Lead Opinion
¶ 1 This appeal presents our first opportunity to consider the First Amendment rights of internet users to engage in anonymous speech. In doing so, we decide whether the superior court erred by granting a request by appellee Mobilisa, Inc. (“Mobilisa”) to discover from appellant The Suggestion Box, Inc. (“TSB”), an Arizona email service provider, the identity of appellant John Doe 1 (“Doe”), a TSB account holder. For the reasons that follow, we adopt a three-step test for use in evaluating such requests. Although the superior court properly applied the initial two steps of this test, it did not consider the third step. We therefore remand for application of that step.
BACKGROUND
¶ 2 Nelson Ludlow is the founder and chief executive officer of Mobilisa, a Washington company that provides wireless and mobile communication systems to customers that include government and military entities. In light of the confidential nature of its business, Mobilisa secures its computer and email systems.
¶ 3 On June 21, 2005, Ludlow used his Mobilisa email account to send an intimate message to Shara Smith, who was involved in a personal relationship with Ludlow and was not employed by Mobilisa. Ludlow also sent a copy of the message (the “Ludlow/Smith email”) to his personal email address and to his mobile phone. Six days later, an unknown number of individuals, including members of Mobilisa’s management team, received an email from an anonymous sender with an address from theanonymouse-mail.com, which is owned and maintained by TSB, an Arizona corporation. The anonymous email contained the contents of the Ludlow/Smith email and the subject line, “Is this a company you want to work for?”
¶ 4 Mobilisa subsequently filed suit in the State of Washington naming John Does 1-10 as defendants and alleging violations of two federal laws relating to electronic communications, 18 United States Code (“U.S.C.”) sections 1030 & 2701 (2000),
¶ 5 In August 2005, Mobilisa filed an application pursuant to Arizona Rule of Civil Procedure 30(h) in the Arizona Superior Court in Maricopa County requesting the court to issue a subpoena based on a commission for subpoena authorized by the Jefferson County Superior Court in Washington. Mobilisa sought to compel TSB to disclose the identity of the person who used its services to send the anonymous email. Upon a subsequently filed motion, the superior court granted Mob-ilisa’s request and permitted it to engage in limited discovery.
¶ 6 TSB subsequently filed a motion to vacate the discovery order, which the court granted on December 28. In its ruling, the court adopted the two-step approach used in Doe v. Cahill,
¶7 On February 23, 2006, TSB’s counsel filed an affidavit stating counsel had agreed, with TSB’s consent, to also represent Doe in this matter, and Doe had received notification on February 9 of Mobilisa’s request for his identity. Through counsel, Doe objected to Mobilisa’s request and asserted that he did not access or obtain the Ludlow/Smith email through Mobilisa’s computers.
¶8 On February 27, the superior court ruled that Mobilisa had made a sufficient showing to meet the Cahill standard and granted Mobilisa leave to conduct discovery regarding Doe’s identity. TSB and Doe (collectively “TSB-Doe”) timely appealed.
¶ 9 We review the superior court’s ruling on a discovery matter for an abuse of discretion. Brown v. Sup.Ct.,
I.
¶ 10 TSB-Doe argues that although the superior court correctly adopted Cahill, the court misapplied that standard. In contrast, Mobilisa contends the superior court applied the wrong standard, but reached the correct result.
A.
¶ 11 The United States Supreme Court has held that the First Amendment to the United States Constitution protects a person’s right to speak anonymously, Buckley v. Am. Constitutional Law Found.,
¶ 12 The right to speak anonymously, however, is not absolute. For example, an anonymous speaker, like a known one, has no First Amendment right to engage in obscenity, Roth v. United States,
¶ 14 In Columbia Insurance Co. v. Seescandy.com,
¶ 15 Relying on Seescandy.com, a superior court in New Jersey denied plaintiffs request to compel an internet service provider (“ISP”) to reveal the identity of the Doe defendants, who allegedly posted defamatory information about plaintiff on the ISP’s bulletin board. Dendrite,
¶ 16 Declining to follow Seescandy.com and Dendrite, the superior court in this case adopted Cahill, which was the only guidance from a state supreme court available at that time.
The second [Dendrite] requirement, that the plaintiff set forth the exact defamatory statements, is subsumed in the summary judgment inquiry. To satisfy the summary judgment standard a plaintiff will necessarily quote the defamatory statements in his complaint. The fourth Dendrite requirement, that the trial court balance the defendants First Amendment rights against the strength of the plaintiffs prima facie case is also unnecessary. The summary judgment test is itself the balance. The fourth requirement adds no protection above and beyond that of the summary judgment test and needlessly complicates the analysis.
Id. at 461.
¶ 17 Mobilisa argues the superior court erred in adopting the Cahill standard because that decision, as well as Dendrite, concerned a claim for defamation and dealt with “purely expressive” conduct. Because the present case involves property-based claims for wrongful access to Mobilisa’s email system and is not dependent on the nature of the speech involved, Mobilisa urges us to adopt a less-stringent standard than one requiring defeat of a fictional motion for summary judgment, such as those announced in Sony Music and Seescandy.com.
¶ 18 We reject the notion of adopting differing standards that depend on the manner in which a plaintiff has framed its claim. Whether the claim is one for defamation or a property-based claim, the potential for chilling anonymous speech remains the same. See 2TheMart.com,
¶ 19 Additionally, adopting differing standards could encourage assertion of non-defamation claims simply to reap the benefit of a less-stringent standard. For example, we can imagine a situation in which an employer would sue an anonymous internet poster for unauthorized access to its system or files or release of confidential information simply as a way to uncover the identity of a criticizing or whistle-blowing employee.
¶20 Finally, adopting a single standard would both permit ease of application in the superior court and better enable consistent decision making.
¶ 21 In summary, we conclude that courts should utilize a single test in deciding whether to grant or deny a request to discover the identity of an anonymous internet speaker. We now address the composition of that test.
¶ 22 Mobilisa does not challenge the requirement set forth in both Cahill and Dendrite that the requesting party show the anonymous speaker has been given adequate notice and a reasonable opportunity to respond to the discovery request. Cahill,
¶ 23 We reject Mobilisa’s assertion that we should adopt the less-stringent standards set forth in Sony Music and Seescandy.com. We agree with the Cahill court that requiring a plaintiff to merely set forth a prima facie claim (Sony Music) or survive a motion to dismiss (Seescandy.com) would set the bar too low, chilling potential speakers from speaking anonymously on the internet. Cahill,
¶24 Although we agree with the Cahill court’s adoption of the two steps discussed above, we disagree with that court’s conclusion that a balancing step is unnecessary.
¶ 25 First, surviving a summary judgment on elements not dependent on the anonymous party’s identity does not necessarily account for factors weighing against disclosure. For example, the anonymous speaker may be a non-party witness along with a number of known witnesses with the same information. The requesting party’s ability to survive summary judgment would not account for the fact that in such a case it may have only a slight need for the anonymous party’s identity. See 2TheMart.com,
¶26 Second, a balance of competing interests is consistent with the standard used for evaluating a preliminary injunction, which we find analogous. In order to obtain a preliminary injunction, the requesting party
¶ 27 Third, requiring a balancing of competing interests provides an additional safeguard that comports with Arizona’s broad protection given to free speech and individual privacy. See Ariz. Const, art. 2, §§ 6 & 8;
¶28 In summary, we hold that in order to compel discovery of an anonymous internet speaker’s identity, the requesting party must show: (1) the speaker has been given adequate notice and a reasonable opportunity to respond to the discovery request, (2) the requesting party’s cause of action could survive a motion for summary judgment on elements not dependent on the speaker’s identity, and (3) a balance of the parties’ competing interests favors disclosure. Because the superior court did not engage in the third step, and the parties were not afforded an opportunity to address that step before that court, a remand for that consideration is required, at a minimum. If the court misapplied the initial two steps, however, a remand may be unnecessary. We therefore turn to the court’s ruling on those steps.
B.
1.
¶ 29 TSB-Doe does not dispute that Doe received adequate notice and a reasonable opportunity to respond to Mobilisa’s request. Rather, TSB-Doe argues the superi- or court erred by placing the burden on TSB to notify Doe of the pending discovery request and by ruling without awaiting Doe’s response. We disagree.
¶ 30 Mobilisa was required to show that Doe had been given adequate notice and a reasonable opportunity to respond to Mobilisa’s discovery request. The purpose of the notification requirement is to ensure that Doe knows his First Amendment rights may be in jeopardy. The record reflects that Ludlow replied to one of Doe’s anonymous emails, but Ludlow never received a response. In light of Ludlow’s failed attempt to contact Doe, the superior court did not err by exercising its inherent authority to place the burden on TSB to notify Doe of the pending proceedings. See Acker v. CSO Chevira,
¶ 32 Additionally, we do not discern prejudice to Doe from the timing of the court’s ruling as: (1) TSB adequately represented Doe’s position before the superior court, (2) the court was aware of Doe’s position through counsel’s affidavit, (3) Doe’s subsequently filed opposition essentially adopted TSB’s arguments, and (4) we have considered the entire record, including Doe’s filed opposition, as part of our de novo review.
¶ 33 For these reasons, we decide the superior court correctly applied step one of the Cahill test.
2.
¶ 34 TSB-Doe next argues the superior court erred in deciding that Mobilisa could survive a motion for summary judgment filed by Doe. Specifically, TSB-Doe contends the court failed to consider an essential element of each of Mobilisa’s three claims — unauthorized access to Mobilisa’s computer system. Summary judgment is appropriate if no genuine issues of material fact exist and the moving party is entitled to judgment as a matter of law. Orme Sch. v. Reeves,
¶ 35 TSB-Doe first contends there is no indication Doe intruded on Mobilisa’s computers and points out that Mobilisa itself admitted it could not find any security breach on its system. Mobilisa counters that the evidence supports a reasonable inference that Doe wrongfully obtained the Ludlow/Smith email from Mobilisa’s computer system, and thus genuine issues of material fact exist sufficient to withstand a motion for summary judgment. We agree with Mobilisa.
¶ 36 Both Ludlow and Smith avowed they did not grant anyone access to their email accounts. According to Ludlow, he was the only person authorized to access his Mobilisa email account, and he sent the Ludlow/Smith email to no one other than himself and Smith. Likewise, Smith stated that she did not forward the email to anyone and that she deleted the email from her computer server shortly after receiving it. After Doe sent the email at issue, Smith conferred with her email service provider and was told the Lud-low/Smith email had been deleted from the email server at the time Smith deleted it from her inbox approximately eight hours after receipt. Ludlow and Smith both indicated they each printed out a single copy of the email, immediately retrieved it from the printer, kept it in their possession, and personally destroyed the printed copy a day later.
¶ 38 Although it is possible that Doe or an acquaintance intercepted the Ludlow/Smith email at a source other than a Mobilisa computer, the record before us, when viewed in the light most favorable to Mobilisa, reasonably supports an inference that Doe obtained the Ludlow/Smith email from Mobilisa’s computer system without authorization. Mobili-sa’s inability to identify a security breach on its network, together with Doe’s knowledge of Mobilisa’s management team and their email addresses, and his interest in Mobili-sa’s affairs, supports a reasonable inference that Doe was affiliated with Mobilisa, perhaps as an employee, had access to Mobilisa’s computers, and exceeded his authorized use by accessing the Ludlow/Smith email.
¶ 39 TSB-Doe also argues the superior court erred by ignoring the lack of evidence as to Mobilisa’s damages and Doe’s intent to defraud. We reject this argument. Although Mobilisa’s claims pursuant to 18 U.S.C. § 1030 and the common law of trespass to chattel require a showing of actual damages, Mobilisa’s claim pursuant to 18 U.S.C. § 2701 does not require this showing. See supra n. 1. A claim under § 2701 also does not require a showing of fraudulent intent.
II.
¶ 40 We hold that to obtain a court order compelling discovery of an anonymous internet speaker’s identity, the requesting party must show that: (1) the speaker has been given adequate notice and a reasonable opportunity to respond to the discovery request, (2) the requesting party’s cause of action could survive a motion for summary judgment on the elements of the claim not dependent on the identity of the anonymous speaker, and (3) a balance of the parties’
Notes
. 18 U.S.C. § 1030 provides, in part, as follows: (a) Whoever—
(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;
(5)(A)(i)....
(ii) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; [] shall be punished as provided in subsection (c) of this section.
Additionally, 18 U.S.C. § 2701 provides, in part, as follows:
(a) Offense. — Except as provided in subsection
(c) of this section whoever—
(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility;
and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.
A private right of action for 18 U.S.C. § 2701 is set forth in 18 U.S.C. § 2707.
. Mobilisa questions whether Doe is a party to this appeal, and if not, whether TSB has standing to assert Doe’s First Amendment rights. Our review of the record reveals that counsel for Doe properly entered an appearance in this matter and TSB and Doe both joined in the notice of appeal. Doe’s standing to assert his First Amendment rights is not at issue. See ARCAP 1 (“An appeal may be taken by any party aggrieved by the judgment.”); In re Gubser,
. We reject TSB-Doe’s contention that whether the superior court appropriately adopted Cahill is not squarely before us because Mobilisa did not file a cross-appeal. Mobilisa may properly challenge the court’s adoption of Cahill and urge an alternative legal standard as a cross-issue because it made that argument to the superior court. See Town of Miami v. City of Globe,
. For a thorough discussion of the First Amendment's application to anonymous and pseudonymous speech, see Lyrissa Barnett Lidsky & Thomas F. Cotter, Authorship, Audiences, and Anonymous Speech, 82 Notre Dame L.Rev. 1537 (2007).
. After the superior court issued its ruling, the Wisconsin Supreme Court became the second state supreme court to address this issue. Lassa v. Rongstad,
. A "blog,” a short-hand term for “web log,” is a website that provides "commentary or news on a particular subject such as food, politics, or local news; others function as more personal online diaries. A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. The ability for readers to leave comments in an interactive format is an important part of many blogs.” See Wikipedia: The Free Encyclopedia, Blog, http://en.wikipedia. org/wiki/Blog (last visited Sept. 24, 2007).
. Similarly, the potential for chilling speech by unmasking the identity of an anonymous or pseudonymous internet speaker equally exists whether that party is a defendant or a witness. For that reason, we reject our dissenting colleague’s view that courts should apply a different test when the identity of a witness is at issue. See infra ¶ 49. The considerations attendant to a witness’ identity are best considered in the balancing step we adopt today. See infra ¶¶ 23-27.
. For example, political expression is entitled to the "broadest protection” of the First Amendment, McIntyre,
. The other factors are: (1) strong likelihood of success on the merits; (2) possibility of irreparable injury not remediable by damages if requested relief is not granted; and (3) public policy favors the injunction. Shoen,
. Article 2, Section 6, of the Arizona Constitution, the corollaiy to the First Amendment, provides, "Every person may freely speak, write, and publish on all subjects, being responsible for the abuse of that right.” The parties confined their arguments to the First Amendment. In our view, however, the test adopted to decide the pending discovery issue should also account for the protection afforded under our state constitution.
. Although Doe states through his counsel’s affidavit that he did not access any of Mobilisa’s computers, this representation merely creates a question of fact, which would not warrant an entry of summary judgment against Mobilisa.
. Regardless, because knowledge of Doe's intent depends on his identity, Mobilisa was not required to produce evidence of this element to demonstrate it would survive summary judgment. See supra ¶ 23.
Dissenting Opinion
dissenting.
¶ 411 agree with much of what the majority has set forth. My disagreement is focused primarily on the majority’s adoption of a balancing test that takes place after the plaintiff has already established a genuine issue of material fact on each element of the claim, other than identity. Supra ¶¶ 23-28. Because I disagree that this balancing should take place after a plaintiff has met this standard, and this difference is outcome determinative in this case, I respectfully dissent.
I.
¶ 42 Anonymous speech is entitled to First Amendment protection. Buckley v. Am. Constitutional Law Found.,
¶ 43 What Justice Holmes’ analogy makes clear is that if a person has a cause of action based on speech, and the First Amendment does not prohibit the action, the party is free to pursue it. That same principle applies to anonymous speech on the internet. Those who are wronged by anonymous speech still have a right to seek legal redress, if the First Amendment does not prohibit the cause of action being pursued. The issue then becomes what standard should be employed to determine when there is enough evidence of a valid claim such that a John Doe defendant’s identity should be revealed.
¶ 44 As the majority correctly points out, there is a decided lack of consensus among the jurisdictions that have considered this issue as to the proper standard that should be used to determine when an anonymous speaker — being sued as a defendant — should be unmasked. Supra ¶¶ 12-16. There are no Arizona cases that address this issue. Despite this lack of consensus and case law, however, most courts agree on at least two primary concerns, which almost every test addresses to some degree.
¶ 45 First, nearly all courts agree that the party seeking disclosure should have the burden of making all reasonable efforts to notify the anonymous speaker. E.g., Doe v. Cahill,
¶46 Second, nearly all courts agree that something more than the general standard of discoverability, or even a general relevance standard, is required before the veil of anonymity may be pierced.
¶ 47 Some courts have found this balance by adopting a motion to dismiss standard. Lassa v. Rongstad,
¶ 48 I agree with the majority that the motion to dismiss standard can prove too easy in notice pleading states like Arizona, where all that is required to survive a motion to dismiss is “a short and plain statement of the claim showing that the pleader is entitled to relief.” Ariz. R. Civ. P. 8(a)(2); see Cahill,
¶ 49 The majority adopts what I will refer to as the summary judgment-plus standard, promulgated in Dendrite. My disagreement with the majority opinion is narrow. Specifically, I have no disagreement with an additional balancing, in which the necessity for disclosure is weighed against any number of factors, when the anonymous speaker is someone other than the defendant. However, when the anonymous speaker is the party-defendant, and the party-plaintiff has (1) created a genuine issue of material fact on (2) a claim that survives the First Amendment, I do not believe the Constitution permits taking away the party-plaintiffs right to seek redress. The elimination of such a claim is the only purpose that a balancing test serves, if both these requirements have already been met.
¶ 50 As Cahill points out, a form of balancing has already taken place. Were it not for
¶ 51 I know of no constitutional authority that would create protection for speech after a party-plaintiff has established a genuine issue of fact on the elements of a claim that is not protected by the First Amendment. The majority analogizes to preliminary in-junctive relief. Respectfully, I do not think the analogy is apt for an anonymous speaker who is the defendant, as contrasted with an anonymous speaker who is only a third-party witness. As to an alleged defendant, there are dramatic differences between failing to satisfy a balancing test in a preliminary injunction setting as contrasted with seeking to obtain the speaker’s identity to preserve a separate cause of action.
¶ 52 Specifically, in the preliminary injunction context, plaintiffs whose temporary injunctions are denied are not foreclosed from pursuing relief in a trial on the merits. See Ariz. R. Civ. P. 65. For example, an individual who is denied a preliminary injunction to prevent a defendant from trespassing may still have a trial on the merits to determine whether injunctive relief should be granted. See id. The balancing required for a preliminary injunction does not take away the prospect of any relief — only the timing of the relief. Shoen v. Shoen,
¶ 53 On the other hand, when an anonymous speaker is the defendant, if plaintiff is not allowed to learn the identity of the speaker, there is no other opportunity for relief. The party-plaintiff cannot proceed to a hearing or trial on the merits as there is no defendant to answer and (potentially) hold liable. The balancing effectively denies the relief; it does not just affect the timing as is the case with a preliminary injunction. There is no constitutional provision that permits this post-summary judgment balancing, after a party-plaintiff has created a triable issue of fact on each element of the claim,
¶ 54 The majority also asserts that balancing is required because we must consider a multitude of potential factors and balance “the parties’ competing interests on a case-by-case basis.” Supra ¶ 25. That is exactly how we decide motions for summary judgment: on a case-by-case basis, applying the facts and the law unique in each particular claim. Orme School v. Reeves,
¶ 56 Here, as the majority correctly points out, there is a genuine issue of fact on each element of the plaintiffs claim. The summary judgment standard is satisfied. Accordingly, the trial court’s order requiring disclosure of the defendant’s identity should be affirmed.
. The general standard for discovery is lower than the relevance standard applied in the courtroom. "Parties may obtain discovery regarding any matter, not privileged, which is relevant to the subject matter involved in the pending action.” Ariz. R. Civ. P. 26(b)(1). However, even if the information sought is not admissible and relevant according to that standard, it remains discoverable as long as it "appears reasonably calculated to lead to the discovery of admissible evidence.” Id. The only limitations on this rule are that the methods must not be "unreasonably cumulative or duplicative, or obtainable from some other source that is either more convenient, less burdensome, or less expensive”; the party must not have already had ample opportunity to obtain the same information; and the discovery must not be "unduly burdensome or expensive, given the needs of the case, the amount in controversy, limitations on the parties' resources, and the importance of the issues at stake in the litigation." Id.
. See Jennifer O’Brien, Putting a Face to a (Screen) Name: The First Amendment Implications of Compelling ISPs to Reveal the Identities of Anonymous Internet Speakers in Online Defamation Cases, 70 Fordham L.Rev. 2745, 2772 (May 2002) ("[L]awsuits are being brought by both private individuals and corporations in an effort to determine the true identity of the anonymous speakers and enact their own extra-judicial remedies.”); Lyrissa Barnett Lidsky, Authorship, Audiences, and Anonymous Speech, 82 Notre Dame L.Rev. 1537, 1595 (April 2007) (“If all it takes is an allegation of defamation to uncover a defendant’s identity, the right to speak anonymously is very fragile indeed, because it is easy for a plaintiff to allege defamation any time he comes in for harsh criticism online.”).
. In fact, if we are to be establishing a "single test,” applicable to all cases, supra ¶ 21, Arizona's constitution expressly protects party-plaintiffs' causes of action. Ariz. Const, art. 18, § 6 (“The right of action to recover damages for injuries shall never be abrogated, and the amount recovered shall not be subject to any statutory limitation.”).
