JOHN J. THARP, JR., District Judge.
In this putative class action, the plaintiffs allege that defendant Kiip, Inc. violated federal and state law by exploiting a popular fitness app, Runkeeper, to collect data from users even when they were not using the app or their phones. Kiip says the allegations do not plausibly establish a violation of federal or state law and moves to dismiss the complaint under Rule 12(b)(6). The Court agrees that the allegations in the current complaint fail to state a claim under federal law but concludes that it states a plausible claim under state law. The motion is therefore granted in part and denied in part. The plaintiffs will be permitted to replead.
Runkeeper is a popular fitness application used to track how far and how fast users ran during a workout. Users grant Runkeeper permission to utilize their smartphones' geo-location capabilities, and in turn Runkeeper keeps track of the routes they run, their speed, their distance, and other information pertaining to their workouts. Runkeeper provides users with individually-tailored challenges and suggested workouts based on their recorded data. Users also input certain health and fitness information in the app.
Defendant Kiip, Inc. partnered with Fitnesskeeper, the creator of Runkeeper, to deliver advertisements in Runkeeper. Kiip's ads contained promotions for assorted products, and appeared when Runkeeper users completed challenges or beat their best run time. In essence, the advertisements were intended to make the user feel as though they were being rewarded. To implement this program, Kiip placed a "third-party tracker" in Runkeeper, allowing it to passively receive and actively extract data through the app. Compl. ¶ 21. Kiip collected information concerning Runkeeper users' preferences, behavior, and demographics, and then used that information to deliver specific ads to each user. Kiip's advertisements promoted large corporate brands, and it typically received a payment from those brands whenever a Runkeeper user purchased the advertised products.
Because the purpose of Kiip's third-party tracker was to display advertisements when Runkeeper users reached certain milestones, Kiip, like Runkeeper, had the ability to monitor in real-time certain events in the lives of Runkeeper users. Kiip, however, continued to collect information about Runkeeper users when they were not using the Runkeeper app, and even continued to mine data when Runkeeper users were not using their phones at all. The information Kiip gathered while Runkeeper users were not using their phones included their current geographic location, cell phone device identifiers, and "other personal information" that the complaint does not specifically identify. Id. ¶ 34. Kiip did not obtain consent from any Runkeeper user to collect information while the Runkeeper app or the smartphone were not in use.
In 2016, the Norwegian Consumer Council (a government agency) published a study that revealed that Kiip was collecting data from Runkeeper users even while they were not using their phones. Shortly thereafter, Fitnesskeeper ended its relationship with Kiip and issued a public apology. Two Runkeeper users, plaintiffs Jessica Vasil and Christine Farag, whose data Kiip collected via the Runkeeper app while they were not using the app, subsequently filed suit against Kiip alleging violations of the Wiretap Act, 18 U.S.C. § 2510, et seq., and the Illinois Eavesdropping Statute, 720 ILCS 5/14-1, et seq., as well as a claim for unjust enrichment. Plaintiffs seek to represent a nationwide class of individuals whose information was unlawfully mined by Kiip (as well as an Illinois-specific subclass). Kiip now moves to dismiss plaintiffs' complaint.
Kiip moves to dismiss plaintiffs' Wiretap Act claims, arguing that it did not receive the "content" of any communications while plaintiffs' phones were not in use, and that even if it did, it was a party to those communications and therefore is not liable under the Act. The Wiretap Act creates a cause of action against any entity who "intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral or electronic communication." 18 U.S.C. § 2511(1)(a). For practical purposes, the court will divide the allegedly intercepted communications into two categories: (1) current geo-locational data and device identifiers captured while plaintiffs were not using the Runkeeper app; and (2) geo-location and other personal data (including health and fitness information) plaintiffs provided to Runkeeper as part of their use of the app, which was later captured by Kiip during periods when the plaintiffs were not using the app. Plaintiffs have not stated a Wiretap Act claim for either category of data.
Plaintiffs contend that Kiip violated the Wiretap Act by collecting, without consent, their current GPS coordinates and cell phone device identifiers while they were not using the Runkeeper Act. Kiip responds by arguing that geo-locational data and device identifiers do not qualify as "contents" of a communication, and that even if they could, the specific locational and device identification data at issue here are not "content" because the plaintiffs never intended to communicate that information to anyone. Kiip has the better of the argument.
Under the Wiretap Act, an interception is defined as "the aural or other acquisition
Although the Seventh Circuit has not yet addressed whether locational information constitutes the "content" of a communication under the Wiretap Act, other circuits have. The touchstone of each decision has been that the "content" of a communication is the substance that the speaker intended to communicate, and does not include automatically generated "record" data—for example, information about a telephone call's origination, length, and time. The Ninth Circuit, analyzing the text and history of the Wiretap Act and subsequent amendments, concluded that "Congress intended the words `contents' to mean a person's intended message to another (i.e., the `essential part' of the communication, the `meaning conveyed,' and the `thing one intends to convey')." In re Zynga Privacy Litig., 750 F.3d 1098, 1105-06 (9th Cir. 2014). The Zynga court considered whether the transmission of a Facebook user's Facebook identification number and the web address that the user was on when she clicked a particular link constituted contents. The court determined that because the data were automatically generated by the user's web browser and were the functional equivalents of the user's name and address (and therefore analogous to return address information on a piece of mail, which is non-content "record" data), the data were not the contents of a communication.
The Third Circuit also adopted this framework in In re Google Inc. Cookie Placement Consumer Privacy Litig., 806 F.3d 125 (3d Cir. 2015), noting:
Id. at 136-37 (quoting Wayne R. LaFave, et al., 2 Crim. Proc. § 4.4(d) (3d ed.)). In Google, the court determined that certain routing information, like URL addresses, can be "content" even when the information performs a routing function if the data reveal the substance of a communication. Id. at 138. For example, search engine URLs that reveal a user's search terms constitute content because they reveal the intended substance of the communication between the user and the search engine—i.e., if a user searches for "The Few, The Proud" on Google, the resulting URL contains "the+few+the+proud," revealing the substance of the user's communication to Google.
In this case, the plaintiffs have not pled that they intended to communicate anything to anyone while they were not using their phones. In fact, the complaint repeatedly suggests the opposite, indicating that the plaintiffs never consented to the communication of their location data or device identifiers while they were not using their phones. See, e.g., Compl. ¶ 35 ("Defendant designed and programmed its technology to covertly monitor app users without their consent and without the consent of its app partners in an effort to gain further marketing information about such users."); ¶ 37 ("Defendant never obtained consent from any Runkeeper users before intercepting, monitoring, collecting, and transmitting their personal information"); ¶ 46 ("Defendant failed to obtain consent from the consumers whose information it collected. Because users were entirely unaware that their data were being extracted and transferred from their smartphone communications when the Runkeeper app was not in use—and even when their phone was not in use—there was a complete `lack of consent regarding the collection and sharing of location data[.]").
Further, while these complaint excerpts indicate that plaintiffs never intended to communicate their geo-locational information or device identifiers to Kiip while they were not using their phones, the complaint also fails to identify to whom the plaintiffs actually intended to communicate such information. It is possible that the plaintiffs intended to communicate their location to Runkeeper whenever their phones were on by selecting settings that allowed Runkeeper to use the phone's location services even when the phone was not in use. It is also possible that the plaintiffs intended to communicate such data to their cell phone service provider by selecting phone settings that would accomplish that goal. But the complaint contains no allegations concerning who was supposed to receive, or actually did receive, plaintiffs' geo-locational data and device identifiers while plaintiffs were
Plaintiffs cite Google and In re Yahoo Mail Litig., 7 F.Supp.3d 1016 (N.D. Ca. 2014), in support of their position that their geo-locational information and device identifiers constituted the "content" of communications. But these cases are easily distinguished. The Google court determined that certain routing information may be the "content" of a communication if it reveals the substance of an intended communication. Here, the plaintiffs have not identified an intended communication comprising their geo-locational data and device identifiers. And in Yahoo, the court determined that plaintiffs properly stated that Yahoo unlawfully shared the contents of a communication when it shared with third parties package tracking numbers contained in the body of users' emails. The tracking numbers in Yahoo formed the substance of intentional communications between the shipping entities and Yahoo email users. No such communications have been pled here.
Concluding that device identifiers and current geo-locational data gathered while plaintiffs were not using the Runkeeper app are not, as pled, the contents of a communication does not end the inquiry, as the parties also dispute whether the plaintiffs have pled that Kiip unlawfully captured personal data (such as health and fitness information) and geo-locational data (such as run routes) that users intentionally provided to Runkeeper. There is no dispute that such information constitutes the content of communications between plaintiffs and Runkeeper. The parties merely disagree as to whether plaintiffs pled that Kiip captured such data during periods when the plaintiffs were not using the Runkeeper app.
The court concludes that the plaintiffs have (if barely) plausibly alleged that Kiip captured, while plaintiffs' were not using the Runkeeper app, geo-locational data and personal information that they intentionally provided to Runkeeper. The complaint alleges that Kiip's "third-party tracker was intercepting their phones' electronic communications and collecting their personal information, including their geo-location and device identifiers, while they were not using the Runkeeper app, and even when they were not using their respective cellphones." Compl. ¶ 52. It further provides that "[p]laintiffs never provided consent to [Kiip] to monitor, intercept, collect, and transmit their personal information while they were not using the Runkeeper app, and especially when they were not using their respective cellphones." Id. ¶ 53. Although the complaint is not a model of clarity, it repeatedly notes that plaintiffs' health and fitness information was among the vulnerable data. See, e.g., id. ¶¶ 27, 76-78. Drawing all reasonable inferences in favor of the plaintiffs, the court concludes that plaintiffs have adequately pled that Kiip captured, while plaintiffs were not using their phones, some quantum of personal information that they had intentionally provided to Runkeeper.
Nonetheless, plaintiffs have not stated a Wiretap Act interception claim with respect to this information. Although the Seventh Circuit has twice demurred on the issue, numerous other circuits have held that under the Wiretap Act, "interceptions" of electronic communications must be contemporaneous with the communication. See Epstein v. Epstein, 843 F.3d 1147, 1149-50 (7th Cir. 2016) (collecting cases); United States v. Szymuszkiewicz, 622 F.3d 701, 705-06 (7th Cir. 2010) (same). These courts have explained that under an earlier version of the Wiretap Act, "`intercept' was defined as contemporaneous in the context of an aural communication." Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 113 (3d Cir. 2003) (citing Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457, 462 (5th Cir. 1994)). There is no indication that when Congress amended the Wiretap Act in 1986 to extend protection to electronic communications, it intended to change the definition of "intercept." Id. Indeed, while the amended Wiretap Act's definition of "wire communication" explicitly included (until further amendment in 2001) "any electronic storage of such communication," that caveat was never present in the Act's definition of "electronic communication," which "does not include . . . any wire or oral communication." Id. at 113-14 (citing 18 U.S.C. §§ 2510(1), 2510(12)); see also Steve Jackson Games, 36 F.3d at 461-62 (holding, for the same reasons, that an "interception" of electronic communications under the Wiretap Act must be contemporaneous with the communication); United States v. Steiger, 318 F.3d 1039, 1048-49 (11th Cir. 2003) (same); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878-79 (9th Cir. 2002) (same). The 2001 amendment to the Wiretap Act lends further support to the conclusion that an "interception" must be contemporaneous with the communication at issue, as "[b]y eliminating storage from the definition of wire communication, Congress essentially reinstated the [original] definition of `intercept'—acquisition contemporaneous with transmission[.]" Konop, 302 F.3d at 878. Consequently, the court concludes that under the Wiretap Act, "interception" of an electronic communication must be contemporaneous with the communication.
Here, to the extent that plaintiffs have adequately pled that Kiip captured, while plaintiffs were not using their phones, (1) health information and other personal information that they had intentionally provided to Runkeeper, and (2) geo-locational information they provided to Runkeeper while using the app, their interception claims are foreclosed by the Wiretap Act's contemporaneousness requirement. There are no allegations that Kiip unlawfully collected such data at the time it was communicated to Runkeeper; to the extent plaintiffs have pled that such data were unlawfully extracted, they have alleged only that the information taken without consent while it was stored in the Runkeeper app, after the communications were completed.
This is not necessarily to say that plaintiffs have no federal remedy for Kiip's extraction of data. Statutes like the Stored Communications Act, 18 U.S.C. § 2701(a), which creates a cause of action against an entity that "intentionally accesses without authorization a facility through which an electronic communication service is provided . . . and thereby obtains . . . access to a wire or electronic communication while it is in electronic storage," and the Computer Fraud and Abuse Act, 18 U.S.C. § 1030(a)(2), which prohibits "intentionally access[ing] a computer without authorization or exceed[ing] authorized access, and thereby obtain[ing] . . . information from any protected computer," might provide recourse.
Under the Illinois eavesdropping law, it is unlawful to "intercept[], record[], or transcribe[], in a surreptitious manner, any private electronic communication to which he or she is not a party unless he or she does so with the consent of all parties to the private electronic communication." 720 ILCS 5/14-2(a)(3). As an initial matter, with regard to present geo-locational data and device identifiers transmitted to Kiip while the plaintiffs were not using their phones, plaintiffs, as noted previously, have failed to adequately plead the existence of an electronic communication that was intercepted. Consequently, to the extent the plaintiffs rely on this data in pleading their Illinois eavesdropping claim, their claims fail.
Whether plaintiffs have pled an eavesdropping claim with regard to information that they intentionally provided to Runkeeper while they were using the app and which was subsequently collected by Kiip while plaintiffs were not using the app is a trickier question. The Illinois Eavesdropping Statute only prohibits interception, recording, or transcription of "private electronic communications to which [defendants are] not a party." 720 ILCS 5/14-2(a)(3). Although Illinois courts have not squarely addressed the definition of "party," the Illinois Supreme Court has suggested that a party is an entity "to whom [communications] are made or directed," People v. Herrington, 163 Ill.2d 507, 510-11, 645 N.E.2d 957, 958-59 (1994), which comports with the meaning of party under the Wiretap Act. See, e.g., Google, 806 F.3d at 143 (defining the parties to a communication as "the speaker and/or sender, and at least one intended recipient").
Kiip argues that the technical mechanism through which it acquired information constituted a direct communication between the plaintiffs and Kiip, rendering Kiip a party to the communication. Kiip bases this argument on diagrams included in the complaint and in the report of the Norwegian Consumer Counsel (which was attached to the complaint) that characterize the data flow as being a direct transmission to Kiip from the plaintiffs' phones rather than an intercepted transmission between the plaintiffs' phones and their cellular providers. But the fact that there is a direct transmission from the plaintiffs' phones to Kiip's servers does not make Kiip a "party" to a communication of the data included in that transmission. As Kiip itself acknowledges in arguing to dismiss the Wiretap Act count, there can be "communication" where there is no "content," and there is no "content" where the speaker did not intend to communicate any information. Mem. in Support, ECF 13-2, at 5. The plaintiffs never intended, the complaint alleges, to communicate information to Kiip (or anyone else) when not using the Runkeeper app, so Kiip could not have been a party to a communication of data from the phones that Kiip engineered without the plaintiffs' knowledge.
Indeed, if the court adopted such an interpretation, it would swallow the Illinois Eavesdropping Statute's protection of electronic communications. Although it addresses the federal Wiretap Act and not Illinois law, the facts underlying the Seventh Circuit's opinion in Szymuszkiewicz illustrate why this is the case. The Seventh Circuit observed that virtually all electronic communications between computers are now sent via "packet switching," during which the communications are disassembled into discrete packets containing bits of the communication, which are only reassembled just before the communication reaches its destination. Szymuszkiewicz, 622 F.3d at 705. The defendant in Szymuszkiewicz rigged his supervisor's email client to automatically forward to him all the messages that she received. This resulted in the emails being transmitted to the defendant in the exact same way that they were transmitted to his supervisor: the emails were disassembled into packets and routed to a server, which reassembled them and sent one copy to the defendant and one to his supervisor. Id. at 705. The defendant was as much a direct recipient as his supervisor—even though he had flagrantly intruded on her email account—because he received the data in the same way as, and contemporaneously with, the messages' intended recipient. Consequently, declaring direct recipients to be parties to a communication would render permissible the most common methods of intrusion, allowing the exception to swallow the rule. The court therefore rejects Kiip's argument that it was a party to plaintiffs' communications with Runkeeper because the information was sent directly to Kiip from plaintiffs' phones.
The Illinois Eavesdropping Statute also provides that "[e]lectronic communication does not include any communication from a tracking device." 720 ILCS 5/14-1(e). No court has decided whether a cell phone can be a tracking device under the statute. Predictably, then, Kiip argues that plaintiffs' phones are tracking devices because they tracked the plaintiffs, while the plaintiffs maintain that a multi-functional device does not automatically become a tracking device simply because it performs tracking functions. The plaintiffs argue that the court should read the Illinois Eavesdropping Statute in pari materia with federal surveillance laws, under which, they assert, cell phones are not tracking devices even when they perform tracking functions. Lower federal courts, however, are divided as to whether cell phones become tracking devices, for purposes of federal wiretapping laws, when they perform tracking functions. Compare In re Order Authorizing Prospective and Continuous Release of Cell Site Location Records, 31 F.Supp.3d 889, 897 (S.D. Tex. 2014) (concluding that a cell phone is a tracking device under federal wiretapping laws when it performs tracking functions), and In re Application of United States for an Order Relating to Target Phone 2, 733 F.Supp.2d 939, 943 (N.D. Ill. 2009) (same), with In re Smartphone Geolocation Data Application, 977 F.Supp.2d 129, 149-150 (E.D.N.Y. 2013) (holding that a cell phone is not a tracking device), and United States v. Ackies, No. 2:16-cr-20-GZS, 2017 WL 3184178, at *11 (D. Me. July 26, 2017) (same).
In addressing a question of state law, the task of a federal court "is to determine how the state's highest court would rule. [Federal courts] base our predictions on the decisions of the state's highest court, and we consider decisions of intermediate appellate courts unless there is good reason to doubt the state's highest court would agree with them." Anicich v. Home Depot U.S.A., Inc., 852 F.3d 643, 648-49 (7th Cir. 2017). But here there are no such decisions; no court has yet parsed the meaning of "tracking device" under the Illinois Eavesdropping Statute. Given the dearth of Illinois precedent, it is appropriate to look to the federal court decisions addressing this question. Illinois courts subscribe to the proposition that, "[a]lthough the decisions of foreign courts are not binding, the use of foreign decisions as persuasive authority is appropriate where Illinois authority on point is lacking or absent." In re Estate of Nina L. ex rel. Howerton, 2015 IL App (1st) 152223, ¶ 14, 41 N.E.3d 930, 933 (internal quotation marks and citations omitted).
Turning, then, to the cases addressing the meaning of "tracking device" under the analogous federal statute, 18 U.S.C. § 3117, the court is persuaded that a cell phone is a tracking device to the extent it performs tracking functions. As an initial matter, it is nonsensical to say that a device capable of tracking an individual is not a tracking device simply because it performs other functions. As the Supreme Court has recognized, "the term `cell phone' is itself misleading shorthand: many of these devices are in fact minicomputers that also have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers." Riley v. California, 134 S.Ct. 2473, 2489 (2014). If a statute used the words "cell phone," courts would deprive the statute of all meaning by concluding that it only applied to devices whose sole—or even primary—use was as a telephone. Consequently, that a cell phone has dozens of functions aside from tracking does not mean a cell phone is not a tracking device. Moreover, interpreting "tracking device" to include only items that have no function other than tracking would exclude many, if not most, devices used to track individuals, essentially mooting the Statute's tracking device carve out. See Cell Site Location Records, 31 F. Supp. 3d at 899. Indeed, "multiple standards for tracking technologies . . . would seem to accomplish very little . . . other than to generate confusion and opportunity for manipulation." Id.
The case on which plaintiffs rely, Smartphone Geolocation Data, is unpersuasive. In that case, the court was concerned that "construing `tracking device' to encompass a cell phone" was "illogical and unworkable" because "an individual travelling by bicycle, leaving tire tracks in a muddy field; an automobile taillight, which could permit officers to follow a car at night; or the transmitter of a pirate radio station, the signal from which may be located via triangulation, would each constitute" a tracking device. 977 F. Supp. 2d at 150. But this concern (and its application to this case) ignores the context of the term "tracking device"—a constituent element of wiretapping statutes—in federal and Illinois law. And that context divines the simple limiting principle that a "tracking device" permits an individual to be tracked remotely, and not exclusively "through direct observation." Cell Site Location Records, 31 F. Supp. 3d at 899 n. 49. A cell phone and a pirate radio, then, can be tracking devices, because they permit the user to be tracked from afar. In other words, deeming a cell phone to be a tracking device does not require acquiescence in the absurdity that a bicycle, too, is a tracking device under state or federal wiretapping laws.
Nonetheless, it is equally specious to say that because a cell phone has tracking capabilities, Illinois law permits unlimited interception of any content that emanates therefrom. Admittedly, a literal reading of the Illinois Eavesdropping Statute might give the impression that anything sent from a tracking device is excluded from the definition of an "electronic communication": "Electronic communication does not include any communication from a tracking device." 720 ILCS 5/14-1(e). But "where a plain or literal reading of a statute produces absurd results, the literal reading should yield." People v. Hanna, 207 Ill.2d 486, 498, 800 N.E.2d 1201, 1207 (Ill. 2003). As the Supreme Court recognized in Riley, "[p]rior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day. Now it is the person who is not carrying a cell phone, with all that it contains, who is the exception." 134 S. Ct. at 2490. To conclude that the Illinois Eavesdropping Act excludes protection for all communications from cell phones—which often concern the most intimate and private details in users' lives—would give far too great an effect to the tracking device exclusion.
Consequently, the court concludes that under the Illinois Eavesdropping Statute, a cell phone is a tracking device to the extent it performs tracking functions. Operationalizing that framework in this case, plaintiffs' claim under the eavesdropping statute fails to the extent it concerns the collection of any geo-locational data. But to the extent it concerns information that the plaintiffs intentionally provided to Runkeeper other than geo-locational data, plaintiffs may proceed.
Finally, Kiip argues that the plaintiffs' unjust enrichment claims should be dismissed because Illinois does not recognize a standalone unjust enrichment claim, untethered from any other violation of the law. The plaintiffs respond that Illinois law permits such claims. The Seventh Circuit explained, albeit in dicta, its view of Illinois' jumbled unjust enrichment jurisprudence in Cleary v. Philip Morris Inc., 656 F.3d 511, 517 (7th Cir. 2011). Surveying Illinois unjust enrichment cases, the Seventh Circuit explained that although unjust enrichment may in some circumstances be a freestanding claim, "if an unjust enrichment claim rests on the same improper conduct alleged in another claim, then the unjust enrichment claim will be tied to this related claim—and, of course, unjust enrichment will stand or fall with the related claim." Id. Here, the same conduct that underlies plaintiffs' unjust enrichment claims also underlies their Wiretap Act and Illinois Eavesdropping Statute claims. Plaintiffs' unjust enrichment claim, therefore, may proceed only to the extent their Illinois Eavesdropping Statute claim proceeds.
For the foregoing reasons, Kiip's motion to dismiss is granted as to plaintiffs' Wiretap Act claims, and granted in part and denied in part as to plaintiffs' state law claims. The dismissals are without prejudice.