-
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT JERILYN QUON; APRIL FLORIO; JEFF QUON; STEVE TRUJILLO, Plaintiffs-Appellants, v. ARCH WIRELESS OPERATING COMPANY, INCORPORATED, a No. 07-55282 Delaware corporation; CITY OF ONTARIO, a municipal corporation; D.C. No. CV-03-00199-SGL LLOYD SCHARF, individually and as OPINION Chief of Ontario Police Department; ONTARIO POLICE DEPARTMENT; DEBBIE GLENN, individually and as a Sergeant of Ontario Police Department, Defendants-Appellees. Appeal from the United States District Court for the Central District of California Stephen G. Larson, District Judge, Presiding Argued and Submitted February 6, 2008—Pasadena, California Filed June 18, 2008 Before: Harry Pregerson and Kim McLane Wardlaw, Circuit Judges, and Ronald B. Leighton,* District Judge. Opinion by Judge Wardlaw *The Honorable Ronald B. Leighton, United States District Judge for the Western District of Washington, sitting by designation. 6997 QUON v. ARCH WIRELESS 7001 COUNSEL Dieter C. Dammeier, Zahra Khoury, Lackie & Dammeier APC, Upland, California, for the plaintiffs-appellants. Dimitrios C. Rinos, Rinos & Martin, LLP, Tustin, California; Kent L. Richland, Kent J. Bullard, Greines, Martin, Stein & Richland LLP, Los Angeles, California, for defendants- appellees City of Ontario, Ontario Police Department, and Lloyd Scharf. Bruce E. Disenhouse, Kinkle, Rodiger and Spriggs, Riverside, California, for defendant-appellee Debbie Glenn. John H. Horwitz, Schaffer, Lax, McNaughton & Chen, Los Angeles, California, for defendant-appellee Arch Wireless, Inc. OPINION WARDLAW, Circuit Judge: This case arises from the Ontario Police Department’s review of text messages sent and received by Jeff Quon, a Sergeant and member of the City of Ontario’s SWAT team. We must decide whether (1) Arch Wireless Operating Com- 7002 QUON v. ARCH WIRELESS pany Inc., the company with whom the City contracted for text messaging services, violated the Stored Communications Act,
18 U.S.C. §§ 2701-2711(1986); and (2) whether the City, the Police Department, and Ontario Police Chief Lloyd Scharf violated Quon’s rights and the rights of those with whom he “texted”—Sergeant Steve Trujillo, Dispatcher April Florio, and his wife Jerilyn Quon1 —under the Fourth Amend- ment to the United States Constitution and Article I, Section 1 of the California Constitution. I. FACTUAL BACKGROUND On October 24, 2001, Arch Wireless (“Arch Wireless”) contracted to provide wireless text-messaging services for the City of Ontario. The City received twenty two-way alphanu- meric pagers, which it distributed to its employees, including Ontario Police Department (“OPD” or “Department”) Ser- geants Quon and Trujillo, in late 2001 or early 2002. According to Steven Niekamp, Director of Information Technology for Arch Wireless: A text message originating from an Arch Wireless two-way alphanumeric text-messaging pager is sent to another two-way text-messaging pager as follows: The message leaves the originating pager via a radio frequency transmission. That transmission is received by any one of many receiving stations, which are owned by Arch Wireless. Depending on the location of the receiving station, the message is then entered into the Arch Wireless computer net- work either by wire transmission or via satellite by another radio frequency transmission. Once in the Arch Wireless computer network, the message is sent to the Arch Wireless computer server. Once in the server, a copy of the message is archived. The 1 Doreen Klein, a plaintiff below, has not filed an appeal. QUON v. ARCH WIRELESS 7003 message is also stored in the server system, for a period of up to 72 hours, until the recipient pager is ready to receive delivery of the text message. The recipient pager is ready to receive delivery of a mes- sage when it is both activated and located in an Arch Wireless service area. Once the recipient pager is able to receive delivery of the text message, the Arch Wireless server retrieves the stored message and sends it, via wire or radio frequency transmission, to the transmitting station closest to the recipient pager. The transmitting stations are owed [sic] by Arch Wireless. The message is then sent from the trans- mitting station, via a radio frequency transmission, to the recipient pager where it can be read by the user of the recipient pager. The City had no official policy directed to text-messaging by use of the pagers. However, the City did have a general “Computer Usage, Internet and E-mail Policy” (the “Policy”) applicable to all employees. The Policy stated that “[t]he use of City-owned computers and all associated equipment, soft- ware, programs, networks, Internet, e-mail and other systems operating on these computers is limited to City of Ontario related business. The use of these tools for personal benefit is a significant violation of City of Ontario Policy.” The Policy also provided: C. Access to all sites on the Internet is recorded and will be periodically reviewed by the City. The City of Ontario reserves the right to moni- tor and log all network activity including e-mail and Internet use, with or without notice. Users should have no expectation of privacy or confi- dentiality when using these resources. D. Access to the Internet and the e-mail system is not confidential; and information produced either in hard copy or in electronic form is con- 7004 QUON v. ARCH WIRELESS sidered City property. As such, these systems should not be used for personal or confidential communications. Deletion of e-mail or other electronic information may not fully delete the information from the system. E. The use of inappropriate, derogatory, obscene, suggestive, defamatory, or harassing language in the e-mail system will not be tolerated. In 2000, before the City acquired the pagers, both Quon and Trujillo had signed an “Employee Acknowledgment,” which borrowed language from the general Policy, indicating that they had “read and fully understand the City of Ontario’s Computer Usage, Internet and E-mail policy.” The Employee Acknowledgment, among other things, states that “[t]he City of Ontario reserves the right to monitor and log all network activity including e-mail and Internet use, with or without notice,” and that “[u]sers should have no expectation of pri- vacy or confidentiality when using these resources.” Two years later, on April 18, 2002, Quon attended a meeting dur- ing which Lieutenant Steve Duke, a Commander with the Ontario Police Department’s Administration Bureau, informed all present that the pager messages “were considered e-mail, and that those messages would fall under the City’s policy as public information and eligible for auditing.” Quon “vaguely recalled attending” this meeting, but did not recall Lieutenant Duke stating at the meeting that use of the pagers was governed by the City’s Policy. Although the City had no official policy expressly govern- ing use of the pagers, the City did have an informal policy governing their use. Under the City’s contract with Arch Wireless, each pager was allotted 25,000 characters, after which the City was required to pay overage charges. Lieuten- ant Duke “was in charge of the purchasing contract” and responsible for procuring payment for overages. He stated that “[t]he practice was, if there was overage, that the QUON v. ARCH WIRELESS 7005 employee would pay for the overage that the City had. . . . [W]e would usually call the employee and say, ‘Hey, look, you’re over X amount of characters. It comes out to X amount of dollars. Can you write me a check for your overage[?]’ ” The informal policy governing use of the pagers came to light during the Internal Affairs investigation, which took place after Lieutenant Duke grew weary of his role as bill col- lector. In a July 2, 2003 memorandum entitled “Internal Affairs Investigation of Jeffery Quon,” (the “McMahon Mem- orandum”) OPD Sergeant Patrick McMahon wrote that upon interviewing Lieutenant Duke, he learned that early on Lieutenant Duke went to Sergeant Quon and told him the City issued two-way pagers were considered e-mail and could be audited. He told Sergeant Quon it was not his intent to audit employee’s [sic] text messages to see if the overage is due to work related transmissions. He advised Sergeant Quon he could reimburse the City for the overage so he would not have to audit the transmission and see how many messages were non-work related. Lieutenant Duke told Sergeant Quon he is doing this because if any- body wished to challenge their overage, he could audit the text transmissions to verify how many were non-work related. Lieutenant Duke added the text messages were considered public records and could be audited at any time. For the most part, Lieutenant Duke agreed with McMahon’s characterization of what he said during his interview. Later, however, during his deposition, Lieutenant Duke recalled the interaction as follows: I think what I told Quon was that he had to pay for his overage, that I did not want to determine if the overage was personal or business unless they wanted me to, because if they said, “It’s all business, I’m not 7006 QUON v. ARCH WIRELESS paying for it,” then I would do an audit to confirm that. And I didn’t want to get into the bill collecting thing, so he needed to pay for his personal messages so we didn’t—pay for the overage so we didn’t do the audit. And he needed to cut down on his trans- missions. According to the McMahon Memorandum, Quon remem- bered the interaction differently. When asked “if he ever recalled a discussion with Lieutenant Duke that if his text- pager went over, his messages would be audited . . . Sergeant Quon said, ‘No. In fact he [Lieutenant Duke] said the other, if you don’t want us to read it, pay the overage fee.’ ” Quon went over the monthly character limit “three or four times” and paid the City for the overages. Each time, “Lieu- tenant Duke would come and tell [him] that [he] owed X amount of dollars because [he] went over [his] allotted char- acters.” Each of those times, Quon paid the City for the over- ages. In August 2002, Quon and another officer again exceeded the 25,000 character limit. Lieutenant Duke then let it be known at a meeting that he was “tired of being a bill collector with guys going over the allotted amount of characters on their text pagers.” In response, Chief Scharf ordered Lieuten- ant Duke to “request the transcripts of those pagers for audit- ing purposes.” Chief Scharf asked Lieutenant Duke “to determine if the messages were exclusively work related, thereby requiring an increase in the number of characters offi- cers were permitted, which had occurred in the past, or if they were using the pagers for personal matters. One of the officers whose transcripts [he] requested was plaintiff Jeff Quon.” City officials were not able to access the text messages themselves. Instead, the City e-mailed Jackie Deavers, a major account support specialist for Arch Wireless, requesting the transcripts. According to Deavers, QUON v. ARCH WIRELESS 7007 I checked the phone numbers on the transcripts against the e-mail that I had gotten, and I looked into the system to make sure they were actually pagers that belonged to the City of Ontario, and they were. So I took the transcripts and put them in a manila envelope [and brought them to the City]. Deavers stated that she did not determine whether private messages were being released, though she acknowledged that, upon reviewing approximately four lines of the transcript, she had realized that the messages were sexually explicit. She also stated that she would only deliver messages to the “contact” on the account, and that she would not deliver messages to the “user” unless he was also the contact on the account. In this case, the “contact” was the City. After receiving the transcripts, Lieutenant Duke conducted an initial audit and reported the results to Chief Scharf. Subse- quently, Chief Scharf and Quon’s supervisor, Lieutenant Tony Del Rio, reviewed the transcripts themselves. Then, in October 2002, Chief Scharf referred the matter to internal affairs “to determine if someone was wasting . . . City time not doing work when they should be.” Sergeant McMahon, who conducted this investigation on behalf of Internal Affairs, enlisted the help of Sergeant Glenn, also a member of Internal Affairs. Sergeant McMahon released the McMahon Memo- randum on July 2, 2003. According to the Memorandum, the transcripts revealed that Quon “had exceeded his monthly allotted characters by 15,158 characters,” and that many of these messages were personal in nature and were often sexu- ally explicit. These messages were directed to and received from, among others, the other Appellants. II. PROCEDURAL BACKGROUND On May 6, 2003, Appellants filed a Second Amended Complaint in the District Court for the Central District of Cal- ifornia alleging, inter alia, violations of the Stored Communi- 7008 QUON v. ARCH WIRELESS cations Act (“SCA”) and the Fourth Amendment. After the district court dismissed one of Appellants’ claims against Arch Wireless pursuant to Federal Rule of Civil Procedure 12(b)(6), all parties filed numerous rounds of summary judg- ment motions. On August 15, 2006, the district court denied Appellants’ summary judgment motion in full, and granted in part and denied in part Appellees’ summary judgment motions. Appellants appeal the district court’s holding that Arch Wireless did not violate the SCA,
18 U.S.C. §§ 2701-2711.2The district court found that Arch Wireless was a “remote computing service” under § 2702(a), and that it therefore committed no harm when it released the text-message tran- scripts to its “subscriber,” the City. Appellants also appeal the district court’s resolution of their claims against the City, the Department, Scharf, and Glenn.3 Appellants argue that the City, the Department, and Scharf violated Appellants’ Fourth Amendment rights to be free from unreasonable search and seizure pursuant to
42 U.S.C. § 1983, and that the City, Department, Scharf, and Glenn vio- lated Article I, Section 1 of the California Constitution, which protects a citizen’s right to privacy.4 The district court 2 Appellants fail to raise on appeal their claims against Arch Wireless for violations of California Penal Code section 629.86 and their state-law invasion of privacy claim under Article I, Section 1 of the California Con- stitution. Therefore, they have waived those claims. See Blanford v. Sacra- mento County,
406 F.3d 1110, 1114 n.8 (9th Cir. 2005). 3 Appellants fail to raise on appeal their claims against the City, the Department, Scharf, and Glenn for violations of the Stored Communica- tions Act and California Penal Code section 629.86. Jerilyn Quon fails to address on appeal her claim for defamation and interference with prospec- tive business advantage; nor does Florio address her claim that seizure of her personal pager and cell phone violated the Fourth Amendment. There- fore, Appellants have waived those claims. See Blanford,
406 F.3d at 1114. 4 “All people are by nature free and independent and have inalienable rights. Among these are enjoying and defending life and liberty, acquiring, possessing, and protecting property, and pursuing and obtaining safety, happiness, and privacy.” CAL. CONST. art. I, § 1. QUON v. ARCH WIRELESS 7009 addressed only the Fourth Amendment claim.5 Relying on O’Connor v. Ortega,
480 U.S. 709, 715, 725-26 (1987), the district court determined that to prove a Fourth Amendment violation, the plaintiff must show that he had a reasonable expectation of privacy in his text messages, and that the gov- ernment’s search or seizure was unreasonable under the cir- cumstances. The district court held that, in light of Lieutenant Duke’s informal policy that he would not audit a pager if the user paid the overage charges, Appellants had a reasonable expectation of privacy in their text messages as a matter of law. Regarding the reasonableness of the search, the district court found that whether Chief Scharf’s intent was to uncover misconduct or to determine the efficacy of the 25,000 charac- ter limit was a genuine issue of material fact. If it was the for- mer, the search was unreasonable; if it was the latter, the search was reasonable. Concluding that Chief Scharf was not entitled to qualified immunity on the Fourth Amendment claim, and that the City and the Department were not entitled to statutory immunity on the California constitutional privacy claim, the district court held a jury trial on the single issue of Chief Scharf’s intent. The jury found that Chief Scharf’s intent was to determine the efficacy of the character limit. Therefore, all defendants were absolved of liability for the search. On December 7, 2006, Appellants filed a motion to amend or alter the judgment pursuant to Federal Rule of Civil Proce- dure 59(e), and a motion for new trial pursuant to Rule 59(a). The district court denied each of these motions. Appellants timely appeal. 5 The district court limited its discussion to the Fourth Amendment because “the arguments lodged by the governmental defendants against plaintiffs’ invasion of privacy claim and state constitutional claim are the same as those pressed against plaintiffs’ Fourth Amendment claim . . . .” 7010 QUON v. ARCH WIRELESS III. JURISDICTION AND STANDARD OF REVIEW The district court had jurisdiction pursuant to
28 U.S.C. §§ 1331and 1343. We have jurisdiction over final judgments of the district courts pursuant to
28 U.S.C. § 1291. We review a district court’s grant of summary judgment de novo. Bagdadi v. Nazar,
84 F.3d 1194, 1197 (9th Cir. 1996). In reviewing the grant of summary judgment, we “must deter- mine, viewing the evidence in the light most favorable to the nonmoving party, whether genuine issues of material fact exist and whether the district court correctly applied the rele- vant substantive law.”
Id.IV. DISCUSSION A. Stored Communications Act [1] Congress passed the Stored Communications Act in 1986 as part of the Electronic Communications Privacy Act. The SCA was enacted because the advent of the Internet pres- ented a host of potential privacy breaches that the Fourth Amendment does not address. See Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1209-13 (2004). Generally, the SCA prevents “providers” of commu- nication services from divulging private communications to certain entities and/or individuals.
Id. at 1213. Appellants challenge the district court’s finding that Arch Wireless is a “remote computing service” (“RCS”) as opposed to an “elec- tronic communication service” (“ECS”) under the SCA, §§ 2701-2711. The district court correctly concluded that if Arch Wireless is an ECS, it is liable as a matter of law, and that if it is an RCS, it is not liable. However, we disagree with the district court that Arch Wireless acted as an RCS for the City. Therefore, summary judgment in favor of Arch Wireless was error. QUON v. ARCH WIRELESS 7011 [2] Section 2702 of the SCA governs liability for both ECS and RCS providers.
18 U.S.C. § 2702(a)(1)-(2). The nature of the services Arch Wireless offered to the City determines whether Arch Wireless is an ECS or an RCS. As the Niekamp Declaration makes clear, Arch Wireless provided to the City a service whereby it would facilitate communication between two pagers—“text messaging” over radio frequencies. As part of that service, Arch Wireless archived a copy of the message on its server. When Arch Wireless released to the City the transcripts of Appellants’ messages, Arch Wireless potentially ran afoul of the SCA. This is because both an ECS and RCS can release private information to, or with the lawful consent of, “an addressee or intended recipient of such communica- tion,”
id.§ 2702(b)(1), (b)(3), whereas only an RCS can release such information “with the lawful consent of . . . the subscriber.” Id. § 2702(b)(3). It is undisputed that the City was not an “addressee or intended recipient,” and that the City was a “subscriber.” [3] The SCA defines an ECS as “any service which pro- vides to users thereof the ability to send or receive wire or electronic communications.” Id. § 2510(15). The SCA prohib- its an ECS from “knowingly divulg[ing] to any person or entity the contents of a communication while in electronic storage by that service,” unless, among other exceptions not relevant to this appeal, that person or entity is “an addressee or intended recipient of such communication.” Id. § 2702(a)(1), (b)(1), (b)(3). “Electronic storage” is defined as “(A) any temporary, intermediate storage of a wire or elec- tronic communication incidental to the electronic transmission thereof; and (B) any storage of such communication by an electronic communication service for purposes of backup pro- tection of such communication.” Id. § 2510(17). An RCS is defined as “the provision to the public of com- puter storage or processing services by means of an electronic communications system.” Id. § 2711(2). Electronic communi- cation system—which is simply the means by which an RCS 7012 QUON v. ARCH WIRELESS provides computer storage or processing services and has no bearing on how we interpret the meaning of “RCS”—is defined as “any wire, radio, electromagnetic, photooptical or photoelectronic facilities for the transmission of wire or elec- tronic communications, and any computer facilities or related electronic equipment for the electronic storage of such com- munications.” Id. § 2510(14). The SCA prohibits an RCS from “knowingly divulg[ing] to any person or entity the con- tents of any communication which is carried or maintained on that service.” Unlike an ECS, an RCS may release the con- tents of a communication with the lawful consent of a “sub- scriber.” Id. § 2702(a)(2), (b)(3). [4] We turn to the plain language of the SCA, including its common-sense definitions, to properly categorize Arch Wire- less. An ECS is defined as “any service which provides to users thereof the ability to send or receive wire or electronic communications.”
18 U.S.C. § 2510(15). On its face, this describes the text-messaging pager services that Arch Wire- less provided. Arch Wireless provided a “service” that enabled Quon and the other Appellants to “send or receive . . . electronic communications,” i.e., text messages. Contrast that definition with that for an RCS, which “means the provision to the public of computer storage or processing services by means of an electronic communications system.”
Id.§ 2711(2). Arch Wireless did not provide to the City “com- puter storage”; nor did it provide “processing services.” By archiving the text messages on its server, Arch Wireless cer- tainly was “storing” the messages. However, Congress con- templated this exact function could be performed by an ECS as well, stating that an ECS would provide (A) temporary storage incidental to the communication; and (B) storage for backup protection. Id. § 2510(17). This reading of the SCA is supported by its legislative his- tory. The Senate Report identifies two main services that pro- viders performed in 1986: (1) data communication; and (2) QUON v. ARCH WIRELESS 7013 data storage and processing. First, the report describes the means of communication of information: [W]e have large-scale electronic mail operations, computer-to-computer data transmissions, cellular and cordless telephones, paging devices, and video teleconferencing . . . . [M]any different companies, not just common carriers, offer a wide variety of telephone and other communications services. S. REP. NO. 99-541, at 2-3 (1986). Second, [t]he Committee also recognizes that computers are used extensively today for the storage and process- ing of information. With the advent of computerized recordkeeping systems, Americans have lost the ability to lock away a great deal of personal and business information. For example, physicians and hospitals maintain medical files in offsite data banks, businesses of all sizes transmit their records to remote computers to obtain sophisticated data pro- cessing services. These services as well as the pro- viders of electronic mail create electronic copies of private correspondence for later reference. This information is processed for the benefit of the user but often it is maintained for approximately 3 months to ensure system integrity. Id. at 3. Under the heading “Remote Computer Services,” the Report further clarifies that term refers to the processing or storage of data by an off-site third party: In the age of rapid computerization, a basic choice has faced the users of computer technology. That is, whether to process data inhouse on the user’s own computer or on someone else’s equipment. Over the years, remote computer service companies have developed to provide sophisticated and convenient 7014 QUON v. ARCH WIRELESS computing services to subscribers and customers from remote facilities. Today businesses of all sizes —hospitals, banks and many others—use remote computing services for computer processing. This processing can be done with the customer or sub- scriber using the facilities of the remote computing service in essentially a time-sharing arrangement, or it can be accomplished by the service provider on the basis of information supplied by the subscriber or customer. Data is most often transmitted between these services and their customers by means of elec- tronic communications. Id. at 10-11. In the Senate Report, Congress made clear what it meant by “storage and processing of information.” It provided the fol- lowing example of storage: “physicians and hospitals main- tain medical files in offsite data banks.” Congress appeared to view “storage” as a virtual filing cabinet, which is not the function Arch Wireless contracted to provide here. The Sen- ate Report also provided an example of “processing of infor- mation”: “businesses of all sizes transmit their records to remote computers to obtain sophisticated data processing ser- vices.” In light of the Report’s elaboration upon what Con- gress intended by the term “Remote Computer Services,” it is clear that, before the advent of advanced computer processing programs such as Microsoft Excel, businesses had to farm out sophisticated processing to a service that would process the information. See Kerr, 72 GEO. WASH. L. REV. at 1213-14. Neither of these examples describes the service that Arch Wireless provided to the City. [5] Any lingering doubt that Arch Wireless is an ECS that retained messages in electronic storage is disposed of by Theofel v. Farey-Jones,
359 F.3d 1066, 1070 (9th Cir. 2004). In Theofel, we held that a provider of e-mail services, undis- putedly an ECS, stored e-mails on its servers for backup pro- QUON v. ARCH WIRELESS 7015 tection.
Id. at 1075. NetGate was the plaintiffs’ Internet Service Provider (“ISP”). Pursuant to a subpoena, NetGate turned over plaintiffs’ e-mail messages to the defendants. We concluded that plaintiffs’ e-mail messages—which were stored on NetGate’s server after delivery to the recipient— were “stored ‘for purposes of backup protection’ . . . . within the ordinary meaning of those terms.”
Id.(citation omitted). [6] The service provided by NetGate is closely analogous to Arch Wireless’s storage of Appellants’ messages. Much like Arch Wireless, NetGate served as a conduit for the trans- mission of electronic communications from one user to another, and stored those communications “as a ‘backup’ for the user.”
Id.Although it is not clear for whom Arch Wireless “archived” the text messages—presumably for the user or Arch Wireless itself—it is clear that the messages were archived for “backup protection,” just as they were in Theofel. Accordingly, Arch Wireless is more appropriately categorized as an ECS than an RCS. Arch Wireless contends that our analysis in Theofel of the definition of “backup protection” supports its position. There, we noted that “[w]here the underlying message has expired in the normal course, any copy is no longer performing any backup function. An ISP that kept permanent copies of tem- porary messages could not fairly be described as ‘backing up’ those messages.”
Id. at 1070. Thus, the argument goes, Arch Wireless’s permanent retention of the Appellants’ text mes- sages could not have been for backup purposes; instead, it must have been for storage purposes, which would require us to classify Arch Wireless as an RCS. This reading is not per- suasive. First, there is no indication in the record that Arch Wireless retained a permanent copy of the text-messages or stored them for the benefit of the City; instead, the Niekamp Declaration simply states that copies of the messages are “ar- chived” on Arch Wireless’s server. More importantly, Theo- fel’s holding—that the e-mail messages stored on NetGate’s server after delivery were for “backup protection,” and that 7016 QUON v. ARCH WIRELESS NetGate was undisputedly an ECS—forecloses Arch Wire- less’s position. [7] We hold that Arch Wireless provided an “electronic communication service” to the City. The parties do not dis- pute that Arch Wireless acted “knowingly” when it released the transcripts to the City. When Arch Wireless knowingly turned over the text-messaging transcripts to the City, which was a “subscriber,” not “an addressee or intended recipient of such communication,” it violated the SCA,
18 U.S.C. § 2702(a)(1). Accordingly, judgment in Appellants’ favor on their claims against Arch Wireless is appropriate as a matter of law, and we remand to the district court for proceedings consistent with this holding. B. Fourth Amendment Appellants assert that they are entitled to summary judg- ment on their Fourth Amendment claim against the City, the Department, and Scharf, and on their California constitutional privacy claim against the City, the Department, Scharf, and Glenn. Specifically, Appellants agree with the district court’s conclusion that they had a reasonable expectation of privacy in the text messages. However, they argue that the issue regarding Chief Scharf’s intent in authorizing the search never should have gone to trial because the search was unreasonable as a matter of law. We agree. [8] “The ‘privacy’ protected by [Article I, Section 1 of the California Constitution] is no broader in the area of search and seizure than the ‘privacy’ protected by the Fourth Amendment . . . .” Hill v. Nat’l Collegiate Ath. Ass’n,
7 Cal. 4th 1, 30 n.9 (1994). Accordingly, our analysis proceeds under the Fourth Amendment to the United States Constitu- tion. The Fourth Amendment protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” U.S. CONST. amend. IV. “[T]he touchstone of the Fourth Amendment is QUON v. ARCH WIRELESS 7017 reasonableness.” United States v. Kriesel,
508 F.3d 941, 947 (9th Cir. 2007) (citing Samson v. California,
126 S.Ct. 2193, 2201 n.4 (2006)). Under the “general Fourth Amendment approach,” we examine “the totality of the circumstances to determine whether a search is reasonable.”
Id.“The reason- ableness of a search is determined by assessing, on the one hand, the degree to which it intrudes upon an individual’s pri- vacy and, on the other, the degree to which it is needed for the promotion of legitimate governmental interests.” United States v. Knights,
534 U.S. 112, 118-19 (2001) (internal quo- tation marks omitted). [9] “Searches and seizures by government employers or supervisors of the private property of their employees . . . are subject to the restraints of the Fourth Amendment.” O’Connor,
480 U.S. at 715. In O’Connor, the Supreme Court reasoned that “[i]ndividuals do not lose Fourth Amendment rights merely because they work for the government instead of a private employer.”
Id. at 717. However, the Court also noted that “[t]he operational realities of the workplace . . . may make some employees’ expectations of privacy unrea- sonable.”
Id.For example, “[p]ublic employees’ expectations of privacy in their offices, desks, and file cabinets . . . may be reduced by virtue of actual office practices and procedures, or by legitimate regulation.”
Id.The Court recognized that, “[g]iven the great variety of work environments in the public sector, the question whether an employee has a reasonable expectation of privacy must be addressed on a case-by-case basis.”
Id. at 718. Even assuming an employee has a reasonable expectation of privacy in the item seized or the area searched, he must also demonstrate that the search was unreasonable to prove a Fourth Amendment violation: “public employer intrusions on the constitutionally protected privacy interests of government employees for noninvestigatory, work-related purposes, as well as for investigations of work-related misconduct, should be judged by the standard of reasonableness under all the cir- 7018 QUON v. ARCH WIRELESS cumstances.”
Id. at 725-26. Under this standard, we must evaluate whether the search was “justified at its inception,” and whether it “was reasonably related in scope to the circum- stances which justified the interference in the first place.”
Id. at 726(internal quotation marks omitted). 1. Reasonable Expectation of Privacy [10] The extent to which the Fourth Amendment provides protection for the contents of electronic communications in the Internet age is an open question. The recently minted stan- dard of electronic communication via e-mails, text messages, and other means opens a new frontier in Fourth Amendment jurisprudence that has been little explored. Here, we must first answer the threshold question: Do users of text messaging services such as those provided by Arch Wireless have a rea- sonable expectation of privacy in their text messages stored on the service provider’s network? We hold that they do. In Katz v. United States,
389 U.S. 347(1967), the govern- ment placed an electronic listening device on a public tele- phone booth, which allowed the government to listen to the telephone user’s conversation.
Id. at 348. The Supreme Court held that listening to the conversation through the electronic device violated the user’s reasonable expectation of privacy.
Id. at 353. In so holding, the Court reasoned, “One who occu- pies [a phone booth], shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume that the words he utters into the mouthpiece will not be broad- cast to the world. To read the Constitution more narrowly is to ignore the vital role that the public telephone has come to play in private communication.”
Id. at 352. Therefore, “[t]he Government’s activities in electronically listening to and recording the petitioner’s words violated the privacy upon which he justifiably relied while using the telephone booth and thus constituted a ‘search and seizure’ within the meaning of the Fourth Amendment.”
Id. at 353. QUON v. ARCH WIRELESS 7019 On the other hand, the Court has also held that the govern- ment’s use of a pen register—a device that records the phone numbers one dials—does not violate the Fourth Amendment. This is because people “realize that they must ‘convey’ phone numbers to the telephone company, since it is through tele- phone company switching equipment that their calls are com- pleted.” Smith v. Maryland,
442 U.S. 735, 742 (1979). The Court distinguished Katz by noting that “a pen register differs significantly from the listening device employed in Katz, for pen registers do not acquire the contents of communications.”
Id. at 741. This distinction also applies to written communications, such as letters. It is well-settled that, “since 1878, . . . the Fourth Amendment’s protection against ‘unreasonable searches and seizures’ protects a citizen against the warrant- less opening of sealed letters and packages addressed to him in order to examine the contents.” United States v. Choate,
576 F.2d 165, 174 (9th Cir. 1978) (citing Ex parte Jackson,
96 U.S. 727(1877)); see also United States v. Jacobsen,
466 U.S. 109, 114 (1984) (“Letters and other sealed packages are in the general class of effects in which the public at large has a legitimate expectation of privacy.”). However, as with the phone numbers they dial, individuals do not enjoy a reason- able expectation of privacy in what they write on the outside of an envelope. See United States v. Hernandez,
313 F.3d 1206, 1209-10 (9th Cir. 2002) (“Although a person has a legitimate interest that a mailed package will not be opened and searched en route, there can be no reasonable expectation that postal service employees will not handle the package or that they will not view its exterior” (citations omitted)). [11] Our Internet jurisprudence is instructive. In United States v. Forrester, we held that “e-mail . . . users have no expectation of privacy in the to/from addresses of their mes- sages . . . because they should know that this information is provided to and used by Internet service providers for the spe- cific purpose of directing the routing of information.” United 7020 QUON v. ARCH WIRELESS States v. Forrester,
512 F.3d 500, 510 (9th Cir. 2008). Thus, we have extended the pen register and outside-of-envelope rationales to the “to/from” line of e-mails. But we have not ruled on whether persons have a reasonable expectation of privacy in the content of e-mails. Like the Supreme Court in Smith, in Forrester we explicitly noted that “e-mail to/from addresses . . . constitute addressing information and do not necessarily reveal any more about the underlying contents of communication than do phone numbers.”
Id.Thus, we con- cluded that “[t]he privacy interests in these two forms of com- munication [letters and e-mails] are identical,” and that, while “[t]he contents may deserve Fourth Amendment protection . . . the address and size of the package do not.”
Id. at 511. [12] We see no meaningful difference between the e-mails at issue in Forrester and the text messages at issue here.6 Both are sent from user to user via a service provider that stores the messages on its servers. Similarly, as in Forrester, we also see no meaningful distinction between text messages and let- ters. As with letters and e-mails, it is not reasonable to expect privacy in the information used to “address” a text message, such as the dialing of a phone number to send a message. However, users do have a reasonable expectation of privacy in the content of their text messages vis-a-vis the service pro- vider. Cf. United States v. Finley,
477 F.3d 250, 259 (5th Cir. 2007) (holding that defendant had a reasonable expectation of privacy in the text messages on his cell phone, and that he consequently had standing to challenge the search). That Arch Wireless may have been able to access the contents of the messages for its own purposes is irrelevant. See United States v. Heckencamp,
482 F.3d 1142, 1146-47 (9th Cir. 2007) (holding that a student did not lose his reasonable expectation of privacy in information stored on his computer, despite a 6 Because Jeff Quon’s reasonable expectation of privacy hinges on the OPD’s informal policy regarding his use of the OPD-issued pagers, see infra pages 7027-29, this conclusion affects only the rights of Trujillo, Florio, and Jerilyn Quon. QUON v. ARCH WIRELESS 7021 university policy that it could access his computer in limited circumstances while connected to the university’s network); United States v. Ziegler,
474 F.3d 1184, 1189-90 (9th Cir. 2007) (holding that an employee had a reasonable expectation of privacy in a computer in a locked office despite a company policy that computer usage would be monitored). For, just as in Heckencamp, where we found persuasive that there was “no policy allowing the university actively to monitor or audit [the student’s] computer usage,”
482 F.3d at 1147, Appellants did not expect that Arch Wireless would monitor their text messages, much less turn over the messages to third parties without Appellants’ consent. [13] We do not endorse a monolithic view of text message users’ reasonable expectation of privacy, as this is necessarily a context-sensitive inquiry. Absent an agreement to the con- trary, Trujillo, Florio, and Jerilyn Quon had no reasonable expectation that Jeff Quon would maintain the private nature of their text messages, or vice versa. See United States v. Maxwell,
45 M.J. 406, 418 (C.A.A.F. 1996) (“[T]he maker of a telephone call has a reasonable expectation that police offi- cials will not intercept and listen to the conversation; how- ever, the conversation itself is held with the risk that one of the participants may reveal what is said to others.” (citing Hoffa v. United States,
385 U.S. 293, 302 (1966))). Had Jeff Quon voluntarily permitted the Department to review his text messages, the remaining Appellants would have no claims. Nevertheless, the OPD surreptitiously reviewed messages that all parties reasonably believed were free from third-party review. As a matter of law, Trujillo, Florio, and Jerilyn Quon had a reasonable expectation that the Department would not review their messages absent consent from either a sender or recipient of the text messages. [14] We now turn to Jeff Quon’s reasonable expectation of privacy, which turns on the Department’s policies regarding privacy in his text messages. We agree with the district court that the Department’s informal policy that the text messages 7022 QUON v. ARCH WIRELESS would not be audited if he paid the overages rendered Quon’s expectation of privacy in those messages reasonable. The Department’s general “Computer Usage, Internet and E-mail Policy” stated both that the use of computers “for per- sonal benefit is a significant violation of City of Ontario Poli- cy” and that “[u]sers should have no expectation of privacy or confidentiality when using these resources.” Quon signed this Policy and attended a meeting in which it was made clear that the Policy also applied to use of the pagers. If that were all, this case would be analogous to the cases relied upon by the Appellees. See, e.g., Muick v. Glenayre Elecs.,
280 F.3d 741, 743 (7th Cir. 2002) (“[Employer] had announced that it could inspect the laptops that it furnished for the use of its employ- ees, and this destroyed any reasonable expectation of privacy that [employee] might have had and so scotches his claim.”); Bohach v. City of Reno,
932 F. Supp. 1232, 1234-35 (D. Nev. 1996) (finding a diminished expectation of privacy under the Fourth Amendment where police department had issued a memorandum informing employees that messages sent on city-issued pagers would be “logged on the [department’s] network” and that certain types of messages were “banned from the system,” and because any employee “with access to, and a working knowledge of, the Department’s computer sys- tem” could see the messages); see also O’Connor,
480 U.S. at 719(noting that expectation of privacy would not be rea- sonable if the employer “had established any reasonable regu- lation or policy discouraging employees . . . from storing personal papers and effects in their desks or file cabinets”); Schowengerdt v. General Dynamics Corp.,
823 F.2d 1328, 1335 (9th Cir. 1987) (“We conclude that [the employee] would enjoy a reasonable expectation of privacy in areas given over to his exclusive use, unless he was on notice from his employer that searches of the type to which he was sub- jected might occur from time to time for work-related pur- poses.”). QUON v. ARCH WIRELESS 7023 [15] As the district court made clear, however, such was not the “operational reality” at the Department. The district court reasoned: Lieutenant Duke made it clear to the staff, and to Quon in particular, that he would not audit their pag- ers so long as they agreed to pay for any overages. Given that Lieutenant Duke was the one in charge of administering the use of the city-owned pagers, his statements carry a great deal of weight. Indeed, before the events that transpired in this case the department did not audit any employee’s use of the pager for the eight months the pagers had been in use. Even more telling, Quon had exceeded the 25,000 character limit “three or four times,” and had paid for the overages every time without anyone reviewing the text of the messages. This demonstrated that the OPD followed its “informal poli- cy” and that Quon reasonably relied on it. Nevertheless, with- out warning, his text messages were audited by the Department. Under these circumstances, Quon had a reason- able expectation of privacy in the text messages archived on Arch Wireless’s server. Appellees argue that, because Lieutenant Duke was not a policymaker, his informal policy could not create an objec- tively reasonable expectation of privacy. Moreover, Lieuten- ant Duke’s statements “were specific to his own bill- collecting practices” and were “limited to . . . an accounting audit. He did not address privacy rights.” However, as the dis- trict court pointed out, “Lieutenant Duke was the one in charge of administering the use of the city-owned pagers, [and] his statements carry a great deal of weight.” That Lieu- tenant Duke was not the official policymaker, or even the final policymaker, does not diminish the chain of command. He was in charge of the pagers, and it was reasonable for 7024 QUON v. ARCH WIRELESS Quon to rely on the policy—formal or informal—that Lieu- tenant Duke established and enforced. [16] Appellees also point to the California Public Records Act (“CPRA”) to argue that Quon had no reasonable expecta- tion of privacy because, under that Act, “public records are open to inspection at all times . . . and every person has a right to inspect any public record.” CAL GOV’T CODE § 6253. Assuming for purposes of this appeal that the text messages archived on Arch Wireless’s server were public records as defined by the CPRA,7 we are not persuaded by Appellees’ argument. The CPRA does not diminish an employee’s rea- sonable expectation of privacy. As the district court reasoned, “There is no evidence before the [c]ourt suggesting that CPRA requests to the department are so widespread or fre- quent as to constitute ‘an open atmosphere so open to fellow employees or the public that no expectation of privacy is rea- sonable.’ ” (quoting Leventhal v. Knapek,
266 F.3d 64, 74 (2d Cir. 2001) (internal quotation marks omitted)). [17] The Fourth Amendment utilizes a reasonableness stan- dard. Although the fact that a hypothetical member of the public may request Quon’s text messages might slightly diminish his expectation of privacy in the messages, it does not make his belief in the privacy of the text messages objec- tively unreasonable. See Zaffuto v. City of Hammond,
308 F.3d 485, 489 (5th Cir. 2002) (“[Defendant] also argues that the existence of Louisiana’s public records law and a depart- ment policy that calls would be taped suggests that it would not be objectively reasonable for [plaintiff] to expect privacy in making a personal phone call from work . . . . [The officers testified that] they understood the policy to mean that only calls coming into the communications room (where outside 7 The Act defines “public records” as “any writing containing informa- tion relating to the conduct of the public’s business prepared, owned, used, or retained by any state or local agency regardless of physical form or characteristics.” CAL GOV’T CODE § 6252(e). QUON v. ARCH WIRELESS 7025 citizens would call) were being recorded, not calls from pri- vate offices. A reasonable juror could conclude, on this evi- dence, that [plaintiff] expected that his call to his wife would be private, and that that expectation was objectively reason- able.”). Therefore, Appellees’ CPRA argument is without merit. 2. Reasonableness of the Search Given that Appellants had a reasonable expectation of pri- vacy in their text messages, we now consider whether the search was reasonable. We hold that it was not. The district court found a material dispute concerning the “actual purpose or objective Chief Scharf sought to achieve in having Lieutenant Duke perform the audit of Quon’s pager.” It reasoned that if Chief Scharf’s purpose was to uncover mis- conduct, the search was unreasonable at its inception because “the officers’ pagers were audited for the period when Lieu- tenant Duke’s informal, but express policy of not auditing pagers unless overages went unpaid was in effect.” The dis- trict court further reasoned, however, that if the purpose was to determine “the utility or efficacy of the existing monthly character limits,” the search was reasonable because “the audit was done for the benefit of (not as a punishment against) the officers who had gone over the monthly character limits.” Concluding that a genuine issue of material fact existed on this point, the district judge determined that this was a ques- tion for the jury. The jury found that Chief Scharf’s purpose was to “determine the efficacy of the existing character limits to ensure that officers were not being required to pay for work-related expenses,” rendering a verdict in favor of the City, the Department, Scharf, and Glenn. Given that a jury has already found that Chief Scharf’s pur- pose in auditing the text messages was to determine the effi- cacy of the 25,000 character limit, we must determine— 7026 QUON v. ARCH WIRELESS keeping that purpose in mind—whether the search was never- theless unconstitutional. A search is reasonable “at its inception” if there are “rea- sonable grounds for suspecting . . . that the search is necessary for a noninvestigatory work-related purpose such as to retrieve a needed file.” O’Connor,
480 U.S. at 726. Here, the purpose was to ensure that officers were not being required to pay for work-related expenses. This is a legitimate work- related rationale, as the district court acknowledged. [18] However, the search was not reasonable in scope. As O’Connor makes clear, a search is reasonable in scope “when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of . . . the nature of the [misconduct].”
Id.(internal quotation marks omitted). Thus, “if less intrusive methods were feasible, or if the depth of the inquiry or extent of the seizure exceeded that necessary for the government’s legitimate purposes . . . the search would be unreasonable . . . .” Schowengerdt,
823 F.2d at 1336. The district court determined that there were no less- intrusive means, reasoning that talking to the officers before- hand or looking only at the numbers dialed would not have allowed Chief Scharf to determine whether 25,000 characters were sufficient for work-related text messaging because that required examining the content of all the messages. Therefore, “the only way to accurately and definitively determine whether such hidden costs were being imposed by the monthly character limits that were in place was by looking at the actual text-messages used by the officers who exceeded the character limits.” [19] We disagree. There were a host of simple ways to ver- ify the efficacy of the 25,000 character limit (if that, indeed, was the intended purpose) without intruding on Appellants’ Fourth Amendment rights. For example, the Department could have warned Quon that for the month of September he was forbidden from using his pager for personal communica- QUON v. ARCH WIRELESS 7027 tions, and that the contents of all of his messages would be reviewed to ensure the pager was used only for work-related purposes during that time frame. Alternatively, if the Depart- ment wanted to review past usage, it could have asked Quon to count the characters himself, or asked him to redact per- sonal messages and grant permission to the Department to review the redacted transcript. Under this process, Quon would have an incentive to be truthful because he may have previously paid for work-related overages and presumably would want the limit increased to avoid paying for such over- ages in the future. These are just a few of the ways in which the Department could have conducted a search that was rea- sonable in scope. Instead, the Department opted to review the contents of all the messages, work-related and personal, with- out the consent of Quon or the remaining Appellants. This was excessively intrusive in light of the noninvestigatory object of the search, and because Appellants had a reasonable expectation of privacy in those messages, the search violated their Fourth Amendment rights. 3. Qualified Immunity for Chief Scharf Chief Scharf asserts that, even if we conclude that he vio- lated Appellants’ Fourth Amendment and California constitu- tional privacy rights, he is entitled to qualified immunity. We agree. When determining whether qualified immunity applies, we engage in the following two-step inquiry. First, we ask, “[t]aken in the light most favorable to the party asserting the injury, do the facts alleged show the officer’s conduct violated a constitutional right?” Saucier v. Katz,
533 U.S. 194, 201 (2001). If we answer this question in the affirmative, as we do here, we then proceed to determine “whether the right was clearly established.”
Id.“This inquiry . . . must be undertaken in light of the specific context of the case, not as a broad gen- eral proposition.”
Id.Specifically, “[t]he relevant, dispositive inquiry in determining whether a right is clearly established 7028 QUON v. ARCH WIRELESS is whether it would be clear to a reasonable officer that his conduct was unlawful in the situation he confronted.”
Id. at 202. Chief Scharf argues that, “[i]n 2002, there was no clearly established law from the Supreme Court or our Circuit gov- erning the right of a government employer to review text mes- sages on government-issued pagers in order to determine whether employees are engaging in excessive personal use of the pagers while on duty.” Chief Scharf misconstrues Saucier. While there may be no case with a holding that aligns per- fectly with the factual scenario presented here, it was clear at the time of the search that an employee is free from unreason- able search and seizure in the workplace. See, e.g., O’Connor,
480 U.S. at 715(1987); Schowengerdt,
823 F.2d at 1335(1987); Ortega v. O’Connor,
146 F.3d 1149, 1157 (9th Cir. 1998) (“[I]t was clearly established in 1981 that, in the absence of an accepted practice or regulation to the contrary, government employees . . . had a reasonable expectation of privacy in their private offices, desks, and file cabinets, thereby triggering the protections of the Fourth Amendment with regard to searches and seizures.”). [20] Nevertheless, we ultimately agree with Chief Scharf because, at the time of the search, there was no clearly estab- lished law regarding whether users of text-messages that are archived, however temporarily, by the service provider have a reasonable expectation of privacy in those messages. There- fore, Chief Scharf is entitled to qualified immunity. 4. Statutory Immunity on the California Constitutional Claim The City and the Department contend that they are shielded from liability on the California constitutional claim. We con- clude that the district court correctly determined that the City and the Department are not protected by statutory immunity. QUON v. ARCH WIRELESS 7029 California Government Code section 821.6 provides that “[a] public employee is not liable for injury caused by his instituting or prosecuting any judicial or administrative pro- ceeding within the scope of his employment, even if he acts maliciously and without probable cause.” “The policy behind section 821.6 is to encourage fearless performance of official duties. State officers and employees are encouraged to inves- tigate and prosecute matters within their purview without fear of reprisal from the person or entity harmed thereby.” Shoe- maker v. Myers,
2 Cal. App. 4th 1407, 1424 (1992) (citations omitted). Immunity “also extends to actions taken in prepara- tion for formal proceedings. Because investigation is an essential step toward the institution of formal proceedings, it is also cloaked with immunity.” Amylou R. v. County of Riv- erside,
28 Cal. App. 4th 1205, 1209-10 (1994) (internal quo- tation marks omitted). [21] Although Chief Scharf ordered an “investigation” in the ordinary sense of the word, the investigation never could have led to a “judicial or administrative proceeding” because Lieutenant Duke’s informal policy permitted officers to use the pagers for personal purposes and to exceed the 25,000 character limit. Thus, Quon could have committed no miscon- duct, a prerequisite for a formal proceeding against him. As such, the City’s and Department’s conduct does not fall within California Government Code section 821.6, and they are not entitled to statutory immunity. V. CONCLUSION As a matter of law, Arch Wireless is an “electronic commu- nication service” that provided text messaging service via pagers to the Ontario Police Department. The search of Appellants’ text messages violated their Fourth Amendment and California constitutional privacy rights because they had a reasonable expectation of privacy in the content of the text messages, and the search was unreasonable in scope. While Chief Scharf is shielded by qualified immunity, the City and 7030 QUON v. ARCH WIRELESS the Department are not shielded by statutory immunity. In light of our conclusions of law, we affirm in part, reverse in part, and remand to the district court for further proceedings on Appellants’ Stored Communications Act claim against Arch Wireless, and their claims against the City, the Depart- ment, and Glenn under the Fourth Amendment and California Constitution. Because we hold that Appellants prevail as a matter of law on their claims against Arch Wireless, the City, the Depart- ment, and Glenn, we need not reach their appeal from the denial of their motions to alter or amend the judgment and for a new trial under Federal Rule of Civil Procedure 59. The par- ties shall bear their own costs of appeal. AFFIRMED in part, REVERSED in part, and REMANDED for Further Proceedings.
Document Info
Docket Number: 07-55282
Filed Date: 6/18/2008
Precedential Status: Precedential
Modified Date: 10/14/2015