               Certiorari dismissed, January 2, 2013




                        PUBLISHED


UNITED STATES COURT OF APPEALS
             FOR THE FOURTH CIRCUIT


WEC CAROLINA ENERGY SOLUTIONS            
LLC,
               Plaintiff-Appellant,
                v.
                                                 No. 11-1201
WILLIE MILLER, a/k/a Mike; EMILY
KELLEY; ARC ENERGY SERVICES
INCORPORATED,
            Defendants-Appellees.
                                         
       Appeal from the United States District Court
      for the District of South Carolina, at Rock Hill.
         Cameron McGowan Currie, District Judge.
                    (0:10-cv-02775-CMC)

                   Argued: April 2, 2012

                   Decided: July 26, 2012

     Before SHEDD and FLOYD, Circuit Judges, and
           HAMILTON, Senior Circuit Judge.



Affirmed by published opinion. Judge Floyd wrote the opin-
ion, in which Judge Shedd and Senior Judge Hamilton joined.
2        WEC CAROLINA ENERGY SOLUTIONS v. MILLER
                         COUNSEL

ARGUED: Kirsten Elena Small, NEXSEN PRUET, LLC,
Greenville, South Carolina, for Appellant. James William
Bradford, Jr., JIM BRADFORD LAW FIRM, LLC, York,
South Carolina; Brian S. McCoy, MCCOY LAW FIRM,
LLC, Rock Hill, South Carolina, for Appellees. ON BRIEF:
Mark Gordon, Anthony J. Basinski, PIETRAGALLO GOR-
DON ALFANO BOSICK & RASPANTI, LLP, Pittsburgh,
Pennsylvania; Angus H. Macaulay, NEXSEN PRUET, LLC,
Greenville, South Carolina, for Appellant. Daniel H. Har-
shaw, BRICE LAW FIRM, LLC, York, South Carolina, for
Appellees.


                         OPINION

FLOYD, Circuit Judge:

   In April 2010, Mike Miller resigned from his position as
Project Director for WEC Carolina Energy Solutions, Inc.
(WEC). Twenty days later, he made a presentation to a poten-
tial WEC customer on behalf of WEC’s competitor, Arc
Energy Services, Inc. (Arc). The customer ultimately chose to
do business with Arc. WEC contends that before resigning,
Miller, acting at Arc’s direction, downloaded WEC’s propri-
etary information and used it in making the presentation.
Thus, it sued Miller, his assistant Emily Kelley, and Arc for,
among other things, violating the Computer Fraud and Abuse
Act (CFAA), 18 U.S.C. § 1030.

   The district court dismissed WEC’s CFAA claim, holding
that the CFAA provides no relief for Appellees’ alleged con-
duct. We agree and therefore affirm.
           WEC CAROLINA ENERGY SOLUTIONS v. MILLER                     3
                                   I.

                                   A.

   In 1984, Congress initiated a campaign against computer
crime by passing the Counterfeit Access Device and Com-
puter Fraud and Abuse Act of 1984. Pub. L. No. 98-473, 98
Stat. 2190. Shortly thereafter, in 1986, it expanded the Act
with a revised version, the Computer Fraud and Abuse Act of
1986, Pub. L. No. 99-474, 100 Stat. 1213. Today, the CFAA
remains primarily a criminal statute designed to combat hack-
ing. A.V. ex rel. Vanderhye v. iParadigms, LLC, 562 F.3d
630, 645 (4th Cir. 2009). Nevertheless, it permits a private
party "who suffers damage or loss by reason of a violation of
[the statute]" to bring a civil action "to obtain compensatory
damages and injunctive relief or other equitable relief." 18
U.S.C. § 1030(g). Notably, although proof of at least one of
five additional factors is necessary to maintain a civil action,1
a violation of any of the statute’s provisions exposes the
offender to both civil and criminal liability.

   Among other things, the CFAA renders liable a person who
(1) "intentionally accesses a computer without authorization
or exceeds authorized access, and thereby obtains . . . infor-
mation from any protected computer," in violation of
§ 1030(a)(2)(C); (2) "knowingly and with intent to defraud,
accesses a protected computer without authorization, or
exceeds authorized access, and by means of such conduct fur-
thers the intended fraud and obtains anything of value," in
violation of § 1030(a)(4); or (3) "intentionally accesses a pro-
tected computer without authorization, and as a result of such
conduct, recklessly causes damage[,] or . . . causes damage
and loss," in violation of § 1030(a)(5)(B)-(C). Here, WEC
  1
   Maintenance of a civil action requires one of the factors outlined in
§ 1030(c)(4)(A)(i)(I)-(V). Here, WEC alleges that its aggregate losses as
a result of Appellees’ conduct were "at least $5,000 in value" during a
one-year period, which satisfies § 1030(c)(4)(A)(i)(I).
4         WEC CAROLINA ENERGY SOLUTIONS v. MILLER
alleges that Miller, Kelley, and Arc violated all three of these
provisions.

                               B.

   WEC and Arc are competitors, providing specialized weld-
ing and related services to the power generation industry.
Both companies are incorporated in South Carolina and main-
tain their principal places of business in York County, South
Carolina. Prior to April 30, 2010, WEC employed Mike Mil-
ler as a Project Director and Emily Kelley as his assistant.
Both individuals now work for Arc.

   When Miller worked for WEC, the company provided him
with a laptop computer and cell phone, and authorized his
access to the company’s intranet and computer servers.
According to WEC’s complaint, "Miller had access to numer-
ous confidential and trade secret documents stored on . . .
computer servers, including pricing terms, pending projects[,]
and the technical capabilities of WEC." To protect its confi-
dential information and trade secrets, WEC instituted policies
that prohibited using the information without authorization or
downloading it to a personal computer. These policies did not
restrict Miller’s authorization to access the information, how-
ever.

   On April 30, 2010, Miller resigned from WEC. WEC
alleges that prior to resigning, Miller, at Arc’s direction, "ei-
ther by himself or by his assistant, Kelley, downloaded a sub-
stantial number of WEC’s confidential documents" and
emailed them to his personal e-mail address. WEC also
alleges that Miller and Kelley downloaded confidential infor-
mation to a personal computer. Twenty days after leaving
WEC, Miller reportedly used the downloaded information to
make a presentation on behalf of Arc to a potential WEC cus-
tomer.

 The customer ultimately awarded two projects to Arc.
WEC contends that as a result of Miller’s and Kelley’s
           WEC CAROLINA ENERGY SOLUTIONS v. MILLER               5
actions, it "has suffered and will continue to suffer impair-
ment to the integrity of its data, programs, systems or infor-
mation, including economic damages, and loss aggregating
substantially more than $5,000 during a one-year period."

   In October 2010, WEC sued Miller, Kelley, and Arc, alleg-
ing nine state-law causes of action and a violation of the
CFAA. Regarding its CFAA claim, WEC averred that Miller
and Kelley violated the Act because "[u]nder WEC’s policies
they were not permitted to download confidential and propri-
etary information to a personal computer." Thus, by doing so,
they "breache[d] their fiduciary duties to WEC" and via that
breach, they either (1) lost all authorization to access the con-
fidential information or (2) exceeded their authorization.
WEC sought to hold Arc liable because it claimed that Miller
and Kelley undertook this conduct as Arc’s agents.

   Appellees moved for dismissal pursuant to Federal Rule of
Civil Procedure 12(b)(6), and the district court held that WEC
failed to state a claim for which the CFAA provided relief:

      [I]n this case, WEC’s company policies regulated
      use of information not access to that information.
      Thus, even if Miller and Kelley’s purpose in access-
      ing the information was contrary to company poli-
      cies regulating use, it would not establish a violation
      of company policies relevant to access and, conse-
      quently, would not support liability under the CFAA.

WEC Carolina Energy Solutions, LLC v. Miller, No. 0:10-cv-
2775-CMC, 2011 WL 379458, at *5 (D.S.C. Feb. 3, 2011).
Thus, it dismissed the CFAA claim and declined to exercise
jurisdiction over the remaining state-law claims.2
  2
    WEC has since moved forward with these claims in South Carolina
state court.
6         WEC CAROLINA ENERGY SOLUTIONS v. MILLER
                              II.

   We review de novo a district court’s dismissal pursuant to
Rule 12(b)(6), Gilbert v. Residential Funding LLC, 678 F.3d
271, 274 (4th Cir. 2012), accepting as true all factual allega-
tions contained in the complaint, Erickson v. Pardus, 551 U.S.
89, 94 (2007)(per curiam).

                              A.

   WEC alleges that Appellees violated §§ 1030(a)(2)(C),
(a)(4), (a)(5)(B), and (a)(5)(C), each of which require that a
party either access a computer "without authorization" or "ex-
ceed[ ] authorized access." The district court held that Appel-
lees’ alleged conduct—the violation of policies regarding the
use and downloading of confidential information—did not
contravene any of these provisions. Accordingly, the crux of
the issue presented here is the scope of "without authoriza-
tion" and "exceeds authorized access." We particularly exam-
ine whether these terms extend to violations of policies
regarding the use of a computer or information on a computer
to which a defendant otherwise has access. Before delving
into statutory analysis, however, we briefly review the per-
spectives of our sister circuits.

   In short, two schools of thought exist. The first, promul-
gated by the Seventh Circuit and advanced by WEC here,
holds that when an employee accesses a computer or informa-
tion on a computer to further interests that are adverse to his
employer, he violates his duty of loyalty, thereby terminating
his agency relationship and losing any authority he has to
access the computer or any information on it. See Int’l Airport
Ctrs., LLC v. Citrin, 440 F.3d 418, 420-21 (7th Cir. 2006).
Thus, for example, the Seventh Circuit held that an employee
who erased crucial data on his company laptop prior to turn-
ing it in at the end of his employment violated the CFAA. Id.
at 419-21. It reasoned that his "breach of his duty of loyalty
terminated his agency relationship . . . and with it his author-
          WEC CAROLINA ENERGY SOLUTIONS v. MILLER              7
ity to access the laptop, because the only basis of his authority
had been that relationship." Id. at 420-21.

   The second, articulated by the Ninth Circuit and followed
by the district court here, interprets "without authorization"
and "exceeds authorized access" literally and narrowly, limit-
ing the terms’ application to situations where an individual
accesses a computer or information on a computer without
permission. See United States v. Nosal, 676 F.3d 854, 863
(9th Cir. 2012) (en banc); LVRC Holdings LLC v. Brekka, 581
F.3d 1127, 1134-35 (9th Cir. 2009). Thus, in Nosal, the Ninth
Circuit, sitting en banc, held that the defendant’s co-
conspirators, a group of employees at an executive search
firm, did not violate the CFAA when they retrieved confiden-
tial information via their company user accounts and trans-
ferred it to the defendant, a competitor and former employee.
Nosal, 676 F.3d at 856, 864. It reasoned that the CFAA fails
to provide a remedy for misappropriation of trade secrets or
violation of a use policy where authorization has not been
rescinded. Id. at 863-64. As we explain below, we agree with
this latter view.

                               B.

   As with any issue of statutory interpretation, we focus on
the plain language of the statute, seeking "first and foremost
. . . to implement congressional intent." United States v.
Abdelshafi, 592 F.3d 602, 607 (4th Cir. 2010) (quoting United
States v. Passaro, 577 F.3d 207, 213 (4th Cir. 2009)) (internal
quotation marks omitted). Thus, "‘we give the terms [of the
statute] their ordinary, contemporary, common meaning,
absent an indication [that] Congress intended’ the statute’s
language ‘to bear some different import.’" Id. (quoting Ste-
phens ex rel. R.E. v. Astrue, 565 F.3d 131, 137 (4th Cir.
2009)).

   Where, as here, our analysis involves a statute whose provi-
sions have both civil and criminal application, our task merits
8          WEC CAROLINA ENERGY SOLUTIONS v. MILLER
special attention because our interpretation applies uniformly
in both contexts. See Leocal v. Ashcroft, 543 U.S. 1, 11 n.8
(2004). Thus, we follow "the canon of strict construction of
criminal statutes, or rule of lenity." United States v. Lanier,
520 U.S. 259, 266 (1997). In other words, in the interest of
providing fair warning "of what the law intends to do if a cer-
tain line is passed," Babbitt v. Sweet Home Chapter of Com-
munities for a Great Or., 515 U.S. 687, 704 n.18 (1995)
(quoting United States v. Bass, 404 U.S. 336, 348 (1971))
(internal quotation marks omitted), we will construe this crim-
inal statute strictly and avoid interpretations not "clearly war-
ranted by the text," Crandon v. United States, 494 U.S. 152,
160 (1990).

                                 1.

  The CFAA is concerned with the unauthorized access of
protected computers. Thus, we note at the outset that "access"
means "[t]o obtain, acquire," or "[t]o gain admission to."
Oxford English Dictionary (3d ed. 2011; online version
2012). Moreover, per the CFAA, a "computer" is a high-speed
processing device "and includes any data storage facility or
communications facility directly related to or operating in
conjunction with such device." § 1030(e)(1). A computer
becomes a "protected computer" when it "is used in or affect-
ing interstate or foreign commerce." § 1030(e)(2).3

   With respect to the phrase, "without authorization," the
CFAA does not define "authorization." Nevertheless, the
Oxford English Dictionary defines "authorization" as "formal
warrant, or sanction." Oxford English Dictionary (2d ed.
1989; online version 2012). Regarding the phrase "exceeds
authorized access," the CFAA defines it as follows: "to access
a computer with authorization and to use such access to obtain
    3
   Neither party disputes that the computers involved in this case are
"protected computers."
          WEC CAROLINA ENERGY SOLUTIONS v. MILLER             9
or alter information in the computer that the accesser is not
entitled so to obtain or alter." § 1030(e)(6).

   Recognizing that the distinction between these terms is
arguably minute, see Citrin, 440 F.3d at 420, we nevertheless
conclude based on the "ordinary, contemporary, common
meaning," see Perrin v. United States, 444 U.S. 37, 42 (1979),
of "authorization," that an employee is authorized to access a
computer when his employer approves or sanctions his admis-
sion to that computer. Thus, he accesses a computer "without
authorization" when he gains admission to a computer with-
out approval. See Brekka, 581 F.3d at 1133. Similarly, we
conclude that an employee "exceeds authorized access" when
he has approval to access a computer, but uses his access to
obtain or alter information that falls outside the bounds of his
approved access. See id. Notably, neither of these definitions
extends to the improper use of information validly accessed.

                               2.

   WEC presses instead an ostensibly plain-language interpre-
tation articulated in the Nosal panel decision, which was sub-
sequently reversed en banc. See United States v. Nosal, 642
F.3d 781 (9th Cir. 2011), rev’d en banc, 676 F.3d 854 (9th
Cir. 2012). In that decision, the panel fixated on the word "so"
in the definition of "exceeds authorized access." See id. at
785. The panel declared that, in context, this conjunction
means "in a manner or way that is indicated or suggested." Id.
(quoting Webster’s Third New Int’l Dictionary 2159 (Philip
Babcock Gove ed., 2002)) (internal quotation marks omitted).
Thus, it found that an employee "exceed[s] [his] authorized
access" if he uses such access "to obtain or alter information
[on] the computer that [he] is not entitled [in that manner] to
obtain or alter." Id. at 785-86. (third alteration in original)
(quoting § 1030(e)(6)) (internal quotation marks omitted).
Armed with this interpretation, the court held that the defen-
dant’s co-conspirators "exceed[ed] their authorized access"
because although they had permission to access the propri-
10        WEC CAROLINA ENERGY SOLUTIONS v. MILLER
etary information that they transferred to the defendant, they
violated the company’s policy regarding the use and disclo-
sure of that information. See id. at 787-89. The court reasoned
that the co-conspirators’ violation of the use and disclosure
policy constituted access "in a manner" to which they were
not entitled. Thus, they violated the CFAA. See id.

   As an initial manner, we believe the Nosal panel’s conclu-
sion is a non sequitur. To us, defining "so" as "in that manner"
only elucidates our earlier conclusion that "exceeds autho-
rized access" refers to obtaining or altering information
beyond the limits of the employee’s authorized access. It does
not address the use of information after access. Indeed, the
Ninth Circuit indicated as much in its en banc reversal, when
it declined to hold that the interpretation of "so" as "in that
manner" necessarily means employees can be liable for use-
policy violations. See 676 F.3d at 857. Instead, the court
offered hypotheticals illustrating how the panel’s interpreta-
tion of "so" referred to the means of obtaining information,
not the use of information. See id. For example, if an
employee who has access to view information, but not to
download it, disregards company policy by "cop[ying] the
information to a thumb drive and walk[ing] out of the build-
ing with it," he obtains information "in a manner" that lacks
authorization. Id. at 858. Similarly, if an employee has com-
plete access to information with his own username and pass-
word, but accesses information using another employee’s
username and password, he also obtains information "in a
manner" that is not authorized. Id. In contrast, however,
where such an employee uses his own username and pass-
word to access the information and then puts it to an imper-
missible use, his "manner" of access remains valid. Thus, in
the Ninth Circuit’s view, and ours, interpreting "so" as "in that
manner" fails to mandate CFAA liability for the improper use
of information that is accessed with authorization.

  Nevertheless, because WEC alleges that Miller and Kelley
obtained information by downloading it to a personal com-
          WEC CAROLINA ENERGY SOLUTIONS v. MILLER              11
puter in violation of company policy, we go a step further.
Although we believe that interpreting "so" as "in that manner"
fails to subject an employee to liability for violating a use pol-
icy, we nonetheless decline to adopt the Nosal panel’s inter-
pretation of the conjunction. The interpretation is certainly
plausible, but it is not "clearly warranted by the text." Cran-
don, 494 U.S. at 160. Indeed, Congress may have intended
"so" to mean "in that manner," but it "could just as well have
included ‘so’ as a connector or for emphasis." Nosal, 676 F.3d
at 858. Thus, faced with the option of two interpretations, we
yield to the rule of lenity and choose the more obliging route.
"[W]hen [a] choice has to be made between two readings of
what conduct Congress has made a crime, it is appropriate,
before we choose the harsher alternative, to require that Con-
gress should have spoken in language that is clear and defi-
nite." United States v. Universal C. I. T. Credit Corp., 344
U.S. 218, 221-22 (1952); see also Nosal, 676 F.3d at 863.
Here, Congress has not clearly criminalized obtaining or alter-
ing information "in a manner" that is not authorized. Rather,
it has simply criminalized obtaining or altering information
that an individual lacked authorization to obtain or alter.

   And lest we appear to be needlessly splitting hairs, we
maintain that the Nosal panel’s interpretation would indeed be
a harsher approach. For example, such an interpretation would
impute liability to an employee who with commendable inten-
tions disregards his employer’s policy against downloading
information to a personal computer so that he can work at
home and make headway in meeting his employer’s goals.
Such an employee has authorization to obtain and alter the
information that he downloaded. Moreover, he has no intent
to defraud his employer. But under the Nosal panel’s
approach, because he obtained information "in a manner" that
was not authorized (i.e., by downloading it to a personal com-
puter), he nevertheless would be liable under the CFAA. See
§ 1030(a)(2)(C). Believing that Congress did not clearly
intend to criminalize such behavior, we decline to interpret
"so" as "in that manner."
12        WEC CAROLINA ENERGY SOLUTIONS v. MILLER
   In so doing, we adopt a narrow reading of the terms "with-
out authorization" and "exceeds authorized access" and hold
that they apply only when an individual accesses a computer
without permission or obtains or alters information on a com-
puter beyond that which he is authorized to access.

                               3.

   In adopting these definitions, we reject any interpretation
that grounds CFAA liability on a cessation-of-agency theory.
The deficiency of a rule that revokes authorization when an
employee uses his access for a purpose contrary to the
employer’s interests is apparent: Such a rule would mean that
any employee who checked the latest Facebook posting or
sporting event scores in contravention of his employer’s use
policy would be subject to the instantaneous cessation of his
agency and, as a result, would be left without any authoriza-
tion to access his employer’s computer systems. We recog-
nize that the Seventh Circuit applied its reasoning to
egregious behavior that clearly violated the duty of loyalty.
See Citrin, 440 F.3d at 419. Nevertheless, we believe that the
theory has far-reaching effects unintended by Congress. See
Nosal, 676 F.3d at 862 (noting that the Seventh Circuit
"looked only at the culpable behavior of the defendant[ ]
before [it], and failed to consider the effect on millions of
ordinary citizens caused by the statute’s unitary definition of
‘exceeds authorized access’"); cf. Restatement (Third) of
Agency § 8.01 (2012) ("An agent has a fiduciary duty to act
loyally for the principal’s benefit in all matters connected
with the agency relationship."). Although an employer might
choose to rescind an employee’s authorization for violating a
use policy, we do not think Congress intended an immediate
end to the agency relationship and, moreover, the imposition
of criminal penalties for such a frolic.

                              III.

   WEC founds its CFAA claim on Miller’s and Kelley’s vio-
lations of its policies "prohibiting the use of any confidential
           WEC CAROLINA ENERGY SOLUTIONS v. MILLER                      13
information and trade secrets unless authorized" and prohibit-
ing the "download[ing] [of] confidential and proprietary infor-
mation to a personal computer." Notably, however, WEC fails
to allege that Miller and Kelley accessed a computer or infor-
mation on a computer without authorization. Indeed, WEC’s
complaint belies such a conclusion because it states that Mil-
ler "had access to WEC’s intranet and computer servers" and
"to numerous confidential and trade secret documents stored
on these computer servers, including pricing, terms, pending
projects[,] and the technical capabilities of WEC." Thus, we
agree with the district court that although Miller and Kelley
may have misappropriated information, they did not access a
computer without authorization or exceed their authorized
access. See 18 U.S.C. §§ 1030(a)(2)(C), (a)(4), (a)(5)(B)-(C).
Moreover, because Miller’s and Kelley’s conduct failed to
violate the CFAA, Arc cannot be liable under the statute for
any role that it played in encouraging such conduct. Accord-
ingly, we hold that WEC failed to state a claim for which the
CFAA can grant relief, see Fed. R. Civ. P. 12(b)(6), and we
affirm the district court’s dismissal of the claim.

                                   IV.

   Our conclusion here likely will disappoint employers hop-
ing for a means to rein in rogue employees. But we are
unwilling to contravene Congress’s intent by transforming a
statute meant to target hackers into a vehicle for imputing lia-
bility to workers who access computers or information in bad
faith, or who disregard a use policy. See Nosal, 676 F.3d at
863. ("We construe criminal statutes narrowly so that Con-
gress will not unintentionally turn ordinary citizens into crimi-
nals."). Providing such recourse not only is unnecessary,
given that other legal remedies exist for these grievances,4 but
  4
    As evidenced by WEC’s complaint, nine other state-law causes of
action potentially provide relief, including conversion, tortious interfer-
ence with contractual relations, civil conspiracy, and misappropriation of
trade secrets.
14       WEC CAROLINA ENERGY SOLUTIONS v. MILLER
also is violative of the Supreme Court’s counsel to construe
criminal statutes strictly. Lanier, 520 U.S. at 266. Thus, we
reject an interpretation of the CFAA that imposes liability on
employees who violate a use policy, choosing instead to limit
such liability to individuals who access computers without
authorization or who obtain or alter information beyond the
bounds of their authorized access.

                                                 AFFIRMED
