Roe v. Bernabei & Wachtel Pllc , 85 F. Supp. 3d 89 ( 2015 )


Menu:
  •                           UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    )
    JANE ROE,                        )
    )
    Plaintiff,             )
    )
    v.                          )                  Civil Action No. 14-cv-01285 (TSC)
    )
    BERNABEI & WACHTEL PLLC, et al., )
    )
    Defendants.            )
    )
    MEMORANDUM OPINION
    Plaintiff, who is proceeding under a pseudonym without leave of the Court, was the
    victim of sexual harassment by her supervisor at Phoenix Satellite Television (U.S.) Inc. She
    was able to capture one of the instances of harassment on video, a recording which she shared
    with certain individuals in connection with an EEOC sexual harassment claim. That video
    ultimately became public as a result of her coworkers’ Title VII claims against Phoenix. Plaintiff
    filed this suit against one coworker, Meixing Ren, the lawyer representing her coworkers in their
    Title VII claims, Lynne Bernabei, and Bernabei’s law firm, Bernabei & Wachtel PLLC
    (“B&W”), for copyright infringement, a RICO violation, and a violation of the Computer Fraud
    and Abuse Act (the latter against Ren only). Currently before the Court are Defendants’ motions
    to dismiss the Complaint and Plaintiff’s belated motion for leave to proceed under a pseudonym.
    For the reasons set forth below, the Court GRANTS in part and DENIES in part the motions to
    dismiss and DENIES the motion for leave to proceed under a pseudonym.
    1
    I.      BACKGROUND
    Plaintiff is a journalist who began her career with Phoenix in 2011. (Compl. ¶ 18). She
    was sexually harassed by a supervisor on or about September 6, 2012, and managed to record the
    interaction – in which the supervisor aggressively moved towards her and touched her
    inappropriately – using her iPhone’s video camera, which was hidden in her purse. (Id. ¶¶ 19-
    20). The resulting video was one minute and fifty-three seconds long. (Id. ¶ 24). Plaintiff
    applied for and received a copyright registration of the video in October 2013. (Id. ¶ 25; Ex. 2).
    Following the September 2012 incident, Plaintiff considered bringing a sexual
    harassment claim, although she had no interest in publicly disclosing the video. (Id. ¶ 27).
    Concerned that the video was valuable and not backed up, she attempted to email the video to
    herself but was unsuccessful. (Id. ¶ 28). On September 11, 2012 she contacted several
    coworkers, including Ren, to discuss her options. (Id. ¶ 29). She showed the video to Ren and
    then subsequently met with Ren and a third co-worker offsite. (Id. ¶¶ 30-31). During the
    meeting Ren suggested Plaintiff email him a copy of the video, expressing concerns about
    preserving the evidence and stating that the file would be used for backup purposes only. (Id. ¶
    32). Although Plaintiff agreed, she had trouble transmitting the file both via email and text due
    to its size. (Id. ¶¶ 33-34). Plaintiff stayed at Ren’s home from September 12, 2012 to September
    16, 2012, and before she left she agreed to allow Ren – who again had expressed concerns about
    preserving the video – to back up the video onto his computer. (Id. ¶¶ 35-36).
    Subsequently, Plaintiff retained counsel and filed an EEOC Complaint. She showed the
    video to the EEOC but did not provide them with a copy. (Id. at ¶ 38). She ultimately settled
    her claims against Phoenix, and did not “use, share, display or publicly release the video for any
    purpose after her case was settled.” (Id. ¶ 38-40). She never showed it to Phoenix or any family
    2
    members, but kept the video as a “means of last resort” should she need to prove the truth of her
    allegations. (Id. ¶ 39). Plaintiff does not allege that she had any intention of marketing the
    video, but alleges that had she sought to market it, the fair market value would likely have
    exceeded $10,000. (Id. ¶ 40).
    Plaintiff’s coworkers, including Ren, retained Bernabei and B&W in October 2012 and
    sued Phoenix in this court in July 2013 (the “Ren Suit”). (Compl. ¶ 41). Plaintiff alleges that in
    connection with the Ren Suit, Defendants mounted an aggressive out-of-court public relations
    campaign against Phoenix that included releasing copies of the video to members of the press.
    This resulted in numerous media stories about the harassment at Phoenix, some of which
    referenced the video or made the video publicly available in whole or in part. (Id. ¶¶ 42-57).
    Plaintiff alleges on information and belief that Ren provided the video to Bernabei and B&W.
    (Id. ¶ 58). Plaintiff learned the video had been released when she was contacted by friends and
    family asking about her connection to the video. (Id. ¶ 60).
    Plaintiff’s Complaint alleges four causes of action: In Count I, she alleges direct
    copyright infringement under 17 U.S.C. §§ 101 et seq. (the “Copyright Act”) against all
    Defendants and seeks both damages and injunctive relief. (Compl. ¶¶ 70-75). Count II alleges
    contributory copyright infringement and seeks damages and injunctive relief against all
    defendants. (Id. ¶¶ 76-79). Count III asserts RICO violations against all defendants. (Id. ¶¶ 81-
    94). Finally, Count IV seeks damages and injunctive relief against Ren under the Computer
    Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, for his actions in obtaining the video from
    Plaintiff’s iPhone. (Id. ¶¶ 95-104).
    All Defendants have moved to dismiss the Complaint. Bernabei and B&W argue that
    Counts I and II fail as a matter of law because there is no basis for asserting copyright protection
    3
    over the video and, even if the video was subject to copyright protection, there is no infringement
    based on the fair use doctrine. (Bernabei Mem. 7). 1 Because the RICO claim is based on the
    predicate act of criminal copyright infringement, the failure of the copyright claim would
    necessarily defeat Plaintiff’s RICO claim, which Bernabei and B&W argue fails on additional
    independent grounds. Specifically, Bernabei and B&W argue that Plaintiff lacks standing to
    assert a RICO violation and has otherwise failed to plead a viable RICO claim.
    Ren argues that Plaintiff fails to state a claim on which relief can be granted as to the
    CFAA claim (Ren Mem. 10-18) and argues that the Court lacks subject matter jurisdiction over
    the Complaint in light of Plaintiff’s failure to obtain permission to proceed under a pseudonym,
    permission he argues should not be granted under the facts of the case. (Id. 4-9). In response to
    this argument, Plaintiff has belatedly moved for leave to proceed under a pseudonym (“Pl.
    Mot”).
    II.      LEGAL STANDARD
    “To survive a motion to dismiss, a complaint must contain sufficient factual matter,
    accepted as true, to state a claim to relief that is plausible on its face.” Ashcroft v. Iqbal, 
    556 U.S. 662
    , 678 (2009) (internal quotation marks and citation omitted). “The plausibility standard
    is not akin to a ‘probability requirement,’ but it asks for more than a sheer possibility that a
    defendant has acted unlawfully.” 
    Id. (citation omitted).
    Although a plaintiff may survive a Rule
    12(b)(6) motion even where “recovery is very remote and unlikely,” the facts alleged in the
    complaint “must be enough to raise a right to relief above the speculative level.” Bell Atl. Corp.
    v. Twombly, 
    550 U.S. 544
    , 555–56 (2007) (internal quotation marks and citation omitted). The
    1
    Although Bernabei and B&W and Ren filed separate motions to dismiss, each joins and adopts the other’s motion.
    For ease of reference, the Court will refer to the motions as “Bernabei Mem.” and “Ren Mem.” but will apply the
    arguments to all Defendants as necessary. The Court refers to Plaintiff’s oppositions to the respective motions as
    “Pl. Bernabei Opp’n” and “Pl. Ren Opp’n.”
    4
    Court need not accept as true conclusory allegations or those which merely recite the elements of
    a cause of action. 
    Iqbal, 556 U.S. at 678
    (quoting 
    Twombly, 550 U.S. at 555
    ). In resolving a
    Rule 12(b)(6) motion, the Court may consider “only the facts alleged in the complaint, any
    documents either attached to or incorporated in the complaint and matters of which [the Court]
    may take judicial notice.” E.E.O.C. v. St. Francis Xavier Parochial Sch., 
    117 F.3d 621
    , 624
    (D.C. Cir. 1997). 2
    III.      ANALYSIS
    A. Plaintiff’s Motion for Leave to Proceed Under a Pseudonym
    Ren argues that the Court must dismiss the action pursuant to Federal Rules of Civil
    Procedure 12(b)(1) for lack of subject matter jurisdiction because Plaintiff never obtained (or
    sought) leave to proceed under a pseudonym. (Ren Mem. 4). Although the District of Columbia
    Circuit Court has not yet addressed this issue, Ren cites cases from several other circuits in
    which courts held that “the failure of a plaintiff to seek leave to proceed under a pseudonym at
    the time the federal complaint is filed precludes the district court from exercising subject matter
    jurisdiction.” (Id. 5) (citing W.N.J. v. Yocom, 
    257 F.3d 1171
    , 172 (10th Cir. 2001) (“When a
    party wishes to file a case anonymously or under a pseudonym, it must first petition the district
    court for permission to do so.”) and Citizens for a Strong Ohio v. Marsh, 123 Fed. Appx. 620,
    637 (6th Cir. 2005) (“Failure to seek permission to proceed under a pseudonym is fatal to an
    anonymous plaintiff’s case….”)). Ren argues that because Plaintiff did not timely move for
    leave to proceed under a pseudonym, this Court does not know who the Plaintiff is, and thus this
    Court cannot exercise subject matter jurisdiction. (Ren Mem. 6).
    2
    The Court’s authority to consider material beyond the pleadings is broader in connection with a motion to dismiss
    for lack of subject matter jurisdiction under Fed. R. Civ. P. 12(b)(1). Scolaro v. D.C. Bd. of Elections & Ethics, 
    104 F. Supp. 2d 18
    , 22 (D.D.C. 2000) (citing Herbert v. Nat'l Acad. of Scis., 
    974 F.2d 192
    , 197 (D.C. Cir. 1992)).
    5
    By her motion, Plaintiff appears to concede that she must obtain leave from the Court to
    proceed anonymously (Pl. Ren Opp’n 2-3), and argues in her motion to do so that the Court
    should grant that permission in order to protect against further invasions of her privacy. (Pl.
    Mot. 2). Plaintiff asserts that anonymity is called for because sexual harassment is a matter of a
    “sensitive and highly personal nature.” (Id. passim). Plaintiff does not allege that she will be
    subjected to retaliation or that publication of her name will harm any third parties, but that she
    hopes to avoid creating “yet another record of an association of [her] name with the video of her
    sexual assault.” (Id. at 2).
    “It is within the discretion of the district court to grant the ‘rare dispensation’ of
    anonymity.” U.S. v. Microsoft Corp., 
    56 F.3d 1448
    , 1464 (D.C. Cir. 1995); see also Qualls v.
    Rumsfeld, 
    228 F.R.D. 8
    , 10-11 (D.D.C. 2005) (anonymous litigant may proceed when the court
    determines that “the need for anonymity outweighs the general presumption that parties’
    identities are public information and the risk of unfairness to the opposing party”) (internal
    quotations omitted) (citation omitted). Compelling circumstances may be present when
    “identification creates a risk of retaliatory physical or mental harm,” “anonymity is necessary to
    preserve privacy in a matter of a sensitive and highly personal nature,” or in circumstances under
    which the would-be anonymous party would be “compelled to admit criminal behavior.” 
    Qualls, 228 F.R.D. at 10-11
    (collecting cases) (internal citations and alterations omitted). In determining
    whether to grant leave to proceed anonymously, the Court should consider
    (1) whether the justification asserted by the requesting party is merely to avoid the
    annoyance and criticism that may attend any litigation or is to preserve privacy in
    a matter of a sensitive and highly personal nature; (2) whether identification poses
    a risk of retaliatory physical or mental harm to the requesting party or even more
    critically, to innocent non-parties; 3 (3) the ages of the persons whose privacy
    interests are sought to be protected; (4) whether the action is against a
    3
    Plaintiff essentially merges factors one and two by asserting she will be injured only to the extent that attention is
    called to a matter of a highly sensitive and personal nature.
    6
    governmental or private party; and (5) the risk of unfairness to the opposing party
    from allowing an action against it to proceed anonymously.
    Nat’l Ass’n of Waterfront Employers v. Chao, 
    587 F. Supp. 2d 90
    , 99 (D.D.C. 2008). The last
    three factors are relatively straightforward. Plaintiff was an adult at the time of the events in
    question and is suing private individuals and entities, factors which weigh against anonymity.
    Defendants do not assert that their ability to defend this lawsuit against an anonymous plaintiff
    will unduly prejudice them, which weighs in favor of anonymity.
    Personal embarrassment is normally not a sufficient basis for permitting anonymous
    litigation. 
    Chao, 587 F. Supp. 2d at 100
    (citing Qualls); see also Doe v. Frank, 
    951 F.2d 320
    ,
    324 (11th Cir. 1992) (plaintiff who would have to disclose alcoholism not permitted to proceed
    anonymously despite social stigma and embarrassment). Sexual harassment is not typically
    considered a matter so highly personal as to warrant proceeding by pseudonym. See 
    Chao, 587 F. Supp. 2d at 99
    n.8 (“Matters of a sensitive and highly personal nature include those dealing
    with birth control, abortion, homosexuality or the welfare rights of illegitimate children or
    abandoned families”); 4 S. Methodist Univ. Ass’n of Women Law Students v. Wynne & Jaffe, 
    599 F.2d 707
    , 712-13 (5th Cir. 1979) (law students’ allegations of sex discrimination against law
    firms did not warrant anonymity). Although some courts have permitted sexual assault victims
    to proceed via a pseudonym in order to protect their privacy, those cases have emphasized the
    importance of doing so in order to avoid deterring other victims from “reporting such crimes.”
    Doe No. 2 v. Kolko, 
    242 F.R.D. 193
    , 195 (E.D.N.Y. 2006); Doe v. Evans, 
    202 F.R.D. 173
    , 176
    (E.D. Pa 2001) (“the public has a interest in protecting the identities of sexual assault victims so
    that other victims will feel more comfortable suing to vindicate their rights, especially where law
    4
    The Court does not necessarily endorse the notion that any of these matters are so shameful as to warrant
    anonymity but considers the brevity of the list instructive in identifying the narrow category of cases in which
    anonymity is deemed proper.
    7
    enforcement officers are involved”). Another judge in this District permitted an adult plaintiff to
    anonymously sue the club at which she was sexually assaulted for serving her alcohol even
    though she was underage, crediting the plaintiff’s concern that “graphic material about the
    assault will be discussed…including details of the sexual assault, plaintiff’s genital anatomy,
    hospital examinations, testing, and medications for various sexually transmitted diseases, and
    consequent psychiatric treatment.” Doe v. De Amigos, LLC, No. 11-1755 (ABJ), slip op. 3
    (D.D.C. Apr. 30, 2012).
    Those concerns are less applicable here. Plaintiff’s Complaint is not against her assailant
    and will likely not involve the graphic details of her assault, but is instead at least one step
    removed from the actual events of September 6, 2012. Moreover, Plaintiffs’ name is already
    publicly associated with the video and the underlying incident, through pleadings and motion
    practice in the Ren Suit, Ren et al. v. Phoenix Satellite Television (US), Inc., No. 13-cv-1110
    (TSC). The Complaint in that action identifies Plaintiff by name, see Complaint (ECF No. 1),
    13-cv-1110 (July 19, 2013), as do briefs related to a subpoena served by the Ren Suit plaintiffs
    (represented by Bernabei) on Lexero Law, counsel for Plaintiff in this action. See Plaintiffs’
    Motion to Compel (ECF No. 28), 13-cv-1110 (July 11, 2014); Lexero Law’s Opposition to
    Motion to Compel (ECF No. 30), 13-cv-1110 (July 22, 2014) (“…despite Ms. Wang’s copyright
    claims being unusually strong…”)). In light of these facts, Plaintiff’s motion for leave to
    proceed via a pseudonym is denied. 5 Plaintiff must proceed in this action under her true name. 6
    5
    Because the Court holds that the need for anonymity is outweighed by other factors, the Court similarly declines to
    order the entire matter sealed.
    6
    Although the rule in some circuits is that a failure to obtain leave to proceed anonymously deprives the Court of
    subject matter jurisdiction to adjudicate the merits of the claim, 
    W.N.J., 257 F.3d at 1172
    , this Circuit has no such
    rule, and the Court will resolve all of the pending motions before it. In this case, perhaps unlike others involving
    pseudonymous parties, Defendants and the Court know who the Plaintiff is and can adequately address the existence
    of subject matter jurisdiction which, other than the issue of the Plaintiff’s name, is not in doubt.
    8
    B. Plaintiff’s Copyright Claims
    “A plaintiff seeking to establish copyright infringement must prove ‘(1) ownership of a
    valid copyright, and (2) copying of constituent elements of the work that are original.’”
    Stenograph LLC v. Bossard Assoc., Inc., 
    144 F.3d 96
    , 99 (D.C. Cir. 1988) (quoting Feist Pubs.,
    Inc. v. Rural Tel. Serv. Co., Inc., 
    499 U.S. 340
    , 361 (1991). To be copyrightable, “a work must
    be original to the author,” meaning that it was independently created and “possesses at least
    some minimal degree of creativity.” 
    Feist, 499 U.S. at 345
    . Because copyright protection
    extends only to the “means of expressing” facts, the underlying facts themselves are not
    protected. Greaver v. Nat’l Ass’n of Corporate Directors, 
    1997 WL 34605245
    , at *4 (D.D.C.
    Nov. 19, 1997) (citing Feist). Although the creative judgments necessary to create
    copyrightability may be de minimis, the presence of some creative judgment is still required.
    
    Feist, 499 U.S. at 345
    (holding that a telephone directory which simply provided phone numbers
    in ordinary alphabetical order was not sufficiently creative to be copyrightable).
    So long as it is sufficiently creative, a compilation of non-copyrightable factual matter
    may itself be copyrightable if it “is a work formed by the collection and assembling of
    preexisting materials or of data that are selected, coordinated, or arranged in such a way that the
    resulting work as a whole constitutes an original work of authorship.” 17 U.S.C. § 101; see, e.g.,
    Atari Games Corp. v. Oman, 
    979 F.2d 242
    , 244-45 (D.C. Cir. 1992) (assuming video game
    consisted of geometric schemes which were per se not original, compilation of schemes in
    particular order satisfied creativity requirement). Depictions of true, factual, scenes in
    photographs or film may be protected by copyright in light of the “creative decisions involved in
    producing a photograph” or video. See e.g., Los Angeles News Serv. v. Tullo, 
    973 F.2d 791
    , 794
    (9th Cir. 1992) (raw video footage of the sites of airplane crash and train wreck were sufficiently
    9
    original to be copyrightable); Time Inc. v. Bernard Geis Assocs., 
    293 F. Supp. 130
    , 142-43
    (S.D.N.Y. 1968) (Zapruder film of Kennedy assassination reflected creative decisions such that it
    was copyrightable). Copyright law similarly protects audio recordings as reflecting creative
    judgments on processing and compiling sounds. Shaab v. Kleindienst, 
    345 F. Supp. 589
    (D.D.C.
    1972).
    Defendants argue that “there is no original work and not even a minimal amount of
    authorship, creativity, or originality in the cell phone video recording.” (Bernabei Mem. 9).
    Plaintiff counters that the video exists by “virtue of quick and creative thinking,” (Compl. ¶ 2)
    and reflects “quick creative judgments as to the sight and sounds the phone would likely record
    by leaving the phone in her purse.” (Id. ¶ 21). 7
    To the extent these allegations suffice to nudge the video across the (low) threshold of
    creativity, they do so just barely. However, at this stage of the litigation, the Court must accept
    the allegations of creativity as true. Due to the “subtle” nature of assessing whether a work is
    copyrightable, “determination at the pleading stage will often be impossible.” Mid Am. Title Co.
    v. Kirk, 
    991 F.2d 417
    , 422 (7th Cir. 1993) (explaining that “[t]hese matters are more properly
    addressed at the summary judgment stage . . . [where] the full range of information may be
    evaluated by the court”). At the pleading stage, a party alleging copyright infringement need
    only claim ownership over the copyrighted work, that the party has registered the work in
    accordance with statute, and that the defendant infringed. See Warren v. John Wiley & Sons,
    Inc., 
    952 F. Supp. 2d 610
    , 617 (S.D.N.Y. 2013) (citing Mid Am. Title 
    Co., 991 F.2d at 421-22
    );
    7
    Plaintiff expands her description of her creative judgments in her opposition to Defendants’ motion. (Pl. Opp’n at
    3-4). It is well-settled that parties may not amend their pleadings through opposition papers, Arbitraje Casa de
    Cambio, S.A. de C.V. v. U.S. Postal Serv., 
    297 F. Supp. 2d 165
    , 170 (D.D.C. 2003), and the Court accords no weight
    to these more detailed allegations, which are particularly flimsy because they merely recite aspects of creativity from
    case law, some of which are inapplicable to the facts of this case. (Pl. Opp’n at 3).
    10
    Loud Records LLC v. Minervini, 
    621 F. Supp. 2d 672
    , 677 (W.D. Wis. 2009). Plaintiff has
    adequately alleged ownership of a valid copyright registration (Compl. ¶ 25) and copying of the
    piece, and has therefore adequately alleged infringement. 8 Accordingly, Defendants’ motions to
    dismiss Counts I and II of the Complaint is denied.
    C. Plaintiff’s RICO Claim
    To adequately allege a civil RICO claim, Plaintiff must allege “(1) conduct (2) of an
    enterprise (3) through a pattern (4) of racketeering activity.” 9 Pyramid Secs. Ltd. v. IB
    Resolution, Inc., 
    924 F.2d 1114
    , 1116 (D.C. Cir. 1991). Plaintiff must also establish standing to
    assert a RICO claim by alleging an injury to her “business or property,” of which Defendants’
    violation of RICO was both the “but for” and proximate cause. Holmes v. Secs. Investor
    Protection Corp., 
    503 U.S. 258
    , 268 (1992). Defendants argue that Plaintiff has failed to allege
    injury to her business and property because her only injury is “personal displeasure associated
    with the disclosure of what she considers to be ‘private’ information in her video (without any
    economic losses derived therefrom).” (Bernabei Mem. 31). This misstates Plaintiff’s claim,
    8
    Defendants raise a fair use defense to Plaintiff’s infringement claims. This defense is premature and the Court will
    not address it on a Rule 12(b)(6) motion. “Fair use is a mixed question of law and fact,” Harper & Row Publishers,
    Inc. v. Nation Enters., 
    471 U.S. 539
    , 560 (1985), and adjudicating a fair use defense involves a fact-intensive
    inquiry. See Katz v. Chevaldina, 
    900 F. Supp. 2d 1314
    , 1316 (S.D. Fla. 2012) (“[T]he general rule [is] that fair use
    defenses are not ripe for determination before the summary judgment stage.”); Browne v. McCain, 
    612 F. Supp. 2d 1125
    , 1130 (C.D. Cal. 2009) (“[I]n light of a court’s narrow inquiry at [the motion to dismiss] stage and limited
    access to all potentially relevant and material facts needed to undertake the [fair use] analysis, courts rarely analyze
    fair use on a 12(b)(6) motion.”). Bernabei and B&W point to instances where Courts have granted a Rule 12(b)(6)
    motion on the basis of a fair use defense (Bernabei Mem. 10 n. 11), but in those cases the pleadings included
    sufficient facts, which is not the case here. See, e.g., Brownmark Films, LLC v. Comedy Partners, 
    682 F.3d 687
    (7th
    Cir. 2012) (treating a motion to dismiss based on fair use granted by the district court as a motion for summary
    judgment and affirming because all the evidence needed to assess the defense had been provided).
    9
    “Racketeering activity” includes criminal infringement of a copyright. 18 U.S.C. 1961(1)(B). Criminal copyright
    infringement is willful civil infringement with an intent to profit. 17 U.S.C. § 506(a)(1). Defendants vigorously
    contest the adequacy of the allegations that Plaintiff owns a valid copyright in the video but do not separately argue
    that the additional elements of a criminal infringement claim have not been adequately asserted. The Court will
    assume for purposes of this motion that criminal infringement is adequately alleged.
    11
    which asserts the loss of the video’s “potential economic value,” not any emotional distress.
    (Compl. ¶ 86).
    Although the misuse of intellectual property can suffice to confer standing for a RICO
    claim, see, e.g., Bryant v. Mattel, Inc., No. 04-9049, 
    2010 WL 3705668
    , at *11 (C.D. Cal. Aug.
    2, 2010) (“Lost profits can be recoverable if they are concrete and deprived by the wrongful
    conduct, instead of an intervening event or market condition”), deprivation of the exclusive
    possession of that intellectual property is not enough – to prevail on her claim Plaintiff would
    ultimately have to show a “concrete example of how [she] would have exploited [her] exclusive
    possession” of the video. Mattel, Inc. v. MGA Entm’t, Inc., 
    782 F. Supp. 2d 911
    , 1020-21 (C.D.
    Cal. 2011) (denying summary judgment on claims deemed sufficient to survive a motion to
    dismiss in Bryant); see also Lopez v. Council on Am.-Islamic Relations Action Network, Inc., 
    657 F. Supp. 2d 104
    , 110 (D.D.C. 2009) (“The harm must be concrete and actual or imminent, not
    conjectural or hypothetical.”). Plaintiff has alleged that she had no intention of ever showing the
    video to another person (See Compl. ¶¶ 39-40), rendering implausible her allegation that she was
    injured by loss of the video’s “potential economic value.” (Id. ¶ 86).
    The Court need not rule on the issue of standing however, because even were the Court to
    find that Plaintiff has standing to bring her RICO claim, that claim is deficient because it fails to
    allege a pattern of racketeering activity. A “pattern” of activity includes two elements:
    “relatedness and continuity.” W. Assocs. LP, ex rel. Ave. Assocs. LP v. Mkt. Square Assocs., 
    235 F.3d 629
    , 633 (D.C. Cir. 2001). Conduct is related when “it embraces criminal acts that have the
    same or similar purposes, results, participants, victims, or methods of commission, or otherwise
    are interrelated by distinguishing characteristics and are not isolated events.” H.J. Inc. v. NW
    Bell Tel. Co., 
    492 U.S. 229
    , 240 (1989) (citation omitted). Continuity may mean either “a closed
    12
    period of repeated conduct, or…past conduct that by its nature projects into the future with a
    threat of repetition.” Id at 241. Applying these definitions, the D.C. Circuit has held that where
    there was an allegation of a “single scheme” entailing “but a single discrete injury” suffered by a
    small number of victims, it was “virtually impossible” to state a RICO claim. Edmonson &
    Gallagher v. Alban Towers Tenants Ass’n, 
    48 F.3d 1260
    , 1265 (D.C. Cir. 1995).
    Plaintiffs in Edmonson were property developers whose attempts to purchase a residential
    building were repeatedly thwarted by the actions of defendants – the tenants of the building and
    their attorneys. In evaluating the adequacy of the RICO allegations, the Court adopted the Third
    Circuit’s multi-factor test, which includes consideration of “the number of unlawful acts, the
    length of time over which the acts were committed, the similarity of the acts, the number of
    victims, the number of perpetrators, and the character of the unlawful activity ... as they bear
    upon the separate questions of continuity and relatedness.” 
    Id. (citing Kehr
    Packages, Inc. v.
    Fidelicor, Inc., 
    926 F.2d 1406
    , 1411-13 (3d Cir. 1991). The Court gave great weight to the fact
    that all of defendants’ predicate acts were in furtherance of one goal: preventing the sale of the
    building. 
    Id. 10 Applying
    the Kehr test as adopted in Edmonson, the D.C. Circuit held that a business
    dispute between two limited partners involving multiple acts of fraud and subsequent attempts to
    cover it up over an 8-year period did not amount to a pattern of racketeering activity. See W.
    
    Assocs., 235 F.3d at 634
    . The Court held that the plaintiff could not establish a pattern simply by
    10
    The Court also distinguished Beauford v. Helmsley, 
    865 F.2d 1386
    , vacated for further consideration in light of
    H.J., 
    492 U.S. 914
    , adhered to, 
    893 F.2d 1433
    (1989). Plaintiffs in Beauford were tenants and apartment owners in
    a 12,000 unit, 51-building apartment complex in the Bronx that was converted into 
    condominiums. 865 F.2d at 1388
    . Plaintiffs alleged that in connection with the conversion, defendants mailed offering circulars containing
    fraudulent misrepresentations to over 8,000 residents. See 
    id. The Second
    Circuit viewed the number of potential
    victims and the potential for repetition (at the time of the court’s decision 40% of the units remained unsold, making
    future mailings likely) as sufficient to adequately allege a pattern. 
    Id. at 1392.
    13
    subdividing an ongoing dispute into separate “schemes” when the “four schemes [were] so
    similar in nature and purpose (i.e., they involve contested bookkeeping entries), and they resulted
    in a single harm rather than separate injuries.” Id at 635. Similarly, courts in this District have
    dismissed RICO complaints asserting activity related to the foreclosure of a single plaintiff’s
    property. See e.g., Busby v. Capital One, N.A., 
    772 F. Supp. 2d 268
    , 282 (D.D.C. 2011), Zernik v.
    U.S. Dep’t of Justice, 
    630 F. Supp. 2d 24
    , 27 (D.D.C. 2009). In contrast, courts have permitted
    claims to go forward when the plaintiff alleged that defendants engaged in mail and wire fraud
    “to defraud three separate Plaintiffs on three distinct occasions in three different ways,” Lu v.
    Lezell, --- F. Supp. 3d ---, No. 11-1815, 
    2014 WL 2199314
    at *9 (D.D.C. May 27, 2014)
    (denying defendant’s motion for summary judgment as to RICO claims), and where the plaintiff
    alleged that multiple victims were defrauded by defendant’s false fundraising materials. Feld
    Entm’t, Inc. v. Am. Soc. for the Prevention of Cruelty to Animals, 
    873 F. Supp. 2d 288
    , 312-13
    (D.D.C. 2012).
    As in Edmonson and W. Assocs., here there is but a single victim of Defendants’ alleged
    racketeering activity: Plaintiff. There is a single goal to the racketeering activity: an increased
    likelihood of success in the Phoenix litigation, and a single (albeit repetitive) 11 injury:
    infringement of Plaintiff’s intellectual property rights. While it is possible that Defendants may
    continue to utilize the video in connection with their advocacy against Phoenix (the Court notes
    11
    Plaintiff alleges there is an ongoing threat of repetition because “the predicate acts are part of Bernabei and
    B&W’s regular way of doing business” in that Bernabei and B&W “aggressively inject their legal work in the public
    sphere on many of their cases” and “have made it clear that they do not accept Roe’s copyrights in her video file.”
    (Compl. ¶¶ 93). However, Bernabei and B&W’s “regular way of doing business” is alleged to be aggressive
    publicity, not criminal copyright infringement, and there is no evidence that, once informed of Plaintiff’s assertion
    of her property rights, Defendants continued their “regular way of doing business” in a manner that caused any
    additional infringement. All of the alleged infringement took place prior to Plaintiff retaining counsel in September
    2013. (Id. ¶ 61). The examples of more recent press coverage do not include the video in whole or in part. (Id. ¶
    65). The threat of continuing predicate acts is therefore hypothetical and speculative at best, and insufficient to
    establish continuity. See Bridges v. Lezell, PC, 
    842 F. Supp. 2d 261
    , 266 (D.D.C. 2012).
    14
    that Plaintiff has not alleged that Bernabei and B&W have made any new use or distribution of
    the video since September 2013), any repetition will be in furtherance of the same goal against
    the same victim. The D.C. Circuit’s guidance in Edmonson mandates the conclusion that
    Plaintiff has failed to establish a “pattern” of racketeering activity.
    Because Plaintiff does not allege a “pattern” of racketeering activity, 12 Count Three will
    be dismissed.
    D. The Computer Fraud and Abuse Act
    The Computer Fraud and Abuse Act, 18 U.S.C. § 1030, is intended “primarily to deter
    computer hacking.” Lewis-Burke Assocs., LLC v. Widder, 
    725 F. Supp. 2d 187
    , 194 (D.D.C.
    2010) (Facciola, M.J.). The Act provides a private cause of action for any person “suffering
    damage or loss” from a violation of the act. 18 U.S.C. § 1030(g). Plaintiff alleges a violation of
    18 U.S.C. § 1030(a)(2)(c), which prohibits “intentionally accessing a computer without
    authorization or exceeding authorized access, and thereby obtaining ... information from any
    protected computer.” 
    Widder, 725 F. Supp. 2d at 191
    (citing 18 U.S.C. § 1030(a)(2)(C))
    (alterations omitted). The statute defines “exceeds authorized access” as “to access a computer
    with authorization and to use such access to obtain or alter information in the computer that the
    accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Alternatively, Plaintiff
    12
    Defendants devoted substantial resources in their brief to argue that Plaintiff did not adequately allege an
    enterprise. (Bernabei Mem. 36). Specifically they argue that the allegations are deficient in that Plaintiff did not
    allege an enterprise distinct from the defendants themselves. (Id.). This argument collapses two distinct, but
    related, elements of a RICO claim – whether there is an enterprise and whether each defendant is alleged to have
    “conducted” the affairs of that enterprise. Defendants’ distinction argument applies most directly when a corporate
    entity, e.g. a law firm (Compl. ¶ 88), is alleged to be an enterprise: it cannot also be liable for conducting its own
    affairs. Yellow Bus Lines, Inc. v. Drivers, Chauffeurs & Helpers Local Union 639, 
    883 F.2d 132
    , 140 (D.C. Cir.
    1989); Prunte v. Universal Music Grp., 
    484 F. Supp. 2d 32
    , 42 (D.D.C. 2007); McMurtry v. Brasfield, 
    654 F. Supp. 1222
    , 1226 (E.D. Va. 1987). The Court need not address whether Plaintiff adequately alleged an enterprise because
    Plaintiff has not even attempted to allege that the Defendants “conducted” the affairs of either alleged enterprise.
    (See, Compl. ¶ 83 (“[t]o demonstrate liability under RICO, a plaintiff must prove that there is ‘an enterprise,’
    engaging in ‘racketeering activity’ that occurs in a ‘pattern.’”)). Similarly, because there is no viable RICO claim,
    the Court will not address Defendants’ argument that the Noerr-Pennington doctrine supplies an alternative basis for
    dismissing the RICO claims.
    15
    alleges a violation of 18 U.S.C. § 1030(a)(4), which provides for criminal liability for anyone
    who “knowingly and with intent to defraud, accesses a protected computer without authorization,
    or exceeds authorized access, and by means of such conduct furthers the intended fraud and
    obtains anything of value.” Whether Plaintiff has adequately alleged a violation of either section
    turns on whether Ren exceeded “authorized access.”
    The Circuits are divided on what it means to exceed authorized access. The Fifth and
    Seventh Circuits, in cases where employees misused data to which they had access in the course
    of their employment, have held that accessing a computer while “violating the duty of loyalty or
    acting with interests adverse to the employer voids the authorization an employee may have to
    access the computer” and exceeds authorized access. 
    Widder, 725 F. Supp. 2d at 192
    (citing Int’l
    Airport Ctrs., LLC v. Citrin, 
    440 F.3d 418
    , 421 (7th Cir. 2006) (internal citations omitted)); see
    also United States v. John, 
    597 F.3d 263
    , 272 (5th Cir. 2010) (“Access to a computer and data
    that can be obtained from that access may be exceeded if the purposes for which access has been
    given are exceeded”). Under the narrower view in the Ninth Circuit, which is shared by a
    number of other Circuits, a person “exceeds authorized access” when he or she “accesses
    information on the computer that the person is not entitled to access.” LVRC Holdings LLC v.
    Brekka, 
    581 F.3d 1127
    , 1133 (9th Cir. 2009); see also, WEC Carolina Energy Solutions, LLC v.
    Miller, 
    687 F.3d 189
    , 204 (4th Cir. 2012) (“Similarly, we conclude that an employee “‘exceeds
    authorized access’” when he has approval to access a computer, but uses his access to obtain or
    alter information that falls outside the bounds of his approved access….Notably, neither of these
    definitions extends to the improper use of information validly accessed.”) (internal citations
    omitted) (emphasis in original); Amphenol Corp. v. Paul, 591 Fed. Appx. 34, 35-36 (2d Cir.
    16
    2015) (affirming summary judgment for employee where employer presented no evidence that
    employee accessed any data outside the scope of his authorization).
    The D.C. Circuit has not ruled on the matter, although Magistrate Judge Facciola of this
    District adopted the narrower Brekka interpretation in Lewis-Burke Associates LLC v. Widder,
    
    725 F. Supp. 2d 187
    , 194 (D.D.C. 2010) (“Exceeds authorized access should not be confused
    with exceeds authorized use”) (quoting Bell Aerospace Servs., Inc. v. U.S. Aero Servs., Inc., 
    690 F. Supp. 2d 1267
    , 1272 (M.D. Ala. 2010)).
    The Citrin line of cases involved facts which are not analogous to those at issue here.
    Those cases address circumstances in which employees knowingly violated internal employer
    policies related to the use of data, either unlawfully, or in violation of their employment
    agreement. See, e.g. 
    Citrin, 440 F.3d at 420
    (employee, “in violation of his employment
    contract,” destroyed “files that incriminated himself and other files that were also the property of
    his employer, in violation of the duty of loyalty that agency law imposes on an employee”);
    United States v. Rodriguez, 
    628 F.3d 1258
    , 1263 (11th Cir. 2010) (distinguishing Brekka in
    noting that Brekka’s employer “had no policy prohibiting employees from emailing company
    documents to personal email accounts, and there was no dispute that Brekka had been authorized
    to obtain the documents or to send the emails while he was employed”). 13 The Court agrees that
    the Brekka line of cases adopts the proper interpretation of the plain meaning of the statute,
    which speaks only of authorized “access” to data and not of use. 
    Widder, 725 F. Supp. 2d at 13
      Plaintiff alleges that Ren intended to defraud her when he copied the video (Compl. ¶¶ 98-99) and elaborates upon
    that allegation in her Opposition. (Pl. Opp’n 6-8). As noted previously, the Court disregards allegations not within
    the Complaint. Arbitraje Casa de Cambio, S.A. de 
    C.V., 297 F. Supp. 2d at 170
    . Even if the Court considered these
    additional allegations, the allegation of fraud is facially implausible, because it would require Ren to have had the
    intention in September 2012 of making the video public with the help of an attorney he retained in October 2012 in
    furtherance of litigation he did not commence until July 2013. The conclusory allegation that Ren acted in
    furtherance of a fraud (Compl. ¶ 99) by “accessing the video file in a media-playable form” (Id. ¶ 102) does not
    plausibly support an inference of adverse intent given that timeline.
    17
    194; 
    Miller, 687 F.3d at 204
    ; Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 
    648 F.3d 295
    ,
    304 (6th Cir. 2011). Moreover, the CFAA is a criminal statute and the Court is therefore bound
    to construe it in accordance with the rule of lenity, which requires the Court to choose the more
    lenient of two possible interpretations. 
    Miller, 687 F.3d at 205-06
    (citing United States v.
    Universal C.I.T. Credit Corp., 
    344 U.S. 218
    , 221-22 (1952)). Here, Plaintiff alleges that Ren
    made a backup copy of the video with her assent. It is Ren’s use of the video some 10 months
    later that Plaintiff alleges was unauthorized and which forms the basis of this suit. Because Ren
    did exactly what Roe permitted him to do at the time he copied the video, Ren did not “exceed
    authorized access” within the meaning of the CFAA. Plaintiff’s claim under the Act is therefore
    dismissed. 14
    IV.      CONCLUSION
    For the foregoing reasons, the Court grants in part Defendants’ motions and dismisses
    without prejudice Counts Three and Four of the Complaint for failure to state a claim. The Court
    denies Defendants’ motions as to Counts One and Two. Plaintiff’s motion for leave to proceed
    under a pseudonym or to seal this matter is denied. Plaintiff shall file a notice by April 2, 2015,
    confirming whether or not she intends to proceed with this lawsuit utilizing her true name. If her
    intent is to proceed, the notice shall contain her true name and address. Future filings in this
    matter will be captioned using her true name instead of “Jane Roe.” If Plaintiff gives notice of
    her intent to proceed with this lawsuit and provides the necessary information, Defendants shall
    respond to Plaintiff's complaint within 14 days of Plaintiff's filing.
    A corresponding Order will issue separately.
    Dated: March 26, 2015
    14
    Because the Court finds that Ren did not exceed authorized access, it does not reach Ren’s argument that Plaintiff
    did not suffer the threshold amount of damage or loss.
    18
    

Document Info

Docket Number: Civil Action No. 2014-1285

Citation Numbers: 85 F. Supp. 3d 89

Judges: Judge Tanya S. Chutkan

Filed Date: 3/26/2015

Precedential Status: Precedential

Modified Date: 1/13/2023

Authorities (42)

Bell Aerospace Services, Inc. v. U.S. Aero Services, Inc. , 690 F. Supp. 2d 1267 ( 2010 )

W.N.J. v. Yocom , 257 F.3d 1171 ( 2001 )

Bill W. Doe v. Anthony M. Frank, Postmaster General of the ... , 951 F.2d 320 ( 1992 )

roslyn-o-beauford-joseph-c-palmeto-maria-valle-joseph-decesare-jr , 893 F.2d 1433 ( 1989 )

roslyn-o-beauford-joseph-c-palmento-maria-valle-joseph-decesare-jr , 865 F.2d 1386 ( 1989 )

United States v. Rodriguez , 628 F.3d 1258 ( 2010 )

kehr-packages-inc-charles-and-emily-mcmurtrie-and-james-mcmurtrie-v , 926 F.2d 1406 ( 1991 )

los-angeles-news-service-plaintiff-counter-defendant-appellee-robert-tur , 973 F.2d 791 ( 1992 )

Mid America Title Company v. James F. Kirk , 991 F.2d 417 ( 1993 )

United States v. John , 597 F.3d 263 ( 2010 )

LVRC HOLDINGS LCC v. Brekka , 581 F.3d 1127 ( 2009 )

International Airport Centers, L.L.C. v. Jacob Citrin , 440 F.3d 418 ( 2006 )

Pulte Homes, Inc. v. Laborers' International Union of North ... , 648 F.3d 295 ( 2011 )

20-fair-emplpraccas-457-20-empl-prac-dec-p-30136-southern-methodist , 599 F.2d 707 ( 1979 )

Victor Herbert v. National Academy of Sciences , 974 F.2d 192 ( 1992 )

We Assoc Ltd Prtnshp v. Mkt Sq Assoc , 235 F.3d 629 ( 2001 )

Atari Games Corporation v. Ralph Oman, Register of ... , 979 F.2d 242 ( 1992 )

Pyramid Securities Limited v. Ib Resolution, Inc , 924 F.2d 1114 ( 1991 )

Browne v. McCain , 612 F. Supp. 2d 1125 ( 2009 )

Mattel, Inc. v. MGA ENTERTAINMENT, INC. , 782 F. Supp. 2d 911 ( 2011 )

View All Authorities »