{"id":164,"date":"2015-07-10T15:40:33","date_gmt":"2015-07-10T19:40:33","guid":{"rendered":"https:\/\/sites.bu.edu\/dome\/?p=164"},"modified":"2015-07-24T12:51:52","modified_gmt":"2015-07-24T16:51:52","slug":"deja-vu-for-a-computer-programmer-a-new-york-statutes-language-saves-him-again","status":"publish","type":"post","link":"https:\/\/sites.bu.edu\/dome\/2015\/07\/10\/deja-vu-for-a-computer-programmer-a-new-york-statutes-language-saves-him-again\/","title":{"rendered":"D\u00e9j\u00e0 Vu for a Computer Programmer:  A New York Statute\u2019s Language Saves Him Again"},"content":{"rendered":"<p>A former Goldman Sachs computer programmer who had a federal jury conviction for illegally taking proprietary computer code from his employer overturned in 2012 was <a href=\"http:\/\/www.reuters.com\/article\/2015\/05\/01\/us-goldman-sachs-aleynikov-verdict-idUSKBN0NM43V20150501\"><span>found guilty again<\/span><\/a>\u2014only to have the conviction reversed again by a judge. The verdict came in a New York state prosecution, <em>People v. Aleynikov<\/em>. This high profile case not only inspired a character in Michael Lewis\u2019s book <em>Flash Boys<\/em>, but it also provides an interesting example of how a statute\u2019s text can play a pivotal role in a case\u2019s outcome.<\/p>\n<p>According to the facts in his <a href=\"https:\/\/scholar.google.com\/scholar_case?case=9924995296317038461&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr\"><span>federal appeal<\/span><\/a>, Sergey Aleynikov worked as a computer programmer for<\/p>\n<figure id=\"attachment_163\" aria-describedby=\"caption-attachment-163\" style=\"width: 381px\" class=\"wp-caption alignright\"><a href=\"\/dome\/files\/2015\/07\/NYSCapitolPanorama_CEL.jpg\"><img loading=\"lazy\" src=\"\/dome\/files\/2015\/07\/NYSCapitolPanorama_CEL-636x378.jpg\" alt=\"New York State Capitol Albany 1899\" width=\"371\" height=\"221\" class=\" wp-image-163\" srcset=\"https:\/\/sites.bu.edu\/dome\/files\/2015\/07\/NYSCapitolPanorama_CEL-636x378.jpg 636w, https:\/\/sites.bu.edu\/dome\/files\/2015\/07\/NYSCapitolPanorama_CEL-1024x608.jpg 1024w\" sizes=\"(max-width: 371px) 100vw, 371px\" \/><\/a><figcaption id=\"caption-attachment-163\" class=\"wp-caption-text\">New York State Capitol<br \/>Albany 1899<\/figcaption><\/figure>\n<p>Goldman Sachs from 2007-2009 where he developed complicated code for the company\u2019s high frequency trading (HFT) system. He left the company in June 2009 to go work for a start-up trading company. However, on his last day, he uploaded more than 500,000 lines of code from Goldman Sachs\u2019 HFT system to a server in Germany. When he arrived home, he downloaded the code to this personal computer and copied some of the files to other devices. On July 2, 2009, he traveled to attend meetings at his new company and took a flash drive with him containing some of the source code. The next day he was arrested. He was charged with violating the federal <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1832\"><span>Economic Espionage Act<\/span><\/a> (EEA) and the <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/2314\"><span>National Stolen Property Act<\/span><\/a> (NSPA). After only a few hours of deliberation, a jury found Aleynikov guilty of violating both acts. However, on appeal, the <a href=\"http:\/\/www.wired.com\/images_blogs\/threatlevel\/2012\/04\/Aleynikov-Appeal-Decision.pdf\"><span>Second Circuit<\/span><\/a> reversed both verdicts and held that Aleynikov\u2019s behavior did not violate either the EEA or the NSPA.<\/p>\n<p>What caused the reversal despite a seemingly confident jury? The language of both statutes. Aleynikov argued that the computer code was not a \u201cproduct\u201d that was \u201cproduced for or placed in interstate commerce\u201d as required by the EEA and that the computer code was not a \u201cgood\u201d or \u201cware\u201d under the NSPA because it was a purely intangible product. The Second Circuit agreed and adopted these fairly narrow readings of both statutes when it determined that Aleynikov\u2019s behavior did not violate either act.<\/p>\n<p>Starting with the EEA charge, the court did not resolve the question of whether intangible computer code is a \u201cproduct\u201d because it determined that Goldman\u2019s HFT system was not \u201cproduced for\u201d or \u201cplaced in\u201d interstate commerce (discussion at <em><a href=\"https:\/\/scholar.google.com\/scholar_case?case=9924995296317038461&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr\">U.S. v. Aleynikov<\/a><\/em>, 676 F.3d 71 at 82). The court read these words as requirements for a person to be found guilty of violating the EEA after relying on both the act\u2019s plain language and legislative history (discussion at pages 79-80). The court ultimately held that an internally used computer program that a company has no intention of selling was not \u201cproduced for\u201d or \u201cplaced in\u201d interstate commerce (discussion at page 82).<\/p>\n<p>The court did address whether computer code qualified as a \u201cgood\u201d when it looked at the NSPA because the term is undefined in the statute (discussion at page 76). The court heavily relied on precedent, including the Supreme Court\u2019s decision in <em><a href=\"http:\/\/caselaw.lp.findlaw.com\/scripts\/getcase.pl?navby=search&amp;court=US&amp;case=\/us\/473\/207.html\">Dowling v. United States<\/a><\/em>, to determine that a \u201cgood\u201d must be a tangible piece of property taken over state lines and because code is purely intangible it does not fall under the NSPA (discussion at page 77). In <em>Dowling<\/em>, the Supreme Court held that the NSPA \u201cclearly&#8230;contemplate[s] a physical identity between the items unlawfully obtained and those eventually transported.\u201d (discussion at <em>Dowling v. U.S.<\/em>, 473 U.S. 207 page 216). The Second Circuit also relied on similar decisions by the Tenth, Seventh, and First Circuits to conclude the NSPA does not cover the theft of intangible things and therefore, Aleynikov is not guilty of violating the act. (discussion at <em>U.S. v. Aleynikov<\/em>, 676 F.3d 71 pages 77-78).<\/p>\n<p>However, the story does not end there. After his federal charges were overturned, the Manhattan District Attorney\u2019s office decided to prosecute Aleynikov under state law. Aleynikov was <a href=\"http:\/\/www.wsj.com\/articles\/SB10001424127887324688404578543863716791772\"><span>charged<\/span><\/a> with two counts of <a href=\"http:\/\/codes.lp.findlaw.com\/nycode\/PEN\/THREE\/J\/165\/165.07\"><span>unlawful use of secret scientific material<\/span><\/a> and one count of <a href=\"http:\/\/codes.lp.findlaw.com\/nycode\/PEN\/THREE\/J\/156\/156.30\"><span>unlawful duplication of computer related material<\/span><\/a>. The jury <a href=\"http:\/\/www.nytimes.com\/2015\/05\/02\/business\/dealbook\/ex-goldman-programmer-found-guilty.html\"><span>recently<\/span><\/a> issued a split verdict and found Aleynikov guilty on one of the secret scientific material charges. The jury could not reach a decision on the second scientific material charge, and acquitted him on the duplication charge (which is a <a href=\"http:\/\/www.tradesecretsnoncompetelaw.com\/2015\/05\/articles\/trade-secrets-and-confidential-information\/recent-source-code-trade-secret-theft-conviction\/\"><span>bit odd<\/span><\/a> since both charges require a finding that the protected material was reproduced). For the purposes of a potential appeal, it is important to focus on the secret scientific material statute to determine whether it is likely an appeals court will overturn Aleynikov\u2019s guilty verdict.<\/p>\n<p>The statute states a \u201cperson is guilty of unlawful use of secret scientific material when&#8230;he makes a <em>tangible reproduction<\/em> or representation of such secret scientific material by means of writing, photographing, drawing, mechanically or electronically reproducing or recording such secret scientific material.\u201d (emphasis added). Similar to the federal case, because the New York statute fails to define \u201ctangible\u201d or whether computer code qualifies as a tangible item, the jury was required to make this decision to determine whether Aleynikov\u2019s transferring of source code to a flash drive violated the law. The jury spent over a week deliberating and had to have the jury instructions re-read several times before the instructions were eventually <a href=\"http:\/\/www.tradesecretsnoncompetelaw.com\/2015\/05\/articles\/trade-secrets-and-confidential-information\/recent-source-code-trade-secret-theft-conviction\/\"><span>provided in writing<\/span><\/a>. The jury also sent the presiding justice over a dozen notes <a href=\"http:\/\/washpost.bloomberg.com\/Story?docId=1376-NNOHNO6JTSE901-5I8CP8TELOQ3KPG75JKJMQLOK7\"><span>asking for clarity on the meaning of the law<\/span><\/a>, which suggested the <a href=\"http:\/\/www.nytimes.com\/2015\/05\/02\/business\/dealbook\/ex-goldman-programmer-found-guilty.html?_r=0\"><span>statute is unclear<\/span><\/a>.<sup> \u00a0<\/sup>As the <a href=\"http:\/\/www.nytimes.com\/2015\/05\/05\/business\/dealbook\/ex-goldman-sachs-programmers-twisting-case-has-a-few-turns-left.html?_r=1\"><span>New York Times<\/span><\/a> reported, even the justice who presided over the case expressed concern about whether Aleynikov\u2019s actions fell within the statute. Despite the long deliberation and some odd twists and turns (including <a href=\"http:\/\/www.wsj.com\/articles\/aleynikov-trial-continues-former-goldman-sachs-programmer-charged-with-stealing-code-1430333685\"><span>avocadogate<\/span><\/a>), the jury ultimately decided Aleynikov violated the law. In July, 2015, however,\u00a0 <a href=\"http:\/\/www.cnbc.com\/id\/102573763\"><span>the conviction was overturned<\/span><\/a> by the New York State Supreme Court. Justice Daniel Conviser <a href=\"http:\/\/www.huffingtonpost.com\/2015\/07\/06\/sergey-aleynikov-conviction_n_7736710.html\"><span>said prosecutors<\/span><\/a> \u201cdid not prove [Aleynikov] committed this particular obscure crime.\u201d<\/p>\n<p>This case is interesting because it highlights the difficulty jurors and judges face when interpreting statutes\u2014especially in light of advancing technology. The federal and state statutes were drafted prior to the creation of much of the technology involved in this case. After the Second Circuit\u2019s ruling on the EEA, <a href=\"http:\/\/www.littler.com\/federal-law\/understanding-the-new-theft-of-trade-secrets-clarification-act-of-2012\"><span>Congress actually amended the statute\u2019s language<\/span><\/a>.<\/p>\n<p>Given the judge\u2019s disagreement with the jury in this case, the New York statute\u2019s language is ambiguous and clearly a barrier to prosecutors bringing future criminal charges.\u00a0 Like Congress, the New York Legislature will have to make amendments to the current statutes, or create a new statute that reflects current technology\u2014and hope the language remains relevant for more than a few months.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"\/dome\/files\/2015\/07\/1436458928.jpeg\"><img loading=\"lazy\" src=\"\/dome\/files\/2015\/07\/1436458928.jpeg\" alt=\"1436458928\" width=\"84\" height=\"93\" class=\" size-full wp-image-154 alignleft\" \/><\/a>\u00a0 Amanda Hesse is from Princeton, New Jersey and graduated from American University with a dual major in Law &amp; Society and Public Communication. She anticipates graduating from Boston University School of Law with a <em>Juris Doctor<\/em> in Spring 2016. During Summer 2015, Amanda will intern at the Southern Poverty Law Center in Jackson, Mississippi, where she will focus on juvenile justice and prison conditions reform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A former Goldman Sachs computer programmer who had a federal jury conviction for illegally taking proprietary computer code from his employer overturned in 2012 was found guilty again\u2014only to have the conviction reversed again by a judge. The verdict came in a New York state prosecution, People v. Aleynikov. This high profile case not only [&hellip;]<\/p>\n","protected":false},"author":10136,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[4,6,11,5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/posts\/164"}],"collection":[{"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/users\/10136"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/comments?post=164"}],"version-history":[{"count":2,"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/posts\/164\/revisions"}],"predecessor-version":[{"id":180,"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/posts\/164\/revisions\/180"}],"wp:attachment":[{"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/media?parent=164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/categories?post=164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.bu.edu\/dome\/wp-json\/wp\/v2\/tags?post=164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}