SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Litigation Alert
  Ninth Circuit Holds Computer Fraud and Abuse Act Criminalizes
  Employee’s Access To Information In Violation Of Employer’s Express
  Access Limitations
  laurence f. pulgram, tyler g. newby and sebastian e. kaplan



United States v. Nosal, No. 10-10038 (April 28, 2011)           and by means of such conduct furthers the intended
(Trott, J., O’Scannlain, J., Campbell, J.)                      fraud and obtains anything of value.” In light of
                                                                the Ninth Circuit’s decision in LVRC Holdings LLC
http://www.ca9.uscourts.gov/datastore/                          v. Brekka, which construed the phrase “accesses
opinions/2011/04/28/10-10038.pdf                                . . . without authorization” to exclude the actions
Summary                                                         of individuals who had misused their otherwise
                                                                authorized access to computer systems, the district
On Thursday, April 28, 2011, the Ninth Circuit, in a split      court dismissed five of the eight counts against
decision, held that an employee could be criminally             Nosal.
liable under the Computer Fraud and Abuse Act, 18
U.S.C. § 1030 (the “CFAA”), for exceeding authorized            The Ninth Circuit’s Decision
access to an employer’s computer system by accessing            In reversing the district court, the Ninth Circuit
proprietary information in violation of the employer’s          held that “an employee ‘exceeds authorized
written policies. In so holding, the Ninth Circuit              access’ under § 1030 when he or she violates
joined several other circuits in interpreting the CFAA’s        the employer’s computer access restrictions—
“exceeds authorized access” prong to cover violations           including use restrictions.” Because the company
of an employer’s clearly disclosed computer use policy          had contractually prohibited its employees from
to misappropriate proprietary company information.              disclosing information on its computer system to
This interpretation of the CFAA also has ramifications          third parties, or from using the information except
outside the employment context, and potentially                 for legitimate business purposes, the employees
extends to enforceable terms of use policies and other          exceeded their authorization when they violated that
contracts restricting network access.                           prohibition.
Background of the Case                                          The Ninth Circuit distinguished Brekka, which
The facts of the case read like a garden-variety civil          addressed the CFAA’s access without authorization
trade secret dispute. David Nosal had worked for                prong, as opposed to the exceeding authorized
the executive search firm Korn/Ferry International,             access prong at issue in Nosal. Unlike the company
which he left to start a competing firm. Soon after             in Brekka, Korn/Ferry had made its computer access
leaving the firm, Nosal engaged three Korn/Ferry                and non-disclosure policies conspicuously clear to
employees to help set up the rival company. Those               all its employees.
employees downloaded information about executive                The Ninth Circuit addressed the concern that its
candidates from Korn/Ferry’s password-protected                 interpretation of “exceeds authorized access” would
leads database and provided that information to                 make criminals out of employees who violated their
Nosal. All Korn/Ferry employees had been required to            employer’s use policies by using work computers for
sign employment agreements prohibiting disclosure of            personal reasons. It held that the government—and
such information.                                               by extension, a plaintiff in a private civil action, which
In a federal criminal indictment, Nosal, was charged            is also available to enforce the CFAA—would still need
with violating § 1030(a)(4) of the CFAA, which imposes          to satisfy the other elements of § 1030(a)(4). Those
criminal liability for anyone who: “knowingly and               elements require proof that that (1) the defendant
with intent to defraud, accesses a protected computer           intended to defraud the company, (2) the computer
without authorization, or exceeds authorized access,            access furthered that intent, and (3) the defendant
                                                                obtained something of value through the access.



litigation newsletter                                                                                   www.fenwick.com
Implications                                               For further information, please contact:

Nosal gives greater teeth to computer access and use       Laurence F. Pulgram, Partner, Litigation Group
policies, thereby improving companies’ ability to deter    lpulgram@fenwick.com, 415.875.2390
both outsiders and insiders from stealing confidential
                                                           Tyler G. Newby, Of Counsel, Litigation Group and
business information. In Nosal, the computer use           White Collar/Regulatory Group
policy prohibited disclosure to outside parties and        tnewby@fenwick.com, 415.875.2495
use other than for legitimate business purposes.
                                                           Sebastian E. Kaplan, Associate, Litigation Group
Restrictions on disclosure create a bright line rule
                                                           skaplan@fenwick.com, 415.875.2477
that puts employees on notice. Restrictions on the
purpose of access—such as for legitimate business          ©2011 Fenwick & West LLP. All Rights Reserved.
purposes—present greater vagueness problems.
Although the majority did not explicitly criticize Korn/
                                                           the views expressed in this publication are solely those of the author, and
Ferry’s restriction for legitimate business purposes,      do not necessarily reflect the views of fenwick & west llp or its clients.
                                                           the content of the publication (“content”) should not be regarded as
it effectively replaced that standard by focusing on       advertising, solicitation, legal advice or any other advice on any particular
                                                           matter. the publication of any content is not intended to create and does
the “intent to defraud” element. This suggests that        not constitute an attorney-client relationship between you and fenwick &
companies may face difficulty enforcing a computer         west llp. you should not act or refrain from acting on the basis of any
                                                           content included in the publication without seeking the appropriate legal
use policy where an employee’s motivation falls in         or professional advice on the particular facts and circumstances at issue.

the gray area between a legitimate business purpose
and outright fraud. Where possible, computer use
policies should be drafted to prohibit actions, instead
of intentions.

Employers’ computer use policies, in addition to
being clear, must be conspicuous. Korn/Ferry’s policy
was disclosed to employees at the time of hiring and
each time an employee logged onto the Korn/Ferry
computer system.

Nosal also has implications for restrictions on access
to electronic information provided to customers or
the public. A company that provides information
on its website may be able to restrict the use of that
information through enforceable Terms of Use. By
the same token, companies who access information
on an outside website should take note of what
use restrictions exist. Nosal, however, involved the
employment context, and the Ninth Circuit has not
yet addressed whether the definition of access or
authorization will be interpreted differently for non-
employees.




2   litigation alert – may 2, 2011                                                                                 fenwick & west

Más contenido relacionado

Destacado

9TH, PPP installations. BIM 2, 2012
9TH, PPP  installations. BIM 2, 20129TH, PPP  installations. BIM 2, 2012
9TH, PPP installations. BIM 2, 2012
Artistic Education
 
9 step performance process v2
9 step performance process v29 step performance process v2
9 step performance process v2
DJ King
 
9 pengantar sistem informasi
9 pengantar sistem informasi9 pengantar sistem informasi
9 pengantar sistem informasi
teddyhadia
 
9. personal profile
9. personal profile9. personal profile
9. personal profile
Meghan Cary
 
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
Brandon Pridgett
 
9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare
Cristiana Toma
 
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
zornik
 

Destacado (19)

9TH, PPP installations. BIM 2, 2012
9TH, PPP  installations. BIM 2, 20129TH, PPP  installations. BIM 2, 2012
9TH, PPP installations. BIM 2, 2012
 
9 step performance process v2
9 step performance process v29 step performance process v2
9 step performance process v2
 
9th dutch flemish meeting presentation serlie mol
9th dutch flemish meeting presentation serlie mol9th dutch flemish meeting presentation serlie mol
9th dutch flemish meeting presentation serlie mol
 
9 pengantar sistem informasi
9 pengantar sistem informasi9 pengantar sistem informasi
9 pengantar sistem informasi
 
9 Quotes to Inspire Your Day
9 Quotes to Inspire Your Day9 Quotes to Inspire Your Day
9 Quotes to Inspire Your Day
 
9. tcp ip
9. tcp ip9. tcp ip
9. tcp ip
 
Present from ipad
Present from ipadPresent from ipad
Present from ipad
 
9th gymnasium of kalamaria
9th  gymnasium of kalamaria9th  gymnasium of kalamaria
9th gymnasium of kalamaria
 
9tex BD Profile
9tex BD Profile9tex BD Profile
9tex BD Profile
 
9. personal profile
9. personal profile9. personal profile
9. personal profile
 
9 space pup
9  space pup9  space pup
9 space pup
 
9 tips til videoinnhold på Facebook
9 tips til videoinnhold på Facebook9 tips til videoinnhold på Facebook
9 tips til videoinnhold på Facebook
 
9. sinfonia
9. sinfonia9. sinfonia
9. sinfonia
 
9 tibermacine
9 tibermacine9 tibermacine
9 tibermacine
 
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
 
9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare
 
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
 
9 story points for writing your script for a life you love
9 story points for writing your script for a life you love9 story points for writing your script for a life you love
9 story points for writing your script for a life you love
 
9. primary management of trauma patient(52) Dr. RAHUL TIWARI
9. primary management of trauma patient(52) Dr. RAHUL TIWARI9. primary management of trauma patient(52) Dr. RAHUL TIWARI
9. primary management of trauma patient(52) Dr. RAHUL TIWARI
 

Similar a 9th circuit

EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
scubastog
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"
Patton Boggs LLP
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 

Similar a 9th circuit (20)

ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and Licensing
 
How to combat cybersquatting or cyberpiracy.pdf
How to combat cybersquatting or cyberpiracy.pdfHow to combat cybersquatting or cyberpiracy.pdf
How to combat cybersquatting or cyberpiracy.pdf
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
 
Current Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptCurrent Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.ppt
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Ten Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderTen Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud Provider
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Establishing violations of Computer Fraud and Abuse Act
Establishing violations of Computer Fraud and Abuse ActEstablishing violations of Computer Fraud and Abuse Act
Establishing violations of Computer Fraud and Abuse Act
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part I
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Service
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpert
 

Más de Andres Baytelman

Fraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyFraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la ley
Andres Baytelman
 
Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11
Andres Baytelman
 
Fraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasFraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticias
Andres Baytelman
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Andres Baytelman
 
Embajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesEmbajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientes
Andres Baytelman
 
FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)
Andres Baytelman
 
México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas
Andres Baytelman
 

Más de Andres Baytelman (20)

Fraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyFraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la ley
 
Fraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresFraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadores
 
Cohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanCohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelman
 
Muestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanMuestras de prensa Andrés Baytelman
Muestras de prensa Andrés Baytelman
 
Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)
 
Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11
 
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaFraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
 
Fraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasFraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticias
 
Fraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesFraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymes
 
Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)
 
Fraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónFraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturación
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
 
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFE
 
Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012
 
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
 
Embajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesEmbajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientes
 
FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)
 
México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas
 

Último

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 

Último (20)

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 

9th circuit

  • 1. Litigation Alert Ninth Circuit Holds Computer Fraud and Abuse Act Criminalizes Employee’s Access To Information In Violation Of Employer’s Express Access Limitations laurence f. pulgram, tyler g. newby and sebastian e. kaplan United States v. Nosal, No. 10-10038 (April 28, 2011) and by means of such conduct furthers the intended (Trott, J., O’Scannlain, J., Campbell, J.) fraud and obtains anything of value.” In light of the Ninth Circuit’s decision in LVRC Holdings LLC http://www.ca9.uscourts.gov/datastore/ v. Brekka, which construed the phrase “accesses opinions/2011/04/28/10-10038.pdf . . . without authorization” to exclude the actions Summary of individuals who had misused their otherwise authorized access to computer systems, the district On Thursday, April 28, 2011, the Ninth Circuit, in a split court dismissed five of the eight counts against decision, held that an employee could be criminally Nosal. liable under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (the “CFAA”), for exceeding authorized The Ninth Circuit’s Decision access to an employer’s computer system by accessing In reversing the district court, the Ninth Circuit proprietary information in violation of the employer’s held that “an employee ‘exceeds authorized written policies. In so holding, the Ninth Circuit access’ under § 1030 when he or she violates joined several other circuits in interpreting the CFAA’s the employer’s computer access restrictions— “exceeds authorized access” prong to cover violations including use restrictions.” Because the company of an employer’s clearly disclosed computer use policy had contractually prohibited its employees from to misappropriate proprietary company information. disclosing information on its computer system to This interpretation of the CFAA also has ramifications third parties, or from using the information except outside the employment context, and potentially for legitimate business purposes, the employees extends to enforceable terms of use policies and other exceeded their authorization when they violated that contracts restricting network access. prohibition. Background of the Case The Ninth Circuit distinguished Brekka, which The facts of the case read like a garden-variety civil addressed the CFAA’s access without authorization trade secret dispute. David Nosal had worked for prong, as opposed to the exceeding authorized the executive search firm Korn/Ferry International, access prong at issue in Nosal. Unlike the company which he left to start a competing firm. Soon after in Brekka, Korn/Ferry had made its computer access leaving the firm, Nosal engaged three Korn/Ferry and non-disclosure policies conspicuously clear to employees to help set up the rival company. Those all its employees. employees downloaded information about executive The Ninth Circuit addressed the concern that its candidates from Korn/Ferry’s password-protected interpretation of “exceeds authorized access” would leads database and provided that information to make criminals out of employees who violated their Nosal. All Korn/Ferry employees had been required to employer’s use policies by using work computers for sign employment agreements prohibiting disclosure of personal reasons. It held that the government—and such information. by extension, a plaintiff in a private civil action, which In a federal criminal indictment, Nosal, was charged is also available to enforce the CFAA—would still need with violating § 1030(a)(4) of the CFAA, which imposes to satisfy the other elements of § 1030(a)(4). Those criminal liability for anyone who: “knowingly and elements require proof that that (1) the defendant with intent to defraud, accesses a protected computer intended to defraud the company, (2) the computer without authorization, or exceeds authorized access, access furthered that intent, and (3) the defendant obtained something of value through the access. litigation newsletter www.fenwick.com
  • 2. Implications For further information, please contact: Nosal gives greater teeth to computer access and use Laurence F. Pulgram, Partner, Litigation Group policies, thereby improving companies’ ability to deter lpulgram@fenwick.com, 415.875.2390 both outsiders and insiders from stealing confidential Tyler G. Newby, Of Counsel, Litigation Group and business information. In Nosal, the computer use White Collar/Regulatory Group policy prohibited disclosure to outside parties and tnewby@fenwick.com, 415.875.2495 use other than for legitimate business purposes. Sebastian E. Kaplan, Associate, Litigation Group Restrictions on disclosure create a bright line rule skaplan@fenwick.com, 415.875.2477 that puts employees on notice. Restrictions on the purpose of access—such as for legitimate business ©2011 Fenwick & West LLP. All Rights Reserved. purposes—present greater vagueness problems. Although the majority did not explicitly criticize Korn/ the views expressed in this publication are solely those of the author, and Ferry’s restriction for legitimate business purposes, do not necessarily reflect the views of fenwick & west llp or its clients. the content of the publication (“content”) should not be regarded as it effectively replaced that standard by focusing on advertising, solicitation, legal advice or any other advice on any particular matter. the publication of any content is not intended to create and does the “intent to defraud” element. This suggests that not constitute an attorney-client relationship between you and fenwick & companies may face difficulty enforcing a computer west llp. you should not act or refrain from acting on the basis of any content included in the publication without seeking the appropriate legal use policy where an employee’s motivation falls in or professional advice on the particular facts and circumstances at issue. the gray area between a legitimate business purpose and outright fraud. Where possible, computer use policies should be drafted to prohibit actions, instead of intentions. Employers’ computer use policies, in addition to being clear, must be conspicuous. Korn/Ferry’s policy was disclosed to employees at the time of hiring and each time an employee logged onto the Korn/Ferry computer system. Nosal also has implications for restrictions on access to electronic information provided to customers or the public. A company that provides information on its website may be able to restrict the use of that information through enforceable Terms of Use. By the same token, companies who access information on an outside website should take note of what use restrictions exist. Nosal, however, involved the employment context, and the Ninth Circuit has not yet addressed whether the definition of access or authorization will be interpreted differently for non- employees. 2 litigation alert – may 2, 2011 fenwick & west