Title
by
Editor
 

Thrifty-Tel, Inc. v. Bezenek

54 Cal. Rptr. 2d 468 (Cal. Ct. App. 1996)

   
  Up Chapter 06 Title Page Title Page Email Listserve Email Listserve
     
 

[NOTE: This case has been edited for classroom use by the omission of text, citations, and footnotes. See this alternate source for a fuller version of the opinion.]


Crosby, Acting P.J.


I

A telephone long distance carrier prevailed on fraud and conversion theories against Myron and Susan Bezenek -- whose teenage sons employed computer technology in their efforts to crack plaintiff's access and authorization codes and make long distance phone calls without paying for them -- garnering a judgment, including attorney fees, just shy of $ 50,000. Defendants challenge the court's determination that causes of action for fraud and conversion lie on these facts and complain of plaintiff's failure to mitigate and prove damages.

Thrifty-Tel, Inc. provides long-distance telephone services. Subscribers' telephones are programmed with a confidential access code and a six-digit authorization code that directs calls into Thrifty-Tel's computerized switching network. An unauthorized user who knows both an access and an authorization code can make long-distance calls without being charged for them.

A friend of the Bezeneks' children knew a confidential Thrifty-Tel access code. During a three-day period in November 1991, Ryan, Gerry and some friends, using the Bezeneks' home computer and modem, gained entry into Thrifty-Tel's system with the code and conducted manual random searches for a six-digit authorization code. They made approximately 90 calls, consuming roughly 24 minutes of telephone time during the first two days. On the following day, Ryan and Gerry continued the search alone, making 72 manual attempts to identify an authorization code over an almost 16-minute period.

Through its internal security system, Thrifty-Tel learned of the computer hacking almost immediately. And by late November, the carrier identified the Bezeneks' home as the source. Although Thrifty-Tel had the Bezeneks' address and telephone numbers, it failed to contact them concerning the matter.

After a three-month hiatus, the Bezenek children resumed manual searches for an authorization code. After several days and apparently some frustration with the slow pace, Ryan acquired computer software to expedite the quest. On February 18, 1992, he used the program to access Thrifty-Tel's system and conducted rapid-fire random number searches. He ran the program between six and seven hours, generating over 1,300 calls. Because Thrifty-Tel is a small carrier with relatively few telephone lines, Ryan's automated calling overburdened the system, denying some subscribers access to phones lines.

Still, Thrifty-Tel did not contact or complain to the Bezeneks. Instead, it filed this action on April 1, 1992, seeking damages for conversion, fraud, and reasonable value of services. The April Fool's Day lawsuit provided the Bezeneks' first notice of their sons' computer hijinks. In a trial to the court, defendants unsuccessfully sought judgment on the conversion and fraud causes of action, arguing those remedies were not available on these facts.

Thrifty-Tel offered no explanation for its failure to complain to the Bezeneks after the November 1991 hacking episode. It presented no evidence of any actual losses, either. Rather, plaintiff simply relied on the "unauthorized usage" tariff in its PUC-approved rate schedule to establish damages. That tariff, in effect, liquidates Thrifty-Tel's damages for computer hacking by imposing a $ 2,880 per day surcharge, a $ 3,000 "set up fee," and a $ 200 per hour labor fee. It also provides for attorney fees and costs incurred to collect the tariff. Based upon this tariff, the trial court awarded plaintiff $ 33,720 in damages and nearly $ 14,000 in attorney fees and costs.


II

Defendants first contend the unauthorized use of confidential codes to gain computer access does not give rise to a cause of action for conversion. They rely on the historical underpinnings of the tort, which provided a remedy for the loss of intangible property interest, but only if those interests are reflected in something tangible that can be physically taken. For example, the value of a stock certificate is not the cost of the paper, but the intangible interest it represents. When the certificate is stolen or placed in another's name without the owner's permission, the value of the loss is not the cost of the paper -- a tangible -- but the worth of the stock -- an intangible. (Payne v. Elliot (1880) 54 Cal. 339.) Similarly, an individual who misappropriates a floppy disk which contains trade secrets, protected formulas, or customer lists can be liable for conversion. And the damages are the value of the information on the disk, not the de minimis price of the disk.

Courts have traditionally refused to recognize as conversion the unauthorized taking of intangible interests that are not merged with, or reflected in, something tangible. And Dean Prosser has cautioned against scuttling conversion's tangibility requirement altogether, recommending instead the use of other remedies to protect intangible interests. (Prosser and Keeton on Torts (5th ed. 1984), § 15, p. 92.)

Whether the intangible computer access code, which was never reduced to paper or reflected on a computer disk, and the tie-up of Thrifty-Tel's system could be the subjects of conversion presents an issue of first impression in California -- and apparently most everywhere else as well. However, it is not necessary to resolve the question because the evidence supports the verdict on a trespass theory.

This very point was argued in the trial court, where defense counsel essentially conceded Ryan and Gerry trespassed, but maintained the mislabeling of the cause of action as one for conversion was fatal. Not so: "It has long been recognized that this court has the power to modify the conclusion of the court below, where the record supports it." (Fredericks v. Filbert Co. (1987) 189 Cal. App. 3d 272, 279, 234 Cal. Rptr. 395.) Thrifty-Tel pleaded and proved a claim for trespass to personal property, and the defendants are properly liable under that label.

Trespass to chattel, although seldom employed as a tort theory in California (indeed, there is nary a mention of the tort in Witkin's Summary of California Law), lies where an intentional interference with the possession of personal property has proximately caused injury.n6 Prosser notes trespass to chattel has evolved considerably from its original common law application -- concerning the asportation of another's tangible property -- to include even the unauthorized use of personal property: "Its chief importance now," according to Prosser, "is that there may be recovery . . . for interferences with the possession of chattels which are not sufficiently important to be classed as conversion, and so to compel the defendant to pay the full value of the thing with which he has interfered. Trespass to chattels survives today, in other words, largely as a little brother of conversion." (Prosser, supra, § 14, pp. 85-86; see also Zaslow v. Kroenert (1946) 29 Cal. 2d 541, 551, 176 P.2d 1 ["Where the conduct complained of does not amount to a substantial interference with possession or the right thereto, but consists of intermeddling with or use of . . . the personal property, the owner has a cause of action for trespass" to chattel, but not for conversion].)n8

. . . .

That portion of the judgment awarding damages is reversed. The cause is remanded to the superior court for a new trial to determine damages based on defendants' children's tortious conduct before February of 1992. In all other respects, the judgment is affirmed. Each side shall bear its own costs.


   

 

     

FOOTNOTES

6 At early common law, trespass required a physical touching of another's chattel or entry onto another's land. The modern rule recognizes an indirect touching or entry; e.g., dust particles from a cement plant that migrate onto another's real and personal property may give rise to trespass. (See Wilson v. Interlake Steel Co. (1982) 32 Cal. 3d 229, 232-233, 185 Cal. Rptr. 280, 649 P.2d 922; Roberts v. Permanente Corp. (1961) 188 Cal. App. 2d 526, 529, 10 Cal. Rptr. 519.) But the requirement of a tangible has been relaxed almost to the point of being discarded. Thus, some courts have held that microscopic particles (Bradley v. American Smelting and Refining Co. (Wash. 1985) 104 Wash. 2d 677, 709 P.2d 782, 788-789) or smoke (Ream v. Keen (Or. 1992) 314 Ore. 370, 838 P.2d 1073, 1075) may give rise to trespass. And the California Supreme Court has intimated migrating intangibles (e.g., sound waves) may result in a trespass, provided they do not simply impede an owner's use or enjoyment of property, but cause damage. (Wilson v. Interlake Steel Co., supra, 32 Cal. 3d at pp. 233-234.) In our view, the electronic signals generated by the Bezenek boys' activities were sufficiently tangible to support a trespass cause of action.

8 Likewise, the Restatement Second of Torts, section 217 includes in the definition of trespass to chattel the intentional use or "intermeddling" with a chattel in the possession of another. (Id. at § 217(b).)


     
Top Top of Page Up Chapter 06 Title Page Title Page
  Email Listserve Email Listserve
     
(C) 2001-03 Tom W. Bell. All rights reserved. Fully attributed noncommercial use of this document permitted if accompanied by this paragraph.
www.tomwbell.com/NetLaw/Ch06/Thrifty-Tel.html - v.2003.02.18