El-Sedfy v. WhatsApp Inc. et al
Filing
29
Order by Chief Magistrate Judge Joseph C. Spero vacating hearing set for November 4, 2016 and granting 19 Motion to Dismiss. The Initial Case Management Conference is continued to 2:00 PM on November 4, 2016 in Courtroom G, 15th Floor, San Francisco. Plaintiff may file an amended complaint no later than November 30, 2016. (jcslc2S, COURT STAFF) (Filed on 10/31/2016)
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
SAADELDIN DEAN EL-SEDFY,
7
Case No. 16-cv-04056-JCS
Plaintiff,
8
v.
ORDER GRANTING MOTION TO
DISMISS
9
WHATSAPP INC., et al.,
10
Re: Dkt. No. 19
Defendants.
United States District Court
Northern District of California
11
12
I.
INTRODUCTION
Plaintiff Saadeldin (Dean) El-Sedfy, pro se, brings this action alleging that Defendants
13
14
WhatsApp Inc. and Facebook, Inc. infringed El-Sedfy‘s copyright in software that allows users to
15
send and receive encrypted text messages on mobile devices. Defendants now move to dismiss
16
for failure to state a claim pursuant to Rule 12(b)(6) of the Federal Rules of Civil Procedure. The
17
Court finds the motion suitable for resolution without oral argument and hereby VACATES the
18
hearing previously set for November 4, 2016 at 10:30 AM. See Civ. L.R. 7-1(b). The case
19
management conference set for November 4, 2016 is CONTINUED to 2:00 PM the same day.
For the reasons discussed below, Defendants‘ motion is GRANTED, and the Complaint is
20
21
DISMISSED with leave to amend. If El-Sedfy is aware of similarities between his and
22
Defendants‘ software that fall within the scope of copyright protection as discussed below, he may
23
file an amended complaint alleging such infringement no later than November 30, 2016.1
24
///
25
///
26
///
27
1
28
The parties have consented to the jurisdiction of the undersigned magistrate judge for all
purposes pursuant to 28 U.S.C. § 636(c).
1
2
3
II.
BACKGROUND
A.
Allegations of the Complaint
1. El-Sedfy’s Work and Copyright
4
El-Sedfy, a retired Canadian aerospace engineer who later worked a consultant and
5
software developer, began developing security and text encryption software in 1999 and created a
6
Canadian sole proprietorship, SR&ED Engineering Inc., for that purpose. Compl. (dkt. 1) ¶ 4. El-
7
Sedfy developed three products: (1) AntiSpy SMS, which provided end-to-end encryption of SMS
8
text messages; (2) BusyTeam, which employs the same technology in the context of collaboration
9
among business professionals; and (3) e_ScutSheet, which is ―structurally identical‖ to BusyTeam
10
United States District Court
Northern District of California
11
but adapted for use in hospital settings. Id. ¶¶ 4(a)–(c).
El-Sedfy‘s early work in software development, beginning in 1999, ―produced several
12
applications for the Windows operating system.‖ Id. ¶ 8. In the course of that work he ―arrived at
13
an expression of the idea relating to encrypting messages, data and text being transmitted over the
14
internet World Wide Web.‖ Id. ¶ 9. By 2010, El-Sedfy had ―further developed the structure,
15
sequence and organization of the originally developed expressions . . . to become suitable for the
16
applications running on Mobile Devices,‖ originally those running the Android operating system.
17
Id. ¶ 10. He released his AntiSpy SMS product in July of 2012 through the Samsung and Google
18
mobile application stores. Id. On August 1, 2012, El-Sedfy (through his SR&ED sole
19
proprietorship) obtained a certificate of registration from the United States Copyright Office for
20
work titled ―Universal algorithms, process and source code to enable compatible sending and
21
retrieval of encrypted SMS messages by mobile devices running different operating systems such
22
as Apple OS x. [sic] Android and Windows.‖ Id. ¶ 10 & Ex. A (certificate for copyright
23
registration number TX 5-579-575). El-Sedfy‘s copyright application ―included the first version
24
of the source code,‖ which he authored in 2000. Id. ¶ 11.
25
26
27
28
According to El-Sedfy‘s Complaint, ―[t]he copyright protected expression can be briefly
described as follows:‖
(a) Sender Personal Identity Key (SPIK, which is his/her e_DNA) is
dynamically generated/computed and verified automatically on the
device at the initiation of the application.
2
1
(b) The recipient must be selected, from the available contacts list,
prior to composing the SMS message in order to compute the
Recipient‘s Personal Identity Key (RPIK, which is his/her e_DNA).
2
(c) Upon invoking the Send command, the Recipient‘s Personal
Identification Key (RPIK) is used in conjunction with the encryption
algorithm to produce the encrypted text. There are several
encryption algorithms available in the public domain. The Plaintiff‘s
developed his own encryption, which is Copyright protected.
3
4
5
6
(d) The encrypted text is then added to both public key and the
RPIK. The newly produced cryptographic message is submitted to
the SMS sending algorithm and the whole is sent. This phase is the
most important part of the expression as it allows the idea of Secure
end-to-end messaging to be achieved. The message structure (in
terms of inclusion of the RPIK and public Key, i.e. the electronic
DNAs) is very important as it will cause the success or failure of
Safe, Verifiable and Secure decryption processes to be performed on
the recipient‘s device. The aforementioned solution is not a Scéne á
faire as there are many other solutions.
7
8
9
10
United States District Court
Northern District of California
11
(e) When the cryptographic message is received, the application will
extract the Public Key and the RPIK to compare them to the local
stored Keys. They must be identical for the decryption to be
performed.
12
13
14
15
16
Id.
2. Defendants’ Products
Defendant WhatsApp provides an eponymous product that allows users to send messages
17
among various mobile and desktop platforms. Id. ¶ 5. WhatsApp is currently a wholly owned
18
subsidiary of Defendant Facebook. Id. Facebook produces a social networking platform available
19
through its website and mobile applications. Id. ¶ 6. Users interact in various ways, including
20
through Facebook‘s ―News Feed‖ feature. Id. Facebook also offers other products, which El-
21
Sedfy alleges it obtained ―by way of plagiarism, or acquisition, or allegedly development,‖
22
including: (1) Instagram, a mobile application for editing and sharing photographs and videos;
23
(2) Messenger, a mobile and web-based messaging application that allows users to communicate
24
with one another and businesses to engage with customers; (3) ―WhatsApp Messenger, which is a
25
fast, simple and reliable mobile messaging application that is used by people around the world and
26
is available on a variety of mobile platforms‖; and (4) Oculus, a virtual reality platform. Id. ¶ 7.
27
28
WhatsApp announced its introduction of ―end-to-end encrypted SMS messaging‖ in April
of 2016. Id. ¶ 12. Facebook has announced in a white paper that it is testing end-to-end
3
1
encryption. Id.
2
3
3. Claim of Infringement
The sole claim of El-Sedfy‘s Complaint is copyright infringement in violation of 17 U.S.C.
4
§ 106. See id. ¶¶ 13–19. Other than Defendants‘ announcements regarding encryption discussed
5
above, the only allegations regarding Defendants‘ purported wrongful conduct are as follows:
6
14. Without consent, authorization, approval, or license, the
Defendants knowingly, willingly, and unlawfully copied, prepared,
published, and distributed Plaintiff‘s copyrighted work, portions
thereof, or derivative works and continues [sic] to do so.
7
8
15. On information and belief, the Defendants direct and induced
infringements are and have been knowing and willful.
9
Id. ¶¶ 14–15. El-Sedfy has ―attempted several times to contact the Defendants to arrive at a
11
United States District Court
Northern District of California
10
resolution‖ of what he perceives as a violation of his copyright. Id. ¶ 12 & Exs. F–H. In one such
12
communication, a letter that El-Sedfy sent to Facebook CEO Mark Zuckerberg, El-Sedfy included
13
the following explanation of his position:
14
As you are aware, the copyrightable component aspect of the
software are those relating to Structure, Sequence and Organization.
I trust that you would agree that it is very easy to prove the
existence, of those three, aforementioned elements in two
SEEMINGLY different pieces of software application of End to End
SMS Encryption/Decryption, regardless if even the language they
may be express, or written in. I trust that you agree that a computer
language is just a symbolic venue to express an idea.
15
16
17
18
19
Id. Ex. H.
20
B.
21
Defendants argue that El-Sedfy‘s Complaint must be dismissed based on the ―fundamental
Arguments
22
tenet of copyright law that protection only extends to an author‘s particular original expression of
23
an idea fixed in a tangible medium, and not to the idea itself.‖ Mot. (dkt. 19) at 2 (citing 17
24
U.S.C. § 102). According to Defendants, El-Sedfy alleges only that Defendants used the idea of
25
end-to-end encryption of SMS messages, but does not allege ―that Defendants copied any aspect
26
of [El-Sedfy‘s] source code or graphical user interface, either literally or non-literally, much less
27
an allegation that Defendants copied protectable expression in [El-Sedfy‘s] work.‖ Id. Citing
28
Ninth Circuit precedent, Defendants argue that a plaintiff claiming copyright infringement must
4
1
specifically allege ―that the alleged infringer has copied a protectable aspect of the claimed work,
2
or that the alleged infringer had access to the copyrighted work and that the expression of the
3
copyrighted work—not just its general concept or idea—is substantially similar to the alleged
4
infringing work.‖ Id. at 4 (citing Funky Films, Inc. v. Time Warner Entm’t Co., 462 F.3d 1072,
5
1076 (9th Cir. 2006); Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1442 (9th Cir.
6
1994)). Similarly, Defendants suggest that El-Sedfy‘s Complaint improperly attempts to assert
7
copyright protection of ―functionality,‖ which in fact falls within the domain of patent protection,
8
not copyright. See id. Defendants contend that El-Sedfy has not alleged: (1) direct or ―literal‖
9
copying of any protectable work, id. at 5–6; (2) access by Defendants to El-Sedfy‘s work, id. at 6–
7; or (3) substantial similarity between El-Sedfy‘s and Defendants‘ products, beyond merely the
11
United States District Court
Northern District of California
10
use of end-to-end encryption, id. at 7.
12
El-Sedfy‘s opposition brief relies in large part on authority describing the liberal pleading
13
standard applied by the federal courts before the Supreme Court‘s decisions in Bell Atlantic
14
Corporation v. Twombly, 550 U.S. 544 (2007) and Ashcroft v. Iqbal, 556 U.S. 662 (2009). See
15
Opp‘n (dkt. 20) at 5–7 (citing, e.g., Swierkiewicz v. Sorema N. A., 534 U.S. 506, 512 (2002);
16
Atchison, Topeka & Santa Fe Ry. Co. v. Buell, 480 U.S. 557, 568 n.15 (1987)). According to El-
17
Sedfy, a plaintiff without access to a defendant‘s source code cannot be expected ―to allege literal
18
Copyright Infringement of his source code,‖ at least ―where there are [sic] other overwhelming
19
evidence, obvious to a Competent Software Engineer, in support of Copyright Infringement by the
20
Defendants.‖ Id. at 2−3. El-Sedfy also makes much of the fact that his Complaint repeats the
21
phrase ―expression of the idea,‖ and argues that such language defeats Defendants‘ argument that
22
his claim improperly seeks to assert copyright protection of the idea itself. See id. at 4–5.
23
According to El-Sedfy, paragraph 11 of the Complaint—which summarizes the functionality of
24
his encryption software—describes that ―expression‖ and thus ―successfully define[s] the legal
25
basis of Non-Literal Software Copyright Infringement,‖ and paragraph 12—which alleges that
26
WhatsApp introduced end-to-end encryption in its product and that Facebook released a white
27
paper on the subject—―provides the proof of the Infringement alleged.‖ Id. at 4–6, 9.
28
El-Sedfy‘s opposition brief contends that the arguments in Defendants‘ motion are not
5
1
grounds to dismiss, but rather reasons that El-Sedfy should be allowed to obtain WhatsApp‘s
2
source code through discovery. Id. at 7, 8–9. El-Sedfy also makes clear that he does not allege
3
infringement of the graphical user interface of his software, which, according to El-Sedfy, courts
4
have long held to be outside the scope of copyright protection. Id. at 7–8. El-Sedfy argues that
5
Defendants‘ allusion to patent law amounts to an ―admi[ssion] that they have infringed on some of
6
[his] rights‖ and an attempt to dismiss the case based on the ―formality‖ of whether such rights are
7
properly construed as copyright or patent protection—according to El-Sedfy, his software as
8
described in paragraph 11 of the Complaint qualifies for protection under either doctrine, and he
9
may properly bring this action for copyright infringement. Id. at 2.
Defendants‘ reply brief focuses on the argument that, post-Twombly, allegations that
11
United States District Court
Northern District of California
10
support the mere possibility of infringement are not sufficient to state a claim or to grant a plaintiff
12
discovery, and that El-Sedfy‘s Complaint does not plausibly allege any actionable infringement.
13
See generally Reply (dkt. 21). According to Defendants, the description of the software at
14
paragraph 11, on which El-Sedfy relies as a description of the structure, sequence, and
15
organization of the expressive work at issue, in fact only describes the functionality of the
16
software, and functionality is not eligible for copyright protection. Id. at 2–3. Defendants also
17
deny that their motion admits any infringement, either of copyright or of patent rights, id. at 4 n.5,
18
and contend that El-Sedfy‘s assertion in his opposition that neither party had legal access to the
19
other‘s source code in fact supports Defendants‘ argument that El-Sedfy cannot state a claim for
20
non-literal copyright infringement, id. at 2.
21
III.
22
23
ANALYSIS
A.
Legal Standard
A complaint may be dismissed for failure to state a claim on which relief can be granted
24
under Rule 12(b)(6) of the Federal Rules of Civil Procedure. ―The purpose of a motion to dismiss
25
under Rule 12(b)(6) is to test the legal sufficiency of the complaint.‖ N. Star Int’l v. Ariz. Corp.
26
Comm’n, 720 F.2d 578, 581 (9th Cir. 1983). Generally, a plaintiff‘s burden at the pleading stage
27
is relatively light. Rule 8(a) of the Federal Rules of Civil Procedure states that ―[a] pleading
28
which sets forth a claim for relief . . . shall contain . . . a short and plain statement of the claim
6
1
2
showing that the pleader is entitled to relief.‖ Fed. R. Civ. P. 8(a).
In ruling on a motion to dismiss under Rule 12(b)(6), the court analyzes the complaint and
takes ―all allegations of material fact as true and construe[s] them in the light most favorable to the
4
non-moving party.‖ Parks Sch. of Bus. v. Symington, 51 F.3d 1480, 1484 (9th Cir. 1995).
5
Dismissal may be based on a lack of a cognizable legal theory or on the absence of facts that
6
would support a valid theory. Balistreri v. Pacifica Police Dep’t, 901 F.2d 696, 699 (9th Cir.
7
1990). A complaint must ―contain either direct or inferential allegations respecting all the material
8
elements necessary to sustain recovery under some viable legal theory.‖ Bell Atl. Corp. v.
9
Twombly, 550 U.S. 544, 562 (2007) (citing Car Carriers, Inc. v. Ford Motor Co., 745 F.2d 1101,
10
1106 (7th Cir. 1984)). ―A pleading that offers ‗labels and conclusions‘ or ‗a formulaic recitation
11
United States District Court
Northern District of California
3
of the elements of a cause of action will not do.‘‖ Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009)
12
(quoting Twombly, 550 U.S. at 555). ―Nor does a complaint suffice if it tenders ‗naked
13
assertion[s]‘ devoid of ‗further factual enhancement.‘‖ Id. (quoting Twombly, 550 U.S. at 557).
14
Rather, the claim must be ―‗plausible on its face,‘‖ meaning that the plaintiff must plead sufficient
15
factual allegations to ―allow[] the court to draw the reasonable inference that the defendant is
16
liable for the misconduct alleged.‖ Id. (quoting Twombly, 550 U.S. at 570).
17
Where the complaint has been filed by a pro se plaintiff, as is the case here, courts must
18
―construe the pleadings liberally . . . to afford the petitioner the benefit of any doubt.‖ Hebbe v.
19
Pliler, 627 F.3d 338, 342 (9th Cir. 2010) (citations omitted). ―A district court should not dismiss a
20
pro se complaint without leave to amend unless ‗it is absolutely clear that the deficiencies of the
21
complaint could not be cured by amendment.‘‖ Akhtar v. Mesa, 698 F.3d 1202, 1212 (9th Cir.
22
2012) (quoting Schucker v. Rockwood, 846 F.2d 1202, 1203−04 (9th Cir. 1988) (per curiam)).
23
Further, when it dismisses the complaint of a pro se litigant with leave to amend, ―the district court
24
must provide the litigant with notice of the deficiencies in his complaint in order to ensure that the
25
litigant uses the opportunity to amend effectively.‖ Id. (quoting Ferdik v. Bonzelet, 963 F.2d
26
1258, 1261 (9th Cir. 1992)). ―Without the benefit of a statement of deficiencies, the pro se litigant
27
will likely repeat previous errors.‖ Karim-Panahi v. L.A. Police Dep’t, 839 F.2d 621, 624 (9th
28
Cir. 1988) (quoting Noll v. Carlson, 809 F.2d 1446, 1448 (9th Cir. 1987)).
7
1
2
B.
El-Sedfy Fails to State a Plausible Claim for Copyright Infringement
―To establish [copyright] infringement, two elements must be proven: (1) ownership of a
valid copyright, and (2) copying of constituent elements of the work that are original.‖ Feist
4
Publ’ns, Inc. v. Rural Tel. Ser. Co., 499 U.S. 340, 345 (1991) (citation omitted). The first element
5
requires that ―a work must be original to the author,‖ meaning ―that the work was independently
6
created by the author (as opposed to copied from other works), and that it possesses at least some
7
minimal degree of creativity.‖ Id. ―In no case does copyright protection for an original work of
8
authorship extend to any idea, procedure, process, system, method of operation, concept, principle,
9
or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in
10
such work.‖ 17 U.S.C. § 102(b). To the contrary, ―‗every idea, theory, and fact in a copyrighted
11
United States District Court
Northern District of California
3
work becomes instantly available for public exploitation at the moment of publication‘; the
12
author‘s expression alone gains copyright protection.‖ Golan v. Holder, 132 S. Ct. 873, 890
13
(2012) (quoting Eldred v. Ashcroft, 537 U.S. 186, 219 (2003)).
14
The Ninth Circuit has recognized three elements of software that can be eligible for
15
copyright protection: ―(1) the software‘s ‗literal elements‘ such as the actual source and object
16
codes; (2) the software‘s ‗individual non-literal elements‘ such as discrete visual and audible
17
components; and (3) the software‘s ‗dynamic non-literal elements‘ such as the real time
18
experience and operation of the software.‖ NNG, KFT. V. AVA Enters., Inc., No. 2:14-cv-00220-
19
ODW(AJW), 2015 WL 5442725, at *3 (quoting and summarizing MDY Indus., LLC v. Blizzard
20
Entm’t, Inc., 629 F.3d 928, 942, 952–54 (9th Cir. 2010)). The Ninth Circuit has also set forth the
21
process for considering such infringement claims:
22
23
24
25
26
27
(1) The plaintiff must identify the source(s) of the alleged similarity
between his work and the defendant‘s work.
(2) Using analytic dissection, and, if necessary, expert testimony, the
court must determine whether any of the allegedly similar features
are protected by copyright. . . . [U]nprotectable ideas must be
separated from potentially protectable expression; to that expression,
the court must then apply the relevant limiting doctrines in the
context of the particular medium involved, through the eyes of the
ordinary consumer of that product.
28
8
1
2
3
4
(3) Having dissected the alleged similarities and considered the
range of possible expression, the court must define the scope of the
plaintiff‘s copyright . . . .
Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1443 (9th Cir. 1994).
El-Sedfy‘s assertion that ―Defendants knowingly, willingly, and unlawfully copied,
5
prepared, published, and distributed Plaintiff‘s copyrighted work, portions thereof, or derivative
6
works,‖ Compl. ¶ 14, is ―a formulaic recitation of the elements of a cause of action‖ and thus not,
7
in itself, sufficient to state a claim. See Iqbal, 556 U.S. at 678. The Court must therefore examine
8
the factual allegations of the Complaint to determine whether they plausibly support a conclusion
9
that actionable infringement occurred.
10
The Court‘s analysis begins with the ―source of the alleged similarity.‖ See Apple
United States District Court
Northern District of California
11
Computer, 35 F.3d at 1443. Here, El-Sedfy‘s Complaint does not identify any aspect of his
12
software‘s source code that Defendants allegedly copied. Nor is there any basis to infer that such
13
copying occurred, given that the Complaint does not allege that Defendants had access to El-
14
Sedfy‘s source code, and El-Sedfy‘s opposition makes clear his position that neither party had
15
access—at least legal access—to the other‘s source code. Opp‘n at 2; see also Apple Computer,
16
35 F.3d 1435 (―Copying may be shown by circumstantial evidence of access and substantial
17
similarity of both the general ideas and expression between the copyrighted work and the allegedly
18
infringing work.‖). The Complaint therefore does not state a plausible claim of infringement of
19
El-Sedfy‘s software‘s ―literal elements,‖ i.e., its source code.
20
El-Sedfy‘s opposition indicates that he seeks to pursue a theory of infringement of non-
21
literal software elements. See Opp‘n at 5 (―The Complaint, therefore, has successfully defined the
22
legal basis of Non-Literal Software Copyright Infringement.‖). As described in the Complaint, the
23
only overlap between his software and Defendants‘ software is the use of end-to-end encryption
24
for messages. See Compl. ¶ 12. El-Sedfy also suggests, although his Complaint does not
25
explicitly allege, that Defendants‘ software follows the same steps to provide such encryption. See
26
id. ¶ 11 (setting forth the basic steps El-Sedfy‘s software uses). Despite El-Sedfy‘s arguments to
27
the contrary, see Opp‘n at 3−5, the Court agrees with Defendants that paragraph 11 of El-Sedfy‘s
28
Complaint describes a method, not a creative expression. The fact that the description consists of
9
1
a relatively short summary rather than a detailed explanation of the technology is of no
2
consequence. Cf. Opp‘n at 5 (arguing that ―describe[ing] a method or system, would require many
3
pages and not one paragraph‖). The sequence of steps described in the Complaint does not
4
resemble the sort of ―non-literal elements‖ that courts have held to be subject to copyright. Cf.,
5
e.g., MDY Indus., 629 F.3d at 942−43 (discussing ―individual non-literal elements‖ consisting of
6
―visual and audible components‖ of a computer game and ―dynamic non-literal elements‖
7
consisting of the player‘s ―real-time experience‖). Indeed, El-Sedfy‘s letter to Facebook CEO
8
Mark Zuckerberg strongly suggests that El-Sedfy‘s theory of infringement is based on a similarity
9
of ideas, not of the particular expression of that idea. See Compl. Ex. H (―I trust that you agree
that a computer language is just a symbolic venue to express an idea.‖). El-Sedfy cites no
11
United States District Court
Northern District of California
10
authority for extending copyright protection to the alleged similarities between his and
12
Defendants‘ use of end-to-end encryption.
13
―Monopoly protection for such a method ‗can only be secured, if it can be secured at all,
14
by letters-patent,‘‖2 and ―is not eligible for protection by copyright.‖ Bikram’s Yoga College of
15
India, L.P. v. Evolation Yoga, LLC, 803 F.3d 1032, 1039−40 (9th Cir. 2015) (quoting Baker v.
16
Selden, 101 U.S. 99, 105 (1879)) (holding that a ―system‖ of yoga poses and breathing exercises
17
was not copyrightable). Unless independently protected by patent rights, El-Sedfy‘s ideas and
18
methods for encryption of messages ―bec[ame] instantly available for public exploitation at the
19
moment of publication.‖ See Golan, 132 S. Ct. at 890 (citation omitted). The Court therefore
20
holds that even if the Complaint could be construed as alleging that Defendants‘ software follows
21
the same steps that El-Sedfy describes of his own software, no portion of the alleged similarity
22
between the parties‘ products is protected by copyright. Accordingly, El-Sedfy‘s claim for
23
copyright infringement must be dismissed.
24
IV.
CONCLUSION
25
For the reasons discussed above, Defendants‘ motion is GRANTED, and the Complaint is
26
DISMISSED. If El-Sedfy can identify any similarity between his own software and Defendants‘
27
2
28
El-Sedfy does not bring a claim for patent infringement, nor does he allege that he holds a patent
for his software.
10
1
software that is protected by copyright—i.e., a similarity in expression that is not a process,
2
method, or idea—he may file an amended complaint alleging such infringement no later than
3
November 30, 2016. Any such amended complaint must include the caption and civil case
4
number used in this Order (16-cv-4056-JCS) and the words FIRST AMENDED COMPLAINT on
5
the first page. Because an amended complaint completely replaces the previous complaint, any
6
amended complaint may not incorporate claims or allegations of El-Sedfy‘s original Complaint by
7
reference, but instead must include all the claims El-Sedfy wishes to present and all of the
8
defendants he wishes to sue. See Ferdik, 963 F.2d at 1262.
9
El-Sedfy, who is not represented by counsel, is encouraged to consult with the Federal Pro
Bono Project‘s Legal Help Center in either of the Oakland or San Francisco federal courthouses
11
United States District Court
Northern District of California
10
for assistance if he intends to file an amended complaint. The San Francisco Legal Help Center
12
office is located in Room 2796 on the 15th floor at 450 Golden Gate Avenue, San Francisco, CA
13
94102. The Oakland office is located in Room 470-S on the 4th floor at 1301 Clay Street,
14
Oakland, CA 94612. Appointments can be made by calling (415) 782-8982 or signing up in the
15
appointment book located outside either office, and telephone appointments are available.
16
Lawyers at the Legal Help Center can provide basic assistance to parties representing themselves
17
but cannot provide legal representation.
18
IT IS SO ORDERED.
19
20
21
Dated: October 31, 2016
______________________________________
JOSEPH C. SPERO
Chief Magistrate Judge
22
23
24
25
26
27
28
11
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?