BERYL A. HOWELL, District Judge.
Pending before the Court are motions to dismiss, quash, and for a protective order filed by putative defendant Kylauna McDonald.
On September 10, 2010, plaintiff Donkeyball Movie, LLC filed a Complaint against 171 unnamed individuals who allegedly used a file-sharing protocol called BitTorrent to illegally infringe plaintiff's copyright in the motion picture Familiar Strangers. Compl. ¶ 3, ECF No. 1. These unnamed computer users are identified only by their IP addresses. Given that the defendants in this case were unidentified at the time the plaintiff filed its Complaint, on October 19, 2010, the Court granted the plaintiff leave to subpoena ISPs to obtain identifying information for the putative defendants. Order Granting the Pl.'s Mot. for Leave to Take Disc. Prior to Rule 26(f) Conference, Oct. 19, 2010, ECF No. 6 (Sullivan, J.). Specifically, the Court authorized the plaintiff to obtain "information sufficient to identify each Defendant, including name, address, telephone number, email address, and Media Access Control address." Id. at 1. This information was to be "used by Plaintiff solely for the purpose of protecting the Plaintiff's rights as set forth in the Complaint." Id.
Since the Court approved expedited discovery, ISPs have provided identifying information for the putative defendants in response to the plaintiff's subpoenas on a rolling basis.
The Court is now presented with motions from a putative defendant who seeks to prevent disclosure of her identifying information or otherwise obtain dismissal from the lawsuit. ECF No. 31. The putative defendant generally denies using BitTorrent to download and distribute the plaintiff's movie, and has filed a motion to quash under on FED.R.CIV.P. 45(c)(3), as well as a motion to dismiss asserting that she is improperly joined with other putative defendants, and a motion to dismiss for lack of personal jurisdiction. Additionally, the putative defendant has filed a motion for a protective order. For the reasons stated below, the Court denies all of these motions.
Putative defendant Kylauna McDonald has filed a motion to quash the plaintiff's subpoena to ISP Comcast on grounds that she has "no knowledge of the alleged infringement" and because the subpoena subjects her to an undue burden. Kylauna McDonald's Mot. Quash and/or Vacate Subpoena, ECF No. 31; Kylauna McDonald' Aff. Supp. Mot. to Dismiss, Mot. to Quash, and General Defenses, ECF No. 31, at 3; see also FED.R.CIV.P.
Under Federal Rule of Civil Procedure 45(c), the Court must quash a subpoena when, inter alia, it "requires disclosure of privileged or other protected matter, if no exception or waiver applies" or "subjects a person to undue burden." FED.R.CIV.P. 45(c)(3)(A)(iii)-(iv). The putative defendant's general denial that she engaged in copyright infringement is not a basis for quashing the plaintiff's subpoena. It may be true that Ms. McDonald has no knowledge of the alleged illegal infringement of the plaintiff's copyrighted movie, and the plaintiff may, based on its evaluation of this assertion, decide not to name Ms. McDonald as a party in this lawsuit. On the other hand, the plaintiff may decide to name Ms. McDonald as a defendant in order to have the opportunity to contest the merits and veracity of her defense in this case. In other words, if Ms. McDonald is named as a defendant in this case, she may deny allegations that she used BitTorrent to copy and distribute illegally the plaintiff's movie, present evidence to corroborate that defense, and move to dismiss the claims against her. A general denial of liability, however, is not a basis for quashing the plaintiff's subpoena and preventing the plaintiff from obtaining Ms. McDonald's identifying information. That would deny the plaintiff access to the information critical to bringing Ms. McDonald properly into the lawsuit to address the merits of both the plaintiff's claim and Ms. McDonald's defense. See Achte/Neunte Boll Kino Beteiligungs Gmbh & Co., Kg. v. Does 1-4,577, 736 F.Supp.2d 212, 215 (D.D.C. 2010) (denying motions to quash filed by putative defendants in BitTorrent file-sharing case and stating that putative defendants' "denial of liability may have merit, [but] the merits of this case are not relevant to the issue of whether the subpoena is valid and enforceable. In other words, they may have valid defenses to this suit, but such defenses are not at issue [before the putative defendants are named parties]."); see also Fonovisa, Inc. v. Does 1-9, No. 07-1515, 2008 WL 919701, at *8 (W.D.Pa. Apr. 3, 2008) (if a putative defendant "believes that it has been improperly identified by the ISP, [the putative defendant] may raise, at the appropriate time, any and all defenses, and may seek discovery in support of its defenses.").
The putative defendant's argument that the plaintiff's subpoena subjects her to an undue burden is also unavailing. Ms. McDonald essentially argues that the plaintiff's subpoena requires her to litigate in a forum in which she should not be subject to personal jurisdiction, which causes her hardship. As explained more fully infra, the putative defendant's personal jurisdiction arguments are premature at this time because she has not been named as a party to this lawsuit. Given that she is not a named party, Ms. McDonald is not required to respond to the allegations presented in the plaintiff's Complaint or otherwise litigate in this district. The plaintiff has issued a subpoena to Comcast, the putative defendant's ISP, not to the putative defendant herself. Consequently, Ms. McDonald faces no obligation to produce any information under the subpoena issued to Comcast and cannot claim any hardship, let alone undue hardship.
The Court recognizes that Ms. McDonald's First Amendment right to anonymous speech is implicated by disclosure of her identifying information. See Sony Music Entm't, Inc. v. Does, 1-40, 326 F.Supp.2d 556, 564 (S.D.N.Y.2004) ("the file sharer may be expressing himself or herself through the music selected and made available to others."); see also London-Sire Records, Inc. v. Doe 1, 542 F.Supp.2d 153, 163 (D.Mass.2008). Nevertheless, whatever asserted First Amendment right to anonymity the putative defendant may have in this context does not shield her from allegations of copyright infringement.
The plaintiff's subpoena requesting the putative defendant's identifying information from Comcast does not subject her to an undue burden nor is the plaintiff's request for the information outweighed by any privacy interest or First Amendment right to anonymity. Moreover, a general denial of liability is not a proper basis to quash the plaintiff's subpoena. Accordingly, Ms. McDonald's motion, under Federal Rule of Civil Procedure 45(c)(3), to quash the subpoena is denied.
The putative defendant has also filed a motion for a protective order seeking to protect her identity from being disclosed to the plaintiff. Rule 26(c) provides that a court may "issue an order to protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense." FED.R.CIV.P. 26(c)(1).
As elaborated above, the putative defendant is not subject to the plaintiff's subpoena, and therefore does not face any "annoyance, embarrassment, oppression, or undue burden or expense" from the plaintiff's discovery request. See FED. R.CIV.P. 26(c)(1). To the extent that Ms. McDonald seeks a protective order to prevent disclosure of private identifying information, the Court has held that the putative defendant's First Amendment right to anonymity in the context of her BitTorrent activity is minimal and outweighed by the plaintiff's need for putative defendants' identifying information in order to protect its copyrights. See Call of the Wild Movie, LLC v. Does 1-1,062, No. 10-cv-455, 770 F.Supp.2d 332, 347-55, 2011 WL 996786 at *10-15 (D.D.C. Mar. 22, 2011). The putative defendant's request for a protective order is therefore denied.
The putative defendant argues that she should be dismissed from the lawsuit because the plaintiff has improperly joined her with other putative defendants. McDonald's Mot. Dismiss, ECF No. 31, at 3-4. The putative defendant's argument that she is improperly joined may be meritorious should she be named as a defendant in this action. At this stage in the litigation, however, when discovery is underway to learn identifying facts necessary to permit service on Doe defendants, joinder, under Federal Rule of Civil Procedure 20(a)(2), of unknown parties identified only by IP addresses is proper. As discussed below, this conclusion is further supported by the allegations set forth in the Complaint, which sufficiently establishes a prima facie case of infringement of plaintiff's copyright by users of the same file-sharing software program that operates through simultaneous and sequential computer connections and data transfers among the users.
At the outset, the Court notes that the remedy for improper joinder, under Federal Rule of Civil Procedure 21, is not dismissal of the action.
In addition to providing efficiencies for expedited discovery on jurisdictional issues, defendants may be properly joined in one action when claims arise from the same transaction or occurrence or series of transactions or occurrences; and any question of law or fact in the action is common to all defendants. FED.R.CIV.P. 20(a)(2); see also Montgomery v. STG Int'l, Inc., 532 F.Supp.2d 29, 35 (D.D.C. 2008) (interpreting Rule 20(a)(1), which has the same requirements as Rule 20(a)(2)). The requirements for permissive joinder are "liberally construed in the interest of convenience and judicial economy in a manner that will secure the just, speedy, and inexpensive determination of the action." Lane v. Tschetter, No. 05-1414, 2007 WL 2007493, at *7 (D.D.C. July 10, 2007) (internal quotation omitted); see also Davidson v. District of Columbia, 736 F.Supp.2d 115, 119 (D.D.C.2010). Thus, "the impulse is toward entertaining the broadest possible scope of action consistent with fairness to the parties; [and] joinder of claims, parties, and remedies is strongly encouraged." United Mine Workers of Am. v. Gibbs, 383 U.S. 715, 724, 86 S.Ct. 1130, 16 L.Ed.2d 218 (1966).
In the present case, the plaintiff has met all the requirements for permissive joinder under Federal Rule of Civil Procedure 20(a)(2). The first requirement is that claims must "aris[e] out of the same transaction, occurrence, or series of transactions or occurrences." FED.R.CIV.P. 20(a)(2)(A). This essentially requires claims asserted against joined parties to be "logically related." Disparte, 223 F.R.D. at 10. This is a flexible test and courts seek the "broadest possible scope of action." Lane, 2007 WL 2007493, at *7 (quoting Gibbs, 383 U.S. at 724, 86 S.Ct. 1130).
Based on these allegations, the plaintiff's claims against the putative defendants are logically related at this stage in the litigation. According to the plaintiff, each putative defendant is a possible source for the plaintiff's motion picture, and may be responsible for distributing this copyrighted work to the other putative defendants, who are also using the same file-sharing protocol to copy and distribute the same copyrighted work. See Disparte, 223 F.R.D. at 10 (to satisfy Rule 20(a)(2)(A) claims must be "logically related" and this test is "flexible."). While the putative defendants may be able to rebut these allegations at a later date, at this procedural juncture the plaintiff has sufficiently alleged that its claims against the putative defendants potentially stem from the same transaction or occurrence, and are logically related. See Arista Records LLC v. Does 1-19, 551 F.Supp.2d 1, 11 (D.D.C.2008) ("While the Courts notes that the remedy for improper joinder is severance and not dismissal, the Court also finds that this inquiry is premature without first knowing Defendants' identities and the actual facts and circumstances associated with Defendants' conduct." (internal citation omitted)).
Some courts in other jurisdictions have granted motions by putative defendants for severance in analogous copyright infringement cases against unknown users of peer-to-peer file-sharing programs for failure to meet the "same transaction or occurrence test" in Rule 20(a)(2). Those courts have been confronted with bare allegations that putative defendants used the same peer-to-peer network to infringe copyrighted works and found those allegations were insufficient for joinder. See, e.g., IO Grp., Inc. v. Does 1-19, No. 10-03851, 2010 WL 5071605, at *8-12 (N.D.Cal. Dec. 7, 2010); Arista Records, LLC v. Does 1-11, No. 07-cv-2828, 2008 WL 4823160, at *6 (N.D.Ohio Nov. 3, 2008) ("merely alleging that the Doe Defendants all used the same ISP and file-sharing network to conduct copyright infringement without asserting that they acted in concert was not enough to satisfy the same series of transactions requirement under the Federal Rules."); LaFace Records, LLC v. Does 1-38, No. 5:07-cv-298, 2008 WL 544992, at *3 (E.D.N.C. Feb. 27, 2008) (severing putative defendants in file-sharing case not involving BitTorrent technology, noting that "other courts have commonly held that where there is no assertion that multiple defendants have acted in concert, joinder is improper."); Interscope Records v. Does 1-25, No. 6:04-cv-197, 2004 U.S. Dist. LEXIS 27782 (M.D.Fla. Apr. 1, 2004) (adopting Mag. J. Report and Recommendation at Interscope Records v. Does 1-25, No. 6:04-cv-197, 2004 U.S. Dist. LEXIS 27782 (M.D.Fla. Apr. 1, 2004)). That is not the case here.
The plaintiff has provided detailed allegations about how the BitTorrent technology differs from other peer-to-peer file-sharing programs and necessarily engages
At least one court has not been persuaded that allegations of copyright infringement by users of BitTorrent satisfy the requirement of Rule 20. See, e.g., Lightspeed v. Does 1-1000, No. 10-cv-5604, 2011 U.S. Dist. LEXIS 35392, at *4-7 (N.D.Ill. Mar. 31, 2011) (finding that Doe defendants using BitTorrent technology were misjoined on the basis that the putative defendants were not involved in the "same transaction, occurrence, or series of transactions or occurrence" under FED.R.CIV.P. 20(a)(2)(A)); Millennium TGA Inc. v. Does 1-800, No. 10-cv-5603, 2011 U.S. Dist. LEXIS 35406, at *3-5 (N.D.Ill. Mar. 31, 2011) (same). In those cases, the court did not discuss the precise nature of the BitTorrent technology, which enables users to contribute to each other's infringing activity of the same work as part of a "swarm." In any event, by contrast to the instant claim of infringement of a single copyrighted work by the putative defendants, the plaintiffs in Lightspeed and Millennium TGA Inc. alleged infringement of multiple works, a factor that may undermine the requisite showing of concerted activity to support joinder.
The second requirement for proper joinder under Rule 20(a)(2) is that the plaintiff's claims against the putative defendants must contain a common question of law or fact. FED.R.CIV.P. 20(a)(2)(B); see also Disparte, 223 F.R.D. at 11. The plaintiff has met this requirement as well. The plaintiff must establish against each putative defendant the same legal claims concerning the validity of the copyright at issue and the infringement of the exclusive rights reserved to the plaintiff as the copyright holder. Furthermore, the putative defendants are alleged to have utilized the same BitTorrent file-sharing protocol to distribute and download illegally the plaintiff's movie and, consequently, factual issues related to how BitTorrent works and the methods used by the plaintiff to investigate, uncover and collect evidence about the infringing activity will be essentially identical for each putative defendant. See Compl., ¶ 3. The Court recognizes that each putative defendant may later present different factual and substantive legal defenses, but that does not defeat, at this stage of the proceedings, the commonality in facts and legal claims that support joinder under Rule 20(a)(2)(B).
In addition to the two requirements for permissive joinder under Rule 20(a)(2), the Court must also assess whether joinder would prejudice the parties or result in needless delay. See Lane, 2007 WL 2007493, at *7; M.K. v. Tenet, 216 F.R.D. 133, 138 (D.D.C.2002). At this stage in the litigation, it will not. The
The Court reaches this conclusion cognizant of the significant burdens on the court and judicial economy posed by the sheer number of putative defendants that the plaintiff seeks to join in a single lawsuit. These concerns are legitimately shared by other courts across the country that are confronting copyright infringement cases involving allegations of illegal file-sharing of copyrighted works by unprecedented numbers of Doe defendants, and the multitude of motions from interested parties that such suits engender. See, e.g., Lightspeed, 2011 U.S. Dist. LEXIS 35392, at *7 ("given the number of `potential' defendants (i.e., Does 1-1000), [the] court could be faced with hundreds of factually unique motions to dismiss, quash or sever from potential defendants located all over the country."); Millennium TGA Inc., 2011 U.S. Dist. LEXIS 35406, at *5 (same). Courts have varying thresholds for the exercise of their discretion to sever defendants in such cases. See Bridgeport Music, Inc. v. 11C Music, 202 F.R.D. 229, 232-33 (M.D.Tenn.2001) (even if joinder of over 700 named defendants was proper because claims arose from the same series of occurrences, "the Court would exercise the discretion afforded it to order a severance to avoid causing unreasonable prejudice and expense to Defendants and to avoid a great inconvenience to the administration of justice").
This Court similarly must evaluate judicial economy and the administrative burdens of managing such cases, set against the challenge this broad-scale allegedly infringing activity represents for the copyright owners. Copyright owners' efforts to protect their copyrighted works through Doe actions are "costly[,] time consuming[,]. . . cumbersome and expensive." In re Charter Commc'ns, Inc., Subpoena Enforcement Matter, 393 F.3d 771, 782 (8th Cir.2005) (Murphy, J., dissenting). Yet, copyright owners have limited alternatives to obtain redress for infringement of their protected works other than such lawsuits. See Arista Records LLC v. Does 1-27, 584 F.Supp.2d 240, 252 (D.Me.2008) ("the Court begins with the premise that the Plaintiffs have a statutorily protected interest in their copyrighted material and that the Doe Defendants, at least by allegation, have deliberately infringed that interest without consent or payment. Under the law, the Plaintiffs are entitled to protect
Joinder in this case at this stage of the litigation is proper. Should Ms. McDonald be named in the Complaint, she may raise the argument that she is improperly joined, under Federal Rule of Civil Procedure 20, and move to sever, under Federal Rule of Civil Procedure 21. Severance prior to that point, as numerous other courts both in and outside this District have held, is premature. See, e.g., Achte/Neunte Boll Kino Beteiligungs GMBH & Co, KG v. Does 1-4,577, No. 10-cv-00453, ECF No. 34 (D.D.C. July 2, 2010) (Collyer, J.); West Bay One, Inc. v. Does 1-1653, No. 10-cv-00481, ECF No. 25 (D.D.C. July 2, 2010) (Collyer, J.); Arista Records LLC v. Does 1-19, 551 F.Supp.2d 1, 11 (D.D.C. 2008) (Kollar-Kotelly, J.); London-Sire Records, Inc. v. Doe 1, 542 F.Supp.2d 153, 161 n. 7 (D.Mass.2008); Sony Music Entm't, Inc. v. Does 1-40, 326 F.Supp.2d 556, 568 (S.D.N.Y.2004).
Ms. McDonald argues that she should be dismissed from the lawsuit because the Court lacks personal jurisdiction over her. To support this argument, she supplies an affidavit attesting that she does not reside, transact or solicit business, or otherwise have sufficient contacts in the District of Columbia. These asserted facts would become relevant for the Court's consideration when and if the putative defendant is named as a party in this action. She cannot be dismissed, under Federal Rule of Civil Procedure 12(b)(2), from a lawsuit to which she is not a party.
Moreover, to establish personal jurisdiction, the Court must examine whether jurisdiction is applicable under the District of Columbia's long-arm statute, D.C.CODE § 13-423, and must also determine whether jurisdiction satisfies the requirements of due process. See GTE New Media Servs. Inc. v. BellSouth Corp., 199 F.3d 1343, 1347 (D.C.Cir.2000). Due Process requires the plaintiff to show that the defendant has "minimum contacts" with the forum, thereby ensuring that "the defendant's conduct and connection with the forum State are such that he should reasonably anticipate being haled into court there." World-Wide Volkswagen Corp. v. Woodson, 444 U.S. 286, 297, 100 S.Ct. 559, 62 L.Ed.2d 490 (1980); see also GTE New Media Servs., 199 F.3d at 1347.
In cases where a party's contacts with the jurisdiction are unclear and the record before the court is "plainly inadequate," courts have allowed for a discovery period within which to gather evidence to support jurisdiction. See GTE New Media Servs., 199 F.3d at 1351-52 (reversing lower court's finding of personal jurisdiction, but stating that "[t]his court has previously held that if a party demonstrates that it can supplement its jurisdictional allegations through discovery, then jurisdictional discovery is justified."). "This Circuit's standard for permitting jurisdictional discovery is quite liberal," Diamond Chem. Co. v. Atofina Chems., Inc., 268 F.Supp.2d 1,
Although the putative defendant asserts that she does not have sufficient contacts with this jurisdiction to justify personal jurisdiction, the Court, as well as the plaintiff, has limited information to assess whether this jurisdictional defense is valid
For the reasons stated above, the putative defendant has failed to demonstrate that the plaintiff's subpoena issued to Comcast, her ISP, should be quashed, that a protective order is warranted, or that she should otherwise be dismissed from this case for improper joinder or a lack of personal jurisdiction. Accordingly, Ms. McDonald's motion to quash the plaintiff's subpoena, motion to be dismissed from the lawsuit, and motion for a protective order are denied. An Order consistent with this Memorandum Opinion will be entered.