throbber
Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 1 of 22
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FUMIKO LOPEZ, et al.,
`
`Plaintiffs,
`
`v.
`
`APPLE, INC.,
`
`Defendant.
`
`Case No. 19-cv-04577-JSW
`
`
`ORDER GRANTING IN PART AND
`DENYING IN PART APPLE’S
`MOTION TO DISMISS
`
`Re: Dkt. Nos. 54, 59
`
`
`
`Now before the Court is the motion to dismiss the amended class action complaint filed by
`
`the defendant Apple, Inc. (“Apple”). The Court has considered the parties’ papers, relevant legal
`
`authority, and the record in this case, and it finds the motion suitable for disposition without oral
`
`argument. See N.D. Civ. L.R. 7-1(b). The Court GRANTS Apple’s motion.
`
`BACKGROUND
`
`Plaintiffs Fumiko Lopez, Fumiko Lopez as guardian of minor A.L., Lishomwa Henry, and
`
`Joseph Harms (collectively, “Plaintiffs”) bring this putative consumer class action against Apple
`
`for violation of federal and state privacy laws. Like many others, Plaintiffs own Apple devices,
`
`namely, Apple iPhones. (Dkt. No. 48, Amended Complaint (“AC”) ¶¶ 43-46.) All Apple devices
`
`allegedly come pre-installed with a software program called “Siri,” which is a voice activated
`
`“intelligent assistant.” (Id. ¶ 2.) Plaintiffs allege the following facts:
`
`Siri is an artificial intelligence-based virtual assistant that allows individuals to use their
`
`voice to ask questions and give instructions. (Id.) For instance, a user can ask Siri to provide
`
`information, set an alarm, or play music using only the voice. (Id. ¶ 21.) Apple launched Siri in
`
`2011 and preinstalls it on every device it makes, from the Apple Watch to the Apple TV. (Id. ¶ 2.)
`
`Cognizant that users might be wary of vocal surveillance, Apple assures users that Siri will only
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 2 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`listen to, record, and share their conversations when they give consent by, inter alia, saying a “hot
`
`word,” such as “Hey Siri.” (Id. ¶ 4.) Outside of this “active listening mode,” Apple assures user
`
`that its devices only listen “to recognize the clear, unambiguous audio trigger” that the user wants
`
`to activate Siri. (Id. ¶¶ 26, 31.)
`
`Notwithstanding these representations, on July 26, 2019, The Guardian published an
`
`article reporting that Apple had intercepted and disclosed private conversations without any user
`
`consent.1 (Id. ¶ 5.) The article describes two sets of facts. First, Siri is routinely triggered by
`
`accident without any hot word. (Id. ¶ 35.) Two Apple devices, the Apple Watch and the Home
`
`Pod speakers, have particularly high accidental trigger rates and can be activated by a “sound of a
`
`zip.” (Id.) Second, a “small portion” of Siri recordings, both deliberate and accidental, are sent to
`
`third-party contractors for evaluation. (Id. ¶ 6.) The contractors grade Siri responses on “whether
`
`the activation of the voice assistant was deliberate or accidental, whether the query was something
`
`Siri could be expected to help with and whether Siri’s response was appropriate.” (Id. ¶ 34.) As
`
`the result, the third-party contractors are sometimes exposed to “private discussions between
`
`doctors and patients, confidential business deals, and sexual encounters.” (Id. ¶ 33.)
`
` Plaintiffs allege violations of the Federal Wiretap Act (“Wiretap Act”), 18 U.S.C. § 2510,
`
`et seq., the Stored Communications Act (“SCA”), 18 U.S. C. § 2701, et seq., California Invasion
`
`of Privacy Act (“CIPA”), California Penal Code §§ 631(a) and 632, intrusion upon seclusion,
`
`invasion of privacy under Article I, Section 1 of the California Constitution, breach of contract,
`
`and California Unfair Competition Law (“UCL”), California Business & Professions Code §
`
`17200, and for declaratory and other equitable relief under the Declaratory Judgment Act, 28
`
`U.S.C. § 2201, et seq. The Court will address additional facts as necessary in its analysis.
`
`
`
`
`
`
`1 The Court finds, sua sponte, that the Guardian article is incorporated by reference into the
`complaint as being the basis of Plaintiffs’ claims. Khoja v. Orexigen Therapeutics, Inc., 899 F.3d
`988, 1003 (9th Cir 2018); (AC ¶¶ 5 n.1, 34-37); see Alex Hern, Apple contractors ‘regularly hear
`confidential details’ on Siri recordings, the Guardian (July 26, 2019 12:34 EDT), available at
`https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-
`confidential-details-on-siri-recordings.
`
`
`2
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 3 of 22
`
`
`
`A.
`
`Legal Standard on Motion to Dismiss.
`
`ANALYSIS
`
`A motion to dismiss is proper under Federal Rule of Civil Procedure 12(b)(6) where the
`
`pleadings fail to state a claim upon which relief can be granted. The Court’s “inquiry is limited to
`
`the allegations in the complaint, which are accepted as true and construed in the light most
`
`favorable to the plaintiff.” Lazy Y Ranch LTD v. Behrens, 546 F.3d 580, 588 (9th Cir. 2008).
`
`Even under the liberal pleading standard of Federal Rule of Civil Procedure 8(a)(2), “a plaintiff’s
`
`obligation to provide the ‘grounds’ of his ‘entitle[ment] to relief’ requires more than labels and
`
`conclusions, and a formulaic recitation of the elements of a cause of action will not do.” Bell
`
`Atlantic Corp. v. Twombly, 550 U.S. 544, 555 (2007) (citing Papasan v. Allain, 478 U.S. 265, 286
`
`(1986)).
`
`Pursuant to Twombly, a plaintiff must not merely allege conduct that is conceivable but
`
`must instead allege “enough facts to state a claim to relief that is plausible on its face.” Id. at 570.
`
`“A claim has facial plausibility when the plaintiff pleads factual content that allows the court to
`
`draw the reasonable inference that the defendant is liable for the misconduct alleged.” Ashcroft v.
`
`Iqbal, 556 U.S. 662, 678 (2009) (citing Twombly, 550 U.S. at 556). If the allegations are
`
`insufficient to state a claim, a court should grant leave to amend, unless amendment would be
`
`futile. See, e.g., Reddy v. Litton Indus., Inc., 912 F.2d 291, 296 (9th Cir. 1990); Cook, Perkiss &
`
`Liehe, Inc. v. N. Cal. Collection Serv., Inc., 911 F.2d 242, 246-47 (9th Cir. 1990).
`
`As a general rule, “a district court may not consider any material beyond the pleadings in
`
`ruling on a Rule 12(b)(6) motion.” Branch v. Tunnell, 14 F.3d 449, 453 (9th Cir. 1994) (overruled
`
`on other grounds by Galbraith v. County of Santa Clara, 307 F.3d 1119 (9th Cir. 2002) (citation
`
`omitted)). However, documents subject to judicial notice may be considered on a motion to
`
`dismiss. In doing so, the Court does not convert a motion to dismiss to one for summary
`
`judgment. See Mack v. South Bay Beer Distrib., 798 F.2d 1279, 1282 (9th Cir. 1986) (overruled
`
`on other grounds by Astoria Fed. Sav. & Loan Ass’n v. Solimino, 501 U.S. 104 (1991)).
`
`//
`
`//
`
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 4 of 22
`
`
`
`B.
`
`Article III Standing.
`
`As a threshold matter, Apple challenges Plaintiffs’ Article III standing. No principle is
`
`more fundamental to the role of the judiciary that the “constitutional limitations of federal-court
`
`jurisdiction to actual cases or controversies.” Raines v. Byrd, 521 U.S. 811, 818 (1997). A party
`
`seeking the federal court’s jurisdiction bears the burden of demonstrating that she has standing to
`
`sue. See Lujan v. Defenders of Wildlife, 504 U.S. 555, 561 (1992). If a plaintiff fails to satisfy the
`
`constitutional requirements to establish standing, the court lacks jurisdiction to hear the case and
`
`must dismiss the complaint. See Valley Forge Christian Col. v. Americans United for Separation
`
`of Church and State, 454 U.S. 464, 475-76 (1982). Standing must be supported “with the manner
`
`and degree of evidence required at the successive stages of the litigation.” Lujan, 504 U.S. at 561.
`
`Thus, at the pleading stage, the court must “accept as true all material allegations,” “construe the
`
`complaint in favor of the complaining party,” and “determine whether the plaintiffs have clearly
`
`alleged facts demonstrating each element of standing.” Namisnak v. Uber Techs., Inc., 971 F.3d
`
`1088 (9th Cir. 2020) (citations and internal quotation marks omitted).
`
`The “irreducible minimum” of Article III standing requires plaintiffs to show that they
`
`have “(1) suffered injury in fact, (2) that is fairly traceable to the challenged conduct of the
`
`defendant, and (3) that is likely to be redressed by a favorable judicial decision.” Spokeo, Inc. v.
`
`Robins, -- U.S. --, 136 S. Ct. 1540, 1547 (2016) (citing Lujan, 504 U.S. at 560-61). The injury
`
`must be “concrete and particularized” and “actual or imminent, not conjectural or hypothetical.”
`
`Id. at 1548 (quoting Lujan, 504 U.S. at 560). To be “particularized,” an injury “must affect the
`
`plaintiff in a personal and individual way.” Id. (quoting Lujan, 504 U.S. at 560 n.1). To be
`
`“actual or imminent,” the injury must have already occurred or be “certainly impending.” Clapper
`
`v. Amnesty Int’l USA, 568 U.S. 398, 409 (2013). A violation of substantive privacy rights “gives
`
`rise to a concrete injury sufficient to confer standing.” In re Facebook, Inc. Internet Tracking
`
`Litig., 956 F.3d 589, 598 (9th Cir. 2020); Campbell v. Facebook, Inc., 951 F.3d 1106, 1117-19
`
`(9th Cir. 2020). But standing “requires more than an injury to a cognizable interest”; it requires
`
`“that the party seeking review be himself among the injured.” Lujan, 504 U.S. at 563.
`
`Here, Plaintiffs allege two theories of harm: first, Apple disclosed Plaintiffs’ private
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 5 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`information without consent and in violation of substantive privacy laws, and second, Plaintiffs
`
`suffered an economic injury because they overpaid for, and did not receive the full benefit of, their
`
`Apple devices.
`
`As to the first theory, the Court agrees with Apple that the harm is overly speculative.
`
`Although Plaintiffs allege, in a conclusory fashion, that their communications were intercepted
`
`and disclosed, the complaint makes clear that their allegations are based entirely on the Guardian
`
`article. (See AC at ¶¶ 43-46 (referring to interception “as described above”).) The Guardian
`
`article does not plausibly suggest that all Apple’s devices were subject to accidental triggers and
`
`review by third party contractors, much less that such interception always occurred in reasonably
`
`private settings. The article discusses frequency of accidental triggers primarily in relation to the
`
`Apple Watch and the HomePod speakers, neither of which are owned by the Plaintiffs. (Compare
`
`id. ¶ 35, with id. ¶¶ 44-46.) Moreover, the article expressly states that only a “small portion” of
`
`daily Siri activations including were sent to contractors and that they included both deliberate and
`
`accidental activations. (Id. ¶ 34.) Finally, although the article describes private communications
`
`among the recordings sent to contractors (see id. ¶ 33), Plaintiffs allege no facts to suggest that
`
`their own private communications were intercepted by accidental triggers.2
`
`Thus, Plaintiffs’ claims of statutory privacy harm rest on an attenuated chain of
`
`possibilities that (1) their iPhones were accidentally triggered at some point, (2) the accidental
`
`triggers occurred in a context where Plaintiffs had a reasonable expectation of privacy, and (3) (for
`
`some claims) Plaintiffs’ communications were part of the “small portion” of recordings sent to
`
`third party contractors. Absent factual allegations regarding the rate of accidental triggers on
`
`devices that Plaintiffs actually own, as well as their particular use of those devices in contexts
`
`where they had a reasonable expectation of privacy, the injury remains too speculative for Article
`
`
`2 Indeed, Plaintiffs’ primary allegation of a reasonable expectation of privacy rests on home use of
`devices that Plaintiffs do not themselves own. (See AC ¶ 30.) Even assuming that Plaintiffs
`sufficiently alleged accidental triggers, Plaintiffs identify no concrete injury for interception of
`wholly public communications. See Campbell, 951 F.3d at 1118 (finding injury where “private
`communications are intercepted”); cf. In re Google Assistant Privacy Litig., 457 F. Supp. 3d 797,
`817 (N.D. Cal. 2020) (noting that “smartphones are by their nature mobile” and “frequently used
`in public spaces”).
`
`5
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 6 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`III standing. See Birdsong v. Apple, Inc., 590 F.3d 955, 960-61 (9th Cir. 2009) (finding lack of
`
`standing where the risk of injury “is not concrete and particularized as to [plaintiffs]”); Cahen v.
`
`Toyota Motor Corp., 147 F. Supp. 3d 955, 972 (N.D. Cal. 2015) (dismissing claims for lack of
`
`standing where plaintiffs did not allege that they themselves were affected by defendant’s alleged
`
`behavior); Google Assistant Privacy Litig., 457 F. Supp. 3d at 816-17 (rejecting allegations based
`
`on third party report where “Plaintiffs do not allege that any of [the reported private] recordings
`
`covered Plaintiffs’ communications”); cf. In re Facebook Privacy Litig., 791 F. Supp. 2d 705, 712
`
`(N.D. Cal. 2011) (finding standing where defendant engaged in “dragnet” surveillance that
`
`affected all of its customers, and plaintiffs were customers).3
`
` As to the economic theory of injury, Plaintiffs’ theory suffers from the same defects,
`
`namely, that the allegations do not show that they themselves overpaid for the devices. Although
`
`it does not concern privacy, Birdsong is instructive. There, the plaintiffs alleged that Apple iPod
`
`earbuds could produce hearing loss if used for prolonged periods of time at high volume. See 590
`
`F.3d at 961. The court rejected the plaintiffs’ alleged injury as hypothetical because they have not
`
`alleged that they themselves suffered or were likely to suffer hearing loss. Id. The court then
`
`rejected the economic theory of harm because the risk of hearing loss was hypothetical, depending
`
`on how consumers chose to use the devices, and the plaintiffs thus had not alleged that they were
`
`deprived of the benefit of the bargain. Id. The same result follows here. Although Plaintiffs
`
`could have used their iPhones in private settings, they fail to allege that they have. Nor have
`
`Plaintiffs alleged that they purchased their devices in reliance on particular representations that
`
`Siri would not be accidentally triggered, which is necessary for the “benefit of the bargain” theory.
`
`In short, Plaintiffs simply fail to allege enough facts to show a personal injury.
`
`At bottom, “‘the gist of the question of standing’ is whether [plaintiffs] have ‘such a
`
`personal stake in the outcome of the controversy as to assure that concrete adverseness which
`
`
`3 The purported class action nature of the suit “adds nothing to the question of standing.” Spokeo,
`136 S. Ct. at 1547 n.6. If none of the named plaintiffs have a case or controversy, “none may seek
`relief on behalf of himself or any other member of the class.” O’Shea v. Littleton, 414 U.S. 488,
`494 (1974); see also Warth v. Seldin, 422 U.S. 490, 502 (1975) (“Petitioners must allege and show
`that they personally have been injured, not that injury has been suffered by other, unidentified
`members of the class to which they belong and which they purport to represent.”).
`6
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 7 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`sharpens the presentation of issues upon which the court so largely depends for illumination.”
`
`Mass. v. E.P.A., 549 U.S. 497, 517 (2007) (quoting Baker v. Carr, 369 U.S. 186, 204 (1962)).
`
`Here, the complaint, read holistically, strongly suggests that Plaintiffs’ claims rest solely on the
`
`Guardian article that reports the privacy harms of other class members that may not have affected
`
`Plaintiffs at all. That is not the type of “concrete adverseness” that creates a case or controversy.
`
`Accordingly, the Court dismisses the complaint for lack of Article III standing.
`
`C. Wiretap Act.
`
`A violation of the Wiretap Act occurs where any person “intentionally intercepts . . . any
`
`wire, oral, or electronic communication” or “intentionally discloses” or “uses” the contents of any
`
`such wire, oral, or electronic communication, while “knowing or having reason to know that the
`
`information was obtained through the [unlawful] interception.” 18 U.S.C. §§ 2511(1)(a), (c)-(d).
`
`Importantly, the Wiretap Act defines “oral communication” as “any oral communication uttered
`
`by a person exhibiting an expectation that such communication is not subject to interception under
`
`circumstances justifying such expectation.” 18 U.S.C. §§ 2510(2). In other words, the Wiretap
`
`Act only protects oral communications in which the speaker has a “reasonable expectation of
`
`privacy.” United States v. McIntyre, 582 F.2d 1221, 1223 (9th Cir. 1978).
`
`
`
`Here, Apple seeks to dismiss for failure to allege that (1) Apple “intercepted” any
`
`communication, (2) intentionally, (3) Plaintiffs had a reasonable expectation of privacy in those
`
`communications, (4) Plaintiffs did not consent to the interception, and (5) under section
`
`2511(1)(c), Apple intentionally disclosed the communications.
`
`1.
`
`Interception.
`
`The Wiretap Act defines “intercept” to mean “the aural or other acquisition of the contents
`
`of any wire, electronic, or oral communication through the use of any electronic, mechanical, or
`
`other device.” 18 U.S.C. § 2510(4). Apple argues, citing Crowley v. CyberSource Corp., 166 F.
`
`Supp. 2d 1263 (N.D. Cal. 2001), that it has not “intercepted” communications because it was the
`
`intended recipient of the communications.
`
`The argument is meritless. The intended recipient of “discussions between doctors and
`
`patients, confidential business deals, and sexual encounters” (AC ¶ 33) are doctors, business
`
`7
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 8 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`counterparts and sexual partners, respectively—not Apple. In Crowley, the plaintiffs actually sent
`
`information to Amazon in order to make a purchase. 166 F. Supp. 2d at 1265. The court found
`
`that Amazon did not “intercept” the communication because it did not use any device other than
`
`the drive or server on which the email was received. Id. at 1269. Similarly, in Yunker v. Pandora
`
`Media, Inc., the plaintiff actually provided information to Pandora, and this Court dismissed the
`
`claims for failure to allege interception of communications “to another party.” No. 11-CV-03113
`
`JSW, 2013 WL 1282980, at *7 (N.D. Cal. Mar. 26, 2013). Here, on the other hand, Plaintiffs
`
`allege that they did not intend Apple to receive their private communications, but that Apple
`
`“captured” such communications using the software in their devices. That sufficiently alleges
`
`interception. See Satchell v. Sonic Notify, Inc., 234 F. Supp. 3d 996, 1007-08 (N.D. Cal. 2017)
`
`(finding sufficient allegations of interception through “audio beacon” technology).
`
`Accordingly, the Court does not dismiss on this ground.
`
`2.
`
`Intent.
`
`Apple argues that because Plaintiffs admit that the Siri activations were “accidental” (e.g.,
`
`AC ¶ 35), they cannot allege “intentional” interception. The intent requirement of the Wiretap Act
`
`requires a defendant to act “purposefully and deliberately and not as a result of accident or
`
`mistake.” United States v. Christensen, 828 F.3d 763, 774 (9th Cir. 2015). Although no “evil”
`
`motive is required, the defendant must have “acted consciously and deliberately with the goal of
`
`intercepting wire communications.” Id. at 774. At the pleading stage, however, interception may
`
`be considered intentional “where a defendant is aware of the defect causing the interception but
`
`takes no remedial action.” Google Assistant Privacy Litig., 457 F. Supp. 3d at 815; see also
`
`Backhaut v. Apple, Inc., 74 F. Supp. 3d 1033, 1044 (N.D. Cal. 2014).
`
`Although the question is close, the Court finds that Plaintiffs adequately allege intent at
`
`this stage. Plaintiffs allege that Apple knows of the accidental Siri triggers and, instead of deleting
`
`the resulting messages, sends them to contractors to improve Siri’s functioning. (Id. ¶¶ 37-39.)
`
`To be sure, one of the purposes of the third-party contractor review is to distinguish deliberate
`
`from accidental Siri activations (and, presumably, to reduce the latter). (Id. ¶ 34.) It is difficult to
`
`see how Apple could intentionally allow accidental Siri triggers to proceed only to use the
`
`8
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 9 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`intercepted information to prevent accidental triggers. Nevertheless, the Court finds that at this
`
`stage, Plaintiffs sufficiently allege that Apple fails to take remedial action while knowing of the
`
`accidental activations, sufficient to make the conduct “intentional.”
`
`Accordingly, the Court does not dismiss on this ground.
`
`3.
`
`Confidentiality.
`
`Apple next argues that Plaintiffs fail to allege that the intercepted communications were
`
`subject to a reasonable expectation of privacy. 18 U.S.C. §§ 2510(2). As explained above,
`
`Plaintiffs have adequately alleged that Apple intercepted class members’ private communications,
`
`but not their own. Specifically, Plaintiffs allege that Apple intercepted discussions between
`
`doctors and patients, confidential business negotiations, and sexual encounters (AC ¶ 33), as well
`
`as communications that took place inside private homes (id. ¶ 30), which is sufficient to show
`
`communications “exhibiting an expectation” of privacy “under circumstances justifying such
`
`expectation.” See, e.g., Katz v. United States, 389 U.S. 347, 361 (1967) (holding that “a man’s
`
`home is, for most purposes, a place where he expects privacy . . . “). However, because Plaintiffs
`
`include only conclusory allegations with respect to their own communications, the Wiretap Act
`
`claim is dismissed. See Google Assistant Privacy Litig., 457 F. Supp. 3d at 816-17 (dismissing
`
`analogous claims where plaintiffs failed to allege that they used their devices in circumstances
`
`giving rise to a reasonable expectation of privacy); In re Yahoo Mail Litig., 7 F. Supp. 3d 1016,
`
`1041 (N.D. Cal. 2014) (dismissing conclusory claims of confidentiality) (citing cases).
`
`Accordingly, the Court dismisses the Wiretap Act claims with leave to amend.
`
`4.
`
`Consent.
`
`Interception is not unlawful under the Wiretap Act where “one of the parties to the
`
`communication has given prior consent to such interception.” 18 U.S.C. §§ 2511(2)(d). Consent
`
`“may be either explicit or implied, but it must be actual.” Yahoo Mail Litig., 7 F. Supp. 3d at
`
`1028. Moreover, consent may be limited where a party consents to interception “of only part of a
`
`communication” or only a “subset of its communications.” Id. (quoting In re Pharmatrak, Inc.,
`
`329 F.3d 9, 19 (1st Cir. 2003)). The party seeking to establish consent has the burden of proof.
`
`Id. (citing Pharmatrak, 329 F.3d at 19).
`
`9
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 10 of 22
`
`
`
`Here, the Court finds that Apple fails to establish consent. Apple argues that Plaintiffs
`
`consented to interception because the Software License Agreement (“SLA”)4 states that Siri’s
`
`operation may not be “error-free.” (See Dkt. No. 54-5 (SLA) § 7.4.) Specifically, section 7.4 of
`
`the SLA concerns warranties and states that Apple does not warrant that iOS software and services
`
`will be “uninterrupted and error free.” (Id.) Such general disclaimer is nowhere near specific and
`
`unambiguous enough to represent that Siri may activate by accident. See In re Google Inc. Gmail
`
`Litig., Case No. 13-MD-02430-LHK, 2013 WL 5423918, at *14 (N.D. Cal. Sept 26, 2013). Even
`
`if Plaintiffs consented to use Siri generally, they allege that their consent was limited to situations
`
`where a hot word was spoken. (See AC ¶¶ 2, 23-24, 31.) Moreover, the allegations that Plaintiffs
`
`understand how voice assistants generally work and that Siri activates based on a “confidence
`
`score” are insufficient to show that Plaintiffs consented to being recorded after a “sound of a zip.”
`
`(Id. ¶¶ 21, 105.) Drawing all inferences in favor of Plaintiffs, that is simply not how voice
`
`assistants “generally” work.
`
`Accordingly, the Court does not dismiss on this ground.
`
`5.
`
`Disclosure.
`
`Under Section 2511(1)(c) of the Wiretap Act, a party that “intentionally discloses” to “any
`
`other person” the contents of communications while “knowing or having reason to know that the
`
`information was obtained through the interception” of communications in violation of the statute
`
`is separately liable. 18 U.S.C. § 2511(1)(c). Apple seeks to dismiss for failure to plead a
`
`predicate interception. For the reasons stated above, the Court agrees that Plaintiffs have not
`
`alleged that their own communications were intercepted and disclosed and dismisses the claim.
`
`
`4 Apple seeks judicial notice of the SLA and four other documents referenced in Plaintiffs’
`complaint under an incorporation by reference theory. (Dkt. No. 54-7 (“RJN”).) The Court finds
`that exhibits A-D are properly incorporated because they are cited “extensively” in the complaint
`and form the basis of Plaintiffs’ claims that they had a reasonable expectation of privacy in their
`communications. See Khoja v. Orexigen Therapeutics, Inc., 899 F.3d 988, 1002 (9th Cir 2018).
`Exhibit E, on the other hand, is cited only once and concerns representations made years after
`Plaintiffs purchased their devices, which is insufficient for incorporation by reference. Id. Nor is
`judicial notice proper where Apple seeks to use Exhibit E establish that a “visual indicator” of Siri
`activation was present on Plaintiffs’ devices. See id.at 999 (not every fact is noticeable for its
`truth). Accordingly, the Court GRANTS Apple’s request for Exhibits A-D only.
`10
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 11 of 22
`
`
`
`D.
`
`Stored Communications Act.
`
`The Stored Communications Act (“SCA”) provides a private right of action against anyone
`
`who: “(1) intentionally accesses without authorization a facility through which an electronic
`
`communication service is provided; or (2) initially exceeds an authorization to access that facility
`
`. . . while it is in electronic storage in such system.” 18 U.S.C. § 2701(a). The SCA also prohibits
`
`a person or entity providing an electronic communication service from “knowingly divulg[ing] to
`
`any person or entity the contents of a communication while in electronic storage by that service.”
`
`18 U.S.C. § 2702(a)(1). Apple seeks to dismiss claims under both provisions.
`
`1. Section 2701(a)(1).
`
`To plead a violation of the “unlawful access” provision of Section 2701(a)(1), a plaintiff
`
`must allege that the defendant “(1) gained unauthorized access to a ‘facility’ where it (2) accessed
`
`an electronic communication in ‘electronic storage.’” Facebook Internet Tracking Litig., 956 F.3d
`
`at 608. The statute does not define a “facility.” However, it specifies that the facility is one
`
`“through which an electronic communication service is provided.” See 18 U.S.C. § 2701(a)(1).
`
`Citing that language, courts have distinguished facilities that provide an electronic communication
`
`service—such as an email provider’s servers or an ISP—from those that merely enable the
`
`electronic communication service—such as a user’s personal computer or phone. See In re iPhone
`
`Application Litig., 844 F. Supp. 2d 1040, 1057-58 (N.D. Cal. 2012); Crowley, 166 F. Supp. 3d at
`
`1271; Garcia v. City of Laredo, Tex., 702 F.3d 788, 792 (5th Cir. 2012). The statute defines
`
`“electronic communication service” as “any service which provides to users thereof the ability to
`
`send or receive wire or electronic communications.” 18 U.S.C. § 2510(15).
`
`Here, Plaintiffs’ Section 2701(a)(1) claim lacks merit. Plaintiffs claim that Siri is a
`
`“facility” through which Apple gained unauthorized access to their communications. That claim
`
`fails for three reasons. First, Siri is software and not a “facility” under any common sense of the
`
`term.5 Second, Plaintiffs do not allege that Siri provides an “electronic communication service”—
`
`
`5 As Apple points out, Plaintiffs variously claim that Siri is both the “facility” and the “electronic
`communication service” provided by a facility. (See AC ¶¶ 104, 107.) To the extent that
`Plaintiffs allege their devices are the facility, the claim fails for the reasons stated in iPhone
`Application Litigation, 844 F. Supp. 2d at 1057.
`11
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 4:19-cv-04577-JSW Document 65 Filed 02/10/21 Page 12 of 22
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`they allege that it enables “a variety of tasks,” such as setting alarms and responding to questions.
`
`(AC ¶ 18.) Third, the statute exempts from liability “conduct authorized [] by the person or entity
`
`providing a wire or electronic communication service.” 18 U.S.C. § 2701(c). Apple is the service
`
`provider here and presumably authorized its own conduct. See In re Google, Inc. Privacy Policy
`
`Litig., No. C-12-01382-PSG, 2013 WL 6248499, at *12 (N.D. Cal. Dec. 3, 2013) (“Whatever the
`
`propriety of Google’s actions, it plainly authorized the actions that it took itself.”).
`
`Ultimately, the SCA is meant to protect information “held by centralized communication
`
`providers.” Google Cookie Placement Consumer Privacy Litig., 806 F.3d at 147; see Facebook
`
`Internet Tracking Litig., 956 F.3d at 609 (“[T]he SCA has typically only been found to apply in
`
`cases involving a centralizing data-management entity.”); Theofel v. Farey-Jones, 359 F.3d 1066,
`
`1072 (9th Cir. 2004) (“Just as trespass protects those who rent space from a commercial storage
`
`facility to hold sensitive documents, the [SCA] protects users whose electronic communications
`
`are in electronic storage with an ISP or other electronic communications facility.” (citation
`
`omitted)). The statute is not meant to provide a “catch-all . . . to protect the privacy of stored
`
`internet communications.” Google Privacy Policy Litig., 2013 WL

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket