
    Jamison J. SHEFTS, an Individual, Plaintiff, v. John PETRAKIS, an Individual, Kevin Morgan, an Individual, Heidi Huffman, an Individual, and Access2Go, Inc., an Illinois corporation, Defendants.
    Case No. 10-cv-1104.
    United States District Court, C.D. Illinois, Peoria Division.
    June 21, 2013.
    Order Denying Reconsideration July 22, 2013.
    
      Lane G. Alster, Robert M. Riffle, Elias Meginnes Riffle & Seghetti, Peoria, IL, for Plaintiff.
    George Mueller, Mueller Anderson PC, Ottawa, IL, J. Reed Roesler, Jay H. Scholl, Davis & Campbell LLC, Jeffrey Alan Ryva, Stephen M. Buck, Husch Blackwell Sanders LLP, Peoria, IL, for Defendants.
   ORDER & OPINION

JOE BILLY McDADE, Senior District Judge.

This matter is before the Court on Defendant Kevin Morgan’s Motion for Summary Judgment as to Plaintiffs claims against him under Count I of the Amended Complaint. (Doe. 273). For the reasons stated below, the Motion is granted. In addition, the Court herein clarifies the current status of Count III of the First Amended Complaint.

Legal Standard

Summary judgment should be granted where “the pleadings, the discovery and disclosure materials on file, and any affidavits show that there is no genuine issue as to any material fact and that the movant is entitled to judgment as a matter of law.” Fed. R. Crv. P. 56(c).

Discussion

In his First Amended Complaint, Plaintiff claims that Defendants violated the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2511, the Illinois Eavesdropping Statute, 720 III. Comp. Stat. § 5/14-1 et seq., and the Stored Communications Act (“SCA”), 18 U.S.C. § 2701 by intercepting, monitoring, and/or accessing (1) his Access2Go-provided email account, (2) his Yahoo! web-based email account, and (3) his text messages on his Blackberry device. The Court has resolved a number of these claims through Motions for Summary Judgment, such that the only claims that remain in question are:

Count I: ECPA
—Whether Access2Go authorized Defendants’ interception of Plaintiffs Access2Go email such that the interception was in the ordinary course of Access2Go’s business
—Whether Plaintiff consented to interception of either the Access2Go or Yahoo! email accounts
Count II: Illinois Eavesdropping Statute
—Whether Plaintiff had a reasonable expectation of privacy in any of the communications
Count III: SCA
—Whether Defendants accessed Plaintiffs Yahoo! email

The instant Motion for Summary Judgment addresses Plaintiffs claims under Count I against Defendant Morgan. As discussed further below, throughout this litigation the claims against Defendant Morgan have revolved around theories of “secondary” liability; Plaintiff has alleged that Morgan directed the other Defendants to engage in the various forms of monitoring alleged. The Court has had occasion to mention this “secondary” liability in other Orders, and has assumed, because neither party disputed it, that such liability could be available; the Court has never addressed the question now at issue, whether the ECPA actually provides for “secondary” civil liability. This Order will also address the status of the remaining claim under Count III, as Plaintiffs intentions regarding this claim have been unclear.

I. Nature of Defendant Morgan’s Motion for Summary Judgment

Responding to Defendant Morgan’s Motion for Summary Judgment, Plaintiff first complains that Defendant Morgan has failed to include within his Motion for Summary Judgment a list of undisputed material facts as required by Local Rule 7.1(D), and argues that the Motion should be denied because of this “violation.” Defendant responds by pointing out that he raises only a pure legal question of statutory interpretation, to which no facts are material. The Court agrees that no facts are material to the determination of whether “procurement” is a violation of the ECPA. Whether the ECPA includes civil “procurement” liability does not require any consideration of how such “procurement” might have occurred in this case, or of any other facts particular to this case. Summary judgment is an appropriate vehicle for the resolution of legal questions. See Local 1239, Intern. Broth, of Boilermakers, Iron Shipbuilders, Blacksmiths, Forgers, 9 F.Supp.2d 901 (N.D.Ill.1998) (deciding question of statutory construction on summary judgment with no reference to particular facts of case); see also Peavy v. WFAA-TV, Inc., 221 F.3d 158, 168 (5th Cir.2000) (“Whether the [ECPA] authorizes a private civil action for procurement is a legal issue of statutory interpretation, which requires no presentation of evidence.”).

Local Rule 7.1(D) does not require a party moving for summary judgment to vainly list a group of immaterial facts in order to meet some technical requirement; indeed, the Rule requires the listing only of “each undisputed material fact which is the basis for the motion for summary judgment” (emphasis added), and notes that “[m]aterial facts are only those facts which bear directly on the legal issue raised by the motion.” If the Motion is not based on a particular factual situation and the Court’s decision does not require the consideration of any facts, as in the ease of a pure question of statutory interpretation, then no facts should be listed. Defendant therefore did not err in choosing not to list any “undisputed material facts.”

II. Whether the ECPA Includes Civil “Procurement” Liability

As explained above, Plaintiff alleges that Defendant Morgan violated the ECPA by directing others to intercept his communications; § 2511(1) of the ECPA provides that it is a violation of the statute to “procure” a person to unlawfully “intercept” communications. Defendant Morgan’s Motion for Summary Judgment argues that the ECPA’s civil remedy provision, § 2520, does not contemplate such “procurement” liability for civil defendants, and so he should be granted summary judgment as to this portion of Plaintiffs case against him. The Court has determined that the statutory language, clear weight of persuasive authority, and legislative history indicate that a civil plaintiff may not recover under the ECPA for a defendant’s “procurement” of another to intercept the plaintiffs communications.

Prior to 1986, § 2520 provided:

Any person whose wire or oral communication is intercepted, disclosed, or used in violation of this chapter shall (1) have a civil cause of action against any person who intercepts, discloses, or uses, or procures any other person to intercept, disclose, or use such communications, and (2) be entitled to recover from any such person [damages, attorney’s fees, and costs].

18 U.S.C. § 2520 (1970) (emphasis added). In 1986, though, Congress amended the statute so that it now reads:

[A]ny person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity, other than the United States, which engaged in that violation such relief as may be appropriate.

18 U.S.C. § 2520(a). The clause “or procures any other person to intercept, disclose, or use such communications” was removed from the portion of the statute providing a civil remedy. Plaintiff claims that this alteration to the statute’s text does not affect his ability to recover from Defendant Morgan for “procuring” the interception of his communications, while Defendants argue that the alteration reflects Congress’ intent to eliminate such liability.

In Peavy v. WFAA-TV, Inc., the Fifth Circuit, addressing what appeared to be an issue of first impression, looked to the plain text of the statute to determine that the alteration was intended to eliminate the ability to sue one who only “procures” another to intercept a plaintiffs communications. 221 F.3d at 168-69. As that court explained, “[t]he amended provision does not have the ‘procures any other person’ language, extending civil liability to ‘the person or entity which engaged in that violation.’ And, the referenced ‘violation’ is ‘intercepted, disclosed, or intentionally used;’ there is no mention of ‘procures.’ ” Id. at 168-69 (emphases in original). The Fifth Circuit, citing the familiar rule that amendments to statutes are presumed to be meaningful, held that Congress intended to excise civil “procurement” liability from the ECPA. Id. at 169 (citing, inter alia, Stone v. I.N.S., 514 U.S. 386, 397, 115 S.Ct. 1537, 131 L.Ed.2d 465 (1995); Park ‘N Fly, Inc. v. Dollar Park & Fly, Inc., 469 U.S. 189, 194, 105 S.Ct. 658, 83 L.Ed.2d 582 (1985)).

Following Peavy, both the Tenth Circuit and the District Court for the District of Columbia agreed that § 2520(a), as amended in 1986, does not impose civil liability on one who merely “procures” another to illegally intercept communications. Kirch v. Embarq Management Co., 702 F.3d 1245, 1246-47 (10th Cir.2012); Gaubatz, 891 F.Supp.2d at 23-24. The Gaubatz court, citing’ Peavy and several district court cases, engaged in its own analysis of the statutory text and’ determined that “the plain language of the statute limits civil liability to interception, disclosure, and use.” 891 F.Supp.2d at 24 (citing Peavy v. WFAA-TV, Inc., 221 F.3d 158, 169 (5th Cir.2000); Lonegan v. Hasty, 436 F.Supp.2d 419, 427-28 (E.D.N.Y.2006); Hurst v. Phillips, No. 04-2591 M1/P, 2005 WL 2436712, *3 (W.D.Tenn. Sept. 30, 2005); Gunderson v. Gunderson, No. 02-1078-CVW-ODS, 2003 WL 1873912, *2 (W.D.Mo. Apr. 14, 2003); Buckingham v. Gailor, No. 00-CV-1568, 2001 WL 34036325, *6 (D.Md. Mar. 27, 2001)). The Tenth Circuit has also followed the majority position in “presuming] that this deletion [of the ‘procures’ clause] was intended to change the statute’s meaning.” Kirch, 702 F.3d at 1247.

Both the Gaubatz and Kirch courts, as well as both Plaintiff and Defendant Morgan in this case, recognize that the Eastern District of New York appears to be the lone outlier in interpreting the 1986 amendment to § 2520(a). In Lonegan v. Hasty, that court disagreed with the Peavy interpretation because it believed that

the more natural reading of the amended statute shows no intent on the part of Congress to eliminate the private right of action for procurement violations.... Pursuant to Section 2511(l)(a), the class of persons whose communications are intercepted in violation of the Wiretap Act includes those persons whose communications are intercepted by someone who was procured to do so by a third party. In such case, both the person who actually intercepted the communications and the person who procured the interception have violated the Act, and the victim is authorized to sue any person or entity who engaged in that violation.

436 F.Supp.2d 419, 428 (E.D.N.Y.2006). The Lonegan court explained that its reading of the legislative history suggested that the 1986 changes “were cosmetic rather than substantive.” Id. (citing S.Rep. No. 95-797, at 26-27 (1986), as reprinted in 1986 U.S.C.C.A.N. 3555, 3580-81). Importantly, though, the Lonegan court did not rely on this interpretation of § 2520(a) in disposing of the motion to dismiss before it, since, “[a]s an alternative to their procurement theory of liability, plaintiffs assert that [the defendant] intercepted their communications directly. Therefore, even if the procurement theory fails, the direct interception theory is sufficient to support the claims.” Id. (citing DIRECTV Inc. v. Barrett, 311 F.Supp.2d 1143, 1146 (D.Kan.2004) (also avoiding the question of whether § 2520(a) retains “procurement” liability)). Because its interpretation of § 2520(a) was not essential to the court’s ruling, the Lonegan court’s interpretation is merely dicta.

The Peavy court and the courts following it have reached a reasonable understanding of the relevant statutory language. Though this Court believes the Lonegan court’s interpretation of the language is also reasonable, the weight of persuasive authority, and especially the history of the statute’s amendment, compel the Court to agree with the Peavy interpretation. To allow civil “procurement” liability would render meaningless Congress’ 1986 removal of “procures any other person” from that section. Moreover, the Fifth Circuit’s Peavy decision has been on the books for nearly thirteen years, and has since been followed by the Tenth Circuit and by District Courts in other Circuits, but Congress has not chosen to amend the statute in order to correct Peavy’s interpretation. Even the Lonegan court disagreed with the Peavy interpretation only in dicta. Therefore, because one who merely “procures” the interception of communications is not civilly liable under the ECPA, summary judgment is granted in favor of Defendant Morgan on this narrow question. He cannot be held liable merely for “procuring” others to intercept Plaintiffs communications.

The Court acknowledges that it previously addressed Plaintiffs ECPA “conspiracy” allegation against Morgan, and denied Defendants’ Motion for Summary Judgment concerning it, assuming that such liability may be available. (Doc. 209 at 34-36). At that time, Defendants did not point the Court’s attention to the fact that “procurement” is not a basis for civil ECPA liability under § 2520, focusing instead on the argument that Plaintiff had insufficient evidence to support a “conspiracy” or “procurement” claim. At that time, the Court only answered the question posed by the parties, and could not grant summary judgment to Defendant Morgan because it could not “conclude that Morgan did not ‘intentionally ... procure [Petrakis and Huffman] to intercept” his communications under § 2511(l)(a),” which is the portion of the statute that defines a violation of the ECPA. As the Court noted in that Order, though, “Plaintiff does not dispute Defendants’ argument that Morgan did not actually ‘intercept’ his communications,” but relies only on “procurement” as his alleged violation. (Doc. 209 at 35).

It is now clear that “procurement” cannot support civil ECPA liability, and it is likewise clear that there can be no civil “conspiracy” (or “aiding and abetting” or “agency”) liability under the ECPA, as such forms of liability would permit plaintiffs to circumvent Congress’ intent to limit civil liability to those who have actually engaged in the prohibited practices; anyone who “procures” an interception could also be called a “conspirator,” an “aider and abettor,” or a “principal” in an agency relationship. Plaintiff is incorrect in stating that the District Court for the District of Columbia recognized an agency-type theory of liability under the ECPA in Gaubatz. There the plaintiffs had alleged a “conspiracy” or “aiding and abetting” form of liability, while the defendants argued that no such “secondary liability” was cognizable under the ECPA. Gaubatz, 891 F.Supp.2d at 24. Because the plaintiffs failed to put forth a meaningful response to the defendants’ arguments the court treated the argument as conceded, but it also noted that “secondary liability” under the ECPA was untenable for the same reasons the court rejected “secondary liability” under the SCA: that Congress had not included such liability under the statute. Id. at 25-27. Gaubatz in fact states in dicta that no form of civil “procurement,” “agency,” or “conspiracy” liability would be available under the ECPA. See also Kirch, 702 F.3d at 1247 (“ § 2520 does not impose civil liability on aiders or abettors”).

The Court thus concludes that Defendant Morgan cannot be held liable under the ECPA under “procurement,” “agency,” “conspiracy,” or any other “secondary” theories of liability, and grants summary judgment in his favor on this question.

III. Whether Plaintiff May Proceed with Claims of Illegal “Use” or “Disclosure” of His Intercepted Communications Against Defendant Morgan

As an alternative to his unsuccessful argument that the ECPA contemplates civil “procurement” liability, Plaintiff argues that he can nonetheless proceed with an ECPA claim against Defendant Morgan for “use” or “disclosure” of his illegally intercepted communications. As noted above, this question was not raised by Defendant Morgan’s instant Motion for Summary Judgment, and so Plaintiffs evidence as to those questions need not be considered. However, given that Plaintiffs brief seems to indicate an intention to proceed at trial with these claims, the Court must discuss their status.

In Plaintiffs First Amended Complaint, as well as throughout the litigation of this case, Plaintiff has always alleged only “interception,” and, in the case of Defendant Morgan, “direction” of others to intercept (also known as “procurement,” discussed above), as the violations of the ECPA he seeks to redress. (Doc. 38 at 12-13). Plaintiff, Defendants, and the Court have repeatedly characterized the claims as concerning “interception,” and have never addressed the questions of “use” or “disclosure” under the ECPA. Plaintiff cites to evidence acquired throughout the litigation that he now argues showed “use” or “disclosure” by Morgan, but it is hornbook law that he cannot amend his pleadings via summary judgment briefing. See, e.g., Anderson v. Do nahoe, 699 F.3d 989, 997 (7th Cir.2012) (quoting Grayson v. O’Neill, 308 F.3d 808, 817 (7th Cir.2002)). The earlier introduction of some of this evidence in other summary judgment briefing also does not suffice to amend his pleadings to include “use” or “disclosure,” both because of the above-cited rule, and because it was introduced to support other claims, with absolutely no reference to claims for “use” or “disclosure.” These earlier statements were not sufficient to put Defendant Morgan (or any of the other Defendants) on notice that they may have to defend claims for “use” or “disclosure,” or to inform the Court that such claims were at issue. Plaintiff has pointed to no instances where he has stated that he sought to pursue ECPA claims based on “use” or “disclosure,” and it is neither Defendants’ nor the Court’s duty to scour his briefs for hints as to additional claims he might be interested in raising. At this late date, the Court cannot permit Plaintiff to amend his Complaint to include these claims against Morgan or any of the other Defendants; they have been forfeited.

IV. Status of Count III

As a final matter, the Court must address an issue concerning Count III, which arises under the Stored Communications Act (“SCA”). In earlier orders, the Court rejected Plaintiffs SCA claims relating to his Access2Go email account and his text messages; Aceess2Go authorized the accession of Plaintiffs Aceess2Go email messages, and the Defendants did not access the text messages from storage as those terms are used in the SCA. (Docs. 249 & 268).

On February 20, 2013, the Court directed Plaintiff to indicate whether he intended to pursue his claim for Defendants’ alleged accession of his personal Yahoo! email account, as his earlier brief on damages seemed to imply that he had dropped that last-remaining SCA claim by failing to mention it at all or to give a damages estimate for the claim as directed. (Doc. 269). On February 28, in response to this Order, Plaintiff filed a “Notification.” (Doc. 270). This “Notification” was not responsive to the February 20 Order, in that it merely stated that Plaintiff wished to preserve for appeal the claims previously rejected by the Court, but failed to indicate whether Plaintiff wished to go forward with a trial on the Yahoo! email claim under Count III. It also did not supply the damages estimate for the Yahoo! email claim that had been missing from the first damages brief. The only mention of the Yahoo! email account in the “Notification” concerns allegations under the ECPA; the majority of the discussion addressed the rejected Access2Go-email SCA claim. (Doc. 249; Doc. 270 at 2). The Court should not have to guess at deciphering a party’s answer to a simple, straightforward question. Because this “Notification” did not answer the direct and narrow question put to Plaintiff, whether he wished to try the Yahoo! email claim under the SCA, the Court must again assume that Plaintiff does not wish to try the Yahoo! email claim in the upcoming jury trial, and that Count III has therefore been completely resolved at this level.

In his “Notification,” Plaintiff also asked the Court to “preserve Count III of the First Amended Verified Complaint in the event that evidence admitted at trial supports liability against Defendants pursuant to the Stored Communications Act.” (Doc. 270 at 3). To the extent Plaintiff wishes to retain the ability to present his SCA claims (or any other previously-rejected claims) to the jury in the upcoming trial, such a request is rejected. The Court has already ruled, via summary judgment, that neither the Access2Go email claim nor the text message claim under that statute are viable as a matter of law. (Docs. 249 & 268). Summary judgment is not a preliminary ruling that may be set aside to allow another attempt at trial, but is a final ruling. It is, as the Seventh Circuit has put it, the “put up or shut up” moment in a case, at which plaintiffs must put on the best ease they have to defeat a defendant’s motion. See, e.g., Delapaz v. Richardson, 634 F.3d 895, 900 (7th Cir.2011) (citing Goodman v. National Sec. Agency, Inc., 621 F.3d 651, 654 (7th Cir.2010)). Since Plaintiff failed to defeat Defendants’ Motions for Summary Judgment as to the Aecess2Go email and text message claims under the SCA, he cannot go forward to try those claims to the jury. To permit that would be to undermine the entire purpose of summary judgment. If Plaintiff disagrees with the Court’s rulings in its summary judgment orders, he is free to appeal them after the trial. At this level, though, they are final. Plaintiff is warned against attempting to reassert his rejected claims under Count III in the final pretrial order or before the jury. See Serritella v. Markum, 119 F.3d 506, 512-13 (7th Cir.1997) (citing Bastian v. Petren Resources Corp., 892 F.2d 680, 682 (7th Cir.1990)).

Conclusion

For the foregoing reasons, Defendant Morgan’s Motion for Summary Judgment (Doc. 273) is GRANTED. Plaintiff MAY NOT PROCEED on a “procurement” claim under the ECPA. In addition, Plaintiff MAY NOT PROCEED on “use” or “disclosure” claims under the ECPA against any of the Defendants. Finally, the Court herein DETERMINES that Plaintiff has implicitly indicated his abandonment of the Yahoo! email claim under the SCA, such that Count III has been completely resolved in Defendants’ favor. Plaintiff has not waived his right to appeal the Court’s rulings as to the Aecess2Go and text message claims under the SCA, but MAY NOT REASSERT those claims at trial. This matter remains set for final pretrial conference on July 10, 2013, and jury trial beginning August 5, 2013.

IT IS SO ORDERED.

ORDER & OPINION

This matter is before the Court on a sua sponte effort to “simplify the issues” for trial as suggested in Federal Rule of Civil Procedure 16, as well as a Motion for Reconsideration by Plaintiff. In the proposed Final Pretrial Order and proposed jury instructions submitted by the parties, Defendants raised the question of whether the basis of Plaintiffs Count II, the Illinois Eavesdropping Act, includes a civil cause of action for eavesdropping on electronic communications as Plaintiff alleges. Plaintiffs Motion for Reconsideration challenges the Court’s order barring him from presenting claims for “use” or “disclosure” of his communications under the Electronic Communications Privacy Act. (Doc. 285).

In his First Amended Complaint, Plaintiff claims that Defendants violated the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2511, the Illinois Eavesdropping Act (“IEA”), 720 ILL. COMP. STAT. § 5/14-1 et seq., and the Stored Communications Act (“SCA”), 18 U.S.C. § 2701 by intercepting, monitoring, and/or accessing (1) his Access2Go-provided email account, (2) his Yahoo! web-based email account, and (3) his text messages on his Blackberry device. The Court has resolved a number of these claims through Motions for Summary Judgment, such that, prior to the issuance of the instant Order, only Plaintiffs Count I and Count II claims remained, and the issues under Count I had been simplified. This matter is set for jury trial beginning August 5, 2013. The instant Order disposes of Plaintiffs Count II, such that only Plaintiffs Count I remains for trial.

Illinois Eavesdropping Act

The first issue now before the Court turns on whether 720 Ill.Comp.Stat. 5/14— 6, the civil remedy provision of the IEA includes a claim for eavesdropping upon “electronic communications,” rather than only oral “conversations.” While the definition of a criminal violation under the IEA covers such eavesdropping, the text of the civil provision does not; it only addresses “conversations.” 720 Ill.Comp. Stat. 5/14-2 & 5/14-6. The proposed Final Pretrial Order included the question of whether the IEA covers Plaintiffs allegations as a disputed legal issue, and it was incorporated into Defendants’ proposed jury instructions by asking the jury to determine whether Defendants had eavesdropped upon any of Plaintiffs oral “conversations.” Reviewing these submissions, the Court realized that this was an issue of law that the Court should deal with prior to trial, since it would either have to be addressed during the trial in consideration of the proposed jury instructions, or by the Court in a post-trial motion. Even if the issue were presented to the jury, the Court would have to address the underlying question of whether “electronic communications” are covered by the civil IEA remedy, since it would have to decide at a jury instruction conference which version of the instructions to present to the jury. It is thus inevitable that the Court would have to deal with this question, so it is better to resolve it in advance of trial and thereby simplify the trial proceedings. For that reason, the Court ordered the parties to brief the question; those briefs are now ready for consideration.

Defendants argue that the IEA’s plain text, as well as its statutory history, shows that the Illinois legislature did hot intend to create a private civil cause of action for eavesdropping upon “electronic communications.” Plaintiff argues in opposition that the statute is ambiguous and the statute’s legislative history shows that the legislature intended to include a civil cause of action for the injuries he alleges, and that, even if the statute cannot be read to include a civil cause of action for eavesdropping upon “electronic communications,” the Court should find that there is an “implied” cause of action. If the Court determines that Plaintiff cannot rely upon the IEA, Plaintiff requests that he be permitted to amend his complaint to include common law causes of action, including intrusion upon seclusion.

Plaintiff also asks the Court, if it determines that the IEA’s civil cause of action does not cover his claim, to still allow him to present his case under the IEA to the jury, in order to “avoid the possibility that a separate trial would need to be held in the event that an adverse ruling regarding the IEA is reversed on appeal.” (Doc. 284 at 17). This last request is easily disposed of and readily denied. The Court is confident in its analysis of the IEA’s applicability to this case, and will not permit Plaintiff to needlessly complicate the issues, lengthen the trial, and confuse the jury by presenting evidence, arguments, and jury instructions relating to a claim that has no basis in law.

I. Statutory Text

The IEA is found within Chapter 720 of Illinois’ statutory code, which is devoted to criminal offenses. The statute, in relevant part, provides that “(a) A person commits eavesdropping when he: (1) Knowingly and intentionally uses an eavesdropping device for the purpose of hearing or recording all or any part of any conversation or intercepts, retains, or transcribes electronic communication.” 720 Ill.Comp.Stat. 5/14-2. In a separate section, the IEA also provides for a civil remedy, stating that “(1) Any or all parties to any conversation upon which eavesdropping is practiced contrary to this Article shall be entitled to” certain remedies. 720 Ill.Comp. Stat. 5/14-6. Both “conversation” and “electronic communication” are defined in the statute: as important to the instant analysis, a “conversation” is “any oral communication between 2 or more persons”, while an “electronic communication” is “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or part by a ... computer.” 720 Ill.Comp.Stat. 5/14-

1(d) & (e). The parties here do not dispute that Plaintiffs allegations only concern “electronic communications,” and not “conversations” in the sense of “oral communications” as defined in the IEA. By the plain text of the statute, then, the IEA provides for criminal liability for those who eavesdrop upon both oral communications (“conversations”) and emails and text messages (“electronic communications”), but only offers a civil remedy to those whose oral communications are eavesdropped-upon. Defendants thus argue that Plaintiff has no statutory authority on which to base his IEA claim.

“In construing a statute, [the Court’s] primary objective is to give effect to the intent of the legislature. The most reliable indicator of that intent is the statutory language itself, which must be given its plain and ordinary meaning.” Snyder v. Heidelberger, 352 Ill.Dec. 176, 953 N.E.2d 415, 420-21 (Ill.2011) (citing Blum v. Koster, 235 Ill.2d 21, 335 Ill.Dec. 614, 919 N.E.2d 333 (Ill.2009); Illinois Department of Healthcare & Family Services v. Warner, 227 Ill.2d 223, 317 Ill.Dec. 677, 882 N.E.2d 557 (Ill.2008)). Thus, the first rule of statutory interpretation is that the text of the statute, where not ambiguous, must be given its plain meaning. Id., 352 Ill.Dec. 176, 953 N.E.2d at 421.

Plaintiffs primary argument is that the statute’s use of “conversation” and “electronic communications” is ambiguous because, in three subsections, the statute refers to both “oral conversations” and “electronic communications.” (Doc. 284 at 6-7). Plaintiff asserts that, because “conversation” is defined in the definitions section of the statute by reference to the word “oral,” such usage assumes that there might be non-oral “conversations,” arguing that “if ‘conversation’ already-meant ‘oral conversation,’ there would have been no reason to insert the word ‘oral’” in §§ 5/14-1, 5/14-2, and 5/14-4. (Doc. 284 at 7). Having reviewed these subsections in context of the entire statute, the Court finds that the seemingly-redundant use of the term “oral” was plainly intended to further clarify the difference between a spoken conversation and a written electronic communication; in effect, it carried the definition of the term “conversation” into the operative parts of the statute. Similarly, the use of “any” to modify “conversation” still modifies only the term “conversation” as defined in § 5/14-l; “any conversation” cannot refer to both “conversations” and “electronic communications,” since each term is separately defined. The legislature would have had to say something like “any conversation or communication,” in order to convey the meaning Plaintiff suggests.

Moreover, the exclusion of “electronic communications” from the civil remedy provision is not an absurd or even unreasonable effect of the statute. It is not unreasonable to find that the legislature intended to keep civil liability under the statute to a minimum by not including electronic communications within the civil remedy provision. Conversely, it is also not unreasonable to assume that the legislature felt that only eavesdropping upon oral conversations created the sort of harms that should be remedied by damages, while electronic communications were adequately protected by the criminal provision.

The Court therefore finds that the IEA, as written, is clear in distinguishing between oral conversations and written electronic communications such as emails and text messages, and in providing no civil remedy for eavesdropping upon electronic communications.

II. Legislative History

Courts only turn to legislative history for aid in interpreting a statute when the text of a statute is ambiguous. People v. Jones, 214 Ill.2d 187, 291 Ill.Dec. 663, 824 N.E.2d 239, 242 (Ill.2005) (citing People v. Whitney, 188 Ill.2d 91, 241 Ill.Dec. 770, 720 N.E.2d 225 (Ill.1999)) (“Where the legislature’s intent is not clear from the statute’s plain language, the court may examine the legislative history.”). As explained above, Plaintiffs attempt to find an ambiguity that would justify resort to legislative history fails — the statute could not be clearer, and so the Court need not look to the legislative history. In this case, though, the legislative history is at least as supportive of Defendants’ position as Plaintiffs, and in fact appears to confirm the plain text of the statute.

Prior to 2000, civil liability under the IEA was co-extensive with the statute’s criminal prohibition; both sections addressed eavesdropping on “conversations.” In that year, though, the Illinois legislature made eavesdropping on “electronic communications” a criminal offense, and added the relevant definition of that term to § 5/14-1 of the statute via Public Act 91-657, which originated as House Bill 526, “An Act concerning criminal law.” No change was made to the civil remedy provision found at § 5/14-6.

As originally introduced in the Illinois House of Representatives, House Bill 526 added language that would have covered electronic communications to the definition of “conversation,” rather than changing the section defining the elements of the offense. (Doc. 283, Ex. F). If this version had been enacted, electronic communications would have been included in the “conversations” protected by both the criminal and civil provisions of the IEA. However, the legislature subsequently changed the structure of the amendment, separately defining “electronic communications,” and adding coverage of such communications to the definition of the criminal offense at § 5/14-2. (Doc. 283, Ex. H). See also 1999 Ill. Legis. Serv. P.A. 91-657 (H.B.526).

As Plaintiff points out, “there is no dispute between the parties that, if House Bill 526 as engrossed had been approved and become law, the civil cause of action would have provided a civil remedy to an individual for any crime committed pursuant to the IEA.” (Doc. 284 at 9). Contrary to Plaintiffs argument, though, the fate of House Bill 526 cuts in favor of Defendants. Courts must apply the law as it is, not as it might have been, and, as Plaintiff concedes, House Bill 526 “as engrossed” did not become law. House Bill 526 “as enrolled” became law, and this version of the bill did not include a civil remedy for eavesdropping upon electronic communications; the version enacted does not change the scope of the civil remedy provision, and the version that was rejected would have done so. Plaintiff argues that this was due to an oversight, noting that the legislators apparently did not debate the decision to separately define “electronic communications” and include them only within the criminal offense. While this is a possible interpretation, the text actually reflects the more-likely possibility that the legislature intentionally separated “conversations” from “electronic communications,” and protected the latter only via the criminal law; since this alteration to the bill more-clearly carried out the legislature’s intent, there was no need to specifically debate it. The Court cannot “read in” that which the legislature appears to have intentionally left out. Not only is the statute unambiguous, the legislative history does not support Plaintiffs argument.

The unambiguous use of “any conversation” in § 5/14-6 and both “oral conversation” and “electronic conversation” in §§ 5/14-1, 5/14-2, and 5/14-4 is clarified by the legislative history. As noted above, the civil remedy provision was not changed by the 2000 amendment, so the use of “any conversation” in § 5/14-6 could not have been motivated by a desire to include both “conversations” and “electronic communications” within that section’s coverage, since that language predated the inclusion of “electronic communications” in the IEA. Likewise, the word “oral” was used to modify “conversation” in § 5/14-1 as the statute existed prior to the 2000 amendment, and was added to §§ 5/14-2 and 5/14-4 by the 2000 amendment, when the term “electronic communication” was also added to those sections. The use of the term “oral conversation” in some sections of the IEA, then, does not imply that the unmodified use of “conversation” in § 5/14-6 should be read to include both “conversations” and “electronic communications,” since “oral conversation” was unambiguously used in the statute prior to 2000.

The history of Public Act 91-657 helps to explain why the legislature focused only on expanding the scope of the criminal offense. The legislative history documents the parties have submitted indicate that the amendments were requested by the Cook County State’s Attorney’s Office in order to allow it to combat criminal gangs’ use of electronic devices to intercept law enforcement communications. (Doc. 283, Ex. A at 1, Ex. B at 2, Ex. C at 1). The legislature was simply not concerned with the civil cause of action; it had only been asked to address criminal activity that was thwarting law enforcement. With this understanding of the legislative history, it is obvious that the legislature did not intend to make any change to the civil cause of action, and that its amendments to the IEA accomplished the intended goal.

Though the text of the statute was clear, and there was no need to resort to the IEA’s legislative history, the Court’s review of that history confirms the plain reading of the statute’s text: the IEA’s civil cause of action does not permit recovery for eavesdropping upon “electronic communications,” though such eavesdropping is a criminal offense.

III. Implied Cause of Action

Finally, Plaintiff argues that the Court should find that there is an implied civil cause of action for eavesdropping upon electronic communications under the IEA, and thereby allow him to proceed with his Count II. Plaintiff cites no case in which any court has implied such a cause of action under the IEA, and the Court’s research has not revealed any, either. The cases Plaintiff does cite, and which the Court has reviewed in its research, indicate that it would be inappropriate to imply a cause of action in this case.

The Illinois courts will imply a civil remedy to redress injuries under statutes that do not explicitly provide for such remedies, but there are limits to such implied causes of action.

Implication of a private right of action is appropriate if: (1) the plaintiff is a member of the class for whose benefit the statute was enacted;(2) the plaintiffs injury is one the statute was designed to prevent; (3) a private right of action is consistent with the underlying purpose of the statute; and (4) implying a private right of action is necessary to provide an adequate remedy for violations of the statute.

Fisher v. Lexington Health Care, Inc., 188 Ill.2d 455, 243 Ill.Dec. 46, 722 N.E.2d 1115, 1117-18 (Ill.1999). The fourth factor is the most important limitation on the power of courts to imply a cause of action: a cause of action may be implied “only in cases where the statute would be ineffective, as a practical matter, unless such an action were implied.” Fisher v. Lexington Health Care, Inc., 188 Ill.2d 455, 243 Illl.Dec. 46, 722 N.E.2d 1115, 1120 (Ill.1999) (citing Abbasi ex rel. Abbasi v. Paraskevoulakos, 187 Ill.2d 386, 240 Ill.Dec. 700, 718 N.E.2d 181, 186 (Ill.1999)) (emphasis added). See also Cima v. Wellpoint Healthcare Networks, Inc., No. 05-CV-4127-JPG, 2006 WL 1914107, *5 (S.D.Ill. Jul. 11, 2006) (characterizing this as most important factor). Thus, the absence of this factor alone will prevent a court from implying a cause of action. Abbasi, 240 Ill.Dec. 700, 718 N.E.2d at 185 (quoting Board of Education v. A, C & S, Inc., 131 Ill.2d 428, 137 Ill.Dec. 635, 546 N.E.2d 580, 600 (1989)) (unnecessary to consider first three factors where fourth is lacking). Applying this test, it appears that Plaintiff is likely a member of the class to be protected under the IEA, and that his alleged injury is likely one that the statute was intended to prevent. However, the latter two elements are missing.

While it does not seem, superficially, to be inconsistent with the purpose of the statute to permit Plaintiff to proceed with an implied cause of action against Defendants, the Southern District of Illinois’ analysis in Cima v. Wellpoint Healthcare Networks, Inc. indicates that the Court should consider whether the existence of certain enforcement mechanisms evinces an intent to exclude others. 2006 WL 1914107, *8 In Davis v. Dunne, the Illinois Appellate Court “found that the enumeration of three governmental agencies to conduct prosecutions for violations of the [Civil Service] Act indicated the legislature’s intention to limit the remedies provided thereunder to the criminal penalties set forth in the Act.” Cima, 2006 WL 1914107, *8 (citing 189 Ill.App.3d 739, 136 Ill.Dec. 1015, 545 N.E.2d 539, 540 (Ill.Ct.App.1989)). In light of Davis, the Cima court was “hesitant” to accept the plaintiffs’ argument that whether an administrative agency actually chose to enforce a given provision of a statute was relevant to whether the legislature’s purpose would be furthered by implying a private cause of action. Cima, 2006 WL 1914107, *8. To the Cima court, the implication of these cases is that the delegation of enforcement authority to a governmental entity is “strong evidence of the legislature’s intention not to create a private right.” Id.

This Court finds that the fact that the legislature did create both criminal liability for Plaintiffs alleged injury and an explicit cause of action for different violations of the IEA indicates that it is inappropriate to imply a private cause of action for eavesdropping upon “electronic communications” here. The fact that it did not choose to expand the private cause of action to include “electronic communications” when it amended the criminal offense indicates that it does not intend for there to be a civil cause of action for eavesdropping upon “electronic communications.” Where a legislature specifically provides for one type of recovery, but excludes others, a court can infer that such exclusion was intentional, especially in circumstances such as this, where excluded cause of action is otherwise addressed in the statute. See Davis, 136 Ill.Dec. 1015, 545 N.E.2d at 541 (legislature’s provision of limited remedies indicates an intent to limit remedies to those provided). Since Illinois’ willingness to imply a cause of action into a statute is predicated on its compatibility with the legislature’s intent, the Court cannot add a type of recovery that was specifically excluded by the legislature.

Finally, the fourth and most important factor is missing; the statute’s protection against eavesdropping upon “electronic communications” can be effectively enforced via criminal prosecutions under § 5/14-2 such that the statute is effective even without a private civil cause of action against such eavesdropping. Moreover, as demonstrated by Plaintiffs instant suit and his request to amend his complaint, both federal law and Illinois’ common law provide ample remedial opportunities for those whose electronic communications have been wrongfully captured.

There is no per se rule that the existence of a criminal enforcement provision bars the implication of a private cause of action for a statute under the fourth factor, but Illinois courts consider the nature of the statute, whether its purpose can be accomplished without the implication of a private cause of action, and whether the plaintiffs injury can otherwise be remedied. Rhodes v. Mill Race Inn, Inc., 126 Ill.App.3d 1024, 81 Ill.Dec. 793, 467 N.E.2d 915, 917 (Ill.App.Ct.1984) (citing Heimgaertner v. Benjamin Electric Mfg. Co., 6 Ill.2d 152, 128 N.E.2d 691 (Ill.1955); Burton v. McClellan, 3 Ill. 434, 437 (Ill.1840)). Applying those considerations to this case, it would be inappropriate to imply a cause of action for eavesdropping upon “electronic communications.”

The IEA is primarily a criminal statute, and eavesdropping upon “electronic communications” is a felony offense. 720 Ill.Comp.Stat. 5/14-4. It does appear that there has been no attempt at prosecution in this case, but none of the cited Illinois cases considering statutes containing public enforcement mechanisms turned on whether the designated enforcement agencies had actually prosecuted or imposed a regulatory penalty. The question is whether the statute as written can be effected, not whether it was effective to prevent or redress the alleged harm in the instant case. The fact that the state’s attorney has apparently chosen not to attempt a prosecution in this case is simply an exercise of prosecutorial discretion, and does not prove that the statute is ineffective. The IEA’s purpose of preventing eavesdropping upon “electronic communications” can be accomplished through its criminal enforcement mechanism. The Court thus “cannot say that the statutory framework the legislature did provide is so deficient that it is necessary to imply a private right of action for [Plaintiff] in order to effectuate the purpose of the” IEA. Fisher, 243 Ill.Dec. 46, 722 N.E.2d at 1121.

It also relevant whether those who are victims of the statutory violation have other available means of vindicating their injuries. In Asllani v. Board of Education, the Northern District of Illinois based its decision not to imply a private cause of action, in part, on the fact that the plaintiff could recover under the Illinois Human Rights and Title VII if her claims were meritorious. 845 F.Supp. 1209, 1224 (N.D.Ill.1993). Similarly, the Cima court relied on the fact that the “plaintiffs have alternative avenues to vindicate their rights” in determining that an implied cause of action was not necessary. 2006 WL 1914107, 11 (citing Asllani, 845 F.Supp. at 1225; Corgan v. Muehling, 143 Ill.2d 296, 158 Ill.Dec. 489, 574 N.E.2d 602, 610 (Ill.1991)). Here, as Plaintiffs claims and instant requests to amend show, there are several applicable federal statutes and common law theories of recovery of which a victim of eavesdropping upon “electronic communications” could avail himself. The fact that these theories may not ultimately pan out for a plaintiff does not mean that a court must create a cause of action that will give him a victory. In holding that it is not necessary to imply a cause of action for a victim of a statutory violation, courts look to whether the violation of the statute can be redressed under other theories, not whether they would actually be successful for the particular plaintiff in the case before them.

The Court therefore cannot imply a private cause of action under the IEA to redress Plaintiffs alleged injuries. Plaintiffs request to amend his complaint to add common law causes of action will be discussed below.

Plaintiff’s Motion for Reconsideration

In his Motion for Reconsideration, Plaintiff asks the Court to reconsider its decision to bar him from presenting claims based on “use” or “disclosure” of his communications under the ECPA. (Doc. 285). In his Response to Defendant Morgan’s Motion for Summary Judgment on the question of whether he could be held civilly liable under the ECPA on a “procurement” theory, Plaintiff, for the first time, stated that he intended to proceed on an ECPA claim for “use” and/or “disclosure” of his communications against at least Defendant Morgan. (Doc. 276 at 10-11). The Court noted that

[I]n Plaintiffs First Amended Complaint, as well as throughout the litigation of this case, Plaintiff has always alleged only “interception,” and, in the case of Defendant Morgan, “direction” of others to intercept (also known as “procurement,” discussed above), as the violations of the ECPA he seeks to redress. (276 at 10). Plaintiff, Defendants, and the Court have repeatedly characterized the claims as concerning “interception,” and have never addressed the questions of “use” or “disclosure” under the ECPA.

(Doc. 276 at 10-11). The fact that Plaintiff had apparently collected evidence, or even admissions, of “use” or “disclosure” was “not sufficient to put Defendant Morgan (or any of the other Defendants) on notice that they may have to defend claims for “use” or “disclosure,” or to inform the Court that such claims were at issue.” (Doc. 276 at 11). The Court therefore determined that Plaintiff had forfeited these claims by failing to make them more explicit.

In his instant Motion for Reconsideration, Plaintiff argues that Defendants had adequate notice of his intention to pursue claims based on “use” or “disclosure” because evidence was gathered in discovery and cited in summary judgment briefing that Defendants in fact “used” or “disclosed” Plaintiffs communications. The Court has already considered this argument, finding that “it is neither Defendants’ nor the Court’s duty to scour his briefs for hints as to additional claims he might be interested in raising.” (Doc. 276 at 11). When it became apparent that the parties and the Court understood Plaintiffs ECPA claims to be limited to injuries arising from “interception” of his communications (or its “procurement,” in the case of Morgan), Plaintiff should have informed the Court that he also intended to seek redress for his alleged injuries caused by Defendants’ “use” or “disclosure” of his communications. Instead, he allowed Defendants and the Court to persist in the belief that only “interception” or its “procurement” were at issue, complaining only when his “procurement” claim against Morgan eventually foundered on the rocks of the statutory text.

Finally, contrary to Plaintiffs warnings, there will be no need to amend the complaint after trial in order to “conform the pleadings to the evidence,” because Federal Rule of Civil Procedure 15(b)(2) provides that such post-trial amendment occurs only “[wjhen an issue not raised by the pleadings is tried by the parties’ express or implied consent.” Here, there cannot have been any “express or implied consent of the parties” to try the issues of “use” or “disclosure,” as those issues have never been affirmatively presented or litigated. As discussed further below, nothing prevented Plaintiff from moving to amend his complaint as soon as he had gathered the evidence to support these claims, which was, at the latest, over a year ago — his poor strategic decision does not justify drawing out this litigation even further.

Plaintiffs Motion for Reconsideration is thus denied. Plaintiffs request to amend his complaint to add a ECPA claims for “use” or “disclosure” is discussed below.

Plaintiff’s Requests to Amend

In the event that the Court determines that Plaintiff cannot proceed with an IEA claim, Plaintiff requests leave to amend his complaint to add state common law theories, including intrusion upon seclusion and invasion of privacy. Similarly, if the Court declines to reconsider its determination that Plaintiffs First Amended Complaint does not include claims based on “use” or “disclosure,” Plaintiff requests leave to add those claims to a new complaint. He asserts that the addition of these theories would require no new discovery, but would instead be predicated solely on facts he has already gathered.

Federal Rule of Civil Procedure 15(a)(2) provides that “The court should freely give leave [to amend a complaint] when justice so requires.” However, it is well-established that “[district courts have broad discretion to deny leave to amend where there is undue delay, bad faith, dilatory motive, repeated failure to cure deficiencies, undue prejudice to the defendants, or where the amendment would be futile.” Hukic v. Aurora Loan Services, 588 F.3d 420, 432 (7th Cir.2009) (citing Arreola v. Godinez, 546 F.3d 788, 796 (7th Cir.2008)). The Court denies Plaintiffs request to amend his complaint to add new theories and claims.

Plaintiff initiated the instant suit in April 2010, well over three years ago. Pursuant to a scheduling order, all discovery was to have been completed by March 15, 2012. (Doc. 153). Plaintiff now asserts that he adduced all the evidence needed to support his proposed new theories during discovery, such that additional discovery would not be needed. The obvious implication of this is that Plaintiff had all the evidence needed to amend his complaint as he now proposes in March 2012, one year and four months ago. Plaintiff offers no real explanation for his delay; he merely argues that the Court’s rulings since January 2013 somehow necessitate the addition of the new theories.

Essentially, Plaintiff asks the Court to allow him to restructure his case now that he knows that some of his original theories and claims will not be successful. Plaintiff contends that this is only fair because the Court’s recent rulings have considerably cut back on his potential to recover. His basic argument is “what’s good for the goose is good for the gander:” if Defendants have been allowed to file motions attacking the sufficiency of his claims at a late date, he should be allowed to remedy this damage to his case by stating new, more-viable claims or legal theories. Adding new theories and claims, though, is different from eliminating issues prior to trial. The elements of Plaintiffs claims have always been at issue in this litigation — whether they were resolved prior to trial or by a jury, they have to be resolved, and such resolution must be within the bounds of the applicable law. On the other hand, Plaintiffs request to amend contemplates the addition of new issues to the suit.

The Court is of course cognizant of the fact that federal plaintiffs need not plead legal theories in their complaints, and that the addition of a new theory of recovery, if based on the same alleged injury, does not necessarily add a new “claim.” The implication of this is that a new legal theory (unlike a new claim) does not fundamentally change the complaint, and cannot be considered an unfair “surprise” to a defendant. Here, though, nothing prevented Plaintiff from amending his complaint at least at the close of discovery if he discovered evidence that would support different theories of recovery. The notion that Plaintiff was “content” with his “right to present evidence” under Counts I, II, and III, and that he thus “did not file redundant or overlapping claims” does not excuse the delay. (Doc. 284 at 16). There was no such “right to present evidence” as to claims that were not supported by the applicable law — as .of December 2012, it appeared to the Court that all the legal issues that could be resolved had been, but that appearance did not create a “right to present evidence” as to defunct theories. Nothing to which he was entitled was taken from Plaintiff by the Court’s ruling upon Defendants’ Motions for Summary Judgment. While the Court appreciates Plaintiffs attempt to simplify the case by not adding his duplicative theories when it became apparent that they might be available, this was a strategic mistake on his part. Plaintiffs cannot hold theories in reserve, just in case their original strategy does not pan out, and add them when the case starts to look bad. Plaintiff has simply delayed too long by waiting until just a few weeks prior to trial to seek leave to amend.

Moreover, despite Plaintiffs contentions, the Court would almost certainly have to allow Defendants time to conduct additional discovery if it allowed Plaintiff to amend, in order to develop any applicable defenses they may have to the new theories, and Defendants would have to be permitted to file new dispositive motions if there were any issues appropriate for the Court’s resolution. Plaintiffs proposed amendments would certainly significantly delay the trial. Again, the fact that Defendants’ January 2013 Motion for Summary Judgment also delayed the trial is a completely separate issue, as the elements of Plaintiffs claims are always at issue, while the addition of new theories introduces new issues to the case.

The Court therefore denies Plaintiffs requests to amend his complaint.

Conclusion

For the foregoing reasons, Plaintiffs Count II is DISMISSED WITH PREJUDICE, and Plaintiffs Motion for Reconsideration (Doc. 285) is DENIED. This matter will proceed with the Final Pretrial Conference on July 24, 2013 at 11:00 A.M., and jury trial beginning August 5, 2013. 
      
      . Plaintiff also initially made a claim pursuant to the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, but it was rejected after the first Motion for Summary Judgment attacking it, and has not been at issue since that ruling. (Doc. 209 at 32-34).
     
      
      . Likewise, the Court has assumed that "secondary” liability may be available under the SCA, though the District Court for the District of Columbia’s decision in Council on American-Islamic Relations Action Network, Inc. v. Gaubatz calls this assumption into question. 891 F.Supp.2d 13, 26-27 (D.D.C.2012)
     
      
      . Contrary to Plaintiffs view, this Court's opinion in the case of Moran v. United States does not support Plaintiff's contention that Defendant’s Motion is in violation of the Local Rules and should be rejected. In Moran, the Court noted that a party responding to a motion for summary judgment, if that party has the burden of proof at trial, bears the “onus ... to present ... 'specific facts showing a genuine issue for trial,’ ” and that Local Rule 7.1 explains the proper manner in which to present these facts. No. 07-cv-4077, 2010 WL 744299, *2 (C.D.Ill. Feb. 25, 2010). Moran does not stand for the proposition that in all cases a defendant must include a statement of facts with its motion for summary judgment based on a question of pure statutory interpretation.
     
      
      . In his First Amended Complaint, Plaintiff specifically alleged that “Defendants ... directed ... the installation of spyware ... for the purpose of intercepting” his communications, "Petrakis intercepted,” and "Defendants intercepted.” (Doc. 38 at 12). He does not use the term “procures,” though the "directed ... the installation” allegation would suffice to indicate such a claim.
     
      
      . Plaintiff cites to the Court’s discussion of his SCA claim against Morgan at pages 37-38 of the November 29, 2011 Order on Defendants' Motion for Summary Judgment (Doc. 209), which is of course inapplicable to the ECPA claim. As discussed below, however, there are no remaining claims under the SCA, so the Court need not address the question of whether "secondary” liability is available under the SCA.
     
      
      . On its initial reading, the Court misunderstood the requests made in the "Notification,” and issued an Order discussing the damages available on the Yahoo! email SCA claim; in light of the instant discussion, that Order is stricken as moot. (Doc. 272).
     
      
      . Plaintiff's assertions in the "Notification” relate primarily to whether Defendants accessed his Access2Go email from storage, but the Court’s rejection of his claim was based on the fact that Defendants had authorization from Access2Go, the provider of the email system, to access the messages, not on whether they actually undertook such access. (Doc. 249).
     
      
      . Plaintiff also initially made a claim pursuant to the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, but it was rejected after the first Motion for Summary Judgment attacking it, and has not been at issue since that ruling. (Doc. 209 at 32-34).
     
      
      . Neither party had previously pointed out this discrepancy between the criminal and civil provisions.
     
      
      . In interpreting a state statute, a federal court must apply that state’s statutory construction principles. See Brownsburg Area Patrons Affecting Change v. Baldwin, 137 F.3d 503, 507 (7th Cir.1998).
     
      
      . As discussed further below, the legislative history emphatically supports this clear reading.
     
      
      . The legislative history discussed above can be read as calling this assumption into question: if the legislature’s goal in amending the IEA in 2000 was to address the problem of gangs’ eavesdropping upon law enforcement communications, as appears to have been the case, then the IEA’s protection of “electronic communications” was not intended to protect Plaintiff or his "electronic communications.” See Fisher, 243 Ill.Dec. 46, 722 N.E.2d at 1117-18 (discussing legislative history to limit class of protected individuals). The Court’s analysis does not hinge upon this observation, though, because the statute itself contains no such limitation upon its intended scope. There is no indication in the statute that eavesdropping upon private (non-law enforcement) “electronic communications” is exempt from criminal penalties.
     
      
      . In Cima, the plaintiffs cited an Illinois Appellate Court decision implying a cause of action where the administrative agency charged with enforcement of the statute provided a letter stating that it did not enforce the relevant provision. 2006 WL 1914107, *8 (citing Casualty Ins. Co. v. Hill Mech. Group, 323 Ill.App.3d 1028, 257 Ill.Dec. 175, 753 N.E.2d 370, 378 (Ill.App.Ct.2001)). In light of the agency’s policy of non-enforcement, the state court found that the statute was ineffective. Id. (citing Casualty Ins. Co., 257 Ill.Dec. 175, 753 N.E.2d at 378). There is no indication in this case that the State's Attorney has a policy of non-enforcement of the IEA’s criminal provisions.
     
      
      . As it stands, the forfeiture of the "use” and "disclosure” claims only affects Plaintiff’s claims against Defendant Morgan, as the Court has already determined that the other Defendants "intercepted” Plaintiff's communications within the meaning of the ECPA. The "use” and "disclosure” claims, like the "interception” claim, are subject to the exemptions for consent and actions in the ordinary course of business that will be the subject of the upcoming jury trial, such that Defendants Petrakis and Huffman will be subject to the same liability under "interception” as they would if Plaintiff were allowed to proceed with "use” or "disclosure” claims against them.
     
      
      . This distinction is applicable only to the new common law theories, as they could be limited to the same actions and injuries forming the base of Plaintiff’s suit thus far. On the other hand, the “use” and "disclosure” allegations would constitute new claims, as they complain of different conduct and different resulting injuries.
     
      
      . Even if the Court had declined to consider Defendants' recently-raised arguments, the Court would have had a duty to ensure that the instructions presented to the jury stated the law correctly — Plaintiff might have been able to present all the arguments and evidence he wished, but the jury instructions would have led to the same results that have now been obtained through the Court’s rulings. For the sake of simplicity, clarity, and thoroughness of disposition, it is preferable to resolve these legal questions through briefing and written orders, rather than in jury instruction conferences.
     
      
      . The Court does not herein intend to express its approval of Defendants’ late-filed Motions for Summary Judgment and recent introduction of the question regarding the applicability of the IEA within the proposed Final Pretrial Order and proposed jury instructions, but merely to distinguish between untimely actions attacking Plaintiff's existing claims and late additions to the case.
     