Padmanabhan v. Healey

159 F. Supp. 3d 220, 2016 U.S. Dist. LEXIS 12204
CourtDistrict Court, D. Massachusetts
DecidedFebruary 2, 2016
DocketCivil Action No. 15-13297-NMG
StatusPublished
Cited by6 cases

This text of 159 F. Supp. 3d 220 (Padmanabhan v. Healey) is published on Counsel Stack Legal Research, covering District Court, D. Massachusetts primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Padmanabhan v. Healey, 159 F. Supp. 3d 220, 2016 U.S. Dist. LEXIS 12204 (D. Mass. 2016).

Opinion

[222]*222MEMORANDUM & ORDER

GORTON, United States District Judge

This case arises from allegations that defendants intentionally accessed a protected computer database in order to obtain information about plaintiffs patients and to accuse plaintiff falsely of Medicaid fraud.

Pending before the Court are defendants’ motion to dismiss the complaint and plaintiffs motion for sanctions. For the reasons that follow, defendants’ motion to dismiss will be allowed and plaintiffs motion for sanctions will be denied.

I. Background

The Court accepts as true the following allegations by plaintiff Bharanidharan Padmanabhan (“plaintiff’ or “Padmana-bhan”) for the purpose of resolving the motion to dismiss.

Plaintiff is a doctor and neurologist who lives and works in Massachusetts and has chosen to represent himself pro se. Plaintiff filed a criminal complaint against the former Director of the Massachusetts Office of Medicaid in March, 2013 and a second criminal complaint against defendant James Paikos (“Paikos”) in January, 2015 for aiding and abetting Medicaid fraud. The Massachusetts Attorney General apparently declined even to investigate those allegations.

In September, 2015, plaintiff filed a complaint against the following defendants: 1) Maura Healey (“Healey”), the Attorney General of the Commonwealth of Massachusetts, 2) Steven Hoffman (“Hoffman”), the Deputy Chief of the Medicaid Fraud Division at the Office of the Attorney General, 3) Chris Cecchini (“Cecchini”), an investigator at the Office of the Attorney General, 4) Adele Audet (“Audet”), the Assistant Director of the Drug Control Program at the Massachusetts Department of Public Health who oversees the Prescription Monitoring Program computer database (“the PMP database”), 5) Pai-kos, an investigator for the Massachusetts Executive Office of Health and Human Services (“the Massachusetts HHS”), 6) Loretta Kish Cooke (“Cooke”), an investigator who works alongside Paikos at the Massachusetts HHS, 7) Jane Doe, an unidentified female agent of the Office of the Attorney General or the Massachusetts State Police and 8) other unidentified defendants.

The complaint asserts that 1) defendants unlawfully accessed the protected PMP database in April, 2015 to obtain a list of 16 patients who were treated by plaintiff and who received Medicaid benefits, 2) Healey falsely and maliciously accused him of violating the Social Security Act and committing Medicaid fraud, 3) Healey improperly sought access to the unredacted medical records of the 16 patients and 4) Healey sent Cecchini and Jane Doe to his house to arrest him and to seize his computer and medical records under the pretext of legitimate investigative activity. Those actions allegedly violated a) the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., b) the Stored Communications Act (“SCA”), 18 U.S.C. § 2701, c) the equitable “Clean Hands Doctrine” and d) unidentified statutes concerning civil conspiracy.

II. Defendants’ motion to dismiss

A. Legal standard

To survive a motion to dismiss, a complaint must contain sufficient factual matter, accepted as true, to state a claim to relief that is plausible on its face. Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007). Exhibits attached to the complaint are properly considered “part of the pleading for all [223]*223purposes.” Fed. R. Civ. P. 10(c). In considering the merits of a motion to dismiss, the Court must accept all factual allegations in the complaint as true and draw all reasonable inferences in the plaintiffs favor. Santiago v. Puerto Rico, 655 F.3d 61, 72 (1st Cir.2011). Threadbare recitals of the legal elements, supported by mere conclusory statements, do not suffice to state a cause of action. Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009). A complaint does not state a claim for relief where the well-pled facts fail to warrant an inference of any more than the mere possibility of misconduct. Id. at 679, 129 S.Ct. 1937.

B. Application

1. The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act prohibits an individual from 1) intentionally accessing a computer without authorization or exceeding authorized access and thereby 2) obtaining information from any federal department, federal agency or protected computer. 18 U.S.C. § 1030(a)(2).

A “protected computer” is a computer that 1) is exclusively used by the federal government, 2) is used by or for the federal government and the conduct constituting the offense affects that use by or for the federal government or 3) is used in or affects interstate or foreign commerce or communication of the United States. § 1030(e)(2). The statute defines “exceeding] authorized access” as accessing a computer with authorization and using that access to obtain or alter information without authorization. § 1030(e)(6).

The CFAA provides a private right of action to any person who suffers “damage or loss by reason of a violation” of the CFAA. § 1030(g). The statute defines “damage” as any “impairment to the integrity or availability of data, a program, a system, or information” and “loss” as

any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service ....

§§ 1030(e)(8), (11).

Here, Count 1 asserts that defendants' unlawfully accessed the protected computers hosting the PMP database 1) in violation of 105 CMR 700.012 because the access occurred during a Medicaid fraud investigation, not a drug-related investigation, and with insufficient cause, given that plaintiff has never “billed the Government” for treating Medicaid patients and 2) for the criminal or tortious purpose of “aiding and abetting Medicare Fraud and tampering with a witness who reported it.” Padmanabhan proclaims that those actions violated § 1030 and caused him financial and professional losses comprising 1) “direct costs owing to having to respond to this violation” such as consulting with affected patients, seeking legal advice and initiating this action and 2) harm to his professional reputation and ability to practice medicine.

Defendants move for dismissal for failure to state a claim under § 1030. They dispute that the computers hosting the PMP database are “protected computers” and contend that plaintiff failed to specify which, if any, of the defendants accessed the PMP database with the requisite intent.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Sensitech, Inc. v. LimeStone FZE
D. Massachusetts, 2022
Murray v. Uber Technologies, Inc.
D. Massachusetts, 2020
Padmanabhan, MD PhD v. Hulka
D. Massachusetts, 2018
Padmanabhan v. Hulka
308 F. Supp. 3d 484 (District of Columbia, 2018)
Padmanabhan v. Paikos
280 F. Supp. 3d 248 (D. Massachusetts, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
159 F. Supp. 3d 220, 2016 U.S. Dist. LEXIS 12204, Counsel Stack Legal Research, https://law.counselstack.com/opinion/padmanabhan-v-healey-mad-2016.