I don’t know Delaware law but at least under common law of bailments, notice to the owner is required before one can claim title by abandonedment, how else would one know of the true owner intends tk retrieve it? I’d bet the NJ statute also requires due notice.
As to that, the CFAA, and the California state claims, I note that the case is not against the laptop repair guy and the suit does not admit or concede that any “laptop” ever existed. Rather, they concede that some of the data was in fact the Plaintiff’s. Further, the Defendants admit that they never had a “laptop,” only an external hard drive said to be a copy of the laptop’s data made by the computer repair guy.
Even if the repair guy had title to the laptop, and had authority to grant access to the Defendants, the Defendant’s accessed the data with an intent to defraud, blackmail, or extort something of value. There is no right of access which allows that. The access in such a case is per se unauthorized. That’s Paragraph 42 of the complaint and it seems like a slam dunk to me. Notice how the wording as to the access is reversed compared to Paragraphs 40 and 41.
40 (illegally accessessing to obtain financial records) and 41 (illegally accessing a computer used in interstate commerce) rely on the argument that the Defendant had no authority to access the data, which itself depends on the authority the computer repair guy had, if any, and whether he could have granted access to the Defendants. I think any right the computer guy had and could have transferred, the Defendant’s nevertheless exceeded by what they planned to do and did do with the data.
In Count II, the California state claims, seem much easier to prove. That’s not a computer access statute, it’s a data privacy statute. Paragraph 46 is similar to 42 above, it’s the wrongful intent of the access that makes the Defendant’s conduct actionable. 47 and 48 are like 40 and 41, they hinge on permission of someone with authority to grant access. Paragraph 49, if I’m reading the statute correctly, is unique. That one goes to the Defendants’ communications with the laptop repair guy and their efforts to obtain the external drive when the laptop guy claimed the data belonged to Hunter Biden and the Defendants’ sought to obtain it without Plaintiff’s permission.
Count III is a typical unfair business practices claim. It alleged the Defendants’ were running a business and engaged in lies and deception that harmed the Plaintiff. Rudy couldn’t help himself from going on the air and waving a laptop around claim “this is Hunter Biden’s laptop,” while having already admitted that he never had Hunter Biden’s laptop, only an external drive claimed by someone to be Hunter Biden’s.
At this point, the repair owner has no credibility as to the authenticity of data and the only evidence that could prove a particular piece of data is authentic is if Hunter Biden testifies so. Guilliani and Costello have no competency to testify as to the authenticity of the data because we’re not involved until years after the fact and did not witness any of the underlying facts or circumstances as to the receipt and storage of the data, their thoughts on it would be inadmissible hearsay. Pretty precarious legal position to be in; incompetent to testify to the one defense they might have. Too bad for them they went into business as spooks and bagmen instead of journalists.