Sunbelt Rentals, Inc. v. Victor

Filing 58

ORDER by Judge Saundra Brown Armstrong GRANTING PLAINTIFFS 39 MOTION TO DISMISS DEFENDANTS COUNTERCLAIMS. (ndr, COURT STAFF) (Filed on 8/28/2014)

Download PDF
1 2 3 4 5 6 UNITED STATES DISTRICT COURT 7 FOR THE NORTHERN DISTRICT OF CALIFORNIA 8 OAKLAND DIVISION 9 SUNBELT RENTALS, INC., Case No: C 13-4240 SBA 10 Plaintiff, 11 vs. 12 ORDER GRANTING PLAINTIFF’S MOTION TO DISMISS DEFENDANT’S COUNTERCLAIMS SANTIAGO VICTOR, Dkt. 39 13 Defendant. 14 15 16 Sunbelt Rentals, Inc. (“Plaintiff” or “Sunbelt”) filed the instant action against its 17 former employee, Santiago Victor (“Defendant” or “Victor”), alleging that he 18 misappropriated trade secrets upon his termination. Victor has filed five counterclaims 19 against Sunbelt, accusing it, inter alia, of violating the federal Wiretap Act and the Stored 20 Communications Act (“SCA”) by reviewing his text messages on the iPhone which Sunbelt 21 had previously issued to him. The parties are presently before the Court on Plaintiff’s 22 Motion to Dismiss Defendants Counterclaims. Having read and considered the papers filed 23 in connection with this matter and being fully informed, the Court hereby GRANTS the 24 motion and dismisses Victor’s counterclaims, with leave to amend. The Court, in its 25 discretion, finds this matter suitable for resolution without oral argument. Fed. R. Civ. P. 26 78(b); N.D. Cal. Civ. L.R. 7-1(b). 27 28 1 I. BACKGROUND 2 A. 3 During the relevant time period, Victor worked as an outside sales representative for RELEVANT FACTS 4 Sunbelt, an equipment rental company. Countercl. ¶ 11, Dkt. 34. In August 2013, Victor 5 gave his two-week notice to Sunbelt, stating that he had taken a job with one of its 6 competitors—Ahern Rentals (“Ahern”). Id. ¶ 16. Upon learning of Victor’s intent to leave 7 the company, Sunbelt immediately dismissed him. Id. 8 During his time with Sunbelt, Victor was assigned a Sunbelt-owned iPhone 9 (“Sunbelt iPhone”) and a Sunbelt-owned iPad for both work and personal purposes. Id. 10 ¶¶ 12-14. Thereafter, Victor “created and paid for a personal ‘Apple account’ that was 11 linked to both devices.” Id. ¶ 15. Victor returned the devices to Sunbelt after his 12 separation. Id. ¶¶ 16, 18, 20. 13 Victor’s new employer, Ahern, provided him a new iPhone (“Ahern iPhone”). Id. 14 ¶19-20. At some point thereafter, Victor registered or linked his Ahern iPhone to the same 15 personal Apple account he had previously used while at Sunbelt. Id. ¶19. This process 16 “synced” Victor’s Ahern iPhone with his personal Apple account. Id. 17 Several weeks later, when he received a new iPad from Ahern (“Ahern iPad”), 18 Victor linked the new iPad to his personal Apple account. Id. ¶ 20. In the process of 19 registering the Ahern iPad, Victor discovered the telephone number associated with the 20 Sunbelt iPhone was still linked to his personal Apple account. Id. Because Victor had 21 failed to unlink the Sunbelt iPhone from his account, his “private electronic data and 22 electronic messages,” including text messages sent to and from his Ahern iPhone, also were 23 transmitted to the Sunbelt iPhone which he had returned to Sunbelt. Id. ¶ 20, 21. Victor 24 then deleted the Sunbelt number from his account “to ensure that his new Ahern issued 25 Apple products were not in any way linked to Sunbelt.” Id. 26 Victor claims that after his departure, Sunbelt “began actively investigating Victor’s 27 post-employment acts, conduct, and communications.” Id. ¶ 21. In the course of such 28 investigation, Sunbelt allegedly “invaded Victor’s privacy rights by accessing, -2- 1 intercepting, monitoring, reviewing, storing and using Victor’s post-employment private 2 electronic data and electronic communications (including but not limited to text messages 3 sent and received from Victor’s Ahern, Rentals Inc. issued iPhone) without authority, 4 permission, or consent.” Id. (emphasis added). Victor further accuses Sunbelt of 5 “intentionally accessing Victor’s private electronic communications and data, without 6 authorization, from facilities through which Victor’s electronic communications were 7 provided and stored (i.e., Victor’s cellular phone provider’s network which stores Victor’s 8 electronic communications, and or Apple's cloud based network where Victor's electronic 9 communication pertaining to his Apple Account are processed and stored) and where such 10 services and communications were restricted to access by Victor, which Sunbelt obtained 11 through improper means.” Id. ¶ 23 (emphasis added). No particular facts are alleged to 12 support these assertions. 13 B. 14 On September 12, 2013, Sunbelt filed a complaint against Victor in this Court 15 alleging four state law causes of action: (1) breach of contract; (2) misappropriation of trade 16 secrets; (3) unfair competition; and (4) breach of duty of loyalty. Dkt. 1. Victor then filed 17 an Answer, and later amended an Answer and Counterclaim. The gist of the Counterclaim 18 is that Sunbelt improperly read the text messages that were inadvertently transmitted to his 19 Sunbelt iPhone. He alleges claims for violations of: (1) the Wiretap Act; (2) the SCA; (3) 20 California Penal Code § 502 et seq.; (4) California Penal Code § 630 et seq.; and (5) his 21 right to privacy. See Countercl. ¶ 24. Each of these claims is based on the same set of 22 facts—Sunbelt’s purported interception, acquisition and use of Victor’s electronic 23 communications (i.e., text messages) sent to and from his Ahern iPhone. Sunbelt now 24 moves to dismiss all counterclaims. This matter has been fully briefed and is ripe for 25 adjudication. 26 II. 27 28 PROCEDURAL HISTORY LEGAL STANDARD Pleadings in federal court actions are governed by Federal Rule of Civil Procedure 8(a)(2), which requires only “a short and plain statement of the claim showing that the -3- 1 pleader is entitled to relief.” Rule 12(b)(6) “tests the legal sufficiency of a claim.” Navarro 2 v. Block, 250 F.3d 729, 732 (9th Cir. 2001). A complaint may be dismissed under Rule 3 12(b)(6) for either failure to state a cognizable legal theory or insufficient facts to support a 4 cognizable legal theory. Mendiondo v. Centinela Hosp. Med. Ctr., 521 F.3d 1097, 1104 5 (9th Cir. 2008). “[C]ourts must consider the complaint in its entirety, as well as other 6 sources courts ordinarily examine when ruling on Rule 12(b)(6) motions to dismiss, in 7 particular, documents incorporated into the complaint by reference, and matters of which a 8 court may take judicial notice.” Tellabs, Inc. v. Makor Issues & Rights, Ltd., 551 U.S. 308, 9 322 (2007). The court is to “accept all factual allegations in the complaint as true and 10 construe the pleadings in the light most favorable to the nonmoving party.” Outdoor Media 11 Group, Inc. v. City of Beaumont, 506 F.3d 895, 899-900 (9th Cir. 2007). 12 To survive a motion to dismiss, “a complaint must contain sufficient factual matter, 13 accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v. Iqbal, 14 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). 15 The complaint must afford the defendants with “fair notice” of the claims against them, and 16 the grounds upon which the claims are based. Swierkiewicz v. Sorema N.A., 534 U.S. 506, 17 512 (2002). “Threadbare recitals of the elements of a cause of action, supported by mere 18 conclusory statements, do not suffice.” Iqbal, 556 U.S. at 678. When a complaint or claim 19 is dismissed, “[l]eave to amend should be granted unless the district court determines that 20 the pleading could not possibly be cured by the allegation of other facts.” Knappenberger 21 v. City of Phoenix, 566 F.3d 936, 942 (9th Cir. 2009). 22 III. DISCUSSION 23 A. 24 The Wiretap Act imposes civil liability against any person who “intentionally WIRETAP ACT 25 intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to 26 intercept, any wire, oral, or electronic communication.” 18 U.S.C §§ 2511(1)(a) (emphasis 27 added); id. § 2520(a). The Act defines “intercept” as “the aural or other acquisition of the 28 contents of any wire, electronic, or oral communication through the use of any electronic, -4- 1 mechanical, or other device.” 18 U.S.C. § 2510(4). “Such acquisition occurs ‘when the 2 contents of a wire communication are captured or redirected in any way.’” Noel v. Hall, 3 568 F.3d 743, 749 (9th Cir. 2009). The inception must be intentional, as opposed to 4 inadvertent. See Sanders v. Robert Bosch Corp., 38 F.3d 736, 742-43 (4th Cir. 1994). 5 Here, Victor has failed to allege facts sufficient to establish that Sunbelt 6 “intentionally intercepted” any of his text messages. By Victor’s own account, the text 7 messages appeared on his Sunbelt iPhone as a result of Victor’s act of syncing his new 8 iPhone to his Apple account without first un-linking his Sunbelt iPhone. Countercl. ¶¶ 19, 9 20. In other words, Sunbelt did not intentionally capture or redirect Victor’s text messages 10 to the Sunbelt iPhone—the transmission of those messages was entirely Victor’s doing. 11 Given these circumstances, the requisite intentional conduct is lacking. Sanders, 38 F.3d at 12 742-43; Shubert v. Metrophone, Inc., 898 F.2d 401, 405 (3rd Cir. 1990) (noting that 13 Congress specifically intended that “inadvertent interceptions are not crimes under [the 14 Wiretap Act]”). 15 Nor has Victor alleged facts sufficient to establish that Sunbelt acted to “intercept” 16 the text messages or any other electronic communications. The Ninth Circuit applies a 17 “narrow definition of ‘intercept.’” Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 18 (9th Cir. 2002). For a communication to be intercepted, “it must be acquired during 19 transmission, not while it is in electronic storage.” Id. Though Victor vaguely alleges that 20 Sunbelt intercepted his electronic communications, i.e., his text messages, he provides no 21 facts to support this otherwise conclusory assertion.1 If anything, the pleadings suggest that 22 Sunbelt read Victor’s text messages after they were sent and received on the Sunbelt 23 iPhone, which is insufficient to demonstrate intentional interception under the Wiretap Act. 24 See NovelPoster v. Javitch Canfield Group, No. C 13-5186 WHO, 2014 WL 3845148, *10 25 (N.D. Cal. Aug. 14, 2014) (reading emails that have already been received in an email 26 1 Victor’s Counterclaim repeatedly makes vague and formulaic references to “private and electronic communications,” but only specifically identifies “text messages” as having been allegedly intercepted. See Countercl. ¶ 22. Victor never specifies how the 28 alleged interception transpired. 27 -5- 1 account’s inbox does not constitute interception under the Wiretap Act because the 2 transmission had already occurred). 3 Although it is clear that Victor’s Wiretap Act claim must be dismissed, what is less 4 clear is whether leave to amend should be granted. Given the almost instantaneous 5 transmission of text messages, the window during which an interception may occur is 6 exceedingly narrow. NovelPoster, 2014 WL 3845148, *10 (citing United States v. Steiger, 7 318 F.3d 1039, 1050 (11th Cir. 2003)). Thus, “unless some type of automatic routing 8 software is used” to divert the text message, interception of [a text message] within the 9 prohibition of the Wiretap Act is virtually impossible.” Id. (internal quotations and citation 10 omitted). Given these constraints, it is doubtful that Victor will be able to allege facts, 11 consistent with Federal Rule of Civil Procedure 11, to state a claim for violation of the 12 Wiretap Act. Nonetheless, the Court will afford Victor an opportunity to amend this claim 13 and therefore DISMISSES his claim under the Wiretap Act, with leave to amend.2 14 B. 15 The SCA creates “a cause of action against anyone who “intentionally accesses 16 without authorization a facility through which an electronic communication service is 17 provided . . . and thereby obtains, alters, or prevents authorized access to a wire or 18 electronic communication while it is in electronic storage.’” Theofel v. Farey-Jones, 359 19 F.3d 1066, 1072 (9th Cir. 2004) (quoting 18 U.S.C. §§ 2701(a)(1), 2707(a)). “[E]lectronic 20 storage” is defined as either “temporary, intermediate storage . . . incidental to . . . 21 electronic transmission,” or “storage . . . for purposes of backup protection.” 28 U.S.C. 22 § 2510(17). 23 STORED COMMUNICATIONS ACT According to Victor, Sunbelt violated the SCA by virtue of having, Intentionally accessed, without authorization, facilities through which Victor’s electronic communications were provided and stored (i.e., Victor’s cellular phone provider’s network which stores Victor’s electronic communications, and or Apple’s 24 25 26 2 Sunbelt also contends that Victor has failed to allege any facts showing that it intercepted his text messages “through the use of any . . . device.” 18 U.S.C. § 2510(4) 28 (emphasis added). Since it is clear that the Counterclaim fails to allege intentional interception, the Court need not reach that issue at this juncture. 27 -6- 3 cloud based network where Victor’s electronic communication pertaining to his Apple Account are processed and stored) and where such services and communications were restricted to access by Victor, which Sunbelt obtained through improper means. 4 Countercl. ¶ 45. No facts are presented, however, to support the conclusory assertion that 5 Sunbelt accessed Victor’s text messages through his cellular telephone provider or Apple’s 6 network. Moreover, in his opposition, Victor contradicts himself by stating that the text 7 messages allegedly accessed by Sunbelt “were not accessed through, nor stored on a 8 website.” Opp’n at 4 (emphasis added). To the extent that Victor is claiming that Sunbelt 9 accessed his text messages by reviewing the messages on his Sunbelt iPhone—as he does 10 elsewhere in his Counterclaim, such conduct does not violate the SCA. See Garcia v. City 11 of Laredo, Tex., 702 F.3d 788, 793 (5th Cir. 2012) (holding that text messages and pictures 12 stored on a cellular telephone do not constitute “electronic storage” for purposes of the 13 SCA). This claim is DISMISSED with leave to amend. 1 2 14 C. 15 Section 502 of the California Penal Code prohibits unauthorized access to CALIFORNIA PENAL CODE § 502 16 computers, computer systems, and computer networks, and provides for a civil remedy in 17 the form of compensatory damages, injunctive relief, and other equitable relief. Cal. Penal 18 Code § 502. Section 502 is an anti-hacking statute intended to prohibit the unauthorized 19 use of any computer system for improper or illegitimate purpose. Yee v. Lin, No. C 12- 20 02474 WHA, 2012 WL 4343778, *2 (N.D. Cal. Sept. 20, 2012). 21 22 23 24 25 26 27 28 Victor alleges that Sunbelt violated subsections (c)(1), (2), (3), (4), (6), and (7) of Section 502, which provides that a person is liable if he: (1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongfully control or obtain money, property, or data. (2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network. -7- (3) Knowingly and without permission uses or causes to be used computer services. (4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system, or computer network. ... (6) Knowingly and without permission provides or assists in providing a means of accessing a computer, computer system, or computer network in violation of this section. (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network.” 1 2 3 4 5 6 7 8 9 Id. § 502(c); Countercl. ¶ 54. For purposes of Section 502, parties act “without permission” 10 when they “circumvent[ ] technical or code-based barriers in place to restrict or bar a user’s 11 access.” Facebook, Inc. v. Power Ventures, Inc., 844 F. Supp. 2d 1025, 1036 (N.D. Cal. 12 2012). 13 14 15 16 17 18 19 20 21 In his third Counterclaim, Victor alleges as follows: On information and belief, Sunbelt violated California Penal Code section 502 when it improperly began accessing, intercepting, monitoring, reviewing and using Victor’s postemployment private electronic data and electronic communications without Victor’s knowledge, authorization or consent. On information and belief, Sunbelt additionally, or in the alternative, violated of Penal Code § 502 by intentionally accessing, without authorization, facilities through which Victor’s electronic communications were provided and stored (i.e.,Victor’s cellular phone provider’s network which stores Victor’s electronic communications, and or Apple’s cloud based network where Victor’s electronic communication pertaining to his Apple Account are processed and stored) andwhere such services and communications were restricted to access by Victor, which Sunbelt obtained through improper means. 22 23 24 25 26 27 28 Countercl. ¶ 56 (emphasis added). These fact-barren and vague allegations are precisely the type of “threadbare recitals” proscribed by Twombly and Iqbal. Moreover, to the extent that Victor is claiming that Sunbelt accessed his unspecified “private electronic data and electronic communications” through the Apple account or his cellular telephone provider’s computer network, such a claim fails on the ground that no facts are alleged showing that Sunbelt did so by circumventing technical or code-based barriers intended to restrict such -8- 1 access. Facebook, 844 F. Supp. 2d at 1036. To the contrary, Victor simply avers that 2 Sunbelt reviewed his text messages that he caused, albeit inadvertently, to be sent to the 3 Sunbelt iPhone. The Court therefore concludes that Victor has failed to state a claim under 4 Section 502 and DISMISSES said claim with leave to amend. 5 D. 6 The California Invasion of Privacy Act (“CIPA”) is intended to prevent privacy 7 invasions facilitated by modern technology and devices. Cal. Penal Code § 630. “The 8 analysis for a violation of CIPA is the same as that under the federal Wiretap Act.” 9 NovelPoster, 2014 WL 3845148, *12 (granting judgment on pleadings on CIPA claim for 10 same reasons underlying the dismissal of the plaintiff’s Wiretap Act claim, i.e., the lack of 11 intentional interception). As discussed, Victor has failed to plausibly allege a violation of 12 the Wiretap Act; a fortiori, he is also unable to allege a violation of CIPA. This claim is 13 DISMISSED with leave to amend. CALIFORNIA PENAL CODE § 630 14 E. 15 California recognizes four categories of the tort of invasion of privacy: (1) intrusion INVASION OF PRIVACY 16 upon seclusion; (2) public disclosure of private facts; (3) false light in the public eye; and 17 (4) appropriation of name or likeness. Shulman v. Group W Prods., Inc., 18 Cal.4th 200, 18 214 n. 4 (1998). Victor fails to indicate which type of invasion of privacy claim he is 19 alleging. Nonetheless, based on the sparse allegations presented, it appears that he is 20 attempting to state a claim for intrusion upon seclusion. 21 “A privacy violation based on the common law tort of intrusion has two elements. 22 First, the defendant must intentionally intrude into a place, conversation, or matter as to 23 which the plaintiff has a reasonable expectation of privacy. Second, the intrusion must 24 occur in a manner highly offensive to a reasonable person.” Hernandez v. Hillsides, Inc., 25 47 Cal.4th 272, 285 (2009). “The tort is proven only if the plaintiff had an objectively 26 reasonable expectation of seclusion or solitude in the place, conversation or data source.” 27 Shulman v. Grp. W Prods., Inc., 18 Cal.4th 200, 232 (1998). A plaintiff pursuing an 28 invasion of privacy action must have conducted himself or herself in a manner consistent -9- 1 with an actual expectation of privacy, i.e., he or she must not have engaged in conduct 2 which manifests a voluntary consent to the invasive actions of defendant. Hill v. Nat’l 3 Collegiate Athletic Ass’n, 7 Cal.4th 1, 26 (1994). 4 Victor contends that, as a matter of law, an employee has a reasonable expectation of 5 privacy with respect to text messages contained on employer-owned mobile telephones. 6 The decisional authorities cited by Victor, however, are inapposite. In City of Ontario v. 7 Quon, 560 U.S. 746 (2010), a police officer was issued a pager by his police department 8 which was subject to a limit on the number of characters that could be sent and received 9 each month. Id. at 750. After becoming concerned that the officer was repeatedly 10 exceeding his character limit, the police department obtained transcripts of the text 11 messages from the wireless carrier to ascertain whether the texts were work-related or 12 personal. Id. at 750-51. After finding that most of the text messages were not work- 13 related, the police department took disciplinary action against the officer. Id. at 753. The 14 police officer then brought an action under 42 U.S.C. § 1983 against the city, police 15 department and police chief, alleging that the police department’s review of his text 16 messages violated the Fourth Amendment. 17 In the addressing the plaintiff’s Fourth Amendment claim, the United States 18 Supreme Court assumed, without deciding, that the plaintiff had a reasonable expectation 19 of privacy in text messages sent to him on an employer-provided pager; however, the Court 20 ultimately upheld the police department’s review of those messages as reasonable under the 21 Fourth Amendment. Id. at 760. Despite Victor’s suggestion to the contrary, the Supreme 22 Court did not hold that an employee automatically has an expectation of privacy in 23 electronic messages stored on a device provided by his employer. Quon also is 24 distinguishable on its facts. Unlike the police officer in Quon, Victor was no longer an 25 employee of the company that owned the electronic device at issue at the time the invasion 26 of privacy allegedly occurred. Moreover, unlike the police department, which requested 27 transcripts of the text messages from the wireless carrier, Sunbelt is not alleged to have 28 affirmatively undertaken any action to obtain and review the text messages or any other - 10 - 1 electronic data. Rather, the electronic communications appeared on Sunbelt’s iPhone 2 because of actions taken by Victor. 3 Victor’s citation to United States v. Finley, 477 F.3d 250 (5th Cir. 2007) fares no 4 better. In that case, a criminal defendant challenged the denial of his motion to suppress 5 text messages and call records which law enforcement officials had obtained through a 6 warrantless search of his employer-issued cell phone. In addressing the threshold issue of 7 whether the defendant had standing to raise a Fourth Amendment challenge, the Fifth 8 Circuit held that the mere fact that the employer owned the phone and had access to its 9 contents did not ipso facto demonstrate that defendant correspondingly had no expectation 10 of privacy in his call records and text messages. Id. at 259. In reaching its decision, the 11 court specifically noted that the defendant had undertaken precautions to maintain the 12 privacy of data stored on his phone and that he “had a right to exclude others from using the 13 phone.” Id. Unlike the defendant in Finley, Victor was no longer an employee of the 14 company which owned the cell phone to which the subject text messages had been sent. In 15 addition, Victor had no right to exclude others from accessing the Sunbelt iPhone—which 16 he did not own or possess and no longer had any right to access. Moreover, rather than 17 undertake precautions to maintain the privacy of his text messages, Victor did just the 18 opposite by failing to unlink his Sunbelt iPhone from his Apple account, which, in turn, 19 facilitated the transmission of those messages to an iPhone exclusively owned, controlled 20 and possessed by his former employer. 21 Victor’s privacy claim also fails on the ground that he has failed to show an 22 intrusion into a “place, conversation, or matter as to which the plaintiff has a reasonable 23 expectation of privacy.” Hernandez, 47 Cal.4th at 285. As noted, Victor cannot 24 legitimately claim an expectation of privacy in a “place,” i.e., the Sunbelt iPhone, which 25 belongs to his former employer and to which he has no right to access. Nor can Victor 26 claim a reasonable expectation of privacy with respect to his text messages, in general. The 27 pleadings do not identify the contents of any particular text messages, and instead, refer 28 generally to “private electronic data and electronic communications.” Countercl. ¶ 79. - 11 - 1 This and other courts have concluded that there is no “legally protected privacy interest and 2 reasonable expectation of privacy” in electronic messages, “in general.” In re Yahoo Mail 3 Litig., -- F. Supp. 2d --, 2014 WL 3962824, *16 (N.D. Cal. Aug. 12, 2014) (citing cases).3 4 Rather, a privacy interest can exist, if at all, only with respect to the content of those 5 communications. In any event, even if Victor were claiming an expectation of privacy with 6 respect to the specific content of his text messages (which he has not specified), the facts 7 alleged demonstrate that he failed to comport himself in a manner consistent with an 8 objectively reasonable expectation of privacy. By his own admission, Victor personally 9 caused the transmission of his text messages to the Sunbelt iPhone by syncing his new 10 devices to his Apple account without first unlinking his Sunbelt iPhone.4 As such, even if 11 he subjectively harbored an expectation of privacy in his text messages, such expectation 12 cannot be characterized as objectively reasonable, since it was Victor’s conduct that directly 13 caused the transmission of his text messages to Sunbelt in the first instance. See Hill, 14 7 Cal.4th at 26. 15 The above notwithstanding, the facts alleged in Victor’s fifth counterclaim are 16 insufficient to show that Sunbelt intruded into Victor’s privacy in a manner highly 17 offensive to a reasonable person. “Actionable invasions of privacy must be sufficiently 18 serious in their nature, scope, and actual or potential impact to constitute an egregious 19 breach of the social norms underlying the privacy right.” Hill, 7 Cal. 4th at 37. In addition, 20 the plaintiff must show “that the use of plaintiff’s information was highly offensive.” 21 Folgelstrom v. Lamps Plus, Inc., 195 Cal. App. 4th 986, 993 (2011) (emphasis added) 22 (upholding the demurrer to plaintiff’s common law invasion of privacy claim where, 23 3 Victor also does not specify whether his claim is predicated upon text messages sent by him, received by him, or both. With respect to messages he transmitted, there is 25 authority finding that a plaintiff has no reasonable expectation of privacy in messages sent to third parties. See Fetsch v. City of Roseburg, No. 6:11-cv-6343-TC, 2012 WL 6742665, 26 *10 *(D.Or. Dec. 31, 2012) (plaintiff had no expectation of privacy in text messages sent from his phone because relinquished control of them once they were transmitted). 24 27 4 28 Victor vaguely alleges that Sunbelt intercepted his electronic communications. He provides no factual support for this conclusory assertion. See Countercl. ¶ 77. - 12 - 1 finding that even if the customer addresses were obtained through “questionable” means, 2 there was “no allegation that Lamps Plus used the address once obtained for an offensive or 3 improper purpose.”). 4 Here, Victor alleges only that Sunbelt acted in a “highly offensive” manner by 5 “accessing, intercepting, monitoring, reviewing, storing and using [his] post-employment 6 private electronic data and electronic communications without [his] knowledge, 7 authorization or consent as part of an unreasonably intrusive and unauthorized investigation 8 into Victor’s post-employment conduct.” Countercl. ¶ 79. Victor offers no factual support 9 for these conclusory assertions. In particular, he provides no details regarding the specific 10 conduct by Sunbelt that amounts to “accessing, intercepting, monitoring, reviewing, storing 11 and using [his] post-employment private electronic data and electronic communications.” 12 Id. He also fails to aver any facts to establish that Sunbelt’s use of the intercepted 13 communications was highly offensive. See Folgelstrom, 195 Cal. App. 4th at 993. The 14 possibility that Sunbelt may have reviewed text messages sent to a cell phone which it 15 owned and controlled—without more—is insufficient to establish an offensive use. As 16 with his other claims, Victor’s formulaic recitation of an invasion of privacy claim is 17 inconsistent with the federal pleading requirements of Rule 8. This claim is DISMISSED 18 with leave to amend. 19 IV. CONCLUSION 20 For the reasons stated above, 21 IT IS HEREBY ORDERED THAT: 22 1. Plaintiff’s Motion to Dismiss Defendants Counterclaims is GRANTED. 23 2. Defendant shall have twenty-one (21) days from the date this Order is filed to 24 amend his counterclaims, consistent with the Court’s rulings. Defendant is warned that any 25 factual allegations set forth in his amended pleading must be made in good faith and 26 consistent with Rule 11. The failure to timely file the amended counterclaim and/or the 27 failure to comply with this Order will result in the dismissal of all counterclaims with 28 prejudice. - 13 - 1 2 IT IS SO ORDERED. Dated: August 28, 2014 ______________________________ SAUNDRA BROWN ARMSTRONG United States District Judge 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 - 14 -

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?