U.S. v. Nosal

Decision Date28 April 2011
Docket NumberNo. 10–10038.,10–10038.
Citation642 F.3d 781,32 IER Cases 271
PartiesUNITED STATES of America, Plaintiff–Appellant,v.David NOSAL, Defendant–Appellee.
CourtU.S. Court of Appeals — Ninth Circuit

OPINION TEXT STARTS HERE

Jenny C. Ellickson, Jaikumar Ramaswamy, Lanny A. Breuer, Scott N. Schools, and Kyle F. Waldinger, United States Department of Justice, Washington, D.C., for the plaintiff-appellant.Dennis P. Riordan, Riordan & Horgan, San Francisco, CA, for the defendant-appellee.Appeal from the United States District Court for the Northern District of California, Marilyn H. Patel, Senior District Judge, Presiding. D.C. No. 3:08–cr–00237–MHP–1.Before: DIARMUID F. O'SCANNLAIN and STEPHEN S. TROTT, Circuit Judges, and TENA CAMPBELL, District Judge.*

OPINIONTROTT, Circuit Judge:

The United States appeals from the district court's dismissal of several counts of an indictment charging David Nosal with, inter alia, numerous violations of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. 1 Subsection (a)(4), the subsection under which Nosal was charged, subjects to punishment anyone who “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value.” Id. § 1030(a)(4). The indictment alleges that Nosal's co-conspirators exceeded their authorized access to their employer's computer system in violation of § 1030(a)(4) by obtaining information from the computer system for the purpose of defrauding their employer and helping Nosal set up a competing business.

The district court relied on our decision in LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir.2009), in determining that an employee does not exceed authorized access to a computer by accessing information unless the employee has no authority to access the information under any circumstances—in other words, an employer's restrictions on the use of the computer or of the information stored on that computer are irrelevant to determining whether an employee has exceeded his or her authorization. The government contends, on the other hand, that Brekka counsels in favor of its interpretation of the statute—that an employee exceeds authorized access when he or she obtains information from the computer and uses it for a purpose that violates the employer's restrictions on the use of the information.

We have jurisdiction under 18 U.S.C. § 3731, and we agree with the government. Although we are mindful of the concerns raised by defense counsel regarding the criminalization of violations of an employer's computer use policy, we are persuaded that the specific intent and causation requirements of § 1030(a)(4) sufficiently protect against criminal prosecution those employees whose only violation of employer policy is the use of a company computer for personal—but innocuous—reasons. We therefore reverse and remand to the district court with instructions to reinstate Counts 2, 4, 5, 6, and 7.

IBackground

For purposes of our review, the indictment's allegations must be taken as true. United States v. Fiander, 547 F.3d 1036, 1041 n. 3 (9th Cir.2008).

AThe Allegations Against Nosal

From approximately April 1996 to October 2004, Nosal worked as an executive for Korn/Ferry International (“Korn/Ferry”), an executive search firm. When Nosal left Korn/Ferry in October 2004, he signed a Separation and General Release Agreement and an Independent Contractor Agreement. Pursuant to these contracts, Nosal agreed to serve as an independent contractor for Korn/Ferry and not to compete with Korn/Ferry for one year. In return, Korn/Ferry agreed to pay Nosal two lump-sum payments in addition to twelve monthly payments of $25,000.

Shortly after leaving his employment, Nosal engaged three Korn/Ferry employees to help him start a competing business. The indictment alleges that these employees obtained trade secrets and other proprietary information by using their user accounts to access the Korn/Ferry computer system. Specifically, the employees transferred to Nosal source lists, names, and contact information from the “Searcher” database—a “highly confidential and proprietary database of executives and companies”—which was considered by Korn/Ferry “to be one of the most comprehensive databases of executive candidates in the world.”

Paragraphs 9–11 of the indictment describe Korn/Ferry's efforts to keep its database secure:

9. Korn/Ferry undertook considerable measures to maintain the confidentiality of the information contained in the Searcher database. These measures included controlling electronic access to the Searcher database and controlling physical access to the computer servers that contained the database. Korn/Ferry employees received unique usernames and created passwords for use on the company's computer systems, including for use in accessing the Searcher database. These usernames and passwords were intended to be used by the Korn/Ferry employee only.

10. Korn/Ferry required all of its employees ... to enter into agreements that both explained the proprietary nature of the information disclosed or made available to Korn/Ferry employees (including the information contained in the Searcher database) and restricted the use and disclosure of all such information, except for legitimate Korn/Ferry business....

11. Among other additional measures, Korn/Ferry also declared the confidentiality of the information in the Searcher database by placing the phrase “Korn/Ferry Proprietary and Confidential” on every Custom Report generated from the Searcher database. Further, when an individual logged into the Korn/Ferry computer system, that computer system displayed the following notification, in sum and substance:

This computer system and information it stores and processes are the property of Korn/Ferry. You need specific authority to access any Korn/Ferry system or information and to do so without the relevant authority can lead to disciplinary action or criminal prosecution....

(emphasis added) (third alteration in original).

BDistrict Court Proceedings

On June 26, 2008, the government filed a twenty-count superseding indictment against Nosal and one of his accomplices. Counts 2 through 9 of the indictment allege that the Korn/Ferry employees who conspired with Nosal—and Nosal himself as an aider and abettor—violated § 1030(a)(4).

Nosal filed a motion to dismiss the indictment. He argued “that the CFAA was aimed primarily at computer hackers and that the statute does not cover employees who misappropriate information or who violate contractual confidentiality agreements by using employer-owned information in a manner inconsistent with those agreements.” In other words, the Korn/Ferry employees could not have acted “without authorization,” nor could they have “exceed[ed] authorized access,” because they had permission to access the computer and its information under certain circumstances.

Recognizing that the question was one of first impression in the Ninth Circuit, the district court described the “two lines of diverging case law on this issue”:

Some courts, including two courts of appeal, have broadly construed the CFAA to hold an employee acting to access an employer's computer to obtain business information with intent to defraud, i.e., for their own personal benefit or the benefit of a competitor, act “without authorization” or “exceed authorization” in violation of the statute. These courts have generally held that authorized access to a company computer terminated once an employee acted with adverse or nefarious interests and against the duty of loyalty imposed on an employee in an agency relationship with his or her employer or former employer.

Other courts have refused to hold employees with access and nefarious interests within the statute, concluding that a violation for accessing a protected computer “without authorization” or in “excess of authorized access” occurs only when initial access or the access of certain information is not permitted in the first instance. Those courts have generally reasoned that the CFAA is intended to punish computer hackers, electronic trespassers and other “outsiders” but not employees who abuse computer access privileges to misuse information derived from their employment.

(citations omitted) (emphasis added).

At first, the district court rejected Nosal's argument, holding that a person's accessing a computer “knowingly and with intent to defraud ... renders the access unauthorized or in excess of authorization.” Thus, the court refused to dismiss Counts 2 through 9 of the superseding indictment.2

After the district court denied Nosal's motion to dismiss, however, we decided LVRC Holdings LLC v. Brekka, which considered the construction of the phrase “without authorization.” Nosal then filed a motion to reconsider, arguing that Brekka required dismissal of the CFAA counts. The district court agreed with Nosal as to most of the counts and dismissed Counts 2 and 4–7. In doing so, the court held that the Brekka decision compelled the dismissal and that the phrase “exceeds authorized access” as used in § 1030 means having permission to access a portion of a computer (or certain information on a computer), but accessing a different portion of the computer (or different information on the computer) that the employee is not entitled to access under any circumstances.

The district court stated that intent is irrelevant in determining whether a person exceeds authorized access, even if an employee's access to the computer is expressly limited by the employer's use restrictions. The district court gave as an example the following hypothetical:

[I]f a person is authorized to access the “F” drive on a computer or network but is not authorized to access the “G” drive of that same computer or network, the individual would “exceed authorized access” if...

To continue reading

Request your trial
14 cases
  • Incorp Servs. Inc. v. Incsmart.biz Inc.
    • United States
    • U.S. District Court — Northern District of California
    • 24 Agosto 2012
    ... ... See , Laub v. U.S. Dep't of the Interior , 342 F.3d 1080, 1093 (9th Cir.2003). Because of reasons stated in the Ninth Circuit's recent Nosal decision, the Court finds that Plaintiff's CFAA claim does require a more satisfactory showing of alleged facts to establish jurisdiction under the ... ...
  • Oracle Am., Inc. v. Serv. Key, LLC
    • United States
    • U.S. District Court — Northern District of California
    • 30 Noviembre 2012
    ... ... United States v. Nosal , 676 F.3d 854, 862-63 (9th Cir. 2012) (en banc). Although primarily a criminal statute, the CFAA also creates a private right of action for persons ... ...
  • WEC Carolina Energy Solutions LLC v. Miller
    • United States
    • U.S. Court of Appeals — Fourth Circuit
    • 26 Julio 2012
    ... ... See United States v. Nosal, 676 F.3d 854, 863 (9th Cir.2012) (en banc); LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 113435 (9th Cir.2009). Thus, in Nosal, the Ninth Circuit, ... Thus, they violated the CFAA. See id.As an initial manner, we believe the Nosal panel's conclusion is a non sequitur. To us, defining so as in that manner only elucidates our earlier conclusion that exceeds authorized access refers to obtaining or altering information ... ...
  • Oracle USA, Inc. v. Rimini St., Inc.
    • United States
    • U.S. District Court — District of Nevada
    • 13 Junio 2016
    ... ... See e.g., LVRC Holdings LLC v. Brekka , 581 F.3d 1127, 113435 (9th Cir.2009) ; United States v. Nosal , 642 F.3d 781, 783 (9th Cir.2011). However, as the CDAFA and NCCL use the term "knowingly" in describing the proscribed conduct, there is no ... ...
  • Request a trial to view additional results
5 firm's commentaries
  • Cybersecurity And The Law: What To Expect In 2012
    • United States
    • Mondaq United States
    • 19 Enero 2012
    ...authorized access' under §1030(a)(4) when he or she violates the employer's computer access restrictions—including use restrictions." 642 F.3d 781, 784 (9th Cir. 2011). The en banc court's decision, expected in the spring or summer, may go to the Supreme Court.13 4. Developments in the In t......
  • Guilty Verdict In Critical Computer Fraud And Abuse Act Trial
    • United States
    • Mondaq United States
    • 8 Mayo 2013
    ...See 18 U.S.C. § 1030(g). Id. at 857. United States v. Nosal, C 08-0237 MHP, 2010 WL 934257, at *8 (N.D. Cal. Jan. 6, 2010) rev'd, 642 F.3d 781 (9th Cir. 2011) on reh'g en banc, 676 F.3d 854 (9th Cir. 2012) and aff'd, 676 F.3d 854 (9th Cir. United States v. Nosal, 676 F.3d 854, 864 (9th Cir.......
  • En Banc Ninth Circuit To Consider Scope Of Computer Fraud And Abuse Act
    • United States
    • Mondaq United States
    • 11 Noviembre 2011
    ...other pieces of cybersecurity legislation also pending in Congress. Footnotes 581 F.3d 1127 (9th Cir. 2009). See United States v. Nosal, 642 F.3d 781, 782 (9th Cir. Id. at 784. Brekka, 581 F.3d at 1129-1130. EF Cultural Travel v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001); United States ......
  • Ninth Circuit Will Rehear Important Employee Data Theft Case Under The Computer Fraud And Abuse Act
    • United States
    • Mondaq United States
    • 8 Noviembre 2011
    ...October 27, 2011, the United States Court of Appeals for the Ninth Circuit agreed to rehear the appeal in United States v. Nosal, 642 F.3d 781 (9th Cir. Apr. 28, 2011). Nosal involves a prosecution under the Computer Fraud and Abuse Act for alleged employee theft of confidential data from a......
  • Request a trial to view additional results
3 books & journal articles
  • Lengthening Shadows: Biotechnology and Patent Eligibility
    • United States
    • ABA General Library Landslide No. 9-5, May 2017
    • 1 Mayo 2017
    ...(4th Cir. 2014); LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009). 35. 581 F.3d at 1135. 36. Id. 37. Id. 38. Id. at 1133. 39. 642 F.3d 781 (9th Cir. 2011). 40. United States v. Nosal ( Nosal II ), 676 F.3d 854, 859 (9th Cir. 2012). 41. Id. 42. Id. at 863. 43. Id. 44. United States......
  • § 7.05 The Computer Fraud and Abuse Act (18 U.S.§ 1030)
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...Cal. 2019).[182] LVRC Holdings, 581 F.3d at 1133.[183] United States v. Nosal, 676 F.3d 854 (9th Cir. 2012).[184] United States v. Nosal, 642 F.3d 781 (9th Cir. 2011).[185] In United States v. Zhang, 2012 U.S. Dist. LEXIS 74254, at *19 (N.D. Cal. May 29, 2012), the court dismissed three cou......
  • Fear of Facebook: Private Ordering of Social Media Risks Incurred by Healthcare Providers
    • United States
    • University of Nebraska - Lincoln Nebraska Law Review No. 90, 2021
    • Invalid date
    ...and Responsibilities, facebook, http://www.facebook.com/ terms.php (last updated Apr. 26, 2011). 231. See,e.g., United States v. Nosal, 642 F.3d 781, 785 (9th Cir. 2011) ("[A]n employee 'exceeds authorized access' . . . when he or she violates the employer's computer access restrictions-inc......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT