United States Court of Appeals
For the First Circuit
No. 11-2031
PATCO CONSTRUCTION COMPANY, INC.,
Plaintiff, Appellant,
v.
PEOPLE'S UNITED BANK, d/b/a Ocean Bank,
Defendant, Appellee.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MAINE
[Hon. D. Brock Hornby, U.S. District Judge]
Before
Lynch, Chief Judge,
Lipez and Howard, Circuit Judges.
Daniel J. Mitchell, with whom Eben M. Albert-Knopp and
Bernstein Shur were on brief, for appellant.
Brenda R. Sharton, with whom Don M. Kennedy, Katherine A.
Borden, and Goodwin Procter LLP were on brief, for appellee.
July 3, 2012
LYNCH, Chief Judge. Over seven days in May 2009, Ocean
Bank, a southern Maine community bank, authorized six apparently
fraudulent withdrawals, totaling $588,851.26, from an account held
by Patco Construction Company, after the perpetrators correctly
supplied Patco's customized answers to security questions.
Although the bank's security system flagged each of these
transactions as unusually "high-risk" because they were
inconsistent with the timing, value, and geographic location of
Patco's regular payment orders, the bank's security system did not
notify its commercial customers of this information and allowed the
payments to go through. Ocean Bank was able to block or recover
$243,406.83, leaving a residual loss to Patco of $345,444.43.
Patco brought suit, setting forth six counts against
People's United Bank, a regional bank which had acquired Ocean
Bank. The suit alleged, inter alia, that the bank should bear the
loss because its security system was not commercially reasonable
under Article 4A of the Uniform Commercial Code ("UCC"), as
codified under Maine Law at Me. Rev. Stat. Ann. tit. 11, § 4-1101
et seq., and that Patco had not consented to the procedures.
-2-
On cross-motions for summary judgment,1 the district
court held that the bank's security system was commercially
reasonable and on that basis entered judgment in favor of the bank
on the first count. Patco Constr. Co. v. People's United Bank, No.
09–cv–503, 2011 WL 3420588 (D. Me. Aug. 4, 2011). The district
court also granted summary judgment in favor of the bank on the
remaining counts, holding that they were either dependent on or
displaced by the analysis and law underlying the first count. Id.
We reverse the district court's grant of summary judgment
in favor of the bank and affirm its denial of Patco's motion for
summary judgment on the first count. In particular, we leave open
the question of what, if any, obligations or responsibilities
Article 4A imposes on Patco. We also reinstate certain other
claims dismissed by the district court, and remand for proceedings
consistent with this opinion.
I.
The facts, which are largely undisputed, are as follows.
Where the facts remain in dispute, we relate them in the light most
favorable to Patco, the non-moving party. See Valley Forge Ins.
Co. v. Field, 670 F.3d 93, 96-97 (1st Cir. 2012).
1
The parties dispute whether Maine or Connecticut law
governs this case. We need not decide this question here as both
states have enacted UCC Article 4A, and thus, under either state's
laws, the outcome is the same. Compare Me. Rev. Stat. Ann. tit.
11, § 4-1101 et seq. with Conn. Gen. Stat. Ann. § 42a-4A-101 et
seq. The parties do not identify any difference in the two
enactments that would affect our analysis.
-3-
A. The Parties
Patco is a small property development and contractor
business located in Sanford, Maine. Patco began banking with Ocean
Bank in 1985. Ocean Bank was acquired by the Chittenden family of
banks, which was later acquired by People's United Bank, a regional
bank based in Bridgeport, Connecticut. People's United Bank
operates other local Maine banks such as Maine Bank & Trust, where
Patco also had an account in May 2009. Ocean Bank was a division
of People's United at the time of the fraudulent withdrawals at
issue in this case.
In September 2003, Patco added internet banking -- also
known as "eBanking" -- to its commercial checking account at Ocean
Bank. Ocean Bank allows its eBanking commercial customers to make
electronic funds transfers through Ocean Bank via the Automated
Clearing House ("ACH") network, a system used by banks to transfer
funds electronically between accounts. Patco used eBanking
primarily to make regular weekly payroll payments. These regular
payroll payments had certain repeated characteristics: they were
always made on Fridays; they were always initiated from one of the
computers housed at Patco's offices in Sanford, Maine; they
originated from a single static Internet Protocol ("IP") address;2
2
"An IP address is the unique address assigned to every
machine on the internet. An IP address consists of four numbers
separated by dots, e.g., 166.132.78.215." United States v.
Kearney, 672 F.3d 81, 84 n.1 (1st Cir. 2012) (quoting United States
v. Vázquez–Rivera, 665 F.3d 351, 354 n.5 (1st Cir. 2011)).
-4-
and they were accompanied by weekly withdrawals for federal and
state tax withholding as well as 401(k) contributions. The highest
payroll payment Patco ever made using eBanking was $36,634.74.
Until October of 2008, Patco also used eBanking to transfer money
from the accounts of Patco and related entities at Maine Bank &
Trust, which maintains a branch in Sanford, Maine, into its Ocean
Bank checking account.
In September 2003, when it added eBanking services, Patco
entered into several agreements with Ocean Bank.3 Most
significantly, Patco entered into the eBanking for Business
Agreement. The eBanking agreement stated that "use of the Ocean
National Bank's eBanking for Business password constitutes
authentication of all transactions performed by you or on your
behalf." The eBanking agreement stated that Ocean Bank did not
"assume[] any responsibilities" with respect to Patco's use of
eBanking, that "electronic transmission of confidential business
3
These include the Investment and Line of Credit Sweep
Account (Managed Balance Agency Agreement), which authorized Ocean
Bank to transfer funds from Patco's account as needed to maintain
a target balance in Patco's separate investment account. Patco
also signed the Ocean Bank Automated Clearing House Agreement,
which provided that Patco was responsible for electronic transfers
"purport[ed] to have been transmitted or authorized" by Patco, even
if a transfer was not actually authorized by Patco, "provided Bank
acted in compliance with the security procedure referred to in
Schedule A." Patco asserts that the security procedures provided
in Schedule A do not, by their express terms, apply to eBanking
transactions such as those here.
-5-
and sensitive personal information" was at Patco's risk, and that
Ocean Bank was liable only for its gross negligence, limited to six
months of fees. The eBanking agreement also provided that:
[U]se of Ocean National Bank's eBanking for
Business by any one owner of a joint account
or by an authorized signor on an account,
shall be deemed an authorized transaction on
an account unless you provide us with written
notice that the use of Ocean National Bank's
eBanking for Business is terminated or that
the joint account owner or authorized signor
has been validly removed form [sic] the
account.
The agreement provided that Patco had to contact the bank
immediately upon discovery of an unauthorized transaction.
The bank also reserved the right to modify the terms and
conditions of the eBanking agreement at any time, effective upon
publication. The bank claims that at some point before May 2009,
it modified the eBanking agreement to state:
If you choose to receive ACH debit
transactions on your commercial accounts, you
assume all liability and responsibility to
monitor those commercial accounts on a daily
basis. In the event that you object to any
ACH debit, you agree to notify us of your
objection on the same day the debit occurs.
The bank claims that it published this modified eBanking agreement
on its website before May 2009. Patco disputes that this agreement
was modified and/or published on the bank's website before May
2009, and argues that the modified agreement was therefore not
effective as between the parties.
-6-
B. Ocean Bank's Security Measures
In 2004, Ocean Bank began using Jack Henry & Associates
to provide its core online banking platform, known as "NetTeller."
Jack Henry provides the NetTeller product to approximately 1,300 of
its 1,500 bank customers.
In October 2005, the agencies of the Federal Financial
Institutions Examination Council4 ("FFIEC"), responding to
increased online banking fraud, issued guidance titled
"Authentication in an Internet Banking Environment." See Fed. Fin.
Insts. Examination Council, Authentication in an Internet Banking
Environment (Aug. 8, 2001), available at http://www.ffiec.gov/pdf/
authentication_guidance.pdf [hereinafter "FFIEC Guidance"]. The
Guidance was intended to aid financial institutions in "evaluating
and implementing authentication systems and practices whether they
are provided internally or by a service provider." Id. at 1. The
Guidance provides that "financial institutions should periodically
. . . [a]djust, as appropriate, their information security program
in light of any relevant changes in technology, the sensitivity of
its customer information, and internal or external threats to
information." Id. at 2.
4
The FFIEC is an interagency body created by statute and
charged with "establish[ing] uniform principles and standards and
report forms for the examination of financial institutions which
shall be applied by the Federal financial institutions regulatory
agencies." 12 U.S.C. § 3305(a).
-7-
The Guidance explains that existing authentication
methodologies involve three basic "factors": (1) something the user
knows (e.g., password, personal identification number); (2)
something the user has (e.g., ATM card, smart card); and (3)
something the user is (e.g., biometric characteristic, such as a
fingerprint). Id. at 3. It states:
Authentication methods that depend on more
than one factor are more difficult to
compromise than single-factor methods.
Accordingly, properly designed and implemented
multifactor authentication methods are more
reliable and stronger fraud deterrents. For
example, the use of a logon ID/password is
single-factor authentication (i.e., something
the user knows); whereas, an ATM transaction
requires multifactor authentication: something
the user possesses (i.e., the card) combined
with something the user knows (i.e., PIN). A
multifactor authentication methodology may
also include "out-of-band" controls for risk
mitigation.
Id. The Guidance also states:
The agencies consider single-factor
authentication, as the only control mechanism,
to be inadequate for high-risk transactions
involving access to customer information or
the movement of funds to other parties. . . .
Account fraud and identity theft are
frequently the result of single-factor (e.g.,
ID/password) authentication exploitation.
Where risk assessments indicate that the use
of single-factor authentication is inadequate,
financial institutions should implement
multifactor authentication, layered security,
or other controls reasonably calculated to
mitigate those risks.
Id. at 1-2.
-8-
Following publication of the FFIEC Guidance, Ocean Bank
worked with Jack Henry to conduct a risk assessment and institute
appropriate authentication protocols to comply with the Guidance.
The bank determined that its eBanking product was a "high risk"
system that required enhanced security, and in particular,
multifactor authentication.
Jack Henry entered into a re-seller agreement with Cyota,
Inc., an RSA Security Company ("RSA/Cyota"), for a multifactor
authentication system to integrate into its NetTeller product so
that it could offer security solutions compliant with the FFIEC
Guidance. Through collaboration with RSA/Cyota, Jack Henry made
two multifactor authentication products available to its customers
to meet the FFIEC Guidance: the "Basic" package and the "Premium"
package.
Ocean Bank selected the Jack Henry "Premium" package,
which it implemented by January 2007. The system, as implemented
by Ocean Bank, had six key features:
1. User IDs and Passwords: The system required each
authorized Patco employee to use both a company ID and password and
a user-specific ID and password to access online banking.
2. Invisible Device Authentication: The system placed a
"device cookie" onto customers' computers to identify particular
computers used to access online banking. The device cookie would
be used to help establish a secure communication session with the
-9-
NetTeller environment and to contribute to the component risk
score. Whenever the cookie was changed or was new, that impacted
the risk score and potentially triggered challenge questions.
3. Risk Profiling: The system entailed the building of a
risk profile for each customer by RSA/Cyota based on a number of
different factors, including the location from which a user logged
in, when/how often a user logged in, what a user did while on the
system, and the size, type, and frequency of payment orders
normally issued by the customer to the bank. The Premium Product
noted the IP address that the customer typically used to log into
online banking and added it to the customer profile.
RSA/Cyota's adaptive monitoring provided a risk score to
the bank for every log-in attempt and transaction based on a
multitude of data, including but not limited to IP address, device
cookie ID, Geo location, and transaction activity. If a user's
transaction differed from its normal profile, RSA/Cyota reported to
the bank an elevated risk score for that transaction. RSA/Cyota
considered transactions generating risk scores in excess of 750, on
a scale from 0 to 1,000, to be high-risk transactions. "Challenge
questions," described below, were prompted any time the risk score
for a transaction exceeded 750.
4. Challenge Questions: The system required users, during
initial log-in, to select three challenge questions and responses.
The challenge questions might be prompted for various reasons. For
-10-
example, if the risk score associated with a particular transaction
exceeded 750, the challenge questions would be triggered. If the
challenge question responses entered by the user did not match the
ones originally provided, the customer would receive an error
message. If the customer was unable to answer the challenge
questions in three attempts, the customer was blocked from online
banking and would be required to contact the bank.
5. Dollar Amount Rule: The system permitted financial
institutions to set a dollar threshold amount above which a
transaction would automatically trigger the challenge questions
even if the user ID, password, and device cookie were all valid.
In August 2007, Ocean Bank set the dollar amount rule to $100,000.
On June 6, 2008, Ocean Bank lowered the dollar amount rule from
$100,000 to $1. After the Bank lowered the threshold to $1, Patco
was prompted to answer challenge questions every time it initiated
a transaction. In May 2009, when the fraud at issue in this case
occurred, the dollar amount rule threshold remained at $1.
6. Subscription to the eFraud Network: The Jack Henry
Premium Product provided Ocean Bank with a subscription to the
eFraud Network, which compared characteristics of the transaction
(such as the IP address of the user seeking access to the Bank's
system) with those of known instances of fraud. The eFraud Network
allowed financial institutions to report IP addresses or other
discrete identifying characteristics identified with instances of
-11-
fraud. An attempt to access a customer's NetTeller account
initiated by someone with that characteristic would then be
automatically blocked. The individual would not even be prompted
for challenge questions.
Ocean Bank asserts that on December 1, 2006, as it began
to implement the Jack Henry system, it also began to offer the
option of e-mail alerts to its eBanking customers. If the customer
chose to receive such alerts, the bank would send the customer e-
mails regarding incoming/outgoing transactions, changes to the
customer's balance, the clearing of checks, and/or alerts on
certain customer-specified dates. Patco claims it did not receive
notice that e-mail alerts were available and this is a disputed
issue of fact. It appears that notice of the availability of e-
mail alerts was not readily visible. To set up alerts through the
eBanking system, a user would have to first click the "Preferences"
tab on the eBanking webpage, then click on a second tab labeled
"Alerts," and then follow several additional steps to activate
individual alerts. Patco claims it never saw anything on the
website indicating that e-mail alerts were available, and it
therefore never set up e-mail alerts.
C. Security Measures Available Which Ocean Bank Chose Not to
Implement
There were several additional security measures that were
available to Ocean Bank but that the bank chose not to implement:
-12-
1. Out-of-Band Authentication: Jack Henry offered Ocean
Bank a version of the NetTeller system that included an out-of-band
authentication option. Out-of-band authentication "generally
refers to additional steps or actions taken beyond the technology
boundaries of a typical transaction." Id. at 3 n.5. Examples of
out-of-band authentication include notification to the customer,
callback (voice) verification, e-mail approval from the customer,
and cell phone based challenge/response processes. The FFIEC
Guidance identifies out-of-band authentication as a useful method
of risk mitigation. See id. at 11-12.
2. User-Selected Picture: Ocean Bank's security
procedures did not include the user-selected picture function that
was available through Jack Henry's Premium option. Ocean Bank
states that it did not utilize the user-selected picture function
because it already utilized other anti-phishing5 controls.
3. Tokens: Tokens are physical devices (something the
person has), such as a USB token device, a smart card, or a
password-generating token. The FFIEC Guidance identifies tokens as
a useful part of a multifactor authentication scheme. See id. at
8. Tokens were not available from Jack Henry when Ocean Bank
5
Phishing involves an attempt to acquire information such as
usernames, passwords, or financial data by a perpetrator
masquerading as a legitimate enterprise. Typically, the
perpetrator will provide an e-mail or link that directs the victim
to enter or update personal information at a phony website that
mimics an established, legitimate website which the victim either
has used before or perceives to be a safe place to enter
information.
-13-
implemented its system in 2007, but were readily available to
financial institutions at that time through other sources.
Although People's United Bank has used tokens since at least
January of 2008, Ocean Bank did not do so until after the fraud in
this case occurred.
4. Monitoring of Risk-Scoring Reports: In May 2009, bank
personnel did not monitor the risk-scoring reports received as part
of the Premium Product package, nor did the bank conduct any other
regular review of transactions that generated high risk scores. In
May 2009, the bank had the capability to conduct manual review of
high-risk transactions through its transaction-profiling and
risk-scoring system, but did not do so. The bank also had the
ability to call a customer if it detected fraudulent activity, but
did not do so. The bank began conducting manual reviews of
high-risk transactions in late 2009, after the fraud in this case
occurred. Since then, the bank has instituted a policy of calling
the customer in the case of uncharacteristic transactions to
inquire if the customer did indeed initiate the transaction.
D. The Fraudulent Transfers
Beginning on May 7, 2009, a series of withdrawals were
made on Patco's account over the course of several days.
On May 7, unknown third parties initiated a $56,594 ACH
withdrawal from Patco's account. The perpetrators supplied the
proper credentials of one of Patco's employees, including her ID,
-14-
password, and answers to her challenge questions. The payment on
this withdrawal was directed to go to the accounts of numerous
individuals, none of whom had previously been sent money by Patco.
The perpetrators logged in from a device unrecognized by Ocean
Bank's system, and from an IP address that Patco had never before
used. The risk-scoring engine generated a risk score of 790 for
the transaction, a significant departure from Patco's usual risk
scores, which generally ranged from 10 to 214. There is no
evidence that Patco's risk scores prior to the fraudulent transfers
in this case ever exceeded 214. The risk-scoring engine reported
the following contributors to the risk score for that transaction:
(1) "Very high risk non-authenticated device"; (2) "High risk
transaction amount"; (3) "IP anomaly"; and (4) "Risk score
distributor per cookie age." An RSA manual describing risk score
contributors states that any transaction triggering the contributor
"Very high risk non-authenticated device" is "a very high-risk
transaction." Despite this high risk score, Patco was not
notified. Moreover, it appears no one at the bank monitored these
high-risk transactions. Bank personnel did not manually review the
May 7, 2009 transaction. The bank batched and processed the
transaction as usual, and it was paid the next day.
The activities of May 7 having successfully resulted in
payment, on Friday, May 8, 2009, unknown third parties again
successfully initiated an ACH payment order from Patco's account,
-15-
this time for $115,620.26. As before, the perpetrators wired money
to multiple individual accounts to which Patco had never before
sent funds. The perpetrators again used a device that was not
recognized by Ocean Bank's system. The payment order originated
from the same IP address as the day before. The transaction was
larger by several magnitudes than any ACH transfer Patco had ever
made to third parties. Despite these unusual characteristics, the
bank again took no steps to notify Patco and batched and processed
the transaction as usual, which was paid by the bank on Monday, May
11, 2009.
On May 11, 12, and 13, unknown third parties initiated
further withdrawals from Patco's account in the amounts of $99,068,
$91,959, and $113,647, respectively. Like the prior fraudulent
transactions, these transactions were uncharacteristic in that they
sent money to numerous individuals to whom Patco had never before
sent funds, were for greater amounts than Patco's ordinary
third-party transactions, were sent from computers that were not
recognized by Ocean Bank's system, and originated from IP addresses
that were not recognized as valid IP addresses of Patco. As a
result of these unusual characteristics, the transactions continued
to generate higher than normal risk scores. The May 11 transaction
generated a risk score of 720, the May 12 transaction triggered a
risk score of 563, and the transaction on May 13 generated a risk
-16-
score of 785. The Bank did not manually review any of these
transactions to determine their legitimacy or notify Patco.
Portions of the transfers, beginning with the first
transfer initiated on May 7, 2009, were automatically returned to
the bank because certain of the account numbers to which the money
was slated to be transferred were invalid. As a result, the bank
sent limited "return" notices to the home of Mark Patterson, one of
Patco's principals, via U.S. mail. Patterson received the first
such notice after work on the evening of May 13, six days after the
allegedly fraudulent withdrawals began.
The next morning, on May 14, 2009, Patco called the bank
to inform it that Patco had not authorized the transactions. Also
on the morning of May 14, another alleged fraudulent transaction
was initiated from Patco's account in the amount of $111,963.
Despite the information from Patco, the bank initially processed
this payment order on May 15, 2009. However, because of the alert
from Patco of the ongoing fraud, the bank then took steps to block
completion of a portion of this transaction and recovered a portion
of the transferred funds shortly thereafter.
At the end of the string of thefts, the amount of money
fraudulently withdrawn from Patco's account totaled $588,851.26, of
which $243,406.83 was automatically returned or blocked and
recovered.
-17-
According to Ocean Bank, on May 14, 2009, immediately
after the allegedly fraudulent withdrawals occurred, the bank gave
instructions to Patco. It instructed Patco to disconnect the
computers it used for electronic banking from its network; to stop
using these computers for work purposes; to leave the computers
turned on; and to bring in a third-party forensic professional or
law enforcement to create a forensic image of the computers to
determine whether a security breach had occurred. Ocean Bank
claims, and Patco disputes, that Patco did not isolate its
computers or forensically preserve the hard drives; and that Patco
employees continued to use their computers during the week
following the alleged fraud. In another dispute of fact, Patco
states that Ocean Bank recommended only that Patco check its system
for a security breach using a third-party forensic professional,
which Patco did.
Shortly after the fraudulent transfers, Patco hired an IT
consultant, who ran anti-malware scans on the computers. A remnant
of a Zeus/Zbot malware was found. However, the Zeus/Zbot malware,
which contained the encryption key for the Zeus/Zbot configuration
file, was quarantined and then deleted by the anti-malware scan.
Without the encryption key, it is impossible to decrypt the
configuration file and identify what information, if any, the
Zeus/Zbot malware would have captured, if in fact it was of a type
that would have intercepted authentication credentials.
-18-
II.
On September 18, 2009, Patco filed suit against People's
United in Maine Superior Court, York County. The complaint
included six counts: (I) liability under Article 4A of the Uniform
Commercial Code ("UCC"); (II) negligence; (III) breach of contract;
(IV) breach of fiduciary duty; (V) unjust enrichment; and (VI)
conversion. On October 9, 2009, People's United removed the case
to the United States District Court for the District of Maine.
On August 27, 2010, Patco moved for summary judgment on
Count I, its claim under Article 4A of the UCC. That same day, the
bank moved for summary judgment on all six counts. On May 27,
2011, the magistrate judge issued a recommended decision on the
cross-motions for summary judgment. Patco Constr. Co. v. People's
United Bank, No. 09–cv–503, 2011 WL 2174507 (D. Me. May 27, 2011).
The magistrate judge determined both that the bank's security
procedures were commercially reasonable, id. at *32-34, and that
Patco had agreed to those procedures, id. at *24-25. Therefore,
the magistrate concluded, Patco -- not the bank -- bore the loss of
the fraudulent transfers. Id. at *34. The magistrate also
determined that Counts II-IV of Patco's complaint were displaced by
the provisions of Article 4A, and that Counts V and VI failed along
with Count I because the bank could not have been unjustly
enriched, or have wrongly converted Patco's funds, if it employed
commercially reasonable security procedures. Id. at *34-35.
-19-
Accordingly, the magistrate recommended that the district court
grant the bank's motion for summary judgment and deny that of
Patco. Id. at *35.
Patco objected to the recommended decision on June 13,
2011, and People's United responded to Patco's objection on June
27, 2011. On August 4, 2011, the district court adopted the
magistrate's recommendation in full. It granted People's United's
motion for summary judgment, denied Patco's motion for summary
judgment, and found the parties' outstanding motions to be moot.
On September 6, 2011, Patco appealed.
III.
We review orders granting or denying summary judgment de
novo. Certain Interested Underwriters at Lloyd's, London v.
Stolberg, 680 F.3d 61, 65 (1st Cir. 2012). In doing so, we
consider the record and all reasonable inferences in the light most
favorable to the non-moving party. Id.
We affirm only if there is no genuine dispute as to any
material fact and the movant is entitled to judgment as a matter of
law. Id. "A dispute is genuine if the evidence about the fact is
such that a reasonable jury could resolve the point in the favor of
the non-moving party." Rodríguez-Rivera v. Federico Trilla Reg'l
Hosp. of Carolina, 532 F.3d 28, 30 (1st Cir. 2008) (quoting
Thompson v. Coca-Cola Co., 522 F.3d 168, 175 (1st Cir. 2008)). "A
fact is material if it has the potential of determining the outcome
-20-
of the litigation." Id. (quoting Maymí v. P.R. Ports Auth., 515
F.3d 20, 25 (1st Cir. 2008)).
A. Article 4A of the UCC
The claim under Count I is governed by Article 4A of the
UCC, which was meant to govern the rights, duties, and liabilities
of banks and their commercial customers with respect to electronic
funds transfers. See Me. Rev. Stat. Ann. tit. 11, § 4-1102 cmt.
Article 4A was enacted in toto by Maine in 1991, well before the
transfers at issue in this case.6 Id. § 4-1101.
Article 4A was developed to address wholesale wire
transfers and commercial ACH transfers, generally between
businesses and their financial institutions.7 Id. § 4-1102 cmt.
6
In its enactment of Article 4A, the Maine legislature
provided that while "the text of that uniform act has been changed
to conform to Maine statutory conventions[, . . . u]nless otherwise
noted in a Maine comment, the changes are technical in nature and
it is the intent of the Legislature that this Act be interpreted as
substantively the same as the uniform act." 1992 Me. Legis. Serv.
ch. 812, § 3.
7
By contrast, consumer payments that are made
electronically, such as through direct wiring or the use of a debit
card, are covered by a separate federal statute, the Electronic
Fund Transfer Act (EFTA), 15 U.S.C. § 1693 et seq. Article 4A does
not apply to any funds transfer that is covered by the EFTA; the
two are mutually exclusive. Me. Rev. Stat. Ann. tit. 11, § 4-1108
& cmt. The drafters of Article 4A felt that a separate framework,
apart from the more consumer-focused EFTA, was needed to cover
electronic transfers between commercial institutions because of the
sheer volume and magnitude of such transfers. Id. Art. 4-A, Refs.
& Annots. cmt. At the time of Article 4A's drafting, the volume of
payments by non-consumer wire transfer exceeded well over one
trillion dollars per day and the dollar volume of payments made by
wire transfer far exceeded the dollar volume of payments made by
other means. Id.
-21-
Before Article 4A was drafted, "there was no comprehensive body of
law -- statutory or judicial -- that defined the juridical nature
of a [commercial] funds transfer or the rights and obligations
flowing from payment orders." Id. Instead, judges relied on
general principles of common law, sought guidance from other
provisions of the UCC, or analogized to laws applicable to other
payment methods. Id. The drafters of Article 4A sought to deliver
clarity to this area of law by "us[ing] precise and detailed rules
to assign responsibility, define behavioral norms, allocate risks
and establish limits on liability" in order to allow parties to
predict and insure against risk with greater certainty, given the
very large amounts of money involved in commercial funds transfers.
Id.
Importantly, the drafters also sought to clarify the
interaction between the new provisions of Article 4A and existing
remedies under the common law:
Funds transfers involve competing interests --
those of the banks that provide funds transfer
services and the commercial and financial
organizations that use the services, as well
as the public interest. These competing
interests were represented in the drafting
process and they were thoroughly considered.
The rules that emerged represent a careful and
delicate balancing of those interests and are
intended to be the exclusive means of
determining the rights, duties and liabilities
of the affected parties in any situation
covered by particular provisions of the
Article. Consequently, resort to principles
of law or equity outside of Article 4A is not
appropriate to create rights, duties and
-22-
liabilities inconsistent with those stated in
this Article.
Id. The drafters "intended that Article 4A would be supplemented,
enhanced, and in some places, superceded by other bodies of law
. . . [T]he Article is intended to synergize with other legal
doctrines," so long as those doctrines are not inconsistent with
the rights, duties, and liabilities established in Article 4A.
Regions Bank v. Provident Bank, Inc., 345 F.3d 1267, 1275 (11th
Cir. 2003) (omission in original) (quoting Baxter & Bhala, The
Interrelationship of Article 4A with Other Law, 45 Bus. Law. 1485,
1485 (1990)) (internal quotation mark omitted). Article 4A further
provides that, in general, the parties may not vary by agreement
any rights and obligations arising under Article 4A. See Me. Rev.
Stat. Ann. tit. 11, § 4-1202(6).
Under Article 4A, a bank receiving a payment order
ordinarily bears the risk of loss of any unauthorized funds
transfer. Id. § 4-1204. The bank may shift the risk of loss to
the customer in one of two ways, one of which involves the
commercial reasonableness of security procedures and one of which
does not. First, the bank may show that the "payment order
received . . . is the authorized order of the person identified as
sender if that person authorized the order or is otherwise bound by
it under the law of agency." Id. § 4-1202(1). But, as the Article
4A commentary explains, "[i]n a very large percentage of cases
-23-
covered by Article 4A, . . . [c]ommon law concepts of authority of
agent to bind principal are not helpful" because the payment order
is transmitted electronically and the bank "may be required to act
on the basis of a message that appears on a computer screen." Id.
§ 4-1203 cmt. 1.
If the sender of the payment order had no authority to
act for the customer, and there are no additional facts on which
estoppel might be found, the "Customer is not liable to pay the
order and [the] Bank takes the loss." Id. cmt. 2. In such cases,
"these legal principles [of agency] give the receiving bank very
little protection . . . . The only remedy of [the] Bank is to seek
recovery from the person who received payment as beneficiary of the
fraudulent order." Id. cmts. 1, 2.
Accordingly, the drafters provided a second way by which
a bank may shift the risk of loss and protect itself whether or not
the payment order is authorized. This, in turn, has several
components:
If a bank and its customer have agreed that
the authenticity of payment orders issued to
the bank in the name of the customer as sender
will be verified pursuant to a security
procedure, a payment order received by the
receiving bank is effective as the order of
the customer, whether or not authorized, if:
(a) The security procedure is a
commercially reasonable method of
providing security against unauthorized
payment orders; and
-24-
(b) The bank proves that it accepted the
payment order in good faith and in
compliance with the security procedure
and any written agreement or instruction
of the customer restricting acceptance of
payment orders issued in the name of the
customer. The bank is not required to
follow an instruction that violates a
written agreement with the customer or
notice of which is not received at a time
and in a manner affording the bank a
reasonable opportunity to act on it
before the payment order is accepted.
Id. § 4-1202(2).
In turn, Article 4A defines a security procedure as:
[A] procedure established by agreement of a
customer and a receiving bank for the purpose
of: (1) Verifying that a payment order or
communication amending or cancelling a payment
order is that of the customer; or (2)
Detecting error in the transmission or the
content of the payment order or communication.
Id. § 4-1201. One question raised in this appeal is the scope of
any agreement reached.
The UCC explains that the "[c]ommercial reasonableness of
a security procedure is a question of law" to be determined by the
court. Id. § 4-1202(3). There are two ways by which a security
procedure may be shown to be commercially reasonable. First is by
reference to:
[T]he wishes of the customer expressed to the
bank, the circumstances of the customer known
to the bank, including the size, type and
frequency of payment orders normally issued by
the customer to the bank, alternative security
procedures offered to the customer and
security procedures in general use by
-25-
customers and receiving banks similarly
situated.
Id. § 4-1202(3). The Article is explicit that "[t]he standard is
not whether the security procedure is the best available. Rather
it is whether the procedure is reasonable for the particular
customer and the particular bank . . . ." Id. § 4-1203 cmt. 4.
The UCC explains that "[t]he burden of making available
commercially reasonable security procedures is imposed on receiving
banks because they generally determine what security procedures can
be used and are in the best position to evaluate the efficacy of
procedures offered to customers to combat fraud." Id. cmt. 3.
Secondly, the Article creates a presumption of
reasonableness under certain circumstances, not applicable here.
A security procedure is deemed to be commercially reasonable if:
(a) The security procedure was chosen by the
customer after the bank offered and the
customer refused, a security procedure that
was commercially reasonable for that customer;
and
(b) The customer expressly agreed in writing
to be bound by any payment order, whether or
not authorized, issued in its name and
accepted by the bank in compliance with the
security procedure chosen by the customer.
Id. § 4-1202(3). Of course, if the security procedure offered by
the bank was not commercially reasonable, then the provision does
not apply. Id. § 4-1203 cmt. 4.
If the bank shows both that its security procedure was
commercially reasonable and that it accepted the payment order "in
-26-
good faith and in compliance with the security procedure," the
payment order is effective as an authorized order of the customer.
Id. §§ 4-1202(2)(b), 4-1203(1). In such a case, the bank may,
"[b]y express written agreement, . . . limit the extent to which it
is entitled to enforce or retain payment of the payment order."
Id. § 4-1203(1)(a).
Once the bank has shown commercial reasonableness, the
customer may shift the risk of loss back to the bank if the
customer proves that the order was not "caused, either directly or
indirectly, by a person":
(i) Entrusted at any time with duties to act
for the customer with respect to payment
orders or the security procedure or who
obtained access to transmitting facilities of
the customer; or
(ii) Who obtained from a source controlled by
the customer and without authority of the
receiving bank information facilitating breach
of the security procedure, regardless of how
the information was obtained or whether the
customer was at fault. Information includes
any access device, computer software or the
like.
Id. § 4-1203(1)(b). As the commentary explains, this section of
the UCC places a burden on the customer, when the security
procedure is commercially reasonable, "to supervise its employees
to assure compliance with the security procedure and to safeguard
confidential security information and access to transmitting
facilities so that the security procedure cannot be breached." Id.
§ 4-1203 cmt. 3.
-27-
If the bank does not make its showing of commercial
reasonableness, then the analysis goes back to the question of
agency under § 4-1202(a), described above. If the court
determines, under any of these provisions, that the bank bears the
risk of loss, "the bank shall refund any payment of the payment
order received from the customer to the extent the bank is not
entitled to enforce payment and shall pay interest on the
refundable amount calculated from the date the bank received
payment to the date of the refund." Id. § 4-1204(1).
B. Ocean Bank's Motion for Summary Judgment
Ocean Bank argues that because Patco agreed to the
security system in use, and because the security system was
commercially reasonable, it is entitled to summary judgment.
Patco counters that the bank's security system was not
commercially reasonable, that it did not agree to all of the
procedures, and that the bank did not comply with its own
procedures.
As to commercial reasonableness, Patco argues the bank's
decision to lower the dollar amount rule to $1 increased the risk
of compromised security, and that the bank's failure in light of
this increased risk to monitor and immediately notify customers of
abnormal transactions which met high risk criteria was not
commercially reasonable. Patco also argues that it was not offered
and it did not decline an e-mail notice system for transactions.
-28-
Essentially, Patco argues that when Ocean Bank decided in
June of 2008 to trigger challenge questions for any transaction
over $1, the bank increased the frequency with which a user was
required to enter the answers to his or her challenge questions.
Indeed, at a $1 threshold, the frequency as to Patco became 100%,
covering every transaction. For customers like Patco who made
regular ACH transfers, the risks were even greater than for
customers who rarely made such transfers. This, in turn, also
increased the risk that such answers would be compromised by
keyloggers8 or other malware that would capture that information
for unauthorized uses. By thus increasing the risk of fraud
through unauthorized use of compromised security answers, Patco
argues, Ocean Bank's security system failed to be commercially
reasonable because it did not incorporate additional security
measures, at the very least monitoring of high risk score
transactions, use of e-mail alerts and inquiries, or other
immediate notice to customers of high-risk transactions.
In our view, Ocean Bank did substantially increase the
risk of fraud by asking for security answers for every $1
transaction, particularly for customers like Patco which had
8
A "keylogger" is a form of computer malware, or malicious
code, capable of infecting a user's system, secretly monitoring the
user's Internet activity, recognizing when the user has browsed to
the website of a financial institution, and recording the user's
key strokes on that website. In this way, the keylogger is able to
capture a user's authentication credentials, which the keylogger
then transmits to a cyber thief.
-29-
frequent, regular, and high dollar transfers. Then, when it had
warning that such fraud was likely occurring in a given
transaction, Ocean Bank neither monitored that transaction nor
provided notice to customers before allowing the transaction to be
completed. Because it had the capacity to do all of those things,
yet failed to do so, we cannot conclude that its security system
was commercially reasonable. We emphasize that it was these
collective failures taken as a whole, rather than any single
failure, which rendered Ocean Bank's security system commercially
unreasonable.
The Jack Henry Premium Product was designed to harness
the power of the risk-scoring system and included a device
identification system to trigger an additional layer of
authentication -- challenge questions -- whenever the bank's system
detected unusual or suspicious transactions. In May of 2009, bank
personnel did not monitor the risk-scoring reports, nor did the
bank conduct any other regular review of transactions that
generated high risk scores. Thus, the only result of a high risk
score or an unidentified device was that a customer would be
prompted to answer his or her challenge questions.
When Ocean Bank lowered the dollar amount rule from
$100,000 to $1, it essentially deprived the complex Jack Henry
risk-scoring system of its core functionality. The $1 dollar
amount rule guaranteed that challenge questions would be triggered
-30-
on every transaction unless caught by a separate eFraud network
which depended on the use of known fraudulent IP addresses. The
eFraud network was of no use if the address and like information
were not already known to law enforcement. Accordingly, cyber
criminals equipped with keyloggers had the much more frequent
opportunity to capture all information necessary to compromise an
account every time the customer initiated an ACH transaction. In
Patco's case, ACH transactions were initiated at least weekly, and
often several times per week. In the event a customer's computer
became infected with a keylogger, it was likely that the customer
would be prompted to answer its challenge questions before the
malware was discovered and removed from the customer's computer.
Patco's argument is supported both by evidence and by
common sense. Patco's expert testified that at the times in
question, keylogging malware was a persistent problem throughout
the financial industry. It was foreseeable, against this
background, that triggering the use of the same challenge questions
for high-risk transactions as were used for ordinary transactions,
was ineffective as a stand-alone backstop to password/ID entry.
Indeed, it was well known that setting challenge questions to be
asked on every transaction greatly increases the risk that a
fraudster equipped with a keylogger would be able to access the
answers to a customer's challenge questions because it increases
-31-
the frequency with which such information is entered through a
user's keyboard.
As early as 2005, RSA/Cyota cautioned against the regular
and frequent use of challenge questions as a stand-alone backstop
to the exclusion of further controls, stating that challenge
questions were "quicker and simpler to adopt" but were "less
secure," and should be used only "in the short term, as the first
phase of a full project." According to RSA/Cyota, challenge
questions should be triggered only selectively, when unusual or
suspicious activity is detected, so that they are less likely to be
asked after a keylogger is installed on a customer's computer and
before it can be removed. When asked frequently, they should not
be used as the only line of defense beyond a password/ID, since a
password/ID and answers to challenge questions could all be
simultaneously captured by a keylogger.
Ocean Bank's decision to set the dollar amount rule at $1
for all of its customers also ignored Article 4A's mandate that
security procedures take into account "the circumstances of the
customer" known to the bank. Id. § 4-1202(3). Article 4A directs
banks to consider such circumstances as "the size, type and
frequency of payment orders normally issued by the customer to the
bank." Id. In Patco's case, these characteristics were regular
and predictable. Patco used eBanking primarily to make payroll
payments to employees. These payments were made weekly, generally
-32-
on Fridays; they originated from a single static IP address; and
they were always made from the same set of computers at Patco's
offices in Sanford, Maine. The highest such payment Patco ever
made was $36,634.74, well below the former $100,000 threshold. The
bank does not assert that it ever offered to adjust the threshold
amount for particular customers. Instead, the bank adopted a "one-
size-fits-all" dollar amount rule of $1 for its customers.
Ocean Bank argues that it did take Patco's circumstances
into account by building a risk profile based on Patco's eBanking
habits, such that the security system could compare the
characteristics of each transaction against those in Patco's
profile.9 This argument misses the mark because, in fact, the risk
profile information played no role. It triggered no additional
authentication requirements, and the bank did nothing with the
information generated by comparing the fraudulent transactions
against Patco's profile.
Ocean Bank also argues that it was commercially
reasonable for it to universally lower the dollar amount rule to $1
in order to target low-dollar fraud. Whether or not that is true
for certain customers, it is beside the point. Here, the increase
9
The bank also argues that it took Patco's circumstances
into account by setting Patco's ACH withdrawal limit based on its
specific needs. As the district court correctly noted, however,
ACH limits do not constitute a "security procedure" under Article
4A and thus have no bearing on the commercial reasonableness
analysis. Patco Constr. Co. v. People's United Bank, No.
09–cv–503, 2011 WL 2174507, at *28 n.131 (D. Me. May 27, 2011).
-33-
in risk to the consumer who engaged in regular high dollar
transfers, such as Patco, was sufficiently serious to require a
corollary increase in security measures for a security system to
remain commercially reasonable. The bank's generic "one-size-fits-
all" approach to customers violates Article 4A's instruction to
take the customer's circumstances into account. Further, the
reduction of the dollar amount rule to $1 was for commercial
customers, who are quite unlikely to have transfers of less than
$1.
Ocean Bank introduced no additional security measures in
tandem with its decision to lower the dollar amount rule, despite
the fact that several such security measures were not uncommon in
the industry and were relatively easy to implement. Patco's expert
testified that all of her other banking clients using the same Jack
Henry Premium Product employed manual reviews or some other
additional security measure to protect against the type of fraud
that occurred in this case.
For example, by May 2009, internet banking security had
largely moved to hardware-based tokens and other means of
generating "one-time" passwords.10 As of then, People's United Bank
10
Although tokens can be compromised, bypassing them requires
greater sophistication than is needed to obtain challenge
questions. The perpetrator must use the information within seconds
of acquiring it, before the system generates a new password to
replace the old. The answers to challenge questions, by contrast,
may be used at the perpetrator's leisure, particularly when, as was
the case at Ocean Bank, the answers are static. Even if a token
had been used and compromised in this case, the magnitude of the
-34-
(which had acquired Ocean Bank), several national banks, and many
New England community banks were using tokens for commercial
accounts. Of those banks that did not use tokens in May 2009, New
England community banks commonly used some form of manual review or
customer verification to authenticate uncharacteristic or
suspicious transactions. Such security procedures self-evidently
would not have been difficult to implement.11
This failure to implement additional procedures was
especially unreasonable in light of the bank's knowledge of ongoing
fraud. As early as 2008, Ocean Bank had received notification of
substantial increases in internet fraud involving keylogging
malware. By May 2009, Ocean Bank had itself experienced at least
two incidents of fraud on the bank's system which it attributed to
either keylogging malware or internal fraud. In both instances,
the perpetrators had acquired and successfully applied the
customer's passwords, IDs, and answers to challenge questions.
Thus, by May 2009, when the fraud in this case occurred,
it was commercially unreasonable for Ocean Bank's security system
to trigger nothing more than what was triggered in the event of a
resulting fraud would have been greatly reduced because the
captured password could not have been used after the initial
transaction.
11
Indeed, shortly after the fraud in this case occurred,
Ocean Bank began conducting manual reviews of suspect transactions.
Now, transactions that generate high risk scores are personally
reviewed by Ocean Bank personnel to determine their legitimacy.
-35-
perfectly ordinary transaction in response to the high risk scores
that were generated by the withdrawals from Patco's account. The
payment orders at issue were entirely uncharacteristic of Patco's
ordinary transactions: they were directed to accounts to which
Patco had never before transferred money; they originated from
computers Patco had never before used; they originated from an IP
address that Patco had never before used; and they specified
payment amounts significantly higher than the payments Patco
ordinarily made to third parties. As a result, the security system
flagged these transactions as uncharacteristic, highly suspicious,
and potentially fraudulent from a "very high risk non-authenticated
device." The transactions generated unprecedentedly high risk
scores ranging from 563 to 790, well above Patco's regular risk
scores which ranged from 10 to 214.
These collective failures, taken as a whole, rendered
Ocean Bank's security procedures commercially unreasonable. We
reverse the district court's grant of summary judgment as to Count
I.
That does not, however, end the matter, even as to Count
I. The issues briefed to us on appeal have largely involved
commercial reasonableness. Our conclusion that the security
procedures were not commercially reasonable does not end the
analysis of the Article 4A issues. Our conclusion as to Count I
and commercial reasonableness does, though, also lead us to vacate
-36-
the district court's grant of summary judgment on the two claims --
Count V (unjust enrichment) and Count VI (conversion) -- which the
district court considered to be dependent on the success of Count
I.
C. Patco's Motion for Summary Judgment
We affirm the district court's decision to deny Patco's
motion for summary judgment. There remain several genuine and
disputed issues of fact which may be material to the question of
whether Patco has satisfied its obligations and responsibilities
under Article 4A, or at least to the question of damages. The
district court did not reach, and the parties have not briefed, the
question of what, if any, obligations or responsibilities Article
4A imposes on a commercial customer even where a bank's security
system is commercially unreasonable. We leave these questions open
on remand so that the district court may, after briefing, assess
whether such obligations exist, either for liability purposes or
for mitigation of damages.
As to the genuine and disputed issues of fact, the
parties dispute the facts surrounding Patco's lack of e-mail
alerts. Patco alleges that it requested e-mail alerts from the
bank, but that the bank ignored these requests and never notified
Patco when e-mail alerts became available to bank customers. The
bank counters with its own allegation that it sent out a general
e-mail to customers that it would make e-mail alerts available.
-37-
Patco states that it received no such e-mail, and that instead, a
customer would have had to follow a complicated series of steps to
find an "Alerts" tab on the bank's website in order to learn that
such e-mail alerts had become available. Moreover, Patco alleges
that its account was not even set up with an "Alerts" tab; that the
account only features a "Preferences" tab. While one of Patco's
employees did successfully navigate to the "Preferences" tab, she
alleges she never saw an "Alerts" tab. Additionally, neither party
has submitted into the record an example of such an e-mail alert or
specified when such an e-mail alert would have been sent, such that
it is unclear what Patco would have learned from such an e-mail
alert and whether and when such an e-mail would have placed Patco
on notice of the fraudulent transfer.
The parties also disagree as to whether the fraud in this
case was caused by malware and keylogging in the first place, or
whether Patco shares some responsibility. Ocean Bank argues that
because Patco irreparably altered the evidence on its hard drives
by using and scanning its computers before making forensic copies,
it is unclear whether keylogging malware existed on Patco's
computers and enabled the alleged fraud. These disputed issues of
fact may be material.
Article 4A does not appear to be a one-way street.
Commercial customers have obligations and responsibilities as well,
under at least § 4-1204. See Me. Rev. Stat. Ann. tit. 11, § 4-
-38-
1204; but see id. § 4-1102 cmt. ("Resort to principles of law or
equity outside of Article 4A is not appropriate to create rights,
duties and liabilities inconsistent with those stated in this
Article."). Section 4-1204, entitled "Refund of payment and duty
of customer to report with respect to unauthorized payment order,"
provides:
The customer is not entitled to interest from
the bank on the amount to be refunded if the
customer fails to exercise ordinary care to
determine that the order was not authorized by
the customer and to notify the bank of the
relevant facts within a reasonable time not
exceeding 90 days after the date the customer
received notification from the bank that the
order was accepted or that the customer's
account was debited with respect to the order.
Id. § 4-1204(1).12 It is unclear, however, what, if any,
obligations a commercial customer has when a bank's security system
is found to be commercially unreasonable.
In short, we leave open for the parties to brief on
remand the question of what, if any, obligations or
responsibilities are imposed on a commercial customer under Article
4A even where a bank's security system is commercially
12
The commentary describes this burden on the customer as a
duty of ordinary care which is designed to encourage the customer
to promptly notify the bank about any instances of fraud so that
the bank can minimize its losses. Me. Rev. Stat. Ann. tit 11, § 4-
1204 cmt. 2. The commentary clarifies that a breach of this duty
results only in a loss of the interest on the refund payable by the
bank, but not a loss of the refund itself. Id.
-39-
unreasonable. The record requires further development on these
issues, precluding summary judgment at this stage.
D. Dismissal of Counts II-IV
The district court concluded that Article 4A "preempts"13
Patco's remaining common law claims: Count II (negligence), Count
III (breach of contract), and Count IV (breach of fiduciary duty).
The district court based its analysis on the commentary to § 4-
1102, which provides:
Funds transfers involve competing interests --
those of the banks that provide funds transfer
services and the commercial and financial
organizations that use the services, as well
as the public interest. These competing
interests were represented in the drafting
process and they were thoroughly considered.
The rules that emerged represent a careful and
delicate balancing of those interests and are
intended to be the exclusive means of
determining the rights, duties and liabilities
of the affected parties in any situation
covered by particular provisions of the
Article. Consequently, resort to principles
of law or equity outside of Article 4A is not
appropriate to create rights, duties and
liabilities inconsistent with those stated in
this Article.
Id. § 4-1102 cmt.
This language does not, on its face, displace Patco's
Count III for breach of contract or Count IV for breach of
13
This use of the term has nothing to do with the standard
legal use of "preemption," which involves the question of whether
federal law precludes a state from regulating on the same topic.
See, e.g., Kurns v. R.R. Friction Prods. Corp., 132 S. Ct. 1261,
1265-66 (2012). We prefer different terminology.
-40-
fiduciary duty.14 We adopt the test, as set forth in the
commentary, that Article 4A embodies an intent to restrain common
law claims only to the extent that they create rights, duties, and
liabilities inconsistent with Article 4A. See Ma v. Merrill Lynch,
Pierce, Fenner & Smith, Inc., 597 F.3d 84, 89 (2d Cir. 2010);
Regions Bank, 345 F.3d at 1275.
The common law claims of breach of contract and breach of
fiduciary duty are not inherently inconsistent with Patco's Article
4A claim. At least in theory, there could be, either by contract
or through assumption of fiduciary duties,15 higher standards which
are imposed on the bank. Indeed, courts have held that plaintiffs
may turn to common law remedies to seek redress for an alleged harm
arising from a funds transfer where Article 4A does not protect
against the underlying injury or misconduct alleged. See, e.g.,
Ma, 597 F.3d at 89-90; Regions Bank, 345 F.3d at 1275; see also
White & Summers, Uniform Commercial Code §§ 1-2, at 132 (1993
pocket part) ("With the adoption of Article 4A, electronic funds
14
We do not address whether Patco otherwise states a claim
for breach of fiduciary duty under Maine Law, see, e.g., Stewart v.
Machias Sav. Bank, 762 A.2d 44, 46 & n.1 (Me. 2000), or for that
matter, breach of contract, see, e.g., Seashore Performing Arts
Ctr., Inc. v. Town of Old Orchard Beach, 676 A.2d 482, 484 (Me.
1996).
15
We disagree with the district court's conclusion that
inconsistency is demonstrated merely because "[t]he gravamen of all
three counts is precisely the same as that of Count I: that the
Bank failed to employ proper security procedures, as a result of
which Patco suffered the loss in question." Patco Constr. Co.,
2011 WL 2174507, at *35.
-41-
transactions are governed not only by Article 4A, but also common
law . . . ."). We vacate the dismissal and leave the issue of
these two causes of action open on remand to be considered anew.
The closer question is whether Article 4A, on the facts
of this case,16 displaces the claim for negligence. That is, are
the negligence claims inconsistent with the duties and liability
limits set forth in Article 4A. We think they are, inasmuch as the
standard for the duty of care as to both sides is set forth in
Article 4A and its limitation of liability. See Ma, 597 F.3d at
89-90 (interpreting Article 4A to displace common law claims, such
as negligence, where Article 4A has already specified the relevant
duties and "protect[ions] against the type of underlying injury or
misconduct alleged in a claim"); Donmar Enters., Inc. v. S. Nat'l
Bank of N.C., 64 F.3d 944, 949-50 (4th Cir. 1995) (holding that
16
This case is not like Regions Bank in the sense that there
a beneficiary bank accepted funds it knew or had reason to know
were fraudulently obtained, and the court held other state law
remedies for fraud were not inconsistent with Article 4A. As the
court said:
Interpreting Article 4A in a manner that would
allow a beneficiary bank to accept funds when
it knows or should know that they were
fraudulently obtained, would allow banks to
use Article 4A as a shield for fraudulent
activity. It could hardly have been the
intent of the drafters to enable a party to
succeed in engaging in fraudulent activity, so
long as it complied with the provisions of
Article 4A.
Regions Bank v. Provident Bank, Inc., 345 F.3d 1267, 1276 (11th
Cir. 2003).
-42-
negligence claims are in conflict with, and therefore displaced by,
Article 4A); cf. Anderson v. Hannaford Bros. Co., 659 F.3d 151, 161
(1st Cir. 2011) (where Maine law is clear that certain damages on
given facts are not available regardless of theory pled, Maine law
will not under new cause of action allow such damages). So we
affirm the dismissal of the negligence claims.
IV.
We reverse the district court's grant of summary judgment
in favor of the bank, and affirm the district court's denial of
Patco's motion for summary judgment. We remand for further
proceedings in accordance with this opinion. On remand the parties
may wish to consider whether it would be wiser to invest their
resources in resolving this matter by agreement.
No fees are awarded; each side shall bear its own costs.
-43-