Civil Actions for the Misappropriation of Electronic Data: The Missouri and Federal Computer Tampering Acts

Size: px
Start display at page:

Download "Civil Actions for the Misappropriation of Electronic Data: The Missouri and Federal Computer Tampering Acts"

Transcription

1 I. Civil Actions for the Misappropriation of Electronic Data: The Missouri and Federal Computer Tampering Acts INTRODUCTION Virtually every business in America uses computers. And many companies allow their employees access to their computer systems remotely through Citrix, virtual private networks, or otherwise from home or offsite computers. In fact, many companies provide their employees with laptop computers or PDAs to facilitate employees ability to access and utilize company data. As a result, businesses are understandably concerned about safeguarding against the unauthorized access or misappropriation of their company s data or systems. The issue of whether an employee improperly accessed, altered, copied or downloaded computer data often arises when an employee s employment is terminated. This concern is particularly heightened when an employee accepts employment with a competitor or starts a competing business. In such a situation, the former employer may request that its information services department or a third-party computer forensics expert examine the hard drive of the departing employee s computer to determine if any computer data has been improperly accessed or taken from the employer s computer system. If it appears that there has been improper access, both federal and Missouri computer tampering statutes may provide businesses with remedies. The primary purpose of this article is to discuss these statutes, the remedies they provide, and other possible William M. Corrigan, Jr. 1 Jeffrey L. Schultz 1 causes of action for the improper access or misappropriation of data. II. CIVIL ACTION UNDER THE FED- ERAL COMPUTER FRAUD AND ABUSE ACT (CFAA) Although originally only a criminal statute, the Computer Fraud and Abuse Act (CFAA) now provides for both criminal and civil remedies. 3 The CFAA allows person[s] who suffer damage or loss by reason of computer fraud to file civil lawsuits seeking compensatory damages, injunctive relief, and other equitable relief. 4 The CFAA requires that any civil action for a violation must be brought within 2 years of the date of the act complained of or the date of the discovery of the damage. 5 Importantly, the CFAA can provide a plaintiff with a basis for federal question jurisdiction, allowing a plaintiff to bring its claims in federal court. A. Conduct Prohibited by the CFAA Among other things, 1030(a) 6 of the CFAA prohibits the following conduct: (1) [I]ntentionally access[ing] a computer without authorization or [by] exceeding authorized access and thereby obtaining information from any protected computer ; 7 or (2) [K]nowingly and with the intent to defraud, access[ing] a protected computer without authorization, or exceed[ing] 1 Mr. Corrigan is a partner at Armstrong Teasdale LLP in St. Louis. He is a past president of The Missouri Bar. Corrigan is listed in Best Lawyers in America. The authors extend their thanks to Callan F. Yeoman for the research and drafting assistance he provided for this article while participating in Armstrong Teasdale LLP s summer associate program. 2 Mr. Schultz is an associate at Armstrong Teasdale LLP in St. Louis. Schultz is engaged in the practice of business litigation, with significant experience in trade secret, non-compete, unfair competition and intellectual property matters. 3 Violent Crime Control and Law Enforcement Act of 1994, Pub. L. No , 108 Stat (1994) U.S.C. 1030(g). 5 Id. 6 It should be noted that Pub.L. No , 122 Stat. 3560, which became effective September 26, 2008, amended certain language and renumbered various sections of the CFAA U.S.C. 1030(a) and (a)(2)(c). Prior to Pub. L. No , 18 U.S.C. 1030(a)(2)(C) required that the conduct involved an interstate or foreign communication. Journal of The Missouri Bar July-August 2009 Page 172

2 authorized access, thereby further[ing] the intended fraud and obtain[ing] anything of value greater than $5,000 in any 1-year period ; 8 or (3) [K]nowingly causing the transmission of a program, information, code or command, and as a result of such conduct, intentionally caus[ing] damage without authorization, to a protected computer[.] 9 A protected computer under the CFAA is any computer which is used in or affecting interstate or foreign commerce or communication. 10 With the widespread use of and the internet, this encompasses virtually all computers. B. Establishing a Civil Action Under the CFAA The CFAA provides a civil action to [a]ny person who suffers damage or loss as a result of conduct prohibited by the CFAA. 11 Although the statute uses the conjunction or, courts disagree as to whether either damage or loss alone is sufficient to state a civil claim under the CFAA, or whether both are required. 12 Although the legislative history indicates that both are required, some courts have found otherwise. 13 Federal courts in Missouri have not resolved this dispute. 14 Thus, the safest practice is to allege both damage and loss when pleading a claim for violation of the CFAA. The CFAA defines damage as any impairment to the integrity or availability of data, a program, a system, or information. 15 In addition, the CFAA defines loss as any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service. 16 The damage and/or loss resulting from the defendant s conduct must also include one of the following elements under 18 U.S.C. 1030(c)(4)(A)(i) in order for a civil action to exist under the CFAA: 17 [L]oss to 1 or more persons during any 1-year period aggregating at least $5,000 in value; 18 [T]he modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals; [P]hysical injury to any person; [A] threat to public health or safety; 21 or [D]amage affecting a computer [system] used by or for an entity of the United States Government in furtherance of the administration of justice, national defense, or national security[.] 22 The first element loss during one year aggregating at least $5,000 is the element most likely to be present in a civil action for damages under the CFAA. Damages recoverable for a violation involving only the first element are limited to economic damages, which precludes damages for death, personal injury, mental distress, and the like. 23 C. What Constitutes Unauthorized Access or Access Exceeding Authorization? As noted in subsection A, above, violations of the CFAA generally require that the defendant access the plaintiff s computers either without authorization or that the defendant exceeds authorized access. 24 The CFAA does not define the term without authorization. However, it does provide a definition for the term exceeds authorized access. According to the CFAA, the term exceeds authorized access means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter. 25 Significantly, federal courts are not in agreement regarding whether an employee accesses a computer either without authorization or exceeds authorized access when an employee accesses an employer s computer data that he or she is otherwise permitted to access before terminating his or her employment and subsequently uses that information to benefit a competitor. 26 Some courts hold that an employee loses his right to access his employer s computer once he decides to gather or use informa U.S.C. 1030(a)(4) U.S.C. 1030(a)(5)(A) U.S.C. 1030(e)(2)(B) U.S.C. 1030(g). 12 Lasco Foods, Inc. v. Hall & Shaw Sales, Marketing, & Consulting, LLC, 600 F.Supp.2d 1045, 1050 (E.D. Mo. 2009). 13 Id. 14 Id.; see also H & R Block E. Enters., Inc. v. J & M Sec., LLC, No CV-W-DW, 2006 WL (W.D. Mo. Apr. 24, 2006) (plaintiff alleged both damages and loss and the court did not discuss whether either damages or loss alone would have been sufficient) U.S.C. 1030(e)(8) U.S.C. 1030(e)(11) U.S.C. 1030(g); P.C. Yonkers, Inc. v. Celebrations the Party and Seasonal Superstore, L.L.C., 428 F.3d 504, 512 (3rd Cir. 2005) U.S.C. 1030(c)(4)(A)(i)(I) U.S.C. 1030(c)(4)(A)(i)(II) U.S.C. 1030(c)(4)(A)(i)(III) U.S.C. 1030(c)(4)(A)(i)(IV) U.S.C. 1030(c)(4)(A)(i)(V). 23 Creative Computing v. Getloaded.com, L.L.C., 386 F.3d 930, 935 (9th Cir. 2004); 18 U.S.C. 1030(g) U.S.C. 1030(a)(2), 1030(a)(4), 1030(a)(5)(A), 1030(a)(5)(B) and (C); Lasco Foods, at 1053; Condux Int l, Inc. v. Haugum, Civil No , slip.op., 2008 WL , at *3 (D. Minn. Dec. 15, 2008). It should be noted, however, that 18 U.S.C. 1030(a)(5)(A) is predicated on unauthorized damage, not unauthorized access. See Condux Int l, Inc., 2008 WL , at * U.S.C. 1030(e)(6). Journal of The Missouri Bar July-August 2009 Page 173

3 tion for an improper purpose. These courts generally reason that any access after this point is without authorization or in excess of authorized access under the statute, even if the employee is still employed in a position that would otherwise allow him to access the computer. 27 Other federal district courts have determined that what an employee does, or intends to do, with information accessed on a computer is irrelevant under the statute so long as the employee remained within the employee s authorized access when the employee obtained the information. These courts generally reason that the CFAA is meant to regulate whether access was authorized, not whether the use (or misuse) of the information accessed was authorized. 28 The Seventh Circuit Court of Appeals, in International Airport Centers, L.L.C. v. Citrin, concluded that an employee acted without authorization when, while still employed by plaintiff but after deciding that he was going to quit and pursue interests adverse to plaintiff, he accessed plaintiff s computer to destroy files. 29 The Citrin court noted that the difference between exceeded authorized access and without authorization is paper thin. 30 The court reasoned that the employee s breach of the duty of loyalty terminated his authority to access his employer s computer, regardless of the fact that he was still employed at the time he accessed the computer. Thus, accessing the computer for an improper purpose was without authorization. 31 Under somewhat similar circumstances, the U.S. District Court for the District of Connecticut in Modis, Inc. v. Bardelli used different reasoning than the Citrin court to conclude that a plaintiff properly pleaded that the defendant, a former employee of plaintiff, exceeded her authorized access. 32 The plaintiff claimed that the defendant had obtained and used information from plaintiff s database for the benefit of defendant s new employer. 33 Defendant claimed that she was authorized as an employee of plaintiff to access the database at issue. 34 Unlike in Citrin, the defendant had agreed in an employment agreement to refrain from taking or reproducing or allowing to be taken or reproduced any [plaintiff s] Property except in furtherance of [plaintiff s] Business. 35 The court held that plaintiff sufficiently pleaded that the defendant exceeded her authorized access when she used her access for the purpose of misappropriating plaintiff s confidential information because under the agreement her access was limited to access in furtherance of [plaintiff s] Business. 36 Contrary to the results in Citrin and Bardelli, some federal courts have reached entirely different conclusions in cases with similar facts, holding that the CFAA is not implicated by the misuse or misappropriation of information that a defendant was permitted to access while employed by the plaintiff. For example, in Shamrock Foods Co. v. Gast, the U.S. District Court for the District of Arizona held that the defendant did not access plaintiff s information without authorization or in a manner that exceeded authorization when, while still employed by plaintiff, the defendant ed plaintiff s information to himself and provided it to his new employer. 37 The Shamrock Foods court adopted a narrow reading of the CFAA s authorization requirement, reasoning that the CFAA is intended to prevent the unauthorized accessing of information stored on a computer, not the subsequent use or misuse of the information after it has been properly accessed by an authorized user. 38 Recently, two district courts within the Eighth Circuit have agreed with the narrower reading of the CFAA. In Condux International, Inc. v. Haugum, the U.S. District Court for the District of Minnesota held that the plaintiff s allegations that defendant, plaintiff s former vice president, downloaded data for use in a competing business and attempted to delete evidence of his download while he was still employed by plaintiff were insufficient to establish that the defendant acted without authorization or exceeded his authorized access. 39 The defendant had been given access to plaintiff s computer system and confidential information while he was plaintiff s vice president. 40 The court agreed with the line of cases holding that the CFAA is implicated only by the unauthorized access, obtainment, or alteration of information, not the misuse or misappropriation of information obtained with permission. 41 The Condux court reasoned that this view is consistent with the plain language of the CFAA, the legislative history of the CFAA, and the principles of statutory construction. 42 Likewise, the U.S. District Court for 26 See Condux Int l, Inc., 2008 WL , at * 4 (observing that courts have split on the question of whether an employee with an improper purpose may be held civilly liable under the CFAA for accessing computer information that he is otherwise permitted to access within the scope of his employment, and collecting cases on both sides of the split); Shamrock Foods Co. v. Gast, 535 F.Supp.2d 962, (D.Ariz. 2008) (observing that there is a split and collecting cases). 27 See, e.g., Int l Airport Centers, L.L.C. v. Citrin, 440 F.3d 418, 420 (7th Cir. 2006); see also Condux Int l, Inc., 2008 WL , at * 4 (collecting cases). 28 See, e.g., Condux Int l, Inc., 2008 WL , at * 4-*5; Shamrock Foods Co. v. Gast, 535 F. Supp.2d 962, 965 (D. Ariz. 2008). 29 Citrin, 440 F.3d at Id. 31 Id. 32 Modis, Inc. v. Bardelli, 531 F. Supp.2d 314, 318 (D. Conn. 2008). 33 Id. at Id. at Id. 36 Id. 37 Shamrock Foods Co., 535 F. Supp.2d at 963, Id. at Condux, Int l, Inc., 2008 WL , at *1, *8. 40 Id. at *1, *4. 41 Id. at * Id. at * 4-*5. Journal of The Missouri Bar July-August 2009 Page 174

4 the Eastern District of Missouri, in Lasco Foods, Inc. v. Hall & Shaw Sales, Marketing, & Consulting, LLC, dismissed a purported CFAA claim that was based on the misuse or misappropriation of information by former employees. 43 In Lasco Foods, two former employees of plaintiff allegedly downloaded or copied information and deleted information from plaintiff s computer prior to leaving plaintiff s employment to form a competing business. 44 The Lasco Foods court dismissed the CFAA claim on the grounds that plaintiff failed to properly allege the defendants accessed plaintiff s information without authorization. 45 In support of its decision, the Lasco Foods court cited Condux for the proposition that where the heart of the dispute was not the access of the confidential business information but rather the alleged subsequent misuse or misappropriation of that information, plaintiff failed to state a claim under CFAA. 46 In some instances, the former employee may try to access the former employer s proprietary information after his employment has been terminated. There appears to be no dispute that these cases reflect the type of trespassing and hacking that the CFAA is intended to prevent. For example, in EF Cultural Travel BV v. Explorica, Inc., the First Circuit determined that the use of a computer software program by a competitor to glean prices from plaintiff s website, in order to allow systematic undercutting of those prices, exceeded authorized access within the meaning of the CFAA. 47 The competitor employed a number of plaintiff s former employees, at least one of whom had signed a confidentiality agreement with plaintiff and used his technical knowledge of plaintiff s website and his knowledge of plaintiff s proprietary codes to help develop the software program for his new employer. 48 The court concluded that this action exceeded authorized access. 49 It is important to note that the circumstances constituting unauthorized access for purposes of the CFAA are not limited only to those in which an employee or former employee accesses computer data belonging to a former employer. For example, in America Online, Inc. v. LCGM, Inc., the court determined that customers of America Online exceeded their authorized access when they maintained accounts with America Online for the purpose of using extractor software programs in chat rooms to harvest addresses of other AOL customers in order to send bulk s to those customers. 50 The court reasoned that the harvesting of other addresses exceeded authorized access because such activity was not allowed by AOL s terms of service that were provided to customers. 51 A plaintiff is not required to go so far as to provide expert testimony that shows that a protected computer was accessed without authorization and something of value was taken. 52 In the absence of expert testimony, testimony from others who, for example, witnessed the printing of information or provided passwords, may be sufficient to allow a jury to reasonably find that a computer was accessed in violation of the CFAA. 53 The evidence for a CFAA claim, however, must consist of more than an attenuated series of inferences-on-inferences based on circumstantial evidence. 54 For example, one court determined that there was insufficient evidence to support a claim that plaintiffs former joint venturer had accessed plaintiffs computers where the evidence before the court was merely circumstantial, based on the former joint venturer s undisputed physical access to the plaintiffs computers and the frequent crashing and malfunctioning of plaintiffs computers (resulting in [a] loss of data). 55 In that case, the plaintiffs presented no evidence to demonstrate either unauthorized access in general or any access by the [venturer] leading to destruction of [the developer s] software or hardware. 56 The court found the utter lack of any expert opinion evidence supporting the [plaintiffs ] speculative assertions was fatal to plaintiffs case. 57 While an expert may not be required, the better course is to have a retained or non-retained computer forensics expert explain the analysis of the computer system that was performed to determine that the system was accessed and whether data was misappropriated. D. What Constitutes Intent for 1030(a)(2)(C) and Intent to Defraud for 1030(a)(4)? The CFAA, 1030(a)(2)(C), requires that the defendant intentionally access the plaintiff s computer system. Normally, whether the defendant acted intentionally will not be a contested issue. One case held that the intent element for 18 U.S.C. 103(a)(2)(C) was sufficiently pleaded when plaintiffs alleged that a web site operator intentionally placed cookies 43 Lasco Foods, 600 F.Supp.2d at Id. at Id. It should be noted that the plaintiff in Lasco Foods did not respond to defendants argument that plaintiff failed to properly allege that defendants accessed information without authorization as required under the CFAA. Id. at n.6 46 Id. 47 EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001). 48 Id. at Id. at America Online Inc. v. LCGM, Inc., 46 F. Supp.2d 444, 448 (E.D. Va. 1998). 51 Id. at Hanger Prosthetics & Orthotics, Inc. v. Capstone Orthopedic, Inc., No. 2:06-cv-2879-GEB-KJM, 2008 WL , 556 F. Supp.2d 1122, (E.D. Cal. June 13, 2008). 53 Id. at Expert Bus. Sys., LLC v. BI4CE, Inc., 411 F. Supp.2d 601, 605 (D. Md. 2006). 55 Id. at Id. 57 Id. at Journal of The Missouri Bar July-August 2009 Page 175

5 on visiting users computers for [the] purpose of monitoring [the plaintiffs ] web activity. 58 Under 1030(a)(4), the defendant must have an intent to defraud. The intent to defraud requirement simply requires that the defendant have intended some wrongdoing and does not require proof of common law fraud. 59 In Hanger Prosthetics & Orthotics, Inc. v. Capstone Orthopedic, Inc., the court held that a jury could reasonably infer that the defendants had accessed their employer s computer with the intent to defraud because the evidence showed that a patient list owned by the former employer was intentionally accessed by the defendants who were employees of the plaintiff, the list was never again seen in the office, and the patients on the list began using the competitor s company after the defendant employees terminated their employment. 60 The court concluded this evidence was sufficient for the jury to establish that the defendant employees had engaged in wrongdoing by accessing the list. 61 E. The $5,000 Loss Requirement - 18 U.S.C. 1030(c)(4)(A)(i)(I) As noted above, the most likely element under 1030(c)(4)(A)(i)(I) to be alleged in order to bring a civil action under the CFAA is the requirement of loss to 1 or more persons aggregating at least $5,000 in value. 62 The term loss is defined in the CFAA to include any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service. 63 The U.S. District Court for the Western District of Missouri has been lenient in its analysis of whether a plaintiff has sufficiently pleaded the requisite $5,000 loss under the statute. In H & R Block Eastern Enterprises, Inc. v. J & M Securities, LLC, the court held that a plaintiff sufficiently alleged damages and losses of at least $5,000 when the complaint simply stated that [a]s a result of defendants unauthorized, intentional access of [plaintiff s] protected computer system, [plaintiff] has suffered damages and a loss of no less than $5,000.00, including but not limited to its costs to respond to this offense. 64 The court noted, however, that it would consider [p]ersuasive authority narrowly construing compensable losses under the CFAA... when the facts are developed. 65 Similar to the analysis in H&R Block, some courts also have held that plaintiffs sufficiently allege damages when they claim loss due to a former employee giving confidential and proprietary information to competitors. 66 For example, the U.S. District Court for the District of Kansas, in Resource Center for Independent Living, Inc. v. Ability Resources, Inc., held that the plaintiff made a valid claim when it alleged loss of confidential and proprietary information for the benefit of [defendants ] competing enterprise. 67 Other courts, however, have focused on the language in the CFAA requiring that the loss be incurred because of interruption of service. 68 The U.S. District Court for the Eastern District of Missouri, in Lasco Foods, Inc. v. Hall & Shaw Sales, Marketing, & Consulting, LLC, expressly stated that under the CFAA a loss must result from an interruption in service. 69 In Lasco Foods, plaintiff alleged that defendants retained plaintiff s computers and electronic information and deleted some of plaintiff s information. Plaintiff further alleged that there was a 108-day gap in time between when plaintiff demanded the return of the computers and when plaintiff actually returned the computers. The court found this was sufficient to allege a loss from interruption of service. 70 In addition, plaintiff had to hire a computer expert to review defendants computers when they were returned to determine what information was deleted. The cost of these investigations also constituted a loss from interruption of service. 71 III. MISSOURI COMPUTER TAMPER- ING STATUTES A. Overview Similar to the CFAA, Missouri statutes provide that a civil lawsuit may be brought against individuals who tamper with computer data, computer equipment, or the users of computers. Like the CFAA, the Missouri computer tampering statutes (MCTS) contain both criminal and civil provisions. The criminal provisions are set forth in , , and , RSMo.; the civil provision is set forth in , RSMo. 58 Cookies are electronic files that online companies sometimes implant on a user s computer when the user visits a website. Cookies collect information about the user. In re Intuit Privacy Litigation, 138 F. Supp.2d 1272, 1274 (C.D. Cal. 2001). 59 Hanger Prosthetics & Orthotics, Inc. v. Capstone Orthopedic, Inc., No. 2:06-cv-2879-GEB-KJM, 2008 WL , 556 F. Supp.2d 1122, 1131 (E.D. Cal. June 13, 2008). 60 Id. at Id U.S.C. 1030(c)(4)(A)(i)(I) and 1030(g) U.S.C. 1030(e)(11). 64 See H & R Block Eastern Enterprises, Inc., 2006 WL , at *2, *4. 65 Id. at *4. 66 Resource Ctr. for Independent Living, Inc. v. Ability Resources, Inc., 534 F. Supp.2d 1204, 1211 and 1211 n.30 (D. Kan. 2008) (collecting cases from other courts holding that allegations of loss of confidential and proprietary information for the benefit of a competing enterprise are sufficient to state a cause of action under the CFAA and defeat a motion to dismiss). 67 Id. at See American Family Mut. Ins. Co. v. Rickman, 554 F. Supp.2d 766, 771 (N.D. Ohio 2008); Cenveo Corp. v. CelumSolutions Software GMBH & Co. KG, 504 F. Supp.2d 574, 581 n.6 (D. Minn. 2007) (disagreeing with H&R Block, 2006 WL and similar cases and dismissing CFAA claim that did not allege interruption in service). 69 Lasco Foods, 600 F.Supp.2d at Id. at Id. Journal of The Missouri Bar July-August 2009 Page 176

6 B. Statutory Scheme Section , RSMo,. establishes a civil action for compensatory damages to the owner (or lessee) of a computer system, network, program, service, or data against any person who violates (tampering with computer data), (tampering with computer equipment), and (tampering with computer users). [C]ompensatory damages includ[e] any expenditures reasonably and necessarily incurred by the owner or lessee to verify that a computer system, network, program, service, or data was not altered, damaged, or deleted by the access. 72 In addition, the court may award attorney s fees to a prevailing plaintiff. 73 Similar to the CFAA, tampering with computer data, equipment or users under the MCTS must be done knowingly, and either without authorization or without reasonable grounds to believe one has authorization. 1. Tampering with Computer Data Section , tampering with computer data, provides: 1. A person commits the crime of tampering with computer data if he knowingly and without authorization or without reasonable grounds to believe that he has such authorization: (1) Modifies or destroys data or programs residing or existing internal to a computer, computer system, or computer network; or (2) Modifies or destroys data or programs or supporting documentation residing or existing external to a computer, computer system, or computer network; or (3) Discloses or takes data, programs, or supporting documentation, residing or existing internal or external to a computer, computer system, or computer network; or (4) Discloses or takes a password, identifying code, personal identification number, or other confidential information about a computer system or network that is intended to or does control access to the computer system or network; (5) Accesses a computer, a computer system, or a computer network, and intentionally examines information about another person; (6) Receives, retains, uses, or discloses any data he knows or believes was obtained in violation of this subsection. 2. Tampering with Computer Equipment Section , tampering with computer equipment, provides: 1. A person commits the crime of tampering with computer equipment if he knowingly and without authorization or without reasonable grounds to believe that he has such authorization: (1) Modifies, destroys, daages, or takes equipment or data storage devices used or intended to be used in a computer, computer system, or computer network; or (2) Modifies, destroys, damages, or takes any computer, computer system, or computer network. 3. Tampering with Computer Users Section , tampering with computer users, provides: 1. A person commits the crime of tampering with computer users if he knowingly and without authorization or without reasonable grounds to believe that he has such authorization: (1) Accesses or causes to be accessed any computer, computer system, or computer network; or (2) Denies or causes the denial of computer system services to an authorized user of such computer system services, which, in whole or in part, is owned by, under contract to, or operated for, or on behalf of, or in conjunction with another. C. Case Law Case law addressing civil actions brought pursuant to the MCTS is sparse. In Chrysler Corporation v. Carey, Chrysler filed suit against two attorneys who formerly worked at a law firm that represented Chrysler in defending various class action lawsuits involving alleged defects in certain Chrysler vehicles. 74 After leaving the [law] firm, the two attorneys formed their own firm and agreed to serve as plaintiff s counsel in a class action against Chrysler. 75 Before their departure from their previous law firm, the attorneys took copies of various pleadings and memoranda. 76 Some of the documents taken by one of the attorneys were copied from the law firm s computer system. 77 Chrysler sued the former attorneys on a number of theories, including tampering with computer data in violation of the MCTS. The attorneys admitted that they did not have express authority to take the documents at issue, but they claim[ed] that they reasonably believed that neither Chrysler nor [the law firm] would object to their doing so. 78 One of the attorneys testified that a number of lawyers left the law firm while he was employed there, and every lawyer [that he] knew at the firm maintained a form file, considered it their personal property, and took it with them when leaving the firm. 79 The Chrysler court denied the parties cross-motions for summary judgment, concluding that there was a question of fact as to whether the attorneys had reasonable grounds to believe that the removal of the documents from the law firm s computer system was authorized Section (1), RSMo (2008). 73 Section (2), RSMo (2008). It is also important to note that violation of these statutes may constitute a misdemeanor or felony. A discussion of the criminal exposure for violating these statutes is beyond the scope of this article. 74 Chrysler Corp. v. Carey, 5 F. Supp.2d 1023, 1025 (E.D. Mo. 1998). 75 Id. at Id. at Id. 78 Id. at Id. at Id.; (1), RSMo (2008). Journal of The Missouri Bar July-August 2009 Page 177

7 In Pony Computer, Inc. v. Equus Computer Systems of Missouri, Inc., two former employees of the plaintiff had limited access to plaintiff s computer files, including customer invoices, shipping records, receiving records, credit records, and warranty records. 81 The plaintiff sued the two former employees and their current employer, a competitor, alleging a number of tort theories, including a claim under the MCTS. 82 The plaintiff claimed that the former employees disclosed confidential information while accessing the computer network in the course of their employment. In opposition to a summary judgment motion filed by the former employees, the plaintiff filed affidavits from its president and its St. Louis branch manager stating that the former employees disclosed confidential information. The district court granted summary judgment in favor of the former employees on the MCTS count. In affirming the judgment, 83 the Eighth Circuit noted that the two affidavits were conclusory, failing to enumerate specific evidence of any disclosure. 84 Because there was no independent evidence [of disclosure], other than the petitioner s unsubstantiated allegations[,] the court concluded that summary judgment was appropriate. 85 Like the CFAA, proof of the offense of tampering with computer data or computer equipment under the MCTS may involve testimony from a computer forensics expert because the method of accessing, modifying, or otherwise tampering with the data will sometimes be beyond the knowledge or understanding of any lay witnesses. IV. BREACH OF DUTY OF LOYALTY If a business learns through a forensic examination of a former employee s computer that the former employee misappropriated data to begin, or work for, a competing business, then the business, under an appropriate set of facts, also may have a cause of action against the former employee for a breach of the common law duty of loyalty. Under Missouri law, all employees owe their employers a duty of loyalty. 86 The Supreme Court of Missouri, in Scanwell Freight Express STL, Inc. v. Chan, confirmed that every employee owes his or her employer a duty of loyalty. 87 [T]he most common manifestation of the duty of loyalty is that an employee has a duty not to compete with his or her employer [during his or her employment] concerning the subject matter of the employment. 88 Therefore, although employees may plan and prepare for their competing enterprises while still employed, a breach of the duty of loyalty arises when [an] employee goes beyond the mere planning and preparation and actually engages in direct competition, which, by definition, is to gain advantage over a competitor. 89 In Scanwell, the ex-employee gave one of Scanwell s competitors confidential information about Scanwell s operations and customers while still employed. 90 Further, while still employed by Scanwell, the ex-employee secured Scanwell s office lease for its competitor. 91 The Court held that Scanwell made a submissible case for breach of the duty of loyalty because the ex-employee clearly went beyond mere planning and preparation to compete when she actually gave confidential client information to a competitor and secured her employer s office lease for the same competitor, all while working for Scanwell. 92 V. THE MISSOURI UNIFORM TRADE SECRETS ACT In some cases the Missouri Uniform Trade Secrets Act (MUTSA) also may provide a remedy for the unauthorized taking or disclosure of computer data. 93 The MUTSA provides a civil action for compensatory damages, punitive damages, and injunctive relief if the owner of the information can show: (1) that the information is a trade secret; and (2) actual or threatened misappropriation of the information. For an in-depth explanation of the MUTSA, the protections afforded by the MUTSA, and the remedies available to the owner of misappropriated trade secret information, see Trade Secret Litigation An Overview, 63 JOURNAL OF THE MISSOURI BAR. 94 VI. CONCLUSION The civil remedies under the CFAA give businesses a useful tool for protecting their electronically stored information both from outsiders who break into their networks and employees who use their access to misappropriate their employer s sensitive information. A plaintiff must show: (1) that the offender s access was either without authorization or exceeded authorized access; (2) that information was gained via intentional conduct that involved an interstate communication or that the offender was knowingly intending and furthering a fraud; and (3) that the offender s actions caused damage and a loss in excess of $5,000. In Missouri, the MCTS, the common law duty of loyalty owed by an employee to his or her employer, and the MUTSA provide businesses with additional tools for protecting their electronically stored information. When filing a claim relating to misappropriation or misuse of electronically stored information, Missouri businesses should analyze all of these causes of action as part of their claim. 81 Pony Computer, Inc. v. Equus Computer Sys. of Mo., Inc., 162 F.3d 991 (8th Cir. 1998). 82 Id. at Id. at Id. at Id. 86 Nat l Rejectors, Inc. v. Trieman, 409 S.W.2d 1, 41 (Mo. banc 1966); see also RESTATEMENT (SECOND) OF AGENCY, 396 & 393, cmt. e (1958). 87 Scanwell Freight Express STL, Inc. v. Chan, 162 S.W.3d 477, 479 (Mo. banc 2005). 88 Id. (citing RESTATEMENT (SECOND) OF AGENCY, 393, cmt. e (1958)). 89 Id. (citing RESTATEMENT (SECOND) OF AGENCY, 393, cmt. e (1958)). The Court observed that a jury instruction for breach of the duty of loyalty must set out that: (1) an employee must not act contrary to the employer s interest; (2) an employee may plan, prepare, and agree with others to compete with the current employer upon termination; and (3) an employee may not go beyond mere planning and preparation and act in direct competition with the employer while still employed by the employer. Id. at Id. at Id. 92 Id. 93 Sections , RSMo (2008). 94 William M. Corrigan, Jr. & Jeffrey L. Schultz, Trade Secret Litigation An Overview, 63 J. MO. BAR 234 (2007). Journal of The Missouri Bar July-August 2009 Page 178

Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim

Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim By Pierre Grosdidier It can be tempting to file a lawsuit against a computer trespasser or wrongdoer with a claim

More information

TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030

TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030 Computer Fraud and Abuse Act TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030 1030. Fraud and related activity in connection with computers (a)

More information

Case 2:10-cv WBS-KJM Document 21 Filed 04/29/2010 Page 1 of 16 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA.

Case 2:10-cv WBS-KJM Document 21 Filed 04/29/2010 Page 1 of 16 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA. Case :0-cv-00-WBS-KJM Document Filed 0//00 Page of 0 0 ATPAC, INC., a California Corporation, v. Plaintiff, APTITUDE SOLUTIONS, INC., a Florida Corporation, COUNTY OF NEVADA, a California County, and GREGORY

More information

v. CIVIL ACTION NO. H

v. CIVIL ACTION NO. H Rajaee v. Design Tech Homes, Ltd et al Doc. 42 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION SAMAN RAJAEE, Plaintiff, v. CIVIL ACTION NO. H-13-2517 DESIGN TECH

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA MOTOWN RECORD COMPANY, L.P. a California limited partnership; UMG RECORDINGS, INC., a Delaware corporation; SONY BMG MUSIC ENTERTAINMENT, a

More information

Trade Secrets Acts Compared to the UTSA

Trade Secrets Acts Compared to the UTSA UTSA Version Adopted 1985 version 1985 Federal 18 U.S.C. 1831-1839 Economic Espionage Act / Defend Trade Secrets Act Preamble As used in this [Act], unless the context requires otherwise: 1839. Definitions

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION JENNIFER A. INGRAM, ) ) Plaintiff, ) ) vs. ) Case No. 01-0308-CV-W-3-ECF ) MUTUAL OF OMAHA INSURANCE ) COMPANY,

More information

Corporate Litigation: Standing to Bring Consumer Data Breach Claims

Corporate Litigation: Standing to Bring Consumer Data Breach Claims Corporate Litigation: Standing to Bring Consumer Data Breach Claims Joseph M. McLaughlin * Simpson Thacher & Bartlett LLP April 14, 2015 Security experts say that there are two types of companies in the

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF HAWAII ) ) ) ) ) ) ) ) ) ) ) ) ) )

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF HAWAII ) ) ) ) ) ) ) ) ) ) ) ) ) ) IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF HAWAII PROPERTY RIGHTS LAW GROUP, P.C., an Illinois Professional Corporation, vs. Plaintiffs, SANDRA D. LYNCH, JOHN KANG, alias Lee Miller; and KEALA

More information

Georgia Computer System Protection Act

Georgia Computer System Protection Act Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia

More information

Case3:12-cv SI Document11 Filed07/13/12 Page1 of 6 UNITED STATES DISTRICT COURT

Case3:12-cv SI Document11 Filed07/13/12 Page1 of 6 UNITED STATES DISTRICT COURT Case:-cv-0-SI Document Filed0// Page of UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA 0 SHUTTERFLY, INC., v. Plaintiff, FOREVERARTS, INC. and HENRY ZHENG, Defendants. / No. CR - SI ORDER

More information

(Argued: November 8, 2012 Decided: December 26, 2012) Plaintiff-Appellant, JACKIE DEITER, Defendant-Appellee.

(Argued: November 8, 2012 Decided: December 26, 2012) Plaintiff-Appellant, JACKIE DEITER, Defendant-Appellee. --cv MacDermid, Inc. v. Deiter 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT August Term, 01 (Argued: November, 01 Decided: December, 01) Docket No. --cv MACDERMID,

More information

DAKOTA COUNTY PROPERTY RECORDS TECHNOLOGY AND INFORMATION SUBSCRIPTION AGREEMENT

DAKOTA COUNTY PROPERTY RECORDS TECHNOLOGY AND INFORMATION SUBSCRIPTION AGREEMENT DAKOTA COUNTY PROPERTY RECORDS TECHNOLOGY AND INFORMATION SUBSCRIPTION AGREEMENT THIS AGREEMENT is between the COUNTY OF DAKOTA, a political subdivision of the State of Minnesota ( COUNTY ), and (insert

More information

FEDEX SAMEDAY CITY WEB SERVICES END USER LICENSE AGREEMENT

FEDEX SAMEDAY CITY WEB SERVICES END USER LICENSE AGREEMENT FEDEX SAMEDAY CITY WEB SERVICES END USER LICENSE AGREEMENT FOR SHIPPING SERVICES WITHIN THE USA ONLY Version 3.1 February 2017 BELOW ARE THE TERMS AND CONDITIONS UNDER WHICH YOU, AS A FEDEX CUSTOMER AND/OR

More information

Case 2:13-cr KJM Document 167 Filed 06/08/16 Page 1 of 12

Case 2:13-cr KJM Document 167 Filed 06/08/16 Page 1 of 12 Case -cr-000-kjm Document Filed 0/0/ Page of Tor Ekeland (PHV) Mark Jaffe (PHV) TOR EKELAND, P.C. Plymouth Street Brooklyn, NY 0 Tel -- Fax -0- tor@torekeland.com mark@torekeland.com Jason S. Leiderman,

More information

RETS DATA ACCESS AGREEMENT

RETS DATA ACCESS AGREEMENT RETS DATA ACCESS AGREEMENT Smart MLS, Inc 860 North Main Street Ext. Wallingford, CT 06492 203-697-1006 203-697-1064 (fax) SmartMLS.com RETS Data Access Agreement rev.917 1 RETS DATA ACCESS AGREEMENT This

More information

IRB RELIANCE EXCHANGE PORTAL AGREEMENT

IRB RELIANCE EXCHANGE PORTAL AGREEMENT IRB RELIANCE EXCHANGE PORTAL AGREEMENT This Portal Access Agreement ( Agreement ) is entered into between Vanderbilt University Medical Center, a not for profit hospital system located at 11211 Medical

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS Last updated 1/16/18 Effective Date 2008 BECAUSE THESE TERMS AND CONDITIONS CONTAIN LEGAL OBLIGATIONS, PLEASE READ THEM CAREFULLY BEFORE TAKING ONE OF THE PREPARE/ENRICH WEB-BASED

More information

This Agreement was last updated on June 14th, It is effective between You and Axosoft as of the date of You accepting this Agreement.

This Agreement was last updated on June 14th, It is effective between You and Axosoft as of the date of You accepting this Agreement. GitKraken End User License Agreement The following End User License Agreement (the Agreement ) governs Your use of the Software (as defined below) provided to You by Axosoft, LLC, an Arizona limited liability

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION N2 SELECT, LLC, et al., Plaintiffs, v. No. 4:18-CV-00001-DGK N2 GLOBAL SOLUTIONS, INC., et al., Defendants. ORDER

More information

Terms of Use. 1. Limited Use

Terms of Use. 1. Limited Use Terms of Use The eaccountservices.com/gmfinancialrightnotes Internet site domain name and all materials located at and under that domain name (collectively, this Site ) and any services available on this

More information

The HIPAA E-Tool End User License and Software as a Service Agreement

The HIPAA E-Tool End User License and Software as a Service Agreement Effective Date: April 1, 2016 The HIPAA E-Tool End User License and Software as a Service Agreement The Parties This End User License and Software as a Service Agreement ( Agreement ) is a legal agreement

More information

PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE.

PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE. TERMS OF USE Effective Date: May 23, 2018 Last Revised: May 23, 2018 PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE. BY USING THE SERVICES, YOU AGREE TO THE TERMS

More information

End User License Agreement

End User License Agreement End User License Agreement Pluribus Networks, Inc.'s ("Pluribus", "we", or "us") software products are designed to provide fabric networking and analytics solutions that simplify operations, reduce operating

More information

Case 1:08-cv Document 14 Filed 07/16/2008 Page 1 of 12

Case 1:08-cv Document 14 Filed 07/16/2008 Page 1 of 12 Case 1:08-cv-03939 Document 14 Filed 07/16/2008 Page 1 of 12 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION MINTEL INTERNATIONAL GROUP, ) LTD., a United Kingdom

More information

TERMS OF USE AND LICENSE AGREEMENT BUCKEYE CABLEVISION, INC. Buckeye Remote Record. (Effective as of November 15, 2013) PLEASE READ CAREFULLY

TERMS OF USE AND LICENSE AGREEMENT BUCKEYE CABLEVISION, INC. Buckeye Remote Record. (Effective as of November 15, 2013) PLEASE READ CAREFULLY TERMS OF USE AND LICENSE AGREEMENT BUCKEYE CABLEVISION, INC. Buckeye Remote Record (Effective as of November 15, 2013) PLEASE READ CAREFULLY This Terms of Use and License Agreement (this "Agreement") is

More information

Remote Support Terms of Service Agreement Version 1.0 / Revised March 29, 2013

Remote Support Terms of Service Agreement Version 1.0 / Revised March 29, 2013 IMPORTANT - PLEASE REVIEW CAREFULLY. By using Ignite Media Group Inc., DBA Cyber Medic's online or telephone technical support and solutions you are subject to this Agreement. Our Service is offered to

More information

Agency, Code, or Contract: Determining Employees' Authorization Under the Computer Fraud and Abuse Act

Agency, Code, or Contract: Determining Employees' Authorization Under the Computer Fraud and Abuse Act Volume 107 Issue 5 2009 Agency, Code, or Contract: Determining Employees' Authorization Under the Computer Fraud and Abuse Act Katherine Mesenbring Field University of Michigan Law School Follow this and

More information

SDL Web Click Wrap DEVELOPER SOFTWARE AND DISTRIBUTION AGREEMENT RESTRICTED TO USE BY DEVELOPERS. Terms and Conditions

SDL Web Click Wrap DEVELOPER SOFTWARE AND DISTRIBUTION AGREEMENT RESTRICTED TO USE BY DEVELOPERS. Terms and Conditions SDL Web Click Wrap DEVELOPER SOFTWARE AND DISTRIBUTION AGREEMENT RESTRICTED TO USE BY DEVELOPERS Terms and Conditions 1. Your Relationship with SDL 1.1 Your use of any SDL Web software, including any web

More information

Municipal Code Online Inc. Software as a Service Agreement

Municipal Code Online Inc. Software as a Service Agreement Exhibit A Municipal Code Online Inc. Software as a Service Agreement This Municipal Code Online, Inc. Software as a Service Agreement ( SaaS Agreement ) is made and entered into on this date, by and between

More information

Ethical Hacking. Countermeasures Version 6. Hacking Laws

Ethical Hacking. Countermeasures Version 6. Hacking Laws Ethical Hacking and Countermeasures Version 6 Module II Hacking Laws Module Objective This module will familiarize you with: SPY ACT U.S. Federal Laws United Kingdom s Cyber Laws European Laws Japan s

More information

Case4:07-cv PJH Document672 Filed03/31/10 Page1 of 10

Case4:07-cv PJH Document672 Filed03/31/10 Page1 of 10 Case:0-cv-0-PJH Document Filed0// Page of Robert A. Mittelstaedt (SBN 00) Jason McDonell (SBN ) Elaine Wallace (SBN ) JONES DAY California Street, th Floor San Francisco, CA Telephone: () - Facsimile:

More information

DOLPHIN SOFTWARE LICENSE AGREEMENT

DOLPHIN SOFTWARE LICENSE AGREEMENT DOLPHIN SOFTWARE LICENSE AGREEMENT 1 CAREFULLY READ ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT BEFORE INSTALLING OR USING THIS SOFTWARE PRODUCT (THE "DOLPHIN SOFTWARE"). BY CLICKING "Yes" BELOW AND

More information

UNITED STATES DISTRICT COURT

UNITED STATES DISTRICT COURT Case :0-cv-0-MHP Document 0 Filed //00 Page of 0 CNET NETWORKS, INC. v. ETILIZE, INC. NORTHERN DISTRICT OF CALIFORNIA Plaintiff, Defendant. / No. C 0-0 MHP MEMORANDUM & ORDER Re: Defendant s Motion for

More information

ASSURANCE SYSTEMS INC. SUITE JIMMY CARTER BOULEVARD NORCROSS, GEORGIA TERMS OF SERVICE

ASSURANCE SYSTEMS INC. SUITE JIMMY CARTER BOULEVARD NORCROSS, GEORGIA TERMS OF SERVICE ASSURANCE SYSTEMS INC. SUITE 200 5855 JIMMY CARTER BOULEVARD NORCROSS, GEORGIA 30071 Posted/Revised: 08/17/2016 TERMS OF SERVICE PLEASE READ THESE TERMS OF SERVICE CAREFULLY. BY CLICKING ACCEPTED AND AGREED

More information

LEGAL TERMS OF USE. Ownership of Terms of Use

LEGAL TERMS OF USE. Ownership of Terms of Use LEGAL TERMS OF USE Ownership of Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Compas web site located at www.compasstone.com, and all associated sites linked to www.compasstone.com

More information

Preliminary Injunctive Relief to Protect Trade Secrets and Enforce Non-Competes:

Preliminary Injunctive Relief to Protect Trade Secrets and Enforce Non-Competes: 1 Preliminary Injunctive Relief to Protect Trade Secrets and Enforce Non-Competes: Is It Possible To Put The Toothpaste Back In The Tube? Attorney Advertising Prior results do not guarantee a similar outcome

More information

Site Builder End User License Agreement

Site Builder End User License Agreement Site Builder End User License Agreement NOTICE: THE FOLLOWING TERMS AND CONDITIONS GOVERN ALL ACCESS TO AND USE OF CCH INCORPORATED S ( CCH ) CCH SITE BUILDER, INCLUDING ALL SERVICES, APPLICATIONS, ARTICLES,

More information

WASHINGTON COUNTY PROPERTY RECORDS TECHNOLOGY AND INFORMATION SUBSCRIPTION AGREEMENT

WASHINGTON COUNTY PROPERTY RECORDS TECHNOLOGY AND INFORMATION SUBSCRIPTION AGREEMENT WASHINGTON COUNTY PROPERTY RECORDS TECHNOLOGY AND INFORMATION SUBSCRIPTION AGREEMENT THIS AGREEMENT is between the COUNTY OF WASHINGTON, a political subdivision of the State of Minnesota ( COUNTY ), and

More information

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION. v. Case No. 8:10-cv-2904-T-23TBM

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION. v. Case No. 8:10-cv-2904-T-23TBM Lee v. PMSI, Inc. Doc. 17 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION WENDI J. LEE, Plaintiff/Counter-Defendant, v. Case No. 8:10-cv-2904-T-23TBM PMSI, INC., Defendant/Counter-Plaintiff.

More information

PROTECTING COMPANY RESOURCES: Non-competes and confidentiality agreements in employment

PROTECTING COMPANY RESOURCES: Non-competes and confidentiality agreements in employment Kansas Missouri PROTECTING COMPANY RESOURCES: Non-competes and confidentiality agreements in employment January 24, 2018 Association of Corporate Counsel Mid-America Chapter Overview Drafting Noncompete

More information

3T Software Labs EULA

3T Software Labs EULA 3T Software Labs EULA Any use of the Software (as defined below) is subject to the terms of this licence agreement ( Agreement ). Please read the full Agreement carefully. You confirm that you accept and

More information

Changing Landscape, US and Abroad 2017 In House Counsel Conference

Changing Landscape, US and Abroad 2017 In House Counsel Conference TRADE SECRETS Changing Landscape, US and Abroad 2017 In House Counsel Conference Presenters: Jenny Papatolis Johnson Endo Pharmaceuticals Tracy Zurzolo Quinn Reed Smith LLP Matthew P. Frederick Reed Smith

More information

CASELLE, INC. Software as a Service Agreement

CASELLE, INC. Software as a Service Agreement CASELLE, INC. Software as a Service Agreement Caselle, Inc. City of The Dalles 1656 S East Bay Blvd 313 Court St. Suite 100 The Dalles, OR 97058 Provo, UT 84606 TERMS OF SERVICE These Terms of Service

More information

1. THE SYSTEM AND INFORMATION ACCESS

1. THE SYSTEM AND INFORMATION ACCESS Family Portal SSS by Education Brands TERMS AND CONDITIONS These Terms of Service (the "Agreement") govern your use of the Parents' Financial Statement (PFS), Family Portal and/or SSS by Education Brands

More information

Sangoma Remote Monitoring Service (RMS)

Sangoma Remote Monitoring Service (RMS) Sangoma Remote Monitoring Service (RMS) Terms and Agreement These Service Terms and Agreement, together with the purchase by the Customer of the remote monitoring service (RMS) (as defined in Section 2

More information

Ownership of Site; Agreement to Terms of Use

Ownership of Site; Agreement to Terms of Use Ownership of Site; Agreement to Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Volta Career Resource Center, being a web site located at www.voltapeople.com (the Site ).

More information

ENT CREDIT UNION ELECTRONIC DEPOSIT AGREEMENT

ENT CREDIT UNION ELECTRONIC DEPOSIT AGREEMENT ENT CREDIT UNION ELECTRONIC DEPOSIT AGREEMENT This (as amended and/or supplemented, this Agreement ) governs Member s use of Ent Credit Union s ( Ent ) Remote Deposit Services ( Services ). Ent offers

More information

United States Court of Appeals For the Eighth Circuit

United States Court of Appeals For the Eighth Circuit United States Court of Appeals For the Eighth Circuit No. 17-3266 American Family Mutual Insurance Company lllllllllllllllllllllplaintiff - Appellee v. Vein Centers for Excellence, Inc. llllllllllllllllllllldefendant

More information

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT Case: 10-30376 Document: 00511415363 Page: 1 Date Filed: 03/17/2011 IN THE UNITED STATES COURT OF APPEALS United States Court of Appeals FOR THE FIFTH CIRCUIT Fifth Circuit F I L E D March 17, 2011 Lyle

More information

TERMS AND CONDITIONS FOR CHECKMARX PRODUCTS AND SERVICES TERM SOFTWARE LICENSE AND SUPPORT AGREEMENT

TERMS AND CONDITIONS FOR CHECKMARX PRODUCTS AND SERVICES TERM SOFTWARE LICENSE AND SUPPORT AGREEMENT All references to Checkmarx in these Terms and Conditions should be read as Contractor (immixtechnology, Inc.), acting by and through its supplier, Checkmarx. TERMS AND CONDITIONS FOR CHECKMARX PRODUCTS

More information

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT FOR ORIGIN APPLICATION AND RELATED SERVICES

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT FOR ORIGIN APPLICATION AND RELATED SERVICES ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT FOR ORIGIN APPLICATION AND RELATED SERVICES This End User License Agreement ( License ) governs your access and use of the ORIGIN application and related

More information

MOTOROLA LICENSE AGREEMENT FOR MOTOROLA RADIO SERVICE SOFTWARE

MOTOROLA LICENSE AGREEMENT FOR MOTOROLA RADIO SERVICE SOFTWARE MOTOROLA LICENSE AGREEMENT FOR MOTOROLA RADIO SERVICE SOFTWARE IMPORTANT THIS IS A LICENSE AGREEMENT BETWEEN MOTOROLA, INC. (MOTOROLA) AND THE REGISTERD MOTOROLA CUSTOMER ON WHOSE BEHALF THIS LICENSE AGREEMENT

More information

Case: 4:15-cv RWS Doc. #: 30 Filed: 05/04/15 Page: 1 of 2 PageID #: 183

Case: 4:15-cv RWS Doc. #: 30 Filed: 05/04/15 Page: 1 of 2 PageID #: 183 Case: 4:15-cv-00464-RWS Doc. #: 30 Filed: 05/04/15 Page: 1 of 2 PageID #: 183 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MISSOURI EASTERN DIVISION GRYPHON INVESTMENTS III, LLC, Plaintiff, Case No.

More information

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

UOB BUSINESS APPLICATION TERMS AND CONDITIONS UOB BUSINESS APPLICATION TERMS AND CONDITIONS Access to and the use of this Application are granted by United Overseas Bank Limited (hereinafter known as "UOB") subject to the following conditions. By

More information

UACCEPT POINT OF SALE SYSTEM END USER LICENSE AGREEMENT

UACCEPT POINT OF SALE SYSTEM END USER LICENSE AGREEMENT UACCEPT POINT OF SALE SYSTEM END USER LICENSE AGREEMENT IMPORTANT: READ THIS END USER LICENSE AGREEMENT ( EULA ) CAREFULLY BEFORE CONTINUING REGISTRATION. BY CLICKING THE I ACCEPT BUTTON YOU SIGNIFY THAT

More information

c) Parties: Collectively, the parties to this Agreement (the Company and You) will be referred to as Parties.

c) Parties: Collectively, the parties to this Agreement (the Company and You) will be referred to as Parties. Terms & Conditions Effective Date: 10/26/2017 Site Covered: prccc.org THE AGREEMENT: The use of this website and services on this website provided by Pregnancy Resource Center Of Cleveland County, Inc.

More information

Kannaway Terms of Use Agreement

Kannaway Terms of Use Agreement Kannaway Terms of Use Agreement Kannaway Terms of Use Agreement IMPORTANT! THIS TERMS OF USE AGREEMENT (AGREEMENT) GOVERNS YOUR USE OF THIS SITE, WHICH IS PROVIDED BY KANNAWAY (KANNAWAY). BY ACCESSING

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS BY VISITING WWW.THEVAPEFACTOR.COM, YOU ARE CONSENTING TO OUR TERMS AND CONDITIONS. OVERVIEW The terms we, us, and our refer to THE VAPE FACTOR LLC. The term the Site refers to www.thevapefactor.com.

More information

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT SYNDICATE

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT SYNDICATE ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT SYNDICATE This End User License Agreement ( License ) is an agreement between you and Electronic Arts Inc., its subsidiaries and affiliates ( EA ). This

More information

TERMS OF USE. We may provide, through the Site, Services that include without limitation the:

TERMS OF USE. We may provide, through the Site, Services that include without limitation the: TERMS OF USE Last Revised: August 27, 2015 AMK9.com is the website ( Site ) of American K-9 Detection Services, LLC, ik9 Holding Company, LLC, Southern Coast K9, Incorporated, and other ITC Capital Partners,

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 6:08-cv-01159-JTM -DWB Document 923 Filed 12/22/10 Page 1 of 17 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS SECURITIES AND EXCHANGE COMMISSION, Plaintiff, v. Case No. 08-1159-JTM

More information

IN THE UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MISSOURI WESTERN DIVISION IN THE UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MISSOURI WESTERN DIVISION DORIS LOTT, Plaintiff, v. No. 15-00439-CV-W-DW LVNV FUNDING LLC, et al., Defendants. ORDER Before the Court is Defendants

More information

PeachCourt Document Access User Agreement Terms of Use

PeachCourt Document Access User Agreement Terms of Use PeachCourt Document Access User Agreement Terms of Use Welcome to PeachCourt, Georgia s statewide Document Access and efiling System. PeachCourt is comprised of various web pages operated by GreenCourt

More information

MOBILE CONNECT SERVICE PROVIDER ACCESS AGREEMENT STANDARD TERMS AND CONDITIONS

MOBILE CONNECT SERVICE PROVIDER ACCESS AGREEMENT STANDARD TERMS AND CONDITIONS MOBILE CONNECT SERVICE PROVIDER ACCESS AGREEMENT STANDARD TERMS AND CONDITIONS This Mobile Connect Service Provider Agreement (the Agreement ) is entered into by and between the person agreeing to the

More information

LIBRARY LICENSE AGREEMENT - DATABASE

LIBRARY LICENSE AGREEMENT - DATABASE LIBRARY LICENSE AGREEMENT - DATABASE This License is hereby agreed to on this day of, 20 between MyJoVE Corporation of 1 Alewife Center, Suite 200, Cambridge, Massachusetts 02140 ("the Publisher") and

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN DEREK GUBALA, Case No. 15-cv-1078-pp Plaintiff, v. TIME WARNER CABLE, INC., Defendant. DECISION AND ORDER GRANTING DEFENDANT S MOTION TO DISMISS

More information

TERMS OF USE Last Modified: May/23/2018

TERMS OF USE Last Modified: May/23/2018 TERMS OF USE Last Modified: May/23/2018 Welcome to www.angaza.com, a website of Angaza Design Inc. ( Company, we, or us ). This page explains the terms by which you may use our website (the Site ). By

More information

MARVEL STUDIOS BLACK PANTHER CONTEST OFFICIAL RULES

MARVEL STUDIOS BLACK PANTHER CONTEST OFFICIAL RULES MARVEL STUDIOS BLACK PANTHER CONTEST OFFICIAL RULES Important: Please read these rules (these Official Rules ) before entering the MARVEL STUDIOS BLACK PANTHER CONTEST contest (the Contest ) to be conducted

More information

WAVE END USER LICENSE AGREEMENT

WAVE END USER LICENSE AGREEMENT WAVE END USER LICENSE AGREEMENT THE ACCOMPANYING SOFTWARE AND DOCUMENTATION (EACH AS DEFINED BELOW) BELONG TO TWISTED PAIR SOLUTIONS, A MOTOROLA SOLUTIONS COMPANY ( LICENSOR ) OR ITS LICENSORS AND ARE

More information

Case 2:13-cr KJM Document 169 Filed 06/13/16 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA

Case 2:13-cr KJM Document 169 Filed 06/13/16 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA Case :-cr-000-kjm Document Filed 0// Page of PHILLIP A. TALBERT Acting United States Attorney MATTHEW D. SEGAL PAUL HEMESATH Assistant United States Attorneys 0 I Street, Suite 0-00 Sacramento, CA Telephone:

More information

IMPORTANT READ CAREFULLY BEFORE INSTALLING OR USING THIS PRODUCT

IMPORTANT READ CAREFULLY BEFORE INSTALLING OR USING THIS PRODUCT IMPORTANT READ CAREFULLY BEFORE INSTALLING OR USING THIS PRODUCT THIS PRODUCT CONTAINS UNIVERSAL SSH KEY MANAGER AND TECTIA SSH SERVER COMPUTER SOFTWARE APPLICATIONS AND RELATED DOCUMENTATION AND OTHER

More information

CASE 0:17-cv DSD-TNL Document 17 Filed 06/30/17 Page 1 of 7. UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Civil No.

CASE 0:17-cv DSD-TNL Document 17 Filed 06/30/17 Page 1 of 7. UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Civil No. CASE 0:17-cv-01034-DSD-TNL Document 17 Filed 06/30/17 Page 1 of 7 UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Civil No. 17-1034(DSD/TNL) Search Partners, Inc., Plaintiffs, v. ORDER MyAlerts, Inc.,

More information

Basis Account Terms of Service Agreement. Statista, Inc.

Basis Account Terms of Service Agreement. Statista, Inc. Basis Account Terms of Service Agreement Statista, Inc. Last updated: October 2016 Basis Account Terms of Service Agreement www.statista.com 02 This Terms of Service Agreement (this "Agreement") is entered

More information

Terms of Use. Last modified: January Acceptance of these Terms of Use

Terms of Use. Last modified: January Acceptance of these Terms of Use Terms of Use Last modified: January 2018 1. Acceptance of these Terms of Use These Terms of Use (these Terms ), as amended from time to time, govern access to and use of this website, at www.aljregionalholdings.com,

More information

FireCast EasyStart End User License Agreement (EULA)

FireCast EasyStart End User License Agreement (EULA) FireCast EasyStart End User License Agreement (EULA) FIRECAST EASYSTART END USER LICENSE AGREEMENT (EULA) TERMS AND CONDITIONS LAST UPDATED: February 20, 2013 Please read this document carefully before

More information

Last revised: 6 April 2018 By using the Agile Manager Website, you are agreeing to these Terms of Use.

Last revised: 6 April 2018 By using the Agile Manager Website, you are agreeing to these Terms of Use. Agile Manager TERMS OF USE Last revised: 6 April 2018 By using the Agile Manager Website, you are agreeing to these Terms of Use. 1. WHO THESE TERMS OF USE APPLY TO; WHAT THEY GOVERN. This Agile Manager

More information

Case 3:11-cv JPG-PMF Document 140 Filed 01/19/16 Page 1 of 11 Page ID #1785

Case 3:11-cv JPG-PMF Document 140 Filed 01/19/16 Page 1 of 11 Page ID #1785 Case 3:11-cv-00879-JPG-PMF Document 140 Filed 01/19/16 Page 1 of 11 Page ID #1785 EQUAL EMPLOYMENT OPPORTUNITY COMMISSION, IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF ILLINOIS vs.

More information

LAB-on-line License Terms and Service Agreement

LAB-on-line License Terms and Service Agreement LAB-on-line License Terms and Service Agreement License Terms and Service Agreement Last Updated: March, 2012 PLEASE FAMILIARIZE YOURSELF WITH THESE RULES, TERMS AND CONDITIONS, AND NOTE THAT THEY MAY

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT In exchange for your access to and use of ecourt Reporters, LLC s ( ecourt Reporters ) website www.ecourtreporters.com and any of its sub-domains and related ecourt Reporters sites

More information

SOFTWARE LICENSE TERMS AND CONDITIONS

SOFTWARE LICENSE TERMS AND CONDITIONS MMS Contract No: SOFTWARE LICENSE TERMS AND CONDITIONS These Software License Terms and Conditions (referred to interchangeably as the Terms and Conditions or the Agreement ) form a legal contract between

More information

MOCO development company, LLC TERMS OF USE

MOCO development company, LLC TERMS OF USE MOCO development company, LLC TERMS OF USE These Terms of Use ( Terms ) govern your use of the MOCO Website(s), MOCO Software, and MOCO Services (together, the "MOCO Services"): BY CLICKING THE "AGREE"

More information

IN THE UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF FLORIDA PENSACOLA DIVISION. CASE NO. 3:07cv528-RS-MD ORDER

IN THE UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF FLORIDA PENSACOLA DIVISION. CASE NO. 3:07cv528-RS-MD ORDER Page 1 of 16 IN THE UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF FLORIDA PENSACOLA DIVISION 316, INC., Plaintiff, vs. CASE NO. 3:07cv528-RS-MD MARYLAND CASUALTY COMPANY, Defendant. / ORDER Before

More information

UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MICHIGAN NORTHERN DIVISION. v. Case No. 2:09-CV-271 OPINION

UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MICHIGAN NORTHERN DIVISION. v. Case No. 2:09-CV-271 OPINION Pioneer Surgical Technology, Inc. v. Vikingcraft Spine, Inc. et al Doc. 19 UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MICHIGAN NORTHERN DIVISION PIONEER SURGICAL TECHNOLOGY, INC., Plaintiff,

More information

IN THE UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MISSOURI ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMPLAINT

IN THE UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MISSOURI ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMPLAINT IN THE UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MISSOURI PEOPLES BANK OF MONITEAU COUNTY, v. DAVID HAMPTON, Serve at: 26779 Highway 179 California, MO 65018 and SHERRY HAMPTON Serve at: 26779 Highway

More information

Terms of Use Terminated-Vested Cashout Website

Terms of Use Terminated-Vested Cashout Website Terms of Use Terminated-Vested Cashout Website This Terms of Use page provides important information regarding the scope, duration and terms of any service you may obtain from this website ( Service ),

More information

OTTO Archive, LLC CONTENT LICENSE AGREEMENT

OTTO Archive, LLC CONTENT LICENSE AGREEMENT OTTO Archive, LLC CONTENT LICENSE AGREEMENT This license agreement (the License Agreement ) along with the Website Terms and Conditions located at www.ottoarchive.com/terms and the terms of any Subagent

More information

DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS

DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS By Ian C. Ballon & Wendy Mantell 1 Class action plaintiffs lawyers increasingly have turned their attention to putative class

More information

* * * * * * IV. DISCUSSION

* * * * * * IV. DISCUSSION JAMES WARE, District Judge. 2010 WL 3291750 Only the Westlaw citation is currently available. United States District Court, N.D. California, San Jose Division. FACEBOOK, INC., Plaintiff, v. POWER VENTURES,

More information

You may owe fees for use of the App or the Services. Check with your Financial Institution for applicable rates.

You may owe fees for use of the App or the Services. Check with your Financial Institution for applicable rates. CardValet Terms of Use THIS IS A LEGAL AGREEMENT BETWEEN YOU AND THE FINANCIAL INSTITUTION THAT ISSUED YOU THE PAYMENT CARD THAT YOU REGISTER WITHIN THIS APPLICATION ( Financial Institution ), stating

More information

INFINITI OWNER CELEBRATION EVENT SWEEPSTAKES ENTER FOR A CHANCE TO WIN SWEEPSTAKES OFFICIAL RULES AND CONDITIONS

INFINITI OWNER CELEBRATION EVENT SWEEPSTAKES ENTER FOR A CHANCE TO WIN SWEEPSTAKES OFFICIAL RULES AND CONDITIONS INFINITI OWNER CELEBRATION EVENT SWEEPSTAKES ENTER FOR A CHANCE TO WIN SWEEPSTAKES OFFICIAL RULES AND CONDITIONS CONSUMER DISCLOSURE: YOU HAVE NOT YET WON. NO PURCHASE, TEST DRIVE, OR PAYMENT OF ANY KIND

More information

United States District Court

United States District Court Case:-cv-0-WHA Document Filed0/0/ Page of IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA 0 0 ERNEST EVANS, THE LAST TWIST, INC., THE ERNEST EVANS CORPORATION, v. Plaintiffs,

More information

Case: 1:14-cv Document #: 37 Filed: 09/24/15 Page 1 of 17 PageID #:220

Case: 1:14-cv Document #: 37 Filed: 09/24/15 Page 1 of 17 PageID #:220 Case: 1:14-cv-08160 Document #: 37 Filed: 09/24/15 Page 1 of 17 PageID #:220 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION NATIONAL AUTO PARTS, INC., ) ) ) Plaintiff, ) )

More information

Case 1:07-mc GBL-BRP Document 21 Filed 04/18/2008 Page 1 of 17

Case 1:07-mc GBL-BRP Document 21 Filed 04/18/2008 Page 1 of 17 Case 1:07-mc-00034-GBL-BRP Document 21 Filed 04/18/2008 Page 1 of 17 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA ALEXANDRIA DIVISION IN RE SUBPOENA DUCES TECUM TO AOL, LLC

More information

Gottschlich & Portune, LLP

Gottschlich & Portune, LLP Defense of Trade Secrets Act of 2016 Martin A. Foos June 9, 2017 Gottschlich & Portune, LLP 1 Defense of Trade Secrets Act of 2016 Effective May 11, 2016 Previous attempts to pass the Act in 2013, 2014,

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI CENTRAL DIVISION ) ) ) ) ) ) ) ) ) ) ORDER

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI CENTRAL DIVISION ) ) ) ) ) ) ) ) ) ) ORDER IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI CENTRAL DIVISION ROBERTA LAMBERT, v. Plaintiff, NEW HORIZONS COMMUNITY SUPPORT SERVICES, INC., Defendant. Case No. 2:15-cv-04291-NKL

More information

The use of the Service for the following activities is prohibited:

The use of the Service for the following activities is prohibited: SKYLINE WIFI TERMS AND CONDITIONS ACCESS TO THE SERVICE The Service is a free public service provided by Skyline. Your access to the Service is completely at the discretion of Skyline, and your access

More information

Agreement for iseries and AS/400 System Restore Test Service

Agreement for iseries and AS/400 System Restore Test Service Agreement for iseries and AS/400 System Restore Test Service 1. Introduction The iseries and AS/400 System Restore Test Service (called "the Service"). The Service is provided to you, as a registered subscriber

More information

Case 1:18-cv NLH-KMW Document 1 Filed 06/22/18 Page 1 of 18 PageID: 1

Case 1:18-cv NLH-KMW Document 1 Filed 06/22/18 Page 1 of 18 PageID: 1 Case 1:18-cv-10927-NLH-KMW Document 1 Filed 06/22/18 Page 1 of 18 PageID: 1 FOLKMAN LAW OFFICES, P.C. By: Benjamin Folkman, Esquire Paul C. Jensen, Jr., Esquire 1949 Berlin Road, Suite 100 Cherry Hill,

More information

SHARED WORKSPACE TERMS OF USE

SHARED WORKSPACE TERMS OF USE SHARED WORKSPACE TERMS OF USE The following Terms of Use ( TOU ) may be somewhat lengthy, but we want to be careful to ensure that everyone is properly protected. Please feel free to contact Valerie@4socialchange.org

More information