Elawyers Elawyers
Washington| Change

Royal Truck & Trailer Sales v. Mike Kraft, 19-1235 (2020)

Court: Court of Appeals for the Sixth Circuit Number: 19-1235 Visitors: 5
Filed: Sep. 09, 2020
Latest Update: Sep. 10, 2020
Summary: RECOMMENDED FOR PUBLICATION Pursuant to Sixth Circuit I.O.P. 32.1(b) File Name: 20a0301p.06 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT ROYAL TRUCK & TRAILER SALES AND SERVICE, INC., + Plaintiff-Appellant, ¦ ¦ > No. 19-1235 v. ¦ ¦ ¦ MIKE KRAFT; KELLY MATTHEWS, ¦ Defendants-Appellees. ¦ + Appeal from the United States District Court for the Eastern District of Michigan at Port Huron. No. 3:18-cv-10986—Robert H. Cleland, District Judge. Argued: December 12, 2019 Decided and Filed: Septemb
More
                              RECOMMENDED FOR PUBLICATION
                              Pursuant to Sixth Circuit I.O.P. 32.1(b)
                                     File Name: 20a0301p.06

                  UNITED STATES COURT OF APPEALS
                                FOR THE SIXTH CIRCUIT



 ROYAL TRUCK & TRAILER SALES AND SERVICE, INC.,            ┐
                               Plaintiff-Appellant,        │
                                                           │
                                                            >        No. 19-1235
       v.                                                  │
                                                           │
                                                           │
 MIKE KRAFT; KELLY MATTHEWS,                               │
                           Defendants-Appellees.           │
                                                           ┘

                        Appeal from the United States District Court
                     for the Eastern District of Michigan at Port Huron.
                   No. 3:18-cv-10986—Robert H. Cleland, District Judge.

                                Argued: December 12, 2019

                           Decided and Filed: September 9, 2020

             Before: GILMAN, KETHLEDGE, and READLER, Circuit Judges.

                                    _________________

                                          COUNSEL

ARGUED: Anthony M. Sciara, KOTZ SANGSER WYSOCKI P.C., Detroit, Michigan, for
Appellant. Salvatore J. Vitale, VARNUM LLP, Novi, Michigan, for Appellees. ON BRIEF:
Anthony M. Sciara, Mark F.C. Johnson, KOTZ SANGSER WYSOCKI P.C., Detroit, Michigan,
for Appellant. Salvatore J. Vitale, Richard T. Hewlett, VARNUM LLP, Novi, Michigan, for
Appellees.
                                    _________________

                                           OPINION
                                    _________________

      CHAD A. READLER, Circuit Judge.                 Following the abrupt resignation of two
employees, Royal Truck & Trailer discovered that the employees, prior to resigning, had
 No. 19-1235               Royal Truck & Trailer Sales v. Kraft, et al.                    Page 2


accessed confidential company information from their company-issued computers and cell
phones and then utilized the information in violation of company policy. Royal responded by
filing suit against the employees, alleging violations of the federal Computer Fraud and Abuse
Act (CFAA) as well as Michigan law.

       The conduct at issue might violate company policy, state law, perhaps even another
federal law. But because Royal concedes that the employees were authorized to access the
information in question, it has failed to satisfy the statutory requirements for stating a claim
under the CFAA. Accordingly, we AFFIRM the district court’s judgment.

                                        BACKGROUND

       Royal employed Defendants Mike Kraft and Kelly Matthews as a part of the company’s
sales team. In conjunction with their employment, Defendants received a copy of Royal’s
employee handbook. With respect to the use of company equipment, the handbook prohibited a
range of conduct, including: personal activities; unauthorized use, retention, or disclosure of any
of Royal’s resources or property; and sending or posting trade secrets or proprietary information
outside the organization. Royal also had a cell phone “GPS Tracking Policy.” In accordance
with that policy, “[e]mployees may not disable or interfere with the GPS (or any other) functions
on a company issued cell phone,” nor may employees “remove any software, functions or apps.”
R.8, Am. Compl., ¶ 18.

       Kraft and Matthews abruptly resigned from Royal to take up employment with T-N-T
Trailer Sales, one of Royal’s Detroit-area competitors.       Fearing that confidential company
information might have been compromised, Royal launched an investigation. That hunch, the
investigation later revealed, proved prescient. Shortly before his resignation, Kraft forwarded
from his Royal email account to his personal one quotes for two Royal customers as well as two
Royal paystubs. Kraft also contacted one of Royal’s customers through Royal’s email server to
ask the customer to send “all the new vendor info” to Kraft’s personal email account. With that,
Kraft then deleted and reinstalled the operating system on his company-issued laptop, rendering
all of its data unrecoverable.    Eventually, Royal officials went to Kraft’s home and took
possession of the laptop as well as Kraft’s company-issued cell phone.
 No. 19-1235                Royal Truck & Trailer Sales v. Kraft, et al.                   Page 3


       Before her resignation, Matthews did much the same. From her Royal email account,
Matthews sent to Kraft’s personal email account a Royal “Salesperson Summary Report” that
contained confidential and proprietary sales information. She likewise forwarded an email from
her Royal account to her personal one that contained customer pricing information. And as Kraft
did with his company laptop, Matthews reset her company-issued cell phone to factory settings,
rendering all data on the phone unrecoverable. Matthews then returned her company-issued
laptop and cell phone to Royal’s corporate headquarters and resigned, announcing her
resignation more broadly through social media by sharing a link to a video of Johnny Paycheck’s
hit song, “You Can Take This Job and Shove It.”

       Unamused, Royal hired a “forensics expert” to conduct a “comprehensive and costly
damage assessment” in an effort to restore the deleted data on the now former employees’
devices. R.8, Am. Compl., ¶¶ 25–26. It later filed suit against Kraft and Matthews in federal
court, alleging that their conduct violated the CFAA as well as Michigan law.

       The district court, however, did not see things Royal’s way. It concluded that because
Kelly and Matthews were authorized to access the information obtained from their company-
issued computers and cell phones, the two did not “exceed[]” their “authorized access,” as those
terms are used in the CFAA, by later using the information accessed on those devices in
violation of company policy. Royal filed a timely appeal.

                                           ANALYSIS

       Under our familiar standard for reviewing a district court’s decision granting a motion to
dismiss, we “construe the complaint in the light most favorable to the plaintiff, accept its
allegations as true, and draw all reasonable inferences in favor of the plaintiff.” Jones v. City of
Cincinnati, 
521 F.3d 555
, 559 (6th Cir. 2008) (quoting Directv, Inc. v. Treesh, 
487 F.3d 471
, 476
(6th Cir. 2007)). Against that backdrop, we ask whether the complaint “contain[s] sufficient
factual matter . . . to ‘state a claim to relief that is plausible on its face.’” Ashcroft v. Iqbal,
556 U.S. 662
, 678 (2009) (quoting Bell Atlantic Corp. v. Twombly, 
550 U.S. 544
, 570 (2007)).

       The CFAA claims. As the basis for its federal claims against Kraft and Matthews,
Royal invokes § 1030(a)(2)(C) of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030.
 No. 19-1235                Royal Truck & Trailer Sales v. Kraft, et al.                    Page 4


That provision instructs that one who “intentionally accesses a computer without authorization or
exceeds authorized access, and thereby obtains . . . information from any protected
computer . . . shall be punished.”
Id. § 1030(a)(2)–(a)(2)(C). Although
a violation of the CFAA
can be met with criminal sanction (“shall be punished”), the Act also creates a private right of
action, one that allows for civil liability where “the conduct involves 1 of the factors set forth in
subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i).”
Id. § 1030(g); Pulte
Homes,
Inc. v. Laborers’ Int’l Union of N. Am., 
648 F.3d 295
, 299 (6th Cir. 2011) (explaining that the
CFAA “criminalizes certain computer-fraud crimes and creates a civil cause of action”).
Of those five subclauses, relevant here is subclause (I), which covers “loss to 1 or more
persons during any 1-year period . . . aggregating at least $5,000 in value.”            18 U.S.C.
§ 1030(c)(4)(A)(i)(I).

       1. Taking all of this together, to allege a violation of § 1030(a)(2)(C), Royal must plead
that: (1) Defendants intentionally accessed a computer; (2) the access was unauthorized or
exceeded Defendants’ authorized access; (3) through that access, Defendants thereby obtained
information from a protected computer; and (4) the conduct caused loss to one or more persons
during any one-year period aggregating at least $5,000 in value.           At this threshold stage,
Defendants do not contest the first or third elements, and we will accept, for today’s purposes,
that Royal’s claim meets the $5,000 threshold in element four. That leaves the second element:
whether Defendants’ access was unauthorized, or whether Defendants exceeded their authorized
access, when they sent Royal’s confidential information from their work devices to their personal
email accounts.

       We can narrow our focus even more.             Royal acknowledges that Defendants had
authorization to access company information through their company email accounts, and thus
does not assert that Defendants’ access was without authorization.          What remains for our
resolution then is whether Defendants nonetheless “exceed[ed] [their] authorized access” by
misusing the accessed information in violation of company policy.
Id. § 1030(a)(2). In
answering that question, we begin with the CFAA’s definitional provisions. The Act
defines “exceeds authorized access” as “to access a computer with authorization and to use such
access to obtain or alter information in the computer that the accesser is not entitled so to obtain
 No. 19-1235                Royal Truck & Trailer Sales v. Kraft, et al.                    Page 5


or alter.”   18 U.S.C. § 1030(e)(6).       Critical to that formulation are the terms “access,”
“authorization,” and “obtain or alter.” We have previously defined the term “authorization,” at
least in the inverse: “[A] defendant who accesses a computer ‘without authorization,’” we have
said, “does so without sanction or permission.” Pulte 
Homes, 648 F.3d at 304
(citing LVRC
Holdings, LLC v. Brekka, 
581 F.3d 1127
, 1132–33 (9th Cir. 2009)). “Authorization” thus means
to have sanction or permission. Likewise, as to the terms “obtain” and “alter,” Royal emphasizes
mainly the former, which is customarily understood as “to gain” or “to attain.” Obtain, Oxford
English Dictionary Online (3d ed. 2004).

       Now the term “access.” It is commonly defined as some variation of “entry,” generally
the initial entry into something. Dictionaries include several variations of “access,” one of which
is “[t]he power, opportunity, permission, or right to come near or into contact with someone or
something; admittance; admission.” Access, Oxford English Dictionary Online (3d ed. 2011).
Another definition describes how “access” customarily is used in a digital setting:           “[t]he
opportunity, means, or permission to gain entrance to or use a system, network, file, etc.” A
related definition describes “access” as “[t]he process or act of obtaining or retrieving data from
storage.”
Id. Further reflecting how
“access” is used in our technology-based society, Oxford
includes a sample use of the term, defining “[h]acking” as “the practice of gaining illegal or
unauthorized access to other people’s computers.”
Id. (emphasis in original).
       Reading these definitional provisions together, it follows that in utilizing the phrase
“exceeds authorized access,” the CFAA targets one who initially “gain[s] entrance to . . . a
system, network, or file” with “sanction or permission,” and then “gain[s] or attain[s]”
“information” that, in the words of the statute, she is “not entitled so to obtain . . . .” 18 U.S.C.
§ 1030(e)(6). Congress’s use of the word “so” in the phrase “so to obtain or alter” is particularly
instructive.
Id. “So” operates here
as an adverb, meaning “in the way or manner described,
indicated, or suggested.” So, Oxford English Dictionary Online (2d ed. 1989). The placement of
“so” near the end of the definitional sentence refers back to the antecedent “with authorization”
found earlier in the definition. That textual signal is further confirmation that one who exceeds
authorized access has permission to enter a computer for specific purposes, yet later obtains (or
alters) information for which access has not been authorized. Section 1030(a)(2)’s aim, in other
 No. 19-1235               Royal Truck & Trailer Sales v. Kraft, et al.                   Page 6


words, is penalizing those who breach cyber barriers without permission, rather than policing
those who misuse the data they are authorized to obtain.

       The CFAA’s “damages” and “loss” provisions further confirm the Act's narrow scope.
They too appear aimed at preventing the typical consequences of hacking, rather than the misuse
of corporate information in the manner alleged by Royal. “Damages” is defined with reference
to the “impairment to the integrity or availability” of data, programs, systems, or information.
18 U.S.C. § 1030(e)(8). And the definition of “loss” speaks to the costs incurred by victims in
responding to an offense, assessing damages, and restoring data, programs, systems, or
information, as well as the costs incurred due to interrupted service.
Id. § 1030(e)(11). While
attentive to hacking episodes and the like, this is hardly the remedial scheme one might expect in
a statute intended to address the misuse of sensitive business information by an employee who
uses her “authorized access” in disloyal ways. See, e.g., 10 U.S.C. § 923(a)(1) (punishing
members of the armed forces who access a government computer “with an unauthorized
purpose” and obtain classified information).

       Collectively, these interpretive clues defeat Royal’s CFAA claims. The CFAA prohibits
accessing data one is not authorized to access. United States v. Nosal, 
676 F.3d 854
, 858 (9th
Cir. 2012). And Royal has not contested either Kraft’s or Matthews’s authorization to access the
company files in question. Because Defendants had authorization to access that information,
their conduct did not “exceed” their “authorized access,” as those terms are used in § 1030(a)(2).
To be sure, Royal does allege that Kraft and Matthews later misused the information they
accessed. But the CFAA does not reach that conduct.

       Indeed, Congress surely knew how to say “exceeds authorized use” or otherwise
proscribe using data for unauthorized purposes. See, e.g., 6 U.S.C. § 482(b)(1), (b)(3) (requiring
sharing of homeland security information among federal agencies in a way that “ensure[s] that
such information is not used for an unauthorized purpose”). Yet it did not do so in the CFAA.
Congress’s “silence” on that score “is controlling.” Lindley v. FDIC, 
733 F.3d 1043
, 1055–56
(11th Cir. 2013) (“‘[W]here Congress knows how to say something but chooses not to, its silence
is controlling.’” (quoting Griffith v. United States, 
206 F.3d 1389
, 1394 (11th Cir. 2000))); see
also Averett v. United States Dep’t of Health & Hum. Servs., 
943 F.3d 313
, 318 (6th Cir. 2019)
 No. 19-1235                Royal Truck & Trailer Sales v. Kraft, et al.                     Page 7


(“Omitting a phrase from one statute that Congress has used in another statute with a similar
purpose ‘virtually commands the inference’ that the two have different meanings.” (citations
omitted)).

       We arrived at a similar conclusion as to the CFAA’s scope in interpreting the phrase
“without authorization” as used in § 1030(a)(5)(B) and (C) of the CFAA, statutory companions
to § 1030(a)(2). See Pulte Homes, 
648 F.3d 295
. Pulte Homes involved allegations that a labor
union launched a campaign of email spam and voicemails against a home builder in retaliation
for firing a union employee.
Id. at 303.
We were asked to decide whether that conduct
constituted accessing a “protected computer without authorization.”
Id. In holding that
it did
not, we noted that the defendant had permission to use phone and email communications to
contact the plaintiff, emphasizing that the CFAA’s authorization requirements focus narrowly on
whether one’s threshold access was authorized.
Id. at 304.
       Given this plain understanding of the CFAA’s terms, we need not rely on the rule of
lenity, as Defendants urge. Statutory interpretation starts (and customarily ends) with the text of
the statute. Out of respect for Congress’s textual choices, we turn to the rule of lenity only when,
unlike here, statutory language cannot otherwise be reconciled. See United States v. Adams,
722 F.3d 788
, 804 n.8 (6th Cir. 2013) (the rule of lenity “comes into operation at the end of the
process of construing what Congress has expressed, not at the beginning” (quoting Callanan v.
United States, 
364 U.S. 587
, 596 (1961))). Nor is there need to resort to legislative history, an
often treacherous path in its own right. See United States v. Woods, 
571 U.S. 31
, 46 n.5 (2013)
(“Whether or not legislative history is ever relevant, it need not be consulted when, as here, the
statutory text is unambiguous.”); Conroy v. Aniskoff, 
507 U.S. 511
, 519 (1993) (Scalia, J.,
concurring) (“[Legislative history] is not merely a waste of research time and ink; it is a false and
disruptive lesson in the law. . . . The greatest defect of legislative history is its illegitimacy.”).
But see United States v. Valle, 
807 F.3d 508
, 525 (2d Cir. 2015) (utilizing legislative history to
conclude that the CFAA was intended to address hacking, as that history consistently references
“trespass” into computer systems or data as the problem the Act was meant to remedy).

       2. Our interpretation today, we acknowledge, might not be the final word. The Supreme
Court recently granted certiorari in Van Buren v. United States, 
940 F.3d 1192
(11th Cir. 2019),
 No. 19-1235                Royal Truck & Trailer Sales v. Kraft, et al.                   Page 8


cert. granted, 
206 L. Ed. 2d 822
(Apr. 20, 2020) (No. 19-783). Although set in a criminal
posture, Van Buren presents the Supreme Court with the opportunity to resolve the meaning of
“exceeds authorized access” as used in the CFAA.

       That the Supreme Court agreed to hear Van Buren is likely a reflection of the lower
courts’ dueling interpretations of this critical passage in the CFAA. 18 U.S.C. § 1030(a)(2). As
we do today, the Second, Fourth, and Ninth Circuits have also held that one who is authorized to
access a computer does not exceed her authorized access by violating an employer’s restrictions
on the use of information once it is validly accessed. See 
Valle, 807 F.3d at 511
–12; WEC
Carolina Energy Sols., LLC v. Miller, 
687 F.3d 199
, 206 (4th Cir. 2012); LVRC 
Holdings, 581 F.3d at 1129
, 1133. So too have a majority of district courts in our Circuit. See Royal Truck &
Trailer Sales & Serv., Inc. v. Kraft, No. 18-10986, 
2019 WL 1112387
, at *3 (E.D. Mich. Mar.
11, 2019) (collecting cases).

       That said, today’s decision is in tension with those from the First, Fifth, Seventh, Eighth,
and Eleventh Circuits, all of whom have more broadly interpreted “exceeds authorized access.”
Those courts read § 1030’s statutory terms as encompassing situations where an employee has
authorization to access company information but uses that information in violation of company
policy. See United States v. Rodriguez, 
628 F.3d 1258
, 1263–64 (11th Cir. 2010) (holding that
an employee exceeded authorized access by obtaining company information for non-business
purposes); Int’l Airport Ctrs., LLC. v. Citrin, 
440 F.3d 418
, 420 (7th Cir. 2006) (utilizing
principles of agency law to find that an employee accessed his computer “without authorization”
where his authorized access was terminated once he used the information improperly); United
States v. John, 
597 F.3d 263
, 271–72 (5th Cir. 2010) (finding an employee liable for exceeding
authorized access even where he had access for other purposes); EF Cultural Travel BV v.
Explorica, Inc., 
274 F.3d 577
, 581–83 (1st Cir. 2001) (holding that a former employee exceeded
authorized access by violating a confidentiality agreement and accessing his former employer’s
website).

       In addition to being less faithful to § 1030’s text, this latter interpretation has the odd
effect of allowing employers, rather than Congress, to define the scope of criminal liability by
operation of their employee computer-use policies.        Had Congress intended the seemingly
 No. 19-1235               Royal Truck & Trailer Sales v. Kraft, et al.                    Page 9


sweeping result of effectively criminalizing violations of an employee handbook, it would have
said so in clear terms. See Jones v. United States, 
529 U.S. 848
, 858 (2000) (“[U]nless Congress
conveys its purpose clearly, it will not be deemed to have significantly changed . . . the
prosecution of crimes.” (internal quotation marks omitted)). Yet the CFAA does not mention
such policies. Absent clear instruction, we should be hesitant to impose federal sanctions for
conduct as pedestrian as checking one’s private social media account on a work phone. With
corporate policies sometimes written in broad and arguably vague terms, treating violations as
criminal acts also risks a lack of statutory notice to employees over the precise nature of conduct
now criminalized. See, e.g., United States v. Lopez, 
929 F.3d 783
, 785 (6th Cir. 2019) (penal
statutes must define the criminal offense with “sufficient definiteness that ordinary people can
understand what conduct is prohibited” (quoting Kolender v. Lawson, 
461 U.S. 352
, 357
(1983))). And it risks “arbitrary and discriminatory enforcement” given the variation in those
policies between companies and across industries. 
Nosal, 676 F.3d at 860
; United States v.
Dunning, 
857 F.3d 342
, 348 (6th Cir. 2017). All of this counsels in favor of our narrow reading
of the CFAA.

       Data deletion. One additional issue of federal law deserves mention. Royal also alleges
that Kraft and Matthews deleted data from their work devices. And unlike the Royal customer
information Kraft and Matthews were authorized to access for some purposes, Royal contends
that Kraft and Matthews had no authorization to engage in data deletion.

       As compared to misusing confidential information one is at least authorized to obtain,
data deletion, in some circumstances, might fairly be characterized as more akin to “exceed[ing
one’s] authorized access.” But even if Kraft and Matthews “excee[ded their] authorized access”
by deleting data from their company devices, Royal’s complaint does not allege that the two
“thereby obtain[ed] information from [a] protected computer,” a required element under
§ 1030(a)(2)(C). After all, as others before us have previously acknowledged, it is difficult to
equate deleting data with obtaining the same.       See Experian Mktg. Sols., Inc. v. Lehman,
2015 WL 5714541
, at *7 (W.D. Mich. Sept. 29, 2015) (accessing a laptop to delete data was not
obtaining information for purposes of § 1030(a)(2)(C)); Bd. of Trustees of Pierce Twp. v.
Hartman, 
2008 WL 11351291
, at *4 (S.D. Ohio June 18, 2008) (deletion of data on a work
 No. 19-1235                Royal Truck & Trailer Sales v. Kraft, et al.                    Page 10


device after employment had ended did not constitute “obtain[ing] information” under
§ 1030(a)(2)(C); “[r]ather, the claim is that [defendant] destroyed information without
authorization”). In the context of the claim presented here, we thus reject this theory of CFAA
liability as well.

        State-law claims. In the absence of a viable federal claim by Royal, the district court
dismissed Royal’s state-law claims without prejudice. It did so in accordance with the settled
rule that when a district court dismisses all claims over which it has original jurisdiction (here the
CFAA claims), it may also dismiss any state-law claims before it based on supplemental
jurisdiction. 28 U.S.C. § 1367(c)(3); Gamel v. City of Cincinnati, 
625 F.3d 949
, 952 (6th Cir.
2010) (noting that “[w]hen all federal claims are dismissed before trial, the balance of
considerations usually will point to dismissing the state law claims, or remanding them to state
court if the action was removed” (citation omitted)). We see no reason to do otherwise.

                                          CONCLUSION

        For the aforementioned reasons, we AFFIRM the judgment of the district court.


Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer