American Health Inc. et al v Chevere et al.

Filing 147

OPINION AND ORDER granting 124 motion for summary judgment; denying 125 motion for summary judgment; finding as moot 132 Motion to Strike. Judgment shall be entered accordingly. Signed by Judge Juan M. Perez-Gimenez on 12/22/2017. (PMA)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF PUERTO RICO AMERICAN HEALTH, INC., et al. Plaintiffs, CIV. NO. 12-1678(PG) v. DR. SERGIO CHEVERE, et al. Defendant. OPINION AND ORDER Before the court are defendant Dr. Sergio Chevere’s (“defendant”) 1, and plaintiffs American Health, Inc. (“AHI”), Socios Mayores en Salud, Inc., and Socios Mayores en Salud Holding, Inc.’s (collectively, “plaintiffs”) cross-motions for summary judgment, and both parties’ responses thereto. See Docket Nos. 124, 125, 128 and 129. For the reasons specified below, summary judgment is GRANTED for defendant. Plaintiffs’ motion for summary judgment is accordingly DENIED. I. FACTUAL BACKGROUND Defendant was a high-ranking employee at AHI and later worked for plaintiffs as a consultant. See Docket No.126 Plaintiffs’ Statement of Uncontested Material Facts (“PSUMF”) ¶¶ 4, 16 and 17. Between May 12 and May 14, 2012, defendant forwarded fifty-four e-mails from his business email account to his personal e-mail account. See PSUMF ¶ 25. The business e-mail account was held in plaintiffs’ private servers. See PSUMF ¶¶ 14 and 26. The forwarded e-mails had remained opened in defendant’s business email account inbox before defendant forwarded the same to his personal account. See Docket No. 126-5 (Plaintiff’s Exhibit E) at page 12. Defendant did not cause damage to or erase data from plaintiffs’ computer systems. See Docket No.124-3 Defendant’s Statement of Uncontested Material Facts ¶ 37. Plaintiffs claim the fifty-four e-mails contained confidential and proprietary information, but the court will make no findings of fact to that regard because such a finding would be immaterial to resolving the controversy before this court. 1 Iraida del Rio and the Conjugal Partnership Chevere-Del Rio are also named as co-defendants. Page 2 Civ. No. 12-1678 (PG) Plaintiffs filed suit on August 20, 2012. They claim to have spent $178,568.73 from July 31, 2012 to March 31, 2016 in the litigation of the above-captioned case. See PSUMF ¶ 62. They submit to this court proof of billings payable to the law firm Casellas, Alcover & Burgos P.S.C. for legal fees in that exact amount. See Docket No. 126-9 (Plaintiff’s Exhibit I). See also Docket No. 16-1. Plaintiffs claim that defendant misappropriated proprietary and confidential information, in violation of federal and state law. Both parties now move for summary judgment in their favor. II. STANDARD Through summary judgment, courts “pierce the boilerplate of the pleadings and assay the parties’ proof in order to determine whether trial is actually required.” Wynne v. Tufts Univ. Sch. of Med., 976 F.2d 791, 794 (1st Cir. 1992). The Supreme Court encourages employing summary judgment in federal courts - it “[avoids] full blown trials in unwinnable cases, … [conserves] parties’ time and money, and [permits] the court to husband scarce judicial resources.” McCarthy v. Northwest Airlines, Inc., 56 F.3d 313, 314 (1st Cir. 1995). See also Celotex Corp. v. Catrett, 477 U.S. 317 (1986). A court may grant summary judgment only when the pleadings and the evidence demonstrate that “there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(a). See also Sands v. Ridefilm Corp., 212 F.3d 657, 660 (1st Cir. 2000). A factual dispute is “genuine” if it could be resolved in favor of either party, and “material” if it potentially affects the outcome of the case. See Calero-Cerezo v. U.S. Dep’t of Justice, 355 F.3d 6, 19 (1st Cir. 2004). The court must review the record “taken as a whole,” and “may not make credibility determinations or weigh the evidence.” Reeves v. Anderson Plumbing Productions Inc., 530 U.S. 133, 135 (2000). Credibility determinations, the weighing of the evidence, and the drawing of legitimate inferences from the facts are functions of a jury, not of a judge. See id. Page 3 Civ. No. 12-1678 (PG) In short, when there is a genuine dispute as to any material fact, and when a court would be required to make credibility determinations, weigh the evidence, or draw legitimate inferences from the facts in order to adjudicate a controversy, summary judgment will not be granted. While no legitimate inferences can be drawn, the court will construe all reasonable inferences in favor of the nonmoving party. See Stoutt v. Banco Popular de Puerto Rico, 158 F. Supp. 2d 167, 171 (D.P.R. 2001). Still, the nonmoving party is required to demonstrate “through submissions of evidentiary quality that a trial worthy issue persists.” Iverson v. City of Boston, 452 F.3d 94, 108 (1st Cir. 2006). III. DISCUSSION A. The Mise-En-Scène: An Overview of Malicious Cyber Acts and Plaintiffs’ Claims Cyber technologies are a minefield of technical nuances. Naturally, the legal landscape that affects cyberspace can be seemingly riddled with gray areas and be difficult to navigate. Before jumping into the proverbial Minotaur’s maze, the court will, for clarity’s sake, consider some introductory notes on malicious cyber acts. It is well-settled that malicious cyber acts can lead to civil liability and criminal prosecution. Indeed, criminal enterprises, malign actors, and those seeking to gain unfair advantages in their ventures increasingly turn to cyberspace to carry out or facilitate malicious acts. Put plainly, malicious cyber acts consist of the use of computer driven technologies to commit malicious acts. They can be parceled into three distinct categories: (1) acts in which a computer is the target of the malicious activity, (2) acts in which a computer is used as a tool that is essential for the malicious activity, and (3) acts in which the use of a computer is incidental to the malicious activity. These distinctions are important when applying the law to malicious cyber acts. The court will discuss the first and second categories in more detail, insofar as the latter is immaterial to the issue at hand. Page 4 Civ. No. 12-1678 (PG) Acts in the first category, in which a computer is the target, can ordinarily only exist in cyberspace (e.g. hacking and distributed denial of service attacks). They are an entirely “new” breed of malicious activity. Traditional statutes are often ill-fitted or otherwise insufficient to carry civil claims and criminal prosecutions addressing malicious cyber acts of this sort. Thus, to properly make malicious cyber acts that fall into the first category actionable, specialized statutes that specifically target conduct in cyberspace are necessary. On the other hand, acts in the second category, in which a computer is an essential tool, are mostly age-old malicious acts (e.g. fraud and theft) being committed in new ways. They are, in that sense, “old wine in new bottles.” Take, for example, a fraud committed in cyberspace and one committed in the physical world: both are fraud, but only the former is a malicious cyber act. They are different in that a computer was used as an essential tool in one but not in the other. A malicious cyber act falling into the second category can be properly addressed through a traditional statute, though specialized legislation could nonetheless streamline litigation or prescribe particular remedies. That is to say, while Congress could very well choose to enact legislation that specifically targets, say, instances of fraud committed through the use of a computer, traditional statutes addressing fraud could be perfectly adequate to carry the day.2 In the case at hand, plaintiffs allege that defendant engaged in the illegal misappropriation of confidential information. Such conduct would fall squarely within the second category of malicious cyber acts (i.e. acts in which a computer is used as a tool that is essential for the malicious activity). Hence, traditional laws may be more suitable conduits for plaintiffs legal action, rather than statutes that specifically target malicious cyber acts. In fact, Congress may well have intended such conduct to remain codified under traditional laws. 2 The previous paragraphs paraphrase Chapter 2 of Ralph D. Clifford’s Cybercrime: The Investigation, Prosecution and Defense of a Computer Related Crime. See Ralph D. Clifford, Cybercrime: The Investigation, Prosecution and Defense of a Computer Related Crime 15-20 (2011). Page 5 Civ. No. 12-1678 (PG) Plaintiffs set forth three federal question claims, pursuant to the Computer Fraud and Abuse Act (CFAA), the Wiretap Act, and the Stored Electronic Communications Act (SECA). These three statutes are not catchall nets for malicious cyber acts. Instead, they target specific forms of conduct in cyberspace, under specific circumstances. For the reasons stated below, the court finds that defendant’s alleged misappropriation of confidential information falls outside the purview of the CFAA, the Wiretap Act, and the SECA. Instead, the court finds that the remedies plaintiffs request are more properly sought under state law. In addition to the federal causes of action, plaintiffs also raised supplemental claims under Puerto Rico’s Industrial and Trade Secret Protection Act, as well as claims of breach of contract, breach of duty of loyalty, breach of implied contractual and legal duty, and conversion, all pursuant to Puerto Rico’s Civil Code. These claims find their way to federal court through supplemental jurisdiction, on the back of plaintiffs’ federal question claims. B. A Chink in the Armor: The Computer Fraud and Abuse Act Plaintiffs claim that defendant’s alleged misappropriation of confidential information violates the CFAA. However, plaintiffs fail to cross the statutory damage threshold. The CFAA proscribes that whoever “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value … shall be punished.” 18 U.S.C. § 1030(a)(4). However, a civil claim can only be raised when the plaintiff suffers damage or loss amounting to $5,000 or more. See 18 U.S.C. § 1030(g). Here, plaintiffs did not. The CFAA defines the term damage narrowly. Damage “means any impairment to the integrity or availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). Certainly, the CFAA’s definition of damage “does not encompass any harm resulting from the disclosure to a competitor of trade secrets or other confidential information.” Sun W. Page 6 Civ. No. 12-1678 (PG) Mortg. Co., Inc. v. Matos Flores, No. CV 15-1082 (GAG), 2016 WL 1030074, at *4 (D.P.R. Mar. 10, 2016). In fact, damages under the CFAA are restricted to “the destruction, corruption, or deletion of electronic files, the physical destruction of a hard drive, or any diminution to the completeness of the system.” New South Equip. Mats, LLC v. Keener, 989 F.Supp. 2d 522, 529 (S.D.Miss. 2013). It is patently clear that, while defendant may have acquired confidential information without plaintiffs’ authorization, plaintiffs did not suffer any damage, as defined by the CFAA, because of the intrusion. It is uncontested that defendant caused no impairment to the integrity or availability of the data. No electronic files were destroyed, corrupted or deleted, nor was the completeness of the system diminished in any way. Plaintiffs now hope to reach the threshold amount only by showing they suffered loss. They claim that “the evidence … establishes that to (1) assess the extent of Chevere’s violation, (2) take remedial measures, and (3) prosecute this case AHI has incurred expenses to the tune of $178,568.73 since the inception of the case.” Docket No. 128 at page 14. In the context of the CFAA, loss means any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service. 18 U.S.C. § 1030(e)(11). “Although the First Circuit Court of Appeals has held that the CFAA does not restrict ‘loss’ under the statute to purely physical damage, nothing in the statute suggests that the alleged loss or costs can be for matters unrelated to the computer.” Padmanabhan v. Healey, 159 F. Supp. 3d 220, 224 (D. Mass. 2016), aff’d, No. 16-1159, 2017 WL 3404402 (1st Cir. Jan. 4, 2017) (citing EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 584 (1st Cir.2001); Shirokov v. Dunlap, Grubb & Weaver, PLLC, 2012 WL 1065578, at *24 (D. Mass. Mar. 27, 2012)). Following the aforementioned case law, costs incurred in conducting a damage assessment and repairing a damaged computer system count towards determining loss under the CFAA. The time spent by employees assessing Civ. No. 12-1678 (PG) Page 7 damage to or fixing a computer system also constitutes loss. However, the time spent by employees not carrying out tasks specific to the computer does not (such as a meeting to determine whether to file suit because of an intrusion). See Wilson v. Moreau, 440 F.Supp. 2d 81, 109 (D.R.I. 2006), aff’d, 492 F.3d 50 (1st Cir. 2007). Legal fees incurred by a plaintiff similarly cannot be used to satisfy the $5,000 threshold. See Wilson, 440 F.Supp. 2d 110. In short, loss encompasses costs incurred only when directly related to the computer and revenues lost due to an interruption of service. The record evinces that plaintiffs have indeed spent $178,568.73 since the “inception of this case.” Docket No. 128 at page 14. However, this amount accounts entirely for legal fees paid to the law firm that represents them in this case. See PSUMF ¶ 62 (“AHI has incurred expenses to the tune of $178,568.73 related to legal fees and costs in connection with its representation…”). As evidentiary support to satisfy the $5,000 statutory threshold amount, plaintiffs only submitted to the court proof of the fees they paid (and owe) to the representing law firm. See Docket No. 126-9 (Plaintiff’s Exhibit I). See also Docket No. 16-1. As previously stated, costs incurred by plaintiffs due to legal fees do not constitute loss in the context of the CFAA. See Wilson, 440 F.Supp. 2d 110. The factual record plaintiffs submitted is devoid of other showings of loss that would push plaintiffs’ claim over the statutory threshold amount. As such, plaintiffs’ claim necessarily fails. Some courts have held that “loss of confidential and proprietary information for the benefit of defendants’ competing enterprise” constitutes loss in the context of the CFAA. Res. Ctr. for Indep. Living, Inc. v. Ability Res., Inc., 534 F.Supp. 2d 1204, 1211 (D.Kan.2008). See also Meats by Linz, Inc. v. Dear, 2011 WL 1515028 at *3 (N.D. Tex. Apr. 20, 2011). Other courts, including district courts in the First Circuit, have made a more restrictive reading of the statute, holding instead that such loss does not count towards the CFAA’s statutory threshold. See Wilson, 440 F.Supp. 2d 110 (“revenues lost due to the unfair business competition resulting from the hacked confidential information did not count towards the ‘loss’ requirement”)”. See also Sun W. Mortg. Co., Inc. v. Matos Flores, Page 8 Civ. No. 12-1678 (PG) No. CV 15-1082 (GAG), 2016 WL 1030074, at *4 (D.P.R. Mar. 10, 2016); Nexans Wires S.A. v. Sark-USA, Inc., 319 F.Supp.2d 468, 471-477 (S.D.N.Y. 2004). The First Circuit Court of Appeals has yet to face the question squarely. In any event, the court agrees with its sister court in Rhode Island: the use of confidential and proprietary information to the detriment of the plaintiff does not constitute loss in the context of the CFAA. See Wilson, 440 F.Supp. 2d 110. At any rate, the court need not reach that question because plaintiffs have failed to show that they suffered any injury due to the alleged misappropriation of confidential information. In fact, plaintiffs themselves rightly observe: “The only reason [defendant] can claim that he did not use AHI’s confidential and proprietary information to the detriment of AHI, was because AHI moved quickly to enjoin him from using and disclosing such information to third parties.” Docket No. 128 at page 8. In light of that concession, and of the absence of any showing of materialized damages, plaintiffs’ CFAA claim is nothing short of an oxymoron. The court is bewildered that plaintiffs affirm to have suffered grave injury while conceding they dodged the bullet thanks to their swift action. Plaintiffs cannot have their cake and eat it too. Because plaintiffs have failed to establish damage or loss amounting to $5,000, their CFAA claim necessarily fails, and defendant is entitled to summary judgment as a matter of law. No material facts relevant to the adjudication of this claim remain in question. Thus, plaintiffs’ claim is DISMISSED WITH PREJUDICE. C. Leaning on a Broken Reed: The Wiretap Act Next, plaintiffs sustain that defendants violated the Wiretap Act. However, their reliance on this statute is wholly misguided. The alleged misconduct does not fall within the purview of the Wiretap Act. The Wiretap Act punishes anyone who “intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication.” 18 U.S.C.A. § 2511(1)(a). The statute provides for a civil cause of action. The Wiretap Act defines intercept as “the aural or other acquisition of the Page 9 Civ. No. 12-1678 (PG) contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” 18 U.S.C. § 2510(4). Electronic communication “means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce… .” 18 U.S.C. § 2510(12). The transfer of an e-mail, thus, would constitute an electronic communication. It is not unlawful “for a person not acting under color of law to intercept a wire, oral, or electronic communication where such person is a party to the communication…” 18 U.S.C. 2511(d). However, the interception violates the Wiretap Act, despite the person being a party to the communication, when “for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State.” Id. Thus, even if defendant was the recipient of the e-mails in question, he could still have violated the Wiretap Act if he forwarded the e-mails with the purpose of committing a criminal or tortious act – a question that is, at this point, very much in dispute. The First Circuit Court of Appeals has not yet decided whether the Wiretap Act requires that an interception occur contemporaneously to the transmission of the electronic communication. Today, this court faces that issue head-on, where here (a) defendant forwarded the e-mails in question after transmission of the electronic communications had been completed and transit concluded, (b) the communications had been opened by the intended recipient, and (c) had remained opened in his inbox for some time. “The Fifth Circuit and several others have approved the judicial definition of ‘intercept’ as acquisition contemporaneous with transmission.” TLS Mgmt. & Mktg. Servs. LLC v. Rodriguez-Toledo, No. CV 152121 (BJM), 2017 WL 3242244, at *4 (D.P.R. July 28, 2017)(citing Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir. 2002); Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457 (5th Cir. 1994)). “These circuits have distinguished between materials acquired in transit, which are interceptions, and those acquired from storage, which purportedly Civ. No. 12-1678 (PG) Page 10 are not.” In re Pharmatrak, Inc., 329 F.3d 9, 21 (1st Cir. 2003)(citing Konop, 302 F.3d at 878). While caselaw from other circuits is not controlling here, it is certainly persuasive. Thus, following these decisions, this court agrees that: the interception must occur while the communication is transmitted, or the conduct may fall instead under the provisions of the Stored Wire and Electronic Communications Act, which prohibits access and disclosure of information stored electronically. However, it is difficult to determine when a communication is “in transit” because electronic communications, such as e-mails or voice-mails, are only transmitted for milliseconds and stored on different servers as they are routed. Ralph D. Clifford, Cybercrime: The Investigation, Prosecution and Defense of a Computer Related Crime 215 (2011). 3 This finding disposes of plaintiffs’ Wiretap Act claim. The e-mails in question had been delivered, opened by the recipient, and stored in the recipient’s inbox for some time until they were accessed and forwarded by defendant. Thus, it is patently obvious to this court that the communications were no longer “in transit,” but had rather “crossed the finish line of transmission.” Accordingly, the alleged “interceptions” did not occur contemporaneously to the transmission of the original e-mail messages. Their subsequent forwarding, which is the object of defendant’s alleged breach, does not fall under the purview of this particular act. In short, this court finds that the acquisition of an electronic communication must occur contemporaneously to the transmission thereof in order to constitute an interception within the context of the Wiretap Act. Defendant allegedly acquired the electronic messages in question to his 3 In Councilman, the First Circuit of Appeals faced the question of whether an e-mail was an electronic communication when stored temporarily in a server that acts merely as a conduit for routing the e-mail to its final destination. Ruling en banc, the Court decided that “the term ‘electronic communication’ includes transient electronic storage that is intrinsic to the communication process for such communications.” U.S. v. Councilman, 418 F.3d 67, 79 (1st Cir.2005). But, given that neither the facts nor the arguments presented in Councilman “invite[d] consideration of either the existence or the applicability of a contemporaneity or real-time requirement” the Court did “not plunge into that morass.” Councilman, 418 F.3d 80. Here, the court cannot side-step considering the existence of a real-time requirement for intercepting an electronic communication in the context of the Wiretap Act. Page 11 Civ. No. 12-1678 (PG) personal e-mail after transmission to his business e-mail had concluded, when acquisition could no longer be considered interception. As such, plaintiffs’ claim stands a snowball’s chance in hell of succeeding, since acquiring an electronic communication after transmission has concluded cannot violate the Wiretap Act. Defendant is entitled to judgment as a matter of law, and no material facts relevant to the adjudication of this claim remain in question. Plaintiffs’ claim is thus DISMISSED WITH PREJUDICE. D. A Flash in the Pan: The Stored Electronic Communications Act The court now turns to plaintiffs’ SECA claim. The SECA protects electronic communications that are not in transit and instead lie in electronic storage. However, the SECA’s framework is highly technical, and its scope much narrower than plaintiffs suggest. Hence, while plaintiffs claim that defendant’s alleged misappropriation of certain e-mail messages containing confidential information violates the SECA, the court finds that defendant’s actions do not fall within the statute’s limited scope. Whoever “(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system” violates the SECA. 18 U.S.C. § 2701(a). A person aggrieved by a violation of the SECA may seek civil remedy through a private right of action. See 18 U.S.C. § 2707(a). However, defendant did not violate § 2701(a) because the e-mails in question were not in electronic storage in the context of the SECA at the time they were allegedly misappropriated. The SECA defines the term “electronic storage” narrowly. The term does not apply to all storage of electronic communications. Instead, “electronic storage” means “(a) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and (b) any storage of such communication by an electronic communication Page 12 Civ. No. 12-1678 (PG) service for purposes of backup protection of such communication.” 18 U.S.C. § 2510(17). When the intended recipient opens an e-mail and chooses to keep that e-mail in the inbox server, that opened e-mail is not held in electronic storage as defined by the SECA. See Fraser v. Nationwide Mut Ins. Co., 135 F.Supp. 2d 623, 635-36 (E.D.Pa.2001), aff’d in part, 352 F.3d 107, 114 (3d Cir.2004). See also United States v. Weaver, 636 F.Supp 2d 769, 772-773 (C.D.Ill.2009); Bansal v. Russ, 513 F.Supp. 2d 264, 276 (E.D.Pa. 2007) (holding that accessing opened e-mail does not violate the SECA). Opened email that remains stored in an inbox server is not held in electronic storage because it is not in “temporary, intermediate storage” that is “incidental” to transmission, nor is it acting “for purposes of backup protection of such communication.” 18 U.S.C. § 2510(17). In Theofel, the Ninth Circuit held that previously accessed e-mails are in electronic storage because they offer backup protection. See Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir.2004)(although conceding that opened e-mail does not function as a backup, and is thus not in electronic storage, when stored only in a Remote Computing Service). However, this court finds Theofel unpersuasive. See generally Jennings v. Jennings, 401 S.C. 1 (2012)(“We decline to hold that retaining an opened e-mail constitutes storing it for backup protection under the Act.”). “The Ninth Circuit’s interpretation of storage for backup protection under the Stored Communication Act cannot be squared with legislative history and other provisions of the Act.” Weaver, 636 F. Supp. 2d, 772. Sometimes the addressee, having requested and received a message, chooses to leave it in storage on the service for re-access at a later time. The Committee intends that, in leaving the message in storage, the addressee should be considered the subscriber or user from whom the system received the communication for storage, and that such communication should continue to be covered by section 2702(a)(2). H.R.Rep. No. 99–647, at 65 (1986). Section 2702(a)(2) refers to the treatment of material held in a Remote Computing Service. See 18 U.S.C. § 2702(a)(2). Page 13 Civ. No. 12-1678 (PG) The SECA distinguishes between electronic communications that are stored by an Electronic Communications Service (ECS) and a Remote Computing Service (RCS). An ECS is “any service which provides to the users thereof the ability to send or receive wire or electronic messages.” 18 U.S.C. § 2510(15). Meanwhile, a system constitutes an RCS when it engages in “the provision to the public of computer storage or processing service by means of an electronic communications system.” 18 U.S.C. § 2711(2). “The classifications of ECS and RCS are context sensitive: the key is the provider’s role with respect to a particular copy of a particular communication, rather than the provider’s status in the abstract.” Orin Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev 1208, 1215 (2004). 4 When a user leaves previously opened e-mail in an inbox server, the service provider acts as an RCS, rather than an ECS, with respect to that particular electronic communication. See id. at 1217. See also Prosecuting Computer Crimes, DOJML Comment 9-3.000, 5 Department of Justice Manual (Supp.2011-13)(citing H.R.Rep. No. 99–647, at 65 (1986)). As such, defendant could not have violated § 2701(a) because that section of the SECA does not apply to materials held in an RCS. To boot, not even the RCS rules apply to plaintiffs’ data because American Health Inc.’s private servers constitute a non-public service provider. An RCS must provide “to the public … [a] computer storage or processing service.” 18 U.S.C. § 2711(2) (emphasis ours). Plaintiffs’ SECA claim is without merit because the e-mails in question were not in electronic storage as required by § 2701(a) at the time the alleged misappropriation took place. Furthermore, the e-mails in question were stored in a non-public service provider acting as an RCS. As such, defendant is entitled to judgment as a matter of law. No material facts 4 In Theofel, the Ninth Circuit maintained that a service provider could act as both an ECS and an RCS simultaneously. See Theofel, 359 F.3d 176-177. However, this court rejects that holding. The provisions that apply to ECS and RCS are mutually exclusive. Indeed, “if an e-mail message is covered by both the ECS and RCS rules at the same time, the legal process that is permitted under the RCS rules would violate the ECS rules.” Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, at Footnote 61. Page 14 Civ. No. 12-1678 (PG) relevant to the adjudication of this claim remain in controversy. Thus, plaintiffs’ SECA claims are DISMISSED WITH PREJUDICE. E. Stacked on Pillars of Sand: Plaintiffs’ State Law Claims Plaintiffs’ remaining claims rely on state law, and found their way to federal court through supplemental jurisdiction. When all federal claims are dismissed, the court typically declines to exercise supplemental jurisdiction over a plaintiff’s state law claims. See Camelio v. American Federation, 137 F.3d 666, 672 (1st Cir. 1998)(“Certainly, if the federal claims are dismissed before trial, … the state claims should be dismissed as well.”); Rodriguez v. Doral Mortgage Corp., 57 F.3d 1168, 1177 (1st Cir.1995). This court has already disposed of plaintiffs’ federal claims. As such, it will no longer exercise supplemental jurisdiction over plaintiffs’ state law claims. As a result, all of plaintiffs’ state law claims are DISMISSED WITHOUT PREJUDICE. IV. CONCLUSION For the foregoing reasons, defendant’s motion for summary judgment is GRANTED, insofar as plaintiffs’ federal question claims are without merit, and defendant is entitled to judgment as a matter of law. Plaintiffs’ motion for summary judgment is accordingly DENIED. Plaintiffs’ federal question claims are thus DISMISSED WITH PREJUDICE. As such, this court will no longer exercise supplemental jurisdiction over plaintiffs’ remaining claims. Thus, plaintiffs’ state law claims are DISMMISSED WITHOUT PREJUDICE. Judgment will be entered accordingly. IT IS SO ORDERED. In San Juan, Puerto Rico, December 22, 2017. S/ JUAN M. PÉREZ-GIMÉNEZ JUAN M. PEREZ-GIMENEZ SENIOR U.S. DISTRICT JUDGE

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?