
    Alan CLARIDGE, Plaintiff, v. ROCKYOU, INC., Defendant.
    No. C 09-6032 PJH.
    United States District Court, N.D. California.
    April 11, 2011.
    
      David Christopher Parisi, Suzanne L. Havens Beckman, Parisi & Havens LLP, Sherman Oaks, CA, Benjamin Harris Richman, Christopher Lilliard Dore, Jay Edelson, Michael James Aschenbrener, Edelson McGuire, LLC, Chicago, IL, for Plaintiff.
    Daniel Justin Weinberg, Orrick Herrington & Sutcliffe LLP, Menlo Park, CA, Karen G. Johnson-McKewan, Orrick Herrington & Sutcliffe LLP, San Francisco, CA, for Defendant.
   ORDER GRANTING IN PART AND DENYING IN PART MOTION TO DISMISS

PHYLLIS J. HAMILTON, District Judge.

Defendant’s motion to dismiss the complaint came on for hearing on February 2, 2011 before this court. Plaintiff Alan Claridge (“plaintiff’ or “Claridge”), appeared through his counsel, Christopher Dore and Michael Aschenbrener. Defendant RockYou, Inc. (“defendant” or “Rock-You”) appeared through its counsel, Daniel Weinberg, and Karen Johnson-McKewan. Having read all the papers submitted and carefully considered the relevant legal authority, the court hereby GRANTS defendant’s motion to dismiss in part and DENIES the motion to dismiss in part, for the reasons stated at the hearing, and as follows.

BACKGROUND

Plaintiff brings the instant action against defendant for allegedly failing to secure and safeguard its users’ sensitive personally identifiable information (“PII”), including email addresses, passwords, and login credentials for social networks like MySpace and Facebook. See First Amended Complaint (“FAC”), ¶ 1.

Defendant RoekYou is a publisher and developer of online services and applications for use with social networking sites such as Facebook, MySpace, hi5 and Bebo. Applications developed by RoekYou include those that enable users to share photos, write special text on a friend’s page, or play games with other users. FAC, ¶ 10. Customers sign up to use RockYou’s applications through rock-you.com, and they are asked to provide a valid e-mail address and registration password, which RoekYou then stores in its database. FAC, ¶ 11. Additionally, a customer may be required to provide Rock-You with a username and password for accessing a particular social network. Id. When users operate a RoekYou application on a social networking site, RoekYou utilizes the application as a platform to display paid advertisements. See FAC, ¶ 10. Defendant claims to be the leading provider of social networking application-based advertising services, with more than 130 million unique customers using its applications on a monthly basis. Id.

Plaintiff Claridge was a registered account holder with RoekYou during the relevant time period, having registered with RoekYou on August 13, 2008. FAC, ¶ 52. He signed up to utilize a photo sharing application offered by defendant, and submitted his e-mail address and password to defendant in order to do so. Id. at ¶ 53.

Plaintiff alleges that RoekYou promised through its website that it would safeguard its users sensitive PII, through a written policy that stated: “RoekYou! uses commercially reasonable physical, managerial, and technical safeguards to preserve the integrity and security of your personal information ...” FAC, ¶ 12. Despite this promise, plaintiff alleges that RoekYou— which collects and stores millions of users’ PII in a large-scale commercial database— stored all PII in “clear” or “plain” text, which means that RoekYou utilized no form of encryption in order to prevent intruders from easily reading and removing users’ PII. FAC, ¶ 15. The PII was therefore readily accessible to anyone with access to the database. Id., ¶ 16.

Among the options available to protect its customers, plaintiff alleges that Rock-You could have followed a commonly used method of protecting sensitive data that requires conversion and storage of a “hashed” form of a plain text password. Defendant failed, however, to use hashing, or any other common and reasonable method of data protection. FAC, ¶¶ 18-19. Plaintiff alleges that, by failing to secure its users’ PII, RoekYou made email account and social networking account access available to even the least capable hacker. Id., ¶ 21.

On December 4, 2009, an online security firm called Imperva, Inc. (“Imperva”) notified RoekYou of a security problem with its SQL database (SQL is a database computer language designed for storing data in database management systems). Imperva specifically informed RoekYou that it had become aware of a ‘SQL injection flaw’ in RockYou’s system — which would allow a hacker to take advantage of web software to introduce malicious code into a company’s network. FAC, ¶25. According to Imperva, hackers were regularly discussing RockYou’s SQL injection vulnerability in underground hacker forums, and the fact that this vulnerability was being actively exploited. Id. Imperva allegedly believed that prior to warning RockYou, it was likely that breaches had already occurred through RockYou’s SQL injection flaw, and that RockYou users’ webmail accounts had been accessed as a result of such breaches. Id., ¶ 28.

Plaintiff alleges that knowledge and understanding of SQL injection flaws has been widespread for more than a decade, and that such flaws are easy to prevent and well known to any web developer handling a large-scale commercial website. See FAC, ¶27. However, because Rock-You did not have proper security in place and failed to use commercially reasonable methods to prevent a well-known method of attack, its security flaw was being actively exploited and the contents of its database were known and being made public through underground hacker forums on or before November 29, 2009. Id., ¶ 31.

After Imperva warned RockYou of its SQL injection flaw, RockYou issued a press release stating that RockYou had immediately brought down its site in response to the warning, and kept it down until a security patch was in place. FAC, ¶ 34. Plaintiff alleges, however, that RockYou did not in fact respond immediately to Imperva’s warning, and waited at least one day to take action to repair the SQL vulnerability. Id., ¶ 35.

In the time prior to fixing the SQL vulnerability flaw — and prior to Imperva’s warning — plaintiff alleges that at least one confirmed hacker known as “igigi” accessed RockYou’s database and accessed and copied the email and social networking login credentials of approximately 32 million registered RockYou users. FAC, ¶ 36.

In a statement issued after RockYou publicly announced the security breach, defendant acknowledged that one or more individuals had illegally breached its databases, and further acknowledged that at the time of the breach, the hacked database had not been up to date with regard to “industry standard security protocols.” FAC, ¶ 41.

On December 15, 2009, plaintiff Claridge received an e-mail from RockYou informing him that his sensitive PII stored with RockYou may have been compromised through a security breach. See FAC, ¶ 54.

Based on the foregoing allegations, plaintiff filed the instant suit against Rock-You, on behalf of himself and a class of similarly situated individuals, defined as: “All individuals and entities in the United States who had RockYou accounts in 2009.” FAC, ¶ 55.

Plaintiff asserts the following nine causes of action against RockYou:

1. violation of the Stored Communications Act, 18 U.S.C. § 2702;
2. violation of California’s Unfair Competition Law, Cal. Bus. & Prof.Code § 17200;
3. violation of California’s Computer Crime Law, CaLPenal Code § 502;
4. violation of the California Consumer Legal Remedies Act, Cal. Civ.Code § 1750;
5. breach of contract;
6. breach of the implied covenant of good faith and fair dealing;
7. breach of implied contracts;
8. negligence; and
9. negligence per se
See generally FAC.

Defendant now moves to dismiss all nine causes of action, for failure to state a claim.

DISCUSSION

A. Legal Standard

A motion to dismiss under Rule 12(b)(6) tests for the legal sufficiency of the claims alleged in the complaint. Ileto v. Glock, Inc., 349 F.3d 1191, 1199-1200 (9th Cir.2003). Review is limited to the contents of the complaint. Allarcom Pay Television, Ltd. v. Gen. Instrument Corp., 69 F.3d 381, 385 (9th Cir.1995). To survive a motion to dismiss for failure to state a claim, a complaint generally must satisfy only the minimal notice pleading requirements of Federal Rule of Civil Procedure 8.

Rule 8(a)(2) requires only that the complaint include a “short and plain statement of the claim showing that the pleader is entitled to relief.” Fed.R.Civ.P. 8(a)(2). Specific facts are unnecessary — the statement need only give the defendant “fair notice of the claim and the grounds upon which it rests.” Erickson v. Pardus, 551 U.S. 89, 93, 127 S.Ct. 2197, 167 L.Ed.2d 1081 (2007) (citing Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 555, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007)). All allegations of material fact are taken as true. Id. at 94, 127 S.Ct. 2197. However, a plaintiffs obligation to provide the grounds of his entitlement to relief “requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do.” Twombly, 550 U.S. at 555, 127 S.Ct. 1955 (citations and quotations omitted). Rather, the allegations in the complaint “must be enough to raise a right to relief above the speculative level.” Id.

A motion to dismiss should be granted if the complaint does not proffer enough facts to state a claim for relief that is plausible on its face. See id. at 558-59, 127 S.Ct. 1955. “[W]here the well-pleaded facts do not permit the court to infer more than the mere possibility of misconduct, the complaint has alleged-but it has not show[n] that the pleader is entitled to relief.” Ashcroft v. Iqbal, 556 U.S. 662, 129 S.Ct. 1937, 1950, 173 L.Ed.2d 868 (2009).

In addition, when resolving a motion to dismiss for failure to state a claim, the court may not generally consider materials outside the pleadings. Lee v. City of Los Angeles, 250 F.3d 668, 688 (9th Cir.2001). There are several exceptions to this rule. The court may consider a matter that is properly the subject of judicial notice, such as matters of public record. Id. at 689; see also Mack v. South Bay Beer Distributors, Inc., 798 F.2d 1279, 1282 (9th Cir.1986) (on a motion to dismiss, a court may properly look beyond the complaint to matters of public record and doing so does riot convert a Rule 12(b)(6) motion to one for summary judgment). Additionally, the court may consider exhibits attached to the complaint, see Hal Roach Studios, Inc. v. Richard Feiner & Co., Inc., 896 F.2d 1542, 1555 n. 19 (9th Cir.1989), and documents referenced by the complaint and accepted by all parties as authentic. See Van Buskirk v. Cable News Network, Inc., 284 F.3d 977, 980 (9th Cir.2002).

B. Analysis

Defendant’s motion requires a straightforward analysis of each of the nine claims stated in plaintiffs complaint. As a preliminary matter, however, the court first turns its attention to the parties’ standing arguments. Defendant, who challenges plaintiffs ability to adequately allege standing, appears to subsume within its arguments two different sub-arguments: plaintiffs ability to allege injury in fact standing (i.e., Article III standing); and plaintiffs ability to adequately allege the elements of injury in connection with the individual claims asserted against defendant.

To the extent the former is at issue, the parties dispute whether plaintiff has sufficiently alleged any actionable harm or concrete, tangible, non-speculative harm or loss. See, e.g., Lujan v. Defenders of Wildlife, 504 U.S. 555, 560-61, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992) (“Injury in fact” requires damage to “a legally protected interest which is (a) concrete and particularized, and (b) actual or imminent, not conjectural or hypothetical”). Plaintiff generally alleges that defendant’s customers, including plaintiff, “pay” for the products and services they “buy” from defendant by providing their PII, and that the PII constitutes valuable property that is exchanged not only for defendant’s products and services, but also in exchange for defendant’s promise to employ commercially reasonable methods to safeguard the PII that is exchanged. See FAC, ¶¶ 45-47, 49, 50. As a result, defendant’s role in allegedly contributing to the breach of plaintiffs PII caused plaintiff to lose the ‘value’ of their PII, in the form of their breached personal data. See, e.g., id., ¶ 91.

In the face of defendant’s contention that these allegations are both insufficient and unprecedented in establishing either a concrete or non-speculative injury, plaintiff admits to advancing a novel theory of damages for which supporting case law is scarce. And indeed, the case law cited by the parties demonstrates no clearly established law regarding the sufficiency of allegations of injury in the context of the disclosure of online personal information. See, e.g., Ruiz v. Gap, Inc., 540 F.Supp.2d 1121 (N.D.Cal.2008) (considering electronic theft of job applicants’ personal information and social security numbers, and finding plaintiffs allegation of harm sufficient to allege “injury in fact” standing at pleading stage, even if not more particularized injury under specific causes of action); Doe 1 v. AOL LLC, 719 F.Supp.2d 1102 (N.D.Cal.2010) (finding sufficient allegations of injury, even under particularized injury requirements of specific causes of action).

On balance, the court declines to hold at this juncture that, as a matter of law, plaintiff has failed to allege an injury in fact sufficient to support Article III standing. Not only is there a paucity of controlling authority regarding the legal sufficiency of plaintiffs damages theory, but the court also takes note that the context in which plaintiffs theory arises — i.e., the unauthorized disclosure of personal information via the Internet — is itself relatively new, and therefore more likely to raise issues of law not yet settled in the courts. For that reason, and although the court has doubts about plaintiffs ultimate ability to prove his damages theory in this case, the court finds plaintiffs allegations of harm sufficient at this stage to allege a generalized injury in fact. If it becomes apparent, through discovery, that no basis exists upon which plaintiff could legally demonstrate tangible harm via the unauthorized disclosure of personal information, the court will dismiss plaintiffs claims for lack of standing at the dispositive motion stage.

Notwithstanding the court’s conclusion that Article III standing has generally been adequately pled at this juncture, the court further concludes that plaintiff has nonetheless failed to allege the more particularized elements of injury with respect to several of plaintiffs numerous individual causes of action.

The court now turns to the sufficiency of plaintiffs allegations with respect to each individual claim asserted.

1. Stored Communications Act (“SCA”) (Claim 1)

In response to defendant’s motion to dismiss this claim, plaintiff concedes from the outset that his complaint has inadvertently alleged the wrong provision of the Stored Communications Act. Specifically, the complaint alleges a cause of action pursuant to section 2702(a)(3) of the Act, which prohibits the disclosure of qualifying information to government entities. FAC, ¶¶ 66-74. Since this provision does not reach the merits of the instant lawsuit, plaintiff contends that he instead meant to allege a claim under section 2702(a)(1) of the Act, which provides that: “a person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service ... See 18 U.S.C. § 2702(a)(1).

In view of plaintiffs concession, defendant’s motion to dismiss plaintiffs claim pursuant to section 2703(a)(3) of the SCA is GRANTED. Plaintiff is granted leave to amend the complaint, however, in order to state a proper claim pursuant to section 2702(a)(1). Although defendant has argued that even a claim brought pursuant to section 2702(a)(1) should be dismissed on grounds that the alleged login credentials stolen by hackers do not constitute “contents of a communication” that would be covered by the statute, and on grounds that plaintiff fails to allege that RockYou “knowingly divulge[d]” any communications to any person, the merits of these arguments are not properly before the court absent amendment.

2. Unfair Competition Law (“UCL") (Claim 2)

“California’s unfair competition statute prohibits any unfair competition, which means ‘any unlawful, unfair or fraudulent business act or practice.’ ” In re Pomona Valley Med. (Group, 476 F.3d 665, 674 (9th Cir.2007) (citing Cal. Bus. & Prof.Code § 17200, et seq.). Generally speaking, unlawful practices are any activities that are forbidden by law. Samura v. Kaiser Found. Health Plan, Inc., 17 Cal.App.4th 1284, 1292, 22 Cal.Rptr.2d 20 (1993). Unfair acts are those that “offend[ ] an established public policy” or are “immoral, unethical, oppressive, unscrupulous, or substantially injurious to consumers.” Podolsky v. First Healthcare Corp., 50 Cal.App.4th 632, 647, 58 Cal.Rptr.2d 89 (1996). As for allegedly fraudulent practices, fraud is not an essential element of a claim under § 17200, although allegations of fraudulent conduct must nevertheless satisfy the heightened pleading requirements of Rule 9(b). See Vess v. Ciba-Geigy Corp. USA, 317 F.3d 1097, 1103-05 (9th Cir.2003) (the heightened pleading standards of Rule 9(b) apply to allegations of fraud and allegations that sound in fraud, including false misrepresentations). Furthermore, “to pursue either an individual or a representative claim under the California unfair competition law,” a plaintiff “must have suffered an ‘injury in fact’ and ‘lost money or property as a result of such unfair competition.’ ” Hall v. Time Inc., 158 Cal.App.4th 847, 849, 70 Cal.Rptr.3d 466 (2008).

Defendant here asserts plaintiff has failed to allege any loss of money or property as a result of defendant’s allegedly unfair competition. The court agrees. As defendant notes, the California appellate court has recently passed upon the meaning of ‘lost money or property’ under the UCL specifically. In Silvaco Data Systems v. Intel Corp., 184 Cal.App.4th 210, 109 Cal.Rptr.3d 27 (2010), the court noted that the UCL’s standing requirements “go[] farther than the federal authorities by requiring that the plaintiff also have ‘lost money or property.’ Ordinarily when we say someone has “lost” money we mean that he has parted, deliberately or otherwise, with some identifiable sum formerly belonging to him or subject to his control; it has passed out of his hands by some means, such as being spent or mislaid, or ceded in a gamble, bad loan, or investment. Similarly, when we say someone has “lost” property we mean that he has parted with some particular item of property he formerly owned or possessed; it has ceased to belong to him, or at least has passed beyond his control or ability to retrieve it.” See 184 Cal.App.4th at 244, 109 Cal.Rptr.3d 27 (emphasis added).

Applying this heightened concept of injury under the UCL, plaintiffs claim that his PII constitutes lost ‘money’ — based on plaintiffs untested theory that PII constitutes ‘currency’ — strains the acceptable boundaries of ‘injury’ under the statute. Similarly, to the extent that plaintiff makes the equally untested claim that his PII constitutes ‘property,’ plaintiff makes no allegation — nor can he — that his PII was ‘lost’ in the sense understood under the UCL. For as defendant points out, plaintiffs PII — e.g., his login and password information — did not cease to belong to him, or pass beyond his control.

In sum, plaintiff has failed to plead the heightened degree of injury required under the UCL. The court need not therefore delve into an analysis of whether plaintiff has met the remaining substantive prongs of a UCL claim, but instead GRANTS defendant’s motion to dismiss the plaintiffs UCL claim based on the injury requirement alone. Because plaintiff cannot cure the foregoing deficiencies, the dismissal is with prejudice.

3. California Penal Code § 502 (Claim 3)

CahPenal Code § 502(c)(6) prohibits any person from committing the following act: “Knowingly and without permission providing] or assisting] in providing a means of accessing a computer, computer system, or computer network in violation of this section.” Defendant asserts that this claim fails, however, because defendant is not a proper defendant under this subsection, and because plaintiff fails to allege that he suffered any “loss” under this provision.

Defendant is correct that dismissal is warranted by reason of the former. Plaintiff argues that defendant “provided a means” for hackers to access defendant’s computer system, by failing to establish commercially reasonable security methods to protect the PII on its system. Plaintiff further relies on his allegations that defendant’s actions were knowing and “without permission,” because plaintiff never gave defendant permission to provide its PII to any hackers. FAC, ¶ 96. Review of section 502(c), however — -which, as a penal statute, is to be strictly construed — reveals that the legislature’s intent in drafting the statute was to protect against “tampering, interference, damage, and unauthorized access to lawfully created computer data and computer systems.” See CahPenal Code § 502(a). And while plaintiff is correct that this protection is broadly read to include protection for all — i.e., individuals, private companies, government entities — it is less than clear that the statute is meant to subject individuals or entities to liability who took no active role in tampering with, or in gaining unauthorized access to computer systems. Indeed, the relatively few cases interpreting the statute largely seek to impose liability against individuals or entities who are alleged to have actually participated in unauthorized ‘hacking’ or the unlawful disclosure of information. This scenario is distinguishable from the present action, in which plaintiff seeks to impose liability on defendant for third party hackers’ unauthorized access of and tampering with defendant’s system.

In the absence of case law submitted firmly suggesting liability over defendant on grounds that defendant failed to provide a sufficiently secure computer system, the court agrees with defendant that plaintiff has failed to allege that defendant falls within the scope of liability contemplated by section 502(c)(6). Accordingly, defendant’s motion to dismiss this claim is GRANTED. The dismissal is with prejudice.

4. Consumer Legal Remedies Act Claim (Claims)

Defendant asserts that plaintiff cannot state a valid claim under the Consumer Legal Remedies Act (“CLRA”). The CLRA proscribes various practices that are deemed unfair and/or deceptive to consumers. • In alleging that defendant violated the CLRA, plaintiff relies on Cal. Civ.Code § 1770(a)(5), which prohibits any person “in a transaction intended to result or which results in the sale or lease of goods or services to any consumer” from: “Representing that goods or services have sponsorship, approval, characteristics, ingredients, uses, benefits, or quantities which they do not have or that a person has a sponsorship, approval, status, affiliation, or connection which he or she does not have.”

Defendant here correctly argues that plaintiff cannot state a valid claim under this provision of the CLRA because he has not alleged that he is a “consumer” within the meaning of the statute. The CLRA permits “consumers” to file suit pursuant to section 1770 and further defines a “consumer” to be “an individual who seeks or acquires, by purchase or lease, any goods or services for personal, family, or household purposes.” See Cal. Civ.Code § 1761(d). Plaintiff, however, does not fall under this definition, since he did not “purchase or lease” any goods or services from defendant — a strict requirement under the statute. To be sure, plaintiff relies on his oft-repeated theory that, because his PII has an “ascertainable value” and constitutes both currency and property, his transfer of PII information to defendant in exchange for free applications, constitutes a “purchase” or “lease” under the CLRA. However, this argument — and the more generalized notion that the phrase “purchase” or “lease” contemplates any less than tangible form of payment — finds no support under the specific statutory language of the CLRA, nor has plaintiff relied on any legal authority suggesting as much.

All of which requires the court to conclude that plaintiff has failed to allege the requisite “consumer” status under the CLRA, such that a viable claim under the Act may be stated. The court therefore GRANTS defendant’s motion to dismiss plaintiffs CLRA claim. Since there are no allegations that would cure the foregoing deficiency, the dismissal is with prejudice.

5. Contractual Claims (Claims 5-7)

Plaintiff alleges three contractual based claims: breach of contract, breach of implied contract; and breach of the implied covenant of good faith and fair dealing. See FAC, ¶¶ 110-133. Defendant challenges all contractual claims, in part, for failure to allege any actionable damages. Specifically, defendant asserts that plaintiff has failed to allege that the value of his PII has diminished as a result of defendant’s actions, how the breach of his PII affects him, or any loss whatsoever.

As a general matter, defendant is correct that plaintiff must plead damages resulting from any alleged contractual breach. See, e.g., First Comm. Mort. Co. v. Reece, 89 Cal.App.4th 731, 745, 108 Cal.Rptr.2d 23 (2001) (“A claim for breach of contract under California law consists of the following elements: (1) the existence of a contract; (2) performance by the plaintiff; (3) breach by the defendant; and (4) damage resulting from the breach.”) (emphasis added); Patent Scaffolding Co. v. William Simpson Const. Co., 256 Cal.App.2d 506, 511, 64 Cal.Rptr. 187 (1967) (“A breach of contract without damage is not actionable.”); Gomez v. Lincare, Inc., 173 Cal.App.4th 508, 93 Cal.Rptr.3d 388 (2009) (“A cause of action for breach of implied contract has the same elements as does a cause of action for breach of contract, except that the promise is not expressed in words but is implied from the promisor’s conduct.”); Rosenfeld v. JPMorgan Chase Bank, N.A., 732 F.Supp.2d 952 (N.D.Cal.2010) (setting forth elements necessary to establish breach of the covenant of good faith and fair dealing in California, including requirement that plaintiff have been harmed by the defendant’s conduct). Moreover, the damage element inherent in contractual claims parallels the type of concrete, non-speculative injury that must be pled in order to adequately allege injury in fact under Article III. See, e.g., Buttram v. Owens-Corning Fiberglas Corp., 16 Cal.4th 520, 531 n. 4, 66 Cal.Rptr.2d 438, 941 P.2d 71 (1997) (“[T]o be actionable, harm must constitute something more than nominal damages, speculative harm, or the threat of future harm-not yet realized ...”).

For the reasons already noted at the outset, therefore, the court concludes that at the present pleading stage, plaintiff has sufficiently alleged a general basis for harm by alleging that the breach of his PII has caused him to lose some ascertainable but unidentified “value” and/or property right inherent in the PII. As such, the court declines to dismiss plaintiffs breach claims on grounds that plaintiff has failed to allege damages or harm as a matter of law.

To the extent that defendant has also argued, moreover, that plaintiffs contractual claims should be dismissed because the provisions of the privacy policy maintained by defendant expressly provide that no liability will result due to a third party’s unauthorized access of defendant’s computer system, defendant’s argument is unpersuasive. For as plaintiff points out, the policy upon which the parties rely actually provides that: “RockYou! ... assumes no liability or responsibility for ... (Ill) any unauthorized access to or use of our secure servers and/or any and all personal information and/or financial information stored therein ... ”. See Mot. Dismiss at 19:26-20:2 (emphasis added). Since plaintiff is alleging that the servers were not, in fact, secure, this provision of the policy does not automatically preclude plaintiffs contract claims.

However, to the extent defendant additionally argues that plaintiffs claim for breach of the implied covenant of good faith and fair dealing must fail pursuant to Careau & Co. v. Security Pacific Business Credit, Inc., 222 Cal.App.3d 1371, 1395, 272 Cal.Rptr. 387 (1990), defendant’s position is well taken. As Careau makes clear, plaintiff must allege more than a mere contractual breach, and must go further by alleging “a failure or refusal to discharge contractual responsibilities, prompted not by an honest mistake, bad judgment or negligence but rather by a conscious and deliberate act, which unfairly frustrates the agreed common purposes and disappoints the reasonable expectations of the other party thereby depriving that party of the benefits of the agreement.” Id. Here, plaintiff has alleged defendant’s failure “to take commercially reasonable steps to safeguard and secure” plaintiffs PII information, and defendant’s failure “to promptly and sufficiently notify” plaintiff that his PII had been compromised. Plaintiff alleges only in the most conclusory terms that such failures were “consciously and deliberately” executed, but provides no supporting or factual allegations that adequately allege the type of conscious and deliberate acts that are contemplated by Careau. Plaintiff has also failed to adequately rebut defendant’s argument on this point.

Accordingly, while the court is unpersuaded that dismissal of plaintiffs contractual claims for breach of contract and breach of implied contract is warranted and therefore DENIES the motion with respect to these two claims, the court agrees with defendant that plaintiffs claim for breach of the implied covenant of good faith and fair dealing is fatally deficient, and GRANTS the motion with respect to that claim. Leave to amend is granted, however, so that plaintiff may re-allege any additional facts sufficient to state a proper claim, if available.

6. Negligence Claims (Claims 8-9)

Defendant also contends that plaintiffs negligence and negligence per se claims fail to state valid claims. An action in negligence requires a showing that the defendant owed the plaintiff a legal duty, that the defendant breached the duty, and that the breach was a proximate or legal cause of injuries suffered by the plaintiff. See United States Liab. Ins. Co. v. Haidinger-Hayes, Inc., 1 Cal.3d 586, 594, 83 Cal.Rptr. 418, 463 P.2d 770 (1970). As for negligence per se, this doctrine is based on “the rule that a presumption of negligence arises from the violation of a statute which was enacted to protect a class of persons of which the plaintiff is a member against the type of harm that the plaintiff suffered as a result of the violation.” See Quiroz v. Seventh Ave. Center, 140 Cal.App.4th 1256, 1285, 45 Cal.Rptr.3d 222 (2006). Therefore, a party who seeks to prevail on a cause of action premised on the negligence per se doctrine must establish, among other elements, that the party is “one of the class of persons for whose protection the statute, ordinance, or regulation was adopted.”

First, beginning with plaintiffs negligence claim, defendant again reiterates that plaintiffs negligence claim fails because plaintiff has failed to plead any sufficiently cognizable injuries to establish damages. See, e.g., Ruiz v. Gap, Inc., 380 Fed.Appx. 689, 691 (9th Cir.2010) (noting that actual injury in negligence actions, under California law, requires concrete, non-speculative harm). For the reasons already stated, however, the court concludes that plaintiffs allegations that he was injured by defendant’s actions in permitting the unauthorized and public disclosure of his PII, which had some unidentified but ascertainable value, are sufficient to allege an actual injury at this stage. Accordingly, the court DENIES defendant’s motion to dismiss the negligence claim on this ground.

Second, and turning to plaintiffs negligence per se claim, defendant asserts that plaintiff has failed to establish that any statutory violation — -under the Stored Communications Act, UCL, Penal Code § 502, or CLRA — has been sufficiently pled, such that a claim for negligence per se may be stated. As already stated elsewhere herein, each of these claims- — with the exception of plaintiffs SCA claim — has been dismissed with prejudice. Plaintiff has been given leave, however, to amend his SCA claim. Accordingly, since plaintiffs negligence per se claim may yet be premised upon a viable claim under the SCA, the court DENIES defendant’s motion to dismiss the negligence per se claim at this time.

C. Conclusion

For all the foregoing reasons, defendant’s motion to dismiss plaintiffs complaint is GRANTED in part and DENIED in part. Specifically, the court dismisses plaintiffs first, second, third, fourth, and sixth causes of action. The dismissal is with prejudice as to plaintiffs second, third, and fourth causes of action, and leave to amend is granted with respect to plaintiffs first and sixth causes of action. The court denies dismissal, however, with respect to plaintiffs fifth, seventh, eighth, and ninth causes of action.

Plaintiff must file any amended complaint no later than May 11, 2011. Leave is not granted to add any additional claims.

IT IS SO ORDERED.  