Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 1 of 30 Page ID #:1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 LAW OFFICE OF FRANCIS J. FLYNN, JR. Francis J. “Casey” Flynn, Jr., SBN 304712 422 S. Curson Avenue Los Angeles, California 90036 Tele: 314-662-2836 Email: casey@lawofficeflynn.com MORGAN & MORGAN COMPLEX LITIGATION GROUP John A. Yanchunis* 201 N. Franklin Street, 7th Floor Tampa, Florida 33602 Telephone: 813/223-5505 Facsimile: (813) 223-5402 jyanchunis@forthepeople.com * to seek pro hac vice admission Attorneys for Plaintiff and the putative class 15 16 17 UNITED STATES DISTRICT COURT CERNTRAL DISTRICT OF CALIFORNIA 18 19 20 21 22 23 24 25 26 27 28 JOHN BAKER ORANGE on behalf of CASE NO.: 2:19-cv-10899 himself and all others similarly CLASS ACTION situated, COMPLAINT FOR DAMAGES, EQUITABLE, DECLARATORY, Plaintiff AND INJUNCTIVE RELIEF FOR: v. (1) NEGLIGENCE (2) INVASION OF PRIVACY RING LLC and (3) BREACH OF THE IMPLIED AMAZON.COM, INC. WARRANTY OF MERCHANTABILITY (4) BREACH OF IMPLIED Defendant. CONTRACT __________ (5) UNJUST ENRICHMENT (6) VIOLATION OF THE UNFAIR COMPETITION 1 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 2 of 30 Page ID #:2 LAW (“UCL”) CAL. BUS. PROF. CODE § 17200 1 2 DEMAND FOR JURY TRIAL 3 4 5 6 7 8 9 Plaintiff John Baker Orange (“Plaintiff”), individually, by and through his undersigned counsel, brings this class action lawsuit against Ring LLC and Amazon.com, Inc. (collectively, “Defendants,” or “Ring”), on behalf of himself and all others similarly situated, and alleges, based upon information and belief and the investigation of his counsel as follows: 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 JURISDICTION AND VENUE 1. This Court has subject matter jurisdiction over this action under the Class Action Fairness Act, 28 U.S.C. § 1332(d)(2) because (a) the aggregated claims of putative class members exceeds $5 million, exclusive of interest and costs; (b) there are at least hundreds of putative class members; and (c) at least one of the members of the putative class is a citizen of a different state than Defendants. 2. This Court has personal jurisdiction over Defendants because Defendants, directly or through their agents, conduct business in the State of California and within this District. Specifically, Defendant Ring maintains headquarters in this District and operate in this District. Through their business operations in this District, Defendants intentionally avail themselves of the markets within this District to render the exercise of jurisdiction by this Court just and proper. 3. Through its business operations in this District, Defendants intentionally availed themselves of the markets within this District and have sufficient minimum contacts with this State to render the exercise of jurisdiction by this Court just and proper. 4. Venue is proper in this Court pursuant to 28 U.S.C. § 1391(a)(1) because a substantial part of the events and omissions giving rise to this action occurred in this 28 2 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 3 of 30 Page ID #:3 1 District and Ring is headquartered in this District. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 INTRODUCTION 5. Ring is a security and safety company which manufactures, markets and sells alarms, video doorbells, security systems, and cameras. At its core, Ring’s products are designed to promote the safety of its customers and to protect their privacy. 6. Wi-Fi cameras are among Ring’s most popular offerings. They are designed to be strategically placed throughout a property, enabling authorized users to see covered areas in high definition and to communicate directly with occupants via a two-way speaker-microphone system. 7. Ring promises its customers “peace of mind” with its Wi-Fi enabled smart security systems. Unfortunately, Ring’s cameras fail to deliver on its most basic promise. Lax security standards and protocols render its camera systems vulnerable to cyber-attack. Indeed, over the past several months numerous Ring customers reported that their camera systems had been hacked by malicious third parties who gained access to the video and two-way speaker-microphone system which they used to invade the privacy of customers’ homes and terrorize unsuspecting occupants, many of whom are children. 8. While Ring quickly attempted to distance itself from liability by blaming customers for failing to create strong security passwords, it is Ring who failed to provide sufficiently robust security measures such as two-factor authentication and other protocols necessary to maintain the integrity and inviolability of its cameras. As a result of Ring’s defective design, and its failure to imbue its Wi-Fi cameras with sufficient security protocols, its customers’ most basic privacy rights were violated along with the security and sanctity of their homes. 9. Plaintiff, on behalf of all others similarly situated, alleges claims for negligence, invasion of privacy, breach of implied contract, breach of implied 28 3 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 4 of 30 Page ID #:4 1 warranty and unjust enrichment. In addition, Plaintiff seeks damages, injunctive and 2 declaratory relief. 3 4 PARTIES 10. Plaintiff John Baker Orange is a resident of Jefferson County Alabama. 5 He purchased a Ring outdoor camera for his house in July 2019 for approximately 6 $249.00. The Ring camera was installed over his garage with a view of the driveway. 7 Mr. Orange purchased the Ring camera to provide additional security for him and his 8 family which include his wife and three children aged 7, 9, and 10. Recently, Mr. 9 Orange’s children were playing basketball when a voice came on through the 10 camera’s two-way speaker system. An unknown person engaged with Mr. Orange’s 11 children commenting on their basketball play and encouraging them to get closer to 12 the camera. Once Mr. Orange learned of the incident, he changed the password on the 13 Ring camera and enabled two-factor authentication. Prior to changing his password, 14 Mr. Orange protected his Ring camera with a medium-strong password. 15 11. Prior to the recent hacking incidents, Mr. Orange was unaware of and 16 believes that Ring did not provide users the ability to secure their systems with two- 17 factor authentication. 18 12. Defendant Ring LLC is a home security and smart home company that 19 manufactures a range of home security products including Wi-Fi enabled smart 20 cameras. Ring LLC is a wholly owned subsidiary of Amazon.com with its place of 21 business located at 1523 26th St, Santa Monica, California 90404. 22 13. Defendant Amazon.com Inc. is a Delaware corporation headquartered at 23 410 Terry Avenue North Seattle, Washington 98109-5210. Ring was acquired by 24 Amazon in February 2018 for an estimated value of between $1.2 billion and $1.8 25 billion. 26 27 JURISDICTION AND VENUE 14. This Court has subject matter jurisdiction over this action under the Class 28 4 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 5 of 30 Page ID #:5 1 Action Fairness Act, 28 U.S.C. § 1332(d)(2). The amount in controversy exceeds $5 2 million, exclusive of interest and costs. There are thousands of putative class 3 members, and at least some of whom have a different citizenship from Defendants. 4 15. This Court has jurisdiction over the Defendants which operate in this 5 District. Through their business operations in this District, Defendants intentionally 6 avail themselves of the markets within this District to render the exercise of 7 jurisdiction by this Court just and proper. 8 9 10 16. Venue is proper in this Court pursuant to 28 U.S.C. § 1391(a)(1) because a substantial part of the events and omissions giving rise to this action occurred in this District and Ring is headquartered in this District. 11 STATEMENT OF FACTS 12 A. Ring Products and Wi-Fi Connectivity 13 17. Ring offers a variety of Wi-Fi enabled security and safety devices, most 14 notably video doorbells and cameras. The Ring video doorbell is the company’s 15 flagship product. It is a smart doorbell that contains a high-definition camera, a 16 motion sensor, a microphone and speaker for two-way audio communication. It 17 integrates with an associated mobile app, which allows users to view real-time video 18 from the camera, receive notifications when the doorbell is rung, and communicate 19 with visitors at the door via the integrated speaker. 20 18. In 2015, Ring released the first of its internal wireless IP cameras. Like 21 the video doorbell, the cameras provide high definition video and microphone-speaker 22 functionality for two-way communication. Since 2015, Ring has expanded its 23 selection to include a range of indoor and outdoor cameras, each with video and two- 24 way audio communication. 1 25 19. Ring products are designed to operate through a users’ Wi-Fi network. 26 27 1 https://support.ring.com/hc/en-us/sections/360006380112-Indoor-Cam 28 5 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 6 of 30 Page ID #:6 1 Once connected, the cameras enable users to see a high definition video stream in the 2 camera’s range and listen to and/or communicate with nearby occupants. 3 20. Creating a Ring account to fully enable the system involves a 4 step 4 process: (1) download the Ring App; (2) Launch the app and click on the Setup 5 Device button; (3) Create an Account at the bottom of the screen; (4) Enter your first 6 and last name, email address and password. 7 21. Ring cameras are relatively affordable, easy to install, simple to use, and 8 heavily marketed by Amazon, making them one of the best-selling home security and 9 surveillance devices on the market. 10 22. In addition to their own direct-to-consumer marketing efforts, Ring has 11 signed partnership agreements with hundreds of police departments around the 12 country, many of which have marketed and sold Ring devices on the company’s 13 behalf. 14 15 23. Ring promises its customers “peace of mind” with “smart security here, there, everywhere.”2 16 At the core of Ring, and guiding every action we take, is respect for the privacy and security of our neighbors (what we call our customers). This includes giving our neighbors effective, easyto-use and affordable products and services to help protect their homes. It also means taking extremely seriously the privacy, security and control of their devices and personal information. Below you will find Ring’s guiding principles. 17 18 19 20 21 We know you have many options to choose from so protecting your privacy and data security is a job we take seriously. We know that you place a huge amount of trust in us and we have every intention of continuing to earn that trust. 3 22 23 24 25 26 2 https://shop.ring.com/pages/security-cameras 27 3 https://shop.ring.com/pages/privacy 28 6 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 7 of 30 Page ID #:7 1 24. Unfortunately, Ring does not fulfill its core promise of providing privacy 2 and security for its customers, as its camera systems are fatally flawed. The Ring 3 system is Wi-Fi enabled, meaning that it will not work without internet connectivity. 4 Once connected, however, any internet device can be seen by the on-line community, 5 making it incumbent upon its manufacturer to design the device such that it can be 6 properly secured for only intended use. This obligation is even more critical in 7 instances where the device, like the Ring camera, is related to the safety and security 8 of person and property. 9 25. Ring failed to meet this most basic obligation by not ensuring its Wi-Fi 10 enabled cameras were protected against cyber-attack. Notably, Ring only required 11 users enter a basic password and did not offer or did not compel two-factor 12 authentication. 13 26. Dual factor or two-factor authentication (“2FA”) is a security process in 14 which the user provides two different authentication factors to verify themselves to 15 better protect both the user’s credentials and the resources the user can access. 2FA 16 provides a higher level of assurance than authentication methods that depend on 17 single-factor authentication, in which the user provides only one factor -- typically a 18 password. 2FA adds an additional layer of security to the authentication process by 19 making it harder for attackers to gain access to a person’s devices or online accounts, 20 because knowing the victim’s password alone is not enough to pass the authentication 21 check. Two-factor authentication has long been used to control access to sensitive 22 systems and data, and online service providers are increasingly using 2FA to protect 23 their users’ credentials from being used by hackers who have stolen a password 24 database or used phishing campaigns to obtain user passwords.4 25 27. Ring was certainly aware of the infirmity of its cameras and the necessity 26 27 4 https://searchsecurity.techtarget.com/definition/two-factor-authentication 28 7 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 8 of 30 Page ID #:8 1 to employ good security practices which included, at a minimum, insistence on robust 2 passwords and dual factor authentication. 3 4 B. Hacking Incidents 28. Over the past several weeks, news media has been inundated with reports 5 of hackers gaining unauthorized access to homes across the country via insecure Ring 6 devices. Once in, hackers routinely terrorizing occupants, invade their privacy and 7 undermine their sense of safety and security. While the dramatic nature of these 8 hacking incidents, which involved interactions between the hackers and occupants of 9 the home, many of whom were children, caught the attention of mainstream media, 10 the insecurity of the cameras poses an additional and more looming threat. Hackers 11 who choose not to interact with occupants have gone unnoticed for days, month and 12 even years during which time they spied on occupants and their homes, gathering an 13 array of private which can subsequently be sold and used for a host of nefarious 14 purposes: 15 (a) 16 17 Mississippi Incident Pedophile Hacker Hacked 8yo Girl’s Room – Told Her That He Is Santa Claus 18 19 20 21 22 23 24 25 26 27 Parents will do anything to keep their child safe. This includes installing a CCTV inside the child’s room so that they can monitor their child while at work. However, for a couple in US, this move has caused their 8-year-old daughter to be harassed by a hacker. The mother, Ashley LeMay told CNN that she installed the camera so that she could make sure that they are OK while she’s at the overnight shift but four days after the camera was installed, a hacker managed to get through the system. From the CCTV footage, it can be seen that their daughter went into her room after hearing song being played from inside her room. Alyssa went on to ask who was playing the song and a voice came through the speaker of the camera. He said, “I’m your best friend. 28 8 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 9 of 30 Page ID #:9 1 I’m Santa Claus. Don’t you want to be my best friend?” 2 When the couple’s 8-year-old daughter, Alyssa, checked on the music and turned on the lights, a man started speaking to her, repeatedly calling her a racial slur and saying he was Santa Claus. She screamed for her mother. 5 3 4 5 “She won’t even sleep in her room,” Ms. LeMay said on Saturday. “She actually spent the night with a friend the other night because she didn’t want to be here.” “I did a lot of research on these before I got them. You know, I really felt like it was safe,” 6 7 8 A big part of Ring's marketing strategy revolves around making customers feel like their own homes are unsafe, so that they’ll turn to surveillance devices to ease those fears. 6 9 10 11 (b) Waterbury, Connecticut Incident 12 Ed Slaughter told NBC Connecticut last week that he felt “violated” after a hacker started yelling obscenities and woke up his mother-in-law, who had been sleeping in the basement where he had installed a Ring camera. 7 13 14 15 (c) 16 17 Cape Coral, Florida Incident Josefine Brown told NBC 2 that she was frightened by an episode in which a hacker could be heard in footage from a Ring security camera provided to the station asking the interracial couple if their son was a “baboon.” 18 19 20 In an email on Sunday, Ms. Brown said: “We are very 21 22 23 24 25 26 27 5 How Hackers Are Breaking Into Ring Cameras, Vice, December 11, 2009, https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ringcameras 6 https://www.worldofbuzz.com/pedophile-hacker-hacked-8yo-girls-room-cctv-in-theus-told-her-that-he-is-santa-claus/ (December 15, 2019) 7 Somebody’s Watching: Hackers Breach Ring Home Security Cameras, NY Times, December 15, 2019, https://www.nytimes.com/2019/12/15/us/Hacked-ring-homesecurity-cameras.html. 28 9 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 10 of 30 Page ID #:10 1 concerned about our safety and privacy because we thought having a security camera will keep us safe. We don’t know how long someone has been watching us. It is very scary.” Id. 2 3 (d) 4 Staten Island, New York Incident Gina Scarlato’s 13-year-old son, was terrorized by a hacker who followed the boy from camera to camera throughout the house. 8 5 6 7 (e) 8 North Texas Incident “The first thing that they heard was like a siren that went off,” said Lue Mayora of Forney. Wednesday night, while Mayora and her husband were coming home from work, someone hacked into their Ring cameras. 9 10 11 They were shouting profanities, racial slurs and threats at their 9-year-old and 11-year-old children who they said ran out of the house in terror. 12 13 “I heard real, real screaming and I came out and said what’s going on,” Mayora’s neighbor Johnny Davila said. “They said someone is in house yelling they’re going to kill us.” 14 15 16 Mayora’s neighbor got his gun and ran next door thinking someone was inside the home. 17 18 As he heard the voice coming from the camera, he eventually realized it had been hacked. 19 20 “It made me so mad that they’re targeting our kids,” he said. “They don’t want to sleep by themselves,” Mayora said. “They don’t want to be in the house.” Mayora has now deactivated her Ring cameras and said she will be getting rid 21 22 23 24 25 26 27 8 Staten Island Family’s Ring Camera Hacked, CBS News NY, December 14, 2019, https://newyork.cbslocal.com/video/4236747-staten-island-familys-ring-camerahacked/ 28 10 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 11 of 30 Page ID #:11 of them this weekend.9 1 2 (f) 3 Georgia Incident A Georgia woman was given a terrifying wake-up call by a man who hacked into her Ring security camera and began speaking to her in the middle of the night. 4 5 The woman was in bed when an unidentified man called to her through the camera, which she and her boyfriend installed to keep an eye on their new puppy, Beau, during working hours. 6 7 8 In footage of the encounter, which a friend of the woman's shared on Twitter, the stranger can be heard clapping, calling to the puppy and telling the woman to “wake up!” 9 10 11 “Hello? Hello? Come here, puppy,” he shouts. 12 “Hello? Hello?” he says after multiple ignored commands. “I can see you in the bed, come on, wake the f*** up.” 10 13 14 (g) Texas Incident 15 Ring hackers demand $350,000 in Bitcoin from Texas Couple 16 17 One of the most bizarre recent reports comes from Grand Prairie, Texas, where a couple says they awoke in the middle of the night to an alarm coming from their Ring camera. But that’s not all they heard; After the couple came to investigate, a voice over the Ring’s built-in speaker claimed that the couple’s Ring account had been terminated, and that they themselves would be “terminated” if they didn’t fork over a hefty haul of cryptocurrency. 18 19 20 21 22 23 24 25 26 27 9 North Texas Family Furious After Ring Camera Hacker Terrorizes Their Children, https://texasbreakingnews.com/breaking/texas-family-furious-ring-camera-hackerterrorizes-children/ 10 Yahoo, December 13, 2019, https://www.yahoo.com/now/woman-horrified-asstranger-wakes-her-through-ring-security-camera-200838818.html 28 11 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 12 of 30 Page ID #:12 1 The “hackers” demanded a whopping 50 bitcoins. Going by the current conversion rate, that’s over $350,000. 2 * * * 3 [W]hat makes this whole thing scary is that they also gained control over the home’s Ring doorbell. They used their access to the doorbell to spoof their presence outside of the couple’s home, making the homeowners believe that someone was actually stalking their property while demanding the ransom.11 4 5 6 7 8 C. Ring’s Response 9 29. 10 11 12 In response to the swath of hacking incidents across the country, Ring said only that it takes the security of its devices seriously, and then proceeded to blame Ring users for the hacking. “Our security team has investigated this incident and we have no evidence of an unauthorized intrusion or compromise of Ring’s systems or network,” the statement said. “Recently, we were made aware of an incident where malicious actors obtained some Ring users’ account credentials (e.g., username and password) from a separate, external, non-Ring service and reused them to log in to some Ring accounts.”12 13 14 15 16 17 30. 18 According to Ring, the hacked cameras were accessed when 19 unauthorized third parties were able to login as authentic users with a proper 20 password. Ring places the blame squarely on its customers suggesting these hacks are 21 possible because people are using weak passwords that have previously been 22 23 24 25 26 27 28 11 Ring hackers demand $350,000 in Bitcoin from Texas couple, but something so simple ruined their plot, BGR, December 12, 2019, https://bgr.com/2019/12/12/ringhackers-texas-bitcoin-privacy-security/ 12 Somebody’s Watching: Hackers Breach Ring Home Security Cameras, NY Times, December 15, 2019 12 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 13 of 30 Page ID #:13 1 compromised.13 2 31. By so doing, however, Ring ignores the fact that it allows its products – 3 whose very purpose is to provide customers with safety and security – to be setup in a 4 manner that makes it unreasonably susceptible to hacking. 5 32. Although Ring is in the business of home security and was certainly 6 aware that its Wi-Fi enabled product, was vulnerable to attack, it took no steps to 7 “require camera owners to use two-factor authentication, which could help prevent 8 these types of attacks…”14 Moreover, it knew, or should have known, in an era of 9 pervasive data breaches, that logging in with user emails instead of unique account 10 names, and not requiring at least 2FA, put its Wi-Fi enabled product at an 11 unreasonable risk of being compromised. 12 33. Not only was Ring aware that its cameras were inadequately secured, it 13 was also aware of the existence of “online forums where hackers discussed how to 14 break into Ring accounts connected to the cameras.” 15 15 34. 16 According to Motherboard, Ring was aware that the hacking community developed dedicated software for breaking into Ring security cameras. 16 Indeed, several posts on different crime forums where hackers discuss creating tools for breaking into the Ring accounts which are connected to cameras. 17 18 19 20 13 21 22 23 24 25 26 27 https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedlywatching-talking-strangers-in-home-cameras 14 Hackers are getting really good at hacking Ring cameras and the results are terrifying, Mashable, December 15, 2019, https://mashable.com/article/ring-cameraseasily-hacked-and-its-terrifying/ 15 https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedlywatching-talking-strangers-in-home-cameras 16 How Hackers Are Breaking Into Ring Cameras, Vice, December 11, 2009, https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ringcameras 28 13 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 14 of 30 Page ID #:14 1 ‘Ring Video Doorbell Config,’ one thread on a hacking forum reads. A config is a file use to drive special software for rapidly churning through usernames or email addresses and passwords and trying to use them to log into accounts. Hackers have developed configs for a wide variety of websites and online services, from Uber to Facebook. 2 3 4 5 6 The thread title adds that the config has a “High CPM,” or high “check per minute,” meaning it can test if a username and password allows access to a Ring camera quickly. In a different thread, one hacker is offering a Ring.com checker for $6.17 7 8 9 10 11 12 13 14 35. Sadly, Ring hacking events have become so common place that there is even a podcast dedicated to live and recorded hacking events wherein malevolent third parties take control of Ring devices and terrorize occupants for entertainment.18 “The NulledCast is a podcast livestreamed to Discord.19 It's a show in which hackers take over people’s Ring and Nest smart home cameras and use their speakers to talk to and harass their unsuspecting owners.” 20 “‘Sit back and relax to over 45 minutes of 15 16 17 18 How Hackers Are Breaking Into Ring Cameras, Vice, December 11, 2009, https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ringcameras 19 18 17 20 21 Hackers are taking Control of Ring Cameras and using them to taunt both adults and children, Inc., https://www.inc.com/minda-zetlin/ring-camera-hacked-hackersbitcoin-ransom-security.html 19 22 23 24 Discord is a proprietary freeware voice over internet protocol application and digital distribution platform designed for video gaming communities, that specializes in text, image, video and audio communication between users in a chat channel. As of July 2019, there are over 250 million unique users of the software. https://en.wikipedia.org/wiki/Discord_(software) 25 20 26 27 Inside the Podcast that Hacks Ring Camera Owners Live on Air, Vice, December 13, 2019, https://www.vice.com/en_us/article/z3bbq4/podcast-livestreams-hackedring-cameras-nulledcast. 28 14 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 15 of 30 Page ID #:15 1 entertainment,’ an advertisement for the podcast posted to a hacking forum called 2 Nulled reads. ‘Join us as we go on completely random tangents such as; Ring & Nest 3 Trolling, telling shelter owners we killed a kitten, Nulled drama, and more ridiculous 4 topics. Be sure to join our Discord to watch the shows live.’” 5 Slashgear: 6 21 As reported in Reality [] has taken on a frightening turn for owners of Ring security cameras who suddenly find virtual intruders in their homes, thanks to hackers who break into the security system and live stream their harassment for the entertainment of a few. 7 8 9 10 The irony is probably lost on no one that the very devices that are supposed to keep homes and their owners safe have become the very vehicle for violations of their privacy. Tools to hack Ring security cameras have unfortunately become widespread enough to become almost common. And to show off their abilities and get a few kicks, some of these hackers have taken to live streaming their activities in bold defiance to authorities. 11 12 13 14 15 22 16 36. The podcast and other online hacker forums even feature software 17 specifically designed to hack Ring cameras. The software churns through previously 18 compromised email addresses and passwords to break into Ring cameras at scale. Id. 19 37. Despite active knowledge of such forums Ring continued to blame these 20 hacking incidents on poor security practices by users. Ring contends that in each of 21 the hacking incidents, “credentials stolen during a data breach are sold on the black 22 23 24 25 26 27 21 Nulledcast: a podcast where hackers play live audio of themselves breaking into Ring cameras and tormenting their owners, BoingBoing, December 13, 2019, https://boingboing.net/2019/12/13/nulledcast.html 22 Ring camera hacking has become entertainment for some people, Slashgear, December 12, 2019, https://www.slashgear.com/ring-camera-hacking-has-becomeentertainment-for-some-people-12603149/ 28 15 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 16 of 30 Page ID #:16 1 market and used for hacking into accounts…. Due to the fact that customers often use 2 the same username and password for their various accounts and subscriptions, bad 3 actors often re-use credentials stolen or leaked from one service on other services." 4 Ring’s explanation, however, neither eliminates its responsibility, nor accurately 5 attributes the fault. As one hacking victim, Tania Amador, explained, her Ring 6 password is 21 characters long and only used for that account. 23 7 38. Moreover, “Ring’s status as a maker of home security cameras makes it 8 much more sensitive than most accounts. Ring could probably do more to encourage 9 users to choose strong passwords and set up two-factor authentication. For example, 10 Google-owned Nest recently switches to Google logins, which have industry-leading 11 security features. It also pesters people in the app to configure two-factor if they 12 haven’t already.”24 13 39. “Additionally, Ring does not alert users of attempted log-in from an 14 unknown IP address, or tell users how many others are logged into an account at 15 one time. Because of this, there is no obvious way to know whether any bad 16 actors have logged into people’s compromised Ring accounts without their 17 consent.”25 18 40. Ring’s failure to employ good security practices in the design and 19 implementation of its camera systems has directly resulted in the unlawful exposure of 20 Plaintiff and Class Members’ person and property and has damaged them thereby. 21 22 23 23 Hackers are taking Control of Ring Cameras and using them to taunt both adults and children, Inc., https://www.inc.com/minda-zetlin/ring-camera-hacked-hackersbitcoin-ransom-security.html 24 24 25 https://www.extremetech.com/internet/303296-hackers-openly-peddle-tools-tohack-ring-cameras 26 25 27 https://www.buzzfeednews.com/article/carolinehaskins1/data-leak-exposespersonal-data-over-3000-ring-camera-users 28 16 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 17 of 30 Page ID #:17 1 2 D. Plaintiff and Class Members Suffered Damages 41. The ramifications of Defendant’s failure to properly secure their cameras 3 and attendant access protocols may be felt for years to come. While the immediate in 4 terrorem effects resulting from unauthorized access may be assuaged by disconnecting 5 the camera, hackers have had access to information derived from those cameras for 6 years, including but not limited to intimate details of household members, work 7 schedules, and property contents. This information can be sold and used for a host of 8 nefarious purposes. 9 42. The hacking was a direct and proximate result of Ring’s failure to: (a) 10 properly secure its camera systems in order to prevent, or at least minimize, the ability 11 of unauthorized third parties to gain access; (b) establish and implement appropriate 12 administrative, technical, and physical safeguards to ensure the security and 13 confidentiality of their cameras; and (c) protect against reasonably foreseeable threats 14 to the security or integrity of such cameras. 15 43. Defendant had the resources necessary to properly secure its cameras but 16 neglected to do so. Had Defendant taken such steps and adopted basic security 17 measures (e.g. 2FA), it would have prevented the intrusions suffered by Plaintiff and 18 Class Members. 19 44. As a direct and proximate result of Defendants’ wrongful actions and 20 inactions, Plaintiff and Class Members have been placed at an imminent, immediate, 21 and continuing increased risk of harm from malicious third parties who gained 22 unauthorized access to their homes and highly sensitive details of their lives. 23 45. As a result of the Defendants’ actions, Plaintiff and Class Members have 24 been damages and can no longer trust the integrity of the Ring cameras or believe in 25 security it claims to provide. 26 27 CLASS ACTION ALLEGATIONS 46. Plaintiff seeks relief on behalf of herself and as representatives of all 28 17 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 18 of 30 Page ID #:18 1 others who are similarly situated. Pursuant to Fed. R. Civ. P. Rule 23(a), (b)(2), (b)(3) 2 and (c)(4), Plaintiff seeks certification of a Nationwide class defined as follows: 3 4 All persons in the United States whose purchased a Ring camera within the applicable statute of limitations periods (the “Class”).26 5 47. Excluded from the Class are Ring and any of its affiliates, parents or 6 subsidiaries; all persons who make a timely election to be excluded from the Class; 7 government entities; and the judges to whom this case is assigned, their immediate 8 families, and court staff. 9 48. Plaintiff hereby reserves the right to amend or modify the class 10 definitions with greater specificity or division after having had an opportunity to 11 conduct discovery. 12 13 49. The proposed Class meets the criteria for certification under Rule 23(a), (b)(2), (b)(3) and (c)(4). 14 50. Numerosity. Fed. R. Civ. P. 23(a)(1). Consistent with Rule 23(a)(1), 15 the members of the Class are so numerous and geographically dispersed that the 16 joinder of all members is impractical. Ring sells tens of thousands of cameras 17 throughout the United States every year. Ring has physical and/or email addresses for 18 Class Members who therefore may be notified of the pendency of this action by 19 recognized, Court-approved notice dissemination methods, which may include U.S. 20 mail, electronic mail, internet postings, and/or published notice. 21 51. Commonality. Fed. R. Civ. P. 23(a)(2) and (b)(3). Consistent with 22 Rule 23(a)(2) and with 23(b)(3)’s predominance requirement, this action involves 23 common questions of law and fact that predominate over any questions affecting 24 individual Class members. The common questions include: 25 26 27 26 Ring cameras include the Ring Indoor Cam, Stick Up Cam, Spotlight Cam, and Floodlight Cam 28 18 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 19 of 30 Page ID #:19 1 a. Whether Ring knew or should have known of the susceptibility of 2 its camera systems to hacking; 3 b. Whether Ring’s security measures to protect their camera systems 4 were reasonable; 5 c. Whether Ring was negligent in failing to implement reasonable 6 and adequate security procedures and practices; 7 d. Whether Ring’s failure to implement adequate security measures 8 rendered its camera systems subject to hacking; 9 e. Whether Plaintiff and Class Members were injured and suffered 10 damages or other losses because of Ring’s failure to reasonably 11 secure its camera systems; and; 12 13 f. Whether Plaintiff and Class members are entitled to relief. 52. Typicality. Fed. R. Civ. P. 23(a)(3). Consistent with Rule 23(a)(3), 14 Plaintiff’s claims are typical of those of other Class members. Plaintiff is a purchaser 15 of a Ring camera. Plaintiff’s damages and injuries are akin to other Class Members, 16 and Plaintiff seeks relief consistent with the relief sought by the Class. The claims of 17 the Plaintiff and the respective Class are based on the same legal theories and arise 18 from the same unlawful and willful conduct of Defendants, resulting in the same 19 injury to the Plaintiff and the respective Class. Plaintiff and all members of the Class 20 are similarly affected by Defendants’ wrongful conduct and were damaged in the 21 same way. Plaintiff’s interests coincide with, and are not antagonistic to, those of the 22 other Class members. Plaintiff have been damaged by the same wrongdoing set forth 23 in this Complaint. Plaintiff’s damages and injuries are akin to other Class Members, 24 and Plaintiff seeks relief consistent with the relief sought by the Class. 25 53. Adequacy. Fed. R. Civ. P. 23(a)(4). Consistent with Rule 23(a)(4), 26 Plaintiff is an adequate representative of the Class because Plaintiff is a member of the 27 Class he seeks to represent; is committed to pursuing this matter against Ring to 28 19 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 20 of 30 Page ID #:20 1 obtain relief for the Class; and has no conflicts of interest with the Class. Moreover, 2 Plaintiff’s Counsel are competent and experienced in litigating class actions, including 3 privacy litigation of this kind. Plaintiff intends to vigorously prosecute this case and 4 will fairly and adequately protect the Class’s interests. 5 54. Superiority. Fed. R. Civ. P. 23(b)(3). Consistent with Rule 23(b)(3), a 6 class action is superior to any other available means for the fair and efficient 7 adjudication of this controversy, and no unusual difficulties are likely to be 8 encountered in the management of this class action. The quintessential purpose of the 9 class action mechanism is to permit litigation against wrongdoers even when 10 damages to an individual plaintiff may not be sufficient to justify individual 11 litigation. Here, the damages suffered by Plaintiff and the Class are relatively small 12 compared to the burden and expense required to individually litigate their claims 13 against Ring, and thus, individual litigation to redress Ring’s wrongful conduct 14 would be impracticable. Individual litigation by each Class member would also strain 15 the court system. Individual litigation creates the potential for inconsistent or 16 contradictory judgments and increases the delay and expense to all parties and the 17 court system. By contrast, the class action device presents far fewer management 18 difficulties and provides the benefits of a single adjudication, economies of scale, and 19 comprehensive supervision by a single court. 20 55. Injunctive and Declaratory Relief. Class certification is also 21 appropriate under Rule 23(b)(2) and (c). Defendants, through their uniform conduct, 22 acted or refused to act on grounds generally applicable to the Class as a whole, 23 making injunctive and declaratory relief appropriate to the Class as a whole. 24 56. Likewise, particular issues under Rule 23(c)(4) are appropriate for 25 certification because such claims present only particular, common issues, the 26 resolution of which would advance the disposition of this matter and the parties’ 27 interests therein. 28 20 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 21 of 30 Page ID #:21 1 57. Ascertainability. Finally, all members of the proposed Classes are 2 readily ascertainable. Ring has access to customer names and addresses. 3 Additionally, Ring videos contain hidden geographic coordinates, including latitude 4 and longitude with up to six decimal points of precision.27 Using this information, 5 Class Members can be identified and ascertained for the purpose of providing notice. 6 FIRST CAUSE OF ACTION NEGLIGENCE 7 58. 8 9 Plaintiff realleges and incorporates by reference each preceding paragraph as though set forth at length herein. 59. 10 Defendants had full knowledge of the purpose for which its security 11 cameras were being used and the sensitivity of the people and things the cameras were 12 designed to secure and protect. Defendants also knew the types of harm that Plaintiff 13 and Class Members could and would suffer if the integrity of the cameras were 14 compromised. 60. 15 Defendants had a duty to exercise reasonable care in ensuring their 16 cameras were secure, safe to use and inviolable by unauthorized parties. This duty 17 includes, among other things, ensuring that reasonable and proper protocols and 18 safeguards are in place, so that the Wi-Fi enabled cameras are not easily compromised 19 by unauthorized users. 61. 20 Plaintiff and Class Members were the foreseeable and probable victims 21 of any inadequate security practices and procedures. Defendants knew of or should 22 have known of the inherent risks of allowing Ring cameras to be set up and used 23 without adequate security protocols and safeguards. 62. 24 Defendants’ own actions and inactions created a foreseeable risk of harm 25 26 27 27 See, https://www.dailymail.co.uk/news/article-7785293/Sprawling-map-showshomeowners-Ring-police-access-data.html 28 21 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 22 of 30 Page ID #:22 1 to Plaintiff and Class Members. Defendants’ misconduct included, but was not limited 2 to, its failure to sell cameras with sufficiently robust security protocols to prevent 3 unauthorized users from gaining access to the cameras and to provide users with 4 sufficient instructions and tools to properly secure their Wi-Fi enabled cameras. 5 63. Plaintiff and the Class Members had no idea Ring cameras were 6 vulnerable to misappropriated and therefore had not ability to properly protect their 7 cameras from unauthorized use. 8 9 10 64. In contrast, Defendants were in a position to protect against the harm suffered by Plaintiff and Class Members and had a duty to do so. 65. Defendants, through their actions, unlawfully breached their duty to 11 Plaintiff and Class Members by failing to ensure their cameras and set up procedures 12 were sufficiently robust to protect against unauthorized use. 13 66. But for Defendants’ wrongful and negligent breach of duties owed to 14 Plaintiff and Class Members, Plaintiff’s and Class Members’ would not have used or 15 purchased a product that is so readily compromised. 16 67. As a result of Defendants’ negligence, Plaintiff and the Class Members 17 have suffered and will continue to suffer damages and injury including, but not limited 18 to: the cost of replacement cameras; cost of additional surveillance and protective 19 devices and services; time spent monitoring, addressing 20 consequences of the exposure enabled by Ring; and the necessity to engage legal 21 counsel and incur attorneys’ fees, costs and expenses. 22 SECOND CAUSE OF ACTION INVASION OF PRIVACY 23 24 25 26 27 the current and future 68. Plaintiff realleges and incorporates by reference each preceding paragraph as though set forth at length herein. 69. Plaintiff and Class Members had a legitimate expectation of privacy with respect to the people, location and subject matter of what their Ring cameras were 28 22 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 23 of 30 Page ID #:23 1 observing and were accordingly entitled to the protection of this information against 2 disclosure to unauthorized third parties. 3 70. Defendants owed a duty to their customers, including Plaintiff and Class 4 Members, and the general public to ensure that its cameras and the data they observed 5 and recorded remained confidential and secure. 6 71. The failure to ensure the cameras had sufficiently robust security features 7 and were accompanied by sufficient security practices is highly offensive to a 8 reasonable person. 9 72. The intrusion was into a place or thing, which was private and is entitled 10 to be private. Plaintiff and Class Members purchased and used Ring cameras with the 11 expectation that people, places and information seen and heard by the camera would 12 be private and would not be subject to disclosure without their authorization. 13 73. The failure to ensure the camera and its setup features provided adequate 14 security constitutes an intentional interference with Plaintiff and Class Members’ 15 interest in solitude or seclusion, either as to their persons or as to their private affairs 16 or concerns, of a kind that would be highly offensive to a reasonable person. 17 74. Defendants acted with a knowing state of mind when they permitted the 18 cameras to be marketed and sold in such a fashion because they knew their security 19 practices were inadequate. 20 21 22 75. Acting with this knowledge, Defendants had notice and knew that their inadequate security practices would cause injury to Plaintiff and Class Members. 76. As a proximate result of Defendants’ acts and omissions, Plaintiff’s and 23 Class Members’ privacy was violated causing Plaintiff and Class Members to suffer 24 damages. 25 77. Unless and until enjoined, and restrained by order of this Court, 26 Defendant’s wrongful conduct will continue to cause great and irreparable injury to 27 Plaintiff and Class Members. 28 23 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 24 of 30 Page ID #:24 1 78. Plaintiff and Class Members have no adequate remedy at law for the 2 injuries in that a judgment for monetary damages will not end the invasion of privacy 3 for Plaintiff and the Class. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 THIRD CAUSE OF ACTION BREACH OF THE IMPLIED WARRANTY OF MERCHANTABILITY 79. Plaintiff realleges and incorporates by reference each preceding paragraph as though set forth at length herein. 80. Defendants are in the business of manufacturing, designing, supplying, marketing, advertising, warranting, and selling security cameras. Defendants impliedly warranted to Plaintiff and Class Members that the Product was of a certain quality, free from defects, fit for the ordinary purpose of observing and recording events for the purpose of securing property and maintaining safety of its residents. 81. The Ring cameras were and are unfit for ordinary use and not of merchantable quality as warranted by Defendants because the Products are defective in that they are not secure and can easily be hacked by unauthorized third parties. Before purchase, Plaintiff and Class Members could not have readily discovered that the cameras were not merchantable for use to protect their homes and occupants. 82. Defendants have failed to provide adequate remedies under their limited warranty, which have caused that warranty to fail of its essential purpose, thereby permitting remedies under these implied warranties. 83. Defendants had unequal bargaining power and misrepresented the Products’ reliability and performance properties, and the limited remedies unreasonably favor Defendants and fail Plaintiff’s reasonable expectations for product performance. 84. As a direct and proximate result of the breaches of these implied warranties, Plaintiff and Class Members suffered damages, injuries in fact and 27 28 24 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 25 of 30 Page ID #:25 1 ascertainable losses in an amount to be determined at trial, including repair and 2 replacement costs and damages to other property. FOURTH CAUSE OF ACTION BREACH OF IMPLIED CONTRACT 3 4 5 6 7 8 9 10 11 85. Plaintiff realleges and incorporates by reference each preceding paragraph as though set forth at length herein. 86. Defendants sold Ring cameras to Plaintiff and Members of the Class for which they received a benefit in the form of monetary payment. 87. Defendants have acknowledged the benefit and accepted or retained the benefit conferred. 88. Implicit in the agreement between the Defendants and Plaintiff and Class 12 Members was to provide cameras that were suitable for their purpose and not designed 13 with flaws that render them vulnerable to hacking resulting in the compromise of user 14 safety and security. 15 89. Without such implied contracts, Plaintiff and Class Members would not 16 have paid for and conferred a benefit upon Defendants, but rather chosen one of the 17 numerous alternative cameras that were available to them and which did not present a 18 hidden safety risk. 19 20 21 90. Plaintiff and Class Members fully performed their obligations under the implied contracts with Defendants, however, Defendants did not. 91. Defendants breached the implied contracts with Plaintiff and Class 22 Members by failing to acknowledge the inherent vulnerability in their cameras. These 23 circumstances are such that it would be inequitable for Defendants to retain the benefit 24 received. 25 92. As a direct and proximate result of Defendants’ breach of their implied 26 contracts with Plaintiff and Class Members, Plaintiff and Class Members have 27 suffered and will suffer injury, including but not limited to: the cost of replacement 28 25 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 26 of 30 Page ID #:26 1 cameras; the cost of additional surveillance and protective devices and services; and 2 time spent monitoring, addressing 3 exposure enabled by Ring. 4 FIFTH CAUSE OF ACTION UNJUST ENRICHMENT 5 6 7 8 9 10 11 the current and future consequences of the 93. Plaintiff realleges and incorporates by reference each preceding paragraph as though set forth at length herein. 94. As the intended and expected result of their conscious wrongdoing, Defendants have profited and benefited from the purchase of the Product by Plaintiff and the Class. 95. Defendants have voluntarily accepted and retained these profits and 12 benefits, with full knowledge and awareness that, as a result of Defendants’ 13 misconduct, Plaintiff and the Class did not receive Product of the quality, nature, 14 fitness, or value that had been represented by Defendants, and that reasonable 15 consumers expected. 16 17 18 19 96. Defendants have been unjustly enriched by their fraudulent and deceptive withholding of benefits to Plaintiff and the Class at the expense of these parties. 97. Equity and good conscience militate against permitting Defendants to retain these profits and benefits. 20 As a direct and proximate result of Defendants’ unjust enrichment, Plaintiff and 21 Class Members suffered injury and seek an order directing Defendants’ disgorgement 22 and the return to Plaintiffs and the classes of the amount each improperly paid to 23 Defendants. 24 25 26 SIXTH CAUSE OF ACTION VIOLATION OF CALIFORNIA’S UNFAIR COMPETITION LAW (“UCL”) Cal. Bus. Prof. Code § 17200 27 28 26 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 27 of 30 Page ID #:27 1 2 3 98. Plaintiff realleges and incorporates by reference each preceding paragraph as though set forth at length herein. 99. Plaintiff has standing to pursue this cause of action as Plaintiff has 4 suffered injury in fact and has lost money or property as a result of Defendants’ 5 actions as delineated herein. 6 100. The UCL defines unfair business competition to include any “unlawful, 7 unfair or fraudulent” act or practice, as well as any “unfair, deceptive, untrue or 8 misleading” advertising. Cal. Bus. Prof. Code § 17200. 9 10 11 12 13 14 101. A business act or practice is “unlawful” if it violates any established state or federal law. 102. Defendants’ business practices, as alleged herein, violate the “unlawful” prong by: (a) breaching implied warranty of merchantability as to purchasers of the Ring camera; 15 (b) By engaging in negligent acts and practices by failing to take one or more 16 acts when it should have acted or by taking one or more affirmative actions 17 that it should not have taken as described herein; 18 (c) By violating the Privacy 19 https://shop.ring.com/pages/privacy-notice 20 misrepresentations and/or omissions of fact; Policy and/or available at engaging in 21 (d) By violating the FTC; 22 (e) By being unjustly enriched; 23 (f) By knowingly and intentionally concealing from Plaintiff and the Class 24 25 26 27 material information; and/or (g) By breaching an implied contract (e.g., Privacy Policy available at https://shop.ring.com/pages/privacy-notice) (h) By violating other common or statutory law. 28 27 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 28 of 30 Page ID #:28 1 103. Defendants’ business practices, as alleged herein, violate the “unfair” 2 prong of California Business & Professions Code §§ 17200, et seq. Defendants’ 3 business practices are unfair business practice under the UCL because they “either 4 ‘offend[] an established public policy’ or [are] ‘immoral, unethical, oppressive, 5 unscrupulous or substantially injurious to consumers.’” Evenchik v. Avis Rent A Car 6 Sys., LLC, 2012 WL 4111382, at *8 (S.D. Cal. Sept. 17, 2012) (quoting McDonald v. 7 Coldwell Banker, 543 F.3d 498, 506 (9th Cir.2008) (quoting People v. Casa Blanca 8 Convalescent Homes, Inc., 159 Cal.App.3d 509, 530, 206 Cal.Rptr. 164 (1984)). 9 104. A business act or practice is also, “unfair” under the Unfair Competition 10 Law if the reasons, justifications, and motives of the alleged wrongdoer are 11 outweighed by the gravity of the harm to the alleged victims. The injury resulting 12 from Defendants’ acts and practices is substantial, not outweighed by any 13 countervailing benefits to consumers or to competition, and not an injury that the 14 consumers themselves could reasonably have avoided. 15 105. Defendants’ business practices, as alleged herein, also violate the 16 “unfair” prong of the UCL because Defendant (a) misrepresented the source, 17 sponsorship, approval, or certification of goods or services; (b) represented that goods 18 or services have sponsorship, approval, characteristics, ingredients, uses, quantities 19 that they did not have or that a person has a sponsorship, approval, status, affiliation, 20 or connection that he or she does not have; (c) representing that goods or services are 21 of a particular standard, quality, or grade […] if they are of another; (d) advertising 22 goods or services with intent not to sell them as advertised; (e) representing that a 23 transaction confers or involves rights, remedies, or obligations that it does not involve, 24 or that are prohibited by law; (f) representing that the subject of a transaction has been 25 supplied in accordance with a previous representation when it has not; and/or (g) 26 inserting an unconscionable provision in a contract. 27 106. As a direct and proximate result of Defendants’ unlawful and unfair, 28 28 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 29 of 30 Page ID #:29 1 business practices, Plaintiff and the Class have suffered injury in fact and lost money 2 or property. 3 107. The basis for Plaintiff’s claims emanated from California as one or more 4 decisions regarding security regarding the Ring cameras occurred at the Ring 5 Headquarters. Additionally, Ri*ng LLC claims that “if you have any questions about 6 this Privacy Notice, or if you would like us to update information we have about you, 7 change your preferences or exercise other applicable data protection rights, please 8 contact us by e-mail at privacy@ring.com or write to us at: Ring LLC 1523 26th Street 9 Santa Monica, CA 90404.” 10 11 12 PRAYER FOR RELIEF WHEREFORE, Plaintiff, on behalf of herself and all others similarly situated, respectfully requests the following relief: 13 14 a. An Order certifying this case as a class action; 15 b. An Order appointing Plaintiff as the class representative; 16 c. An Order appointing undersigned counsel as class counsel; 17 d. A mandatory injunction directing the Defendant to hereinafter 18 adequately safeguard the PII of the Class by implementing 19 improved security procedures and measures; 20 e. An award of damages; 21 f. An award of costs and expenses; 22 g. An award of attorneys’ fees; and 23 h. Such other and further relief as this court may deem just and 24 proper. 25 DEMAND FOR JURY TRIAL 26 Plaintiff demands a jury trial as to all issues triable by a jury. 27 28 29 CLASS ACTION COMPLAINT Case 2:19-cv-10899 Document 1 Filed 12/26/19 Page 30 of 30 Page ID #:30 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Dated: December 26, 2019 Respectfully submitted, /s/ Francis J. Flynn, Jr. LAW OFFICE OF FRANCIS J. FLYNN, JR. Francis J. “Casey” Flynn, Jr., SBN 304712 422 S. Curson Avenue Los Angeles, California 90036 Tele: 314-662-2836 Email: casey@lawofficeflynn.com MORGAN & MORGAN COMPLEX LITIGATION GROUP John A. Yanchunis (FL Bar No. 324681) * 201 N. Franklin St., 7th Floor Tampa, FL 33602 Telephone: (813) 223-5505 Facsimile: (813) 222-2434 jyanchunis@forthepeople.com * to seek pro hac vice admission 15 16 Attorneys for Plaintiff and the Putative Class 17 18 19 20 21 22 23 24 25 26 27 28 30 CLASS ACTION COMPLAINT