LUCY H. KOH, United States District Judge
Plaintiffs Adam Backhaut, Bouakhay Joy Backhaut, and Kenneth Morris (collectively, "Plaintiffs") bring this Complaint, a putative class action on behalf of themselves and others similarly situated against Defendant Apple, Inc. ("Defendant") for violations of the Stored Communications Act, 18 U.S.C. § 2701; the Wiretap Act, 18 U.S.C. § 2510; California's Unfair Competition Law, Cal. Bus. & Prof.Code § 17200; and California's Consumers Legal Remedies Act, Cal. Civ.Code § 1750. Compl., ECF. No. 1. The gravamen of Plaintiffs' Complaint is that Apple wrongfully intercepts, stores, and otherwise prevents former Apple device users from receiving text messages sent to them from current Apple device users. Before the Court is Defendant's motion to dismiss Plaintiffs' Complaint. ("MTD"), ECF No. 12. Plaintiff opposed the motion. ("Opp."), ECF No. 16. Defendant replied. ("Reply"), ECF No. 17. Having considered the submissions of the parties, the relevant law, and the record in this case, the Court hereby grants in part and denies in part Defendant's motion to dismiss for the reasons stated below.
Defendant Apple, Inc., a California corporation headquartered in Cupertino, California is the "designer and seller" of the iPhone and other mobile devices that run "Apple's proprietary mobile operating system." Compl. ¶¶ 7, 35. Apple's mobile operating system is known as "iOS" and its first iteration was released on June 29, 2007. Id. ¶ 7. On October 12, 2011, Apple released iOS 5, which included a "proprietary messaging service known as `iMessage'" that runs on a client application called "Messages." Id. ¶¶ 8-9. The Backhaut Plaintiffs are residents of Michigan that purchased iPhones in December 2012. Id. ¶¶ 33, 39, 40. Plaintiff Morris is a resident of California and purchased his last iPhone in October 2012. Id. ¶¶ 34, 47. The Plaintiffs all used Apple's iMessage and Messages application on their iPhones. Two Plaintiffs, Adam Backhaut and Kenneth Morris, switched from Apple iPhones to non-Apple phones in December 2013 and December 2012 respectively. Id. ¶¶ 41, 47. Plaintiff Joy Backhaut continues to use iMessage and her iPhone.
Plaintiffs allege that Apple continues to knowingly "intercept and access text messages sent to former iPhone/iMessage Users and prevent their delivery," in violation of the Stored Communications Act. Id. ¶ 64. In addition to this alleged "intercept[ion] and access," Plaintiffs contend that Apple wrongfully "receives and stores these messages through the employment of a ... device under" the Wiretap Act. Id. ¶ 70. Plaintiffs further allege that these unlawful business practices support claims under California's Unfair Competition Law ("UCL"). Plaintiffs also allege "unfair" business practices and fraudulent
"Text messages" or "texts" are "brief, electronic messages between two or more mobile devices." Id. ¶ 3. There are "multiple technologies" for sending text messages, but the "traditional" or standard technology is the Short Message Service and Multimedia Messaging Service ("SMS/MMS") protocols. Id. ¶¶ 3, 5. As an alternative to this standard protocol, Apple's proprietary text messages are known as "iMessages" and are sent using the "Messages" client application. Id. ¶¶ 8-10. Instead of the SMS/MMS protocol for sending and receiving messages, iMessages use Wi-Fi and cellular data networks to send messages and other content between two Apple devices. Id. ¶¶ 9-10.
"Once an iPhone user activates iMessage," the interface for sending iMessages and SMS/MMS text messages on the Messages client application is the same. Id. ¶ 11. The Messages application "automatically checks if the contact to whom the text message is being sent is also registered as an iMessage user." Id. ¶ 13. If the contact is registered as an iMessage user, the text message is sent as an iMessage, "bypassing the SMS/MMS system of the sender's cellular carrier." Id. If the contact is not registered as an iMessage user, the text message is sent as an SMS/MMS. Id. The Messages application "does not allow the user to select whether a text message will be sent using iMessage or SMS/MMS." Id. ¶ 12. However, a sender can see whether a message was sent using iMessage or SMS/MMS based on the background color of the message: blue for iMessage and green for SMS/MMS. Id. ¶ 14. When an iMessage is "received, the world `delivered' will appear under the text message on the sender's phone." Id. ¶ 15.
In December 2012, the Backhauts purchased iPhone 5s in Michigan. Id. ¶ 39-40. "At the time of purchase," a Best Buy employee set up their iPhones, including iMessage. Id. In December 2013, Plaintiff Adam Backhaut purchased a "HTC One," a non-Apple mobile device that runs on an Android operating system. Id. ¶ 41. Following Adam Backhaut's switch, Plaintiff Joy Backhaut continued to send him text messages from her iPhone. Id. ¶ 43. On Joy Backhaut's phone, the word "delivered" appeared under her messages to her spouse, but Adam Backhaut never received those messages. Id. Upon realizing that he was not receiving certain text messages, Adam Backhaut "attempted to remove his phone number from the iMessage system but was unsuccessful." Id. ¶ 45. He continues to not receive messages from iPhone/iMessage users. Id. ¶ 45.
Plaintiff Morris was an iPhone user from November 2007 to December 2012. Id. ¶ 46. He purchased his last iPhone, an iPhone 5, in October 2012. Id. ¶ 47. In December 2012, Plaintiff Morris purchased a non-Apple phone. Id. Morris also "attempted to remove his phone number from the iMessage system" but was unable to do so. Id. ¶ 49. Morris also asked his contacts to manually change the settings in their iPhones to send him SMS/MMS messages rather than iMessages. Id. This resolved the problem until Apple released iOS 7.1.1, at which point even contacts who had manually changed their settings had
Plaintiffs filed this putative class action Complaint on May 16, 2014. ECF No. 1. Defendant filed its motion to dismiss on August 18, 2014. ECF No. 12. As part of its motion to dismiss, Defendant also filed a request for judicial notice, which Plaintiff did not oppose.
Pursuant to Federal Rule of Civil Procedure 12(b)(6), a defendant may move to dismiss an action for failure to allege "enough facts to state a claim to relief that is plausible on its face." Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007). "A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged. The plausibility standard is not akin to a `probability requirement,' but it asks for more than a sheer possibility that a defendant has acted unlawfully." Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (internal citations omitted). For purposes of ruling on a Rule 12(b)(6) motion, the Court "accept[s] factual allegations in the complaint as true and construe[s] the pleadings in the light most favorable to the non-moving party." Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir.2008).
Nonetheless, the Court need not accept as true allegations contradicted by judicially noticeable facts, and the "[C]ourt may look beyond the plaintiff's complaint to matters of public record" without converting the Rule 12(b)(6) motion into one for summary judgment. Shaw v. Hahn, 56 F.3d 1128, 1129 n. 1 (9th Cir.), cert. denied, 516 U.S. 964, 116 S.Ct. 418, 133 L.Ed.2d 336 (1995); see Van Buskirk v. Cable News Network, Inc., 284 F.3d 977, 980 (9th Cir.2002); Shwarz v. United States, 234 F.3d 428, 435 (9th Cir.2000). Nor is the Court required to "`assume the truth of legal conclusions merely because they are cast in the form of factual allegations.'" Fayer v. Vaughn, 649 F.3d 1061, 1064 (9th Cir.2011) (quoting W. Mining Council v. Watt, 643 F.2d 618, 624 (9th Cir.1981)). Mere "conclusory allegations of law and unwarranted inferences are insufficient to defeat a motion to dismiss." Adams v. Johnson, 355 F.3d 1179, 1183 (9th Cir. 2004) (internal quotation marks and citations omitted); accord Iqbal, 556 U.S. at 663-64, 129 S.Ct. 1937. Furthermore, "a plaintiff may plead herself out of court" if she "plead[s] facts which establish that [s]he cannot prevail on h[er] ... claim." Weisbuch v. Cnty. of L.A., 119 F.3d 778, 783 n. 1 (9th Cir.1997) (internal quotation marks and citation omitted).
Claims sounding in fraud or mistake are subject to the heightened pleading requirements of Federal Rule of Civil Procedure 9(b), which requires that a
If the Court determines that the complaint should be dismissed, it must then decide whether to grant leave to amend. Under Rule 15(a) of the Federal Rules of Civil Procedure, leave to amend "shall be freely given when justice so requires," bearing in mind "the underlying purpose of Rule 15 to facilitate decisions on the merits, rather than on the pleadings or technicalities." Lopez v. Smith, 203 F.3d 1122, 1127 (9th Cir.2000) (en banc) (internal quotation marks and alterations omitted). When dismissing a complaint for failure to state a claim, "`a district court should grant leave to amend even if no request to amend the pleading was made, unless it determines that the pleading could not possibly be cured by the allegation of other facts.'" Id. at 1130 (quoting Doe v. United States, 58 F.3d 494, 497 (9th Cir.1995) (internal quotation marks omitted)). Accordingly, leave to amend generally shall be denied only if allowing amendment would unduly prejudice the opposing party, cause undue delay, or be futile, or if the moving party has acted in bad faith. Leadsinger, Inc. v. BMG Music Publ'g, 512 F.3d 522, 532 (9th Cir.2008).
Plaintiffs allege violations of the Stored Communications Act ("SCA"), 18 U.S.C. § 2701; the Wiretap Act, 18 U.S.C. § 2511; California's Unfair Competition Law ("UCL"), Cal. Bus. & Prof.Code § 17200; and California's Consumers Legal Remedies Act ("CLRA"), Cal. Civ.Code § 1750. Defendant seeks to dismiss Plaintiffs' complaint on a number of grounds, including that Plaintiff cannot assert a claim under the SCA or the Wiretap Act; Apple's actions fall within the good faith exception to both federal Acts; Plaintiffs lack standing under the UCL and CLRA; Plaintiffs' UCL and CLRA allegations do not satisfy Rule 9(b)'s heightened pleading standard; and Plaintiffs have otherwise failed to adequately plead claims under the UCL and CLRA. The Court addresses these arguments below.
Plaintiffs allege that Apple "knowingly, intentionally, and willfully accessed electronic communications in the wireless accounts of Plaintiffs" in violation of the SCA. Defendant argues that Plaintiffs have failed to allege that Apple accessed a cognizable "facility," that Plaintiffs consented to any access, and that Apple's actions fall within the good faith statutory exception to liability. The Court begins by turning to whether Plaintiffs have adequately stated an SCA claim.
Turning to Plaintiffs' SCA claim, the Court finds that Plaintiffs have failed to adequately allege facts supporting a cause of action under the SCA. Plaintiffs do not allege that Apple accessed a "facility through which an electronic communication service is provided" while the communication was in "electronic storage." See 18 U.S.C. § 2701(a). The Complaint alleges that Apple "accesses and intercepts" text messages sent by current iPhone/iMessage users to former Apple device users, however, there are no allegations that Apple accesses the messages while they are in "electronic storage," or that Apple accesses a "facility through which an electronic communication service is provided." See Compl. ¶¶ 62-66. Plaintiffs do not allege that iMessages sent by current Apple device users are stored in temporary or backup storage. See § 2510(7). Moreover, Plaintiffs concede that under § 2701(a), their mobile devices cannot be "facilities" and that any "facilities" must be operated by a third-party. See Opp. 7-8; MTD at 6-7 (citing In re iPhone Application Litig., 844 F.Supp.2d 1040, 1057 (N.D.Cal.2012); Garcia v. City of Laredo, 702 F.3d 788, 792-93 (5th Cir.2012)). On its face, the Complaint does not allege that Apple accesses the facilities of a third party to obtain Plaintiffs' electronic communications, while the communications are in temporary or backup storage.
In opposition, Plaintiffs contend that because "the iMessage system necessarily relies on an underlying Wi-Fi and wireless data connection in order to send and receive messages," Apple wrongfully accesses those facilities without authorization. Opp. at 6-7. According to Plaintiffs, when a current iMessage/iPhone user sends an iMessage to a former Apple device user, Apple "intercept[s the iMessage] from the underlying Wi-Fi or wireless data connection...." Opp. at 7. Even assuming this theory is properly alleged in the Complaint, these allegations confuse the scope of the SCA with the scope of the Wiretap Act. In support of their SCA claim, Plaintiffs repeatedly argue that Apple has "intercepted" text messages, and Plaintiffs cite cases discussing the "capture or redirect[ion]" of electronic communications. See Opp. at 7 (citing United States v. Rodriguez, 968 F.2d 130, 136 (2d Cir.1992) (discussing interception under the Wiretap Act), and Konop, 302 F.3d at 878 (distinguishing interception of communications from access to stored communications)).
As Plaintiffs have not alleged the core elements of a SCA claim, the Court grants Defendant's motion to dismiss the SCA claim. The Court finds that amendment would not necessarily be futile, and therefore dismisses Plaintiffs' SCA claim with leave to amend. See Lopez, 203 F.3d at 1127. In light of this finding, the Court declines to reach Defendant's alternative arguments for dismissing Plaintiffs' SCA claim.
As discussed previously, Plaintiffs also allege that Defendant intentionally intercepted text messages sent by current iPhone/iMessage users in violation of the Wiretap Act. Defendant contends that Plaintiffs have failed to allege an actionable "interception"; Apple's actions fall within the "ordinary course of business exception"; Plaintiffs have failed to allege intent; Plaintiffs consented to Apple's interceptions; and Apple's actions fall within the good faith statutory exception to liability. The Court addresses each argument in turn.
Unlike the SCA, which protects stored communications, the Wiretap Act protects communications in transit. The Wiretap Act, which was enacted as Title III of ECPA, generally prohibits the "interception" of "wire, oral, or electronic communications." 18 U.S.C. § 2511(1). More specifically, the Wiretap Act provides a private right of action against any person who "intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication." 18 U.S.C. § 2511(1)(a); see id. § 2520 (providing a private right of action). The statute defines "intercept" as "the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device." Id. § 2510(4). "Such acquisition occurs `when the contents of a wire communication are captured or redirected in any way.'" Noel v. Hall, 568 F.3d 743, 749 (9th Cir.2009).
First, the Court turns to whether Plaintiffs have alleged an actionable "interception" under the Wiretap Act. Apple argues that because Plaintiffs have alleged that current iPhone/iMessage users are using the Messages application to send messages and Apple merely "relays electronic communications over its own systems," there is no "interception" under the Wiretap Act. However, Plaintiffs allege that Apple is wrongfully intercepting and misdirecting text messages from current to former Apple device users. Moreover, Plaintiffs allege that "[u]pon information and belief, Apple receives and stores these messages through the employment of a mechanical or electrical tool or apparatus that is considered a device under 18 U.S.C. § 2511." Compl. ¶ 70. The fact that Apple provides an electronic communications service does not preclude Plaintiffs' allegation that Apple also uses a "device" under § 2511 to intercept messages on its own systems. See, e.g., In re Google Inc. Gmail Litig., No. 13-MD-2430-LHK, 2013 WL 5423918, at *8 (N.D.Cal. Sept. 26, 2013) ("Plaintiffs allege that there are separate devices — aside from the devices related to delivery of email — that intercept users' emails."). Defendant's reliance on Ideal Aerosmith, Inc. v. Acutronic USA, Inc., No. 07-1029, 2007 WL 4394447, at *5
Second, Defendant further contends that any "device" Plaintiffs identify would fall within the "ordinary course of business" exception under the Wiretap Act. Section 2510(5)(a), the definition of "device," exempts "any telephone or telegraph instrument, equipment or facility, or any component thereof ... being used by a provider of wire or electronic communication service in the ordinary course of its business...." This exception is narrow in scope and requires that the electronic communication service provider demonstrate that "the interception facilitated the communication service or was incidental to the functioning of the provided communication service." In re Google Inc. Gmail Litig., 2013 WL 5423918, at *8. Defendant argues that insofar as the Messages application "intercepts" text messages sent by Apple device users to former Apple device users, it is "necessarily an integral part of the transmission of the message." MTD at 10. While that might be the case where iMessages are being successfully transmitted between two Apple device users, Plaintiffs have alleged that Apple is wrongfully intercepting messages sent to former Apple device users, such that "transmission of the message" never occurs.
In the instant case, Plaintiffs have sufficiently alleged that Apple's interception of messages to former Apple device users, e.g., the automatic categorization of messages as iMessages rather than SMS/MMS messages, neither facilitates nor is incidental to the transmission of an electronic communication. See Compl. ¶¶ 13, 19, 20. Plaintiffs allege that the Messages application "automatically checks" if the designated recipient is registered as an iMessage user and, if so registered, sends the message as an iMessage. Id. ¶ 13. The Messages application does not allow the sender to specify whether a message is sent as an iMessage or via SMS/MMS. Id. Plaintiffs further allege that "[w]hen a current iPhone/iMessage User sends a text message to the former iPhone/iMessage User, Apple intercepts that text message and diverts it from the standard SMS/MMS protocols to Apple's iMessage system," ensuring its nondelivery. Id. ¶ 5. Defendant's claim that its interception is "necessary" to facilitate transmission of messages rings hollow when the interception actually renders messages undeliverable. Plaintiffs' allegations are sufficient to demonstrate a plausible SCA claim.
Moreover, the fact that Apple "publicly advised users" to turn off iMessage before switching to a non-Apple device does not, as a matter of law, defeat Plaintiffs' allegations that Apple acted intentionally. MTD at 12. Plaintiffs contend that they attempted to remove their phone numbers from the iMessage registry but still continued to have their text messages intercepted and redirected. Id. ¶¶ 45, 49. That Apple "publicly advised users" to undertake an allegedly ineffective solution is insufficient to show that Apple could not have intentionally intercepted Plaintiffs' communications. At best, Apple is contesting the truth of Plaintiffs' allegations. However, Plaintiffs have alleged that Apple knowingly, intentionally, and deliberately intercepted text messages. See id. On a motion to dismiss, these allegations are sufficient.
Fourth, Defendant argues that Plaintiffs and the senders of the iMessages have consented to any "interception." Under the Wiretap Act, it is not unlawful "to intercept a wire, oral, or electronic communication... where one of the parties to the communication has given prior consent to such interception." 18 U.S.C. § 2511(2)(d). Consent to an interception can be explicit or implied, but any consent must be actual. See U.S. v. Van Poyck, 77 F.3d 285, 292 (9th Cir.1996); U.S. v. Amen, 831 F.2d 373, 378 (2d Cir.1987); U.S. v. Corona-Chavez, 328 F.3d 974, 978
Apple points to the terms of Apple's iOS software license agreement as evidence that current iPhone and iMessage users consent to Apple's interception of their text messages. Users must agree to these terms when they first download or use the iOS software that includes the iMessage and Messages application. See Declaration of Andre Boule in support of Defendant Apple Inc.'s motion to dismiss ("Boule Decl."), ECF No. 12, ¶ 3. The license agreement provides, in relevant part:
Boule Decl. Exh. A, ¶ 4(e) (emphasis added).
Apple relies solely on the bolded language in the iOS license agreement in arguing that current Apple device users have consented to its interception. However, the license agreement only informs users that Apple "may hold your iMessages in encrypted form for a limited period of time" "[t]o facilitate delivery of your iMessages...." Boule Decl. Exh A, ¶ 4(e). While users may consent to Apple's "interception" of iMessages for the purpose of "facilitating delivery," Plaintiffs argue that Apple exceeds the scope of that consent when it intercepts messages in such a way that ensures delivery is impossible. Plaintiffs allege that Apple intercepts text messages addressed to former Apple device users immediately after users send them. Compl. ¶ 69. Apple then "miscategorizes" these "received and stored" messages as iMessages rather than SMS/MMS messages, ensuring that the messages cannot be delivered to former Apple device users. Id. ¶¶ 13, 19, 20, 70; Opp. at 9-10.
Fifth, Defendant argues that the good faith defense exception under both the Wiretap Act and the SCA bars Plaintiffs' claims. As the exception is nearly identical under both the Wiretap Act and the SCA,
A good faith reliance on —
(1) a court warrant or order, a grand jury subpoena, a legislative authorization, or a statutory authorization;
(2) a request of an investigative or law enforcement officer under section 2518(7) of this title; or
(3) a good faith determination that section 2511(3) or 2511(2)(i) of this title permitted the conduct complained of;
is a complete defense against any civil or criminal action brought under this chapter or any other law.
18 U.S.C. § 2520(d) (emphasis added); see also 18 U.S.C. § 2707(e). Apple argues that because it relied on the exceptions to liability under the SCA and the Wiretap Act, e.g., consent and authorization, its actions fall under § 2520(d)(1) and § 2707(e)(1) as a good faith reliance on "a statutory authorization." However, Apple cites no authority for the proposition that the "statutory authorization" in § 2520(d)(1) and § 2707(e)(1) include authorizations in the Wiretap Act and the SCA. Apple cites Sams v. Yahoo! Inc., 713 F.3d 1175, 1180-81 (9th Cir.2013), but that case addressed a defendant's good faith reliance on subpoenas and did not address whether a defendant's reliance on other provisions of the SCA and the Wiretap Act could support the good faith reliance defense.
Moreover, the statute itself contravenes Apple's argument. Section 2520(d)(3) and § 2707(e)(3) specifically provide that a good faith reliance on "a good faith determination that" specified exemptions to liability of the Wiretap Act and the SCA "permitted the conduct complained of ... is a complete defense...." Congress specifically provided a good faith defense for a defendant's determination that its conduct
The Court therefore denies Defendant's motion to dismiss Plaintiffs' Wiretap Act claim. Plaintiffs have sufficiently alleged a viable cause of action under the Wiretap Act for Defendant's intentional interception of text messages from current to former Apple device users.
Plaintiffs allege violations of both California's Unfair Competition Law and Consumers Legal Remedies Act. For their CLRA claim, Plaintiffs allege that they relied on Apple's misrepresentations regarding iMessages in purchasing their Apple devices. As to the UCL, Plaintiffs allege violations under all three prongs: unlawful, unfair, and fraudulent business practices. Defendant raises the following arguments: Plaintiffs lack standing under the CLRA and UCL; Plaintiffs' fraud-based claims do not satisfy Rule 9(b)'s heightened pleading standard; Plaintiffs fail to plead an actionable omission; Plaintiffs fail to allege reliance; Plaintiffs do not state a claim under the "unlawful" or "unfair" prong of the UCL; and Plaintiffs' CLRA claim is deficient as a matter of law. The Court begins with the question of standing under the CLRA and UCL.
Defendant contends that Plaintiffs' allegations are insufficient to meet the particularized standing requirements of the CLRA and UCL. More specifically, Defendant argues that Plaintiffs have failed to plead actual reliance as required to establish standing for their CLRA claim and UCL claims based on fraudulent conduct or misrepresentations and omissions.
A plaintiff may bring a claim under the CLRA so long as she "suffer[ed] any damage as a result of" a proscribed practice under the CLRA. Cal. Civ.Code § 1780(a). This means that to adequately plead a CLRA claim, a plaintiff must allege that she relied on the defendant's alleged misrepresentation and that she suffered economic injury as a result. Durell v. Sharp Healthcare, 183 Cal.App.4th 1350, 108 Cal.Rptr.3d 682, 697 (2010). Similarly, under the UCL, a plaintiff must demonstrate that she "suffered injury in fact and ... lost money or property as a result of the unfair competition." Cal. Bus. & Prof.Code § 17204.
Moreover, in Kwikset Corp. v. Superior Court, the California Supreme Court suggested that the actual reliance requirement applies whenever the underlying misconduct in a UCL action is fraudulent conduct. See Kwikset, 120 Cal.Rptr.3d 741, 246 P.3d at 888. In line with this authority, this Court has concluded "that the actual reliance requirement also applies to claims under the UCL's unfair prong to the extent such claims are based on fraudulent conduct." See Kane v. Chobani, Inc., No. 12-2425, 2013 WL 5289253, at *6 (N.D.Cal. Sept. 19, 2013). Accordingly, the Court has consistently required allegations of actual reliance and injury at the pleading stage for claims under all three prongs of the UCL where such claims are premised on misrepresentations. See Kane v. Chobani, Inc., 973 F.Supp.2d 1120, 1128-29 (N.D.Cal.2014).
Here, other than the UCL claims based on alleged violations of the SCA and the Wiretap Act, Plaintiffs' CLRA claim and UCL claims are based on alleged misrepresentations, omissions, and fraudulent conduct by Apple. As discussed above, those claims are therefore subject to the actual reliance requirement. See, e.g., Kane, 973 F.Supp.2d at 1128-29. Plaintiffs allege two theories of injury: (1) that they paid for "Android phones that do not fully function as a result of Apple's continued unauthorized registration and use of their phone numbers" and (2) that Plaintiffs paid more "for iPhones than they would have if they had known they would not be able to stop using an iPhone in the future once their numbers were registered in iMessage." Compl. ¶¶ 85-86. As an initial matter, Defendant is correct that Plaintiffs fail to allege any facts supporting their first theory of injury. Other than the single assertion of injury in paragraph 85, the Complaint does not allege any facts supporting Plaintiffs' claim that Apple's actions affect the actual functionality of their Android devices. Moreover, Plaintiffs fail to allege that they purchased their Android phones in reliance on any misrepresentation or omission by Apple. As a result, Plaintiffs' first theory of injury is insufficient to satisfy standing under the CLRA and UCL.
Plaintiffs' second theory of injury also suffers from the same defect. Under both the CLRA and UCL, Plaintiffs must allege that they suffered an economic injury,
In opposition, Plaintiffs assert that the Complaint sufficiently alleges actual reliance on a material omission by Apple. Opp. at 22-24. More specifically, Plaintiffs contend that Apple had a duty to disclose that Apple device users would be unable to receive certain text messages if they switched to a non-Apple device, and that they would not have paid as much for their phones had Apple fully disclosed. To state a UCL claim based on an omission, the omission must either be "contrary to a representation actually made by the defendant, or an omission of a fact the defendant was obliged to disclose." Donohue v. Apple, Inc., 871 F.Supp.2d 913, 925 (N.D.Cal.2012) (quoting Baltazar v. Apple, Inc., No. 10-3231, 2011 WL 588209, at *4 (N.D.Cal. Feb. 10, 2011)). Plaintiffs contend that Apple was obligated to disclose this "defect" because Apple had "exclusive knowledge" of the issue and "actively concealed" the problem. See Collins v. eMachines, Inc., 202 Cal.App.4th 249, 134 Cal.Rptr.3d 588, 593 (2011). However, even assuming that the factors triggering a duty to disclose applied in Collins apply here, a proposition Defendant contests,
The Court therefore grants Defendant's motion to dismiss Plaintiffs' CLRA claim and the UCL claims based on Apple's alleged misrepresentations, omissions, and fraudulent conduct. This dismissal is without prejudice as the Court concludes that amendment would not necessarily be futile. See Lopez, 203 F.3d at 1130; Leadsinger, 512 F.3d at 532. The Court declines to reach Defendant's other arguments regarding Plaintiffs' CLRA claim and UCL claims based on misrepresentations, omissions, or fraudulent conduct.
Plaintiffs allege four additional UCL claims: two unlawful business practice claims and two unfair business practice claims, based on violations of the SCA, the Wiretap Act, and Defendant's alleged fraudulent conduct. Defendant disputes whether Plaintiffs have adequately alleged viable claims under either prong of the UCL.
California's UCL provides a cause of action for business practices that are (1) unlawful, (2) unfair, or (3) fraudulent. Cal. Bus. & Prof.Code § 17200. The UCL's coverage is "sweeping," and its standard for wrongful business conduct "intentionally broad." In re First Alliance Mortg. Co., 471 F.3d 977, 995 (9th Cir. 2006) (citing Cel-Tech Commc'ns., Inc. v. L.A. Cellular Tel. Co., 20 Cal.4th 163, 83 Cal.Rptr.2d 548, 973 P.2d 527 (1999)). The unlawful prong of the UCL "borrows violations of other laws and treats them as unlawful practices," which the UCL then "makes independently actionable." Cel-Tech Commc'ns, Inc., 20 Cal.4th at 180, 83 Cal.Rptr.2d 548, 973 P.2d 527 (internal quotation marks and citations omitted). To support their theories of liability under the UCL's unlawful prong, Plaintiffs rely on Defendant's alleged violations of the SCA and the Wiretap Act. Compl. ¶ 77. A business practice violates the unfair prong of the UCL if it is contrary to "established public policy or if it is immoral, unethical, oppressive or unscrupulous and causes injury to consumers which outweighs its benefits." McKell v. Wash. Mut., Inc., 142 Cal.App.4th 1457, 1473, 49 Cal.Rptr.3d 227 (2006). In determining whether a business practice is unfair under this approach, California courts balance the "impact on its alleged victim" against "the reasons, justifications, and motives of the alleged wrongdoer." Id.
Plaintiffs allege unlawful business practice UCL claims based on Defendant's alleged violations of the SCA and the Wiretap Act. Here, Plaintiffs state a cognizable UCL claim based on Defendant's alleged violation of the Wiretap Act. As Plaintiffs have sufficiently alleged a violation of the Wiretap Act, the UCL "unlawful" prong can serve to make that violation "independently actionable." See Cel-Tech, 20 Cal.4th at 180, 83 Cal.Rptr.2d 548, 973 P.2d 527. Defendant only argues that Plaintiffs' unlawful business practice claims fail because Plaintiffs have failed to allege viable predicate claims under the SCA and the Wiretap Act. MTD at 20. While the Court agrees that Plaintiffs have failed to allege a viable predicate claim under the SCA, Plaintiffs have alleged a viable predicate claim under the Wiretap Act.
The Court therefore grants without prejudice Defendant's motion to dismiss Plaintiffs' unlawful business practice claim predicated on violations of the SCA. The Court denies Defendant's motion to dismiss Plaintiffs' unlawful business practice claim predicated on violations of the Wiretap Act.
Plaintiffs offer two theories for their unfair business practice UCL claims: (1) the SCA and the Wiretap Act codify public policies safeguarding electronic privacy rights that Defendant has violated and (2) Defendant's fraudulent conduct injures consumers in such a way that the harm outweighs any benefit to consumers. Defendant
Under California law, there are at least two tests for determining "unfairness": the "tethering test" and the "balancing test." See Herskowitz v. Apple, Inc., 940 F.Supp.2d 1131, 1145 (N.D.Cal. 2013). The "tethering test" requires "that the public policy which is a predicate to a consumer unfair competition action under the `unfair' prong of the UCL must be tethered to specific constitutional, statutory, or regulatory provisions." Drum v. San Fernando Valley Bar Ass'n, 182 Cal.App.4th 247, 257, 106 Cal.Rptr.3d 46 (2010). Under the "balancing test," a business practice is unfair "if it is immoral, unethical, oppressive or unscrupulous and causes injury to consumers which out-weighs its benefits." McKell, 142 Cal. App.4th at 1473, 49 Cal.Rptr.3d 227.
Under the "tethering test," Plaintiffs allege that the SCA and the Wiretap Act establish a public policy of ensuring "the privacy of electronic communications." Opp. at 20. Defendant's sole argument is that Plaintiffs have not pled viable predicate violations of the SCA and the Wiretap Act. The Court finds that Plaintiffs have sufficiently alleged violations of the Wiretap Act and therefore an unfair business practice claim under the UCL. However, as discussed above, the Court dismisses Plaintiffs' unfair business practice UCL claim based on violations of the SCA.
Under the "balancing" test, Plaintiffs claim Apple "intended that California consumers would be misled and/or deceived into believing that messages sent from their non-Apple phones would not be interfered with ... and that their text message would be delivered ... when in reality [they] were not." Compl. 1180. Plaintiffs' allegations and arguments rely on Defendant's alleged "unified course of fraudulent conduct" as the basis of their claim, and as such, the pleading must satisfy the heighted standard of Rule 9(b). Kearns, 567 F.3d at 1125; Baba v. Hewlett-Packard, No. 09-05946, 2011 WL 317650, at *5 (N.D.Cal. Jan. 28, 2011). See Opp. at 20-21. Here, Plaintiffs do not "explicitly aver `the who, what, when, where, and how'" of Defendant's alleged fraudulent conduct. In re Actimmune Mktg. Litig., No. 08-02376, 2010 WL 3463491, at *9 (N.D.Cal. Sept. 1, 2010). Plaintiffs' single conclusory allegation that Apple intended to deceive consumers is insufficient to give Apple "notice of the particular misconduct which is alleged to constitute the fraud charged so that [Apple] can defend against the charge...." See Semegen, 780 F.2d at 731. Moreover, Plaintiffs have failed to allege actual reliance on any fraudulent conduct. See Kane, 2013 WL 5289253, at *6. As Plaintiffs have failed to plead the details of Apple's alleged fraudulent conduct with sufficient particularity and failed to plead actual reliance, the Court grants Defendant's motion to dismiss Plaintiffs' unfair business practice UCL claim based on fraudulent conduct.
In summary, the Court denies Defendant's motion to dismiss Plaintiffs' unlawful and unfair business practices UCL claims based on violations of the Wiretap Act. The Court grants without prejudice Defendant's motion to dismiss Plaintiffs' unlawful and unfair business practices UCL claims based on violations of the SCA and Defendant's alleged fraudulent conduct.
For the reasons discussed above, the Court rules as follows:
Plaintiffs shall file a Consolidated Amended Complaint within 21 days of this order. See Case Management Order, ECF No. 24. Failure to cure the deficiencies identified in this Order in the Consolidated Amended Complaint will result in a dismissal with prejudice of Plaintiffs' SCA claim, CLRA claim, and UCL claims based on fraudulent conduct, misrepresentations or omissions, and violations of the SCA. Plaintiffs may not add new causes of action or parties without leave of the Court or stipulation of the parties pursuant to Federal Rule of Civil Procedure 15.