Yee v. Lin, No. 3:2012cv02474 - Document 34 (N.D. Cal. 2012)

Court Description: ORDER GRANTING IN PART AND DENYING IN PART DEFENDANT'S MOTION TO DISMISS PURSUANT TO RULES 12(B)(1) AND 12(B)(6) by Judge William Alsup [granting in part and denying in part 28 Motion to Dismiss]. (whasec, COURT STAFF) (Filed on 9/20/2012)

Download PDF
Yee v. Lin Doc. 34 1 2 3 4 5 6 IN THE UNITED STATES DISTRICT COURT 7 FOR THE NORTHERN DISTRICT OF CALIFORNIA 8 9 ROBERT B. YEE, No. C 12-02474 WHA 11 For the Northern District of California United States District Court 10 12 13 14 Plaintiff, v. Defendant. / 15 16 17 18 ORDER GRANTING IN PART AND DENYING IN PART DEFENDANT’S MOTION TO DISMISS PURSUANT TO RULES 12(B)(1) AND 12(B)(6) VERNA LIN, INTRODUCTION In this email-hacking dispute, defendant moves to dismiss pursuant to Rules 12(b)(1) and 12(b)(6). For the reasons stated below, the motion is GRANTED IN PART AND DENIED IN PART. 19 STATEMENT 20 Plaintiff Robert Yee and defendant Verna Lin are parties to a divorce action filed in 21 Alameda County Superior Court. That action settled but awaits a final judgment, and dissolution 22 of marriage was granted. Plaintiff alleges that during the divorce proceedings defendant 23 intentionally and without consent hacked into his email accounts. Specifically, she hacked 24 the email provider facilities of Yahoo and Google, and accessed personal, business and 25 attorney/client information contained therein. Plaintiff alleges that his email was hacked at least 26 thirteen times before he discovered defendant’s conduct and changed his password (First Amd. 27 Compl. ¶¶ 5, 6, 8, 10). 28 Dockets.Justia.com 1 Plaintiff states four claims for relief: (1) violation of 18 U.S.C. 2701 of the Stored 2 Communication Act; (2) violation of CA Penal Code Section 502(c)(2); (3) intrusion upon 3 seclusion tort; and (4) intentional interference with prospective economic relations. 4 Plaintiff alleges that the email hacking resulted in loss of profits from two business ventures 5 in China. Yee states that he was fired from a Tianjin development project after disclosing that 6 defendant had hacked into his email accounts. He further states that he experienced a hostile 7 business environment involving a Shanghai joint venture as a result of defendant disclosing 8 confidential information contained in his email accounts. Plaintiff alleges he lost profits from 9 these failed business ventures. In the instant motion, defendant moves to dismiss pursuant to Rules 12(b)(1) and 12(b)(6) (First Amd. Compl. ¶¶ 14–15). 11 For the Northern District of California United States District Court 10 12 ANALYSIS A motion to dismiss under Rule 12(b)(6) tests the legal sufficiency of the claims alleged 13 in the complaint. Parks Sch. Of Business v. Symington, 51 F.3d 1480, 1484 (9th Cir. 1995). 14 All material allegations of the complaint are taken as true and construed in the light most 15 favorable to the nonmoving party. Cahill v. Liberty Mut. Ins. Co., 80 F.3d 336, 340 (9th Cir. 16 1996). A complaint, on its face, needs to be plausible, meaning that “the plaintiff [must] plead[] 17 factual content that allows the court to draw the reasonable inference that the defendant is liable 18 for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009). This “requires more 19 than labels and conclusions, and a formulaic recitation of the elements of a cause of action will 20 not do. Factual allegations must be enough to raise a right to relief above the speculative level.” 21 Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 555 (2007) (internal citations omitted). 22 23 1. SUBJECT-MATTER JURISDICTION. A. Article III Standing. 24 Lack of Article III standing requires dismissal for lack of subject-matter jurisdiction 25 under Rule 12(b)(1). Simmonds v. Credit Suisse Sec., 638 F.3d 1072, 1082 (9th Cir. 2011). 26 Article III standing requires the demonstration of three elements: (1) plaintiff suffered an 27 “injury in fact” that is concrete and particularized and actual or imminent, not conjectural or 28 hypothetical; (2) the injury is fairly traceable to the challenged action of defendant; and (3) it is 2 1 likely, as opposed to merely speculative, that the injury will be redressed by a favorable decision. 2 Lujan v. Defenders of Wildlife, 504 U.S. 555, 560–61 (1992). For purposes of ruling on a motion 3 to dismiss for lack of standing, all material allegations of the complaint are accepted as true and 4 the complaint is construed in favor of the complaining party. Standing “in no way depends 5 on the merits of the plaintiff’s contention that particular conduct is illegal.” Warth v. Seldin, 6 422 U.S. 490, 500–01 (1975). 7 Defendant argues that plaintiff lacks Article III standing for lack of injury in fact. Not so. unauthorized access to his email resulted in injury to his business opportunities and profits. 10 A determination of standing does not require an analysis of the merits. Warth, 422 U.S. at 11 For the Northern District of California First, plaintiff has alleged an injury in fact for all claims because he contends that plaintiff’s 9 United States District Court 8 500–01. 12 Defendant contends that plaintiff’s allegation that he “was going to be compensated 13 by his clients upon the funding of the [first] development project which has not occurred” 14 (First Amd. Compl. ¶ 14), is a judicial admission that no funding occurred and thus there was 15 no lost profits and no injury. Plaintiff’s allegation is too ambiguous to construe such a finding. 16 It is more likely that plaintiff was referring to the fact that he had not been compensated. 17 Second, plaintiff also identified an additional basis for satisfying the injury in fact 18 requirement. In this action, plaintiff alleges that his statutory rights under the Stored 19 Communications Act and the California Penal Code Section 502 have been violated. These two 20 statutes provide protections against hacking an electronic communications facility or a computer 21 network. Injury in fact may exist by virtue of “statutes creating legal rights, the invasion of 22 which creates standing.” Edwards v. First Am. Corp., 610 F.3d 514, 517 (9th Cir. 2010). 23 Additionally, defendant contends that plaintiff fails to allege an injury fairly traceable 24 to plaintiff’s actions. This is not so. Plaintiff alleges that defendant’s actions of repeatedly 25 hacking into his emails, which contained confidential and sensitive information, caused two 26 business ventures to fail and resulted in monetary expenses related to analyzing the scope of the 27 infiltration. These injuries are fairly traceable to the alleged hacking of sensitive information. 28 3 1 Possibly, little of this is really true but at the pleading stage, we must accept the well-pled 2 allegations as true. Plaintiff has standing to bring these claims. 3 4 B. Other Limits on Subject-Matter Jurisdiction. Defendant contends that this action should be adjudicated in state court because 5 (1) plaintiff seeks to modify the state court judgment regarding the divorce settlement and 6 (2) the abstention doctrine bars subject-matter jurisdiction to this action. 7 These arguments are now moot. At oral argument, plaintiff stated on the record that 8 he no longer seeks compensatory damages related to the divorce settlement. Plaintiff has now 9 limited his claims to compensatory damages of loss of business opportunities, statutory fees, punitive damages and attorney’s fees. As a result, the divorce settlement is no longer at issue in 11 For the Northern District of California United States District Court 10 this action. The alleged email-hacking torts are no longer entangled with the state court divorce 12 proceedings such that this action will interfere. 13 At oral argument, defendant responded that the general release places the divorce at issue 14 in this action. Not so. It is premature to anticipate whether a general release of all claims will 15 result from the divorce settlement. If defendant receive a general release, she may raise it as an 16 affirmative defense in her answer. Accordingly, defendant’s Rule 12(b)(1) motion is DENIED. 17 18 19 2. FAILURE TO STATE A CLAIM. A. Claim One: Stored Communications Act. The Stored Communications Act provides a private right of action against anyone 20 who (1) intentionally accesses without authorization a facility through which an electronic 21 communication service is provided; or (2) intentionally exceeds an authorization to access 22 that facility; and (3) thereby obtains, alters, or prevents authorized access to a wire or electronic 23 communication while it is in electronic storage in such system. Plaintiff alleges that: 24 25 26 27 L[i][n] intentionally, knowingly and with the conscious objective of doing harm to Y[e][e] accessed the website of an electric communications service, specifically the email provider facilities of Yahoo and Google, and by using the password she had obtained without Y[e][e]’s permission or authority, accessed Y[e][e]’s private email accounts which were in electronic storage on the servers of the electronic communication services . . . , [and] accessed, obtained, copied, saved and/or used the emails. 28 4 1 (First Amd. Compl. ¶¶ 8, 25). Additionally, plaintiff provides specific times, dates and emails 2 that were allegedly hacked. For example, plaintiff alleges that on March 25, 2012, he wrote 3 an email at 2:21 PM to his attorney discussing litigation issues related to the divorce. He further 4 alleges that Lin intentionally logged on to his email at 9:01 PM and read confidential 5 attorney/client emails. She then copied and saved these emails and divulged the content to 6 third-persons such as Lin’s attorney and Yee’s business associate (First Amd. Compl. ¶¶ 16–18). 7 The divorce proceedings provide enough factual context to support plaintiff’s allegations that 8 defendant’s action were without permission and intentional. It is also plausible that if defendant 9 divulged the contents of the emails then she obtained the emails by either saving or copying them. Furthermore, defendant contends no actual harm was alleged. Not so. Plaintiff 11 For the Northern District of California United States District Court 10 sufficiently alleges actual damages of lost profits and impaired business relationships as a result 12 of the email hacking. Plaintiff’s claim under the Act is sufficiently pled. 13 14 B. Claim Two: California Penal Code Section 502(c)(2) California Penal Code 502(c)(2) holds liable anyone who “[k]nowingly accesses and 15 without permission takes, copies, or makes use of any data from a computer, computer system 16 or computer network. . . .” Section 502(e)(1) provides: 17 18 19 20 21 [i]n addition to any other civil remedy available, the owner or lessee of the computer, computer system, computer network, computer program, or data who suffers damage or loss by reason of a violation of any of the provisions of subdivision (c) may bring a civil action against the violator for compensatory damages and injunctive relief. Compensatory damages shall include any expenditure reasonably and necessarily incurred by the owner or lessee to verify that a computer system, computer network, computer program, or data was or was not altered, damaged, or deleted by the access . . . . 22 Defendant contends that plaintiff does not have standing to bring a claim under Section 502(c)(2) 23 because he is not “the owner of the . . . data” and has not suffered a loss by reason of a violation. 24 Plaintiff, however, alleges that he owns the data contained in his email accounts. Furthermore, 25 plaintiff alleges that the email hacking caused him to incur “monetary expenses associated with 26 responding to Lin’s unauthorized access including, but not limited to expenses related to 27 identifying, inspecting, analyzing and rectifying Lin’s improper actions.” For example, plaintiff 28 alleges that at a business meeting on March 30, 2012 in China, he disclosed to his client that 5 1 “sensitive business information about their project could have been compromised.” 2 Accordingly, standing to sue under Section 502(e) is met. The rest of defendant’s arguments 3 repeat those made under the Stored Communications Act. For the same reasons discussed 4 above, plaintiff has pled sufficient facts to state a claim under Section 502. 5 C. Claim Three: Intrusion Upon Seclusion Tort. 6 “One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion 7 of another or his private affairs or concerns, is subject to liability to the other for invasion of his 8 privacy, if the intrusion would be highly offensive to a reasonable person.” Whether conduct 9 is offensive depends on “the degree of the intrusion, the context, conduct and circumstances surrounding the intrusion as well as the intruder’s motives and objectives, the setting into which 11 For the Northern District of California United States District Court 10 [s]he intrudes, and the expectations of those whose privacy is invaded.” Deteresa v. Am. Broad. 12 Cos., Inc., 121 F.3d 460, 465 (9th Cir. 1997). Plaintiff alleges that defendant intentionally 13 intruded on his right to privacy and solitude by: 14 15 16 17 18 intentionally accessing and/or wrongfully disclosing the contents of his personal, business and privileged email communications between [p]laintiff and third parties . . . [which] was offensive and objectionable to [p]laintiff Y[e][e] and would be offensive and objectionable to a reasonable person of ordinary sensibilities in that it exposed [p]laintiff Y[e][e]’s private, privileged and confidential affairs to [d]efendant L[i][n] and other unauthorized persons, gained unfair advantage for [d]efendant L[i][n] in the [d]ivorce [c]ase and/or otherwise for the purpose of her own and others financial gain. 19 (First Amend. Compl. ¶¶ 47, 49). As discussed above, plaintiff has pled sufficient facts to 20 establish that defendant intentionally accessed his email without consent which resulted in 21 damages. Plaintiff also pled that his emails contained personal, confidential and private 22 communications. This is sufficient to plead the invasion of privacy requirement. Moreover, the 23 context of the intrusion, allegedly occurring during a contested divorce and the thirteen alleged 24 unauthorized entries into his email is sufficient to plead the highly offensive to a reasonable 25 person requirement. Accordingly, plaintiff has pled sufficient facts to state a claim for the tort 26 of intrusion upon seclusion. 27 28 6 1 D. Claim Four: Interference with Prospective Economic Relations. 2 Intentional interference with prospective economic relations requires the following 3 elements: 4 7 (1) the existence of a specific economic relationship between [plaintiff] and third parties that may economically benefit [plaintiff]; (2) knowledge by [defendant] of this relationship; (3) intentional acts by [defendant] designed to disrupt the relationship; (4) actual disruption of the relationship; and (5) damages to the [plaintiff]. 8 Rickards v. Canine Eye Registration Foundation, Inc., 704 F.2d 1449, 1456 (9th Cir. 1983). 9 In addition, defendant’s conduct must be “wrongful by some measure beyond the fact of the 5 6 interference itself.” Della Penna v. Toyota Motor Sales, U.S.A., Inc., 11 Cal.4th 376, 392 11 For the Northern District of California United States District Court 10 (1995). 12 Plaintiff alleges that defendant intentionally interfered with two business ventures that 13 failed. Plaintiff’s allegation that defendant “knew or was substantially certain that interference 14 with Y[e][e]’s economic and business interests would result from her actions [of hacking his 15 email]” lacks factual support. 16 With regard to the first business deal, plaintiff alleges that he was fired from a Tianjin 17 development project for disclosing to his business associate that his emails were hacked by 18 defendant. This is insufficient to show that defendant’s actions were designed (or reasonably 19 likely) to disrupt plaintiff’s business interest. It was plaintiff who disclosed the infiltration, not 20 defendant. Nothing pled plausibly shows such disclosure was likely to happen. 21 22 23 24 25 As for the second business deal, plaintiff alleges that: the business relationship between Y[e][e] and his [business] associate[] [Lin Hua Cheng] in China was in fact disrupted by L[i][n]’s intentional interference by creating a hostile and uncooperative business environment . . . [resulting in] denied specific payments, refused attendance at important business meetings and experienced disruption of the distribution of funds to which he was entitled. 26 (First Amd. Compl. ¶¶ 15, 56). Again, this is not specific enough to support the allegation that 27 defendant’s actions were designed to disrupt plaintiff’s business interests, even if actual 28 disruption occurred. Plaintiff also does not provide specific facts to support the allegation that 7 1 defendant knew of the business relationship. Notably, plaintiff does not specify the content of 2 the emails disclosed to the business associates. Without these important facts, the allegations are 3 merely conclusory. Plaintiff’s claim for intentional interference with prospective economic 4 relations is DISMISSED. 5 CONCLUSION 6 For the reasons mentioned above, the motion to dismiss is GRANTED IN PART AND the date of this order to file a motion, notice on the normal 35-day track, for leave to file an 9 amended complaint in order to further develop their claims. A proposed amended complaint 10 must be appended to the motion and plaintiff must plead their best case. The motion should 11 For the Northern District of California DENIED IN PART. Plaintiff may seek leave to amend and will have 21 CALENDAR DAYS from 8 United States District Court 7 clearly explain how the amendments to the complaint cure the deficiencies identified herein. 12 Failing a timely motion, the answer will be due 21 CALENDAR DAYS after the deadline. 13 14 IT IS SO ORDERED. 15 16 Dated: September 20, 2012. WILLIAM ALSUP UNITED STATES DISTRICT JUDGE 17 18 19 20 21 22 23 24 25 26 27 28 8

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.