Perkins v. Linkedin Corp.

ORDER GRANTING IN PART AND DENYING IN PART DEFENDANT’S MOTION TO DISMISS WITH LEAVE TO AMEND

LUCY H. KOH, United States District Judge

Paul Perkins, Pennie Sempell, Ann Brandwein, Erin Eggers, Clare Connaugh-ton, Jake Kushner, Natalie Richstone, Nicole Crosby, and Leslie Wall, on behalf of themselves and a putative class (“Plaintiffs”), bring the instant action against Linkedln Corporation (“Defendant” or “Linkedln”). See ECF No. 7. The gravamen of Plaintiffs’ complaint is that Defendant, the operator of a popular social networking website, violated several state and federal laws by harvesting email addresses from the contact lists of email accounts associated with Plaintiffs’ Linkedln accounts and by sending repeated invitations to join Linkedln to the harvested email addresses. See id. ¶ 2. Defendant filed a Motion to Dismiss the operative complaint, the First Amended Complaint (“FAC”). See ECF No. 17. The Motion is fully briefed, see ECF Nos. 24, 30, and the Court held a hearing on the Motion, see ECF No. 44 (“Tr.”). Having considered the briefing, applicable law, and the oral arguments presented at the hearing, the Court GRANTS IN PART and DENIES IN PART Defendant’s Motion. The Court also grants Plaintiffs leave to amend the FAC to cure deficiencies identified in this Order.

I. BACKGROUND

A. Factual Allegations

Linkedln is a social networking website geared toward professional networking with more than 200 million users. ECF No. 7 ¶¶ 22-23. Users, who maintain resume-like profiles, utilize Linkedln to view each other’s profiles and to exchange messages. This case centers around one portion of the process that a user must complete to sign up for a Linkedln account. Specifically, Plaintiffs, nine Linkedln users who seek to represent a nationwide class of Linkedln users, allege that during the sign-up process, Defendant harvests the email addresses of Plaintiffs’ contacts. *1196The Court begins by describing the sign-up process that is challenged. The Court then turns to the internal policies that Linkedln allegedly violates through this sign-up process and user complaints about the process. The Court then concludes this section with a description of the harm that the challenged process allegedly inflicts on Plaintiffs.

When a new member signs up for Link-edln, the website prompts her to provide her first name, last name, email address, and a password. Id., Fig. 1 (which is below). Below the prompts for this information is a button titled “Join Linkedln,” adjacent to which is an asterisk. Id. The asterisk points to a line at the bottom of a page that states that “[b]y joining Linked-ln, you agree to Linkedln’s User Agreement, Privacy Policy, and Cookie Policy.” Id. ¶ 26.

[[Image here]]

After a user clicks the “Join Linkedln” button, she is directed to a second page, which states “let’s start creating your professional profile.” Id., Fig. 2 (which is below). This page asks the user to provide Linkedln with her country of residence, ZIP code, employment status, job title, and industry. Id. Below these fields js a button titled “Create my profile.” Id.

[[Image here]]

A user who clicks the “Create my profile” button is directed to a page that states “Grow your network on Linkedln.” Id., Fig. 3 (which is below). On this page, the user is told to “Get started by adding your email address,” under which the field *1197for ‘Tour email” is pre-populated with the user’s email address, which the user already provided to Linkedln on the first screen, which is Figure 1. Id. ¶ 30. The “Grow your network on Linkedln” page has a button for “Continue” under the pre-populated email field. Id., Fig. 3 (which is below). Under the “Continue” button is a statement that reads “We will not store your password or email anyone without your permission.” Id. Further, under that statement is an option to “Skip this step.” Id.

[[Image here]]

A user who clicks “Continue” and who used an email address from Google’s Gmail system is led to a screen from Google Accounts.1 See id., Fig. 4 (which is below). This page states that “Linkedin.com is asking for some information from your Google Account” and then lists the user’s email address. Id. The page then contains two bullet points. The first bullet point states “Email address” and contains the email address of the user. Id. The second bullet point states “Google Contacts.” Id. The user then has the option of choosing between “Allow” and “No thanks,” and the buttons for each are equally sized and are equally prominent. Id.

*1198[[Image here]]

A user who chooses “Allow” then proceeds to a screen titled “Connect with people you know on Linkedln.”2 See ECF No. 18-2, Ex. F (which is labeled as Figure 5 below). This page contains a list of the users’ contacts who are already on Linkedln titled “people you know on Link-edln.” Id: Linkedln provides this list by matching the users’ contacts’ email addresses, which Linkedln has collected from Google, against Linkedln’s own membership database, which contains email addresses that Linkedln users utilized to register for Linkedln accounts. The page contains images and job titles of email contacts of the user who have a Linkedln account, with check boxes next to their names. Id. The boxes are all checked by default. Id. The user can then choose between two options: “Add Conneetion(s)” or “Skip this step.” Id.

[[Image here]]

After the page containing contacts who already have a Linkedln account, the user is directed to a page titled “Why not invite *1199some people?”3 Id., Fig. 5 (which is labeled as Figure 6 below). Below the heading on this page is the following statement: “Stay in touch with your contacts who aren’t on Linkedln yet. Invite them to connect with you.” Id. Below that statement is a list of the user’s email contacts (names and email addresses) who are not already registered on Linkedln. Id. There is a checkbox next to each, and the “Select All” box is checked by default. Id. While only the first ten appear, there is a scroll bar, indicating that additional entries lay below. Id. Furthermore, next to the “Select All” box is a statement of the total number of contacts selected. Id. The screenshot in the FAC, for example, states “1132 Selected.” Id. At the bottom of the page, the user could choose between “Add to Network” or “Skip this step.” Id.

[[Image here]]

If a user chooses the “Add to Network” option, Linkedln sends an email to all of the email addresses affiliated with the checked boxes. Id. ¶44. The emails, to which Plaintiffs refer in the FAC as “endorsement emails,” come from the user’s name via Linkedln and contain the following text: “I’d like to add you to my professional network.” Id., Fig. 7 (which is below).4 This text is followed by a signature line that contains the Linkedln user’s name. Id. Below this is a button that says “Accept.” Id. If one week after receiving an- endorsement email, the recipient has not joined Linkedln, Linkedln sends a follow-up email with the same message. Id. ¶ 46. If after a second week, the recipient of the endorsement email still has not *1200joined Linkedln, Linkedln sends a third email with the same message. Id. In the FAC, Plaintiffs alleged that “[e]ach of the reminder emails contain the Linkedln member’s name and likeness so as to give the recipient the impression that the Link-edln member is endorsing Linkedln and asking the recipient to join Linkedln’s social network.” Id. ¶ 41. However, at the hearing on the instant Motion, Plaintiffs clarified that only users’ names—not likenesses—appeared in the endorsement emails. Tr. 26:13-14.

[[Image here]]

Plaintiffs allege that once this process has been set into motion, it is nearly impossible to stop Linkedln from sending the reminder endorsement emails. Specifically, Plaintiffs allege that “[t]he only way a Linkedln user can stop the two follow-up endorsement emails (assuming the user found out about the initial emails in the first place) from going out to the email addresses harvested from that user’s external email account is for the user to individually open up each invitation from within his or her Linkedln account (which Linkedln has intentionally made difficult to find within the user’s account) and click a button that allows the user to withdraw that single invitation.” Id. ¶ 50. Plaintiffs allege that there is no mechanism by which users can withdraw all endorsement emails at once. Id. Accordingly, Plaintiffs allege that it would take hours to prevent Link-edln from sending the repeated endorsement emails to the hundreds or thousands of contacts a user may have. Id. Plaintiffs further allege that Linkedln does not take prompt remedial action when users contact Linkedln regarding stopping the endorsement emails. Id.

Plaintiffs allege that Defendant’s harvesting of email addresses and sending of endorsement emails is contrary to several of Defendant’s own policies. More specifically, in the FAC, Plaintiffs point to the following Linkedln statements, to which Plaintiffs contend the harvesting and emailing practices are contrary:

• Linkedln’s statement on the screen on which it seeks a user’s email address to trigger the identification of existing contacts on Linkedln or invitation of further contacts: “We will not store your password or email anyone without your permission.” Id. ¶¶47, 48; see also id., Fig. 3.
• Linkedln’s statements in blog posts that “we are committed to putting our members first. This means being open about how we use and protect the data that you entrust with us as a Linkedln member”; “Ensuring more privacy and control over your personal data remains our highest priority”; and “Ensuring you more clarity and consistency and control *1201over your personal data continues to be our highest priority.” Id. ¶ 47.
• A Linkedln blog post titled “How to Report Abusive Behavior on Linked-ln,” in which Linkedln states that examples of abusive behavior in violation of Linkedln’s terms of service include “examples such as not using a real name/person as the profile owner, falsifying info, creating fake profiles, trying to use someone else’s account, massively inviting people they don’t know, and using the data in a way not authorized or intended by Linkedln’s Terms of Service. This behavior, though infrequent, strikes at the very root of a trusted professional network. We take these violations very seriously and will not tolerate this behavior.” Id,5
• Two sentences from Linkedln’s Privacy Policy: (1) “You decide how much or how little you wish to communicate to individuals or groups” and (2) “We do not rent, sell, or otherwise provide your personally identifiable information to third parties without your consent unless compelled by law.” Id. ¶ 48.

Plaintiffs also point to a number of postings by users on Linkedln’s Help Center pages complaining about the harvesting and endorsement email processes to contend that Linkedln knew about flaws in its process but nevertheless took no action. See id. ¶¶ SI, 33, 36, 41, 49, 50, 58. In an extended message thread on Linkedln’s Help Center, one user described Linked-ln’s process as “deceptive, misleading and purposely vague,” while another stated that she was “extremely upset at the repercussions” of Linkedln’s “hacking.” Id. ¶ 31. Another user on that message board thread states “Linkedln should stop the spammy practices of sending out invitations to people’s address book without their explicit request to do so.” Id. ¶ 41. Yet another user states: “at this point I’m finding Linkedln more of a problem in terms of hurting my reputation rather than helping it. What’s more the invitations are NOT people in my address book. They are people I don’t know. I find this entire issue extremely unprofessional on Li’s part. You would think with all these members with the same problem LI would respond with a fix.” Id. ¶ 50.

In the FAC, Plaintiffs set forth a number of theories regarding how Linkedln’s sign up process allegedly injures Plaintiffs. First, Plaintiffs allege the endorsement emails are valuable to Linkedln. Specifically, Plaintiffs note that attracting new members to Linkedln is integral to Link-edln’s business model (as Linkedln actively advertises its size), and that endorsement emails are a critical component of attracting these new members. Id. ¶¶ 51-54. Plaintiffs quote Reid Hoffman, the co-founder and Chairman of Linkedln, who stated “it’s the connection with the individual that I think leads to the growth rate.” Id. ¶35. Plaintiffs suggest that in the absence of the endorsement email program, Linkedln would have to pay for email addresses to advertise and promote Linkedln’s services. Id. ¶ 57. Second, Plaintiffs note that Linkedln charges its users $10 to send a Linkedln message (known as InMail) to Linkedln users to whom the sender is not connected. Id. ¶ 55. Plaintiffs rely on this to suggest that “[t]he email addresses that Linkedln takes from its users and uses to promote its *1202service (using the name of the Linkedln user) have value to a user.” Id. Third, Plaintiffs note that the increased membership that results from the endorsement emails further benefits Linkedln by expanding the market to which Linkedln can advertise its Premium Membership program, which costs $39.95 to $49.95 per month. Id. ¶ 56.

B. Procedural History

Plaintiffs filed a class action complaint on September 17, 2013. See ECF No. 1. On October 2, 2013, Plaintiffs amended their complaint and filed the FAC that is the subject of the instant Motion. See ECF No. 7. The FAC contains five causes of action: (1) violation of California’s common law right of publicity; (2) violation of California’s Unfair Competition Law (“UCL”), Cal. Bus. & Prof.Code § 17200; (3) violation of the Stored Communications Act (“SCA”), 18 U.S.C. § 2701; (4) violation of the Wiretap Act, 18 U.S.C. § 2511; and (5) violation of California’s Comprehensive Data Access and Fraud Act (“Section 502”), CaLPenal Code § 502. See id.

On December 6, 2013, Defendant filed a Motion to Dismiss and an accompanying Request for Judicial Notice. See ECF Nos. 17-18. On January 13, 2014, Plaintiffs filed an Opposition and an accompanying Request for Judicial Notice. See ECF Nos. 24-25. On January 31, 2014, Defendant filed a Reply. See ECF No. 30. The Court held a hearing on April 10, 2014. See Tr.

While the instant Motion to Dismiss was pending, the parties had a discovery dispute regarding taking the deposition of Mr. Hoffman, Linkedln co-founder and Chairman. Specifically, the parties vigorously disputed in their Requests for Judicial Notice, whether certain quotes of Mr. Hoffman in the FAC and in the Opposition to the instant Motion had been taken out of context. Accordingly, Plaintiffs sought a deposition of Mr. Hoffman. The parties submitted a Discovery Dispute Joint Report to Magistrate Judge Lloyd wherein Linkedln sought a protective order under the apex doctrine (which requires a showing of particular knowledge and exhaustion of alternative means before officials of the highest level of corporate management can be deposed under some circumstances) to prevent the deposition of Mr. Hoffman. See ECF No. 34. Judge Lloyd ordered the parties to further meet and confer because Judge Lloyd found that the parties’ discussion described in the Joint Report was inadequate. See ECF No. 35. After this further meet and confer, the parties reached a stipulation. See ECF No. 36. Pursuant to the stipulation, Link-edln agreed not to dispute the authenticity or accuracy of the quotes of Mr. Hoffman in the FAC and the Opposition to the instant Motion for the purposes of the instant Motion, and Plaintiffs agreed to withdraw the deposition notice for Mr. Hoffman. Id. The parties reserved their rights with respect to any future challenges to the accuracy of Mr. Hoffman’s quotations and any future deposition of Mr. Hoffman. See id.

II. LEGAL STANDARDS

A. Motion to Dismiss under Rule 12(b)(1)

A defendant may move to dismiss an action for lack of subject matter jurisdiction pursuant to Federal Rule of Civil Procedure 12(b)(1). A motion to dismiss for lack of subject matter jurisdiction will be granted if the Complaint on its face fails to allege facts sufficient to establish subject matter jurisdiction. See Savage v. Glendale Union High Sch., 343 F.3d 1036, 1039 n. 2 (9th Cir.2003). In considering a Rule 12(b)(1) motion, the Court “is not restricted to the face of the pleadings, but *1203may review any evidence, such as affidavits and testimony, to resolve factual disputes concerning the existence of jurisdiction.” McCarthy v. United States, 850 F.2d 558, 560 (9th Cir.1988). -If the plaintiff lacks standing under Article III of the U.S. Constitution, then the Court lacks subject matter jurisdiction, and the case must be dismissed. See Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 101— 02, 118 S.Ct. 1003, 140 L.Ed.2d 210 (1998). Once a party has moved to dismiss for lack of subject matter jurisdiction under Rule 12(b)(1), the opposing party bears the burden of establishing the Court’s jurisdiction, see Chandler v. State Farm Mut. Auto. Ins. Co., 598 F.3d 1115, 1122 (9th Cir.2010), by putting forth “the manner and degree of evidence required” by whatever stage of the litigation the case has reached, Lujan v. Defenders of Wildlife, 504 U.S. 555, 561, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992); see also Barnum Timber Co. v. Envtl. Prot. Agency, 633 F.3d 894, 899 (9th Cir.2011) (at the motion to dismiss stage, Article III standing is adequately demonstrated through allegations of “specific facts plausibly explaining” why the standing requirements are met).

B. Motion to Dismiss under Rule 12(b)(6)

Pursuant to Federal Rule of Civil Procedure 12(b)(6), a defendant may move to dismiss an action for failure to allege “enough facts to state a claim to relief that is plausible on its face.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007). “A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged. The plausibility standard is not akin to a ‘probability requirement,’ but it asks for more than a sheer possibility that a defendant has acted unlawfully.” Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (internal citations omitted). For purposes of ruling on a Rule 12(b)(6) motion, the Court “accepts] factual allegations in the complaint as true and construe[s] the pleadings in the light most favorable to the non-moving party.” Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir.2008).

However, a court need not accept as true allegations contradicted by judicially noticeable facts, Shwarz v. United States, 234 F.3d 428, 435 (9th Cir.2000), and a “court may look beyond the plaintiffs complaint to matters of public record” without converting the Rule 12(b)(6) motion into a motion for summary judgment, Shaw v. Hahn, 56 F.3d 1128, 1129 n. 1 (9th Cir.1995). A court is also not required to “ ‘assume the truth of legal conclusions merely because they are cast in the form of factual allegations.’ ” Fayer v. Vaughn, 649 F.3d 1061, 1064 (9th Cir.2011) (per curiam) (quoting W. Min. Council v. Watt, 643 F.2d 618, 624 (9th Cir.1981)). Mere “conclusory allegations of law and unwarranted inferences are insufficient to defeat a motion to dismiss.” Adams v. Johnson, 355 F.3d 1179, 1183 (9th Cir.2004); accord Iqbal, 556 U.S. at 678, 129 S.Ct. 1937. Furthermore, “a plaintiff may plead herself out of court” if she “plead[s] facts which establish that [s]he cannot prevail on h[er] ... claim.” Weisbuch v. Cnty. of L.A., 119 F.3d 778, 783 n. 1 (9th Cir.1997) (internal quotation marks and citation omitted).

C. Request for Judicial Notice

The Court generally may not look beyond the four corners of a complaint in ruling on a Rule 12(b)(6) motion, with the exception of documents incorporated into the complaint by reference, and any relevant matters subject to judicial *1204notice. See Swartz v. KPMG LLP, 476 F.3d 756, 763 (9th Cir.2007); Lee v. City of Los Angeles, 250 F.3d 668, 688-89 (9th Cir.2001). Under the doctrine of incorporation by reference, the Court may consider on a Rule 12(b)(6) motion not only documents attached to the complaint, but also documents whose contents are alleged in the complaint, provided the complaint “necessarily relies” on the documents or contents thereof, the document’s authenticity is uncontested, and the document’s relevance is uncontested. Coto Settlement v. Eisenberg, 593 F.3d 1031, 1038 (9th Cir.2010); see Lee, 250 F.3d at 688-89. The purpose of this rule is to “prevent plaintiffs from surviving a Rule 12(b)(6) motion by deliberately omitting documents upon which their claims are based.” Swartz, 476 F.3d at 763 (internal quotation marks omitted).

The Court also may take judicial notice of matters that are either (1) generally known within the trial court’s territorial jurisdiction or (2) capable of accurate and ready determination by resort to sources whose accuracy cannot reasonably be questioned. Fed.R.Evid. 201(b). Proper subjects of judicial notice when ruling on a motion to dismiss include legislative history reports, see Anderson v. Holder, 673 F.3d 1089, 1094 n. 1 (9th Cir.2012); court documents already in the public record and documents filed in other courts, see Holder v. Holder, 305 F.3d 854, 866 (9th Cir.2002); and publically accessible websites, see Caldwell v. Caldwell, No. 05-4166, 2006 WL 618511, at *4 (N.D.Cal. Mar. 13, 2006); Wible v. Aetna Life Ins. Co., 375 F.Supp.2d 956, 965-66 (C.D.Cal.2005).

D. Leave to Amend

If the Court determines that the complaint should be dismissed, it must then decide whether to grant leave to amend. Under Rule 15(a) of the Federal Rules of Civil Procedure, leave to amend “shall be freely given when justice so requires,” bearing in mind “the underlying purpose of'Rule 15 ... [is] to facilitate decision on the merits, rather than on the pleadings or technicalities.” Lopez v. Smith, 203 F.3d 1122, 1127 (9th Cir.2000) (en banc) (internal quotation marks and citation omitted). Nonetheless, a court “may exercise its discretion to deny leave to amend due to ‘undue delay, bad faith or dilatory motive on part of the movant, repeated failure to cure deficiencies by amendments previously allowed, undue prejudice to the opposing party ..., [and] futility of amendment.’ ” Carvalho v. Equifax Info. Servs., LLC, 629 F.3d 876, 892-93 (9th Cir.2010) (quoting Foman v. Davis, 371 U.S. 178, 182, 83 S.Ct. 227, 9 L.Ed.2d 222 (1962)) (alterations in original).

III. REQUESTS FOR JUDICIAL NOTICE

In connection with the instant Motion to Dismiss, Defendant requests that the Court take judicial notice of the following documents: (1) the full text of an interview with Linkedln founder and Chief Executive Officer Reid Hoffman, which was excerpted in the FAC; (2) the Linkedln profiles of the named Plaintiffs; (3) Link-edln’s description of its “InMail” feature; (4) Google’s description of the Google Contacts feature; (5) Linkedln’s description of its “Invitation Reminders” feature; and (6) a screen shot of “Connect with people you know on Linkedln.” ECF No. 18. In connection with their Opposition to the instant Motion to Dismiss, Plaintiffs request that the Court take judicial notice of the following documents: (1) an interview with Mr. Hoffman; (2) Google’s description of its Google Contacts API version 3.0; (3) Google’s description of its “Default *1205contacts groups”; and (4) a New York Times Bits blog article about the instant litigation. ECF No. 25.

The Court rules as follows on the requests for judicial notice6:

• The Court GRANTS the requests (made by both parties) for judicial notice of the two interviews with Mr. Hoffman. The parties do not dispute the accuracy of the quotations of Mr. Hoffman. Accordingly, judicial notice is appropriate under Fed.R.Evid. 201(b). See Tr. 5:9-14.
• The Court GRANTS Linkedln’s request for judicial notice of the Linkedln profiles of the named Plaintiffs. The FAC refers to these pages, and Plaintiffs cite and rely on these documents in Opposition to the instant Motion. See ECF No. 7 ¶¶ 13-21; ECF No. 24 at 4 n.2.
• The Court GRANTS Linkedln’s request for judicial notice of Linkedln’s description of its In-Mail feature. The FAC discusses the InMail feature and quotes Linkedln pages describing the feature. ECF No. 7 ¶¶ 8, 9, 55. Furthermore, Plaintiffs do not oppose the request or contend that the document is inaccurate. See Fed.R.Evid. 201(b).
• The Court GRANTS Linkedln’s request for judicial notice of Google’s description of the Google Contacts feature. Plaintiffs have cited and relied on this document in their Opposition to the instant Motion and do not oppose Linked-ln’s request or otherwise contend that the document is inaccurate. See ECF No. 24 at 32; Fed. R.Evid. 201(b).
• The Court GRANTS Linkedln’s request for judicial notice of Linkedln’s Help Page, which contains a description of the “Invitation Reminders” feature. Plaintiffs do not oppose this request or otherwise contend that the document is inaccurate. See Fed. R.Evid. 201(b). Further, the document is cited in the FAC. See ECF No. 7 ¶ 8.
• The Court GRANTS Linkedln’s request for judicial notice of the screen shot of the “Connect with people you know on Linkedln.” Plaintiffs do not oppose this request or otherwise contend that the document is inaccurate. See Fed.R.Evid. 201(b). Moreover, this screen appears between two screens cited in the FAC. See ECF No. 7, Figs. 4 & 5. The Court therefore finds judicial notice appropriate. Knievel v. ESPN, 393 F.3d 1068, 1076 (9th Cir.2005) (noting that judicial notice of the context of webpages is appropriate because “[j]ust as a reader must absorb a printed statement in the context of the media in which it appears, a computer user necessarily views web pages in the context of the links through which the user accessed those pages”).
*1206• The Court GRANTS Plaintiffs’ request for judicial notice of Google’s description of its Google Contacts API version 3.0. Linkedln does not oppose this request or otherwise contend that the document is inaccurate. See Fed.R.Evid. 201(b). In fact, Linkedln cites and relies on this document in its Reply in support of the instant Motion. ECF No. 30 at 6,18' n.10.
• The Court GRANTS Plaintiffs’ request for judicial notice of Google’s description of its “Default contacts groups.” Linkedln does not oppose this request or otherwise contend that the document is inaccurate. Accordingly, judicial notice is appropriate under Fed. R.Evid. 201(b).
• The Court DENIES Plaintiffs’ request for judicial notice of a New York Times Bits blog article about the instant litigation. This document is not cited or referenced in the FAC. Furthermore, Linkedln disputes the accuracy of the contents of the article. ECF No. 30 at 3 n.l. Therefore, the article does not contain statements “whose accuracy cannot reasonably be questioned.” Fed. R.Evid. 201(b).

IV. MOTION TO DISMISS

Defendant moves to dismiss the FAC on several bases. First, Defendant contends that all of Plaintiffs’ claims fail because consent is a defense to all of Plaintiffs’ causes of action and that an objectively reasonable person who clicked through the various screens after viewing the disclosures on Linkedln would have consented to Linkedln’s allegedly wrongful conduct. ECF No. 17 at 10-15. Second, Defendant contends that Plaintiffs have failed to allege adequate injury for the purposes of Article III standing to pursue their right of publicity, UCL, and Section 502 claims. Id. at 15-21. Third, Defendant contends that for various reasons, Plaintiffs have failed to state a claim with respect to each of Plaintiffs’ five causes of action. See id. at 21-33.

The Court begins by noting that Plaintiffs have actually challenged two separate processes in Linkedln’s sign-up process. First, Plaintiffs challenge Linkedln’s harvesting and collecting email addresses from the users’ contact lists. Second, Plaintiffs challenge Linkedln’s use of these email addresses in sending out the endorsement emails with users’ names. The analytical distinction between the two challenges is important because the various causes of action challenge only one of the two processes. Specifically, the SCA, the Wiretap Act, and the Section 502 causes of action relate only to the collection of emails. ECF No. 7 ¶¶ 110-38. Meanwhile, the common law right of publicity relates to the second step, Linkedln’s use of users’ names and likenesses in the endorsement emails. See id. ¶¶ 88-109. The UCL cause of action relates to both. Tr. 4:13-16.

The Court begins, as it must, by addressing Article III standing. Because the Court finds, for the reasons stated below that Plaintiffs adequately allege Article III standing to pursue the right of publicity, UCL, and Section 502 claims (the only causes of action for which standing has been challenged), the Court denies Defendants’ Motion as it relates to standing. The Court then turns to the merits of the various causes of action. For the reasons stated below, on the merits, the Court denies Linkedln’s Motion as it relates to the common law right of publicity cause of action with respect to Linkedln’s sending of two reminder endorsement emails and *1207the derivative UCL unlawful prong cause of action. The Court grants the remainder of Defendant’s Motion.

A. Article III Standing

A federal court must ask whether a plaintiff has suffered sufficient injury to satisfy the “case or controversy” requirement of Article III of the U.S. Constitution. See Clapper v. Amnesty Int’l USA, — U.S. -, 133 S.Ct. 1138, 1146, 185 L.Ed.2d 264 (2013) (“ ‘One element of the case-or-controversy requirement’ is that plaintiffs ‘must establish that they have standing to sue.’ ” (quoting Raines v. Byrd, 521 U.S. 811, 818, 117 S.Ct. 2312, 138 L.Ed.2d 849 (1997)). To satisfy Article III standing, a plaintiff must allege: (1) an injury-in-fact that is concrete and particularized, as well as actual or imminent; (2) that the injury is fairly traceable to the challenged action of the defendant; and (3) that the injury is redressable by a favorable ruling. Monsanto Co. v. Geertson Seed Farms, 561 U.S. 139, 130 S.Ct. 2743, 2752, 177 L.Ed.2d 461 (2010); Friends of the Earth, Inc. v. Laidlaw Envtl. Servs. (TOC), Inc., 528 U.S. 167, 180-81, 120 S.Ct. 693, 145 L.Ed.2d 610 (2000). “The party invoking federal jurisdiction bears the burden of establishing these elements ... with the manner and degree of evidence required at the successive stages of the litigation.” Lujan, 504 U.S. at 561, 112 S.Ct. 2130.

In a class action, named plaintiffs representing a class “must allege and show that they personally have been injured, not that injury has been suffered by other, unidentified members of the class to which they belong and which they purport to represent.” Gratz v. Bollinger, 539 U.S. 244, 289, 123 S.Ct. 2411, 156 L.Ed.2d 257 (2003) (internal quotation marks and citations omitted). “[I]f none of the named plaintiffs purporting to represent a class establishes the requisite of a case or controversy with the defendants, none may seek relief on behalf of himself or any other member of the class.” O’Shea v. Littleton, 414 U.S. 488, 494, 94 S.Ct. 669, 38 L.Ed.2d 674 (1974).

In the instant case, Linkedln challenges Plaintiffs’ Article III standing to pursue common law right of publicity, UCL, and Section 502 causes of action because Link-edln contends that Plaintiffs have not suffered any injury. Specifically, Linkedln contends that Plaintiffs have no coherent theory that they suffered economic harm, and that in fact, the challenged portion of the sign-up process is designed to benefit Linkedln users, not injure them. See ECF No. 17 at 15-21. In their Opposition, Plaintiffs contend that Plaintiffs have standing because their names and likenesses have been misappropriated. ECF No. 24 at 19-20. Further, Plaintiffs contend that Linkedln values the endorsement emails, because these emails help grow Linkedln’s membership base, prevent Linkedln from having to pay member acquisition costs, and help Linkedln sell premium memberships. Id. at 20-23.

Before turning to the question of whether Plaintiffs have standing to assert their right of publicity, UCL, and Section 502 claims, the Court begins by noting that Linkedln has not challenged Plaintiffs’ standing to assert claims under the Wiretap Act or the SCA. The Court nonetheless notes that Plaintiffs have standing to assert these claims. Under Ninth Circuit precedent, the injury required by Article III may exist by virtue of “statutes creating legal rights, the invasion of which creates standing.” See Edwards v. First Am. Fin. Corp., 610 F.3d 514, 517 (9th Cir.2010) (quoting Warth v. Seldin, 422 U.S. 490, 500, 95 S.Ct. 2197, 45 L.Ed.2d 343 (1975)). In such cases, the “standing question ... is whether the constitutional or *1208statutory provision on which the claim rests properly can be understood as granting persons in the plaintiffs position a right to judicial relief.” Id. (quoting Warth, 422 U.S. at 500, 95 S.Ct. 2197). In Edwards, the Ninth Circuit held that the Real Estate Settlement Procedures Act conferred standing to a homeowner who sought to challenge the kickback relationship between the title insurer and title agency despite the fact that the homeowner suffered no independent injury, through, for example, overpayment. Id. The Ninth Circuit recently extended the holding of Edwards to the Wiretap Act and the SCA. See In re Zynga Privacy Litig., No. 11-18044, 750 F.3d 1098, 1105 n. 5, 2014 WL 1814029, at *5 n. 5 (9th Cir.2014). The Ninth Circuit's decision is in accord with the decisions of the courts in this District that have held that alleged colorable violations of the Wiretap Act and the SCA alone suffice, under Edwards, to establish Article III standing without any independent showing of injury. See In re Google, Inc. Privacy Policy Litig., No. 12-1382, 2012 WL 6738343, at *5 (N.D.Cal. Dec. 28, 2012) (Wiretap Act); In re iPhone Application Litig., 844 F.Supp.2d 1040, 1055 (N.D.Cal.2012) (Wiretap Act and SCA); Gaos v. Google Inc., No. 10-4809, 2012 WL 1094646, at *3 (N.D.Cal. Mar. 29, 2012) (SCA); In re Facebook Privacy Litigation, 791 F.Supp.2d 705, 712 (N.D.Cal.2011) (Wiretap Act).

The Court now turns to the causes of action for which standing has been challenged: the common law right of publicity, UCL, and Section 502 causes of action. This Court has previously considered the standing of a social networking website’s users to raise claims that the social networking website utilized the users’ names and likenesses for marketing purposes in Fraley v. Facebook, Inc., 830 F.Supp.2d 785 (N.D.Cal.2011). In Fraley, this Court found standing where a putative class of users alleged that Facebook’s “Sponsored Stories” feature invaded the users’ privacy rights. “Sponsored Stories” were advertisements that appeared on users’ Face-book pages. The Sponsored Stories, which were generated based on users’ Fa-cebook posts, likes, and check-ins, contained a Facebook friend’s name, profile picture, and an assertion that the friend “likes” an advertiser. Id. at 791. This Court concluded that plaintiffs in Fraley had standing. Specifically, this Court in Fraley found that plaintiffs had articulated a coherent theory of economic injury because plaintiffs had alleged that “their individual, personalized endorsement of products, services, and brands to their friends and acquaintances has concrete, provable value in the economy at large, which can be measured by the additional profit Facebook earns from selling Sponsored Stories compared to its sale of regular advertisements.” Id. at 799. The Court then noted that Facebook officers and consultants had suggested that advertisements that contain endorsements from a familiar or trusted source had specific increased value. Therefore, the Court accepted plaintiffs’ assertion that “they have a tangible property interest in their personal endorsement of Facebook advertisers’ products to their Facebook Friends, and that Facebook has been unlawfully profiting from the nonconsensual exploitation of Plaintiffs’ statutory right of publicity.” Id. The Court in Fraley found particularly persuasive the complaint’s quotation of Facebook CEO Mark Zuckerberg, who stated “[a] trusted referral influences people more than the best broadcast message. A trusted referral is the Holy Grail of advertising” and of Facebook COO Sheryl Sandberg, who stated “[mjarketers have always known that the best recommendation comes from a friend.... This, in many ways, is the Holy Grail of advertís-*1209ing.” Id. The Court concluded that plaintiffs had standing because they had “identified a direct, linear relationship between the value of their endorsement of third-party products, companies, and brands to their Facebook friends, and the alleged commercial profit gained by Facebook.” Id. at 800.

In Fraley, this Court distinguished Cohen v. Facebook, Inc., 798 F.Supp.2d 1090 (N.D.Cal.2011) (“Cohen I”), and Cohen v. Facebook, Inc., No. 10-5282, 2011 WL 5117164 (N.D.Cal. Oct. 27, 2011) (“Cohen II”), cases that “appeared] highly similar” to Fraley. In the Cohen cases, Judge Seeborg dismissed a misrepresentation cause of action due to plaintiffs’ failure to show harm. Cohen, which did not address Article III standing, considered Face-book’s promotion of its Friend Finder service. The Friend Finder service allowed users to input their email addresses into a system, which “searches contact information in those [email] accounts, compares it to the Facebook user database, and presents the user with a list of other Facebook users he or she already knows, but who are not among his or her Facebook ‘friends.’” Cohen I, 798 F.Supp.2d at 1092. The challenged conduct in Cohen was Facebook’s promotion of the Friend Finder service. Specifically, Facebook promoted the Friend Finder service by placing on Facebook users’ homepages a notification of which of each user’s friends had used the Friend Finder service and encouraging other users who had not used the Friend Finder service to “[g]ive it a try!” Id. The plaintiffs in Cohen were Facebook users who utilized Friend Finder. These users were concerned that Fa-cebook had “used their names and profile pictures to promote the Friend Finder service without their knowledge or consent” by placing the notification that these users had utilized the Friend Finder service on the Facebook homepages of these users’ friends who had not used the Friend Finder service. Id.

In Cohen I, Judge Seeborg concluded that “Plaintiffs have not shown how the mere disclosure to their Facebook friends that they have employed the Friend Finder service (even assuming some of them did not) causes them any cognizable harm, regardless of the extent to which that disclosure could also be seen as an implied endorsement by them of the service.” Id. at 1097. In Cohen II, Judge Seeborg rejected plaintiffs’ contention that “Face-book’s use of plaintiffs’ names and likeness can be seen as serving a commercial purpose, undertaken with at least the intent of achieving growth in Facebook’s user base, thereby ultimately resulting in monetary gain for Facebook.” Cohen II, 2011 WL 5117164, at *2. The Cohen II Court found that the mere use of plaintiffs’ likenesses was insufficient to create the requisite injury and noted that “this is not a situation where the defendant is alleged to have publicized the plaintiffs’ names or likenesses to any audience or in any context where they did not already appear—rather, the names and likenesses were merely displayed on the pages of other users who were already plaintiffs’ Facebook ‘friends’ and who would regularly see, or at least have access to, those names and likenesses in the ordinary course of using their Face-book accounts.” Id. at *3.

Judge Seeborg recently interpreted Cohen and Fraley in C.M.D. v. Facebook, Inc., No. 12-1216, 2014 WL 1266291 (N.D.Cal. March 26, 2014). In C.M.D., minor Facebook users filed suit against Facebook alleging that Facebook violated the minor’s rights by using the minor’s name and likeness in “Sponsored Stories” (as in Fraley) and in Social Ads, a program that allowed advertisers to pair a statement that a user “likes” the advertiser with an advertisement paid for by the *1210advertiser. Id. at *1. The Court held that the minor had Article III standing because the case was closer to Fraley than it was to Cohen. The C.M.D. Court relied on the fact that “plaintiffs have alleged that their names and likenesses are used to endorse third-party products, companies, and brands, with a resulting inference that those endorsements have ‘concrete, measurable, and provable value in the economy at large.’ ” Id. at *2.

The Court finds that this case is no different than Fraley. The Court’s decision in Fraley was premised on the fact that endorsements or invitations from friends or acquaintances are more valuable than generic advertisements that do not contain the recommendation of a familiar or trusted source. It is this measure of personalization of an endorsement that routinely has a concrete and provable value, as this Court recognized in Fraley and as Judge Seeborg concluded in C.M.D. In Fraley, Facebook allegedly sold personalized advertisements at a higher rate by misappropriating the names and likenesses of its users. This redounded to a measurable economic benefit for Facebook, which was able to charge more for the personalized advertisements, at the expense of plaintiffs in that case who were not compensated. Similarly, here, Linkedln is alleged to have misappropriated Plaintiffs’ names to promote Linkedln and to grow Linkedln’s membership, which is indisputably economically valuable to Linkedln. Tr. 14:14-15 (“As a general matter, your honor, it is of benefit to Linkedln to have more members and a broader network.”); see also Tr. 15:1-4. Just as the quotations from Mark Zuckerberg and Sheryl Sand-berg in Fraley suggested the value of personalized (as opposed to generic) endorsements, here, the FAC quotes Linkedln documents that highlight the importance of viral marketing to grow Linkedln’s membership. ECF No. 7 ¶¶ 7, 51, 54. For example, the FAC alleges that Link-edln’s 2012 10-K states that “our member base has grown virally based on members inviting other members to join our network” and that “our member base has grown virally ... we have been able to build our brand with relatively low marketing costs.” Id. ¶¶51, 54. One of the principal reasons such viral marketing is superior to other forms of marketing is the source: viral marketing comes from a friend or contact with whom the recipient is familiar and trusts as opposed to an unfamiliar or untrusted source.

To contend that Plaintiffs lack standing, Linkedln relies heavily on Cohen. Specifically, Linkedln contends that Plaintiffs’ sole theory of injury is that Linkedln grew its membership base through the endorsement emails, and that the growth in membership base is ah insufficient theory of commercial value under Cohen. This Court is not persuaded by Cohen. As Mark Zuckerberg and Sheryl Sandberg have stated, the best recommendation comes from a friend and is the “Holy Grail” of advertising. Fraley, 830 F.Supp.2d at 799. Facebook’s use of users’ names and likenesses to promote Facebook’s Friend Finder service is undertaken with the intent to grow Face-book’s user base and ultimately result in commercial advantage to Facebook. Face-book profits from this at the expense of its users. Similarly, in the instant case, Link-edln’s use of users’ names to promote Linkedln’s services is undertaken with the intent to grow Linkedln’s user base and ultimately result in commercial advantage to Linkedln. Similarly, Linkedln profits from this at the expense of its users.

The Court notes that this type of injury, using an individual’s name for personalized marketing purposes, is precisely the type of harm that California’s common law right *1211of publicity is geared toward preventing. The California Court of Appeal has recognized that the “first step toward selling a product or service is to attract the consumers’ attention” and that a defendant may “gain[] a commercial advantage” by appropriating an individual’s name or likeness to accomplish this goal. See Eastwood v. Superior Court, 149 Cal.App.3d 409, 420, 198 Cal.Rptr. 342 (1983); see also Lugosi v. Universal Pictures, 25 Cal.3d 813, 823, 160 Cal.Rptr. 323, 603 P.2d 425 (1979) (“[T]he so-called right of publicity means in essence that the reaction of the public to name and likeness, which may be fortuitous or which may be managed or planned, endows the name and likeness of the person involved with commercially exploitable opportunities. The protection of name and likeness from unwarranted intrusion or exploitation is the heart of the law of privacy.”).

In sum, the Court finds that individuals’ names have economic value where those names are used to endorse or advertise a product to the individuals’ friends and contacts. This is so because an advertisement bearing the imprimatur of a trusted or familiar source, such as a friend or acquaintance, has concrete value in the marketplace. Here, Plaintiffs allege that their names were misappropriated by Linkedln to create personalized endorsements.

For all the above reasons, the Court finds that Plaintiffs have adequately alleged Article III standing with respect to all of their causes of action. Accordingly, the Court denies Linkedln’s Motion to Dismiss on standing grounds.

B. SCA and Wiretap Act

The Court now turns to the merits of Plaintiffs’ causes of action. The Court first addresses two causes of action related to the collection of email addresses: the SCA and the Wiretap Act. Linkedln moves to dismiss both the SCA and the Wiretap Act causes of action on the basis that Plaintiffs have consented to Linked-ln’s allegedly unlawful conduct. That is, Linkedln contends that Plaintiffs have consented to Linkedln’s collection of email addresses from users’ contact lists. The Court begins by providing some background on the statutes and then applies the consent standard in the two statutes to the allegations in the FAC.

Enacted in 1986 as Section II of the Electronic Communications Protection Act (“ECPA”), the SCA creates criminal and civil liability for certain unauthorized access to stored communications and records. See Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir.2002). The SCA creates a private right of action against anyone who “(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system.” 18 U.S.C. § 2701(a); see id. § 2707 (creating a private right of action). The SCA exempts from its coverage conduct “authorized ... by the person or entity providing a wire or electronic communications service,” id. § 2701(c)(1), or “by a user of that service with respect to a communication of or intended for that user,” id. § 2701(c)(2). While there is relatively scant authority on the definition of “authorized” under the SCA, the Ninth Circuit has analogized authorization under the SCA to consent that defeats a common law trespass claim. Theofel v. Farey-Jones, 359 F.3d 1066, 1072 (9th Cir.2004). The Restatement (Second) of Torts, which the Ninth Circuit cited for this proposition, describes the consent exception as follows: “If words or *1212conduct are reasonably understood by another to be intended as consent, they constitute apparent consent and are as effective as consent in fact.” Restatement (Second) of Torts § 892.

The Wiretap Act, which was enacted as Title III of ECPA, generally prohibits the “interception” of “wire, oral, or electronic communications.” 18 U.S.C. § 2511(1). More specifically, the Wiretap Act provides a private right of action against any person who “intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication,” 18 U.S.C. § 2511(1)(a), or who “intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of [the Wiretap Act],” id. § 2511(l)(d). See id. § 2520 (providing a private right of action). Under 18 U.S.C. § 2511(2)(d), however, it is not unlawful “to intercept a wire, oral, or electronic communication ... where one of the parties to the communication has given prior consent to such interception.” Consent to an interception can be explicit or implied, but any consent must be actual. See U.S. v. Van Poyck, 77 F.3d 285, 292 (9th Cir.1996); U.S. v. Amen, 831 F.2d 373, 378 (2d Cir.1987); U.S. v. Corona-Chavez, 328 F.3d 974, 978 (8th Cir.2003). “[Generally, consent must be express, but consent may be implied where there are surrounding circumstances indicating that the defendant knowingly agreed to the surveillance.” U.S. v. Staves, 383 F.3d 977, 981 (9th Cir.2004) (internal quotation marks omitted). “In the [the Wiretap Act] milieu as in other settings, consent inheres where a person’s behavior manifests acquiescence or a comparable voluntary diminution of his or her otherwise protected rights.” Griggs-Ryan v. Smith, 904 F.2d 112, 116 (1st Cir.1990).

There may be subtle differences between the consent exception to Wiretap Act liability and the authorization exception to SCA liability. However, the parties conceded, and the Court finds that for the purposes of the instant Motion, the question under both is essentially the same: Would a reasonable user who viewed the Linkedln’s disclosures have understood that Linkedln was collecting email addresses from the user’s external email account such that the user’s acquiescence demonstrates that she consented to or authorized the collection? Tr. 31:19-32. The FAC, as pleaded, suggests that the answer to this question is yes. When a user enters her Gmail address into Figure 3 above and clicks “Continue,” she receives a notification that says “Linkedin.com is asking for some information from your Google account [email address]” and then has a bullet point that states “Google Contacts.” ECF No. 7, Fig. 4. At this point a user can choose between “Allow” or “No thanks.” Id. It is only if, after viewing the disclosure that Linkedin.com is seeking a user’s Google Contacts from her Google account, the user indicates “Allow” that a user’s contacts’ email addresses are imported from Google Contacts to Linkedln. Importantly, this disclosure is presented immediately prior to the moment at which Linkedln is alleged to have engaged in wrongful conduct. It was not, as is often the case, a disclosure buried in a Terms of Service or Privacy Policy that may never be viewed or if viewed at all on a wholly separate page disconnected from the processes that led to the alleged wrongful conduct. See In re Google Inc. Gmail Litig. (“Gmail ”), No. 13-2430, 2013 WL 5423918, at *12-14 (N.D.Cal. Sept. 26, 2013). Even more significantly, perhaps, *1213is the fact that alongside the disclosure is an express opt out opportunity in the form of the “No thanks” button. The opportunity to opt-out of the harvesting process that leads to the allegedly wrongful conduct while still utilizing Linkedln further distinguishes this case from cases like Gmail, where users who sought to use Gmail could not opt out of the allegedly unlawful conduct. In light of the clarity of the disclosure, the proximity of the disclosure to the wrongful conduct, and the ability to opt out, the Court finds that the FAC, as pleaded, suggests that Plaintiffs have consented to or authorized the collection of email addresses.

The Court is not persuaded by Plaintiffs’ contentions to the contrary. Plaintiffs contend that Linkedln’s disclosure that Linkedln would access thousands of a users’ contacts’ email addresses is unclear. Relatedly, Plaintiffs posit that a reasonable user would not understand that the contacts that Linkedln accesses include everyone to whom a user has sent an email. The Court finds that the allegations in the FAC fatally undermine these contentions for two reasons. First, the initial disclosure explicitly states that Linkedln was trying to access the user’s “Google Contacts.” ECF No. 7, Fig. 4. There are no allegations in the FAC regarding what any of the named Plaintiffs understood “Google Contacts” to encompass. Had the Plaintiffs looked to Google’s page regarding Contacts, they would have encountered Google’s statement that “[ejmail addresses are automatically added to your Contacts list each time you use the Reply, Reply to all, or Forward functions to send mail to addresses that don’t already exist in your Contacts list.” ECF No. 18, Ex. D. This statement suggests that “Google Contacts” encompasses all those to whom a user has replied or forwarded an email. Second, to the extent that the “Google Contacts” page was not viewed or was insufficiently explicit, Plaintiffs manifested consent subsequent to their initial decision to allow Linkedln to access their Google Contacts. Specifically, the Linkedln page that asks users to “Stay in touch with your contacts who aren’t on Linkedln yet. Invite them to connect with you” explicitly selects all of the users’ contacts and states the number of contacts that have been selected. ECF No. 7, Fig. 5. The example of this page in the FAC depicted above in Figure 6, for example, states “1132 Selected” next to “Select All.” Id. None of the named Plaintiffs at this point chose to “Skip this step” despite having the opportunity to do so. The fact that Plaintiffs were explicitly alerted to the fact that thousands of contacts had been selected but nevertheless chose to proceed further undermines Plaintiffs’ contention that they did not know that they were consenting to Linked-ln’s collection of thousands of email addresses.

Plaintiffs further contend that Linked-ln’s statements do not disclose the fact that Linkedln stores the email addresses in perpetuity. However, Plaintiffs have cited no case—and the Court could find none—to suggest that the duration of maintaining intercepted data is relevant to the issue of consent under the SCA or the Wiretap Act. Rather, under the SCA and the Wiretap Act, the violation occurs at the moment of interception of communications in transit or accessing stored communications. Accordingly, the Court finds that whether Linkedln disclosed the duration for which it would store email addresses is not relevant to the issue of consent.

Plaintiffs also contend that the “thousands” of complaints regarding Linkedln’s processes by users posted to the Linkedln website suggest that there is no consent. As a threshold matter, the Court notes that the FAC does not cite thousands of user complaints. Rather, the FAC con*1214tains citation to a handful of users’ grievances regarding Linkedln’s processes. More importantly, however, the test for express consent or authorization for both the SCA and the Wiretap 'Act for the purposes of a motion to dismiss is an objective test. That is, the question at the motion to dismiss phase is whether plaintiffs have plausibly alleged that a reasonable user who undertook Linkedln’s process has not consented to the collection of email addresses. Individualized subjective experiences of users, while potentially relevant, do not by themselves undermine the Court’s finding that a reasonable user who clicked “Allow” consented to the collection of email addresses.

Plaintiffs’ final contention is that the collection of email addresses is contrary to Linkedln’s clear policy disclosures. Specifically, Plaintiffs point to the following statements of Linkedln: “grow your network”; “get started by adding your email address”; “we will not store your password or email anyone without your permission”; and “Linkedln.com is asking for some information from your Google Contacts.” ECF No. 24 at 12. The Court is not persuaded that Linkedln’s collection of emails is contrary to any of these statements, because nothing in any of these statements suggests that Linkedln would not collect email addresses of users who clicked “Allow.” Further, Plaintiffs misstate Linkedln’s disclosure in their Opposition. Specifically, while Plaintiffs’ Opposition suggests that Linkedln’s disclosure states that “Linkedln.com is asking for some information from your Google Contacts,” the screenshot of that page in the FAC actually states “Linkedln.com is asking for some information from your Google Account” and.then contains a bullet point that states “Google Contacts.” ECF No. 7, Fig. 4. While the disclosure as modified by Plaintiffs is misleading as it suggests that Linkedln is only seeking “some information from [users’] Google Contacts,” the actual disclosure is not, as it may suggest that Linkedln is seeking all of the users’ Google Contacts. Moreover, even if this disclosure is not completely clear, Figure 5, which discloses 218 people the user knows who have Linkedln accounts and Figure 6, which discloses 1132 people the user knows who do not have Linkedln accounts, notify the user that all the users’ Google Contacts have been harvested.

Therefore, the Court finds that the consent and authorization defense applies to Plaintiffs’ Wiretap Act and SCA causes of action, and grants Linkedln’s Motion as to these claims.

C. Common Law Right of Publicity

Plaintiffs’ next cause of action, the common law right of publicity cause of action, challenges Linkedln’s use of users’ names in the endorsement emails. Plaintiffs must allege four elements to state a claim for violation of California’s common law right to publicity: “(1) the defendant’s use of the plaintiffs identity; (2) the appropriation of plaintiffs name or likeness to defendant’s advantage, commercially or otherwise; (3) lack of consent; and (4) resulting injury.” Newcombe v. Adolf Coors Co., 157 F.3d 686, 692 (9th Cir.1998). “California law has not imposed any requirement that the unauthorized use or publication of a person’s name or picture be suggestive of an endorsement or association with the injured person.” Abdul-Jabbar v. Gen. Motors Corp., 85 F.3d 407, 414 (9th Cir.1996). In addition to challenging Plaintiffs’ standing to bring this claim, Linkedln contends that Plaintiffs have consented and that therefore Plaintiffs cannot allege the third element, lack of consent. Because consent is the only element of the merits of the common law right of publicity cause of action that Defendant challenges, see ECF No. 17 at 21, *1215the Court’s analysis below focuses exclusively on this element.

“Consent to use a name or likeness need not be express or in writing, but it may be implied from the consenting party’s conduct and the circumstances of the case.” Jones v. Corbis Corp., 815 F.Supp.2d 1108, 1113 (C.D.Cal.2011) aff'd, 489 Fed.Appx. 155 (9th Cir.2012). The Ninth Circuit has held that for purposes of a common law right to publicity cause of action, “[c]onsent ... is to be determined objectively from the perspective of a reasonable person.” Jones v. Corbis Corp., 489 Fed.Appx. 155, 156 (9th Cir.2012)

The Court agrees with Linkedln that based on Linkedln’s disclosures, a reasonable user would have understood that her name would be used in invitations to join Linkedln that would be sent to her contacts who were not already Linkedln users with regard to the first endorsement email. Specifically, before the endorsement emails are sent, Linkedln users must review a Linkedln page that bears the title “Why not invite some people?” and that states “Stay in touch with your contacts who aren’t on Linkedln yet. Invite them to connect with you.” ECF No. 7, Fig. 5. The Court finds that these disclosures, which were contained on a page that allowed users to deselect some or all of the recipients or to “Skip this step” altogether, combined with the fact that Plaintiffs explicitly chose “Add to Network,” suggests that Plaintiffs have consented to the dissemination of endorsement emails to their contacts who are not Linkedln members. The disclosure explicitly states that Linkedln intends to send an invitation to the email addresses that remain selected. In fact, Plaintiffs do not challenge the specific format or content of the invitation email. Tr. 33:9-20 (The Court: “Let me ask you, with regard to Figure 7, is there—do you have an objection or concern about the format or the consent if it was rephrased a different way? Would that alleviate your concerns if it ... somehow said ... “Matt Wiley has joined Linkedln and invites you to join him on Linkedln,” or if [it] had any different phraseology ... ?” Plaintiffs’ Counsel: “I don’t believe that would cure the problem, your honor, because Linked-ln is using the identities of people to solicit their friends to join Linkedln....”).

The Court is not persuaded by Plaintiffs’ contention that the disclosures were not clear enough to alert Plaintiffs that the emails sent to their contacts would contain an endorsement of Linkedln. The actual email that is ultimately sent to the contacts states “I’d like to add you to my professional network” with the name of the Linkedln user below. See ECF No. 7, Fig. 7. The Court finds that a reasonable user who saw the disclosure “Invite [contacts] to connect with you” has consented to this language in the email. The email contains the message that Linkedln discloses to users: an invitation from the user to the users’ contacts to connect with the user on Linkedln. Plaintiffs attempt to slice the disclosures too thin in arguing for a distinction between invitations, which Linkedln clearly discloses, and endorsements, which Plaintiffs contend are contained in the email. The Court finds that Plaintiffs have consented to Linkedln’s sending of emails inviting Plaintiffs’ contacts to join Plaintiffs’ Linkedln networks. In this instance, an invitation and endorsement are synonymous. Thus, the Court uses the terms “invitation emails” and “endorsement emails” interchangeably.

Plaintiffs’ contention that Linkedln is not clear about the volume of endorsement emails that are being sent because Linked-ln only states that it is inviting “contacts” is also unpersuasive. See ECF No. 24 at 14. Plaintiffs contend that this masks the fact Linkedln sends emails to every ad*1216dress the user has contacted. Relatedly, Plaintiffs contend that the disclosure page is deceptive since only the first ten email addresses that will receive the endorsement emails are listed and the remaining email addresses are hidden beneath a scroll bar. See id. The Court is not persuaded. As discussed above, the disclosure page contains an explicit disclosure of the number of recipients of the endorsement emails (in the FAC’s example “1132 Selected”) and allows users to unselect either all or individual email addresses. See ECF No. 7, Fig. 5. The Court finds that explicitly listing the number on the top of the page is sufficient to alert a reasonable person to the volume of endorsement emails being sent. Despite this number appearing at the top of the web-page, Plaintiffs chose to “Add to Network” rather than skipping the step. Importantly, before the endorsement emails were sent to a user’s email contacts, the user had three separate occasions to opt out of the entire process. See ECF No. 7, Figs. 3, 4, 5.

Although the Court concludes that Plaintiffs have consented to Linkedln’s initial endorsement email, the Court finds that Plaintiffs have plausibly alleged that they did not consent to the second and third reminder endorsement emails. While the Court has found that “Invite [your contacts] to connect with you” • discloses that Linkedln intends to send an endorsement email to the user’s contacts, the same cannot be said of the two reminder endorsement emails. Nothing in Linkedln’s disclosures alerts users to the possibility that their contacts will receive not just one invitation, but three. In fact, by stating a mere three screens before the disclosure regarding the first invitation that “We will not ... email anyone without your permission,” Linkedln may have actively led users astray. See ECF No. 7, Fig. 3. Specifically, it is entirely plausible that a reasonable user would have thought that by agreeing to Linkedln’s invitation of the user’s contacts to connect, the user authorized Linkedln to send only one invitation and that further emails would require further authorizations. Accordingly, the Court finds that consent does not defeat Plaintiffs’ common law right of publicity claims as it relates to the second and third endorsement emails at the pleading stage.

Linkedln contends that Plaintiffs suffer no independent injury from the second and third emails because “the reminder emails are no different in form and content than connection invitations.” ECF No. 30 at 13; Tr. 29:15-17 (“There’s certainly nothing that Plaintiffs have pointed to that suggest that somehow the additional two reminder e-mails causes any additional harm.”). The Court is not persuaded by Linkedln’s contention. It is plausible that Plaintiffs suffer additional harm from the second and third endorsement emails. One of Plaintiffs’ key allegations throughout the FAC is that the endorsement emails have a deleterious effect on users’ reputations by making the users’ contacts believe that the user is sending the contact multiple endorsement emails. See, e.g., ECF No. 7 ¶ 50. This theory demonstrates the additional harm that users suffer from the second and third endorsement emails that they would not have suffered from the first endorsement email. Specifically, the second and third endorsement emails could injure users’ reputations by allowing contacts to think that the users are the types of people who spam their contacts or are unable to take the hint that their contacts do not want to join their Linkedln network. The reputational harm is magnified by the fact that the only people who receive the second endorsement email are the user’s contacts *1217who chose not to register for Linkedln upon receipt of the first email. Moreover, the only individuals who receive the third endorsement email are the user’s contacts who chose not to register for Linkedln upon receipt of the first and second .emails. Therefore, individuals who receive second and third email invitations to join Linked-ln after declining one or two previous email invitations to join Linkedln from the same sender may become annoyed at the sender, which could be professionally or personally harmful. This is further exacerbated by the breadth of the recipients of the endorsement emails, which includes all those to whom the Linkedln user has sent an email using the reply, reply to all, or forward functions. ECF No. 18, Ex. D. This type of reputational harm—incurred additionally and independently of the first endorsement email—is precisely the harm against which the common law right to publicity seeks to protect. See Lugosi, 160 Cal.Rptr. 323, 603 P.2d at 431. Accordingly, the Court finds that Plaintiffs have plausibly alleged that they suffer additional harm from the second and third endorsement emails.

In sum, although Linkedln’s sign-up process could and should be clearer, the Court concludes that Plaintiffs’ allegations that they did not consent to the first endorsement email are insufficient because Linkedln’s sign-up process discloses that Linkedln will send such an endorsement email. Accordingly, the Court grants Defendant’s Motion as it relates to Plaintiffs’ common law right of publicity action for the first endorsement email. However, the Court finds that Plaintiffs have adequately pleaded lack of consent to the sending of the second and third endorsement emails and that it is plausible that these subsequent emails created independent harm. Defendants have raised no other arguments as to why the common law right of publicity cause of action should be dismissed. Accordingly, the Court denies Defendant’s Motion as it relates to the common law right of publicity cause of action with regard to the second and third endorsement emails.

D. Section 502

Section 502 of the California Penal Code is California’s Comprehensive Computer Data Access and Fraud Act. The Act prohibits certain computer-based conduct such as “[kjnowingly and without permission accessing] or causing] to be accessed any computer, computer system, or computer network.” CaLPenal Code § 502(c)(7). Linkedln moves to dismiss Plaintiffs’ Section 502 cause of action on two bases. First, Linkedln contends that Plaintiffs authorized Linkedln’s access to Plaintiffs’ email contacts. Second, Linked-ln contends that Plaintiffs have not alleged that Linkedln breached any technical or code-based barrier, which is fatal to Plaintiffs’ Section 502 claims. The Court agrees with Linkedln’s second contention and therefore need not reach Linkedln’s first contention.

The parties agree that there is a violation of the subsections of Section 502, which requires action “without authorization,” only where defendants circumvent technical or code based barriers in place to restrict or bar a user’s access. ECF No. 17 at 30-31; ECF No. 24 at 32. As this Court has previously noted, “individuals may only be subjected to liability for acting ‘without permission’ under Section 502 if they access or use a computer, computer network, or website in a manner that overcomes technical or code-based barriers.” In re iPhone Application Litig., No. 11-2250, 2011 WL 4403963, at *12 (N.D.Cal. Sept. 20, 2011) (internal quotation marks and alterations omitted). This is in accord with the interpretation of this provision by several other courts in this district. See *1218In re Google Android Consumer Privacy Litig., No. 11-2264, 2013 WL 1283236, at *11 (N.D.Cal. Mar. 26, 2013) (“Courts within this District have interpreted ‘without permission’ to require that a defendant access a network in a manner that circumvents technical or code based barriers in place to restrict or bar a user’s access.” (internal quotation marks omitted)); In re Facebook Privacy Litig., 791 F.Supp.2d 705, 715 (N.D.Cal.2011) (“Individuals may only be subjected to liability for acting ‘without permission’ under Section 502 if they access or use a computer, computer network, or website in a manner that overcomes technical or code-based barriers.” (internal quotation marks and alterations omitted)); Facebook, Inc. v. Power Ventures, Inc., No. 08-5780, 2010 WL 3291750, at *11 (N.D.Cal. July 20, 2010) (concluding after detailed statutory analysis that “accessing or using a computer, computer network, or website in a manner that overcomes technical or code-based barriers is ‘without permission,’ and may subject a user to liability under Section 502”).

The dispute here centers on whether the FAC sufficiently alleges that Linkedln has breached a technical or code-based barrier. Plaintiffs’ theory that once a user provides Linkedln with her email address, Linkedln “tunnel[s] through any open email program on a user’s desktop.” ECF No. 7 ¶43.7 “Even if a user has never provided a password to' Linkedln, Linkedln will use an open connection to an email service to download a user’s data.” Id. In essence, Plaintiffs’ theory is that when a putative Linkedln user has her Gmail account open in a separate tab or window or has not logged out of Gmail after using the service and subsequently begins the Linkedln sign-up process, she is not re-asked for her Gmail password before she gets to the Google Accounts screen. Tr. 36:21-37:16. The moment that troubles Plaintiffs occurs when the user clicks “Continue” after her email is pre-prepopulated. “When you click the button ‘Continue,’ what it does is it checks to see whether there’s an open e-mail account on your computer that matches the address that’s pre-populated in there, and then if so, it queries that account and doesn’t ask for the password because it knows that you’re already logged in to that account.” Tr. 38:17-22. There is no allegation that at this step of the process Linkedln has accessed Plaintiffs’ Google Contacts. The sole concern is that Link-edln has accessed the Google Accounts without re-prompting for a password. Tr. 39:2-10.

More succinctly, Plaintiffs allege that Linkedln breaches a code-based barrier by not seeking the Plaintiffs’ Google Accounts password between these two screens:

[[Image here]]

*1219The Court concludes that these allegations do not suggest that Linkedln has circumvented a technical or code-based barrier. Rather, Plaintiffs allege only that Linkedln merely skips the step of requiring users to input the passwords associated with their Google Accounts when a user is already logged in to their email account on a different tab or browser window or when the user has not logged out of her email account. As a threshold matter, it is not clear whose technical or code-based barriers Plaintiffs allege Linkedln circumvents. Moreover, to the extent that Plaintiffs rely on Google’s code-based barrier in placing the Google Contacts page behind a password, the FAC is not clear as to how Linkedln overcomes those barriers. Rather, the FAC and Plaintiffs counsel’s statements suggest that Plaintiffs overcame this barrier by providing a Google password in a different tab or window or by not logging out of their Google accounts. In the absence of additional specificity regarding what technical or code-based barriers were in place and as to who overcame those barriers and how, the Court finds Plaintiffs’ allegations insufficient to allege a Section 502 violation.

Moreover, Plaintiffs suffer no harm from this allegedly wrongful conduct. Importantly, at the moment when Linkedln skips the step of requesting users’ passwords, Linkedln is still unable to access the list of email addresses of contacts of the users’ Google accounts. Rather, the collection of emails only occurs after the above screen and after a user has explicitly authorized the collection. The Court finds that Plaintiffs must plead some injury emanating from Linkedln’s alleged Section 502 violations to survive the Motion to Dismiss. See CaLPenal Code § 502(e)(1) (noting that only an individual “who suffers damage or loss by reason of a violation” may bring a private action). The Court grants Linkedln’s Motion to Dismiss Plaintiffs’ Section 502 claims on the basis that Plaintiffs have not adequately alleged that Defendant breaches a technical or code-based barrier or that Plaintiffs have suffered any tangible harm from the alleged Section 502 violations.

E. UCL

The UCL broadly prohibits “any unlawful, unfair or fraudulent business act or practice.” Cal. Bus. & Prof.Code § 17200. When the “unfair competition” underlying a plaintiff’s UCL claim consists of a defendant’s misrepresentation, a plaintiff must have actually relied on the misrepresentation, and suffered economic injury as a resúlt of that reliance, to state a claim for relief. See In re Tobacco II Cases, 46 Cal.4th 298, 326, 93 Cal.Rptr.3d 559, 207 P.3d 20 (2009). California courts have extended this actual reliance requirement to claims brought under the UCL’s unlawful prong to the extent “the predicate unlawful conduct is based on misrepresentations.” Durell v. Sharp Healthcare, 183 Cal.App.4th 1350, 1355, 108 Cal.Rptr.3d 682 (2010); accord Kwikset Corp. v. Superior Court, 51 Cal.4th 310, 326, 120 Cal.Rptr.3d 741, 246 P.3d 877 (2011). Moreover, in Kwikset Corp. v. Superior Court, the California Supreme Court suggested that the actual reliance requirement applies whenever the underlying misconduct in a UCL action is fraudulent conduct. See 51 Cal.4th at 326, 120 Cal. Rptr.3d 741, 246 P.3d 877. In line with this authority, this Court has concluded “that the actual reliance requirement also applies to claims under the UCL’s unfair prong to the extent such claims are based on fraudulent conduct.” See Kane v. Chobani, Inc., No. 12-2425, 2013 WL 5289253, at *6 (N.D.Cal. Sept. 19, 2013). Accordingly, this Court has consistently required allegations of actual reliance and injury at the pleading stage for claims under all *1220three prongs of the UCL where such claims are premised on misrepresentations. See Kane v. Chobani, Inc., 973 F.Supp.2d 1120, 1129 (N.D.Cal.2014).

This showing of actual reliance under the UCL requires a plaintiff to allege that “the defendant’s misrepresentation or nondisclosure was an immediate cause of the plaintiffs injury-producing conduct.” Tobacco II, 46 Cal.4th at 326, 93 Cal.Rptr.3d 559, 207 P.3d 20 (internal quotation marks omitted). “A plaintiff may establish that the defendant’s misrepresentation is an immediate cause of the plaintiffs conduct by showing that in its absence the plaintiff in all reasonable probability would not have engaged in the injury-producing conduct.” Id. (internal quotation marks omitted). While a plaintiff need not demonstrate that the defendant’s misrepresentations were “the sole or even the predominant or decisive factor influencing his conduct,” the misrepresentations must have “played a substantial part” in the plaintiffs decision making. Id.

To make the reliance showing,, this Court has consistently held that plaintiffs in misrepresentation cases must allege that they actually read the challenged representations. See, e.g., Bruton v. Gerber Prods. Co., No. 12-2412, 2014 WL 172111, at *9 (N.D.Cal. Jan. 15, 2014) (holding that a plaintiff may not “assert claims based on statements she did not view”); In re iPhone Application Litig., 6 F.Supp.3d 1004, 1015, 2013 WL 6212591, at *8 (N.D.Cal. Nov. 25, 2013) (“Plaintiffs must have seen the misrepresentations and taken some action based on what they saw—that is, Plaintiffs must have actually relied on the misrepresentations to have been harmed by them.”); see also In re LinkedIn User Privacy Litig., 932 F.Supp.2d 1089, 1093 (N.D.Cal.2013) (dismissing case because “Plaintiffs do not even allege that they actually read the alleged misrepresentation”). In the FAC, Plaintiffs have not alleged that they read any of Linkedln’s purported misrepresentations. Contrary to Plaintiffs’ counsel’s contention at the hearing, Tr. 35:20-25, none of the paragraphs describing the named Plaintiffs’ interaction with Linked-ln suggests that these Plaintiffs actually read the alleged misrepresentations. ECF No. 7 ¶¶ 13-21. Rather, these paragraphs only suggest that named Plaintiffs registered for Linkedln and that endorsement emails were sent to their email contacts without their authorization. Furthermore, the fact that some of the alleged misrepresentations appeared on screens that all users had to click through to register do not by themselves establish that any of the Plaintiffs actually read or relied on the misrepresentations in the absence of allegations that Plaintiffs read these statements. Accordingly, the misrepresentation-based UCL claims fail, and the Court grants Defendant’s Motion as to these claims.

However, Plaintiffs also allege a UCL cause of action under the unlawful prong, which is derivative of their common law publicity cause of action. See CRST Van Expedited, Inc. v. Werner Enterprises, Inc., 479 F.3d 1099, 1107 (9th Cir.2007) (noting that a UCL unlawful prong cause of action can be premised on the invasion of a common law right). It follows from the Court’s denial of Defendant’s Motion as to Plaintiffs’ common law right of publicity claim that Defendant’s Motion as to Plaintiffs’ unlawful prong UCL claim also fails. Defendant moved to dismiss the unlawful prong claim only on the basis that there is no underlying unlawful conduct and that Plaintiffs lack standing to sue. ECF No. 17 at 24-25. Because both of these contentions were rejected above, the Court denies Defendant’s Motion as to the unlawful prong claim to the extent that the *1221claim is premised on Linkedln’s invasion of Plaintiffs’ common law right of publicity when Linkedln sends the second and third endorsement emails.

V. MOTION TO STRIKE

In the alternative to the Motion to Dismiss, Defendant seeks to strike Plaintiffs’ class allegations. See EOF No. 7 at 33-35. Specifically, Defendant contends that if any of the claims proceed, a class cannot be certified because individual issues will predominate over common issues with respect to consent. Accordingly, Defendant contends that a class cannot be certified under Rule 23(b)(3). The Court is not persuaded by Defendant’s contentions. As a threshold matter, Plaintiffs seek injunc-tive relief as well as damages. A Rule 23(b)(2) injunctive class does not require the Plaintiff to show predominance, the only Rule 23 element that Defendant contends Plaintiffs cannot show. Accordingly, even if the Court were to agree with Defendant, it would be inappropriate to strike Plaintiffs’ class allegations.

Moreover, the Court finds that the “rigorous analysis” contemplated by the Supreme Court’s recent class certification rulings requires discovery and development of the record. See Amgen Inc. v. Conn. Ret. Plans & Trust Funds, — U.S. —, 133 S.Ct. 1184, 1194, 185 L.Ed.2d 308 (2013) (“[A] court’s class-certification analysis must be ‘rigorous’ and may ‘entail some overlap with the merits of the plaintiffs underlying claim.’ ” (quoting Wal-Mart Stores, Inc. v. Dukes, — U.S. —, 131 S.Ct. 2541, 2551, 180 L.Ed.2d 374 (2011)); see also Mazza v. Am. Honda Motor Co., Inc., 666 F.3d 581, 588 (9th Cir.2012) (“Before certifying a class, the trial court must conduct a rigorous analysis to determine whether the party seeking certification has met the prerequisites of Rule 23.” (internal quotation marks omitted)). Courts that have stricken class allegations at the pleading stage have recognized that the “granting of motions to strike class allegations before discovery and in advance of a motion for class certification is rare” and have only done so in rare occasions where the class definition is obviously defective in some way. Lyons v. Bank of Am., NA, No. 11-1232, 2011 WL 6303390, at *7 (N.D.Cal. Dec. 16, 2011). In fact, in none of the cases Defendant cites have class allegations been struck for a deficiency with respect to predominance. Rather, in these cases, courts have generally struck class allegations (with leave to amend) on the basis that the class definitions were overbroad, and therefore, the classes were not ascertainable. See id. (noting that “the proposed class includes many members who have not been injured”); Tietsworth v. Sears, 720 F.Supp.2d 1123, 1146 (N.D.Cal.2010) (striking class allegations where the proposed class included individuals who had no problems with the purportedly defective product); Sanders v. Apple, Inc., 672 F.Supp.2d 978, 991 (N.D.Cal.2009) (striking class allegations because the proposed class definition “necessarily includes individuals who did not purchase” the accused product). Therefore, the Court will not strike Plaintiffs’ class allegations based on a lack of predominance at the pleading stage. See Vínole v. Countrywide Home Loans, Inc., 571 F.3d 935, 942 (9th Cir.2009) (“Our cases stand for the unremarkable proposition that often the pleadings alone will not resolve the question of class certification and that some discovery will be warranted.”).

VI. CONCLUSION

For the foregoing reasons, the Court GRANTS IN PART and DENIES IN PART Linkedln’s Motion to Dismiss and DENIES the Motion to Strike. The Court grants Plaintiffs leave to amend the *1222FAC, -because the Court does not find undue delay, bad faith or dilatory motive by Plaintiffs, repeated failure to cure deficiencies, or undue prejudice to Linkedln. Further, additional allegations may cure the deficiencies identified in this Order, and therefore amendment would not necessarily be futile. Should Plaintiffs elect to file a Second Amended Complaint curing the deficiencies identified herein, they shall do so within 30 days of the date of this Order. Failure to meet the 30-day deadline to file an amended complaint or failure to cure the deficiencies identified in this Order will result in a dismissal with prejudice. Plaintiffs may not add new causes of action or parties without leave of the Court or stipulation of the parties pursuant to Federal Rule of Civil Procedure 15.

IT IS SO ORDERED

. The putative class covers Linkedln users who used any email address, not just Gmail. See ECF No. 7 ¶ 75. However, the FAC contains only the disclosures that Gmail users received. See id., Fig. 4. Furthermore, the FAC does not state what email service each of the named Plaintiffs used. See id. ¶¶ 13-21. At the hearing, however, Plaintiffs’ counsel represented that all of the named Plaintiffs used a Gmail account to sign up for Linkedln. Tr. 18:13-16.

. A screen shot of this page does not appear in the FAC. However, Defendant requests judicial notice of a screenshot of this page, which the Court grants for the reasons stated in infra Section III.

. In the FAC, Plaintiffs allege that signing up in the first instance is not the only way that users are led to this page. Rather, existing Linkedln users are greeted on the Linkedln homepage by a link that states "See Who You Already Know on Linkedln.” EOF No. 7 ¶ 42. Under that title is a screen that allows the user to input her email address. Like new registrants, this field is pre-populated with the email address affiliated with the user’s Linkedln account. If the user clicks the "Continue” button under the email address, she is directed to the “Why not invite some people?” page. See id. V 44.

. The parties confirmed after the hearing on the instant Motion that Figure 7 of the FAC contains an accurate version of the endorsement email. See ECF No. 42.

. Plaintiffs selectively quote this blog post in the FAC, but the Court takes judicial notice of the entire document, which is available at http://blog.linkedin.com/2009/03/27/how-to-report-abusive-behavior-on-linkedin/, because the document has been incorporated by reference into the FAC. See infra Section II.C.

. In addition, Plaintiffs attach two judicial documents (an order and a complaint) to their Request for Judicial Notice, though they do not explicitly request judicial notice of these documents. See ECF No. 25-2, Exs. E-F. The Court takes judicial notice of these documents. See Disabled Rights Action Comm. v. Las Vegas Events, Inc., 375 F.3d 861, 866 n. 1 (9th Cir.2004) (holding that "undisputed matters of public record” are proper subjects for judicial notice).

. Defendants, in a footnote, move to strike the hacking and tunneling allegations under Rule 12(f), which empowers courts to strike any “redundant, immaterial, impertinent, or scandalous matter,” Fed.R.Civ.P. 12(f). See ECF No. 17 at 31-32 n.9. The Court declines to strike these allegations, as these allegations (though not ultimately meritorious) are highly relevant to Plaintiffs’ Section 502 cause of action.