Casillas v. Berkshire Hathaway Homestate Insurance Co.

Annotate this Case
Justia Opinion Summary

Appellants alleged that Respondents, Berkshire Hathaway Homestate Insurance Company (Berkshire), Cypress Insurance Company (Cypress), Zenith Insurance Company (Zenith), and others conspired to “hack” a third-party computer system. At the direction of the insurance-company Respondents, allegedly copied thousands of electronic litigation files, which had been uploaded to the system by workers’ compensation and personal injury attorneys and their clients (including Appellants), and transmitted the copies to insurers and insurance defense law firms. Appellants first sued respondents in federal district court on various causes of action, including invasion of privacy.
 
The Second Appellate District, affirmed and agreed with the trial court that Appellants failed to state a claim. The court concluded that Appellants failed to allege any actionable injury because: (1) they did not allege damage or disruption to the computer system, as required by Intel; and (2) they did not allege injury to the copied files or their asserted property interests therein. The trial court properly sustained Respondents’ demurrers to Appellants’ trespass-to-chattels claim, because Appellants failed to allege any actionable injury to a property interest, whether in the HQSU system or in the files copied from it. In response to Appellants’ unfounded warnings that affirmance will leave future victims of hacking without any effective remedy. Having abandoned a privacy claim during their federal litigation, Appellants effectively attempted, both in the trial court and on appeal, to repackage an alleged invasion of privacy as a trespass to chattels. Because Appellants failed to plead facts satisfying the latter tort’s element of injury to a property interest, the trial court properly sustained respondents’ demurrers.

Download PDF
Filed 6/10/22 CERTIFIED FOR PUBLICATION IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA SECOND APPELLATE DISTRICT DIVISION FOUR HECTOR CASILLAS, et al., Plaintiffs and Appellants, B302442 (Los Angeles County Super. Ct. No. BC670058) v. BERKSHIRE HATHAWAY HOMESTATE INSURANCE COMPANY, et al., Defendants and Respondents. APPEAL from a judgment of the Superior Court of Los Angeles County, David S. Cunningham III, Judge. Affirmed. Green & Noblin, Robert S. Green, James Robert Noblin, and Emrah M. Sumer; Law Offices of Mark Ravis & Associates, Mark Ravis and David Martin, for Plaintiffs and Appellants. Gibson, Dunn & Crutcher, Deborah L. Stein, Jeremy S. Smith and Wesley Sze, for Defendants and Respondents Berkshire Hathaway Homestate Insurance Company and Cypress Insurance Company. Proskauer Rose, Lary Alan Rappaport and Jessica M. Griffith, for Defendant and Respondent Zenith Insurance Company. Manning & Kass, Ellrod, Ramirez, Trester and Dennis B. Kass, for Defendant and Respondent Oliver Glover. Freeman Mathis & Gary and Stephen M. Caine, for Defendant and Respondent William Reynolds. ________________________________________________ INTRODUCTION The elements of the tort of trespass to chattels include “injury to the plaintiff’s personal property or legal interest therein.” (Intel Corp. v. Hamidi (2003) 30 Cal.4th 1342, 1348, 1350-1351 (Intel).) In this opinion, we hold appellants Hector Casillas and Adela Gonzalez failed to plead facts satisfying this element in alleging that respondents -- three insurance companies and two investigators -- copied appellants’ electronic litigation files from a third-party computer system, in violation of appellants’ interests in privacy and confidentiality. We conclude appellants failed to 2 allege any actionable injury because: (1) they did not allege damage or disruption to the computer system, as required by Intel; and (2) in any event, they did not allege injury to the copied files or their asserted property interests therein. According to appellants, respondents Berkshire Hathaway Homestate Insurance Company (Berkshire), Cypress Insurance Company (Cypress), Zenith Insurance Company (Zenith), William Reynolds, and Oliver Glover conspired to “hack” a third-party computer system. At the direction of the insurance-company respondents, Reynolds and Glover allegedly copied thousands of electronic litigation files, which had been uploaded to the system by workers’ compensation and personal injury attorneys and their clients (including appellants), and transmitted the copies to insurers and insurance defense law firms for use in litigation. Appellants first sued respondents in federal district court on various causes of action, including invasion of privacy. After abandoning their invasion-of-privacy claim, they added a claim of trespass to chattels, which the district court dismissed without addressing the merits. Appellants then filed the instant trespass-to-chattels claim, to which respondents demurred. The trial court sustained respondents’ demurrers, concluding appellants failed to state a trespass-to-chattels claim because, inter alia, they did not allege any damage or disruption to the computer system from which the files were copied, as the court concluded was required under Intel, supra, 30 Cal.4th 1342. The court granted appellants leave to amend their 3 complaint, but appellants declined to do so, instead electing to appeal the judgment subsequently entered on the demurrers. On appeal, appellants contend the court erred in sustaining respondents’ demurrers to their claim of trespass to chattels. As indicated above and explained in more detail below, we agree with the trial court that appellants failed to state a claim. Accordingly, we affirm. BACKGROUND A. Respondents’ Copying of Electronic Files We take the following facts from the allegations of appellants’ complaint, which we must assume true on this appeal: HQSU Sign Up Services, Inc. owned the “‘HQSU system,’” comprising computer servers, a database housed on those servers, and a website through which the database was accessible. Attorneys for workers’ compensation and personal injury plaintiffs contracted with HQSU to provide administrative services for certain clients, including appellants. HQSU presented each new client with a blank in-take packet, in which the client entered “medical, financial and legal information.” HQSU uploaded the completed packet to HQSU’s database, in a file associated with the client’s counsel. Counsel used HQSU’s website to download the in-take packet, then created and uploaded “documents that would be typical in a litigation file, such as correspondence, memos to file, research memos, etc.” As the client’s case proceeded, the file was updated by counsel, 4 counsel’s staff, and the client, all of whom could use HQSU’s website to download or post comments on existing documents, and upload revised or additional documents. The website and file contained “password and privacy notifications,” because the file was “intended” to be available only to counsel, counsel’s staff, and the client, following verification of username and password. Respondents conspired to “hack” the files on the HQSU system. At the direction of respondents Berkshire, Cypress, and Zenith, respondents Reynolds and Glover “repeatedly launched what are known as directory traversal attacks. A directory traversal attack is a[n] HTTP exploit allowing hackers to access restricted directories and execute commands outside of the web server’s root directory.” By means of these directory traversal attacks, conducted almost daily for 15 months, Reynolds and Glover copied approximately 33,000 litigation files, including appellants’, from the HQSU system. They transmitted the copies to insurers and insurance defense law firms. Although the copying “was not done in connection with any particular litigation,” certain copied documents were later used in defense of workers’ compensation claims. B. Appellants’ Claim of Trespass to Chattels In 2015 and 2016, appellants separately filed complaints against respondents in federal district court, containing causes of action for, inter alia, invasion of privacy. Without specifically addressing the invasion-of- 5 privacy claim, the district court dismissed all of appellants’ claims for failure to adequately allege standing to sue in federal court, and granted leave to amend. (Casillas v. Berkshire Hathaway Homestate Cos. (C.D.Cal. Aug. 22, 2016, No. CV 15-4763 AG (JEMx)) 2016 U.S.Dist.LEXIS 184127, at *6-*8.) Abandoning their invasion-of-privacy claim, appellants amended their federal complaints to include other claims, including a trespass-to-chattels claim under California law. The district court dismissed the complaints without addressing the merits of the trespass-to-chattels claim. (See Casillas v. Berkshire Hathaway Homestate Cos. (C.D.Cal. June 27, 2017, No. CV 15-04763 AG (JEMx)) 2017 U.S.Dist.LEXIS 99549, at *8-*12 [dismissing appellants’ sole remaining federal law claim on the merits, and declining to exercise supplemental jurisdiction over state law claims], affd. (9th Cir. 2019) 770 Fed.Appx. 329.) Soon thereafter (in July 2017), appellants filed the instant complaint, which contained a cause of action for 1 trespass to chattels. Appellants alleged respondents “intentionally interfered with Plaintiffs’ information in their litigation files hosted by HQSU on its database and servers and the documents they, their counsel, and counsel’s staff 1 We need not address the other cause of action contained in appellants’ complaint, viz., a claim for violation of the Confidentiality of Medical Information Act, Civil Code section 56 et seq., to which the trial court also sustained a demurrer with leave to amend, as appellants raise no issue concerning it. 6 caused to be uploaded to the HQSU database and servers by obtaining that information from those files and those documents and then wrongfully using them for their own purposes.” They further alleged they suffered a number of harms: (1) “Their personal property interest in the information in the files, the files themselves, the documents used to generate those files, and the documents contained in those files were violated when accessed by others not entitled to access them and then made available for use against them in a court of law or administrative claims process”; (2) “Their right to privacy, including the right to privacy enshrined in Article 1 of the California Constitution, was and continues to be violated”; and (3) “Their attorneyclient and work product privileges for communications with their counsel in their workers’ compensation proceeding, the first of which is a right personal to them, was breached.” 2 2 Appellants alleged several other related harms based on respondents’ obtaining the information in the copied files, including: (1) violation of their statutory rights to privacy of medical information; (2) undermining of their “right to assistance of counsel in civil matters,” as well as their “faith in the integrity and fairness of the civil justice system”; and (3) unspecified costs incurred in taking steps to mitigate risks that the copied information might be used against them, including by “at least consider[ing]” settling their underlying litigation on unfavorable terms, and by taking unspecified protective measures against identity theft. We need not address these alleged harms, as appellants develop no argument concerning them. 7 Appellants sought compensatory damages and injunctive relief. C. Judgment on Respondents’ Demurrers In November 2017, respondents demurred to the 3 complaint. Relying on Intel, supra, 30 Cal.4th 1342, respondents argued appellants failed to state a trespass-tochattels claim because they did not allege any damage or disruption to the computer system from which the electronic files were copied. Respondent Glover additionally argued that the claim failed because (1) the copied information was not property; and (2) appellants failed to allege any injury to their asserted property interests in the information, instead complaining of injury to their privacy interests. In December 2017, appellants filed an opposition to the demurrers, and respondents filed replies (none of these briefs are in the record). The trial court stayed the case pending resolution of appellants’ appeal from the dismissal of their federal complaints; the stay was lifted in May 2019. In July 2019, the court issued a tentative ruling sustaining the demurrers with leave to amend, and held a hearing. Appellants conceded respondents had not damaged the HQSU system, corrupted the files they allegedly copied from the system, or impaired appellants’ access to the files. 3 Respondents Reynolds and Glover each filed separate demurrers, while respondents Berkshire, Cypress, and Zenith filed a joint demurrer. 8 Appellants argued they nevertheless suffered actionable harm, viz., the “loss of privacy and confidentiality” caused by respondent’s viewing and copying the files. They further argued Intel did not require them to allege damage or disruption to the HQSU system, because their claim concerned trespass to the files, not the system. Respondents’ counsel maintained that appellants’ failure to allege damage or disruption to the HQSU system was fatal under Intel. Adopting its tentative ruling, the court concluded appellants had failed to state a claim of trespass to chattels. The court agreed with respondents that the claim failed under Intel: “[P]ursuant to Intel, a plaintiff alleging trespass to chattels based on unauthorized access to a computer system must allege damage or disruption to that computer system. Here, Plaintiffs have not done so.” The court rejected appellants’ attempt to distinguish Intel: “Plaintiffs argue that Intel does not control here, because the facts of Intel did not include unauthorized access to a computer system or downloading of files. . . . [¶] However, as Demurring Defendants note, the Intel court reached its holding by examining those cases involving robotic data collection, which did involve copying electronic information. See, e.g., eBay, Inc. v. Bidder’s Edge, Inc. (N.D. Cal. 2000) 100 F.Supp.2d 1058 [(eBay)]; Register.com, Inc. v. Verio, Inc. (S.D.N.Y. 2000) 126 F.Supp.2d 238 [(Register)]; Ticketmaster Corp. v. Tickets.com, 9 Inc. (C.D. Cal., Aug. 10, 2000, Case No. 99CV7654) 2000 WL 1887522 [(Ticketmaster)]. . . . [¶] Subsequent cases have applied Intel to instances of alleged hacking, similar to Plaintiffs’ allegations here. See, e.g., Capitol Audio Access, Inc. v. Umemoio (E.D. Cal. 2013) 980 F.Supp. 2d 1154, 1160 [(Capitol Audio)] (dismissing a trespass to chattel claim where the plaintiff alleged the defendant had accessed a password protected, proprietary database without authorization); Vertkin v. Vertkin (N.D. Cal. Dec. 6, 2007) 2007 WL 4287512, at *3 [(Vertkin)] (dismissing a trespass to chattel claim where the plaintiff alleged that the defendant had installed keystroke recording software onto the plaintiff’s computer ‘in order to obtain personal information’ without authorization). [¶] None of Plaintiffs’ authorities support the proposition that an actionable trespass to chattel claim exists when an alleged tortfeasor neither damages nor impairs a plaintiff’s computer system.” The court sustained the demurrers with leave to 4 amend. 4 As an additional ground for sustaining the demurrers to the trespass-to-chattels claim, the court concluded appellants failed to adequately allege they had any cognizable property interest in either the HQSU system or the information in the (Fn. is continued on the next page.) 10 In August 2019, appellants filed notice that they declined to amend their complaint. They stipulated to entry of judgment on the demurrers, which they timely appealed. DISCUSSION Appellants contend the trial court erred in sustaining respondents’ demurrers to their cause of action for trespass to chattels. “‘In reviewing the sufficiency of a complaint against a general demurrer, we . . . “treat the demurrer as admitting all material facts properly pleaded, but not contentions, deductions or conclusions of fact or law. [Citation.] We also consider matters which may be judicially noticed.”’” (Lyles v. Sangadeo-Patel (2014) 225 Cal.App.4th 759, 764.) “When, as here, a demurrer to a complaint is sustained with leave to amend and the plaintiff declines to amend the complaint, . . . we assume the complaint contained the strongest statement of the plaintiff’s cause or causes of action. [Citation.] Thus, unlike when a demurrer is sustained without leave to amend, we determine only whether the plaintiff stated a cause of action, and not whether the plaintiff might be able to do so.” (Ibid.) “The judgment of dismissal must be affirmed if the unamended copied files. In defending the court’s ruling on appeal, respondents argue that “[m]ost fundamentally,” appellants failed to allege any injury to such a property interest. Because we agree, we need not address whether appellants adequately alleged they had such a property interest in the first instance. 11 complaint is objectionable on any ground raised by the demurrer.” (Eisenberg et al., Cal. Practice Guide: Civil Appeals & Writs (The Rutter Group 2021) Ch. 8-C ¶ 8:136.3e.) Below, we conclude the trespass-to-chattels claim was objectionable on a ground raised in the demurrers, viz., appellants’ failure to allege any actionable injury to a property interest. A. Trespass to Chattels under Intel “[T]he trespass to chattels tort . . . may not, in California, be proved without evidence of an injury to the plaintiff’s personal property or legal interest therein.” (Intel, supra, 30 Cal.4th at 1348.) “In modern American law generally, ‘[t]respass [to chattels] remains as an occasional remedy for minor interferences, resulting in some damage, but not sufficiently serious or sufficiently important to amount to the greater tort’ of conversion.” (Id. at 1351.) “[I]njury to the personal property or the possessor’s interest in it is an element of the action . . . .” (Id. at 1352.) In Intel, our Supreme Court held this element was not satisfied in the absence of damage or disruption to the computer system allegedly trespassed against. (Intel, supra, 30 Cal.4th at 1347, 1352-1353.) There, Intel brought a trespass-to-chattels claim against former employee Hamidi who, on six occasions, had made unauthorized use of Intel’s email system to send criticisms of its employment practices to numerous current employees. (Id. at 1346, 1348-1349.) Although Intel presented no evidence the messages caused 12 physical damage or functional disruption to its computer system, it presented uncontradicted evidence that staff time was spent attempting to block further messages, and that the messages’ contents caused discussion among employees and managers. (Id. at 1346, 1349.) The trial court granted Intel summary judgment, and enjoined Hamidi from sending unsolicited emails on the system. (Id. at 1350.) The Court of Appeal affirmed, concluding the absence of injury to Intel’s property was immaterial in light of Intel’s showing that Hamidi’s use of its property disrupted its business. (Ibid.) Our Supreme Court reversed. (Id. at 1366.) After reviewing prior decisions analyzing unauthorized electronic contact with computer systems as potential trespasses to chattels, the court concluded, “the tort does not encompass, and should not be extended to encompass, an electronic communication that neither damages the recipient computer system nor impairs its functioning.” (Id. at 1347; see also id. at 1352-1353 [detailing absence of damage or impairment].) In explaining that its holding was consistent with the aforementioned caselaw, the Supreme Court discussed three cases in which the electronic contact at issue consisted of “unauthorized robotic data collection” from websites: eBay, supra, 100 F.Supp.2d 1058; Register, supra, 126 F.Supp.2d 238; and Ticketmaster, supra, 2000 WL 1887522. (Intel, supra, 30 Cal.4th at 1354-1357.) Each case suggested that such data collection could constitute trespass to chattels only if it caused or threatened harm to the website’s computer system, either by finding insufficient evidence of such harm 13 to support a trespass-to-chattels claim (Ticketmaster), or by granting injunctive relief in reliance on evidence that thirdparty repetition of the data collection would harm the websites’ systems (eBay and Register). (See Intel, at 13541357.) Distinguishing the latter cases, our Supreme Court emphasized Intel had failed to show any appreciable effect on its computer system, or likelihood thereof. (Intel, at 13561357.) Regarding Hamidi’s messages’ alleged disruptive effect on Intel’s business, our Supreme Court concluded this effect was not the type of property harm actionable as trespass to chattels: “While unwelcome communications, electronic or otherwise, can cause a variety of injuries to economic relations, reputation and emotions, those interests are protected by other branches of tort law; in order to address them, we need not create a fiction of injury to the communication system. [¶] Nor may Intel appropriately assert a property interest in its employees’ time. . . . Whatever interest Intel may have in preventing its employees from receiving disruptive communications, it is not an interest in personal property, and trespass to chattels is therefore not an action that will lie to protect it.” (Id. at 1359.) By analogy to intrusive telephone calls, the court implied that trespass to chattels likewise would not lie to protect interests in privacy: “The consequential economic damage Intel claims to have suffered, i.e., loss of productivity caused by employees reading and reacting to Hamidi’s messages and company efforts to block the 14 messages, is not an injury to the company’s interest in its computers . . . any more than . . . the loss of privacy caused by an intrusive telephone call would be an injury to the recipient’s telephone equipment.” (Intel, supra, 30 Cal.4th at 1347; see also id. at 1361-1362 [“the contents of a telephone communication may cause a variety of injuries and may be the basis for a variety of tort actions (e.g., . . . invasion of privacy), but the injuries are not to an interest in property, . . . and the appropriate tort is not trespass”].) B. Analysis We agree with the trial court that appellants failed to state a claim of trespass to chattels. Appellants conceded respondents’ alleged copying of electronic files from the HQSU system did not cause any damage or disruption to the system. As the trial court observed, “[P]ursuant to Intel, a plaintiff alleging trespass to chattels based on unauthorized access to a computer system must allege damage or disruption to that computer system. Here, Plaintiffs have not done so.” (See Intel, supra, 30 Cal.4th at 1347, 13521353.) For the same reasons given by the court, we reject appellants’ attempt to distinguish Intel on the ground that there, defendant Hamidi did not copy electronic files. First, as noted, Intel explained that its holding was consistent with prior cases suggesting that robotic data collection from a website -- including the copying of electronic information -could constitute trespass to chattels only if it caused or 15 threatened harm to the website’s computer system. (Intel, supra, 30 Cal.4th at 1354-1357.) Second, subsequent cases have applied Intel’s injury requirement to claims based on the copying of electronic files or information. (See Capitol Audio, supra, 980 F.Supp.2d at 1156, 1160 [online publisher failed to state trespass-to-chattels claim against defendant who made and distributed unauthorized copies of publisher’s electronic documents on publisher’s website, where publisher failed to allege actionable interference with property under Intel, viz., interference causing damage or disruption (citing Intel, at 1357)]; Vertkin, supra, 2007 WL 4287512, at *1, *3 [plaintiff failed to state trespass-to-chattels claim against defendant who obtained personal information from plaintiff’s computers by means of secretly installed programs, where plaintiff “failed to allege that her computers were impaired as to their condition or quality or that she was unable to use these computers for a substantial period of time” (citing Intel, at 1357)]; Hiossen, Inc. v. Kim (C.D.Cal., Aug. 17, 2016, No. CV1601579SJOMRWX) 2016 WL 10987365, at *1-*3, *10-*11 (Hiossen) [corporation failed to state trespass-tochattels claim against former employee and competitor, where former employee copied confidential information from password-protected customer accounts on corporation’s website, and used information to competitor’s advantage, but plaintiff failed to allege damage or disruption to computer system (citing Intel, at 1356)].) Appellants fail to address any of these cases, though all are cited in respondents’ brief on appeal, and two -- Capitol Audio and Vertkin -- were cited 16 in the trial court’s ruling. We conclude the court properly applied Intel in sustaining respondents’ demurrers to appellants’ trespass-to-chattels claim. Even had Intel not required appellants to allege damage or disruption to the HQSU system, we would conclude the demurrers were properly sustained, because appellants failed to allege any actionable injury to the copied files or their asserted property interests therein. Appellants conceded the files had not been corrupted, and their own access to the files had not been impaired. Because the copying did not affect the files or appellants’ ability to use them, it caused no actionable injury to their asserted property interests. (See 123 Los Robles LLC v. Metzler (C.D.Cal. Aug. 14, 2017, No. 2:17-CV-00392-RGKSK) 2017 U.S.Dist.LEXIS 223232 (Los Robles), at *1, *12 [LLC failed to state trespass-to-chattels claim against member who copied and used confidential information from financial records on LLC’s bank’s computers, where information “remained unaltered and available to [LLC] on the bank’s computers”]; cf. Intel, supra, 30 Cal.4th at 1348 [disruption caused by contents of unauthorized emails was not actionable as trespass to chattels because it was “an injury entirely separate from, and not directly affecting, the possession or value of personal property”].) We reject appellants’ reliance on their interests in privacy and confidentiality. As noted, Intel implied that trespass to chattels would not lie to protect interests in privacy. (See Intel, supra, 30 Cal.4th at 1361-1362 [“the 17 contents of a telephone communication may cause a variety of injuries and may be the basis for a variety of tort actions (e.g., . . . invasion of privacy), but the injuries are not to an interest in property, . . . and the appropriate tort is not trespass”]; id. at 1347 [analogizing Intel’s loss of productivity, which was not actionable as trespass to chattels, to loss of privacy caused by intrusive telephone call].) Consistent with Intel’s implication, subsequent cases have rejected trespass-to-chattels claims without regard to asserted violations of the plaintiffs’ privacy interests. (See Los Robles, supra, 2017 U.S.Dist.LEXIS at *12 [“Plaintiff’s interest in the confidentiality of its financial information is not the type of possessory interest protected by the tort of trespass to chattels”]; In re iPhone Application Litigation (N.D. Cal. 2012) 844 F.Supp.2d 1040, 1048-1051, 1069 [plaintiffs failed to state trespass-to-chattels claim against companies that allegedly violated plaintiffs’ privacy rights by allowing third-party apps to collect and use confidential information from plaintiffs’ mobile devices]; Vertkin, supra, 2007 WL 4287512, at *3-*4 [plaintiff failed to state trespassto-chattels claim against defendant who obtained personal information from plaintiff’s computers by means of secretly installed programs, even though plaintiff adequately stated invasion-of-privacy claim on same allegations]; cf. Hiossen, supra, 2016 WL 10987365, at *11 [corporation’s “‘financial injury’” resulting from former employee’s copying confidential information and using it to competitor’s advantage was not actionable as trespass to chattels].) 18 Contrary to appellants’ contentions, the “merger doctrine” does not establish that their privacy interests were merged with their asserted property, much less allow them to convert privacy harms into property harms. The merger doctrine is merely an exception to the traditional rule that intangible property cannot be the subject of conversion; it recognizes conversion of intangible property, such as stock, where the plaintiff’s intangible property interests are merged with a document, such as a stock certificate. (See Gaab & Reese, Cal. Practice Guide: Civil Procedure Before Trial, Claims and Defenses (The Rutter Group 2021) Ch. 12(II)-B ¶¶ 12:109-12:110.) Because the traditional rule has been eroded or rejected, the merger doctrine, as an exception to the rule, now has little or no significance. (See id. ¶ 12:111; Thomas et al., Cal. Civil Practice: Torts (2021) § 15:4.) Here, at most, the doctrine could support appellants’ position that they had cognizable property interests in the electronic files (an issue we need not address). The doctrine could not establish that such asserted property interests were injured. Appellants have not cited -- and we have not found -any authority supporting their reliance on privacy interests as a basis for their claim of trespass to chattels. Instead, appellants attempt to support their claim by misrepresenting a number of federal cases. For instance, appellants suggest that in TransUnion LLC v. Ramirez (2021) 594 U.S. __ [141 S.Ct. 2190], in which the Supreme Court held that certain members of a plaintiff class had Article III standing to bring a claim in federal court (id. at 19 2208-2209), the court relied on the defendant’s dissemination of confidential information about the class members, harming their interests in privacy. In fact, the court’s holding was based on the defendant’s dissemination of defamatory information about the class members, causing harm to their reputation. (See id. at 2200, 2209 [class members suffered concrete “reputational harm” when labeled as potential terrorists, drug traffickers, or serious criminals in credit reports disseminated by defendant].) The court’s holding is immaterial here, because it concerned the injury-in-fact requirement of Article III standing, which differs from the injury element of a trespass-to-chattels claim under California law. (See In re iPhone Application Litigation, supra, 844 F.Supp.2d at 1053-1055, 1069 [concluding plaintiffs alleged sufficient injury in fact to establish Article III standing, but dismissing trespass-tochattels claim on the merits for failure to allege actionable injury].) Indeed, Intel implied that reputational harm -- the injury in fact in TransUnion -- would not be actionable as trespass to chattels. (See Intel, supra, 30 Cal.4th at 1359 [“While unwelcome communications, electronic or otherwise, can cause a variety of injuries to economic relations, reputation and emotions, those interests are protected by other branches of tort law” (italics added)].) As noted, Intel implied the same concerning harm to privacy interests. Appellants also misrepresent United States v. Ackerman (10th Cir. 2016) 831 F.3d 1292, a childpornography prosecution in which the Tenth Circuit held, 20 contrary to a district court’s ruling on the defendant’s motion to suppress evidence, that a government actor’s opening and examining the defendant’s email constituted a search within the meaning of the Fourth Amendment. (Id. at 1294-1295, 1308-1309.) Appellants assert the Tenth Circuit determined the unauthorized viewing of the email “injured the plaintiff [sic] by violating his Fourth Amendment rights,” in a manner that “would be the proper subject of a trespass to chattels claim.” In fact, the court discussed trespass to chattels only in explaining that the Fourth Amendment protects even dignitary interests in personal property -- as trespass-to-chattels doctrine did “at the time of the founding,” before adoption of the modern requirement for actual injury. (Id. at 1307-1308; see also Intel, supra, 30 Cal.4th at 1352 [“modern day trespass to chattels differs both from the original English writ and from the action for trespass to land: ‘ . . . the dignitary interest in the inviolability of chattels, unlike that as to land, is not sufficiently important to . . . [warrant liability] in the absence of any actual damage’” (quoting Prosser & Keeton, Torts (5th ed. 1984) § 14, p. 87) (italics omitted)].) Finally, appellants misrepresent Synopsys, Inc. v. Ubiquiti Networks, Inc. (N.D. Cal. 2018) 313 F.Supp.3d 1056. There, the plaintiff used anti-piracy software, secretly embedded into other software it knew the defendants would download, to collect data from the defendants’ computers. (Id. at 1063-1065.) One defendant filed a trespass-tochattels counterclaim, which the district court dismissed, 21 stating: “To the extent defendants base their trespass claims on the accessing of their systems by the anti-piracy software, they must but have not alleged facts showing that access impaired the intended functioning of defendants’ systems. And to the extent that defendants base their trespass claim on the anti-piracy software’s securing of and use of defendants’ data, that common law claim would be preempted by [California’s Uniform Trade Secrets Act].” (Id. at 1080.) Contrary to appellants’ representations, the court neither “explicitly” recognized appellants’ theory of liability, nor suggested in dictum that the trespass-to-chattels 5 counterclaim would have had merit absent preemption. In sum, we conclude the trial court properly sustained respondents’ demurrers to appellants’ trespass-to-chattels claim, because appellants failed to allege any actionable injury to a property interest, whether in the HQSU system or in the files copied from it. In response to appellants’ unfounded warnings that affirmance will leave future victims of hacking without any effective remedy, we emphasize that our holding concerns only appellants’ attempt to plead the tort of trespass to chattels, an “‘occasional’” remedy for minor interferences with property. 5 Appellants’ reliance in their reply and at oral argument on U.S. v. Bohonus (9th Cir. 1980) 628 F.2d 1167 is misplaced, as that case concerned an interpretation of the federal mail-fraud statute, not any common law tort, much less trespass to chattels under California law. (Id. at 1170-1172.) 22 (Intel, supra, 30 Cal.4th at 1351.) In light of appellants’ declining to amend their complaint, we express no opinion whether they might have adequately pled other causes of action -- e.g., for violations of the Comprehensive Computer Data Access and Fraud Act (CCDAFA) (Pen. Code, § 502), or 6 for the tort of invasion of privacy. (Cf. Hiossen, supra, 2016 WL 10987365, at *5-*6, *8-*11 [allegations that defendant copied and used confidential information on corporation’s website failed to state trespass-to-chattels claim, but adequately stated claims for violations of CCDAFA and other statutes]; Vertkin, supra, 2007 WL 4287512, at *3-*4 [allegations that defendant obtained personal information from plaintiff’s computers failed to state trespass-to-chattels claim, but adequately stated invasion-of-privacy claim].) Having abandoned a privacy claim during their federal litigation, appellants effectively attempted, both in the trial court and on appeal, to repackage an alleged invasion of privacy as a trespass to chattels. Because appellants failed to plead facts satisfying the latter tort’s element of injury to a property interest, the trial court properly sustained respondents’ demurrers. 6 Appearing to contradict their own warnings that similarly situated plaintiffs will lack any remedy other than trespass to chattels, appellants assert that their allegations satisfied the criteria for an invasion-of-privacy claim. 23 DISPOSITION The judgment is affirmed. Respondents are awarded their costs on appeal. CERTIFIED FOR PUBLICATION MANELLA, P. J. We concur: WILLHITE, J. CURREY, J. 24
Primary Holding

The Second Appellate District affirmed the trial court’s decision sustaining Respondents’ demurrers to Appellants’ claim of trespass to chattels. The court held that Appellants failed allege any actionable injury because: (1) they did not allege damage or disruption to the computer system; and (2) they did not allege injury to the copied files or their asserted property interests therein.


Disclaimer: Justia Annotations is a forum for attorneys to summarize, comment on, and analyze case law published on our site. Justia makes no guarantees or warranties that the annotations are accurate or reflect the current state of law, and no annotation is intended to be, nor should it be construed as, legal advice. Contacting Justia or any attorney through this site, via web form, email, or otherwise, does not create an attorney-client relationship.

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.