John Doe subpoenas: toward a consistent legal standard.

AuthorGleicher, Nathaniel

NOTE CONTENTS INTRODUCTION I. WHAT IS A JOHN DOE SUBPOENA? A. The Qualified Privilege of Anonymous Speech B. From John Doe Pleading to John Doe Subpoenas C. The Unique Features of John Doe Subpoenas II. DISTINGUISHING ONLINE HARASSMENT FROM TRADITIONAL ANONYMOUS ONLINE SPEECH A. Public Figure Doctrine B. Adapting the Public Figure Standard to Anonymous Online Speech C. Distinguishing Between Chilling and Nonchilling Speech III. EVALUATING THE CURRENT STANDARDS AND DEVELOPING A SINGLE BALANCED STANDARD A. Existing John Doe Subpoena Standards B. Notice and Opportunity To Respond 1. Who Should Be Required To Notify? 2. How Should the Defendant Be Notified? 3. How Long Should the Defendant Have To Respond? 4. An Appropriate Standard for Defendant Notice C. Strength of Plaintiff's Argument 1. Good Faith 2. Survive a Motion To Dismiss 3. Withstand a Motion for Summary Judgment 4. Establish a Prima Facie Case 5. The Problem of Elements that Are Beyond the Plaintiff's Control 6. Heightened Standard for Public Figure Plaintiffs 7. An Appropriate Standard for the Strength of the Plaintiff's Argument D. Relevance of Information Sought E. Specificity of Crime and Evidence F. Balancing the Rights of the Plaintiff and the Defendant G. Exhaustion of Alternatives IV. A SINGLE STANDARD FOR JOHN DOE SUBPOENAS A. Identifying an Anonymous Defendant B. Applying the Standard: AutoAdmit CONCLUSION INTRODUCTION

Anonymous speech conjures the image of a pamphleteer who speaks out against corruption, defying the voices of power and publishing anonymously for fear of reprisal. Two centuries ago, pamphleteers worked on printing machines, distributing their words by pony express and stagecoach. Our Founding Fathers debated the makeup of the fledgling United States under pseudonyms. (1) Today, anonymous speakers use blogs, message boards, and online wikis to reach millions of readers. In these new media, which are virtually free of production and delivery costs, anyone can become a modern-day muckraker, exposing scandal and speaking out against fraud from the safety of his or her computer. From anonymous message boards criticizing massive corporations, (2) to citizens who scrutinize elected officials, (3) to websites that enable the anonymous release of government and corporate documents, (4) the Internet has expanded the cape of anonymity to shield an army of pamphleteers.

The Internet can keep speakers anonymous, but it can also thrust unsuspecting subjects into the harsh eye of the public. A high school boy who videotaped himself imitating a Jedi, with a golf club in place of a lightsaber, became an international sensation when other students posted his video on YouTube. It quickly became one of the most watched videos on the Internet, spawning a legion of imitations and mashups. The teasing--at school, around town, and online--was merciless. (5) The megaphone of the Internet does not merely magnify socially conscious speech. It also lends casual bullying a global reach. (6) New technology has made harassment more possible and powerful online even as it has empowered modern-day pamphleteers to speak anonymously to ever-growing audiences.

Combining these two phenomena reveals the dark side of anonymous online speech. Anonymity increasingly serves as a cover for gossip, defamation, harassment, and even assault on the Internet. Faceless crowds of online tormentors wield virtual pitchforks, carry virtual torches, and hound innocent targets into hiding and out of the online world entirely. (7) The consequences of these attacks can be felt in the real world, impacting targets' personal lives and putting them in fear for their safety. (8) The most common targets are women who are singled out and attacked online with violent threats of physical and sexual assault. (9) Racist, homophobic, and anti-religious attacks are also prevalent. (10) According to Danielle Citron, a key element in the rise of these attacks is that the speakers remain anonymous: "Individuals say and do things online that they would never consider saying or doing offline because they feel anonymous...." (11) Whereas anonymity has been traditionally viewed as a shield for the individual against tyranny, in this context it enables a majority to terrorize the few.

The rise of online harassment challenges the traditional justifications for anonymous speech. The most common argument for anonymity is that it increases the ability of people to speak, and protects speech that might not otherwise be heard. Harassment under cover of anonymity, however, can stifle the speech of its targets. Indeed, those overwhelmingly targeted by online harassment--members of social minorities--are those most in need of protection. Silencing the contributions of the targets of online harassment "impoverish[es] the dialogue society depends upon for purposes great and small." (12) Thus, anonymous harassing speech may reduce, rather than enhance, the amount and quality of online speech.

Legal enforcement in this vast and changing environment is precariously balanced on a single procedural tool: the John Doe subpoena. Because of the unique structure of the Internet, the identities of most supposedly "anonymous" posters, while impenetrable to the casual observer, are tracked and stored by the websites on which they post and by the Internet service providers (ISPs) that provide them with Internet access. (13) John Doe subpoenas allow plaintiffs to discover the identity of anonymous online speakers from their ISP or from websites they visited. Without a successful John Doe subpoena, a target of anonymous online speech has no way to uncover his or her attackers and no legal remedy. Although John Doe subpoenas are procedural tools, the standards governing them define the extent of First Amendment rights online. A standard that is too permissive severely weakens the ability of citizens to speak anonymously, limiting freedom of speech online. Too restrictive a standard leaves the increasing litany of targets of online harassment with no defense. Only a consistent nationwide standard for John Doe subpoenas will ensure balanced protection for both anonymous online speakers and the targets of anonymous online speech.

Despite their importance, John Doe subpoenas have no such single standard. No fewer than seven different cases (14) have expressed distinct standards over the past nine years. These standards vary widely, making the extent of the right to anonymous speech online uncertain. Although recent standards have begun to achieve a measure of consistency, they are just beginning to be tested against the rise of online harassment. This Note will examine John Doe subpoenas, their history, and the standards that govern them. Based on this analysis, it will evaluate the emerging consensus of recent standards and recommend a single, consistent standard that fairly balances the interests of plaintiffs and defendants and is flexible enough to address the emerging paradigms of anonymous online speech.

Part I of this Note examines the history of John Doe pleadings, the procedure of modern John Doe subpoenas, and the unique challenges they present. Part II argues that John Doe subpoena standards should be structured to afford less anonymity to online speakers who chill more speech than they create. Part III breaks John Doe subpoena standards down into six constituent factors and evaluates what level of each factor is appropriate to balance the interests of both plaintiffs and defendants. Part W closes by presenting a single standard that will fairly balance the First Amendment interests of both plaintiffs and defendants, and by applying this proposed standard to a recent online controversy.

  1. WHAT IS A JOHN DOE SUBPOENA?

    1. The Qualified Privilege of Anonymous Speech

      In McIntyre v. Ohio Elections Commission, the Court concluded that "an author's decision to remain anonymous, like other decisions concerning omissions or additions to the content of a publication, is an aspect of the freedom of speech protected by the First Amendment." (15) The Court based McIntyre on two grounds--one of public concern and one of private concern. First, "'[a]nonymity is a shield from the tyranny of the majority' without which public discourse would certainly suffer." (16) Second, the author's decision to identify himself should be a question of authorial autonomy: "[A]n author generally is free to decide whether or not to disclose his or her true identity." (17) Since then, the Court has extended this logic to "the vast democratic forums of the Internet," (18) which "would be stifled if users were unable to preserve their anonymity online." (19)

      Whether online or offline the right to anonymous speech is not absolute. Lyrissa Lidsky recently argued that the "right" to anonymous speech is better termed a "[q]ualified [p]rivilege," (20) as it is "not absolute but must be balanced against plaintiffs' interests." (21) According to Lidsky, "[s]peakers may use the shield of anonymity for a variety of purposes, only some of which may be consistent with the public good." (22) Understanding the extent of this qualified privilege requires a better understanding of the process of John Doe subpoenas.

    2. From John Doe Pleading to John Doe Subpoenas

      Suits involving fictitious parties are a longstanding legal phenomenon. (23) John Doe was first conceived as "an entirely fictional character," on whose behalf plaintiffs could bring suits. (24) Later, this technique was used to enable the initiation of proceedings against as yet unknown defendants. Civil rights cases against law enforcement were the most common example of this technique, where plaintiffs sued a set of unnamed police officers. (25) Without a pseudonymous John Doe, the plaintiff cannot file his suit until he knows the identity of his defendant(s), and thus cannot rely on court-sanctioned discovery tools to identify them. Allowing plaintiffs to sue Doe defendants permits them to...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT