En Banc 9th Circuit Decision Narrowly Construes Federal Computer Fraud and Abuse Act's Prohibition on Conduct that "Exceeds Authorized Access"

by Davis Wright Tremaine LLP

[author: Ronald G. London]

In a 9-2 reversal of an earlier appellate decision by a 3-judge panel, the U.S. Court of Appeals for the 9th Circuit issued an en banc ruling in U.S. v. Nosal, holding that the prohibition in the federal Computer Fraud and Abuse Act (“CFAA”) on exceeding authorized access to a computer covers only the scope of access allowed, not the subsequent use of any information obtained.  In doing so, the court rejected a broader reading the government advocated, which the en banc majority held “would transform the CFAA from an anti-hacking statute into an expansive misappropriation statute.”  The court’s decision, authored by Judge Kozinski, explains that this narrow construction is preferable because it prevents CFAA liability for, for example, employees using their work computers in violation of their employers’ acceptable use polices, and/or web-surfers using a website in ways that may violate its terms of use/service, which the court noted few ever read, and even fewer understand in enough detail to avoid unwitting liability.

The CFAA is primarily a criminal statute intended to deter computer hackers, though it permits civil actions by private parties damaged as a result of a violations (assuming they incur sufficient injury).  It generally prohibits intentionally or knowingly accessing a computer without authorization or exceeding authorized access in a variety of contexts, including those involving government computers, attempts to defraud to obtain something of value, and/or causing damage or loss to the computer or its data. 

The case against Nosal involved his former employment at an executive search firm where, after he left, he convinced some former colleagues still at the company to help him start a competing business, including by accessing and providing Nosal information from a confidential database at the firm.  While these cohorts were authorized to access their employer’s database generally, it had a policy barring disclosure of confidential information, leading to CFAA charges against Nosal for aiding and abetting the former colleagues in “exceeding authorized access” to the search firm’s computer.

The question thus became whether the CFAA’s “exceeds authorized access” language refers (as Nosal argued) to someone who has been authorized to access only certain data or files but accesses other, unauthorized data or files – what is colloquially known as “hacking” – or (as the government argued) someone who has unrestricted physical access to data or files, but is limited in the use to which he can put them.  After the trial court ultimately answered this question in Nosal’s favor, while the 3-judge appellate panel ruled for the government, on rehearing en banc, the 9th Circuit adopted the narrower interpretation, and affirmed dismissal of the CFAA charges.

The en banc decision started with the statutory definition of “exceeds authorized access,” which the CFAA defines as “to access a computer with authorization and use such access to obtain or alter information [to which] the accesser is not entitled.”  Noting that it is more sensible to read “entitled” as a synonym for “authorized,” the court determined that “exceeds authorized access” must refer to data or files on a computer that one is not authorized to access, rather than any later use to which they are put.  This is consistent, the court held, with the fact that Congress enacted the CFAA primarily to address computer hacking, while the broad interpretation favored by the government would vastly expand its scope to criminalize any unauthorized use of information obtained from a computer.  As the court went on to explain:

This would make criminals of large groups of people who would have little reason to suspect they are committing a federal crime. While ignorance of the law is no excuse, we can properly be skeptical as to whether Congress, in 1984, meant to criminalize conduct beyond that which is inherently wrongful, such as breaking into a computer.

Rather, the en banc decision stated, “If Congress wants to incorporate misappropriation liability into the CFAA, it must speak more clearly.”  The court bolstered its determination by noting it also is supported by the rule that courts will “construe a statute as displacing a substantial portion of the common law only where Congress has clearly indicated its intent to do so.”
Thus, because Nosal's accomplices had permission to access the company database and obtain the information within, the CFAA charges failed to meet the “without authorization, or exceeds authorized access” element and were properly dismissed.  However, the en banc decision held, significantly, that its construction of “exceeds authorized access” would apply to all uses of that term in the statute, noting that the phrase appears five times in the first seven subsections.  In doing so, it rejected the government’s suggestion that the interpretation would apply only to the provision Nosal was charged with violating, which involved knowingly accessing a computer in excess of authorization with intent to defraud and thereby furthering the fraud and obtaining something of value.
The court also noted that its decision departed from broader interpretations of “exceeds authorized access” adopted by the Fifth, Seventh, and Eleventh Circuits, which the en banc Ninth Circuit urged to reconsider their approach.  This split among the Circuits makes it more likely that the Supreme Court would agree to review the Nosal decision, making it an important case to watch as the time for the government to seek such review begins to wind down.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Davis Wright Tremaine LLP | Attorney Advertising

Written by:

Davis Wright Tremaine LLP

Davis Wright Tremaine LLP on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
Privacy Policy (Updated: October 8, 2015):

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.


JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.