The tort of abuse of process
The elements of an abuse-of-process claim are (1) the defendant misused a regularly issued process—e.g., "the issuance of a citation or a writ"—for a purpose not lawfully warranted by that particular process, (2) the defendant had an ulterior motive or purpose for misusing the process, and (3) the plaintiff sustained damage from the irregularity. Detenbeck v. Koester, 886 S.W.2d 477, 480 (Tex. App.-Houston [1st Dist.] 1994, no writ); Tandy Corp. v. McGregor, 527 S.W.2d 246, 249 (Tex. App.-Texarkana 1975, writ ref'd n.r.e.); see also Pittsburgh SNF, LLC v. PharMerica E., Inc., 2:10-CV-363-JRG-RSP, 2012 WL 4509753, at *2 (E.D. Tex. July 19, 2012), report and recommendation adopted, No. 2:10-CV-363-JRG-RSP, 2012 WL 4508127 (E.D. Tex. Sept. 28, 2012) (listing examples of processes). The focus is on the use of the process once it is properly obtained, not on the motive for originally obtaining the process. See Detenbeck, 886 S.W.2d at 480-81; Tandy, 527 S.W.2d at 249 ("An action for abuse of process presupposes an originally valid and regular process, duly and properly issued."); cf. Bossin v. Towber, 894 S.W.2d 25, 33 (Tex. App.-Houston [14th Dist.] 1994, writ denied) (explaining that malicious prosecution, by contrast, focuses on party's actions and malice in getting process issued); Tex. Beef Cattle Co. v. Green, 921 S.W.2d 203, 207-08 (Tex. 1996) (malicious prosecution case).
A suit for abuse of process must be based on an allegation that the other party misused process for a collateral purpose:
Some definite act or threat not authorized by the process . . . is required; and there is no liability where the defendant has done nothing more than carry out the process to its authorized conclusion, even though with bad intentions. The improper purpose usually takes the form of coercion to obtain a collateral advantage, not properly involved in the proceeding itself, such as the surrender of property or the payment of money, by the use of the process as a threat or a club. There is, in other words, a form of extortion, and it is what is done in the course of negotiation, rather than the issuance or any formal use of the process itself, which constitutes the tort.
Blackstock v. Tatum, 396 S.W.2d 463, 468 (Tex. Civ. App.-Houston 1965, no writ); cf. Blanton v. Morgan, 681 S.W.2d 876, 878 (Tex. App.-El Paso 1984, writ ref'd n.r.e.) (seeking exemplary damages as means to extort settlement not abuse of process because process was used for intended purpose to require answer to petition). The process must be used to "compel[] a party to do a collateral thing which he would not be compelled to do" otherwise. See Detenbeck, 886 S.W.2d at 480; Blanton, 681 S.W.2d at 878; Baubles & Beads v. Louis Vuitton, S.A., 766 S.W.2d 377, 378-79 (Tex. App.-Texarkana 1989, no writ) (citing RESTATEMENT (SECOND) OF TORTS § 682, cmt. b (1977)).
SOURCE: HOUSTON COURT OF APPEALS - 01-13-00463-CV - 3/27/2014