From Casetext: Smarter Legal Research

Opperman v. Path, Inc.

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA
May 6, 2013
Case No. 13-cv-00453-JST (N.D. Cal. May. 6, 2013)

Opinion

Case No. 13-cv-00453-JST

05-06-2013

MARC OPPERMAN, et al., Plaintiffs, v. PATH, INC., et al., Defendants.


ORDER DENYING MOTIONS TO

SEVER WITHOUT PRJEUDICE

Before the Court are three motions to sever filed by Defendants Twitter, Inc., ECF No. 236, Electronic Arts, Inc. and Chillingo, Ltd., ECF No. 256, and Instagram, Inc., ECF No. 272. Pursuant to Civil Local Rule 7-1(b), the Court hereby finds these motions appropriate for resolution without oral argument, and therefore VACATES the motion hearings scheduled for May 9, 2013. In consideration of the moving papers and related briefing, the Court will deny the motions without prejudice.

I. ALLEGED FACTS

This proposed class action was filed on March 12, 2012, in the Western District of Texas, ECF No. 1. The Western District of Texas transferred the action to this Court on January 15, 2013. ECF No. 218.

The operative Second Amended Complaint ("SAC"), ECF No. 103, brings suit against Apple, Inc. and sixteen entities engaged in or owning an interest in entities engaged in the development of Applications ("Apps") installed on Plaintiffs' mobile devices, which are manufactured by Apple ("iDevices") and distributed via Apple's App Store. The original complaint was filed in response to news reports in February 2012, including a February 15, 2012 article reporting that "the Apps Foodspotting, Foursquare, Gowalla, Hipster, Instagram, Kik Messenger, Path, Twitter, Yelp!, and (via Defendant Chillingo's integrated Crystal platform) Angry Birds Classic and Cut the Rope . . . were engaged in surreptitiously transmitting iDevice owners' private, personal address book materials to unapproved recipients." Id. ¶ 5. The SAC alleges that each developer violated federal and state law because "the Apps made by Defendants stole their iDevice address books by surreptitiously initiating unnoticeable Internet calls with Plaintiffs' iDevices and transmitting their address books to unauthorized persons." SAC ¶ 2. The SAC defines the proposed class as follows:

Plaintiffs and all owners of iDevices who obtained Apps from Apple's App Store that without requesting the iDevice owner's prior consent initiated an unauthorized iDevice call following which the owner's address book materials were copied, uploaded, transmitted, and/or disclosed to others and/or remotely stored and/or otherwise remotely used by others, including any of the following Apps: Angry Birds Classic, Crystal, Cut the Rope, Foursquare, Foodspotting, Gowalla, Hipster, Kik Messenger, Instagram, Path, Twitter, or Yelp! (the "Class") and who were damaged thereby.
Id. ¶ 46.

A. Allegations Related to Apple

Plaintiffs allege that Apple designed, manufactured, marketed, and sold the iDevices at issue. Id. ¶ 84. Those iDevices are Apple's iPhone, iPad, and iPod Touch. Id. Each iDevice comes with certain pre-installed Apps, including the "Contacts" App, which makes it possible for users to store their address book contacts on their iDevices. Id. ¶ 89-92. The pre-installed App Store App is a central repository for marketing and distributing other Apps designed by Apple or third parties. Id. ¶ 93-95. In order to oversee the inclusion of third-party Apps in the App Store, Apple created the iOS Developer Program; App developers pay a fee in order to participate in the program, and if they charge users for their Apps, Apple charges them thirty percent of App revenue. Id. ¶ 98. The only way to obtain a third party App on an iDevice is to use the App Store. Id. ¶ 102.

Not all Apps submitted by third party developers make it onto the App store. Apple's iOS Developer Program functions as Apple's "testing, review and legal clearance process." Id. ¶ 105. Through that program, Apple promulgated standards and guidelines by which App developers must comply in order to distribute Apps through Apple's App Store. Id. ¶ 105-08. Plaintiffs allege that Apple "purports to review every app on the App Store based on a set of technical, content, and design criteria, as well as for reliability, offensive material, malware and privacy issues." Id. ¶ 114.

Through the program, Apple also provides "editing software, simulators, forums, guides, design and Approval criteria, code, code resources and libraries, performance enhancing tools, testing software, and mentoring via access to Apple engineers who 'provide ... code-level assistance, helpful guidance, [and] point [the developer] towards the Appropriate technical documentation to fast-track [his/her] development process.'" Id. ¶ 111. Plaintiffs allege that, while Apple promises consumers that its operating system protects their privacy, "Apple's tutorials and developer sites specifically teach App developers how to code and create Apps that non-consensually access, manipulate, alter, use and upload the address book maintained on an owner's iDevice." Id. ¶ 112. Nevertheless, Apple's program guidelines state that "Private data - like address books - may not be obtained without the users' consent." Id. ¶ 118.

Plaintiffs allege that Apple has represented to its users that apps such as those discussed in the SAC would respect users' privacy: "Apple assures consumers such as Plaintiffs that Apps from Apple's 'curated App Store' are 'rigorous[ly] review[ed],' tested for compliance with numerous guidelines, and do not 'suck up consumers' private information.' During a September 2008 public presentation, Apple CEO Steve Jobs similarly stated, albeit falsely in retrospect, that the App Store was not going to distribute malicious apps or apps 'that invade your privacy' and that the App Store supposedly provided Plaintiffs and consumers, 'freedom from programs that steal your private data [and] freedom from programs that trash your battery.'" Id. ¶ 127. As part of those representations, Plaintiffs allege that Apple tells its developers that "the Address Book database is ultimately owned by the user." Id. ¶ 129.

In contrast, according to the SAC, Apple's guidelines for designing apps, called iOS Human Interface Guidelines, encourage developers to steal users' private data without consent; the guidelines tell developers, for example, that "[w]hen it makes sense, don't force people to give you information you can easily find for yourself, such as their contacts or calendar information." Id. ¶ 133. The guidelines also allegedly tell developers: "If possible, avoid requiring users to indicate their agreement to your EULA [End User License Agreement] when they first start your application." Id.

The SAC alleges that Apple failed in its review process to exclude apps that surreptitiously steal users' private address books, and that it has failed to disclose the vulnerabilities in its operating system that make the theft possible. Id. ¶ 136-37.

B. Allegations Related to Twitter

The SAC alleges that Defendant Twitter, Inc. authored the "Twitter" app, "with Apple providing assistance through the App iOS Developer Program and a digital certificate for the App to function on iDevices. Following Apple's review, Apple released and distributed the Twitter App on the App Store." Id. ¶ 231. The plaintiffs who installed Twitter on their iDevices allege that the app presented them with a "Welcome" screen prompting them to "Follow your friends" by pressing an on-screen button, under which was written in small type: "Scan your contacts for people you already know on Twitter." Id. ¶ 232. "Plaintiffs recall no alerts or warnings that their address books were being taken." Id. ¶ 234. Plaintiffs allege that Twitter itself has disclosed that "prior to February 2012, when Twitter App users tapped the ["Follow your friends"] button-bar, their iDevice silently made a call over the internet and the Twitter App then uploaded all email addresses and phone numbers from the iDevice owner's address book to Twitter's servers, where Twitter used, stored and planned to keep those materials for up to eighteen months, likely in unsecure plain text." Id. ¶ 235. Following reports in February 2012 that the Twitter app functioned in this manner, Twitter amended its welcome screen to include a warning telling users: "We will securely upload your contacts to help you find friends and suggest users to follow on Twitter." Id. ¶ 237.

C. Allegations Related to the Other App Developers

Plaintiffs make substantially similar allegations with respect to moving Defendants Electronic Arts, Inc. and Chillingo, Ltd. based on their apps "Cut the Rope" and "Angry Birds Classic," and Instagram, Inc., based on its app, "Instagram." Plaintiffs allege that each app contained a "Find Friends" feature, and that each app uploaded users' address books without consent.

D. Causes of Action

The SAC contains the following causes of action: invasion of privacy, misappropriation, conversion, trespass to personal property and/or chattels, misappropriation of trade secrets and proprietary information, negligence, violation of the Electronic Communications Privacy Act ("ECPA"), 18 U.S.C. § 2510, violation of the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, violation of the Racketeer Influenced and Corrupt Organizations Act ("RICO"), 18 U.S.C. §§ 1343, 2314 via wire fraud, 18 U.S.C. § 1343, and transportation of stolen property, 18 U.S.C. § 2314, aiding and abetting as to Apple, aiding and abetting as to Defendant Facebook, Inc., and unjust enrichment. The SAC also alleges violation of the Texas statutory prohibition of theft of property, Tex. Penal Code § 31.03, violation of the Theft Liability Act, Tex. Civ. P & Rem. Code §134.001, and violation of the Texas Wiretap Acts, Tex. Code Crim. Proc. Art. 18.20, § 1(3) and Tex. Pen. Code § 16.02(A). Finally, Plaintiffs allege violation of California Penal Code § 502 and violation of the California Wiretap Act, Cal. Penal Code § 630. Plaintiffs also pray for a constructive trust, a declaratory judgment, and injunctive relief.

II. LEGAL STANDARD

Federal Rule of Civil Procedure 21 authorizes district courts to, on its own motion or motion by a party, "on just terms," sever any claim against a party. In evaluating motions to sever pursuant to Rule 21, courts look to Rule 20 for guidance. Bias v. Wells Fargo & Co., No. 12-cv-664-YGR, 2012 WL 2906664, at *2 (N.D. Cal. July 13, 2012). Under Rule 20(a)(2), permissive joinder of defendants is proper if: "(A) any right to relief is asserted against them jointly, severally, or in the alternative with respect to or arising out of the same transaction, occurrence, or series of transactions or occurrences; and (B) any question of law or fact common to all defendants will arise in the action." Fed. R. Civ. P. 20(a)(2). Even when these requirements are met, courts may employ their broad discretion to sever in order "to protect a party against embarrassment, delay, expense, or other prejudice that arises from including a person against whom the party asserts no claim and who asserts no claim against the party." Fed. R. Civ. P. 20(b). See United States v. Testa, 548 F.2d 847, 856 (9th Cir. 1977).

Under the joinder rules, "the impulse is toward entertaining the broadest possible scope of action consistent with fairness to the parties; joinder of claims, parties and remedies is strongly encouraged." United Mine Workers of Am. v. Gibbs, 383 U.S. 715, 724 (1966). Rule 20's authorization of permissive joinder "is to be construed liberally in order to promote trial convenience and to expedite the final determination of disputes, thereby preventing multiple lawsuits." League to Save Lake Tahoe v. Tahoe Reg'l Planning Agency, 558 F.2d 914, 917 (9th Cir. 1977).

III. ANALYSIS

The moving Defendants based their motions on substantially identical arguments. They characterize this action as an unmanageable suit against over a dozen defendants based on eleven apps related to each other only by their distribution through Apple's App Store. Defendants analogize this case to a personal injury suit against Wal-Mart and the manufacturers of a variety of sporting goods, such as a fishing rod, a basketball, a camping tent, a yoga mat, and a baseball mat, "even though the nature of the items is entirely different and the items were manufactured by different companies, used in different ways at different times, and involved injuries to different people." ECF No. 278 p. 5.

In contrast, Plaintiffs characterize their claims against Apple and the app developer Defendants as inseparable because "[l]ike conjoined twins, they are tied at the hip in this matter." ECF No. 298. Plaintiffs argue that each app developer and Apple are joint tortfeasors because they "assisted, collaborated, and conspired with one another and mutually benefited from their wrongful, harmful acts." Plaintiffs point to their allegations that: Plaintiffs obtained each app from Apple; Apple approved and released each app over the App Store; each app was created using Apple-supplied tools, code, components, and certificates; the app developers were bound by Apple's app design guidelines; and each app collected Plaintiffs' address books from Plaintiffs' iDevices in violation of Apple's standards and agreements. In Plaintiffs' view, although the app developers are liable independent of one another, each one is jointly liable with Apple, and that relationship justifies joinder. Plaintiffs also point to the transfer order issued by the Western District of Texas, based in part on the fact that similar class actions are pending in this district, in which the transferee court observed: "To try this case separately virtually guarantees a waste of judicial resources, and risks inconsistent rulings." ECF No. 217 p. 7.

None of the cases cited by the parties are factually analogous to the instant one. Defendants point to a variety of cases where the plaintiffs did not allege joint and several liability. For example, in EIT Holdings LLC v. Yelp!, Inc., 10-cv-05623-WHA, 2011 WL 2192820, at *1 (N.D. Cal. May 12, 2011), the plaintiff named nine defendants alleged to have infringed on the same two patents. They were not "alleged to have acted in concert to infringe plaintiff's asserted patent." Similarly, in San Francisco Tech., Inc. v. Adobe Sys. Inc., 10-cv-01652-RS, 2010 WL 1640397, at *1 (N.D. Cal. Apr. 19, 2010), the plaintiff sued fourteen unrelated companies for allegedly marking products with expired patent numbers, in violation of 35 U.S.C. § 292. The plaintiff did not allege any connection among the defendants. Defendants' reliance on Bias v. Wells Fargo & Co., No. 12-cv-664-YGR, 2012 WL 2906664, at *2-3 (N.D. Cal. July 13, 2012), is also misplaced. Id. ("There are no allegations of any conspiracy, concerted action, or RICO enterprise as between the Defendants groups.").

Defendants also cite several decisions finding misjoinder where copyright holders have sued dozens of defendants for downloading copyrighted works independently. See, e.g., AF Holdings LLC v. Does 1-97, No. 11-cv-03067-CW, 2011 WL 2912909, at *2-3 (N.D. Cal. July 20, 2011) ("Attempts to join numerous defendants in a single action for copyright infringement over P2P networks historically have failed."). Those decisions hold only that, absent an allegation that any of the downloading defendants downloaded from one another, there cannot be a common transaction or occurrence.

Plaintiffs do not point to any analogous decisions either, but their allegations, evaluated now at the pleading stage, make clear that they allege joint and several liability against Apple and each app developer arising out of a common transaction or occurrence: Apple's role in marketing, testing, reviewing, and distributing the subject apps. That allegation satisfies the first requirement of Rule 20(a)(2). See Hubbard v. Hougland, No. 09-cv-0939, 2010 WL 1416691, at *7 (E.D. Cal. Apr. 5, 2010) ("The 'same transaction' requirement of Rule 20 refers to 'similarity in the factual background of a claim; claims that arise out of a systematic pattern of events' and have a 'very definite logical relationship.'" (quoting Bautista v. Los Angeles Cnty., 216 F.3d 837, 842-843 (9th Cir.2000)).

Plaintiffs' case against each app developer will also necessarily involve common questions of fact and law with respect to Apple, satisfying the second requirement for permissive joinder. The Court finds that the requirements of Rule 20(a)(2) have been met, and that the moving Defendants have failed to make a showing of prejudice. The motions to sever are denied without prejudice. Defendants may renew their motions at a later date if subsequent developments in the case make severance more appropriate.

For the foregoing reasons, Defendants Twitter, Inc., Electronic Arts, Inc., Chillingo, Ltd., and Instagram, Inc.'s motions to sever are hereby DENIED without prejudice.

IT IS SO ORDERED.

____________

JON S. TIGAR

United States District Judge


Summaries of

Opperman v. Path, Inc.

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA
May 6, 2013
Case No. 13-cv-00453-JST (N.D. Cal. May. 6, 2013)
Case details for

Opperman v. Path, Inc.

Case Details

Full title:MARC OPPERMAN, et al., Plaintiffs, v. PATH, INC., et al., Defendants.

Court:UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA

Date published: May 6, 2013

Citations

Case No. 13-cv-00453-JST (N.D. Cal. May. 6, 2013)