
    Adam BACKHAUT and Kenneth Morris, Plaintiffs, v. APPLE INC., Defendant.
    Case No. 14-CV-02285-LHK
    United States District Court, N.D. California, San Jose Division.
    Signed November 30, 2015
    
      William M. Audet, Jonas Palmer Mann, Joshua Caleb Ezrin, Mark Etheredge Burton, Jr., Theodore H. Chase, Audet & Partners, LLP, San Francisco, CA, for Plaintiffs.
    David Michael Walsh, Esq., Kai Shields Bartolomeo, Morrison' & Foerster LLP, Los Angeles, CA, Tiffany Cheung, Morrison & Foerster LLP, San Francisco, CA, for Defendant.'
   ORDER GRANTING MOTION FOR SUMMARY JUDGMENT

Re: Dkt. No. 85

LUCY H. KOH, United States District Judge

Plaintiffs Adam Backhaut and Kenneth Morris (collectively, “Plaintiffs”) bring this putative class action on behalf of themselves and others similarly situated against Defendant Apple, Inc. (“Defendant”) for violations of the Wiretap Act, 18 U.S.C. § 2510 and California’s Unfair Competition Law, Cal. Bus. & Prof. Code § 17200. First Am. Compl. (“FAC”), ECF. No. 29. The gravamen of Plaintiffs’ FAC is that Apple wrongfully intercepts, stores, and otherwise prevents former Apple device users from receiving text messages sent to them from current Apple device users. Before the Court is Defendant’s motion for summary judgment.. (“Mot.”), ECF No, 86. The Court finds this matter appropriate for determination without oral argument and VACATES the hearing and the Case Management Conference set for December 3, 2015. See Civil L.R. 7-l(b). Having considered the submissions of the parties, the relevant law, and the record in this case, the Court hereby GRANTS Defendant’s motion for summary judgment.

I. BACKGROUND

A. Facts

Defendant Apple, Inc., a California corporation headquartered in Cupertino, California is the “designer and seller” of the iPhone and other mobile devices that run “Apple’s proprietary mobile operating system.” FAC ¶¶ 7, 35. Apple’s mobile operating system is known as “iOS” and its first iteration was released on June 29,2007. Id. II7. On October 12, 2011, Apple released iOS 5, which included a “proprietary, messaging service known as ’iMessage’” that runs on a client application called “Messages.” Id. ¶¶8-9. Plaintiff Adam Back-haut is a resident of Michigan who purchased an iPhone in December 2012. Id. ¶¶ 33, 39, 40. Plaintiff Morris is a resident of California who purchased' his last iPhone in October 2012. Id. ¶¶ 34, 47. Plaintiffs both used Apple’s iMessage and Messages application on their iPhones. Plaintiffs Backhaut and Morris switched from Apple iPhones to non-Apple phones in December 2013 and December 2012 respectively. Id ¶¶ 41,47.

Plaintiffs allege that Apple “intentionally intercepted the electronic communications of Plaintiffs” and “intercepts the text messages immediately after they are sent by current . iPhone/iMessage Users.” Id ¶¶, 62-63. Plaintiffs contend that Apple wrongfully'“receives and stores these messages through the employment of a ... device, under” the-Wiretap Act. Id ¶64. Plaintiffs further allege that these unlawful business practices support claims under California’s Unfair Competition Law (“UCL”). Id ¶,68. Plaintiffs also allege that -these-business practices constitute “unfair” business practices under the UCL for violation of “established legislative goals and policies” Id. ¶ 72.-

1. Text Messages, iMessages, and Messages

“Text messages” or “texts” are “brief, electronic - messages between two or more mobile devices.” Id. ¶ 3. There are “multiple technologies” for sending text messages, but the “traditional” or standard technology is the Short Message Service and Multimedia Messaging Service (“SMS/MMS”) protocols. Id. ¶¶3, 5. As an alternative to this standard protocol, Apple’s proprietary text messages are known as “iMessages” and are sent using the “Messages” client application. Id. ¶¶ 8-10. Instead of the SMS/MMS protocol for sending and receiving messages; iMessag-es use Wi-Fi and cellular data networks to send messages and other content between two Apple devices. Id ¶¶ 9-10.

“Once an iPhone user activates iMes-sage,” the interface for sending iMessages and SMS/MMS text messages on the Messages client application is the same. Id ¶ 11. The Messages application “automatically checks if the contact to whom the text message is being sent is also registered as an iMessage user.” Id ¶ 13. [Redacted text] ECF No. 85-11 at 59:23-60:1; ECF No. 85-37 ¶ 6. if the intended recipient is listed as an iMessage user, [Redacted text] and the text message is sent as an iMessage, “bypassing the SMS/MMS system of the sender’s cellular carrier.” FAC ¶ 13; ECF No. 85-37 ¶6. If the contact is not registered as an iMessage user, [Redacted text] and the message is , sent as an SMS/MMS. FAC ¶ 13; ECF No. 85-37 ¶ 6. [Redacted text] ECF No. 85-11 at 59:23-60:1; ECF No. 85-37 ¶ 6.

.The Messages application “does not allow the user to select whether a text message will be sent using iMessage or SMS/ MMS.” FAC ¶ 12. However, the sender may enable the “send as SMS” option on the sender’s iPhone. ECF No. 85-37 ¶ 11; ECF No. 85-35 ¶23. If the “send as SMS” option is selected, a message initially sent as an iMessage will be resent as an SMS/ MMS message if the message has not been successfully delivered after .five minutes. ECF .No. 85-37 ¶ 11; ECF No, 85-35 ¶23. A sender- can see whether a message was sent using iMessage or SMS/MMS based on the background color of the message: blue for iMessage. and green for SMS/ MMS. FAC ¶ 14. When an iMessage is “received, the word ’delivered’ will appear under the text message on the sender’s phone.” Id. ¶ 15.

When a text message is sent as an iMes-sage, it is initially encrypted such that only the sender and the receiver can access the substance of the message. ECF No. 85-37 ¶8. Apple has no ability to decrypt messages that are in transit between phones [Redacted text] Id.; ECF No. 85-11 at 71:1-15. [Redacted text] ECF No 85-37 ¶ 9. [Redacted text] ECF No. 85-37 ¶ 9; ECF No. 101-7, Exh. Q at 12:16-17; ECF No. 101-7, Exh. B at 44:12-15;' ECF No. 101-8, Exh. S ¶ 19. [Redacted text] ECF No. 101-7, Exh. P at 158:7-9; ECF- No. 85-37 ¶ 11. [Redacted text] ECF No. 85-11 at 28:21; ECF No. 85-37 ¶ 9. [Redacted text] ECF No. 85-11 at 33:9-12; ECF No. 85-37 ¶ 9.

2. Plaintiffs’ Experiences

a. Plaintiff Backhaut

In December 2012, Plaintiff Backhaut and his spouse, Joy Backhaut, purchased iPhone 5s in Michigan. FAC ¶ 39-40. “At the time of purchase,” a Best Buy employee set up their iPhones,- including iMes-sage. Id. In December 2013, Plaintiff Backhaut purchased a “HTC One,” a non-Apple mobile device that runs on an Android operating system. Icl ¶ 41. Following Plaintiff Backhaut’s switch, his spouse Joy continued to send Plaintiff Backhaut text messages from her iPhone. Id. ¶43. On Joy Backhaut’s phone, the word “delivered” appeared under her messages to her spouse, but Plaintiff Backhaut never received those messages. Id. Upon realizing that he was not receiving certain text messages, Plaintiff Backhaut “attempted to remove his phone number from the iMessage system 'but was unsuccessful.” Id. ¶ 45.

b. Plaintiff Morris

Plaintiff Morris was' an iPhone user from November 2007 to December 2012. Id. ¶ 46. He purchased his last iPhone, an iPhone 5, in October 2012. Id. ¶ 47. In December 2012, Plaintiff Morris purchased a non-Apple phone. Id. Morris “attempted to remove his phone number from the iMessage system” but was unable to do so. Id. ¶ 49. Morris also asked his contacts to manually change the settings in their iPhones to send him SMS/MMS messages rather than iMessages. Id. .This resolved the problem until Apple released iOS 7.1.1, at which point even contacts that had manually changed their settings had difficulties sending Morris text messages. Id. ¶50.

B. Procedural History

Plaintiffs filed their original complaint on May 16, 2014. ECF No. 1. Defendant filed its motion to dismiss on August 18, 2014. ECF No. 12. As part of its motion to dismiss, Defendant also filed a request for judicial notice, which Plaintiffs did not oppose. ECF No. 12. Plaintiffs filed their opposition on September. 22, 2014. ECF No. 16. Defendant filed its reply on October 21, 2014. ECF No. 17. On November 19, 2014, the Court granted in part and denied in part Defendant’s motion to dismiss. ECF No. 27. The' Court granted without prejudice Defendant’s motion to dismiss Plaintiffs’ Stored Communications Act claim; UCL claims based on violations of the Stored Communications Act claim; California Consumer Legal Remedies Act claim; and UCL claims based on fraudulent conduct. Id. at 22-23. The Court denied Defendant’s- motion to dismiss Plaintiffs’ Wiretap Act claim and UCL claims based on violations of the Wiretap Act. Id.

On December 10, 2014, Plaintiffs filed their FAC. ECF No, 29. Defendant filed an answer on January 7, 2015. ECF No. 31.

Plaintiffs filed a motion for class certification on May 28, 2015. ECF No. 59. Defendant filed its opposition on June 26, 2015. ECF No. 75. Plaintiffs filed their reply on July 16, 2015. ECF No. 78. The Court denied Plaintiffs’ motion on August 13, 2015. ECF No. 89. Plaintiffs filed a motion for leave to file a motion for reconsideration of the Court’s August 13 order denying class certification (“Motion for Leave”) on August 27, 2015. ECF No. 9‘9. Defendant filed an opposition to Plaintiffs’ Motion for Leave on September 11, 2015. ECF No. 102.

Defendant filed the instant motion for summary judgment on August 8, 2015. (“Mot.”), ECF No. 86. Plaintiffs opposed Defendant’s motion on September 9, 2015 (“Opp.”), ECF No. 101. Defendant filed a reply on September 28, 2015. (“Reply”), ECF No. 107.

I. LEGAL STANDARD

Summary judgment is appropriate if, viewing the evidence and drawing all reasonable inferences in the light most favorable to the nonmoving party, there are no genuine issues of material fact, and the movant is entitled to judgment as a matter of law. Fed. R. Civ. P. 56(a); Celotex Corp. v. Catrett, 477 U.S. 317, 321, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). At the summary judgment stage, the Court “does not assess credibility or weigh the evidence, but simply determines whether there is a genuine' factual issue for trial.” House v. Bell, 547 U.S. 518, 559-60, 126 S.Ct. 2064, 165 L.Ed.2d 1 (2006). A fact is “material” if it “might affect the outcome of the suit under the governing law,” Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986), and a dispute as to a material fact is “genuine” if there is sufficient evidence for a reasonable trier of fact to decide in favor of the nonmoving party, id. “If the evidence is merely colorable, or is not significantly probative, summary judgment may be granted.” Id. (citations omitted).

The moving party bears the initial burden of identifying those portions of the pleadings, discovery, and affidavits that demonstrate the absence of a genuine issue of material fact. Celotex Corp., 477 U.S. at 323, 106 S.Ct. 2548. Where the moving party will have the burden of proof on -an issue at trial, it must affirmatively demonstrate that no reasonable trier of fact could find other than for the moving party, but on an issue for which the opposing party will have the burden of proof at trial, the party moving for summary judgment need only point out “that there is an absence of evidence to support the non-moving party’s case.” Id. at 325, 106 S.Ct. 2548; accord Soremekun v. Thrifty Payless, Inc., 509 F.3d 978, 984 (9th Cir.2007), Once the moving party meets its initial burden, the nonmoving party must set forth, by affidavit or as otherwise provided in Rule 56, “specific facts showing that there is a genuine issue for trial.” Anderson, 477 U.S. at 250, 106 S.Ct. 2505.

II. DISCUSSION

Defendant advances several bases on which the Court may grant summary, judgment. First, Defendant argues that there is no evidence that Plaintiffs failed to receive any specific text messages. Mot. at 14-15. Second, Defendant argues that there is no evidence that Defendant’s iM-essage system “intercepted” any messages, as the term “intercepted” is defined within the Ninth Circuit for purposes of the Wiretap Act. Mot. at 15-18. Third, Defendant argues that there is no evidence that Defendant used a “device” to intercept any messages, as required by the Wiretap Act. Mot. at 18-20. Fourth, Defendant argues that there is no evidence that any interception of messages by Defendant was intentional. Mot. at 20-24. Fifth, Defendant argues that Plaintiffs’ UCL claim is dependent upon Plaintiffs’ Wiretap Act claim, so Plaintiffs cannot succeed on the UCL claim if they cannot succeed on the Wiretap Act claim. Mot. at 24. Finally, Defendant argues that Defendant’s terms of use contract for iMessage' precludes Plaintiffs from succeeding on their two claims. Mot. at 24-27.

For the reasons stated below, the Court concludes that there, is insufficient evidence that Defendant intercepted any messages within the meaning of the Wiretap Act and insufficient evidence that Defendant used a device as defined by the Wiretap Act. Because Defendant has shown an absence of genuine dispute of material fact on these points, the Court GRANTS Defendant’s motion for summary judgment as to the Wiretap Aqt claim. Because Plaintiffs’ UCL claim is dependent upon Plaintiffs’ Wiretap Act claim, the Court also GRANTS Defendant’s motion for summary judgment as to the UCL claim. The Court need not address Defendant’s other bases for summary judgment or Plaintiffs’ counterarguments thereto. ’

A. Wiretap Act Claim

The Wiretap Act, which was enacted as Title III of the Electronic Communications Protection Act (“ECPA”), generally prohibits the “interception” of “wire, oral, or electronic communications.” 18 U.S.C. § 2511(1). More specifically, the Wiretap Act provides a private right of action against any person who “intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication.” 18 U.S.C. § 2511(l)(a); see id. § 2520 (providing a private right of action).

The statute defines “intercept” as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” Id. § 2510(4). “Such acquisition occurs ‘when the contents of a wire communication are captured or redirected in any way.’ ” Noel v. Hall, 568 F.3d 743, 749 (9th Cir.2009). Defendant contends that Plaintiffs have not identified evidence that Defendant’s conduct satisfies the definition of “intercept” in the Wiretap Act. The Court agrees with Defendant on two grounds: (1) that the undisputed evidence shows that any acquisition by Defendant did not occur at the time of transmission as required by the Wiretap Act, and (2) that the undisputed evidence shows that the “device” used by Defendant falls within the “ordinary course pf business” exception to Wiretap Act liability. .

1. No Acquisition at the Time of Transmission

Defendant • first contends that Plaintiffs have not shown that Defendant acquired any misdirected messages at the time of transmission. The Ninth Circuit has held that for an electronic communication to be “intercepted” in violation of the Wiretap Act, “it must be acquired during transmission, not while it is in electronic storage.” Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir.2002). There can be no interception for purposes of the Wiretap Act if the acquisition of the message occurs while the message is in storage, even if it is in temporary storage incidental to the transmission of the communication. Id. n. 6. Thus, the Ninth Circuit held that no interception occurs when an individual who lacks authorization to access a webpage uses an authorized user’s credentials to gain access to the webpage, even though the unauthorized individual acquired the contents of the webpage, because the webpage was not in transmission at the time of acquisition. Id. at 879.

In the instant case, Plaintiffs argue that “the iMessage server caused [Plaintiffs’] messages to be intercepted at the exact moment of transmission as a result of a structural defect,” resulting in messages being sent as iMessages to users who cannot receive iMessages. Opp. at 14. However, Plaintiffs have not identified any structural defect that misclassifies or redirects messages as iMessages “at the exact moment of transmission.” Instead, the undisputed evidence shows that a prospective message is [Redacted text] ECF No. 85-11 at 59:23-60:1; ECF No. 85-37 ¶ 6. [Redacted text] When the sender first selects a recipient, the sender’s Messages application and the iMessage system [Redacted text] Id. [Redacted text]Id. [Redacted text] Defendant does not “intercept” the message within the meaning of the Wiretap Act by erroneously classifying the message as an iMessage. See Konop, 302 F.3d at 878 (holding that for an electronic communication to be “intercepted” in violation.of the Wiretap Act, “it must be acquired during transmission”).

Moreover, Plaintiffs appear to concede that it is not an “interception” for messages to be initially misclassified and sent as Messages. Plaintiffs acknowledge that the sender can select the “send as SMS text” option on the sender’s phone prior to transmitting the message. Opp. at 3 n.2; ECF'No. 85-37 ¶ 11; ECF No. 85-35 ¶23. If the sender selects this option, a message initially misclassified as an iMessage will be sent as an iMessage initially but then will be resent as an SMS/MMS after five minutes. ECF No. 85-37 ¶ 11; ECF No. 85-35 ¶ 23. Plaintiffs concede that “if the message is sent as an SMS text there would be no unlawful interception,” Opp. at 3 n.2, even though the message is first sent to the iMessage server prior to the determination that the message' cannot be delivered, see ECF No. 85-37 ¶ 11; ECF No. 85-35 ¶ 23.

To the extent Plaintiffs instead contend that the interception occurs when messages from a sender who has not selected “send as SMS” are not resent as SMS/ MMS when the messages prove undeliverable as Messages, this event also does not occur while- the message is “in transmission.” [Redacted text], ECF No. 85-11 at 60:22-25, [Redacted text] ECF No. 85-11 at 60:22-25; ECF No. 85-11 at 28:15-21; 33:9-12; ECF No. 85-37 ¶ 9. [Redacted text] ECF No. 85-37 ¶ 9; ECF No. 101-7, Exh. Q at 12:16-17; ECF No. 101-7, Exh. P at 44:12-15; ECF No. 101-8, Exh. S ¶ 19. [Redacted text] There can be no interception within the meaning of the Wiretap Act while the message is [Redacted text] See Konop, 302 F.3d at 878 n. 6 (holding that there can be no interception for purposes of the Wiretap Act if the acquisition" of the message occurs while the message is in storage, even if it is in temporary storage incidental to the transmission of the communication).

Finally, to the extent Plaintiffs argue that the interception.occurs when a message [Redacted text] Plaintiffs effectively concede that this transmission on its own is insufficient to establish an intercéption. Plaintiffs concede that a message initially transmitted as an iMessage may still be sent as an SMS if the sender has selected “send as SMS,” and that there is no interception if the message is sent as an SMS. See Opp. at 3 n.2. Additionally,-'Plaintiffs in opposition to Defendant’s motion for summary judgment have not identified any device, other than the iMessage server, [Redacted text] See Opp. at 16 (describing the iMessage server as the “’device’. for purposes of the interception”). As the Court explains below, the iMessage server falls within the “ordinary course of business” exception to the Wiretap Act, [Redacted text]

2. The iMessage Server Falls within the “Ordinary Course of Business” Exception

Defendant further contends that any “device” identified by Plaintiffs falls within the “ordinary course of business” exception to Wiretap Act liability. Section 2510(5)(a), the definition of “device,” exempts “any telephone or telegraph instrument, equipment or facility, or any component thereof ... being used by a provider of wire or electronic communication service in the ordinary course of its business — ” This exception is narrow in scope and requires that the electronic communication service provider demonstrate that “the interception facilitated the communication service or was incidental to the functioning of the provided communication service.” In re Google Inc. Gmail Litig., No. 13-MD-02430-LHK, 2013 WL 5423918, at *8 (N.D.Cal. Sept. 26, 2013).

In the instant case, the device Plaintiffs identify in their opposition to Defendant’s motion for summary judgment is the iMessage server. Opp. at 16. Plaintiffs do not dispute that Apple is “a provider of wire or electronic communication service.” See Opp. at 15-16. Instead, Plaintiffs argue that the “ordinary course of business” exception does not apply to [Redacted text] the iMessage server because “(1) the purposes [sic] of iMessage is to deliver messages, and (2) iMessage contains a structural defect that causes the messages to be intercepted.” Opp. at 15.

Defendant has produced evidence that in Defendant’s ordinary course of bush ness, [Redacted text] ECF 'No. 85-37 ¶ 9. [Redacted text] ECFNo. 85-11 at 60:22-25. [Redacted text] ECF No. 85-37 ¶ 9; [Redacted text] ECF No. 85-3719; ECF No. 101-7, Exh. Q at 12:16-17; ECF No. 101-7, Exh. P at 44:12-15; ECF No."l01-8, Exh. S ¶ 19; [Redacted text] ECF No. 101-7, Exh. P at 158:7-9; ECF No. 85-37 ¶ 11; [Redacted text] ECF No. 85-11 at 33:9-12; ECF No. 85-37 ¶9. All of these functions “facilitate[ ] the communication service” provided by Apple or are “incidental to the functioning of the provided communication . service.”. See In re Google Inc. Gmail Litig., 2013 WL 5423918, at *8. Plaintiff has not identified any contrary evidence.

Moreover, Plaintiffs point to no evidence that the iMessage server ever operated outside its ordinary functions. The undisputed evidence shows that by the time any misclassified messages to former iPhone users [Redacted text] ECF No. 85-11 at 59:23-60:1; ECF No. 85-37 ¶¶6, 14. [Redacted text] ECF No. 85-11 at 59:23-60:1, 60:22,25; ECF No. 85-37 ¶¶6, 14. [Redacted text] ECF No. 85-11 at 60. [Redacted text] ECF No. 85-11 at 28:15-21; 33:9-12; ECF No. 85-37 ¶ 9. This evidence, undisputed by Plaintiffs, is sufficient to. establish that the iMessage server was operating within the ordinary course of business [Redacted text] An acquisition of a communication by a device “being used by a provider of wire or electronic communication service in the ordinary course of its business” cannot form the basis of a Wiretap Act claim. 18 U.S.C. § 2510(5)(a). Thus, the iMessage server does not qualify as a “device” -within the meaning of the Wiretap Act, and Defendant is entitled to summary judgment.on the Wiretap Act claim.

The evidence in this case is similar to Hall v. EarthLink Network, Inc., 396 F.3d 500, 502 (2d Cir.2005). In Hall, the plaintiff alleged Earthlink had .wrongfully intercepted emails sent to his cancelled email address because Earthlink had stored those emails rather than “bouncing back” the emails to the senders. In a motion for summary judgment, Earthlink offered evidence that it lacked the technical ability to “bounce back” emails and that storing such emails was an ordinary business practice. Id. The Hall plaintiff offered no evidence to the contrary, and the Second Circuit affirmed the district court’s grant of summary judgment. Id. Likewise, in this case, Defendant has offered undisputed evidence that the iMessage server [Redacted text] Defendant has also offered undisputed evidence that [Redacted text] is an ordinary business practice. As in Hall, summary judgment for Defendant is appropriate because the device identified by Plaintiffs was used within the ordinary course of business by a provider of wire or electronic communication services and thus cannot form the basis of a Wiretap Act claim. See 18 U.S.C. § 2510(5)(a) (exempting from the Wiretap Act devices used by providers of wire or electronic communication services in the ordinary course of business).

Therefore, the Court GRANTS Defendant’s motion for summary judgment on the Wiretap Act claim.

B. UCL Claim

Defendant additionally argues that the Court should grant summary judgment in favor of Defendant on Plaintiffs’ UCL claim because the UCL claim is predicated upon the Wiretap Act claim. Defendant argues that summary judgment should accordingly be entered on the UCL claim for the same reasons as for the Wiretap Act claim. Mot. at 24.

Plaintiffs concede that the UCL claim is predicated upon the Wiretap Act claim and make no separate, arguments for why the UCL claim should .survive summary judgment. Opp. at 18. Because the Court concludes that Defendant is entitled to summary judgment on Plaintiffs’ Wiretap Act claim, Defendant is also entitled to summary judgment on Plaintiffs UCL claim.

Therefore, the Court GRANTS Defendant’s motion for summary judgment on the UCL claim.

III. CONCLUSION

For the foregoing reasons, the Court GRANTS Defendant’s motion for summary judgment. The Court DENIES as moot Plaintiffs’ Motion for Leave.

The Clerk shall enter judgment in favor of Defendant and close the file.

IT IS SO ORDERED. 
      
      . Joy Backhaut was a named plaintiff in this action. On August 7, 2015, Joy Backhaut filed • a motion to’voluntarily dismiss with prejudice her claims against- Apple. ECF No. 84. On August 11,. 2015, Defendant filed a response indicating that it did. not oppose Joy Back-haut’s motion. ECF No. 88. The Court granted the motion to dismiss Joy Backhaut’s claims with prejudice on August 13, 2015. ECF No. 89. •
     