BERYL A. HOWELL, District Judge.
Pending before the Court are motions to dismiss, quash, and for protective orders filed by sixty-six putative defendants.
On April 8, 2010, plaintiff Maverick Entertainment Group, Inc. filed a Complaint against unnamed individuals who allegedly used a file-sharing protocol called BitTorrent to illegally infringe plaintiff's copyrights in thirteen motion pictures: Army of the Dead, Border Town 2009, Buds for Life, Demons at the Door, Holy Hustler, Jack Squad, Smile Pretty (aka Nasty), Stripper Academy, The Casino Job, The Clique (aka Death Clique), Too Saved, Treasure Raiders, and Trunk. Compl. ¶¶ 3, 9, ECF No. 1. The plaintiff subsequently filed an Amended Complaint listing 4,350 putative defendants, who are identified only by their IP addresses. Am. Compl., Aug. 10, 2010, ECF No. 9. Given that the defendants in this case were unidentified at the time the plaintiff filed its Complaint, on April 19, 2010, the Court granted the plaintiff leave to subpoena ISPs to obtain identifying information for the putative defendants. Minute Order dated April 19, 2010 (Leon, J.); Order Granting Pl.'s Mot. for Leave to Take Disc. Prior to Rule 26(f) Conference, May 24, 2010, ECF No. 7 (Leon, J.). Specifically, the Court authorized the plaintiff to obtain "information sufficient to identify each Defendant, including name, current (and permanent) addresses, telephone numbers, e-mail addresses, and Media Access Control addresses." Order Granting the Pl.'s Mot. for Leave to Take Disc. Prior to Rule 26(f) Conference, May 24, 2010, ECF No. 7 (Leon, J.), at 1. This information was to be "used by the plaintiff solely for the purpose of protecting the plaintiff's rights as set forth in the complaint." Id. at 2.
Since the Court approved expedited discovery, ISPs have provided identifying information for the putative defendants in response to the plaintiff's subpoenas on a rolling basis.
The Court is now presented with motions or letters from sixty-six putative defendants who seek to prevent disclosure of their identifying information or otherwise obtain dismissal from the lawsuit: fourteen putative defendants have filed motions in which they generally deny using BitTorrent to download and distribute the plaintiff's movies,
Fifty-two putative defendants have filed motions to quash the plaintiff's subpoenas issued to ISPs for the putative defendants' identifying information. These motions assert three arguments: First, the putative defendant filing the motion did not engage in the alleged illegal conduct and the plaintiff should therefore be prevented from obtaining the putative defendant's identifying information. Second, the subpoena should be quashed because it "requires disclosure of privileged or other protected matter" under FED. R.CIV.P. 45(c)(3)(A)(iii). Third, the plaintiff's subpoenas subject the putative defendant filing the motion to an undue burden under FED.R.CIV.P. 45(c)(3)(A)(iv). All of these arguments are unavailing.
Under Federal Rule of Civil Procedure 45(c), the Court must quash a subpoena when, inter alia, it "requires disclosure of privileged or other protected matter, if no exception or waiver applies" or "subjects a person to undue burden." FED.R.CIV.P. 45(c)(3)(A)(iii)-(iv). A general denial of engaging in copyright infringement is not a basis for quashing the plaintiff's subpoena. It may be true that the putative defendants who filed motions and letters denying that they engaged in the alleged conduct did not illegally infringe the plaintiff's copyrighted movies, and the plaintiff may, based on its evaluation of their assertions, decide not to name these individuals as parties in this lawsuit. On the other hand, the plaintiff may decide to name them as defendants in order to have an opportunity to contest the merits and veracity of their defenses in this case. In other words, if these putative defendants
Nine putative defendants urge the Court to quash the plaintiff's subpoenas based upon their privacy interests.
Finally, the argument that the plaintiff's subpoenas subject putative defendants to an undue burden is also unavailing. Putative defendants essentially argue that the plaintiff's subpoenas require them to litigate in a forum in which they should not be subject to personal jurisdiction, which causes them hardship. As explained more fully infra, the putative defendants' personal jurisdiction arguments are premature at this time because they have not been named as parties to this lawsuit. Given that they are not named parties, the putative defendants are not required to respond to the allegations presented in the plaintiff's Second Amended Complaint or otherwise litigate in this district. The plaintiff has issued subpoenas to the putative defendants' ISPs, not to the putative defendants themselves. Consequently, the putative defendants face no obligation to produce any information under the subpoenas issued to their respective ISPs and cannot claim any hardship, let alone undue hardship.
The plaintiff's subpoenas requesting the putative defendants' identifying information do not subject the putative defendants to an undue burden nor is the plaintiff's request for the information outweighed by any privacy interest or First Amendment right to anonymity. Moreover, a general denial of liability is not a proper basis to quash the plaintiff's subpoenas. Accordingly, the putative defendants' motions, under Federal Rule of Civil Procedure 45(c)(3), to quash the subpoenas are denied.
Thirty-three putative defendants have filed motions for protective orders seeking to protect their identities from being disclosed to the plaintiff.
As elaborated above, the putative defendants are not subject to the plaintiff's subpoenas, and therefore do not face any "annoyance, embarrassment, oppression, or undue burden or expense" from the plaintiff's discovery request. See FED.R.CIV.P. 26(c)(1). To the extent that the putative defendants seek protective orders to prevent disclosure of private identifying information, the Court has held that the putative defendants' First Amendment rights to anonymity in the context of their Bit-Torrent activity is minimal and outweighed by the plaintiff's need for the putative defendants' identifying information in order to protect its copyrights. See Call of the Wild Movie, LLC v. Does 1-1,062, 770 F.Supp.2d 332, 347-55 (D.D.C.2011). The putative defendants' requests for protective orders are therefore denied.
Thirteen putative defendants argue that they should be dismissed from the lawsuit because the plaintiff has improperly joined them with other putative defendants.
At the outset, the Court notes that the remedy for improper joinder under Federal Rule of Civil Procedure 21 is not dismissal of the action.
In addition to providing efficiencies for expedited discovery on jurisdictional issues, defendants may be properly joined in one action when claims arise from the same transaction or occurrence or series of transactions or occurrences; and any
In the present case, the plaintiff has met all the requirements for permissive joinder under Federal Rule of Civil Procedure 20(a)(2). The first requirement is that claims must "aris[e] out of the same transaction, occurrence, or series of transactions or occurrences." FED. R. CIV. P. 20(a)(2)(A). This essentially requires claims asserted against joined parties to be "logically related." Disparte, 223 F.R.D. at 10. This is a flexible test and courts seek the "broadest possible scope of action." Lane, 2007 WL 2007493, at *7 (quoting Gibbs, 383 U.S. at 724, 86 S.Ct. 1130).
The plaintiff alleges that the putative defendants used the BitTorrent file-sharing protocol to distribute illegally the plaintiff's motion pictures. Second Am. Compl., ¶¶ 3, 9-11. This file-sharing protocol "makes every downloader also an uploader of the illegally transferred file(s). This means that every . . . user who has a copy of the infringing copyrighted material on a torrent network must necessarily also be a source of download for that infringing file." Id. at ¶ 3. The plaintiff further asserts that the "nature of a BitTorrent protocol [is that] any seed peer that has downloaded a file prior to the time a subsequent peer downloads the same file is automatically a source for the subsequent peer so long as that first seed peer is online at the time the subsequent peer downloads a file." Id. at ¶ 4.
Based on these allegations, the plaintiff's claims against the putative defendants are logically related at this stage in the litigation. According to the plaintiff, each putative defendant is a possible source for the plaintiff's motion pictures, and may be responsible for distributing the motion pictures to the other putative defendants, who are also using the same file-sharing protocol to copy the copyrighted material. See Disparte, 223 F.R.D. at 10 (to satisfy Rule 20(a)(2)(A) claims must be "logically related" and this test is "flexible."). While the putative defendants may be able to rebut these allegations at a later date, at this procedural juncture the plaintiff has sufficiently alleged that its claims against the putative defendants potentially stem from the same transaction or occurrence, and are logically related. See Arista Records LLC v. Does 1-19, 551 F.Supp.2d 1, 11 (D.D.C.2008) ("While the Courts notes that the remedy for improper joinder is severance and not dismissal, the Court also finds that this inquiry is premature without first knowing Defendants' identities and the actual facts and circumstances associated with Defendants' conduct." (internal citation omitted)).
Some courts in other jurisdictions have granted motions by putative defendants for severance in analogous copyright infringement cases against unknown users of peer-to-peer file-sharing programs for failure to meet the "same transaction or
The plaintiff has provided detailed allegations about how the BitTorrent technology differs from other peer-to-peer file-sharing protocols and necessarily engages many users simultaneously or sequentially to operate. See Columbia Pictures Indus. v. Fung, No. 06-5578, 2009 WL 6355911, at *2, 2009 U.S. Dist. LEXIS 122661, at *7 (C.D.Cal. Dec. 21, 2009) (BitTorrent "is unique from that of previous [P2P] systems such as Napster and Grokster. Rather than downloading a file from an individual user, [BitTorrent users download] from a number of host computers that possess the file simultaneously. . . . The BitTorrent client application [] simultaneously downloads the pieces of the content file from as many users as are available at the time of the request, and then reassembles the content file on the requesting computer when the download is complete. Once a user downloads a given content file, he also becomes a source for future requests and downloads."). Specifically, BitTorrent creates a "swarm" in which "each additional user becomes a part of the network from where the file can be downloaded . . . [U]nlike a traditional peer-to-peer network, each new file downloader is receiving a different piece of the data from each user who has already downloaded the file that together comprises the whole." Second Am. Compl., ¶ 3.
At least one court has not been persuaded that allegations of copyright infringement by users of BitTorrent satisfy the requirement of Rule 20. See, e.g., Lightspeed v. Does 1-1000, No. 10-cv-5604, 2011 U.S. Dist. LEXIS 35392, at *4-7 (N.D.Ill. Mar. 31, 2011) (finding that Doe defendants using BitTorrent technology were misjoined on the basis that the putative defendants were not involved in the "same transaction, occurrence, or series of transactions or occurrence" under FED.R.CIV.P. 20(a)(2)(A)); Millennium TGA Inc. v. Does 1-800, No. 10-cv-5603, 2011 U.S. Dist. LEXIS 35406, at *3-5 (N.D.Ill. Mar. 31, 2011) (same). In those cases, the court did not discuss the precise nature of the BitTorrent technology, which enables users to contribute to each other's infringing activity of the same work as part of a "swarm." Similarly to the instant claims of infringement of thirteen copyrighted works by the putative defendants, the plaintiffs in Lightspeed and Millennium TGA Inc. alleged infringement of multiple works. Indeed, concluding that the allegations against the putative defendants in this case stem from the same transaction,
The second requirement for proper joinder under Rule 20(a)(2) is that the plaintiff's claims against the putative defendants must contain a common question of law or fact. FED.R.CIV.P. 20(a)(2)(B); see also Disparte, 223 F.R.D. at 11. The plaintiff has met this requirement as well. The plaintiff must establish against each putative defendant the same legal claims concerning the validity of the copyrights at issue and the infringement of the exclusive rights reserved to the plaintiff as the copyright holder. Furthermore, the putative defendants are alleged to have utilized the same BitTorrent file-sharing protocol to illegally distribute and download the plaintiff's movies and, consequently, factual issues related to how BitTorrent works and the methods used by the plaintiff to investigate, uncover and collect evidence about the infringing activity will be essentially identical for each putative defendant. See Second Am. Compl., ¶ 3. The Court recognizes that each putative defendant may later present different factual and substantive legal defenses, but that does not defeat, at this stage of the proceedings, the commonality in facts and legal claims that support joinder under Rule 20(a)(2)(B).
In addition to the two requirements for permissive joinder under Rule 20(a)(2), the Court must also assess whether joinder would prejudice the parties or result in needless delay. See Lane, 2007 WL 2007493, at *7; M.K. v. Tenet, 216 F.R.D. 133, 138 (D.D.C.2002). At this stage in the litigation, it will not. The putative defendants are currently identified only by their IP addresses and are not named parties. They are thus not required to respond to the plaintiff's allegations or assert a defense. The putative defendants may be able to demonstrate prejudice should the plaintiff name and proceed with a case against them, but they cannot demonstrate any harm that is occurring to them before that time. In addition, rather than result in needless delay, joinder of the putative defendants facilitates jurisdictional discovery and expedites the process of obtaining identifying information, which is prerequisite to reaching the merits of plaintiff's claims. The Court therefore concludes
This Court reaches this conclusion cognizant of the significant burdens on the court and judicial economy posed by the sheer number of putative defendants that the plaintiff seeks to join in a single lawsuit. These concerns are legitimately shared by other courts across the country that are confronting copyright infringement cases involving allegations of illegal file-sharing of copyrighted works by unprecedented numbers of Doe defendants, and the multitude of motions from interested parties that such suits engender. Lightspeed, 2011 U.S. Dist. LEXIS 35392, at *7 ("given the number of `potential' defendants (i.e., Does 1-1000), [the] court could be faced with hundreds of factually unique motions to dismiss, quash or sever from potential defendants located all over the country."); Millennium TGA Inc., 2011 U.S. Dist. LEXIS 35406, at *5 (same). Courts have varying thresholds for the exercise of their discretion to sever defendants in such cases. See Bridgeport Music, Inc., 202 F.R.D. at 232-33 (even if joinder of over 700 named defendants was proper because claims arose from the same series of occurrences, "the Court would exercise the discretion afforded it to order a severance to avoid causing unreasonable prejudice and expense to Defendants and to avoid a great inconvenience to the administration of justice").
This Court similarly must evaluate judicial economy and the administrative burdens of managing such cases, set against the challenge this broad-scale allegedly infringing activity also represents for the copyright owners. Copyright owners' efforts to protect their copyrighted works through Doe actions are "costly[,] time consuming[,] . . . cumbersome and expensive." In re Charter Commc'ns, Inc., Subpoena Enforcement Matter, 393 F.3d 771, 782 (8th Cir.2005) (Murphy, J., dissenting). Yet, copyright owners have limited alternatives to obtain redress for infringement of their protected works other than such lawsuits. See Arista Records LLC v. Does 1-27, 584 F.Supp.2d 240, 252 (D.Me.2008) ("the Court begins with the premise that the Plaintiffs have a statutorily protected interest in their copyrighted material and that the Doe Defendants, at least by allegation, have deliberately infringed that interest without consent or payment. Under the law, the Plaintiffs are entitled to protect their copyrighted material and it is difficult to discern how else in this unique circumstance the Plaintiffs could act. Not to act would be to allow those who would take what is not theirs to remain hidden behind their ISPs and to diminish and even destroy the intrinsic value of the Plaintiffs' legal interests."); In re Charter Commc'ns, Inc., 393 F.3d at 775 n. 3 ("[A]s a practical matter, copyright owners cannot deter unlawful peer-to-peer file transfers unless they can learn the identities of persons engaged in that activity."). Courts must nonetheless maintain supervision of these lawsuits and, at some point, the sheer number of putative defendants involved in a single case may necessitate severance. At this stage of the litigation, with jurisdictional discovery well underway, the Court finds that judicial economy
The putative defendants may raise the argument that they are improperly joined, under Federal Rule of Civil Procedure 20, and move to sever, under Federal Rule of Civil Procedure 21, after they have been identified and named in the Complaint. Severance prior to that point, as numerous other courts both in and outside this District have held, is premature. See, e.g., Achte/Neunte Boll Kino Beteiligungs GMBH & Co, KG v. Does 1-4,577, No. 10-cv-00453, ECF No. 34 (D.D.C. July 2, 2010) (Collyer, J.); West Bay One, Inc. v. Does 1-1653, No. 10-cv-00481, ECF No. 25 (D.D.C. July 2, 2010) (Collyer, J.); Arista Records LLC v. Does 1-19, 551 F.Supp.2d 1, 11 (D.D.C.2008) (Kollar-Kotelly, J.); London-Sire Records, Inc. v. Doe 1, 542 F.Supp.2d 153, 161 n. 7 (D.Mass.2008); Sony Music Entm't, Inc. v. Does 1-40, 326 F.Supp.2d 556, 568 (S.D.N.Y.2004).
Forty-three putative defendants argue that they should be dismissed from the lawsuit because the Court lacks personal jurisdiction over them.
In cases where a party's contacts with the jurisdiction are unclear and the record before the court is "plainly inadequate," courts have allowed for a discovery period within which to gather evidence to support jurisdiction. See GTE New Media Servs., 199 F.3d at 1351-52 (reversing lower court's finding of personal jurisdiction, but stating that "[t]his court has previously held that if a party demonstrates that it can supplement its jurisdictional allegations through discovery, then jurisdictional discovery is justified."). "This Circuit's standard for permitting jurisdictional discovery is quite liberal," Diamond Chem. Co. v. Atofina Chems., Inc., 268 F.Supp.2d 1, 15 (D.D.C.2003), and jurisdictional discovery is available when a party has "at least a good faith belief" that it has personal jurisdiction. Caribbean Broad. Sys., Ltd. v. Cable & Wireless PLC, 148 F.3d 1080, 1090 (D.C.Cir.1998). Courts have permitted discovery even when a party has failed to establish a prima facie case of personal jurisdiction. See GTE New Media Servs., 199 F.3d at 1352 (". . . as the record now stands, there is absolutely no merit to [plaintiff]'s bold claim that the parent companies and subsidiaries involved in this lawsuit should be treated identically. Jurisdictional discovery will help to sort out these matters."); see also In re Vitamins Antitrust Litigation, 94 F.Supp.2d 26, 35 (D.D.C.2000) (discussing GTE New Media Servs. and stating that "the D.C. Circuit held that although plaintiffs had failed to establish a prima facie case of personal jurisdiction and the court was unable to tell whether jurisdictional discovery would assist GTE on this score, plaintiffs were entitled to pursue [discovery]."). In such cases, a party is entitled to pursue "precisely focused discovery aimed at addressing matters relating to personal jurisdiction." GTE New Media Servs., 199 F.3d at 1352.
Although the putative defendants assert that they do not have sufficient contacts with this jurisdiction to justify personal jurisdiction, the Court, as well as the plaintiff, has limited information to assess whether these jurisdictional defenses are valid
For the reasons stated above, the putative defendants have failed to demonstrate that the plaintiff's subpoenas issued to ISPs should be quashed, that protective orders are warranted, or that the putative defendants should otherwise be dismissed from this case for improper joinder or a lack of personal jurisdiction. Accordingly, the following motions to quash the plaintiff's subpoenas, motions to be dismissed from the lawsuit, and motions for protective orders are denied: Robert A. Foster, ECF No. 12 (No IP address listed); Cedric Johnson, ECF Nos. 14, 60 (IP address listed: 97.91.179.237); Cindy Tate, ECF No. 20 (IP address listed: 68.187.201.11); Gundie Logan, ECF No. 20 (No IP address listed); Jose M. Barroso, ECF No. 20 (No IP address listed); Jane Doe, ECF No. 20 (IP address listed: 75.129.147.167); John Doe, ECF No. 20 (IP address listed: 68.191.210.134); Marty Ingebretsen, ECF No. 20 (IP address listed: 75.135.157.00); Maria Guadalupe Reyes, ECF No. 36 (IP address listed: 97.115.137.209); Juanita Burger, ECF No. 37 (No IP address listed);