Monday, April 18, 2022

Data Scraping - Remedies

Data

 

Data Scraping

 

 

Remedies

 

Cease-and-Desist Letter

 

Trespass to Chattels

 

Copyright Infringement 

 

Misappropriation 

 

Unjust Enrichment 

 

Conversion

 

Breach of Contract 

 

Breach of Privacy

 

 

 

 

(…) Entities that view themselves as victims of data scraping are not without resort, even if the CFAA does not apply: state law trespass to chattels claims may still be available. And other causes of action, such as copyright infringement, misappropriation, unjust enrichment, conversion, breach of contract, or breach of privacy, may also lie. See, e.g., Associated Press v. Meltwater U.S. Holdings, Inc., 931 F. Supp. 2d 537, 561 (S.D.N.Y. 2013) (holding that a software company’s conduct in scraping and aggregating copyrighted news articles was not protected by fair use).

 

 

(…) LinkedIn’s cease-and-desist letter also asserted a state common law claim of trespass to chattels. Although we do not decide the question, it may be that web scraping exceeding the scope of the website owner’s consent gives rise to a common law tort claim for trespass to chattels, at least when it causes demonstrable harm. Compare eBay, Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058, 1070 (N.D. Cal. 2000) (finding that eBay had established a likelihood of success on its trespass claim against the auction-aggregating site Bidder’s Edge because, although eBay’s “site is publicly accessible,” “eBay’s servers are private property, conditional access to which eBay grants the public,” and Bidder’s Edge had exceeded the scope of any consent, even if it did not cause physical harm); Register.com, Inc. v. Verio, Inc., 356 F.3d 393, 437–38 (2d Cir. 2004) (holding that a company that scraped a competitor’s website to obtain data for marketing purposes likely committed trespass to chattels, because scraping could—although it did not yet—cause physical harm to the plaintiff’s computer servers); Sw. Airlines Co. v. FareChase, Inc., 318 F. Supp. 2d 435, 442 (N.D. Tex. 2004) (holding that the use of a scraper to glean flight information was unauthorized as it interfered with Southwest’s use and possession of its site, even if the scraping did not cause physical harm or deprivation), with Ticketmaster Corp. v. Tickets.Com, Inc., No. 2:99-cv-07654-HLH-VBK, 2003 WL 21406289, at *3 (C.D. Cal. Mar. 7, 2003) (holding that the use of a web crawler to gather information from a public website, without more, is insufficient to fulfill the harm requirement of a trespass action); Intel Corp. v. Hamidi, 30 Cal. 4th 1342, 1364 (2003) (holding that “trespass to chattels is not actionable if it does not involve actual or threatened injury” to property and the defendant’s actions did not damage or interfere with the operation of the computer systems at issue) (Fn. 21).

 

 

 

 

 

(U.S. Court of Appeals for the Ninth Circuit, April 18, 2022, HIQ Labs, Inc. v. LinkedIn Corp., Docket No. 17-16783, for Publication, p. 41)

 

 

E-Commerce - E-Mail

E-Mail

 

Privacy

 

 

The Stored Communications Act, enacted as part of the Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848, provides privacy protections for e-mail and other electronic communications by limiting the ability of the government to compel disclosure by internet service providers.

 

 

(U.S. Court of Appeals for the Ninth Circuit, April 18, 2022, HIQ Labs, Inc. v. LinkedIn Corp., Docket No. 17-16783, for Publication, p. 38)

Sunday, April 17, 2022

Computer Fraud and Abuse Act - Former Employee

Computer Fraud and Abuse Act

 

Former Employee

 

 

Nosal II, 844 F.3d 1024

 

Nosal II held that a former employee who used current employees’ login credentials to access company computers and collect confidential information had acted “‘without authorization’ in violation of the CFAA.” 844 F.3d at 1038. The computer information the defendant accessed in Nosal II was thus plainly one which no one could access without authorization.

 

 

 

(U.S. Court of Appeals for the Ninth Circuit, April 18, 2022, HIQ Labs, Inc. v. LinkedIn Corp., Docket No. 17-16783, for Publication, p. 36)

 

 

U.S. Court of Appeals for the Ninth Circuit, HIQ Labs, Inc. v. LinkedIn Corp., Docket No. 17-16783

Preliminary Injunction

Injunctive Relief

 

Declaratory Judgment

 

Temporary Restraining Order

 

To Use LinkedIn Public Profile Data

 

Non-Exclusive License

 

Ownership Interest

 

To Access a Computer Without Authorization

 

Tortious Interference with Contract

 

Legitimate Business Purpose

 

Cease-and-Desist Letters and Interference

 

California Law

Computer Fraud and Abuse Act (CFAA)

 

 

 

On Remand from the United States Supreme Court

 

 

On remand from the United States Supreme Court, the panel affirmed the district court’s order preliminarily enjoining LinkedIn Corp. from denying hiQ Labs, Inc., a data analytics company, access to publicly available member profiles on LinkedIn’s professional networking website.

 

The panel previously affirmed the preliminary injunction. The Supreme Court granted certiorari, vacated the panel’s judgment, and remanded for further consideration in light of Van Buren v. United States, 141 S. Ct. 1648 (2021). On remand, the panel again affirmed the preliminary injunction, concluding that Van Buren reinforced its determination that hiQ had raised serious questions about whether LinkedIn may invoke the Computer Fraud and Abuse Act (“CFAA”) to preempt hiQ’s possibly meritorious tortious interference claim.

 

The panel held that a plaintiff seeking a preliminary injunction must establish that it is likely to succeed on the merits, that it is likely to suffer irreparable harm in the absence of preliminary relief, that the balance of equities tips in its favor, and that an injunction is in the public interest. The court uses a “sliding scale” approach to these factors, so that when the balance of hardships tips sharply in the plaintiff’s favor, it need demonstrate only serious questions going to the merits. Applying this approach, the district court concluded that the balance of hardships tipped sharply in hiQ’s favor and that hiQ raised serious questions on the merits.

 

The panel held that the district court did not abuse its discretion in concluding on the preliminary injunction record that hiQ currently had no viable way to remain in business other than using LinkedIn public profile data for its “Keeper” and “Skill Mapper” analytics services, and that hiQ therefore had demonstrated a likelihood of irreparable harm absent a preliminary injunction.

 

The panel concluded that the district court properly determined that the balance of hardships tipped sharply in hiQ’s favor, when weighing the likelihood that hiQ would go out of business against LinkedIn’s assertion that an injunction threatened its members’ privacy and therefore put at risk the goodwill that LinkedIn had developed with its members.

 

The panel concluded that hiQ showed a sufficient likelihood of establishing the elements of its claim for intentional interference with contract, and it raised a serious question on the merits of LinkedIn’s affirmative justification defense. Further, hiQ raised serious questions about whether LinkedIn could invoke the CFAA to preempt hiQ’s possibly meritorious tortious interference claim. The CFAA prohibits accessing a “protected computer” without authorization. The panel concluded that to scrape LinkedIn data, hiQ needed to access LinkedIn servers, which were “protected computers.” At issue was whether, once hiQ received LinkedIn’s cease-and-desist letter, any further scraping and use of LinkedIn’s data was “without authorization” within the meaning of the CFAA. The panel concluded that hiQ raised a serious question as to whether the CFAA “without authorization” concept is inapplicable where, as here, prior authorization is not generally required but a particular person—or bot—is refused access. The panel concluded that the reasoning of Van Buren reinforced its interpretation of the CFAA, although Van Buren did not directly address the CFAA’s “without authorization” clause, but rather considered the statute’s “exceeds authorized access” clause.

 

Finally, the panel concluded that the district court properly determined that, on balance, the public interest favored hiQ’s position.

 

The panel affirmed the district court’s determination that hiQ had established the elements required for a preliminary injunction and remanded for further proceedings.

 

HiQ is a data analytics company founded in 2012. Using automated bots, it scrapes information that LinkedIn users have included on public LinkedIn profiles, including name, job title, work history, and skills. It then uses that information, along with a proprietary predictive algorithm, to yield “people analytics,” which it sells to business clients.

 

 

In May 2017, LinkedIn sent hiQ a cease-and-desist letter, asserting that hiQ was in violation of LinkedIn’s User Agreement and demanding that hiQ stop accessing and copying data from LinkedIn’s server. The letter stated that if hiQ accessed LinkedIn’s data in the future, it would be violating state and federal law, including the CFAA, the Digital Millennium Copyright Act (“DMCA”), California Penal Code § 502(c), and the California common law of trespass. The letter further stated that LinkedIn had “implemented technical measures to prevent hiQ from accessing, and assisting others to access, LinkedIn’s site, through systems that detect, monitor, and block scraping activity.”

 

 

HiQ’s response was to demand that LinkedIn recognize hiQ’s right to access LinkedIn’s public pages and to threaten to seek an injunction if LinkedIn refused. A week later, hiQ filed an action, seeking injunctive relief based on California law and a declaratory judgment that LinkedIn could not lawfully invoke the CFAA, the DMCA, California Penal Code § 502(c), or the common law of trespass against it. HiQ also filed a request for a temporary restraining order, which the parties subsequently agreed to convert into a motion for a preliminary injunction.

 

 

The district court granted hiQ’s motion. It ordered LinkedIn to withdraw its cease-and-desist letter, to remove any existing technical barriers to hiQ’s access to public profiles, and to refrain from putting in place any legal or technical measures with the effect of blocking hiQ’s access to public profiles. LinkedIn timely appealed.

 

 

We begin with the likelihood of irreparable injury to hiQ if preliminary relief were not granted. “Monetary injury is not normally considered irreparable.” Los Angeles Mem’l Coliseum Comm’n v. Nat’l Football League, 634 F.2d 1197, 1202 (9th Cir. 1980). Nonetheless, “the threat of being driven out of business is sufficient to establish irreparable harm.” Am. Passage Media Corp. v. Cass Commc’ns, Inc., 750 F.2d 1470, 1474 (9th Cir. 1985).

 

 

B. Balance of the Equities

 

Next, the district court “balanced the interests of all parties and weighed the damage to each in determining the balance of the equities.” CTIA - The Wireless Ass’n v. City of Berkeley, Calif., 928 F.3d 832, 852 (9th Cir. 2019) (internal quotation marks and citation omitted). Again, it did not abuse its discretion in doing so.

 

 

We conclude that the district court’s determination that the balance of hardships tips sharply in hiQ’s favor is not “illogical, implausible, or without support in the record.” Kelly, 878 F.3d at 713.

 

 

C. Likelihood of Success 

 

Because hiQ has established that the balance of hardships tips decidedly in its favor, the likelihood-of-success prong of the preliminary injunction inquiry focuses on whether hiQ has raised “serious questions going to the merits.” Alliance for the Wild Rockies, 632 F.3d at 1131. It has.

 

 

1.   Tortious Interference with Contract

 

HiQ alleges that LinkedIn intentionally interfered with hiQ’s contracts with  third parties. “The elements which a plaintiff must plead to state the cause of action for intentional interference with contractual relations are (1) a valid contract between plaintiff and a third party; (2) defendant’s knowledge of this contract; (3) defendant’s intentional acts designed to induce a breach or disruption of the contractual relationship; (4) actual breach or disruption of the contractual relationship; and (5) resulting damage.” Pac. Gas & Elec. Co. v. Bear Stearns & Co., 50 Cal. 3d 1118, 1126 (1990).

 

 

Under California law, tortious interference with contract claims are not limited to circumstances in which the defendant has caused the third party with whom the plaintiff has contracted to breach the agreement. “The most general application of the rule is to cases where the party with whom the plaintiff has entered into an agreement has been induced to breach it, but the rule is also applicable where the plaintiff’s performance has been prevented or rendered more expensive or burdensome and where he has been induced to breach the contract by conduct of the defendant, such as threats of economic reprisals.” Lipman v. Brisbane Elementary Sch. Dist., 55 Cal. 2d 224, 232 (1961), abrogated on other grounds by Brown v. Kelly Broad. Co., 48 Cal. 3d 711, 753 n. 37 (1989); see also Pac. Gas & Elec. Co., 50 Cal. 3d at 1129 (“We have recognized that interference with the plaintiff’s performance may give rise to a claim for interference with contractual relations if plaintiff’s performance is made more costly or more burdensome.”).

 

 

Third, LinkedIn’s threats to invoke the CFAA and implementation of technical measures selectively to ban hiQ bots could well constitute “intentional acts designed to induce a breach or disruption” of hiQ’s contractual relationships with third parties. Pac. Gas & Elec. Co., 50 Cal.  3d at 1126; cf. Winchester Mystery House, LLC v. Global Asylum, Inc., 210 Cal. App. 4th 579, 597 (2012) (indicating that “cease-and-desist letters . . . referring to a contractual or other economic relationship between plaintiff and any third party” could “establish . . . the . . . intent element of the interference claim”).

 

 

Under California law, a legitimate business purpose can indeed justify interference with contract, but not just any such purpose suffices. See id. at 55–56. Where a contractual relationship exists, the societal interest in “contractual stability is generally accepted as of greater importance than competitive freedom.” Imperial Ice Co. v. Rossier, 18 Cal. 2d 33, 36 (1941). Emphasizing the “distinction between claims for the tortious disruption of an existing contract and claims that a prospective contractual or economic relationship has been interfered with by the defendant,” the California Supreme Court instructs that we must “bring a greater solicitude to those relationships that have ripened into agreements.” Della Penna v. Toyota Motor Sales, U.S.A., Inc., 11 Cal. 4th 376, 392 (1995). Thus, interference with an existing contract is not justified simply because a competitor “seeks to further his own economic advantage at the expense of another.” Imperial Ice, 18 Cal. 2d at 36; see id. at 37 (“A party may not . . . under the guise of competition . . . induce the breach of a competitor’s contract in order to secure an economic advantage.”). Rather, interference with contract is justified only when the party alleged to have interfered acted “to protect an interest that has greater social value than insuring the stability of the contract” interfered with. Id. at 35.

 

 

(…) Second, LinkedIn’s means of interference is likely not a “recognized   trade practice” as California courts have understood that term. “Recognized trade practices” include such activities as “advertising,” “price-cutting,” and “hiring the employees of another for use in the hirer’s business,” Buxbom, 23 Cal. 2d at 546–47—all practices which may indirectly interfere with a competitor’s contracts but do not fundamentally undermine a competitor’s basic business model. LinkedIn’s proactive technical measures to selectively block hiQ’s access to the data on its site are not similar to trade practices previously recognized an acceptable justifications for contract interference.

 

 

(…) LinkedIn has only a non-exclusive license to the data shared on its platform, not an ownership interest.

 

 

 

1.   Computer Fraud and Abuse Act (CFAA)

 

 

Our inquiry does not end, however, with the state law tortious interference claim. LinkedIn argues that even if hiQ can show a likelihood of success on any of its state law causes of action, all those causes of action are preempted by the CFAA, 18 U.S.C. § 1030, which LinkedIn asserts that hiQ violated. The CFAA states that “whoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer . . . shall be punished” by fine or imprisonment. 18 U.S.C. § 1030(a)(2)(C). The term “protected computer” refers to any computer “used in or affecting interstate or foreign commerce or communication,” 18 U.S.C. § 1030(e)(2)(B)—effectively any computer connected to the Internet, see United States v. Nosal (Nosal II), 844 F.3d 1024, 1050 (9th Cir. 2016), cert. denied, 138 S. Ct.  314 (2017)—including servers, computers that manage network resources and provide data to other computers. LinkedIn’s computer servers store the data members share on LinkedIn’s platform and provide that data to users who request to visit its website. Thus, to scrape LinkedIn data, hiQ must access LinkedIn servers, which are “protected computers.” See Nosal II, 844 F.3d at 1050. The pivotal CFAA question here is whether once hiQ received LinkedIn’s cease-and-desist letter, any further scraping and use of LinkedIn’s data was “without authorization” within the meaning of the CFAA and thus a violation of the statute. 18 U.S.C. § 1030(a)(2). If so, LinkedIn maintains, hiQ could have no legal right of access to LinkedIn’s data and so could not succeed on any of its state law claims, including the tortious interference with contract claim we have held otherwise sufficient for preliminary injunction purposes.

 

 

We have held in another context that the phrase “‘without authorization’ is a non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.” Nosal II, 844 F.3d at 1028. Nosal II involved an employee accessing without permission an    employer’s private computer for which access permissions in the form of user accounts were required. Id. at 1028–29. Nosal II did not address whether access can be “without authorization” under the CFAA where, as here, prior authorization is not generally required, but a particular person—or  bot—is refused access. HiQ’s position is that Nosal II is consistent with the conclusion that where access is open to the general public, the CFAA “without authorization” concept is inapplicable. At the very least, we conclude, hiQ has raised a serious question as to this issue. First, the wording of the statute, forbidding “access . . . without authorization,” 18 U.S.C. § 1030(a)(2), suggests a baseline in which access is not generally available and so permission is ordinarily required. “Authorization” is an affirmative notion, indicating that access is restricted  to those specially recognized or admitted. See, e.g., Black’s Law Dictionary (11th ed. 2019) (defining “authorization” as “official permission to do something; sanction or warrant”). Where the default is free access without authorization, in ordinary parlance one would characterize selective denial of access as a ban, not as a lack of “authorization.” Cf. Blankenhorn v. City of Orange, 485 F.3d 463, 472 (9th Cir. 2007) (characterizing the exclusion of the plaintiff in particular from a shopping mall as “banning”).

 

 

In recognizing that the CFAA is best understood as an anti-intrusion statute and not as a “misappropriation statute,” Nosal I, 676 F.3d at 857–58, we rejected the contract-based interpretation of the CFAA’s “without authorization” provision adopted by some of our sister circuits. Compare Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1067 (9th Cir. 2016), cert. denied, 138 S. Ct. 313 (2017) (“A violation of the terms of use of a website—without more—cannot establish liability under the CFAA.”); Nosal I, 676 F.3d at 862 (“We remain unpersuaded by the decisions of our sister circuits that interpret the CFAA broadly to cover violations of corporate computer use restrictions or violations of a duty of loyalty.”) (…).

 

 

(…) For all these reasons, it appears that the CFAA’s prohibition on accessing a computer “without authorization” is violated when a person circumvents a computer’s generally applicable rules regarding access permissions, such as username and password requirements, to gain access to a computer. It is likely that when a computer network generally permits public access to its data, a user’s accessing that publicly available data will not constitute access without authorization under the CFAA. The data hiQ seeks to access is not owned by LinkedIn and has not been demarcated by LinkedIn as private using such an authorization system. HiQ has therefore raised serious questions about whether LinkedIn may invoke the CFAA to preempt hiQ’s possibly meritorious tortious interference claim.

 

 

 

(U.S. Court of Appeals for the Ninth Circuit, April 18, 2022, HIQ Labs, Inc. v. LinkedIn Corp., Docket No. 17-16783, for Publication)

Tuesday, April 12, 2022

Made in USA Labeling Rule

Labeling

 

Made in USA Labeling Rule

 

U.S. Origin Claims

 

Section 5 of the FTC Act

 

Consumer Law

 

Import

 

 

 

FTC Enforces New Made in USA Rule against Lithionics and Owner Steven Tartaglia for Falsely Labeling Foreign-Made Batteries as American

 

April 13, 2022

Republication

 

 

Order Requires Lithionics Battery LLC And Tartaglia To Pay Civil Penalty, Notify Consumers, and Stop Making Bogus Made in USA Claims.

The Federal Trade Commission (FTC) (…) used its authority under the Made in USA Labeling Rule, which took effect on Aug. 13, 2021, to bring a complaint against Lithionics Battery LLC and its owner, Steven Tartaglia for illegally misrepresenting that its lithium ion cells are made in the United States. The FTC’s complaint alleges that, since at least 2018, Lithionics has falsely labeled its battery products with an American flag image surrounded by the words “Made in U.S.A.,” often accompanied by the statement “Proudly Designed and Built in USA,” when these products are primarily made overseas. The Commission is asking the court to order Lithionics and Tartaglia to stop making deceptive Made in USA claims and pay a penalty for Lithionics’ past claims.

"As our country works to onshore production of lithium ion batteries, it’s critical that honest businesses have a chance to compete, and that consumers can buy American,” said Sam Levine, Director of the FTC’s Bureau of Consumer Protection. “Falsely labeling batteries as made in the United States is against the law, and the FTC is using its new Made in USA rule to make sure this misconduct comes with a price."

Florida-based Lithionics designs and sells battery products for recreational vehicles, amusement park rides, marine applications, and low-speed electric vehicles. Although the defendants have repeatedly represented that their battery, battery module, and battery management system products are all or virtually all made in the United States, in fact all Lithionics battery and battery module products incorporate imported lithium ion cells, and all Lithionics battery management systems incorporate significant imported components.

Photographs of products bearing this label and other Made in USA claims appeared on the company website, on its social media accounts, and in mail order catalogs, according to the complaint. YouTube videos featured Tartaglia and other employees printing Made in USA labels and putting them on Lithionics products. Lithionics published a chart in its marketing materials juxtaposing its own products with “imports,” and highlighting “advantages of Lithionics battery systems” over imported competing products. Lithionics also misrepresented in mail order catalogues that its products were made in the United States.

Under the Made in USA Labeling Rule, marketers are prohibited from labeling products as “Made in USA” unless the final assembly or processing, and all significant processing that goes into the products occur in the United States; and unless all or virtually all ingredients or components of the products are made and sourced in the United States. The rule also requires all “Made in USA” labels appearing in mail order catalogues to be truthful and non misleading.

The complaint also alleges that Tartaglia and Lithionics also violated Section 5 of the FTC Act since 2018 by misrepresenting that their goods are all or virtually all made in the United States.

Enforcement Action

The proposed order settling the FTC’s complaints against Lithionics and Tartaglia prohibit the conduct alleged in the complaint. Lithionics and Tartaglia must:

  • Shut down bogus Made in USA claims.  Stop claiming that products are made in the United States unless they can show that the product’s final assembly or processing—and all significant processing—takes place in the United States, and that all or virtually all ingredients or components of the product are made and sourced in the United States.
  • Pay civil penalties: Tartaglia and Lithionics must pay civil penalties of over $100,000, equal to three times Lithionics’ profits attributable to the illegal activity.

The FTC’s Enforcement Policy Statement on U.S. Origin Claims provides further guidance on making non-deceptive “Made in USA” claims. 

The Commission vote to authorize the staff to refer the complaint to the DOJ and to approve the proposed consent decree was 4-0. The DOJ filed the complaint and proposed consent decree on behalf of the Commission in U.S. District Court for the Middle District of Florida.

NOTE: The Commission authorizes the filing of a complaint when it has “reason to believe” that the named defendants are violating or are about to violate the law and it appears to the Commission that a proceeding is in the public interest. Consent decrees have the force of law when approved and signed by the District Court judge.

 

Related Cases

Lithionics Battery, LLC, In the Matter of