Joffe v. Google, Inc.

746 F.3d 920, 2013 WL 6905957
CourtCourt of Appeals for the Ninth Circuit
DecidedSeptember 10, 2013
DocketNo. 11-17483
StatusPublished
Cited by12 cases

This text of 746 F.3d 920 (Joffe v. Google, Inc.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Joffe v. Google, Inc., 746 F.3d 920, 2013 WL 6905957 (9th Cir. 2013).

Opinion

ORDER

Appellant’s motion for leave to file a reply brief in support of its petition for rehearing and rehearing en banc, filed on November 6, 2013, is GRANTED.

Appellant’s petition for rehearing, filed on September 24, 2013, is GRANTED IN PART. The court’s opinion, filed on September 10, 2013, and appearing at 729 F.3d 1262 (9th Cir.2013), is hereby AMENDED. An amended opinion is filed concurrently with this order.

Judge Bybee votes to deny Appellant’s petition for rehearing en banc, filed on September 24, 2013, and Judge Tashima and Judge Stafford so recommend. The full court has been advised of Appellant’s petition for rehearing en banc, and no request to vote on whether to rehear the case en banc has been made. Appellant’s petition for rehearing en banc is DENIED.

No subsequent petitions for rehearing or rehearing en banc shall be filed by either party.

OPINION

BYBEE, Circuit Judge:

In the course of capturing its Street View photographs, Google collected data from unencrypted Wi-Fi networks. Google publicly apologized, but plaintiffs brought suit under federal and state law, including the Wiretap Act, 18 U.S.C. § 2511. Google argues that its data collection did not violate the Act because data transmitted over a Wi-Fi network is an “electronic communication” that is “readily [923]*923accessible to the general public” and exempt under the Act. 18 U.S.C. § 2511(2)(g)(i). The district court rejected Google’s argument. In re Google Inc. St. View Elec. Commc’n Litig., 794 F.Supp.2d 1067, 1078-84 (N.D.Cal.2011). We affirm.

I. BACKGROUND

A. Facts and History

Google launched its Street View feature in the United States in 2007 to complement its Google Maps service by providing users with panoramic, street-level photographs. Street View photographs are captured by cameras mounted on vehicles owned by Google that drive on public roads and photograph their surroundings. Between 2007 and 2010, Google also equipped its Street View cars with Wi-Fi antennas and software that collected data transmitted by WiFi networks in nearby homes and businesses. The equipment attached to Google’s Street View cars recorded basic information about these Wi-Fi networks, including the network’s name (SSID), the unique number assigned to the router transmitting the wireless signal (MAC address), the signal strength, and whether the network was encrypted. Gathering this basic data about the Wi-Fi networks used in homes and businesses enables companies such as Google to provide enhanced “location-based” services, such as those that allow mobile phone users to find nearby restaurants and attractions or receive driving directions.

But the antennas and software installed in Google’s Street View cars collected more than just the basic identifying information transmitted by Wi-Fi networks. They also gathered and stored “payload data” that was sent and received over unencrypted Wi-Fi connections at the moment that a Street View car was driving by.1 Payload data includes everything transmitted by a device connected to a Wi-Fi network, such as personal emails, user-names, passwords, videos, and documents.

Google acknowledged in May 2010 that its Street View vehicles had been collecting fragments of payload data from unencrypted Wi-Fi networks. The company publicly apologized, grounded its vehicles, and rendered inaccessible the personal data that had been acquired. In total, Google’s Street View cars collected about 600 gigabytes of data transmitted over Wi-Fi networks in more than 30 countries.

Several putative class-action lawsuits were filed shortly after Google’s announcement, and, in August 2010, the cases were transferred by the Judicial Panel on Multi-district Litigation to the Northern District of California. In November, 2010, Plaintiffs-Appellees (collectively “Joffe”) filed a consolidated complaint, asserting claims against Google under the federal Wiretap Act, 18 U.S.C. § 2511; California Business and Professional Code § 17200; and various state wiretap statutes. Joffe seeks to represent a class comprised of all persons whose electronic communications were intercepted by Google Street View vehicles since May 25, 2007.

Google moved to dismiss Joffe’s consolidated complaint. The district court declined to grant Google’s motion to dismiss Joffe’s federal Wiretap Act claims.2 In re Google Inc. St. View Elec. Commc’n Litig., 794 F.Supp.2d at 1084. On Google’s re[924]*924quest, the court certified its ruling for interlocutory appeal under 28 U.S.C. § 1292(b) because the district court resolved a novel question of statutory interpretation. We granted Google’s petition, and we have jurisdiction under 28 U.S.C. § 1292(b).

B. District Court’s Decision

Google maintained before the district court that it should have dismissed Joffe’s Wiretap Act claims because data transmitted over unencrypted Wi-Fi networks falls under the statutory exemption that makes it lawful to intercept “electronic communications” that are “readily accessible to the general public.” 18 U.S.C. § 2511(2)(g)(i). The question was whether payload data transmitted on an unencrypted WiFi network is “readily accessible to the general public,” such that the § 2511(2)(g)(i) exemption applies to Google’s conduct.

To answer this question, the district court first looked to the definitions supplied by the Act. In re Google Inc. St. View Elec. Commc’n Litig., 794 F.Supp.2d at 1075-76. The statute provides in relevant part that “ ‘readily accessible to the general public’ means, with respect to a radio communication, that such communication is not ... (A) scrambled or encrypted.” 18 U.S.C. § 2510(16). An unencrypted radio communication is, therefore, “readily accessible to the general public.” In short, intercepting an unencrypted radio communication does not give rise to liability under the Wiretap Act because of the combination of the § 2511(2)(g)(i) exemption and the § 2510(16) definition.

The district court then considered whether data transmitted over a Wi-Fi network is a “radio communication” because the phrase is not defined by the Act. In re Google Inc. St. View Elec. Commc’n Litig., 794 F.Supp.2d at 1076-81. The court reasoned that “radio communication” encompasses only “traditional radio services,” and not other technologies that also transmit data using radio waves, such as cellular phones and Wi-Fi networks.3 Id. at 1079-83.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Korotkiy
118 F.4th 1202 (Ninth Circuit, 2024)
Tourangeau v. Nappi Distributors
110 F.4th 8 (First Circuit, 2024)
Eugene Scalia v. State of Alaska
985 F.3d 742 (Ninth Circuit, 2021)
United States v. Bittner
E.D. Texas, 2020
Perrin Davis v. Facebook, Inc.
956 F.3d 589 (Ninth Circuit, 2020)
Moore v. Smith
360 F. Supp. 3d 388 (E.D. Louisiana, 2018)
United States v. Juan Herrera-Serrano
703 F. App'x 342 (Fifth Circuit, 2017)
United States v. Damian Patrick
842 F.3d 540 (Seventh Circuit, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
746 F.3d 920, 2013 WL 6905957, Counsel Stack Legal Research, https://law.counselstack.com/opinion/joffe-v-google-inc-ca9-2013.