85 F. Supp. 3d 89

Jane ROE, Plaintiff, v. BERNABEI & WACHTEL PLLC, et al., Defendants.

Civil Action No. 14-cv-01285 (TSC)

United States District Court, District of Columbia.

Signed March 26, 2015

*93Eric James Menhart, Lexero Law Firm, Washington, DC, for Plaintiff.

Laura Nachowitz Steel, Wilson Elser Moskowitz Edelman & Dicker, LLP, Alan Robert Rabat, Bernabei & Wachtel, PLLC, Washington, DC, for Defendant.

MEMORANDUM OPINION

Tanya S. Chutkan, District Judge

Plaintiff, who is proceeding under a pseudonym without leave of the Court, was the victim of sexual harassment by her supervisor at Phoenix Satellite Television (U.S.) Inc. She was able to capture one of the instances of harassment on video, a recording which she shared with certain individuals in connection with an EEOC sexual harassment claim. That video ultimately became public as a result of her coworkers’ Title VII claims against Phoenix. Plaintiff filed this suit against one coworker, Meixing Ren, the lawyer representing her coworkers in their Title VII claims, Lynne Bernabei, and Bernabei’s law firm, Bernabei & Wachtel PLLC (“B & . W”), for copyright infringement, a RICO violation, and a violation of the Computer Fraud and Abuse Act (the latter against Ren only). Currently before the Court are Defendants’ motions to dismiss the Complaint and Plaintiffs belated motion for leave to proceed under a pseudonym. For the reasons set forth below, the Court GRANTS in part and DENIES in part the motions to dismiss and DENIES the motion for leave to proceed under a pseudonym.

I. BACKGROUND

Plaintiff is a journalist who began her career with Phoenix in 2011. (Comply 18). She was sexually harassed by a supervisor on or about September 6, 2012, and managed to record the interaction — in which the supervisor aggressively moved towards her and touched her inappropriately — using her iPhone’s video camera, which was hidden in her purse. (/¿.¶¶ 1920). The resulting video was one minute and fifty-three seconds long. (Id.'i 24). Plaintiff applied for and received a copyright registration of the video in October 2013. (Id.- ¶ 25; Ex. 2).

Following the September 2012 incident, Plaintiff considered bringing a sexual harassment claim, although she had no interest in publicly disclosing the video. (Id. ¶ 27). Concerned that the video was valuable and not backed up, she attempted to email the video to herself but was unsuccessful. (Id. ¶ 28). On September 11, 2012 she contacted several coworkers, including Ren, to discuss her options. (Id. ¶ 29). She showed the video to Ren and then subsequently met with Ren and a third co-worker offsite. (/¿.¶¶ 30-31). During the meeting Ren suggested Plaintiff email him a copy of the video, expressing concerns about preserving the evidence *94and stating that the file would be used for backup purposes only. (77.¶ 32). Although Plaintiff agreed, she had trouble transmitting the file both via email and text due to its size. (7<1¶¶ 33-34). Plaintiff stayed at Ren’s home from September 12, 2012 to September 16, 2012, and before she left she agreed to allow Ren — who again had expressed concerns about preserving the video — to back up the video onto his computer. (7&¶¶ 35-36).

Subsequently, Plaintiff retained counsel and filed an EEOC Complaint. She showed the video to the EEOC but did not provide them with a copy. (Id. at ¶ 38). She ultimately settled her claims against Phoenix, and did' not “use, share, display or publicly release the video for any purpose after her case was settled.” (77.¶ 38-40). She never showed it to Phoenix or any family members, but kept the video as a “means of last resort” should she need to prove the truth of her allegations. (Id. ¶ 39). Plaintiff does not allege that she had any intention of marketing the video, but alleges that had she sought to market it, the fair market value would likely have exceeded $10,000. (Id. ¶ 40).

Plaintiffs coworkers, including Ren, retained Bernabei and B & W in October 2012 and sued Phoenix in this court in July 2013 (the “Ren Suit”). (Compl.t41). Plaintiff alleges that in connection with the Ren Suit, Defendants mounted an aggressive out-of-court public relations campaign against Phoenix that included releasing copies of the video to members of the press. This resulted in numerous media stories about the harassment at Phoenix, some of which referenced the video or made the video publicly available in whole or in part. (77.¶¶ 42-57). Plaintiff alleges on information and belief that Ren provided the video to Bernabei and B & W. (Id. ¶ 58). Plaintiff learned the video had been released when she was contacted by friends and family asking about her connection to the video. (Id. ¶ 60).

Plaintiffs Complaint alleges four causes of action: In Count I, she alleges direct copyright infringement under 17 U.S.C. §§ 101 et seq. (the “Copyright Act”) against all Defendants and seeks both damages and injunctive relief. (Compl.lffl 70-75). Count II alleges contributory copyright infringement and seeks damages and injunctive relief against all defendants. (7&¶¶ 76-79). Count III asserts RICO violations against all defendants. (Id. ¶¶ 8194). Finally, Count IV seeks damages and injunctive relief against Ren under the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, for his actions in obtaining the video from Plaintiffs iPhone. (Id. ¶¶ 95-104).

All Defendants have moved to dismiss the Complaint. Bernabei and B & W argue that Counts I and II fail as a matter of law because there is no basis for asserting copyright protection over the video and, even if the video was subject to copyright protection, there is no infringement based on the fair use doctrine. (Bernabei Mem. 7).1 Because the RICO claim is based on the predicate act of criminal copyright infringement, the failure of the copyright claim would necessarily defeat Plaintiffs RICO claim, which Bernabei and B & W argue fails on additional independent grounds. Specifically, Bernabei and B & W argue that Plaintiff lacks standing to *95assert a RICO violation and has otherwise failed to plead a viable RICO claim.

Ren argues that Plaintiff fails to state a claim on which relief can be granted as to the CFAA claim (Ren Mem. 10-18) and argues that the Court lacks subject matter jurisdiction over the Complaint in light of Plaintiffs failure to obtain permission to proceed under a pseudonym, permission he argues should not be granted under the facts of the case. (Id. 4-9). In response to this argument, Plaintiff has belatedly moved for leave to proceed under a pseudonym (“PLMot”).

II. LEGAL STANDARD

“To survive a motion to dismiss, a complaint must contain sufficient factual matter, accepted as true, to state a claim to relief that is plausible on its face.” Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (internal quotation marks and citation omitted). “The plausibility standard is not akin to a ‘probability requirement,’ but it asks for more than a sheer possibility that a defendant has acted unlawfully.” Id. (citation omitted). Although a plaintiff may survive a Rule 12(b)(6) motion even where “recovery is very remote and unlikely,” the facts alleged in the complaint “must be enough to raise a right to relief above the speculative level.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555-56, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007) (internal quotation marks and citation omitted). The Court need not accept as true conclusory allegations or those which merely recite the elements of a cause of action. Iqbal, 556 U.S. at 678,129 S.Ct. 1937 (quoting Twombly, 550 U.S. at 555, 127 S.Ct. 1955). In resolving a Rule 12(b)(6) motion, the Court may consider “only the facts alleged in the complaint, any documents either attached to or incorporated in the complaint and matters of which [the Court] may take judicial notice.” E.E.O.C. v. St. Francis Xavier Parochial Sch., 117 F.3d 621, 624 (D.C.Cir.1997).2

III. ANALYSIS

A. Plaintiffs Motion for Leave to Proceed Under a Pseudonym

Ren argues that the Court must dismiss the action pursuant to Federal Rules of Civil Procedure 12(b)(1) for lack of subject matter jurisdiction because Plaintiff never obtained (or sought) leave to proceed under a pseudonym. (Ren Mem. 4). Although the District of Columbia Circuit Court has not yet addressed this issue, Ren cites cases from several other circuits in which courts held that “the failure of a plaintiff to seek leave to proceed under a pseudonym at the time the federal complaint is filed precludes the district court from exercising subject matter jurisdiction.” (Id.5) (citing W.N.J. v. Yocom, 257 F.3d 1171, 1172 (10th Cir.2001) (“When a party wishes to file a case anonymously or under a pseudonym, it must first petition the district court for permission to do so.”) and Citizens for a Strong Ohio v. Marsh, 123 Fed.Appx. 630, 637 (6th Cir.2005) (“Failure to seek permission to proceed under a pseudonym is fatal to an anonymous plaintiffs case.... ”)). Ren argues that because Plaintiff did not timely move for leave to proceed under a pseudonym, this Court does not know who the Plaintiff is, and thus this Court cannot exercise subject matter jurisdiction. (Ren Mem. 6).

By her motion, Plaintiff appears to concede that she must obtain leave from the *96Court to proceed anonymously (PI. Ren Opp’n 2-8), and argues in her motion to do so that the Court should grant that permission in order to protect against further invasions of her privacy. (Pl.Mot. 2). Plaintiff asserts that anonymity is called for because sexual harassment is a matter of a “sensitive and highly personal nature.” (Id.passim). Plaintiff does not allege that she will be subjected to retaliation or that publication of her name will harm any third parties, but that she hopes to avoid creating “yet another record of an association of [her] name with the video of her sexual assault.” (Id. at 2).

“It is within the discretion of the district court to grant the ‘rare dispensation’ of anonymity.” U.S. v. Microsoft Corp., 56 F.3d 1448, 1464 (D.C.Cir.1995); see also Qualls v. Rumsfeld, 228 F.R.D. 8, 10-11 (D.D.C.2005) (anonymous litigant may proceed when the court determines that “the need for anonymity outweighs the general presumption that parties’ identities are public information and the risk of unfairness to the opposing party”) (internal quotations omitted) (citation omitted). Compelling circumstances may be present when “identification creates a risk of retaliatory physical or mental harm,” “anonymity is necessary to preserve privacy in a matter of a sensitive and highly personal nature,” or in circumstances under which the would-be anonymous party would be “compelled to admit criminal behavior.” Qualls, 228 F.R.D. at 10-11 (collecting cases) (internal citations and alterations omitted). In determining whether to grant leave to proceed anonymously, the Court should consider

(1) whether, the justification asserted by the requesting party is merely to avoid. the annoyance and criticism that may attend any litigation or is to preserve privacy in a matter of a sensitive and highly personal nature; (2) whether identification poses a risk of retaliatory physical or mental harm to the requesting party or even more critically, to innocent non-parties;3 (3) the ages of the persons whose privacy interests are sought to be protected; (4) whether the action is against a governmental or private party; and (5) the risk of unfairness to the opposing party from allowing an action against it to proceed anonymously.

Nat’l Ass’n of Waterfront Employers v. Chao, 587 F.Supp.2d 90, 99 (D.D.C.2008). The -last three factors are relatively straightforward. Plaintiff was an adult at the time of the events in question and is suing private individuals and entities, factors which weigh against anonymity. Defendants do not assert that their ability to defend this lawsuit against an anonymous plaintiff will unduly prejudice them, which weighs in favor of anonymity.

Personal embarrassment is normally not a sufficient basis for permitting anonymous litigation. Chao, 587 F.Supp.2d at 100 (citing Qualls); see also Doe v. Frank, 951 F.2d 320, 324 (11th Cir.1992) (plaintiff who would have to disclose alcoholism not permitted to proceed anonymously despite social stigma and embarrassment). Sexual harassment is not typically considered a matter so highly personal as to warrant proceeding by pseudonym. See Chao, 587 F.Supp.2d at 99 n.8 (“Matters of a sensitive and highly personal nature include those dealing with birth control, abortion, homosexuality or the welfare rights of illegitimate children or abandoned families”);4 S. Methodist *97Univ. Ass’n of Women Law Students v. Wynne & Jaffe, 599 F.2d 707, 712-13 (5th Cir.1979) (law students’ allegations of sex discrimination against law firms did not warrant anonymity). Although some courts have permitted sexual assault victims to proceed via a pseudonym in order to protect their privacy, those cases have emphasized the importance of doing so in order to avoid deterring other victims from “reporting such crimes.” Doe No. 2 v. Kolko, 242 F.R.D. 193, 195 (E.D.N.Y.2006); Doe v. Evans, 202 F.R.D. 173, 176 (E.D.Pa.2001) (“the public has a interest in protecting the identities of sexual assault victims so that other victims will feel more comfortable suing to vindicate their rights, especially where law enforcement officers are involved”). Another judge in this District permitted an adult plaintiff to anonymously sue the club at which she was sexually assaulted for serving her alcohol even though she was underage, crediting the plaintiff’s concern that “graphic material about the assault will be discussed ... including details of the sexual assault, plaintiffs genital anatomy, hospital examinations, testing, and medications for various sexually transmitted diseases, and consequent psychiatric treatment.” Doe v. De Amigos, LLC, No. 11-1755(ABJ), slip op. 3 (D.D.C. Apr. 30, 2012).

Those concerns are less applicable here. Plaintiffs Complaint is not against her assailant and will likely not involve the graphic details of her assault, but is instead at least one step removed from the actual events of September 6, 2012. Moreover, Plaintiffs’ name is already publicly associated with the video and the underlying incident, through pleadings and motion practice in the Ren Suit, Ren et al. v. Phoenix Satellite Television (US), Inc., No. 13-cv-1110 (TSC). The Complaint in that action identifies Plaintiff by name, see Complaint (ECF No. 1), 13-cv-1110 (July 19, 2013), as do briefs related to a subpoena served by the Ren Suit plaintiffs (represented by Bernabei) on Lexero Law, counsel for Plaintiff in this action. See Plaintiffs’ Motion to Compel (ECF No. 28), 13-cv-1110 (July 11, 2014); Lexero Law’s Opposition to Motion to Compel (ECF No. 30), 13-cv-1110 (July 22, 2014) (“... despite Ms. Wang’s copyright claims being unusually strong ... ”)). In light of these facts, Plaintiffs motion for leave to proceed via a pseudonym is denied.5 Plaintiff must proceed in this action under her true name.6

B. Plaintiffs Copyright Claims

“A plaintiff seeking to establish copyright infringement must prove ‘(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.’ ” Stenograph LLC v. Bossard Assoc., Inc., 144 F.3d 96, 99 (D.C.Cir.1998) (quoting Feist Pubs., Inc. v. Rural Tel. Serv. Co., Inc., 499 U.S. 340, *98361, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991). To be copyrightable, “a work must be original to the author,” meaning that it was independently created and “possesses at least some minimal degree of creativity.” Feist, 499 U.S. at 345, 111 S.Ct. 1282. Because copyright protection extends only to the “means of expressing” facts, the underlying facts themselves are not protected. Greaver v. Nat’l Ass’n of Corporate Directors, 1997 WL 34605245, at *4 (D.D.C. Nov. 19, 1997) (citing Feist). Although the creative judgments necessary to create copyrightability may be de min-imis, the presence of some creative judgment is still required. Feist, 499 U.S. at 345, 111 S.Ct. 1282 (holding that a telephone directory which simply provided phone numbers in ordinary alphabetical order was not sufficiently creative to be copyrightable).

So long as it is sufficiently creative, a compilation of non-copyrightable factual matter may itself be copyrightable if it “is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship.” 17 U.S.C. § 101; see, e.g., Atari Games Corp. v. Oman, 979 F.2d 242, 244-45 (D.C.Cir.1992) (assuming video game consisted of geometric schemes which were per se not original, compilation of schemes in particular order satisfied creativity requirement). Depictions of true, factual, scenes in photographs or film may be protected by copyright in light of the “creative decisions involved in producing a photograph” or video. See e.g., Los Angeles News Serv. v. Tullo, 973 F.2d 791, 794 (9th Cir.1992) (raw video footage of the sites of airplane crash and train wreck were sufficiently original to be copyrightable); Time Inc. v. Bernard Geis Assocs., 293 F.Supp. 130, 142-43 (S.D.N.Y.1968) (Zapruder film of Kennedy assassination reflected creative decisions such that it was copyrightable). Copyright law similarly protects audio recordings as reflecting creative judgments on processing and compiling sounds. Shaab v. Kleindienst, 345 F.Supp. 589 (D.D.C.1972).

Defendants argue that “there is no original work and not even a minimal amount of authorship, creativity, or originality in the cell phone video recording.” (Berna-bei Mem. 9). Plaintiff counters that the video exists by “virtue of quick and creative thinking,” (ComplY 2) and reflects “quick creative judgments as to the sight and sounds the phone would likely record by leaving the phone in her purse.” (Id. ¶ 21).7

To the extent these allegations suffice to nudge the video across the (low) threshold of creativity, they do so just barely. However, at this stage of the litigation, the Court must accept the allegations of creativity as true. Due to the “subtle” nature of assessing whether a work is copyrightable, “determination at the pleading stage will often be impossible.” Mid Am. Title Co. v. Kirk, 991 F.2d 417, 422 (7th Cir.1993) (explaining that “[t]hese matters are more properly addressed at the summary judgment stage *99... [where] the full range of information may be evaluated by the court”). At the pleading stage, a party alleging copyright infringement need only claim ownership over the copyrighted work, that the party has registered the work in accordance with statute, and that the defendant infringed. See Warren v. John Wiley & Sons, Inc., 952 F.Supp.2d 610, 617 (S.D.N.Y.2013) (citing Mid Am. Title Co., 991 F.2d at 421-22); Loud Records LLC v. Minervini, 621 F.Supp.2d 672, 677 (W.D.Wis.2009). Plaintiff has adequately alleged ownership of a valid copyright registration (Comply 25) and copying of the piece, and has therefore adequately alleged infringement.8 Accordingly, Defendants’ motions to dismiss Counts I and II of the Complaint is denied.

C. Plaintiffs RICO Claim

To adequately allege a civil RICO claim, Plaintiff must allege “(1) conduct (2) of an enterprise (3) through a pattern (4) of racketeering activity.”9 Pyramid Secs. Ltd. v. IB Resolution, Inc., 924 F.2d 1114, 1116 (D.C.Cir.1991). Plaintiff must also establish standing to assert a RICO claim by alleging an injury to her “business or property,” of which Defendants’ violation of RICO was both the “but for” and proximate cause. Holmes v. Secs. Investor Protection Corp., 503 U.S. 258, 268, 112 S.Ct. 1311, 117 L.Ed.2d 532 (1992). Defendants argue that Plaintiff has failed to allege injury to her business and property because her only injury is “personal displeasure associated with the disclosure of what she considers to be ‘private’ information in her video (without any economic losses derived therefrom).” (Bernabei Mem. 31). This misstates Plaintiffs claim, which asserts the loss of the video’s “potential economic value,” not any emotional distress. (Comply 86).

Although the misuse of intellectual property can suffice to confer standing for a RICO claim, see, e.g., Bryant v. Mattel, Inc., No. 04-9049, 2010 WL 3705668, at *11 (C.D.Cal. Aug. 2, 2010) (“Lost profits can be recoverable if they are concrete and deprived by the wrongful conduct, instead of an intervening event or market condi*100tion”), deprivation of the exclusive possession of that intellectual property is not enough — to prevail on her claim Plaintiff would ultimately have to show a “concrete example of how [she] would have exploited [her] exclusive possession” of the video. Mattel, Inc. v. MGA Entm’t, Inc., 782 F.Supp.2d 911, 1020-21 (C.D.Cal.2011) (denying summary judgment on claims deemed sufficient to survive a motion to dismiss in Bryant); see also Lopez v. Council on Am.-Islamic Relations Action Network, Inc., 657 F.Supp.2d 104, 110 (D.D.C.2009) (“The harm must be concrete and actual or imminent, not conjectural or hypothetical.”). Plaintiff has alleged that she had no intention of ever showing the video to another person {See Compl. ¶¶ 39-40), rendering implausible her allegation that she was injured by loss of the video’s “potential economic value.” {Id. ¶ 86).

The Court need not rule on the issue of standing however, because even were the Court to find that Plaintiff has standing to bring her RICO claim, that claim is deficient because it fails to allege a pattern of racketeering activity. A “pattern” of activity includes two elements: “relatedness and continuity.” W. Assocs. LP, ex rel. Ave. Assocs. LP v. Mkt. Square Assocs., 235 F.3d 629, 633 (D.C.Cir.2001). Conduct is related when “it embraces criminal acts that have the same or similar purposes, results, participants, victims, or methods of commission, or otherwise are interrelated by distinguishing characteristics and are not isolated events.” H.J. Inc. v. NW Bell Tel. Co., 492 U.S. 229, 240, 109 S.Ct. 2893, 106 L.Ed.2d 195 (1989) (citation omitted). Continuity may mean either “a closed period of repeated conduct, or ... past conduct that by its nature projects into the future with a threat of repetition.” Id at 241, 109 S.Ct. 2893. Applying these definitions, the D.C. Circuit has held that where there was an allegation of a “single scheme” entailing “but a single discrete injury” suffered by a small number of victims, it was “virtually impossible” to state a RICO claim. Edmondson & Gallagher v. Alban Towers Tenants Ass’n, 48 F.3d 1260, 1265 (D.C.Cir.1995).

Plaintiffs in Edmondson were property developers whose attempts to purchase a residential building were repeatedly thwarted by the actions of defendants— the tenants of the building and their attorneys. In evaluating the adequacy of the RICO allegations, the Court adopted the Third Circuit’s multi-factor test, which includes consideration of “the number of unlawful acts, the length of time over which the acts were committed, the similarity of the acts, the number of victims, the number of perpetrators, and the character of the unlawful activity ... as they bear upon the separate questions of continuity and relatedness.” Id. (citing Kehr Packages, Inc. v. Fidelcor, Inc., 926 F.2d 1406, 1411— 13 (3d Cir.1991). The Court gave great weight to the fact that all of defendants’ predicate acts were in furtherance of one goal: preventing the sale of the building. Id.10

*101Applying the Kehr test as adopted in Edmonson, the D.C. Circuit held that a business dispute between two limited partners involving multiple acts of fraud and subsequent attempts to cover it up over an 8-year period did not amount to a pattern of racketeering activity. See W. Assocs., 235 F.3d at 634. The Court held that the plaintiff could not establish a pattern simply by subdividing an ongoing dispute into separate “schemes” when the “four schemes [were] so similar in nature and purpose (i.e., they involve contested bookkeeping entries), and they resulted in a single harm rather than separate injuries.” Id. at 635. Similarly, courts in this District have dismissed RICO complaints asserting activity related to the foreclosure of a single plaintiffs property. See e.g., Busby v. Capital One, N.A., 772 F.Supp.2d 268, 282 (D.D.C.2011), Zernik v. U.S. Dep’t of Justice, 630 F.Supp.2d 24, 27 (D.D.C.2009). In contrast, courts have permitted claims to go forward when the plaintiff alleged that defendants engaged in mail and wire fraud “to defraud three separate Plaintiffs on three distinct occasions in three different ways,” Lu v. Lezell, 45 F.Supp.3d 86, 99 (D.D.C.2014) (denying defendant’s motion for summary judgment as to RICO claims), and where the plaintiff alleged that multiple victims were defrauded by defendant’s false fundraising materials. Feld Entm’t, Inc. v. Am. Soc. for the Prevention of Cruelty to Animals, 873 F.Supp.2d 288, 312-13 (D.D.C.2012).

As in Edmonson and W. Assocs., here there is but a single victim of Defendants’ alleged racketeering activity: Plaintiff. There is a single goal to the racketeering activity: an increased likelihood of success in the Phoenix litigation, and a single (albeit repetitive)11 injury: infringement of Plaintiffs intellectual property rights. While it is possible that Defendants may continue to utilize the video in connection with their advocacy against Phoenix (the Court notes that Plaintiff has not alleged that Bernabei and B & W have made any new use or distribution of the video since September 2013), any repetition will be in furtherance of the same goal against the same victim. The D.C. Circuit’s guidance in Edmonson mandates the conclusion that Plaintiff has failed to establish a “pattern” of racketeering activity.

Because Plaintiff does not allege a “pattern” of racketeering activity,12 Count Three will be dismissed.

*102D. The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act, 18 U.S.C. § 1030, is intended “primarily to deter computer hacking.” Lewis-Burke Assocs., LLC v. Widder, 725 F.Supp.2d 187, 194 (D.D.C.2010) (Facciola, M.J.). The Act provides a private cause of action for any person “suffering damage or loss” from a violation of the act. 18 U.S.C. § 1030(g). Plaintiff alleges a violation of 18 U.S.C. § 1030(a)(2)(c), which prohibits “intentionally accessing a computer without authorization or exceeding authorized access, and thereby obtaining ... information from any protected computer.” Widder, 725 F.Supp.2d at 191 (citing 18 U.S.C. § 1030(a)(2)(C)) (alterations omitted). The statute defines “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Alternatively, Plaintiff alleges a violation of 18 U.S.C. § 1030(a)(4), which provides for criminal liability for anyone who “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value.” Whether Plaintiff has adequately alleged a violation of either section turns on whether Ren exceeded “authorized access.”

The Circuits are divided on what it means to exceed authorized access. The Fifth and Seventh Circuits, in cases where employees misused data to which they had access in the course of their employment, have held that accessing a computer while “violating the duty of loyalty or acting with interests adverse to the employer voids the authorization an employee may have to access the computer” and exceeds authorized access. Widder, 725 F.Supp.2d at 192 (citing Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 421 (7th Cir.2006) (internal citations omitted)); see also United States v. John, 597 F.3d 263, 272 (5th Cir.2010) (“Access to a computer and data that can be obtained from that access may be exceeded if the purposes for which access has been given are exceeded”). Under the narrower view in the Ninth Circuit, which is shared by a number of other Circuits, a person “exceeds authorized access” when he or she “accesses information on the computer that the person is not entitled to access.” LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1133 (9th Cir.2009); see also, WEC Carolina Energy Solutions, LLC v. Miller, 687 F.3d 199, 204 (4th Cir.2012) (“Similarly, we conclude that an employee “ ‘exceeds authorized access’ ” when he has approval to access a computer, but uses his access to obtain or alter information that falls outside the bounds of his approved access... .Notably, neither of these definitions extends to the improper use of information validly accessed.”) (internal citations omitted) (emphasis in original); Amphenol Corp. v. Paul, 591 *103FecLAppx. 34, 35-36 (2d Cir.2015) (affirming summary judgment for employee where employer presented no evidence that employee accessed any data outside the scope of his authorization).

The D.C. Circuit has not ruled on the matter, although Magistrate Judge Faccio-la of this District adopted the narrower Brekka interpretation in Lewis-Burke Associates LLC v. Widder, 725 F.Supp.2d 187, 194 (D.D.C.2010) (“Exceeds authorized access should not be confused with exceeds authorized use”) (quoting Bell Aerospace Servs., Inc. v. U.S. Aero Servs., Inc., 690 F.Supp.2d 1267, 1272 (M.D.Ala.2010)).

The Citrin line of cases involved facts which are not analogous to those at issue here. Those cases address circumstances in which employees knowingly violated internal employer policies related to the use of data, either unlawfully, or in violation of their employment agreement. See, e.g. Citrin, 440 F.3d at 420 (employee, “in violation of his employment contract,” destroyed “files that incriminated himself and other files that were also the property of his employer, in violation of the duty of loyalty that agency law imposes on an employee”); United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir.2010) (distinguishing Brekka in noting that Brekka’s employer “had no policy prohibiting employees from emailing company documents to personal email accounts, and there was no dispute that Brekka had been authorized to obtain the documents or to send the emails while he was employed”).13 The Court agrees that the Brekka line of cases adopts the proper interpretation of the plain meaning of the statute, which speaks only of authorized “access” to data and not of use. Widder, 725 F.Supp.2d at 194; Miller, 687 F.3d at 204; Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 648 F.3d 295, 304 (6th Cir.2011). Moreover, the CFAA is a criminal statute and the Court is therefore bound to construe it in accordance with the rule of lenity, which requires the Court to choose the more lenient of two possible interpretations. Miller, 687 F.3d at 205-06 (citing United States v. Universal C.I.T. Credit Corp., 344 U.S. 218, 221-22, 73 S.Ct. 227, 97 L.Ed. 260 (1952)). Here, Plaintiff alleges that Ren made a backup copy of the video with her assent. It is Ren’s use of the video some 10 months later that Plaintiff alleges was unauthorized and which forms the basis of this suit. Because Ren did exactly what Roe permitted him to do at the time he copied the video, Ren did not “exceed authorized access” within the meaning of the CFAA. Plaintiffs claim under the Act is therefore dismissed.14

IV. CONCLUSION

For the foregoing reasons, the Court grants in part Defendants’ motions and *104dismisses without prejudice Counts Three and Four of the Complaint for failure to state a claim. The Court denies Defendants’ motions as to Counts One and Two. Plaintiffs motion for leave to proceed under a pseudonym or to seal this matter is denied. Plaintiff shall file a notice by April 2, 2015, confirming whether or not she intends to proceed with this lawsuit utilizing her true name. If her intent is to proceed, the notice shall contain her true name and address. Future filings in this matter will be captioned using her true name instead of “Jane Roe.” If Plaintiff gives notice of her intent to proceed with this lawsuit and provides the necessary information, Defendants shall' respond to Plaintiffs complaint within 14 days of Plaintiffs filing.

A corresponding Order will issue separately.

Roe v. Bernabei & Wachtel PLLC
85 F. Supp. 3d 89

Case Details

Name
Roe v. Bernabei & Wachtel PLLC
Decision Date
Mar 26, 2015
Citations

85 F. Supp. 3d 89

Jurisdiction
United States

References

Referencing

Nothing yet... Still searching!

Referenced By

Nothing yet... Still searching!