New Touch Digital Inc v. Cabral

CourtDistrict Court, District of Columbia
DecidedOctober 7, 2020
DocketCivil Action No. 2020-1878
StatusPublished

This text of New Touch Digital Inc v. Cabral (New Touch Digital Inc v. Cabral) is published on Counsel Stack Legal Research, covering District Court, District of Columbia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
New Touch Digital Inc v. Cabral, (D.D.C. 2020).

Opinion

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

NEW TOUCH DIGITAL INC,

Plaintiff, v. No. 20-cv-1878 (DLF) VICTOR CHRISTOPHER CABRAL,

Defendant.

MEMORANDUM OPINION AND ORDER

Before the Court is defendant Victor Cabral’s Motion to Dismiss, Dkt. 12. For the

reasons that follow, the Court will deny the motion.

This case arises out of a dispute between New Touch Digital and its former Chief

Technology Officer, Victor Cabral. Compl. ¶ 1, Dkt. 1. While at New Touch Digital, Cabral

used his personal laptop for company-related work. Id. ¶ 22. After he resigned from his

position, he took important company data stored on the laptop with him. Id. ¶¶ 76–79. New

Touch Digital repeatedly asked Cabral to return the company’s intellectual property. Id. ¶¶ 79,

81, 85. However, Cabral did not turn over certain identification numbers and passwords.

Id. ¶¶ 78–80, 82–83. Instead, his counsel responded to New Touch Digital with the following:

“in response to your letter claiming [Cabral] tortuously retained Company property, he wiped

his personal laptop clean of any and all New Touch data, passwords, and other claimed

proprietary information.” Id. ¶¶ 86–87.

New Touch Digital alleges that it has suffered substantial harm because of this

“wiping” of its data, including a significant delay in New Touch Digital’s clinical trials for one

of its products. Id. ¶ 91. Thus, New Touch Digital brought this suit alleging that Cabral violated the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, along with several

state law claims. Compl. ¶ 1.

Cabral has filed a motion to dismiss under Rule 12(b)(6) of the Federal Rules of Civil

Procedure, alleging that New Touch Digital failed to state a claim upon which relief can be

granted. Fed. R. Civ. P. 12(b)(6). To survive a Rule 12(b)(6) motion, a complaint must contain

factual matter sufficient to “state a claim to relief that is plausible on its face.” Bell Atl. Corp. v.

Twombly, 550 U.S. 544, 570 (2007). A facially plausible claim is one that “allows the court to

draw the reasonable inference that the defendant is liable for the misconduct alleged.” Ashcroft v.

Iqbal, 556 U.S. 662, 678 (2009). This standard does not amount to a specific probability

requirement, but it does require “more than a sheer possibility that a defendant has acted

unlawfully.” Id.; see also Twombly, 550 U.S. at 557 (“Factual allegations must be enough to raise

a right to relief above the speculative level.”). A complaint need not contain “detailed factual

allegations,” but alleging facts that are “merely consistent with a defendant’s liability . . . stops

short of the line between possibility and plausibility.” Iqbal, 556 U.S. at 678 (internal quotation

marks omitted).

Well-pleaded factual allegations are “entitled to [an] assumption of truth,” id. at 679, and

the court construes the complaint “in favor of the plaintiff, who must be granted the benefit of all

inferences that can be derived from the facts alleged,” Hettinga v. United States, 677 F.3d 471, 476

(D.C. Cir. 2012) (internal quotation marks omitted). The assumption of truth does not apply,

however, to a “legal conclusion couched as a factual allegation.” Iqbal, 556 U.S. at 678 (quotation

marks omitted). An “unadorned, the defendant-unlawfully-harmed-me accusation” is not credited;

likewise, “[t]hreadbare recitals of the elements of a cause of action, supported by mere conclusory

statements, do not suffice.” Id. Ultimately, “[d]etermining whether a complaint states a plausible

claim for relief [is] a context-specific task that requires the reviewing court to draw on its judicial

2 experience and common sense.” Id. at 679. When deciding a Rule 12(b)(6) motion, the court may

consider only the complaint itself, documents attached to the complaint, documents incorporated

by reference in the complaint, and judicially noticeable materials. EEOC v. St. Francis Xavier

Parochial Sch., 117 F.3d 621, 624 (D.C. Cir. 1997).

New Touch Digital alleges that Cabral violated section 1030(a)(5)(A) of the CFAA, which

makes it unlawful to “knowingly cause[] the transmission of a program, information, code, or

command, and as a result of such conduct, intentionally cause[] damage without authorization, to a

protected computer.” 18 U.S.C. § 1030(a)(5)(A). “The CFAA is a criminal statute; however,

subsection (g) of the statute provides a civil cause of action to any person who suffers damage or

loss by reason of a violation’ of the CFAA.” Lewis-Burke Assocs., LLC v. Widder, 725 F. Supp.

2d 187, 191 (D.D.C. 2010) (internal quotation marks omitted). The term “protected computer” is

defined in the statute as “a computer” “which is used in or affecting interstate commerce or

communication.” 18 U.S.C. § 1030(e)(2)(B). Courts have agreed that “effectively all computers

with Internet access” constitute “protected computers” under this broad definition. See, e.g.,

United States v. Nosal, 676 F.3d 854, 859 (9th Cir. 2012) (en banc); United States v. Yücel, 97 F.

Supp. 3d 413, 418–19 (S.D.N.Y. 2015) (noting “widespread agreement in the case law on the

meaning of ‘protected computer’”); Hedgeye Risk Mgmt., LLC v. Heldman, 271 F. Supp. 3d 181,

192 (D.D.C. 2017) (same). The term “damage” means “any impairment to the integrity or

availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8).

Cabral’s primary argument is that the “purpose of the CFAA is to target hackers,”

Def.’s Mot. to Dismiss at 5, Dkt. 5-1 (quoting Hedgeye, 271 F. Supp. 3d at 195), and that the

circuits are split over what it means for an employee to access a computer without

authorization or in excess of authorization. See Def.’s Mot. to Dismiss. It is true that the

circuits are split on this interpretive question. Some courts hold that an employee’s

3 authorization to access a computer only extends so far as the employee acts according to the

interests of her employer. See Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 420–421 (7th

Cir. 2006); see also Widder, 725 F. Supp. 2d at 191 (noting this line of cases). Meanwhile,

another line of cases takes a broader view of authorization to access, holding that the plain

language of the CFAA requires that when “an employer gives an employee permission to use

[a computer],” the employer is giving that “employee ‘authorization’ to access,” regardless of

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Bell Atlantic Corp. v. Twombly
550 U.S. 544 (Supreme Court, 2007)
Ashcroft v. Iqbal
556 U.S. 662 (Supreme Court, 2009)
United States v. Nosal
676 F.3d 854 (Ninth Circuit, 2012)
Hettinga v. United States
677 F.3d 471 (D.C. Circuit, 2012)
International Airport Centers, L.L.C. v. Jacob Citrin
440 F.3d 418 (Seventh Circuit, 2006)
LVRC HOLDINGS LCC v. Brekka
581 F.3d 1127 (Ninth Circuit, 2009)
LEWIS-BURKE ASSOCIATES, LLC v. Widder
725 F. Supp. 2d 187 (District of Columbia, 2010)
Hedgeye Risk Management, LLC v. Heldman
271 F. Supp. 3d 181 (District of Columbia, 2017)
United States v. Yucel
97 F. Supp. 3d 413 (S.D. New York, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
New Touch Digital Inc v. Cabral, Counsel Stack Legal Research, https://law.counselstack.com/opinion/new-touch-digital-inc-v-cabral-dcd-2020.