Judge: Daniel S. Murphy, Case: 24STCV12891, Date: 2024-07-29 Tentative Ruling

Case Number: 24STCV12891    Hearing Date: July 29, 2024    Dept: 32

 

ANNE HEITING,

                        Plaintiff,

            v.

 

TAYLOR FRESH FOODS, INC.,

                        Defendant.

 

  Case No.:  24STCV12891

  Hearing Date:  July 29, 2024

 

     [TENTATIVE] order RE:

Defendant’s demurrer to complaint

 

 

BACKGROUND

            On May 22, 2024, Plaintiff Anne Heiting filed this action against Defendant Taylor Fresh Foods, Inc., asserting a single cause of action for violation of the California Invasion of Privacy Act (CIPA).

            The complaint alleges that Defendant’s website employs tracking software created by TikTok (TikTok Software) to identify certain user information. (Compl. ¶ 11.) This digital process called “fingerprinting” allegedly “gathers device and browser information, geographic information, referral tracking, and url tracking by running code or ‘scripts’ on the Website to send user details to TikTok.” (Id., ¶ 13.) Plaintiff alleges that the TikTok Software is a “trap and trace device” in violation of Penal Code section 638.51. (Id., ¶¶ 16-17.)

            On June 24, 2024, Defendant filed the instant demurrer to the complaint. Plaintiff filed her opposition on July 16, 2024. Defendant filed its reply on July 24, 2024.

 

 

LEGAL STANDARD

A demurrer for sufficiency tests whether the complaint states a cause of action. (Hahn v. Mirda (2007) 147 Cal.App.4th 740, 747.) When considering demurrers, courts read the allegations liberally and in context. (Taylor v. City of Los Angeles Dept. of Water and Power (2006) 144 Cal.App.4th 1216, 1228.) In a demurrer proceeding, the defects must be apparent on the face of the pleading or by proper judicial notice. (Code Civ. Proc., § 430.30, subd. (a).) A demurrer tests the pleadings alone and not the evidence or other extrinsic matters. (SKF Farms v. Superior Court (1984) 153 Cal.App.3d 902, 905.) Therefore, it lies only where the defects appear on the face of the pleading or are judicially noticed. (Ibid.) The only issue involved in a demurrer hearing is whether the complaint, as it stands, unconnected with extraneous matters, states a cause of action. (Hahn, supra, 147 Cal.App.4th at 747.)

MEET AND CONFER

Before filing a demurrer or a motion to strike, the demurring or moving party is required to meet and confer with the party who filed the pleading demurred to or the pleading that is subject to the motion to strike for the purposes of determining whether an agreement can be reached through a filing of an amended pleading that would resolve the objections to be raised in the demurrer. (Code Civ. Proc., §§ 430.41, 435.5.) The Court notes that Defendant has complied with the meet and confer requirement. (See Bours Decl.)

DISCUSSION

I. Statutory Framework

            “Except as provided in subdivision (b), a person may not install or use a pen register or a trap and trace device without first obtaining a court order pursuant to Section 638.52 or 638.53.” (Pen. Code, § 638.51(a).) Subdivision (b) of section 638.51 lists five purposes for which “[a] provider of electronic or wire communication service may use a pen register or a trap and trace device.” (Id., § 638.51(b).) Section 638.52 prescribes the procedure for law enforcement to make a written application for authorization to install a pen register or trap and trace device. Section 638.53 provides for oral application and oral approval of same.

            “‘Trap and trace device’ means a device or process that captures the incoming electronic or other impulses that identify the originating number or other dialing, routing, addressing, or signaling information reasonably likely to identify the source of a wire or electronic communication, but not the contents of a communication.” (Pen. Code, § 638.50(c).) “‘Wire communication’ and ‘electronic communication’ have the meanings set forth in subdivision (a) of Section 629.51.” (Id., § 638.50(a).) Section 629.51(a) defines “electronic communication” as “any transfer of signs, signals, writings, images, sounds, data, or intelligence of any nature in whole or in part by a wire, radio, electromagnetic, photoelectric, or photo-optical system.” (Id., § 629.51(a)(2).)  

II. Plaintiff’s Allegations

            Plaintiff alleges that when she visited Defendant’s website on January 7, 2024, Defendant deployed the TikTok Software “to identify Plaintiff using electronic impulses generated from Plaintiff’s device.” (Compl. ¶ 2.) Specifically, the TikTok Software allegedly “identif[ies] the source of electronic communication[s] by capturing incoming electronic impulses and identifying dialing, routing, addressing, and signaling information generated by users.” (Id., ¶ 17.) The complaint alleges that “the software is designed to capture the phone number, email, routing, addressing and other signaling information of website visitors.” (Id., ¶ 26.) Defendant did not obtain Plaintiff’s consent or a court order to use the TikTok Software to track Plaintiff on her visit to Defendant’s website on January 7, 2024. (Id., ¶¶ 19-20.)

            On its face, the complaint alleges the two elements necessary to establish a violation of Penal Code section 638.51: (i) Defendant installed a prohibited device (pen register or trap and trace) (ii) without a court order. (See Pen. Code, § 638.51(a); Greenley v. Kochava, Inc. (S.D.Cal. 2023) 684 F. Supp. 3d 1024, 1050-51.)

III. Application to Software

            Defendant argues that section 638.51 is “intended to regulate physical trap and trace devices attached to telephone lines, and . . . does not apply to standard website data collection.” (Dem. 9:27-28.) Defendant contends that a whole reading of the statute reveals this intention, citing to In re United States (C.D.Cal. 1995) 885 F.Supp. 197 (Digital Analyzer).

In that case, law enforcement applied for the use of a “cellular telephone digital analyzer” on the phones of subjects in a criminal investigation. (Digital Analyzer, supra, 885 F.Supp. 197 at pp. 198-99.) This digital analyzer would “detect the electronic serial number (‘ESN’) assigned to a particular cellular telephone, the telephone number of the cellular telephone itself, and the telephone numbers called by the cellular telephone.” (Id. at p. 199.)

            The district court held that an application was not required because “[n]umbers dialed by a telephone are not the subject of a reasonable expectation of privacy, and their interception does not violate the 4th Amendment.” (Digital Analyzer, supra, 885 F.Supp. 197 at p. 199.) The court further found that “the prohibitions against the use of pen registers and trap and trace devices (in 18 U.S.C. § 3121) without court order [did not] appear to apply to the proposed use of digital analyzers to detect non-communicative signals.” (Ibid.) The court reasoned that although “[t]he statutory definition of a ‘trap and trace device’ does not include the limitation in the definition of a pen register described above, limiting the devices to those that are attached to a telephone line[,] . . . it appears from the construction of related sections of the statutes governing trap and trace devices that they include only devices that are attached to a telephone line.” (Id. at p. 200.) “Specifically, 18 U.S.C. § 3123(b) requires that an order for use of both pen registers and trap and trace devices include ‘the number and, if known, physical location of the telephone line to which the pen register or trap and trace device is to be attached.’” (Ibid.)

            CIPA contains an analogous provision in Penal Code section 638.52(d)(3), requiring a court order authorizing the use of a pen register or trap and trace device to specify, if known, the “physical location of the telephone line to which the pen register or trap and trace device is to be attached.” Defendant argues that this provision “evidence[s] a clear legislative intent to apply only to physical devices capable of recording telephone numbers, not IP addresses or other similar device information.” (Dem. 10:28-11:3.)

            However, neither CIPA nor the modern version[1] of the federal statutes cited in Digital Analyzer limit the definition of “pen register” or “trap and trace device” to physical devices attached to telephone lines. Instead, these provisions currently define pen register and trap and trace as a “device or process” without referencing physical attachment to anything. (See Pen. Code, § 638.50; 18 U.S.C. § 3127.) And as pertinent here, a trap and trace device is broadly defined as a “device or process that captures the incoming electronic or other impulses that identify the originating number or other dialing, routing, addressing, or signaling information reasonably likely to identify the source of a wire or electronic communication.” (Pen. Code, § 638.50(c).) “Electronic communication” is itself broadly defined as “any transfer of signs, signals, writings, images, sounds, data, or intelligence of any nature in whole or in part by a wire, radio, electromagnetic, photoelectric, or photo-optical system.” (Id., § 629.51(a)(2).)

            Digital Analyzer, decided in 1995, could not have accounted for modern advancements in technology or the statutory amendments that took place after 1995, broadening the definitions of “pen register” and “trap and trace device.” A plain reading of the modern definitions shows that they are not limited to physical devices attached to telephone lines. “[T]he Court cannot ignore the expansive language in the California Legislature's chosen definition.” (Greenley, supra, 684 F.Supp. 3d at p. 1050.) “A process can take many forms. Surely among them is software that identifies consumers, gathers data, and correlates that data through unique ‘fingerprinting.’” (Ibid.) Greenley, cited by Plaintiff, is more on point because it concerns the precise statutory provision at issue here, Penal Code section 638.51. Furthermore, like this case, Greenley concerns the sufficiency of a civil complaint seeking recovery for illegal usage of a pen register or trap and trace device. By contrast, Digital Analyzer concerned an application by law enforcement to use a pen register or trap and trace device under federal law.   

Given the realities of modern technology and the broadened definitions of “pen register” and “trap and trace device,” the Court is not convinced that a single provision governing ex parte orders to authorize the use of such devices (Pen. Code, § 638.52(b), (d)) limits application of the whole law to physical devices on a telephone line. If that were the case, the Legislature would not have defined “trap and trace device” with reference to “a wire or electronic communication.” (See Pen. Code, § 638.50(c).) If a trap and trace device must be attached to a telephone line, there would be no reason to include “electronic communication”—which encompasses a broad range of transfers plainly not limited to telephone lines—as part of its definition. Therefore, the Court agrees with Plaintiff and Greenley that software can be a “process” that constitutes a pen register or trap and trace device if it accomplishes the type of tracking defined in section 638.50.    

            Defendant attempts to distinguish Greenley on the fact that in Greenley, the offending software was still “installed in a telephone.” (See Greenley, supra, 684 F.Supp. 3d at p. 1050.) By contrast, the complaint here alleges that the TikTok Software was installed on Defendant’s website and only began tracking upon Plaintiff’s visit to the website. (Compl. ¶¶ 11-14.) However, as the court in Greenley acknowledged, “courts should focus less on the form of the data collector and more on the result.” (Greenley, supra, 684 F.Supp. 3d at p. 1050.) The plaintiff in Greenley sufficiently alleged that the pen register allowed the defendant to “surreptitiously intercept location data from an app user,” “‘fingerprinting’ each unique device and user, as well as connecting users across devices and devices across users,” and collecting geolocation data, search terms, click choices, purchase decisions and/or payment methods. (Id. at p. 1035.) Similarly, Plaintiff has alleged that the TikTok Software collects data in a manner meeting the definition of “trap and trace device” under section 638.50(c). (See Compl. ¶¶ 1-2, 12-15, 26.) 

            Defendant’s argument is also contradicted by the plain language of the statute, which states that “a person may not install or use” a trap and trace device without a court order. (Pen. Code, § 638.51(a).) Embedding software on a website that conducts the type of tracking defined in section 638.50(c) constitutes the “use” of a trap and trace device. Nothing in the statute suggests that “use” is limited to installation on a telephone. If that were the case, the Legislature would not have used the phrase “install or use.” (See Kray Cabling Co. v. County of Contra Costa (1995) 39 Cal.App.4th 1588, 1593 [“The use of this disjunctive reflects a legislative intent that either event, standing alone, may trigger the statute”].)

            In sum, the Court finds that Plaintiff has pled sufficient facts to support a reasonable inference that Defendant utilized a trap and trace device to track Plaintiff’s information without a court order in violation of Penal Code section 638.51.

IV. Absurd Result

            Defendant argues that Plaintiff’s position would subject every website to liability because websites necessarily gather certain information, such as IP addresses, in order to simply function. Defendant argues that website visitors necessarily consent to sharing their IP addresses. Defendant cites to Licea v. Hickory Farms LLC, 2024 WL 1698147, at *4, where the court viewed the plaintiff’s interpretation of the law “as one rendering every single entity voluntarily visited by a potential plaintiff, thereby providing an IP address for purposes of connecting the website, as a violator.” The court noted that “nothing in the complaint establishes an IP address as equivalent to the ‘unique fingerprinting’ relied upon by the Southern District when finding embedded software into a mobile phone, thereby providing unique location and other information normally within the domain of law enforcement officers with a warrant.” (Id., at *3.) 

            By contrast, the allegations here suggest that the TikTok Software tracks data beyond that which is necessary for the proper functioning of a website. (See Compl. ¶¶ 1-2, 12-15, 26.) Unlike the complaint in Licea, the complaint here alleges that the TikTok Software gathers unique location information and other information besides IP addresses. (Ibid.) Plaintiff alleges that she did not consent to the collection of such data. (Id., ¶ 19.) “If merely visiting a website constitutes consent to the use of a [trap and trace device], then Section 638.51(a) would be a dead letter. It could never be violated. That is not an acceptable consequence.” (Levings v. Choice Hotels Intern., Inc., 2024 WL 1481189, at *2.)

Because Plaintiff has alleged that the TikTok Software collects data beyond that which is necessary for the proper functioning of a website, Plaintiff is not attempting to subject every website to liability for simply existing. On the other hand, it would be absurd if simply visiting a website waived any violation of section 638.51, thereby rendering all websites immune from prosecution. Therefore, the Court finds that Plaintiff has pled sufficient ultimate facts to support a violation of section 638.51. (See Levings, supra, 2024 WL 1481189, at *2.)       

V. Consent by “User”

            “A provider of electronic or wire communication service may use a pen register or a trap and trace device for any of the following purposes: . . . (5) If the consent of the user of that service has been obtained.” (Pen. Code, § 638.51(b)(5).)

            Defendant argues that it is the “user” of the TikTok Software, and it has clearly consented to the use of the TikTok Software on its website. However, In re Doubleclick Privacy Litig. (S.D.N.Y. 2001) 154 F.Supp.2d 497, cited by Defendant, is distinguishable because that case concerned a federal statute that included a specific definition of “user” which plainly applied to website operators. (Id. at pp. 508-09.) The consent exception itself was also different, applying “with respect to a communication of or intended for that user.” (Id. at p. 507.) By contrast, the CIPA exception simply states “[i]f the consent of the user of that service has been obtained.” (Pen. Code, § 638.51(b)(5).) The statute does not define “user” or “service,” and Defendant cites no law interpreting either term in the context of CIPA.  

Defendant’s argument would mean that no visitor to a website utilizing trap and trace software could ever have a viable claim because every operator of such a website necessarily consents to the use of the software on its own website. As pointed out in Levings, an interpretation wherein section 638.51 “could never be violated” is “not an acceptable consequence.” (Levings, supra, 2024 WL 1481189, at *2.)       

Given CIPA’s express purpose to “protect the right of privacy of the people of this state” (Pen. Code, § 630), it would be absurd that a website operator who utilizes a trap and trace device to track an individual’s information can “consent” to the use of such device, and thereby escape liability, even though the individual whose privacy is being invaded has not consented.

            Defendant argues that unless its interpretation is adopted, normal functions such as recording IP addresses or caller ID would be criminalized because that information is always recorded without obtaining the consent of each individual website visitor or incoming caller. However, as discussed above, Plaintiff alleges that the TikTok Software collects data beyond that which is necessary for ordinary operation. Regardless of whether website visitors and telephone callers necessarily consent to the collection of their IP addresses and caller IDs, Plaintiff has sufficiently alleged that she has not consented to the type of tracking conducted by the TikTok Software, which goes beyond IP addresses and caller IDs.  

For pleading purposes, it may be reasonably inferred that Defendant, as a website operator, is the “provider of electronic or wire communication service,” and Plaintiff is the “user of that service.” (See Pen. Code, § 638.51(b)(5).) Because Plaintiff alleges that she did not provide her consent to have her information tracked by a trap and trace device, the exception in section 638.51(b)(5) does not apply.    

 

VI. Private Right of Action

            Defendant argues that section 638.51 does not provide for a private right of action. This is correct, because the private right of action is provided in section 637.2(a), which states that “[a]ny person who has been injured by a violation of this chapter may bring an action against the person who committed the violation.” Defendant contends that section 637.2 “does not afford a carte blanche private right of action for all purported CIPA violations.” (Dem. 18:11-14.) However, on its face, section 637.2(a) provides a right of action for any “violation of this chapter.” Absent authority to the contrary, the Court assumes that “a violation of this chapter,” as used in section 637.2(a), includes a violation of section 638.51. Thus, an individual who has suffered a violation of section 638.51 may maintain a civil action under section 637.2.

Defendant contends that Plaintiff has not alleged an injury-in-fact. However, the allegations, when read as a whole and interpreted liberally, support a reasonable inference that Plaintiff had her information tracked without her consent, thus resulting in harm to her personal autonomy. (See Davis v. Facebook, Inc. (In re Facebook Inc. Internet Tracking Litig.) (9th Cir. 2020) 956 F.3d 589, 598 [“A right to privacy ‘encompass[es] the individual's control of information concerning his or her person’”].) “It is not a necessary prerequisite to an action pursuant to this section that the plaintiff has suffered, or be threatened with, actual damages.” (Pen. Code, § 637.2(c).) Thus, for pleading purposes, Plaintiff has adequately alleged an injury as required by section 637.2(a).

CONCLUSION

            Defendant’s demurrer is OVERRULED.

             



[1] The federal definition of “pen register” was amended in 2001 to remove the reference to attachment to telephone lines and replaced with the broader definition of “a device or process which records or decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted.” (18 U.S.C. § 3127(3).) The definition of “trap and trace device” was amended to include the phrase “or process.” (Id., § 3127(4).)