Cybersecurity Litigation

Utah Computer Abuse and Data Recovery Act (CADRA) Attorney

Trial-ready CADRA representation for businesses confronting cyberattacks, insider misuse, and digital account hijacks across Utah.

Business & Chancery Court CADRA filingsDigital account takeover recoveryCloud system breach response
Last Updated: November 2, 2025Focused on Utah's Business & Chancery Court

Unauthorized computer access shuts down revenue channels, freezes executive dashboards, and erases years of digital reputation in minutes. CADRA gives Utah businesses a civil weapon to reclaim control, pursue injunctions, and recover the value lost to cyberattack litigation and insider interference.

Our CADRA team works inside Utah's Business and Chancery Court and federal court, sequencing emergency hearings, forensic preservation, and public-facing recovery plans so the business—not the attacker—dictates the timeline.

Every engagement begins with an evidence sweep, a forum strategy, and coordination with insurers and internal security teams. That alignment keeps courtroom leverage high while executives receive clear, data-driven reporting on the status of their digital assets.

Why CADRA matters now

Utah enacted CADRA to close gaps left by the federal Computer Fraud and Abuse Act. The statute delivers a civil cause of action that keeps control with the business, not prosecutors, and it matches the reality of cloud-first infrastructure.

  • Bench trials before Judge Rita Cornish in the statewide Business and Chancery Court.
  • Statutory damages, injunctions, and attorneys' fees to offset response costs.
  • Coverage for external hackers and insiders who weaponize retained credentials.

Statutory anchors

  • Utah Code § 63D-3-101 et seq. — Title 63D (Information Technology Act), Chapter 3, Part 1 (Computer Abuse and Data Recovery Act), enacted by H.B. 241 (2016) to provide a civil remedy distinct from the criminal Computer Crimes Act in Title 76, Chapter 6, Part 7.
  • Utah Code § 78A-5a-102 & -103 — Business & Chancery Court jurisdiction
  • Utah Rules of Business & Chancery Court Procedure — Effective 2024

We translate these statutes into courtroom leverage within hours of engagement so digital assets and executive messaging stay aligned.

Utah CADRA emergency engagement

Step 1

Stabilize digital assets

Lock compromised accounts, trigger multifactor resets, and coordinate with platforms like Google, Meta, Microsoft, and domain registrars so attackers lose their foothold while evidence preservation begins.

Step 2

Build the CADRA record

Document protected computers, authorization history, and financial impact. We pair forensic reports with affidavits so temporary restraining orders and injunctions are supported from the first filing.

Step 3

Litigate for recovery

File Business and Chancery Court CADRA claims, parallel CFAA counts, and related contract and trade secret claims. Discovery stays synchronized with negotiation leverage and potential appellate issues.

Common CADRA threats we litigate

Cybersecurity incidents rarely arrive as single-issue disputes. We coordinate CADRA counts with contract, fiduciary duty, trade secret, and insurance claims so the response covers every angle.

Insider lockouts

Former employees, contractors, and departing owners who retain credentials and weaponize them after termination. We revoke access, document duty-of-loyalty breaches, and pursue CADRA damages.

Digital account hijacks

Takeovers of Google Business Profiles, social media, CRMs, and advertising dashboards that erase public visibility and reroute customers overnight.

Cloud system breaches

Unauthorized entry into SaaS platforms housing financial data, subscription records, patient information, or proprietary IP—often paired with ransomware demands or destructive commands.

Credential trafficking

Password sharing, access token sales, and scripted backdoors that qualify as trafficking in technological access barriers under CADRA.

Utah CADRA attorney representation
Utah CADRA counsel restores command of mission-critical systems, sequences injunction hearings, and keeps leadership informed with courtroom-grade reporting.

What is Utah's CADRA (Computer Abuse and Data Recovery Act)?

The Computer Abuse and Data Recovery Act empowers companies to sue for unauthorized computer access involving protected computers, whether the adversary is an external hacker, a former employee, or a vendor that exceeded permission. CADRA mirrors pieces of Florida's statute and the federal CFAA while broadening coverage for cloud infrastructure and digital accounts that drive modern businesses.

CADRA claims frequently request economic damages, injunctions, and attorneys' fees. Courts can compel password turnover, disable malicious commands, and order the return of misappropriated data. Because CADRA recognizes the realities of SaaS architecture, it treats cloud platforms, websites, marketing assets, and connected equipment as protected computers.

What is a "Protected Computer" Under CADRA?

CADRA defines computer broadly: any electronic, magnetic, optical, or other high-speed data processing device—plus the data storage and communications facilities that operate with it. To qualify, the system must serve business operations and require passwords, tokens, keys, or other security credentials.

In practice, nearly every mission-critical application for Utah businesses is a protected computer. Google Business Profiles, SaaS billing portals, EMR platforms, proprietary software, and remote servers all fall inside CADRA's scope, giving companies leverage to force credential returns and recover downtime losses.

Protected assets we secure

  • Google Business Profile, Google Ads, and Microsoft Advertising accounts
  • Instagram, Facebook, LinkedIn, X, and TikTok business channels
  • Salesforce, HubSpot, and vertical CRMs containing customer data
  • Cloud storage platforms such as Google Drive, Dropbox, Box, AWS, and Azure
  • Hosted email services including Google Workspace and Microsoft 365
  • E-commerce, scheduling, and payment portals that keep revenue flowing

What Counts as "Unauthorized Access"?

CADRA distinguishes authorized users from unauthorized users based on permission at the moment of access. Individuals become unauthorized when they circumvent security controls or keep logging in after the relationship ends. Insider investigations routinely uncover former executives, contractors, or marketing vendors who retained credentials and weaponized them post-termination.

Evidence ranges from log files, MFA alerts, and password reset emails to audit trails from cloud providers. We preserve those artifacts with forensic partners so Business and Chancery Court pleadings survive scrutiny and injunction requests land fast.

Types of CADRA Violations

CADRA cause

Unauthorized information obtaining

Accessing protected computers without permission to download client lists, siphon financial records, or spy on executive communications after the relationship ends.

CADRA cause

Transmission of harmful programs

Deploying malware, ransomware, destructive code, or malicious commands that encrypt, delete, or alter company systems.

CADRA cause

Trafficking in access barriers

Sharing, selling, or scripting credentials, authentication tokens, and backdoor tools that unlock protected computers for unauthorized users.

We frequently pair CADRA counts with breach of contract, fiduciary duty, Utah Trade Secrets Act, and tortious interference claims so damages and injunctions cover the full scope of harm.

Digital Account Takeovers and Cloud System Breaches

A single Google Business Profile hijack can erase years of five-star reviews, reroute phone calls, and eliminate map listings. CADRA treats those accounts as protected computers, allowing courts to order immediate credential return and damages for lost visibility. We run platform recovery requests in parallel with CADRA filings so reviews, map pins, and inbound leads come back online quickly.

Cloud system breaches often involve SaaS platforms hosting inventory, subscription data, or patient information. Our Utah cybersecurity litigation team aligns forensic investigation, breach notifications, and courtroom strategy so regulatory obligations match trial preparation. When ransomware or destructive commands threaten operations, we seek injunctions compelling decryption keys and prohibiting further interference.

Damages Available Under CADRA

CADRA authorizes recovery of economic losses tied to unauthorized access: revenue disruption, remediation expenses, cybersecurity consultant fees, incident response costs, and reputational harm from prolonged downtime. Courts may also award consequential damages for lost contracts or advertising spend when digital systems fail.

Injunctive relief can be just as valuable. Courts order password transfers, prohibit further access, mandate the return of misappropriated data, and freeze digital assets under attacker control. With fee shifting available, businesses can pursue relief without bearing the full cost of litigation.

CADRA in Utah's Business and Chancery Court

Utah's Business and Chancery Court opened on October 1, 2024, creating a specialized statewide bench for complex commercial disputes. CADRA claims meeting the $300,000 threshold or seeking purely equitable relief land here, where Judge Rita Cornish presides without juries and publishes opinions that will shape Utah cyber jurisprudence.

We evaluate each incident for BCC eligibility, leveraging streamlined procedures, technology-fluent case management, and published precedent. When cross-forum coordination is necessary, we align CADRA filings with federal CFAA claims or arbitration demands to keep pressure consistent.

Read more in our Utah Business and Chancery Court resource about jurisdiction, procedures, and early decisions shaping CADRA litigation statewide.

CADRA vs. the Federal Computer Fraud and Abuse Act

The federal CFAA offers powerful remedies, but circuit splits and jurisdictional requirements can slow relief. CADRA gives Utah companies a clear state-level avenue with fee shifting and a specialized forum, while preserving the option to pursue CFAA claims in the U.S. District Court for the District of Utah.

We assess venue, removal risk, jury considerations, and discovery scope before filing. When parallel proceedings make sense, we synchronize pleadings so evidence developed in one forum advances leverage in the other.

Insider Threats: Former Employees and Contractors

Insider threats rarely announce themselves. Terminated employees may copy contact databases, alter automation settings, or delete shared drives. Former contractors and vendors sometimes leave behind administrative backdoors. CADRA treats each post-termination login as unauthorized access subject to injunctions and damages.

We pair CADRA claims with contract enforcement, fiduciary duty allegations, and Utah Trade Secrets Act counts. HR records, termination notices, and policy acknowledgments feed the evidentiary record, while security teams lock down future risk.

Representative matter

Cyber liability and CADRA emergency

Coordinated Business and Chancery Court filings after a cyberattack locked a statewide service company out of its Google Business Profile, Microsoft 365 tenant, and payment portals. We secured emergency relief compelling credential return while subpoenas unmasked John Doe defendants.

Representative matter

Asset purchase agreement dispute

Pursued CADRA, breach of contract, and fiduciary duty claims when former owners continued accessing a medical practice's cloud-based EMR system after closing, interfering with accounts receivable and patient scheduling.

Representative matter

Corporate governance & ultra vires actions

Integrated CADRA counts with shareholder oppression claims where insiders copied proprietary financial models, altered CRM pipelines, and transferred digital assets to related entities without authorization.

Representation in CADRA Litigation

We represent plaintiffs restoring digital control and defendants navigating allegations of unauthorized access. Emergency relief, expedited discovery, and negotiated standstill agreements stop the bleeding. When anonymous attackers are involved, we issue subpoenas, coordinate with forensic specialists, and involve law enforcement while preserving privilege.

CADRA disputes rarely exist alone. We align strategy with our commercial litigation team for indemnity, insurance, and governance issues, and coordinate with our appellate practice when interlocutory appeals or writs are needed to protect BCC rulings.

Frequently asked CADRA questions

Does CADRA apply to cloud-based systems like Google Workspace or Salesforce?
Yes. CADRA's definition of computer includes data storage facilities and communications systems protected by passwords, which covers modern cloud platforms such as Google Workspace, Salesforce, Microsoft 365, and other SaaS tools relied upon by Utah companies.
Can I bring a CADRA claim against a former employee who accessed company systems after termination?
Absolutely. Once an individual's authorization ends, any continued login becomes unauthorized computer access Utah businesses can pursue under CADRA to obtain injunctions, damages, and attorneys' fees.
What if the person who accessed our systems was once authorized?
Prior authorization is irrelevant after it is revoked. CADRA focuses on the computer owner's permission at the moment of access, so insiders who keep using credentials after termination face business court CADRA exposure.
How do I prove someone accessed our systems without authorization?
Evidence often includes login timestamps, IP addresses, device fingerprints, audit trails, and third-party subpoenas to technology providers. Our litigation team preserves forensic evidence early so cyberattack litigation maintains momentum.
Can CADRA help if someone took over our Google Business Profile or social media accounts?
Yes. Google Business Profile takeover incidents, social media hijacking, and other digital account takeover events involve protected computers under CADRA. Courts can order return of access and award damages for lost visibility, revenue, and brand harm.
What damages can I recover in a CADRA case?
CADRA remedies include economic losses, investigative expenses, remediation costs, lost goodwill, and attorneys' fees. Courts also issue injunctions compelling password turnover and prohibiting ongoing interference.
Is CADRA a criminal or civil statute?
CADRA is a civil Computer Abuse and Data Recovery Act that empowers businesses to sue for unauthorized computer access Utah incidents. It operates independently from criminal prosecutions, giving companies direct control over relief.
How quickly can I get relief if someone is actively accessing our systems?
Utah courts, including the Business and Chancery Court, can issue temporary restraining orders within hours. We draft declarations, coordinate forensic support, and seek emergency hearings to halt digital account takeover and cloud system breach activity immediately.

Schedule a consultation

Contact our CADRA litigation team

Send system logs, screenshots, and a brief summary of the unauthorized computer access Utah incident. We will evaluate emergency relief, business court jurisdiction, and long-term litigation strategy the same day.

If your organization faces a digital account takeover, cloud system breach, or insider threat, move immediately. Early CADRA action preserves evidence and positions your business for injunctions, damages, and long-term recovery. Email Elizabeth@SpencerWillsonPLLC.com or call 801-346-8120 for rapid coordination with our Utah CADRA litigation team.

Related services