Hovanec v. Miller et al

Filing 22

ORDER GRANTING 7 Motion to Dismiss. Terminated party Moises Luevano.; GRANTING IN PART AND DENYING IN PART 9 Motion to Dismiss. Signed by Judge Xavier Rodriguez. (rf)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS SAN ANTONIO DIVISION ALISON HOVANEC, § § § § § § § § § § Plaintiff, v. TRACI MILLER and MOISES LUEVANO, Defendants. Civil Action No. SA-17-CV-766-XR ORDER On this date, the Court considered the Motion to Dismiss filed by Defendant Traci Miller (docket no. 9) and the Motion to Dismiss filed by Defendant Moises Luevano (docket no. 7), and the responses and replies thereto. Background Plaintiff Alison Hovanec sues Traci Miller and her ex-husband Moises Luevano for violation of the Stored Communications Act (“SCA”), 18 U.S.C. § 2701 et seq., violation of the Federal Wiretap Act (“FWA”), 18 U.S.C. § 2511 et seq., violation of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., violation of the Texas Criminal Wiretap Act, conspiracy to violate those acts, intrusion on seclusion, intentional infliction of emotional distress (against Miller only), and breach of fiduciary duty (against Luevano only). Because Miller’s motion to dismiss is filed under Rule 12(b)(6), the Court presumes the facts alleged in the Amended Complaint to be true. Therein, Plaintiff alleges the following: 1 Alison Hovanec was married to Moises Luevano on August 31, 2002 and reached a mediated settlement in their divorce on May 14, 2015. During the marriage, they were friends with their neighbor Traci Miller, and from May 2013 to May 2015, Miller worked under Hovanec as a wardrobe consultant/sales person for two companies, Carlisle Etcetera LLC and W by Worth. From May 2015 to spring 2016, the relationship between Hovanec and Miller turned from friendly to somewhat antagonistic. Miller would complain about Hovanec to other wardrobe sales consultants and upper management at Carlisle Etcetera LLC and W by Worth, leading to her termination as the local Director of Business Development for W by Worth in May 2015. In the spring of 2016, Miller encouraged her minor daughter to refrain from socializing with Hovanec’s daughter on a few occasions. On May 16, 2016 at 12:05 p.m., Hovanec received an email from “Alison Hovanec” from the email address alisontheloser@gmail.com that referred to her as “such as sucker.” Hovanec’s mother also received an email from that address entitled, “Your Daughter is dating a married man!” and making disparaging remarks about her, including that she was a loser who was in a “downward spiral” and was not competent or able “to keep a job for more than a few months.” Miller also viewed Hovanec’s LinkedIn profile on May 16. That same day, Miller called Carlisle Etcetera to complain about the return of a blouse she purchased from Plaintiff six months earlier. Also that day, Luevano informed Hovanec that Miller had asked to meet with him to allegedly discuss the well-being of Hovanec. Hovanec suspected it was Miller who had sent the emails, so she sent an email under the name Roslyn James and the email address roslynjames1954@gmail.com to alisontheloser@gmail.com at 2:21 p.m. to obtain the IP address of the user through a Stat 2 Counter linked to the email. The user of alisontheloser@gmail.com responded and clicked a website link that allowed Hovanec to identify the user as an AT&T U-Verse user with a Mac computer in the vicinity of Hovanec’s house at the IP address 108.65.34.232. On May 17, in order to obtain Miller’s IP address to see if it matched, Hovanec forwarded an email from her true Gmail address to Miller’s Gmail address. The email required Miller to click a link to a website to see the forwarded email so that Hovanec could view Miller’s IP address, which was identified as 108.65.34.232. Miller clicked on the link twelve times from 12:06 p.m. to 3:33 p.m., and all revealed the same IP address. On May 17, 2016 at 3:38 p.m., Hovanec sent another email to Miller that included a preservation of records letter from her attorney. Three minutes later, Hovanec texted Luevano and asked him to call her because Miller “had done something” that Hovanec felt they needed to discuss, but Luevano was dismissive and did not inquire about what Hovanec wanted to discuss or what Miller had done. On May 18, Hovanec determined that Luevano was dismissive because he was already aware of what Miller was doing. On May 18, Hovanec made a routine review of her AOL email account, which she had used since 2001, and discovered that all of her 9,780 emails had been deleted. Many of these emails contained confidential attorney-client communications concerning the divorce proceedings. Although Hovanec and Luevano had reached a Mediated Settlement Agreement on May 14, 2015, they still had not entered a final decree of divorce in May 2016. Hovanec contacted AOL and was informed that Luevano was the primary account holder and she was only a sub-accountholder. Hovanec then sought and obtained records regarding activity on the account and found that Luevano had accessed the account at 5:53 p.m. (after he had deleted 3 the emails) to surreptitiously override the password changes that Hovanec made immediately after she learned that the emails had been deleted so that he could keep her out of her own email account. Hovanec was shocked to learn that Luevano had always possessed the ability to access and make use of her personal and confidential emails as he pleased, and realized that he had been accessing her emails throughout their marriage and during the pendency off their divorce to obtain information. In the following months, Hovanec spent a considerable amount of time determining the damage that had been done, including reorganizing her deleted emails and incurring legal expenses in connection with “the computer breach.” In this process, on October 13, 2016, she accessed an old iCloud account to recover some personal emails and photographs that had been placed in her iCloud through her iPhone. In September 2015, Hovanec had terminated use of her iPhone and iCloud because she felt that her information may have been compromised and that Luevano could track her whereabouts. Because she could not recall her password, she contacted Apple and was emailed a link to reset her password and gain access to the iCloud account that she had not accessed for approximately thirteen months. Upon opening her iCloud using her old Apple ID email address aliluevano@me.com, Hovanec discovered an email to that address from Google at 10:52 a.m. on May 16 stating that there was a request to add aliluevano@me.com email to “your Google account.” Another email was sent to that address stating that the alisontheloser@gmail.com account had been created at 10:53 a.m. The first email required the user to click a link to “verify” the request to add aliluevano@me.com to the Google account. Plaintiff alleges that Miller accessed her aliluevano@me.com email account to click the link to verify the addition of 4 aliluevano@me.com to the alisontheloser@gmail.com account. Another email was sent to the aliluevano@me.com address on May 17 at 4:28 stating that the Google account alisontheloser@gmail.com was deleted, and “[y]ou received this message because aliluevano@me.com is listed as the recovery email for alisontheloser@gmail.com.” Plaintiff contends that this shows that Miller clicked on the link in the email to verify the addition of aliluevano@me.com to the alisontheloser Gmail account. Based on these factual allegations, Hovanec brings claims against Miller and Luevano for violations of the Stored Communications Act, the Federal and Texas Wiretap Acts, the Computer Fraud and Abuse Act, conspiracy, and common-law torts under Texas law. The Electronic Communications Privacy Act of 1986 included two pieces of legislation relating to electronic communications 1 – it amended existing wiretap laws in 18 U.S.C. § 2501 et seq. to prohibit interception of electronic communications and it introduced the Stored Communications Act (“SCA”), 18 U.S.C. § 2701 et seq. to address wrongful access to stored electronic communications. Both are criminal statutes that include civil remedies. As discussed by the Fifth Circuit, The Wiretap Act proscribes “intentionally intercept[ing] any electronic communications.” DIRECTV, Inc. v. Bennett, 470 F.3d 565, 566–67 (5th Cir. 2006); 18 U.S.C. §§ 2511(1); 2520(a). Similarly, the Computer Fraud and Abuse Act prohibits certain intentional or knowing access to a computer without authorization. See 18 U.S.C. § 1030(a)(4)–(5); United States v. Phillips, 477 F.3d 215, 220–21 (5th Cir. 2007) (rejecting defendant's argument that the government presented insufficient evidence to “find him guilty of 1 An “electronic communication” refers to “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include (A) any wire or oral communication; (B) any communication made through a tone-only paging device; (C) any communication from a tracking device (as defined in 18 U.S.C.A. § 3117); or (D) electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds. 18 U.S.C. § 2510(12). Emails are considered electronic communications. Healix Infusion Therapy, Inc. v. Helix Health, LLC, 747 F. Supp. 2d 730, 743 (S.D. Tex. 2010). 5 intentional unauthorized access” under § 1030). Finally, the Stored Communications Act requires that a defendant “intentionally access[ ] without authorization” or “intentionally exceed[ ] an authorization to access” a facility that provides electronic communication service. 18 U.S.C. § 2701(a)(1)–(2); Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 459 (5th Cir. 1994) (recognizing that 18 U.S.C. § 2701 prohibits “intentional access, without authorization, to stored electronic communications”). Larson v. Hyperion Int’l Tech., LLC, 494 F. App’x 493 (5th Cir. 2012). Plaintiff filed her Original Complaint on August 14, 2017, which did not include a claim under the SCA. Defendant Luevano filed a motion to dismiss, arguing that all the claims against him must be dismissed and submitted to arbitration. Defendant Miller filed a motion to dismiss all the claims against her for failure to state a claim under Rule 12(b)(6). Plaintiff then filed an Amended Complaint as of right, adding the claim under the SCA 2 (and a related conspiracy claim). Plaintiff also filed a Response to the motion to dismiss, and Miller filed a reply. Traci Miller’s Motion to Dismiss Traci Miller moves to dismiss all claims (except the SCA claim, which was added in the Amended Complaint) against her for failure to state a claim upon which relief can be granted. 3 To the extent Miller has attached exhibits to her motion, the Court disregards them because Rule 12(b)(6) review is confined to the pleadings. 2 The SCA “regulates the intentional access of stored electronic communications and records.” Borninski v. Williamson, No. 3:02-CV-1014-L, 2005 WL 1206872, at *11 (N.D. Tex. May 17, 2005). Under the SCA, whoever: (1) “intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished....” 18 U.S.C. § 2701(a)(1); see also Garcia v. City of Laredo, Tex., 702 F.3d 788, 790 (5th Cir. 2012) (stating that the SCA “prohibits accessing without authorization a facility through which an electronic communication service is provided and thereby obtaining access to an electronic communication while it is in electronic storage”). 3 In her Reply, Miller states that “the Court should dismiss all of Plaintiff’s claims against Traci Miller,” but that is not sufficient to include the newly added claim in the Amended Complaint to her motion to dismiss. 6 Federal Wiretap Act and Texas Criminal Wiretap Act The Federal Wiretap Act generally prohibits the interception of wire, oral, or electronic communications and provides a civil cause of action for “any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter.” 18 U.S.C. §§ 2511, 2520. Miller contends that neither the action of setting up an email account such as the alisontheloser@gmail.com account nor accessing stored communications on a terminated iCloud storage account are violations of the Federal Wiretap Act or the Texas Criminal Wiretap Act, and moves to dismiss these claims because Plaintiff does not allege that Miller captured data communications during transmission or “in flight” and thus there was no contemporaneous interception of any electronic communication. The FWA defines “intercept” as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” 18 U.S.C. § 2510(4). In Steve Jackson Games, the Fifth Circuit held that “the definition of ‘electronic communication’ does not include electronic storage of such communication” and that Congress did not intend for “intercept” to apply to “electronic communications” when those communications are in “electronic storage.” Steve Jackson Games, Inc. v. U.S. Secret Service, 36 F.3d 457, 461 (5th Cir. 1994). The Court rejected the argument that a government agent’s acquiring an email prior to its delivery and preventing that delivery (by reading and deleting undelivered emails in a bulletin board system that offered the ability to send and receive private email) were intercepted for purposes of the FWA. Rather, the unread emails in the bulletin board system were in “electronic storage.” Id. Once an email is received at the email address, it is stored and is no longer in transit, even if it has 7 not been read. Id.; Speer v. Saenz, No. H-13-1538, 2015 WL 12551069 (S.D. Tex. Feb. 19, 2015). Thus, access to that content is not an interception. Id. 4 The FWA’s definitions of “electronic communication” and “intercept” are virtually identical to the Texas statute’s definitions of those terms, such that Texas courts may look to the cases interpreting the FWA for direction. Chavis v. State, No. 08-10-00026-CR, 2011 WL 3807747, at *5 (Tex. App.–El Paso, Aug. 26, 2011, pet. ref’d). “Texas courts have held that because of the similarity between the statutes, it is appropriate to follow the guidance of courts interpreting the FWA.” Speer v. Saenz, 2015 WL 12551069 (S.D. Tex. Feb. 19, 2015) (citing Castillo v. State, 810 S.W.2d 180, 183 (Tex. Crim. App. 1990)). Hovanec alleges that “[t]he actions of MILLER violate the FWA [and the Texas Criminal Act] because she willfully intercepted HOVANEC’S electronic communications when she illegally accessed her iCloud where all of her electronic communications are stored” and “further violated the FWA when she intentionally made use of and disclosed information she obtained by means of her interception of HOVANEC’S electronic communications to HOVANEC’S mother, employer, and other as yet unidentified individuals.” Am. Compl. para. 27 & 29. However, as discussed above, accessing emails in the iCloud account, even if unread, is not interception under the FWA or the Texas Act, and thus these counts are dismissed as to Miller. Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq. Hovanec alleges that “MILLER violated the CFAA when she obtained HOVANEC’S iCloud password and then accessed her iCloud information where all of HOVANEC’S 4 Some courts have held that auto-forwarding may satisfy the contemporaneousness requirement, but there is no allegation of email forwarding in this case. See United States v. Szymuszkiewicz, 622 F.3d 701 (7th Cir. 2010); Zaratzian v. Abadir, No. 10CV9049(VB), 2014 WL 4467919 (S.D.N.Y. Sept. 2, 2014). 8 personal information including emails, text messages, contacts, photographs, financial and personal health information were stored” and “further violated the CFAA when she created the email address alisontheloser@gmail.com and used information from HOVANEC’S iCloud in emails she sent to HOVANEC, HOVANEC’S mother and to other yet unknown individuals.” Am. Compl. para. 32. Hovanec further alleges that “MILLER intended to defraud HOVANEC and did so by making use of information obtained from HOVANEC’S iCloud to make unfounded complaints against her to her employer, Carlisle Etcetera, LLC.” Id. The Computer Fraud and Abuse Act (“CFAA”) prohibits certain intentional or knowing access to a protected computer without authorization. 18 U.S.C. § 1030; Larson v. Hyperion Intern. Technologies, LLC, No. 12–50102, 494 F. App’x 493, 497 (5th Cir. 2012). The statute provides a civil remedy for any person who suffers damage or loss resulting from such a violation. 18 U.S.C.A. § 1030(g); Fiber Systems Intern., Inc. v. Roehrs, 470 F.3d 1150, 1156 (5th Cir. 2006). Hovanec alleges a violation of § 1030(a)(4). To prove that violation, she must establish that Miller: (1) knowingly and with the intent to defraud (2) accessed a “protected computer” 5 (3) without authorization or exceeding such authorization that was granted and (4) furthered the intended fraud and obtained anything of value, (5) causing a loss to one or more persons during any one-year period aggregating at least $5,000 in value. Estes Forwarding Worldwide LLC v. Cuellar, 239 F. Supp. 3d 918, 923 (E.D. Va. 2017); Associated Pump & Supply Co., 5 “Computer” means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device. 18 U.S.C. § 1030(e)(1). “Protected computer means a computer used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States. 18 U.S.C. § 1030(e)(2)(B). 9 LLC v. Dupre, No. 14–9, 2014 WL 1330196, at *5 (E.D. La. April 3, 2014). Although it is unclear, Hovanec may also be alleging a violation of § 1030(a)(2)(C). To establish that violation, Plaintiff must show that Miller (1) intentionally accessed a computer, (2) without authorization (or exceeding authorized access), (3) obtained information from a protected computer, and (4) caused at least $5000 in loss. See Stirling Int’l Realty v. Soderstrom, No. 6:14-cv-1109-Orl-40TBS, 2015 WL 2354803, at *1 (M.D. Fla. May 15, 2015). A civil action can only be maintained under § 1030 of the CFAA “if the conduct involves 1 of the factors set forth in subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i).” 18 U.S.C. § 1030(g). The only relevant factor in this case is in subclause (I), which includes “loss to 1 or more persons during any 1-year period . . . aggregating at least $5,000 in value.” 18 U.S.C. § 1030(c)(4)(A)(i)(I). Miller contends that Plaintiff has not established a cause of action under the CFAA because creation of the Gmail account is not a violation of the CFAA and because, in relation to the iCloud account, she cannot show an aggregate loss in excess of $5,000. In her Amended Complaint, Hovanec alleges that she has “spent several hours a week since May 16, 2017 6 trying to assess the damage caused by MILLER’s access to her iCloud and LUEVANO’s extensive access to her AOL account” and that she “is entitled to recover damages for the time she spent investigating and remedying the violations of the CFAA committed by MILLER and LUEVANO.” Am. Compl. para. 34. Hovanec contends that, based on her education and employment history, she is entitled to be compensated at a rate of at least $25 per hour “for every hour she was forced to spend to respond to and remedy the CFAA violations committed against her by MILLER and LUEVANO” and thus far she has 6 This date may be a typo. 10 spent approximately 580 hours, which entitles her to a recovery of $14,500. Hovanec further alleges that she is “entitled to recover the income/revenue that she lost as a result of the use by MILLER of information she accessed from her iCloud that led to HOVANEC’s termination from W by Worth” and the cost of employing two experts “to evaluate and respond to the violations of the CFAA committed by MILLER” as well as attorneys’ fees, which thus far are in excess of $50,000. Am. Compl. para. 34. Hovanec contends that this is sufficient to show at least a $5000 loss. Docket no. 12 at 5. The CFAA defines “loss” as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” 18 U.S.C. § 1030(e)(11). Some courts have construed the definition of “loss” to include only the two subtypes of loss set forth in the CFAA: (1) costs incurred due to investigating, responding to, and correcting damage caused by a violation, and (2) costs incurred, revenue lost, or other damages resulting from an interruption of service. Stirling Int’l Realty, Inc. v. Soderstrom, No. 6:14-CV-1109-Orl-40TBS, 2015 WL 2354803 (M.D. Fla. May 15, 2015); Talon Transaction Tech. v. Stoneeagle Servs., No. 3:13-cv-00902-P, 2013 WL 12172926, at *3 (N.D. Tex. Aug. 15, 2013) (“To clarify the concept of loss, the term ‘encompasses only two types of harm: costs to investigate and respond to an offense, and costs incurred because of a service interruption.’”); Alliantgroup, L.P. v. Feingold, 803 F. Supp. 2d 610, 630 (S.D. Tex. 2011) (“The term ‘loss’ encompasses only two types of harm: costs to investigate and respond to an offense, and costs incurred because of a service interruption.”). Other courts, however, 11 have noted that a statute’s use of “including” is illustrative rather than exhaustive, such that “any reasonable cost” may include costs not expressly delineated in the statute. E.g., Motio, Inc. v. BSP Software LLC, No. 3:16-cv-00331-O, 2016 WL 9559916, at *15 (N.D. Tex. May 27, 2016) (“[T]he Court declines to follow Alliantgroup and Quantlab, as they interpret the phrase ‘reasonable cost to any victim, including the cost . . .’ as strictly limiting the ‘cost’ to the list of terms following ‘including.’”). In this case, though Plaintiff alleges at least some losses that fall within the scope of the CFAA, such as costs to investigate an offense, she does not adequately distinguish between the loss due to Miller’s alleged CFAA violation from the loss due to Luevano’s alleged CFAA violation. Her Amended Complaint addresses these losses together in a section called “Damages Under the Computer Fraud and Abuse Act (‘CFAA’) From Both Defendants.” Am. Compl. at 20. She claims 580 hours spent responding to and remedying the CFAA violations, but fails to differentiate between time spent addressing Miller’s alleged access to her iCloud account and Luevano’s alleged access to (over many years) and deletion of emails in her AOL account. Similarly, she does not differentiate costs for her experts or her attorney’s fees (assuming these count as losses). According to Hovanec’s Complaint, she did not even discover Miller’s alleged access to the iCloud account until October 13, 2016, five months after she discovered the issues with her AOL emails. Thus, the losses cannot be aggregated. In addition, Plaintiff is claiming her lost income related to her termination from W by Worth. Plaintiff alleges that Miller violated the CFAA “when she obtained HOVANEC’S iCloud password and then accessed her iCloud information where all of HOVANEC’S 12 personal information including emails, text messages, contacts, photographs, financial and personal health information were stored,” that she intended to “defraud HOVANEC and did so by making use of information obtained from HOVANEC’S iCloud to make unfounded complaints against her to her employer, Carlisle Etcetera, LLC,” and that “[t]hose unfounded allegations regarding HOVANEC’S job performance ultimately resulted in HOVANEC’S termination from W by Worth in May 2015.” Plaintiff fails to quantify this alleged lost income and thus fails to demonstrate that it exceeds $5,000. In addition, she fails to allege that Miller accessed her iCloud account prior to May 2015, when Hovanec was terminated from W by Worth. 7 Miller’s motion to dismiss the CFAA claim is granted, but with leave to replead to distinguish losses resulting from Miller’s alleged violation from Luevano’s alleged violation to attempt to establish that Hovanec suffered a loss over $5000 related to Miller’s alleged violation. Conspiracy claims (FWA, TCWA, SCA, and CFAA) Miller contends that the elements of civil conspiracy are those set forth in the Texas Supreme Court case Insurance Company of North America v. Morris, 981 S.W.2d 667, 675 (Tex. 1998) and include: (1) a combination of two or more persons; (2) an object to be 7 The Court notes that Plaintiff’s timeline and allegations concerning Miller’s alleged access to her iCloud and its effects on Plaintiff’s employment are a bit confusing. She alleges that Miller accessed her iCloud account in May 2016 to verify the use of aliluevano@me.com as a linked email to the alisontheloser Gmail account and that same day made a complaint to Carlisle Etcetera about the return of a blouse she purchased from Plaintiff six months earlier. Am. Compl. para. 24 & 32. However, Plaintiff does not specify any information obtained from her iCloud account that was used to make unfounded complaints about her to Carlisle Etcetera. Further, she complains that Miller’s use of information from the iCloud account to make unfounded allegations regarding Hovanec’s job performance ultimately resulted in Hovanec’s termination from W by Worth in May 2015. Thus, when repleading, Plaintiff should clarify when she alleges that Miller accessed her iCloud account (if other than May 2016), what information she obtained when accessing the account, and how that information was used and/or affected her employment with either Carlisle Etcetera or W by Worth. In addition, when repleading, Plaintiff should specify the exact sections of the CFAA under which she is asserting claims (e.g., § 1030(a)(2)(C), § 1030(A)(4)). 13 accomplished (an unlawful purpose or a lawful purpose by unlawful means); (3) a meeting of the minds on the object or course of action; (4) one or more unlawful, overt acts; and (5) damages as the proximate result. Docket no. 9 at 7. Miller moves to dismiss the conspiracy claims on the basis that Miller “fails to identify the unlawful purpose or lawful purpose by unlawful means and that either her former spouse, Luevano, or Traci Miller had a meeting of the minds.” Docket no. 9 at 8. Hovanec responds that she is “only required to allege that one member of the alleged conspiracy committed an unlawful overt act,” and that she has alleged “numerous overt acts.” Docket no. 12 at 5. Plaintiff does not specify the law under which she asserts her conspiracy claim, though it appears that she is basing the claim on Texas common law because she cites Operation Rescue-National v. Planned Parenthood of Houston and Southeast Texas, Inc., 975 S.W.2d 546, 553 (Tex. 1998). Docket no. 12 at 5. Under Texas law, conspiracy is a derivative tort, so a plaintiff must state a separate underlying claim on which the court may grant relief or the conspiracy claim fails. DHI Group, Inc. v. Kent, No. H-16-1670, 2017 WL 1088352 (S.D. Tex. Mar. 3, 2017) (citing Meadows v. Hartford Life Ins. Co., 492 F.3d 634, 640 (5th Cir. 2007)). Plaintiff’s Amended Complaint alleges a conspiracy to violate the FWA, TCWA, CFAA, and SCA. Plaintiff fails to allege any conspiracy to “intercept” as defined by the FWA or the Texas Wiretap Act, and thus those statutes cannot form the basis of a conspiracy claim. The CFAA makes it a crime to conspire to commit an offense under subsection (a) of § 1030, and § 1030(g) creates a private right of action for such a violation. Thus, the elements of conspiracy under § 1030(b) and federal law would seem to be the appropriate elements for this claim 14 rather than Texas civil conspiracy law. In fact, the Southern District of Texas has held that, by creating a statutory conspiracy claim, Congress excluded common-law conspiracy claims. DHI Group, Inc. v. Kent, No. H-16-1670, 2017 WL 1088352, at * 12 (S.D. Tex. Mar. 3, 2017). 8 Title 18 U.S.C. § 371 makes it a crime to conspire to commit an offense against the laws of the United States. The elements of such an unlawful conspiracy include: (1) that the defendant and at least one other person made an agreement to commit the crime; (2) that the defendant knew the unlawful purpose of the agreement and joined in it willfully, that is, with the intent to further the unlawful purpose; and (3) for certain crimes, that one of the conspirators during the existence of the conspiracy knowingly committed at least one overt act in order to accomplish some object or purpose of the conspiracy. Under either Texas or federal law, it not sufficient for Plaintiff to simply allege overt acts. There must be a meeting of the minds in the sense that the parties agreed to commit the crime at issue. See Juhl v. Airington, 936 S.W.2d 640, 644 (Tex. 1996) (merely proving joint intent to engage in conduct that resulted in injury not sufficient; civil conspiracy requires specific intent to agree to accomplish unlawful purpose or to accomplish lawful purpose by unlawful means); Hey v. Irving, 161 F.3d 7 (5th Cir. 1998) (to establish a cause of action based on conspiracy a plaintiff must show that the defendants agreed to commit an illegal act”). 8 That same court, along with others, has held that there is no state-law conspiracy cause of action for violations of the SCA because it contains no conspiracy crime, § 2707 constrains civil liability to “violations of this chapter,” and § 2708 states that “[t]he remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter.” DHI Group, 2017 WL 1088352, at *12; see also Council on American-Islamic Relations Action Network, Inc. v. Gaubatz, 891 F. Supp. 2d 13, 26-27 (D.D.C. 2012); Vista Marketing, LLC v. Burkett, 999 F. Supp. 2d 1294, 1297 (M.D. Fla. 2014); Jones v. Global Information Groups, Inc., No. 3:06-00246-JDM, 2009 WL 799745, at *3 (W.D. Ky. Mar. 25, 2009). As noted, the SCA and conspiracy to violate the SCA claims were added after Miller filed her motion to dismiss, and thus are not challenged by Miller at this time. Nevertheless, to the extent a conspiracy to violate the SCA claim is legally cognizable, it is subject to the same argument (lack of allegation as to agreement to commit the crime) as the other conspiracy claims. 15 Plaintiff’s Amended Complaint fails to allege sufficient facts to make a plausible claim that Luevano and Miller conspired to violate the CFAA. The Amended Complaint alleges that they made “a coordinated effort” to commit computer fraud and “make use of electronic communications in connection with the unlawful access to the computer and iCloud of the Plaintiff.” She alleges that, during the marriage, she and Luevano were friends with Miller and that their children attended the same school and were friends. Plaintiff alleges that, after she sent Miller the preservation letter, she texted Luevano and asked him to call her because Miller “had done something” (sending the alisontheloser@gmail.com emails) they needed to discuss, but Luevano was “surprisingly dismissive” and it was “strange that Luevano made no inquiry whatsoever as to what Miller may have done and whether or not her action(s) could be harmful to his children.” Plaintiff alleges that she later “discovered that Luevano was dismissive about what Miller may have done because he was already aware that Miller had been illegally accessing Hovanec’s computer 9 and intercepting her electronic data.” Plaintiff alleges that she discovered this when she accessed her AOL account on May 18 and discovered that Luevano had deleted her emails, that Luevano was the primary account holder on the AOL email account, and that Luevano had accessed the account after Hovanec discovered the deletion and that he changed the password “to keep her out of her own email account.” Plaintiff contends that “Luevano’s impulsive decision to delete all of Hovanec’s emails just one day after Miller received her preservation letter revealed that Miller and Luevano had discussed the fact that Miller had been caught sending the fictitious alisontheloser@gmail.com emails to Hovanec.” 9 Plaintiff’s Amended Complaint makes references to Miller accessing Plaintiff’s computer, but the facts do not support this allegation. Rather, the facts alleged are that Miller accessed Plaintiff’s iCloud account, which is not stored on Plaintiff’s computer. 16 Notably absent from these allegations is any assertion that Miller and Luevano reached any meeting of the minds or agreement for either of them to violate the CFAA. At most, it alleges that Luevano was aware that Miller had accessed Plaintiff’s iCloud account and had sent the alisontheloser@gmail.com emails. Further, there is no allegation that Miller conspired with Luevano for him to access or delete Plaintiff’s AOL account emails. The allegations are insufficient to establish a conspiracy. Miller’s motion to dismiss the conspiracy claim is granted. Intrusion on Seclusion Hovanec alleges that “MILLER intentionally intruded upon the privacy of HOVANEC when MILLER accessed HOVANEC’s iCloud that contained all of HOVANEC’S personal information including emails, text messages, contacts, photographs, financial and personal health information. MILLER also intruded upon the privacy of HOVANEC when she caused the phony and insulting emails using alisontheloser@gmail.com to be sent to HOVANEC and to her mother.” Am. Compl. para. 36. The elements of a cause of action for invasion of privacy by intrusion on seclusion are: (1) the defendant intentionally intruded on the plaintiff’s solitude, seclusion, or private affairs; and (2) the intrusion would be highly offensive to a reasonable person. Valenzuela v. Aquino, 853 S.W.2d 512, 513 (Tex. 1993). Miller moves to dismiss this claim on the basis that such claims are generally limited to physical intrusion and/or eavesdropping with the aid of a wiretap, microphone, or spying, and Hovanec has not alleged those types of intrusions. Miller contends that “Plaintiff presents no facts to support the proposition that Traci Miller ever actually accessed the terminated iCloud account” and that there are no cases supporting the 17 proposition that the act of accessing “a deserted cloud account” is an intrusion of someone’s solitude, seclusion or private affairs. Docket no. 9 at 9. 10 Miller further argues that creating the alisontheloser account and sending insulting emails does not state a claim. Hovanec has alleged that Miller secretly and without authorization accessed her iCloud account. Hovanec contends that “federal courts in Texas have recognized that hacking into a person’s private computer 11 constitutes an intentional intrusion that would be offensive to the average person and give rise to a claim for invasion of privacy.” Docket no. 12 at 6 (citing Coalition for an Airline Passengers’ Bill of Rights v. Delta Air Lines, 693 F. Supp. 2d 667 (S.D. Tex. 2010), Bray v. The Cadle Co., No. 4:09-cv-663, 2010 WL 4053794 (S.D. Tex. Oct. 14, 2010), and the Restatement (Second) of Torts § 652B). The Southern District of Texas did find that “hacking into a person’s private computer and stealing personal correspondence would represent an intentional intrusion on the victim’s private affairs and that such an intrusion would be highly offensive to a reasonable person.” Delta Air, 693 F. Supp. 2d at 675. Other courts have also concluded that unauthorized access to personal emails may be a highly offensive intrusion. Stirling Int’l Realty, 2015 WL 403318, at * 6 (and listing cases). In this case, if Miller accessed only the emails related to creation of the alisontheloser@gmail.com, then this claim would fail. But if Miller accessed more or all of the private information contained in Hovanec’s iCloud account, as Miller alleges, this could plausibly state a claim. The motion to dismiss this claim is denied. 10 In the Amended Complaint, Hovanec explains that the creator of alisontheloser@gmail.com must have had access to her iCloud account because the creator clicked on the verification link in the email to alisonluevano@me.com. Elsewhere, Hovanec alleges that Miller obtained her iCloud password and “accessed her iCloud information where all of Hovanec’s personal information including emails, text messages, contacts, photographs, financial and personal health information were stored.” Am Compl. at para. 32. However, Plaintiff provides no specific allegations of such access, even though she has hired experts to determine the extent of the breach. The only specific access alleged is to the verification email on May 16. 11 Again, Plaintiff has not alleged that Miller hacked into her private computer. The only allegation is that Miller obtained the password to and accessed Plaintiff’s iCloud account. 18 Intentional Infliction of Emotional Distress Hovanec alleges that “MILLER intentionally caused HOVANEC severe emotional distress by sending fictitious and offensive emails to her and her mother using the email address, alisontheloser@gmail.com. The acts committed by MILLER to illegally access HOVANEC’S iCloud and send offensive emails using HOVANEC’S name is extreme and outrageous behavior that rises to the level of a criminal offense. The severity of MILLER’S outrageous acts of cyberbullying are compounded by the fact that MILLER had purported to be a caring friend of HOVANEC’S, and their minor daughters were classmates and close friends. The outrageous conduct of MILLER proximately caused HOVANEC emotional distress, and no alternative cause of action provides a remedy for the recovery of damages for the severe emotional distress she has suffered.” Am. Compl. para. 37. Miller contends that IIED is a gap-filler tort, and thus Plaintiff’s assertion of other causes of action indicates that there should be no recovery under this theory. Hovanec responds that if she cannot succeed on her federal claims, then IIED is “the claim for which she can obtain relief for the outrageous conduct committed by MILLER” and dismissal is premature. Docket no. 12 at 7. Miller’s motion to dismiss this claim is denied. As Miller notes, the act of creating the alisontheloser@gmail.com and sending disparaging emails is not itself a violation of the various statutes at issue here. Thus, these actions could fall within the gap-filler scheme of the intentional infliction of emotional distress tort. 12 Miller’s motion to dismiss this claim is denied. 12 Without knowing the content of the emails, the Court is unable to determine whether the sending of two emails is “extreme and outrageous” conduct, but in any event Miller has not moved for dismissal on this ground. 19 Luevano’s Motion Defendant Moises Luevano moves the Court to dismiss the claims against him and refer them to arbitration pursuant to Hovanec and Luevano’s Mediated Settlement Agreement (M.S.A.) in their divorce proceeding. Luevano states that Hovanec filed an Original Petition for Divorce on May 15, 2014, and that they agreed to temporary orders on September 23, 2014 that “shall continue in force until signing of the Final Decree of Divorce or further order.” The Standing Order in effect when the divorce action was filed prohibited the parties from “intercepting or recording the other party’s electronic communications.” And the Standing Order applicable in 2015 prohibits the parties from “opening or diverting mail or email or any electronic communication addressed to the other party.” Both versions of the Standing Order state that “any part of this order not changed by some later order remains in full force and effect until the court signs a final decree.” The temporary orders prohibited the parties from “destroying, disposing of, or altering any email or other electronic data relevant to the subject matter of the case, whether stored on a hard drive or on a diskette or other electronic storage device.” The parties entered into the M.S.A. on May 14, 2015. In the M.S.A. the parties agreed to compromise and settle the claims and controversies between them regarding dissolution of their marriage. Defendant asserts that Judge Richard Price orally granted the parties’ divorce and approved the M.S.A. on May 15, 2015, but has not entered a final Decree of Divorce. The M.S.A. states that the case shall be resolved by an agreed decree of divorce. Luevano therefore contends that all of Hovanec’s claims are subject to arbitration pursuant to a clause in the M.S.A. stating: 20 If one or more disputes arise with regard to the interpretation of this Agreement or any of its provisions as to the content or drafting of a formal order or Judgment, or any substantive dispute arising prior to the entry of a Decree of Divorce (including as to matters that arise for the first time after this Mediated Settlement Agreement is signed by the parties, their attorneys and the mediator), the parties agree to submit said dispute(s) to VICTOR H. NEGRON, JR., who shall act as Arbitrator regarding said disputes and whose decision shall be binding on the parties, and the parties shall share the costs of same as assessed by the Arbitrator, and shall pay such fees upon demand by the Arbitrator. Plaintiff’s Amended Complaint (para 17) states, “It is important to note that on May 15, 2014, HOVANEC filed for divorce from LUEVANO and although she and LUEVANO reached a mediated settlement agreement on May 14, 2015, as of May 18, 2016, HOVANEC and LUEVANO had still not entered a final decree of divorce. Accordingly, at the time all of her AOL emails were deleted, HOVANEC was still engaged in confidential communications with her family law counsel regarding her divorce.” In paragraph 19, Hovanec alleges that from at least the date that HOVANEC filed for divorce on May 15, 2014, LUEVANO was under a duty to disclose the fact that he was the master accountholder of HOVANEC’S primary, and at the time only, email account but instead he chose to breach his fiduciary duty to her and conceal the fact that he could intercept and was in fact accessing HOVANEC’S personal and confidential emails throughout their marriage and even during the pendency of their divorce. Indeed, LUEVANO not only breached his fiduciary duty to his wife by accessing her emails without her consent, he also acted in contempt of paragraph 3.6 of the Bexar County Standing Order Regarding the Conduct of Parties in a Divorce that expressly forbids parties to a divorce from opening or diverting each other’s emails. And, in paragraph 20, she alleges that “[t]he unbridled access to HOVANEC’S confidential emails gave LUEVANO an unfair and illegal advantage during the entire pendency of their divorce proceeding.” Luevano argues that Hovanec’s claims are subject to the arbitration clause. Hovanec argues that the arbitration clause only applies to suits affecting the parent child relationship, 21 which this is not, that this is not a dispute concerning the interpretation of M.S.A. or any of its provisions as to the content or drafting of a formal order or judgment, and that the arbitrator Victor Negron (who also drafted the arbitration clause) has concluded that Hovanec’s claims are not subject to the arbitration clause. The Court utilizes a two-step analysis to determine whether a party may be compelled to arbitrate. First, the Court asks whether the party has agreed to arbitrate the dispute by examining whether there is a valid agreement to arbitrate claims and whether the dispute in question falls within its scope. If so, the Court examines whether any statute or policy renders the claims non-arbitrable. The parties agree that they entered into an arbitration agreement in the M.S.A., but they dispute whether Hovanec’s current claims fall within its scope. Mediated settlement agreements are utilized to resolve suits for dissolution of a marriage and suits affecting the parent-child relationship. TEX. FAMILY CODE §§ 6.602, 153.0071. 13 As the Texas Supreme Court explained: Under the Texas Family Code, “a mediated settlement agreement, meeting certain statutory formalities, is binding on the parties and requires the rendition of a divorce decree that adopts the parties’ agreement.” Milner v. Milner, 361 S.W.3d 615, 618 (Tex. 2012); TEX. FAM. CODE § 6.602. Because an MSA is a contract, we look to general contract-interpretation principles to determine its meaning. See TEX. CIV. PRAC. & REM. CODE § 154.071(a) (“If the parties reach a settlement and execute a written agreement disposing of the dispute, the agreement is enforceable in the same manner as any other written contract.”). When construing a contract, “a court must ascertain the true intentions of the parties as expressed in the writing itself.” Italian Cowboy Partners, Ltd. v. Prudential Ins. Co. of Am., 341 S.W.3d 323, 333 (Tex. 2011). “We give terms their plain, ordinary, and generally accepted meaning unless the instrument shows that the parties used them in a technical or different sense.” Heritage Res., Inc. v. NationsBank, 939 S.W.2d 118, 121 (Tex. 1996). 13 Although Hovanec argues that the arbitration clause in the M.S.A. applies only to a suit affecting the parentchild relationship and therefore can require arbitration of only such suits, Miller correctly notes that they are authorized and used in divorce proceedings as well as SAPCRs. 22 Loya v. Loya, 526 S.W.3d 448, 451 (Tex. 2017); Brooks v. Brooks, 257 S.W.3d 418, 421 (Tex. App.–Fort Worth 2008, pet. denied) (“Mediated settlement agreements are binding in suits affecting the parent-child relationship, as well as suits involving only marital property.). Mediated settlement agreements often (and typically) contain arbitration clauses requiring arbitration of disputes regarding interpretation of the M.S.A. and drafting the final judgment and divorce decree. This arbitration clause contains such language, but it also broadly includes “any substantive dispute arising prior to the entry of a Decree of Divorce (including as to matters that arise for the first time after this Mediated Settlement Agreement is signed by the parties, their attorneys and the mediator).” 14 The only limits on this broad arbitration clause are that the dispute be “substantive” and that it arise prior to entry of the divorce decree. The meaning of “substantive dispute” is unclear, and the parties have not provided the entire M.S.A., which might shed additional light on its meaning, due to confidentiality concerns. Substantive disputes would include the ultimate division of property or issues affecting the parent-child relationship that were involved in the litigation and would ultimately be resolved in the litigation (and/or would be covered in the M.S.A.). But here the Court must decide whether the phrase also includes disputes about whether the parties’ conduct violated temporary orders or Standing Orders during the pendency of the divorce/SAPCR, and whether it includes alleged violations of federal statutes and Texas common law. Plaintiff alleges that Luevano accessed her private emails throughout their marriage, and throughout their divorce, in violation of the Standing Orders, providing Luevano an unfair 14 Hovanec’s response to Luevano’s motion completely ignores this portion of the arbitration clause. 23 advantage in the divorce. Plaintiff sues for breach of fiduciary duty based on these claims. She acknowledges that this claim could “arguably be said to have some bearing on the interpretation of the Mediated Settlement Agreement as well as some ‘natural extension’ to the entry of a decree,” but argues that is only because it could be a basis to set aside or preclude the enforcement of the very M.S.A. that contains the arbitration clause (though she has not argued that it should be set aside). As such, however, the allegations could bear directly upon the terms of a final divorce decree. Hovanec argues that the federal claims are not subject to the arbitration clause. But to determine whether a party’s claims fall within an arbitration agreement’s scope, we focus on the complaint’s factual allegations rather than the legal causes of action asserted. Jones v. Halliburton Co., 583 F.3d 228, 240 (5th Cir. 2009); Prudential Sec. Inc. v. Marshall, 909 S.W.2d 896, 900 (Tex. 1995). If the allegations touch upon matters covered by the agreement, then the claim is subject to arbitration regardless of the legal label attached to it. Saks v. Rogers, No. 04-16-00286-CV, 2017 WL 3159712, at *6 (Tex. App. – San Antonio July 26, 2017, pet. filed). Any doubts concerning the scope of arbitrable issues should be resolved in favor of arbitration. Jones, 583 F.3d at 235. Because the factual allegations concerning Luevano’s access to Hovanec’s emails throughout the marriage are relevant to the divorce and could affect the terms of the final divorce decree, the Court concludes that the claims are substantive disputes within the meaning of the arbitration clause. The Court finds that no statute or policy would preclude arbitration of the claims. When claims are subject to arbitration, the Court must stay the trial of the action until the arbitration is complete. 9 U.S.C. § 3. But the Court may also, in its discretion, dismiss the 24 case when all of the claims must be submitted to arbitration. Alford v. Dean Witter Reynolds, Inc., 975 F.2d 1161, 1164 (5th Cir. 1992); Pacheco v. PCM constr. Servs., LLC, 602 F.App’x 945, 949 n.2 (5th Cir. 2015). Luevano’s motion is therefore granted. Conclusion Moises Luevano’s Motion to Dismiss (docket no. 7) is GRANTED and Plaintiff Hovanec’s claims against Luevano are DISMISSED because they must be submitted to arbitration. Traci Miller’s Motion to Dismiss (docket no. 9) is GRANTED IN PART and DENIED IN PART. The motion is GRANTED as to Hovanec’s claims under the Federal Wiretap Act, the Texas Criminal Wiretap Act, and the conspiracy claims, and those claims are DISMISSED WITH PREJUDICE. Miller’s motion is further GRANTED as to Hovanec’s CFAA claim, but with leave to amend. The motion is DENIED as to the state tort claims. It is so ORDERED. SIGNED this 7th day of March, 2018. _________________________________ XAVIER RODRIGUEZ UNITED STATES DISTRICT JUDGE 25

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?