Elawyers Elawyers
Ohio| Change

Strike 3 Holdings, LLC v. Doe, 2:18-cv-02189-MCE-CKD. (2018)

Court: District Court, E.D. California Number: infdco20181113j03 Visitors: 12
Filed: Nov. 09, 2018
Latest Update: Nov. 09, 2018
Summary: ORDER CAROLYN K. DELANEY , Magistrate Judge . I. INTRODUCTION Plaintiff filed this matter on August 10, 2018, alleging that it holds the copyright on various adult films, and that defendant is infringing on those copyrights by anonymously downloading and distributing Strike 3's films to others, using the BitTorrent protocol. (ECF No. 1 at 1-2.) Plaintiff can only identify defendant by his or her IP address, through which defendant downloads and distributes the films. ( Id. ) To acquire the
More

ORDER

I. INTRODUCTION

Plaintiff filed this matter on August 10, 2018, alleging that it holds the copyright on various adult films, and that defendant is infringing on those copyrights by anonymously downloading and distributing Strike 3's films to others, using the BitTorrent protocol. (ECF No. 1 at 1-2.) Plaintiff can only identify defendant by his or her IP address, through which defendant downloads and distributes the films. (Id.) To acquire the true name and address of defendant, plaintiff brings an ex parte application to engage in expedited discovery and serve a third-party subpoena, prior to a Rule 26(f) conference, on defendant's internet service provider ("ISP"), AT&T Inc. (ECF No. 5-1 at 6.) Plaintiff argues that without the subpoena it will be unable to serve the complaint on defendant and will, therefore, be prevented from vindicating its copyright. (Id. at 7.)

II. DISCUSSION

This case is one of many filed by plaintiff, seeking identical ex parte relief under nearly identical circumstances. These related cases were assigned to Magistrate Judge Gregory G. Hollows but, due to his retirement, they have been reassigned to the undersigned. (See e.g., ECF No. 8.) Having reviewed Judge Hollows' orders, the undersigned adopts his sound analysis and approach in this and all related cases, with only minor changes as outlined below.

A. Federal Rules of Civil Procedure 26(d) and (f)

Rule 26(d) states that "[a] party may not seek discovery from any source before the parties have conferred as required by Rule 26(f), except in a proceeding excepted from initial disclosure under Rule 26(a)(1)(B), or when authorized by these rules, by stipulation, or by court order." Rule 26(f) contemplates a pre-discovery conference between the parties to facilitate the development of a discovery plan that will control throughout the litigation. Obviously, in the absence of knowledge of the actual party being sued, no discovery conference can be held. Thus, plaintiff seeks relief from that requirement from the court.

Courts in the Ninth Circuit apply the "good cause" standard in deciding whether to permit early discovery. See Semitool, Inc. v. Tokyo Electron America, Inc., 208 F.R.D. 273, 276 (N.D.Cal. 2002). "Good cause exists `where the need for expedited discovery, in consideration of the administration of justice, outweighs the prejudice to the responding party.'" Id. Good cause for expedited discovery has been found in cases involving claims of infringement and unfair competition. Id. In infringement cases, expedited discovery is frequently limited to allowing plaintiffs to identify Doe defendants. See UMG Recordings, Inc. v. Doe, 2008 WL 4104207, at *3 (N.D. Cal. Sept. 4, 2008).

B. Standard for Determining Whether to Issue the Requested Subpoena

In Arista Records, LLC v. Doe 3, the Second Circuit articulated five principal factors to consider when a defendant seeks to quash a subpoena in a situation like this: (1) the concreteness of plaintiff's showing of a prima facie claim of actionable harm; (2) the specificity of the discovery requests; (3) the absence of alternative means to obtain the subpoenaed information; (4) the need for subpoenaed information to advance the claim; and (5) defendant's expectation of privacy. 604 F.3d 110, 119 (2nd Cir. 2010) (citing Sony Music Entm't Inc. v. Does 1-40, 326 F.Supp.2d 556, 564-65 (S.D.N.Y. 2004)). While no defendant has appeared in this matter and there is no pending motion to quash, the factors enunciated by the Second Circuit in Arista are useful in determining whether to grant plaintiff's ex parte application.

Here, the first four factors weigh in plaintiff's favor: (1) plaintiff has stated a prima facie claim by providing a list of downloads of its copyrighted films that had been downloaded to the subject IP address; (2) plaintiff specifically seeks to discover only the name and contact information for the individual using that IP address; (3) plaintiff is unable to identify this individual other than by subpoenaing the ISP; and (4) without identifying defendant, plaintiff will be unable to proceed with the instant copyright action. (See generally, ECF No. 5-1.)

At the same time, the last factor weighs against granting plaintiff's request, without additional safe-guards. To simply issue an order for expedited discovery as requested here, raises a serious constitutional question of the IP address owner's reasonable expectation of privacy.

C. The Need for Privacy Protection

As the United States Supreme Court made clear in Griswold v. Connecticut, "specific guarantees in the Bill of Rights have penumbras formed by emanations from those guarantees that give them life and substance." 381 U.S. 479, 485 (1965). The Supreme Court found a right to privacy emanating from several Amendments, notably the First, Third, Fourth, Fifth, and Fourteenth. Id. Privacy can encompass fundamental and traditional activities such as marriage, medical records, or more recently found rights such as commercial privacy. Still, the right to privacy is not absolute, and is balanced against other societal interests, especially in the litigation context. See Soto v. City of Concord, 162 F.R.D. 603, 618 (N.D. Cal. 1995).

Here, the limited privacy protection afforded under the Constitution must be considered for the person who will be identified by the procedure of serving a subpoena on an ISP. Indeed, the assumption

that the person who pays for Internet access at a given location is the same individual who allegedly downloaded a single sexually explicit film is tenuous, and one that has grown more so over time. An IP address provides only the location at which one of any number of computer devices may be deployed, much like a telephone number can be used for any number of telephones. As one introductory guide states: If you only connect one computer to the Internet, that computer can use the address from your ISP. Many homes today, though, use routers to share a single Internet connection between multiple computers. Wireless routers have become especially popular in recent years, avoiding the need to run network cables between rooms. If you use a router to share an Internet connection, the router gets the IP address issued directly from the ISP. Then, it creates and manages a subnet for all the computers connected to that router. Thus, it is no more likely that the subscriber to an IP address carried out a particular computer function—here the purported illegal downloading of a single pornographic film—than to say an individual who pays the telephone bill made a specific telephone call.

In re BitTorrent Adult Film Copyright Infringement Cases, 296 F.R.D. 80, 84 (E.D.N.Y. 2012).

As such, "[e]stablishing that the person identified by discovery is the person who infringed upon the copyright will likely require additional proofs beyond the fact that the individual is listed as the subscriber on the account from which the infringing activity originated." Manny Film LLC v. Doe Subscriber Assigned IP Address 50.166-88-98, 98 F.Supp.3d 693, 695 (D.N.J. 2015) (citing Malibu Media, LLC v. John Does 1-18, No. 12-7643(NLH/AMD), 2013 U.S. Dist. LEXIS 155911, at *8-9 (D.N.J. Mar. 22, 2013).

Finally, consideration must be given to the fact that this particular case—focused on the alleged theft of pornographic films—would have a different effect on an individual wrongly identified as a defendant than would a run-of-the-mill copyright infringement case. Such a wrongly named defendant would likely feel exposed to embarrassment and reputational damage, even before he or she could engage counsel and litigate the issue of mistaken identity through a motion to quash. Moreover, the possibility exists of being forced into a settlement to avoid the effects of such "exposure." See In re BitTorrent, supra, 296 F.R.D. at 90.

III. CONCLUSION

Accordingly, IT IS HEREBY ORDERED that:

1. Plaintiff's Ex Parte Application for Leave to Serve a Third Party Subpoena Prior to a Rule 26(f) Conference (ECF No. 5) is GRANTED on the terms of this order.

2. Plaintiff may engage in limited expedited discovery to establish the identity of the owner of the IP address identified in the complaint by serving a subpoena on the ISP provider of the subject IP address.

3. The ISP shall be served with a subpoena seeking only the true name and address of the person or entity to whom the subject IP address is assigned.

4. Once plaintiff has obtained the actual identity of the person or entity associated with the subject IP address, it shall serve a copy of this order on that person or entity.

5. No formal service of process shall be permitted absent further order of this court.

6. The parties—both plaintiff and the potential defendant—are hereby invited to attend an informal conference before the undersigned for the following purposes:

a. To set a schedule that will allow the defendant an opportunity to file a motion to quash the subpoena, if there are true and adequate grounds therefor; and b. To establish procedures for service of process or waiver thereof.

7. Depending on the parties' preference, this informal conference may take place via telephone or in person at the Eastern District of California, Federal District Court, 501 I Street, Sacramento, CA 95814, 8th floor.

8. The parties are advised that attendance at such a conference is voluntary and will not itself constitute a waiver of service of the complaint, or result in a finding of "appearance" in the litigation, unless the potential defendant agrees to waive service, or the case is resolved and a settlement is placed on the record.

9. Not later than 45 days from the date of this order, plaintiff shall file a status report indicating:

a. Whether service of this order has been effectuated as directed; b. Whether defendant has agreed to attend an informal conference; and c. If applicable, whether the parties seek a telephonic or in person conference. d. The status report shall continue to identify the defendant by John or Jane Doe at the subject IP address.

10. After receipt of the status report, the court will schedule an informal conference, if necessary.

11. A decision by the person identified as the owner of the subject IP address not to attend an informal conference will lead to an order substituting the identified defendant by name, permitting ordinary service of process, and commencement of the litigation.

12. Plaintiff is cautioned that, until permission is given by the court, it is not to reveal the identity of the defendant in or out of court.

13. Nothing in this order precludes plaintiff and defendant from reaching a settlement without court participation before any informal conference is held or formal service of process is effectuated.

Source:  Leagle

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer