TANYA S. CHUTKAN, District Judge.
Plaintiff, who is proceeding under a pseudonym without leave of the Court, was the victim of sexual harassment by her supervisor at Phoenix Satellite Television (U.S.) Inc. She was able to capture one of the instances of harassment on video, a recording which she shared with certain individuals in connection with an EEOC sexual harassment claim. That video ultimately became public as a result of her coworkers' Title VII claims against Phoenix. Plaintiff filed this suit against one coworker, Meixing Ren, the lawyer representing her coworkers in their Title VII claims, Lynne Bernabei, and Bernabei's law firm, Bernabei & Wachtel PLLC ("B & W"), for copyright infringement, a RICO violation, and a violation of the Computer Fraud and Abuse Act (the latter against Ren only). Currently before the Court are Defendants' motions to dismiss the Complaint and Plaintiff's belated motion for leave to proceed under a pseudonym. For the reasons set forth below, the Court GRANTS in part and DENIES in part the motions to dismiss and DENIES the motion for leave to proceed under a pseudonym.
Plaintiff is a journalist who began her career with Phoenix in 2011. (Compl.¶ 18). She was sexually harassed by a supervisor on or about September 6, 2012, and managed to record the interaction—in which the supervisor aggressively moved towards her and touched her inappropriately—using her iPhone's video camera, which was hidden in her purse. (Id.¶¶ 1920). The resulting video was one minute and fifty-three seconds long. (Id.¶ 24). Plaintiff applied for and received a copyright registration of the video in October 2013. (Id. ¶ 25; Ex. 2).
Following the September 2012 incident, Plaintiff considered bringing a sexual harassment claim, although she had no interest in publicly disclosing the video. (Id. ¶ 27). Concerned that the video was valuable and not backed up, she attempted to email the video to herself but was unsuccessful. (Id. ¶ 28). On September 11, 2012 she contacted several coworkers, including Ren, to discuss her options. (Id. ¶ 29). She showed the video to Ren and then subsequently met with Ren and a third co-worker offsite. (Id. ¶¶30-31). During the meeting Ren suggested Plaintiff email him a copy of the video, expressing concerns about preserving the evidence
Subsequently, Plaintiff retained counsel and filed an EEOC Complaint. She showed the video to the EEOC but did not provide them with a copy. (Id. at ¶ 38). She ultimately settled her claims against Phoenix, and did not "use, share, display or publicly release the video for any purpose after her case was settled." (Id. ¶ 38-40). She never showed it to Phoenix or any family members, but kept the video as a "means of last resort" should she need to prove the truth of her allegations. (Id. ¶ 39). Plaintiff does not allege that she had any intention of marketing the video, but alleges that had she sought to market it, the fair market value would likely have exceeded $10,000. (Id. ¶ 40).
Plaintiff's coworkers, including Ren, retained Bernabei and B & W in October 2012 and sued Phoenix in this court in July 2013 (the "Ren Suit"). (Compl.¶ 41). Plaintiff alleges that in connection with the Ren Suit, Defendants mounted an aggressive out-of-court public relations campaign against Phoenix that included releasing copies of the video to members of the press. This resulted in numerous media stories about the harassment at Phoenix, some of which referenced the video or made the video publicly available in whole or in part. (Id. ¶¶ 42-57). Plaintiff alleges on information and belief that Ren provided the video to Bernabei and B & W. (Id. ¶ 58). Plaintiff learned the video had been released when she was contacted by friends and family asking about her connection to the video. (Id. ¶ 60).
Plaintiff's Complaint alleges four causes of action: In Count I, she alleges direct copyright infringement under 17 U.S.C. §§ 101 et seq. (the "Copyright Act") against all Defendants and seeks both damages and injunctive relief. (Compl. ¶¶ 70-75). Count II alleges contributory copyright infringement and seeks damages and injunctive relief against all defendants. (Id. ¶¶ 76-79). Count III asserts RICO violations against all defendants. (Id. ¶¶ 8194). Finally, Count IV seeks damages and injunctive relief against Ren under the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, for his actions in obtaining the video from Plaintiff's iPhone. (Id. ¶¶ 95-104).
All Defendants have moved to dismiss the Complaint. Bernabei and B & W argue that Counts I and II fail as a matter of law because there is no basis for asserting copyright protection over the video and, even if the video was subject to copyright protection, there is no infringement based on the fair use doctrine. (Bernabei Mem. 7).
Ren argues that Plaintiff fails to state a claim on which relief can be granted as to the CFAA claim (Ren Mem. 10-18) and argues that the Court lacks subject matter jurisdiction over the Complaint in light of Plaintiff's failure to obtain permission to proceed under a pseudonym, permission he argues should not be granted under the facts of the case. (Id. 4-9). In response to this argument, Plaintiff has belatedly moved for leave to proceed under a pseudonym ("Pl.Mot").
"To survive a motion to dismiss, a complaint must contain sufficient factual matter, accepted as true, to state a claim to relief that is plausible on its face." Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (internal quotation marks and citation omitted). "The plausibility standard is not akin to a `probability requirement,' but it asks for more than a sheer possibility that a defendant has acted unlawfully." Id. (citation omitted). Although a plaintiff may survive a Rule 12(b)(6) motion even where "recovery is very remote and unlikely," the facts alleged in the complaint "must be enough to raise a right to relief above the speculative level." Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555-56, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007) (internal quotation marks and citation omitted). The Court need not accept as true conclusory allegations or those which merely recite the elements of a cause of action. Iqbal, 556 U.S. at 678, 129 S.Ct. 1937 (quoting Twombly, 550 U.S. at 555, 127 S.Ct. 1955). In resolving a Rule 12(b)(6) motion, the Court may consider "only the facts alleged in the complaint, any documents either attached to or incorporated in the complaint and matters of which [the Court] may take judicial notice." E.E.O.C. v. St. Francis Xavier Parochial Sch., 117 F.3d 621, 624 (D.C.Cir.1997).
Ren argues that the Court must dismiss the action pursuant to Federal Rules of Civil Procedure 12(b)(1) for lack of subject matter jurisdiction because Plaintiff never obtained (or sought) leave to proceed under a pseudonym. (Ren Mem. 4). Although the District of Columbia Circuit Court has not yet addressed this issue, Ren cites cases from several other circuits in which courts held that "the failure of a plaintiff to seek leave to proceed under a pseudonym at the time the federal complaint is filed precludes the district court from exercising subject matter jurisdiction." (Id. 5) (citing W.N.J. v. Yocom, 257 F.3d 1171, 1172 (10th Cir.2001) ("When a party wishes to file a case anonymously or under a pseudonym, it must first petition the district court for permission to do so.") and Citizens for a Strong Ohio v. Marsh, 123 Fed.Appx. 630, 637 (6th Cir.2005) ("Failure to seek permission to proceed under a pseudonym is fatal to an anonymous plaintiff's case ....")). Ren argues that because Plaintiff did not timely move for leave to proceed under a pseudonym, this Court does not know who the Plaintiff is, and thus this Court cannot exercise subject matter jurisdiction. (Ren Mem. 6).
By her motion, Plaintiff appears to concede that she must obtain leave from the
"It is within the discretion of the district court to grant the `rare dispensation' of anonymity." U.S. v. Microsoft Corp., 56 F.3d 1448, 1464 (D.C.Cir.1995); see also Qualls v. Rumsfeld, 228 F.R.D. 8, 10-11 (D.D.C.2005) (anonymous litigant may proceed when the court determines that "the need for anonymity outweighs the general presumption that parties' identities are public information and the risk of unfairness to the opposing party") (internal quotations omitted) (citation omitted). Compelling circumstances may be present when "identification creates a risk of retaliatory physical or mental harm," "anonymity is necessary to preserve privacy in a matter of a sensitive and highly personal nature," or in circumstances under which the would-be anonymous party would be "compelled to admit criminal behavior." Qualls, 228 F.R.D. at 10-11 (collecting cases) (internal citations and alterations omitted). In determining whether to grant leave to proceed anonymously, the Court should consider
Nat'l Ass'n of Waterfront Employers v. Chao, 587 F.Supp.2d 90, 99 (D.D.C.2008). The last three factors are relatively straightforward. Plaintiff was an adult at the time of the events in question and is suing private individuals and entities, factors which weigh against anonymity. Defendants do not assert that their ability to defend this lawsuit against an anonymous plaintiff will unduly prejudice them, which weighs in favor of anonymity.
Personal embarrassment is normally not a sufficient basis for permitting anonymous litigation. Chao, 587 F.Supp.2d at 100 (citing Qualls); see also Doe v. Frank, 951 F.2d 320, 324 (11th Cir.1992) (plaintiff who would have to disclose alcoholism not permitted to proceed anonymously despite social stigma and embarrassment). Sexual harassment is not typically considered a matter so highly personal as to warrant proceeding by pseudonym. See Chao, 587 F.Supp.2d at 99 n.8 ("Matters of a sensitive and highly personal nature include those dealing with birth control, abortion, homosexuality or the welfare rights of illegitimate children or abandoned families");
Those concerns are less applicable here. Plaintiff's Complaint is not against her assailant and will likely not involve the graphic details of her assault, but details of her assault, but is instead at least one step removed from the actual events of September 6, 2012. Moreover, Plaintiffs' name is already publicly associated with the video and the underlying incident, through pleadings and motion practice in the Ren Suit, Ren et al. v. Phoenix Satellite Television (US), Inc., No. 13-cv-1110 (TSC). The Complaint in that action identifies Plaintiff by name, see Complaint (ECF No. 1), 13-cv-1110 (July 19, 2013), as do briefs related to a subpoena served by the Ren Suit plaintiffs (represented by Bernabei) on Lexero Law, counsel for Plaintiff in this action. See Plaintiffs' Motion to Compel (ECF No. 28), 13-cv-1110 (July 11, 2014); Lexero Law's Opposition to Motion to Compel (ECF No. 30), 13-cv-1110 (July 22, 2014) ("... despite Ms. Wang's copyright claims being unusually strong ...")). In light of these facts, Plaintiff's motion for leave to proceed via a pseudonym is denied.
"A plaintiff seeking to establish copyright infringement must prove `(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.'" Stenograph LLC v. Bossard Assoc., Inc., 144 F.3d 96, 99 (D.C.Cir.1998) (quoting Feist Pubs., Inc. v. Rural Tel. Serv. Co., Inc., 499 U.S. 340,
So long as it is sufficiently creative, a compilation of non-copyrightable factual matter may itself be copyrightable if it "is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship." 17 U.S.C. § 101; see, e.g., Atari Games Corp. v. Oman, 979 F.2d 242, 244-45 (D.C.Cir.1992) (assuming video game consisted of geometric schemes which were per se not original, compilation of schemes in particular order satisfied creativity requirement). Depictions of true, factual, scenes in photographs or film may be protected by copyright in light of the "creative decisions involved in producing a photograph" or video. See e.g., Los Angeles News Serv. v. Tullo, 973 F.2d 791, 794 (9th Cir.1992) (raw video footage of the sites of airplane crash and train wreck were sufficiently original to be copyrightable); Time Inc. v. Bernard Geis Assocs., 293 F.Supp. 130, 142-43 (S.D.N.Y.1968) (Zapruder film of Kennedy assassination reflected creative decisions such that it was copyrightable). Copyright law similarly protects audio recordings as reflecting creative judgments on processing and compiling sounds. Shaab v. Kleindienst, 345 F.Supp. 589 (D.D.C. 1972).
Defendants argue that "there is no original work and not even a minimal amount of authorship, creativity, or originality in the cell phone video recording." (Bernabei Mem. 9). Plaintiff counters that the video exists by "virtue of quick and creative thinking," (Compl.¶2) and reflects "quick creative judgments as to the sight and sounds the phone would likely record by leaving the phone in her purse." (Id. ¶ 21).
To the extent these allegations suffice to nudge the video across the (low) threshold of creativity, they do so just barely. However, at this stage of the litigation, the Court must accept the allegations of creativity as true. Due to the "subtle" nature of assessing whether a work is copyrightable, "determination at the pleading stage will often be impossible." Mid Am. Title Co. v. Kirk, 991 F.2d 417, 422 (7th Cir.1993) (explaining that "[t]hese matters are more properly addressed at the summary judgment stage
To adequately allege a civil RICO claim, Plaintiff must allege "(1) conduct (2) of an enterprise (3) through a pattern (4) of racketeering activity."
Although the misuse of intellectual property can suffice to confer standing for a RICO claim, see, e.g., Bryant v. Mattel, Inc., No. 04-9049, 2010 WL 3705668, at *11 (C.D. Cal. Aug. 2, 2010) ("Lost profits can be recoverable if they are concrete and deprived by the wrongful conduct, instead of an intervening event or market condition"),
The Court need not rule on the issue of standing however, because even were the Court to find that Plaintiff has standing to bring her RICO claim, that claim is deficient because it fails to allege a pattern of racketeering activity. A "pattern" of activity includes two elements: "relatedness and continuity." W. Assocs. LP, ex rel. Ave. Assocs. LP v. Mkt. Square Assocs., 235 F.3d 629, 633 (D.C.Cir.2001). Conduct is related when "it embraces criminal acts that have the same or similar purposes, results, participants, victims, or methods of commission, or otherwise are interrelated by distinguishing characteristics and are not isolated events." H.J. Inc. v. NW Bell Tel. Co., 492 U.S. 229, 240, 109 S.Ct. 2893, 106 L.Ed.2d 195 (1989) (citation omitted). Continuity may mean either "a closed period of repeated conduct, or ... past conduct that by its nature projects into the future with a threat of repetition." Id at 241, 109 S.Ct. 2893. Applying these definitions, the D.C. Circuit has held that where there was an allegation of a "single scheme" entailing "but a single discrete injury" suffered by a small number of victims, it was "virtually impossible" to state a RICO claim. Edmondson & Gallagher v. Alban Towers Tenants Ass'n, 48 F.3d 1260, 1265 (D.C.Cir.1995).
Plaintiffs in Edmondson were property developers whose attempts to purchase a residential building were repeatedly thwarted by the actions of defendants—the tenants of the building and their attorneys. In evaluating the adequacy of the RICO allegations, the Court adopted the Third Circuit's multi-factor test, which includes consideration of "the number of unlawful acts, the length of time over which the acts were committed, the similarity ofthe acts, the number of victims, the number of perpetrators, and the character of the unlawful activity ... as they bear upon the separate questions of continuity and relatedness." Id. (citing Kehr Packages, Inc. v. Fidelcor, Inc., 926 F.2d 1406, 1411-13 (3d Cir.1991). The Court gave great weight to the fact that all of defendants' predicate acts were in furtherance of one goal: preventing the sale of the building. Id.
As in Edmonson and W. Assocs., here there is but a single victim of Defendants' alleged racketeering activity: Plaintiff. There is a single goal to the racketeering activity: an increased likelihood of success in the Phoenix litigation, and a single (albeit repetitive)
Because Plaintiff does not allege a "pattern" of racketeering activity,
The Computer Fraud and Abuse Act, 18 U.S.C. § 1030, is intended "primarily to deter computer hacking." Lewis-Burke Assocs., LLC v. Widder, 725 F.Supp.2d 187, 194 (D.D.C.2010) (Facciola, M.J.). The Act provides a private cause of action for any person "suffering damage or loss" from a violation of the act. 18 U.S.C. § 1030(g). Plaintiff alleges a violation of 18 U.S.C. § 1030(a)(2)(c), which prohibits "intentionally accessing a computer without authorization or exceeding authorized access, and thereby obtaining ... information from any protected computer." Widder, 725 F.Supp.2d at 191 (citing 18 U.S.C. § 1030(a)(2)(C)) (alterations omitted). The statute defines "exceeds authorized access" as "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." 18 U.S.C. § 1030(e)(6). Alternatively, Plaintiff alleges a violation of 18 U.S.C. § 1030(a)(4), which provides for criminal liability for anyone who "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value." Whether Plaintiff has adequately alleged a violation of either section turns on whether Ren exceeded "authorized access."
The Circuits are divided on what it means to exceed authorized access. The Fifth and Seventh Circuits, in cases where employees misused data to which they had access in the course of their employment, have held that accessing a computer while "violating the duty of loyalty or acting with interests adverse to the employer voids the authorization an employee may have to access the computer" and exceeds authorized access. Widder, 725 F.Supp.2d at 192 (citing Int'l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 421 (7th Cir.2006) (internal citations omitted)); see also United States v. John, 597 F.3d 263, 272 (5th Cir.2010) ("Access to a computer and data that can be obtained from that access may be exceeded if the purposes for which access has been given are exceeded"). Under the narrower view in the Ninth Circuit, which is shared by a number of other Circuits, a person "exceeds authorized access" when he or she "accesses information on the computer that the person is not entitled to access." LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1133 (9th Cir.2009); see also, WEC Carolina Energy Solutions, LLC v. Miller, 687 F.3d 199, 204 (4th Cir.2012) ("Similarly, we conclude that an employee "`exceeds authorized access'" when he has approval to access a computer, but uses his access to obtain or alter information that falls outside the bounds of his approved access.... Notably, neither of these definitions extends to the improper use of information validly accessed.") (internal citations omitted) (emphasis in original); Amphenol Corp. v. Paul, 591
The D.C. Circuit has not ruled on the matter, although Magistrate Judge Facciola of this District adopted the narrower Brekka interpretation in Lewis-Burke Associates LLC v. Widder, 725 F.Supp.2d 187, 194 (D.D.C.2010) ("Exceeds authorized access should not be confused with exceeds authorized use") (quoting Bell Aerospace Servs., Inc. v. U.S. Aero Servs., Inc., 690 F.Supp.2d 1267, 1272 (M.D.Ala. 2010)).
The Citrin line of cases involved facts which are not analogous to those at issue here. Those cases address circumstances in which employees knowingly violated internal employer policies related to the use of data, either unlawfully, or in violation of their employment agreement. See, e.g. Citrin, 440 F.3d at 420 (employee, "in violation of his employment contract," destroyed "files that incriminated himself and other files that were also the property of his employer, in violation of the duty of loyalty that agency law imposes on an employee"); United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir.2010) (distinguishing Brekka in noting that Brekka's employer "had no policy prohibiting employees from emailing company documents to personal email accounts, and there was no dispute that Brekka had been authorized to obtain the documents or to send the emails while he was employed").
For the foregoing reasons, the Court grants in part Defendants' motions and
A corresponding Order will issue separately.