Smith et al v. Google Inc
Filing
1
COMPLAINT against Google Inc, filed by Joan Smith, Bryan Hicks.(AVC)
FILED
2011 Aug-08 AM 10:09
U.S. DISTRICT COURT
N.D. OF ALABAMA
IN THE UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ALABAMA
SOUTHERN DIVISION
JOAN SMITH and BYRAN HICKS,
Individually and on Behalf of All Others
Similarly Situated,
Plaintiffs,
vs.
GOOGLE, INC., a Delaware Corporation;
Defendants.
)
)
)
) Case No:
)
) CLASS ACTION COMPLAINT
)
) JURY TRIAL DEMANDED
)
)
)
)
)
CLASS ACTION COMPLAINT
Plaintiffs, Joan Smith and Bryan Hicks, on behalf of themselves and all others similarly
situated, by and through their attorneys, as and for their complaint, and demanding trial by jury,
allege the following upon information and belief, based upon, inter alia, investigation conducted
by and through their attorneys, and upon their personal knowledge as to all other allegations.
NATURE OF THE ACTION
1.
Plaintiffs bring this consumer Class Action lawsuit pursuant to Federal Rules of
Civil Procedure 23(a), (b)(1), (b)(2), and (b)(3) on behalf of themselves and a class of similarly
situated Internet users (each a “class member” of the putative “class”) who were victims of
privacy violations and unfair business practices wherein their privacy, financial interests, and
security rights, were violated by Defendant Google, Inc., (hereinafter referred to as “Google” or
“Defendant”).
2.
The Defendant gained unauthorized access to, and unauthorized use of, Plaintiffs’
and class members’ mobile devices used for communication over a cellular network which
included the Android Operating System (hereinafter referred to collectively as “mobile
1
devices”). The Android Operating System (hereinafter “AOS”) is an operating system for
smartphones, netbooks and tablets which allowed Defendant to access, collect, monitor, and
remotely store electronic data derived, in whole or in part, from the Mobile Devices traced to
Plaintiffs and the class members’ Unique Device Identifiers ((hereinafter referred to as
“UDIDs”), a feature which could not be turned off even if Plaintiffs and the class members had
utilized the so-called “privacy feature” of the system.
3.
The nature of this action includes a sequence of events and consequences wherein
Application Developers and Application Developers’ Affiliates gained, individually and in
concert with Defendant Google, unauthorized access to, transmittal of, and/or use of data, which
included but was not limited to, Plaintiffs and the class members’ UDIDs, obtained from
Plaintiffs and the class members’ mobile devices.
4.
Google acted independently, and in concert with Application Developers and
Application Developers’ Affiliates, knowingly authorizing, directing, ratifying, acquiescing in,
and/or participating in the conduct alleged herein.
5.
The Defendant’s business plan involved unauthorized access to, and disclosure of,
Personal Information (“PI”), Personal Identifying Information (“PII”), Sensitive Identifying
Information (“SII”), hereinafter referred collectively to as User’s Personal Information (“UPI”),
obtained from Plaintiffs and class members’ mobile devices using their UDIDs provided by
Defendant Google, to aggregate all Plaintiffs’ and the class members’ data including, but not
limited to, users’ mobile device activities which Defendant accomplished covertly, without
notice and/or the consent of Plaintiffs or class members.
JURISDICTION AND VENUE
6.
Venue is proper in this District pursuant to 28 U.S.C. §1391 (b) and (c) against
Defendant. A substantial portion of the events and/or conduct giving rise to the violations of law
complained of herein occurred in this District and Defendant conducts business with consumers
in this District.
2
7.
This court has Federal question jurisdiction as this complaint alleges violation of
the following: (1) Computer Fraud and Abuse Act, 18 U.S.C. § 1030; and (2) Electronic
Communications Privacy Act 18 U.S.C. § 2510. Subject-matter jurisdiction also exists in this
Court pursuant to the Class Action Fairness Act, 28 U.S.C. § 1332(c).
8.
This is the judicial district wherein the basis of the conduct complained of herein
involving the Defendant was devised, developed and implemented. The actual collection of
information and data was activated from, and transmitted to and from this District.
PARTIES
9.
Plaintiff, Joan Smith (“Smith”) is a citizen and resident of Shelby County,
Alabama (Shelby County, Alabama).
10.
Plaintiff, Bryan Hicks (“Hicks”) is a citizen and resident of Jackson County,
Alabama (Jackson, County, Alabama).
11.
Defendant Google, Inc., (“Google”) is a Delaware corporation headquartered in
California, during the class period, a privately owned corporation, which maintained its
headquarters at 1600 Amphitheatre Parkway, Mountain View, Santa Clara County, California.
Defendant Google does business throughout the United States.
A.
Plaintiffs’ Joan Smith and Bryan Hicks Experience
12.
At all relevant times herein, Plaintiffs Smith and Hicks owned a mobile device,
operated by the AOS, used that mobile device, and on one or more occasions during the class
period accessed the Defendant Google’s Android Market to download applications, which
resulted in Defendant gaining unauthorized access to, and unauthorized use of Ms. Smith’s and
Mr. Hick’s mobile device.
B.
Sequence of Events and Consequences – Plaintiff and the class members
13.
The sequence of events, and consequences common to Plaintiffs and the class
members, made the basis of this action include, but are not limited to the following:
3
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
Plaintiffs and the class members are individuals in the United States who
own and/or use mobile devices, operated by the AOS, and access the
Google Android Market;
Google Application Developers are Application Developers who entered
into a contract referenced as “Android Market Developer Distribution
Agreement,” with Defendant Google as a “Developer,” a licensing
agreement with Defendant Google to host a platform for Android user’s
access to Android applications;
Google Application Developer’s Affiliates are Ad Networks and/or Web
Analytic Vendors that are affiliated with authorized Google Application
Developers, and entered into a licensing agreement with one or more of
the Google Application Developers;
Plaintiffs and the class members accessed Defendant Google’s Android
Market by entered into a licensing agreement with one or more of the
Google Application Developers, installed one or more Android
applications associated with one or more of the Google Application
Developers, during the class period;
Defendant Google then transmitted, and/or allowed access to, without
notice and/or authorization, Plaintiffs and the class members’ UDIDs, to
one or more of the Google Application Developers which transmitted
and/or allowed access of the UDIDs to Google Application Developer
Affiliates;
Google Application Developers and its associated Google Application
Developer Affiliates then took the liberty, without notice and/or
authorization, with obtaining at will, mobile device data of Plaintiffs and
the class members’, using the mobile devices’ UDIDs to aggregate the
mobile device data;
Google Application Developers’ Affiliates then created, individually
and/or in concert with Google Application Developers, a database related
to Plaintiffs and the class members’ mobile device data, which also
revealed web browsing activities, to assist Defendant’s tracking scheme.
Such tracking could not be detected, managed and/or deleted, and
provided, in whole or part, the collective mechanism to track Plaintiffs and
the class members, without notice, consent and/or authorization;
Defendant Application Developers’ Affiliates and Google Application
Developers then conducted systematic and continuous surveillance of
Plaintiff and the class members’ mobile devices activity, which continues
to date;
Defendant Application Developers’ Affiliates and Google Application
Developers Affiliates then copied, used, and stored the mobile device
UDID data derived from Plaintiffs and the class members’ mobile devices,
after knowingly accessing, without authorization, Plaintiffs and the class
members’ mobile devices;
Google Application Developers obtained Plaintiffs’ and the class
members’ UPA, derived, in whole and/or part, from its monitoring the
mobile application activities of Plaintiffs and the class members. The
4
k)
l)
m)
n)
o)
p)
q)
personal information Defendant compiled, and misappropriated, includes
details about Plaintiffs’ and the class members’ profiles to identify
individual users to track them on an ongoing basis, across numerous
applications, and tracking users when the accessed applications from
different mobile devices, at home and at work. This sensitive information
included but was not limited to such things as users’ video application
viewing choices to obtain personal characteristics such as gender, age,
race, number of children, education level, geographic location, and
household income, what the Plaintiffs and class members viewed and their
buying propensities, reading habits and materials read, details about their
personal finances, sexual preference, and even more specific information
like health conditions;
Google Application Developers used Defendant Application Developer’s
analytics software to collect, use and disclose device data to third parties,
an act that violates Plaintiffs and the class members’ mobile device’s
agreement;
Defendant Google then provided assurances to Plaintiffs and the class
members that any and all Android authorized applications were safe for
downloading;
Defendant Google failed to notify and warn Plaintiffs and the class
members of its covert activities, and the covert tracking activities of
Google Application Developers and Application Developer’s Affiliates
before, during and after notice, of the unauthorized practices, made the
basis of this action, so that Plaintiffs and the class members could take
appropriate actions to opt-out of the unauthorized surveillance by
Defendant, and/or delete any and all Defendant applications;
Defendant Google failed to block access to, and void the licensing
agreements of Google Application Developers after it received notice of
individual and concerted actions, made the basis of this action;
Defendant Google failed to provide any terms of service, or privacy
policy, and related to its use of UDIDs for tracking, or provide an updated
privacy policy alerting its users of Google Application Developers and
Defendant Application activity, made the basis of these actions, thus
Plaintiffs and the class members had no notice of such activities, nor the
ability to mitigate their harm and damage after the fact;
Defendant Google Developers failed to provide any terms of service, or
privacy policy, related to its used of UDIDs for tracking, or provide an
updated privacy policy alerting its users of Google Application
Developers and Defendant Application activity, made the basis of these
actions, thus Plaintiffs and the class members had no notice of such
activities, nor the ability to mitigate their harm and damage after the fact;
Defendant Google Application Developer’s Affiliates then failed to
provide notice to Plaintiffs and the class members of its tracking activities
to obtain authorization, thus Plaintiffs and the class members had no
notice of such activities, nor the ability to mitigate their harm and damage
after the fact;
5
r)
s)
14.
Defendant Google did not provide Plaintiffs and the class members
information within its privacy policies concerning the affiliation of each
Android Application Developer, it’s Application Developer’s Affiliates,
and information related to the extent of its tracking, made the basis of this
action, nor adequate opt-out information and;
Defendant converted Plaintiffs and the class members’ electronic data,
including but not limited to UDIDs.
Plaintiffs and the class members own the right to possess the personal property,
including but not limited to, their personal data.
15.
Plaintiffs and the class members’ electronic data, misappropriated by Defendant,
and populated with their actual user data constitute assets with discernable values.
16.
Google Application Developer’s Terms of Service and Privacy Policy do not
reference that Android users’ mobile devices’ UDIDs shall be obtained for tracking purposes,
provided to Application Developer Affiliates, and used to build a profile of data collected of any
and all users’ mobile device activities. Many application developers do not even provide any
Terms of Service and/or Privacy Policies.
PRIVACY DOCUMENTS
17.
Defendant Google does business online, using domains which include, but are not
limited to: http://www.Google.com and its business includes internet search, cloud computing
and advertising technologies including the “Android Market.”
18.
Defendant Google’s document entitled, “Android Market Business and Program
Policies,” http://www.google.com/mobile/androidmarket-policies.html, fails to provide any
reference to a “privacy policy.”
19.
Defendant Google’s document, entitled, “Android Market Terms of Service,” fails
to reference its association with specific Defendant Application Developer’s Affiliates, thus
alleviating the possibility of its user opting–out of Defendant Application Developer’s Affiliate’s
tracking.
6
20.
Defendant Google’s Terms of Service and Privacy Policy fail to provide notice,
nor obtain consent from its users that their Mobile Devices’ UDID shall be obtained and used for
behavioral tracking.
FACTUAL ALLEGATIONS
A.
Background
21.
In 2008, Google released the Android Operating System which included unique
software visible serial numbers, and permitting Advertising Networks and Web Analytic
Vendors access to users mobile devices’ Unique Device Identifiers (“UDIDs”), including but not
limited to, device identifiers (“SSIDs”) MAC address of the wireless access point, (“BSSID”),
International Mobile Equipment Identifiers (“IMEI”), International Mobile Subscriber Identifiers
(“IMSIs”). On October 22, 2008, Goggle’s Android Market was launched as a service for the
OS devices, and permitted users to download applications from the Google’s Android Market.
Recent studies though revealed that Google had transmitted, or allowed access to, user’s UDIDs,
without authorization, allowing Application Developers, and Application Developers Affiliates
to obtain users’ UDID for tracking users’ mobile device activity.
B.
Mobile Tracking
22.
Mobile Internet advertising currently consists of streaming graphic files, in real
time, into content rendered by a user’s mobile device browser. Mobile advertising systems lack
reliable browser tracking while traditional online advertising relies on the use of browser
cookies, implementations inherent on conventional implementations of mobile ad serving have
effectively prevented mobile advertising from being effective.
23.
To obtain “uniqueness” in mobile devices, the key was to obtain Unique Device
Identifiers or “UDIDs,” a special type of identifier used in software applications to provide a
unique reference number in mobile devices. Unlike traditional cookies, a user has no choice to
disable the UDID. A user can’t opt-out and/or delete it, since it is always sent as part of the
person’s smart phone activities. A user cannot block UDIDs being transmitted (as they would in
a browser), since it is hard coded into a user’s phone’s software.
7
24.
Tracking by use of UDIDs is not exactly comparable to any other type of tracking
by advertising networks. It’s not anonymous data – it’s an exact ID unique to each physical
device, and if merged with GPS data, provides unlimited advertising opportunities (i.e.,
commercial value). When tracking location data on a mobile device, it is calculated to 8 decimal
points that can be far more exact and accurate than any sort of geographically-based IP address
look-up on the web. Instead of getting a general location, location data on a GPS-enabled mobile
can identify your precise latitude and longitude.
25.
The advertising and marketing industries have been strongly advancing technical
means for synchronizing tracking codes so information about individual consumer behavior in
cyberspace can be shared between companies and the UDID used in the majority of mobile
devices would be put to this purpose. The records of many different companies are merged
without the user’s knowledge and/or consent to provide an intrusive profile of activity on the
computer. There are no practical limits on what can be collected or used.
26.
Application Developer’s Affiliates offer “free” software kits (hereinafter referred
to as “SDKs”), that application developers download and insert into applications. A software
development kit (“SDK”) is typically a set a development tools which allow for the creation of
applications for a certain software package, software framework, hardware platform, computer
system, video game console, operating system, or similar platform. It may be something as
simple as an application programming interface (API) in the form of some files to interface to a
particular programming language or include sophisticated hardware to communicate with a
certain embedded system. Often SDKs can be downloaded directly via the Internet. Many
SDKs are provided for free to encourage Application Developers to use the Application
Developer Affiliates system and/or language.
27.
SDKs though provided Application Developer Affiliates the access to Application
users when Application Developers downloaded the Application Developer Affiliates’ SDKs
into its application; such provided the ability to obtain Plaintiffs and the class members’ UDID
and to conduct cross application tracking, activities made the basis of this action.
8
28.
The SDKs also involve tracking libraries whose sole purpose is to collect and
compile statistics on application uses and usage, and send the device ID as part of their
functionality. These libraries are used to display advertisements so as to provide revenue for the
application developer; and the mechanism for the libraries to also provide the mobile device’s
UDID once the user installed applications.
29.
Application Developers Analytics reports are now available for mobile websites
by simply pasting server-side code snippets (available for PHP, JSP, ASP, NET, and PERL) on
each page they wish to track. Web Analytics vendors then create a profile for their mobile
website where they can view the same kind of information that’s in standard analytics reports
including visitor information and traffic sources, including tracking users visiting their mobile
websites from both high-end “smartphones” and WAP devices.
C.
Android Market
30.
The Android Market is an online software store developed by Google for Android
devices. An application program (“app”) called “Market” is preinstalled on most Android
devices and allows users to browse and download apps developed by third-party developers,
hosted on Android market. Users can also search for and read detailed information about apps
from the Android market website.
31.
Android devices can run applications written by third party developers and
distributed through the Android Market or one of several applications available immediately,
without a lengthy approval process. When an application is installed, the Android Market
displays all required permissions. The user can then decide whether to install the application
based on those permissions. The user may decide whether to install the application based on
those permissions. The user may decide not to install an application whose permission
requirements seem excessive or unnecessary. Possible app permissions include functionality
such as:
Accessing the internet
Making phone calls
9
Reading and writing to the installed memory card
32.
Sending SMS messages
Accessing a user’s address book data
The Android’s Software Developer Kit provides the Defendant the ability to
import the tracking code into Android apps to track Plaintiffs and the class members’ activity on
their mobile devices. The Android Software Development Kit License Agreement, Terms and
Conditions provides assurances to Plaintiffs and the class members of Google’s contractual
obligation to protect the privacy and security of Android User:
33.
“You agree that if you use the SDK to develop applications for general public
users, you will protect the privacy and legal rights of those users. If the users
provide you with user names, passwords, or other login information or
personal information, you must make the users aware that the information
will be available to your application, and you must provide legally adequate
privacy notice and protection for those users. If your application stores
personal or sensitive information provided by users, it must do so securely. If
the user provides your application with Google Account information, your
application may only use that information to access the user’s Google
Account when, and for the limited purposes for which, the user has given you
permission to do so.”
The Android Operating System’s “sandboxing mechanism”, a technique to create
a configured execution environment, attempts to limit access to other application’s data, by
preventing third party applications from seeing other or accessing specific locations; however,
when Defendant combines the UDIDs and mobile device data derived from the sandboxing
mechanism, such prevention serves no purpose.
34.
Ad Networks and Web Analytics Vendors are associated with a multitude of
Android applications and are thus able to cross-track user’s mobile devices, accessing the ICCID
(SIM card serial number) and the IMSI (International Mobile Subscriber Identity), making it
possible to track users even when they change their device.
35.
When Google requires Android apps to notify users before they download the
app, of the data sources the app intends to access, Google does not require apps to ask
permission to access some forms of the device ID, or to send it to outsiders. Possible sources
10
include the phone’s camera, memory, contact list, and the like. When Smartphone users let an
app see her location, apps generally fail to disclose if they will pass the location to ad companies,
thus avoiding the Android manifest file.
36.
Plaintiffs and the class members were provided assurances by Google that the
Android Operating System’s root directing shall protect them from exploits.
37.
The Android Operating System thus is used to obfuscate the privacy and security
settings of the user’s mobile device, such as the application developer’s ability to write code to
get the MAC address of the phone. Multiple applications from that same developer can also
send the same UDID to servers the developer runs, and Google’s Android operating system
doesn’t provide controls to adequately protect users’ sensitive data.
D.
Google Controls All Facets of Android’s Operating System
1.
Android Operating System
38.
The responsibility for complete user experience begins with a consumer’s
purchase of a mobile device which includes an Android Operating System, designed and
manufactured by Google that works the way Google wants it to work. All device manufactures
that are involved with the Android Market, all run Google’s proprietary Android operating
system software.
39.
Since Defendant Google, Inc. launched its mobile device business, it has
maintained control of how mobile devices that have its Android Operating System work, how
consumers use them, and what happens when consumers use them – including functions that
Google controls, hidden from consumers’ sight, although Google claimed Android would be
transparent and inclusive.
40.
Google controls the process for the development software as well – such as by
influencing developers to use Google’s software development kit (“SDK”), and providing highly
detailed guidelines for app development.
11
41.
Google uses the mobile devices with Android operating systems, the Android
Market, and the software development process to completely control the user experience by
constructing the user’s entire mobile computing environment.
42.
Behind Google’s wall of control, it designs the Android Operating System to be
readily accessible to ad networks and we analytic vendors’ consumers and access her personal
information. These companies not only provide an important revenue source for app developers
who provide “free” apps through the Android Market, they also furnish the analytic data that
demonstrates Google’s market leadership which it so often heralds in its quarterly investor
conference calls. These companies, by helping finance third-party apps, gain access to
consumers’ mobile devices to collect personal information they use to track and profile
consumers, such as consumers’ cell phone numbers, address books, unique device identifiers,
and geo-location histories – highly personal details about who they are, who they know, and
where they are.
43.
Since Google launched its mobile device business, it has sought to completely
control the user experience by controlling all facets of the mobile environment and had
differentiated itself in the marketplace by advertising that it provides its customers a tightly
integrated user experience. With this control comes responsibility.
2.
44.
Google Controls Distribution of Apps for Android Devices
The mobile device enables a user to download apps that utilize an Android
Operating System. Apps may only be obtained from Google’s Android Market application and
website. Google owns, controls, and operates the Android Market, which is launched on October
22, 2008.
45.
Numerous apps available from the Android Market are created by third-party
developers. There are several hundred thousand third-party apps available at the Android
Market. Some of these are ostensibly free and some are sold for a fee. Google distributes
approved free apps through the Android Market without charging the developer a fee. Google
also distributes approved apps for which the consumer is charged a price set by the developer;
12
Google collects payment through its revenue collection mechanism and retains 30 percent of the
payment as its fee.
46.
Google claims it has no control of the Application Developers by not “vetting”
the Android software applications for the devices, but then controls the only marketplace for
Android apps – the Google Android Market. No third party app developer is also permitted to
sell an app in the Android Market without entering into Google’s form AOS Developer
Agreement, but then Google fails to control the developers by failing to implement a system to
obligate the developers to abide by the terms of this agreement.
47.
Google represents to every user of the Android Market, pursuant to a click-
through agreement required to create a user Android Market account, that users’ are provided
assurances that the Android Market will not permit apps that violate their prices: “Android
Market Terms of Service”, online: http://www.google.com/mobile/android/market-tos.html.
48.
Google has also sought to exercised “indirect” control over what apps may be
offered by the Android market. No developer is permitted to sell an app in the Android Market
without entering into Google’s forms AOS Developer Agreement. Google trades on its control
of the Android Market, by implementing illusory contractual obligations in lieu of “vetting” the
applications claiming to offer only apps that agree to its AOS Developer Agreement; however
users rely on Google to allow only those found safe and appropriate.
49.
Mobile Device users are only allowed to download software specifically licensed
by Google and available through the Android Market. If a user installs any software which
affects the “routing” of the Android Operating System, the users’ warranty is voided.
50.
Even after a user downloads an app, Google maintains control by requiring that
the end-user license agreement for every third-party app include a clause giving Google the
ability to step into the shoes of the app developer control’s the user’s use of apps. Specifically,
the Android Developer distribution agreement, “Section 7.2, Google takedown Android Market
Terms of Service” (last accessed April 26, 2011), online:
http://www.google.com/mobile/android/market-tos.html.
13
3.
Google Controls The Development Process for Apps Available on
Android Devices
51.
In addition to controlling the characteristics and distribution of apps, described
above, Google exercises substantial control over its development and functionality.
52.
The third party must also agree to the terms of Google’s Developer Program
License Agreement (“AOS Developer Agreement”). An App developed using Google’s SDK
will only function on Android Devices and can only interact with the Android Device operating
system and features in the ways permitted by the Android Developer Agreement and SDK.
53.
Google’s control of the user experience includes restrictions, such as blocking
consumers from modifying devices or installing non-Android Market Apps. As a direct
consequence of the control exercised by Google, Plaintiffs and the class cannot reasonably
review the privacy effects of apps and must rely on Google to fulfill its duty to do so. Google
represents that it undertakes such a duty, representing that all apps available in its Android
Market have agreed to Google’s mobile policies, and that it retains broad discretion to remove an
App from the Android Market.
54.
A third party cannot upload an App for sale in the Android Market until Google
enters into a licensing agreement with the App developer thereby giving its approval for sale of
the App through the Android Market. Google represents that an app may not access information
from, or about, the user stored on the user’s Android Device unless the information is necessary
for the advertising functioning of the App. Google represents that it does not allow an app to
transmit data from a user’s Android Device to other parties without the user’s consent. Google
though does not review its app source code, i.e. it does not review the code written by the
developer in a programming language to inspect in order to determine if apps acquire users’
personal information without the users’ knowledge. Thus, Google’s policy of not reviewing
app’s executable files permits apps that subject consumers to privacy exploits and security
vulnerabilities to be offered in the Android Market. Contrary to Google’s representations to
14
consumers, Google does not analyze the traffic generated by apps to detect apps that violate the
privacy terms of the AOS Developer Agreement and Google’s commitments to users.
55.
Google provides additional assurances to users that their privacy and security
interests are provided since it possesses an app “kill switch”, maintaining the ability to “enter” a
user’s mobile device to remove apps, thus according to the Android Market’s terms of service”
“Google may discover a product that violates the developer
distribution agreement . . . in such an instance; Google retains
the right to remotely remove those applications from your
device at its sole discretion.”
56.
Google recommends users should install only applications they trust and provides
assurances to users that their privacy and security shall be protected since suspicious apps can be
uninstalled at any time, but Google fails to address how users can make informed decisions about
which apps are trustworthy and which are not; however knowing what an app is capable of is
different than knowing what it actually does. There’s no way of knowing what liberties apps on
competing platforms take with users’ personal information, since Google failed to adequately
inform users that her mobile device’s UDIDs would be provided to any party.
57.
Google provides assurances when its terms of service and privacy policy state that
Plaintiff and the class members are not at risk for privacy and security violations when using
Android Devices, but fails to provide notice that the origin of mobile tracking by third parties
originates with the third party’s access to the user’s UDIDs, which is provided by Google.
58.
Plaintiffs in this action consider the information from and about themselves on
their Mobile Devices to be personal and private information.
59.
Because Defendant imposed an undisclosed cost on consumers, by taking more
information than they were entitled to take, Defendant’s practices imposed economic costs on
consumers.
60.
The scarcity of consumer information increases its value. The Defendant
devalued consumers’ information by taking and propagating it.
15
61.
The undisclosed privacy and information transfer consequences of Defendant’s
practices imposed costs on consumers in the form of the loss of the opportunity to have entered
into value-for-value exchanges with other app providers whose business practices better
conformed to consumers’ expectations. Likewise, Defendant’s lack of disclosure coupled with
his taking of information imposed costs on consumers who would otherwise have exercised her
rights to utilize the economic value of her information by declining to exchange it with
Defendant or any other app provider.
E.
“Bandwidth Hogs” - Economic Harm
62.
The Defendant’s activities, made the basis of this action includes, but is not
limited to, economic harm due to the unauthorized use of Plaintiffs’ and class member’s
Bandwidth.
63.
Bandwidth is the amount of data that can be transmitted across a channel in a set
amount of time. Any transmission of information on the internet includes bandwidth. Similar to
utility companies, such as power or water, the “pipeline” is a substantial capital expenditure, and
bandwidth usage controls the pricing model. Hosting providers charge users for bandwidth
because his upstream provider charges them and so forth until it reaches the “back bone
providers”. Retail providers purchase it from wholesalers to sell its consumers.
64.
Network provider’s data plans charge consumers based upon items such as usage
and “caps”, i.e. $30.00 per month for an unlimited plan is standard, but limited plans have caps,
such as: 256 GB per month. Some national providers charge $1.00 per GB of bandwidth
exceeding a certain cap. Whether the data plan is marketed as “unlimited” or “limited”, the costs
for the plans are allocated based upon the bandwidth usage, thus as the standard use of
bandwidth increases, so too does the plan costs increase. Since plans are based upon user’s
average use, as consumer’s usage increases collectively, costs increase for all users, while
individual bandwidth overages can be costly.
16
65.
Ads consume vast amounts of bandwidth, slowing a user’s internet connection by
using his bandwidth, in addition to diminishing the mobile device’s “Battery Life”, in order to
retrieve advertisements. Web Analytics use up more bandwidth than ads, accessing bandwidth
to download and run ad script, thus Plaintiffs and class members that did not access ads on an
application still had the Defendant’s Application Developer and Defendant Application Affiliate
use his bandwidth.
66.
Advertisers are now using the internet as their primary ad-delivery pipe,
continually upcoming and downloading data from its networks causing substantial bandwidth
use. Ads that were hidden in content, or bundled used substantial bandwidth, as did Application
updates. Web analytics activities delayed movement on a site, users on a site, using his
bandwidth, to complete its activities.
67.
The Defendant’s use of the Plaintiffs and class member’s bandwidth for its data
mining activities is similar in nature to a practice called “hot linking”; wherein one (1) server
uses another server in its bandwidth to send data. While it slows down the server, it also allows
bandwidth costs to be transferred to another server. Any redirect of a user’s browsing
capabilities to access or download Defendant’s and/or data mining activities produces similar
unauthorized bandwidth use. While only the tech Excluding the amount that the Plaintiffs and
the class members use by her own activities, the Defendant’s unauthorized data mining activities
caused substantial bandwidth use to the Plaintiffs and the class members resulting in actual out
of pocket expenditures, for Defendant’s activities which include, but are not limited to the
following:
a.
b.
c.
d.
e.
Transmittal of and access to Plaintiffs and the class members UDIDs;
Loading of Ads first before content, building ads, and ads with excessive
bandwidth;
Use of SDKs, and its functions within Plaintiffs and class member’s
mobile device;
“Harvesting” of Plaintiffs and class member’s mobile device data;
“Background” Activities including “data mining”.
17
F.
Defendant’s Harmful Business Practices
68.
Defendant’s business practice unfairly wrests control Defendant used and
consumed the resources of Plaintiffs and the class members’ mobile devices by gathering user
information, adding such information to their mobile database, and transferring such to
Defendant. Defendant caused harm and damages to Plaintiffs’ and the class members’ mobile
devices finite resources, depleted and exhausted its memory, thus causing an actual inability to
use it for its intended purposes, and significant unwanted CPU activity, usage, and network
traffic, resulting in instability issues.
69.
A milli-second was the time allotted for the Plaintiffs and the class members
downloading a Defendant Google Android Market application, before Google Application
Developers and Google Application Developer Affiliates intentionally, and without user’s
authorization and consent, had Defendant Google transmit, and/or allowed access to, data related
to whole or part, from the Plaintiffs’ and the class members’ UDID. Such occurred without the
benefit of being advised of the association between Defendant Application Developer and its
Application Developer Affiliate, provided adequate time to access, read, and comprehend the
Terms of Service/Use and Privacy Policy for Defendant. While only the most technical savvy
mobile device users were familiar with UDIDs, a finite amount of individuals even knew about
“UDID,” let alone could possibly comprehend the technical aspects inherent within the
Defendant’s privacy documents.
70.
Traditional online advertising does not obtain an UDID of user’s mobile devices.
The Defendant’s objective was to obtain a mobile device’s “Fingerprint,” a practice of obtaining
mobile device information to perpetually identify the mobile device as identification, which can
then be linked to additional data elements to identify “personable identifiable information”
(“PII”), personal information and/or sensitive information.
71.
The collection, use and disclosure of tracking data, such as obtaining a users’
UDIDs by Defendant to provide its services, implicates Plaintiffs’ and the class members’
privacy and physical safety. Such information is afforded special attention due to the
18
consequences for both privacy and physical safety that may flow from its disclosure. The
heightened privacy and physical safety concerns generated by the collection, use and disclosure
of location information are apparent in U.S. law that creates restrictive content standards for its
use and disclosure in the private sector in the context of telecommunications services.
Allegations as to Class Certification
72.
Pursuant to Federal Rule of Civil Procedure 23(a), (b)(1), (b)(2), and (b)(3),
Plaintiffs bring this action as a class action, on behalf of themselves and all others similarly
situated as members of the following classes (collectively, the “class”):
All persons residing in the United States who possessed a mobile device,
operated by the Android Operating System, and downloaded an application
from October 22, 2008 to the date of the filing of this complaint.
73.
The class action period, (the “class period”), pertains to the dates, October 22,
2008 to the date of class certification.
74.
On behalf of the U.S. Resident Class, Plaintiffs seek equitable relief, damages and
injunctive relief pursuant to:
a.
b.
Electronic Communications Privacy Act, 18 U.S.C. § 2510;
c.
Breach of Contract;
d.
Breach of Implied Covenant of Good Faith and Fair Dealing;
e.
Conversion;
f.
Negligence;
g.
Trespass to Personal Property/Chattels; and
h.
75.
Computer Fraud and Abuse Act, 18 U.S.C. § 1030;
Unjust Enrichment.
Persons Excluded From Classes: Specifically excluded from the proposed class
are Defendant, his officers, directors, agents, trustees, parents, children, corporations, trusts,
representatives, employees, principals, servants, partners, joint ventures, or entities controlled by
Defendant, and his heirs, successors, assigns, or other persons or entities related to or affiliated
19
with Defendant and/or his officers and/or directors, or any of them; the Judge assigned to this
action, and any member of the Judge’s immediate family.
76.
Numerosity: The members of the class are so numerous that their individual
joinder is impracticable. Plaintiffs are informed and believe, and on that basis allege, that the
proposed class contains tens of thousands of members. The precise number of class members is
unknown to Plaintiffs. The true number of class members is known by Defendant.
77.
Class Commonality: Pursuant to Federal Rules of Civil Procedure, Rule
23(a)(2) and Rule 23(b)(3), are satisfied because there are questions of law and fact common to
Plaintiffs and the class, which common questions predominate over any individual questions
affecting only individual members, the common questions of law and factual questions include,
but are not limited to:
a.
b.
c.
d.
e.
f.
g.
What was the extent of Defendant’s business practice of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”)?
What information did Defendant collect from its business practices of
transmitting, accessing, collecting, monitoring, and remotely storing users’
Unique Device Identifiers (“UDIDs”), and what did it do with that
information?
Whether users, by virtue of them downloading the application, had preconsented to the operation of Defendant’s business practices of
transmitting, accessing, collecting, monitoring, and remotely storing users’
Unique Device Identifiers (“UDIDs”);
Was there adequate notice, or any notice, of the operation of Defendant’s
business practices of transmitting, accessing, collecting, monitoring, and
remotely storing users’ Unique Device Identifiers (“UDIDs”) provided to
Plaintiffs and the class members?
Was there reasonable opportunity to decline the operation of Defendant’s
business practices of transmitting, accessing, collecting, monitoring, and
remotely storing users’ Unique Device Identifiers (“UDIDs”) provided to
Plaintiffs and the class members?
Did Defendant’s business practices of obtaining, collecting, monitoring,
and remotely storing users’ Unique Device Identifiers (“UDIDs”) disclose,
intercept, and transmit personally identifying information, or sensitive
identifying information, or personal information?
Whether Defendant devised and deployed a scheme or artifice to defraud
or conceal from Plaintiffs and the class members Defendant’s ability to,
and practice of, intercepting, accessing, and manipulating, for its own
20
h.
i.
j.
k.
l.
m.
n.
o.
p.
q.
r.
s.
t.
benefit, personal information, and tracking data from Plaintiffs’ and the
class members’ personal mobile device via the ability to track their mobile
device by tracking its UDID on their mobile device;
Whether Defendant engaged in deceptive acts and practices in connection
with its undisclosed and systematic practice of transmitting, accessing
and/or disclosing unique identifiers, tracking data, and personal
information on Plaintiffs’ and the class members’ personal mobile device
and using that data to track and profile Plaintiffs’ and the class members’
Internet activities and personal habits, proclivities, tendencies, and
preferences for Defendant’s use and benefit;
Did the implementation of Defendant’s business practices of transmitting
accessing, collecting, monitoring, and remotely storing users Unique
Device Identifiers (“UDIDs”) violate the Computer Fraud and Abuse Act,
18 U.S.C. §§ 1030?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) violate the Computer Fraud and Abuse Act,
18 U.S.C. §§ 2510?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) involve a Breach of Contract?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) involve a Breach of Implied Covenant of
Good Faith and Fair Dealing?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) involve a Conversion?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) involve Negligence?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) involve a Trespass to Personal
Property/Chattels?
Did the implementation of Defendant’s business practices of transmitting,
accessing, collecting, monitoring, and remotely storing users’ Unique
Device Identifiers (“UDIDs”) result in Unjust Enrichment?
Is the Defendant liable under a theory of aiding and abetting others for
violations of the statutes listed herein?
Is the Defendant liable under a theory of civil conspiracy for violations of
the statutes listed herein?
Is the Defendant liable under a theory of unjust enrichment for violations
of the statutes listed herein?
Whether Defendant participated in and/or committed or is responsible for
violation of law(s) complained of herein?
21
u.
v.
w.
x.
78.
Are class members entitled to damages as a result of the implementation
of Defendant’s marketing scheme, and, if so, what is the measure of those
damages?
Whether Plaintiffs and members of the class have sustained damages as a
result of Defendant’s conduct, and, if so, what is the appropriate measure
of damages?
Whether Plaintiffs and members of the class are entitled to declaratory
and/or injunctive relief to enjoin the unlawful conduct alleged herein; and
Whether Plaintiffs and members of the class are entitled to punitive
damages, and, if so, in what amount?
Typicality: Plaintiffs’ claims are typical of the claims of all the other members of
the class, because their claims are based on the same legal and remedial theories as the claims of
the class and arise from the same course of conduct by Defendant.
79.
Adequacy of Representation: Plaintiffs will fairly and adequately protect the
interests of the members of the class. Plaintiffs have retained counsel experienced in complex
consumer class action litigation. Plaintiffs intend to prosecute this action vigorously. Plaintiffs
have no adverse or antagonistic interests to those of the class.
80.
Superiority: A class action is superior to all other available means for the fair
and efficient adjudication of this controversy. The damages or other financial detriment suffered
by individual class members is relatively small compared to the burden and expense that would
be entailed by individual litigation of her claims against the Defendant. It would thus be
virtually impossible for the class, on an individual basis, to obtain effective redress for the
wrongs done to them.
81.
In the alternative, the class may also be certified because:
a.
the prosecution of separate actions by individual class members would
create a risk of inconsistent or varying adjudication with respect to
individual class members that would establish incompatible standards of
conduct for the Defendant and/or;
b.
the prosecution of separate actions by individual class members would
create a risk of adjudications with respect to them that would, as a
practical matter, be dispositive of the interests of other class members not
22
parties to the adjudications, or substantially impair or impede their ability
to protect their interests.
82.
Defendant has acted or refused to act on grounds generally applicable to the class
thereby making appropriate final declaratory and/or injunctive relief with respect to the members
of the class as a whole.
First Cause of Action
Violation of the Computer Fraud and Abuse Act
18 U.S.C. § 1030 et seq.
83.
Plaintiffs incorporate by reference all paragraphs previously alleged herein.
84.
Plaintiffs assert this claim against each and every Defendant named herein in this
Complaint on behalf of themselves and the class.
85.
The Computer Fraud and Abuse Act, 18 U.S.C. § 1030, referred to as “CFAA”
regulates fraud and relates activity in connection with computers, and makes it unlawful to
intentionally access a computer used for interstate commerce or communication, without
authorization or by exceeding authorized access to such a computer, thereby obtaining
information from such a protected computer, within the meaning of U.S.C. § 1030(a)(2)(C).
86.
Defendant violated 18 U.S.C. § 1030 by intentionally accessing Plaintiffs’ and the
class members’ mobile computing device, without authorization by exceeding access, thereby
obtaining information from such a protected device, causing the transmission to users’ Android
Devices, either by native installation or AOS upgrade of code that caused users’ Android
Devices to maintain, synchronize, and retain detailed, unencrypted location history files.
87.
At all relevant times, Defendant engaged in business practices of transmitting
code from within Plaintiffs’ and the class members’ downloaded Android Applications so as to
access their mobile devices to obtain a UDID and mobile device data. Such acts were conducted
without authorization and consent of the Plaintiffs and the class members.
88.
The Computer Fraud and Abuse Act, 18 U.S.C. § 1030(g), provides a civil cause
of action to “any person who suffers damage or loss by reason of a violation” of CFAA.
23
89.
The Computer Fraud and Abuse Act, 18 U.S.C. § 103(a)(5)(A)(i), makes it
unlawful to “knowingly cause[s] the transmission of a program, information, code or command
and as a result of such conduct, intentionally cause[s] damage without authorization, to a
protected computer,” of a loss to one or more persons during any one-year period aggregating at
least $5,000 in value.
90.
Plaintiffs’ and the class members’ computers are a “protected computer . . . which
is used in interstate commerce and/or communication” within the meaning of 18 U.S.C. §
1030(e)(2)(B).
91.
Defendant violated 18 U.S.C. § 1030(a)(2)(C) by intentionally accessing a
Plaintiff’s and the class members’ mobile computer device, without authorization or by
exceeding access, thereby obtaining information from such a protected mobile computing device.
92.
Defendant violated 18 U.S.C. § 1030(a)(5)(A)(i) by knowingly causing the
transmission of a command embedded within his webpages, downloaded to Plaintiffs’ and the
class members’ mobile computing device, which are protected mobile computing devices as
defined in 18 U.S.C. § 1030(e)(2)(B). By accessing, collecting, and transmitting Plaintiffs’ and
the class members’ viewing habits, Defendant intentionally caused damage without authorization
to those Plaintiffs’ and the class members’ mobile computing devices by impairing the integrity
of the computer.
93.
Defendant violated 18 U.S.C. § 1030(a)(5)(A)(ii) by intentionally accessing
Plaintiffs’ and the class members’ protected mobile computing devices without authorization,
and as a result of such conduct, recklessly caused damage to Plaintiffs’ and the class members’
mobile computing devices by impairing the integrity of data and/or system and/or information.
94.
Defendant violated 18 U.S.C. § 1030(a)(5)(A)(iii) by intentionally accessing
Plaintiffs’ and the class members’ protected mobile computing devices without authorization,
and as a result of such conduct, caused damage and loss to Plaintiffs and the class members.
24
95.
Plaintiffs and the class members have suffered damage by reason of these
violations, as defined in 18 U.S.C. § 1030(e)(8), by the “impairment to the integrity or
availability of data, a program, a system or information.”
96.
Plaintiffs and the class members have suffered loss by reason of these violations,
as defined in 18 U.S.C. § 1030(e)(11), by the “reasonable cost . . . including the cost of
responding to an offense, conducting a damage assessment, and restoring the data, program,
system, or information to its conditional prior to the offense, and any revenue lost, cost incurred
or other consequential damages incurred because of interruption of service.”
97.
Plaintiffs and the class members have suffered loss by reason of these violations,
including, without limitation, violation of the right of privacy, disclosure of personal identifying
information, sensitive identifying information, and personal information, interception, and
transactional information that otherwise is private, confidential, and not of public record.
98.
Defendant Google is jointly and severally liable for the violations of the
Computer Fraud and Abuse Act alleged herein.
99.
As a result of these takings, Defendant’s conduct has caused a loss to one or more
persons during any one-year period aggregating at least $5,000 in value in real economic
damages.
100.
Plaintiffs and the class members have additionally suffered loss by reason of these
violations, including, without limitation, violation of the right of privacy.
101.
Defendant’s unlawful access to Plaintiffs’ and the class members’ computers and
electronic communications has caused Plaintiffs and the class members irreparable injury.
Unless restrained and enjoined, Defendant will continue to commit such acts. Plaintiffs’ and the
class members’ remedy at law is not adequate to compensate it for these inflicted and threatened
injuries, entitling Plaintiffs and the class members to remedies including injunctive relief as
provided by 18 U.S.C. § 1030(g).
25
Second Cause of Action
Violations of the Electronic Communications Privacy Act
18 U.S.C. § 2510
Against All Defendant
102.
Plaintiffs incorporate by reference all paragraphs previously alleged herein.
103.
Plaintiffs assert this claim against each and every Defendant named herein in this
complaint on behalf of themselves and the class.
104.
The Electronic Communications Privacy Act of 1986, 18 U.S.C. § 2510, referred
to as “ECPA,” regulates wire and electronic communications interception and interception of
oral communications, and makes it unlawful for a person to “willfully intercept, endeavor to
intercept, or procure any other person to intercept or endeavor to intercept, any wire, oral, or
electronic communication,” within the meaning of 18 U.S.C. § 2511(1).
105.
Defendant violated 18 U.S.C. § 2511 by intentionally acquiring and/or
intercepting, by device or otherwise, Plaintiffs’ and the class members’ electronic
communications, without knowledge, consent or authorization.
106.
At all relevant times, Defendant engaged in business practices of intercepting
Plaintiffs and the class members’ electronic communications which included endeavoring to
intercept the transmission of a UDID from within her mobile device. Once the Defendant
obtained the UDID they used such to aggregate mobile device data of the Plaintiffs and the class
members as they used their mobile device, browsed the Internet, and activated downloaded
Android applications.
107.
The contents of data transmissions from and to Plaintiffs’ and the class members’
personal computers constitute “electronic communications” within the meaning of 18 U.S.C. §
2510.
108.
Plaintiffs and the class member are “person[s] whose . . . electronic
communication is intercepted . . . or intentionally used in violation of this chapter” within the
meaning of 18 U.S.C. § 2520.
26
109.
Defendant violated 18 U.S.C. § 2511(1)(a) by intentionally intercepting,
endeavoring to intercept, or procuring any other person to intercept or endeavor to intercept
Plaintiffs’ and the class members’ electronic communications.
110.
Defendant violated 18 U.S.C. § 2511(1)(c) by intentionally disclosing, or
endeavoring to disclose, to any other person the contents of Plaintiffs’ and the class members’
electronic communications, knowing or having reason to know that the information was obtained
through the interception of Plaintiffs’ and the class members’ electronic communications.
111.
Defendant violated 18 U.S.C. § 211(1)(d) by intentionally using, or endeavoring
to use, the contents of Plaintiffs’ and the class members’ electronic communications, knowing or
having reason to know that the information was obtained through the interception of Plaintiffs’
and the class members’ electronic communications.
112.
Defendant’s intentional interception of these electronic communications without
Plaintiffs’ or class members’ knowledge, consent, or authorization was undertaken without a
facially valid order or certification.
113.
Defendant intentionally used such electronic communications, with knowledge, or
having reason to know, that the electronic communications were obtained through interception,
for an unlawful purpose.
114.
Defendant unlawfully accessed and used, and voluntarily disclosed the contents of
the intercepted communications to enhance his profitability and revenue through advertising.
This disclosure was not necessary for the operation of Defendant’s system or to protect
Defendant’s rights or property.
115.
The Electronic Communications Privacy Act of 1986, 18 U.S.C. § 2520(a)
provides a civil cause of action to “any person whose wire, oral, or oral electronic
communication is intercepted, disclosed, or intentionally used” in violation of the ECPA.
116.
Defendant is liable directly and/or vicariously for this cause of action. Plaintiffs
therefore seek remedy as provided for by 18 U.S.C. § 2520, including such preliminary and other
equitable or declaratory relief as may be appropriate, damages consistent with subsection (c) of
27
that section to be proven at trial, punitive damages to be proven at trial, and a reasonable
attorney’s fee and other litigation costs reasonably incurred.
117.
Plaintiffs and the class members have additionally suffered loss by reason of these
violations, including, without limitation, violation of the right of privacy.
118.
Plaintiffs and the class, pursuant to 18 U.S.C. § 2520, are entitled to preliminary,
equitable, and declaratory relief, in addition to statutory damages of the greater of $10,000 or
$100 a day for each day of violation, actual and punitive damages, reasonable attorneys’ fees,
and Defendant’s profits obtained from the above-described violations. Unless restrained and
enjoined, Defendant will continue to commit such acts. Plaintiffs’ and the class members’
remedy at law is not adequate to compensate it for these inflicted and threatened injuries,
entitling Plaintiffs and the class members to remedies including injunctive relief as provided by
18 U.S.C. § 2510.
Third Cause of Action
Breach of Contract
Against All Defendant
119.
Plaintiffs hereby incorporate by reference the allegations contained in all of the
preceding paragraphs of this complaint.
120.
Plaintiffs and the class members entered into a contract with Defendant Google in
order to use the Google Store apps. This contract had rights, obligations, and duties between
Plaintiffs and the class members and Defendant Google, including but not limited to, protecting
the privacy of its users.
121.
Plaintiffs’ and the class members’ activities involved in their use of the Google
App Store included, but was not limited to, providing personal identifying information to
Defendant Google; furthermore Defendant Google designed Plaintiffs and the class members'
mobile device data, including but not limited to, their mobile devices' UDID with third parties,
including Google Application Developers and Defendant Application Developers Affiliates, on
violation of its own contract with Plaintiffs and the class members.
28
122.
Plaintiffs and the class members did not have notice, nor consent to, Defendant
Google sharing his mobile devices UDID with Google Application Developers or Defendant
Application Developers' Affiliates.
123.
Plaintiffs and the class members have performed their obligation pursuant to
Defendant Google's contract.
124.
Defendant Google has materially breached its contractual obligations through its
conduct.
125.
Plaintiffs and the class members have been damaged as a direct and proximate
result of Defendant Google's breach of its contract with Plaintiffs and the class members.
Fourth Cause of Action
Breach of Implied Covenant of Good Faith and Fair Dealing
Against All Defendant
126.
Plaintiffs hereby incorporate by reference the allegations contained in all of the
preceding paragraphs in this complaint.
127.
As set forth above, Plaintiffs and the class members submit personal information
to Google and such information is stored on Plaintiffs’ and the class members' Android
Operating System, and Google promises in its Privacy Policy that it will not share this
information with third-party advertisers or application developers without Plaintiffs’ consent,
and the consent of each class Member, respectively, and promises in its Android Market clickthrough agreement to protect users' privacy.
128.
A covenant of good faith and fair dealing, which imposes upon each party to a
contract a duty of good faith and fair dealing in its performance, is implied in every contract,
including his agreement in the transactions for acquisitions of Android Operating System and
apps that embodies the relationship between Goggle and its users.
129.
Good faith and fair dealing is an element imposed by common law or statute as an
element of every contract under the laws of every state. Under the covenant of good faith and
fair dealing, both parties to a contract impliedly promise not to violate the spirit of the bargain
29
and not to intentionally do anything to injure the other party's right to receive the benefits of the
contract.
130.
Plaintiffs and the class members reasonably relied upon Google to act in good
faith with regard to the contract and in the methods and manner in which it carries out the
contract terms. Bad faith can violate the spirit of his agreements and may be overt or may
consist of inaction. Google's inaction in failing to adequately notify Plaintiffs and the class
members of the release of his personal information to the Google Application Developers, and
by Defendant Application Developers Affiliates, depriving Plaintiffs and the class members of
the means to discover their information was "leaked", thus evidencing bad faith and ill motive.
131.
The contract is a form contract, the terms of which Plaintiffs are deemed to have
accepted once Plaintiffs and the class members signed up with Google. The contract purports to
give discretion to Google relating to Google's protection of users' privacy. Google is subject to
an obligation to exercise that discretion in good faith. The covenant of good faith and fair
dealing is breached when a party to a contract users discretion conferred by the contract to act
dishonestly or to act outside of accepted commercial practices. Google breached its implied
covenant of good faith and fair dealing by exercising bad faith in using its discretionary rights to
deliberately, routinely, and systematically make Plaintiffs’ and the class members' personal
information available to third parties.
132.
Plaintiffs and the class members' have performed all, or substantially all, of the
obligations imposed on them under contract, whereas Google has acted in a manner as to evade
the spirit of the contract, in particular by deliberately, routinely, and systematically without
notifying Plaintiffs and the class members of its disclosure of Plaintiffs’ and the class members'
personal information to Defendant Affiliates, and by Defendant Developers. Such actions
represent a fundamental wrong that is clearly beyond the reasonable expectation of the parties.
Google's causing the disclosure of such information to the Defendant Affiliates, and by
Defendant Developers is not in accordance with the reasonable expectations of the parties and
evidences a dishonest motive.
30
133.
Google's ill motive is further evidence by its failure to obtain Plaintiffs’ and the
class members' consent in data mining efforts while at the same time consciously and
deliberately facilitating data mining efforts while at the same time consciously and deliberately
facilitating data mining to automatically and without notice provide user information the
Defendant Affiliates, and by Defendant Developers. Google profits from advertising revenues
derived from its mining efforts from Plaintiff and the class.
134.
The obligation imposed by the implied covenant of good faith and fair dealing is
an obligation to refrain from opportunistic behavior. Google has breached the implied covenant
of good faith and fair dealing in his agreement through its policies and practices as alleged
herein. Plaintiffs and the class have sustained damages and seek a determination that the policies
and procedures of Google are not consonant with Google's implied duties of good faith and fair
dealing.
135.
Google's capture, retention, and transfer through synchronization of uses' detailed
location histories, even when such users had disabled GPS services on his Android Operating
System, and storing such location histories in unencrypted form, was a breach of the implied
covenant of good faith and fair dealing.
Fifth Cause of Action
Conversion
Against All Defendant
136.
Plaintiffs hereby incorporate by reference the allegations contained in all of the
preceding paragraphs of this complaint.
137.
Plaintiffs and the class members' mobile device data, including but not limited to
his mobile devices' UDID is being used by Defendant to obtain sensitive and personal
identifying information derived from Plaintiffs’ and the class members' mobile browsing
activities. Such property, owned by the Plaintiffs and the class members, as valuable to the
Plaintiffs and the class members.
31
138.
Plaintiffs and the class members' mobile devices use bandwidth. Defendant's
activities, made the basis of this action, used without notice or authorization, such bandwidth for
purposes not contemplated, not agreed to, by Plaintiffs and the class members when they
downloaded Defendant Application Developer's applications. Such property, owned by the
Plaintiffs and the class members, is valuable to the Plaintiffs and the class members.
139.
Defendant unlawfully exercised dominion over said property and thereby
converted Plaintiffs’ and the class members' property, by providing sensitive and personal
identifying information to third parties and by using Plaintiffs and the class members' bandwidth
for data mining, in violation of the collective allegations, made the basis of this action.
140.
Plaintiffs and the class members were damaged thereby.
Sixth Cause of Action
Negligence
As to Defendant Google
141.
Plaintiffs incorporate the above allegations by reference as if fully set forth
142.
As set forth above, Google owed a duty to Plaintiffs and the class members.
143.
Google breached its duty by designing Android Operating System so that the
herein.
Defendant Affiliates, and by Defendant Developers could acquire personal information without
consumers' knowledge or permission, and by constructing and controlling consumers' user
experience and mobile environment so that consumers could not reasonably avoid such privacyaffecting actions.
144.
Google failed to fulfill its own commitments and, further, failed to fulfill even the
minimum duty of care to protect Plaintiffs’ and the class members' personal information, privacy
rights, and security.
145.
Google's failure to fulfill its commitments included Google's practice of capturing
frequent and detailed information about Android Operating System users' locations for up to one
year, including the locations of Android Operating System users who had utilized Google's
32
prescribed functioning for disabling Global Positioning System services, maintaining records of
such location histories on users' Android Operating System, transferring such location history
files to users' replacement android Operating System, transferring such location history files to
other computers with which users synchronized her Android Operating System, and storing such
location history files in accessible, unencrypted form, without providing notice to users or
obtaining users' consent, and where such practice placed users at unreasonable risk of capture
and misuse of such highly detailed and personal information, and where a reasonable consumer
would consider such a practice unexpected, objectionable, and shocking to the conscience of a
reasonable person.
146.
Google's unencrypted storage on Android Operating System and computers with
which they were synchronized the information described above was negligent.
147.
Plaintiffs and the class members were harmed as a result of Google's breaches of
its duty, and Google proximately caused such harms.
Seventh Cause of Action
Trespass to Personal Property/Chattels
Against All Defendant
148.
Plaintiffs incorporate by reference all paragraphs previously alleged herein.
149.
The common law prohibits the intentional intermeddling with personal property,
including a mobile device, in possession of another which results in the deprivation of the use of
the personal property or impairment of the condition, quality, or usefulness of the personal
property.
150.
By engaging in the acts alleged in this complaint without the authorization or
consent of Plaintiffs and the class members, Defendant dispossessed Plaintiffs and the class
members from use and/or access to her mobile devices, or parts of them. Further, these acts
impaired the use, value, and qualify of Plaintiffs’ and the class members' mobile device.
Defendant's acts constituted an intentional interference with the use and enjoyment of their
33
mobile devices. By the acts described above, Defendant has repeatedly and persistently engaged
in trespass to personal property in violation of the common law.
151.
Without Plaintiffs and the class members' consent, or in excess of any consent
given, Defendant knowingly and intentionally accessed Plaintiffs’ and the class members'
property, thereby intermeddling with Plaintiffs’ and the class members' right to possession of the
property and causing injury to Plaintiffs and the members of the class.
152.
Defendant engaged in deception and concealment in order to gain access to
Plaintiffs’ and the class members' mobile devices.
153.
Defendant undertook the following actions with respect to Plaintiffs’ and the class
members' mobile devices:
a)
b)
c)
d)
e)
154.
Defendant accessed and obtained control over the users' mobile device;
Defendant caused the installation of code on the hard devices of the
mobile devices;
Defendant programmed the operation of its code to circumvent the mobile
device owners privacy and security controls, to remain beyond his control,
and to continue function and operate without notice to them or consent
from Plaintiff and the class members;
Defendant obtained users' UDID from a tracking code on the users'
mobile device; and
Defendant used the users' UDID to obtain without notice of consent,
mobile browsing activities of the mobile device, and outside of the control
of the owner of the mobile device.
All these acts described above were acts in excess of any authority any user
granted when he or she visited the Defendant Google's Android Market and downloaded one (1)
or more of the Defendant applications and none of these acts was in furtherance of users viewing
the Defendant applications. By engaging in deception and misrepresentation, whatever authority
or permission Plaintiffs and the class members may have granted to Defendant Google and/or
Google Application Developers was visited.
34
155.
Defendant's installation and operation of its program used, interfered and/or
intermeddled with Plaintiffs’ and the class members' mobile devices. Such use, interference
and/or intermeddling was without Plaintiffs’ and the class members' consent or, in the
alternative, in excess of Plaintiffs’ and the class members' consent.
156.
Defendant's installation and operation of its program constitutes trespass,
nuisance, and an interference with Plaintiffs’ and the class members' chattels, to wit, their mobile
devices.
157.
Defendant's installation and operation of its program impaired the condition and
value of Plaintiffs’ and the class members' mobile devices.
158.
Defendant's trespass to chattels, nuisance, and interference caused real and
substantial damage to Plaintiffs and the class members.
159.
As a direct and proximate result of Defendant's trespass to chattels, nuisance,
interference, unauthorized access of and intermeddling with Plaintiffs’ and the class members'
property, Defendant has injured and impaired in the condition and value of class members'
mobile devices, as follows:
a)
b)
c)
d)
e)
f)
g)
By consuming the resources of and/or degrading the performance of
Plaintiffs’ and the class members' mobile devices (including space,
memory, processing cycles, Internet connectivity, and unauthorized use of
their bandwidth);
By diminishing the use of value, speed, capacity, and/or capabilities of
Plaintiffs’ and the class members' mobile devices;
By devaluing, interfering with, and/or diminishing Plaintiffs’ and the class
members' possessory interest in their mobile devices;
By altering and controlling the functioning of Plaintiffs’ and the class
members' mobile devices;
By infringing on Plaintiffs’ and the class members' right to exclude other
from their mobile devices;
By infringing on Plaintiffs’ and the class members' right to determine, as
owners of their mobile devices, which programs should be installed and
operating on their mobile devices;
By compromising the integrity, security, and ownership of class members'
35
h)
mobile devices; and
By forcing Plaintiffs and the class members to expend money, time, and
resources in order to remove the program installed on their mobile devices
without notice of consent.
Eighth Cause of Action
Unjust Enrichment
Against All Defendant
160.
Plaintiffs hereby incorporate by reference the allegations contained in all of the
paragraphs of this complaint.
161.
By engaging in the conduct described in this Complaint, Defendant has
knowingly obtained benefits from the Plaintiffs under circumstances that make it inequitable and
unjust for Defendant to retain them.
162.
Plaintiffs and the class have conferred a benefit upon the Defendant which have,
directly or indirectly, received and retained personal information of Plaintiffs and the class
members, as set forth herein. Defendant has received and retained information that is otherwise
private, confidential, and not of public record, and/or have received revenue from the provision,
use, and/or trafficking in the sale of such information.
163.
Defendant appreciates and/or has knowledge of said benefit.
164.
Under principles of equity and good conscience, the Defendant should not be
permitted to retain the information and/or revenue that they acquired by virtue of his unlawful
conduct. All funds, revenue, and benefits received by them rightfully belong to Plaintiffs and the
class, which the Defendant has unjustly received as a result of his actions.
165.
Plaintiffs and the class members have no adequate remedy at law.
166.
Defendant has received a benefit from Plaintiffs and Defendant has received and
retains money from advertisers and other third-parties as a result of sharing the personal
36
information of Defendant's users' with those advertisers without Plaintiffs’ knowledge or consent
as alleged in this Complaint.
167.
Plaintiffs and the class members did not expect that Defendant would seek to gain
commercial advantage from third-parties by using their personal information without their
consent.
168.
Defendant knowingly used Plaintiffs’ and the class members' personal
information without their knowledge or consent to gain commercial advantage from third-parties
and had full knowledge of the benefits they have received from Plaintiffs and class members. If
Plaintiffs and the class members had known Defendant was not keeping their personal
information from third-parties, they would not have consented and Defendant would not have
gained commercial advantage from third-parties.
169.
Defendant will be unjustly enriched if Defendant is permitted to retain the money
paid to them by third-parties, or resulting from the commercial advantage they gained, in
exchange for Plaintiffs’ and the class members' personal information.
170.
Defendant should be required to provide restitution of all money obtained from
his unlawful conduct.
171.
Plaintiffs and the class members are entitled to an award of compensatory and
punitive damages in an amount to be determined at trial or to be imposition of a constructive
trust upon the wrongful revenues and/or profits obtained by and benefits conferred upon
Defendant as a result of the wrongful actions as alleged in this complaint.
172.
Plaintiffs and the class have no remedy at law to prevent Defendant from
continued unjust retention of the money Defendant received from third-party advertisers.
37
PRAYER FOR RELIEF
WHEREFORE, Plaintiffs, on behalf of themselves and all others similarly situated, pray
for judgment against Defendant as follows:
A.
Certify this case as a class action on behalf of the classes defined above, appoint
Plaintiffs as class representatives, and appoint their counsel as;
B.
Declare that the actions of Defendant, as set out above, violate the claims;
C.
Awarding injunctive and equitable relief including, inter alia: (i) prohibiting
Defendant from engaging in the acts alleged above; (ii) requiring defendant to disgorge all of its
ill-gotten gains to Plaintiffs and the other class members, or to whomever the Court deems
appropriate; (iii) requiring Defendant to delete all data surreptitiously or otherwise collected
through the acts alleged above; (iv) requiring Defendant to provide Plaintiffs and the other class
members a means to easily and permanently decline any participation in any data collection
activities; (v) awarding Plaintiffs and the class members full restitution of all benefits wrongfully
acquired by Defendant by means of the wrongful conduct alleged herein; and (vi) ordering an
accounting and constructive trust imposed on the data, funds, or other assets obtained by
unlawful means as alleged above, to avoid dissipation, fraudulent transfers, and/or concealment
of such assets by Defendant;
D.
Award damages, including statutory damages where applicable, to Plaintiffs and
the class members in an amount to be determined at trial;
E.
Award restitution against Defendant for all money to which Plaintiffs and the
classes are entitled in equity;
F.
Restrain Defendant, his officers, agents, servants, employees, and attorneys, and
those in active concert or participation with them from continued access, collection, and
transmission of Plaintiffs’ and the class members' personal information via preliminary and
permanent injunction;
G.
Award Plaintiffs and the classes:
38
a)
b)
c)
d)
e)
f)
H.
Compensatory damages sustained by Plaintiffs and all others similarly
situated as a result of Defendant's unlawful acts and conduct;
Restitution, disgorgement and/or other equitable relief as the Court deems
proper;
Their reasonable litigation expenses and attorneys' fees;
Pre- and post-judgment interest, to the extent allowable;
Statutory damages, including punitive damages; and
Permanent injunction prohibiting Defendant from engaging in the conduct
and practices complained of herein.
For such other and further relief s this Court may deem just and property.
JURY TRIAL DEMAND
Plaintiffs hereby demand trial by jury of all issues so triable.
DATED: August
6th , 2011
Respectfully Submitted,
/s/ E. Kirk Wood
E. Kirk Wood
Counsel for Plaintiffs
OF COUNSEL:
E. Kirk Wood
Wood Law Firm, LLC
P.O. Box 382434
Birmingham, Alabama 35238-2434
Telephone: (205) 612-0243
Facsimile: (866) 747-3905
ekirkwood1@bellsouth.net
Joe R. Whatley, Jr.
Whatley, Drake & Kallas
2001 Park Place North, Suite 1000
Birmingham, Alabama 35203
(205) 328-9576
(205) 328-9669 facsimile
Email: jwhatley@wdklaw.com
39
REQUESTS FOR SERVICE BY CERTIFIED MAIL
Pursuant to MRCP 4.1 and 4.2, Plaintiffs request service of the foregoing Complaint by certified
mail.
By:
/s/ Joe R. Whatley, Jr.
Joe R. Whatley, Jr.
Attorney for Plaintiffs
SERVE DEFENDANTS BY CERTIFIED MAIL AS FOLLOWS:
Google, Inc.
1600 Amphitheatre Parkway
Mountain View, California 94043
40
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?