CouponCabin LLC v. Does 1 through 10

Filing 87

OPINION AND ORDER: GRANTING IN PART AND DENYING IN PART 65 MOTION TO DISMISS FOR FAILURE TO STATE A CLAIM or, in the Alternative, MOTION for More Definite Statement by Defendants Cox Target Media, Inc., Internet Brands, Inc., Linfield Media, LLC, Savings.com, Inc., Sazze Inc. Count II is DISMISSED WITHOUT PREJUDICE, with leave to refile within 14 days of the date of this Order. Signed by Judge Theresa L Springmann on 6/8/2016. (lhc)

Download PDF
UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF INDIANA COUPONCABIN LLC, Plaintiff, v. SAVINGS.COM, INC., et al., Defendants. ) ) ) ) ) ) ) ) ) CAUSE NO.: 2:14-CV-39-TLS OPINION AND ORDER This matter is before the Court on a Motion to Dismiss or, in the Alternative, a Motion for a More Definite Statement [ECF No. 65] filed by the Defendants Savings.com, Inc., Linfield Media, LLC, Cox Target Media, Inc., and Sazze, Inc. d/b/a DealsPlus, on January 15, 2016. For the reasons stated in this Opinion and Order, the Court grants in part and denies in part the Defendants’ Motion. BACKGROUND On February 7, 2014, the Plaintiff, CouponCabin LLC, filed a Complaint [ECF No. 1] against ten unnamed defendants (Does 1–10) [ECF No. 1]; and on November 2, 2015, it filed an Amended Complaint [ECF No. 28] adding the following Defendants: Savings.com, Inc., Cox Target Media, Inc., Linfield Media, LLC, Internet Brands, Inc., and Sazze, Inc. d/b/a DealsPlus. According to the Amended Complaint, the Plaintiff is a “leading provider of online, printable and grocery coupons for more than 3,000 retailers and merchants, and provides more than 20,000 active and genuine coupons, coupon codes, discount offers or deals, and/or links to same . . . through its website . . . [which] is available at no cost to the general public.” (Am. Compl. ¶¶ 1, 27.) In 2013, the Plaintiff launched an investigation in response to “a marked increase in the amount of its unique content appearing on a number of competing websites.” (Id. at ¶ 3.) The investigation allegedly uncovered the existence of so-called “scraping programs,” that were “systematically acquiring data from the [Plaintiff’s] website.” (Id. at ¶¶ 3–4 (describing “scraping programs” as “computer programs that operate to electronically copy, retrieve or otherwise acquire data and information from the websites of others with little or no human interaction.”).) The Plaintiff also alleges that the investigation uncovered evidence of “manual scraping,” described as “unauthorized and systematic copying, downloading, saving or other misappropriation of . . . website data by human agents.” (Id. at ¶ 4.) The Plaintiff claims that, since at least 2013, the Defendants have either manually scraped or employed scraping programs “in order to download, copy and/or record, and/or enable the republishing of . . . data from the [Plaintiff’s] website.” (Id. at ¶ 5.) Such practices allegedly violate the Plaintiff’s Terms and Conditions, which appear on the Plaintiff’s website and prohibit the “systematic retrieval (including by use or data mining, robots, or other extraction tools) of data or other content from the [Plaintiff’s] website.” (Id. (quoting Ex. A., Pl.’s Terms and Conditions).) As a result of the investigation, the Plaintiff hired a third-party security provider to “implement[] technological safeguards and barriers” (Id. at ¶ 34), which included “block[ing] the access of all traffic, including legitimate users, emanating from certain cloud computing providers and internet service providers identified as being used particularly heavily by the Defendants to conduct scraping activities.” (Id. at ¶ 35). The Plaintiff also “communicated with each of the Defendants, other than Linfield Media, LLC, to demand that they cease and desist 2 their data scraping, misappropriation of Coupon Content or data from the [Plaintiff’s] website.” (Id. at ¶ 74.) However, according to the Plaintiff, “the Defendants knowingly and intentionally circumvented [the Plaintiff’s] security measures in order to continue their data scraping activities.” (Id. at ¶ 40.) The Plaintiff asserts state and federal claims against the Defendants, including: (1) a violation of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq.; (2) a violation of the Digital Millennium Copyright Act, 17 U.S.C. § 1201 et seq.; (3) breach of contract; (4) trespass; and (5) tortious interference. On January 15, 2016, Defendants Savings.com, Inc., Linfield Media, LLC, Cox Target Media, Inc., and Sazze, Inc. d/b/a DealsPlus (collectively, “Defendants”) filed a Motion to Dismiss or, in the Alternative, a Motion for a More Definite Statement [ECF No. 65], along with an accompanying Memorandum in Support [ECF No. 66] and exhibit (i.e., screenshots of the Plaintiff’s website) [ECF No. 66-1], arguing that the Plaintiff’s Amended Complaint should be dismissed in its entirety for failure to state a claim;1 or alternatively, that the Plaintiff must provide a more definite statement under Federal Rule of Civil Procedure 12(e). On February 8, 2016, the Plaintiff filed a Response [ECF No. 69], and on March 3, 2016, the Defendants filed a Reply [ECF No. 78].2 The Motion is now fully briefed and 1 The Defendants do not challenge the Plaintiff’s state claims for trespass and tortious interference on the basis of Rule 12(b)(6); but instead, on the basis that a district court may decline to exercise supplemental jurisdiction if “the district court has dismissed all claims over which it has original jurisdiction.” 28 U.S.C. § 1367(c)(3); see also Groce v. Eli Lilly & Co., 193 F.3d 496, 501 (7th Cir. 1999) (noting that established law of this circuit is that the “usual practice” is to dismiss without prejudice state supplemental claims whenever all federal claims have been dismissed before trial). 2 On April 13, 2016, the Defendants filed a Notice of Recent Decision [ECF No. 79], indicating that the Seventh Circuit affirmed Sgouros v. TransUnion Corp, No. 14 C 1850, 2015 WL 507584 (N.D. Ill. Feb. 5, 2015), which the Defendants cite in their Memorandum. See Sgouros v. TransUnion Corp., 817 F.3d 1029 (7th Cir. 2016). 3 ripe for ruling. DISCUSSION I. Rule 12(b)(6) Motion to Dismiss A motion to dismiss pursuant to Federal Rule of Civil Procedure 12(b)(6) tests the sufficiency of the complaint and not the merits of the suit. Gibson v. City of Chi., 910 F.2d 1510, 1520 (7th Cir. 1990). The court presumes all well-pleaded allegations to be true, views them in the light most favorable to the plaintiff, and accepts as true all reasonable inferences to be drawn from the allegations. Whirlpool Fin. Corp. v. GN Holdings, Inc., 67 F.3d 605, 608 (7th Cir. 1995). The Supreme Court has articulated the following standard regarding factual allegations that are required to survive dismissal: While a complaint attacked by a Rule 12(b)(6) motion to dismiss does not need detailed factual allegations, a plaintiff’s obligation to provide the ‘grounds’ of his ‘entitlement to relief’ requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do. Factual allegations must be enough to raise a right to relief above the speculative level, on the assumption that all the allegations in the complaint are true (even if doubtful in fact). Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007) (internal quotation marks, ellipsis, citations, and footnote omitted). A complaint must contain sufficient factual matter to “state a claim to relief that is plausible on its face.” Id. at 570. “A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (citing Twombly, 550 U.S. at 556). 4 Additionally, pursuant to Rule 12(d), a motion to dismiss for failure to state a claim that includes matters outside of the pleadings must be treated as a motion for summary judgment under Rule 56. See, e.g., Levenstein v. Salafsky, 164 F.3d 345, 347 (7th Cir. 1998). However, a court is not required to convert a motion to dismiss to a motion for summary judgment if the additional documents it considers are referenced in the complaint and are central to the claim. Citadel Grp. v. Wash. Reg’l Med. Ctr., 692 F.3d 580, 591 (7th Cir. 2012). “Such documents may permit the court to determine that the plaintiff is not entitled to judgment.” Reger Dev., LLC v. Nat’l City Bank, 592 F.3d 759, 764 (7th Cir. 2010) (citing Hecker v. Deere & Co., 556 F.3d 575, 588 (7th Cir. 2009)). Because the Plaintiff’s website is referenced in the Complaint and is central to the Plaintiff’s claim, the Court will consider the Defendants’ exhibit [ECF No. 66-1] in conjunction with the pleadings. A. Computer Fraud and Abuse Act (CFAA) Claim (Count I) The CFAA imposes both civil and criminal liability for the unauthorized access of electronic data. 18 U.S.C. § 1030(a)(1–7). Of relevance here, an individual violates the CFAA if he “intentionally accesses a computer without authorization or exceeds authorized access and thereby obtains . . . information from any protected computer.” § 1030(a)(2); see Motorola, Inc. v. Lemko Corp., 609 F. Supp. 2d 760, 766 (N.D. Ill. 2009) (“The elements of a section 1030(a)(2) violation . . . include (1) intentional access of a computer, (2) without or in excess of authorization, (3) whereby the defendant obtains information from the protected computer.”). The CFAA does not define “without authorization”; although it does define “exceeds authorized access,” as “to access a computer with authorization and to use such access to obtain or alter 5 information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). In seeking dismissal, the Defendants note that liability under § 1030(a)(2) is triggered by the unauthorized access of electronic data—not by the unauthorized use of such data. Def.’s Br. 7–9 (citing Bittman v. Fox, 107 F. Supp. 3d 896, 900–901 (N.D. Ill. 2015) (“The statutory purpose of the CFAA is to punish trespassers and hackers.”), CollegeSource, Inc. v. AcademyOne, Inc., Civil Action No. 10-3542, 2012 WL 5269213, at *14 (E.D. Pa. Oct. 25, 2012) (“The CFAA protects against unauthorized access rather than unauthorized use”), and Koch Indus., Inc. v. Does, No. 2:10CV1275DAK, 2011 WL 1775765, at *8 (D. Utah May 9, 2011) (noting that “[a] majority of courts have concluded” that claims of unauthorized use “lie outside the scope of the CFAA.”). According to the Defendants, because the Plaintiff alleges the “scraping” of electronic data that is publicly accessible, it is attempting to hold the Defendants liable for the unauthorized use of electronic data. The Plaintiff counters, in essence, that liability turns on the Court’s interpretation of the term “without authorization”—and in particular, whether a party acts “without authorization” when permission to access a public website has been affirmatively restricted or revoked. Recall that in the Amended Complaint, the Plaintiff claims that it undertook affirmative steps to restrict and/or revoke the Defendants’ access to its website by “block[ing] the access of all traffic, including legitimate users, emanating from certain cloud computing providers and internet service providers identified as being used particularly heavily by the Defendants to conduct scraping activities” and by “communicat[ing] with each of the Defendants, other than Linfield Media, LLC, to demand that they cease and desist their data scraping, misappropriation of 6 Coupon Content or data from the [Plaintiff’s] website.” (Am Compl. ¶¶ 35, 74); see also id. at ¶ 40 (alleging that “[s]ometime after [the Plaintiff] blocked the Defendants from accessing the [Plaintiff’s] website, the Defendants knowingly and intentionally circumvented [the Plaintiff’s] security measures in order to continue their data scraping activities.”). Because the CFAA does not define “authorization,” the Court must give the term its “‘ordinary and plain meaning.’” United States v. Patel, 778 F.3d 607, 613 (7th Cir. 2015) (quoting Sanders v. Jackson, 209 F.3d 998, 1000 (7th Cir. 2000) (noting that “[w]e frequently look to dictionaries to determine the plain meaning of words, and in particular we look at how a phrase was defined at the time the statute was drafted and enacted.”)). The Oxford English Dictionary defines “Authorization” as “[t]he action of authorizing a person or thing” or “formal permission or approval.” Authorization, oed.com, http://www.oed.com/view/Entry/13351?redirectedFrom=authorization#eid (last visited June 7, 2016). Moreover, the term, “authorize,” ordinarily means “to give official permission for or formal approval to (an action, undertaking, etc.)” or “to approve, sanction.” Authorize, oed.com, http://www.oed.com/view/Entry/13352?redirectedFrom=authorize#eid (last visited June 7, 2016). Therefore, based on the ordinary and plain meaning of “authorization,” to act “without authorization” is to act without formal permission or approval. A review of case law shows that several district courts have adopted a similar interpretation of “without authorization” when confronting nearly identical facts. For example, in Craigslist Inc. v. 3Taps Inc., 964 F. Supp. 2d 1178 (N.D. Cal. 2013), a defendant accessed the plaintiff’s public website even after the plaintiff sent cease-and-desist letters and blocked the defendant’s IP addresses. Id. at 1180–81. In finding that the defendant acted “without 7 authorization” under the CFAA, the court explained that although the plaintiff “gave the world permission (i.e., ‘authorization’) to access the public information on its public website . . . it rescinded that permission for [the defendant]. Further access by [the defendant] after that rescission was ‘without authorization.’” Id. at 1184; see also Facebook, Inc. v. Grunin, 77 F. Supp. 3d 965, 973 (N.D. Cal. 2015) (finding that a defendant acted “without authorization” under the CFAA when he continued to access Facebook’s site, even after Facebook “implemented a complete access restriction by sending [the defendant] two cease-and-desist letters and by taking technical measures to block his access.”); Sw. Airlines v. Farechase, 318 F. Supp. 2d 435, 439–40 (N.D. Tex. 2004) (finding that a plaintiff plausibly alleged a CFAA claim when Southwest “directly informed” the defendant that its scraping activity violated the Use Agreement on Southwest’s website, which was “accessible from all pages on the website,” as well as via “direct repeated warnings and requests to stop scraping.”) (internal quotation marks and citation omitted); cf QVC, Inc. v. Resultly, LLC, —F. Supp. 3d—, 2016 WL 521197, at *13 (E.D. Pa. Feb. 10. 2016) (noting that, in determining whether the defendant acted “without authorization,” the “relevant question is not whether [the defendant] was granted permission to access the information on QVC.com, but whether that authorization was ever rescinded or limited in a way that would put [the defendant] on notice that it was not authorized to access information it was otherwise entitled to access.”). Guidance as to the meaning of “without authorization” is also found in CFAA cases involving employer-employee relationships. Notably, in International Airport Centers, L.L.C. v. Citrin, 440 F.3d 418 (7th Cir. 2006), the Seventh Circuit found that an employee acted “without authorization” despite the absence of any “hacking” or other techniques aimed at penetrating a 8 secure computer or network on the part of the employee. Id. at 420 (finding that even though an employee was authorized to use his employer’s laptop in a general sense, the defendant’s “authorization to access the laptop terminated when, having already engaged in misconduct and decided to quit . . . he resolved to destroy files that incriminated himself and other files that were the property of his employer, in violation of the duty of loyalty that agency law imposes on an employee.”) (citation omitted); cf. LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1133–34 (9th Cir. 2009) (“[A] person uses a computer ‘without authorization’ . . . when the person has not received permission to use the computer for any purpose (such as when a hacker accesses someone’s computer without any permission), or when the employer has rescinded permission to access someone’s computer and the defendant uses the computer anyway.”) Thus, given the “ordinary and plain meaning” of “authorization,” coupled with the case law described above, the Court is persuaded that CFAA liability may exist in certain situations where a party’s authorization to access electronic data—including publicly accessible electronic data—has been affirmatively rescinded or revoked. By alleging that the Defendants knowingly and intentionally circumvented the Plaintiff’s security measures after the Plaintiff blocked access from certain cloud computing/internet service providers and communicated with the Defendants by demanding that they cease and desist scraping-related activities, the Plaintiff has pled enough facts to survive dismissal. The Motion to Dismiss, as it relates to Count I, is denied. B. Digital Millennium Copyright Act (DMCA) Claim (Count II) Next, the Plaintiff alleges that the Defendants violated the DMCA, 17 U.S.C. § 1201 et seq., which provides both civil and criminal liability “‘to protect [copyright owners’] works from 9 piracy behind digital walls such as encryption codes or password protections.’” Microsoft Corp. v. AT&T Corp., 550 U.S. 437, 458 (2007) (quoting Universal City Studios, Inc. v. Corley, 273 F.3d 429, 435 (2d Cir. 2001)). Of relevance here, the DMCA contains three provisions aimed at combating the circumvention of technical measures implemented by copyright owners: (1) § 1201(a)(1)(A), which prohibits “circumvent[ing] a technological measure that effectively controls access to a work protected under [the Copyright Act]”; (2) § 1201(a)(2), which prohibits trafficking in technology that circumvents a technological measure that “effectively controls access” to a copyrighted work; and (3) § 1201(b)(1), which prohibits trafficking in technology that circumvents a technological measure that “effectively protects” a copyright owner’s right. Based on the briefing, the Plaintiff appears to be alleging a DMCA claim under sections 1201(a)(1)(A) and 1201(a)(2). In Chamberlain Group v. Skylink Technologies, Inc., 381 F.3d 1178 (Fed. Cir. 2004), the Federal Circuit found that a plaintiff alleging a violation of § 1201(a) must prove the following: (1) ownership of a valid copyright on a work, (2) effectively controlled by a technological measure, which has been circumvented, (3) that third parties can now access (4) without authorization, in a manner that (5) infringes or facilitates infringing a right protected by the Copyright Act, because of a product that (6) the defendant either (I) designed or produced primarily for circumvention; (ii) made available despite only limited commercial significance other than circumvention; or (iii) marketed for use in circumvention of the controlling technological measure. A plaintiff incapable of establishing any one of elements (1) through (5) will have failed to prove a prima facie case. A plaintiff capable of proving elements (1) through (5) need prove only one of (6)(I), (ii), or (iii) to shift the burden back to the defendant. At that point, the various affirmative defenses enumerated throughout § 1201 become relevant. 381 F.3d 1178, 1203 (italics omitted) (on appeal from the Northern District of Illinois and applying Seventh Circuit law); see also Storage Tech. Corp. v. Custom Hardware Eng’g & Consulting, Inc., 421 F.3d 1307, 1318 (Fed. Cir. 2005) (same). To “‘circumvent a technological 10 measure’ means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” § 1201(a)(3)(A). Further, “a technological measure ‘effectively controls access to a work’ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” § 1201(a)(3)(B). Notably, in Chamberlain, a violation of § 1201(a) requires a plaintiff to show that “the access resulting from the circumvention of the technological measure [was] in a manner that ‘infringes or facilitates infringing a right protected by the Copyright Act.’” Nordstrom Consulting, Inc. v. M&S Techs., Inc., No. 06 C 3234, 2008 WL 623660, at *8 (N.D. Ill. 2008) (quoting Chamberlain, 381 F.3d at 1203). Thus, “[a] copyright owner seeking to impose liability on an accused circumventor must demonstrate a reasonable relationship between the circumvention at issue and a use relating to a property right for which the Copyright Act permits the copyright owner to withhold authorization.” Chamberlain, 381 F.3d at 1204. Chamberlain’s so-called “infringement nexus requirement” has been adopted by several courts, including district courts in this Circuit. See, e.g., Nordstrom, 2008 WL 623660, at *8; Agfa Monotype Corp. v. Adobe Sys., 404 F. Supp. 2d 1030, 1034–35 (N.D. Ill. 2005); accord Universal City Studios, 273 F.3d at 435 (explaining that Congress enacted the DMCA to help copyright owners protect their works from piracy); but see MDY Indus., LLC v. Blizzard Entm’t, Inc., 629 F.3d 928, 948–52 (9th Cir. 2010) (rejecting Chamberlain and finding that only an incidental relation must exist between circumvention and copyright infringement). The Defendants urge the Court to adopt Chamberlain, arguing that dismissal is 11 appropriate because the Plaintiff fails to allege a sufficient nexus between the circumvention at issue and copyright infringement. Alternatively, the Defendants argue that the Plaintiff fails to allege facts demonstrating that a copyrighted work was “effectively controlled” by a technological measure. Notwithstanding the potential application of Chamberlain’s “infringement nexus requirement,” dismissal is appropriate here because the Plaintiff has not pled sufficient facts to show that its copyrighted work was “effectively controlled” by a technological measure. Again, a technological measure effectively controls access to a work “if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” § 1201(a)(3)(B). Although the Plaintiff alleges that it implemented “technological safeguards and barriers” to control access to its website (Am. Compl. at ¶ 34), it also alleges that the Defendants continued their scraping activity by accessing the Plaintiff’s website “using a variety of servers and/or internet service providers throughout the United States and/or from outside the United States” (id. at ¶ 44). In other words, even after the Plaintiff’s implementation of “technological safeguards and barriers,” its website remains accessible to users of servers and/or internet service providers that have not been blocked by the Plaintiff’s technology. See Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 547 (6th Cir. 2004) (“Just as one would not say that a lock on the back door of a house ‘controls access’ to a house whose front door does not contain a lock . . . it does not make sense to say that [§ 1201(a)] of the DMCA applies to otherwise-readily-accessible copyrighted works.”); Theresa M. Troupson, Yes, It’s Illegal to Cheat a Paywall: Access Rights and the DMCA’s Anticircumvention Provision, 90 N.Y.U. L. 12 Rev. 325, 339 (2015) (“[A] technological protection measure must serve as a gatekeeper for all access; after all, a locked back door can hardly be said to effectively control access to a house if its front door is wide open.”). Absent allegations that a user of the Plaintiff’s website is required to apply “information or a process or treatment” to gain access (e.g., by providing a password), the Court is not convinced that the DMCA covers the alleged conduct at issue. Accordingly, Count II will be dismissed without prejudice, with leave to refile if the Plaintiff is able to successfully amend its complaint consistent with this Order within 14 days of the date of this Order. See Foster v. DeLuca, 545 F.3d 582, 584 (7th Cir. 2008) (“District courts routinely do not terminate a case at the same time that they grant a defendant’s motion to dismiss; rather, they generally dismiss the plaintiff’s complaint without prejudice and give the plaintiff at least one opportunity to amend her complaint.”); Barry Aviation Inc. v. Land O’Lakes Mun. Airport Comm’n, 377 F.3d 682, 687 (7th Cir. 2004) (stating that the general rule is that “the district court should grant leave to amend after granting a motion to dismiss”). C. Breach of Contract Claim (Counts III) The Plaintiff also asserts breach of contract, alleging that the Defendants violated its Terms and Conditions, which appear on its website and prohibit the “systematic retrieval (including by use or data mining, robots, or other extraction tools) of data or other content from the [Plaintiff’s] website.” (Am. Compl. ¶ 5 (quoting Ex. A., Pl.’s Terms and Conditions).) Users of the Plaintiff’s website “signify their acceptance of the [Plaintiff’s] Terms and Conditions by virtue of their access and use of the Site.” (Id. at ¶ 28 (“The Terms and Conditions state that, ‘[b]y using the Site, you signify your agreement to these terms and conditions and [the 13 Plaintiff’s] Privacy Policy.’”).) As an initial matter, because the Plaintiff’s federal claims create a basis for subject matter jurisdiction pursuant to 28 U.S.C. § 1331 (federal question), the Court has jurisdiction over the Plaintiff’s state claims pursuant to 28 U.S.C. § 1367 (supplemental jurisdiction). Under the familiar rule of Erie Railroad Co. v. Tompkins, 304 U.S. 64 (1938)—which is applicable to state law claims that are brought through supplemental jurisdiction, Houben v. Telular Corp., 309 F.3d 1028, 1032 (7th Cir. 2012)—a federal court sitting in diversity applies the substantive law of the state in which it sits; which in this case, is the substantive law of Indiana. “The law concerning contracts is well settled in Indiana. An offer, acceptance, plus consideration make up the basis for a contract.” Dimizio v. Romo, 756 N.E.2d 1018, 1022 (Ind. Ct. App. 2001). “A mutual assent or a meeting of the minds on all essential elements or terms must exist in order to form a binding contract.” Homer v. Burman, 743 N.E.2d 1144, 1146–47 (Ind. Ct. App. 2001) (“Assent to th[e] terms of a contract may be expressed by acts which manifest acceptance.”) (internal quotation marks and citation omitted). But as far as the Court can tell, Indiana courts have not weighed in on the validity of so-called “browsewrap agreements,” which is the type of agreement at issue here. See Sgouros v. TransUnion Corp, No. 14 C 1850, 2015 WL 507584, at *6 (N.D. Ill. Feb. 5, 2015) (noting that browsewrap agreements “do not require users to sign a document or click an ‘accept’ or ‘I agree’ button, so users are considered to give assent simply by using the website.”) (internal quotation marks and citation omitted).3 3 An alternative to a browsewrap agreement is a “clickwrap agreement,” which requires an affirmative act on the part of the user to manifest assent—namely, the user’s clicking of a button accompanying a statement instructing the user that their click constitutes acceptance to the terms at issue. Sgouros, 2015 WL 507584, at *4. 14 However, several district courts in this Circuit have found browsewrap agreements to be enforceable when a user has actual or constructive knowledge of the website’s terms and conditions. See, e.g., id. at *6; Hussein v. Coinabul, LLC, No. 14 C 5735, 2014 WL 7261240, at *2–3 (N.D. Ill. Dec. 19, 2014); Van Tassell v. United Mktg. Grp., LLC, 795 F. Supp. 2d 770, 790–91 (N.D. Ill. 2011); see also Nguyen v. Barnes & Noble, 763 F.3d 1171, 1176 (9th Cir. 2014). Thus, “[w]hen there is no evidence that users had actual knowledge of terms at issue, the validity of a browsewrap contract hinges on whether a website provided reasonable notice of the terms of the contract, i.e., whether users could have completed their purchases without ever having notice that their purchases are bound by the terms.” Sgouros, 2015 WL 507584, at *6 (internal quotation marks and citation omitted). The Defendants argue that the Plaintiff has failed to allege the existence of an enforceable browsewrap agreement; namely, by failing to show that the Defendants had actual or constructive notice of the Terms and Conditions. The Defendants note that [t]he hyperlink directing users to Plaintiff’s Terms of Use is listed below 16 other links at the bottom of every page of the CouponCabin website. And while the hyperlink’s font (white) is adequately contrasted by the color of its background (grey), it is buried at the bottom of each webpage. On the homepage alone, a user must scroll through nine screen shots to arrive at the hyperlink of the Terms and Conditions. Additionally, if printing the homepage, the hyperlink appears at the end of a 14-page printout. (Defs.’ Br. 18 (internal quotation marks and citations omitted).) After reviewing the Plaintiff’s website, as presented in the Defendants’ exhibit [ECF No. 66-1], the Court agrees that a user is not immediately confronted with the Plaintiff’s Terms and Conditions; and therefore, a reasonable argument can be made that the Terms and Conditions fail to provide constructive notice. Nevertheless, the Court is required to view the complaint 15 allegations in a light most favorable to the Plaintiff, and accept as true all reasonable inferences to be drawn from the allegations. Whirlpool, 67 F.3d at 608. The Court is therefore reluctant to declare the browsewrap agreement’s unenforceability at this early stage of the litigation—particularly in light of the Plaintiff’s allegations that the Defendants “knowingly and intentionally circumvented [the Plaintiff’s] security measures in order to continue their data scraping activities” (Am. Compl. ¶ 40), even after the Plaintiff communicated with the Defendants and “demand[ed] that they cease and desist their data scraping, misappropriation of Coupon Content or data from the [Plaintiff’s] website” (id. at ¶ 74). Based on these pleadings, a determination as to whether the Defendants had sufficient notice of the Terms and Conditions is more appropriately answered at a later point in the litigation. II. Rule 12(e) Motion for a More Definite Statement Lastly, the Defendants move for a more definite statement pursuant to Rule 12(e). A motion for a more definite statement will be granted if a “pleading to which a responsive pleading is allowed but which is so vague or ambiguous that the party cannot reasonably prepare a response.” Fed. R. Civ. P. 12(e). “[B]ecause of the availability of extensive discovery, Rule 12(e) motions are disfavored and reserved for ‘the rare case’ where the answering party will not be able to frame a responsive pleading. Thus, courts seldom grant these motions unless the complaint is downright unintelligible or the heightened requirements of Rule 9(b) apply.” Nikolic v. St. Catherine Hosp., No. 2:10 CV 406, 2011 WL 4537911, at *6 (N.D. Ind. Sept. 28, 2011) (quoting Schaedler v. Reading Eagle Publ’n, Inc., 370 F.2d 795, 798 (3d Cir. 1967) and citing Bank of Am. Leasing & Capital, LLC v. Global Grp., Inc., 2:10–CV–390–WCL–PRC, 16 2011 WL 53088, at *1 (N.D. Ind. Jan.7, 2011) (explaining that Rule 12(e) motions are disfavored, but are appropriate where the plaintiff fails to satisfy Rule 9(b)), MacNeil Auto. Prods., Ltd. v. Cannon Auto. Ltd., 715 F. Supp. 2d 786, 790 (N.D. Ill. 2010) (emphasizing that motions for a more definite statement do not lie as a substitute for discovery; they should be granted only where the attacked pleading is so unintelligible that the movant cannot respond), and Moore v. Fid. Fin. Servs., Inc., 869 F. Supp. 557, 559–61 (N.D. Ill. 1994) (denying a Rule 12(e) motion where discovery would allow the defendant to “easily” determine the plaintiff’s contentions)). Although the Plaintiff’s claims are not subject to heightened pleading standards, the Defendants argue that the Amended Complaint is insufficient because it includes generalized allegations “without specifically articulating any actions attributable to a single defendant.”4 (Defs.’ Br. 21.) For support, the Defendants cite Parker v. Brush Wellman, Inc., 377 F. Supp. 2d 1290 (N.D. Ga. 2005), a class action lawsuit against multiple defendants, all of whom were involved in the manufacture and/or use of products containing beryllium, a toxic substance. Id. at 1292. The plaintiffs asserted that they were exposed to a respirable form of the substance; but as the court noted, their complaint included “no factual allegations regarding whether [p]laintiffs were exposed to each individual [d]efendant’s beryllium-containing products, nor are there any allegations regarding the approximate times (i.e., approximate date ranges) of alleged beryllium 4 The Defendants also criticize the Plaintiff’s use of so-called “shotgun pleading,” where each count incorporates by reference all preceding paragraphs and counts of the complaint, see CustomGuide v. CareerBuilder, LLC, 813 F. Supp. 2d 990, 1001–02 (N.D. Ill. 2011) (noting that courts discourage “shotgun pleading”); along with the Plaintiff’s use of the term “on information and belief” at certain points in the pleadings, see Maclean-Fogg v. Edge Composites, L.L.C., Civil Action No. 08 C 6367, 2009 WL 1010426, at *6 (N.D. Ill. Apr. 14, 2009) (“Allegations based exclusively on information and belief are insufficient unless the facts are inaccessible to the pleader, and there is a reasonable basis to suspect the facts are true.”). 17 exposure.” Id. at 1295. By contrast, the Plaintiff alleges that each Defendant engaged in fairly specific conduct (i.e., manual scraping, or the employment of scraping programs to “download, copy and/or record, and/or enable the republishing of, Coupon Content and other data from [the Plaintiff’s] website” (Am. Compl. ¶ 5)), and that they did so within a fairly specific time frame (i.e., “[s]ince at least early fall 2013.” (Id.). Despite the aggregated form of the complaint allegations, the Court is not persuaded that this is one of “the rare case[s]” where the answering party will not be able to frame a responsive pleading. See Nikolic, 2011 WL 4537911, at *6. As noted above, absent heightened pleading standards under Rule 9(b) or unintelligible pleadings, Rule 12(e) should not be used as a substitute for discovery. The Defendants’ alternative request for a More Definite Statement is denied. CONCLUSION For the reasons stated above, the Court GRANTS IN PART and DENIES IN PART the Defendants’ Motion to Dismiss [ECF No. 65]. Count II is DISMISSED WITHOUT PREJUDICE, with leave to refile within 14 days of the date of this Order. SO ORDERED on June 8, 2016. s/ Theresa L. Springmann THERESA L. SPRINGMANN UNITED STATES DISTRICT COURT FORT WAYNE DIVISION 18

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?