throbber
Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 1 of 16
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`DANIEL FRASER,
`
`
`
`Plaintiff,
`
`v.
`
`MINT MOBILE, LLC,
`
`No. C 22-00138 WHA
`
`
`
`ORDER RE MOTION TO DISMISS
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`INTRODUCTION
`
`Hackers took cell phone users’ information from their carrier and this information was
`
`used to port plaintiff’s cellular service to another carrier whereupon a criminal pretending to be
`
`plaintiff acquired access to and then drained plaintiff’s cryptocurrency account maintained by a
`
`cryptocurrency exchange. The issue is the extent to which the carrier is liable for the lost funds
`
`once held by the cryptocurrency exchange. For the following reasons, the motion to dismiss is
`
`GRANTED IN PART and DENIED IN PART.
`
`STATEMENT
`
`Defendant Mint Mobile, LLC is a mobile virtual network operator that currently uses T-
`
`Mobile’s network infrastructure to provide wireless cellular services to its customers. One of
`
`those customers was plaintiff Daniel Fraser. This action involves three incidents that
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 2 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`eventually led to the theft of Fraser’s cryptocurrency, held by a non-party cryptocurrency
`
`exchange.
`
`First, between June 8, 2021, and June 10, 2021, Mint (the mobile carrier) suffered a
`
`large-scale data breach. The leak exposed the personal identifying information (PII) of many
`
`of its cellphone customers, including their names, addresses, email addresses, phone numbers,
`
`account numbers, and passwords. Fraser was one of the customers affected by the breach
`
`(Compl. ¶¶ 3, 12).
`
`Second, criminals purportedly used the information exposed in the data breach to hijack
`
`Fraser’s cellphone service. SIM hijacking represents a growing crime in telecommunications.
`
`A subscriber identity module, or “SIM” card, authenticates a cellphone subscription. Switch
`
`the SIM card from an old phone into a new phone and the cellular service shifts to the new
`
`device.
`
`Relevant here, SIM porting, or port-out fraud, is a genus of SIM hijacking where a
`
`criminal, posing as the victim, opens an account with a carrier different from that of the hacked
`
`carrier and arranges for the victim’s cellular service to be transferred to the new carrier and put
`
`under control of the criminal. On June 11, 2021, an unknown criminal ported Fraser’s cellular
`
`service with Mint to another service provider, Metro by T-Mobile. Fraser alleges that the
`
`earlier Mint data breach exposed all the information needed to port out his service.
`
`Additionally, Fraser alleges that, three days before his service was fraudulently ported to the
`
`other provider, he had implemented a PIN verification feature on his Mint account to enhance
`
`his electronic security with two-factor authentication, i.e., making changes to his account
`
`required both a password and a pin verification code. Fraser alleges that Mint bypassed this
`
`enhanced security when it allowed the porting out of his account. All of this occurred before
`
`Mint notified affected customers of the breach on July 9, 2021 (Compl. ¶¶ 2–6, 37–43, 59–66).
`
`Third, Fraser’s cryptocurrency account (with a completely separate firm) was then
`
`hacked and his assets stolen. Besides the loss of one’s cell service, port-out fraud places the
`
`victim’s other personal accounts at risk as well. Personal accounts — e.g., for email, banking,
`
`or cryptocurrency — will often use the account holder’s telephone number as a means for the
`
`2
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 3 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`account holder to recover access to their account when, for example, they forget their
`
`password. In many instances, all the account holder needs to do to regain access to their
`
`account is verify their identity by entering a pin number automatically sent to their phone via
`
`their cellular service (like the pin verification Fraser put on his Mint account). This means
`
`once a criminal successfully ports a victim’s cellphone service, the criminal acquires a key to
`
`steal the victim’s identity and access a variety of the victim’s accounts (so long as the criminal
`
`has other, basic information regarding the victim’s accounts, such as the email address used to
`
`maintain the account) (Compl. ¶¶ 1, 49, 59 62–67).
`
`Fraser had an account with Ledger, a specific cryptocurrency exchange, where he stored
`
`his cryptocurrency. He alleges that the combination of Mint’s data breach (which occurred
`
`from June 8 through June 10) and the fraudulent SIM port (which occurred on June 11 at 8:08
`
`a.m.) provided criminals with all the information and access required to hack into and drain his
`
`Ledger account (Compl. ¶ 63). As a result, starting on June 11 at 9:19 a.m., a criminal began
`
`to drain Fraser’s Ledger account, and eventually stole the equivalent of $466,000.00 in
`
`cryptocurrency (Compl. ¶¶ 59–67).
`
`Fraser filed this lawsuit to hold Mint responsible for its purported role in the theft of his
`
`cryptocurrency. Fraser broadly asserts claims for violation of the Federal Communications
`
`Act, violations of California Business & Professions Code Section 17200, negligence, and
`
`breach of contract. He does not assert his claims on behalf of a putative class. Now, Mint
`
`moves to dismiss the complaint for failure to state a claim. At the hearing, Mint withdrew its
`
`motion to dismiss the prayer for injunctive relief pursuant to the Federal Communications Act
`
`as well as its motion to compel arbitration. This order follows full briefing and oral argument.
`
`ANALYSIS
`
`A motion to dismiss tests the legal sufficiency of the complaint. To survive a motion to
`
`dismiss under Rule 12(b)(6), a complaint must contain sufficient factual matter, accepted as
`
`true, to state a claim for relief that is plausible on its face. A claim is facially plausible when
`
`there are sufficient factual allegations to draw a reasonable inference that the defendant is
`
`liable for the misconduct alleged. Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009). While a court
`
`3
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 4 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`must take all of the factual allegations in the complaint as true, it is “not bound to accept as
`
`true a legal conclusion couched as a factual allegation.” Bell Atl. Corp. v. Twombly, 550 U.S.
`
`544, 555 (2007). “Factual allegations must be enough to raise a right to relief above the
`
`speculative level.” Ibid.
`
`1.
`
`PROXIMATE CAUSE (ALL COUNTS).
`
`Mint argues that the complaint fails to adequately allege the data breach and SIM port
`
`proximately caused the theft of Fraser’s cryptocurrency from a third-party, and that the
`
`complaint should be dismissed in its entirety (Br. 6). This order disagrees.
`
`“It is a well established principle of the common law that in all cases of loss, we are to
`
`attribute it to the proximate cause, and not to any remote cause.” Bank of Am. Corp. v. City of
`
`Miami, 137 S. Ct. 1296, 1305 (2017) (cleaned up). Generally, the proximate cause
`
`requirement “bars suits for alleged harm that is ‘too remote’ from the defendant’s unlawful
`
`conduct.” Lexmark Int’l, Inc. v. Static Control Components, Inc., 572 U.S. 118, 133 (2014).
`
`Under California law, proximate cause has two aspects. The first is cause in fact, sometimes
`
`referred to as but-for causation. Under the substantial factor test, which generally subsumes
`
`but-for causation, a cause in fact is an act or omission that was a substantial factor in bringing
`
`about the plaintiff’s harm. The second aspect of proximate cause incorporates considerations
`
`of public policy. “These additional limitations are related not only to the degree of connection
`
`between the conduct and the injury, but also with public policy.” State Dep’t of State Hosps. v.
`
`Super. Ct., 61 Cal. 4th 339, 352–53 (2015) (quotation omitted); Frausto v. Dep’t of Cal.
`
`Highway Patrol, 53 Cal. App. 5th 973, 996 (2020). “Ordinarily, proximate cause is a question
`
`of fact which cannot be decided as a matter of law from the allegations of a complaint.
`
`Nevertheless, where the facts are such that the only reasonable conclusion is an absence of
`
`causation, the question is one of law, not of fact.” State Hosps., 61 Cal. 4th at 353 (cleaned
`
`up).
`
`First, Mint argues that “holes in [p]laintiff’s conclusory chain of causation overcome
`
`proximate causation” (Br. 8). The complaint, however, adequately explains how the
`
`combination of Mint’s data breach and the SIM port-out gave criminals the information and
`
`4
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 5 of 16
`
`
`
`access needed to drain Fraser’s Ledger account. The data breach exposed, among other
`
`information, Fraser’s name, address, telephone number, email address, and Mint password.
`
`Moreover, the data breach did not merely expose some of Fraser’s PII, it purportedly revealed
`
`the specific PII necessary for a criminal to port out Fraser’s wireless service to an account
`
`under the criminal’s control (Compl. ¶¶ 61–63).
`
`Mint argues the complaint does not adequately connect the dots between its conduct and
`
`the theft of Fraser’s cryptocurrency from his Ledger account. Fraser alleges, however, that
`
`once a criminal gains access to a victim’s email, it is a straight-forward inquiry to determine
`
`what sort of financial accounts the victim maintains. A simple query of the victim’s email
`
`account would reveal any number of accounts a criminal could then try to access (id. ¶¶ 59–
`
`67). That logical progression suffices. Remember, the criminal began draining Fraser’s
`
`Ledger account at 9:19 a.m., just one hour, eleven minutes after the SIM port-out. And the
`
`SIM port-out occurred (at most) a few days after the Mint data breach. The allegations of
`
`proximate cause here are sufficiently direct and not comparable to the “Rube Goldbergesque
`
`system of fortuitous linkages” where California courts have held proximate cause lacking as a
`
`matter of law. Steinle v. United States, 17 F.4th 819, 822–23 (9th Cir. 2021).
`
`Second, Mint contends the allegations fail due to their reliance upon multiple
`
`independent illegal acts of third parties (Br. 9). Under California law: “The defense of
`
`superseding cause absolves the original tortfeasor, even though his conduct was a substantial
`
`contributing factor, when an independent event subsequently intervenes in the chain of
`
`causation, producing harm of a kind and degree so far beyond the risk the original tortfeasor
`
`should have foreseen that the law deems it unfair to hold him responsible.” Chanda v. Fed.
`
`Home Loans Corp., 215 Cal. App. 4th 746, 755 (2013) (cleaned up). In other words:
`
`To qualify as a superseding cause so as to relieve the defendant
`from liability for the plaintiff’s injuries, both the intervening act
`and the results of that act must not be foreseeable. . . . Whether an
`intervening force is superseding or not generally presents a
`question of fact, but becomes a matter of law where only one
`reasonable conclusion may be reached.
`
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 6 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Id. at 755–56. Here, “it could hardly be argued that the risk of the harm that befell plaintiffs
`
`was as a matter of law unforeseeable.” Lawson v. Safeway Inc., 191 Cal. App. 4th 400, 417
`
`(2010). Fraser alleges that Mint provided criminals with all the information and access they
`
`needed to hack his accounts and steal his assets (Compl. ¶ 63). He further explains that SIM
`
`hijacking represents a national problem, one that has spurred FCC action (Compl. ¶¶ 68–80).
`
`At this posture, given the known threat of SIM hijacking and that Mint purportedly bypassed
`
`the pin verification Fraser set up, the complaint plausibly alleges foreseeable acts that do not
`
`qualify as superseding causes.
`
` Mint disagrees and asserts it “lacks the legal and practical ability to control the acts of
`
`criminals” (Br. 10). “However, this expectation does not exonerate a defendant whose
`
`‘conduct has created or increased the risk of harm.’” Lawson, 191 Cal. App. 4th at 418
`
`(quoting Rest. 2d Torts § 449, cmt. a). The modern standard addressed herein does not take
`
`the rigid view Mint proposes that criminal acts necessarily constitute superseding causes. See
`
`also Bigbee v. Pac. Tel. & Tel. Co., 34 Cal. 3d 49, 58 (1983); 6 Witkin, Summary of Cal. Law,
`
`Torts § 1366 (11th ed. 2021). The opinions that Mint cites are inapposite. For example, the
`
`decision in Martinez v. Pacific Bell, 225 Cal. App. 3d 1557, 1565–66 (1990), is distinguishable
`
`because, in that matter, plaintiff asserted a telephone company proximately caused his injuries
`
`resulting from a robbery because the robbers were attracted to the neighborhood because of a
`
`public telephone booth. In contrast, Mint’s conduct here much more directly created or
`
`increased the risk of harm. Other cited cases do not address California law or apply the
`
`previous standard. See Citizens Bank of Pa. v. Reimbursement Techs., Inc., 2014 WL 2738220,
`
`at *3 (E.D. Pa. June 17, 2014) (Judge L. Felipe Restrepo); O’Keefe v. Inca Floats, Inc., 1997
`
`WL 703784, at *4 (N.D. Cal. Oct. 31, 1997) (Judge Vaughn R. Walker); Jesse v. Malcmacher,
`
`2016 WL 9450683, at *10 (C.D. Cal. Apr. 5, 2016) (Judge Stephen V. Wilson). Fraser
`
`plausibly alleges that Mint’s data breach and role in the SIM port-out created the opportunity
`
`for the cryptocurrency theft.
`
`In sum, at least at this stage, where pleadings are liberally construed and the pleader has
`
`not yet had an opportunity to obtain discovery, this order holds it was reasonably foreseeable to
`
`6
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 7 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`both plaintiff and defendant that a breach of the type alleged of defendant’s system would pose
`
`the risk of a follow-on injury of the type alleged.
`
`2.
`
`SECTION 17200 CLAIMS. (COUNTS IV–VI).
`
`Turning to Fraser’s Section 17200 claims, Mint argues that Fraser cannot be awarded
`
`monetary damages pursuant to Section 17200 and that he has not adequately pleaded he is
`
`entitled to restitution (Br. 10–11).
`
`First, California’s unfair competition law prohibits any “unlawful, unfair or fraudulent
`
`business act or practice.” Cal. Bus. & Prof. Code § 17200 et seq. Although a plaintiff must
`
`allege a loss of money or property caused by the purported unfair competition to qualify for
`
`relief, the remedies available under a Section 17200 claim are limited to restitution and
`
`injunctive relief. Id. § 17204; Clark v. Super. Ct., 50 Cal. 4th 605, 610 (2010). This order
`
`consequently DISMISSES WITH PREJUDICE the remedies sought in the “Wherefore” paragraphs
`
`contained within Counts IV–VI to the extent they seek relief beyond restitution and injunctive
`
`relief for violations of Section 17200.
`
`Second, the complaint fails to adequately state a claim for restitution. In the context of
`
`Section 17200, “restitution means the return of money to those persons from whom it was
`
`taken or who had an ownership interest in it.” Shersher v. Super. Ct., 154 Cal. App. 4th 1491,
`
`1497 (2007) (citation and quotation omitted); see also Korea Supply Co. v. Lockheed Martin
`
`Corp., 29 Cal. 4th 1134, 1149 (2003).
`
`Here, Fraser vaguely alleges in Count IV that “Plaintiff has lost the benefit of his bargain
`
`for his purchased services from Mint that he would not have paid had he known the truth
`
`regarding Mint’s inadequate data security” (Compl. ¶ 166). His Section 17200 allegations
`
`focus, however, on how the “harm caused by Mint’s actions and omissions . . . is substantial in
`
`that it has caused Plaintiff to suffer approximately $466,000.00 in actual financial harm
`
`because of Mint’s unfair business practices (id. ¶ 186; see also ¶¶ 165, 194). But a “restitution
`
`order against a defendant thus requires both that money or property have been lost by a
`
`plaintiff, on the one hand, and that it have been acquired by a defendant, on the other.”
`
`Kwikset Corp. v. Super. Ct., 51 Cal. 4th 310, 336 (2011). It was not Mint that acquired
`
`7
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 8 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Fraser’s cryptocurrency, but a third-party criminal. Fraser, consequently, has failed to allege
`
`he is entitled to restitution from Mint. Because Fraser does not seek injunctive relief, he fails
`
`to adequately state a claim for relief under Section 17200, generally. Counts IV, V, and XI are
`
`accordingly DISMISSED.
`
`3.
`
`COMPUTER FRAUD AND ABUSE ACT (COUNT III).
`
`Next up is Fraser’s Computer Fraud and Abuse Act (CFAA) claim. Mint contends this
`
`claim should be dismissed because the complaint fails to adequately plead conduct and losses
`
`necessary for a civil CFAA claim.
`
`“The CFAA was enacted in 1984 to enhance the government’s ability to prosecute
`
`computer crimes.” LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1130 (9th Cir. 2009). The
`
`CFAA also includes a private right of action. 18 U.S.C. § 1030(g). To state a civil claim
`
`under the CFAA, the plaintiff must allege: (1) that he or she “suffer[ed] damage or loss by
`
`reason of [the defendant’s] violation” of the Act; and (2) that one of five enumerated
`
`circumstances in Section 1030(c)(4)(A)(i)(I) through (V) is present.
`
`Fraser generally alleges Mint violated CFAA Sections 1030(a)(2)(C) and 1030(a)(4).
`
`Section 1030(a)(2)(C) ascribes liability to one who “intentionally accesses a computer without
`
`authorization or exceeds authorized access, and thereby obtains . . . information from any
`
`protected computer.” Section 1030(a)(4), in turn, finds liable one who “knowingly and with
`
`intent to defraud, accesses a protected computer without authorization, or exceeds authorized
`
`access, and by means of such conduct furthers the intended fraud and obtains anything of
`
`value, unless the object of the fraud and the thing obtained consists only of the use of the
`
`computer and the value of such use is not more than $5,000 in any 1-year period.” Fraser then
`
`further alleges, per Section 1030(c)(4)(A)(i)(I), losses aggregating more than $5,000 in value
`
`(Compl. ¶¶ 146, 151).
`
`As an initial matter, Fraser has asserted an aiding and abetting theory of liability (Compl.
`
`¶ 146). As Judge Beth Labson Freeman of our district recently explained in Nowak v. Xapo,
`
`Inc., 2020 WL 6822888, at *4 (N.D. Cal. Nov. 20, 2020), it is an open question whether such a
`
`claim can be asserted under the CFAA in a civil suit. Regardless, the parties failed to brief
`
`8
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 9 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`aiding-and-abetting liability and this order finds Fraser’s CFAA claim fails for the more
`
`fundamental reason that the pleading does not adequately allege harm recognized under the
`
`Act.
`
`The CFAA defines “damage” as “any impairment to the integrity or availability of data, a
`
`program, a system, or information.” 18 U.S.C. § 1030(e)(8). It defines “loss” as “any
`
`reasonable cost to any victim, including the cost of responding to an offense, conducting a
`
`damage assessment, and restoring the data, program, system, or information to its condition
`
`prior to the offense, and any revenue lost, cost incurred, or other consequential damages
`
`incurred because of interruption of service.” Id. § 1030(e)(11). As the Supreme Court recently
`
`held: “The statutory definitions of ‘damage’ and ‘loss’ thus focus on technological harms —
`
`such as the corruption of files — of the type unauthorized users cause to computer systems and
`
`data. . . . The term’s definitions are ill fitted, however, to remediating ‘misuse’ of sensitive
`
`information. . . .” Van Buren v. United States, 141 S. Ct. 1648, 1659–60 (2021). In other
`
`words, “the CFAA creates the right to recover damages and losses related to a computer or
`
`system, not damages that flow from the use of unlawfully obtained information.” Delacruz v.
`
`State Bar of Cal., 2017 WL 7310715, at *6 (June 21, 2017) (Judge Susan Van Keulen), report
`
`and recommendation adopted, 2017 WL 3129207 (N.D. Cal. July 24, 2017) (Judge Beth
`
`Labson Freeman).
`
`Here, the complaint recites only conclusory allegations that, due to Mint’s conduct and
`
`the interruption of “[p]laintiff’s service, he has suffered damage far in excess of Five Thousand
`
`Dollars” (Compl. ¶¶ 151–52). The only damage or loss that Fraser cites in his complaint,
`
`however, is the theft of his cryptocurrency, which does not constitute loss related to a computer
`
`or system. Rather, the loss here flows from the use of the unlawfully obtained information to
`
`hack Fraser’s Ledger account. This order finds this type of damage or loss is not recognized
`
`by the CFAA. See also Andrews v. Sirius XM Radio Inc., 932 F.3d 1253, 1263 (9th Cir. 2019).
`
`Accordingly, the CFAA claim is DISMISSED.
`
`4.
`
`CONTRACT-RELATED CLAIMS (COUNT XI, XII).
`
`Mint next challenges two of Fraser’s contract-related claims.
`
`9
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 10 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`First, Mint argues that the claim for breach of the implied covenant of good faith and fair
`
`dealing should be dismissed because Fraser merely alleges that Mint failed to comply with the
`
`express terms of the contract (Br. 23). This order finds the implied covenant claim duplicative
`
`of Fraser’s breach of contract claim. The only justification for asserting a separate cause of
`
`action for breach of the implied covenant is to obtain a tort recovery in those limited
`
`circumstances in which such tort recovery is allowed. Those narrow circumstances do not
`
`apply here. See Nasseri v. Wells Fargo Bank, N.A., 147 F. Supp. 3d 937, 943 (N.D. Cal.
`
`2015); Careau & Co. v. Sec. Pac. Bus. Credit, Inc., 222 Cal. App. 3d 1371, 1395 (1990).
`
`Fraser’s claim for breach of the implied covenant of good faith and fair dealing parrots
`
`his breach of contract claim and seeks the same relief. The separate claim for the implied
`
`covenant is consequently DISMISSED WITH PREJUDICE. The allegations will be treated as part
`
`of the contract claim.
`
`Second, Fraser also asserts a claim for breach of an implied-in-fact contract. A “contract
`
`implied in fact consists of obligations arising from a mutual agreement and intent to promise
`
`where the agreement and promise have not been expressed in words.” Retired Emps. Ass’n of
`
`Orange Cty., Inc. v. Cty. of Orange, 52 Cal. 4th 1171, 1178 (2011) (quotation omitted).
`
`Instead, the existence and terms are manifested by conduct; beyond that, implied-in-fact
`
`contracts have the same legal effect and basic elements as express contracts. Dones v. Life Ins.
`
`Co. of N. Am., 55 Cal. App. 5th 665, 691 (2020); Yari v. Producers Guild of Am., Inc., 161 Cal.
`
`App. 4th 172, 182 (2008).
`
`Mint asserts the claim should be dismissed because there are insufficient factual
`
`allegations regarding Mint’s intent to create an implied-in-fact contract, the “very heart” of
`
`such an agreement. See Div. of Labor Law Enf’t v. Transpacific Transp. Co., 69 Cal. App. 3d
`
`268, 275 (1977). Fraser, however, adequately alleges his subscription to Mint’s service and
`
`how it violated its “commitment to maintain confidentiality and security” as reflected in its
`
`privacy policy and terms and conditions (Compl. ¶¶ 243–44). Further, per Rule 8, Fraser
`
`properly asserts this theory of recovery in the alternative and alleges that it would apply “[t]o
`
`the extent that Mint’s Privacy Policy and Terms and Conditions did not form express
`
`10
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 11 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`contracts” (id. ¶ 242). Cf. Lance Camper Mfg. Corp. v. Republic Indem. Co., 44 Cal. App. 4th
`
`194, 203 (1996). This order finds the specific allegations for the implied-in-fact contract
`
`limited but, for now, may proceed.
`
`5.
`
`NEGLIGENCE (COUNTS VII–IX).
`
`To state a claim for negligence in California, a plaintiff must establish a duty, a breach of
`
`that duty, proximate cause, and damages. See Corales v. Bennett, 567 F.3d 554, 572 (9th Cir.
`
`2009). Generally, purely economic losses are not recoverable in tort. Seely v. White Motor
`
`Co., 63 Cal. 2d 9, 18 (1965). Put simply, “the economic loss rule prevent[s] the law of contract
`
`and the law of tort from dissolving one into the other.” Robinson Helicopter Co. v. Dana
`
`Corp., 34 Cal. 4th 979, 988 (2004) (quotation omitted).
`
`If a plaintiff’s harms are purely economic, courts employ a six-part test to determine
`
`whether a “special relationship” existed between the parties that demonstrates that defendant
`
`owed plaintiff a duty of care such that an action in tort may be maintained. See J’Aire Corp. v.
`
`Gregory, 24 Cal. 3d 799, 804 (1979). The J’Aire test considers: (1) the extent to which the
`
`transaction was intended to affect the plaintiff; (2) the foreseeability of harm to the plaintiff;
`
`(3) the degree of certainty that the plaintiff suffered injury; (4) the closeness of the connection
`
`between the defendant’s conduct and the injury suffered; (5) the moral blame attached to the
`
`defendant’s conduct; and (6) the policy of preventing future harm. Ibid. “The J’Aire court
`
`emphasized that the foreseeability of the economic harm to the plaintiff from the defendant’s
`
`negligent conduct was the critical factor.” N. Am. Chem. Co. v. Super Ct., 59 Cal. App. 4th
`
`764, (1997). Reviewing courts, nevertheless, perform a holistic review. See Southern
`
`California Gas Leak Cases, 7 Cal. 5th 391, 401 (2019).
`
` As an initial matter, Mint does not contest the third or sixth factors, which, on this
`
`procedural posture, this order will view as favoring a special relationship. We turn to the
`
`remaining factors.
`
`First, previous SIM-hijacking decisions have split on whether the first factor supports a
`
`special relationship. Compare Terpin v. AT&T Mobility, LLC, 2020 WL 883221, at *4 (C.D.
`
`Cal. Feb. 24, 2020) (Judge Otis D. Wright, II), with Shapiro v. AT&T Mobility, LLC, 2020 WL
`
`11
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 12 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`4341778, at *3 (C.D. Cal. May 18, 2020) (Judge Consuelo B. Marshall). This order finds
`
`Shapiro persuasive on this issue — there are no allegations that the wireless services Mint
`
`offered to Fraser were “‘intended to affect’ the plaintiff[] in any way particular to the
`
`plaintiff[], as opposed to all potential purchasers” of the service. Ott v. Alf-Laval Agri, Inc., 31
`
`Cal. App. 4th 1439, 1455 (1995). The allegations here do not support a plausible inference
`
`Fraser can satisfy the first factor.
`
`Second, the complaint provides sufficient allegations that the harm to Fraser was
`
`foreseeable. The complaint avers that SIM hijacking is an increasingly common crime that can
`
`arise out of the data breach of a wireless carrier (Compl. ¶¶ 37–40, 48, 61–62). Mint’s
`
`customers were actively petitioning the company for enhanced security such that Mint’s co-
`
`founder Rizwan Kassim released a public response to their inquiries (id. ¶¶ 45–47). The
`
`complaint explains how Mint has a federal statutory obligation to protect the personal
`
`information of its customers, and that the FCC has promulgated rules on these issues (id. ¶¶
`
`68–80). Further, Mint’s own terms and conditions and privacy policy explicitly reference the
`
`importance of privacy and keeping data secure (id. ¶¶ 81–86). As noted above, Fraser alleges
`
`that he added extra security (PIN verification) to his account prior to the SIM port out, but that
`
`Mint “bypassed th[at] enhanced security” when it took away control of his account (id. ¶ 60).
`
`Finally, the complaint alleges how Mint’s data breach and the SIM port-out provided all the
`
`information and access criminals needed to drain Fraser’s Ledger account (id. ¶ 63–67). This
`
`order finds these allegations sufficient to plausibly satisfy the second J’Aire factor. See
`
`Shapiro, 2020 WL 4341778, at *3; Terpin, 2020 WL 883221, at *4; Ross v. AT&T Mobility,
`
`LLC, 2020 WL 9848766, at *15 (N.D. Cal. May 14, 2020) (Judge Jon S. Tigar).
`
`Skipping to the fourth factor, for the same reasons discussed in the proximate cause
`
`analysis above, the complaint plausibly alleges a sufficiently close connection between Mint’s
`
`conduct and Fraser’s injury. See, e.g., Shapiro, 2020 WL 4341778, at *3.
`
`Considering the fifth factor, the allegations previously discussed support this order’s
`
`conclusion that the complaint plausibly alleges Mint’s moral blame. For example, the
`
`complaint alleges that Mint bypassed or failed to implement the PIN verification Fraser put in
`
`12
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 3:22-cv-00138-WHA Document 37 Filed 04/27/22 Page 13 of 16
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`place to protect his account days before the SIM port-out occurred (Compl. ¶¶ 60–66). This
`
`plausibly demonstrates a level of moral blame. See Shapiro, 2020 WL 4341778, at *4.
`
`Upon a holistic review, this order finds the J’Aire factors support the conclusion, at this
`
`stage, that Mint had a special relationship with Fraser. Fraser adequately states claims for
`
`negligence.
`
`6.
`
`PUNITIVE DAMAGES (ALL COUNTS).
`
`Mint next argues the complaint fails to properly allege punitive damages. Fraser
`
`generally seeks punitive damages in his prayers for relief and specifically seeks punitive
`
`damages in “Wherefore” paragraphs for all his claims except declaratory judgment of the
`
`unenforceability of Mint’s consumer agreement.
`
`For the state-law claims, under California Civil Code Section 3294(a), a plaintiff may
`
`recover punitive damages “[i]n an action for the breach of an obligation not arising from
`
`contract, where it is proven by clear and convincing evidence that the defendant has been
`
`guilty of oppression, fraud, or malice.” To establish corporate punitive damages liability, the
`
`plaintiff must prove “the wrongful act giving rise to the exemplary damages [were] committed
`
`by an ‘officer, director, or managing agent.”’ White v. Ultramar, Inc., 21 Cal. 4th 563, 572
`
`(1999) (quoting Cal. Civ. Code § 3294(b)). Punitive damages are appropri

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket