Patrick Collins Incorporated v. Unknown Party et al

Filing 34

ORDER that John Doe 6's 6 Motion to Quash Subpoena is denied with regards to the motion to quash a subpoena and granted with regards to the motion to sever Defendants for misjoinder. John Doe 6 is severed from this case and claims against him are dismissed without prejudice. Signed by Judge G Murray Snow on 03/19/12. (ESL)

Download PDF
1 WO 2 3 4 5 6 IN THE UNITED STATES DISTRICT COURT 7 FOR THE DISTRICT OF ARIZONA 8 9 Patrick Collins, Inc., 10 Plaintiff, 11 vs. 12 John Does 1-54, 13 Defendants. 14 ) ) ) ) ) ) ) ) ) ) ) ) No. CV-11-1602-PHX-GMS ORDER 15 16 17 Pending before the Court is Defendant John Doe No. 6’s Omnibus motion to (1) 18 Quash Subpoena or in the Alternative Issue a Protective Order, and (2) Sever Defendants for 19 Misjoinder. (Doc. 6). For the reasons discussed below, the motion is granted in part and 20 denied in part. BACKGROUND 21 22 Plaintiff Patrick Collins, Inc. owns a copyright to an adult film entitled “Cuties 2” (the 23 “Work”). Plaintiff alleges that a number of people copied and shared the Work over the 24 internet, in violation of its copyright.1 (Doc. 26 ¶ 13). It claims that those people did so by 25 joining BitTorrent, a peer-to-peer file sharing protocol that allows users, after installing 26 27 28 1 Citations are to the Amended Complaint. While the Amended Complaint was submitted after Defendant’s motion was briefed, the cited portions are substantively similar to the original Complaint, upon which the motion was based. 1 BitTorrent Client software, to share files with other users. (Doc. 26 ¶¶ 15–19). Together, 2 each one of a group of computers, called a “swarm,” uploads and shares a small portion of 3 a large file; the portions are then each downloaded onto individual computers, which in turn 4 reassemble the pieces to form a copy of the original file. (Doc. 26 ¶¶ 28–36). The computers 5 participating in a swarm can join and leave the swarm over a period of months, and the 6 people operating those computers do not necessarily know who the other members of the 7 swarm are. Plaintiff asserts that computers within the district of Arizona participated in the 8 swarm that resulted in the copying and downloading of the Work from May 18, 2011 to July 9 15, 2011. (Doc. 26-1, Ex. A). 10 Plaintiff claims that when a file is broken into pieces, the pieces are all marked with 11 the same “hash identifier,” and that the computers participating in a swarm can themselves 12 be located through the hash identifier.2 It claims to have used forensic software to identify 13 a swarm that together copied and downloaded the work onto multiple computers. (Doc. 26 14 ¶¶ 37–43). Plaintiff claims that its software was able to identify the Internet Protocol (“IP”) 15 address associated with each computer which participated in the swarm, and alleges that 16 those IP addresses correspond with individual people who violated its copyright. (Id.). 17 Plaintiff applied for and was granted leave to subpoena the Internet Service Providers 18 (“ISP”s) associated with the IP addresses in order to obtain the identity of the individuals 19 associated with each of the 54 IP addresses listed in the complaint. (Doc. 5). The ISPs 20 notified IP holders that their information was being provided to a third party, and on October 21 21, 2011, Defendant John Doe 6 filed a motion (1) to quash the subpoena or alternately to 22 issue a protective order, and (2) to sever Defendants for misjoinder. While John Doe 6’s 23 motion to quash was pending, his ISP did not provide his information to Plaintiff, although 24 Plaintiff obtained the identities of the other Defendants. 25 2 27 According to the complaint, the “hash identifier works like an electronic fingerprint to identify the source and origin of the piece and that the piece is authentic and uncorrupted.” (Doc. 26 ¶ 23). 28 -2- 26 1 After the ISPs provided Plaintiff with the identities of individual John Does (except 2 for John Doe 6), Plaintiff notified the court of periodic settlements. On October 31, Plaintiff 3 settled with John Doe 13 and John Doe 37. On December 1, it settled with John Doe 42 and 4 John Doe 19. On December 13, Plaintiff moved for an extension of time for service of all 5 Defendants, although it acknowledged at that point that it had the identity of every Defendant 6 other than John Doe 6. (Doc. 20). On January 3, Plaintiff settled with John Doe 8, John Doe 7 21, John Doe 25, and John Doe 38. (Docs. 23 and 24). On January 7, Plaintiff noticed that 8 it was voluntarily dismissing its claims against 42 other John Does, and filed an Amended 9 Complaint naming only three Defendants, John Doe 6 and two named Defendants. (Docs. 10 25 and 26). Defendant settled with one of the named Defendants on January 30. (Doc. 32). 11 As a result, John Doe 6 and one named party, formerly John Doe 12, are the only Defendants 12 remaining in this lawsuit. DISCUSSION 13 14 This is one of many cases filed nationwide by owners of copyrights in adult films 15 alleging that John Doe defendants downloaded their films without authorization through 16 BitTorrent. The progression in this case is typical. First, the Plaintiff uses forensic software 17 to identify IP addresses that it claims are those addresses within a certain federal district that 18 are associated with a particular swarm that shared a particular file, and files a complaint 19 naming numerous John Does associated with the IP addresses as defendants. The plaintiff 20 requests permission to conduct pre-trial discovery to obtain the name, address, and phone 21 number of the people associated with the IP addresses from their ISPs.3 If a court rules that 22 23 3 27 Other district courts have suggested that, once in possession of the subpoenaed information, plaintiffs attempt to coerce defendants into settling without making an effort to otherwise pursue the litigation. One court has described a situation in which plaintiffs contact the unrepresented IP holders directly and demand that they settle the case to avoid being exposed as a consumer of pornography to their family, friends, and colleagues. See Raw Films, Ltd. v. Does 1–32, CV-11-532 (JAG), 2011 WL 6182025, at *3 (E.D. Va. Oct. 5, 2011) (“The plaintiffs seemingly have no interest in actually litigating the cases, but rather 28 -3- 24 25 26 1 the defendants are not misjoined and that pre-service discovery is appropriate, subpoenas are 2 issued to ISPs, who in turn identify the individuals associated with IP addresses. After the 3 plaintiff obtains the contact information of the holders of the IP addresses, many of those 4 people settle, and the plaintiff drops its claims against most, if not all, of the remaining 5 defendants.4 District courts across the country have frequently confronted the issues faced 6 by this Court today, and have come to differing conclusions. 7 I. Motion to Quash 8 In copyright suits against multiple John Doe defendants, a number of courts have 9 granted some form of pre-service discovery. See, e.g., Openmind Solutions, Inc. v. Does 1- 10 39, 2011 WL 4715200, at *5-8 (N.D. Cal. Oct. 7, 2011); New Sensations, Inc. v. Does 1- 11 1474, 2011 WL 4407222, at *4-7 (N.D. Cal. Sept. 22, 2011). Others have denied the requests 12 for expedited discovery, finding that “Plaintiff’s sought-after discovery, as designed, has the 13 potential to draw numerous innocent internet users into the litigation, placing a burden upon 14 them that outweighs Plaintiff’s need for discovery.” Pac. Century Int’l, Ltd. v. Does 1-101, 15 CV-11-2533 (DMR), 2011 WL 5117424, at *2 (N.D. Cal. Oct. 27, 2011). At least one court 16 has issued a protective order designed to prevent the plaintiff from engaging in abusive 17 litigation tactics. In Digital Sin, Inc. v. Does 1–176, CV-12-00126, 2012 WL 263491, at *1 18 (S.D.N.Y. Jan. 30, 2012) the court found that the lack of perfect correlation between IP 19 addresses and Doe defendants, combined with the stigma associated with accusations of even 20 viewing pornography, “gives rise to the potential for coercing unjust settlements from 21 innocent defendants.” As a result, it issued a protective order requiring the ISP to serve the 22 23 simply have used the Court and its subpoena powers to obtain sufficient information to shake down the John Does.”). 24 4 27 A law firm bringing such a case in the Northern District of California was asked by the judge to identify the number of such suits it had brought, and the number of defendants it had eventually served. The firm identified 129 such suits it had brought, and acknowledged that no defendant in any of them had ever been served. See AF Holdings v. Does 1-135, CV11-1333-LHK (N. D. Cal. Feb. 24, 2012, Doc. 43-1). 28 -4- 25 26 1 individual IP holders, rather than to provide their pedigree information to the plaintiff. Id. at 2 *6. It furthermore offered each IP holder 60 days after being served to request to litigate the 3 subpoena anonymously, and prohibited the plaintiff, except through counsel, from contacting 4 pro se defendants. Id. 5 Under Rule 26, courts may authorize discovery prior to a Rule 26(f) conference. 6 Courts in the Ninth Circuit generally grant such discovery when a plaintiff shows “good 7 cause,” taking into consideration whether: 8 9 10 11 12 13 (1) the plaintiff can identify the missing party with sufficient specificity such that the Court can determine that defendant is a real person or entity who could be sued in federal court; (2) the plaintiff has identified all previous steps taken to locate the elusive defendant; (3) the plaintiff’s suit against defendant could withstand a motion to dismiss; and (4) the plaintiff has demonstrated that there is a reasonable likelihood of being able to identify the defendant through discovery such that service of process would be possible. New Sensations, 2011 WL 4407222, at *1 (N.D. Cal. Sep. 22, 2011). 14 The court in New Sensations held that the four prongs are met when a plaintiff (1) 15 identifies a number of IP addresses that are linked to the unauthorized downloads on specific 16 dates and at specific times, (2) notes that the information on which individuals are associated 17 with the IP addresses is available only from the ISPs, (3) states a claim for copyright 18 infringement, and (4) demonstrates that the ISP would be able to provide the information on 19 the holder of the IP address. Id. at *2–4. Plaintiffs met these four prongs here, so the pre- 20 service discovery was appropriately granted in the Court’s previous order. (Doc. 5). 21 John Doe 6 now claims that the subpoena must be quashed as to him because Plaintiff 22 has brought this lawsuit for an improper purpose, namely, to obtain the identity of people 23 associated with the IP addresses and thereby “force settlements without incurring any of the 24 burdens involved in proving [its] case[].” Patrick Collins Inc. v. Does 1-3757, C-10-5886 25 (LB) 2011 WL 5368874, at *2 (N.D. Cal. Nov. 4, 2011). John Doe 6 claims, and Plaintiffs 26 do not deny, that the method by which the IP address holders are identified may be over- 27 inclusive—an IP address may be faked, a person other than the named IP holder may have 28 -5- 1 used the IP address, either properly or improperly, or the forensic software may not have 2 identified the proper IP address. 3 In this lawsuit, however, some of the tactics described by other courts have not 4 materialized. Plaintiff has not sought additional third-party discovery against IP holders who 5 claim that someone used their IP address. Although Plaintiff has settled some claims, it has 6 dropped its claims against many Defendants. Unlike cases in which no defendants were 7 served, Plaintiff here has served multiple named Defendants, and continues to litigate against 8 one. (Doc. 28). Courts that have denied pre-service discovery usually have done so out of 9 concern that IP holders who did not infringe on the copyright will nevertheless be subject to 10 aggressive settlement tactics. See Pac. Century, 2011 WL 5117424, at *2 (“That 11 individual—whether guilty of copyright infringement or not—would then have to decide 12 whether to pay money to retain legal assistance, or pay the money demanded.”). The 13 likelihood that John Doe 6 will be subject to such tactics is minimal here; the Court will not 14 conclude based on the tactics of other lawsuits in other districts that this suit was brought for 15 a purely improper purpose. 16 Nor will a protective order issue. A protective order may be issued “to protect a party 17 or person from annoyance, embarrassment, oppression, or undue burden or expense.” FED. 18 R. CIV. P. 26(c)(1). Other courts have issued protective orders in BitTorrent-related copyright 19 infringement suits in order to prevent improper tactics such as personal telephone calls from 20 the Plaintiff to pro se Defendants demanding settlement. Digital Sin, 2012 WL 263491, at 21 *1. John Doe 6 is represented by counsel, and faces a lower probability of such treatment. 22 To the extent that John Doe 6 wishes to prevent receiving personal telephone calls, he may 23 seek such an order from this. Defendant claims he would prefer that the proceedings take 24 place under seal, but offers no reason that disclosing the fact that a particular IP address is 25 associated with his name constitutes annoyance, embarrassment oppression, or undue burden. 26 Although the Court acknowledges that there is some social stigma attached to consuming 27 pornography, Defendant strenuously denies the allegations, and it is the rare civil lawsuit in 28 -6- 1 which a defendant is not accused of behavior of which others may disapprove. The nature 2 of the allegations alone do not merit a protective order. 3 The subpoena will not be quashed based on an argument that Plaintiff is pursuing an 4 improper purpose or that there is no good cause to issue it. Nevertheless, John Doe 6 has also 5 claimed that he is improperly joined. (Doc. 6 at 10–11). If John Doe 6 is misjoined, then he 6 will be severed from this litigation and Plaintiff will be required to file an individual claim 7 against him in order to proceed with pre-service discovery. 8 II. Joinder 9 Permissive joinder of defendants is allowed when: 10 11 12 (A) any right to relief is asserted against them jointly, severally, or in the alternative with respect to or arising out of the same transaction, occurrence, or series of related transactions or occurrences; and (B) any question of law or fact common to all defendants will arise in the action. 13 FED. R. CIV. P. 20(a)(2) 14 In determining whether joinder is appropriate, the Court must, “examine whether 15 permissive joinder would comport with the principles of fundamental fairness or would result 16 in prejudice to either side.” On the Cheap, LLC v. Does 1-5011, ___ F.R.D. ___2011 WL 17 4018258, at *1-2 (N.D.Cal. Sept. 6, 2011) (quoting Coleman v. Quaker Oats Co., 232 F.3d 18 1271, 1296 (9th Cir. 2000)). “Courts may also consider factors such as the motives of the 19 party seeking joinder and whether joinder would confuse and complicate the issues for the 20 parties involved.” SBO Pictures, Inc. v. Does 1-3036, C-11-4220 (SC) 2011 WL 6002620, at 21 *3 (N.D. Cal. Nov. 30, 2011). 22 Courts considering whether parties are properly joined in similar cases are divided as 23 to whether or not people using their computers to participate in the same “swarm” to copy and 24 reassemble pieces of the same file are participating in the same transaction or series of 25 transactions. Some courts have noted, particularly in cases where the issue was considered 26 before pre-service discovery was granted, that “[e]ach putative Defendant is a possible source 27 28 -7- 1 for Plaintiff’s copyrighted work, and may be responsible for distributing the work to the other 2 putative Defendants.” New Sensations, 2011 WL 4407222, at *6. These courts have therefore 3 held that when a large number of defendants remain, any of whom may have engaged in 4 specific transactions with others, dismissing for improper joinder is premature. See Digital 5 Sin, 2012 WL 263491, at *5 (“The Court simply holds that for purposes of carrying out the 6 initial, necessary discovery in an efficient manner, the claims may remain joined together at 7 this time.”). 8 Other courts have found that participation in the same swarm does not constitute a 9 single transaction or series of transactions. One court found that “mere allegations that Doe 10 Defendants have used the same peer-to-peer network to copy and reproduce their videos is 11 insufficient to meet the standards of joinder.” Hard Drive Prods., Inc. v. Does 1-30, No. CV12 11-345 2011 WL 4915551, at *4 (E.D. Va. Oct. 17, 2011). Another has emphasized that, 13 absent allegations that any particular user copied a piece of the file from or to any other 14 particular user, one could not conclude that the users “were engaged in the single transaction 15 or series of closely-related transactions recognized under Rule 20.” SBO Pictures, 2011 WL 16 6002620, at *3. 17 A recent decision of this district noted that by culling the members of a particular 18 swarm that reside in a particular district, a plaintiff had demonstrated that it is feasible and 19 practical for it to delineate between defendants. See Third Degree Films, Inc. v. Does 1–131, 20 CV-12-108 (JAT), at *8 (Mar. 1, 2012) (“Because of the ease with which all of the various 21 users can be separated, the Court finds it would be inconsistent to find a single transaction or 22 occurrence for joinder based solely on Plaintiff’s litigation goals of bringing a single lawsuit 23 against the Arizona defendants.”). 24 Only two Defendants remain parties to this litigation. The remaining named Defendant, 25 formerly John Doe 12, entered the swarm at 7:24 am on July 12, 2011, according to Plaintiff’s 26 complaint, while John Doe 6 entered the swarm at 11:11 am on June 24, 2011. (Doc. 26-1, 27 Ex. A). Defendant John Doe 6 is located in Sierra Vista, Arizona, and the former John Doe 28 -8- 1 12 is located in Chandler, Arizona. (Id.). Plaintiff alleges that the two remaining Defendants 2 “participat[ed] in the BitTorrent swarm with other infringers” but does not claim that John 3 Doe 6 provided data to the former John Doe 12 or vice versa. (Doc. 26 ¶ 56). Plaintiff 4 included as Defendants only those IP addresses from the swarm in question that were located 5 in Arizona, demonstrating that the actions of the individual members of the swarm are easily 6 distinguishable. Plaintiff alleges no facts that these two particular Defendants shared data with 7 each other, and provides data instead that they were logged on to BitTorrent weeks apart. 8 “The bare fact that a Doe clicked on a command to participate in the BitTorrent Protocol does 9 not mean that they were part of the downloading by unknown hundreds or thousands of 10 individuals across the country or across the world.” Hard Drive Prods., Inc. v. Does 1–188, 11 No. CV-11-01566, 2011 WL 3740473, at *13 (N.D. Cal. Aug. 23, 2011). 12 Plaintiff has not demonstrated that John Doe 6 and the former John Doe 12 engaged 13 in a single transaction or occurrence, or a single series of transactions or occurrences. 14 Defendant John Doe 6 has been improperly joined, and is severed from this lawsuit. 15 16 CONCLUSION As the Court held in its previous order, Plaintiff has shown good cause to engage in 17 pre-service discovery. Plaintiff does not allege, however, that the two remaining Defendants 18 in this case engaged in the same transaction or series of transactions, and they are therefore 19 not properly joined. John Doe 6 is thereby severed from this lawsuit. 20 IT IS THEREFORE ORDERED that John Doe 6’s Motion to Quash Subpoena (Doc. 21 6) is denied with regards to the motion to quash a subpoena and granted with regards to the 22 motion to sever Defendants for misjoinder. John Doe 6 is severed from this case and claims 23 against him are dismissed without prejudice. 24 DATED this 19th day of March, 2012. 25 26 27 28 -9-

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?