MDL No. 2357 - IN RE: Zappos.com, Inc., Customer Data Security Breach Litigation
Filing
280
ORDER granting in part and denying in part ECF No. 254 Motion to Dismiss; granting ECF No. 255 Motion to Strike ; granting ECF Nos. 244 , 248 , and 266 Motions to Seal; and granting ECF No. 275 Motion for Leave to File Excess Pages. Signed by Judge Robert C. Jones on 5/6/16. (Copies have been distributed pursuant to the NEF - JC)
1
2
3
UNITED STATES DISTRICT COURT
4
DISTRICT OF NEVADA
5
6
3:12-cv-00325-RCJ-VPC
7
8
In re ZAPPOS.COM, INC., CUSTOMER
DATA SECURITY BREACH LITIGATION
MDL No. 2357
9
ORDER
10
11
12
13
14
15
16
17
This multidistrict litigation case arises out of a security breach of Zappos.com’s customer
data. Pending before the Court is a Motion to Dismiss (ECF No. 254), filed by Amazon.com, Inc.
doing business as Zappos.com (“Zappos”). Also pending are Zappos’s Motion to Strike (ECF
No. 255), three Motions to Seal (ECF Nos. 244, 248, 266), and a Motion for Leave to File
Excess Pages (ECF No. 275).
I.
FACTS AND PROCEDURAL HISTORY
On January 15, 2012, a hacker or group of hackers targeted Zappos’s servers located in
18
Kentucky and Nevada. The servers contained the personal identifying information (“PII”) of
19
approximately 24 million Zappos’s customers. On January 16, 2012, Zappos sent an email to its
20
21
22
23
customers notifying them that its servers had been breached and that data had been stolen,
including customers’ names, account numbers, passwords, email addresses, billing and shipping
addresses, phone numbers, and the last four digits of their credit cards used to make purchases.
Shortly thereafter, a number of lawsuits were filed against Zappos seeking damages.
24
25
26
1
1
On June 14, 2012, the U.S. Judicial Panel on Multidistrict Litigation (“JPML”) granted
2
Zappos’s motion to create the present case pursuant to 28 U.S.C. § 1407, transferring six
3
extra-district actions to this District, consolidating them with three actions from this District, and
4
assigning the consolidated case to this Court. (Transfer Order, ECF No. 1). Zappos moved to
5
compel arbitration and stay the case. While that motion was pending, the JPML transferred an
6
additional action to be consolidated with the instant case. (Conditional Transfer Order, ECF No.
7
5). The Court denied the motion to compel arbitration because the arbitration contract was
8
“browsewrap” not requiring any objective manifestation of assent (as opposed to a “clickwrap”
9
agreement), and there was no evidence that Plaintiffs had knowledge of the offer such that assent
10
11
could be implied merely by use of the website. (See Order, 7–10, ECF No. 21).
Plaintiffs then amended their pleadings into two separate consolidated class action
12
complaints, and Zappos filed a motion to dismiss the amended complaints for lack of standing
13
and for failure to state a claim. (ECF No. 62). On September 9, 2013, the Court granted in part
14
and denied in part Zappos’s motion. (ECF No. 114). Thereafter, Plaintiffs Preira, Ree, Simon,
15
Hasner, Habashy, and Nobles (“the Preira Plaintiffs”) filed their Second Amended Consolidated
16
Complaint (the “Preira SAC”). (ECF No. 118). And Plaintiffs Stevens, Penson, Elliot, Brown,
17
Seal, Relethford, and Braxton (the “Stevens Plaintiffs”) filed their Second Amended
18
Consolidated Class Action Complaint (the “Stevens SAC”). (ECF No. 119).
19
On November 4, 2013, Zappos moved to dismiss the Preira SAC and the Stevens SAC.
20
(ECF No. 122). While that motion was pending, the parties engaged in mediation in an attempt
21
to reach a settlement. The parties stipulated to stay the proceedings various times, each time
22
representing to the Court that settlement negotiations were progressing. (See ECF Nos. 192, 196,
23
201). Despite the progress made during mediation as to class-wide relief, a final agreement could
24
25
26
2
1
not be reached between the parties due to a disagreement over attorneys’ fees. However, on
2
December 4, 2014, Plaintiffs filed a motion to enforce a supposed settlement, which the Court
3
denied. (ECF No. 227). Zappos then renewed its previous dismissal arguments. The Court
4
granted the motion to dismiss, holding that Plaintiffs have no standing because, among other
5
reasons, they failed to allege a threat of imminent future harm or instances of actual identity theft
6
or fraud. (ECF No. 235). The Court dismissed the complaints without prejudice, granting
7
Plaintiffs leave to amend their complaints to allege instances of actual identity theft or fraud.
Following the Court’s order, the Preira Plaintiffs and the Stevens Plaintiffs (“Prior
8
9
Plaintiffs”) filed a consolidated Third Amended Complaint (“TAC”). (ECF Nos. 245, 246). In
10
the TAC, two new Plaintiffs—Kristin O’Brien and Terri Wadsworth (“New Plaintiffs”)—were
11
added to the case. Once again, Zappos moves the Court to dismiss the case or, alternatively, to
12
strike the class allegations in the TAC.
13
II.
LEGAL STANDARDS
14
“Lack of standing is a defect in subject-matter jurisdiction and may properly be
15
challenged under Rule 12(b)(1).” Wright v. Incline Vill. Gen. Imp. Dist., 597 F. Supp. 2d 1191,
16
1199 (D. Nev. 2009) (citing Bender v. Williamsport Area Sch. Dist., 475 U.S. 534, 541 (1986)).
17
Zappos argues that the TAC fails to establish Plaintiffs’ standing to sue. This is considered a
18
“facial” challenge to subject-matter jurisdiction. Thornhill Publ’g Co. v. Gen. Tel. & Elec. Corp.,
19
594 F.2d 730, 733 (9th Cir. 1979). “In a facial attack, the challenger asserts that the allegations
20
contained in a complaint are insufficient on their face to invoke federal jurisdiction.” Safe Air for
21
Everyone v. Meyer, 373 F.3d 1035, 1039 (9th Cir. 2004). If the movant’s challenge is a facial
22
one, then the “court must consider the allegations of the complaint to be true and construe them
23
in the light most favorable to the plaintiff.” Nevada ex rel. Colo. River Comm’n of Nev. v.
24
25
26
3
1
Pioneer Cos., 245 F. Supp. 2d 1120, 1124 (D. Nev. 2003) (citing Love v. United States, 915 F.2d
2
1242, 1245 (9th Cir. 1989)).
3
“Standing under Article III of the Constitution requires that an injury be concrete,
4
particularized, and actual or imminent; fairly traceable to the challenged action; and redressable
5
by a favorable ruling.” Monsanto Co. v. Geertson Seed Farms, 561 U.S. 139, 149 (2010). When
6
a party’s allegations of injury rest on future harm, standing arises only if that harm is “certainly
7
impending,” Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138, 1147 (internal quotation marks and
8
citation omitted), “or there is a ‘substantial risk’ that the harm will occur.” Susan B. Anthony List
9
v. Driehaus, 134 S. Ct. 2334, 2342 (2014) (citation omitted). Allegations “of possible future
10
injury are not sufficient.” Clapper, 133 S. Ct. at 1147 (quotation marks and citation omitted).
11
The alleged injury must be “‘fairly traceable to the challenged action of the defendant,’ rather
12
than to ‘the independent actions of some third party not before the court.’” Ass’n of Pub. Agency
13
Customers v. Bonneville Power Admin., 733 F.3d 939, 953 (9th Cir. 2013) (quoting Lujan v.
14
Defenders of Wildlife, 504 U.S. 555, 560 (1992)). A plaintiff does not need to show that a
15
defendant’s actions are the “proximate cause” of the plaintiff’s injury, but a plaintiff “must
16
establish a ‘line of causation’ between defendants’ action and their alleged harm that is more
17
than ‘attenuated.’” Maya v. Centex Corp., 658 F.3d 1060, 1070 (9th Cir. 2011) (quoting Allen v.
18
Wright, 468 U.S. 737, 757 (1984)). The links of a causal chain must be plausible and not
19
hypothetical or tenuous. Id. In addition, “it must be likely, as opposed to merely speculative, that
20
the injury will be redressed by a favorable decision.” Lujan, 504 U.S. at 560–61 (quotations
21
omitted).
22
23
The party invoking federal jurisdiction has the burden of establishing actual or imminent
injury. Id. at 561. In a class action, the named plaintiffs attempting to represent the class “must
24
25
26
4
1
allege and show that they personally have been injured, not that injury has been suffered by
2
other, unidentified members of the class to which they belong and which they purport to
3
represent.” Warth v. Seldin, 422 U.S. 490, 502 (1975). “[I]f none of the named plaintiffs
4
purporting to represent a class establishes the requisite of a case or controversy with the
5
defendants, none may seek relief on behalf of himself or any other member of the class.” O’Shea
6
v. Littleton, 414 U.S. 488, 494 (1974).
7
III.
DISCUSSION
8
A.
9
Zappos moves the Court to dismiss the TAC for lack of standing (ECF No. 254), whereas
10
Prior Plaintiffs attempt to establish standing to revive their claims, and New Plaintiffs attempt to
11
establish standing for the first time.
Article III Standing
12
1.
Prior Plaintiffs
13
In a previous order, the Court rejected in detail Prior Plaintiffs’ three primary arguments
14
for standing. First, the Court rejected the argument that standing exists because the data breach
15
devalued Prior Plaintiffs’ PII. The Court explained:
16
17
18
19
20
Even assuming that Plaintiffs’ data has value on the black market, Plaintiffs do
not allege any facts explaining how their personal information became less
valuable as a result of the breach or that they attempted to sell their information
and were rebuffed because of a lower price-point attributable to the security
breach.
(Order, 6, ECF No. 235).
Second, the Court held that an increased threat of identity theft and fraud stemming from
21
Zappos’s security breach is insufficient to constitute an injury-in-fact. It found that Prior
22
Plaintiffs’ alleged damages rely almost entirely on conjecture and that not one of Prior Plaintiffs
23
“alleges to have detected any irregularity whatsoever in regards to unauthorized purchases or
24
25
26
5
1
other manifestations that their personal information has been misused.” (Id. at 12). The Court
2
added: “three-and-a-half years after Zappos’s security breach Plaintiffs have not sought leave to
3
amend their Complaints to include any facts relating to instances of actual identity theft or
4
financial fraud.” (Id. at 16).
5
Third, the Court found that incurring costs to mitigate a threat cannot serve as the basis
6
for this action. Although the Court found that Prior Plaintiffs lacked standing, it granted leave to
7
amend the complaints for a third time “to allege instances of actual identity theft or fraud.”
8
(Order, 20).
9
In the TAC, Prior Plaintiffs still allege no instances of actual identity theft or fraud.
10
Plaintiffs Hasner and Nobles re-allege that their email accounts were “accessed by hackers and
11
used to send unwanted advertisements to people in [their] address book[s].” (TAC ¶¶ 34, 40).
12
The Court has already rejected these allegations as insufficient to establish standing.1 The only
13
attempt Prior Plaintiffs make to revive their claims is to re-package their allegations that the data
14
breach resulted in a devaluation of their personal information. They allege that when “[f]aced
15
with the choice of having [their] PII wrongfully released . . . and otherwise used without [their]
16
authorization,” they would choose to sell their PII to receive compensation for it. (Id. ¶ 16). This
17
allegation still does not allege any actual, concrete injury—it is merely conjectural. Prior
18
Plaintiffs do not allege facts to show the value of their PII decreased following the data breach.
19
For instance, they do not allege that their PII has been disseminated over the Internet or that any
20
actual damage has occurred because of the breach. As the Court stated in its prior order, they do
21
not allege “that they attempted to sell their information and were rebuffed because of a lower
22
1
23
24
25
26
The Court noted that “[b]esides the advertisements . . . no additional misuse of the accounts or
actual damages is alleged. Moreover, Hasner and Noble also took quick remedial measures by
changing the passwords on their AOL accounts.” (Order, 16, n.3). The Court held that “[i]n this
case . . . there are no allegations of actual financial harm or that Plaintiffs’ personal information
has been disseminated over the Internet.” (Id. at 16).
6
1
price-point attributable to the security breach.” (Order, 6). Thus, even if Prior Plaintiffs’ PII has
2
actual market value, they have failed to allege any facts showing the data breach actually
3
deprived them of any value attributable to this “unique and valuable property right.” (TAC ¶ 15).
4
Once again, Prior Plaintiffs have failed to establish standing. As a result, the Court
5
dismisses them from the case, this time with prejudice. Although “[t]he court should freely give
6
leave [to amend] when justice so requires,” Fed. R. Civ. Pro. 15(2), Prior Plaintiffs have failed to
7
allege instances of actual identity theft or fraud, as the Court gave them leave to do. The Court
8
dismisses Prior Plaintiffs’ claims with prejudice.
9
10
2.
New Plaintiffs
New Plaintiffs—O’Brien and Wadsworth—make the same general allegations as Prior
11
Plaintiffs but also attempt to allege instances of actual identity theft and fraud. Zappos argues
12
that New Plaintiffs have failed to allege any actual injury and that the injury is not fairly
13
traceable to the Zappos data breach. O’Brien makes three specific allegations:
14
15
16
17
18
19
20
21
22
23
[O]n January 25, 2012, O’Brien . . . received a ‘welcome letter’ from Sprint
thanking her for opening an account with two telephone lines and purchasing
multiple telephones—none of which she did. The next day, she received a similar
letter from AT&T regarding the purchase of three telephones she did not
purchase. O’Brien spent a considerable amount of time (approximately two hours
a day for a week and a half) on the telephone with Sprint and AT&T closing these
accounts and extinguishing the account balances, including multiple telephone
calls with an attorney to whom Sprint and AT&T had turned over the accounts for
collection.
Fraudsters also opened a Radio Shack in-store credit account in her name to
which they charged over $400 of merchandise.
Additional fraudulent purchases were made at Radio Shack using O’Brien’s
compromised Chase Visa credit card tied to her Zappos.com account.
(TAC ¶ 43). Wadsworth makes two allegations:
[T]he fraudsters used her debit card to overdraw her bank account, which the bank
unilaterally closed.
24
25
26
7
1
2
The fraudsters also hacked her Paypal account, generating a $1000 balance that
Paypal requires Wadsworth to pay in order to continue selling on Ebay. Until the
balance is paid, her selling business, and corresponding revenue stream, are shut
down.
3
(Id. ¶ 48).
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
These allegations are sufficient to establish standing. O’Brien and Wadsworth allege
several types of injury they have suffered, including use of their credit, harm to their credit, lost
time spent closing fraudulent accounts, and lost funds and business due to fraudulent charges.
Zappos argues that the allegations of injury are merely conclusory and self-contradictory. For
example, Wadsworth alleges that “[s]he utilizes different passwords for each of her online
financial, credit card, and retail accounts, changing them on a regular basis,” (id. ¶ 47), but then
she alleges that she “used the same . . . password on her Zappos.com and Ebay accounts,” (id. ¶
48). Although this apparent contradiction makes Wadsworth’s allegations somewhat confusing,
it is inconsequential because it appears that her first allegation is a general statement of her
conduct, whereas the second involves the specific circumstances related to her allegations of
fraud. Moreover, Wadsworth does not allege that fraudsters hacked her eBay account, just her
Paypal account.
Zappos also argues that Wadsworth failed to allege “when her PayPal account was
hacked or whether she used the same password on her Zappos and PayPal accounts.” (Mot., 13,
ECF No. 254). This lack of specificity is also inconsequential because “[a]t the pleading stage,
general factual allegations of injury resulting from the defendant’s conduct may suffice, for on a
motion to dismiss we presume that general allegations embrace those specific facts that are
necessary to support the claim.” Lujan, 504 U.S. at 561 (quotation omitted). Of course, at the
summary judgment stage, “the plaintiff can no longer rest on such ‘mere allegations,’ but must
‘set forth’ by affidavit or other evidence ‘specific facts.’” Id. (citation omitted).
24
25
26
8
1
The alleged injury is fairly traceable to the Zappos data breach. New Plaintiffs allege that
2
hackers breached servers storing the PII of Zappos customers and stole the data, which Zappos
3
admitted in an e-mail sent to its customers. They allege that following the data breach fraudulent
4
activity occurred as a direct result of the breach. This chain of events is certainly plausible. They
5
also allege that they “meticulously protect [their] PII” and have “never been victimized by a data
6
breach other than the Zappos Data Breach.” (TAC ¶¶ 42, 47).
7
Zappos argues that the alleged fraudulent activity is not fairly traceable to the Zappos
8
data breach because “Plaintiffs do not allege any widespread fraudulent activity affecting
9
Zappos’s 24 million customers in the days or weeks (or now years) following the incident. . . .
10
Given the lack of any allegations of widespread payment card fraud shortly following the
11
incident, it is entirely implausible to conclude that complete credit/debit card data was stolen.”
12
(Mot., 12). Zappos also argues that Social Security numbers are necessary to open new credit
13
accounts, and that Plaintiffs do not allege that Social Security numbers were stolen. (Id. at 13).
14
As time passes from the Zappos data breach and few Zappos customers have made
15
allegations of actual fraud, it is a fair argument that fraudulent activity is less likely to have
16
arisen from the Zappos breach and more likely to have arisen from another source.2 However,
17
even if true, this argument does not preclude the possibility that the alleged injury is fairly
18
traceable to the Zappos breach. First, Plaintiffs allege that “[a] person whose PII has been
19
obtained and compromised may not see the full extent of identity theft or identity fraud for
20
years.” (TAC ¶ 77). Second, although only two Zappos customers in the case have alleged actual
21
injury resulting from the breach, New Plaintiffs present a list of customer complaints and records
22
alleging misconduct shortly following the breach. (Id. ¶ 67). The list is brief, but additional
23
2
24
25
26
Data theft is fairly common. See, e.g., In re Sci. Applications Int’l Corp. (SAIC) Backup Tape
Data Theft Litig., 45 F. Supp. 3d 14, 34 (D.D.C. 2014) (“roughly 3.3% of Americans will
experience identity theft of some form, regardless of the source”).
9
1
discovery could uncover other allegations of actual fraud. Third, even if another data breach
2
might have exposed New Plaintiffs’ PII, Zappos has the burden to show its actions were not the
3
“but for” cause of the injury. See Remijas v. Neiman Marcus Grp., LLC, 794 F.3d 688, 696 (7th
4
Cir. 2015) (“If there are multiple companies that could have exposed the plaintiffs’ private
5
information to the hackers, then ‘the common law of torts has long shifted the burden of proof to
6
defendants to prove that their negligent actions were not the ‘but for’ cause of the plaintiff’s
7
injury.’” (quoting Price Waterhouse v. Hopkins, 490 U.S. 228, 263 (1989) (O’Connor, J.
8
concurring))). Fourth, even if the hackers did not steal full debit or credit card numbers or Social
9
Security numbers, Plaintiffs allege that fraudsters can link various sources of information on the
10
Internet “to create a mosaic of information.” (TAC ¶ 56). Thus, although the Zappos breach
11
might not have been the original source of all the information required to commit fraud, it might
12
have been the catalyst, or a necessary link in the chain, that made the fraud possible. Finally,
13
Zappos argues that the injuries are not fairly traceable to the Zappos breach because New
14
Plaintiffs fail to allege when the actual fraud occurred. New Plaintiffs include a specific date in
15
only one of their allegations, (see id. ¶ 42), but they generally allege that the fraudulent activity
16
occurred after the data breach, which is sufficient.
17
At this stage, it is sufficient for purposes of standing to allege that Zappos sent its
18
customers an e-mail notifying them that their PII had been compromised in a breach of its
19
servers and that actual fraud occurred as a direct result of the breach. Whether or not New
20
Plaintiffs’ allegations suffer from defects that prevent them from ultimately prevailing in the
21
case, the allegations show the connection between the alleged injury and breach is more than just
22
hypothetical or tenuous. The Court finds that New Plaintiffs have standing.
23
///
24
25
26
10
1
B.
Claims
2
1.
California Claims
3
The Court grants the motion to dismiss the California claims (III, IV, and V) because
4
New Plaintiffs (hereinafter “Plaintiffs”) are not residents of California. Plaintiffs can move the
5
Court to reconsider if they believe the California claims should proceed.
6
2.
Breach of the Covenant of Good Faith and Fair Dealing; Breach of the Settlement
Agreement
7
Plaintiffs were not parties to the case when Prior Plaintiffs and Defendant were
8
discussing possible settlement. As a result, the Court dismisses the claims because Plaintiffs have
9
no standing to make them.
10
3.
Negligence/Negligent Misrepresentation
11
Zappos moves the Court to dismiss this claim for failure to state a claim. In a prior order,
12
the Court dismissed Plaintiffs’ simple negligence claim as barred by the economic loss doctrine
13
because Plaintiffs failed to allege personal injury or property damage. (Order, 6–7, ECF No.
14
144). Plaintiffs now argue that their simple negligence claim is not barred by the economic loss
15
doctrine because Zappos’s duty to safeguard and protect their PII is imposed by state law. See
16
Giles v. Gen. Motors Acceptance Corp., 494 F.3d 865, 879 (9th Cir. 2007) (holding that the
17
economic loss doctrine “does not bar recovery in tort where the defendant had a duty imposed by
18
law rather than by contract and where the defendant’s intentional breach of that duty caused
19
purely monetary harm to the plaintiff”). In the TAC, however, Plaintiffs make no allegation of
20
any statutory duty. Moreover, although Plaintiffs allege actual economic injury for purposes of
21
standing, they still fail to allege any personal injury or property damage. The Court will not
22
revive the simple negligence claim.
23
24
25
26
11
1
In the prior order, the Court treated the simple negligence claim as a negligent
2
misrepresentation claim, which the economic loss doctrine does not bar. (Id. at 7–8). Zappos
3
does not challenge this claim as alleged in the TAC.
4
4.
5
Zappos moves the Court to dismiss the breach of contract claim for failure to state a
6
Breach of Contract
claim. In the Court’s prior order, it dismissed this claim with the following explanation:
7
The only allegations alleged to give rise to any contract are that customers agreed
to pay money for goods and that statements on Zappos’s website indicated that its
servers were protected by a secure firewall and that customers’ data was safe. The
first type of contract for the sale of goods is not alleged to have been breached,
and the unilateral statements of fact alleged as to the safety of customers’ data do
not create any contractual obligations.
8
9
10
(Order, 6, ECF No. 114). The TAC does not make any new allegations that cure the
11
deficiencies in the claim. Plaintiffs allege additional facts3 that also constitute unilateral
12
statements and, thus, fail to show that any contractual obligation existed. Plaintiffs also
13
make additional allegations to support their claim that a contract existed because Zappos
14
obtained value from Plaintiffs by possessing their PII, which they received in exchange
15
for Zappos’s promises to protect their PII. (See TAC ¶¶ 164–165). However, because the
16
statements regarding PII safety are only unilateral, any value deriving from Plaintiffs’ PII
17
is only an incidental benefit of the contract for the sale of goods. Finally, Plaintiffs allege
18
that they “relied on this covenant and, in fact, would not have disclosed their PII to
19
Zappos without assurances that their PII would be properly safeguarded.” (Id. ¶ 168).
20
This allegation shows that Plaintiffs relied on Zappos’s unilateral statements, but it does
21
not show that Plaintiffs provided their PII to Zappos as consideration for Zappos’s
22
23
24
25
26
3
E.g., “Zappos also made a ‘Safe Shopping Guarantee,’ promising that the use of credit card
information on its websites is secure. . . . Zappos also placed a yellow, lock-shaped icon on its
website payment page that confirmed entry of a consumer’s PII as part of an online retail
transaction with Zappos was ‘safe and secure.’” (TAC ¶¶ 59–60).
12
1
promise to protect it. Indeed, they allege that they “entrusted their confidential personal
2
customer account information” to Zappos “[a]s part and parcel of their purchase
3
transactions.” (Id. ¶ 2). In other words, Plaintiffs provided their PII to Zappos as a means
4
for completing an online transaction for the purchase of goods—not because Zappos was
5
offering a service to protect Plaintiffs’ PII. The Court dismisses the claim.
6
5.
Unjust Enrichment
7
The elements of an unjust enrichment claim, or “quasi contract,” include the following:
8
“a benefit conferred on the defendant by the plaintiff, appreciation by the defendant of such
9
benefit, and acceptance and retention by the defendant of such benefit under circumstances such
10
that it would be inequitable for him to retain the benefit without payment of the value thereof.”
11
Leasepartners Corp. v. Robert L. Brooks Trust, 942 P.2d 182, 187 (Nev. 1997) (quotation
12
omitted). A claim of unjust enrichment “is not available when there is an express, written
13
contract, because no agreement can be implied when there is an express agreement.” Id.
14
(quotation omitted). “The doctrine of unjust enrichment . . . applies to situations where there is
15
no legal contract but where the person sought to be charged is in possession of money or
16
property which in good conscience and justice he should not retain but should deliver to another
17
or should pay for.” Id. (quotation omitted).
18
In the Court’s prior order, it dismissed Plaintiffs’ unjust enrichment claim because they
19
failed to allege that they conferred any benefit upon Zappos outside of the contracts they formed
20
to purchase goods. (Order, 8–9, ECF No. 114). Plaintiffs have not cured this defect. They allege
21
that it would be inequitable for Zappos to retain their PII without payment in light of the data
22
breach; however, they also allege that they “entrusted their confidential personal customer
23
account information” to Zappos “[a]s part and parcel of their purchase transactions.” (TAC ¶ 2).
24
25
26
13
1
Even if Zappos has benefitted from retaining Plaintiffs’ PII, Zappos obtained it as part of the
2
parties’ contract for the sale of goods. Plaintiffs cannot maintain a claim of unjust enrichment
3
based on that contract. Plaintiffs do not allege that they provided Zappos their PII for any other
4
purpose that would make it inequitable for Zappos to retain the benefit of possessing their PII
5
without payment. The Court dismisses the claim.
6
C.
7
Zappos moves the Court to strike the class allegations from the TAC pursuant to Federal
8
Rules of Civil Procedure 12(f)(2) and 23(d)(1)(D) (ECF No. 255). Plaintiffs argue that Zappos’s
9
motion is premature because class-related discovery has not been completed.
Motion to Strike
10
1.
Legal Standards
11
Under Rule 12(f), “[t]he Court may strike from a pleading an insufficient defense or any
12
redundant, immaterial, impertinent, or scandalous matter.” Rule 23(d)(1)(D) allows a court to
13
“require that the pleadings be amended to eliminate allegations about representation of absent
14
persons.” Rule 23 does not prohibit a defendant from filing a motion to deny class certification
15
before a plaintiff seeks to certify a class. Vinole v. Countrywide Home Loans, Inc., 571 F.3d 935,
16
941 (9th Cir. 2009). Also, “[d]istrict courts have broad discretion to control the class certification
17
process, and ‘[w]hether or not discovery will be permitted . . . lies within the sound discretion of
18
the trial court.’” Id. at 942 (quoting Kamm v. Cal. City Dev. Co., 509 F.2d 205, 209 (9th Cir.
19
1975)). In most cases, a district court should “‘afford the litigants an opportunity to present
20
evidence as to whether a class action was maintainable,’” id. (quoting Doninger v. Pac. Nw. Bell,
21
Inc., 564 F.2d 1304, 1313 (9th Cir.1977)), because “often the pleadings alone will not resolve the
22
question of class certification and [thus] some discovery will be warranted,” id. Class
23
certification may be denied without discovery “where plaintiffs could not make a prima facie
24
25
26
14
1
showing of Rule 23’s prerequisites or that discovery measures were ‘likely to produce persuasive
2
information substantiating the class action allegations’”). Id. (citing and quoting Doninger, 564
3
F.2d at 1313).
4
To obtain class certification under Rule 23, Plaintiffs must show each of the following:
5
(1) the class is so numerous that joinder of all members is impracticable;
(2) there are questions of law or fact common to the class;
(3) the claims or defenses of the representative parties are typical of the claims or
defenses of the class; and
(4) the representative parties will fairly and adequately protect the interests of the
class.
6
7
8
Rodriguez v. Hayes, 591 F.3d 1105, 1122 (9th Cir. 2010) (quoting Fed. R. Civ. P. 23(a)).
9
Plaintiffs must also satisfy the requirements of Rule 23(b)(1)–(3). Id.
10
2.
Analysis
11
The Court must strike the class allegations from the TAC. Plaintiffs propose the
12
following nationwide class:
13
14
15
16
All persons whose personally identifiable information (PII) was obtained by
hackers from Zappos.com, without authorization, and compromised during the
Data Breach first announced by Zappos.com on January 16, 2012. Excluded from
the Nationwide Class are Defendant, any parent corporation, subsidiary
corporation and/or affiliate entity of Defendant, Defendant’s officers, directors,
employees, agents and legal representatives, and the Court.
17
(TAC ¶ 90). Plaintiffs also propose a list of sub-classes of putative Plaintiffs in various
18
states. (Id. ¶ 91), using language similar to the nationwide class. Although discovery is
19
not complete and Plaintiffs have not yet moved to certify the class, the Court can strike
20
the class allegations because it is clear from the face of the TAC that Plaintiffs cannot
21
make a prima facie showing of Rule 23’s prerequisites.
22
In a prior order, the Court informed Plaintiffs that it “would not certify a class as
23
broadly defined as Plaintiffs propose specifically because a majority of the putative class
24
25
26
15
1
cannot claim any measurable damages.” (Order, 19, ECF No. 235). Plaintiffs have failed
2
to heed the Court’s warning. The proposed class would include any person whose PII was
3
compromised during the Zappos data breach, whether or not the person was the victim of
4
actual fraud following the breach. The proposed class is far too broad, which prevents
5
Plaintiffs from meeting the requirements of commonality and typicality.
6
The Court grants the motion to strike and gives Plaintiffs leave to amend to limit
7
the proposed class to individuals who have suffered actual injury as a result of the Zappos
8
data breach. If Plaintiffs attempt to narrow the proposed class, then the Court will
9
entertain additional arguments for striking or certifying the class based on the revised
10
class allegation.
11
D.
12
Zappos argues that Plaintiffs’ claims must be limited to those pursued under Nevada law.
Choice of Law
13
Plaintiffs argue that claims under the laws of other states are appropriate. Given the Court’s
14
decision to grant Zappos’s motion to strike the class allegations, the Court elects to defer to a
15
later time a decision on the choice-of-law issue because whether Plaintiffs choose to amend their
16
complaint to seek class certification will affect the Court’s analysis. In addition, much of the
17
parties’ briefing on this issue focuses on the circumstances involving Prior Plaintiffs rather than
18
New Plaintiffs; thus, the Court would benefit from briefing that is more applicable and thorough
19
in light of the changing circumstances of the case. The Court invites the parties to brief the issue
20
fully when it is raised either in a motion to certify the class or another relevant motion.
21
E.
22
The parties have also filed several Motions to Seal (ECF Nos. 244, 248, 266) and a
23
Miscellaneous Motions
Motion for Leave to File Excess Pages (ECF No. 275). The Court grants the motions.
24
25
26
16
1
CONCLUSION
2
IT IS HEREBY ORDERED that Defendant’s Motion to Dismiss (ECF No. 254) is
3
GRANTED in part and DENIED in part, with leave to amend as indicated, within 30 days.
4
5
6
7
8
9
10
11
12
13
IT IS FURTHER ORDERED that Defendant’s Motion to Strike (ECF No. 255) is
GRANTED.
IT IS FURTHER ORDERED that the Motions to Seal (ECF Nos. 244, 248, 266) are
GRANTED.
IT IS FURTHER ORDERED that Defendant’s Motion for Leave to File Excess Pages
(ECF No. 275) is GRANTED.
IT IS SO ORDERED.
Dated this 20thday of May, 2016.
6th day of April, 2016.
_____________________________________
ROBERT C. JONES
United States District Judge
14
15
16
17
18
19
20
21
22
23
24
25
26
17
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?