JON S. TIGAR, District Judge.
Before the Court is Plaintiff's Ex Parte Motion to Permit Service of Subpoena for Documents Prior to F.R.C.P. 26(f) Conference. In its motion, Plaintiff seeks to obtain early discovery to determine the identities of the unnamed defendants. The Court will grant the motion.
Plaintiff Ebates, Inc. identifies itself as "a pioneer and leader in the field of online cash back shopping." ECF No. 1 ("Complaint") ¶ 1. Its complaint alleges that on April 1, 2016, Ebates was the victim of a Distributed Denial of Service ("DDOS") attack by unknown parties, in which "multiple compromised systems are used to attack a specific target, causing a denial of service for users of that target."
Approximately two hours after the attack began, Ebates received a series of demands for ransom via email.
Ebates alleges that the ransom notes were delivered from a list of approximately 200 e-mail addresses, all of which appear to contain a first name and a random series of 4 to 5 digits.
Ebates now brings this motion to serve discovery prior to a Rule 26(f) conference, requesting permission to serve subpoenas on Microsoft Corporation and Yahoo, Inc. to attempt to identify the parties behind the e-mails that sent the ransom letters.
"As a general rule, discovery proceedings take place only after the defendant has been served; however, in rare cases, courts have made exceptions, permitting limited discovery to ensue after filing of the complaint to permit the plaintiff to learn the identifying facts necessary to permit service on the defendant."
District courts in this circuit have developed a four-part test for determining when to allow early discovery.
The Court concludes that Plaintiff has met its burden under
Here, Plaintiff has alleged there is at least one real person or entity that specifically targeted Ebates, which has its principal place of business in California, both through its DDOS attack and its ransom demands. Complaint ¶¶ 3-4. This is sufficient for the Court to conclude that the defendants are real people or entities over which the requirements of jurisdiction and justiciability "can be satisfied."
The second factor requires the Plaintiff to "identify all previous steps taken to locate the elusive defendant.
Ebates has not identified the previous steps taken to locate the unnamed defendants. However, a declaration submitted by a Senior Director at Ebates states that it is "unaware of any way the attackers can be identified using the procedures, tools, and resources available to Ebates because Ebates does not know who owns the email addresses from which the demands for ransom were sent." ECF No. 4-2 ¶ 5. Indeed, since the e-mail addresses are the only information Ebates has, it appears that obtaining further information based on that information would be the first step in attempting to identify the defendants. The Court concludes that, given these specific circumstances, Plaintiff has made "a good faith effort" to comply with service requirements and to identify the defendants.
The third factor requires Plaintiff to "establish to the Court's satisfaction that plaintiff's suit against defendant could withstand a motion to dismiss."
The CFAA states that a person violates its provisions when, among other things, he or she:
Ebates contends that other courts have held that claims of a DDOS attack are sufficient to plead a CFAA claim, and cites to
The fourth and final factor requires the Plaintiff to "file a request for discovery with the Court, along with a statement of reasons justifying the specific discovery requested as well as identification of a limited number of persons or entities on whom discovery process might be served and for which there is a reasonable likelihood that the discovery process will lead to identifying information about defendant that would make service of process possible."
Ebates has submitted its desired subpoenas as exhibits to its motion. ECF No. 4-3. It requests that Microsoft and Yahoo provide "[a]ll [d]ocuments referring or relating to the identity of the users" of the e-mail addresses identified in its complaint, "including but not limited to documents that provide names, mailing addresses, phone numbers, billing information, date of account creation, account information and all other identifying information, including any related metadata, associated with the email addresses under any and all names, aliases, identities or designations related to the email address."
Ebates does not discuss each specific request for information, but contends that the request is "specific, targeted, and very limited," and "requests information designed to help identify the relevant individuals, such as the IP addresses and other identifying information associated with the relevant accounts." ECF No. 4 at 6. The Court concludes there is a "reasonable likelihood" that much of the information requested will lead to identifying information about the unnamed defendants. Some of the information, however, is probably unnecessary. Ebates does not explain why the phone numbers and billing information attached to the e-mail addresses are needed.
Thus, to ensure that Plaintiff's discovery does not unnecessarily reveal the private information of any parties, the Court will grant Plaintiff's request for early discovery subject to the following limitations.
1. Ebates's subpoenas may not require telephone numbers or billing information to be produced.
2. By separate order, the Court shall issue this district's model protective order for standard litigation in this case. Until further instruction by the Court, all information obtained from these discovery requests shall be designated confidential by Plaintiff upon its receipt.
3. Until further instruction by the Court, any filing that cites, refers to, or attaches information obtained through these discovery requests shall be filed as the subject of a motion to seal. The motion to seal shall specifically identify this order as the basis for the request to seal, and shall comply with all aspects of this Court's standing order on motions to seal.
The ex parte motion for early discovery is granted. Subject to the conditions described above, Plaintiff may serve its proposed subpoenas on Microsoft, Inc. and Yahoo, Inc.