SAUNDRA BROWN ARMSTRONG, United States District Judge.
Sunbelt Rentals, Inc. ("Plaintiff" or "Sunbelt") filed the instant action against its former employee, Santiago Victor ("Defendant" or "Victor"), alleging that he misappropriated trade secrets upon his termination. Victor has filed five counterclaims against Sunbelt, accusing it, inter alia, of violating the federal Wiretap Act and the Stored Communications Act ("SCA") by reviewing his text messages on the iPhone which Sunbelt had previously issued to him. The parties are presently before the Court on Plaintiff's Motion to Dismiss Defendants Counterclaims. Having read and considered the papers filed in connection with this matter and being fully informed, the Court hereby GRANTS the motion and dismisses Victor's counterclaims, with leave to amend. The Court, in its discretion, finds this matter suitable for resolution without oral argument. Fed.R.Civ.P. 78(b); N.D. Cal. Civ. L.R. 7-1(b).
During the relevant time period, Victor worked as an outside sales representative for Sunbelt, an equipment rental company. Countercl. ¶ 11, Dkt. 34. In August 2013, Victor gave his two-week notice to Sunbelt, stating that he had taken a job with one of its competitors—Ahern Rentals ("Ahern"). Id. ¶ 16. Upon learning of Victor's intent to leave the company, Sunbelt immediately dismissed him. Id.
During his time with Sunbelt, Victor was assigned a Sunbelt-owned iPhone ("Sunbelt iPhone") and a Sunbelt-owned iPad for both work and personal purposes. Id. ¶¶ 12-14. Thereafter, Victor "created and paid for a personal `Apple account' that was linked to both devices." Id. ¶ 15. Victor returned the devices to Sunbelt after his separation. Id. ¶¶ 16, 18, 20.
Victor's new employer, Ahern, provided him a new iPhone ("Ahern iPhone"). Id.
Several weeks later, when he received a new iPad from Ahern ("Ahern iPad"), Victor linked the new iPad to his personal Apple account. Id. ¶ 20. In the process of registering the Ahern iPad, Victor discovered the telephone number associated with the Sunbelt iPhone was still linked to his personal Apple account. Id. Because Victor had failed to unlink the Sunbelt iPhone from his account, his "private electronic data and electronic messages," including text messages sent to and from his Ahern iPhone, also were transmitted to the Sunbelt iPhone which he had returned to Sunbelt. Id. ¶ 20, 21. Victor then deleted the Sunbelt number from his account "to ensure that his new Ahern issued Apple products were not in any way linked to Sunbelt." Id.
Victor claims that after his departure, Sunbelt "began actively investigating Victor's post-employment acts, conduct, and communications." Id. ¶ 21. In the course of such investigation, Sunbelt allegedly "invaded Victor's privacy rights by
On September 12, 2013, Sunbelt filed a complaint against Victor in this Court alleging four state law causes of action: (1) breach of contract; (2) misappropriation of trade secrets; (3) unfair competition; and (4) breach of duty of loyalty. Dkt. 1. Victor then filed an Answer, and later amended an Answer and Counterclaim. The gist of the Counterclaim is that Sunbelt improperly read the text messages that were inadvertently transmitted to his Sunbelt iPhone. He alleges claims for violations of: (1) the Wiretap Act; (2) the SCA; (3) California Penal Code § 502 et seq.; (4) California Penal Code § 630 et seq.; and (5) his right to privacy. See Countercl. ¶ 24. Each of these claims is based on the same set of facts—Sunbelt's purported interception, acquisition and use of Victor's electronic communications (i.e., text messages) sent to and from his Ahern iPhone. Sunbelt now moves to dismiss all counterclaims. This matter has been fully briefed and is ripe for adjudication.
Pleadings in federal court actions are governed by Federal Rule of Civil Procedure 8(a)(2), which requires only "a short and plain statement of the claim showing that the pleader is entitled to relief." Rule 12(b)(6) "tests the legal sufficiency of a claim." Navarro v. Block, 250 F.3d 729, 732 (9th Cir.2001). A complaint may be
To survive a motion to dismiss, "a complaint must contain sufficient factual matter, accepted as true, to `state a claim to relief that is plausible on its face.'" Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007)). The complaint must afford the defendants with "fair notice" of the claims against them, and the grounds upon which the claims are based. Swierkiewicz v. Sorema N.A., 534 U.S. 506, 512, 122 S.Ct. 992, 152 L.Ed.2d 1 (2002). "Threadbare recitals of the elements of a cause of action, supported by mere conclusory statements, do not suffice." Iqbal, 556 U.S. at 678, 129 S.Ct. 1937. When a complaint or claim is dismissed, "[l]eave to amend should be granted unless the district court determines that the pleading could not possibly be cured by the allegation of other facts." Knappenberger v. City of Phoenix, 566 F.3d 936, 942 (9th Cir.2009).
The Wiretap Act imposes civil liability against any person who "
Here, Victor has failed to allege facts sufficient to establish that Sunbelt "intentionally intercepted" any of his text messages. By Victor's own account, the text messages appeared on his Sunbelt iPhone as a result of Victor's act of syncing his new iPhone to his Apple account without first un-linking his Sunbelt iPhone. Countercl. ¶¶ 19, 20. In other words, Sunbelt did not intentionally capture or redirect Victor's text messages to the Sunbelt iPhone—the transmission of those messages was entirely Victor's doing. Given these circumstances, the requisite intentional conduct is lacking. Sanders, 38 F.3d at 742-43; Shubert v. Metrophone, Inc., 898 F.2d 401, 405 (3rd Cir.1990) (noting that Congress specifically intended that "inadvertent interceptions are not crimes under [the Wiretap Act]").
Nor has Victor alleged facts sufficient to establish that Sunbelt acted to "intercept" the text messages or any other
Although it is clear that Victor's Wiretap Act claim must be dismissed, what is less clear is whether leave to amend should be granted. Given the almost instantaneous transmission of text messages, the window during which an interception may occur is exceedingly narrow. NovelPoster, 2014 WL 3845148, *10 (citing United States v. Steiger, 318 F.3d 1039, 1050 (11th Cir.2003)). Thus, "unless some type of automatic routing software is used" to divert the text message, interception of [a text message] within the prohibition of the Wiretap Act is virtually impossible." Id. (internal quotations and citation omitted). Given these constraints, it is doubtful that Victor will be able to allege facts, consistent with Federal Rule of Civil Procedure 11, to state a claim for violation of the Wiretap Act. Nonetheless, the Court will afford Victor an opportunity to amend this claim and therefore DISMISSES his claim under the Wiretap Act, with leave to amend.
The SCA creates "a cause of action against anyone who "intentionally accesses without authorization a facility through which an electronic communication service is provided ... and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage.'" Theofel v. Farey-Jones, 359 F.3d 1066, 1072 (9th Cir.2004) (quoting 18 U.S.C. §§ 2701(a)(1), 2707(a)). "[E]lectronic storage" is defined as either "temporary, intermediate storage ... incidental to ... electronic transmission," or "storage ... for purposes of backup protection." 28 U.S.C. § 2510(17).
According to Victor, Sunbelt violated the SCA by virtue of having,
Countercl. ¶ 45. No facts are presented, however, to support the conclusory assertion that Sunbelt
Section 502 of the California Penal Code prohibits unauthorized access to computers, computer systems, and computer networks, and provides for a civil remedy in the form of compensatory damages, injunctive relief, and other equitable relief. Cal.Penal Code § 502. Section 502 is an anti-hacking statute intended to prohibit the unauthorized use of any computer system for improper or illegitimate purpose. Yee v. Lin, No. C 12-02474 WHA, 2012 WL 4343778, *2 (N.D.Cal. Sept. 20, 2012).
Victor alleges that Sunbelt violated subsections (c)(1), (2), (3), (4), (6), and (7) of Section 502, which provides that a person is liable if he:
Id. § 502(c); Countercl. ¶ 54. For purposes of Section 502, parties act "without permission" when they "circumvent[ ] technical or code-based barriers in place to restrict or bar a user's access." Facebook, Inc. v. Power Ventures, Inc., 844 F.Supp.2d 1025, 1036 (N.D.Cal.2012).
Countercl. ¶ 56 (emphasis added). These fact-barren and vague allegations are precisely the type of "threadbare recitals" proscribed by Twombly and Iqbal. Moreover, to the extent that Victor is claiming that Sunbelt accessed his unspecified "private electronic data and electronic communications" through the Apple account or his cellular telephone provider's computer network, such a claim fails on the ground that no facts are alleged showing that Sunbelt did so by circumventing technical or code-based barriers intended to restrict such access. Facebook, 844 F.Supp.2d at 1036. To the contrary, Victor simply avers that Sunbelt reviewed his text messages that he caused, albeit inadvertently, to be sent to the Sunbelt iPhone. The Court therefore concludes that Victor has failed to state a claim under Section 502 and DISMISSES said claim with leave to amend.
The California Invasion of Privacy Act ("CIPA") is intended to prevent privacy invasions facilitated by modern technology and devices. Cal.Penal Code § 630. "The analysis for a violation of CIPA is the same as that under the federal Wiretap Act." NovelPoster, 2014 WL 3845148, *12 (granting judgment on pleadings on CIPA claim for same reasons underlying the dismissal of the plaintiff's Wiretap Act claim, i.e., the lack of intentional interception). As discussed, Victor has failed to plausibly allege a violation of the Wiretap Act; a fortiori, he is also unable to allege a violation of CIPA. This claim is DISMISSED with leave to amend.
California recognizes four categories of the tort of invasion of privacy: (1) intrusion upon seclusion; (2) public disclosure of private facts; (3) false light in the public eye; and (4) appropriation of name or likeness. Shulman v. Group W Prods., Inc., 18 Cal.4th 200, 214 n. 4, 74 Cal.Rptr.2d 843, 955 P.2d 469 (1998). Victor fails to indicate which type of invasion of privacy claim he is alleging. Nonetheless, based on the sparse allegations presented, it appears that he is attempting to state a claim for intrusion upon seclusion.
"A privacy violation based on the common law tort of intrusion has two elements. First, the defendant must intentionally intrude into a place, conversation, or matter as to which the plaintiff has a reasonable expectation of privacy. Second, the intrusion must occur in a manner highly offensive to a reasonable person." Hernandez v. Hillsides, Inc., 47 Cal.4th 272, 285, 97 Cal.Rptr.3d 274, 211 P.3d 1063
Victor contends that, as a matter of law, an employee has a reasonable expectation of privacy with respect to text messages contained on employer-owned mobile telephones. The decisional authorities cited by Victor, however, are inapposite. In City of Ontario v. Quon, 560 U.S. 746, 130 S.Ct. 2619, 177 L.Ed.2d 216 (2010), a police officer was issued a pager by his police department which was subject to a limit on the number of characters that could be sent and received each month. Id. at 750, 130 S.Ct. 2619. After becoming concerned that the officer was repeatedly exceeding his character limit, the police department obtained transcripts of the text messages from the wireless carrier to ascertain whether the texts were work-related or personal. Id. at 750-51, 130 S.Ct. 2619. After finding that most of the text messages were not work-related, the police department took disciplinary action against the officer. Id. at 753, 130 S.Ct. 2619. The police officer then brought an action under 42 U.S.C. § 1983 against the city, police department and police chief, alleging that the police department's review of his text messages violated the Fourth Amendment.
In the addressing the plaintiff's Fourth Amendment claim, the United States Supreme Court
Victor's citation to United States v. Finley, 477 F.3d 250 (5th Cir.2007) fares no better. In that case, a criminal defendant challenged the denial of his motion to suppress text messages and call records which law enforcement officials had obtained through a warrantless search of his employer-issued cell phone. In addressing the threshold issue of whether the defendant had standing to raise a Fourth Amendment challenge, the Fifth Circuit held that the mere fact that the employer owned the phone and had access to its contents did not ipso facto demonstrate that defendant correspondingly had no expectation of privacy in his call records and text messages. Id. at 259. In reaching its decision, the court specifically noted that the defendant had undertaken precautions
Victor's privacy claim also fails on the ground that he has failed to show an intrusion into a "place, conversation, or matter as to which the plaintiff has a reasonable expectation of privacy." Hernandez, 47 Cal.4th at 285, 97 Cal.Rptr.3d 274, 211 P.3d 1063. As noted, Victor cannot legitimately claim an expectation of privacy in a "place," i.e., the Sunbelt iPhone, which belongs to his former employer and to which he has no right to access. Nor can Victor claim a reasonable expectation of privacy with respect to his text messages, in general. The pleadings do not identify the contents of any particular text messages, and instead, refer generally to "private electronic data and electronic communications." Countercl. ¶ 79. This and other courts have concluded that there is no "legally protected privacy interest and reasonable expectation of privacy" in electronic messages, "in general." In re Yahoo Mail Litig., 7 F.Supp.3d 1016, 1040, 2014 WL 3962824, *16 (N.D.Cal. Aug. 12, 2014) (citing cases).
The above notwithstanding, the facts alleged in Victor's fifth counterclaim are insufficient to show that Sunbelt intruded into Victor's privacy in a manner highly offensive to a reasonable person. "Actionable invasions of privacy must be sufficiently serious in their nature, scope, and actual or potential impact to constitute an egregious breach of the social norms underlying
Here, Victor alleges only that Sunbelt acted in a "highly offensive" manner by "accessing, intercepting, monitoring, reviewing, storing and using [his] post-employment private electronic data and electronic communications without [his] knowledge, authorization or consent as part of an unreasonably intrusive and unauthorized investigation into Victor's post-employment conduct." Countercl. ¶ 79. Victor offers no factual support for these conclusory assertions. In particular, he provides no details regarding the specific conduct by Sunbelt that amounts to "accessing, intercepting, monitoring, reviewing, storing and using [his] post-employment private electronic data and electronic communications." Id. He also fails to aver any facts to establish that Sunbelt's use of the intercepted communications was highly offensive. See Folgelstrom, 195 Cal.App.4th at 993, 125 Cal.Rptr.3d 260. The possibility that Sunbelt may have reviewed text messages sent to a cell phone which it owned and controlled—without more—is insufficient to establish an offensive use. As with his other claims, Victor's formulaic recitation of an invasion of privacy claim is inconsistent with the federal pleading requirements of Rule 8. This claim is DISMISSED with leave to amend.
For the reasons stated above,
IT IS HEREBY ORDERED THAT:
1. Plaintiff's Motion to Dismiss Defendants Counterclaims is GRANTED.
2. Defendant shall have twenty-one (21) days from the date this Order is filed to amend his counterclaims, consistent with the Court's rulings. Defendant is warned that any factual allegations set forth in his amended pleading must be made in good faith and consistent with Rule 11. The failure to timely file the amended counterclaim and/or the failure to comply with this Order will result in the dismissal of all counterclaims with prejudice.
IT IS SO ORDERED.