Password Sharing Remains Hazy Under CFAA
Transcription
Password Sharing Remains Hazy Under CFAA
725 S. BROADWAY #10, DENVER, CO 80209 | 303–292–1212 | www.LAW WEEK ONLINE.com VOL. 14 | NO. 32 | $6 | AUGUST 8, 2016 Password Sharing Remains Hazy Under CFAA Appeals court wrestles with ‘authorization’ concepts under anti-hacking law BY DOUG CHARTIER LAW WEEK COLORADO nce the mainstream media got a hold of the controversy surrounding United States v. Nosal, everyone from Netflix users to coworkers in various industries were made to wonder if their password sharing, even when benign, could be illegal. Last month, the U.S. Court of Appeals for the 9th Circuit weighed in on two password-sharing-related cases dealing with the Computer Fraud and Abuse Act. The opinions in United States v. Nosal and Facebook, Inc. v. Power Ventures, Inc. underscored the murky issue regarding the anti-hacking act and under what circumstances its criminal penalties could be extended to more common civil situations. Companies looking for more clarity on what “authorization” means under the CFAA, and just how far the statute’s reach might be over login credentials, might have to wait longer in spite of the recent appellate decisions. Congress enacted the CFAA of 1986 to combat cyber espionage, as it makes subject to criminal penalties anyone who “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value.” But the CFAA’s broad language has allowed its application in contexts outside of espionage. Prior to the enactment of the Defend Trade Secrets Act in May, plaintiffs used the CFAA to pursue trade secret misappropriation cases in federal court — perhaps its most common alternative use. The CFAA creates a private right of action in addition to being a criminal law, and companies have brought suit against individuals whom they claimed accessed their company computers or networks without authorization in order to steal trade secrets or give them to a competitor. Employers have argued that the act covers employee violations of their acceptable use policies, such as when PMSI, Inc. filed a CFAA complaint against a former employee alleging that her excessive use of Facebook and personal email on a company computer ran afoul of its company policy. But in 2011, a federal judge in the Middle District of Florida rejected this interpretation of the CFAA’s “exceeding authorization” prong in Lee v. PMSI, Inc. The 9th Circuit decided similarly when O it weighed in on United States v. Nosal for the first time in 2012. Defendant David Nosal was leaving his employer, executive search company Korn/Ferry International, to start a competing firm. He and his co-conspirators downloaded confidential Korn/Ferry data, and prosecutors argued that even though Nosal and his cohorts had company-granted access to this data, they exceeded their authorization with intent to defraud the company under the CFAA. The 9th Circuit held, however, that the CFAA’s exceeding authorization component doesn’t extend to a violation of company computer policy. But Nosal made a return to the 9th Circuit under a different interpretation of the CFAA; the former Korn/ Ferry employees continued accessing the company’s databases using a current employee’s borrowed credentials. The question in Nosal II was whether the “without authorization” component of the CFAA “extends to a former employee whose computer access credentials have been rescinded but who, disregarding the revocation, accesses the computer by other means,” according to the opinion. The majority held that it did. But the 9th Circuit was split over the meaning of “without authorization” and whose authorization ultimately mattered in the statute — the company that owned the computer system or the authorized user giving that access to someone else. Judge Stephen Reinhardt argued in his dissent that the majority opinion had problematic breadth. “The majority does not provide, nor do I see, a workable line which separates the consensual password sharing in this case from the consensual password sharing of millions of legitimate account holders, which may also be contrary to the policies of system owners,” Reinhardt wrote. “There simply is no limiting principle in the majority’s world of lawful and unlawful password sharing.” Judge M. Margaret McKeown, writing for the majority, said the case was not about password sharing despite “Nosal and various amici spin(ning) hypotheticals about the dire consequences of criminalizing password sharing.” John Chanin, a complex business litigator and partner at Lindquist & Vennum in Denver, said the 9th Circuit didn’t draw a clear distinction between improper password sharing and more innocuous cases. “There’s a real line-drawing problem here that the majority didn’t address THE 9TH CIRCUIT COURT OF APPEALS DECIDED TWO CFAA PASSWORD-SHARING CASES IN EIGHT DAYS. PHOTO: FLICKR, KEN LUND squarely,” Chanin said. He added that the court did decide Nosal II correctly, he thought, and that the Netflix password implications bemoaned by critics are exaggerated. “On the criminal front, I think (Nosal II) is going to limited to its pretty egregious set of facts,” Chanin said. “I don’t see any realistic chance that this will criminalize any routine password sharing.” Chanin said that when he explains to clients the concept of illegal password sharing under the CFAA, he likes to use more concrete analogies. For one, a restaurant owner might keep a secret recipe locked in a safe and entrust a manager with the safe code, or “authorization” to access the recipe. But if the manager were to give another employee the safe code, no one would reasonably argue that the manager was “authorized” to let that person into the safe, Chanin said. On criminal password sharing, Chanin said, “We all know it when we see it.” What’s less clear is the CFAA’s civil component, he added. Chanin said that the 9th Circuit had two chances to clarify the CFAA in Nosal II and Power Ventures, but failed to capitalize on either of them. In Facebook v. Power Ventures, the court held July 12 that an entity violates the CFAA when accessing a computer once the owner has revoked the entity’s authorization, much like in Nosal II. Likewise, consent from an authorized third party to access the computer does not constitute authorization. Further, violating the owner’s terms of use by itself does not constitute a CFAA violation. Power Ventures created a website that aggregated a user’s social media accounts into a single interface. In a promotional campaign it began in 2008, Power Ventures solicited Facebook logins from Facebook users and then used that access to dispense messages across the social network that promoted its website. Facebook issued Power Ventures a cease-and-desist letter and blocked its IP address, but the latter persisted in its campaign. The 9th Circuit might have muddied the CFAA waters by saying that Power Ventures had “at least arguable permission to access Facebook’s computers” since it was given that permission by authorized Facebook users. The defendant wasn’t accessing the system “without authorization” until Facebook explicitly revoked that authorization with the cease and desist, which then made Power Ventures liable under the CFAA, according to the court. And like Nosal II, the court provided little guidance closing off the CFAA from less criminal contexts of password sharing, Chanin said. “In the Power Ventures case, the 9th Circuit missed another opportunity to clarify cyber law and draw a bright line between innocuous password sharing and the kind of computer trespass prohibited by the CFAA.” Chanin said that for the time being, the main takeaway from these CFAA rulings is that every employer should have a company policy prohibiting employees from sharing their login credentials with anyone within the company or without. • — Doug Chartier, [email protected]