Bruce et al v. McDonald et al

Filing 69

OPINION: Summary Judgment will be entered in favor of Mr. McDonald, Attorney McKoon, and Attorney Thomas and her law firm and against the Bruces as further set out in the opinion. An appropriate judgment will be entered. Signed by Honorable Judge Myron H. Thompson on 3/10/2014. (dmn, )

Download PDF
IN THE DISTRICT COURT OF THE UNITED STATES FOR THE MIDDLE DISTRICT OF ALABAMA, EASTERN DIVISION MICHAEL BRUCE, an individual; and TANYA BRUCE, an individual, ) ) ) ) ) ) ) ) ) ) ) ) Plaintiffs, v. JOSHUA McDONALD, an individual; et al., Defendants. CIVIL ACTION NO. 3:13cv221-MHT (WO) OPINION Plaintiffs Michael and Tanya Bruce filed this lawsuit against defendants Joshua McDonald, James R. McKoon, Jr., and Melissa B. interception, Thomas and disclosure, her and law firm, asserting use of electronic communications in violation of the Wiretap Act of 1968, as amended, 18 U.S.C. § 2511. Jurisdiction is proper under 28 U.S.C. § 1331 (federal question). Currently pending before the court are the parties’ various crossmotions concludes for summary that there judgment. has been Because no the court “interception” as required under § 2511, summary judgment will be entered in favor of the defendants and against the plaintiffs. I. SUMMARY-JUDGMENT STANDARD “A party may move for summary judgment, identifying each claim or defense--or the part of each claim or defense--on which summary judgment is sought. The court shall grant summary judgment if the movant shows that there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(a). The court must view the admissible evidence in the light most favorable to the non-moving party and draw all reasonable inferences in favor of that party. Matsushita Elec. Indus. Co. Ltd. v. Zenith Radio Corp., 475 U.S. 574, 587 (1986). II. BACKGROUND This case, like so many civil suits alleging the unauthorized access of personal electronic information, 2 arises out of a contentions divorce and child-custody dispute. Tanya Bruce and Joshua McDonald used to be married.1 They were separated in 2009 and divorced in 2010. At that time, they were awarded evenly split custody of their only child. Mrs. Bruce began dating and later married Michael Bruce. At issue in this case is Mr. McDonald’s access to three electronic accounts: first, Mrs. Bruce’s individual email account hosted by Yahoo.com; second, the joint email account the Bruces shared; and third, a joint account the Bruces shared on a website called “Adult Friend Finder” (or “AFF”). Mr. McDonald first gained access to Mrs. Bruce’s individual Yahoo account. There is some dispute about how, exactly, Mr. McDonald did so. evidence that Mrs. Bruce may The record contains have logged into her individual account on Mr. McDonald’s computer and failed 1. Mrs. Bruce’s prior married name was Tanya McDonald. She initially filed this lawsuit under that name, but with the parties’ consent the docket was amended to reflect her new married name. 3 to log out; or that Mr. McDonald may have observed her enter her password for that account; or that Mrs. Bruce may have given Mr. McDonald the login information for that account on one occasion for the limited purpose of printing tickets for a joint activity with their child.2 In any event, Mr. McDonald has acknowledged that he had no permission individual to read account, printing the tickets. the with emails the in possible Mrs. Bruce’s exception of Dep. of Joshua McDonald (Doc. No. 45-12) at 49. Mr. McDonald later also gained access to the joint Yahoo account and the AFF account. He located an email from Mr. Bruce to Mrs. Bruce, in her individual account, which contained their joint AFF login information. He used that information to access private messages in the AFF system (which functions in a similar way as email, but only among AFF users). Id. at 71-72, 75-77. The 2. There is no allegation that Mr. McDonald used a key-logging program or any similar means of gaining the login information. A professional examination of the Bruces’ computers found no improper software. 4 record does not clearly indicate how Mr. McDonald gained access to the joint Yahoo account. However, that he accessed all three accounts is clear because he printed out hundreds of pages of emails and documents from the three accounts. See, e.g., Emails (Doc. No. 45-18); id. (Doc. No. 45-19) at 10-12; AFF Documents (Doc. No. 45-21) at 92; id. (Doc. No. 45-22) at 59-74. The documents Mr. McDonald obtained and printed relate to mostly the Bruces’, within their committed relationship, engaging in sexual conduct with other individuals, commonly referred to as “swinging.” documents and photos are very sexually explicit. The A packet of the documents was anonymously sent to the Alabama Board of Pharmacy and allegedly played a role in adverse license. 20. action regarding Mrs. Bruce’s pharmacist’s See Dep. of Tanya Bruce (Doc. No. 45-5) at 119- The Bruces believe that Mr. McDonald sent the packet and also that information about their sexual lifestyle was disclosed to other individuals, 5 including Mr. McDonald’s co-workers and current wife; the defendants dispute this. It is, however, undisputed that Mr. McDonald provided copies of all the documents to his attorney in the child-custody case, Melissa B. Thomas, who is the principal of the Thomas law firm. Ms. Thomas, in turn, engaged another attorney, James R. McKoon, Jr., as co-counsel. The attorneys concluded that they could lawfully use that evidence in the custody case. Ms. Thomas produced the documents to Mrs. Bruce’s counsel in discovery in the state matter. The parties obtained a protective order from the state-court judge governing the use of the documents. Ms. Thomas marked and referred to some of the documents as exhibits at Mrs. Bruce’s deposition in that case and alluded to the information contained in them in argument to the state judge; she may have also disclosed them to the mediator during the course of mediation. parties reached a new agreement as to custody. The This agreement resulted in increased custody time for Mr. 6 McDonald, specific limitations on Mrs. Bruce’s sexual activities, and other terms benefitting Mr. McDonald. The Bruces then brought this lawsuit, alleging that Mr. McDonald illegally intercepted their electronic communications and that Mr. McDonald, Attorney McKoon, and Attorney Thomas and her law firm illegally disclosed and used those communications. All parties seek summary judgment on all the claims. III. DISCUSSION In 1986, Congress amended the Wiretap Act of 1968 to protect electronic communications as well as traditional wire communications amended by Title (such I of as the telephone Electronic calls).3 As Communications Privacy Act of 1986, Pub. L. No. 99–508, 100 Stat. 1848 (1986), the Wiretap Act now imposes criminal and civil liability on any person who “intentionally intercepts ... any ... electronic communication.” 18 U.S.C. 3. The Act is formally known as Title III of the Omnibus Crime Control and Safe Streets Act of 1968. 7 § 2511(1)(a). any § person The Wiretap Act also imposes liability on who 2511(1)(c), “intentionally or discloses,” “intentionally uses,” 18 18 U.S.C. U.S.C. § 2511(1)(d), the contents of an electronic communication “knowing or having reason to know” the communication was intercepted in violation the Wiretap Act. Thus, “interception” is a necessary element for each type of violation. The Bruces have alleged violations of all three sections. In essence, they argue that Mr. McDonald “intercepted” their personal emails and AFF messages by logging into authorization. the three accounts without their The defendants all argue that there has been no interception within the meaning of the Wiretap Act. The court agrees with the defendants. The Wiretap Act defines “intercept” broadly, as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” 8 18 U.S.C. § 2510(4). However, the Eleventh Circuit Court of Appeals has adopted a “narrow reading” of “interception” in the context of electronic communications. United States v. Steiger, 318 F.3d 1039, 1050 (11th Cir. 2003). In the Steiger, appellate court concluded that to constitute an interception, the electronic communications must have been acquired “contemporaneously with their transmission.” Id. at 1049; see also id. at 1048-49 (“we hold contemporaneous that a interception--i.e., an acquisition during ‘flight’--is required to implicate the Wiretap Act with respect to electronic communications”). In Steiger, a criminal case, the court rejected a motion to suppress certain documents and information a hacker had obtained without permission from the defendant’s computer and subsequently had provided to the police.4 Applying the “contemporaneous” test to those 4. The Wiretap Act is implicated in a variety of cases: civil litigation for damages under the Act, such as this case; criminal charges for violations of the Act; and motions to suppress evidence obtained by the government in other kinds of criminal cases pursuant to (continued...) 9 facts, the court found no interception: “In this case, there is nothing to suggest that any of the information provided [by the hacker] was obtained through contemporaneous acquisition of electronic communications while in flight. Rather, the evidence shows that the source used a Trojan Horse virus that enabled him to access and download information stored on Steiger’s personal computer. This conduct, while possibly tortious, does not constitute an interception of electronic communications in violation of the Wiretap Act.” Id. at 1050. The Bruces argue that Steiger distinguishable from the instant case. is factually In this case, they note, Mr. McDonald was not accessing files stored on the Bruces’ computers, but was repeatedly accessing their web-based email and AFF accounts over an extended period of time. The Bruces point to three out-of-circuit cases, along with dicta in Steiger, to support their view that this conduct is enough to establish “interception.” 4(...continued) the Act’s suppression provision, 18 U.S.C. § 2515. 10 The strongest support for the Bruces’ position comes from United States v. Szymuszkiewicz, 622 F.3d 701, 706 (7th Cir. 2010). In Szymuszkiewicz, the Seventh Circuit Court of Appeals upheld the defendant’s conviction under the “interception” provision of the Wiretap Act for setting up a process whereby the defendant’s supervisor’s emails were automatically forwarded to the defendant’s email account for an extended period of time. The defendant had argued that there was no “interception” because the forwarding happened only after each email arrived in the supervisor’s inbox. The court found, first, that the jury could have concluded, as a factual matter, that indicated this that was the not email so; indeed, server, the rather evidence than supervisor’s computer, duplicated each message. the But the court went on to find that even if the supervisor’s computer did copy each message, that would not change the outcome of the case: “Either the server in Kansas City or [the supervisor’s] computer made copies 11 of the messages for Szymuszkiewicz within a second of each message’s arrival and assembly; if both Szymuszkiewicz and [the supervisor] were sitting at their computers at the same time, they would have received each message with no more than an eyeblink in between. That’s contemporaneous by any standard.” Id. at 706. The Bruces argue that, because Mr. McDonald had access to the email accounts on a continuous basis, he could have viewed any given message sent or received by those accounts as soon as it hit the inbox (or the sentmail folder). McDonald] and Thus, [Mrs. hypothetically, Bruce] were “if both sitting at [Mr. their computers at the same time, they would have received each message with no more than an eyeblink in between.” Id. But this argument ignores the critical distinction: in Szymuszkiewicz, actually was the evidence forwarded to showed the that each defendant’s contemporaneously with its transmission. email account In this case, the Bruces argue that Mr. McDonald had access to the 12 accounts and could have accessed some particular email contemporaneously with transmission. But there is no evidence in the record to indicate that he ever actually did so. Cf. Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548, 557 (S.D.N.Y. 2008) (Katz, J.) (“[T]here is no evidence that the ... e-mails were intercepted at the same time that they were delivered. Rather, the evidence indicates that Brenner periodically accessed Fell’s e-mail accounts and printed e-mails after they had been delivered.”). The Bruces also point to dicta in Steiger, which in turn was a quotation from a law review article, suggesting that “‘a duplicate of all of an employee’s messages [being] automatically sent to the employee’s boss’” would constitute interception. at 1050 (quoting Jarrod J. White, Steiger, 318 F.3d E–Mail @Work.com: Employer Monitoring of Employee E–Mail, 48 Ala. L. Rev. 1079, 1083 (1997)) (alteration in original). Unfortunately for the Bruces, the full quotation points 13 to exactly the distinction between actual forwarding and mere access described above: “‘[T]here is only a narrow window during which an E-mail interception may occur--the seconds or mili-seconds before which a newly composed message is saved to any temporary location following a send command. Therefore, unless some type of automatic routing software is used (for example, a duplicate of all of an employee's messages are automatically sent to the employee's boss), interception of E-mail within the prohibition of [the Wiretap Act] is virtually impossible.’” Id. (alternation in original, emphasis added). In other words, even assuming that the Eleventh Circuit really intended to endorse the particular scenario described in the law review article as an instance of interception, that scenario explicitly contemplated actual automatic forwarding, such as was the case in Szymuszkiewicz, not mere access, as is the case here. The other cases to which the Bruces cite are even less persuasive. In re Pharmatrak, Inc., 329 F.3d 9, 22 (1st Cir. 2003), involved code implanted on the computers 14 of visitors to pharmacy websites that “automatically duplicated” information and sent it to the defendant, a third-party marketing firm, as well as the pharmacies. The court found interception, in part by analogy to the email forwarding example in Steiger. Because the duplication in Pharmatrak, like the forwarding rule in Szymuszkiewicz, was automatically contemporaneous, it is likewise distinguishable from this case. Finally, the Bruces point to a footnote in Hall v. EarthLink Network, Inc., 396 F.3d 500, 503 n.1 (2d Cir. 2005). In that case, the plaintiff had sued his internet service provider under the Wiretap Act for having continued to receive emails sent to his email address after the provider had cancelled his account. The court held that the provider was exempt from liability under a statutory exception for conduct by such a provider in the ordinary course of its business; this obviously not at issue in the instant case. exception is In the cited footnote, the court in dicta rejected a separate argument 15 made by the provider that an interception could occur only while messages were in transit. The court noted that this argument failed because the allegation in that case was of continued receipt of messages rather than acquisition of stored messages. This court is admittedly somewhat perplexed by the phrasing of this footnote, but in any event the difference between that case and this one is clear: for each message the provider continued to receive, it received actually contemporaneously to its transmission. Hall court had found an that message Thus, even if the interception under those circumstances, which it did not, that case would not imply that an interception exists here. On the contrary, in a consistent string of cases courts have held time and again that unauthorized access to an email account, standing alone, does not constitute interception. See Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 114 (3d Cir. 2003) (no interception where company searched employee’s email without authorization); 16 Global Policy Partners, LLC v. Yessin, 686 F. Supp. 2d 631, 639 (E.D. Va. 2009) (Ellis, J.) (allegations that husband accessed authorization wife’s email insufficient to account state without claim of interception); Pure Power Boot Camp, 587 F. Supp. 2d at 558 (no interception where ex-employer accessed three of ex-employee’s personal, web-based email accounts without authorization); Cardinal Health 414, Inc. v. Adams, 582 F. Supp. 2d 967, 981 (M.D. Tenn. 2008) (Trauger, J.) (continued access of work email system by ex-employee not interception); Bailey v. Bailey, 2008 WL 324156 (E.D. Mich. 2008) (Cox, J.) (no interception where husband accessed wife’s web-based email accounts without authorization). Indeed, one of those cases, Bailey, echos this case in nearly every respect. obtained his wife’s The defendant in that case had login information without any authorization, through the use of a device that logs every keystroke on a computer. 17 He then monitored her web-based email addresses for months, eventually sharing information he obtained from her accounts with his attorney in child-custody proceedings. The attorney used the information during the course of those proceedings. The plaintiff lost custody and thereafter sued both her ex-husband and his attorney under the Wiretap Act. Despite continuous access to the accounts, the Bailey court’s conclusion was clear: “Defendant Bailey did not obtain the emails or messages contemporaneously with their transmission, and thus, the Wiretap Act does not apply.” Bailey, 2008 WL 324156 at * 5. The court finds this long and consistent string of cases entirely persuasive. The Eleventh Circuit has adopted a construction of “interception” requiring that electronic communications must be contemporaneously with their transmission. acquired Logging into and acquiring messages from another individual’s email account does not necessarily happen contemporaneously with their transmission. Rather, 18 it almost always happens after the transmission of those messages, whether by minutes or by days or by years. Thus the cases cited above which found no interception in the case of email access are entirely consistent with the cases the Bruces cite finding duplication. interception in For latter in the case of cases, automatic but not necessarily in the former, there was evidence of actual acquisition contemporaneous with transmission. This is not to say that mere access, without some duplication device, could never amount to interception. If the Bruces could establish that Mr. McDonald had actually acquired even one message contemporaneously with its transmission, interception. they might be able to show That question is not before the court because there is simply no such evidence in this case.5 5. Nor is there any evidence that Mr. McDonald acquired any particular message before Mrs. Bruce had read that same message. Thus the court need not reach the question of whether that conduct, if proven would constitute interception. Cf. Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 460 (5th Cir. 1994) (finding that seizure of still-unread messages on (continued...) 19 “Rather, the evidence indicates that [Mr. McDonald] periodically accessed [the] accounts and printed e-mails [and other documents] after they had been delivered.” Pure Power Boot Camp, 587 F. Supp. 2d at 557.6 That is insufficient to establish an interception. The defendants have raised a number of arguments against liability in this case.7 because the court has determined that there other However, was no 5(...continued) electronic bulletin board was not an interception). 6. The court also need not reach the question of whether Mr. McDonald’s conduct was “tortious,” Steiger, 318 F.3d at 1050, or violated Title II of the Electronic Communications Privacy Act, also known as the Stored Communications Act. See 18 U.S.C. § 2701. The Bruces have asserted no claims apart from those under the Wiretap Act. 7. Specifically, some or all of the defendants raise the following arguments, among others: the Wiretap Act’s statute of limitations, 18 U.S.C. § 2520(e); that this case is foreclosed by the settlement agreement in the custody matter; and that any use in court was sanctioned by the state court’s protective order. The parties agree that an additional argument, based on Rooker/Feldman doctrine, is now moot. 20 interception within the meaning of the Wiretap Act, it need not reach these other issues. *** Accordingly, for the above reasons, summary judgment will be entered in favor of Mr. McDonald, Attorney McKoon, and Attorney Thomas and her law firm and against the Bruces. An appropriate judgment will be entered. DONE, this the 10th day of March, 2014. /s/ Myron H. Thompson UNITED STATES DISTRICT JUDGE

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?