NovelPoster v. Javitch Canfield Group et al

Filing 93

ORDER GRANTING DEFENDANTS' MOTION FOR JUDGMENT ON THE PLEADINGS by Hon. William H. Orrick granting #60 Motion for Judgment on the Pleadings. NovelPoster is granted leave to amend its complaint with respect to the four causes of action that are the subject of this Order within 15 days. (jmdS, COURT STAFF) (Filed on 8/4/2014)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 NOVELPOSTER, Case No. 13-cv-05186-WHO Plaintiff, 8 v. 9 10 JAVITCH CANFIELD GROUP, et al., ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS Re: Dkt. No. 60 Defendants. United States District Court Northern District of California 11 12 13 14 INTRODUCTION This case involves the soured relationship between the owners of the plaintiff company, 15 NovelPoster, and the defendant company engaged to operate it, Javitch Canfield Group. Javitch 16 Canfield Group’s owners, Mark Javitch and Daniel Canfield, are also defendants. NovelPoster 17 asserts various causes of action under both federal and state law based on the defendants’ 18 allegedly unlawful access of NovelPoster’s email and other electronic accounts during the start, 19 breakdown, and wake of the parties’ relationship. 20 The defendants filed this limited Motion for Judgment on the Pleadings, arguing that 21 NovelPoster’s allegations as pleaded in the Complaint fail to support the First through Fourth 22 Causes of Action for violations of the federal Computer Fraud and Abuse Act, the federal 23 Electronic Communications Privacy Act, California’s Comprehensive Computer Data Access and 24 Fraud Act, and California’s Invasion of Privacy Act. The motion is GRANTED. NovelPoster 25 fails to adequately plead loss to support its causes of action under the Computer Fraud and Abuse 26 Act and California’s Comprehensive Computer Data Access and Fraud Act and fails to plead that 27 the defendants “intercepted” any electronic communications under the Electronic Communications 28 Privacy Act and California’s Invasion of Privacy Act. FACTUAL BACKGROUND 1 2 The Complaint alleges the following facts: 3 Plaintiff NovelPoster is an online retailer that designs, sells, and distributes text-based 4 poster products. Compl. (Dkt. No. 1) ¶¶ 4, 9. NovelPoster has no physical presence and is 5 accessible only through its website and other online internet portals. Compl. ¶ 10. Owners Alex 6 Yancher and Matt Grinberg founded the company in 2011. Compl. ¶ 9. From NovelPoster’s 7 inception, Yancher and Grinberg planned to develop and then sell the company. Compl. ¶ 14. 8 NovelPoster has accounts with internet companies to conduct its advertising, 9 communications, and sales transactions, including with online payment “gateways,” such as PayPal and Stripe; online marketing platforms, such as Google Adwords; the website platform 11 United States District Court Northern District of California 10 Goodsie; retail sites, such as Etsy and Storenvy; and social media platforms, such as Facebook, 12 Twitter, and Mailchimp. Compl. ¶¶ 11, 38. 13 NovelPoster’s email capabilities are hosted by Google’s services for small-business 14 accounts, through which NovelPoster has the email accounts Contact@NovelPoster.com, 15 Matt@NovelPoster.com, and Alex@NovelPoster.com. Compl. ¶ 11(a). 16 Contact@NovelPoster.com is the administrative account for NovelPoster’s overall Google 17 account, and access to it allows a user to control Matt@NovelPoster.com and 18 Alex@NovelPoster.com, which are the individual email accounts of Grinberg and Yancher, 19 respectively. Compl. ¶¶ 11(a), 22. Grinberg and Yancher each used his NovelPoster email 20 account to manage the company’s relationships with customers and business partners. Compl. 21 ¶ 11(a). They also used these individual email accounts to store contact information for designers, 22 wholesalers, suppliers, and marketers. Compl. ¶ 13. The contract between NovelPoster and the 23 defendants was negotiated through these email accounts, and the contract itself is electronically 24 stored there. Compl. ¶ 11(a). 25 NovelPoster first came into contact with the defendants through Yancher, who met David 26 Canfield at a March 2013 social event in San Francisco. Compl. ¶ 15. Yancher and Canfield 27 agreed to meet and discuss forming a business relationship between NovelPoster and Javitch 28 Canfield Group, which Canfield founded with Mark Javitch, to take over NovelPoster operations 2 1 “until it could be sold.” Compl. ¶¶ 5, 15. Over the next few months, Yancher and Grinberg met 2 with Canfield and Javitch several times to discuss this arrangement. Compl. ¶ 16. Disagreement about the reach of the defendants’ control of the company began even before 3 4 the parties agreed to the terms governing their relationship. On May 8, 2013, Grinberg emailed 5 the defendants to voice his concern that they had changed the passwords to NovelPoster’s PayPal 6 and Stripe accounts and to state that he and Yancher must “maintain access to all NovelPoster 7 accounts.”1 Compl. ¶ 18. In the same email, Grinberg proposed contract terms to the defendants consisting of the 8 9 following points:  10 The Javitch Canfield Group would “take over all aspects of operations except for United States District Court Northern District of California 11 poster design,” for which NovelPoster would be responsible for creating one new 12 poster design per month.  13 Operations include “[f]ulfilling posters or subcontracting fulfillment 14 responsibilities”; inventory management; marketing through Google Adwords, 15 Facebook ads, etc.; customer service; outbound sales calls to distributors; 16 maintenance of NovelPoster’s website and social media presence; and financial and 17 accounting record keeping. 18  “NovelPoster continues to have ownership of all NovelPoster related accounts.” 19  The Javitch Canfield Group receives 80 percent of sales and a 10 percent equity share to vest over two years. 20 21 Compl. ¶ 17. Canfield accepted these terms on behalf of the defendants via email on May 9, 22 2013.2 Compl. ¶ 21. 23 24 25 26 27 28 1 Although not pleaded in the Complaint, NovelPoster states in its opposition brief that it provided the defendants with the passwords to its Contact@NovelPoster.com, AdWords, PayPal, Goodsie, MailChimp, Twitter, Stripe, and Facebook accounts on May 3, 2013, because it was “optimistic that it would finalize an[ ] agreement” with the defendants. Opp’n (Dkt. No. 64) 1-2. The brief further states that on May 8, 2013, the defendants changed the passwords and access levels to some of these accounts without providing NovelPoster with the new passwords. Opp’n 2. 2 According to the opposition brief, in response to requests from NovelPoster regarding account access, the defendants provided login credentials for certain accounts to Yancher and Grinberg on May 13, 2013. Opp’n 2. 3 1 On June 6, 2013, the defendants accessed Yancher’s and Grinberg’s individual 2 NovelPoster email accounts and changed their passwords without authorization from or notice to 3 Yancher or Grinberg. Compl. ¶ 22. Canfield responded to a complaint from Yancher that 4 Yancher was not able to access his individual account by stating that “a server change” had made 5 Yancher’s account “inaccessible,” but that Canfield could forward emails from these accounts to 6 Yancher and Grinberg. Compl. ¶ 22. 7 On June 10, 2013, Yancher emailed Canfield and Javitch, stating that he knew the 8 defendants had accessed the individual NovelPoster email accounts and read emails without 9 permission. Compl. ¶ 23. Javitch responded and suggested that the group meet to discuss the situation; Yancher agreed, but reiterated that the defendants did not have authority to access the 11 United States District Court Northern District of California 10 individual email accounts or change their passwords because they were “personal email accounts.” 12 Compl. ¶ 24. 13 The parties met on June 13, 2013, during which time Yancher and Grinberg told the 14 defendants that the business relationship “was not working” and NovelPoster wanted to terminate 15 the contract. Compl. ¶ 25. The defendants refused the termination, “insisting they would 16 relinquish their unauthorized control only for a fee.” Compl. ¶ 25. NovelPoster refused. Compl. 17 ¶ 25. Grinberg sent an email to Canfield on June 14, 2013, saying that the defendants were in 18 material breach of the contract and that NovelPoster was terminating their contract; Grinberg also 19 stated that NovelPoster was demanding return of its entire business and an inventory estimate as of 20 May 10, 2013. Compl. ¶ 26. Javitch responded by email, pointing out that there was no clause in 21 the contract regarding termination, and so NovelPoster’s attempt to terminate the contract was 22 invalid. Compl. ¶ 27. 23 Through the time the Complaint was filed, the defendants continued to operate all aspects 24 of NovelPoster and routinely accessed, without authorization, all accounts related to NovelPoster. 25 Compl. ¶ 36. From the time they took control of NovelPoster, the defendants marketed 26 NovelPoster merchandise simultaneously with other brands that the defendants were promoting. 27 Compl. ¶ 34. While doing so, they “misrepresented to vendors and business partners” that they 28 were authorized to bind NovelPoster to business agreements. Compl. ¶ 35. 4 This dispute caused NovelPoster to lose prospective buyers. In July 2013, a prospective 1 2 buyer withdrew interest after learning about NovelPoster’s conflict with the defendants. Compl. 3 ¶ 29. Afterwards, NovelPoster’s business broker told Yancher and Grinberg that he would not 4 help them sell the company until they and the defendants resolved this dispute. Compl. ¶ 30. 5 Without the business broker, NovelPoster was unable to respond to a second interested buyer in 6 October 2013. Compl. ¶¶ 31, 32. On November 4, 2013, NovelPoster’s counsel wrote the defendants and demanded that 7 8 they return full control of NovelPoster to Yancher and Grinberg, but that has not occurred. 9 Compl. ¶¶ 33, 36. The defendants’ actions caused NovelPoster to suffer damages greater than 10 $5,000.00 in 2012 and damages continue to accrue. Compl. ¶ 44. PROCEDURAL HISTORY United States District Court Northern District of California 11 NovelPoster filed this action on November 6, 2013, charging the following: (i) violation 12 13 of the federal Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. §§ 1030(a)(2)(c), 14 1030(a)(5)(c); (ii) violation of the federal Wiretap Act, 18 U.S.C. § 25113; (iii) violation of 15 California’s Comprehensive Computer Data Access and Fraud Act (“CDAFA”), CAL. PENAL 16 CODE §§ 502(c)(1)-(5), 502(c)(7); (iv) violation of California’s Invasion of Privacy Act (“CIPA”), 17 CAL. PENAL CODE §§ 630 et seq.; (v) conversion; (vi) breach of contract; (vii) breach of the 18 implied covenant of good faith and fair dealing; (viii) violation of California’s Unfair Competition 19 Law, CAL BUS. & PROF. CODE §§ 17200 et seq.; and (ix) unjust enrichment. The defendants filed motions to dismiss on December 4, 2013, and January 13, 2014, both 20 21 of which I denied. Dkt. Nos. 16, 24, 46. On June 6, 2014, the defendants filed this limited Motion 22 for Judgment on the Pleadings on the First through Fourth Causes of Action. Mot. (Dkt. No. 60). 23 NovelPoster opposes the motion and has stated that it plans to move to file an Amended 24 Complaint. Opp’n (Dkt. No. 64) 7. I heard argument on July 9, 2014. 25 3 26 27 28 Although NovelPoster designates its Second Cause of Action as a violation of the Electronic Communications Privacy Act, because that act both amended the Wiretap Act, 18 U.S.C. §§ 251022, and created the Stored Communications Act, 18 U.S.C. §§ 2701-12, and because NovelPoster brings its Second Cause of Action under 18 U.S.C. § 2511, this Order will refer to the Second Cause of Action as alleging a violation of the Wiretap Act to avoid any confusion. See Compl. ¶¶ 47, 50; Opp’n 20. 5 LEGAL STANDARD 1 The standard for a motion for judgment on the pleadings under “Rule 12(c) is ‘functionally 2 identical’ to [the standard for a motion under] Rule 12(b)(6).” Cafasso, United States ex rel. v. 4 Gen. Dynamics C4 Sys., Inc., 637 F.3d 1047, 1055 n.4 (9th Cir. 2011). When deciding such a 5 motion, “the allegations of the non-moving party must be accepted as true, while the allegations of 6 the moving party which have been denied are assumed to be false.” Hal Roach Studios, Inc. v. 7 Richard Feiner & Co., Inc., 896 F.2d 1542, 1550 (9th Cir. 1989). All reasonable inferences from 8 the alleged facts must be construed in favor of the responding party. Fleming v. Pickard, 581 F.3d 9 922, 925 (9th Cir. 2009). “Judgment on the pleadings should be granted when, accepting all 10 factual allegations in the complaint as true, there is no issue of material fact in dispute and the 11 United States District Court Northern District of California 3 moving party is entitled to judgment as a matter of law.” Chavez v. United States, 683 F.3d 1102, 12 1108 (9th Cir. 2012) (internal citations and quotations omitted). DISCUSSION 13 14 I. FIRST CAUSE OF ACTION: CFAA VIOLATION 15 A. Applicable Law 16 Sections 1030(a)(2)(C) and 1030(a)(5)(C) of Title 18 respectively state that one who 17 “intentionally accesses a computer without authorization or exceeds authorized access, and 18 thereby obtains . . . information from any protected computer” and one who “intentionally 19 accesses a protected computer without authorization, and as a result of such conduct, causes 20 damage and loss” can be subject to a fine or imprisonment. 18 U.S.C. §§ 1030(a)(2)(C), 21 1030(a)(5)(C). The CFAA “targets the unauthorized procurement or alteration of information, not 22 its misuse or misappropriation.” United States v. Nosal, 676 F.3d 854, 863 (9th Cir. 2012) 23 (“Nosal I”) (brackets omitted). Any person may bring a civil cause of action under the CFAA for 24 damages and equitable relief if he or she suffers damages or loss as a result of a violation of its 25 provisions. 18 U.S.C. § 1030(g). 26 The term “without authorization” is undefined in the CFAA, but the Ninth Circuit has held 27 that “a person uses a computer ‘without authorization’ under §§ 1030(a)(2) [ ] when the person has 28 not received permission to use the computer for any purpose (such as when a hacker accesses 6 someone’s computer without any permission), or when the [computer’s owner] has rescinded 2 permission to access the computer and the defendant uses the computer anyway.” LVRC Holdings 3 LLC v. Brekka, 581 F.3d 1127, 1135 (9th Cir. 2009). Even where authorization is given to access 4 a protected computer, the CFAA may be violated if that authorization is exceeded. To exceed 5 authorized access “means to access a computer with authorization and to use such access to obtain 6 or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 7 U.S.C. § 1030(e)(6); see also Brekka, 581 F.3d at 1133 (“an individual who is authorized to use a 8 computer for certain purposes but goes beyond those limitations is considered by the CFAA as 9 someone who has ‘exceed[ed] authorized access’”). It generally “refer[s] to someone who’s 10 authorized to access only certain data or files but accesses unauthorized data or files—what is 11 United States District Court Northern District of California 1 colloquially known as ‘hacking.’” Nosal I, 676 F.3d at 856-58 (“we find Nosal’s narrower 12 [definition] more plausible”). The Ninth Circuit has emphasized that “the CFAA is limited to 13 violations of restrictions on access to information, and not restrictions on its use.” Id. at 864 14 (original emphasis). B. The Defendants Fail To Show That They Did Not Act Without Authorization Or 15 Did Not Exceed Authorization As A Matter Of Law. 16 The parties dispute whether the pleadings show that the defendants acted without 17 18 authorization or exceeded authorization by accessing and taking exclusive control of 19 NovelPoster’s accounts during the parties’ alleged contract period, and continuing to do so after 20 the contract allegedly terminated on June 14, 2013.4 The defendants argue that they are entitled to judgment on the pleadings for this cause of 21 22 action because NovelPoster provided the defendants with “unrestricted access” to all of 23 NovelPoster’s accounts when the parties agreed that the defendants would “take over all aspects of 24 operation” of NovelPoster, and because NovelPoster provided the defendants with certain 25 passwords, including the password for the Google administrative account. Mot. 9-12; Reply (Dkt. 26 4 27 28 Under the CFAA, a “protected computer” is a computer “used in or affecting interstate or foreign commerce or communication.” 18 U.S.C. § 1030(e)(2)(B). The parties do not seriously dispute that NovelPoster’s online accounts are “protected computers” under the statute. Compl. ¶ 39; Mot. 6; Opp’n 12. 7 1 No. 76) 3-4 (quoting Compl. ¶ 17). In doing so, NovelPoster “failed to retain any technical 2 control or legal right to exclusive access” of the accounts. Reply 10. With regard to the individual 3 email accounts, though Yancher and Grinberg call them “personal email accounts,” the defendants 4 point out that NovelPoster admits that those accounts “are, in effect, the customer relationship 5 management [ ] tool” Yancher and Grinberg use to “manag[e] relations between a company and a 6 customer.” Mot. 9-10 (quoting Compl. ¶ 11(a)). But because NovelPoster’s Complaint admits 7 that the defendants were charged with operating “all aspects” of NovelPoster, the defendants argue 8 that their access of those accounts at all times was neither unauthorized nor in excess of 9 authorization. See generally Mot. 9-14. 10 The defendants further argue that the alleged violations are not within the scope of the United States District Court Northern District of California 11 CFAA, which they emphasize deals with hacking. Mot. 16. They attempt to characterize 12 NovelPoster’s cause of action as one merely concerning a “disputed business arrangement” and a 13 simple “breach of contract” claim. Mot. 15-16. In particular, the defendants assert that 14 NovelPoster complains of nothing more than the misappropriation of information, which the 15 CFAA does not cover, but lacks allegations that the defendants wrongfully circumvented a 16 “technological access barrier,” which they say the statute requires, because NovelPoster “willingly 17 transferred its website domain and all accounts” to the defendants. Mot. 3-4, 16 (citing Nosal I, 18 676 F.3d at 863 (holding that the CFAA targets “the circumvention of technological access 19 barriers—not misappropriation of trade secrets”)); Reply 4. 20 NovelPoster responds that their allegations against the defendants do not involve mere 21 misuse or misappropriation; rather, it asserts that the defendants both exceeded any authorization 22 by accessing and changing the passwords to the relevant accounts when the parties had a formal 23 business relationship, and acted without any authorization after NovelPoster says the contract was 24 terminated, which thus rescinded any authorization to access any of the accounts. Opp’n 8-11. 25 NovelPoster argues that neither “hacking” nor “circumventing technological access barriers” 26 appears in the CFAA, and neither is a requirement for establishing unauthorized access of 27 information. See Opp’n 4, 8 (citing United States v. Nosal, 930 F. Supp. 2d 1051, 1060 (N.D. Cal. 28 2013) (“Nosal II”) (“Nowhere does the [Ninth Circuit’s] opinion in Nosal [I] hold that the 8 1 government is additionally required to allege that a defendant circumvented technological access 2 barriers in bringing charges under § 1030(a)(4)”); NetApp, Inc. v. Nimble Storage, Inc., No. 13-cv- 3 5058-LHK, 2014 WL 1903639, at *10 (N.D. Cal. May 12, 2014) (“a nontechnological barrier can 4 revoke authorization”)). NovelPoster contends that this case is analogous to NetApp, Inc. v. Nimble Storage, Inc., in 5 6 which the court refused to dismiss a CFAA cause of action based on an allegation that the 7 defendant exceeded the authorization given to him to use his former employer’s computer systems 8 when he repeatedly accessed the systems and took confidential data from them after his 9 employment ceased. See Opp’n 8-9 (discussing NetApp, 2014 WL 1903639, at *11). There, the court rejected the argument that the CFAA requires pleading circumvention of a technological 11 United States District Court Northern District of California 10 access barrier. NetApp, 2014 WL 1903639, at *11. The defendants have not carried their burden of showing that they are entitled to judgment 12 13 on the pleadings regarding the issue of whether they exceeded, or acted without, authorization. 14 Based on the pleadings, issues of fact remain concerning whether the defendants truly had 15 authorization to access NovelPoster’s various accounts and change the passwords during the 16 business relationship and, if they did, to continue to access the accounts after the contract 17 supposedly terminated. In other words, the defendants’ contention that NovelPoster gave them 18 “unrestricted” access to the accounts is not as “clearly demonstrate[d]” as they assert. See Reply 19 3, 5. 20 Throughout the Complaint, NovelPoster has alleged that (i) Yancher’s and Grinberg’s 21 individual email accounts were “personal email accounts associated with their business”; (ii) the 22 defendants accessed those and other accounts and changed the passwords without providing the 23 new passwords to NovelPoster; (iii) NovelPoster never gave the defendants permission to take any 24 of the accused actions; (iv) Yancher and Grinberg expressed concern about the defendants’ actions 25 before entering the agreement; (v) the defendants refused to turn over the new passwords to 26 NovelPoster despite its demand that they do so; and (vi) the defendants continued to access the 27 accounts after the agreement purportedly ended. See Compl. ¶¶ 22-24, 36. That NovelPoster’s 28 owners “expressed concern that Defendants had changed the passwords” and asked to retain 9 1 access to all of its accounts the same day it proposed contract terms weakens the defendants’ 2 argument that they did not access NovelPoster’s accounts “without authorization.” See Compl. 3 ¶ 18. Indeed, NovelPoster’s attempts to restore its exclusive control of the individual NovelPoster 4 email accounts and to terminate its contract with the defendants further cuts against the 5 defendants’ assertion that they had, and continue to have, unrestricted authorization. This is a case 6 where “whether authorization existed may require a factual inquiry beyond the scope of the 7 threshold motion stage.” Global Policy Partners, LLC v. Yessin, 686 F. Supp. 2d 631, 636 (E.D. 8 Va. 2009). 9 Contrary to the defendants’ argument, the pleadings do not establish that NovelPoster granted them “unrestricted access” to the accounts at issue. See Reply 3-4. Though the parties’ 11 United States District Court Northern District of California 10 agreement states that the defendants shall “take over all aspects of operations except for poster 12 design,” Compl. ¶ 17, that does not unambiguously entail unrestricted access to all accounts, 13 especially those accounts that NovelPoster has characterized as Yancher’s and Grinberg’s 14 “personal email account[s],” Compl. ¶ 22. While NovelPoster admits that the individual email 15 accounts were “in effect, the customer relationship management [ ] tool for Mr. Grinberg and Mr. 16 Yancher,” Compl. ¶ 11(a) (emphasis added), it is not apparent that those email accounts were the 17 exclusive means for NovelPoster to reach customers such that it would have impossible for the 18 defendants to operate NovelPoster without access to the individual email accounts. 19 Notably, the Complaint does not allege, and the defendants do not argue, that NovelPoster 20 gave the defendants the passwords to the individual email accounts. And though NovelPoster 21 gave the defendants the password to the Contact@NovelPoster.com account, which conferred on 22 the defendants the ability to access the individual email accounts and change their passwords, that 23 does not mean that the defendants were authorized to do so, especially in the face of Yancher and 24 Grinberg’s complaints when the defendants exercised that ability. NovelPoster may have simply 25 intended that the defendants have capabilities limited to the administrative account only but not 26 the individual accounts. The pleadings are silent on this point and it is a factual issue 27 inappropriate for decision on this motion. But the fact that Yancher and Grinberg protested that 28 the defendants changed the passwords to two NovelPoster accounts and stated that they “would 10 1 need to maintain access to all NovelPoster accounts” before the agreement was confirmed 2 indicates that the scope of the defendants’ authorization with regard to NovelPoster’s accounts 3 may have been more circumscribed than the defendants assert. See Compl. ¶ 18 (emphasis 4 added). 5 The defendants’ argument that their actions may constitute misuse or misappropriation, but 6 do not fall under the CFAA as a matter of law, is unpersuasive. The Complaint focuses primarily 7 on the defendants’ access to the accounts, not what the defendants did with the information stored 8 in those accounts, so the defendants are incorrect to argue that this case is merely about 9 misappropriation or misuse of information. The defendants suggest that, as in Nosal I, in which the court dismissed a CFAA cause of action where an employee accessed a company database and 11 United States District Court Northern District of California 10 transferred source lists to a competitor because the accused activity constituted misuse rather than 12 unauthorized access, they did not access any protected computer “without authorization” and, at 13 most, engaged in misappropriation. See Mot. 15-16 (citing Nosal I, 676 F.3d at 863). Nosal I is 14 different from this case, however, because the defendants there undoubtedly had permission to 15 access the company files but were accused of misusing those files to start a competing business. 16 See Nosal I, 676 F.3d at 856. Here, there remains a question of whether the defendants were 17 allowed to access the accounts at issue at all. 18 The defendants argue that NovelPoster fails to plead that they circumvented a 19 “technological access barrier” and that “the Complaint [does not] show that Plaintiff made any 20 efforts to erect a ‘technological access barrier,’” such as by revoking the defendants’ password 21 access. See Mot. 5, 7, 14 (“Nowhere in Plaintiff’s Complaint is there any allegation that 22 Defendants’ password access was ever rescinded”), 21-22. The defendants further reject 23 NovelPoster’s argument that it does not need to plead circumvention of a technological access 24 barrier by distinguishing cases in which courts have said there is no such requirement from this 25 case because those cases “involve former employees gaining access to the employer’s computer 26 system on false pretenses, post-termination,” whereas this case involves a failed business 27 relationship. Reply 7 (original emphasis); see also Mot. 21 (“Plaintiffs failed to allege that 28 Defendants overcame a technical barrier”). 11 1 The defendants’ arguments are unconvincing. As Judge Koh cogently explained: 2 “The [Ninth Circuit] did not . . . explicitly hold that the CFAA is limited to hacking crimes, or discuss the implications of so limiting the statute. . . . Hacking was only a shorthand term used as common parlance by the court to describe the general purpose of the CFAA, and its use of the phase ‘circumvention of technological access barriers’ was an aside that does not appear to have been intended as having some precise definitional force.”5 3 4 5 Nosal II, 930 F. Supp. 2d at 1060-61. Moreover, to the extent that the defendants fault 6 NovelPoster for not erecting a technological access barrier, it was the defendants’ own alleged 7 actions that prevented NovelPoster from doing so after they purportedly exceeded and acted 8 without authorization concerning the accounts: by changing the passwords on the various 9 accounts and refusing to turn over the new passwords to NovelPoster despite its demands that they do so, the defendants kept NovelPoster from taking the precise action they now assert it failed to 11 United States District Court Northern District of California 10 take. 12 The defendants make much of the fact that the parties are not in an employer-employee 13 relationship, noting that many of the CFAA cases cited by NovelPoster involve such a 14 relationship. Reply 4-5; see also Mot. 5 (“Plaintiff’s use of the CFAA is novel in other ways as 15 well. Most CFAA cases in the Ninth Circuit deal with a former employee accessing an 16 employer’s computer with adverse interests to the employer . . . .”). They do not explain why this 17 is relevant—no authority cited states that a CFAA violation can only occur in an employment 18 context. Though many cases dealing with exceeding authorization involve employers and 19 employees, as NovelPoster correctly observes, “While the Nosal and Brekka cases dealt with an 20 employer authorizing its employee to access its protected computers, the rule applies equally to 21 other situations as it is the owner of the protected computer that decides whether someone is 22 authorized to access its computer’s [sic] or not.” Opp’n 11. Regardless of whether an 23 employment relationship was involved, the relevant question is whether authorization to access a 24 protected computer was absent or exceeded, and NovelPoster has raised an issue of fact in that 25 regard. 26 The defendants also raised a number of issues about the scope of the parties’ contract itself 27 5 28 To be clear, NovelPoster also accuses the defendants of exceeding authorization, a context in which circumventing a technological access barrier makes little sense. 12 1 and whether it was effectively terminated when NovelPoster claims to have done so. For example, 2 the defendants assert that any of NovelPoster’s and its owners’ statements outside of the contract 3 cannot modify what the contract explicitly states. Reply 5-6. They also assert that NovelPoster 4 did not have the unilateral authority to terminate the agreement. Mot. 3-4. 5 As the defendants rightly recognize, “this dispute is entirely about two parties with 6 differing interpretations of the terms of a business relationship,” Opp’n 4, but the “terms” of that 7 business relationship include the extent to which the defendants could access the accounts at issue. 8 The scope of those terms remain issues of fact. Though the defendants argue that the language of 9 the contract is clear and nothing NovelPoster, Yancher, or Grinberg said or did could modify its terms, they are incorrect. As the Supreme Court of California has said, “rational interpretation [of 11 United States District Court Northern District of California 10 a contract] requires at least a preliminary consideration of all credible evidence offered to prove 12 the intention of the parties,” and this evidence includes the “circumstances surrounding the making 13 of the agreement . . . so that the court can place itself in the same situation in which the parties 14 found themselves at the time of contracting.” Pac. Gas & Elec. Co. v. G. W. Thomas Drayage & 15 Rigging Co., 69 Cal. 2d 33, 39-40 (1968) (internal quotation marks and citations omitted). The 16 scope of NovelPoster’s authorization is in dispute and the defendants are not entitled to judgment 17 on the pleadings on this basis. 18 C. NovelPoster Fails To Adequately Plead Loss. 19 The parties dispute whether NovelPoster has alleged losses sufficient to sustain a claim 20 under the CFAA. “Damage” under the CFAA includes “any impairment to the integrity or 21 availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). “Loss” under 22 the CFAA includes “any reasonable cost to any victim, including the cost of responding to an 23 offense, conducting a damage assessment, and restoring the data, program, system, or information 24 to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential 25 damages incurred because of interruption of service.” 18 U.S.C. § 1030(e)(11). “[D]istrict courts 26 in the Ninth Circuit have held that it is not necessary for data to be physically changed or erased to 27 constitute damage to that data. . . . It is sufficient to show that there has been an impairment to the 28 integrity of data, as when an intruder retrieves password information from a computer and the 13 1 rightful computer owner must take corrective measures ‘to prevent the infiltration and gathering of 2 confidential information.’” Multiven, Inc. v. Cisco Sys., Inc., 725 F. Supp. 2d 887, 894-95 (N.D. 3 Cal. 2010) (Ware, J.) (citations omitted). The cost of investigating unauthorized access and 4 securing a computer network constitutes losses. Kimberlite Corp. v. Does 1-20, No. 08-cv-2147- 5 TEH, 2008 WL 2264485, at *2, (N.D. Cal. June 2, 2008). The defendants assert that NovelPoster cannot meet the CFAA’s loss requirement because 7 NovelPoster’s claim of loss is too vague. Mot. 18. Regarding loss, NovelPoster’s sole allegation 8 is that, “[a]s a result of Defendants’ conduct, [NovelPoster] has suffered damages and/or loss in 9 excess of $5,000 in the year preceding the date of this filing, but the damages grow each day that 10 Defendants refuse to acknowledge termination of the Agreement.” Compl. ¶ 44. The defendants 11 United States District Court Northern District of California 6 point out that NovelPoster claims a loss of business, but not that customers were impeded from 12 making purchases while NovelPoster’s owners could not access its email accounts. Mot. 18; 13 Reply 12. 14 The defendants also maintain that NovelPoster cannot bring a CFAA claim because it does 15 not have standing to allege loss to “protected computers” that it does not actually own, operate, or 16 maintain. Mot. 18-19 (citing Nexans Wires S.A. v. Sark-USA, Inc., 319 F. Supp. 2d 468, 475 17 (S.D.N.Y. 2004) (defining “loss” as the “cost of investigating or remedying damage to a computer, 18 or a cost incurred because the computer’s service was interrupted”)). They reason that because 19 NovelPoster’s business is conducted on third-party software programs, NovelPoster does not 20 actually own, operate, or maintain these “computers” and, thus, cannot be said to have suffered 21 any loss to those computers. 22 NovelPoster alleges that the defendants caused harm amounting to greater than $5,000, and 23 damages continue to accumulate. Compl. ¶ 44. It claims damages based on the attorney’s fees 24 and costs supposedly needed to investigate the alleged misconduct and to prosecute this lawsuit, as 25 well as “lost sales opportunities, unjust enrichment via cross-marketing, and loss of access to 26 data.” Opp’n 13-14. NovelPoster contends this it “is not required to literally own the servers or 27 host computers that have been wrongfully accessed” in order to maintain a CFAA cause of action. 28 Opp’n 12 (quoting Theofel v. Farey-Jones, 359 F.3d 1066, 1078 (9th Cir. 2004) (“The civil 14 1 remedy extends to any person who suffers damage . . . . Individuals other than the computer’s 2 owner may be proximately harmed by unauthorized access, particularly if they have rights to data 3 stored on it.”) (brackets and emphasis omitted)). NovelPoster further responds that NovelPoster’s 4 inability to access the email accounts for which the defendants changed passwords constitutes an 5 “interruption of service” because NovelPoster could not reach or use the data and information 6 contained in the accounts. Opp’n 14. The defendants are entitled to judgment as a matter of law on the CFAA cause of action 7 8 because NovelPoster fails to adequately allege loss or damages. Its sole allegation in this regard— 9 that NovelPoster “has suffered damages and/or loss in excess of $5,000 in the year preceding the date of this filing, but the damages grow each day that Defendants refuse to acknowledge 11 United States District Court Northern District of California 10 termination of the Agreement,” Compl. ¶ 44—is nothing more than a “conclusory allegation[ ] of 12 harm” insufficient to sustain a CFAA claim. See NetApp, 2014 WL 1903639, at *13. With 13 respect to damage, NovelPoster does not plead any “any impairment to the integrity or availability 14 of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8); see also NetApp, 2014 WL 15 1903639, at *12-13 (“[the plaintiff] alleges only that [the defendant] accessed its databases 16 without permission, not that he damaged any systems or destroyed any data”). With respect to 17 loss, NovelPoster’s allegation “set[s] forth only a bare legal conclusion, couched as fact, that [it] 18 incurred costs.” In re Google Android Consumer Privacy Litig., No. 11-md-2264-JSW, 2013 WL 19 1283236, at *7 (N.D. Cal. Mar. 26, 2013). Its “assessment of loss” is “entirely speculative” 20 because it is “devoid of any specific details from which a factfinder could calculate an amount of 21 loss.” Doyle v. Taylor, No. 09-cv-158, 2010 WL 2163521, at *3 (E.D. Wash. May 24, 2010), 22 aff’d sub nom. Doyle v. Chase, 434 F. App’x 656 (9th Cir. 2011). NovelPoster itself appears to 23 recognize that its pleading is lacking because it requests several times in its opposition brief leave 24 to amend its complaint. As the Complaint now reads, NovelPoster’s CFAA claim is deficient and 25 the defendants are entitled to judgment on the pleadings for that cause of action.6, 7 26 6 27 28 The defendants are incorrect to assert that NovelPoster must “own” the protected computers at issue in order to have standing to bring a CFAA claim. See Theofel, 359 F.3d at 1078 (“The district court erred by reading an ownership or control requirement into the Act.”). 7 The defendants argue that the rule of lenity weighs in their favor with respect to this cause of 15 1 II. THIRD CAUSE OF ACTION: CDAFA VIOLATION 2 NovelPoster alleges that the defendants violated the CDAFA, California’s corollary to the 3 CFAA. Compl. ¶¶ 57-59. As with the CFAA claim, the parties dispute the existence or extent of 4 the defendants’ authorization to access and use NovelPoster’s accounts. 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 The relevant provision of the CDAFA provides that a person is liable who: (1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongfully control or obtain money, property, or data. (2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network. (3) Knowingly and without permission uses or causes to be used computer services. (4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system, or computer network. (5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the denial of computer services to an authorized user of a computer, computer system, or computer network. . . . (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network. 16 CAL. PENAL CODE § 502(c)(1)-(5), (7). Parties act “without permission” when they “circumvent[ ] 17 technical or code-based barriers in place to restrict or bar a user’s access.” Facebook v. Power 18 Ventures, Inc., 844 F. Supp. 2d 1025, 1036 (N.D. Cal. 2012) (Ware, J.). An individual “who 19 suffers damage or loss by reason of a violation” may bring a private action for damages and 20 equitable relief. CAL. PENAL CODE § 502(e)(1). “[T]he necessary elements of Section 502 do not 21 22 23 24 25 26 27 28 action. The rule of lenity does not weigh in the defendants’ favor. “It is well established that ‘ambiguity concerning the ambit of criminal statutes should be resolved in favor of lenity.’” United States v. Carr, 513 F.3d 1164, 1168 (9th Cir. 2008) (citation omitted). The rule is equally relevant in the civil context if the statute at issue is also criminal. Brekka, 581 F.3d at 1134. But as the Ninth Circuit has said in the context of considering how the rule of lenity applied to the CFAA in a civil case, “we hold that a person uses a computer ‘without authorization’ under §§ 1030(a)(2) and (4) when the person has not received permission to use the computer for any purpose (such as when a hacker accesses someone’s computer without any permission), or when the [computer’s owner] has rescinded permission to access the computer and the defendant uses the computer anyway.” Brekka, 581 F.3d at 1135. The pleadings accuse the defendants of doing exactly that. The defendants identify no other ambiguity warranting application of the rule. Accordingly, the rule of lenity is not a bar to holding the defendants liable under the CFAA if NovelPoster’s allegations prove true. In any event, this issue is mooted by this Order. 16 1 differ materially from the necessary elements of the CFAA . . . .” Multiven, 725 F. Supp. 2d at 2 895; see also New Show Studios LLC v. Needle, No. 14-cv-1250, 2014 WL 2988271, at *7 (C.D. 3 Cal. June 30, 2014) (disposing of CFAA and CDAFA claims jointly); Integral Dev. Corp. v. Tolat, 4 No. 12-cv-6575-JSW, 2013 WL 5781581, at *3-4 (N.D. Cal. Oct. 25, 2013) (same).8 The defendants’ motion for judgment on the pleadings for the CDAFA cause of action 5 6 succeeds for the same reason their motion succeeds with regard to the CFAA claim: while 7 whether the defendants acted “without permission” remains in dispute,9 the complaint does not 8 adequately plead that NovelPoster “suffer[ed] damage or loss by reason of a violation.” CAL. 9 PENAL CODE § 502(e)(1); see also Perkins v. LinkedIn Corp., No. 13-cv-4303-LHK, 2014 WL 2751053, at *18 (N.D. Cal. June 12, 2014) (requiring plaintiffs to plead that they “have suffered 11 United States District Court Northern District of California 10 [ ] tangible harm from the alleged Section 502 violations”). 12 III. SECOND CAUSE OF ACTION: WIRETAP ACT VIOLATION The Wiretap Act makes liable any person who “intentionally intercepts, endeavors to 13 14 intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or 15 electronic communication.” 18 U.S.C. § 2511(1)(a). A civil cause of action is available to “any 16 person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally 17 used in violation of this [law].” 18 U.S.C. § 2520(a). The statute defines “intercept” as “the aural 18 or other acquisition of the contents of any wire, electronic, or oral communication through the use 19 of any electronic, mechanical, or other device.” 18 U.S.C. § 2510(4). “Such acquisition occurs 20 ‘when the contents of a wire communication are captured or redirected in any way.’” Noel v. Hall, 21 568 F.3d 743, 749 (9th Cir. 2009) (citation omitted). “[E]lectronic, mechanical, or other device” 22 includes: any device or apparatus which can be used to intercept a wire, oral, 23 24 8 25 26 27 28 However, under the CDAFA, a plaintiff must also allege that the defendant “overc[a]me some technical or code barrier.” Enki Corp. v. Freedman, No. 13-cv-2201-PSG, 2014 WL 261798, at *3 (N.D. Cal. Jan. 23, 2014). 9 The defendants correctly note that California Penal Code Section 502(h) contains an exception for acts committed within the scope of employment, and they argue the exception should apply to them even though the parties were not technically in an employment relationship. Mot. 21-22 (citing CAL. PENAL CODE § 502(h)). As discussed above, the existence and scope of authorization remains a disputed issue of fact, so this exception would not help them. 17 or electronic communication other than [ ] any telephone or telegraph instrument, equipment or facility, or any component thereof, [ ] furnished to the subscriber or user by a provider of wire or electronic communication service in the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of its business. 1 2 3 4 5 18 U.S.C. § 2510(5)(a). It is not unlawful, however, for a “party to the communication” “to 6 intercept a wire, oral, or electronic communication . . . where one of the parties to the 7 communication has given prior consent to such interception.” 18 U.S.C. § 2511(2)(d). Consent to 8 an interception can be explicit or implied. See United States v. Van Poyck, 77 F.3d 285, 292 (9th 9 Cir. 1996). A further limitation to the Wiretap Act is described in Konop v. Hawaii Airlines, Inc., 11 United States District Court Northern District of California 10 where the Ninth Circuit held that for a communication “to be ‘intercepted’ in violation of the 12 Wiretap Act, it must be acquired during transmission, not while it is in electronic storage.” 302 13 F.3d 868, 878 (9th Cir. 2002). The court explained that “[t]his conclusion is consistent with the 14 ordinary meaning of ‘intercept,’ which is ‘to stop, seize, or interrupt in progress or course before 15 arrival.’” Id. (quoting WEBSTER’S NINTH NEW COLLEGIATE DICTIONARY 630 (1985)). In other 16 words, “acquisition of email messages stored on an electronic [ ] system, but not yet retrieved by 17 the intended recipients, [i]s not an ‘interception’ under the Wiretap Act.” Id. at 876 (endorsing 18 Steve Jackson Games, Inc. v. United States Secret Serv., 36 F.3d 457, 460 (5th Cir. 1994)). 19 Given the speed of email, the Wiretap Act’s application to that form of electronic 20 communication is undoubtedly limited. In adopting the Ninth Circuit’s reasoning in Konop, the 21 Eleventh Circuit quoted from a law review article which explained, 22 23 24 25 26 27 28 There is only a narrow window during which an E-mail interception may occur—the seconds or mili-seconds before which a newly composed message is saved to any temporary location following a send command. Therefore, unless some type of automatic routing software is used (for example, a duplicate of all of an employee’s messages are automatically sent to the employee’s boss), interception of E-mail within the prohibition of the Wiretap Act is virtually impossible. United States v. Steiger, 318 F.3d 1039, 1050 (11th Cir. 2003) (quoting Jarrod J. White, E–Mail @Work.com: Employer Monitoring of Employee E-Mail, 48 ALA. L. REV. 1079, 1083 (1997) (brackets omitted)). The Ninth Circuit has therefore observed that “the existing statutory 18 1 framework is ill-suited to address modern forms of communication.” Konop, 302 F.3d at 874. 2 Nonetheless, courts have almost uniformly applied this understanding of the statute. Pure Power 3 Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548, 555 (S.D.N.Y. 2008) (“The 4 majority of courts which have addressed the issue have determined that e-mail stored on an 5 electronic communication service provider’s systems after it has been delivered, as opposed to e- 6 mail stored on a personal computer, is a stored communication [not subject to the Wiretap Act].”); 7 see also Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 113 (3d Cir. 2003) (“While Congress’s 8 definition of ‘intercept’ does not appear to fit with its intent to extend protection to electronic 9 communications, it is for Congress to cover the bases untouched.”). 10 Courts have explained that, for a Wiretap Act violation to occur, the defendants’ actions United States District Court Northern District of California 11 must “halt the transmission of the messages to their intended recipients.” Exec. Sec. Mgmt., Inc. v. 12 Dahl, 830 F. Supp. 2d 883, 904 (C.D. Cal. 2011) (quoting Bunnell v. Motion Picture Ass’n of Am., 13 567 F. Supp. 2d 1148, 1154 (C.D. Cal. 2007)). Thus, reading emails that have already been 14 received in an email account’s inbox does not constitute “intercept[ion]” under the statute. See 15 Mintz v. Mark Bartelstein & Assocs. Inc., 906 F. Supp. 2d 1017, 1031 (C.D. Cal. 2012) (granting 16 summary judgment to defendants where “[t]he undisputed facts [ ] show that Defendants did not 17 access, disclose, or use any emails that had been acquired during transmission. Rather, the emails 18 Defendants viewed were stored on Gmail.”); see also Yessin, 686 F. Supp. 2d at 638 (“a qualifying 19 ‘intercept’ under the [Wiretap Act] . . . can only occur where an e-mail communication is accessed 20 at some point between the time the communication is sent and the time it is received by the 21 destination server”). Nor does it matter if the intended recipient had not read the emails intended 22 to reach that recipient before it was allegedly intercepted. Pure Power Boot Camp, Inc. v. Warrior 23 Fitness Boot Camp, LLC, 759 F. Supp. 2d 417, 431 (S.D.N.Y. 2010) (“there was no evidence that 24 the emails were intercepted at the same time they were transmitted, and [ ] the evidence indicated 25 instead that the emails were accessed after they had been delivered . . . electronic communications 26 cannot be intercepted for purposes of the [Wiretap Act] after they have been delivered”); Yessin, 27 686 F. Supp. 2d at 638 (“Irrespective of whether Mrs. Yessin read the e-mail messages in 28 question, they had reached their destination server. Accordingly, they were no longer in 19 1 2 transmission by the time Mr. Yessin allegedly accessed them.”). The defendants contend that this cause of action cannot be proved on the facts alleged. 3 They argue that they were authorized to use the accounts as part of their “take over” of 4 NovelPoster’s operations. Mot. 8. As the Complaint alleges, the individual NovelPoster accounts 5 were tools for customer relations used by Yancher and Grinberg before the defendants assumed 6 control of the business. Mot. 23-24. Accordingly, the defendants argue, as the operators of 7 NovelPoster, they qualify for the exemption in the Wiretap Act for any “party to the 8 communication” at issue. Mot. 24 (citing 18 U.S.C. § 2511(2)(c)). Furthermore, the defendants 9 assert that because they did not use a “device” to access the emails in the individual NovelPoster accounts other than Microsoft Outlook or Gmail, they did not “intercept” them under the Act. 11 United States District Court Northern District of California 10 Mot. 23-24; see also Crowley v. Cybersource Corp. & Amazon, Inc., 166 F. Supp. 2d 1263, 1269 12 (N.D. Cal. 2001) (holding that the plaintiff failed to demonstrate the defendant had intercepted the 13 communication “because [the defendant] did not acquire it using a device other than the drive or 14 server on which the e-mail was received”). 15 NovelPoster argues the defendants intentionally intercepted and used emails from the 16 individual email accounts without authorization “to unjustly retain money from NovelPoster, and 17 to aid in the marketing of other products [the defendants] sell that are unrelated to NovelPoster.” 18 Opp’n 21-21 (citing Compl. ¶¶ 22-24, 34). It asserts that the defendants were not authorized to 19 use the individual email accounts merely because they were charged with NovelPoster’s 20 operation—the accounts were the customer relationship management tools for Yancher and 21 Grinberg individually. Opp’n 21-22. It states that the defendants’ wrongful access of the 22 individual email accounts and redirection of emails constitutes use of a “device” under the statute. 23 Opp’n 22. And it contends that, regardless of any rights the defendants may have had prior to the 24 alleged contract termination, the defendants were not a party to any NovelPoster communications 25 after that termination and any consent to view such communications was immediately revoked. 26 Opp’n 23. 27 None of NovelPoster’s arguments make the Wiretap Act applicable. While the Complaint 28 alleges that the defendants wrongfully accessed the accounts at issue and, by changing passwords, 20 1 prevented NovelPoster from accessing certain ones, nowhere does the Complaint allege that the 2 defendants “intercepted” any “electronic communication” as understood under the Wiretap Act.10 3 The Ninth Circuit and other courts have consistently explained that any “interception” under the 4 meaning of the statute must occur during transmission of the communication. Konop, 302 F.3d at 5 878. Though NovelPoster claims that Yancher and Grinberg were never able to access their email 6 accounts due to the defendants’ alleged actions, any subsequent reading or forwarding of those 7 emails by the defendants does not constitute an illegal “interception.” Pure Power Boot Camp, 8 759 F. Supp. 2d at 431. Accordingly, based on the pleadings, NovelPoster is unable to allege a 9 violation of the Wiretap Act. 10 IV. To support their arguments for judgment on the pleadings for the CIPA cause of action, the 11 United States District Court Northern District of California FOURTH CAUSE OF ACTION: CIPA VIOLATION11 12 parties rely upon the arguments they raised with regard to the Wiretap Act claim. Mot. 24-25; 13 Opp’n 23. The analysis for a violation of CIPA is the same as that under the federal Wiretap Act. See 14 15 Opperman v. Path, No. 13-cv-453-JST, 2014 WL 1973378, at *30 (N.D. Cal. May 14, 2014) 16 (summarily dismissing CIPA claim for the same reasons the Wiretap Act claim was dismissed); 17 Hernandez v. Path, Inc., No. 12-cv-1515-YGR, 2012 WL 5194120, at *5 (N.D. Cal. Oct. 19, 18 2012) (same); Bradley v. Google, Inc., No. 06-cv-5289-WHA, 2006 WL 3798134, at *5-6 (N.D. 19 Cal. Dec. 22, 2006) (finding lack of “interception” fatal to CIPA claim). Based on the pleadings, 20 because NovelPoster is unable to allege a violation of the Wiretap Act, it is also unable to allege a 21 violation of CIPA. CONCLUSION 22 For the reasons above, the Motion for Judgment on the Pleadings is GRANTED. 23 24 25 26 27 28 10 11 Neither of the parties briefed this issue. However, it is dispositive. At least one court has held that CIPA is preempted by the Wiretap Act. See, e.g., Bunnell v. Motion Picture Ass’n of Am., 567 F. Supp. 2d 1148, 1154-55 (C.D. Cal. 2007). Neither party raised this issue, but judges on this Court have rejected that conclusion. See, e.g., Shively v. Carrier IQ, Inc., No. 12-cv-290-EMC, 2012 WL 3026553, at *10 (N.D. Cal. July 24, 2012); Valentine v. NebuAd, Inc., 804 F. Supp. 2d 1022, 1029 (N.D. Cal. 2011) (Henderson, J.); see also Leong v. Carrier IQ Inc., No. 12-cv-1562, 2012 WL 1463313, at *1 (C.D. Cal. Apr. 27, 2012). In any event, the issue is moot because of this Order’s holding. 21 1 I will grant NovelPoster leave to amend its complaint with respect to the four causes of 2 action that are the subject of this Order within 15 days of the date below. I caution that, for the 3 reasons described above, amendment is likely to be futile with regard to the Second and Fourth 4 Causes of Action. In that regard I remind counsel of their obligations under Rule 11(b) of the 5 Federal Rules of Civil Procedure. If NovelPoster wishes to allege any additional causes of action, 6 it shall seek leave of Court before doing so. 7 8 9 10 IT IS SO ORDERED. Dated: August 4, 2014 ______________________________________ WILLIAM H. ORRICK United States District Judge United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 22

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?