Phishing involves an attempt to acquire information such as usernames, passwords, or financial data by a perpetrator masquerading as a legitimate enterprise. Typically, the perpetrator will provide an e-mail or link that directs the victim to enter or update personal information at a phony website that mimics an established, legitimate website which the victim either has used before or perceives to be a safe place to enter information. In many instances, the perpetrator will install malware what logs key strokes so the perpetrator can gain login and user names for sensitive accounts. Patco Constr. Co. v. People's United Bank, 684 F.3d 197, 204 ...