Patrick Collins Incorporated v. Unknown Party et al
Filing
34
ORDER that John Doe 6's 6 Motion to Quash Subpoena is denied with regards to the motion to quash a subpoena and granted with regards to the motion to sever Defendants for misjoinder. John Doe 6 is severed from this case and claims against him are dismissed without prejudice. Signed by Judge G Murray Snow on 03/19/12. (ESL)
1
WO
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE DISTRICT OF ARIZONA
8
9
Patrick Collins, Inc.,
10
Plaintiff,
11
vs.
12
John Does 1-54,
13
Defendants.
14
)
)
)
)
)
)
)
)
)
)
)
)
No. CV-11-1602-PHX-GMS
ORDER
15
16
17
Pending before the Court is Defendant John Doe No. 6’s Omnibus motion to (1)
18
Quash Subpoena or in the Alternative Issue a Protective Order, and (2) Sever Defendants for
19
Misjoinder. (Doc. 6). For the reasons discussed below, the motion is granted in part and
20
denied in part.
BACKGROUND
21
22
Plaintiff Patrick Collins, Inc. owns a copyright to an adult film entitled “Cuties 2” (the
23
“Work”). Plaintiff alleges that a number of people copied and shared the Work over the
24
internet, in violation of its copyright.1 (Doc. 26 ¶ 13). It claims that those people did so by
25
joining BitTorrent, a peer-to-peer file sharing protocol that allows users, after installing
26
27
28
1
Citations are to the Amended Complaint. While the Amended Complaint was
submitted after Defendant’s motion was briefed, the cited portions are substantively similar
to the original Complaint, upon which the motion was based.
1
BitTorrent Client software, to share files with other users. (Doc. 26 ¶¶ 15–19). Together,
2
each one of a group of computers, called a “swarm,” uploads and shares a small portion of
3
a large file; the portions are then each downloaded onto individual computers, which in turn
4
reassemble the pieces to form a copy of the original file. (Doc. 26 ¶¶ 28–36). The computers
5
participating in a swarm can join and leave the swarm over a period of months, and the
6
people operating those computers do not necessarily know who the other members of the
7
swarm are. Plaintiff asserts that computers within the district of Arizona participated in the
8
swarm that resulted in the copying and downloading of the Work from May 18, 2011 to July
9
15, 2011. (Doc. 26-1, Ex. A).
10
Plaintiff claims that when a file is broken into pieces, the pieces are all marked with
11
the same “hash identifier,” and that the computers participating in a swarm can themselves
12
be located through the hash identifier.2 It claims to have used forensic software to identify
13
a swarm that together copied and downloaded the work onto multiple computers. (Doc. 26
14
¶¶ 37–43). Plaintiff claims that its software was able to identify the Internet Protocol (“IP”)
15
address associated with each computer which participated in the swarm, and alleges that
16
those IP addresses correspond with individual people who violated its copyright. (Id.).
17
Plaintiff applied for and was granted leave to subpoena the Internet Service Providers
18
(“ISP”s) associated with the IP addresses in order to obtain the identity of the individuals
19
associated with each of the 54 IP addresses listed in the complaint. (Doc. 5). The ISPs
20
notified IP holders that their information was being provided to a third party, and on October
21
21, 2011, Defendant John Doe 6 filed a motion (1) to quash the subpoena or alternately to
22
issue a protective order, and (2) to sever Defendants for misjoinder. While John Doe 6’s
23
motion to quash was pending, his ISP did not provide his information to Plaintiff, although
24
Plaintiff obtained the identities of the other Defendants.
25
2
27
According to the complaint, the “hash identifier works like an electronic fingerprint
to identify the source and origin of the piece and that the piece is authentic and uncorrupted.”
(Doc. 26 ¶ 23).
28
-2-
26
1
After the ISPs provided Plaintiff with the identities of individual John Does (except
2
for John Doe 6), Plaintiff notified the court of periodic settlements. On October 31, Plaintiff
3
settled with John Doe 13 and John Doe 37. On December 1, it settled with John Doe 42 and
4
John Doe 19. On December 13, Plaintiff moved for an extension of time for service of all
5
Defendants, although it acknowledged at that point that it had the identity of every Defendant
6
other than John Doe 6. (Doc. 20). On January 3, Plaintiff settled with John Doe 8, John Doe
7
21, John Doe 25, and John Doe 38. (Docs. 23 and 24). On January 7, Plaintiff noticed that
8
it was voluntarily dismissing its claims against 42 other John Does, and filed an Amended
9
Complaint naming only three Defendants, John Doe 6 and two named Defendants. (Docs.
10
25 and 26). Defendant settled with one of the named Defendants on January 30. (Doc. 32).
11
As a result, John Doe 6 and one named party, formerly John Doe 12, are the only Defendants
12
remaining in this lawsuit.
DISCUSSION
13
14
This is one of many cases filed nationwide by owners of copyrights in adult films
15
alleging that John Doe defendants downloaded their films without authorization through
16
BitTorrent. The progression in this case is typical. First, the Plaintiff uses forensic software
17
to identify IP addresses that it claims are those addresses within a certain federal district that
18
are associated with a particular swarm that shared a particular file, and files a complaint
19
naming numerous John Does associated with the IP addresses as defendants. The plaintiff
20
requests permission to conduct pre-trial discovery to obtain the name, address, and phone
21
number of the people associated with the IP addresses from their ISPs.3 If a court rules that
22
23
3
27
Other district courts have suggested that, once in possession of the subpoenaed
information, plaintiffs attempt to coerce defendants into settling without making an effort to
otherwise pursue the litigation. One court has described a situation in which plaintiffs contact
the unrepresented IP holders directly and demand that they settle the case to avoid being
exposed as a consumer of pornography to their family, friends, and colleagues. See Raw
Films, Ltd. v. Does 1–32, CV-11-532 (JAG), 2011 WL 6182025, at *3 (E.D. Va. Oct. 5,
2011) (“The plaintiffs seemingly have no interest in actually litigating the cases, but rather
28
-3-
24
25
26
1
the defendants are not misjoined and that pre-service discovery is appropriate, subpoenas are
2
issued to ISPs, who in turn identify the individuals associated with IP addresses. After the
3
plaintiff obtains the contact information of the holders of the IP addresses, many of those
4
people settle, and the plaintiff drops its claims against most, if not all, of the remaining
5
defendants.4 District courts across the country have frequently confronted the issues faced
6
by this Court today, and have come to differing conclusions.
7
I. Motion to Quash
8
In copyright suits against multiple John Doe defendants, a number of courts have
9
granted some form of pre-service discovery. See, e.g., Openmind Solutions, Inc. v. Does 1-
10
39, 2011 WL 4715200, at *5-8 (N.D. Cal. Oct. 7, 2011); New Sensations, Inc. v. Does 1-
11
1474, 2011 WL 4407222, at *4-7 (N.D. Cal. Sept. 22, 2011). Others have denied the requests
12
for expedited discovery, finding that “Plaintiff’s sought-after discovery, as designed, has the
13
potential to draw numerous innocent internet users into the litigation, placing a burden upon
14
them that outweighs Plaintiff’s need for discovery.” Pac. Century Int’l, Ltd. v. Does 1-101,
15
CV-11-2533 (DMR), 2011 WL 5117424, at *2 (N.D. Cal. Oct. 27, 2011). At least one court
16
has issued a protective order designed to prevent the plaintiff from engaging in abusive
17
litigation tactics. In Digital Sin, Inc. v. Does 1–176, CV-12-00126, 2012 WL 263491, at *1
18
(S.D.N.Y. Jan. 30, 2012) the court found that the lack of perfect correlation between IP
19
addresses and Doe defendants, combined with the stigma associated with accusations of even
20
viewing pornography, “gives rise to the potential for coercing unjust settlements from
21
innocent defendants.” As a result, it issued a protective order requiring the ISP to serve the
22
23
simply have used the Court and its subpoena powers to obtain sufficient information to shake
down the John Does.”).
24
4
27
A law firm bringing such a case in the Northern District of California was asked by
the judge to identify the number of such suits it had brought, and the number of defendants
it had eventually served. The firm identified 129 such suits it had brought, and acknowledged
that no defendant in any of them had ever been served. See AF Holdings v. Does 1-135, CV11-1333-LHK (N. D. Cal. Feb. 24, 2012, Doc. 43-1).
28
-4-
25
26
1
individual IP holders, rather than to provide their pedigree information to the plaintiff. Id. at
2
*6. It furthermore offered each IP holder 60 days after being served to request to litigate the
3
subpoena anonymously, and prohibited the plaintiff, except through counsel, from contacting
4
pro se defendants. Id.
5
Under Rule 26, courts may authorize discovery prior to a Rule 26(f) conference.
6
Courts in the Ninth Circuit generally grant such discovery when a plaintiff shows “good
7
cause,” taking into consideration whether:
8
9
10
11
12
13
(1) the plaintiff can identify the missing party with sufficient
specificity such that the Court can determine that defendant is a
real person or entity who could be sued in federal court; (2) the
plaintiff has identified all previous steps taken to locate the
elusive defendant; (3) the plaintiff’s suit against defendant could
withstand a motion to dismiss; and (4) the plaintiff has
demonstrated that there is a reasonable likelihood of being able
to identify the defendant through discovery such that service of
process would be possible.
New Sensations, 2011 WL 4407222, at *1 (N.D. Cal. Sep. 22, 2011).
14
The court in New Sensations held that the four prongs are met when a plaintiff (1)
15
identifies a number of IP addresses that are linked to the unauthorized downloads on specific
16
dates and at specific times, (2) notes that the information on which individuals are associated
17
with the IP addresses is available only from the ISPs, (3) states a claim for copyright
18
infringement, and (4) demonstrates that the ISP would be able to provide the information on
19
the holder of the IP address. Id. at *2–4. Plaintiffs met these four prongs here, so the pre-
20
service discovery was appropriately granted in the Court’s previous order. (Doc. 5).
21
John Doe 6 now claims that the subpoena must be quashed as to him because Plaintiff
22
has brought this lawsuit for an improper purpose, namely, to obtain the identity of people
23
associated with the IP addresses and thereby “force settlements without incurring any of the
24
burdens involved in proving [its] case[].” Patrick Collins Inc. v. Does 1-3757, C-10-5886
25
(LB) 2011 WL 5368874, at *2 (N.D. Cal. Nov. 4, 2011). John Doe 6 claims, and Plaintiffs
26
do not deny, that the method by which the IP address holders are identified may be over-
27
inclusive—an IP address may be faked, a person other than the named IP holder may have
28
-5-
1
used the IP address, either properly or improperly, or the forensic software may not have
2
identified the proper IP address.
3
In this lawsuit, however, some of the tactics described by other courts have not
4
materialized. Plaintiff has not sought additional third-party discovery against IP holders who
5
claim that someone used their IP address. Although Plaintiff has settled some claims, it has
6
dropped its claims against many Defendants. Unlike cases in which no defendants were
7
served, Plaintiff here has served multiple named Defendants, and continues to litigate against
8
one. (Doc. 28). Courts that have denied pre-service discovery usually have done so out of
9
concern that IP holders who did not infringe on the copyright will nevertheless be subject to
10
aggressive settlement tactics. See Pac. Century, 2011 WL 5117424, at *2 (“That
11
individual—whether guilty of copyright infringement or not—would then have to decide
12
whether to pay money to retain legal assistance, or pay the money demanded.”). The
13
likelihood that John Doe 6 will be subject to such tactics is minimal here; the Court will not
14
conclude based on the tactics of other lawsuits in other districts that this suit was brought for
15
a purely improper purpose.
16
Nor will a protective order issue. A protective order may be issued “to protect a party
17
or person from annoyance, embarrassment, oppression, or undue burden or expense.” FED.
18
R. CIV. P. 26(c)(1). Other courts have issued protective orders in BitTorrent-related copyright
19
infringement suits in order to prevent improper tactics such as personal telephone calls from
20
the Plaintiff to pro se Defendants demanding settlement. Digital Sin, 2012 WL 263491, at
21
*1. John Doe 6 is represented by counsel, and faces a lower probability of such treatment.
22
To the extent that John Doe 6 wishes to prevent receiving personal telephone calls, he may
23
seek such an order from this. Defendant claims he would prefer that the proceedings take
24
place under seal, but offers no reason that disclosing the fact that a particular IP address is
25
associated with his name constitutes annoyance, embarrassment oppression, or undue burden.
26
Although the Court acknowledges that there is some social stigma attached to consuming
27
pornography, Defendant strenuously denies the allegations, and it is the rare civil lawsuit in
28
-6-
1
which a defendant is not accused of behavior of which others may disapprove. The nature
2
of the allegations alone do not merit a protective order.
3
The subpoena will not be quashed based on an argument that Plaintiff is pursuing an
4
improper purpose or that there is no good cause to issue it. Nevertheless, John Doe 6 has also
5
claimed that he is improperly joined. (Doc. 6 at 10–11). If John Doe 6 is misjoined, then he
6
will be severed from this litigation and Plaintiff will be required to file an individual claim
7
against him in order to proceed with pre-service discovery.
8
II. Joinder
9
Permissive joinder of defendants is allowed when:
10
11
12
(A) any right to relief is asserted against them jointly, severally,
or in the alternative with respect to or arising out of the same
transaction, occurrence, or series of related transactions or
occurrences; and
(B) any question of law or fact common to all defendants will
arise in the action.
13
FED. R. CIV. P. 20(a)(2)
14
In determining whether joinder is appropriate, the Court must, “examine whether
15
permissive joinder would comport with the principles of fundamental fairness or would result
16
in prejudice to either side.” On the Cheap, LLC v. Does 1-5011, ___ F.R.D. ___2011 WL
17
4018258, at *1-2 (N.D.Cal. Sept. 6, 2011) (quoting Coleman v. Quaker Oats Co., 232 F.3d
18
1271, 1296 (9th Cir. 2000)). “Courts may also consider factors such as the motives of the
19
party seeking joinder and whether joinder would confuse and complicate the issues for the
20
parties involved.” SBO Pictures, Inc. v. Does 1-3036, C-11-4220 (SC) 2011 WL 6002620, at
21
*3 (N.D. Cal. Nov. 30, 2011).
22
Courts considering whether parties are properly joined in similar cases are divided as
23
to whether or not people using their computers to participate in the same “swarm” to copy and
24
reassemble pieces of the same file are participating in the same transaction or series of
25
transactions. Some courts have noted, particularly in cases where the issue was considered
26
before pre-service discovery was granted, that “[e]ach putative Defendant is a possible source
27
28
-7-
1 for Plaintiff’s copyrighted work, and may be responsible for distributing the work to the other
2 putative Defendants.” New Sensations, 2011 WL 4407222, at *6. These courts have therefore
3 held that when a large number of defendants remain, any of whom may have engaged in
4 specific transactions with others, dismissing for improper joinder is premature. See Digital
5 Sin, 2012 WL 263491, at *5 (“The Court simply holds that for purposes of carrying out the
6 initial, necessary discovery in an efficient manner, the claims may remain joined together at
7 this time.”).
8
Other courts have found that participation in the same swarm does not constitute a
9 single transaction or series of transactions. One court found that “mere allegations that Doe
10 Defendants have used the same peer-to-peer network to copy and reproduce their videos is
11 insufficient to meet the standards of joinder.” Hard Drive Prods., Inc. v. Does 1-30, No. CV12 11-345 2011 WL 4915551, at *4 (E.D. Va. Oct. 17, 2011). Another has emphasized that,
13 absent allegations that any particular user copied a piece of the file from or to any other
14 particular user, one could not conclude that the users “were engaged in the single transaction
15 or series of closely-related transactions recognized under Rule 20.” SBO Pictures, 2011 WL
16 6002620, at *3.
17
A recent decision of this district noted that by culling the members of a particular
18 swarm that reside in a particular district, a plaintiff had demonstrated that it is feasible and
19 practical for it to delineate between defendants. See Third Degree Films, Inc. v. Does 1–131,
20 CV-12-108 (JAT), at *8 (Mar. 1, 2012) (“Because of the ease with which all of the various
21 users can be separated, the Court finds it would be inconsistent to find a single transaction or
22 occurrence for joinder based solely on Plaintiff’s litigation goals of bringing a single lawsuit
23 against the Arizona defendants.”).
24
Only two Defendants remain parties to this litigation. The remaining named Defendant,
25 formerly John Doe 12, entered the swarm at 7:24 am on July 12, 2011, according to Plaintiff’s
26 complaint, while John Doe 6 entered the swarm at 11:11 am on June 24, 2011. (Doc. 26-1,
27 Ex. A). Defendant John Doe 6 is located in Sierra Vista, Arizona, and the former John Doe
28
-8-
1 12 is located in Chandler, Arizona. (Id.). Plaintiff alleges that the two remaining Defendants
2 “participat[ed] in the BitTorrent swarm with other infringers” but does not claim that John
3 Doe 6 provided data to the former John Doe 12 or vice versa. (Doc. 26 ¶ 56). Plaintiff
4 included as Defendants only those IP addresses from the swarm in question that were located
5 in Arizona, demonstrating that the actions of the individual members of the swarm are easily
6 distinguishable. Plaintiff alleges no facts that these two particular Defendants shared data with
7 each other, and provides data instead that they were logged on to BitTorrent weeks apart.
8 “The bare fact that a Doe clicked on a command to participate in the BitTorrent Protocol does
9 not mean that they were part of the downloading by unknown hundreds or thousands of
10 individuals across the country or across the world.” Hard Drive Prods., Inc. v. Does 1–188,
11 No. CV-11-01566, 2011 WL 3740473, at *13 (N.D. Cal. Aug. 23, 2011).
12
Plaintiff has not demonstrated that John Doe 6 and the former John Doe 12 engaged
13 in a single transaction or occurrence, or a single series of transactions or occurrences.
14 Defendant John Doe 6 has been improperly joined, and is severed from this lawsuit.
15
16
CONCLUSION
As the Court held in its previous order, Plaintiff has shown good cause to engage in
17 pre-service discovery. Plaintiff does not allege, however, that the two remaining Defendants
18 in this case engaged in the same transaction or series of transactions, and they are therefore
19 not properly joined. John Doe 6 is thereby severed from this lawsuit.
20
IT IS THEREFORE ORDERED that John Doe 6’s Motion to Quash Subpoena (Doc.
21 6) is denied with regards to the motion to quash a subpoena and granted with regards to the
22 motion to sever Defendants for misjoinder. John Doe 6 is severed from this case and claims
23 against him are dismissed without prejudice.
24
DATED this 19th day of March, 2012.
25
26
27
28
-9-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?