury instructions must be made at a hearing before instructions and arguments are delivered or promptly upon learning that the challenged instruction will be, or has been, given or refused, whichever occurs first. See Fed.R.Civ.P. 51(c)(2). Where, as here, a party fails to timely object, Rule 51(d)(2), Fed.R.Civ.P., provides for plain-error review "if the error affects substantial rights."
Under plain-error review, a party must show (1) an error occurred; (2) the error was plain; (3) the error affected substantial rights; and (4) failure to correct the error would "seriously affect the fairness of the judicial proceeding." Farley v. Nationwide Mut. Ins. Co., 197 F.3d 1322, 1329 (11th Cir.1999). We have previously recognized the strict construction of the plain-error test that we apply in the context of erroneous jury instructions. Id. As we have explained, "[R]eversal for plain error in the jury instructions or verdict form will occur only in exceptional cases where the error is so fundamental as to result in a miscarriage of justice." Id. (emphasis in original) (citations and internal quotation marks omitted). Satisfying this standard requires a party to prove that the "challenged instruction was an incorrect statement of the law and [that] it was probably responsible for an incorrect verdict, leading to substantial injustice." Id. (citations and internal quotation marks omitted). We have described this standard as requiring an error of law that is "so prejudicial as to have affected the out-come of the proceedings." Id. (citation and internal quotation marks omitted). Terri cannot satisfy this showing.
In Jury Instruction No. 8, the district court instructed the jury that, for a violation of the SCA to have occurred, the accessed emails must have been in "electronic storage." The district court then
Even if we assume without deciding that the district court's instruction was error, we have held that "a court's reasonable interpretation of the contours of an area of legal uncertainty hardly could give rise to plain error when those contours are. . . in a state of evolving definition and uncertainty." Heath v. Suzuki Motor Corp., 126 F.3d 1391, 1394 (11th Cir.1997). Here, that's exactly the case. As we have noted in Section II.A of this opinion, considerable disagreement exists over whether, and if so, under what conditions, opened email transmissions may qualify as being held in "electronic storage." Because the law with regard to this issue is far from settled, it cannot form the basis for a finding of plain error.
Terri's second challenge to the jury instructions fares no better. In Jury Instruction No. 9, the district court instructed,
Terri contends that the instruction was erroneous because it failed to inform the jury that, upon a finding of a violation, Terri would be liable for statutory damages or that the judge would then determine statutory damages based on the jury's finding of the number of violations under the SCA.
Terri has not showed plain error. First, Terri points to nothing affirmatively erroneous in the instruction, and we find nothing. Rather, Terri argues that the instruction is incomplete or misleading because it does not include further information. But not only did Terri fail to object to the omission in the instruction of the points about which she now complains, Terri never requested a supplement to the instruction. And a court cannot err by not providing a special instruction that a party did not request. Wood v. President & Trustees of Spring Hill Coll. in City of Mobile, 978 F.2d 1214, 1223 (11th Cir. 1992).
Moreover, even if Terri had timely requested the instruction she seeks on appeal, that instruction would have been an incorrect statement of the law. As this case demonstrates, it is not necessarily accurate to say that a defendant will be liable for statutory damages if a violation of the SCA is found. Nor is it a correct statement of law that statutory damages will be calculated based on the number of violations found, since, at most, a plaintiff
Next, we turn to Vista's claim that the district court should have awarded it punitive damages, despite the jury's verdict declining to do so. In support of this position, Vista appears to assert that the district court somehow devalued the jury's finding of 450 violations by failing to award punitive damages. Ironically, though, awarding punitive damages would have directly conflicted with the jury's express finding that $0 in punitive damages should be awarded to Vista, despite the number of violations that the jury found.
Vista cites no law supporting its contention that it was entitled to an award of punitive damages in the face of a jury verdict denying it just that. Instead, Vista refers to the language of the statute to argue that "punitive damages should have been awarded." But the SCA makes the award of punitive damages entirely discretionary: "If the violation is willful or intentional, the court
Where, as here, the imposition of punitive damages is entirely discretionary, the Seventh Amendment precludes a court from increasing the jury's award. Millennium Partners, L.P. v. Colmar Storage, LLC, 494 F.3d 1293, 1303 (11th Cir.2007) (citing Dimick v. Schiedt, 293 U.S. 474, 55 S.Ct. 296, 79 L.Ed. 603 (1935)). As a result, the district court correctly declined to award Vista punitive damages, since the jury returned a verdict for $0 in punitive damages.
Our final consideration involving the SCA concerns the matter of attorney's fees. The operative statutory language again comes from § 2707(c): "In the case of a successful action to enforce liability under this section, the court may assess the costs of the action, together with reasonable attorney fees determined by the court." As with the award of punitive damages, the statutory language—again employing the word "may"—makes an award of attorney's fees discretionary, not mandatory, in a "successful action."
We may reverse a district court's decision to deny attorney's fees only if we find that the district court abused its discretion. See Smith v. Psychiatric Sols., Inc., 750 F.3d 1253, 1259 (11th Cir.2014). A district court abuses its discretion if it does not apply the correct legal standard, or it fails to follow proper procedures in making the determination, or it bases an
First, we agree with the district court's implicit conclusion that Vista successfully enforced liability in this action. As we have explained, liability under the SCA is a concept distinct from whether a person is "entitled to recover" actual damages or a violator's profits. In this case, the jury returned a verdict finding that Terri violated the SCA 450 times and that she did so intentionally or willfully. That is enough to successfully "enforce liability" under the SCA.
But that does not end the inquiry since the SCA makes the award of attorney's fees discretionary. Here, the district court explained its denial of fees as follows:
(emphasis in original). This statement satisfactorily articulates the district court's reasons for its decision not to award attorney's fees in this case.
Vista asserts that it was error for the district court to consider as one continuing violation the 450 violations that the jury found. Even assuming that it was, in this case, the error was harmless. The single-violation rationale was but one of several reasons for the district court's decision not to impose attorney's fees. It is clear that the district court primarily relied on its observations that Vista had not demonstrated that it was harmed in any way and that the entire case appeared to be not an action to vindicate Vista's rights but instead a weapon to execute Franklin's "vendetta" against Terri. Having sat through the trial, the district judge was in the best position to observe the demeanor of the parties and the witnesses. Not only that, but the record amply supports the district judge's findings. And Franklin points to no evidence to contradict the district judge's conclusions.
Vista also argues that policy considerations favor an award of attorney's fees in this case. It contends that plaintiffs should not be reluctant enforce their rights under the SCA because the cost of representation may render them worse off even if they are successful in securing a jury verdict. Usually, we would find this point to have force. But where, as here, litigation seems motivated by vindictiveness (as opposed to a bona fide desire to enforce rights), it is unlikely that the availability (or lack thereof) of attorney's fees upon a successful action to enforce liability would
Besides the considerations that the district court invoked, we also note that Terri sought legal counsel concerning accessing Vista's emails, and her attorney advised her that she could lawfully review them and even instructed her to print and keep them. Under these circumstances, we fail to see how an award of attorney's fees could serve as a deterrent to others. In short, we cannot say that the district court abused its discretion in declining to award Vista fees.
Finally, we address the evidentiary issues that Terri raises in her cross-appeal. Terri challenges two evidentiary rulings: (1) the exclusion of the divorce court's final judgment and factual findings; and (2) the denial of Terri's motion in limine and the related admission of evidence regarding the technical functioning of Vista's email system.
We review the district court's evidentiary rulings for abuse of discretion. See Conroy v. Abraham Chevrolet-Tampa, Inc., 375 F.3d 1228, 1232 (11th Cir.2004). Under this standard, we affirm the rulings of the district court unless the court "made a clear error of judgment, or . . . applied an incorrect legal standard." Id. But even then, the challenging party must establish that the error affected substantial rights to obtain reversal and a new trial. See Piamba Cortes v. Am. Airlines, Inc., 177 F.3d 1272, 1305 (11th Cir.1999); see also 28 U.S.C. § 2111 ("On the hearing of any appeal . . . in any case, the court shall give judgment after an examination of the record without regard to errors or defects which do not affect the substantial rights of the parties."). Here, we find no reversible error.
Terri first objects to the district court's decision precluding admission of the divorce court's final judgment and testimony relating to the final judgment. She notes that Vista introduced evidence that Terri was neither involved in nor an owner of Vista in support of Vista's contention that Terri was not authorized to access Franklin's Vista account. In view of this evidence, Terri asserts, she should have been able to present the final judgment and related evidence of the divorce court's findings that Terri had previously been involved with Vista and that she was an owner of Vista.
The district court excluded the evidence solely on the basis that it was irrelevant. While we disagree that the evidence was irrelevant, we do not find reversible error.
Vista alleged that Terri violated the SCA by accessing Vista's email account "without authorization." And, in fact, "intentionally access[ing]
The final judgment concluded that Terri was an owner of Vista. Terri's status as an owner of Vista, in turn, tends to make it more probable that she was authorized to access Vista's email account. As a result, the evidence satisfies the test for relevant evidence set forth in Rule 401, Fed. R.Evid.: "Evidence is relevant if: (1) it
But that is not the end of the inquiry because we may affirm for any reason supported by the record, regardless of whether the district court relied on it. See Am. United Life Ins. Co. v. Martinez, 480 F.3d 1043, 1059 (11th Cir.2007). In addition to being relevant, evidence must also be otherwise admissible. Here, Franklin contends that the final judgment is inadmissible hearsay to which no exception applies. See United States v. Jones, 29 F.3d 1549, 1554 (11th Cir.1994). For her part, Terri responds that the final judgment is admissible under Rules 803(14) and (15), Fed.R.Evid., as records of documents that affect an interest in property.
We need not resolve this issue. Even assuming without deciding that the evidence was admissible, Terri has not shown that failure to admit the judgment substantially prejudiced her case. Although the district judge ruled that he would not allow Terri to admit the divorce judgment to prove she was an owner of Vista, ultimately, he effectively allowed the equivalent evidence, anyway. In this regard, Terri's divorce attorney, Park, took the stand and attested to his belief that Terri was an owner of Vista and specifically that the divorce court had found her to be an owner of the company.
Terri also challenges the district court's denial of her motion in limine to preclude Vista from offering the testimony of Jeff Gjoen and William Somma. In her motion, Terri asserted that, at trial, Vista should not be permitted to present evidence of how Vista's email functions (and of whether, as a matter of fact, the emails Terri accessed were electronic communications in electronic storage provided by an electronic communication service, as those terms are defined by the SCA) because Vista's Rule 30(b)(6), Fed.R.Civ.P., deposition witness—Franklin—denied knowledge of these matters and did not indicate that another individual had that information. The district court denied the motion without explanation.
We do not find an abuse of discretion. While Terri suggests that she was "ambushed" with the testimony of Gjoen and Somma at trial, the record belies her contention. As early as in Vista's Rule 26 initial disclosures, Vista disclosed that both men were likely to have discoverable information.
By the time of the Rule 30(b)(6) deposition, Vista had closed, and neither Somma nor Gjoen were employed by the company. As a result, Franklin testified, he was the only person available to act as the Rule 30(b)(6) representative. But Franklin did direct Terri to the people who had the information about Vista's email system. Franklin testified that Somma was Vista's former IT director and that he was possibly the person to speak with regarding Vista's email retention policy, as well as its server and equipment. He added that Gjoen had initially established Vista's email procedures. At the end of Terri's deposition, Terri's counsel recognized that Somma was "[d]efinitely . . . going to be the guy we need to talk to on a lot of things about [the email]." Despite these facts, Terri did not take the depositions of Somma or Gjoen. Under these circumstances, we do not find that the district court abused its discretion in denying Terri's motion in limine.
For the reasons we have described, we affirm the district court's denial of Terri's motion for judgment as a matter of law, jury instructions, denial of an award of attorney's fees, trial ruling precluding admission of the divorce court's final judgment, and denial of Terri's motion in limine. We vacate the district court's award of statutory damages to Franklin.
FAY, Circuit Judge, concurring specially:
I concur in the portion of Judge Rosenbaum's opinion that affirms the following decisions of the trial judge: denying Terri Burkett's motion for judgment as a matter of law under Federal Rule of Civil Procedure 50(b), her challenges to Jury Instruction No. 8 and Jury Instruction No. 9, attorney's fees, Burkett's motion in limine, and precluding admission of the final judgment of the divorce court, all of which are governed by settled precedent. Judge Rosenbaum's opinion, however, primarily is devoted to interpreting for this circuit the damages section of the Stored Communications Act ("SCA"), 18 U.S.C. § 2707(c). Because I disagree with her analysis, I write separately.
This case is controlled by Doe v. Chao, 540 U.S. 614, 124 S.Ct. 1204 (2004), and Fanin v. U.S. Dep't of Veterans Affairs, 572 F.3d 868 (11th Cir.2009). The wording of the SCA damages section is so close to that of the Privacy Act, 5 U.S.C. § 552a(g)(4), I conclude we are bound by the holdings of those cases. No damages are available to one bringing an action under either Act unless actual damages are proved. Actual damages "means pecuniary losses." Fanin, 572 F.3d at 872. These holdings resolve this case. In my opinion, there is simply no need to delve into legislative history or the analyses of non-binding case law.
The jury decided that, although there were multiple violations of the SCA, there were no damages whatsoever—compensatory or punitive. Jury verdicts are not "overturned unless no rational trier of fact
H.R. Rep. 99-647, at 22.
Van Alstyne, 560 F.3d at 209.