Patrick Hately v. Dr. David Watts
Opinion
Patrick Hately brought this action alleging that David Watts unlawfully accessed messages in Hately's web-based email account in violation of the Virginia Computer Crimes Act and the federal Stored Communications Act. But the district court found that Hately failed to demonstrate the requisite statutory injury under state law, and that Hately's previously opened and delivered emails stored by a web-based email service were not in statutorily protected "electronic storage" under federal law. We disagree with both determinations and therefore reverse and remand this case to the district court for further proceedings consistent with this opinion.
I.
A.
In August 2008, Hately enrolled at Blue Ridge Community College ("Blue Ridge College"), a constituent institution of the Virginia Community College System. At Blue Ridge College, Hately had a student email account that he continued to use after he graduated in 2013.
Blue Ridge College uses a web-based email client with branding specific for Blue Ridge College. Google hosts all emails. 1
*774 Account holders can access the copies stored on their web-based email page as long as the student does not delete those copies. Blue Ridge College also stores at least one additional copy of all student emails, which can be used to recover any email that is accidentally deleted. Students may access these stored copies only by requesting them from Blue Ridge College's technical support personnel.
From August 2011 to February 2015, Hately had an intimate relationship with Nicole Torrenzano ("Nicole"), with whom Hately has two children. During their relationship, Hately and Nicole shared login and password information for their email accounts-including Hately's Blue Ridge College email account. But when, about March 2015, Nicole informed Hately that she also was involved in an intimate relationship with Watts, who was her co-worker and married to Audrey Hallinan Watts ("Audrey"), Hately and Nicole separated. Pertinent to this action, Hately did not change the password that he shared with Nicole for his Blue Ridge College email account.
Watts and Nicole continued their personal relationship, and during the fall of 2015, Watts and Audrey initiated divorce proceedings. In an effort to help Watts in his divorce proceedings, Nicole told Watts that Hately and Audrey were having an affair. Nicole said she knew of emails between Hately and Audrey that Watts could obtain by using the password that she had to Hately's Blue Ridge College email account.
Watts stated that he used the password Nicole gave him to browse through Hately's emails but contended that he "did not open or view any email that was unopened, marked as unread, previously deleted, or in the [student email account]'s 'trash' folder." J.A. 506. Watts also said that he did not "change the status of, or modify, any email in any way." Id.
B.
In September 2016, Hately filed his first lawsuit against Watts and Nicole in the United States District Court for the Eastern District of Virginia ("
Hately I
"), alleging that they unlawfully accessed his email, in violation of: (1) the federal Computer Fraud and Abuse Act,
In an order dated December 2, 2016, the district court in
Hately I
dismissed "without prejudice" Hately's Computer Fraud and Abuse Act and Virginia Computer Crimes Act claims against Nicole. The order provided no explanation as to why the court dismissed those claims. But in a subsequent opinion addressing a different issue, the court explained: "[a]lthough [Nicole] moved to dismiss the [Virginia Computer Crimes Act] Claims on multiple grounds, the Court dismissed the [Virginia Computer Crimes Act] Claims because [Hately] failed to sufficiently allege
*775
how he sustained any injury to person or property by reason of a violation of the [Virginia Computer Crimes Act]."
Hately v. Torrenzano
, No. 1:116-CV-01143 (GBL/MSN),
On February 13, 2017, Hately moved to amend his complaint for a second time. This time, Hately sought to rename Watts as a defendant and to reinstate his Computer Fraud and Abuse Act and Virginia Computer Crimes Act claims against Nicole. The district court denied the motion
solely
on grounds that Hately's "attempt to amend the complaint would cause undue prejudice to [Nicole]."
Hately v. Torrenzano
, No. 1:16-CV-01143 (GBL/MSN),
C.
In April 2017, Hately refiled his action against Watts, again alleging that Watts unlawfully accessed his email, in violation of the Computer Fraud and Abuse Act, the Stored Communications Act, and the Virginia Computer Crimes Act.
Unlike his initial action against Watts, which was voluntarily dismissed without prejudice, Hately's refiled action supported his Virginia Computer Crimes Act claims by reciting additional factual allegations bearing on damages.
Hately
,
After conducting a hearing on July 6, 2017, the district court dismissed the Virginia Computer Crimes Act claims against Watts for two independent reasons.
2
First, the court held that the Virginia Computer Crimes Act claims were barred by collateral estoppel. The court explained in an oral ruling that "[a]ll of the damages that [Hately] alleges in this [instant] action ... were the subject of [a prior motion to dismiss in
Hately I
], and that issue was fully briefed and argued in open court in the prior proceedings." J.A. 377. Even though the
Hately I
court dismissed the Virginia Computer Crimes Act claims "without prejudice," the district court concluded that the previous dismissal had "finally
*776
determined" that Hately had not "sustained injury to person or property" under the Virginia Computer Crimes Act. J.A. 382. Accordingly, the district court held that Hately was "estopped from relitigating those injury claims."
Thereafter, in January 2018, Hately and Watts filed cross-motions for summary judgment on the remaining Stored Communications Act claim. In an order entered March 14, 2018, the district court denied Hately's motion, granted Watts' motion, and dismissed the case. In an accompanying opinion, the court held that "previously opened and delivered emails" stored "in a web-based email client" were not in protected "electronic storage" for purposes of the Stored Communications Act.
Hately v. Watts
,
The district court also held that Hately's emails were not protected under the statute because they were not stored by an "electronic communication service" and were not stored "for purposes of backup protection."
Hately timely appealed the dismissal of his Virginia Computer Crimes Act claims and the grant of summary judgment on the Stored Communications Act claim. We address each claim in turn.
II.
Regarding the district court's dismissal of his Virginia Computer Crimes Act claims, Hately contends that the district court's error was twofold. First, that the court improperly applied the doctrine of collateral estoppel, also referred to as "issue preclusion," to bar reconsideration of whether he adequately alleged that his "property or person [was] injured" within the meaning of the Virginia Computer Crimes Act.
See
A.
The district court applied the doctrine of issue preclusion to bar reconsideration of whether Hately's complaint
*777
adequately alleged his "property or person [was] injured" within the meaning of the Virginia Computer Crimes Act.
To determine whether the district court properly applied issue preclusion, we must determine which jurisdiction's preclusion law governs.
See
Semtek Int'l v. Lockheed Martin Corp.
,
These justifications are equally persuasive in cases in which federal courts exercise supplemental, as opposed to diversity, jurisdiction over state law claims. Accordingly, we hold that when a federal court exercises supplemental jurisdiction over a state law claim, federal common law governs the preclusive effect of the federal court's disposition of that claim.
Cf.
Here, we discern no reason why Virginia preclusion law is incompatible with federal interests. Applying state preclusion law here would not undermine "federal courts' interest in the integrity of their own processes."
See
Semtek Int'l.
,
We thus apply Virginia preclusion law to determine whether the doctrine of issue preclusion barred Hately from litigating the adequacy of his allegations as to damages in his new complaint. Under Virginia law, a party asserting defensive issue preclusion has "the burden of proving that the claim or question had been in issue and determined in [a] prior ... action."
Scales v. Lewis
,
1.
As under federal preclusion law, Virginia applies the doctrine of issue preclusion only when the decided issue is "essential to the prior judgment."
See
TransDulles Ctr.
,
Although the
Hately I
dismissal order did not explain why Hately's Virginia Computer Crimes Act claims were dismissed, the court later elaborated that Hately had "failed to sufficiently allege how he sustained any injury to person or property by reason of a violation of the Virginia Computer Crimes Act."
Hately
,
But the
Hately I
court's explanation for its decision to dismiss the Virginia Computer Crimes Act claims is as-if not
*779
more-plausibly read as holding
not
that the three "categories" of damages alleged were not actionable under the Virginia Computer Crimes Act, but rather, in the court's own words, that Hately's complaint failed to include "sufficien[t]," nonconclusory factual allegations establishing such damages to satisfy the requirements of Federal Rule of Civil Procedure 12(b)(6).
Hately
,
When, as here, a prior court's explanation for its grounds for dismissing a prior action is amenable to multiple interpretations, courts decline to hold that the prior court disposition has preclusive effect in subsequent litigation. For example, in
Mitchell v. Humana Hospital-Shoals
, the Eleventh Circuit considered whether a federal district court in a Title VII retaliatory constructive discharge case properly dismissed the action on grounds that the dismissal of a previous state worker's compensation case precluded the plaintiff from relitigating whether she had good cause for resigning her position.
As explained above, just as in
Mitchell
, the
Hately I
court's one-sentence description of the basis of its dismissal of the Virginia Computer Crimes Act claims leaves open at least two possibilities as to the reason for the dismissal: (1) the court concluded that the "categories" of damages Hately alleged were not, as a matter of law, actionable under the Virginia Computer Crimes Act
or
(2) the court concluded Hately failed to plead those damages with sufficient specificity. Accordingly, contrary to the district court's issue preclusion ruling, we "cannot be certain if the court actually decided whether" the categories of damages Hately alleged were not actionable under the Virginia Computer Crimes Act, barring application of the doctrine of issue preclusion.
Significantly, Hately's complaint in the instant case includes numerous new and specific factual allegations pertaining to damages that Hately
did not allege
in the complaint that the
Hately I
court found insufficient,
see infra
Part II.B;
supra
Part I.C, meaning that the
Hately I
court did not have an opportunity to pass judgment on the sufficiency of the factual allegations at issue in this case. Accordingly, to the extent the
Hately I
court dismissed the Virginia Computer Crimes Act claims on grounds that the factual allegations in the complaint lacked the requisite specificity to satisfy Rule 12(b)(6), that determination would not preclude a holding that Hately's factual allegations pertaining to Virginia Computer Crimes Act damages in this case satisfied Rule 12(b)(6).
Cf.
Loudoun Hosp. Center v. Stroube
,
2.
Even assuming the issue of injury had been actually and essentially determined in
Hately I
-which it was not-the district court nevertheless erred in applying issue preclusion because Virginia continues to adhere to the doctrine of mutuality.
See
Norfolk and Western Ry. Co. v. Bailey
,
In
Dual & Associates v. Wells
, a corporation filed two separate claims against a brother and a sister.
Similarly, in this case, Watts was dismissed from the
Hately I
action prior to Nicole's motion to dismiss the Virginia Computer Crimes Act claims. If Hately successfully demonstrated statutory injury
*781
in the
Hately I
action against Nicole, Watts nevertheless would have been given an opportunity to litigate the issue of injury in the current action.
See
id
at 356 ;
Norfolk & W. Ry. Co.
,
B.
As an independent basis for dismissing Hately's Virginia Computer Crimes Act claims, the district court held that Hately failed to plausibly allege statutory injury, therefore requiring dismissal under Federal Rule of Civil Procedure 12(b)(6). "We review de novo a district court's decision to dismiss for failure to state a claim, assuming all well-pleaded, nonconclusory factual allegations in the complaint to be true."
Aziz
,
The Virginia Computer Crimes Act is a criminal statute with a private civil right of action. In pertinent part, the Virginia Computer Crimes Act provides: "Any person whose property or person is injured by reason of a violation of [the Virginia Computer Crimes Act] ... may sue therefor and recover for any damages sustained and the costs of suit. Without limiting the generality of the term, 'damages' shall include loss of profits."
We previously have held that statutory injury under the Virginia Computer Crimes Act includes consequential damages. In
A.V. ex rel. Vanderhyne v. iParadigms, LLC
, a corporation sued a minor for obtaining access to its "service by using passwords and enrollment codes that [the minor] did not have authorization to use."
Under iParadigms , Hately has pleaded facts that plausibly establish that he suffered consequential damages actionable under the Virginia Computer Crimes Act. In his operative complaint, Hately extensively details the time he spent assessing and rectifying Watts's unauthorized access. For example, Hately allegedly "identif[ied]" and "ma[de] several calls" to Blue Ridge College's technical support personnel "in order to ascertain the individual(s) that owns the domain for his *782 school-related email account, as well as the individual(s) that manages the exchange servers for his school-related email account." J.A. 165 ¶ 94. Furthermore, Hately allegedly "review[ed]" "hundreds or thousands of email messages" and "restored" "deleted but unread email messages" that "were previously unknown to [Hately]." J.A. 166 ¶¶ 97-98. Finally, Hately allegedly "invested" time and money to "track and prevent future [unauthorized] access." J.A. 175 ¶ 153. The time Hately spent assessing and rectifying Watts's unauthorized access is materially indistinguishable from the time the corporation spent doing the same in iParadigms .
Watts seeks to avoid this plain application of
iParadigms
by suggesting that Hately has improperly valued his time spent assessing and rectifying the unauthorized access. But in considering a motion to dismiss, we assume "all well-pleaded, nonconclusory factual allegations in the complaint to be true."
Aziz
,
Here, Hately pleaded sufficient facts to make plausible his claim that he suffered injury under the Virginia Computer Crimes Act. Accordingly, the district court erred by dismissing Hately's Virginia Computer Crimes Act claims.
III.
Hately next contends that the district court erred in granting Watts summary judgment on Hately's Stored Communications Act claim. In particular, Hately argues that the court erred by concluding that "previously opened and delivered emails" stored "in a web-based email client" were not in protected "electronic storage" within the meaning of the Stored Communications Act. "We review the district court's grant of a motion for summary judgment de novo."
Nguyen v. CNA Corp.
,
Before construing the meaning of the relevant statutory language, it is useful to recount Congress's purpose in enacting the Stored Communications Act.
See
King v. Burwell
, --- U.S. ----,
*783 To Congress, this "legal uncertainty pose[d] potential problems in a number of areas." H.R. Rep. No. 99-647, at 19; see S. Rep. No. 99-541, at 5. First, it "unnecessarily discourage[d] potential customers from using innovative communications systems." S. Rep. No. 99-541, at 5 ; see H.R. Rep. No. 99-647, at 19. Next, it "encourage[d] unauthorized users to obtain access to communications to which they are not a party." S. Rep. No. 99-541, at 5 ; see H.R. Rep. No. 99-647, at 19. "Most importantly," Congress recognized that the uncertainty surrounding the legal protections, if any, afforded to electronic communications would "promote the gradual erosion of th[e] precious right [to privacy]." S. Rep. No. 99-541, at 5 ; see H.R. Rep. No. 99-647, at 19.
Senator Patrick Leahy first introduced a bill to remedy this legal uncertainty in 1985.
See
United States v. Councilman
,
In its report, the Office of Technology Assessment emphasized the lack of legal protection for email. The report, which the legislative history of the Stored Communications Act references at length, concluded that the "current legal protections for electronic mail are 'weak, ambiguous, or non-existent,' and that 'electronic mail remains legally as well as technically vulnerable to unauthorized surveillance.' " S. Rep. No. 99-541, at 4 (quoting Office of Technology Assessment,
Federal Government Information Technology: Electronic Surveillance and Civil Liberties
44 (Oct. 1985) ("
OTA Report
")). The report further identified the "stages at which an electronic mail message could be intercepted and its contents divulged to an unintended receiver."
OTA Report
, at 45. Among the identified stages was the point at which the message was "in the electronic mailbox of the receiver."
Less than a year after the report was published, Congress enacted the Stored Communications Act. In so doing, Congress expressed its "judgment that users have a legitimate interest in the confidentiality of communications in electronic storage at a communications facility."
Theofel v. Farey-Jones
,
Section 2701 of the Stored Communications Act-under which Hately seeks relief-criminalizes and provides a private civil cause of action against anyone who "intentionally accesses without authorization a facility through which an electronic communication service is provided ... and thereby obtains, alters, or prevents authorized access to a wire or electronic communication
*784
while it is in
electronic storage
in such system[.]"
(A) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and
(B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication[.]
The district court concluded that Hately's emails that Watts allegedly accessed unlawfully-all of which the undisputed evidence establishes were previously delivered and opened-were not in "electronic storage" under either Subsection (A) or Subsection (B).
Hately
,
"When interpreting a statute, we begin with the plain language."
In re Total Realty Mgmt., LLC
,
A.
Whether Hately's previously opened and delivered emails stored by a web-based email service were in "electronic storage" within the meaning of Subsection (A) is a question of first impression in this Circuit. That provision encompasses "temporary, intermediate storage of a[n] ... electronic communication incidental to the electronic transmission thereof[.]"
Congress broadly defined "electronic communication" to include, with a few inapposite exceptions, "
any
transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectric or photooptical system that affects interstate or foreign
*785
commerce[.]"
Numerous courts have reached the same conclusion.
See, e.g.,
Vista Mktg., LLC v. Burkett
,
Even so, the district court held that previously delivered and opened emails-like Hately's emails at issue-"are no longer in 'temporary, intermediate storage ... incidental to the[ir] electronic transmission' " and therefore do not fall within the scope of Subsection (A).
Hately
,
Dictionaries define "temporary" as "existing or continuing for a limited time,"
Temporary
, Webster's Third New International Dictionary 2353 (1961), and "intermediate" as "lying or being in the middle[,]"
Intermediate
, Webster's Third New International Dictionary 1180;
see also
The American Heritage Dictionary 914, 1781 (4th ed. 2000) (defining "temporary" as "lasting, used, serving, or enjoyed for a limited time" and "intermediate" as "lying or occurring between two extremes or in a middle position or state"). These definitions indicate that electronic communications are protected by Subsection (A) while they are stored "for a limited time" "in the middle" of transmission.
In re DoubleClick Inc. Privacy Litig.
,
But previously opened and delivered emails stored by a web-based email service do not fall within the plain language of Subsection (A). Such emails already have been "transmitted" to the recipient and therefore no longer are "in the middle" of transmission
. See
Councilman
,
*786 B.
In the alternative, Hately contends that previously opened and delivered emails stored in a web-based email client are in "electronic storage" within the meaning of Subsection (B), which encompasses "any [1] storage of [2] such communication [3] by an electronic communication service [4] for purposes of backup protection of such communication."
1.
To be in protected "electronic storage" under Subsection (B), previously opened and delivered emails must be in "storage."
See
In light of the ordinary meaning of storage and Congress's intent that the term be interpreted broadly, we agree with the Ninth Circuit that "prior access is irrelevant" to whether an email is in "storage,"
Theofel
,
Regardless of whether Hately had previously opened and accessed his web-based emails, those emails were nevertheless "reserved for future use" by the Blue Ridge College email host in the event that Hately would need to access them in the future. Accordingly, Hately's emails were in "storage" within the meaning of Subsection (B).
2.
Next, to be in protected "electronic storage" under Subsection (B), previously opened and delivered emails must be included within the meaning of the phrase "such communication."
See
Watts argues-and the district court agreed-that to fall under Subsection (B) a "communication" must be both "wire or electronic"
and
in "temporary, intermediate storage" because both of those phrases precede the term "communication" in Subsection (A).
Hately
,
As the Ninth Circuit explained, "Subsection (A) identifies a type of communication ('a wire or electronic communication')
and
a type of storage ('temporary, intermediate storage ... incidental to the electronic transmission thereof')."
Theofel
,
Our interpretation also conforms to the principle of statutory construction that "if possible, a court should avoid an interpretation that renders any 'clause, sentence, or word ... superfluous, void, or insignificant.' "
Clark v. Absolute Collection Serv., Inc.
,
Hately's emails constitute "wire or electronic communication" as the Stored Communications Act uses that term. See supra Part III.A. Accordingly, the district court erred in holding that Hately's emails did not constitute "such communication" within the meaning of Subsection (B).
3.
Third, to constitute "electronic storage" for purposes of Subsection (B), the wire or electronic communication must be stored by an "electronic communication service."
Notably, the Stored Communications Act's legislative history supports this conclusion, stating that "electronic mail companies are providers of electronic communication services." S. Rep. No. 99-541, at 14. And in accordance with the plain language of the Stored Communications Act and the statute's legislative history, courts have concluded that email services-like Hately's College email account-are electronic communication services.
See, e.g.
,
Vista Mktg.
,
Watts nevertheless argues-and the district court agreed-that, at least for purposes of the email copies in question, Blue Ridge College's email service was functioning not as an electronic communication service, but
solely
as a "remote computing service"-a term not used in the Stored Communications Act's definition of electronic storage. The Stored Communications Act defines "remote computing service" as "the provision to the public of computer storage or processing services by means of an electronic communications system."
The district court's reasoning rests on the premise that, for purposes of the emails in question, Blue Ridge College's email service could not simultaneously function as both an electronic communication service and a remote computing service. But nothing in the plain language of the definitions of electronic communication service and remote computing service precludes an entity from simultaneously functioning as both. There is no logical or technological obstacle to an entity "provid[ing] to users thereof the ability to send or receive wire or electronic communications"- i.e. , functioning as an electronic communication service- while , and as part of the same service, "provi[ding] the public [with] computer storage or processing services by means of an electronic communications system"- i.e. , functioning as a remote computing service. And the relevant legislative history expressly contemplates as much, stating that "remote computing services may also provide electronic communication services." S. Rep. No. 99-541, at 14 ; see also H.R. Rep. No. 99-647, at 64 ("[T]o the extent that a remote computing service is provided through an Electronic Communication Service, then such service is also protected [under Section 2701(a) ].").
Notably, other aspects of the district court's opinion appear to contradict its conclusion that an entity cannot simultaneously
*789
function as an electronic communication service and a remote computing service. In particular, the district court held-and Watts does not dispute-that the email provider was acting as an electronic communication service as to unread or not downloaded emails.
See
Hately
,
The legislative history also supports the conclusion that Congress viewed email providers as simultaneously functioning as both a remote computing service and an electronic communication service when such providers store "unread or not downloaded" messages. The House Report notes that "[s]ometimes the addressee, having requested and received a message, chooses to leave it in storage on the [remote computing] service for re-access at a later time. The Committee intends that, in leaving the message in storage, the addressee should be considered the subscriber or user from whom the system received the communication for storage, and that such communication should
continue to be covered
by section 2702(a)(2)," which prohibits
remote computing services
from divulging the contents of communications they carry or maintain. H.R. Rep. No. 99-647, at 64-65 (emphasis added). If a provision protecting messages stored by remote computing services "applies to e-mail
even before access
, the committee could not have been identifying an
exclusive
source of protection, since ... unopened e-mail is protected by the electronic storage provisions."
Theofel
,
Significantly, because the plain language of the Stored Communications Act, the statute's legislative history, and the district court's own reasoning contemplates that entities can simultaneously function as both an electronic communication service and a remote computing service, the House Report's statement that a user's opened messages "continue to be covered" by remote computing service provisions in no way precludes a finding that the entity also "continue[d] to" act as an electronic communication service
after
the user opened the messages.
See
*790
To be sure, "the statutory definitions of [electronic communication service] and [remote computing service] are functional and context sensitive."
In re United States
,
Because (1) email providers fall squarely within the statutory definition of electronic communication service and (2) the terms electronic communication service and remote computing service are not mutually exclusive, the district court erred in holding Hately's College email account did not amount to an electronic communication service.
4.
Finally, to constitute "electronic storage" under Subsection (B), an electronic communication must be stored "for purposes of backup protection."
The most relevant definition of "backup" is "a copy of computer data (such as a file or the contents of a hard drive)." Backup , Merriam-Webster.com (last visited Feb. 26, 2019) (emphasis added). A "copy" is a "duplicate." Copy , Merriam-Webster.com (last visited Feb. 26, 2019); Copy , The American Heritage Dictionary 405. More general definitions of "backup" include "substitute" or "support." Backup , Merriam-Webster.com (last visited Feb. 26, 2019); Backup , The American Heritage Dictionary 132. "Protection" is defined as "the act of protecting," Protection , Merriam-Webster.com (last visited Feb. 26, 2019), which means "cover[ing] or shield[ing] from exposure, injury, damage, or destruction," Protect , Merriam-Webster.com (last visited Feb. 26, 2019); see also The American Heritage Dictionary 1408 (defining "protect" as "to keep from being damaged, attacked, stolen, or injured"). Accordingly, a wire or electronic communication is stored for "purposes of backup protection" if it is a "copy" or "duplicate" of the communication stored to prevent, among other things, its "destruction."
The copies of previously delivered and opened emails retained on the server of the host of a web-based email service-like Hately's emails at issue-fall within this understanding of electronic communication stored "for purposes of backup protection." To understand why such emails fall within the definition of " backup ," it is useful to explain the typical manner in which a web-based email service functions.
To begin, after the sender drafts and sends a message, a copy of the message is transmitted to the recipient's web-based email service. Such services typically (including Google, which hosted Blue Ridge College's email service) "utilize completely redundant systems consisting of multiple data servers."
See
Br. of Amici Curiae the Ctr. for Dem. & Tech., the Elec. Frontier Found., and New Am. Open Tech. Inst. in Support of Pl.-Appellant and Reversal ("CDT Br.") at 22. "In redundant systems, a single email is stored on multiple servers, likely in different locations around the country, and possibly around the world."
When the recipient chooses to view the email via a web browser or application on a computer, smartphone, or other internet-connected device, one of the web-based email service's servers sends a copy of the message to the user's device for the user to view through the browser or application. That copy is temporarily stored in the device's short-term memory. The user's device also might download a copy for retention in the device's long-term memory. Accordingly, the "copies" retained by the host of the web-based email service also serve as a "substitute" or "support" for the copies of the message the recipient downloads to his device's short-term or long-term memory.
Accord
Cheng
,
Numerous other copies may exist as well. For example, the sender may retain a copy of the message in her outbox. The sender's email service also may retain copies of the message on one or more servers for the sender to access. And during the transmission process, intermediate computers may retain one or more copies as well.
See
Councilman
,
Notably, notwithstanding that some courts have lamented that "[i]t is not always easy to square the decades-old [Stored Communications Act] with the current state of email technology,"
see, e.g.
,
Anzaldua v. Ne. Ambulance & Fire Prot. Dist.
,
The copies of emails retained by a user in his web-based account also are stored by the web-based email service- i.e. , the electronic communication service-for purposes of its own and its users' "protection." As set forth above, web-based email services-including Google, which hosted the copies Hately's emails accessed by Watts-retain multiple copies of the messages in a user's account for the web-based email service's own backup protection. Such services use "redundant" systems "to decrease email downtime ( i.e. , users being unable to access their email) or loss of information due to component failure," CDT Br. at 22- i.e. , to ensure the product the web-based email service markets functions as intended, expected, and demanded by users. Put simply, by storing copies of messages on multiple servers and in multiple locations, the web-based email service protects itself against the failure of one or more of its servers.
Additionally, the web-based email service stores previously opened and delivered emails for the "protection" of their users. When the user of a web-based email service, like Hately, opens and reviews an email message and then chooses not to delete the message from his account, the user is likely retaining that message to prevent its destruction. There are numerous reasons a recipient may not want to destroy a message he already has read. For example, a user who receives an email setting up a meeting may choose not to delete the email after first reading it because the user wants to keep a copy readily available in case the user forgets the time or place of the meeting. Or, a user who reaches a business agreement over email may choose to retain in his web-based account messages concerning the agreement to document the agreement's existence and terms. Or, a user who receives a message from a friend or loved one may choose not to delete the message because it has sentimental value and the user wishes to reread the message of future. Or, a user may choose not to delete a message after reading it simply because the user does not know whether the user will need the message in the future and therefore wishes to preserve it. In each of these examples, the user chooses not to delete the message because the user does not want the message to be "destroyed."
But importantly, the meaning of "backup protection" does not turn on whether a user subjectively chose not to delete the email after reading the message because the user wanted to keep the message for backup protection. That is because the purpose of the web-based email service in providing storage for the message-storage that is a feature of the product the web-based email service offers-is to afford the user a place to store messages the user does not want destroyed. The web-based email service does not need to know why the user has elected not to delete particular message. Rather, the web-based email service recognizes that users who choose to use a web-based email platform desire storage for read and unread messages and therefore the web-based email *794 service provides such storage to meet user demand. That is why providers of web-based email services like Google, Microsoft, and Yahoo! market the amount of storage their services provide. See, e.g. , Nicholas Behrens, Gmail, now with 10 GB of Storage (and counting) , Official Gmail Blog (April 24, 2012), https://gmail.googleblog.com/2012/04/gmail-now-with-10gb-of-storage-and.html (last visited Feb. 26, 2019). Put simply, the web-based email service is storing the message for the purpose of providing backup protection to its users because that is a feature users desire.
Our conclusion that previously delivered and opened emails stored on a web-based email client are in "electronic storage"-and therefore actionable under Section 2701(a) -also finds support in the statute's legislative history. The House Report states that "[a]n 'electronic mail' service, which permits a sender to transmit a digital message to the service's facility, where it is held in storage until the addressee requests it, would be subject to Section 2701." H.R. Rep. No. 99-647, at 63. In the case of a web-based email service, like Blue Ridge College's email service, the service holds copies of the message in "storage" on one or more of its servers "until the addressee requests it."
Likewise, the Senate Report notes that "a computer mail facility authorizes a subscriber to access information in their portion of the facilit[y']s storage. Accessing the storage of other subscribers without specific authorization to do so would be a violation of [ Section 2701(a) ]." S. Rep. No. 99-541, at 36. Here, Google, as host of Blue Ridge College's email service, allocates a "portion" of the space on its servers to store a user's messages. Accordingly, accessing that "storage ... without specific authorization"-as Watts allegedly did here-is actionable under Section 2701(a)(1). Again, the Senate Report nowhere draws a distinction between the periods before and after a user first views a message, as Watts would have us do. Rather, like the House Report, the Senate Report focuses on whether the copy of the allegedly unlawfully accessed message was held in the web-based email service's storage (and therefore is actionable under Section 2701(a)(1) ) as opposed to other entities' storage (and therefore is not actionable).
Watts nevertheless argues that previously delivered and opened emails stored by a web-based email service do not fall within the meaning of "backup protection" for three reasons: (1) the term encompasses only copies "made for the service provider's own administrative purposes"; (2) the term encompasses only copies retained "for use in the event that the original is rendered unusable"; and (3) the emails were stored for Hately 's backup protection and not for Blue Ridge College 's backup protection.
Watts' first argument-that the term "backup protection" encompasses only copies "made for the service provider's own administrative purposes"-principally rests on his contention, with which the district court agreed, that the meaning of "backup protection" in Subsection (B) should be construed in accordance with the meaning of "backup copy" in
Section 2704 's use of the term "backup copy" does not bear the interpretive weight Watts claims. Nothing in the Stored Communications Act's definition of electronic storage, Section 2704, or the statute's legislative history provides any indication that Congress intended "backup protection" and "backup copy" to have the same meaning. On the contrary, Section 2704(a) deals with a specific type of "backup copy"-one created pursuant to court order-and therefore does not, and cannot, establish the general definition of "backup." Notably, Watts and the district court concede as much, concluding that the definition of "backup protection" encompasses all "backup" copies created for an electronic communication service's "administrative purposes," not just any backup copies created pursuant to a court order issued under Section 2704(a). Indeed, the "backup copies" at issue in Section 2704(a) arguably are not created for "administrative purposes" at all-they are created to comply with the court order.
More significantly, even assuming Watts and the district court are correct that the term "backup protection" encompasses only copies that are "made for the service provider's own administrative purposes," Hately's emails in question would fall within the meaning of "backup protection." "Administrative" means "relating to the running of a business, organization, etc." Administrative , Merriam-Webster.com (last visited Feb. 26, 2019). As explained above, web-based email services-including Google, which hosted Hately's College email account-create numerous copies of emails for their own administrative purposes, such as decreasing email downtime, protecting against loss of data in the event a particular server fails, CDT Br. at 22, and for their own commercial purposes, such as to more effectively target advertisements. Accordingly, the copies of Hately's emails at issue were created for Blue Ridge College email service's "administrative purposes" under the common meaning of that term.
In support of his second argument-that the term "backup protection" encompasses only copies retained "for use in the event that the original is rendered unusable"-Watts asserts that the definition of backup presupposes the existence of an "original." Appellee's Br. at 33-34; see also Jennings , 736 S.E.2d at 245 ("Congress's use of 'backup' necessarily presupposes the existence of another copy to which this e-mail would serve as a substitute or support."). According to Watts, the emails accessed by users of a web-based email service are "originals," rather than "copies," and therefore do not fall within the meaning of "backup."
To be sure, some definitions of "backup" suggest a distinction between "backups" and "originals." See Backup , The American Heritage Dictionary 132 ("A copy of a program or file that is stored separately from the original."); Copy , The American Heritage Dictionary 405 (defining "copy" as "[a]n imitation or reproduction of an original"). But not all definitions of "backup"
*796 draw such a distinction. See supra Part III.B.4. And relying on definitions of "backup" that define the term relative to an "original" makes little sense in the context of messages stored by electronic communication services, and email services, in particular. That is because the "original" would seem to be most readily understood as the copy of a message that a sender types into his email client. The sender's email service then sends a copy of that original to the recipient's email service, meaning that the recipient's email service never receives, much less stores, the "original" message. See S. Rep. No. 99-541, at 8 (stating that in the "most common form" of email "messages are typed into a computer terminal, and then transmitted over telephone lines to a recipient computer operated by an electronic mail company. If the intended addressee subscribes to the service, the message is stored by the company's computer 'mail box' until the subscriber calls the company to retrieve its mail"). Put differently, all copies of an email held by a recipient's email service, web-based or otherwise, are "copies," rather than "originals."
Additionally, even if an addressee's email service did receive an "original," in the context of "redundant" web-based email services-like Blue Ridge College's email service hosted by Google-even the "original" serves as a "backup." See CDT Br. at 22. In particular, each of the numerous copies of the messages created and stored on the service's server acts as a "substitute" or "support" for every other copy stored on the service's servers. See id. Accordingly, even if one of those numerous copies was an "original," that "original" would still serve as a "backup" for all the other copies stored by the service. 8
Third, Watts argues-and the district court agreed-that Hately's emails were not stored "for purposes of backup protection" because the court determined those emails were stored for
Hately
's backup protection and not for
Blue Ridge College email service
's backup protection.
See
Hately
,
* * * * *
We conclude that previously delivered and opened emails stored by an electronic communication service are stored for "purposes of backup protection," under the plain and ordinary meaning of those terms. And because such emails amount to "wire or electronic communications" in "storage" by an "electronic communication service," such emails are in "electronic storage" for purposes of Subsection (B). See supra Parts III.B.1-3. 9
5.
Our conclusion that previously delivered and opened emails fall within the meaning of Subsection (B) also accords with Congress's purpose in enacting the Stored Communications Act. Congress sought to fill in a "gap" in then-existing law as to the "protect[ion of] the privacy and security of communications transmitted by new non-common carrier communications services or new forms of telecommunications and computer technology," including email. S. Rep. No. 99-541, at 5 ; H.R. Rep. No. 99-647, at 17 (noting that statutory framework that existed prior to enactment of the Stored Communications Act "appear[ed] to leave unprotected an important sector of the new communications technologies," including email); id. at 18 (noting "[t]he statutory deficiency ... with respect to non-voice communications"). As noted above, Congress expressed concern that the absence of such protection "unnecessarily discourage[s] potential customers from using innovative communications systems" and "encourages unauthorized users to obtain access to communications to which they are not a party." S. Rep. No. 99-541, at 5 ; H.R. Rep. No. 99-647, at 19.
The district court's construction of Subsection (B)-that previously delivered and opened emails stored by a web-based email service are not in "electronic storage" and therefore not actionable under Section 2701(a)(1) -would materially undermine these objectives. Potential users of web-based-email services-like Blue Ridge College's email service-would be deterred from using such services, knowing that unauthorized individuals and entities could access many, if not most, of the users' most sensitive emails without running afoul of federal law. Likewise, without the *798 prospect of liability under federal law, unauthorized entities will face minimal adverse consequences for accessing, and using for their own benefit, communications to which they are not a party. The legislative history establishes that Congress did not intend such a result.
The district court's interpretation of Subsection (B)-which would protect only
unread
emails stored in by web-based email service-also leads to an arbitrary and untenable "gap" in the legal protection of electronic communications. S. Rep. No. 99-541, at 5. Under the district court's reading, the Stored Communications Act renders unlawful unauthorized access of
unopened
messages stored by web-based email services, whereas unauthorized access of
opened and saved
messages stored by such services would not violate the Stored Communications Act.
See
Hately
,
IV.
In sum, the district court improperly granted Watts's motion to dismiss for failure to plausibly allege "injury to person or property" under the Virginia Computer Crimes Act. Additionally, the district court erroneously granted Watts's motion for summary judgment by concluding that previously opened and delivered emails stored in a web-based email client were not "electronic storage" for purposes of the Stored Communications Act. 10 Accordingly, we reverse the district court's dismissals of Hately's Virginia Computer Crimes Act and Stored Communications Act claims and remand the case to the district court for further proceedings consistent with this opinion.
REVERSED AND REMANDED
Generally, email clients can be categorized as either: (1) web-based and (2) non-web-based.
See
United States v. Weaver
,
The district court also dismissed Hately's claim under the Computer Fraud and Abuse Act, but Hately does not appeal that dismissal.
We assume, without deciding, that Virginia would apply issue preclusion to this question of law.
See
Bates v. Devers
,
During the email transmission process, intermediate computers may "retain backup copies, which they delete later."
Councilman
,
One commentator has argued, and some courts have agreed, that an email cannot "be protected under the [electronic communication service] rules and the [remote computing service] rules at the same time" because "the [electronic communication service] rules and [remote computing service] rules can be mutually exclusive." Orin S. Kerr,
A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It
,
There are several problems with this analysis. To begin, because both Section 2703(a) and Section 2703(b)(1)(B)(i) can be satisfied at the same time-by, for example, obtaining a warrant, § 2703(b)(1)(A) -they are not "mutually exclusive" in the logical sense. See Mutually Exclusive, Merriam-Webster.com (last visited Feb. 26, 2019) (defining "mutually exclusive" as "being related such that each excludes or precludes the other").
More significantly, both the House Report and Senate Report recognize that there are instances "in which a person or entity acts both as a provider of [electronic communications] services and also offers other services to the public," which other services may be subject to different statutory disclosure requirements. H.R. Rep. No. 99-647, at 65; S. Rep. No. 99-541, at 37. Congress stated that in such circumstances, the provider should adhere to the more restrictive disclosure regime. H.R. Rep. No. 99-647, at 65 ("The Committee intends that such instances be analyzed as though the communication services and the other services were provided by distinct entities. Where a combined entity in its non-provider role would not be allowed to disclose, the appropriate outcome would be non-disclosure."); S. Rep. No. 99-541, at 37 (same). For example, Congress stated when an entity simultaneously is subject to both the remote computing service and the Fair Credit Reporting Act disclosure restrictions, the entity should adhere to the more onerous Fair Credit Reporting Act disclosure restrictions. H.R. Rep. No. 99-647, at 65. Applying Congress's intended analytical approach, entities that simultaneously function as an electronic communication service and a remote computing service would follow the more restrictive disclosure regime set forth in Section 2703(a).
Although no Circuit court appears to have squarely addressed the question, courts are divided as to whether delivered and previously opened emails retained on the server of the host of a web-based email service are stored for "purposes of backup protection." Several courts, including the district court in this case, have concluded that such emails cannot amount to "backup[s]" because the term "backup" presupposes the existence of another copy to which this e-mail would serve as a substitute or support.
See
Hately
,
That modern web-based email systems typically download messages to short-term memory as opposed to long-term storage does not render Congress' exemplar email system any less relevant. Congress intended for the term storage to be defined broadly, stating that the meaning of storage should not be limited to particular mediums, forms, or locations. See supra Part III.B.1. Accordingly, changes in the manner or medium of storage do not impact whether an electronic communication falls within the definition of electronic storage.
Although the district court did not accept Watts' effort to distinguish "backup" copies from "original" copies, in defining backup the district court did distinguish between (1) Blue Ridge College's "storage copies" of the emails, which were accessible to the student only "by special request," and (2) Blue Ridge College's "service copies" of the emails, which were "immediately accessible to the user by logging in to the email client." Id. at 411-12. According to the district court, the Stored Communications Act protects only "storage copies." Id. Because Watts accessed "service," rather than "storage," copies of Hately's emails, Hately cannot obtain relief under the Stored Communications Act, the district court determined. Id. We reject this distinction for several reasons.
To begin, neither Subsection (B), nor the Stored Communications Act overall, nor the statute's legislative history uses the terms "storage copies" or "service copies." Accordingly, the district court's analytical framework lacks textual support. Additionally, that Blue Ridge College maintained "storage copies"-as the district court defined that term-of emails for backup protection in no way precludes a determination that "service copies" also are "stored for purposes of backup protection," as Congress used that term. Neither the statute nor its legislative history limits the scope of messages in "electronic storage" under Subsection (B) to a single backup copy or type of backup copy. On the contrary, as long as Blue Ridge College's email service stored the "service copies" of Hately's emails "for purposes of backup protection" as required by Subsection (B), it is irrelevant that additional backup copies-be they characterized "storage copies" or otherwise-also may exist.
Watts also asserts that language in the legislative history of two bills considered by Congress more than a decade
after
it enacted the Stored Communications Act establishes "Congress's intent that opened and retained emails not be considered in 'electronic storage.' " Appellee's Br. at 45. But "the interpretation given by one Congress (or a committee or Member thereof) to an earlier statute is of little assistance in discerning the meaning of that statute."
Pub. Employees Ret. Sys. of Ohio v. Betts
,
Watts also argues that the district court properly awarded him summary judgment on the Stored Communications Act claim because he did not " intentionally access [Hately's] email without authorization or intentionally exceed his authorization to access [Hately's] email." Appellee's Br. at 51. The district court did not address whether Hately's evidence was sufficient to create a dispute of fact as to intent, and therefore we decline to address that question in the first instance.
Reference
- Full Case Name
- Patrick HATELY, an Individual, Plaintiff - Appellant, v. Dr. David WATTS, an Individual, Defendant - Appellee. the Center for Democracy & Technology; The Electronic Frontier Foundation; New America's Open Technology Institute, Amici Supporting Appellant, Digital Justice Foundation, Amicus Supporting Appellee.
- Cited By
- 81 cases
- Status
- Published