Zango, Inc. v. Kaspersky Lab, Inc.
Full Opinion (html_with_citations)
Opinion by Judge RYMER; Concurrence by Judge FISHER.
We must decide whether a distributor of Internet security software is entitled to immunity under the safe harbor provision of the Communications Decency Act of 1996, 47 U.S.C. § 230, from a suit claiming that its software interfered with the use of downloadable programs by customers of an online media company.
Zango, Inc. (Zango) is an Internet company that provides access to a catalog of online videos, games, music, tools, and utilities to consumers who agree to view advertisements while they browse the Internet. It brought this action against Kaspersky Lab, Inc., (Kaspersky) which distributes software that helps filter and block potentially malicious software, for improperly blocking Zangoâs software. Kaspersky invoked the protection of § 230(c)(2)(B)
I
Zango has four downloadable software programs â âZango,â âSeekmo,â âHotbar,â and âSpam Blocker Utility.â Zango provides free access to its catalog if customers agree to download and install one of these programs, and to receive online ads that are displayed as they browse the Internet. It also offers a premium version of âHot-barâ and âSpam Blocker Utilityâ for which customers may pay if they wish to access Zangoâs catalog without having to view advertisements.
Kaspersky is the U.S. distributor of Internet security software developed by Kaspersky Lab ZAO, which is based in Russia. Among Kasperskyâs products are âKaspersky Internet Securityâ (KIS) and âKasper
The Kaspersky software classifies Zangoâs programs as adware, a type of malware. Once installed on a userâs computer, adware monitors a userâs Internet browsing habits and causes âpop-up adsâ to appear on a computer screen while the user browses the Internet. Adware can also open links to websites and computer servers that host malware and expose usersâ computers to infection, and can swamp a computerâs memory and slow down computer speed and performance. For these reasons, pop-up ads and adware are unpopular among computer users, and consumers often install security software specifically to block adware.
The Kaspersky software detects malware that may be present in an e-mail, web page, or software program that a computer user is about to download. If the Kaspersky software determines that the download has characteristics that are consistent with malware, the software warns the user that the download contains possible malware. Theoretically (though this is contested), the user of the Kaspersky software then has the option whether to allow or reject the download of the potential malware-carrying program.
The Kaspersky software is designed to communicate via the Internet with online databases and update services that Kasperskyâs Russian affiliate operates in Moscow. The security software is designed to be updated regularly in order to keep malware definitions current, because new forms of malware are constantly being developed. A Kaspersky customer may configure the software to communicate automatically with these online update servers. Customers may also manually instruct their Kaspersky software to communicate with the online update server.
Zango alleges that KIS interferes with Zango customersâ concurrent use of the Zango software in two ways. First, KIS disables the âtoolbarâ feature of Zangoâs software, which provides a bar positioned at the top of the userâs Internet browser page that displays links to relevant advertisersâ websites to users searching for data on a specific subject. Furthermore, Zango asserts, KIS does not actually permit Zango customers to consent to a Zango programâs ongoing operation. Zango avers that each time the Zango program attempts to access the Internet, KIS displays a warning that gives the computer user the option either to block the Zango program or âskipâ the warning. However, while KISâs warning includes an âapply to allâ checkbox that presumably is meant to stop the repeated warnings if the user opts to âskipâ and selects âapply to all,â Zango claims that the checkbox does not work. Consequently, a Zango user running KIS is forced to deal with constant warnings. According to Zango, the inevitable result is that a person using Zango and KIS concurrently gives up, thus permitting the Kaspersky software to block the Zango software.
Zango adds that individuals who were already running KIS and who sought to download Zango software were prevented from doing so by KIS. When a user attempted to download Zango software, KIS displayed a âWeb Anti-Virus Warningâ that advised the user to block the Zango download. The âWeb Anti-Virus Warningâ permitted the user to click âAllowâ to override the warning and download the Zango program; however, once the user
Zango states that it has not experienced similar problems with market leaders in the anti-spyware industry such as McAfee, Norton (Symantec), and Webroot. Rather, Zango contends, these companies advise users of the presence of Zangoâs programs and offer Zango customers the choice to ignore the advisory. Zango attributes the decline in the number of its customers between March 2007 and June 2007 to interference with Zango software by Kasperskyâs software and by other antispyware software that similarly blocks the operation of Zango programs.
The degree of threat posed to users by Zangoâs software is in dispute. Kaspersky contends that Zangoâs software is adware, and possibly spyware. Spyware, which is often installed on a computer without the userâs knowledge or consent, covertly monitors the userâs activities and exposes the user to the risk that his or her passwords and confidential information may be stolen. Zango maintains that it installs its software only upon receiving user consent, and that it provides easy means of uninstalling Zango software from a userâs computer. For users of Microsoftâs Windows operating systems, these include a Zango icon in the system tray in the bottom right corner of a userâs computer screen, which leads to a link where users are informed how to uninstall Zango software, as well as âUninstall Zango Instructionsâ available in the Start/programs menu.
Zango initially brought this action in Washington state court, advancing claims for injunctive relief, tortious interference with contractual rights, violation of the Washington Consumer Protection Act, trade libel, and unjust enrichment. Kaspersky removed the case to federal court. The district court denied Zangoâs request for a temporary restraining order, and Kaspersky subsequently filed a motion to dismiss under Fed.R.Civ.P. 12(b)(6), which the parties and the court treated as a motion summary judgment under Fed. R.Civ.P. 56. Summary judgment was granted on the ground that Kaspersky is entitled to immunity under § 230(c)(2)(B).
Zango has timely appealed.
The heart of Zangoâs appeal is that Congress intended statutory immunity under § 230(c) to apply to Internet content providers, not to companies that provide filtering tools. We think the statute plainly immunizes from suit a provider of interactive computer services that makes available software that filters or screens material that the user or the provider deems objectionable.
Section 230, which provides protection for private blocking and screening of offensive material, is part of the Communications Decency Act of 1996(CDA), Pub.L. 104-104. The CDA was enacted âto control the exposure of minors to indecent materialâ on the Internet. Batzel v. Smith, 333 F.3d 1018, 1026 (9th Cir.2003).
Section 230(c)(2)(B) provides:
(c) Protection for âgood Samaritanâ blocking and screening of offensive material
(2) Civil Liability
No provider or user of an interactive computer service shall be held liable on account ofâ
(B) any action taken to enable or make available to information content providers or others the technical means to restrict access to the material described in paragraph (1).
§ 230(c)(2) & (c)(2)(B).
The material that can be blocked under the exemption includes âmaterial that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected!)]â § 230(c)(2)(A).
The statute defines âinteractive computer serviceâ as âany information service, system, or access software provider that provides or enables computer access by multiple users to a computer server, including specifically a service or system that provides access to the Internet and such systems operated or services offered by libraries or educational institutions.â § 230(f)(2) (emphasis added).
âAccess software providerâ is defined in part as âa provider of software (including client or server software), or enabling tools that do any one or more of the following: (A) filter, screen, allow, or disallow content; (B) pick, choose, analyze, or digest content.â § 230(f)(4)(A), (B).
Thus, a provider of software or enabling tools that filter, screen, allow, or disallow content that the provider or user considers obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable may not be held liable for any action taken to make available the technical means to restrict access to that material, so long as the provider enables access by multiple users to a computer server.
Going beyond the statuteâs plain language, Zango relies on legislative history to show that Congress intended to grant immunity only to content providers. In particular, Zango points to the House Conference Reportâs statement that â[o]ne of the specific purposes of [§ 230] is to overrule Stratton-Oakmont v. Prodigy and any other similar decisions which have treated [Internet service] providers and users as
According protection to providers of programs that filter adware and malware is also consistent with the Congressional goals for immunity articulated in § 230 itself. Five policy objectives are identified. Of these, two read on the issues in this case: âto encourage the development of technologies which maximize user control over what information is received by individuals, families, and schools who use the Internet and other interactive computer services;â and âto remove disincentives for the development and utilization of blocking and filtering technologies that empower parents to restrict their childrenâs access to objectionable or inappropriate online material[.]â § 230(b)(3), (4). As more software is developed to block malware, users will be able to exercise more control over the content that is transmitted to their computers. Thus, affording the safe harbor to providers of anti-malware software aligns with the Congressional policy stated in § 230(b)(3). Malware may also expose users to objectionable content, including links to pornographic websites, or to software that can compromise the userâs privacy, computer security, or identity. Thus, the policy stated in § 230(b)(4), of removing disincentives for the development of software that filters out objectionable or inappropriate material, is served by a safe harbor for providers of malware-filtering software who otherwise fall within the terms of the statute.
This is the first time we have considered this particular application of § 230, although we have previously addressed immunity under § 230(c)(1).
Nevertheless, Zango reads Batzel to imply that the immunity in § 230(c)(2) was intended to reach website operators and Internet service providers who provide people with access to content, but not to companies that provide access to tools or mechanisms for filtering content. For this it relies on our remark in Batzel that § 230(c)(2) âinsulates service providers from claims premised on the taking down of a customerâs posting such as breach of contract or unfair business practices.â 333 F.3d at 1030 n. 14. Zango contends that Kaspersky does not maintain a service on which objectionable material may appear and so cannot âtake downâ a customerâs posting from its service; put differently, as Zango sees it, Kaspersky, which sells filtering software but does not provide access to content, was not an intended beneficiary of statutory immunity. We disagree that we meant to imply this in Batzel. As we recognized, § 230(c)(2) was ânot relevantâ to Batzel, and when we described how § 230(c)(2) âfurther encourages good Samaritansâ we obviously had in mind the circumstances at issue in that case. Id. Batzel involved a website and listserv, and potential immunity under § 230(c)(1). Id. at 1030-31. In that context, our comment about âthe taking down of a customerâs postingâ made sense. By contrast, this case involves providing the technical means for others to restrict access to material Kaspersky finds objectionable, which is a different problem with different potential immunity.
Ill
Kaspersky will receive protection under § 230(c)(2)(B) for civil liability so long as it is a âproviderâ or a âuserâ of âan interactive computer service.â No one has argued that Kaspersky is a âuser.â In Zangoâs view, Kaspersky is not a provider, either.
We agree with the district court that Kaspersky is a âproviderâ of an âinteractive computer serviceâ under the plain terms of § 230(c). Kaspersky âprovidesâ an interactive computer service because it is an âaccess software provider that provides or enables computer access by multiple users to a computer server.â § 230(f)(2). Kaspersky is an âaccess software providerâ because, by providing antimalware software, it âprovide[s] software ... or enabling tools that ... filter, screen, allow, or disallow content.â § 230(f)(4), (f)(4)(A). And, under the literal provisions of § 230(f)(2), Kaspersky âprovides or enables computer access by multiple users to a computer serverâ by providing its customers with online access to its update servers.
Zango argues that merely providing an online update feature does not satisfy § 230(f)(2)âs requirement that the interactive computer service âprovide[ ] or enable[] computer access by multiple users to a computer serverâ because nearly every commercial software application has the capacity to be updated via the Internet. For this reason, it posits, updating capacity does not signify that the application itself is a service that enables access by multiple users to a server. Instead, Zango proposes a gloss on âinteractive computer serviceâ that would construe a computer service as âinteractiveâ only if it enables people to access the Internet or access content found on the Internet. We decline to read the statute so narrowly. As written, § 230 does not limit the definĂ
Zango further maintains that § 230(f)(2) requires Kaspersky to provide users (whom Zango would define as persons who volitionally seek access) with access to content that resides on a server. This argument is unavailing, for Kaspersky does provide users with access to the new malware definition content that is available on its servers. Nor does anything in the statute require users to seek access âvolitionallyâ; § 230(f)(2) merely speaks of providing or enabling computer access âby multiple users to a computer server.â In any event, it is undisputed that Kaspersky users can manually, i.e., volitionally, access the Kaspersky servers for new malware definitions.
In addition, Zango questions whether the method by which Kaspersky updates itself matters at all, given that users could possibly be provided with updates by other means that would not be shielded by § 230(c)(2)(B), for example, by CD. While true, we do not see how the possibility that a similar service could be provided by unprotected means indicates that Kaspersky, which does provide updates that are via the Internet, falls outside the zone of protection.
Neither does clothing Kaspersky with good Samaritan protection open the door to immunity for any and all software providers that offer online updates, as Zango fears. The second requirement of § 230(c) in subparagraph (2)(B) cuts off that slippery slope. By its terms, to qualify for immunity, the interactive computer service must provide the technical means to restrict access to objectionable material. Thus, non-filtering programs such as word processors or video games would not be subject to good Samaritan immunity. The universe is further limited by the definition of âinteractive computer service,â which includes only âinformation service[s], system[s], or access software provider[s].â § 230(f)(2). As we have explained, the reason Kaspersky falls within the statutory definition of âaccess software providerâ is that it is a provider of software that permits users to âfilter, screen, allow, or disallow content.â § 230(f)(4)(A).
IV
Zango argues that § 230(c)(2)(B) cannot apply for the additional reason that Kaspersky, rather than the customer, determines that Zango is malware such that it overrides the customerâs desire to use Zango. In this situation, Zango submits, sub-paragraph (B), which extends immunity to Internet computer services that provide filtering tools to others, is not applicable.
To repeat, § 230(c)(2)(B) provides protection for âany action taken to enable or make available ... the technical means to restrict accessâ to material covered by § 230(c)(2)(A). By providing its anti-malware software and malware definition update services, Kaspersky both enables and makes available the technical means to restrict access to malware. Users choose to purchase, install, and utilize the Kaspersky software. Regardless of whether Zango is correct in its allegation that Kaspersky does not provide users of Kaspersky products a choice to override the security software and download and use Zango, there is no question that Kaspersky has âmade availableâ for its users the technical means to restrict access to items that Kaspersky has defined as malware. Therefore, Kaspersky satisfies the requirements of subsection (B) so long as the blocked items are objectionable material under § 230(c)(2)(A). Zango has waived any argument on appeal that Kaspersky does not consider Zangoâs software to be âotherwise
Zango also suggests that § 230 was not meant to immunize business torts of the sort it presses. However, we have interpreted § 230 immunity to cover business torts. See Perfect 10, Inc. v. CCBill, LLC, 488 F.3d 1102, 1108, 1118-19 (9th Cir.2007) (holding that CDA § 230 provided immunity from state unfair competition and false advertising actions). In any event, what § 230(c)(2)(B) does mean to do is to immunize any action taken to enable or make available to others the technical means to restrict access to objectionable material. If a Kaspersky user (who has bought and installed Kasperskyâs software to block malware) is unhappy with the Kaspersky softwareâs performance, he can uninstall Kaspersky and buy blocking software from another company that is less restrictive or more compatible with the userâs needs. Recourse to competition is consistent with the statuteâs express policy of relying on the market for the development of interactive computer services. § 230(b)(1), (2).
V
As Zango notes, the district court based its dismissal exclusively on subparagraph (B). Zango urges us not to affirm on the alternative basis of subparagraph (A), maintaining that a triable issue of fact exists as to Kasperskyâs good faith. However, we have no need to consider subparagraph (A) immunity because we agree with the district courtâs disposition under sub-paragraph (B).
To the extent that Zango in reply raises a different issue â whether subparagraph (B), which has no good faith language, should be construed implicitly to have a good faith component like subparagraph (A) explicitly has â the argument is waived. See Eberle, 901 F.2d at 818. For present purposes, we note that subparagraph (B) comes with only one constraint: the protection afforded extends only to providers who âenable or make available to ... othersâ the technical means to restrict access to material that either the user or the provider deems objectionable.
Conclusion
The district court correctly held that Kaspersky is a provider of an âinteractive computer serviceâ as defined in the Communications Decency Act of 1996. We conclude that a provider of access tools that filter, screen, allow, or disallow corn-
AFFIRMED.
. All further references are to 47 U.S.C. unless otherwise noted.
. Zango also sought a preliminary injunction against PC Tools, another maker of security software, alleging similar violations of Washington law to those alleged here. See Zango, Inc. v. PC Tools Pty Ltd., 494 F.Supp.2d 1189 (W.D.Wash.2007). The district court denied Zangoâs motion for a preliminary injunction under the standard five-factor test for injunctions and did not rely on immunity from liability under § 230 of the Communications Decency Act, as it did here. See id.
. Zango entered into a consent decree with the Federal Trade Commission in November 2006 following an FTC investigation into Zango's alleged deceptive practices in violation of 15 U.S.C. §§ 45, 52. Zango did not admit to wrongful conduct; however, the decree bars Zango from using any software (except for ââHotbarâ) owned or controlled before January 1, 2006 to display advertising or otherwise communicate with a consumerâs computer. The decree also requires Zango to obtain express consent before installing its programs on consumersâ computers, and to provide customers with an effective means of uninstalling its programs. The earliest the consent order could terminate is 2027.
. The National Business Coalition on E-Commerce and Privacy filed an amicus curiae brief in support of Zangoâs appeal. The AntiSpyware Coalition, Business Software Alliance, CAUCE North America, Inc., The Center for Democracy & Technology, The Electronic Frontier Foundation, McAfee, Inc., PC Tools Holdings Pty Ltd., and Sunbelt Software, Inc. filed an amicus brief in support of affirmance.
. We take it that the reference to the "material described in paragraph (1)â is a typographical error, and that instead the reference should be to paragraph (A), i.e., § 230(c)(2)(A). See 47 U.S.C.A. § 230 n. 1 (West suggesting that âparagraph (1)â is scrivenerâs error referring to âparagraph (A)â). Paragraph (1) pertains to the treatment of a publisher or speaker and has nothing to do with "material,â whereas subparagraph (A) pertains to and describes material.
. We note in this connection that the primary proponents of § 230 in the House stated that they sought to encourage parents to "get relief now from the smut on the Internet by ... purchasing] reasonably priced software that blocks out the pornography on the Internet.â 141 Cong. Rec. H8470 (Aug. 4, 1995) (quoting Representatives Cox and Wyden).
. Section 230(c)(1) states: "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.â
. Although Amicus National Business Coalition on E-Commerce and Privacy takes the position that Zango's software is not objectionable under § 230(c)(2)(A), as did Zango in the district court, Zango does not pursue the issue on appeal except in reply. An amicus curiae generally cannot raise new arguments on appeal, United States v. Gementera, 379 F.3d 596, 607-08 (9th Cir.2004), and arguments not raised by a party in an opening brief are waived. See Eberle v. City of Anaheim, 901 F.2d 814, 818 (9th Cir.1990) ("It is well established in this circuit that '[t]he general rule is that appellants cannot raise a new issue for the first time in their reply briefs.â â). Because Zango has not argued that the statute limits the material a provider of an interactive computer service may properly consider "objectionable,â that question is not before us.
. These subparagraphs declare it to be the policy of the United States "(1) to promote the continued development of the Internet and other inter-active computer services and other interactive media; [and] (2) to preserve the vibrant and competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State regulation.â
. Zango's additional argument in reply that the proposed SPY Act (H.R.964, 110th Cong.(2007)) supports its position is waived. We do not consider it, or Kasperskyâs alternative argument that Zango fails on the merits to state a claim under Washington law.