
Joe Ruckert is a student at Harvard Law School and a member of the Labor and Employment Lab.
Mike Miller planned to quit his job and begin working for his employer’s competitor. Before leaving, he downloaded confidential documents from his workstation. He later used those documents to benefit his new employer at the expense of his old employer. Accepting these allegations as true, did he violate a fiduciary duty? Yes. Did he breach his employment contract? Yes. But was he a hacker? The Fourth Circuit said no, but other courts would have disagreed.
Congress enacted the Computer Fraud and Abuse Act (“CFAA”) in response to the development of computer hacking, a novel form of “electronic trespassing.” The CFAA was an exclusively criminal statute until 1994, when Congress amended the Act to create a private cause of action. This amendment turned the CFAA into a powerful new tool for employers seeking civil remedies against employees who misappropriate confidential information. To state a CFAA claim, an employer must establish that its employee: (1) intentionally accessed a protected computer, (2) lacked authorization or exceeded authorized access, (3) obtained information, and (4) caused at least $5,000 in damages. Liability often turns on the court’s interpretation of the second element. In many employment-centered CFAA cases, the employer gives the employee full access to the business’s computer systems—including the information which the employee is alleged to have stolen. Both parties agree that the employee had at least some authorization to access the information, so the issue is whether the employee exceeded his authorized access by virtue of the theft.
Employers argue—and the First, Fifth, Seventh, and Eleventh Circuits have agreed—that employees exceed their authorization whenever they access information for non-business purposes. Under this view, authorization is bound up with the employee’s intended use. Many employment agreements contain explicit limitations on the use of computer systems, and such policies are often couched in the language of “authorization.” Therefore, employees are not authorized to access computer systems for any and all purposes, but rather for the limited purposes circumscribed by the employer’s policies. If the purposes for which access was granted are exceeded, authorization itself is exceeded.
On the other hand, employees argue—and the Second, Fourth, and Ninth Circuits have agreed—that the CFAA confines liability to individuals who violate restrictions on access to information, not those who violate restrictions on its use. Under this view, Congress included the word “access” to suggest a narrower scope than exceeding authorization generally. The act of exceeding authorized access implies going beyond an initial grant of limited access to retrieve additional information without permission. This construction of the statute rejects the notion that employers can authorize conditional access which turns on the subjective intent of the employee. Otherwise, employers could “transform the CFAA from an anti-hacking statute into an expansive misappropriation statute.”
Some of these courts have drawn further support from the CFAA’s dual status as both a criminal and civil statute. The Supreme Court has suggested that such statutes require consistent interpretation in both settings. Specifically, “whether we encounter [their] application in a criminal or noncriminal context, the rule of lenity applies.” The Court has “always reserved lenity for those situations in which a reasonable doubt persists about a statute’s intended scope even after resort to the language and structure, legislative history, and motivating policies of the statute.” Applying this rule to the CFAA, some courts hold that ordinary tools of legislative construction fail to establish an “unambiguously correct” interpretation, so lenity demands the reading which favors employees.
Despite these fundamental disagreements, almost all courts concede that either reading is at least plausible. As the Second Circuit recognized, “If this sharp division means anything, it is that the statute is readily susceptible to different interpretations.” If the Supreme Court were to resolve the issue, how should it address the opacity of the statutory text? One option is to read the statute within the paradigm of “electronic trespassing.” A hypothetical example from the physical world may be illustrative. A bank robber who enters a vault does so without authorization. The robber is equivalent to an outside hacker. A bank janitor, who is only authorized to access the bank’s common areas, would exceed his authorized access if he were to enter the vault. The janitor is equivalent to an inside hacker. But what about the bank teller, who is authorized to access the vault, but only for legitimate banking purposes? If the teller were to steal money from the vault, is it reasonable to call him a trespasser? The Court’s answer should determine whether the CFAA applies to the teller’s digital equivalent.
Such a decision will obviously affect employees’ substantive liability under the Act, but also employers’ capacity to engage in forum shopping. In many cases, employers’ CFAA claims are the only federal causes of action. For example, Mike Miller’s employer raised one claim under federal law (i.e, the CFAA) and nine claims under state law (e.g., conversion, misappropriation of trade secrets, unfair trade practices, breach of fiduciary duties, etc.). In the absence of diversity, federal courts’ ability to hear state law claims is premised on supplemental jurisdiction. Without a colorable federal claim, plaintiffs lose access to the federal forum. However, a dismissal for want of jurisdiction doesn’t leave an employer without legal recourse. Mike Miller’s employer was still free to vindicate the nine remaining state-law claims—it just had to do so in state court. The applicability of the CFAA determines employers’ ability to choose between state and federal forums, but not their ability to seek remedies for their employees’ underlying misconduct. Therefore, when courts are deciding how to read the statute, they shouldn’t feel pressured to achieve a normatively fair outcome. In these cases, justice won’t ultimately hinge on whether the CFAA covers non-hacker employees, so courts should adopt whichever reading is truest to the text and purposes of the Act.
Daily News & Commentary
Start your day with our roundup of the latest labor developments. See all
April 18
Two major New York City unions endorse Cuomo for mayor; Committee on Education and the Workforce requests an investigation into a major healthcare union’s spending; Unions launch a national pro bono legal network for federal workers.
April 17
Utahns sign a petition supporting referendum to repeal law prohibiting public sector collective bargaining; the US District Court for the District of Columbia declines to dismiss claims filed by the AFL-CIO against several government agencies; and the DOGE faces reports that staffers of the agency accessed the NLRB’s sensitive case files.
April 16
7th Circuit questions the relevance of NLRB precedent after Loper Bright, unions seek to defend silica rule, and Abrego Garcia's union speaks out.
April 15
In today’s news and commentary, SAG-AFTRA reaches a tentative agreement, AFT sues the Trump Administration, and California offers its mediation services to make up for federal cuts. SAG-AFTRA, the union representing approximately 133,000 commercial actors and singers, has reached a tentative agreement with advertisers and advertising agencies. These companies were represented in contract negotiations by […]
April 14
Department of Labor publishes unemployment statistics; Kentucky unions resist deportation orders; Teamsters win three elections in Texas.
April 13
Shawn Fain equivocates on tariffs; Trump quietly ends federal union dues collection; pro-Palestinian Google employees sue over firings.