Benjamin Joffe v. Google Inc.

729 F.3d 1262, 42 Media L. Rep. (BNA) 1065, 2013 WL 4793247, 2013 U.S. App. LEXIS 18781
CourtCourt of Appeals for the Ninth Circuit
DecidedSeptember 10, 2013
Docket11-17483
StatusPublished
Cited by9 cases

This text of 729 F.3d 1262 (Benjamin Joffe v. Google Inc.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Benjamin Joffe v. Google Inc., 729 F.3d 1262, 42 Media L. Rep. (BNA) 1065, 2013 WL 4793247, 2013 U.S. App. LEXIS 18781 (9th Cir. 2013).

Opinion

OPINION

BYBEE, Circuit Judge:

In the course of capturing its Street View photographs, Google collected data from unencrypted Wi-Fi networks. Google publicly apologized, but plaintiffs brought suit under federal and state law, *1264 including the Wiretap Act, 18 U.S.C. § 2511. Google argues that its data collection did not violate the Act because data transmitted over a Wi-Fi network is an “electronic communication” that is “readily accessible to the general public” and exempt under the Act. 18 U.S.C. § 2511(2)(g)(i). The district court rejected Google’s argument. In re Google Inc. St. View Elec. Commc’ns Litig., 794 F.Supp.2d 1067, 1073-84 (N.D.Cal.2011). We affirm.

I. BACKGROUND

A. Facts and History

Google launched its Street View feature in the United States in 2007 to complement its Google Maps service by providing users with panoramic, street-level photographs. Street View photographs are captured by cameras mounted on vehicles owned by Google that drive on public roads and photograph their surroundings. Between 2007 and 2010, Google also equipped its Street View cars with Wi-Fi antennas and software that collected data transmitted by Wi-Fi networks in nearby homes and businesses. The equipment attached to Google’s Street View cars recorded basic information about these Wi-Fi networks, including the network’s name (SSID), the unique number assigned to the router transmitting the wireless signal (MAC address), the signal strength, and whether the network was encrypted. Gathering this basic data about the Wi-Fi networks used in homes and businesses enables companies such as Google to provide enhanced “location-based” services, such as those that allow mobile phone users to find nearby restaurants and attractions or receive driving directions.

But the antennas and software installed in Google’s Street View cars collected more than just the basic identifying information transmitted by Wi-Fi networks. They also gathered and stored “payload data” that was sent and received over unencrypted Wi-Fi connections at the moment that a Street View car was driving by. 1 Payload data includes everything transmitted by a device connected to a Wi-Fi network, such as personal emails, user-names, passwords, videos, and documents.

Google acknowledged in May 2010 that its Street View vehicles had been collecting fragments of payload data from unencrypted Wi-Fi networks. The company publicly apologized, grounded its vehicles, and rendered inaccessible the personal data that had been acquired. In total, Google’s Street View cars collected about 600 gigabytes of data transmitted over Wi-Fi networks in more than 30 countries.

Several putative class-action lawsuits were filed shortly after Google’s announcement, and, in August 2010, the cases were transferred by the Judicial Panel on Multi-district Litigation to the Northern District of California. In November, 2010, Plaintiffs-Appellees (collectively “Joffe”) filed a consolidated complaint, asserting claims against Google under the federal Wiretap Act, 18 U.S.C. § 2511; California Business and Professional Code § 17200; and various state wiretap statutes. Joffe seeks to represent a class comprised of all persons whose electronic communications were intercepted by Google Street View vehicles since May 25, 2007.

Google moved to dismiss Joffe’s consolidated complaint. The district court declined to grant Google’s motion to dismiss Joffe’s federal Wiretap Act claims. 2 In re *1265 Google Inc. St. View Elec. Commc’ns Li-tig., 794 F.Supp.2d at 1084. On Google’s request, the court certified its ruling for interlocutory appeal under 28 U.S.C. § 1292(b) because the district court resolved a novel question of statutory interpretation. We granted Google’s petition, and we have jurisdiction under 28 U.S.C. § 1292(b).

B. District Court’s Decision

Google maintained before the district court that it should have dismissed Joffe’s Wiretap Act claims because data transmitted over unencrypted Wi-Fi networks falls under the statutory exemption that makes it lawful to intercept “electronic communications” that are “readily accessible to the general public.” 18 U.S.C. § 2511(2)(g)(i). The question was whether payload data transmitted on an unencrypted Wi-Fi network is “readily accessible to the general public,” such that the § 2511 (2)(g)(i) exemption applies to Google’s conduct.

To answer this question, the district court first looked to the definitions supplied by the Act. In re Google Inc. St. View Elec. Commc’ns Litig., 794 F.Suppüd at 1075-76. The statute provides in relevant part that “ ‘readily accessible to the general public’ means, with respect to a radio communication, that such communication is not ... (A) scrambled or encrypted.” 18 U.S.C. § 2510(16). An unencrypted radio communication is, therefore, “readily accessible to the general public.” In short, intercepting an unencrypted radio communication does not give rise to liability under the Wiretap Act because of the combination of the § 2511(2)(g)(i) exemption and the § 2510(16) definition.

The district court then considered whether data transmitted over a Wi-Fi network is a “radio communication” because the phrase is not defined by the Act. In re Google Inc. St. View Elec. Commc’ns Litig., 794 F.Supp.2d at 1076-81. The court reasoned that “radio communication” encompasses only “traditional radio services,” and not other technologies that also transmit data using radio waves, such as cellular phones and Wi-Fi networks. 3 Id. at 1079-83. Since Wi-Fi networks are not a “radio communication,” the definition of “readily accessible to the general public” provided by § 2510(16) does not apply because the definition is expressly limited to electronic communications that are radio communications.

Finally, the court addressed whether data transmitted over unencrypted Wi-Fi networks is nevertheless an “electronic communication” that is “readily accessible to the general public” under § 2511(2)(g)(i). Id. at 1082-84.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

In re: Wilshire Courtyard
Ninth Circuit, 2015
Google, Inc. v. Joffe
134 S. Ct. 2877 (Supreme Court, 2014)
Arrington v. Colortyme, Inc.
972 F. Supp. 2d 733 (W.D. Pennsylvania, 2013)
Joffe v. Google, Inc.
746 F.3d 920 (Ninth Circuit, 2013)

Cite This Page — Counsel Stack

Bluebook (online)
729 F.3d 1262, 42 Media L. Rep. (BNA) 1065, 2013 WL 4793247, 2013 U.S. App. LEXIS 18781, Counsel Stack Legal Research, https://law.counselstack.com/opinion/benjamin-joffe-v-google-inc-ca9-2013.