Low v. Linkedin Corporation
Filing
16
RESPONSE (re 13 MOTION to Dismiss the Complaint; Memorandum of Points and Authorities ) filed byKevin Low. (Reese, Michael) (Filed on 8/1/2011)
1
2
3
4
5
6
7
8
9
Michael R. Reese (State Bar No. 206773)
REESE RICHMAN LLP
875 Avenue of the Americas, 18th Floor
New York, New York 10001
Telephone:
(212) 579-4625
Facsimile:
(212) 253-4272
Email: mreese@reeserichman.com
Sanford P. Dumain
Peter E. Seidman (admitted pro hac vice)
Charles Slidders
Melissa Ryan Clark
MILBERG LLP
One Pennsylvania Plaza, 49th Floor
New York, New York 10119-0165
Telephone:
(212) 594-5300
Facsimile:
(212) 868-1229
Email: pseidman@milberg.com
10
11
Counsel for Plaintiff and the Proposed Class
12
13
14
UNITED STATES DISTRICT COURT
15
NORTHERN DISTRICT OF CALIFORNIA
16
SAN JOSE DIVISION
17
18
KEVIN LOW, individually and on behalf of all
others similarly situated,
19
Plaintiff,
20
Case No. 5:11-cv-01468 LHK
PLAINTIFF'S OPPOSITION TO
DEFENDANT’S MOTION TO DISMISS
THE COMPLAINT
vs.
21
22
ACTION FILED: March 28, 2011
LINKEDIN CORPORATION, a California
Corporation, and Does 1 to 50 inclusive,
23
Defendants.
24
25
26
27
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
Date: September 15, 2011
Time: 1:30 P.M.
Judge: The Hon. Lucy Koh
1
TABLE OF CONTENTS
2
Page
3
INTRODUCTION AND STATEMENT OF FACTS .................................................................. 1
4
ARGUMENT ............................................................................................................................. 4
5
I.
PLAINTIFF HAS ESTABLISHED ARTICLE III STANDING .......................... 4
6
II.
LINKEDIN VIOLATED THE RIGHT TO PRIVACY ARISING FROM
CALIFORNIA’S STATE CONSTITUTION AND COMMON LAW ................. 6
III.
PLAINTIFF HAS ALLEGED A CLAIM FOR UNJUST ENRICHMENT .......... 8
IV.
PLAINTIFF STATES A CLAIM UNDER THE STORED
COMMUNICATIONS ACT................................................................................ 8
7
8
9
10
A.
Provisions of the ECPA ......................................................................... 10
11
B.
The Divulged Information is a “Stored Communication” Under the
SCA ....................................................................................................... 10
C.
LinkedIn Also Operated as a RCS and was Precluded from
Divulging Communications Regardless of Whether they were
“Stored” ................................................................................................. 12
D.
LinkedIn Impermissibly Divulged “Contents” ........................................ 13
12
13
14
15
1.
Plaintiff’s Browsing History Is Also “Content” of a
Communication .......................................................................... 14
3.
17
The User Identification Fits Squarely Within the Definition
of Content .................................................................................. 14
2.
16
Records Cannot Be Disclosed When Accompanied by
Content....................................................................................... 15
18
19
20
E.
21
22
23
V.
LINKEDIN VIOLATED CALIFORNIA CONSUMER PROTECTION
LAWS ............................................................................................................... 18
A.
Plaintiff Has Adequately Pleaded Lost Money or Property for the
Purpose of the UCL and FAL ................................................................. 18
B.
Plaintiff Alleged Reliance for the purpose of UCL and CLRA ............... 20
C.
Plaintiff Properly Alleged UCL Unlawful, Fraudulent, or Unfair
Conduct ................................................................................................. 20
24
25
26
The Third Parties Were Not an “Addressee or Intended Recipient”
of the Divulged Information ................................................................... 17
27
1.
Plaintiff Properly Pleaded UCL Unlawful Conduct ..................... 20
28
2.
Plaintiff Properly Pleaded UCL Fraudulent Conduct................... 20
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-i-
1
2
3.
D.
Plaintiff Properly Pleaded UCL Unfair Conduct ......................... 21
Plaintiff is a Consumer Who Purchased a Service From LinkedIn .......... 22
3
1.
Plaintiff is a “Consumer” under the CLRA ................................. 22
4
2.
LinkedIn is a “Service” under the CLRA .................................... 23
5
E.
Plaintiff Alleged Breach of Contract Damages ....................................... 24
6
F.
LinkedIn Converted Plaintiff’s Property................................................. 24
7
CONCLUSION ........................................................................................................................ 25
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- ii -
1
TABLE OF AUTHORITIES
2
3
4
5
6
7
8
Page(s)
CASES
Ali v. Fasteners for Retail, Inc.,
544 F. Supp. 2d 1064 (E.D. Cal. 2008)................................................................................ 24
Berry v. Am. Express Publ’g, Inc.,
147 Cal. App. 4th 224 (2007) .............................................................................................. 23
Boon Rawd Trading Int’l Co. v. Paleewong Trading Co.,
688 F. Supp. 2d 940 (N.D. Cal. 2010) ............................................................................24, 25
9
10
11
12
13
Camacho v. Auto. Club of S. Cal.,
142 Cal. App. 4th 1394 (2006) ............................................................................................ 21
Columbia Pictures, Inc. v. Bunnell,
245 F.R.D. 443 (C.D. Cal. 2007)......................................................................................... 11
Council of Ins. Agents & Brokers v. Molasky-Arman,
522 F.3d 925 (9th Cir. 2008) ................................................................................................. 4
14
15
16
17
18
Crispin v. Christian Audigier, Inc.,
717 F. Supp. 2d 965 (C.D. Cal. 2010) ................................................................................. 12
Crowley v. CyberSource Corp.,
166 F. Supp. 2d 1263 (N.D. Cal. 2001) ..........................................................................11, 18
Danvers Motor Co. v. Ford Motor Co.,
432 F.3d 286 (3d Cir. 2005) .................................................................................................. 4
19
20
21
22
23
24
25
26
27
Davis v. Passman,
442 U.S. 228 (1979).............................................................................................................. 5
Doe 1 v. AOL LLC,
719 F. Supp. 2d 1102 (N.D. Cal. 2010) ..........................................................................19, 20
Drum v. San Fernando Valley Bar Ass’n,
182 Cal. App. 4th 247 (2010) .............................................................................................. 21
Fairbanks v. Super. Ct.,
46 Cal. 4th 56 (2009) .......................................................................................................... 23
Ferrington v. McAfee, Inc.,
No. 10-1455, 2010 WL 3910169 (N.D. Cal. Oct. 5, 2010)................................................... 23
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- iii -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Folgelstrom v. Lamps Plus Inc.,
195 Cal. App. 4th 986 (2011) ................................................................................................ 7
Forsher v. Bugliosi,
26 Cal. 3d 792 (1980) ......................................................................................................... 22
Fraser v. Nationwide Mut. Ins. Co.,
352 F.3d 107 (3d Cir. 2003) ................................................................................................ 18
Gilmore v. Union Pac. R.R. Co.,
No. 09-2180, 2009 U.S. Dist. LEXIS 111740 (E.D. Cal. Dec. 1, 2009) ................................. 8
Hill v. MCI WorldCom Commcn’s, Inc.,
120 F. Supp. 2d 1194 (S.D. Iowa 2000) .............................................................................. 16
Hill v. NCAA,
865 P.2d 633 (Cal. 1994) ................................................................................................ 7, 24
In re DoubleClick Inc. Privacy Litig.,
154 F. Supp. 2d 497 (S.D.N.Y. 2001)...............................................................................................6
In re Facebook Privacy Litig.,
No. 10-02389, 2011 WL 2039995 (N.D. Cal. May 12, 2011) ......................................... 4, 17
Jenkins v. McKeithen,
395 U.S. 411 (1969).............................................................................................................. 4
Jessup-Morgan v. America Online, Inc.,
20 F. Supp. 2d 1105 (E.D. Mich. 1998) ............................................................................... 16
17
18
19
20
21
Konop v. Hawaiian Airlines, Inc.,
302 F.3d 868 (9th Cir. 2002) ........................................................................................... 8, 11
Krottner v. Starbucks Corp.,
628 F.3d 1139 (9th Cir. 2010) ............................................................................................... 5
La Court v. Specific Media, Inc.,
No. 10-1256, 2011 WL 2473399 (C.D. Cal. Apr. 28, 2011) .................................................. 6
22
23
24
25
26
Lungren v. Deukmejian,
45 Cal. 3d 727 (1988) ........................................................................................................... 7
Meaunrit v. ConAgra Foods Inc.,
No. 09-2220, 2010 WL 2867393 (N.D. Cal. July 20, 2010)................................................... 5
NAACP v. State of Alabama,
357 U.S. 449 (1958).............................................................................................................. 7
27
28
Pisciotta v. Old Nat’l Bancorp,
499 F.3d 629 (7th Cir. 2007) ............................................................................................. 5, 6
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- iv -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Quintero Family Trust v. OneWest Bank, F.S.B.,
No. 09-1561, 2010 WL 392312 (S.D. Cal. Jan. 27, 2010).................................................... 20
Robins v. Spokeo, Inc.,
No 10-5306, 2011 WL 597867 (C.D. Cal. Jan. 27, 2011) ...................................................... 6
Ruiz v. Gap, Inc.,
540 F. Supp. 2d 1121 (N.D. Cal. 2008) ................................................................................. 7
S. Bay Chevrolet v. Gen. Motors Acceptance Corp.,
72 Cal. App. 4th 861 (1999)................................................................................................ 20
Sanchez v. Bear Stearns Residential Mortg. Corp.,
No. 09-2056, 2010 WL 1911154 (S.D. Cal. May 11, 2010)................................................. 20
Shin v. BMW of N. Am.,
No. 09-0398, 2009 U.S. Dist. LEXIS 67994 (C.D. Cal. July 16, 2009) ..................................... 19
SOAProjects, Inc. v. SCM Microsystems, Inc.,
No. 10-1773, 2010 U.S. Dist. LEXIS 133596 (N.D. Cal. Dec. 7, 2010)................................. 8
Taus v. Loftus,
40 Cal. 4th 683 (2007) .......................................................................................................... 8
United States v. Councilman,
418 F.3d 67 (1st Cir. 2005) ................................................................................................. 12
United States v. Davis,
Crim. No. 10-339, 2011 WL 2036463 (D. Or. May 24, 2011) ............................................. 15
United States v. Forrester,
512 F.3d 500 (9th Cir. 2008) .................................................................................... 14, 15, 16
20
Vess v. Ciba-Geigy Corp. U.S.A.,
317 F.3d 1097 (9th Cir. 2003) ............................................................................................. 21
21
STATUTES
22
18 U.S.C. § 2510(8).................................................................................................................. 13
23
18 U.S.C. § 2510(12) ................................................................................................................ 10
24
18 U.S.C. § 2510(15) ................................................................................................................ 10
25
18 U.S.C. § 2510(17) ................................................................................................................ 11
26
27
18 U.S.C. § 2702 .................................................................................................................17, 18
18 U.S.C. § 2702(a)(1) ............................................................................................................. 10
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-v-
1
18 U.S.C. § 2702(a)(2) .................................................................................................. 10, 12, 18
2
18 U.S.C. § 2702(a)(3) ............................................................................................................. 15
3
18 U.S.C. § 2702(c)(1) ............................................................................................................. 18
4
18 U.S.C. § 2711(2).................................................................................................................. 10
5
6
Cal. Civ. Code 1761(b) ............................................................................................................. 23
Cal. Civ. Code 1770(a) ............................................................................................................. 22
7
Cal. Civ. Code §1760 (West 2009) ........................................................................................... 24
8
9
10
Cal. Civ. Code § 1761(d) .......................................................................................................... 22
California Civil Code Section 1750 .......................................................................................... 20
11
OTHER AUTHORITIES
12
1986 U.S.C.C.A.N. 3555 .......................................................................................................... 13
13
13A Charles Alan Wright, Arthur R. Miller, et al., Federal Practice and Procedure
§ 3531.4 (3d ed. 2011) .......................................................................................................... 4
14
15
Federal Trade Commission Preliminary Staff Report, Protecting Consumer Privacy in an
Era of Rapid Change (Dec. 2010) ......................................................................................... 2
16
H.R. Rep. No. 99-647 (1986) ......................................................................................... 11, 14, 15
17
Ian C. Ballon, 1 E-Commerce & Internet Law § 26.01 (2010) ..................................................... 3
18
19
John T. Soma, et al., Corporate Privacy Trend: The “Value” of Personally Identifiable
Information (“PII”) Equals the “Value” of Financial Assets, 15 Rich. J.L. & Tech.
11 (2009) ............................................................................................................................ 19
20
21
22
23
24
Luiz Salazar, Privacy And Bankruptcy Law, Part I: Technology Explosion Creates
Personal Privacy Tension, Am. Bankr. Inst. J. (Nov. 2006) ................................................ 19
Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s
Guide to Amending It, 72 Geo. Wash. L. Rev. 1208 (Aug. 2004) ...................................12, 13
Orin S. Kerr, Internet Surveillance Law After the USA Patriot Act:
The Big Brother That Isn’t, 97 Nw. U. L. Rev. 607 (2003) .................................................. 13
25
Pamela Jones Harbour, FTC Roundtable Series I on Exploring Privacy (Dec. 7, 2009) ............. 19
26
27
Paul M. Schwartz, Property, Privacy, and Personal Data,
117 Harv. L. Rev. 2055 (May 2004).................................................................................... 19
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- vi -
1
2
Richard S. Murphy, Property Rights in Personal Information: An Economic Defense of
Privacy, 84 Geo. L.J. 2381 (July 1996) ............................................................................... 19
3
S. Rep. No. 99-541 (1986), reprinted in 1986 U.S.C.C.A.N. 3555 .............................................. 9
4
Thorsten Holz, et al., Learning More About the Underground Economy: A Case Study of
Keyloggers and Dropzones, University of Mannheim, Laboratory for Dependable
Systems (2008) .................................................................................................................. 19
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- vii -
1
Plaintiff Kevin Low (“Plaintiff”) respectfully submits the following in opposition to the
2
motion to dismiss filed by defendant LinkedIn Corp. (“Defendant”). Defendant’s motion is without
3
merit and should be denied.
4
INTRODUCTION AND STATEMENT OF FACTS
5
Consumers who use the Internet have a right to privacy and expect that businesses (and the
6
government) are not watching their every move. This right to privacy is so important that it is
7
protected by California’s Constitution, federal law, common law, and the state consumer
8
protection statutes at issue here. Consumers use the Internet, often from the sanctity of their own
9
homes, to seek advice on personal and sensitive matters such as abortion, hemorrhoids, sexually
10
transmitted disease, drug rehabilitation, or care for the elderly, to search for jobs, seek out new
11
romantic partners, engage in political activity; in fact, to do more or less anything. Consumers do
12
not expect this information to be broadcast to complete strangers.
13
LinkedIn is a web-based social networking site that allows consumers to share career
14
information about themselves and to “link” to one another via e-mail and instant messaging
15
services. Unfortunately for LinkedIn users, Defendant secretly shares personal information that
16
Plaintiff and other LinkedIn users have not chosen to share with complete strangers, thereby
17
violating the users’ right to privacy. Defendant does this to increase its profits at the expense of its
18
consumers.
19
Specifically, upon sign-up, LinkedIn assigns each consumer a unique User Identification
20
number (“User Identification”) that is associated with the consumer’s name. ¶¶ 14-19.1 LinkedIn is
21
configured such that every time a link or advertisement appears on the consumer’s LinkedIn
22
webpage, the User Identification is disclosed to third-parties (advertisers, data aggregators, and the
23
like) along with the consumer’s Internet search history as recorded by secret tracking devices that
24
third parties place on the consumers’ computer.
25
When a user clicks a link on a LinkedIn webpage, LinkedIn sends an “HTTP Referrer”
26
header which sends information about where the click is coming from, including what precise
27
28
1
“¶_” are references to the paragraphs of the complaint filed on March 28, 2011 (Dkt. 1).
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-1-
1
URL2 (web page) the consumer was viewing at the time of the click. ¶ 16. Unbeknownst to users,
2
LinkedIn explicitly includes users’ User Identification as a “URL parameter,” allowing the third
3
party to identify the user. Id. In addition, because LinkedIn’s URLs contain the User Identification
4
of the member whose profile is being viewed, the third party is also able to ascertain which
5
LinkedIn member’s profile the user was viewing when the click was made. Id. This process allows
6
online marketers and other data aggregators frightening access to the most intimate details of the
7
users’ lives—allowing third parties to connect personal, specific identities with the users’ browsing
8
histories.
9
LinkedIn engages in this conduct because the personal information at issue here is a
10
valuable commodity, sold in the marketplace. ¶¶ 20-23. Multiple marketers have touted the high
11
market value of this information in targeting consumers based on the data mined from their
12
computers and mobile devices, giving credence to the statement that “the more information that is
13
known about a consumer, the more a company will pay to deliver a precisely-targeted
14
advertisement to him.” Federal Trade Commission Preliminary Staff Report, Protecting Consumer
15
Privacy in an Era of Rapid Change (Dec. 2010), at 24 (“FTC Report”). ¶ 21.
16
One data aggregator, Audience Science, states that its work involves “recording billions of
17
behavioral events daily and reaching over 385 million unique Internet users” and then making such
18
data available to its clients: “web publishers, marketers, networks, exchanges, and agencies[,] to
19
create intelligent audience segments to connect people with relevant advertising driving the
20
transition to data-driven audience marketing online.” ¶ 21.
21
On March 7, 2011, the Wall Street Journal published an article under the headline,
22
“Web’s Hot New Commodity: Privacy,” in which it highlighted a company called Allow Ltd.,
23
one of nearly a dozen companies that offer to sell people’s personal information on their behalf,
24
and pay 70% of the sale proceeds to the individual. One Allow Ltd. customer received payment
25
of $8.95 for letting Allow tell a credit-card company he was shopping a new credit card. Id.
26
27
28
2
A URL is a Uniform Resource Identifier that specifies where a known resource is available and
the mechanism for retrieving it.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-2-
1
Defendant’s motion to dismiss is based on two arguments, both of which are wrong. First,
2
Defendant argues that it is only disclosing “a non-sensitive number randomly assigned to plaintiff
3
by LinkedIn.” As alleged in the Complaint, however, expert studies have shown first and last
4
names and other personal information (including address, sexual orientation, and income level) can
5
be easily and quickly determined from User Identification numbers. Accordingly, because of
6
Defendant’s conduct, third-parties who are complete strangers to the consumer can link the
7
consumer name with that person’s search history, revealing sensitive and potentially embarrassing
8
information.
9
Second, Defendant argues that even if additional personal information is being disclosed,
10
such personal information is not “property,” money, or otherwise of value. In fact, the personal
11
information at issue in this case is part of a robust, monetized commerce that is worth hundreds of
12
millions of dollars. By collecting personal information from the computers and mobile devices,
13
“Websites and stores can, therefore, easily buy and sell information on visitors with the intention
14
of merging behavioral with demographic and geographic data in ways that will create social
15
categories that advertisers covet and target with ads tailored to them or people like them.” ¶ 20
16
(quoting Joseph Turow, et al., Americans Reject Tailored Advertising and Three Activities that
17
Enable It (Sept. 29, 2009), available at http://ssrn.com/abstract=1478214). Similarly, “Internet
18
merchants may obtain a great deal of valuable marketing information from visitors who merely
19
window-shop at their electronic storefronts. . . . This data may also be licensed or sold to third
20
parties.” Ian C. Ballon, 1 E-Commerce & Internet Law § 26.01, at 26-7 (2010).
21
Thus, LinkedIn strips individuals of the common law and constitutional right to control
22
the personal information they reveal about themselves and to whom they reveal it. It also
23
improperly obtains and divulges personal and embarrassing information to data aggregators who
24
treat such information as a commodity that is valued by reference to a robust market.
25
Accordingly, Defendant’s motion to dismiss must be denied.
26
27
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-3-
1
2
ARGUMENT
I.
PLAINTIFF HAS ESTABLISHED ARTICLE III STANDING
3
Article III standing derives from separation of powers doctrine and is intended to prevent
4
the judiciary from encroaching on the other branches by deciding political issues of general
5
applicability. To this end, Article III standing limits the court’s subject matter jurisdiction to cases
6
or controversies that are “justiciable,” that is, arising from a constitutional, statutory or common
7
law violation of an individual right and, as such, capable of being appropriately decided by
8
resolution of the particular case or controversy before the court, as opposed to issues that are
9
political, the resolution of which are generally applicable, and properly decided by the other
10
branches. See 13A Charles Alan Wright, Arthur R. Miller, et al., Federal Practice and Procedure
11
§ 3531.4 (3d ed. 2011) (“The choice is made between the importance of having the issues decided
12
by the courts and the importance of leaving the issues for resolution by other means.”).
13
Hence, the “standing question . . . is whether the constitutional or statutory provision on
14
which the claim rests properly can be understood as granting persons in the plaintiff’s position a
15
right to judicial relief.” In re Facebook Privacy Litig., No. 10-02389, WL 2039995, at *4 (N.D.
16
Cal. May 12, 2011) (Ware, J.) (internal quotations and citations omitted) (holding that plaintiffs
17
had standing); see also Jenkins v. McKeithen, 395 U.S. 411, 423 (1969) (“In this sense, the concept
18
of standing focuses on the party seeking relief, rather than on the precise nature of the relief
19
sought.”).
20
As the United States Supreme Court has held: “[i]njury-in-fact is not Mount Everest.”
21
Danvers Motor Co. v. Ford Motor Co., 432 F.3d 286, 294 (3d Cir. 2005). To the contrary, it
22
suffices for federal standing purposes to allege some specific, “identifiable trifle” of injury. Id.; See
23
Council of Ins. Agents & Brokers v. Molasky-Arman, 522 F.3d 925, 932 (9th Cir. 2008) (in
24
affirming the plaintiff’s standing, the Ninth Circuit court noted that the U.S. Supreme Court “has
25
allowed important interests to be vindicated by plaintiffs with no more at stake in the outcome of
26
an action than a fraction of a vote, a $5 fine and costs, and a $1.50 poll tax . . . . ‘The basic idea
27
that comes out in numerous cases is that an identifiable trifle is enough to fight out a question of
28
principle; the trifle is the basis for standing and the principle provides the motivation.’”)
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-4-
1
(emphasis added). Here, where constitutional protected rights to privacy have been violated,
2
Plaintiff’s alleged injuries are certainly more than such a “trifle.” ¶¶ 1-2; 20-23.
3
The determination of whether a plaintiff has standing is separate and preliminary to the
4
issue of whether the plaintiff pleaded a cause of action. Meaunrit v. ConAgra Foods Inc., No. 09-
5
2220, 2010 WL 2867393, at *4 (N.D. Cal. July 20, 2010) (“While [defendant] may indeed be
6
correct that there is no cognizeable cause of action in this case - i.e., there was no actionable
7
misrepresentation - this is not the same thing as finding the plaintiff lacks standing. Plaintiff
8
alleges an injury, and alleges that it was caused by defendant’s actions. Asking whether or not she
9
has a legally cognizable claim is not the same thing as asking whether she has suffered an
10
injury in fact.”) (emphasis added). See also Davis v. Passman, 442 U.S. 228, 239 n.18 (1979)
11
(court of appeals improperly confused the question of standing with the question of whether
12
plaintiff had a cause of action). Sufficiently alleging injury in fact creates a justiciable issue that
13
allows the court to advance to the merits inquiry.
14
Plaintiff’s allegations of personal injury arising from LinkedIn’s misconduct raise a
15
justiciable issue that the court has subject matter jurisdiction to decide. There is no constitutional
16
or factual basis for depriving Plaintiff access to this Court, the only venue for resolution available
17
to them. The best Defendant can do in the face of these well-established principles is to ignore
18
allegations that run counter to its argument. Def. Br. at 6-8. In fact, the Complaint alleges, with
19
specificity, legal harm sufficient to confer standing. ¶¶ 1-2, 20-23.
20
The recent Ninth Circuit case of Krottner v. Starbucks Corp., 628 F.3d 1139 (9th Cir.
21
2010), is on point here. In Krottner, plaintiffs alleged that Starbucks had violated their privacy in
22
that it failed to encrypt personal information regarding plaintiffs on a company laptop that was
23
stolen from a Starbucks store. Defendant moved to dismiss, arguing that the plaintiffs did not have
24
Article III standing. The Ninth Circuit rejected this argument, stating: “we hold that Plaintiffs-
25
Appellants, whose personal information has been stolen but not misused, have suffered an injury
26
sufficient to confer standing under Article III, Section 2 of the U.S. Constitution.” Id. at 1140; see
27
also Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629, 634 (7th Cir. 2007) (reasoning that person who
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-5-
1
had his private information taken without plaintiff’s permission, but not misused, had standing
2
under Article III).
3
Hence, under the governing authority of Krottner, Plaintiff clearly has Article III
4
standing. Accordingly, Defendant’s argument to the contrary should be denied.3
5
II.
6
LINKEDIN VIOLATED THE RIGHT TO PRIVACY ARISING FROM
CALIFORNIA’S STATE CONSTITUTION AND COMMON LAW
7
Defendant tries to trivialize the effects of LinkedIn’s invasion of privacy by suggesting that
8
it is nothing more than disclosure of Plaintiff’s LinkedIn User Identification, which Defendant
9
describes as a “a non-sensitive number randomly assigned to plaintiff by LinkedIn.” Def. Br. at 20.
10
The Complaint, however, clearly alleges not just that LinkedIn’s invasion of privacy is far more
11
serious than disclosure of a User Identification, but also that it amounts the very type of “serious”
12
invasion of privacy that Article 1, Section 1 of California’s Constitution, as amended, was intended
13
to prevent.
14
It was voters who were alarmed that “[c]omputerization of records makes it possible to
15
create ‘cradle-to-grave’ profiles on every American” and believing that such “data collecting is
16
threatening to destroy our traditional freedom” who amended California Constitution’s Article 1,
17
Section 1 (“the Privacy Initiative”) to recognize a right to privacy. Official Ballot Pamphlet at 26.
18
19
20
21
22
23
24
25
26
27
28
3
Defendant’s reliance on La Court v. Specific Media, Inc., No. 10-1256, 2011 WL 2473399 (C.D.
Cal. Apr. 28, 2011), is misplaced. (Def. Br. at 7). Unlike Plaintiff here, the Specific Media
plaintiffs referred to a host of facts, including facts pertaining to the value of their personal
information, “not contained in their [c]omplaint at all.” Id. at *4 (emphasis added). An amended
complaint was filed shortly after the dismissal without prejudice and took into account the
admonitions of the Court, which in no way foreclosed the possibility of such theories of harm
giving rise to Article III standing. The Specific Media Court recognized the viability in the abstract
of such concepts as “opportunity costs,” “value-for-value exchanges,” “consumer choice,” and
other concepts referred to in plaintiffs’ opposition brief, and therefore allowed the plaintiffs to
amend their complaint. Id.; see also id. at *6 (“It is not obvious that [p]laintiffs cannot articulate
some actual or imminent injury in fact”).
Defendant’s citation to Robins v. Spokeo, Inc., No 10-5306, 2011 WL 597867, at *1 (C.D. Cal.
Jan. 27, 2011) (Def. Br. at 7), is also inapposite because, as Defendant acknowledges, id., that case
dealt with concern that defendant’s website would adversely affect him in future, whereas Plaintiff
in this case alleges past, current and ongoing injury. LinkedIn’s reliance on the non-binding case of
In re DoubleClick Inc. Privacy Litigation, 154 F. Supp. 2d 497 (S.D.N.Y. 2001) (Def. Br. at 7), is also
misplaced because the DoubleClick court did not analyze the issue of standing.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-6-
1
This Court should interpret the Privacy Initiative to give effect to the intent of California voters,
2
which was expressed in the Privacy Initiative as follows:4
The principal focus of the Privacy Initiative is readily discernable. The Ballot
Argument warns of unnecessary information gathering, use and dissemination by
public and private entities -- images of “government snooping,” computer stored
and generated “dossiers” and “‘cradle-to-grave’ profiles on every American”
dominate the framers’ appeal to the voters.… The evil addressed is … business …
“collecting and stockpiling unnecessary information … and misusing information
gathered for one purpose in order to serve other purposes or to embarrass …”
3
4
5
6
7
8
Hill v. NCAA, 865 P.2d 633, 645 (Cal. 1994) (quoting Official Ballot Pamphlet at 26-27). Plaintiff
9
alleges that LinkedIn knowingly linked its users’ identifications to secret tracking devicess,
10
thereby enabling the “collecting and stockpiling” of personal information, not submitted for that
11
purpose, to create “dossiers” about the Plaintiff and Class Members for sale to marketers. This is
12
the precisely the type of conduct California voters intended to prevent.5
13
Defendant’s reliance on Ruiz v. Gap, Inc., 540 F. Supp. 2d 1121 (N.D. Cal. 2008) and
14
Folgelstrom v. Lamps Plus Inc., 195 Cal. App. 4th 986 (2011), and Hill, supra, is misplaced. Def.
15
Br. at 20. Those cases involved disclosure of a single piece of unlinked information (social security
16
numbers or ZIP codes). In contrast, LinkedIn has disclosed its users’ identifications in conjunction
17
with their browsing history, thereby enabling third parties to “stockpile” information about the
18
user’s most personal habits and preferences (derived from their browsing history) and create the
19
type of personal “dossier” the Privacy Initiative was intended to prevent.6
20
4
21
22
23
24
25
26
27
28
See Lungren v. Deukmejian, 45 Cal. 3d 727, 740 n.14 (1988) (“The rule that the ballot pamphlet
is an important aid in determining the intent of the voters in adopting a constitutional amendment
or statute is too well settled to require extensive citation of authority.”).
5
If the Court questions the “seriousness” of LinkedIn’s conduct, it should consider its
ramifications. For instance, the voters of California intended that the right to privacy also protect
“our freedom to associate with the people we choose.” Official Ballot Pamphlet at 28. The
Supreme Court has also “recognized the vital relationship between freedom to associate and
privacy in one’s associations.” NAACP v. State of Alabama, 357 U.S. 449, 462 (1958)
(“Inviolability of privacy in group association may in many circumstances be indispensable to
preservation of freedom of association, particularly where a group espouses dissident beliefs.”).
Here, LinkedIn is disclosing a User Identification connected to a web browsing history that may
disclose information about the users’ associations, including membership in, or an interest in,
dissident groups.
6
Defendant’s contention with respect to the common law invasion of privacy claim, that its
conduct is not “highly offensive to a reasonable person,” also is unavailing. It goes without
saying that a reasonable person would be highly offended by somebody eavesdropping on their
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-7-
1
III.
PLAINTIFF HAS ALLEGED A CLAIM FOR UNJUST ENRICHMENT
2
LinkedIn asserts that Plaintiff’s unjust enrichment claim should be dismissed because
3
“there is no independent cause of action for unjust enrichment in California.” Def. Br. at 24. This
4
Court, however, has recently noted that although it is “technically true” that there is no cause of
5
action for unjust enrichment in California, “courts have held that unjust enrichment is equivalent
6
to restitution and have allowed litigants to seek restitution using an unjust enrichment claim.”
7
SOAProjects, Inc. v. SCM Microsystems, Inc., No. 10-1773, 2010 U.S. Dist. LEXIS 133596, at
8
*24-25 (N.D. Cal. Dec. 7, 2010) (Koh, J.) (internal citations omitted).
9
Defendant’s assertion that the unjust enrichment claim should be dismissed because the
10
Plaintiff also alleges a breach of an express contract, Def. Br. at 24, is meritless. As this Court
11
noted, “restitution may be awarded in lieu of breach of contract damages when the parties had an
12
express contract, but it was procured by fraud or is unenforceable or ineffective for some
13
reason.” SOAProjects, 2010 U.S. Dist. LEXIS 133596, at *25 (internal quotations omitted).
14
Accordingly, the motion to dismiss the unjust enrichment claim should be denied.
15
IV.
PLAINTIFF STATES A CLAIM UNDER THE STORED COMMUNICATIONS ACT
16
Defendant attempts to escape liability for its misconduct by taking advantage of the
17
technical complexities of the Electronic Communications Privacy Act (“ECPA”) and the Stored
18
Communications Act (“SCA” or the “Act”). See Konop v. Hawaiian Airlines, Inc., 302 F.3d 868,
19
874 (9th Cir. 2002) (“[T]he intersection of [the Wiretap and Stored Communications Acts] ‘is a
20
complex, often convoluted area of law.’ . . . Courts have struggled to analyze problems involving
21
modern technology within the confines of this statutory framework . . .”) (citations omitted). In
22
23
24
25
26
27
28
Internet browsing, an activity that is often conducted in the privacy of one’s home and behind
closed doors, on a computer that is password protected, or on mobile devices—perhaps also
password protected and, in all cases, inaccessible to public view.
In any event, whether LinkedIn’s conduct is “highly offensive” or a serious invasion of privacy
involves factual issues not ordinarily decided on a motion to dismiss. See Gilmore v. Union Pac.
R.R. Co., No. 09-2180, 2009 U.S. Dist. LEXIS 111740, at *22-23 (E.D. Cal. Dec. 1, 2009)
(“Whether plaintiff had a reasonable expectation of privacy in the circumstances and whether
defendant’s conduct constituted a serious invasion of privacy are mixed questions of law and
fact.”); Taus v. Loftus, 40 Cal. 4th 683, 737 (2007) (“The question remains whether a trier of fact
properly could determine that the alleged conduct here at issue constituted ‘highly offensive
conduct’ that can be the basis for tort liability”).
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-8-
1
enacting the SCA, however, the Senate made clear its intention to protect users’ communications
2
as technology evolved, stating: “the law must advance with technology” to avoid “promot[ing]
3
the gradual erosion of this precious right [to privacy].” S. Rep. No. 99-541, at 5 (1986), reprinted
4
in 1986 U.S.C.C.A.N. 3555, 3559. Despite this express intention, Defendant argues for dismissal
5
of Plaintiff’s SCA claim. However, as seen below, Defendant’s arguments are in error and
6
should be denied.
7
First, LinkedIn presents a tortured interpretation of the SCA that would effectively nullify
8
the statute—a result Congress obviously never intended. It argues that any communication that is
9
wrongfully divulged via a transmission is outside of the scope of the SCA, because the SCA only
10
applies to stored communications, not transmissions. Def. Br. at 9-10. That argument would render
11
the SCA meaningless, as all communications under the SCA must somehow be “divulged,” i.e.,
12
shared with a third party via a transmission. Furthermore, Defendant’s arguments regarding
13
electronic storage ignore Plaintiff’s allegations that LinkedIn functions not only as an “electronic
14
communications service” (ECS), which can be held liable for divulging communications that are
15
“stored” by the provider, but also as a “remote computing service” (RCS), for which liability
16
attaches when the provider divulges communications that it “carried or maintained.”
17
Second, LinkedIn denies that any of the divulged information qualifies as “contents” of the
18
communication. “Contents,” however, are defined broadly by the ECPA, and include any data or
19
information that goes to the “substance, meaning, or purport” of a communication. In light of the
20
context alleged here, wherein third party advertisers and data aggregators are using users’
21
information to create demographic profiles and monitor web use patterns, the identity of the user is
22
the exact “substance” or “meaning” that the third parties hope to attain. Moreover, Defendant does
23
not even address the alleged disclosure of Plaintiff’s last-viewed page, which is undoubtedly the
24
“content” of a communication.
25
Third, LinkedIn argues that, as the service provider for the communications, it was
26
permitted to access the stored communications. Def. Br. at 10-11. LinkedIn, however, did not
27
merely access communications, it wrongfully divulged them to third parties.
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
-9-
1
Finally, Defendant claims, speciously, that the third parties were “addressees or intended
2
recipients” of Plaintiff’s personal information. Plaintiff, however, did not know this information
3
was being divulged, let alone did he “address” or “intend” to disclose the information to third
4
parties. LinkedIn’s implication that the third parties are “addressees or intended recipients”
5
because LinkedIn, not Plaintiff, intended to send them the divulged information assumes that
6
Plaintiff is to have no effective control over what information he sends to whom. Such a reading is
7
clearly contradictory to the entire purpose and intent (as well as the plain language) of the SCA,
8
which plainly prohibits service providers from divulging users’ information.
9
For these reasons, as discussed in detail herein, Plaintiff’s SCA claim must be upheld.
10
A.
11
The ECPA protects electronic communications from interception during transfer (via Title
12
I, the Wiretap Act) and from unauthorized access or disclosure (via Title II, the SCA). The SCA,
13
the portion of the ECPA applicable here, prohibits ECSs, which provide “the ability to send or
14
receive wire or electronic communications,” 18 U.S.C. § 2510(15), from divulging “the contents of
15
a communication while in electronic storage,” 18 U.S.C. § 2702(a)(1) (emphasis added). An RCS,
16
which provides “computer storage or processing services by means of an electronic
17
communications system,” 18 U.S.C. § 2711(2), is prohibited from divulging “the contents of any
18
communication which is carried or maintained on that service . . . ,” 18 U.S.C. § 2702(a)(2)
19
(emphasis added). “[E]lectronic communication[s]” are defined broadly under the ECPA to extend
20
beyond e-mails and other messages and include “any transfer of signs, signals, writing, images,
21
sounds, data, or intelligence of any nature . . . .” 18 U.S.C. § 2510(12).
Provisions of the ECPA
22
B.
23
Defendant attempts to evade liability under the SCA by contending that “the [SCA]
24
protects only electronic communications held in storage” and not the alleged “transmissions of
25
data,” for which Defendant claims the Wiretap Act would apply. Def. Br. at 9 (emphasis in
26
original). But “electronic storage” includes even the “temporary [or] intermediate storage” of a
27
communication that is “incidental to the electronic transmission thereof,” as well as storage for
28
“backup protection.” 18 U.S.C. § 2510(17). Congress specifically disavowed any “inten[tion] to
The Divulged Information is a “Stored Communication” Under the SCA
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 10 -
1
limit the term[] ‘electronic storage’. . . to any particular medium of storage.” H.R. Rep. No. 99-
2
647, at 39 (1986).
3
The divulged communications did not, as Defendant seems to suggest, exist in some
4
ethereal location in “cyber space.” The User Identification and last-viewed page were stored on
5
LinkedIn’s servers and/or carried on its network7--a fact which Defendant does not deny. LinkedIn
6
acknowledges in its prospectus that it stores information, stating: “Our solutions involve the
7
storage and transmission of members’ and customers’ information, some of which may be private,
8
and security breaches could expose us to a risk of loss of this information, which could result in
9
potential liability and litigation.” LinkedIn Corp., Prospectus (Form 424B4) (May 18, 2011) at 14
10
(emphasis added). Moreover, Defendant’s own authority (Def. Br. at 9) makes clear that that the
11
communications were divulged while “in storage.” See Columbia Pictures, Inc. v. Bunnell, 245
12
F.R.D. 443, 450 (C.D. Cal. 2007) (“The Ninth Circuit has held that the Wiretap Act applies only to
13
‘acquisition contemporaneous with transmission[.]’. . . Communications are in ‘electronic storage’
14
under the SCA, and outside the scope of the Wiretap Act, even where the storage is transitory and
15
lasts for only a few seconds.”) (citations omitted).
16
In the face of this authority, the SCA’s plain language, and its own admission in its
17
prospectus, Defendant fixates on Plaintiff’s allegation that LinkedIn wrongfully “transmitted” user
18
information to third parties. Def. Br. at 9. But the Complaint alleges the “transmission” of
19
information only insofar as LinkedIn improperly sent or divulged user information to third parties.
20
See ¶¶ 2, 15-18. The Complaint makes no allegations that this information was “intercepted,” but
21
instead alleges that LinkedIn divulged the contents of communications already in its possession.8
22
7
23
24
25
26
27
28
See Konop, 302 F.3d at 874, 876, 879 n.6 (“A website consists of electronic information stored
by a hosting service computer or ‘server’”; “website owners . . . transmit electronic documents to
servers, where the documents are stored. If a user wishes to view the website, the user requests that
the server transmit a copy of the document to the user’s computer”; “electronic communications
are stored at various junctures in various computers between the time the sender types the message
and the recipient reads it.”).
8
See, e.g., Crowley v. CyberSource Corp., 166 F. Supp. 2d 1263, 1269 (N.D. Cal. 2001) (finding
that the electronic communication did not fall within the Wiretap Act because “[the user] sent
certain information to [the service provider], which then conveyed it to [a third party]. . . . [The
service provider] did not, however, ‘intercept’ the communication within the meaning of the
Wiretap Act, because [the Service Provider] did not acquire it using a device other than the drive
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 11 -
1
Courts have expressly rejected Defendant’s suggestion that documents are not “in storage” pre- or
2
post-transmission.9 The SCA would have no effect if every communication that was divulged via
3
transmission fell outside of its scope.10
4
C.
5
LinkedIn Also Operated as a RCS and was Precluded from Divulging
Communications Regardless of Whether they were “Stored”
6
Even if LinkedIn prevailed on its argument that the communications it divulged were not in
7
“electronic storage,” it would not be relieved of SCA liability because Plaintiff also alleges that
8
LinkedIn is an RCS (¶ 43),11 as to which the “electronic storage” requirement is inapplicable.
9
Rather, an RCS can be held liable for divulging communications which it “carried or maintained,”
10
if “received by means of electronic transmission . . . solely for the purpose of providing storage or
11
computer processing services . . . .” 18 U.S.C. § 2702(a)(2) (emphasis added). The
12
communications here were transmitted to, and carried by, LinkedIn for the purpose of providing
13
14
15
16
17
18
19
20
21
22
or server on which the e-mail was received.” Also, reiterating the Ninth Circuit’s position that
“some storage is essential to communication via e-mail.”).
9
See, e.g., United States v. Councilman, 418 F.3d 67, 77-78, 79 (1st Cir. 2005) (finding, in context
of the Wiretap Act: “Congress sought to ensure that the messages and by-product files that are left
behind after transmission, as well as messages stored in a user’s mailbox, are protected from
unauthorized access. . . . [I]t appears that Congress had in mind these types of pre- and posttransmission ‘temporary, intermediate storage of a wire or electronic communication incidental to
the electronic transmission thereof,’ see 18 U.S.C. § 2510(17), when it established the definition of
‘electronic storage.’ Its aim was simply to protect such data.”) (citing, e.g., In re Pharmatrak, Inc.
Privacy Litig., 329 F.3d 9, 21 (1st Cir. 2003) (a rigid ‘storage-transit dichotomy ... may be less
than apt to address current problems.’”) (other citations omitted)).
10
Under Defendant’s reading, the only way that the SCA could ever apply would be if the service
provider divulged the communication by allowing an in-person view of its computer screen, or
perhaps by printing a hard copy of the communication.
11
23
24
25
26
27
28
LinkedIn operates as both an ECS and an RCS because it offers private messaging services, like
an ECS, as well as public posting abilities and biographical data storage, like an RCS. ¶¶ 42, 43.
See, e.g., Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965, 990 (C.D. Cal. 2010) (noting
that private mail and messaging falls with the scope of an ECS, and holding in the alternative that
social networking sites are also RCS providers, at least with regard to postings or information that
are accessible to a limited number of users, and stored by the social networking site, like videos,
wall postings, and comments.); Orin S. Kerr, A User’s Guide to the Stored Communications Act,
and a Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev. 1208, 1215-16 n. 48 (Aug. 2004)
(“. . . the SCA allows both protected categories [RCS and ECS] to apply to the same provider . . . .
Focusing on the provider’s status in the abstract would create major gaps in the statute. . . .”).
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 12 -
1
computing services (i.e., to identify the user, and to display webpages to the user). Indeed,
2
Defendant’s prospectus acknowledges that, in addition to storing information, LinkedIn processes
3
information, stating, in part: “We process, store and use personal information and other data. . . .”
4
LinkedIn Corp., Prospectus (Form 424B4) (May 18, 2011), at 15 (emphasis added). Thus, while
5
these communications were stored, at least temporarily, Defendant also acted as an RCS and is
6
liable regardless of whether the information was stored.
7
D.
8
Defendant alternatively argues that “no communications content is at issue” because the
9
divulged information amounts to merely “non-content records.” Def. Br. at 11. The SCA’s far-
10
reaching definition of “contents,” however, includes “information concerning the substance,
11
purport, or meaning of that communication,” 18 U.S.C. § 2510(8), as distinguished from the mere
12
“existence of the communication or transactional records about it,”12 1986 U.S.C.C.A.N. 3555,
13
3567. “[T]he line between the two occasionally blurs.” Kerr, User’s Guide, supra, 72 Geo. Wash.
14
L. Rev. at 1228.13 It is not the communication’s type (e.g., data, signals, intelligence) that defines
15
whether it includes “contents,” but is instead the communication’s “functional role” that “explains
16
the different treatment that the two categories receive in the SCA.” Id.
LinkedIn Impermissibly Divulged “Contents”
17
18
19
20
21
22
23
24
25
26
27
28
12
In other words, the “information about the communication that the network uses to deliver and
process the content information.” Kerr, User’s Guide, supra, 72 Geo. Wash. L. Rev. at 1228.
13
Citing Orin S. Kerr, Internet Surveillance Law After the USA Patriot Act: The Big Brother That
Isn’t, 97 Nw. U. L. Rev. 607, 645-46 (2003) (“The conceptual difficulty is that the legal categories
of ‘contents’ and ‘addressing information’ . . . can be quite murky when considering human-tocomputer communications. . . . When an Internet user surfs the web, he sends commands to his
computer directing it to send commands to the host computer . . . . We can look at the user’s
command in two ways: either the command is the ‘content’ of the communication between the user
and his computer or it is merely ‘addressing information’ that the user entered into his computer to
tell the computer where it should go and what it should do. . . .” Here, the personal information
divulged by LinkedIn does not merely serve the purpose of “tell[ing] the computer where [the
communication] should go and what it should do,” but conveys “substance” and “meaning” to
advertisers regarding the user’s browsing patterns, interests, and identity).
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 13 -
1
1.
The User Identification Fits Squarely Within the Definition of Content
2
Here, LinkedIn improperly divulged Plaintiff’s User Identification to its third party
3
advertisers and advertising data aggregators. The very business goal of these companies (and
4
indeed, the purpose of the secret tracking devices and beacons that these third parties place on
5
users’ computers) is to create a profile of the type of person, so as to target advertising based on
6
demographic information. ¶¶ 9-13. The business is lucrative; these third parties pay LinkedIn for
7
the privilege of advertising on its site, and in turn, sell user information and demographic profiles.
8
Certainly, in the context of such profiling, the identity of the user and his/her demographic
9
information is the “substance, purport, or meaning” of the communication. While names are
10
frequently considered “non-content records,” the context of the communication dictates otherwise
11
here. The H.R. Report made clear:
12
13
14
Under [the definition of contents], a service provider is allowed to divulge
mailing lists that identify persons fitting broad demographic criteria. Unless
otherwise authorized, service providers may not divulge to third parties
information that profiles the activities of individual subscribers through the
divulgence of the contents of a communication.
15
16
H.R. Rep. No. 99-647, at 64 (emphasis added). Given the “functional role” of the
17
communication, the User Identification plainly qualifies as “contents.”
18
19
2.
Plaintiff’s Browsing History Is Also “Content” of a Communication
20
Contrary to Defendant’s statement that “plaintiff simply alleges that LinkedIn has disclosed
21
his ‘personal identity’ in the form of a User ID within a URL,” (Def. Br. at 12), the Complaint
22
alleges that LinkedIn also disclosed the most recent webpage that the user viewed. See ¶¶ 15, 16
23
(“LinkedIn . . . add[s] ‘social’ information such as the name of each user and the other LinkedIn
24
profiles they view and interact with,” “the ‘HTTP Referrer’ header [] tells the third party what
25
precise URL the user is looking at” and “allow[s] third parties to see . . . which other LinkedIn
26
profile pages each of those users is looking at and interacting with.”). Defendant does not—and
27
cannot—attempt to categorize Plaintiff’s browsing history as “record” information that can
28
permissibly be disclosed. When the Ninth Circuit allowed the disclosure of record information in
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 14 -
1
United States v. Forrester, 512 F.3d 500 (9th Cir. 2008), it reasoned, in part, that the information
2
did not disclose “the contents of [] messages or [] the particular pages on the websites the person
3
viewed.” (emphasis added). Here, LinkedIn divulged such content.
4
3.
Records Cannot Be Disclosed When Accompanied by Content
5
Even if the User Identification was interpreted as a “record,” Defendant was still prohibited
6
from disclosing that record in connection with a substantive communication. The SCA allows a
7
provider to “divulge a record . . . (not including the contents of communications. . .).” 18 U.S.C.
8
§ 2702(a)(3) (emphasis added). This plain language prohibits disclosing those records “including,”
9
i.e., together with, contents. See, e.g., United States v. Davis, Crim. No. 10-339, 2011 WL
10
2036463, at *4 (D. Or. May 24, 2011) (“Basic subscriber data which identifies a call’s origination,
11
destination, duration, and time of call enjoy no privacy protection because the data is incidental to
12
the [communication], and contains no content information.”) (citing United States v. Reed, 575
13
F.3d 900, 914–16 (9th Cir. 2009)) (emphasis added). Defendant concedes that the records
14
exception applies to “information that only reveals that a communication occurred (and between
15
or among whom), without revealing what was said or communicated.” Def. Br. at 12 (emphasis
16
added). Here, however, LinkedIn disclosed records, not in an isolated context such as a mailing list
17
“fitting broad demographic criteria,” but in connection with a communication, “divulg[ing] to third
18
parties information that profiles the activities of individual subscribers. . . .” See H.R. Rep. No. 99-
19
647, at 64.
20
Defendant’s cited authority on this issue is unavailing. In Forrester, 512 F.3d at 510 (Def.
21
Br. at 12), the Court found that there was no Fourth Amendment expectation of privacy for IP
22
addresses or email addresses because users “should know that this information is provided to and
23
used by Internet service providers for the specific purpose of directing the routing of information. .
24
. . [They] are voluntarily turned over in order to direct the third party’s servers.” (emphasis
25
added). Here, however, Plaintiff never voluntarily turned over information; he merely clicked on a
26
LinkedIn webpage. While Plaintiff may have expected that his IP address would be used in
27
connection with that page visit, no reasonable person would have expected that his User
28
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 15 -
1
Identification or browsing history would also be transmitted, nor was such information required for
2
LinkedIn to direct the communication.14
3
The Ninth Circuit compared “records” to the address on physical mail, stating: “At best, the
4
[third party] may make educated guesses about what was said in the messages or viewed on the
5
websites based on its knowledge of the e-mail to/from addresses and IP addresses—but this is no
6
different from speculation about the contents of a phone conversation on the basis of the identity of
7
the person or entity that was dialed.” Forrester, 512 F.3d at 510. LinkedIn takes this several steps
8
further, however: 1) Defendant sends the User Identification with an otherwise anonymous
9
communication (the click), eliminating the need for any “speculation” regarding the content of the
10
identified-person’s communications; 2) Defendant contemporaneously sends the user’s last-viewed
11
page along with its User Identification, plainly divulging additional, protected content; and
12
3) Defendant transmits this information to its paid advertisers, who employ beacons and secret
13
tracking devices to monitor browsing history.
14
Jessup-Morgan v. America Online, Inc., 20 F. Supp. 2d 1105 (E.D. Mich. 1998) (Def. Br.
15
at 12), is also inapplicable. That case involved a particularly egregious set of facts wherein a user
16
publicly, but anonymously, posted a malicious and defaming post while posing as (and providing
17
contact information for) another person. The court declined to hold the defendant liable for
18
revealing the identity of the user, in compliance with a subpoena. Id. at 1108.
19
The facts here are distinguishable from those in Jessup in a number of regards.15 First, there
20
is no public interest served by disclosing the identities of LinkedIn users, as there might have been
21
in disclosing the identity of a malicious, anonymous poster. Second, in Jessup, the third party (and
22
the public) already had possession of the contents of the communication, and sought only to place
23
24
25
26
27
28
14
Similarly, in Hill v. MCI WorldCom Communications, Inc., 120 F. Supp. 2d 1194 (S.D. Iowa
2000), the defendant divulged telephone transaction records (phone numbers and billing
information) which were neither content in that context nor divulged in connection with content.
Here, however, LinkedIn transmitted the User Identification with a communication (the click to
visit/interest in a webpage), and simultaneously included contents of an unrelated communication
(the last-viewed page).
15
Plaintiff also respectfully asserts that the non-controlling decision in Jessup was misplaced and
does not comport with the plain language of the statute.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 16 -
1
a name with an anonymous posting. Id. Here, by contrast, LinkedIn wrongfully divulged
2
information that Defendant has not disputed is “contents” (the last-viewed page), with the user’s
3
identifiable information. Third, and perhaps most alarmingly, the defendant in Jessup paired record
4
information with communications conveyed through the defendant’s communications service;
5
while here, LinkedIn paired the user’s identity with the user’s ongoing browsing history, i.e.,
6
communications between the user and various websites and companies, made without any
7
participation by, use of, or communications with LinkedIn.
8
E.
9
The Third Parties Were Not an “Addressee or Intended Recipient” of the
Divulged Information
10
Finally, Defendant asserts that its misconduct is “permissible under SCA because . . . any
11
disclosure was made to the ‘addressee or intended recipient’ of the communication.” Def. Br. at 13
12
(citing 18 U.S.C. § 2702(b)(1)). Defendant illogically concludes that the allegation that “LinkedIn
13
violated the SCA by transmitting plaintiff’s User ID to third parties” is an “admission [that] these
14
third parties are the ‘addressee or intended recipient’ of the purported communication.”16 Id.
15
Defendant’s reasoning is fundamentally flawed: LinkedIn may have intended to send the browsing
16
history and User Identification to a third party, but the Plaintiff did not. LinkedIn cannot
17
reasonably argue that the SCA permits a communications service provider to divulge users’
18
communications as long as it does so intentionally. Such misconduct is plainly prohibited. 18
19
U.S.C. § 2702.
20
21
22
23
24
25
26
27
28
16
In support of its argument, Defendant cites Facebook, 2011 WL 2039995 (a decision that
Defendant, earlier in its brief, contends is poorly reasoned, Def. Br. at n.3). In Facebook, plaintiffs
failed to articulate that the name, user ID, and browsing history of the person sending the message
were not a part of the “communication” that the user intended to send to the third party. See id. at
*6, 9, 10, 17 (Court granting plaintiffs “leave to amend to allege specific facts showing that the
information allegedly disclosed by Defendant was not part of a communication from Plaintiffs to
an addressee or intended recipient of that communication”). Here, Plaintiff alleges that the User
Identification and prior browsing history were impermissibly divulged, and there is no suggestion
that they were part of any intended communication from the user to the third parties.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 17 -
1
F.
2
Defendant contends that “the User ID is assigned by and belongs to LinkedIn17 . . . and the
3
SCA does not limit LinkedIn’s access to its own systems.” Def. Br. at 10 (citing 18 U.S.C.
4
§ 2701(c)(1)). While the SCA exempts searches of stored data by ECSs—the Complaint alleges
5
that LinkedIn did far more: it divulged stored data to third parties. See, e.g., ¶¶ 15-19. Defendant’s
6
cited authority makes clear that the “service provider exception” is limited to access--not
7
disclosure--of information in the service provider’s possession.18 E.g., Crowley, 166 F. Supp. 2d at
8
1272 (allowing “access to [service provider’s] own systems, and declining to hold service provider
9
liable for SCA violation because it was neither an ECS nor RCS covered by the Act) (emphasis
10
added); Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107 (3d Cir. 2003) (allowing an insurance
11
company to search emails on its own server); see also, 18 U.S.C. § 2702(a)(2).
12
Defendant’s Misconduct is not Excused by the Service Provider Exception
LinkedIn violated the SCA by divulging Plaintiff’s communications, is not covered by
13
any exceptions to the SCA, and its motion to dismiss must be denied.
14
V.
15
LINKEDIN VIOLATED CALIFORNIA CONSUMER PROTECTION LAWS
A.
16
Plaintiff Has Adequately Pleaded Lost Money or Property for the Purpose of
the UCL and FAL
17
Plaintiff already has demonstrated that he suffered an injury-in-fact for the purposes of
18
the Article III standing requirement. Supra, sec. I. Defendant’s arguments notwithstanding (Def.
19
Br. at 14), Plaintiff also has adequately pleaded injury in the form of the loss of money or
20
property, the value of which is determinable by reference to prices set in an active market for
21
personal profiles.
22
23
17
24
25
26
27
28
The representation that the User Identification is “assigned by and belongs to LinkedIn”
trivializes the importance of the personal, private information that the user has entrusted to
LinkedIn, and with which LinkedIn has tied to that User Identification. Revealing the User
Identification carries with it a tremendous amount of information, especially in light of LinkedIn’s
transmission of the last-viewed page, and its use of advertisements that utilize secret tracking
devices on its website.
18
Moreover, the “service provider exception” applies only to ECSs, 18 U.S.C. § 2702(c)(1). As
discussed above, LinkedIn also functioned as an RCS.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 18 -
1
“Data is currency,” according to then-FTC Commissioner Pamela Jones Harbour. FTC
2
Roundtable Series I on Exploring Privacy (Matter No. P095416), Dec. 7, 2009, at 2. In Property,
3
Privacy, and Personal Data, Berkeley School of Law Professor Paul M. Schwartz wrote:
4
Personal information is an important currency in the new millennium. The
monetary value of personal data is large and still growing, and corporate America
is moving quickly to profit from this trend. Companies view this information as a
corporate asset and have invested heavily in software that facilitates the collection
of consumer information.
5
6
7
117 Harv. L. Rev. 2055, 2056-57 (May 2004).
8
9
Active markets define values for a wide range of personal information. For example, full
10
social networking credentials can be worth between $1 and $35. Thorsten Holz, et al., Learning
11
More About the Underground Economy: A Case Study of Keyloggers and Dropzones, University
12
of Mannheim, Laboratory for Dependable Systems (2008) (“[E]ach credential is a marketable good
13
that can be sold in dedicated forums.”).
14
“Personal information is now a valuable commodity, with readily available market prices.”
15
Luiz Salazar, Privacy And Bankruptcy Law, Part I: Technology Explosion Creates Personal
16
Privacy Tension, Am. Bankr. Inst. J. (Nov. 2006), at 18; see also John T. Soma, et al., Corporate
17
Privacy Trend: The “Value” of Personally Identifiable Information (“PII”) Equals the “Value” of
18
Financial Assets, 15 Rich. J.L. & Tech. 11, at *1, 14 (2009), available at http://law.richmond.edu/
19
jolt/v15i4/article11.pdf (“PII, which companies obtain at little cost, has quantifiable value that is
20
rapidly reaching a level comparable to the value of traditional financial assets . . . . Individual data
21
points have concrete value, which can be traded on what is becoming a burgeoning market for
22
PII.”); Richard S. Murphy, Property Rights in Personal Information: An Economic Defense of
23
Privacy, 84 Geo. L.J. 2381, 2402 (July 1996) (“[P]articularized information is a commodity that
24
can be sold in a well developed market. . . . Therefore, the typical transaction between a merchant
25
or seller and a consumer increasingly can be characterized as an exchange of goods or services for
26
money and information.”).
27
Accordingly, in Doe 1 v. AOL LLC, 719 F. Supp. 2d 1102, 1113-14 (N.D. Cal. 2010), the
28
Court denied a motion for summary judgment on the pleadings with respect to CLRA and UCL
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 19 -
1
claims for the disclosure of users’ personal information. The court found that the plaintiffs
2
suffered injury resulting from AOL’s disclosure of confidential member information. Id. at 1111.
3
B.
4
Contrary to Defendant’s contention, (Def. Br. at 16) Plaintiff adequately pleaded
5
reliance to his detriment by alleging that “[h]ad Plaintiff known that Defendants would share his
6
personally identifiable information with third parties, he would not have purchased or used [ ]
7
Defendants’ services…” ¶ 64. This establishes that Plaintiff relied upon, and believed, that
8
Defendant would not share his personally identifiable information for the purposes of the UCL
9
and CLRA claims. Shin v. BMW of N. Am., No. 09-0398, 2009 U.S. Dist. LEXIS 67994, at *7
10
(C.D. Cal. July 16, 2009) (“For purposes of pleading a fraudulent omissions claim under the
11
UCL and CLRA, a plaintiff satisfies the "as a result of" requirement by pleading that he would
12
have behaved differently if he had been aware of the information and the undisclosed
13
information would have been important to reasonable consumers”).
Plaintiff Alleged Reliance for the purpose of UCL and CLRA
14
C.
15
Defendant’s argument notwithstanding (Def. Br. at 17), Plaintiff adequately alleged the
16
underlying unlawful, fraudulent, or unfair conduct required by the statute through violations of
17
the SCA, California Civil Code Section 1750, and the California Constitution.
Plaintiff Properly Alleged UCL Unlawful, Fraudulent, or Unfair Conduct
18
1.
Plaintiff Properly Pleaded UCL Unlawful Conduct
19
As shown above, Defendant violated the SCA and California Constitution. Accordingly,
20
the “unlawful” prong is met. Quintero Family Trust v. OneWest Bank, F.S.B., No. 09-1561, 2010
21
WL 392312, at *12 (S.D. Cal. Jan. 27, 2010) (“An act is 'unlawful' under section 17200 if it
22
violates an underlying state or federal statute or common law”).
23
2.
Plaintiff Properly Pleaded UCL Fraudulent Conduct
24
Plaintiff properly alleged fraudulent behavior as it is defined by the UCL. Under the
25
“fraudulent” prong it is only necessary to show that “members of the public are likely to be
26
deceived.” Sanchez v. Bear Stearns Residential Mortg. Corp., No. 09-2056, 2010 WL 1911154, at
27
*7 (S.D. Cal. May 11, 2010). The California Supreme Court noted that “the ‘fraud’ contemplated
28
by section 17200 … bears little resemblance to common law fraud or deception … [and] can be
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 20 -
1
shown even if no one was actually deceived, relied upon the fraudulent practice, or sustained any
2
damage.” S. Bay Chevrolet v. Gen. Motors Acceptance Corp., 72 Cal. App. 4th 861, 888 (1999)
3
(internal quotations and citations omitted). Because this is not an action under common law fraud,
4
Plaintiff’s claims do not sound in fraud and are not required to be pled with the specificity required
5
under Rule 9(b). Plaintiff is only required to show that members of the public are likely to be
6
deceived.19
7
Plaintiff properly pleaded fraudulent conduct by alleging that members of the public were
8
likely to be deceived by Defendant’s practices, including publication of its privacy policy, which
9
Defendant violated. ¶¶ 25, 29. Furthermore, Plaintiff also alleges that even if Defendant’s privacy
10
policy accurately described the disclosure of its users private information (which it did not), such a
11
privacy policy is ineffective in providing consumers with useful and accurate information about
12
how personal information will be collected and used. Instead, consumers are likely to believe,
13
when seeing that a Website has a privacy policy, that the information collected is not shared with
14
third parties. Plaintiff thus properly alleged that members of the public are likely to be deceived by
15
Defendant’s privacy policy with respect to private, personal information.
16
3.
Plaintiff Properly Pleaded UCL Unfair Conduct
17
There are three tests that a court may apply to a consumer action relating to the “unfair”
18
prong of the UCL. See Drum v. San Fernando Valley Bar Ass’n, 182 Cal. App. 4th 247, 256-57
19
(2010). The first test requires: (a) substantial consumer injury; (b) that the injury is not outweighed
20
by countervailing benefits to consumers; and (c) that the injury is one that consumers could not
21
reasonably have avoided. Id.; see Camacho v. Auto. Club of S. Cal., 142 Cal. App. 4th 1394, 1403
22
(2006). The second test requires that the unfair conduct be “tethered to specific constitutional,
23
24
25
26
27
28
19
Even if the Court were to apply the standards of Rule 9(b) to the Complaint, Plaintiff has
pleaded the allegations with sufficient particularity to put the Defendant on notice of their claims.
“Averments of fraud must be accompanied by ‘the who, what, when, where, and how’ of the
misconduct charged.” Vess v. Ciba-Geigy Corp. U.S.A., 317 F.3d 1097, 1106 (9th Cir. 2003)
(citation omitted). Plaintiff has clearly met this standard, including the when (March 24, 2011); the
what (providing Plaintiff’s personal information to third parties); the who (Quantcast and
Scorecard Research); the where (Plaintiff’s computer located at his home in San Francisco); and
the how (including the User Identification in a HTTP Referrer header).
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 21 -
1
statutory, or regulatory provisions,” and the third test asks whether the conduct was “immoral,
2
unethical, oppressive, unscrupulous or substantially injurious to consumers,” weighing the utility
3
of the defendant’s conduct against the harm to the victim. Drum, 182 Cal. App. 4th at 256-57.
4
Contrary to Defendant’s assertion, Plaintiff has alleged facts that satisfy any one of these tests that
5
the Court may apply.
6
Plaintiff has satisfied the first test; Plaintiff sustained a substantial consumer injury, there
7
was no countervailing benefit to consumers at all, and Plaintiff could not have avoided the injury.
8
Indeed, California places a strong emphasis on the right to privacy at issue here. California Const.
9
Article 1 Section 1. Courts have repeatedly recognized that invasion of privacy constitutes injury,
10
and is actionable under the law. See, e.g., Forsher v. Bugliosi, 26 Cal. 3d 792 (1980). Defendant
11
caused this injury when it gave Plaintiff’s personally identifiable information to third parties, and
12
there was no countervailing benefit to consumers. Plaintiff could not have avoided the injury
13
because Defendant acted contrary to the position taken in its privacy policy, and there was no other
14
way for Plaintiff to learn of Defendant’s practices.
15
The second test is satisfied because Plaintiff alleged unfair conduct that is specifically
16
tethered to a constitutional provision as well as multiple statutory provisions. Finally, Plaintiff
17
pleaded facts sufficient to satisfy the third test, alleging the unscrupulous behavior of Defendant in
18
acting contrary to its privacy policy, with no corresponding utility for the consumer and serious
19
harm based on the violation of privacy. ¶¶ 11, 13-19, 24-33.
20
D.
Plaintiff is a Consumer Who Purchased a Service From LinkedIn
21
1.
Plaintiff is a “Consumer” under the CLRA
22
A violation of the CLRA may only be alleged by a “[c]onsumer,” defined in the statute as
23
an “individual who seeks or acquires, by purchase or lease, any goods or services for personal,
24
family, or household purposes.” Cal. Civ. Code § 1761(d). The statute does not require that the
25
consumer actually purchased, leased, or otherwise paid for the good or service. Cal. Civ. Code
26
1770(a) (“The following unfair methods of competition and unfair or deceptive acts or practices
27
undertaken by any person in a transaction intended to result or which results in the sale or lease of
28
goods or services to any consumer are unlawful”) (emphasis added).
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 22 -
1
Here, Plaintiff is a “consumer” because he exchanged valuable consideration, in the form
2
of personal information, for Defendant’s service. Moreover, Defendant offered its service to
3
Plaintiff, and other consumers, for a price of $24.95 per month. ¶ 3. Accordingly, the conduct at
4
issue falls within the definition of the CLRA.
5
2.
LinkedIn is a “Service” under the CLRA
6
The CLRA defines “[s]ervice” as “work, labor, and services for other than a commercial
7
or business use, including services furnished in connection with the sale or repair of goods.” Cal.
8
Civ. Code 1761(b). Defendant provides a service under this definition, allowing access to a social
9
network of professionals to users of the website in exchange for personal information, revenue
10
from data aggregators, as well as selling premium services. Indeed, LinkedIn acknowledges that it
11
provides a “service” in its own User Agreement, stating, in part: “For as long as LinkedIn
12
continues to offer the Services, LinkedIn shall provide and seek to update, improve and expand the
13
Services.” User Agreement, LINKEDIN, http://www.linkedin.com/static?key=user_agreement (last
14
visited Aug. 1, 2011). These services are not provided for commercial or business use, but for
15
personal use by consumers looking to connect with other professionals and develop their
16
professional career.
17
Furthermore, the cases that Defendant relies on to argue that LinkedIn is not a service are
18
inapplicable. Def. Br. at 19. Unlike Ferrington v. McAfee, Inc., No. 10-1455, 2010 WL 3910169
19
(N.D. Cal. Oct. 5, 2010), the instant case does not involve software. Fairbanks v. Superior Court,
20
46 Cal. 4th 56, 61 (Oct. 5, 2009), involved an insurance policy and the court held that the
21
obligation to pay money under such a policy is neither work nor labor, factors not at issue in this
22
case. Id. Berry v. American Express Publishing, Inc., 147 Cal. App. 4th 224, 227 (2007), held that
23
credit card transactions were not covered by the CLRA, primarily because of the legislative history
24
of the CLRA, where the drafters considered adding the term “credit” into the definitions but
25
ultimately rejected it. Id. at 230-32. This reasoning has no application here.
26
Moreover, Defendant’s contention that LinkedIn is not a “service” under the CLRA is
27
inconsistent with the CLRA’s purpose. The CLRA is to be “liberally construed and applied to
28
promote its underlying purposes, which are to protect consumers against unfair and deceptive
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 23 -
1
business practices and to provide efficient and economical procedures to secure such protection.”
2
Cal. Civ. Code §1760 (West 2009). With the development of personal information as a form of
3
currency on the Internet for data aggregators and advertisers, as well as the rise of social
4
networking Websites like the Defendant’s, it is important to protect consumers from unfair and
5
deceptive business practices in these new areas, and the CLRA was designed to do just that.
6
E.
7
Plaintiff alleged facts that show appreciable and actual damage as a result of the breach
8
Plaintiff Alleged Breach of Contract Damages
of contract. See supra, sec. V.A.
9
F.
LinkedIn Converted Plaintiff’s Property
10
Defendant tries to avoid liability by arguing that the personal browsing history and other
11
personally identifiable information of the Plaintiff is not an intangible interest that is merged
12
with or reflected in something tangible and that it cannot be exclusively possessed. Def. Br. at
13
23-24. Defendant’s argument is in error.
14
Plaintiff had a precisely defined, legally protected privacy interest. “In order to determine
15
whether an intangible property right existed … (1) there must be an interest capable of precise
16
definition; (2) it must be capable of exclusive possession or control; and (3) the putative owner
17
must have established a legitimate claim to exclusivity.” Ali v. Fasteners for Retail, Inc., 544 F.
18
Supp. 2d 1064, 1072 (E.D. Cal. 2008). A legally recognized informational privacy interest is one
19
which protects the dissemination or misuse of confidential information. Hill, 865 P.2d at 642. A
20
LinkedIn member, like the Plaintiff, has an informational privacy interest in preventing third
21
parties from collecting and disseminating private browser histories and other personally
22
identifiable information. The privacy amendment to the California Constitution was enacted to
23
guard against exactly such an intrusion. Id. This privacy interest is exclusively controlled by the
24
person whose private, sensitive information is at issue.20
25
20
26
27
28
Defendant notes that Boon Rawd Trading International Co. v. Paleewong Trading Co., 688 F.
Supp. 2d 940, 954 (N.D. Cal. 2010), puts forth the proposition that an intangible interest can be
the subject of a conversion claim only where that interest is merged with, or reflected in,
something tangible. Def. Br. at 23-24. However, that Court notes that “to the extent ‘California
retains some vestigial merger requirement, it is clearly minimal, and at most requires only some
connection to a document or tangible object.’” Boon, 688 F. Supp. 2d at 954 (quoting Kremen v.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 24 -
1
CONCLUSION
For the reasons stated above, Defendant’s motion to dismiss must be denied.21
2
3
Dated August 1, 2011
Respectfully submitted,
/s/ Michael R. Reese
Michael R. Reese (State Bar No. 206773)
REESE RICHMAN LLP
875 Avenue of the Americas, 18th Floor
New York, New York 10001
Telephone: (212) 579-4625
Facsimile: (212) 253-4272
Email: mreese@reeserichman.com
4
5
6
7
8
Sanford P. Dumain
Peter E. Seidman (admitted pro hac vice)
Charles Slidders
Melissa Ryan Clark
MILBERG LLP
One Pennsylvania Plaza, 49th Floor
New York, New York 10119-0165
Telephone:
(212) 594-5300
Facsimile:
(212) 868-1229
Email: pseidman@milberg.com
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Cohen, 337 F.3d 1024, 1033 (9th Cir. 2003)). It further notes that there is a clear trend that
intangible property can be a subject of conversion. Id. Defendant’s reliance on this case is thus
misplaced.
21
If the court grants any part of Defendant’s motion to dismiss, Plaintiff respectfully request
leave to amend under Federal Rule of Civil Procedure 15.
Plaintiff’s Opposition to Defendant’s Motion to Dismiss the Complaint
Case No. 11-cv-01468 LHK
- 25 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?