Yuncker v. Pandora Media, Inc.

Filing 75

ORDER GRANTING IN PART AND DENYING IN PART 54 MOTION to Dismiss. Case Management Statement due by 5/24/2013. Case Management Conference set for 5/31/2013 01:30 PM in Courtroom 11, 19th Floor, San Francisco.. Signed by Judge JEFFREY S. WHITE on 3/26/13. (jjoS, COURT STAFF) (Filed on 3/26/2013)

Download PDF
1 2 3 4 5 NOT FOR PUBLICATION 6 IN THE UNITED STATES DISTRICT COURT 7 FOR THE NORTHERN DISTRICT OF CALIFORNIA 8 9 TROY YUNKER, Plaintiff, For the Northern District of California United States District Court 10 11 12 No. 11-CV-03113 JSW ORDER GRANTING IN PART AND DENYING IN PART PANDORA MEDIA, INC.’S MOTION TO DISMISS v. PANDORA MEDIA, INC., (Docket No. 54) 13 Defendant. / 14 15 INTRODUCTION 16 Now before the Court for consideration is motion to dismiss filed by Defendant Pandora 17 Media, Inc. (“Pandora”). The Court has considered the parties’ papers, relevant legal authority, 18 the record in this case, and it HEREBY GRANTS, IN PART, AND DENIES IN PART, 19 Pandora’s motion, and GRANTS Yunker leave to amend. 20 BACKGROUND1 21 Pandora has developed an “App” for use on mobile devices, which allows users to 22 access, stream, and download digital music files. (Docket No. 50, First Amended Class Action 23 Complaint (“FAC”) ¶¶ 13-14.) When a user downloads the Pandora App and register with 24 Pandora, Pandora gathers personally identifiable information (“PII”) about the user, including 25 their age, gender, location and a universally unique device identifier (“UUID”). (Id. ¶ 15.) 26 When the Pandora App runs on a device that uses the Android operating system, the Pandora 27 App is integrated with advertising libraries such as AdMob, AdMarvel, comScore 28 The facts set forth herein are accepted as true solely for purposes of evaluating the motions to dismiss. 1 1 (SecureStudies), Google.Ads, and Medialets. These advertising libraries “lurk in the 2 background while Pandora users navigate the App, collecting scores of [PII] which are later 3 packaged and sold by the advertising libraries.” (Id. ¶¶ 20-21; see also id. ¶¶ 22-23.) 4 Pandora’s Privacy Policy provides, in part, that it may: 5 use and share non-personally identifiable information, such as general demographic or location information, or information about the computer or device from which you access [the Pandora App]. Additionally, we may de-identify personally identifiable information and share it in a deidentified or aggregated form with third parties, advertisers and/or business partners in order to analyze [Pandora] usage, improve the Pandora Services and your listener experience, or for other similar purposes. The use and disclosure of such information is not subject to any restrictions under the Privacy Policy. 6 7 8 9 (Id. ¶ 17 (citing http://www.pandora.com/privacy).)2 11 For the Northern District of California United States District Court 10 Yunker contends that he and other users consented to provide Pandora with PII based on 12 the representations in the Privacy Policy that it would de-identify their PII and anonymize that 13 data, when in fact it did not. Yunker also alleges that Pandora exceeded the scope of that 14 consent when it permitted advertising libraries access to users’ PII. (Id. ¶¶ 25-27.) “Pandora 15 users’ PII has substantial value to Pandora.” (Id. ¶ 30.) There are now “active markets through 16 which people and entities busy and sell this type of PII.” One such study has shown that 17 consumers value the restriction of improper access to their data at between $11.33 and $16.58 18 per website and value the prohibition on secondary use at between $7.98 and $11.68 per 19 website. (Id. ¶¶ 31-32.) 20 Yunker is a resident of Illinois, who owned an Android mobile device and downloaded 21 and used the Pandora App. (Id. ¶ 7.) When he registered for the Pandora App, Yunker 22 provided certain PII to Pandora. (Id. ¶¶ 34-35.) Yunker considers his PII to be his private 23 property and considers it to have an economic value. Yunker did not consent to the distribution 24 of that PII to third parties. (Id. ¶¶ 36-38; see also id. ¶¶ 31-32.) Yunker also contends that 25 “certain code components were installed on [his] Android mobile device, which consumed 26 portions of the ‘cache’ and/or gigabytes of memory on” his device. Yunker paid money for the 27 28 Pandora attached a copy of its Privacy Policy, effective as of November 5, 2011, to the declaration of Craig Sterry in support of its motion to dismiss. 2 2 1 exclusive use of that memory, and “Android charges its own consumers a premium to purchase 2 extra memory space...” (Id. ¶¶ 39-43.) 3 Based on these and other allegations, which the Court shall address as necessary, 4 Yunker asserts claims for: (1) violations of Title I of the Electronic Communications Privacy 5 Act (“ECPA”), 18 U.S.C. sections 2510, et seq. (the “Wiretap Act Claim”); (2) violations of 6 Title II of the ECPA, 18 U.S.C. sections 2701, et seq. (the “Stored Communications Act 7 Claim”); (3) violations of the Computer Fraud and Abuse Act (the “CFFA Claim”); (4) 8 violations of California Business and Profession Code section 17200, et seq., (the “UCL 9 Claim”); (5) violations of the Consumer Legal Remedies Act, California Civil Code sections 1750, et seq. (the “CLRA Claim”); (6) breach of contract; (7) public disclosure of private facts; 11 For the Northern District of California United States District Court 10 (8) intrusion; (9) violations of Article I, Section I of the California Constitution (the “Right to 12 Privacy Claim”); (10) trespass to personal property; and (11) conversion.3 13 14 15 ANALYSIS A. Applicable Legal Standards. Pandora moves to dismiss on the basis that the Yunker lacks standing under Article III 16 of the United States Constitution. The Court evaluates the motion to dismiss for lack of 17 standing pursuant to Federal Rule of Civil Procedure 12(b)(1). See White v. Lee, 227 F.3d 18 1214, 1242 (9th Cir. 2000). A motion to dismiss for lack of subject matter jurisdiction under 19 Rule 12(b)(1) may be “facial or factual.” Safe Air for Everyone v. Meyer, 373 F.3d 1035, 1039 20 (9th Cir. 2004). In this case, Pandora raises a facial challenge to Yunker’s standing, and, 21 therefore, the Court “must accept as true all material allegations in the complaint, and must 22 construe the complaint in” Yunker’s favor. Chandler v. State Farm Mut. Auto Ins. Co., 598 23 F.3d 1115, 1121-22 (9th Cir. 2010); see also Lujan v. Defenders of Wildlife, 504 U.S. 555, 561 24 (1992) (“At the pleading stage, general factual allegations of injury resulting from the 25 defendant’s conduct may suffice, for on a motion dismiss, [courts] presume that general 26 27 28 3 Although Yunker is a resident of Illinois, the parties have assumed that California law applies to the claims for breach of contract, public disclosure of private facts, intrusion, trespass to personal property, and conversion. The Court, therefore, has applied California law to resolve the motion. 3 1 allegations embrace those specific facts that are necessary to support the claim.”) (internal cite 2 and quotations omitted). 3 Rule 12(b)(6). A motion to dismiss is proper under Rule 12(b)(6) where the pleadings fail to 4 state a claim upon which relief can be granted. The Court construes the allegations in the 5 complaint in the light most favorable to the non-moving party and all material allegations in the 6 complaint are taken to be true. Sanders v. Kennedy, 794 F.2d 478, 481 (9th Cir. 1986). 7 However, even under the liberal pleading standard of Rule 8(a)(2), “a plaintiff’s obligation to 8 provide the ‘grounds’ of his ‘entitle[ment] to relief’ requires more than labels and conclusions, 9 and a formulaic recitation of the elements of a cause of action will not do.” Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 555 (2007) (citing Papasan v. Allain, 478 U.S. 265, 286 (1986)). Pursuant to Twombly, a plaintiff must not merely allege conduct that is conceivable but 11 For the Northern District of California United States District Court 10 Pandora also moves to dismiss each of the claims pursuant to 12 must instead allege “enough facts to state a claim to relief that is plausible on its face.” Id. at 13 570. “A claim has facial plausibility when the plaintiff pleads factual content that allows the 14 court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” 15 Ashcroft v. Iqbal, 556 U.S.662, 678 (2009) (citing Twombly, 550 U.S. at 556). “The plausibility 16 standard is not akin to a probability requirement, but it asks for more than a sheer possibility 17 that a defendant has acted unlawfully.... When a complaint pleads facts that are merely 18 consistent with a defendant’s liability, it stops short of the line between possibility and 19 plausibility of entitlement to relief.” Id. (quoting Twombly, 550 U.S. at 557) (internal quotation 20 marks omitted). If the allegations are insufficient to state a claim, a court should grant leave to 21 amend, unless amendment would be futile. See, e.g., Reddy v. Litton Indus., Inc., 912 F.2d 291, 22 296 (9th Cir. 1990); Cook, Perkiss & Liehe, Inc. v. N. Cal. Collection Serv., Inc., 911 F.2d 242, 23 246-47 (9th Cir. 1990). 24 B. Article III Standing. Pandora moves to dismiss Yunker’s third through eleventh claims for relief on the basis 25 26 that Yunker lacks standing.4 In order to satisfy the Constitution’s standing requirements, a 27 28 Pandora does not dispute that Yunker has standing to pursue the claims for violations of the Wiretap Act and the Stored Communication Act. 4 4 1 plaintiff must show: (1) he or she has suffered an “injury in fact” that is (a) concrete and 2 particularized and (b) actual or imminent, not conjectural or hypothetical; (2) that the injury is 3 fairly traceable to the challenged action of the defendant; and (3) that it is likely, as opposed to 4 merely speculative, that the injury will be redressed by a favorable decision. Lujan, 504 U.S. at 5 560-61; see also Clapper v. Amnesty International, – S.Ct. –, 2013 WL 673353, at *7 (“[W]e 6 have repeatedly reiterated that threatened injury must be certainly impending to constitute 7 injury in fact, and that allegations of possible future injury are not sufficient.”) (internal 8 quotations, citations and brackets omitted, emphasis in original). A plaintiff also may establish 9 the requisite injury “by virtue of ‘statutes creating legal rights, the invasion of which creates standing.’” Edwards v. First Am. Financial Corp., 610 F.3d 514, 517 (9th Cir. 2010) (quoting 11 For the Northern District of California United States District Court 10 Fulfillment Servs., Inc. v. United Parcel Serv., Inc., 528 F.3d 614, 618-19 (9th Cir. 2008)). 12 “The jurisdictional question of standing precedes, and does not require, analysis of the 13 merits.” Equity Lifestyle Props., Inc. v. County of San Luis Obispo, 548 F.3d 1184, 1189 n.10 14 (9th Cir. 2008). Thus, “[a] plaintiff may satisfy the injury-in-fact requirements to have 15 standing under Article III, and ... may be able to ‘bring a civil action without suffering dismissal 16 for want to standing to sue,’ without being able to assert a cause of action successfully.” In re 17 Facebook Privacy Litig., 791 F. Supp. 2d 705, 712 n.5 (N.D. Cal. 2011) (quoting Doe v. Chao, 18 540 U.S. 614, 624-25 (2004)). 19 Yunker argues that he has alleged facts sufficient to show standing, because he alleges: 20 (1) Pandora’s conduct diminished the value of his PII; (2) Pandora’s conduct decreased the 21 memory space on his mobile device; (3) Pandora’s disclosure of his PII put him at risk of future 22 harm; and (4) Pandora invaded his constitutional right to privacy when it disseminated his PII to 23 third parties. (See generally FAC ¶¶ 34-43.) The Court addresses each argument in turn. 24 1. 25 Although the Ninth Circuit has yet to address the issue, district courts have been Dimunition in Value of PII. 26 reluctant to find standing based solely on a theory that the value of a plaintiff’s PII has been 27 diminished. See, e.g., In re Google, Inc. Privacy Litig., 2012 WL 6378343, at *4-6 (N.D. Cal. 28 Dec. 28, 2012); In re iPhone Application Litig., 844 F. Supp. 2d 1040, 1054 (2012) (“Plaintiffs 5 1 have alleged additional theories of harm beyond their theoretical allegations that personal 2 information has independent economic value.”); Low v. Linkedin Corp., 2011 WL 5509848, at 3 *4-5 (N.D. Cal. Nov. 11, 2011) (“Low I”); In re iPhone Application Litig., 2011 WL 4403963, 4 at *4 (N.D. Cal. Sept. 20, 2011) (“iPhone I”); LaCourt v. Specific Media, Inc., 2011 WL 5 2473399, at * 4 (C.D. Cal. Apr. 28, 2011). 6 Yunker attempts to bolster the argument that his PII has value by alleging that he “paid” 7 for the Pandora App by providing Pandora with his PII. (See, e.g., FAC ¶¶ 33, 110.) In support 8 of this argument, Yunker relies on Claridge v. RockYou, Inc., 785 F. Supp. 2d 855 (N.D. Cal. 9 2011). In the Claridge case, the court denied a motion to dismiss for lack of standing, noting the “paucity of controlling authority regarding the legal sufficiency of plaintiff’s damages 11 For the Northern District of California United States District Court 10 theory.” Id. at 861. The court also noted that “the context in which plaintiff’s theory arises - 12 i.e., the unauthorized disclosure of personal information via the Internet - is itself relatively 13 new, and therefore more likely to raise issues of law not yet settled in the courts.” Id. “For that 14 reason, and although [it had] doubts about [the] plaintiff’s ultimate ability to prove his damages 15 theory,” the court found the “allegations of harm sufficient at this stage to allege a generalized 16 injury in fact.” Id. 17 However, unlike Yunker, the plaintiff in that case also relied on the fact that there had 18 been a breach to the servers on which the defendant held his personal information. Id. at 858- 19 59. The plaintiff in Claridge also alleged that the defendant asked for such information as 20 usernames and passwords of third party social networking sites and that such information was at 21 risk of disclosure. Id. Yunker does not allege that he provided passwords or other sensitive 22 financial information to Pandora as “payment” for its service. (See, e.g., FAC ¶¶ 15, 35-36.) 23 The Court finds Claridge to be distinguishable on its facts. 24 Although Yunker alleges that studies show that consumers ascribe specific dollar values 25 to their PII, he does not specifically tie those allegations to him. Yunker does not allege he that 26 attempted to sell his PII, that he would do so in the future, or that he was foreclosed from 27 entering into a value for value transaction relating to his PII, as a result of Pandora’s conduct. 28 Yunker also does not allege that had he known how Pandora would use his PII, he would not 6 1 have downloaded or used the App. See, e.g., Low I, 2011 WL 5509848, at *5 (finding that 2 plaintiff lacked standing where he failed to allege facts showing how he was foreclosed from 3 capitalizing on the value of his personal data or how he was ‘deprived of the economic value of 4 [his] personal information simply because [his] unspecified personal information was 5 purportedly collected by a third party’”) (quoting LaCourt, 2011 WL 1661532 at *5); LaCourt, 6 2011 WL 1661532, at *4-5 (court noted it “probably would decline to say that it was 7 categorically impossible for [p]laintiffs to allege some property interest” relating to value of 8 personal information, but finding plaintiffs lacked standing because they failed to “identify a 9 single individual who was foreclosed from entering into a ‘value-for-value exchange’” as a result of defendant’s practices). Even if the Court assumes that PII is a form of personal 11 For the Northern District of California United States District Court 10 property, the court concludes Yunker has not alleged facts sufficient to show injury-in-fact 12 based on the purported dimunition in value of his PII. 13 2. 14 Yunker also argues he has shown injury in fact based on a decrease in the memory space 15 on his Andorid mobile device. Specifically, Yunker alleges that he paid for the exclusive use of 16 the memory on his Android mobile device and alleges that “the presence and surreptitious 17 activities of the third-party advertising libraries in the Pandora App include certain code 18 components that ... consumed portions of the ‘cache’ and/or gigabytes of memory” available to 19 him. (FAC ¶ 39; see also id. ¶¶ 41-42.) Courts have found that “[d]imunition in the 20 performance of an electronic device may constitute an injury in fact, but a plaintiff must ‘allege 21 facts showing that this is true.’” Goodman v. HTC America, Inc., 2012 WL 2412070, at *6 22 (W.D. Wash. June 26, 2012) (quoting LaCourt, 2011 WL 1661532, at *5) (emphasis added). 23 For example, in iPhone II, the court concluded that allegations regarding diminished storage, 24 battery life, and bandwidth were sufficient to allege actual injury. See 844 F. Supp. 2d at 1054- 25 56. The plaintiffs in iPhone II alleged that they paid for the “exclusive use” of the memory on 26 their phones, as Yunker does here. However, unlike Yunker, they also included specific 27 allegations about the apparently large amount of memory the defendants consumed. (See, e.g., 28 In re iPhone Application Litig., No. 11-MD-2250-LHK, Docket No. 25, First Amended Decrease in Memory Space. 7 1 Consolidated Complaint (“iPhone II Compl.”), ¶¶ 63.b, 72.d, 198.) Yunker also does not allege 2 that he noticed any performance problems or that he had problems with his phone because of 3 the diminished memory space. This case also differs from both iPhone II and Goodman, 4 because the defendants in those cases manufactured the mobile devices in question and, thus, 5 the plaintiffs could satisfy the requirement that their alleged injury was fairly traceable to the 6 defendant’s conduct. Yunker has not named a manufacturer as a defendant, he did not pay for 7 the Pandora App, and he does not allege that he would not have downloaded the Pandora App 8 had he known it would consume the memory space at issue.5 9 3. Yunker also attempts to rely on a theory that he is subject to an increased threat of future 11 For the Northern District of California United States District Court 10 Future Harm. harm, based on the fact that Pandora does not anonymize his PII. In support of this argument, 12 Yunker relies on Krottner v. Starbucks, Corp., 628 F.3d 1139 (9th Cir. 2010). In that case, 13 however, the plaintiff alleged that a laptop which contained social security numbers, as well as 14 names and addresses had been stolen. The court found plaintiff had alleged facts sufficient to 15 show standing based on an increased risk of identity theft. Id. at 1143. The court expressly 16 noted, however, that “if no laptop had been stolen, and Plaintiffs had sued based on the risk that 17 it would be stolen at some point in the future, we would find the threat far less credible.” Id. 18 The Court finds that the facts of this case are distinguishable from the facts in Krottner. 19 Yunker does not allege that he disclosed sensitive financial information, such as a social 20 security number or a credit card number, to Pandora. Further, he has not alleged that anyone 21 has breached Pandora’s servers. Although Yunker alleges that Pandora did not anonymize his 22 PII when it provided that information to the advertising libraries, the Court finds that at best 23 Yunker alleges facts that show it might be possible that, in the future, he could be the victim of 24 25 26 27 28 Yunker alleges that “Android” charges its consumers a premium to purchase extra memory space on the Android mobile devices. (¶ 40) “Android” is not a defendant, and Yunker has not alleged that he purchased extra memory space. It also is not clear that Yunker attempts to rely on an overpayment theory, but even if he did, he does not include facts sufficient to show that any alleged injury based on overpayment for an Android mobile device is fairly traceable to Pandora’s conduct. 5 8 1 identity theft. However, the possibility of future harm is insufficient to establish standing. See 2 Clapper, – S.Ct. –, 2013 WL 673353, at *7. 3 4. Invasion of Constitutional Rights. 4 Yunker also relies on a theory of injury based on alleged violations of his constitutional virtue of statutes creating legal rights, the invasion of which creates standing....” Warth v. 7 Seldin, 422 U.S. 490, 500 (1975). With respect to the alleged violations of the constitutional 8 right to privacy, Pandora does not dispute that the constitutional provision “can be understood 9 as granting persons in [Yunker’s position] a right to judicial relief.” Id. Thus, the Court 10 concludes that Yunker has standing to pursue that claim, and it denies, in part, Pandora’s 11 For the Northern District of California privacy rights. “[T]he actual or threatened injury required by [Article III] may exist solely by 6 United States District Court 5 motion to dismiss on this basis. 12 For the foregoing reasons, the Court GRANTS, IN PART, AND DENIES, IN PART, 13 Pandora’s motion to dismiss for lack of standing. Because the Court concludes that Yunker 14 may be able to cure the deficiencies identified above, the Court GRANTS Yunker leave to 15 amend. 16 D. 17 The Court Dismisses the Wiretap Act Claim, with Leave to Amend. In his first claim for relief, Yunker alleges that Pandora violated the Wiretap Act. The 18 ECPA amended the Wiretap Act to extend protections to electronic communications and 19 created a private right of action to “any person whose wire, oral, or electronic communication is 20 intercepted, disclosed, or intentionally used in violation of this chapter....” 18 U.S.C. § 2520(a); 21 see also Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir. 2002). Yunker alleges 22 that Pandora intentionally violated the Wiretap Act by: (1) intentionally divulging contents of a 23 communication to third parties, in violation of Section 2511(3)(A); (2) intentionally intercepting 24 Yunker’s electronic communications, in violation of Section 2511(1)(a); and (3) intentionally 25 using Yunker’s electronic communications to profit from its unauthorized collection and sale of 26 its data. 27 1. “Contents” of a Communication. 28 9 1 Pandora moves to dismiss the Wiretap Act claim on the basis that Yunker fails to allege 2 facts showing it intercepted the “contents” of any electronic communication. The Wiretap Act 3 defines “contents” as “any information concerning the substance, purport, or meaning of that 4 communication.” 18 U.S.C. § 2510(8). Pandora argues that information such as the UUID, and 5 a person’s zip code, gender, or birthday cannot comprise the “substance, purport, or meaning” 6 of a communication. Based on the allegations in this case, the Court does not find that 7 argument persuasive. which included information about a call’s origination, and the length and time of the call, did 10 not meet the statutory definition of contents of a communication and, thus, was not subject to 11 For the Northern District of California In United States v. Reed, the Ninth Circuit concluded that “call data content (CDC),” 9 United States District Court 8 the Wiretap Act’s sealing requirements. 575 F.3d 900, 914-917 (9th Cir. 2009). The court 12 reasoned that CDC is “data that is incidental to the use of a communication device and contains 13 no ‘content’ or information that the parties intended to communicate.” 575 F.3d at 916 14 (emphasis added); cf. United States v. Forrester, 512 F.3d 500, 510 (9th Cir. 2008) (finding that 15 email and Internet users “have no expectation of privacy in the to/from addresses of their 16 messages or the IP addresses of the websites they visit because they should know that this 17 information is provided to and used by Internet service providers for the specific purpose of 18 directing the routing of information” and concluding that information did not meet the 19 definition of “contents,” because it did not reveal information about the underlying 20 communication). 21 In iPhone II, the court, following Reed, dismissed the plaintiffs’ Wiretap Act claim, in 22 part, on the basis that the geolocation data collected by Apple was “generated automatically, 23 rather than through the intent of the user, and therefore [did] not constitute ‘content’ susceptible 24 to interception.” 844 F. Supp. 2d at 1062 (emphasis added); see also id. (“[T]he Court 25 concludes that under the current version of the statute, personally identifiable information that is 26 automatically generated by the communication but that does not comprise the substance, 27 purport, or meaning of that communication is not covered by the Wiretap Act.”) (emphasis 28 added). Yunker alleges that he intended to provide his PII to Pandora when he registered for its 10 1 service. Thus, the facts in this case are distinguishable from the facts in iPhone II, because 2 Yunker’s Wiretap Act Claim is not based on a communication that includes data that has been 3 generated automatically. Rather, on the facts of this case, Yunker alleges that the PII is the 4 substance of the electronic communication. 5 2. 6 Pandora also moves to dismiss the Wiretap Act claim on the basis that Yunker fails to Interception. 7 allege it “intercepted” an electronic communication. “Intercept” means “the aural or other 8 acquisition of the contents of any wire, electronic, or oral communication through the use of any 9 electronic, mechanical or other device.” 18 U.S.C. § 2510(4). In order to establish that a defendant “intercepted” an electronic communication, a plaintiff must allege facts that show the 11 For the Northern District of California United States District Court 10 electronic communication has been “acquired during transmission, not while it is in electronic 12 storage.” Konop, 302 F.3d at 878-79. As discussed above, Yunker alleges that he provided his 13 PII to Pandora and alleges that Pandora subsequently “intercepted” that communication from 14 him. 15 In Crowley v. Cybersource, the plaintiff alleged that Amazon intercepted an e-mail 16 message and then disclosed its contents to a co-defendant, CyberSource for the purpose of 17 invading the plaintiff’s privacy. Crowley, 166 F. Supp. 2d 1263, 1268 (N.D. Cal. 2001). The 18 court found that when the plaintiff transmitted his information to Amazon via e-mail, “Amazon 19 did not ‘intercept’ the communication within the meaning of the Wiretap Act, because Amazon 20 did not acquire it using a device other than the drive or server on which the e-mail was 21 received.” Id. at 1269; see also id. (noting that plaintiff’s interpretation of intercept would lead 22 to an “untenable” result, because it would “effectively remove from the definition of intercept 23 the requirement that the acquisition be through a ‘device.’” Id.; see also Marsh v. Zazoom 24 Solutions, LLC, 2012 WL 952226, at *17 (N.D. Cal. Mar. 20, 2012) (dismissing Wiretap Act 25 claim where plaintiff did not allege that any defendant “acquired the information by capturing 26 the transmission of information that was otherwise in the process of being communicated to 27 another party,” or that any defendant used a “device” to intercept the communication). 28 11 1 The Court finds the reasoning in Crowley and Marsh persuasive, and it concludes that 2 Yunker fails to allege facts showing that Pandora “intercepted” an electronic communication, 3 because he does not allege that Pandora intercepted any communication that was that he was 4 communication to another party or that Pandora used a “device” to intercept the 5 communication. 6 3. 7 Pandora also moves to dismiss on the basis that it is a party to the communications. Pandora as Party to Communications. 8 Yunker alleges that Pandora provides an electronic communication service to the public and 9 intentionally divulged his PII to third parties, in violation of Section 2511(3)(A). (FAC ¶¶ 5657, 60.) This provision of the Wiretap Act provides that “a person or entity providing an 11 For the Northern District of California United States District Court 10 electronic communication service to the public shall not intentionally divulge the contents of 12 any communication (other than one made to such person or entity, or an agent thereof)....” 18 13 U.S.C. § 2511(3)(A) (emphasis added). 14 Assuming for the sake of argument that Pandora provides an electronic communication 15 service, by its terms Section 2510(3)(a) permits a person or entity to divulge a communication 16 when the communication was to that person or entity. Because Yunker expressly alleges that he 17 communicated his PII to Pandora, the Court concludes that Yunker fails to state a claim for a 18 violation of Section 2510(3)(a). See, e.g., In re Facebook Privacy Litig., 791 F. Supp. 2d at 713 19 (finding allegations insufficient to state a claim under Section 2510(3)(a), where 20 communication at issue was sent from user (the plaintiffs) to the defendant). 21 Accordingly, for the foregoing reasons, the Court GRANTS, IN PART, AND DENIES, 22 IN PART, Pandora’s motion to dismiss the Wiretap Act claim. Although the Court is skeptical 23 that Yunker could amend this claim, the Court cannot say it would be futile do so, and it 24 GRANTS Yunker leave to amend. 25 // 26 // 27 28 E. The Court Dismisses the Stored Communications Act Claim, with Leave to Amend. 12 1 Yunker’s second claim for relief asserts that Pandora violated 18 U.S.C. sections 2 2702(a)(1) and 2702(a)(2) of the Stored Communications Act. Pandora raises a number of 3 arguments in support of its motion to dismiss. 4 1. 5 Section 2702(a)(1) provides that, subject to certain exceptions, “a person or entity 6 providing an electronic communication service to the public shall not knowingly divulge to any 7 person or entity the contents of a communication while in electronic storage by that service[.]” 8 Pandora moves to dismiss, in part, on the basis that Yunker fails to allege it divulged the 9 contents of an electronic communication “while in electronic storage.” Because the Court finds 11 For the Northern District of California United States District Court 10 Section 2702(a)(1). this argument dispositive, it does not reach Pandora’s alternative arguments. Yunker does not address this argument in his opposition brief, implicitly conceding that 12 it has merit. “Electronic storage” is defined as “any temporary, intermediate storage of a wire 13 or electronic communication incidental to the electronic transmission thereof; and any storage 14 of such communication by an electronic communication service for purposes of back up 15 protection of such communication.” 18 U.S.C. § 2510(17)(A)-(B); see also 18 U.S.C. § 16 2711(1) (incorporating by reference the definitions set forth in Section 2510). Yunker alleges 17 that the UUID on his phone is a “supercookie,” which is not capable of being altered or deleted. 18 (FAC ¶ 13.) A number of district courts have concluded that “cookies” do not fall with the 19 SCA’s definition of electronic storage, because they are not intended to be temporary. See, e.g., 20 iPhone II, 844 F. Supp. 2d at 1058-59 (citing cases and dismissing Stored Communications Act 21 claim for alleged violation of Section 2701 for failure to plead facts showing information was in 22 “electronic storage”). 23 The Court finds the reasoning of the iPhone II case and the cases cited therein 24 persuasive. Therefore, to the extent Yunker’s Stored Communications Act Claim is premised 25 on the fact that Pandora divulged his UUID, the Court concludes the allegations are insufficient 26 to state a claim. The Court also concludes that, apart from conclusory allegations that parrot the 27 text of the Stored Communications Act, Yunker fails to include any facts to show that his PII 28 13 1 was in “temporary or immediate storage,” once he sent it to Pandora or that Pandora stored that 2 information “for purposes of backup protection....” See 18 U.S.C. § 2510(17)(A)-(B).6 3 2. Section 2702(a)(2). 4 Section 2702(a)(2) provides that, subject to certain exceptions, “a person or entity 5 providing a remote computing service to the public shall not knowingly divulge to any person 6 or entity the contents of any communication which is carried or maintained on that service....” 7 Pandora moves to dismiss this claim, in part, on the basis that Yunker fails to allege facts 8 showing that it is a “remote computing service.” The Court agrees. A “‘remote computing service’ means the provision to the public of computer storage or 9 processing services by means of an electronic communications system.” 18 U.S.C. § 2711(2). 11 For the Northern District of California United States District Court 10 The legislative history of the SCA elaborates on this definition, and explains that remote computer service companies have developed to provide sophisticated and convenient computing services to subscribers and customers from remote facilities. Today businesses of all sizes—hospitals, banks and many others—use remote computing services for computer processing. This processing can be done with the customer or subscriber using the facilities of the remote computing service in essentially a timesharing arrangement, or it can be accomplished by the service provider on the basis of information supplied by the subscriber or customer. 12 13 14 15 16 17 See S.Rep. No. 99-541 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3564-65; see also Quon v. 18 Arch Wireless Operating Co., Inc., 529 F.3d 892, 900 (9th Cir. 2008), rev’d on other grounds 19 by City of Ontario v. Quon, – U.S. –, 130 S.Ct. 2619 (2010). 20 21 22 23 24 25 26 27 28 Although neither party addressed this issue, there is another potential bar to Yunker’s claim under the Stored Communications Act, to the extent it rests on allegations that Pandora provides electronic communications services. Yunker alleges that he provided his PII to Pandora to register for the Pandora App. Thus, Pandora was an intended recipient of that communication. If the Court accepts as true that Pandora provides electronic communications services, on Yunker’s theory of the case, Yunker may have pleaded himself out the Stored Communications Act claim, at least in part, because “[a] provider described in subsection (a) may divulge the contents of a communication — with the lawful consent of the originator or an addressee or intended recipient of such communication....” 18 U.S.C. § 2702(b)(3) (emphasis added); see, e.g., In re Facebook Privacy Litigation, 791 F. Supp. 2d at 714 & n.6; In re American Airlines Privacy Litig., 370 F. Supp. 2d 552, 560-61 (N.D. Tex. 2005) (dismissing Stored Communications Act claim where plaintiff alleged defendant was intended recipient of personal information, even where disclosure may have breached defendant’s privacy policy). 6 14 1 Yunker’s allegations that Pandora provides a remote computing service are entirely 2 conclusory and do no more than recite the statutory definition of that term. (See FAC ¶ 67.) 3 Thus, the Court is not required to accept them as true. Twombly, 550 U.S. at 555. Further, none 4 of the facts suggest that Pandora offers “computer storage” services to the public. See, e.g., In 5 re Jet Blue Airways Corp. Privacy Litig., 379 F. Supp. 2d 299, 310 (E.D.N.Y. 2005) (dismissing 6 Stored Communications Act claim where, although plaintiffs alleged that defendant airline 7 operated a website and computer servers, there were no facts to suggest that it provided 8 computer processing services or computer storage to the public). 2008). In that case, however, it was clear that users of YouTube.com could upload videos to the 11 For the Northern District of California Yunker relies on Viacom International, Inc. v. You Tube, Inc., 253 F.R.D. 256 (S.D.N.Y. 10 United States District Court 9 website, which then stored those videos. See id. In contrast, Yunker does not allege that users 12 of Pandora’s service can upload and store music on Pandora. Similarly, Yunker does not 13 include any allegations from which the Court could reasonably infer that Pandora provides the 14 type of computer processing services contemplated by the legislative history of the Stored 15 Communications Act. Quon, 529 F.3d at 901-02; In re Jet Blue, 379 F. Supp. 2d 310. 16 Accordingly, for the foregoing reasons, the Court GRANTS Pandora’s motion to 17 dismiss the Stored Communications Act Claim. Although the Court is skeptical that Yunker 18 could amend this claim, the Court cannot say it would be futile do so, and it GRANTS Yunker 19 leave to amend this claim. 20 F. 21 The Court Dismisses the CFAA Claim, with Leave to Amend. Yunker’s third claim for relief asserts that Pandora violated the CFAA. “The CFAA 22 prohibits a number of different computer crimes, the majority of which involve accessing 23 computers without authorization or in excess of authorization, and then taking specified 24 forbidden actions, ranging from obtaining information to damaging a computer or computer 25 data.” LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1131 (9th Cir. 2009); see also 18 U.S.C. 26 § 1030(a)(1)-(7). Pandora moves to dismiss the CFAA claim on the basis that, inter alia, 27 28 15 1 Yunker’s allegations are insufficient to show the requisite damage or loss. The Court agrees 2 and, for that reason, it does not reach Pandora’s alternative arguments.7 3 In order to bring a civil action under the CFAA, Yunker must show a “loss to 1 or more 4 persons during any 1-year period ... aggregating at least $5,000 in value.” 18 U.S.C. § 1030(g). 5 The CFAA defines “damage” as “any impairment to the integrity or availability of data, a 6 program, a system, or information.” 18 U.S.C. § 1030(e)(8). The CFAA defines “loss” as “any 7 reasonable cost to any victim, including the cost of responding to an offense, conducting a 8 damage assessment, and restoring the data, program, system, or information to its condition 9 prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” Id. § 1030(e)(11). 11 For the Northern District of California United States District Court 10 Yunker relies on the same allegations that purport to show standing to support the 12 “damage” and “loss” elements of his CFAA Claim. However, for the same reasons the Court 13 found Yunker’s allegations of economic injury insufficient to show standing, it finds the 14 allegations insufficient to allege damage and loss. By way of example only, even if the Court 15 found Yunker’s allegations of diminished memory storage were sufficient to allege standing, 16 there are insufficient facts in the FAC from which the Court could reasonably infer those 17 allegations of damage - even if aggregated - would reach the $5,000 threshold required by the 18 CFAA. See, e.g., iPhone II, 844 F. Supp. 2d at 1067; AtPac, Inc. v. Aptitude Solutions, Inc., 19 730 F. Supp. 2d 1174, 1184-85 (E.D. Cal. 2010) (citing cases); cf. Del Vecchio v. Amazon.com, 20 2012 WL 1997697, at *3-*6 (W.D. Wash. June 1, 2012) (dismissing CFAA claim where 21 plaintiffs did not allege facts showing devaluation of their personal information or that they 22 discerned any difference in performance of computer when they visited defendant’s website). 23 Accordingly, the Court GRANTS Pandora’s motion to dismiss the CFAA Claim on this 24 basis. Because the Court cannot conclude that it would be an act of futility, it GRANTS Yunker 25 leave to amend this claim. 26 // 27 Yunker does not specify which provisions of the CFAA Pandora allegedly violated. If Yunker chooses to amend this claim, he should clearly identify the provisions of the CFAA that are at issue. 7 28 16 1 2 E. The Court Dismisses the UCL Claim, with Leave to Amend. Yunker’s fourth claim for relief asserts that Pandora violated the UCL. Pandora moves 3 to dismiss on the basis that Yunker lacks statutory standing to pursue the claim and fails to state 4 a claim. Under the UCL, “there are three varieties of unfair competition: practices which are 5 unlawful, unfair or fraudulent.” Daugherty v. American Honda Motor Co., 144 Cal. App. 4th 6 824, 837 (2006); see also Albillo v. Intermodal Container Services, Inc., 114 Cal. App. 4th 190, 7 206 (2003) (to state a UCL claim, a “plaintiff must establish that the practice is either unlawful 8 (i.e., is forbidden by law), unfair (i.e., harm to victim outweighs any benefit) or fraudulent (i.e., 9 is likely to deceive members of the public)”). In addition, the UCL “requires that a plaintiff have ‘lost money or property’ to have standing to sue. The plain import of this is that a plaintiff 11 For the Northern District of California United States District Court 10 now must demonstrate some form of economic injury.” Kwikset Corp. v. Superior Court, 51 12 Cal. 4th 310, 323 (2011); see also Cal. Bus. & Prof. Code § 17204. 13 1. 14 In Kwikset, the California Supreme Court noted that there are many ways a plaintiff may Yunker Fails to Allege He Has Standing Under the UCL. 15 establish economic injury to show standing under the UCL, including “surrender[ing] in a 16 transaction more, or acquir[ing] in a transaction less, than he or she otherwise would have.” Id. 17 Yunker alleges that his PII constitutes “personal property,” which has been diminished in value. 18 Yunker also alleges that he paid for the exclusive use of the memory space on his mobile 19 device, and Pandora used some of that space without his knowledge or consent. For the same 20 reasons the Court finds that Yunker fails to allege facts to show injury-in-fact for purposes of 21 Article III standing based on these allegations, the Court finds Yunker has not alleged facts that 22 are sufficient to show he lost money or property as a result of Pandora’s conduct. See Claridge, 23 785 F. Supp. 2d at 863 (concluding plaintiff failed to allege statutory standing based on theory 24 that PII constituted currency, where plaintiff failed to show his PII did not cease to belong to 25 him or pass beyond his control). 26 2. 27 Yunker’s UCL claim is premised, in part, on allegations that Pandora has engaged in 28 Yunker Fails to State a Claim Under the Unlawful Prong. unlawful conduct. (FAC ¶¶ 86-97.) To state a claim based on the unlawful prong, Yunker must 17 1 allege that Pandora’s practices are “forbidden by law, be it civil, criminal, federal, state, or 2 municipal, statutory, regulatory, or court made.” Saunders v. Superior Court, 27 Cal. App. 4th 3 832, 838-39 (1994). Because the Court finds Yunker fails to allege facts showing a violation of 4 the Wiretap Act, Stored Communications Act, the CFAA, or the CLRA, any of his state law 5 claims, or the constitutional right to privacy, Yunker has not stated a claim under the “unlawful 6 prong” of the UCL. See Berryman v. Merit Property Mgmt., Inc., 152 Cal. App 4th 1544, 1554 7 (2007) (“a violation of another law is a predicate for stating a cause of action” under unlawful 8 prong). 9 3. Pandora also argues that Yunker fails to state a claim under the unfair prong. Unfair 11 For the Northern District of California United States District Court 10 Yunker May State a Claim Under the Unfair Prong. simply means any practice whose harm to the victim outweighs any benefits. Olsen v. Breeze, 12 Inc., 48 Cal. App. 4th 608, 618 (1996). “The court must weigh the utility of the defendant’s 13 conduct against the gravity of the harm to the alleged victim.” Gafcon, Inc. v. Ponsor & 14 Assocs., 98 Cal. App. 4th 1388, 1425 n.15 (2002). In iPhone II, the court refused to conclude, 15 as a matter of law, that allegations regarding collection and dissemination of personal 16 information were insufficient to state a claim under the unfair prong. iPhone II, 844 F. Supp. 2d 17 at 1073. The allegations in this case are substantially similar to the allegations in iPhone II. 18 The Court finds iPhone II persuasive and concludes that, if Yunker is able to sufficiently allege 19 standing, he has alleged facts that would be sufficient to state a claim under the unfair prong. 20 Accordingly, the Court GRANTS, IN PART, AND DENIES, IN PART, Pandora’s 21 motion to dismiss the UCL claim. Because the Court cannot conclude that it would be an act of 22 futility, it GRANTS Yunker leave to amend this claim. 23 F. 24 The Court Dismisses the CLRA Claim, with Leave to Amend. Yunker’s fifth claim for relief asserts that Pandora violated the CLRA. Pandora moves 25 to dismiss the CLRA claim on the basis that Yunker lacks statutory standing to pursue this 26 claim and fails to state a claim. 27 // 28 // 18 1 1. Yunker Fails to Allege Facts to Show Standing. 2 In order to establish statutory standing to pursue the CLRA claim Yunker must establish 3 he suffered an actual injury as a result of Pandora’s alleged conduct. See Birdsong v. Apple, 4 Inc., 590 F.3d 955, 959-60 (9th Cir. 2009); Cal. Civ. Code § 1780. For the same reasons the 5 Court finds Yunker fails to allege he has standing to pursue a UCL claim, it finds he fails to 6 allege he has standing to pursue the CLRA claim. Pandora also moves to dismiss on the basis that Yunker has not alleged facts that show 9 he is a “consumer.” Under the CLRA, consumer “means an individual who seeks or acquires, 10 by purchase or lease, any goods or services for personal, family, or household purposes.” See 11 For the Northern District of California 2. 8 United States District Court 7 Cal. Civ. Code § 1761(d). In Claridge, supra, the plaintiff alleged, as Yunker does here, that he 12 purchased the defendant’s services with his PII, i.e., that the PII was currency. The Claridge 13 court disagreed. It reasoned that “this argument - and the more generalized notion that the 14 phrase ‘purchase’ or ‘lease’ contemplates any less than tangible form of payment - finds no 15 support under the specific statutory language of the CLRA, nor has plaintiff relied on any legal 16 authority suggesting as much.” Claridge, 785 F. Supp. 2d at 864. The Court finds that 17 reasoning persuasive, and it concludes Yunker fails to allege facts that show he is a “consumer,” 18 as that term is defined in the CLRA. 19 Yunker Fails to State a Claim Under the CLRA. Pandora also moves to dismiss on the basis that its App does not qualify as a “good,” as 20 that term is used in the CLRA. “‘Goods’ means tangible chattels bought or leased for use 21 primarily for personal, family, or household purposes, including certificates or coupons 22 exchangeable for these goods, and including goods that, at the time of the sale or subsequently, 23 are to be so affixed to real property as to become a part of real property, whether or not they are 24 severable from the real property.” Cal. Civ. Code § 1761(a). A number of district courts have 25 concluded that software does not fall within this statutory definition. See, e.g., Goodman, 2012 26 WL 2412070, at *12; Ferrington v. McAfee, 2010 WL 3910169, at *18-19 (N.D. Cal. Oct. 5, 27 2010); cf. Cal. Comm. Code § 9102(a)(4) (defining general intangibles to include software for 28 purposes of secured transactions). Assuming for the sake of argument that Yunker’s novel 19 1 theory would be sufficient to allege that he is a consumer, the Court finds the reasoning of these 2 cases persuasive, and it concludes that Yunker fails to allege that the Pandora App is a good. 3 Yunker also argues that Pandora provides a “service.” However, he expressly alleges 4 that “Apps are software that consumers download and install on their phones.” (FAC ¶ 11.) 5 Further, although Yunker alleges that Pandora allows users to stream, access and download 6 music and argues that these allegations show Pandora provides “services,” Yunker has not 7 complained about this aspect of the Pandora App. 8 Accordingly, the Court GRANTS, Pandora’s motion to dismiss the CLRA Claim. 9 Because the Court cannot say it would be an act of futility, it GRANTS Yunker leave to amend this claim. 11 For the Northern District of California United States District Court 10 G. 12 The Court Dismisses the Breach of Contract Claim, with Leave to Amend. In his sixth claim for relief, Yunker asserts that Pandora breached the terms of its 13 Privacy Policy. In order to state a claim for breach of contract, Yunker must allege the 14 existence of a contract, that he performed under the contract, Pandora breached the contract, and 15 that he suffered appreciable and actual damage as a result of Pandora’s breach. See, e.g., 16 Aguilera v. Pirelli Armstrong Tire Corp., 223 F.3d 1010, 1015 (9th Cir. 2000) (citing Patent 17 Scaffolding Co. v. William Simpson Const. Co., 256 Cal. App. 2d 506, 511 (1967)); Ruiz v. Gap, 18 Inc., 622 F. Supp. 2d 908, 917-918 (N.D. Cal. 2008), aff’d 380 Fed. Appx. 689 (9th Cir. 2010); 19 First Commercial Mort. Co. v. Reece, 89 Cal. App. 4th 731, 745 (2001). 20 Pandora moves to dismiss this claim, in part, on the basis that Yunker fails to allege he 21 suffered appreciable and actual damage as a result of any alleged breach. In Claridge, the court 22 found that the plaintiff’s allegations regarding the security breach, which exposed the plaintiff’s 23 PII, were sufficient to show “the breach of his PII has caused him to lose some ascertainable but 24 unidentified ‘value’ and/or property right inherent in the PII.” 785 F. Supp. 2d at 865; see also 25 id. at 861. In contrast, other courts within this District have found damages based on 26 allegations of collection of personal information are insufficient to state a claim for breach of 27 contract. See Low v. LinkedIn Corp., – F. Supp. 2d –, 2012 WL 2873847, at *12-13 (N.D. Cal. 28 July 12, 2012) (citing cases) (“Low II”); In re Facebook Privacy Litig., 791 F. Supp. 2d at 717. 20 1 The Court finds the allegations in this case are more similar to the facts alleged in Low and In re 2 Facebook than the facts in Claridge, and it concludes that Yunker fails allege actual and 3 appreciable damage based on the collection and dissemination of his PII. 4 Yunker argues in opposition brief that he has alleged damages based on the fact that he 5 paid for the exclusive use of the memory on his Android device. However, Yunker neither 6 includes those allegations of harm in his claim for breach of contract nor connects that harm to 7 an alleged breach of Pandora’s Privacy Policy. (See generally FAC ¶¶ 104-111.) 8 9 Accordingly, the Court GRANTS Pandora’s motion to dismiss the breach of contract claim. Because the Court cannot say it would be an act of futility, it GRANTS Yunker leave to amend this claim. 11 For the Northern District of California United States District Court 10 H. 12 The Court Dismisses the Right to Privacy Claim, with Leave to Amend. In his ninth claim for relief, Yunker alleges that Pandora violated his constitutional right 13 to privacy. In order to state a Right to Privacy claim, Yunker must allege facts showing: (1) a 14 specific, legally protected privacy interest; (2) a reasonable expectation of privacy; and (3) 15 conduct that is “sufficiently serious in [its] nature, scope, and actual or potential impact to 16 constitute an egregious breach of the social norms underlying the privacy right.” Hill v. Nat’l 17 Collegiate Athletic Ass’n, 7 Cal. 4th 1, 35-37 (1994); see also iPhone II, 844 F. Supp. 2d at 18 1063. This case raises the issue of “informational privacy,” i.e. the alleged “dissemination or 19 misuse of sensitive and confidential information....” Id. at 35. 20 In iPhone II, the plaintiffs alleged that the defendants collected and disclosed their PII 21 and geolocation data to third parties. The court found that these allegations were not sufficient 22 to satisfy the third element of a right to privacy claim. iPhone II, 844 F. Supp. 2d at 1063. The 23 iPhone II court relied, in part, on Fogelstrom v. Lamps Plus, Inc., 195 Cal. App. 4th 986 (2011). 24 In the Fogelstrom case, the plaintiff alleged that the defendant “routinely ask[ed] its customers 25 for their ZIP codes during credit card transactions so that it could obtain their home addresses 26 for the purpose of mailing marketing materials to them,” and misrepresented why it asked for 27 this information. Fogelstrom, 195 Cal. App. 4th at 989. The Fogelstrom court found that 28 “obtaining plaintiff’s address without his knowledge or permission, and using it to mail him 21 1 coupons and other advertisements ... is not an egregious breach of social norms, but routine 2 commercial behavior.” Id. at 992. 3 In contrast, in Goodman, supra, the plaintiffs alleged HTC America and three weather 4 applications installed code on certain HTC phones, which “transform[ed] the phones into 5 surreptitious tracking devices,” by transmitting fine location data that enabled the defendants to 6 “track their movements, including where they live, work, dine and shop.” 2012 WL 2412070, 7 at *1. According to plaintiffs, the defendants then used this information “to build profiles about 8 them, and sell this information to third parties.” Id.; see also id., 2012 WL 2412070, at *14 9 (noting that plaintiffs alleged defendants “obtained sensitive personal information ... including, inter alia, a continually updated log of precisely where they live, work, park, dine, pick up 11 For the Northern District of California United States District Court 10 children from school, worship, vote, and assemble, and what time they are ordinarily at these 12 locations”). The Goodman court concluded that these allegations, in conjunction with 13 allegations that the plaintiffs had alleged they did not expect the defendants to compile profiles 14 about them or share those profiles with third parties, were sufficient to state a claim for 15 violations of California’s constitutional right to privacy. Id., 2012 WL 2412070, at *14-15. 16 Yunker does not allege that Pandora used geolocation data to track his movements. 17 Rather, he alleges that Pandora obtained his PII and provided that information to advertising 18 libraries for marketing purposes, in violation of the terms of Pandora’s Privacy Policy. The 19 Court finds that the allegations in this case are more similar to the allegations in iPhone II and 20 Fogelstrom than to the allegations in Goodman, and are not sufficient to allege that Pandora’s 21 conduct constitutes an egregious breach of social norms. 22 Accordingly, the Court GRANTS Pandora’s motion to dismiss the Right to Privacy 23 Claim. Although it is skeptical that Yunker will be able to amend this claim, the Court cannot 24 say it would be an act of futility, and it GRANTS Yunker leave to amend. 25 I. The Court Dismisses the Claims for Public Disclosure of Private Facts and Intrusion, with Leave to Amend. 26 27 28 In his seventh and eighth claims for relief, Yunker claims that Pandora publicly disclosed private facts and intruded upon his privacy. The elements of a claim for public 22 1 disclosure of private facts are: “(1) public disclosure (2) of a private fact (3) which would be 2 offensive and objectionable to the reasonable person and (4) which is not of legitimate public 3 concern.” Shulman v. Group W Productions, Inc., 18 Cal. 4th 200, 214 (1998). conversation, or matter, (2) in a manner highly offensive to a reasonable person.” Id. at 231. 6 The first element requires a plaintiff to show “the defendant penetrated some zone of physical 7 or sensory privacy surrounding, or obtained unwanted access to data about, the plaintiff,” and 8 “the plaintiff had an objectively reasonable expectation of seclusion or solitude in the place, 9 conversation or data source.” Id. at 232. In order to determine offensiveness, a court or fact- 10 finder considers “all of the circumstances of the intrusion, including its degree and setting and 11 For the Northern District of California “[A]n action for intrusion has two elements: (1) intrusion into a private place, 5 United States District Court 4 the intruder’s motives and objectives.” Id. at 236 (internal quotations and citation omitted). 12 Yunker alleges that he provided Pandora with his PII, which it then disclosed to third 13 parties. (FAC ¶¶ 15, 35.) Yunker does not allege that Pandora tracked his movements or 14 obtained and then either disclosed or left unencrypted any type of sensitive financial 15 information, medical information, or passwords. For the reasons discussed above in connection 16 with the Right to Privacy claim, the Court finds that Yunker has not alleged facts sufficient 17 show that Pandora’s conduct is either offensive or objectionable to a reasonable person or 18 highly offensive. 19 Accordingly, the Court GRANTS Pandora’s motion to dismiss these claims. Because 20 the Court cannot say it would be an act of futility, it GRANTS Yunker leave to amend these 21 claims. 22 J. 23 The Court Dismisses the Claim for Trespass to Chattels, with Leave to Amend. In his tenth claim for relief, Yunker asserts Pandora trespassed on his personal property. 24 In order to state a claim for trespass to chattels, Yunker must allege facts showing “an 25 intentional interference with the possession of personal property [that] proximately caused 26 injury.” Intel Corp. v. Hamidi, 30 Cal. 4th 1342, 1350-51 (2003). When a plaintiff alleges 27 trespass to a computer system, or a similar device, the plaintiff must show that the purported 28 trespass: (1) either caused physical damage to personal property; (2) impaired the condition, 23 1 quality or value of personal property; or (3) deprived the plaintiff of the use of personal 2 property for a substantial time. Id. at 1356 (citing Rest. 2d Torts, § 218, pars. (b), (c)). 3 In the Intel case, the court found that the defendant was entitled to summary judgment 4 on a trespass to chattels claim, because the plaintiff failed to produce any evidence that the 5 defendant’s conduct had “any appreciable effect on the operation of its computer system” or 6 that defendant’s conduct would be “replicated by others if found not to constitute a trespass.” 7 Id. at 1356; see also id. at 1353-56 (reviewing cases and noting that a “defendant’s use of [a] 8 plaintiff’s computer system was held sufficient to support an action for trespass when it actually 9 did, or threatened to, interfere with the functioning of the system, as by significantly reducing its available memory and processing power”). 11 For the Northern District of California United States District Court 10 Yunker alleges Pandora installed unwanted code that consumes portions of the memory 12 on his mobile device. (FAC ¶¶ 39, 132-135.) In the iPhone II case, the court dismissed the 13 plaintiffs’ claims for trespass to chattels based on allegations that were substantially similar to 14 the allegations here. Indeed, unlike Yunker, the plaintiffs in iPhone II alleged that “the 15 Tracking Defendants’ repeated actions during App executions utilized approximately two to 16 three seconds of battery capacity with each action due to the power requirements of CPU 17 processing, file input and output actions, and Internet connectivity.” (In re iPhone Application 18 Litig., No. 11-MD-2250-LHK, Docket No. 25, First Amended Consolidated Complaint, ¶ 200; 19 compare id. ¶¶ 197-202, 296-309 with FAC ¶¶ 39, 132-135.) The court, however, concluded 20 that “[w]hile these allegations conceivably constitute a harm, they do not plausibly establish a 21 significant reduction in service with the intended functioning of the system, which is necessary 22 to establish a cause of action for trespass.” iPhone II, 844 F. Supp. 2d at 1069. The Court 23 cannot distinguish the facts of this case from the facts in iPhone II, and it concludes that Yunker 24 has not alleged sufficient facts to state a claim for trespass to chattels. 25 Accordingly, the Court GRANTS Pandora’s motion to dismiss the claim for trespass to 26 chattels. Because the Court cannot say it would be an act of futility, it GRANTS Yunker leave 27 to amend this claim. 28 // 24 1 // 2 K. 3 The Court Dismisses the Conversion Claim, with Leave to Amend. In his eleventh claim for relief, Yunker alleges that Pandora converted his personal 4 property. In order to state a claim for conversion, Yunker must allege facts showing 5 “‘ownership or right to possession of property, wrongful disposition of the property right and 6 damages.’” Kremen v. Cohen, 337 F.3d 1024, 1029 (9th Cir. 2003) (quoting G.S. Rasmussen & 7 Assocs., Inc. v. Kalitta Flying Serv., Inc., 958 F.2d 896, 906 (9th Cir. 1992)). In order to 8 determine whether a property right exists, courts apply a three part test. “First, there must be an 9 interest capable of precise definition; second, it must be capable of exclusive possession or control; and third, the putative owner must have established a legitimate claim to exclusivity.” 11 For the Northern District of California United States District Court 10 G.S. Rasmussen, 958 F.2d at 903. 12 Yunker’s conversion claim rests solely on the theory that Pandora has converted his PII, 13 which includes information such as his age, gender, location and the UUID on his mobile 14 device. (FAC ¶¶ 15, 137.) As noted, courts have reluctant to find that PII is a form of personal 15 property. See, e.g., In re Google, Inc. Privacy Litig., 2012 WL 6378343, at *4-6; iPhone II, 844 16 F. Supp. 2d at 1054; Low I, 2011 WL 5509848, at *4-5. Further, as the iPhone II court noted, in 17 the specific context of a conversion claim, “it is difficult to see how this broad category of 18 information is capable of exclusive possession or control.” iPhone II, 844 F. Supp. 2d at 1075. 19 The Court finds that reasoning persuasive. Moreover, even if PII can be considered a form of 20 personal property, for the same reasons the Court finds Yunker fails to allege standing based on 21 the dimunition in value of his PII, the Court finds that the facts are insufficient to show he was 22 damaged by the alleged conversion. 23 Accordingly, the Court GRANTS Pandora’s motion to dismiss the claim for conversion. 24 Because the Court cannot say it would be an act of futility, it GRANTS Yunker leave to amend 25 this claim. 26 CONCLUSION 27 For the foregoing reasons, the Court grants, in part, and denies, in part, Pandora’s 28 motion to dismiss and grants Yunker leave to amend. If Yunker chooses to amend, he shall file 25 1 his amended complaint by April 25, 2013. Although the Court stated that it would set a date for 2 a hearing on the motion for class certification in this order (see In re Google Android Consumer 3 Privacy Litigation, 11-MD-2264-JSW, Docket No. 9), in light of the uncertain state of the 4 pleadings, the Court will not set a hearing on such a motion until this matter is at issue. 5 It is FURTHER ORDERED that the parties shall appear for a case management 6 conference on May 31, 2013 at 1:30 p.m. The parties shall submit a joint case management 7 statement by no later than May 24, 2013. 8 IT IS SO ORDERED. 9 Dated: March 26, 2013 JEFFREY S. WHITE UNITED STATES DISTRICT JUDGE 11 For the Northern District of California United States District Court 10 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 26

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?