WILLIAM B. SHUBB, District Judge.
Plaintiff AtPac, Inc. ("AtPac") filed this action against defendants Aptitude Solutions, Inc. ("Aptitude"), County of Nevada, and Gregory J. Diaz alleging breach of contract, misappropriation of trade secrets, copyright infringement, and violation of the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030 et seq. Defendants move to dismiss plaintiff's fourth cause of action pursuant to Federal Rule of Civil Procedure 12(b) (6) for failure to state a claim upon which relief can be granted.
The facts of this case have been thoroughly discussed in the court's prior order granting defendants' motion to dismiss (Docket No. 21.) AtPac subsequently amended its Complaint to add additional factual allegations regarding the server on which it alleges its source code was stored and regarding defendants' deceptive and allegedly illegal actions. This Order details only those facts that are newly alleged.
Specifically, plaintiff's First Amended Complaint ("FAC") alleges that AtPac was the exclusive system administrator for the ER-Recorder server which was housed with Nevada County. (FAC (Docket No. 22) ¶ 24.) As system administrator, AtPac alleges that it created all user accounts and passwords for the server and was custodian of its master system administrator/root account. (Id. ¶ 25.) The ER-Recorder server was allegedly segregated such that the CRiis application and customer data was stored in one set of directories, and proprietary AtPac files—including the source code—were stored in another set of directories. (Id. ¶ 26.) Plaintiff allegedly created all login accounts for Nevada County personnel such that they were restricted from accessing the AtPac directories. (Id.) Nevada County personnel, therefore, could access parts of the server in order to execute the CRiis
Plaintiff quotes from an additional provision of the License Agreement, which allegedly provides that:
(FAC ¶ 20 (substitutions in FAC).) The parties allegedly understood and agreed that Nevada County was authorized to access the ER-Recorder server only to run the CRiis software and was prohibited from granting any third parties access to the server whatsoever. (Id.) Plaintiff alleges that Nevada County was not authorized to access the AtPac directories other than in the event of emergency. (Id. ¶ 27.)
On November 4, 2008, Nevada County employees allegedly e-mailed each other regarding the transition from AtPac to Aptitude as the County's clerk-recorder software provider. (Id. ¶ 28.) One e-mail allegedly stated that
Nevada County asked AtPac for permission to grant Aptitude remote access to the ER-Recorder server on November 18, 2008, which was immediately denied. (Id. ¶ 30.) Plaintiff alleges that Nevada County concealed from it the fact that it already given Aptitude access to the server and that Aptitude had already inspected AtPac's trade secrets. (Id. ¶¶ 30-31.) On November 19, 2008, Nevada County allegedly informed Aptitude via e-mail that AtPac rejected its request. (Id. ¶ 30.)
In addition to alleging that defendants violated §§ 1030(a)(2) (c), (a)(4) and (a)(5) of the CFAA as alleged in its original Complaint, plaintiff's fourth cause of action in its FAC alleges that defendants trafficked
On a motion to dismiss, the court must accept the allegations in the complaint as true and draw all reasonable inferences in favor of the plaintiff. Scheuer v. Rhodes, 416 U.S. 232, 236, 94 S.Ct. 1683, 40 L.Ed.2d 90 (1974), overruled on other grounds by Davis v. Scherer, 468 U.S. 183, 104 S.Ct. 3012, 82 L.Ed.2d 139 (1984); Cruz v. Beto, 405 U.S. 319, 322, 92 S.Ct. 1079, 31 L.Ed.2d 263 (1972). To survive a motion to dismiss, a plaintiff needs to plead "only enough facts to state a claim to relief that is plausible on its face." Bell Atl. Corp. v. Twombly, 550 U.S. 544, 127 S.Ct. 1955, 1974, 167 L.Ed.2d 929 (2007). This "plausibility standard," however, "asks for more than a sheer possibility that a defendant has acted unlawfully," and where a complaint pleads facts that are "merely consistent with" a defendant's liability, it "stops short of the line between possibility and plausibility." Ashcroft v. Iqbal, 522 U.S. ___, ___, 129 S.Ct. 1937, 1949, 173 L.Ed.2d 868 (2009) (quoting Twombly, 550 U.S. at 556-57, 127 S.Ct. 1955).
In general a court may not consider items outside the pleadings upon deciding a motion to dismiss, but may consider items of which it can take judicial notice. Heliotrope Gen., Inc. v. Ford Motor Co., 189 F.3d 971, 981 n. 18 (9th Cir.1999) (internal citations omitted); Barron v. Reich, 13 F.3d 1370, 1377 (9th Cir.1994). A court may take judicial notice of facts "not subject to reasonable dispute" because they are either "(1) generally known within the territorial jurisdiction of the trial court or (2) capable of accurate and ready determination by resort to sources whose accuracy cannot reasonably be questioned." Fed.R.Evid. 201. Furthermore, courts may consider documents outside the complaint without converting the motion to dismiss into a motion for summary judgment if (1) the documents' authenticity is not contested; and (2) the plaintiff's complaint necessarily relief on the documents. Lee v. City of Los Angeles, 250 F.3d 668, 688 (9th Cir.2001).
Defendants have submitted a Request for Judicial Notice ("RJN") (Docket No. 24) that contains a copy of the July 19, 2004 License Agreement (Ex. 1) and a transcript from the court's April 26, 2010 hearing on defendants' first motion to dismiss (Ex. 2). The court will take judicial notice of the second exhibit because it is a matter of public record. Fed.R.Evid. 201. Plaintiff objects to the court taking judicial notice of defendants' first exhibit, arguing that defendants failed to provide a declaration attesting to its authenticity. (Opp'n to Mot. to Dismiss (Docket No. 25) at 16.) As defendants have not attempted to authenticate the document, the court must decline to take judicial notice of it.
The parties renew their arguments regarding whether the CFAA prohibits—and makes the defendants potentially criminally liable for—breaching the License Agreement by accessing and giving Aptitude access to the Atpac drives on the ER-Recorder server. The relevant provisions of the CFAA make liable:
18 U.S.C. § 1030(a). "Traffic" is defined as to "transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of." 18 U.S.C. § 1029(e)(5).
As a preliminary matter, the court notes that plaintiffs allege that all three defendants are liable under each subsection of 18 U.S.C. § 1030(a) quoted above without making any distinctions among Diaz, Nevada County, or Aptitude for purposes of liability. The court previously determined that because Diaz and Nevada County were authorized to access the computer that housed plaintiff's CRiis software— now referred-to as the ER-Recorder server—that they could not have "accessed a protected computer without authorization" as required to be liable under § 1030(a)(5)(C). (Order of April 29, 2010 (Docket No. 21).) As the facts alleged in the FAC do not change this conclusion, the court will construe plaintiff's fourth cause of action accordingly.
While the CFAA itself does not define the terms "authorization" or "without authorization," the Ninth Circuit has interpreted the term "without authorization" to mean "without any permission at all." LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1133 (9th Cir.2009) ("[A]n employer gives an employee `authorization' to access a company computer when the employer gives the employee permission to use it.") The CFAA defines "[e]xceeds authorized access" as "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled to so obtain or alter." 18 U.S.C. § 1030(e)(6); see also LVRC, 581 F.3d at 1133.
Plaintiff alleges that Diaz and the County of Nevada exceeded their authorized access to the ER-Recorder server in violation of § 1030(a)(2)(C) and (a)(4) when the County's employees accessed the AtPac directories on the ER-Recorder server in order to provide Aptitude with the "isphydoux" password and provide Aptitude with the source code on the server.
To remedy the defects the court identified in its prior Order, plaintiff now alleges that the License Agreement includes a provision—quoted in full in Part I, supra—that AtPac shall keep a copy of its source code in escrow that Nevada County could access—but not disclose to third-parties-only if AtPac went out of business. (FAC ¶ 20.) Plaintiff argues that this contractual provision reflects the parties' understanding
Plaintiff also asserts that, in addition to the written terms of the License Agreement, the parties agreed to additional informal and unwritten contract terms regarding the ER-Recorder server. Specifically, plaintiff alleges that the parties agreed that Nevada County was authorized to access the ER-Recorder server only to run the CRiis software, and that indeed no Nevada County employee was given a login account that provided AtPac access rights. (FAC ¶¶ 20, 26.) For purposes of the present motion to dismiss the court will assume these allegations are true.
While the CFAA defines the term "exceeds authorized access" as "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled to so obtain or alter," 18 U.S.C. § 1030(e)(6), the Ninth Circuit's opinion in LVRC provides additional guidance that counsels the statute should be read narrowly. The LVRC court refused to adopt an expansive interpretation of the CFAA's reach, holding that the rule of lenity required the term "authority" be construed such that employees did not automatically lose "authority" to access a computer when they violate their duty of loyalty to their employer by accessing the computer with an improper purpose. 581 F.3d at 1133-34. In that case the computer owner's conduct—not the accessor's state of mind—determined whether access was "authorized." Id. at 1135. Simply put, a person cannot access a computer "without authorization" if the gatekeeper has given them permission to use it.
The same logic applies to the term "exceeding authorized access." The LVRC court interpreted that term in dicta, stating that "[a] person who `exceeds authorized access,' has permission to access the computer, but accesses information on the computer that the person is not entitled to access." 581 F.3d at 1133 (citations omitted). As with the term "without authorization," the intent of the individual accessing the computer is irrelevant; if she has authority to access information on a computer then she cannot violate the CFAA by accessing it. See United States v. Nosal, No. 08-0237, 2010 WL 934257, at *6 (N.D.Cal. Jan. 6, 2010) ("If a person is authorized to access the `F' drive on a computer or network but is not authorized to access the `G' drive of that same computer
In interpreting the term "exceeds authorized access" in this manner, the court is counseled by Supreme Court's warning against interpreting criminal statutes in surprising and novel ways that impose unexpected burdens on defendants. See United States v. Carr, 513 F.3d 1164, 1168 (9th Cir.2008) ("[A]mbiguity concerning the ambit of criminal statutes should be resolved in favor of lenity.") (quoting Rewis v. United States, 401 U.S. 808, 812, 91 S.Ct. 1056, 28 L.Ed.2d 493 (1971)); see also United States v. Santos, 553 U.S. 507, 515, 128 S.Ct. 2020, 2025, 170 L.Ed.2d 912 (Scalia, J.) (plurality opinion). It seems incongruous to this court that the alleged "hacker's" mental state should be irrelevant when determining whether she had any access to a computer at all and relevant when determining whether she had access to specific information on a computer she was authorized to access. Rather, the court believes that the plainest and common-sense understanding of the definition of the term "exceeds authorized access" is one that simply examines whether the accessor was entitled to access the information for any purpose.
Plaintiff admits that it gave Nevada County the keys to its most sensitive trade secrets and source code. Nevada County had permission to access the AtPac directories and source code in order to shut-down the server in the event of an emergency. Nevada County could not violate the CFAA and "exceed authorized access" by accessing or obtaining the AtPac directories or source code. See LVRC, 581 F.3d at 1135. What Nevada County chose to do once it accessed the AtPac directories—what its intent in accessing those portions of the ER-Recorder server was— is irrelevant. The CFAA simply does not apply to those who have authority to access specific parts of a computer but do so with an improper purpose. While Nevada County and Diaz's actions may have violated the terms of the License Agreement or other contract with AtPac and may have constituted an inappropriate use of the information, they did not violate the CFAA. See State Analysis, Inc. v. American Financial Services Assoc., 621 F.Supp.2d 309 (E.D.Va.2009).
The parties again rehash their arguments regarding whether Nevada County and Diaz could "authorize" Aptitude to access the ER-Recorder server. The court's prior Order stated that, "State Analysis does not establish—and the court is not willing to so rule—that third parties can ordinarily be liable under the CFAA for exploiting a licensee's violation of its license agreement. Rather, State Analysis is perhaps best applied in situations where the third-party defendant uses subterfuge—like using user names and passwords that do not belong to it—to gain access to plaintiff's protected materials on plaintiff's own website, computers, or servers." (Docket No. 21.) Plaintiff has now amended its Complaint with the intent of alleging the sort of "subterfuge" that could impose CFAA liability on a third-party defendant.
Specifically, plaintiff alleges that Nevada County staff e-mailed each other regarding granting Aptitude access to the AtPac directories, and that once this was done Nevada
Simply put, plaintiff alleges that it gave Nevada County permission to access the AtPac directories on the ER-Recorder server, that Nevada County created a login to the ER-Recorder server to which it had access, and gave this log-in to Aptitude which Aptitude then used. These facts are distinguishable from State Analysis in multiple and significant ways such that any potential liability that could possibly apply under State Analysis's reasoning is inapplicable. For example, the plaintiffs in this case do not own the ER-Recorder server as was the case in State Analysis. Nor is Aptitude one of plaintiff's former clients such that it could be on notice as to the terms of plaintiff's License Agreement with Nevada County.
On a more fundamental level, the court is unwilling to stretch the scope of the CFAA to encompass Aptitude's alleged exploitation of Nevada County's violation of its license agreement with plaintiff. Aptitude did not access the ER-Recorder server "without authorization" because it accessed the server with its own password given it by Nevada County. Nor did Aptitude act covertly when it accessed the ER-Recorder server; it did so openly with its own log-in and with Nevada County's express permission. See Theofel, 359 F.3d at 1072-74, 1078 (stating that the Stored Communications Act—and presumably also the CFAA—"provides no refuge for a defendant who procures consent by exploiting a known mistake that relates to the essential nature of his access."). While plaintiff potentially has other claims against Aptitude for its conduct, Aptitude did not open itself to potential criminal liability under the CFAA.
The CFAA prohibits anyone from, knowingly and with the intent to defraud, trafficking in any password through which a computer may be accessed without authorization. 18 U.S.C. § 1030(a)(6). The CFAA defines "traffic" as to "transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of." 18 U.S.C. § 1029(e)(5). The court notes that, in the course of its own research, it has come across only a handful of federal cases that even mention § 1030(a)(6), of which only State Analysis, 621 F.Supp.2d 309 (receiving a password is not "trafficking"), analyzes the scope and substance of the provision. In interpreting the provision, therefore, the court will look to the plain language of the statute. United States v. Blixt, 548 F.3d 882, 887 (9th Cir.2008); see Perrin v. United States, 444 U.S. 37, 42, 100 S.Ct. 311, 62 L.Ed.2d 199 (1979) ("A fundamental canon of statutory construction is that, unless otherwise defined, words will be interpreted as taking their ordinary, contemporary, common meaning.").
Despite its pernicious connotation, "trafficking" in a password is the simple
In interpreting the related provisions of 18 U.S.C. § 1030(a)(4) the court in Multiven, Inc. v. Cisco Sys., Inc. 725 F.Supp.2d 887, 2010 WL 2889262 (N.D.Cal. July 20, 2010) stated that "a plaintiff cannot prove `intent to defraud' by merely showing that an unauthorized access has taken place." WL 2889262, at *4. Just as the court in Multiven made clear that "intent to defraud" in the § 1030(a)(4) context requires a greater showing than simply an unauthorized access, "intent to defraud" in the § 1030(a)(6) context requires more than the intent to impermissibly give access to another.
Plaintiff's trafficking claim against Nevada County fails because plaintiff has alleged no facts to give rise to an inference of any "intent to defraud" when Nevada County gave Aptitude the "isphydoux" password. Nevada County had access to the server and to the AtPac directories from where it created the "isphydoux" password and on which plaintiff's source code was stored. While Nevada County may have breached some term of the License Agreement when it gave Aptitude a password to access the server, this is not the sort of fraud Congress envisioned when it made password trafficking subject to criminal penalties.
Furthermore, the CFAA does not criminalize password "trafficking" unless it enables the password recipient to access a computer without authorization. 18 U.S.C. § 1030(a)(6). Because the court has determined that plaintiff has not sufficiently alleged that Aptitude accessed the ER-Recorder server "without authorization," it follows that plaintiff has also failed to allege that Nevada County illegally "trafficked" in the "isphydoux" password that enabled Aptitude to access the ER-Recorder server. Because Nevada County could grant Aptitude access to the ER-Recorder server, the password did not allow Aptitude to access the server "without authorization" as required to support a trafficking claim under § 1030(a)(6). This court cannot conclude that Congress intended to impose criminal liability on third parties just because a computer licensee violates a license agreement.
Finally, to the extent that the FAC complains against Diaz individually for trafficking in the "isphydoux" password, plaintiff has failed to allege that Diaz "trafficked" in the password. While plaintiff alleges that Diaz signed the form used to create a new user account, plaintiff does not allege that Diaz personally transferred the "isphydoux" password to Aptitude or that he obtained control of the password with the intent to transfer it to Aptitude. (See FAC ¶¶ 28-29.)
Plaintiff's failure to adequately plead "loss" under the CFAA provides an alternate ground for dismissal of plaintiff's CFAA claim. The CFAA is primarily a criminal statute that prohibits the intentional
18 U.S.C. § 1030(g). The relevant factors listed in subsection (c)(4)(A)(i) are:
18 U.S.C. § 1030(c)(4)(A)(i). On the face of plaintiff's FAC, only the first factor could possibly apply. "Loss" is defined in the statute as:
18 U.S.C. § 1030(e)(11). "Loss," therefore, means two things: "any reasonable cost to the victim" and lost revenue or other damages incurred as a result of an interruption of service.
To allege a loss under the CFAA, "plaintiffs must identify impairment of or damage to the computer system that was accessed without authorization." Doyle v. Taylor, No. 09-158, 2010 WL 2163521, at *2 (E.D.Wash. May 24, 2010) (citing cases and holding that where plaintiff alleged defendant accessed his USB thumb drive and retrieved a sealed document, "[p]laintiff would have to show that the thumb drive itself was somehow damaged or impaired by Defendant's act of accessing the drive"). Cognizable costs also include "the costs associated with assessing a hacked system for damage[and] upgrading a system's defenses to prevent future unauthorized access." Id. at *3; see SuccessFactors, Inc. v. Softscape, Inc., 544 F.Supp.2d 975 (N.D.Cal.2008) ("[W]here the offense involves unauthorized access and the use of protected information .... the cost of discovering the identity of the offender or the method by which the offender accessed the protected information [is] part of the loss for purposes of the CFAA.").
To allege a loss of revenue, the loss must result from the unauthorized server breach itself. See Therapeutic Res. Faculty v. NBTY, Inc., 488 F.Supp.2d 991 (E.D.Cal.2007) (loss sufficiently alleged
Congress' restricting of civil actions to cases that cause the types of harm listed in 18 U.S.C. § 1030(c)(4)(A)(i) subsections (I) through (V) reemphasizes the court's conclusion that the sort of conduct alleged against Nevada County does not fall under the CFAA's prohibitions. "Loss" is grouped along with the harms of physical injury, threat to public health and safety, impairment of medical diagnosis or treatment, and damage to federal government computers that deal with national security and defense. It is no surprise that courts interpreting the definition of "loss" sufficient to bring a civil action have done so narrowly given the company that subsection (I) keeps. The definition of "loss" itself makes clear Congress's intent to restrict civil actions under subsection (I) to the traditional computer "hacker" scenario—where the hacker deletes information, infects computers, or crashes networks. See 18 U.S.C. § 1030(e)(11) (enumerating legitimate "costs" in terms of computer damage). While defendants raised this argument for the first time in their Reply brief, the court finds no reason to ignore the plain language of the statute.
Plaintiff does not allege any facts that indicate that it incurred costs to update its server security protocols or otherwise analyze the circumstances of the unauthorized server access. Rather, plaintiff's fourth cause of action alleges that defendants "obtained something of value exceeding $5,000 in a single calendar year," and contains the conclusory allegations that plaintiff has been damaged and that it has suffered immediate and irreparable harm. (FAC ¶¶ 84, 87-88.) Because plaintiff has not alleged that it incurred any costs or experienced lost revenue as a direct result of defendants' unauthorized server access, they have not alleged to have suffered a "loss" under the CFAA. Defendants' motion to dismiss will therefore be granted in its entirety.
IT IS THEREFORE ORDERED that defendants' motion to dismiss plaintiff's fourth cause of action be, and the same hereby is, GRANTED.