In this unusual case, the defendant has not yet been identified. Appellant Solers, Inc. filed a complaint against John Doe, alleging defamation and tortious interference with “prospective advantageous business opportunities.” Seeking to learn the identity of John Doe so that it could proceed with service of process, Solers next served a subpoena upon appellee, the Software & Information Industry Association (“SIIA”). In response, SIIA filed a motion to quash the subpoena. The trial court granted that motion and later dismissed Solers’ lawsuit for failure to state a claim. Concluding that both rulings were made in error, we vacate the trial court’s orders and remand for further proceedings consistent with this opinion.
I. Factual Background
Appellant Solers, Inc. “is a for-profit Virginia corporation with its principal place of business in Arlington, Virginia. [Its] work principally consists of developing software and other technology for agencies within the Department of Defense.” Solers is a privately held company, owned by its employees. Appellee SIIA describes itself as “the principal trade association for the software and digital content industry” and explains that “[o]ne of [its] chief missions is to protect the intellectual property of member companies by fighting the software piracy that threatens to undermine the entire industry.” While Solers’ work is primarily in the same industry that SIIA seeks to protect, Solers is not a member of SIIA.
In order “[t]o fulfill its mission, SIIA [has] established an Anti-Piracy Division *945 and developed anti-piracy programs involving both education and enforcement.” “SIIA’s enforcement program enables sources with knowledge of software piracy to report anonymously to SIIA via telephone or the Internet about companies [committing piracy].To encourage reporting, “SIIA allows individuals to submit information ... on a confidential basis.” Through this program, John Doe, an “individual,” reported that Solers was engaged in illegal activity. Accusations of copyright infringement followed, and Solers sued Doe but has not been able to learn his or her identity. 1
A. SIIA’s Accusation of Copyright Infringement
SIIA acknowledges that, “[i]n March 2005, [it] received a communication via the Internet from [Doe] who alleged that Sol-ers was using unlicensed software.” Soon thereafter, on April 29, 2005, SIIA’s attorney wrote to the President of Solers, accusing Solers of “copyright infringement.” The letter stated that SIIA “has evidence that Solers, Inc. is engaged in the unlawful copying and use of software published by the software publishers listed in [the attached exhibit] in violation of the Copyright Act, Title 17 U.S.C. § 501, et seq.” The letter announced that “[SIIA is] prepared to seek remedies available under the Copyright Act,” but explained that SIIA “prefer[s] to work with companies to reach a resolution that is quick, fair and out of the public spotlight ... [through] a three part process [that leads to] an easy and quick settlement.... ”
SIIA’s letter demanded that Solers complete an internal audit of its software programs, instructed Solers on how to complete the audit, and requested that Solers deliver the results to SIIA. According to SIIA’s letter, once the audit was eomplet-ed, the parties would negotiate a settlement and SIIA would release Solers “from all claims and causes of action for copyright infringement.” The letter warned, however, that “if Solers [ ] is unwilling to promptly conduct an audit and the other activities mentioned [in the letter], [Solers] should be aware that SIIA will not hesitate to initiate litigation against Solers [ ] for copyright infringement.” The letter did not provide any information about the alleged “evidence” of Solers’ “copyright infringement,” or any details regarding the source of this “evidence.”
According to Solers, “[b]etween May 2 and May 13, 2005, representatives of SIIA and Solers communicated regarding [SIIA’s] allegations of software piracy by Solers. Through these communications, Solers informed SIIA that it had reviewed its computer systems and confirmed that Solers had violated no party’s copyright.” Solers further asserts that “[a]s a result of the communications between Solers and SIIA between May 2 and May 13, Solers satisfied SIIA that [Doe’s] allegations were false. On Friday, May 13, 2005, counsel for SIIA confirmed to [Solers’ attorney] that SIIA had ‘closed its file’ on Solers.” (SIIA states that it decided not to pursue a claim against Solers in order to protect the identity of John Doe, not because it concluded that his allegations were false.)
B. The Identity of John Doe
John Doe used the “website reporting form” that is part of SIIA’s “Corporate Anti-Piracy program” to provide information about Solers. Sources, like Doe, “who report piracy by corporate software end-users to SIIA[,] may become eligible for financial payment under [this program.]” Source reports “are received by two SIIA employees who ... forward [them] to [the *946 program’s legal counsel] for [ ] review” and a determination as to whether SIIA should “pursue the report further.”
SIIA asserts that it has kept Doe’s identity and the information that Doe provided about Solers confidential. SIIA has a “long standing policy of keeping the identity of [its] sources anonymous (unless required by law to disclose the identity)[, and] ... maintaining] as confidential the information provided by its sources[.]” Thus, when Solers asked SIIA to voluntarily disclose Doe’s identity in May 2005, SIIA refused to do so. The only information SIIA has disclosed is that Doe is an “individual” who “does not work or reside in the District of Columbia” and “did not choose to participate in SIIA’s Reward Program and therefore was never asked to, and did not sign, the Terms and Conditions of the Corporate Anti-Piracy Report Program.”
II. Procedural History
On May 18, 2005, Solers filed a complaint against Doe which alleged one count of defamation and one count of tortious interference with “prospective advantageous business opportunities[,]” and requested injunctive relief, compensatory damages, and punitive damages. The following day Solers issued a subpoena to SIIA, seeking production of all documents related to the identity of Doe, Doe’s initial report and his ensuing correspondence with SIIA, and “[a]ll documents ... believed to be ‘evidence’ ” of Solers’ alleged copyright infringement. SIIA, which is not a party to the underlying suit, lodged objections to the subpoena on June 9, 2005, and, in response, Solers immediately moved to enforce the subpoena. SIIA then filed a motion to quash.
On December 16, 2005, Judge Black-burne-Rigsby heard arguments from Sol-ers and SIIA on these two motions. Counsel for SIIA informed us at oral argument that SIIA notified John Doe of the lawsuit and the subpoena. However, Doe did not participate in this hearing, either in person or through counsel, and only SIIA made arguments in support of Doe’s interests.
Solers argued that “where a plaintiff comes to court and accuses [a] defendant of illegal conduct, [the defendant] can’t hide behind the First Amendment ... to remain anonymous.” Solers conceded that some anonymous speech on “public affairs” is protected, but it argued that such protection is not appropriate here because “[t]his was a private e-mail from Doe to a private organization accusing [Solers] of fundamentally improper conduct in the industry in which it operates.” SIIA, on the other hand, argued that the “anonymous speaker” on the internet has First Amendment rights and that a plaintiff must “do more than file a lawsuit” in order to unmask him. Acknowledging that it was raising novel issues in the District of Columbia, 2 SIIA presented case law from other jurisdictions.
At a status hearing on April 28, 2006, the court heard additional argument from Solers. 3 Expressing concern that “there’s been no financial or economic harm dem *947 onstrated in the pleadings[,]” the court asked Solers to address this issue, explaining that “I get to this question about ... harm ... [because] one of the test[s] that I should apply in determining whether or not to compel [SIIA] to release [Doe’s identity] is whether or not your claim "will withstand a motion to dismiss.” In response, Solers argued that “the harm is actual,” “the harm is reputational,” and “when we get into discovery with John Doe we’ll find out what other harm has been caused, and that may very well be economic.” The court then questioned Solers about the “other efforts [it has] taken to identify John Doe” and Solers explained that it “is not aware of anyone else that John Doe has communicated the defamation to ... [and is] not aware of any other way to get this information.”
After the status hearing, Solers filed an Amended Complaint and both Solers and SIIA filed supplemental memoranda in support of their respective motions. On August 16, 2006, the trial court issued an order granting SIIA’s Motion to Quash the Subpoena. Although the court discussed the various standards used in other jurisdictions for deciding whether to enforce a subpoena seeking the identity of someone who speaks anonymously over the internet, it applied the standard for dismissing a complaint for failure to state a claim. Super. Ct. Civ. R.12 (b)(6). The court concluded that “Solers has not made a claim of relief for its defamation allegation ... because it alleges no facts to demonstrate that it has suffered any harm/injury ... [and it] must show actual harm.” The court further reasoned that “[b]eeause Sol-ers’ claim could not withstand a motion to dismiss standard, its need for Doe’s identity is not outweighed by SIIA’s interest in keeping that identity private.” [App. 226] It also concluded that Solers had failed to “exhaust[ ] alternative methods of obtaining Doe’s identity” and that it would not enforce a subpoena until Solers has done so. Relying on this analysis, Judge Anderson, who had not previously been involved in the case, later dismissed the suit in its entirety “for failure to state a claim upon which relief can be granted.”
III. Standard of Review
This appeal presents two distinct questions subject to
de novo
review. “Because a motion to dismiss a complaint under Rule 12(b)(6) presents questions of law, our standard of review ... is
de
novo.”
4
In re Estate of Curseen,
“While trial court determinations on motions to quash typically are reviewed for abuse of discretion,” this case does not present the typical situation of “quintessentially discretionary judgment calls ... [that] turn on fact-specific determinations of unreasonableness and oppressiveness .... ”
In re Public Defender Service,
IV. The Order of Dismissal
On February 12, 2007, the trial court ordered “this action [ ] dismissed for failure to state a claim upon which relief can be granted[.]”
See
Super. Ct. Civ. R. 12(b)(6). To decide whether Solers sufficiently pled its claims for defamation and tortious interference, we look for guidance to Super. Ct. Civ. R. 8(a), which “sets forth the minimum requirements for pleading a claim for relief.”
Bolton v. Bernabei & Katz, PLLC,
In order to state a claim of defamation, “plaintiff must allege and prove four elements: (1) that the defendant made a false and defamatory statement concerning the plaintiff; (2) that the defendant published the statement without privilege to a third party; (3) that the defendant’s fault in publishing the statement amounted to at least negligence; and (4) either that the statement was actionable as a matter of law irrespective of special harm or that its publication caused the plaintiff special harm.”
Oparaugo v. Watts,
Because the trial court’s dismissal was based on its conclusion that Solers insufficiently pleaded harm, which is an essential element of both claims, our analysis will focus on that issue. During the April 28th hearing, the court expressed concern about, and questioned Solers extensively on, the sufficiency of its allegations of harm. Solers responded by amending its complaint to (1) identify itself as a “for-profit” corporation, (2) state that the “false statements ... [imply] that its business ethics were improper and untrustworthy ... [and that it] lacked fundamental financial integrity and honesty[,]” and (8) allege that, as a result of Doe’s actions, Solers “has been deprived of its good commercial reputation, subjected] to contempt and ... others within [its] industry [have been deterred] from dealing with it.” The amended complaint also asserts that “Doe’s misconduct has caused cognizable harm in an amount to be proven at trial ... [and] has caused damage to Solers’ prospective advantageous business opportunities.”
This language alleges the type of harm that courts have required corporate plaintiffs to prove when pursuing these types of claims.
See Art Metal-U.S.A., Inc. v. United States,
244 U.S.App. D.C. 1, 6,
*950 V. The Order Quashing the Subpoena
This appeal presents us with issues of first impression — -whether the First Amendment protects the anonymity of someone such as Doe, and, if so, under what circumstances a plaintiff such as Sol-ers may invoke court processes to learn Doe’s identity and have its day in court. Solers argues that “the First Amendment cannot be used to cloak Doe and his defamatory communications in anonymity” and that the trial court erred not only when it held Solers’ discovery request to a heightened standard but also when it required Solers to “exhaust all alternative sources” before it would enforce the subpoena. SIIA, on the other hand, asserts that the trial court “applied the correct legal standard to Doe’s speech” and properly “determined that a qualified First Amendment privilege applied to Solers’ request for disclosure [of Doe’s identity].”
Litigation of these issues usually will be governed by Civil Rule 45(c)(3)(A)(iii), which provides the basic framework: “On timely motion, the Court shall quash or modify the subpoena if it ... requires disclosure of privileged or other protected matter and no exception or waiver applies .... ” Super. Ct. Civ. R. 45(c)(3)(A)(iii). In our analysis we will consider the differing standards employed by other jurisdictions “[t]o balance the competing rights of anonymous internet speakers and parties seeking redress for wrongful communications.... ”
Mobilisa, Inc. v. Doe,
A. The Protection Afforded to Anonymous Speech
The Supreme Court of the United States has recognized that First Amendment protection extends to some anonymous speech.
McIntyre v. Ohio Elections Comm’n,
“It [also] is clear that speech over the internet is entitled to First Amendment protection [and that] [t]his protection extends to anonymous internet speech.”
Doe v. Cahill,
Nevertheless, “ ‘it is well understood that the right of free speech is not absolute at all times and under all circumstances.’ ”
Cahill,
B. Balancing Competing Interests
When faced with the clash of such valued interests, we must strike a balance “between the well-established First Amendment right to speak anonymously, and the right of the plaintiff to protect its proprietary interests and reputation through the assertion of recognizable claims based on the actionable conduct of the anonymous, fictitiously-named defendant!].”
Dendrite International, Inc. v. Doe No. 3,
The tension between a speaker’s desire for anonymity and the right of the plaintiff to protect his reputation or property arises in a variety of contexts, including defamation, copyright infringement, harassment, and malicious gossip.
See, e.g., Doe I v. Individuals,
C. The Tests Used by Other Jurisdictions
Courts have applied a variety of tests to grapple with the question of when it is appropriate to force a third party to reveal the identity of a defendant charged with defamation. One of the standards most easily satisfied requires only that the court be convinced that the party seeking the subpoena “has a legitimate, good faith basis to contend that it may be the victim of [actionable]
conduct....” In re Subpoena Duces Tecum to America Online, Inc.,
Toward the other end of the spectrum is the test articulated by the New Jersey Superior Court in
Dendrite International, Inc. v. Doe No. 3,
The Maryland Court of Appeals reversed because Brodie had failed to sue, within the time allowed by the statute of limitations, those persons who had actually posted the allegedly defamatory comments. Id. at 449. Although dismissing on procedural grounds, the court adopted the Dendrite test for use in future internet cases:
[W]hen a trial court is confronted with a defamation action in which anonymous speakers or pseudonyms are involved, it should, (1) require the plaintiff to undertake efforts to notify the anonymous posters that they are the subject of a subpoena or application for an order of disclosure, including posting a message of notification of the identity discovery request on the message board; (2) withhold action to afford the anonymous posters a reasonable opportunity to file and serve opposition to the application; (3) require the plaintiff to identify and set forth the exact statements purportedly made by each anonymous poster, alleged to constitute actionable speech; (4) determine whether the complaint has set forth a prima facie defamation per se or per quod action ...; and (5), if all else is satisfied, balance the anonymous poster’s First Amendment right of free speech against the strength of the prima facie case of defamation presented by the plaintiff and the necessity for disclosure of the anonymous defendant’s identity, prior to ordering disclosure.
Id.
at 457 (emphasis in original). Three judges of the Maryland Court of Appeals concurred with the result, but believed that the final balancing test of the
Dendrite
standard is “unnecessary and needlessly complicated.”
Id.
at 458 (Adkins, J., concurring) (citing
Cahill,
The Supreme Court of Delaware adopted a modified version of the
Dendrite
test in
Cahill,
D. A Test for the District of Columbia
Procedural labels such as prima facie or “summary judgment” may prove misleading, but the test we now adopt closely resembles the “summary judgment” standard articulated in Cahill. 10 When presented with a motion to quash (or to enforce) a subpoena which seeks the identity of an anonymous defendant, the court should: (1) ensure that the plaintiff has adequately pleaded the elements of the defamation claim, (2) require reasonable efforts to notify the anonymous defendant that the complaint has been filed and the subpoena has been served, (3) delay further action for a reasonable time to allow the defendant an opportunity to file a motion to quash, (4) require the plaintiff to proffer evidence creating a genuine issue of material fact on each element of the claim that is within its control, and (5) determine that the information sought is important to enable the plaintiff to proceed with his lawsuit. We do not require a separate balancing test at the end of the analysis, nor do we require a showing that the plaintiff has exhausted alternative sources for learning the information. This brief summary of our test must be read in context of the discussion that follows.
Before enforcing a subpoena seeking the identity of an anonymous user of the internet, the court must first determine whether the plaintiff has adequately pleaded each element of his claim. If the complaint cannot survive scrutiny for failure to state a claim, there is no justification for going further.
This is only the first step, however. If the complaint is adequate, the court then must ensure that reasonable efforts are made to notify the defendant that the subpoena has been served. Many courts have required the plaintiff to provide this notice, usually by posting it in the same manner in which the allegedly defamatory statement was published.
See, e.g., Cahill,
Once suitable efforts have been made to notify the defendant, the court should delay action to allow him a reasonable opportunity to file a motion to quash the subpoena. “A court should not consider impacting a speaker’s First Amendment rights without affording the speaker an opportunity to respond to the discovery request.”
Mobilisa,
The plaintiff next is required to proffer evidence to show that it has a viable claim of defamation. Whether this evidence is presented in the form of affidavits, deposition transcripts, or courtroom testimony under oath, it must be sufficient to create a genuine issue of material fact with respect to all the elements of the defamation claim
within the plaintiff's control, see Cahill,
An important part of this process is to set forth as precisely as possible the statements by the anonymous defendant that are alleged to be defamatory. In some cases, the court has refused to compel disclosure of the defendant’s identity because the statements were not actionable.
See, e.g., Highfields Capital Management,
The court should also ensure that the information sought is important to the litigation. This portion of the test is easily satisfied when the anonymous speaker is the defendant and the litigation cannot proceed without serving him with process.
Doe I v. Individuals,
Finally, we agree with the concurring judges in
Brodie
that a separate balancing test at the end of the analysis is not necessary.
See Cahill,
SIIA protests that enforcement of subpoenas like this one will have a chilling effect on reporting of software piracy: “Because few would-be Internet communicators seeking to report potential software piracy would risk the financial and other burdens of defending a lawsuit, that speech likely would disappear.” This forecast includes hyperbole, no doubt, but the test we have adopted takes this concern into account. As the previous discussion should make clear, we do not take lightly a person’s decision to speak anonymously. But that is not an absolute right, and SIIA’s website alerted John Doe that SIIA might be required to disclose his identity. 13 We do not question the importance of com *957 bating software piracy, 14 but that is only one of the interests we must balance. 15
E. Applying the Test to Solers’ Subpoena
There is an interesting factual difference between this case and many of those to which we have referred. Here, John Doe did not post his accusations on an internet bulletin board for thousands or perhaps millions of persons to see.
Cf. Doe I v. Individuals,
A similar point was addressed in
Cahill,
where the court drew “no distinction between communications made on the internet and those made through other traditional forms of media in determining the standard to be applied.”
Solers argues that it is unfair to require production of evidence at this early stage of the proceedings, pointing out that, in more typical litigation, substantial discovery would occur before a party would need to file or defend against a motion for summary judgment. It is important to emphasize in response that we do not expect Solers to demonstrate that it is entitled to judgment in its favor. Rather, Solers merely must show that it has a viable claim of defamation — that there is a genuine issue of material fact on each element of the claim that does not depend on knowing the defendant’s identity. Moreover, this is a test for deciding whether to enforce or quash the subpoena. If the court decides to quash, it will have to determine after a separate inquiry whether to prolong the litigation or to dismiss the complaint for failure to prosecute.
Recognizing Solers’ dilemma, the trial court may choose to allow some discovery before deciding whether to order disclosures that will reveal the identity of Doe. Here, for example, Solers does not know the exact statements made by John Doe (although one may fairly infer their nature from the accusations made in the demand letter sent by SIIA’s attorney). It might be useful as a preliminary step to order SIIA to disclose those statements, if that can be done without revealing Doe’s identity. Or, perhaps, the court could allow limited discovery to determine whether the court may exercise personal jurisdiction over Doe. 16 The court need not decide at the very outset of the litigation whether to compel SIIA to disclose the identity of John Doe.
It should be obvious that a key issue on remand will be determining what types of evidence the court reasonably may expect Solers to proffer without knowing the identity of John Doe. Applying this aspect of the test will require sensitivity to the unique circumstances of each case. It may, for example, be difficult for Solers to discern the defendant’s motive — and thus his state of mind — without knowing his identity.
See Cahill,
Nevertheless, in this context, a plaintiff must do more than simply plead his case. Solers acknowledges that it did not present evidence to support its allegations of damage, but claims it did not know it was expected to do so at this stage of the proceedings. In other words, Solers believed that the trial court was applying a “motion to dismiss” standard and would focus only on the allegations in its complaint.
See In re Curseen,
So ordered.
Notes
. The record does not indicate Doe’s gender, but, consistently with the caption of this appeal, we will use masculine terms to refer to the defendant-in-waiting.
. After the parties presented oral argument, but before this opinion was released, Judge Bates of the United States District Court considered a similar case where the plaintiff sought to learn the identities of his alleged defamers.
Sinclair v. TubeSockTedD,
. Due, apparently, to its non-party status, SIIA did not receive notice of this hearing and did not attend.
. This case is unusual because defendant Doe has not been served with the complaint and never filed a motion to dismiss. However, the analysis accompanying the order of dismissal resembled that applied to a Rule 12(b)(6) motion. Accordingly, we will assess the dismissal as if it originated from a motion to dismiss filed by the defendant.
. This appeal does not require us to decide whether this court will follow the "facial plausibility” standard recently discussed in
Ashcroft v. Iqbal,
- U.S. -,
. SIIA asserts that we should not entertain this appeal because Solers in essence requested that the trial court dismiss its complaint (so that it could seek appellate review of the order denying enforcement of its subpoena).
See Ganss v. Goldenberg,
The posture of this case is similar to
Zassenhaus v. Evening Star Newspaper Co.,
131 U.S.App. D.C. 384,
.
See also In re Subpoena Duces Tecum to America Online, Inc.,
No. 40570,
. Solers has also alleged tortious interference with prospective advantageous business opportunities. We do not address that claim separately in this context because we view the alleged injury as a consequence of the defamation. Indeed, that count of the amended complaint specifically alleges that "[s]uch damage was proximately caused by the false and defamatory statements published by Defendant.” We are satisfied that Solers has sufficiently alleged the elements of this tort to survive a motion to dismiss under Civil Rule 12(b)(6). Furthermore, contrary to SIIA's argument, Solers has not abandoned this claim.
. Although not expressly proposing a test, Solers appears to advocate a "motion to dismiss” standard, whereby the plaintiff's subpoena is enforced if its complaint adequately states a claim upon which relief can be granted. Such a standard may provide meaningful protection in a jurisdiction that has stricter pleading requirements than we do.
See Lassa v. Rongstad,
. We are aware of the criticism of
Cahill
voiced in
McMann v. Doe,
. We are not dealing here with a subpoena seeking to compel a non-party journalist to reveal confidential sources. Additional First Amendment interests are involved in such cases, and it may be appropriate there to require the exhaustion of alternative sources.
See generally Hatfill v. Gonzales,
. Asserting that Doe's speech consisted of "defamatory statements to a private organization about a private person,” Solers insists that “the First Amendment does not protect this kind of purely private defamation.” We have already explained that the First Amendment does not protect defamatory speech, and it may turn out that Solers is correct. But we are at the threshold of litigation in this case, and Solers has yet to prove any element of defamation.
Solers relies on
Ayala v. Washington,
Although we spoke broadly in
Ayala
of "the universe of First Amendment defamation law” and “whether a particular speech is the kind that merits constitutional protection,”
.The description of SIIA’s Corporate Anti-Piracy Reward Program on the website refers to SIIA’s "long standing policy of keeping the identity of our sources anonymous (unless required by law to disclose the identity).”
. Software piracy is a serious global problem. See Fifth Annual BSA and IDC Global Software Piracy Study 2007, available at http:// global.bsa.org/idcglobalstudy2007 (reporting that losses from piracy in 2007 amount to $48 billion dollars). Piracy has a particularly devastating effect on the economy of the United States, which holds a large share of the software market. See The Economic Benefits of Reducing PC Software Piracy, available at http://www.bsa.org/idcstudy (January 2008) (predicting that "if America's PC software piracy rate were to be lowered 10 percentage points over the next four years," it would create "an additional 32,031 jobs, $41 billion in local industry revenues and $6.7 billion in additional tax revenues for federal, regional, and local governments.”).
.
Amicus curiae
asserts that efforts to learn the identity of informants such as Doe infringe upon "the freedom of speech and the freedom of association of John Doe, SIIA, and its members." It is not clear that we should address this "freedom of association” argument at all, because it has not been briefed by SIIA on appeal and was barely mentioned in the trial court. Nevertheless, we consider and reject this claim because the record and the case law do not support it. "To establish such a violation, the target of a subpoena must make a prima facie showing of a first amendment infringement — typically, that enforcement of the disclosure requirement will result in harassment of current members, a decline in new members, or other chilling of associational rights.”
United States v. Comley,
.
See Eric T. v. National Medical Enterprises, Inc.,
. We decline SIIA's suggestion that we affirm on alternative grounds not addressed by the trial court. This record discloses no reason to think that all documents responsive to the subpoena are protected by the work product doctrine.
See generally In re Artis,
