History
  • No items yet
midpage
Brodsky v. Apple Inc.
445 F.Supp.3d 110
N.D. Cal.
2020
Read the full case

Background

  • Plaintiffs (six named individuals from various states) sued Apple claiming its two-factor authentication (2FA) login process was enabled without authorization and interfered with access to devices, Apple services, and third‑party apps.
  • Plaintiffs asserted five causes of action: trespass to chattels, violation of the California Invasion of Privacy Act (CIPA), California Computer Crime Law (CCCL), the federal Computer Fraud and Abuse Act (CFAA), and unjust enrichment; they sought to represent a nationwide class (class period from 2015).
  • The Second Amended Complaint (SAC) largely repeated the First Amended Complaint’s allegations (2FA enabled by software updates, new Apple IDs, or user settings; delays of ~2–5 minutes; occasional lockouts when a trusted device was unavailable) and added two plaintiffs and a revocation-by-filing allegation.
  • The Court previously dismissed the FAC with leave to amend and, after reviewing Apple’s motion to dismiss the SAC, found Plaintiffs failed to cure defects identified earlier.
  • The Court dismissed all claims with prejudice for recurring deficiencies: lack of allegations that 2FA was enabled without authorization, no actionable harm or $5,000 CFAA loss, failure to plead contents/interception for CIPA, boilerplate CCCL allegations, unjust‑enrichment barred by an existing contract, and Rule 8/statute‑of‑limitations problems for several plaintiffs.

Issues

Issue Plaintiff's Argument Defendant's Argument Held
Trespass to chattels — authorization Apple enabled 2FA without consent (some via software updates) 2FA enabled by voluntary updates, new IDs, or user action; thus authorized Dismissed — plaintiffs failed to allege lack of authorization and failed to plead required harm; dismissed with prejudice
Trespass to chattels — harm/proximate causation 2FA delays and occasional lockouts dispossessed users or deprived use 2–5 minute delay does not impair device; alleged longer lockouts caused by events outside Apple’s control Dismissed — delay not actionable; plaintiffs did not plausibly tie longer lockouts to Apple
CIPA — interception / third‑party Apple intercepted communications (login requests, access to services/content) via 2FA CIPA prohibits third‑party interception; Apple is party to user‑to‑Apple communications; plaintiffs didn’t plead intercepted "contents" Dismissed — Apple not shown to be a third party to alleged communications; plaintiffs failed to plead contents
CFAA — unauthorized access 2FA constituted unauthorized access/exceeding authorized access Authorization relates to identity, not method; plaintiffs authorized Apple access via other login methods; no revocation of access Dismissed — plaintiffs challenged method not identity; abandoned arguments; no allegation revoking access
CFAA — damages ($5,000) Alleged economic loss from denied access, device/subscription value, and alleged data value Alleged delays do not produce $5,000 loss; Ninth Circuit rejects theory that loss equals lost ability to monetize personal data Dismissed — plaintiffs failed to plead $5,000 loss within one year
CCCL (Cal. Penal Code §502) Apple knowingly and without permission accessed/used plaintiffs’ devices/services via 2FA CCCL, like CFAA, requires access without permission; pleadings are boilerplate and do not show differing access via 2FA Dismissed — plaintiffs failed to allege lack of authorization or factual detail; boilerplate allegations insufficient
Unjust enrichment / quasi‑contract Plaintiffs seek restitution for alleged benefits Apple received Plaintiffs have express contract (Terms of Use); no allegations that contract is unenforceable Dismissed — California does not recognize stand‑alone unjust enrichment; quasi‑contract barred by existing contract absent facts showing unenforceability
Rule 8 / Statute of limitations Tolling doctrines apply; class claims timely Several named plaintiffs did not plead when 2FA was enabled; Brodsky and Tracey’s claims time‑barred Dismissed — four plaintiffs’ claims dismissed for failing to plead dates (Rule 8); Brodsky and Tracey’s claims time‑barred; tolling doctrines inapplicable

Key Cases Cited

  • Bell Atlantic Corp. v. Twombly, 550 U.S. 544 (2007) (pleading must be plausible under Rule 8)
  • Ashcroft v. Iqbal, 556 U.S. 662 (2009) (court need not accept conclusory legal allegations)
  • Intel Corp. v. Hamidi, 30 Cal.4th 1342 (2003) (California trespass to chattels requires unauthorized interference that causes harm)
  • In re Zynga Privacy Litig., 750 F.3d 1098 (9th Cir. 2014) ("contents" excludes metadata/record information under wiretap analogues)
  • United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (CFAA targets unauthorized procurement/alteration of information; courts avoid overbroad CFAA readings)
  • LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009) (CFAA §1030 civil suit requires proof of loss/damages)
  • Andrews v. Sirius XM Radio Inc., 932 F.3d 1253 (9th Cir. 2019) (rejected CFAA loss theory based on alleged loss of value of personal data)
  • Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058 (9th Cir. 2016) (CFAA liability where service explicitly revoked authorization)
  • Oracle USA, Inc. v. Rimini St., Inc., 879 F.3d 948 (9th Cir. 2018) (CCCL/CDAFA requires lack of authorization in initial access)
  • In re iPhone Application Litig., 844 F. Supp. 2d 1040 (N.D. Cal. 2012) (minor performance impacts without device impairment insufficient for trespass claim)
Read the full case

Case Details

Case Name: Brodsky v. Apple Inc.
Court Name: District Court, N.D. California
Date Published: Apr 7, 2020
Citation: 445 F.Supp.3d 110
Docket Number: 5:19-cv-00712
Court Abbreviation: N.D. Cal.