El-Sedfy v. WhatsApp Inc. et al

Filing 29

Order by Chief Magistrate Judge Joseph C. Spero vacating hearing set for November 4, 2016 and granting 19 Motion to Dismiss. The Initial Case Management Conference is continued to 2:00 PM on November 4, 2016 in Courtroom G, 15th Floor, San Francisco. Plaintiff may file an amended complaint no later than November 30, 2016. (jcslc2S, COURT STAFF) (Filed on 10/31/2016)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 SAADELDIN DEAN EL-SEDFY, 7 Case No. 16-cv-04056-JCS Plaintiff, 8 v. ORDER GRANTING MOTION TO DISMISS 9 WHATSAPP INC., et al., 10 Re: Dkt. No. 19 Defendants. United States District Court Northern District of California 11 12 I. INTRODUCTION Plaintiff Saadeldin (Dean) El-Sedfy, pro se, brings this action alleging that Defendants 13 14 WhatsApp Inc. and Facebook, Inc. infringed El-Sedfy‘s copyright in software that allows users to 15 send and receive encrypted text messages on mobile devices. Defendants now move to dismiss 16 for failure to state a claim pursuant to Rule 12(b)(6) of the Federal Rules of Civil Procedure. The 17 Court finds the motion suitable for resolution without oral argument and hereby VACATES the 18 hearing previously set for November 4, 2016 at 10:30 AM. See Civ. L.R. 7-1(b). The case 19 management conference set for November 4, 2016 is CONTINUED to 2:00 PM the same day. For the reasons discussed below, Defendants‘ motion is GRANTED, and the Complaint is 20 21 DISMISSED with leave to amend. If El-Sedfy is aware of similarities between his and 22 Defendants‘ software that fall within the scope of copyright protection as discussed below, he may 23 file an amended complaint alleging such infringement no later than November 30, 2016.1 24 /// 25 /// 26 /// 27 1 28 The parties have consented to the jurisdiction of the undersigned magistrate judge for all purposes pursuant to 28 U.S.C. § 636(c). 1 2 3 II. BACKGROUND A. Allegations of the Complaint 1. El-Sedfy’s Work and Copyright 4 El-Sedfy, a retired Canadian aerospace engineer who later worked a consultant and 5 software developer, began developing security and text encryption software in 1999 and created a 6 Canadian sole proprietorship, SR&ED Engineering Inc., for that purpose. Compl. (dkt. 1) ¶ 4. El- 7 Sedfy developed three products: (1) AntiSpy SMS, which provided end-to-end encryption of SMS 8 text messages; (2) BusyTeam, which employs the same technology in the context of collaboration 9 among business professionals; and (3) e_ScutSheet, which is ―structurally identical‖ to BusyTeam 10 United States District Court Northern District of California 11 but adapted for use in hospital settings. Id. ¶¶ 4(a)–(c). El-Sedfy‘s early work in software development, beginning in 1999, ―produced several 12 applications for the Windows operating system.‖ Id. ¶ 8. In the course of that work he ―arrived at 13 an expression of the idea relating to encrypting messages, data and text being transmitted over the 14 internet World Wide Web.‖ Id. ¶ 9. By 2010, El-Sedfy had ―further developed the structure, 15 sequence and organization of the originally developed expressions . . . to become suitable for the 16 applications running on Mobile Devices,‖ originally those running the Android operating system. 17 Id. ¶ 10. He released his AntiSpy SMS product in July of 2012 through the Samsung and Google 18 mobile application stores. Id. On August 1, 2012, El-Sedfy (through his SR&ED sole 19 proprietorship) obtained a certificate of registration from the United States Copyright Office for 20 work titled ―Universal algorithms, process and source code to enable compatible sending and 21 retrieval of encrypted SMS messages by mobile devices running different operating systems such 22 as Apple OS x. [sic] Android and Windows.‖ Id. ¶ 10 & Ex. A (certificate for copyright 23 registration number TX 5-579-575). El-Sedfy‘s copyright application ―included the first version 24 of the source code,‖ which he authored in 2000. Id. ¶ 11. 25 26 27 28 According to El-Sedfy‘s Complaint, ―[t]he copyright protected expression can be briefly described as follows:‖ (a) Sender Personal Identity Key (SPIK, which is his/her e_DNA) is dynamically generated/computed and verified automatically on the device at the initiation of the application. 2 1 (b) The recipient must be selected, from the available contacts list, prior to composing the SMS message in order to compute the Recipient‘s Personal Identity Key (RPIK, which is his/her e_DNA). 2 (c) Upon invoking the Send command, the Recipient‘s Personal Identification Key (RPIK) is used in conjunction with the encryption algorithm to produce the encrypted text. There are several encryption algorithms available in the public domain. The Plaintiff‘s developed his own encryption, which is Copyright protected. 3 4 5 6 (d) The encrypted text is then added to both public key and the RPIK. The newly produced cryptographic message is submitted to the SMS sending algorithm and the whole is sent. This phase is the most important part of the expression as it allows the idea of Secure end-to-end messaging to be achieved. The message structure (in terms of inclusion of the RPIK and public Key, i.e. the electronic DNAs) is very important as it will cause the success or failure of Safe, Verifiable and Secure decryption processes to be performed on the recipient‘s device. The aforementioned solution is not a Scéne á faire as there are many other solutions. 7 8 9 10 United States District Court Northern District of California 11 (e) When the cryptographic message is received, the application will extract the Public Key and the RPIK to compare them to the local stored Keys. They must be identical for the decryption to be performed. 12 13 14 15 16 Id. 2. Defendants’ Products Defendant WhatsApp provides an eponymous product that allows users to send messages 17 among various mobile and desktop platforms. Id. ¶ 5. WhatsApp is currently a wholly owned 18 subsidiary of Defendant Facebook. Id. Facebook produces a social networking platform available 19 through its website and mobile applications. Id. ¶ 6. Users interact in various ways, including 20 through Facebook‘s ―News Feed‖ feature. Id. Facebook also offers other products, which El- 21 Sedfy alleges it obtained ―by way of plagiarism, or acquisition, or allegedly development,‖ 22 including: (1) Instagram, a mobile application for editing and sharing photographs and videos; 23 (2) Messenger, a mobile and web-based messaging application that allows users to communicate 24 with one another and businesses to engage with customers; (3) ―WhatsApp Messenger, which is a 25 fast, simple and reliable mobile messaging application that is used by people around the world and 26 is available on a variety of mobile platforms‖; and (4) Oculus, a virtual reality platform. Id. ¶ 7. 27 28 WhatsApp announced its introduction of ―end-to-end encrypted SMS messaging‖ in April of 2016. Id. ¶ 12. Facebook has announced in a white paper that it is testing end-to-end 3 1 encryption. Id. 2 3 3. Claim of Infringement The sole claim of El-Sedfy‘s Complaint is copyright infringement in violation of 17 U.S.C. 4 § 106. See id. ¶¶ 13–19. Other than Defendants‘ announcements regarding encryption discussed 5 above, the only allegations regarding Defendants‘ purported wrongful conduct are as follows: 6 14. Without consent, authorization, approval, or license, the Defendants knowingly, willingly, and unlawfully copied, prepared, published, and distributed Plaintiff‘s copyrighted work, portions thereof, or derivative works and continues [sic] to do so. 7 8 15. On information and belief, the Defendants direct and induced infringements are and have been knowing and willful. 9 Id. ¶¶ 14–15. El-Sedfy has ―attempted several times to contact the Defendants to arrive at a 11 United States District Court Northern District of California 10 resolution‖ of what he perceives as a violation of his copyright. Id. ¶ 12 & Exs. F–H. In one such 12 communication, a letter that El-Sedfy sent to Facebook CEO Mark Zuckerberg, El-Sedfy included 13 the following explanation of his position: 14 As you are aware, the copyrightable component aspect of the software are those relating to Structure, Sequence and Organization. I trust that you would agree that it is very easy to prove the existence, of those three, aforementioned elements in two SEEMINGLY different pieces of software application of End to End SMS Encryption/Decryption, regardless if even the language they may be express, or written in. I trust that you agree that a computer language is just a symbolic venue to express an idea. 15 16 17 18 19 Id. Ex. H. 20 B. 21 Defendants argue that El-Sedfy‘s Complaint must be dismissed based on the ―fundamental Arguments 22 tenet of copyright law that protection only extends to an author‘s particular original expression of 23 an idea fixed in a tangible medium, and not to the idea itself.‖ Mot. (dkt. 19) at 2 (citing 17 24 U.S.C. § 102). According to Defendants, El-Sedfy alleges only that Defendants used the idea of 25 end-to-end encryption of SMS messages, but does not allege ―that Defendants copied any aspect 26 of [El-Sedfy‘s] source code or graphical user interface, either literally or non-literally, much less 27 an allegation that Defendants copied protectable expression in [El-Sedfy‘s] work.‖ Id. Citing 28 Ninth Circuit precedent, Defendants argue that a plaintiff claiming copyright infringement must 4 1 specifically allege ―that the alleged infringer has copied a protectable aspect of the claimed work, 2 or that the alleged infringer had access to the copyrighted work and that the expression of the 3 copyrighted work—not just its general concept or idea—is substantially similar to the alleged 4 infringing work.‖ Id. at 4 (citing Funky Films, Inc. v. Time Warner Entm’t Co., 462 F.3d 1072, 5 1076 (9th Cir. 2006); Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1442 (9th Cir. 6 1994)). Similarly, Defendants suggest that El-Sedfy‘s Complaint improperly attempts to assert 7 copyright protection of ―functionality,‖ which in fact falls within the domain of patent protection, 8 not copyright. See id. Defendants contend that El-Sedfy has not alleged: (1) direct or ―literal‖ 9 copying of any protectable work, id. at 5–6; (2) access by Defendants to El-Sedfy‘s work, id. at 6– 7; or (3) substantial similarity between El-Sedfy‘s and Defendants‘ products, beyond merely the 11 United States District Court Northern District of California 10 use of end-to-end encryption, id. at 7. 12 El-Sedfy‘s opposition brief relies in large part on authority describing the liberal pleading 13 standard applied by the federal courts before the Supreme Court‘s decisions in Bell Atlantic 14 Corporation v. Twombly, 550 U.S. 544 (2007) and Ashcroft v. Iqbal, 556 U.S. 662 (2009). See 15 Opp‘n (dkt. 20) at 5–7 (citing, e.g., Swierkiewicz v. Sorema N. A., 534 U.S. 506, 512 (2002); 16 Atchison, Topeka & Santa Fe Ry. Co. v. Buell, 480 U.S. 557, 568 n.15 (1987)). According to El- 17 Sedfy, a plaintiff without access to a defendant‘s source code cannot be expected ―to allege literal 18 Copyright Infringement of his source code,‖ at least ―where there are [sic] other overwhelming 19 evidence, obvious to a Competent Software Engineer, in support of Copyright Infringement by the 20 Defendants.‖ Id. at 2−3. El-Sedfy also makes much of the fact that his Complaint repeats the 21 phrase ―expression of the idea,‖ and argues that such language defeats Defendants‘ argument that 22 his claim improperly seeks to assert copyright protection of the idea itself. See id. at 4–5. 23 According to El-Sedfy, paragraph 11 of the Complaint—which summarizes the functionality of 24 his encryption software—describes that ―expression‖ and thus ―successfully define[s] the legal 25 basis of Non-Literal Software Copyright Infringement,‖ and paragraph 12—which alleges that 26 WhatsApp introduced end-to-end encryption in its product and that Facebook released a white 27 paper on the subject—―provides the proof of the Infringement alleged.‖ Id. at 4–6, 9. 28 El-Sedfy‘s opposition brief contends that the arguments in Defendants‘ motion are not 5 1 grounds to dismiss, but rather reasons that El-Sedfy should be allowed to obtain WhatsApp‘s 2 source code through discovery. Id. at 7, 8–9. El-Sedfy also makes clear that he does not allege 3 infringement of the graphical user interface of his software, which, according to El-Sedfy, courts 4 have long held to be outside the scope of copyright protection. Id. at 7–8. El-Sedfy argues that 5 Defendants‘ allusion to patent law amounts to an ―admi[ssion] that they have infringed on some of 6 [his] rights‖ and an attempt to dismiss the case based on the ―formality‖ of whether such rights are 7 properly construed as copyright or patent protection—according to El-Sedfy, his software as 8 described in paragraph 11 of the Complaint qualifies for protection under either doctrine, and he 9 may properly bring this action for copyright infringement. Id. at 2. Defendants‘ reply brief focuses on the argument that, post-Twombly, allegations that 11 United States District Court Northern District of California 10 support the mere possibility of infringement are not sufficient to state a claim or to grant a plaintiff 12 discovery, and that El-Sedfy‘s Complaint does not plausibly allege any actionable infringement. 13 See generally Reply (dkt. 21). According to Defendants, the description of the software at 14 paragraph 11, on which El-Sedfy relies as a description of the structure, sequence, and 15 organization of the expressive work at issue, in fact only describes the functionality of the 16 software, and functionality is not eligible for copyright protection. Id. at 2–3. Defendants also 17 deny that their motion admits any infringement, either of copyright or of patent rights, id. at 4 n.5, 18 and contend that El-Sedfy‘s assertion in his opposition that neither party had legal access to the 19 other‘s source code in fact supports Defendants‘ argument that El-Sedfy cannot state a claim for 20 non-literal copyright infringement, id. at 2. 21 III. 22 23 ANALYSIS A. Legal Standard A complaint may be dismissed for failure to state a claim on which relief can be granted 24 under Rule 12(b)(6) of the Federal Rules of Civil Procedure. ―The purpose of a motion to dismiss 25 under Rule 12(b)(6) is to test the legal sufficiency of the complaint.‖ N. Star Int’l v. Ariz. Corp. 26 Comm’n, 720 F.2d 578, 581 (9th Cir. 1983). Generally, a plaintiff‘s burden at the pleading stage 27 is relatively light. Rule 8(a) of the Federal Rules of Civil Procedure states that ―[a] pleading 28 which sets forth a claim for relief . . . shall contain . . . a short and plain statement of the claim 6 1 2 showing that the pleader is entitled to relief.‖ Fed. R. Civ. P. 8(a). In ruling on a motion to dismiss under Rule 12(b)(6), the court analyzes the complaint and takes ―all allegations of material fact as true and construe[s] them in the light most favorable to the 4 non-moving party.‖ Parks Sch. of Bus. v. Symington, 51 F.3d 1480, 1484 (9th Cir. 1995). 5 Dismissal may be based on a lack of a cognizable legal theory or on the absence of facts that 6 would support a valid theory. Balistreri v. Pacifica Police Dep’t, 901 F.2d 696, 699 (9th Cir. 7 1990). A complaint must ―contain either direct or inferential allegations respecting all the material 8 elements necessary to sustain recovery under some viable legal theory.‖ Bell Atl. Corp. v. 9 Twombly, 550 U.S. 544, 562 (2007) (citing Car Carriers, Inc. v. Ford Motor Co., 745 F.2d 1101, 10 1106 (7th Cir. 1984)). ―A pleading that offers ‗labels and conclusions‘ or ‗a formulaic recitation 11 United States District Court Northern District of California 3 of the elements of a cause of action will not do.‘‖ Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) 12 (quoting Twombly, 550 U.S. at 555). ―Nor does a complaint suffice if it tenders ‗naked 13 assertion[s]‘ devoid of ‗further factual enhancement.‘‖ Id. (quoting Twombly, 550 U.S. at 557). 14 Rather, the claim must be ―‗plausible on its face,‘‖ meaning that the plaintiff must plead sufficient 15 factual allegations to ―allow[] the court to draw the reasonable inference that the defendant is 16 liable for the misconduct alleged.‖ Id. (quoting Twombly, 550 U.S. at 570). 17 Where the complaint has been filed by a pro se plaintiff, as is the case here, courts must 18 ―construe the pleadings liberally . . . to afford the petitioner the benefit of any doubt.‖ Hebbe v. 19 Pliler, 627 F.3d 338, 342 (9th Cir. 2010) (citations omitted). ―A district court should not dismiss a 20 pro se complaint without leave to amend unless ‗it is absolutely clear that the deficiencies of the 21 complaint could not be cured by amendment.‘‖ Akhtar v. Mesa, 698 F.3d 1202, 1212 (9th Cir. 22 2012) (quoting Schucker v. Rockwood, 846 F.2d 1202, 1203−04 (9th Cir. 1988) (per curiam)). 23 Further, when it dismisses the complaint of a pro se litigant with leave to amend, ―the district court 24 must provide the litigant with notice of the deficiencies in his complaint in order to ensure that the 25 litigant uses the opportunity to amend effectively.‖ Id. (quoting Ferdik v. Bonzelet, 963 F.2d 26 1258, 1261 (9th Cir. 1992)). ―Without the benefit of a statement of deficiencies, the pro se litigant 27 will likely repeat previous errors.‖ Karim-Panahi v. L.A. Police Dep’t, 839 F.2d 621, 624 (9th 28 Cir. 1988) (quoting Noll v. Carlson, 809 F.2d 1446, 1448 (9th Cir. 1987)). 7 1 2 B. El-Sedfy Fails to State a Plausible Claim for Copyright Infringement ―To establish [copyright] infringement, two elements must be proven: (1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.‖ Feist 4 Publ’ns, Inc. v. Rural Tel. Ser. Co., 499 U.S. 340, 345 (1991) (citation omitted). The first element 5 requires that ―a work must be original to the author,‖ meaning ―that the work was independently 6 created by the author (as opposed to copied from other works), and that it possesses at least some 7 minimal degree of creativity.‖ Id. ―In no case does copyright protection for an original work of 8 authorship extend to any idea, procedure, process, system, method of operation, concept, principle, 9 or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in 10 such work.‖ 17 U.S.C. § 102(b). To the contrary, ―‗every idea, theory, and fact in a copyrighted 11 United States District Court Northern District of California 3 work becomes instantly available for public exploitation at the moment of publication‘; the 12 author‘s expression alone gains copyright protection.‖ Golan v. Holder, 132 S. Ct. 873, 890 13 (2012) (quoting Eldred v. Ashcroft, 537 U.S. 186, 219 (2003)). 14 The Ninth Circuit has recognized three elements of software that can be eligible for 15 copyright protection: ―(1) the software‘s ‗literal elements‘ such as the actual source and object 16 codes; (2) the software‘s ‗individual non-literal elements‘ such as discrete visual and audible 17 components; and (3) the software‘s ‗dynamic non-literal elements‘ such as the real time 18 experience and operation of the software.‖ NNG, KFT. V. AVA Enters., Inc., No. 2:14-cv-00220- 19 ODW(AJW), 2015 WL 5442725, at *3 (quoting and summarizing MDY Indus., LLC v. Blizzard 20 Entm’t, Inc., 629 F.3d 928, 942, 952–54 (9th Cir. 2010)). The Ninth Circuit has also set forth the 21 process for considering such infringement claims: 22 23 24 25 26 27 (1) The plaintiff must identify the source(s) of the alleged similarity between his work and the defendant‘s work. (2) Using analytic dissection, and, if necessary, expert testimony, the court must determine whether any of the allegedly similar features are protected by copyright. . . . [U]nprotectable ideas must be separated from potentially protectable expression; to that expression, the court must then apply the relevant limiting doctrines in the context of the particular medium involved, through the eyes of the ordinary consumer of that product. 28 8 1 2 3 4 (3) Having dissected the alleged similarities and considered the range of possible expression, the court must define the scope of the plaintiff‘s copyright . . . . Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1443 (9th Cir. 1994). El-Sedfy‘s assertion that ―Defendants knowingly, willingly, and unlawfully copied, 5 prepared, published, and distributed Plaintiff‘s copyrighted work, portions thereof, or derivative 6 works,‖ Compl. ¶ 14, is ―a formulaic recitation of the elements of a cause of action‖ and thus not, 7 in itself, sufficient to state a claim. See Iqbal, 556 U.S. at 678. The Court must therefore examine 8 the factual allegations of the Complaint to determine whether they plausibly support a conclusion 9 that actionable infringement occurred. 10 The Court‘s analysis begins with the ―source of the alleged similarity.‖ See Apple United States District Court Northern District of California 11 Computer, 35 F.3d at 1443. Here, El-Sedfy‘s Complaint does not identify any aspect of his 12 software‘s source code that Defendants allegedly copied. Nor is there any basis to infer that such 13 copying occurred, given that the Complaint does not allege that Defendants had access to El- 14 Sedfy‘s source code, and El-Sedfy‘s opposition makes clear his position that neither party had 15 access—at least legal access—to the other‘s source code. Opp‘n at 2; see also Apple Computer, 16 35 F.3d 1435 (―Copying may be shown by circumstantial evidence of access and substantial 17 similarity of both the general ideas and expression between the copyrighted work and the allegedly 18 infringing work.‖). The Complaint therefore does not state a plausible claim of infringement of 19 El-Sedfy‘s software‘s ―literal elements,‖ i.e., its source code. 20 El-Sedfy‘s opposition indicates that he seeks to pursue a theory of infringement of non- 21 literal software elements. See Opp‘n at 5 (―The Complaint, therefore, has successfully defined the 22 legal basis of Non-Literal Software Copyright Infringement.‖). As described in the Complaint, the 23 only overlap between his software and Defendants‘ software is the use of end-to-end encryption 24 for messages. See Compl. ¶ 12. El-Sedfy also suggests, although his Complaint does not 25 explicitly allege, that Defendants‘ software follows the same steps to provide such encryption. See 26 id. ¶ 11 (setting forth the basic steps El-Sedfy‘s software uses). Despite El-Sedfy‘s arguments to 27 the contrary, see Opp‘n at 3−5, the Court agrees with Defendants that paragraph 11 of El-Sedfy‘s 28 Complaint describes a method, not a creative expression. The fact that the description consists of 9 1 a relatively short summary rather than a detailed explanation of the technology is of no 2 consequence. Cf. Opp‘n at 5 (arguing that ―describe[ing] a method or system, would require many 3 pages and not one paragraph‖). The sequence of steps described in the Complaint does not 4 resemble the sort of ―non-literal elements‖ that courts have held to be subject to copyright. Cf., 5 e.g., MDY Indus., 629 F.3d at 942−43 (discussing ―individual non-literal elements‖ consisting of 6 ―visual and audible components‖ of a computer game and ―dynamic non-literal elements‖ 7 consisting of the player‘s ―real-time experience‖). Indeed, El-Sedfy‘s letter to Facebook CEO 8 Mark Zuckerberg strongly suggests that El-Sedfy‘s theory of infringement is based on a similarity 9 of ideas, not of the particular expression of that idea. See Compl. Ex. H (―I trust that you agree that a computer language is just a symbolic venue to express an idea.‖). El-Sedfy cites no 11 United States District Court Northern District of California 10 authority for extending copyright protection to the alleged similarities between his and 12 Defendants‘ use of end-to-end encryption. 13 ―Monopoly protection for such a method ‗can only be secured, if it can be secured at all, 14 by letters-patent,‘‖2 and ―is not eligible for protection by copyright.‖ Bikram’s Yoga College of 15 India, L.P. v. Evolation Yoga, LLC, 803 F.3d 1032, 1039−40 (9th Cir. 2015) (quoting Baker v. 16 Selden, 101 U.S. 99, 105 (1879)) (holding that a ―system‖ of yoga poses and breathing exercises 17 was not copyrightable). Unless independently protected by patent rights, El-Sedfy‘s ideas and 18 methods for encryption of messages ―bec[ame] instantly available for public exploitation at the 19 moment of publication.‖ See Golan, 132 S. Ct. at 890 (citation omitted). The Court therefore 20 holds that even if the Complaint could be construed as alleging that Defendants‘ software follows 21 the same steps that El-Sedfy describes of his own software, no portion of the alleged similarity 22 between the parties‘ products is protected by copyright. Accordingly, El-Sedfy‘s claim for 23 copyright infringement must be dismissed. 24 IV. CONCLUSION 25 For the reasons discussed above, Defendants‘ motion is GRANTED, and the Complaint is 26 DISMISSED. If El-Sedfy can identify any similarity between his own software and Defendants‘ 27 2 28 El-Sedfy does not bring a claim for patent infringement, nor does he allege that he holds a patent for his software. 10 1 software that is protected by copyright—i.e., a similarity in expression that is not a process, 2 method, or idea—he may file an amended complaint alleging such infringement no later than 3 November 30, 2016. Any such amended complaint must include the caption and civil case 4 number used in this Order (16-cv-4056-JCS) and the words FIRST AMENDED COMPLAINT on 5 the first page. Because an amended complaint completely replaces the previous complaint, any 6 amended complaint may not incorporate claims or allegations of El-Sedfy‘s original Complaint by 7 reference, but instead must include all the claims El-Sedfy wishes to present and all of the 8 defendants he wishes to sue. See Ferdik, 963 F.2d at 1262. 9 El-Sedfy, who is not represented by counsel, is encouraged to consult with the Federal Pro Bono Project‘s Legal Help Center in either of the Oakland or San Francisco federal courthouses 11 United States District Court Northern District of California 10 for assistance if he intends to file an amended complaint. The San Francisco Legal Help Center 12 office is located in Room 2796 on the 15th floor at 450 Golden Gate Avenue, San Francisco, CA 13 94102. The Oakland office is located in Room 470-S on the 4th floor at 1301 Clay Street, 14 Oakland, CA 94612. Appointments can be made by calling (415) 782-8982 or signing up in the 15 appointment book located outside either office, and telephone appointments are available. 16 Lawyers at the Legal Help Center can provide basic assistance to parties representing themselves 17 but cannot provide legal representation. 18 IT IS SO ORDERED. 19 20 21 Dated: October 31, 2016 ______________________________________ JOSEPH C. SPERO Chief Magistrate Judge 22 23 24 25 26 27 28 11

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?