Domain Name Commission Limited v. DomainTools, LLC

Filing 73

ORDER granting in part Defendant's 64 Motion to Dismiss: Because this matter continues as to plaintiffs breach of contract and CPA claims, leave to amend will not be blindly granted. If plaintiff believes it can, consistent with its Rule 11 obligations, amend the complaint to remedy the pleading and legal deficiencies in its CFAA claim, it may file a motion to amend and attach a proposed pleading for the Court's consideration. Signed by Judge Robert S. Lasnik.(MW)

Download PDF
1 2 3 4 5 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 6 7 8 DOMAIN NAME COMMISSION LIMITED, 9 10 11 12 Plaintiff, v. DOMAINTOOLS, LLC, NO. C18-0874RSL ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS Defendant. 13 14 15 This matter comes before the Court on defendant’s “Motion to Dismiss Pursuant to FRCP 16 12(b)(1) and 12(b)(6).” Dkt. # 64. Plaintiff is a New Zealand non-profit corporation that 17 regulates the use of the .nz top level domain, including registering new domain names and 18 19 20 21 responding to inquiries regarding registrants. Defendant collects domain and registrant information from around the world, stores the information, and uses its current and historic databases to sell monitoring and investigative services and products to the public. Plaintiff 22 alleges that the way defendant accessed .nz domain and registrant information before June 6, 23 2018, any and all access after that date, and its continuing storage and use of the domain and 24 registrant information violates the Computer Fraud and Abuse Act (“CFAA”) and the 25 Washington Consumer Protection Act (“CPA”). Defendant seeks dismissal of the statutory 26 27 28 ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 1 1 claims.1 2 3 The question for the Court on a motion to dismiss is whether the facts alleged in the complaint sufficiently state a “plausible” ground for relief. Bell Atl. Corp. v. Twombly, 550 U.S. 4 5 544, 570 (2007). All well-pleaded allegations are presumed to be true, with all reasonable 6 inferences drawn in favor of the non-moving party. In re Fitness Holdings Int’l, Inc., 714 F.3d 7 1141, 1144-45 (9th Cir. 2013). If the First Amended Complaint (Dkt. # 54) fails to state a 8 cognizable legal theory or fails to provide sufficient facts to support a claim, however, dismissal 9 10 11 12 is appropriate. Shroyer v. New Cingular Wireless Servs., Inc., 622 F.3d 1035, 1041 (9th Cir. 2010). Having reviewed the memoranda submitted by the parties and heard the arguments of 13 counsel, the Court finds as follows: 14 A. Computer Fraud and Abuse Act, 18 U.S.C. § 1030 15 16 17 18 19 As relevant to this litigation, the CFAA prohibits “intentionally access[ing] a computer without authorization or exceed[ing] authorized access,” 18 U.S.C. § 1030(a)(2), as well as “intentionally access[ing] a protected computer without authorization” and causing “damage and loss,” 18 U.S.C. § 1030(a)(5)(C). Plaintiffs argue that defendant is liable under both provisions 20 because it accessed the .nz servers in ways and for purposes that violated plaintiff’s terms of use 21 and continued to access the .nz servers after its right of access had been expressly revoked. 22 Plaintiff’s terms of use prohibited use of Port 43, a communication channel through 23 which users can query plaintiff’s servers regarding specific .nz domain names, to send high 24 25 26 27 28 1 Plaintiff has also asserted a breach of contract claim, regarding which the Court entered a preliminary injunction on September 12, 2018. Dkt. # 43. The preliminary injunctive relief was affirmed on appeal, and defendant is not seeking dismissal of the contract claim. ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 2 1 volume queries to the .nz servers with the effect of downloading or collecting all or part of the 2 .nz register, to access the .nz register in bulk, to store or compile .nz domain data to build up a 3 secondary register, and/or to publish historical or non-current versions of the .nz data. Dkt. # 54- 4 5 1 at 18. On November 2, 2017, plaintiff sent defendant a cease-and-desist letter notifying 6 defendant that it had violated plaintiff’s terms of use and demanding that it “immediately cease 7 and desist accessing .nz WHOIS servers or using and publishing .nz WHOIS data except as 8 permitted by the [terms of use].” Dkt. # 54-1 at 24. When defendant continued to access the .nz 9 10 11 12 13 14 15 16 17 18 19 servers in ways that plaintiff felt violated the limited license it had granted defendant, plaintiff sent a June 6, 2018, letter revoking defendant’s right to access the .nz servers entirely. Dkt. # 541 at 30. Plaintiff alleges that defendant accessed the .nz servers after the June 6, 2018, revocation. Dkt. # 54 at ¶ 106.2 Plaintiff argues that defendant’s access to the .nz server in ways that violated plaintiff’s terms of use prior to June 6, 2018, constitutes both access “without authorization” and in excess of authorized access. Dkt. # 54 at ¶¶ 74-79 and 104. Plaintiff also argues that defendant’s queries to the .nz servers after plaintiff revoked defendant’s right of access was “without authorization.” Dkt. # 54 at ¶ 106. Plaintiff alleges that defendant’s unlawful conduct caused plaintiff “loss in an 20 amount far in excess of the $5,000 statutory minimum during each relevant one-year period.” 21 Dkt. # 54 at ¶ 107. 22 23 24 25 26 27 28 2 Defendant challenges the adequacy of this allegation, but it is more than enough to give rise to a plausible inference that defendant continued to access the .nz servers after June 6, 2018. Twombly does not require that plaintiff include in its complaint a log indicating the times and dates on which such access occurred, nor has defendant demanded such specificity as to the pre-June 6 access allegations. If, as appears to be the case, defendant is contesting the veracity of the post- June 6 access allegation, it may not do so in the context of this motion to dismiss. ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 3 1 1. “Without Authorization” 2 The CFAA does not contain a definition of “without authorization.” The Ninth Circuit 3 has, therefore, applied the ordinary, common meaning of “authorization,” concluding that one is 4 5 authorized to access a computer when the owner of the computer gives permission to use it. 6 LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1132-33 (9th Cir. 2009). See also hiQ Labs, Inc. 7 v. LinkedIn Corp., 938 F.3d 985, 999 (9th Cir. 2019) (“We have held in another context that the 8 phrase “without authorization” is a non-technical term that, given its plain and ordinary 9 10 11 12 meaning, means accessing a protected computer without permission.”) (internal quotation marks and citation omitted). A defendant runs afoul of the “without authorization” provisions of the CFAA “when he or she has no permission to access a computer or when such permission has 13 been revoked explicitly. Once permission has been revoked, technological gamesmanship or 14 enlisting of a third party to aid in access will not excuse liability.” Facebook, Inc. v. Power 15 Ventures, Inc., 844 F.3d 1058, 1067 (9th Cir. 2016). The Ninth Circuit has rejected the argument 16 17 18 19 that permission or authorization to access a computer is automatically withdrawn when the user violates a duty owed to the owner of the computer. Rather, whether access is authorized or unauthorized “depends on actions taken by the employer.” Brekka, 581 F.3d at 1134-35. If the 20 computer owner has not affirmatively rescinded the defendant’s right to access the computer, 21 any existing authorization/permission remains. Id. 22 23 Prior to June 6, 2018, defendant had permission to access the .nz servers, albeit with limitations imposed on the manner in which and purposes for which that access could be 24 25 26 27 28 ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 4 1 exercised.3 That permission was revoked on June 6, 2018. Taking plaintiff’s allegations of 2 access as true, the Court finds that defendant accessed the .nz servers with authorization prior to 3 June 6, 2018, and without authorization after that date.4 4 5 6 2. “Exceeds Authorized Access” The CFAA defines “exceeds authorized access” to mean “to access a computer with 7 authorization and to use such access to obtain or alter information in the computer that the 8 accessor is not entitled to so obtain or alter.” 18 U.S.C. § 1030(e)(6). In United States v. Nosal, 9 10 11 12 13 676 F.3d 854 (9th Cir. 2012), the Ninth Circuit acknowledged that this language could be read in two ways. The first would encompass situations in which a person’s authorization to access a computer is limited to certain files, programs, or databases, but he or she “hacks” into other areas of the computer without permission. In the alternative, the language could refer to a person who 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 3 At one point in the First Amended Complaint, plaintiff alleges that, prior to June 6, 2018, it deployed blocking technology “to limit and prevent [defendant’s] access to the .nz WHOIS service and the WHOIS service.” Dkt. # 54 at ¶ 104. The suggestion that plaintiff attempted to deprive defendant of any and all access to its servers prior to June 6, 2018, is contradicted by other allegations of the complaint (see Dkt. # 54 at ¶¶ 3, 40, 67, and 105) and does not, therefore, give rise to a plausible inference that defendant’s authorization or permission to access the .nz servers and the data contained therein was revoked prior to June 6, 2018. If, in fact, plaintiff took steps prior to June 6, 2018, to entirely exclude defendant from accessing the .nz server through passwords, ISP blocking, or other technological means and defendant hacked its way into the servers, plaintiff may file a motion for leave to amend its complaint using the procedures set forth in LCR 15. 4 The Court declines to rule upon defendant’s brief argument (which it expounded upon during oral argument) that plaintiff cannot revoke its authorization to access the .nz servers “given the public nature of the information at issue.” Dkt. # 64 at 17. hiQ Labs, the case cited by defendant, suggests that the reference to “without authorization” limits the scope of statutory protection to information delineated as private through the use of a permission or authentication requirement, such as a password. 938 F.3d at 1001. Plaintiff’s allegations, taken as a whole, give rise to a plausible inference that access through Port 43 is different from and limited in ways that access through plaintiff’s public website is not. The Court declines to scrutinize these inferences further without more of a factual record and additional assistance from the parties. ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 5 1 has unrestricted access to a computer, but who accesses the files, programs, or databases in a 2 way or for a purpose that is proscribed by the owner. Id. at 856-57. The Ninth Circuit was 3 concerned that the second interpretation would “transform the CFAA from an anti-hacking 4 5 statute into an expansive misappropriation statute,” making “everyone who uses a computer in 6 violation of computer use restrictions - which may well include everyone who uses a computer” 7 liable under the CFAA. Id. at 857.5 The Ninth Circuit held that, whereas the “without 8 authorization” clause of § 1030(c)(2) applies to outside hackers with no rights or authority to 9 10 11 12 access the computer at all, the “exceeds authorized access” clause applies to inside hackers “whose initial access to a computer is authorized but who access unauthorized information or files.” Id. at 858. It sided with “the growing number of courts” who recognize that the CFAA 13 “target[s] the unauthorized procurement or alteration of information, not its misuse or 14 misappropriation.” Id. at 863 (quoting Shamrock Foods Co. v. Gast, 535 F. Supp.2d 962, 965 (D. 15 Ariz. 2008)). 16 17 18 19 20 Plaintiff argues that once it specifically and individually reminded defendant on November 2, 2017, that its access to the .nz servers was subject to plaintiff’s terms of use, further access in violation of the terms of use exceeded defendant’s authorization under the analysis set forth in Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058 (9th Cir. 2016), and 21 22 23 24 25 26 27 28 5 The Ninth Circuit recognized that “[w]henever we access a web page, commence a download, post a message on somebody’s Facebook wall . . . or do the thousands of other things we routinely do online, we are using one computer to send commands to other computers at remote locations. Our access to those remote computers is governed by a series of private agreements and policies that most people are only dimly aware of and virtually no one reads or understands.” Id. at 861. Because “website owners retain the right to change the terms [of use] at any time and without notice,” an interpretation of “exceeds authorized access” that encompassed violations of use restrictions would mean that “behavior that wasn’t criminal yesterday can become criminal today without an act of Congress, and without any notice whatsoever.” Id. at 862. ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 6 1 Ticketmaster LLC v. Prestige Entm’t W., Inc., 315 F. Supp.3d 1147, 1171 (C.D. Cal. 2018). 2 Facebook does not support plaintiff’s claim of a CFAA violation prior to June 6, 2018. In that 3 case, Facebook issued a cease-and-desist letter notifying defendant that it was no longer 4 5 authorized to access Facebook’s computers. Facebook, 844 F.3d at 1067 n.3. In light of the 6 “explicit revo[cation of the] authorization for any access,” the Ninth Circuit found that 7 defendant’s access following receipt of the notice was without authorization and a violation of 8 the CFAA. Id. at 1068 (emphasis in original). Plaintiff’s November 2, 2017, letter did not revoke 9 10 11 12 defendant’s access to the .nz servers, it simply reminded defendant that access was subject to the terms of use. Ticketmaster, on the other hand, supports plaintiff’s argument, but the Court declines to 13 adopt its analysis. In Ticketmaster, the ticket seller made tickets available to the public on its 14 website subject to terms of use that barred the use of robots, programs, and other automated 15 devices (“bots”) to make purchases. Defendants used bots to purchase large quantities of tickets 16 17 18 19 for resale. The district court recognized that simply violating Ticketmaster’s terms of use did not, standing alone, constitute a violation of the CFAA under Nosal. The district court distinguished Nosal, however, on the ground that Ticketmaster had sent defendants an 20 individualized cease-and-desist letter informing them that their access was restricted to that 21 which conforms to Ticketmaster’s terms of use. In the court’s view, this letter “was, in effect, an 22 individualized access policy that revoked authorization upon breach of the policy. . . . [It was] 23 24 25 26 27 28 the violation of the terms of the Letter, not of Ticketmaster’s Terms of Use, on which the Court base[d] its finding of a well-pled CFAA claim.” 315 F. Supp.3d at 1170-71. The Court respectfully disagrees. Permission or authorization to access a computer does ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 7 1 not evaporate simply because the user has violated a duty owed to the owner of the computer. 2 See Brekka, 581 F.3d at 1134-35 (rejecting the Seventh Circuit’s reasoning in Int’l Airport Ctrs., 3 LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006), and requiring the employer to rescind the 4 5 defendant’s right to use the computer before potential criminal liability under the CFAA will 6 attach). “The CFAA was enacted to prevent intentional intrusion into someone else’s computer - 7 specifically, computer hacking.” hiQ Labs, 938 F.3d at 1000. The forbidden conduct is 8 analogous to “breaking and entering,” where defendant has unlawfully intruded into otherwise 9 10 11 12 inaccessible computers (or portions thereof) in a form of trespass. Id.(quoting H.R. Rep. No. 98894, at 20 (1984)). The Ninth Circuit has already determined that the rule of lenity demands that the “exceeds authorized access” prong of the CFAA be given a narrow interpretation so as to 13 criminalize unauthorized access to a computer (or part thereof), not the misuse of authorized 14 access. Nosal, 676 F.3d at 863. See also hiQ Labs, 938 F.3d at 1000 (recognizing that the Ninth 15 Circuit has “rejected the contract-based interpretation of the CFAA’s prohibitions). This Court is 16 17 18 19 not at liberty to second guess the Ninth Circuit’s resolution of the issue, nor is it persuaded that simply repeating or referencing the existing use restrictions in a letter changes the scope of authorized access in a material way. For all of the foregoing reasons, the Court finds that the allegations of the First Amended 20 21 Complaint do not support a plausible inference that defendant exceeded its authorization to 22 access the .nz servers (as that phrase has been interpreted by the Ninth Circuit) prior to June 6, 23 24 25 26 27 28 2018. 3. “Damage or Loss” The CFAA provides a private right of action to “[a]ny person who suffers damage or loss ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 8 1 by reason of a violation of this section,” 18 U.S.C. § 1030(g), as long as the violation causes 2 “loss to 1 or more persons during any 1-year period . . . aggregating at least $5,000 in value,” 18 3 U.S.C. § 1030(c)(4)(A)(i)(I). “Damage” is defined as “any impairment to the integrity or 4 5 availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). “Loss” means 6 “any reasonable cost to any victim, including the cost of responding to an offense, conducting a 7 damage assessment, and restoring the data, program, system, or information to its condition prior 8 to the offense, and any revenue lost, costs incurred, or other consequential damages incurred 9 10 11 12 13 because of interruption of service.” 18 U.S.C. § 1030(e)(11). Thus, while “damage” covers harm to the integrity or availability of the data or information on the computer, “loss” refers to the monetary injuries imposed on plaintiff by defendant’s conduct. Plaintiff alleges that it “has suffered loss in an amount far in excess of the $5,000 14 statutory minimum during each relevant one-year period, in an amount to be proved at trial. This 15 loss includes, without limitation, the costs [plaintiff] has incurred in investigating and 16 17 18 19 responding to [defendant’s] misconduct.” Dkt. # 54 at 25.6 For the reasons discussed above, the only potential violations of the CFAA occurred after June 6, 2018, and plaintiff’s allegations provide no basis on which to allocate the alleged losses between the pre- and post-revocation 20 periods. Plaintiff filed its initial complaint on June 15, 2018, less than two weeks after it revoked 21 defendant’s right to access the .nz servers: the identical loss allegation is in that document, again 22 23 24 25 26 27 28 6 Defendant points out that, in order to survive a motion to dismiss the claim under 18 U.S.C. § 1030(a)(5)(C), plaintiff must allege facts giving rise to a plausible inference that its unauthorized access to the .nz servers caused both “damage and loss” in the conjunctive. See NovelPoster v. Javitch Canfield Group, 140 F. Supp.3d 954, 961 (N.D. Cal. 2014). Because plaintiff has not adequately alleged the jurisdictional amount, the Court need not determine whether “damage” has been alleged for purposes of § 1030(a)(5)(C). ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 9 1 with no indication of any events or actions giving rise to post-revocation “loss.” See Dkt. # 1 at 2 ¶ 105. The Court finds that the allegations do not give rise to a plausible inference that 3 defendant’s alleged violations of the CFAA - limited as they are to the post-June 6, 2018, period 4 5 6 - caused damage or loss in excess of $5,000. B. Washington Consumer Protection Act (“CPA”), RCW 19.86 7 To prevail on a CPA claim, plaintiff must prove an “(1) unfair or deceptive act or 8 practice; (2) occurring in trade or commerce; (3) public interest impact; (4) injury to plaintiff in 9 10 11 12 his or her business or property; [and] (5) causation.” Hangman Ridge Training Stables, Inc. v. Safeco Title Ins. Co., 105 Wn.2d 778, 780 (1986). Plaintiff alleges that defendant’s efforts to circumvent the rate limiting and use restrictions plaintiff imposed to protect the data on its 13 servers was “unfair or deceptive,” that defendant engaged in these unfair acts in order to create 14 and sell its products and services, that the public’s interest is impacted because consumers are 15 deprived of their privacy, and that plaintiff has incurred expenses and suffered injury to 16 17 18 19 reputation and good will as a result. Dkt. # 54 at ¶¶ 109-112. The CPA is a consumer protection statute that applies to both “unfair” and “deceptive” acts and practices. The wrongs about which plaintiff complains - that defendant improperly 20 gathered data from plaintiff’s computers and repackaged it into products and services for its own 21 customers - are not deceptive insofar as they do not have “the capacity to deceive a substantial 22 portion of the public.” Hangman Ridge, 105 Wn.2d at 785. Plaintiff has identified no 23 24 25 26 27 28 representation or act defendant directed at the public, much less one that has the capacity to deceive a substantial portion of the public. Rather, plaintiff alleges that the information defendant publishes to its customers may be outdated and the customers could obtain more ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 10 1 accurate information directly from plaintiff. Dkt. # 54 at ¶ 88. Absent some indication that 2 defendant advertises its wares as “100% accurate” or “the most up-to-date registry information 3 4 5 6 available,” merely offering for sale a product or service that could be bettered is not a deceptive act.7 The CPA also prohibits unfair acts and practices, even if they are not deceptive. Klem v. 7 Wash. Mut. Bank, 176 Wn.2d 771, 787 (2013). Although the full contours of “unfair acts” under 8 the CPA have not yet been established, the Supreme Court of Washington has cited federal law 9 10 11 12 for the proposition that a “practice is unfair [if it] causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits.” Klem, 176 Wn.2d at 787 (quoting 15 U.S.C. § 45(n)) (alteration in 13 original). Plaintiff describes the unfair acts at issue here as harvesting and storing .nz registrant 14 information by means of cyber misconduct, particularly the circumvention of protective 15 technologies and the breach of plaintiff’s terms of use. Dkt. # 68 at 25. Circumventing a server’s 16 protective technologies can be an unfair method of competition, act, or practice.8 Defendant 17 18 19 20 21 22 23 24 25 26 27 28 7 At oral argument, plaintiff argued that defendant disguised itself to avoid the technological defenses plaintiff erected and to hide its improper bulk queries and downloads. While disguising oneself may well be deceptive, plaintiff has not raised a plausible inference that anyone but itself was deceived by the disguise. 8 Courts around the country have found that companies that hold sensitive personal and financial information but fail to take adequate steps to secure their servers may be liable under various consumer protection statutes. See FTC v. Wyndham Worldwide Corp., 799 F.3d 236, 247 (3rd Cir. 2015); Gordon v. Chipotle Mexican Grill, Inc., 344 F. Supp.3d 1231 (D. Colo. 2018); Buckley v. Santander Consumer USA, Inc., 2018 WL 1532671, at *4 (W.D. Wash. Mar. 29, 2018) (CPA); Veridian Credit Union v. Eddie Bauer, LLC, 2017 WL 5194975, at *13 (W.D. Wash. Nov. 9, 2017) (CPA); In re Anthem, Inc. Data Breach Litig., 162 F. Supp.3d 953 (N.D. Cal. 2016); In re Michaels Stores Pin Pad Litig., 830 F. Supp.2d 518 (N.D. Ill. 2011). If the failure to adequately protect sensitive customer data can be deemed unfair, it is hard to imagine that circumventing the security systems imposed by the holder of the data in its (unsuccessful) effort to prevent the misuse of the information would be considered “fair.” ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 11 1 argues, however, that the allegations of the complaint do not give rise to a plausible inference 2 that defendant’s conduct “is likely to cause substantial injury to consumers.” Klem, 176 Wn.2d 3 at 787 (quoting 15 U.S.C. § 45(n)). The information defendant obtained was, defendant points 4 5 out, available to the public through plaintiff’s website and Port 43 at the time it was obtained, 6 and there is no indication that .nz registrants had any reason to believe that plaintiff would keep 7 the information they provided confidential.9 Nevertheless, .nz registrants did have reason to 8 believe that their information would not be harvested and stored, such that they could cancel 9 10 11 12 their registration or alter their privacy selections and limit what information would be publicly availabe going forward: what plaintiff calls a consumer’s “dynamic privacy interest.” Consumers who chose to participate in plaintiff’s enhanced individual registrant privacy option when it was 13 offered were therefore harmed by defendant’s prior downloading/storing of information that, 14 while previously available to the public, was now unavailable. At that point, defendant had 15 access to - and sold - information it had unfairly downloaded and stored, depriving consumers of 16 17 18 19 their ability to control the privacy of certain information in accordance with their agreements with plaintiff. The Court finds that plaintiff has raised a plausible inference that defendant’s use of bulk 20 queries to download and store registrant information in violation of protective technologies and 21 terms of use is an unfair act in trade or commerce that is likely to cause substantial injury to 22 consumers which is not reasonably avoidable by consumers themselves and not outweighed by 23 countervailing benefits. 24 25 26 27 28 9 For most of the relevant period, registering for a .nz domain name involved an acknowledgment that all registrant information would be available to the public. ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 12 1 2 3 For all of the foregoing reasons, defendant’s motion to dismiss the CFAA and CPA claims is GRANTED in part. Because this matter continues as to plaintiff’s breach of contract and CPA claims, leave to amend will not be blindly granted. If plaintiff believes it can, 4 5 consistent with its Rule 11 obligations, amend the complaint to remedy the pleading and legal 6 deficiencies in its CFAA claim, it may file a motion to amend and attach a proposed pleading for 7 the Court’s consideration. 8 9 10 11 12 Dated this 26th day of March, 2020. A Robert S. Lasnik United States District Judge 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ORDER GRANTING IN PART DEFENDANT’S MOTION TO DISMISS - 13

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?