Chapter 6 Q&A’s Jonathan Cutler October 3, 2011 Business Law 2050 6-1 Dunn has injured his reputation by stating Richard is the worst driver ever. Richard has a case of libel. 6-2 6-3 He was trespassing; the tort violated was the Intentional Torts against Property. It is also a conversion tort. (b) No, if the mechanics threw him off with reasonable force they would not be guilty of assault and battery. 6-4 6-5 The Defamation of character No, it did not. 6-6 Conversion - the wrongful possession or use of another person’s personal property without just cause. 6-7 Minimal damages should be awarded to the petitioners based solely upon the law and the Beacon journal should be made aware that their dialer system crashed and should be repaired. 6-8 No, it should not apply under these circumstances. She was falsely accused for having a fraudulent check. Her sixth amendment right was also violated. irvine v akron beacon journal chptr 6 TO: 1 More1 recipient CC: recipientsYou More Hide Details FROM: Case for question 6-7 Page history last edited by PBworks 2 years, 11 months ago Intentional Torts - Invasion of Privacy - Irvine v. Akron Beacon (2002) 147 Ohio App. 3d 428, *; 2002 Ohio 2204, 770 N.E.2d 1105, ***; 2002 Ohio App. LEXIS 2221 GENEVA IRVINE, et al., Appellees/Cross-Appellants v. AKRON BEACON JOURNAL, et al., Appellants/CrossAppellees C.A. Nos. 20450, 20524 COURT OF APPEALS OF OHIO, NINTH APPELLATE DISTRICT, SUMMIT COUNTY 147 Ohio App. 3d 428; 2002 Ohio 2204; 770 N.E.2d 1105; 2002 Ohio App. LEXIS 2221; 30 Media L. Rep. 1993 May 8, 2002, Decided PRIOR HISTORY: APPEALS FROM JUDGMENTS ENTERED IN THE COURT OF COMMON PLEAS. COUNTY OF SUMMIT, OHIO. CASE No. 99 10 3998. Irvine v. Akron Beacon Journal, 2002 Ohio 83, 2002 Ohio App. LEXIS 39, (Ohio Ct. App., Summit County 2002). DISPOSITION: Upon reconsideration, court of appeals' prior opinoin was vacated and trial court's judgment was affirmed, in part, reversed, in part, and cause was remanded. CASE SUMMARY PROCEDURAL POSTURE: The Summit County Court of Common Pleas (Ohio) awarded compensatory and punitive damages to appellee couple on their claims against appellant newspaper for invasion of privacy and for violations of the Telephone Consumer Protection Act (Act). The newspaper appealed. The couple appealed from an order that stayed the judgment but did not require the newspaper to post a bond. The case was heard upon reconsideration. OVERVIEW: The couple received many "hang-up" calls, including three late at night, from the newspaper. The appellate court held, among other things, that the trial court did not err in denying the newspaper's motion for judgment notwithstanding the verdict on the claims of invasion of privacy based on telephone harassment and punitive damages. The evidence supported that the newspaper called the couple with such persistence and frequency as to amount to a course of hounding. Also, there was ample evidence that the newspaper acted in conscious disregard to the rights of others and that its conduct had a great probability of causing substantial harm. When its auto-dialing system "crashed" and its disconnect data was lost, it ran the system over two nights. Next, the calls during restricted hours qualified as "telephone solicitations" under 47 U.S.C.S. § 227(a)(3) of the Act, in spite of the fact that there was no solicitor on the line. The newspaper demonstrated a reckless disregard for whether its conduct of running the disconnect list overnight violated the Act. However, the trial court erred by awarding treble damages in addition to the statutory damages, rather than in lieu of them. OUTCOME: The judgment was reversed and remanded only insofar as the trial court awarded treble damages in addition to statutory damages under the Telephone Consumer Protection Act. The judgment was otherwise affirmed. OPINION: ***1107 *431 DECISION AND JOURNAL ENTRY Dated: May 8, 2002 Upon reconsideration, the decision previously filed in this case, Irvine v. Akron Beacon Journal, 9th Dist. Nos. 20450 and 20524, 2002 Ohio 83, 2002 Ohio App. LEXIS 39, is hereby vacated and replaced with this decision and journal entry. This cause was heard upon the record in the trial court. Each error assigned has been reviewed and the following disposition is made: BATCHELDER, P. J. P1 Appellant, Akron Beacon Journal ("Beacon Journal"), appeals from a judgment of the Summit County Court of Common Pleas that awarded compensatory and punitive damages to appellees, Edward and Geneva Irvine, on their claims against Beacon Journal for invasion of privacy and for violations of the Telephone Consumer Protection Act. Beacon Journal also appeals from a post-judgment order that awarded attorney fees to the Irvines. The Irvines appeal from another order of the trial court that stayed the judgment but did not require Beacon Journal to post a bond. We affirm in part and reverse in part. I. P2 On October 5, 1999, the Irvines filed this action against Beacon Journal, one of its reporters, one of its photographers, and members of its editorial staff, alleging statutory and tort claims based upon alleged newsgathering and telemarketing activities by the defendants. The matter commenced to a jury trial, which revealed the following facts underlying the Irvines' claims. Newsgathering Claims P3 Because these claims are not at issue in this appeal, the underlying facts will be detailed only briefly. Mr. Irvine is the former chief of the Akron Police Department. During October 1998, Mrs. Irvine was treated for injuries at a local hospital and, while there, made allegations that her husband had caused *432 her injuries. Mrs. Irvine later recanted her statements. This incident led to, among other things, a criminal investigation, an internal investigation by the police department, ***1108 and several articles in the Beacon Journal about the allegations of domestic abuse and the subsequent investigations into those allegations. During this period, Mrs. Irvine went to Louisiana to stay with her sister. In an attempt to get Mrs. Irvine's side of the story, Beacon Journal attempted to contact Mrs. Irvine while she was in Louisiana. The Irvines' complaint alleged that the actions taken by Beacon Journal reporters and others constituted an invasion of Mrs. Irvine's privacy. Telemarketing Claims P4 The bulk of this appeal focuses on Beacon Journal's telemarketing practice, and its impact on the Irvines, during the spring and summer of 1999. During the summer of 1999, the Irvines' household was receiving numerous "hang-up" telephone calls. Because the caller identification indicated only that these calls came from a private line, Chief Irvine was unable to determine the source of the calls. Consequently, he filed a criminal telephone harassment complaint and Ameritech placed a trap on the Irvines' phone line. The Ameritech trap revealed that several of the hang-up calls that the Irvines had received had come from Beacon Journal's telemarketing department. Three of those calls rang into the Irvines' home during early morning hours. Due to the volume of such calls that the Irvines allegedly had received, and because they believed that some of the calls violated the federal Telephone Consumer Protection Act, the Irvines added claims to their complaint based on the federal act and common law invasion of privacy. P5 During the relevant period of time, Beacon Journal's telemarketing department was equipped with an automatic dialing machine that would be programmed to dial specific telephone numbers. During business hours, the autodialer was used to maximize the productivity of Beacon Journal's sales force. With Beacon Journal's emphasis on productivity, there were many ways by which solicitation targets might receive "hang-up" calls from its telemarketing department. Rather than having a sales representative waste time making calls that would not result in a connection with a potential subscriber, the autodialer was used to call multiple telephone numbers at once. The autodialer would call two phone numbers for every sales representative working and would connect the calls to a sales representative only after someone answered at the other end. If the call was not answered within the first three rings, the autodialer dropped it. The recipient of such a call would be able to identify the call only as a hang-up call, unidentifiable by their caller ID. *433 P6 If the autodialer made multiple connections at the same time, there was sometimes no sales representative available to take the call. In those situations, the autodialer would hang onto the call for a short period of time in case a sales representative became available. If no sales representative became available within a set period of time, the call was dropped. A person answering such a call would hear nothing but dead air and a hang up. The autodialer would place the telephone number for such a "dropped call" back on the dialing list and call it again later. A specific telephone number could potentially be called numerous times before an actual connection with a sales representative was made. P7 During this period, Beacon Journal's subscription sales force heavily targeted two particular groups of relevance here: former subscribers and newly-connected telephone numbers. Beacon Journal attempted to win back its former subscribers by calling them "as much as possible" during the first weeks after cancellation ***1109 of a subscription. Beacon Journal's telemarketers also focused on newly-connected telephone numbers because those telephone numbers potentially belonged to new members of the community who were typically good prospects for newspaper subscription sales. P8 Beacon Journal compiled a list of newly-connected telephone numbers through the following process. Every weekend, after the regular sales calls were made, Beacon Journal programmed its autodialer to dial the "disconnect list," a list of telephone numbers that Beacon Journal previously had determined were not working telephone numbers. The autodialer would call the telephone numbers from the preprogrammed disconnect list and record one of two things: (1) a three-toned signal, indicating that the number remained disconnected, or (2) a ring, indicating that the number had been reconnected and was currently a working telephone number. Either way, once the autodialer detected one of those two sounds, it recorded the information and dropped the call. Even if the call was answered, the call was not connected to a sales representative because they were not working at the time. P9 If the disconnect list was programmed into the autodialer properly and the autodialer was working properly, each telephone number on the list would be called only once and the machine would record whether that number remained disconnected or whether it was a newly-connected number. The Irvines' Inadvertent Role as Telemarketing Targets P10 During the spring and summer of 1999, the Irvines inadvertently became targets of Beacon Journal's telemarketing department for two reasons. During the spring of 1999, the Irvines canceled their subscription to the Sunday Beacon Journal. Consequently, they received numerous calls from the telemarketing department in an attempt to win back their business. According to the *434 testimony of Chief Irvine, Beacon Journal also called him numerous times before the subscription expired, seeking a renewal order. P11 According to Chief Irvine, in an attempt to avoid annoying calls from the Beacon Journal and unidentified hang-up calls, he had their telephone number changed to a new, unlisted telephone number on June 22, 1999. Unfortunately for the Irvines, however, because their new phone number was a formerly-disconnected number, changing the phone number merely set them up for additional telemarketing calls from Beacon Journal. Thus, even if everything had been working properly with Beacon Journal's telemarketing system, the Irvines had unknowingly become targets for numerous unsolicited calls. Problems with the System P12 Beacon Journal's telemarketing system apparently was not working properly during the spring and summer of 1999 and many of the problems with the system directly impacted the Irvines. The computerized system crashed often, causing it to lose data. When data was lost, the autodialer would revert to the beginning of the preprogrammed list and call the telephone numbers again. The Irvines apparently received many calls for this reason. P13 Other calls placed in violation of the federal act, however, were due to human error. After business hours on two nights during late June and early July 1999, because the autodialer had not worked properly during its usual time for running the disconnect list, Beacon Journal set the machine to run all night. The list of newly-connected numbers was a very important list to the telemarketing ***1110 department. Beacon Journal's circulation sales manager was not willing to wait until the following weekend to run the disconnect list, apparently worried that Beacon Journal would potentially lose several subscription sales. P14 During those two nights, the autodialer called the Irvines' telephone number a total of three times. In addition to the three late night calls, the Irvines' number was called on the disconnect list several other times. One call should have been enough for the computer to detect a ring and determine that the Irvines' number was a newly-connected number. One Beacon Journal telemarketing person attempted to explain why the Irvines number was called repeatedly. He opined that the number might have been inadvertently programmed into the system more than once and/or that the computer crashed and lost data so that the number was called again. On cross-examination, however, the witness essentially conceded that neither of these explanations fully explained why the Irvines' number was called so many times. Verdict P15 At the close of the defendants' case, the trial court directed a verdict for the individually-named defendants on the Irvines' telemarketing claims. The *435 jury found for the defendants on the newsgathering claims. The jury found for each of the Irvines against the Beacon Journal, however, on their claims for common law invasion of privacy based on telephone harassment and for violations of the Telephone Consumer Protection Act. P16 Based on its answers to special interrogatories, the jury indicated that Beacon Journal violated the Telephone Consumer Protection Act on three separate occasions when its autodialer called the Irvines' house between the restricted hours of 9:00 p.m. and 8:00 a.m. The jury awarded the Irvines $ 500 for each violation, for total statutory damages of $ 1500. The jury also found that the violations had been committed knowingly or willfully and awarded $ 4,500 in treble damages. P17 The jury also found that Beacon Journal's telemarketing practices had invaded the privacy of each of the Irvines. On these claims, the jury awarded each of the Irvines $ 250 in compensatory damages and $ 100,000 in punitive damages. The trial court entered judgment on the jury verdict. P18 Following a post-trial hearing before a magistrate, the Irvines were awarded $ 60,485.25 in attorney fees. The trial court adopted the magistrate's recommended award and overruled the objections raised by Beacon Journal. P19 Beacon Journal appeals from those two orders, raising fourteen assignments of error, some of which will be consolidated for ease of discussion. The Irvines also appeal from a later order of the trial court that stayed the Irvines' judgment against Beacon Journal but did not require Beacon Journal to post a bond. The appeals were consolidated and, though the appeals were from separate orders of the trial court, for briefing purposes, Beacon Journal was designated the appellant and the Irvines, the cross-appellants. Consequently, Beacon Journal's assignments of error will be addressed first and then the Irvines' sole assignment of error, designated a cross-assignment of error, will be addressed. II. First Assignment of Error P20 THE TRIAL COURT ERRED BY RETURNING THE JURY TO FURTHER DELIBERATIONS AND NOT ENTERING JUDGMENT IN FAVOR OF THE BEACON PURSUANT TO CIV.R. 49(B) AND/OR CORRECTING THE JURY'S VERDICT IN FORM, CONSISTENT ***1111 WITH THE JURY'S INTERROGATORY ANSWER THAT THE BEACON DID NOT INVADE THE APPELLEES' PRIVACY IN REGARDS TO TELEPHONE HARASSMENT. P21 Beacon Journal contends that the trial court erred when, after the jury's initial deliberations, it failed to enter judgment on the jury's answers to special interrogatories that were inconsistent with the general verdict on the *436 Irvines' invasion of privacy claim. Specifically, the jury initially returned with a general verdict for the Irvines on this claim, with an award of compensatory damages of $ 250 each and an award of punitive damages of $ 100,000 for each of the Irvines. The general verdict form was signed by six of the eight jurors. The jury's answers to three of the special interrogatories, however, were inconsistent with the general verdict. Through those interrogatories, the jurors indicated that Beacon Journal did not invade the privacy of either of the Irvines in regard to telephone harassment, nor did it act with actual malice. n1 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - - n1 The original forms completed by the jury are not part of the record. This court's review therefore is limited to what is apparent from transcribed discussions between the trial judge and counsel. Beacon Journal also asserts an argument based on a fact that does not appear in the record. Consequently, that argument will not be addressed. - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - P22 The trial court asked the jury to return for further deliberations but, when the jury returned, it had completed the three interrogatories just as it had done before, except that it had failed to complete any general verdict form on this claim. The trial court sent the jury back again for further deliberations. The jury returned with a general verdict for the Irvines, with the same damages as it had initially awarded, and with answers to the three interrogatories that were consistent with its general verdict. P23 Faced with an inconsistency between the general verdict and the answers to three of the interrogatories, there were three options available to the trial court: P24 HN1Go to the description of this Headnote.*** When one or more of the answers to interrogatories is inconsistent with the general verdict, 1 judgment may be entered pursuant to Rule 58 in accordance with the answers, notwithstanding the general verdict, or 2 the court may return the jury for further consideration of its answers and verdict or 3 may order a new trial. P25 Civ.R. 49(B). HN2Go to the description of this Headnote.It is within the sound discretion of the trial court to determine which of these three actions to take. Tasin v. SIFCO Industries, Inc. (1990), 50 Ohio St.3d 102, 553 N.E.2d 257, paragraph one of the syllabus. P26 Beacon Journal contends that the trial court abused its discretion by failing to enter judgment for Beacon Journal, based on the original answers to special interrogatories, the first option listed in Civ.R. 49(B). Beacon Journal's argument suggests that the option of entering judgment on the answers to interrogatories is the preferred action that the trial court should take and that returning the jury for further deliberations is the action to be taken only in limited situations. On the contrary, the Ohio Supreme Court has often stated that HN3Go to the description of this Headnote.the preferable option under Civ.R. 49(B) is to send the jury back for further deliberations. See, e.g., Perez v. Falls Financial, Inc. (2000), 87 Ohio St.3d 371, 375-376, 721 N.E.2d 47; Shaffer v. Maier *437 (1994), 68 Ohio St.3d 416, 421-422, 627 N.E.2d 986. In fact, if there is any restraint on the trial court's discretion in this situation, it is when the court is permitted to enter judgment on the answers to special interrogatories that are inconsistent with the general verdict. See Otte v. Dayton Power & Light Co. (1988), 37 Ohio St.3d 33, 41, 523 ***1112 N.E.2d 835. Beacon Journal has failed to demonstrate that the trial court abused its discretion by sending the jury back for further deliberations until it resolved the inconsistency between the general verdict and the special interrogatories. P27 Beacon Journal further contends that the trial court erred in its instructions to the jury when it sent the jury back for further deliberations. Although Beacon Journal raised an objection to the trial court sending the jury back for further deliberations, it raised no objection to the manner in which court instructed the jury. Consequently, it waived all but plain error. See Perez, 87 Ohio St.3d at 375. Beacon Journal cites only two cases in support of its argument, one of which does not even address the issue and the other was subsequently reversed on this issue by the Ohio Supreme Court. Therefore, Beacon Journal has failed to demonstrate error, much less that this was one of those rare situations in which the plain error doctrine should be invoked. See id. at 375-377. The first assignment of error is overruled. Second Assignment of Error P28 THE TRIAL COURT ERRED IN INSTRUCTING THE JURY ON INVASION OF PRIVACY BASED ON TELEPHONE HARASSMENT. P29 Through this assignment of error, Beacon Journal contends that the trial court erred in its jury instruction on the invasion of privacy claims. Although Beacon Journal raised several objections to the trial court's instruction on invasion of privacy, it has abandoned some of those arguments on appeal and has raised some new ones. HN4Go to the description of this Headnote."When a party fails to object to the giving of or failure to give a jury instruction before the jury retires to consider a verdict, the party may not assign as error the giving of or failure to give such instruction." Schade v. Carnegie Body Co. (1982), 70 Ohio St.2d 207, 436 N.E.2d 1001, paragraph one of the syllabus. Consequently, this court will address only the argument that Beacon Journal preserved for appeal through a timely objection. P30 Beacon Journal asserts that the trial court erred by excluding from its instruction the language from Restatement of the Law 2d, Torts (1965) Section 652B, Comment d, that one, two, or even three telephone calls do not constitute an invasion of privacy. By excluding that language, Beacon Journal contends, the jury was misled to believe that two or three phone calls could constitute an invasion of privacy. P31 *438 HN5Go to the description of this Headnote.To demonstrate reversible error, Beacon Journal must demonstrate (1) that the trial court abused its discretion by failing to give the requested instruction, and (2) that it was prejudiced as a result. Jaworowski v. Med. Radiation Consultants (1991), 71 Ohio App.3d 320, 327, 594 N.E.2d 9. Beacon Journal has failed to demonstrate either error or prejudice. P32 The trial court gave a fairly detailed instruction on invasion of privacy, which included the following explanation: P33 It is only when telephone calls are repeated with such persistence and frequency as to amount to a course of hounding the Plaintiffs that becomes a substantial burden to his existence that the Plaintiffs' privacy is invaded. P34 The inclusion of this language should have made it clear to the jury that more than two or three telephone calls were required before liability would attach. Beacon Journal has failed to demonstrate an abuse of discretion by the trial court. P35 Beacon Journal attempts to demonstrate confusion on the part of the jury by linking the common law invasion of privacy telemarketing claims to the statutory ***1113 telemarketing claims, suggesting that the jury verdicts against it on all telemarketing claims were based on the same three late night phone calls. The jury's answers to interrogatories indicate that those three calls formed the basis of Beacon Journal's statutory liability, but there was no special interrogatory to indicate the specific conduct that formed the basis of Beacon Journal's common law invasion of privacy liability, where the jury awarded the bulk of its damages. Although the jury found that only three telephone calls made by Beacon Journal violated the federal act because they were made during restricted hours, HN6Go to the description of this Headnote.telephone calls need not be made at a certain time of the day to constitute an invasion of privacy. The record contains evidence of many more telemarketing calls generated by Beacon Journal to the Irvines during other hours of the day. Thus, Beacon Journal's repeated suggestion that the invasion of privacy claims were based on a mere three phone calls is unfounded. The second assignment of error is overruled. Third Assignment of Error P36 THE TRIAL COURT ERRED IN DENYING THE BEACON'S MOTIONS FOR DIRECTED VERDICT AND/OR JUDGMENT NOTWITHSTANDING THE VERDICT ON APPELLEES' INVASION OF PRIVACY CLAIMS BASED UPON TELEPHONE HARASSMENT. Fourth Assignment of Error P37 THE JURY'S VERDICT ON APPELLEES' INVASION OF PRIVACY CLAIMS BASED UPON TELEPHONE HARASSMENT AND THE JUDGMENT ENTERED THEREON WERE CONTRARY TO LAW AND AGAINST THE MANIFEST WEIGHT OF THE EVIDENCE. P38 *439 We will address these assignments of error together because they are closely related. Beacon Journal contends that the trial court erred in denying its motions for directed verdict and for judgment notwithstanding the verdict on the Irvines' claims for invasion of privacy based on telephone harassment. Beacon Journal did not move for a directed verdict on this basis, n2 but it did move for a JNOV. Beacon Journal also contends that the judgment for the Irvines on these claims was against the manifest weight of the evidence. n2 Although Beacon Journal moved for a directed verdict on the newsgathering invasion of privacy claim, it did not articulate an argument on the telephone harassment invasion of privacy claim. P39 HN7Go to the description of this Headnote.The standard for granting a motion for judgment notwithstanding the verdict pursuant to Civ. R. 50(B) is the same as that for granting a motion for a directed verdict pursuant to Civ. R. 50(A). Gladon v. Greater Cleveland Regional Transit Auth. (1996), 75 Ohio St.3d 312, 318-319, 662 N.E.2d 287. Civ.R. 50(A) (4) provides: P40 HN8Go to the description of this Headnote.*** When a motion for a directed verdict has been properly made, and the trial court, after construing the evidence most strongly in favor of the party against whom the motion is directed, finds that upon any determinative issue reasonable minds could come to but one conclusion upon the evidence submitted and that conclusion is adverse to such party, the court shall sustain the motion and direct a verdict for the moving party as to that issue. P41 HN9Go to the description of this Headnote.It is well established that the court must neither consider the weight of the evidence nor the credibility of the witnesses in disposing of a directed verdict motion." Strother v. Hutchinson (1981), 67 Ohio St.2d 282, 284, 423 N.E.2d 467, citing Durham v. Warner Elevator Mfg. Co. (1956), 166 Ohio St. 31, 139 N.E.2d 10. "If there is substantial competent evidence to support the party against whom the motion is ***1114 made, upon which evidence reasonable minds might reach different conclusions, the motion must be denied." Hawkins v. Ivy (1977), 50 Ohio St.2d 114, 115, 363 N.E.2d 367, citing Kellerman v. J.S. Durig Co. (1964), 176 Ohio St. 320, 199 N.E.2d 562. P42 HN10Go to the description of this Headnote.When reviewing the weight of the evidence, this court applies the same test in civil cases as it does in criminal cases. Tewarson v. Simon (2001), 141 Ohio App.3d 103, 115, 750 N.E.2d 176. "The reviewing court * * * weighs the evidence and all reasonable inferences, considers the credibility of witnesses and determines whether in resolving conflicts in the evidence, the finder of fact clearly lost its way and created such a manifest miscarriage of justice that the judgment must be reversed and a new trial ordered." Id., citing State v. *440 Thompkins (1997), 78 Ohio St.3d 380, 387, 678 N.E.2d 541, quoting State v. Martin (1983), 20 Ohio App.3d 172, 175, 485 N.E.2d 717. P43 The trial court instructed the jury on the telemarketing invasion of privacy claim, in relevant part, as follows: P44 One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person. P45 *** P46 In regard to the alleged telephone harassment and invasion of privacy, it is only when telephone calls are repeated with such persistence and frequency as to amount to a course of hounding the Plaintiffs that becomes a substantial burden to his existence that the Plaintiffs' privacy is invaded. P47 Beacon Journal contends that reasonable minds could only conclude, and that the jury lost its way in reaching a conclusion to the contrary, that Beacon Journal did not call the Irvines "with such persistence and frequency as to amount to a course of hounding" or to become a "substantial burden to their existence." This court does not agree. P48 Although Beacon Journal again focuses solely on the three late night phone calls, there was evidence before the jury that the Irvines received many other phone calls from Beacon Journal. Chief Irvine testified that they received hundreds of phone calls from Beacon Journal. During some calls, the caller identified himself or herself as being from the Beacon Journal. Many of the calls were "hang-up" calls, however. Beacon Journal contends that, other than the calls recorded by Beacon Journal and Ameritech, the Irvines did not prove that these calls came from Beacon Journal. P49 The evidence demonstrated, however, that Chief Irvine filed a criminal complaint because he was receiving so many hang-up calls and could not identify the source of the calls on his caller ID. Once Ameritech placed a trap on his phone, many hang-up calls were identified as coming from Beacon Journal's telemarketing department. In fact, Beacon Journal's own records indicate that it placed six calls of short duration, presumably hang-up calls, to the Irvines' residence during the few days before the trap was put on the line. P50 Beacon Journal repeatedly asserts that the Irvines' numbers are too high and stresses the fact that their numbers are not supported by the records of Ameritech or Beacon Journal. None of these records, however, included a full reporting of the calls placed by Beacon Journal to the Irvines' residence. The *441 Ameritech phone trap was only on the ***1115 phone for twenty-one days of the relevant five-month period and only recorded those calls that the Irvines asked it to. P51 Beacon Journal's records did not include any statistics for calls placed before May. Moreover, the Beacon Journal log failed to include some calls that were on the Ameritech log, indicating that the log did not record all calls placed to the Irvines. A Beacon Journal witness explained that the Beacon log would not record calls that were less than seven seconds in duration and that the system crashing might cause it to lose data on other calls. Because there also was evidence before the jury that the autodialer system repeatedly crashed and lost data during this period, the jury could reasonably conclude that Beacon Journal's logs were not an accurate record of the number of calls placed to the Irvines' residence. P52 This court cannot say that the jury lost its way in concluding that Beacon Journal called the Irvines "with such persistence and frequency as to amount to a course of hounding." The third and fourth assignments of error are overruled. Fifth Assignment of Error P53 THE TRIAL COURT ERRED IN DENYING THE BEACON'S MOTIONS FOR DIRECTED VERDICT AND/OR JUDGMENT NOTWITHSTANDING THE VERDICT ON APPELLEES' PUNITIVE DAMAGES CLAIMS. Sixth Assignment of Error P54 THE JURY'S VERDICTS IN FAVOR OF APPELLEES ON THEIR PUNITIVE DAMAGES CLAIMS AND THE JUDGMENT ENTERED THEREON WERE AGAINST THE MANIFEST WEIGHT OF THE EVIDENCE. P55 We will address these assignments of error together because they are closely related. Beacon Journal contends that the trial court erred in denying its motions for directed verdict and for judgment notwithstanding the verdict on the Irvines' claims for punitive damages. Beacon Journal also contends that the punitive damage awards were against the manifest weight of the evidence. P56 The trial court instructed the jury that it could award punitive damages if it found that Beacon Journal acted with actual malice. The trial court defined "actual malice" as "a state of mind characterized by hatred, ill will, or a spirit of revenge or a conscious disregard for the rights and safety of other persons that has a great probability of causing substantial harm." Beacon Journal contends that there was no evidence that it acted with actual malice. P57 Although there is no evidence that Beacon Journal acted with hatred or ill will, there is ample evidence that it acted in conscious disregard to the *442 rights of others and that its conduct had a great probability of causing substantial harm. Beacon Journal's telemarketing system was purportedly designed to maximize productivity while at the same time minimizing the intrusion caused by the phone calls. The jury could reasonably conclude, however, that Beacon Journal's actions during the summer of 1999 demonstrated an emphasis on productivity at the expense of the recipients of the calls. During this time, the autodialer computer system crashed repeatedly, yet there is no evidence that Beacon Journal took any steps at that time to protect recipients of calls from the disturbance caused by additional calls. n3 Instead, when the system crashed, the steps Beacon Journal took were to run the autodialer again so that it could regain the data it lost, calling many telephone numbers again and again. n3 Beacon Journal apparently replaced the system at a later time. P58 ***1116 Even if the jury focused only on the late night phone calls, the evidence supported the jury's apparent conclusion that Beacon Journal's actions had a great probability of causing substantial harm. Beacon Journal limits its argument to the harm caused to the Irvines, overlooking the fact that the Irvines' telephone number was not the only one called by Beacon Journal during prohibited hours those two nights. HN11Go to the description of this Headnote.The focus of punitive damages is on the defendant's conduct and whether it acted in conscious disregard to others, not just the particular plaintiffs in this case. See Preston v. Murty (1987), 32 Ohio St.3d 334, 512 N.E.2d 1174, syllabus. P59 There was no evidence of exactly how many calls were placed by the autodialer when it ran the disconnect list those two nights. There was evidence, however, that during a regular four-hour sales shift, the autodialer would place approximately five thousand calls and that it took several hours for Beacon Journal to run its disconnect list every weekend. The purpose of running the list was to generate a solicitation list. Witnesses from Beacon Journal's telemarketing department explained that the "fastest and best way for it to find new movers in the marketplace is to call through a disconnect list *** and find newly activated telephone numbers that it can, at a later time, call for subscription sales." The resulting data was a list of hot prospects that Beacon Journal would target heavily for the first few weeks after the number was connected. When the system crashed in late June 1999 and Beacon lost data about the newly-connected numbers, it was not willing to wait until the next weekend to re-gather information about these numbers. Although there was no direct evidence of how many newly-connected numbers Beacon Journal expected to find when it ran its disconnect list, the jury could reasonably infer from the evidence that Beacon Journal expected the number to be significant. *443 P60 Beacon Journal repeatedly suggests that because there was no sales pitch, but merely the brief ringing of the phone, these calls caused no real intrusion. Although the intrusion of a hang-up call apparently seems minimal to Beacon Journal, many of these hang-up calls came in the middle of the night, potentially waking people from a sound sleep. The recipient of a late night hang-up call would typically assume that the caller is attempting to harass him or to determine whether anyone is at home. He would not likely conclude that the calls were coming from an autodialer in a telemarketing department that had been experiencing computer glitches. P61 Middle-of-the-night hang-up calls would be disturbing to anyone, but Beacon Journal apparently did not even factor that consideration into its decision-making process. They set the machine to run all night, everyone went home, and when they came back the next day the data was waiting for them. The evidence further demonstrated that no one even bothered to review the data after it was gathered because they saw no need to. If they had, they could have determined that the autodialer detected a ring on the Irvines' line on June 27, yet it called that number on the disconnect list several more times, including the three calls in the middle of the night. It was apparently not until this litigation that Beacon Journal saw the need to review its data and discovered that the Irvines' number, and the jury could reasonably infer many other telephone numbers, were called on the disconnect list far more than the one time that should have been required to detect that the number had been reconnected. P62 ***1117 The jury could reasonably conclude that Beacon Journal acted in conscious disregard to the rights of others and that its conduct had a great probability of causing substantial harm. Therefore, Beacon Journal has failed to demonstrate that the trial court erred in denying its motions for directed verdict and judgment notwithstanding the verdict or that the jury lost its way on the Irvines' claims for punitive damages. The fifth and sixth assignments of error are overruled. Seventh Assignment of Error P63 THE JURY'S VERDICTS IN FAVOR OF APPELLEES ON THEIR CLAIMS FOR PUNITIVE DAMAGES AND THE JUDGMENTS ENTERED THEREON ARE EXCESSIVE AND/OR UNCONSTITUTIONAL UNDER OHIO AND FEDERAL LAW. P64 In addition to its claim that the punitive damage awards were not supported by the evidence, Beacon Journal raises a legal challenge to those awards. Beacon Journal's legal argument challenges the large disparity between the punitive damage award ($ 100,000) and the compensatory damage award ($ 250). Beacon Journal contends that each punitive damage award that was 400 times each compensatory damage award was, on its face, impermissible. In *444 support of this argument, Beacon Journal cites Gray v. General Motors Corp. (1977), 52 Ohio App.2d 348, 359, 370 N.E.2d 747, in which the court found a punitive damage award that was also 400 times the compensatory damage award to be grossly disproportionate and, therefore, impermissible. The Gray court, however, did not find the punitive damages to be excessive solely based on the numbers. The court did not apply a "rigid mathematical formula" but instead looked at the evidence of wrongdoing that was before the jury. The Gray court stressed that punitive damages "must bear some reasonable relation or proportion to actual damages, that is, the nature and extent of the wrong done the plaintiff." Id. The court focused not only on the disparity between the punitive damages and the compensatory damages, but also on the fact that there was no direct evidence that the defendant had acted with actual malice. Id. P65 HN12Go to the description of this Headnote.Low compensatory damages and high punitive damages assessed by a jury are not in and of themselves cause to reverse the judgment or to grant a remittitur, since it is the function of the jury to assess the damages and, generally, it is not for the trial or appellate court to substitute its judgment for that of the trier of fact. A large disparity, standing alone, is insufficient to justify a court's interference with the province of the jury. Wightman v. Consolidated Rail Corp. (1999), 86 Ohio St.3d 431, 438, 715 N.E.2d 546 quoting Villella v. Waikem Motors, Inc. (1989), 45 Ohio St.3d 36, 40, 543 N.E.2d 464. P66 HN13Go to the description of this Headnote.A large disparity, in and of itself, does not constitute reversible error because an award of punitive damages is more about a defendant's behavior than the plaintiff's loss. "The purpose of punitive damages is not to compensate a plaintiff, but to punish and deter certain conduct." Moskovitz v. Mt. Sinai Med. Ctr. (1994), 69 Ohio St.3d 638, 651, 635 N.E.2d 331. HN14Go to the description of this Headnote.The actual damage sustained by the plaintiff "has little to do with how a jury might effectively and fairly punish and deter the defendant's tortious conduct ." Wightman, 86 Ohio St.3d at 439. Factors that might make a large punitive damage award appropriate in a particular case include "a substantial harm, a continuing risk, a deterrent effect, and an economically viable defendant." Id. P67 Thus, Beacon Journal's legal argument essentially becomes a factual one. Beacon Journal did not articulate a factual argument under this assigned error, however, ***1118 and this court is not inclined to make Beacon Journal's argument for it. Consequently, the seventh assignment of error is overruled. Eighth Assignment of Error P68 THE TRIAL COURT ERRED IN DENYING APPELLANTS' MOTION FOR DIRECTED VERDICT ON PLAINTIFFS' CLAIMS UNDER THE TELEPHONE CONSUMER PROTECTION ACT. P69 Beacon Journal contends that the trial court should have granted it a directed verdict on the Irvines' claims under the Telephone Consumer *445 Protection Act. It contends that the undisputed evidence demonstrated that the only calls placed during restricted hours did not qualify as "telephone solicitations" under the act because the calls were placed by an automated dialing machine and no solicitor was even intending to speak to the Irvines. This argument is not persuasive. P70 Beacon Journal does not dispute that its telemarketing department placed the calls and that if the calls qualified as "telephone solicitations, " they constituted violations of the Telephone Consumer Protection Act because the calls were placed between the restricted hours of 9:00 p.m. and 8:00 a.m. Their argument is that these calls did not constitute telephone solicitations because no sales representative was on the other end of the line; in fact, no sales representatives were even in the building at the time the calls were placed. P71 Section 227(a) (3), Title 47, U.S.Code defines the term "telephone solicitation" as HN15Go to the description of this Headnote."the initiation of a telephone call *** for the purpose of encouraging the purchase or rental of, or investment in, property, goods, or services[.] " Beacon essentially contends that a telephone call does not qualify as a "telephone solicitation" unless a sales representative is on the other end of the line, intending to speak to the recipient of the call. P72 Beacon Journal cites no legal authority to support its argument, nor does it point to specific language of the definition that supports such a construction. There is no language in the statute requiring that a conversation take place or that a sales representative be at the other end of the line. As the Irvines argued in opposition to Beacon Journal's motion for directed verdict, the mere ringing of the phone could constitute a violation. P73 HN16Go to the description of this Headnote.Section 227(a) (3), Title 47, U.S.Code, as quoted above, refers to the "initiation" of a telephone call, not the completion of one. Expressions of legislative intent further support the trial court's construction of the statute. The Congressional findings following Section 227(a) (3), Title 47, U.S.Code stress the need to control the invasion into the privacy of the homes of consumers by telemarketers. The findings make repeated references to the low-cost technology of "automated or prerecorded telephone calls," suggesting that, if left unchecked, consumers could become overwhelmed by such calls. Legislative concern is directed toward the telephone calls themselves, noting that multimillions of such calls are placed each day, and that each time a telephone line is tied up with a call, it is "seized" for the duration of the call. P74 The fact that no solicitor was at the other end of the line each time that Beacon Journal called the Irvines in the middle of the night does not demonstrate to this court that no reasonable fact finder could have found that the calls were placed for the purpose of encouraging the sale of a Beacon Journal subscription. Even if Beacon Journal did not intend to make a solicitation at *446 those particular times, Beacon Journal's own evidence was that the purpose of these calls was to detect ***1119 recently-connected telephone numbers so that it could generate a telemarketing list of numbers to be called by telemarketers in the future. The fact that these particular calls were one step removed from the actual sales pitch does not mean that the purpose of the calls was not to, ultimately, attempt to sell a subscription to the Beacon Journal. This court is not persuaded by Beacon Journal's argument that the calls it generated by the autodialer, with no intention of connecting them to a telephone solicitor, did not qualify as "telephone solicitations." Whether a solicitor is at the other end of the phone or not, when the telephone rings, the intrusion into the home and the seizing of the telephone line is the same. In fact, an argument can be made that when the telephone rings and no one is on the other end, the recipient is even more disturbed and inconvenienced than if a sales person is at the other end of the line. P75 The eighth assignment of error is overruled. Ninth Assignment of Error P76 THE JURY'S VERDICT IN FAVOR OF APPELLEES ON THEIR CLAIMS UNDER THE TELEPHONE CONSUMER PROTECTION ACT IS AGAINST THE MANIFEST WEIGHT OF THE EVIDENCE. P77 Beacon Journal contends that the judgment for the Irvines on their claims under the Telephone Consumer Protection Act was against the manifest weight of the evidence. Beacon Journal does not dispute that it placed three calls to the Irvines' telephone number via the autodialer during restricted hours. Its weight of the evidence argument is essentially the same as the argument it raised through its eighth assignment of error, that such calls did not constitute violations of the federal act. Because this court found no merit in that argument, the ninth assignment of error is likewise overruled. Tenth Assignment of Error P78 THE TRIAL COURT ABUSED ITS DISCRETION AND ERRED AS A MATTER OF LAW IN SUBMITTING THE QUESTION OF ENTITLEMENT TO TREBLE DAMAGES UNDER THE TCPA TO THE JURY. P79 Beacon Journal contends that the trial court erred in allowing the jury to determine whether the Irvines were entitled to treble damages because that issue should have been decided by the trial judge. Section 227(c) (5), Title 47, U.S.Code provides: P80 HN17Go to the description of this Headnote.If the court finds that the defendant willfully or knowingly violated the regulations prescribed under this subsection, the court may, in its discretion, increase the amount of the award to an amount equal to not more than 3 times the amount available under subparagraph (B) of this paragraph. *447 P81 Because the statute refers to the "court" rather than the jury, Beacon Journal contends that it requires that the treble damage issue be tried to the trial judge, not the jury. Beacon Journal cites no case law interpreting this provision on the issue, nor was this court able to find any. P82 HN18Go to the description of this Headnote.Although the term "court" might reasonably be interpreted to mean judge and not jury, see Feltner v. Columbia Pictures Television, Inc. (1998), 523 U.S. 340, 346, 140 L. Ed. 2d 438, 118 S. Ct. 1279, it could also be construed to include the judge and jury. See Feltner, 523 U.S. at 356 (Scalia, J., concurring in judgment). Even if "court" means trial judge, the statute merely fails to afford plaintiffs a statutory "right" to a jury trial. See id. at 346. It does not mandate that the treble damage issue be determined by the "court" without the assistance of the jury. Moreover, the United ***1120 States Supreme Court's decision in Feltner suggests that, even if the Irvines had no statutory right to a jury determination of this issue, they may have had a constitutional one. See id. at 355. P83 The only case cited by Beacon Journal is one construing an entirely different statute Ohio's Consumer Sales Practices Act, R.C. 1345.09(B). R.C. 1345.09 has no similar language referring to the "court," nor is the trebling of damages conditioned on a knowing or willful violation of the statute; the only similarity is the trebling of damages. Although courts have held that the trial judge, not the jury, is better equipped to determine a plaintiff's entitlement to treble damages under R.C. 1345.09, it is because the determination is a legal one, not a factual one, and legal determinations are within the province of the trial judge. See, e.g., Inserra v. J.E.M. Bldg. Corp. (Nov. 22, 2000), 2000 Ohio App. LEXIS 5447 at *24, 9th Dist. No. 2973-M. HN19Go to the description of this Headnote.The determination of a plaintiff's entitlement to treble damages under the Telephone Consumer Protection Act, on the other hand, requires a mere factual finding, whether the defendant's violation was willful and knowing. See Section 227(c) (5), Title 47, U.S.Code. Thus, the reasoning expressed in Inserra does not apply. P84 Consequently, Beacon Journal has failed to convince us that the trial court erred by allowing the jury to determine whether the Irvines were entitled to treble damages. The tenth assignment of error is overruled. Eleventh Assignment of Error P85 THE TRIAL COURT ERRED IN FAILING TO DIRECT A VERDICT IN FAVOR OF THE BEACON ON THE ISSUE OF TREBLE DAMAGES. Twelfth Assignment of Error P86 THE AWARD OF TREBLE DAMAGES IS AGAINST THE MANIFEST WEIGHT OF THE EVIDENCE. *448 P87 Beacon Journal contends that the trial court erred in failing to direct a verdict on the Irvines' claims for treble damages and that the treble damage awards were against the manifest weight of the evidence. n4 Beacon Journal maintains that there was no evidence to establish the statutory requirements for treble damages. n4 Because Beacon Journal raised no motion for a directed verdict on this basis, this court can only assume that Beacon Journal faults the trial court for failing to sua sponte grant a directed verdict on the treble damages issue. See Gibbons v. Price (1986), 33 Ohio App.3d 4, 12, 514 N.E.2d 127. P88 HN20Go to the description of this Headnote.Section 227(c) (5), Title 47, U.S.Code allows the trial court to award treble damages if "the defendant willfully or knowingly violated the regulations prescribed under this subsection[.] " Beacon Journal contends that the evidence established that Beacon Journal did not know that it was violating the Telephone Consumer Protection Act by running its autodialer all night. Based on the same legal reasoning asserted in its eighth assignment of error, that these calls did not constitute "telephone solicitations" under the act, Beacon's witnesses testified that they did not know that they were violating the act by running the disconnect list overnight. P89 Even if the jury believed the testimony of Beacon's witnesses that Beacon Journal did not knowingly violate the act, the act also permitted an award of treble damages if Beacon Journal willfully violated the act. Although this court found no case law construing the "willfully *** violated" language in the Telephone Consumer Protection Act, there is a ***1121 wealth of case law construing the term "willful violation" as it is used in other federal statutes. P90 The United States Supreme Court, construing "willful violation" as that term is used in the Age Discrimination in Employment Act, held that an employer commits a "willful violation" of that act when it demonstrates a knowing or reckless disregard for the matter of whether its conduct was prohibited by the act. Trans World Airlines, Inc. v. Thurston (1986), 469 U.S. 111, 128, 83 L. Ed. 2d 523, 105 S. Ct. 613. The Thurston court further reasoned that a violation is not willful where the employer "acted reasonably and in good faith in attempting to determine whether its conduct violated the act." Id. at 129. P91 The evidence was clear that Beacon Journal telemarketing people knew about the federal act and that they could not make solicitation calls after 9:00 p.m. or before 8:00 a.m. There was also evidence from which the jury could infer that Beacon Journal also knew or acted in reckless disregard of whether the *449 act also restricted when it could run the disconnect list. Beacon Journal did not normally run the disconnect list at night, but typically ran the list during daytime hours on Saturdays and Sundays. In fact, Beacon Journal's former consumer marketing manager testified that it was against company policy to run the disconnect list overnight. P92 Beacon Journal's former circulation sales manager testified that he came in to work one Monday morning in late June 1999 and discovered that no data had been compiled on the disconnect list over the weekend. He decided to get the missing data by running the disconnect list overnight for two nights. He sought no opinion from Beacon's legal department or outside counsel nor did he made any other attempt to determine whether that activity would comply with the Telephone Consumer Protection Act. In fact, he admitted that he made the decision himself and that he told no one about it except the night shift leader. The night shift leader ran the disconnect list on two nights, as he had been instructed to do, but he admitted that he was uncomfortable doing it. P93 Reasonable minds could conclude, and the jury did not lose its way in so concluding, that Beacon Journal demonstrated a reckless disregard for whether its conduct of running the disconnect list overnight violated the Telephone Consumer Protection Act. The eleventh and twelfth assignments of error are overruled. Thirteenth Assignment of Error P94 THE AWARD OF TREBLE DAMAGES MUST BE VACATED AND/OR REDUCED BECAUSE APPELLEES ARE NOT ENTITLED TO RECOVER DAMAGES IN EXCESS OF THREE TIMES THE AMOUNT AVAILABLE UNDER THE STATUTE. P95 For Beacon Journal's violations of the Telephone Consumer Protection Act, the jury found that the Irvines were entitled to total statutory damages of $ 1,500 plus treble damages of $ 4,500. The trial court then entered judgment that awarded the Irvines both the statutory damages and the treble damages. Beacon Journal contends that, by the explicit terms of the Telephone Consumer Protection Act, and legal principles governing the trebling of damages generally, the trial court had authority to award the trebled damages in lieu of the statutory damages, but not in addition to them. We agree. P96 As quoted above, Section 227(c) (5), Title 47, U.S.Code provides: P97 HN21Go to the description of this Headnote.If the court finds that the defendant willfully or knowingly violated the regulations prescribed under this subsection, the court may, in its discretion, increase the amount of the award to an ***1122 amount equal to not more than 3 times the amount available under subparagraph (B) of this paragraph. P98 HN22Go to the description of this Headnote.The explicit terms of the statute authorize the trial court to increase the statutory damages to an amount "equal to not more than 3 times" the *450 statutory damages. Nothing authorizes the trial court to award treble damages in addition to the statutory damage award. The total damages cannot exceed the trebled amount. P99 HN23Go to the description of this Headnote.The concept of trebled damages generally has always been understood to authorize the trebling of damages as a total damage figure, not one to be added to the statutory or compensatory damages. See, e.g., Green v. U.S.A. Energy Consultants (Sept. 18, 1986), 1986 Ohio App. LEXIS 8309, 8th Dist. Nos. 50942 and 51149. The trial court erred by awarding treble damages in addition to the statutory damages, rather than in lieu of them. The thirteenth assignment of error is sustained. Fourteenth Assignment of Error P100 THE TRIAL COURT ERRED IN ENTERTAINING APPELLEE'S MOTION FOR ATTORNEY FEES, IN ADOPTING THE MAGISTRATE'S FINDINGS OF FACT AND CONCLUSIONS OF LAW CONCERNING ATTORNEY FEES, AND IN ENTERING JUDGMENT AWARDING ATTORNEY FEES IN FAVOR OF APPELLEES. P101 Beacon Journal contends that the trial court erred in awarding attorney fees to the Irvines because the jury, not the court, should have made the determination of whether the Irvines were entitled to attorney fees. We need not address the propriety of the attorney fee award because Beacon Journal has failed to preserve this issue for review. P102 First, as the trial court noted in a post-trial order, the trial court had informed the parties that it would address the issue of attorney fees after trial and neither party raised any objection. Moreover, the issue of attorney fees was tried to a magistrate who decided that the Irvines should be awarded $ 60,485.25 in attorney fees. Although Beacon Journal raised several objections to the magistrate's decision, it did not object to the fact that the attorney fee issue was tried to the magistrate and not a jury. Civ.R. 53(E)(3)(b) expressly states that HN24Go to the description of this Headnote."a party shall not assign as error on appeal the court's adoption of any finding of fact or conclusion of law unless the party has objected to that finding or conclusion under this rule." Because Beacon Journal did not raise an objection on this basis, we are precluded from addressing the merits of this assignment of error and it is overruled accordingly. See In the Matter of Estate of Kordiac (Oct. 20, 1999), 1999 Ohio App. LEXIS 4883 at *3, 9th Dist. No. 19192. The fourteenth assignment of error is overruled. Cross Assignment of Error P103 THE TRIAL COURT ERRED IN RELIEVING ITS GARNISHMENT ORDER AND IN NOT REQUIRING THE APPELLANT TO POST A BOND IN THE AMOUNT OF THE JURY VERDICT WHILE THE CASE IS PENDING IN THE APPELLATE COURT. *451 P104 The Irvines contend that the trial court erred: (1) by vacating its prior order of garnishment and (2) by staying the execution of the judgment without requiring it to post a supercedeas bond. P105 Although no order of garnishment appears in the record, the trial court indicated through a subsequent journal entry that it was vacating its prior order of garnishment. The Irvines contend that the trial court has no authority to vacate an order of garnishment, but they cite no authority for that proposition. We are not inclined to make the Irvines' legal argument for them. Collier v. Dorcik (Nov. 29, 2000), 2000 Ohio App. LEXIS 5540 at *14, 9th Dist. No. 3009-M. Moreover, as Beacon Journal ***1123 notes, the trial court ordered garnishment before the judgment was final so its act of vacating that order appears to be appropriate. See State ex rel. Electrolert, Inc. v. Lindeman (1994), 99 Ohio App.3d 154, 157-158, 650 N.E.2d 137. P106 The Irvines next contend, relying on Civ.R. 62(B), that the trial court had no authority to stay the execution of the judgment without ordering Beacon Journal to pay a supersedeas bond. Civ.R. 62(B) provides: P107 HN25Go to the description of this Headnote.When an appeal is taken the appellant may obtain a stay of execution of a judgment or any proceedings to enforce a judgment by giving an adequate supersedeas bond. *** The stay is effective when the supersedeas bond is approved by the court. P108 The Irvines cite no authority that construes Civ.R. 62(B) as mandating a bond before a stay can be granted. HN26Go to the description of this Headnote.An "adequate supersedeas bond" could reasonably be construed to mean no bond at all, if the trial court felt that none was necessary, as in this case. See Lomas & Nettleton Co. v. Warren (June 29, 1990), 1990 Ohio App. LEXIS 2720, 11th Dist. No. 89-G-1519 (construing "sufficient sureties" language of R.C. 2505.09 to encompass no sureties in certain cases). n5 This court has held that HN27Go to the description of this Headnote."under appropriate circumstances, the trial court may exercise its discretion and stay the execution of judgment without requiring the appellant to post a supersedeas bond." Whitlatch & Co. v. Stern (Aug. 19, 1992), 1992 Ohio App. LEXIS 4218 at *25, 9th Dist. No. 15345; see, also, Lomas, supra (holding that "the posting of a supersedeas bond is not mandatory to stay an execution in all cases[.]"). n5 The Irvines do not base their argument on R.C. 2505.09. P109 The trial court gave a reasonable explanation for its decision that an "adequate" bond to secure the Irvines' interests in this case was no bond at all. In its journal entry granting the stay, the trial court indicated its finding "that the Plaintiffs are adequately secured by the Defendant's solvency and well-established ties to Akron, Ohio and that, therefore, the Defendants are not *452 required to post a bond at this time." This court finds no abuse of discretion by the trial court. The cross-assignment of error is overruled. III. P110 Beacon Journal's thirteenth assignment of error is sustained. Its remaining assignments of error are overruled. The Irvines' cross-assignment of error is overruled. The judgment is reversed only insofar as the trial court awarded treble damages in addition to statutory damages under the Telephone Consumer Protection Act. The cause is remanded for correction of that aspect of the judgment only. Judgment affirmed in part, reversed in part, and the cause remanded. The Court finds that there were reasonable grounds for these appeals. We order that a special mandate issue out of this Court, directing the Court of Common Pleas, County of Summit, State of Ohio, to carry this judgment into execution. A certified copy of this journal entry shall constitute the mandate, pursuant to App.R. 27. Immediately upon the filing hereof, this document shall constitute the journal entry of judgment, and it shall be file stamped by the Clerk of the Court of Appeals at which time the period for review shall begin to run. App.R. 22(E). Costs taxed to both parties equally. Exceptions. WILLIAM G. BATCHELDER FOR THE COURT SLABY, J. CARR, J. CONCUR Case for question 6-8 question 6-8 defamation Hagberg v. California Federal Bank (2004) , Cal.4th [No. S105909. Jan. 5, 2004.] LYDIA ORTIZ HAGBERG, Plaintiff and Appellant, v. CALIFORNIA FEDERAL BANK FSB, Defendant and Respondent. (Superior Court of Los Angeles County, No. BC216052, David L. Minning, Judge.) (The Court of Appeal, Second Dist., Div. Two, No. B146368, Unpublished Opinion.) (Opinion by George, C. J., with Kennard, J., Chin, J., and Moreno, J., concurring. Dissenting opinion by Brown, J., with Baxter and Werdegar, JJ., concurring.) COUNSEL Vakili & Leus, Sa'id Vakili; and Peter A. Zablotsky for Plaintiff and Appellant. Gary Williams for ACLU Foundation of Southern California as Amicus Curiae on behalf of Plaintiff and Appellant. Delia Y. Guevara; Haight, Brown & Bonesteel, Jules S. Zemen; Yocca Patch & Yocca, Mark W. Yocca and Paul Kim and for Defendant and Respondent. Bill Lockyer, Attorney General, Manuel M. Medeiros, State Solicitor General, Andrea Lynn Hoch, Chief Assistant Attorney General, James M. Schiavenza, Assistant Attorney General, and Paul T. Hammerness, Deputy Attorney General, as Amici Curiae on behalf of Defendant and Respondent. Leland Chan and C. Dawn Casey for California Bankers Association and American Bankers Association as Amici Curiae on behalf of Defendant and Respondent. OPINION GEORGE, C. J.We granted review in this case to consider whether tort liability may be imposed for statements made when a citizen contacts law enforcement personnel to report suspected criminal activity on the part of another person. As we shall explain, we agree with the trial court, the Court of Appeal, and the great weight of authority in this state in concluding that such statements are privileged pursuant to Civil Code section 47, subdivision (b) (section 47(b)), fn. 1 and can be the basis for tort liability only if the plaintiff can establish the elements of the tort of malicious prosecution. I Plaintiff Lydia Ortiz Hagberg, a Hispanic woman, opened an account at a Pasadena branch of California Federal Bank, FSB (Cal Fed). A few months later she appeared at this branch to cash a check made out to her by the commercial {Slip Opn. Page 2} institution Smith Barney. She presented her California driver's license, her Cal Fed ATM card, the Smith Barney check, and her Smith Barney account summary, along with the envelope in which she had received the check. The teller, also apparently a Hispanic woman, suspected that the check was a counterfeit and brought it to her supervisor, Nolene Showalter, apparently a person of European descent. Showalter agreed that the check had a suspicious appearance, in that some of the print was "fuzzy and unclear" or "smudged" and part of the address line was missing -- features not commonly found on Smith Barney checks. Showalter contacted Smith Barney by telephone, was informed that the check was not valid, and then contacted Cal Fed's corporate security office. The regional security manager, Gary Wood, instructed her to telephone the police, and she did so. A transcript of the telephone call to the police discloses that Showalter explained that Hagberg had attempted to negotiate a counterfeit check. The police dispatcher asked questions concerning the identity and appearance of the person attempting to cash the check, apparently in order to assist the police in determining whom they should contact at the bank. Showalter answered these questions and also volunteered that the bank's corporate security officer "just wants somebody to hang on to her [until] he can check this out. Because our first call to them, they said it was counterfeit . . . . [¶] And we've taken a lot of losses." The dispatcher asked the person's ethnicity, and Showalter answered, "White -- well, maybe Hispanic; kind of reddish hair, short." While Showalter spoke to the police dispatcher, Wood, the bank's regional security manager, himself telephoned Smith Barney and was informed that the check was valid and that the information earlier received by Showalter from Smith Barney was erroneous. This information was relayed to Showalter, who interrupted her statement to the police dispatcher with the news. She informed the dispatcher that Cal Fed no longer required the assistance of the police and that the {Slip Opn. Page 3} bank was "getting into trouble here with this." The dispatcher responded that the police were already at the bank, and when Showalter looked up, she could see a police officer approaching Hagberg. Showalter asked the dispatcher if she should tell the police officers to leave, and the dispatcher told her to do so. Showalter stated in her declaration that she "immediately walked over to the teller window as the police officers were approaching the customer" and that she "reached over the teller's desk with [her] hand to catch their attention and told the police we had canceled the call." She stated: "The police, however, proceeded with an investigation and detained the customer." Showalter did not speak to Hagberg. Hagberg testified at her deposition that a police officer drew her away from the teller's window, spread her legs, patted her down, and handcuffed her. Her handbag was searched, and the officer asked her whether she was in possession of weapons or stolen property and whether she was driving a stolen vehicle. Hagberg testified that, as the police were placing her under arrest, she looked at the Hispanic teller who had been serving her, and that the teller announced to Hagberg that Hagberg "looked like a criminal." Hagberg's ordeal ended 20 minutes later, when she was released. The record contains a transcript of Hagberg's telephone call to Smith Barney, evidently later the same day, in which the Smith Barney representative explained that Smith Barney had made a mistake in informing Cal Fed that the check was not valid. In this telephone call, Hagberg evidenced distress over her detention. On September 9, 1999, Hagberg filed a complaint against Cal Fed and 100 unnamed parties as defendants. fn. 2 The complaint alleged seven causes of action, {Slip Opn. Page 4} including race discrimination in violation of the Unruh Civil Rights Act (§§ 51, 52.1), false arrest and false imprisonment, slander, invasion of privacy, intentional infliction of emotional distress, and negligence. She claimed humiliation and emotional distress, and sought damages and penalties of $1.6 million for past and future medical expenses and loss of earnings, as well as attorney fees and costs. Cal Fed filed its answer on October 15, 1999 and a motion for summary judgment on July 27, 2000. In support of its motion for summary judgment, Cal Fed contended that its statements to the police concerning suspected criminal activity by Hagberg were subject to the absolute privilege established by section 47(b). Cal Fed also claimed immunity under federal law, citing title 31 United States Code section 5318(g), part of the so-called safe harbor provision of the AnnunzioWylie Anti-Money Laundering Act. Cal Fed also claimed that, even if it were not entitled to immunity for privileged communications under state and federal law, Hagberg had not presented any facts evidencing conduct in violation of the Unruh Civil Rights Act. In support of its motion for summary judgment, Cal Fed proffered Showalter's declaration, portions of plaintiff's deposition testimony, copies of Cal Fed's interrogatories and plaintiff's answers to interrogatories, and the transcript of a recording of the telephone conversation between Showalter and the police dispatcher, as noted above. The evidence indicated that although Hagberg believed that the only explanation for her treatment was racial or ethnic prejudice on the part of bank employees, the only evidence she possessed in support of this theory was the circumstance that she was of Hispanic descent and the facts noted above regarding the treatment she received at the time of the incident. On August 10, 2000, plaintiff filed her opposition to the motion for summary judgment. In support, plaintiff presented additional testimony from her deposition, a transcript of a recordings of telephone calls made during the incident, a photocopy of the {Slip Opn. Page 5} questioned check, the Showalter declaration, and a copy of Cal Fed's written loss prevention procedures. Her deposition testimony indicated her belief that the teller's remark that she looked like a criminal could have been motivated only by racial or ethnic prejudice, and added that the check she proffered would not have been questioned at her place of business. Her deposition also indicated that one of the police officers who detained her suggested that she complain about her treatment. On August 18, 2000, defendant filed its reply. Plaintiff filed motions for continuance to permit further discovery, but they were denied. On August 24, 2000, the trial court granted defendant's motion for summary judgment. It explained at the hearing on the motion for summary judgment that the absolute privilege established by section 47(b) applied to Cal Fed's statements to the police concerning suspected criminal activity. It declared: "Although it is subject to abuse, it seems to me the right of a private citizen, or a public citizen for that matter, to contact the police and advise the police of what they suspect to be criminal activity must be absolute and must be without threat of recourse." The court found support for its conclusion in a decision by this court (Silberg v. Anderson (1990) 50 Cal.3d 205 (Silberg)) and also in several Court of Appeal decisions. It noted that there was some disagreement on the point in the Courts of Appeal, but it followed the majority view, reiterating that "public policy would dictate that parties must have [unfettered] access to make police reports." Because it had decided the case on this basis, it declined to reach Cal Fed's claim to immunity under federal law. The court's judgment briefly reviewed the evidence, including evidence plaintiff had offered in opposition to the motion for summary judgment, and stated "[a]fter duly considering the evidence proffered by Plaintiff, the Court does not find any triable issue of fact." Furthermore, it determined: "Defendant's report to police and communications related thereto are privileged pursuant to Section 47(b) of the California Civil Code." {Slip Opn. Page 6} On appeal, the Court of Appeal affirmed the trial court's order granting summary judgment in favor of Cal Fed, agreeing with the lower court that the privilege established by section 47(b) applied to Cal Fed's communication with the police concerning its suspicion that Hagberg was attempting to negotiate a counterfeit check. The Court of Appeal, like the trial court, began its analysis with this court's decision in Silberg, supra, 50 Cal.3d 205, 215216. The appellate court pointed out that in Silberg, we directed that section 47(b) be applied broadly to bar tort actions based on privileged communications, excepting only the tort of malicious prosecution. The Court of Appeal pointed to the many cases emanating from the Courts of Appeal that hold that the absolute privilege of section 47(b) "shields testimony or statements to officials conducting criminal investigations." These cases, it observed, recognize the importance of ensuring an "open channel of communication" between citizens and the police. With regard to a single Court of Appeal decision that reached a contrary result (Fenelon v. Superior Court (1990) 223 Cal.App.3d 1476 (Fenelon)), the Court of Appeal observed that Fenelon "has not been followed, and has been roundly criticized." The Court of Appeal adopted the view embraced by the majority of appellate court decisions on this point. It observed that under the rule set forth in these decisions, citizens are not entirely unprotected from abuse, because Penal Code section 148.5, subdivision (a), provides that it is a misdemeanor knowingly to make a false crime report to the police. In response to plaintiff's claim that statements are not subject to an absolute privilege when their utterance violates a statute such as the Unruh Civil Rights Act, the Court of Appeal pointed to other instances in which causes of action defined by statute -- statutes carrying out important public policies -- also are {Slip Opn. Page 7} subject to the privilege established by section 47(b). (Citing, e.g., Rubin v. Green (1993) 4 Cal.4th 1187, 1203.) Further, the Court of Appeal, like the trial court, declined to reach defendant's claim that it (defendant) also was shielded by a privilege established by federal law. Finally, the Court of Appeal concluded that the trial court had not abused its discretion in denying plaintiff's motions for continuance for further discovery. We granted Hagberg's petition for review to resolve an apparent conflict in the decisions of the Courts of Appeal. Hagberg urges us to adopt the minority view, pointing out that the ability to summon the police to accuse another of a crime is a potent weapon that is subject to abuse and that can cause great injury to reputation and other interests of innocent persons. She also reiterates her claim that even if the privilege is absolute in most instances when a citizen contacts the police to report suspected criminal activity, the Unruh Civil Rights Act, with its important goal of eliminating discrimination on the basis of race and other classifications, creates an exception when the communication violates the provisions of that act. Cal Fed, for its part, first vigorously maintains that it is entitled to absolute immunity under 31 United States Code section 5318(g)(3), a federal provision that imposes a duty on banks to report suspected criminal activity of a specified nature to law enforcement authorities and, specifically preempting state law, provides absolute immunity for such reports. Cal Fed urges that even if we were to conclude that state law extends only a qualified privilege with respect to plaintiff's claims, state law would be preempted by the more expansive federal immunity provision. With respect to section 47(b), Cal Fed urges that this court, like the Court of Appeal and the trial court in this case, conclude that the better view is expressed by those Court of Appeal decisions holding that section 47(b) establishes an absolute {Slip Opn. Page 8} privilege for statements made by a citizen who contacts the police to report suspected criminal activity. With respect to plaintiff's Unruh Civil Rights Act claim, Cal Fed contends that, by its terms, the act does not establish an exception to section 47(b). Cal Fed also asserts that even the violation of a constitutional interest sometimes may fail to enjoy a remedy in damages because of certain immunities and privileges, so that it is not anomalous to extend the privilege to communications such as those alleged in the present case. II Section 47 establishes a privilege that bars liability in tort for the making of certain statements. Pursuant to section 47(b), the privilege bars a civil action for damages for communications made "[i]n any (1) legislative proceeding, (2) judicial proceeding, (3) in any other official proceeding authorized by law, or (4) in the initiation or course of any other proceeding authorized by law and reviewable pursuant to [statutes governing writs of mandate]," with certain statutory exceptions that do not apply to the present case. The privilege established by this subdivision often is referred to as an "absolute" privilege, and it bars all tort causes of action except a claim for malicious prosecution. (See Kimmel v. Goland (1990) 51 Cal.3d 202, 209; Silberg, supra, 50 Cal.3d at p. 216.) Cal Fed contends that its communications to the police in the present case fall within the absolute privilege established by section 47(b). Section 47, subdivision (c) extends a qualified privilege to other communications. Under section 47, subdivision (c), a qualified privilege, that is a privilege that applies only to communications made without malice, applies to "communication[s] . . . to a person interested therein, (1) by one who is also interested or (2) by one who stands in such a relation to the person interested as to afford a reasonable ground for supposing the motive for the communication to be innocent, or (3) who is requested by the person interested to give the information." {Slip Opn. Page 9} (§ 47, subd. (c).) Hagberg contends that Cal Fed's communication to the police at most fell into this category of qualified privilege, so that she should be entitled to establish tort liability if she can demonstrate that the communication was made with malice. We have explained that the absolute privilege established by section 47(b) serves the important public policy of assuring free access to the courts and other official proceedings. It is intended to " 'assure utmost freedom of communication between citizens and public authorities whose responsibility is to investigate and remedy wrongdoing.' " (Silberg, supra, 50 Cal.3d at p. 213, italics added.) We have explained that both the effective administration of justice and the citizen's right of access to the government for redress of grievances would be threatened by permitting tort liability for communications connected with judicial or other official proceedings. Hence, without respect to the good faith or malice of the person who made the statement, or whether the statement ostensibly was made in the interest of justice, "courts have applied the privilege to eliminate the threat of liability for communications made during all kinds of truth-seeking proceedings: judicial, quasi-judicial, legislative and other official proceedings." (Ibid.) Although the statute originally was understood as applicable only to the tort of defamation, our cases, beginning with Albertson v. Raboff (1956) 46 Cal.2d 375, 382, have extended the privilege it provides to other potential tort claims. (See Oren Royal Oaks Venture v. Greenberg, Bernhard, Weiss & Karma, Inc. (1986) 42 Cal.3d 1157, 1163-1165.) As noted, the only tort claim we have identified as falling outside the privilege established by section 47(b) is malicious prosecution. (Silberg, supra, 50 Cal.3d at p. 216.) Section 47(b), of course, does not bar a criminal prosecution that is based on a statement or communication, when the speaker's utterance encompasses the elements of a criminal offense. (See, e.g., Pen. Code, §§ 118 [perjury], 148.5 [false report of criminal offense].) {Slip Opn. Page 10} In its application to communications made in a "judicial proceeding," section 47(b) is not limited to statements made in a courtroom. Many cases have explained that section 47(b) encompasses not only testimony in court and statements made in pleadings, but also statements made prior to the filing of a lawsuit, whether in preparation for anticipated litigation or to investigate the feasibility of filing a lawsuit. (See Rubin v. Green, supra, 4 Cal.4th at pp. 1194-1195.) As we have said, "it is late in the day to contend that communications with 'some relation' to an anticipated lawsuit are not within the privilege." (Ibid.) Rather, the privilege applies to "any publication required or permitted by law in the course of a judicial proceeding to achieve the objects of the litigation, even though the publication is made outside the courtroom [when] no function of the court or its officers is involved. " (Silberg, supra, 50 Cal.3d at p. 212; see also PG&E v. Bear Stearns (1990) 50 Cal.3d 1118, 1132-1133, 1137 [the privilege encompasses a private entity's statements that instigate another person or entity to undertake litigation].) We have noted the application of the privilege to communications with " 'some relation to a proceeding that is . . . under serious consideration;' " to " 'potential court actions;' " and to " 'preliminary conversations and interviews related to contemplated action,' " and we also have determined that the privilege applies to communications made, prior to the filing of a complaint, by a person "meeting and discussing" with potential parties the "merits of the proposed . . . lawsuit." (Rubin v. Green, supra, 4 Cal.4th at p. 1194-1195.) By the terms of the statute, statements that are made in quasi-judicial proceedings, or "any other official proceeding authorized by law" (§ 47(b)), are privileged to the same extent as statements made in the course of a judicial proceeding. By analogy to cases extending the litigation privilege to statements made outside the courtroom, many cases have held that the official proceeding privilege applies to a communication intended to prompt an administrative agency {Slip Opn. Page 11} charged with enforcing the law to investigate or remedy a wrongdoing. As we summarized in Slaughter v. Friedman (1982) 32 Cal.3d 149, "the privilege protect[s] communications to or from governmental officials which may precede the initiation of formal proceedings." (Id. at p. 156, italics omitted.) In Kashian v. Harriman (2002) 98 Cal.App.4th 892, for example, the privilege for communications made in connection with "any other official proceeding" was held to apply to a letter urging a division of the Office of the Attorney General to institute an investigation into the propriety of the tax exempt status being claimed by a health care provider named by the letter writer. In addition, the letter urged that the Attorney General investigate the health care provider for specified alleged unfair business practices; this, too, was found to be covered by the privilege. (Id. at pp. 926-927.) In another case, the privilege was found to extend to communications between private parties regarding whether the parties should urge the Attorney General's charitable trust division to investigate the alleged failure of a recording studio to pay royalties that it owed to various charities. The Court of Appeal in that case concluded that the privilege extended to communications between private persons "preliminary to the institution of an official proceeding." (Dove Audio, Inc. v. Rosenfeld, Meyer & Susman (1996) 47 Cal.App.4th 777, 781-783.) In another example, the court in Wise v. Thrifty Payless, Inc. (2000) 83 Cal.App.4th 1296 concluded that the privilege extended to a man's allegedly unfounded and malicious report to the Department of Motor Vehicles that his estranged wife was unfit to drive because of drug use. The court concluded that the "privilege is not limited to the courtroom, but encompasses actions by administrative bodies and quasi-judicial proceedings. [Citation.] The privilege extends beyond statements made in the proceedings, and includes statements made to initiate official action." (Id. at p. 1303, italics added.) The court in Wise {Slip Opn. Page 12} explained its holding by pointing to the public policy served by section 47(b): "An absolute privilege exists to protect citizens from the threat of litigation for communications to government agencies whose function it is to investigate and remedy wrongdoing. [Citation.] The privilege is based on '[t]he importance of providing to citizens free and open access to governmental agencies for the reporting of suspected illegal activity.' [Citation.]" (Wise v. Thrifty Payless, Inc., supra, 83 Cal.App.4th at p. 1303.) In King v. Borges (1972) 28 Cal.App.3d 27, the court held that the privilege extended to a letter written by a lawyer to the state's Division of Real Estate complaining that a real estate agent improperly had refused to pay a refund out of an escrow fund to the lawyer's client. The court observed that the communication was intended to prompt official action by the Division of Real Estate, and was as much a part of that agency's proceedings as a communication made after the agency took official action. The court warned that effective law enforcement would suffer if citizens became reluctant to call upon the government to enforce the law for fear of potential tort liability. In the court's view, the risk of this public harm outweighed the potential for occasional harm to a private interest that would follow from the application of the privilege to such communications. (Id. at pp. 31-34.) Another case applied the privilege in the context of a whistleblower statute that encourages citizens to report waste and malfeasance on the part of governmental authorities. (Gov. Code, § 8547.1.) As the court in Braun v. Bureau of State Audits (1998) 67 Cal.App.4th 1382, explained, the State Auditor is charged with investigating citizen complaints concerning improper governmental activity and thereafter reporting any improper activity to appropriate enforcement agencies. (Gov. Code, §§ 8547.5, 8547.7.) The Court of Appeal concluded that the Bureau of State Audits' investigation and its report to an enforcement agency {Slip Opn. Page 13} constituted an "official proceeding" and were subject to the absolute privilege -- just as initial complaints made by whistleblowers to the State Auditor necessarily would be privileged. (Braun v. Bureau of State Audits, supra, 67 Cal.App.4th at pp. 1389-1391.) Numerous additional cases agree that the section 47(b) privilege applies to complaints to governmental agencies requesting that the agency investigate or remedy wrongdoing. (See Fremont Comp. Ins. Co. v. Superior Court (1996) 44 Cal.App.4th 867, 876-877 [privilege applied to a statement by two worker compensation insurers to the state Department of Insurance and the local district attorney's office accusing a physician of insurance fraud]; Passman v. Torkan (1995) 34 Cal.App.4th 607, 616-619 [privilege applied to a letter written to the local district attorney's office intended to prompt a criminal prosecution]; Long v. Pinto (1981) 126 Cal.App.3d 946, 948 [privilege applied to a physician's letter to the state Board of Medical Quality Assurance accusing another physician of performing unnecessary surgeries, because the letter "was sent to prompt board action and was thus part of an official proceeding"]; Tiedemann v. Superior Court (1978) 83 Cal.App.3d 918, 924-926 [privilege applied to communication by a "disgruntled former business associate" to the federal Internal Revenue Service accusing a person of tax fraud]; Martin v. Kearney (1975) 51 Cal.App.3d 309, 311 ["official proceeding" privilege extends to parents' letters to a school principal seeking to prompt official action concerning a teacher's poor performance].) By the same token, the overwhelming majority of cases conclude that when a citizen contacts law enforcement personnel to report suspected criminal activity and to instigate law enforcement personnel to respond, the communication also enjoys an unqualified privilege under section 47(b). These cases explain that a statement urging law enforcement personnel to investigate another person's suspected violation of criminal law, to apprehend a suspected lawbreaker, or to {Slip Opn. Page 14} report a crime to prosecutorial authorities is shielded from tort liability to the same extent as a similar statement to administrative enforcement agencies. Reasoning that such communications are at least preparatory to "any other official proceeding authorized by law," (ibid.) the majority of decisions in the Courts of Appeal have held such statements to be shielded by an absolute privilege. We find these decisions to be persuasive, as we shall explain. As the Court of Appeal in the present case observed, the leading case in this area is Williams v. Taylor (1982) 129 Cal.App.3d 745 (Williams). In that case, the Court of Appeal applied the absolute privilege of section 47(b) to statements made by an employer who contacted the police to report suspected theft on the part of an employee and to request that the police conduct an investigation. As a result of the police investigation, the employee was charged with various crimes. Most of the charges ultimately were dismissed, and the employee was acquitted of the remaining charge that went to trial. Thereafter, the employee sued the employer for slander, intentional and negligent infliction of emotional distress, and malicious prosecution. The Court of Appeal in Williams determined that the employee's slander and emotional distress claims failed because the statements to the police were subject to the section 47(b) privilege: "In our view," the appellate court stated, "a communication concerning possible wrongdoing, made to an official governmental agency such as a local police department, and which communication is designed to prompt action by that entity, is as much a part of an 'official proceeding' as a communication made after an official investigation has commenced. [Citation.] After all, '[t]he policy underlying the privilege is to assure utmost freedom of communication between citizens and public authorities whose responsibility it is to investigate and remedy wrongdoing.' [Citation.] In order for such investigation to be effective, 'there must be an open channel of communication by which citizens {Slip Opn. Page 15} can call . . . attention to suspected wrongdoing. That channel would quickly close if its use subjected the user to a risk of liability for libel. A qualified privilege is inadequate under the circumstances. . . . [¶] The importance of providing to citizens free and open access to governmental agencies for the reporting of suspected illegal activity outweighs the occasional harm that might befall a defamed individual. Thus the absolute privilege is essential.' [Citation] And, since the privilege provided by section 47 [(b)] is absolute, it cannot be defeated by a showing of malice." (Williams, supra, 129 Cal.App.3d at pp. 753-754.) We cited Williams with approval in Slaughter v. Friedman, supra, 32 Cal.3d 149. In that case we determined that the privilege did not apply to communications between a dental insurance plan and a dentist's patients, in which the insurance plan denied claims for assertedly unnecessary work and informed the patients that the insurance company intended to report the dentist to a state dental professional association for possible discipline. These were communications between private parties, they concerned the processing of insurance claims by a private entity, and they were not directed at preparing for or eliciting governmental action. We distinguished these circumstances from those in which the privilege does apply, stating that: "The 'official proceeding' privilege has been interpreted broadly to protect communication to or from governmental officials which may precede the initiation of formal proceedings. (Williams v. Taylor (1982) 129 Cal.App.3d 745, 753 [statements to investigative officers]; Brody v. Montalbano (1978) 87 Cal.App.3d 725, 732-733 [communications between parents and school board]; Tiedemann v. Superior Court (1978) 83 Cal.App.3d 918, 924-926 [statements to I.R.S. agents investigating tax fraud].)" (Slaughter v. Friedman, supra, 32 Cal.3d at p. 156.) Many other decisions are in accord with Williams, supra, 129 Cal.App.3d 745. In Beroiz v. Wahl (2000) 84 Cal.App.4th 485, for example, the court relied {Slip Opn. Page 16} upon Williams in determining that the privilege barred a defamation claim based upon an American citizen's communication to Mexican prosecutors seeking the initiation of a criminal investigation by Mexican authorities. The court declared, citing cases dating back to the 1930's, that "[g]enerally, the absolute privilege shields . . . statements to officials conducting criminal investigations." (Beroiz v. Wahl, supra, 84 Cal.App.4th at pp. 494-495.) In Cabesuela v. Browning-Ferris Industries of California, Inc. (1998) 68 Cal.App.4th 101, 112, the court held that the absolute privilege extended to an employee's statement to the police that a coworker had threatened the employee with violence. A defamation claim was barred, the court observed, because "Civil Code section 47 gives all persons the right to report crimes to the police, the local prosecutor or an appropriate regulatory agency, even if the report is made in bad faith." (Ibid.) In Hunsucker v. Sunnyvale Hilton Inn (1994) 23 Cal.App.4th 1498, 1502-1504, in the context of false imprisonment and assault and battery claims, the court found the privilege applicable to a hotel manager's report to the police that a guest had been brandishing a gun in a hotel room. In Cote v. Henderson (1990) 218 Cal.App.3d 796, 806, the court determined that the privilege extended to a report made by a woman to the police and the district attorney that a man had raped her. And in Johnson v. Symantec Corp. (N.D.Cal. 1999) 58 F.Supp.2d 1107 (Johnson), the court applied the privilege to bar a defamation action against a man who reported to the police that a coworker had assaulted him. Applying California law, the federal district court opined that this court would agree with the court in Williams, supra, 129 Cal.App.3d 745, that the privilege applied not only to communications made during pending official proceedings, but also to "preinvestigation communications intended to trigger official action." (Johnson, supra, 58 F.Supp.2d at p. 1110.) The district court pointed to the many lower court cases in accord with Williams, to our statement in Slaughter v. Friedman, {Slip Opn. Page 17} supra, 32 Cal.3d 149, that the official proceeding privilege should be interpreted broadly, and also to our approving citation to Williams, supra, 129 Cal.App.3d 745, in the Slaughter case. (Johnson, supra, 58 F.Supp.2d at pp. 1109-1110, & fn. 3; see also Forro Precision, Inc. v. International Business Machines (9th Cir. 1982) 673 F.2d 1045, 1055 [applying the absolute privilege of section 47(b) to communications by an alleged crime victim to the local police].) One Court of Appeal decision disagreed with these authorities, but its analysis has been rejected in numerous subsequent decisions. In Fenelon, supra, 223 Cal.App.3d 1476, a majority of the court determined that a citizen's statement to the police concerning the suspected criminal activity of another person did not concern an "official proceeding." The majority declared that the term "official proceeding" encompasses solely "proceedings 'which [resemble] judicial and legislative proceedings, such as transactions of administrative boards and quasi-judicial and quasi-legislative proceedings . . . .' [Citation.] " (Id. at p. 1480.) The primary reason advanced for this conclusion was that it is only in such proceedings that persons accused of wrongdoing possess a certain minimum level of due process protection. (Id. at p. 1483.) An administrative proceeding may qualify under section 47(b), the majority stated, when the body possesses factfinding authority and conducts hearings and renders adjudicative judgments based on the application of law to the facts. "In general," the Fenelon majority stated, "the absolute privilege under section 47[b] is available only where there is an express statutory authorization for the administrative agency to exercise quasi-judicial power." (Fenelon, at p. 1481.) Citing out-of-state authority, the Fenelon majority declared that it was better policy to accord only a qualified privilege to communications to the police that are intended to instigate official action by law enforcement. It quoted a 1978 New York case approvingly: " 'To clothe with absolute immunity communications made to a body acting in other than a quasi {Slip Opn. Page 18} -judicial capacity -- communications which because of the absence of a hearing may often go unheard of, let alone challenged, by their subject -- would provide an unchecked vehicle for silent but effective character assassination . . . .' [Citation.]" (Id. at p. 1483.) The Fenelon majority cited a number of California cases in support of its assertion that the unqualified privilege applies solely to statements made in official proceedings in which an administrative or legislative body possesses quasi-judicial power vested in it by statute. The cases cited, however, do not support the proposition that the privilege applies solely when a communication is made during a hearing at which the accused person possesses procedural protections, nor do these cases suggest that a communication intended to prompt an administrative agency to investigate wrongdoing would not be privileged. (See Chen v. Fleming (1983) 147 Cal.App.3d 36 [privilege applied to a complaint to the State Bar concerning an attorney]; Imig v. Ferrar (1977) 70 Cal.App.3d 48 [privilege applied to a citizen's communication seeking an internal affairs investigation of a police officer's alleged misconduct]; Martin v. Kearney, supra, 51 Cal.App.3d 309 [privilege applied to parents' complaints to a public school principal about a teacher]; King v. Borges, supra, 28 Cal.App.3d 27 [privilege applied to a complaint to the state Division of Real Estate accusing a real estate broker of dishonesty].) The cases cited do not suggest that, to be privileged, the communication must have been made at the time of a quasijudicial hearing at which the accused person had an opportunity to be heard. Indeed, they conclude otherwise. In King v. Borges, supra, 28 Cal.App.3d 27, for example, the court acknowledged that a request that an agency conduct an investigation into wrongdoing is not a part of the formal pleadings in an administrative action. It pointed out, however, that the privilege that is applicable to "judicial proceedings" is not limited to formal {Slip Opn. Page 19} pleadings or statements made in open court. To ensure open channels of communication to governmental agencies, the court applied a similarly broad reading to the "official proceeding" privilege, concluding that it encompassed "a communication to an official administrative agency . . . designed to prompt action by that agency ." (Id. at pp. 32-34.) In sum, the cases cited by the Fenelon court applied the privilege to communications requesting agency investigation of possible wrongdoing -- an investigation that, like a police investigation, might never result in any further official action at all or that, like a police investigation, might result in a decision to charge the accused person with some kind of wrongdoing. fn. 3 We are not persuaded by the majority's analysis in Fenelon, supra, 223 Cal.App.3d 1476. As Justice Benke pointed out in her dissent in Fenelon, prior case law establishes that the critical question is the aim of the communication, not the forum in which it takes place. If the communication is made "in anticipation of or [is] designed to prompt official proceedings, the communication is protected." (Id. at p. 1485 (dis. opn. of Benke, J.).) Further, as Justice Benke explained, the narrow approach taken by the Fenelon majority to what constitutes an "official proceeding" is contrary to settled authority. (Id. at pp. 1485-1486.) The Fenelon majority's analysis certainly depended upon a much narrower view of the scope {Slip Opn. Page 20} and duration of the privilege in judicial proceedings than we have adopted in recent years. It is well settled that communications may be privileged even when they occur outside any hearing or proceeding at which procedural protections apply. In other words, the judicial proceeding privilege may apply to statements made "outside the courtroom [when] no function of the court or its officers is involved." (Silberg, supra, 50 Cal.3d at p. 212; see also Rubin v. Green, supra, 4 Cal.4th at pp. 1194-1195; PG&E v. Bear Stearns, supra, 50 Cal.3d at pp. 1132-1133, 1137; Slaughter v. Friedman, supra, 32 Cal.3d at p. 156.) Although the Fenelon majority pointed to the procedural protections that apply in judicial proceedings or in quasi-judicial administrative enforcement proceedings, it did not explain the many decisions that extend the privilege to communications requesting the initiation of investigation that might lead to such proceedings. As these decisions recognize, statements made in preparation for or to prompt investigation that may result in the initiation of such proceedings fall within the privilege. It is not required that the statement be made during the proceeding itself. A statement to the police that is designed to prompt investigation of crime is not different, in this respect, from statements designed to prompt investigation into the tax exempt status of a hospital, the failure of an entity to honor a contractual obligation to a charitable trust, the failure of a real estate broker to release funds from escrow, the complaint of a physician that another physician performed unnecessary surgery, or the many other examples noted above of complaints intended to elicit administrative action. Although the administrative action itself, like a criminal trial should one ensue, offers procedural protections to the accused person, there is no basis for concluding that similar protections must be in place at the moment an accusation or complaint is made in order for the privilege to apply. {Slip Opn. Page 21} As for the Fenelon majority's reliance upon the procedural protections offered once quasi-judicial administrative proceedings commence, as explained by the federal district court in Johnson, supra, 58 F.Supp.2d 1107, when it rejected the Fenelon majority's analysis, "[t]he relevant forum . . . for determining the truth of a police report is a criminal trial, whose safeguards go beyond those employed in any quasi-judicial proceeding." (Id. at p. 1113.) Finally, the evident fear of the Fenelon majority that citizens commonly may manipulate law enforcement personnel and use them as tools in private vendettas seems overstated and exhibits an unwarranted assumption of gullibility on the part of law enforcement personnel and a misplaced lack of confidence in the constitutional and legal process that constrains their exercise of authority. As noted, subsequent decisions have declined to follow the majority's conclusion in Fenelon, supra, 223 Cal.App.3d 1476. (See Beroiz v. Wahl, supra, 84 Cal.App.4th at pp. 495-496; Braun v. Chronicle Publishing Co., supra, 52 Cal.App.4th at pp. 1051-1052; Fremont Comp. Ins. Co. v. Superior Court, supra, 44 Cal.App.4th at p. 876; Passman v. Torkan, supra, 34 Cal.App.4th at pp. 618-619; Hunsucker v. Sunnyvale Hilton Inn, supra, 23 Cal.App.4th at pp. 1502-1504; Johnson, supra, 58 F.Supp.2d at pp. 1111-1112.) fn. 4 {Slip Opn. Page 22} In the years following the decision in Williams, supra, 129 Cal.App.3d 745, and the developing weight of authority adhering to its holding and applying the section 47(b) privilege to various communications intended to instigate official investigation into wrongdoing, the Legislature has amended section 47(b) without indicating disapproval of those cases. (See Moore v. Conliffe (1994) 7 Cal.4th 634, 648 [relying upon legislative acquiescence with respect to a claim concerning the application of the section 47(b) privilege to arbitration proceedings].) fn. 5 Furthermore, support for our conclusion that communications are privileged under section 47(b) when they are intended to instigate official governmental investigation into wrongdoing, including police investigation, also can be found in a statute that establishes an exception that would be unnecessary under the interpretation offered by plaintiff and the Fenelon majority. Section 47.5, enacted the same year that Williams, supra, 129 Cal.App.3d 745, was decided, creates a limited exception to section 47(b) that authorizes a defamation action in certain restricted circumstances. It provides that "[n]otwithstanding section 47, a peace officer may bring an action for defamation against an individual who has filed a complaint with that officer's employing agency alleging misconduct, criminal conduct, or incompetence, if that complaint is false, the complaint was made with knowledge that it was false and that it was made with spite, hatred, or ill will." {Slip Opn. Page 23} (§ 47.5) Although courts have debated constitutional issues presented by section 47.5 (see People v. Stanistreet (2002) 29 Cal.4th 497, 512 [noting constitutional debate but declining to resolve it]), they have agreed that the statute constitutes an exception to the general rule that "[a] communication to an official agency which is designed to prompt action is considered a part of an official proceeding for purposes of Civil Code section 47." (Walker v. Kiousis (2001) 93 Cal.App.4th 1432, 1439-1440; see also Loshonkohl v. Kinder (2003) 109 Cal.App.4th 510, 514.) Because it is understood that the privilege established by section 47(b) should be given an expansive reach, section 47.5 has been construed narrowly. Actions other than for defamation (and the previously excepted action for malicious prosecution), even if they are based upon knowingly false complaints against a peace officer, do not fall within this exception. (Shaddox v. Bertani (2003) 110 Cal.App.4th 1406, 1415, & fn. 12.) Section 47.5 unquestionably supports the conclusion that the privilege established by section 47(b) applies, in general, to a "communication to an official agency which is designed to prompt action" (Walker v. Kiousis, supra, 93 Cal.App.4th at pp. 1439-1440), including a communication to the police that is intended to trigger an investigation into possible criminal activity. fn. 6 {Slip Opn. Page 24} It has been urged that the enactment of Penal Code section 148.5, imposing a criminal penalty upon any person who knowingly gives a false report of a crime to any law enforcement officer or district attorney, indicates the Legislature's belief that false reports to the police should not be protected by an absolute {Slip Opn. Page 25} privilege. In past cases in which we recognized an absolute privilege under section 47(b), however, we have relied upon similar criminal sanctions in support of our expansive view of the privilege in civil actions. In Silberg, supra, 50 Cal.3d 205, for example, we pointed out that although the absolute privilege almost entirely removes civil litigation as a deterrent against false or malicious communications, "in a good many cases of injurious communications, other remedies aside from a derivative suit for compensation will exist and may help deter injurious publication during litigation. Examples of these remedies include criminal prosecution for perjury . . . or subornation of perjury . . . ." (Id. at pp. 218-219.) Concern that Penal Code section 148.5 provides an inadequate bulwark against false and malicious communications to the police seems overstated. We note the absence of any indication that such malicious communications present a widespread problem. As prior cases have stressed in interpreting section 47(b), the broad application of the privilege serves the important public interest of securing open channels of communication between citizens and law enforcement personnel and other public officials charged with investigating and remedying wrongdoing. In support of her claim that Cal Fed's communication with the police in the present case was not subject to the absolute privilege of section 47(b), plaintiff directs our attention to early cases discussing the tort of false imprisonment. That tort and the crime of false imprisonment are defined in the same way. (Fermino v. Fedco, Inc. (1994) 7 Cal.4th 701, 715.) fn. 7 We have explained that " '[t]he tort of false imprisonment is the nonconsensual, intentional confinement of {Slip Opn. Page 26} a person, without lawful privilege, for an appreciable length of time . . . .' [Citation.] A person is falsely imprisoned 'if he is wrongfully deprived of his freedom to leave a particular place by the conduct of another.' " (Molko v. Holy Spirit Assn. (1988) 46 Cal.3d 1092, 1123.) In support of her claim that a knowingly false or malicious report to the police accusing another person of criminal activity may give rise to civil liability, plaintiff relies on Miller v. Fano (1901) 134 Cal. 103 (Miller). In that case, defendant Place, a San Diego police officer, received a telegram from a Los Angeles police officer directing him to arrest one Frank Kuhn, and directing him to consult defendant Fano for further information. Fano was a man who traded in railroad tickets. After learning that a ticket he had bought from Kuhn was forged, Fano tentatively identified Miller to Place, the police officer, as the man who had sold him the questioned ticket. Place arrested Miller without a warrant, believing him to be Kuhn. Miller later was released and secured a judgment against Place and Fano. In our decision in Miller, supra, 134 Cal. 103, we upheld a false imprisonment verdict against Place, the police officer, concluding that he had acted "with gross carelessness" because he failed to investigate Miller's protestations that he was not Kuhn. (Id. at p. 108.) As for Fano's liability, we acknowledged in Miller, supra, 134 Cal. 103, that a person may be liable for false imprisonment even if he or she did not personally confine the plaintiff, but rather aided and abetted in an unlawful arrest by encouraging, directing, or assisting a police officer to make the unlawful arrest. We went on to conclude that Fano had not encouraged or directed the concededly unlawful arrest of Miller, observing that it was the duty of every citizen to cooperate with the police in their investigation of crime and to provide information to investigating officers. Fano merely fulfilled this duty. In language relied upon {Slip Opn. Page 27} by plaintiff in the present case, we suggested that a person would aid and abet an unlawful arrest if he or she should "willfully identify the wrong man as being the criminal, for the purpose of having him arrested and prosecuted . . ." (id. at p. 107), but we denied that an "honest mistake" such as appeared in the case before us could be the basis for a defendant's liability as an instigator or aider and abettor of a false imprisonment. (Ibid.) Rather, when a person merely conveys information to the police " 'leaving it with the constable to act or not, as he thought proper . . . then the defendant will not be liable . . . .' " (Ibid.) Plaintiff also refers us to Turner v. Mellon (1953) 41 Cal.2d 45 (Turner). In Turner, again the question was whether the defendant was liable as one who had assisted in bringing about a police officer's unjustified arrest. Mellon, a Western Union employee, had been robbed several times at his place of employment. He observed plaintiff Turner behaving suspiciously outside his office, telephoned the police, and stated his suspicion that Turner was the robber. Mellon tentatively identified Turner as such to the police. Turner was arrested, but soon was released. We noted that an individual is not liable for false imprisonment unless he or she has " 'taken some active part in bringing about the unlawful arrest' " by the police. There is no liability if, " 'acting in good faith,' " he or she simply furnishes information leading to an arrest. (Id. at p. 48.) Although not confronted with a case in which bad faith was alleged, we pointed out how unjust and injurious to the public interest it would be to impose liability for honest mistakes. We concluded that the defendant, though he had given mistaken information leading to the arrest, had not taken an " 'active part in bringing about the unlawful arrest.' " (Ibid.) Defendant's conduct "as a matter of law, did not amount to participation in the arrest." (Id. at p. 49.) These cases, however, did not mention, much less analyze, the privilege established by section 47(b). They explored the limits of the common law tort of {Slip Opn. Page 28} false imprisonment and the potential for liability as an aider and abettor of an unlawful arrest by police officers. The cases did not consider the issue in the context of a proceeding in which bad faith actually was alleged. The cases also did not distinguish between malicious conduct of a citizen that aided or promoted a peace officer's unlawful arrest, which might support liability, and pure communication, which would be protected by the statutory privilege. (See Kimmel v. Goland, supra, 51 Cal.3d at p. 211 [distinguishing injury from "noncommunicative conduct" from injury arising from "communicative acts"].) They did not consider whether a cause of action for false imprisonment based upon pure communication should be permitted even though a claim for defamation or any other tort save malicious prosecution would be prohibited by section 47(b). As we often have stated, cases are not authority for propositions not considered. (Amwest Surety Ins. Co. v. Wilson (1995) 11 Cal.4th 1243, 1268.) Moreover, the cases predated the expansion of the privilege that began with Albertson v. Raboff, supra, 46 Cal.2d 375, and that led to the broad interpretation established in Silberg, supra, 50 Cal.3d 205, and other cases. The early cases upon which plaintiff relies were decided before this court explored the broad reach of the privilege established by section 47(b) and explained that it applies not only to defamation, as earlier had been understood, but to all tort actions that seek to impose liability based upon a covered communication, with the exception of malicious prosecution. As we have cautioned, the privilege cannot be defeated by providing a new label for the alleged wrong. (Rubin v. Green, supra, 4 Cal.4th at p. 1203.) As discussed above, in Silberg, supra, 50 Cal.3d 205, and later cases we explained that section 47(b) operates to bar civil liability for any tort claim based upon a privileged communication, with the exception of malicious prosecution, whose requirements include malice, lack of probable cause, and termination in the {Slip Opn. Page 29} plaintiff's favor. (Silberg, supra, 50 Cal.3d at pp. 215-216; see also Rubin v. Green, supra, 4 Cal.4th at p. 1194; Kimmel v. Goland, supra, 51 Cal.3d at p. 209.) As we explained, "[m]alicious prosecution actions are permitted because '[t]he policy of encouraging free access to the courts . . . is outweighed by the policy of affording redress for individual wrongs when the requirements of favorable termination, lack of probable cause, and malice are satisfied.' " (Silberg, supra, 50 Cal.3d at p. 216.) Under plaintiff's theory, however, we would be forced to abandon this well-settled rule and add the tort of false imprisonment as a further exception, even though proof of a termination in plaintiff's favor would not be required. Plaintiff has not supplied an adequate justification for taking this step. For all these reasons, the cases relied upon by plaintiff do not constitute authority for the proposition that, under the contemporary interpretation of section 47(b), an absolute privilege does not exist, shielding a citizen's report to the police concerning suspected criminal activity of another person. (Accord, Beroiz v. Wahl, supra, 84 Cal.App.4th at pp. 495-496, fn. 6.) Plaintiff also points to the decision of the Court of Appeal in DuLac v. Perma Trans Products, Inc. (1980) 103 Cal.App.3d 937, 941. In that case the Court of Appeal, reviewing the case on demurrer, determined that the plaintiff had failed to adequately allege a cause of action for false imprisonment but, relying on the early cases noted above, the court stated that providing false information to the police in bad faith in order to procure an arrest could form the basis for liability for false imprisonment. This decision is based on our early cases, does not discuss section 47(b), and does not consider how its conclusion possibly could be reconciled with our current view of the broad scope of the privilege established by {Slip Opn. Page 30} that statute. (Accord, Beroiz v. Wahl, supra, 84 Cal.App.4th at pp. 495-496, fn. 6.) fn. 8 Plaintiff next contends that even if we conclude that section 47(b) generally provides an absolute privilege, section 47(b) should not be interpreted to bar liability when it is alleged that a business establishment's communication to the police concerning suspected criminal behavior was motivated by racial or ethnic prejudice and therefore constituted unlawful discrimination by the business establishment in violation of the Unruh Civil Rights Act (§ 51 et seq.), an enactment that provides for equal "accommodations, advantages, facilities, privileges, or services in all business establishments" without regard to characteristics such as race, ancestry, or place of national origin. (§ 51, subd. (b).) Although plaintiff alleged in her complaint that Cal Fed had denied her services on the basis of her race or ethnicity and that the branch where she presented the check had an informal policy of singling out persons of certain racial or ethnic backgrounds as "inherently suspicious," plaintiff's deposition testimony, which was introduced in connection with the summary judgment motion, demonstrates that plaintiff's claim primarily was based on inferences plaintiff subjectively drew from her experience on the day she was detained, inferences that appear to have been refuted by the specific evidence Cal Fed presented with regard to its employee's telephone conversations with Smith Barney and the police, and Cal Fed's prompt efforts to end the police intervention once the mistake had been identified. Because our review of the record raises a serious question whether the evidence presented in support of and in opposition to the summary judgment {Slip Opn. Page 31} motion was sufficient even to raise a triable issue of fact on the question whether Cal Fed or its employees were motivated by racial or ethnic prejudice in their treatment of plaintiff or followed a policy of singling out persons of certain races or ethnic backgrounds for discriminatory treatment, we have concluded that this is not an appropriate case in which to resolve the broad legal question whether proof that a business establishment has called for police assistance (or has a policy of calling for police assistance) based on racial or ethnic prejudice could give rise to liability under the Unruh Civil Rights Act notwithstanding the provisions of section 47(b). (See Cal. Rules of Court, rule 29(b)(3) [on review, this court "need not decide every issue the parties raise or the court specifies"].) Because we conclude that judgment correctly was entered in Cal Fed's favor on the basis of the privilege provided by section 47(b), we need not reach Cal Fed's assertion that it is shielded under the immunity established by federal banking law. (See 31 U.S.C. § 5318(g).) III For the foregoing reasons, the judgment of the Court of Appeal is affirmed. Kennard, J., Chin, J., and Moreno, J., concurred. {Slip Opn. Page 1} BROWN, J., Dissenting: I respectfully dissent. Nothing in the statutory language of Civil Code section 47, subdivision (b) (section 47(b)) fn. 9 supports the conclusion that reports of suspected criminal activity are absolutely privileged. Rather, consideration of the common law in California and the great weight of authority in our sister states, the Legislature's treatment of reports to police in other statutory schemes, its {Slip Opn. Page 2} criminalization of false reports, and sound public policy all demonstrate that reports of suspected criminal activity are only qualifiedly privileged. Section 47(b) was enacted in 1872, and its relevant language has existed since an 1873-1874 amendment. Not until 1982, however, was it ever applied to reports to police. (Williams v. Taylor (1982) 129 Cal.App.3d 745, 753-754 (Williams).) For more than a century prior to Williams, the citizens of California reported crimes to police, and there is no evidence they were hesitant to do so because of the common law rule that such reports were subject to only a qualified privilege. (Turner v. Mellon (1953) 41 Cal.2d 45, 48 (Turner) ["citizens who have been criminally wronged may, without fear of civil reprisal for an honest mistake, report to the police . . . the facts of the crime and in good faith" identify the perpetrator]; Hughes v. Oreb (1951) 36 Cal.2d 854, 858-859 (Hughes) [a person is not liable for false imprisonment "if, acting in good faith, he merely gives information to the authorities"]; Miller v. Fano (1901) 134 Cal. 103, 107 (Miller) ["it would be a hard and unjust law that would hold a party responsible in damages for false imprisonment for an honest mistake as to the identity of a party"]; Du Lac v. Perma Trans Products, Inc. (1980) 103 Cal.App.3d 937, 942 [defendant may be liable for false imprisonment when he knowingly gives the police false or materially incomplete information of a nature that could be expected to stimulate an arrest].) Indeed, plaintiff asserts, and the majority does not dispute, that the overwhelming weight of authority in the rest of the country is that a qualified, not absolute, privilege applies to reports to police. While the majority dismisses this authority on the ground that cases from our sister states do not discuss statutes with language similar to that of section 47(b), the majority does not in fact rely on the language of section 47(b) in reaching its conclusion regarding the scope of immunity for reports to police. Rather, it relies primarily on case law interpreting {Slip Opn. Page 3} section 47(b), which in turn relies solely on the public policy consideration that citizens need open channels of communication with the police. Typically when construing a statute, we seek to determine the Legislature's intent. Here, the majority virtually ignores its obligation to interpret the statute. Rather, it relies on the "slim reed" of legislative inaction (Quinn v. State of California (1975) 15 Cal.3d 162, 175) to justify its policy preference, noting that while the Legislature has amended section 47 in other respects following Williams, it has not abrogated that decision. fn. 10 (Maj. opn., ante, at p. 22.) That inaction tells us nothing useful, however, since Fenelon v. Superior Court, supra, 223 Cal.App.3d 1476, which disagreed with Williams, has also existed for 13 years without any legislative response. Moreover, while the relevant language of section 47(b) has existed since 1874, thus predating this court's decisions in Turner, supra, 41 Cal.2d 45, Hughes, supra, 36 Cal.2d 854, and Miller, supra, 134 Cal. 103, which the majority construes as inconsistent with section 47(b), the section has never, in all of those decades, been amended to respond to these cases. By failing to examine legislative intent, the majority overlooks the critical fact that the Legislature has already restricted the open channels of communication so central to the majority's position. In other words, however much courts may desire on public policy grounds that all reports to police be absolutely immunized, {Slip Opn. Page 4} the fact of the matter is they are not. Rather, in at least three circumstances that arise with everyday frequency, the Legislature has determined that reports to police must be made in good faith in order to receive immunity. For example, Penal Code section 11172, subdivision (a) (section 11172(a)), enacted in 1980, bars civil and criminal liability of statutorily mandated reporters of child abuse or neglect under the Child Abuse and Neglect Reporting Act. However, section 11172(a) contemplates such liability for any other person making such a report if "it can be proven that a false report was made and the person knew that the report was false or was made with reckless disregard of the truth or falsity of the report, and any person who makes a report of child abuse or neglect known to be false or with reckless disregard of the truth or falsity of the report is liable for any damages caused." Welfare and Institutions Code section 15634, subdivision (a) (section 15634(a)), enacted in 1985, or several years after Williams, contains a similar provision for reports of elder or dependent-adult abuse. The purpose of both of these sections is to increase reporting of child, elder, and dependent-adult abuse, crimes that depend on secrecy and the helplessness of their victims for their commission. Yet even under these circumstances, the Legislature has deemed it appropriate to preserve only a qualified privilege for nonmandated reports. It seems unlikely the Legislature would accord only a qualified privilege for those individuals who may be the only voice for reporting crimes against the most vulnerable of victims, but grant absolute immunity to those unsympathetic individuals who falsely report other types of crimes. Moreover, we are compelled to read the statutes as a whole, and Penal Code section 11172(a) and Welfare and Institutions Code section 15634(a) undertake to provide absolute civil immunity for reports to police by mandated reporters. If Civil Code section 47(b) already provided absolute civil immunity for mandated {Slip Opn. Page 5} reporters of these suspected crimes, there would be no reason for the Legislature to accord them such protection in Penal Code section 11172(a) and Welfare and Institutions Code section 15634(a). We do not assume the Legislature engages in idle or superfluous acts. (In re J. W. (2002) 29 Cal.4th 200, 210.) In addition, in several other instances when the Legislature has been dissatisfied with case law interpretation of section 47(b), it has amended section 47(b) to create exceptions to its absolute immunity. Thus, for example, section 47(b) contains exceptions for "any communication made in furtherance of an act" of spoliation of evidence and "any communication made in a judicial proceeding knowingly concealing the existence of an insurance policy." (§ 47(b)(2), (3).) It therefore seems likely that if section 47(b) were intended to give absolute immunity for reports to police, the Legislature would have simply amended Civil Code section 47(b) to provide that false reports of child, elder, or dependent-adult abuse by nonmandated reporters receive only qualified immunity, rather than creating an absolute immunity for mandated reporters and a qualified immunity for nonmandated reporters in Penal Code section 11172(a) and Welfare and Institutions Code section 15634(a). The majority relies on the public policy of "open channels" of communication between citizens and police to support its interpretation that section 47(b) grants absolute immunity to reports of suspected criminal activity to the police. (Maj. opn., ante, at p. 26.) However, the majority's rule means that some reports to police are subject to a qualified privilege while others, after today, are entitled to an absolute privilege. Therefore if the average citizen believed a report to the police was always absolutely privileged, that belief would be incorrect. It is not clear how such an unpredictable standard encourages such reports or fosters open channels of communication. {Slip Opn. Page 6} Penal Code section 11172(a) and Welfare and Institutions Code section 15634(a) are not the only statutes of their kind. Subdivisions (a) and (b) of Education Code section 48902 require the principal of a school, or the principal's designee, in connection with suspending or expelling a student, to notify law enforcement of any acts of the pupil that may constitute certain criminal activity. Subdivision (d) of Education Code section 48902 provides, "A principal, the principal's designee, or any other person reporting a known or suspected act described in subdivision (a) or (b) is not civilly or criminally liable as a result of making any report authorized by this article unless it can be proven that a false report was made and that the person knew the report was false or the report was made with reckless disregard for the truth or falsity of the report." Under the majority's interpretation, a principal, a principal's designee, or any other person reporting the alleged commission of a crime delineated in Education Code section 48902 receives only a qualified immunity, but if any other type of crime is reported, absolute immunity is now conferred. I am unwilling to accept that the Legislature intended such arbitrary treatment of a school official's or other person's actions. The language of Education Code section 48902, subdivision (d), was added in 1988, or long after Williams, supra, 129 Cal.App.3d 745. While it is conceivable the Legislature wanted to create an exception from any absolute immunity under Civil Code section 47(b) for a school official's or other person's reports to the police that were intentionally or recklessly false, it is more reasonable to conclude the Legislature was either creating immunity where none existed before or modifying an existing qualified privilege to address recklessness. Moreover, unlike Penal Code section 11172(a), which the majority dismisses as a part of a comprehensive statutory scheme, Education Code section 48902 stands alone. (Maj. opn., ante, at p. 24, fn. 6.) As more and more such statutes appear, {Slip Opn. Page 7} the claim that Civil Code section 47(b) confers absolute immunity for reports to police becomes even more suspect. Why would the Legislature continue to create separate statutory schemes to address immunity for reports to police if a comprehensive scheme has existed since 1874? Nor, contrary to the majority's assertion, does Civil Code section 47.5 "unquestionably support[] the conclusion that the privilege established by section 47(b) applies, in general, to a 'communication to an official agency which is designed to prompt action' . . . including a communication to the police that is intended to trigger an investigation into possible criminal activity." (Maj. opn., ante, at p. 23, fn. omitted.) Section 47.5 addresses complaints against, not to, a peace officer that are filed with the peace officer's employing agency. Such a complaint inevitably invokes an administrative process according the officer notice, due process, and other attendant protections not present for the average citizen when a report of the citizen's suspected criminal activity is made to police. Moreover, in concluding section 47(b) contains an absolute privilege for reports to police, the majority omits mention of several significant limitations on that privilege. Thus, while section 47(b) "bars certain tort causes of action which are predicated on a judicial statement or publication itself, the section does not create an evidentiary privilege for such statements. Accordingly, when allegations of misconduct properly put an individual's intent at issue in a civil action, statements made during the course of a judicial proceeding may be used for evidentiary purposes in determining whether the individual acted with the requisite intent." (Oren Royal Oaks Venture v. Greenberg, Bernhard, Weiss & Karma, Inc. (1986) 42 Cal.3d 1157, 1168 [section 47(b) "would not preclude [plaintiff] from making evidentiary use of defendants' statements during negotiations to prove the intent with which defendants' conduct was undertaken"].) In addition, "republications to nonparticipants in the action are generally not privileged under {Slip Opn. Page 8} section 47(2) [now section 47(b)], and are thus actionable unless privileged on some other basis." (Silberg v. Anderson (1990) 50 Cal.3d 205, 219 (Silberg).) Finally, as the majority does note in passing, section 47(b) applies only to communications, not conduct. (Maj. opn., ante, at p. 29; Kimmel v. Goland (1990) 51 Cal.3d 202, 205, 212 [act of illegally taping telephone conversation not covered by section 47(b)].) In addition, Penal Code section 148.5 makes it a misdemeanor to knowingly give a false report of a crime to a peace officer, and Penal Code section 118.1 makes it a crime for a peace officer to knowingly and intentionally make a false statement regarding a material matter in a report. Thus, unlike most of the prelitigation communications to which the absolute immunity of Civil Code section 47(b) has been extended, false reports to police constitute a crime. The ramifications for a false investigation and arrest can be enormous, and the Legislature clearly abhors such false reports. In response, the majority notes that perjury is also criminally sanctioned, but because it acts as a deterrent to injurious publications during litigation, the existence of the perjury sanction supported this court's expansive interpretation of section 47(b) in Silberg. (Maj. opn., ante, at p. 26, citing Silberg, supra, 50 Cal.3d at pp. 218-219.) However, when perjury occurs during a trial, the victim of that perjury enjoys many attendant protections, such as testimony under oath, vigorous cross-examination informed by pretrial discovery, and rebuttal witnesses, that are not present with the filing of a police report. The majority asserts that statements reporting suspected criminal activity to police "can be the basis for tort liability . . . if the plaintiff can establish the elements of the tort of malicious prosecution." (Maj. opn., ante, at p. 1.) Of course, this is of no assistance to plaintiffs against whom charges are never brought, as in this case, and may be of little assistance when charges are dropped {Slip Opn. Page 9} before trial, as in the companion case of Mulder. (Mulder v. Pilot Air Freight (Jan. 5, 2004, S105483) __ Cal.4th __, __ [plaintiff alleged defendants acted with malice in supplying information to police, leading to his arrest and numerous court appearances prior to dismissal of charges ].) That is because dismissal of criminal charges does not, by itself, constitute a favorable termination for the purpose of establishing malicious prosecution. (5 Witkin, Summary of Cal. Law (9th ed. 1988) Torts, §§ 421, 422, pp. 505-507; see Eells v. Rosenblum (1995) 36 Cal.App.4th 1848, 1854-1856.) Rather, malicious prosecution generally requires the victim of the false accusation to establish that the accusation resulted in a criminal proceeding that was terminated in his favor, i.e., in a manner inconsistent with the accused's guilt. (5 Witkin, supra, Torts, §§ 421, 422, pp. 505-507.) Moreover, the majority states that making false imprisonment an "exception" to the absolute privilege under section 47(b) would mean that "proof of a termination in plaintiff's favor would not be required," as it is in a malicious prosecution action. (Maj. opn., ante, at p. 30.) At least one case has stated, however, that "[f]alse imprisonment and malicious prosecution are mutually inconsistent torts." (Cummings v. Fire Ins. Exchange (1988) 202 Cal.App.3d 1407, 1422.) The ramifications of an intentionally false report of suspected criminal activity to police are enormous. Citizens arrested pursuant to such a report will be stigmatized, and forever thereafter have to note the arrest on job, credit, and housing applications. Assertions that the charges were dropped, and of one's actual innocence, will likely fall on deaf ears. Under the majority's conclusion today, such falsely accused individuals will have no opportunity to clear their name, or seek compensation for economic loss in defending the charges or loss to their reputation. In the absence of clear support from either the language or the history of section 47(b), this court should not approve absolute civil protection for such destructive and criminal communications conduct. Rather, it should conclude {Slip Opn. Page 10} reports to police are subject to a qualified privilege under either section 47, subdivision (c), or extant common law. The Legislature has not hesitated to amend section 47(b) when courts have misinterpreted its provisions. I urge the Legislature to do so here. Baxter, J., and Werdegar, J., concurred. ­FN 1. Statutory references are to the Civil Code unless otherwise indicated. ­FN 2. The complaint also named Primerica Financial Services as a defendant, but because of a settlement entered into between the parties, that entity was not a party to the appeal. ­FN 3. As one court explained, with reference to the many sister state decisions cited by the Fenelon majority, "eighteen of the nineteen cases merely apply the common law privilege for good faith communication between interested parties . . . or similar case law precedent. While the nineteenth case, [citation], did involve the application of a statutorily created privilege, the possibility of an absolute privilege did not arise because the statute at issue explicitly applied only to communications made in 'good faith.' [Citations.] [¶] In none of the nineteen cases was the scope of a statutory privilege for 'official proceeding[s]' discussed." (Johnson, supra, 58 F.Supp.2d at p. 1112.) ­FN 4. One decision demonstrates confusion concerning the nature of the disagreement between Williams, supra, 129 Cal.App.3d 745, and Fenelon, supra, 223 Cal.App.3d 1476, concluding that Williams was correct in concluding that a report to the police is privileged under section 47(b) and that Fenelon erred in concluding otherwise - but that the privilege nonetheless should be a qualified one. (Devis v. Bank of America (1998) 65 Cal.App.4th 1002, 1007-1008.) The court in Devis relied upon early cases concerning claims of false imprisonment, decisions that we discuss below. (Post, at pp. 2529.) ­FN 5. The dissent contends that we "rel[y] on the 'slim reed' of legislative inaction" and "virtually ignore[] . . . [our] obligation to interpret the statute." (Dis. opn., post at p. 3.) Our interpretation of section 47(b), however, relies upon our own broad interpretation of the statute in Silberg, supra, 50 Cal.3d 205 and later cases, upon the many decisions that have applied the statutory privilege to communications to governmental agencies requesting that the agency investigate or remedy wrongdoing, and upon the specific application of section 47(b) to communications with the police discussed in Williams, supra, 129 Cal.App.3d 745 and later cases. ­FN 6. Cal Fed asserts that support for its position can be found in the Child Abuse and Neglect Reporting Act (Pen. Code, § 11164, et seq.), which requires certain persons (and permits other persons) to report to governmental authorities suspected instance of child abuse and specifically establishes that permissive reporters may be held liable for willfully false reports, but that mandatory reporters are shielded by absolute immunity. (Pen. Code, § 11172, subd. (a).) Cal Fed contends that it would have been an idle act for the Legislature to establish a qualified immunity for permissive reporters, as it did in Penal Code section 11172, subdivision (a), if Hagberg were correct that section 47 itself establishes at most a qualified immunity for citizen reports of criminal activity. (Accord, Johnson, supra, 58 F.Supp.2d at p. 1111.) In response, it has been objected that the absolute privilege for mandatory reporters that the Legislature established in Penal Code section 11172, subdivision (a) would have been unnecessary if Cal Fed were correct that section 47(b) establishes an absolute privilege for citizen reports to the police concerning criminal activity. As evidence that our interpretation of section 47(b) does not comport with legislative intent, the dissent also refers to a similar statutory scheme that imposes new duties on certain persons to report instances of "physical abuse, abandonment, isolation, financial abuse, or neglect" of an elder or dependent adult (Welf. & Inst. Code, § 15630, subd. (b)) to specified state or local agencies or to law enforcement. The dissent indicates that the qualified privilege for permissive reporters established by these provisions demonstrates legislative distaste for false reports to the police concerning criminal activity, as well as the Legislature's general conclusion that "reports to police must be made in good faith in order to receive immunity." (Dis. opn., post at p. 4.) The dissent adds that there would have been no need to provide absolute immunity for mandated reporters under these statutory schemes if the Legislature intended section 47(b) to be interpreted as the Williams decision concluded it should be. The dissent also suggests that, if these provisions constituted an exception to a general rule of privilege, the Legislature would have located them in section 47(b) itself, along with the other enumerated exceptions that appear there. There is evidence that in enacting the child abuse reporting provisions, the Legislature understood that the general rule was that reports to the police concerning criminal activity were privileged. As noted by Cal Fed and the court in Johnson, supra, 58 F.Supp.2d at pages 1110-1111, it would have been unnecessary to provide for qualified immunity for permissive reporters if the dissent's interpretation of section 47(b) were the correct one. Further, in 1981, while the Legislature was considering a related measure that added section 48.7 to the Civil Code, the Legislative Counsel's digest to the bill explained that under existing law, a person who is criminally charged with child abuse may bring a civil action for libel or slander against "the minor, a parent or guardian of the minor, or a witness" except that "there is no liability for libel or slander based on a privileged communication, including a communication intended to initiate or further an official proceeding such as a criminal prosecution." (Legis. Counsel's Dig., Assem. Bill No. 42 (1981-1982 Reg. Sess.) 4 Stats. 1981, Summary Dig., pp. 73-74, italics added.) On balance, however, it would be a mistake to rely too heavily on Penal Code section 11172 in resolving the more general issue of the meaning and proper application of section 47(b). Penal Code section 11172 was part of a comprehensive scheme in which the Legislature sought to increase substantially the reporting of a specific type of crime, but at the same time to provide potential subjects of such increased reporting with explicit civil protection against malicious false reports. (See Stecks v. Young (1995) 38 Cal.App.4th 365, 371; Storch v. Silverman (1986) 186 Cal.App.3d 671, 678-680 [describing the Legislature's attempt to increase reporting by immunizing mandated reporters, but at the same time to prevent a vindictive spouse or neighbor from making a knowingly false report by limiting immunity for permissive reporters].) Such an exceptional and comprehensive scheme, in which the Legislature has balanced conflicting interests, does not reflect an attempt by the Legislature to deal generally with the subject of the potential civil liability, if any, faced by persons who report crime to the police. It is evident that the same conclusion applies to the comprehensive scheme for elder abuse reporting that is noted by the dissent. The dissent also refers to Education Code section 48902, part of a chapter of the Education Code regulating pupil rights and responsibilities and, specifically, part of an article of that code regulating suspension and expulsion procedures. The provision in question requires school principals and their designees to report specified criminal activity on the part of students to law enforcement authorities in connection with ordering the suspension or expulsion of a student for such activity, and it supplies qualified civil and criminal immunity for doing so. The report required by this statute is to be made by a supervisory public employee ¾ as an incident of the employee's official duty to discipline students. The principal who is required to report is not thereby seeking police intervention; indeed, it appears that in most instances the report to law enforcement will occur only subsequent to the decision to suspend or expel ¾ a decision that is the product of a formal or informal due process hearing. Thus, the school principal's situation is quite distinct from that facing a person who seeks to prompt police intervention or assistance, and this statute does not supply any indication of legislative intent with respect to the application of section 47(b). Again, if the dissent were correct that section 47 supplies only a qualified privilege for reports of criminal activity, it is difficult to understand why the Legislature found it necessary to provide for a qualified privilege under Education Code section 48902. ­FN 7. False imprisonment consists of the unlawful violation of the personal liberty of another person; a false arrest is merely one way in which a false imprisonment may be accomplished - the two are not separate torts. (5 Witkin, Summary of Cal. Law (9th ed.1988) Torts, § 378, pp. 463-464.) ­FN 8. To the extent that language in Miller, supra, 134 Cal. 103, Turner, supra, 41 Cal.2d 46, and DuLac v. Perma Trans Products, Inc., supra, 103 Cal.App.3d 937, is inconsistent with our opinion in the present case, it is disapproved. ­FN 9. Section 47(b) and (c) provide, "A privileged publication or broadcast is one made: [¶] . . . [¶] (b) In any (1) legislative proceeding, (2) judicial proceeding, (3) in any other official proceeding authorized by law, or (4) in the initiation or course of any other proceeding authorized by law and reviewable pursuant to Chapter 2 (commencing with Section 1084) of Title 1 of Part 3 of the Code of Civil Procedure, except . . . [¶] (1) [in inapplicable situations involving certain marital dissolution or legal separation proceeding allegations] . . . . [¶] (2) . . . any communication made in furtherance of an act of intentional destruction or alteration of physical evidence undertaken for the purpose of depriving a party to litigation of the use of that evidence, . . . [¶] (3) . . . any communication made in a judicial proceeding knowingly concealing the existence of an insurance policy, . . . [¶] (4) . . . [or a] recorded lis pendens [which] identifies an action previously filed with a court of competent jurisdiction which affects the title or right of possession of real property . . . . [¶] (c) In a communication, without malice, to a person interested therein, (1) by one who is also interested, or (2) by one who stands in such a relation to the person interested as to afford a reasonable ground for supposing the motive for the communication to be innocent, or (3) who is requested by the person interested to give the information." (§ 47, subds. (b)(1)-(4), (c).) ­FN 10. The majority further states that this court "cited Williams with approval in" Slaughter v. Friedman (1982) 32 Cal.3d 149, 156. (Maj. opn., ante, at p. 15.) It fails to mention, however, that a short time after the decision in Fenelon v. Superior Court (1990) 223 Cal.App.3d 1476, we acknowledged the conflict between Fenelon and Williams but "express[ed] no opinion on the merits of the controversy." (Lubetzky v. State Bar (1991) 54 Cal.3d 308, 317, fn. 7.) By acknowledging that a controversy existed, we undermined any suggestion that our citation to Williams, supra, 129 Cal.App.3d 745, in Slaughter, supra, 32 Cal.3d at page 156, constituted a blanket approval of that opinion. Case for question 6-6 GARY KREMEN, an individual, Plaintiff-Appellant, and ONLINE CLASSIFIEDS, INC., a Delaware Company, Plaintiff, v. STEPHEN MICHAEL COHEN, an individual; OCEAN FUND INTERNATIONAL, LTD., a foreign company; SAND MAN INTERNACIONAL LTD., a foreign company; SPORTING HOUSES MANAGEMENT CORPORATION, a Nevada company; SPORTING HOUSES OF AMERICA, a Nevada company; SPORTING HOUSES GENERAL INC., a Nevada company; WILLIAM DOUGLAS, Sir, an individual; VP BANK (BVI) LIMITED, a foreign company; ANDREW KEULS, an individual; MONTANO PROPERTIES LLC, a California Limited Liability Company; YNATA LTD., Defendant, and NETWORK SOLUTIONS, INC., a Delaware company, Defendant-Appellee. No. 01-15899 UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT 337 F.3d 1024; 2003 U.S. App. LEXIS 14830; 67 U.S.P.Q.2D (BNA) 1502; 2003 Cal. Daily Op. Service 6565 July 25, 2003, Filed PRIOR HISTORY: Appeal from the United States District Court for the Northern District of California. D.C. No. CV-98-20718-JW. James Ware, District Judge, Presiding. Kremen v. Cohen, 99 F. Supp. 2d 1168, 2000 U.S. Dist. LEXIS 8476 (N.D. Cal., 2000) DISPOSITION: AFFIRMED in part, REVERSED in part and REMANDED. COUNSEL: James M. Wagstaffe, Kerr & Wagstaffe LLP, San Francisco, California, argued for the appellant. Pamela Urueta and Alex K. Grab joined him on the briefs. Kathryn E. Karcher, Gray Cary Ware & Freidenrich LLP, San Diego, California, argued for the appellee. David Henry Dolkas and Mira A. Macias joined her on the briefs. Professor Brian E. Gray, San Francisco, California, amicus curiae in support of the appellant. William H. Bode, Bode & Grenier, Washington, D.C., for amicus curiae American Internet Registrants Association in support of the appellant. Robin D. Gross, Electronic Frontier Foundation, San Francisco, California, amicus curiae in support of the appellant. JUDGES: Before: Alex Kozinski and M. Margaret McKeown, Circuit Judges, and James M. Fitzgerald, * District Judge. Opinion by Judge Kozinski. * The Honorable James M. Fitzgerald, Senior United States District Judge for the District of Alaska, sitting by designation. OPINION: KOZINSKI, Circuit Judge: We decide whether Network Solutions may be liable for giving away a registrant's domain name on the basis of a forged letter. Background "Sex on the Internet?," they all said. "That'll never make any money." But computer-geekturnedentrepreneur Gary Kremen knew an opportunity when he saw it. The year was 1994; domain names were free for the asking, and it would be several years yet before Henry Blodget and hordes of eager NASDAQ day traders would turn the Internet into the Dutch tulip craze of our times. With a quick e-mail to the domain name registrar Network Solutions, Kremen became the proud owner of sex.com. He registered the name to his business, Online Classifieds, and listed himself as the contact. n1 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n1 We assume basic familiarity with the Internet. Those just tuning in should read the helpful discussions in Kremen v. Cohen, 325 F.3d 1035, 1038-39 (9th Cir. 2003) (order certifying question), and Thomas v. Network Solutions, Inc., 336 U.S. App. D.C. 74, 176 F.3d 500, 502-04 (D.C. Cir. 1999). - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Con man Stephen Cohen, meanwhile, was doing time for impersonating a bankruptcy lawyer. He, too, saw the potential of the domain name. Kremen had gotten it first, but that was only a minor impediment for a man of Cohen's boundless resource and bounded integrity. Once out of prison, he sent Network Solutions what purported to be a letter he had received from Online Classifieds. It claimed the company had been "forced to dismiss Mr. Kremen," but "never got around to changing our administrative contact with the internet registration [sic] and now our Board of directors has decided to abandon the domain name sex.com." Why was this unusual letter being sent via Cohen rather than to Network Solutions directly? It explained: Because we do not have a direct connection to the internet, we request that you notify the internet registration on our behalf, to delete our domain name sex.com. Further, we have no objections to your use of the domain name sex.com and this letter shall serve as our authorization to the internet registration to transfer sex.com to your corporation. n2 Despite the letter's transparent claim that a company called "Online Classifieds" had no Internet connection, Network Solutions made no effort to contact Kremen. Instead, it accepted the letter at face value and transferred the domain name to Cohen. When Kremen contacted Network Solutions some time later, he was told it was too late to undo the transfer. Cohen went on to turn sex.com into a lucrative online porn empire. - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n2 The letter was signed "Sharon Dimmick," purported president of Online Classifieds. Dimmick was actually Kremen's housemate at the time; Cohen later claimed she sold him the domain name for $ 1000. This story might have worked a little better if Cohen hadn't misspelled her signature. - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - And so began Kremen's quest to recover the domain name that was rightfully his. He sued Cohen and several affiliated companies in federal court, seeking return of the domain name and disgorgement of Cohen's profits. The district court found that the letter was indeed a forgery and ordered the domain name returned to Kremen. It also told Cohen to hand over his profits, invoking the constructive trust doctrine and California's "unfair competition" statute, Cal. Bus. & Prof. Code § 17200 et seq. It awarded $ 40 million in compensatory damages and another $ 25 million in punitive damages. n3 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n3 We dismissed Cohen's appeal in an unpublished memorandum disposition. See Kremen v. Cohen, 45 Fed. Appx. 746, 2002 WL 2017073 (9th Cir. 2002). - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Kremen, unfortunately, has not had much luck collecting his judgment. The district court froze Cohen's assets, but Cohen ignored the order and wired large sums of money to offshore accounts. His real estate property, under the protection of a federal receiver, was stripped of all its fixtures- even cabinet doors and toilets -- in violation of another order. The court commanded Cohen to appear and show cause why he shouldn't be held in contempt, but he ignored that order, too. The district judge finally took off the gloves -- he declared Cohen a fugitive from justice, signed an arrest warrant and sent the U.S. Marshals after him. Then things started getting really bizarre. Kremen put up a "wanted" poster on the sex.com site with a mug shot of Cohen, offering a $ 50,000 reward to anyone who brought him to justice. Cohen's lawyers responded with a motion to vacate the arrest warrant. They reported that Cohen was under house arrest in Mexico and that gunfights between Mexican authorities and would-be bounty hunters seeking Kremen's reward money posed a threat to human life. The district court rejected this story as "implausible" and denied the motion. Cohen, so far as the record shows, remains at large. Given his limited success with the bounty hunter approach, it should come as no surprise that Kremen seeks to hold someone else responsible for his losses. That someone is Net-work Solutions, the exclusive domain name registrar at the time of Cohen's antics. Kremen sued it for mishandling his domain name, invoking four theories at issue here. He argues that he had an implied contract with Network Solutions, which it breached by giving the domain name to Cohen. He also claims the transfer violated Network Solutions's cooperative agreement with the National Science Foundation -- the government contract that made Network Solutions the .com registrar. His third theory is that he has a property right in the domain name sex.com, and Network Solutions committed the tort of conversion by giving it away to Cohen. Finally, he argues that Network Solutions was a "bailee" of his domain name and seeks to hold it liable for "conversion by bailee." The district court granted summary judgment in favor of Network Solutions on all claims. Kremen v. Cohen, 99 F. Supp. 2d 1168 (N.D. Cal. 2000). It held that Kremen had no implied contract with Network Solutions because there was no consideration: Kremen had registered the domain name for free. Id. at 1171-72. It rejected the third-party contract claim on the ground that the cooperative agreement did not indicate a clear intent to grant enforceable contract rights to registrants. Id. at 1172. The conversion claims fared no better. The court agreed that sex.com was Kremen's property. It concluded, though, that it was intangible property to which the tort of conversion does not apply. Id. at 1173. The conversion by bailee claim failed for the additional reason that Network Solutions was not a bailee. Id. at 1175. Kremen appeals, and we consider each of his four theories in turn. Breach of Contract Kremen had no express contract with Network Solutions, but argues that his registration created an implied contract, which Network Solutions breached. A defendant is normally not liable for breach of contract, however, if he promised to do something for free. The party claiming breach must show that, in return for the promise, it conferred some benefit the other party was not already entitled to receive, or suffered some prejudice it was not already bound to endure. Cal. Civ. Code § 1605. n4 The adequacy of consideration doesn't matter, but it must be "something of real value." Herbert v. Lankershim, 9 Cal.2d 409, 475, 71 P.2d 220 (1937) (internal quotation marks omitted). - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n4 Neither party argued choice of law, so we apply California law throughout. See McGhee v. Arabian Am. Oil Co., 871 F.2d 1412, 1424 (9th Cir. 1989). - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Kremen did not pay Network Solutions or exchange some other property in return for his domain name. Nor did his registration increase the amount of money Network Solutions received from the National Science Foundation; under the cooperative agreement, Network Solutions was paid on a fixed-fee basis. The cooperative agreement did contemplate that Network Solutions might one day charge fees. Kremen seizes on this fact and claims he conferred a benefit on Network Solutions by becoming a customer "at a time when [it] was eager to expand its customer base." The problem with this theory is that Kremen was a nonpaying customer, so his status as a registrant was valuable only because of the possibility he might stick around if Network Solutions started charging fees. Kremen was under no obligation to do so. He was in the same position as one who promises to do something but reserves the right to change his mind. See, e.g., County of Alameda v. Ross, 32 Cal. App. 2d 135, 143-44, 89 P.2d 460 (1939); 1 Witkin Contracts § 234. He might have become a paying customer or he might not; the choice was up to him once Network Solutions started charging fees. As many Internet investors found out the hard way, "mere . . . hope of profit is not consideration." Williams v. Hasshagen, 166 Cal. 386, 390, 137 P. 9 (1913). Kremen argues that he gave Network Solutions valuable marketing data by submitting his contact information when he registered the domain name. But there is no evidence that Network Solutions sought the data as part of its benefit of the bargain. See Bard v. Kent, 19 Cal.2d 449, 452, 122 P.2d 8 (1942). It collected only information reasonably necessary to complete the registration process. Any marketing value it had was an incidental consequence of the process. This is not a case where a party's actions can only be explained as a gimmick to collect customer information; Network Solutions was giving away domain names because the National Science Foundation was paying it to do so. Knowledge of the recipient's identity is a nearly inevitable consequence of any gift. Absent evidence it was actually something the donor bargained for, it is not consideration. Kremen did not give consideration for his domain name, so he had no contract with Network Solutions. Cf. Oppedahl & Larson v. Network Solutions, Inc., 3 F. Supp. 2d 1147, 1160-61 (D. Colo. 1998). Breach of Third-Party Contract We likewise reject Kremen's argument based on Net-work Solutions's cooperative agreement with the National Science Foundation. A party can enforce a third-party contract only if it reflects an "express or implied intention of the parties to the contract to benefit the third party." Klamath Water Users Protective Ass'n v. Patterson, 204 F.3d 1206, 1211 (9th Cir. 1999). "The intended beneficiary need not be specifically or individually identified in the contract, but must fall within a class clearly intended by the parties to benefit from the contract." Id. When a contract is with a government entity, a more stringent test applies: "Parties that benefit . . . are generally assumed to be incidental beneficiaries, and may not enforce the contract absent a clear intent to the contrary." Id. The contract must establish not only an intent to confer a benefit, but also "an intention . . . to grant [the third party] enforceable rights." Id. Kremen relies on language in the agreement providing that Network Solutions had "primary responsibility for ensuring the quality, timeliness and effective management of [domain name] registration services" and that it was supposed to "facilitate the most effective, efficient and ubiquitous registration services possible." This language does not indicate a clear intent to grant registrants enforceable contract rights. We accordingly reject Kremen's claim. Cf. Oppedahl & Larson, 3 F. Supp. 2d at 1157-59. Conversion Kremen's conversion claim is another matter. To establish that tort, a plaintiff must show "ownership or right to possession of property, wrongful disposition of the property right and damages." G.S. Rasmussen & Assocs., Inc. v. Kalitta Flying Serv., Inc., 958 F.2d 896, 906 (9th Cir. 1992). The preliminary question, then, is whether registrants have property rights in their domain names. Network Solutions all but concedes that they do. This is no surprise, given its positions in prior litigation. See Network Solutions, Inc. v. Umbro Int'l, Inc., 259 Va. 759, 529 S.E.2d 80, 86 (Va. 2000) ("[Network Solutions] acknowledged during oral argument before this Court that the right to use a domain name is a form of intangible personal property."); Network Solutions, Inc. v. Clue Computing, Inc., 946 F. Supp. 858, 860 (D. Colo. 1996) (same). n5 The district court agreed with the parties on this issue, as do we. - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n5 Network Solutions does suggest in passing that we should distinguish domain names supported by contracts from those (like Kremen's) that are not. It also stresses that Kremen didn't develop the sex.com site before Cohen stole it. But this focus on the particular domain name at issue is misguided. The question is not whether Kremen's domain name in isolation is property, but whether domain names as a class are a species of property. - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Property is a broad concept that includes "every intangible benefit and prerogative susceptible of possession or disposition." Downing v. Mun. Court, 88 Cal. App. 2d 345, 350, 198 P.2d 923 (1948) (internal quotation marks omitted). We apply a three-part test to determine whether a property right exists: "First, there must be an interest capable of precise definition; second, it must be capable of exclusive possession or control; and third, the putative owner must have established a legitimate claim to exclusivity." G.S. Rasmussen, 958 F.2d at 903 (footnote omitted). Domain names satisfy each criterion. Like a share of corporate stock or a plot of land, a domain name is a well-defined interest. Someone who registers a domain name decides where on the Internet those who invoke that particular name -- whether by typing it into their web browsers, by following a hyperlink, or by other means -- are sent. Ownership is exclusive in that the registrant alone makes that decision. Moreover, like other forms of property, domain names are valued, bought and sold, often for millions of dollars, see Greg Johnson, The Costly Game for Net Names, L.A. Times, Apr. 10, 2000, at A1, and they are now even subject to in rem jurisdiction, see 15 U.S.C. § 1125(d)(2). Finally, registrants have a legitimate claim to exclusivity. Registering a domain name is like staking a claim to a plot of land at the title office. It informs others that the domain name is the registrant's and no one else's. Many registrants also invest substantial time and money to develop and promote websites that depend on their domain names. Ensuring that they reap the benefits of their investments reduces uncertainty and thus encourages investment in the first place, promoting the growth of the Internet overall. See G.S. Rasmussen, 958 F.2d at 900. Kremen therefore had an intangible property right in his domain name, and a jury could find that Network Solutions "wrongfully disposed of" that right to his detriment by handing the domain name over to Cohen. Id. at 906. The district court nevertheless rejected Kremen's conversion claim. It held that domain names, although a form of property, are intangibles not subject to conversion. This rationale derives from a distinction tort law once drew between tangible and intangible property: Conversion was originally a remedy for the wrongful taking of another's lost goods, so it applied only to tangible property. See Prosser and Keeton on the Law of Torts § 15, at 89, 91 (W. Page Keeton ed., 5th ed. 1984). Virtually every jurisdiction, however, has discarded this rigid limitation to some degree. See id. at 91. Many courts ignore or expressly reject it. See Kremen, 325 F.3d at 1045-46 n.5 (Kozinski, J., dissenting) (citing cases); Astroworks, Inc. v. Astroexhibit, Inc., 257 F. Supp. 2d 609, 618 (S.D.N.Y. 2003) (holding that the plaintiff could maintain a claim for conversion of his website); Val D. Ricks, The Conversion of Intangible Property: Bursting the Ancient Trover Bottle with New Wine, 1991 B.Y.U. L. Rev. 1681, 1682. Others reject it for some intangibles but not others. The Restatement, for example, recommends the following test: (1) Where there is conversion of a document in which intangible rights are merged, the damages include the value of such rights. (2) One who effectively prevents the exercise of intangible rights of the kind customarily merged in a document is subject to a liability similar to that for conversion, even though the document is not itself converted. Restatement (Second) of Torts § 242 (1965) (emphasis added). An intangible is "merged" in a document when, "by the appropriate rule of law, the right to the immediate possession of a chattel and the power to acquire such possession is represented by [the] document," or when "an intangible obligation [is] represented by [the] document, which is regarded as equivalent to the obligation." Id. cmt. a (emphasis added). n6 The district court applied this test and found no evidence that Kremen's domain name was merged in a document. - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - - n6 The Restatement does note that conversion "has been applied by some courts in cases where the converted document is not in itself a symbol of the rights in question, but is merely essential to their protection and enforcement, as in the case of account books and receipts." Id. cmt. b. - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - The court assumed that California follows the Restatement on this issue. Our review, however, revealed that "there do not appear to be any California cases squarely addressing whether the 'merged with' requirement is a part of California law." Kremen, 325 F.3d at 1042. We invoked the California Supreme Court's certification procedure to offer it the opportunity to address the issue. Id. at 1043; Cal. Rules of Court 29.8. The Court declined, Kremen v. Cohen, 2003 Cal. LEXIS 1342, No. S112591 (Cal. Feb. 25, 2003), and the question now falls to us. We conclude that California does not follow the Restatement's strict merger requirement. Indeed, the leading California Supreme Court case rejects the tangibility requirement altogether. In Payne v. Elliot, 54 Cal. 339 (1880), the Court considered whether shares in a corporation (as opposed to the share certificates themselves) could be converted. It held that they could, reasoning: "The action no longer exists as it did at common law, but has been developed into a remedy for the conversion of every species of personal property." Id. at 341 (emphasis added). While Payne's outcome might be reconcilable with the Restatement, its rationale certainly is not: It recognized conversion of shares, not because they are customarily represented by share certificates, but because they are a species of personal property and, perforce, protected. Id. at 342. n7 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n7 Intangible interests in real property, on the other hand, remain unprotected by conversion, presumably because trespass is an adequate remedy. See Goldschmidt v. Maier, 7 Cal. Unrep. 162, 73 P. 984, 985 (Cal. 1903) (per curiam) ("[A] leasehold of real estate is not the subject of an action of trover."); Vuich v. Smith, 140 Cal. App. 453, 455, 35 P.2d 365 (1934) (same). Some California cases also preserve the traditional exception for indefinite sums of money. See 5 Witkin Torts § 614. - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Notwithstanding Payne's seemingly clear holding, the California Court of Appeal held in Olschewski v. Hudson, 87 Cal. App. 282, 262 P. 43 (1927), that a laundry route was not subject to conversion. It explained that Payne's rationale was "too broad a statement as to the application of the doctrine of conversion." Id. at 288. Rather than follow binding California Supreme Court precedent, the court retheorized Payne and held that corporate stock could be converted only because it was "represented by" a tangible document. Id.; see also Adkins v. Model Laundry Co., 92 Cal. App. 575, 583, 268 P. 939 (1928) (relying on Olschewski and holding that no property right inhered in "the intangible interest of an exclusive privilege to collect laundry"). Were Olschewski the only relevant case on the books, there might be a plausible argument that California follows the Restatement. But in Palm Springs-La Quinta Development Co. v. Kieberk Corp., 46 Cal. App. 2d 234, 115 P.2d 548 (1941), the court of appeal allowed a conversion claim for intangible information in a customer list when some of the index cards on which the information was recorded were destroyed. The court allowed damages not just for the value of the cards, but for the value of the intangible information lost. See id. at 239. Section 242(1) of the Restatement, however, allows recovery for intangibles only if they are merged in the converted document. Customer information is not merged in a document in any meaningful sense. A Rolodex is not like a stock certificate that actually represents a property interest; it is only a means of recording information. Palm Springs and Olschewski are reconcilable on their facts --the former involved conversion of the document itself while the latter did not. But this distinction can't be squared with the Restatement. The plaintiff in Palm Springs recovered damages for the value of his intangibles. But if those intangibles were merged in the index cards for purposes of section 242(1), the plaintiffs in Olschewski and Adkins should have recovered under section 242(2)--laundry routes surely are customarily written down somewhere. "Merged" can't mean one thing in one section and something else in the other. California courts ignored the Restatement again in A & M Records, Inc. v. Heilman, 75 Cal. App. 3d 554, 142 Cal. Rptr. 390 (1977), which applied the tort to a defendant who sold bootlegged copies of musical recordings. The court held broadly that "such misappropriation and sale of the intangible property of another without authority from the owner is conversion." Id. at 570. It gave no hint that its holding depended on whether the owner's intellectual property rights were merged in some document. One might imagine physical things with which the intangible was associated -- for example, the medium on which the song was recorded. But an intangible intellectual property right in a song is not merged in a phonograph record in the sense that the record represents the composer's intellectual property right. The record is not like a certificate of ownership; it is only a medium for one instantiation of the artistic work. n8 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n8 The California Court of Appeal addressed the issue most recently in Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559, 54 Cal. Rptr. 2d 468 (1996), which noted that courts had "traditionally" refused to acknowledge conversion of intangibles "not merged with, or reflected in, something tangible." Id. at 1565 (citing Olschewski and Adkins). The court declined to decide whether that limitation was still good law and resolved the case on other grounds. See id. at 1565-66. - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Federal cases applying California law take an equally broad view. We have applied A & M Records to intellectual property rights in an audio broadcast, see Lone Ranger Television, Inc. v. Program Radio Corp., 740 F.2d 718, 725 (9th Cir. 1984), and to a regulatory filing, see G.S. Rasmussen, 958 F.2d at 906-07. Like A & M Records, both decisions defy the Restatement's "merged in a document" test. An audio broad-cast may be recorded on a tape and a regulatory submission may be typed on a piece of paper, but neither document represents the owner's intangible interest. The Seventh Circuit interpreted California law in FMC Corp. v. Capital Cities/ABC, Inc., 915 F.2d 300 (7th Cir. 1990). Observing that "'there is perhaps no very valid and essential reason why there might not be conversion' of intangible property," id. at 305 (quoting Prosser & Keeton, supra, § 15, at 92), it held that a defendant could be liable merely for depriving the plaintiff of the use of his confidential information, id. at 304. In rejecting the tangibility requirement, FMC echoes Payne's holding that personal property of any species may be converted. And it flouts the Restatement because the intangible property right in confidential information is not represented by the documents on which the information happens to be recorded. Our own recent decision in Bancroft & Masters, Inc. v. Augusta National Inc., 223 F.3d 1082 (9th Cir. 2000), is especially relevant. That case involved a domain name -- precisely the type of property at issue here. The primary question was personal jurisdiction, but a majority of the panel joined the judgment only on the understanding that the defendant had committed conversion of a domain name, which it characterized as "tortious conduct." Id. at 1089 (Sneed & Trott, JJ., concurring); cf. Astroworks, Inc., 257 F. Supp. 2d at 618 (holding that the plaintiff could maintain a claim for conversion of his website). In short, California does not follow the Restatement's strict requirement that some document must actually represent the owner's intangible property right. On the contrary, courts routinely apply the tort to intangibles without inquiring whether they are merged in a document and, while it's often possible to dream up some document the intangible is connected to in some fashion, it's seldom one that represents the owner's property interest. To the extent Olschewski endorses the strict merger rule, it is against the weight of authority. That rule cannot be squared with a jurisprudence that recognizes conversion of music recordings, radio shows, customer lists, regulatory filings, confidential information and even domain names. n9 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n9 Witkin cites the Restatement favorably. See 5 Witkin Torts § 613. Notably, though, he points to only three cases rejecting conversion of intangibles: Olschewski (which disavowed binding California Supreme Court authority directly on point, see p. 10168 supra); Vuich (which involved real estate and so was not within Payne's holding anyway, see n.7 supra); and Italiani v. Metro-Goldwyn-Mayer Corp., 45 Cal. App. 2d 464, 114 P.2d 370 (1941) (which denied protection to intellectual property rights and has been overtaken by later cases such as A & M Records and Lone Ranger Television, see pp. 10169-70 supra). - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - Were it necessary to settle the issue once and for all, we would toe the line of Payne and hold that conversion is "a remedy for the conversion of every species of personal property." 54 Cal. at 341. But we need not do so to resolve this case. Assuming arguendo that California retains some vestigial merger requirement, it is clearly minimal, and at most requires only some connection to a document or tangible object -- not representation of the owner's intangible interest in the strict Restatement sense. Kremen's domain name falls easily within this class of property. He argues that the relevant document is the Domain Name System, or "DNS" -- the distributed electronic database that associates domain names like sex.com with particular computers connected to the Internet. n10 We agree that the DNS is a document (or perhaps more accurately a collection of documents). That it is stored in electronic form rather than on ink and paper is immaterial. See, e.g., ThriftyTel, 46 Cal. App. 4th at 1565 (recognizing conversion of information recorded on floppy disk); A & M Records, 75 Cal. App. 3d at 570 (same for audio record); Lone Ranger Television, 740 F.2d at 725 (same for magnetic tape). It would be a curious jurisprudence that turned on the existence of a paper document rather than an electronic one. Torching a company's file room would then be conversion while hacking into its mainframe and deleting its data would not. That is not the law, at least not in California. n11 - - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - n10 Network Solutions complains about the absence of specific record evidence regarding the DNS. But whether domain names are a species of property to which conversion applies is a question of law rather than of adjudicative fact; we may consider record evidence but need not so restrict ourselves. See Fed. R. Evid. 201(a) advisory committee notes. Network Solutions has had ample opportunity to contest the nature of the DNS in both its answering brief on appeal and its response to amici. It has raised no material point of dispute. n11 The Restatement requires intangibles to be merged only in a "document," not a tangible document. Restatement (Second) of Torts § 242. Our holding therefore does not depend on whether electronic records are tangible. Compare eBay, Inc. v. Bidder's Edge, Inc., 100 F. Supp. 2d 1058, 1069 (N.D. Cal. 2000) ( "It appears likely that the electronic signals sent by [Bidder's Edge] to retrieve information from eBay's computer system are . . . sufficiently tangible to support a trespass cause of action."), with Intel Corp. v. Hamidi, 30 Cal. 4th 1342, 1 Cal. Rptr. 3d 32, 71 P.3d 296, 2003 WL 21488209, at *11 (Cal. 2003) (implying that electronic signals are intangible). - - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - The DNS also bears some relation to Kremen's domain name. We need not delve too far into the mechanics of the Internet to resolve this case. It is sufficient to observe that information correlating Kremen's domain name with a particular computer on the Internet must exist somewhere in some form in the DNS; if it did not, the database would not serve its intended purpose. Change the information in the DNS, and you change the website people see when they type "www.sex.com." Network Solutions quibbles about the mechanics of the DNS. It points out that the data corresponding to Kremen's domain name is not stored in a single record, but is found in several different places: The components of the domain name ("sex" and "com") are stored in two different places, and each is copied and stored on several machines to create redundancy and speed up response times. Network Solutions's theory seems to be that intangibles are not subject to conversion unless they are associated only with a single document. Even if Network Solutions were correct that there is no single record in the DNS architecture with which Kremen's intangible property right is associated, that is no impediment under California law. A share of stock, for example, may be evidenced by more than one document. See Payne, 54 Cal. at 342 ( "The certificate is only evidence of the property; and it is not the only evidence, for a transfer on the books of the corporation, without the issuance of a certificate, vests title in the shareholder: the certificate is, therefore, but additional evidence of title . . . ."); see also Phansalkar v. Andersen Weinroth & Co., 175 F. Supp. 2d 635, 640-42 (S.D.N.Y. 2001) (citing Payne). A customer list is protected, even if it's recorded on index cards rather than a single piece of paper. See Palm Springs, 46 Cal. App. 2d 234, 115 P.2d 548. Audio recordings may be duplicated, see A & M Records, 75 Cal. App. 3d 554, 142 Cal. Rptr. 390; Lone Ranger Television, 740 F.2d 718, and confidential information and regulatory filings may be photocopied, see FMC, 915 F.2d 300; G.S. Rasmussen, 958 F.2d 896. Network Solutions's "single document" theory is unsupported. Network Solutions also argues that the DNS is not a document because it is refreshed every twelve hours when updated domain name information is broadcast across the Internet. This theory is even less persuasive. A document doesn't cease being a document merely because it is often updated. If that were the case, a share registry would fail whenever shareholders were periodically added or dropped, as would an address file whenever business cards were added or removed. Whether a document is updated by inserting and deleting particular records or by replacing an old file with an entirely new one is a technical detail with no legal significance. Kremen's domain name is protected by California conversion law, even on the grudging reading we have given it. Exposing Network Solutions to liability when it gives away a registrant's domain name on the basis of a forged letter is no different from holding a corporation liable when it gives away someone's shares under the same circumstances. See Schneider v. Union Oil Co., 6 Cal. App. 3d 987, 992, 86 Cal. Rptr. 315 (1970); Ralston v. Bank of Cal., 112 Cal. 208, 213, 44 P. 476 (1896). We have not "created new tort duties" in reaching this result. Cf. Moore v. Regents of the Univ. of Cal., 51 Cal.3d 120, 146, 271 Cal. Rptr. 146, 793 P.2d 479 (1990). We have only applied settled principles of conversion law to what the parties and the district court all agree is a species of property. The district court supported its contrary holding with several policy rationales, but none is sufficient grounds to depart from the common law rule. The court was reluctant to apply the tort of conversion because of its strict liability nature. This concern rings somewhat hollow in this case because the district court effectively exempted Network Solutions from liability to Kremen altogether, whether or not it was negligent. Network Solutions made no effort to contact Kremen before giving away his domain name, despite receiving a facially suspect letter from a third party. A jury would be justified in finding it was unreasonably careless. We must, of course, take the broader view, but there is nothing unfair about holding a company responsible for giving away someone else's property even if it was not at fault. Cohen is obviously the guilty party here, and the one who should in all fairness pay for his theft. But he's skipped the country, and his money is stashed in some offshore bank account. Unless Kremen's luck with his bounty hunters improves, Cohen is out of the picture. The question becomes whether Network Solutions should be open to liability for its decision to hand over Kremen's domain name. Negligent or not, it was Network Solutions that gave away Kremen's property. Kremen never did anything. It would not be unfair to hold Network Solutions responsible and force it to try to recoup its losses by chasing down Cohen. This, at any rate, is the logic of the common law, and we do not lightly discard it. The district court was worried that "the threat of litigation threatens to stifle the registration system by requiring further regulations by [Network Solutions] and potential increases in fees." Kremen, 99 F. Supp. 2d at 1174. Given that Network Solutions's "regulations" evidently allowed it to hand over a registrant's domain name on the basis of a facially suspect letter without even contacting him, "further regulations" don't seem like such a bad idea. And the prospect of higher fees presents no issue here that it doesn't in any other context. A bank could lower its ATM fees if it didn't have to pay security guards, but we doubt most depositors would think that was a good idea. The district court thought there were "methods better suited to regulate the vagaries of domain names" and left it "to the legislature to fashion an appropriate statutory scheme." Id. The legislature, of course, is always free (within constitutional bounds) to refashion the system that courts come up with. But that doesn't mean we should throw up our hands and let private relations degenerate into a free-for-all in the meantime. We apply the common law until the legislature tells us other-wise. And the common law does not stand idle while people give away the property of others. The evidence supported a claim for conversion, and the district court should not have rejected it. Conversion by Bailee Kremen's complaint finally alleges a separate claim for "conversion by bailee." The district court granted summary judgment, holding that Network Solutions was not a bailee of Kremen's property. We need not decide the issue because Kremen's "conversion by bailee" claim does not state a cause of action independent of his conversion claim. As we read California law, "conversion by bailee" is not a distinct tort, but merely the tort of conversion committed by one who is a bailee. See, e.g., Byer v. Can. Bank of Commerce, 8 Cal.2d 297, 300-01, 65 P.2d 67 (1937); Gonzales v. Pers. Storage, Inc., 56 Cal. App. 4th 464, 476-77, 65 Cal. Rptr. 2d 473 (1997); 4 Witkin Personal Property § 138; 5 Witkin Torts § 622. Kremen's complaint does not allege any claim of bailee liability other than conversion. Cf., e.g., Windeler v. Scheers Jewelers, 8 Cal. App. 3d 844, 850-52, 88 Cal. Rptr. 39 (1970) (negligent breach of the bailment contract). To prove "conversion by bailee," Kremen must establish all the elements of conversion but, having done so, he gains nothing by also showing that Network Solutions is a bailee. *** Kremen had a viable claim for conversion. The judgment of the district court is reversed on this count, and the case is remanded for further proceedings. AFFIRMED in part, REVERSED in part and REMANDED. No costs. Case for question 6-5 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF IOWA WESTERN DIVISION AMERICA ONLINE, INC., No. C98-4111-PAZ Plaintiff, vs. ORDER ON MOTION FOR SUMMARY JUDGMENT NATIONAL HEALTH CARE DISCOUNT, INCORPORATED, Defendant. I. INTRODUCTION This case is before the court on the motion of the plaintiff America Online, Inc. ("AOL") for partial summary judgment on the issue of liability (Doc. No. 27). This case was commenced on December 18, 1998, when AOL filed a seven-count Complaint (Doc. No. 1) against the defendant National Health Care Discount, Incorporated ("NHCD"). In its Complaint, AOL alleges the following causes of action: Count I: Violations of the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq. ("CFAA"); Count II: Dilution of interest in service marks, in violation of 15 U.S.C. § 1125(c)(1); Count III: Violations of the Virginia and Iowa Computer Crimes Acts, Virginia Code Annotated § 18.2-152.1 et seq., and Iowa Code, Chapter 716A; Count IV: Violation of Washington's Commercial Electronic Mail Act, Washington Revised Code Annotated, title 19, chapter 19.190, and the Washington Consumer Protection Act, Washington Revised Code Annotated, title 19, chapter 19.86; Count V: Conversion of or trespass to chattels under the common law; Count VI: Civil conspiracy; and Count VII: Unjust enrichment. AOL prays for compensatory and statutory damages, punitive damages, preliminary and permanent injunctive relief, attorney fees, and costs. On March 24, 1999, NHCD answered the Complaint, generally denying liability on all counts, and asserting nine affirmative defenses. (Doc. No. 13) Two of these affirmative defenses are significant for purposes of AOL's motion: (1) as its second affirmative defense, NHCD asserts, "Any loss, injury, or damage incurred by AOL was proximately caused by the acts of third parties who[m] NHCD neither controlled nor had the right to control, and was not proximately caused by any acts, omissions, or other conduct of NHCD"; and (2) as its ninth affirmative defense, NHCD asserts that "should AOL prove any of the allegations in the Complaint, the mailing of any bulk electronic mail advertisement was performed by an independent contractor(s) whose actions NHCD is not liable for." (Doc. No. 13, ¶¶ 9 and 16) Along with its Answer, NHCD filed a counterclaim, alleging three counts: (1) libel per se; (2) interference with prospective contractual relations; and (3) interference with contractual relations. (Doc. No. 13, ¶¶ 17-45) On March 22, 1999, AOL filed its Answer to the allegations in the counterclaim, generally denying liability and asserting numerous affirmative defenses. (Doc. No. 15) On April 16, 1999, the parties consented to jurisdiction over this case by a United States Magistrate Judge (Doc. No. 17), and on April 19, 1999, the Honorable Donald E. O'Brien signed an order transferring the case to Magistrate Judge Paul A. Zoss (Docket No. 19). On January 10, 1999, AOL filed its summary judgment motion (Doc. No. 27), supported by a memorandum brief (Doc. No. 38). AOL's motion seeks a determination that NHCD is liable on the following counts: Count I (the CFAA claim) (Doc. No. 38, at 12-14); Count III (only as to the Virginia Computer Crimes Act) (Doc. No. 38, at 14-16); Count V (only as to trespass to chattels) (Doc. No. 38, at 6-12); Count VI (civil conspiracy) (Doc. No. 38, at 20); and Count VII (unjust enrichment) (Doc. No. 38, at 16-20).(1) On March 31, 1999, NHCD filed a resistance to the motion. (Doc. No. 58) On April 13, 2000, NHCD filed a cross-motion for summary judgment, asking that the Complaint be dismissed with prejudice. (Doc. No 69) AOL resisted NHCD's motion on April 17, 2000. (Doc. No. 72) After the parties filed numerous briefs and other supporting documents concerning the motions and the resistances, the court heard oral arguments on April 17, 2000. At the conclusion of the hearing, the court denied NHCD's cross-motion for summary judgment (see Doc. No. 74, issued Apr. 18, 2000). The court also found the actions of Forrest Dayton (discussed infra, Section II) constituted trespass to chattels. Indeed, NHCD conceded for purposes of AOL's motion for summary judgment that AOL has established a prima facie case of trespass to chattels by Dayton. The question still remains, however, as to whether NHCD is liable for Dayton's actions. The court now will address that issue and the other issues raised by AOL's motion for partial summary judgment. II. STATEMENT OF FACTS AOL is a Delaware corporation, with its principal place of business in Virginia. AOL provides a variety of services to its customers, or "members," as they are called by AOL. These services include the transmission of electronic mail ("e-mail") to and from other members and across the Internet. NHCD is an Iowa corporation with administrative offices in Sioux City, Iowa, and sales offices in Atlanta, Kansas City, Phoenix, Dallas, and Denver. NHCD is engaged in the business of selling discount optical and dental service plans. NHCD membership entitles members to discounts from participating dentists and optical care providers. This lawsuit concerns advertising via the Internet. There are various methods of advertising products on the Internet,(2) but this dispute concerns the sending of large-volume, unsolicited, commercial e-mail messages to Internet users. These messages, called "unsolicited bulk e-mail" or "UBE," are often referred to pejoratively as "junk e-mail" or "spam." It is undisputed that at times relevant to this lawsuit, a large volume of e-mail messages was sent through AOL's computer system to generate leads for NHCD's products. AOL has put in place various "filtering programs" in an attempt to block UBE. By using these programs, AOL attempts to identify UBE coming into AOL's computer systems so that it can be rejected. These filtering programs have had only limited success, however, because bulk e-mailers have developed counter-programs to thwart the filtering programs. In a declaration filed in support of AOL's motion (Doc. No. 30), AOL's Chief Mail Systems Architect, Jay Levitt, explained how AOL's efforts to limit UBE have been thwarted. AOL's filtering programs look for large numbers of emails coming from the same source. This usually can be determined from the message because the sender of an e-mail message ordinarily is identified in a "header" which is generated automatically by most e-mail software programs. To circumvent these filters, bulk e-mailers have developed software to allow the manipulation of headers to display false or misleading information concerning a message's author. For example, one program substitutes a random arrangement of numbers and letters for the sender's name each time a message is transmitted. As a result, each message appears to originate from a different sender when, in fact, the messages are all coming from the same source. Other programs cause text to appear at the end of the body of the e-mail message that is designed to look like a header, but which contains false information having no relationship to the actual source or transmission path of the message. These messages contain a number of "hard returns" at the end of the message to push the automatically-generated header down the screen where the reader is unlikely to see it. Sometimes these messages also contain "font color codes" that change the text of the automatically-generated header to the same color as the background so the header becomes unreadable. (See id., ¶6) AOL has adopted policies applicable to its members in an effort to prevent them from sending UBE over AOL's computer system or from facilitating the sending of UBE over AOL's computer system by others. As bulk e-mail has become increasingly problematic, AOL's policies have been revised and strengthened to make it clear that members are not authorized to use AOL for bulk e-mail purposes. The "Conditions of AOL Membership," displayed on every new member's computer screen at the time of enrollment, include the following: Your use of the America Online (AOL) service is conditioned upon your acceptance of AOL's Terms of Service (TOS) and Rules of the Road (ROR). We strongly encourage you to review the TOS and the ROR now by clicking the Read Now button below. (Both documents are always available online, free of hourly usage charges, and can be accessed directly on AOL directly by using Keyword: TOS.) As AOL may modify its TOS and ROR from time to time, you agree to check the TOS online area regularly for updates. All TOS and ROR modifications will be effective thirty days after the notice of change is posted in the TOS online area. (Doc. No. 32, Declaration of Charles D. Curran, AOL's Senior Counsel, in support of AOL's summary judgment motion, at Exhibit 4.) AOL's Rules of the Road ("ROR") effective on June 15, 1996, provided members were not allowed to "post or use AOL to . . . post or transmit unsolicited advertising, promotional materials, or other forms of solicitation to other Members, individuals or entities, except in those areas (e.g., the classified areas) that are designated for such a purpose," nor could members use AOL to collect or "harvest" screen names of other Members without the Member's express permission. (Doc. No. 32, ¶ 6 & Ex. 6, ¶ 2(C)(a)(8) & (a)(viii)) AOL's Terms of Service ("TOS") effective May 1, 1997, provided members could not "use, or allow others to use, [an] AOL account, either directly or indirectly, to . . . post or transmit, or cause to be posted or transmitted, any unsolicited advertising, promotional materials, or other forms of solicitation to other Members, individuals or entities, except in those areas that are expressly designated for such a purpose (e.g., the classified areas), or collect or harvest screen names of other Members, without permission[,]" and stated AOL "reserve[d] the right to protect its Members and AOL from offensive e-mail communication, including, but not limited to, the right to block mass e-mail solicitations or 'junk e-mail.'" (Doc. No. 32, Ex. 7, TOS, ¶ 4(C)(7)) The ROR for the same date provided as follows: Advertising, Solicitation and Name Harvesting. Unless you obtain express permission from the Member in advance, you may not use AOL to send unsolicited advertising, promotional material or other forms of solicitation to another Member except in areas designated for such a purpose (e.g., the classified area). You may not use AOL to collect or "harvest" screen names of Members without the express prior permission of the Member. AOL, Inc. reserves the right to block or filter mass e-mail solicitations on or through AOL. (Doc. No. 32, ¶ 8 & Ex. 7, ROR, ¶ C(iii)(g)) In the fall of 1997, AOL published an "Unsolicited Bulk E-mail Policy," which provided that AOL: does not authorize the use of its proprietary computers and computer network (the ["]AOL Network") to accept, transmit or distribute unsolicited bulk e-mail sent from the Internet to AOL members. In addition, Internet e-mail sent, or caused to be sent, to or through the AOL Network that makes use of or contains invalid or forged headers, invalid or non-existent domain names or other means of deceptive addressing will be deemed to be counterfeit. Any attempt to send or cause such counterfeit e-mail to be sent to or through the AOL Network is unauthorized. Similarly, e-mail that is relayed from any third party's mail servers without the permission of that third party or which employs similar techniques to hide or obscure the source of the e-mail, is also an unauthorized use of the AOL Network. AOL does not authorize anyone to send e-mail or cause e-mail to be sent to the AOL Network that violates AOL's Terms of Service. AOL does not authorize the harvesting or collection of screen names from the AOL service for the purpose of sending unsolicited e-mail. AOL reserves the right to take all legal and technical steps available to prevent unsolicited bulk e-mail or other unauthorized email from entering, utilizing or remaining within the AOL Network. Nothing in this policy is intended to grant any right to transmit or send e-mail to, or through, the AOL Network. AOL's failure to enforce this policy in every instance in which it might have application does not amount to a waiver of AOL's rights. (Doc. No. 32, ¶ 9 & Ex. 9) AOL's TOS effective July 15, 1998, provided: Unsolicited Bulk E-mail. Your AOL membership allows you to send and receive e-mail to and from other AOL members and users of the Internet. This does not mean that you may use AOL to send unsolicited bulk e-mail or junk e-mail. Information about unsolicited bulk e-mail can be found at Keyword: Junk Mail. Your AOL membership and your authorization to use the AOL e-mail service do not allow you to send unsolicited bulk e-mail or to cause unsolicited bulk e-mail to be sent by someone else. You may not use the Member Directory or any other area of AOL to harvest or collect information, including screen names, about AOL members, and the use of such information for the purpose of sending unsolicited bulk e-mail is strictly prohibited. . . . AOL also reserves the right to take any and all legal and technical remedies to prevent unsolicited bulk e-mail from entering, utilizing or remaining within the AOL network. (Doc. No. 32, ¶ 9 & Ex. 8; emphasis in original) AOL's "Community Guidelines" (the successor to the "Rules of the Road") effective July 15, 1998, declare: "Unsolicited bulk e-mail is strictly prohibited." The Guidelines also provide, "You may not use the Member Directory or any other area of AOL to harvest or collect information, including screen names, about AOL members, and the use of such information for the purpose of sending unsolicited bulk e-mail is strictly prohibited. This includes the collection of names on a Member Web page." (Id.) AOL maintains a searchable database on its computer system called "TOSSpam." AOL asks its members to forward UBE to TOSSpam so AOL can identify and attempt to stop the messages. According to Ivan Histand, a software engineer with AOL, during the period relevant to this litigation over 100,000 pieces of bulk e-mail were forwarded each day to TOSSpam by AOL members. (Doc. No. 34, Declaration of Ivan Histand, ¶ 3) According to Histand, this represented merely a fraction of the total number of unsolicited e-mails sent to AOL members because in order to complain about a particular piece of UBE, a member must be aware of the TOSSpam database, know how to forward messages to the database, and take some affirmative action to send the message to TOSSpam. (Id., ¶ 6) He estimates the actual number of UBEs received by AOL members is hundreds of times higher than the number of complaints forwarded to TOSSpam. (Id., ¶ 8) Utilizing studies from two other lawsuits, he estimates the appropriate ratio of complaints to actual UBEs sent is 1:500. (Id., ¶ 9) According to Histand, 152,805 complaints have been received by AOL members concerning NHCD's UBEs, a number he believes is "at least ninety-five percent accurate." (Id., ¶ 11) Multiplying 152,805 by 500, Histand estimates NHCD has sent or caused to be sent 76,402,500 pieces of UBE over AOL's network. (Id., ¶ 13) According to the declaration (Doc. No. 33) of A. Douglas Steinberg, AOL's Senior Director of E-Mail Operations, AOL's central computer systems are all physically located in Virginia. (Doc. No. 33, ¶3) One of the services AOL provides its members is access to the Internet, including the ability to transmit and receive e-mail to and from other AOL members and also other Internet users. (Id., ¶4) According to Steinberg, the "per recipient charge" for each e-mail is $.00078. This charge is born by AOL and is not passed on as a direct charge to its members. It reflects AOL's equipment costs only, and not its overhead. (Id., ¶12) Steinberg estimates that between five and thirty percent of AOL's daily Internet e-mail volume is UBE. (Id., ¶ 21) NHCD was founded in 1989, by Kenneth Opstein, its chief executive officer and sole shareholder. The company entered into agreements with dentists and optical care providers to offer discounted services and products to the general public, and then solicited the general public to pay a fee to NHCD for the right to receive these services at the discounted prices. NHCD made arrangements with a number of self-employed sales representatives to market these services to the general public from "leads" provided by NHCD. NHCD used a variety of advertising methods to generate these leads, including direct mail, newspaper, radio, television, and door-to-door sales. NHCD first became involved in generating leads with UBE when Hermann Wilms, a vice president and "participating manager" of NHCD, was contacted by one of its "lead generators," Michael Kiger, about providing NHCD with leads obtained from the Internet. Kiger advised Wilms that he was knowledgeable about e-mail and he could use Internet e-mail to generate leads for NHCD. Wilms found this idea exciting, and agreed, on behalf of NHCD, to pay Kiger $1.00 for each lead he generated from the Internet. After some initial problems,(3) Kiger, and then several other "e-mailers," began providing NHCD with leads generated from UBE. All of these bulk e-mailers worked without a written agreement, and under arrangements NHCD contends made them "independent contractors." The primary "contract e-mailer" used by NHCD was Forrest Dayton from Marietta, Georgia. Contract e-mailers were directed to use a "script" provided by NHCD, which stated the following: Hello, we work with a group of your local doctors and dentists and are offering a Dental - Optical Plan that runs approximately $2 a week for an individual and $3 a week for the entire family with no limit to the number of children. Would you like our office to furnish you with the details? Our doctors are grouped by area code and zip code, therefore please list your name, address, area code and phone number. Thank you. Using this script, Dayton performed an initial "test" mailing in late August and early September 1997. The test consisted of one million pieces of UBE. (Doc. No. 35, Declaration of Forrest Dayton in Support of AOL's Motion for Summary Judgment, ¶5) On August 29, 1997, Wilms sent Dayton an e-mail with the following instructions concerning the test: If your results are not over 1%, I would attribute it to the subject. The term "insurance" is a turn off and probably a number of people will delete the message and not read it. We discovered that early on. The very best results we get is when we put into the subject box only the words . . . Dental Plan. We run approx 3,000 leads per week from our predictive-dialers and salaried personnel for these past 7 years and that script I sent you is word for word. The only change is in the SUBJECT BOX. If the results are poor, you may want to re-run to get a true indicator. As a postscript, Wilms stated, "The 'shelf life' on the leads is short, so if you could forward to my AOL account daily, I would appreciate it." On September 1, 1997, Wilms sent Dayton an e-mail that stated, "Dental Plan in subject box is good for ½%. From our experience all you need are those 2 words . . . nothing else." On September 14, 1997, Wilms sent Dayton an e-mail stating the following: Based on what the promo has produced, you can see that 1 million hits per week will yield approx 1,000 leads. This is what I will offer: I will pay you each week $1 per lead with 'phone number (at first we will have to cap it at 1,000 leads or $1,000 per week until the offices can absorb the leads) and the lead is not more than 1 week old. If you are interested in pursuing this, please email me. Wilms sent Dayton an e-mail dated September 16, 1997, asking for Dayton's home address so Wilms could "overnite [him] some payroll forms." Wilms said, "The payroll is cutoff Monday mornings and your check will be mailed from Sioux City, Ia. on Thursdays to your home. $1 for each lead I receive with 'phone number, not over a week old, capped at 1,000 leads for first few weeks 'till we grow into." In a deposition given in this case on June 16, 1999, Wilms described this paperwork as the "original independent contractor's form." (See Doc. No. 31, Ex. 4, Deposition of Hermann Wilms ("Wilms Depo."), at p. 135, lines 2-11) On October 6, 1997, Wilms sent Dayton an e-mail which stated the following: After talking with you last night, I think we can do some increasing, however, if you were to do too much at one time you run the risk of being shut down and then we also have too many leads to work at one time . . . so we have to find a balance. *** Later this week, I'll call. In the meanwhile, if you want to increase the dental leads to 1,500, that's fine. In his deposition, Wilms explained his reference to "being shut down" as follows: Well, he told me that - that or Kiger was shut down, and so I said to him - actually, what I was trying to do was to keep his production low. I didn't want high production. And the real reason for it is, let's say that he could produce X number. I would have to hire more salespeople, and I didn't want to. (Id., page 136, lines 11-17.) When asked again about "risk of shut down," Wilms answered, "Well, see, he always wants more money because he's going to be shut down all the time. He said I can't afford to do this for a dollar because I'm going to be shut down." (Id., page 140, lines 19-22) Later, Wilms explained that if he hired and trained people to follow up leads, "and the leads weren't there because [Dayton] shut down or went out of business or moved or whatever, it wasn't secure. That's why I refer to shutdown on there. I was just feeling the water." (See id., page 141, lines 14-21) On November 5, 1999, Wilms was deposed in AOL v. Dayton, et al., No. 98-1815-A (E.D. Va.). When asked about the email dated October 6, 1997, the following exchange occurred: Q. In the first paragraph, you tell - or you write that if you were to do too much at one time, you run the risk of being shut down; is that right? A. That's what he told me. Q. That's what Mr. Dayton told you? A. Yes. Q. And what did you understand him to mean when he told you that? A. He couldn't send out - his production was limited by - apparently by his equipment. Q. Okay. He told you that he didn't have the capability to send out A. Yes. Q. Okay. Can you explain to me what the term "shut down" in this means? A. He said he'd lose his server capabilities. Q. What did you understand that to mean? A. I really didn't know. Q. Okay. But Mr. Dayton told you that if he sent out too much at one time, he'd run the risk of being shut down? A. Yes. (Doc. No. 61, Ex. 5, page 58, line 9 through page 59, line 16) Wilms then was asked about an e-mail he sent to Dayton on October 13, 1997,(4) and the following exchange occurred: Q. When you said "two t-1s," what did you mean? A. We have some telephone equipment, he asked me if I had t-1s, and I said, yes, we have t-1s and he said, can I use them, and I asked him, why, and he said he could use them for mailing. Q. Okay. Did he tell you what he was currently using for mailing? A. No. Q. Okay. In the next sentence, when you ask, "Can you send out more with less risk of shutdown," what were you referring to? A. Well, he always wanted more money and he said he was going to be shut down if he couldn't get more money, so that's why it keeps recurring all the time. (Id., page 60, lines 8-24) In early 1998, Dayton hired other contract e-mailers to transmit commercial e-mail for him. In his deposition, he testified that in late 1998, he stopped transmitting or having subcontractors transmit e-mail on NHCD's behalf. (Doc. No. 61, Tab 3, page 570, line 22 through page 571, line 5) On April 15, 1998, Wilms asked Dayton to provide 2,000 leads per week, but Dayton was unable to comply. (Doc. No. 13, Tab 4, page 166, line 23 through page 167, line 1) On May 12, 1998, Wilms sent Dayton an e-mail requesting that Dayton provide 4,000 leads per week. (Id., page 169, line 20 through page 170, line 2) On May 28, 1998, the Attorney General of the State of Washington sent a letter to Hermann Wilms, stating, inter alia, the following: We have received a complaint regarding your firm's use of unsolicited email in the State of Washington. It appears you have sent multiple solicitations to citizens of this state using forged or false headers and hidden transmission routings. Please note that on June 11, 1998, a new law will go into effect which restricts the use of misleading return addresses and subject lines. (Doc. No. 31, Tab 32) After receiving this letter, Wilms advised his contract e-mailers to stop doing business in the State of Washington. In an e-mail to Wilms dated June 9, 1998, Dayton stated, "I got 500,000 out this morning with all tests came through. Will do 500k tonight." Wilms responded with an e-mail stating, "I'll be happy with 2,000 to 3,000 for now!" In a postscript to that e-mail, Wilms stated, "These 'against email' fanatics think this stuff is free!!" In his deposition, Wilms could not initially explain his reference to the "against email fanatics." (See Wilms Depo, page 181, lines 8-11). He then stated, "I think there was a man that has cameras inside of his house, his apartment. Instead of a female, it's a male, and he received some E-mail and wrote all kinds of stuff on one of the news groups about us." (Id., page 181, lines 15-20) On July 1, 1998, Charles D. Curran, an attorney for AOL, wrote a letter to NHCD stating the following: On behalf of America Online, Inc. ("AOL"), I am writing to demand that you, your companies, and any of your agents immediately cease and desist from your practice of transmitting, distributing and facilitating the distribution of unsolicited bulk e-mail ("UBE") to AOL and its members. . . . Your transmissions of UBE to AOL and its members have resulted in numerous complaints, and have been accompanied by a variety of fraudulent practices. . . . Please be advised that any future attempt by you, your companies or agents - or anyone working in concert with you or on your behalf - to access AOL's proprietary computers and computer networks, or to use AOL's domain ame and service marks, will constitute a violation of federal and state law, including the Computer Fraud And Abuse Act (18 U.S.C. Section 1030); the Lanham Act; the Virginia Computer Crimes Act (Va. Code Ann. Sections 59.196 et seq.); and Virginia common law. Failure to comply with this demand and to confirm such compliance via return letter within ten days, will result in AOL pursuing all available technical and legal remedies. (Doc. No. 32, Ex. 1) In his affidavit, Wilms said when he received this letter, he telephoned Dayton and was assured "there were no laws that were being broken as no laws in fact prohibited the sending of this type of solicitation." (Doc. No. 61, Tab 1, at ¶3) On July 16, 1998, Anne M. Breitkreutz, an attorney for NHCD, wrote to Curran and stated NHCD was an Iowa corporation with numerous offices throughout the United States in the business of selling "discounted service memberships for such services as dental, chiropractic, optical, etc." (Id., Ex. 3) She stated further: NHCD buys leads from independent contractors who generate these leads from direct mail, newspapers, radio, TV, telemarketing and the Internet. They buy the leads in bulk at so much per lead. NHCD cannot impose any restrictions or give directions on how these independent contractors procure these leads. However, NHCD does not authorize nor approve of the use by its independent contractors of the 'AOL.com' domain name or AOL's service or trademarks. In fact, NHCD will forward your letter of July 1, 1998 on to its independent e-mailers, particularly instructing them not to use said domain name or service mark when obtaining leads for NHCD. I believe this should address your concerns expressed in the letter dated July 1, 1998. (Id.) On August 13, 1998, Curran wrote a second letter to NHCD, stating in part: AOL does not authorize the use of the AOL Network to accept, transmit, relay, process or distribute UBE sent from the Internet to AOL members. In addition, AOL deems Internet e-mail sent, or caused to be sent, to or through the AOL Network that makes use of or contains invalid or forged headers, invalid or non-existent domain names or other means of deceptive addressing to be counterfeit. Any attempt to send or cause such counterfeit e-mail through the AOL Network is unauthorized. Similarly, e-mail that is relayed from any third party's mail servers without permission of that third party, or which employs similar techniques to hide or obscure the source of e-mail, is also an unauthorized use of the AOL Network. (Id., Ex. 2) In his letter, Curran also requested that NHCD identify the parties responsible for the UBE, and provide NHCD's policies concerning "spam." In his affidavit, Wilms said when he received the August 13, 1998, letter from AOL, he again called Forrest Dayton, and Dayton again assured him that no laws were being broken. (Id., ¶ 5) This lawsuitThis lawsuit was commenced on December 18, 1998. In a deposition given on November 2, 1999, in a separate lawsuit,(5) Forrest Dayton testified Wilms told him NHCD was being sued by AOL, but did not tell him why. (Doc. No. 61, Tab 3, page 571, lines 6-22) Dayton denied he had been advised by Wilms of any of AOL's warning letters. (Id., page 572, line 5 through page 573, line 10) Dayton testified he began sending bulk e-mail in 1996. In 1997, he started using e-mail address lists he created by stripping e-mail addresses from newsgroups. Later, he began stripping e-mail addresses from AOL "chat rooms." He estimated that he has harvested 5,000,000 AOL e-mail addresses. He used a number of different e-mail accounts to send commercial e-mails because recipients would complain to AOL about the receipt of bulk e-mail, and then his account would be terminated. While he was in the bulk e-mail business, between fifteen and thirty of his e-mail accounts were terminated because of complaints to Internet service providers. On March 18, 1999, Wilms sent Dayton an e-mail in which he stated the following: "In today's USA Today the big antispam device is Sendmail, is that a big deal?" During his deposition, Wilms was asked why he sent this e-mail to Dayton. He responded, "Because he must have been complaining about I'm not going to be in business much longer, something like that." (Doc. No. 31, Tab 4, page 165, lines 5-8) Wilms then stated he was unfamiliar with anti-spam devices. (Id, page 165, lines 22-24). In a declaration dated January 6, 2000, Dayton confirmed that from January 1997, until early 1999, he was engaged in the business of marketing goods and services by sending UBE and by developing software (including a program called "Stealth Mass Mailer") to harvest e-mail addresses and automatically send massive quantities of e-mail quickly. (Doc. No. 35, ¶1) The software could fill in the "To" and "From" fields with random or otherwise inaccurate information. (Id.) Dayton described this process as follows: At various times during my e-mailing for NHCD, AOL used filtering devices to attempt to stop UBE. To get around these filters, I input, either manually or with the assistance of software, nonexistent or otherwise inaccurate "From" information, as well as other inaccurate information. Most often, the "From" information consisted of an actual domain name (but not the name of my own internet service provider), such as "juno.com", and made up prefixes, often random letters and numbers, so the result would look something like "1a2b3c@juno.com." (Id.,¶12) According to Dayton, over the time period relevant to this lawsuit, a fair estimation of the ratio of pieces of e-mail sent to actual leads generated for NHCD was approximately 1000:1.(6) (Id., ¶8) Dayton said he could not determine the exact number of e-mails he sent on behalf of NHCD, but estimated the number to be in the hundreds of millions. (Id., ¶9) Dayton said he provided NHCD with more than 130,000 leads from late summer 1997, to early 1999. (Id., ¶7) NHCD confirmed that, from all of its contract e-mailers, it received 33,866 bulk e-mail leads in 1997; 323,686 in 1998; and 35,708 from January 1 to February 11, 1999. (Doc. No. 31, Tab 2, response to Interrog. No. 11) This is a total of 393,260 leads, for which NHCD paid a total of $612,577.75. Dayton estimated "as much as 75% of the UBE sent was to AOL e-mail addresses." (Doc. No. 35, ¶11) Using Dayton's ratio of 1000:1, in order to produce 393,260 leads, the contract e-mailers had to send out nearly 400 million UBEs, about 300 million of which (i.e., 75%) were sent to AOL members.(7) There is no evidence that Wilms ever instructed Dayton, or any of NHCD's other contract e-mailers, on the exact method of transmitting UBE. However, according to Dayton, "Wilms never told me not to generate leads by e-mail, or that NHCD would not condone me harvesting e-mail addresses or using inaccurate 'To' and 'From' information to facilitate their mailings. In fact, even after Wilms told me AOL had sued NHCD, I continued to send UBE for NHCD and get paid by NHCD for leads generated by UBE." (Doc. No. 35, ¶13) In an affidavit filed in resistance to the motion for summary judgment, Wilms acknowledged he had engaged Dayton "to transmit unsolicited commercial e-mail on behalf of NHCD." (Doc. No. 61, Tab 1, ¶2) NHCD maintains, however, that it had no knowledge of any improper activities by these contract e-mailers. In his affidavit, Kenneth Opstein states: With regard to solicitation of leads on the internet, NHCD has employed various independent contractors from time to time to generate leads via the internet. These independent contractors have never been employees or agents of NHCD in any way. NHCD has never told these independent contractors how to solicit the leads. Specifically with regard to Forrest Dayton, neither [Opstein] nor any company representatives had any knowledge of the methods employed by Mr. Dayton to generate leads for [NHCD]. [NHCD] simply paid Mr. Dayton $1.00 to $2.00 for every lead generated by him. All payments made to Dayton by NHCD were done by NHCD's Sioux City office in the form of checks. (Doc. No. 61, Tab 2, ¶5) Opstein further states, "NHCD paid bulk e-mailers for all leads generated by them, regardless of the number of e-mails sent. [NHCD] had no knowledge of the arrangements made between [NHCD's] e-mailers and internet service providers, such as AOL, for the e-mailers to transmit bulk e-mail on the ISP's systems." (Id., ¶6) According to Opstein, "NHCD never authorized e-mailers to employ false or misleading entries in the 'To' or 'From' lines in bulk e-mail." (Id., ¶7) These statements are confirmed, to some extent, by Dayton's statement that companies like NHCD, which paid him a certain amount for each lead, would simply order a certain number of leads, and he would do what was necessary to generate the leads. He did not provide his customers with an estimate of how many e-mail messages he would have to transmit to generate the number of leads ordered. (See Doc. No. 61, Tab 3, page 232, line 8 through page 234, line 15) III. LEGAL ANALYSIS The court first will address the choice of law questions applicable to this case. Next, the court will discuss the general standards applicable to summary judgment motions. The court then will analyze each of the six grounds asserted by AOL in support of its motion for partial summary judgment.(8) Finally, the court will determine whether AOL has shown, for summary judgment purposes, that NHCD should be held responsible for the acts of its contract e-mailers.(9) A. Choice of Law The court first must determine what law should be applied to the non-statutory claims in this case; i.e., the claims for conversion of or trespass to chattels (Count V); civil conspiracy to commit trespass to or conversion of chattels, and to violate the CFAA and certain Washington, Iowa and Virginia statutes (enumerated at page 2, supra) (Count VI); and unjust enrichment and imposition of a constructive trust (Count VII). AOL argues Virginia law applies "because Virginia is the location of AOL's computers which have been assaulted by NHCD's UBE." (Doc. No. 38, p. 3) NHCD disagrees with AOL's focus on the situs of the alleged injury. NHCD argues Iowa law applies under Iowa's "most significant relationship" test. (Doc. No. 59, pp. 2-3) A federal court exercising supplemental jurisdiction over state law claims in a federal question lawsuit must follow the choice-of-law rules of the forum state. MRO Comm., Inc. v. American Tel. & Tel. Co., 197 F.3d 1276, 1282 (9th Cir. 1999); BancOklahoma Mortgage Corp. v. Capital Title Co., 194 F.3d 1089, 1103 (10th Cir. 1999); Ideal Elec. Sec. Co. v. Int'l Fidelity Ins. Co., 129 F.3d 143, 148 (D.C. Cir. 1997); Glennon v. Dean Witter Reynolds, Inc., 83 F.3d 132, 136 (6th Cir. 1996); Paracor Fin., Inc. v. General Elec. Capital Corp., 96 F.3d 1151, 1164 (9th Cir. 1996); System Operations, Inc. v. Scientific Games Devel. Corp., 555 F.2d 1131, 1136-37 (3d Cir. 1977) (citing Klaxon v. Stentor Elec. Mfg. Co., 313 U.S. 487, 61 S. Ct. 1020, 85 L. Ed. 1477 (1941); Suchomajcz v. Hummel Chemical Co., 524 F.2d 19 (3d Cir. 1975); and UMW v. Gibbs, 383 U.S. 715, 726, 86 S. Ct. 1130, 16 L. Ed. 2d 218 (1966)); F.D.I.C. v. Deloitte & Touche, 834 F. Supp. 1129, 1135 n.3 (D. Ark. 1992) (citing Klaxon). See also Butler v. Local Union 823, Int'l Bhd. of Teamsters, Chauffeurs, Whsmen. & Helpers, 514 F.2d 442, 448 n.6 (8th Cir. 1975) ("[T]he question of which law governs as between two states is purely a state question[,]" citing Klaxon). Accordingly, the court looks to Iowa's choice-of-law rules to determine which state's law applies. As both AOL and NHCD agree,(10) Iowa follows the "most significant relationship" test expressed in section 145, Restatement (Second) Conflict of Laws ("Restatement"). See, e.g., Christie v. Rolscreen Co., 448 N.W.2d 447, 450 (Iowa 1989); Zeman v. Canton State Bank, 211 N.W.2d 346, 348-49 (Iowa 1973); Berghammer v. Smith, 185 N.W.2d 226, (Iowa 1971). See also Dethmers Mfg. Co. v. Automatic Equip. Mfg. Co., 23 F. Supp. 2d 974, 1002 (N.D. Iowa 1998) (recognizing the Iowa rule). The agreement ends there, however, as the parties differ on how the Restatement factors apply in the circumstances of this case. The Restatement's "General Principle" set forth in section 145 provides: (1) The rights and liabilities of the parties with respect to an issue in tort are determined by the local law of the state which, with respect to that issue, has the most significant relationship to the occurrence and the parties under the principles stated in § 6. (2) Contacts to be taken into account in applying the principles of § 6 to determine the law applicable to an issue include: (a) the place where the injury occurred, (b) the place where the conduct causing the injury occurred, (c) the domicil[e], residence, nationality, place of incorporation and place of business of the parties, and (d) the place where the relationship, if any, between the parties is centered. These contacts are to be evaluated according to their relative importance with respect to the particular issue. Restatement (Second) Conflict of Laws § 145 (1971).(11) Section 145 must be read together with section 6, to which it refers: (1) A court, subject to constitutional restrictions, will follow a statutory directive of its own state on choice of law. (2) When there is no such directive, the factors relevant to the choice of the applicable rule of law include (a) the needs of the interstate and international systems, (b) the relevant policies of the forum, (c) the relevant policies of other interested states and the relative interests of those states in the determination of the particular issue, (d) the protection of justified expectations, (e) the basic policies underlying the particular field of law, (f) certainty, predictability and uniformity of result, and (g) ease in the determination and application of the law to be applied. Restatement (Second) Conflict of Laws § 6 (1971). The parties only address the section 145 factors in their arguments concerning which state law applies here. As NHCD points out in its brief, none of those factors points conclusively to Virginia -- nor, however, do those factors point clearly to Iowa or to any other state. The section 145 factors provide little in the way of resolving the choice-of-law issue. The court therefore turns to the principles set forth in section 6. The principles in section 6(2) "underlie all rules of choice of law and are used in evaluating the significance of a relationship, with respect to the particular issue, to the potentially interested states, the occurrence and the parties." Restatement § 145, comment (b). Subsections 6(2)(d), (e) and (f) are less important in the field of torts than they are in other areas such as contracts, property, wills and trusts. Id. "Because of the relative insignificance of the above-mentioned factors in the tort area of choice of law, the remaining factors listed in § 6 assume greater importance . . .," particularly the relevant policies of "the state with the dominant interest in the determination of the particular issue[.]" Id. The court finds the factors in subsections (2)(b) and (c) to be controlling; i.e., the relevant policies and interests of Iowa and Virginia. As noted previously, NHCD is an Iowa corporation, doing business in Iowa. "[A] state has an obvious interest in regulating the conduct of persons within its territory. . . ." Restatement § 6, comment d. Iowa's interest in regulating the actions of corporations doing business in Iowa is embodied in the Iowa Business Corporation Act, Iowa Code chapter 490. A corporation has no rights, including the right to do business, other than the rights conferred by the state's lawmaking power, and the state retains the right to amend the conditions under which corporations may do or continue to do business, and enforce those conditions by revoking a corporation's privileges for noncompliance. See Iowa Code Ann. § 290.102; St. John v. Iowa Bus. Men's Bldg. & Loan Ass'n, 136 Iowa 448, 113 N.W. 863 (1907). The state, therefore, has a vested interest in determining the rights and liabilities of domestic corporations as to actions arising within the state. Here, however, the only actions by NHCD that appear to have arisen within Iowa are incorporation of the entity, maintenance of an office, and issuance of checks to pay the contract e-mailers. One could add to this list the receipt of NHCD's UBE by Iowa residents. Otherwise, all the actions giving rise to this lawsuit appear to have occurred elsewhere, in a number of states. AOL is incorporated in Delaware, and likely has members who received NHCD's UBE in all fifty states. Dayton's actions originated in Georgia. The record indicates NHCD contracted with other e-mailers from, inter alia, New York, California, Ohio, Florida, Missouri, Michigan, Tennessee, Kansas, Ohio and Maryland.(12) (See Doc. No. 31, tab 2, NHCD's supplemental discovery responses) NHCD's vice president Hermann Wilms, who, among other things, was responsible for contracting with Dayton, operated out of Overland Park, Kansas. (See, e.g., Doc. No. 31, tab 4, page 3, lines 4-8; tab 32, letter to Wilms from Washington Attorney General). In addition to "regulating the conduct of persons within its territory," a state also has "an obvious interest . . . in providing redress for injuries that occurred there." Restatement § 6, comment e. In the instant case, because there is no clearly demonstrable place where the alleged conduct occurred, "the place where the injury occurred is a contact that, as to most issues, plays an important role in the selection of the state of the applicable law." Id. (citation omitted). The only locale in which AOL's alleged injury is clearly demonstrable is Virginia. This is the site of AOL's hardware that it alleges was overburdened by NHCD's UBE. It also is the place where AOL allegedly sustained economic loss. Although no state has a clear relationship to the events giving rise to this action, Virginia's relationship appears to be the most significant. Accordingly, the court finds Virginia law shall control the non-statutory claims raised in this lawsuit. B. Standards for Summary Judgment Rule 56 of the Federal Rules of Civil Procedure governs motions for summary judgment and provides that either party to a lawsuit may move for summary judgment without the need for supporting affidavits. Fed. R. Civ. P. 56(a) & (b). Rule 56 further states that summary judgment shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law. Fed. R. Civ. P. 56(c). "A court considering a motion for summary judgment must view all the facts in the light most favorable to the nonmoving party, . . . and give [the nonmoving party] the benefit of all reasonable inferences that can be drawn from the facts." Lockhart v. Cedar Rapids Comm. Sch. Dist., 963 F. Supp. 805, 814 (N.D. Iowa 1997) (citing Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 587, 106 S. Ct. 1348, 1356, 89 L. Ed. 2d 538 (1986)). The party seeking summary judgment must "'inform[ ] the district court of the basis for [the] motion and identify[ ] those portions of the record which show lack of a genuine issue.'" Lockhart, 963 F. Supp. at 814 (quoting Hartnagel v. Norman, 953 F.2d 394, 395 (8th Cir. 1992)); Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S. Ct. 2548, 2552-53, 91 L. Ed. 2d 265 (1986). A genuine issue of material fact is one with a real basis in the record. Lockhart, 963 F. Supp. at 814 n.3 (citing Matsushita, 475 U.S. at 586-87, 106 S. Ct. at 1355-56). Once the moving party has met its initial burden under Rule 56 of showing there is no genuine issue of material fact, the nonmoving party, "by affidavits or as otherwise provided in [Rule 56],(13) must set forth specific facts showing that there is a genuine issue for trial." Rule 56(e); Lockhart, 963 F. Supp. at 814 (citing Matsushita, 475 U.S. at 586, 106 S. Ct. at 1356). Addressing the quantum of proof necessary to successfully oppose a motion for summary judgment, the United States Supreme Court has explained the nonmoving party must produce sufficient evidence to permit "'a reasonable jury [to] return a verdict for the nonmoving party.'" Lockhart, 963 F. Supp. at 815 (quoting Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S. Ct. 2505, 2510, 91 L. Ed. 2d 202 (1986)). Furthermore, the Court has held the trial court must dispose of claims unsupported by fact and determine whether a genuine issue exists for trial, rather than "weigh the evidence and determine the truth of the matter." Lockhart, 963 F. Supp. at 815 (citing Anderson, 477 U.S. at 249, 106 S. Ct. at 2510-11; Celotex, 477 U.S. at 323-24, 106 S. Ct. at 2552-53; Matsushita, 475 U.S. at 586-87, 106 S. Ct. at 1355-56). The Eighth Circuit recognizes "summary judgment is a drastic remedy and must be exercised with extreme care to prevent taking genuine issues of fact away from juries." Wabun-Inini v. Sessions, 900 F.2d 1234, 1238 (8th Cir. 1990) (citing Fed. R. Civ. P. 56(c)). The Eighth Circuit, however, also follows the principle that "summary judgment procedure is properly regarded not as a disfavored procedural shortcut, but rather as an integral part of the Federal Rules as a whole, which are designed 'to secure the just, speedy and inexpensive determination of every action.'" Id. (quoting Celotex, 477 U.S. at 327); Hartnagel v. Norman, 953 F.2d 394, 396 (8th Cir. 1992). Thus, the trial court must assess whether a nonmovant's response would be sufficient to carry the burden of proof at trial. Hartnagel, 953 F.2d at 396 (citing Celotex, 477 U.S. at 322). If the nonmoving party fails to make a sufficient showing of an essential element of a claim with respect to which it has the burden of proof, then the moving party is "entitled to judgment as a matter of law." Celotex, 477 U.S. at 323; Woodsmith, 904 F.2d at 1247. However, if the court can conclude that a reasonable jury could return a verdict for the nonmovant, then summary judgment should not be granted. Anderson, 477 U.S. at 248; Burk, 948 F.2d at 492; Woodsmith, 904 F.2d at 1247. The court now will apply these standards to AOL's motion for summary judgment. C. AOL's Claim Under the CFAA AOL argues the evidence in this case is sufficient to establish NHCD's liability to AOL under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq.(14) Specifically, AOL argues NHCD violated 18 U.S.C. §§ 1030(a)(5) and (a)(2)(C). The former subsection prohibits a person or entity from: • knowingly caus[ing] the transmission of a program, information, code, or command, and as a result of such conduct, intentionally caus[ing] damage without authorization, to a protected computer; • intentionally access[ing] a protected computer without authorization, and as a result of such conduct, recklessly caus[ing] damage; or • intentionally access[ing] a protected computer without authorization, and as a result of such conduct, caus[ing] damage[.] 18 U.S.C. § 1030(a)(5).(15) Section (a)(2)(C) prohibits a person or entity from: (2) intentionally access[ing] a computer without authorization or exceed[ing] authorized access, and thereby obtain[ing] *** (C) information from any protected computer if the conduct involved an interstate or foreign communication[.] 18 U.S.C. § 1030(a)(2)(C). Civil penalties are provided by subsection 1030(g), which provides, "Any person who suffers damage or loss by reason of a violation [of section 1030] may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief." 18 U.S.C. § 1030(g). The term "damage" is defined by the CFAA as "any impairment to the integrity or availability of data, a program, a system or information that . . . causes loss aggregating at least $5,000 in value during any 1-year period to one or more individuals; . . . ." 18 U.S.C. § 1030(e)(8)(A). The elements of a civil claim under section 1030(a)(5)(C) are as follows: (1) the person or entity must intentionally access a computer; (2) the computer must be a "protected computer;" (3) the access must be without authorization; and (4) the access must cause damage. There is no question that AOL's computers are "protected computers."(16) However, it remains for the court to determine whether NHCD's contract e-mailers intentionally accessed AOL's computers, whether any such access was "without authorization," and whether such access caused damage to AOL. The CFAA does not define "access," but the general definition of the word, as a transitive verb, is to "gain access to." th MERRIAM-WEBSTER'S COLLEGIATE DICTIONARY (hereinafter "Webster's") 6 (10 ed. 1994). As a noun, "access," in this context, means to exercise the "freedom or ability to . . . make use of" something. Id. The question here, therefore, is whether NHCD's e-mailers, by harvesting e-mail addresses of AOL members and then sending the members UBE messages, exercised the freedom or ability to make use of AOL's computers. The court finds they did. For purposes of the CFAA, when someone sends an e-mail message from his or her own computer, and the message then is transmitted through a number of other computers until it reaches its destination, the sender is making use of all of those computers, and is therefore "accessing" them. This is precisely what NHCD's e-mailers did with respect to AOL's computers. The next disputed element of AOL's claim under section 1030(a)(5)(C) is whether the access was "without authorization." Again, the CFAA again gives no direct guidance on the meaning of the phrase "without authorization."(17) In a case similar factually to the present one, the United States District Court for the Eastern District of Virginia found an e-mailer's actions constituted "unauthorized access" because they violated AOL's Terms of Service. See America Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444, 450-51 (E.D. Va. 1998); see also Hotmail Corp. v. Van$ Money Pie, Inc., 1998 W.L. 388389 (N.D. Cal. Apr. 16, 1998). No other reported opinion contains precisely this interpretation of the statute. Although AOL clearly advised its members they were not authorized to harvest member e-mail addresses from its system or to use its system to send UBE to its members (see Terms of Service, Rules of the Road, and Community Guidelines, summarized above at pages 6-9), it is not clear that a violation of AOL's membership agreements results in "unauthorized access." If AOL members are "insiders" rather than "outsiders" for purposes of section 1030(a)(5), then subparagraph (C) does not apply at all, and this inquiry ends for purposes of AOL's motion. (See, footnote 15, supra.) AOL members, such as Dayton, obviously have "authorization" to access the AOL network. Having done so, is a member's authorized access converted into unauthorized access when the member violates one of the terms and conditions of membership? Similarly, is the member converted from an "insider" to an "outsider" for purposes of the CFAA by violating AOL's policies? On the other hand, if AOL members are "outsiders," then why would AOL's membership policies apply to them at all? Furthermore, by imposing restrictions on its members, can AOL deny or restrict the rights of non-member Internet users with respect to sending any type or volume of e-mail to AOL members, including UBE? These unanswered questions represent mixed issues of fact and law, requiring further factual development before the court can rule. This record is not clear enough on these issues for the court to grant summary judgment. Even assuming arguendo that NHCD's e-mailers accessed AOL's system "without authorization," the question still remains whether such access caused AOL "damage" for purposes of the CFAA. "Damage" is defined by the CFAA as "any impairment to the integrity or availability of data, a program, a system or information that. . . . causes loss aggregating at least $5,000 in value during any 1-year period to one or more individuals; . . . ." 18 U.S.C. § 1030(e)(8)(A). There is no dispute AOL has suffered the $5,000 threshold amount of loss required for civil relief under the CFAA. Multiplying the most conservative estimate in this record of the number of NHCD UBEs sent over AOL's system (i.e., 76,402,500) by the direct cost to AOL of each e-mail (i.e., $.00078), AOL's damages would be $59,594. However, the court also must determine whether NHCD's UBEs impaired "the integrity or availability of data, a program, a system or information." Neither the CFAA nor any of the reported cases is instructive in this regard. "The starting point for interpreting a statute is the language of the statute itself." Consumer Prod. Safety Comm'n v. GTE Sylvania, Inc., 447 U.S. 102, 108, 100 S. Ct. 2051, 2056, 64 L. Ed. 2d 766 (1980). The court will begin by examining the "ordinary, contemporary, common meaning" of the terms contained in the statute, Pioneer Inv. Servs. Co. v. Brunswick Assocs. L.P., 507 U.S. 380, 388, 113 S. Ct. 1489, 1495, 123 L. Ed. 2d 74 (1993), defining those terms with regard to the context in which they are used in the statute. See Robinson v. Shell Oil Co., 519 U.S. 337, 340-41, 117 S. Ct. 843, 846-47, 136 L. Ed. 2d 808 (1997). Section 1030(e)(8)(A) provides, in relevant part: "the term 'damage' means any impairment to the integrity or availability of data, a program, a system, or information, that . . causes loss aggregating at least $5,000 in value during any 1-year period to one or more individuals[.]" Each of the underlined terms is defined below: Impairment: something that damages or makes worse by diminishing in some material respect. (See Webster's at 580) Integrity: Unimpaired, sound, complete, without corruption. (See Webster's at 608) Availability: The state of being present or ready for immediate use; accessible. (See Webster's at 79) Data: Information output that must be processed to be meaningful; information in numerical form that can be transmitted or processed digitally. (See Webster's at 293) Program: A sequence of coded instructions that can be inserted into a computer, causing it to perform a particular function. (See Webster's at 931) System: "[A] regularly interacting or interdependent group of items forming a unified whole . . . [such as] a group of devices or artificial objects . . . forming a network . . . ." (Webster's at 1197) Information: Knowledge obtained from investigation, study, or instruction; facts, data; "a signal or character (as in a communication system or computer) representing data." (Webster's at 599) From these definitions, it can be concluded that when a large volume of UBE causes slowdowns or diminishes the capacity of AOL to serve its customers, an "impairment" has occurred to the "availability" of AOL's "system."(18) AOL has submitted witnesses' written declarations establishing that UBE, generally, has created a substantial burden to AOL's computer system, and caused AOL to incur significant costs. AOL's problem, both for purposes of summary judgment and at trial, is showing specifically that NHCD's UBE, which by AOL's admission represents a mere fraction of the quantity of UBE regularly forced through AOL's system, caused the requisite "damage" contemplated by the statute. The fact that NHCD's UBE may have cost AOL over $50,000 does not, necessarily, mean NHCD's actions caused an "impairment to the integrity or availability of data, a program, a system, or information," which directly resulted in a $50,000 loss. The court finds a material issue of disputed fact exists in this regard, precluding summary judgment. A disturbing issue is whether subsection (a)(5)(c) is intended to address UBE at all. The original statute, enacted in 1984, was directed at protecting classified information in government computer systems, and protecting financial records and credit histories in financial institution computers. See S. Rep. No. 99-432, at § I (1986 W.L. 31918) (discussing the 1986 amendments to the statute). When the statute was amended in 1986, the Senate Judiciary Committee expressly rejected the approach of enacting a comprehensive, sweeping statute that would leave "no computer crime . . . potentially uncovered," opting instead "to limit Federal jurisdiction over computer crime to those cases in which there is a compelling Federal interest, i.e., where computers of the Federal Government or certain financial institutions are involved, or where the crime itself is interstate in nature." Id. The statute provided only criminal penalties until enactment of the Computer Abuse Amendments Act of 1994, which added the civil remedies subsection 1030(g). See S. Rep. No. 104-357, § IV(1)(E) (1996 W.L. 492169) ("1996 S. Rep."); H.R. Conf. Rep. No. 103-711, § 290001(d) (1994 W.L. 454841). At the same time, subsection 1030(a)(5) was amended "to further protect computers and computer systems covered by the statute from damage both by outsiders, who gain access to a computer without authorization, and by insiders, who intentionally damage a computer." In discussing the amendments to subsection (a)(5), the Senate Judiciary Committee noted: In sum, under the bill, insiders, who are authorized to access a computer, face criminal liability only if they intend to cause damage to the computer, not for recklessly or negligently causing damage. By contrast, outside hackers who break into a computer could be punished for any intentional, reckless, or other damage they cause by their trespass. 1996 S. Rep., § IV(1)(E). AOL does not claim NHCD's e-mailers were "outside hackers," or that NHCD "intend[ed] to cause damage to the computer." Rather, NHCD's e-mailers (or at least Dayton) were members of AOL, accessing AOL's system as a result of that membership. Realistically, no federal statute currently exists which would prohibit a non-AOL member from sending UBE to any number of AOL members' e-mail addresses, without ever accessing AOL directly. AOL's claims against NHCD seem to fall more properly under subsection 1030(a)(2)(C), which proscribes intentionally accessing a computer either without authorization or in excess of authorized access, and thereby obtaining "information from any protected computer if the conduct involved an interstate of foreign communication[.]" 18 U.S.C. § 1030(a)(2)(C). Legislative history indicates the "premise of [subsection (a)(2)] is privacy protection[.]" Id. Prior to the amendment, the statute only protected "information on the computer systems of financial institutions and consumer reporting agencies, because of their significance to our country's economy and the privacy of our citizens." 1996 S. Rep. at § IV(1)(B). The amendment extended the statute's reach to include information held on private computers, under appropriate circumstances. See id. The Committee noted intangible information, stored electronically, could be obtained for purposes of the statute not only by actual physical theft, but by "mere observation of the data," explaining the "crux of the offense under subsection 1030(a)(2)(C), however, is the abuse of a computer to obtain the information." Id. The statute's distinction for purposes of criminal penalties is instructive in discussing damages for civil purposes; i.e., individuals who obtain information with a value of $5,000 or less are subject to misdemeanor penalties, while "[t]he crime becomes a felony if the offense was committed for purposes of commercial advantage or private financial gain[.]" Id. There is no question the information obtained from AOL was for purposes of NHCD's private financial gain. Thus, it appears the elements of a claim under subsection (a)(2)(C) have been met, to-wit: (1) NHCD's e-mailers "intentionally accesse[d] a computer"; (2) they "exceed[ed] authorized access" by violating the Terms of Service; (3) as a result, they obtained information; (4) the information was obtained from a "protected computer"; and (5) their conduct involved an interstate or foreign communication. Nevertheless, even having reached this conclusion, we again arrive at the issue of damages. Even though NHCD's violation of subsection (a)(2)(C) appears to be much clearer than a violation of (a)(5)(C), AOL still must show NHCD's UBE caused the requisite damage for purposes of the statute. The court finds such a showing has not been made, and remains a disputed issue of material fact for trial. Therefore, AOL's motion for summary judgment on this claim is denied. D. AOL's Claim Under the Virginia Computer Crimes Act In Count III of its Complaint, AOL claims NHCD violated the Virginia Computer Crimes Act, Virginia Code Annotated § 18.2-152.1 et seq. ("VCCA"), specifically section 18.2-152.3, which provides: Any person who uses a computer or computer network without authority and with the intent to: .... (3) Convert the property of another shall be guilty of the crime of computer fraud. . . . Va. Code Ann. § 18.2-153.3 (1999). The VCCA provides a civil remedy in section 18.2-152.12, for the recovery of damages. The section provides its remedies are in addition to other available civil remedies, and prescribes damages applicable to AOL's claim, as follows: If the injury arises from the transmission of unsolicited bulk electronic mail, an injured electronic mail service provider may also [in addition to damages and costs of suit] recover attorneys' fees and costs, and may elect, in lieu of actual damages, to recover the greater of ten dollars for each and every unsolicited bulk electronic mail message transmitted in violation of this article, or $25,000 per day. Va. Code Ann. § 18.2-152.12(C) (1999). Application of the VCCA to the facts of this case is a simpler matter than application of the CFAA, largely because of the VCCA's specific definition of relevant terms. The Virginia statute seems to have been crafted for just the type of injury alleged by AOL in this case. The statute specifically defines "without authority" as follows: A person is "without authority" when (i) he has no right or permission of the owner to use a computer or he uses a computer in a manner exceeding such right or permission or (ii) he uses a computer, a computer network, or the computer services of an electronic mail service provider to transmit unsolicited bulk electronic mail in contravention of the authority granted by or in violation of the policies set by the electronic mail service provider. Va. Stat. Ann. § 18.2-152.2 (1999) (emphasis added). The court finds Dayton and other e-mailers violated the Virginia statute; however, they are not parties to this lawsuit. Whether NHCD is liable for Dayton's actions still remains to be determined, as discussed below. If NHCD is liable for its e-mailers' actions, then AOL is entitled to summary judgment on this claim, with damages to be determined at trial. E. AOL's Claim for Trespass to Chattels AOL has asserted a common-law claim for trespass to chattels (Count V). Because the court has found Virginia law applies to AOL's common-law claims, the court looks to the law of that state to see whether AOL has shown it is entitled to judgment as a matter of law on its common-law trespass to chattels claim. Neither the statutes nor the case law of Virginia appear to define precisely the tort of trespass to chattels with respect to personal property. Therefore, the court will look to other law that may be applied by analogy. The Virginia Supreme Court has noted that when someone illegally seizes another's personal property and converts it to his own use, the property's owner may bring an action for trespass (among other claims). See Vines v. Branch, 244 Va. 185, 190, 418 S.E.2d 890, 89394 (1992). With respect to real property, the Virginia Code makes it a crime for a person to enter land or buildings for the purpose of "interfer[ing] with the rights of the owner, user or the occupant thereof to use such property free from interference." Va. Code § 18.2-121. The Restatement (Second) of Torts indicates "[a] trespass to chattels occurs when one party intentionally uses or intermeddles with personal property in rightful possession of another without authorization." AOL v. IMS, 24 F. Supp. 2d 548, 550 (E.D. Va. 1998) (citing Restatement (Second) of Torts § 217(b), and applying the section in a similar UBE case). Based on these authorities, it seems reasonable to define a trespass to chattels, under Virginia law, as any unauthorized interference with or use of the personal property of another. It also seems reasonable to adopt the Virginia standard for conversion in determining who has standing to assert trespass to chattels; that is, "An action for conversion [or trespass to chattels] can be maintained only by the person having a property interest in and entitled to the immediate possession of the item alleged to have been wrongfully converted [or trespassed upon]." Economopoulos v. Kolaitis, 259 Va. 806, 528 S.E.2d 714, 719 (2000) (citing United Leasing Corp. v. Thrift Ins. Corp., 247 Va. 299, 305, 440 S.E.2d 902, 906 (1994)). See also Acorn Structures, Inc. v. Swantz, 846 F.2d 923, 926 n.1 (4th Cir. 1988) (quoting the Restatement (Second) of Torts § 228, as follows: "One who is authorized to make a particular use of a chattel, and uses it in a manner exceeding the authorization, is subject to liability for conversion to another whose right to control the use of the chattel is thereby seriously violated"). On the issue of damages, the Virginia courts have spoken, noting "[o]ne who commits a trespass to a chattel is liable to its rightful possessor for actual damages suffered by reason of loss of its use." Vines v. Branch, 244 Va. 185, 190, 418 S.E.2d 890, 894 (1992) (citing Zaslow v. Kroenert, 29 Cal. 2d 541, 551-52, 176 P.2d 1, 7 (1946)). As noted previously, the court found at the April 17, 2000, hearing that Dayton's actions constituted trespass to chattels, and NHCD conceded for purposes of AOL's motion for summary judgment that AOL has established a prima facie case of trespass to chattels by Dayton. This again returns the court to the question, discussed below, of whether NHCD is liable for Dayton's actions. If the answer is in the affirmative, then AOL is entitled to summary judgment on this claim as a matter of law, with damages to be determined at trial. F. AOL's Claims of Civil Conspiracy AOL argues NHCD was involved in a conspiracy with its contract e-mailers, among others, to violate the CFAA, VCCA, and commit trespass to chattels. (Doc. No. 1, Count VI; Doc. No. 38, § X) AOL correctly sets forth the elements of civil conspiracy as applied in the State of Virginia (Doc. No. 38, § X), to-wit: two or more persons engaged in concerted action either to accomplish a criminal or unlawful purpose, or to accomplish a lawful purpose by criminal or unlawful means, and resulting in damages. See Commercial Bus. Sys., Inc. v. Bellsouth Servs., Inc., 249 Va. 39, 453 S.E.2d 261 (1995). However, the court, once again, first must decide the issue of whether or not the contract e-mailers were acting as NHCD's agents. If they were, then a civil conspiracy is not legally possible because a principal and its agents are, for this purpose, not separate entities. See Perk v. Vector Resources Group, Ltd., 485 S.E.2d 140 (Va. 1997). If the e-mailers were independent contractors, then AOL must show NHCD knowingly engaged in concerted action with the e-mailer that were intended to accomplish a criminal or unlawful purpose. The court finds, on the record before it, that AOL has not met this burden. Accordingly, either way, summary judgment on the civil conspiracy claim is denied. G. AOL's Claim of Unjust Enrichment Count VII of AOL's Complaint states a claim for unjust enrichment, and seeks imposition of a constructive trust "on all monies received by [NHCD] as a result of its bulk e-mail activities." (Doc. No. 1, ¶ 86) "Unjust enrichment is a quasicontract claim based upon the equitable remedy available when a recipient of a benefit obtains it under conditions where the receipt amounts to unjust enrichment." Wright v. Cangiano, Chancery No. 15084, 1993 W.L. 946172, at *1 (Va. Cir. Ct. July 20, 1993) (citing Marine Dev. Corp. v. Rodak, 225 Va. 137, 142 (1983)). It is a common-law doctrine that provides restitution in the situation where "one person is accountable to another on the ground that otherwise he would unjustly benefit or the other would unjustly suffer loss." Restatement, Restitution, p. 1 (1937). The doctrine has been recognized historically in Virginia: An action for a contract implied in law is to remedy an unjust enrichment. The concept is found in Virginia law as early as Lawson v. Lawson, 57 Va. (16 Gratt.) 230, discussing the comparison of the concept of assumpsit[,] or an action to recover money of another had and received which the possessor had no right to retain[,] with contract implied in law. In more modern times (1919), the Virginia Supreme Court agreed that the action has been extended to "all cases in which the defendant is bound by ties of natural justice and equity to refund the money . . . from the relation of the parties the law will imply a debt, and give this action, founded on the equity of the plaintiff's case, as it were, upon a contract - 'quasi ex contractu' . . . and upon this debt found the requisite undertaking to pay." Rhinehart v. Pirkey, 126 Va. 346 (1919), citing with approval Clark on Contracts (1894 ed.) § 314, p. 757. May v. Rainsley Fin. Corp., 32 Va. Cir. 396, 1994 W.L. 1031067, at *1 (Va. Cir. Ct., Feb. 28, 1994). As the Virginia Supreme Court has explained: To avoid unjust enrichment, equity will effect a "contract implied in law," requiring one who accepts and receives the services of another to make reasonable compensation for those services. See Marine Dev. Corp. v. Rodak, 225 Va. 137, 142-44, 300 S.E.2d 763, 765-66 (1983); Ricks v. Sumler, 179 Va. 571, 577, 19 S.E.2d 889, 891 (1942); Hendrickson v. Meredith, 161 Va. 193, 200, 170 S.E. 602, 605 (1933). The liability to pay for the services is based on an implication of law that arises from the facts and circumstances presented, independent of agreement or presumed intention. Marine Dev. Corp., 225 Va. at 142, 300 S.E.2d at 766; Hendrickson, 161 Va. at 200-01, 170 S.E. at 605. The promise to pay is implied from the consideration received. Id.Po River Water & Sewer Co. v. Indian Acres Club of Thornburg, Inc., 255 Va. 108, 114, 495 S.E.2d 478, 482 (1998). To recover on its claim for unjust enrichment, AOL must show: (1) AOL conferred a benefit upon NHCD by rendering services or expending properties; (2) AOL had a reasonable expectation of being compensated; (3) The benefits were conferred at the express or implied request of NHCD; and (4) If NHCD is allowed to retain the benefits without compensating AOL, then NHCD would be unjustly enriched. See Primrose Devel. Corp. v. Benchmark Acquisition Fund L.P., No. 19161, 1998 W.L. 957312 (Va. Cir. Ct., Oct. 29, 1998). One remedy for unjust enrichment is imposition of a constructive trust. "A constructive trust is appropriately imposed to avoid unjust enrichment of a party." Cooper v. Cooper, 249 Va. 511, 517, 457 S.E.2d 88, 92 (1995) (citing Leonard v. Counts, 221 Va. 582, 589-90, 272 S.E.2d 190, 195-96 (1980)). Moreover, "Constructive trusts . . . occur not only where property has been acquired by fraud or improper means, but also where it has been fairly and properly acquired, but it is contrary to the principles of equity that it should be retained, at least for the acquirer's own benefit." Rash v. Hilb, Rogal & Hamilton Co., 251 Va. 281, 287, 467 S.E.2d 791, 795 (1996) (citations and emphasis omitted). "[T]he burden of establishing the grounds for the imposition of a constructive trust [is] by clear and convincing evidence." Hill v. Brooks, 253 Va. 168, 174, 482 S.E.2d 816, 820 (1997). Ruffin v. Ruffin, Nos. 1792-99-1, 1804-99-1, 2000 W.L. 198078, at *2 (Va. Ct. App., Feb. 2, 2000). In considering AOL's claim for unjust enrichment and imposition of a constructive trust, the court notes ab initio that this claim involves crafting a remedy for AOL's loss. Rather than being an operative rule itself, unjust enrichment is "a principle which underlies many particular rules." Calamari & Perillo, CONTRACTS § 15-2 (3d ed. 1987). On the record before the court, this appears to be a "situation[ ] in which one's sense of justice would urge that unjust enrichment has occurred, yet no relief is available." Id.AOL's motion for summary judgment on this claim must fail for two reasons. First, AOL has failed, for summary judgment purposes, to meet the considerable burden of showing by clear and convincing evidence that it is entitled to relief from NHCD. Second, AOL has other remedies at law for any wrong NHCD is proven to have perpetrated on AOL. "The 'unjust' in 'unjust enrichment' refers to the lack of the plaintiff having a remedy at law for any wrong perpetrated on him by the defendant." Wright, supra, at *1. AOL's motion for summary judgment on the basis of unjust enrichment is denied. H. NHCD's Liability for Acts of Its Contract E-Mailers The court has found AOL is entitled to summary judgment on its claims for trespass to chattels and violation of the VCCA - if NHCD is responsible, in law or in equity, for the acts of its contract e-mailers. This requires a determination of whether the contract e-mailers who sent UBE through AOL's system were acting as NHCD's agents. Under Virginia law, [a]gency is defined as a fiduciary relationship arising from "the manifestation of consent by one person to another that the other shall act on his behalf and subject to his control, and the agreement by the other so to act." Allen v. Lindstrom, 237 Va. 489, 496, 379 S.E.2d 450, 454 (1989) (quoting Raney v. Barnes Lumber Corp., 195 Va. 956, 966, 81 S.E.2d 578, 584 (1954)); accord State Farm Mut. Auto. Ins. Co. v. Weisman, 247 Va. 199, 203, 441 S.E.2d 16, 19 (1994); Reistroffer v. Person, 247 Va. 45, 48, 439 S.E.2d 376, 378 (1994). The party who alleges an agency relationship has the burden of proving it. Weisman, 247 Va. at 203, 441 S.E.2d at 19; Allen, 237 Va. at 496, 379 S.E.2d at 454. Hartzell Fan, Inc. v. Waco, Inc., 256 Va. 294, 300, 505 S.E.2d 196, 200 (1998). The thorny problem for AOL in this case is proving the contract e-mailers were acting 'subject to NHCD's control.' Further, [a]n agency relationship is never presumed; to the contrary, the law presumes that a person is acting for himself and not as another's agent. Moreover, the party alleging an agency relationship bears the burden of proving it. Further, whether an agency relationship exists is a question to be resolved by the fact finder unless the existence of the relationship is shown by undisputed facts or by unambiguous written documents. [Citations omitted.] State Farm Mutual Auto. Ins. Co. v. Weisman, 247 Va. 199, 203, 441 S.E.2d 16, 19 (1994). While the evidence in this case strongly suggests the e-mailers were NHCD's agents, this is not a question that can be resolved on summary judgment. The question of whether the e-mailers were acting as NHCD's agents is one of fact - and, in this case, a material, disputed question of fact. The court finds AOL has failed, albeit only slightly, to show the emailers were acting as NHCD's agents. As a result, this issue remains for trial, and AOL's motion for summary judgment is denied. IV. CONCLUSION Based upon the foregoing analysis, the court finds the plaintiff's motion for summary judgment should be denied. The court has not addressed in this opinion the additional constitutional claims raised by NHCD in its proposed Amended Answer and Counterclaim. NHCD's Motion (Doc. No. 70) to amend its Answer and Counterclaim is granted. The constitutional claims raised in the amended pleading will be addressed at trial. IT IS SO ORDERED. th DATED this 29 day of September, 2000. ________________________________________________________________________ 1. AOL also includes in its brief (Doc. No. 38) a section entitled "Defendant has Committed Fraud" (Section VIII), in which AOL argues NHCD committed common-law fraud, entitling AOL to summary judgment "on Count VII of AOL's Complaint." As noted above in the enumeration of AOL's claims, Count VII of the Complaint states a claim for unjust enrichment and imposition of a constructive trust. AOL's Complaint does not include a claim for fraud. Accordingly, to the extent it is based on a fraud claim, AOL's motion for summary judgment is denied, and the court will not address the fraud arguments contained in AOL's brief. 2. Another method of advertisement involves the placement of "banner" advertisements on Internet sites, usually for a fee. A banner advertisement consists of a short phrase appearing on an Internet user's computer screen that encourages the reader to "click" on the banner, which either results in the reader being provided with more information about the product or takes the reader to another Internet site sponsored by the advertiser. AOL sells banner advertisements to advertisers. 3. For example, many of the leads provided initially were from other countries, where NHCD did not do business. 4. This e-mail contains, inter alia, the following: I am serious about getting more involved in these mailings, however, I have a problem getting them processed by noon on Mondays for the payroll. It would be an immense help if you could send them 2 me midweek & Sat. That way if there is a glitch, as today I can make the payroll. I have 2 t-1's which can be modified for internet . . . if you were to use them for mailings for me would there be any advantage over what you are now doing. Can you send out more with less risk of shutdown? Pls let me know. (Doc. 31, Tab 16) 5. AOL v. Forrest Dayton, et al., No. CA98-1815-A (E.D. Va.). In the lawsuit, a judgment was entered in which Dayton was enjoined from transmitting unsolicited bulk e-mail communication over AOL's computer networks, from harvesting AOL member e-mail addresses, and from engaging in any activity that would constitute the unauthorized use of AOL computers. He stipulated that he was responsible for the acts of his "independent contractors," and he was liable to AOL for $1,200,000.00. 6. This low response ratio reflects the fact that most recipients of UBE do not respond. 7. This estimate is much larger than Histand's estimate of 76,402,500 UBEs sent over AOL's system, which was an extrapolation from the number of complaints received. See page 9, supra. 8. For purposes of this analysis only, the court will assume NHCD is responsible for the conduct of its contract e-mailers. 9. On this record, there is no evidence NHCD sent out any bulk e-mail other than through contract e-mailers. 10. See AOL's brief, Doc. No. 38, at 3-4; NHCD's brief, Doc. No. 59, at 2-5. 11. Note subsection (1) states this section applies to "an issue in tort"; thus, the section 145 analysis will apply only to AOL's claims in Count V (trespass to chattels) and that portion of Count VI (civil conspiracy) relating to trespass to chattels. Counts I and III are statutory causes of action governed by the statutes themselves. Count VII, unjust enrichment, is a quasi-contractual claim that requires analysis under section 6 of the Restatement, discussed infra in this Section. 12. However, there is nothing in this record to indicate which, if any, of the contract e-mailers besides Dayton actually utilized AOL to send UBE for the purpose of soliciting leads on NHCD's behalf. 13. I.e., by "affidavits . . . supplemented or opposed by depositions, answers to interrogatories, or further affidavits." Fed. R. Civ. P. 56(e). 14. As stated in footnote 7, supra, for purposes of this analysis, the court will assume NHCD is responsible for the conduct of its contract e-mailers. argument in support of its claims under subparagraphs (A) and (B). As discussed infra in this opinion, the CFAA initially contained only criminal penalties. Subparagraph (A), which applies to an "insider" who intentionally causes damages to a protected computer, and subparagraph (B), which applies to an "outsider" who accesses a protected computer and recklessly causes damage, both carry five-year prison sentences for a The court noted, in dicta, "Lawmakers around the country have determined that when a computer's data is there is damage; when a computer's services are interrupted, there is damage; and when a computer's software or network is altered, there is damage." Id. at *3. 15. The court will limit its consideration of AOL's claim to subsection (a)(5)(C), because AOL has advanced no first offense. Subparagraph (C), which applies to an "outsider" who accesses a protected computer and causes damage apparently without regard to intent; i.e., intentionally, recklessly, or inadvertently), carries a one-year sentence for a first offense. 18 U.S.C. § 1030(c)(2)(A) and (B). Civil remedies were added to the statute by the 1994 amendments. For purposes of a civil claim against an "outsider," there is no reason for AOL to assume the higher burden required by subparagraph (B), instead of the lower burden required by subparagraph (C). However, to the extent NHCD's e-mailers may have been "insiders," as "members" of AOL, AOL has not sought summary judgment under subsection (A). 16. A "protected computer" is defined in 18 U.S.C. § 1030(e)(2)(B) as any computer "which is used in interstate or foreign commerce or communication." 17. The statute does define the phrase "exceeds authorized access" as "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." 18 U.S.C. § 1030(e)(6). In a case with analogous facts to the present one, the court found AOL member addresses obtained by a bulk e-mailer were proprietary "information" for purposes of the statute. See AOL v. LCGM, Inc., 46 F. Supp. 2d 444, 450-51 (E.D. Va. 1998). 18. See American Guarantee & Liability Ins. Co. v. Ingram Micro, Inc., ___ F.3d ___, 2000 W.L. 726789 (D. Ariz. Apr. 18, 2000), where the court found the term "physical damage" was "not restricted to the physical destruction or harm of computer circuitry but includes loss of access, loss of use, and loss of functionality." Id. at *2. unavailable,