LUCY H. KOH, United States District Judge.
This case involves putative class action claims regarding Defendant Yahoo!, Inc.'s ("Yahoo") practice of scanning and analyzing emails of non-Yahoo Mail users in purported violation of federal and California anti-wiretapping laws. Plaintiffs Cody Baker, Brian Pincus, Halima Nobles, and Rebecca Abrams, individually and on behalf of those similarly situated ("Plaintiffs"), allege that Yahoo's operation of its Yahoo Mail service violates their expectation of privacy under the Electronic Communications Privacy Act (ECPA), California's Invasion of Privacy Act (CIPA), and the California Constitution. Plaintiffs filed a Consolidated Class Action Complaint on February 12, 2014. ECF No. 35 ("Compl."). Before the Court is Yahoo's Motion to Dismiss. ECF No. 37 ("Mot."). Pursuant to Civil Local Rule 7-1(b), the Court finds this matter appropriate for resolution without a hearing and hereby VACATES the hearing set for August 29, 2014. The Case Management Conference set for August 29, 2014 at 10 a.m. remains as set. For the reasons stated below, the Court DENIES in part and GRANTS in part Yahoo's Motion to Dismiss.
Plaintiffs are four individuals representing a class of individuals who do not use Yahoo's email service ("Yahoo Mail") but have sent emails to Yahoo Mail users from non-Yahoo email addresses. Compl. ¶¶ 15-18. Plaintiffs allege Yahoo's practices while operating Yahoo Mail violate state and federal anti-wiretapping laws and invade their protected privacy interests under the California Constitution. Id. ¶¶ 5-7. Plaintiffs seek injunctive and declaratory relief and statutory damages on behalf of a class of non-Yahoo Mail users. Id. ¶ 7. Plaintiffs' proposed class consists of all persons in the United States who are not Yahoo Mail users and who sent emails to or received emails from a Yahoo Mail user between October 2, 2011 and the present. Id. ¶ 97.
Yahoo operates Yahoo Mail as a free web-based email service. Id. ¶¶ 20-23. More than 275 million users have registered for Yahoo Mail to create @yahoo.com, @ymail.com, or @rocketmail.com email addresses. Id. ¶¶ 20-21. Before signing up for a Yahoo Mail account, potential users must provide Yahoo with personal information such as their name, birthday, telephone number, and account information. Id. ¶ 31.
In order to provide Yahoo Mail as a free email service to users, Yahoo charges advertisers to display advertisements on Yahoo Mail webpages. Id. ¶ 23. Roughly 75% of Yahoo's revenue in 2013 came from advertising. Id. ¶ 28. Plaintiffs allege Yahoo can increase its revenues by charging advertisers higher rates to display targeted advertisements to Yahoo Mail users. Id. Thus, Yahoo has a financial incentive to scan and store email content to allow advertisers to target individuals based on certain personal characteristics. Id.
The instant dispute concerns Yahoo's interception, scanning, and storage of Yahoo Mail users' incoming and outgoing emails for content, specifically the content of emails to and from non-Yahoo Mail users with whom Yahoo Mail users communicate. Plaintiffs allege Yahoo intercepts and scans Yahoo Mail users' emails "during transit and before placing the emails into storage." Id. ¶ 24. Plaintiffs allege Yahoo scans, analyzes, collects, and stores user information without their consent. Id. ¶¶ 1, 3, 5, 26.
Three relevant agreements exist between Yahoo and Yahoo Mail users: Yahoo Terms of Service (ECF No. 35-1, "TOS"), Yahoo Global Communications Additional Terms of Service for Yahoo Mail and Yahoo Messenger (ECF No. 35-4, "ATOS"), and Yahoo Privacy Policy (ECF No. 35-2). When creating a Yahoo Mail account, Yahoo directs users to view the ATOS and Privacy Policy via hyperlinks. Compl. ¶ 31. The sentence "I agree to the Yahoo Terms and Privacy" appears above the "Create Account" Button." Id.; see also Mot. at 7. The phrase "Yahoo Terms" links to the ATOS. Compl. ¶ 31. The word "Privacy" is an individual hyperlink to Yahoo's Privacy Policy. Id. The Complaint does not allege whether "Yahoo Terms" links to the TOS. However, Plaintiff's Opposition concedes that the TOS, ATOS, and Privacy Policy comprise the agreements between Yahoo and its users. ECF No. 39 ("Opp'n") at 11.
Section 1(c) of the ATOS references Yahoo's practice of scanning and analyzing users' email content. Additionally, the ATOS places responsibility on Yahoo Mail users to notify about these scanning policies non-users with whom they communicate. The ATOS in relevant part provides:
ATOS § 1(c) (emphasis in original). Plaintiffs allege that Yahoo added the line "By scanning and analyzing such communications content, Yahoo collects and stores the data" "at some time during" the proposed class period. Compl. ¶ 42. The phrase "collects and stores" is a hyperlink that leads the user to a page titled "Yahoo Mail FAQ." ECF No. 35-7. The FAQ page explains that Yahoo's scanning technology "looks for patterns, keywords, and files" in users' emails. Compl. ¶ 47. Yahoo further discloses that it "may anonymously share specific objects from a message with a 3rd party to provide a more relevant experience." ECF No. 35-7; Compl. ¶ 47.
Yahoo's TOS and Privacy Policy do not explicitly reference the content of email sent between users and non-users. Instead, the TOS provides:
TOS § 4. Yahoo's Privacy Policy also does not explicitly mention email content. The policy states: "Yahoo collects personal information when you register with Yahoo, when you use Yahoo products or services, when you visit Yahoo pages or the pages of certain Yahoo partners, and when you enter promotions or sweepstakes." ECF No. 35-2 at 1. Furthermore, the Privacy Policy suggests it covers only "how Yahoo treats personal information that Yahoo collects and receives, including information related to your past use of Yahoo products and services." Id. Yahoo goes on to define personal information as "personally identifiable" information such as "your name address, email address, or phone number, and that is not otherwise publicly available." Id. The Privacy Policy also discloses that Yahoo provides users' personal information to "trusted partners who work on behalf of or with Yahoo under confidentiality agreements." Id. at 2; Compl. ¶ 37.
Yahoo also has a number of other terms and privacy documents in its Terms Center and Privacy Center online. Compl. ¶¶ 43-46. Plaintiffs' Complaint references one privacy document that applies to Yahoo Mail. ECF No. 35-6. The document has a section titled "Personally Relevant
ECF No. 35-6.
Plaintiffs allege that Yahoo's operation of Yahoo Mail violates the Electronic Communications Privacy Act (ECPA), California's Invasion of Privacy Act (CIPA), and Article I Section I of the California Constitution. Compl. ¶¶ 5-6. Plaintiffs seek relief on behalf of a class of persons who are not Yahoo Mail users who have either sent emails to or received emails from a Yahoo Mail user. Id. ¶ 97. The proposed class period begins October 2, 2011 and extends to the present. Id. Plaintiffs seek certification of a class of non-Yahoo Mail users, injunctive relief, declaratory relief, statutory damages, and disgorgement of Yahoo's revenues from unjust enrichment related to Yahoo's interception, scanning, and storage of emails from and to non-Yahoo Mail users. Id. at p.18.
Beginning on October 2, 2013, Plaintiffs filed six separate class action complaints against Yahoo in the Northern District of California, alleging that Yahoo scans and analyzes emails in violation of privacy laws. On December 18, 2013, this Court related all six pending actions because they involve the same defendant, Yahoo, and "substantially the same basic allegations" that Yahoo's "interception, storage, reading and scanning of email violates Plaintiffs' and other consumers' rights of privacy." ECF No. 14 at 2. On January 8, 2014, two of the Plaintiffs filed stipulations to dismiss their actions, which the Court granted. See Kevranian v. Yahoo!, 13-cv-04547-LHK, ECF No. 36. On January 22, 2014, this Court consolidated the remaining four cases for pretrial purposes, ECF No. 27, and appointed interim class counsel, ECF No. 29. Plaintiffs filed a consolidated class action complaint on February 12, 2014. ECF No. 35.
On March 5, 2014, Yahoo filed a Motion to Dismiss Plaintiffs' claims. ECF No. 37. On March 26, 2014, Plaintiffs filed an Opposition to Yahoo's Motion to Dismiss. ECF No. 39. On April 7, 2014, Yahoo filed a Reply. ECF No. 41 ("Reply").
The Court generally may not look beyond the four corners of a complaint in ruling on a Rule 12(b)(6) motion, with the exception of documents incorporated into the complaint by reference, and any relevant matters subject to judicial notice. See Swartz v. KPMG LLP, 476 F.3d 756, 763 (9th Cir.2007); Lee v. City of L.A., 250 F.3d 668, 688-89 (9th Cir.2001). Under the doctrine of incorporation by reference, the Court may consider on a Rule 12(b)(6) motion not only documents attached to the complaint, but also documents whose contents are alleged in the complaint, provided the complaint "necessarily relies" on the documents or contents thereof, the document's authenticity is uncontested, and the document's relevance is uncontested. Coto Settlement v. Eisenberg, 593 F.3d 1031, 1038 (9th Cir.2010); see Lee, 250 F.3d at 688-89. The purpose
The Court also may take judicial notice of matters that are either (1) generally known within the trial court's territorial jurisdiction or (2) capable of accurate and ready determination by resort to sources whose accuracy cannot reasonably be questioned. Fed.R.Evid. 201(b). Proper subjects of judicial notice when ruling on a motion to dismiss include legislative history reports, see Anderson v. Holder, 673 F.3d 1089, 1094, n. 1 (9th Cir.2012); court documents already in the public record and documents filed in other courts, see Holder v. Holder, 305 F.3d 854 866 (9th Cir.2002); and publicly accessible websites, see Caldwell v. Caldwell, No. C 05-4166 PJH, 2006 WL 618511, at *4 (N.D.Cal. Mar. 13, 2006); Wible v. Aetna Life Ins. Co., 375 F.Supp.2d 956, 965 (C.D.Cal.2005).
Pursuant to Federal Rule of Civil Procedure 12(b)(6), a defendant may move to dismiss an action for failure to allege "enough facts to state a claim to relief that is plausible on its face." Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007). "A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged. The plausibility standard is not akin to a `probability requirement,' but it asks for more than a sheer possibility that a defendant has acted unlawfully." Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (internal citations omitted). For purposes of ruling on a Rule 12(b)(6) motion, the Court "accept[s] factual allegations in the complaint as true and construe[s] the pleadings in the light most favorable to the non-moving party." Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir.2008).
However, a court need not accept as true allegations contradicted by judicially noticeable facts, Shwarz v. United States, 234 F.3d 428, 435 (9th Cir.2000), and a "court may look beyond the plaintiff's complaint to matters of public record" without converting the Rule 12(b)(6) motion into a motion for summary judgment, Shaw v. Hahn, 56 F.3d 1128, 1129 n. 1 (9th Cir.1995). A court is also not required to "`assume the truth of legal conclusions merely because they are cast in the form of factual allegations.'" Fayer v. Vaughn, 649 F.3d 1061, 1064 (9th Cir.2011) (per curiam) (quoting W. Min. Council v. Watt, 643 F.2d 618, 624 (9th Cir.1981)). Mere "conclusory allegations of law and unwarranted inferences are insufficient to defeat a motion to dismiss." Adams v. Johnson, 355 F.3d 1179, 1183 (9th Cir.2004); accord Iqbal, 556 U.S. at 678, 129 S.Ct. 1937. Furthermore, "a plaintiff may plead herself out of court" if she "plead[s] facts which establish that [s]he cannot prevail on h[er] ... claim." Weisbuch v. Cnty. of L.A., 119 F.3d 778, 783 n. 1 (9th Cir.1997) (internal quotation marks and citation omitted).
If the Court determines that the complaint should be dismissed, it must then decide whether to grant leave to amend. Under Rule 15(a) of the Federal Rules of Civil Procedure, leave to amend "shall be freely given when justice so requires," bearing in mind "the underlying purpose of Rule 15 ... [is] to facilitate decision on the merits, rather than on the pleadings or technicalities." Lopez v.
In support of its Motion to Dismiss, Yahoo requests the Court take judicial notice of (A) a transcript of proceedings held on September 5, 2013 in In Re: Google Inc. Gmail Litigation, 13-md-02430 LHK (N.D.Cal); and (B) U.S. Senate Report No. 99-541 (1986) discussing Congress' intent in passing ECPA. ECF No. 38. Plaintiffs did not file any opposition to these requests, and even cite to Exhibit B in their Opposition. Opp'n at 14. The Court takes judicial notice of both Exhibit A and Exhibit B. Yahoo's Exhibit A is a public document that is part of this Court's own records. See Jared v. Keahey (In re Keahey), 414 Fed.Appx. 919, 923 (9th Cir.2011) (unpublished) ("A trial court may take judicial notice of its own records, even in unrelated cases[.]"). Exhibit B is a legislative history report, which is also a proper subject of judicial notice. See Anderson, 673 F.3d at 1094 n.1.
In support of their Opposition to Yahoo's Motion to Dismiss, Plaintiffs request judicial notice of (A) an amicus brief filed by Senator Patrick J. Leahy in United States v. Councilman, First Circuit Case No. 03-1383; (B) Senate Report 90-1097 discussing Congress' intent in passing the Omnibus Crime Control and Safe Streets Act of 1968; and (C) a California state superior court decision addressing violations of the California constitution, Ung v. Facebook, 1-12-cv-217244, Dkt. No. 54 (July 2, 2012). ECF No. 40. Yahoo did not file any opposition to Plaintiffs' request for judicial notice. The Court also takes judicial notice of Plaintiffs' Exhibits A, B, and C. All three are matters of public record and thus judicially noticeable. Exhibit A is an amicus brief that discusses the legislative history of the ECPA. Courts have taken judicial notice of amicus briefs that relate to the matters at issue. See Gustavson v. Wrigley Sales Co., 961 F.Supp.2d 1100, 1113 n. 1 (N.D. Cal.2013). Exhibit B is a Senate Report discussing legislative history, which is judicial noticeable. See Anderson, 673 F.3d at 1094 n. 1. Exhibit C is a relevant state court decision. Bias v. Moynihan, 508 F.3d 1212, 1225 (9th Cir.2007) ("[W]e `may take notice of proceedings in other courts, both within and without the federal judicial system, if those proceedings have a direct relation to the matters at issue.'" (internal citations omitted)).
While neither party requests judicial notice of the following items, the Court sua sponte takes judicial notice of Exhibits A-G attached to Plaintiffs' Complaint because they are aspects of a publicly accessible website, Plaintiffs' Complaint necessarily relies on the contents of these webpages, and Yahoo does not contest the authenticity of the documents. See Coto Settlement, 593 F.3d at 1038; Caldwell, 2006 WL 618511, at *4. These include: (1) Yahoo Terms of Service (ECF No. 35-1, "TOS"); (2) Yahoo Privacy Policy (ECF No. 35-2); (3) Yahoo Global Communications Additional Terms of Service for Yahoo Mail and Yahoo Messenger (ECF No. 35-4, "ATOS"); and (4) Yahoo Mail FAQ (ECF No. 35-7).
Plaintiffs allege that Yahoo's email scanning practices violate federal anti-wiretapping laws. Plaintiffs bring causes of action under two separate titles of ECPA: the Wiretap Act, Compl. ¶¶ 75-83, and the Stored Communications Act ("SCA"), id. ¶¶ 84-92. The Court provides background on both statutes before addressing Yahoo's arguments in its Motion to Dismiss.
Congress passed ECPA in 1986 to protect the privacy of electronic communications. See Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir.2002). Title I of the ECPA amended the federal Wiretap Act to impose liability for the interception of certain electronic communications while they are in transit. Specifically, a Wiretap Act violation exists when any person "intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication." 18 U.S.C. § 2511(1)(a); see also id. § 2520 (creating a private right of action for violations of id. § 2511). The Wiretap Act defines "intercept" as "the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic mechanical, or other device." 18 U.S.C. § 2510(4). Prior to the ECPA, the Wiretap Act only imposed liability for the interception of wire and oral communications such as telephone calls. However, the Wiretap Act now sweeps more broadly and applies with equal force to private email communications and websites. See Konop, 302 F.3d at 876 ("We therefore conclude that Konop's website fits the definition of `electronic communication.'").
The Wiretap Act includes various exemptions for such interceptions, two of which are relevant to the instant case. First, the Wiretap Act provides that "[i]t shall not be unlawful ... to intercept a wire, oral, or electronic communication ... where one of the parties to the communication has given prior consent to such interception." 18 U.S.C. § 2511(2)(d). Since the Wiretap Act concerns the unauthorized interception of electronic communication, the consent of one party is a complete defense to a Wiretap Act claim. Murray v. Fin. Visions, Inc., CV-07-2578-PHX-JM, 2008 WL 4850328, at *4 (D.Ariz. Nov. 7, 2008). Second, in the Wiretap Act's definition of "device," there is an explicit exclusion for "any telephone or telegraph instrument, equipment or facility, or any component thereof ... being used by a provider of wire or electronic communication service in the ordinary course of its business." 18 U.S.C. § 2510(5)(a)(ii). Without use of a "device" as defined by the Act, there is no illegal interception.
In contrast to the interception of electronic communications, the SCA prohibits certain unauthorized access to stored communications and records. Enacted as Title II of the ECPA, the SCA imposes civil and criminal liability for anyone who "(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system." 18 U.S.C. § 2701(a) (emphasis added). 18 U.S.C. § 2510(17)(A) states that "`electronic storage' means ... any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof." The SCA grants immunity to 18 U.S.C. § 2701(a) claims to electronic communication service providers ("ECS providers") for accessing
Yahoo first argues Plaintiffs' Wiretap Act claim must be dismissed because the SCA, not the Wiretap Act, applies to Yahoo's conduct. Mot. at 1. Yahoo first notes that the Ninth Circuit has held that for a communication to be "intercepted" in violation of the Wiretap Act, it must be accessed during transmission — i.e., while it is in transit — and not while it is in "electronic storage." Mot. at 4 (citing Konop, 302 F.3d at 878). Yahoo then argues that the emails Yahoo accessed and scanned in this case had already reached Yahoo's servers, and that because such emails "are necessarily in temporary storage en route to the recipient," they fall within the SCA's definition of "electronic storage." Mot. at 1, 4 (citing 18 U.S.C. § 2510(17)(A) which states "`electronic storage' means ... any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof."). Accordingly, Yahoo argues that its access to these emails is governed by the SCA because Yahoo has not made any "interception" under the Wiretap Act. In support of its argument that the term "intercept" under the Wiretap Act does not apply to the "en route storage of electronic communications," Yahoo sets forth its interpretation of a footnote in Konop, 302 F.3d at 880 n. 6. Mot. at 5. Plaintiffs respond by claiming that Konop's footnote is dicta, and that out of circuit authority makes clear that an interception can occur at any point "during the transmission of an email from the sender to the recipient." Opp'n at 8.
The Court does not address Yahoo's argument by analyzing whether Ninth Circuit law holds that the term "intercept" under the Wiretap Act applies to the "en route storage of electronic communications" because Yahoo's argument is premature. On a Rule 12(b)(6) motion to dismiss, the Court must "accept factual allegations in the complaint as true." Manzarek, 519 F.3d at 1031. Here, Plaintiffs allege Yahoo "intercepts emails sent to and from its Yahoo Mail users while the emails are in transit," Compl. ¶ 1 (emphasis added); see also id. ¶ 24 ("Yahoo intercepts and scans its users' incoming emails for content during transit and before placing the emails into storage.") (emphasis added); id. ¶ 80 ("Yahoo knowingly and purposefully intercepts emails in transit to and from Yahoo Mail accounts." (emphasis added)); id. ¶ 87 ("Plaintiffs allege that Yahoo intercepts communications while `in transit' and thus in violation of the Wiretap Act."). At this stage, the Court must accept as true Plaintiffs' allegations that the emails were in transit when Yahoo accessed them. Because Yahoo's argument rests on Yahoo's assumption that the emails were in electronic storage and no longer in transit when Yahoo accessed them, the Court cannot consider Yahoo's argument because that assumption contradicts Plaintiffs' allegations.
Plaintiffs allege Yahoo's operation of Yahoo Mail involves the knowing and purposeful interception of emails "in transit to and from Yahoo Mail accounts" without consent and "for [Yahoo's] own profit." Compl. ¶¶ 79-81. Yahoo moves to dismiss the Wiretap Act claim on the ground that Yahoo obtained express consent for its interception and email scanning from all Yahoo Mail users when they signed up for Yahoo Mail. Mot. at 7. Plaintiffs respond there is no consent by Yahoo Mail users because none of Yahoo's terms adequately discloses that Yahoo engages in this conduct. Opp'n at 11. The Court GRANTS Yahoo's Motion to Dismiss for the reasons stated below.
Consent to an interception under the Wiretap Act may be either explicit or implied, but it must be actual. See United States v. Poyck, 77 F.3d 285, 292 (9th Cir.1996); United States v. Amen, 831 F.2d 373, 378 (2d Cir.1987); United States v. Corona-Chavez, 328 F.3d 974, 978 (8th Cir.2003). The Wiretap Act only requires one party to the communication to consent to an interception to relieve the provider of liability. 18 U.S.C. § 2511(2)(d). Thus, Yahoo has not violated the Wiretap Act if Yahoo's agreements with Yahoo Mail users suffice to show consent. However, consent under § 2511(2)(d) is "not an all-or-nothing proposition." See In Re: Google Inc. Gmail Litigation, 13-md-02430-LHK, 2013 WL 5423918, at *12 (N.D.Cal. Sept. 26, 2013) (hereinafter "Gmail"); see also Watkins v. L.M. Berry & Co., 704 F.2d 577, 582 (11th Cir.1983) ("[C]onsent within the meaning of section 2511(2)(d) ... can be limited. It is the task of the trier of fact to determine the scope of the consent and to decide whether and to what extent the interception exceeded that consent."). In other words, "[a] party may consent to the interception of only part of a communication or to the interception of only a subset of its communications." In re Pharmatrak, Inc., 329 F.3d 9, 19 (1st Cir. 2003). Furthermore, as "the party seeking the benefit of the exception," the burden is on Yahoo to prove it obtained consent. Id. This Court applies a reasonable user standard to determine consent under the Wiretap Act. See Perkins v. LinkedIn Corp., 13-CV-04303-LHK, ___ F.Supp.3d ___, ___, 2014 WL 2751053, at *14 (N.D.Cal. June 12, 2014); Gmail, 2013 WL 5423918, at *14.
Yahoo argues that Yahoo Mail users explicitly consented
The question thus becomes whether the ATOS sufficiently establishes user consent by putting users on notice of Yahoo's alleged conduct, and if so, to what extent. Plaintiffs allege that Yahoo scanned and analyzed emails to "provide personally relevant product features and content," "to match and serve targeted advertising," for "spam and malware detection and abuse protection," to use the information from the emails to create user profiles, to share the information from the emails with third parties, and to "collect" and "store" the information for "future use." Compl. ¶¶ 1, 3-4, 26-27, 29, 41, 46-49, 50, 70-71. The Court thus evaluates whether the ATOS adequately notifies the reasonable Yahoo Mail user that their emails with non-Yahoo Mail users will be intercepted for these various purposes.
The Court concludes that the ATOS establishes explicit consent by Yahoo Mail users to Yahoo's conduct. Notably, Section 1(c) of the ATOS explicitly acknowledges that Yahoo scans and analyzes users' email for various purposes: "Yahoo's automated systems scan and analyze all incoming and outgoing communications content sent and received from your account (such as Mail and Messenger content including instant messages and SMS messages) including those stored in your account to, without limitation, provide personally relevant product features and content, to match and serve targeted advertising and for spam and malware detection and abuse protection .... Unless expressly stated otherwise, you will not be allowed to opt out of this feature. If you consent to this ATOS and communicate with non-Yahoo users using the Services, you are responsible for notifying those users about this feature." Compl. ¶ 41; ECF No. 35-4 (ATOS) (emphases added). In light of the clarity of the language in this disclosure, to which Yahoo Mail users agreed when creating an account, the Court finds that the ATOS provides explicit and sufficient notification to Yahoo Mail users that any communication sent via Yahoo Mail will be scanned and analyzed for the stated purposes of providing personal product features, providing targeted advertising, and detecting spam and abuse. By agreeing to the ATOS, Yahoo Mail users consented to such conduct. Plaintiffs provide no convincing argument to the contrary other than to say that "the ATOS does not explicitly inform Yahoo Mail users what Yahoo does with the contents of its users' email." Opp'n at 11. This argument fails in light of the specific statements in the ATOS that Yahoo scans the emails in order to "provide personally relevant product features and content, to match and serve targeted advertising and for spam and malware detection and abuse protection." ECF No. 35-4 at 1. Plaintiffs' other argument that the TOS and Privacy Policy "say nothing about the scanning and analysis of email," Opp'n at
The Court further finds that the ATOS also established Yahoo Mail users' consent to Yahoo's practice of scanning and analyzing emails for the purposes of creating user profiles for both parties to the email communication and sharing content from the emails with third parties. Compl. ¶ 27. Notably, Plaintiffs allege that Yahoo's creation of user profiles serves to "enhance Yahoo's ability to target advertising" and that Yahoo's sharing of information with third parties is for "advertising purposes." Id.
The only remaining question is whether there was consent to Yahoo's conduct of "collecting" and "storing" the content from emails for "future use." Plaintiffs claim Yahoo provided Yahoo Mail users no notice of this conduct. Opp'n at 12. Plaintiffs note that for part of the class period, the ATOS did not inform users that Yahoo collects and stores email content on its servers. Id.; Compl. ¶ 42. Plaintiffs concede that "at some time during the proposed class period," Yahoo revised ATOS § 1(c) by adding the line: "By scanning and analyzing such communications content, Yahoo collects and stores the data." Compl. ¶¶ 41-42; Opp'n at 12. Nonetheless, Plaintiffs argue that even after Yahoo added this statement, Yahoo did not provide sufficient notice of collection and storage because Yahoo failed to explain to users "what it does with the data" it stores or what Yahoo "plans to do with it in the future." Opp'n at 12. The Court disagrees
Plaintiffs concede that for at least the latter part of the class period, the ATOS explicitly notified users that Yahoo "collects and stores" their email communications. Compl. ¶¶ 41-42; Opp'n at 12. The Court concludes that this explicit language contained in the agreement between Yahoo and its users sufficed to put a reasonable user on notice of such collection and storage for the latter part of the class period. The Court further concludes that even for the portion of the class period during which the ATOS did not explicitly reference collection and storage, the reasonable user was nonetheless similarly on notice that Yahoo engages in collection and storage of email content. This is because the reasonable user would know that the ATOS's language that Yahoo "scan[s] and analyze[s]" email content necessarily means Yahoo simultaneously collects and stores the email content, i.e., the reasonable user would know that "scanning and analyzing" requires Yahoo to collect and store the email content. In other words, the Court finds it implausible that users did not — after agreeing, based on the ATOS, to Yahoo's scanning and analysis of emails — realize that in order to engage in analysis of emails, Yahoo would have to store the emails somewhere on its servers. Indeed, Plaintiffs do not provide any plausible reason why scanning and analyzing email content does not require the collection and storage of that content. If anything, Plaintiffs' allegation that Yahoo "scans [email] content, storing the data it collects" suggests that the very process of scanning simultaneously stores the content. Compl. ¶ 1. Furthermore, the ATOS stated, at all times during the class period, that Yahoo "store[s]" emails in users' accounts, which would have put the reasonable user on notice that Yahoo already stores at least some emails on its servers. ECF No. 35-4 (ATOS) ("Yahoo's automated systems scan and analyze all incoming and outgoing communications content sent and received from your account... including those stored in your account[.]") (emphasis added). Thus, the Court concludes that the reasonable user was on notice and thus consented to Yahoo's collection and storage of email content when the user agreed to the ATOS.
The only remaining issue is whether Yahoo informed users that Yahoo was going to use the information it was collecting and storing in the "future." Plaintiffs claim there was no notice of such future conduct because users had no notice of what specific use Yahoo would make of the email content in the future. Opp'n at 12. Plaintiffs' argument is unconvincing. Given the explicit statements in the ATOS that Yahoo scans and analyzes email content to provide personal product features, provide targeted advertising, and detect spam and abuse. It is logical that Yahoo's future uses would be the same. Further, Plaintiffs do not allege what they believe Yahoo was planning to do with the email content in the future separate and apart from the various uses of which this Court has already found users were on notice: to provide personal product features, provide targeted advertising, and detect spam and abuse. Accordingly, the Court finds that Yahoo Mail users consented to Yahoo's collection and storage of their emails for future use, and GRANTS Yahoo's Motion to Dismiss the Wiretap claim with respect to this conduct. However, the Court GRANTS leave to amend in order to allow Plaintiffs to allege any other "future use" they believe Yahoo would make of their email content, separate and apart from the uses of which this Court has found users
In the alternative to a Wiretap Act violation, Plaintiffs argue that Yahoo's scanning practices violate the Stored Communications Act. Compl. ¶ 6. Plaintiffs assert this claim in the alternative "in the event the Court concludes that Yahoo accesses plaintiffs' emails after they have been delivered to the recipients" and are thus in storage. Opp'n at 3; Compl. at ¶ 87 ("Plaintiffs assert this SCA claim in the alternative, in the event the Court finds that Yahoo intercepts the emails while they are in `storage' rather than `in transit'[.]"). Yahoo moves to dismiss Plaintiffs' SCA claim.
Yahoo contends that if the SCA applies to Plaintiffs' claims, Yahoo has statutory immunity to any alleged 18 U.S.C. § 2701(a) violation
However, Plaintiffs also assert Yahoo is liable under 18 U.S.C. § 2702(a)(1), which prohibits Yahoo from disclosing the content of users' emails to third parties. Compl. ¶ 90 (alleging Yahoo's "sharing of the content with third parties"); Opp'n at 14-15 (stating Yahoo is "prohibited from disclosing the contents of their customers' emails to any person or entity"). Plaintiffs claim Yahoo improperly disclosed to third parties the content from the scanned emails between Yahoo Mail users and non-users. Id. Section 2702(a)(1) holds ECS providers liable under the SCA if they "knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service." 18 U.S.C. § 2702(a)(1). Yahoo argues Plaintiffs' claim for a violation of § 2702(a)(1)
In order to state a claim for improper disclosure under the SCA, Plaintiffs must plausibly allege that Yahoo knowingly divulged "the contents of a communication." See In re Zynga Privacy Litigation, 750 F.3d 1098, 1109 (9th Cir. 2014). The Complaint makes several references to Yahoo's alleged disclosure of email content to third parties. Compl. ¶¶ 27, 37, 47, 49, 71, 90. Plaintiffs allege that after Yahoo scans and analyzes electronic communications between users and non-users of Yahoo Mail, Yahoo "provides some of the information it collects from its users' incoming and outgoing email to unidentified `trusted partners' and other third parties for advertising purposes." Compl. ¶¶ 26-27. Plaintiffs claim their allegations lack detail in terms of alleging what content was shared because discovery is at an early stage and Yahoo has not revealed with whom it shares email content. Opp'n at 15. Plaintiffs claim, however, that their allegations are sufficient because they are "based on Yahoo's own statements about its practices" contained in two documents: the Privacy Policy, ECF No. 35-2, and the Yahoo Mail FAQ, ECF No. 35-7. Opp'n at 15.
The Court notes, as a preliminary matter, that Plaintiffs are incorrect to argue that the Privacy Policy supports Plaintiffs' argument that their allegations sufficiently plead that Yahoo divulged "the contents of a communication." The Plaintiffs cite to one part of the Privacy Policy which states that Yahoo provides "its users' personal information `to trusted partners who work on behalf of or with Yahoo under confidentiality agreements.'" Compl. ¶ 37. The SCA distinguishes between "contents of a communication" and "record information." The SCA incorporates the definition of "contents" from the Wiretap Act. 18 U.S.C. § 2711(1). Under the Wiretap Act, "contents" includes "any information concerning the substance, purport, or meaning of that communication." Id. § 2510(8). The Ninth Circuit has interpreted the language and statutory framework of ECPA to find that "contents" means "a person's intended message to another." Zynga, 750 F.3d at 1106. In contrast to "contents," customer "record information" includes personally identifiable information such as the customer's name, address, and identity. Id. at 1104. The Ninth Circuit has clearly held that "contents" under the ECPA "does not include record information regarding the characteristics of the message that is generated in the course of the communication." Id. at 1106. As noted above, in order to state a claim for improper disclosure, Plaintiffs must plausibly allege that Yahoo knowingly divulged "the contents of a communication." Id. at 1109. Thus, Plaintiffs' allegations must show that Yahoo disclosed "contents," not "record information," to third parties. However, the Privacy Policy appears to refer only to "record information" rather than the "contents" of an electronic communication like emails, as Yahoo argues. Reply at 9. The Privacy Policy states that "[Yahoo] provide[s] the information to trusted partners who work on behalf of or with Yahoo under confidentiality agreements. These companies may use your personal information to help Yahoo communicate with you about offers from Yahoo
Nonetheless, the Court still finds that Plaintiffs' allegations suffice to plausibly allege a claim under Twombly. This is because the Complaint contains sufficient factual detail to plausibly allege that Yahoo shared with third parties "the contents of a communication." Zynga, 750 F.3d at 1109. As stated above, Plaintiffs allege at various points that Yahoo shared email content with third parties. See Compl. at ¶ 71 (alleging Yahoo "distributes the content of the emails to third parties"); id. at ¶ 90 (alleging Yahoo shares "the content [of emails] with third parties"). Plaintiffs further allege that one question in the FAQ reads: "Does Yahoo Mail automatically share my messages with anyone else?" to which Yahoo's response states, "Yahoo may anonymously share specific objects from a message with a 3rd party to provide a more relevant experience within your mail. For example, Yahoo may share a package tracking number with the shipping company so that you can easily see when your package will arrive, or may share your flight number with your airline to enable flight notifications within your inbox." Id. at ¶¶ 47, 49 (citing ECF No. 35-7 at 2 (emphasis added)). The language "specific objects from a message" falls within the SCA's definition of "contents of a communication" because the phrase "specific objects" clearly refers to the "contents" of a "message," the latter of which is an email communication. See Konop, 302 F.3d at 875 ("The legislative history of the ECPA suggests that Congress wanted to protect electronic communications that are configured to be private, such as email and private electronic bulletin boards."); see also O'Grady v. Superior Court, 139 Cal.App.4th 1423, 1443, 44 Cal.Rptr.3d 72 (2006) ("[The SCA] clearly prohibits any disclosure of stored email other than as authorized by enumerated exceptions." (emphasis added)). Thus, pursuant to Plaintiffs' allegations, Yahoo's own FAQ page admits that Yahoo shares email content with third parties. Under these circumstances, the Court concludes that Plaintiffs have plausibly alleged that Yahoo improperly disclosed "contents" of email communications to third parties.
While Yahoo argues Plaintiffs have failed to allege what specific information was shared and with what specific third parties, the FAQ, as alleged in the Complaint, does give at least one example of the kind of information in emails that was shared with third parties — i.e., a package tracking number. In any event, Yahoo cites no case holding that a plaintiff must allege the specific information in the content that was shared or the identity of the third party in order to state a claim for a violation of § 2702(a)(1). Ultimately, the Court finds that Plaintiffs' allegations as a whole sufficiently plead "factual content that allows the court to draw the reasonable inference that the defendant is liable
The Court notes that in its Reply, Yahoo argues in one sentence in a footnote that the language in the ATOS "suffices as consent for SCA purposes." Reply at 6 n.7. Because the Court has concluded, as Plaintiffs concede, that Yahoo has not violated § 2701(a), the only consent exception relevant under the SCA is the consent exception to a § 2702(a) violation, see § 2702(b)(3). However, Yahoo did not argue in its opening brief that there was consent for a § 2702(a) violation and only focused on how Yahoo had consent to a § 2701(a) violation pursuant to § 2701(c)(2). Mot. at 12 n.9. Thus, the Court does not consider Yahoo's consent argument in its Reply because arguments raised for the first time in Reply briefs are waived. Sealant Sys. Intl., Inc. v. TEK Global S.R.L., 5:11-CV-00774-PSG, 2014 WL 1008183, at *14 (N.D.Cal. March 7, 2014). Accordingly, the Court DENIES Yahoo's Motion to Dismiss Plaintiffs' SCA claim for improper disclosure under § 2702(a)(1).
Yahoo raises a good faith defense against Plaintiffs' Wiretap Act and SCA claims. Mot. at 13. The Wiretap Act provides:
18 U.S.C. § 2520(d); see also 18 U.S.C. § 2707(e) (providing a nearly identical good faith defense for SCA violations). Specifically, as a defense to Plaintiffs' § 2701(a) SCA claim, Yahoo claims it relied in good faith on §§ 2701(a), (c). As a defense to Plaintiffs' Wiretap claim, Yahoo claims it relied on (1) the decisions of the Ninth Circuit in Konop and Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir.2004), that hold, in Yahoo's view, that the SCA rather than the Wiretap Act applies to email scanning that occurs once emails have reached an ECS provider's servers; (2) 18 U.S.C. § 2511(c), the consent exception; and (3) 18 U.S.C. § 2511(2)(a)(i), the ordinary course of business exception. Mot. at 13.
The Court does not reach Yahoo's good faith reliance on §§ 2701(a) and (c) because the Court GRANTS, on other grounds as stated above, Yahoo's Motion to Dismiss any claim that Yahoo violated § 2701(a). See supra, Part IV.A.2. The Court also does not reach Yahoo's alleged good faith reliance on the Ninth Circuit decisions Konop and Theofel or on §§ 2511(c) and 2511(2)(a)(i) of the Wiretap Act because the Court GRANTS, on other grounds as set forth above, Yahoo's Motion to Dismiss the Wiretap claim, see supra, Part IV.A. 1.b. Thus, the Court need not reach Yahoo's Motion to Dismiss either the SCA claim or Wiretap claim based on the good faith defense.
Plaintiffs bring a cause of action under CIPA, Cal. Penal Code § 630, et seq.
Section 631 of CIPA makes it unlawful to use "any machine, instrument or contrivance" to intentionally intercept the content of a communication over any "telegraph or telephone wire, line, cable or instrument," or to read, attempt to read, or learn the "contents or meaning of any message, report, or communication while the same is in transit or passing over any wire, line or cable" without the consent of all parties to the communication. See Cal. Penal Code § 631(a). The California Supreme Court has held that § 631 protects against three distinct types of harms: "intentional wiretapping, willfully attempting to learn the contents or meaning of a communication in transit over a wire, and attempting to use or communicate information obtained as a result of engaging in either of the two previous activities." Tavernetti v. Superior Court, 22 Cal.3d 187, 192, 148 Cal.Rptr. 883, 583 P.2d 737 (1978).
Plaintiffs allege Yahoo has violated § 631 of CIPA. Compl. ¶¶ 53-65. Yahoo moves to dismiss first on the grounds that § 631 only applies to communications intercepted "in transit," and that here the communications at issue were not "in transit" but in "electronic storage" because the emails were already on Yahoo's servers when Yahoo accessed the emails. Mot. at 14-15. Second, Yahoo similarly argues that the all-party consent provision in § 631 should not apply to "recorded communications" already in the hands of and received by a provider because that would lead to illogical results, id. at 16, and thus that this Court must interpret CIPA to find that "when an email reaches the recipient's provider," the email "is no longer in transit" and CIPA does not apply. Reply at 13. Finally, Yahoo argues that the SCA and Wiretap Act would preempt § 631 if CIPA applied to emails "on an ECS providers' servers" — like the emails Yahoo contends are at issue here. Id. at 18-19.
Yahoo relies on Konop to support its contention that emails an ECS provider has received en route to a recipient are in electronic storage rather than "in transit," and thus that CIPA does not apply. Mot. at 14. Yet as discussed above, see supra Part IV.A. 1.a, the Court must accept as true Plaintiffs' allegation that "Yahoo intercepts and scans its users' incoming emails for content during transit and before placing the emails into storage." Compl. ¶ 24. The Court must defer resolution of whether Yahoo accessed the emails only after the emails were on Yahoo's servers until after discovery makes clear where and how Yahoo's scanning technology intercepted the emails. Thus, the Court rejects Yahoo's first argument that CIPA does not apply.
Yahoo's second argument that CIPA should not apply when an email has reached Yahoo's servers — based on allegedly illogical implications that would result from applying CIPA's all-party consent provision to such emails — similarly assumes the emails were on Yahoo's server when intercepted, which this Court cannot assume at this stage. Even if the Court could make such an assumption, the Court would still have to reject Yahoo's argument that the Court should find the emails at issue were not "in transit" when intercepted because that would contradict the
Finally, the Court rejects Yahoo's preemption argument for similar reasons. Yahoo contends that the SCA and Wiretap Act preempt Plaintiffs' CIPA claims, relying on all three theories of federal preemption. Mot. at 18; Chae v. SLM Corp., 593 F.3d 936, 941 (9th Cir.2010) (internal quotation marks and citations omitted) ("Federal preemption occurs when: (1) Congress enacts a statute that explicitly preempts state law; (2) state law actually conflicts with federal law; or (3) federal law occupies a legislative field to such an extent that it is reasonable to conclude that Congress left no room for state regulation in that field."). Specifically, Yahoo does not contend that ECPA wholly preempts CIPA, but argues that CIPA would conflict with ECPA only if CIPA applied to emails that have already reached a provider's servers, as Yahoo argues the emails in the instant case had. Mot. at 18; Reply at 13; Mot. at 19 (arguing that the ECPA "preempts parallel state legislation regulating the conduct of email providers when accessing emails on their servers."). However, again here, Yahoo's argument assumes the emails were on Yahoo's server when intercepted, which this Court cannot simply assume at this stage when allegations in the Complaint are to the contrary.
Accordingly, the Court DENIES Yahoo's Motion to Dismiss Plaintiffs' CIPA claim.
Plaintiffs allege that Yahoo's scanning, storage, and disclosure of Plaintiffs' email content violates their right to privacy under Article I, Section 1 of the California Constitution. Compl. ¶¶ 66-74. Yahoo contends Plaintiffs fail to allege sufficient facts to state a claim. Mot. at 21. The Court GRANTS Yahoo's motion with leave to amend.
The California Constitution creates a privacy right that protects individuals from the invasion of their privacy by private parties. Am. Acad. of Pediatrics v. Lungren, 16 Cal.4th 307, 326, 66 Cal.Rptr.2d 210, 940 P.2d 797 (1997); Leonel v. Am. Airlines, Inc., 400 F.3d 702, 711-12 (9th Cir.2005), opinion amended on denial of reh'g, 03-15890, 2005 WL 976985 (9th Cir.2005). To establish an invasion of privacy claim, a plaintiff must demonstrate three elements: "(1) a legally protected privacy interest; (2) a reasonable expectation of privacy in the circumstances; and (3) conduct by defendant constituting a serious invasion of privacy." Hill v. Nat'l Collegiate Athletic Ass'n, 7 Cal.4th 1, 39-40, 26 Cal.Rptr.2d 834, 865 P.2d 633 (1994). These elements are not a categorical test, but rather serve as threshold components of a valid claim to be used to "weed out claims that involve so insignificant or de minimis an intrusion on a constitutionally protected privacy interest as not even to require an explanation or justification by the defendant." Loder v. City of Glendale, 14 Cal.4th 846, 893, 59 Cal.Rptr.2d 696, 927 P.2d 1200 (1997).
"A `reasonable' expectation of privacy is an objective entitlement founded on broadly based and widely accepted community norms." Hill, 7 Cal.4th at 37, 26 Cal.Rptr.2d 834, 865 P.2d 633. The decision "must take into account any `accepted community norms,' advance notice to [Plaintiff] ..., and whether [Plaintiff] had the opportunity to consent to or reject the very thing that constitutes the invasion." TBG Ins. Servs. Corp. v. Superior Court, 96 Cal.App.4th 443, 117 Cal.Rptr.2d 155 (2002). The plaintiff in an invasion of privacy action must have conducted himself
In the event a plaintiff establishes the three elements, the "diverse and somewhat amorphous character of the privacy right" may still be balanced with competing or countervailing interests of the defendant. Id. at 37-38, 26 Cal.Rptr.2d 834, 865 P.2d 633 ("Conduct alleged to be an invasion of privacy is to be evaluated based on the extent to which it furthers legitimate and important competing interests."). "Invasion of a privacy interest is not a violation of the state constitutional right to privacy if the invasion is justified by a competing interest." Id. at 38, 26 Cal.Rptr.2d 834, 865 P.2d 633. Furthermore, if Plaintiffs' allegations "show no reasonable expectation of privacy or an insubstantial impact on privacy interests, the question of invasion may be adjudicated as a matter of law." Pioneer Electronics, Inc. v. Sup.Ct. of L.A., 40 Cal.4th 360, 370, 53 Cal.Rptr.3d 513, 150 P.3d 198 (2007) (citing Hill, 7 Cal.4th at 40, 26 Cal.Rptr.2d 834, 865 P.2d 633).
The California Constitution sets a "high bar" for establishing an invasion of privacy claim. See Belluomini v. Citigroup, Inc., No. CV 13-01743 CRB, 2013 WL 3855589, at *6 (N.D.Cal. July 24, 2013). Even disclosure of very personal information has not been deemed an "egregious breach of social norms" sufficient to establish a constitutional right to privacy. Id.; see also In re iPhone Application Litig., 844 F.Supp.2d at 1063 (holding that the disclosure to third parties of unique device identifier number, personal data, and geolocation information did not constitute an egregious breach of privacy sufficient to prove a serious invasion of a privacy interest); Ruiz v. Gap, Inc., 540 F.Supp.2d 1121, 1127-28 (N.D.Cal.2008), aff'd, 380 Fed.Appx. 689 (9th Cir.2010) (unpublished) (holding that the theft of a retail store's laptop containing personal information, including the social security numbers, of job applicants did not constitute an egregious breach of privacy and therefore was not sufficient to state a claim); Folgelstrom v. Lamps Plus, Inc., 195 Cal.App.4th 986, 992, 125 Cal.Rptr.3d 260 (2011) ("Here, the supposed invasion of privacy essentially consisted of [defendant] obtaining plaintiff's address without his knowledge or permission, and using it to mail him coupons and other advertisements. This conduct is not an egregious breach of social norms, but routine commercial behavior.").
Finally, "[w]hether a legally recognized privacy interest is present in a given case is a question of law to be decided by the court." Hill, 7 Cal.4th at 40, 26 Cal.Rptr.2d 834, 865 P.2d 633. "Whether plaintiff has a reasonable expectation of privacy in the circumstances and whether defendant's conduct constitutes a serious
Here, the question is whether Plaintiffs have alleged sufficient facts to demonstrate (1) a legally protected privacy interest; (2) a reasonable expectation of privacy under the circumstances; and (3) conduct by Yahoo that amounts to a serious invasion of that protected privacy interest. Plaintiffs allege that Yahoo scans and stores the content of emails between Yahoo Mail users and non-users, and distributes that content to third parties. Compl. ¶ 71. Plaintiffs allege they have a legally protected privacy interest "in the private email communications" they send to Yahoo Mail users. See id. ¶ 69; Opp'n at 24.
As a preliminary matter, under California law there are only two classes of legally protected privacy interests under the California Constitution: "interests in precluding the dissemination or misuse of sensitive and confidential information (`informational privacy'); and (2) interests in making intimate personal decisions or conducting personal activities without observation, intrusion, or interference (`autonomy privacy')." Hill, 7 Cal.4th at 35, 26 Cal.Rptr.2d 834, 865 P.2d 633. It is unclear from Plaintiffs' briefing and allegations whether Plaintiffs assert a claim for informational privacy or autonomy privacy. However, the Court construes Plaintiffs' claim as asserting only an informational privacy interest, as California courts have discussed autonomy privacy in the context of cases alleging bodily autonomy. See, e.g., Comm. To Defend Reprod. Rights v. Myers, 29 Cal.3d 252, 275, 172 Cal.Rptr. 866, 625 P.2d 779 (1981) (noting there is a constitutional right to privacy in a woman's "personal bodily autonomy"); Smith v. Fresno Irrigation Dist., 72 Cal.App.4th 147, 161, 84 Cal.Rptr.2d 775 (1999) (discussing autonomy privacy in the context of drug testing through use of a urine sample).
However, this Court concludes, as others have, that there can be a legally protected privacy interest or reasonable expectation of privacy in any confidential and sensitive content within emails. See,
Plaintiffs' arguments to the contrary are unavailing. First, they argue that they have stated a privacy claim by emphasizing that they do not consent to Yahoo's conduct. Opp'n at 23-24; Compl. ¶¶ 70-71. However, Plaintiffs cite no authority in support of their argument that an allegation of lack of consent suffices to state a privacy claim. Rather, the case law suggests that in determining whether a plaintiff has satisfied the elements of the claim, a plaintiff's lack of consent does not matter so much as the nature of the information in which he or she alleges a privacy interest. See, e.g., In re iPhone Application Litig., 844 F.Supp.2d at 1063 ("Even assuming this information was transmitted without Plaintiffs' knowledge and consent, a fact disputed by Defendants, such disclosure [of information including device identifier number, personal data, and geolocation information] does not constitute an egregious breach of social norms." (emphasis added)).
Plaintiffs also argue that they need not allege that each of their emails contained confidential information in order to state a claim because the right to privacy was adopted to protect the public from the "stockpiling of personal information." Opp'n at 24. Plaintiffs cite to the ballot argument for the initiative creating the constitutional right to privacy as evidence that the people intended to prevent "government and business interests from collecting and stockpiling unnecessary information about us and or misusing information gathered for one purpose in order to serve other purposes or to embarrass us." Id. at 23 (citing Hill, 7 Cal.4th at 27, 26 Cal.Rptr.2d 834, 865 P.2d 633). According to Plaintiffs, this history demonstrates that the right to privacy protects individuals from Yahoo's
In sum, because Plaintiffs do not plead sufficient facts to allege an invasion of privacy, Yahoo's Motion to Dismiss Plaintiffs' claims for a violation of Article I, Section 1 of the California Constitution is GRANTED. However, the Court grants leave to amend because Plaintiffs may be able to plead specific email content in specific emails that may suffice to state the elements of the claim.
For the foregoing reasons, the Court GRANTS Yahoo's Motion to Dismiss with prejudice Plaintiffs' Wiretap Act claim that Yahoo scans and analyzes emails for the purposes of providing personal product features, providing targeted advertising,
The Court GRANTS Yahoo's Motion to Dismiss with prejudice with respect to Plaintiffs' SCA claim for unauthorized access under § 2701(a). The Court DENIES Yahoo's Motion to Dismiss Plaintiffs' SCA claim for improper disclosure under § 2702(a)(1). The Court GRANTS Yahoo's Motion to Dismiss without prejudice Plaintiffs' claim under Article I, Section 1 of the California Constitution. The Court DENIES Yahoo's Motion to Dismiss Plaintiffs' CIPA § 631 claim.
Plaintiffs shall file any amended complaint within 21 days of this order. Plaintiffs may not add new causes of action or parties without a stipulation or order of the Court under Rule 15 of the Federal Rules of Civil Procedure. Failure to cure the deficiencies addressed in this Order will result in dismissal with prejudice.