The controversial HiQ v. LinkedIn, 938 F.3d 985 (9th Cir. 2019) opinion concerning data scraping was vacated and remanded this June by the Supreme Court to be reconsidered in light of the recently decided case Van Buren v. United States, 141 S. Ct. 1648 (2021). This blog will delve into the reasoning of Van Buren and predict the final decision of HiQ v. LinkedIn.
To begin, letâs recall the basic facts of HiQ v. LinkedIn. HiQ is a data analytics company that uses automated bots to scrape public information from LinkedIn usersâ profiles, including name, job title, and work history. It then uses an algorithm to yield âpeople analyticsâ based on the information and sells them to business clients for profit. LinkedIn sent a C&D letter, asking HiQ to stop accessing and copying the data based on the User Agreement. During trial, LinkedIn claimed that HiQ violated the Computer Fraud and Abuse Act of 1986 (âCFAAâ), which states that criminal liability will be inflicted if someone âintentionally accesses a computer without authorization or exceeds authorized access,â and thereby obtains computer information. 18 U.S.C. §1030(a)(2). The legal issue here is whether HiQâs further scraping after receiving the C&D letter constitutes an act âwithout authorization or exceed[ing] authorized access.â
The interpretation of this clause has been disputed for a long time. Some circuits have held that a violation of policies and contracts such as terms of use and confidentiality agreements is enough to establish liability under the CFAA, while others tend to interpret it narrowly. Finally, Van Buren provides more explicit guidelines to resolve this circuit split. In Van Buren, the police sergeant Van Buren ran the license-plate search in his departmentâs database for his friend, which violated the departmentâs policy of database use only for law enforcement purposes. The Court ruled that Van Burenâs conduct doesnât fall under the scope of the CFAA with the reasoning as follows. According to 18 U.S.C. §1030(e)(6), the term âexceeds authorized accessâ means âto access a computer with authorization and to use such access to obtain or alter information in the computer that the accessor is not entitled so to obtain or alterâ. Both parties agree that Van Buren accessed the computer with authorization and obtained the information; the question is: whether he is âentitled so to obtain?â The Court mainly focused on the interpretation of the word âso,â which shall refer to a stated manner from the âpreceding text.â Thus, the clause shall only refer to information that a person is not entitled to obtain âvia a computer one is authorized to accessâ since itâs the only manner which has already been mentioned in the provision. It canât be interpreted more broadly to include other limitations by contracts or policies. Van Buren, at 1655. To view âexceeds authorized accessâ as a whole in the computer context, âaccessâ can mean both entering the computer system itself or a particular part of the system, such as files, folders, and databases. Therefore, an authorized computer user may not have access to a particular part of the system and in this sense, the act of entering that part can be deemed âexceeds authorized access.â Van Buren, at 1657-58. To conclude, the Court explained this CFAA clause narrowly, in a rather technical sense. To hold otherwise would mean millions of law-abiding computer users violating computer-use policies would be criminals.
Applying this interpretation to HiQ v. LinkedIn, HiQâs bots have authorized access to LinkedInâs servers and thereby were entitled so to obtain LinkedInâs member profiles since theyâre public data. Although the User Agreement stated that the LinkedIn users own the profile information and only LinkedIn was licensed to use, copy, publish, and process them, HiQâs data scraping activities wonât be considered to âexceed authorized accessâ under the CFAA. Despite the probable same result, this reasoning focusing on the statutory terms will be very different from the analysis of whether HiQâs conduct is analogous to âbreaking and enteringâ in the vacated 9th Circuit opinion.Â
Apart from providing explicit explanation of the CFAA in the computer context, this case also provokes much reflection on data law. Thereâs still no clear legislation on the ownership of data, but it seemed the 9th Circuit accepted that data subjects own the data while the platform may be licensed to process data. As for data scraping, itâs essential to abide by the robots.txt rules and not to circumvent any technical measures implemented by the website owner for an ordered and peaceful Internet ecosystem.

… [Trackback]
[…] Read More to that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Find More here to that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Find More Information here on that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Find More here to that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Information on that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Read More to that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Info to that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Here you will find 88091 more Info on that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] Information on that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]
… [Trackback]
[…] There you will find 6695 additional Information to that Topic: jipel.law.nyu.edu/the-legal-boundary-of-data-scraping-in-light-of-van-buren-v-united-states/ […]