In Re: iPhone/iPad Application Consumer Privacy Litigation
Filing
54
REPLY (re #42 MOTION to Dismiss Defendant Apple Inc.'s Notice of Motion and Motion to Dismiss Plaintiffs' First Amended Consolidated Class Action Complaint Pursuant to Rules 12(b)(1) and 12(b)(6); Supporting Memorandum of Points and Authorities ) filed byApple, Inc.. (Attachments: #1 Declaration of Marc J. Zwillinger)(Zwillinger, Marc) (Filed on 4/5/2012)
1
2
3
4
MARC J. ZWILLINGER (pro hac vice)
marc@zwillgen.com
JACOB A. SOMMER (pro hac vice pending)
jake@zwillgen.com
ZWILLGEN PLLC
1705 N St NW
Washington, DC 20036
Telephone: 202.296.3585
5
6
7
8
PENELOPE A. PREOVOLOS (CA SBN 87607)
PPreovolos@mofo.com
MORRISON & FOERSTER LLP
425 Market Street
San Francisco, California 94105-2482
Telephone: 415.268.7000
Facsimile: 415.268.7522
9
Attorneys for Defendant Apple Inc.
10
11
UNITED STATES DISTRICT COURT
12
NORTHERN DISTRICT OF CALIFORNIA
13
SAN JOSE DIVISION
14
15
In Re: iPhone/iPad Application Consumer
Privacy Litigation
Case No. 5:11-md-02250-LHK
16
CLASS ACTION
17
DEFENDANT APPLE’S REPLY IN
SUPPORT OF ITS MOTION TO
DISMISS PLAINTIFFS’ FIRST
AMENDED CONSOLIDATED CLASS
ACTION COMPLAINT PURSUANT TO
RULES 12(B)(1) AND 12(B)(6)
18
19
20
21
22
Date:
Time:
Ctrm:
Judge:
23
24
25
26
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
May 3, 2012
1:30pm
8, 4th Floor
Honorable Lucy H. Koh
1
TABLE OF CONTENTS
2
Page
3
TABLE OF AUTHORITIES ........................................................................................................ii
I.
INTRODUCTION ............................................................................................................ 1
II.
ARGUMENT .................................................................................................................... 3
A.
Plaintiffs Have Not Alleged Injury-in-Fact........................................................... 3
B.
Plaintiffs Cannot Bring Claims Under the Wiretap Act or the SCA..................... 4
1.
Personal Computers Are Not Facilities Under the SCA. ..........................5
2.
Plaintiffs’ SCA Claims Also Fail Because if the Geolocation
Data Was in Electronic Storage, Apple Was the Intended
Recipient. .................................................................................................. 7
C.
The Wiretap Act Is Inapplicable to Apple’s Alleged Collection of
Non-Content Information from iPhones. .............................................................. 7
D.
Plaintiffs Cannot State a Claim Under CFAA. ..................................................... 9
1.
Plaintiffs’ Claims Are Not About Unauthorized Access. .........................9
2.
Plaintiffs Improperly Base Their CFAA Claims on Software
Design. ...................................................................................................... 9
3.
Plaintiffs Cannot Demonstrate Damage Under the CFAA,
and Claims Under 18 U.S.C. § 1030(a)(5) Cannot Be Based
on “Loss.”................................................................................................ 10
E.
Plaintiffs Do Not State a Claim Under the California Constitution.................... 10
F.
Plaintiffs’ CLRA Claim Should Be Dismissed................................................... 11
G.
Plaintiffs’ Claim Under California’s UCL Must Be Dismissed.......................... 12
1.
Plaintiffs Cannot Establish Standing to Bring a UCL Claim.................. 12
2.
Plaintiffs Fail to Allege “Fraudulent,” “Unfair,” or
“Unlawful” Conduct. .............................................................................. 13
H.
Apple’s Privacy Policy Bars Plaintiffs’ Claims. ................................................. 14
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
I.
III.
The Limitations on Apple’s Duties to Users Contained in Its User
Agreements Are Valid and Enforceable. ............................................................ 15
CONCLUSION ...............................................................................................................15
22
23
24
25
26
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
i
1
TABLE OF AUTHORITIES
2
Page(s)
3
CASES
4
Camacho v. Auto Club of S. Cal.,
142 Cal. App. 4th 1394 (2006) ............................................................................................... 13
5
6
Chance v. Avenue A, Inc.,
165 F. Supp. 2d 1153 (W.D. Wash. 2011)................................................................................ 6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Consulting Prof’l Res., Inc. v. Concise Techs. LLC,
No. 09-1201, 2010 U.S. Dist. LEXIS 32573 (W.D. Pa. Mar. 9, 2010),
rep. & rec. adopted, 2010 U.S. Dist. LEXIS 31489 (W.D. Pa. Mar. 31, 2010) ..................... 10
Council on Am.-Islamic Relations Action Network, Inc. v. Gaubatz,
793 F. Supp. 2d 311 (D.D.C. 2011) .......................................................................................... 5
Creative Computing v. Getloaded.com LLC,
386 F.3d 930 (9th Cir. 2004)........................................................................................... 10 n.13
Czech v. Wall St. on Demand, Inc.,
674 F. Supp. 2d 1102 (D. Minn. 2009) ............................................................................... 4, 10
Expert Janitorial, LLC v. Williams,
No. 3:09-CV-283, 2010 U.S. Dist. LEXIS 23080 (E.D. Tenn. Mar. 12, 2010)........................ 6
Gelbard v. United States,
408 U.S. 41 (1972) ............................................................................................................ 8 n.12
Hill v. MCI WorldCom Commc’ns, Inc.,
120 F. Supp. 2d 1194 (S.D. Iowa 2000) ................................................................................... 8
In re AOL, Inc. Version 5.0 Software Litig.,
168 F. Supp. 2d 1359 (S.D. Fla. 2001) ..................................................................................... 9
In re Apple & AT & TM Antitrust Litig.,
596 F. Supp. 2d 1288 (N.D. Cal. 2008) .......................................................................... 10 n.13
In re DoubleClick, Inc. Privacy Litig.,
154 F. Supp. 2d 497 (S.D.N.Y. 2001)....................................................................................... 5
24
25
26
27
In re Facebook Privacy Litig.,
791 F. Supp. 2d 705 (N.D. Cal. 2011) ...................................................................................... 8
In re Intuit Privacy Litig.,
138 F. Supp. 2d 1272 (C.D. Cal. 2001) .................................................................................... 6
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
ii
1
2
3
4
5
6
7
8
9
10
11
In re Toys ‘R Us Privacy Litig.,
No. 00-CV-2746 MMC, 2001 U.S. Dist. LEXIS 16947 (N.D. Cal. Oct. 9, 2001) ................... 9
Jessup-Morgan v. Am. Online, Inc.,
20 F. Supp. 2d 1105 (E.D. Mich. 1998).................................................................................... 8
Kearns v. Ford Motor Co.,
567 F.3d 1120 (9th Cir. 2009)................................................................................................. 13
Khoury v. Maly’s of Cal., Inc.,
14 Cal. App. 4th 612 (1993) ........................................................................................... 14 n.17
Konop v. Hawaiian Airlines, Inc.,
302 F.3d 868 (9th Cir. 2002)..................................................................................................... 8
Kowalsky v. Hewlett-Packard Co.,
No. 10-CV-02176-LHK (N.D. Cal. Aug. 10, 2011), slip op. ......................................... 12 n.16
Kwikset Corp. v. Superior Court,
51 Cal. 4th 310 (2011) ............................................................................................................ 12
12
13
14
15
16
La Court v. Specific Media, Inc.,
No. 10-1256-GW(JCGx), 2011 U.S. Dist. LEXIS 50543 (C.D. Cal. Apr. 28, 2011)..... 10 n.13
Marsh v. Zaazoom Solutions, LLC,
No. C-11-0526-YGR, 2012 U.S. Dist. LEXIS 37758 (N.D. Cal. Mar. 20, 2012) .................... 8
Mazza v. Am. Honda Motor Co.,
666 F.3d 581 (9th Cir. 2012)................................................................................................... 13
17
18
19
20
21
Nix v. O’Malley,
160 F.3d 343 (6th Cir. 1998)............................................................................................. 8 n.12
Russell v. Am. Broad. Co., Inc.,
No. 94 C 5768, 1995 U.S. Dist. LEXIS 7528 (N.D. Ill. May 31, 1995)........................... 7 n.11
United States v. Steiger,
318 F.3d 1039 (11th Cir. 2003)................................................................................................. 5
22
23
24
Wofford v. Apple, Inc.,
No. 11-CV-0034 AJB NLS, 2011 U.S. Dist. LEXIS 129852
(S.D. Cal. Nov. 9, 2011) .................................................................................................... 11-12
25
26
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
iii
1
STATUTES
2
18 U.S.C.
§ 1030........................................................................................................................................ 9
§ 1030(a)(5)............................................................................................................................. 10
§ 1030(g) ................................................................................................................................... 9
§ 2258A..................................................................................................................................... 6
§ 2510(8) ................................................................................................................................... 8
§ 2510(12) ................................................................................................................................. 7
§ 2510(15) ........................................................................................................................... 6 n.7
§ 2510(17) ................................................................................................................................. 7
§ 2511(2) ................................................................................................................................... 6
§ 2511(2)(d) .............................................................................................................. 7 & n.11, 8
§ 2511(3)(a)............................................................................................................................... 8
§ 2701(a)(1)......................................................................................................................... 7 n.9
§ 2701(c) ....................................................................................................................... 7 & n.10
§ 2703(f).................................................................................................................................... 6
3
4
5
6
7
8
9
10
11
13
Cal. Civ. Code
§ 1668...................................................................................................................................... 15
§ 1716(d) ................................................................................................................................. 12
§ 1770(a) ................................................................................................................................. 11
14
OTHER AUTHORITIES
15
16
Comments to FTC, COPPA Rule, Proposed Rule, 76 Fed. Reg. 59804
(Sept. 27, 2011) ............................................................................................................... 14 n.18
17
H.R. Rep No. 99-647, 99th Cong. (1986) ................................................................................. 5 n.6
12
18
19
20
21
22
23
24
25
26
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
iv
1
I.
INTRODUCTION
The opening paragraph of Plaintiffs’ response says all this Court needs to know. In it,
2
3
Plaintiffs continue to rely on the vague and nonspecific theory that they somehow were injured
4
because the “personal information and data resources of Plaintiffs was an undisclosed and
5
involuntary cost of the use of their iDevice.” (Resp. at 1.) This Court has squarely rejected the
6
theory that the iDevices are “‘less secure’ and ‘less valuable’ in light of the privacy concerns.”
7
(Order at 6.) Because Plaintiffs still do not offer any “particularized example” or explain how
8
any one of them suffered identifiable harm, they again fail to demonstrate Article III standing.
Plaintiffs attempt to salvage these deficient theories by focusing on new statutory claims
9
10
(under the Stored Communications Act (“SCA”) and Wiretap Act) that they hope will
11
automatically confer standing. But their opposition confirms the reason that Plaintiffs omitted
12
these claims from their previous complaint: the alleged conduct does not implicate these statutes,
13
and they do not provide Plaintiffs with a right to relief. Among other things, the SCA does not
14
apply to information obtained from an individual’s phone or personal computing device, only to
15
information held in an electronic communication facility — such as emails on an email provider’s
16
server. And neither statute applies where Apple is alleged to be receiving information directly
17
from the phones it manufactured, not accessing or “intercepting” communications between
18
iPhone users and third parties.
19
Aware that they cannot cure the defects with the iDevice class claims detailed in the
20
Court’s Order, Plaintiffs change tack and focus on rehashed claims asserted by the so-called
21
“Geolocation Class.”1 These manufactured claims are entirely speculative and fail to set forth a
22
plausible claim that Apple tracked the location of Plaintiffs Gupta or Rodimer (or any other
23
1
24
25
26
27
28
Plaintiffs suggest that the previous complaint lacked “geolocation” claims, which “have not yet
been ruled on by this Court.” (Resp. at 3.) But Plaintiffs’ Counsel told the Court last May when
arguing against a stay pending consolidation: “There was also a story that broke on literally the
same day that the Consolidated Complaint was filed, it publicly broke, which dealt with the issue
that’s been mentioned a few times today regarding the issue of geolocation. That geolocation
issue does exist in the Consolidated Complaint.” (See Zwillinger Decl., Ex. A May 25, 2011 Hr’g
Tr. at 40:8-15 (emphasis added).) Moreover, the Court addressed the allegation that Apple’s iOS
caused iDevices to retain “unencrypted location history files,” but held that such speculative
allegations of injury do not support Article III Standing. (Order at 9.)
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
1
1
consumer) — and Apple did not. Tellingly, Plaintiffs Gupta and Rodimer do not identify a single
2
piece of geolocation information from their iPhones that supports their claim that Apple “tracked”
3
or “stored” Plaintiffs’ location data, despite Plaintiffs’ specious claim that “anyone” with access
4
to the device could “easily” obtain such files (e.g., AC ¶ 144). Instead, Plaintiffs speculate that
5
Apple might be able to “track” them using “data revealing the unique identifiers of nearby
6
cellular towers and wireless networks” — not data about Plaintiffs or their device. (Resp. at 3-4
7
(citing AC ¶¶ 138, 144).) As this Court recognized, Plaintiffs’ “speculative allegations” that
8
“Apple’s platform caused ‘users’ iDevices to be able to maintain, synchronize, and retain
9
detailed, unencrypted location history files’” are insufficient to support Article III standing.
10
11
(Order at 9; AC ¶ 137.)
Because the Geolocation Plaintiffs cannot allege facts that support their claims, their
12
opposition now asserts that Plaintiffs need “discovery” to “provide . . . details” about “how their
13
private, personal information was stored and transmitted.” (Resp. at 12.) But that request only
14
underscores that these claims are entirely speculative and lack any plausible, factual basis. The
15
Geolocation Plaintiffs base their claims entirely on conjecture following reports of a software bug
16
that caused Apple’s servers to log and store data, in unintended circumstances, about hot spots
17
and cell towers — not data about the iPhone or its user. (See, e.g., ¶¶ AC 137-38, 145, 147-50.)
18
Plaintiffs must do more than mischaracterize news reports and hope that discovery will turn up
19
evidence on their iPhones to support their claims. At a minimum, they must come forward with
20
specific factual allegations that make it plausible to conclude that location data linked to them or
21
their iPhones was in fact collected from or stored on their devices (it was not), and then, that they
22
suffered some concrete, identifiable harm from these supposed practices (they did not). In short,
23
Plaintiffs’ Geolocation claims fail for precisely the same reasons as in the prior complaint: they
24
fail to allege any plausible or concrete injury for Article III standing, and do not come close to
25
alleging the elements of a legally sufficient claim. Further, all of Plaintiffs’ claims fail for
26
numerous additional reasons discussed below.
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
2
1
II.
ARGUMENT
2
A.
3
Both classes’ injury claims boil down to the allegations that the iDevices: (1) suffered a
Plaintiffs Have Not Alleged Injury-in-Fact.
4
diminution in value due to the alleged use of personal information (AC ¶ 72(o)); and (2)
5
consumed resources in an unexpected and unwanted way. (AC ¶¶ 118-21.) Yet not one of the
6
allegations Plaintiffs cite in their Response describes a “particularized injury” to any Plaintiff —
7
only abstract harms that this Court has rejected. (See Resp. at 9 n.6 (citing AC ¶¶ 30-34, 136-58);
8
Order at 6.) As to diminution in value, Plaintiffs now ask the court to “scan recent headlines” to
9
find that “personal information” should be treated like currency, even as they fail to point to any
10
personally identifying information that Apple collected or disclosed here. (Resp. at 28.) As to
11
resource consumption, the injuries alleged in ¶¶ 170-177 of Plaintiffs’ first complaint are
12
identical to the injuries alleged in AC ¶ 308(a-h), and again, fail to identify any specific allegation
13
of actual harm to Plaintiffs.2 Notably, in their 53-page response, Plaintiffs never explain why, if
14
these theories are true, Plaintiff Lalo bought a new device for full value in October 2011 (despite
15
his own claims of diminished value due to data “siphoning”). (See Apple Mem. at 2 n.1; AC
16
¶ 36.) While Mr. Lalo is only one Plaintiff, his purchase of a new iPhone months after filing suit
17
speaks volumes about the lack of harm suffered by any of the named Plaintiffs. This Court
18
rejected these damage theories once, and should do so again.
Despite their attempts to repackage their injuries, Plaintiffs have still not identified a
19
20
single non-theoretical injury that impacted any of them, much less harm that is fairly traceable to
21
Apple. (Apple Mem. at 7-8.) Plaintiffs have not, for example, alleged that a particular Plaintiff
22
incurred excess data charges because of anonymous cell tower and Wi-Fi hotspot data being sent
23
to Apple. Nor does any Plaintiff allege that her storage capacity or battery life has been
24
exhausted or that the use of her iPhone was impacted in any other way by the alleged storage or
25
26
2
27
28
See also Transcript of Proceedings, Sept. 8, 2011, Dkt. 43-1; Beringer Decl., Ex. C. at 13:2514:3 (identifying “potential damage to the iDevice in the sense that it consumes resources; limited
battery and memory capacity; processing power and bandwidth”).
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
3
1
collection of data.3 In short, no Plaintiff has alleged that her device was impaired at all. (See
2
Apple Mem. at 24.) Czech v. Wall St. on Demand, Inc., 674 F. Supp. 2d 1102 (D. Minn. 2009)
3
(damage theory based on consumption of storage is implausible).4
4
In fact, Plaintiffs Gupta and Rodimer (on behalf of the Geolocation class) concede that
5
they suffered no harm and base their claims on the far-fetched and theoretical possibility that if
6
their iPhones fell into the wrong hands, unspecified data stored on their iPhones “potentially
7
subjects [them] to a host of harms, including stalking.” (AC ¶ 157 (emphasis added).) But these
8
speculative harms could have occurred only if someone else (1) unlawfully obtained their device,
9
(2) managed to hack into their phone or computer and bypass their password, and (3) was
10
motivated to spend days analyzing complex, indeterminate data about the location of cell towers
11
and Wi-Fi hotspots (not Plaintiffs). (Zwillinger Decl., Ex. B Apple’s Q&A on Location Data,
12
AC ¶ 145 n.13.) Not surprisingly, Plaintiffs don’t allege that any of this happened, or that such a
13
hypothetical scenario would be fairly traceable to Apple (rather than the third party who obtained
14
the information). Article III requires far more.
15
B.
16
Because they cannot identify harm to any named Plaintiff (or anyone), Plaintiffs assert
Plaintiffs Cannot Bring Claims Under the Wiretap Act or the SCA.
17
that their late-added SCA5 and Wiretap Act claims somehow automatically confer standing.
18
(Resp. at 5.) But none of the numerous law firms that drafted Plaintiffs’ first consolidated
19
complaint thought to include these claims, and for good reason: neither of these statutes, which
20
target illegal access to email and interception of communications by third parties, apply to routine
21
22
23
24
25
26
27
28
3
The Response grossly mischaracterizes the nature of the allegations in the amended complaint.
For example, Plaintiffs cite AC ¶¶ 3, 28, 72(f) and 308 as evidence that they sufficiently alleged
that they incurred costly wireless data usage. (Resp. at 7.) These paragraphs show no such thing.
See ¶ 3 (resource usage was of “measurable and of actual value”); ¶ 28 (Plaintiffs were “unaware
of the undisclosed costs . . . including the appropriation of their iDevice resources and
bandwidth” and “exploitation of their personal information”); ¶ 72(f) (“undisclosed data
transmittal costs”); ¶ 308(a) (alleging resource consumption and degradation of performance
“including hard drive space, memory, processing cycles, and Internet connectivity”).
4
Plaintiffs’ speculative and unsubstantiated “estimate” of the market value of iDevice storage
thus cannot rescue these claims. (AC ¶¶ 118-22, 198.)
5
Plaintiffs have withdrawn the iDevice class’s meritless SCA claim against Apple (Count 11),
and only the Geolocation class’s SCA claim remains. (Resp. at 33 n.30.)
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
4
1
disclosures of data to Apple, advertisers, software developers, or hardware manufacturers,
2
particularly when made by a party to the “communications.” The belated addition of these claims
3
is a last-ditch effort to secure standing where no injury exists. Both claims should be dismissed
4
because neither provides standing or states a claim.
5
1.
6
Personal Computers Are Not Facilities Under the SCA.
Plaintiffs seek to turn the SCA into a far-reaching computer crime statute that creates
7
broad liability for accessing any personal computer or mobile phone. (Resp. at 11.) This effort
8
conflicts with the SCA’s text and existing case law, and exceeds Congress’s intent to protect
9
communications in storage with third party service providers, such as email providers or ISPs.
10
As detailed in Apple’s moving brief, the SCA governs access to electronic
11
communications stored in “facilities,” which are computers operated by “electronic
12
communication service[s]” (“ECS”). (Apple Mem. at 15 (emphasis added).) Contrary to
13
Plaintiffs’ assertions, courts have refused to extend the SCA to end users’ personal computers
14
because the SCA, on its face, defines “facilities” to mean computers operated by ECS providers
15
that process electronic communications on behalf of others — such as ISPs, bulletin board
16
systems, and web-based email services. See United States v. Steiger, 318 F.3d 1039, 1049 (11th
17
Cir. 2003) (holding that a laptop computer is not a facility); Council on Am.-Islamic Relations
18
Action Network, Inc. v. Gaubatz, 793 F. Supp. 2d 311, 335 (D.D.C. 2011) (“the [SCA] clearly is
19
not triggered when a defendant merely accesses a physical client-side computer and limits his
20
access to documents stored on the computer’s local hard drive or other physical media”); see
21
also In re DoubleClick, Inc. Privacy Litig., 154 F. Supp. 2d 497, 526 (S.D.N.Y. 2001) (the SCA
22
does not prohibit websites from placing “cookies” on personal computers because personal
23
computers are not “electronic communication service providers.”).6
24
6
25
26
27
28
The legislative history is consistent with this reading: “Section 2701(a) generally prohibits any
person from intentionally accessing a wire or electronic communication system without
authorization or in excess of authorization, and thereby obtaining access to a wire or electronic
communication while it is in electronic storage in the system. An ‘electronic mail’ service, which
permits a sender to transmit a digital message to the service’s facility, where it is held in storage
until the address requests it, would be subject to Section 2701.” H.R. Rep. No. 99-647, 99th
Cong. at 63 (1986) (emphasis added).
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
5
1
To extend the SCA far beyond its plain text and legislative history, Plaintiffs rely on cases
2
that do not address the “facility” issue directly or involve email systems administered by
3
businesses for employee communications. See In re Intuit Privacy Litig., 138 F. Supp. 2d 1272,
4
1275 n.3 (C.D. Cal. 2001) (defendant waived argument that a computer was not a facility by
5
raising issue for the first time on reply); Expert Janitorial, LLC v. Williams, No. 3:09-CV-283,
6
2010 U.S. Dist. LEXIS 23080, at *13 (E.D. Tenn. Mar. 12, 2010) (holding computers belonging
7
to a business with its own proprietary email system may be facilities).7 Furthermore, Chance v.
8
Avenue A, Inc. assumed that Plaintiffs’ computers were “facilities” under the SCA, but stated that
9
“[a]lthough this observation of the disputed facts initially works in Plaintiffs’ favor, the
10
subsequent implications of this rather strained interpretation of a ‘facility . . .’ are fatal to their
11
cause of action.” 165 F. Supp. 2d 1153, 1161 (W.D. Wash. 2001) (emphasis added). Consistent
12
with Apple’s arguments here, Chance held that if a user’s computer is a facility, the SCA permits
13
any party placing data on the facility to access it because “any communication between the
14
individual computer and the web site [which placed cookies on it] is a communication ‘of or
15
intended for’ that user” and cannot violate the SCA. Id. (See also Apple Mem. at 17-18.)8
16
Accepting Plaintiffs’ argument would make every personal computer owner an ECS
17
provider, with all the attendant duties and responsibilities of a service provider, including:
18
evidence preservation obligations, 18 U.S.C. § 2703(f); electronic surveillance assistance
19
obligations, 18 U.S.C. § 2511(2); and reporting obligations to the National Center for Missing
20
and Exploited Children, 18 U.S.C. § 2258A. Congress, however, only intended to place such
21
responsibilities on those who offer electronic communication services to third parties.9
22
7
23
24
25
26
27
28
An electronic communications service must have multiple users, as a business does, not one
user as a personal computer or smartphone would. 18 U.S.C. § 2510(15) (defining “electronic
communication service” as “any service which provides to users thereof the ability to send or
receive wire or electronic communications”).
8
Plaintiffs appear to acknowledge that personal computers are not “facilit[ies]” under the SCA
by citing case law affirming that “[c]ourts have concluded that ‘electronic communication
service’ encompasses internet service providers as well as telecommunication companies whose
lines carry internet traffic.” (Resp. at 12-13 (citing case).) Unauthorized access to the “facilities”
belonging to those entities, which plainly provide ECS service, is what the SCA forbids, not
unauthorized access to an individual computer or iPhone.
9
If a personal computer is a “facility through which an electronic communication service is
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
6
1
2
3
4
5
6
7
8
9
10
11
12
13
2.
Plaintiffs’ SCA Claims Also Fail Because if the Geolocation Data Was
in Electronic Storage, Apple Was the Intended Recipient.
Plaintiffs’ argument that anonymous geolocation information was in “electronic storage”
pending transmission to Apple but was not intended for Apple is a contradiction in terms.
“Electronic storage” by definition is a temporary intermediate state that is incidental to a
transmission to a third party. 18 U.S.C. § 2510(17). If, as Plaintiffs claim, geolocation data was
temporarily stored pending transmission, the transmission could only be for Apple. As Apple
explained in its motion, under either the SCA or the Wiretap Act, an intended recipient is always
authorized to access such communications. 18 U.S.C. §§ 2511(2)(d), 2701(c). Here, the crux of
Plaintiffs’ claim is that Apple obtained the data to create a map of cell towers and Wi-Fi hotspots.
(AC ¶¶ 136-38.) Plaintiffs cannot have it both ways: the information is stored temporarily
pending transmission to Apple, making Apple the intended recipient, or the information is not in
“electronic storage” in the first place. In either case, a claim cannot be brought under the SCA.
(See Apple Mem. at 16-18.)10
14
C.
15
16
The Wiretap Act Is Inapplicable to Apple’s Alleged Collection of NonContent Information from iPhones.
Plaintiffs’ Wiretap Act claims fail because they do not point to any communications
17
between users and third parties that Apple “intercepted,” and instead allege that Apple obtained
18
Wi-Fi and cell tower data directly from the iPhones. The Act defines “electronic communication”
19
to be the “transfer of . . . data . . . transmitted in whole or in part by a wire, radio, electromagnetic,
20
photoelectronic or photooptical system.” 18 U.S.C. § 2510(12). The Wiretap Act thus prohibits
21
intercepting an electronic communication that is in the process of being transmitted from one
22
location to another, usually between two parties.11 See, e.g., Marsh v. Zaazoom Solutions, LLC,
23
24
25
26
27
28
provided,” plaintiffs could circumvent the limitations and exceptions to the CFAA, such as the
$5,000 damage threshold or exclusion of software-based actions, by asserting an SCA claim for
unauthorized access to any personal computer. 18 U.S.C. § 2701(a)(1).
10
Plaintiffs incorrectly assert that § 2701(c)(2) is inapplicable because “the iPhone customer,”
not Apple, is the ECS “user.” But both can be ECS “users.” Apple is a “user” because
communications are sent to Apple. Section 2701(c)(2) thus bars Plaintiffs’ SCA claim.
11
The Wiretap Act contemplates that communications will usually be between two parties by
providing a defense if one party consents. 18 U.S.C. § 2511(2)(d); Russell v. Am. Broad. Co.,
Inc., No. 94 C 5768, 1995 U.S. Dist. LEXIS 7528, at *4 (N.D. Ill. May 31, 1995) (“[S]ection
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
7
1
No. C-11-0526-YGR, 2012 U.S. Dist. LEXIS 37758, at *53-54 (N.D. Cal. Mar. 20, 2012)
2
(dismissing Wiretap Act claims because “no defendant in this action acquired the information by
3
capturing the transmission of information that was otherwise in the process of being
4
communicated to another party”); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir.
5
2002) (for an interception to occur, a communication “must be acquired during transmission, not
6
while it is in electronic storage”). The geolocation data is only alleged to have been sent to or
7
from Apple, not a third party. Like the SCA, the Wiretap Act provides that an intended recipient
8
of a communication cannot be liable for intercepting that communication. 18 U.S.C.
9
§ 2511(3)(a); see also 18 U.S.C. § 2511(2)(d) (providing it is not unlawful for a person to
10
intercept an electronic communication where such person is a party to the communication or one
11
party has consented); In re Facebook Privacy Litig., 791 F. Supp. 2d 705, 713 (N.D. Cal. 2011)
12
(dismissing Wiretap Act claims based on the receipt of information via a cookie because
13
defendant was an intended recipient).
14
Second, Wi-Fi hotspot and cell tower locations plainly are not “contents,” i.e., “any
15
information concerning the substance, purport, or meaning of that communication.” 18 U.S.C.
16
§ 2510(8). Plaintiffs seek to expand the Wiretap Act to encompass “intrusive” information — but
17
it is not a catch-all privacy statute. In fact, Congress’s 1986 amendments to the Act eliminated
18
the phrase “information concerning the identity of the parties to such communication” from the
19
definition of contents.12 Since then, courts have interpreted “contents” narrowly. Even when
20
(unlike here) personally identifiable information is involved, courts have found the Wiretap Act
21
inapplicable. See Hill v. MCI WorldCom Commc’ns, Inc., 120 F. Supp. 2d 1194, 1196 (S.D. Iowa
22
2000) (personally identifying information about a customer is not contents); Jessup-Morgan v.
23
Am. Online, Inc., 20 F. Supp. 2d 1105, 1108 (E.D. Mich. 1998) (same). Plaintiffs’ Wiretap Act
24
25
26
27
28
2511(2)(d) unambiguously states that it shall not be unlawful for a person to intercept a
communication where “‘such person is a party to the conversation’” or where ‘one of the parties’
has consented to the recording.”).
12
Plaintiffs’ reliance on Pharmatrak and Gelbard v. United States, 408 U.S. 41, 51 n.10 (1972),
is misplaced because Gelbard interpreted the pre-1986 definition of contents. Nix v. O’Malley,
160 F.3d 343, 346 n.3 (6th Cir. 1998), is also inapposite because it involved recording voice calls.
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
8
1
2
3
claim misconstrues the statute and should be dismissed.
D.
Plaintiffs Cannot State a Claim Under CFAA.
1.
Plaintiffs’ Claims Are Not About Unauthorized Access.
4
The Geolocation Plaintiffs do not contend that Apple hacked into their iDevices or
5
engaged in any conduct that triggers the CFAA’s narrow prohibition on unauthorized access to a
6
computer. To the contrary, their claims are based on the functionality of software contained on
7
iDevices Apple manufactured and sold, which collected basic data about WiFi hotspots and cell
8
towers (not the device or user) and sent that data to Apple’s servers. (AC ¶¶ 138, 151.) Apple
9
thus did not engage in “unauthorized access” by installing software on phones it manufactured.
10
(AC ¶ 11.) Plaintiffs can no more pursue computer hacking claims against Apple based on the
11
“resources” consumed by the software installed or downloaded to their iPhones than plaintiffs can
12
sue Microsoft any time the latest Windows update takes up space on a computer hard disk. If a
13
computer hacking claim based on “consumption of resources” were viable, any software
14
functionality that was not pre-approved would give rise to a § 1030 claim against a software
15
developer — exactly the outcome Congress intended to avoid when it amended the CFAA in
16
2001 to protect software design.
17
2.
Plaintiffs Improperly Base Their CFAA Claims on Software Design.
18
The CFAA no longer permits plaintiffs to bring claims based on the negligent design or
19
manufacture of hardware, software, or firmware. See 18 U.S.C. § 1030(g). In their Response,
20
Plaintiffs rely on In re AOL, Inc. Version 5.0 Software Litig., 168 F. Supp. 2d 1359 (S.D. Fla.
21
2001) and In re Toys ‘R Us Privacy Litig., No. 00-CV-2746 MMC, 2001 U.S. Dist. LEXIS 16947
22
(N.D. Cal. Oct. 9, 2001), which, in turn, relied on the AOL 5.0 cases. But after these cases,
23
Congress amended the CFAA in the USA PATRIOT Act of 2001 to preclude just such software-
24
based claims. Congress added a sentence to 18 U.S.C. § 1030(g), which this Court quoted: “No
25
cause of action may be brought under this subsection for the negligent design or manufacture of
26
computer hardware, computer software, or firmware.” (Order at 16.)
27
Moreover, Plaintiffs cannot aggregate their damages to meet the $5,000 statutory
28
minimum. First, Plaintiffs have no damages to aggregate, because the mere occupation of hard
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
9
1
drive space, or bandwidth, does not constitute damages under the CFAA. (See Apple Mem. at
2
24.) Czech, 674 F. Supp. 2d at 1102 (damage theory based on mere consumption of storage is
3
implausible). Second, aggregation is generally only allowed where the harm occurs as a result of
4
a single act or a series of acts against the same plaintiff.13 Here, however, the only act alleged to
5
have caused harm is the release of software, which cannot serve as the basis for aggregation.
6
3.
7
Plaintiffs Cannot Demonstrate Damage Under the CFAA, and Claims
Under 18 U.S.C. § 1030(a)(5) Cannot Be Based on “Loss.”
Plaintiffs make separate damage arguments on behalf of each class, but those arguments
8
boil down to theories that this Court has already rejected. The Geolocation Class’s latest attempt
9
to put an arbitrary and unsubstantiated price tag14 on the consumption of resources is insufficient.
10
This Court already found that the same actions alleged in the previous complaint did not interfere
11
with the iDevice’s ordinary and intended operation for purposes of injury under Article III
12
standing, much less “damage” under the CFAA. (Order at 19.) As to the iDevice class,
13
Plaintiffs’ rehashed arguments about the economic value of their personal information were also
14
rejected by this Court. (Id.) Moreover, the alleged collection of “personal information” does not
15
impair the integrity of the data, and any loss of confidentiality is not damage under the CFAA.
16
See 18 U.S.C. § 1030(a)(5)(B); Consulting Prof’l Res., Inc. v. Concise Techs. LLC, No. 09-1201,
17
2010 U.S. Dist. LEXIS 32573, at *21 (W.D. Pa. Mar. 9, 2010) (“‘damage’” does not “include
18
inappropriate use of data after it has been accessed”), rep. & rec. adopted, 2010 U.S. Dist. LEXIS
19
31489 (W.D. Pa. Mar. 31, 2010).
20
E.
21
Plaintiffs Do Not State a Claim Under the California Constitution.
Using anonymous location data to build a digital map of “the geographic location of
22
23
24
25
26
27
28
13
Creative Computing v. Getloaded.com LLC, 386 F.3d 930, 935 (9th Cir. 2004), which
Plaintiffs cite, involved intrusions to a single plaintiff’s network over a one-year period. See also
La Court v. Specific Media, Inc., No. 10-1256-GW(JCGx), 2011 U.S. Dist. LEXIS 50543, at *17
n.4 (C.D. Cal. Apr. 28, 2011) (“It is not clear that, in a civil action not brought by the United
States, harm to different persons over a one-year period can be aggregated unless it relates to
conduct affecting a single computer.”); but see In re Apple & AT & TM Antitrust Litig., 596 F.
Supp. 2d 1288, 1308 (N.D. Cal. 2008) (incorrectly relying on the pre-amendment software cases).
14
Plaintiffs allege their speculative “belief” regarding the amount of storage used, but fail to
specify the amount of storage used on any particular Plaintiff’s iDevice. (See AC ¶ 118.)
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
10
1
cellular towers and wireless networks throughout the United States” is an extraordinary consumer
2
innovation — not an invasion of privacy (much less a serious one) — under the California
3
Constitution. (AC ¶ 137.) Plaintiffs’ Response fails to explain how collecting anonymous
4
information about wireless networks and cell towers demonstrates a serious invasion of privacy.
5
Indeed, the data allegedly collected had nothing to do with any consumer, and the Geolocation
6
Plaintiffs do not point to a single piece of geolocation information Apple collected that was in any
7
way linked to the Plaintiffs or their iPhones. Rather, the only location information that the FAC
8
describes is the location of cell towers and hot spots in the United States — information that does
9
not concern the Plaintiffs and is not private in any event. (AC ¶¶ 137-38; Zwillinger Decl., Ex.
10
B.) These allegations do not come close to stating a claim for violation of the right to privacy
11
under the California Constitution. (MID Mot. to Dismiss at 24.)15
12
F.
13
Plaintiffs’ CLRA claim “necessarily fails” without a sufficient allegation of damage
14
resulting from a defendant’s violation of the CLRA. (Order at 14.) As described above, Plaintiffs
15
have not alleged facts demonstrating that any individual Plaintiff sustained any actual damage.
16
Moreover, Plaintiffs do not dispute that the CLRA does not apply to software. Instead,
Plaintiffs’ CLRA Claim Should Be Dismissed.
17
Plaintiffs argue that their claim is premised on supposed misrepresentations about their iDevices.
18
(Resp. at 36.) But that is not what they pled: as in the prior complaint, their claims are based
19
upon harm allegedly caused by the software of certain apps and the operating system designed by
20
Apple. (See, e.g., AC ¶ 161 (“Defendants’ software accesses personal information”); ¶ 265
21
(Apple “designed its iOS 4 software to retrieve and transmit geolocation information”).
22
The CLRA applies only to a “transaction” resulting in the sale of goods or services to a
23
consumer. Cal. Civ. Code § 1770(a). Under the CLRA, Plaintiffs’ “original purchase of the
24
iPhone is a separate transaction” from the free apps and geolocation features they accessed after
25
the original purchase. Wofford v. Apple, Inc., No. 11-CV-0034 AJB NLS, 2011 U.S. Dist. LEXIS
26
27
28
15
The Mobile Industry Defendants’ briefs also refute the iDevice class’s constitutional claims,
and Apple adopts and agrees with the Mobile Industry Defendants’ reply.
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
11
1
129852, at *6 (S.D. Cal. Nov. 9, 2011) (emphasis added).16 The software, including iOS, that
2
allegedly caused the speculative injury is not a tangible good or service under the CLRA. (Order
3
at 14.) Moreover, Plaintiffs’ claim fails because they do not dispute that a CLRA violation may
4
be alleged only by someone who acquires covered goods “by purchase or lease,” and the iDevice
5
class challenges only the functionality of free apps Plaintiffs received. Cal. Civ. Code § 1716(d).
6
G.
7
1.
8
9
Plaintiffs’ Claim Under California’s UCL Must Be Dismissed.
Plaintiffs Cannot Establish Standing to Bring a UCL Claim.
The FAC does not allege that Plaintiffs have “lost money or property,” as required to
establish standing under the UCL. Plaintiffs have tried to twist their theory by arguing that had
10
they known about the alleged collection and sharing of their personal information, they would not
11
have purchased or would have spent some unspecified lesser amount for their iPhones. (Resp. at
12
39.) But that simply dresses up old claims in new clothing: Plaintiffs cannot allege that they
13
relied, when purchasing their iPhones, on the practices of apps they voluntarily downloaded after
14
purchase or the operation of software after changing settings on their iPhone.
15
Plaintiffs rely on two cases to support standing: Kwikset Corp. v. Superior Court and
16
Degelmann v. Advanced Medical Optics, Inc. (Resp. at 39.) Both are inapposite because in both,
17
defendants had made affirmative misrepresentations on product packaging that plaintiffs
18
allegedly saw and relied upon in making their purchasing decisions. Kwikset, 51 Cal. 4th 310,
19
319 (2011). Plaintiffs here do not (and cannot) allege that they saw, read, and relied on any
20
alleged misrepresentation before they purchased their iPhones. Moreover, Plaintiffs’ complaint
21
relies on events that allegedly occurred after they purchased their phones — based on
22
downloading free apps or changing the settings on their phones — not misrepresentations on the
23
product label. Kwikset and Degelmann do not help Plaintiffs here, where no Plaintiff alleges
24
that he relied upon any affirmative misrepresentation at the time he purchased an iPhone.
25
26
27
28
16
Contrary to Plaintiffs’ assertion, Kowalsky v. Hewlett-Packard Co., No. 10-CV-02176-LHK,
(N.D. Cal. Aug. 10, 2011), slip op. (J. Koh), did not discuss the CLRA’s applicability to software.
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
12
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
2.
Plaintiffs Fail to Allege “Fraudulent,” “Unfair,” or “Unlawful”
Conduct.
Plaintiffs do not dispute that Rule 9(b)’s heightened pleading standard applies to the
CLRA and all prongs of the UCL. Plaintiffs cannot satisfy Rule 9(b) with conclusory allegations
about a supposed “partial representation” they do not identify, an alleged omission, and their
general allegations that they “relied upon” or “were deceived by” representations. (Resp. at 41.)
These allegations fall far short of the required “‘who, what, when, where, and how’ of the
misconduct charged.” Kearns v. Ford Motor Co., 567 F.3d 1120, 1124 (9th Cir. 2009) (citation
omitted). The FAC does not allege any specific representation that each Plaintiff was allegedly
exposed to; which, if any, representation each Plaintiff allegedly saw, read, and relied on; when or
where it was made; who made the alleged representation; or any other specific circumstances
regarding Apple’s alleged fraud, all of which are required to meet Rule 9(b). These failures are
fatal under Kearns, 567 F.3d at 1124, as well as Mazza v. American Honda Motor Co., 666 F.3d
581, 596 (9th Cir. 2012) (requiring exposure to and reliance on alleged representations).
Likewise, Plaintiffs fail to plead a claim under the UCL’s “unfairness” prong. Plaintiffs
do not dispute that Camacho v. Auto Club of Southern California, 142 Cal. App. 4th 1394, 1403
(2006), applies to Plaintiffs’ “unfairness” claim under the UCL. (Resp. at 41-42.) But Plaintiffs
do not allege the facts required to satisfy that test: (1) a substantial consumer injury; (2) that the
injury is not outweighed by countervailing benefits to consumers; and (3) that the injury is one
that consumers could not reasonably have avoided. Camacho, 142 Cal. App. 4th at 1403.
Indeed, Plaintiffs fail to allege any “consumer injury,” much less a substantial one. See
Section I.A., supra. Moreover, Plaintiffs do not even attempt to allege that the claimed injury is
not outweighed by the benefits offered by their iPhones and the apps they have chosen to use, or
that they were compelled to purchase iPhones or download apps. As this Court previously stated,
“Plaintiffs have alternatives to the iDevices,” and apps “are nonessential recreational activities.”
(Order at 11.) Indeed, Plaintiffs concede that “Apple’s competitors manufacture, market, and
distribute comparable mobile devices that do not collect personal information and track Plaintiffs
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
13
1
without permission . . . .” (AC ¶ 83.)17
2
Plaintiffs rely on their other claims to establish a predicate violation of the “unlawful”
3
prong of the UCL. Because Plaintiffs have failed to allege a violation of any of these laws, their
4
claim under the “unlawful” prong of the UCL should be dismissed with prejudice as well.
5
H.
6
The iDevice Plaintiffs do not dispute that the iTunes privacy policy governs their claims
7
but argue that a UDID — an alphanumerical serial number — somehow should be considered to
8
be “personal information.” (Resp. at 21.) A UDID, however, is exactly what it claims to be, a
9
Device Identifier — not a personal identifier. (AC ¶ 2.)18 The UDID identifies a particular
10
iDevice for the entire life of that device — regardless of whether it is loaned out to another
11
individual, resold, used by different members of a family, or transferred among employees. By
12
definition, a UDID does not identify a unique individual any more than the serial number on a TV
13
set identifies its owner — and, not surprisingly, Plaintiffs do not attempt to cite any instance
14
where their UDID was used to (or able to) identify them. Apple’s policies are thus consistent —
15
a UDID is not personal information, and Apple expressly obtained the right to collect and share it.
16
Because they recognize that the iTunes Privacy Policy permits Apple to obtain the
17
location data at issue here, Plaintiffs now argue that the Privacy Policy somehow does not apply.
18
(Resp. at 11; see also McCabe Decl., Ex. G at 1-2, Case No. 10-cv-05878-LHK, ECF No. 143-7
19
(Privacy Policy provides that Apple “may collect information such as . . . unique device identifier,
20
location . . . so that we can better understand customer behavior and improve our products,
21
services, and advertising.”).) Plaintiffs provide no support or explanation for their claim that the
Apple’s Privacy Policy Bars Plaintiffs’ Claims.
22
23
24
25
26
27
28
17
Plaintiffs cite one sentence in AC ¶ 333 that encompasses a half-hearted attempt to plead
“unfair” conduct “tethered” to a legislatively declared policy. In that sentence, Plaintiffs vaguely
reference the CLRA, right to privacy, and unnamed “California statutes,” but do not identify how
any supposed policies are violated by the conduct alleged in the FAC. See, e.g., Khoury v. Maly’s
of Cal., Inc., 14 Cal. App. 4th 612, 619 (1993).
18
Contrary to Plaintiffs’ reading, regulators, like Apple, have only treated device identifiers as
personal information when combined with other data. Indeed, the first time the FTC suggested
that a UDID should be treated as if it were personally identifiable was in connection with UDIDs
collected from children in its recent draft COPPA rulemaking. Comments to FTC, COPPA Rule,
Proposed Rule, 76 Fed. Reg. 59804 (Sept. 27, 2011).
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
14
1
Privacy Policy does not apply to them, and indeed, the FAC specifically relies on the Privacy
2
Policy. (AC ¶¶ 77, 78, 315.) Plaintiffs make conclusory allegations that Apple collected “[their]
3
location data,” but other allegations in the complaint make clear that, at most, Apple collected
4
anonymous “maps” of surrounding Wi-Fi hot spots and cell towers in a several mile radius — not
5
Plaintiffs’ location data. Plaintiffs also do not (and cannot) allege that any location data was
6
furnished to Apps when location services were off. Plaintiffs’ claim that they “withdrew their
7
consent” to have Apple collect “their location data to provide [location services]” is of no
8
consequence here, because Plaintiffs have made no specific allegations that Apple collected
9
Plaintiffs’ location data or used any data to provide location services to Plaintiffs after they
10
turned off Location Services. (Resp. at 10.)
11
I.
12
The Limitations on Apple’s Duties to Users Contained in Its User Agreements
Are Valid and Enforceable.
Plaintiffs’ arguments that Apple cannot disclaim liability are misplaced and demonstrate
13
flaws in Plaintiffs’ negligence claims beyond those identified in Apple’s moving papers. (Apple
14
Mem. at 29-30.)19 Apple’s agreements make clear that it has not assumed a duty to review apps
15
prior to purchase — and Plaintiffs have not identified a legal duty that would supplant Apple’s
16
contracts. (Order at 13.) While Cal. Civ. Code § 1668 precludes disclaiming liability for
17
negligence if doing so would harm the public interest, it has no impact on contractual provisions
18
that limit the scope of any duty owed. As set forth in Apple’s motion, Apple’s contracts make
19
clear it has not assumed such a duty, thus it has not disclaimed liability improperly. The
20
contract’s express provisions stating that App Developers are liable for damages from using Apps
21
is a logical corollary of Apple’s clear disclosures that it is not undertaking a duty to review Apps.
22
23
III.
CONCLUSION
For the foregoing reasons, Apple respectfully requests that the Court dismiss all claims
24
against it, with prejudice.
25
26
19
27
28
In order to avoid repetitive briefing, Apple adopts the arguments with regard to Plaintiffs’
trespass, conversion, and common counts claims set forth in the Mobile Industry Defendants’
brief, as equally applicable to claims brought against Apple.
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
15
1
2
Dated: April 5, 2012
ZWILLGEN PLLC
3
4
5
By:
/s/ Marc J. Zwillinger
Marc J. Zwillinger
Attorneys for Defendant Apple Inc.
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS
Case No. 5:11-md-02250-LHK
16
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?