ORDER 1 GRANTING MOTION TO DISMISS WITH LEAVE TO AMEND IN PART
Defendant Microsoft Corporation (“Microsoft”) moves to dismiss the complaint of Plaintiff Holomaxx Technologies (“Holomaxx”) pursuant to Fed. R. Civ. Pro. 12(b)(6) for failure to state a claim upon which relief may be granted. The complaint asserts the following claims: (1) violation of 18 U.S.C. §§ 2510,
et seq.
(“Wiretap Act”); (2) violation of 18 U.S.C. §§ 2701,
et seq.
(“Stored Communications Act”); (3) violation of 18 U.S.C. § 1030,
et seq.
(“Computer Fraud and Abuse Act”); (4) intentional interference with contract; (5) intentional interference with prospective business advantage; (6) violation of California Penal Code §§ 630,
et seq.
(“wiretapping/eavesdropping”); (7) viola
I. BACKGROUND
Holomaxx describes itself as an “ecommerce business development company” that provides a number of different services, including “contracting] with commercial clients to provide a fully-managed email marketing service .... ” (Compl. ¶ 13). It sends millions of daily marketing emails on its clients’ behalf. (Id. at ¶ 14). It generates these e-mails from subscriber lists provided by its clients. The lists consist of individuals who either have elected voluntarily to receive such correspondence or who have “opted-in” by co-registration. (Id. at ¶¶ 14-15). Typically, it is paid a “fixed amount per email sent” and receives no compensation for e-mails that are unsuccessfully delivered. (Id.). Holomaxx asserts that it is a legitimate, CAN-SPAM Act compliant email service provider. (Id. ¶¶ at 15-16). It alleges that it takes specific safeguards to ensure such compliance, including: (1) producing e-mails with clear and accurate transmission and header information; (2) including “opt out” mechanisms for users electing not to receive future communications; (3) registering its domains and IP addresses with all available feedback loops; (4) originating all emails from the same set of servers; and (5) monitoring the compilation techniques employed by its clients. (Id. at ¶¶ 15-18). As a result of these safeguards, Holomaxx maintains a self-reported complaint rate of between 0.1% and 0.3%. 3 (Id. at ¶ 19).
Microsoft is a global technology company and a major Internet Service Provider (“ISP”). (Compl. ¶ 20). Microsoft provides free e-mail services to millions of Internet users. (Id.). Like most companies that offer e-mail service, Microsoft employs various filtering technologies and procedures that identify and reject potentially harmful communications. (Mot. to Dismiss, 1:11-14; Comp. ¶¶ 20-23). Holomaxx claims that Microsoft relies upon several faulty methods to determine whether incoming mail is spam, including an automated spam filter (“SmartScreen”), a technique known as a “dynamic spam trap,” 4 and evaluations from “whitelisting” services such as those offered by Return Path, Inc. (Compl. ¶¶ 20-23). Holomaxx alleges that in practice these methods filter and block legitimate e-mail communications. Holomaxx also claims that Microsoft wrongfully has refused to offer a remedy for these errors. (Id. at ¶¶ 20-24).
In or about November 2009, Microsoft allegedly began “intermittently blocking, rerouting, and ‘throttling’ (i.e. delaying) emails,” sent by Holomaxx from a block of IP addresses referred to as the “.78 addresses.”
(Id.
at ¶ 31). Microsoft stopped delaying the e-mails for approximately one month after being threatened with legal action, only to begin blocking them again
Holomaxx also claims that Microsoft wrongfully accessed the computer on which Holomaxx’s e-mails were stored, scanned the content of the e-mails, and obtained information therefrom without receiving consent from either Holomaxx or the intended recipients. (Id. at ¶ 41). Microsoft allegedly used this wrongfully obtained information, together with a “reputation score” provided by Return Path, Inc., to determine that Holomaxx’s e-mails were spam. (Id.). Finally, Holomaxx alleges that Microsoft communicated or implied to Dragon Networks, Holomaxx’s hosting IP data center, that it believed Holomaxx was sending spam. (Id. at ¶¶ 44-46). It is unclear whether Microsoft initiated this communication with Dragon Networks, or whether the communication was made in response to an inquiry by Dragon Networks after Microsoft blocked all messages originating from the data center’s IP addresses. (Id.). As a result, Holomaxx claims that its reputation was and continues to be damaged, and that its profits and its contractual relationships have been affected adversely. (Id. at 46). It seeks declaratory and injunctive relief; statutory, compensatory and punitive damages; and reasonable costs and attorneys’ fees. (Compl. 42:7-50:22).
II. MOTION TO DISMISS
“Dismissal under Rule 12(b)(6) is appropriate only where the complaint lacks a cognizable legal theory or sufficient facts to support a cognizable legal theory.”
Mendiondo v. Centinela Hosp. Center, 521
F.3d 1097, 1104 (9th Cir.2008). For purposes of a motion to dismiss, “all allegations of material fact are taken as true and construed in the light most favorable to the nonmoving party.”
Cahill v. Liberty Mutual Ins. Co.,
III. DISCUSSION
Microsoft argues that Claims Three, Four, Five, Six, and Nine, all of which are based on Microsoft’s filtering activities, are subject to an affirmative defense pursuant to the Communications Decency Act of 1996 (“CDA”), 47 U.S.C. § 230. (Mot. to Dismiss, 1:25-2:4). Microsoft also contends that Claims One, Two, Seven, and Eight are insufficiently pled and fail to state a cognizable claim.
(Id.
at 2:4-15).
A. Communications Decency Act (Claims Three Through Six)
A principal purpose of the CDA is to encourage ISP’s to engage in effective self-regulation of certain content. The Ninth Circuit has recognized that § 230 of the statute is “designed at once ‘to promote the free exchange of information and ideas over the internet and to encourage voluntary monitoring for offensive and obscene material.’ ”
Barnes v. Yahoo!, Inc.,
No provider or user of an interactive computer service shall be held liable on account of—
(A) any action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, or otherwise objectionable, whether or not such material is constitutionally protected; or
(B) any action taken to enable or make available to information content providers or others the technical means to restrict access to material described in paragraph (1)
42 U.S.C. § 230(c)(2)(A) & (B). An “interactive computer service” means “any information service, system, or access software provider that provides or enables computer access by multiple users to a computer server----”42 U.S.C. § 230(f)(2). Significantly, “[n]o cause of action may be brought and no liability may be imposed under any State or local law that is inconsistent with this section.” 42 U.S.C. § 230(e)(3). Moreover, § 230(c)(2) “allows [an interactive service provider] to establish
standards
of decency without risking liability for doing so.”
Goddard v. Google,
1. Whether the Court may consider Microsoft’s affirmative defenses
Holomaxx argues that defenses pursuant to the CDA “should not even be considered on a Rule 12(b)(6) motion.” (PL’s Opp., 3:20). However, both this Court and others have held to the contrary. (Defs Reply to PL’s Opp., 2:5-13) (citing
Goddard v. Google, Inc.,
2. Whether Microsoft’s filtering decisions qualify for CDA immunity
To assert an affirmative defense under § 230(c)(2)(A), a moving party must qualify as an “interactive computer service,” that voluntarily blocked or filtered material it considers “to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable,” and did so in “good faith.” 47 U.S.C. § 230(c)(2)(A). Holomaxx does not dispute that Microsoft qualifies as an “interactive computer service,” (Compl. ¶ 20), and other district courts have concluded that ISP’s that provide email services properly are characterized as “interactive computer service” providers.
See eS60lnsight, LLC v. Comcast Corp.,
However, Holomaxx contends that § 230(c)(2)(a) “was
not
intended to immunize the blocking of routine business emails.” (PL’s Opp., 6:1-3), and that the business content of its e-mails is not the type of content that providers might find “objectionable.”
(Id.
at 6:1-7:17). It points to
Goddard v. Google, Inc.,
No court has articulated specific, objective criteria to be used in assessing whether a provider’s subjective determination of what is “objectionable” is protected by § 230(c)(2). In
e360Insight, LLC v. Comcast Corp.,
546 F.Suppüd 605, 608 (N.D.Ill.2008), the court ^concluded that virtually total deference to provider’s subjective determination is appropriate. Although the Ninth Circuit has yet to address the issue directly, it has expressed concern about giving providers unfettered discretion.
See Zango v. Kaspersky Lab, Inc.,
3. Conclusion
The first element of Microsoft’s affirmative defense under the CDA is not in dispute. While it is conceivable that Holomaxx could raise an issue of fact as to the second and third elements, it must provide significantly greater factual detail in order to do so. Accordingly, Holomaxx’s third, fourth, fifth, and sixth claims predicated on Microsoft’s filtering and blocking activities will be dismissed, with leave to amend.
B. Judicial Notice of Microsoft’s Service Agreement
Microsoft contends that it is immune from liability under both the Wiretap Act and the Stored Communications Act because its users specifically consent to the alleged wrongful access to their communications. (Mot. to Dismiss, 13:14-14:7; 16:25-17:3). Microsoft asks the Court to take judicial notice of its Hot-mail.com service agreement. Holomaxx opposes this request, disputing the authenticity of the document and arguing that it did not reference the service agreement its complaint, that user consent is not a core issue, and that even if it were the service agreement presents factual issues inappropriate for resolution on a motion to dismiss. (Pl.’s Opp. to RJN, 1:2-8). Holomaxx is correct that courts ordinarily “may not consider any material beyond the pleadings in ruling on a Rule 12(b)(6) motion.”
Lee v. City of Los Angeles,
Microsoft argues that the first exception applies here because the complaint “repeatedly references” the terms of the service agreement and specifically puts the terms at issue. (Def.’s Mot. to Dismiss, pp. 13-14 fn 3). In fact, Holomaxx alleges that Microsoft “[ajccessed computers on which Holomaxx’s confidential email communications were stored, and that Defendant ] also scanned the contents of those emails and obtained information therefrom, without the consent of either Holomaxx or the
intended recipients.”
(Compl. ¶ 41) (emphasis added). This single allegation is insufficient to trigger the “incorporation by reference doctrine.”
See e.g., In re Facebook PPC Adver. Litig.,
C. Violation of the Wiretap Act (Claim One)
Holomaxx alleges that Microsoft “intentionally intercepted electronic communications sent by Holomaxx, in violation of 18 U.S.C. § 2510,
et seq.,”
(Compl. ¶ 59), and “intentionally used and disclosed the contents of such electronic communications sent by Holomaxx, while knowing or having reason to know that the information was obtained through the interception of those communications in violation of 18 U.S.C. § 2511.”
(Id.
at ¶ 60). It claims that Microsoft intercepted e-mails to evaluate the “spam like characteristics” on the e-mails.
(Id.
at ¶¶ 59-60). However, while the Court must “take all factual allegations in the complaint as true,”
(Ashcroft v. Iqbal,
D. Violation of the Stored Communications Act (Claim Two)
Holomaxx also alleges that Microsoft violated the Stored Communications Act, which prohibits a party from “intentionally accessing] without authorization a facility through which an electronic com
E.Defamation (Claim Seven)
To state a claim for defamation, a plaintiff must establish “the intentional publication of a statement of fact that is false, unprivileged, and has a natural tendency to injure or which causes special damage.”
Añkat v. JP Morgan Chase & Co.,
F. False Light (Claim Eight)
As Judge Seeborg recently explained, a false light claim may be maintained only by individuals.
Kennedy Funding, Inc. v. Chapman,
G. Unfair Competition Law
California Business and Professions Code § 17200
et seq.,
prohibits acts of unfair competition, including “any unlawful, unfair, or fraudulent business act or practice and unfair, deceptive, untrue, or misleading advertising.” Cal. Bus. & Prof.Code § 17200. This statute “was intentionally framed in its broad, sweeping language.”
Cel-Tech Communications, Inc. v. Los Angeles Cellular Telephone Co.,
To state a claim under the “fraudulent” prong of the UCL, a plaintiff must allege that the challenged practice is likely to deceive members of the public.
Bardin v. Daimlerchrysler Corp.,
IV. ORDER
Good cause therefore appearing, the motion to dismiss is GRANTED, WITH LEAVE TO AMEND as to Claims One through Seven and Claim Nine, and WITHOUT LEAVE TO AMEND as to Claim Eight. Any amended complaint shall be filed within (30) days of the date of this order.
IT IS SO ORDERED.
Notes
. This disposition is not designated for publication in the official reports.
. The complaint originally named Microsoft and Return Path, Inc. as Defendants. Plaintiff voluntarily dismissed Defendant Return Path, Inc., on December 15, 2010. (Dkt. No. 18).
. According to Microsoft’s feedback loop data, the aggregate complaint rate consistently is approximately 0.5%. (Compl. ¶ 19).
.As described by Holomaxx, a “dynamic spam trap” involves monitoring e-mail addresses that an e-mail service provider believes were abandoned by individual users. Based on its monitoring activities an e-mail service provider will determine whether the emails being received by those accounts are spam. (Compl. ¶ 21).
. Significantly, the number of messages that result in delivery to invalid addresses or in user opt-outs is calculated with the existing filtering technology and techniques in place. Had Microsoft's filters been inactive, it is reasonable to assume that the number of invalid deliveries and user opt-outs would be far greater than 0.5%.
. This exception commonly is referred to as the "incorporation by reference doctrine.”
See
e.g.,
In re Silicon Graphics, Inc. Sec. Litig.,
