throbber
Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 1 of 14
`
`
`
`Eric M. Fraser, 027241
`OSBORN MALEDON, P.A.
`2929 North Central Avenue, Suite 2100
`Phoenix, Arizona 85012
`(602) 640-9000
`efraser@omlaw.com
`
`Cara Gagliano (pro hac vice application to be filed)
`Andrew Crocker (pro hac vice application to be filed)
`Hannah Zhao (pro hac vice application to be filed)
`ELECTRONIC FRONTIER FOUNDATION
`815 Eddy Street
`San Francisco, California 94109
`(415) 436-9333
`cara@eff.org
`andrew@eff.org
`zhao@eff.org
`
`Attorneys for Plaintiff
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF ARIZONA
`
` No.
`
`
`COMPLAINT
`(Jury Trial Demanded)
`
`Plaintiff,
`
`Defendant.
`
`
`
`Erik Johnson,
`
`
`
`
`vs.
`
`Proctorio Inc.,
`
`
`
`
`
`
`INTRODUCTION
` This is a civil action seeking a declaratory judgment of noninfringement
`1.
`under the Copyright Act, 17 U.S.C. §§ 106, 107, as well as injunctive relief and
`damages for misrepresentation of copyright claims under the Digital Millennium
`Copyright Act (“DMCA”), 17 U.S.C. § 512(f), in order to finally quash a campaign of
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 2 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`harassment designed to undermine important concerns about software used by
`universities around the United States to monitor student activity.
`As a consequence of the COVID-19 pandemic, schools and universities
`2.
`have increasingly adopted surveillance software to observe students as they complete
`assignments and tests electronically. These “proctoring” computer programs, like the
`Proctorio Software owned by Defendant Proctorio Inc. (“Proctorio”), are ostensibly
`intended to ensure adherence to assignment rules and to identify potential cheating by
`relying on surveillance methods such as face detection,1 eye movement tracking,
`keyboard and mouse monitoring, and audio and visual recording. Students, teachers,
`and civil liberties advocates have noted that such software may compromise student
`privacy and digital security while exacerbating socioeconomic divides in student
`performance.
`Plaintiff Erik Johnson, a college student whose university uses the
`3.
`Proctorio surveillance software, is one such critic. After carefully reviewing publicly
`available information, including portions of Proctorio’s software code, Johnson
`concluded that the Proctorio software code contradicted Proctorio’s claims about its
`software and raised a number of privacy, security, and equity concerns. To inform his
`classmates and the public, he shared his conclusions on Twitter, a social media website.
`To help explain his conclusions, Johnson linked to excerpts of the software’s code that
`he had uploaded to the code-sharing websites Pastebin and GitHub. This code was
`found in files that were automatically saved to Johnson’s computer when he installed
`the software. Johnson’s use of the code was a textbook fair use, and obviously lawful
`under Section 107 of the Copyright Act.
`Proctorio promptly responded by pressuring Johnson to delete his code
`4.
`analysis. When Johnson resisted, Proctorio turned to the DMCA to force the material’s
`removal. As a result of Proctorio’s false claims, Twitter removed several portions of
`
`1 Face detection is a technology that detect faces as well as facial movement and
`direction within an image or video.
`
`2
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 3 of 14
`
`
`
`Johnson’s critical commentary, and Pastebin and GitHub removed the code excerpts
`Johnson shared to support his assertions.
`Johnson has made every effort to explain the lawfulness of his conduct to
`5.
`Proctorio, to no avail. To ensure that Proctorio will finally cease its efforts to abuse
`copyright law to interfere with his speech, Johnson has no choice but to seek a
`declaration of noninfringement.
`PARTIES, JURISDICTION, AND VENUE
`Plaintiff Erik Johnson is an individual domiciled in Libertyville, Illinois.
`6.
`On information and belief, Defendant Proctorio is a corporation that
`7.
`maintains a principal place of business in Scottsdale, Arizona.
`This Court has subject-matter jurisdiction over this claim under the
`8.
`Copyright Act (17 U.S.C. §§ 101 et seq.), 28 U.S.C. §§ 1331 and 1338, and the
`Declaratory Judgment Act (28 U.S.C. § 2291).
`On information and belief, Proctorio has sufficient contacts with this
`9.
`district, both generally and in connection to the events herein alleged, that it is subject to
`the exercise of this Court’s jurisdiction.
`10. Venue is proper in this district under 28 U.S.C. § 1391.
`GENERAL ALLEGATIONS
`Johnson’s Speech
`A.
`Erik Johnson is a security researcher and an undergraduate student in
`11.
`computer engineering at Miami University in Oxford, Ohio. Due to the COVID-19
`pandemic, Johnson attended all of his classes virtually from his home in Illinois from
`August 2020 through December 2020. Although he returned to campus in January 2021,
`Johnson’s courses have continued to be conducted almost exclusively online.
`12. During this period of remote schooling, some of Johnson’s instructors
`have chosen to administer exams using remote exam proctoring software offered by
`Proctorio (the “Proctorio Software”). On information and belief, the Proctorio Software
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`3
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 4 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`works by using eye tracking, face detection, and computer monitoring to surveil exam-
`takers and flag allegedly “suspicious” behaviors as possible indications of cheating.
`Like many other students, Johnson was concerned about the Proctorio
`13.
`Software, including the risks it poses to students’ privacy and security. Currently,
`Johnson is a member of a subcommittee appointed by his university’s senate tasked
`with investigating whether or not the use of remote proctoring services such as
`Proctorio is in line with his university’s values. He is the only undergraduate on this
`subcommittee comprised mainly of graduate students and university officials.
`To explore Proctorio’s potential harm to students’ interests, Johnson
`14.
`examined Proctorio Software files that are automatically downloaded to any computer
`(including Johnson’s) that installs the Proctorio Software: (1) language files, which
`contain lists of messages that the software is able to display on a computer to the
`software user (“display messages”) in multiple natural (human) languages, including
`English2; and (2) a file written in the computer programming language JavaScript that
`contained both intentionally scrambled (or “obfuscated”) code and non-scrambled plain
`text.
`
`15. On September 7, 2020, following his investigation of the software code in
`these files, Johnson published a tweet thread3 critiquing Proctorio and the Proctorio
`Software. Annotated screenshots of these tweets are attached as Exhibit 1. Among other
`things, Johnson’s tweets identified contradictions between Proctorio’s public statements
`and the actual functionality of the software as indicated by its code; demonstrated the
`
`
`2 Language files are used to facilitate software use and adaptation in different
`countries or regions and allows the software to display the appropriate natural language
`based on location.
`3 Tweets are user-generated content posted to the social media website Twitter. A
`thread is a group of tweets linked together by the user who posted them so that the
`tweets appear in chronological order instead of Twitter’s default of reverse-
`chronological order. Because users can choose whether new tweets they post are linked
`to any of their existing tweet threads, threading allows for discussions longer than the
`per-tweet character limit and that span some period of time.
`
`4
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 5 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`invasiveness of the Proctorio Software; illustrated the high level of access that the
`Proctorio Software has to users’ computers; and noted the difficulty of determining the
`full extent of Proctorio’s collection of and access to user data.
`To illustrate the basis for his conclusions, Johnson included, in three of
`16.
`the September 7 tweets, links to relevant software code that he had excerpted from the
`language files and uploaded to the website Pastebin.4 Exhibit 1 at 1–2.
`In the first of these tweets, Johnson listed various metrics that the
`17.
`Proctorio Software monitors during exams and apparently uses to determine each exam-
`taker’s “suspicion level.” He also linked to a code excerpt of the display messages
`referencing those same metrics. A printout of that code excerpt is attached as Exhibit 2.
`Among the metrics named in Johnson’s tweet and found in the linked code is “eye
`movement,” something Proctorio claims its software does not track.
`In the second tweet, Johnson discussed how the Proctorio Software
`18.
`compares different exam-takers to one another using these metrics. He also linked to a
`code excerpt of the display messages for reporting these statistics. A printout of that
`code is attached as Exhibit 3.
`In the third tweet, Johnson identified various reasons the Proctorio
`19.
`Software may terminate a student’s exam, such as interruptions in internet connectivity
`and plugging in an additional monitor. He also linked to a code excerpt listing the
`display messages for 20 different bases for exam termination. A printout of that code is
`attached as Exhibit 4.
`In another of his September 7 tweets within the tweet thread, Johnson
`20.
`reported: “In some cases, you will have to scan your room. At the begining [sic] of the
`exam, and during if your suspicion level raises. Proctorio compiles the footage into a
`
`
`4 Pastebin is a website that allows users to upload snippets of text, most often
`software code, for public viewing. One common use of these “pastes” is to share text
`referenced in a message that is constrained by character limits, such as the 280-character
`limit for tweets.
`
`5
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 6 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`street-view like 360 image of your room/house that your professor can access and
`seemingly proctorio ‘agents’ too.” With the tweet, Johnson included a screenshot of a
`tutorial video showing where these room scan images can be viewed (the “Video
`Screenshot”). Exhibit 1 at 2.
`21. Over the next week, Johnson continued to post criticisms of Proctorio and
`the Proctorio Software to the same tweet thread. In one September 11 tweet, Johnson
`included a Pastebin link to three lines of software code from a JavaScript file that
`Johnson understood to identify programs blacklisted by Proctorio—i.e., computer
`programs that cannot be used simultaneously with the Proctorio Software. Exhibit 1 at
`6. That code excerpt, a printout of which is attached as Exhibit 5, contained only code
`that was not scrambled in the source file. The purpose of this tweet was to show that
`Proctorio prevents users from taking steps that could mitigate the intrusiveness of the
`Proctorio Software, such as using a virtual machine for “sandboxing.”5
`B.
`Fair Use
`To the extent that the code excerpts associated with Johnson’s September
`22.
`7 and September 11 tweets (collectively, the “Excerpts”) and the Video Screenshot
`contained copyrightable material, Johnson’s uses of that material are clear-cut fair
`uses—no different from quoting a book in a book review.
`The fair use analysis centers on four statutory factors: (1) the purpose and
`23.
`character of the use; (2) the nature of the copyrighted work; (3) the amount and
`substantiality of the portion used; and (4) the effect of the use on the market for the
`copyrighted work. These factors are analyzed together in light of the fundamental
`purposes of copyright.
`The purpose and character of Johnson’s uses are noncommercial and
`24.
`educational, serving many, if not all, of the favored purposes identified in the preamble
`to Section 107 of the Copyright Act. Johnson used the Excerpts and Video Screenshot
`
`5 Sandboxing is a computer-security practice that involves isolating a specific
`program to prevent it from accessing other programs or system resources.
`
`6
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 7 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`to report his findings from his investigation of the Proctorio Software and to provide
`evidence supporting his assertions. The uses are also transformative: they combined the
`copyrighted material with the expression in Johnson’s tweets to add new meaning and
`serve the new and different purpose of sharing evidence-backed criticism of Proctorio
`with the public.
`The nature of the works at issue—Proctorio’s software code and tutorial
`25.
`video—also weighs in favor of fair use because they are primarily factual or functional.
`Moreover, Johnson used the works only for their factual content, not their expressive
`value.
`
`The amount and substantiality of the copyrighted material used also weigh
`26.
`in favor of fair use. Johnson included only those lines of software code that directly
`supported his tweets. And the Excerpts were a negligible portion—almost certainly less
`than 0.1%—of the Proctorio Software’s code. They also were qualitatively
`insubstantial: the three language file excerpts contained nothing but message text that
`would be displayed to someone reviewing exam statistics, and the JavaScript file
`excerpt contained only a list of blacklisted programs. As to the Video Screenshot,
`Johnson used a single still frame from the full video to demonstrate the ability of
`professors using Proctorio, and potentially Proctorio employees, to view 360-degree
`images of students and their homes.
`Finally, Johnson’s use will not cause market harm—at least not the kind
`27.
`of harm copyright law is designed to remedy. The Excerpts—essentially a list of display
`messages and types of computer programs—are available to anyone who installs the
`Proctorio Software and cannot possibly serve as a market substitute for the Proctorio
`Software. Nor does the Video Screenshot serve as a market substitute for the full
`tutorial video. And to the extent Johnson’s critical uses of the Excerpts may cause
`Proctorio reputational damage or reduce demand for the Proctorio Software because of
`what they reveal about it, those are not cognizable market harms under copyright law.
`Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 591–92 (1994).
`
`7
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 8 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Proctorio’s Campaign of Harassment
`C.
`28. On September 7, soon after tweeting about Proctorio, Johnson received a
`private Twitter message from Proctorio’s CEO, Mike Olsen. Olsen demanded that
`Johnson take down the Excerpts, claiming that they violated Proctorio’s terms of service
`and “undermine[d] the integrity of the test-taking process.” Olsen did not identify any
`copyright-related basis for his demand. In reply, Johnson explained that the Excerpts
`came from files accessible to anyone who installs the Proctorio Software, and that he
`did not believe he had agreed to any terms of service before accessing them. A
`screenshot of the exchange between Olsen and Johnson is attached as Exhibit 6.
`29. On September 8, Johnson discovered that his IP address had been banned
`from accessing Proctorio’s website and services. As a result, Johnson was forced to seek
`special accommodations for taking exams that his professors administered through
`Proctorio.
`30. Based on documents obtained through a records request to Miami
`University, Johnson is informed and believes that on September 9, a Proctorio
`representative requested that the university ask Johnson to remove any links to Proctorio
`materials from his tweets. On information and belief, Proctorio again did not cite any
`copyright-related basis for its request. The university declined to make any such request
`of Johnson.
`31. On October 19, Johnson received an email from Twitter notifying him that
`the three September 7 tweets that included Pastebin links had been taken down in
`response to a notice of copyright infringement lodged by Proctorio. The email provided
`a copy of the DMCA notice, which was signed by Proctorio’s marketing director.
`Exhibit 7. The notice also identified the September 7 tweet that included the Video
`Screenshot as allegedly infringing, but Twitter did not remove that tweet at that time.
`32. After receiving the email from Twitter, Johnson discovered that Pastebin
`had disabled access to the three Excerpts associated with the removed tweets. A notice
`that appeared in place of each of those Excerpts stated that access had been disabled by
`
`8
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 9 of 14
`
`
`
`Pastebin on September 28. On information and belief, the Excerpts were removed by
`Pastebin in response to a DMCA notice lodged by Proctorio. Johnson did not receive
`notice of the removal from Pastebin, and the material has not been restored.
`33. On October 30, Johnson submitted a counternotice under section 512(g)
`of the DMCA to Twitter, requesting restoration of his tweets. On November 5, Johnson
`received an email from Twitter stating that it had found Proctorio’s DMCA notices
`incomplete and had restored Johnson’s tweets pending further information from
`Proctorio.
`34. On or around November 11, Johnson uploaded the Excerpts to GitHub,
`another code-sharing website, and appended updates to the September 7 and 11 tweets
`that provided links to the reposted code excerpts. Screenshots of the updated tweets are
`attached as Exhibit 8.
`35. On November 23, GitHub informed Johnson that it had disabled access to
`the Excerpts in response to a DMCA notice submitted by Proctorio. In addition to its
`allegations of copyright infringement, the notice also falsely stated that Johnson had
`obtained the code through “reverse engineering and unauthorized hacking.” Exhibit 9.
`Johnson submitted a counternotice on November 24, and GitHub restored access to his
`content on or around December 9.
`36. On November 29, Johnson discovered that Twitter had once again taken
`down the three September 7 tweets that were the subject of his October 30
`counternotice, without notice to him. In addition, Johnson discovered that Twitter had
`also removed (1) the Video Screenshot from the fourth September 7 tweet identified in
`Proctorio’s September DMCA notice to Twitter and (2) the September 11 tweet about
`blacklisted programs, which was not mentioned in the September DMCA notice.
`Counsel for Proctorio confirmed to Johnson’s counsel that Proctorio had submitted a
`second DMCA notice to Twitter. The Excerpt linked to in the September 11 tweet was
`also removed by Pastebin, again without sending notice to Johnson.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`9
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 10 of 14
`
`
`
`In a November 30 phone call, Johnson’s counsel presented Proctorio’s
`37.
`counsel with the fair use analysis set forth in paragraphs 22 through 27, supra.
`Proctorio’s counsel denied that Johnson’s uses were fair, but that denial was premised
`on multiple misstatements of fact.
`For example, Proctorio’s attorneys repeated the claim from the GitHub
`38.
`notice that the excerpted code could be obtained only by “reverse engineering” and
`“hacking,” which they cited to argue that Johnson’s use of the excerpts would harm the
`market for the Proctorio Software by revealing information (which is not copyrightable)
`to competitors and exam-takers. On information and belief, Proctorio knew that the
`excerpted code in fact was contained in unprotected files that could be read by anyone
`who installed the Proctorio Software (including competitors and exam-takers). See
`Exhibit 6 (September 7–8 Twitter conversation between Johnson and Proctorio’s CEO).
`Proctorio’s counsel also asserted that Johnson had shared the entirety of
`39.
`the Proctorio Software code. On information and belief, Proctorio would have known
`from even cursory examination of the Excerpts that they represented only a miniscule
`portion of the software’s code.
`40. Despite the fact that Johnson linked to the Excerpts in tweets that both
`directly related to the linked material and were part of a multi-tweet thread wherein he
`excoriated and exposed Proctorio for what he viewed as shortcomings of the Proctorio
`Software and misrepresentations by Proctorio, Proctorio nevertheless asserted that the
`Excerpts were unconnected to any commentary or criticism. On information and belief,
`Proctorio knew at the time of sending the DMCA notices to Pastebin and GitHub that
`the Excerpts were in fact uploaded by Johnson specifically to support his critical
`commentary.
` Johnson’s counsel informed Proctorio’s attorneys of all of these
`41.
`inaccuracies. But in subsequent email communications, Proctorio nonetheless continued
`to assert that Johnson’s uses were infringing and did not withdraw its DMCA notices.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`10
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 11 of 14
`
`
`
`42. On December 22, Johnson submitted to Twitter a counternotice requesting
`restoration of all content associated with the September 7 and 11 tweets. On January 15,
`2021, Twitter notified Johnson that it had found Proctorio’s DMCA notices to be invalid
`and had restored the affected tweets and media.
`43. As a collateral consequence of Proctorio’s improper copyright claims,
`Johnson was informed by a professor that Johnson’s application to work in his
`university’s IT Security department will likely be rejected due to his adversarial legal
`relationship with the school vendor Proctorio.
`
`
`CLAIMS FOR RELIEF
`Count 1
`Declaratory Judgment of Noninfringement
`
` Johnson repeats and incorporates herein by reference the allegations in
`44.
`the preceding paragraphs of this complaint.
`There is a real and actual controversy between Johnson and Proctorio
`45.
`regarding whether Johnson’s uses of the Excerpts and the Video Screenshot constitute
`infringement of a copyright interest lawfully held or administered by Proctorio.
`Johnson contends that his creation and use of the Excerpts and the Video
`46.
`Screenshot were and are lawful, consistent with the doctrine of fair use, the Copyright
`Act, and the First Amendment to the United States Constitution, and judicial decisions
`construing such laws, doctrines, and provisions.
`Every time that Johnson has linked to excerpts from Proctorio’s software
`47.
`code to comment on and criticize the Proctorio Software, Proctorio has exploited the
`DMCA to undermine Johnson’s commentary.
`Proctorio has refused to withdraw its takedown requests. Pastebin has not
`48.
`restored the material that it took down based on Proctorio’s claims of infringement.
`Proctorio continues to maintain that Johnson’s expression is infringing,
`49.
`even in the face of evidence contradicting core assumptions of its legal arguments.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`11
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 12 of 14
`
`
`
`Proctorio’s pattern of baseless DMCA notices and its continued refusal to
`50.
`acknowledge Johnson’s activity as noninfringing have chilled Johnson from engaging in
`constitutionally protected speech. Johnson continues to comment on and criticize
`Proctorio and the Proctorio Software but has not shared materials that support his
`comments in order to avoid further takedowns and legal threats by Proctorio. He has
`also refrained from further investigation of the Proctorio Software out of fear that
`reporting on his findings will elicit more harassment.
`Johnson is entitled to a declaration that his use of code excerpts and
`51.
`screenshots to support his commentary does not violate copyright law.
`Count 2
`Misrepresentation Under 17 U.S.C. § 512(f)
`Johnson repeats and incorporates herein by reference the allegations in the
`52.
`preceding paragraphs of this complaint.
`Johnson’s uses of the Excerpts and the Video Screenshot do not infringe
`53.
`any copyright interest held or administered by Proctorio because they are lawful fair
`uses under 17 U.S.C. § 107.
`54. On information and belief, Proctorio knew that Johnson’s use of the
`Excerpts and the Video Screenshot did not infringe any Proctorio copyright interest
`when they sent notices of infringement to Twitter, Pastebin, and GitHub under the
`DMCA.
`Proctorio violated 17 U.S.C. § 512(f) by knowingly materially
`55.
`misrepresenting that Johnson’s use of the Excerpts and the Video Screenshot infringed
`Proctorio’s copyrights.
`56. As a direct and proximate result of Proctorio’s actions, Johnson has been
`injured substantially and irreparably. Such injury includes, without limitation, the time
`and effort associated with responding to Proctorio’s multiple fraudulent infringement
`notices, as well as harm to his free speech rights under the First Amendment.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`12
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 13 of 14
`
`
`
`PRAYER FOR RELIEF
`WHEREFORE, Plaintiff Johnson requests the following relief against Defendant
`Proctorio:
` a declaratory judgment that Johnson’s uses of the Excerpts and the Video
`1.
`Screenshot do not infringe any copyright interest held or administered by Proctorio;
`an order enjoining Proctorio, its agents, servants, employees, successors,
`2.
`and assigns, and all others in concert and privity with Proctorio, from asserting a
`copyright claim, including the lodging of a notice of infringement with any third party,
`against Johnson alleging copyright infringement arising out of use of the Excerpts, the
`Video Screenshot, or any other excerpts of Proctorio Software code or screenshots of
`Proctorio materials, in connection with commentary or criticism about Proctorio or the
`Proctorio Software;
`damages according to proof;
`3.
`4.
`attorneys’ fees pursuant to 17 U.S.C. § 512(f); other portions of the
`Copyright Act, including Section 505; on a Private Attorney General basis; or otherwise
`as allowed by law;
`Johnson’s costs and disbursements; and
`5.
`6.
`such other and further relief as the Court shall find just and proper.
`
`
`Plaintiff hereby requests a jury trial for all issues triable by jury, including
`
`without limitation those issues and claims set forth in any amended complaint or
`consolidated action.
`
`DATED this 21st day of April, 2021.
`
`
`
`
`OSBORN MALEDON, P.A.
`
`
`By s/ Eric M. Fraser
`
`Eric M. Fraser
`
`2929 North Central Avenue, Ste. 2100
`
`Phoenix, Arizona 85012-2793
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`13
`
`

`

`Case 2:21-cv-00691-DLR Document 1 Filed 04/21/21 Page 14 of 14
`
`ELECTRONIC FRONTIER FOUNDATION
`Cara Gagliano
`
`(pro hac vice application to be filed)
`Andrew Crocker
`
`(pro hac vice application to be filed)
`Hannah Zhao
`
`(pro hac vice application to be filed)
`815 Eddy Street
`San Francisco, California 94109
`
`Attorneys for Plaintiff
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket