Curiosity Killed the Cat: The Cat and Mouse of Employment Relationships and the Computer Fraud and Abuse Act
Fraud is a seemingly easy concept to understand. By definition, it describes the actions of a person “deliberately deceiving someone else with the intent of causing damage.”1 However, various jurisdictions within the United States qualify both the act of fraud and the related offenses differently.2 These varying perspectives alone can lend themselves to numerous regulatory interpretations, which subsequently result in varying reactions from society at large.
Despite this inherent relationship of cause and effect between state regulation and societal reaction, there is always a pivotal moment when governance meets pushback. This pressure can come from anywhere, including competing legal measures, growing social movements, contrasting business interests, or failing economies. Nevertheless, the moment inevitably arises, demanding attention, evaluation, and recourse.
In our advancing society, technology is often the catalyst for such pivotal moments. The technology of computer systems and the Internet constantly implicate new, unexplored pressures arising in our rapidly developing world. From around-the-clock communication, to social media profiles, to data-driven search results at the tap of a touchscreen, our lives have been altered in numerous ways. This makes technology an increasingly difficult problem for regulators that are trying to apply traditional legal principles to a rapidly-evolving society.
So, what happens when technological conveniences collide with our technological responsibilities in the workplace? When the tools and mechanisms necessary to earn a living are the same as those necessary to live in a modern society, it is only a matter of time until curiosity gets the best of us. The question becomes whether pure curiosity while online at work is harmless and excusable, or fraudulent and punishable. Employers and employees alike should be apprised of the potential consequences stemming from the use of technology, including its toll on employment relationships and threats of liability. These threats intensify the need for employers to act diligently from the very beginning of every employment relationship to maintain trust in employees and keep threats of fraud and implications of vicarious liability at bay.
TECHNOLOGY MEETS FRAUD
At the intersection of technology and fraud lies the Computer Fraud and Abuse Act (the “CFAA” or the “Act”).3 The CFAA is not without its own controversy.4 Originally enacted in 1986, the Act amended the 1984 Comprehensive Crime Control Act, which introduced the first federal computer crime statute.5 Arguably, the CFAA marked Congress’ attempt to proactively combat computer hacking and damage to sensitive information.6 However, since its enactment, the CFAA has undergone numerous amendments, greatly expanding its scope and its potential to cause confusion.7 An overall lack of guidance—derived from the Act’s ambiguous nature and the absence of critical definitions—has led to first impression, exploratory decisions by courts across the nation and leaves open the possibility for many uncertainties that are not yet understood.8
FRAUD MEETS LIABILITY
In 1994, the CFAA, previously a criminal statute, was amended to allow for civil claims brought by private parties seeking damages and relief.9 Although this amendment empowered individuals who fell victim to acts of computer crime, it also produced a floodgate effect. The ambiguous nature of the text provided expansive leeway for civil complaints based on varying interpretations of computer use and misuse, as well as the threat of federal prosecution under a criminal statute. The all-inclusive quality of technology through Internet-enabled devices, combined with subsequent amendments to the Act, only further expanded its reach. The 2008 amendment marked the inclusion of any computer in or outside the United States “affecting interstate or foreign commerce or communication.”10
The controversial CFAA saga continues even today—over thirty years since its implementation and nearly ten years since its last alteration—facing a dimensional battle between the physical and virtual worlds. Like many other regulatory devices, the CFAA attempts to assert traditional, physical understandings to the constantly evolving virtual world. Although rooted in a solid foundation, the traditional reasoning leads to inconsistencies and gaps in the text. For instance, the term “authorization” sparks much debate, as it is constantly referenced throughout the Act without an explicit definition.11 This leaves the legal community endlessly exploring regulatory interpretations based on principles of contract, architecture, and societal norms.12
If such a complicated historical landscape perplexes the brightest legal minds of our time, the laypersons regulated by the CFAA are sure to encounter some unknowns as well. For every technological advancement that increases profitability through improved industry and business development, there is an equally powerful side-effect of liability. This is especially true in the modern workforce.
In decades past, the employer-employee relationship was somewhat simpler, without the expectations brought about by high-speed Internet access driving demands and deadlines. The speed of our lifestyles alone is cause for distraction via a digital game of solitaire or a mental timeout to browse through an online shopping mall. But involving employment computers and network connections with one’s personal downtime can have very serious consequences. The CFAA’s reach, once a purely criminal context, now encompasses civil complaints within employment relationships. If unprepared, employers and employees can find themselves in a liability battle, pointing fingers of responsibility.13 Like the judicial system, employment relationships must maneuver through the obstacles that arise from computer use and the CFAA’s private right of action.
LIABILITY MEETS EMPLOYMENT RELATIONSHIPS
Employment relationships describe a legal connection between workers, who perform tasks or services as requested, and overseers, who pay the workers in exchange for their performance.14 Although simple by definition, the specifics vary largely by industry, stability, benefits, and advancement. Across a variety of work environments, however, there is a widespread understanding of the balance of rights to obligations within the context of an employer-employee relationship.15
Within an employment relationship, expectations are typically managed by reference to specified duties or obligations. In business, employees are generally expected to display seven duties towards their employers: obedience, loyalty, cooperation, care, accountability, security, and trustworthiness.16 In return, employers are generally expected to assign reasonable work, within a safe environment, for just compensation, free from threat of liability from performing the assigned tasks.17 If either party fails to meet their obligations, the other party has a responsibility to rectify the situation and preserve the balance of accountability based on the terms of the employment relationship. Without mindful attention to the relationship’s dynamics, both employers and employees can make themselves susceptible to liability.
In the context of employment, vicarious liability, known also by the Latin term “respondeat superior,” refers to an employer’s responsibility for an employee’s actions.18 To prove the elements of vicarious liability, one must show: the existence of an employment agreement, that the employer exerted control over the employee, and that the employee’s actions fell within the scope of employment.19
The principle of vicarious liability has serious implications for employees’ use of employers’ information systems. Introducing employment relationships to Internet-enabled computers can result in costly damages for employers.20 Combined with the Act’s ambiguous nature and the undefined concept of “authorization,” there is much debate about whether employees can use their computers, networks, and database access for reasons other than designated business affairs, and whether that access falls within their scope of employment. At present, there is a circuit split dividing the courts’ interpretation of whether such liability exists by statutory intent or design.21 The debate has almost exclusively focused on disgruntled former employees who leave their employment premises toting trade secrets and wiped databases nestled tightly in their banker’s boxes of personal items. Case after case has been agonizingly scrutinized, trying to force the former employees’ misbehaviors into the text of the Act.22 But what happens when mere curiosity meets allegations of fraud?
EMPLOYMENT RELATIONSHIPS MEET COMPUTER FRAUD
Stemming from the aftermath of the Ninth Circuit’s landmark case United States v. Nosal, courts across the country faced uncertainties regarding employer responsibility and vicarious liability from CFAA claims.23 As a result, two legal theories emerged. The agency theory and the contract theory provide ammunition for the CFAA’s opposing sides amid costly claims of computer misuse and data breaches.24
The agency theory, as articulated by the Seventh Circuit, advances the argument that employees’ authorization to access computer systems and networks terminates when an employee breaches a fiduciary duty owed to the employer.25 At the moment when “an employee’s allegiance turns against the employer, the employee’s authorization is effectively revoked.”26 Under this theory, an employee’s scope of employment is highly scrutinized.27 For instance, employees are provided company computers, smartphones, and wireless connections and they are expected to complete their assigned tasks. However, to truly ensure such compliance, every single keystroke requires constant observation or regular monitoring. In a perfect, controlled environment this may be a possibility. But placing such monitoring demands on employers of every shape and size can be overwhelming and overly burdensome. From a policy standpoint, these precautionary costs can reduce innovation and prevent economic growth.
Under the contract theory, supported by the First, Fifth, and Eleventh Circuits, an employee exceeds authorized access when he or she knowingly breaches either a company policy or an employment contract.28 This approach requires employers to ensure their employees not only receive notice of the consequences of their unauthorized access, but also consent to the liability stemming from unauthorized computer use. Under this theory, courts hold the employment relationship itself to a higher standard than other contracts such as the acceptable use policies which typically govern employees’ workplace web-browsing. Rather, the contract theory requires conscious reflection and responsibility by employees. This approach may be less costly because it shares the burden between both employers and employees, but strict enforcement is necessary to escape claims of vicarious liability.
An important characteristic of both theories lies in the fact that employees technically had the ability, hence the authority, to access the computer system, network, or database in question; otherwise, the access would have been more explicitly denied. To actively prevent unauthorized access and claims of liability, employers should heed warnings from both theories, which prescribe the proper measures needed to dodge costly consequences. Employers must outline their expectations from the beginning of an employment relationship and must maintain enforcement without fail. By utilizing employment contracts, login protocols, and refresher acknowledgements, employers can effectively alert employees of the consequences of misuse. Further, by regularly monitoring employees’ use and appropriately reinforcing the standards of employment, employers can show their strict adherence to the principles of both agency and contract.
The CFAA’s private right of action provides an incentive for those able to prove a breakdown in the employment relationship. Disgruntled former employees already have a personal incentive to attack their former employers. At present, the burden lies more heavily on the employer to prove their standards and expectations are adequate to prevent employee misbehavior. If employers act diligently from the point of hire, or act immediately upon any sign of misuse, trust in one’s employees can remain stable and reliable, keeping threats of vicarious liability under the CFAA at a distance.
COMPUTER FRAUD FACES UNCERTAINTY
The precedent cases are serious matters, involving examples of extreme behavior, detriment to the federal government, and manipulation resulting in unfair competition. But what about lesser acts of “fraud” committed in the workplace: stray glances at trade secrets or confidential customer information? As the old saying goes, “when the cat’s away, the mice will play.” Restless employees can easily succumb to human nature, tempted into computer exploration and investigation beyond their job descriptions.
The widespread use of technology in the workplace can lead to a number of predicaments for employees with idle time or idle minds. Employees have an incredible amount of authorized access when working within the confines of their job descriptions and duties. Employees’ login credentials, knowledge of database infrastructure, and awareness of enforcement mechanisms provide a ripe situation for potential abuse or misuse. Yet only the employment relationship can decide whether an employee’s actions cross the line or fall within vicarious liability.
The growth and expansion of technology in the workplace has sparked renewed debate over the CFAA’s proper role in today’s workplace technology policies. The lens of vicarious liability continually develops through the courts’ interpretations of what or who is considered responsible for authorized computer use. Because there may be serious consequences to an employer whose technology is misused or abused, employers must be aware and active or pay the price of their curious employees.
GLTR Staff Member: Georgetown Law, J.D. expected 2018; Ball State University, B.S. 2011. © 2018, Gina Pickerrell.