In Re: iPhone/iPad Application Consumer Privacy Litigation

Filing 54

REPLY (re #42 MOTION to Dismiss Defendant Apple Inc.'s Notice of Motion and Motion to Dismiss Plaintiffs' First Amended Consolidated Class Action Complaint Pursuant to Rules 12(b)(1) and 12(b)(6); Supporting Memorandum of Points and Authorities ) filed byApple, Inc.. (Attachments: #1 Declaration of Marc J. Zwillinger)(Zwillinger, Marc) (Filed on 4/5/2012)

Download PDF
1 2 3 4 MARC J. ZWILLINGER (pro hac vice) marc@zwillgen.com JACOB A. SOMMER (pro hac vice pending) jake@zwillgen.com ZWILLGEN PLLC 1705 N St NW Washington, DC 20036 Telephone: 202.296.3585 5 6 7 8 PENELOPE A. PREOVOLOS (CA SBN 87607) PPreovolos@mofo.com MORRISON & FOERSTER LLP 425 Market Street San Francisco, California 94105-2482 Telephone: 415.268.7000 Facsimile: 415.268.7522 9 Attorneys for Defendant Apple Inc. 10 11 UNITED STATES DISTRICT COURT 12 NORTHERN DISTRICT OF CALIFORNIA 13 SAN JOSE DIVISION 14 15 In Re: iPhone/iPad Application Consumer Privacy Litigation Case No. 5:11-md-02250-LHK 16 CLASS ACTION 17 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS PLAINTIFFS’ FIRST AMENDED CONSOLIDATED CLASS ACTION COMPLAINT PURSUANT TO RULES 12(B)(1) AND 12(B)(6) 18 19 20 21 22 Date: Time: Ctrm: Judge: 23 24 25 26 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK May 3, 2012 1:30pm 8, 4th Floor Honorable Lucy H. Koh 1 TABLE OF CONTENTS 2 Page 3 TABLE OF AUTHORITIES ........................................................................................................ii  I.  INTRODUCTION ............................................................................................................ 1  II.  ARGUMENT .................................................................................................................... 3  A.  Plaintiffs Have Not Alleged Injury-in-Fact........................................................... 3  B.  Plaintiffs Cannot Bring Claims Under the Wiretap Act or the SCA..................... 4  1.  Personal Computers Are Not Facilities Under the SCA. ..........................5  2.  Plaintiffs’ SCA Claims Also Fail Because if the Geolocation Data Was in Electronic Storage, Apple Was the Intended Recipient. .................................................................................................. 7  C.  The Wiretap Act Is Inapplicable to Apple’s Alleged Collection of Non-Content Information from iPhones. .............................................................. 7  D.  Plaintiffs Cannot State a Claim Under CFAA. ..................................................... 9  1.  Plaintiffs’ Claims Are Not About Unauthorized Access. .........................9  2.  Plaintiffs Improperly Base Their CFAA Claims on Software Design. ...................................................................................................... 9  3.  Plaintiffs Cannot Demonstrate Damage Under the CFAA, and Claims Under 18 U.S.C. § 1030(a)(5) Cannot Be Based on “Loss.”................................................................................................ 10  E.  Plaintiffs Do Not State a Claim Under the California Constitution.................... 10  F.  Plaintiffs’ CLRA Claim Should Be Dismissed................................................... 11  G.  Plaintiffs’ Claim Under California’s UCL Must Be Dismissed.......................... 12  1.  Plaintiffs Cannot Establish Standing to Bring a UCL Claim.................. 12  2.  Plaintiffs Fail to Allege “Fraudulent,” “Unfair,” or “Unlawful” Conduct. .............................................................................. 13  H.  Apple’s Privacy Policy Bars Plaintiffs’ Claims. ................................................. 14  4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 I.  III.  The Limitations on Apple’s Duties to Users Contained in Its User Agreements Are Valid and Enforceable. ............................................................ 15  CONCLUSION ...............................................................................................................15  22 23 24 25 26 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK i 1 TABLE OF AUTHORITIES 2 Page(s) 3 CASES 4 Camacho v. Auto Club of S. Cal., 142 Cal. App. 4th 1394 (2006) ............................................................................................... 13 5 6 Chance v. Avenue A, Inc., 165 F. Supp. 2d 1153 (W.D. Wash. 2011)................................................................................ 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Consulting Prof’l Res., Inc. v. Concise Techs. LLC, No. 09-1201, 2010 U.S. Dist. LEXIS 32573 (W.D. Pa. Mar. 9, 2010), rep. & rec. adopted, 2010 U.S. Dist. LEXIS 31489 (W.D. Pa. Mar. 31, 2010) ..................... 10 Council on Am.-Islamic Relations Action Network, Inc. v. Gaubatz, 793 F. Supp. 2d 311 (D.D.C. 2011) .......................................................................................... 5 Creative Computing v. Getloaded.com LLC, 386 F.3d 930 (9th Cir. 2004)........................................................................................... 10 n.13 Czech v. Wall St. on Demand, Inc., 674 F. Supp. 2d 1102 (D. Minn. 2009) ............................................................................... 4, 10 Expert Janitorial, LLC v. Williams, No. 3:09-CV-283, 2010 U.S. Dist. LEXIS 23080 (E.D. Tenn. Mar. 12, 2010)........................ 6 Gelbard v. United States, 408 U.S. 41 (1972) ............................................................................................................ 8 n.12 Hill v. MCI WorldCom Commc’ns, Inc., 120 F. Supp. 2d 1194 (S.D. Iowa 2000) ................................................................................... 8 In re AOL, Inc. Version 5.0 Software Litig., 168 F. Supp. 2d 1359 (S.D. Fla. 2001) ..................................................................................... 9 In re Apple & AT & TM Antitrust Litig., 596 F. Supp. 2d 1288 (N.D. Cal. 2008) .......................................................................... 10 n.13 In re DoubleClick, Inc. Privacy Litig., 154 F. Supp. 2d 497 (S.D.N.Y. 2001)....................................................................................... 5 24 25 26 27 In re Facebook Privacy Litig., 791 F. Supp. 2d 705 (N.D. Cal. 2011) ...................................................................................... 8 In re Intuit Privacy Litig., 138 F. Supp. 2d 1272 (C.D. Cal. 2001) .................................................................................... 6 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK ii 1 2 3 4 5 6 7 8 9 10 11 In re Toys ‘R Us Privacy Litig., No. 00-CV-2746 MMC, 2001 U.S. Dist. LEXIS 16947 (N.D. Cal. Oct. 9, 2001) ................... 9 Jessup-Morgan v. Am. Online, Inc., 20 F. Supp. 2d 1105 (E.D. Mich. 1998).................................................................................... 8 Kearns v. Ford Motor Co., 567 F.3d 1120 (9th Cir. 2009)................................................................................................. 13 Khoury v. Maly’s of Cal., Inc., 14 Cal. App. 4th 612 (1993) ........................................................................................... 14 n.17 Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2002)..................................................................................................... 8 Kowalsky v. Hewlett-Packard Co., No. 10-CV-02176-LHK (N.D. Cal. Aug. 10, 2011), slip op. ......................................... 12 n.16 Kwikset Corp. v. Superior Court, 51 Cal. 4th 310 (2011) ............................................................................................................ 12 12 13 14 15 16 La Court v. Specific Media, Inc., No. 10-1256-GW(JCGx), 2011 U.S. Dist. LEXIS 50543 (C.D. Cal. Apr. 28, 2011)..... 10 n.13 Marsh v. Zaazoom Solutions, LLC, No. C-11-0526-YGR, 2012 U.S. Dist. LEXIS 37758 (N.D. Cal. Mar. 20, 2012) .................... 8 Mazza v. Am. Honda Motor Co., 666 F.3d 581 (9th Cir. 2012)................................................................................................... 13 17 18 19 20 21 Nix v. O’Malley, 160 F.3d 343 (6th Cir. 1998)............................................................................................. 8 n.12 Russell v. Am. Broad. Co., Inc., No. 94 C 5768, 1995 U.S. Dist. LEXIS 7528 (N.D. Ill. May 31, 1995)........................... 7 n.11 United States v. Steiger, 318 F.3d 1039 (11th Cir. 2003)................................................................................................. 5 22 23 24 Wofford v. Apple, Inc., No. 11-CV-0034 AJB NLS, 2011 U.S. Dist. LEXIS 129852 (S.D. Cal. Nov. 9, 2011) .................................................................................................... 11-12 25 26 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK iii 1 STATUTES 2 18 U.S.C. § 1030........................................................................................................................................ 9 § 1030(a)(5)............................................................................................................................. 10 § 1030(g) ................................................................................................................................... 9 § 2258A..................................................................................................................................... 6 § 2510(8) ................................................................................................................................... 8 § 2510(12) ................................................................................................................................. 7 § 2510(15) ........................................................................................................................... 6 n.7 § 2510(17) ................................................................................................................................. 7 § 2511(2) ................................................................................................................................... 6 § 2511(2)(d) .............................................................................................................. 7 & n.11, 8 § 2511(3)(a)............................................................................................................................... 8 § 2701(a)(1)......................................................................................................................... 7 n.9 § 2701(c) ....................................................................................................................... 7 & n.10 § 2703(f).................................................................................................................................... 6 3 4 5 6 7 8 9 10 11 13 Cal. Civ. Code § 1668...................................................................................................................................... 15 § 1716(d) ................................................................................................................................. 12 § 1770(a) ................................................................................................................................. 11 14 OTHER AUTHORITIES 15 16 Comments to FTC, COPPA Rule, Proposed Rule, 76 Fed. Reg. 59804 (Sept. 27, 2011) ............................................................................................................... 14 n.18 17 H.R. Rep No. 99-647, 99th Cong. (1986) ................................................................................. 5 n.6 12 18 19 20 21 22 23 24 25 26 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK iv 1 I. INTRODUCTION The opening paragraph of Plaintiffs’ response says all this Court needs to know. In it, 2 3 Plaintiffs continue to rely on the vague and nonspecific theory that they somehow were injured 4 because the “personal information and data resources of Plaintiffs was an undisclosed and 5 involuntary cost of the use of their iDevice.” (Resp. at 1.) This Court has squarely rejected the 6 theory that the iDevices are “‘less secure’ and ‘less valuable’ in light of the privacy concerns.” 7 (Order at 6.) Because Plaintiffs still do not offer any “particularized example” or explain how 8 any one of them suffered identifiable harm, they again fail to demonstrate Article III standing. Plaintiffs attempt to salvage these deficient theories by focusing on new statutory claims 9 10 (under the Stored Communications Act (“SCA”) and Wiretap Act) that they hope will 11 automatically confer standing. But their opposition confirms the reason that Plaintiffs omitted 12 these claims from their previous complaint: the alleged conduct does not implicate these statutes, 13 and they do not provide Plaintiffs with a right to relief. Among other things, the SCA does not 14 apply to information obtained from an individual’s phone or personal computing device, only to 15 information held in an electronic communication facility — such as emails on an email provider’s 16 server. And neither statute applies where Apple is alleged to be receiving information directly 17 from the phones it manufactured, not accessing or “intercepting” communications between 18 iPhone users and third parties. 19 Aware that they cannot cure the defects with the iDevice class claims detailed in the 20 Court’s Order, Plaintiffs change tack and focus on rehashed claims asserted by the so-called 21 “Geolocation Class.”1 These manufactured claims are entirely speculative and fail to set forth a 22 plausible claim that Apple tracked the location of Plaintiffs Gupta or Rodimer (or any other 23 1 24 25 26 27 28 Plaintiffs suggest that the previous complaint lacked “geolocation” claims, which “have not yet been ruled on by this Court.” (Resp. at 3.) But Plaintiffs’ Counsel told the Court last May when arguing against a stay pending consolidation: “There was also a story that broke on literally the same day that the Consolidated Complaint was filed, it publicly broke, which dealt with the issue that’s been mentioned a few times today regarding the issue of geolocation. That geolocation issue does exist in the Consolidated Complaint.” (See Zwillinger Decl., Ex. A May 25, 2011 Hr’g Tr. at 40:8-15 (emphasis added).) Moreover, the Court addressed the allegation that Apple’s iOS caused iDevices to retain “unencrypted location history files,” but held that such speculative allegations of injury do not support Article III Standing. (Order at 9.) DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 1 1 consumer) — and Apple did not. Tellingly, Plaintiffs Gupta and Rodimer do not identify a single 2 piece of geolocation information from their iPhones that supports their claim that Apple “tracked” 3 or “stored” Plaintiffs’ location data, despite Plaintiffs’ specious claim that “anyone” with access 4 to the device could “easily” obtain such files (e.g., AC ¶ 144). Instead, Plaintiffs speculate that 5 Apple might be able to “track” them using “data revealing the unique identifiers of nearby 6 cellular towers and wireless networks” — not data about Plaintiffs or their device. (Resp. at 3-4 7 (citing AC ¶¶ 138, 144).) As this Court recognized, Plaintiffs’ “speculative allegations” that 8 “Apple’s platform caused ‘users’ iDevices to be able to maintain, synchronize, and retain 9 detailed, unencrypted location history files’” are insufficient to support Article III standing. 10 11 (Order at 9; AC ¶ 137.) Because the Geolocation Plaintiffs cannot allege facts that support their claims, their 12 opposition now asserts that Plaintiffs need “discovery” to “provide . . . details” about “how their 13 private, personal information was stored and transmitted.” (Resp. at 12.) But that request only 14 underscores that these claims are entirely speculative and lack any plausible, factual basis. The 15 Geolocation Plaintiffs base their claims entirely on conjecture following reports of a software bug 16 that caused Apple’s servers to log and store data, in unintended circumstances, about hot spots 17 and cell towers — not data about the iPhone or its user. (See, e.g., ¶¶ AC 137-38, 145, 147-50.) 18 Plaintiffs must do more than mischaracterize news reports and hope that discovery will turn up 19 evidence on their iPhones to support their claims. At a minimum, they must come forward with 20 specific factual allegations that make it plausible to conclude that location data linked to them or 21 their iPhones was in fact collected from or stored on their devices (it was not), and then, that they 22 suffered some concrete, identifiable harm from these supposed practices (they did not). In short, 23 Plaintiffs’ Geolocation claims fail for precisely the same reasons as in the prior complaint: they 24 fail to allege any plausible or concrete injury for Article III standing, and do not come close to 25 alleging the elements of a legally sufficient claim. Further, all of Plaintiffs’ claims fail for 26 numerous additional reasons discussed below. 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 2 1 II. ARGUMENT 2 A. 3 Both classes’ injury claims boil down to the allegations that the iDevices: (1) suffered a Plaintiffs Have Not Alleged Injury-in-Fact. 4 diminution in value due to the alleged use of personal information (AC ¶ 72(o)); and (2) 5 consumed resources in an unexpected and unwanted way. (AC ¶¶ 118-21.) Yet not one of the 6 allegations Plaintiffs cite in their Response describes a “particularized injury” to any Plaintiff — 7 only abstract harms that this Court has rejected. (See Resp. at 9 n.6 (citing AC ¶¶ 30-34, 136-58); 8 Order at 6.) As to diminution in value, Plaintiffs now ask the court to “scan recent headlines” to 9 find that “personal information” should be treated like currency, even as they fail to point to any 10 personally identifying information that Apple collected or disclosed here. (Resp. at 28.) As to 11 resource consumption, the injuries alleged in ¶¶ 170-177 of Plaintiffs’ first complaint are 12 identical to the injuries alleged in AC ¶ 308(a-h), and again, fail to identify any specific allegation 13 of actual harm to Plaintiffs.2 Notably, in their 53-page response, Plaintiffs never explain why, if 14 these theories are true, Plaintiff Lalo bought a new device for full value in October 2011 (despite 15 his own claims of diminished value due to data “siphoning”). (See Apple Mem. at 2 n.1; AC 16 ¶ 36.) While Mr. Lalo is only one Plaintiff, his purchase of a new iPhone months after filing suit 17 speaks volumes about the lack of harm suffered by any of the named Plaintiffs. This Court 18 rejected these damage theories once, and should do so again. Despite their attempts to repackage their injuries, Plaintiffs have still not identified a 19 20 single non-theoretical injury that impacted any of them, much less harm that is fairly traceable to 21 Apple. (Apple Mem. at 7-8.) Plaintiffs have not, for example, alleged that a particular Plaintiff 22 incurred excess data charges because of anonymous cell tower and Wi-Fi hotspot data being sent 23 to Apple. Nor does any Plaintiff allege that her storage capacity or battery life has been 24 exhausted or that the use of her iPhone was impacted in any other way by the alleged storage or 25 26 2 27 28 See also Transcript of Proceedings, Sept. 8, 2011, Dkt. 43-1; Beringer Decl., Ex. C. at 13:2514:3 (identifying “potential damage to the iDevice in the sense that it consumes resources; limited battery and memory capacity; processing power and bandwidth”). DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 3 1 collection of data.3 In short, no Plaintiff has alleged that her device was impaired at all. (See 2 Apple Mem. at 24.) Czech v. Wall St. on Demand, Inc., 674 F. Supp. 2d 1102 (D. Minn. 2009) 3 (damage theory based on consumption of storage is implausible).4 4 In fact, Plaintiffs Gupta and Rodimer (on behalf of the Geolocation class) concede that 5 they suffered no harm and base their claims on the far-fetched and theoretical possibility that if 6 their iPhones fell into the wrong hands, unspecified data stored on their iPhones “potentially 7 subjects [them] to a host of harms, including stalking.” (AC ¶ 157 (emphasis added).) But these 8 speculative harms could have occurred only if someone else (1) unlawfully obtained their device, 9 (2) managed to hack into their phone or computer and bypass their password, and (3) was 10 motivated to spend days analyzing complex, indeterminate data about the location of cell towers 11 and Wi-Fi hotspots (not Plaintiffs). (Zwillinger Decl., Ex. B Apple’s Q&A on Location Data, 12 AC ¶ 145 n.13.) Not surprisingly, Plaintiffs don’t allege that any of this happened, or that such a 13 hypothetical scenario would be fairly traceable to Apple (rather than the third party who obtained 14 the information). Article III requires far more. 15 B. 16 Because they cannot identify harm to any named Plaintiff (or anyone), Plaintiffs assert Plaintiffs Cannot Bring Claims Under the Wiretap Act or the SCA. 17 that their late-added SCA5 and Wiretap Act claims somehow automatically confer standing. 18 (Resp. at 5.) But none of the numerous law firms that drafted Plaintiffs’ first consolidated 19 complaint thought to include these claims, and for good reason: neither of these statutes, which 20 target illegal access to email and interception of communications by third parties, apply to routine 21 22 23 24 25 26 27 28 3 The Response grossly mischaracterizes the nature of the allegations in the amended complaint. For example, Plaintiffs cite AC ¶¶ 3, 28, 72(f) and 308 as evidence that they sufficiently alleged that they incurred costly wireless data usage. (Resp. at 7.) These paragraphs show no such thing. See ¶ 3 (resource usage was of “measurable and of actual value”); ¶ 28 (Plaintiffs were “unaware of the undisclosed costs . . . including the appropriation of their iDevice resources and bandwidth” and “exploitation of their personal information”); ¶ 72(f) (“undisclosed data transmittal costs”); ¶ 308(a) (alleging resource consumption and degradation of performance “including hard drive space, memory, processing cycles, and Internet connectivity”). 4 Plaintiffs’ speculative and unsubstantiated “estimate” of the market value of iDevice storage thus cannot rescue these claims. (AC ¶¶ 118-22, 198.) 5 Plaintiffs have withdrawn the iDevice class’s meritless SCA claim against Apple (Count 11), and only the Geolocation class’s SCA claim remains. (Resp. at 33 n.30.) DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 4 1 disclosures of data to Apple, advertisers, software developers, or hardware manufacturers, 2 particularly when made by a party to the “communications.” The belated addition of these claims 3 is a last-ditch effort to secure standing where no injury exists. Both claims should be dismissed 4 because neither provides standing or states a claim. 5 1. 6 Personal Computers Are Not Facilities Under the SCA. Plaintiffs seek to turn the SCA into a far-reaching computer crime statute that creates 7 broad liability for accessing any personal computer or mobile phone. (Resp. at 11.) This effort 8 conflicts with the SCA’s text and existing case law, and exceeds Congress’s intent to protect 9 communications in storage with third party service providers, such as email providers or ISPs. 10 As detailed in Apple’s moving brief, the SCA governs access to electronic 11 communications stored in “facilities,” which are computers operated by “electronic 12 communication service[s]” (“ECS”). (Apple Mem. at 15 (emphasis added).) Contrary to 13 Plaintiffs’ assertions, courts have refused to extend the SCA to end users’ personal computers 14 because the SCA, on its face, defines “facilities” to mean computers operated by ECS providers 15 that process electronic communications on behalf of others — such as ISPs, bulletin board 16 systems, and web-based email services. See United States v. Steiger, 318 F.3d 1039, 1049 (11th 17 Cir. 2003) (holding that a laptop computer is not a facility); Council on Am.-Islamic Relations 18 Action Network, Inc. v. Gaubatz, 793 F. Supp. 2d 311, 335 (D.D.C. 2011) (“the [SCA] clearly is 19 not triggered when a defendant merely accesses a physical client-side computer and limits his 20 access to documents stored on the computer’s local hard drive or other physical media”); see 21 also In re DoubleClick, Inc. Privacy Litig., 154 F. Supp. 2d 497, 526 (S.D.N.Y. 2001) (the SCA 22 does not prohibit websites from placing “cookies” on personal computers because personal 23 computers are not “electronic communication service providers.”).6 24 6 25 26 27 28 The legislative history is consistent with this reading: “Section 2701(a) generally prohibits any person from intentionally accessing a wire or electronic communication system without authorization or in excess of authorization, and thereby obtaining access to a wire or electronic communication while it is in electronic storage in the system. An ‘electronic mail’ service, which permits a sender to transmit a digital message to the service’s facility, where it is held in storage until the address requests it, would be subject to Section 2701.” H.R. Rep. No. 99-647, 99th Cong. at 63 (1986) (emphasis added). DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 5 1 To extend the SCA far beyond its plain text and legislative history, Plaintiffs rely on cases 2 that do not address the “facility” issue directly or involve email systems administered by 3 businesses for employee communications. See In re Intuit Privacy Litig., 138 F. Supp. 2d 1272, 4 1275 n.3 (C.D. Cal. 2001) (defendant waived argument that a computer was not a facility by 5 raising issue for the first time on reply); Expert Janitorial, LLC v. Williams, No. 3:09-CV-283, 6 2010 U.S. Dist. LEXIS 23080, at *13 (E.D. Tenn. Mar. 12, 2010) (holding computers belonging 7 to a business with its own proprietary email system may be facilities).7 Furthermore, Chance v. 8 Avenue A, Inc. assumed that Plaintiffs’ computers were “facilities” under the SCA, but stated that 9 “[a]lthough this observation of the disputed facts initially works in Plaintiffs’ favor, the 10 subsequent implications of this rather strained interpretation of a ‘facility . . .’ are fatal to their 11 cause of action.” 165 F. Supp. 2d 1153, 1161 (W.D. Wash. 2001) (emphasis added). Consistent 12 with Apple’s arguments here, Chance held that if a user’s computer is a facility, the SCA permits 13 any party placing data on the facility to access it because “any communication between the 14 individual computer and the web site [which placed cookies on it] is a communication ‘of or 15 intended for’ that user” and cannot violate the SCA. Id. (See also Apple Mem. at 17-18.)8 16 Accepting Plaintiffs’ argument would make every personal computer owner an ECS 17 provider, with all the attendant duties and responsibilities of a service provider, including: 18 evidence preservation obligations, 18 U.S.C. § 2703(f); electronic surveillance assistance 19 obligations, 18 U.S.C. § 2511(2); and reporting obligations to the National Center for Missing 20 and Exploited Children, 18 U.S.C. § 2258A. Congress, however, only intended to place such 21 responsibilities on those who offer electronic communication services to third parties.9 22 7 23 24 25 26 27 28 An electronic communications service must have multiple users, as a business does, not one user as a personal computer or smartphone would. 18 U.S.C. § 2510(15) (defining “electronic communication service” as “any service which provides to users thereof the ability to send or receive wire or electronic communications”). 8 Plaintiffs appear to acknowledge that personal computers are not “facilit[ies]” under the SCA by citing case law affirming that “[c]ourts have concluded that ‘electronic communication service’ encompasses internet service providers as well as telecommunication companies whose lines carry internet traffic.” (Resp. at 12-13 (citing case).) Unauthorized access to the “facilities” belonging to those entities, which plainly provide ECS service, is what the SCA forbids, not unauthorized access to an individual computer or iPhone. 9 If a personal computer is a “facility through which an electronic communication service is DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 6 1 2 3 4 5 6 7 8 9 10 11 12 13 2. Plaintiffs’ SCA Claims Also Fail Because if the Geolocation Data Was in Electronic Storage, Apple Was the Intended Recipient. Plaintiffs’ argument that anonymous geolocation information was in “electronic storage” pending transmission to Apple but was not intended for Apple is a contradiction in terms. “Electronic storage” by definition is a temporary intermediate state that is incidental to a transmission to a third party. 18 U.S.C. § 2510(17). If, as Plaintiffs claim, geolocation data was temporarily stored pending transmission, the transmission could only be for Apple. As Apple explained in its motion, under either the SCA or the Wiretap Act, an intended recipient is always authorized to access such communications. 18 U.S.C. §§ 2511(2)(d), 2701(c). Here, the crux of Plaintiffs’ claim is that Apple obtained the data to create a map of cell towers and Wi-Fi hotspots. (AC ¶¶ 136-38.) Plaintiffs cannot have it both ways: the information is stored temporarily pending transmission to Apple, making Apple the intended recipient, or the information is not in “electronic storage” in the first place. In either case, a claim cannot be brought under the SCA. (See Apple Mem. at 16-18.)10 14 C. 15 16 The Wiretap Act Is Inapplicable to Apple’s Alleged Collection of NonContent Information from iPhones. Plaintiffs’ Wiretap Act claims fail because they do not point to any communications 17 between users and third parties that Apple “intercepted,” and instead allege that Apple obtained 18 Wi-Fi and cell tower data directly from the iPhones. The Act defines “electronic communication” 19 to be the “transfer of . . . data . . . transmitted in whole or in part by a wire, radio, electromagnetic, 20 photoelectronic or photooptical system.” 18 U.S.C. § 2510(12). The Wiretap Act thus prohibits 21 intercepting an electronic communication that is in the process of being transmitted from one 22 location to another, usually between two parties.11 See, e.g., Marsh v. Zaazoom Solutions, LLC, 23 24 25 26 27 28 provided,” plaintiffs could circumvent the limitations and exceptions to the CFAA, such as the $5,000 damage threshold or exclusion of software-based actions, by asserting an SCA claim for unauthorized access to any personal computer. 18 U.S.C. § 2701(a)(1). 10 Plaintiffs incorrectly assert that § 2701(c)(2) is inapplicable because “the iPhone customer,” not Apple, is the ECS “user.” But both can be ECS “users.” Apple is a “user” because communications are sent to Apple. Section 2701(c)(2) thus bars Plaintiffs’ SCA claim. 11 The Wiretap Act contemplates that communications will usually be between two parties by providing a defense if one party consents. 18 U.S.C. § 2511(2)(d); Russell v. Am. Broad. Co., Inc., No. 94 C 5768, 1995 U.S. Dist. LEXIS 7528, at *4 (N.D. Ill. May 31, 1995) (“[S]ection DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 7 1 No. C-11-0526-YGR, 2012 U.S. Dist. LEXIS 37758, at *53-54 (N.D. Cal. Mar. 20, 2012) 2 (dismissing Wiretap Act claims because “no defendant in this action acquired the information by 3 capturing the transmission of information that was otherwise in the process of being 4 communicated to another party”); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir. 5 2002) (for an interception to occur, a communication “must be acquired during transmission, not 6 while it is in electronic storage”). The geolocation data is only alleged to have been sent to or 7 from Apple, not a third party. Like the SCA, the Wiretap Act provides that an intended recipient 8 of a communication cannot be liable for intercepting that communication. 18 U.S.C. 9 § 2511(3)(a); see also 18 U.S.C. § 2511(2)(d) (providing it is not unlawful for a person to 10 intercept an electronic communication where such person is a party to the communication or one 11 party has consented); In re Facebook Privacy Litig., 791 F. Supp. 2d 705, 713 (N.D. Cal. 2011) 12 (dismissing Wiretap Act claims based on the receipt of information via a cookie because 13 defendant was an intended recipient). 14 Second, Wi-Fi hotspot and cell tower locations plainly are not “contents,” i.e., “any 15 information concerning the substance, purport, or meaning of that communication.” 18 U.S.C. 16 § 2510(8). Plaintiffs seek to expand the Wiretap Act to encompass “intrusive” information — but 17 it is not a catch-all privacy statute. In fact, Congress’s 1986 amendments to the Act eliminated 18 the phrase “information concerning the identity of the parties to such communication” from the 19 definition of contents.12 Since then, courts have interpreted “contents” narrowly. Even when 20 (unlike here) personally identifiable information is involved, courts have found the Wiretap Act 21 inapplicable. See Hill v. MCI WorldCom Commc’ns, Inc., 120 F. Supp. 2d 1194, 1196 (S.D. Iowa 22 2000) (personally identifying information about a customer is not contents); Jessup-Morgan v. 23 Am. Online, Inc., 20 F. Supp. 2d 1105, 1108 (E.D. Mich. 1998) (same). Plaintiffs’ Wiretap Act 24 25 26 27 28 2511(2)(d) unambiguously states that it shall not be unlawful for a person to intercept a communication where “‘such person is a party to the conversation’” or where ‘one of the parties’ has consented to the recording.”). 12 Plaintiffs’ reliance on Pharmatrak and Gelbard v. United States, 408 U.S. 41, 51 n.10 (1972), is misplaced because Gelbard interpreted the pre-1986 definition of contents. Nix v. O’Malley, 160 F.3d 343, 346 n.3 (6th Cir. 1998), is also inapposite because it involved recording voice calls. DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 8 1 2 3 claim misconstrues the statute and should be dismissed. D. Plaintiffs Cannot State a Claim Under CFAA. 1. Plaintiffs’ Claims Are Not About Unauthorized Access. 4 The Geolocation Plaintiffs do not contend that Apple hacked into their iDevices or 5 engaged in any conduct that triggers the CFAA’s narrow prohibition on unauthorized access to a 6 computer. To the contrary, their claims are based on the functionality of software contained on 7 iDevices Apple manufactured and sold, which collected basic data about WiFi hotspots and cell 8 towers (not the device or user) and sent that data to Apple’s servers. (AC ¶¶ 138, 151.) Apple 9 thus did not engage in “unauthorized access” by installing software on phones it manufactured. 10 (AC ¶ 11.) Plaintiffs can no more pursue computer hacking claims against Apple based on the 11 “resources” consumed by the software installed or downloaded to their iPhones than plaintiffs can 12 sue Microsoft any time the latest Windows update takes up space on a computer hard disk. If a 13 computer hacking claim based on “consumption of resources” were viable, any software 14 functionality that was not pre-approved would give rise to a § 1030 claim against a software 15 developer — exactly the outcome Congress intended to avoid when it amended the CFAA in 16 2001 to protect software design. 17 2. Plaintiffs Improperly Base Their CFAA Claims on Software Design. 18 The CFAA no longer permits plaintiffs to bring claims based on the negligent design or 19 manufacture of hardware, software, or firmware. See 18 U.S.C. § 1030(g). In their Response, 20 Plaintiffs rely on In re AOL, Inc. Version 5.0 Software Litig., 168 F. Supp. 2d 1359 (S.D. Fla. 21 2001) and In re Toys ‘R Us Privacy Litig., No. 00-CV-2746 MMC, 2001 U.S. Dist. LEXIS 16947 22 (N.D. Cal. Oct. 9, 2001), which, in turn, relied on the AOL 5.0 cases. But after these cases, 23 Congress amended the CFAA in the USA PATRIOT Act of 2001 to preclude just such software- 24 based claims. Congress added a sentence to 18 U.S.C. § 1030(g), which this Court quoted: “No 25 cause of action may be brought under this subsection for the negligent design or manufacture of 26 computer hardware, computer software, or firmware.” (Order at 16.) 27 Moreover, Plaintiffs cannot aggregate their damages to meet the $5,000 statutory 28 minimum. First, Plaintiffs have no damages to aggregate, because the mere occupation of hard DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 9 1 drive space, or bandwidth, does not constitute damages under the CFAA. (See Apple Mem. at 2 24.) Czech, 674 F. Supp. 2d at 1102 (damage theory based on mere consumption of storage is 3 implausible). Second, aggregation is generally only allowed where the harm occurs as a result of 4 a single act or a series of acts against the same plaintiff.13 Here, however, the only act alleged to 5 have caused harm is the release of software, which cannot serve as the basis for aggregation. 6 3. 7 Plaintiffs Cannot Demonstrate Damage Under the CFAA, and Claims Under 18 U.S.C. § 1030(a)(5) Cannot Be Based on “Loss.” Plaintiffs make separate damage arguments on behalf of each class, but those arguments 8 boil down to theories that this Court has already rejected. The Geolocation Class’s latest attempt 9 to put an arbitrary and unsubstantiated price tag14 on the consumption of resources is insufficient. 10 This Court already found that the same actions alleged in the previous complaint did not interfere 11 with the iDevice’s ordinary and intended operation for purposes of injury under Article III 12 standing, much less “damage” under the CFAA. (Order at 19.) As to the iDevice class, 13 Plaintiffs’ rehashed arguments about the economic value of their personal information were also 14 rejected by this Court. (Id.) Moreover, the alleged collection of “personal information” does not 15 impair the integrity of the data, and any loss of confidentiality is not damage under the CFAA. 16 See 18 U.S.C. § 1030(a)(5)(B); Consulting Prof’l Res., Inc. v. Concise Techs. LLC, No. 09-1201, 17 2010 U.S. Dist. LEXIS 32573, at *21 (W.D. Pa. Mar. 9, 2010) (“‘damage’” does not “include 18 inappropriate use of data after it has been accessed”), rep. & rec. adopted, 2010 U.S. Dist. LEXIS 19 31489 (W.D. Pa. Mar. 31, 2010). 20 E. 21 Plaintiffs Do Not State a Claim Under the California Constitution. Using anonymous location data to build a digital map of “the geographic location of 22 23 24 25 26 27 28 13 Creative Computing v. Getloaded.com LLC, 386 F.3d 930, 935 (9th Cir. 2004), which Plaintiffs cite, involved intrusions to a single plaintiff’s network over a one-year period. See also La Court v. Specific Media, Inc., No. 10-1256-GW(JCGx), 2011 U.S. Dist. LEXIS 50543, at *17 n.4 (C.D. Cal. Apr. 28, 2011) (“It is not clear that, in a civil action not brought by the United States, harm to different persons over a one-year period can be aggregated unless it relates to conduct affecting a single computer.”); but see In re Apple & AT & TM Antitrust Litig., 596 F. Supp. 2d 1288, 1308 (N.D. Cal. 2008) (incorrectly relying on the pre-amendment software cases). 14 Plaintiffs allege their speculative “belief” regarding the amount of storage used, but fail to specify the amount of storage used on any particular Plaintiff’s iDevice. (See AC ¶ 118.) DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 10 1 cellular towers and wireless networks throughout the United States” is an extraordinary consumer 2 innovation — not an invasion of privacy (much less a serious one) — under the California 3 Constitution. (AC ¶ 137.) Plaintiffs’ Response fails to explain how collecting anonymous 4 information about wireless networks and cell towers demonstrates a serious invasion of privacy. 5 Indeed, the data allegedly collected had nothing to do with any consumer, and the Geolocation 6 Plaintiffs do not point to a single piece of geolocation information Apple collected that was in any 7 way linked to the Plaintiffs or their iPhones. Rather, the only location information that the FAC 8 describes is the location of cell towers and hot spots in the United States — information that does 9 not concern the Plaintiffs and is not private in any event. (AC ¶¶ 137-38; Zwillinger Decl., Ex. 10 B.) These allegations do not come close to stating a claim for violation of the right to privacy 11 under the California Constitution. (MID Mot. to Dismiss at 24.)15 12 F. 13 Plaintiffs’ CLRA claim “necessarily fails” without a sufficient allegation of damage 14 resulting from a defendant’s violation of the CLRA. (Order at 14.) As described above, Plaintiffs 15 have not alleged facts demonstrating that any individual Plaintiff sustained any actual damage. 16 Moreover, Plaintiffs do not dispute that the CLRA does not apply to software. Instead, Plaintiffs’ CLRA Claim Should Be Dismissed. 17 Plaintiffs argue that their claim is premised on supposed misrepresentations about their iDevices. 18 (Resp. at 36.) But that is not what they pled: as in the prior complaint, their claims are based 19 upon harm allegedly caused by the software of certain apps and the operating system designed by 20 Apple. (See, e.g., AC ¶ 161 (“Defendants’ software accesses personal information”); ¶ 265 21 (Apple “designed its iOS 4 software to retrieve and transmit geolocation information”). 22 The CLRA applies only to a “transaction” resulting in the sale of goods or services to a 23 consumer. Cal. Civ. Code § 1770(a). Under the CLRA, Plaintiffs’ “original purchase of the 24 iPhone is a separate transaction” from the free apps and geolocation features they accessed after 25 the original purchase. Wofford v. Apple, Inc., No. 11-CV-0034 AJB NLS, 2011 U.S. Dist. LEXIS 26 27 28 15 The Mobile Industry Defendants’ briefs also refute the iDevice class’s constitutional claims, and Apple adopts and agrees with the Mobile Industry Defendants’ reply. DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 11 1 129852, at *6 (S.D. Cal. Nov. 9, 2011) (emphasis added).16 The software, including iOS, that 2 allegedly caused the speculative injury is not a tangible good or service under the CLRA. (Order 3 at 14.) Moreover, Plaintiffs’ claim fails because they do not dispute that a CLRA violation may 4 be alleged only by someone who acquires covered goods “by purchase or lease,” and the iDevice 5 class challenges only the functionality of free apps Plaintiffs received. Cal. Civ. Code § 1716(d). 6 G. 7 1. 8 9 Plaintiffs’ Claim Under California’s UCL Must Be Dismissed. Plaintiffs Cannot Establish Standing to Bring a UCL Claim. The FAC does not allege that Plaintiffs have “lost money or property,” as required to establish standing under the UCL. Plaintiffs have tried to twist their theory by arguing that had 10 they known about the alleged collection and sharing of their personal information, they would not 11 have purchased or would have spent some unspecified lesser amount for their iPhones. (Resp. at 12 39.) But that simply dresses up old claims in new clothing: Plaintiffs cannot allege that they 13 relied, when purchasing their iPhones, on the practices of apps they voluntarily downloaded after 14 purchase or the operation of software after changing settings on their iPhone. 15 Plaintiffs rely on two cases to support standing: Kwikset Corp. v. Superior Court and 16 Degelmann v. Advanced Medical Optics, Inc. (Resp. at 39.) Both are inapposite because in both, 17 defendants had made affirmative misrepresentations on product packaging that plaintiffs 18 allegedly saw and relied upon in making their purchasing decisions. Kwikset, 51 Cal. 4th 310, 19 319 (2011). Plaintiffs here do not (and cannot) allege that they saw, read, and relied on any 20 alleged misrepresentation before they purchased their iPhones. Moreover, Plaintiffs’ complaint 21 relies on events that allegedly occurred after they purchased their phones — based on 22 downloading free apps or changing the settings on their phones — not misrepresentations on the 23 product label. Kwikset and Degelmann do not help Plaintiffs here, where no Plaintiff alleges 24 that he relied upon any affirmative misrepresentation at the time he purchased an iPhone. 25 26 27 28 16 Contrary to Plaintiffs’ assertion, Kowalsky v. Hewlett-Packard Co., No. 10-CV-02176-LHK, (N.D. Cal. Aug. 10, 2011), slip op. (J. Koh), did not discuss the CLRA’s applicability to software. DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 12 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 2. Plaintiffs Fail to Allege “Fraudulent,” “Unfair,” or “Unlawful” Conduct. Plaintiffs do not dispute that Rule 9(b)’s heightened pleading standard applies to the CLRA and all prongs of the UCL. Plaintiffs cannot satisfy Rule 9(b) with conclusory allegations about a supposed “partial representation” they do not identify, an alleged omission, and their general allegations that they “relied upon” or “were deceived by” representations. (Resp. at 41.) These allegations fall far short of the required “‘who, what, when, where, and how’ of the misconduct charged.” Kearns v. Ford Motor Co., 567 F.3d 1120, 1124 (9th Cir. 2009) (citation omitted). The FAC does not allege any specific representation that each Plaintiff was allegedly exposed to; which, if any, representation each Plaintiff allegedly saw, read, and relied on; when or where it was made; who made the alleged representation; or any other specific circumstances regarding Apple’s alleged fraud, all of which are required to meet Rule 9(b). These failures are fatal under Kearns, 567 F.3d at 1124, as well as Mazza v. American Honda Motor Co., 666 F.3d 581, 596 (9th Cir. 2012) (requiring exposure to and reliance on alleged representations). Likewise, Plaintiffs fail to plead a claim under the UCL’s “unfairness” prong. Plaintiffs do not dispute that Camacho v. Auto Club of Southern California, 142 Cal. App. 4th 1394, 1403 (2006), applies to Plaintiffs’ “unfairness” claim under the UCL. (Resp. at 41-42.) But Plaintiffs do not allege the facts required to satisfy that test: (1) a substantial consumer injury; (2) that the injury is not outweighed by countervailing benefits to consumers; and (3) that the injury is one that consumers could not reasonably have avoided. Camacho, 142 Cal. App. 4th at 1403. Indeed, Plaintiffs fail to allege any “consumer injury,” much less a substantial one. See Section I.A., supra. Moreover, Plaintiffs do not even attempt to allege that the claimed injury is not outweighed by the benefits offered by their iPhones and the apps they have chosen to use, or that they were compelled to purchase iPhones or download apps. As this Court previously stated, “Plaintiffs have alternatives to the iDevices,” and apps “are nonessential recreational activities.” (Order at 11.) Indeed, Plaintiffs concede that “Apple’s competitors manufacture, market, and distribute comparable mobile devices that do not collect personal information and track Plaintiffs 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 13 1 without permission . . . .” (AC ¶ 83.)17 2 Plaintiffs rely on their other claims to establish a predicate violation of the “unlawful” 3 prong of the UCL. Because Plaintiffs have failed to allege a violation of any of these laws, their 4 claim under the “unlawful” prong of the UCL should be dismissed with prejudice as well. 5 H. 6 The iDevice Plaintiffs do not dispute that the iTunes privacy policy governs their claims 7 but argue that a UDID — an alphanumerical serial number — somehow should be considered to 8 be “personal information.” (Resp. at 21.) A UDID, however, is exactly what it claims to be, a 9 Device Identifier — not a personal identifier. (AC ¶ 2.)18 The UDID identifies a particular 10 iDevice for the entire life of that device — regardless of whether it is loaned out to another 11 individual, resold, used by different members of a family, or transferred among employees. By 12 definition, a UDID does not identify a unique individual any more than the serial number on a TV 13 set identifies its owner — and, not surprisingly, Plaintiffs do not attempt to cite any instance 14 where their UDID was used to (or able to) identify them. Apple’s policies are thus consistent — 15 a UDID is not personal information, and Apple expressly obtained the right to collect and share it. 16 Because they recognize that the iTunes Privacy Policy permits Apple to obtain the 17 location data at issue here, Plaintiffs now argue that the Privacy Policy somehow does not apply. 18 (Resp. at 11; see also McCabe Decl., Ex. G at 1-2, Case No. 10-cv-05878-LHK, ECF No. 143-7 19 (Privacy Policy provides that Apple “may collect information such as . . . unique device identifier, 20 location . . . so that we can better understand customer behavior and improve our products, 21 services, and advertising.”).) Plaintiffs provide no support or explanation for their claim that the Apple’s Privacy Policy Bars Plaintiffs’ Claims. 22 23 24 25 26 27 28 17 Plaintiffs cite one sentence in AC ¶ 333 that encompasses a half-hearted attempt to plead “unfair” conduct “tethered” to a legislatively declared policy. In that sentence, Plaintiffs vaguely reference the CLRA, right to privacy, and unnamed “California statutes,” but do not identify how any supposed policies are violated by the conduct alleged in the FAC. See, e.g., Khoury v. Maly’s of Cal., Inc., 14 Cal. App. 4th 612, 619 (1993). 18 Contrary to Plaintiffs’ reading, regulators, like Apple, have only treated device identifiers as personal information when combined with other data. Indeed, the first time the FTC suggested that a UDID should be treated as if it were personally identifiable was in connection with UDIDs collected from children in its recent draft COPPA rulemaking. Comments to FTC, COPPA Rule, Proposed Rule, 76 Fed. Reg. 59804 (Sept. 27, 2011). DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 14 1 Privacy Policy does not apply to them, and indeed, the FAC specifically relies on the Privacy 2 Policy. (AC ¶¶ 77, 78, 315.) Plaintiffs make conclusory allegations that Apple collected “[their] 3 location data,” but other allegations in the complaint make clear that, at most, Apple collected 4 anonymous “maps” of surrounding Wi-Fi hot spots and cell towers in a several mile radius — not 5 Plaintiffs’ location data. Plaintiffs also do not (and cannot) allege that any location data was 6 furnished to Apps when location services were off. Plaintiffs’ claim that they “withdrew their 7 consent” to have Apple collect “their location data to provide [location services]” is of no 8 consequence here, because Plaintiffs have made no specific allegations that Apple collected 9 Plaintiffs’ location data or used any data to provide location services to Plaintiffs after they 10 turned off Location Services. (Resp. at 10.) 11 I. 12 The Limitations on Apple’s Duties to Users Contained in Its User Agreements Are Valid and Enforceable. Plaintiffs’ arguments that Apple cannot disclaim liability are misplaced and demonstrate 13 flaws in Plaintiffs’ negligence claims beyond those identified in Apple’s moving papers. (Apple 14 Mem. at 29-30.)19 Apple’s agreements make clear that it has not assumed a duty to review apps 15 prior to purchase — and Plaintiffs have not identified a legal duty that would supplant Apple’s 16 contracts. (Order at 13.) While Cal. Civ. Code § 1668 precludes disclaiming liability for 17 negligence if doing so would harm the public interest, it has no impact on contractual provisions 18 that limit the scope of any duty owed. As set forth in Apple’s motion, Apple’s contracts make 19 clear it has not assumed such a duty, thus it has not disclaimed liability improperly. The 20 contract’s express provisions stating that App Developers are liable for damages from using Apps 21 is a logical corollary of Apple’s clear disclosures that it is not undertaking a duty to review Apps. 22 23 III. CONCLUSION For the foregoing reasons, Apple respectfully requests that the Court dismiss all claims 24 against it, with prejudice. 25 26 19 27 28 In order to avoid repetitive briefing, Apple adopts the arguments with regard to Plaintiffs’ trespass, conversion, and common counts claims set forth in the Mobile Industry Defendants’ brief, as equally applicable to claims brought against Apple. DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 15 1 2 Dated: April 5, 2012 ZWILLGEN PLLC 3 4 5 By: /s/ Marc J. Zwillinger Marc J. Zwillinger Attorneys for Defendant Apple Inc. 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 DEFENDANT APPLE’S REPLY IN SUPPORT OF ITS MOTION TO DISMISS Case No. 5:11-md-02250-LHK 16

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?