LinkedIn did not violate the Stored Communications Act in disclosing search histories to third parties. Low v. LinkedIn Corp., 2012 U.S. Dist. LEXIS 97012 (N.D. Cal. July 12, 2012) [Note: Numerous websites, including those of the law firms involved, are following this case, but none has this order as of the time of this posting, so I apologize for the long quote. If I could link it instead, I would have]:
1. Stored Communications Act
Plaintiffs' first cause of action alleges that LinkedIn violated the federal Stored Communications Act, 18 U.S.C. § 2701, et seq. ("SCA"). See AC ¶¶ 65-78. Enacted in 1986 as Section II of the Electronic Communications Protection Act ("ECPA"), the SCA creates criminal and civil liability for certain unauthorized access to stored communications and records. See Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir. 2002). "The SCA was enacted because the advent of the Internet presented a host of potential privacy breaches that the Fourth Amendment does not address." Quon v. Arch Wireless Operating Company, Inc., 529 F.3d 892, 900 (9th Cir. 2008), rev'd on other grounds by City of Ontario v. Quon, 130 S.Ct. 2619 (2010). Despite this purpose, the SCA has a narrow scope: "[t]he SCA is not a catch-all statute designed to protect the privacy of stored Internet communications;" instead "there are many problems of Internet privacy that the SCA does not address." Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1214 (2004). Generally, the SCA prohibits providers from (1) "knowingly divulg[ing] to any person or entity the contents of a communication." 18 U.S.C § 2702(a)(1)-(2); see id. § 2707 (creating a private right of action); see also Quon, 529 F.3d at 900 ("[T]he SCA prevents 'providers' of communication services from divulging private communications to certain entities and/or individuals.").
The SCA covers two types of entities: (1) "remote computing services" ("RCS"), and (2) "electronic communication services" ("ECS"). 18 U.S.C § 2702(a)(1)-(2). The non-disclosure obligations depend on the type of provider at issue. See, e.g. Quon, 529 F.3d at 900-902. Plaintiffs contend in their opposition that LinkedIn is an RCS for the purposes of its SCA liability. See Opp'n at 14-15. The SCA prohibits an entity "providing remote computing service to the public" from "knowingly divulge[ing] to any person or entity the contents of any communication which is carried or maintained on that service." 18 U.S.C § 2702(a)(2).
The SCA only creates liability for a provider that is an RCS or an ECS. A provider of email services is an ECS. Quon, 529 F.3d at 901. On the other hand, under the SCA the term "remote computing service" means "the provision to the public of computer storage or processing services by means of an electronic communications system." 18 U.S.C § 2711(2) (emphasis added). A "remote computing service" refers to "the processing or storage of data by an offsite third party." Quon, 529 F.3d at 901. In defining RCS, "Congress appeared to view 'storage' as a virtual filing cabinet." Id. at 902. Indeed, the Ninth Circuit has explained that "[i]n light of the Report's elaboration upon what Congress intended by the term 'Remote Computer Services,' it is clear that, before the advent of advanced computer processing programs such as Microsoft Excel, businesses had to farm out sophisticated processing to a service that would process the information." Id. at 902 citing Kerr, 72 GEO. WASH. L. REV. at 1213-14.
Whether an entity is acting as an RCS or an ECS (or neither) is context dependent, and depends, in part, on the information disclosed. See In re U.S., 665 F. Supp. 2d 1210, 1214 (D. Or. 2009) ("Today, most ISPs provide both ECS and RCS; thus, the distinction serves to define the service that is being provided at a particular time (or as to a particular piece of electronic communication at a particular time), rather than to define the service provider itself. The distinction is still essential, however, because different services have different protections."); Kerr, 72 GEO. WASH. L. REV. at 15-16 ("The classifications of ECS and RCS are context sensitive: the key is the provider's role with respect to a particular copy of a particular communication, rather than the provider's status in the abstract. A provider can act as an RCS with respect to some communications, an ECS with respect to other communications, and neither an RCS nor an ECS with respect to other communications.").
Although many allegations within the Amended Complaint relate to information that third parties would be able to infer, the Amended Complaint limits the information LinkedIn allegedly disclosed to third parties. The Amended Complaint alleges that LinkedIn transmits to third parties the LinkedIn user ID and the URL of the LinkedIn profile page viewed by the internet user. See AC ¶¶ 28, 66-68. Even taking Plaintiffs' allegations as true, it does not appear that LinkedIn was functioning as an RCS when it disclosed the LinkedIn user ID and the URL of the profile pages the user had viewed to third parties. LinkedIn was not acting as a "remote computing service" with respect to the disclosed information because it was not "processing or stor[ing]  data by an offsite third party [in this case LinkedIn]." Quon, 529 F.3d at 901. LinkedIn IDs are numbers generated by LinkedIn and were not sent by the user for offsite storage or processing. See 18 U.S.C. § 2702(a)(2)(A). LinkedIn was not acting "as a virtual filing cabinet," or as an offsite processor of data with respect to the user IDs it created. Similarly, the URL addresses of viewed pages were not sent to LinkedIn by Plaintiffs for storage or processing. See 18 U.S.C. § 2702(a)(2)(A)-(B). LinkedIn was not functioning as either a "filing cabinet" or "an advanced computer processing program such as Microsoft Excel," that allows businesses to "farm out sophisticated processing to a service that would process the information," with respect to the LinkedIn user IDs or the URLs of users' profile pages. Quon, 529 F.3d at 902.
At least one commentator has seriously doubted the conclusion that a website, such as LinkedIn, provides "processing services" for its customers, qualifying it as an RCS. Kerr, 72 GEO. WASH. L. REV. at 1229-31. This view is supported by the legislative history of the SCA. Congress established liability for "remote computing services to include services that store and process information. S. Rep. No. 99-541, at 3 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3557 ("[C]omputers are used extensively today for the storage and processing of information. With the advent of computerized recordkeeping systems, Americans have lost the ability to lock away a great deal of personal and business information. For example, physicians and hospitals maintain medical files in offsite data banks, businesses of all sizes transmit their records to remote computers to obtain sophisticated data processing services."). Therefore, the Court finds that Plaintiffs have not stated a claim for relief pursuant to the SCA because Plaintiffs have not established that LinkedIn was acting as an RCS when it disclosed LinkedIn IDs and URLs of viewed pages to third parties. Therefore, Defendants' motion to dismiss the SCA claim is GRANTED.
Plaintiff Low also alleged a violation of the SCA in the original complaint. Compl. ¶¶ 41-53. Plaintiff's original complaint did not articulate a coherent theory regarding its SCA claim. Specifically, the original complaint's SCA claim failed to identify what information was transmitted to third parties. Plaintiffs' Amended Complaint now identifies what information was transmitted to third parties and how, theoretically, a LinkedIn user's information can be de-anonymized. However, the additional factual allegations in the Amended Complaint establish that Plaintiffs' SCA claim fails to establish a cause of action. This defect is based on a failure of theory and not on a failure of pleading. Additional factual allegations are unlikely to establish that Defendant was an RCS in light of the legislative history of the SCA. Because further amendment would be futile, Defendant's motion to dismiss the SCA claim is granted with prejudice.
Update Sunday: Still nothing posted elsewhere.
No Pingbacks for this post yet...
Fourth Amendment cases,
citations, and links
Latest Slip Opinions:
U.S. Supreme Court (Home)
Federal Appellate Courts Opinions
FDsys: Many district courts
FDsys: Many federal courts
Military Courts: C.A.A.F., Army, AF, N-M, CG
State courts (and some USDC opinions)
Advanced Google Scholar
Google search tips
LII State Appellate Courts
LexisONE free caselaw
Findlaw Free Opinions
To search Search and Seizure on Lexis.com $
Most recent SCOTUS
2009 to date:
Riley v. California, granted Jan.17 (ScotusBlog)
United States v. Wurie, granted Jan.17 (ScotusBlog)
Plumhoff v. Rickard, granted Nov. 15, argued Mar. 4 (ScotusBlog)
Stanton v. Sims, 134 S.Ct. 3, 187 L. Ed. 2d 341 (Nov. 4, 2013) (per curiam)
Navarette v. California, granted Oct.1, argued Jan. 21 (ScotusBlog)
Fernandez v. California, granted May 20, argued Nov. 13 (ScotusBlog)
Maryland v. King, 133 S.Ct. 1958, 186 L.Ed.2d 1 (2013) (ScotusBlog)
Missouri v. McNeeley, 133 S.Ct. 1552, 185 L.Ed.2d 696 (2013) (ScotusBlog)
Bailey v. United States, 133 S.Ct. 1031, 185 L.Ed.2d 19 (2013) (ScotusBlog)
Florida v. Harris, 133 S.Ct. 1050, 185 L.Ed.2d 61 (2013) (ScotusBlog)
Florida v. Jardines, 133 S.Ct. 1409, 185 L.Ed.2d 495 (2013) (ScotusBlog)
Clapper v. Amnesty International USA, 133 S.Ct. 1138, 185 L.Ed.2d 264 (2013) (ScotusBlog)
Ryburn v. Huff, 132 S.Ct. 987, 181 L.Ed.2d 966 (2012) (other blog)
Florence v. Board of Chosen Freeholders, 132 S.Ct. 1510, 182 L.Ed.2d 566 (2012) (ScotusBlog)
United States v. Jones, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012) (ScotusBlog)
Messerschmidt v. Millender, 132 S.Ct. 1235, 182 L.Ed.2d 47 (2012) (ScotusBlog)
Kentucky v. King, 131 S.Ct. 1849, 179 L.Ed.2d 865 (2011) (ScotusBlog)
Camreta v. Greene, 131 S.Ct. 2020, 179 L.Ed.2d 1118 (2011) (ScotusBlog)
Ashcroft v. al-Kidd, 131 S.Ct. 2074, 179 L.Ed.2d 1149 (2011) (ScotusBlog)
Davis v. United States, 131 S.Ct. 2419, 180 L.Ed.2d 285 (2011) (ScotusBlog)
Michigan v. Fisher, 558 U.S. 45, 130 S.Ct. 546, 175 L.Ed.2d 410 (2009) (per curiam) (ScotusBlog)
City of Ontario v. Quon, 560 U.S. 746, 130 S.Ct. 2619, 177 L.Ed.2d 216 (2010) (ScotusBlog)
Herring v. United States, 555 U.S. 135, 129 S.Ct. 695, 172 L.Ed.2d 496 (2009) (ScotusBlog)
Pearson v. Callahan, 555 U.S. 223, 129 S.Ct. 808, 172 L.Ed.2d 565 (2009) (ScotusBlog)
Arizona v. Johnson, 555 U.S. 323, 129 S.Ct. 781, 172 L.Ed.2d 694 (2009) (ScotusBlog)
Arizona v. Gant, 556 U.S. 332, 129 S.Ct. 1710, 173 L.Ed.2d 485 (2009) (ScotusBlog)
Safford Unified School District #1 v. Redding, 557 U.S. 364, 129 S.Ct. 2633, 174 L.Ed.2d 354 (2009) (ScotusBlog)
S. Ct. Docket
Solicitor General's site
Briefs online (but no amicus briefs)
Curiae (Yale Law)
Oyez Project (NWU)
"On the Docket"–Medill
S.Ct. Monitor: Law.com
S.Ct. Com't'ry: Law.com
General (many free):
Google Scholar | Google
LexisOne Legal Website Directory
Lexis.com (criminal law/ 4th Amd) $
Findlaw.com (4th Amd)
FBI Domestic Investigations and Operations Guide (2008) (pdf)
DEA Agents Manual (2002) (download)
DOJ Computer Search Manual (2009) (pdf)
Congressional Research Service:
Electronic Communications Privacy Act (2012)
Overview of the Electronic Communications Privacy Act (2012)
Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)
ACLU on privacy
Electronic Privacy Information Center
Criminal Appeal (post-conviction) (9th Cir.)
Section 1983 Blog
"If it was easy, everybody would be doing it. It isn't, and they don't."
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud
"A system of law that not only makes certain conduct criminal, but also lays
down rules for the conduct of the authorities, often becomes complex in its
application to individual cases, and will from time to time produce imperfect
results, especially if one's attention is confined to the particular case at
bar. Some criminals do go free because of the necessity of keeping
government and its servants in their place. That is one of the costs of having
and enforcing a Bill of Rights. This country is built on the assumption that
the cost is worth paying, and that in the long run we are all both freer and
safer if the Constitution is strictly enforced."
—Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984).
"The criminal goes free, if he must, but it is the law that sets him free. Nothing
can destroy a government more quickly than its failure to observe its own laws,
or worse, its disregard of the charter of its own existence."
—Mapp v. Ohio, 367 U.S. 643, 659 (1961).
Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment.
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).
"There have been powerful hydraulic pressures throughout our history that
bear heavily on the Court to water down constitutional guarantees and give the
police the upper hand. That hydraulic pressure has probably never been greater
than it is today."
— Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).
"The great end, for which men entered into society, was to secure their
—Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)
"It is a fair summary of history to say that the safeguards of liberty have
frequently been forged in controversies involving not very nice people. And
so, while we are concerned here with a shabby defrauder, we must deal with his
case in the context of what are really the great themes expressed by the Fourth
—United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)
"The course of true law pertaining to searches and seizures, as enunciated
here, has not–to put it mildly–run smooth."
—Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).
"A search is a search, even if it happens to disclose nothing but the
bottom of a turntable."
—Arizona v. Hicks, 480 U.S. 321, 325 (1987)
"For the Fourth Amendment protects people, not places. What a person knowingly
exposes to the public, even in his own home or office, is not a subject of Fourth
Amendment protection. ... But what he seeks to preserve as private, even in
an area accessible to the public, may be constitutionally protected."
—Katz v. United States, 389 U.S. 347, 351 (1967)
“Experience should teach us to be most on guard to
protect liberty when the Government’s purposes are beneficent. Men born
to freedom are naturally alert to repel invasion of their liberty by evil-minded
rulers. The greatest dangers to liberty lurk in insidious encroachment by men
of zeal, well-meaning but without understanding.”
—United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)
“Liberty—the freedom from unwarranted
intrusion by government—is as easily lost through insistent nibbles by
government officials who seek to do their jobs too well as by those whose purpose
it is to oppress; the piranha can be as deadly as the shark.”
—United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)
"You can't always get what you want /
But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards
"In Germany, they first came for the communists,
and I didn't speak up because I wasn't a communist. Then they came for the Jews,
and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists,
and I didn't speak up because I wasn't a trade unionist. Then they came for
the Catholics and I didn't speak up because I wasn't a Catholic. Then they came
for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration camp]
“You know, most men would get discouraged by
now. Fortunately for you, I am not most men!”
—Pepé Le Pew
"There is never enough time, unless you are serving it."
"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime."
—Johnson v. United States, 333 U.S. 10, 13-14 (1948)