Securities & Exchange Commission v. Dorozhko

08-0201-cv SEC v. Dorozhko UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT August Term, 2008 (Argued: April 3, 2009 Decided: July 22, 2009) Docket No. 08-0201-cv SECURITIES AND EXCHANGE COMMISSION , Plaintiff-Appellant, v. OLEKSANDR DOROZHKO , Defendant-Appellee. Before: CABRANES, HALL, Circuit Judges, and SULLIVAN , District Judge.* Plaintiff appeals an order of the United States District Court for the Southern District of New York (Naomi Reice Buchwald, Judge) entered January 8, 2008, denying plaintiff’s motion for a preliminary injunction on the grounds that the conduct alleged in the complaint—essentially, computer hacking—cannot be “deceptive” under Section 10(b) of the Securities Exchange Act of 1934 as defined by the Supreme Court unless the conduct involved a breach of a fiduciary duty. See SEC v. Dorozhko, 606 F. Supp. 2d 321 (S.D.N.Y. 2008). We hold that nothing in the Supreme Court’s jurisprudence or prior decisions of our Court expressly imposes a fiduciary-duty requirement on the ordinary meaning of “deceptive” where the alleged fraud is an affirmative misrepresentation rather than a nondisclosure. * The Honorable Richard J. Sullivan, of the United States District Court for the Southern District of New York, sitting by designation. 1 Vacated and remanded. MARK PENNINGTON , Assistant General Counsel (Brian G. Cartwright, General Counsel, Andrew N. Vollmer, Deputy General Counsel, Jacob H. Stillman, Solicitor, and David Lisitza, Attorney, on the brief), Washington, D.C. CHARLES A. ROSS (Christopher L. Padurano and Stephanie M. Carvlin, on the brief) Charles A. Ross & Assoc., LLC, New York, NY. JOSÉ A. CABRANES, Circuit Judge: We are asked to consider whether, in a civil enforcement lawsuit brought by the United States Securities and Exchange Commission (“SEC”) under Section 10(b) of the Securities Exchange Act of 1934 (“Section 10(b)”), computer hacking may be “deceptive” where the hacker did not breach a fiduciary duty in fraudulently obtaining material, nonpublic information used in connection with the purchase or sale of securities. For the reasons stated herein, we answer the question in the affirmative. BACKGROUND In early October 2007, defendant Oleksandr Dorozhko, a Ukranian national and resident, opened an online trading account with Interactive Brokers LLC (“Interactive Brokers”) and deposited $42,500 into that account. At about the same time, IMS Health, Inc. (“IMS”) announced that it would release its third-quarter earnings during an analyst conference call scheduled for October 17, 2007 at 5 p.m.—that is, after the close of the securities markets in New York City. IMS had hired Thomson Financial, Inc. (“Thomson”) to provide investor relations and web-hosting services, which included managing the online release of IMS’s earnings reports. Beginning at 8:06 a.m. on October 17, and continuing several times during the morning and early afternoon, an anonymous computer hacker attempted to gain access to the IMS earnings 2 report by hacking into a secure server at Thomson prior to the report’s official release. At 2:15 p.m.—minutes after Thomson actually received the IMS data—that hacker successfully located and downloaded the IMS data from Thomson’s secure server. Beginning at 2:52 p.m., defendant—who had not previously used his Interactive Brokers account to trade—purchased $41,670.90 worth of IMS “put” options that would expire on October 25 and 30, 2007.1 These purchases represented approximately 90% of all purchases of “put” options for IMS stock for the six weeks prior to October 17. In purchasing these options, which the SEC describes as “extremely risky,” defendant was betting that IMS’s stock price would decline precipitously (within a two-day expiration period) and significantly (by greater than 20%). Appellant’s Br. 2. At 4:33 p.m.—slightly ahead of the analyst call—IMS announced that its earnings per share were 28% below “Street” expectations, i.e., the expectations of many Wall Street analysts. When the market opened the next morning, October 18, at 9:30 a.m., IMS’s stock price sank approximately 28% almost immediately—from $29.56 to $21.20 per share. Within six minutes of the market opening, defendant had sold all of his IMS options, realizing a net profit of $286,456.59 overnight. Interactive Brokers noticed the irregular trading activity and referred the matter to the SEC, which now alleges that defendant was the hacker. See SEC v. Dorozhko, 606 F. Supp. 2d 321, 323 (S.D.N.Y. 2008) (explaining that the SEC’s theory rests on “two undisputed events: (1) the fact of the hack, and (2) the proximity to the hack of the trades by [defendant,] who was the only individual to trade heavily in IMS Health put options subsequent to the hack”). On October 29, 2007, the SEC sought and received from the United States District Court for the Southern District of New 1 A “put” is “[a]n option that conveys to its holder the right, but not the obligation, to sell a specific asset at a predetermined price until a certain date. . . . Investors purchase puts in order to take advantage of a decline in the price of the asset.” David L. Scott, Wall Street Words 295 (2003). 3 York (Naomi Reice Buchwald, Judge) a temporary restraining order freezing the proceeds of the “put” option transactions in defendant’s brokerage account. The District Court held a preliminary injunction hearing on the matter on November 28, 2007, at which it heard testimony and considered various affidavits. On January 8, 2008, in a thoughtful and careful opinion, the District Court denied the SEC’s request for a preliminary injunction because the SEC had not shown a likelihood of success. Specifically, the District Court ruled that computer hacking was not “deceptive” within the meaning of Section 10(b) as defined by the Supreme Court. According to the District Court, “a breach of a fiduciary duty of disclosure is a required element of any ‘deceptive’ device under § 10b.” Dorozhko, 606 F. Supp. 2d at 330. The District Court reasoned that since defendant was a corporate outsider with no special relationship to IMS or Thomson, he owed no fiduciary duty to either. Although computer hacking might be fraudulent and might violate a number of federal and state criminal statutes, the District Court concluded that this behavior did not violate Section 10(b) without an accompanying breach of a fiduciary duty. This appeal followed. On appeal, the SEC maintains its theory that the fraud in this case consists of defendant’s alleged computer hacking, which involves various misrepresentations. The SEC does not argue that defendant breached any fiduciary duties as part of his scheme. In this critical regard, we recognize that the SEC’s claim against defendant—a corporate outsider who owed no fiduciary duties to the source of the information—is not based on either of the two generally accepted theories of insider trading. See United States v. Cusimano, 123 F.3d 83, 87 (2d Cir. 1997) (distinguishing “the traditional theory of insider trading, under which a corporate insider trades in the securities of his own corporation on the basis of material, non-public information,” from “the misappropriation theory, [under which] § 10(b) and Rule 10b-5 are violated whenever a person trades while in knowing possession of material, non-public information that has been gained 4 in violation of a fiduciary duty to its source”). The SEC’s claim is nonetheless based on a claim of fraud, and we turn our attention to whether this fraud is “deceptive” within the meaning of Section 10(b). DISCUSSION Standard of Review We review the grant or denial of a preliminary injunction for abuse of discretion. E.g., Kickham Hanley P.C. v. Kodak Retirement Income Plan, 558 F.3d 204, 209 (2d Cir. 2009) (“[A]buse of discretion . . . occurs when (1) its decision rests on an error of law or a clearly erroneous factual finding, or (2) its decision—though not necessarily the product of a legal error or a clearly erroneous factual finding—cannot be located within the range of permissible decisions.”(internal citations, parentheticals, and quotation marks omitted)); Davis v. New York, 316 F.3d 93, 102 (2d Cir. 2002). “Deceptive Device” “Section 10(b) prohibits the use or employ, in connection with the purchase or sale of any security . . . , [of] any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the [SEC] may prescribe.” 15 U.S.C. § 78j(b).2 The instant case requires us to 2 The regulation promulgated by the SEC pertinent to the instant case is Rule 10b-5, which provides, in relevant part: It shall be unlawful for any person, directly or indirectly . . . (a) To employ any device, scheme, or artifice to defraud, (b) To make any untrue statement of a material fact or to omit to state a material fact necessary in order to make the statements made, in the light of the circumstances under which they were made, not misleading, or (c) To engage in any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person, in connection with the purchase or sale of any security. 5 decide whether the “device” in this case—computer hacking—could be “deceptive.”3 In construing the text of any federal statute, we first consider the precedents that bind us as an intermediate appellate court—namely, the holdings of the Supreme Court and those of prior panels of this Court, which provide definitive interpretations of otherwise ambiguous language. Insofar as those precedents fail to resolve an apparent ambiguity, we examine the text of the statute itself, interpreting provisions in light of their ordinary meaning and their contextual setting. See United States v. Magassouba, 544 F.3d 387, 404 (2d Cir. 2008) (“In determining whether statutory language is ambiguous, we ‘reference . . . the language itself, the specific context in which that language is used, and the broader context of the statute as a whole.’” (quoting Robinson v. Shell Oil Co., 519 U.S. 337, 341 (1997))). Where the statutory language remains ambiguous, “we resort to canons of construction and, if the meaning still remains ambiguous, to legislative history.” Magassouba, 544 F.3d at 404 (internal alterations and quotation marks omitted). The District Court determined that the Supreme Court has interpreted the “deceptive” element of Section 10(b) to require a breach of a fiduciary duty. See Dorozhko, 606 F. Supp. 2d at 338 (“[T]he Supreme Court has in a number of opinions carefully established that the essential 17 C.F.R. § 240.10b-5. 3 In the District Court’s view, “the alleged ‘hacking and trading’ was a ‘device or contrivance’ within the meaning of the statute.” Dorozhko, 606 F. Supp. 2d at 328. The District Court further observed that the scheme was “in connection with” the purchase or sale of securities because the close temporal proximity of the hacking to the trading (everything occurred in less than twenty-four hours) and the cohesiveness of the scheme (establishing the trading account, stealing the confidential information within minutes of its availability, and trading on it within minutes of the next day’s opening bell) suggest that hacking into the Thomson computers was part of a single scheme to commit securities fraud. See id. at 328-29; see also SEC v. Zandford, 535 U.S. 813, 822 (2002) (holding that “in connection with” means “to coincide”). The District Court also concluded that the alleged hacking was not “manipulative” because the Supreme Court has defined that word to cover exclusively practices “intended to mislead investors by artificially affecting market activity.” See Dorozhko, 606 F. Supp. 2d at 329 (quoting Santa Fe Indus. v. Green, 430 U.S. 462, 476 (1977)). The parties do not challenge these conclusions in this appeal. 6 component of a § 10(b) violation is a breach of a fiduciary duty to disclose or abstain that coincides with a securities transaction.”). The District Court reached this conclusion by relying principally on three Supreme Court opinions: Chiarella v. United States, 445 U.S. 222 (1980), United States v. O’Hagan, 521 U.S. 642 (1997), and SEC v. Zandford, 535 U.S. 813 (2002). We consider each of these cases in turn. In Chiarella, the defendant was employed by a financial printer and used information passing through his office to trade securities offered by acquiring and target companies. In a criminal prosecution, the government alleged that the defendant committed fraud by not disclosing to the market that he was trading on the basis of material, nonpublic information. The Supreme Court held that defendant’s “silence,” or nondisclosure, was not fraud because he was under no obligation to disclose his knowledge of inside information. “When an allegation of fraud is based upon nondisclosure, there can be no fraud absent a duty to speak. We hold that a duty to disclose under §10(b) does not arise from the mere possession of nonpublic market information.” 445 U.S. at 235; see also United States v. Chestman, 947 F.2d 551, 575 (2d Cir. 1991) (Winter, J., concurring in part and dissenting in part) (stating that, after Chiarella, “silence cannot constitute a fraud absent a duty to speak owed to those who are injured”). Justice Blackmun, joined by Justice Marshall, dissented. In their view, stealing information from an employer was fraudulent within the meaning of Section 10(b) because the statute was designed as a “catchall” provision to protect investors from unknown risks. Id. at 246 (Blackmun, J., dissenting). According to Justice Blackmun, the majority had “confine[d]” the meaning of fraud “by imposition of a requirement of a ‘special relationship’ akin to fiduciary duty before the statute gives rise to a duty to disclose or to abstain from trading upon material, nonpublic information.” Id.4 4 Although the District Court construed Justice Blackmun’s dissent to suggest that “no breach of fiduciary duty should be required to uphold a conviction under § 10(b),” Dorozhko, 606 F. 7 In O’Hagan, the defendant was an attorney who traded in securities based on material, nonpublic information regarding his firm’s clients. As in Chiarella, the government alleged that the defendant had committed fraud through “silence” because the defendant had a duty to disclose to the source of the information (his client) that he would trade on the information. The Supreme Court agreed, noting that “[d]eception through nondisclosure is central to the theory of liability for which the Government seeks recognition.” 521 U.S. at 654. “[I]f the fiduciary discloses to the source that he plans to trade on the nonpublic information, there is no ‘deceptive device’ and thus no § 10(b) violation—although the fiduciary-turned-trader may remain liable under state law for breach of a duty of loyalty.” Id. at 655. In Zandford, the defendant was a securities broker who traded under a client’s account and transferred the proceeds to his own account. The Fourth Circuit held that the defendant’s fraud was not “in connection with” the purchase or sale of a security because it was mere theft that happened to involve securities, rather than true securities fraud. The Supreme Court reversed in a unanimous opinion, observing that Section 10(b) “should be construed not technically and restrictively, but flexibly to effectuate its remedial purposes.” 535 U.S. at 819. Although the Court warned that not “every common-law fraud that happens to involve securities [is] a violation of § 10(b),” id. at 820, the defendant’s scheme was a single plan to deceive, rather than a series of independent frauds, and was therefore “in connection with” the purchase or sale of a security, id. at 825. In a final footnote, the Court offered the following observation: “[I]f the broker told his client he was stealing the client’s assets, that breach of fiduciary duty might be in connection with a sale of securities, but it would not involve a deceptive device or fraud.” 535 U.S. at 825 n.4. In the instant case, the District Supp. 2d at 333, we read this dissent in light of the circumstances of Chiarella, which only considered a fraud based on nondisclosure, not an affirmative misrepresentation. See 445 U.S. at 247 (Blackmun, J., dissenting) (“I do not agree that a failure to disclose violates . . . Rule [10b-5] only when the responsibilities of a [fiduciary] relationship . . . have been breached.” (emphasis added)). 8 Court interpreted the Zandford footnote as an “explicit[ ] acknowledg[ment] that Zandford would not be liable under § 10(b) if he had disclosed to Wood that he was planning to steal his money.” Dorozhko, 606 F. Supp. 2d at 338. The District Court concluded that in Chiarella, O’Hagan, and Zandford, the Supreme Court developed a requirement that any “deceptive device” requires a breach of a fiduciary duty. In applying that interpretation to the instant case, the District Court ruled that “[a]lthough [defendant] may have broken the law, he is not liable in a civil action under § 10(b) because he owed no fiduciary or similar duty either to the source of his information or to those he transacted with in the market.” Dorozhko, 606 F. Supp. 2d at 324.5 At least one of our sister circuits has made the same observation relying on the same precedent. See Regents of the Univ. of Cal. v. Credit Suisse First Boston (USA), Inc., 482 F.3d 372, 389 (5th Cir. 2007) (discussing Chiarella and O’Hagan, and stating that “the [Supreme] Court . . . has established that a device, such as a scheme, is not ‘deceptive’ unless it involves breach of some duty of candid disclosure”). In our view, none of the Supreme Court opinions relied upon by the District Court—much less the sum of all three opinions—establishes a fiduciary-duty requirement as an element of every violation of Section 10(b). In Chiarella, O’Hagan, and Zandford, the theory of fraud was silence or nondisclosure, not an affirmative misrepresentation. The Supreme Court held that remaining silent was actionable only where there was a duty to speak, arising from a fiduciary relationship. In 5 Some commentators grudgingly have acknowledged that the District Court’s conclusion would be compelled under a narrow reading of Section 10(b) that covers only the “disclose or abstain” requirement for corporate insiders other than fiduciaries. See, e.g., Robert A. Prentice, The Internet and Its Challenges for the Future of Insider Trading Regulation, 12 Harv. J. L. & Tech. 263, 297-98 (1999) (acknowledging that, “[t]o the extent that misappropriation liability is based solely on a breach of fiduciary duty, thieves unrelated to the source of the information could steal the information without being in violation of existing federal securities laws”); but see id. at 300 (arguing that “to hold that hackers are misappropriators is consistent with the pre-1934 common law upon which Section 10(b) was based [and] is consonant with the underlying policy of Section 10(b)—investor protection” (internal footnote omitted)). 9 Chiarella, the Supreme Court held that there was no deception in an employee’s silence because he did not have duty to speak. See 445 U.S. at 226 (“This case concerns the legal effect of the petitioner’s silence.” (emphasis added)); see also id. at 227-28 (“At common law, misrepresentation made for the purpose of inducing reliance upon the false statement is fraudulent. But one who fails to disclose material information prior to the consummation of a transaction commits fraud only when he is under a duty to do so.” (emphasis added)). In O’Hagan, an attorney who traded on client secrets had a fiduciary duty to inform his firm that he was trading on the basis of the confidential information. See 521 U.S. at 653 (noting that a “breach of a duty of trust and confidence . . . to his law firm” was conduct that “satisfies § 10(b)’s requirement that chargeable conduct involve a ‘deceptive device or contrivance’”); see also id. at 654 (“Deception through nondisclosure is central to the theory of liability for which the Government seeks recognition.” (emphasis added)). Even in Zandford, which dealt principally with the statutory requirement that a deceptive device be used “in connection with” the purchase or sale of a security, the defendant’s fraud consisted of not telling his brokerage client—to whom he owed a fiduciary duty—that he was stealing assets from the account. See 535 U.S. at 822 (“[Defendant’s brokerage clients] were injured as investors through [defendant’s] deceptions, which deprived them of any compensation for the sale of their valuable securities.”); see also id. at 823 (“[A]ny distinction between omissions and misrepresentations is illusory in the context of a broker who has a fiduciary duty to her clients.”). Chiarella, O’Hagan, and Zandford all stand for the proposition that nondisclosure in breach of a fiduciary duty “satisfies § 10(b)’s requirement . . . [of] a ‘deceptive device or contrivance,’” O’Hagan, 521 U.S. at 653. However, what is sufficient is not always what is necessary, and none of the Supreme Court opinions considered by the District Court require a fiduciary relationship as an element of an actionable securities claim under Section 10(b). While Chiarella, O’Hagan, and Zandford all dealt with fraud qua silence, an affirmative misrepresentation is a distinct species of fraud. Even 10 if a person does not have a fiduciary duty to “disclose or abstain from trading,” there is nonetheless an affirmative obligation in commercial dealings not to mislead. See, e.g., Basic Inc. v. Levinson, 485 U.S. 224, 240 n.18 (1988) (distinguishing “situations where insiders have traded in abrogation of their duty to disclose or abstain,” from “affirmative misrepresentations by those under no duty to disclose (but under the ever-present duty not to mislead)”). In this case, the SEC has not alleged that defendant fraudulently remained silent in the face of a “duty to disclose or abstain” from trading. Rather, the SEC argues that defendant affirmatively misrepresented himself in order to gain access to material, nonpublic information, which he then used to trade. We are aware of no precedent of the Supreme Court or our Court that forecloses or prohibits the SEC’s straightforward theory of fraud.6 Absent a controlling precedent that “deceptive” has a more limited meaning than its ordinary meaning, we see no reason to complicate the enforcement of Section 10(b) by divining new requirements. In reaching this conclusion, we are mindful of the Supreme Court’s oft-repeated instruction that Section 10(b) “should be construed not technically and restrictively, but flexibly to effectuate its remedial purposes.” Zandford, 535 U.S. 6 The District Court found it “noteworthy” that in the over seventy years since the enactment of the Securities Exchange Act of 1934, “no federal court has ever held that those who steal material nonpublic information and then trade on it violate § 10(b),” even though “traditional theft (e.g. breaking into an investment bank and stealing documents) is hardly a new phenomenon, and involves similar elements for purposes of our analysis here.” Dorozhko, 606 F. Supp. 2d at 339. The District Court suggested that “hacking and trading” schemes have been and ought to be prosecuted under “any number of federal and/or state criminal statutes,” rather than through civil enforcement actions. Id. at 323; see also id. at 324 (listing applicable federal criminal statutes). At the preliminary injunction hearing, the District Court stated that it was “very disturbing” that this case was not a federal prosecution, J.A. 889 Tr. of Preliminary Injunction Hearing at 129:20, SEC v. Dorozhko, 606 F. Supp.2d. 321 (S.D.N.Y. Nov. 28, 2007) (No. 07 civ 9606). We intimate no view on that question. It is enough to say that we deal with the facts presented, which in our view are sufficient to maintain a civil enforcement claim. 11 at 819 (internal quotation marks omitted).7 Accordingly, we adopt the SEC’s proposed interpretation of Chiarella and its progeny: “misrepresentations are fraudulent, but . . . silence is fraudulent only if there is a duty to disclose.” Appellant’s Br. 44. Having denied the SEC’s application for a preliminary injunction freezing defendant’s trading account on the basis of a perceived fiduciary duty requirement stemming from the Chiarella line of insider trading cases, the District Court did not decide whether the ordinary meaning of “deceptive” covers the computer hacking in this case—or, indeed, whether the computer hacking in this case involved any misrepresentation at all. Defendant invites us to remand both questions so that the District Court may decide in the first instance. In its ordinary meaning, “deceptive” covers a wide spectrum of conduct involving cheating or trading in falsehoods. See Webster’s International Dictionary 679 (2d ed. 1934) (defining “deceptive” as “tending to deceive,” and defining “deceive” as “[t]o cause to believe the false, or to disbelieve the true” or “[t]o impose upon; to deal treacherously with; cheat”). Cf. Ernst & Ernst v. Hochfelder, 425 U.S. 185, 199 n.20 (1976) (consulting the 1934 edition of Webster’s International Dictionary to define other relevant terms in Section 10(b)); In re Parmalat Sec. Litig., 376 F. Supp. 2d 7 We are further counseled by the observations of Judge Augustus N. Hand, who reasoned over fifty years ago that had Congress intended to impose a fiduciary-duty requirement on Section 10(b) liability, it would have said so. See Birnbaum v. Newport Steel Corp., 193 F.2d 461, 464 (2d Cir. 1952) (A. Hand, J.) (“When Congress intended to protect the stockholders of a corporation against a breach of fiduciary duty by corporate insiders, it left no doubt as to its meaning. Thus Section 16(b) of the Act of 1934 . . . expressly gave the corporate issuer or its stockholders a right of action against corporate insiders using their position to profit in the sale or exchange of corporate securities. The absence of a similar provision in Section 10(b) strengthens the conclusion that [Section 10(b)] was directed solely at that type of misrepresentation or fraudulent practice usually associated with the sale or purchase of securities rather than at fraudulent mismanagement of corporate affairs, and that Rule [10b-5] extended protection only to the defrauded purchaser or seller.” (internal citation omitted)). We recognize that in the instant case, the SEC is neither a purchaser nor a seller, but brings this suit in its regulatory capacity in order to “ensure honest securities markets and . . . promote investor confidence,” Zandford, 535 U.S. at 819. 12 472, 502 n.152 (S.D.N.Y. 2005) (consulting the 1934 edition of Webster’s International Dictionary to define “deceptive”). In light of this ordinary meaning, it is not at all surprising that Rule 10b-5 equates “deceit” with “fraud.” See 17 C.F.R. § 240.10b-5 (prohibiting “any untrue statement of a material fact . . . or . . . any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person, in connection with the purchase or sale of any security” (emphases added)). Indeed, we have previously observed that the conduct prohibited by Section 10(b) and Rule 10b-5 “irreducibly entails some act that gives the victim a false impression.” United States v. Finnerty, 533 F.3d 143, 148 (2d Cir. 2008). The District Court—summarizing the SEC’s allegations—described the computer hacking in this case as “employ[ing] electronic means to trick, circumvent, or bypass computer security in order to gain unauthorized access to computer systems, networks, and information . . . and to steal such data.” Dorozhko, 606 F. Supp. 2d at 329. On appeal, the SEC adds a further gloss, arguing that, in general, “[computer h]ackers either (1) ‘engage in false identification and masquerade as another user[’] . . . or (2) ‘exploit a weakness in [an electronic] code within a program to cause the program to malfunction in a way that grants the user greater privileges.’” Appellant’s Br. 22-23 (quoting Orin S. Kerr, Cybercrime Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes, 78 N.Y.U. L. Rev. 1596, 1645 (2003)). In our view, misrepresenting one’s identity in order to gain access to information that is otherwise off limits, and then stealing that information is plainly “deceptive” within the ordinary meaning of the word. It is unclear, however, that exploiting a weakness in an electronic code to gain unauthorized access is “deceptive,” rather than being mere theft. Accordingly, depending on how the hacker gained access, it seems to us entirely possible that computer hacking could be, by definition, a “deceptive device or contrivance” that is prohibited by Section 10(b) and Rule 10b-5. However, we are hesitant to move from this general principle to a particular application 13 without the benefit of the District Court’s views as to whether the computer hacking in this case—as opposed to computer hacking in general—was “deceptive.” Our caution is counseled by the considerable and careful efforts the District Court has already devoted to this case, including hearing live testimony from witnesses at a preliminary injunction hearing that covered, among other topics, how Thomson’s secure servers were infiltrated. See, e.g., J.A. 848 Tr. of Preliminary Injunction Hearing at 40-41, Dorozkho, 606 F. Supp.2d. 321 (No. 07 civ 9606). Having established that the SEC need not demonstrate a breach of fiduciary duty, we now remand to the District Court to consider, in the first instance, whether the computer hacking in this case involved a fraudulent misrepresentation that was “deceptive” within the ordinary meaning of Section 10(b). The District Court may, in its informed discretion, enter a new order on the basis of the existing record or reopen the preliminary injunction hearing to consider such additional testimony regarding the nature of the hacking in this particular case as it deems appropriate in the circumstances. CONCLUSION For the foregoing reasons, the District Court’s January 8, 2008 order denying the SEC’s motion for a preliminary injunction is VACATED. The cause is REMANDED for further proceedings consistent with this opinion. 14