Drammeh v. Uber Technologies Inc

CourtDistrict Court, W.D. Washington
DecidedSeptember 27, 2022
Docket2:21-cv-00202
StatusUnknown

This text of Drammeh v. Uber Technologies Inc (Drammeh v. Uber Technologies Inc) is published on Counsel Stack Legal Research, covering District Court, W.D. Washington primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Drammeh v. Uber Technologies Inc, (W.D. Wash. 2022).

Opinion

1 The Honorable Barbara J. Rothstein

5 IN THE UNITED STATES DISTRICT COURT 6 FOR THE WESTERN DISTRICT OF WASHINGTON 7 AT SEATTLE

8 DRAMMEH, et al.,

9 Plaintiffs,

10 Civil Action No. 2:21-cv-202-BJR v. 11

ORDER GRANTING DEFENDANTS’ 12 UBER TECHNOLOGIES INC., et al., MOTION FOR SUMMARY JUDGMENT

13 Defendants.

16 I. INTRODUCTION 17 Plaintiffs Amie Drammeh and Yusuoha Ceesay, representing the estate of Cherno Ceesay 18 19 (“Ceesay”) (collectively, “Plaintiffs”) filed this lawsuit against defendants Uber Technologies, Inc. 20 (“Uber”) and Rasier LLC1 (together, “Defendants”) alleging that Defendants’ negligence caused 21 the wrongful death of Ceesay, a driver for Uber who was killed by two passengers.2 Before the 22 23 1 Plaintiffs’ complaint describes Rasier as “a wholly owned subsidiary of Uber Technologies and . 24 . . the party that directly contracts with drivers.” Dkt. 1 ¶ 15. Neither party describes Rasier as 25 separate from Uber in any legally relevant way. 26 2 The two passengers have been charged but have not yet been tried. See Pl. Opp’n, Dkt. 123 at 7 (stating that they are “awaiting trial”). However, for purposes of this order, the Court will assume 27 the allegations against them are true. 1 Court is Defendants’ motion for summary judgment. Having reviewed the motion, the record of 2 the case, and the relevant legal authorities, the Court will grant Defendants’ motion. The reasoning 3 for the Court’s decision follows. 4 II. BACKGROUND 5 A. Ceesay’s Murder 6 On the evening of December 13, 2020, Ceesay responded, using Uber’s smartphone app, to 7 8 a call to pick up and ferry passengers in Issaquah, Washington. See Dkts. 129-1, 129-2. These 9 passengers were Olivia Bebic and Devin Wade (hereinafter, the “Assailants)—nonparties dismissed 10 from this action last year. Police Rpt., Dkt. 129-1 at PDF 4-7. The Assailants requested a ride 11 through the app, and Ceesay accepted it. Id. The app notified Ceesay of the pick-up location the 12 Assailants had entered. Id. Ceesay was found dead in his car minutes after he had at arrived at the 13 pick-up location. Id. at PDF 6. Ceesay’s car had crashed into a tree about 100 feet from the pick- 14 up location, and Ceesay had multiple stab wounds. Id. The Assailants had fled the scene. Id. 15 16 An Issaquah Police investigation concluded that the Assailants created a fake Uber account, 17 requested a ride, and murdered Ceesay in a botched carjacking. Id. at PDF 6-7. The allegedly fake 18 account was registered under the name “Stephanie Tylor.”3 Def. MSJ, Dkt. 93 at 8 n.4. Defendants 19 admit that this account was created and used to request a ride just before the attack on Ceesay. Id. 20 When the account was created, Uber verified that the phone number used to register was in the 21 account-holder’s possession (“SMS verification”) and verified that the account was attached to a 22 valid payment method. Id. The Assailants used a prepaid cell phone and a prepaid gift card, both 23 24 of which are anonymous in that they are not attached to a named account-holder. See Dkt. 129-13. 25 26 3 An account under Bebic’s name was created about two hours before the Tylor account was created. 27 Pl. Opp’n, Dkt. 123 at 5 n.16. 1 On the day after Ceesay’s murder, the Issaquah Police contacted Uber’s Law Enforcement 2 Response Team seeking information about Ceesay’s passengers, and Uber identified the Tylor 3 account as the last ride accepted by Ceesay. Pl. Opp’n, Dkt. 123 at 7 nn. 29-30. The police traced 4 the phone to the Assailants, who were arrested on December 15, 2020. Police Rpt., Dkt. 129-1 at 5 PDF 6-10; see also Dkt. 129-13. Based on interrogations and other information gathered about the 6 7 Assailants, the police concluded that the two “stabbed [Ceesay] to death in the course of trying to 8 steal his car.” Police Rpt., Dkt. 129-1 at PDF 4. 9 B. The Uber App 10 Uber’s ride-sharing service uses a smartphone app to connect available drivers with people 11 requesting rides. Def. MSJ, Dkt. 93 at 3-4. Riders must create an account in order to request a ride. 12 Id. at 4. Creating an account entails entering a name, email address, and cell phone number and 13 agreeing to various terms and conditions. Id. As noted above, Uber employs SMS verification to 14 confirm that someone is not attempting to create an account using a phone number that is not their 15 16 own. Id. When a rider uses a phone number to set up an account, a text message containing a code 17 is sent to that phone number, and the rider must then enter the code in the Uber app. Id. A particular 18 phone number may only be used for a single account, “which limits [a] person from creating 19 duplicate accounts.” Id. A particular rider is also prohibited from created multiple accounts using 20 different phone numbers. Id. 21 Uber uses an automated program called “Mastermind” to “assist in identifying potential risk 22 23 and fraud.” Id. at 5. Although the exact means of identifying fraud are proprietary and technical, 24 Uber states that Mastermind generally considers: (1) whether the account is similar to other 25 accounts that have been used for fraud; (2) whether the account is similar to other accounts that 26 have not yet been used for fraud but “show suspicious behavior or may be bots;” (3) “whether new 27 users have ‘Uber,’ ‘Support,’ or certain other words in their account names which are correlated 1 with fraud.” Id. The Mastermind analysis of the information entered by the new user may result 2 in them being prevented from creating an account. Id. 3 Drivers also must create an account in the driver version of the app. Id. Creating a driver 4 account entails more steps and more verification than a rider account. Drivers “(1) submit personal 5 identifying information; (2) upload copies of a valid driver’s, proof of insurance, and vehicle 6 7 registration; (3) pass a criminal background check (performed by a third-party) and a driving history 8 check; (4) pass an examination testing [their] knowledge of risk factors for crimes against drivers; 9 and (5) confirm their vehicle has passed a uniform vehicle safety inspection.” Id. at 5-6. 10 Defendants note that some of the training and testing that Uber drivers undergo relates to potential 11 risks to drivers’ safety. Id. at 6. 12 C. Uber’s Relationship with Drivers 13 The parties agree that, at least nominally, Uber drivers are independent contractors. Id. at 14 7; Dkt. 15 ¶ 2. Defendants describe Uber drivers as having “sole control of the means and manner 15 16 in which [they] provide[] transportation services and . . . complete discretion to determine the 17 manner in which to operate [their] business.” Def. MSJ, Dkt. 93 at 7. Drivers use their personal 18 vehicles and are solely responsible for maintenance and any physical safety measures they choose 19 to implement. Id. Defendants also state that drivers control the routes they take to a passenger’s 20 destination. Id. 21 Plaintiffs’ characterization of Uber’s business implies more control over drivers. Plaintiffs 22 23 note that drivers may only find customers through the Uber app, as Uber “forbids ‘street hails.’” 24 Pl. Opp’n, Dkt. 123 at 10. In controlling the digital interface between drivers and riders, Uber 25 controls and supplies “all information Drivers and Riders get about each other.” Id. (emphasis 26 removed). From a driver’s perspective, it appears that this information is limited to the passenger’s 27 provided name and pick-up location. Id. 1 Uber itself possesses some additional information about riders and uses this information to 2 “verify” their accounts. Id. at 13. This verification essentially amounts to ensuring the account is 3 not duplicative or obviously fraudulent and checking that the payment method is valid. Id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Anderson v. Liberty Lobby, Inc.
477 U.S. 242 (Supreme Court, 1986)
Evelyn Rosa v. Taser International, Inc.
684 F.3d 941 (Ninth Circuit, 2012)
Hansen v. Friend
824 P.2d 483 (Washington Supreme Court, 1992)
Lauritzen v. Lauritzen
874 P.2d 861 (Court of Appeals of Washington, 1994)
Hutchins v. 1001 Fourth Avenue Associates
802 P.2d 1360 (Washington Supreme Court, 1991)
United States v. JP Morgan Chase Bank Account
835 F.3d 1159 (Ninth Circuit, 2016)
Victoria Zetwick v. County of Yolo
850 F.3d 436 (Ninth Circuit, 2017)
Tae Kim v. Budget Rent A Car Systems, Inc.
15 P.3d 1283 (Washington Supreme Court, 2001)
Robb v. City of Seattle
295 P.3d 212 (Washington Supreme Court, 2013)
Washburn ex rel. Estate of Roznowski v. City of Federal Way
310 P.3d 1275 (Washington Supreme Court, 2013)
McKown v. Simon Property Group, Inc.
344 P.3d 661 (Washington Supreme Court, 2015)
Sourakli v. Kyriakos, Inc.
144 Wash. App. 501 (Court of Appeals of Washington, 2008)
Filco v. Amana Refrigeration, Inc.
709 F.2d 1257 (Ninth Circuit, 1983)

Cite This Page — Counsel Stack

Bluebook (online)
Drammeh v. Uber Technologies Inc, Counsel Stack Legal Research, https://law.counselstack.com/opinion/drammeh-v-uber-technologies-inc-wawd-2022.