Opperman et al v. Path, Inc. et al

Filing 761

ORDER GRANTING IN PART AND DENYING IN PART MOTION FOR CLASS CERTIFICATION RE: PATH APP by Judge Jon S. Tigar granting in part and denying in part 651 Motion to Certify Class. (wsn, COURT STAFF) (Filed on 7/15/2016)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 MARC OPPERMAN, et al., Case No. 13-cv-00453-JST Plaintiffs, 8 ORDER GRANTING IN PART AND DENYING IN PART MOTION FOR CLASS CERTIFICATION RE: PATH APP v. 9 10 PATH, INC., et al., Defendants. Re: ECF No. 651 United States District Court Northern District of California 11 This is a putative class action against Apple and other application developers for alleged 12 13 invasions of privacy through applications on Apple devices. Before the Court is Plaintiffs’ Motion 14 for Class Certification Regarding the Path App. ECF No. 651. The Court will grant the motion as 15 to the Intrusion Upload Subclass but deny it as to the Intrusion Class. 16 I. BACKGROUND 17 A. 18 This is a putative class action challenging conduct by Apple and various developers of Factual History 19 applications for Apple devices (“App Defendants”). See Second Consolidated Amended 20 Complaint (“SCAC”), ECF No. 478. Plaintiffs allege that, between July 10, 2008 and February 21 2012, they owned one or more of three Apple products—the iPhone, iPad, and/or iPod touch 22 (collectively “iDevices”). Id. ¶ 2. They further allege that Apple engaged in a mass marketing 23 campaign in which it “consciously and continuously misrepresented its iDevices as secure, and 24 that the personal information contained on iDevices—including, specifically, address books, could 25 not be taken without their owners’ consent.” Id. ¶ 3. 26 27 28 1. Contacts Data Each iDevice comes pre-loaded with a “Contacts” mobile software application (or “App”), which iDevice owners may use as an address book to input and store the following information 1 2 3 4 about the owner’s Contacts: (1) first and last name and phonetic spelling of each, (2) nickname, (3) company, job title and department, (4) address(es), (5) phone number(s), (6) e-mail address(es), (7) instant messenger contact, (8) photo, (9) birthday, (10) related people, (11) homepage, (12) notes, (13) ringtone, and (14) text tone. 5 Id. ¶ 54, 55. Plaintiffs allege “[t]he address book data reflects the connections, associations, and 6 relationships that are unique to the owner of the iDevice.” Id. ¶ 56. Further, the information 7 stored in an address book “is highly personal and private,” and “is not shared, is not publicly 8 available, is not publicly accessible, and is not ordinarily obtainable by a third party unless the 9 owner physically relinquishes custody of his or her iDevice to another individual.” Id. 10 Contacts also works with social and communication software developed for iDevices United States District Court Northern District of California 11 (“Apps”). See ECF No. 651, Kennedy Decl., Ex. W. These Apps are developed by other 12 companies but available for download through Apple’s online App store. See ECF No. 651, 13 Cooley Decl. ¶ 4; Green Decl. ¶ 4; Carter Decl. ¶ 4. 14 15 2. Path’s Upload and Use of Contact Information Defendant Path launched an updated version of its social networking App (Path 2.0) on 16 November 29, 2011. ECF No. 651, Kennedy Decl., Ex. M at Tr. 49:6–22. It is not disputed that 17 Defendant Path uploaded users’ iDevice Contacts data without notice or consent and sent it to 18 Path’s servers. See id. at Tr. 44:2–5; 50:11–15; Ex. T. The Path App automatically uploaded 19 users’ Contacts data upon logon, i.e., whenever the user activated the app. Kennedy Decl., Ex. M 20 at Tr. 49:6–14; Ex. G. This upload of Contacts data occurred “automatically” and “in the 21 background.” Id., Ex. M at Tr. 49:6–14. Contacts content included names, birthdays, phone 22 numbers, email addresses, and street addresses. Id., Ex. D-2. In less than three months, Path 23 collected and stored over 600 million records derived from the Contacts uploads. Id., Ex. J-2. 24 Apple’s internal review of the Path App confirmed this practice. Id., Ex. F. 25 Path uploaded the Contacts information to enhance Path features, including its 26 “FriendRank recommendation service.” Id., Ex. C-2. Path used this information to inform Path 27 users which of their Contacts were also Path users and to let them know when their Contacts 28 joined Path. ECF No. 678 at 3; Lu Decl., Ex. 1 Tr. 166:14–166:20. Plaintiffs further allege Path 2 1 used the collected to data mine and employ social graph mining techniques. See ECF No. 651, 2 Ex. D-1 at 1–3. Based on the number of users who registered for Path between November 29, 2011 and 3 4 February 7, 2012, Plaintiffs calculate that over 480,000 users “unwittingly sent their address book 5 data to Path.” ECF No. 651 at 9–10; Ex. C-1 at 18–20. On February 8, 2012, Apple released Path 6 2.0.6 in its App Store, which included a user opt-in feature that would ask users whether they 7 wanted to upload their Contacts to Path.1 ECF No. 678, Lu Decl., Ex. 1 Tr. 103:10–105:13. 8 Thereafter, Path deleted all previously uploaded user Contacts from its database. Id. Since Path 9 released version 2.0.6 of its app, 92.1% of Path users have affirmatively given Path permission to 10 access users’ Contacts. Id., Lu Decl., Ex. 4 (Bates No. PATH-HERN000998). Plaintiffs Stephanie Cooley, Jason Green, and Lauren Carter (“the Path Plaintiffs”) logged United States District Court Northern District of California 11 12 onto the Path App on their iDevices at some point between November 29, 2011 and February 8, 13 2012. See, e.g., Cooley Decl. ¶ 4, Green Decl. ¶ 4, Carter Decl. ¶ 4. 14 B. 15 This action began as separate class actions filed in California and Texas. The four actions Procedural History 16 were consolidated here, where Plaintiffs filed their Consolidated Amended Complaint (“CAC”), 17 ECF No. 362, on September 3, 2013. Defendants filed several motions to dismiss the CAC, and on May 14, 2014 the Court 18 19 granted the motions in part. ECF No. 471. The Court dismissed Plaintiffs’ false and misleading 20 advertising, consumer legal remedies/misrepresentation, deceit, Unfair Competition Law (“UCL”), 21 and conversion claims, which Plaintiffs asserted again in their SCAC. Id. The Court denied the 22 motions to dismiss Plaintiffs’ invasion of privacy (intrusion upon seclusion) claim. Id. Plaintiffs then filed their Second Consolidated Amended Complaint (“SCAC”). ECF No. 23 24 478. In the SCAC, Plaintiffs alleged conversion and invasion of privacy (intrusion upon 25 seclusion) claims against all Defendants, and the following claims against only Apple: 26 (1) violation of California’s False and Misleading Advertising Law (“FAL”), Business and 27 28 1 Only Path versions 2.0 through 2.0.5 uploaded users’ Contacts data without their consent. 3 1 Professions Code § 17500, et seq.; (2) violation of California’s Consumer Legal Remedies Act 2 (“CLRA”), Civil Code § 1750, et seq.; (3) deceit, California Civil Code § 1709, et seq.; and (4) 3 violation of California’s UCL, Business and Professions Code § 17200, et seq. ECF No. 478 ¶¶ 4 243–323. Plaintiffs requested certification of a class; an injunction prohibiting Defendants from 5 continuing the challenged conduct; actual, compensatory, statutory, presumed, punitive, and/or 6 exemplary damages; declaratory relief; restitution; the imposition on Defendants of constructive 7 trusts; and fees, costs, and interest. Id. at 78–79. 8 Defendants filed several motions to dismiss in August 2014, but Path did not seek to 9 dismiss Plaintiffs’ intrusion upon seclusion claim. See ECF No. 503. The Court dismissed Plaintiffs’ conversion claim and requests for injunctive relief, but denied the motions to dismiss in 11 United States District Court Northern District of California 10 all other respects. ECF No. 543. Relevant to the present motion, Plaintiffs’ claims for intrusion 12 upon seclusion against Path and aiding and abetting against Apple remain. Id. 13 On February 18, 2016, Plaintiffs filed this motion for class certification. ECF No. 651. 14 Plaintiffs seek to certify the following class and subclass against Path and Apple for Plaintiffs’ 15 claim for intrusion upon seclusion against Path and for aiding and abetting against Apple: 16 Intrusion Class: All persons in the [United States] who received from Apple’s App Store a copy of version 2.0 through 2.0.5 of the iOS mobile application entitled Path (the “Invasive Versions”). 17 18 Intrusion Upload Subclass: All members of the Intrusion Class that were Path registrants and activated via their Apple iDevices (iPhone, iPad, iPod touch) any of the Invasive Versions of the iOS app between November 29, 2011 and February 7, 2012 (the “Subclass Period”). 19 20 21 Id. at 8–9. Defendants Path and Apple oppose the motion. ECF No. 678 (Path’s opposition); ECF 22 23 No. 667-3 (Apple’s opposition). Plaintiffs filed a reply. ECF No. 709. Apple filed an objection 24 and a sur-reply. ECF Nos. 711, 721. The Court heard oral argument on June 14, 2016. 25 II. 26 JURISDICTION This Court has jurisdiction over this case under the Class Action Fairness Act of 2005 27 because the amount in controversy exceeds $5 million, exclusive of interest and costs, there are 28 100 or more class members, and the parties are minimally diverse. 28 U.S.C. § 1332(d). 4 1 III. Class certification under Rule 23 is a two-step process. First, a plaintiff must demonstrate 2 3 LEGAL STANDARD that the numerosity, commonality, typicality, and adequacy requirements of 23(a) are met. 4 One or more members of a class may sue or be sued as representative parties on behalf of all members only if (1) the class is so numerous that joinder of all members is impracticable; (2) there are questions of law or fact common to the class; (3) the claims or defenses of the representative parties are typical of the claims or defenses of the class; and (4) the representative parties will fairly and adequately protect the interests of the class. 5 6 7 8 Fed. R. Civ. P. 23(a). “Class certification is proper only if the trial court has concluded, after a 9 ‘rigorous analysis,’ that Rule 23(a) has been satisfied.” Wang v. Chinese Daily News, Inc., 709 F.3d 829, 833 (9th Cir. 2013) (quoting Wal-Mart Stores, Inc. v. Dukes, 546 U.S. 338, 351 (2011)). 11 United States District Court Northern District of California 10 Second, a plaintiff must also establish that one of the bases for certification in Rule 23(b) is 12 met. Here, Plaintiffs invoke Rule 23(b)(3), which requires the court to find “that the questions of 13 law or fact common to class members predominate over any questions affecting only individual 14 members, and that a class action is superior to other available methods for fairly and efficiently 15 adjudicating the controversy.” Fed. R. Civ. P. 23(b)(3). Additionally, “[w]hile it is not an 16 enumerated requirement of Rule 23, courts have recognized that “in order to maintain a class 17 action, the class sought to be represented must be adequately defined and clearly ascertainable.” 18 Vietnam Veterans of Am. v. C.I.A., 288 F.R.D. 192, 211 (N.D. Cal. 2012) (quoting 19 DeBremaecker v. Short, 433 F.2d 733, 734 (5th Cir. 1970)). The party seeking class certification bears the burden of demonstrating by a preponderance 20 21 of the evidence that all four requirements of Rule 23(a) and at least one of the three requirements 22 under Rule 23(b) are met. See Dukes, 564 U.S. at 350–51. “Rule 23 grants courts no license to 23 engage in free-ranging merits inquiries at the certification stage.” Amgen Inc. v. Connecticut 24 Retirement Plans and Trust Funds, 133 S.Ct. 1184, 1194–95 (2013). “Merits questions may be 25 considered to the extent—but only to the extent—that they are relevant to determining whether the 26 Rule 23 prerequisites for class certification are satisfied.” Id. at 1195. 27 IV. 28 DISCUSSION Path and Apple oppose the motion for class certification, arguing that Plaintiffs have not 5 1 established predominance or typicality. See ECF Nos. 667-3, 678. The Court addresses each of 2 the requirements of Rule 23 and the parties’ respective arguments. 3 A. 4 Rule 23(a)(1) requires that the class be “so numerous that joinder of all members is Numerosity 5 impracticable.” Fed. R. Civ. P. 23(a)(1). “[C]ourts generally find that the numerosity factor is 6 satisfied if the class comprises 40 or more members.” In re Facebook, Inc., PPC Advertising 7 Litig., 282 F.R.D. 446, 452 (N.D. Cal. 2012). 8 9 Path’s records demonstrate that 480,125 users registered for the Path App during the Subclass Period. ECF No. 651 at 13; Kennedy Decl., Ex. G. Registration represents a subset of users who logged on during the Subclass Period. Neither Path nor Apple dispute Plaintiffs’ 11 United States District Court Northern District of California 10 contentions regarding numerosity. 12 13 The Court concludes that the proposed classes satisfy Rule 23(a)’s numerosity requirement. 14 B. Commonality 15 A Rule 23 class is certifiable only if “there are questions of law or fact common to the 16 class.” Fed. R. Civ. P. 23(a)(2). “[F]or purposes of Rule 23(a)(2) [e]ven a single [common] 17 question will do.” Dukes, 564 U.S. at 359 (internal quotation marks omitted). However, the 18 common contention “must be of such a nature that it is capable of classwide resolution—which 19 means that determination of its truth or falsity will resolve an issue that is central to the validity of 20 each one of the claims in one stroke.” Id. at 350. “What matters to class certification . . . is not 21 the raising of common ‘questions’—even in droves—but rather the capacity of a classwide 22 proceeding to generate common answers apt to drive the resolution of the litigation.” Id. (quoting 23 Richard A. Nagareda, Class Certification in the Age of Aggregate Proof, 84 N.Y.U. L. REV. 97, 24 131–32 (2009)). The party seeking certification “need only show that there is a common 25 contention capable of classwide resolution—not that there is a common contention that will be 26 answered, on the merits, in favor of the class.” Alcantar v. Hobart Serv., 800 F.3d 1047, 1053 (9th 27 Cir. 2015) (internal quotation omitted). 28 “The commonality preconditions of Rule 23(a)(2) are less rigorous than the companion 6 1 [predominance] requirements of Rule 23(b)(3).” Hanlon v. Chrysler Corp., 150 F.3d 1011, 1019 2 (9th Cir. 1998). Rule 23(a)(2) can be construed permissively. Id. Plaintiffs argue that commonality is established based on “the uniform intrusion into a 3 4 private place” and because “the intrusion was highly offensive to the reasonable person.” ECF 5 No. 651 at 13. Further, common issues of law and fact predominate as “the legal inquiry across 6 the proposed class is the same” and require the same factual proof. ECF No. 651 at 19. The need to resolve Plaintiffs’ allegation that Path committed the tort of intrusion upon 7 8 seclusion when it uploaded all users’ data during the proposed class period without notice or 9 consent is sufficient to establish commonality. See Dukes, 564 U.S. at 359.2 C. 11 United States District Court Northern District of California 10 Typicality In certifying a class, courts must find that “the claims or defenses of the representative 12 parties are typical of the claims or defenses of the class.” Fed R. Civ. P. 23(a)(3). “The purpose 13 of the typicality requirement is to assure that the interest of the named representative aligns with 14 the interests of the class.” Hanon v. Dataproducts Corp., 976 F.2d 497, 508 (9th Cir. 1992). 15 “Under the rule’s permissive standards, representative claims are ‘typical’ if they are reasonably 16 coextensive with those of absent class members; they need not be substantially identical.” Parsons 17 v. Ryan, 754 F.3d 657, 685 (9th Cir. 2014) (quoting Hanlon, 150 F.3d at 1020). “The test of 18 typicality ‘is whether other members have the same or similar injury, whether the action is based 19 on conduct which is not unique to the Named Plaintiffs, and whether other class members have 20 been injured by the same course of conduct.’” Id. (quoting Hanon, 976 F.2d at 508). Apple makes several arguments that Cooley, Green, and Carter are not typical of the class. 21 22 First, Apple argues that the named Plaintiffs repeatedly granted other Apps access to their 23 Contacts data, such that Path’s taking such access cannot have caused offense or emotional injury. 24 ECF No. 667-3 at 34. Plaintiffs respond that, unlike the other Apps to which Apple refers, Path 25 obtained Plaintiffs’ contact data without their permission, and that it was the taking without 26 2 27 28 Apple claims in passing that “Plaintiffs have not demonstrated commonality,” ECF No. 667-3 at 12, but it is clear that Apple’s arguments regarding class members’ individual issues and uninjured plaintiffs go to the question of predominance, not commonality. Id. at 12-22. The Court addresses Apple’s arguments in the predominance section of this order. 7 1 permission that caused an injury. Apple next argues that named plaintiff Green was solicited to 2 act as lead plaintiff and was offered compensation for his time, citing Rodriguez v. W. Publ’g 3 Corp., 563 F.3d 948, 959 (9th Cir. 2009). Plaintiffs explain that the only “compensation” to Green 4 was that a new iPhone was purchased for him so that his old one could be forensically imaged 5 pursuant to a court order. See ECF No. 635 at 2. A replacement phone and reimbursement for 6 litigation-related travel expenses are totally unlike the incentive payments criticized in Rodriguez. 7 Finally, Apple points to Plaintiffs’ conduct in upgrading or using their phones to claim that 8 Plaintiffs “spoliated” evidence such that Plaintiffs’ ability to represent the case has been 9 compromised. Given the ubiquitousness of phone upgrades, Plaintiffs’ conduct is hardly unique to them. Rather than making named Plaintiffs unique, their conduct in upgrading to a new device 11 United States District Court Northern District of California 10 such that the old one is no longer available is likely to be common to the class. “On average, 12 Americans keep their smartphones for about two years before jumping to a new one.” Farhad 13 Manjoo, “A Wild Idea: Making Our Smartphones Last Longer,” N.Y. Times (on-line ed. Mar. 12, 14 2014), http://www.nytimes.com/2014/03/13/technology/personaltech/the-radical-concept-of- 15 longevity-in-a-smartphone.html. A class member who still has her old phone will be the 16 exception, not the rule. And the same can be said of data deletion that occurs with ordinary use ‒ 17 there are likely to be very few “typical” class members if that means those who have not used their 18 phones since registering with Path. These claims do not render the named Plaintiffs atypical. 19 Where a named plaintiff is subject to unique defenses, she may not be typical of the class. 20 Hanon v. Dataproducts Corp., 976 F.2d 497, 508 (9th Cir.1992). Defenses unique to a class 21 representative counsel against class certification, however, only where they “threaten to become 22 the focus of the litigation.” Id. (internal quotation marks and citation omitted). Even assuming 23 the merits of Defendants’ proposed defenses, none of them meets this standard. Plaintiffs Cooley, 24 Green, and Carter allege claims identical to putative class members. The Court concludes 25 Plaintiffs have demonstrated typicality. 26 D. 27 “The adequacy of representation requirement . . . requires that two questions be addressed: 28 Adequacy (a) do the Named Plaintiffs and their counsel have any conflicts of interest with other class 8 1 members and (b) will the Named Plaintiffs and their counsel prosecute the action vigorously on 2 behalf of the class?” In re Mego Fin. Corp. Sec. Litig., 213 F.3d 454, 462 (9th Cir. 2000). The 3 requirement “‘tend[s] to merge’ with the commonality and typicality criteria of Rule 23(a).” 4 Amchem Prods. v. Windsor, 521 U.S. 591, 626 n.20 (1997) (quoting Gen. Tel. Co. of Sw. v. 5 Falcon, 457 U.S. 147, 158 n.13 (1982)). Among other functions, the requirement serves as a way 6 to determine whether “the Named Plaintiff’s claim and the class claims are so interrelated that the 7 interests of the class members will be fairly and adequately protected in their absence.” Falcon, 8 457 U.S. at 158 n.13. 9 The Court finds that Plaintiffs have satisfied both prongs of Rule 23(a)(4)’s adequacy requirement. Nothing in the record suggests that Plaintiffs have any conflict with class members, 11 United States District Court Northern District of California 10 nor any reason to believe that either Plaintiffs or their counsel would not prosecute the action 12 vigorously on behalf of the class. The Court finds Plaintiffs meet the adequacy requirement. 13 E. Predominance 14 A plaintiff seeking certification pursuant to Rule 23(b)(3) must show not only 15 commonality, but also predominance and superiority. See Hanlon, 150 F.3d at 1022. Thus, in 16 seeking to certifying a Rule 23(b)(3) class, the plaintiff must show that the common questions in 17 the case “predominate over any questions affecting only individual members” and “that a class 18 action is superior to other available methods for fairly and efficiently adjudicating the 19 controversy.” Fed. R. Civ. P. 23(b)(3). “When common questions present a significant aspect of 20 the case and they can be resolved for all members of the class in a single adjudication, there is 21 clear justification for handling the dispute on a representative rather than an individual basis.” 22 Hanlon, 150 F.3d at 1022 (citing Alan Wright, Arthur R. Miller & Mary Kay Kane, Federal 23 Practice & Procedure § 1778 (2d ed.1986)). Plaintiffs argue common issues of law and fact 24 predominate because “the legal inquiry across the proposed class in the same” and “the legal 25 elements [of their claims] are susceptible to class-wide proof.” ECF No. 651 at 19. 26 Path and Apple provide five reasons to argue that Plaintiffs do not meet the predominance 27 requirement. First, choice of law analysis requires the application of the state laws in which each 28 class member resided and used the Path App. Second, Plaintiffs and putative class members have 9 1 varying subjective expectations of privacy in their Contacts data. Third, specific contents of each 2 phone are relevant to determine liability. Fourth, Plaintiffs’ proposed classes contain uninjured 3 members. And finally, even assuming that common questions predominate as to liability, 4 damages cannot be feasibly and efficiently be calculated once the common liability questions are 5 adjudicated. 6 7 1. Choice of Law Path and Apple argue that Plaintiffs seek improperly to apply California tort law to a 8 nationwide class of Path App users. ECF No. 678 at 7; ECF No. 667-3 at 23. Because the 9 material terms of other states’ laws vary significantly, Defendants argue that common issues do 10 United States District Court Northern District of California 11 not predominate. To analyze this argument, this Court ‒ a federal court sitting in diversity ‒ must look to the 12 forum state’s choice of law rules to determine the controlling substantive law. Zinser v. Accufix 13 Research Institute, Inc., 253 F.3d 1180, 1187 (9th Cir. 2001). California law sets forth two 14 different choice of law tests, depending on whether the parties have agreed in advance on a 15 choice-of-law provision: 16 17 18 19 20 21 California has two different analyses for selecting which law should be applied in an action. When the parties have an agreement that another jurisdiction’s law will govern their disputes, the appropriate analysis for the trial court to undertake is set forth in Nedlloyd [Lines B.V. v. Superior Court, 3 Cal. 4th 459 (1992)], which addresses the enforceability of contractual choice-of-law provisions. Alternatively, when there is no advance agreement on applicable law, but the action involves the claims of residents from outside California, the trial court may analyze the governmental interests of the various jurisdictions involved to select the most appropriate law. Washington Mutual Bank, FA v. Superior Court, 24 Cal. 4th 906, 914–15 (2001). Here, the Court 22 concludes that California law applies under either test, such that choice of law questions do not 23 defeat predominance. 24 a. Choice of Law Provision 25 26 The parties first dispute whether a choice of law clause provision governs Plaintiffs’ use of the Path App. The existence of a choice of law agreement impacts the Court’s subsequent choice 27 of law analysis. 28 10 Plaintiffs call attention to the choice of law provision in the user agreements Path App 1 2 users entered into with Path and Apple. Path’s Terms of Use state that the terms of use “will be 3 governed by and construed in accordance with the laws of the State of California, applicable to 4 agreements made and to be entirely performed within the State of California, without resort to its 5 conflict of laws.” See ECF No. 709, Kennedy Decl., Ex. C at 4. Apple’s Terms and Conditions 6 state that “[t]he laws of the State of California, excluding its conflicts of law rules, govern this 7 license and your use of the Licensed Application.” ECF No. 675, Hawk Decl., Ex. 17 at 25 (Bates 8 No. APL-PATH_00011284). “Licensed Application” refers to Apple’s App Store Products. Id. at 9 22. Despite placing choice of law provisions in their user contracts, Path and Apple now seek 10 United States District Court Northern District of California 11 to avoid these terms. 3 Apple argues that Apple’s App Store Terms and Conditions do not include 12 a choice of law provision applicable to third-party apps. See ECF No. 667-3 at 23 n. 12. 13 However, Apple cites to one of the two choice of law provisions in the Terms and Conditions in 14 making that argument. Id. (citing to Ex. 17 at 12 (Bates No. APL-PATH_00011272)). As 15 Plaintiffs stress, the second choice of law provision broadly covers the user’s use of an App. ECF 16 No. 709 at 6 n. 2. Thus, as to the claims against Apple, California law applies. Path argues that its registration process did not require users to agree to its Terms of Use, 17 18 or otherwise bring such terms of use to the users’ attention. As such, these online terms do not 19 constitute a binding contract between Path and Path’s users. ECF No. 678 at 9. Path provides a 20 website page, last updated on March 8, 2012, to demonstrate that it did not provide notice of the 21 site’s terms to its users. See ECF No. 678, Lu Decl., Ex. 10. Generally, “courts enforce 22 inconspicuous browsewrap agreements only when there is evidence that the user has actual or 23 constructive notice of the site’s terms.” Tompkins v. 23andMe, Inc., No. 5:13-CV-05682-LHK, 24 2014 WL 2903752, at *6 (N.D. Cal. June 25, 2014). Plaintiffs do not respond to this argument. 25 26 27 28 3 A choice of law provision is enforceable under California law as long as it is not contrary to a fundamental policy of California, and either (1) the chosen state has a substantial relationship to the parties or their transaction, or (2) there is any other reasonable basis for the choice of law. Nedlloyd Lines B.V. v. Superior Court, 3 Cal. 4th 459, 466 (1992). Neither Apple nor Path argues that its choice of law provision, if it applies, is unenforceable. 11 The Court concludes that Apple’s choice of law provision requires the application of 1 2 California law, but that Plaintiffs have not demonstrated that an equivalent provision applies to 3 Path.4 b. Governmental Interest 4 Regardless of whether a contractual choice of law provision applies to either Apple or 5 6 Path, the Court would still apply California law under the three-step governmental interest test. “Under California’s choice of law rules, the class action proponent bears the initial burden 7 8 to show that California has ‘significant contact or significant aggregation of contacts’ to the claims 9 of each class member.” Mazza v. Am. Honda Motor Co., 666 F.3d 581, 589–90 (9th Cir. 2012) (citing Washington Mutual Bank, 24 Cal. 4th at 921)). This ensures that the application of 11 United States District Court Northern District of California 10 California law is constitutional. Id. “Once the class action proponent makes this showing, the 12 burden shifts to the other side to demonstrate ‘that foreign law, rather than California law, should 13 apply to class claims.’” Id. (quoting Washington Mutual Bank, 24 Cal. 4th at 921). 14 California has a constitutionally sufficient aggregation of contacts to the claims of each 15 putative class member in this case. Both Path and Apple have their principal place of business 16 here. ECF No. 551 ¶ 8; ECF No. 558 ¶ 29. Further, as Path previously explained, its App was 17 “principally researched, designed or developed in Northern California” and “all data held by Path” 18 was managed by Path employees in San Francisco. ECF No. 124 at 16; ECF No. 131 ¶ 4. As 19 Apple previously acknowledged, “a substantial part of the events or omissions giving rise” to 20 Plaintiffs’ claim occurred in the Northern District of California. ECF No. 147 at 33. Apple 21 performs its reviews of third-party Apps in Santa Clara County, California. ECF No. 147-1 ¶ 5. 22 Path and Apple do not dispute these points, but argue that California law cannot apply to 23 the nationwide class because California’s interests in enforcing its own law do not outweigh the 24 interests of other states. The test to determine whether the interests of other states outweigh 25 4 26 27 28 Plaintiffs contend that Path and Apple should be estopped from disavowing the choice of law provisions in their user agreements because they relied on the same provisions as a basis for arguing that this case should be transferred to California from the Western District of Texas. ECF No. 709 at 6. At the argument on this motion, Path convincingly refuted this contention, ECF No. 751 at 17, and the record does not support the contention as to Path. The Court declines further to consider Plaintiffs’ estoppel argument because it is unnecessary to resolution of the motion. 12 1 California’s interest is as follows: 2 First, the court determines whether the relevant law of each of the potentially affected jurisdictions with regard to the particular issue in question is the same or different. Second, if there is a difference, the court examines each jurisdiction’s interest in the application of its own law under the circumstances of the particular case to determine whether a true conflict exists. Third, if the court finds that there is a true conflict, it carefully evaluates and compares the nature and strength of the interest of each jurisdiction in the application of its own law to determine which state’s interest would be more impaired if its policy were subordinate to the policy of the other state, and then ultimately applies the law of the state whose interest would be more impaired if its law were not applied. 3 4 5 6 7 8 Mazza, 666 F.3d at 590. 9 Path and Apple bear the burden to show that foreign law, rather than California law, should 10 apply. Washington Mutual Bank, 24 Cal. 4th at 921. Path and Apple have not established that United States District Court Northern District of California 11 other states’ interests would be more impaired than California’s interests by applying California 12 law to non-Californian class members. 13 i. 14 Differences in Laws of Potentially Affected Jurisdictions 15 “The fact that two or more states are involved does not itself indicate that there is a conflict 16 of law problem. A problem only arises if differences in state law are material, that is, if they make 17 a difference in this litigation.” Mazza, 666 F.3d at 591–52. Although Path and Apple do not set forth the different elements of an intrusion upon 18 19 seclusion claim5 for all 50 states, the Court finds material differences in law between some of the 20 states involved in this litigation. For example, Virginia, the home state of Plaintiff Cooley, does 21 not recognize the common law tort of intrusion upon seclusion. See WJLA-TV v. Levin, 264 Va. 22 140, 160 n.5 (2002). Similarly, New York does not recognize the privacy tort of intrusion upon 23 seclusion. See Howell v. New York Post Co., 612 N.E. 2d 699, 703 (N.Y. 1993). North Dakota 24 has not yet recognized whether a tort action exists for invasion of privacy. See, e.g., Hougum v. 25 26 27 28 5 Apple also argues that there are critical differences in the aiding and abetting law of the various states. ECF No. 667-3 at 25–26. Some states require different kinds of scienter, some states limit liability to specific contexts, some states require proof of different elements, and some states do not recognize the tort at all. Id. The Court agrees that Apple has identified material differences in the aiding and abetting law. 13 1 Valley Mem’l Homes, 574 N.W. 2d 812, 816 (N.D. 1998). Apple points to other differences in 2 the kinds of scienter required and the types of injury which must be suffered. See ECF No. 667-3 3 at 25. These are the kinds of differences that the Mazza court found to be material. 666 F.3d at 4 591. 5 Plaintiffs fail to seriously engage these arguments. They state that “no ‘true conflict’ exists 6 because . . . foreign states have no true interest in enabling or protecting Apple or Path to secretly 7 harvest data from their residents.” ECF No. 709 at 11. They also point out that most states 8 recognize a common law claim for intrusion upon seclusion, and 38 of the states (including 9 California) follow the formulation provided by the Restatement (Second) of Torts. ECF No. 709 at 8 (citing to Meltz, No Harm, No Foul? “Attempted” Invasion of Privacy and the Tort of 11 United States District Court Northern District of California 10 Intrusion Upon Seclusion, 83 FORDHAM L. REV. 3331, 3340–43 (2015)). 12 Plaintiffs’ gloss-over does not obscure the significant differences between the law of the 13 relevant jurisdictions. The Court concludes that the differences in state law are material, and 14 moves to the Mazza test’s second step. ii. Interests of Foreign Jurisdictions 15 16 “It is a principle of federalism that each state may make its own reasoned judgment about 17 what conduct is permitted or proscribed within its borders. Every state has an interest in having its 18 law applied to its resident claimants.” Mazza, 666 F.3d at 591–92. Under step two of the test, the 19 Mazza court concluded that “[e]ach of our states also has an interest in being able to assure 20 individuals and commercial entities operating within its territory that applicable limitations on 21 liability set forth in the jurisdiction’s law will be available to those individuals and businesses. 22 These interests are squarely implicated in this case.” Id. at 592–93. 23 Here, some states do not even recognize the cause of action sought to be certified. Others 24 have chosen to recognize the tort, but have chosen to establish different requirements for recovery. 25 “Mazza instructs that these choices are entitled to respect.” Lightbourne v. Printroom Inc., 307 26 F.R.D. 593, 599 (C.D. Cal. 2015), appeal dismissed (Feb. 10, 2016). The Court concludes that 27 foreign states have an interest in applying their own laws to Plaintiffs’ claims for intrusion upon 28 seclusion and aiding and abetting. 14 iii. Impairment of State’s Interest 1 “California’s governmental interest test is designed to ‘accommodate conflicting state 2 3 policies, as a problem of allocating domains of law-making power in multi-state contexts . . .’” Id. 4 at 593. The test is not intended to weigh conflicting state interests by evaluating which law has 5 the “better” or “worthier” social policy, but rather “recognizes the importance of our most basic 6 concepts of federalism, emphasizing ‘the appropriate scope of conflicting state policies,’ not 7 evaluating their underlying wisdom.” Id. (quoting McCann v. Foster Wheeler LLC, 48 Cal. 4th 8 68, 97 (2010)). Under the comparative impairment analysis, the court must “carefully evaluate 9 and compare the nature and strength of the interest of each jurisdiction in the application of its own law to determine which state’s interest would be more impaired if its policy were 11 United States District Court Northern District of California 10 subordinated to the policy of the other state.” McCann, 48 Cal. 4th at 96–97. 6 Defendants do not identify or discuss the interests of other jurisdictions except at the 12 13 greatest level of generality. For Defendants to meet their burden of showing that foreign states’ 14 interests would be impaired, it is not enough for them merely to point to differences between 15 California’s law and the laws of other states. The analysis must be “based on the facts and 16 circumstances of this case, and these Plaintiffs’ allegations.” Forcellati v. Hyland's, Inc., No. CV 17 12-1983-GHK MRWX, 2014 WL 1410264, at *2 (C.D. Cal. Apr. 9, 2014) (emphasis in original). 18 Although they have identified differences in state law, Defendants have not shown how the 19 application of California state law would frustrate the interests of any foreign state. They have 20 not, for example, undertaken the kind of analysis that led Judge Koh to conclude in the Yahoo 21 case that “for non-California class members, other states' interests would be more impaired by 22 applying California law than would California's interests by applying other states' laws.” In re 23 6 24 25 26 27 28 Generally, “with respect to regulating or affecting conduct within its borders, the place of the wrong has the predominant interest.” Mazza, 666 F.3d at 593. However, neither party identifies the “place of the wrong.” Some possibilities may include the state where users opened the Path app or the state where Path’s data centers housed the Contacts data. Because the case involves the use of mobile devices, the actual downloading by each class member could have taken place anywhere in the world. See In re Yahoo Mail Litig., 308 F.R.D. 577, 603-04 (N.D. Cal. 2015) (“[T]he ‘place of the wrong’ is less clear in the instant case than it was in Mazza. As Plaintiffs note, the actual interception and scanning of emails occurs in data centers located throughout the country and the physical location of the sender or receiver does not necessarily determine whether an email will be intercepted in one state or another.”). 15 1 Yahoo Mail Litig., 308 F.R.D. 577, 605-04 (N.D. Cal. 2015) 308 F.R.D. at 605. The Court 2 therefore cannot conclude that the interests of other states would be impaired by the application of 3 California law. 4 Path and Apple bear the burden of demonstrating “that foreign law, rather than California 5 law, should apply to class claims,” Washington Mutual Bank, 24 Cal. 4th at 921, but have failed to 6 satisfy their burden. Accordingly, the Court applies California law to Plaintiffs’ proposed 7 nationwide class. See, e.g., Forcellati, 2014 WL 1410264 at *4 (applying California false 8 advertising law to a nationwide class because defendants did not meet their burden under 9 California’s government interest test). 10 United States District Court Northern District of California 11 2. Subjective Expectations of Privacy Path next argues that Plaintiffs cannot satisfy the predominance requirement because 12 several states expressly require that plaintiffs have an actual, subjective expectation of seclusion, 13 which means that an individual inquiry will be required into the subjective expectations of each 14 class member. ECF No. 678 at 23. 15 As Path points out, however, California law does not require Plaintiffs to prove subjective 16 expectation. Instead, under California law, the common law tort of “intrusion upon seclusion” 17 requires: “(1) intrusion into a private place, conversation or matter, (2) in a manner highly 18 offensive to a reasonable person.” Shulman v. Grp. W Prods., Inc., 18 Cal. 4th 200, 231 (1998) 19 (emphasis added), as modified on denial of reh’g (July 29, 1998). These elements can be proven 20 on a common basis. 21 As to the first element of the common law claim, “intrusion into a private place” requires 22 the court to ask “whether defendants intentionally intrude[d], physically or otherwise, upon the 23 solitude or seclusion of another.” Shulman, 18 Cal. 4th at 231. “[T]he defendant must have 24 ‘penetrated some zone of physical or sensory privacy . . . or obtained unwanted access to data’ by 25 electronic or other covert means, in violation of the law or social norms.” Hernandez v. Hillsides, 26 Inc., 47 Cal. 4th 272, 286 (2009) (quoting Shulman, 18 Cal. 4th at 232)). Plaintiffs argue that the 27 private place was the iDevice, and that Path and Apple’s conduct “was the same for all class 28 16 1 members, creating a common question for resolution on a classwide basis.” ECF No. 709 at 14.7 2 Although Plaintiffs must conduct themselves “in a manner consistent with an actual expectation of 3 privacy,” Shulman, 18 Cal. 4th at 231, Plaintiffs and the putative class allege they have acted in 4 such a manner. They allege they did not provide “voluntary consent to the invasive actions of 5 defendant[s].” Id. The second element asks whether Defendants’ conduct was “highly offensive to a 6 7 reasonable person.” This element is essentially “a ‘policy’ determination as to whether the alleged 8 intrusion is ‘highly offensive’ under the particular circumstances. Relevant factors include the 9 degree and setting of the intrusion, and the intruder’s motives and objectives.” Hernandez, 47 Cal. 4th at 287 (internal citations omitted). These determinations may require an examination of Path 11 United States District Court Northern District of California 10 or Apple’s motives, but they will not require individualized determinations of class members’ 12 subjective expectations. Thus, contrary to Defendants’ arguments, the inquiry will be classwide, 13 not individualized. 14 3. Phone Contents and Sharing Apple and Path additionally argue that Plaintiffs cannot maintain this action because much 15 16 of the Contacts data at issue is publicly available and freely shared. As Apple argues, “courts 17 make their decisions regarding whether a plaintiff has stated a legally protectable privacy interest 18 based on the nature of the information at issue.” ECF No. 667-3 at 15 (quoting In re Yahoo Mail 19 Litig., 7 F. Supp. 3d 1016, 1040–41 (N.D. Cal. 2014)). Apple argues that it is not enough for 20 Plaintiffs to broadly assert their data was taken from them without providing evidence of what was 21 taken from particular class members. Id. Path adds that some information may not be private at 22 all, particularly if the information comes from public sources. ECF No. 678 at 18. This argument 23 is not persuasive. First, Plaintiffs do not bring an invasion of privacy claim under the California Constitution, 24 25 26 27 28 7 Apple cites to Medical Lab. Mgmt. Consultants v. Am. Broad. Companies, Inc., 306 F.3d 806 (9th Cir. 2002), to contend that Plaintiffs must demonstrate an actual, subjective expectation of seclusion. Medical Lab. Mgmt. Consultants, however, was decided based on Arizona law. Id. at 815. 17 1 which requires a plaintiff to establish a legally protected privacy interest, as the plaintiffs did in 2 Yahoo Mail. See In re Yahoo Mail Litig., 7 F. Supp. 3d at 1037 (“To establish an invasion of 3 privacy claim, a plaintiff must demonstrate three elements: ‘(1) a legally protected privacy 4 interest; (2) a reasonable expectation of privacy in the circumstances; and (3) conduct by 5 defendant constituting a serious invasion of privacy.’”). Second, accepting Defendants’ argument would require the Court to pick apart the various 7 components of Plaintiffs’ address books and analyze them separately. Plaintiffs’ claims are based 8 on the private nature of the collection of information in an address book, not its individual 9 components. The Court has already found that plaintiffs have a reasonable expectation of privacy 10 in the collection of private information in their iDevice address books. Opperman v. Path, Inc., 87 11 United States District Court Northern District of California 6 F. Supp. 3d 1018, 1059-60 (N.D. Cal. 2014). The Court supported its finding with a citation to 12 numerous other courts reaching the same conclusion. Id. (citing United States v. Zavala, 541 F.3d 13 562, 577 (5th Cir.2008) (“[C]ell phones contain a wealth of private information, including emails, 14 text messages, call histories, address books, and subscriber numbers. Zavala had a reasonable 15 expectation of privacy regarding this information.”); United States v. Cerna, No. 08–cv–0730– 16 WHA, 2010 WL 5387694, at *6 (N.D.Cal. Dec. 22, 2010) (citing Zavala) (“Luis Herrera had a 17 reasonable expectation of privacy in the contents of the seized phones as his physical possession 18 of the cell phones created a reasonable expectation of privacy in their contents.”); United States v. 19 Chan, 830 F.Supp. 531, 534 (N.D.Cal.1993) (criminal defendant had expectation of privacy in 20 contents of pager because “[t] he expectation of privacy in an electronic repository for personal 21 data is therefore analogous to that in a personal address book or other repository for such 22 information”)). 23 4. Uninjured Class Members 24 Apple separately argues that the Court should find that Plaintiffs have not established 25 predominance because the proposed classes contain uninjured people. ECF No. 667-3 at 20. 26 “[N]o class may be certified that contains members lacking Article III standing. Standing requires 27 that (1) the plaintiff suffered an injury in fact, (2) the injury is fairly traceable to the challenged 28 conduct, and (3) the injury is likely to be redressed by a favorable decision.” Mazza, 666 F.3d at 18 1 594-95 (citations, alterations, and quotations omitted). With regard to the Intrusion Class, Apple argues that the class definition is overly broad 2 3 because it includes members who have not been injured – members who downloaded the Path App 4 but never logged into the App and never had their Contacts uploaded. Id. Plaintiffs argue that this 5 point goes to the merits of their claim and the Court should not resolve it at class certification. 6 ECF No. 709 at 27. Plaintiffs also cite to Hernandez v. Hillsides, Inc., 47 Cal. 4th 272 (2009) for the 7 8 proposition that even class members whose contacts were not uploaded may be entitled to 9 damages. In Hernandez, plaintiffs sued their employer for intrusion on privacy because the employer had installed a video camera that monitored the plaintiffs’ work are without the 11 United States District Court Northern District of California 10 employees’ knowledge or consent. The California Supreme Court found that plaintiffs sufficiently 12 alleged an injury even though the employer had not activated the camera while plaintiffs were 13 working, because numerous co-workers had access to the recording equipment and might have 14 recorded or viewed plaintiffs’ images.8 15 Hernandez is inapposite to the present case. There, the plaintiffs had the potential of 16 suffering an injury to their privacy. Here, a plaintiff who did not sign in to the Path App could not 17 have had her contacts uploaded, and there was no possibility of injury. 18 The Court agrees with Apple that the Intrusion Class contains members who have suffered 19 no injury at all. The Court therefore finds that the Intrusion Class cannot be certified. See Mazza, 20 666 F.3d at 594-95. Apple also argues the Intrusion Upload Subclass may contain many uninjured class 21 22 8 23 24 25 26 27 28 Plaintiffs presumably would have been caught in the camera's sights if they had returned to work after hours, or if Hitchcock had been mistaken about them having left the office when he activated the system. Additionally, except for the one day in which Hitchcock removed the camera from plaintiffs' office, the means to activate the monitoring and recording functions were available around the clock, for three weeks, to anyone who had access to the storage room. Assuming the storage room was locked, as many as eight to 11 employees had keys under plaintiffs' version of the facts (depending upon the total number of program directors at Hillsides). Hernandez, 47 Cal. 4th at 293. 19 1 members. Apple notes that 92% of Path users permitted access to their Contacts after Path 2 changed its features in February 2012. ECF No. 667-3 at 21. However, that users later consented 3 and permitted Path access to their Contacts data does not diminish the injury users may have 4 suffered from Path’s unconsented to prior access to use of that same data. The Court rejects this 5 challenge to the Intrusion Upload Subclass. 5. 6 Injury and Damages Rule 23(b)(3)’s predominance requirement also applies to questions of damages. 7 8 “Plaintiffs must be able to show that their damages stemmed from the defendant’s actions that 9 created the legal liability.” Pulaski & Middleman, LLC v. Google, Inc., 802 F.3d 979, 987–88 (9th Cir. 2015) (quoting Leyva v. Medline Industries Inc., 716 F.3d 510, 514 (9th Cir. 2013)). To 11 United States District Court Northern District of California 10 satisfy this requirement, plaintiffs must show that “damages are capable of measurement on a 12 classwide basis.” Comcast Corp. v. Behrend, 133 S. Ct. 1426, 1433 (2013). However, “damage 13 calculations alone cannot defeat certification.” Yokoyama v. Midland Nat. Life Ins. Co., 594 F.3d 14 1087, 1094 (9th Cir. 2010). And “the presence of individualized damages cannot, by itself, defeat 15 class certification under Rule 23(b)(3).” Leyva, 716 F.3d at 514. 16 At the class certification stage, Plaintiffs must show that damages can “feasibly and 17 efficiently be calculated once the common liability questions are adjudicated.” Leyva, 716 F.3d at 18 514. Plaintiffs contend that damages can be shown on a classwide basis. Plaintiffs propose 19 conducting conjoint analysis surveys9 to establish a uniform, classwide value for the value of the 20 “inherent privacy interest lost to Path App recipients (the Intrusion Class) and users (the Intrustion 21 Upload Subclass).” ECF No. 651 at 27. Alternatively, Plaintiffs contend that unjust enrichment 22 23 24 25 26 27 28 9 In conjoint analysis, we determine what value a customer places on a particular feature of a product by measuring the partial value (‘partworth’ utility) of multiple individual features of the product. For example, we measure the value to the customer of the product offered in several combinations, some of which might contain feature 1 (but perhaps not feature 2), some of which might contain feature 2 (but perhaps not feature 1), and some of which might contain both features 1 and 2. We can use the data we collect to isolate the value to the customer of one particular feature. Microsoft Corp. v. Motorola, Inc., 904 F. Supp. 2d 1109, 1120 (W.D. Wash. 2012) 20 1 damages are available for the Intrusion Upload Subclass. Id. Plaintiffs argue that Path realized a 2 commercial benefit (venture funding) from Path’s data collection and use. Id. Plaintiffs also 3 assert that they can claim punitive damages, to be awarded across the putative class. Id. at 21. 4 Finally, Plaintiffs state that should Path or Apple defeat these theories of damages, Plaintiffs can 5 establish a right to classwide nominal damages. See ECF No. 651 at 29. 6 a. Inherent Value of Privacy Plaintiffs argue that a conjoint analysis, which would isolate the value of privacy, is a 7 8 straightforward way to measure damages. Both Path and Apple point out that in Plaintiffs’ 9 motion, Plaintiffs fail to submit any evidence establishing that damages can be feasibly and efficiently calculated using this method. See ECF No. 667-3 at 28; ECF No. 678 at 20–21. Path 11 United States District Court Northern District of California 10 and Apple stress that Plaintiffs failed to provide any damage models showing how it could 12 plausibly calculate the inherent privacy interests of the class. The Court agrees that Plaintiff failed 13 to meet their burden showing that damage calculations can feasibly and efficiently be calculated. On reply, however, Plaintiffs provided the Declaration of Dr. Hank Fishkind to describe 14 15 how economists measure the value of intangible goods and how an economist could measure the 16 value of privacy.10 See ECF No. 709-10, Fishkind Decl. Dr. Fishkind proposes a survey that 17 gives respondents a hypothetical choice between a social media app that offers privacy protection 18 and one that does not. Id. ¶ 58. A respondent would have the choice between an app (1) that will 19 not copy their Contact information without their consent for $X, or (2) that will copy their Contact 20 information without their consent for free. The price, $X, will vary randomly for each respondent, 21 and each respondent will only be offered one price. Id. ¶ 61. The survey will also request 22 demographic information. Id. ¶ 62. Finally, the survey data will be analyzed using a regression 23 analysis. Id. ¶ 71. The chief problem with this analysis is that because consumers do not have identical 24 25 10 26 27 28 Apple objects to Dr. Fishkind’s declaration, contending that it is not a proper reply declaration because it goes beyond rebutting arguments Apple provided in its opposition. ECF No. 711 at 3. Apple asks the Court strike the declaration as untimely. ECF No. 721. After Apple filed its orginal objection, however, it deposed Dr. Fishkind prior to the hearing on this motion, and filed a sur-reply addressing the Fishkind Declaration. Because any prejudice to Apple from the late filing was cured, the Court declines to strike Dr. Fishkind’s declaration. 21 1 preferences, each class member will place a very different value on the protection of ‒ or 2 misappropriation of ‒ their contacts. See ECF No. 709-10 (Fishkind Declaration) at 18. And 3 while some of those differences may be attributable to “observable characteristics such as age, 4 gender, income, and education,” id., some of them will be attributable to “variation across 5 individuals concerning their attitude toward and willingness to protect their privacy,” id. at 10. No 6 damages number arising from this model will apply to all class members, particularly since some 7 of the class members, by this measure, will not have been injured at all ‒ i.e., they would have not 8 have required any premium to allow Path to access their contacts, because they don’t attach any 9 value to them. 10 It may be that the average damages that Dr. Fishkind’s model would predict will be very United States District Court Northern District of California 11 close to the damages actually suffered by every class member, but there is no way of knowing this. 12 It is equally or more likely that his model would overcompensate some class members, while 13 undercompensating others. 14 Plaintiffs’ expert has a partial solution to this problem: he wants to send a questionnaire to 15 each class member asking them to provide certain “demographic information,” including age, 16 gender, and income level. ECF No. 721-1 at 79:13-25. Plaintiffs could then calculate damages 17 based on the values that like groups of survey respondents gave to privacy. But this solution is far 18 from complete. 19 For one thing, while it may begin to conform the damages awarded to each class member 20 to the damages actually suffered by that class member, that correspondence would be far from 21 complete, because it would still ignore differences among each category. Not all men, or all 22 persons between 40 and 65, or within any other category, suffered damages uniformly, but 23 Plaintiff’s damages model assumes that they do. Defendants “[are] entitled to individualized 24 determinations of each [class member]’s eligibility for [damages].” Wal-Mart Stores, Inc. v. 25 Dukes, 564 U.S. 338, 131 S. Ct. 2541, 2546, 180 L. Ed. 2d 374 (2011). Plaintiffs’ model fails to 26 meet this requirement. 27 28 For another thing, Plaintiffs have not shown that the damages model is administratively feasible. They contemplate sending each class member a questionnaire, having them complete it, 22 1 and having someone read and analyze it to determine the appropriate damage award for each class 2 member. In the prior studies cited by Dr. Fishkind, however, study subjects were willing to pay 3 only $4.05 to protect their contacts list. ECF No. 709-10 at 15. The effort just described would 4 certainly cost more than that. Plaintiffs point out that the Ninth Circuit has recently stated, in more than one opinion, that 5 “damage calculations alone cannot defeat class certification.” Pulaski & Middleman, LLC v. 7 Google, Inc., 802 F.3d 979, 987 (9th Cir. 2015), citing Leyva v. Medline Indus. Inc., 716 F.3d 8 510, 513-14 (9th Cir. 2013). But Leyva also commanded district courts to ensure that damages 9 can “feasibly and efficiently be calculated once the common liability questions are adjudicated.” 10 Leyva, 716 F.3d at 514. In that case, the “[p]laintiff included deposition testimony of Medline's 11 United States District Court Northern District of California 6 director of payroll operations, and Medline's Notice of Removal,” showing “that Medline's 12 computerized payroll and time-keeping database would enable the court to accurately calculate 13 damages and related penalties for each claim.” 716 F.3d at 514. Plaintiffs here cannot make an 14 equivalent showing. The Court concludes that Plaintiffs have failed to provide any method of feasibly and 15 16 efficiently calculating damages, and that claims based on the recovery of monetary damages are 17 not suitable for class certification.11 18 b. Unjust Enrichment 19 Plaintiffs next propose that the Court certify the Intrusion Upload Subclass based on unjust 20 enrichment damages. ECF No. 651 at 20. Plaintiffs contend that Path received venture funding as 21 a result of Path’s unauthorized data collection and use and that a portion of the valuation 22 underlying Path’s Series B financing round was attributable to Path’s alleged misconduct. 23 However, Plaintiffs offer no evidentiary support for this theory, and no way to calculate the 24 alleged damages even if such support existed. Additionally, as Path points out, it never sold the 25 Contacts data at issue, and it did not circulate new terms for venture funding until after it had 26 deleted all of the Contacts data. ECF No. 678 at 24–25. 27 11 28 In light of this conclusion, the Court declines to address Apple’s other criticisms of Dr. Fishkind’s damages model. 23 1 2 3 4 The Court finds that Plaintiffs have not sufficiently alleged classwide damages based on unjust enrichment. c. Nominal Damages Finally, Plaintiffs argue that they are entitled to classwide nominal damages, citing an 5 unpublished Ninth Circuit case where a plaintiff was awarded nominal damages after failing to 6 prove compensatory damages on her invasion of privacy claim. O’Phelan v. Loy, 497 Fed. Appx. 7 720, 722 (9th Cir. 2012). Defendants do not dispute that nominal damages are appropriate for 8 such a claim, but echo Judge Koh’s statement to the effect that there is no authority suggesting 9 that a class should be certified solely because of the availability of nominal damages. See Brazil v. Dole Packaged Foods, LLC, No. 12-cv-01831-LHK, 2014 WL 5794873, at *14 (N.D. Cal. Nov. 11 United States District Court Northern District of California 10 6, 2014) (“[Plaintiff] cites no authority to suggest that a damages class should remain certified 12 solely because nominal damages may be available, even though the class would otherwise be 13 properly decertified.”). 14 In fact, although the parties do not discuss these authorities, several district courts in the 15 Ninth Circuit have certified classes involving claims for nominal damages. Davis v. Abercrombie, 16 No. 11-00144 LEK-BMK, 2014 WL 4956454, at *25 (D. Haw. Sept. 30, 2014) (class members 17 will receive “an award of nominal damages for each established violation”); Dillon v. Clackamas 18 Cty., No. 3:14-CV-00820-ST, 2014 WL 6809772, at *7 (D. Or. Dec. 2, 2014) (“Thus, even if 19 currently incarcerated class members cannot recover damages for mental or emotional injury 20 under the PLRA, they are still entitled to recover a nominal $1.00 damage award as a symbolic 21 vindication of their constitutional right”); Leer v. Washington Educ. Ass'n, 172 F.R.D. 439, 446- 22 47 (W.D. Wash. 1997) (“[T]o the extent the Court permits the first subclass to assert its adequacy- 23 of-notice claim as a class claim, it will do so only to the extent the plaintiffs seek injunctive or 24 declaratory relief, plus nominal damages”); see also Gaudin v. Saxon Mortgage Servs., Inc., 297 25 F.R.D. 417, 425 (N.D. Cal. 2013) (listing as one of the “significant common questions of law and 26 fact” underlying certification “whether the Class may recover some or all of their trial payments, 27 nominal damages, or any other remedies under California law”). 28 The problems of proof which attend Plaintiffs’ claims for compensatory damages are 24 1 absent in regard to their claim for nominal damages. In fact, it is precisely “where the amount of 2 damages is uncertain” that nominal damages may . . . be awarded.” Apple, Inc. v. Samsung Elecs. 3 Co., No. 11-CV-01846-LHK, 2012 WL 2571719, at *28 (N.D. Cal. June 30, 2012) “Nominal 4 damages are awarded ‘for the infraction of a legal right, where the extent of loss is not shown, or 5 where the right is one not dependent upon loss or damage.’” Crowley v. Peterson, 206 F. Supp. 2d 6 1038, 1045 n.4 (C.D. Cal. 2002) (quoting C. McCormick, Damages, § 20 at 85 (1935)); see also 7 Arizona v. ASARCO LLC, 773 F.3d 1050, 1058 (9th Cir. 2014) (“Nominal damages are not 8 intended to compensate a plaintiff for injuries, nor to act as a measure of the severity of a 9 defendant's wrongful conduct.”) (quoting Cummings v. Connell, 402 F.3d 936, 945 (9th 10 United States District Court Northern District of California 11 12 Cir.2005)). The Court concludes that Plaintiffs’ have shown that the nominal damages claims of Intrusion Upload Subclass can be determined on a classwide basis. 13 d. Punitive Damages 14 Plaintiffs lastly argue that the Court can certify a class based on Plaintiffs’ claim for 15 punitive damages. Defendants oppose certification of a class seeking punitive damages on several 16 grounds. 17 First, both Apple and Path argue that the punitive damages laws of the several states differ 18 such that plaintiffs cannot satisfy the predominance requirement of Rule 23. ECF No. 667-3 at 19 31-32; ECF No. 678 at 22-23. This argument fails because, as explained above, the Court will 20 apply California law to Plaintiffs’ claims. 21 Second, both Defendants argue that the evidence in this case does not support an award of 22 punitive damages because there has not been a showing of the “oppression, fraud, or malice” 23 required under California law. Cal. Civ. Code § 3294 (requiring oppression, fraud, or malice); 24 ECF No. 667-3 at 31-32; ECF No. 678 at 23 (“Plaintiffs presented no evidence that Path’s conduct 25 constituted oppression, fraud, or malice.”). This argument depends on a merits inquiry that is not 26 appropriate at the certification stage. As the Supreme Court recently cautioned, “[m]erits 27 questions may be considered to the extent—but only to the extent—that they are relevant to 28 determining whether the Rule 23 prerequisites for class certification are satisfied.” Amgen, 133 S. 25 1 Ct. at 1194-95 (emphasis added). The question for the Court’s determination is not whether 2 Plaintiffs can demonstrate their entitlement to punitive damages now, but whether such damages 3 “can be proved through evidence common to the class.” Id. at 1195; see also Dukes, 564 U.S. at 4 352 n.6 (district court has no “authority to conduct a preliminary inquiry into the merits of a suit in 5 order to determine whether it may be maintained as a class action”) (quoting Eisen v. Carlisle & 6 Jacquelin, 417 U.S. 156, 177 (1974)). Third, Defendants argue that punitive damages are not susceptible to classwide 7 8 adjudication because they must be determined based on the individual harm suffered by each class 9 member. That is not the law. “Because the purpose of punitive damages is not to compensate the victim, but to punish and deter the defendant, any claim for such damages hinges, not on facts 11 United States District Court Northern District of California 10 unique to each class member, but on the defendant’s conduct toward the class as a whole.” 12 Barefield v. Chevron, U.S.A., Inc., No. C 86-2427 TEH, 1988 WL 188433, at *3 (N.D. Cal. Dec. 13 6, 1988). Similarly, in Ellis v. Costco Wholesale Corp., 285 F.R.D. 492 (N.D. Cal. 2012) ‒ on 14 which both sides rely ‒ Judge Chen held that the availability of punitive damages, as opposed to 15 the amount of any award, was best decided on a classwide basis. Id. at 542-43. 16 It is true that Judge Chen’s order further provided that, if the jury decided that punitive 17 damages could be awarded, the court would conduct a subsequent phase in which “Defendant 18 [would have] the opportunity to present evidence as to the proper amount of punitive damages as 19 well as individualized defenses which could defeat any individual class member’s claim to 20 punitive damages.” Id. at 544. It is doubtful such a procedure will be required in this case 21 because, unlike in Ellis, Defendants made no individualized decisions about individual class 22 members. Rather, Path’s software treated each class member in exactly the same manner.12 The 23 12 24 25 26 27 28 Defendants contend that the Path App behaved differently among class members because some class members had more or different Contacts information than others. While these differences might be relevant to compensatory damages, the Court has already determined such damages are not available on a classwide basis. This eliminates concerns about the ratio between the actual harms suffered by class members and a punitive damage award. “Because nominal damages measure neither damage nor severity of conduct, it is not appropriate to examine the ratio of a nominal damages award to a punitive damages award.” ASARCO, 773 F.3d at 1058. The foregoing does not mean that there are no due process limits on the punitive damages that a trier of fact might award, only that punitive damages ratio considerations are not an impediment to 26 1 Court need not decide that question now, however. It is sufficient to decide that the availability of 2 punitive damages is amenable to classwide resolution, and leave the manner in which the amount 3 will be determined to later case management. 4 F. Superiority 5 A class action must be “superior to other available methods for fairly and efficiently 6 adjudicating the controversy.” Fed. R. Civ. Pro. 23(b)(3). “The superiority inquiry under Rule 7 23(b)(3) requires determination of whether the objectives of the particular class action procedure 8 will be achieved in the particular case.” Hanlon, 150 F.3d at 1023. “[C]ertification pursuant to 9 Rule 23(b)(3) . . . is appropriate ‘whenever the actual interests of the parties can be served best by settling their differences in a single action.’” Id. at 1022 (quoting 7A Wright & Miller, Federal 11 United States District Court Northern District of California 10 Practice & Procedure § 1777 (2d ed. 1986)). The four factors for the Court's examination are: (1) 12 the interest of each class member in individually controlling the prosecution or defense of separate 13 actions; (2) the extent and nature of any litigation concerning the controversy already commenced 14 by or against the class; (3) the desirability of concentrating the litigation of the claims in the 15 particular forum; and (4) the difficulties likely to be encountered in the management of a class 16 action. Zinser, 253 F.3d at 1190–92. Here, the modest damages, if any, suffered by each class member make pursuing an 17 18 individual claim unlikely at best. As Judge Posner has observed, “[t]he realistic alternative to a 19 class action is not 17 million individual suits, but zero individual suits, as only a lunatic or a 20 fanatic sues for $30.” Carnegie v. Household Int'l, Inc., 376 F.3d 656, 661 (7th Cir. 2004) 21 (emphasis in original). Class treatment is clearly superior to the alternatives.13 22 23 24 25 26 27 28 certification. 13 The Plaintiffs must also show that the class is ascertainable. Ascertainability “is an inherent requirement of at least Rule 23(b)(3) class actions.” Lilly v. Jamba Juice Co., 308 F.R.D. 231, 236 (N.D. Cal. 2014) (citing William B. Rubenstein, Newberg on Class Actions §§ 3:1–3:3 (5th ed.)). “[A] class definition is sufficient if the description of the class is ‘definite enough so that it is administratively feasible for the court to ascertain whether an individual is a member.’” Vietnam Veterans of Am., 288 F.R.D. at 211 (quoting O’Connor v. Boeing N. Am., Inc., 184 F.R.D. 311, 319 (C.D. Cal. 1998)). Here, no one contests that Plaintiffs satisfy this requirement. 27 CONCLUSION 1 2 The Court now orders as follows: 3 1. 4 Plaintiffs’ Motion for Class Certification is GRANTED as to the following class on Plaintiffs’ claim for invasion of privacy/intrusion on seclusion: Intrusion Upload Class:14 All members of the Intrusion Class that were Path registrants and activated via their Apple iDevice (iPhone, iPad, iPod touch) any of the Invasive Versions of the iOS Path app between November 29, 2011 and February 7, 2012. 5 6 7 2. The Court finds as follows: 8 a. The Intrusion Upload Class is sufficiently numerous; b. The Intrusion Upload Class is ascertainable; c. Questions of law and fact are common to the class that predominate over 9 10 11 United States District Court Northern District of California any individual questions; 12 d. Plaintiffs’ claims are typical of the claims of the Intrusion Upload Class and 13 Plaintiffs are appointed as Class Representatives; 14 e. Plaintiffs’ Interim Co-Lead Counsel will adequately represent the Class, 15 have no conflicts with the Class, and are appointed as Class Counsel; and 16 f. 17 3. Class Certification is superior to other means of adjudication. Plaintiffs’ Motion for Class Certification as to the Intrusion Class is DENIED. 18 In the joint case management statement due on August 2, 2016 by 5:00 p.m., the parties are 19 ordered to propose a schedule for the remainder of the case through trial. The Court will conduct 20 a Case Management Conference on August 16, 2016 at 9:30 a.m. 21 IT IS SO ORDERED. 22 Dated: July 15, 2016 23 ______________________________________ JON S. TIGAR United States District Judge 24 25 26 27 14 28 In light of the Court’s order denying certification of the Intrusion Class, it is no longer necessary to refer to this smaller group as a subclass. 28

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?