DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Court rejects Qchex’s appeal

Posted on May 14, 2010 by Dissent

The Ninth Circuit Court of Appeals today affirmed a lower court ruling against Qchex. The Federal Trade Commission had brought the action against Qchex, claiming that Qchex violated federal law by operating an online check creation and delivery service with inadequate safeguards in place to prevent fraud.

The lower court’s decision, issued in February 2009, had permanently barred Neovi, Inc., doing business as Neovi Data Corporation and Qchex.com, G7 Productivity Systems, Inc., James M. Danforth, and Thomas Villwock from operating a similar site without verifying that customers are authorized to draw checks from the bank accounts they have specified. Qchex appealed the court’s decision. In its ruling today, the appellate court rejected Qchex’s claim that it was not liable:

The district court found that Qchex is liable for them “[u]nfair creation and delivery of unverified checks.” Qchex urges that this charge is both “legally” and “literally” impossible. It claims that only users can create checks because “without user input nothing, and certainly not a check, . . . could be created or delivered.” This semantic argument is meant to encompass not only the causation requirement, but also
Qchex’s claim that it was not given adequate notice of the charges.

[2] Qchex’s challenge to causation is best captured in its statement that it did not “obtain, input or direct” the delivery of consumer information nor facilitate the theft. This spin ignores the fact that Qchex created and controlled a system that facilitated fraud and that the company was on notice as to the high fraud rate. Qchex’s approach would immunize a website operator that turned a blind eye to fraudulent business made possible only through the operator’s software. Even if the creation of the checks was impossible without user input, that does not mean Qchex did not create the checks that it later delivered.

[…]

Qchex had reason to believe that a vast number of checks were being drawn on unauthorized accounts—checks that it legitimized in the eyes of consumers. Aside from the prodigious number of complaints Qchex received, its president testified that Qchex expected the site would be used for fraudulent purposes from the beginning. Qchex nonetheless continued to create and deliver checks without proper verification. By doing so it engaged in a practice that facilitated and provided substantial assistance to a multitude of deceptive
schemes.

[6] To be clear, none of this is to say that Qchex is liable under a theory of aiding and abetting. Qchex engaged in behavior that was, itself, injurious to consumers. Qchex’s business practices might have served to assist others in illicit or deceptive schemes, but the liability under the FTC Act that attaches to Qchex is not mediated by the actions of those third parties. Qchex caused harm through its own deeds—in this case creating and delivering unverified checks—and thus § 5 of the FTC Act easily extends to its conduct.

For those unfamiliar with the case, the court opinion includes the relevant background on the case including how the system worked, and the staggering impact the business had on innocent victims:

Indeed, over a six-year period, Qchex froze over 13,750 accounts for fraud. Those accounts spawned nearly 155,000 checks, supplied over 37,350 bank account numbers, and were the source of checks totaling more than $402,750,000—an amount more than half of the total drawn during that time.

Qchex’s web site, last updated in November 2009 concerning the appeal, has not yet been updated to reflect today’s decision and still reads:

As of August 2007, the Qchex.com website has discontinued its service to restructure and improve key service levels.

Category: Of Note

Post navigation

← Laptop stolen from VA contractor contains veterans' personal data
GA: Health worker charged with ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.