Joffe v. Google, Inc.

Decision Date10 September 2013
Docket NumberNo. 11–17483.,11–17483.
Citation729 F.3d 1262
PartiesBenjamin JOFFE; Lilla Marigza; Rick Benitti; Bertha Davis; Jason Taylor; Eric Myhre; John E. Redstone; Matthew Berlage; Patrick Keyes; Karl H. Schulz; James Fairbanks; Aaron Linsky; Dean M. Bastilla; Vicki Van Valin; Jeffrey Colman; Russell Carter; Stephanie Carter; Jennifer Locsin, Plaintiffs–Appellees, v. GOOGLE, INC., Defendant–Appellant.
CourtU.S. Court of Appeals — Ninth Circuit

OPINION TEXT STARTS HERE

Michael H. Rubin (argued), David H. Kramer, Brian M. Willen, and Caroline E. Wilson, Wilson Sonsini Goodrich & Rosati Professional Corporation, Palo Alto, CA, for DefendantAppellant.

Elizabeth J. Cabraser (argued), and Jahan C. Sagafi, Lieff, Cabraser, Heimann & Bernstein, LLP, San Francisco, CA; Kathryn E. Barnett, Lieff, Cabraser, Heimann & Bernstein, LLP, Nashville, TN; Jeffrey L. Kodroff, John A. Macoretta, and Mary Ann Giorno, Spector Roseman Kodroff & Willis, P.C., Philadelphia, PA; Daniel A. Small and David A. Young, Cohen Milstein Sellers & Toll, PLLC, Washington, D.C., for PlaintiffsAppellees.

Marc Rotenberg, Alan Butler, and David Jacobs, Electronic Privacy Information Center, Washington, D.C., for Amicus Curiae Electronic Privacy Information Center.

Appeal from the United States District Court for the Northern District of California, James Ware, District Judge, Presiding. D.C. No. 5:10–md–02184–JW.

Before: A. WALLACE TASHIMA and JAY S. BYBEE, Circuit Judges, and WILLIAM H. STAFFORD, Senior District Judge.*

OPINION

BYBEE, Circuit Judge:

In the course of capturing its Street View photographs, Google collected data from unencrypted Wi–Fi networks. Google publicly apologized, but plaintiffs brought suit under federal and state law, including the Wiretap Act, 18 U.S.C. § 2511. Google argues that its data collection did not violate the Act because data transmitted over a Wi–Fi network is an “electronic communication” that is “readily accessible to the general public” and exempt under the Act. 18 U.S.C. § 2511(2)(g)(i). The district court rejected Google's argument. In re Google Inc. St. View Elec. Commc'ns Litig., 794 F.Supp.2d 1067, 1073–84 (N.D.Cal.2011). We affirm.

I. BACKGROUND
A. Facts and History

Google launched its Street View feature in the United States in 2007 to complement its Google Maps service by providing users with panoramic, street-level photographs. Street View photographs are captured by cameras mounted on vehicles owned by Google that drive on public roads and photograph their surroundings. Between 2007 and 2010, Google also equipped its Street View cars with Wi–Fi antennas and software that collected data transmitted by Wi–Fi networks in nearby homes and businesses. The equipment attached to Google's Street View cars recorded basic information about these Wi–Fi networks, including the network's name (SSID), the unique number assigned to the router transmitting the wireless signal (MAC address), the signal strength, and whether the network was encrypted. Gathering this basic data about the Wi–Fi networks used in homes and businesses enables companies such as Google to provide enhanced “location-based” services, such as those that allow mobile phone users to find nearby restaurants and attractions or receive driving directions.

But the antennas and software installed in Google's Street View cars collected more than just the basic identifying information transmitted by Wi–Fi networks. They also gathered and stored “payload data” that was sent and received over unencrypted Wi–Fi connections at the moment that a Street View car was driving by.1 Payload data includes everything transmitted by a device connected to a Wi–Fi network, such as personal emails, usernames, passwords, videos, and documents.

Google acknowledged in May 2010 that its Street View vehicles had been collecting fragments of payload data from unencrypted Wi–Fi networks. The company publicly apologized, grounded its vehicles, and rendered inaccessible the personal data that had been acquired. In total, Google's Street View cars collected about 600 gigabytes of data transmitted over Wi–Fi networks in more than 30 countries.

Several putative class-action lawsuits were filed shortly after Google's announcement, and, in August 2010, the cases were transferred by the Judicial Panel on Multidistrict Litigation to the Northern District of California. In November, 2010, PlaintiffsAppellees (collectively Joffe) filed a consolidated complaint, asserting claims against Google under the federal Wiretap Act, 18 U.S.C. § 2511; California Business and Professional Code § 17200; and various state wiretap statutes. Joffe seeks to represent a class comprised of all persons whose electronic communications were intercepted by Google Street View vehicles since May 25, 2007.

Google moved to dismiss Joffe's consolidated complaint. The district court declined to grant Google's motion to dismiss Joffe's federal Wiretap Act claims.2In re Google Inc. St. View Elec. Commc'ns Litig., 794 F.Supp.2d at 1084. On Google's request, the court certified its ruling for interlocutory appeal under 28 U.S.C. § 1292(b) because the district court resolved a novel question of statutory interpretation. We granted Google's petition, and we have jurisdiction under 28 U.S.C. § 1292(b).

B. District Court's Decision

Google maintained before the district court that it should have dismissed Joffe's Wiretap Act claims because data transmitted over unencrypted Wi–Fi networks falls under the statutory exemption that makes it lawful to intercept “electronic communications” that are “readily accessible to the general public.” 18 U.S.C. § 2511(2)(g)(i). The question was whether payload data transmitted on an unencrypted Wi–Fi network is “readily accessible to the general public,” such that the § 2511(2)(g)(i) exemption applies to Google's conduct.

To answer this question, the district court first looked to the definitions supplied by the Act. In re Google Inc. St. View Elec. Commc'ns Litig., 794 F.Supp.2d at 1075–76. The statute provides in relevant part that ‘readily accessible to the general public’ means, with respect to a radio communication, that such communication is not ... (A) scrambled or encrypted.” 18 U.S.C. § 2510(16). An unencrypted radio communication is, therefore, “readily accessible to the general public.” In short, intercepting an unencrypted radio communication does not give rise to liability under the Wiretap Act because of the combination of the § 2511(2)(g)(i) exemption and the § 2510(16) definition.

The district court then considered whether data transmitted over a Wi–Fi network is a “radio communication” because the phrase is not defined by the Act. In re Google Inc. St. View Elec. Commc'ns Litig., 794 F.Supp.2d at 1076–81. The court reasoned that “radio communication” encompasses only “traditional radio services,” and not other technologies that also transmit data using radio waves, such as cellular phones and Wi–Fi networks.3Id. at 1079–83. Since Wi–Fi networks are not a “radio communication,” the definition of “readily accessible to the general public” provided by § 2510(16) does not apply because the definition is expressly limited to electronic communications that are radio communications.

Finally, the court addressed whether data transmitted over unencrypted Wi–Fi networks is nevertheless an “electronic communication” that is “readily accessible to the general public” under § 2511(2)(g)(i). Id. at 1082–84. Although the court determined that Wi–Fi networks do not involve a “radio communication” under § 2510(16) and are therefore not “readily accessible to the general public” by virtue of the definition of the phrase, it still had to resolve whether they are “readily accessible to the general public” as the phrase is ordinarily understood because the statute does not define the phrase as it applies to an “electronic communication” that is not a “radio communication.” The court determined that data transmitted over an unencrypted Wi–Fi network is not “readily accessible to the general public.” Id. at 1082–83. As a result, the § 2511(2)(g)(i) exemption does not apply to Google's conduct. The court accordingly declined to grant Google's motionto dismiss Joffe's Wiretap Act claims. Id. at 1084.

II. OVERVIEW OF THE WIRETAP ACT

The Wiretap Act imposes liability on a person who “intentionally intercepts ... any wire, oral, or electronic communication,” 18 U.S.C. § 2511(1)(a), subject to a number of exemptions. See18 U.S.C. § 2511(2)(a)-(h). There are two exemptions that are relevant to our purposes. First, the Wiretap Act exempts intercepting “an electronic communication made through an electronic communication system” if the system is configured so that it is “readily accessible to the general public.” 18 U.S.C. § 2511(2)(g)(i). “Electronic communication” includes communication by radio, 18 U.S.C. § 2510(12), and ‘readily accessible to the general public’ means, with respect to a radio communication” that the communication is “not ... scrambled or encrypted,” 18 U.S.C. § 2510(16)(A). Second, the Act exempts intercepting “radio communication” by “any station for the use of the general public;” by certain governmental communication systems “readily accessible to the general public,” including police, fire, and civil defense agencies; by a station operating on an authorized frequency for “amateur, citizens band, or general mobile radio services;” or by a marine or aeronautical communications system. 18 U.S.C. § 2511(2)(g)(ii)(I)-(IV).

Google only argues, as it did before the district court, that it is exempt from liability under the Act because data transmitted over a Wi–Fi network is an “electronic communication ... readily accessible to the general public” under § 2511(2)(g)(i). It concedes that it does not qualify for any of the exemptions for specific types of “radio communication” under § 2511(2)(g)(ii). Joffe, however, argues that if data transmitted over a Wi–Fi...

To continue reading

Request your trial
7 cases
  • Joffe v. Google, Inc. (In re Google Inc. St. View Elec. Commc'ns Litig.)
    • United States
    • U.S. Court of Appeals — Ninth Circuit
    • December 27, 2021
    ...Internet users transmitted over unencrypted Wi-Fi networks when the Street View Vehicles were nearby. See Joffe v. Google, Inc. , 729 F.3d 1262, 1264 (9th Cir.), amended and superseded on reh'g by 746 F.3d 920 (9th Cir. 2013). In total, the Street View Vehicles apparently collected around t......
  • Arrington v. Colortyme, Inc.
    • United States
    • U.S. District Court — Western District of Pennsylvania
    • September 17, 2013
    ...Inc., 302 F.3d 868 (9th Cir.2002); Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457 (5th Cir.1994)); see also Joffe v. Google, 729 F.3d 1262 (9th Cir.2013) (payload data transmitted over an unencrypted Wi–Fi network does not fall into ECPA's exemption for communications that are ......
  • Joffe v. Google, Inc.
    • United States
    • U.S. Court of Appeals — Ninth Circuit
    • December 27, 2013
    ...for rehearing, filed on September 24, 2013, is GRANTED IN PART. The court's opinion, filed on September 10, 2013, and appearing at 729 F.3d 1262 (9th Cir.2013), is hereby AMENDED. An amended opinion is filed concurrently with this order. Judge Bybee votes to deny Appellant's petition for re......
  • Sec. v. CMKM Diamonds, Inc.
    • United States
    • U.S. Court of Appeals — Ninth Circuit
    • September 10, 2013
  • Request a trial to view additional results
1 books & journal articles
  • § 8.02 Civil Violations Under the Wiretap Act
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 8 The Electronic Communications Privacy Act (ECPA)
    • Invalid date
    ...541, 99th Cong., 2d Sess. 36 (Sept. 19, 1986), reprinted in 1986 U.S. Code Cong. and Admin. News 3555, 3590.[222] Joffe v. Google, Inc., 729 F.3d 1262 (9th Cir. 2013). The Ninth Circuit also rejected Google's argument that it is exempt under Section 2511(2)(g)(i) on the ground that data tra......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT