Copyright © 2015 Computer Law Reporter, Inc. All

Transcription

Copyright © 2015 Computer Law Reporter, Inc. All
Copyright © 2015 Computer Law Reporter, Inc. All Rights Reserved.
Click Here To Go to the Front Page
(All clickable links in green text)
YES! Please enter my trial subscription to Internet Law & Business and invoice me. If for any
reason I am not satisfied I may, within 30 days of receipt, either mark the invoice "cancelled"
and return it with the materials, or if I enclose payment now, obtain a full refund.
Please bill me $2106 for a one-year subscription to the monthly
Internet Law & Business.
I have enclosed a check (10% discount from above price).
DC SUBSCRIBERS PLEASE ADD 6% SALES TAX
NAME ________________________________________________________________
FIRM _________________________________________________________________
STREET ______________________________________________________________
CITY _____________________________ STATE _______ ZIP __________________
Return to:
Internet Law & Business
1601 Connecticut Avenue, N.W.
Suite 701
Washington, DC 20009
SAVE TIME! FAX TO (202) 328-2430
OR
EMAIL TO [email protected]
W
Internet Law & Business
May 2015
Editors
Neil J. Cohen, Esq.
David A. Dana, Esq., Professor of Law, Northwestern University School of Law
Articles
FAIR CREDIT REPORTING ACT
Round Table
on Internet Privacy............................... 3
Comments on the News................. 27
Case Summaries.................................. 42
Best of the Blogs................................. 57
CLASS ACTIONS
Third Circuit Reverses Denial of
Motion for Class Certification Because
District Court Erred in Applying
Ascertainability Precedent................................. 44
CONTRACTS
Court Might Enforce A Contract
Ban On Consumer Reviews............................... 61
Do Employers Own LinkedIn
Groups Created By Employees? ........................ 62
DERIVATIVE LIABILITY
Union Isn’t Liable For Members’
Posts To Private Facebook Group...................... 64
LinkedIn’s “Reference Search” Service
Doesn’t Violate Fair Credit Reporting Act......... 57
PRIVACY
Federal Court Denies Motion To Dismiss
Breach of Contract and California Unfair
Business Practices Claims Based on Google’s
Alleged Disclosure of Users’ Personal Data
to Apps; Because Personal Data Has
Alleged Economic Value, Claims for
Damages Under Both Contract Law
and the California Business and
Professional Code May Proceed......................... 51
TRADEMARK
Mixed Ruling in Competitive
Keyword Advertising Case................................. 59
Another Competitive Keyword
Advertising Lawsuit Fails.................................. 66
STANDING
Ninth Circuit Validates Equitable
Quasi-Contract Remedy in Lieu of
Actual Damages; Calls for Stay Rather
Than Dismissal of False Advertising
Case Under Primary Jurisdiction Doctrine........ 47
Internet Law & Business
1601 Connecticut Avenue, NW • Suite 701 • Washington, DC 20009
202-462-5755 • fax 202-328-2430
E-mail: [email protected] • Website: www.lawreporters.com
Editors
Neil J. Cohen, Esq.
David A. Dana, Esq.
Professor of Law, Northwestern University School of Law, Chicago, IL
[email protected]
Copyright Editors
Jeffrey P. Cunard, Esq.
Debevoise & Plimpton LLP
Washington, DC
Bruce P. Keller, Esq.
Debevoise & Plimpton LLP
New York, NY
Catherine S. Bridge, Esq.
The Walt Disney Company
Burbank, CA
Steven B. Fabrizio, Esq.
Jenner & Block LLP
Washington, DC
Professor Michael A. Geist, Esq.
University of Ottawa Law School
Ottawa, Ontario, Canada
Eric Goldman, Esq.
Santa Clara University School of Law
Santa Clara, CA
Linda A. Goldstein, Esq.
Manatt, Phelps & Phillips, LLC
New York, NY
Fred M. Greguras, Esq.
K&L Gates
Palo Alto, CA
Jeffrey C. Johnson, Esq.
Pryor Cashman LLP
New York, NY
Trademark Editor
Brian B. Darville, Esq.
BROCADIANT PLLC
Alexandria, VA
Jurisdiction Editor
Michael Grow, Esq.
Arent Fox PLLC
Washington, DC
Editorial Board:
Stuart D. Levi, Esq.
Skadden, Arps, Slate,
Meagher & Flom LLP
New York, NY
Tobey B. Marzouk, Esq.
Marzouk & Parry
Washington, DC
Jeffrey D. Neuburger, Esq.
Proskauer Rose, LLP
New York, NY
Robert L. Raskopf, Esq.
Quinn Emanual
New York, NY
Gary J. Rinkerman, Esq.
Drinker, Biddle, & Reath LLP
Washington, DC
Ira P. Rothken, Esq.
Rothken Law Firm
San Rafael, CA
Robert A. Shlachter, Esq.
Stoll, Stoll, Berne, Lokting
& Shlachter
Portland, OR
Thomas J. Smedinghoff, Esq.
Edwards Wildman Palmer LLP
Chicago, IL
Neil A. Smith, Esq.
Ropers Majeski Kohn Bentley PC
San Francisco, CA
Jordan S. Weinstein, Esq.
Oblon, Spivak, McClelland,
Maier & Neustadt, P.C.
Arlington, VA
J.T. Westermeier, Esq.
Finnegan, Henderson, Farabow,
Garrett & Dunner LLP
Reston, VA
Donna G. White, Esq.
Osler, Hoskin & Harcourt
Ottawa, Ontario, Canada
E. Robert Yoches, Esq.
Finnegan, Henderson, Farabow,
Garrett & Dunner, LLP
Washington, DC
Subscription price $2106 per year. Published by Computer Law Reporter, Inc., 1601 Connecticut Avenue, N.W., Suite 701,
Washington, D.C. 20009 • 202-462-5755 • Fax 202-328-2430 • Copyright © 2015 Computer Law Reporter, Inc. All Rights
Reserved. ISSN 1529-6369. Publications Director: John G. Herring. Production Manager: Kristina M. Reznikov. The views
expressed herein do not necessarily represent those of the Editors or the members of the Board of Advisors. This publication is
not affiliated with Northwestern University School of Law
Round Table on Internet Privacy
Publisher’s Introduction
By
Neil J. Cohen
This Round Table features four articles on various aspects of internet privacy. The
first, by Law Professor David A. Dana at Northwestern University analyses four recent
California cases that take an extremely liberal approach on standing, pleading and remedies. Two of these decisions come from the Ninth Circuit: In re Facebook Litig, an unpublished memorandum opinion, and Astiana v. Hain Celestial (see summary in this issue).
The other two decisions come from the Northern District of California: Opperman v. Path,
Inc., (see summary in last issue) and Svenson v. Google, Inc. see summary in this issue,
section, infra, page 51. According to Professor Dana:
Taken together, these decisions suggest that claims alleging certain California statutory and com-
mon law violations involving use or disclosure of the personal information of customers by technology
companies can survive a motion to dismiss even with very general, even arguably vague, allegations.
Specifically, claims under California’s Unfair Competition Law (“UCL”) and Consumer Legal Remedies
Act (“CLRA”) and claims for common law breach of contract and fraud and perhaps unjust enrichment
now appear to be able to survive a motion to dismiss even when (1) there are no allegations of individual
plaintiff reliance on alleged misrepresentations; (2) there are no particularized factual allegations backing up general allegations that the services or products received by plaintiffs were worth less than they
would have been worth had promised protections for personal information been afforded; and/or (3)
there are no particularized factual allegations backing up general allegations plaintiffs lost economic
opportunities because they could not sell their personal information for as much or at all once that information was disclosed or shared with others by the technology company whose product or service was
purchased. One of these cases, Opperman, also establishes that partial disclosures by a company of the
risk that users’ personal information may be used or disclosed does not eliminate the risk of fraud or
other claims against the company, but instead can form the basis of an active concealment claim.
The second article describes a United Kingdom case that goes even further than the
California courts by explicitly creating a new common law right to privacy grounded
only by the plaintiff’s emotional distress. The title of the article is “The European Privacy
Judicial Decision of a Decade: Google v. Vidal-Hall”. The author, Law Professor Omer
Tene, asserts:
3
In a field that assesses illegitimate behavior according to fickle notions such as “unfairness” and
“creepiness,” the expansion of recoverable damages to purely emotional damage is groundbreaking. And
given the rhetorical force of the UK court, companies on both sides of the Atlantic should prepare for a
potential opening of the floodgates of individual and class actions. In recognizing non-economic damages, the UK court reversed a legal fiction it had traditionally used to award damages in the absence of
pecuniary loss—finding nominal pecuniary damage, for example, one pound British, as a basis to award
more significant compensation for emotional distress.
The third article by Fernando A. Bohorquez, Jr., a partner & Jenna Felz, an associate
at BakerHosteler focuses on the shifting trend to FTC regulation and litigation involving
mobile networks and the internet of things (“IoT”). The authors describe their comment as
follows:
This post provides a high-level summary of the major 2014 trends in mobile: marketing, mobile
pay, and the IoT, as well as the legal and regulatory response. We then break out our magic eight ball to
predict the mobile marketing and legal trends that will likely unfold over the next 12 months.
The fourth article by Kaylee Cox, as associate Holland and Knight, summarizes the
71-page FTC staff report on the Internet of Things released on January 27. Her summary
focuses on the inclusion of Fair Information Practice Principles (“FIPPs”) into the IoT
realm. In particular, the summary concentrates on the FTC’s four Fair Information Practice
Principles (FIPPs): (i) security; (ii) data minimization; (iii) notice; and (iv) choice. In
addition to FIPPs, the FTC report also touches on privacy and security-related legislative
proposals.
The Spokeo Case
As this issue was going to press we learned that the Supreme Court had taken certiorari
in an injury-at-law case, Spokeo v. Robins. In our new “Comments on the News” section,
infra, page 27, the publisher provides a detailed summary of the briefs, publication of key
excerpts, and a prognosis on how the Court might rule, section, infra, page 29. The author
maintains:
How the Court rules on the standing issue ultimately affects two national policy issues: First, is
the protection of consumers more important than the risk of strike suits? Second, do government units
have insufficient resources to adequately enforce the statute so that consumers are needed to supplement
them? These are questions that are the province of the federal government.
…Because this case implicates the enforcement of many statutes enacted to benefit consumers, the
Supreme Court should be reluctant to impose standing requirements that prevent consumers from seeking a remedy in federal court. If the Court decides to dodge the question of whether a naked injury-at-law
can be an injury-in-fact it could remand the case for a determination of whether plaintiff’s allegations
4
of anxiety and potential economic damages are sufficient to confer standing. More likely the court will
choose to uphold the Ninth Circuit ruling, albeit with some language narrowing the reach of the decision.
* * *
Courts Uphold California Privacy Claims Despite Vague Allegations:
Opening The Litigation Floodgates Or Simply Giving Plaintiffs
A Reasonable Opportunity To Prove Their Claims?
David A. Dana
A burgeoning area of litigation involves claims that Internet and digital companies like
Google, Facebook, and Twitter have insufficiently protected or actively appropriated user’s
personal information. Because of the enormous numbers of users and hence enormous
number of potential plaintiffs in such cases, which invariably are framed as putative class
actions, potential liability for defendants is enormous. However, the district courts have
repeatedly dismissed such suits for lack of Article III standing and/or for failure to state a
claim. This Article addresses a recent quartet of decisions that may reflect a precedential
gold mine for plaintiffs bringing claims for unconsented-to disclosure or use of their per-
sonal information. Two of these decisions come from the Ninth Circuit: In re Facebook
Litig., _ Fed. App’x _, No. 12-151619, May 8, 2014 (“Facebook”), which is an unpublished memorandum opinion, and Astiana v. Hain Celestial (“Astiana”), No. 12-17596,
April 10, 2015, which is an opinion designated for publication. Two of the decisions come
from the Northern District of California: Opperman v. Path, Inc., Case 13-cv-00453-JST,
March 23, 2015 (“Opperman”), and Svenson v. Google, Inc., Case No. 13-cv-04080-BLF,
April 1, 2015 (“Svenson”).
Taken together, these decisions suggest that claims alleging certain California statu-
tory and common law violations involving use or disclosure of the personal information
of customers by technology companies can survive a motion to dismiss even with very
general, even arguably vague, allegations. Specifically, claims under California’s Unfair
Competition Law (“UCL”) and Consumer Legal Remedies Act (“CLRA”) and claims for
common law breach of contract and fraud and perhaps unjust enrichment now appear to
be able to survive a motion to dismiss even when (1) there are no allegations of individual
plaintiff reliance on alleged misrepresentations; (2) there are no particularized factual al-
legations backing up general allegations that the services or products received by plaintiffs
were worth less than they would have been worth had promised protections for personal
information been afforded; and/or (3) there are no particularized factual allegations back-
ing up general allegations plaintiffs lost economic opportunities because they could not
5
sell their personal information for as much or at all once that information was disclosed or
shared with others by the technology company whose product or service was purchased.
One of these cases, Opperman, also establishes that partial disclosures by a company of the
risk that users’ personal information may be used or disclosed does not eliminate the risk
of fraud or other claims against the company, but instead can form the basis of an active
concealment claim.
This apparent shift in the case law involving California law may be a response to recent
attention in the media to the problem of inadequate security for personal information; perhaps the Courts believe that these personal information suits should be allowed to at least
proceed to discovery, as a way to help keep corporate giants like Google “on their toes.”
Whatever the motivations behind these recent cases, they leave a number of ques-
tions open. While these cases can be distilled for the proposition that generalized allegations will suffice for purposes of surviving a motion to dismiss, it is not completely clear
where the line is between sufficient, albeit generalized, pleading and excessively generalized and hence insufficient pleading. This is especially the case with respect to the ques-
tion of when plaintiffs can plead their way of out of needing to allege individual reliance
under Opperman. Moreover, the Ninth Circuit may well choose to revisit the decisions
in Facebook, which is only an unpublished memorandum, and Astiana, which is a very
thinly reasoned, arguably incoherent opinion. District courts, at least outside the Northern
District of California, may choose not to follow these decisions or seek to distinguish them.
Finally, and most notably, the quartet of decisions discussed below only go the question of
whether a complaint will survive a motion to dismiss; they do not suggest that these suits
will be successful at the summary judgment phase of litigation. Courts could allow claims
to go past the motion to dismiss phase of litigation, but then hold plaintiffs to a high standard regarding proof of their allegations.
Fraud, Misrepresentation, Deceit, And Active Concealment Claims
In Opperman, Judge Tigar of the Northern District of California issued an opinion
that may invigorate efforts to hold companies accountable for their advertising regarding
privacy protections for personal data. In a putative class action alleging violations of the
UCL, CLRA, and other statutes, the plaintiffs argued that Apple fraudulently represented
that their personal information would be protected by Apple, and that Apple concealed the
fact that it knew personal information of users in fact had not been protected as promised.
Ordinarily, in a state law fraud action of this sort, purchasers of a product or service would
have to allege individual reliance on particular misrepresentations made by the defendant.
But here Judge Tigar denied the motion to dismiss the fraud claims, even though plaintiffs
6
alleged no individual reliance. Judge Tigar interpreted California law as allowing fraud
actions to proceed without individual-reliance allegations where there was “an extensive
and long-term advertising campaign” by the defendant regarding its promises to protect
personal information. According to Opperman, Federal Rule of Civil Procedure 9(b) in this
context does not require more particular pleading than would be required in a state court.
Moreover, Judge Tigar interpreted “an extensive and long-term advertising campaign” in
a way that may be quite useful to future plaintiffs. The Court also held that plaintiffs
had adequately alleged that Apple had acted unlawfully in failing to disclose it exclusive
knowledge that personal information was not being protected and in actively concealing
those same facts.
According to Opperman, even statements made by Apple before the product launch at
issue could be counted as part of the advertising campaign. In addition, statements made
by third parties and the media could be considered part of the campaign, given that Apple
allegedly sought out such “buzz.” Even though the statements regarding “security” and
the like were varied and directed at different audiences, they could constitute a single
campaign.
Opperman does not establish a bright line as to how many or what sort of alleged mis-
representations are needed in order to adequately allege that there was “an extensive and
long-term advertising campaign” of fraudulent representations. Judge Tigar found that the
twenty plus examples of security-related representations were sufficient, and seemed to
suggest that far fewer than twenty alleged misrepresentations might be too few. It appeared
to help the plaintiffs that at least a few of the alleged misrepresentations were particular
enough – for example, “[a]pplications on the device are ‘sandboxed’ so they cannot access
data stored by other applications” – that they were “capable of being proven false.”
Opperman also appears to open up opportunities for future plaintiffs to make active
concealment claims against companies when the companies only partially disclose the
risks that personal information actually might not be held secure. In Opperman, Apple con-
tended that the plaintiffs failed to allege active concealment adequately because Apple’s
Privacy Policy disclosed that third parties, including those who offer Apps, may collect
information such as “data or contact details.” But Judge Tigar found that the plaintiffs had
adequately alleged active concealment because they alleged that Apple failed to disclose
all the material facts, Apple falsely reassured consumers that its iDevices did not contain
security vulnerabilities that Apple knew they contained, and Apple did not disclose that it
taught or encouraged App developers to access users’ information. Partial disclosure of
risks that personal information is insecure, in other words, does not protect companies from
7
liability and in fact might only support the claim that the companies actively concealed material information of risks from purchasers of products or services. When companies disclose risks regarding the security of personal information, Opperman teaches, they would
be well-advised to fully disclose those risks and not withhold material information.
For technology companies and their lawyers, Opperman creates a kind of quandary. On
the one hand, a company may well want to advertise to current and potential customers it
personal information/data privacy protections as a way of keeping and wooing customers
from possible competitors and increasing sales. On the other hand, if the company does
advertise, advertisements may ex post be deemed “an extensive and long-term advertising
campaign” and used as a basis for expensive class action litigation against the company.
Breach Of Contract – Deprivation Of The Benefit of The Bargain
To state a breach of contract claim, plaintiffs must be able to plead some contract dam-
ages, which means they must be able to allege some cognizable economic injury. Likewise,
to the extent that the UCL allows claims based on “unlawful” conduct and conduct in
breach of contract is unlawful, plaintiffs bringing a UCL claim based on contract violations
also must allege economic injury, because such injury is an explicit requirement for a UCL
cause of action. A concrete injury, which usually would mean an economic injury in the
personal information/data security context, is also required for Article III standing.
The big question for plaintiffs pursuing claims in the personal information/data securi-
ty context is how far will the courts go in accepting a “creative” theory of economic injury
when there is no very straightforward theory available to the plaintiffs. One such theory
that plaintiffs lawyers have offered is a lost-benefit-of-the-bargain or overpayment theory,
which contends that when the purchaser of a computer product or service that promises pri-
vacy protection buys the product or service but does not receive the promised protection,
that person has overpaid for the product or service, and the economic injury consists of the
difference between the purchase price that was paid and the lesser price that would have
been paid had the good or service been explicitly offered as lacking in privacy protection.
One problem with his theory is that plaintiffs may be hard pressed to prove – or even
credibly allege – that they paid more for a product or service because of promised protection. Indeed, in In re Linked User Privacy Litigation, 932 F.Supp.2d 1089 (2013), Judge
Davila of the Northern District of California dismissed privacy-related claims against users
of Linked-In’s premium service, in part because Linked-In promised the same protections
to premium and non-premium users and hence it could not be presumed premium users
paid for promised privacy protection.
8
In Svenson, however, Judge Freeman of the Northern District of California refused to
dismiss a breach of contract claim in a case where there was arguably an absence of partic-
ularized factual allegations supporting the claim plaintiffs paid more than they would have
had they not been promised privacy protections.
The Court pointed to two allegations
made by plaintiffs: that “[t]he services Plaintiff and Class Members ultimately received in
exchange for Defendants’ cut of the App purchase price – payment processing, in which
their information was unnecessarily divulged to an unaccountable third party – were worth
quantifiably less than the services they agreed to accept, payment processing in which the
data they communicated to Defendants would only be divulged under circumstances which
never occurred. . . .” and “[h]ad Plaintiff known Defendants would disclose her Packets
Contents, she would not have purchased the ‘SMS MMS to Email’ App from Defendants.”
These allegations were deemed “sufficient to show contract damages under a benefit of
the bargain theory,” even though the slightly more general allegations in a prior version
of the complaint had been deemed insufficient by the same judge. One alleged fact in the
amended complaint that may have been persuasive for Judge Freeman was that Google did
receive a share of the payment for an “App” plaintiffs made, and was not providing processing for free. Overall, at least where the defendant did receive payment for a product
or service – which would seem to be most cases – Svenson seems to allow a benefit-of-
the-bargain contract claim as long as the plaintiff very explicitly alleges that they regarded
privacy or security protections as part of the bargain and would not have paid what they
paid had they known privacy or security would not be provided. Thus, it should be quite
easy – and courts one day swamped with suits may find, too easy – for plaintiffs to allege
economic injury in the form of deprived benefit of the bargain in the personal information/
data security context.
Breach of Contract – Loss Of Market Opportunity
A second theory for contract damages in the personal information/data security setting
is that purchasers of a service or product lost an opportunity to sell their own personal data
when a company that promised to preserve the privacy or security of their personal information actually uses or discloses that information for its own purposes. A line of federal
district cases, including ones from the Northern District of California, held that general
allegations that the plaintiffs lost an opportunity to sell their own personal information as
a result of contractual violations of privacy or data security promises were insufficient to
satisfy the requirement that plaintiffs allege Article III economic injury and/or damages
as part of a breach of contract claim. However, in the unpublished memorandum opinion
in Facebook, the Ninth Circuit held that where “[p]laintiffs allege[d] that the information disclosed by Facebook . . . harmed” them because they “los[t] the sales value of that
9
information,” the allegations were sufficient to show the element of damages for their
breach of contract claim. In reversing the district court’s dismissal of the contract claim
against Facebook, the Ninth Circuit, albeit in an opinion that lacks binding authority under
Ninth Circuit rules, signaled that plaintiffs need do no more than allege what the Facebook
plaintiffs alleged in order to have a breach of contract claim survive a motion to dismiss.
And the Facebook plaintiffs had not alleged facts supporting their general allegation that
they lost an opportunity to sell their own personal information due to Facebook’s alleged
misconduct.
Judge Freeman in Svenson explained that the case law prior to the Ninth Circuit’s
decision in Facebook – case law Google largely relied upon – was inapposite because the
Ninth’s Circuit’s decision changed what was required for plaintiffs to allege. For Judge
Freeman, the Ninth Circuit’s decision appeared to be governing even though it is a memorandum decision. Judge Freeman may have taken this position because even though the
Facebook memorandum opinion is inconsistent with prior district court rulings, it is not
even arguably inconsistent with any other Ninth Circuit opinions, as the Ninth Circuit had
not previously addressed this issue.
As Judge Freeman explained, the Ninth Circuit in Facebook did not require an explica-
tion of precisely how personal information was diminished in value as part of a well-pled
contract claim. Thus, even though the plaintiffs in Svenson alleged only that there is a
“robust market” for the information at issue and as a result of Facebook’s actions, plaintiffs
were deprived of their ability to sell their own personal data on the market,” those allegations were found to be sufficient.
Taken together, the Ninth Circuit’s decision in Facebook and Svenson suggest that, at
least in the Northern District of California, bare allegations of loss of value in personal in-
formation will suffice. That is certainly how litigants in that District are treating the current
state of the law, as evidenced by both the plaintiffs’ and defendants’ briefs in In re Google,
Inc. Privacy Litigation, No. 12-CV-01382 PSG, before Judge Grewal, in which the parties
seem to agree that the law has shifted with Facebook and Svenson, but disagree whether
diminution in value of personal information is actually at issue in their case or whether
their case only relates to alleged loss in battery life and bandwidth.
Implied Covenant Of Good Faith And Fair Dealing
In the Svenson litigation, Judge Freeman dismissed the complaint’s implied covenant of good faith and fair dealing claim as duplicative of the breach of contract
count. After the plaintiffs in their amended complaint added a few additional allegations, Judge Freeman held that the plaintiffs had adequately plead a stand-alone
10
claim but his opinion does not explain why the additional allegations rendered the
implied covenant claim non-duplicative. One possible way to understand the plaintiffs’ implied covenant claim, in light of the subsequent Astiana opinion (see below),
is that it is a quasi-contract claim for which restitution could be sought as a remedy
and for which contract damages need not be pled or shown. Svenson therefore may
underscore the possible implications of Astiana for privacy litigation.
Unjust Enrichment
If plaintiffs in personal information/data security cases can avoid alleging contract
claims and can instead allege unjust enrichment, then they might be able to avoid alleging
contract damages, which outside of the Northern District of California, can be difficult
(although they still need to allege economic injury for Article III purposes). However,
under California law, it has generally been understood that unjust enrichment is not a standalone action but rather a remedy that can be sought after a stand-alone claim like breach
of contract or fraud is adequately pled. Nonetheless, the Ninth Circuit’s recent decision in
Astiana perhaps suggests plaintiffs in personal information/data security cases could plead
unjust enrichment as a distinct clause of action under a quasi-contract theory, even though
the unjust enrichment/quasi-contract theory claim would look just like a breach of contract
or fraud claim. The Ninth Circuit’s analysis in Astiana is quite brief, and here is the key
passage:
As the district court correctly noted, in California, there is not a standalone cause of action for
“unjust enrichment,” which is synonymous with “restitution.” . . . . However, unjust enrichment and
restitution are not irrelevant in California law. Rather, they describe the theory underlying a claim that
a defendant has been unjustly conferred a benefit “through mistake, fraud, coercion, or request.” 55
Cal. Jur. 3d Restitution § 2. . . . When a plaintiff alleges unjust enrichment, a court may “con-
strue the cause of action as a quasi-contract claim seeking restitution.” . . . . Astiana alleged in her First
Amended Complaint that she was entitled to relief under a “quasi-contract” cause of action because Hain
had “entic[ed]” plaintiffs to purchase their products through “false and misleading” labeling, and that
Hain was “unjustly enriched” as a result. This straightforward statement is sufficient to state a quasicontract cause of action.
The Ninth Circuit’s reasoning in Astiana is unpersuasive, in that it seems to sanction
exactly what it explicitly states is impermissible under California law – the pleading of a
stand-alone, separate cause of action for unjust enrichment. If all one must do is add the
label “quasi-contract” to an unjust enrichment cause of action, then there is no real constraint on the pleading of what are in substance stand-alone unjust enrichment causes of
11
action under California law. Nonetheless, for now, Astiana is good law and it may open up
pleading opportunities for plaintiffs in personal information/data security cases.
Conclusion
In sum, the quartet of federal cases applying California appear to lower the plead-
ing thresholds for plaintiffs in personal information/data security cases. Whether these
cases lead to more complaints being filed and a consequential rethinking by the courts, or
whether the courts will simply winnow suits by requiring proof of general allegations in the
summary judgment phase of litigation, remains to be seen.
Publisher’s Note: The fate of privacy actions in California will certainly depend on how
the Supreme Court decides the standing issue in Spokeo v. Robins (see Commentary on the
News, section, infra, page 27).
* * *
The European Privacy Judicial Decision of a Decade: Google v. Vidal-Hall
Omer Tene*
Over the past few years, Google has been involved in a slate of high-stakes privacy
litigation, in issues ranging from the removal of offensive video footage to the rollout of
its Street View service to the emerging right to be forgotten. Last week, Google privacy
aficionados received another landmark case to add to an increasingly rich library with the
England and Wales Court of Appeal decision in Google v. Vidal-Hall. The case involved
Google’s alleged circumvention of privacy settings in Apple’s Safari browser, allegations
that Google settled with the Federal Trade Commission and state attorneys general in the
U.S. for more than $22 million and $17 million respectively.
The UK court’s sweeping 50-page opinion is one of the most significant judicial deci-
sions in the privacy space since the dawn of the Data Protection Directive 20 years ago.
* Omer Tene is an associate professor at the College of Management School of Law, Israel; a visiting fellow
at the Berkeley Center for Law and Technology and the Institute for Jewish Law and Israeli Law, Economy
and Society; and an affiliate scholar at the Stanford Center for Internet and Society. He is managing director
of Tene & Associates, where he consults the Israeli government, data protection authority and private sector businesses on privacy, data protection and law and technology issues. He is a member of the advisory
board of the Future of Privacy Forum; the European Advisory Board of the IAPP; and the editorial board of
International Data Privacy Law (Oxford University Press). This article was originally published in Privacy
Perspectives, a publication of the International Association of Privacy Professionals at https://privacyassociation.org/news/a/the-european-privacy-judicial-decision-of-a-decade-google-v-vidal-hall/
12
Ironically, it comes at a time when the directive is on the verge of sunset, being replaced by
the General Data Protection Regulation.
Still, the Vidal-Hall decision is a prize for lawyers who for years have been clamoring
for an authoritative interpretation of European data protection law. In Europe, data protec-
tion enforcement is sporadic, and very few cases reach the courts. Even the handful of
cases that reach their zenith, such as the CJEU decisions in the Lindqvist and Costeja (right
to be forgotten) cases, are short on analytical reasoning. Indeed, scholars have been frustrated poring over the CJEU Costeja case for clues about the justifications for the court’s
decision, which was delivered in terse, parsimonious terms. The Vidal-Hall decision is dif-
ferent, vindicating the capacity of English common law to breathe life into existing legal
concepts and legislation.
One reason the data protection docket is scant is the very issue tackled by the Vidal-
Hall court: the narrow definition of privacy harm. This problem also resonates across the
ocean in U.S. jurisprudence: Courts define privacy harms narrowly, excluding equivocal
notions of emotional distress and focusing on pecuniary losses. Time and again, privacy
lawsuits collapse against a wall of uncertainty as plaintiffs struggle to show harm. A plain-
tiff proves a retailer lost his personal information, including credit card and Social Security
numbers, but absent liability for unauthorized transactions, where’s the harm? Another
plaintiff proves an online provider surreptitiously collected her personal information for
ad-targeting purposes, but how much does this “creepy” feeling cost? As Ryan Calo observed, “A privacy harm must be ‘cognizable,’ ‘actual,’ ‘specific,’
‘material,’ ‘fundamental’ or ‘special’ before a court will consider awarding compensation.
Leading commentators to question whether privacy harm is much of a harm at all.”
For all detractors of privacy harms, the UK court now draws a line in the sand. Going
so far as to invalidate a clearly phrased statutory provision, Section 13 of the UK Data
Protection Act, insofar as it is inconsistent with the European Directive and the EU Charter
of Fundamental Rights, the UK court holds emotional distress, or “moral damage,” is re-
coverable under privacy law. In the words of the Master of the Rolls and Lady Justice
Sharp, “Since what the Directive purports to protect is privacy rather than economic rights,
it would be strange if the Directive could not compensate those individuals whose data
privacy had been invaded by a data controller so as to cause them emotional distress (but
not pecuniary damage).”
In a field that assesses illegitimate behavior according to fickle notions such as “unfair-
ness” and “creepiness,” the expansion of recoverable damages to purely emotional damage
is groundbreaking. And given the rhetorical force of the UK court, companies on both sides
13
of the Atlantic should prepare for a potential opening of the floodgates of individual and
class actions. In recognizing non-economic damages, the UK court reversed a legal fiction
it had traditionally used to award damages in the absence of pecuniary loss—finding nomi-
nal pecuniary damage, for example, one pound British, as a basis to award more significant
compensation for emotional distress.
In its decision, the Vidal-Hall court reversed another venerable legal fiction, more id-
iosyncratic to UK law, under which courts have traditionally remedied privacy violations
without recognizing a standalone right to privacy. Amazingly for any non-UK jurist, more
than 120 years after Warren and Brandeis, 50 years after the Prosser privacy torts and 17
years after the Human Rights Act and Data Protection Act, UK law has up till now declined
to recognize privacy rights.
Instead, UK courts “shoehorned” privacy into common law “breach of confidence”
claims. They did so even in cases where there was little if any proximity between plaintiff
and defendant and no obligation of confidentiality to boot. In a notable case, the House of
Lords decided that the Mirror, a British tabloid, breached a duty of confidentiality to super-
model Naomi Campbell, since it should have known that publishing a photo of Campbell
near the entrance to a meeting of Narcotics Anonymous “might jeopardize the continued
success of her treatment.” Hollywood power couple Michael Douglas and Catherine Zeta-
Jones benefited from a similar ruling, which attributed an obligation of confidentiality to
an intruder to their wedding, whose illicit photos of the event were published by another
British tabloid.
Overcoming what it called “the common law’s perennial need (for the best of reasons,
that of legal certainty) to appear not to be doing anything for the first time,” the Vidal-Hall
court held that such legal acrobatics would no longer be necessary. It recognized the misuse
of private information as a tort, stating that, “this does not create a new cause of action. In
our view, it simply gives the correct legal label to one that already exists.” Interestingly, in
an article published almost a decade ago, I suggested working in the other direction, apply-
ing an obligation of confidentiality to Google with respect to its control over users’ search
logs. I wrote there, “Whether based on an implied term of contract between Google and its
users or on the private nature of the information itself, Google should account to users in
case of disclosure of information to third parties.” Clearly, regardless of the “confidentiality” or “privacy” caption, Google owes its users a set of legal obligations grounded in the
trust that those users place in the company.
In its decision, the court tackled another fundamental issue that regularly keeps privacy
professionals on their toes: the definition of personal data. Specifically, the court assessed
14
whether browser-generated information (BGI), that is, information about users’ online
browsing habits collected via their browser, constituted “personal data” under EU and UK
law. The court conducted thorough analysis of the notions of identifiability, anonymization
and pseudonymization, holding that “identification for the purposes of data protection is
about data that ‘individuates’ the individual, in the sense that they are singled out and distinguished from all others. It is immaterial that the BGI does not name the user.”
Importantly, the court held that information that allows a company to identify an indi-
vidual based on matching or aggregating with other information in its possession is per-
sonal, regardless of whether the company in fact matches or aggregates. In doing so, it
discarded an argument often made by online providers that persistent identifiers single
out a device as opposed to an individual user. Presaging the discussion of cross-device
tracking, which has emerged at the center of privacy policy-making, the court holds that
“the concept of ‘multiple users’ is, in effect, an outdated one. The general position is that
devices are used exclusively by a single individual (smartphones and tablets, to take two
examples). In practice this means it is typically possible to equate an individual device user
with the device itself.”
Gone are the days of a single PC placed on a living room table and serving an entire
family. Today, every parent and child has his or her own device, if not several devices. In
deciding this matter, the court accepts the plaintiff counsel’s argument that “the best proof
of this is (Google’s) own business model which is predicated on the potential for the ‘individuation’ of users.”
One thing is clear: The Vidal-Hall case is a resounding declaration that privacy matters.
On privacy skeptics, the UK court decision lands a knockout in three rounds; first in its
(overdue) embrace of a privacy cause of action; second in its clarification of the definition
of personal data in an age of big data and multiple connected devices and third in its ex-
pansion of the concept of compensable harm. If not overturned on appeal, Vidal-Hall, with
its broad notions of privacy, harm and personal data, may portend a sea change in privacy
jurisprudence, emboldening individuals and regulators in their quest to rebalance the data
terrain.
* * *
15
2014 Mobile Privacy and Security Trends and What to Look for in 2015
Fernando A. Bohorquez, Jr. & Jenna Felz*
Most analysts and commentators agree that 2014 was the year mobile reached a tip-
ping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first
year that mobile Internet usage surpassed desktop use in the U.S. This trend will continue
as users spend more time on mobile apps than on the Web. Mobile traffic climbed to re-
cord levels last year, with users checking their mobile devices an average of 150 times a
day. Mobile commerce grew dramatically, much faster than desktop e-commerce, and is
projected to reach $293 billion in the U.S. by 2018. And just as important, a growing num-
ber of consumers are experiencing a “mobile mind shift” to an expectation of real-time,
location-driven, context-specific user experience and engagement.
It is no surprise, then, that 2014 may also have been the year that consumer concern
about mobile privacy and data security finally caught up to consumers’ wide acceptance
and use of the platform. As we have written about previously, Uber’s recent privacy debacle is but the latest example of companies that came under intense consumer and regula-
tory scrutiny in 2014 for their privacy failings. Last year also saw an extraordinary number
of data breaches, including the disclosure by JPMorgan Chase of an issue that may have
affected up to 76 million households and 7 million small businesses, many of whom were
mobile banking customers.
The ink is barely dry on 2015 and data privacy and security have already jumped to
the forefront of our national conversation. Last week, President Obama announced two
proposed federal data privacy and security bills. The week before, FTC Chairwoman Edith
Ramirez warned at the Consumer Electronics Show of the privacy and data security risks
of the Internet of Things. Mobile’s inexorable march—be it through apps or the IoT—will
continue to demand more and more attention from lawmakers and regulators as privacy
and security concerns grow.
This post provides a high-level summary of the major 2014 trends in mobile: market-
ing, mobile pay, and the IoT, as well as the legal and regulatory response. We then break
out our magic eight ball to predict the mobile marketing and legal trends that will likely
unfold over the next 12 months.
* Fernando A. Bohoroquez is a partner, and Jenna Felz is an associate, with BakerHostetler in New York,
NY. This article originally appeared on BakerHostetler’s Data Privacy Monitor blog (http://www.dataprivacymonitor.com).
16
2014: What Happened?
Mobile Marketing Trends
With the consumer shift to mobile, marketers had to pivot to address the challenges
of a mobile space with disparate vendor technology and suboptimal cookies performance.
Chief among the new technologies that mobile marketers have adopted are cross-device
tracking and geolocation tracking.
Cross-device tracking has grown increasingly more valuable to advertisers as consum-
ers switch from device to device to view content. The goal of cross-device tracking is to
identify all the devices a consumer uses—smartphone, tablet, laptop, desktop—and retar-
get ads to that user as he or she moves from device to device. This capability is important
to advertisers because, unlike on desktops, cookies do not work on the majority of mobile
apps and platforms. Tracking consumers across devices is also integral to understanding
how consumer behavior shifts across platforms. For example, a consumer may initially
view a product on a mobile device and then purchase that product on a desktop computer.
There are two types of cross-device tracking: deterministic and probabilistic. Deterministic
cross-device tracking is very accurate, as it requires users to sign into their websites and
apps on every device they use (Facebook and Twitter are examples). Probabilistic cross-
device tracking, on the other hand, is much less accurate and requires a very large set of
data. The vast majority of companies rely on this type of tracking, as most companies do
not require users to log in to use their website or app.
Geolocation platforms track user location data collected on mobile devices to create
user profiles and connect relevant advertisers to identified consumers. In the past year,
there has been a proliferation of location-based services (LBS) leveraging geolocation
tracking and data. Geolocation or location-based services provide tremendous benefits to
consumers in the form of navigation (e.g., GoogleMaps), local search (e.g., Yelp), and
check-in (e.g., Foursquare). Sixty-five percent of businesses are projected to use LBS and
geolocation tracking by 2016. But the same principle that makes geolocation services so
appealing—the ability to provide consumers with real-time information tailored to their
location—also raises significant privacy concerns, as companies can collect and compile—
without consumer knowledge or consent—detailed records and consumer profiles on the
places one works, eats, and visits; the events consumers attend; the people one socializes
with; and more.
Mobile Payments
Mobile pay, also referred to as mobile money, mobile money transfer, and mobile wal-
let, generally refers to payment services operated under financial regulation and performed
17
from or via a mobile device. While mobile pay is not new—it has existed for over a decade—the industry saw a boom in publicity in 2014 as Apple rolled out its new mobile
payment service, Apple Pay, which allows for payment with just the swipe of the wrist
in conjunction with its Apple Watch. Other mobile pay providers include Google Wallet,
Softcard (formerly ISIS), Venmo, and PayPal, among others. The mobile pay market is
projected to reach 2 billion transactions by the end of 2017.
Most current smartphone wallet apps with a tap-to-pay feature require a phone with a
near field communication (NFC) chip to work. NFC chips allow customers to simply hold
their mobile device in front of a scanner to make purchases. The technology evolved from
radiofrequency identification (RFID) tech, which is what enables devices such as security
scan cards and E-ZPass tollbooths. The benefit of NFC, however, is that it is limited to
communication within four inches. Many experts see this small radius as a major security
benefit, which explains its popularity as a secure alternative to credit cards. Both Apple Pay
and Google Wallet use NFC chip technology, and the technology is likely to become more
commonplace in the industry.
The Internet of Things
Last year also saw the rise of the Internet of Things. IoT refers to the connection of ev-
eryday objects to the Internet and to one another, with the goal being to provide users with
smarter, more efficient experiences. Three major industries in which the IoT is expected
to really take off are home security, retail, and automotive. A well-publicized example of
IoT’s growth in the home security industry is Google’s $3.2 billion purchase of Nest, a
company selling Internet-enabled home thermostats and smoke alarms with technology
that many analysts believe will be used to manage multiple Internet-enabled home devices.
The retail industry has seen the introduction of many wearable devices that are changing
the way users communicate (see Apple Watch) and track fitness goals (see FitBit). The auto
industry also embraced IoT in 2014, as automakers aggressively promoted the “connected
car”—a vehicle equipped with Internet access and usually a wireless local area network,
which allow the car to share Internet access with other devices both inside and outside the
vehicle. In 2014, Googleannounced that it is partnering with Audi, GM, and Honda to put
Android-connected cars on the road. A variety of apps designed especially for cars have
also been gaining in popularity, including an app thatalerts parents when a teen is speeding,
and one that turns mobile device apps into a voice-activated experience.
There are an estimated 16 billion devices already connected to the IoT, and that number
is projected to balloon to 50 billion by 2020. These new devices pose unique challenges to
consumer data privacy and security.
18
Legal and Regulatory Trends
Mobile Data Privacy
A flurry of regulatory and legislative activity surrounded mobile privacy in 2014. The
FTC continued to ramp up its efforts to monitor, regulate, and provide best-practice guid-
ance in the mobile app space. In keeping with its position that geolocation data is sensitive
information deserving a greater level of privacy protection, the FTC pursued enforcement
actions against Snapchat, Fandango, and Credit Karma, among others, for failure to in-
form consumers that their geolocation data would be collected and stored by the apps.
These actions followed a number of reports the FTC has issued in recent years on mobile
privacy and data security, including What’s the Deal? An FTC Study on Mobile Shopping
Apps (2014); Protecting Consumer Privacy in an Era of Rapid Change (2012); Marketing
Your Mobile App: Get It Right from the Start (2013); Mobile App Developers: Start with
Security (2013); and Mobile Privacy Disclosures: Building Trust Through Transparency
(2013). Self-regulatory groups have also been active in the mobile space, with the Digital
Advertising Association (DAA) releasing self-regulatory mobile guidelines.
Last year also saw the introduction of a federal bill that would regulate the tracking of
geolocation data, Senate Bill 2171, the Location Privacy Protection Act of 2014 (LPPA).
This bill would, among other things, require consumer consent before companies could
track geolocation data, and require companies collecting the location data of 1,000 or more
devices to post online the kinds of data they collect, how they share and use it, and how
people can opt out of data collection. The FTC testified in favor of the LPPA before the
Senate Judiciary Committee last June.
Congress’s growing focus on geolocation data recently made evident last year when the
sponsor of the LPPA, Senator Al Franken, engaged in a very public exchange with Uber
CEO Michael Kalanick last fall. Senator Franken wrote a letter to Kalanick, requesting
very specific information on the company’s privacy policies and practices. Uber responded
to Franken’s questions, but Franken was not satisfiedwith Uber’s response and stated that
“[i]t still remains unclear how Uber defines legitimate business purposes for accessing,
retaining, and sharing customer data.” Senator Franken vowed to “continue pressing for
answers to these questions.” Senator Franken similarly questioned the rideshare app Lyft
about its privacy policies and over allegations that Lyft executives accessed the trip log of
at least one journalist for no apparent business reason, without receiving consent.
Mobile Data Security
On the data security front, the FTC brought or settled seven enforcement actions in
2014, including those involving Snapchat, HTC, and TRENDNet, relevant to mobile and
the IoT.
19
Snapchat, the developer of a popular photo messaging app, reached a settlement with
the FTC in 2014 over both data privacy and security allegations. The FTC complaint al-
leged that Snapchat had deceived consumers about the amount of personal data it collected
and security measures taken to secure that data. The data privacy allegations claimed that
Snapchat misrepresented the ephemeral nature of the Snapchat app, which Snapchat ad-
vertised would allow users to send photos that “disappear forever” 10 seconds after they
are received. The FTC alleged many ways a user could save a photo message permanently,
including by taking a screenshot of the message, using third-party apps to circumvent the
Snapchat timer, and accessing unencrypted Snapchat video snaps in a location outside the
app’s “sandbox.” The data security allegations claimed that Snapchat failed to employ
“reasonable security measures” to protect personal information transmitted in its “Find
Friends” feature that made vulnerable 4.6 million user names and phone numbers during a
security breach. Under the terms of the settlement agreement, Snapchat is prohibited from
misrepresenting the extent to which it protects the privacy, security, or confidentiality of
users’ information, and is required to implement a comprehensive data privacy program
that will be monitored by an independent privacy professional for the next 20 years.
In 2014, mobile device manufacturer HTC settled charges brought by the FTC that
alleged the company failed to take reasonable steps to secure the software it developed
for its smartphones and tablet computers. Among other things, the complaint alleged that
HTC America failed to provide its engineering staff with adequate security training, failed
to review or test the software on its mobile devices for potential security vulnerabilities,
failed to follow well-known and commonly accepted secure coding practices, and failed
to establish a process for receiving and addressing vulnerability reports from third parties.
HTC settled these charges by agreeing to establish a comprehensive data security program,
undergo independent security assessments for 20 years, and develop and release software
patches to fix security vulnerabilities found in millions of HTC devices.
TRENDnet, a company that markets video cameras designed to allow consumers to
monitor their homes remotely, reached a settlement with the FTC in 2014 over the first IoT
complaint brought by the agency. The FTC alleged that TRENDnet marketed its SecurView
cameras as “secure,” when, in fact, the cameras had faulty software that left them open
to online viewing—and possibly listening—by anyone with the cameras’ IP address. The
complaint alleged that, from at least April 2011, TRENDnet failed to use “reasonable se-
curity to design and test its software,” which included a setting for the cameras’ password
requirement. This led hundreds of consumers’ private camera feeds to be made public
on the Internet in January 2012. Under TRENDnet’s settlement with the FTC, the company is prohibited from misrepresenting the security of its cameras or the security, privacy,
20
confidentiality, or integrity of the information that its cameras or other devices transmit.
It is also prohibited from misrepresenting the extent to which a consumer can control the
security of information its devices store.
2015: What to Expect
In many ways, 2014 has set the stage for 2015. Here are the trends we see from last year
that will continue for the next several months and beyond.
More Highly Targeted Location-Based Ads. Advertisers’ increased use of cross-device
tracking and geolocation tracking will allow mobile advertisers to create more highly targeted and highly personalized campaigns, and deliver them to consumers across all forms
of technology. Facebook will be a platform to watch, as the largest social media company
made changes to its terms of service at the beginning of this year concerning the tracking
and collection of the geolocation data of its users. The purpose of this change is twofold:
(1) to deliver more targeted advertisements to users, and (2) to allow for its new, optional
Nearby Friends feature, which notifies in real time users of friends who are in the vicinity
of the user. Facebook will use this capability to send targeted ads to consumers on mobile
devices more than ever before.
Mobile Pay’s Increased Growth and Security Focus. The mobile pay eco-
system is expected to grow in popularity in 2015, as consumers grow to trust
the technology. Building on the success of major tech giants like Google and Apple, banks
are also expected to launch their own mobile wallets. As the industry grows, experts predict
that targeted attacks on mobile payment technologies can be expected.
Data Security. Speaking of which, data security will be a key concern for mobile app
developers and marketers. As the number of mobile device users continues to increase unabatedly, there is a significant risk that millions of mobile users’ personal information could
be exposed to potential data breaches. This is of particular concern with respect to personal
banking, health and financial platforms that are becoming increasingly mobile. Many experts highlight the security concerns with mobile payments and personal health inf0rmation as these platforms become more popular. Emerging mobile payment methods like
Apple Pay and others have incorporated various innovative security features in their use
of NFC technology, Among other things, the credit card number, even in encrypted form,
is not stored on the iPhone or on Apple’s servers, nor is any credit card data transmitted to
the merchant or stored on the merchant’s servers. Rather, a token is used in its place that
has no intrinsic value and would be useless to hackers. In general, mobile app developers
will now more than ever need to be more vigilant to build in from the beginning reasonable
data security measures tailored to the type of consumer information they are collecting and
21
storing and ensure compliance with relevant rules and regulations when dealing with finan-
cial, health and other sensitive information. Individuals and IT departments will also likely
become increasingly proactive in mobile data security. As a result, we should see areas like
enterprise mobile management, mobile malware detection, mobile data security apps, and
mobile app auditing become more prevalent in this space.
Expansion of the IoT. Experts predict that by 2020, revenue generated by the IoT will
hit $7.1 trillion. As these devices grow in popularity, experts predict that more than 90
percent of all IT networks will have an IoT-based security breach. With this potential risk
to consumers, those in the IoT industry can expect increased FTC scrutiny and possibly
enforcement actions in 2015 and the years to come.
Continued and Increased FTC Privacy by Design Scrutiny. The FTC has brought 50 data
security actions in the past decade. With that track record, and consumers and marketers
increasingly flocking to mobile, the FTC’s attention to mobile apps is certain to grow in
2015, especially with the proliferation of the IoT and wearables. In her opening remarks at
the Consumer Electronics Show on January 6, 2015, FTC Chair Edith Ramirez identified
the three main areas of concern that the IoT presents: (1) ubiquitous data collection, (2) unexpected uses of consumer data, and (3) increased data security risks. In response to these
risks, Ramirez outlined three key steps that companies should take to enhance consumer
privacy and security in IoT devices: (1) adopt “security by design,” (2) engage in data minimization, and (3) increase transparency and provide consumers with notice and choice for
unexpected data uses.
The FTC’s IoT privacy and security concerns mirror the agency’s stance on mobile
privacy generally and specifically when it comes to companies that do not heed its advice
(i.e., Snapchat). For emerging tech companies leveraging mobile apps for consumers, the
FTC will have little patience with privacy missteps this year after sending clear signals
in several settlements in 2014 that mobile developers and marketers need to take privacy
seriously. The FTC may send a similar message this year to IoT developers in the form of
enforcement actions.
Federal Legislation. With an increase in high-profile data breaches, the introduction of
the LPPA, and President Obama’s recent announcement of two data privacy and security
bills, Congress may be moved to take action at the federal level to legislate stronger data
privacy and security measures that would also extend to mobile. The president’s proposed
bills call for a national data-breach notification law that would attempt to harmonize the
patchwork of 47 different state data-breach laws, as well as a consumer privacy bill of
rights that would allow consumers to decide what pieces of their personal data are collected
22
by companies and how the data is used. However, most commentators expect that in the
Republican-controlled Congress, only the former has a significant chance at passage.
* * *
FTC Issues Privacy and Security Recommendations for the Internet of Things
Kaylee A. Cox
Holland & Knight
www.hklaw.com
This morning, the Federal Trade Commission (“FTC”) released a 71-page report on the
Internet of Things (“IoT”).1 The report comes on the heels of a White Paper on wearable
technology and the IoT2 and follows an FTC-hosted workshop, focused on privacy and se-
curity concerns related to the IoT.3 The report summarizes the workshop and outlines the
FTC’s recommendations in response.
In support of the report, FTC Chairwoman Edith Ramirez stated, “The Internet of
Things can only flourish when companies take privacy and data security into account.”
Chairwoman Ramirez also emphasized her primary concern with the amount of data that
can potentially be collected from IoT technologies in consumers’ homes.
However, not all Commissioners support the proposals set forth in the report.
Commissioner Joshua Wright, in particular, dissents from the issuance of the report and
issued a separate dissenting statement. Commissioner Wright was particularly concerned
with the FTC’s reliance on a single workshop as a basis for its recommendations as to best
practices or legislative action. He further voiced his opinion that the report “includes a
lengthy discussion of industry best practices and recommendations for broad-based pri-
vacy legislation without analytical support to establish the likelihood that those practices
and recommendations, if adopted, would improve consumer welfare.”
In its report, the FTC defines the IoT as “the ability of everyday objects to connect to the Internet and to
send and receive data,” noting this includes “Internet-connected cameras that allow you to post pictures online with a single click; home automation systems that turn on your front porch light when you leave work;
and bracelets that share with your friends how far you have biked or run during the day.”
2
The Application Developers Alliance Emerging Technologies Working Group collaborated with technology industry practitioners to develop a whitepaper, titled “The Internet of Me: How Wearable Tech is Changing the Internet of Things (IoT).” The paper analyzes the potential of IoT devices and considerations for
developers when constructing them.
3
On November 19, 2013, the FTC hosted The Internet of Things: Privacy and Security in a Connected
World. The workshop focused on privacy and security issues related to increased connectivity for consumers, both in the home (including home automation, smart home appliances and connected devices), and when
consumers are on the move (including health and fitness devices, personal devices, and cars).
1
23
The report focuses on the inclusion of Fair Information Practice Principles (“FIPPs”)
into the IoT realm. In particular, the report concentrated on four FIPPs: (i) security; (ii)
data minimization; (iii) notice; and (iv) choice. In addition to FIPPs, the report also touches on privacy- and security-related legislative proposals.
Below is a summary of the recommendations set forth in the report.
Security
The FTC encouraged companies to adopt the following security best practices, set forth
by workshop participants:
1. Build security into products at the outset, including:
• Conducting a privacy or security risk assessment
• Minimizing the data that is collected and retained
• Testing security measures before launching products
2. Train company personnel on best security practices
3. Retain service providers who are capable of maintaining reasonable security, and
provide oversight for such providers
4. Implement a defense-in-depth approach to identified significant risks within company systems
5. Implement reasonable access control measures to limit unauthorized access to an
IoT device, data, or network
6. Monitor products throughout the lifecycle and (if feasible) patch known
vulnerabilities
Data Minimization
The report urged companies to consider reasonably limiting their collection and reten-
tion of consumer data, arguing that doing so helps prevent against two privacy risks:
• Large amounts of data stored present a more attractive target for malicious actors
and increases potential harm to victims of an attack
• Large amounts of data increases the risk that data will be used in a way that differs
from consumers’ reasonable expectations
To accomplish data minimization, the report suggests a flexible approach, giving com-
panies the following options:
1. Abstain from collecting data altogether;
2. Collect only those fields of data necessary to the product or service;
24
3. Collect data that is less sensitive;
4. De-identify (i.e., anonymize) collected data; or
5. Obtain consumer consent for collecting additional, unexpected categories of data
Notice and Choice
Despite some workshop participants advocating that the ubiquity of data collection
and practical obstacles makes offering notice and choice challenging in the IoT, the FTC
argued that doing so is nevertheless important (but clarified that not every data collection
requires choice). Noting that there is no one-size-fits-all approach, the FTC laid out the
following options for offering notice and choice in the IoT sphere:
1. Develop video tutorials
2. Affix QR codes on devices
3. Provide choices at point of sale, within wizards, or in a privacy dashboard
The FTC articulated that companies may implement a combination of approaches, but
that no matter which strategy a company implements, the privacy choices offered must be
clear and prominent—not buried within lengthy documents.
In response to participants’ push for use limitations to be considered as a supplement to,
or in lieu of, notice and choice, the FTC incorporated certain use-based approach elements.
In particular, the report maintained that clear and conspicuous choices must be offered
where use would be inconsistent with the context of the interaction (i.e., an unexpected
use). In contrast, the report argued that choice would not be required in the following
instances:
• Where use is consistent with the context (i.e., an expected use)
• Where collected data is “immediately and effectively” anonymized
Although the report did incorporate elements of the use-based approached, the FTC
would not go as far as embracing a pure use-based model for the IoT. The FTC was specifically concerned with the fact that use-based limitations are not comprehensively articu-
lated in legislation, rules, or widely-adopted codes of conduct, which would make unclear
who would have the final say as to which additional uses are appropriate. Additionally, the
FTC stopped short of advocating for a pure-use based approach because “use limitations
alone do not address the privacy and security risks created by expansive data collection and
retention.” Finally, the FTC believes that a pure use-based model would not sufficiently
address consumer concerns pertaining to the collection of sensitive information.
25
Legislation
The FTC also opined that legislating the IoT arena would be “premature” at this stage
but encouraged the development of industry-specific, self-regulatory programs aimed at
promoting privacy and security practices. It did, however, advocate for Congress to enact
“strong, flexible, and technology-neutral federal legislation” to enhance existing data security enforcement and to provide consumer notification of security breaches.
Although the FTC stated that IoT-specific legislation would be premature, it did stress
that the IoT “reinforces the need for baseline privacy standards” and recommended that
Congress enact broad-based privacy legislation. The FTC noted that such legislation
should be “flexible and technology-neutral” while simultaneously providing clear standards regarding consumer choice for data collection and use. In the interim, the FTC promised to leverage existing resources to ensure security and privacy issues are contemplated
in the IoT sphere, including: (i) law enforcement; (ii) consumer and business education;
(iii) participation in multi-stakeholder groups; and (iv) advocacy.
The full report can be found here.
* * *
26
Comments on the News
Neil J. Cohen, Publisher
Supreme Court Grants Certiorari to Decide
Whether Standing Exists in Injury-at-Law Cases
The U.S. Supreme Court April 27 agreed to review an important statutory damages
case centered on whether a citizen has Article III standing to sue a personal information
data broker, Spokeo Inc., under the Fair Credit Reporting Act. Plaintiff asserted that the
defendant caused him anxiety and potential economic injury by marketing incorrect infor-
mation about his wealth and marital status to potential employers. The Ninth Circuit did
not reach the question of whether those injuries were sufficient to confer standing. It held
that no injury to plaintiff beyond the statutory violation need be alleged.
The brief for certiorari focused not on the narrow question of whether the plaintiff was
within the class of people meant to be protected by the statute but asserted generally that
Congress does not have the power to create statutory rights enforceable in federal courts
without a requirement that plaintiff specifically plead concrete injury and causation. Clearly
the defense bar is aiming for a home run in this case that would affect not just the Fair
Credit Reporting Act but consumer enforcement, through class actions, of all consumer
protection statutes imposing statutory damages on corporations that violate only plaintiffs’
statutory rights. The brief for certiorari is published here <http://sblog.s3.amazonaws.com/
wp-content/uploads/2014/05/13-1339-Spokeo-v-Robins-Cert-Petition-for-filing.pdf>.
The Plaintiff’s brief against taking cert. argued that since anxiety and potential eco-
nomic injury were alleged, this case did not present the naked question of whether a statutory violation is sufficient.
Before granting cert. the Court asked the Solicitor General to file an advisory brief, but
disregarded his advice not to take the case. The brief argues that the Court should let stand
the decision of the Ninth Circuit’s decision because lawmakers can elevate rights grounded
in common law to statutory causes of action. “De facto injuries that were previously inadequate in law” can be transformed by Congress into “legally cognizable injuries,” according to the brief, when the law merely codifies common law principles of harm.
The brief portrayed the case as one where the risk to consumers of credit reporting
agencies providing inaccurate information to potential employers and others was so great
as to justify Congress’s lowering the standing barrier and imposing statutory damages as a
deterrent to careless, reckless or deliberate dissemination of data that could affect a person’s
27
livelihood or reputation. The brief is published here <http://www.justice.gov/sites/default/
files/osg/briefs/2015/03/17/13-1339_spokeo_op.pdf>.
Several technology companies, including Facebook, eBay, Yahoo, and Google, sub-
mitted a joint amicus brief in support of Spokeo’s petition in which they argued that they
would be particularly harmed. They argue that if any of the hundreds of millions of their
daily users can file a damages lawsuit based solely on alleged statutory violations without
any actual injury, they could be subject to massive class actions filed purportedly on behalf
of many users who suffered no harm and may even be unaware the alleged statutory violation took place.
The defense bar would like the Supreme Court to view this as a “gotcha” case. The
plaintiff alleged emotional distress and speculative financial injury do not meet the Supreme
Court’s most recent pronouncement on standing in Amnesty International v. Clapper where
human rights organizations and media groups challenged the legitimacy of the Foreign
Intelligence Surveillance Act (FISA). The plaintiffs asserted standing because their future
communication could be intercepted. The Supreme Court held that the plaintiffs were unable to establish standing because imminent injury “fairly traceable” to the FISA could not
be established. The Court determined that while plaintiffs’ concerns were not “fanciful,
paranoid, or otherwise unreasonable,” the harm sought to be avoided was not “certainly
impending.” And standing cannot be created “merely by inflicting harm on themselves
based on their fears of hypothetical future harm that is not certainly impending...If the
law were otherwise, an enterprising plaintiff would be able to secure a lower standard for
Article III standing simply by making an expenditure based on a nonparanoid fear.” Since it is not apparent whether the misinformation on the plaintiff’s marital and eco-
nomic status harmed him, the Spokeo case can be portrayed as just an excuse for a class
action lawyer to bring a suit seeking statutory damages.
Since the Supreme Court has the ultimate power to decide what constitutes standing
under Article III it has the power to control the federal court caseload. In the brief for cert.
the defendant maintained that
Class actions invoking the FCRA, and grounded in the injury-in-law theory upheld in this case, are being filed with great frequency. “In the 40 years since FCRA was enacted, litigation has skyrocketed.”
Indeed, at least 29 putative class actions claiming statutory damages under FCRA have been filed in
the first four months of this year alone. And those lawsuits target a broad range of businesses. As
this
case demonstrates, FCRA class actions are being filed with increasing frequency against employers and
other entities that are not traditional “consumer reporting agencies,” but cannot escape the litigation (and
potentially massive exposure) at the pleading stage.
28
The implication is that the class action bar is generating strike suit litigation by advis-
ing clients to check their credit reports for misinformation. The converse implication is that
many data brokers are cutting costs by not adopting reasonable procedures to check the
accuracy of their published information.
How the Court rules on the standing issue ultimately affects two national policy issues:
First, is the protection of consumers more important than the risk of strike suits? Second,
do government units have insufficient resources to adequately enforce the statute so that
consumers are needed to supplement them? These are questions that are the province of the
federal government.
Although the defense briefs predict an avalanche of disruptive class action cases and
enormous potential statutory liability if the standing barrier is not made strict, these con-
cerns seem exaggerated. The Fair Credit Reporting Act is not a strict liability statute.
Plaintiff must still prove reckless or willful violations to claim statutory damages and the
courts will reach mixed results on whether cases requiring such individual proof are suitable as class actions. Moreover, the number of individual claims after settlement of these
cases is usually small.
If the Supreme Court follows its precedent in Clapper v. Amnesty International that
Article III standing requires actual or “certainly impending injury” there probably will
be vast consequences. The Supreme Court would effectively eviscerate consumer enforcement of such statutory damages statutes in federal courts. Those statutes include the
Telephone Consumer Protection Act, where marketing companies hired by corporations
have blatantly disregarded the law against autodialing marketing, despite many suits and
recoveries challenging the practice. Similarly, the decision will effectively nullify consumer enforcement of such statutory damages cases as The Fair Debt Collection Practices Act,
the Lanham Act, The Fair Housing Act, The Americans with Disabilities Act, the Electronic
Communications Privacy Act, Stored Communications Act, and Cable Communications
Privacy Act. Aside from statutory damages statutes, it would affect citizen suits for injunctive relief under the Clean Air and Water Acts and the Freedom of Information Act.
State courts would still be available to enforce consumer rights but that result would be
contrary to what Congress desired in passing the Class Action Fairness Act.
Because this case implicates the enforcement of many statutes enacted to benefit con-
sumers, the Supreme Court should be reluctant to impose standing requirements that pre-
vent consumers from seeking a remedy in federal court. If the Court decides to dodge the
question of whether a naked injury-at-law can be an injury-in-fact it could remand the case
for a determination of whether plaintiff’s allegations of anxiety and potential economic
29
damages are sufficient to confer standing. More likely the court will choose to uphold the
Ninth Circuit ruling, albeit with some language narrowing the reach of the decision.
Here are some pertinent excerpts from the briefs. First, the petition for cert. states:
Question Presented
Whether Congress may confer Article III standing upon a plaintiff who suffers no concrete harm,
and who therefore could not otherwise invoke the jurisdiction of a federal court, by authorizing a private
right of action based on a bare violation of a federal statute
Discussion
…This Court recognized the substantial importance of the question presented here when it granted
certiorari in First American Financial Corp.Edwards, No. 10-708. But the Court dismissed the writ
of certiorari as improvidently granted, and so did not decide whether a technical violation of a federal
statute ipso facto satisfies the injury-in-fact requirement for Article III standing in the absence of any
allegation of concrete and particularized injury. See First American Financial Corp. v. Edwards, 132 S.
Ct. 2536 (2012) (per curiam).
This case presents the same question in the context of a different, frequently litigated federal statute—the Fair Credit Reporting Act. And this case provides a cleaner vehicle. Unlike in First American—
where the statutory private action and remedy at issue were predicated on the plaintiff’s payment of
money to the defendant—no such payment took place here. Instead, in the uncluttered context of this
case the Ninth Circuit underscored its view that a mere statutory injury-in-law—standing alone—is sufficient to satisfy the Article III injury-in-fact require- ment even when the plaintiff did not sustain any
tangible harm.
Whether Congress can create Article III standing by authorizing a remedy for a bare statutory violation is a recurring question under the FCRA and a wide variety of other federal laws. The courts of
appeals have delivered conflicting answers. Unless this Court steps in, the extent and limits of federal
jurisdiction will continue to vary circuit by circuit and case by case. And in those circuits where a harmless statutory violation has been held sufficient to confer standing, class actions presenting huge damages
exposure based on harmless conduct will proliferate.
Because this fundamental and unsettled question of Article III jurisdiction has enormous practical
significance, this Court’s review is plainly warranted.
The Court of Appeals’ Decision.
…The Ninth Circuit reversed, holding that the “creation of a private cause of action to enforce
a statutory provision implies that Congress
intended the enforceable provision to create a statutory
right,” and that “the violation of a statutory right is usually a sufficient injury in fact to confer standing.”
30
App., infra, 6a (citing Edwards v. First American Corp., 610 F.3d 514, 517 (9th Cir. 2010), cert. granted,
131 Ct. 3022 (2011), cert. dismissed as improvidently granted, 132 S. Ct. 2536 (2012)).
Because “the statutory cause of action does not require a showing of actual harm when a plaintiff
sues for willful violations,” App., infra, 6a, the court reasoned, actual harm is unnecessary to establish
in- jury in fact. Instead, the court held that Robins had satisfied the requirements for Article III standing
be- cause “he allege[d] that Spokeo violated his statutory rights, not just the statutory rights of other
people,” and because his “personal interests in the handling of his credit information are individualized rather than collective.” App., infra, 8a. Thus, the court of appeals concluded, “alleged violations of
Robins’s statutory rights are sufficient to satisfy the injury-in- fact requirement of Article III.”
The court of appeals specifically refused to rest its ruling on the alleged harm to Robins’s employment prospects and related anxiety: “[b]ecause we determine that Robins has standing by virtue of the
alleged violations of his statutory rights, we do not decide whether [the alleged harms] could be sufficient injuries in fact.” App., infra, 9a n.3. The court of appeals declined to construe the statutory damages
provision as an alternate measure of damages rather than a substitute for injury-in-fact, perceiving no
“difficult constitutional questions” to be avoided.
The Ninth Circuit recognized that its analysis had the practical effect of turning the three-part test
for Article III standing into a single-factor inquiry that was satisfied by the availability of a statutory
remedy.. As the court of appeals put it, “[w]hen the injury in fact is the violation of a statutory right *
* * inferred from the existence of a private cause of action, causation and redressability will usually be
satisfied.” Causation is self-evident, because the statutory violation is the injury. And the presence of a
statutory remedy guarantees redressability, since there is no injury to redress apart from the statutory
violation itself.
…The decision below—along with those of two other circuits—directly conflicts with the decisions
of at least two other courts of appeals. Those courts have held that a plaintiff pursuing a statutory cause
of action still must demonstrate a concrete injury-in-fact (as opposed to a mere injury-in-law) in order to
establish Article III standing.
The conflict arises in part from a statement by this Court. The Court has held with unmistakable clar-
ity “that Congress cannot erase Article III’s standing requirements by statutorily granting the right to sue
to a plaintiff who would not otherwise have standing.” Raines v. Byrd, 521 U.S. 811, 820 n.3 (1997). Yet
several courts of appeals have disregarded this “settled” principle (ibid.) in favor of what they perceive
to be a contrary rule expressed in Warth v. Seldin, 422 U.S. 490, 500 (1975) (internal quotation marks
omitted): “The actual or threatened injury required by Art. III may exist solely by virtue of statutes creating legal rights, the invasion of which cre- ates standing.” App., infra, 5a (quoting Warth).
31
The need to resolve the conflict is especially acute because this fundamental question of Article III
jurisdiction has significant implications for class action litigation under a statute that generates dozens of
class actions in the federal courts every year. The Court should grant review.
…Further review is warranted for the additional reason that the serious constitutional questions
raised by the decision below, and many others like it, are the unnecessary result of an overbroad statutory
construction. “A statute must be construed, if fairly possible, so as to avoid not only the conclusion that it
is unconstitutional but also grave doubts upon that score.” Almendarez-Torres v. United States,523 U.S.
224, 237 (1998) Accordingly, where a statute is “genuinely susceptible to two constructions,” a court is
obligated to choose the one that avoids constitutional doubt. Id. at 238.
…The FCRA can readily be construed in that manner. As the Eighth Circuit has observed, “[a] reasonable reading of the statute could still require proof of actual damages but simply substitute statutory
rather than actual damages for the purpose of calculating the damage award.” Dowell v. Wells Fargo
Bank, NA, 517 F.3d 1024, 1026 (8th Cir. 2008). Under that construction, because it can be difficult to
prove the amount of damages resulting from a failure to com- ply with FCRA’s procedural provisions,
plaintiffs who have been concretely harmed by willful noncompliance need not quantify the harm. This
interpretation of Section 1681n(a) of FCRA would not affect the need to show a concrete and particularized injury-in- fact sufficient to satisfy Article III. The federal courts should not “presume—without
any basis in the stat- utory text * * * and in contradiction to long-settled constitutional precedent, see,
e.g., Lujan, 504 U.S. at 560—that Congress intended to stretch, if not breach, the constitutional limits
on federal jurisdidiction.” Wallace v. ConAgra, __ F3d __ , 2014 WL 1356860, at *5 (8th Cir. Apr.
4, 2014). Review is warranted to reinvigorate that principle as it applies to the interpretation of private
causes of action for vio- lations of federal statutes.
…If there is an actual, pal- pable injury—i.e., one that could qualify as an “injury in fact” under Article
III—but no remedy at law, Congress may create a remedy. See ibid. In other words, Congress may
“elevat[e] to the status of legal- ly cognizable injuries concrete, de facto injuries that were previously
inadequate in law.” Ibid.; see also Hart & Wechsler’s The Federal Courts and the Federal System 144
(Richard H. Fallon Jr. et al. eds., 6th ed. 2009).
But Congress may not create the necessary underlying injury by fiat. See Lujan, 504 U.S. at 578. No
plaintiff can enforce every legal obligation that involves her in some way; she can “enforce” only those
“specific legal obligations whose violation works a direct harm” to her that is actual and concrete within
the meaning of Article III. Allen v. Wright, 468 U.S. 737, 761 (1984).
The brief for the Solicitor General defended the injury-at-law doctrine in the context of
other decisions holding that mere publication of false information meets the standing–infact requirement:
32
Question Presented
Whether respondent’s complaint identified an Article III injury-in-fact by alleging that petitioner
had willfully violated 15 U.S.C. 1681e(b) by publishing inaccurate personal information about respondent in consumer reports prepared by petitioner without following reasonable procedures to assure the
information’s accuracy. . . .
Discussion
…Respondent’s putative class-action complaint alleged that petitioner is a CRA that operates a website, spokeo.com, on which users can obtain information about individuals. Respondent alleged that any
person can obtain from that website a wide range of in- formation about the subject of a search, including
the individual’s “address, phone number, marital status, age, employment information, education, [and]
ethnicity”; the “names of [his or her] siblings and parents”; and even “items [the individual has] sought
from web-sites such as Amazon.com, and music [the individual has] listened to on websites such as
Pandora.com.”Petitioner’s website also allegedly provides information about the individual’s “economic
health” (which petitioner formerly labeled as a “credit estimate”), “wealth level,” and, until shortly
before respondent’s complaint was filed, “mortgage value,” “estimated income,” and “investments.”
Petitioner has allegedly “actively marketed it[s] services to employers for the purpose of evaluating
potential employees.”
Petitioner’s website allegedly displayed a consumer report about respondent that inaccurately reported, inter alia, respondent’s age and wealth and that respondent was employed, possessed a graduate
degree, and was married with children. Respondent alleged that petitioner had disseminated that erroneous information about him when he was “out of work and seeking employment,” causing both past and
continuing “actual harm to [his] employment prospects,” monetary injury, and emotional injury from
anxiety about his “diminished employment prospects.
…The petition for a writ of certiorari virtually ignores the specific statutory elements of respon-
dent’s FCRA cause of action and the specific allegations of respondent’s complaint. Petitioner instead
seeks to litigate the abstract question whether “a bare violation of a federal statute” satisfies Article III
even when the plaintiff has “suffer[ed] no concrete harm.” Petitioner appears to construe the decision
below as holding that Congress has plenary power to create statutory causes of action, adjudicable in
federal court, on behalf of whatever class of plaintiffs Congress chooses. See, e.g., Pet. 12 (stating that
“there is broad-based and long-standing disagreement in the lower courts over whether Article III places
limitations on Congress’s ability to create constitutional standing”).
But while the court of appeals
held that respondent’s own complaint satisfied Article III, the court specifically recognized that “the
Constitution limits the power of Congress to confer standing.”
33
In any event, “[t]his Court ‘reviews judgments, not statements in opinions.’ ” California v. Rooney,
483, 307, 311 (1987) (per curiam) (quoting Black v. Cutter Labs., 351 U.S. 292, 297 (1956)). The Ninth
Circuit’s only holding in this case was that respondent had satisfied Article III by alleging that a CRA had
published inaccurate personal information about respondent in a consumer report. Because that holding
is correct and does not conflict with any decision of another circuit, this Court’s review is not warranted.
...
…Petitioner contends that its alleged “re-transmi[ssion] [of ] inaccurate personal information about
[respondent]” cannot support standing without an “allegation of tangible harm.” But the dissemination
of inaccurate information about respondent in violation of respondent’s statutory rights is a “tangible
harm.” Courts have long recognized similar legally protected interests, and the violation of those interests is a sufficient basis for Article III standing. . . .
…Petitioner argues that, at common law, defamation suits without a showing of consequential harm
were limited to contexts in which the false- hood was so egregious that “the law presume[d] an injury.”
That is incorrect. At common law, plaintiffs could recover for any written defamation without a showing of consequential harm, and for certain oral defamatory statements, even when those false statements
were of an “insignificant character” and were unaccompanied by resulting reputational or other harm. 3
Restatement (Second) of Torts § 620 cmts. . . .
…Both the common law and the literal understandings of privacy encompass the individual’s control
of information concerning his or her person. Department of Justice v. Reporters Comm. for Freedom of
the Press, 489 U.S. 749, 763 (1989);
Department of State v. Ray, 502 U.S. 164, 175 (1991) (noting
the “privacy interest” of named individuals in avoiding public disclosure of their “personal information regarding marital and employment status”). That legally protected interest is particularly salient
in modern day society given the proliferation of large databases and the ease and rapidity with which
information about individuals can be transmitted and retransmitted across the Internet. Indeed, “[t]he
capacity of technology to find and publish personal information presents serious and unresolved issues
with respect to personal privacy and the dignity it seeks to secure.” Sorrell v. IMS Health Inc., 131 S. Ct.
2653, 2672 (2011).
* * *
Is Your Samsung Television Set Spying on You?
The Electronic Privacy Information Center has filed a petition with the FTC to inves-
tigate and enjoin Samsung Electronics, Ltd. According to the complaint, those Samsung
television sets that implement voice comands “routinely intercept and record the private
communications of consumers in their homes. Consumers who have learned of this practices
34
have described it is as both “unfair” and “deceptive.” Samsung’s attempts to disclaim its
intrusive surveillance activities by means of a “privacy notice” do not diminish the harm
to American consumers. It is incumbent upon the Federal Trade Commission to take action
in this matter, and to enjoin Samsung and other companies that engage in similar practices,
from such unlawful activities.”
House of Representatives Passes The Protecting Cyber Networks Act
On April 22, the House of Representatives passed the Protecting Cyber Networks Act
(PCNA, H.R. 1560) an information sharing bill designed to shield U.S. companies from
liability risks associated with cyberthreat data sharing. The bipartisan bill would provide
liability protection to companies that voluntarily share “cyber threat indicators” or “defensive measures” with other private entities or a civilian federal agency. Companies would
be immune from lawsuits stemming from the disclosure of such information unless there
is “willful misconduct.” On the following day the House passed on a 355-63 vote an-
other cyberthreat data sharing measure (H.R. 1731) that would create a central role for the
Department of Homeland Security as well as set privacy safeguards.
According to a coalition of privacy organizations including the Open Technology
Institute these bills would enable police and other governmental units broad access to
all personal privacy information without the meaningful threat of liability for abuses.
According to the Open Technology Institute:
PROBLEM #3: PCNA Would require any federal entinty that receives cyber threat indicators to
automatically and indiscriminately disseminate them to the NSA and other federal agencies.
Not only would PCNA authorize excessive information sharing from businesses to government, it
would also authorize excessive sharing of that same information throughout the government, while also
undermining civilian control of domestic cybersecurity information sharing. While PCNA would only
allow companies to share information directly with a civilian federal entity (Sec. 3(c)(1)(A)), it would
also require any civilian entity that receives indicators to immediately disseminate all threat indicators
they receive, including personal information, to a myriad of government agencies ranging from the NSA
and the Office of the Director of National Intelligence to the Federal Bureau of Investigation (FBI) and
the Department of Commerce. (Sec. 4(a)(B), newly created section “(b)(2)(i))”) It would also prohibit
those civilian entities from doing anything to impede the real­time dissemination of indicators, or to
modify them in any way. (Sec. 4(a)(B), newly created section “(b)(2)(ii))”) This would make it impossible for the original receiving entity to conduct a second review of indicators to identify and remove any
improperly shared personal information before transmitting it to the NSA or other agencies.
35
Management of and response to domestic cybersecurity threats should be controlled by a civilian
agency. Requiring a civilian agency to automatically and indiscriminately disseminate that information
to military and intelligence agencies like the NSA undermines civilian control.
Entities within the Department of Defense, like the NSA, should only have access to information
concerning significant cyber threats, such as threats that could result in a significant loss of life or physical destruction of critical infrastructure or state sponsored espionage. . . .
SOLUTION #3: Government entities receiving information under PCNA should be required to
review it for improperly shared PII and remove that PII before disseminating the information further, and that information should only be disseminated to the NSA when it concerns significatant
threats to national security.
…PROBLEM #6: PCNA would immunize companies from liability for harms resulting from information sharing and monitoring.
PCNA would also absolve companies of any liability associated with information sharing or monitoring conducted pursuant to the Act, except for actions that constitute willful misconduct that the
harmed party must establish with a high burden of evidentiary proof. This provision would preclude
causes of action for violations of the Computer Fraud and Abuse Act as well as privacy statutes such as
the Stored Communications Act and Wiretap Act portions of ECPA. (Sec. 6) Information sharing and
monitoring that negligently or even recklessly violated the law would be immunized by PCNA, regardless of how substantial is the damage to other computer systems, individuals’ privacy rights, or any other
legal interest.
SOLUTION #6: PCNA’s liability protections should be narrowed to ensure that there is reasonable recourse for those harmed in the event that a company unnecessarily monitors or shares their
personal information.
Conclusion
For nearly two years, Americans and people the world over have learned of the NSA’s near­ubiquitous
surveillance abilities and practices. Now more than ever before, Congress should ensure that strong privacy protections are central to the provisions of any cyber information sharing legislation that it passes.
At a minimum, cybersecurity information sharing legislation must provide for effective civilian
control of information sharing between the private sector and the government while placing meaningful
limits on the role of military and intelligence agencies like the NSA. That legislation also must include
strong privacy protections to shield innocent Americans’ sensitive information, including limiting its use
to investigations and prosecutions of computer crimes; narrowly tailored liability protections to ensure
that parties who are negligently harmed may seek redress for those harms; and no new authorizations for
additional monitoring of private communications nor for the deployment of countermeasures.
36
PCNA, like CISA, fails on all of these counts. It would enhance cyber­surveillance while threatening
to undermine cybersecurity.”
* * *
The Surveillance State and Bruce Schneier
Bruce Schneier is a security expert. His influential newsletter “Crypto-Gram” and his
blog “Schneier on Security” are read by over 250,000 people. His new book is “Data and
Goliath: The Hidden Battles to Collect Your Data and Control Your World (Data is pronounced with a long “a” to resonate with David.) The advertisement for the book states:
You are under surveillance right now.
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store
purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and
texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your
private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance
to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger
worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass
surveillance society of our own making. But have we given up more than we’ve gained? In Data and
Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He
shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You’ll
never look at your phone, your computer, your credit cards, or even your car in the same way again.
Here are some choice quotes from his various writings and interviews:
…Paula Broadwell,who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network.
Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel
registration data from several different hotels—and hers was the common name.
…One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his
Internet use during one 36-hour period. . . .
37
Sure, we can take measures to prevent this. We can limit what we search on Google from our
iPhones, and instead use computer web browsers that allow us to delete cookies. We can use an alias on
Facebook. We can turn our cell phones off and spend cash. But increasingly, none of it matters.
There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers,
social networking sites, search engines: these have become necessities, and it’s fanciful to expect people
to simply refuse to use them just because they don’t like the spying, especially since the full extent of
such spying is deliberately hidden from us and there are few alternatives being marketed by companies
that don’t spy. . . .
…So, we’re done. Welcome to a world where Google knows exactly what sort of porn you all like,
and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because
increasingly your conversations are conducted by e-mail, text, or social networking sites.
* * *
Krebs on Security Discusses Increased Ricks of Identity
Theft Through Breaches of Data Broker Information
Brian Krebs is an American journalist and investigative reporter whose blog “Krebs on
Security” provides excellent coverage of data breaches and the methods of cybercriminals.
He personally uncovered a the breach of data brokers who provide personal credit information, including names, social security numbers and the answers to frequently asked security
questions, all of which make identity theft easier. Here is a quote from his December, 2014
post:
Some of the biggest retail credit card breaches of the past year — including the break-
ins at Target and Home Depot — were detected by banks well before news of the incidents
went public. When cards stolen from those merchants go up for sale on underground cybercrime shops, the banks often can figure out which merchant got hacked by acquiring a
handful of their cards and analyzing the customer purchase history of those accounts. The
merchant that is common to all stolen cards across a given transaction period is usually the
breached retailer.
Sadly, this process of working backwards from stolen data to breach victim generally does not work
in the case of breached data brokers that trade in Social Security information and other data, because too
often there are no unique markers in the consumer data that would indicate from where the information
was obtained. . . .
38
…As I explained in a 2013 exclusive, civilian fraud investigators working with law enforcement
gained access to the back-end server that was being used to handle customer requests for consumer information. That database showed that the site’s 1,300 customers had spent hundreds of thousands of dollars
looking up SSNs, birthdays, drivers license records, and obtaining unauthorized credit and background
reports on more than four million Americans.
Although four million consumer records may seem like a big number, that figure did not represent
the total number of consumer records available through ssndob[dot]ru. Rather, four million was merely
the number of consumer records that the service’s customers had paid the service to look up. In short, it
appeared that the ID theft service was drawing on active customer accounts inside of major consumer
data brokers.
Investigators working on that case later determined that the same crooks who were running
ssndob[dot]ru also were operating a small, custom botnet of hacked computers inside of several major
data brokers, including LexisNexis, Dun & Bradstreet, and Kroll. All three companies acknowledged
infections from the botnet, but shared little else about the incidents.
Despite their apparent role in facilitating (albeit unknowingly) these ID theft services, to my knowledge the data brokers involved have never been held publicly accountable in any court of law or by
Congress.
* * *
Privacy Advocates Bash President Obama’s
Call for Industry Self-Regulation of Internet Privacy
The Administration has drafted a bill foe privacy protection that calls on industry to
regulate security and privacy by comparing the risks, costs and benefits of various tech-
niques. His draft disappointed privacy activists who wanted a law allowing individuals to
prevent tracking or at least more active regulation by the FTC. According to the Center for
Digital Democracy:
…Three years ago, President
Obama promised that his administration would deliver
a “Privacy Bill of Rights” to protect American consumers. The bill released today is
a serious setback for privacy. Instead of effective rights that Americans can rely on
to protect themselves and their families from the onslaught of online and offline data
gathering, the administration proposal perversely reduces the power of the Federal
Trade Commission to protect the public. It fails to give the FTC, the country’s key
privacy regulator, “rule-making” authority to craft reasonable safeguards,and actually
39
empowers the companies that now harvest our mobile, social, location, financial, and health data, leaving them little to fear from regulators.
The legislation creates a huge loophole that practically eviscerates any real privacy protection and
consumer control of their data. Its provisions are tied to a standard of both “risk” and “context” that enables a company to determine whether a person’s data require greater privacy control. Since the majority
of today’s massive online data gathering is disingenuously considered by industry as “marketing” information—versus what it really is, highly detailed and continually updated profiles merging our online and
offline data—very little of a consumer’s data will trigger stronger protections.
The multi-stakeholder process at the core of this poorly constructed privacy bill has been flawed
from the outset, dominated as it is by industry lobbyists whose real goal is to ensure their companies can
continue their practices without any real safeguards. The proceedings have failed so far to generate any
meaningful and widely adopted safeguards, and the prospects for a new “code of conduct” that offers
genuine consumer protection are unlikely. Public interest and privacy groups are vastly outnumbered
in the Department of Commerce-run multi-stakeholder process, which is notable for its lack of diverse
representation, denying meaningful participation from civil rights, consumer, and other representatives.
The bill limits the FTC’s “unfair trade practices” authority once companies that collect our data
adopt a “multi-stakeholder code of conduct.” Once that code is developed, the FTC has at most 90 days
(if adopted via a Department of Commerce process) to approve or deny it, giving the agency and the
public insufficient time to analyze and address the code’s shortcomings. Hundreds of codes are predicted
to be proposed, leaving the FTC at a disadvantage in performing its duty to protect American consumers.
The bill also greatly reduces the ability of state attorneys general to protect our privacy precisely at
a time when there is an explosion of hyperlocal data mining of our neighborhoods.
The legislation also enables companies to create so-called “privacy review boards” that will most
likely rubber-stamp their data practices, another example of how corporations have been further empowered to decide what the consumer privacy rules should be. While the bill touts that it provides rights to
consumers, it gives real control to the companies that collect our information.
Although the president’s Privacy Bill of Rights promised transparency and control, it creates a
labyrinth-like process that consumers must navigate before they can actually access and correct their
own data records held by companies. Data brokers and others can hide behind a convoluted system to
determine whether individuals can access their files.
Beyond its undermining FTC authority and empowering industry self-regulation, the process by
which the bill was written also reflects poorly on the Administration. As a Commerce official said to
advocates one week ago, the bill was deliberately drafted so as not to “disrupt [the commercial data]
business—we are the Department of Commerce.” The majority of consumer and privacy advocates were
40
given only a review of the near-final text a week ago today, with just less than 30 minutes to read the bill.
Advocates told the White House early this week about some of the problems in the legislation, urging it
to postpone slightly the release of the bill and to work with us to improve its consumer protections. But
this proposal was rejected. Leading Congressional leaders on privacy issues were also denied access to
the bill until yesterday, leaving them no time for meaningful engagement with the White House. Parts of
the bill appear to have been drafted by the “Big Data” lobby itself, in order to protect industry’s current
data practices, which raise serious questions about the influence the commercial sector has within the
Department of Commerce.
“Instead of supporting the FTC, the Administration has aided the data collection industry in its ef-
forts to undermine that agency’s role,” explained Jeff Chester, CDD’s executive director. This bill fails to
fulfill what the president promised. CDD and other consumer and privacy advocates will work to ensure
Americans get the privacy rights they deserve.
* * *
41
Case Summaries
CLASS CERTIFICATION; ASCERTAINABILITY; ELECTRONIC COMMUNICATIONS PRIVACY ACT
Byrd v. Aaron’s Inc., No. 14-3050 (3rd Cir. Apr. 16, 2015)
Third Circuit Reverses Denial of Motion for Class Certification
Because District Court Erred in Applying Ascertainability Precedent......................44
PRIMARY JURISDICTION; QUASI-CONTRACT; MOTION TO DISMISS
Astiana v. The Hain Celestial Group, Inc., No. 12-17596 (9th Cir. Apr. 10, 2015)
Ninth Circuit Validates Equitable Quasi-Contract Remedy in
Lieu of Actual Damages; Calls for Stay Rather Than
Dismissal of False Advertising Case Under Primary Jurisdiction Doctrine..............47
SCA; BREACH OF CONTRACT; UCL; PRIVACY; CLASS ACTION; MOTION TO
DISMISS
Svenson v. Google, Inc., Case No. 13-cv-04080-BLF (N.D. Cal. Apr 1, 2015)
Federal Court Denies Motion To Dismiss Breach of Contract and
California Unfair Business Practices Claims Based on Google’s Alleged
Disclosure of Users’ Personal Data to Apps; Because Personal Data Has
Alleged Economic Value, Claims for Damages Under Both Contract
Law and the California Business and Professional Code May Proceed.....................51
CONTENT REGULATION; E-COMMERCE; PRIVACY/SECURITY
Sweet v. LinkedIn Corp., No. 5:14-cv-04531-PSG (N.D. Cal. Apr. 14, 2015)
LinkedIn’s “Reference Search” Service
Doesn’t Violate Fair Credit Reporting Act....................................................................57
DERIVATIVE LIABILITY; MARKETING; SEARCH ENGINES; TRADEMARK
Goldline, LLC v. Regal Assets, LLC,
Case No. 14-03680 DDP (ASx) (C.D. Cal. April 21, 2015)
Mixed Ruling in Competitive Keyword Advertising Case...........................................59
42
CONTENT REGULATION; E-COMMERCE; LICENSING/CONTRACTS
Galland v. Johnston, No. 1:2014:cv04411 (S.D. N.Y. Mar. 19, 2015)
Court Might Enforce A Contract Ban On Consumer Reviews....................................61
LICENSING/CONTRACTS; TRADE SECRETS
CDM Media USA, Inc. v. Simms, No. 14-CV-9111 (N.D. Ill Mar. 25, 2015)
Do Employers Own LinkedIn Groups Created By Employees?.................................62
CONTENT REGULATION; DERIVATIVE LIABILITY
Weigand v. N.L.R.B., No. 14-1024 (D.C. Cir. April 17, 2015)
Union Isn’t Liable For Members’ Posts To Private Facebook Group........................64
MARKETING; SEARCH ENGINES; TRADE SECRETS; TRADEMARK
Infogroup, Inc. v. Database LLC, No. 8:14-CV-49 (D. Neb. Mar. 30, 2015)
Another Competitive Keyword Advertising Lawsuit Fails..........................................66
43
Recent Decisions
CLASS CERTIFICATION; ASCERTAINABILITY; ELECTRONIC COMMUNICATIONS
PRIVACY ACT
Byrd v. Aaron’s Inc., No. 14-3050 (3rd Cir. Apr. 16, 2015)
Third Circuit Reverses Denial of Motion for Class Certification Because District
Court Erred in Applying Ascertainability Precedent
In a notorious case where a computer rental company surreptitiously inserted spyware
on its computers, the Third Circuit reversed the District Court’s denial of plaintiffs’ motion for class certification, holding that the district court erred in applying the Circuit’s as-
certainability precedent, especially by not separating the predominance requirement from
ascertainability. The Court first reviewed its ascertainability precedent in detail, in order to
dispel “apparent confusion” in the district courts between ascertainability and other simi-
lar, but distinct, requirements of Rule 23 certification. It then concluded that the district
court abused its discretion in four ways: (1) misstating the rule governing ascertainability,
(2) improperly grafting an “underinclusive” requirement to the ascertainability standard,
(3) incorrectly concluding that an “overly broad” class was not ascertainable, and (4) im-
properly applying legal precedent to the issue of whether “household members” could be
ascertainable. It remanded to the district court for a rigorous analysis of all Rule 23 certification requirements prior to any further appellate review.
The concurring opinion suggested that it was time to abolish the “business record”
or “paper trail” element of ascertainability adopted in the Circuit in 2012. Among other
things, the Judge argued that records are not the only way to determine who is a member
of a class, and the trial judge should have flexibility to determine what is adequate in each
case.
Background
Plaintiffs Crystal and Brian Byrd brought a putative class action against Aaron’s
Inc. and its franchise store Aspen Way Enterprises, Inc. for violation of the Electronic
Communications Privacy Act of 1986 (ECPA). On July 30, 2010, Crystal Byrd leased a
laptop computer from Aspen Way. Although Ms. Byrd asserted that she made full payments, on December 22, 2010, an agent of Aspen Way came to the Byrds’ home to repos-
sess the laptop on the ground of non-payment. The agent allegedly presented a screen shot
of a poker website Mr. Byrd had visited as well as a picture taken of him by the laptop’s
44
camera as he played. The Byrds were troubled and surprised by what they considered a
significant and unauthorized invasion of their privacy.
Aspen Way obtained the picture and screenshot through spyware installed on the lap-
top. The spyware had a function called “Detective Mode,” which could collect screenshots,
keystrokes and webcam images from the computer and its users. The Byrds alleged that
this spyware secretly accessed their laptop 347 times on 11 different days. They further alleged that the computers of 895 customers across the country had surveillance conducted
through spyware.
The Byrds moved to certify the class under FRCP Rule 23(b)(2) and 23(b)(3). The
proposed class definition was:
all persons who leased and/or purchased one or more computers from Aaron’s, Inc., [or an Aaron’s
franchisee] and their household members, on whose computers DesignerWare’s Detective Mode was
installed and activated without such person’s consent on or after January 1, 2007.
The Magistrate Judge recommended that the motion be denied because the proposed
class was not ascertainable. Regarding “owner and lessee” class members, the Magistrate
Judge concluded that the proposed class was underinclusive because it did not encompass all the individuals whose information was gathered by Aaron’s franchisee. The Judge
further concluded that it was also overly broad because not every computer upon which
Detective Mode was activated would state a claim under the ECPA for interception of an
electronic communication. Regarding “household members” the Magistrate Judge took
issue with the fact that the term was not defined, and that it was not enough to propose a
method by which the information as to household members could be obtained. The District
Court adopted the Magistrate Judge’s recommendations. The Byrds appealed.
Court Analysis
The Third Circuit concluded that because the District Court confused ascertainability
with other relevant inquiries under Rule 23, it abused its discretion. The Court vacated and
remanded.
I. Clarification of Third Circuit Precedent Regarding Ascertainability
Preliminarily, the Court noted that there was confusion in the district courts regarding
the application of ascertainability precedent in the Circuit, so it reviewed the precedent in
order to “dispel any confusion.” It stated that
the ascertainability inquiry is two-fold, requiring a plaintiff to show that: (1) the class is defined with
reference to objective criteria; and (2) there is a reliable and administratively feasible mechanism for
determining whether putative class members fall within the class definition.
45
(The concurring opinion noted that the Third Circuit recently adopted the second element
in 2012.)
The Court repeatedly emphasized that the ascertainability analysis dovetails with, but
is separate from, other Rule 23 requirements for class certification. For instance, predominance and ascertainability standards are distinct because ascertainability focuses on wheth-
er individuals fitting the class definition may be identified without resort to mini-trials,
whereas predominance focuses on whether essential elements of the claims can be proven
at trial with common evidence. The Court stated that ascertainability is a “narrow” inquiry
that requires only that the plaintiff show that members can be identified without extensive
and individualized fact finding. Retail records can be an acceptable method of proving
class membership, but a mere affidavit is not sufficient.
II. Reversal of District Court
The Third Circuit gave four reasons for reversing the District Court’s conclusion that
the ascertainability standard was not met.
First, the District Court abused its discretion by misstating the rule governing ascer-
tainability by conflating the standards governing class definition with the ascertainability
requirement. What the District Court described as the two requirements for a “precisely defined class”—the class must be defined with reference to objective criteria, and there must
be a reliable and administratively feasible method for determining whether individuals fell
within the class definition—was in fact the inquiry relevant to the ascertainability standard.
Second, the District Court abused its discretion in determining that the proposed class
was underinclusive. The Third Circuit stated that they “decline to engraft an ‘underinclu-
sivity’ standard onto the ascertainability requirement.” Individuals who are injured by a
defendant but are excluded from a class are simply not bound by the outcome of that par-
ticular action. The Court clarified that it only mentioned “underinclusivity” with regard to
whether records used to establish ascertainability were sufficient, not whether there were
other injured parties that could also be included in the class.
Third, the District Court abused its discretion in determining that the proposed class
was “overly broad.” The Court held that this was really a predominance issue. The Court
held that defendants’ arguments, and the District Court’s rulings, conflated the issues of as-
certainability, overbreadth (or predominance) and standing. Defendants asked the Court to
consider the issue as one of predominance, but the Court declined to do so since the District
Court had not yet conducted a rigorous analysis of that issue.
46
Fourth, the Court held that the District Court abused its discretion in determining that
the “household members” were not ascertainable. The Byrds argued that they intended the
“plain meaning” to be “all of the people, related or unrelated, who occupy a housing unit.”
The Third Circuit was “left to wonder” why the District Court found this inadequate. The
location of household members was already known from Aaron’s sales records, and there
were unlikely to be serious administrative burdens in identifying the household members.
The Third Circuit remanded to the District Court to consider the remaining Rule 23 cer-
tification requirements in the first instance. The Court noted the importance of the district
court completing a rigorous analysis of all requirements in support of certification before
any further appellate review.
Concurring Opinion
The concurring opinion suggested that the lengths to which the majority had to go to at-
tempt to clarify the requirement of ascertainability indicated that the time had come to “do
away with this newly created aspect of Rule 23 in the Third Circuit.” The opinion argued
that the new “business record” or “paper trail” requirement should be abolished because
records are not the only way to determine who is in a class, and the trial judge should have
flexibility to determine what is adequate in each case. The Judge noted that in a small
claims case like the one at bar, the “real choice for the courts is between compensating a
few of the injured, on the one hand, versus compensating none while allowing corporate
malfeasance to go unchecked, on the other.”
* * *
PRIMARY JURISDICTION; QUASI-CONTRACT; MOTION TO DISMISS
Astiana v. The Hain Celestial Group, Inc., No. 12-17596 (9th Cir. Apr. 10, 2015)
Ninth Circuit Validates Equitable Quasi-Contract Remedy in
Lieu of Actual Damages; Calls for Stay Rather Than Dismissal of
False Advertising Case Under Primary Jurisdiction Doctrine
Plaintiffs filed a putative class action against makers of cosmetics, alleging that they
were deceived into purchasing products due to false advertising claiming that the products
were natural. The District Court dismissed Plaintiffs’ California state law claims under the
primary jurisdiction doctrine and dismissed Plaintiffs’ quasi-contract cause of action as duplicative of, or superfluous to, Plaintiffs’ other claims. The panel concluded that the district
47
court erred in dismissing the quasi-contract cause of action, thus upholding Plaintiffs’ claim
even if actual damages could not be shown. (Publisher’s Note: This case could be a significant precedent in breach of privacy cases where damages are problematic. If the court is
allowed to create a customized breach of contract remedy for consumers deceived by the
defendant’s privacy policy, the Plaintiffs can survive a motion to dismiss for lack of standing and seek restitution without pleading a claim for punitive damages.)
The Ninth Circuit held that although the district court properly invoked the primary
jurisdiction doctrine by referring the case to the Food and Drug Administration, it erred
by dismissing the case rather than issuing a stay pending potential agency action by the
Agency. The panel indicated that on remand, the district court might consider whether
events during the pendency of the appeal had changed the calculus on whether further FDA
proceedings were necessary.
Background
Plaintiffs Skye Astiana, Tamar Davis Larsen, and Mary Littlehale (collectively
“Astiana”) filed a putative nationwide class action against The Hain Celestial Group and
JÂSÖN Natural Products (collectively “Hain”), makers of cosmetics. Plaintiffs alleged
that they were deceived into purchasing Hain’s cosmetics due to false advertising claiming
that the products were natural when they in fact contained artificial ingredients. Plaintiffs
sought injunctive relief and damages under the federal Magnuson-Moss Warranty Act,
California’s unfair competition and false advertising laws, and common law theories of
fraud and quasi-contract.
The district court dismissed the quasi-contract cause of action, noting that “while res-
titution is available as a remedy for plaintiffs’ other causes of action, it is not a standalone
cause of action in California and is nonsensical as pled in any event.” The district court also
dismissed the California state law claims under the primary jurisdiction doctrine, which
permits courts to determine whether a claim implicates technical and policy questions that
should first be addressed by an agency with regulatory authority over the relevant industry.
Preemption
The Court first held that the Food, Drug, and Cosmetic Act did not expressly preempt
California’s state law causes of action that create consumer remedies for false or misleading cosmetics labels.
Primary Jurisdiction
The Court next turned to whether the district court properly dismissed Plaintiffs’ claims
under the primary jurisdiction doctrine. The Court first rejected Plaintiffs’ argument that
48
Defendant waived its right to seek dismissal on primary jurisdiction grounds because the
defense was asserted in a pleading titled: “Motion to dismiss for lack of subject matter ju-
risdiction, pursuant to Federal Rule of Civil Procedure 12(h)(3).” Though the Court noted
that “this title was inaccurate because ‘[p]rimary jurisdiction is not a doctrine that impli-
cates the subject matter jurisdiction of the federal courts,’” the Court found that “a pleading
caption is hardly dispositive of the nature of the pleading,” and concluded that “[f]ar from
waiver, Hain’s motion put [Plaintiffs] on notice of the defense, and [Plaintiffs] responded
to this argument.”
Plaintiffs also urged the Court to acknowledge that Plaintiffs’ correspondence with the
FDA during the pendency of this appeal demonstrated that the agency declined to take pri-
mary jurisdiction over this case. However, the Court found that this determination should
be left to the district court on remand.
The Court then held that, although the district court properly invoked primary jurisdic-
tion, it erred by dismissing the case without prejudice rather than staying proceedings while
the parties (or the district court) sought guidance from the FDA. The Court explained:
Primary jurisdiction is a prudential doctrine that permits courts to determine “that an otherwise cognizable claim implicates technical and policy questions that should be addressed in the first instance by
the agency with regulatory authority over the relevant industry rather than by the judicial branch.” … In
evaluating primary jurisdiction, we consider “(1) the need to resolve an issue that (2) has been placed by
Congress within the jurisdiction of an administrative body having regulatory authority (3) pursuant to a
statute that subjects an industry or activity to a comprehensive regulatory authority that (4) requires expertise or uniformity in administration.” … the doctrine is reserved for a “limited set of circumstances”
that “requires resolution of an issue of first impression, or of a particularly complicated issue that Congress
has committed to a regulatory agency.”… Under our precedent, “efficiency” is the “deciding factor” in
whether to invoke primary jurisdiction… even when agency expertise would be helpful, a court should
not invoke primary jurisdiction when the agency is aware of but has expressed no interest in the subject
matter of the litigation. Similarly, primary jurisdiction is not required when a referral to the agency
would significantly postpone a ruling that a court is otherwise competent to make.
The Court found that the district court did not err in invoking primary jurisdiction, as
“[d]etermining what chemical compounds may be advertised as natural on cosmetic product labels is ‘a particularly complicated issue that Congress has committed to’” the FDA,
and “[o]btaining expert advice from that agency would help ensure uniformity in administration of the comprehensive regulatory regime established by the FDCA.”
The Court further explained:
49
Once a district court determines that primary jurisdiction is appropriate, it may either stay proceedings
or dismiss the case without prejudice. When the purpose of primary jurisdiction is for “parties [to] pursue their administrative remedies,” a district court will “[n]ormally” dismiss the case without prejudice.
… However, when a court invokes primary jurisdiction “but further judicial proceedings are contemplated, then jurisdiction should be retained by a stay of proceedings, not relinquished by a dismissal.”…
Because the Ninth Circuit “has not clearly adopted the doctrine of equitable tolling in primary jurisdiction cases,” prudence dictates that a court should stay proceedings rather than dismissing them when
there is a “possibility” that the running of the statute of limitations during administrative proceedings could
affect the parties’ rights.
Here, the Court found,
“[t]he purpose of referral to the FDA was not for the agency to adjudicate [Plaintiffs’] claims, but to
provide expert advice that would be useful to the court in considering this lawsuit. Plus, dismissing the
case had the potential to prejudice members of the putative consumer class because of the running of the
statute of limitations.”
The Court therefore reversed the dismissal. It further noted: “On remand, the district court
may consider whether events during the pendency of this appeal…affect the need for further proceedings at the FDA or demonstrate that another referral to the agency would be
futile.”
Quasi-Contract
The Court then overturned the district court’s dismissal of Plaintiffs’ quasi-contract
cause of action, finding that Plaintiffs’ pleadings, though inartful, were better read as raising a valid quasi-contract claim seeking the remedy of restitution. The Court explained:
[I]n California, there is not a standalone cause of action for “unjust enrichment,” which is synonymous
with “restitution.” … However, unjust enrichment and restitution are not irrelevant in California law.
Rather, they describe the theory underlying a claim that a defendant has been unjustly conferred a benefit “through mistake, fraud, coercion, or request.”…The return of that benefit is the remedy “typically
sought in a quasi-contract cause of action.” …. When a plaintiff alleges unjust enrichment, a court may
“construe the cause of action as a quasi-contract claim seeking restitution.”
The Court found that Plaintiffs alleged that they were entitled to relief under a “quasi-
contract” cause of action because Defendants had “entic[ed]” Plaintiffs to purchase their
products through “false and misleading” labeling, and that Defendants were “unjustly enriched” as a result. The Court concluded that this “straightforward statement” was suffi-
cient to state a quasi-contract cause of action. Finally, the Court found that even if the cause
50
of action was duplicative of or superfluous to Plaintiffs’ other claims, this was not grounds
for dismissal.
The Court therefore reversed and remanded.
* * *
SCA; BREACH OF CONTRACT; UCL; PRIVACY; CLASS ACTION; MOTION TO DISMISS
Svenson v. Google, Inc., Case No. 13-cv-04080-BLF (N.D. Cal. Apr 1, 2015)
Federal Court Denies Motion To Dismiss Breach of Contract and
California Unfair Business Practices Claims Based on Google’s Alleged
Disclosure of Users’ Personal Data to Apps; Because Personal Data Has
Alleged Economic Value, Claims for Damages Under Both Contract Law
and the California Business and Professional Code May Proceed
In this putative class action, plaintiff argued that Google violated its own privacy policy
by sharing users’ information with application vendors. Reaffirming the broad sweep of
recent Ninth Circuit precedent, the Court concluded that the amended complaint stated a
breach of contract damages claim in that it alleged that Google’s disclosure of plaintiff’s
personal information would diminish its sale value in the market for such information. The
Court also upheld a claim for breach of the implied covenant of good faith and fair dealing since Google did not disclose its true practice of sharing personal information with its
Apps.
The Court also held that the plaintiff had alleged an unlawful or unfair competition
under California law, and explained that although plaintiff did not allege that she had read
the Google contract, misrepresentation and reliance need not be alleged for that cause of
action. The Court, however, did dismiss the Stored Communications Act (SCA) claim be-
cause it held that a document regarding users’ credit cards, which did not include the actual
credit card numbers, was merely a “record” and not the “content” of a communication and
hence no subject to the SCA disclosure prohibitions.
Background
Under the Google Privacy Policy, Google may share a user’s “personal information”
only (1) with the user’s consent, (2) with domain administrators, (3) for external process-
ing, and (4) for legal reasons. Plaintiff alleged that prior to the filing of this lawsuit, Google
practice was to ignore these restrictions and, whenever a user purchased an App in the
Play Store, to share the user’s personal information with the App vendor. She asserted that
51
Google sharing of the “Packets Contents” with the App vendor was not necessary to the
App purchases and was not otherwise authorized by the Google Wallet Terms of Service.
Plaintiff claimed that Google ceased its blanket practice of sharing users’ personal information with App vendors shortly after she filed this lawsuit.
Plaintiff asserted claims on behalf of herself and those similarly situated for (1) breach
of contract, (2) breach of the covenant of good faith and fair dealing, (3) violation of the
SCA, 18 U.S.C. § 2701, and (4) § 2702 and, (5) violation of California’s Unfair Competition
Law (UCL), California Business and Professions Code § 17200.
Breach of Contract
Plaintiff alleged that Google’s conduct in making her personal information available to
YCDroid diminished the sales value of that personal information. As the Court recognized
in a prior order, the Ninth Circuit expressly recognized “that this type of allegation may
be sufficient to establish the element of damages for a breach of contract claim. See In re
Facebook Privacy Litig., 572 Fed. Appx. 494 (9th Cir.2014).” The Court concluded that
the original complaint did not allege facts sufficient to make out this theory of contract
damages because it did not allege a market for personal information. Plaintiff now alleged
that “[t]here is a robust market for the type of information contained within the Packets
Contents,” and that “[a]s a result of Defendants’ actions, Plaintiff and the Class have been
deprived of their ability to sell their own personal data on the market.”
Google asserted that more is required to allege contract damages under a diminution in
value theory, citing district court decisions requiring factual specificity as to how the de-
fendant’s use of the information deprived the plaintiff of the information’s economic value.
All but one of the cited decisions issued before the Ninth Circuit’s May 2014 Facebook
Privacy Litig. decision. Opperman, which issued six days after Facebook Privacy Litig.,
does not cite it.
The Ninth Circuit’s holding does not require the type of explication discussed by the district court decisions. In light of the Ninth Circuit’s ruling, this Court concludes that plaintiff’s allegations of diminution
in value of her personal information are sufficient to show contract damages for pleading purposes.
Regarding the breach of the implied covenant of good faith and fair dealing the Court
said the following:
Google points out, correctly, that Svenson’s implied covenant claim also contains allegations that Google
did not inform users that their personal information would be shared with App vendors in connection
with every transaction, see FAC ¶¶ 167, 169, and that the alleged failure to inform is insufficient to state
a claim for breach of the implied covenant absent an allegation that Google had a duty to inform. At the
52
hearing, the Court engaged in a colloquy with counsel as to whether it would make sense to go through
another round of amendment and –presumably – motion practice, or whether the allegations in the FAC
were sufficient to move forward on the implied covenant claim. Viewing the claim as a whole, the Court
concludes that Svenson does allege a viable claim for breach of the implied covenant despite her stray,
non-actionable allegations regarding Google’s failure to disclose.
SCA § 2702
Claim 4 alleged that disclosure of plaintiff’s personal information violated § 2702 of
the SCA, which provides that person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a
communication while in electronic storage by that service. The question presented by this
motion was whether the “Packets Contents” was “contents of a communication” or “a re-
cord or other information”; if the former, plaintiff has made out a claim under § 2702(a),
but if the latter she has not.
The Court previously dismissed Claim 4 after concluding that the personal informa-
tion described in the original complaint—“the user’s name, email address, account name,
home city and state, zip code, and in some instances telephone number,” constituted “re-
cord information” rather than “contents of a communication.” Because the § 2702 claim
had not previously been challenged by motion or addressed by the Court, plaintiff was
granted an opportunity to amend. However, the Court cautioned that “[g]iven the analysis
set forth herein, Plaintiff must consider whether she can allege additional facts that would
demonstrate that the alleged disclosure was more than record information.” The “Packets
Contents” described in the FAC were alleged to include “personal information about
Buyers, including credit card information, purchase authorization, addresses, zip codes,
names, phone numbers, email addresses, and/or other information.” Despite the inclusion
in this definition of the term “credit card information,” however, “it does not appear that
App vendors are given access to user’s credit card numbers.” Plaintiff’s opposition conceded that credit card information is not actually provided to App vendors. “Accordingly,
the “Packets Contents” are not materially different from the personal information alleged
to have been disclosed in the original complaint. Because none of plaintiff’s factual allegations or legal arguments are materially different from those considered and rejected by the
Court previously, the Court declines to reconsider its prior ruling.”
California’s UCL
Claim 5 asserted a violation of California Business & Professions Code § 17200. In or-
der to state a claim for relief under that provision, plaintiff must allege economic injury and
facts showing that defendants engaged in an “unlawful, unfair or fraudulent business act
53
or practice.” The Court was not persuaded by Google’s characterization of plaintiff’s UCL
claim. Her unlawful prong claim alleged in a straightforward manner that Google violated
its own privacy policies in violation of California Business and Professions Code § 22576.
No reliance is required for a violation of § 22576.
With respect to the unfair prong, plaintiff did not allege that she entered into the “Buyer
Contract” in reliance upon misrepresentations regarding the privacy protections contained
therein. She did not even allege that she read the Contract. She alleged that Google’s conduct was “oppressive, immoral, unethical, and unscrupulous” and that privacy protections
were contract benefits to which she was entitled. Further, the practice of making “blanket,
universal disclosure of any or all of the Packets Contents to third-party App Vendors” in
connection with every App purchase in the Play Store deprived her (and the Class) of any
opportunity to receive those benefits. Plaintiff’s allegation that Google had a policy that
by its very nature frustrated “[t]he agreed common purpose of the Wallet Terms for Buyers
to be able to privately purchase Apps from App Vendors” was “sufficient to take her claim
beyond mere breach of contract and into the realm of unfair competition prohibited by the
UCL.”
According to the Court:
Claim 5 asserts a violation of California Business & Professions Code § 17200. In order to state a
claim for relief under that provision, Plaintiff must allege facts showing that Defendants engaged in an
“unlawful, unfair or fraudulent business act or practice.” Cal. Bus. & Prof. Code §17200. “Because the
statute is written in the disjunctive, it is violated where a defendant’s act or practice violates any of the
foregoing prongs.” Davis v. HSBC Bank Nevada, N.A., 691 F.3d 1152, 1168 (9th Cir. 2012). In addition
to identifying a practice under one of the above prongs, a plaintiff must allege that he or she has suffered
(1) economic injury (2) as a result of the practice. Specifically, the plaintiff must allege that he or she
“suffered injury in fact and has lost money or property as a result of the unfair competition.” Cal. Bus.
& Prof. Code § 17204.
The Court previously dismissed Svenson’s UCL claim for failing to allege economic injury arising
from the challenged business practice as required by Kwikset. See Order of Aug. 12, 2014 at 16, ECF 83.
In particular, the Court concluded that “Plaintiff alleges that she purchased an App for $1.77 and received
that App,” and that she had “not alleged facts showing that she suffered any 25 damages resulting from
that transaction.” Id. Google contends that Svenson has not cured this defect. However, as discussed
above in connection with the contract claim, Svenson now alleges that “Defendants’ payment-processing
services provided under Buyer Contracts are not free:
…Defendants keep a percentage of the purchase price for each App purchase they process.” She also
alleges that “[t]he percentage of the App sales price Defendants retained is the money Defendants
54
earned from Plaintiff’s and Class Members’ purchases of Apps under the Buyer Contracts.” Svenson
thus alleges that she paid Google for services that she did not receive as a result of Google’s unlawful and unfair business practices, establishing economic injury.
The Court did not previously consider whether Svenson had alleged facts sufficient to meet the other
pleading requirements for UCL claims. Svenson asserts claims under the unlawful and unfair prongs.
With respect to the former, “[b]y proscribing any unlawful business practice, section 17200 borrows
violations of other laws and treats them as unlawful practices that the unfair competition law makes independently actionable.” Chabner v. United of Omaha Life Ins.Co., 225 F.3d 1042, 1048 (9th Cir. 2000)
(internal quotation marks and citation omitted). Svenson relies upon alleged violations of the SCA,
which are insufficient for the reasons discussed in connection with Claims 3 and 4, above. However, she
also relies upon alleged violations of California Business and Professions Code § 22576, which prohibits
an operator of a commercial web site or online service from failing to comply with its own privacy policies. Id. ¶¶ 222-223. Svenson’s allegations regarding Google’s policy of disclosing personal information
in connection with all App purchases, in violation of its own privacy policies, thus are sufficient to state
a claim under the unlawful prong. See id. ¶¶ 223-224.
With respect to the unfair prong, “the UCL does not define the term ‘unfair’ as used in Business and
Professions Code section 17200.” Durell v. Sharp Healthcare, 183 Cal. App. 4th 1350, 1364 (2010). Nor
has the California Supreme Court established a definitive test to determine whether a business practice is
unfair. Phipps v. Wells Fargo Bank, N.A., No. CV F 10–2025 LJO SKO, 2011 WL 302803, at *16 (E.D.
Cal. Jan. 27, 2011). Three lines of authority have developed among the California Courts of Appeal. In
the first line, the test requires “that the public policy which is a predicate to a consumer unfair competition action under the unfair prong of the UCL must be tethered to specific constitutional, statutory, or
regulatory provisions.” Drum v. San Fernando Valley Bar Ass’n, 182 Cal. App. 4th 247, 257 (2010)
(internal quotation marks and citation omitted). A second line of cases applies a test to determine whether
the identified business practice is “immoral, unethical, oppressive, unscrupulous or substantially injurious to consumers and requires the court to weigh the utility of the defendant’s conduct against the gravity
of the harm to the alleged victim.” Id. The third test draws on the definition of “unfair” from antitrust
law and requires that “(1) the consumer injury must be substantial; (2) the injury must not be outweighed
by any countervailing benefits to consumers or competition; and (3) it must be an injury that consumers themselves could not reasonably have avoided.” Id. (internal quotation marks and citation omitted).
Svenson alleges that Google’s alleged practice of disclosing personal information in connection with
all App purchases is “oppressive, immoral, unethical, and unscrupulous,” and that it effects substantial
consumer injury that is “not outweighed by any countervailing benefit to consumers or to competition.”
The details of Google’s alleged practice of violating its privacy policies, and the resulting injuries to
Svenson and the Class arising from such practice, are discussed in detail above and need not be set forth
55
again here. The Court concludes that Svenson has made out a UCL claim under the unfair prong as well
as under the unlawful prong.
Google argues that Svenson’s UCL claim is governed by the standards applicable to the fraudulent
prong even though she specifically confines her allegations to the unlawful and unfair prongs. “[A] consumer’s burden of pleading causation in a UCL action should hinge on the nature of the alleged wrongdoing rather than the specific prong of the UCL the consumer invokes.”Durell, 183 Cal. App. 4th at 1363.
Thus a claim that is based upon alleged misrepresentation and deception requires an allegation of actual
reliance even if brought under the unlawful or unfair prongs rather than the fraudulent prong. Kearns v.
Ford Motor Co., 567 F.3d 1120, 1125 (9th Cir. 2009) (fraud requirements may apply to claim brought
under unfair prong); Durell, 183 Cal. App. 4th at 1363 (reliance requirement may apply to claim brought
under unlawful prong). According to Google, the thrust of the UCL claim is that Google misrepresented
its practices with respect to disclosure of user information. Thus, Google asserts, Svenson must allege
reliance upon those misrepresentations in order to state a claim. Svenson does not allege that she read or
relied upon the Google Wallet Terms of Service or the privacy provisions contained therein.
The Court is not persuaded by Google’s characterization of Svenson’s UCL claim. Her unlawful
prong claim alleges in a straightforward manner that Google violated its own privacy policies in violation of California Business and Professions Code
§ 22576. No reliance is required for a violation of
§ 22576. With respect to the unfair prong, Svenson does not alleged that she entered into the “Buyer
Contract” in reliance upon misrepresentations regarding the privacy protections contained therein. She
alleges that that privacy protections were contract benefits to which she was entitled and that Google’s
practice of making “blanket, universal disclosure of any or all of the Packets Contents to third-party
App Vendors” in connection with every App purchase in the Play Store deprived her (and the Class) of
any opportunity to receive those benefits “[A] breach of contract may . . . form the predicate for Section
17200 claims, provided it also constitutes conduct that is unlawful, or unfair, or fraudulent.” Puentes v.
Wells Fargo Home Mortg., Inc., 160 Cal. App. 4th 638, 645 (2008). Svenson’s allegation that Google
had a policy that by its very nature frustrated “[t]he agreed common purpose of the Wallet Terms [ ] for
Buyers to be able to privately purchase Apps from App Vendors,” is sufficient to take her claim beyond
mere breach of contract and into the realm of unfair competition prohibited by the UCL.
Based upon the foregoing, the motion to dismiss is DENIED as to Claim 5.
Publisher’s Note: See the article by Professor David Dana in this issue entitled “Courts
Uphold California Privacy Claims Despite Vague Allegations: Opening The Litigation
Floodgates or Simply Giving Plaintiffs a Reasonable Opportunity To Prove Their Claims?”
* * *
56
Best of the Blogs
CONTENT REGULATION; E-COMMERCE; PRIVACY/SECURITY
Sweet v. LinkedIn Corp., No. 5:14-cv-04531-PSG (N.D. Cal. Apr. 14, 2015).
LinkedIn’s “Reference Search” Service Doesn’t Violate Fair Credit Reporting Act
Venkat Balasubramani
© 2015 Venkat Balasubramani. Venkat Balasubramani is a principal at Focal PLLC.
Plaintiffs alleged that potential employers found references about them through
LinkedIn’s Reference Searches functions, they were denied employment as a result, and
thus LinkedIn violated the Fair Credit Reporting Act.
LinkedIn users, including prospective employers, generally can search LinkedIn user
profiles using its “proprietary search technology.” The Reference Search tool specifically
provides: (1) the candidate’s employment history as provided to LinkedIn, and (2) a list of
other members in the prospective employer’s network who worked at the same employers
as the job candidate, with the theory that some of those other members worked with the
job candidate and therefore can provide insights about the job candidate that supplement
or replace any references the job candidate might supply him/herself. LinkedIn does not
provide any reference information directly, but it encouraged prospective employers to
use LinkedIn’s introduction function to contact prospective references identified via the
Reference Search tool so they could obtain references directly from the other members.
(Interestingly, it does not tell the job candidates when prospective employers run searches
on them using the Reference Search tool.)
Is the information provided a Consumer Report? The court says that LinkedIn’s provi-
sion of information culled from a person’s LinkedIn profile does not implicate the FCRA.
LinkedIn is making available information that consumers share with LinkedIn (for the purpose of being widely disseminated—i.e., on their profiles) and this falls within the “trans-
actions or experiences” exclusion to the definition of “consumer report”. The court also
says that the list of prospective references is not information “pertaining to” plaintiffs, so
this does not cause an FCRA problem.
Is LinkedIn acting as a Consumer Reporting Agency? Second, the court says that
LinkedIn is not acting as a consumer reporting agency. The definition for a CRA is an
entity which:
57
for . . . fees, regularly engages in . . . the practice of assembling or evaluating consumer credit information or other information on consumers for the purpose of furnishing consumer reports to third parties.
The hook is the means by which LinkedIn gathers the information. Rather than gather-
ing it for the purpose of furnishing credit reports, the court says that LinkedIn gathers the
information to “carry out consumers’ information-sharing objectives.”
Does the information bear on the consumers’ “character, reputation, or mode of liv-
ing?” Third, the court says that plaintiffs do not sufficiently allege that the Reference Search
bears on “character, general reputation, mode of living” or other consumer-credit-relevant
characteristics. Plaintiffs alleged that listing whether a particular subject has contacts in
a geographic location shows whether the subject is “well connected” and in the extreme
cause, inclusion of “notorious” references (such as Bernie Madoff) bears on credit-relevant
characteristics. But the problem with this is that LinkedIn never said that the subjects knew
the particular references; the results suggest only that the searcher may know someone who
had a common employer with the job candidate. (See the Forbes article making this point).
The court notes that, in order to be a consumer report, the report must contain information
about the person–information “about people other than the consumer who is allegedly the
subject of the report” may not qualify.
Are the Reference Searches used as a factor in employment? Finally, the court also
says that it’s not clear Reference Searches are “used as a factor in determining whether the
subjects . . . are eligible for employment.” While the underlying information obtained using
the service may be, there is no allegation that any of the information provided by LinkedIn
(e.g., “John Doe and Jane Doe may have overlapped at Acme Corporation; contact Jane to
find a reference about John”) figured in an employment decision. Plaintiffs’ allegations do
not sufficiently state that putative employers used the results themselves, rather information derived from the results, in refusing to hire them.
This is a super-interesting ruling. The conclusions appear defensible, and it is thorough
in its treatment of plaintiffs’ arguments. Still, I wonder if plaintiffs will consider appealing
just to hear what the 9th Circuit has to say. The court distinguished between the underlying
reference information (which LinkedIn did not provide) and pointers to the source of refer-
ences (which LinkedIn provide). Given that prospective employers could have culled this
information from LinkedIn directly, this distinction makes sense. (If LinkedIn had polled
the prospective references itself and presented the responses to the requestor, this would
have presented a different scenario under the FCRA.)
The FTC has an expansive view of what constitutes a credit report. See generally the
NY Times story on this lawsuit when it was filed. This ruling makes it look like there’s at
58
least one judge who takes a more limited view. Left unresolved by this ruling is the legality of the practice of providing “a score”, which the FTC went after Spokeo for. Query as
to how this ruling affects the ability of sharing economy companies to provide the likes
of employers and landlords the means of accessing reference-related information while
not providing such information directly (envision AirBNB telling employers or landlords:
“find hosts John Doe has stayed with and ask them about their experience with John Doe”).
The court ultimately says that LinkedIn did not market the searches as credit reports,
but raps LinkedIn for its marketing practices. Marketing departments probably see this as
par for the course, and don’t seem to get any more careful about the statements they make.
LinkedIn also offers the ability to apply for jobs through LinkedIn, which apparently
one of the plaintiffs did. Does this ruling suggest that people who take that route may have
slightly less protection if they submit their application directly through LinkedIn?
LinkedIn lost an argument in the publicity rights case (Perkins v. LinkedIn) that it was
merely carrying out the user’s wishes in publicizing user profiles and encouraging contacts
to join LinkedIn. It’s surely heartened to see a variant of that argument win here.
* * *
DERIVATIVE LIABILITY; MARKETING; SEARCH ENGINES; TRADEMARK
Goldline, LLC v. Regal Assets, LLC, Case No. 14-03680 DDP (ASx) (C.D. Cal. April 21,
2015)
Mixed Ruling in Competitive Keyword Advertising Case
Eric Goldman
http://www.blog.ericgoldman.org
© 2015 Professor Eric Goldman. Professor Goldman teaches at the University of Santa Clara Law
School and is the Director of the school’s High Tech Law Institute.
The lawsuit’s principal participants are rivals in the precious metals and coin industry.
The defendant organization, Regal, has an affiliate program, and it appears that some af-
filiates bought competitive keyword advertising using the plaintiff Goldline’s trademark.
The ruling is on Regal’s motion to dismiss, and the judge’s overly pithy opinion raises as
many questions as it answers. The court based its ruling on the following facts alleged in
the complaint:
59
According to Plaintiff, Defendants purchase advertising keywords that include the GOLDLINE Marks
so their websites will appear when search terms intended for Plaintiff are entered in the search engine.
Many of the search results are not identified as ads. The purpose of the affiliates’ websites is to divert
customers away from Plaintiff and other competitors, toward Regal. To that end, Regal prepares for its
affiliates’ use, scripts and website materials that purportedly offer objective, independent evaluations and
facts related to precious metal dealers. These materials allegedly infringe on the GOLDLINE Marks.
The materials also allegedly offer endorsements for Regal; false information and statements about the
independent and unbiased views of the reviewer; and false and disparaging information about Plaintiff,
including customer complaints, pending litigation, and poor consumer and industry ratings.
The court dismisses the Lanham Act trademark and false designation of origin claims:
While the allegations and attached exhibits indicate that Defendants use Plaintiff’s marks, there is simply
nothing stated, that if deemed true, constitute commercial use that would likely cause confusion as to the
origin or affiliation of Regal’s products or services. In fact, the allegations either state directly, or create
a strong inference, that the purpose of Defendants’ use of the marks is to disparage Plaintiff and endorse
Regal. Taken as true, such conduct would seemingly distinguish Regal’s products from Plaintiff’s, as
opposed to causing customers confusion as to the origins of the two products.
For this reason, I’m counting this case as yet another win where defendants defeated
a trademark claim over competitive keyword advertising–a streak of defense wins that I
think goes back to 2011. The court sidesteps the advertiser-affiliate interplay, so unfortunately we don’t get any insights into that issue.
Despite this good news, the court says a number of other claims survive the motion to
dismiss, including:
* false advertising and unfair competition
* RICO/civil conspiracy
* defamation
Given the court’s inscrutable opinion, however, it’s unclear which (if any) of these
claims survive solely due to the competitive keyword advertising aspect of the plaintiff’s
allegations. At minimum, the defamation claim appears fairly clearly to be based on ad
copy. Still, I imagine trademark plaintiffs suing over competitive keyword advertising will
think about whether these alternative claims (including normally junky claims like RICO
and civil conspiracy) might be worth a stab.
* * *
60
CONTENT REGULATION; E-COMMERCE; LICENSING/CONTRACTS
Galland v. Johnston, No. 1:2014:cv04411 (S.D. N.Y. Mar. 19, 2015)
Court Might Enforce A Contract Ban On Consumer Reviews
Eric Goldman
http://www.blog.ericgoldman.org
© 2015 Professor Eric Goldman. Professor Goldman teaches at the University of Santa Clara Law
School and is the Director of the school’s High Tech Law Institute.
Claude and Violaine Galland own an apartment in Paris, France. They offer it for rental
through VRBO, an online service for vacation rentals. The Gallands’ rental agreement
include the following language: “The tenants agree not to use blogs or websites for complaints, anonymously or not.” Though clumsily worded, this clause is similar to prior at-
tempts to restrict consumer reviews, such as the provisions used by doctors and dentists,
hotels, apartment owners and other vacation rental services. As far as I know, no court has
ever enforced any of these clauses purporting to suppress consumer reviews.
Two different renters, the Johnstons and Bowdens, rented the Gallands’ apartment and
subsequently posted critical reviews on VRBO. Mr. Galland allegedly offered $300–un-
successfully–to the Bowdens to remove their post. Instead, the Gallands sued the Johnstons
and Bowdens for defamation, breach of contract and other claims.
The judge dismissed the defamation claims–but refused to dismiss the breach of con-
tract claim because:
It is plausible that Defendants made the posts in violation of the contract. Moreover, it is plausible that
such negative reviews could cause injuries to the Gallands’ business. Nevertheless, these are questions
for a trier of fact to decide…
Thus, the breach of contract claim will go to a trial to decide if the reviews violated the
contract.
Surprisingly, the judge didn’t discuss the illegality of the contract clause. In 2003, a
New York court instructed a software vendor to stop banning consumer reviews in its con-
tract (the exact restriction: “The customer will not publish reviews of this product without
prior consent from Network Associates, Inc.”). The court held that using such a clause may
be a deceptive practice under New York’s consumer protection law. I can’t see any reason
why the Gallands’ clause wouldn’t violate the same law. (The Gallands’ case is being liti-
gated in a New York federal court applying New York law). Irrespective of the New York
law, the contract restriction should be void as a matter of public policy. I’m hoping the
61
court will come to its senses and realize that no trial is needed because the clause should
be condemned, not enforced.
It’s remarkable that anyone had the confidence to litigate such a clause at all. We have
seen relatively few courtroom battles over contractual bans on consumer reviews, and we
aren’t likely to see many such disputes in the future. The Gallands’ contract provision
clearly violates California’s new law against consumer review bans, and I believe a new
federal bill will be introduced to make such bans nationwide. Eventually vendors will get
the message and stop trying. Until they do, we need more tools to discourage such clauses
in the future–and to discourage wasteful litigation intended to suppress renters’ rights to
express themselves.
For more on this topic, see my article, The Regulation of Reputational Information.
* * *
LICENSING/CONTRACTS; TRADE SECRETS
CDM Media USA, Inc. v. Simms, No. 14-CV-9111 (N.D. Ill Mar. 25, 2015).
Do Employers Own LinkedIn Groups Created By Employees?
Venkat Balasubramani
© 2015 Venkat Balasubramani. Venkat Balasubramani is a principal at Focal PLLC.
Simms worked for plaintiff CDM Media but switched jobs to work for Box, allegedly
one of plaintiff’s larger customers. Plaintiff alleges that Simms violated a non-compete and
misappropriated its trade secrets.
Among other issues, plaintiff sought control of a “LinkedIn group” because both the
group’s membership and the communications’ contents were allegedly its trade secrets.
The court declines to grant the motion to dismiss:
More generally, too little is known about the contents, configuration, and function of the LinkedIn group
at this time, to conclude as a matter of law that its list of members did not constitute a trade secret.
Plaintiff alleges that the group contained the names of 679 current or potential customers, which information “would be extremely valuable to competitors of CDM” because these members “would be
good candidates for some of the services and products offered by CDM and/or good partners. . . .” The
complaint states that the “Bureau was developed over 4 years by CDM through great expenditures of
time, cost and effort. . .” Plaintiff further alleges that “privacy setting[s] . . . limited access to the Bureau
online community.”
62
Simms sought to explain that the privacy settings did not necessarily restrict group
membership to a limited group, but the court says this type of inquiry is not appropriate at
the motion to dismiss stage. However, the court concludes that the message contents are
not per se trade secrets. Perhaps certain messages could be, but a generalized allegations
that all messages were trade secrets does not cut it.
The “lawsuits over ownership of social media accounts” trend rose quickly and then
fizzled. We got a few (largely unsatisfying) rulings dealing with ownership of LinkedIn
contacts. This case does not add much to the mix. It still seems like a tough sell to char-
acterize something like the identity of members in a LinkedIn group as a trade secret.
Such memberships are often displayed publicly on LinkedIn profiles. One wonders how
much control the putative owner exercised over membership. For what it’s worth, on the
LinkedIn page, the owner of the group is designated as “Rob S.”
Illinois also has a social media privacy statute, which would seem to apply to this set
of facts. The laws’ ineffectiveness in sorting out ownership issues aside, it prohibits an
employer from requesting:
password or other related account information in order to gain access to the employee’s…account or
profile on a social networking website or to demand access in any manner to an employee’s … account
or profile on a social networking website.
LinkedIn easily falls within the statute’s definition of a “social networking website”.
Perhaps the dispute is really about alleged violation of the defendant’s non-compete
clause, with the LinkedIn account ownership thrown in as an afterthought. I really question
the value something like that could have to an employer.
* * *
63
CONTENT REGULATION; DERIVATIVE LIABILITY
Weigand v. N.L.R.B., No. 14-1024 (D.C. Cir. April 17, 2015)
Union Isn’t Liable For Members’ Posts To Private Facebook Group
Eric Goldman
http://www.blog.ericgoldman.org
© 2015 Professor Eric Goldman. Professor Goldman teaches at the University of Santa Clara Law
School and is the Director of the school’s High Tech Law Institute.
This case relates to a bus drivers’ strike in 2012. During the strike, union members post-
ed “impassioned and bellicose” comments about the strike on the union’s Facebook page,
which was accessible only to union members. The union didn’t authorize those comments.
Weigand was an employee of the bus company. He was covered by the union’s collec-
tive bargaining agreement but was not a union member. He claimed the Facebook com-
ments by union members coerced his exercise of “Section 7 rights to decide whether or not
to cross the picket line. He claimed this constituted an “unfair labor practice” and filed a
complaint with the NLRB.
The DC Circuit held that the union isn’t responsible for the Facebook posts made by
individual union members. The applicable statute governs only “a labor organization or
its agents.” The posts weren’t by the “labor organization,” and the members who posted
weren’t the union’s “agents.”
A line of cases required unions to publicly disavow rogue statements by their members,
but the court says this requirement only applies to statements made at the physical-space
picket line, not online fora. The court endorses the explanation provided by an earlier opinion in the case:
a picket line makes visible in geographic space the confrontation between the two sides. In contrast,
Respondent’s Facebook page does not serve to communicate a message to the public. To the contrary, it
is private. Moreover, it does not draw any line in the sand or on the sidewalk. Unlike a website in cyberspace, an actual picket line confronts employees reporting for work with a stark and unavoidable choice:
To cross or not to cross.
As the court further summarizes:
a picket line—unlike a private Facebook page—is a “highly visible” signal to the public and all employees of a dispute with the employer and the “coercive effect” of a threat made on a picket line is “immediate and unattenuated.”
64
The court doesn’t provide any supporting citations, but it’s dealing with a venerable
and well-explored Internet Law exceptionalism topic. Are conversations on the Internet
are different from offline conversations? Yes, for several reasons, including the potential
threat of immediate violence between conversationalists and the social opprobrium (such
as watchful eyes and hostile stares) that can attach when community members observe
and respond to another person’s decision to enter or exit a physical space (a point I stress
when I teach Noah v. AOL as my introduction to Internet exceptionalism in my Internet
Law course). Because of the different implications on both fronts, I think the court rightly
distinguished “bellicose” Facebook posts from remarks being shared at a picket line.
The court also rejects Weigand’s catch-all “but the union ran the forum…!” argument:
The Union here did not authorize or otherwise condone the posting of the contested messages on the
Facebook page. Weigand tries to overcome this point by suggesting that, in maintaining the Facebook
page, the Union somehow facilitated the publication of threats against persons who opted to cross the
picket line. The record simply does not bear this out. The Facebook page was private, for Union members only. Indeed, Weigand and other non-Union persons could not view the comments on the Facebook
page. Therefore, the most that can be said here is that the Union’s maintenance of the Facebook page
facilitated communications between Union members, not threats against non-Union employees as in the
cases cited by Weigand.
Remarkably, the court rules for the union without relying on Section 230:
in adopting the ALJ’s finding that the Union “did not violate the Act by failing to remove certain comments from its Facebook page,” the Board found it “unnecessary to rely on the [ALJ’s] application of the
Communications Decency Act, 47 U.S.C. § 230” (“CDA”). Amalgamated Transit Union, 360 N.L.R.B.
No. 44, slip op. at 1 n. 1. Weigand argues that “[t]he Board erred in refusing to consider and reverse the
ALJ’s holding that the Union is not liable under the CDA for posting threats on its Facebook page.” In
resolving this case, the Board properly applied the applicable law under the NLRA. Therefore, we agree
with Board counsel that the Board “did not need to analyze the CDA as an additional defense for the
Union, let alone consider Weigand’s unsupported assertion that the CDA somehow constitutes an affirmative cause of action necessary to the Board’s analysis.”
This is one of the rare cases that provides insights into what the law might have looked
like without Section 230’s immunity. In this case, the statute is narrowly drafted, so per-
haps its lessons aren’t generalizable. Then again, we’ve had a few nice defense wins in
cases where the court didn’t apply Section 230 but the facts were squarely in Section 230’s
scope. Examples that come to mind include the old Lunney case as well as the more recent
Armslist case.
65
This ruling follows the uncited ruling in Ricci v. Teamsters Union Local 456, 781 F.3d
25 (2d Cir. March 18, 2015), another union-related case that gave us the Second Circuit’s
first Section 230 ruling (and a favorable one at that). We have many reasons to give thanks
to unions, and I’ll add to the list their recent beneficial contributions to federal appeals
courts’ interpretations of Internet Law.
* * *
MARKETING; SEARCH ENGINES; TRADE SECRETS; TRADEMARK
Infogroup, Inc. v. Database LLC, No. 8:14-CV-49 (D. Neb. Mar. 30, 2015)
Another Competitive Keyword Advertising Lawsuit Fails
Eric Goldman
http://www.blog.ericgoldman.org
© 2015 Professor Eric Goldman. Professor Goldman teaches at the University of Santa Clara Law
School and is the Director of the school’s High Tech Law Institute.
The plaintiffs run several well-known databases, such as infoUSA and Salesgenie. The
defendants are former employees of plaintiffs who split off and launched a competitive
rival. The plaintiffs are upset that the defendants’ databases contain fake listings created
by the plaintiffs, despite the marketing claim that the defendants’ databases are “verified.”
The plaintiffs are also upset about what they perceive as various marketing overclaims that
relate to the companies’ common history.
Defendants bought plaintiffs’ trademarks as AdWords. Like most recent cases, the
trademark claims go nowhere (some cites omitted):
Infogroup argues that DatabaseUSA’s use of search engine ad placement services, triggered by
Infogroup’s marks, is somehow infringing. The Court is unpersuaded. Although the use of such targeted
advertising can be misused, it is generally understood that such tactics can be deployed consistently with
the Lanham Act. See, CollegeSource, Inc. v. AcademyOne, Inc., 2015 WL 469041, at *11 (3d Cir. Feb.
5, 2015); 1–800–Contacts, Inc. v. Lens.com, Inc., 722 F.3d 1229, 1242–45 (10th Cir.2013); Network
Automation, Inc. v. Advanced Sys. Concepts, Inc., 638 F.3d 1137, 1148–54 (9th Cir.2011); compare N.
Am. Med. Corp. v. Axiom Worldwide, Inc., 522 F.3d 1211, 1222–23 (11th Cir.2008) (advertisers created
likelihood of confusion by using competitors Web address and trademarks in their own advertisements).
The advertisements at issue here, as displayed by Infogroup’s exhibits, do not use Infogroup’s marks in
the advertisement itself, and each is either separated from the search results or plainly labeled as a sponsored advertisement. As the Tenth Circuit explained:
66
Perhaps in the abstract, one who searches for a particular business with a strong mark and sees an
entry on the results page will naturally infer that the entry is for that business. But that inference is an
unnatural one when the entry is clearly labeled as an advertisement and clearly identifies the source,
which has a name quite different from the business being searched for.
Lens.com, 722 F.3d at 1245. And that could explain why Infogroup has presented no evidence to suggest that anyone has actually been confused by the advertisements, or is likely to be. Having considered
“(1) the strength of the mark; (2) the evidence of actual confusion; (3) the type of goods and degree of
care likely to be exercised by the purchaser; and (4) the labeling and appearance of the advertisements
and the surrounding context on the screen displaying the results page,” the Court finds that Infogroup
has not shown a likelihood of success under the Lanham Act based on DatabaseUSA’s search engine
advertisements.
There are several other interesting nuggets in this opinion:
* the plaintiffs claimed the fictional listings showing up in the defendants’ databases provided evidence of trade secret misappropriation. But web scraping can’t be trade secret
misappropriation when it involves publicly accessible data because, by definition, that data
can’t be a trade secret any more. The court concludes: “to the extent that Infogroup’s motion is focused on “webscraping,” such conduct is not unlawful under Nebraska [trade
secret] law.” I just did a more complete update on scraping law.
* the defendants’ representations that they had “95% Accurate, Triple–Verified Database”
was puffery; or at minimum was not false because the inclusion of plaintiffs’ fake listings
wasn’t inconsistent with the “verified” representations.
* the court says that a departed employee “is entitled to accurately describe his experience
in the industry when marketing his company’s products and services,” so referencing a past
employer’s trademark as part of the person’s employment history wasn’t a false association. Compare my discussion about the Robert Half case.
* Although the court sides with the defense consistently, it does tell the defendants that
some of their claims may be misleading, so the court says “DatabaseUSA would be well
advised to knock it off.” I can’t recall another time I’ve seen a judge use this informal colloquialism as an admonishment. However, I bet judges silently think this many, many times
a day during courtroom proceedings.
* * *
67
PRECEDENTIAL
UNITED STATES COURT OF APPEALS
FOR THE THIRD CIRCUIT
_____________
No. 14-3050
_____________
CRYSTAL BYRD; BRIAN BYRD, Individually, and on
Behalf of all Similarly Situated Persons,
Appellants
v.
AARON’S INC; ASPEN WAY ENTERPRISES INC,
d/b/a Aaron’s Sales and Leasing, A Franchisee of
Aaron’s Inc.;
DESIGNERWARE LLC; AH & H LEASING LLC,
d/b/a Aaron’s Sales and Leasing, a Franchisee of
Aaron’s, Inc.;
AMG ENTERPRISES GROUP LLC, d/b/a Aaron’s
Sales and Leasing,
a Franchisee of Aaron’s, Inc.; ARONA CORPORATION
d/b/a Aaron’s Sales
and Leasing, a Franchisee of Aaron’s, Inc.; BEAR
RENTAL PURCHASE LTD,
d/b/a Aaron’s Sales and Leasing, a Franchisee of
Aaron’s, Inc.;
BOXER ENTERPRISE INC, d/b/a Aaron’s Sales and
Leasing,
a Franchisee of Aaron’s, Inc.; CIRCLE CITY
RENTALS, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.; CMH LEASING
PARTNERS, LLC,
d/b/a Aaron’s Sales and Leasing, a Franchisee of
Aaron’s, Inc.;
CRAM LEASING, INC., d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
DC SALES AND LEASE INC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
DIRIGO LEASING INC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
DPR ALASKA LLC, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
DPR COLORADO LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
DW3 LLC, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
DWC VENTURES LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
FAIRWAY LEASING LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
FIVE STAR FINANCIALS LLC, d/b/a Aaron’s Sales
and Leasing, a Franchisee of Aaron’s, Inc.;
FT GOT THREE LLC, d/b/a Aaron’s Sales and Leasing,
a Franchisee of Aaron’s, Inc.;
GNS & ASSOCIATES INC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
2
GREAT AMERICAN RENT TO OWN INC, d/b/a
Aaron’s Sales and Leasing, a Franchisee of Aaron’s, Inc.;
GREEN RIVER CORP, d/b/a Aaron’s Sales and Leasing,
a Franchisee of Aaron’s, Inc.;
HANSON HOLDING CO, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
HONEY HARBOR INVESTMENTS LLC, d/b/a
Aaron’s Sales and Leasing, a Franchisee of Aaron’s, Inc.;
HOWARD RENTS LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
HPH INVESTMENTS LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
J&L BEACH ENTERPRISES INC, d/b/a Aaron’s Sales
and Leasing, a Franchisee of Aaron’s, Inc.;
J.R. RENTS, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
J.M. DARDEN AND CO, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
JENFOUR LLC, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
JENKINS RENTAL LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
KFJ ENTERPRISES LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
LIFESTYLE FURNITURE LEASING, d/b/a Aaron’s
Sales and Leasing, a Franchisee of Aaron’s, Inc.;
LTL INVESTMENTS LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
MADISON CAPITAL INVESTMENTS INC, d/b/a
3
Aaron’s Sales and Leasing, a Franchisee of Aaron’s, Inc.;
MKW INVESTMENTS INC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
NO THREE PUTTS ENTERPRISES LLC, d/b/a Aaron’s
Sales and Leasing, a Franchisee of Aaron’s, Inc.;
NW FREEDOM CORP, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
POMONA LANE PARTNERS LLC, d/b/a Aaron’s Sales
and Leasing, a Franchisee of Aaron’s, Inc.;
R & DOUBLE K LLC, d/b/a Aaron’s Sales and Leasing,
a Franchisee of Aaron’s, Inc.;
REBCO INVESTMENTS LLC, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
REX NEAL INC, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
ROYAL RENTS INC, d/b/a Aaron’s Sales and Leasing,
a Franchisee of Aaron’s, Inc.;
ROYAL ROCKET RETAIL LLC, d/b/a Aaron’s Sales
and Leasing, a Franchisee of Aaron’s, Inc.;
SHINING STAR, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
SHOWCASE HOME FURNISHINGS INC, d/b/a
Aaron’s Sales and Leasing, a Franchisee of Aaron’s, Inc.;
SULTAN FINANCIAL CORP, d/b/a Aaron’s Sales and
Leasing, a Franchisee of Aaron’s, Inc.;
TANGLEWOOD MANAGEMENT LLC, d/b/a Aaron’s
Sales and Leasing, a Franchisee of Aaron’s, Inc.;
TDS FOODS INC, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
4
TUR INC, d/b/a Aaron’s Sales and Leasing, a Franchisee
of Aaron’s, Inc.;
WATERSHED DEVELOPMENT CORP, d/b/a Aaron’s
Sales and Leasing, a Franchisee of Aaron’s, Inc.;
WGC LLC, d/b/a Aaron’s Sales and Leasing, a
Franchisee of Aaron’s, Inc.;
JOHN DOES (1-45) AARON’S FRANCHISEES
_____________
On Appeal from the United States District Court
for the Western District of Pennsylvania
District Court No. 1-11-cv-00101
District Judge: The Honorable Cathy Bissoon
Argued on January 23, 2015
Before: RENDELL, SMITH, and KRAUSE,
Circuit Judges
(Filed: April 16, 2015)
Leonard A. Davis, Esq.
Andrea S. Hirsch, Esq.
Herman Gerel
230 Peachtree Street
Suite 2260
Atlanta, GA 30303
5
R. Daniel Fleck, Esq.
Mel C. Orchard, Esq.
G. Bryan Ulmer, III, Esq.
The Spence Law Firm
15 South Jackson Street
P.O. Box 548
Jackson, WY 83001
Matthew C. Gaughan, Esq.
Arnold Levin, Esq.
Frederick S. Longer, Esq.
[ARGUED]
Levin, Fishbein, Sedran & Berman
510 Walnut Street
Suite 500
Philadelphia, PA 19106
Michelle A. Parfitt, Esq.
Christopher V. Tisi, Esq.
Ashcraft & Gerel
2000 L Street, N.W.
Washington, DC 20036
John H. Robinson, Esq.
Jamieson & Robinson
215 South Grant Street
Casper, WY 82601
Counsel for Appellants
6
Kristine M. Brown, Esq.
William H. Jordan, Esq.
Thomas C. Pryor, Esq.
Jason D. Rosenberg, Esq.
Alston & Bird
1201 West Peachtree Street
One Atlantic Center
Atlanta, GA 30309
[ARGUED]
Neal R. Devlin, Esq.
Richard A. Lanzillo, Esq.
Knox, McLaughlin, Gornall & Sennett
120 West Tenth Street
Erie, PA 16501
Steven E. Bizar, Esq.
Landon Y. Jones, Esq.
Buchanan Ingersoll & Rooney
50 South 16th Street
Two Liberty Place, Suite 3200
Philadelphia, PA 19102
Mark R. Lane, Esq.
Donald J. McCormick, Esq.
Dell, Moser, Lane & Loughney
112 Washington Place
Two Chatham Center, Suite 1500
Pittsburgh, PA 15219
7
Timothy N. Lillwitz, Esq.
Todd A. Strother, Esq.
Bradshaw Fowler Proctor & Fairgrave
801 Grand Avenue
Suite 3700
Des Moines, IA 50309
Michael E. Begley, Esq.
Michele L. Braukmann, Esq.
Ross W. McLinden, Esq.
Moulton Bellingham
27 North 27th Street
Crown Plaza, Suite 1900
Billings, MT 59103
James A. McGovern, Esq.
Anthony J. Williott, Esq.
[ARGUED]
Marshall, Dennehey, Warner, Coleman
& Goggin
600 Grant Street
2900 U.S. Steel Tower
Pittsburgh, PA 15219
Brian M. Mancos, Esq.
Burns White
106 Isabella Street
Four Northshore Center
Pittsburgh, PA 15212
Counsel for Appellees
8
________________
OPINION
________________
SMITH, Circuit Judge.
Plaintiffs Crystal and Brian Byrd bring this
interlocutory appeal under Rule 23(f) of the Federal
Rules of Civil Procedure. The Byrds brought a putative
class action against Aaron’s, Inc. and its franchisee store
Aspen Way Enterprises, Inc. (collectively “Defendants”),
who they allege violated the Electronic Communications
Privacy Act of 1986 (“ECPA”), 18 U.S.C. § 2511.
Concluding that the Byrds’ proposed classes were not
ascertainable, the District Court denied their motion for
class certification. Because the District Court erred in
applying our ascertainability precedent, we will reverse
and remand.
I.
Aaron’s operates company-owned stores and also
oversees independently-owned franchise stores that sell
and lease residential and office furniture, consumer
electronics, home appliances, and accessories. On July
30, 2010, Crystal Byrd entered into a lease agreement to
rent a laptop computer from Aspen Way, an Aaron’s
franchisee. Although Ms. Byrd asserts that she made full
payments according to that agreement, on December 22,
9
2010, an agent of Aspen Way came to the Byrds’ home
to repossess the laptop on the grounds that the lease
payments had not been made. The agent allegedly
presented a screenshot of a poker website Mr. Byrd had
visited as well as a picture taken of him by the laptop’s
camera as he played. The Byrds were troubled and
surprised by what they considered a significant and
unauthorized invasion of their privacy.
Aspen Way obtained the picture and screenshot
through spyware—a type of computer software—
designed by DesignerWare, LLC and named “PC Rental
Agent.” This spyware had an optional function called
“Detective Mode,” which could collect screenshots,
keystrokes, and webcam images from the computer and
its users.
Between November 16, 2010 and
December 20, 2010, the Byrds alleged that this spyware
secretly accessed their laptop 347 times on eleven
different days.1
In total, “the computers of 895
1
The spyware allegedly captured a wide array of
personal information: “credit and debit card numbers,
expiration dates, security codes, pin numbers, passwords,
social security numbers, birth dates, identity of children
and the children’s personal school records, tax returns,
personal health information, employment records, bank
account records, email addresses, login credentials,
answers
to
security
questions
and
private
communications with health care providers, therapists,
10
customers across the country . . . [had] surveillance
conducted through the Detective Mode function of PC
Rental Agent.” Byrd v. Aaron’s, Inc., No. CIV.A. 11101E, 2014 WL 1316055, at *2 (W.D. Pa. Mar. 31,
2014).
The Byrds’ operative class-action complaint
asserts claims against Aaron’s, Aspen Way, more than 50
other
independent
Aaron’s
franchisees,
and
2
DesignerWare, LLC. The complaint alleges violations
attorneys, and other confidants.” The record also reveals
what appear to be screenshots of adult-oriented and
active webcam transmissions and conversations of an
intimate nature.
The spyware, as described in the Byrds’ complaint,
was Orwellian-like in that it guaranteed that “[t]here was
of course no way of knowing whether you were being
watched at any given moment,” George Orwell, 1984, at
3 (Signet Classics 1950), because Aspen Way’s corporate
intranet (and Aaron’s corporate server by proxy)
apparently activated the PC Rental Agent’s Detective
Mode “whenever they wanted to.” Id.
2
On March 20, 2012, the District Court issued an
order noting that DesignerWare filed for bankruptcy in
the U.S. Bankruptcy Court for the Western District of
Pennsylvania. Accordingly, the District Court ordered
that no action be taken against DesignerWare and that the
case be administratively closed as to that defendant.
11
of and conspiracy to violate the ECPA, common law
invasion of privacy, and aiding and abetting. On
Defendants’ motion to dismiss, the District Court
dismissed the claims against all Aaron’s franchisees other
than Aspen Way for lack of standing and also all claims
for common law invasion of privacy, conspiracy, and
aiding and abetting. Thus, the Byrds’ remaining claims,
and those of the class, are against Aaron’s and Aspen
Way for direct liability under the ECPA.
In the meantime, the Byrds moved to certify the
class under Federal Rules of Civil Procedure 23(b)(2)
and 23(b)(3), in which the Byrds provided two proposed
classes and one alternative proposed class.3 In briefing
3
In the motion for class certification, the Byrds
proposed the following classes:
Class I (against Aaron’s Inc. for direct liability
under ECPA) –
All persons residing in the United
States, who have purchased, leased, rented
or rented to own, Aaron’s computers and
individuals who used said computers whose
personal
information,
electronic
communications and/or images were
intercepted, used, disclosed, accessed,
monitored and/or transmitted via PC Rental
Agent or other devices or software without
the customers [sic] authorization.
12
Class II (against Aaron’s Inc., Aspen Way, and all
other Franchisee Defendants for direct liability under
ECPA, invasion of privacy, conspiracy, and aiding and
abetting) –
All customers of the Aaron’s
Defendants who reside in the United States,
who have purchased, leased, rented or rented
to own, Aaron’s computers and individuals
who used said computers whose personal
information, electronic communications
and/or images were intercepted, used,
disclosed, accessed, monitored and/or
transmitted by the Aaron’s Defendants via
PC Rental Agent or other devices or
software without the customers [sic]
authorization.
Byrd, 2014 WL 1316055, at *4. The Byrds also set forth
an alternative class definition for Class II as:
Class II (against Aaron’s Inc., and Aspen Way for
direct liability under the ECPA, invasion of privacy,
conspiracy, and aiding and abetting (under Wyoming
law)) –
All persons residing in the United
States, who have purchased, leased, rented
or rented to own, Aaron’s computers from
Aspen Way Enterprises, Inc., d/b/a Aarons
Sales and Leasing, and individual[s] who
13
the motion, the Byrds proposed the following alternative
class definitions:
Class I – All persons who leased and/or
purchased one or more computers from
Aaron’s, Inc., and their household members,
on whose computers DesignerWare’s
Detective Mode was installed and activated
without such person’s consent on or after
January 1, 2007.
Class II – All persons who leased and/or
used said computers whose personal
information, electronic communications
and/or images were intercepted, used,
disclosed, accessed, monitored and/or
transmitted by Aspen Way and/or Aaron’s
via PC Rental Agent or other devices or
software without the customers [sic]
authorization.
Id. It is worth noting that the Byrds’ revised
proposed class definitions did not expressly require
an electronic communication to be “intercepted,”
although that is a necessary element in
successfully proving their ECPA claims. See 18
U.S.C. §§ 2511, 2520(a).
14
purchased one or more computers from
Aaron’s, Inc. or an Aaron’s, Inc. franchisee,
and their household members, on whose
computers DesignerWare’s Detective Mode
was installed and activated without such
person’s consent on or after January 1, 2007.
Byrd, 2014 WL 1316055, at *5.
The Magistrate Judge recommended denying the
Byrds’ motion for certification because the proposed
classes were not ascertainable. Regarding owner and
lessee class members, the Magistrate Judge concluded
that the proposed classes were underinclusive because
they did “not encompass all those individuals whose
information [was] surreptitiously gathered by Aaron’s
franchisees.” Id. The Magistrate Judge also determined
that the classes were “overly broad” because not “every
computer upon which Detective Mode was activated will
state a claim under the ECPA for the interception of an
electronic communication.” Id. Regarding “household
members,” the Magistrate Judge took issue with the fact
that the Byrds did not define the phrase. Id. Further,
although the Byrds stated that the identity of household
members could be gleaned from “public records,” the
Magistrate Judge, citing to Carrera v. Bayer Corp., 727
F.3d 300, 306, 308 (3d Cir. 2013), reasoned that “[i]t
[was] not enough to propose a method by which this
information may be obtained.” Byrd, 2014 WL 1316055,
at *5. The District Court adopted the Report and
15
Recommendation as the opinion of the court over the
Byrds’ objections. The Byrds timely appealed.
II.
The District Court had federal question jurisdiction
under 28 U.S.C. § 1331. We have jurisdiction under 28
U.S.C. § 1292(e) and Federal Rule of Civil
Procedure 23(f). “We review a class certification order
for abuse of discretion, which occurs if the district
court’s decision rests upon a clearly erroneous finding of
fact, an errant conclusion of law or an improper
application of law to fact.” Grandalski v. Quest
Diagnostics Inc., 767 F.3d 175, 179 (3d Cir. 2014)
(quoting Hayes v. Wal-Mart Stores, Inc., 725 F.3d 349,
354 (3d Cir. 2013)) (internal quotation marks omitted).
We review de novo a legal standard applied by a district
court. Carrera, 727 F.3d at 305.
III.
The central question in this appeal is whether the
District Court erred in determining that the Byrds’
proposed classes were not ascertainable. Because the
District Court confused ascertainability with other
relevant inquiries under Rule 23, we conclude it abused
its discretion and will vacate and remand.
Before discussing these errors, however, we
believe it is necessary to address the scope and source of
16
the ascertainability requirement that our cases have
articulated. Our ascertainability decisions have been
consistent and reflect a relatively simple requirement.
Yet there has been apparent confusion in the invocation
and application of ascertainability in this Circuit.
(Whether that is because, for example, the courts of
appeals have discussed ascertainability in varying and
distinct ways,4 or the ascertainability requirement is
4
For example, some of our sister courts of appeals
have interspersed their analysis of ascertainability, or
“identifiability,” with explicit Rule 23 requirements. See,
e.g., Colo. Cross Disability Coal. v. Abercrombie &
Fitch Co., 765 F.3d 1205, 1215 (10th Cir. 2014)
(discussing
ascertainability
and
numerosity
simultaneously); Romberio v. Unumprovident Corp., 385
F. App’x 423, 431 (6th Cir. 2009) (unpublished)
(discussing ascertainability but reversing class
certification based on lack of typicality); In re Initial
Pub. Offerings Sec. Litig., 471 F.3d 24, 44-45 (2d Cir.
2006) (discussing ascertainability and predominance
simultaneously, although noting they are separate
inquiries), decision clarified on denial of reh’g sub nom.
In re Initial Pub. Offering Sec. Litig., 483 F.3d 70 (2d
Cir. 2007); Oshana v. Coca-Cola Co., 472 F.3d 506, 514
(7th Cir. 2006) (discussing identifiability—the Seventh
Circuit’s approximation of the “ascertainability”
standard—in
conjunction
with
the
typicality
requirement).
17
Conversely, others have framed ascertainability as
requiring that there be an “objective standard” to
determine whether class members are included in or
excluded from the class without reference to any
particular portion of Rule 23. See, e.g., EQT Prod. Co. v.
Adair, 764 F.3d 347, 358–60 (4th Cir. 2014) (explaining
the Fourth Circuit’s implicit “readily identifiable”
requirement for a proposed class is the same as our
Circuit’s
“ascertainability” requirement, without
discussing the source of the standard); In re Deepwater
Horizon, 739 F.3d 790, 821 (5th Cir. 2014) (requiring a
class to be “adequately defined and clearly ascertainable”
(citation and internal quotation marks omitted)), cert.
denied sub nom. BP Exploration & Prod. Inc. v. Lake
Eugenie Land & Dev., Inc., 135 S. Ct. 754 (2014);
Matamoros v. Starbucks Corp., 699 F.3d 129, 139 (1st
Cir. 2012) (discussing only that the “presence of such an
objective criterion overcomes the claim that the class is
unascertainable”); Little v. T-Mobile USA, Inc., 691 F.3d
1302, 1308 (11th Cir. 2012) (mentioning ascertainability
but ruling under Rule 23(b)(3)’s predominance standard);
Oshana, 472 F.3d at 513–14 (applying an
“identifiab[ility]” standard without discussing the source
of the rule); Shook v. El Paso Cnty., 386 F.3d 963, 972
(10th Cir. 2004) (noting an “identifiability” requirement
for 23(b)(3) classes but declining to apply the standard to
a Rule 23(b)(2) class).
18
implicit rather than explicit in Rule 23,5 we need not
Even the citations we relied upon in Marcus v.
BMW of North America, LLC, to discuss the policy
rationales behind ascertainability, 687 F.3d 583, 593 (3d
Cir. 2012), failed to address squarely the undergirding for
this implicit requirement. See, e.g., Xavier v. Philip
Morris USA, Inc., 787 F. Supp. 2d 1075, 1089 (N.D. Cal.
2011) (relying in part on our decision in Newton v.
Merrill Lynch, Pierce, Fenner & Smith, Inc., 259 F.3d
154, 191–93 (3d Cir. 2001), which in fact analyzed a
proposed class under Rule 23(b)(3) and the superiority
requirement); Sanneman v. Chrysler Corp., 191 F.R.D.
441, 446 & n.9 (E.D. Pa. 2000) (blending the issue of
ascertainability with class definition and crossreferencing a later discussion on predominance and
superiority); Federal Judicial Center, Manual for
Complex Litigation § 21.222 (4th ed. 2004) (citing to
Rule 23(c)(2)’s requirement that class members in a Rule
23(b)(3) action receive the “best notice practicable”).
Ascertainability is an “essential prerequisite,” or
an implied requirement, of Rule 23, “at least with respect
to actions under Rule 23(b)(3).” Marcus, 687 F.3d
at 592–93. Marcus identified “important objectives,” id.
at 593, or policy rationales, supporting the
ascertainability requirement. These included removing
administrative burdens that were “incongruous with the
efficiencies expected in a class action,” providing the
best notice practicable under Rule 23(c)(2) in a
5
19
say.) Not surprisingly, defendants in class actions have
seized upon this lack of precision by invoking the
ascertainability requirement with increasing frequency in
order to defeat class certification.6
We seek here to dispel any confusion. The source
Rule 23(b)(3) action, and protecting defendants by
ensuring that those persons ultimately bound by the final
judgment could be clearly identified. Id. at 593. Our
opinion in Carrera expanded on some of the concerns
addressed in Marcus, specifically relating to a
defendant’s “due process right to challenge the proof
used to demonstrate class membership.” 727 F.3d at 307.
6
See, e.g., Class Action Reporter, Courts
Scrutinize Class Certification “Ascertainability,” Vol.
17, Feb. 6, 2015, (explaining that “courts across the
country are increasingly scrutinizing ‘ascertainability’ at
the class certification stage”); Melody E. Akhavan,
Ascertainability Challenge Is Viable Weapon for
Defense,
Law360,
Nov.
26,
2014,
http://www.law360.com/articles/599335/ascertainabilitychallenge-is-viable-weapon-for-defense (“Courts’ focus
on ascertainability has become an increasingly useful tool
for defendants fighting class certification.”); Alida Kass,
Third Circuit Case Could Limit Consumer Class Actions,
N.J. Law Journal, June 25, 2014 (“[T]he Third Circuit
will be a fertile ground for exploring the boundaries of
ascertainability.”).
20
of, or basis for, the ascertainability requirement as to a
Rule 23(b)(3) class is grounded in the nature of the classaction device itself. In endeavoring to further explain
this concept, we adhere to the precise boundaries of
ascertainability previously iterated in the quartet of cases
we discuss below. The ascertainability requirement as to
a Rule 23(b)(3) class is consistent with the general
understanding that the class-action device deviates from
the normal course of litigation in large part to achieve
judicial economy. See Comcast, 133 S. Ct. at 1432
(discussing generally the nature of the class-action
device).
Ascertainability functions as a necessary
prerequisite (or implicit requirement) because it allows a
trial court effectively to evaluate the explicit
requirements of Rule 23. In other words, the independent
ascertainability inquiry ensures that a proposed class will
actually function as a class. This understanding of the
source of the ascertainability requirement takes a
forward-looking view of the administration of the Rule
23(b)(3) class-action device in practice.
A.
The class-action device is an exception to the rule
that litigation is usually “‘conducted by and on behalf of
the individual named parties only.’” Comcast Corp. v.
Behrend, 133 S. Ct. 1426, 1432 (2013) (quoting Califano
v. Yamasaki, 442 U.S. 682, 700–01 (1979)).
Accordingly, the party proposing class-action
certification bears the burden of affirmatively
21
demonstrating by a preponderance of the evidence her
compliance with the requirements of Rule 23. Id. And a
court evaluating a motion for class certification is
obligated to probe behind the pleadings when necessary
and conduct a “rigorous analysis” in order to determine
whether the Rule 23 certification requirements are
satisfied. Id.; In re Hydrogen Peroxide Antitrust Litig.,
552 F.3d 305, 309 (3d Cir. 2008), as amended (Jan. 16,
2009). A plaintiff seeking certification of a Rule
23(b)(3) class must prove by a preponderance of the
evidence that the class is ascertainable.7 Hayes, 725 F.3d
at 354.
The rigorous analysis requirement applies
equally to the ascertainability inquiry. Carrera, 727 F.3d
at 306.
The ascertainability inquiry is two-fold, requiring a
plaintiff to show that: (1) the class is “defined with
reference to objective criteria”; and (2) there is “a reliable
7
In Shelton v. Bledsoe, we held that
ascertainability is not a requisite of a Rule 23(b)(2) class.
775 F.3d 554, 559–63 (3d Cir. 2015). The Byrds sought
certification of their proposed classes under both Rule
23(b)(2) and Rule 23(b)(3). Lacking the benefit of our
Shelton decision, the District Court denied certification
without distinguishing between Rule 23(b)(2) and
Rule 23(b)(3).
Accordingly, the District Court on
remand should also consider whether the classes may be
separately certified under Rule 23(b)(2).
22
and administratively feasible mechanism for determining
whether putative class members fall within the class
definition.” Id. at 355 (citing Marcus v. BMW of N. Am.,
LLC, 687 F.3d 583, 593–94 (3d Cir. 2012)). The
ascertainability requirement consists of nothing more
than these two inquiries. And it does not mean that a
plaintiff must be able to identify all class members at
class certification—instead, a plaintiff need only show
that “class members can be identified.” Carrera, 727
F.3d at 308 n.2 (emphasis added). This preliminary
analysis dovetails with, but is separate from,
Rule 23(c)(1)(B)’s requirement that the class-certification
order include “(1) a readily discernible, clear, and precise
statement of the parameters defining the class or classes
to be certified, and (2) a readily discernible, clear, and
complete list of the claims, issues or defenses to be
treated on a class basis.” Wachtel ex rel. Jesse v.
Guardian Life Ins. Co. of Am., 453 F.3d 179, 187–88 (3d
Cir. 2006).
We have on four occasions addressed the
requirement that a Rule 23(b)(3) class be “ascertainable”
in order to be certified. Our quartet of cases began with
Marcus v. BMW of North America, LLC, in which we
adopted this implicit ascertainability requirement. 687
F.3d at 592–94. We explained, “If class members are
impossible to identify without extensive and
individualized fact-finding or ‘mini-trials,’ then a class
action is inappropriate.” Id. at 593. We concluded that
23
the proposed class “raise[d] serious ascertainability
issues,” largely because the plaintiffs could not identify
cars with the allegedly defective run-flat tires. Id. at 593.
The defendants did not maintain records that would
demonstrate whether a putative class member’s run-flat
tires “‘ha[d] gone flat and been replaced,’ as the class
definition require[d],” and the plaintiffs had not proposed
“a reliable, administratively feasible alternative” to
identify class members. Id. at 594.
Shortly thereafter, in Hayes v. Wal-Mart Stores,
Inc., we straightforwardly applied the ascertainability
rule established by Marcus and remanded the case to the
district court to apply Marcus’s standard and to allow the
plaintiffs to “offer some reliable and administratively
feasible alternative that would permit the court to
determine” whether the class was ascertainable. 725
F.3d at 355. That same month, we decided Carrera v.
Bayer Corp., an appeal involving the proposed
certification of a “class of consumers who purchased
Bayer’s One-A-Day WeightSmart diet supplement in
Florida.” 727 F.3d at 303. To prove ascertainability, the
plaintiff proposed using retailer records and class
member affidavits attesting to purchases of the diet
supplement. Id. at 308. Although we opined that retail
records “may be a perfectly acceptable method of
proving class membership,” we noted that the plaintiff’s
proposed retail records did not identify a single purchaser
of the Bayer diet supplement. Id. at 308–09. We
24
therefore rejected the proposed methods of proving
ascertainability.
As to the use of affidavits, we began by explaining
that in Marcus, “[w]e cautioned ‘against approving a
method that would amount to no more than ascertaining
by potential class members’ say so.’” Id. at 306 (quoting
Marcus, 687 F.3d at 594). We rejected the plaintiff’s
proposed methodology to screen out false affidavits
because the plaintiff’s expert declaration did not establish
that the “affidavits will be reliable” or “propose a model
for screening claims.” Id. at 311. Remarkably, even the
named plaintiff could not recall whether he had
purchased the diet supplement. Id. at 311 n.9.
We were careful to specify in Carrera that
“[a]lthough
some
evidence
used
to
satisfy
ascertainability, such as corporate records, will actually
identify class members at the certification stage,
ascertainability only requires the plaintiff to show that
class members can be identified.” Id. at 308 n.2
(emphasis added). Accordingly, there is no records
requirement. Carrera stands for the proposition that a
party cannot merely provide assurances to the district
court that it will later meet Rule 23’s requirements. Id.
at 306. Nor may a party “merely propose a method of
ascertaining a class without any evidentiary support that
the method will be successful.” Id. at 306, 307, 311.
25
Following the Marcus-Hayes-Carrera trilogy, we
again considered the issue of ascertainability in
Grandalski v. Quest Diagnostics Inc., 767 F.3d at 184–
85. There we affirmed the denial of certification of a
Rule 23(b)(3) class on predominance grounds, but noted
that the district court also erred in denying certification
based on ascertainability. Id. at 184–85. We concluded
that the district court’s analysis “conflated
ascertainability with the predominance inquiry.” Id.
at 184. The predominance and ascertainability inquiries
are distinct, we explained, because “‘the ascertainability
requirement focuses on whether individuals fitting the
class definition may be identified without resort to minitrials, whereas the predominance requirement focuses on
whether essential elements of the class’s claims can be
proven at trial with common, as opposed to
individualized, evidence.’” Id. (quoting Hayes, 725 F.3d
at 359).
Ascertainability is closely tied to the other relevant
preliminary inquiry we addressed in Marcus, 687 F.3d at
592, that plaintiffs provide a proper class definition, Fed.
R. Civ. P. 23(c)(1)(B). A trial court also needs a class to
be “defined with reference to objective criteria” and
some assurance that there can be “a reliable and
administratively feasible mechanism for determining
whether putative class members fall within the class
definition,” Hayes, 725 F.3d at 355, in order to rigorously
analyze the explicit Rule 23(a) and (b) certification
26
requirements, Comcast, 133 S. Ct. at 1432. When
combined with the separate class-definition requirement
from Wachtel, that a class-certification order contain “a
readily discernible, clear, and precise statement of the
parameters defining the class or classes to be certified,”
453 F.3d at 187–88, district courts have the necessary
tools to determine whether “a party seeking to maintain a
class action” can “‘affirmatively demonstrate his
compliance’ with Rule 23.” See Comcast, 133 S. Ct.
at 1432 (quoting Wal-Mart Stores, Inc. v. Dukes, 131 S.
Ct. 2541, 2551, 180 L. Ed. 2d 374 (2011)).
And after certification, a trial court is tasked with
providing “the best notice that is practicable” to the class
members under Rule 23(c)(2)(B), “‘including individual
notice to all class members who can be identified through
reasonable effort.’” Larson v. AT & T Mobility LLC, 687
F.3d 109, 123 (3d Cir. 2012) (quoting Fed. R. Civ. P.
23(c)(2)(B)). We are “stringent in enforcing th[at]
individual notice requirement.” Id. at 126. The separate
ascertainability requirement ensures that class members
can be identified after certification, Carrera, 727 F.3d at
308 n.2, and therefore better prepares a district court to
“direct to class members the best notice that is
practicable under the circumstances,” Fed. R. Civ. P.
27
23(c)(2)(B); see also Larson, 687 F.3d at 117 n.10, 123–
31 (applying the Rule 23(c)(2)(B) requirement).8
The ascertainability inquiry is narrow.
If
defendants intend to challenge ascertainability, they must
be exacting in their analysis and not infuse the
ascertainability inquiry with other class-certification
requirements. As we said in Carrera, “ascertainability
only requires the plaintiff to show that class members can
be identified.” 727 F.3d at 308 n.2. This inquiry will not
8
An additional post-certification concern relates to
the argument by some that the class-action device fails in
its purpose if a judgment or settlement cannot be
executed without resulting in a largely cy pres fund.
E.g., Marek v. Lane, 134 S. Ct. 8, 9 (2013) (Roberts, C.J.,
statement respecting denial of certiorari) (noting
“fundamental concerns surrounding the use of [cy pres]
remedies in class action litigation”); In re Baby Prods.
Antitrust Litig., 708 F.3d 163, 172–74 (3d Cir. 2013)
(upholding limited use of cy pres distributions but
cautioning against largely cy pres funds). Although we
need not address the propriety of cy pres funds in this
case, we do note that the risk of a cy pres fund is reduced,
even if not entirely removed, when a court has
affirmatively concluded that there is “a reliable and
administratively feasible mechanism for determining
whether putative class members fall within the class
definition.” See Hayes, 725 F.3d at 355.
28
be relevant in every case and is independent from the
other requirements of Rule 23.
B.
With this explanation of ascertainability in mind,
we will reverse the District Court for four reasons. First,
the District Court abused its discretion by misstating the
rule governing ascertainability. Second, the District
Court engrafted an “underinclusive” requirement that is
foreign to our ascertainability standard. Third, the
District Court made an errant conclusion of law in
finding that an “overly broad” class was not
ascertainable. And fourth, the District Court improperly
applied the legal principles from Carrera to the issue of
whether “household members” could be ascertainable.
1.
The District Court misstated the law governing
ascertainability by conflating our standards governing
class definition with the ascertainability requirement.
The District Court prefaced its discussion with the
section header “Ascertainability and Defining the Class.”
The District Court then stated the following as the
applicable legal standard:
“As an ‘essential prerequisite’ to the Rule 23
analysis, the Court must consider 1) whether
there is a precisely defined class and
29
2) whether the named Plaintiffs are members
of the class. Marcus v. BMW of North
America, 687 F.3d 583, 596 (3d Cir. 2012) .
. . . At the first step of the analysis,
determining whether there is a precisely
defined class entails two separate and
important elements: ‘first, the class must be
defined with reference to objective criteria’
and ‘second, there must be a reliable and
administratively feasible mechanism for
determining whether putative class members
fall within the class definition.’ Hayes v.
Wal-Mart Stores, Inc., 725 F.3d 349, 355
(3d Cir. 2013).”
Byrd, 2014 WL 1316055, at *3.
Although the District Court is correct that the class
definition requirements are applicable to a classcertification order, Wachtel, 453 F.3d at 187–88, and that
class definition is a valid preliminary consideration,
Marcus, 687 F.3d at 591–92, it was not the reason the
District Court denied class certification. What the
District Court described as the two requirements for a
“precisely defined class” was in fact the inquiry relevant
to the ascertainability standard. See Hayes, 725 F.3d
at 355. In blending the issue of ascertainability with that
of class definition (which Marcus took pains to address
as separate preliminary inquiries that preceded the Rule
23 analysis, 687 F.3d at 591–94), the District Court erred.
30
Also troubling is the District Court’s discussion of
class membership. Byrd, 2014 WL 1316055, at *3, *6
n.8. The question of “whether the named Plaintiffs are
members of the class” has nothing to do with either the
requirements of a class definition, Wachtel, 453 F.3d at
187–88, or the ascertainability standard, Marcus, 687
F.3d at 592–94. In fact, the District Court’s citation to
Marcus on this point related to its discussion of
numerosity—not class definition or ascertainability. See
Byrd, 2014 WL 1316055, at *3 (citing Marcus, 687 F.3d
at 596 (discussing numerosity)). And although the
District Court generally cited to Hayes, in that case we
addressed “membership” not as relating to
ascertainability and only with regard to whether the
named plaintiff had Article III standing to sue as a class
representative. See Hayes, 725 F.3d at 360–61. In sum,
we conclude that the District Court should have applied
nothing more or less than the ascertainability test that has
been consistently laid out by this Court.
2.
The District Court also abused its discretion in
determining that the proposed classes were not
ascertainable because they were underinclusive. The
District Court reasoned that although the records
provided by Aaron’s “may reveal the computers upon
which Detective Mode was activated and the
owner/lessee of that computer,” the Byrds did “not
provide an administratively feasible way to determine
31
whose information was surreptitiously gathered.” Byrd,
2014 WL 1316055, at *5. For this reason, the District
Court explained, the proposed “class definition [did] not
encompass all those individuals whose information ha[d]
been surreptitiously gathered by Aaron’s franchisees.”
Id. But the District Court was looking to an old, nolonger-operative class definition, see supra, n.3, because
the Byrds had redefined the proposed classes by
eliminating the requirement that a class member’s
information was “intercepted” or “surreptitiously
gathered.”9 Thus, the District Court’s analysis was not
germane to the Byrds’ proposed class definitions or the
relevant bases for class membership.
9
The ECPA permits any person to bring a civil
action “whose wire, oral, or electronic communication is
intercepted, disclosed, or intentionally used in violation
of this chapter.” 18 U.S.C. § 2520(a); see also id. §
2511. The Byrds’ operative complaint alleges that the
PC Rental Agent “allows its installer (here, the rent-toown store) to remotely and surreptitiously build and
activate the ‘Detective Mode’ function on the laptop over
the Internet and through the Aaron’s Inc. and
DesignerWare websites.” Byrd, 2014 WL 1316055, at
*2. The relevant statutory terms were discussed because
the District Court observed that “not all information
gathered surreptitiously will constitute an ‘interception’
of the ‘contents’ of an ‘electronic communication’” by
the PC Rental Agent. Id.
32
Defendants contend that “underinclusiveness” was
an appropriate consideration in support of the denial of
class certification. They rely on a district court decision,
Bright v. Asset Acceptance, LLC, 292 F.R.D. 190, 197
(D.N.J. 2013), to support their argument. But “whether
the defined class specifies a particular group that was
harmed during a particular time frame, in a particular
location, in a particular way,” Bright, 292 F.R.D. at 197
(emphasis added), is not included in our ascertainability
test.
Further, requiring such specificity may be
unworkable in some cases and approaches requiring a
fail-safe class.
See Messner v. Northshore Univ.
HealthSystem, 669 F.3d 802, 825 (7th Cir. 2012)
(explaining that a fail-safe class is “one that is defined so
that whether a person qualifies as a member depends on
whether the person has a valid claim”). Defining the
class “in terms of the legal injury,” In re Nexium
Antitrust Litig., 777 F.3d at 22, is not the same as
requiring the class to be defined “with reference to
objective criteria.” See Hayes, 725 F.3d at 355.
We decline to engraft an “underinclusivity”
standard onto the ascertainability requirement.
Individuals who are injured by a defendant but are
excluded from a class are simply not bound by the
outcome of that particular action. Cf., e.g., Taylor v.
Sturgell, 553 U.S. 880, 884, 894 (2008) (“Representative
suits with preclusive effect on nonparties include
properly conducted class actions.”); United States v.
33
Mendoza, 464 U.S. 154, 158 n.3 (1984) (“Under res
judicata, a final judgment on the merits bars further
claims by parties or their privies on the same cause of
action.”). In the context of ascertainability, we have only
mentioned “underinclusivity” with regard to whether the
records used to establish ascertainability were sufficient,
see Hayes, 725 F.3d at 355 (citing Marcus, 687 F.3d at
594), not whether there are injured parties that could also
be included in the class. Requiring a putative class to
include all individuals who may have been harmed by a
particular defendant could also severely undermine the
named class representative’s ability to present typical
claims (Fed. R. Civ. P. 23(a)(3)) and adequately
represent the interests of the class (Fed. R. Civ.
P. 23(a)(4)). The ascertainability standard is neither
designed nor intended to force all potential plaintiffs who
may have been harmed in different ways by a particular
defendant to be included in the class in order for the class
to be certified.
3.
Similarly, the District Court also abused its
discretion in determining that the proposed classes were
not ascertainable because they were “overly broad.” The
District Court concluded that “more problematic for
Plaintiffs is the fact that the alternative definitions are
overly broad” because “[n]ot every computer upon which
Detective Mode was activated will state a claim under the
ECPA for the interception of electronic communication.”
34
Byrd, 2014 WL 1316055, at *5. There was, again, no
reference to our ascertainability precedent or that of any
other court.
Defendants also rely on Bright for the proposition
that a class is not “ascertainable if it is decoupled from
the underlying allegations of harm rendering it . . .
overbroad.” See Bright, 292 F.R.D. at 197. They also
cite myriad cases from other district courts and courts of
appeals to justify the consideration of overbreadth in our
ascertainability standard.
Such applications of the
ascertainability standard fuel the precise mistake we
attempted to correct in Grandalski v. Quest Diagnostics
Inc.—that is, injecting the explicit requirements of Rule
23 into the ascertainability standard without actually
analyzing those requirements under the correct portion of
Rule 23. See 767 F.3d at 184 n.5 (“Predominance and
ascertainability are separate issues.”). And at oral
argument, Defendants conceded that the District Court’s
analysis regarding overbreadth was really identifying a
potential predominance problem.
Defendants’ reliance on authority outside this
Circuit does nothing to bolster their argument. For
example, they extensively discuss Oshana v. Coca-Cola
Co., 472 F.3d 506 (7th Cir. 2006), to support the
proposition that an overbroad class is not ascertainable.
In Oshana, the Seventh Circuit considered whether a
class consisting of “all Illinois purchasers of fountain
Diet Coke from March 12, 1999 forward” was certifiable
35
under Rule 23. Id. at 509. The Court required that in
addition to satisfying the Rule 23(a) and (b)
requirements, a “plaintiff must also show . . . that the
class is indeed identifiable as a class.” Id. at 513.
Reasoning that the proposed class could “include
millions who were not deceived and thus have no
grievance under the [Illinois Consumer Fraud and
Deceptive Practices Act],” the Seventh Circuit affirmed
the district court’s determination that the proposed class
was “not sufficiently definite to warrant class
certification.” Id. at 513–14.
The “definiteness” standard from Oshana is
distinguishable from our Circuit’s ascertainability
requirement. The standard applied in the Seventh Circuit
is based on the premise that because “[i]t is axiomatic
that for a class action to be certified a ‘class’ must exist,”
Simer v. Rios, 661 F.2d 655, 669 (7th Cir. 1981), a class
definition must be definite enough for the class to be
ascertained, Alliance to End Repression v. Rochford, 565
F.2d 975, 977 (7th Cir. 1977). In short, the class must be
“indeed identifiable as a class.” Oshana, 472 F.3d at
513. A class may be indefinite where “the relevant
criteria for class membership [is] unknown.” Jamie S. v.
Milwaukee Pub. Sch., 668 F.3d 481, 495 (7th Cir. 2012).
Although this doctrine is similar to the parameters laid
out in our ascertainability cases, it blends together our
Circuit’s
ascertainability
and
class
definition
requirements. Compare Oshana, 472 F.3d at 513, with
36
Hayes, 725 F.3d at 355, and Wachtel, 453 F.3d at 187–
88. As we made patent in Marcus, we address class
definition and ascertainability as separate inquiries. 687
F.3d at 591–94.
Defendants also argue that a proposed class is
overbroad “where putative class members lack standing
or have not been injured.” Defendants’ argument
conflates the issues of ascertainability, overbreadth (or
predominance), and Article III standing. We have
explained that the issue of standing is separate from the
requirements of Rule 23. See, e.g., Holmes v. Pension
Plan of Bethlehem Steel Corp., 213 F.3d 124, 135 (3d
Cir. 2000) (“In addition to the requirements expressly
enumerated in Rule 23, class actions are also subject to
more generally applicable rules such as those governing
standing and mootness.”). To the extent Defendants
meant to challenge any potential differences between the
proposed class representatives and unnamed class
members, such differences should be considered within
the rubric of the relevant Rule 23 requirements—such as
adequacy, typicality, commonality, or predominance.
See Grandalski, 767 F.3d at 184–85; see also Holmes,
213 F.3d at 137–38 (discussing an “overbroad” class as
requiring individual determinations that fail to satisfy
Rule 23(b)(3)’s predominance requirement). Conversely,
if Defendants intended to argue that all putative class
members must have standing, such challenges should be
squarely raised and decided by the District Court.
37
Because the District Court has yet to conduct a rigorous
analysis of the Rule 23 requirements, we decline to
address these issues in the first instance.
The Byrds’ proposed classes consisting of
“owners” and “lessees” are ascertainable. There are
“objective records” that can “readily identify” these class
members, cf. Grandalski, 767 F.3d at 184 n.5, because,
as explained by the District Court, “Aaron’s own records
reveal the computers upon which Detective Mode was
activated, as well as the full identity of the customer who
leased or purchased each of those computers.” Byrd,
2014 WL 1316055, at *5.
The District Court’s
conclusion to the contrary was an abuse of discretion.
4.
The District Court again abused its discretion in
determining that “household members” were not
ascertainable. The District Court concluded that the
inclusion of the phrase “household members” in the
Byrds’ revised class definitions was vague and not
ascertainable. In the Byrds’ reply brief on the motion for
class-action certification, they asserted in a footnote that
“[h]ousehold members can easily be objectively verified
through personal and public records. And their usage of
the owner/lessee’s computers can also be easily
objectively established.”
The Magistrate Judge
recommended denying class certification because the
Byrds did not define “household members” or prove by a
38
preponderance of the evidence how “‘household
members’ can be verified through personal and public
records.”
In their objections to the Magistrate Judge’s
Report and Recommendation, the Byrds argued that they
intended “the plain meaning of ‘household members.’”
On appeal, the Byrds continue to argue that they intended
the plain meaning of “household members” to be “all of
the people, related or unrelated, who occupy a housing
unit.” By way of example, the Byrds cite to multiple
definitions used in government documents for census,
taxation, and immigration purposes.
With these
definitions, they contend that the simple act of
confirming membership would mean matching addresses
in public records with that of an owner or lessee that had
already been identified.
The “household members” of owners or lessees are
ascertainable. Although the government documents cited
by the Byrds do contain slight variations on the definition
of a household member (as noted by Defendants), the
Byrds presented the District Court with various ways in
which “household members” could be defined and how
relevant records could be used to verify the identity of
household members.
Because the District Court
summarily adopted the Magistrate Judge’s Report and
Recommendation, and no oral argument was held on the
class-certification motion, we are left to wonder why the
District Court determined that the Byrds’ explanation in
39
their objections to the Report and Recommendation was
inadequate.
The parties also dispute whether the phrase
“household members” is often used in class definitions.
Although it is true that the phrase “household members”
has been used in other class definitions,10 we decline the
invitation categorically to conclude that the use of this
phrase will always have sufficient precision in the
ascertainability context. The inquiry in any given case
should be whether a class is “defined with reference to
10
See, e.g., Ortiz, 527 U.S. at 827 n.5 (reversing
the approval of an asbestos settlement class that
happened to include “household member” in the class
definition); Amchem Prods., Inc., 521 U.S. at 602
(analyzing the validity of a class that included
“household members” on grounds other than
ascertainability); Georgine v. Amchem Prods., Inc., 83
F.3d 610, 619 & n.3, 633 (3d Cir. 1996) (including in the
class “occupational exposure of a spouse or household
member to asbestos, or to asbestos-containing products”),
aff’d sub nom. Amchem Prods., Inc. v. Windsor, 521 U.S.
591 (1997); In re Flonase Antitrust Litig., 291 F.R.D. 93,
108 (E.D. Pa. 2013) (settlement class definition that
included “household members”), appeal dismissed (July
25, 2013); Carlough v. Amchem Prods., Inc., 158 F.R.D.
314, 319 (E.D. Pa. 1993) (using a similar definition as
Georgine).
40
objective criteria” and whether there is a “reliable and
administratively feasible mechanism for determining
whether putative class members fall within the class
definition.” Hayes, 725 F.3d at 355. Whether a class is
ascertainable is dependent on the nature of the claims at
issue. But as used here, “household members” is a
phrase that is easily defined and not, as Defendants
argue, inherently vague.
We also conclude that Defendants’ and the District
Court’s reliance on Carrera is misplaced. In Carrera,
we concluded that the plaintiffs’ proposed reliance on
affidavits alone, without any objective records to identify
class members or a method to weed out unreliable
affidavits, could not satisfy the ascertainability
requirement. 727 F.3d at 311. Here the Byrds presented
the District Court with multiple definitions of class
members and simply argued that a form similar to those
provided could be used to identify household members.
This is a far cry from an unverifiable affidavit, or the
absence of any methodology that can be used later to
ascertain class members. See id. at 310–11.
The Byrds’ proposed method to ascertain
“household members” is neither administratively
infeasible nor a violation of Defendants’ due process
rights. Because the location of household members is
already known (a shared address with one of the 895
owners and lessees identified by the Byrds), there are
unlikely to be “serious administrative burdens that are
41
incongruous with the efficiencies expected in a class
action.” Marcus, 687 F.3d at 593 (citation and internal
quotation marks omitted). There will always be some
level of inquiry required to verify that a person is a
member of a class; for example, a person’s statement that
she owned or leased an Aspen Way computer would
eventually require anyone charged with administering the
fund resulting from a successful class action to ensure
that person is actually among the 895 customers
identified by the Byrds. Such a process of identification
does not require a “‘mini-trial,’” nor does it amount to
“‘individualized fact-finding,’” Carrera, 727 F.3d at 307
(quoting Marcus, 687 F.3d at 594), and indeed must be
done in most successful class actions.
Certainly, Carrera does not suggest that no level
of inquiry as to the identity of class members can ever be
undertaken. If that were the case, no Rule 23(b)(3) class
could ever be certified. We are not alone in concluding
that “the size of a potential class and the need to review
individual files to identify its members are not reasons to
deny class certification.” See Young v. Nationwide Mut.
Ins. Co., 693 F.3d 532, 539–40 (6th Cir. 2012)
(collecting cases). To hold otherwise would seriously
undermine the purpose of a Rule 23(b)(3) class to
aggregate and vindicate meritorious individual claims in
an efficient manner. Fed. R. Civ. P. Rule 23(b)(3) 1966
advisory committee’s notes (Rule 23(b)(3) “achieve[s]
economies of time, effort, and expense, and promote[s]
42
uniformity of decision as to persons similarly situated,
without sacrificing procedural fairness or bringing about
other undesirable results.”).
As to Defendants’ contention that their due process
rights would be violated, Carrera counsels that this due
process right relates to the ability to “challenge the proof
used to demonstrate class membership.” 727 F.3d at 307.
Here, the Byrds are not relying solely on unverified
affidavits to establish ascertainability. See id. at 307–08;
Hayes, 725 F.3d at 356 (reasoning that a class is not
ascertainable where “the only proof of class membership
[was] the say-so of putative class members”). Any form
used to indicate a household member’s status in the
putative class must be reconciled with the 895 known
class members or some additional public records.
Defendants are not foreclosed from challenging the
evidence the Byrds propose to use.
In sum, the District Court erred in its application of
Carrera and in concluding that the phrase “household
members” was inherently vague.
C.
In light of the errors discussed above, we will
remand to the District Court to consider the remaining
Rule 23 certification requirements in the first instance.
At oral argument and in their briefs, Defendants urged us
to read the District Court’s ruling as one on
43
predominance, independently review the record in this
case, and conclude that the Byrds’ proposed classes fail
to satisfy Rule 23(b)(3)’s predominance requirement.
Defendants contend that the elements of an ECPA claim,
particularly that each plaintiff must show the interception
of the “contents” of an “electronic communication,”
create insurmountable barriers to proving predominance.
See 18 U.S.C. § 2511(1)(a), (c), (d). Formidable though
these barriers may be, they are not for us to address in the
first instance.
Beginning in General Telephone Co. of Southwest
v. Falcon, 457 U.S. 147, 160–161 (1982), through its
recent decision in Comcast Corp. v. Behrend, 133 S. Ct.
at 1432, the Supreme Court has repeatedly emphasized
the need for a district court to conduct a rigorous analysis
of the evidence in support of certification under Rule 23.
“By their nature, interlocutory appeals are disruptive,
time-consuming, and expensive”; thus, it makes sense to
allow the “district court an opportunity to fine-tune its
class certification order . . . rather than opening the door
too widely to interlocutory appellate review.” Waste
Mgmt. Holdings, Inc. v. Mowbray, 208 F.3d 288, 294–95
(1st Cir. 2000) (exercising discretionary authority under
Rule 23(f) in order to give a district court “a better sense
as to which aspects of the class certification decision
might
reasonably
be
open
to
subsequent
reconsideration”). This is consistent with the narrow, yet
flexible, set of considerations we address in granting a
44
Rule 23(f) petition. See Newton v. Merrill Lynch, Pierce,
Fenner & Smith, Inc., 259 F.3d 154, 164–65 (3d Cir.
2001); see also In re Nat’l Football League Players
Concussion Injury Litig., 775 F.3d 570, 578 n.9 (3d Cir.
2014). We best exercise appellate review when the dust
has settled and a district court has fully considered a
motion for class-action certification.
What is more, a close reading of Defendants’
response briefs demonstrates how they continue to
conflate ascertainability with the other relevant
requirements of Rule 23. We write again to emphasize
that at class certification, Rule 23’s explicit requirements
go beyond and are separate from the ascertainability
inquiry.
Precise analysis of relevant Rule 23
requirements will always be necessary. We therefore
decline to go beyond the scope of the District Court’s
opinion.
V.
The District Court erred both in relying on an
errant conclusion of law and improperly applying law to
fact. Accordingly, we will reverse and remand for
further consideration in light of this opinion.
45
RENDELL, Circuit Judge, concurring:
I agree with the majority that, under our current
jurisprudence, the class members here are clearly
ascertainable. Indeed, as Judge Smith points out, “Aaron’s
own records reveal the computers upon which Detective
Mode was activated, as well as the full identity of the
customer who leased or purchased each of those computers.”
(Maj. Op. at 37) (quoting Byrd v. Aaron’s, Inc., No. 11-cv101, 2014 WL 1316055, at *5 (W.D. Pa. Mar. 31, 2014)). It
is hard to argue otherwise, and I do not. However, I do
suggest that the lengths to which the majority goes in its
attempt to clarify what our requirement of ascertainability
means, and to explain how this implicit requirement fits in the
class certification calculus, indicate that the time has come to
do away with this newly created aspect of Rule 23 in the
Third Circuit. Our heightened ascertainability requirement
defies clarification. Additionally, it narrows the availability
of class actions in a way that the drafters of Rule 23 could not
have intended.
Historically, the ascertainability inquiry related to
whether the court will be able to determine who fits within
the class definition for purposes of award or settlement
distribution and the preclusion of the relitigation of claims.1
It is a test that scrutinizes the class definition, and properly
1
See Manual for Complex Litigation (Fourth) § 21.222
(2004) (“An identifiable class exists if its members can be
ascertained by reference to objective criteria.”); Joseph M.
McLaughlin, McLaughlin on Class Actions § 4:2 (11th ed.
2014) (“[C]lass members need to be able to determine with
certainty from a class notice whether they are in the class. . . .
If the class definition is amorphous, persons may not
recognize that they are in the class, and thus may be deprived
of the opportunity to object or opt out.”); 5 James Wm.
Moore et al., Moore’s Federal Practice ¶ 23.21[1] (3d ed.
1999) (noting that a class must be “susceptible to precise
definition”).
2
so.2 But this is now only the first element of our two-part test
for ascertainability. Marcus v. BMW of N. Am., LLC, 687
F.3d 583, 594 (3d Cir. 2012); see also Hayes v. Wal-Mart
Stores, Inc., 725 F.3d 349, 355 (3d Cir. 2013) (“The class
must be defined with reference to objective criteria.”).
2
Courts have found classes to be ascertainable when the class
definition is sufficiently specific. Compare Parkinson v.
Hyundai Motor Am., 258 F.R.D. 580, 593 (C.D. Cal. 2008)
(holding that prospective plaintiffs are capable of determining
whether they were class members because class definition
included purchasers of a certain vehicle who paid for the
replacement of a certain part in a certain time period), and
Bynum v. District of Columbia, 214 F.R.D. 27, 31-32 (D.D.C.
2003) (holding that prospective class members are capable of
identifying themselves based on the dates of their
incarceration included in the class definition), and Pigford v.
Gickman, 182 F.R.D. 341, 346 (D.D.C. 1998) (holding that
class members are capable of identifying themselves based on
whether they had applied for participation in a USDA federal
farm program during the specified dates), with In re Copper
Antitrust Litig., 196 F.R.D. 348, 350-51, 358-60 (W.D. Wis.
2000) (refusing to certify class of “[a]ll copper or metals
dealers . . . that purchased physical copper” during a specified
time period “at prices expressly related to LME or Comex
copper future prices” because the class definition fell “far
short of communicating to copper purchasers what they need
to know to decide whether they are in or outside the proposed
class,” in that the definition failed to explain the terms
“copper or metals dealers,” “physical copper,” and “expressly
related to”).
3
In 2012 we adopted a second element, namely,
requiring district courts to make certain that there is “a
reliable, administratively feasible” method of determining
who fits into the class, thereby imposing a heightened
evidentiary burden. Marcus, 687 F.3d at 594. We have
precluded class certification unless there can be objective
proof—beyond mere affidavits—that someone is actually a
class member. Id.; accord Carrera v. Bayer Corp., 727 F.3d
300, 308-12 (3d Cir. 2013). This concept has gained traction
in recent years.3 I submit that this “business record” or
3
Several courts have denied class certification on
ascertainability grounds similar to our current ascertainability
test. See, e.g., Randolph v. J.M. Smucker Co., 303 F.R.D.
679, 689 (S.D. Fla. 2014) (denying certification of class suing
defendant for mislabeling product as “All Natural” in
violation of Florida’s deceptive advertising law because
potential class members were unlikely to remember if they
bought a product with such a label); In re Skelaxin
(Metaxalone) Antitrust Litig., 299 F.R.D. 555, 572 (E.D.
Tenn. 2014) (denying certification of class suing drug
manufacturer for violating antitrust laws because plaintiffs
did not propose feasible model for screening fraudulent
claims); Brey Corp. v. LQ Mgmt. LLC, No. 11-cv-718, 2014
WL 943445, at *1 (D. Md. Jan. 30, 2014) (denying
certification of class suing defendant for violating antitrust
laws because ascertaining who belongs in the class would
require individualized fact-finding).
4
“paper trail” requirement is ill-advised.4 In most low-value
consumer class actions, prospective class members are
unlikely to have documentary proof of purchase, because very
few people keep receipts from drug stores or grocery stores.
This should not be the reason to deny certification of a class.5
As Judge Ambro’s dissent from the denial of the petition for
rehearing en banc in Carrera noted, “[w]here a defendant’s
lack of records . . . make it more difficult to ascertain the
members of an otherwise objectively verifiable low-value
class, the consumers who make up that class should not be
made to suffer.” Carrera v. Bayer Corp., No. 12-2621, 2014
WL 3887938, at *3 (3d Cir. May 2, 2014) (Ambro, J.
dissenting).
Records are not the only way to prove that someone is
4
While the majority cites a footnote in Carrera as standing
for the proposition that we have no “records requirement,” the
class in Carrera failed the ascertainability test because there
were no records from which the class members could be
ascertained with certainty. (Maj. Op. at 25 (citing Carrera,
727 F.3d at 308. n.2)).
5
See, e.g., McCrary v. Elations Co., LLC, No. 13-cv-242,
2014 WL 1779243, at *8 (C.D. Cal. Jan. 13, 2014) (“It
appears that pursuant to Carerra [sic] in any case where the
consumer does not have a verifiable record of its purchase,
such as a receipt, and the manufacturer or seller does not keep
a record of buyers, Carerra [sic] prohibits certification of the
class.”); Ries v. Ariz. Beverages USA LLC, 287 F.R.D. 523,
535 (N.D. Cal. 2012) (warning that, if lack of receipts dooms
certification, “there would be no such thing as a consumer
class action” in cases concerning false or deceptive labeling
of small-value items).
5
in a class. It is the trial judge’s province to determine what
proof may be required at the claims submission and claims
administration stage. It is up to the judge overseeing the class
action to decide what she will accept as proof when
approving the claim form. Could not the judge decide that, in
addition to an individual’s “say so” that he is a member of the
class, the claimant needs to submit an affidavit from another
household member or from his doctor corroborating his
assertion that he did, in fact, take Bayer aspirin? Is that not
permissible and appropriate? Yet, we foreclose this process
at the outset of the case by requiring that plaintiffs conjure up
all the ways that they might find the evidence sufficient to
approve someone as a class member.
This puts the class action cart before the horse and
confuses the class certification process, as this case makes
manifest. The irony of this result is that it thwarts “[t]he
policy at the very core of the class action mechanism,” i.e.,
“to overcome the problem that small recoveries do not
provide the incentive for any individual to bring a solo action
prosecuting his or her rights.” Amchem Prods., Inc. v.
Windsor, 521 U.S. 591, 617 (1997) (quoting Mace v. Van Ru
Credit Corp., 109 F.3d 338, 344 (7th Cir. 1997)). Indeed,
“[a] class action solves this problem by aggregating the
relatively paltry potential recoveries into something worth
someone’s (usually an attorney’s) labor.” Id. We have
effectively thwarted small-value consumer class actions by
defining ascertainability in such a way that consumer classes
will necessarily fail to satisfy for lack of adequate
6
substantiation.6 Consumers now need to keep a receipt or a
can, bottle, tube, or wrapper of the offending consumer items
in order to succeed in bringing a class action.
6
Small-value consumer class actions certified by district
courts nationwide would not pass muster in our Circuit
because of our heightened ascertainability requirement. See,
e.g., Hughes v. Kore of Ind. Enter., Inc., 731 F.3d 672, 675
(7th Cir. 2013) (reversing district court’s order decertifying
class of consumers who brought action against owners of
automatic teller machines for failing to post notice on
machines that they charged fee for use despite difficulty in
determining which plaintiffs would have been deceived by
lack of notice); Ebin v. Kangadis Food Inc., 297 F.R.D. 561,
567 (S.D.N.Y. 2014) (certifying class of consumers who
claimed defendant placed misleading “All Natural” label on
olive oil bottles even though plaintiffs were unlikely to have
retained receipts or packaging proving membership in class);
Boundas v. Abercrombie & Fitch Stores, Inc., 280 F.R.D.
408, 417 (N.D. Ill. 2012) (certifying class of plaintiffs who
possessed promotional gift cards stating “No expiration date”
that were voided by defendant or told that the cards had
expired or been voided and thrown away cards even though
some class members would only be able to claim class
membership through affidavit); see also Lilly v. Jamba Juice
Co., No. 13-cv-2998, 2014 WL 4652283, at *4 (N.D. Cal.
Sept. 18, 2014) (certifying class of consumers who purchased
frozen smoothie kits containing label “All Natural” where
product allegedly contained various artificial ingredients and
where consumers did not necessarily have proof of purchase);
Allen v. Hylands, Inc., 300 F.R.D. 643, 658-59, 672 (C.D.
Cal. 2014) (certifying class of plaintiffs who purchased
homeopathic products where packaging contained alleged
7
The policy rationales that we cite in support of our
expanded ascertainability requirement are relatively weak
when compared to the significant policy justifications that
motivate the class action mechanism. We have noted three
rationales for our ascertainability requirement: (1) eliminating
administrative burdens “incongruous” with the efficiencies of
a class action, (2) protecting absent class members’ rights to
opt out by facilitating the best notice practicable, and (3)
protecting the due process rights of defendants to challenge
plaintiffs’ proffered evidence of harm. Marcus, 687 F.3d at
593.
misrepresentations even though class members would have to
self-identify without corroborating evidence); Forcellati v.
Hylands, Inc., No. 12-1983, 2014 WL 1410264, at *5, *13
(C.D. Cal. Apr. 9, 2014) (certifying class of plaintiffs who
purchased children’s cold or flu products within a prescribed
time frame despite purchasers’ lack of proof of purchase and
defendants’ lack of records identifying consumers who
purchased their products via retail intermediaries); McCrary,
2014 WL 1779243, at *7-8 (certifying class of purchasers of
dietary joint supplement containing allegedly deceptive label
despite plaintiffs’ lack of proof of purchase); Astiana v. Kashi
Co., 291 F.R.D. 493, 500 (S.D. Cal. 2013) (certifying class of
consumers who purchased cereal and snack products labeled
as “All Natural” or “Nothing Artificial” but which allegedly
contained synthetic ingredients in violation of various false
advertising laws even though plaintiffs unlikely to have
retained receipts or containers); Ries, 287 F.R.D. at 535
(certifying class of consumers who purchased iced tea with
“natural” on label despite plaintiffs’ lack of proofs of
purchase,
finding
self-identification
sufficient
for
ascertainability).
8
Eliminating “administrative burdens” really means
short-circuiting the claims process by assuming that when
individuals file claims, they burden the court. But claims
administration is part of every class action. Imposing a proofof-purchase requirement does nothing to ensure the
manageability of a class or the “efficiencies” of the class
action mechanism; rather, it obstructs certification by
assuming that hypothetical roadblocks will exist at the claims
administration stage of the proceedings.7
Denying class certification due to concerns about
providing notice to class members makes little sense. Rule 23
requires the “best notice that is practicable under the
circumstances” to potential class members after a class has
been certified.8
Potential difficulties in providing
individualized notice to all class members should not be a
reason to deny certification of a class. As the Supreme Court
noted in Phillips Petroleum Co. v. Shutts, due process is
satisfied when notice is “reasonably calculated” to reach the
defined class. 472 U.S. 797, 812 (1985). The question is not
whether every class member will receive actual individual
notice, but whether class members can be notified of their
opt-out rights consistent with due process. See Dusenbery v.
United States, 534 U.S. 161 (2002) (holding that due process
did not require actual notice to federal prisoner of his right to
contest civil forfeiture, but rather, due process must be
See Carnegie v. Household Int’l, Inc., 376 F.3d 656, 661
(7th Cir. 2004) (“[T]here is a big difference from the
standpoint of manageability between the liability and remedy
phases of a class action.”).
8
Fed. R. Civ. P. 23(c)(2)(B).
7
9
“reasonably calculated” to apprise a party of the pendency of
an action).9
The concerns regarding the due process rights of
defendants are unwarranted as well, because there is no
evidence that, in small-claims class actions, fabricated claims
impose a significant harm on defendants. The chances that
someone would, under penalty of perjury, sign a false
affidavit stating that he or she bought Bayer aspirin for the
sake of receiving a windfall of $1.59 are far-fetched at best.
On the other hand, while most injured individuals will find
that it is not worth the effort to claim the few dollars in
damages that the class action can provide, in the aggregate,
this sum is significant enough to deter corporate misconduct.
Our ascertainability doctrine, by focusing on making
absolutely certain that compensation is distributed only to
those individuals who were actually harmed, has ignored an
equally important policy objective of class actions: deterring
and punishing corporate wrongdoing. As Judge Posner,
writing for the Court of Appeals for the Seventh Circuit,
stated in Hughes v. Kore of Indiana Enterprises, Inc., “when
what is small is not the aggregate but the individual claim . . .
that’s the type of case in which class action treatment is most
needful. . . . A class action, like litigation in general, has a
deterrent as well as a compensatory objective.” 731 F.3d 672,
677 (7th Cir. 2013). The rigorous application of the
ascertainability requirement translates into impunity for
9
See also Girsh v. Jepson, 521 F.2d 153, 159 n.12 (3d Cir.
1975) (“We do not mean to indicate that individual notice
must be given in all cases.”). Furthermore, Rule 23 requires
courts to provide the best practicable notice after a class has
been certified. See Fed. R. Civ. P. 23(c)(2)(B).
10
corporate defendants who have harmed large numbers of
consumers in relatively modest increments.10 Without the
class action mechanism, corporations selling small-value
items for which it is unlikely that consumers would keep
receipts are free to engage in false advertising, overcharging,
and a variety of other wrongs without consequence.
The concerns about defendants’ due process rights are
also overblown because damages liability under Rule 23 is
determined in the aggregate: courts determine the extent of a
defendant’s monetary liability to the entire class. Therefore,
whether an individual can establish membership in that class
does not affect the rights of defendants not to pay in excess of
their liability. Carrera’s concern that allowing undeserving
individuals to claim damages will dilute deserving class
10
As one court has noted,
[a]dopting the Carrera approach would have
significant negative ramifications for the ability
to obtain redress for consumer injuries. Few
people retain receipts for low-priced goods,
since there is little possibility they will need to
later verify that they made the purchase. Yet it
is precisely in circumstances like these, where
the injury to any individual consumer is small,
but the cumulative injury to consumers as a
group is substantial, that the class action
mechanism provides one of its most important
social benefits.
Lilly, 2014 WL 4652283, at *4 (citing Eisen v. Carlisle &
Jacquelin, 417 U.S. 156, 161 (1974)).
11
members’ recoveries is unrealistic in modern day class action
practice, and it makes little sense when used to justify the
wholesale dooming of the small-value class action such that
no injured plaintiff can recover at all. Moreover, this is an
issue to be dealt with in the implementation of a class action
settlement, not in conjunction with ascertaining the class for
purposes of certification. Concerns about claims processing
should not be used to scuttle these types of class actions
altogether.
The policy concerns animating our ascertainability
doctrine boil down to ensuring that there is a surefire way to
get damages into the hands of only those individuals who we
can be 100% certain have suffered injury, and out of the
hands of those who may not have. However, by disabling
plaintiffs from bringing small-value claims as a class, we
have ensured that other policy goals of class actions—
compensation of at least some of the injured and deterrence of
wrongdoing, for example—have been lost. In small-claims
class actions like Carrera, the real choice for courts is
between compensating a few of the injured, on the one hand,
versus compensating none while allowing corporate
malfeasance to go unchecked, on the other. As such, where
there are small-value claims, class actions offer the only
means for achieving individual redress. As the Supreme
Court stated in Eisen, when individual damages are so low,
“[e]conomic reality dictates that petitioner’s suit proceed as a
class action or not at all.” 417 U.S. at 161. The concern that
we are defeating what is at the “core” of what the class action
was designed to accomplish is very real. As Judge Rakoff
noted in certifying a class over objections regarding
ascertainability based on receipts or documentation:
12
[T]he class action device, at its very core, is
designed for cases like this where a large
number of consumers have been defrauded but
no one consumer has suffered an injury
sufficiently large as to justify bringing an
individual lawsuit. Against this background, the
ascertainability difficulties, while formidable,
should not be made into a device for defeating
the action.
Ebin v. Kangadis Food Inc., 297 F.R.D. 561, 567 (S.D.N.Y.
2014). While a rigorous insistence on a proof-of-purchase
requirement, which our heightened ascertainability
jurisprudence has imposed, keeps damages from the
uninjured, it does an equally effective job of keeping damages
from the truly injured as well, and “it does so with brutal
efficiency.”11
Therefore, while I concur in the judgment, I suggest
that it is time to retreat from our heightened ascertainability
requirement in favor of following the historical meaning of
ascertainability under Rule 23. I would therefore reverse the
District Court’s ruling, and hold that (1) hereafter, our
ascertainability analysis will focus on class definition only,
and (2) the District Court’s analysis regarding the second
prong of our ascertainability test was unnecessary. We thus
would instruct the District Court to proceed to determine
whether the class can be certified under the traditional
mandates of Rule 23. Until we revisit this issue as a full
11
Myriam Gilles, Class Dismissed: Contemporary Judicial
Hostility to Small-Claims Consumer Class Actions, 59
DePaul L. Rev. 305, 308 (2010).
13
Court or it is addressed by the Supreme Court or the Advisory
Committee on Civil Rules, we will continue to administer the
ascertainability requirement in a way that contravenes the
purpose of Rule 23 and, in my view, disserves the public.
14
FOR PUBLICATION
UNITED STATES COURT OF APPEALS
FOR THE NINTH CIRCUIT
SKYE ASTIANA; TAMAR DAVIS
LARSEN, on behalf of themselves
and all others similarly situated,
Plaintiffs-Appellants,
No. 12-17596
D.C. No.
4:11-cv-06342PJH
v.
THE HAIN CELESTIAL GROUP, INC., a
Delaware corporation; JASON
NATURAL PRODUCTS, INC., a
California corporation,
Defendants-Appellees.
OPINION
Appeal from the United States District Court
for the Northern District of California
Phyllis J. Hamilton, Chief District Judge, Presiding
Argued and Submitted
February 10, 2015—San Francisco, California
Filed April 10, 2015
Before: Sidney R. Thomas, Chief Judge and A. Wallace
Tashima and M. Margaret McKeown, Circuit Judges.
Opinion by Judge McKeown
2
ASTIANA V. HAIN CELESTIAL GROUP
SUMMARY*
Preemption / Primary Jurisdiction /
Food and Drug Administration
The panel reversed the district court’s Fed. R. Civ. P.
12(b)(6) dismissal of a quasi-contract cause of action, and
dismissal of California state law claims under the primary
jurisdiction doctrine in a putative nationwide class action
claiming that the class members were deceived into
purchasing “natural” cosmetics.
Primary jurisdiction is a prudential doctrine that permits
courts to determine whether a claim implicates technical and
policy questions that should first be addressed by an agency
with regulatory authority over the relevant industry.
The panel held that the Food, Drug, and Cosmetic Act did
not expressly preempt California’s state law causes of action
that create consumer remedies for false or misleading
cosmetics labels. The panel also held that although the
district court properly invoked the primary jurisdiction
doctrine, it erred by dismissing the case rather than issuing a
stay pending potential agency action by the Food and Drug
Administration. The panel indicated that on remand, the
district court may consider whether events during the
pendency of the appeal had changed the calculus on whether
further FDA proceedings were necessary. Finally, the panel
concluded that the district court erred in dismissing the
*
This summary constitutes no part of the opinion of the court. It has
been prepared by court staff for the convenience of the reader.
ASTIANA V. HAIN CELESTIAL GROUP
3
quasi-contract cause of action as duplicative of, or
superfluous to, the putative class’s other claims.
COUNSEL
Joseph N. Kravec, Jr. (argued) and Wyatt A. Lison, Feinstein
Doyle Payne & Kravec, LLC, Pittsburgh, Pennsylvania;
Michael D. Braun, Braun Law Group, P.C., Los Angeles,
California; Janet Lindner Spielberg, Law Offices of Janet
Lindner Spielberg, Los Angeles, California, for PlaintiffsAppellants.
James M. Schurz (argued) and Lisa A. Wongchenko,
Morrison & Foerster LLP, San Francisco, California, for
Defendants-Appellees.
OPINION
McKEOWN, Circuit Judge:
A product labeled “all natural” or “pure natural” likely
evokes images of ground herbs and earth extracts rather than
chemicals such as “Polysorbate 20” or “Hydroxycitronellal.”
This class action alleges that false or misleading product
labels duped consumers seeking natural cosmetics into
purchasing products that were chock-full of artificial and
synthetic ingredients. Although the underlying question of
what constitutes a “natural” cosmetic poses a fascinating
question, it is not the one we answer. Instead, this appeal
requires us to decide whether federal preemption or the
primary jurisdiction doctrine prevents the district court from
4
ASTIANA V. HAIN CELESTIAL GROUP
deciding when a “natural” label on cosmetic products is false
or misleading.
We conclude that the Food, Drug, and Cosmetic Act,
21 U.S.C. § 301 et seq. (“FDCA”), does not expressly
preempt California’s state law causes of action that create
consumer remedies for false or misleading cosmetics labels.
Although the district court properly invoked the primary
jurisdiction doctrine, it erred by dismissing the case rather
than issuing a stay pending potential agency action by the
Food and Drug Administration (“FDA”). On remand, the
district court may consider whether events during the
pendency of this appeal have changed the calculus on
whether further FDA proceedings are necessary.
Background
The Hain Celestial Group and JÂSÖN Natural Products
(collectively “Hain”) make moisturizing lotion, deodorant,
shampoo, conditioner and other cosmetics products. Hain
labels these products “All Natural,” “Pure Natural,” or “Pure,
Natural & Organic.”
Skye Astiana, Tamar Davis Larsen, and Mary Littlehale
(collectively “Astiana”) filed a putative nationwide class
action claiming that they were deceived into purchasing
Hain’s cosmetics, which contain allegedly synthetic and
artificial ingredients ranging from benzyl alcohol to airplane
anti-freeze. Astiana claims she likely would not have
purchased—and certainly would not have paid the going price
for—Hain’s cosmetics had she been aware of their synthetic
and artificial contents. Astiana sought injunctive relief and
damages under the federal Magnuson-Moss Warranty Act,
ASTIANA V. HAIN CELESTIAL GROUP
5
California’s unfair competition and false advertising laws,
and common law theories of fraud and quasi-contract.
Hain filed two motions to dismiss the complaint. First, it
moved to partially dismiss the suit under Federal Rule of
Civil Procedure 12(b)(6). As relevant here, the district court
dismissed the quasi-contract cause of action, noting that
“while restitution is available as a remedy for plaintiffs’ other
causes of action, it is not a standalone cause of action in
California and is nonsensical as pled in any event.”1
In its second motion to dismiss, Hain asserted that
Astiana’s state law claims are preempted by the FDCA. In
the alternative, Hain urged that the suit should be stayed or
dismissed under the primary jurisdiction doctrine. The
district court found the latter argument persuasive and
dismissed Astiana’s claims so the parties could seek expert
guidance from the FDA.
Analysis
I. PREEMPTION
Hain argues that the FDCA expressly preempts Astiana’s
state law claims. Although the district court did not address
this argument, Hain asks us to do so, citing our authority to
“affirm on any grounds supported by the record.” Franklin
v. Terr, 201 F.3d 1098, 1100 n.2 (9th Cir. 2000). We accept
this invitation because this purely legal question remains a
threshold issue for resolution.
1
The district court also dismissed plaintiff Littlehale from the suit.
Littlehale initially appealed this ruling, but voluntarily dismissed her
appeal before oral argument.
6
ASTIANA V. HAIN CELESTIAL GROUP
In analyzing express preemption, we “start with the
assumption that the historic police powers of the States were
not to be superseded by the Federal Act unless that was the
clear and manifest purpose of Congress.” Rice v. Santa Fe
Elevator Corp., 331 U.S. 218, 230 (1947). The FDCA
proscribes any cosmetics labeling that is “false or misleading
in any particular.” 21 U.S.C. § 362(a). The more specific
preemption language prohibits any state or local government
from “establish[ing] or continu[ing] in effect any requirement
for labeling or packaging of a cosmetic that is different from
or in addition to, or that is otherwise not identical with”
federal rules. 21 U.S.C. § 379s(a). Hain’s argument that this
language expressly preempts any state law claim that a
cosmetic label is false or misleading does not square with
Supreme Court precedent.
The preemption language of § 379s is virtually identical
to the statutory text at issue in two Supreme Court cases:
Medtronic, Inc. v. Lohr, 518 U.S. 470 (1996), and Bates v.
Dow Agrosciences LLC, 544 U.S. 431 (2005). Like the
statutes at issue in those cases, the FDCA bars states from
imposing new or additional labeling “requirements,” but is
silent with regards to states’ ability to provide remedies for
violations of federal law. In light of this similarity, we have
little difficulty concluding that the FDCA does not preempt
state laws that allow consumers to sue cosmetics
manufacturers that label or package their products in
violation of federal standards.
In Medtronic, the Supreme Court considered whether the
FDCA’s prohibition on state medical device safety
“requirements” that are “different from, or in addition to”
federal requirements preempted state law product liability
claims. 518 U.S. at 481 (quoting 21 U.S.C. § 360k(a)).
ASTIANA V. HAIN CELESTIAL GROUP
7
Looking to the text, the Court concluded that nothing in the
statutory language “denies [a state] the right to provide a
traditional damages remedy for violations of common-law
duties when those duties parallel federal requirements.” Id.
at 495. Simply put, the availability of state law damages for
violations of federal law “does not amount to [an] additional
or different ‘requirement.’” Id.
The Court reached a similar conclusion in Bates. There,
chemical manufacturers argued that the labeling requirements
of the Federal Insecticide, Fungicide, and Rodenticide Act
(“FIFRA”), 7 U.S.C. § 136 et seq., preempted state law
claims that their products failed to include adequate warnings.
That statute mandates certain chemical labeling requirements
and prohibits states from “impos[ing] or continu[ing] in effect
any requirements for labeling or packaging in addition to or
different from” federal requirements. 7 U.S.C. § 136v(b).
The Court determined that this language is not an absolute bar
to state law failure to warn claims, reasoning that FIFRA
“does not . . . pre-empt any state rules that are fully consistent
with federal requirements.” Bates, 544 U.S. at 452. To the
extent state law might be construed more broadly than federal
law, the solution is not to prohibit state law suits altogether,
but to “instruct the jury on the relevant [federal] standards, as
well as any regulations that add content to those standards.”
Id. at 454.
Hain attempts to escape the dictates of the Supreme Court
by arguing that Astiana’s suit would create a “novel state
labeling requirement” under California’s Sherman Act,
Health & Safety Code § 111730. This approach does not
save the preemption argument. Astiana is not asking Hain to
modify or enhance any aspect of its cosmetics labels that are
required by federal law. Rather, she claims deception as a
8
ASTIANA V. HAIN CELESTIAL GROUP
result of advertising statements that contradicted the true
ingredients listed on the FDA-mandated label. See Williams
v. Gerber Prods. Co., 552 F.3d 934, 939 (9th Cir. 2008) (“We
do not think that the FDA requires an ingredient list so that
manufacturers can mislead consumers and then rely on the
ingredient list to correct those misinterpretations and provide
a shield for liability for the deception.”). FDA regulations do
not require Hain to label its products as “All Natural” or
“Pure Natural.” If Astiana’s suit ultimately requires Hain to
remove these allegedly misleading advertising statements
from its product labels, such a result does not run afoul of the
FDCA, which prohibits “requirement[s]” that are “different
from,” “in addition to,” or “not identical with” federal rules.
Hain also argues that the complaint’s reference to the
FDA’s informal food labeling policy represents an attempt to
create a state regulatory regime where no corresponding
federal rules exist. This characterization does not ring true.
Astiana referenced these regulations to demonstrate that Hain
knew or should have known its products contained
ingredients that would likely be considered synthetic and
artificial.
Notably, the complaint referenced Hain’s
correspondence with a non-profit organization for the same
purpose.
Hain finally points out that the FDA has never issued
regulations regarding the use of “natural” on cosmetics labels.
That is true, but Hain then argues that the FDA’s failure to
issue specific regulations on the subject is tantamount to a
conscious decision by the agency to permit any use of this
term a manufacturer sees fit. This argument proves too much.
By this logic, a manufacturer could make any claim—wild,
untruthful, or otherwise—about a product whose contents are
not addressed by a specific regulation. The statute, however,
ASTIANA V. HAIN CELESTIAL GROUP
9
proscribes statements that are “false or misleading in any
particular,” not statements that are “prohibited by specific
FDA regulations.” Indeed, in a “Small Business Fact Sheet”
published on its website, the FDA itself stated that while the
agency “has not defined” the word natural, all cosmetics
labels must still be “truthful and not misleading.”2 This
statement is, of course, consistent with § 362(a)’s prohibition
on “false or misleading” labeling and reinforces our
conclusion that the FDA did not intend to permit
indiscriminate use of the word “natural” on cosmetics labels.3
The FDCA does not expressly preempt state causes of
action predicated on federal cosmetics labeling laws.
Astiana’s state law claims that Hain’s products were labeled
in a way that was “false or misleading in any particular” may
proceed.
II. PRIMARY JURISDICTION
We next address whether the district court properly
dismissed Astiana’s claims under the primary jurisdiction
doctrine. Before we reach the merits of the district court’s
decision, we consider two procedural points raised by
Astiana.
2
Small Business & Homemade Cosmetics: Fact Sheet, U.S. FDA,
http://www.fda.gov/Cosmetics/ResourcesForYou/Industry/ucm388736.
htm (last updated Oct. 20, 2014).
3
To the extent Hain claims that no consumer would be deceived by a
cosmetics label that contains the phrase “All Natural” because every
cosmetic necessarily contains artificial, synthetic, or manufactured
materials, this argument goes to the merits of Astiana’s assertion that she
was deceived by the allegedly false or misleading label, not the question
of federal preemption.
10
ASTIANA V. HAIN CELESTIAL GROUP
Astiana first urges that Hain waived its right to seek
dismissal on primary jurisdiction grounds because this
defense was asserted in a pleading titled: “Motion to dismiss
for lack of subject matter jurisdiction, pursuant to Federal
Rule of Civil Procedure 12(h)(3).” Strictly speaking, this title
was inaccurate because “[p]rimary jurisdiction is not a
doctrine that implicates the subject matter jurisdiction of the
federal courts.” Syntek Semiconductor Co. v. Microchip
Tech. Inc., 307 F.3d 775, 780 (9th Cir. 2002). In Astiana’s
view, the erroneous caption on Hain’s motion constitutes
waiver of the primary jurisdiction defense.
Astiana’s position reads too much into the caption. Just
as one can’t judge a book by its cover, a pleading caption is
hardly dispositive of the nature of the pleading. Astiana also
overlooks the reality of what occurred in the briefing of the
motion. Both Hain and Astiana addressed the merits of the
primary jurisdiction argument without reference to the
caption. Far from waiver, Hain’s motion put Astiana on
notice of the defense, and Astiana responded to this
argument.
Astiana also urges us to acknowledge that its
correspondence with the FDA during the pendency of this
appeal demonstrates that the agency declined to take primary
jurisdiction over this case. In a motion for judicial notice,
Astiana asserts that her counsel sent a letter to the FDA in
December 2013, four weeks after the district court dismissed
her claims. The letter, which was not sent to opposing
counsel or the court at that time, asserted inaccurately that
there had been a “Referral for 21 C.F.R. [§] 10.25(c)
Administrative Determination” in the case. Although
§ 10.25(c) permits federal courts to refer matters to the FDA
for administrative proceedings, the district court did not do so
ASTIANA V. HAIN CELESTIAL GROUP
11
in this case. Rather, the court had already dismissed the case
when Astiana requested that “the FDA render an
administrative determination on the meaning of ‘natural’ as
applied to personal care products regulated under the FDCA,
or advise that the agency declines to make such a
determination.” Astiana’s letter did not comply with the
FDA’s requirements for initiating a citizen petition. 21
C.F.R. § 10.30. The inquiry was never assigned a docket
number, and the FDA’s response was neither posted to its
website nor published in any other capacity. Cf. 21 C.F.R.
§ 10.65(a) (noting that “correspondence” with FDA
employees does not constitute final agency action “subject to
judicial review”).
Hain’s counsel learned of this missive nearly two months
later and immediately wrote a letter to the FDA urging it not
to respond to Astiana’s request for administrative guidance.
In March 2013, Dr. Linda M. Katz, the Director of the FDA’s
Office of Cosmetics and Colors, responded to Astiana’s
initial request and outlined the procedures for establishing the
meaning of the term “natural,” absent a pre-existing
definition. The letter noted that “making the requested
determination without adequate public participation would
not be in keeping with FDA’s commitment to the principles
of openness and transparency.” Dr. Katz further observed
that “priority cosmetic public health and safety matters are
currently fully occupying the resources that FDA has
available for proceedings on cosmetics matters” and
“proceedings to define ‘natural’ do not fit within [the
agency’s] current health and safety priorities.”
The question is what do we do with this private
correspondence on appeal? Our answer: nothing. Because
any consideration as to the weight or the substantive
12
ASTIANA V. HAIN CELESTIAL GROUP
implications of the letter should be left to the district court on
remand, we deny Astiana’s motion for judicial notice.
We now consider the meat of Astiana’s claim: whether
the district court’s decision to dismiss the case under the
primary jurisdiction doctrine was error. Although the district
court properly invoked primary jurisdiction, it erred by
dismissing the case without prejudice rather than staying
proceedings while the parties (or the district court) sought
guidance from the FDA.
Primary jurisdiction is a prudential doctrine that permits
courts to determine “that an otherwise cognizable claim
implicates technical and policy questions that should be
addressed in the first instance by the agency with regulatory
authority over the relevant industry rather than by the judicial
branch.” Clark v. Time Warner Cable, 523 F.3d 1110, 1114
(9th Cir. 2008). In evaluating primary jurisdiction, we
consider “(1) the need to resolve an issue that (2) has been
placed by Congress within the jurisdiction of an
administrative body having regulatory authority (3) pursuant
to a statute that subjects an industry or activity to a
comprehensive regulatory authority that (4) requires expertise
or uniformity in administration.” Syntek, 307 F.3d at 781.
Not every case that implicates the expertise of federal
agencies warrants invocation of primary jurisdiction. Rather,
the doctrine is reserved for a “limited set of circumstances”
that “requires resolution of an issue of first impression, or of
a particularly complicated issue that Congress has committed
to a regulatory agency.” Clark, 523 F.3d at 1114 (quoting
Brown v. MCI WorldCom Network Servs., 277 F.3d 1166,
1172 (9th Cir. 2002)) (internal quotation marks omitted).
Without doubt, defining what is “natural” for cosmetics
ASTIANA V. HAIN CELESTIAL GROUP
13
labeling is both an area within the FDA’s expertise and a
question not yet addressed by the agency.
Nonetheless, courts must also consider whether invoking
primary jurisdiction would needlessly delay the resolution of
claims. Reid v. Johnson & Johnson, No. 12-56726, 2015 WL
1089583, at *12 (9th Cir. 2015); United States v. Philip
Morris USA Inc., 686 F.3d 832, 838 (D.C. Cir. 2012) (“The
primary jurisdiction doctrine is rooted in part in judicial
efficiency.”). Under our precedent, “efficiency” is the
“deciding factor” in whether to invoke primary jurisdiction.
Rhoades v. Avon Prods., Inc., 504 F.3d 1151, 1165 (9th Cir.
2007).4
Common sense tells us that even when agency expertise
would be helpful, a court should not invoke primary
jurisdiction when the agency is aware of but has expressed no
interest in the subject matter of the litigation. Similarly,
primary jurisdiction is not required when a referral to the
agency would significantly postpone a ruling that a court is
otherwise competent to make. See Amalgamated Meat
Cutters & Butcher Workmen of N. Am., 381 U.S. at 686
(“[Primary jurisdiction] does not require resort to an
expensive and merely delaying administrative proceeding
4
Although the Supreme Court has never expressly held that courts
should weigh efficiency concerns against other factors relevant to primary
jurisdiction, see Ellis v. Tribune Television Co., 443 F.3d 71, 90 (2d Cir.
2006), the Court has discussed judicial economy in several of its primary
jurisdiction opinions. See, e.g., Reiter v. Cooper, 507 U.S. 258, 270
(1993) (expressing concern that invoking primary jurisdiction “could
produce substantial delay”); Local Union No. 189, Amalgamated Meat
Cutters & Butcher Workmen of N. Am. v. Jewel Tea Co., 381 U.S. 676,
686 (1965) (“[T]he doctrine of primary jurisdiction is not a doctrine of
futility.”).
14
ASTIANA V. HAIN CELESTIAL GROUP
when the case must eventually be decided on a controlling
legal issue wholly unrelated to determinations for the
ascertainment of which the proceeding was sent to the
agency.”) (internal quotation marks and citation omitted).
On the record before it, the district court did not err in
invoking primary jurisdiction. Determining what chemical
compounds may be advertised as natural on cosmetic product
labels is “a particularly complicated issue that Congress has
committed to” the FDA. See 21 C.F.R. § 700.3 et seq.
Obtaining expert advice from that agency would help ensure
uniformity in administration of the comprehensive regulatory
regime established by the FDCA.
While the FDA had shown some reticence to define
“natural,” Judge Hamilton was not alone in thinking that new
guidance would be forthcoming. In response to a flurry of
litigation over food labeling, three other district courts
invoked the agency’s primary jurisdiction to see if the FDA
intended to offer further regulations regarding the use of the
term “natural.”5 Following these referrals, which occurred
around the same time Hain sought to invoke primary
jurisdiction in this case, the FDA outlined the complexities of
the issue and responded to the courts that “priority food
public health and safety matters are largely occupying the
limited resources that FDA has to address food matters.”
Letter from Department of Health & Human Services, In Re
Gen. Mills, No. CIV-A-12-249, at ECF No. 94. More
5
These cases are: In re Gen. Mills, Inc. Kix Cereal Litig., No. CIV-A12-249 KM, 2013 WL 5943972 (D.N.J. Nov. 1, 2013), Barnes v.
Campbell Soup Co., No. C12-05185 JSW, 2013 WL 5530017 (N.D. Cal.
July 25, 2013), Cox v. Gruma Corp., No. 12-CV-6502 YGR, 2013 WL
3828800 (N.D. Cal. July 11, 2013).
ASTIANA V. HAIN CELESTIAL GROUP
15
specifically, the agency “decline[d] to make a determination”
at that time with respect to labeling genetically engineered
ingredients as “natural.” Id.
Once a district court determines that primary jurisdiction
is appropriate, it may either stay proceedings or dismiss the
case without prejudice. When the purpose of primary
jurisdiction is for “parties [to] pursue their administrative
remedies,” a district court will “[n]ormally” dismiss the case
without prejudice. Syntek, 307 F.3d at 782. However, when
a court invokes primary jurisdiction “but further judicial
proceedings are contemplated, then jurisdiction should be
retained by a stay of proceedings, not relinquished by a
dismissal.” N. Cal. Dist. Council of Hod Carriers v. Opinski,
673 F.2d 1074, 1076 (9th Cir. 1982).6 In either circumstance,
the district court must be attuned to the potential prejudice
arising from the dismissal of claims. Because the Ninth
Circuit “has not clearly adopted the doctrine of equitable
tolling in primary jurisdiction cases,” prudence dictates that
a court should stay proceedings rather than dismissing them
when there is a “possibility” that the running of the statute of
limitations during administrative proceedings could affect the
parties’ rights. United States v. Dan Caputo Co., 152 F.3d
1060, 1062 (9th Cir. 1998) (per curiam).
6
Indeed, this case demonstrates the mischief that can arise when a
district court dismisses claims rather than staying them while awaiting
agency action. Rather than seeking guidance from the FDA, Hain
attempted to leverage the district court’s dismissal on primary jurisdiction
into an outright dismissal of some of Astiana’s claims by arguing that she
had forfeited her right to request a stay in proceedings. Enabling such
“gotcha” litigation tactics is not the purpose of the primary jurisdiction
doctrine.
16
ASTIANA V. HAIN CELESTIAL GROUP
In dismissing the case rather than staying it, the court did
not consider whether the parties would be “unfairly
disadvantaged.” Reiter, 507 U.S. at 268. The purpose of
referral to the FDA was not for the agency to adjudicate
Astiana’s claims, but to provide expert advice that would be
useful to the court in considering this lawsuit. Plus,
dismissing the case had the potential to prejudice members of
the putative consumer class because of the running of the
statute of limitations. In light of these considerations, we
reverse the dismissal on primary jurisdiction grounds. On
remand, the district court may consider whether events during
the pendency of this appeal—including Astiana’s informal
letter, the FDA’s website publication of a Small Business
Fact Sheet regarding cosmetics labeling, and the FDA’s
response to the other courts—affect the need for further
proceedings at the FDA or demonstrate that another referral
to the agency would be futile.
III.
QUASI-CONTRACT
The district court dismissed Astiana’s quasi-contract
cause of action, concluding that restitution “is not a
standalone cause of action in California and is nonsensical as
pled in any event.” We part ways with the district court.
Astiana’s pleadings, though inartful, are better read as raising
a valid quasi-contract claim seeking the remedy of restitution.
As the district court correctly noted, in California, there
is not a standalone cause of action for “unjust enrichment,”
which is synonymous with “restitution.” Durell v. Sharp
Healthcare, 108 Cal. Rptr. 3d 682, 699 (Ct. App. 2010);
Jogani v. Superior Court, 81 Cal. Rptr. 3d 503, 511 (Ct. App.
2008). However, unjust enrichment and restitution are not
irrelevant in California law. Rather, they describe the theory
ASTIANA V. HAIN CELESTIAL GROUP
17
underlying a claim that a defendant has been unjustly
conferred a benefit “through mistake, fraud, coercion, or
request.” 55 Cal. Jur. 3d Restitution § 2. The return of that
benefit is the remedy “typically sought in a quasi-contract
cause of action.” Id.; see Munoz v. MacMillan, 124 Cal. Rptr.
3d 664, 675 (Ct. App. 2011) (“Common law principles of
restitution require a party to return a benefit when the
retention of such benefit would unjustly enrich the recipient;
a typical cause of action involving such remedy is
‘quasi-contract.’”).
When a plaintiff alleges unjust
enrichment, a court may “construe the cause of action as a
quasi-contract claim seeking restitution.”
Rutherford
Holdings, LLC v. Plaza Del Rey, 166 Cal. Rptr. 3d 864, 872
(Ct. App. 2014).
Astiana alleged in her First Amended Complaint that she
was entitled to relief under a “quasi-contract” cause of action
because Hain had “entic[ed]” plaintiffs to purchase their
products through “false and misleading” labeling, and that
Hain was “unjustly enriched” as a result.
This
straightforward statement is sufficient to state a quasicontract cause of action. To the extent the district court
concluded that the cause of action was nonsensical because
it was duplicative of or superfluous to Astiana’s other claims,
this is not grounds for dismissal. Fed. R. Civ. P. 8(d)(2) (“A
party may set out 2 or more statements of a claim or defense
alternatively or hypothetically, either in a single count or
defense or in separate ones.”).
REVERSED and REMANDED.
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page1 of 18
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
SAN JOSE DIVISION
7
8
ALICE SVENSON, individually and on
behalf of all others similarly situated,
Plaintiff,
9
v.
10
United States District Court
Northern District of California
11
12
GOOGLE INC., a Delaware Corporation,
and GOOGLE PAYMENT
CORPORATION, a Delaware Corporation,
Defendants.
13
Case No. 13-cv-04080-BLF
ORDER DENYING MOTION TO
DISMISS FOR LACK OF ARTICLE III
STANDING; AND GRANTING IN PART
AND DENYING IN PART MOTION TO
DISMISS FOR FAILURE TO STATE A
CLAIM
[Re: ECF 89]
14
Plaintiff Alice Svenson (“Svenson”) brings this putative class action to challenge the
15
16
alleged failure of Defendants Google, Inc. and Google Payment Corporation (collectively
17
“Google”) to honor the written privacy policies governing Google’s electronic payment service,
18
Google Wallet (“Wallet”). Google moves to dismiss the operative first amended complaint
19
(“FAC”) under Federal Rule of Civil Procedure 12(b)(1) for lack of Article III standing and under
20
Federal Rule of Civil Procedure 12(b)(6) for failure to state a claim. The Court has considered the
21
briefing and the oral argument presented at the hearing on January 15, 2015. For the reasons
22
discussed below, the motion to dismiss for lack of Article III standing is DENIED and the motion
23
to dismiss for failure to state a claim is GRANTED IN PART AND DENIED IN PART.
24
25
I.
BACKGROUND
Wallet is an electronic payment processing service operated by Google to facilitate
26
purchases of mobile device applications (“Apps”) from the Google Play Store (“Play Store”).
27
FAC ¶¶ 25-26. Wallet is the only method by which Apps may be purchased from the Play Store.
28
Id. ¶ 32. Wallet accounts are governed by the Google Wallet Terms of Service, which incorporate
United States District Court
Northern District of California
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page2 of 18
1
the Google Wallet Privacy Policy, which in turn incorporates the Google Privacy Policy. FAC ¶
2
54 and Exhs. A-C. The Google Wallet Privacy Policy states that Google may share a user’s
3
“personal information” only: (1) as permitted under the Google Privacy Policy; (2) as necessary
4
to process a user’s transaction and maintain a user’s account; or (3) to complete a user’s
5
registration for a service provided by a third party. Google Wallet Privacy Policy at 2, FAC Exh.
6
B, ECF 84-2. Under the Google Privacy Policy, Google may share a user’s “personal
7
information” only: (1) with the user’s consent; (2) with domain administrators; (3) for external
8
processing; and (4) for legal reasons. Google Privacy Policy at 3-4, FAC Exh. C, ECF 84-3.
9
Svenson alleges that prior to the filing of this lawsuit, Google’s practice was to ignore
10
these restrictions and, whenever a user purchased an App in the Play Store, to share the user’s
11
personal information with the App vendor. FAC ¶ 70-71. Svenson confusingly refers to this
12
personal information as “Packets Contents.” Id. ¶ 71. “Packets Contents” are defined in the FAC
13
as “the data, transmitted in packets sent by Plaintiff and the Class to Defendants, that provide
14
Defendants information necessary to execute the App purchase and does not include packets
15
record information such as control elements (e.g., electronic-addressing information that enables
16
the packets to arrive at their intended destination).” FAC ¶ 9. “Packets Contents” include
17
“personal information about Buyers, including credit card information, purchase authorization,
18
addresses, zip codes, names, phone numbers, email addresses, and/or other information.” Id. ¶ 10.
19
Svenson alleges that Google made “Packets Contents” available to the App vendor after collecting
20
the App purchase price, retaining a thirty percent cut of the purchase price, remitting the
21
remaining portion of the purchase price to the App vendor, and providing the buyer with a receipt.
22
Id. ¶¶ 71, 114. She asserts that Google’s sharing of the “Packets Contents” with the App vendor
23
was not necessary to the App purchases and was not otherwise authorized by the Google Wallet
24
Terms of Service. Id. ¶¶ 72-79. Svenson claims that Google ceased its blanket practice of sharing
25
users’ personal information with App vendors shortly after she filed this lawsuit. Id. ¶ 11.
26
On May 6, 2013, Svenson used Wallet to buy the “SMS MMS to Email” App in the Play
27
Store for $1.77. FAC ¶ 87-88. Google collected the $1.77 by debiting the payment instrument
28
associated with Svenson’s Wallet account. Id. ¶¶ 90-92. Google also made Svenson’s “Packets
2
United States District Court
Northern District of California
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page3 of 18
1
Contents” available to the App vendor, YCDroid. FAC ¶ 90. Because of the way that Svenson
2
defines the term “Packets Contents,” it is unclear exactly what information was shared with
3
YCDroid. The Court understands Svenson to be alleging that Google shared with YCDroid
4
“personal information,” as that term is used in the applicable privacy policies, even though
5
YCDroid did not need the information for the App transaction and sharing the information was not
6
authorized under the privacy policies.
7
Based upon these allegations, Svenson asserts claims on behalf of herself and those
8
similarly situated for: (1) breach of contract, (2) breach of the implied covenant of good faith and
9
fair dealing, (3) violation of the Stored Communications Act, 18 U.S.C. § 2701; (4) violation of
10
the Stored Communications Act, 18 U.S.C. § 2702; and (5) violation of California’s Unfair
11
Competition Law (“UCL”), California Business and Professions Code § 17200.
12
II.
LEGAL STANDARDS
13
A.
Rule 12(b)(1)
14
A motion to dismiss pursuant to Federal Rule of Civil Procedure 12(b)(1) raises a
15
challenge to the Court’s subject matter jurisdiction. See Fed. R. Civ. P. 12(b)(1). “Article III . . .
16
gives the federal courts jurisdiction over only cases and controversies.” Public Lands for the
17
People, Inc. v. United States Dep’t of Agric., 697 F.3d 1192, 1195 (9th Cir. 2012) (internal
18
quotation marks and citation omitted). “The oft-cited Lujan v. Defenders of Wildlife case states
19
the three requirements for Article III standing: (1) an injury in fact that (2) is fairly traceable to
20
the challenged conduct and (3) has some likelihood of redressability.” Id. at 1195-96 (citing Lujan
21
v. Defenders of Wildlife, 504 U.S. 555, 560-61 (1992)). If these requirements are not satisfied, the
22
action should be dismissed for lack of subject matter jurisdiction. See Steel Co. v. Citizens for a
23
Better Env’t, 523 U.S. 83, 109-10 (1998).
24
B.
Rule 12(b)(6)
25
“A motion to dismiss under Federal Rule of Civil Procedure 12(b)(6) for failure to state a
26
claim upon which relief can be granted ‘tests the legal sufficiency of a claim.’” Conservation
27
Force v. Salazar, 646 F.3d 1240, 1241-42 (9th Cir. 2011) (quoting Navarro v. Block, 250 F.3d
28
729, 732 (9th Cir. 2001)). When determining whether a claim has been stated, the Court accepts
3
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page4 of 18
1
as true all well-pled factual allegations and construes them in the light most favorable to the
2
plaintiff. Reese v. BP Exploration (Alaska) Inc., 643 F.3d 681, 690 (9th Cir. 2011). However, the
3
Court need not “accept as true allegations that contradict matters properly subject to judicial
4
notice” or “allegations that are merely conclusory, unwarranted deductions of fact, or
5
unreasonable inferences.” In re Gilead Scis. Sec. Litig., 536 F.3d 1049, 1055 (9th Cir. 2008)
6
(internal quotation marks and citations omitted). While a complaint need not contain detailed
7
factual allegations, it “must contain sufficient factual matter, accepted as true, to ‘state a claim to
8
relief that is plausible on its face.’” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atl.
9
Corp. v. Twombly, 550 U.S. 544, 570 (2007)). A claim is facially plausible when it “allows the
10
United States District Court
Northern District of California
11
court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Id.
III.
DISCUSSION
12
A.
Subject Matter Jurisdiction
13
Svenson clearly has Article III standing to bring her two claims under the Stored
14
Communications Act. See In re Zynga Privacy Litig., 750 F.3d 1098, 1105 n.5 (9th Cir. 2014)
15
(“Because the plaintiffs allege that Facebook and Zynga are violating statutes that grant persons in
16
the plaintiffs’ position the right to judicial relief, we conclude they have standing to bring this
17
claim.”). However, “Article III standing is [ ] claim- and relief-specific, such that a plaintiff must
18
establish Article III standing for each of her claims and for each form of relief sought.” In re
19
Adobe Sys., Inc. Privacy Litig., --- F. Supp. 2d ----, 2014 WL 4379916, at *10 (N.D. Cal. Sept. 4,
20
2014). Google asserts Svenson has not established Article III standing to bring her state law
21
claims for breach of contract, breach of the implied covenant, and unfair competition.
22
Specifically, Google asserts that she has not alleged that she suffered any cognizable injury in fact
23
that is fairly traceable to Google. As discussed below, Svenson has alleged facts sufficient to state
24
a claim for breach of contract, breach of the implied covenant of good faith and fair dealing, and
25
unfair competition, meaning that she has alleged that she suffered damages (“injury in fact”)
26
resulting from Google’s breach of contract, breach of the implied covenant, and unfair competition
27
(“fairly traceable to the challenged conduct”). See Public Lands for the People, 697 F.3d at 1195-
28
96 (reciting Lujan factors).
4
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page5 of 18
1
Accordingly, the motion to dismiss for lack of Article III standing is DENIED.
2
B.
3
4
1.
Claim 1 – Breach of Contract
Claim 1 alleges breach of contract. To succeed on a breach of contract claim under
5
California law, a plaintiff must establish a contract, the plaintiff’s performance or excuse for
6
nonperformance, the defendant’s breach, and resulting damages to the plaintiff. Pyramid Tech.,
7
Inc. v. Hartford Cas. Ins. Co., 752 F.3d 807, 818 (9th Cir. 2014).
8
9
United States District Court
Northern District of California
Failure to State a Claim
Svenson alleges that Wallet transactions are governed by the Google Wallet Terms of
Service, which incorporate terms of the Google Wallet Privacy Policy, which in turn incorporates
10
terms of the Google Privacy Policy. FAC ¶ 54 and Exhs. A-C. The privacy policies governing
11
Wallet are set forth in a fairly straightforward manner in those three documents, which are
12
attached to the FAC. Id. However, Svenson does not assert claims based directly upon those
13
documents. Instead, she alleges that separate and distinct “Buyer Contracts” are created each time
14
a user with a Wallet account makes a purchase in the Play Store, and that those “Buyer Contracts”
15
incorporate the then-current version of the Google Wallet Terms of Service. See FAC ¶¶ 34-53.
16
According to Svenson, the “Buyer Contracts” are different from “Customer” contracts entered into
17
by users who merely register for a Wallet account but never make a purchase. See id.
18
Based upon the prior pleading and argument, the Court had understood there to be one
19
contract entered into when a user obtains a Wallet account. While the Court had understood
20
different contract provisions to cover different circumstances – e.g., Wallet being used to purchase
21
Apps versus Wallet lying dormant after initial registration – the Court was under the impression
22
that all those circumstances were addressed in a single contract. However, Svenson now alleges
23
expressly that a new contract is formed each and every time a user purchases an App in the Play
24
Store. See FAC ¶¶ 34-35. Google urges the Court to reject that allegation as implausible in light
25
of Svenson’s allegation in the original complaint that she agreed to the Google Wallet Terms of
26
Service when she registered for Wallet. See Defs.’ Reply at 5 n.2, ECF 95. Google relies upon
27
cases holding that when determining plausibility of allegations in an amended complaint, the
28
Court may consider contradictory allegations made in prior iterations of the complaint. See
5
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page6 of 18
1
Kennedy v. Wells Fargo Bank, N.A., No. C 11-0675 MMC, 2011 WL 3359785, at *5 (N.D. Cal.
2
Aug. 2, 2011) ; Fasugbe v. Willms, No. CIV 2:10-2320 WBS KNJ, 2011 WL 2119128, at *5 (E.D.
3
Cal. May 26, 2011); Stanislaus Food Prods. Co. v. USS-POSCO Indus., 782 F. Supp. 2d 1059,
4
1075 (E.D. Cal. 2011).
United States District Court
Northern District of California
5
Plaintiff does not dispute that some users agree to the Google Wallet Terms of Service
6
when initially registering for Wallet. However, she alleges that even after initially registering for
7
Wallet, users are required to enter into a new and separate “Buyer Contract” in order to complete
8
each subsequent App purchase. FAC ¶ 34-35. According to Svenson, a “Buyer Contract” is not
9
complete until the user making the purchase in the Play Store clicks a button that (1) indicates
10
consent to the Google Wallet Terms of Service existing at the time of the purchase and (2)
11
authorizes Google to execute the transaction. Id. ¶ 42. It is not clear from the FAC whether
12
Svenson initially registered for Wallet and then later purchased the App or whether she registered
13
for Wallet concurrently with purchasing the App. See id. ¶¶ 87-88. The Court concludes that this
14
lack of clarity makes little difference, as under Svenson’s theory even a user who already has a
15
Wallet account must enter into a new “Buyer Contract” at the time of each subsequent App
16
purchase. Thus the Court does not view Svenson’s current allegations to be irreconcilable with
17
her earlier allegations. Moreover, to the extent that Google disputes the factual accuracy of the
18
current allegations – that a separate “Buyer Contract” is created each and every time a user
19
purchases an App in the Play Store – resolution of that factual dispute is not appropriate on a
20
motion to dismiss. Nothing in this order precludes Google from challenging Svenson’s allegations
21
regarding “Buyer Contracts” in a motion for summary judgment or at another appropriate point in
22
the litigation. However, for pleading purposes, Plaintiff adequately has alleged the existence of a
23
“Buyer Contract” between herself and Google.
24
Svenson alleges that she performed her obligations under the “Buyer Contract” and that
25
Google breached the “Buyer Contract” by sharing her personal information – or “Packets
26
Contents” – with YCDroid when such sharing was not necessary to her App purchase and was not
27
otherwise authorized under the “Buyer Contract.” FAC ¶¶ 139, 149. Those allegations are
28
sufficient to satisfy the second and third elements of a contract claim. Google’s motion turns on
6
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page7 of 18
United States District Court
Northern District of California
1
the fourth element, damages resulting from the breach.
2
Benefit of the Bargain
3
The FAC articulates two theories of contract damages – benefit of the bargain and
4
diminution in value of Svenson’s personal information.1 Addressing benefit of the bargain first,
5
“[c]ontract damages compensate a plaintiff for its lost expectation interest. This is described as
6
the benefit of the bargain that full performance would have brought.” New West Charter Middle
7
School v. Los Angeles Unified School Dist., 187 Cal. App. 4th 831, 844 (2010). In Chavez v. Blue
8
Sky Natural Beverage Co., 340 Fed. Appx. 359 (9th Cir. 2009), the Ninth Circuit concluded that
9
the plaintiff had made out a benefit of the bargain damages theory where he alleged that he had
10
purchased Blue Sky soda instead of other brands based on representations that Blue Sky was a
11
New Mexico company; Blue Sky was not bottled or produced in New Mexico; he would not have
12
purchased Blue Sky had he known the truth about the product’s geographic origin; and as a result
13
he lost money because he did not receive what he had paid for. Id. at 361.
In her original complaint, Svenson alleged that a portion of the $1.77 App purchase price
14
15
compensated Google for the service of facilitating the App transaction without disclosing her
16
personal information; and that she was denied the benefit of her bargain when Google facilitated
17
the App transaction but disclosed her personal information to the third-party vendor. The Court
18
concluded that those allegations were insufficient to show contract damages, noting among other
19
things that Svenson had not alleged facts showing that any portion of the $1.77 App purchase
20
price was retained by Google, or that the $1.77 App purchase price was intended to pay for
21
anything other than the App, which Svenson received. Order of Aug. 12, 2014 at 7, ECF 83.
22
Svenson now alleges that “Defendants’ payment-processing services provided under Buyer
23
Contracts are not free: Defendants keep a percentage of the purchase price for each App purchase
24
they process.” FAC ¶ 142. She also alleges that “[t]he percentage of the App sales price
25
26
27
28
1
Plaintiff’s original complaint also alleged that Google’s conduct exposed her to increased risk of
identity theft. The Court’s prior order made clear that the Court viewed that theory of contract
damages to be untenable, see Order of Aug. 12, 2014 at 8, ECF 83, and Svenson has not repeated
that theory here in connection with her contract claim, although she does allege increased risk of
identity theft in connection with her unfair competition claim, see FAC ¶¶ 240, 243.
7
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page8 of 18
1
Defendants retained is the money Defendants earned from Plaintiff’s and Class Members’
2
purchases of Apps under the Buyer Contracts.” Id. ¶ 148.
United States District Court
Northern District of California
3
Svenson also has clarified her contract theory as follows: under the “Buyer Contract”
4
created at the time of her App purchase, the parties were to receive certain benefits: she was to
5
receive a payment processing service that would facilitate her Play Store purchase while keeping
6
her private information confidential in all but specific circumstances under which disclosure was
7
authorized; and Google was to obtain access to her personal information, which had value to
8
Google, and also was to retain a percentage of the App’s purchase price. Id. ¶¶ 142-150. Google
9
did obtain Svenson’s personal information and did retain a percentage of the purchase price of the
10
“SMS MMS to Email” App, but she did not receive the contracted-for privacy protections. Id. ¶¶
11
148, 151-52. Svenson alleges that “[t]he services Plaintiff and Class Members ultimately
12
received in exchange for Defendants’ cut of the App purchase price – payment processing, in
13
which their information was unnecessarily divulged to an unaccountable third party – were worth
14
quantifiably less than the services they agreed to accept, payment processing in which the data
15
they communicated to Defendants would only be divulged under circumstances which never
16
occurred.” Id. ¶ 151. She also alleges that “[h]ad Plaintiff known Defendants would disclose her
17
Packets Contents, she would not have purchased the ‘SMS MMS to Email’ App from
18
Defendants.” Id. ¶ 96. Svenson alleges that the App “is available from numerous other App
19
stores besides Google Play, including AppBrain and App Annie.” Id. ¶ 95. Under the rationale of
20
Chavez, discussed above, the Court concludes that Svenson has alleged facts sufficient to show
21
contract damages under a benefit of the bargain theory.
22
Diminution of Value of Personal Information
23
Svenson also alleges that Google’s conduct in making her personal information available
24
to YCDroid diminished the sales value of that personal information. FAC ¶ 125. As the Court
25
recognized in its prior order, the Ninth Circuit expressly has recognized that this type of allegation
26
may be sufficient to establish the element of damages for a breach of contract claim. See In re
27
Facebook Privacy Litig., 572 Fed. Appx. 494 (9th Cir. 2014). The Court concluded that
28
Svenson’s original complaint did not allege facts sufficient to make out this theory of contract
8
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page9 of 18
1
damages because it did not allege a market for Svenson’s personal information. Order of Aug. 12,
2
2014 at 8, ECF 83. Svenson now alleges that “[t]here is a robust market for the type of
3
information contained within the Packets Contents,” FAC ¶ 98, and that “[a]s a result of
4
Defendants’ actions, Plaintiff and the Class have been deprived of their ability to sell their own
5
personal data on the market,” Id. ¶ 157.
United States District Court
Northern District of California
6
Google asserts that more is required to allege contract damages under a diminution in value
7
theory, citing district court decisions requiring factual specificity as to how the defendant’s use of
8
the information deprived the plaintiff of the information’s economic value. See Opperman v.
9
Path, Inc., No. 13-cv-00453-JST, 2014 WL 1973378, at *23 (N.D. Cal. May 14, 2014) (“a
10
plaintiff must allege how the defendant’s use of the information deprived the plaintiff of the
11
information’s economic value”); Google, Inc. Privacy Policy Litig., No. C-12-01382-PSG, 2013
12
WL 6248499, at *5 (N.D. Cal. Dec. 3, 2013) (same); Google Android Consumer Privacy Litig.,
13
No. 11-MD-02264-JSW, 2013 WL 1283236, at *4 (N.D. Cal. Mar. 26, 2013) (“Plaintiffs also do
14
not allege they attempted to sell their personal information, that they would do so in the future, or
15
that they were foreclosed from entering into a value for value transaction relating to their PII, as a
16
result of the Google Defendants’ conduct.”). All but one of the cited decisions issued before the
17
Ninth Circuit’s May 2014 Facebook Privacy Litig. decision. Opperman, which issued six days
18
after Facebook Privacy Litig., does not cite it. The Ninth Circuit’s holding does not require the
19
type of explication discussed by the district court decisions, holding as follows:
20
23
Plaintiffs allege that the information disclosed by Facebook can be used to obtain
personal information about plaintiffs, and that they were harmed both by the
dissemination of their personal information and by losing the sales value of that
information. In the absence of any applicable contravening state law, these
allegations are sufficient to show the element of damages for their breach of
contract and fraud claims. Therefore, the district court erred in dismissing these
state law claims.
24
Facebook Privacy Litig., 572 Fed. Appx. at 494 (internal citations omitted). In light of the Ninth
25
Circuit’s ruling, this Court concludes that Svenson’s allegations of diminution in value of her
26
personal information are sufficient to show contract damages for pleading purposes.
21
22
27
Accordingly, the motion to dismiss is DENIED as to Claim 1.
28
9
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page10 of 18
1
2
Claim 2 – Breach of the Implied Covenant
Claim 2 alleges breach of the implied covenant of good faith and fair dealing. “‘The
3
implied promise [of good faith and fair dealing] requires each contracting party to refrain from
4
doing anything to injure the right of the other to receive the benefits of the agreement.’” Avidity
5
Partners, LLC v. State of Cal., 221 Cal. App. 4th 1180, 1204 (2013) (quoting Egan v. Mutual of
6
Omaha Ins. Co., 24 Cal. 3d 809, 818 (1979)). “The implied covenant of good faith and fair
7
dealing does not impose substantive terms and conditions beyond those to which the parties
8
actually agreed.” Id.
9
United States District Court
Northern District of California
2.
The Court previously dismissed Svenson’s claim for breach of the implied covenant after
10
concluding that it was duplicative of her claim for breach of contract in that it alleged no more
11
than Google’s disclosure of her personal information. See Order of Aug. 12, 2014 at 9, ECF 83.
12
In the FAC, Svenson alleges that among the benefits conferred upon her and the Class by the
13
“Buyer Contracts,” which incorporated the Google Wallet Terms of Service, were privacy
14
protections arising out of Google’s obligation not to disclose their personal information except as
15
necessary to a transaction or as otherwise specifically authorized. FAC ¶¶ 162-63. She alleges
16
further that “the Wallet Terms are standardized and non-negotiable terms that Defendants, at their
17
own discretion, interpreted to carry out the above-described privacy promises in a way that
18
resulted in the unnecessary disclosure of Plaintiff and other Class members’ Packets Contents to
19
third-party App Vendors.” Id. ¶ 164. Specifically, Plaintiff alleges that “while Defendants may
20
share personal information with third parties if ‘necessary to process the user’s transaction and
21
maintain the user’s account,’ that provision is not reasonably interpreted to allow blanket,
22
universal disclosure of any or all of the Packets Contents to third-party App Vendors” in
23
connection with every App purchase in the Play Store. FAC ¶ 165 (emphasis added). Svenson
24
alleges that “[t]he agreed common purpose of the Wallet Terms was for Buyers to be able to
25
privately purchase Apps from App Vendors,” and that Google exercised its discretion under the
26
Wallet Terms of Service in a way that frustrated that purpose. See id. ¶¶ 165, 168, 170. The Court
27
concludes that this theory and these allegations are sufficient to state a claim for breach of the
28
implied covenant of good faith and fair dealing.
10
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page11 of 18
1
Google points out, correctly, that Svenson’s implied covenant claim also contains
2
allegations that Google did not inform users that their personal information would be shared with
3
App vendors in connection with every transaction, see FAC ¶¶ 167, 169, and that the alleged
4
failure to inform is insufficient to state a claim for breach of the implied covenant absent an
5
allegation that Google had a duty to inform. At the hearing, the Court engaged in a colloquy with
6
counsel as to whether it would make sense to go through another round of amendment and –
7
presumably – motion practice, or whether the allegations in the FAC were sufficient to move
8
forward on the implied covenant claim. Viewing the claim as a whole, the Court concludes that
9
Svenson does allege a viable claim for breach of the implied covenant despite her stray, non-
10
United States District Court
Northern District of California
11
12
13
actionable allegations regarding Google’s failure to disclose.
Accordingly, the motion to dismiss is DENIED as to Claim 2.
3.
Claim 3 – Violation of SCA § 2701
Claim 3 alleges that disclosure of Svenson’s personal information violated § 2701 of the
14
Stored Communications Act (“SCA”), 18 U.S.C. § 2701. The Court previously dismissed Claim 3
15
without leave to amend. See Order of Aug. 12, 2014 at 11, ECF 83. Svenson acknowledges the
16
Court’s prior order and makes clear that she has included Claim 3 in her FAC to preserve her
17
appeal rights. Thus no substantive discussion of Claim 3 is required here.
18
19
20
21
22
23
24
25
26
27
28
The motion to dismiss is GRANTED WITHOUT LEAVE TO AMEND as to Claim 3.
4.
Claim 4 – Violation of SCA § 2702
Claim 4 alleges that disclosure of Svenson’s personal information violated § 2702 of the
SCA, which creates a private right of action for violation of the following provisions:
(a) Prohibitions. – Except as provided in subsection (b) or (c) –
(1) a person or entity providing an electronic communication service to the
public shall not knowingly divulge to any person or entity the contents of a
communication while in electronic storage by that service; and
(2) a person or entity providing remote computing service to the public shall not
knowingly divulge to any person or entity the contents of any communication
which is carried or maintained on that service –
(A) on behalf of, and received by means of electronic transmission from (or
created by means of computer processing of communications received by
means of electronic transmission from), a subscriber or customer of such
11
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page12 of 18
1
2
3
4
5
6
7
8
United States District Court
Northern District of California
9
service;
(B) solely for the purpose of providing storage or computer processing
services to such subscriber or customer, if the provider is not authorized to
access the contents of any such communications for purposes of providing
any services other than storage or computer processing; and
(3) a provider of remote computing service or electronic communication service
to the public shall not knowingly divulge a record or other information
pertaining to a subscriber to or customer of such service (not including the
contents of communications covered by paragraph (1) or (2)) to any
governmental entity.
18 U.S.C. § 2702(a) (emphasis added); see id. § 2707(a) (creating a private right of action).
While a provider described in subsection (a) may not disclose the “contents of a
communication,” such provider may divulge “a record or other information” regarding a
10
subscriber or customer to “any person other than a governmental entity” and to governmental
11
entities under certain circumstances. 18 U.S.C. § 2702(c) (emphasis added).
12
Google’s motion does not challenge Google’s status as an entity “providing an electronic
13
communication service” and/or “providing remote computing service” within the meaning of §
14
2702(a). The question presented by this motion is whether the “Packets Contents” Google sent
15
YCDroid was “contents of a communication” or “a record or other information”; if the former,
16
Svenson has made out a claim under § 2702(a), but if the latter she has not.
17
In its prior order, the Court discussed at length the available case law on the issue of
18
“record information” versus “contents of a communication.” See Order of Aug. 12, 2014 at 11-15,
19
ECF 83. In Zynga, the Ninth Circuit defined “contents of a communication” as “any information
20
concerning the substance, purport, or meaning of that communication.” Zynga, 750 F.3d at 1105
21
(citing 18 U.S.C. § 2510(8)); see also id. at 1104 (noting that the SCA incorporates the Wiretap
22
Act’s definition of “contents”). The Ninth Circuit explained that “the term ‘contents’ refers to the
23
intended message conveyed by the communication, and does not include record information
24
regarding the characteristics of the message that is generated in the course of the communication.”
25
Id. at 1106. The Ninth Circuit has recognized that record information generally includes “the
26
name, address, or client ID number of the entity’s customers.” Id. at 1104.
27
28
In Zynga, the plaintiffs claimed that when users clicked on certain ads or icons on a
Facebook webpage, the web browser sent a request to access the resource identified by the link
12
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page13 of 18
1
and also sent a “referer header” comprising the user’s Facebook ID and the address of the
2
Facebook webpage the user was viewing when the user clicked the link. Zynga, 750 F.3d at 1101-
3
02. The plaintiffs alleged that the referer header constituted contents of a communication such
4
that its transmission to third parties violated § 2702(a). The Ninth Circuit held that the referer
5
header did not meet the definition of “contents.” Id. at 1107. Equating the Facebook ID with a
6
user’s “name” or “subscriber number or identity,” and equating the webpage address with a user’s
7
“address,” the Ninth Circuit held that “these pieces of information are not the ‘substance, purport,
8
or meaning’ of a communication.” Id.
United States District Court
Northern District of California
9
The Ninth Circuit distinguished In re Pharmatrak, 329 F.3d 9 (1st Cir. 2003), a Wiretap
10
Act case in which the defendants allegedly intercepted the contents of electronic communications,
11
specifically, information that individuals provided to online pharmaceutical websites. That
12
information included the individuals’ “names, addresses, telephone numbers, email addresses,
13
dates of birth, genders, insurance statuses, education levels, occupations, medical conditions,
14
medications, and reasons for visiting the particular website.” Id. at 15. It was undisputed that the
15
information constituted “contents” of a communication under the circumstances of the case; the
16
arguments focused on whether the “interception” element of the Wiretap Act claim was satisfied
17
and whether the consent exception applied. Id. at 18. The Ninth Circuit opined in Zynga that the
18
information in Pharmatrak properly was characterized as contents of a communication “[b]ecause
19
the users had communicated with the website by entering their personal medical information into
20
a form provided by a website.” Zynga, 750 F.3d at 1107 (emphasis added). The Ninth Circuit
21
distinguished the case before it by noting that the Zynga defendants did not divulge a user’s
22
communications to a website but allegedly “divulged identification and address information
23
contained in a referrer header automatically generated by the web browser.” Id.
24
Although Zynga distinguished Pharmatrak in part on the basis that the referrer header at
25
issue in Zynga was automatically generated, this Court does not read Zynga so narrowly to mean
26
that only automatically generated data may constitute record information. The Court reads Zynga
27
and cases in this district to define “record information” as including a user’s name, email address,
28
account name, mailing address, and the like. See Zynga at 1104 (recognizing that record
13
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page14 of 18
1
information generally includes “the name, address, or client ID number of the entity’s
2
customers”); Chevron Corp. v. Donziger, No. 12-mc-80237 CRB (NC), 2013 WL 4536808, at *6
3
(N.D. Cal. Aug. 22, 2013) (characterizing information associated with the creation of an email
4
address, including names, mailing addresses, phone numbers, billing information, and date of
5
account creation, as “record or other information” and not “contents” of a communication);
6
Obodai v. Indeed, Inc., No. 13-80027-MISC EMC (KAW), 2013 WL 1191267, at *3 (N.D. Cal.
7
Mar. 21, 2013) (holding that no “content” of communications was implicated by a subpoena
8
seeking “subscriber information” provided when a user creates a Gmail account, such as phone
9
numbers and alternative email addresses). To hold that such information constitutes contents of a
10
United States District Court
Northern District of California
11
communication unless it was automatically generated would read § 2702(c) out of the statue.
This Court previously dismissed Claim 4 after concluding that the personal information
12
described in the original complaint – “the user’s name, email address, Google account name, home
13
city and state, zip code, and in some instances telephone number,” Compl. ¶ 49, ECF 5-1 –
14
constituted “record information” rather than “contents of a communication.” See Order of Aug.
15
12, 2014 at 11-15, ECF 83. Because the § 2702 claim had not previously been challenged by
16
motion or addressed by the Court, Svenson was granted an opportunity to amend. Id. at 15.
17
However, the Court cautioned that “[g]iven the analysis set forth herein, Plaintiff must consider
18
whether she can allege additional facts that would demonstrate that the alleged disclosure was
19
more than record information.” Id. Google argues, and the Court agrees, that Svenson has not
20
alleged such facts.
21
The “Packets Contents” described in the FAC are alleged to include “personal information
22
about Buyers, including credit card information, purchase authorization, addresses, zip codes,
23
names, phone numbers, email addresses, and/or other information.” FAC ¶ 10. Despite the
24
inclusion in this definition of the term “credit card information,” however, it does not appear that
25
App vendors are given access to user’s credit card numbers. See FAC ¶ 74 (alleging that third
26
party App vendors are given access to “the respective Buyer’s identity, address, city, zip code,
27
email address, or telephone number”). Svenson’s opposition concedes that credit card information
28
is not actually provided to App vendors. See Pls.’ Opp. at 15 n.14, ECF 94. Accordingly, the
14
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page15 of 18
1
“Packets Contents” are not materially different from the personal information alleged to have been
2
disclosed in the original complaint. Compare Compl. ¶ 49, ECF 5-1, with FAC ¶¶ 10, 74, ECF 84.
3
Svenson’s opposition to Google’s motion relies largely upon same cases discussed by the Court in
4
its prior order. See, e.g., Zynga, 750 F.3d 1098; Pharmatrak, 329 F.3d 9; Yunker v. Pandora
5
Media, Inc., No. 11-cv-03113 JSW, 2013 WL 1282980 (N.D. Cal. Mar. 26, 2013). Because none
6
of Svenson’s factual allegations or legal arguments are materially different from those considered
7
and rejected by the Court previously2, the Court declines to reconsider its prior ruling.
Accordingly, the motion to dismiss is GRANTED WITHOUT LEAVE TO AMEND as to
8
9
Claim 4.
5.
10
Claim 5 asserts a violation of California Business & Professions Code § 17200. In order to
11
United States District Court
Northern District of California
Claim 5 – Violation of California’s UCL
12
state a claim for relief under that provision, Plaintiff must allege facts showing that Defendants
13
engaged in an “unlawful, unfair or fraudulent business act or practice.” Cal. Bus. & Prof. Code §
14
17200. “Because the statute is written in the disjunctive, it is violated where a defendant’s act or
15
practice violates any of the foregoing prongs.” Davis v. HSBC Bank Nevada, N.A., 691 F.3d 1152,
16
1168 (9th Cir. 2012). In addition to identifying a practice under one of the above prongs, a
17
plaintiff must allege that he or she has suffered (1) economic injury (2) as a result of the practice.
18
See Kwikset Corp. v. Sup.Ct., 51 Cal. 4th 310, 323 (2011). Specifically, the plaintiff must allege
19
that he or she “suffered injury in fact and has lost money or property as a result of the unfair
20
competition.” Cal. Bus. & Prof. Code § 17204.
The Court previously dismissed Svenson’s UCL claim for failing to allege economic injury
21
22
arising from the challenged business practice as required by Kwikset. See Order of Aug. 12, 2014
23
at 16, ECF 83. In particular, the Court concluded that “Plaintiff alleges that she purchased an App
24
for $1.77 and received that App,” and that she had “not alleged facts showing that she suffered any
25
26
27
28
2
Svenson does advance one new legal argument, that the Court is charged with the “interpretive
duty” to find the interpretation of § 2702 that is most harmonious with its purpose of prohibiting
disclosure of the contents of electronic communications. See Pl.’s Opp. at 15, ECF at 15. This
argument does not advance Svenson’s position, as she has failed to allege facts showing that the
personal information at issue is “contents of a communication” rather than “record information.”
15
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page16 of 18
1
damages resulting from that transaction.” Id. Google contends that Svenson has not cured this
2
defect. However, as discussed above in connection with the contract claim, Svenson now alleges
3
that “Defendants’ payment-processing services provided under Buyer Contracts are not free:
4
Defendants keep a percentage of the purchase price for each App purchase they process.” FAC ¶
5
142. She also alleges that “[t]he percentage of the App sales price Defendants retained is the
6
money Defendants earned from Plaintiff’s and Class Members’ purchases of Apps under the
7
Buyer Contracts.” Id. ¶ 148. Svenson thus alleges that she paid Google for services that she did
8
not receive as a result of Google’s unlawful and unfair business practices, establishing economic
9
injury.
United States District Court
Northern District of California
10
The Court did not previously consider whether Svenson had alleged facts sufficient to meet
11
the other pleading requirements for UCL claims. Svenson asserts claims under the unlawful and
12
unfair prongs. With respect to the former, “[b]y proscribing any unlawful business practice,
13
section 17200 borrows violations of other laws and treats them as unlawful practices that the
14
unfair competition law makes independently actionable.” Chabner v. United of Omaha Life Ins.
15
Co., 225 F.3d 1042, 1048 (9th Cir. 2000) (internal quotation marks and citation omitted). Svenson
16
relies upon alleged violations of the SCA, which are insufficient for the reasons discussed in
17
connection with Claims 3 and 4, above. However, she also relies upon alleged violations of
18
California Business and Professions Code § 22576, which prohibits an operator of a commercial
19
web site or online service from failing to comply with its own privacy policies. Id. ¶¶ 222-223.
20
Svenson’s allegations regarding Google’s policy of disclosing personal information in connection
21
with all App purchases, in violation of its own privacy policies, thus are sufficient to state a claim
22
under the unlawful prong. See id. ¶¶ 223-224.
23
With respect to the unfair prong, “the UCL does not define the term ‘unfair’ as used in
24
Business and Professions Code section 17200.” Durell v. Sharp Healthcare, 183 Cal. App. 4th
25
1350, 1364 (2010). Nor has the California Supreme Court established a definitive test to
26
determine whether a business practice is unfair. Phipps v. Wells Fargo Bank, N.A., No. CV F 10–
27
2025 LJO SKO, 2011 WL 302803, at *16 (E.D. Cal. Jan. 27, 2011). Three lines of authority have
28
developed among the California Courts of Appeal. In the first line, the test requires “that the
16
United States District Court
Northern District of California
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page17 of 18
1
public policy which is a predicate to a consumer unfair competition action under the unfair prong
2
of the UCL must be tethered to specific constitutional, statutory, or regulatory provisions.” Drum
3
v. San Fernando Valley Bar Ass’n, 182 Cal. App. 4th 247, 257 (2010) (internal quotation marks
4
and citation omitted). A second line of cases applies a test to determine whether the identified
5
business practice is “immoral, unethical, oppressive, unscrupulous or substantially injurious to
6
consumers and requires the court to weigh the utility of the defendant’s conduct against the gravity
7
of the harm to the alleged victim.” Id. (internal quotation marks and citation omitted). The third
8
test draws on the definition of “unfair” from antitrust law and requires that “(1) the consumer
9
injury must be substantial; (2) the injury must not be outweighed by any countervailing benefits to
10
consumers or competition; and (3) it must be an injury that consumers themselves could not
11
reasonably have avoided.” Id. (internal quotation marks and citation omitted). Svenson alleges
12
that Google’s alleged practice of disclosing personal information in connection with all App
13
purchases is “oppressive, immoral, unethical, and unscrupulous,” and that it effects substantial
14
consumer injury that is “not outweighed by any countervailing benefit to consumers or to
15
competition.” FAC ¶¶ 225, 229. The details of Google’s alleged practice of violating its privacy
16
policies, and the resulting injuries to Svenson and the Class arising from such practice, are
17
discussed in detail above and need not be set forth again here. See id. ¶¶ 225-244. The Court
18
concludes that Svenson has made out a UCL claim under the unfair prong as well as under the
19
unlawful prong.
20
Google argues that Svenson’s UCL claim is governed by the standards applicable to the
21
fraudulent prong even though she specifically confines her allegations to the unlawful and unfair
22
prongs. “[A] consumer’s burden of pleading causation in a UCL action should hinge on the nature
23
of the alleged wrongdoing rather than the specific prong of the UCL the consumer invokes.”
24
Durell, 183 Cal. App. 4th at 1363. Thus a claim that is based upon alleged misrepresentation and
25
deception requires an allegation of actual reliance even if brought under the unlawful or unfair
26
prongs rather than the fraudulent prong. Kearns v. Ford Motor Co., 567 F.3d 1120, 1125 (9th Cir.
27
2009) (fraud requirements may apply to claim brought under unfair prong); Durell, 183 Cal. App.
28
4th at 1363 (reliance requirement may apply to claim brought under unlawful prong). According
17
United States District Court
Northern District of California
Case5:13-cv-04080-BLF Document118 Filed04/01/15 Page18 of 18
1
to Google, the thrust of the UCL claim is that Google misrepresented its practices with respect to
2
disclosure of user information. Thus, Google asserts, Svenson must allege reliance upon those
3
misrepresentations in order to state a claim. Svenson does not allege that she read or relied upon
4
the Google Wallet Terms of Service or the privacy provisions contained therein.
5
The Court is not persuaded by Google’s characterization of Svenson’s UCL claim. Her
6
unlawful prong claim alleges in a straightforward manner that Google violated its own privacy
7
policies in violation of California Business and Professions Code § 22576. No reliance is required
8
for a violation of § 22576. With respect to the unfair prong, Svenson does not alleged that she
9
entered into the “Buyer Contract” in reliance upon misrepresentations regarding the privacy
10
protections contained therein. She alleges that that privacy protections were contract benefits to
11
which she was entitled and that Google’s practice of making “blanket, universal disclosure of any
12
or all of the Packets Contents to third-party App Vendors” in connection with every App purchase
13
in the Play Store deprived her (and the Class) of any opportunity to receive those benefits. FAC
14
¶¶ 163-65. “[A] breach of contract may . . . form the predicate for Section 17200 claims, provided
15
it also constitutes conduct that is unlawful, or unfair, or fraudulent.” Puentes v. Wells Fargo
16
Home Mortg., Inc., 160 Cal. App. 4th 638, 645 (2008) (internal quotation marks and citation
17
omitted) (alterations in original). Svenson’s allegation that Google had a policy that by its very
18
nature frustrated “[t]he agreed common purpose of the Wallet Terms [ ] for Buyers to be able to
19
privately purchase Apps from App Vendors,” FAC ¶ 168, is sufficient to take her claim beyond
20
mere breach of contract and into the realm of unfair competition prohibited by the UCL.
Based upon the foregoing, the motion to dismiss is DENIED as to Claim 5.
21
22
IV.
ORDER
23
(1)
Defendants’ Motion to Dismiss for lack of Article III standing is DENIED;
24
(2)
Defendants’ Motion to Dismiss for failure to state a claim is GRANTED as to
Claims 3 and 4 without leave to amend and DENIED as to Claims 1, 2, and 5; and
25
26
27
28
(3)
Defendants shall file an answer on or before April 16, 2015.
Dated: April 1, 2015
______________________________________
BETH LABSON FREEMAN
United States District Judge
18
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page1 of 21
1
2
3
4
5
6
UNITED STATES DISTRICT COURT
7
NORTHERN DISTRICT OF CALIFORNIA
8
SAN JOSE DIVISION
United States District Court
For the Northern District of California
9
10
11
TRACEE SWEET, et. al.,
12
Plaintiffs,
13
14
v.
LINKEDIN CORPORATION,
15
Defendant.
16
17
18
19
)
)
)
)
)
)
)
)
)
)
Case No. 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO
DISMISS
(Re: Docket No. 18)
Tracee Sweet wanted to work in the hospitality industry. 1 After submitting her resume to a
potential employer through LinkedIn, she was invited to an interview. 2 Sweet thought things went
well, especially when she later got word that she would be hired. 3 But soon thereafter, the
company called her back and said it had changed its mind. 4 Sweet did not get the job. 5
20
21
22
23
1
See Docket No. 1 at ¶ 52.
24
2
See id. at ¶¶ 52-55.
25
3
See id. at ¶ 56.
26
4
See id. at ¶ 57.
27
5
See id.
28
1
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page2 of 21
1
When Sweet asked why she was first told she had the job and then was told the opposite,
2
the general manager told her what happened. 6 The company had checked some references and,
3
based on those references, changed its mind. 7 What Sweet did not learn until later was that these
4
references may have been the result of LinkedIn’s “References Searches” function. 8 Using
5
Reference Searches, employers can find people with whom an applicant may have worked
6
previously. 9
Each Plaintiff had a similar experience. 10 Believing that Reference Searches cost them
United States District Court
For the Northern District of California
7
8
jobs, they filed suit against Defendant LinkedIn Corporation, alleging that the function violated
9
their rights under the Fair Credit Reporting Act. 11 Because Plaintiffs have not alleged sufficient
10
facts to support a plausible FCRA claim, their claims must be dismissed.
11
I.
12
“The purpose of the Fair Credit Reporting Act, 15 U.S.C. § 1681 et seq., is to protect
13
consumers from the transmission of inaccurate information about them.” 12 In enacting the FCRA,
14
Congress found that “[t]here is a need to insure that consumer reporting agencies exercise their
15
grave responsibilities with fairness, impartiality, and a respect for the consumer’s right to
16
privacy.” 13 To fulfill this need, the FCRA requires consumer reporting agencies to “adopt
17
reasonable procedures for meeting the needs of commerce for consumer credit, personnel,
18
19
20
6
See id. at ¶ 58.
21
7
See id.
22
8
See id. at ¶¶ 47-49.
23
9
See id. at ¶¶ 33-35.
24
10
See id. at ¶¶ 49-50, 59-69.
25
11
See id. at ¶ 3.
26
12
Kates v. Croker National Bank, 776 F.2d 1396, 1397 (9th Cir. 1985).
27
13
15 U.S.C. § 1681(a)(4).
28
2
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page3 of 21
1
insurance, and other information in a manner which is fair and equitable to the consumer, with
2
regard to the confidentiality, accuracy, relevancy and proper utilization of such information.” 14
3
4
Various sections of the FCRA apply only to “consumer reporting agencies” which provide
“consumer reports.” 15 The FCRA defines “a consumer report” as:
5
[A]ny written, oral or other communication of any information by a consumer reporting
agency bearing on a consumer’s credit worthiness, credit standing, credit capacity,
character, general reputation, personal characteristics, or mode of living which is used or
expected to be used or collected in whole or in part for the purpose of serving as a factor in
establishing the consumer’s eligibility for. . .
6
7
8
(B) employment purposes; or
United States District Court
For the Northern District of California
9
10
(C) any other purpose authorized under section 1681b of this title. 16
11
LinkedIn “operates an online professional network called LinkedIn, through which the
12
company’s subscribers are able to create, manage and share their professional identities online.” 17
13
LinkedIn allows anyone to become a LinkedIn member by signing up and “creat[ing] her/his own
14
professional profile, complete with a listing of professional experience and educational
15
background, among other things.” 18 Once a person has created a profile on LinkedIn, he or she can
16
17
18
19
20
21
22
23
24
14
15 U.S.C. § 1681(b).
15
See 15 U.S.C. § 1681b(b)(1) (“A consumer reporting agency may furnish a consumer
report for employment purposes only if the person who obtains such report from the agency
certifies . . .”) (emphasis added); 15 U.S.C. § 1681e(a) (Every consumer reporting agency shall
maintain reasonable procedures designed . . . to limit the furnishing of consumer reports . . .”)
(emphasis added); 15 U.S.C. § 1681e(b) (“Whenever a consumer reporting agency prepares a
consumer report…) (emphasis added); 15 U.S.C. § 1681e(d) (“A consumer reporting agency shall
provide to any person . . . to whom a consumer report is provided by the agency . . .”) (emphasis
added); 15 U.S.C. § 1681b(a)(3) (“[A]ny consumer reporting agency may furnish a consumer
report under the following circumstances and no other . . . (3) to a person which it has reason to
believe [has a permissible purpose for use of a consumer report]”) (emphasis added).
25
16
15 U.S.C. § 1681a(d)(1).
26
17
Docket No. 1 at ¶ 1.
27
18
Id. at ¶ 20.
28
3
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page4 of 21
1
create “connections” by inviting other LinkedIn members such as “colleagues, business contacts,
2
friends or classmates” to join the member’s network. 19
3
Each time a registered LinkedIn user adds information to her LinkedIn profile page, this
4
information is added to LinkedIn’s professional database. 20 “Through this process, LinkedIn
5
assembles, aggregates, and publishes information” relating to consumers’ employment histories,
6
“co-workers, contacts, educational background, honors and awards, among other things.” 21
United States District Court
For the Northern District of California
7
LinkedIn also offers “proprietary search technology” that allows LinkedIn users to search
8
this consumer data. 22 LinkedIn’s Reference Search feature is part of this search functionality. 23
9
The Reference Search feature allows users who pay a subscription fee to search for “references” for
10
any LinkedIn member. 24 When a LinkedIn user runs a Reference Search on a particular LinkedIn
11
member, the Reference Search results provide the user with two different categories of
12
information.
13
14
15
16
17
18
19
20
21
First, the Reference Search results list the name of the LinkedIn member who is the subject
of the search and names of his or her current and former employers: 25
19
Id. at ¶ 22.
20
See id. at ¶ 21.
21
Id. at ¶ 25.
22
Id. at ¶ 31.
23
See id. at ¶ 32. Plaintiffs call the results that this feature generates “Reference Reports.” See id. at
¶ 35. Because the copy of the results of a sample Reference Search attached as an exhibit to
Plaintiffs’ complaint indicates that this feature is actually called a “Reference Search,” the court
will refer to the results this feature generates as “Reference Search results.” See id. at Ex. A.
22
24
23
25
24
25
26
27
28
See id. at ¶ 32.
See Docket No. 1, Ex. A. The following two graphics come from LinkedIn’s motion to dismiss.
These graphics are excerpts of portions of the Reference Search results attached as Exhibit A to
Plaintiffs’ complaint with annotations LinkedIn added to clarify the subject matter of text which
Plaintiffs had redacted. See Docket No. 18 at 3; see also Docket No. 18-2 at ¶ 2.
The court may take judicial notice of a “fact that is not subject to reasonable dispute” because it “is
generally known” or “can be accurately and readily determined from sources whose accuracy
cannot reasonably be questioned.” Fed. R. Evid. 201(b). A court must consider documents which
plaintiffs incorporate by reference in their complaints in ruling on a motion to dismiss. See Tellabs,
4
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page5 of 21
1
2
3
4
Second, the Reference Search results provide a list of LinkedIn members who are in the
United States District Court
For the Northern District of California
5
6
same network as the search initiator and who may “have worked at the same company during the
7
same time period as the member [the search initiator] would like to learn more about.” 26 The
8
Reference Search results include for “each purported reference, the name of the employer in
9
common between the reference and the job applicant, and the reference’s position and years
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
employed at that common employer:” 27
Inc. v. Makor Issues & Rights, Ltd., 551 U.S. 308, 322 (2007) (“[C]ourts must consider the
complaint in its entirely, as well as other sources courts ordinarily examine when ruling on Rule
12(b)(6) motions to dismiss, in particular, documents incorporated into the complaint by reference,
and matters of which a court may take judicial notice.”). Under the doctrine of incorporation by
reference, a court can also “consider documents in situations where the complaint necessarily relies
upon a document or the contents of the document are alleged in a complaint, the document’s
authenticity is not in question and there are no disputed issues as to the document’s relevance.” See
Coto Settlement v. Eisenberg, 593 F.3d 1031, 1038 (9th Cir. 2010) (internal citations omitted); see
also Swartz v. KPMG LLP, 476 F.3d 756, 763 (9th Cir. 2007).
The authenticity of the graphics included in LinkedIn’s motion to dismiss is not in question since
the graphics reflect excerpts from Exhibit A to Plaintiffs’ complaint and since Plaintiffs do not
contest the accuracy of LinkedIn’s annotations of the redacted text. See Docket No. 18-2 at ¶ 2.
There are also no disputed issues as to these figures’ relevance since Plaintiffs rely on the
Reference Search results in their complaint. The court therefore considers these graphics in ruling
on the motion to dismiss.
The Reference Search results also include icons next to the names of the listed references as well as
a hyperlinked phrase stating “What do these icons mean?” See Docket No. 1 at Ex. A. Plaintiffs
request that the court take judicial notice of a copy of the webpage that corresponds to this
hyperlinked phrase. See Docket No. 19 at 1-2; see also Docket No. 18-2 at ¶ 3, Docket No. 18-3.
Because the authority of this document is not in question and because there are no disputed issues
as to its relevance since Plaintiffs rely on the sample Reference Search results in their complaint,
the court takes judicial notice of the entire document, including the document to which the
Reference Search results are linked, as requested.
26
26
See Docket No. 1 at ¶¶ 33-35; see also Docket No. 1, Ex. A.
27
27
See id. at ¶¶ 35-36.
28
5
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page6 of 21
1
2
3
4
5
6
7
LinkedIn markets Reference Searches as a way for potential employers to find “Trusted
8
United States District Court
For the Northern District of California
9
10
11
12
13
References for Job Candidates,” to “[g]et the real story on any candidate” and to “[f]ind references
who can give real, honest feedback” about job candidates. 28 The Reference Search results
encourage the search initiator to contact the listed references through an “Introduction” that
LinkedIn claims allows the initiator to “contact the users in [his or her] network through the people
[he or she] knows:” 29
14
15
16
17
LinkedIn does not tell the subjects of Reference Searches when users run searches on them. 30
18
Plaintiffs are consumers who allege that LinkedIn violated their rights under the FCRA by
19
furnishing Reference Search results for employment purposes. 31
20
Plaintiff Tracee Sweet alleges she submitted her resume through LinkedIn for a job in the
21
hospitality industry. 32 After she interviewed with the company’s general manager, the potential
22
23
28
24
29
25
26
See id. at ¶ 37. The graphic that follows is an excerpt from Exhibit A to Plaintiffs’ complaint.
See id. at Ex. A.
30
See id. at ¶¶ 40, 41, 51.
31
See id. at ¶ 47-50.
32
See id. at 7, 52.
27
28
See Docket No. 1 at ¶¶ 34, 44.
6
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page7 of 21
1
employer advised Sweet that she was going to be hired for the position. 33 However, soon
2
thereafter, the company called her back and said that Sweet would not be hired. 34 When Sweet
3
asked why the company had changed its mind, the company told Sweet that “the company had
4
checked some references for Plaintiff Sweet and, based on those references, had changed its
5
mind.” 35
United States District Court
For the Northern District of California
6
Plaintiff James Ralston alleges that a third-party recruiter connected with him on LinkedIn
7
and, told him that she would submit his resume to two potential employers. 36 The recruiter also
8
advised him to apply to one of these potential employers online and told him that she expected that
9
the potential employer would interview him. 37 Ralston did so, but was later told that the potential
10
employer decided not to interview him. 38
11
Plaintiff Lisa Jaramillo alleges that an in-house recruiter for a company contacted her about
12
a potential job opening at the recruiter’s company and Jaramillo expressed her interest in the
13
position. 39 Another in-house recruiter for the same company connected with her on LinkedIn. 40
14
The company ultimately lost interest. 41
15
16
Plaintiff Tiffany Thomas alleges that she applied for a job in the transportation industry
through a LinkedIn job posting. 42 She then received a notification that a purchasing manager from
17
18
33
See id. at ¶¶ 53-56.
19
34
See id. at ¶ 57.
20
35
Id. at ¶ 58.
21
36
See id. at ¶¶ 9, 59-60.
22
37
See id. at ¶ 61.
23
38
See id. at ¶ 62.
24
39
See id. at ¶¶ 8, 63-64.
25
40
See id. at ¶ 65.
26
41
See id. at ¶ 66.
27
42
See id. at ¶ 10, 67.
28
7
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page8 of 21
1
the potential employer had viewed her LinkedIn profile. 43 She interviewed with this individual and
2
had not received word as to whether the company will hire her by the time Plaintiffs filed their
3
complaint. 44
4
Plaintiffs assert five claims under the FCRA, alleging that LinkedIn has violated 15 U.S.C.
5
§§ 1681b(b), 1681e(a), 1681e(b), 1681e(d) and 1681b. 45 Plaintiffs seek certification of a class
6
under Fed. R. Civ. P. 23, statutory damages, actual damages, punitive damages, attorney’s fees and
7
costs. 46 LinkedIn now moves to dismiss Plaintiffs’ complaint for failure to state a claim. 47
8
II.
United States District Court
For the Northern District of California
9
This court has jurisdiction under 28 U.S.C. § 1331. The parties further consented to the
10
jurisdiction of the undersigned magistrate judge under 28 U.S.C. § 636(c) and Fed. R. Civ. P.
11
72(a).
12
Fed. R. Civ. P. 12(b)(6) provides that the plaintiff must allege “enough facts to state a claim
13
to relief that is plausible on its face.” 48 A plaintiff must allege facts that add up to “more than a
14
sheer possibility” that the defendant acted unlawfully. 49 While a “heightened fact pleading of
15
specifics” is not required, the plaintiff must still allege facts sufficient to “raise a right to relief
16
above the speculative level.” 50 “A pleading that offers ‘labels and conclusions’ or ‘a formulaic
17
recitation of the elements of a cause of action will not do.’” 51 “Nor does a complaint suffice if it
18
43
See id. at ¶ 68.
19
44
See id. at ¶ 69.
20
45
See id. at ¶¶ 77-116.
21
46
22
See id. at 12-14, 20-21. Plaintiffs seek to certify a class of “[a]ll persons in the United States in
the two years prior to the filing of [their complaint] who have had a Reference Search run on them
that was initiated through LinkedIn’s ‘search for references’ functionality.” See id. at ¶ 70.
23
47
See Docket No. 18.
24
48
Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007).
25
49
Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009).
50
Twombly, 550 U.S. at 555, 570.
26
27
28
51
Iqbal, 556 U.S. at 678 (citing Twombly, 550 U.S. at 555).
8
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page9 of 21
1
tenders ‘naked assertion[s]’ devoid of ‘further factual enhancement.’” 52 In reviewing a Rule
2
12(b)(6) motion, a court must accept as true all facts alleged in the complaint and draw all
3
reasonable inferences in favor of the plaintiff. 53 A court is not required to accept as true
4
“allegations that are merely conclusory, unwarranted deductions of fact, or unreasonable
5
inferences.” 54
6
III.
United States District Court
For the Northern District of California
7
At issue is whether Plaintiffs have alleged sufficient facts to support a plausible inference
8
that the Reference Searches are within the FRCA’s definition of a consumer report. Because
9
Plaintiffs falls short of this requirement, the court grants LinkedIn’s motion.
10
First, LinkedIn’s publications of employment histories of the consumers who are the
11
subjects of the Reference Searches are not consumer reports because the information contained in
12
these histories came solely from LinkedIn’s transactions or experiences with these same
13
consumers. The FCPA excludes from the definition of consumer report any “report containing
14
information solely as to transactions or experiences between the consumer and the person making
15
the report.” 55
16
In particular, Plaintiffs allege that LinkedIn “operates an online professional network . . .
17
through which [consumers] are able to create, manage and share their professional identities
18
online.” 56 LinkedIn then “publishes information from hundreds of millions of consumers related to
19
their past and present employers, past and present employment duties [and] employment dates,
20
21
52
22
Id. (citing Twombly, 550 U.S. at 557).
53
23
24
25
See al-Kidd v. Ashcroft, 580 F.3d 949, 956 (9th Cir. 2009), rev’d on other grounds, 131 S. Ct.
2074 (2011).
54
See In re Gilead Scis. Sec. Litig., 536 F.3d 1049, 1055 (9th Cir. 2008) (internal citations
omitted).
26
55
See 15 U.S.C. § 1681a(d)(2)(A)(i).
27
56
See Docket No. 1 at ¶ 1 (emphasis added).
28
9
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page10 of 21
1
employment skills. . . .among other things.” 57 Put differently, Plaintiffs’ own allegations show that
2
consumers provide LinkedIn with information about their employment histories so that LinkedIn
3
can publish this information online.
United States District Court
For the Northern District of California
4
Plaintiffs’ assertion that the “the plain language of the exclusion” and the Federal Trade
5
Commission’s “interpretations of it” do not encompass publication of self-provided employment
6
histories is unavailing. 58 Plaintiffs cite to an FTC report finding that “[a] report by a creditor of
7
application information supplied by a consumer…is not the creditor’s ‘transaction or experience’
8
because it includes the consumer’s transaction with entities other than the creditor.” 59 This finding
9
is based on an FTC opinion letter concerning a bank that wanted to provide information it obtained
10
from “customer loan applications, regarding the customer’s transaction with entities other than the
11
bank” to other entities. 60 The FTC concluded that this information “could not be the [b]ank’s
12
‘transaction or experience’ information because it includes only the customer’s transactions with
13
entities other than the [b]ank.” 61 But this letter does not establish that LinkedIn’s communication
14
15
16
17
18
19
20
21
22
23
24
25
57
See id. at ¶ 25.
58
See Docket No. 25 at 22.
59
See id. at 22 (citing Federal Trade Commission, 40 Years of Experience with the Fair Credit
Reporting Act, an FTC Staff Report with Summary of Interpretations, July 2011,
https://www.ftc.gov/reports/40-years-experience-fair-credit-reporting-act-ftc-staff-report-summaryinterpretations, at 24 (emphasis in original)). The 40 Years Report is a compilation summary of
“the Federal Trade Commission staff’s interpretations of the Fair Credit Reporting Act,” which
includes “informal guidance staff has provided to the public in the ensuing years and [the FTC
staff’s] experience in enforcing the FCRA.” See 40 Years Report at 17. The report “does not have
the force or effect of regulations or statutory provisions,” but it does provide persuasive guidance
from the agency charged with enforcing and interpreting the FCRA before transfer of that authority
to the Consumer Financial Protection Bureau in July 2011. See id.; see also 76 Fed. Reg. 44462-01
(July 26, 2011); Klonsky v. RLI Ins. Co., Case No. 2:11-cv-250, 2012 WL 1144031, at *2 (D. Vt.
Apr. 4, 2012) (“While the FTC’s interpretation of the FRCA does not have the force of law, it
should be viewed in light of the fact that the Supreme Court has long recognized that considerable
weight should be accorded to an executive department’s construction of a statutory scheme it is
entrusted to administer.”) (internal citations omitted).
60
26
27
See Novak, FTC Informal Staff Opinion Letter, Sept. 9, 1998,
https://www.ftc.gov/policy/advisory-opinions/advisory-opinion-novak-09-09-98; see also 40 Years
Report at 24 n.32.
61
28
See id.
10
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page11 of 21
1
of subjects’ employment histories is outside of the transactions or experiences exception. Nowhere
2
in the letter is there any indication that the banks’ customers provided the information in their bank
3
loan applications so that the bank could give this information to other entities. In contrast, sharing
4
information is precisely why the subjects here or anyone else on LinkedIn provides their
5
employment histories to LinkedIn. 62
United States District Court
For the Northern District of California
6
Likewise, Plaintiffs’ reliance on Salazar v. Golden State Warriors for the principle that “a
7
rebroadcasting of the consumer’s transactions and experiences with a third-party” is not within the
8
transactions and experience exception is misplaced. 63 In Salazar, the court held that a report from
9
a private investigator stating that an employee used drugs reflected that entity’s “transactions or
10
experiences” with the employee. 64 In making this finding, the court cited to another FTC opinion
11
letter in which the FTC found that the transactions or experiences exception applied to a
12
communication which a consumer’s prior employer provided to a credit reporting agency. 65
13
However, the FTC determined that the exception did not apply to “communications from the
14
[credit reporting agency] to [the consumer’s] potential employer ‘because the experiences referred
15
to in the communication are not between the job applicant and the [credit reporting agency]’ and
16
thus are second-hand.” 66 In other words, in the letter cited in Salazar, the FTC concluded that a
17
communication of information obtained from a “second-hand” source is outside the exception, not
18
that any communication which describes a consumer’s experience with a third party is outside the
19
exception.
20
21
Equally misplaced is Plaintiffs’ claim that the Reference Searches’ inclusion of information
about the listed references takes LinkedIn’s publication of subjects’ employment histories outside
22
62
See Docket No. 1 at ¶¶ 1, 19-25.
63
See Docket No. 25 at 22-23 (citing 124 F. Supp. 2d 1155, 1160 (N.D. Cal. 2000)).
64
See Salazar, 124 F. Supp. at 1157, 1161.
26
65
See id. at 1160.
27
66
See id. (internal citations omitted).
23
24
25
28
11
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page12 of 21
1
the exception. 67 In Salazar, the court held a “listing of the registered owners of automobiles
2
encountered by investigator” was “second-hand information” but did not “remove the report [in
3
which this listing was included] from the exception because the list did not include information
4
pertaining to the plaintiff.” 68 As Plaintiffs note, the information about the listed references
5
included in the Reference Search results is “second-hand information” because this information
6
does not derive from the subject of the search. 69 However, like the listing in Salazar, this
7
information is about the listed references, not the subjects of the searches, and thus does not
8
“include information pertaining to the [Plaintiffs].” 70
United States District Court
For the Northern District of California
9
Second, even if the LinkedIn’s publications of the employment histories of the consumer-
10
subjects of the Reference Searches were not within the transaction or experience exception, they
11
still would not be consumer reports because Plaintiffs’ allegations do not raise a plausible inference
12
that LinkedIn acts as a consumer reporting agency when it publishes these histories. To meet the
13
definition of a consumer report, a communication must be made “by a consumer report agency.” 71
14
A “consumer reporting agency” is defined as “any person which, for monetary fees…regularly
15
engages in whole or in part in the practice of assembling or evaluating consumer credit information
16
or other information on consumers on consumers for the purpose of furnishing consumer reports to
17
third parties, and which uses any means or facility of interstate commerce for the purpose of
18
preparing or furnishing consumer reports.” 72 However, “[a]n entity does not become a [consumer
19
reporting agency] solely because it conveys, with the consumer’s consent, information about the
20
21
67
See Docket No. 25 at 23-24.
68
See 124 F. Supp. 2d at 1160.
69
See Docket No. 25 at 23-24.
70
See id.
22
23
24
25
71
26
27
See 15 U.S.C. § 1681a(d)(1) (“The term ‘consumer report’ means any…communication of any
information by a consumer reporting agency.”) (emphasis added).
72
See 15 U.S.C. § 1681a(f).
28
12
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page13 of 21
1
consumer to a third party in order to provide a specific product or service that the consumer has
2
requested.” 73
United States District Court
For the Northern District of California
3
Plaintiffs are correct that they “need not at this stage prove that [LinkedIn] is in fact a
4
‘consumer reporting agency.’” 74 However, Plaintiffs are incorrect that their allegations are
5
“similar” to allegations found sufficient in Robins v. Spokeo, Inc. 75 In Robins, the court held that
6
the plaintiff’s allegations that the defendant “regularly accepts money in exchange for reports that
7
contain data and evaluations regarding consumers’ economic wealth and creditworthiness [were]
8
sufficient to support a plausible inference that [d]efendant’s conduct falls within the scope of the
9
FCRA.” 76 In contrast to Robins, where there was no indication that the plaintiff voluntarily
10
provided the information contained in the challenged reports to the defendant, here Plaintiffs
11
specifically allege that the consumers who are the subjects of the Reference Searches voluntarily
12
provide their names and employment histories to LinkedIn for the purpose of publication. 77 As
13
LinkedIn notes, the facts alleged in Plaintiffs’ complaint therefore support the inference that
14
LinkedIn gathers the information about the employment histories of the subjects of the Reference
15
Searches not to make consumer reports but to “carry out consumers’ information-sharing
16
objectives.” 78 As a result, Plaintiffs’ conclusory allegation that LinkedIn “for monetary fees,
17
engages in the practice of assembling information on consumers, for the purposes of furnishing
18
19
20
21
73
22
74
23
See 40 Years Report at 30-31.
See Docket No. 25 at 10 (citing Robins v. Spokeo, Inc., Case No. CV10-05306-ODW(AGRx),
2011 WL 1793334 at *2 (C.D. Cal. May 11, 2011)).
75
See Docket No. 25 at 10.
76
See Robins, 2011 WL 1793334 at *2.
24
25
77
26
27
See Docket No. 1 at ¶¶ 1, 19-25; see also Docket No. 25 at 8 (acknowledging that “consumers
may voluntarily provide the names of current and former employers to LinkedIn”).
78
See Docket No. 18 at 11.
28
13
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
United States District Court
For the Northern District of California
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page14 of 21
1
consumer reports to third parties” does not support a plausible inference that LinkedIn acts as a
2
consumer reporting agency with regard to its assembly of this information. 79
3
Third, Plaintiffs’ allegations are insufficient to state a claim that the list of names and other
4
information about the references included in the Reference Search bears on the “character, general
5
reputation, mode of living” and other relevant characteristics of the consumers who are the subjects
6
of these searches. 80 Plaintiffs contend that whether a subject’s listed references have jobs in a
7
certain industry or live in a certain geographic location bears on the subject’s relevant
8
characteristics by showing whether he or she is well-connected in that industry or associates with
9
people from that location. 81 Plaintiffs also argue that the inclusion of a reference who is notorious
10
or well-respected in the industry in which the subject is seeking employment, such as “Bernard
11
Madoff for someone applying for a job in finance” or “a federal judge for someone seeking
12
employment in the legal industry,” also bears on a subject’s relevant characteristics. 82
13
The problem here is that Plaintiffs do not allege that Reference Search results indicate that
14
subjects actually knew or associated with the listed references. Instead, Plaintiffs allege that the
15
Reference Search results list people who once had a common employer with the subject of the
16
search and are in the network of the person who initiated the search. 83 Because the people listed
17
79
18
19
20
21
22
23
24
See Docket No. 25 at 7 (citing Docket No. 1 at ¶¶ 2, 20-25, 32-39, 43-46, 79). As stated above,
Plaintiffs correctly note that the Reference Search results contain information about the listed
references which the consumer who is subject of the report did not provide to LinkedIn. See
Docket No. 25 at 8-10. However, Plaintiffs’ claim that LinkedIn does not carry out “consumers’
information-sharing objectives” because most of the consumer information which LinkedIn
aggregates and disseminates is derived from “data obtained from third-parties” is unavailing. See
id. at 9. Plaintiffs ignore the distinction LinkedIn makes between its communication of the search
subject’s self-provided employment history and its communication of information about people
with whom the subject may have worked. See Docket No. 30 at 1. Contrary to Plaintiffs’ assertion,
LinkedIn does not claim that it does not act as a consumer report agency with regard to its
communication of information about people who may have worked with subject, only that it does
not act as a consumer reporting agency with regard to its communication of the subject’s selfprovided employment history. See id.
80
See Docket No. 1 at ¶¶ 78, 85, 94, 102, 110.
81
See Docket No. 25 at 12-13.
82
See id. at 13.
25
26
27
83
28
See Docket No. 1 at ¶¶ 33-35, see also Docket No. 1, Ex. A.
14
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page15 of 21
1
are allegedly in the searcher’s network, not the subject’s network, in the situations Plaintiffs
2
describe, the Reference Search results would communicate whether the searcher, not the subject of
3
the search, is well-connected in a certain industry or is associated with a notorious person.
United States District Court
For the Northern District of California
4
Further, Plaintiffs fail to cite to any authority that actually holds that a communication
5
which provides information about people other than the consumer who is allegedly the subject of
6
the report bears on that consumer’s relevant characteristics. For instance, Plaintiffs cite to Trans
7
Union Corp. v. FTC for the proposition that “almost any information about consumers arguably
8
bears on their personal characteristics or mode of living.” 84 But in contrast to the list of references
9
at issue here, the court in Trans Union held that information in the challenged reports about the
10
consumers who were the supposed subjects of those reports—such as whether they had established
11
multiple credit accounts—bore on those consumers’ modes of living. 85 Plaintiffs’ reliance on a
12
FTC letter that found that a person’s employment history “unquestionably bears on his or her
13
character, reputation, and other listed characteristics” is similarly misplaced. 86 Like the court in
14
Trans Union, the FTC concluded that information about job applicants’ own employment
15
histories—not information about the employment histories of other people—“unquestionably” bore
16
on these applicants’ relevant characteristics. 87
17
Nor can Plaintiffs rely on cases in which courts held that a broad variety of information can
18
bear on a person’s mode of living. These cases again simply do not hold that information about
19
people other than the consumer who is the subject of a challenged report can bear on that
20
consumer’s mode of living. In particular, Plaintiffs contend that Reference Search results that
21
indicate that a consumer’s references live in a certain location would bear on that consumer’s
22
84
23
24
25
26
27
See Docket No. 25 at 10-11 (citing Trans Union Corp. v. Federal Trade Comm’n, 245 F.3d 809,
813 (D.C. Cir. 2001) (quoting Trans Union Corp. v. Federal Trade Comm'n, 81 F.3d 228, 231
(D.C. Cir. 1996)).
85
See Trans Union, 81 F.3d at 231.
86
See Docket No. 25 at 11 (citing Leathers, FTC Informal Staff Opinion Letter, Sept. 9, 1998,
http://www.ftc.gov/policy/advisory-opinions/advisory-opinion-leathers-09-09-98).
87
See id.
28
15
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
United States District Court
For the Northern District of California
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page16 of 21
1
personal characteristics because the court in Moreland v. CoreLogic SafeRent LLC held that
2
“[w]here people live and how long they live there can say a lot about their ‘mode of living’—how
3
rich or poor they are, how big or small their family is, how closely or loosely they’re tied to a
4
community, what sports teams or political parties they support, how often they change jobs, and
5
what kinds of cars or pets they have, to offer just a few examples.” 88 Plaintiffs also claim that,
6
similar to cases in which courts have found that information about a consumer’s former employers
7
and whether he or she has a valid driver’s license can bear on that consumer’s mode of living, here
8
the Reference Searches allegedly contain “specific, concrete information” that bears on a
9
consumer’s relevant characteristics. 89 However, in all of these cases to which Plaintiffs cite, the
10
courts held that the challenged communications might bear on consumers’ modes of living because
11
they contained information about the consumers who were the subjects of those communications. 90
12
The allegations in Plaintiffs’ complaint contradict their claim that LinkedIn markets the
13
Reference Search results as “a means to obtain additional ‘bearing on’ information” about the
14
subjects of these searches. 91 Plaintiffs’ allegation that LinkedIn markets these results as a way for
15
16
17
18
19
20
21
22
23
24
25
26
27
88
See Docket No. 25 at 12-13 (citing Case No. SACV 13-470-AG(ANx), 2013 WL 5811357, at *4
(C.D. Cal. Oct. 25, 2013).
89
See Docket No. 25 at 16; see also Phillips v. Grendahl, 312 F.3d 357, 366 (8th Cir. 2002) (“The
Finder’s Report also lists [the subject of the report’s] former employers, which also would bear on
his mode of living by showing that he has been employed. We conclude that the Finder’s Report
contains the kind of personal information required by the definition of consumer report.”); Ernst v.
Dish Network, LLC, Case No. 12-cv-8794(LGS), 2014 WL 4693700, at *5 (S.D.N.Y. Sept. 22,
2014) (finding that “whether or not an individual has a valid driver’s license might not bear on his
character, but it might describe his ‘mode of living,’ which is broad and undefined.”).
90
Moreland, 2013 WL 5811357, at *1, 4 (rejecting defendant’s assertion that report containing
information about a prospective tenant’s former addresses did not meet the FCRA’s “bearing on”
element because “[w]here a person lives is a fundamental ‘personal characteristic’”); Phillips, 312
F.3d at 365-65 (report listing “the names of several creditors with whom [the subject of the report]
had credit accounts and the existence of a child support obligations, with dates for ‘last activity’”
and subject’s “former employers” bore on subject’s mode of living); Ernst, 2014 WL 4693700, at
*4-5 (S.D.N.Y. Sept. 22, 2014) (report labeling consumer as “high risk” communicated “bearing
on” information under the FCRA).
91
See Docket No. 25 at 16.
28
16
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
United States District Court
For the Northern District of California
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page17 of 21
1
potential employers to “[g]et the real story on any candidate,” might, standing alone, support
2
Plaintiffs’ contention that LinkedIn markets the Reference Search results themselves as a way to
3
obtain bearing on information about the subjects of these searches. 92 However, Plaintiffs also
4
allege that LinkedIn markets the reference search functionality as a way for a potential employer to
5
“locate[] people in [his or her] network who can provide reliable feedback about a job candidate”
6
and to “[f]ind references who can give real, honest feedback” about job candidates. 93 Taken
7
together, these allegations support the inference that LinkedIn markets the Reference Search results
8
a way to “locate[] people” who might be able to communicate bearing on information about the
9
consumer-subjects of these results, not that these results themselves convey bearing on
10
information. 94
11
Fourth, Plaintiffs do not state a claim that the Reference Search results are used or intended
12
to be used as a factor in determining whether the subjects of the searches are eligible for
13
employment. A communication must be “used or expected to be used or collected in whole or in
14
part for the purpose of serving as a factor in establishing the consumer’s eligibility for . . .
15
employment purposes . . . .” in order to be a consumer report. 95 To determine whether a
16
communication meets this purpose element, courts consider the “purpose for which the information
17
[contained in the communication] was originally collected in whole or part by the consumer
18
reporting agency” as well as the “ultimate use” to which that information is put. 96
19
Plaintiffs’ contention that Pappas v. City of Calumet City supports its claim that Plaintiffs
20
have adequately alleged that the Reference Searches fall within the purpose element of the
21
consumer report definition is unavailing. 97 In Pappas, the defendant obtained a credit report on the
22
92
See Docket No. 1 at ¶ 44.
93
See id. at ¶¶ 33, 44 (emphasis added).
94
See id. at ¶ 33.
95
See 15 U.S.C. § 1681a(d)(1)(B).
96
See Bakker v. McKinnon, 152 F.3d 1007, 1012 (8th Cir. 1998) (internal citations omitted).
23
24
25
26
27
97
28
See Docket No. 25 at 18 (citing 9 F. Supp. 2d 943, 949 (N.D. Ill. 1998)).
17
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page18 of 21
1
plaintiff by telling the credit reporting agency that provided the report that the defendant would use
2
the report for “employment purposes” but actually used the credit report to investigate the
3
plaintiff’s company. 98 The court concluded the credit report was a consumer report because as
4
long as the credit reporting agency “expected” the defendant to use the credit report “for
5
employment purposes,” the defendant’s “actual reason for obtaining [the credit report] is
6
irrelevant.” 99
United States District Court
For the Northern District of California
7
In contrast to the defendant in Pappas, here, as stated above, LinkedIn markets the
8
Reference Search results—and therefore expects them to be used—as a way for potential
9
employers to locate people who can provide reliable feedback about job candidates and does not
10
market the results themselves as a source of reliable feedback about job candidates. 100 Further,
11
Plaintiffs allege that one of the named plaintiffs applied to a job through LinkedIn and was not
12
hired for this job after the potential employer told her that it had “checked some references” on her
13
even though the named plaintiff had not provided any references to the potential employer. 101 This
14
allegation might support an inference that the potential employer decided not to hire the named
15
plaintiff based on information provided by references whom the potential employer located by
16
running a Reference Search on the named plaintiff, but does not indicate that the potential
17
employer used the Reference Search themselves to determine the named plaintiff’s eligibility for
18
employment. Thus, Plaintiffs’ allegations do not support a reasonable inference that LinkedIn
19
expected the Reference Search results to be used or that potential employers actually used these
20
results to determine consumers’ eligibility for employment.
21
22
Plaintiffs’ claim that their allegations support a reasonable inference that the Reference
Search results “can contribute to hiring decisions made by employers” is insufficient to show that
23
24
98
See Pappas, 9 F. Supp. 2d at 947.
25
99
See id. at 948.
26
100
See Docket No. 1 at ¶¶ 33, 44.
27
101
See id. at ¶¶ 52-58.
28
18
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
United States District Court
For the Northern District of California
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page19 of 21
1
the results are used or intended to be used for employment purposes. 102 Plaintiffs need not
2
establish that the “information communicated by the [Reference Search results], standing alone,
3
could be used” to make an employment-related decision in order to establish that the Reference
4
Search results are consumer reports. 103 However, the consumer report definition does not
5
encompass every tool or reference that employers might use to access job candidates. As LinkedIn
6
notes, the fact that a potential employer could use a telephone directory for a job candidate’s
7
current employer to contact people who know the candidate does not make that directory a
8
consumer report. 104 Similarly, Plaintiffs’ claim that LinkedIn “provides the people and businesses
9
accessing the [Reference Search results] with tools to communicate directly with the ‘references’
10
listed therein” is not sufficient to establish that the results themselves are used or intended to be
11
used to determine consumers’ eligibility for employment. 105
12
Likewise, Plaintiffs’ position that their allegation that the Reference Search results are used,
13
expected to be used and marketed by LinkedIn to be used “for employment purposes” is sufficient
14
“at this stage of the litigation” lacks merit. 106 Plaintiffs contend that a communication is a
15
“consumer report” if it is “used or expected to be used or collected either to (1) ‘serve as a factor in
16
establishing the consumer’s eligibility’ for credit, insurance, employment; or (2) for “other
17
purposes authorized under section 1681b….” 107 Section 1681b(a)(3) of the FCRA provides that
18
one of the situations in which it is permissible for a consumer reporting agency to furnish a
19
consumer report is when the recipient of the report is “a person which [the consumer reporting
20
21
102
22
103
23
See Docket No. 25 at 19.
See In re Trans Union Corp., No. 9255, 2000 WL 257766, at *12 n.18 (F.T.C. Feb. 10, 2000)
(citing Trans Union, 81 F.3d at 233).
104
See Docket No. 30 at 12.
105
See Docket No. 25 at 19.
106
See id. at 21.
24
25
26
107
27
See id. at 19 (quoting Yang v. Gov’t Employees Ins. Co., 146 F.3d 1320, 1323 (11th Cir. 1998)
(citing 15 U.S.C. § 1681a(d)(1))).
28
19
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page20 of 21
1
agency] has reason to believe…intends to use the information for employment purposes.” As
2
Plaintiffs note, courts have found that because Section 1681b(3) “restrict[s] the uses to which a
3
consumer report may be put,” for this section to be “meaningful, ‘consumer report’ must be
4
interpreted to mean any report made by a credit reporting agency of information that could be used
5
for one of the purposes enumerated in § 1681a.” 108
United States District Court
For the Northern District of California
6
But even if Plaintiffs are correct that the consumer report definition encompasses
7
communications that could be used for the purposes enumerated in Section 1681b(a), as LinkedIn
8
notes, this definition would not extend to all communications “with any attenuated connection to
9
‘employment.’” 109 Further, Plaintiffs’ reliance on cases in which courts held that communications
10
could be consumer reports if they fell within one of the purposes authorized under Section 1681b is
11
misplaced. 110 In the cases to which Plaintiffs cite, the consumer reporting agencies expected the
12
communications at issue to be used for purposes authorized under Section 1681b. 111 In contrast, as
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
108
See Docket No. 25 at 20-21 (quoting Belshaw v. Credit Bureau of Prescott, 392 F. Supp. 1356,
1359-60 (D. Ariz. 1975); see also Yang, 146 F.3d at 1323-24 (“To complete section 1681a(d)’s
definition of a consumer report, we must …refer to section 1681b, entitled “‘Permissible purposes
of consumer reports’… [S]ection 1681b …adds to section 1681a(d)’s definition of a consumer
report, as well as delineates the permissible uses for those ‘communications of information’ already
falling within the definition of a ‘consumer report.’”) but see Mende v. Dun & Bradstreet, Inc., 670
F.2d 129, 133 (9th Cir. 1982) (“The Belshaw definition depends on whether information could be
used for certain purposes, not on whether it is collected for certain purposes. This expansive
interpretation of consumer report has been criticized as bringing ‘within the coverage of the Act
any gathering of information about an individual, even if the context were such clearly nonconsumer activities as engagement in profit-making transactions…or litigation against a defendant
whose insurer requests a report…’”) (quoting Henry v. Forbes, 433 F. Supp. 5, 9 n.5 (D. Minn.
1976)).
109
See Docket No. 30 at 12.
110
See Docket No. 25 at 21.
111
See Beresh v. Retail Credit Co., 358 F. Supp. 260, 261-62 (C.D. Cal. 1973) (holding that
“insurance claims investigative reports” which were made “for the purpose of determining whether
[plaintiff] was totally disabled as a result of water skiing accident” were within the definition of
“consumer reports”); Greenway v. Information Dynamics, Ltd., 399 F. Supp. 1092, 1095 (D. Ariz.
1974) (holding that communications made in order to “furnish subscribing merchants with
information on consumers who may tender checks in payment for purchases so that the subscriber
may decide whether or not to accept the check” were within the definition of “consumer reports” in
part because the “expectation is that the information will be used by [subscribers] in connection
20
Case No.: 5:14-cv-04531-PSG
ORDER GRANTING MOTION TO DISMISS
Case5:14-cv-04531-PSG Document33 Filed04/14/15 Page21 of 21
1
2
O
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
CENTRAL DISTRICT OF CALIFORNIA
10
11
GOLDLINE, LLC,
12
Plaintiff,
13
14
15
16
v.
REGAL ASSETS, LLC; MARK C.
TURNER; KELLY FELIX; VINCENT
CURTO; ROBERT LAMBIN; DONNY
GAMBLE; CHARLES HOWLAND; TOM
ARVAN,
17
Defendants.
18
___________________________
19
I.
20
)
)
)
)
)
)
)
)
)
)
)
)
)
)
)
Case No. CV 14-03680 DDP (ASx)
ORDER GRANTING MOTION TO DISMISS
IN PART AND DENYING IN PART
[Dkt. 15]
Introduction
Goldline, LLC (“Plaintiff”) filed a complaint against Regal
21
Assets, LLC (“Regal”), seven named individuals,1 and doe defendants
22
whose identities have not yet been determined (inclusively,
23
“Affiliate Defendants”). Plaintiff’s First Amended Complaint
24
(“FAC”) alleges claims against Regal and Affiliate Defendants
25
(collectively, “Defendants”) for (1)Trademark Infringement (15
26
U.S.C. §1125(a)); (2) False Designation of Origin and Unfair
27
28
1
The seven named individuals are Mark Turner, Kelly Felix,
Vincent Curto, Robert Lambin, Donny Gamble, Charles Howland, and
Tom Arvan.
1
Competition (15 U.S.C. §1125(a)); (3) False Advertising (Lanham Act
2
§43(a)(1)(B)); (4) False Advertising in Violation of Cal. Bus. &
3
Prof. Code § 17500; (5) Unfair Competition in Violation of Cal.
4
Bus. & Prof. Code §17200; (6) Common Law Trademark Infringement;
5
(7) Statutory Dilution under Cal. Bus. & Prof. Code §14247;(8)
6
Common Law Unfair Competition;(9) RICO (18 U.S.C. §1962(c)); (10)
7
RICO (18 U.S.C. 1962(a)); (11) Common Law Trade Libel/Commercial
8
Disparagement; and
9
(12) Civil Conspiracy.
Plaintiff alleges that it is the owner of the GOLDLINE and
10
other related registered trademarks.2 Plaintiff’s claims arise out
11
of Regal’s promotion of products and services through its
12
“affiliates program.” According to the FAC, the program induces
13
Affiliate Defendants to infringe Plaintiff’s trademarks;
14
fraudulently disparage Plaintiff and its products and services; and
15
deceptively endorse Regal’s products and services.
16
On July
3, 2014, Regal filed the present Motion to Dismiss
17
Plaintiff’s FAC. Pursuant to Federal Rule of Civil Procedure
18
12(b)(6), Regal challenges all claims set forth in the complaint.
19
For the following reasons, the court grants the motion in part,
20
denies in part, and adopts the following Order.
21
II.
Factual Background
22
The following facts are alleged in the FAC.
23
Plaintiff is an interstate dealer of precious metals and
24
numismatic products in the United States. Since 1974, Plaintiff has
25
operated its business under the GOLDLINE and related marks
26
(collectively, “GOLDLINE Marks”). From 1976 through 2011, Plaintiff
27
2
28
The related marks include GOLDLINE COIN AUCTIONS, GOLDLINE
INTERNATIONAL and Design, GOLDLINE AUCTIONS, and IGOLDLINE.
2
1
obtained trademark registrations for these marks. Plaintiff uses
2
the GOLDLINE Marks extensively and prominently in websites,
3
television, print advertising, YouTube video commercials, and word
4
of mouth.
5
Regal is also an interstate dealer of precious metals and
6
numismatic products, who offers and sells competing products and
7
services. In addition to its website, Regal promotes its products
8
and services through its “affiliates program.” Through this
9
program, Regal pays commissions to third parties, including
10
Affiliate Defendants, to operate websites that bear no apparent
11
connection to Regal. According to Plaintiff, Defendants purchase
12
advertising keywords that include the GOLDLINE Marks so their
13
websites will appear when search terms intended for Plaintiff are
14
entered in the search engine. Many of the search results are not
15
identified as ads. The purpose of the affiliates’ websites is to
16
divert customers away from Plaintiff and other competitors, toward
17
Regal. To that end, Regal prepares for its affiliates’ use, scripts
18
and website materials that purportedly offer objective, independent
19
evaluations and facts related to precious metal dealers. These
20
materials allegedly infringe on the GOLDLINE Marks. The materials
21
also allegedly offer endorsements for Regal; false information and
22
statements about the independent and unbiased views of the
23
reviewer; and false and disparaging information about Plaintiff,
24
including customer complaints, pending litigation, and poor
25
consumer and industry ratings.
26
On April 29, Plaintiff sent a cease and desist letter to
27
Regal. Regal has refused to remove or correct the websites, or
28
require the Affiliate Defendants to do so.
3
1
Plaintiff alleges that, as a result of Defendants’ conduct,
2
Plaintiff has suffered, and continues to suffer, damage to its
3
business, reputation, and goodwill. Plaintiff also alleges loss of
4
sales and profits due to Defendants’ wrongful acts. By way of its
5
complaint, Plaintiff seeks declaratory judgment; injunctive relief;
6
compensatory and punitive damages; interest; and attorneys fees and
7
costs.
8
III. Legal Standard
9
A party may move to dismiss for failure to state a claim upon
10
which relief can be granted under Federal Rule of Civil Procedure
11
(“Rule”) 12(b)(6). In deciding a Rule 12(b)(6) motion, the court
12
must assume allegations in the challenged complaint are true, and
13
construe the complaint in the light most favorable to the non-
14
moving party. Cahill v. Liberty Mut. Ins. Co., 80 F.3d 336, 337-38
15
(9th Cir. 1996). The court shall not consider facts outside the
16
complaint. Arpin v. Santa Clara Valley Transp. Agency, 261 F.3d
17
912, 925 (9th Cir. 2001). Dismissal is appropriate where the
18
complaint lacks a cognizable legal theory or sufficient facts to
19
support a cognizable legal theory. Mendiondo v. Centinela Hosp.
20
Med. Ctr., 521 F.3d 1097, 1104 (9th Cir. 2008). “While a complaint
21
attacked by a Rule 12(b)(6) motion to dismiss does not need
22
detailed factual allegations, . . . a plaintiff’s obligation to
23
provide the ‘grounds’ of his ‘entitlement to relief’ requires more
24
than labels and conclusions, and a formulaic recitation of the
25
elements of a cause of action will not do.” Bell Atl. Corp. v.
26
Twombly, 550 U.S. 544, 555 (2007) (quoting Papasan v. Allain, 478
27
U.S. 265, 286 (1986)). Moreover, the court need not accept as true
28
conclusory legal allegations cast in the form of factual
4
1
allegations. W. Mining Council v. Watt, 643 F.2d 618, 624 (9th Cir.
2
1981).
3
IV.
4
Discussion
A.
Plaintiff Fails to State Claims For Trademark
5
Infringement and False Designation of Origin
6
2, and 6)
7
(Claims 1,
The FAC alleges that Regal owns valid registrations in the
8
GOLDLINE Marks (FAC, ¶ 22), and that Plaintiff has not authorized
9
Defendants’ use of those marks (FAC, ¶44). In the body of the
10
complaint, Plaintiff alleges, “Defendants purchased advertising
11
keywords which include the GOLDLINE Marks, with the intent that
12
their websites will be presented by Google when consumers enter
13
search terms intended for [Plaintiff] and which include the
14
GOLDLINE Marks . . .. Many of the search results are not identified
15
as ads, thus compounding the confusion and deception of consumers.”
16
(FAC, ¶32.) In support, Plaintiff attaches Exhibit B to the
17
complaint, which is a series of screen shots depicting a Google
18
search results page, and various web pages a user can access from
19
performing a search using the GOLDLINE Marks. (FAC, Exhibit B.) The
20
content of these websites is comprised of opinions, reviews, and
21
recommendations about both investing in gold generally, as well as
22
Plaintiff’s products and services, specifically. Id. Consistent
23
with allegations detailed in Section II, above, the websites are
24
disparaging of Plaintiff’s products and services. Id.
25
The Lanham Act, as well as its common law equivalent, prohibit
26
a person from using in commerce any trademark or false designation
27
of origin that is likely to cause confusion as to the affiliation
28
or origin of that person’s product or service. 15 U.S.C. § 1125(a).
5
1
Upon review of allegations contained in the FAC, along with
2
the attached exhibits, the Court finds that Plaintiff has not
3
adequately stated a claim for trademark infringement or false
4
designation of origin. While the allegations and attached exhibits
5
indicate that Defendants use Plaintiff’s marks, there is simply
6
nothing stated, that if deemed true, constitute commercial use that
7
would likely cause confusion as to the origin or affiliation of
8
Regal’s products or services. In fact, the allegations either state
9
directly, or create a strong inference, that the purpose of
10
Defendants’ use of the marks is to disparage Plaintiff and endorse
11
Regal. Taken as true, such conduct would seemingly distinguish
12
Regal’s products from Plaintiff’s, as opposed to causing customers
13
confusion as to the origins of the two products.
14
Deeming the facts alleged as true, the Court finds that
15
Plaintiff has not adequately stated claims for trademark
16
infringement and false designation of origin.
17
18
B.
Plaintiff Adequately Alleges Claims for False Advertising
and Unfair Competition (Claims 3,4,5, and 8)
19
Plaintiff asserts claims against Defendants for false
20
advertising in violation of the Lanham Act, 15 U.S.C. § 1125(a),
21
and California Business & Professions Code §17500. Plaintiff also
22
asserts claims against Defendants for Unfair Competition under both
23
California Business and Professions Code § 17200 and common law.
24
Regal challenges these claims on the ground that the claims are
25
insufficiently pled, both in substance and specificity.
26
As detailed in Section II, above, the FAC alleges (1)
27
Plaintiff’s and Regal’s products and services are sold in
28
interstate commerce; (2) by way of Regal’s affiliates program,
6
1
Defendants engaged in specific false, deceptive, and misleading
2
advertising regarding both Plaintiff’s and Regal’s products and
3
services; (3) the false statements were intended to deceive and
4
confuse the public, and disparage Plaintiff; (4) as a result,
5
consumers were diverted away from Plaintiff; and (5) Plaintiff
6
suffered injury as a result of Defendants’ conduct. (FAC, ¶¶ 28-57;
7
76-106; 124-131.)
8
Even assuming that the heightened pleading standards apply to
9
these claims, the court finds that Plaintiff’s allegations satisfy
10
the requisite elements of both false advertising and unfair
11
competition under the relevant federal and state statutes, and
12
common law.3
13
C.
14
15
Plaintiff Fails to State a Claim for Statutory Dilution
(Claim 7)
California Business & Professions Code §14247 protects owners
16
of trademarks from a likelihood of dilution caused by another who
17
adopts an identical or similar mark. See Cal. Bus. & Prof. Code
18
§14247(a). To prevail on a §14247 claim, a plaintiff must establish
19
(1) it is the owner of a famous mark that is distinctive; (2) the
20
defendant commenced use of a mark after the mark became famous; (3)
21
the defendant is making commercial use of the mark in commerce; and
22
(4) the defendant’s use is likely to cause dilution of the
23
distinctive value of plaintiff’s mark. Id. With regard to the last
24
element, dilution occurs when a defendant’s use of a famous mark
25
26
27
28
3
The Ninth Circuit has not yet opined on the appropriate
standard. See Western Sugar Co-op v. Archer-Daniels-Midland Co.,
No. CV 11-3473 CBM, 2012 WL 3101659 *3 (C.D. Cal. Jul. 31, 2012).
7
1
diminishes the capacity of the famous mark to identify and
2
distinguish goods or services.
3
In addition to the allegations detailed in Section II above,
4
Plaintiff alleges that for 40 years, it has been using the GOLDLINE
5
Marks to promote its goods and services through multiple outlets
6
and has spent many millions of dollars in doing so. (FAC, ¶ 116.)
7
As a result of Plaintiff’s efforts, the GOLDLINE Marks have
8
acquired distinctiveness and strong recognition and reputation
9
among the general public, thus making the marks famous. (FAC, ¶
10
11
117.)
The FAC clearly alleges that the GOLDLINE Marks are famous,
12
and that Defendants use the marks for purposes of disparaging
13
Plaintiff’s goods and services, endorsing Regal’s goods and
14
services, and directing potential sales to Regal. However, these
15
allegations do not satisfy the requisite elements for a dilution
16
claim. Specifically, Plaintiff fails to allege plausible facts
17
indicating that Defendants’ use of those marks diminishes or blurs
18
the distinctiveness of GOLDLINE Marks, for the reasons discussed in
19
Section IV(A), above.
20
fails.
21
marks has diluted the distinctive nature of the GOLDLINE Marks by
22
lessening the ability of the marks to identify and distinguish
23
Plaintiff as the sole source of its products and services, and
24
lessening the extensive and valuable goodwill associated with the
25
marks (FAC ¶¶ 119, 120.), these statements constitute only
26
conclusory allegations that merely recite a requisite element of
27
the claim. Under the principles of Twombly and Iqbal, the court
Without such allegations, Plaintiff’s claim
To the extent the FAC alleges that Defendants’ use of the
28
8
1
ignores such allegations for purposes of its Rule 12(b)(6)
2
analysis.
3
D.
4
5
Plaintiff Adequately States Claims Under RICO (Claims 9
and 10)
To plead a claim under RICO, a plaintiff must allege (1)
6
conduct (2) of an enterprise (3) through a pattern (4) of
7
racketeering activity (5) which injured his business or property.
8
Sedima, S.P.R.L. v. Imrex, Co., 473 U.S. 479, 496-97 (1985). If
9
fraudulent acts are the basis of the alleged pattern of
10
racketeering activity, Rule 9(b) requires the plaintiff to allege
11
its claims with particularity.
12
Furniture, Co., 806 F.2d 1393, 1400-01 (9th Cir. 1986).
Schreiber Distrib. Co. v. Serv-Well
13
In its complaint, Plaintiff alleges the following: (1)
14
Defendants are comprised of Regal and its many “affiliates”; (2)
15
during at least 2013 and 2014, Defendants have operated a scheme
16
whereby Regal pays commission to Affiliate Defendants to operate
17
websites over the internet; (3) the affiliates use scripts provided
18
by Regal that falsely advertise and fraudulently represent
19
Plaintiff’s goods and services; (4) the purpose of this scheme is
20
to divert customers away from Plaintiff, toward Regal; (5)
21
Defendants use a portion of the proceeds derived from this
22
operation to perpetuate the operation; and (6) as a result of
23
Defendants’ activities, Plaintiff has suffered loss of sales and
24
goodwill. (FAC, ¶¶ 132-160.)
25
26
27
28
The court finds these allegations satisfy the pleading
requirements for RICO claims under 18 U.S.C. 1962(a) and (c).
E.
Plaintiff Adequately States a Claim for Common Law Trade
Libel and Commercial Disparagement (Claim 11)
9
1
“Trade libel is the publication of matter disparaging the
2
quality of another’s property, which the publisher should recognize
3
is likely to cause pecuniary loss to the owner.”
4
Inc. v. Jackson, 93 Cal. App. 4th 993, 1010 (2001). This claim
5
includes “all false statements concerning the quality of services
6
or product of a business.” Id. (internal quotation and citation
7
omitted).
8
publication, (2) which induces others not to deal with plaintiff,
9
and (3) special damages.”
ComputerXpress,
A cause of action for trade libel must allege “(1) a
New Show Studios LLC v. Needle, No.
10
2:14-cv-01250-CAS, 2014 WL 2988271 at *13, (C.D. Cal. Jun. 30,
11
2014).
12
of a false and unprivileged statement of fact. Mann v. Quality Old
13
Tim Serv., Inc., 120 Cal. App. 4th 90, 104 (2004).
14
disparagement or defamation specifically involves injury to the
15
reputation of a business rather than disparagement of quality of
16
goods or services.
17
Cal. App. 4th 328, 340 (2006).
18
Furthermore, the claim requires the intentional publication
Commercial
See Mann v. Quality Old Time Serv., Inc., 139
The FAC alleges that Defendants intentionally published false
19
statements related to consumer ratings, customer complaints,
20
pending litigation, and industry ratings. (FAC, ¶¶ 27-31, 162-163.)
21
These statements disparaged the quality, integrity and security of
22
products and services provided by Plaintiff. (FAC, ¶ 163.)
23
Defendants made these statements knowing that the publication would
24
be harmful to Plaintiff’s business, and cause diversion of its
25
sales and harm to its interests. (FAC, ¶ 162.) These allegations
26
satisfy the requisite elements of the claim.
27
Regal’s challenge to this claim rests on the arguments that
28
none of its statements were false, and the alleged statements do
10
1
not disparage Plaintiff’s products and services. These arguments
2
are unavailing. First, the allegations of the FAC, which the court
3
deems true, expressly aver that Defendants statements are false.
4
Second, it is axiomatic that customer complaints and poor ratings
5
directly related to a business’s products and services negatively
6
impact the perceived quality of those products and services.
7
8
9
10
Based on the allegations contained in the complaint, the court
finds that Plaintiff has sufficiently pled this claim.
F.
Plaintiff Adequately States a Claim for Civil Conspiracy
(Claim 12)
11
Regal argues that, under California law, conspiracy cannot
12
form an independent claim for relief. Regal further argues that
13
because the alleged conspiracy involves misrepresentations and
14
fraud, Plaintiff must plead the elements of a fraud claim, which it
15
has not. The court disagrees.
16
The California Supreme Court has stated that civil conspiracy
17
must be activated by the commission of a actual tort, and it does
18
not per se give rise to a cause of action. Applied Equipment Corp.
19
v. Litton Saudi Arabia, Ltd., 7 Cal. 4th 503, 511 (1994).
20
not to say, however, that conspiracy cannot give rise to a claim
21
for relief under California law.
22
civil conspiracy and no action for conspiracy to commit a tort
23
unless the underlying tort is committed and damage results
24
therefrom.”
25
App. 4th 1105, 1136 (2014) (emphasis added).
26
plaintiff pleads an activating tort, the formation and operation of
27
a conspiracy, and damages to plaintiff resulting from an act done
That is
“There is no separate tort of
Prakashpalan v. Engstrom, Lipscomb and Lack, 223 Cal.
28
11
Thus, so long as a
1
in furtherance of the common design, a claim for civil conspiracy
2
may survive.
3
Applied Equipment, 7 Cal.4th at 311.
Based on Plaintiff’s allegations, particularly those stated in
4
Section IV.D, above, the court finds that Plaintiff has adequately
5
pled an underlying tort, along with the requisite elements for
6
civil conspiracy.
7
V.
8
9
Conclusion
For the reasons stated above, the court GRANTS the Motion to
Dismiss, in part.
Specifically, the court DISMISSES with leave to
10
amend Claims 1, 2, 6, and 7 of the FAC. The court denies Regal’s
11
motion as to all other claims.4 If Plaintiff chooses to file a
12
second amended complaint, it must do so within fourteen days of the
13
date of this Order.
14
IT IS SO ORDERED.
15
16
17
Dated: April 21, 2015
18
DEAN D. PREGERSON
United States District Judge
19
20
21
22
23
24
25
26
4
27
28
The court notes that the instant motion was filed by Regal’s
former counsel and taken under submission before transfer to the
undersigned. The motion is denied with respect to the RICO and
conspiracy claims without prejudice.
12
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 1 of 14
USDSSDNY
DOCUMENT
ELECTRONICALLY FILED
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
DOC#:~~~~--~­
DATE FILED: 3-J°!-
CLAUDE GALLAND, et al. ,
u:-
Plaintiffs,
No. l 4-cv-4411 (RJS)
OPINION AND ORDER ADOPTING
REPORT AND RECOMMENDATION
-v-
JAMES JOHNSTON, et al.,
Defendants.
RICHARD J. SULLIVAN, District Judge:
Claude and Violaine Galland (together, " Plaintiffs"), proceeding pro se, bring this action
against James and Judith Johnston (the "Johnstons"), and Stephen and Terri Bowden (the "Bowdens,"
and, together with the Johnstons, "Defendants") for, inter alia, breach of contract, defamation, and
tortious interference with business relations, stemming from reviews left by the Johnstons and the
Bowdens on a property rental website. (Doc. No. 2 ("Compl.").) Now before the Court is the Report
and Recommendation of the Honorable Ronald L. Ellis, Magistrate Judge, recommending that the
Court dismiss the Complaint with the exception of the breach of contract claims, deny Plaintiffs'
motion for summary judgment, and deny Plaintiffs' motion to amend the Complaint. (Doc. No. 30
("Rep." or "Report").) For the reasons set forth below, the Court adopts the Report in its entirety.
l. BACKGROUND
A. Facts
The Court assumes the parties' familiarity with the facts of this case and summarizes only
those facts necessary to the disposition of the pending motions. 1 Plaintiffs are the owners of an
1
Because the standard for dismissing a motion to amend on grounds of futility is identical to the standard for dismissing
a claim pursuant to Rule 12(b)(6) and Rule 12(c), the Court looks to facts from both the Complaint and the Proposed
Amended Complaint (Doc. No. 18 (the "PAC")) in deciding the motions. The Court has also considered the Johnstons'
memorandum of law in support of their motion to dismiss (Doc. No. 4), Plaintiffs' response and purported motion for
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 2 of 14
apartment in Paris, France (the “Apartment”), which they list on the short term property rental website
VRBO for rental by people traveling to Paris. (PAC ¶ 8.) From May 17 to May 23, 2014, the
Bowdens stayed in the Apartment, and from May 24 to May 28, 2014, the Johnstons stayed in the
Apartment. (PAC ¶ 63; PAC, Exhibits, at 43.) 2 Each couple signed a rental agreement prior to renting
the Apartment, in which they promised, among other things, “not to use blogs or websites for
complaints, anonymously or not.” (Compl., Exhibits, at 11.) Following their respective stays, each
of the Bowdens and Johnstons left a review of the Apartment on VRBO, connected to the Apartment’s
listing on that website. As set forth in the Proposed Amended Complaint, the Bowdens wrote:
Small and noisy but close to the Notre Dam [sic.]
This apartment was much smaller than it appeared in the pictures. There is a mirrored
wall that makes it look larger than it is. To be fair, it does compare in size with other
places I have stayed in Paris. It is in a very noisy neighborhood, The Latin Quarter,
and we could hear people on the street most of the night and on the weekends they
were very loud going up and down the stairs at all hours of the night!! Be prepared
for no air conditioner. There is a portable fan which was a big help. Pack light as
there is no closet and no drawers to put your clothes. The kitchen is really [too] small
to cook in other than fix coffee or heat something up. The bathroom is also tiny. I
would not recommend this for more than 2 people! On the plus side, it is attractive
enough and very close to the metro and Notre Dam [sic.].
(PAC ¶ 63.) The Johnstons wrote:
Retired couple We just left this apartment today. This was an awful experience. The studio itself will
look like the photo & the sheets are clean, but the entry “behind the blue door” is awful
and is shared as the back door to a Pizza Place. They prop the door open with a beer
keg, right next to the trash cans. Expect a 2 story climb of narrow stairs, sloping floor,
poor lighting, exposed utilities, broken and patched plaster. There is no way this Apt
is getting all 4 & 5 stars. The reviews are way too wordy and sound like the owner.
There was no mgr. Samy to help us even when we called him. Microwave didn’t work,
partial summary judgment (Doc. No. 10), the Johnstons’ reply in support of their motion to dismiss (Doc. No. 16), the
Johnstons’ opposition to Plaintiffs’ motion to amend the Complaint (Doc. No. 19), the Bowdens’ memorandum of law in
support of their motion to dismiss (Doc. No. 25), the Bowdens’ reply brief in further support of their motion to dismiss
(Doc. No. 26), and Plaintiffs’ opposition to the Bowdens’ motion (Doc. No. 27).
2
Both the Complaint and the PAC include exhibits, but neither numbers the exhibits or otherwise provides a system for
identifying them. Accordingly, in order to refer to exhibits, the Court will refer to the page on which a particular exhibit
lies within the PDF file of the Complaint or PAC. For example, here, the Johnstons’ rental agreement appears on the 43rd
page of the PDF containing the PAC.
2
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 3 of 14
hair dryer with broken wires shorted out. This self-described archeological building
is a physical mess and a fire hazard. We were embarrassed to enter and couldn’t wait
to get out of there. We have stayed in several lovely ancient apartments in Europe.
The building conditions always matched the interior of the apt. Don’t be deceived by
the #20279 advertisement.
(Id.)
Additionally, on or around June 26, 2014 – after the commencement of the instant lawsuit but
presumably before the Bowdens had been served with a copy of the Complaint, given the reference
to threatened litigation – Terri Bowden wrote a letter to VRBO, which was not posted or otherwise
available to the public, complaining about her experiences with Claude Galland. In the letter, she
noted that after she left her three-star review of the Apartment, Claude Galland sent her two emails
which she perceived to be “threatening and disturbing,” and which requested that she remove the
review from VRBO. The letter indicated that Mr. Galland offered the Bowdens $300 for the removal
of the review, which Terri Bowden found “equivalent to bribery and extortion.” The letter further
stated that Terri Bowden had “no intention of caving in to Mr. Galland’s threats and attempts to
intimidate me,” and wondered “how many people he has done this to and how many of those people
have been intimidated enough to withdraw their less than 4 to 5 star reviews. There is no way this
property could be considered to be 4 or 5 stars!” (PAC ¶ 63.) Finally, the letter requested that the
Gallands be banned from making any listing on VRBO or any affiliated website, because VRBO is
“not the place for a person who chooses to run his business in a threatening manner to get good
reviews.” (Id.)
B. Procedural History
On June 18, 2014, Plaintiffs commenced this action by filing the Complaint, bringing claims
for (1) breach of fiduciary duty, (2) breach of contract, (3) “intentional negligence,” (4) extortion, and
(5) defamation. (Compl. ¶¶ 36–40.) The gist of the Complaint is that the reviews left by the Johnstons
and the Bowdens, and the letter sent by Terri Bowden, are defamatory. On July 11, 2014, the
3
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 4 of 14
Johnstons filed a motion to dismiss the Complaint pursuant to Federal Rule of Civil Procedure
12(b)(6). (Doc. No. 4.) Plaintiffs filed an opposition to the Johnstons’ motion, along with a crossmotion for summary judgment as to the breach of contract claims, on July 28, 2014. (Doc. No. 10.)
On August 25, 2014, Plaintiffs filed a motion to amend the Complaint, together with the PAC. The
PAC adds a claim for tortious interference with business relations and, for the first time, sets forth in
their entirety the reviews and letter upon which the claims are based. The Johnstons filed an
opposition to the motion to amend on September 12, 2014. (Doc. No. 19.) On October 14, 2014, the
Bowdens filed a motion for judgment on the pleadings pursuant to Rule 12(c), along with a
memorandum of law in support of the motion. (Doc. Nos. 23–24.) That motion was fully briefed
following Plaintiffs’ opposition on October 27, 2014. (Doc. No. 27.)
On January 13, 2015, Judge Ellis issued the Report, which recommends that the Court dismiss
the Complaint with the exception of the breach of contract claims, deny Plaintiffs’ motion for
summary judgment, and deny Plaintiffs’ motion to amend the Complaint on grounds of futility.
(Rep.) On January 26, 2015, Plaintiffs timely filed objections to the Report.
(Doc. No. 31
(“Objections” or “Objs.”).) The Objections take exception to the Report’s (1) conclusion that
Defendants’ reviews are strictly opinion and do not constitute defamation, (2) failure to consider Terri
Bowden’s letter separately in assessing the defamation claims, and (3) conclusion that the Complaint
does not adequately allege that Plaintiffs’ business relationship was injured, such that the tortious
interference with business relations claim cannot lie. None of the Defendants filed any objections or
responded to Plaintiffs’ Objections.
II. LEGAL STANDARD
A. Motion to Dismiss
To survive a motion to dismiss pursuant to Rule 12(b)(6) or 12(c) of the Federal Rules of Civil
Procedure, a complaint must “provide the grounds upon which [the] claim rests.” ATSI Commc’ns,
4
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 5 of 14
Inc. v. Shaar Fund, Ltd., 493 F.3d 87, 98 (2d Cir. 2007); Patel v. Contemporary Classics of Beverly
Hills, 259 F.3d 123, 126 (2d Cir. 2001) (The standard for granting a Rule 12(c) motion for judgment
on the pleadings is identical to that of a Rule 12(b)(6) motion for failure to state a claim.”); see also
Fed. R. Civ. P. 8(a)(2) (“A pleading that states a claim for relief must contain . . . a short and plain
statement of the claim showing that the pleader is entitled to relief . . . .”). To meet this standard,
plaintiffs must allege “enough facts to state a claim to relief that is plausible on its face.” Bell Atl.
Corp. v. Twombly, 550 U.S. 544, 570 (2007). “A claim has facial plausibility when the plaintiff
pleads factual content that allows the court to draw the reasonable inference that the defendant is
liable for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009). In reviewing a
motion to dismiss for failure to state a claim, a court must accept as true all factual allegations in the
complaint and draw all reasonable inferences in favor of the plaintiff. ATSI Commc’ns, 493 F.3d at
98. However, that tenet “is inapplicable to legal conclusions.” Iqbal, 556 U.S. at 678. Thus, a
pleading that offers only “labels and conclusions” or “a formulaic recitation of the elements of a cause
of action will not do.” Twombly, 550 U.S. at 555. If the plaintiff “ha[s] not nudged [its] claims across
the line from conceivable to plausible, [its] complaint must be dismissed.” Id. at 570.
B. Motion to Amend the Complaint
Under Federal Rule of Civil Procedure 15(a), a “court should freely give leave [to amend a
pleading] when justice so requires.” However, the Court should deny leave to amend if there is
“evidence of undue delay, bad faith, undue prejudice to the non-movant, or futility.” Milanese v.
Rust-Oleum Corp., 244 F.3d 104, 110 (2d Cir. 2001). Futility is assessed based on the same standard
as dismissal for failure to state a claim, such that “leave to amend will be denied as futile only if the
proposed new claim cannot withstand a 12(b)(6) motion to dismiss for failure to state a claim.” Id.
5
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 6 of 14
C. Motion for Summary Judgment
Pursuant to Rule 56(a) of the Federal Rules of Civil Procedure, summary judgment should be
rendered “if the movant shows that there is no genuine dispute as to any material fact and the movant
is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(a). There is “no genuine dispute as to
any material fact” where (1) the parties agree on all facts (that is, there are no disputed facts); (2) the
parties disagree on some or all facts, but a reasonable fact-finder could never accept the nonmoving
party’s version of the facts (that is, there are no genuinely disputed facts), see Matsushita Elec. Indus.
Co., Ltd. v. Zenith Radio Corp., 475 U.S. 574, 587 (1986); or (3) the parties disagree on some or all
facts, but even on the nonmoving party’s version of the facts, the moving party would win as a matter
of law (that is, none of the factual disputes are material), see Anderson v. Liberty Lobby, Inc., 477
U.S. 242, 248 (1986).
In determining whether a fact is genuinely disputed, the court “is not to weigh the evidence
but is instead required to view the evidence in the light most favorable to the party opposing summary
judgment, to draw all reasonable inferences in favor of that party, and to eschew credibility
assessments.” Weyant v. Okst, 101 F.3d 845, 854 (2d Cir. 1996). Nevertheless, to show a genuine
dispute, the nonmoving party must provide “hard evidence,” D’Amico v. City of N.Y., 132 F.3d 145,
149 (2d Cir. 1998), “from which a reasonable inference in [its] favor may be drawn,” Binder & Binder
PC v. Barnhart, 481 F.3d 141, 148 (2d Cir. 2007) (internal quotation marks omitted). “Conclusory
allegations, conjecture, and speculation,” Kerzer v. Kingly Mfg., 156 F.3d 396, 400 (2d Cir. 1998), as
well as the existence of a mere “scintilla of evidence in support of the [nonmoving party’s] position,”
Anderson, 477 U.S. at 252, are insufficient to create a genuinely disputed fact. A moving party is
“entitled to judgment as a matter of law” on an issue if (1) it bears the burden of proof on the issue
and the undisputed facts meet that burden; or (2) the nonmoving party bears the burden of proof on
the issue and the moving party “‘show[s]’ – that is, point[s] out . . . – that there is an absence of
6
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 7 of 14
evidence [in the record] to support the nonmoving party’s [position],” see Celotex Corp. v. Catrett,
477 U.S. 317, 325 (1986).
D. Review of Report and Recommendation
The standard for reviewing a magistrate judge’s report and recommendation is well settled.
When no party objects, the Court may adopt the report if there is no clear error on the face of the
record. See Adee Motor Cars, LLC v. Amato, 388 F. Supp. 2d 250, 253 (S.D.N.Y. 2005). A magistrate
judge’s decision is “clearly erroneous” only if the district court is “left with the definite and firm
conviction that a mistake has been committed.” Easley v. Cromartie, 532 U.S. 234, 242 (2001)
(quoting United States v. United States Gypsum Co., 333 U.S. 364, 395 (1948)). When a party objects,
the objections “must be specific and clearly aimed at particular findings in the magistrate judge’s
proposal.” Harden v. LaClaire, No. 07-cv-4592 (LTS) (JCF), 2008 WL 4735231, at *1 (S.D.N.Y.
Oct. 27, 2008). “[I]f the party makes only conclusory or general objections, or simply reiterates his
original arguments, the Court reviews the Report and Recommendation only for clear error.” Dawson
v. Phillips, No. 03-cv-8632 (RJS) (THK), 2008 WL 818539, at *1 (S.D.N.Y. Mar. 25, 2008) (internal
quotation marks omitted); see also Forsberg v. Always Consulting, Inc., No. 06-cv-13488 (CS), 2008
WL 5449003, at *4 (S.D.N.Y. Dec. 31, 2008) (“[E]ven a pro se party’s objections to a Report and
Recommendation must be specific and clearly aimed at particular findings in the magistrate’s
proposal, such that no party be allowed a second bite at the apple by simply relitigating a prior
argument.”). However, “[t]he district judge must determine de novo any part of the magistrate judge’s
disposition that has been properly objected to.” Fed. R. Civ. P. 72(b)(3); 28 U.S.C. § 636(b)(1); see
also Grassia v. Scully, 892 F.2d 16, 19 (2d Cir. 1989) (explaining that § 636(b)(1) “affords the district
court broad latitude” in reviewing the magistrate judge’s recommendation).
7
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 8 of 14
III. DISCUSSION
With respect to the argument that Judge Ellis erred in concluding that the reviews are not
defamatory, Plaintiffs’ contention is a merely generalized assertion that is not aimed at any specific
finding in the Report, and simply reiterates arguments previously made to Judge Ellis. This purported
objection is thus improper as seeking a “second bite at the apple.” Thomas v. Astrue, 674 F. Supp.
2d 507, 511 (S.D.N.Y. 2009). Accordingly, the Court reviews the conclusion that Defendants’
reviews are not defamatory only for clear error, and has very little difficulty concluding that the
recommendation was not clearly erroneous. Indeed, to have concluded otherwise would most
certainly have constituted clear error. However, Plaintiffs do raise two objections properly: that
Judge Ellis failed to consider Terri Bowden’s letter separately in assessing Plaintiffs’ defamation
claims, and that Judge Ellis overlooked the fact that Plaintiffs pre-pay for VRBO ad space, such that
his conclusion that Plaintiffs’ business relations were unharmed by Terri Bowden’s letter was
erroneous. Accordingly, the Court will consider each of these objections de novo.
A. Defamation in Terri Bowden’s Letter
As to Plaintiffs’ contention that Terri Bowden’s letter to VRBO – separate from the reviews
left on the Apartment’s VRBO listing by the Bowdens and the Johnstons – was defamatory, the Court
concludes that dismissal of the defamation claim, and denial of the motion to amend as to the
defamation claim, is warranted. 3 “In New York, a plaintiff must establish five elements to recover in
libel: (1) a written defamatory factual statement concerning the plaintiff; (2) publication to a third
party; (3) fault; (4) falsity of the defamatory statement; and (5) special damages or per se
actionability.” Chau v. Lewis, 771 F.3d 118, 126–27 (2d Cir. 2014). To meet the first requirement,
3
All claims relating to Terri Bowden’s letter were first put forth in the PAC, as the letter was sent after the commencement
of this litigation.
8
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 9 of 14
the statement at issue must be “defamatory, it must be . . . factual – that is, not opinion – and it must
be . . . about the plaintiff, not just a general statement.” Id.
In New York, the determination of whether a statement is a fact or an opinion is left to the
Court. See, e.g., Belly Basics, Inc. v. Mothers Work, Inc., 95 F. Supp. 2d 144, 145 (S.D.N.Y. 2000). 4
“There is no bright line test to aid in determining whether a statement is one of opinion or fact, as
expressions of ‘opinion’ may often imply an assertion of objective fact.” Id. Rather, the Court must
consider three factors: “(1) whether the challenged statements have a precise and readily understood
meaning; (2) whether the statements are susceptible of being proven false; and (3) whether the context
signals to the reader that the statements are more likely to be expressions of opinion rather than fact.”
Cytyc Corp. v. Neuromedical Sys., Inc., 12 F. Supp. 2d 296, 302 (S.D.N.Y. 1998); see also Brian v.
Richardson, 660 N.E.2d 1126, 1129 (1995) (outlining the three factors). In considering context, the
Court must look to “the content of the communication as a whole, as well as its tone and apparent
purpose,” and should examine the “nature of the particular forum.” Brian, at 660 N.E.2d at 1129–30.
“When the defendant’s statements, read in context, are readily understood as conjecture, hypothesis,
or speculation, this signals the reader that what is said is opinion, not fact.” Sabratek Corp. v. Keyser,
No. 99-cv-8589 (HB), 2000 WL 423529, at *6 (S.D.N.Y. Apr. 19, 2000). Additionally, while
statements of opinion may imply a basis in fact and be actionable in defamation, statements of opinion
“that are accompanied by a recitation of supporting facts, or . . . that do not imply the existence of
such facts, are not.” Abbott v. Harris Publications, Inc., No. 97-cv-7648 JSM, 1998 WL 849412, at
*5 (S.D.N.Y. Dec. 4, 1998) (citing Gross v. New York Times Co., 623 N.E.2d 1163, 1168 (1993)
(“[A] proffered hypothesis that is offered after a full recitation of the facts on which it is based is
readily understood by the audience as conjecture.”)); see also Levin v. McPhee, 119 F.3d 189, 197
4
Although neither party addressed choice of law, the briefs assume New York law, and “such implied consent is sufficient
to establish choice of law.” Krumme v. WestPoint Stevens Inc., 238 F.3d 133, 138 (2d Cir. 2000) (internal quotation
marks omitted).
9
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 10 of 14
(2d Cir. 1997) (“Though some statements may be characterized as hypothesis or conjecture, they may
yet be actionable if they imply that the speaker’s opinion is based on the speaker’s knowledge of facts
that are not disclosed.”).
Here, after considering the three factors necessary to determining whether a statement is fact
or opinion – that is, whether the statement has a “precise and readily understood meaning,” whether
the statement is “susceptible of being proven false,” and whether the “context signals to the reader
that the statements are more likely to be expressions of opinion rather than fact,” Cytyc, 12 F. Supp.
2d at 302 – the Court concludes that all of the letter’s allegedly defamatory statements are pure
opinion and are thus non-actionable.
First, there is little doubt that statements reflecting that (1) “There is no way [the Apartment]
could be considered 4 or 5 stars!,” (2) “[Mr. Galland] has offered me $300 to rescind the review,
which in my mind is equivalent to bribery and extortion,” (3) “I have received 2 emails from Mr.
Galland which I found to be both threatening and disturbing in which he requested that I withdraw
my review or face legal action for ‘breach of contract,’” and (4) “I . . . do not wish to hear from Mr.
Galland again and would request that he be banned from advertising on VRBO or any affiliated sites,”
are opinion on their face. (PAC ¶ 63 (emphasis added).) Each of these statements is expressly
couched in terms indicating that the writer – Terri Bowden – was stating her opinion as to actions
undertaken by Galland, or as to the nature of the Apartment. Additionally, the letter recites that
Galland offered $300 in exchange for her taking down the VRBO review, and that Galland threatened
a lawsuit for breach of contract if she did not comply – neither of which is disputed by Plaintiffs –
without any suggestion that Terri Bowden premised her opinions on any facts besides these. Clearly,
the allegedly defamatory letter was written by a frustrated renter to VRBO in order to voice
dissatisfaction with the conduct of one of its property owners; read in context, the statements would
be immediately understood by any reasonable reader as opinion. In fact, the Proposed Amended
10
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 11 of 14
Complaint makes clear that the letter’s recipient – a VRBO representative – actually understood the
letter as opinion-based, since when he forwarded the letter to Plaintiffs, he noted, “We take complaints
seriously, but also understand that there are two sides to every story.” (PAC Ex. p. 57.)
Likewise, the letter’s reference to the fact that VRBO is “not the place for a person who
chooses to run his business in a threatening manner to get good reviews,” and its speculation as to
“how many people [Claude Galland] has done this to and how many of those people have been
intimidated enough to withdraw their . . . reviews,” are clearly opinions in context. Obviously, such
statements are not readily understood as having a precise meaning, nor are they susceptible of being
proven false. To the extent these statements imply any fact – e.g., that Plaintiffs run their business in
a threatening manner to maintain good reviews – the statements are accompanied by a recitation of
the facts on which they are based, as noted above. Indeed, in context, those very facts – that Mr.
Galland threatened Terri Bowden with litigation and offered her money in exchange for the rescission
of the review, and that the Apartment’s reviews are more positive than she would expect – clearly
demonstrate that her speculation regarding Plaintiffs’ conduct with other renters is just that:
speculation, based on her own experiences, as to whether Plaintiffs have engaged in the same conduct
with other renters. Her belief that Plaintiffs might be engaging in threatening and intimidating
conduct with other renters is based exclusively on the fact that she felt threatened and intimidated,
and any reasonable reader would have, in context, understood the letter to be expressing conjecture
and speculation, not fact. See Sabratek, 2000 WL 423529, at *6. Accordingly, the Court grants the
Bowdens’ motion to dismiss and denies Plaintiffs’ motion to amend insofar as the Complaint and
PAC are premised on Terri Bowden’s letter.
B. Tortious Interference with Business Relations
The Objections also challenge Judge Ellis’s conclusion that Plaintiffs’ proposed amendment,
which added a tortious interference with business relations claim, was futile. (See Objs. at 2; Rep. at
11
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 12 of 14
4.) Specifically, the Report found that the PAC failed to allege that Plaintiffs’ relationship with
VRBO was injured – which is an element of tortious interference with business relations under New
York law – such that amendment would be futile. 5 This conclusion was based in part on the fact that
Plaintiffs’ ads are still running on VRBO, but according to the Objections, those ads “were pre-paid
a year in advance,” and the fact that they remain is not evidence of a continuing relationship with
VRBO. (Objs. at 2.) However, even accepting the fact that Plaintiffs’ ad space with VRBO was prepaid – a fact alleged nowhere in the Complaint or PAC – Plaintiffs have still failed to affirmatively
plead the fact that the relationship between Plaintiffs and VRBO was actually injured. 6 Plaintiffs
have thus failed to plead a necessary element of their tortious interference with business relations
claim, and Judge Ellis correctly denied their motion to amend the complaint.
C. Remainder of the Report
Finally, the Court has carefully reviewed the rest of Judge Ellis’s recommendation and the
record, and, in the absence of any other objections, concludes that the Report is not otherwise clearly
erroneous. Accordingly, the Court adopts the remainder of the Report in its entirety.
IV. CONCLUSION
For the foregoing reasons, the Court adopts the Report in its entirety and HEREBY ORDERS
THAT the Johnstons’ and Bowdens’ motion to dismiss are GRANTED to the extent they seek
dismissal of all but the breach of contract claims and DENIED to the extent they seek dismissal of
5
The elements of tortious interference with business relations in New York are: “(1) there is a business relationship
between the plaintiff and a third party; (2) the defendant, knowing of that relationship, intentionally interferes with it; (3)
the defendant acts with the sole purpose of harming the plaintiff, or, failing that level of malice, uses dishonest, unfair, or
improper means; and (4) the relationship is injured.” Goldhirsh Grp., Inc. v. Alpert, 107 F.3d 105, 108–09 (2d Cir. 1997).
6
Judge Ellis correctly limited the tortious interference with business relations inquiry to Plaintiffs’ relationship with
VRBO, as opposed to Plaintiffs’ hypothetical relationships with future renters, since a relationship must presently exist
for it to form the basis of a tortious interference claim. See, e.g., Mahmud v. Kaufmann, 454 F. Supp. 2d 150, 162
(S.D.N.Y. 2006) (“To claim tortuous interference with a prospective business relationship a plaintiff must specify some
particular, existing relationship through which plaintiff would have done business but for the allegedly tortuous behavior.”
(alteration and internal quotation marks omitted)).
12
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 13 of 14
the breach of contract claims. IT IS FURTHER ORDERED THAT Plaintiffs' motion to amend the
complaint and motion for summary judgment as to the breach of contract claims are DENIED.
IT IS FURTHER ORDERED THAT the Johnstons shall file an answer to the Complaint with
respect to the sole remaining cause of action - the breach of contract claim - no later than April 13,
2015. The case shall remain referred to Judge Ellis for general pre-trial supervision and for a report
and recommendation on any dispositive motions, and the parties shall comply with any orders set
forth by Judge Ellis. The Clerk of the Court is respectfully directed to terminate the motions pending
at docket entry numbers 4, I 0, 18, and 22.
SO ORDERED.
Dated:
vE?~
March 19, 2015
New York, New York
RICJ4"'ARD J. SULLIVAN
UNITED STATES DISTRICT JUDGE
13
Case 1:14-cv-04411-RJS-RLE Document 32 Filed 03/19/15 Page 14 of 14
A copy of this Order has been sent to:
Claude and Violaine Galland
166 West 75th St
Suite 1214
New York, NY 10023
James and Judith Johnston
1025 Pinecrest Terrace
Ashland, OR 97520
14
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 1 of 14 PageID #:142
UNITED STATES DISTRICT COURT
FOR THE NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
CDM MEDIA USA, INC.,
Plaintiff,
No. 14 CV 9111
v.
Judge Manish S. Shah
ROBERT SIMMS,
Defendant.
MEMORANDUM OPINION AND ORDER
Plaintiff CDM Media USA has sued its former employee, defendant Robert
Simms, for refusing to transfer control of a LinkedIn group the company says it
owns. Plaintiff also alleges that defendant wrongfully held onto the company’s
confidential information after he left the company, which he used in competition
with his former employer.
In a three-count amended complaint, plaintiff claims defendant’s conduct
constituted breach of contract, violation of the Illinois Trade Secrets Act, and
common law misappropriation. Defendant has moved under Rule 12(b)(6) to dismiss
the complaint in its entirety for failure to state a claim. For the following reasons,
defendant’s motion is granted in-part and denied in-part.
I.
Legal Standard
“A motion under Rule 12(b)(6) tests whether the complaint states a claim on
which relief may be granted.” Richards v. Mitcheff, 696 F.3d 635, 637 (7th Cir.
2012). Under Rule 8(a)(2), a complaint must include “a short and plain statement of
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 2 of 14 PageID #:143
the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). The
short and plain statement under Rule 8(a)(2) must “give the defendant fair notice of
what the claim is and the grounds upon which it rests.” Bell Atlantic Corp. v.
Twombly, 550 U.S. 544, 555 (2007) (quotation omitted). In reviewing the sufficiency
of a complaint, a court accepts the well-pleaded facts as true. Alam v. Miller
Brewing Co., 709 F.3d 662, 665-66 (7th Cir. 2013).
II.
Background
Plaintiff CDM Media USA, Inc. offers a variety of marketing and media
services to its customers [1-1]1 ¶ 8. “A crucial part of CDM’s business lies in its
contacts and the channels and methods for communicating with its clients and
prospective clients and developing products and services for those clients and
prospective clients.” Id. ¶ 11. As a result, CDM must “constantly develop new and
innovative ways to market itself and its services and communicate with its
customers and its potential customers . . . .” Id. ¶ 12.
Defendant Robert Simms worked for CDM from June 2009 until July 2014.
Id. ¶ 13. At the time he began working for plaintiff, defendant agreed to abide by
the company’s employee handbook. Id. ¶ 21. Among other things, the handbook
instructed defendant to keep certain of plaintiff’s information confidential and to
return plaintiff’s property when he left the company. Id. In March 2013, defendant
also entered into a non-compete agreement with plaintiff, which (1) required
defendant to return plaintiff’s confidential information upon leaving the company,
1
Citations to [1-1] refer only to the amended complaint contained in that document.
2
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 3 of 14 PageID #:144
(2) prohibited defendant from competing with CDM for one year following his
departure, and (3) assigned defendant’s inventions to the company. Id. ¶¶ 24-26.
As part of the senior management team, defendant had access to
“confidential and restricted-access CDM materials including vendor and customer
lists and pricing and cost data.” Id. ¶ 14. For instance, defendant had access to
plaintiff’s Event Logistic Management database, in which the company stored some
of its “most sensitive information, including CDM vendor and customer lists, pricing
and cost data regarding its products and services, profit and loss information, etc.”
Id. ¶ 29. Access to this database was restricted and only a small number of senior
management had complete access. Id. ¶ 31.
In the spring of 2010, CDM launched a LinkedIn group called “the CIO
Speaker Bureau,” a private online community of chief information officers and
senior IT executives interested in participating in or speaking at CDM events. Id.
¶ 15. The names of Bureau members and the communications between members
were not generally available to the public at large. Id. ¶ 16. Membership in the
Bureau was controlled by CDM. Id. ¶ 17. Defendant was made CDM’s point person
for this LinkedIn group, as well as for the other online communities CDM used in
connection with its business. Id. ¶ 18. By the time defendant left CDM, membership
in the Bureau had grown to about 679 members. Id. ¶ 20. Plaintiff alleges that “the
Bureau and all rights therein or in connection therewith was at all times the
property of CDM.” Id. ¶ 48.
3
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 4 of 14 PageID #:145
Defendant resigned from CDM in July 2014 and began working for one of
plaintiff’s larger customers, a company called Box. Id. ¶¶ 38, 40. Plaintiff asked
defendant to complete paperwork changing the contacts for the social media
accounts he had used in his work for CDM. Id. ¶ 49. Although defendant made the
changes for the other social media accounts, he refused to do it for the Speaker
Bureau LinkedIn group. Id. ¶ 50. Defendant likewise “refused to return the Bureau
membership list and Bureau communications,” and he later used the materials “to
compete against CDM by soliciting customers and vendors and potential customers
and vendors for competitive products and services in further violation of his NonCompete.” Id. ¶¶ 50, 52. Three customers advised plaintiff that defendant had
“solicited them in violation of his Non-Compete.” Id. ¶ 44.
Plaintiff also asked defendant to return any confidential information or other
company property in his possession. Id. ¶ 53. Although defendant told plaintiff he
had nothing of the like, plaintiff’s subsequent internal investigation revealed that
defendant had been using a personal cell phone to access the ELM database, and he
did not return the data stored on his phone. Id. ¶ 57.
Plaintiff filed a three-count complaint in state court, which defendant
removed to this court under 28 U.S.C. §§ 1332(a)(2) and 1446.2 Plaintiff seeks relief
based on theories of breach of contract, violation of the Illinois Trade Secrets Act
(765 ILCS 1065/1 et seq.), and common law misappropriation. Defendant has moved
2
Plaintiff is an Illinois corporation and defendant is a resident and citizen of Great Britain.
4
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 5 of 14 PageID #:146
under Federal Rule of Civil Procedure 12(b)(6) to dismiss each of plaintiff’s three
claims.
III.
Analysis
A.
Count I – Breach of Contract
“Under Illinois law, a plaintiff looking to state a colorable breach of contract
claim must allege four elements: ‘(1) the existence of a valid and enforceable
contract; (2) substantial performance by the plaintiff; (3) a breach by the defendant;
and (4) resultant damages.’” Reger Development, LLC v. National City Bank, 592
F.3d 759, 764 (7th Cir. 2010) (quoting W.W. Vincent & Co. v. First Colony Life Ins.
Co., 351 Ill. App. 3d 752, 759 (1st Dist. 2004)). In this case, plaintiff claims
defendant breached his employment contract by (1) working for Box, (2) soliciting
plaintiff’s customers, (3) failing to transfer control of the LinkedIn group, and (4)
failing to return the contents of his personal cell phone. Plaintiff believes the
agreement defendant breached consisted of both the CDM Employee Handbook and
the non-compete.
1.
“The existence of a valid and enforceable contract”
Defendant argues that Count I should be dismissed because plaintiff has not
alleged a valid and enforceable contract. This argument is plainly incorrect with
regard to the non-compete, a signed copy of which defendant attached to his brief
(and which plaintiff referenced in the complaint). Defendant’s argument has more
merit, however, as concerns the CDM Employee Handbook. The signed non-compete
5
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 6 of 14 PageID #:147
makes clear that no other agreement governed the parties’ relationship ([13-3]
¶ 5.3):
Employee acknowledges and agrees that his or her employment with
the Company exists solely at the will of either party and may be
terminated by either at any time without notice and with or without
cause. Employee likewise acknowledges and agrees that any employee
handbooks or policies and procedures of the Company are strictly
guidelines and do not constitute a contract between the Company and
the Employee. No employee or representative of the Company has any
authority to enter into any agreement contrary to the foregoing.
Although plaintiff alleges that defendant “agreed to follow the CDM employee
handbook,” [1-1] ¶ 21, this allegation does not plausibly support a breach of contract
claim in light of the non-compete’s explicit terms. And to the extent the handbook
was an enforceable contract when defendant started, the parties altered that
agreement when they entered into the non-compete.
2.
“Substantial performance by the plaintiff”
The non-compete does not place any affirmative obligations on plaintiff, other
than the implicit obligation to pay defendant. Along these lines, paragraph 28
explicitly states that “[i]n consideration for the Non-Compete, [defendant] enjoyed
continued employment with [plaintiff] and also received a car allowance.” Id. ¶ 28.
This adequately alleges substantial performance by plaintiff.
3.
“A breach by the defendant”
Defendant argues that plaintiff failed to allege a breach of § 2.2
(“Noncompetition”) or § 2.3 (“Customers”) of the non-compete. He first contends that
plaintiff has not alleged a breach of either section because the two provisions
regulate defendant’s activity with regard to plaintiff’s competitors not customers.
6
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 7 of 14 PageID #:148
This argument stems from the allegation that Box was one of plaintiff’s “larger
customers.” [1-1] ¶ 40. But simply because Box was once plaintiff’s customer does
not mean it could not have become its competitor. If a customer wanted to enter into
a new market and start competing with its former vendor, a logical first step might
be to hire the vendor’s employees. Plaintiff’s allegation that defendant has been
competing for CDM’s customers while at Box is therefore plausible. Id. ¶¶ 2, 44-46.
Defendant next argues that the complaint fails to allege he performed
services for Box that were—as § 2.2 proscribes—“substantially similar to the
services he or she performed for” CDM. To be sure, the complaint does not contain
many details about the nature of defendant’s work for Box. But, construing the
pleadings in the light most favorable to plaintiff, the claim that defendant’s new job
is “substantially similarly” to his old one can be reasonably inferred from the
allegations that (1) defendant was partly responsible for business development at
CDM, (2) he now works for plaintiff’s (former) customer where he competes for
plaintiff’s current customers, and (3) he has been using CDM’s property and
confidential information in furtherance of that competition. Accordingly, I cannot
say as a matter of law that defendant is not performing services for Box that are
substantially similar to what he was doing at CDM.
Defendant next argues that, contrary to plaintiff’s claim, he was under no
duty to remit his personal cell phone when he left CDM. While true the complaint
demonstrates no such specific duty, that is not what plaintiff actually claims.
Instead, the company contends that defendant took data from the ELM database,
7
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 8 of 14 PageID #:149
stored it on his personal phone, and then failed to return the data upon his
departure. Although defendant allegedly told plaintiff that he “did not have any
confidential information or property in his possession,” [1-1] ¶ 53, plaintiff clearly
alleges that this representation was false. Accepting plaintiff’s allegation as true,
defendant’s retention of plaintiff’s data constituted a breach of § 1.1 of the noncompete (“Return of Data”).
Finally, defendant argues that his alleged failure to transfer control of the
LinkedIn group could not have violated § 1.1 because the group does not “contain[]
or relate[] to Confidential Information.” At this early stage of the litigation,
however, I cannot conclude whether or not control of the Speaker Bureau falls
within the scope of § 1.1. For example, plaintiff alleges that defendant refused to
return “Bureau communications.” If these communications were private messages
between the members and plaintiff, which is reasonable to infer, they likely would
fall within § 1.1.
On Count I, defendant’s motion is granted as to all claims premised on the
CDM Employee Handbook, and denied as to the others.
B.
Count II – Illinois Trade Secrets Act
To state a claim under the Illinois Trade Secrets Act, a plaintiff must allege
(1) the existence of a trade secret, (2) misappropriation of that trade secret, and (3)
that the trade secret was used in the defendant’s business. See Strata Marketing,
Inc. v. Murphy, 317 Ill. App. 3d 1054, 1068 (1st Dist. 2000). The Illinois Trade
Secrets Act defines “trade secret” as:
8
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 9 of 14 PageID #:150
[I]nformation, including but not limited to, technical or non-technical
data, a formula, pattern, compilation, program, device, method,
technique, drawing, process, financial data, or list of actual or potential
customers or suppliers, that: (1) is sufficiently secret to derive
economic value, actual or potential, from not being generally known to
other persons who can obtain economic value from its disclosure or use;
and (2) is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy or confidentiality.
765 ILCS 1065/2(d). In addition to this statutory definition, Illinois courts have
identified six common-law factors relevant to evaluating whether information
qualifies as a trade secret:
(1) the extent to which the information is known outside the employer’s
business, (2) the extent to which it is known by employees and others
involved in the business, (3) the extent of the measures taken by the
employer to guard the secrecy of the information, (4) the value of the
information to the employer and to his or her competitors, (5) the
amount of effort or money expended by the employer in developing the
information, and (6) the ease or difficulty with which the information
could be properly acquired or duplicated by others.
Stenstrom Petroleum Services Group, Inc. v. Mesch, 375 Ill. App. 3d 1077, 1090 (2d
Dist. 2007). In this case, the alleged trade secrets are (1) the Speaker Bureau’s
membership list, (2) the “confidential information contained” in the LinkedIn group
(e.g., “private communications”), and (3) the contents of the ELM database. [1-1]
¶ 67.
1.
Speakers Bureau Membership List
Defendant believes Count II should be dismissed because the Speakers
Bureau LinkedIn group is not secret. Defendant points out that plaintiff announced
its creation through a press release. This argument is a non-starter, however,
because plaintiff does not claim the group’s existence to be secret—only its contents.
9
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 10 of 14 PageID #:151
More generally, too little is known about the contents, configuration, and
function of the LinkedIn group at this time, to conclude as a matter of law that its
list of members did not constitute a trade secret. Plaintiff alleges that the group
contained the names of 679 current or potential customers, which information
“would be extremely valuable to competitors of CDM” because these members
“would be good candidates for some of the services and products offered by CDM
and/or good partners . . . .” Id. ¶ 72. The complaint states that the “Bureau was
developed over 4 years by CDM through great expenditures of time, cost and effort .
. . .” Id. ¶ 74. Plaintiff further alleges that “privacy setting[s] . . . limited access to
the Bureau online community.” Id. ¶ 69.
Defendant disagrees with plaintiff’s characterization.
He cites LinkedIn’s
“About Page,” its terms, and its conditions. Defendant also invites the court to visit
the Speaker Bureau’s page on LinkedIn. Defendant cites no authority for the
proposition, however, that judicial notice of any of these materials, or consideration
of the information they contain, is appropriate at this stage on a motion to dismiss
where the complaint plausibly alleges that the membership list was a valuable
secret commodity. Defendant’s evidence merely raises a factual issue that cannot be
resolved now.
On Count II, the motion is denied as to the Speaker Bureau membership list.
2.
“Confidential Information”
Plaintiff’s complaint gives little sense of what “confidential information” is
contained in the LinkedIn group other than saying there are “private
10
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 11 of 14 PageID #:152
communications” about “the IT industry and the members’ business needs and
desires.” Id. ¶ 72. While a private communication can contain a trade secret, it is
not itself a trade secret. It is therefore insufficient for plaintiff to allege that the
LinkedIn group’s private communications were trade secrets under the Illinois Act.
Plaintiff must allege that certain messages—or at least classes of messages—
contained trade secrets, setting forth what it is about the messages that plausibly
satisfies the applicable definitions. For example, plaintiff must allege facts
supporting the inference that a message from a company sharing its business needs
is somehow CDM’s secret.
On Count II, the motion is granted as to the “confidential information”
contained in the Speaker Bureau group.
3.
ELM Database
Defendant says Count II should be dismissed because plaintiff does not allege
that defendant had access to the ELM database after he left the company. This
argument is not persuasive, however, because—as already noted—that is not
plaintiff’s claim. Instead, CDM alleges that defendant downloaded data from the
ELM database onto his personal phone and failed to return that data when leaving.
Nevertheless, this trade-secrets claim fails because plaintiff does not allege
that defendant actually used the data from the ELM database in his business.
Although plaintiff claims in its brief that it did so allege, nothing in the paragraphs
it cites (¶¶ 44-47) supports the inference that defendant used the ELM data to
11
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 12 of 14 PageID #:153
solicit any customers. Instead, plaintiff acknowledges that “Simms had contact with
[the customers he allegedly solicited] while he was employed by CDM.” [1-1] ¶ 46.
The parties also debate whether the “inevitable disclosure doctrine” is
satisfied in this case. Under that rule, a plaintiff may bring a trade-secrets claim—
even if the trade secret has not yet been used—if the defendant “could not operate
or function without relying on [plaintiff’s] alleged trade secret.” Strata Marketing,
317 Ill. App. 3d at 1070. Plaintiff believes its complaint states a claim under this
theory and it cites paragraphs 73 and 75 in support. These paragraphs are
insufficient, however. Paragraph 73 merely describes how valuable the data in the
ELM database was, while paragraph 75 asserts only that:
Given Simm’s position and responsibilities while he was at CDM, given
his access to restricted and sensitive data while at CDM and given his
activities after leaving CDM, further disclosures of CDM trade secrets
and confidential information are so threatened that it is inevitable that
Simms will disclose other confidential information and trade secrets
belonging to CDM.
This sole paragraph is far too vague and conclusory to do all the work of stating a
claim under the inevitable disclosure doctrine. Plaintiff argues that this allegation
is “nearly identical to the allegations found to be sufficient” in Strata Marketing,
but a review of that decision demonstrates that its allegations were vastly more
specific about which information would inevitably be disclosed. See 317 Ill. App. 3d
at 1070-71.
On Count II, the motion is granted as to the ELM database.
12
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 13 of 14 PageID #:154
C.
Count III – Common Law Misappropriation
Defendant argues that Count III should be dismissed because the Illinois
Trade Secrets Act preempts it. See 765 ILCS 1065/8(a) (“this Act is intended to
displace conflicting tort, restitutionary, unfair competition, and other laws of this
State providing civil remedies for misappropriation of a trade secret.”). Plaintiff’s
response is that it brings Count III, which does not depend on the information being
confidential, as an alternative to Counts I and II. The Seventh Circuit has
recognized that the Illinois Trade Secrets Act’s preemptive reach does not “apply to
duties imposed by law that are not dependent upon the existence of competitively
significant secret information.” Hecny Transportation, Inc. v. Chu, 430 F.3d 402,
405 (7th Cir. 2005). The contours of common law misappropriation are far from
clear in Illinois. But the tort has its genesis in International News Service v.
Associated Press, 248 U.S. 215 (1918), which involved the misappropriation of “hot
news”—not “competitively significant secret information.” Similarly, in Capitol
Records, Inc. v. Spies, 130 Ill. App. 2d 429 (1st Dist. 1970), the cause of action was
applied to a case involving the sale of unauthorized recordings of music albums—
again, not a situation involving “competitively significant secret information.” It
would appear, therefore, that like the torts of conversion, theft, and breach of
fiduciary duty, the tort of common law misappropriation is not necessarily
preempted by the Illinois Trade Secrets Act since it does not depend on secret
information.
13
Case: 1:14-cv-09111 Document #: 23 Filed: 03/25/15 Page 14 of 14 PageID #:155
Plaintiff’s Count III is quite brief, but it does distinguish itself from Counts I
and II through its lack of reference to confidential or secret information. Unlike
defendant’s cited case, Holman v. Indiana, 211 F.3d 399 (7th Cir. 2000), it is
therefore reasonable to read Count III as constituting an alternative theory of
liability.
On Count III, defendant’s motion to dismiss is denied.
IV.
Conclusion
Defendant’s motion to dismiss [13] is granted in-part and denied-in part.
ENTER:
___________________________
Manish S. Shah
United States District Judge
Date: 3/25/15
14
United States Court of Appeals
FOR THE DISTRICT OF COLUMBIA CIRCUIT
Argued October 20, 2014
Decided April 17, 2015
No. 14-1024
CHARLES WEIGAND,
PETITIONER
v.
NATIONAL LABOR RELATIONS BOARD,
RESPONDENT
On Petition for Review of an Order of
the National Labor Relations Board
John N. Raudabaugh argued the cause and filed the briefs
for petitioner.
Heather S. Beard, Attorney, National Labor Relations
Board, argued the cause for respondent. With her on the brief
were Richard F. Griffin, Jr., General Counsel, John H.
Ferguson, Associate General Counsel, Linda Dreeben,
Deputy Associate General Counsel, and Usha Dheenan,
Supervisory Attorney. Robert J. Englehart, Supervisory
Attorney, entered an appearance.
Before: KAVANAUGH, Circuit Judge, SRINIVASAN,
Circuit Judge, and EDWARDS, Senior Circuit Judge.
2
Opinion for the Court filed by Senior Circuit Judge
EDWARDS.
EDWARDS, Senior Circuit Judge: Charles Weigand
(“Weigand”) petitions for review of a decision and order of
the National Labor Relations Board (“Board”). Weigand
claims that the Board erred in dismissing his charge that the
Amalgamated Transit Union, Local Union No. 1433, AFLCIO (“Union” or “Respondent”) violated Section 8(b)(1)(A)
of the National Labor Relations Act, (“NLRA” or the “Act”),
29 U.S.C. § 158(b)(1)(A), by failing to remove derisive and
allegedly threatening comments posted on a Facebook page
maintained for Union members. The disputed comments,
which were written by some Union members without the
permission of the Union, appeared on Facebook when the
Union was on strike against Veolia Transportation Services in
Phoenix, Arizona (“Veolia” or the “Employer”). The
Facebook postings made disparaging remarks about people
who crossed the Union’s picket line. Weigand filed a charge
with the Board’s Acting General Counsel, who issued a
complaint alleging that the Union had committed an unfair
labor practice in violation of Section 8(b)(1)(A).
During the hearing before the Administrative Law Judge
(“ALJ”), the General Counsel argued that the Union had a
“duty to disavow” the Facebook comments, just as it might
have a duty to disavow picket-line misconduct. Amalgamated
Transit Union, Local Union No. 1433 (“Amalgamated Transit
Union”), 360 N.L.R.B. No. 44 (Feb. 12, 2014), slip op. at 5.
The ALJ rejected the General Counsel’s position, holding that
the “Facebook page is in no way ‘an electronic extension’ of
[the Union’s] picket line.” Id. The Board largely affirmed the
judgment of the ALJ. Id. at 1 & n.1. With respect to the
matter now before this court, the Board held that the Union
was not responsible for the Facebook comments because “the
3
individuals who posted the comments were neither alleged
nor found to be agents of the [Union].” Id. at 1 n.1. Two
members of the Board’s three-person panel also held that the
Facebook comments did not violate the Act because they
were not “threats” under Section 8(b)(1)(A). Id.
In his petition for review, Weigand does not challenge
the Board’s finding that the persons who posted the allegedly
threatening comments at issue in this case were not agents of
the Union. Instead, he argues that the Union should be held
responsible for the Facebook entries posted by Union
members because a Union officer controlled the Facebook
page. We disagree and therefore deny Weigand’s petition for
review.
In accepting most of the ALJ’s proposed rulings,
findings, and conclusions, the Board embraced the position
that the comments on the Union’s private Facebook page
were not analogous to misconduct on a picket line.
Undergirding this position are two important findings: first,
the Facebook page was not accessible or viewable by anyone
other than active Union members – that is, the derisive
messages were not aimed at either the public at large or at
non-union persons who opted to cross the picket line; and
second, the disputed postings were made by persons who
acted on their own without the permission of the Union. In the
Board’s view, the second finding is critical and dispositive.
See id. at 1 n.1. In light of these findings, the Board concluded
that the Union was not liable for the contested speech posted
by persons who were not acting as agents of the Union.
The Board’s decision regarding the Facebook postings is
“the product of reasoned decisionmaking,” Motor Vehicle
Mfrs. Ass’n of U.S. v. State Farm Mut. Auto. Ins. Co., 463
U.S. 29, 52 (1983), and it is supported by the record. In
4
circumstances such as this, “[w]hen the NLRB concludes that
no violation of the NLRA has occurred, that finding is upheld
unless it has no rational basis or is unsupported by substantial
evidence.” United Steelworkers of Am., Local 14534 v. NLRB,
983 F.2d 240, 244 (D.C. Cir. 1993) (internal quotation marks
omitted). On the record before us, we have no basis to
overturn the Board’s judgment that the Union was not liable
for the acts of non-agents. We need not reach the question
whether the disputed Facebook postings were “threatening,”
i.e., in the sense that they might have constituted a violation
of Section 8(b)(1)(A) if made by agents of the Union. We
leave this issue for another day.
Finally, in adopting the ALJ’s finding that the Union “did
not violate the Act by failing to remove certain comments
from its Facebook page,” the Board found it “unnecessary to
rely on the [ALJ’s] application of the Communications
Decency Act, 47 U.S.C. § 230” (“CDA”). Amalgamated
Transit Union, 360 N.L.R.B. No. 44, slip op. at 1 n.1.
Weigand argues that “[t]he Board erred in refusing to
consider and reverse the ALJ’s holding that the Union is not
liable under the CDA for posting threats on its Facebook
page.” Br. for Petitioner 6. We disagree. In resolving this
case, the Board properly applied the applicable law under the
NLRA. Therefore, we agree with Board counsel that the
Board “did not need to analyze the CDA as an additional
defense for the Union, let alone consider Weigand’s
unsupported assertion that the CDA somehow constitutes an
affirmative cause of action necessary to the Board’s analysis.”
Br. for the NLRB 11.
5
I.
BACKGROUND
A. Statutory and Legal Background
Section 7 of the NLRA protects employees’ rights “to
self-organization, to form, join, or assist labor organizations,
to bargain collectively through representatives of their own
choosing, and to engage in other concerted activities for the
purpose of collective bargaining or other mutual aid or
protection.” 29 U.S.C. § 157. Section 7 also guarantees the
right to “refrain from any and all of such activities.” Id.; see
also NLRB v. Granite State Joint Board, Textile Workers
Union of America, Local 1029, 409 U.S. 213, 216 (1972)
(“Under § 7 of the Act the employees have ‘the right to
refrain from any or all’ concerted activities relating to
collective bargaining or mutual aid and protection . . . .”).
Section 8(b)(1)(A) of the Act makes it “an unfair labor
practice for a labor organization or its agents . . . to restrain or
coerce . . . employees in the exercise of [their Section 7
rights].” 29 U.S.C. § 158(b)(1)(A).
B. Facts
At all relevant times, the Union was the exclusive
representative of a bargaining unit of full-time and part-time
bus drivers employed by Veolia. Weigand was an employee
of Veolia and a member of the collective bargaining unit
represented by the Union, but he was not a Union member.
From 2011 to 2012, the Union and Veolia were engaged in
collective bargaining negotiations regarding the terms of a
successor agreement. A breakdown in the negotiations led to a
six-day strike in March of 2012. During the negotiations and
the strike, the Union used the Facebook page to communicate
with members about its progress and its planned picket lines.
6
The Union’s Facebook account was created in 2010 by
then-Union Vice President Michael Cornelius (“Cornelius”).
The Facebook page could only be accessed by Union
members who were employed and in good standing with the
Union. No other persons had access to the site or could post
comments on the Facebook page. Leading up to and during
the strike, communications on the Facebook page by Union
members were often impassioned and bellicose. For example,
the posted comments included a rhetorical question asking if
the picketers could “bring the Molotov Cocktails” to picket
the hotel where the “scabs” were being housed. Amalgamated
Transit Union, 360 N.L.R.B. No. 44, slip op. at 4. However,
there were no allegations or findings of violence or untoward
disturbances during the Union strike.
C. Proceedings Below
In April 2012, Weigand filed an unfair labor practice
charge with the Board alleging that the Union had restrained
and coerced him in the exercise of his Section 7 rights. The
Acting General Counsel filed a complaint against the Union
alleging violations of Section 8(b)(1)(A) on the basis of the
posts on the Union’s Facebook page, statements made by
Cornelius at a monthly membership meeting on May 20,
2012, and verbal statements made by Union executive board
members and strike team leaders to persons who crossed the
picket line.
The Complaint alleged, in particular, that in mid-January
of 2012, comments posted on the Union’s Facebook page
“threatened employees with less favorable representation” and
“with physical harm because employees refused to participate
in Respondent’s strike against the Employer.” Amalgamated
Transit Union, 344 N.L.R.B. No. 44, slip op. at 3. The
Complaint also alleged that in March of 2012, the Union’s
7
Facebook page “threatened employees with violence by the
use of explosives because employees refused to participate in
Respondent’s strike against the Employer.” Id.
The ALJ found that the Facebook page was limited to
Union members in good standing. Indeed, as noted above, the
record is clear that no persons could post comments or even
see the Facebook page to view comments that had been
posted, unless they were members in good standing with the
Union.
It was neither alleged nor found that any of the contested
comments on the Facebook page had been posted by Union
officials or agents. And the Acting General Counsel did not
assert that the Union should be held liable for its members’
Facebook comments because the members were acting as
agents of the Union. Id. at 5. On this point, the Acting General
Counsel made it clear that “the Government does not rely on
an agency theory” in seeking to hold the Union liable for the
statements of members who acted on their own without
permission from the Union. Id. Rather, the Acting General
Counsel advanced a theory that the Union had a “duty to
disavow” any statements posted on the Facebook page that
were “unlawful threats.” Id. at 3. In support of this theory, the
Acting General Counsel relied on case law that holds a labor
organization responsible for its members’ picket-line
misconduct when it does not correct or disavow the
misconduct. The Acting General Counsel thus argued that the
Union’s Facebook page was “an electronic extension of
Respondent’s picket line.” Id. at 5. The ALJ rejected this
argument.
The ALJ’s opinion on this point, which was adopted by
the Board, offers the following rationale:
8
A picket line proclaims to the public, in a highly visible
way, that the striking union has a dispute with the
employer, and thus seeks to enlist the public in its effort
to place economic pressure on the employer. . . . The
picket line also signals to employees – both employees of
the struck employer and, in certain instances, employees
of other employers – that there is a labor dispute, to the
end that these employees will not cross the picket line but
instead will withhold their services. Thus, a picket line
makes visible in geographic space the confrontation
between the two sides.
In contrast, Respondent’s Facebook page does not
serve to communicate a message to the public. To the
contrary, it is private. Moreover, it does not draw any
line in the sand or on the sidewalk.
Unlike a website in cyberspace, an actual picket line
confronts employees reporting for work with a stark and
unavoidable choice: To cross or not to cross. Should
someone acting as a union’s agent make a threat while on
the picket line, the coercive effect is immediate and
unattenuated because it falls on the ears of an employee
who, at that very moment, must make a decision
concerning the exercise of his Section 7 rights.
Considering
the
marked
differences,
the
Respondent’s Facebook page certainly does not amount
to an extension of Respondent’s picket line and was not
created for that purpose. Respondent’s vice president,
Cornelius, fashioned the website to be a forum for the
sort of unfettered, candid discussion which typifies the
Internet.
Id.
As noted above, the Complaint also alleged that the
Union had committed unfair labor practices based on conduct
9
apart from the Facebook postings. As to one such complaint,
the ALJ found that statements made by Cornelius during a
Union membership meeting – which included a remark that
the persons who leaked the contents of the Facebook page to
the NLRB “should be ashamed of themselves” – did not
violate Section 8(b)(1)(A) because the statements were not
threats. Id. at 6. The ALJ also addressed a charge that Union
agents at the picket line threatened employees who crossed
the line. He found that these actions were coercive and
constituted unfair labor practices in violation of Section
8(b)(1)(A). Id. at 10.
The NLRB largely adopted the ALJ’s rulings, findings,
and conclusions. See id. at 1 & n.1. Two of the Board
members, Chairman Pearce and Member Hirozawa, would
have affirmed the ALJ’s proposed Order as to the Facebook
comments on two grounds: that the comments were not
threats under Section 8(b)(1)(A) of the NLRA and that the
people who made those comments were not agents of the
Union. Id. One Board member, Member Miscimarra, believed
that at least some of the comments could have been perceived
as threats. He concurred in the judgment, however, on the
ground that the Union was not responsible for the Facebook
comments that had been posted by non-agents. Id.
The Board agreed with the ALJ that the Union had
violated Section 8(b)(1)(A) when its agents made threatening
statements to employees on the picket line. The Board thus
ordered that the Union: (1) “[c]ease and desist from . . .
[t]hreatening employees that they will receive less favorable
representation because they exercised their right to refrain
from participating in a strike”; (2) cease and desist from
“restraining or coercing employees in the exercise of the
rights guaranteed them by Section 7 of the Act”; (3) post and
distribute electronically a notice to employees of their rights
10
under Section 7. Id. at 1. The Union has complied with the
Board’s order. Br. for the NLRB 9 n.6.
Weigand filed this petition for review, challenging only
the Board’s order regarding the Facebook comments.
II. ANALYSIS
“As we have noted many times before, our role in
reviewing [a] NLRB decision is limited. We must uphold the
judgement of the Board unless, upon reviewing the record as
a whole, we conclude that the Board’s findings are not
supported by substantial evidence, or that the Board acted
arbitrarily or otherwise erred in applying established law to
the facts of the case.” Wayneview Care Ctr. v. NLRB, 664
F.3d 341, 348 (D.C. Cir. 2011) (internal quotation marks
omitted). We afford “a very high degree of deference to
administrative adjudications by the NLRB.” United
Steelworkers, 983 F.2d at 244. Where, as here, the Board
adopts the ALJ’s findings and conclusions as its own, we
apply the same deferential standard to those findings and
conclusions. NLRB v. KSM Indus., Inc., 682 F.3d 537, 544
(7th Cir. 2012).
Before addressing the merits of this case, we must
dispose of arguments that Weigand has raised for the first
time on appeal. In his brief to the court, Weigand points to
two allegedly threatening comments posted on the Facebook
page by Cornelius when he was Union Vice President. Br. for
Petitioner 5. These claims came too late. In the Acting
General Counsel’s complaint and in the briefing before the
ALJ and the Board, it was never alleged that Facebook
comments posted by Cornelius constituted unfair labor
practices. The General Counsel, not the Charging Party, has
discretion to decide whether or not to issue a complaint, and
11
therefore exclusively controls the issues contained in the
complaint. See 29 U.S.C. § 153(d) (providing that the General
Counsel “shall have final authority . . . in respect of the
investigation of charges and issuance of complaints under
section 160 of this title, and in respect of the prosecution of
such complaints before the Board”); see also Int’l Union of
Operating Eng’rs, Local 150 v. NLRB, 325 F.3d 818, 830 (7th
Cir. 2003). Furthermore, although Weigand’s exceptions to
the ALJ’s decision referenced a comment posted by
Cornelius, he never specifically challenged the ALJ’s failure
to find that the Union committed any unfair labor practices on
the basis of any comment made by Cornelius. See N.Y. &
Presbyterian Hosp. v. NLRB, 649 F.3d 723, 733 (D.C. Cir.
2011) (holding that respondent failed to preserve issue on
petition for review where “the language [in respondent’s
exceptions to the ALJ’s decision] was too broad to put the
Board on notice” of respondent’s specific objection). And
during oral argument, counsel for Weigand conceded that his
client was not claiming that any comments posted by Union
agents were threats. Therefore, Weigand’s belated claims
regarding Cornelius are not properly before the court. Section
10(e) of the Act prevents us from considering an argument
raised for the first time on appeal. See 29 U.S.C. § 160(e)
(“No objection that has not been urged before the Board . . .
shall be considered by the court, unless the failure or neglect
to urge such objection shall be excused because of
extraordinary circumstances.”).
The sole question before the court is whether the Board’s
holding that the Union was not liable for the contested speech
posted on Facebook by persons who were not acting as agents
of the Union is supported by the record and consistent with
applicable law. In considering this question, our starting point
is Section 8(b)(1)(A), which applies only to conduct by “a
labor organization or its agents.” 29 U.S.C. § 158(b). If
12
neither the Union nor one of its agents is responsible for the
cited conduct then the conduct cannot form the basis of an
unfair labor practice charge against the Union.
Ordinarily, “[t]he agency relationship must be
established with regard to the specific conduct that is alleged
to be unlawful.” Cornell Forge Co., 339 N.L.R.B. 733, 733
(2003). Thus, in the context of alleged misconduct on a Union
picket line,
[t]he Board will, in applying these agency principles,
impute the conduct of the union’s pickets to the union
only where it is shown that the union, either actually or
impliedly, authorized the picket’s conduct beforehand or
ratified the conduct after it occurred. For example, where
an authorized union representative such as a union
official or picket captain participates in picketing
misconduct or is present at the time the misconduct
occurs, the Board will not hesitate to find that the union
is responsible. Similarly, where the union has knowledge
of its pickets’ misconduct, but fails to take steps
“reasonably calculated” to control that misconduct, the
Board readily imputes responsibility for the misconduct
to the union.
Teamsters Local 860, Int’l Bhd. of Teamsters, 229 N.L.R.B.
993, 994 (1977) (footnotes omitted) (holding that union could
not be responsible for isolated misconduct by picketers that it
was not aware of and had expressly forbidden); see also Soft
Drink Workers Union Local 812, 307 N.L.R.B. 1267, 1272–
73 (1992) (finding union violated Section 8(b)(1)(A) by
violent misconduct committed by its strikers, when acts were
done in the presence of union agents or done with apparent
authority of the union, but not when an alleged assault was
committed apart from any union activity and the striker
13
involved in the incident disappeared from the picket line,
“indicating that the union did not condone” his actions).
Even when there has been violence during a strike, the
Supreme Court has said that, while “[n]ational labor policy
requires that national unions be encouraged to exercise a
restraining influence on explosive strike situations . . . [t]here
can be no rigid requirement that a union affirmatively
disavow such unlawful acts as may previously have
occurred.” United Mine Workers of Am. v. Gibbs, 383 U.S.
715, 739 (1966). “What is required,” the Court has stated, “is
proof, either that the union approved the violence which
occurred, or that it participated actively or by knowing
tolerance in further acts which were in themselves actionable
under state law or intentionally drew upon the previous
violence for their force.” Id.
Weigand argues that “[w]hen a union officer/agent
creates and controls access to a union Facebook page, actively
participates [in] and initiates Facebook postings, participates
in unlawful misconduct or fails to admonish online union
members when misconduct occurs, the union should be held
responsible.” Br. for Petitioner 8. However, the cases cited by
Weigand involve misconduct on the picket line, which the
Board found inapposite. In adopting the ALJ’s opinion, the
Board reasoned that a private Facebook page available only to
union members is nothing like a Union’s picket line. In the
Board’s view, a picket line – unlike a private Facebook page
– is a “highly visible” signal to the public and all employees
of a dispute with the employer and the “coercive effect” of a
threat made on a picket line is “immediate and unattenuated.”
Amalgamated Transit Union, 360 N.L.R.B. No. 44, slip op. at
5. Weigand does not challenge the Board’s reasoning, and we
have no legitimate legal basis upon which to question it. In
stark contrast to violence or threats occurring on a picket line,
14
the speech complained of here occurred on a private forum on
the internet that was meant for Union members’ eyes only.
Weigand also argues that a union has a duty to disavow
allegedly threatening conduct that occurs out of the context of
picket line misconduct. In support of this position, he cites
Battle Creek Health System, 341 N.L.R.B. 882 (2004), and
NLRB v. Bulletin Co., 443 F.2d 863 (3d Cir. 1971). Reply Br.
for Petitioner 8. These cases are readily distinguishable,
however, because they involved situations in which union
officials or their agents were implicated in the misconduct. In
Battle Creek, the Board found that the union had committed
an unfair labor practice based on threats made by a union
agent in the employee break room. 341 N.L.R.B. at 892–93.
The union’s liability in that case was explicitly based on an
agency relationship. Id. at 894 (“I conclude that Mietz’[s]
statements, made as an agent of the Union, violated Section
8(b)(1)(A) of the Act.”). In Bulletin Co., the Board found that
the union had “ratified and condoned” “continual” harassment
and violent behavior towards non-union workers, that the
employer had complained to the union president to no avail,
and that the misconduct had escalated to a point where the
workers were sent home “for their own protection.” 443 F.2d
at 865–67 & n.4. These cases clearly do not support
Weigand’s position in this case.
The Union here did not authorize or otherwise condone
the posting of the contested messages on the Facebook page.
Weigand tries to overcome this point by suggesting that, in
maintaining the Facebook page, the Union somehow
facilitated the publication of threats against persons who
opted to cross the picket line. The record simply does not bear
this out. The Facebook page was private, for Union members
only. Indeed, Weigand and other non-Union persons could not
view the comments on the Facebook page. Therefore, the
15
most that can be said here is that the Union’s maintenance of
the Facebook page facilitated communications between Union
members, not threats against non-Union employees as in the
cases cited by Weigand. The Board reasonably concluded that
this was not a violation of the Act.
It is undisputed in this case that the Union members who
posted the comments on Facebook were not agents of the
Union. It is also undisputed that the Facebook page was
private to Union members only and was not meant to be seen
by anyone outside of the Union. Therefore, we have no
occasion to consider whether the legal considerations might
be different in a case in which real “threats” were posted by
union members on an open Internet site, i.e., communicated in
an open forum that could be readily viewed by persons who
were the subjects of the threats. Nor do we mean to suggest
that the Board is foreclosed from ever finding a union guilty
of unfair labor practices for postings on “closed” Internet
sites. We are in no position to speculate about the range and
limits of communications in the fast-changing world of social
media. Our denial of the petition for review is thus limited to
the record before us.
III. CONCLUSION
For the reasons set forth above, the petition for review is
denied.
So ordered.
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 1 of 33 - Page ID # 1777
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEBRASKA
Infogroup, Inc., et al.,
Plaintiffs,
vs.
8:14-CV-49
MEMORANDUM AND ORDER
DatabaseLLC, et al.,
Defendants.
This matter is before the Court on the plaintiffs' motion for preliminary
injunction (filing 12), motion to strike affirmative defenses (filing 61), and
motion to dismiss counterclaims (filing 63). The Court will deny each of the
plaintiffs' motions.
I. BACKGROUND
The plaintiffs and the defendants are all, generally speaking, in the
information business: they compile databases about consumers and
businesses and they sell access to that information through various Web
sites. The plaintiffs are Infogroup, Inc., infoUSA, Inc., and infoUSA
Marketing, Inc. (collectively, Infogroup). Filing 23 at 1. The defendants are
DatabaseUSA.com and several individual employees of DatabaseUSA.com
(collectively, DatabaseUSA).1 Filing 23 at 1-2 The individual defendants are
all former employees of Infogroup—most pertinently, Vinod Gupta, the
founder of Infogroup, and a former officer and shareholder. Filing 23 at 2;
filing 13 at 2. Gupta founded DatabaseUSA after leaving Infogroup, and
there is no love lost between them.
Infogroup has pled several claims for relief, but as relevant to the
current motions, Infogroup's claims generally fall into three categories: (1)
DatabaseUSA's alleged acquisition of information from Infogroup's
To be precise, the primary defendant is "DatabaseUSA.com LLC d/b/a Database101.com,
d/b/a InfoFree.com, d/b/a AtoZ Databases." Filing 23 at 1. The names used by Infogroup
include infoUSA, Salesgenie.com, ReferenceUSA.com, and Credit.net. DatabaseUSA's
names include Infofree.com, AtoZdatabases, DB101, Database101.com, and Creditjam.com.
For present purposes, it is generally unnecessary to identify precisely which entity or Web
site has done (or is accused of doing) particular acts, and for the sake of clarity, the Court
will use the collective terms "Infogroup" and "DatabaseUSA" most of the time.
1
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 2 of 33 - Page ID # 1778
proprietary database, (2) alleged false advertising regarding the extent to
which DatabaseUSA's information is "verified," and (3) alleged false
representations suggesting to potential customers that there is a corporate
relationship between DatabaseUSA's products and Infogroup.
1. PROPRIETARY INFORMATION
As mentioned above, the basis of Infogroup's business is its proprietary
database. To check the security of its database, Infogroup inserts "seed data"
into its listings, containing fictitious combinations of name, address, and
telephone number. Filing 14-1 at 3. Seed data is disbursed through the
database geographically, and per industry, on a monthly basis. Filing 32-2 at
19-20; filing 33-1 at 2. So, if Infogroup's seed data appears in the wild, in a
competitor's list, Infogroup knows that the competitor has somehow gained
access to Infogroup's information.2 Filing 14-1 at 3. But the word "somehow"
is important, because how the competition got information from Infogroup's
database makes all the difference when it comes to establishing liability—
and, as a precursor to liability, obtaining a preliminary injunction.
In June 2013, Infogroup found its November 2011 seed data in
DatabaseUSA's products.3 Filing 33-1 at 5; filing 40-1 at 2. Specifically,
Infogroup found all of the expected seeds for its November 2011 data set.
Filing 33-1 at 3. According to Infogroup's Vice President of Business
Optimization, the presence of November 2011 seed files—but no other seed
files—and the high match rate between Infogroup's data and DatabaseUSA's
data suggests that DatabaseUSA acquired Infogroup's full business database
at one point in time.4 Filing 40-1 at 2-3. Infogroup sued, theorizing that the
individual defendants—each of whom had left Infogroup and been hired by
DatabaseUSA—had provided DatabaseUSA with misappropriated data or
access to Infogroup's systems. Filing 23 at 7, 11, 13-14, 16-17.
The use of fictitious entries is an old, well-established technique used by compilers, such
as mapmakers, encyclopedists, and dictionary editors, to detect copyright infringement and
plagiarism. See Wikipedia, Fictitious Entry, http://en.wikipedia.org/wiki/Fictitious_entry
(last visited March 28, 2015).
2
Infogroup obtained DatabaseUSA's data under false pretenses to make its comparison.
The propriety of that act, while disputed by the parties, is not relevant at this point.
3
The parties have devoted a great deal of evidence and argument to expert analysis
disputing the extent to which samples of Infogroup's database "match" DatabaseUSA, how
precise that "match" needs to be to prove anything, and how high a "match" rate would be
meaningful. E.g., filing 48-2 at 3-25; filing 48-3 at 2-7; filing 78 at 15-17, 40-44, 53-61. But
the Court finds, from the seed files if nothing else, that Infogroup has sufficiently proven
that DatabaseUSA obtained a substantial portion, if not the entirety, of Infogroup's
database information at some point. How that happened is the more uncertain part.
4
-2-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 3 of 33 - Page ID # 1779
But DatabaseUSA's evidence pokes some holes in that theory. The
information in Infogroup's database is not wholly unavailable to the world at
large—to begin with, while some data may come from private sources or
Infogroup's own information-gathering, a substantial amount of the data is
compiled from publicly-available sources. Filing 32-2 at 5-6; filing 33-1 at 2.
And, of course, because Infogroup makes money by selling information, some
data is made publicly available after it is compiled. Some of Infogroup's data
is available to the public on search services such as Google, Yahoo!, Bing, and
Ask.com. Filing 32-2 at 8-10. The business database is available through a
reference service provided to libraries. Filing 32-2 at 10. Obviously, data sets
have been sold to customers, sometimes through resellers, although
Infogroup's licensed customers are prohibited by licensing agreements from
providing that data to DatabaseUSA. Filing 32-2 at 10-11; filing 33-1 at 12,
18-19. And DatabaseUSA points out that third parties have been able to
"scrape" database information from publicly-accessible sources and bundle it
for resale. Filing 33-2 at 4. Information from at least some of Infogroup's seed
files has been found in other competitors' data and on public search engines.
Filing 33-1 at 9-10; filing 33-3 at 69-225.
DatabaseUSA's evidence also casts substantial doubt on whether any of
the individual employee defendants could have obtained the data at issue.
Three of the five individual defendants were terminated by Infogroup before
the November 2011 seed data was inserted into the Infogroup database.
Another was not hired by DatabaseUSA until after the June 2013 audit that
discovered the seed data. And none of the former Infogroup employees (with
the presumable exception of Gupta, who was out the door by 2008) had the
necessary access to Infogroup's database to have perpetrated a heist.
None of that conclusively proves that the individual defendants were
uninvolved—for instance, someone might have been secretly working for
DatabaseUSA, exceeded his authorized access to Infogroup's database, or
been working with someone else at Infogroup. But there is no evidence of any
of that. Infogroup speculates that perhaps DatabaseUSA bought the
information from someone else who "scraped" it. Filing 39 at 4. But in the
end, it suffices to say this: it is certain that information from Infogroup's
proprietary database ended up in DatabaseUSA's hands, and it is wholly
uncertain how that happened.5
Infogroup's complaint alleges not only acquisition of its proprietary database, but also its
own customer list, and the software for its proprietary user interfaces. Filing 23 at 16-17. It
appears that only the database is at issue right now—there is nothing in the record about
the user interfaces, and Infogroup's brief in support of motion for preliminary injunction
describes "Infogroup Trade Secrets," for purposes of this motion, as "[t]he information
compilations that make up Infogroup's consumer and business databases." Filing 13 at 4.
5
-3-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 4 of 33 - Page ID # 1780
2. "VERIFIED" LISTINGS AND FALSE ADVERTISING
Infogroup claims that DatabaseUSA is falsely representing its database
entries as "verified" when they are not. Filing 23 at 9-11, 32-33. This claim,
factually, is mostly derived from the presence of Infogroup's seed files in
DatabaseUSA's database. DatabaseUSA promotes its database as "TripleVerified." Filing 14-2 at 36. When Infogroup marks a listing in its database
as "verified," that apparently means an Infogroup employee has confirmed
that the information is accurate and current. Filing 14-1 at 2. It is far less
apparent what a "verified" record means to DatabaseUSA. E.g., filing 48-1 at
2; filing 51 at 8. But there is evidence that DatabaseUSA promotes its
"verification process" as involving "original sources," telephone verification,
and Internet research. Filing 82-1 at 8; Ex. A.
DatabaseUSA displayed some of Infogroup's seed files as "verified"
records, stating that "Verified Records have been through our verification
process that includes phone verification, search engine research and business
website review." Filing 14-2 at 23. Infogroup's argument is simple: how could
DatabaseUSA have "verified" a fictitious entry? Filing 13 at 9. And Infogroup
points to other inaccuracies in supposedly-"verified" entries in
DatabaseUSA's data. Filing 82-3. But DatabaseUSA points out that even
Infogroup's seed files contain some real information. For instance, one of the
seed files at issue is a fictional business, but the address is a real place, and
the telephone number is a working number belonging to an Infogroup
employee. Filing 31 at 19. So, there is still some information that could be
"verified" by certain methods. DatabaseUSA also points to similar
inaccuracies among Infogroup's "verified" listings, filing 86-3, and argues that
even "verified" listings will sometimes be incorrect because information
changes and not every listing can be verified every day. Filing 85 at 12-13.
And DatabaseUSA presented evidence of the process that it uses, internally,
to verify the accuracy of its listings. Filing 33-2 at 2-3; filing 48-1 at 1-2.
3. FALSE REPRESENTATIONS ABOUT RELATIONSHIP BETWEEN COMPANIES
Infogroup claims that DatabaseUSA is making misleading statements,
in press releases and advertisements, that falsely imply an ongoing
relationship between Gupta and Infogroup, or DatabaseUSA and Infogroup.
Infogroup has presented evidence of these instances:

A press release about a managerial promotion at
AtoZdatabases said that the promoted employee had "spent
eight years at InfoGroup, a similar reference company that
shares the same Founder, Vin Gupta." Filing 14-2 at 25.
-4-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 5 of 33 - Page ID # 1781

A press release about a private equity investment in
infofree.com said that it "was founded by and is under the
leadership of industry pioneer Vin Gupta, proprietor of
companies such as infoUSA and Salesgenie. He brings nearly
40 years of experience in building databases, creating sales
leads, and helping salespeople and small businesses to his new
company." Filing 14-2 at 27.

A press release touting customer savings at infofree.com
included a quotation from Gupta, "who also founded InfoUSA,
infogroup, and Sales Genie." Filing 14-2 at 30.

A promotional article published on infofree.com described it as
having been "started by the founder and former head of
InfoGroup, Vin Gupta." Filing 14-2 at 33.

An advertising letter to a "loyal customer" from DatabaseUSA
included a picture of Gupta at the bottom, and a facsimile of
his signature; the picture was captioned, "Vin Gupta, Founder
& Chairman (also Founder of infoUSA)." Filing 14-2 at 36.

DatabaseUSA uses Google AdWords, or similar products with
other search engines, to place DatabaseUSA advertisements in
proximity to search results when a consumer searches for
Infogroup marks. Filing 82-1 at 25-26; filing 82-2 at 5, 7.

A letter sent to Gupta by President Bill Clinton is posted on
infofree.com. The letter, sent to Gupta in 1998, was addressed
to Gupta as the "Chairman and Chief Executive Officer" of
infoUSA. Filing 82-1 at 5, 33-34.

DatabaseUSA advertising describes DatabaseUSA as "Serving
the Database Industry Since 1972" or "Creators of the Finest
Databases Since 1972." Filing 82-1 at 28-29, Ex. A; filing 82-2
at 9. As Infogroup points out, it was Infogroup that was
founded in 1972; DatabaseUSA was founded in 2009. Filing
82-1 at 16.
Infogroup also complains about excerpts of a "60 Minutes" segment that
are played in a video on infofree.com, and referenced in DatabaseUSA
advertising. The story, originally aired in August 2003, was meant to alert
viewers to the amount of personal information that was being sold to data
-5-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 6 of 33 - Page ID # 1782
companies. Filing 82-2 at 15-21. Gupta, then the CEO of infoUSA, was
interviewed for the story, and the portions of the video played by
DatabaseUSA include Gupta describing the detailed data that infoUSA had
compiled about businesses and consumers. Filing 82-2 at 16-18.
The video was recorded at infoUSA while Gupta was in charge there,
but the clips played by DatabaseUSA do not identify the company. Filing 821, Ex. A, Ex. E. DatabaseUSA contends that it has permission from Infogroup
to use those clips, pursuant to a prior agreement. Filing 14-2 at 42. But
DatabaseUSA's advertising also makes repeated claims to the effect that its
databases are "so good, they were featured on '60 Minutes.'"6 Filing 82-1 at
20, 22, Ex. A, Ex. E; filing 82-2 at 9.
Infogroup contends that references by DatabaseUSA to Infogroup have
led to confusion among consumers about the association among the various
business entities. Infogroup cites these instances:

The "loyal customer" advertising letter described above, sent
to an Infogroup customer, caused the recipient to contact
Infogroup asking if Infogroup and DatabaseUSA were the
same company. Filing 14-1 at 8; Hr'g Ex. 2.

In September 2012, two consumers called Infogroup asking
about an advertising special that was being offered by
infofree.com. Filing 14-1 at 8-9.

A customer question posted at infofree.com's customer support
portal asked, "You are not part of Sales Genie are you?" An
agent replied, "Yes, that is correct. Vin Gupta was the founder
of InfoUSA (Sales Genie), but sold it and is not the CEO of
infofree.com which is a separate company." Filing 14-2 at 38.

A customer of Infogroup sent an email to an Infogroup account
executive asking for a copy of a particular invoice, but when
the account executive replied that no such invoice existed, the
customer replied, "You are info free correct?" Filing 14-2 at 40.
Infogroup also points to these claims, and DatabaseUSA's advertising dating itself to
1972, as instances of false advertising. E.g. filing 81 at 15. But, as described below,
Infogroup has not asked the Court to enjoin such conduct except to the extent that it might
suggest an ongoing relationship between DatabaseUSA and Infogroup. See filing 81 at 24.
So, the Court only considers this evidence in that context.
6
-6-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 7 of 33 - Page ID # 1783

In a telephone call from a consumer to Infogroup, the
consumer said that he had been told (by whom is unclear) that
"the Database USA company was the one that has been
around forever." Filing 82-1, Ex. C.

A customer had been exchanging emails with a DatabaseUSA
sales manager for several months regarding a purchase. When
an email wasn't replied to for a couple of days, the customer
emailed an Infogroup employee he had apparently also been in
contact with to ask about it, implying that he believed the two
worked for the same company.7 Hr'g Ex. 3.

An email exchange between Gupta and Infogroup's CEO
referenced a recorded call to Infogroup from a customer who
apparently used both businesses, and an email from an
Infogroup customer about a DatabaseUSA promotional email
that he was repeatedly receiving. Hr'g Ex. 5, 6, 7. But the
voice recording is not in the record (or if it is, it is not
identified as such), and it is not clear from the email exchange
what either customer was confused about, or why.8
II. DISCUSSION
As noted above, Infogroup's audit detected its seed files in
DatabaseUSA's database in June 2013. But Infogroup waited several months
to file suit. See filing 1. Infogroup explains that at the time, Infogroup and
Gupta were codefendants in litigation arising from events that occurred while
Gupta was associated with Infogroup. Filing 40-2 at 1. Infogroup, needing
Gupta's participation and cooperation with that litigation, waited until it was
resolved to file suit against him. Filing 40-2 at 2; filing 78 at 45-49. But as
soon as that litigation concluded, Infogroup determined to settle all family
It may be worth noting that the DatabaseUSA sales manager promptly replied to the
second email and explained that the two worked at separate companies. Hr'g Ex. 3 at 1.
7
Infogroup also accused a DatabaseUSA representative of calling an Infogroup customer
and claiming to represent Infogroup. Filing 81 at 10-11; filing 82-1, Ex. K. Infogroup claims
that this conduct violated the Lanham Act, the Nebraska Deceptive Trade Practices Act,
and the Nebraska Consumer Protection Act, and was common-law tortious interference
with a business expectancy. Filing 81 at 16-20. But that was based solely on what the
customer reported to an Infogroup account representative. DatabaseUSA has provided a
detailed account history from the DatabaseUSA employee whose conduct is at issue, along
with documentation and recordings that, it suffices to say, cast substantial doubt on the
customer's story. Filing 86-1. The Court does not find Infogroup's evidence on this point to
be credible, and will not discuss it further.
8
-7-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 8 of 33 - Page ID # 1784
business: it initiated the present case and moved for a preliminary injunction.
See filing 12. Limited discovery, an evidentiary hearing, and extensive
briefing have been had on that motion.9 DatabaseUSA also raised several
affirmative defenses and alleged several counterclaims in its answer to
Infogroup's operative complaint. See filing 60. Infogroup, in turn, moved to
strike DatabaseUSA's affirmative defenses and dismiss some of its
counterclaims. Filing 61; filing 63.
So, there are three pending motions that require disposition: a motion
for preliminary injunction (filing 12), a motion to strike (filing 61), and a
motion to dismiss (filing 63). The Court will address each in turn.
1. MOTION FOR PRELIMINARY INJUNCTION
At the time of the hearing on Infogroup's motion for preliminary
injunction, Infogroup had narrowed its request for injunctive relief to the
following proposed terms:
1.
Absent Infogroup's written permission, DatabaseUSA
should be enjoined and restrained from "[a]cquiring data
directly from Infogroup, or from sources that expressly
purport to offer Infogroup data compilations in their
published descriptions."
2.
DatabaseUSA should be enjoined and restrained from
making false or deceptive statements of fact regarding the
extent to which it has verified the accuracy of each of its
business listings.
3.
DatabaseUSA should be enjoined and restrained from
"[r]eferencing or using any of Infogroup’s registered or
unregistered trademarks . . . except in in statements of fact,
or statements conspicuously labeled as statements of
opinion, which statements shall include clear disclaimers
stating that Infogroup is the registered owner" of the mark
and has no association with DatabaseUSA.
Evidence was adduced at the hearing that was received subject to several objections, most
pertinently hearsay, relevance, foundation, and proper notice. Filing 78 at 21-23, 26-31, 34,
67. To make sure the record is clear: the Court will, for purposes of these motions, overrule
those objections. The Court finds, based on its disposition of these motions and
DatabaseUSA's opportunity to meet the evidence at the hearing and in subsequent filings,
that DatabaseUSA was not prejudiced by any belated disclosure. And the Court finds that
DatabaseUSA's other objections go to the weight, not the admissibility, of the evidence.
9
-8-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 9 of 33 - Page ID # 1785
4.
DatabaseUSA should be enjoined from publishing any
marketing materials "claiming or suggesting the existence
of any past or present association" with Infogroup or "to the
effect that Gupta founded InfoUSA, or any Infogroup
company."
See filing 81 at 24. As a way of combing through the often-interwoven tangle
of factual allegations and legal theories presented by the parties, the Court
has focused on the proposed injunction: only those facts or claims relevant to
the terms of the proposed injunction need be considered.
When deciding whether to issue a preliminary injunction, the Court
weighs the four Dataphase factors: (1) the threat of irreparable harm to the
movant; (2) the state of the balance between this harm and the injury that
granting the injunction will inflict on other parties; (3) the probability that
the movant will succeed on the merits; and (4) the public interest. Johnson v.
Minneapolis Park & Recreation Bd., 729 F.3d 1094, 1098 (8th Cir. 2013);
(citing Dataphase Sys., Inc. v. C L Sys., Inc., 640 F.2d 109, 114 (8th Cir. 1981)
(en banc)). A preliminary injunction is an extraordinary remedy, and the
movant bears the burden of establishing its propriety. Roudachevski v. AllAmerican Care Centers, Inc., 648 F.3d 701, 705 (8th Cir. 2011); see also H&R
Block Tax Servs. LLC v. Acevedo-Lopez, 742 F.3d 1074, 1077 (8th Cir. 2014).
As will be explained below in more detail with respect to Infogroup's
separate claims, the Court finds that the Dataphase factors weigh against a
preliminary injunction in this case. In particular, the Court is not persuaded
that Infogroup has shown a likelihood of success on the merits sufficient to
warrant an injunction. And the Court bases that conclusion, in part, on
Infogroup's failure to show how it has been injured by DatabaseUSA's
allegedly-wrongful conduct—which means, in turn, that Infogroup's showing
of irreparable harm—or, indeed, any harm—is also deficient.
(a) Proprietary Information
Infogroup's claim regarding its database rests, for purposes of the
present motion, on the Nebraska Trade Secrets Act, Neb. Rev. Stat. §§ 87-501
et seq. See, filing 13 at 12-17; filing 81 at 21.10 It is important to note, from
That is to say that, while Infogroup has alleged other claims for relief based on these
facts in its operative complaint (like, for instance, the Computer Fraud and Abuse Act),
Infogroup's briefing in support of preliminary injunctive relief raises only the Trade Secrets
Act as a claim on which Infogroup argues it has proven a likelihood of success on the
merits. The Court's analysis is, as to each of Infogroup's specific requests for injunctive
relief, limited to the theories of recovery Infogroup has specifically raised in support of its
motion for a preliminary injunction.
10
-9-
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 10 of 33 - Page ID # 1786
the outset, that Infogroup does not propose that DatabaseUSA be required to
scrub its existing database of any data that may have originated with
Infogroup. See filing 78 at 11-12. Rather, Infogroup proposes an injunction
that would, as described at the evidentiary hearing,
say don't obtain our data going forward and to the degree that
they're doing something called webscraping which involves
basically programming a computer -- it's basically a computer
program that accesses various Internet websites and extracts
data and then they put it in their database and they do whatever
it is they do with it, to the degree that those websites state that
those -- that information was powered by or provided by
Infogroup, just don't use it.
Filing 78 at 12.
But that poses a problem for the Court, because it is questionable
whether the activity Infogroup wants enjoined is actually proscribed by the
Trade Secrets Act. To prevail under the Trade Secrets Act, Infogroup would
need to prove, among other things, the existence of a trade secret and
DatabaseUSA's misappropriation of it. See, Neb. Rev. Stat. §§ 87-502 to 504;
Richdale Development Co. v. McNeil Co., Inc., 508 N.W.2d 853, 859 (Neb.
1993). And Infogroup's argument is strained on both points.
To begin with, under Nebraska law, a "trade secret" is defined as
information that:
(a)
Derives independent economic value, actual or potential,
from not being known to, and not being ascertainable by
proper means by, other persons who can obtain economic
value from its disclosure or use; and
(b)
Is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy.
Neb. Rev. Stat. § 87-502(4). That definition is narrow; it means that "if an
alleged trade secret is ascertainable at all by any means that are not
'improper,' the would-be secret is peremptorily excluded from coverage under
the [Act]." First Express Servs. Grp., Inc. v. Easter, 840 N.W.2d 465, 474 (Neb.
2013) (emphasis in original) (citations and quotations omitted).
So, for instance, in Easter, the Nebraska Supreme Court concluded that
the Trade Secrets Act did not protect the customer list of a company that sold
crop insurance, which included "customers' names and their 2009
information: what crops the farmers had, what counties the crops were
- 10 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 11 of 33 - Page ID # 1787
located in, what insurance plan the farmers bought, what percentage of
coverage each farmer had, and what commission [the insurer] had earned."
Id. at 469. The court explained that "simple Internet searches could identify
which farmers farmed what land and could provide contact information for
those farmers." Id. at 475. And the other
information on the list essentially reflected the farmers' previous
insurance coverage on their crops. It is undisputed that the
individual farmers had all of that information and that [the
defendant] could have obtained the information from them
through a simple telephone call. Also, once a customer changed
agencies, all of the customer's prior insurance information
became available from the insurance carrier's Web site. Though
the exact information required to transfer a customer is a bit
unclear, the record shows that, at most, all that is required is the
customer's name, address, type of crops, and signature, all of
which are ascertainable by proper means.
Id. So, because the information on the customer list was ascertainable
through proper means, the court concluded as a matter of law that it was not
a trade secret. Id. at 476. Similar reasoning applies here.
Nor is Infogroup likely to be able to prove that purchasing or using lists
that were obtained by "webscraping" is "misappropriation" under the Trade
Secrets Act. "Misappropriation" is defined as:
(a)
Acquisition of a trade secret of another by a person who
knows or has reason to know that the trade secret was
acquired by improper means; or
(b)
Disclosure or use of a trade secret of another without
express or implied consent by a person who:
(i)
Used improper means to acquire knowledge of the
trade secret;
(ii)
At the time of the disclosure or use, knew or had
reason to know that his or her knowledge of the trade
secret was:
(A)
Derived from or through a person who had
utilized improper means to acquire it;
- 11 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 12 of 33 - Page ID # 1788
(iii)
(B)
Acquired under circumstances giving rise to a
duty to maintain its secrecy or limit its use; or
(C)
Derived from or through a person who owed a
duty to the person seeking relief to maintain its
secrecy or limit its use; or
Before a material change of his or her position, knew
or had reason to know that the information was a
trade secret and that knowledge of it had been
acquired by accident or mistake[.]
Neb. Rev. Stat. § 87-502(2). "Improper means," in turn, are "theft, bribery,
misrepresentation, breach or inducement of a breach of a duty to maintain
secrecy, or espionage through electronic or other means[.]" Neb. Rev. Stat. §
87-502(1).
Clearly, if DatabaseUSA obtained direct possession of Infogroup's
database—by, for instance, working with an Infogroup employee or accessing
Infogroup's system without permission, or obtaining data from someone it
knew had—that would be "misappropriation" under the Trade Secrets Act.
And if Infogroup's internal database contained information that was not
publicly available, or perhaps was the product of Infogroup's time and effort
in developing information, then the database might be a "trade secret" under
Nebraska law. Cf. Easter, 840 N.W.2d at 475. But there is no evidence
proving such corporate espionage here. As a result, Infogroup has made little
showing of its likelihood to succeed on the merits of its Trade Secrets Act
claim. A party seeking injunctive relief need not necessarily show a greater
than 50 percent likelihood that it will prevail on the merits. Planned
Parenthood Minnesota, North Dakota, South Dakota v. Rounds, 530 F.3d 724,
731 (8th Cir. 2008). But there must be some showing, and here there is not:
to the extent that Infogroup's motion is focused on "webscraping," such
conduct is not unlawful under Nebraska law.
And to the extent that Infogroup's motion is more broadly directed—
that is, at "acquiring data directly from Infogroup" or from someone who
had—then there has been no showing of irreparable harm. To show a threat
of irreparable harm, the movant must show that the harm is certain and
great and of such imminence that there is a clear and present need for
equitable relief. Roudachevski, 648 F.3d at 706. Stated differently, the harm
"must be actual and not theoretical." Brady v. Nat'l Football League, 640 F.3d
785, 794 (8th Cir. 2011). And here, the evidence does not prove that
DatabaseUSA has violated the Trade Secrets Act by hacking or copying
- 12 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 13 of 33 - Page ID # 1789
Infogroup's database in the past, much less that it intends to do so in the
future. It is clear that the parties neither like nor trust one another, and that
Infogroup, in particular, suspects Gupta and DatabaseUSA of all sorts of
malfeasance. But for a preliminary injunction, the Court must have evidence
that the complained-of misconduct is likely to occur—that is, the movant
must "demonstrate that irreparable injury is likely in the absence of an
injunction." Winter v. Natural Resources Defense Council, Inc., 555 U.S. 7, 22
(2008). Infogroup has not demonstrated such a likelihood here.
In deciding whether to grant a preliminary injunction, likelihood of
success on the merits is the most significant factor. Laclede Gas Co. v. St.
Charles Cnty., 713 F.3d 413, 419-20 (8th Cir. 2013). The absence of a
likelihood of success on the merits strongly suggests that preliminary
injunctive relief should be denied. Barrett v. Claycomb, 705 F.3d 315, 320
(8th Cir. 2013). And, of course, a preliminary injunction cannot issue without
a showing of irreparable harm. Dataphase, 640 F.2d at 114 n.9. Both of those
factors are missing from Infogroup's Trade Secrets Act claim. And the other
Dataphase factors do not help Infogroup. The Court does not find the public
interest to be significantly implicated by this dispute. Nor does the balance of
harms tip either way, given both the lack of evidence showing an impending
harm, and the ineffectual nature of Infogroup's proposed injunction. In sum,
the Court finds no basis to issue a preliminary injunction based on
Infogroup's trade secrets claim.
(b) "Verified" Listings and False Advertising
Infogroup claims that DatabaseUSA's promotion of listings as "verified"
is false advertising actionable under the Lanham Act, 15 U.S.C. § 1051 et
seq.11 Filing 13 at 17-23; filing 81 at 13-16. Under the Lanham Act, a
In a supplemental memorandum, Infogroup also invoked the Nebraska Uniform
Deceptive Trade Practices Act, Neb. Rev. Stat. § 87-301 et seq., and the Nebraska Consumer
Protection Act, Neb. Rev. Stat. § 59-1601 et seq. Filing 81 at 17-19. The Court does not
discuss them separately, because for purposes of the present motion, they are essentially
coextensive with Infogroup's Lanham Act claims, and are disposed of by the same
reasoning. See, Neb. Rev. Stat. § 87-302; Prime Home Care, LLC v. Pathways to
Compassion, LLC, 809 N.W.2d 751, 764 (Neb. 2012); Stenberg v. Consumer's Choice Foods,
Inc., 755 N.W.2d 583, 591-92 (Neb. 2008). In particular, because the Trade Practices Act
provides injunctive relief for "[a] person likely to be damaged," see § 87-303(a), it provides
relief from future damage, not past damage—and as will be explained in the context of the
Lanham Act, Infogroup has not proven that such damage is likely. And the Consumer
Protection Act has another requirement Infogroup does not meet—its ambit is limited to
unfair or deceptive acts or practices that affect the public interest. See, Eicher v. Mid Am.
Fin. Inv. Corp., 748 N.W.2d 1, 12 (Neb. 2008); Arthur v. Microsoft Corp., 676 N.W.2d 29, 36
(Neb. 2004). Specifically, the conduct at issue must affect numerous citizens of Nebraska.
11
- 13 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 14 of 33 - Page ID # 1790
defendant may be liable if it, "in commercial advertising or promotion,
misrepresents the nature, characteristics, qualities, or geographic origin of
his or her or another person’s goods, services, or commercial activities[.]" 15
U.S.C. § 1125(a)(1)(B). To establish a Lanham Act false advertising claim, a
plaintiff must prove (1) a false statement of fact by the defendant in a
commercial advertisement about its own or another's product; (2) the
statement actually deceived or has the tendency to deceive a substantial
segment of its audience; (3) the deception is material, in that it is likely to
influence the purchasing decision; (4) the defendant caused its false
statement to enter interstate commerce; and (5) the plaintiff has been or is
likely to be injured as a result of the false statement, either by direct
diversion of sales from itself to defendant or by a loss of goodwill associated
with its products. Buetow v. A.L.S. Enters., 650 F.3d 1178, 1182 (8th Cir.
2011); United Indus. Corp. v. Clorox Co., 140 F.3d 1175, 1180 (8th Cir. 1998).
The false statement necessary to establish such a violation usually falls
into one of two categories: a commercial claim that is literally false as a
factual matter; or a claim that may be literally true or ambiguous but which
implicitly conveys a false impression, is misleading in context, or is likely to
deceive consumers. Id. If a plaintiff proves that a challenged claim is literally
false, the court may presume that consumers were misled and grant an
irreparably-injured competitor injunctive relief without requiring consumer
surveys or other evidence of the ad's impact on the buying public. Buetow,
650 F.3d at 1183; see Clorox Co., 140 F.3d at 1180. But even then, the
plaintiff must show that it will suffer irreparable harm absent the injunction.
Buetow, 650 F.3d 1183.12 And even when a court finds that a defendant's ads
are literally false, the plaintiff, to succeed on a claim of false advertising,
must still establish that the defendant's deception is material—that is, likely
to influence the purchasing decision. Johnson & Johnson Vision Care, Inc. v.
1-800-Contacts, Inc., 299 F.3d 1242, 1250-51 (11th Cir. 2002); see, Rice v. Fox
Broad. Co., 330 F.3d 1170, 1181 (9th Cir. 2003); Cashmere & Camel Hair
See, Eicher, 748 N.W.2d at 12; Arthur, 676 N.W.2d at 37-38. Infogroup has not made that
showing at this point, and does not even advance the point. See filing 81 at 19.
Infogroup cites Clorox Co. for the proposition that irreparable harm may be presumed
when an advertisement is deceptive. Filing 13 at 33; filing 81 at 21-22. That proposition is
difficult to square with Buetow, which clearly holds that a plaintiff must prove irreparable
harm absent an injunction, even if the advertisement is literally false. 650 F.3d at 1183; see
Flexible Lifeline Sys., Inc. v. Precision Lift, Inc., 654 F.3d 989, 994-1000 (9th Cir. 2011)
(citing eBay Inc. v. MercExchange, L.L.C., 547 U.S. 388 (2006) and Winter v. Natural Res.
Def. Council, Inc., 555 U.S. 7 (2008)); see, e.g., Ferring Pharm., Inc. v. Watson Pharm., Inc.,
765 F.3d 205, 215-17 (3d Cir. 2014); Salinger v. Colting, 607 F.3d 68, 76-80 (2d Cir. 2010);
see also Novus Franchising, Inc. v. Dawson, 725 F.3d 885, 894-95 (8th Cir. 2013).
12
- 14 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 15 of 33 - Page ID # 1791
Mfrs. Inst. v. Saks Fifth Ave., 284 F.3d 302, 311-12 (1st Cir. 2002); HewlettPackard Co. v. NU-Kote Int'l, Inc., 155 F.3d 571 (Fed. Cir. 1998) (unpublished
table decision); Nat'l Basketball Ass'n v. Motorola, Inc., 105 F.3d 841, 855 (2d
Cir. 1997); cf. Buetow, 650 F.3d at 1182; but cf. Pizza Hut, Inc. v. Papa John's
Int'l, Inc., 227 F.3d 489, 497 (5th Cir. 2000).13
The Court finds, first, that DatabaseUSA's description of its listings as
"verified" has not been shown literally false.14 DatabaseUSA presented
evidence of the process it uses to verify listings, and that evidence is
substantially uncontested. Infogroup's theory, instead, seems to be that
DatabaseUSA's verification process isn't effective enough to warrant use of
the word "verified," or that DatabaseUSA describes records as "verified" that
haven't been through its verification process.15 But in assessing whether an
advertisement is literally false, the Court must analyze the message
conveyed within its full context. Buetow, 650 F.3d at 1185. The context here
is inconsistent with any implication that every listing—even "verified"
listings—are guaranteed to be completely accurate. For instance, one of
Infogroup's exhibits is a DatabaseUSA advertisement that describes its "95%
Accurate, Triple-Verified Database. . . ." Filing 82-1 at 22; see also filing 82-2
at 9-10. There is not, so far as the Court can see, any attempt to guarantee
every line item as accurate. So, Infogroup's instances of inaccurate data—and
it doesn't present very many—do little to prove that DatabaseUSA's data is
not generally "verified," or that any particular "verified" listing hasn't been
The Eighth Circuit has not clearly weighed in on this point, so to the extent that Pizza
Hut can be read to support a circuit split, the Court will say this: the majority rule,
represented by the 11th Circuit's decision in 1-800-Contacts, is far more persuasive. There
is a difference between whether a consumer is likely to be deceived by a falsehood, and
whether that deception makes a difference to the consumer. The Fifth Circuit may have
elided the distinction (albeit in dicta, given that the advertising slogan at issue in that case
was not literally false). Pizza Hut, 227 F.3d at 497. But there is good reason to presume
that a literally false statement has a tendency to deceive. See Saks Fifth Ave., 284 F.3d at
314. That does not mean the deception made a difference, so there is no basis to also relieve
the plaintiff of the materiality element of its prima facie case. See Corizon, Inc. v. Wexford
Health Sources, Inc., No. 4:10-cv-2430, 2013 WL 3821268, at *9 (E.D. Mo. July 23, 2013).
13
14
Or variations on the term, such as "triple-verified."
It is not entirely clear to the Court whether Infogroup is only complaining about specific
instances in which an inaccurate listing is nonetheless described as "verified," or is
generally objecting to DatabaseUSA's promotion of its verification process. But Infogroup's
argument suggests the latter, broader argument. Infogroup argues that DatabaseUSA
"engages in an overall practice of labeling business listings as 'verified' when in fact they
are not" and seeks to enjoin DatabaseUSA from making "false or deceptive statements of
fact regarding the extent to which" it "has verified the accuracy of each of its business
listings." Filing 13 at 9; filing 81 at 24.
15
- 15 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 16 of 33 - Page ID # 1792
verified to some degree. Infogroup's argument asks the Court to make a very
hasty generalization.
To the extent that DatabaseUSA's representations might be misleading
in context, the Court finds that they are, at worst, puffery. Although the
Eighth Circuit has generally categorized false advertising as either literally
false, or literally true or ambiguous but misleading in context, the Court of
Appeals has observed that many claims will actually fall into a third
category, generally known as "puffery" or "puffing." Clorox Co., 140 F.3d at
1180. Puffery is exaggerated advertising, blustering, and boasting upon
which no reasonable buyer would rely and is not actionable under the
Lanham Act. Id. Nonactionable puffery includes representations of product
superiority that are vague or highly subjective. Id. However, false
descriptions of specific or absolute characteristics of a product and specific,
measurable claims of product superiority based on product testing are not
puffery and are actionable. Id. Whether a database entry is "verified" is not
(as the parties' disagreements here demonstrate) a specific, measurable
attribute. And it should also be noted that both Infogroup and DatabaseUSA
are primarily in the business of providing information about consumers and
businesses to people who want to market their own goods and services—in
other words, to people who are themselves sales professionals. Such an
audience is unlikely to be confused by such advertising techniques. Cf.,
Sensient Techs. Corp. v. SensoryEffects Flavor Co., 613 F.3d 754, 766 (8th Cir.
2010); WSM, Inc. v. Hilton, 724 F.2d 1320, 1330 (8th Cir. 1984). No
reasonable buyer of such services would expect verification to be foolproof.
And, even if DatabaseUSA's claim of "verified" listings was misleading
in context, there is nothing to show that anyone was misled. Where a
commercial claim is not literally false but is misleading in context, proof that
the advertising actually conveyed the implied message and thereby deceived
a significant portion of the recipients becomes critical. Clorox Co., 140 F.3d at
1182. If a plaintiff does not prove the claim to be literally false, he must prove
that it is deceptive or misleading, which depends on the message that is
conveyed to consumers. Id. at 1182-83. Unless a commercial claim is literally
false, or a competitor acted willfully with intent to deceive or in bad faith, a
party seeking relief under this section of the Lanham Act bears the ultimate
burden of proving actual deception by using reliable consumer or market
research. Id. at 1183.
There is no evidence in the record of any customer of DatabaseUSA
who claims to have been deceived or misled by the claim that a DatabaseUSA
listing was "verified." Nor does the Court find bad faith or an intent to
deceive, given the evidence of the efforts DatabaseUSA makes to verify its
data. The Court recognizes that at the preliminary injunction stage, full- 16 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 17 of 33 - Page ID # 1793
blown consumer surveys or market research are not an absolute prerequisite.
Id. But Infogroup has far less than that.
Because the Court finds that DatabaseUSA's use of the word "verified"
is neither literally false, nor misleading in context, and that no tendency to
deceive or actual deception has been shown, the Court finds that Infogroup
has not shown a likelihood of succeeding on its claim. But Infogroup's claim
has another problem: Infogroup has not shown that it has been injured or is
likely to be injured by DatabaseUSA's actions. This has a number of
implications. It means that another element of Infogroup's false advertising
claim is missing, further diminishing its likelihood of success on the merits. It
may even mean that Infogroup lacks standing to prosecute the claim. And, of
course, absent evidence of an injury, much less an irreparable one, Infogroup
cannot obtain an injunction.
As noted above, a false advertising claim under the Lanham Act
requires that the plaintiff has been or is likely to be injured as a result of the
false statement, either by direct diversion of sales from itself to defendant or
by a loss of goodwill associated with its products. Buetow, 650 F.3d at 1182;
Clorox Co., 140 F.3d at 1180. The Court finds no evidence to suggest that this
is the case. And failure to show such injury may be a more fundamental
defect in Infogroup's case: in Lexmark Int'l, Inc. v. Static Control
Components, Inc., the Supreme Court explained that a plaintiff's right to sue
under a particular statute depends on whether the plaintiff comes within the
"zone of interests" protected by the law involved, and that the statutory cause
of action is limited to plaintiffs whose injuries are proximately caused by
violations of the statute. 134 S. Ct. 1377, 1387-88 (2014). Specifically, to come
within the zone of interests for false advertising under the Lanham Act, the
plaintiff must allege an injury to a commercial interest in reputation or sales.
Id. at 1390. And to satisfy the proximate cause requirement, the plaintiff
must show economic or reputational injury flowing directly from the
deception wrought by the defendant's advertising, "and that that occurs when
deception of consumers causes them to withhold trade from the plaintiff." Id.
at 1391 (emphasis supplied).
There is nothing here that persuades the Court that Infogroup has
been, or is likely to be, injured by DatabaseUSA's description of its
occasionally-inaccurate data as "verified." Without that showing, the Court
can find neither a likelihood of success on the merits of this claim, nor the
irreparable harm that is a necessary prerequisite to a preliminary injunction.
The Court may not issue a preliminary injunction based only on a possibility
of irreparable harm. Winter, 555 U.S. at 22.
So, the Court finds neither a likelihood of success on the merits nor a
likelihood of irreparable harm and, as above, that much would be dispositive.
- 17 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 18 of 33 - Page ID # 1794
See, Barrett, 705 F.3d at 320; Dataphase, 640 F.2d at 114 n.9. But for the
sake of completeness, the Court also finds that the public interest is not
implicated by this claim, and that the balance of harms tips significantly in
DatabaseUSA's favor: Infogroup has not shown a likelihood of harm, but
Infogroup's proposed injunction would undoubtedly be disruptive to
DatabaseUSA's business. Infogroup has not established the propriety of a
preliminary injunction on this claim.
(c) False Representations about Relationship Between Companies
There are two specific provisions of the Lanham Act at issue here.16
First, a defendant may be liable for using a mark in commerce, in connection
with goods or services, in a way that "is likely to cause confusion, or to cause
mistake, or to deceive as to the affiliation, connection, or association of such
person with another person, or as to the origin, sponsorship, or approval of
his or her goods, services, or commercial activities by another person[.]" 15
U.S.C. § 1125(a)(1)(A). And second, as discussed in detail above, a defendant
may also be liable if it, "in commercial advertising or promotion,
misrepresents the nature, characteristics, qualities, or geographic origin of
his or her or another person’s goods, services, or commercial activities[.]" 15
U.S.C. § 1125(a)(1)(B). Infogroup relies upon both provisions, almost
interchangeably at times, with respect to DatabaseUSA's alleged attempts to
confuse potential customers about the affiliation between DatabaseUSA and
Infogroup entities.
(i) False Association Claim
Mark infringement requires proof that the plaintiff has ownership or
rights in the mark and that the defendant has used the mark in commerce, in
connection with goods or services, in a manner likely to cause consumer
confusion as to the source or sponsorship of the goods or services. Cmty. of
Christ Copyright Corp. v. Devon Park Restoration Branch of Jesus Christ's
Church, 634 F.3d 1005, 1009 (8th Cir. 2011). In evaluating a likelihood of
confusion between a mark and an allegedly-infringing mark, courts generally
consider such factors as the strength of the owner's mark, the similarity
between the marks, the degree to which the allegedly-infringing service
competes with the mark-owner's service, the alleged infringer's intent to
confuse the public, and evidence of actual confusion. See Devon Park, 634
F.3d at 1009. No one factor controls, and because the inquiry is inherently
Infogroup also invoked the Trade Practices Act and the Consumer Protection Act in
support of this claim in its supplemental memorandum. The Court does not discuss these
statutes separately, for the same reasons explained above. See supra, n.11.
16
- 18 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 19 of 33 - Page ID # 1795
case-specific, different factors may be entitled to more weight in different
cases. Id.
Of course, at this point, the degree of similarity is not a relevant
criterion, because only Infogroup's marks are at issue—Infogroup's theory is
that DatabaseUSA is using Infogroup's marks in a manner that could confuse
the public.17 See Masters, 631 F.3d at 473. So, this case does not fit neatly
into the rubric set forth above. Courts considering similar facts have, instead,
considered whether the allegedly-infringing use comports with the
nominative fair use doctrine, which is implicated when the defendant uses
the plaintiff's mark to describe the plaintiff's product. See, Playboy Enters. v.
Welles, 279 F.3d 796, 801 (9th Cir. 2002); Commerce Bankcorp, LLC v. Hill,
Civil No. 08-5628, 2010 WL 2545166 (D.N.J. June 18, 2010); Maurag, Inc. v.
Bertuglia, 494 F. Supp. 2d 395, 398 (E.D. Va. 2007); cf. Hensley Mfg. v.
ProPride, Inc., 579 F.3d 603, 611-12 (6th Cir. 2009).
The Ninth Circuit has said that whether a defendant is entitled to
nominative fair use depends on whether the product or service is readily
identifiable without use of the mark, whether only so much of the mark is
used as is reasonably necessary to identify the product, and whether the user
has done anything that would, in conjunction with the mark, suggest
sponsorship or endorsement by the trademark holder. New Kids on the Block
v. News Am. Publ'g, Inc., 971 F.2d 302, 308 (9th Cir. 1992). In other words,
the defendant's conduct or language must reflect the true and accurate
relationship between plaintiff and defendant's products or services. Century
21 Real Estate Corp. v. Lendingtree, Inc., 425 F.3d 211, 222 (3d Cir. 2005).
The Eighth Circuit has not discussed the doctrine, and the Ninth Circuit's
approach has not been universally adopted, but the broad parameters of the
doctrine are consistent. See Dwyer Instruments, Inc. v. Sensocon, Inc., 873 F.
Supp. 2d 1015, 1030 (N.D. Ind. 2012); see also Bd. of Supervisors v. Smack
Apparel Co., 550 F.3d 465, 489 (5th Cir. 2008); cf. Swarovski
Aktiengesellschaft v. Building No. 19, Inc., 704 F.3d 44, 49-53 (1st Cir. 2013);
Rosetta Stone Ltd. v. Google, Inc., 676 F.3d 144, 154 (4th Cir. 2012); Tiffany
(NJ) v. eBay, Inc., 600 F.3d 93, 102 (2d Cir. 2010).
Infogroup also presented evidence of DatabaseUSA's use of "-genie" as a suffix for various
services, apparently in an attempt to play off Infogroup's "Salesgenie" mark. Hr'g Ex. 4. But
Infogroup's complaint does not allege a claim for relief based on mark infringement of that
nature. See filing 23. In other words, the claim presented in the pleadings is that
DatabaseUSA is using Infogroup's marks in a way that falsely suggests an affiliation—not
that DatabaseUSA is using its own, but confusingly similar, marks. Absent such a claim,
the Court does not view the use of "-genie" as particularly relevant, although the Court will
admit the evidence for what weight it has.
17
- 19 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 20 of 33 - Page ID # 1796
And in this case, Gupta's identification of himself as the founder of
Infogroup and its associated entities is accurate—and Gupta is entitled to
accurately describe his experience in the industry when marketing his
company's products and services.18 For instance, in Bertuglia, the court
dismissed a trademark claim that was based on a defendant restauranteur's
description of himself as the "former owner" of a popular restaurant in
advertising for his new restaurants. 494 F. Supp. 2d at 398. The court found
that the defendant "did not use the accused phrases for the purpose of luring
customers into his restaurants under false pretenses. Rather, [he] intended to
convey that if a customer liked [his old restaurant] in the past, that customer
may also like his new restaurants." Id.; cf. Hensley, 579 F.3d at 612.
Similarly, in Welles, the Ninth Circuit found that a former "Playmate of the
Year" was entitled to describe herself as such on her personal Web site
(although some of her uses of the plaintiff's mark were excessive). 279 F.3d at
802-04. The Court of Appeals reasoned that the marks were clearly used to
describe the title she had been awarded by the plaintiff, "a title that helps
describe who she is." Id. at 803. And in Hill, the court found that a defendant
was entitled to make use of his former employer's marks in autobiographical
material that was part of a presentation the defendant made for his new
consulting business (although the Court denied the defendant summary
judgment because he might have used the marks too many times). 2010 WL
2545166, at *15.
Granted, some of Gupta's descriptions come very close to the line. 19 But
on balance, the Court finds that Gupta's descriptions of his experience are
sufficiently accurate to avoid preliminary injunctive relief—particularly the
sweeping injunction sought by Infogroup against any marketing materials "to
the effect that Gupta founded InfoUSA, or any Infogroup company."20 Filing
The letter from President Clinton to Gupta is factually a bit distinct, but the conclusion is
the same: Infogroup does not dispute that the letter is genuine, and it is clearly dated 1998.
The obvious purpose of publicizing it is to suggest that Gupta is an important person, not
that he is still associated with Infogroup. It happened, and Gupta is entitled to say so.
18
He should, for instance, strongly consider avoiding the word "proprietor," as opposed to
"founder," and may want to think about confining himself to relatively unambiguous
phrases such as "founder and former CEO." The fact that Infogroup's motion for
preliminary injunction is denied does not mean this case is over.
19
To the extent that the other terms of proposed injunction are less sweeping, such as
enjoining marketing materials "claiming or suggesting the existence of any past or present
association with Infogroup," they are troublingly vague. An injunction must "state its terms
specifically" and "describe in reasonable detail . . . the act or acts restrained or required."
Fed. R. Civ. P. 65(d)(1). It is questionable whether some terms of Infogroup's proposed
instruction are consistent with those standards.
20
- 20 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 21 of 33 - Page ID # 1797
81 at 24. Whether considered under the nominative fair use doctrine or the
ordinary (if somewhat ill-fitting) rubric set forth in Devon Park, 634 F.3d at
1009, and other cases, the Court's conclusion is the same: DatabaseUSA's use
of Infogroup's marks has not been shown, at this point, to create a sufficient
likelihood of confusion to establish Infogroup's likelihood of succeeding on the
merits of its mark infringement claim.21
Nor, the Court finds, has Infogroup sufficiently demonstrated actual
confusion on the part of consumers. Infogroup's evidence of confused
consumers is, again, anecdotal at best. The only instance of confusion that
was clearly tied to any of Gupta's representations was the letter sent to a
"loyal customer" which led the customer to call Infogroup and ask about the
mailing. Filing 14-1 at 8-9. But the precise nature of the customer's inquiry is
not reflected in the record. See filing 14-1 at 8-9; Hr'g Ex. 2; see also Duluth
News-Tribune, Inc. v. Mesabi Publ'g Co., 84 F.3d 1093, 1098 (8th Cir. 1996)
("vague evidence of misdirected phone calls and mail" was "hearsay of a
particularly unreliable nature given the lack of an opportunity for crossexamination of the caller or sender regarding the reason for the 'confusion'").
And even then, the fact that the customer called to ask "indicates a
distinction in the mind of the questioner, rather than confusion." Id.
The evidence does not directly connect the other instances of purported
confusion proffered by Infogroup to any conduct by Gupta or DatabaseUSA.
The Court finds that evidence "to be de minimis and to show inattentiveness
on the part of the caller or sender rather than actual confusion." Id. The
various Infogroup and DatabaseUSA entities do similar business, and the
prefixes "info-" and "data-" have similar connotations and can only be
conjoined in so many ways. To be candid, it would be surprising if someone
hadn't confused them at some point, particularly when at least some
customers apparently use both businesses. Ask enough people and you could
probably find someone who thought infofree.com and Infowars.com were
somehow associated.22
The Court does not find the evidence offered by Infogroup to be
persuasive evidence of actual confusion, much less confusion attributable to
DatabaseUSA's use of Infogroup's marks. The Eighth Circuit has said, for
purposes of summary judgment, that "even several isolated incidents of
actual confusion" may be "insufficient to establish a genuine issue of material
Some possibility of consumer confusion is consistent with a fair use defense. KP
Permanent Make-Up, Inc. v. Lasting Impression I, Inc., 543 U.S. 111, 121-22 (2004). But the
Court finds no significant possibility to have been proven in this case at this point.
21
To be clear, they aren't. It is unlikely that Gupta and Alex Jones would have much in
common.
22
- 21 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 22 of 33 - Page ID # 1798
fact as to the likelihood of confusion." Id. Evidence that could not prevent
summary judgment is surely insufficient to warrant a preliminary injunction.
Unrelated to Gupta's résumé, Infogroup argues that DatabaseUSA's
use of search engine ad placement services, triggered by Infogroup's marks, is
somehow infringing. Filing 81 at 6-7. The Court is unpersuaded. Although
the use of such targeted advertising can be misused, it is generally
understood that such tactics can be deployed consistently with the Lanham
Act. See, CollegeSource, Inc. v. AcademyOne, Inc., ___ F. App'x ___, 2015 WL
469041, at *11 (3d Cir. Feb. 5, 2015); 1-800-Contacts, Inc. v. Lens.com, Inc.,
722 F.3d 1229, 1242-45 (10th Cir. 2013); Network Automation, Inc. v.
Advanced Sys. Concepts, Inc., 638 F.3d 1137, 1148-54 (9th Cir. 2011);
compare N. Am. Med. Corp. v. Axiom Worldwide, Inc., 522 F.3d 1211, 1222-23
(11th Cir. 2008) (advertisers created likelihood of confusion by using
competitors Web address and trademarks in their own advertisements). The
advertisements at issue here, as displayed by Infogroup's exhibits, do not use
Infogroup's marks in the advertisement itself, and each is either separated
from the search results or plainly labeled as a sponsored advertisement. See,
filing 82-1 at 25; filing 82-2 at 5, 7. As the Tenth Circuit explained:
Perhaps in the abstract, one who searches for a particular
business with a strong mark and sees an entry on the results
page will naturally infer that the entry is for that business. But
that inference is an unnatural one when the entry is clearly
labeled as an advertisement and clearly identifies the source,
which has a name quite different from the business being
searched for.
Lens.com, 722 F.3d at 1245. And that could explain why Infogroup has
presented no evidence to suggest that anyone has actually been confused by
the advertisements, or is likely to be. Having considered "(1) the strength of
the mark; (2) the evidence of actual confusion; (3) the type of goods and
degree of care likely to be exercised by the purchaser; and (4) the labeling and
appearance of the advertisements and the surrounding context on the screen
displaying the results page," the Court finds that Infogroup has not shown a
likelihood of success under the Lanham Act based on DatabaseUSA's search
engine advertisements. See Network Automation, 638 F.3d at 1154.
One final note: Infogroup also contends that the "60 Minutes"
references, and description of DatabaseUSA as having been creating
databases "since 1972," somehow support its false association claim. Filing 81
at 16-17. But neither the "60 Minutes" excerpts, nor the slogan, make any
direct reference to Infogroup. Because Database's conduct in this regard does
- 22 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 23 of 33 - Page ID # 1799
not actually make use of Infogroup's marks, it does not support a claim under
§ 1125(a)(1)(A). Perhaps they could be false advertisements—but, as noted
above, Infogroup has not asked the Court to enjoin them as such, so that
issue is not presented by the motion before the Court.23
(ii) False Advertising Claim
Infogroup also contends that by implying a connection between
DatabaseUSA and Infogroup, DatabaseUSA is falsely advertising its services.
As discussed above, a false advertising claim requires proof of a false
statement of fact in a commercial advertisement that had a tendency to
deceive, was material to the purchasing decision, and injured the plaintiff.
See, Buetow, 650 F.3d at 1182; Clorox Co., 140 F.3d at 1180.
But, although the factors are phrased differently, the Court's reasoning
with respect to Infogroup's false association theory is equally dispositive of its
false advertising theory. The challenged statements were not literally false,
and were (at most) misleading in isolated instances. Saying that the
challenged advertising was not likely to confuse consumers is effectively the
same as saying that it had no tendency to deceive them. Absent persuasive
evidence of actual confusion, there is also no persuasive evidence of injury to
Infogroup. And as explained above, without evidence of actual or imminent
injury, Infogroup can demonstrate neither a likelihood of prevailing on the
merits nor the irreparable injury necessary for a preliminary injunction.
(iii) Remaining Dataphase Factors
For the reasons explained above, the Court finds that Infogroup has
shown neither a likelihood of success on the merits, nor a likelihood of
irreparable injury, for its claims based on allegedly-false representations
about the association between Infogroup and DatabaseUSA. That is enough
to deny Infogroup's motion for preliminary injunction. See, Barrett, 705 F.3d
at 320; Dataphase, 640 F.2d at 114 n.9. But for the sake of completeness, the
remaining Dataphase factors do not help Infogroup. The public interest is
again not implicated, except to the extent that it might favor permitting
Gupta to make truthful statements about his experience in the field, so that
consumers can make fully-informed choices. The balance of harms does not
swing as far in DatabaseUSA's favor on these claims, because unlike with the
"verified" data, it would not be as disruptive to DatabaseUSA's business
operations (as opposed to its marketing) to preclude its use of Infogroup's
That said, there's an argument to be made that they're misleading, so DatabaseUSA
would be well advised to knock it off.
23
- 23 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 24 of 33 - Page ID # 1800
marks. But because Infogroup has not shown how it would be injured, the
balance of harms still favors DatabaseUSA.
In sum, the Court finds when the Dataphase factors are applied to each
of Infogroup's claims, Infogroup has not met its burden of establishing the
propriety of preliminary injunctive relief. Infogroup's motion for preliminary
injunction (filing 12) will be denied.
2. MOTION TO STRIKE
Infogroup moves the Court to strike DatabaseUSA's affirmative
defenses pursuant to Fed. R. Civ. P. 12(f). Filing 61. Infogroup complains that
DatabaseUSA has failed to allege facts supporting its affirmative defenses,
and that some fail as a matter of law. Filing 61.
But as a preliminary matter, the Court must address the appropriate
standard for such a motion. Specifically, the question is whether the elevated
pleading requirements of Fed. R. Civ. P. 8(a), as explicated in Ashcroft v.
Iqbal, 556 U.S. 662, 678 (2009) and Bell Atl. Corp. v. Twombly, 550 U.S. 544,
555 (2007), also apply to affirmative defenses stated pursuant to Rule 8(c)(1).
Neither the Supreme Court nor any circuit court has considered the question,
and district courts are sharply divided.24 This Court, however, is persuaded
that Iqbal and Twombly should not be applied in this context.
To begin with, the Eighth Circuit's law is clear regarding motions to
strike affirmative defenses: while the Court enjoys "liberal discretion" to
strike pleadings under Fed. R. Civ. P. 12(f), it is "an extreme and disfavored
measure." BJC Health Sys. v. Columbia Cas. Co., 478 F.3d 908, 917 (8th Cir.
2007); Stanbury Law Firm v. I.R.S., 221 F.3d 1059, 1063 (8th Cir. 2000). A
motion to strike a defense will be denied if the defense is sufficient as a
matter of law or if it fairly presents a question of law or fact which the Court
ought to hear. Lunsford v. United States, 570 F.2d 221, 229 (8th Cir. 1977).
And while defenses must be asserted in a responsive pleading, they need not
be articulated with any rigorous degree of specificity, and may be sufficiently
raised for purposes of Rule 8 by their bare assertion. See Zotos v. Lindbergh
Sch. Dist., 121 F.3d 356, 361 (8th Cir. 1997).
There is, in fact, not even a consensus on the majority rule. Compare Alston v. Equifax
Info. Servs., LLC, No. 13-934, 2014 WL 580148, at *2 (D. Md. Feb. 11, 2014) (majority view
applies Iqbal/Twombly to affirmative defenses), and Lakeside Roofing Co. v. Nixon, No.
4:10-cv-1761, 2011 WL 2600421, at *1 n.3 (E.D. Mo. June 29, 2011) (same), with U.S.
Commodity Trading Comm'n v. U.S. Bank, N.A., No. 13-cv-2041, 2014 WL 294219, at *10
(N.D. Iowa Jan. 27, 2014) (at first majority of courts applied Iqbal/Twombly, but that is now
minority position), and Powers v. Fifth Third Mortg. Co., No. 1:09-cv-2059, 2011 WL
3418290, at *3 n.2 (N.D. Ohio Jul. 18, 2011) (majority of courts have rejected application of
Iqbal/Twombly). But this Court need not resort to nose-counting to decide a question of law.
24
- 24 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 25 of 33 - Page ID # 1801
Of course, Zotos precedes the Supreme Court's decisions in Iqbal and
Twombly. The Eighth Circuit, if presented with the question, might well
conclude that Zotos has been abrogated by Iqbal and Twombly (although it is
unlikely to do so, for the reasons explained below). But Zotos is squarely on
point, and Iqbal and Twombly are not, which means Zotos remains the law of
this Circuit. Strauss v. Centennial Precious Metals, Inc., 291 F.R.D. 338, 34243 (D. Neb. 2013); Bank of Beaver City v. Sw. Feeders, L.L.C., No. 4:10-CV2309, 2011 WL 4632887, at *5-8 (D. Neb. Oct. 4, 2011). As far as this Court is
concerned, it is the Eighth Circuit's prerogative to overrule its own decisions.
See, Rodriguez de Quijas v. Shearson/Am. Express, 490 U.S. 477, 484 (1989);
Hood v. United States, 342 F.3d 861, 864 (8th Cir. 2003); Okruhlik v. Univ. of
Ark., 255 F.3d 615, 622 (8th Cir. 2001).
But even if faced with an open question, the Court would hold that the
Iqbal/Twombly standard does not apply. To plead a claim for relief, Rule
8(a)(2) requires, as relevant, a "short and plain statement of the claim
showing that the pleader is entitled to relief." This, the Supreme Court
explained in Twombly, "requires a 'showing,' rather than a blanket assertion,
of entitlement to relief." 550 U.S. at 555 n.3. The Supreme Court's holding in
Twombly, and its iteration of that standard in Iqbal, were expressly grounded
on Rule 8(a)(2)'s language requiring a "showing" of the pleader's entitlement
to relief. See, e.g., Iqbal, 556 U.S. at 679; Twombly, 550 U.S. at 556-56. But
the terms of Rule 8(c)(1) require no such "showing": rather, a party is only
required to "affirmatively state any avoidance or affirmative relief." Several
district courts have relied on that distinction in concluding that the reasoning
of Iqbal and Twombly does not apply with equal force to Rule 8(c). See, Phelps
v. City of Parma, Idaho, No. 14-cv-85, 2015 WL 893112, at *2 n.2 (D. Idaho
Mar. 2, 2015); Sibley v. Choice Hotels Int'l, Inc., 304 F.R.D. 125, 132
(E.D.N.Y. 2015); Fed. Trade Comm'n v. AMG Servs., Inc., No. 2:12-CV-536,
2014 WL 5454170, at *5-6 (D. Nev. Oct. 27, 2014); Hansen v. R.I.'s Only 24
Hour Truck & Auto Plaza, Inc., 287 F.R.D. 119, 122 (D. Mass. 2012); Kohler
v. Staples the Office Superstore, LLC, 291 F.R.D. 464, 468-69 (S.D. Cal. 2013);
Bank of Beaver City, 2011 WL 4632887, at *6-7; Falley v. Friends Univ., 787
F. Supp. 2d 1255, 1258 (D. Kan. 2011); Lane v. Page, 272 F.R.D. 581, 591-94
(D.N.M. 2011); but see, e.g., Dodson v. Strategic Rests. Acquisition Co. II,
LLC, 289 F.R.D. 595, 600 (E.D. Cal. 2013).25
That conclusion is bolstered by Fed. R. Civ. P. App. of Forms, Form 30, which provides an
example of an answer presenting an affirmative defense which is stated in very general
terms—it is, in fact, only a sentence long. Because a pleading that complies with one of the
official Forms cannot be attacked, the brevity of Form 30 suggests that Iqbal and Twombly
do not apply. Lane, 272 F.R.D. at 594; see Falley, 787 F. Supp. 2d at 1258. Of course, Iqbal
and Twombly were decided after Form 30 was most recently amended. See AMG Servs.,
25
- 25 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 26 of 33 - Page ID # 1802
And there is good reason to make such a distinction. As courts have
also observed, a complaint and an answer place asymmetrical demands on
the parties. The time for filing a complaint and pleading a claim for relief is
generally bounded only by the statute of limitations, while a defendant
asserting an affirmative defense must, absent an extension, file a responsive
pleading containing all its affirmative defenses within 21 days of service. See
Fed. R. Civ. P. 12. It would, therefore, be somewhat unreasonable to hold the
defendant to the same pleading standard as the plaintiff, given the limited
time that the defendant has to respond. See, Phelps, 2015 WL 983112, at *2
n.2; Sibley, 304 F.R.D. at 133; Hansen, 287 F.R.D. at 123; Kohler, 291 F.R.D.
at 469; Bank of Beaver City, 2011 WL 4632887, at *6-7; Falley, 787 F. Supp.
2d at 1258-59; Lane, 272 F.R.D. at 595-96. Of course, those deadlines are not
inflexible: the time to file a responsive pleading can be extended, and leave to
amend a responsive pleading may be obtained even after that. See, AMG
Servs., 2014 WL 5454170, at *8; Dodson, 289 F.R.D. at 602. And some
asymmetry is already tolerated with respect to defendants who must file
counterclaims. But the Court need not exacerbate it further, particularly
where the textual foundation of Iqbal and Twombly is absent.
It is, of course, not the Court's place to question whether Iqbal and
Twombly are themselves sound policy, or consistent with the plain language
of the Federal Rules of Civil Procedure—but the Court need not extend them
further absent clear authority compelling that conclusion. Whatever its
faults, the Iqbal/Twombly standard, when applied to claims for relief, at least
helps resolve cases. Applying that standard to affirmative defenses, however,
merely invites motions to strike—and while "[m]otions to dismiss help resolve
cases; motions to strike, in most cases, waste everyone's time." Lane, 272
F.R.D. at 586. In sum, neither the language of Rule 8 nor basic principles of
fairness and practicality weigh in favor of applying the Iqbal/Twombly
standard to affirmative defenses, and the Court declines to do so.
Infogroup contends, in the alternative, that the Court should strike at
least some of DatabaseUSA's affirmative defenses regardless of whether the
Iqbal/Twombly standard is applied. Infogroup complains that some of the
affirmative defenses are "bare bones" conclusions insufficient to provide
notice, and that others are not actually affirmative defenses. Filing 62 at 911. The Court is not persuaded.
As noted above, striking an affirmative defense is "an extreme and
disfavored measure." BJC Health Sys., 478 F.3d at 917; Stanbury Law Firm,
2014 WL 5454170, at *8. But other forms have been amended since then, and Form 30 was
left alone. Compare, Fed. R. Civ. P. App. of Forms, Forms 52 and 60. And the Court is not
at liberty to ignore Fed. R. Civ. P. 84's clear admonition that "[t]he forms in the Appendix
suffice under these rules. . . ."
- 26 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 27 of 33 - Page ID # 1803
221 F.3d at 1063. Motions to strike are often considered "time wasters," and
should be denied unless the challenged allegations have no possible relation
or logical connection to the subject matter of the controversy. Lane, 272
F.R.D. at 587 (citing 5C C. Wright and A. Miller, Fed. Prac. & Proc. Civ. §
1382 (3d ed. 2004); see Lunsford, 570 F.2d at 229. And Infogroup does not
explain how it is prejudiced by the alleged defects in DatabaseUSA's
pleading.26 See, Person v. Heartland Emp't Servs, LLC, No. 1:14-cv-1297,
2014 WL 6980572, at *1 (C.D. Ill. Dec. 10, 2014); U.S. Commodity Futures
Trading Comm'n v. A.S. Templeton Grp., 297 F. Supp. 2d 531, 533 (E.D.N.Y.
2003); FDIC v. Niblo, 821 F. Supp. 441, 448-49 (N.D. Tex. 1993); SEC v.
Toomey, 866 F. Supp. 719, 721-22 (S.D.N.Y. 1992); FDIC v. Ashley, 749 F.
Supp. 1065, 1066 (D. Kan. 1990); Lunsford v. United States, 418 F. Supp.
1045, 1051-52 (D.S.D. 1976), aff'd, 570 F.2d 221.
Nor is the Court cited to any authority for Infogroup's repeated
demands that the Court strike DatabaseUSA's affirmative defenses "with
prejudice." E.g. filing 62 at 1. The remedy for striking defenses at this stage
of the litigation is often to permit amendment later. Falley, 787 F. Supp. 2d
at 1259. And leave to amend a pleading to add a defense is to be freely
given—it should be denied "only where it will result in 'undue delay, bad
faith or dilatory motive on the part of the movant, repeated failure to cure
deficiencies by amendments previously allowed, undue prejudice to the
opposing party by virtue of allowance of the amendment, [or] futility of
amendment.'" Dennis v. Dillard Dep't Stores, Inc., 207 F.3d 523, 525-26 (8th
Cir. 2000); see also Joseph v. Allen, 712 F.3d 1222, 1226 n.3 (8th Cir. 2013)
(amendment adding affirmative defense should be allowed with liberality,
even after motion for summary judgment has been filed). The intent of Rule
12(f) is to "minimize delay, prejudice, and confusion"—not create it by
establishing a cycle of pleading and striking and repleading. See Falley, 787
F. Supp. 2d at 1259 (citation and quotation omitted). The Court is not
inclined, at this point in the proceedings, to accept Infogroup's apparent
The Court particularly notes Infogroup's contention that two defenses should be stricken
because they are not "affirmative defenses" but, rather, assert defects or denials of
Infogroup's prima facie case. See filing 62 at 10-11. The deficiency of the answer, according
to Infogroup, seems to be that some of the defenses listed under the heading "Affirmative
Defenses" are not actually affirmative enough. The Court does not believe the distinction is
worth parsing at this point. Such matters need not be pleaded, see Masuen v. E.L. Lien &
Sons, Inc., 714 F.2d 55, 57 (8th Cir. 1983), but they are hardly worth striking. See, Joe
Hand Promotions, Inc. v. Ridgway, No. 6:14-CV-3401, 2015 WL 1321477, at *3 (W.D. Mo.
Mar. 24, 2015) (citing 5 Charles Alan Wright & Arthur R. Miller, Federal Practice &
Procedure § 1269 (3d ed. 2014)); Bank of Beaver City, 2011 WL 4632887, at *9-10.
26
- 27 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 28 of 33 - Page ID # 1804
invitation to take a blue pencil to DatabaseUSA's answer, so Infogroup's
motion to strike (filing 61) will be denied.
3. MOTION TO DISMISS
Infogroup has moved to dismiss two of DatabaseUSA's counterclaims—
specifically, its tortious interference and unjust enrichment claims. See filing
63. Infogroup also, in its motion to dismiss, moves the Court to strike what it
calls "undisclosed facts" cited in support of the counterclaims. See filing 63.
To survive a motion to dismiss for failure to state a claim, a pleading
must set forth a short and plain statement of the claim showing that the
pleader is entitled to relief. Rule 8(a)(2). This does not require detailed
factual allegations, but it demands more than an unadorned accusation.
Iqbal, 556 U.S. at 678. The pleading need not contain detailed factual
allegations, but must provide more than labels and conclusions; a formulaic
recitation of the elements of a cause of action will not suffice. Twombly, 550
U.S. at 555. For the purposes of a motion to dismiss a court must take all of
the factual allegations in the pleading as true, but is not bound to accept as
true a legal conclusion couched as a factual allegation. Id. And the pleading
must also contain sufficient factual matter, accepted as true, to state a claim
for relief that is plausible on its face. Iqbal, 556 U.S. at 678.
(a) Tortious Interference
DatabaseUSA alleges that Infogroup knows that customers come to
DatabaseUSA's Web sites looking for information about its products and
services, and that Infogroup made false statements about DatabaseUSA's
products and services for the purpose of interfering with its business
expectancies. Filing 60 at 40. Infogroup asserts that this claim fails because
DatabaseUSA has alleged neither that the alleged interference caused any
harm, nor that it was damaged. Filing 64 at 5. DatabaseUSA, Infogroup
argues, "do[es] not identify any prospective customers who reviewed any
alleged false statements made by plaintiffs about any products, or that any
such customers declined to purchase defendants’ services because of any false
statements. Nor do[es DatabaseUSA] allege any facts from which this
conclusion can reasonably be inferred." Filing 64 at 5. In response,
DatabaseUSA directs the Court to allegations found elsewhere in the answer,
and incorporated by reference into its tortious interference counterclaim: that
agents of Infogroup left false reviews on DatabaseUSA's Web sites for the
purpose of harming its reputation. Filing 60 at 34; filing 72 at 3.
To succeed on a claim for tortious interference with a business
relationship or expectancy, a plaintiff must prove (1) the existence of a valid
business relationship or expectancy, (2) knowledge by the interferer of the
- 28 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 29 of 33 - Page ID # 1805
relationship or expectancy, (3) an unjustified intentional act of interference
on the part of the interferer, (4) proof that the interference caused the harm
sustained, and (5) damage to the party whose relationship or expectancy was
disrupted. Steinhausen v. HomeServices of Neb., Inc., 857 N.W.2d 816, 831
(Neb. 2015). The interference must impact a valid business relationship or
expectancy, and the relationship or expectancy interfered with must belong to
the party asserting the claim. Id.
Although Nebraska law is not fully developed on this point, it is true
that proving a business expectancy "valid" will generally require proof that
there was a reasonable likelihood or probability of a business relationship.
See, e.g., Lucas v. Monroe Cnty., 203 F.3d 964, 978 (6th Cir. 2000) (applying
Michigan law); Gieseke ex rel. Diversified Water Diversion, Inc. v. IDCA, Inc.,
844 N.W.2d 210, 221-22 (Minn. 2014). And this may require proof of a
potential relationship with a particular party, or at least a class of parties.
See, Lucas, 203 F.3d at 978; Dunn v. Air Line Pilots Ass'n, 193 F.3d 1185,
1191 (11th Cir. 1999) (applying Florida law); Gieseke, 844 N.W.2d at 222. But
this case is at the pleading stage, not the proving stage. The Court finds that
DatabaseUSA's pleading sufficiently alleges the existence of a group of
potential customers who may have been diverted from doing business with it
by a wrongful act of Infogroup. See TYR Sport Inc. v. Warnaco Swimwear,
Inc., 679 F. Supp. 2d 1120, 1139-40 (C.D. Cal. 2009) (citing Cook v. Winfrey,
141 F.3d 322, 328 (7th Cir. 1998)); see also Am. Home Assurance Co. v.
Greater Omaha Packing Co., No. 8:11-CV-270, 2012 WL 2061941, at *2 (D.
Neb. 2012). Accordingly, the Court will not dismiss DatabaseUSA's tortious
interference claim.
(b) Unjust Enrichment
Infogroup also moves to dismiss DatabaseUSA's unjust enrichment
claim. Filing 64 at 6-7. DatabaseUSA alleges that Infogroup has received
"substantial financial benefit" as a result of "tortious and improper conduct,
including but not limited to unfair competition and deceptive trade practices."
Filing 60 at 40. So, DatabaseUSA asserts that it would be "inequitable and
unjust for Infogroup to retain the revenue[,]" which should be disgorged to
DatabaseUSA. Filing 60 at 40-41. Infogroup argues that in Nebraska, unjust
enrichment contemplates a quasi-contractual arrangement between the
plaintiff and defendant which was not pled here. Filing 64 at 6.
To recover under a theory of unjust enrichment in Nebraska, one must
allege facts that the law of restitution would recognize as unjust enrichment.
City of Scottsbluff v. Waste Connections of Nebraska, 809 N.W.2d 725, 743
(Neb. 2011). Restitution constitutes an independent basis of liability
comparable to a liability in contract or tort. Id. Unjust enrichment may
- 29 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 30 of 33 - Page ID # 1806
result, as Infogroup contends, from a transaction that the law treats as
ineffective to work a conclusive alteration in ownership rights. Id. But there
may also be cases in which the remedy for unjust enrichment gives the
plaintiff something, such as the defendant's wrongful gain, that the plaintiff
did not previously possess. See Restatement (Third) of Restitution and Unjust
Enrichment § 1, cmt. a (2011). As the Restatement (Third) explains, the
"inherent flexibility" of the concept of unjust enrichment means that
almost every instance of a recognized liability in restitution
might be referred to the broad rule of the present section. The
same flexibility means that the concept of unjust enrichment will
not, by itself, yield a reliable indication of the nature and scope of
the liability imposed by this part of our legal system. It is by no
means obvious, as a theoretical matter, how "unjust enrichment"
should best be defined; whether it constitutes a rule of decision, a
unifying theme, or something in between; or what role the
principle would ideally play in our legal system.
Id. But the Restatement—and the Nebraska Supreme Court—reject the view
that "restitution" is limited to a remedy. Id., cmt. e(3); see Waste Connections,
809 N.W.2d at 743. Instead, the Restatement explains, while "a claim for
restitution or 'disgorgement' of the profits of conscious wrongdoing . . .
normally incorporates as its predicate the substantive elements of a cause of
action for tort or other breach of duty[,]" the Restatement
generally refers to the wrongdoer's unjust enrichment in such
cases as a parallel source of liability: the defendant, in other
words, is liable both on a theory of tort and (alternatively) on a
theory of unjust enrichment. Some observers prefer to
characterize restitution in this context as an alternative remedy
(the alternative being damages) for a single underlying wrong.
Nothing practical turns on this disagreement except the
identification of the applicable period of limitations, and the
history of the field rebuts any suggestion that there is only one
way such a claim may properly be pleaded. Ordinarily, a
complaint that alleges profitable wrongdoing by the defendant
states a claim for restitution of unjust enrichment as well as a
claim for damages in tort . . . .
Id. (citation omitted).
DatabaseUSA's allegations fall within the scope of unjust enrichment
for which restitution may be available under the Restatement (Third): "A
- 30 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 31 of 33 - Page ID # 1807
person who obtains a benefit by conscious interference with a claimant's
legally protected interests (or in consequence of such interference by another)
is liable in restitution as necessary to prevent unjust enrichment . . . ."
Restatement (Third) of Restitution and Unjust Enrichment § 44. "Conscious
interference with property rights of any kind, with contractual expectations,
or with other interests to which the law of torts extends a similar protection,
will support the claim in restitution described in this section." Id., cmt. b.
The Nebraska Supreme Court has adopted the Restatement (Third)
view of unjust enrichment. See, United Gen. Title Ins. Co. v. Malone, 858
N.W.2d 196, 232-13 (Neb. 2015); Waste Connections, 809 N.W.2d at 738-48.
Accordingly, the Court finds that DatabaseUSA has adequately stated a
claim for unjust enrichment under Nebraska law. Infogroup's motion to
dismiss will be denied.
(c) "Undisclosed Facts"
Infogroup also complains about a handful of references in the answer to
"additional facts" that are confidential, and thus unpled, but which will also
(according to DatabaseUSA) support some of its counterclaims. Filing 60 at
37-39; filing 64 at 1. Infogroup insists that these allegations should be
stricken "with prejudice" and that DatabaseUSA should be precluded from
relying on them, or, in the alternative, that the Court should order
DatabaseUSA to amend its answer. Filing 64 at 1-2.
This matter is easily disposed of. The Court has already explained its
view on striking "with prejudice" and will not revisit it. Nor is the
complained-of language prejudicial to Infogroup: it is mere surplusage, which
does not affect the issues. Bd. of Comm'rs of Lake Cnty. v. Keene Five-Cents
Sav. Bank, 108 F. 505, 515 (8th Cir. 1901); see Moran v. Judson, 96 F.2d 551,
552-53 (D.C. Cir. 1938); cf. United States v. DeRosier, 501 F.3d 888, 897 (8th
Cir. 2007). Infogroup does not contend that the relevant claims are not well
stated without them. See Bd. of Comm'rs, 108 F. at 515. The Court could
strike such allegations. Cf. DeRosier, 501 F.3d at 897. But the Court sees no
need to do so.
III. CONCLUSION
For the reasons explained above, Infogroup's various motions are
denied. One final matter: the Court has, in reaching its conclusions, relied
upon and described some of the contents of documents that were filed as
restricted-access pursuant to NEGenR 1.3(a)(1)(B)(ii) and NECivR 5.3(c) and
the protective order agreed to by the parties. Filing 29. However, it has not
always been clear to the Court what information in those documents was
intended to be confidential.
- 31 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 32 of 33 - Page ID # 1808
The Court has endeavored to avoid including information in this
memorandum and order that would require it to be restricted as well. The
Court has done so because under the common law, judicial records and
documents have been historically considered to be open to inspection by the
public. In re Search Warrant for Secretarial Area Outside Office of Gunn, 855
F.2d 569, 573 (8th Cir. 1988); see also Nixon v. Warner Commc'ns, 435 U.S.
589, 597 (1978). Accordingly, there is a common-law presumption in favor of
public access to judicial records.27 United States v. McDougal, 103 F.3d 651,
657 (8th Cir. 1996); see also, IDT Corp. v. eBay, 709 F.3d 1220, 1222 (8th Cir.
2013); Webster Groves, 898 F.2d at 1376; United States v. Webbe, 791 F.2d
103, 106 (8th Cir. 1986). This right of access bolsters public confidence in the
judicial system by allowing citizens to evaluate the reasonableness and
fairness of judicial proceedings and keep a watchful eye on the workings of
public agencies. IDT Corp., 709 F.3d at 1222; see also Nixon, 435 U.S. at 59798. It also provides a measure of accountability to the public at large, which
pays for the courts. IDT Corp., 709 F.3d at 1222; see also Richmond
Newspapers, Inc. v. Virginia, 448 U.S. 555, 572 (1980).
But records or parts of records are sometimes sealed for good reasons,
including the protection of state secrets, trade secrets, and informers; and to
protect the privacy of children, rape victims, and other particularly
vulnerable parties or witnesses. See Doe v. Blue Cross & Blue Shield United
of Wisc., 112 F.3d 869, 872 (7th Cir. 1997); see also NECivR 5.3(b). So, when
determining whether access to a document should be restricted, the Court
must consider the degree to which sealing a judicial record would interfere
with the interests served by the common-law right of access and balance that
interference against the interests served by maintaining confidentiality of the
information sought to be sealed. IDT Corp., 709 F.3d at 1222.
As noted, the Court is not aware of anything in this memorandum and
order that implicates confidentiality to the extent necessary to overcome the
strong presumption of public access to a court order. But from an excess of
caution, the Court will provisionally restrict access to this memorandum and
order to attorneys of record and court users. That restriction will be lifted on
April 3, 2015, in the absence of a persuasive objection from a party.
There may be a constitutional presumption as well, but neither the Supreme Court nor
the Eighth Circuit have definitively spoken as to whether there is a First Amendment right
of access to civil proceedings. See Webster Groves Sch. Dist. v. Pulitzer Publ'g Co., 898 F.2d
1371, 1376-77 (8th Cir. 1990).
27
- 32 -
8:14-cv-00049-JMG-CRZ Doc # 88 Filed: 03/30/15 Page 33 of 33 - Page ID # 1809
IT IS ORDERED:
1.
Infogroup's motion for preliminary injunction (filing 12) is
denied.
2.
Infogroup's motion to strike (filing 61) is denied.
3.
Infogroup's motion to dismiss (filing 63) is denied.
4.
The Clerk of the Court is directed to provisionally restrict
access to this Memorandum and Order to attorneys of
record and court users, pursuant to NEGenR 1.3(a)(1)(B)(ii)
and NECivR 5.3(c).
5.
The parties are directed to notify the Court on or before
April 2, 2015, whether they have any objection to lifting the
access restriction that has been provisionally placed on this
memorandum and order and, if they object, to provide the
factual basis and legal authority supporting such objection.
6.
The Clerk of the Court is directed to set a case
management deadline of April 3, 2015, with the following
docket text: "Check for objection to public access to
memorandum and order."
Dated this 30th day of March, 2015.
BY THE COURT:
John M. Gerrard
United States District Judge
- 33 -