AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
ORDER
The opinion filed July 12, 2016, and published at 828 F.Bd 1068, is amended by the opinion filed concurrently with this order.
With these amendments, the panel has voted to deny the petition for panel rehearing and rehearing en banc.
The full court has been advised of the petition for rehearing en banc, and no judge of the court has requested a vote on it.
The petition for panel rehearing and rehearing en banc is DENIED. No further petitions for panel rehearing or rehearing en banc shall be entertained.
OPINION
One social networking company, Face-book, Inc., has sued another, Power Ventures, Inc., over a promotional campaign. Power accessed Facebook usersâ data and initiated form e-mails and other electronic messages promoting its website. Initially, Power had implied permission from Face-book. But Facebook sent Power a cease and desist letter and blocked Powerâs IP address; nevertheless Power continued its campaign. Facebook alleges that Powerâs actions violated the Controlling the Assault of Non-Sohcited Pornography and Marketing Act of 2003 (âCAN-SPAMâ), the Computer Fraud and Abuse Act of 1986 (âCFAAâ), and California Penal Code section 502. We hold that Power did not violate the CAN-SPAM Act because the transmitted messages were not materially misleading. We also hold that Power violated the CFAA and California Penal Code section 502 only after it received Face-bookâs cease and desist letter and nonetheless continued to access Facebookâs computers without permission. Accordingly, we affirm in part, reverse in part, and remand to-the district court. \ .
BACKGROUND
Defendant Power Ventures, a corporation founded and directed by CEO Steven Vachani, who also is a defendant here, operated a social networking website, Power.com. The concept was simple. Individuals who already used other social networking websites could log on to Power.com and create an account. Power.com would then aggregate the userâs social networking information. The individual, a âPower user,â could see all contacts from many social networking sites on a single page. The Power user thus could keep track of a variety of social networking Mends through a single program and could click through the central Power website to individual social networking sites. By 2008, the website had attracted a growing following.
Plaintiff Facebook also operates a social networking website, Facebook.com. Face-book users, who numbered more than 130 million during Powerâs promotional campaign, can create a personal profileâa web page within the siteâand can connect with other users. Facebook requires each user to register before accessing the website and requires that each user assent to its
Facebook has tried to limit and control access to its website. A non-Facebook user generally may not use the website, to send messages, post photographs, or othenyise contact Facebook users through their profiles. Instead, Facebook requires third-party developers or websites that wish to contact its users through its site to enroll in a program called Facebook Connect. It requires these third parties to register with Facebook and to agree to an additional Developer Terms of Use Agreement,
In December 2008, Power began a promotional campaign to attract more traffic to its website; it hoped that Facebook users would join its site. Power placed an icon on , its website with a promotional message that read: âFirst 100 people who bring 100 new friends to Power.com win $100.â The icon included various options for how a user could share Power with others. The user could âShare with friends through my photos,â âShare with friends through events,â or âShare with friends through status.â A button on the icon included the words âYes, I do!â If a user clicked the âYes, I do!â button, Power would create an event, photo, or status on the userâs Facebook profile.
In many instances, Power caused a message to be transmitted to the userâs friends within the Facebook system. In other instances, depending on a Facebook userâs settings, Facebook generated an e-mail message. If, for example, a Power user shared the promotion through an event, Facebook generated an e-mail message to an external e-mail account from the user to friends. The e-mail message gave the name and time of the event, listed Power as the host, and stated that the Power user was inviting the recipient to this event. The external e-mails were form e-mails, generated each time that a Facebook user invited others to an event. The âfromâ line in the e-mail stated that the message came from Facebook; the body was signed, âThe Facebook Team.â
On December 1, 2008,' Facebook first became aware of Powerâs promotional campaign and, on that same date, Face-book sent a âcease and desistâ letter to Power instructing Power to terminate its activities. Facebook tried to get Power to sign its Developer Terms, of Use Agreement and enroll in Facebook Connect; Power resisted. Facebook instituted an Internet Protocol (âIPâ) block in an effort to prevent Power from accessing the Face-book website from Powerâs IP address. Power responded by switching IP addresses to circumvent the Facebook block. Through this period, Power continued its promotion even though it acknowledged that it took, copied, or made use of data from Facebook.com without Faeebookâs permission.
Powerâs campaign lasted less than two months. On December 20, 2008, Facebook filed this action. Toward the end of January 2009, Power ended its campaign. In April 2011, Power ceased doing business altogether. In total,- more than 60,000 external e-mails promoting Power were sent through the Facebook system.' An unknown number of internal Facebook messages were also transmitted.
In this action, Facebook alleged violations of the CFAA, the CAN-SPAM Act, and California Penal Code section 502 and moved for summary judgment. The district court granted summary judgment to Face-book on all three claims. The district court awarded statutory damages of $3,031,350, compensatory damages, and permanent in-junctive relief, and it held that Vachani
STANDARD OF REVIEW
We review de novo a grant of summary judgment. Johnson v. Poway Unified Sch. Dist., 658 F.3d 954, 960 (9th Cir. 2011). We may affirm the judgment on any ground supported by the record and presented to the district court. Venetian Casino Resort L.L.C. v. Local Joint Exec. Bd., 257 F.3d 937, 941 (9th Cir. 2001).
DISCUSSION
A. CAN-SPAM Act
The CAN-SPAM Act grants a private right of action for a âprovider of Internet access service adversely affected by a violation of section 7704(a)(1) of this title.â 15 U.S.C. § 7706(g)(1). In relevant part, § 7704(a)(1) makes it unlawful for âany person to initiate the transmission, to a protected computer, of a commercial electronic mail message, or, a transactional or relationship message* that contains, or is accompanied by, header information that is materially false or materially misleading.â
The CAN-SPAM Act âdoes not ban spam outright, but rather provides a code of conduct to regulate commercial email messaging practices.â Gordon v. Virtumundo, Inc., 575 F.3d 1040, 1047-48 (9th Cir. 2009). To prove a violation of the statute, Facebook cannot simply identify excessive electronic messages. Rather, assuming all facts in favor of the non-moving party, the offending messages must be âmaterially falseâ or âmaterially misleading.â 15 U.S.C. § 7704(a)(1).
The statute provides that
the term âmaterially,â when used with respect to false or misleading header information, includes the alteration or concealment of header information in a manner that would impair the ability of an Internet access service processing the message on behalf of a recipient, a person alleging a violation of this section, or a law enforcement agency to identify, locate, or respond to a person who initiated the electronic mail message or to investigate the alleged violation, or the ability of a recipient of the message to respond to a person who initiated the electronic message.
Id. § 7704(a)(6). A âfromâ line âthat accurately identifies any person who initiated the message shall not be considered materially false or materially misleading.â Id. § 7704(a)(1)(B). And, further, âheader information that is technically accurate but includes an originating electronic mail address, domain name, or Internet Protocol address the access to which for purposes of initiating the message was obtained by means of false or fraudulent pretenses or representations shall be considered materially misleading.â Id. § 7704(a)(1)(A).
Here, two types of messages might rise to the level of âmaterially misleadingâ under the CAN-SPAM Act: external e-mails sent when Power caused a Facebook event to be created and internal Facebook messages authored by Power that Power users transmitted to their Facebook friends.
We first consider the external emails. Facebook generated these e-mails whenever a Power user created a Face-book event, promoting Power. The âfromâ line of the e-mails identified âFacebookâ as the sender. The body was signed âThanks, The Facebook Team.â The header stated that a friend of the recipient invited her to
Because the statute provides that a âfromâ line that accurately identifies a person who initiated the message is not misleading, it is relevant whether Facebook, identified in the from line, initiated the messages. The statute defines âinitiateâ as âto originate or transmit such message or to procure the origination or transmission of such message, but shall not include actions that constitute routine conveyance of such message.â Id. § 7702(9). It provides that âmore than one person may be considered to have initiated a message.â Id. A Power user gave Power permission to share a promotion, Power then accessed that userâs Facebook data, and Facebook crafted and caused form e-mails to be sent to recipients. These actions all go beyond the routine conveyance of a message. All the actions require some affirmative consent (clicking the âYes, I do!â button) or some creative license (designing the form e-mails). Because more than one person may be considered to have initiated the message, we hold that, within the meaning of the statute, Powerâs users, Power, and Facebook all initiated the messages at issue.
Because Facebook (among others) initiated the messages, the âfromâ line accurately identified a person who initiated the messages. Accordingly, the âfromâ line is not misleading within the meaning of the statute. Similar reasoning also leads us to conclude that the header is technically accurate. Because a Power user consented to share Powerâs promotion through an event invitation, a header line that stated that a recipientâs friend âinvitedâ the recipient to the event does not conceal or misstate a creator of the e-mail. ,
It is true that the CAN-SPAM Act includes as materially misleading a technically accurate header that includes 'information accessed through false or fraudulent pretenses or representations. Id. § 7704(a)(1)(A). But Power users consented to Powerâs access to their Facebook data. In clicking âYes, I do!,â users gave Power permission to share its promotion through event invitations. On this record, Power did not use false pretenses or fraudulent representations to obtain usersâ consent. Therefore, the external messages were not materially misleading within the meaning of the CAN-SPAM Act.
We next consider internal messages sent within the Facebook system. We can find these messages misleading only if they impaired the ability of the recipient to ârespond to a person who initiated the electronic mail messageâ or the ability of Facebook to locate the initiator of the messages. Id. § 7704(a)(6). Two factors convince us that the messages are not misleading under this standard. First, the body of the messages included both Powerâs name and a link to the Power website. A reasonable recipient could understand that Power had drafted the message or had some part in its construction.,Second, Facebook users who were identified as the senders did authorize the sending of these messages. It was not misleading for such users to be identified in internal messages sent through the Facebook system.
Because neither e-mails'' nor internal messages sent through Powerâs promotional campaign were materially misleading, Power did not violate the CAN-SPAM Act. We reverse the district court on this claim and remand for entry of judgment in favor of Defendants.
B. CFAA
The CFAA prohibits acts of computer trespass by those who are not authorized users or who exceed authorized use. It creates criminal and civil liability for whoever âintentionally accesses a computer without authorization- or exceeds au
First, we hold that Facebook suffered a loss within the meaning of the CFAA. The statute permits a private right of action when a party has suffered a loss of at least $5,000 during a one-year period. Id. § 1030(e)(4)(A)(i)(I). The statute defines âlossâ to mean âany reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, costâ incurred, or other consequential damages incurred because of interruption of service.â Id. § 1030(e)(11). It is undisputed that Facebook employees spent many hours, totaling more than $5,000 in costs,, analyzing, investigating, and responding to Powerâs actions. Accordingly, Facebook suffered a loss under the CFAA.
We next consider whether Power accessed Facebookâs computers knowing that it was not authorized to do so. We have previously considered whether a defendant has accessed a computer âwithout authorizationâ or in a manner that âexceeds authorized accessâ under the CFAA.
In LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009), an employee logged onto his employerâs computer, accessed confidential information, and sent emails from the computer to himself and his wife with the intention of starting a competing business. We held that a person is âwithout authorizationâ under the CFAA âwhen the person has not received permission to use the computer for any purpose (such as when a hacker accesses someoneâs computer without any permission), or when the employer has rescinded permission to access the computer and the defendant uses the computer anyway.â Id. at 1135. Because the employee had sent emails while he still had authorized access to the companyâs computers, his actions did not constitute unauthorized use and did not run afoul of the CFAA. Id. That fact was key; had the employee accessed company computers without express permission, he would have violated.the CFAA. â[I]f [the employee had] accessed LVRCâs information on the LOAJD website after he left the company in September 2003, [the employee] would have accessed a protected computer âwithout authorizationâ for purposes of the CFAA.â Id. at 1136.
In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc) (âNosal Iâ), a criminal case, we considered whether a group of employees who logged on to a work computer, downloaded information from a confidential database, and transferred it to. a competing business âexceeded] authorized access.â Id, at 856. Wary of creating a sweeping Internet-policy mandate, we applied the rule of lenity to the CFAA and reversed liability for the defendant. Id. at 863. The decision broadly described the application of the CFAA to websitesâ terms of service. âNot only are the terms of service vague and generally unknown .., but website owners retain the right to change the terms at any time and without notice.â Id. at 862. As a result, imposing criminal liability for violations of the terms of use of a website could criminalize many daily activities. Accordingly, âthe phrase âexceeds authorized accessâ in
From those cases, we distill two general rules in analyzing authorization under the CFAA. First, a defendant can run afoul of the CFAA when he or she has no permission to access a computer or when such permission has been revoked explicitly. Once permission has been revoked, technological gamesmanship or the enlisting of a third party to aid in access will not excuse liability. Second, a violation of the terms of use of a websiteâwithout moreâcannot establish liability under the CFAA.
Here, initially, Power users arguably gave Power permission to use Face-bookâs computers to disseminate messages. Power reasonably could have thought that consent from Facebook users to share the promotion was permission for Power to access Facebookâs computers.
But Facebook expressly rescinded that permission when Facebook issued its written cease and desist letter to Power on DĂ©cember 1, 2008. Facebookâs cease, and desist letter informed Power that it had violated Facebookâs terms of use and demanded that Power stop soliciting Facebook usersâ information, using Facebook content, or otherwise interacting with Facebook through automated scripts.
The record shows unequivocally that Power knew that it no longer had authorization to' access Facebookâs computers, but continued to do so anyway. In requests for admission propounded during the course of this litigation, Power admitted that, after receiving notice that its use of or access to Facebook was forbidden by Facebook, it âtook, copied, or made use of data from the Facebook website without Facebookâs permission to do so.â (Emphasis added; capitalization omitted.) Contemporaneously, too, soon after receiving the cease- and desist letter, Powerâs CEO sent an e-mail stating: â[W]e need to be prepared for Facebook to try to block us and the [sic] turn this into a national battle that gets us huge attention.â On December 4, 2008, a Power executive sent an e-mail agreeing
The consent that Power had received from Facebook users was not sufficient to grant continuing authorization to âą access Facebookâs computers after Facebookâs express revocation of permission. An analogy from the physical world may help to illustrate why this is so. Suppose that a person wants to.borrow a friendâs jewelry that is held in a safe deposit box at a bank. The friend gives permission for the person to access the safe deposit box and lends him a key. Upon receiving the key, though, the person decides to visit the bank while carrying a shotgun. The bank ejects the person from its premises and bans his reentry. The gun-toting jewelry borrower could not then reenter the bank, claiming that access to the sĂĄfe deposit box gave him authority to stride about the bankâs property while armed. In other words, to access the safe deposit box, the person needs permission both from his friend (who controls access to the safe) and from the bank (which controls access to its premises). Similarly, for Power to continue its campaign using Facebookâs computers, it needed authorization both from individual Fa-cebook users (who controlled their data and personal pages) and from Facebook (which stored this data on its physical servers). Permission from the users alone was not sufficient to constitute authorization after Facebook issued the cease and desist letter.
In sum, as it admitted, Power deliberately disregarded the cease and desist letter and accessed Facebookâs computers without authorization to do so. It circumvented IP barriers that further demonstrated that Facebook had rescinded permission for Power to access Facebookâs computers.
Nosal I is materially distinguishable. First, Nosal I involved employees of a company who arguably exceeded the limits of their authorization. 676 F.3d at 856. Here, by contrast, Facebook explicitly revoked authorization for any access, and this case does not present the more nuanced question of exceeding authorization. Nosal I involved a defendant who âexceeded authorization,â while this case involves a defendant who accessed a computer
Accordingly, we hold that, after receiving the cease and desist letter from Face-book, Power intentionally accessed Face-bookâs computers knowing that it was not authorized to do so, making Power liable under the CFAA. We therefore affirm in part the holding of the district court with respect to the CFAA.
C. Section 502
California Penal Code section 502 imposes liability on a person who â[knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network.â Id. § 502(c)(2). This statute, we have held, is âdifferentâ than the CFAA. United States v. Christensen, 801 F.3d 970, 994 (2015). â[T]he California statute does not require unauthorized access. It merely requires knowing access.â Id.
But despite differences in wording, the analysis under both statutes is similar in the present case. Because Tower had implied authorization to access Face-bookâs computers, it did not, at first, violate the statute. But when Facebook sent the cease and desist letter, Power, as it conceded, knew that it no longer had permission to access Facebookâs computers at all. Power, therefore, knowingly accessed and without permission took, copied, and made use of Facebookâs data. Accordingly, we affirm in part the district courtâs holding, that Power violated section 502.
D. Personal Liability
We affirm the district courtâs holding that Vachani is personally liable for Powerâs actions. A âcorporate officer or director is, in general, personally liable for all torts which he authorizes or directs or in which he- participates, notwithstanding that he acted as an agent of the corporation and not on-his own behalf.â Comm. for Idahoâs High Desert, Inc. v. Yost, 92 F.3d 814, 823 (9th Cir. 1996) (internal quotation marks omitted). Cases finding âpersonal liability on the part of corporate officers have typically involved instances where the defendant was the âguiding spiritâ behind the wrongful conduct, or the âcentral figureâ in the challenged corporate activity.â Davis v. Metro Prods., Inc., 885 F.2d 515, 523 n.10 (9th Cir. 1989) (internal quotationâ marks and ellipsis omitted).
Vachani was the central figure in Powerâs promotional scheme. First, Vachani admitted that, during the promotion, he controlled and directed Powerâs actions. Second, Vachani admitted that the promotion was his idea. It is undisputed, therefore, that Vachani was the guiding spirit and central figure in Powerâs chal
E. Discovery Sanctions
We affirm the discovery sanctions imposed against Power for non-compliance during a Rule 30(b)(6) deposition. Defendants failed to object' to discovery sanctions in the district court. Failure to object forfeits Defendantsâ right to raise the issue on appeal. Simpson v. Lear Astronics Corp., 77 F.3d 1170, 1174 (9th Cir. 1996).
Even assuming the issue was not waived, we âreview the district courtâs rulings concerning discovery, including the imposition of discovery sanctions, for abuse of discretion.â Goodman v. Staples Office Superstore, LLC, 644 F.3d 817, 822 (9th Cir. 2011). The magistrate judgeâs findings that Vachani was unprepared, unresponsive, and argumentative and that Power Ventures had failed to produce many e-mails responsive to Facebookâs requests prior to discovery are supported by the record. Accordingly, we hold that the discovery sanctions imposed were not an abuse of discretion.
F. Remedies
Because we reverse in significant part, we also vacate the injunction- and the award of damages. We remand the case t.o the district court to reconsider appropriate remedies under the CFAA and section 502, including any injunctive relief. With respect to damages, the district court shall calculate damages only for the period after Power received the cease and desist letter, when Power continued to access data contained in Facebookâs servers and memory banks.
. REVERSED in part, VACATED in part, AFFIRMED in part, and REMANDED, The parties shall bear their own costs on appeal.
. One can imagine situations in which those two principles might be in tension'âsituations in which, for example, an automatic boilerplate revocation follows a violation of a websiteâs terms of useâbut we need not address or resolve such questions on the stark facts before us.
. Because, initially, Power users gave Power permission to use Facebook's computers to disseminate messagĂ©s, we need not decide whether websites such as Facebook are presumptively open to all comers, unless and until permission is revoked expressly. See Orin S. Kerr, Norms of Computer Trespass, 116 Colum. L. Rev. 1143, 1163 (2016) (asserting that "websites are the cyber-equivalent of an open public square in the physical worldâ).
.The mention of the terms of use in the cease and desist letter is not dispositive. Violation of Facebook's terms of use, without more, would not be sufficient to impose liability. Nosal I, 676 F.3d at-862-63. But, in addition to asserting a violation of Facebook's terms of use, the cease and desist letter warned Power that it may have violated federal and state law and plainly put Power on notice that it was no longer authorized to access Facebookâs computers.
. The activities were: "âUsing a personâs Fa-cebook account without Facebookâs authorization;âUsing automated scripts to collect information from their site;âIncorporating Facebook's site in another database[; and]â Using Facebookâs site for commercial purposes!,]â
. Simply bypassing an IP address, without more, would not constitute unauthorized use. Because a blocked user does not receive notice that he has been blocked, he may never realize that the block was imposed and that authorization was revoked. Or, even if he does discover the block, he could conclude that it was triggered by misconduct by someone else who shares the same IP address, such as the user's roommate or co-worker.