19.07.2013 Views

John Doe is Alive and Well - Arkansas Law Review - University of ...

John Doe is Alive and Well - Arkansas Law Review - University of ...

John Doe is Alive and Well - Arkansas Law Review - University of ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ARKANSASLAWREVIEW.ORG<br />

<strong>John</strong> <strong>Doe</strong> Is <strong>Alive</strong> <strong>and</strong> <strong>Well</strong>: Designing<br />

Pseudonym Use in American Courts<br />

Donald P. Balla <br />

I. INTRODUCTION<br />

Th<strong>is</strong> year the <strong>Arkansas</strong> Supreme Court took its first good<br />

look at the <strong>is</strong>sue <strong>of</strong> pseudonyms. Three members <strong>of</strong> an<br />

undocumented immigrant family brought suit in the circuit court<br />

under the names <strong>of</strong> <strong>John</strong>, Jane, <strong>and</strong> Junior <strong>Doe</strong>. 1 They<br />

challenged an <strong>Arkansas</strong> statute that removes or denies a driver‟s<br />

license to any person who lacks documents showing citizenship<br />

or legal immigration status. 2 The <strong>Doe</strong> plaintiffs sought<br />

declaratory <strong>and</strong> injunctive relief. 3 However, they were never<br />

close to prevailing. The State, without answering the complaint,<br />

objected to the use <strong>of</strong> pseudonyms in a Rule 12(b)(6) motion to<br />

d<strong>is</strong>m<strong>is</strong>s, citing <strong>Arkansas</strong> Rules <strong>of</strong> Civil Procedure 8(a), 10(a),<br />

<strong>and</strong> 17(a). 4 The judge agreed, <strong>and</strong> the plaintiffs appealed to the<br />

<strong>Arkansas</strong> Supreme Court. Although the supreme court affirmed<br />

the trial court‟s dec<strong>is</strong>ion, Justice Paul E. Danielson, writing for<br />

the court, added th<strong>is</strong> interesting comment: “In h<strong>is</strong> brief <strong>and</strong> at<br />

oral argument, appellants‟ counsel urged th<strong>is</strong> court to consider<br />

adopting rules to provide guidance on th<strong>is</strong> <strong>is</strong>sue in future<br />

litigation. We agree that some rules in th<strong>is</strong> area are essential<br />

<strong>and</strong>, therefore, we refer th<strong>is</strong> matter to the Civil Practice<br />

Committee.” 5<br />

Pr<strong>of</strong>essor <strong>of</strong> Business <strong>and</strong> <strong>Law</strong>, <strong>John</strong> Brown <strong>University</strong>, Siloam Springs, <strong>Arkansas</strong>.<br />

J.D., <strong>University</strong> <strong>of</strong> <strong>Arkansas</strong> School <strong>of</strong> <strong>Law</strong>; CPA, <strong>University</strong> <strong>of</strong> Illino<strong>is</strong>; B.M., Southern<br />

Illino<strong>is</strong> <strong>University</strong>; M.M., Florida State <strong>University</strong>; M.S.F.S., The American College, Bryn<br />

Mawr, Pennsylvania.<br />

1. Plaintiff‟s Second Amended Complaint, <strong>Doe</strong> v. We<strong>is</strong>s, No. Civ. 2008-1287-1<br />

(Benton Cnty. Cir. Ct. Aug. 4, 2008).<br />

2. ARK. CODE ANN. § 27-16-1105(a) (Repl. 2008).<br />

3. Plaintiff‟s Second Amended Complaint, supra note 1, at 12.<br />

4. <strong>Doe</strong> v. We<strong>is</strong>s, 2010 Ark. 150, at 2. These rules are essentially the same as the<br />

federal rules <strong>and</strong> have the same numbers.<br />

5. Id. at 6.


ARKANSASLAWREVIEW.ORG<br />

692 ARKANSAS LAW REVIEW [Vol. 63:691<br />

W<strong>is</strong>ely, the <strong>Arkansas</strong> Supreme Court sidestepped the<br />

patchwork approach to pseudonym rules that has plagued the<br />

federal circuit courts. When <strong>Arkansas</strong>‟s Civil Practice<br />

Committee tackles the <strong>Arkansas</strong> Supreme Court‟s assignment,<br />

the result could be the first comprehensive pseudonym policy in<br />

America. If done thoughtfully, <strong>Arkansas</strong>‟s rules could influence<br />

the United States Supreme Court when it finally resolves the<br />

differences among the circuits.<br />

Th<strong>is</strong> article <strong>is</strong> about what those rules should be. Currently<br />

there are no court rules about pseudonym use. The rules <strong>of</strong> civil<br />

procedure, both federal <strong>and</strong> in <strong>Arkansas</strong>, are silent on the matter.<br />

Dec<strong>is</strong>ions opposing pseudonym use cite the lack <strong>of</strong> authority<br />

allowing it, while courts allowing the use <strong>of</strong> pseudonyms point<br />

out the lack <strong>of</strong> a ban. 6 In 2008, Pr<strong>of</strong>essor Ross E. Cheit decried<br />

the lack <strong>of</strong> uniform st<strong>and</strong>ards for pseudonyms, noting that the<br />

matter “seem[ed] to be entirely in the d<strong>is</strong>cretion <strong>of</strong> judges.” 7<br />

The 2007 Sedona Conference, a legal think-tank, reporting on<br />

what they considered to be the best practices for keeping names<br />

confidential, called on courts to provide clear guidelines to civil<br />

litigants. 8 In spite <strong>of</strong> th<strong>is</strong> rule vacuum, some judges who have<br />

denied pseudonym petitions still cite the federal rules‟ failure to<br />

authorize the practice. 9 Joan Steinman, in her 1985 article—still<br />

the most quoted <strong>and</strong> influential <strong>of</strong> all pseudonym studies—<br />

considers th<strong>is</strong> a m<strong>is</strong>take: “Almost all courts that have<br />

considered th<strong>is</strong> question, however, have held that the Rules‟<br />

silence on the <strong>is</strong>sue, or even their contrary implications, are not<br />

d<strong>is</strong>positive.” 10<br />

Nevertheless, almost all pseudonym cases that reach the<br />

appellate level begin with Rules 10(a) <strong>and</strong> 17(a) <strong>of</strong> the Federal<br />

Rules <strong>of</strong> Civil Procedure or their state equivalents. 11 <strong>Arkansas</strong><br />

6. See, e.g., Ew v. N.Y. Blood Ctr., 213 F.R.D. 108, 109-10 (E.D.N.Y. 2003); <strong>Doe</strong> v.<br />

Ind. Black Expo, Inc., 923 F. Supp. 137, 138-39 (S.D. Ind. 1996).<br />

7. Ross E. Cheit, Tort Litigation, Transparency, <strong>and</strong> the Public Interest, 13 ROGER<br />

WILLIAMS U. L. REV. 232, 275 (2008).<br />

8. THE SEDONA CONFERENCE WORKING GROUP ON PROTECTIVE ORDERS,<br />

CONFIDENTIALITY & PUBLIC ACCESS, THE SEDONA GUIDELINES BEST PRACTICES<br />

ADDRESSING PROTECTIVE ORDERS, CONFIDENTIALITY & PUBLIC ACCESS IN CIVIL CASES<br />

19 (2007) [hereinafter SEDONA GUIDELINES].<br />

9. See, e.g., Ind. Black Expo, 923 F. Supp. at 139.<br />

10. Joan Steinman, Public Trial, Pseudonymous Parties: When Should Litigants Be<br />

Permitted to Keep Their Identities Confidential?, 37 HAST. L.J. 1, 35 (1985).<br />

11. See, e.g., Ind. Black Expo, 923 F. Supp. at 139.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 693<br />

Rule <strong>of</strong> Civil Procedure 10(a) reads, “Every pleading shall<br />

contain a caption setting forth the name <strong>of</strong> the court, the title <strong>of</strong><br />

the action, the file number <strong>and</strong> a designation as in Rule 7(a). In<br />

the complaint, the title <strong>of</strong> the action shall include the names <strong>of</strong><br />

all the parties . . . .”<br />

The rule contains no guidance as to what parties should do<br />

to keep their names confidential. An anonymous complaint—<br />

one with a m<strong>is</strong>sing name—would clearly violate Rule 10(a) <strong>and</strong><br />

could properly be d<strong>is</strong>m<strong>is</strong>sed with a Rule 12(b)(6) motion.<br />

However, as so many pseudonym cases show, pseudonyms,<br />

where allowed, do not produce defective complaints. The<br />

pseudonym <strong>is</strong> the party‟s name, albeit not h<strong>is</strong> given one, <strong>and</strong><br />

seems to fulfill Rule 10(a). Rule 17(a) <strong>of</strong> the <strong>Arkansas</strong> <strong>and</strong><br />

federal rules similarly lacks any d<strong>is</strong>cussion <strong>of</strong> pseudonym use:<br />

“Every action shall be prosecuted in the name <strong>of</strong> the real party in<br />

interest.” 12 Rule 17, as one judge wrote, has more to do with<br />

getting the right people than about getting the right name. 13 So<br />

the Rules <strong>of</strong> Civil Procedure contain a void that new pseudonym<br />

rules could fill.<br />

Thoughtfully designed pseudonym rules <strong>of</strong>fer hope for a<br />

cons<strong>is</strong>tent <strong>and</strong> cohesive policy. Legal practitioners throughout<br />

<strong>Arkansas</strong> <strong>and</strong> the United States are calling for clarity in th<strong>is</strong><br />

area. Let us be proud that <strong>Arkansas</strong> courts have heard the call.<br />

II. THE BASIS FOR PSEUDONYMS: THE<br />

CONSTITUTION AND JUSTICE<br />

A. Past Dec<strong>is</strong>ions Have Lacked a Common Foundation<br />

One reason for the split <strong>of</strong> opinions in the appellate courts<br />

on pseudonym use <strong>is</strong> that courts have based their opinions upon<br />

different foundations, limited by the arguments <strong>of</strong> counsel from<br />

both sides. In many pseudonym cases, the <strong>is</strong>sue never comes<br />

up. Before <strong>Doe</strong> v. We<strong>is</strong>s, there were seven <strong>Arkansas</strong> Supreme<br />

Court cases with <strong>Doe</strong> as a plaintiff; defendants objected to the<br />

use <strong>of</strong> a pseudonym in only one case. 14 Even in famous federal<br />

12. ARK. R. CIV. P. 17(a).<br />

13. See Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477, 504 n.27 (M.D. Pa. 2007).<br />

14. <strong>Doe</strong> v. Ark. Dep‟t <strong>of</strong> Human Servs., 357 Ark. 413, 128 S.W.3d 107 (2004);<br />

United Food <strong>and</strong> Commercial Workers Int‟l Union v. Wal-Mart Stores, Inc., 353 Ark. 902,<br />

120 S.W.3d 89 (2003); <strong>Doe</strong> v. Baum, 348 Ark. 259, 72 S.W.3d 476 (2002); Stilley v. City


ARKANSASLAWREVIEW.ORG<br />

694 ARKANSAS LAW REVIEW [Vol. 63:691<br />

pseudonym cases such as Roe v. Wade 15 <strong>and</strong> Plyler v. <strong>Doe</strong>, 16 the<br />

parties never placed the pseudonym <strong>is</strong>sue before the United<br />

States Supreme Court.<br />

Early federal appellate dec<strong>is</strong>ions emphasized the<br />

authoritative weight on the side <strong>of</strong> pseudonym opponents. For<br />

some, the <strong>is</strong>sue went no further than the use <strong>of</strong> the word “name”<br />

in Rules <strong>of</strong> Civil Procedure 10(a) <strong>and</strong> 17(a) <strong>and</strong> the assumption<br />

that a pseudonymous name <strong>is</strong> not good enough. 17 Others<br />

considered open courts to be the highest value trumping all other<br />

constitutional m<strong>and</strong>ates. As one court wrote, “[I]dentifying the<br />

parties to the proceeding <strong>is</strong> an important dimension <strong>of</strong><br />

publicness. The people have a right to know who <strong>is</strong> using their<br />

courts.” 18 Others point to a series <strong>of</strong> First Amendment<br />

dec<strong>is</strong>ions 19 hammered out in criminal cases 20 where the media<br />

has cons<strong>is</strong>tently won access to most court information.<br />

“[H]aving judicial proceedings fully open to the public so that<br />

the public may fully assess the merits <strong>of</strong> the lawsuit <strong>and</strong> the<br />

quality <strong>of</strong> the courts <strong>is</strong> in the public interest.” 21 Courts <strong>is</strong>suing<br />

these dec<strong>is</strong>ions considered pseudonym use as a First<br />

Amendment violation.<br />

Over time, federal appellate courts began permitting<br />

pseudonyms on a seemingly ad hoc bas<strong>is</strong>. The open-court<br />

argument operated “only as a presumption <strong>and</strong> not as an<br />

<strong>of</strong> Conway, 343 Ark. 124, 31 S.W.3d 870 (2000); <strong>Doe</strong> v. Union Pac. R.R. Co., 323 Ark.<br />

237, 914 S.W.2d 312 (1996); Barr v. Richardson, 314 Ark. 294, 862 S.W.2d 253 (1993);<br />

<strong>Doe</strong> v. Porter, 3 Ark. 18, 1840 WL 269 (1840). Only in <strong>Doe</strong> v. Union Pacific Railroad Co.<br />

did the defendants object. 323 Ark. At 239, 914 S.W.2d at 313.<br />

15. 410 U.S. 113 (1973) (challenging an abortion law).<br />

16. 457 U.S. 202 (1982) (challenging a Texas law denying education to<br />

undocumented children).<br />

17. E.g., Roe v. New York, 49 F.R.D. 279, 281 (S.D.N.Y. 1970). Four boys<br />

challenged the care they received from a state juvenile school. Id. The court ruled that<br />

their complaint was a nullity because the court had to be able to “identify from the<br />

complaint at least one plaintiff by name.” Id. at 280-81.<br />

18. Sealed Plaintiff v. Sealed Defendant, 537 F.3d 185, 189 (2d Cir. 2008) (alteration<br />

omitted) (quoting <strong>Doe</strong> v. Blue Cross & Blue Shield United, 112 F.3d 869, 872 (7th Cir.<br />

1997)). The Tenth Circuit considers a complaint void from a fatal jur<strong>is</strong>diction flaw if<br />

perm<strong>is</strong>sion to file pseudonymously <strong>is</strong> not granted before filing. W.N.J. v. Yocom, 357<br />

F.3d 1171, 1172 (10th Cir. 2001).<br />

19. E.g., <strong>Doe</strong> v. Hartford Life & Accident Ins. Co., 237 F.R.D. 545, 549 (D.N.J.<br />

2006).<br />

20. SEDONA GUIDELINES, supra note 8, at 16 (d<strong>is</strong>cussing public-access concerns in<br />

criminal cases).<br />

21. Qualls v. Rumsfeld, 228 F.R.D. 8, 13 (D.D.C. 2005)


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 695<br />

absolute, unreviewable license to deny” their use. 22 The early<br />

dec<strong>is</strong>ions gave the impression that a court could tell whether a<br />

petitioner could proceed pseudonymously simply by the type <strong>of</strong><br />

case. However, exceptions arose <strong>and</strong> the type-<strong>of</strong>-case method <strong>of</strong><br />

deciding on pseudonym use broke down. Courts began<br />

weighing various pros <strong>and</strong> cons, 23 but these weighing processes<br />

were so loose <strong>and</strong> undefined that dec<strong>is</strong>ions could easily boil<br />

down to the arbitrary leanings <strong>of</strong> individual judges.<br />

Steinman declared th<strong>is</strong> ad hoc process <strong>of</strong> deciding to permit<br />

pseudonyms unsat<strong>is</strong>factory. 24 Because <strong>of</strong> these diverse<br />

foundations, gleaning a pseudonym policy from ex<strong>is</strong>ting<br />

appellate court dec<strong>is</strong>ions requires d<strong>is</strong>cernment. Writers <strong>of</strong><br />

pseudonym policy will not be reading cases for precedent. They<br />

will be looking for policies that make the most legal sense.<br />

Courts deciding future pseudonym cases need a logical, wellunderstood<br />

foundation if the American legal system <strong>is</strong> ever<br />

going to <strong>of</strong>fer parties something solid to st<strong>and</strong> on.<br />

B. Courts Should Base Pseudonym Dec<strong>is</strong>ions on Justice<br />

<strong>and</strong> the Constitution<br />

1. Justice Is Equalizing the Scales<br />

The purpose <strong>of</strong> court rules <strong>is</strong> to balance the scales <strong>of</strong> justice<br />

for injured members <strong>of</strong> the public. We all know what justice<br />

looks like. She <strong>is</strong> the blindfolded lady holding the balance.<br />

When people suffer harm, they sense the weight <strong>of</strong> loss on their<br />

side <strong>of</strong> the balance. Justice <strong>is</strong> the process <strong>of</strong> evening the<br />

balance. When the injured cannot even the balance themselves,<br />

they turn to the courts for help. Usually the courts help.<br />

When court rules add unnecessary extra harm to one<br />

party‟s side <strong>of</strong> the balance, the court ceases to be a tool <strong>of</strong><br />

justice. Of course, some harm <strong>is</strong> inescapable. Justice, for<br />

example, <strong>is</strong> expensive, <strong>and</strong> the cost <strong>of</strong> the legal system cannot be<br />

ignored. So court systems do their best <strong>and</strong> learn to live with<br />

unfixable imperfections. But where the added harm <strong>is</strong> so great<br />

22. James v. Jacobson, 6 F.3d 233, 238 (4th Cir. 1993).<br />

23. “A survey <strong>of</strong> the practice used by other circuits demonstrates a cons<strong>is</strong>tent trend<br />

towards the use <strong>of</strong> a balancing <strong>of</strong> the equities-type test . . . .” Hartford Life, 237 F.R.D. at<br />

549.<br />

24. Steinman, supra note 10, at 2.


ARKANSASLAWREVIEW.ORG<br />

696 ARKANSAS LAW REVIEW [Vol. 63:691<br />

that it effectively bars access to the courts, <strong>and</strong> where the<br />

solution <strong>is</strong> simple with minimal harm to adverse parties <strong>and</strong> the<br />

public, court systems have redesigned the rules <strong>of</strong> civil<br />

procedure to remove those unnecessary burdens. It <strong>is</strong> their job<br />

to do so. When justice <strong>and</strong> court rules collide, justice trumps.<br />

In certain cases, using one‟s own name can add heavy<br />

weights <strong>of</strong> retaliatory, privacy, or legal harm to one‟s side <strong>of</strong> the<br />

scale. When that happens, the hope <strong>of</strong> balancing the scale via<br />

the courts d<strong>is</strong>appears, <strong>and</strong> d<strong>is</strong>heartened people ab<strong>and</strong>on their<br />

legitimate claims. These harms ex<strong>is</strong>t when the trial process<br />

requires the exposure <strong>of</strong> sensitive information. When sensitive<br />

information must be made public, the easiest <strong>and</strong> most narrowly<br />

tailored way to avoid th<strong>is</strong> extra harm <strong>is</strong> to keep party-names<br />

confidential. Thus courts have waded into the pseudonym arena<br />

with what <strong>is</strong> now a hefty armload <strong>of</strong> common-law dec<strong>is</strong>ions.<br />

Not every court <strong>is</strong> sympathetic to those suffering the extra<br />

harm imposed by the Rules <strong>of</strong> Civil Procedure. “Femedeer” was<br />

the pseudonym for a convicted sex <strong>of</strong>fender suing to stay <strong>of</strong>f a<br />

state sex-<strong>of</strong>fender reg<strong>is</strong>try. 25 The trial court ordered him to use<br />

h<strong>is</strong> own name <strong>and</strong> the Tenth Circuit affirmed, adding, “those<br />

using the courts must be prepared to accept the public scrutiny<br />

that <strong>is</strong> an inherent part <strong>of</strong> public trials.” 26 Pseudonym opponents<br />

commonly quote th<strong>is</strong> rules-trump-justice point <strong>of</strong> view. 27 New<br />

pseudonym rules, if they are to remove th<strong>is</strong> unnecessary harm,<br />

will need to make it clear that their purpose <strong>is</strong> to keep the court<br />

system open, as much as possible, as a tool for justice.<br />

2. Constitutional Requirements at Times Call for<br />

Pseudonym Use<br />

Trial judges perform more uniformly when court rules<br />

clearly guide them. In the same way, rule designers can create<br />

rules more effectively when guided by constitutional<br />

requirements. Where these requirements appear to conflict, rule<br />

designers must chart a course to address them all.<br />

In the pseudonym arena, there are five guiding<br />

constitutional <strong>is</strong>sues. On the pseudonym-opponents‟ side <strong>is</strong> the<br />

25. Femedeer v. Haun, 227 F.3d 1244, 1246 (10th Cir. 2000).<br />

26. Id.<br />

27. See, e.g., <strong>Doe</strong> v. Ind. Black Expo, Inc., 932 F. Supp. 137, 139 (S.D. Ind. 1996).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 697<br />

qualified First Amendment right that the public should have<br />

access to court proceedings. 28 The public has a legitimate<br />

interest in knowing all the facts <strong>of</strong> a case, including the identities<br />

<strong>of</strong> the parties. 29 On the petitioner‟s side are the following four<br />

constitutional protections: (1) a set <strong>of</strong> privacy rights hammered<br />

out in a number <strong>of</strong> liberty cases; 30 (2) state <strong>and</strong> federal<br />

constitutional guarantees <strong>of</strong> access to courts to redress wrongs; 31<br />

(3) the Fifth Amendment protection from self-incrimination; 32<br />

<strong>and</strong> (4) courts‟ responsibility to review leg<strong>is</strong>lative acts for<br />

constitutionality. 33<br />

a. First Amendment Rights Grant Limited Access to Courts<br />

There <strong>is</strong> a First Amendment right, hammered out in<br />

criminal cases, to keep judicial proceedings open. 34 Th<strong>is</strong> right<br />

belongs to the public, who may intervene <strong>and</strong> petition courts for<br />

more information. The right <strong>is</strong> not absolute; the “normal<br />

practice <strong>of</strong> d<strong>is</strong>closing the parties‟ identities yields „to a policy <strong>of</strong><br />

protecting privacy‟” in certain circumstances. 35 There are valid<br />

policy reasons for enforcing th<strong>is</strong> First Amendment right:<br />

(1) Open courts protect against judicial abuse 36 <strong>and</strong> insures<br />

accountability. 37 They assure fair trials 38 <strong>and</strong> guard against<br />

corruption, bias or partiality on the part <strong>of</strong> the court. 39<br />

“Any step that withdraws an element <strong>of</strong> the judicial process<br />

from public view makes the ensuing dec<strong>is</strong>ion look more<br />

like fiat, which requires compelling justification.” 40<br />

28. See, e.g., Press-Enter. Co. v. Superior Court, 464 U.S. 501, 508-10 (1984)<br />

(d<strong>is</strong>cussing purposes <strong>of</strong> open access to criminal trials).<br />

29. <strong>Doe</strong> v. Frank, 951 F.2d 320, 322 (11th Cir. 1992).<br />

30. See, e.g., Riniker v. Wilson, 623 N.W.2d 220, 226-27 (Iowa Ct. App. 2000).<br />

31. See d<strong>is</strong>cussion infra Part II.B.2.b.<br />

32. See Steinman, supra note 10, at 58.<br />

33. See d<strong>is</strong>cussion infra Part II.B.2.e.<br />

34. SEDONA GUIDELINES, supra note 8, at 16.<br />

35. S. Method<strong>is</strong>t Univ. Ass‟n <strong>of</strong> Women <strong>Law</strong> Students v. Wynne & Jaffe, 599 F.2d<br />

707, 712 (5th Cir. 1979) (quoting <strong>Doe</strong> v. Deschamps, 64 F.R.D. 652, 653 (D. Mont.<br />

1974)).<br />

36. Steinman, supra note 10, at 13.<br />

37. SEDONA GUIDELINES, supra note 8, at 17.<br />

38. Steinman, supra note 10, at 13 (citing Richmond Newspapers, Inc. v. Virginia,<br />

448 U.S. 555, 569 (1980)).<br />

39. See id. at 14.<br />

40. Union Oil Co. <strong>of</strong> Cal. v. Leavell, 220 F.3d 562, 568 (7th Cir. 2000), quoted in<br />

United States v. Stoterau, 524 F.3d 988, 1012 (9th Cir. 2008).


ARKANSASLAWREVIEW.ORG<br />

698 ARKANSAS LAW REVIEW [Vol. 63:691<br />

(2) Open courts “cause all trial participants to perform their<br />

duties more conscientiously” 41 <strong>and</strong> inform the public on the<br />

workings <strong>of</strong> the court. 42<br />

(3) Open courts promote “public respect for <strong>and</strong><br />

confidence in the judicial system.” 43<br />

(4) Open courts <strong>of</strong>fer the public the “therapeutic value” <strong>of</strong><br />

seeing criminals brought to justice 44 <strong>and</strong> unconstitutional<br />

laws removed from the books.<br />

b. Court-Defined Privacy Rights Can Conflict with the First<br />

Amendment<br />

The Supreme Court has recognized privacy as one <strong>of</strong> the<br />

liberty rights Americans enjoy. 45 The types <strong>of</strong> privacy<br />

recognized <strong>and</strong> protected in the First Amendment include <strong>is</strong>sues<br />

about abortion, 46 the marital bedroom, 47 extramarital sexual<br />

conduct, 48 procreation <strong>and</strong> conception, 49 child rearing, 50<br />

education <strong>and</strong> the acquiring <strong>of</strong> useful knowledge, 51 <strong>and</strong> any<br />

other personal privacy right that <strong>is</strong> either “fundamental” or<br />

“implicit in the concept <strong>of</strong> ordered liberty.” 52 Th<strong>is</strong> means that<br />

government actors, including courts, may not expose th<strong>is</strong><br />

information about identified parties without good cause when<br />

there ex<strong>is</strong>ts a simple, nonbiasing solution to prevent it.<br />

Pseudonyms have become a solution. About the time the<br />

41. Steinman, supra note 10, at 14 (quoting Gannett Co. v. DePasquale, 443 U.S.<br />

368, 383 (1979)).<br />

42. SEDONA GUIDELINES, supra note 8, at 17.<br />

43. Steinman, supra note 10, at 15.<br />

44. See id.<br />

45. See, e.g., Gr<strong>is</strong>wold v. Connecticut, 381 U.S. 479, 484-85 (1965); see also M.M.<br />

v. Zavaras, 139 F.3d 798, 800 (10th Cir. 1998) (“Of course privacy interests are recognized<br />

in particular circumstances to be in the public interest.”). In that case, the court found that<br />

M.M., an inmate who wanted an abortion, did not have a sufficiently high privacy interest.<br />

Id. at 802-03.<br />

46. E.g., Roe v. Wade, 410 U.S. 113, 153 (1973).<br />

47. Gr<strong>is</strong>wold, 381 U.S. at 485-86 (1965).<br />

48. E<strong>is</strong>enstadt v. Baird, 405 U.S. 438 (1972) (voiding a state law that made it a crime<br />

to give a contraceptive to an unmarried woman).<br />

49. Carey v. Population Servs. Int‟l, 431 U.S. 678, 684-85 (1976).<br />

50. Skinner v. Oklahoma, 316 U.S. 535, 541 (1942).<br />

51. Meyer v. Nebraska, 262 U.S. 390, 399 (1923).<br />

52. Palko v. Connecticut, 302 U.S. 319, 325 (1937).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 699<br />

Supreme Court started recognizing privacy rights, the use <strong>of</strong><br />

plaintiff pseudonyms took <strong>of</strong>f. 53<br />

The <strong>Arkansas</strong> Supreme Court has allowed pseudonym use<br />

to protect the privacy <strong>of</strong> plaintiffs. Those plaintiffs were: (1) a<br />

third grade girl allegedly raped; 54 (2) a pair whose criminal<br />

records had been expunged; 55 (3) a bus driver fired for having a<br />

positive drug screen; 56 <strong>and</strong> (4) a minor allegedly made pregnant<br />

by her min<strong>is</strong>ter. 57 But a sexual-touching lawsuit was not <strong>of</strong><br />

“utmost privacy” <strong>and</strong>, therefore, did not merit pseudonym use. 58<br />

Federal pseudonym cases protecting privacy rights have<br />

included these <strong>is</strong>sues: religion, 59 mental health, 60 minors, 61<br />

homosexuality, 62 abortion, 63 trade secrets, 64 <strong>and</strong> protection <strong>of</strong> the<br />

attorney-client privilege. 65 Cases involving information not<br />

sufficiently private to warrant pseudonym protection have<br />

included: the fear <strong>of</strong> making public some personal medical<br />

information, 66 high-school students claiming that a h<strong>is</strong>tory<br />

teacher used sexually explicit material, 67 alcohol<strong>is</strong>m, 68 sexual<br />

53. See Carol M. Rice, Meet <strong>John</strong> <strong>Doe</strong>: It Is Time For Federal Civil Procedure To<br />

Recognize <strong>John</strong> <strong>Doe</strong> Parties, 57 U. PITT. L. REV. 883 (1996), for a thorough h<strong>is</strong>tory <strong>of</strong><br />

pseudonym use.<br />

54. <strong>Doe</strong> v. Baum, 348 Ark. 259, 72 S.W.3d 476 (2002).<br />

55. <strong>Doe</strong> v. Ark. Dep‟t <strong>of</strong> Human Servs., 357 Ark. 413, 182 S.W.3d 107 (2004).<br />

56. <strong>Doe</strong> v. Cent. Ark. Transit, 50 Ark. App. 132, 900 S.W.2d 582 (1995).<br />

57. Barr v. Richardson, 314 Ark. 294, 862 S.W.2d 253 (1993).<br />

58. <strong>Doe</strong> v. Union Pac. R.R. Co., 323 Ark. 237, 914 S.W.2d 312 (1996) (d<strong>is</strong>cussing<br />

<strong>Doe</strong> v. Frank, 951 F.2d 320 (11th Cir. 1992)).<br />

59. <strong>Doe</strong> v. Stegall, 653 F.2d 180 (5th Cir. 1981).<br />

60. <strong>Doe</strong> v. Hartford Life & Accident Ins. Co., 237 F.R.D. 545, 549 (D.N.J. 2006) (<br />

“[M]any courts have recognized pseudonym use in mental health cases.”).<br />

61. A court should consider, inter alia, “the ages <strong>of</strong> the persons whose privacy<br />

interests are sought to be protected.” James v. Jacobson, 6 F.3d 233, 238 (4th Cir. 1993).<br />

“We emphasize the special status <strong>and</strong> vulnerability <strong>of</strong> the child-litigants . . . .” Stegall, 653<br />

F.2d at 186. The more tender the years, the more likely a court <strong>is</strong> to consider granting<br />

pseudonym protection.<br />

62. E.g., <strong>Doe</strong> v. United Servs. Life Ins. Co., 123 F.R.D. 437 (S.D.N.Y. 1988); <strong>Doe</strong> v.<br />

Chafee, 355 F. Supp. 112 (N.D. Cal. 1973).<br />

63. <strong>Doe</strong> v. Deschamps, 64 F.R.D. 652 (D. Mont. 1974).<br />

64. Leucadia Inc., v. Applied Extrusion Tech., Inc., 998 F.2d 157, 166 (3d Cir. 1993),<br />

cited in SEDONA GUIDELINES, supra note 8, at 17.<br />

65. <strong>Doe</strong> v. A Corp., 709 F.2d 1043 (5th Cir. 1983).<br />

66. Jane Noe v. Carlos, No. 2:08 cv 227, 2008 U.S. D<strong>is</strong>t. LEXIS 79441 (N.D. Ind.<br />

Sept. 25, 2008); Singer v. Rosenkrantz, 903 N.E.2d 191, 193-94 (Mass. 2009).<br />

67. <strong>Doe</strong> v. Pleasant Valley Sch. D<strong>is</strong>t., No. 3:07cv854, 2007 U.S. D<strong>is</strong>t. LEXIS 55846<br />

(M.D. Pa. Aug. 1, 2007).<br />

68. <strong>Doe</strong> v. Frank, 951 F.2d 320, 323 (11th Cir. 1992).


ARKANSASLAWREVIEW.ORG<br />

700 ARKANSAS LAW REVIEW [Vol. 63:691<br />

d<strong>is</strong>crimination by a l<strong>and</strong>lord, 69 the common annoyance <strong>and</strong><br />

critic<strong>is</strong>m that all plaintiffs face, 70 <strong>and</strong> the r<strong>is</strong>k <strong>of</strong> “some<br />

embarrassment.” 71 These are common-law privacy rights, <strong>and</strong><br />

they are not limited by the fact that some statutes allow<br />

pseudonyms in narrow circumstances. 72<br />

Not every judge deciding a pseudonym case sees<br />

constitutionally protected privacy as meriting protection.<br />

Usually, the constitutionality <strong>of</strong> the protection never comes up.<br />

Instead, courts look to see if the harm <strong>is</strong>, in their estimation,<br />

sufficient. Some use an “utmost privacy” st<strong>and</strong>ard. 73 While th<strong>is</strong><br />

may be appropriate for privacy <strong>is</strong>sues not granted constitutional<br />

protection, courts should not run roughshod over constitutionally<br />

protected privacy rights. Courts should first consider whether<br />

the case involves one <strong>of</strong> those constitutionally protected privacy<br />

<strong>is</strong>sues. If justice dem<strong>and</strong>s publ<strong>is</strong>hing the private information,<br />

then courts should consider one <strong>of</strong> the several non-prejudicial<br />

methods <strong>of</strong> allowing pseudonyms. New pseudonym rules<br />

should make it clear that r<strong>is</strong>k <strong>of</strong> harm to constitutionally<br />

protected privacy <strong>is</strong> always significant harm.<br />

Immigrant status <strong>is</strong> not constitutionally protected as a<br />

privacy right. In <strong>Doe</strong> I v. Merten the court held that “unlawful<br />

or problematic immigration status” was not the type <strong>of</strong><br />

“„personal information <strong>of</strong> the utmost intimacy‟ that warrants<br />

ab<strong>and</strong>oning the presumption <strong>of</strong> openness in judicial<br />

proceedings.” 74 In Day v. Sebelius, a d<strong>is</strong>trict court used similar<br />

reasoning. 75 Pseudonym opponents commonly quote these two<br />

cases as <strong>is</strong>sue-settling precedent. They fail to mention that the<br />

judges in both Sebelius <strong>and</strong> Merten moved on from the<br />

d<strong>is</strong>cussion <strong>of</strong> privacy harm to measure the r<strong>is</strong>k <strong>of</strong> retaliatory <strong>and</strong><br />

legal harm that immigrants might suffer. 76 Since the <strong>is</strong>sue <strong>of</strong><br />

69. Luckett v. Beaudet, 21 F. Supp. 2d 1029, 1029 (D. Minn. 1998).<br />

70. James v. Jacobson, 6 F.3d 233, 238 (4th Cir. 1993).<br />

71. Femedeer v. Haun, 227 F.3d 1244, 1246 (10th Cir. 2000).<br />

72. For example, the <strong>Arkansas</strong> Code allows pseudonyms for a minor seeking an<br />

abortion without parental perm<strong>is</strong>sion. ARK. CODE ANN. § 20-16-804(2)(B) (Repl. 2005).<br />

73. E.g., <strong>Doe</strong> v. Union Pac. R.R. Co., 323 Ark. 237, 239, 914 S.W.2d 312, 313<br />

(1996) (noting language used by the trial court).<br />

74. 219 F.R.D. 387, 392 (E.D. Va. 2004); see also <strong>Doe</strong> v. Sebelius, 227 F.R.D. 668<br />

(D. Kan. 2005).<br />

75. 227 F.R.D. 668, 677 (D. Kan. 2005).<br />

76. Day v. Sebelius, 227 F.R.D. 668, 676-77 (D. Kan. 2005); <strong>Doe</strong> I v. Merten, 219<br />

F.R.D. 387, 393-94 (E.D. Va. 2004).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 701<br />

access to courts for undocumented aliens will be relevant for<br />

decades to come, new pseudonym rules should make it clear that<br />

perm<strong>is</strong>sion for undocumented aliens to proceed pseudonymously<br />

hinges not on privacy harm but on other types <strong>of</strong> harm.<br />

c. Our Constitutions Guarantee Access to Courts<br />

The United States <strong>and</strong> <strong>Arkansas</strong> constitutions guarantee<br />

access to the courts to redress wrongs. The <strong>Arkansas</strong><br />

Constitution provides, “Every person <strong>is</strong> entitled to a certain<br />

remedy in the laws for all injuries or wrongs he may receive in<br />

h<strong>is</strong> person, property or character . . . .” 77 The First Amendment<br />

<strong>of</strong> the U. S. Constitution contains a similar guarantee: “Congress<br />

shall make no law . . . abridging . . . the right <strong>of</strong> the people<br />

peaceably . . . to petition the Government for a redress <strong>of</strong><br />

grievances.” 78 However, sometimes state <strong>and</strong> federal rules <strong>of</strong><br />

civil procedure needlessly block plaintiffs‟ access to courts.<br />

Injured parties can be effectively blocked from access to<br />

the courts if the rules require them to use their own names when<br />

doing so threatens additional retaliatory, privacy, <strong>and</strong> legal<br />

harm. The in terrorem effect <strong>of</strong> scaring plaintiffs away from<br />

bringing lawsuits has long been considered an improper<br />

purpose. The Supreme Court has held that judges may keep trial<br />

information confidential where there <strong>is</strong> reason to believe that the<br />

court files would become “a vehicle for improper purposes.” 79<br />

Examples <strong>of</strong> the r<strong>is</strong>k <strong>of</strong> retaliation harm which have been<br />

found to justify pseudonym use include: a federal witness<br />

fearing repr<strong>is</strong>al, 80 a Jew<strong>is</strong>h mother who feared physical <strong>and</strong><br />

mental harassment from Chr<strong>is</strong>tians, 81 legal Chinese-immigrant<br />

workers suing their employer, 82 <strong>and</strong> undocumented aliens<br />

contesting city ordinances in an openly hostile local<br />

environment. 83 Retaliation can be physical, mental, 84 or<br />

77. ARK. CONST. art. 2, § 13.<br />

78. U.S. CONST. amend. I (emphas<strong>is</strong> added).<br />

79. Steinman, supra note 10, at 26 (citing Nixon v. Warner Commc‟ns, Inc., 435 U.S.<br />

589, 598 (1978)).<br />

80. United States v. <strong>Doe</strong>, 655 F.2d 920, 922-23 (9th Cir. 1980). The court‟s<br />

d<strong>is</strong>cussion in note 1 on page 922 <strong>is</strong> particularly helpful. Id.<br />

81. <strong>Doe</strong> v. Stegall, 653 F.2d 180, 181 (5th Cir. 1981).<br />

82. <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp., 214 F.3d 1058, 1062-63 (9th Cir.<br />

2000).<br />

83. Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477, 507-08 (M.D. Pa. 2007).


ARKANSASLAWREVIEW.ORG<br />

702 ARKANSAS LAW REVIEW [Vol. 63:691<br />

economic harm from harassment, ridicule, or personal<br />

embarrassment. 85 On the other h<strong>and</strong>, one court held that a group<br />

<strong>of</strong> women law students suing law firms faced “no greater threat<br />

<strong>of</strong> retaliation than the typical plaintiff alleging Title VII<br />

violations.” 86<br />

Harm to privacy, even if not recognized as constitutionally<br />

protected, can still effectively block access to the courts. Thus,<br />

courts may need to take steps to protect the identities <strong>of</strong>, for<br />

example, minors <strong>and</strong> crime victims in order to give life to the<br />

constitutional guarantee <strong>of</strong> access to courts. 87<br />

New pseudonym rules should give life to constitutional<br />

guarantees <strong>of</strong> access to courts <strong>and</strong> should reject past pseudonym<br />

dec<strong>is</strong>ions that have blocked access. For example, the judge in<br />

Qualls v. Rumsfield denied pseudonym use to a soldier seeking<br />

to prevent the Army from unilaterally extending enl<strong>is</strong>tment<br />

contracts. 88 The judge was comfortable knowing the soldier<br />

would drop h<strong>is</strong> case if denied the right to proceed<br />

pseudonymously. 89 Requiring plaintiffs to use their own names,<br />

the court explained, “encourage[s] suits by the most zealous,<br />

passionate <strong>and</strong> sincere litigants . . . .” 90 A similar argument to<br />

th<strong>is</strong> court‟s reasoning <strong>is</strong> that access to courts <strong>is</strong> synonymous<br />

with the ability to file a lawsuit. Unreasonable procedural<br />

hurdles or r<strong>is</strong>k <strong>of</strong> extraordinary harm do not deny th<strong>is</strong> access, the<br />

argument goes—plaintiffs are free to take it or leave it. 91<br />

However, Steinman writes that th<strong>is</strong> “either-or approach<br />

interferes with plaintiffs‟ constitutional right to have claims<br />

adjudicated by the court,” <strong>and</strong> should be rejected. 92<br />

The Fourth Circuit held that a trial judge had abused h<strong>is</strong><br />

d<strong>is</strong>cretion when the judge wrote:<br />

84. <strong>Doe</strong>s I thru XXIII, 214 F.3d at 1068; Qualls v. Rumsfeld, 228 F.R.D. 8, 10-11<br />

(D.D.C. 2005).<br />

85. United States v. <strong>Doe</strong>, 655 F.2d 920, 922 n.1 (9th Cir. 1980).<br />

86. S. Method<strong>is</strong>t Univ. Ass‟n for Women <strong>Law</strong> Students v. Wynne & Jaffe, 599 F.2d<br />

707, 713 (5th Cir. 1979).<br />

87. The type <strong>of</strong> legal harm that could imperm<strong>is</strong>sibly block a party from access to the<br />

courts <strong>is</strong> d<strong>is</strong>cussed in Part IV.A.2.<br />

88. Qualls, 228 F.R.D. at 9, 13.<br />

89. See id. at 9.<br />

90. Id. at 13.<br />

91. See Steinman, supra note 10, at 33.<br />

92. Id. (citing <strong>Doe</strong> v. Bodwin, 326 N.W.2d 473, 474-76 (Mich. Ct. App. 1982)).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 703<br />

That [harm to the children] seems to me a r<strong>is</strong>k you take<br />

when you undertake to try your case in what <strong>is</strong> going to be<br />

a public forum. I‟m not trying to d<strong>is</strong>courage litigation, but<br />

to be able to proceed in secret, in effect, <strong>is</strong> not my notion <strong>of</strong><br />

how a case ought to proceed. 93<br />

Finally, writers <strong>of</strong> pseudonym rules may be tempted to play<br />

loose with the words “every person” in our constitutional<br />

guarantees <strong>of</strong> access to the courts. It <strong>is</strong> tempting to deny access<br />

to justice by defining “every person” to mean “everyone but our<br />

currently least-favored group.” Let us not do so. The thought<br />

that any government would choose to design justice for us <strong>and</strong><br />

kangaroo courts for them <strong>is</strong> too much for a moral society to bear.<br />

New pseudonym rules should make it clear that one <strong>of</strong> their<br />

purposes <strong>is</strong> to keep courts open for everyone to redress injuries<br />

<strong>and</strong> wrongs.<br />

d. The Fifth Amendment Prevents Courts from Compelling<br />

Self-Incrimination<br />

The Fifth Amendment <strong>of</strong> the United States Constitution<br />

guarantees that “No person shall be . . . compelled in any<br />

criminal case to be a witness against himself . . . .” 94 As with<br />

the other constitutional protections at work in pseudonym<br />

dec<strong>is</strong>ions, 95 a thorough study <strong>of</strong> the Fifth Amendment <strong>is</strong><br />

important to underst<strong>and</strong> why it implicates pseudonym use. Such<br />

thoroughness, though, <strong>is</strong> outside the scope <strong>of</strong> th<strong>is</strong> article. For<br />

now it <strong>is</strong> enough to show that the United States Supreme Court<br />

recognizes that the “sole concern [<strong>of</strong> the protection] <strong>is</strong>, as its<br />

name indicates, with the danger to a witness forced to give<br />

testimony leading to the infliction <strong>of</strong> penalties affixed to the<br />

criminal acts.” 96 Thus, a judge who would deny a claim <strong>of</strong> the<br />

Fifth Amendment privilege must be “„perfectly clear, from a<br />

careful consideration <strong>of</strong> all the circumstances in the case, that<br />

93. James v. Jacobson, 6 F.3d 240-42 & n.1 (4th Cir. 1993) (alterations in original).<br />

94. Article II, section 8 <strong>of</strong> the <strong>Arkansas</strong> Constitution <strong>is</strong> essentially identical.<br />

95. See, e.g., Steinman, supra note 10, at 19 (“Finally, secrecy hampers the structural<br />

function <strong>of</strong> the [F]irst [A]mendment.”).<br />

96. Ullmann v. United States, 350 U.S. 422, 438-39 (1956) (internal quotation marks<br />

omitted) (quoting Boyd v. United States, 116 U.S. 616, 634 (1886)).


ARKANSASLAWREVIEW.ORG<br />

704 ARKANSAS LAW REVIEW [Vol. 63:691<br />

the witness <strong>is</strong> m<strong>is</strong>taken, <strong>and</strong> that the answer[s] cannot possibly<br />

have such tendency‟ to incriminate.” 97<br />

Th<strong>is</strong> constitutional prov<strong>is</strong>ion applies only to a single type<br />

<strong>of</strong> pseudonym case, where the case <strong>is</strong>: (1) for declaratory<br />

judgment; (2) challenges the constitutionality <strong>of</strong> a statute,<br />

ordinance or rule; (3) <strong>and</strong> pro<strong>of</strong> <strong>of</strong> st<strong>and</strong>ing requires the plaintiff<br />

to self-incriminate. 98 Federal courts have normally allowed<br />

pseudonym use in these cases. 99 To have st<strong>and</strong>ing in a<br />

declaratory-judgment case, the plaintiffs must show that the<br />

challenged statute impacts their rights <strong>and</strong> that they have a<br />

personal stake in the outcome. 100 Th<strong>is</strong> means they must claim<br />

that they are the intended targets <strong>of</strong> the law. Th<strong>is</strong> confessing to<br />

a violation <strong>of</strong> criminal laws places plaintiffs at the very<br />

threshold <strong>of</strong> self-incrimination. All that remains <strong>is</strong> revealing<br />

their names.<br />

Self-incrimination <strong>is</strong> a two-part process: the first part <strong>is</strong><br />

confessing to a violation <strong>of</strong>, or an intent to violate, a law; the<br />

second part <strong>is</strong> identifying oneself. Announcing to the world “I<br />

am a robber!” <strong>is</strong> not an incriminating statement if no one knows<br />

the announcer‟s identity. So when plaintiffs must confess all the<br />

elements <strong>of</strong> a crime in order to have st<strong>and</strong>ing, the only m<strong>is</strong>sing<br />

pieces <strong>of</strong> information are their names.<br />

Courts should take seriously the government-ordered<br />

confession required when plaintiffs seeking judicial review <strong>of</strong><br />

unconstitutional statutes must plead incriminating facts to prove<br />

st<strong>and</strong>ing. Requiring such parties then to use their own names<br />

completes the self-incrimination process. Eroding a party‟s<br />

Fifth Amendment protection <strong>is</strong> always significant harm. 101 Nor<br />

can courts claim to uphold Fifth Amendment protections by<br />

allowing plaintiffs to waive their constitutionally guaranteed<br />

access to the courts. There <strong>is</strong> no need for such constitutional<br />

97. H<strong>of</strong>fman v. United States, 341 U.S. 479, 488 (1951) (emphas<strong>is</strong> omitted) (quoting<br />

Temple v. Commonwealth, 75 Va. 892, 898 (1881)). For an application <strong>of</strong> these<br />

principles, see Malloy v. Hogan, 378 U.S. 1, 11-14 (1964). When government <strong>is</strong> seeking to<br />

enforce an essentially noncriminal statutory scheme through compulsory d<strong>is</strong>closure, some<br />

members <strong>of</strong> the Court have argued for a relaxation <strong>of</strong> the H<strong>of</strong>fman st<strong>and</strong>ard. See California<br />

v. Byers, 402 U.S. 424, 441-42 (1971) (Harlan, J., concurring).<br />

98. See d<strong>is</strong>cussion infra Part IV.A.2, for details about these “left-end cases.”<br />

99. See d<strong>is</strong>cussion infra Part IV.A.2.b, for details.<br />

100. See Baker v. Carr, 369 U.S. 186, 204-08, 236-37 (1962).<br />

101. See, e.g., Couch v. United States, 409 U.S. 322, 327 (1973) (“By its very nature,<br />

the privilege [against self-incrimination] <strong>is</strong> an intimate <strong>and</strong> personal one.”).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 705<br />

damage, especially when easy, nonprejudicial pseudonym<br />

solutions ex<strong>is</strong>t. New pseudonym rules should, in these cases,<br />

require judges to recognize <strong>and</strong> protect all constitutional rights,<br />

including the Fifth Amendment protection from selfincrimination.<br />

e. Current Rules Allow Rulemaking Bodies to Avoid the<br />

Judicial <strong>Review</strong> <strong>of</strong> Unconstitutional <strong>Law</strong>s<br />

Courts have a constitutional duty to review statutes,<br />

ordinances <strong>and</strong> other laws. The United States Constitution <strong>and</strong><br />

its state counterparts divide their governments into three<br />

branches. Working together, they form a system <strong>of</strong> checks <strong>and</strong><br />

balances to prevent bias in favor <strong>of</strong> any individual branch. 102<br />

One <strong>of</strong> those checks <strong>is</strong> the judiciary‟s power—<strong>and</strong><br />

responsibility—to review laws for constitutionality. 103 Without<br />

proper pseudonym rules, Congress, leg<strong>is</strong>latures, <strong>and</strong> other<br />

lawmaking bodies will use the Rules <strong>of</strong> Civil Procedure, in their<br />

current form, to sidestep th<strong>is</strong> check. 104<br />

In declaratory-judgment cases challenging the<br />

constitutionality <strong>of</strong> a law where plaintiffs must plead facts to the<br />

verge <strong>of</strong> self-incrimination, 105 government defendants can<br />

always intimidate plaintiffs by threatening the legal harm <strong>of</strong><br />

arrest, impr<strong>is</strong>onment, fine, conf<strong>is</strong>cation, or deportation.<br />

Granting government defendants the power to intimidate<br />

plaintiffs with legal harm <strong>is</strong> an abdication <strong>of</strong> judicial-review<br />

responsibilities. Th<strong>is</strong> constitutional <strong>is</strong>sue goes h<strong>and</strong>-in-glove<br />

with the Fifth Amendment protection from self-incrimination.<br />

Steinman believes that forced self-incrimination inhibits<br />

important statutory challenges. 106 Few plaintiffs will stay the<br />

course, especially if they realize that the court system itself<br />

designed th<strong>is</strong> daunting d<strong>is</strong>advantage. Citizens will lose<br />

opportunities to have unconstitutional laws reviewed; respect for<br />

the courts will suffer. Courts should not be complicit,<br />

102. See, e.g., Buckley v. Valeo, 424 U.S. 1, 120-22 (1986).<br />

103. See id.<br />

104. See Steinman, supra note 10, at 35.<br />

105. E.g., La. Affiliate <strong>of</strong> Nat‟l Org. for the Reform <strong>of</strong> Marijuana <strong>Law</strong>s v. Guste, 380<br />

F. Supp. 404 (E.D. La. 1974) (considering a challenge to the constitutionality <strong>of</strong> a law<br />

prohibiting the private possession <strong>and</strong> use <strong>of</strong> marijuana).<br />

106. Steinman, supra note 10, at 62.


ARKANSASLAWREVIEW.ORG<br />

706 ARKANSAS LAW REVIEW [Vol. 63:691<br />

consciously or otherw<strong>is</strong>e, with th<strong>is</strong> improper purpose. New<br />

pseudonym rules should make it impossible for rulemaking<br />

bodies to subvert judicial review by scaring plaintiffs away with<br />

threats <strong>of</strong> criminal sanctions.<br />

New pseudonym rules should properly reflect th<strong>is</strong><br />

constitutional environment. Court rules rather than trial judges<br />

should balance the First Amendment against constitutional (1)<br />

duties <strong>of</strong> judicial review; (2) protections against selfincrimination;<br />

(3) guarantees <strong>of</strong> privacy; <strong>and</strong> (4) access to<br />

courts. Let the new pseudonym rules, if faithfully followed,<br />

chart the course that best h<strong>and</strong>les all these constitutional<br />

m<strong>and</strong>ates.<br />

III. PROCEDURAL RULES FOR PSEUDONYM USE<br />

Federal procedural practices are not uniform. There are no<br />

United States Supreme Court dec<strong>is</strong>ions on pseudonym use. The<br />

D.C. Circuit <strong>and</strong> the Fourth Circuit both encourage ex parte<br />

hearings to seek perm<strong>is</strong>sion from a judge before filing a<br />

complaint pseudonymously. 107 Other circuits permit motions to<br />

proceed pseudonymously either with the complaint, soon after<br />

the complaint, 108 or after a defendant‟s motion to d<strong>is</strong>m<strong>is</strong>s.<br />

Pr<strong>of</strong>essor Steinman recommends that the motion to proceed<br />

pseudonymously contain affidavits <strong>and</strong> a request for a protective<br />

order. 109 Pr<strong>of</strong>essor Cheit calls for notice <strong>and</strong> a hearing. 110 Cheit<br />

also notes the difficulties posed by the current lack <strong>of</strong> any<br />

uniform st<strong>and</strong>ards for the pseudonyms themselves. 111<br />

New pseudonym rules will work best if they clearly<br />

exclude Rules 10(a) <strong>and</strong> 17(a) from having any connection with<br />

107. James v. Jacobson, 6 F.3d 233, 235 (4th Cir. 1993); Qualls v. Rumsfeld, 228<br />

F.R.D. 8, 10 (D.D.C. 2005).<br />

108. See <strong>Doe</strong> v. Stegall, 653 F.2d 180, 181-82 (5th Cir. 1981) (holding that the<br />

plaintiff could proceed under a fictitious name to challenge public-school Bible readings<br />

when a protective order was filed after her complaint). Th<strong>is</strong> <strong>is</strong> not so in the Tenth Circuit.<br />

In one case, although the plaintiffs received perm<strong>is</strong>sion to use a pseudonym from a<br />

mag<strong>is</strong>trate soon after filing the complaint pseudonymously, the Tenth Circuit d<strong>is</strong>m<strong>is</strong>sed the<br />

case for lack <strong>of</strong> appellate jur<strong>is</strong>diction because the perm<strong>is</strong>sion had not been granted prior to<br />

filing the complaint. W.N.J. v. Yocom, 257 F.3d 1171, 1173 (10th Cir. 2001).<br />

109. Steinman, supra note 10, at 87.<br />

110. THE CONNECTICUT PRACTICE BOOK § 11-20A (2010) (requiring notice to be<br />

given for public comment), available at http://www.jud.ct.gov/Publications/PracticeBook/<br />

PB_2010.pdf (last v<strong>is</strong>ited Oct. 22, 2010).<br />

111. See Cheit, supra note 7, at 278.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 707<br />

pseudonyms. As mentioned in the introduction, federal <strong>and</strong><br />

state rules <strong>of</strong> civil procedure are silent about pseudonyms. If the<br />

new rules import rules 10(a) <strong>and</strong> 17(a), they import ambiguity.<br />

Some judges will likely interpret the new rules to deny<br />

pseudonyms. Others will give them little weight. .<br />

A few courts have expressed belief that rules 10(a) <strong>and</strong><br />

17(a) mean that judges should allow pseudonyms very, very<br />

rarely; denying pseudonyms summarily, then, <strong>is</strong> stat<strong>is</strong>tically the<br />

safest choice. 112 One critical problem <strong>is</strong> that violations <strong>of</strong> rule<br />

10(a) <strong>and</strong> 17(a) may properly be h<strong>and</strong>led through a rule 12(b)(6)<br />

motion to d<strong>is</strong>m<strong>is</strong>s. However, no appellate case has ever<br />

endorsed such a practice for pseudonyms. Rule 12(b)(6)<br />

requires a dec<strong>is</strong>ion based only on the facts pleaded in the<br />

complaint, 113 denying the defendant any input. All courts now<br />

require judges to consider many more factors than those the<br />

federal <strong>and</strong> state rules <strong>of</strong> civil procedure expressly require<br />

complaints to contain. 114<br />

Here <strong>is</strong> an example <strong>of</strong> a procedure that could work. First,<br />

the plaintiff would file the complaint using a pseudonym. The<br />

12(b)(6) motion to d<strong>is</strong>m<strong>is</strong>s would not available, so the defendant<br />

answers. After the answer, either the plaintiff files a motion to<br />

proceed pseudonymously, or the defendant would file an<br />

objection to pseudonym use. If neither party filed the motion,<br />

the court sua sponte should bring up the matter to consider the<br />

First Amendment interests <strong>of</strong> the public. 115 Finally, there should<br />

be an information-gathering process, a hearing <strong>and</strong> a dec<strong>is</strong>ion.<br />

Common results <strong>of</strong> th<strong>is</strong> process may be that courts: (1) allow<br />

plaintiffs to use pseudonyms with special rulings to mitigate any<br />

harm to the defendant; (2) require plaintiffs to provide real<br />

names via one <strong>of</strong> several protective orders to keep the names<br />

confidential; 116 (3) deny use <strong>of</strong> pseudonyms <strong>and</strong> order<br />

112. See, e.g., Roe v. New York, 49 F.R.D. 279, 281 (S.D.N.Y. 1970) (finding the<br />

reasons to use pseudonyms in that case to be insufficiently weighty).<br />

113. See, e.g., Guthrie v. Tyson Foods, Inc., 285 Ark. 95, 96, 685 S.W.2d 164, 165<br />

(1985).<br />

114. See Rice, supra note 53, at 915-16.<br />

115. See <strong>Doe</strong> v. Blue Cross & Blue Shield United, 112 F.3d 869, 872 (7th Cir. 1997)<br />

(“The use <strong>of</strong> fictitious names <strong>is</strong> d<strong>is</strong>favored, <strong>and</strong> the judge has an independent duty to<br />

determine whether exceptional circumstances justify such a departure from the normal<br />

method <strong>of</strong> proceeding in federal courts.”).<br />

116. Options the Sedona Conference l<strong>is</strong>ts, from most severe to most narrowly<br />

tailored, are as follows: sealing documents, lodging documents, redacting information, <strong>and</strong>


ARKANSASLAWREVIEW.ORG<br />

708 ARKANSAS LAW REVIEW [Vol. 63:691<br />

appropriate protection <strong>of</strong> any remaining constitutional rights; or<br />

(4) allow opponents to renew their objections to pseudonyms at<br />

the damages stage <strong>of</strong> the trial where the plaintiffs‟ names may<br />

be more relevant. 117<br />

IV. SUBSTANTIVE RULES FOR PSEUDONYM USE<br />

There are so many competing <strong>and</strong> conflicting rules for<br />

pseudonym use that there <strong>is</strong> little value in l<strong>is</strong>ting all the<br />

variations. Once again, designers <strong>of</strong> pseudonym rules should<br />

not consider the armload <strong>of</strong> pseudonym cases as precedent but<br />

as a library <strong>of</strong> ideas. Some ideas work; some do not. Some<br />

support justice <strong>and</strong> the five constitutional foundations; some<br />

build upon lesser foundations. Th<strong>is</strong> section presents a workable<br />

set <strong>of</strong> pseudonym rules <strong>and</strong> the rationale for those rules.<br />

A. Pseudonym Dec<strong>is</strong>ions Lie on a Continuum <strong>of</strong><br />

Possibilities<br />

Pseudonym dec<strong>is</strong>ions based on the facts <strong>of</strong> each case result<br />

in a continuum <strong>of</strong> cases from those that may never use<br />

pseudonyms to those that may always use pseudonyms. Imagine<br />

a long horizontal line. To the right the First Amendment<br />

dominates; a default rule says that parties must use their own<br />

names unless weightier constitutional <strong>is</strong>sues ar<strong>is</strong>e. On the left,<br />

the Fifth Amendment protection against self-incrimination as<br />

well as the constitutionally guaranteed access to courts <strong>and</strong> the<br />

checks-<strong>and</strong>-balances duty <strong>of</strong> judicial review team up to grant<br />

pseudonyms always. In the middle <strong>is</strong> a weighing process.<br />

Legal practitioners would greatly benefit from nailing<br />

down both ends <strong>of</strong> the continuum. They must be able to see the<br />

constitutional tension stretching the continuum like a strip <strong>of</strong><br />

rubber. If either nail comes loose, the continuum snaps to the<br />

opposite end, <strong>and</strong> dec<strong>is</strong>ions go awry. So th<strong>is</strong> article looks first at<br />

each end <strong>of</strong> the continuum.<br />

permitting pseudonyms. See SEDONA GUIDELINES, supra note 8, at 18. In <strong>Arkansas</strong>, one<br />

should consult Admin<strong>is</strong>trative Order 19 for options, which include the first three l<strong>is</strong>ted by<br />

Sedona Conference. Admin<strong>is</strong>trative Order No. 19, Access to Court Records (2007).<br />

117. See Avila-Blum v. Casa de Cambio Delgado, Inc., 236 F.R.D. 190, 192<br />

(S.D.N.Y. 2006) (allowing plaintiff‟s immigration status to be questioned).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 709<br />

1. Nailing Down the Right End <strong>of</strong> the Continuum—The<br />

First Amendment<br />

The First Amendment allows the press <strong>and</strong> the public open<br />

access into the workings <strong>of</strong> the courts. 118 Therefore, unless<br />

competing constitutional <strong>is</strong>sues ar<strong>is</strong>e, parties must use their own<br />

names in their pleadings.<br />

Pseudonym use should be patently clear. Parties w<strong>is</strong>hing to<br />

proceed pseudonymously should identify their names as<br />

pseudonyms. As varying pseudonyms impede legal research in<br />

th<strong>is</strong> area, st<strong>and</strong>ardizing use <strong>of</strong> the names <strong>John</strong> <strong>and</strong> Jane <strong>Doe</strong> <strong>is</strong> a<br />

good idea. 119 Multiple pseudonymous parties can use numbers,<br />

as in <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp. 120<br />

Pseudonyms for civil plaintiffs are <strong>and</strong> should be rare.<br />

Older dec<strong>is</strong>ions regularly comment on th<strong>is</strong> rarity. 121 However,<br />

new pseudonym rules should make no comment about<br />

frequency. There are too many pseudonym opinions where<br />

rarity meant a quick d<strong>is</strong>m<strong>is</strong>sal <strong>of</strong> all further constitutional<br />

considerations. A constitutionally designed <strong>and</strong> properly<br />

followed set <strong>of</strong> pseudonym rules will result in the rare use <strong>of</strong><br />

pseudonyms without biasing judges against them.<br />

2. Nailing Down the Left End <strong>of</strong> the Continuum—The<br />

Bright Line Rule<br />

At the left end <strong>of</strong> the continuum <strong>is</strong> the type <strong>of</strong> case that may<br />

always use pseudonyms where: (1) the claim <strong>is</strong> for declaratory<br />

judgment; (2) it challenges the constitutionality <strong>of</strong> a statute,<br />

ordinance, or rule; <strong>and</strong> (3) pro<strong>of</strong> <strong>of</strong> st<strong>and</strong>ing requires plaintiffs to<br />

118. Steinman, supra note 10, at 8.<br />

119. See Cheit, supra note 7, at 278. For example, without reading the case, no one<br />

would know that Femedeer in Femedeer v. Haun, 227 F.3d 1244 (10th Cir. 2000), <strong>is</strong> a<br />

pseudonym. But maybe the plaintiff gave us a hint! A feminine deer <strong>is</strong> a doe.<br />

120. 214 F.3d 1058 (9th Cir. 2000).<br />

121. See, e.g., <strong>Doe</strong> v. Hallock, 119 F.R.D. 640, 642 (S.D. M<strong>is</strong>s. 1987) (noting that in<br />

1970 pseudonyms were rare in litigation); <strong>Doe</strong> v. Rostker, 89 F.R.D. 158, 161 (N.D. Cal.<br />

1981) (limiting pseudonym use to a few limited categories <strong>of</strong> threatened harms).


ARKANSASLAWREVIEW.ORG<br />

710 ARKANSAS LAW REVIEW [Vol. 63:691<br />

plead facts to the verge <strong>of</strong> self-incrimination—the only facts<br />

lacking being the plaintiffs‟ names.<br />

For simplicity, we will call these cases left-end cases.<br />

Strong constitutional foundations call for pseudonyms in these<br />

cases. 122 Those foundations include the protection from selfincrimination,<br />

the right to access the courts to redress wrongs,<br />

<strong>and</strong> the judiciary‟s responsibility to review laws for<br />

constitutionality. 123<br />

These three constitutional foundations <strong>of</strong>fer redundant<br />

justifications. Even one constitutional foundation in a left-end<br />

case <strong>is</strong> sufficient to justify permitting pseudonyms.<br />

Comprom<strong>is</strong>ing any constitutional m<strong>and</strong>ate in a court proceeding<br />

<strong>is</strong> never justified where simple nonbiasing remedies are<br />

available. Th<strong>is</strong> <strong>is</strong> especially so when, as in left-end cases,<br />

pseudonyms cause little or no harm to the opposing party.<br />

a. The Legal Harm from Comprom<strong>is</strong>ed Fifth Amendment<br />

Protection Is Always Great Harm<br />

Lost Fifth Amendment protection <strong>is</strong> the most serious <strong>of</strong> all<br />

the constitutional harms implicit in pseudonym dec<strong>is</strong>ions. 124<br />

Compared to the First Amendment, the protection against selfincrimination<br />

<strong>is</strong> weightier. 125 If both the First <strong>and</strong> Fifth<br />

Amendment rights were lost, the Fifth Amendment loss would<br />

always be the greater. Later, th<strong>is</strong> article argues that in left-end<br />

cases, plaintiffs‟ pseudonyms harm government defendants very<br />

little, if at all, <strong>and</strong> actually benefit the public. 126 But even if that<br />

were not case—even if plaintiff‟s pseudonyms d<strong>is</strong>advantaged<br />

the government greatly—the government should always lose the<br />

pseudonym battle. In criminal trials, even if the government‟s<br />

case will die without enforced self-incrimination, the<br />

government goes without the information. Even national<br />

security cannot justify forced self-incrimination. 127 In the same<br />

122. See Steinman, supra note 10, at 61-62.<br />

123. See d<strong>is</strong>cussion supra Part II.B.2.<br />

124. See Part II.B.2.d, supra, for a d<strong>is</strong>cussion on why the Fifth Amendment applies<br />

in these cases.<br />

125. However, apparently the Supreme Court has never decided a case where these<br />

two constitutional rights have butted heads.<br />

126. See d<strong>is</strong>cussion infra Part IV.A.2.d.<br />

127. Although a detailed review <strong>of</strong> the Fifth Amendment protections would benefit<br />

those designing new pseudonym rules, such a review <strong>is</strong> outside the scope <strong>of</strong> th<strong>is</strong> article. In


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 711<br />

way, no matter how badly the government claims it needs the<br />

plaintiffs‟ names, in left-end cases it goes without.<br />

Not all judicial-review cases deserve to be at the left end <strong>of</strong><br />

the continuum—or even in the middle because not all implicate<br />

the Fifth Amendment. For example, in Donovan v. Priest, an<br />

<strong>Arkansas</strong> case, a voter had st<strong>and</strong>ing to sue for declaratory <strong>and</strong><br />

injunctive relief to stop an unconstitutional citizens‟ initiative. 128<br />

The plaintiff needed to confess to no crime, so the defendant<br />

could not intimidate the plaintiff from her day in court, <strong>and</strong><br />

therefore the <strong>Arkansas</strong> judiciary was in no danger <strong>of</strong> losing its<br />

power <strong>of</strong> judicial review in that case. No contrary constitutional<br />

<strong>is</strong>sues move th<strong>is</strong> case <strong>of</strong>f the right end <strong>of</strong> the continuum. Result:<br />

no pseudonyms.<br />

There are no left-end cases where the legal harm <strong>is</strong> so slight<br />

as not to require the protection a pseudonym <strong>of</strong>fers. What if the<br />

plaintiff <strong>is</strong> challenging an unconstitutional traffic law where the<br />

legal harm <strong>is</strong> $100? While it <strong>is</strong> tempting to rule that the harm in<br />

th<strong>is</strong> case <strong>is</strong> too small, one cannot forget the harm to people <strong>and</strong><br />

society as a whole whenever a branch <strong>of</strong> our government<br />

casually justifies enforced self-incrimination. Th<strong>is</strong> harm <strong>is</strong><br />

perhaps even greater when the governmental branch that forces<br />

the self-incrimination <strong>is</strong> the judiciary—the very branch with the<br />

job <strong>of</strong> preventing Fifth Amendment violations elsewhere. So,<br />

forcing plaintiffs to waive their Fifth Amendment protections in<br />

order to gain access to the courts <strong>is</strong> always a major harm. It<br />

should never happen. New pseudonym rules should place no<br />

stamp <strong>of</strong> approval on court-ordered self-incrimination.<br />

Ullmann v. United States, 350 U.S. 422 (1956), the United States Supreme Court stated<br />

that a witness could be compelled to give self-incriminating testimony before a gr<strong>and</strong> jury<br />

investigating espionage only because the Immunities Act gave the witness full immunity<br />

from prosecution stemming from h<strong>is</strong> testimony. Id. at 436-39. The privilege “<strong>is</strong> not to be<br />

interpreted literally.” Id. at 438. Rather, the “sole concern [<strong>of</strong> the privilege] <strong>is</strong>, as its name<br />

indicates, with the danger to a witness forced to give testimony leading to the infliction <strong>of</strong><br />

„penalties affixed to the criminal acts.‟” Id. (quoting Boyd v. United States, 116 U.S. 616,<br />

634 (1886)).<br />

128. 326 Ark. 353, 359, 931 S.W.2d 119, 122 (1996), cert. denied, 519 U.S. 1149<br />

(1997).


ARKANSASLAWREVIEW.ORG<br />

712 ARKANSAS LAW REVIEW [Vol. 63:691<br />

b. In Left End Cases, Government Defendants Can<br />

Use Legal Harm to Intimidate Plaintiffs from Their<br />

Constitutionally Protected Access to the Courts<br />

For a long time, courts have recognized that plaintiffs need<br />

the protection <strong>of</strong> pseudonyms when challenging statutes that<br />

impose legal pun<strong>is</strong>hments. 129 Legal harm <strong>is</strong> similar to retaliation<br />

harm with one difference. With retaliation there <strong>is</strong> always a bad<br />

mind or wrong motive. With legal harm there are no bad guys—<br />

only a rulemaking body composed <strong>of</strong> imperfect human beings<br />

who may have written an unconstitutional law. Ill-intended or<br />

not, in left-end cases the r<strong>is</strong>k <strong>of</strong> legal harm automatically<br />

appears <strong>and</strong> operates as effectively as steel bars to block access<br />

to the courts.<br />

R<strong>is</strong>k <strong>of</strong> legal harm springs from constitutional requirements<br />

for st<strong>and</strong>ing. The United States Constitution permits laws to be<br />

challenged only by people impacted by those laws. 130 So<br />

plaintiffs who challenge laws potentially expose themselves to<br />

all the negative consequences attached to those laws.<br />

One would guess that such an obvious barrier to the proper<br />

function <strong>of</strong> judicial review would invite pseudonym use, <strong>and</strong> one<br />

would be right. From the very beginning, these types <strong>of</strong><br />

plaintiffs regularly gained the right to proceed pseudonymously.<br />

One <strong>of</strong> the earliest pro-pseudonym factors was the presence <strong>of</strong> a<br />

government defendant. The Fifth Circuit noted in Southern<br />

Method<strong>is</strong>t <strong>University</strong> Ass’n <strong>of</strong> Women <strong>Law</strong> Students v. Wynne &<br />

Jaffe that “all <strong>of</strong> the plaintiffs previously allowed in other cases<br />

to proceed anonymously were challenging the constitutional,<br />

statutory or regulatory validity <strong>of</strong> government activity.” 131<br />

Steinman wrote, “There <strong>is</strong> a substantial group <strong>of</strong> cases in which<br />

persons suspected, or who fear they might be accused, <strong>of</strong><br />

criminal activity or unpr<strong>of</strong>essional conduct sought to sue or be<br />

sued pseudonymously. Usually courts granted these<br />

requests.” 132 In other words, courts have long used pseudonyms<br />

to protect plaintiffs challenging improper laws from the r<strong>is</strong>k <strong>of</strong><br />

legal harm.<br />

129. See Steinman, supra note 10, at 43-60.<br />

130. E.g., Lujan v. Defenders <strong>of</strong> Wildlife, 504 U.S. 555, 560-61 (1992).<br />

131. S. Method<strong>is</strong>t Ass‟n <strong>of</strong> Women <strong>Law</strong> Students v. Wynne & Jaffe, 599 F.2d 707,<br />

713 (5th Cir. 1979).<br />

132. Steinman, supra note 10, at 58.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 713<br />

c. Two Flavors <strong>of</strong> Legal Harm Lead to Arbitrary Dec<strong>is</strong>ions<br />

Lately two flavors <strong>of</strong> legal harm have evolved. When<br />

challenged laws contain their own undesirable consequences (as<br />

many laws do), courts commonly define the legal harm imposed<br />

as suffering “the injury litigated against.” 133 In other cases,<br />

though, where the challenged statute incorporated by reference<br />

consequences housed elsewhere, courts define the legal harm<br />

placed on the plaintiff more generally, recognizing the plaintiffs<br />

bringing such suits are compelled to admit “intention to engage<br />

in illegal conduct, thereby r<strong>is</strong>king criminal prosecution” 134 or<br />

“be subject to pun<strong>is</strong>hment by the state.” 135 Th<strong>is</strong> d<strong>is</strong>tinction has<br />

led to arbitrary results.<br />

Judges shop for their preferred flavor <strong>of</strong> legal harm. In<br />

2008, for example, 1,305 bills addressing immigration were<br />

introduced <strong>and</strong> 205 laws were enacted in 41 states. 136 Many <strong>of</strong><br />

those laws incorporate by reference parts <strong>of</strong> the federal<br />

immigration statutes, bringing into play federally defined legal<br />

harm—such as, arrest, deportation, und<strong>is</strong>closed confinement,<br />

<strong>and</strong> loss <strong>of</strong> property. In one case where undocumented<br />

immigrants challenged these laws, the court d<strong>is</strong>regarded the<br />

legal harm from immigration statutes <strong>and</strong> rejected the use <strong>of</strong><br />

pseudonyms, suggesting that the plaintiffs did not suffer the<br />

injury litigated against. 137 On the other h<strong>and</strong>, judges who<br />

w<strong>is</strong>hed to grant pseudonyms recognized <strong>and</strong> weighed the federal<br />

legal harm. A clear example <strong>of</strong> th<strong>is</strong> phrase-shopping shows up<br />

in the <strong>Doe</strong> 1 v. Merten opinion. 138 There, the judge followed<br />

Southern Method<strong>is</strong>t <strong>University</strong> Ass’n <strong>of</strong> Women <strong>Law</strong> Students,<br />

which cited as support for granting pseudonyms the fact that the<br />

plaintiffs “had to admit that they either had violated state laws or<br />

133. Femedeer v. Haun, 227 F.3d 1244, 1246 (10th Cir. 2000) (quoting <strong>Doe</strong> v. Frank,<br />

951 F.2d 320, 324 (11th Cir. 1992)).<br />

134. <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp., 951 F.2d 320, 324 (11th Cir.<br />

1992) (quoting <strong>Doe</strong> v. Stegall, 653 F.2d 180, 185 (5th Cir. 1981)).<br />

135. Qualls v. Rumsfeld, 228 F.R.D. 8, 11 (D.D.C. 2005).<br />

136. States’ Immigration Leg<strong>is</strong>lative Activity Still at Peak, NAT‟L CONFERENCE OF<br />

STATE LEGISLATURES (Dec. 18, 2008), http://ecom.ncsl.org/programs/press/2008/<br />

pr121808StateImmigrationReport2008.htm.<br />

137. <strong>Doe</strong> I v. Merten, 219 F.R.D. 387, 392-93 (E.D. Va. 2004).<br />

138. 219 F.R.D. 387.


ARKANSASLAWREVIEW.ORG<br />

714 ARKANSAS LAW REVIEW [Vol. 63:691<br />

government regulations or w<strong>is</strong>hed to engage in prohibited<br />

conduct.” 139 But in the next sentence, the judge switched flavors<br />

stating “[t]hat dictum refers to cases where plaintiffs are allowed<br />

to proceed anonymously in challenging the very laws or<br />

regulations they have violated or w<strong>is</strong>h to violate.” 140<br />

New pseudonym rules should remove th<strong>is</strong> ability to phraseshop.<br />

The wording should recognize all types <strong>of</strong> legal harm,<br />

including the major harm <strong>of</strong> court-ordered self-incrimination.<br />

With the constitutional guarantee <strong>of</strong> access to courts as one <strong>of</strong><br />

our foundations, there <strong>is</strong> no logical bas<strong>is</strong> for d<strong>is</strong>counting harm<br />

that can deter plaintiffs from pursuing legitimate claims simply<br />

because the legal harm <strong>is</strong> separate from the challenged law. To<br />

do so invites lawmakers to write their laws to take advantage <strong>of</strong><br />

th<strong>is</strong> loophole.<br />

d. In Left-End Cases, Harm to Government Defendants Is<br />

Low<br />

One justification for having a bright-line rule <strong>is</strong> that in leftend<br />

cases the harm to the government defendant <strong>is</strong> at a<br />

minimum. The government will know if the <strong>is</strong>sue has already<br />

been adjudicated. Res judicata harm <strong>is</strong> m<strong>is</strong>sing. Names <strong>of</strong> past<br />

plaintiffs will not be relevant unless they involved damages.<br />

Unlike tort cases against governments, in left-end cases<br />

st<strong>and</strong>ing harm <strong>is</strong> always low. Those with st<strong>and</strong>ing are always<br />

part <strong>of</strong> a large targeted group. Although the government may<br />

claim that it has the right to make sure the plaintiff <strong>is</strong> in the<br />

targeted group, the plaintiff‟s name <strong>is</strong> never critical in proving<br />

st<strong>and</strong>ing. The court can determine st<strong>and</strong>ing to its own<br />

sat<strong>is</strong>faction without divulging plaintiffs‟ names to the defendant.<br />

As the judge wrote in Lozano v. City <strong>of</strong> Hazleton, “[T]he<br />

individual identities <strong>and</strong> interest <strong>of</strong> the plaintiffs are not at <strong>is</strong>sue<br />

in th<strong>is</strong> case to the degree they were in Merten [where students<br />

sought adm<strong>is</strong>sion to a university] <strong>and</strong> are not necessary to reach<br />

the <strong>is</strong>sue <strong>of</strong> constitutionality ra<strong>is</strong>ed by the lawsuit.” 141<br />

Some harms to defendants‟ collateral strategy have been<br />

judged too slight to justify d<strong>is</strong>covery <strong>of</strong> information that would<br />

139. Id. at 392 (citing S. Method<strong>is</strong>t Ass‟n <strong>of</strong> Women <strong>Law</strong> Students v. Wynne &<br />

Jaffe, 599 F.2d 707, 713 (5th Cir. 1979)).<br />

140. Id. at 392-93.<br />

141. 496 F. Supp. 2d 477, 508 (M.D. Pa. 2007).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 715<br />

threaten plaintiffs from continuing their cases. These have<br />

included: impeachment <strong>of</strong> the plaintiff for falsifying<br />

employment papers, 142 challenge <strong>of</strong> the legality <strong>of</strong> the plaintiff‟s<br />

legal services, 143 checking tax returns to verify citizenship, 144<br />

<strong>and</strong> f<strong>is</strong>hing for fraud when not part <strong>of</strong> the merits <strong>of</strong> the case. 145<br />

e. Current Attitudes About Undocumented Immigrants<br />

Have Led to Unjustifiable Dec<strong>is</strong>ions About Legal Harm<br />

In spite <strong>of</strong> the cons<strong>is</strong>tent recognition <strong>of</strong> legal harm in<br />

judicial-review cases, some courts feel it proper to deny<br />

pseudonyms to undocumented immigrants who seek to<br />

challenge unconstitutional laws. One rationale ignores legal <strong>and</strong><br />

retaliatory harm by assuming that the <strong>Doe</strong> I v. Merten quote<br />

about privacy harm <strong>is</strong> the final word:<br />

After considering the various cases from the federal<br />

courts, we feel certain that status as an undocumented<br />

immigrant alone <strong>is</strong> not enough to permit a party to proceed<br />

anonymously. Th<strong>is</strong> <strong>is</strong> because “unlawful or problematic<br />

immigration status <strong>is</strong> simply not the type <strong>of</strong> „personal<br />

information <strong>of</strong> the utmost intimacy‟ that warrants<br />

ab<strong>and</strong>oning the presumption <strong>of</strong> openness in judicial<br />

proceedings.” 146<br />

Th<strong>is</strong> argument omits that the d<strong>is</strong>trict court in <strong>Doe</strong> I v. Merten<br />

analyzes legal harm later in its opinion. 147<br />

A second rationale considers immigration harm to be too<br />

little, but th<strong>is</strong> runs afoul <strong>of</strong> a long string <strong>of</strong> federal appellate in<br />

terrorem labor law cases. In these cases the immigrants use<br />

their own names, but later bring Rule 26(c) motions to prevent<br />

d<strong>is</strong>covery <strong>of</strong> immigration status. Federal courts cons<strong>is</strong>tently<br />

grant these requests 148 because “[t]he potential danger <strong>of</strong><br />

142. Avila-Blum v. Casa de Cambio Delgado, Inc., 236 F.R.D. 190, 191 (S.D.N.Y.<br />

2006).<br />

143. In re Reyes, 814 F.2d 168, 170 (5th Cir. 1987).<br />

144. Flores v. Albertsons, Inc., No. CV00100515AHM(SHX), 2002 WL 163623, at<br />

*6 (C.D. Cal. 2002).<br />

145. See id.<br />

146. <strong>Doe</strong> v. We<strong>is</strong>s, No. 09-1071, 2010 WL 1253216, at *2 (quoting <strong>Doe</strong> v. Merten,<br />

219 F.R.D. 387, 392 (E.D. Va. 2004)).<br />

147. 219 F.R.D. at 392-93.<br />

148. See Zeng Liu v. Donna Karan Int‟l, Inc., 207 F. Supp. 2d 191, 192 (S.D.N.Y.<br />

2002) (“In fact courts addressing the <strong>is</strong>sue <strong>of</strong> whether defendants should be allowed to


ARKANSASLAWREVIEW.ORG<br />

716 ARKANSAS LAW REVIEW [Vol. 63:691<br />

deterring a plaintiff from having her day in court by inquiring<br />

into a non-relevant matter such as her immigration status <strong>is</strong><br />

prec<strong>is</strong>ely the type <strong>of</strong> „oppression‟ Rule 26(c) was designed to<br />

prevent.” 149 Confidentiality agreements between the parties<br />

could not resolve the fear; there would still remain “the danger<br />

<strong>of</strong> intimidation” <strong>and</strong> “the danger <strong>of</strong> destroying the cause <strong>of</strong><br />

action” that could inhibit plaintiffs in pursuing their rights. 150<br />

Even should the immigration information be relevant, “the r<strong>is</strong>k<br />

<strong>of</strong> injury to the plaintiffs if such information were d<strong>is</strong>closed<br />

outweighs the need for its d<strong>is</strong>closure.” 151 So courts regularly<br />

<strong>and</strong> cons<strong>is</strong>tently have recognized that immigration-related legal<br />

harm <strong>is</strong> serious enough to merit a court remedy.<br />

Immigrant judicial-review cases are the Fifth Amendment<br />

flip side <strong>of</strong> these immigrant labor-law cases. In judicial-review<br />

cases, immigrants must first confess immigration violations <strong>and</strong><br />

thereafter seek to keep their names confidential. In labor-law<br />

cases, immigrants must first give their own names <strong>and</strong> thereafter<br />

seek to keep immigration status confidential. In judicial-review<br />

cases, the name <strong>is</strong> only marginally relevant. 152 In labor-law<br />

cases, immigration status <strong>is</strong> marginally relevant. 153 But put the<br />

d<strong>is</strong>cover plaintiff-workers‟ immigration status in cases seeking unpaid wages brought<br />

under the FLSA have found such information to be und<strong>is</strong>coverable.”).<br />

149. Topo v. Dhir, 210 F.R.D. 76, 79 (S.D.N.Y. 2002). Compelling d<strong>is</strong>covery <strong>of</strong><br />

immigration information would result in a m<strong>is</strong>carriage <strong>of</strong> justice. Flores, 2002 WL<br />

1163623, at *4.<br />

150. Zeng Liu, 207 F. Supp. 2d at 193.<br />

151. Id. at 192-93; see also Flores, 2002 WL 1163623, at *6 (holding that<br />

immigration harm outweighed any harm the defendant claimed to be exposed to as a result<br />

<strong>of</strong> the pseudonym use).<br />

152. So say some judges, anyway. See <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp.,<br />

214 F.3d 1058, 1068-69 (9th Cir. 2000); Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477,<br />

513 (M.D. Pa. 2007). Pseudonym dec<strong>is</strong>ions are all over the map on the relevancy <strong>of</strong> the<br />

plaintiff‟s name <strong>and</strong> the seriousness <strong>of</strong> a plaintiff‟s right <strong>of</strong> access to the courts to redress<br />

wrongs. Steinman, supra note 10, at 20, 43-85.<br />

153. Unlike their pseudonym counterparts, labor-law cases are cons<strong>is</strong>tent in declaring<br />

immigration status to be <strong>of</strong> marginal importance compared to a plaintiff‟s right to have her<br />

day in court. See generally In re Reyes, 814 F.2d 168 (5th Cir. 1987); Baca v. Brother‟s<br />

Fried Chicken, No. 09-3134-MLCF-SS, 2009 U.S. D<strong>is</strong>t. LEXIS 42306 (E.D. La. 2009);<br />

Avila-Blum v. Casa de Cambio Delgado, Inc., 236 F.R.D. 190 (S.D.N.Y. 2006); Zavala v.<br />

Wal-Mart Stores, Inc., 393 F. Supp. 2d 295 (D.N.J. 2005); Flores v. Albertsons, Inc., No.<br />

CV0100515AHM (SHX), 2002 WL 1113023 (C.D. Cal. 2002); Topo v. Dhiv, 210 F.R.D.<br />

76 (S.D.N.Y. 2002); Zeng Liu v. Donna Karan Int‟l, Inc., 207 F. Supp. 2d 191 (S.D.N.Y.<br />

2002); but see Romero-Hern<strong>and</strong>ez v. Alex<strong>and</strong>er, No. 3:08CV93-M-A, 2009 WL 1809484<br />

(N.D. M<strong>is</strong>s. June 24, 2009) (where the plaintiff had to reveal some immigration-related<br />

information to prove a right to back pay).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 717<br />

name <strong>and</strong> immigration status together <strong>and</strong> defendants can<br />

always terrorize plaintiffs away from bringing their legitimate<br />

claims. D<strong>is</strong>closing both the crime <strong>and</strong> the name threatens arrest,<br />

jail, property loss, <strong>and</strong> the loss <strong>of</strong> “plaintiffs‟ basic rights to<br />

shelter, education <strong>and</strong> a livelihood through deportation.” 154 The<br />

constitutional injury <strong>is</strong> even stronger in left-end cases where the<br />

dem<strong>and</strong>er, receiver, <strong>and</strong> user <strong>of</strong> the court-ordered selfincriminating<br />

information <strong>is</strong> a government.<br />

Immigration-related legal harm <strong>is</strong> serious harm, as <strong>is</strong> the<br />

harm from the forced waiver <strong>of</strong> Fifth Amendment protections.<br />

These harms scare away potential plaintiffs. In left-end cases,<br />

courts have allowed pseudonyms for immigrants seeking access<br />

to courts <strong>and</strong> protection from self-incrimination. 155 There <strong>is</strong> no<br />

legal justification for ignoring or d<strong>is</strong>counting immigrationrelated<br />

legal harm.<br />

f. Summary: The Call for a Bright Line Rule<br />

Therefore, new pseudonym rules should communicate the<br />

constitutional foundation <strong>of</strong> the left end <strong>of</strong> the continuum, <strong>and</strong><br />

should nail down the left end <strong>of</strong> the continuum with the type <strong>of</strong><br />

case in which pseudonyms may always be used, namely (1)<br />

declaratory judgment cases (2) challenging the constitutionality<br />

<strong>of</strong> a statute, law, or ordinance (3) where pro<strong>of</strong> <strong>of</strong> st<strong>and</strong>ing<br />

requires the plaintiffs to plead facts to the verge <strong>of</strong> selfincrimination—the<br />

only facts lacking being the plaintiffs‟<br />

names.<br />

3. The Middle: Justice, Privacy, <strong>and</strong> Access to Courts<br />

Between the default rule where parties may never use<br />

pseudonyms <strong>and</strong> the bright-line rule where plaintiffs may always<br />

use pseudonyms <strong>is</strong> the middle territory where judges must use<br />

their d<strong>is</strong>cretion.<br />

154. 496 F. Supp. 2d at 507.<br />

155. Plyler v. <strong>Doe</strong>, 457 U.S. 202, 205 (1982) (holding undocumented children could<br />

use pseudonyms when challenging a Texas law that denied them a public education); <strong>Doe</strong>s<br />

I thru XXIII, 214 F.3d at 1062-63 (where Chinese immigrant workers sued their employer);<br />

Lozano, 496 F. Supp. 2d at 508 (where undocumented immigrants challenged city laws<br />

targeting them); <strong>Doe</strong> v. Miller, 573 F. Supp. 461, 464 & n.1 (N.D. Ill. 1983) (allowing an<br />

undocumented mother to use a pseudonym when she had to confess her illegal status to get<br />

aid for her eligible children).


ARKANSASLAWREVIEW.ORG<br />

718 ARKANSAS LAW REVIEW [Vol. 63:691<br />

Court rules should guide th<strong>is</strong> d<strong>is</strong>cretion. Where<br />

pseudonym use hinges on the d<strong>is</strong>positions <strong>of</strong> individual judges,<br />

dec<strong>is</strong>ions will be arbitrary. The emerging practice seems to<br />

require judges to weigh a l<strong>is</strong>t <strong>of</strong> harms on both sides, although<br />

past dec<strong>is</strong>ions have <strong>of</strong>fered little or no guidance as to how to do<br />

so. 156<br />

New pseudonym rules should make it clear that cases do<br />

not move away from the default requirement to use one‟s own<br />

name unless a competing constitutional protection requires it.<br />

Any one <strong>of</strong> the following constitutional <strong>is</strong>sues should be<br />

sufficient to move a case into the middle:<br />

(1) The case must expose the petitioners‟ constitutionally<br />

protected privacy. 157<br />

(2) The case must expose the petitioners‟ privacy, albeit<br />

not constitutionally protected, <strong>and</strong> the petitioners must<br />

allege that proceeding under their own names would add<br />

such an extra r<strong>is</strong>k <strong>of</strong> privacy harm <strong>of</strong> the scale that the<br />

court would cease to be a tool for justice, thereby<br />

effectively denying the petitioners access to the court to<br />

redress wrongs. 158<br />

(3) The petitioners must allege that proceeding under their<br />

own names would add such an extra r<strong>is</strong>k <strong>of</strong> retaliation<br />

harm to their side <strong>of</strong> the scale that the court would cease to<br />

be a tool for justice, thereby effectively denying the<br />

petitioners access to the court to redress wrongs. 159<br />

(4) Any combination <strong>of</strong> the above three.<br />

New pseudonym rules will need to tackle the question <strong>of</strong><br />

burden <strong>of</strong> pro<strong>of</strong>. Formerly, when courts were reluctant to accept<br />

pseudonyms, they placed the burden on plaintiffs to overcome a<br />

“presumption <strong>of</strong> d<strong>is</strong>closure m<strong>and</strong>ated by procedural custom.” 160<br />

On the other h<strong>and</strong>, in the in terrorem labor-law cases, where the<br />

156. See <strong>Doe</strong> v. Hartford Life & Accident Ins. Co., 237 F.R.D. 545, 550 (D.N.J.<br />

2006); see also Rice, supra note 53, at 885.<br />

157. E.g., Lozano, 496 F. Supp. 2d at 542.<br />

158. E.g., <strong>Doe</strong> v. United Servs. Life Ins. Co., 123 F.R.D. 437, 439 (S.D.N.Y. 1988).<br />

159. E.g., <strong>Doe</strong> v. Stegall, 653 F.2d 180, 185 (5th Cir. 1981).<br />

160. Stegall, 653 F.2d at 185; see also Qualls v. Rumsfeld, 228 F.R.D. 8, 13<br />

(“[F]ederal courts operate openly by default <strong>and</strong> . . . a defendant facing a pseudonymous<br />

plaintiff need not come forward with reasons why th<strong>is</strong> default procedure should be<br />

followed.”).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 719<br />

desired information would subject plaintiffs to the r<strong>is</strong>k <strong>of</strong> injury,<br />

federal courts required those seeking d<strong>is</strong>covery <strong>of</strong> the<br />

information to demonstrate that their need outweighed the<br />

injuries caused by the d<strong>is</strong>closure. 161 Now, once the movants<br />

claim a constitutional justification that moves a case into the<br />

middle <strong>of</strong> the continuum, both parties find themselves on equal<br />

footing, <strong>and</strong> neither side has a presumed right that the other must<br />

overcome.<br />

Once a competing constitutional requirement moves a case<br />

into the middle part <strong>of</strong> the continuum, judges weigh the r<strong>is</strong>ks <strong>of</strong><br />

harm to all parties. The default rule ceases to be relevant. In<br />

other words, judges may not decide that the petitioners‟<br />

additional r<strong>is</strong>k <strong>of</strong> harm <strong>is</strong> insufficient to overcome the default<br />

rule against pseudonyms. Instead, judges must compare the<br />

articulated r<strong>is</strong>k <strong>of</strong> harm to the petitioner with the articulated r<strong>is</strong>k<br />

<strong>of</strong> harm to the opponents <strong>and</strong> the public <strong>and</strong> craft a solution that<br />

best protects all constitutional rights. 162<br />

a. Apples with Apples: Comparing R<strong>is</strong>k <strong>of</strong> Harm<br />

In order to properly weigh the interests <strong>of</strong> the two parties,<br />

judges must compare apples with apples. If new pseudonym<br />

rules <strong>of</strong> civil procedure allow a judge to place apples on the<br />

petitioner‟s side <strong>of</strong> the scale <strong>and</strong> oranges on the opponents‟ side,<br />

the judge <strong>is</strong> free to be arbitrary. New pseudonym rules should<br />

clearly define what the middle section measures <strong>and</strong> require that<br />

measurement be used for both sides.<br />

The best “apple” <strong>is</strong> r<strong>is</strong>k <strong>of</strong> harm. R<strong>is</strong>k <strong>is</strong> a well-understood<br />

quantitative concept, 163 illustrated by the following equation:<br />

r<strong>is</strong>k <strong>of</strong> harm = probability <strong>of</strong> harm × amount <strong>of</strong> harm<br />

Considering r<strong>is</strong>k <strong>of</strong> harm allows judges to d<strong>is</strong>count unlikely<br />

harm <strong>and</strong> more fully weigh harm that <strong>is</strong> likely. 164 For example,<br />

if the likelihood that the community will retaliate against the<br />

petitioner <strong>is</strong> only ten percent, a judge may reduce the feared<br />

161. See Zavala v. Wal-Mart Stores, Inc., 393 F. Supp. 2d 295, 325 (D.N.J. 2008)<br />

(d<strong>is</strong>cussing Fair Labor St<strong>and</strong>ards Act cases where employees sought to d<strong>is</strong>cover the<br />

plaintiffs‟ immigration status).<br />

162. See, e.g., James v. Jacobson, 6 F.3d 233, 241 (4th Cir. 1993).<br />

163. McLaughlin v. Williams, 801 F. Supp. 633, 639 (S.D. Fla. 1992) (defining r<strong>is</strong>k<br />

<strong>of</strong> harm with respect to medical procedures).<br />

164. See, e.g., <strong>Doe</strong> v. Hartz, 52 F. Supp. 2d 1027, 1047 (N.D. Iowa 1999).


ARKANSASLAWREVIEW.ORG<br />

720 ARKANSAS LAW REVIEW [Vol. 63:691<br />

retaliation harm by ninety percent. On the other h<strong>and</strong>, if a<br />

person <strong>is</strong> certain to lose employment, a judge can give that<br />

factor full weight.<br />

All parties should clearly l<strong>is</strong>t specific harm. The trial court<br />

in Day v. Sebelius properly ignored the plaintiffs‟ “vague,<br />

conclusory allegations.” 165 Th<strong>is</strong> requirement goes for both<br />

parties. Those opposing pseudonyms should state specifically<br />

how pseudonym use will harm them <strong>and</strong> the public. Claims that<br />

pseudonyms will harm the opponents‟ right to challenge<br />

st<strong>and</strong>ing <strong>and</strong> the public‟s right to open courts are too vague <strong>and</strong><br />

conclusory to be useful. 166 Opponents should explain the harm<br />

clearly.<br />

Orange words ruin the weighing process. Since judges<br />

should compare apples with apples, <strong>and</strong> since r<strong>is</strong>k <strong>of</strong> harm<br />

makes the best apple, orange words—factors not identifying a<br />

r<strong>is</strong>k <strong>of</strong> harm—throw an arbitrary value into the equation.<br />

Arbitrary values always negate any prior objectivity. Two plus<br />

two equals four, but two plus two plus an arbitrary number<br />

always equals an arbitrary number. A review <strong>of</strong> past<br />

pseudonym dec<strong>is</strong>ions shows judges using the following orange<br />

words to deny pseudonym use: considering harm only if “highly<br />

personal;” 167 considering harm only if <strong>of</strong> the “utmost<br />

intimacy;” 168 calling the use <strong>of</strong> fictitious names “d<strong>is</strong>favored;” 169<br />

stating pseudonym use <strong>is</strong> a “rare d<strong>is</strong>pensation” in “critical” or<br />

“unusual” cases; 170 d<strong>is</strong>cussing a “[c]ustomary <strong>and</strong><br />

constitutionally-embedded presumption <strong>of</strong> openness;” 171 <strong>and</strong><br />

allowing pseudonyms only where there <strong>is</strong> a “compelling<br />

justification.” 172<br />

165. 227 F.R.D. 668, 680 (D. Kan. 2005).<br />

166. For example, when pr<strong>is</strong>oner M.M. sued to be able to get an abortion, she wanted<br />

to use a pseudonym. M.M. v. Zavaras, 139 F.3d 798, 799-800, 803 (10th Cir. 1998).<br />

Without l<strong>is</strong>ting any specific harm to the defendant or the public, the judge wrote, “I find<br />

that whatever interest in privacy <strong>is</strong> claimed on behalf <strong>of</strong> the plaintiff, the numerous<br />

countervailing public interests clearly <strong>and</strong> dec<strong>is</strong>ively outweigh it.” Id. at 800 (quoting the<br />

d<strong>is</strong>trict court).<br />

167. <strong>Doe</strong> I v. Merten, 219 F.R.D. 387, 392 (E.D. Va. 2004).<br />

168. Id.<br />

169. <strong>Doe</strong> v. City <strong>of</strong> Chicago, 360 F.3d 667, 669 (7th Cir. 2004).<br />

170. Qualls v. Rumsfeld, 228 F.R.D. 8, 10 (D.D.C. 2005) (quoting James v.<br />

Jacobson, 6 F.3d 233, 238 (4th Cir. 1993))<br />

171. Sealed Plaintiff v. Sealed Defendant, 537 F.3d 185, 189 (2d Cir. 2008) (quoting<br />

Roe v. Aware Woman Ctr. For Choice, Inc., 253 F.3d 678, 685 (11th Cir. 2001)).<br />

172. Union Oil Co. v. Leavell, 220 F.3d 562, 568 (7th Cir. 2000).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 721<br />

New pseudonym rules should scrupulously screen orange<br />

words from the weighing process.<br />

b. R<strong>is</strong>k <strong>of</strong> Harm Makes the Best Apple<br />

R<strong>is</strong>k <strong>is</strong> a better term than fear, although fear actually seems<br />

to be the proper idea. After all, it <strong>is</strong> the petitioners‟ fear that<br />

opponents use to scare them away from the courts. However,<br />

fear <strong>is</strong> difficult to measure. Judges may arbitrarily allow or ban<br />

pseudonyms by claiming to see or d<strong>is</strong>believe pr<strong>of</strong>essions <strong>of</strong> fear.<br />

Measuring fear would cause petitioners to present evidence <strong>of</strong><br />

their personal feelings rather than the causes <strong>of</strong> those feelings.<br />

R<strong>is</strong>k <strong>is</strong> a sat<strong>is</strong>factory proxy for fear, for judges may legitimately<br />

decide that a person‟s fear <strong>is</strong> greater where the r<strong>is</strong>k <strong>of</strong> harm <strong>is</strong><br />

greater.<br />

R<strong>is</strong>k <strong>of</strong> harm <strong>is</strong> more logical than the r<strong>is</strong>k-threshold policy<br />

that some courts have used. These judges, rather than measure a<br />

r<strong>is</strong>k <strong>of</strong> harm, have rejected all harm completely if the probability<br />

fails to reach a certain threshold, such as “substantial evidence”<br />

that the harm will eventuate. A r<strong>is</strong>k-threshold judge would<br />

accept a ninety percent probability <strong>of</strong> a small harm, but ignore a<br />

ten percent probability <strong>of</strong> devastating harm, although both may<br />

equally frighten parties. So the r<strong>is</strong>k <strong>of</strong> harm makes a better<br />

measuring device than any r<strong>is</strong>k-threshold policy.<br />

It <strong>is</strong> inappropriate to ignore specific types <strong>of</strong> harm. As<br />

pseudonym rules evolved, when one court would recognize one<br />

type <strong>of</strong> harm, a lower court would assume the precedent denied<br />

all other types <strong>of</strong> harm. However, most recent cases have<br />

recognized all types <strong>of</strong> harm: physical, mental, economic, <strong>and</strong><br />

social. 173 There <strong>is</strong> little reason for rejecting r<strong>is</strong>k <strong>of</strong> normal<br />

harm. The students in Southern Method<strong>is</strong>t <strong>University</strong> Ass’n <strong>of</strong><br />

Women <strong>Law</strong> Students faced “no greater threat <strong>of</strong> retaliation than<br />

the typical plaintiff alleging Title VII violations.” 174 The trial<br />

court d<strong>is</strong>m<strong>is</strong>sed that harm, <strong>and</strong> the Fifth Circuit affirmed. 175<br />

173. E.g., James, 6 F.3d at 241 (emotional harm); <strong>Doe</strong> v. Frank, 951 F.2d 320, 324<br />

(11th Cir. 1992) (physical harm); <strong>Doe</strong> v. Sebelius, 227 F.R.D. 668, 677 (D. Kan. 2005)<br />

(social harm); contra Qualls, 228 F.R.D. at 12 (rejecting r<strong>is</strong>k <strong>of</strong> economic harm as a<br />

consideration when deciding pseudonym use).<br />

174. S. Method<strong>is</strong>t Univ. Asso‟n <strong>of</strong> Women <strong>Law</strong> Students v. Wynne <strong>and</strong> Jaffe, 599<br />

F.2d 707, 713 (5th Cir. 1979).<br />

175. Id.


ARKANSASLAWREVIEW.ORG<br />

722 ARKANSAS LAW REVIEW [Vol. 63:691<br />

However, if these harms routinely scare Title VII plaintiffs away<br />

from bringing their lawsuits, that seems little rationale for<br />

d<strong>is</strong>m<strong>is</strong>sing the harm. With a foundation <strong>of</strong> justice <strong>and</strong> the<br />

constitutional guarantee <strong>of</strong> access to courts, it makes the most<br />

sense to consider all types <strong>of</strong> harm.<br />

There <strong>is</strong> no legal or logical reason to ignore future harm or<br />

harm to loved ones. The Femedeer court rejected the plaintiff‟s<br />

pseudonym petition for lack <strong>of</strong> “real, imminent personal<br />

danger.” 176 Perhaps the court should have d<strong>is</strong>counted the harm<br />

for future uncertainty rather than weigh it as no harm at all. It<br />

seems unjustifiable to count as zero the r<strong>is</strong>k <strong>of</strong> harm to a<br />

petitioner‟s family members, as did the judge in Day v. Sebelius<br />

who wrote:<br />

The [petitioners‟] families are non-parties <strong>and</strong> might<br />

be considered “innocent.” However, th<strong>is</strong> <strong>is</strong> always the case<br />

when an undocumented alien files a lawsuit that does not<br />

also involve h<strong>is</strong> or her family members. The court declines<br />

to adopt in effect what would be a general rule protecting<br />

illegal immigration status <strong>of</strong> non-party family members. 177<br />

Similarly, the Ninth Circuit declared it an abuse <strong>of</strong> d<strong>is</strong>cretion for<br />

a judge to ignore the following: (1) r<strong>is</strong>k <strong>of</strong> retaliation by parties<br />

not before the court; (2) r<strong>is</strong>k <strong>of</strong> economic harm; (3) harm from<br />

petitioner‟s vulnerability to retaliation; <strong>and</strong> (4) whether the<br />

public interest was served by the petitioner‟s d<strong>is</strong>closure. 178<br />

It <strong>is</strong> valid to consider the reliability <strong>of</strong> the evidence <strong>of</strong> fear.<br />

A plaintiff may use newspaper clippings to justify fear <strong>of</strong><br />

community retaliation. 179 Although the rules <strong>of</strong> evidence may<br />

not necessarily apply in these circumstances, it <strong>is</strong> certainly<br />

appropriate for a judge to weigh an asserted harm as zero if the<br />

judge doubts the harm ex<strong>is</strong>ts. For example, the court in Qualls<br />

ignored harm asserted through only hearsay evidence. 180<br />

176. Femedeer v. Haun, 227 F.3d 1244, 1246 (10th Cir. 2000).<br />

177. 227 F.R.D. at 680.<br />

178. <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp., 214 F.3d 1058, 1069 (9th Cir.<br />

2000).<br />

179. <strong>Doe</strong> v. Stegall, 653 F.2d 180, 182 n.6 (5th Cir. 1981) (noting evidence <strong>of</strong> public<br />

outrage over a lawsuit to stop school prayer).<br />

180. Qualls v. Rumsfeld, 228 F.R.D. 8, 12 (D.D.C. 2005).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 723<br />

c. St<strong>and</strong>ing Harm May Be Great or Small<br />

Inability to challenge st<strong>and</strong>ing <strong>is</strong> a harm defendants<br />

commonly claim. Challenging st<strong>and</strong>ing <strong>is</strong> an important tool on<br />

a defendant‟s tool belt, <strong>and</strong> any harm to that tool <strong>is</strong> great harm.<br />

Judges can protect defendants—as well as save time—by fully<br />

considering all st<strong>and</strong>ing <strong>is</strong>sues along with the pseudonym <strong>is</strong>sue.<br />

In tort cases, a defendant may need to know the plaintiff‟s<br />

identity in order to properly defend against the claim. In these<br />

cases, if r<strong>is</strong>k <strong>of</strong> harm to the plaintiff <strong>is</strong> low, it would be proper to<br />

deny her a pseudonym. However, if r<strong>is</strong>k <strong>of</strong> harm to the plaintiff<br />

<strong>is</strong> high, the court could protect both parties by informing the<br />

defendant <strong>of</strong> the plaintiff‟s identity, but protecting the plaintiff<br />

via protective orders, sealed or redacted documents, pseudonym<br />

use, or any combination there<strong>of</strong>.<br />

In federal labor-law cases, where the protected information<br />

<strong>is</strong> relevant only for st<strong>and</strong>ing (<strong>and</strong> other collateral <strong>is</strong>sues) <strong>and</strong> not<br />

for the merits <strong>of</strong> the cases, dec<strong>is</strong>ions have cons<strong>is</strong>tently found<br />

such harm to be small. 181 In the same way, where a petitioner‟s<br />

name <strong>is</strong> relevant only for collateral purposes <strong>and</strong> irrelevant to<br />

the merits <strong>of</strong> the case, r<strong>is</strong>k <strong>of</strong> harm to the party‟s collateral <strong>is</strong>sue<br />

<strong>is</strong> small harm <strong>and</strong> should not trump the constitutional <strong>is</strong>sues that<br />

call for pseudonym use.<br />

In left-end cases d<strong>is</strong>cussed above, 182 the plaintiff‟s name <strong>is</strong><br />

never relevant to the merits <strong>of</strong> the constitutional challenge. In<br />

such cases, any r<strong>is</strong>k <strong>of</strong> harm to the defendant‟s ability to<br />

challenge st<strong>and</strong>ing (or to any other collateral <strong>is</strong>sue), will never<br />

trump the three constitutional foundations on the left end <strong>of</strong> the<br />

continuum. Left-end cases may likely have no pseudonym<br />

hearing, so if there <strong>is</strong> any st<strong>and</strong>ing challenge later, the judge<br />

should allow the defendant such other remedies as are<br />

reasonably necessary to mitigate any harm the defendant <strong>and</strong> the<br />

public might suffer.<br />

d. Summary: In the Middle Section <strong>of</strong> the Continuum,<br />

Judges Weigh Harm to Constitutional Rights<br />

New pseudonym rules should contain the following<br />

concerning the weighing process: (1) cases should require a<br />

181. See, e.g., Advanced Textile Corp., 214 F.3d at 1070.<br />

182. See d<strong>is</strong>cussion supra Part IV.A.2.f.


ARKANSASLAWREVIEW.ORG<br />

724 ARKANSAS LAW REVIEW [Vol. 63:691<br />

party to use its own name unless a competing constitutional right<br />

requires otherw<strong>is</strong>e; (2) the rules should require judges to<br />

compare the r<strong>is</strong>k <strong>of</strong> harm to each party when one party seeks to<br />

use a pseudonym; (3) r<strong>is</strong>k <strong>of</strong> harm = probability <strong>of</strong> harm ×<br />

amount <strong>of</strong> harm; (4) pseudonym rules should avoid subjective<br />

orange words that would change guided objective d<strong>is</strong>cretion into<br />

arbitrary dec<strong>is</strong>ions; (5) judges should consider r<strong>is</strong>k <strong>of</strong> all types<br />

<strong>of</strong> harm, however d<strong>is</strong>tant or improbable, including r<strong>is</strong>k <strong>of</strong> harm<br />

to the petitioners‟ community; <strong>and</strong> (6) judges could—<strong>and</strong><br />

perhaps should—h<strong>and</strong>le st<strong>and</strong>ing <strong>is</strong>sues at the same time as<br />

h<strong>and</strong>ling pseudonym <strong>is</strong>sues.<br />

B. The Weighing Process: Judges Weigh Specific Factors<br />

<strong>and</strong> Exerc<strong>is</strong>e D<strong>is</strong>cretion<br />

The weighing process in the middle section <strong>of</strong> the<br />

continuum seems to call for the following steps.<br />

Step 1. Weigh the r<strong>is</strong>k <strong>of</strong> harm to each party <strong>and</strong> the<br />

public.<br />

Step 2. Compare the r<strong>is</strong>k <strong>of</strong> harm to the petitioner with the<br />

r<strong>is</strong>k <strong>of</strong> harm to the opponent <strong>and</strong> the public.<br />

Step 3. Decide on pseudonym use.<br />

a. If the r<strong>is</strong>k <strong>of</strong> harm for the petitioners <strong>is</strong> greater than<br />

the r<strong>is</strong>k <strong>of</strong> harm to the opponents <strong>and</strong> the public, grant the use <strong>of</strong><br />

pseudonyms.<br />

b. If the reverse, deny the use <strong>of</strong> pseudonyms.<br />

Step 4. As much as possible, design protections for the<br />

losing parties to mitigate the r<strong>is</strong>k <strong>of</strong> harm to their constitutional<br />

rights.<br />

Some courts have adopted weighing factors in order to help<br />

determine when pseudonym use <strong>is</strong> appropriate. Some <strong>of</strong> these<br />

factors are l<strong>is</strong>ted below.<br />

Factor 1. R<strong>is</strong>k <strong>of</strong> harm from revealing legal names. The<br />

more severe the threat, the more reasonable the fear, the more<br />

likely the harm, <strong>and</strong> the more vulnerable the petitioners due to<br />

age or other attributes, the greater <strong>is</strong> the weight on the<br />

petitioners‟ side. 183<br />

183. See d<strong>is</strong>cussion supra Part II.B.2; see also Yacovelli v. Moeser, No. 1:02CV596,<br />

2004 WL 1144183, at *6-7 (M.D.N.C. May 20, 2004).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 725<br />

Factor 2. R<strong>is</strong>k <strong>of</strong> harm to petitioners or the public from<br />

plaintiffs’ ab<strong>and</strong>oning the case. The greater the harm to<br />

petitioners or the public should the petitioners ab<strong>and</strong>on the<br />

case—as when there are no named petitioners to continue the<br />

case—the greater <strong>is</strong> the weight on the petitioners‟ side. The type<br />

<strong>of</strong> harm in th<strong>is</strong> category ranges from the loss <strong>of</strong> small tort<br />

awards to the loss <strong>of</strong> constitutional protections for millions <strong>of</strong><br />

people. 184 Judges should consider the r<strong>is</strong>k <strong>of</strong> harm to others<br />

targeted by improper laws. Constitutional harm, like the loss <strong>of</strong><br />

constitutionally guaranteed access to courts, <strong>is</strong> always great<br />

harm. On the other h<strong>and</strong>, where the parties seeking to proceed<br />

pseudonymously are defendant-intervenors, the r<strong>is</strong>k to the public<br />

interest from denying the pseudonym <strong>is</strong> slight, as the remaining<br />

parties in the lawsuit can continue to protect the intervenors‟<br />

interests.<br />

Here, count r<strong>is</strong>k <strong>of</strong> harm to the public <strong>and</strong> innocent third<br />

parties 185 should the petitioners drop their case. The public may<br />

want an important <strong>is</strong>sue litigated <strong>and</strong> may care little about the<br />

petitioners‟ names. For example, the plaintiff in an early<br />

challenge to abortion laws 186 <strong>is</strong> more likely to interest the public<br />

(<strong>and</strong> thus gain the right to use a pseudonym) than a later plaintiff<br />

litigating a narrower individual claim. 187<br />

Factor 3. The petitioners’ harm has been or can be<br />

mitigated. The more the petitioners have kept their names<br />

confidential, the more costly or broadly tailored alternative<br />

solutions are, the greater <strong>is</strong> the weight on the petitioners‟ side.<br />

Th<strong>is</strong> <strong>is</strong>sue d<strong>is</strong>counts the r<strong>is</strong>k <strong>of</strong> harm from the previous two<br />

factors. If the public <strong>and</strong> other parties already know the<br />

litigants‟ own names, there <strong>is</strong> little extra harm from using those<br />

names on court documents.<br />

For example, where the identities <strong>of</strong> a sex <strong>of</strong>fender <strong>and</strong><br />

child-pornography convict were on unsealed public records <strong>and</strong><br />

were already identified on a web site, <strong>and</strong> where a pr<strong>is</strong>onerplaintiff<br />

had already used h<strong>is</strong> own name on all court<br />

184. See Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477, 507 (M.D. Pa. 2007).<br />

185. James v. Jacobson, 6 F.3d 233, 238 (4th Cir. 1993) (finding that r<strong>is</strong>ks from<br />

identifying the parties to that case caused “even more critical” harm to innocent<br />

nonparties).<br />

186. E.g., Roe v. Wade, 410 U.S. 113 (1973).<br />

187. E.g., M.M. v. Zavaras, 139 F.3d 798 (10th Cir. 1998).


ARKANSASLAWREVIEW.ORG<br />

726 ARKANSAS LAW REVIEW [Vol. 63:691<br />

documents, 188 there was little advantage in granting<br />

pseudonymity. 189 Similarly, where undocumented immigrants<br />

have kept their identities strictly confidential, pseudonym use<br />

avoided significant legal harm, but where the undocumented<br />

immigrants have already admitted illegal status in applications<br />

with immigration authorities, judges saw little extra harm from<br />

requiring plaintiffs to use their own names. 190<br />

Factor 4. Prejudice to the opponent. The less purely legal<br />

the case <strong>is</strong>, the more contested the facts are, the more relevant<br />

the name <strong>is</strong> to the merits <strong>of</strong> the case; 191 <strong>and</strong> the more important<br />

the reliability <strong>of</strong> the petitioners‟ testimonies, the greater <strong>is</strong> the<br />

weight on the opponents‟ side. Judges should measure any r<strong>is</strong>k<br />

<strong>of</strong> unfairness to the opponents caused by pseudonym use. 192 In<br />

tort cases, it may be difficult to justify allowing reputational<br />

harm to the defendant for being sued, while allowing the<br />

plaintiff to avoid reputational harm through pseudonym use. 193<br />

Defendants have claimed to be d<strong>is</strong>advantaged in their ability to<br />

make st<strong>and</strong>ing challenges, res judicata, jur<strong>is</strong>diction challenges,<br />

<strong>and</strong> to litigate other collateral <strong>is</strong>sues. 194 For example in one<br />

case, when undocumented students sought to enter a university<br />

in spite <strong>of</strong> a law denying them access, a grant <strong>of</strong> pseudonyms<br />

would have cost the university-defendant the ability to<br />

188. Daly v. Fed. Bureau <strong>of</strong> Pr<strong>is</strong>ons, No. 09CV01722 BNB, 2009 U.S. D<strong>is</strong>t. LEXIS<br />

66450, at *4 (D. Colo. July 21, 2009).<br />

189. United States v. Stoterau, 524 F.3d 988, 1013 (9th Cir. 2008); Femedeer v.<br />

Haun, 227 F.3d 1244, 1246 (10th Cir. 2000).<br />

190. Compare Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477, 507 (M.D. Pa.<br />

2007), <strong>and</strong> <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp., 214 F.3d 1058, 1069 n.11 (9th<br />

Cir. 2000), with Day v. Sebelius, 227 F.R.D. 668, 680 (D. Kan. 2005), <strong>and</strong> <strong>Doe</strong> I v.<br />

Merten, 219 F.R.D. 387, 393 (E.D. Va. 2004). The author believes th<strong>is</strong> last conclusion to<br />

be m<strong>is</strong>taken. The r<strong>is</strong>k <strong>of</strong> harm may actually be greater for undocumented immigrants with<br />

pending immigration applications. First, since the process can take many years, the<br />

petitioners may have entered the United States without inspection since filing the<br />

application. If so, it <strong>is</strong> likely that the application does not reveal any illegal status. Second,<br />

because immigration authorities have significant d<strong>is</strong>cretion, they may decide that an<br />

applicant‟s challenge <strong>of</strong> a United States law makes him unfit for a v<strong>is</strong>a, invalidating a<br />

frustrating fifteen-year wait <strong>and</strong> thous<strong>and</strong>s <strong>of</strong> dollars spent. Attorneys for plaintiffs who<br />

are already v<strong>is</strong>a petitioners should make sure courts underst<strong>and</strong> th<strong>is</strong> high r<strong>is</strong>k.<br />

191. Sealed Plaintiff v. Sealed Defendant, 537 F.3d 185, 190 (2d Cir. 2008).<br />

192. Yacovelli v. Moeser, No. 1:02CV596, 2004 WL 1144183, at *6 (M.D.N.C. May<br />

20, 2004).<br />

193. See S. Method<strong>is</strong>t Univ. Ass‟n <strong>of</strong> Women <strong>Law</strong> Students v. Wynne & Jaffe, 599<br />

F.2d 707, 713 (5th Cir. 1979).<br />

194. See generally Steinman, supra note 10.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 727<br />

determine whether it had applied the law to bar the students. 195<br />

However, where the identity was relevant only for the <strong>is</strong>sue <strong>of</strong><br />

st<strong>and</strong>ing, or where the defendant <strong>of</strong>fered no evidence <strong>of</strong> how the<br />

pseudonym would prejudice him, the weight favored<br />

pseudonyms. 196<br />

Factor 5. Harm to the public if it cannot d<strong>is</strong>cover the real<br />

names. The more renowned the plaintiff <strong>is</strong>, 197 the more the case<br />

<strong>is</strong> unique where the plaintiff <strong>is</strong> not just part <strong>of</strong> a larger group, the<br />

more the public interest lies in facts compared to the legal<br />

<strong>is</strong>sues, 198 the more universally the public wants to know the<br />

plaintiff‟s identity, 199 the greater <strong>is</strong> the weight on the opponents‟<br />

side.<br />

There <strong>is</strong> legitimate room for d<strong>is</strong>agreement about the harm<br />

the public might suffer should the petitioner use a pseudonym.<br />

Some judges, but not all, see any injury to the First Amendment<br />

right as extreme harm. 200 A few judges refer to th<strong>is</strong> as the “open<br />

courts” doctrine <strong>and</strong> defend it strongly. 201 However, that<br />

extreme weight—<strong>and</strong> perhaps the phrase open courts itself—<br />

may be inappropriate, as th<strong>is</strong> quote explains:<br />

195. See <strong>Doe</strong> I v. Merten, 219 F.R.D. 387, 394 (E.D. Va. 2004).<br />

196. See Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477, 512 (M.D. Pa. 2007)<br />

(“While st<strong>and</strong>ing <strong>is</strong> a clear constitutional requirement, it <strong>is</strong> also a preliminary question <strong>and</strong><br />

one we find we can answer for the anonymous plaintiffs without d<strong>is</strong>covery <strong>of</strong> their<br />

identities.”); <strong>Doe</strong> v. Hartford Life & Accident Ins. Co., 237 F.R.D. 545, 557 (D.N.J. 2006)<br />

(“[O]pposing counsel does not object to Plaintiff‟s proceeding under a pseudonym <strong>and</strong><br />

<strong>of</strong>fers no evidence that doing so would in any way prejudice [it] . . . since the parties are<br />

well aware <strong>of</strong> Plaintiff‟s identity.”).<br />

197. See Hartford Life, 237 F.R.D. at 549 (including among other relevant factors<br />

“whether, because <strong>of</strong> the subject matter <strong>of</strong> the litigation, the status <strong>of</strong> the litigant as a public<br />

figure, or otherw<strong>is</strong>e, there <strong>is</strong> a particularly strong interest in knowing the litigant‟s<br />

identities, beyond the public‟s interest which <strong>is</strong> normally obtained”) (quoting <strong>Doe</strong> v.<br />

Provident Life & Accident Ins. Co., 176 F.R.D. 464, 468 (E.D. Pa. 1997)).<br />

198. See id. (including, among factors that would support pseudonym use, “whether<br />

because <strong>of</strong> the purely legal nature <strong>of</strong> the <strong>is</strong>sues presented or otherw<strong>is</strong>e, there <strong>is</strong> an<br />

atypically weak public interest in knowing the litigant‟s identities.”) (quoting Provident<br />

Life, 176 F.R.D. at 468).<br />

199. Id. at 550 (noting that a factor weighing against pseudonym use might be “the<br />

universal level <strong>of</strong> public interest in access to the identities <strong>of</strong> litigants”) (quoting Provident<br />

Life, 176 F.R.D. at 468).<br />

200. See Lozano, 496 F. Supp. 2d at 513 ( “[T]he public‟s interest in the identities <strong>of</strong><br />

the individual plaintiffs <strong>is</strong> not so strong as to justify the danger <strong>of</strong> d<strong>is</strong>closing the identity <strong>of</strong><br />

plaintiffs with a legitimate fear for the consequences <strong>of</strong> that d<strong>is</strong>closure.”).<br />

201. See Steinman, supra note 10, at 22 & n.98.


ARKANSASLAWREVIEW.ORG<br />

728 ARKANSAS LAW REVIEW [Vol. 63:691<br />

The public right to scrutinize governmental functioning <strong>is</strong><br />

not so completely impaired by a grant <strong>of</strong> anonymity to a<br />

party as it <strong>is</strong> by closure <strong>of</strong> the trial itself. Party anonymity<br />

does not obstruct the public‟s view <strong>of</strong> the <strong>is</strong>sues joined or<br />

the court‟s performance in resolving them. The assurance<br />

<strong>of</strong> fairness preserved by public presence at trial <strong>is</strong> not lost<br />

when one party‟s cause <strong>is</strong> pursued under a fictitious name.<br />

These crucial interests served by open trials are not<br />

inevitably comprom<strong>is</strong>ed by allowing a party to proceed<br />

anonymously. 202<br />

The Sedona Conference report, d<strong>is</strong>cussing entire documents but<br />

applicable to information on those documents, argues, “If the<br />

documents in question have little or no relation to the merits <strong>of</strong><br />

the case . . . the presumption <strong>of</strong> public access that ar<strong>is</strong>es from<br />

the mere fact that these have been filed with the court <strong>is</strong> quite<br />

weak.” 203 Pr<strong>of</strong>essor Steinman wrote:<br />

“Very early in the litigation the public will have relatively<br />

little interest in the litigants‟ names. Despite the fact that<br />

pleadings <strong>and</strong> other filings that identify the litigants are<br />

h<strong>is</strong>torically part <strong>of</strong> the public record, their accessibility,<br />

apart from any judicial dec<strong>is</strong>ion in the case, does not<br />

promote the [F]irst [A]mendment values <strong>and</strong> policy<br />

grounds that form the foundation <strong>of</strong> public rights <strong>of</strong><br />

access.” 204<br />

The public may have more interests in trial outcomes than<br />

in learning the petitioners‟ names. Privacy interests in particular<br />

circumstances are in the public interest. 205 The public has a<br />

legitimate interest in justice for all, <strong>and</strong> as such probably<br />

d<strong>is</strong>agrees with the court in <strong>Doe</strong> I v. Merten, which felt<br />

comfortable scaring away some plaintiffs because “even if the<br />

five plaintiffs at <strong>is</strong>sue here might be d<strong>is</strong>couraged from bringing<br />

th<strong>is</strong> suit if required to d<strong>is</strong>close their identities, at least one <strong>of</strong><br />

202. <strong>Doe</strong>s v. Stegall, 653 F.ed 180, 185 (5th Cir.). Past dec<strong>is</strong>ions use anonymously<br />

<strong>and</strong> pseudonymously interchangeably. The author recommends pseudonymously (using a<br />

fictitious name), because anonymous filings (those without a plaintiff name) clearly violate<br />

Rules 10(a) <strong>and</strong> 17(a).<br />

203. SEDONA GUIDELINES, supra note 8, at 17.<br />

204. Steinman, supra note 10, at 36 (citation omitted).<br />

205. E.g., M.M. v. Zavaras, 139 F.3d 798, 800 (10th Cir. 1998).


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 729<br />

these many eligible illegal aliens in Virginia would likely be<br />

willing to bring suit <strong>and</strong> reveal her identity.” 206<br />

So harm to the public <strong>is</strong> more complicated than an appeal<br />

to open courts might indicate. Accordingly, judges must<br />

compile a l<strong>is</strong>t <strong>of</strong> specific r<strong>is</strong>ks <strong>of</strong> harm to the public in order to<br />

measure th<strong>is</strong> factor.<br />

Factor 6. Difficulty in mitigating the harm to the<br />

opponents <strong>and</strong> the public. The more difficult or costly to<br />

mitigate any d<strong>is</strong>advantage to the opponents‟ case, the greater <strong>is</strong><br />

the weight on the opponents‟ side. Th<strong>is</strong> factor <strong>is</strong> the opponents‟<br />

version <strong>of</strong> factor 3. It functions to lower the harm identified in<br />

factors 4 <strong>and</strong> 5.<br />

Concurrently with h<strong>is</strong> motion to proceed pseudonymously,<br />

a petitioner can, <strong>and</strong> perhaps should, pr<strong>of</strong>fer remedies for any<br />

harm to the opponents or the public. In one case, the Fourth<br />

Circuit found an abuse <strong>of</strong> d<strong>is</strong>cretion where the trial court did not<br />

consider two such pr<strong>of</strong>fers. 207 In James v. Jacobson, a case<br />

against a doctor who used h<strong>is</strong> own sperm to fertilize a mother‟s<br />

eggs, the plaintiffs sought for their children‟s sakes to file<br />

pseudonymously but <strong>of</strong>fered in comprom<strong>is</strong>e to give their real<br />

names <strong>and</strong> allow open court testimony. To limit the r<strong>is</strong>k <strong>of</strong><br />

“sudden, unplanned revelation at [the] particular time in [the<br />

children‟s] lives while they [were] in particularly vulnerable preadolescence,”<br />

208 the court‟s order:<br />

“forbade d<strong>is</strong>closure by defendants . . . <strong>of</strong> any information<br />

that directly or indirectly identified plaintiffs or their<br />

children to any person unless that person first executed a<br />

non-d<strong>is</strong>closure agreement . . . .; required that all papers<br />

filed with the court or d<strong>is</strong>seminated to any person who had<br />

not executed a non-d<strong>is</strong>closure agreement should use<br />

the . . . pseudonym in reference to plaintiffs, <strong>and</strong> required<br />

that any document that identified plaintiffs or the children<br />

either directly or indirectly be filed under seal, with<br />

redacted copies to be placed in the public files; required<br />

defendants to d<strong>is</strong>close to plaintiffs‟ counsel all insurance<br />

company personnel to whom the plaintiffs‟ true identities<br />

had been or would be d<strong>is</strong>closed, <strong>and</strong> required plaintiffs in<br />

turn to d<strong>is</strong>close to defendants‟ counsel the names <strong>and</strong><br />

206. 219 F.R.D. 387, 396 (E.D. Va. 2003).<br />

207. James v. Jacobson, 6 F.3d 233, 242 (4th Cir. 1993).<br />

208. Id. at 241 (emphas<strong>is</strong> omitted).


ARKANSASLAWREVIEW.ORG<br />

730 ARKANSAS LAW REVIEW [Vol. 63:691<br />

addresses <strong>of</strong> all persons to whom plaintiffs had confided<br />

matters alleged in their pleadings; forbade defendants‟<br />

representatives during investigation to reveal, either<br />

directly or indirectly, the true identities <strong>of</strong> plaintiffs to any<br />

person unless the person first signed a non-d<strong>is</strong>closure<br />

agreement; required defendants to obtain leave from a<br />

designated mag<strong>is</strong>trate judge, on prior notice to plaintiffs, to<br />

contact any person thought to have relevant information<br />

about the case . . . allowed defendants to notice <strong>and</strong> depose<br />

witnesses using . . . pseudonyms . . . when the witnesses<br />

were unacquainted with plaintiffs, <strong>and</strong> using actual names<br />

when the witnesses . . . had knowledge <strong>of</strong> the matters<br />

alleged by plaintiffs . . . .” 209<br />

There <strong>is</strong> some question about whether court orders<br />

maintaining the confidentiality <strong>of</strong> immigrant petitioners would<br />

work to protect them. The Illegal Immigrant Reform <strong>and</strong><br />

Immigrant Responsibility Act <strong>of</strong> 1996 prevents any federal,<br />

state, or local governmental entity or <strong>of</strong>ficial (e.g., a court or<br />

judge) from prohibiting any government entity or <strong>of</strong>ficial (e.g., a<br />

government defendant <strong>and</strong> its attorney) from passing<br />

immigration information to immigration authorities. 210<br />

Presumably, th<strong>is</strong> statute eliminates some <strong>of</strong> the optional<br />

pseudonym comprom<strong>is</strong>es. 211 The application <strong>of</strong> th<strong>is</strong> statute to a<br />

court order has never been decided. 212 Whether th<strong>is</strong> statute <strong>is</strong><br />

209. Id. at 235-36.<br />

210. Illegal Immigrant Reform <strong>and</strong> Immigrant Responsibility Act <strong>of</strong> 1996, Pub. L.<br />

No. 104-208, § 642(a), 110 Stat. 3009, 3009-707 (1996) (codified at 8 U.S.C. § 1373(a)<br />

(2006)).<br />

211. See Merten, 219 F.R.D. at 394-95. The judge in <strong>Doe</strong> I v. Merten believed th<strong>is</strong><br />

statute cast doubt on the propriety <strong>of</strong> protective orders for immigrant plaintiffs. Id.<br />

212. While section 1373(a) <strong>of</strong> title 8 <strong>of</strong> the United States Code has never specifically<br />

been tested against a court order, there has been an occasion where a party has made the<br />

argument that a court <strong>is</strong> prohibited from <strong>is</strong>suing an order because <strong>of</strong> th<strong>is</strong> statute. See<br />

Lozano v. City <strong>of</strong> Hazleton, No. 07-3504538, at *19 (3d Cir. Sept. 9, 2010). In Lozano v.<br />

City <strong>of</strong> Hazleton, the appellant argued that “because the d<strong>is</strong>trict court <strong>is</strong> an entity <strong>of</strong> the<br />

federal government, it was prohibited by [8 U.S.C. § 1373(a)] from preventing [the<br />

appellant] from communicating with federal immigration authorities about „the citizenship<br />

or immigration status‟ <strong>of</strong> the <strong>Doe</strong> Plaintiffs.” Id. However, the court noted that although it<br />

was “not convinced that § 1373(a) does, or could, limit the inherent powers <strong>of</strong> the federal<br />

courts” in the way the appellant argued, it declined to reach that question because the<br />

appellant‟s argument failed on other grounds. Id.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 731<br />

constitutionally valid, 213 parties perhaps can achieve the same<br />

result through confidentiality agreements between the parties<br />

themselves.<br />

C. Some Factors Are Perhaps Not Useful in the<br />

Weighing Process<br />

Although most factors identified in past pseudonym<br />

dec<strong>is</strong>ions have been integrated into the six factors above, 214<br />

other factors may not be useful. The proposed rules that follow<br />

eliminate some factors from the weighing process for the<br />

reasons that follow. 215<br />

1. Government defendants<br />

Early pseudonym dec<strong>is</strong>ions showed an inclination to grant<br />

pseudonym use when the defendant was a government. 216<br />

Although th<strong>is</strong> sometimes shows up as a bias against government<br />

defendants, th<strong>is</strong> should not be the case. Most <strong>of</strong> those dec<strong>is</strong>ions<br />

that have found th<strong>is</strong> factor relevant were for declaratory<br />

judgments where the plaintiff had to plead facts to the edge <strong>of</strong><br />

self-incrimination. 217 Where the government <strong>is</strong> a defendant in a<br />

tort case, there <strong>is</strong> little reason for a rule to bias the government.<br />

Furthermore, the weighing process measures apples with apples.<br />

R<strong>is</strong>k <strong>of</strong> harm <strong>is</strong> an apple, but bias against a government<br />

defendant <strong>is</strong> not. Accordingly, th<strong>is</strong> factor appears only in the<br />

bright-line rule. 218 Otherw<strong>is</strong>e, government defendants should be<br />

allowed to plead the r<strong>is</strong>k <strong>of</strong> harm they could suffer like any other<br />

defendant.<br />

2. Improper Petitioner Motive<br />

Pr<strong>of</strong>essor Steinman l<strong>is</strong>ts, as one factor in the pseudonym<br />

analys<strong>is</strong>, the presence <strong>of</strong> an improper petitioner motive. 219 In<br />

213. It seems doubtful that Congress, or any state leg<strong>is</strong>lative branch for that matter,<br />

has the authority to dictate how any judicial branch operates.<br />

214. See d<strong>is</strong>cussion supra Part IV.A.3.d.<br />

215. See d<strong>is</strong>cussion supra Part IV.A.3.d.<br />

216. See supra note 104 <strong>and</strong> accompanying text.<br />

217. See d<strong>is</strong>cussion supra Part II.B.2.d.<br />

218. See d<strong>is</strong>cussion supra Part IV.A.2.<br />

219. Steinman, supra note 10, at 41.


ARKANSASLAWREVIEW.ORG<br />

732 ARKANSAS LAW REVIEW [Vol. 63:691<br />

Lozano v. City <strong>of</strong> Hazleton, it was not an improper purpose for<br />

undocumented immigrants to seek to avoid adverse immigration<br />

legal harm unrelated to the rights they sought to vindicate in the<br />

litigation. 220 Th<strong>is</strong> factor appears in the proposed rules as an<br />

absolute requirement, not as part <strong>of</strong> the weighing process.<br />

3. Improper Opponent Motive<br />

The proposed rules incorporate improper opponent<br />

motive 221 in two places. First, it appears in the bright-line<br />

rule. 222 The rule automatically grants the right to use<br />

pseudonyms when governments improperly seek to terrorize<br />

petitioners away from their constitutional access to the courts, or<br />

dem<strong>and</strong> that petitioners choose between court-ordered selfincrimination<br />

or a waiver <strong>of</strong> the constitutional right <strong>of</strong> access to<br />

the courts, or block a court‟s duty to review statutes, ordinances,<br />

<strong>and</strong> other laws.<br />

Second, the proposed rules recognize opponents‟ improper<br />

motive <strong>of</strong> intimidating petitioners away from their constitutional<br />

right <strong>of</strong> access to the courts by moving cases out <strong>of</strong> the default<br />

rule at the right end <strong>of</strong> the continuum into the middle section.<br />

There, the weighing process makes sure that the threatened harm<br />

does not unjustly prevent petitioners from having their day in<br />

court. Furthermore, th<strong>is</strong> factor <strong>is</strong> not an apple, <strong>and</strong> as such<br />

makes a poor addition to the weighing process. For any other<br />

improper motives opponents might have, it <strong>is</strong> hard to see why<br />

they should strengthen a petitioner‟s argument for pseudonym<br />

use.<br />

D. Abuse <strong>of</strong> D<strong>is</strong>cretion Dec<strong>is</strong>ions Shed Light on the<br />

Pseudonym Process<br />

The few abuse-<strong>of</strong>-d<strong>is</strong>cretion cases involving pseudonyms<br />

are useful for illustrating how courts might make pseudonym<br />

dec<strong>is</strong>ions. “[T]rial courts have no unreviewable license either to<br />

grant or deny [pseudonymity] on general principles;” they may<br />

only grant or deny pseudonymity “on the bas<strong>is</strong> <strong>of</strong> an informed<br />

220. Lozano v. City <strong>of</strong> Hazleton, 496 F. Supp. 2d 477, 513 (M.D. Pa. 2007).<br />

221. Steinman, supra note 10, at 42.<br />

222. See d<strong>is</strong>cussion supra Part IV.A.2.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 733<br />

d<strong>is</strong>cretion.” 223 Th<strong>is</strong> section l<strong>is</strong>ts the three types <strong>of</strong> abuse <strong>of</strong><br />

d<strong>is</strong>cretion <strong>and</strong> applies them to pseudonyms.<br />

First, an “obvious manifestation” <strong>of</strong> abuse <strong>of</strong> d<strong>is</strong>cretion <strong>is</strong><br />

the “failure or refusal, either express or implicit, actually to<br />

exerc<strong>is</strong>e d<strong>is</strong>cretion, deciding instead as if by general rule, or<br />

even arbitrarily, as if neither by rule nor d<strong>is</strong>cretion.” 224 The<br />

judge‟s statement in James that he thought party anonymity was<br />

simply not permitted 225 <strong>and</strong> the judge‟s failure to inquire into the<br />

circumstances <strong>of</strong> the case to determine whether the d<strong>is</strong>pensation<br />

was warranted were an abuse <strong>of</strong> d<strong>is</strong>cretion. 226 It was likew<strong>is</strong>e<br />

abuse <strong>of</strong> d<strong>is</strong>cretion in Sealed Plaintiff v. Sealed Defendant for<br />

the trial judge to assume that, without an express prov<strong>is</strong>ion in<br />

the state rape-shield law allowing pseudonyms, rules 10(a) <strong>and</strong><br />

17(a) <strong>of</strong> the Federal Rules <strong>of</strong> Civil Procedure controlled to<br />

forbid them. 227 To assure proper d<strong>is</strong>cretion, judges should state<br />

their reasons for whatever action they take. 228 The st<strong>and</strong>ard <strong>of</strong><br />

review for th<strong>is</strong> type <strong>of</strong> error <strong>is</strong> de novo. 229<br />

The second type <strong>of</strong> abuse <strong>of</strong> d<strong>is</strong>cretion happens where a<br />

judge does weigh the evidence, but fails to adequately “take into<br />

account judicially recognized factors.” 230 In James, ignoring<br />

pr<strong>of</strong>fers <strong>of</strong> comprom<strong>is</strong>e was evidence the court was not open to<br />

persuasion, <strong>and</strong> so did not exerc<strong>is</strong>e d<strong>is</strong>cretion. 231 The Ninth<br />

Circuit in <strong>Doe</strong>s I thru XXIII found that the trial court erred by:<br />

Failing to consider evidence <strong>of</strong> threatened retaliation by<br />

parties not before the court; concluding that r<strong>is</strong>ks <strong>of</strong><br />

extraordinary economic injury are insufficient as a matter<br />

<strong>of</strong> law to sat<strong>is</strong>fy plaintiffs‟ burden; failing to consider as a<br />

factor plaintiffs‟ vulnerability to retaliation; failing to<br />

identify specific prejudice to defendants; <strong>and</strong> failing to<br />

223. James v. Jacobson, 6 F.3d 233, 242 (4th Cir. 1993) (emphas<strong>is</strong> added).<br />

224. Id. at 239. A judge‟s “personal unwillingness” to allow pseudonyms was<br />

sufficient to prove abuse <strong>of</strong> d<strong>is</strong>cretion. Id. at 239-40.<br />

225. Id. at 239.<br />

226. Id. at 239, 241.<br />

227. See 537 F.3d 185, 187, 190 & n.3 (2d Cir. 2008).<br />

228. Cheit, supra note 7, at 270.<br />

229. <strong>Doe</strong> v. Hartford Life & Accident Ins. Co., 237 F.R.D. 545, 548 (D.N.J. 2006).<br />

230. James, 6 F.3d at 239.<br />

231. Id. at 241-42.


ARKANSASLAWREVIEW.ORG<br />

734 ARKANSAS LAW REVIEW [Vol. 63:691<br />

decide whether the public‟s interest was best served by<br />

requiring plaintiffs to reveal their identities. 232<br />

Where judges consider the wrong factors or ignore the right<br />

ones, the st<strong>and</strong>ard <strong>of</strong> review <strong>is</strong> de novo. 233<br />

The final type <strong>of</strong> abuse <strong>of</strong> d<strong>is</strong>cretion <strong>is</strong> where a judge‟s<br />

exerc<strong>is</strong>e <strong>of</strong> d<strong>is</strong>cretion <strong>is</strong> “flawed by erroneous factual or legal<br />

prem<strong>is</strong>es.” 234 The st<strong>and</strong>ard <strong>of</strong> review in th<strong>is</strong> case <strong>is</strong> abuse <strong>of</strong><br />

d<strong>is</strong>cretion. 235<br />

New pseudonym rules should clearly communicate the<br />

manner <strong>of</strong> informed d<strong>is</strong>cretion judges should exerc<strong>is</strong>e <strong>and</strong> the<br />

required written explanation <strong>of</strong> the judge‟s dec<strong>is</strong>ion. 236<br />

E. Summary <strong>of</strong> the Middle Portion <strong>of</strong> the Continuum<br />

Pseudonym dec<strong>is</strong>ions lie on a continuum from the default<br />

rule on the right to the Bright Line Rule on the left with the<br />

weighing process in the middle. The First Amendment right to<br />

access to the courts <strong>is</strong> the foundation for the default rule that all<br />

parties must use their own names. The bright-line rule <strong>is</strong><br />

founded on three strong constitutional m<strong>and</strong>ates: the right <strong>of</strong><br />

access to courts, the protection from self-incrimination, <strong>and</strong> the<br />

court‟s separation-<strong>of</strong>-powers responsibility to review<br />

constitutionally doubtful laws. In declaratory-judgment cases<br />

challenging the constitutionality <strong>of</strong> a law where pro<strong>of</strong> <strong>of</strong><br />

st<strong>and</strong>ing requires plaintiffs to plead facts to the verge <strong>of</strong> selfincrimination—the<br />

only fact m<strong>is</strong>sing being their names—<br />

plaintiffs should always be able to proceed pseudonymously.<br />

Cases move into the middle part <strong>of</strong> the continuum only<br />

when competing <strong>is</strong>sues <strong>of</strong> constitutionally protected privacy or<br />

constitutionally guaranteed access to courts ar<strong>is</strong>e. In these<br />

cases, judges plot a course that best protects all constitutional<br />

interests. Judges compare articulated r<strong>is</strong>ks <strong>of</strong> harm to all parties,<br />

including the public, to decide whether to allow pseudonyms.<br />

232. <strong>Doe</strong>s I thru XXIII v. Advanced Textile Corp., 214 F.3d 1058, 1069 (9th Cir.<br />

2000).<br />

233. See Hartford Life, 237 F.R.D. at 548 (explaining that a de novo st<strong>and</strong>ard <strong>of</strong><br />

review <strong>is</strong> applied for “interpretation <strong>and</strong> application <strong>of</strong> the applicable law”).<br />

234. James, 6 F.3d at 239.<br />

235. See Hartford Life, 237 F.R.D. at 548 (stating that an appellate court should<br />

“apply the abuse <strong>of</strong> d<strong>is</strong>cretion st<strong>and</strong>ard to [the trial judge‟s] factual analys<strong>is</strong> <strong>and</strong><br />

conclusions”).<br />

236. See Cheit, supra note 7, at 270.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 735<br />

After making the dec<strong>is</strong>ion, judges then make the necessary<br />

protective orders to mitigate any remaining harm.<br />

New court pseudonym rules should guide judges in their<br />

d<strong>is</strong>cretion. Abuse-<strong>of</strong>-d<strong>is</strong>cretion rules make sure that judges do<br />

exerc<strong>is</strong>e d<strong>is</strong>cretion, do follow the given guidelines, <strong>and</strong> do reach<br />

conclusions supported by the evidence.<br />

V. CONCLUSION<br />

Th<strong>is</strong> <strong>is</strong> a good time for any court to write rules for<br />

pseudonym use. The current federal <strong>and</strong> <strong>Arkansas</strong> Rules <strong>of</strong><br />

Civil Procedure <strong>of</strong>fer more confusion than clarification. Not<br />

only do legal practitioners need guidance, but the entire<br />

pseudonym process needs the solid ethical <strong>and</strong> legal foundation<br />

<strong>of</strong> justice <strong>and</strong> the constitution. That constitutional foundation<br />

cons<strong>is</strong>ts <strong>of</strong>: (1) The First Amendment right <strong>of</strong> the public to open<br />

courts; (2) federal <strong>and</strong> state constitutional rights <strong>of</strong> access to the<br />

courts to right wrongs; (3) Supreme Court-defined privacy<br />

rights; federal <strong>and</strong> state constitutional protections from enforced<br />

self-incrimination; <strong>and</strong> (4) the courts‟ duty to review laws for<br />

constitutionality.<br />

Dec<strong>is</strong>ions about pseudonym use fall somewhere on a<br />

continuum. At the right end <strong>is</strong> the default rule that, barring any<br />

conflicting constitutional claim, parties to lawsuits use their own<br />

names. At the left end <strong>of</strong> the continuum <strong>is</strong> the type <strong>of</strong> case that<br />

may always permit pseudonyms: (1) The case <strong>is</strong> for declaratory<br />

judgment; (2) challenging the constitutionality <strong>of</strong> a statute,<br />

ordinance or rule; <strong>and</strong> (3) pro<strong>of</strong> <strong>of</strong> st<strong>and</strong>ing requires plaintiffs to<br />

plead facts to the verge <strong>of</strong> self-incrimination—the only facts<br />

lacking being the plaintiffs‟ names.<br />

Between these two ends <strong>is</strong> middle ground where judges<br />

weigh the r<strong>is</strong>k <strong>of</strong> harm to all parties <strong>and</strong> chart a course to protect<br />

the competing constitutional interests. Past dec<strong>is</strong>ions have<br />

hammered out a series <strong>of</strong> weighted factors, although these<br />

dec<strong>is</strong>ions are by no means uniform. Th<strong>is</strong> article proposes six<br />

factors synthesizing all those introduced by other courts. A<br />

proposed set <strong>of</strong> rules for pseudonym use, <strong>of</strong>fered for preliminary<br />

d<strong>is</strong>cussion, follows in Appendix I.<br />

The cases presented in th<strong>is</strong> article are not binding precedent<br />

in <strong>Arkansas</strong>. They contain the thoughts <strong>of</strong> judges <strong>and</strong> justices


ARKANSASLAWREVIEW.ORG<br />

736 ARKANSAS LAW REVIEW [Vol. 63:691<br />

who have had the courage to tackle th<strong>is</strong> <strong>is</strong>sue without guidance.<br />

Writers <strong>of</strong> new pseudonym rules—<strong>and</strong> those attorneys who vote<br />

on those rules—will read these cases with an eye for w<strong>is</strong>dom<br />

<strong>and</strong> sound logic. When <strong>Arkansas</strong>‟s Civil Practices Committee<br />

concludes its work, may the final result be the best pseudonym<br />

rules in the country.


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 737<br />

APPENDIX I. SAMPLE COURT RULES FOR<br />

PSEUDONYM USE<br />

Proposed changes to <strong>Arkansas</strong> Rule <strong>of</strong> Civil Procedure 10.<br />

(a)(2). Parties desiring to use pseudonyms shall use the<br />

names <strong>John</strong> <strong>Doe</strong> or Jane <strong>Doe</strong> <strong>and</strong> shall proceed according to<br />

Rule 12(j).<br />

Proposed changes to <strong>Arkansas</strong> Rule <strong>of</strong> Civil Procedure 12.<br />

(j). Motion to Proceed Pseudonymously, or Motion to Object to<br />

Pseudonym Use.<br />

(1) Definitions.<br />

(i) Harm includes any type <strong>of</strong> injury, including physical,<br />

mental or economic harm from retaliation, harassment,<br />

ridicule, personal embarrassment, or legal consequences<br />

resulting from the use <strong>of</strong> or inability to use pseudonyms.<br />

(ii) Constitutional harm includes (a) limitations to the First<br />

Amendment right <strong>of</strong> access to court information, (b)<br />

exposure <strong>of</strong> constitutionally protected privacy, (c)<br />

obstacles to constitutionally guaranteed access to the<br />

courts, (d) erosion <strong>of</strong> the Fifth Amendment protection<br />

against self-incrimination, <strong>and</strong> (e) comprom<strong>is</strong>es <strong>of</strong> a<br />

court‟s responsibility to review laws for constitutionality.<br />

(iii) R<strong>is</strong>k <strong>of</strong> harm <strong>is</strong> the probability <strong>of</strong> harm multiplied by the<br />

amount <strong>of</strong> harm.<br />

(iv) Petitioners are the parties seeking to use pseudonyms.<br />

(v) Opponents are the parties opposing the use <strong>of</strong><br />

pseudonyms.<br />

(2) Procedural Rules.<br />

(i) Petitioners who believe they qualify to use pseudonyms<br />

under part (3) <strong>of</strong> th<strong>is</strong> rule shall file their court documents<br />

using pseudonyms according to Rule 10(a)(2).<br />

(ii) The use <strong>of</strong> a Rule 12(b)(6) Motion to D<strong>is</strong>m<strong>is</strong>s <strong>is</strong> not<br />

available to object to pseudonym use.<br />

(iii) The court shall consider the pseudonym <strong>is</strong>sue after<br />

either (a) the petitioners‟ Motion to Proceed<br />

Pseudonymously, or (b) the opponents‟ Objection to the<br />

Use <strong>of</strong> Pseudonyms, or (c) the court‟s sua sponte<br />

initiative.


ARKANSASLAWREVIEW.ORG<br />

738 ARKANSAS LAW REVIEW [Vol. 63:691<br />

(iv) The court shall allow information gathering, affidavits,<br />

testimony <strong>and</strong> all other evidence before making its<br />

dec<strong>is</strong>ion according to these rules.<br />

(v) The court shall use its d<strong>is</strong>cretion in weighing the factors<br />

in part (4) below <strong>and</strong> in making its dec<strong>is</strong>ion to allow or<br />

d<strong>is</strong>allow pseudonyms.<br />

(vi) The court shall <strong>is</strong>sue appropriate protective orders to<br />

mitigate any remaining harm to the constitutionally<br />

protected rights <strong>of</strong> all parties.<br />

(3) Qualifications for pseudonym use.<br />

(i) The default rule <strong>is</strong> that all parties must use their own<br />

names in court proceedings, unless the exceptions in<br />

(3)(ii) or (3)(iii) apply.<br />

(ii) Petitioners may proceed pseudonymously as a matter <strong>of</strong><br />

law if:<br />

(A) the case <strong>is</strong> for declaratory judgment;<br />

(B) the case challenges the constitutionality <strong>of</strong> a statute,<br />

ordinance or rule; <strong>and</strong><br />

(C) where pro<strong>of</strong> <strong>of</strong> st<strong>and</strong>ing requires the petitioners to<br />

plead facts to the verge <strong>of</strong> self-incrimination—the<br />

only facts remaining being the petitioners‟ names.<br />

(iii) Courts shall use their d<strong>is</strong>cretion as guided in part (4) <strong>of</strong><br />

th<strong>is</strong> rule to allow or d<strong>is</strong>allow pseudonyms in cases where<br />

petitioners, with no illegal or unjust ulterior motives:<br />

(A) R<strong>is</strong>k exposure <strong>of</strong> constitutionally protected privacy,<br />

or<br />

(B) R<strong>is</strong>k exposure <strong>of</strong> privacy not constitutionally<br />

protected, <strong>and</strong> allege that proceeding under their own<br />

names would add such a r<strong>is</strong>k <strong>of</strong> privacy harm that the<br />

court would cease to be a tool for justice, thereby<br />

effectively denying the petitioners access to the courts<br />

to redress wrongs.<br />

(C) Allege that proceeding under their own names would<br />

add such a r<strong>is</strong>k <strong>of</strong> retaliation harm that the court<br />

would cease to be a tool for justice, thereby effectively<br />

denying the petitioners access to the court to redress<br />

wrongs.<br />

(D) Any combination <strong>of</strong> the above three.<br />

(4) The weighing process. If the case qualifies under (3)(iii) <strong>of</strong><br />

th<strong>is</strong> rule, the court shall weigh specific r<strong>is</strong>k <strong>of</strong> harm to all


ARKANSASLAWREVIEW.ORG<br />

2010] PSEUDONYM USE IN AMERICAN COURTS 739<br />

parties. R<strong>is</strong>k <strong>of</strong> constitutional harm <strong>is</strong> always significant harm.<br />

If the r<strong>is</strong>k <strong>of</strong> harm to petitioners outweighs the r<strong>is</strong>k <strong>of</strong> harm to<br />

opponents <strong>and</strong> the public, then the court shall grant pseudonym<br />

use. Otherw<strong>is</strong>e the court shall deny pseudonym use. The court<br />

shall weigh the following factors:<br />

(i) Harm from revealing names. The more severe the threat,<br />

the more reasonable the fear, <strong>and</strong> the more vulnerable the<br />

petitioners due to age or other attributes, the greater <strong>is</strong><br />

weight on the petitioners‟ side.<br />

(ii) Harm from plaintiff ab<strong>and</strong>oning the case. The greater<br />

the harm to the petitioners or the public should the<br />

petitioners ab<strong>and</strong>on the case, the absence <strong>of</strong> other named<br />

parties remaining in the case who can promote the<br />

petitioners‟ interest, the greater <strong>is</strong> the weight on the<br />

petitioners‟ side.<br />

(iii) Mitigating petitioner harm. The more the petitioners<br />

have kept their names confidential, the more costly or<br />

broadly tailored alternative solutions are, the greater <strong>is</strong><br />

the weight on the petitioners‟ side.<br />

(iv) Importance <strong>of</strong> identity to the opponents. The less purely<br />

legal the case, the more contested the facts, the more<br />

relevant the petitioners‟ names are to the merits <strong>of</strong> the<br />

case, the more important the reliability <strong>of</strong> the petitioners‟<br />

testimonies, the greater <strong>is</strong> the weight on the opponents‟<br />

side.<br />

(v) Importance <strong>of</strong> identity to the public. The less the<br />

petitioners are merely representatives <strong>of</strong> a larger group,<br />

the more renowned the petitioners are, the more the<br />

public interest lies in facts as compared to the legal<br />

<strong>is</strong>sues, the more universally the public wants to know the<br />

petitioners‟ identities, the greater <strong>is</strong> the weight on the<br />

opponents‟ side.<br />

(vi) Mitigating opponent harm. The more difficult or costly<br />

to mitigate any d<strong>is</strong>advantage to the opponents‟ case, the<br />

greater the weight on the opponents‟ side.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!