Judge: Upinder S. Kalra, Case: 23STCV16165, Date: 2024-02-07 Tentative Ruling
Case Number: 23STCV16165 Hearing Date: February 7, 2024 Dept: 51
Tentative Ruling
Judge Upinder S.
Kalra, Department 51
HEARING DATE: February
7, 2024
CASE NAME: Jose
J. Licea v. Globecast America Incorporated
CASE NO.: 23STCV16165
DEMURRER
TO FIRST AMENDED COMPLAINT; MOTION TO STRIKE
MOVING PARTY: Defendant
Globecast America Incorporated
RESPONDING PARTY(S): Plaintiff Jose J. Licea
REQUESTED RELIEF:
1. Demurrer
to the entire First Amended Complaint for failure to state sufficient facts to
constitute a cause of action and for uncertainty.
2. Motion
to Strike various portions of the First Amended Complaint that pertain to
punitive damages and attorneys’ fees.
TENTATIVE RULING:
1. Defendant’s
Demurrer is SUSTAINED as to the Second Cause of Action with leave to amend;
2. Defendant’s
Demurrer is OVERRULED as to the First, Third, Fourth, and Fifth Causes of
Action;
3. Defendant’s
Motion to Strike is GRANTED with leave to amend.
STATEMENT OF MATERIAL FACTS AND/OR PROCEEDINGS:
On July 11, 2023, Plaintiff Jose J. Licea (Plaintiff) filed
a Complaint against Defendant Globecast America Incorporated d/b/a
Globecast.com (Defendant) with five causes of action for: (1) California
Unauthorized Access to Computer Data Act Penal Code Section 502; (2) California
Invasion of Privacy Act Penal Code Section 630-638; (3) California Invasion of
Privacy; (4) Intrusion Upon Seclusion; and (5) Publication of Private
Information.
On October 24, 2023, Plaintiff filed the operative First
Amended Complaint (FAC) with five causes of action for: (1) Comprehensive
Computer Data and Access Fraud Act Penal Code Section 502; (2) California
Invasion of Privacy Act Penal Code Section 638.51; (3) California Invasion of
Privacy; (4) Intrusion Upon Seclusion; and (5) Publication of Private
Information.
According to the FAC, Defendant uses spyware on its website
to obtain user data in real-time and share it with others. Plaintiff is a
consumer privacy advocate who works as a tester to ensure that companies abide
by the privacy obligations imposed by federal law.
On December 26, 2023, Defendant filed the instant demurrer
and motion to strike. On January 25, 2024, Plaintiff filed oppositions. On
January 31, 2024, Defendant filed replies.
LEGAL STANDARD:
Request
for Judicial Notice
The court grants Defendant’s request
for judicial notice as to Exhibit A and Exhibit B. (Evid. Code § 452(d), (h);
See Kalnoki v. First American
Trustee Servicing Solutions, LLC (2017) 8 Cal.App.5th 23,37.) However, the
court only takes judicial notice of the foregoing documents only as to “the
existence, content and authenticity of public records and other specified
documents”; it does not take judicial notice of the truth of the factual
matters asserted in those documents. (Dominguez
v. Bonta (2022) 87 Cal. App. 5th 389, 400.)¿¿The court denies Plaintiff’s
request for judicial notice.
Demurrer
A demurrer for sufficiency tests whether the complaint states
a cause of action.¿(Hahn v. Mirda¿(2007)
147 Cal.App.4th 740, 747.) When considering demurrers, courts read the
allegations liberally and in context.¿In a demurrer proceeding, the defects
must be apparent on the face of the pleading or via proper judicial notice.¿(Donabedian v. Mercury Ins. Co. (2004)
116 Cal.App.4th 968, 994.)¿“A demurrer tests the pleadings alone and not the
evidence or other extrinsic matters. …. The only issue involved in a demurrer
hearing is whether the complaint, as it stands, unconnected with extraneous
matters, states a cause of action.”¿(Hahn¿147
Cal.App.4th at 747.)
Motion
to Strike
The court may, upon a motion, or at any time in its
discretion, and upon terms it deems proper, strike any irrelevant, false, or
improper matter inserted in any pleading. (CCP § 436(a).) The court may also
strike all or any part of any pleading not drawn or filed in conformity with
the laws of this state, a court rule, or an order of the court. (Id., § 436(b).) The grounds for moving
to strike must appear on the face of the pleading or by way of judicial notice.
(Id.¿§¿437.)¿“When the defect which
justifies striking a complaint is capable of cure, the court should allow leave
to amend.” (Vaccaro v. Kaiman¿(1998)
63 Cal.App.4th 761, 768.)¿
Meet
and Confer
Prior to filing a demurrer, the demurring party is required
to satisfy their meet and confer obligations pursuant to Code of Civ. Proc.
(CCP) §430.41 and demonstrate that they so satisfied their meet and confer
obligation by submitting a declaration pursuant to CCP §430.41(a)(2) & (3).
The meet and confer requirement also applies to motions to strike. (CCP §
435.5.) Here, Defendant refers to a supporting declaration indicating meet and
confer efforts, but the court does not find such a declaration included with
the moving papers. According to the notice in the Demurrer, the parties
exchanged emails on November 13, 15, and 27, 2023. It is unclear what the
parties discussed, if anything. As such, the court cannot determine if meet and
confer sufficiently occurred. Still, failure to meet and confer is not a
sufficient ground to overrule or sustain a demurrer. (CCP § 430.41(a)(4).)
ANALYSIS:
First Cause of
Action – Comprehensive Computer Data and Access Fraud Act, Penal Code § 502
Defendant contends that Plaintiff lacks standing to sue
because he has not alleged economic harm or loss and that Plaintiff failed to
allege that Defendant accessed his data without permission. Plaintiff argues
that his IP address holds value, that consent is an affirmative defense, and
that he has sufficiently alleged lack of consent.
Cal. Penal Code § 502(e) (Sec. 502) allows “civil action
against the violator [of subdivision c] for compensatory damages and injunctive
relief or other equitable relief.” Someone violates Sec. 502(c)(1) when they
“[k]nowingly accesses and without permission alters, damages, deletes,
destroys, or otherwise uses any data, computer, computer system, or computer
network in order to either (A) devise or execute any scheme or artifice to
defraud, deceive, or extort, or (B) wrongfully control or obtain money, property,
or data.” Someone violates Sec. 502(c)(2) when they “[k]nowingly accesses and
without permission takes, copies, or makes use of any data from a computer,
computer system, or computer network, or takes or copies any supporting
documentation, whether existing or residing internal or external to a computer,
computer system, or computer network.”
For purposes of Sec. 502:
·
“Access” means to gain entry to, instruct,
cause input to, cause output from, cause data processing with, or communicate
with, the logical, arithmetical, or memory function resources of a computer,
computer system, or computer network. (502(b)(1))
·
“Data” means a representation of
information, knowledge, facts, concepts, computer software, or computer
programs or instructions. Data may be in any form, in storage media, or as
stored in the memory of the computer or in transit or presented on a display
device. (502(b)(8))
·
“Injury” means any alteration, deletion,
damage, or destruction of a computer system, computer network, computer
program, or data caused by the access, or the denial of access to legitimate
users of a computer system, network, or program. (502(b)(10))
The statute does not define “without permission.” While the
court is unaware of any California authority interpreting § 502, one federal
court interpreted it in the context of continued access after receiving a
letter rescinding permission (Facebook,
Inc. v. Power Ventures, Inc., (2016) 844 F.3d 1058), others say that
circumventing technical or code-based barriers in place to restrict a user’s
access may be sufficient (West v.
Ronquillo-Morgan (2020) 526 F.Supp.3d 737; Williams v. Facebook, Inc. (2018) 384 F.Supp.3d 1043), and others
do not require such technical circumvention but apply a plain meaning to the
phrase (Greenley v. Kochava, Inc.
2023 WL 4833466).
Upon reviewing the FAC, Plaintiff has sufficiently alleged
facts supporting a cause of action for violation of Section 502(c)(2). First, Plaintiff
alleges that Defendant “obtained the IP address of Plaintiff,” “match[ed]
Plaintiff’s IP address with Plaintiff’s name, face, location, e-mail, and
browsing history,” and “embedded Plaintiff’s identity into LP’s [sic] extensive
‘gray market CAI database.” (FAC ¶ 21.) Second, Plaintiff alleges that as a
result of Defendant’s conduct “Plaintiff has been de-anonymized and plaintiff’s
personal information has been added to LF’s extensive database and shared with
thousands of companies,” “Plaintiff has been bombarded with targeted
advertising,” “Plaintiff can no longer surf the web anonymously,” and
“Plaintiff has been exposed to heightened risk of identity theft.” (FAC. ¶ 23.)
Third, Plaintiff alleges that he did not “provide authorization for the use of
Plaintiff’s personal information nor did Plaintiff have any control over its
use to produce revenue.” (FAC ¶ 34.) Taken together, this sufficiently alleges
a violation of Sec. 502(c)(2), which Plaintiff claims in the FAC. (FAC ¶ 29.)
Accordingly, the court OVERRULES the demurrer as to the
first cause of action.
Second Cause of
Action – California Invasion of Privacy Act, Penal Code § 638.51
Defendant contends Penal Code § 638.51 was intended to
protect against unlawful intrusions by law enforcement in the criminal context
and that Plaintiff consented to the collection of his information. Plaintiff
argues that a plain reading of Penal Code § 638.51 supports his interpretation
that the statute is not limited to law enforcement as “persons,” that the
legislative history does not limit the scope to law enforcement personnel, and
that Defendant’s consent argument lacks merit.
This statute prohibits any person from installing or using a
pen register (defined in Penal Code § 638.50(b)) or trap and trace device
(defined in Penal Code. § 638.50(c)) without first obtaining a court order. (Penal
Code § 638.51(a), (d)—good faith reliance on court order is complete defense to
civil or criminal action brought under this section.)
Upon reviewing the FAC, Plaintiff has not sufficiently
alleged a cause of action for violating Section 638.51. Notably, Plaintiff did
not allege that Defendant acted “without first obtaining a court order.” The
court is not otherwise persuaded, and declines to develop, Defendant’s argument
that Section 638.51 only applies to law enforcement.
Accordingly, the court SUSTAINS the demurrer as to the
second cause of action with leave to amend.
Third Cause of
Action & Fourth Cause of Action – California Invasion of Privacy &
Intrusion Upon Seclusion
Defendant contends that Plaintiff’s consent bars his claims
for invasion of privacy and intrusion upon seclusion. Plaintiff argues consent
is an affirmative defense and that Plaintiff has sufficiently alleges lack of
consent.
Generally, invasion of privacy requires: (1) a legally
protected privacy interest; (2) reasonable expectation of privacy under the
circumstances; and (3) defendant’s serious invasion of privacy. Four distinct
kinds of activities have been found to violate this privacy protection and give
rise to tort liability: (1) intrusion into private matters; (2) public
disclosure of private facts; (3) publicity placing a person in a false light;
and (4) misappropriation of a person’s name or likeness. To prevail on an invasion
of privacy claim, the plaintiff must have conducted himself or herself in a
manner consistent with an actual expectation of privacy. (Moreno v. Hanford Sentinel, Inc. (2009) 172 Cal.App.4th 1125, 1129;
Lachtman v. Regents of University of
California (2007) 158 Cal.App.4th 187, 213.)
Intrusion upon private affairs requires: (1) the defendant
must intentionally intrude into a place, conversation, or matter as to which
the plaintiff has a reasonable expectation of privacy; and (2) the intrusion
must occur in a manner highly offensive to a reasonable person. (Hernandez v. Hillsides, Inc. (2009) 47
Cal.4th 272, 286.)
Upon reviewing the FAC, Plaintiff has sufficiently alleged a
cause of action for invasion of privacy. First, Plaintiff alleges a privacy
interest in his web-browsing history and personal information. (FAC ¶ 48.)
Second, Plaintiff alleges that Defendant secretly accessed Plaintiff’s device,
gathering personal details about Plaintiff (IP address, name, face, location,
e-mail, browsing history) and facilitated the disclosure of this personal
information to third parties who did not have legal access to the information.
(FAC ¶¶ 21, 46, 47, and 50.)
Similarly, Plaintiff has also sufficiently alleged a cause
of action for intrusion upon seclusion. As above, Plaintiff alleges that
Defendant secretly accessed Plaintiff’s device, gathering personal details
about Plaintiff (IP address, name, face, location, e-mail, browsing history)
and facilitated the disclosure of this personal information to third parties
who did not have legal access to the information. (FAC ¶¶ 21, 46, 47, and 50.)
Second, Plaintiff alleges that Defendant mined his personal data and shared it
with hundreds of other companies. (FAC ¶ 55.) Third, Plaintiff alleges that a
reasonable person would be highly offended by Defendant’s actions of collecting
the information, de-anonymizing Plaintiff, and sharing it with unknown
companies without his consent. (FAC ¶¶ 59, 60, 61.)
Accordingly, the court OVERRULES the demurrer as to the
third and fourth causes of action.
Fifth Cause of
Action – Publication of Private Information
Defendant contends that Plaintiff failed to allege that
Defendant made a public disclosure, that IP addresses are not private facts, and
that Plaintiff consented to the disclosure of information. Plaintiff argues
that he alleged publication to hundreds of different companies, and that he has
a reasonable expectation of privacy in his IP address[1],
that he has sufficiently alleged such expectation of privacy, whether the
privacy invasion is highly offensive is a fact question for the jury, and the
consent argument lacks merit.
To establish tort liability for invasion of invasion of
privacy based on publication of private facts, “the plaintiff must plead and
prove (1) public disclosure (2) of a private fact (3) that would be offensive
and objectionable to the reasonable person and (4) is not of legitimate public
concern.” (Jackson v. Mayweather
(2017) 10 Cal.App.5th 1240, 1256.) The disclosure must be “be widely published
and not confined to a few persons or limited circumstances.” (Hill v. National Collegiate Athletic Assn’n (1994)
7 Cal.4th 1, 27; Catsouras v. Department
of Calif. Highway Patrol (2010) 181 Cal.App.4th 856, 904.)
Upon reviewing the FAC, Plaintiff has sufficiently alleged a
cause of action for publication of private facts. First, Plaintiff alleged that
Defendant shared Plaintiff’s personal information with hundreds of different
companies.[2]
(FAC ¶ 66.) Second, Plaintiff alleges that Defendant obtained Plaintiff’s IP
address, which lead to collecting Plaintiff’s name, face, location, e-mail, and
browsing history. (FAC ¶ 21.) Third, Plaintiff alleges that sharing and selling
this personal information would be highly offensive to a reasonable person.
(FAC ¶ 68.) Finally, while not explicitly alleged, it can be inferred from
reading the FAC completely and in context that Plaintiff’s browsing history and
IP address are not legitimately of public concern.
Accordingly, the court OVERRULES Defendant’s demurrer to
the fifth cause of action.
Motion to Strike
Defendant seeks to strike the following language from the
FAC:
1. Page
9, Lines 1-2: “punitive damages, and attorneys’ fees”
2. Page
10, Line 25: “oppression, fraud, or malice”
3. Page
10, Line 27: “punitive damages”
4. Page
11, Line 21: “oppression, fraud, or malice”
5. Page
11, Lines 22-23: “punitive damages”
6. Page
12, Line 9: “oppression, fraud, or malice”
7. Page
12, Line 12: “punitive damages”
8. Page
12, Line 15: “punitive damages, attorneys’ fees”
Defendant contends that Plaintiff has failed to sufficiently
allege facts supporting a claim for punitive damages. Defendant did not provide
argument challenging the attorneys’ fees.[3]
Plaintiff argues that punitive damages are recoverable pursuant to the alleged
statutory violations and for invasion of privacy.[4]
To obtain punitive damages, a plaintiff
must plead sufficient facts in support of punitive damages.¿ (See¿Hilliard v. A.H. Robins Co.¿(1983) 148
Cal.App.3d 374, 391-92.)¿ In addition,¿punitive damages are allowed only where
“it is proven by clear and convincing evidence that the defendant has been
guilty of oppression, fraud, or malice.”¿ (Civ. Code, § 3294,¿subd. (a).)¿
Courts have viewed despicable conduct as conduct “so vile, base, contemptible,
miserable, wretched or loathsome that it would be looked down upon and despised
by ordinary decent people. (Scott v.
Phoenix Schools, Inc., (2009) 175 Cal.App.4th 702, 715.)¿¿
¿¿
Further,
Civil Code § 3294(c) provides the definition of malice, oppression, and fraud.
Malice is “conduct which is intended by the defendant to cause injury to the
plaintiff or despicable conduct which is carried on by the defendant with a
willful and conscious disregard of the rights or safety of others.” Oppression
is “despicable conduct that subjects a person to cruel and unjust hardship in
conscious disregard of that person's rights.” Fraud is “an intentional
misrepresentation, deceit, or concealment of a material fact known to the
defendant with the intention on the part of the defendant of thereby depriving
a person of property or legal rights or otherwise causing injury.”¿
Upon reviewing the FAC, the court agrees with Defendant that
Plaintiff has not sufficiently alleged facts supporting a claim for punitive
damages. Reading the FAC in its entirety, the only factual allegations the
court finds are that Defendant “secretly installed spyware on its website,”
“shares” the various private information discussed above with other companies, and
did so without Plaintiff’s consent. (FAC ¶¶ 16, 18, 21.) Plaintiff does not
have factual allegations of malice, oppression, or fraud.
Accordingly, the court GRANTS Defendant’s motion to
strike as to the portions pertaining to punitive damages with leave to amend.
CONCLUSION:
For
the foregoing reasons, the Court decides the pending motion as follows:
1.Defendant’s Demurrer is
SUSTAINED as to the Second Cause of Action with 10 days leave to amend;
2.Defendant’s Demurrer is
OVERRULED as to the First, Third, Fourth, and Fifth Causes of Action;
3.Defendant’s Motion to Strike is
GRANTED with leave to amend.
Moving party is to give notice.
IT IS SO ORDERED.
Dated: February 7, 2024 __________________________________ Upinder
S. Kalra
Judge
of the Superior Court
[1]
Reliance on California’s Electronic Communications Privacy Act (ECPA) is
misplaced because it prohibits government entity activity.
[2]
The court rejects Defendant’s argument that 100 companies is not vast enough to
constitute the public. (See, e.g., Kinsey
v. Macur (1980) 107 Cal.App.3d 265, 272 [noting mailing letters to 20
people was sufficient public disclosure.])
[3]
As such, the court declines to develop that argument.
[4]
Section 502(4) provides that punitive damages may be available if a plaintiff
proves by clear and convincing evidence that the defendant has been guilty of
oppression, fraud, or malice.