Post on 06-Mar-2018
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
David M. Given (SBN 142375) Nicholas A. Carlin (SBN 112532) Conor H. Kennedy (SBN 281793) PHILLIPS, ERLEWINE, GIVEN & CARLIN LLP 39 Mesa Street, Suite 201 The Presidio San Francisco, CA 94129 Tel: 415-398-0900 Fax: 415-398-0911 Email: dmg@phillaw.com nac@phillaw.com chk@phillaw.com James M. Wagstaffe (State Bar No. 95535) Michael J. von Loewenfeldt (State Bar No. 178665) Frank Busch (State Bar No. 258228) KERR & WAGSTAFFE LLP 100 Spear Street, 18th Floor San Francisco, CA 94105 Tel: 415-371-8500 Fax: 415-371-0500 Email: wagstaffe@kerrwagstaffe.com
mvl@kerrwagstaffe.com busch@kerrwagstaffe.com
Interim Co-Lead Counsel for Plaintiffs
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF CALIFORNIA
SAN FRANCISCO DIVISION
MARK OPPERMAN, et al.,
Plaintiffs,
v. PATH, INC., et al.,
Defendants.
Case No. 13-cv-00453-JST PLAINTIFFS’ REPLY MEMORANDUM OF POINTS AND AUTHORITIES IN FURTHER SUPPORT OF MOTION FOR CLASS CERTIFICATION RE PATH APP Honorable Jon S. Tigar Date: June 14, 2016 Time: 2:00 p.m. Ctrm: 9, 19th Floor THIS DOCUMENT RELATES TO ALL CASES
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 1 of 39
i PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
TABLE OF CONTENTS
PAGE
I. INTRODUCTION .............................................................................................................. 1
II. CLASS CERTIFICATION DOES NOT CONSIDER WHICH SIDE IS CORRECT ON
THE MERITS ..................................................................................................................... 2
III. COMMONALITY AND PREDOMINANCE ARE SATISFIED ..................................... 3
A. California Law Applies to the Class Claims .......................................................... 4
1. Application of California law satisfies due process ................................... 4
2. Defendants chose California law, and advocated for it here ...................... 5
3. California has the paramount governmental interest here .......................... 7
a. Step One: No Material Difference .......................................................... 8
b. Step Two: No True Conflict of Interest ................................................ 11
c. Step Three: Comparative Impairment .................................................. 12
d. Apple’s Aiding and Abetting ............................................................... 12
B. Liability Is Established Objectively Not Based on How Each
Person Feels .......................................................................................................... 13
C. The Specific Contents of Each Phone Are Irrelevant ........................................... 16
D. Damages Can Be Proven Classwide and Do Not Defeat Certification ................ 18
1. Individualized damage questions do not defeat certification ................... 18
2. Plaintiffs’ proposed conjoint model satisfies Rule 23 .............................. 19
3. Plaintiffs’ unjust enrichment theory of recovery does not require a
complex model ......................................................................................... 23
4. Plaintiffs’ nominal damages and punitive damages theories of recovery
require no model ....................................................................................... 24
IV. BOTH PROPOSED CLASSES ARE APPROPRIATE ................................................... 26
V. TYPICALITY IS SATISFIED HERE ............................................................................. 27
VI. CONCLUSION ................................................................................................................ 30
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 2 of 39
ii PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
TABLE OF AUTHORITIES
PAGE(S)
Cases
Abbit v. ING, 2015 WL 7272220 (S.D. Cal. Nov. 16, 2015) .................................................................. 19 Abdullah v. U.S. Sec. Assocs., 731 F.3d 952 (9th Cir. 2013) .............................................................................................. 3
Ades v. Omni Hotels, 2014 WL 4627271 (C.D. Cal. Sept. 8, 2014) ............................................................. 27, 28
Akaosugi v. Benihana, 282 F.R.D. 241 (N.D. Cal. 2012) ..................................................................................... 29 Allen v. McMillion, 82 Cal.App.3d 211 (1978) ................................................................................................ 25 Amgen v. Connecticut Retirement, etc., 133 S.Ct. 1184 (2013) ........................................................................................................ 2 Apple v. Samsung, 2014 WL 794328 (N.D. Cal. Feb. 25, 2014) .................................................................... 21 Arizona v. ASARCO, 773 F.3d 1050 (9th Cir. 2014) .......................................................................................... 26 Blackie v. Barrack, 524 F.2d 891 (9th Cir. 1975) ............................................................................................ 18 Broderick v. Dept. of Envir. Qual., 761 So.2d 713 (La.App. 2000) ......................................................................................... 10 Comcast v. Behrend, 133 S.Ct. 1426 (2013) ...................................................................................................... 18 Cox Broad. v. Cohn, 420 U.S. 469 (1975) ........................................................................................................... 8 CRS Recovery v. Laxton, 600 F.3d 1138 (9th Cir. 2010) .................................................................................... 10, 11 Eisen v. Carlisle & Jacquelin, 417 U.S. 156 (1974) ........................................................................................................... 3
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 3 of 39
iii PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Ellis v. Costco, 285 F.R.D. 492 (N.D. Cal. 2012) ............................................................................... 26, 28 Falco v. Nissan, 2016 WL 1327474 (C.D. Cal. Apr. 5, 2016) .................................................................... 18 Fischer v. Mt. Olive Lutheran Church, 207 F.Supp.2d 914 (W.D. Wis. 2002) .......................................................................... 9, 10 Forcellati v. Hyland’s, 2014 WL 1410264 (C.D. Cal. Apr. 9, 2014) .............................................................. 11, 12 Greywolf v. Carroll, 151 P.3d 1234 (Alaska 2007) ........................................................................................... 15 Guido v. L'Oreal, 2014 WL 6603730 (C.D. Cal. July 24, 2014) .................................................................. 20 Hanlon v. Chrysler, 150 F.3d 1011 (9th Cir. 1998) .......................................................................................... 27 Harris v. Bingham McCutchen, 214 Cal.App.4th 1399 (2013) ............................................................................................. 6 Hernandez v. Hillsides, 47 Cal.4th 272 (2009) ................................................................................................. 14, 27 Hill v. NCAA, 7 Cal. 4th 1 (1994) ...................................................................................................... 14, 15 In re Apple, 2016 WL 783565 (E.D.N.Y. Feb. 29, 2016) .................................................................... 11 In re iPhone App. Litig., 844 F.Supp.2d 1040 (N.D. Cal. 2012) .............................................................................. 14 In re Pizza Time, 112 F.R.D. 15 (N.D. Cal. 1986) ......................................................................................... 4 In re Rail Freight Fuel, 287 F.R.D. 1 (D.D.C. 2012), vacated on other grounds, 725 F.3d 244 (D.C. Cir. 2013) ......................................................................................... 29 In re Yahoo Mail, 308 F.R.D. 577 (N.D. Cal. 2015) ............................................................................... 11, 12
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 4 of 39
iv PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Jackson v. Los Angeles, 60 Cal.App.4th 171 (1997) ................................................................................................. 5 Jimenez v. Allstate, 765 F.3d 1161 (9th Cir. 2014) .......................................................................................... 18 Kearney v. Salomon Smith Barney, 39 Cal.4th 95 (2006) ......................................................................................................... 11 Lilly v. Jamba Juice Co., 308 F.R.D. 231 (N.D. Cal. 2014) ..................................................................................... 19 Lisnoff v. Stein, 925 F.Supp.2d 233 (D.R.I. 2013) ..................................................................................... 10 Maxim Crane Works v. Tilbury Constructors, 208 Cal.App.4th 286 (2012) ............................................................................................... 7 Mazza v. Am. Honda. Motor Co., 666 F.3d 581 (9th Cir. 2012) ........................................................................................ 5, 12 Med. Lab. Mgmt. v. ABC, Inc., 306 F.3d 806 (9th Cir. 2002) ............................................................................................ 14 Mullins v. Premier Nutrition, 2016 WL 1535057 (N.D. Cal. Apr. 15, 2016) .................................................................. 18 Nedlloyd Lines v. Superior Court, 3 Cal.4th 459 (1992) ........................................................................................................... 6 Phillips Petroleum v. Shutts, 472 U.S. 797 (1985) ......................................................................................................... 25 Pulaski & Middleman v. Google, 802 F.3d 979 (9th Cir. 2015) ..................................................................................... passim Rakas v. Ill., 439 U.S. 128 (1978) ......................................................................................................... 19 Riley v. California, 134 S.Ct. 2473 (2014) .......................................................................................... 14, 15, 16 Roach v. T.L. Cannon, 778 F.3d 401 (2d Cir. 2015) ............................................................................................. 18
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 5 of 39
v PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Robinson v. Open Top Sightseeing, 2015 WL 9304041 (N.D. Cal. Dec. 22, 2015) ................................................................. 19 Rodman v. Safeway, 2014 WL 988992 (N.D. Cal. Mar. 10, 2014) ..................................................................... 7 Rodriguez v. W. Publ'g Corp., 563 F.3d 948 (9th Cir. 2009) ............................................................................................ 30 Rutledge v. Hewlett-Packard, 238 Cal.App.4th 1164 (2015) ....................................................................................... 5, 11 San Bernardino v. Walsh, 158 Cal.App.4th 533 (2007) ............................................................................................. 24 Sanders v. ABC, Inc., 20 Cal. 4th 907 (1999) .......................................................................................... 10, 17, 18 Shersher v. Superior Court, 154 Cal. App. 4th 1491 (2007) ......................................................................................... 24 Shulman v. Group W, 18 Cal.4th 200 (1998) ....................................................................................................... 14 Stirling Intern. Realty v. Soderstrom, 2015 WL 403318 (M.D. Fla. Jan. 28, 2015) .................................................................... 10 Tabata v. Charleston Area Med. Ctr., 233 W. Va. 512 (2014) ....................................................................................................... 1 Taus v. Loftus, 40 Cal. 4th 683 (2007) .......................................................................................... 14, 16, 17 Thayer Corp. v. Reed, 2011 WL 2682723 (D. Maine July 11, 2011) .................................................................. 10 Thomas v. Gordon, 85 Cal.App.4th 113 (2000) ................................................................................................. 5 Todd v. Tempur-Sealy, 2016 WL 344479 (N.D. Cal. Jan. 28, 2016) .................................................................. 8, 9 TV Interactive Data v. Sony, 929 F. Supp. 2d 1006 (N.D. Cal. 2013) ............................................................................ 20
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 6 of 39
vi PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP
Case No. 13-cv-00453-JST
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Tyson Foods v. Bouaphakeo, 136 S.Ct. 1036 (2016) .................................................................................................. 3, 21 USW v. ConocoPhillips, 593 F.3d 802 (9th Cir. 2010) .............................................................................................. 3 Varnado v. Midland Funding, 43 F.Supp.3d 985 (N.D. Cal. 2014) .................................................................................. 14 Wash. Mut. v. Superior Court, 24 Cal.4th 906 (2001) ..................................................................................................... 7, 8 Wershba v. Apple, 91 Cal.App.4th 224 (2001) ........................................................................................... 8, 11 Wolph v. Acer Amer., 272 F.R.D. 477 (N.D. Cal. 2011) ................................................................................. 7, 11 Yokoyama v. Midland Nat., 594 F.3d 1087 (9th Cir. 2010) .......................................................................................... 18 Zedner v. U.S., 547 U.S. 489 (2006) ........................................................................................................... 5 Statutes 1899 Cal. Stat. 28 (repealed 1915) ................................................................................................. 9 Cal. Civ. Code §3360 ................................................................................................................... 25 Communications Decency Act, 47 U.S.C. § 230 ......................................................................... 13 La. Const. of 1974, Art. 1 § 5 ....................................................................................................... 10 Treatises Restatement (Third) of Restitution and Unjust Enrichment § 3 ................................................... 24 Rules Federal Rules of Civil Procedure, Rule 23, et seq. ................................................................ passim Other Authorities Eli A. Meltz, No Harm, No Foul?: “Attempted” Invasion of Privacy and the Tort of Intrusion
Upon Seclusion, 83 Fordham L. Rev. 331, 340 et seq. (2015) ........................................... 8
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 7 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
I. INTRODUCTION
Path and Apple spend considerable time trying to avoid class certification by raising
merits arguments aimed at convincing the Court neither did anything wrong. But Plaintiffs’
class certification motion does not ask whether these defendants are liable. It asks whether the
Court can determine their liability based on evidence that is predominantly the same for the
proposed classes. Neither Apple nor Path make a single argument that any evidence about
Apple’s or Path’s conduct is unique to any class member or sub-group of class members.
Nor do Apple or Path raise a single question about what either did that cannot be
answered in one stroke for the entire proposed class. As the Supreme Court of West Virginia
held in reversing the denial of certification in a similar data privacy case, “Simply put, all of the
proposed class members are in the same position. Their causes of action are the same and they
arise from the same event.” Tabata v. Charleston Area Med. Ctr., 233 W. Va. 512, 520 (2014).
Defendants ignore the common nature of their conduct, and instead resort to raising
distinctions among class members. First, Defendants argue that class members live in different
states – though they don’t reveal to the Court who lives where – and that the law of the location
of each class member when the data was taken should govern. In this, they ignore their own
choice of California law in their relationship with their users, California’s substantial connection
to the facts giving rise to this dispute, and the nature of mobile device use (i.e., that the iDevice
could be anywhere when the Path App was downloaded or activated).
Second, Defendants insist that a privacy violation turns on how each class member uses
social media, how each feels about Path’s conduct, and what specific contact data were on each
phone. These arguments misstate the law. If accepted, they would make it impossible to certify
any privacy class action for data intrusion.
Third, Defendants argue that no class can be certified that includes people whose data
was not taken. Whether class members in the “Intrusion Class” subjected to the risk of data
theft are entitled to relief is a common question, not one that depends on any individual’s facts.
Fourth, Defendants insist that Plaintiffs must identify specifically the common damages
they seek. Here, too, Defendants misstate the law. The Ninth Circuit recently affirmed its long-
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 8 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
standing rule that individual questions as to damages cannot defeat class certification. Pulaski &
Middleman v. Google, 802 F.3d 979, 986-88 (9th Cir. 2015).
Finally, Defendants argue that the class representatives are not typical because of
“individual defenses” to their claims, based on the mistaken legal arguments Defendants make
against predominance. These supposed defenses provide no basis to deny certification on
typicality grounds.
This motion is simple. With Apple’s substantial assistance, Path created and distributed
an App (a “mobile device application”) that harvested without notice or permission the Contacts
database of class members. Defendants’ actions had nothing to do with the identity of the class
members, their philosophies, or what specifically was on their phones. These facts present the
quintessential class action: Common litigation of claims all arising from a single course of
conduct by Apple and Path.
II. CLASS CERTIFICATION DOES NOT CONSIDER WHICH SIDE IS CORRECT
ON THE MERITS
Both Apple and Path spend a chunk of their opposition presenting their view of selected
classwide evidence that they believe excuses them from liability. See Path Opp. at 2-6; Apple
Opp. at 3-6. They also present declarations purporting to explain what they did and why it was
not wrongful.1 These arguments and evidence are pertinent to class certification only to the
extent they demonstrate that the predominant issues to be determined in this litigation are
common. None of the facts presented by Apple or Path about their conduct differs among class
members.
“Merits questions may be considered to the extent – but only to the extent – that they are
relevant to determining whether Rule 23 prerequisites for class certification are satisfied.”
Amgen v. Connecticut Retirement, etc., ___ U.S. ___, 133 S.Ct. 1184, 1195 (2013). “We find
1 Neither Path nor Apple properly disclosed in their initial disclosures or otherwise in discovery the percipient witnesses (Haun, Kisloff, Paine) they now present in opposition to the current certification motion; thus, not only are these merits issues not now before the Court, but the Court should exclude this evidence on this motion pursuant to Rule 37(c)(1). See Kennedy Reply Decl. at ¶¶ 2-3 & Exs. A & B.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 9 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
nothing in either the language or history of Rule 23 that gives a court any authority to conduct a
preliminary inquiry into the merits of a suit in order to determine whether it may be maintained
as a class action.” Eisen v. Carlisle & Jacquelin, 417 U.S. 156, 177 (1974).
“Although certification inquiries such as commonality, typicality, and predominance
might properly call for some substantive inquiry, ‘[t]he court may not go so far [] as to judge the
validity of these claims.’” USW v. ConocoPhillips, 593 F.3d 802, 808 (9th Cir. 2010) (internal
citation omitted). “When [] the concern about the proposed class is not that it exhibits some
fatal dissimilarity but, rather, a fatal similarity – [an alleged] failure of proof as to an element of
the plaintiffs’ cause of action – courts should engage that question as a matter of summary
judgment,” Tyson Foods v. Bouaphakeo, ___ U.S. ___, 136 S.Ct. 1036, 1047 (2016) (citation
omitted), as Apple has asked the Court to do (see ECF No. 694).
Defendants do not dispute that their conduct applied equally to every class member.
Path offered the same software designed to harvest address book data to each class member.
Apple’s conduct relates to the development and distribution of that software and its interaction
with Path, not class members. Even Defendants’ attempt on this motion to prove they
committed no legal wrong proves that those key facts are common to class members.
III. COMMONALITY AND PREDOMINANCE ARE SATISFIED
Defendants make no attempt to dispute that numerosity, ascertainability and adequacy
requirements are met. Nor do Defendants make any argument that another proceeding would be
superior or dispute that the Court could effectively and efficiently handle notice and
administration for the proposed classes.
Defendants focus their opposition to class certification on purported individual issues
that they claim defeat predominance. (Apple makes a half-hearted assertion that the
commonality requirement is not met, but that requirement is satisfied by a “single significant
question of law or fact.” Abdullah v. U.S. Sec. Assocs., 731 F.3d 952, 957 (9th Cir. 2013).)
Apple and Path make four arguments in this regard: (A) that the Court must apply the common
law of each of the 50 states to this case which law, they say, is materially different, (B) that how
each and every individual in the class feels about privacy and what Path did is dispositive, (C)
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 10 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
4
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
that the precise contents of each and every individual Contacts database taken must be
separately analyzed, and (D) that damages must be determined individually based primarily on
the above two subjective inquiries.
If the Court accepts these theories, none supported by citation to an analogous data-
privacy case, then no privacy class action could ever be certified for coordinated theft of data
from a group of individuals. Fortunately, for basically everyone in society who now uses
iDevices or similar mobile devices to store their private data, these arguments lack merit.
A. California Law Applies to the Class Claims.
Defendants’ primary argument against class certification is that this case must be
governed by the law of each separate state. This position is contrary to their own respective
terms of use with their customers – where each designated California law (the only sensible
choice given these parties’ substantial connection to this State as well as the nature of portable
handheld devices) – and their advocacy for application of California law in this case.
1. Application of California law satisfies due process.
Apple and Path both have their principal place of business here—Apple is also a
California corporation. See ECF Nos. 551, at ¶ 8 (Apple’s Answer to Plaintiff’s Second
Consolidated Amended Complaint (“SCAC”)) & 558, at ¶ 29 (Path Answer to SCAC). Both
Apple and Path therefore “reside” in this State. See 28 U.S.C. § 1332(c)(1). California residents
like Apple and Path should “have no cause to be surprised by application of California law” to
their conduct. In re Pizza Time, 112 F.R.D. 15, 18 (N.D. Cal. 1986).
Apple has told the Court that “the Northern District of California [] is the judicial district
in which a substantial part of the events or omissions giving rise to the claim occurred” (see
ECF No. 147, at 33 [internal quotations omitted]) and represented under oath that “nearly all of
the individuals that review apps, including all of the executives that oversee that process, are
based in Santa Clara County, California” (see ECF No. 147-1, at ¶ 5). Path told the Court that
its Apps were “principally researched, designed or developed in Northern California” (see ECF
No. 124, at 16) and represented under oath that “all data held by Path” including, presumably,
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 11 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
5
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
the illicitly uploaded address book data, was “managed by employees based at Path’s San
Francisco headquarters.” (See ECF No. 131, at ¶ 4).
The State of California therefore has a constitutionally sufficient aggregation of contacts
to each putative class member in this case (Mazza v. Am. Honda. Motor Co., 666 F.3d 581, 590
(9th Cir. 2012)), and “California ha[s] sufficient contacts with the claims such that California
has an interest in applying its laws to nonresident plaintiffs satisfying constitutional principles”
(Rutledge v. Hewlett-Packard, 238 Cal.App.4th 1164, 1189 (2015)).
2. Defendants chose California law, and advocated for it here.
Given the above, Apple and Path must “demonstrate that foreign law, rather than
California law, should apply to [the] class claims” against them. Mazza, supra, 666 F.3d at 590.
Stated another way, Apple and Path must “demonstrate that the interests of other state’s laws
[are] greater than California’s interests.” Rutledge, supra, 238 Cal.App.4th at 1188.
Before embarking on that inquiry, Apple and Path must first overcome the California
choice of law provisions of their respective agreements with their customers—and their
advocacy for those provisions and those agreements in this case. Principles of judicial and
equitable estoppel bar both Apple and Path from contesting the application of California law at
this stage of the litigation. Zedner v. U.S., 547 U.S. 489, 504 (2006) (“judicial estoppel
generally prevents a party from prevailing in one phase of a case on an argument and then
relying on a contradictory argument to prevail in another phase”); Thomas v. Gordon, 85
Cal.App.4th 113, 118 (2000) (“the essential function and justification of judicial estoppel is to
prevent the use of intentional self-contradiction as a means of obtaining unfair advantage in a
forum provided for suitors seeking justice”); Jackson v. Los Angeles, 60 Cal.App.4th 171, 183 &
191 (1997) (“doctrine of judicial estoppel ensures that [party] will not speak out of both sides of
[its] mouth”).
Both Apple (see ECF No. 551, at 42, ¶ 16) and Path (see ECF No. 558, at 35, ¶ 7)
asserted identical verbatim affirmative defenses to Plaintiffs’ claims: “The claims of Plaintiffs
and the purported class[es] are barred in whole or in part by contracts and/or agreements they
entered into with Path [Apple].” All of those contracts and/or agreements call for application of
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 12 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
6
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
California law. Even the agreements between Apple and Path call for California law to apply.
See ECF No. 670-1, at 21 (Bates No. APL-PATH_00022164).
Because both Apple and Path reside here, these California choice-of-law provisions are
presumptively enforceable. Nedlloyd Lines v. Superior Court, 3 Cal.4th 459, 467 (1992) (choice
of law is reasonable if one party resides in chosen state). This is so even if the rest of their
respective adhesion contracts fail. Harris v. Bingham McCutchen, 214 Cal.App.4th 1399, 1404
(2013) (while weaker party to adhesion contract may avoid enforcement of choice-of-law
provision when enforcement would result in substantial injustice, stronger party attacking its
own contract does not avoid enforcement of its chosen state law).
One of the grounds on which Apple obtained transfer from the Western District of Texas
was that its terms of use apply California law. See ECF No. 147-1 at ¶ 6 & Ex. A at 20. Those
same terms of use also state: “You [meaning Plaintiffs and the Putative Class] expressly agree
that exclusive jurisdiction for any claim or dispute with Apple or relating in any way to your use
of the iTunes Service resides in the courts in the State of California.”2 Id.
Path told Judge Sparks that “many of the Defendants’ choice of law provisions
[including its own] require that Plaintiffs bring their claims under California law.” See ECF No.
145, at 8 & n. 6; Kennedy Reply Decl. at ¶ 4 & Ex. C, at 4. Judge Sparks accepted the argument
that “familiarity of the forum with the law that will govern the case [] favors transfer.” See ECF
No. 217, at 7. “The Northern District of California,” Judge Sparks continued (as urged by
Apple and Path), “is obviously more familiar with California law than is this Court.” Id. at 7.
2 Apple proffers a different set of purportedly applicable Terms and Conditions in opposition to the present motion (see ECF No. 675-22), authenticated by its attorney of record Mr. Hawk, but highlights only one of two choice of law provisions (see ECF No. 675-22, at 13 (Bates No. APL-PATH_00011272)) contained in that document. That second, broader catch-all choice-of-law provision (at ECF No. 675-22, at 25 (Bates No. APL-PATH_00011284)) states: “The laws of the State of California, excluding conflicts of law rules, govern this license and your use of the Licensed Application.” Apple defined “Licensed Application” to include “any App Store Product.” See ECF No. 675-22, at 22 (Bates No. APL-PATH_00011281). Thus, both versions of Apple’s Terms and Conditions and both clauses in those agreements call for application of California law to the parties’ relationship.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 13 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
7
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
That should end the discussion. Apple and Path succeeded in moving this case to
California in part because, they told Judge Sparks, California law applied. Therefore, they
cannot be heard to argue otherwise.
To defeat certification, Apple and Path now resort to repudiating their own user
agreements. See Path Opp. at 9; Apple Opp. at 23 & n. 12. But these parties drafted those
documents, foisted them on their users and then advocated for enforcement of their choice of
law and choice of forum provisions. See, e.g., ECF Nos. 124 at 1-6; 147 at 8-9; 206 at 1-5; &
211 at 8-9. Apple and Path cannot reverse course simply to defeat certification of a nationwide
class on choice-of-law principles. Maxim Crane Works v. Tilbury Constructors, 208
Cal.App.4th 286, 295 & n.5 (2012) (rejecting drafting party’s argument that its choice-of-law
provision should not apply and noting “courts have rejected attempts by parties to avoid choice-
of-law provisions in their own form contracts when their chosen laws prove adverse in a given
case”). Just as no party may invalidate a choice-of-law provision for the sake of preserving
class integrity, no party (and especially the drafting party) may invalidate such a provision for
the sake of disrupting class integrity. Wash. Mut. v. Superior Court, 24 Cal.4th 906, 918 (2001).
Whether their respective user agreements are binding and enforceable is beside the point.
Given that both Apple and Path reside in this State, these parties’ uniform choice of California
law in their dealings with the public and with one another evinces an unequivocal intention that
(1) those dealings will be governed by this State’s law, and (2) their customers will come to
expect as much. Wolph v. Acer Amer., 272 F.R.D. 477, 484-85 (N.D. Cal. 2011). As this Court
recognized, there is a certain “poetic justice” where, as here, corporate defendants are forced to
countenance the consequences of their own standard form adhesion contracts. Rodman v.
Safeway, No. 11-cv-03003, 2014 WL 988992 at *8 (N.D. Cal. Mar. 10, 2014).
3. California has the paramount governmental interest here.
Not only did Apple and Path choose and urge California law, they have admitted that
California’s contacts and relationship to the parties, the claims, and the conduct at issue here are
paramount. As they told the Court, substantially all of the conduct directly relevant to this case
transpired in this State. Wershba v. Apple, 91 Cal.App.4th 224, 241 (2001). Under the
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 14 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
8
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
circumstances, Wershba and its post-Mazza progeny provide ample basis to apply California law
to the class claims asserted here.
In deciding whether to upset the application of California law to those claims, the Court
must (a) first evaluate the existence of any “material” differences between California and
foreign state law, (b) assuming such differences, evaluate each state’s interests to determine if a
“true conflict” exists, and finally (c) compare relative impacts to California and the foreign
states with whom a “true conflict” exists. Todd v. Tempur-Sealy, No. 13-cv-04984, 2016 WL
344479 at *6 (N.D. Cal. Jan. 28, 2016) (assessing law of unjust enrichment). Under each prong,
Apple and Path must “shoulder the burden of demonstrating that foreign law, rather than
California law, should apply to class claims.” Wash. Mut., supra, 24 Cal.4th at 921.
a. Step One: No Material Difference
The Supreme Court recognized in 1975 that “the century has experienced a strong tide
running in favor of the so-called right of privacy.” Cox Broad. v. Cohn, 420 U.S. 469, 488
(1975). The Supreme Court favorably cited 30-plus states plus the District of Columbia for their
recognition of the privacy tort, adding “these are impressive credentials for a right of privacy.”
Forty years later, 48 of the 50 states recognize a common law claim for intrusion upon
seclusion; 37 (including California) follow the Second Restatement’s formulation. Meltz, No
Harm, No Foul? “Attempted” Invasion of Privacy and the Tort of Intrusion Upon Seclusion, 83
Fordham L. Rev. 331, 340 et seq. (2015).
As the Court may recall, in the Tempur-Sealy case (Dkt. No. 160-3), the materiality
analysis began with a 50-page chart prepared by defendant detailing the pertinent law on a state-
by-state basis. Defendants proffer nothing of the sort here. Apple and Path are further
constrained in this argument given that both have failed and refused to identify absent class
members or their locations. See Kennedy Reply Dec. at ¶ 5 & Exs. D (Path’s Resp. to Requests
for Admission Nos. 1 and 2) & E (Apple’s Resp. to Interrogatory No. 14). The Court should
therefore decline to consider any argument in opposition to class certification based on the
location of class members. See Todd, supra, 2016 WL 344479, at *6.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 15 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
9
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Apple and Path contend that the lack of specifically analogous digital intrusion cases in
any given state ipso facto establishes a material difference in the common law, calling special
attention to the States of Wyoming (.18% of the U.S. population) and North Dakota (.22% of the
U.S. population). From this, Apple speculates that Wyoming, North Dakota and other states
have made an affirmative determination or “elected” that any legal remedy for digital invasion
of privacy “should be established by legislature” or “ballot initiative” and not developed in the
common law. See Apple Opp. at 22-23. Any number of conclusions can be drawn from the
absence of a given state’s ruling on the subject—perhaps, as is more likely, the question hasn’t
reached an appellate court in those states (after all, the Supreme Court only decided Riley in
2014). None of it is in any event dispositive.
Defendants next float the theory that any state’s statutory recognition of some type of
intrusion claim eliminates that state’s common law privacy laws. While a state can reserve
questions of intrusion for its legislature, it is far more likely that state legislatures expect and
intend their state courts to harmonize privacy statutes with common law precedent. See, e.g.,
Fischer v. Mt. Olive Lutheran Church, 207 F.Supp.2d 914, 928 (W.D. Wis. 2002) (“Wis. Stat. §
895.50(3) states that “[t]he right of privacy recognized in this section shall be interpreted in
accordance with the developing common law of privacy”). California enacted a privacy statute
in 1899, over a decade before the development of a common law privacy tort became
established under state law. 1899 Cal. Stat. 28, codified as Cal. Penal Code § 258 (1899), as
repealed by 1915 Cal. Stat. 761.
Finally, Defendants suggest various states’ common law prohibit intrusion claims for the
type of interest present in this case—the same exaggerated and unsupported legal arguments
Apple and Path once made about California’s common law. See, e.g., ECF No. 145, at 11-14.
Apple and Path collectively make four separate arguments about Florida law in four different
sections of their briefs (see Path Opp. at 12-13 & 19; Apple Opp. at 24)—none of which are
organized, material, or even true, and all of which lack a principled basis for contending that
these same legal arguments have more weight or credibility outside of this State.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 16 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Defendants argue that some states require “physical invasion” of property, but they cite
no cases considering and rejecting the type of digital intrusion at issue here.3 See Path Opp. at
13; Apple Opp. at 24-25, 33 and n.14 & 17. Federal courts sitting in diversity in the states of
Florida, Rhode Island, Maine and Wisconsin have all rejected such a requirement. Stirling
Intern. Realty v. Soderstrom, No. 6:14-cv-1109-ORL, 2015 WL 403318 at *6 (M.D. Fla. Jan.
28, 2015); Lisnoff v. Stein, 925 F.Supp.2d 233, 240 (D.R.I. 2013); Thayer Corp. v. Reed, No.
2:10-cv-00423-JAW, 2011 WL 2682723 at *10 (D. Maine July 11, 2011); Fisher, supra, 207 F.
Supp. 2d at 928 (denying summary judgment because “it is disputed whether accessing
plaintiff’s email account is highly offensive to a reasonable person and whether plaintiff’s email
account is a place that a reasonable person would consider private”).
Defendants also cite non-analogous cases for the overly-broad proposition that the
contents of iDevices are not private if the information on them has ever been shared. Research
discloses no case holding that an individual’s choosing to share information with some people
means that anyone else in the world can take that information at will. Privacy is a situational
concept, not an absolute one. Sanders v. ABC, Inc., 20 Cal. 4th 907, 915-16 (1999).
The Court should decline the invitation to manufacture material differences in state law
by reading any foreign state’s case law “more broadly than its text requires.” CRS Recovery v.
Laxton, 600 F.3d 1138, 1143 (9th Cir. 2010) (admonishing defendants’ creating of material
differences). The common law claim of intrusion upon seclusion is well-established among the
50 states, its orders of proof are uniformly simple, and the claim applies with a certain elegance
post-Riley to the digital mobile computing age. In this, Defendants have failed to show that any
state’s law materially differs from California’s law in protecting the privacy of address book
data on a class member’s personal digital device.
3 Louisiana’s constitutional right to privacy is not circumscribed by the physical “quarters” language Path quotes (see Path Opp. at 11) but instead protects “varied interests from invasion” including each individual’s “seclusion or solitude, or [] private affairs.” La. Const. of 1974, Art. 1 § 5; Broderick v. Dept. of Envir. Qual., 761 So.2d 713, 715 (La.App. 2000).
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 17 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
11
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
b. Step Two: No True Conflict of Interest
The Court reaches the second step of the “governmental interest test” if and only if
Apple and Path meet their burden to show materiality in the first step. See Rutledge, supra, 238
Cal.App.4th at 431; Wershba, supra, 91 Cal.App.4th at 242-43; Wolph, supra, 272 F.R.D. at
486. While the Court need not reach this issue, no “true conflict” exists because “under the
circumstances of this particular case,” foreign states have no true interest in enabling or
protecting Apple or Path to secretly harvest data from their residents. CRS Recovery, supra, 600
F.3d at 1143 (rejecting imprecise or incorrect characterizations of foreign state’s interest as
presenting “classic false conflict”); Forcellati v. Hyland’s, No. 12-cv-1983, 2014 WL 1410264
at *2-3 (C.D. Cal. Apr. 9, 2014) (same).
Apple cites just one case to establish a true conflict, In re Yahoo Mail, 308 F.R.D. 577,
604-05 (N.D. Cal. 2015). But the decision there stands for the narrow choice-of-law principle
that each foreign state has an interest in “shielding” out-of-state companies, via its state statutory
wiretap laws, from liability for secretly scanning the emails of their residents. That interest in
turn derived from Yahoo’s argument, accepted by the court there, that nationwide application of
California state statutory law would “set [] back email services for decades.” Id. at 600 & n.10.
No such interest is present here. In fact, just the opposite is so, if Apple’s more recent
statements about data privacy are to be believed. See In re Apple, No. 15-mc-01902, 2016 WL
783565 at *21 & n.34 (E.D.N.Y. Feb. 29, 2016) (quashing federal law enforcement subpoena
because, in part, court must “take into account the extent to which the compromise of privacy
and data security that Apple promises its customers affects not only its financial bottom line, but
also its decisions about the kind of corporation it aspires to be”). Without identifying any
discernably “true” reason why any single state has any interest specific to restricting California’s
nationwide application of common law intrusion, Apple and Path fail to meet their conflict of
law burden here.4
4 Path cites to a single case, Kearney v. Salomon Smith Barney, 39 Cal.4th 95 (2006), for the proposition that, as a matter of law, “California has no government interest in the privacy interests of nonresidents.” But Kearney held no such thing; it dealt with the conflict between
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 18 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
12
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
c. Step Three: Comparative Impairment
Assuming Apple and Path met their burden to proceed beyond the first two steps of the
relevant choice-of-law test, which they have not, the Court then “must carefully evaluate and
compare the nature and strength of the interest of each jurisdiction in the application of its own
law to determine which state’s interest would be more impaired if its policy were subordinate to
the policy of the other state.” Forcellati, supra, 2014 WL 1410264, at *2-3. Defendants cite
Yahoo Mail, but they fail to show how any state’s interests are impaired by enforcing California
common law on the data collection efforts of California residents like Path and Apple.
d. Apple’s Aiding and Abetting
By its own admission, California is the nexus of Apple’s substantial assistance to Path as
well as its own alleged misconduct, independent of Path. The aiding and abetting authority
Apple cites has no tie to “the circumstances of this particular case” and on that basis alone
cannot possibly meet the burden articulated in Mazza. Id.
Conclusory assertions that differences in state aiding and abetting law are “critical” from
a theoretical standpoint do not satisfy the pertinent test. Apple must shoulder its burden to
establish that California’s interest is properly “subordinated” to those foreign states enforcing a
“materially” different standard. See id.
Apple fails to show that any state has expressed any particular interest in limiting out-of-
state entities’ liability for their role in “substantially assisting” the intrusion at issue here. Apple
makes the utterly meaningless statement, in a single sentence and without citation, that in toto
state law reflects “profoundly different social and policy judgments.” See Apple Opp. at 26.
Apple’s reliance on Yahoo Mail as a cure-all is inapposite for all of the reasons discussed above
(not to mention that no aiding and abetting claim was at issue in that case).
The remainder of Apple’s choice of law showing on aiding and abetting is confined to
the merits. As an example, Apple mischaracterizes Plaintiffs’ aiding and abetting argument as
falling under the second prong of Section 230 of the Communications Decency Act, 47 U.S.C. §
one-party and two-party consent states over recording of telephone calls. See id. Unlike in both Kearney and Yahoo Mail, no such clear statutory conflict exists here.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 19 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
13
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
230. See Apple Opp. at 5 & n.3. For present purposes, Plaintiffs need only remind the Court
that the CDA is a federal law that would apply nationwide and enforce any policy judgments on
a common basis as to each class member’s claims against Apple that arise from Apple’s
assistance to Path. The balance of Apple’s merits argument is for another day.
* * *
Application of California law is consistent with the Defendants’ own terms of use, their
prior admissions to obtain transfer of this case, due process, and California’s choice of law
principles. The Court should apply California law to the class claims and, thus, choice of law
presents no predominance issue.
B. Liability Is Established Objectively Not Based on How Each Person Feels.
At the same time that Apple broadcasts to the world that the contents of its customers’
phones are so sacred to it that the privacy interests of a dead terrorist outweigh the federal
government’s interest in prosecuting (and, potentially, preventing) acts of terror, Apple and Path
argue here that Plaintiffs’ phones and their data are not really private at all.5 Instead, they seek
to condition Plaintiffs’ privacy interests upon proof that each and every person subjectively
believed their Contacts database was private and that they were offended by Path’s conduct.
There is no requirement of subjective intent or offense. Under California law, the
common law tort of “intrusion on seclusion” has only two elements: “(1) intrusion into a private
place, conversation, or matter, (2) in a manner highly offensive to a reasonable person.” See
Case No. 12-cv-01529-JST, ECF No. 67, at 42. Contrary to Apple’s contention (see Apple Opp.
at 13), for an “intrusion on seclusion” claim, the invasion also does not need to be “an egregious
5 Apple has spent the last several months telling the world in a very public and coordinated way – engaging in what the U.S. Department of Justice views as a massive public relations campaign to burnish its “brand” in a manner reminiscent of the “buzz marketing” and “earned media” Plaintiffs contend are at issue in other parts of the present case – that it has dedicated itself as a company to user privacy and that it treats the data contained on a user’s iDevice as personal and private. Away from the media onslaught engendered by Apple’s battle with federal law enforcement, however, Apple insists just the opposite here and elsewhere in this case. See, e.g., ECF No. 653, at 3-4 (nothing shows address book data “to be highly sensitive, or indeed, private at all” and users have not “articulated a colorable argument for why such data could be considered private”).
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 20 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
14
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
breach of a social norm.” The authority Apple cites, In re iPhone App. Litig., 844 F.Supp.2d
1040, 1063 (N.D. Cal. 2012), dealt with California’s constitutional and not common law privacy
protections. The elements of the claims are different.
For the first element of the common law claim, there is no real dispute that Apple and
Path intruded into a private place, i.e., Plaintiffs’ and class members’ iDevices. But to the extent
there is a dispute, Apple and Path’s conduct was the same for all the class members, creating a
common question for resolution on a classwide basis. “[T]he plaintiff must have an objectively
reasonable expectation of seclusion or solitude in the place, conversation, or data source.”
Varnado v. Midland Funding, 43 F.Supp.3d 985, 992 (N.D. Cal. 2014). The “reasonableness” of
an expectation of privacy is “an objective entitlement founded on broadly based and widely
accepted community norm.” Hill v. NCAA, 7 Cal. 4th 1, 36 (1994).
There is no additional subjective component for each class member to satisfy. The only
case Apple cites, Med. Lab. Mgmt. v. ABC, Inc., 306 F.3d 806, 812 (9th Cir. 2002), considered
Arizona law and discussed the plaintiff’s “subjective expectation of seclusion or solitude in the
place, conversation, or matter” specifically at issue in that case. Here, it is now settled law that
individuals have an objectively reasonable expectation of seclusion on their cellphone. Riley v.
California, ___ U.S. ___, 134 S.Ct. 2473 (2014).
The second element also requires no subjective inquiry. Taus v. Loftus, 40 Cal. 4th 683,
705 (2007) (citing Shulman v. Group W, 18 Cal.4th 200 (1998)). This is a “‘policy’
determination as to whether the alleged intrusion is ‘highly offensive’ under the circumstances.”
Hernandez v. Hillsides, 47 Cal.4th 272, 287 (2009). The important inquiry is the “intruder’s
motive and objectives,” not the victim’s subjective level of offense. Id. at 287. Apple and Path’s
motive and objective are classwide questions, not particularized to any individual class member.
The resulting question – would a reasonable person find Apple and Path’s conduct
highly offensive? – is thus necessarily a classwide question that can be answered on a classwide
basis. To the extent Defendants contend their invasion of Plaintiffs’ privacy was “accidental,
misguided, or excusable,” Hernandez, supra, 47 Cal. 4th at 295, this too is a perfect question for
classwide resolution.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 21 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
15
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Even Defendants’ case law emphasizes the objective character of the inquiry. In the
same paragraph Apple cites from Hill, supra, 7 Cal. 4th at 25-26, the court recognizes the
limiting principle in the privacy torts is “the importance of the objective context of the alleged
invasion.” (Emphasis in original.)
Defendants cite only one case describing a subjective component of the claim, Greywolf
v. Carroll, 151 P.3d 1234 (Alaska 2007), but that decision – never cited outside of Alaska –
considers whether a psychiatric patient has an expectation that her doctor will not report
menacing behavior to the police and therefore has nothing to do with the expectation of privacy
in mobile device data. Cf. Riley, supra, 134 S.Ct. at 2495 (“modern cell phones [] with all they
contain and all they may reveal [] hold for many Americans the privacies of life”) (internal
citations omitted). The reason why police cannot conduct warrantless searches is the arrestee’s
reasonable expectation of privacy in the information contained on modern cellphones. Id. at
2490 (“many of the more than 90% of American adults who own a cell phone keep on their
person a digital record of nearly every aspect of their lives”).
Each of the Plaintiffs testified they were, in fact, subjectively offended by Apple and
Path’s conduct. See Kennedy Reply Decl. at ¶ 6 & Ex. F, Carter Depo. Tr. at 186:13-15 (“my
information being taken without my permission is the issue, is the thing that offends me”); at ¶ 7
& Ex. G, Cooley Depo. Tr. at 70:2-3 (“I think it’s offensive for them to have taken contacts
from my personal device.”); and at ¶ 8 & Ex. H, Green Depo. Tr. at 50:20-25 (“it is offensive.
My contact data is very private to me”). This testimony is consistent with the reasonable
expectation that an iDevice App is not going to secretly upload or copy data from one’s phone,
all that is required for both certification and to prove the claim.
The same is true with respect to how each class member uses social media. Consent
matters. (Defendants in this case who sought some form of consent focus on it. See, e.g., ECF
No. 706, at 8-10.) Just as holding a private party at one’s home does not excuse a subsequent
trespass, consenting to share contacts data with some apps does not excuse unauthorized
harvesting by others. Defendants cannot defeat certification by claiming that the Court must
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 22 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
16
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
examine how each class member feels about social media and the precise lines of permission
and restriction that person applies when other apps ask to copy or otherwise use their data.
C. The Specific Contents of Each Phone Are Irrelevant.
Defendants also argue – as if this were a trade secret case – that the specific contents of
each address book are relevant to determine liability. According to Defendants, only secret
phone numbers are protected, and there is no right of privacy preventing an app developer from
copying the contents of one’s address book without permission if the phone numbers in the
address book are known to anyone (for instance, listed in the White Pages). Defendants make
up a lot of “rules” around these arguments, claiming that business numbers cannot be private,
numbers in the phone book cannot be private, etc.
It is not the numbers themselves that are private. It is the phone, and specific collection
of data therein, that is private. Defendants cite no case, as there is none, holding that people
have no expectation of privacy in data on their phones unless the data itself is secret and unique
to that person.
While Defendants’ argument presents a clever way to defeat class certification, it is
otherwise nonsensical. There is nothing secret about the way the Golden Gate Bridge looks.
Does that mean that if one takes pictures of the bridge with their phone, their privacy is not
violated if the phone is hacked and the pictures copied? Does the fact people have specific
medicines or other items in their purses or bedside tables become non-private because those
same items are sold in drug stores? Defendants conflate the privacy of the phone with whether
each piece of data on the phone is separately private and akin to a trade secret. The Riley
decision would have little meaning if the privacy recognized by the Supreme Court was limited
to data or images uniquely appearing on an individual’s phone.
Nor is it the law that private data may only be known by the owner, or that once some
data has been publicly disclosed there can be no privacy violation with future disclosure. The
facts in Taus are instructive; there, plaintiff sued a pseudo-academic journal that investigated her
claims she had been sexually abused as a child, and recovered the memories after speaking with
a therapist. Taus, supra, 40 Cal. 4th at 691. The journal obtained information from plaintiff’s
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 23 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
17
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
foster mother—information that, under Defendants’ theory, was non-private by virtue of its
disclosure to the foster mother. Id. at 729-30.
The California Supreme Court specifically rejected Path and Apple’s theory that “no
violation of a person’s reasonable expectation of privacy occurs when a third party” – such as
Path and Apple – “obtains access to personal information about the person from his or her
relatives or friends by utilizing improper and unanticipated means.” Id. at 731-32. The court
correctly reasoned that “there is a significant difference between the disappointment one feels
when a relative or friend reveals one’s personal secrets, and the affront to one’s personal
integrity and individual dignity that results when a third party, with whom one has no personal
relationship, uses improper and unauthorized means to obtain access to such personal, private
information.” Id. (internal citations omitted).
Likewise, the court’s decision in Sanders, supra, 20 Cal. 4th at 913-16, holds that
voluntarily disclosing private information does not vitiate an intrusion claim. In Sanders, a
reporter posed as a “tele-psychic” to gain employment with the Psychic Marketing Group, then
secretly recorded private conversations with her fellow “psychics.” The Court held “to be
reasonable for purposes of the intrusion tort” an expectation of privacy need not be “absolute or
complete.” Id. at 913. Thus, “privacy, for purposes of the intrusion tort, is not a binary, all-or-
nothing characteristic.” Id. at 913-14. Further,
There are degrees and nuances to societal recognition of our expectations of privacy: the fact that the privacy one expects in a given setting is not complete or absolute does not render the expectation unreasonable as a matter of law. Although the intrusion tort is often defined in terms of “seclusion,” the seclusion referred to need not be absolute. Like “privacy,” the concept of “seclusion” is relative. The mere fact that a person can be seen by someone does not automatically mean that he or she can legally be forced to be subject to being seen by everyone.
Id. at 915-16 (internal citations omitted). That the unwitting psychic discussed his personal
feelings and beliefs with his presumed co-worker did not eliminate his right to privacy. “Privacy
for purposes of the intrusion tort must be evaluated with respect to the identity of the alleged
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 24 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
18
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
intruder and the nature of the intrusion.” Id. at 917-18. And here, the identities of the intruders
and the nature of the intrusions are common across the class.
There is no law suggesting that one’s cell phone or similar device is only private if the
contents of the device are independently secret. None of the cases cited by Defendants holds, or
even implies, that Path had the right to copy the contacts from all iDevices that used the Path
App so long as the same information could be found elsewhere in the world or had been shared
with other people.
D. Damages Can Be Proven Classwide and Do Not Defeat Certification.
Defendants’ next predominance argument – that individual issues exist as to damages
and defeat certification – suffers from numerous flaws, the first of which is that Ninth Circuit
law holds that individual damage calculations cannot defeat class certification.
1. Individualized damage questions do not defeat certification.
In late 2015, the Ninth Circuit reaffirmed its long-standing holding that individual
damage calculations do not defeat class certification. Pulaski, supra, 802 F.3d, at 987-88;
Yokoyama v. Midland Nat., 594 F.3d 1087, 1094 (9th Cir. 2010) (citing Blackie v. Barrack, 524
F.2d 891, 905 (9th Cir. 1975)). In so doing, the Ninth Circuit rejected the extreme view of
Comcast v. Behrend, __ U.S. __, 133 S.Ct. 1426 (2013), urged by the defense bar.
The Pulaski court held that Comcast “did not hold that proponents of class certification
must rely upon a class-wide damages model to demonstrate predominance.” Id. at 988 (citing
Roach v. T.L. Cannon, 778 F.3d 401, 407 (2d Cir. 2015)). Five other circuits have joined the
Second and Ninth Circuits in rejecting the more expansive view of Comcast. Jimenez v.
Allstate, 765 F.3d 1161, 1167 (9th Cir. 2014) (citing cases from the Fifth, Sixth, and Seventh
Circuits); Roach, supra, 778 F.3d at 407 (citing cases from the First and Tenth Circuits).
Defendants ignore this controlling authority, as well as the subsequent district court
cases citing it and rejecting the type of damage challenges to predominance Defendants make
here. Mullins v. Premier Nutrition, No. 13-cv-01271, 2016 WL 1535057 at *6 (N.D. Cal. Apr.
15, 2016) (granting certification on a “full refund” liability theory); Falco v. Nissan, No. 13-cv-
686, 2016 WL 1327474 at *12 (C.D. Cal. Apr. 5, 2016) (granting certification where “Plaintiffs
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 25 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
19
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
explain that their damages expert, after further discovery, can perform a class-wide remedies
analysis”); Robinson v. Open Top Sightseeing, No. 14-cv-00852, 2015 WL 9304041 at *4 (N.D.
Cal. Dec. 22, 2015) (granting certification in employment overtime case where liability involves
no individualized determination); Abbit v. ING, No. 13-cv-2310, 2015 WL 7272220, at *14
(S.D. Cal. Nov. 16, 2015) (granting certification where “the Court entertains concerns as to the
methodology” proposed, but nevertheless “finds at this time that the damage model is plausible
and that individualized issues do not defeat certification”).
Defendants urge the Court to adopt the exact misreading of Comcast the Ninth Circuit
rejected in Pulaski. See Apple Opp. at 27; Path Opp. at 20-21. Neither cites the Pulaski
decision, or acknowledges that there was no dispute in Comcast – an antitrust case – that
Plaintiffs were required to present a damage model showing the economic impact of the claimed
anticompetitive behavior to establish liability.
Amongst other pre-Pulaski law, Defendants cite Lilly v. Jamba Juice Co., 308 F.R.D.
231, 244 (N.D. Cal. 2014). In Lilly, this Court concluded that plaintiffs had some obligation to
“demonstrate that their damages models were feasible [though] often,” the Court wrote, “this
will impose only a very limited burden.” Id. For example, the Court proposed that “in a wage-
and-hour case [] producing a payroll database will likely suffice.” Id.
Plaintiffs respectfully submit that the Lilly decision is inconsistent with the subsequent
Pulaski case. (As the Court is no doubt aware, its Lilly decision is on appeal.) Yet, even if the
Court were to apply the same limited burden here, Plaintiffs meet it.
2. Plaintiffs’ proposed conjoint model satisfies Rule 23.
Plaintiffs allege that Path, aided and abetted by Apple, programmed its application to
automatically harvest contact information on every Path user’s iDevice. Path neither sought nor
obtained consent to take this data. This intrusion cost Plaintiffs their inherent privacy interest in
protecting the harvested data by violating their right to exclude Path from that data, as “one of
the main rights attaching to property is the right to exclude others.” Rakas v. Ill., 439 U.S. 128,
143 & 163 & n.12 (1978).
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 26 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Plaintiffs proposed to calculate that harm for the putative classes by performing a
conjoint analysis isolating the value of this right. See ECF No. 651, at 20. Path challenges this
model on the basis that the survey has not been conducted and, with no authority of any kind,
that Plaintiffs’ inherent privacy interest is not compensable. See Path Opp. at 21. Apple does
not challenge the compensability of the lost privacy interest, arguing that it depends upon
individual strength of feeling and cannot be measured by a conjoint survey. See Apple Opp. at
27-30. Apple provides testimony from two previously-undisclosed experts to opine that any
such model would be unreliable.
Under Pulaski, none of these objections are relevant. Each argument – the
compensability of objective damages, the sufficiency of a conjoint survey, and the merits of the
survey – can be resolved on a classwide basis. Neither Path nor Apple contends that such a
survey would not be related to their challenged conduct. Pulaski, supra, 802 F.3d at 987-88
(plaintiffs need only “show that their damages stemmed from the defendant's actions that created
the legal liability”).
Plaintiffs’ analysis also satisfies the pre-Pulaski standard this Court adopted in Lilly.
Under Lilly, this Court examined three factors: (1) did Plaintiffs meet their limited burden of
showing damages can “feasibly and efficiently be calculated once the common liability
questions are adjudicated;” (2) did Defendants make “at least a prima facie showing that
damage calculations are likely to be more complex;” and (3) if so, do Plaintiffs lay “at least
some evidentiary foundation” that can “establish the feasibility and fairness of damage
assessments.”
Plaintiffs’ motion met the first factor by proposing a straightforward conjoint analysis to
isolate the value of Plaintiffs’ objective privacy interests. “Conjoint analysis has been used for
decades as a way of estimating the market's willingness to pay for various product features.”
Guido v. L'Oreal, No. 2:11-cv-01067-CAS, 2014 WL 6603730 at *5 (C.D. Cal. July 24, 2014).
See also TV Interactive Data v. Sony, 929 F. Supp. 2d 1006, 1022 (N.D. Cal. 2013) (holding
conjoint analysis “is accepted by the relevant community”). Apple has relied upon conjoint
analysis to isolate the value of specific smartphone features. Apple v. Samsung, No. 12-cv-
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 27 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
21
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
00630, 2014 WL 794328 at *16 (N.D. Cal. Feb. 25, 2014) (approving Apple’s use of “a choice-
based conjoint survey to quantify decrease in demand for the product absent the patented
feature”). Plaintiffs further proffered objective evidence of who was harmed, akin to a payroll
database. See ECF No. 651, at 17 (databases of Path users whose data was harvested).
Path fails to make a prima facie showing that the damage calculations will require
anything more complex than the proposed conjoint analysis. Only Apple provides evidence
supporting its assertion that “conjoint analysis cannot calculate the effect of myriad factors that
could bear on the dollar value any particular individual would assign to an intrusion” in the form
of two declarations from non-economists. See Apple Opp. at 29.
But Plaintiffs’ proposed use is directly analogous to the use Apple made of a conjoint
survey in its Samsung litigation, where it sought to calculate a single number representing the
impact of removing patented features from Samsung’s devices. Apple, supra, 2014 WL 794328
at *13. Given this use of conjoint analysis to analyze large-scale consumer behavior, it is not
clear what Apple’s complaint that “conjoint surveys are designed to assess individual valuation,
not societal values” means. See Apple Opp. at 29. Individual survey responses can be
aggregated to provide meaningful data; Apple has done so in other litigation.
Apple’s other contention – that the resulting evidence is representative rather than
individualized – provides no basis to deny certification. Representative evidence can be used
where it “is relevant in proving a plaintiff’s individual claim.” Tyson Foods, supra, 136 S. Ct. at
1046. In this case, an individual plaintiff would rely on the same conjoint analysis proposed by
the class to measure the objective value of her lost privacy interest.
Not only do Defendants fail to present the prima facie showing identified in Lilly,
Plaintiffs here satisfy any obligation they have to lay at least some evidentiary foundation
establishing the feasibility and fairness of damage assessments. Notably, the record does not
reflect that Plaintiffs in Lilly responded to defendants’ prima facie showing with any evidence
regarding their proposed damages analysis.
While Plaintiffs’ motion has already satisfied the burden under Comcast, Path and Apple
raise expert arguments in opposition calling for some form of rebuttal, tailored to the contours of
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 28 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
22
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
class certification. Apple offers one expert to assert summary judgment arguments styled as an
opposition to certification, asserting through that expert that sharing conduct varies between
users once they enjoy the opportunity to consent or not consent to specific third party collection
and use of their address book data. See ECF No. 701, at 16-18.
Plaintiffs stipulated to this fact for a reason. See Apple Opp. at 17. The interest at issue
is the inherently valuable privacy interest of requiring informed choice in the first place.
Plaintiffs’ expert will administer a methodologically-sound “Willingness to Pay” conjoint
analysis to establish a reliable, uniform classwide measure for this interest.
In the accompanying rebuttal declaration, Professor Hank Fishkind, Ph.D., describes
how economists regularly measure the value present in this case. Dr. Fishkind cites to prior
studies that have successfully evaluated the privacy value at issue in equivalent circumstances
and identifies that he has used this same approach in other cases. See Fishkind Decl. at ¶ 9.0.
His declaration describes a comparable survey design for the interest at issue in this case, and he
supports his proposed design as consistent with established econometric techniques and
principles. Id. at ¶ 54.0. Dr. Fishkind concludes that a large sample of qualified survey
respondents will allow a credentialed expert to conduct a properly screened survey to measure
the value of protecting personal address book data (in his words, “the value of a lock”) in the
acquisition of a mobile device social networking application. Id. at ¶ 21.0.
There is no “might” (see Apple Opp. at 27) or “speculation” (see Path Opp. at 21) about
it. As Plaintiffs stated in their motion, and now reiterate, Plaintiffs expect to provide a
methodologically-sound survey to establish a classwide, uniform measure for the inherent value
of the privacy interest that Path and Apple invaded during the class period.
Because Plaintiffs have proposed a damage analysis that stems directly from the
Defendants’ actions, they have sufficiently demonstrated that damages can be dealt with on a
classwide basis.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 29 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
23
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
3. Plaintiffs’ unjust enrichment theory of recovery does not require a complex
model.
Plaintiffs also expect to prove that Path was unjustly enriched by its harvesting of over
662 million private address book records. Plaintiffs’ theory is simple: Because Path had no right
to harvest these records without Plaintiffs’ consent, any benefit it obtained is unearned and must
be disgorged. While discovery is ongoing on these claims, Plaintiffs expect to obtain documents
allowing the fact-finder to measure the benefit Path obtained from this massive collection of
data. See ECF No. 705.
Defendants’ objections show that this theory of recovery depends entirely upon
questions subject to classwide determination. Path (but not Apple) suggests unjust enrichment
is unavailable because neither Plaintiffs nor Path sold their contact data to a third party and
further argues that its increase in valuation was not influenced by the hundreds of millions of
records it harvested. See Path Opp. at 24-25. Apple (but not Path) argues that unjust
enrichment is not available as a remedy for intrusion or where the money a defendant receives
does not come directly from the Plaintiff. See Apple Opp. at 33-34. Each of these merits
questions will be answered the same way for the entire class.6
Defendants also attack Plaintiffs for not providing a detailed unjust enrichment damages
model, but those damages are an inherently common question. The Court can determine on a
classwide basis whether unjust enrichment (1) is a viable remedy in intrusion cases (it is, as set
6 When it does come time for the Court to consider the merits of this case, the evidence will refute Defendants’ self-serving positions. For example, Path and the other Defendants repeatedly urge the Court to accept the proposition that they collected contacts as a “service” to users, with no profit to themselves in so doing. Yet less than a year before stealing the class members’ contacts, Path’s owners filed a patent claiming detailed data-mining methods for utilizing user contacts to weigh for relationship strength and leveraging this information to manipulate each user’s interaction with the entire app. Path’s patent teaches that “When applied to all of a user’s contacts, the RelationshipRank process helps identify the user’s current most relevant contacts.” See U.S. Patent No. 8589491, col.6 l.24-26 (filed July 7, 2011). This and other evidence (as well as common sense) will show that Path copied Plaintiffs’ contacts (and Apple supported Path in that endeavor) because both Defendants could and did leverage that data in the conduct of their respective businesses, not out of the goodness of Defendants’ hearts or some desire to dole out “free” services to their customers.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 30 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
24
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
forth in Restatement (Third) of Restitution and Unjust Enrichment § 3 cmt. b (2011) (restitution
appropriate to “protect[] the owner’s right to insist that any use of property by another – whether
or not it diminishes the property’s value – be made with the owner’s consent and on the owner’s
terms”)); (2) is available for money received by a third party (it is, as set forth in Shersher v.
Superior Court, 154 Cal. App. 4th 1491, 1500 (2007) (“it is not essential that money be paid
directly to the recipient by the party seeking restitution”)); (3) can be had without a direct sale of
the data (it is, as set forth in San Bernardino v. Walsh, 158 Cal.App.4th 533, 542 (2007) (“a
person acting in conscious disregard of the rights of another should be required to disgorge all
profit”)); and (4) can be attributed to Path’s illegal data harvesting, based upon a complete
review of all admissible evidence on a dispositive motion or at trial.
Furthermore, Pulaski is directly applicable to Defendants’ assertion that some model is
required at this preliminary stage. There, Plaintiffs sought certification of a claim for restitution
damages based upon allegations that Google’s AdWords program “misled them as to the types
of websites on which their advertisements could appear.” Pulaski, supra, 802 F.3d at 981-82.
The Ninth Circuit acknowledged that calculating restitution damages can be difficult, but also
that “the amount of damage may not be susceptible of exact proof or may be uncertain,
contingent or difficult of ascertainment does not bar recovery.” Id. at 989. It was therefore
satisfied by Plaintiffs’ description of a proposed model, without any reference to expert
testimony. Id.
Here, Plaintiffs’ theory is even simpler. If Plaintiffs prove that Path was enriched as a
result of its data harvesting (immediately following which its private market valuation increased
by an order of magnitude), the amount must be distributed evenly to the class. What’s complex
about that? Common questions therefore predominate as to Plaintiffs’ unjust enrichment theory.
4. Plaintiffs’ nominal damages and punitive damages theories of recovery
require no model.
Plaintiffs also do not need any damage model to show that Path’s unauthorized upload of
their contact data was an unlawful intrusion, that Apple aided and abetted in that intrusion, and
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 31 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
25
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
that Plaintiffs are, at minimum, entitled to nominal and punitive damages. Defendants
committed torts regardless of the economic consequences for any involved party.
Defendants argue that Plaintiffs’ nominal damage theory is unavailable because the class
includes plaintiffs who have not been injured. Each Plaintiff in the “Intrusion Upload Subclass”
(as defined) suffered the same intrusion (access and upload of their contacts data) while
receiving no notice the upload would happen and providing no consent. No individual Plaintiff
could have changed this objectively-offensive result.
Similarly, each Plaintiff in the “Intrusion Class” (as defined) suffered the unintended
download of invasive software. Thus, Plaintiffs have made a prima facie showing that each
Plaintiff suffered a “real, actual injury.” Cal. Civ. Code §3360; Allen v. McMillion, 82
Cal.App.3d 211, 219 (1978) (“if the forcible intruder were not the owner of the property, the
party in peaceable possession would be entitled to an award of at least nominal damages”).
Path (but not Apple) maintains that even nominal damages are subject to individualized
proof because the amount of data collected from the tortious intrusion differs by Plaintiff. See
Path Opp. at 22. If true, Path’s objection merely invites another simple damage calculation: a
nominal amount per contact rather than per plaintiff. While Path also criticizes Plaintiffs for not
specifying the specific amount of nominal damages, that is not a question to be resolved now.
Path also misconstrues the nature of its own intrusion: It would not have uncovered the number
of contacts on any class member’s device without first committing a tortious intrusion.
Finally, Apple (but not Path) asserts that nominal damages are inappropriate because
some class members may be able to prove individual damages. See Apple Opp. at 32-33.
Absent class members who believe they have suffered individualized “emotional distress”
damages are protected by the opt-out provisions under Rule 23(c)(2)(B), and the Court should
not “sacrifice the obvious advantages in judicial efficiency resulting from the ‘opt out’ approach
for the protection of [Apple’s purported] somewhat rare species of class member who is
unwilling to execute an ‘opt out’ form, but whose claim is nonetheless so important that he
cannot be presumed to consent to being a member of the class by his failure to do so.” Phillips
Petroleum v. Shutts, 472 U.S. 797, 813-14 (1985).
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 32 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
26
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Neither Path nor Apple disputes the availability of punitive damages under California’s
intrusion upon seclusion tort. Apple Opp. at 30 (agreeing that Ellis v. Costco, 285 F.R.D. 492
(N.D. Cal. 2012) held “the availability of punitive damages could be decided on the basis of
class-wide evidence centering on defendant’s conduct”); Path Opp. at 23 (acknowledging
California’s punitive damage standard). Instead, Defendants make three irrelevant arguments.
First, Defendants challenge the different standards provided by other states’ law, but
California law applies to the asserted claims for all members of the class.
Second, Defendants challenge the merits of Plaintiffs’ punitive damage showing by
presenting premature argument asserting that Plaintiffs will not prevail upon their punitive
damage theory (see Apple Opp. at 31-32; Path Opp. at 23-24), but the argument each presents is
precisely the sort of classwide dispute that the Court need not resolve at the certification phase.
Third, Apple (but not Path) argues that the amount of any punitive damage award must
be individually determined, which it contends is an additional bar on certification. See Apple
Opp. at 31 (citing no Northern District authority in support of contention that “courts routinely
find punitive damage calculations inappropriate for class treatment”). This last argument fails
because, in fact, “(b)(3) certification of [] punitive damages claims is appropriate.” Ellis, supra,
285 F.R.D., at 544. It also fails because, unlike the cases Apple cites, Plaintiffs here include a
nominal damages theory requiring no individualized calculation and allowing for punishment of
Defendants’ conduct. Arizona v. ASARCO, 773 F.3d 1050, 1058-60 (9th Cir. 2014) (en banc
approval of $300,000 punitive damage award on $1 in nominal damage) (“when only nominal
damages are awarded, application of a Gore ratio analysis is not appropriate”).
Defendants’ damage arguments thus also pose no barrier to predominance. The common
questions posed by Defendants’ uniform course of conduct predominate over any individual
issues in this case.
IV. BOTH PROPOSED CLASSES ARE APPROPRIATE
Apple (but not Path) challenges the proposed classes on the basis that each contains
uninjured people. See Apple Opp. at 20-22. It argues that, as a matter of law, those who
downloaded Path’s invasive software could not have been harmed unless their contacts were
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 33 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
27
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
harvested. It further argues that even “many” of those whose data was harvested without
permission were uninjured merely because they suffered no identifiable pecuniary injury or
mental anguish. See Apple Opp. at 21.
Apple’s first argument, that members of the Intrusion Class are uninjured because they
downloaded invasive software but did not use it to the point where it harvested their contacts,
presents the sort of merits question that the Court should not resolve on class certification.
Plaintiffs’ theory is not unprecedented. The California Supreme Court has held that even where
an employer “never viewed or recorded plaintiffs inside their office,” “did not intend or attempt
to do so,” and “took steps to avoid capturing them on camera and videotape,” those factors do
not preclude a finding of intrusion. Hernandez, supra, 47 Cal. 4th at 292.
While the Hernandez court ultimately found that the employer’s conduct in that case was
not offensive, that finding bears no factual similarity to this case, as an employer was recording
his employees to uncover suspected misuse of its computers. Id. at 298. Path, of course, had no
similarly legitimate concern. More significantly, as demonstrated above, the issue of whether
the classwide download of identical software into identical operating environments constitutes
an actionable invasion of privacy is the sort of question that the Court should certify and a jury
should resolve on a classwide basis.
Apple’s argument that members of the Intrusion Upload Subclass were not injured is
also flawed. As discussed above, whether Path’s conduct constitutes an invasion of privacy, and
the available remedies, are common questions where the answer will not differ amongst class
members.
V. TYPICALITY IS SATISFIED HERE
“Typicality is satisfied if the plaintiffs’ claims are reasonably co-extensive with those of
absent class members; they need not be substantially identical.” Ades v. Omni Hotels, No. 13-
cv-02468, 2014 WL 4627271, *8 (C.D. Cal. Sept. 8, 2014) (citing Hanlon v. Chrysler, 150 F.3d
1011, 1020 (9th Cir. 1998)). (Path’s after-the-fact consent arguments, see Path Opp. at 17, again
present common questions about whether allowing a subsequent version of the Path app to
access a user’s address book data retroactively authorizes the prior intrusion.) Ades certified a
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 34 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
28
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
consumer privacy class action where the plaintiffs alleged a “course of conduct by [defendant]
common to the class, and privacy violations typical to those of the class generally.” Id.
In a last-ditch effort to avoid certification, Apple uses the last few pages of its opposition
to spin Plaintiffs’ deposition testimony into a typicality defense to certification. See Apple Opp.
at 34-35; Path Opp. at 25. The primary thrust of this argument is that Plaintiffs have given
deposition testimony that, selectively quoted, suggests Plaintiffs support Defendants’ theories
regarding subjective opinion and its relation to the intrusion tort. As set forth above,
Defendants’ liability will be determined based upon objective factors and the only relevant
actions by any class member are downloading the Path App (for the Invasion Class) and using
the Path App until it harvested the class member’s private contact data (for the Invasion Upload
Subclass). Nothing about Plaintiffs’ responses makes them atypical of these classes, or provides
any unusual defense.7
Apple complains that Plaintiffs are atypical because, instead of hermetically sealing their
phones when the cases were filed, they continued to use their devices (on which Apple has
found no relevant information), upgraded, or lost those devices. Apple calls this “spoliation.”
See Apple Opp. at 35. This baseless assertion does not defeat typicality for two reasons. First,
the specific contents of plaintiffs’ devices are irrelevant. The phones have no log that shows
contact book uploads, and Apple has never pointed to anything stored on the phone that would
prove whether contacts were uploaded or what permissions were asked.
Second, defenses only defeat typicality where they require a Plaintiff to “meet defenses
that [were] not typical of the defenses which may be raised against other members of the
proposed class.” Ellis v. Costco, 657 F.3d 970, 984 (9th Cir. 2011). Apple does not contend
7 Apple misrepresents Plaintiffs’ testimony by ignoring the crucial parts of it (a/k/a, “cherry-picking”). For instance, Plaintiff Carter properly pinpointed the source of offense: “my information being taken without my permission is the issue, is the thing that offends me.” See Kennedy Reply Decl. at ¶ 6 & Ex. F (Carter Tr. 186:13-15). Plaintiff Cooley stated “actually uploading my contacts to somewhere else without asking me for permission to do so is highly offensive.” See id. at ¶ 7 & Ex. G (Cooley Tr. 127:16-19). Plaintiff Green expressed the same sentiment this way: “My contact data is very private to me and it's very valuable to me, and I don't want it to be accessed without my permission, period.” See id. at ¶ 8 & Ex. H (Green Tr. 50:20-25).
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 35 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
29
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
that any Plaintiff engaged in the sort of bad faith behavior shown in Apple’s only authority,
Akaosugi v. Benihana, 282 F.R.D. 241, 257 (N.D. Cal. 2012), where the sole representative
plaintiff downloaded nearly 6,500 files, then deleted them before returning the storage media to
defendant.
Apple’s spoliation accusation is, at best, “hypothetical and speculative” and can also
“readily be resolved by the Court without skewing the focus of the litigation.” In re Rail
Freight Fuel, 287 F.R.D. 1, 33 (D.D.C. 2012), vacated on other grounds, 725 F.3d 244 (D.C.
Cir. 2013). Apple’s business model is based on people upgrading and replacing its phones; most
class members are likely in the exact same position. Few, if any, class members would have
created a forensic image satisfactory to Defendants, and even when one (Plaintiff Carter) did,
Apple told her that image was unsatisfactory, as it did not meet Apple’s preferred (but
unannounced) protocol. See ECF No. 620. Defendants have proffered nothing from the
extensive evidence they have received, confirming its irrelevance, and therefore presenting no
challenge to typicality.
Apple also complains that “counsel” “offered to compensate [Mr. Green] for his time”
and “bought a new iPhone for Green’s personal use” See Apple Opp. at 35. This is a
misrepresentation of the facts reeking of desperation. Mr. Green’s iPhone was purchased in
exchange for his then-current device so that Plaintiffs could satisfy Judge Spero’s discovery
order by imaging Mr. Green’s old phone. See ECF No. 635, at 2 (requiring forensic imaging of
“the Apple device currently used by Mr. Green”). Mr. Green required access to a smartphone
for his job, and therefore required a replacement to allow sufficient time for his then-current
phone to be used.
Apple and Path offer no evidence that Mr. Green has received any compensation besides
reimbursement (by Apple and Path themselves) for deposition-related travel expenses. See ECF
No. 635, at 1. Apple cites deposition excerpts that simply do not support Apple’s insinuation.
See Apple Opp. at 35 & ECF No. 667-17 at 6. Reimbursement payments and the post-litigation
purchase of a new phone have nothing to do with the improper structured incentives criticized in
Apple’s sole authority, Rodriguez v. W. Publ'g Corp., 563 F.3d 948, 959 (9th Cir. 2009). If
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 36 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
30
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Apple had not uselessly demanded discovery of Mr. Green’s phone’s contents, there would have
been no need to buy him a new phone. That presents no reason to challenge Mr. Green as a
plaintiff.8 The class representatives’ claims are plainly “reasonably co-extensive with those of
absent class members,” satisfying Rule 23(a)(3).
VI. CONCLUSION
This is not a case where Plaintiffs are complaining about a series of events with some
similarity but that can be argued to be distinct transactions each with its own factual details. All
of the conduct by Path and Apple forming the basis for this case applied equally to the class as a
whole. There is not a single relevant thing that Path or Apple did that was different for some
class members than others (aside from whether the Path App was triggered and took the data,
which is dealt with by sub-classing). Common issues do not only predominate in this action,
they overwhelm it.
That predominant commonality is not overcome by arguments that individual class
members use their phones differently, have different feelings about privacy, live in different
states, or had different specific names, telephone numbers, and/or emails copied from their
phones. These distinctions are without a difference for present purposes. They provide no basis
to deny certification.
Dated: May 5, 2016 /s/ David M. Given
David M. Given Nicholas A Carlin Conor H. Kennedy PHILLIPS, ERLEWINE, GIVEN & CARLIN LLP 39 Mesa Street, Suite 201 San Francisco, CA 94129 Tel: (415) 398-0900 Fax: (415) 398-0911
8 Apple complains that Mr. Green discussed possible class representative incentive awards with another lawyer (not counsel in this case) before joining this case. The Court has discretion to grant such awards to class representatives, and commonly does. Someone informing Mr. Green of those facts does not make him an atypical representative.
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 37 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
Michael von Loewenfeldt James M. Wagstaffe Frank Busch KERR & WAGSTAFFE LLP 101 Mission Street, 18th Floor San Francisco, CA 94105 Tel: (415) 371-8500 Fax: (415) 371-0500 Interim Co-Lead Counsel for Plaintiffs Carl F. Schwenker (admitted pro hac vice) LAW OFFICES OF CARL F. SCHWENKER The Haehnel Building 1101 East 11th Street Austin, TX 78702 Tel: (512) 480-8427 Fax: (512) 857-1294 Plaintiffs’ Liaison Counsel Jeff Edwards (admitted pro hac vice) EDWARDS LAW The Haehnel Building 1101 East 11th Street Austin, TX 78702 Tel: (512) 623-7727 Fax: (512) 623-7729 Jennifer Sarnelli (SBN 242510) GARDY & NOTIS, LLP Tower 56 126 East 56th Street, 8th Floor New York, NY 10022 Tel: (212) 905-0509 Fax: (212) 905-0508 Plaintiffs’ Steering Committee
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 38 of 39
PLAINTIFFS’ REPLY MPA IFSO MOT. FOR CLASS CERTIFICATION RE PATH APP Case No. 13-cv-00453-JST
32
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PH
ILL
IPS, E
RL
EW
INE, G
IVE
N &
CA
RL
IN, L
LP
39 M
esa
Str
eet,
Sui
te 2
01
San
Fra
ncis
co, C
A
9412
9 (4
15)
398-
0900
CERTIFICATE OF SERVICE
I certify that on this day, May 5, 2016, I caused a copy of the foregoing document,
PLAINTIFFS’ REPLY MEMORANDUM OF POINTS AND AUTHORITIES IN
FURTHER SUPPORT OF MOTION FOR CLASS CERTIFICATION RE PATH APP, to
be served on all counsel of record via the CM/ECF system.
Dated: May 5, 2016 /s/ David M. Given David M. Given
Case 3:13-cv-00453-JST Document 709 Filed 05/05/16 Page 39 of 39