Diabolic Video Productions, Inc v. Does 1-2099
Filing
16
Amended ORDER GRANTING-IN-PART MOTION FOR LEAVE TO TAKE LIMITED DISCOVERY PRIOR TO RULE 26(F) CONFERENCE, re 8 . Signed by Judge Paul S. Grewal on May 31, 2011.(psglc2, COURT STAFF) (Filed on 5/31/2011).
1
2
3
4
5
6
7
UNITED STATES DISTRICT COURT
8
NORTHERN DISTRICT OF CALIFORNIA
9
United States District Court
For the Northern District of California
10
11
SAN JOSE DIVISION
DIABOLIC VIDEO PRODUCTIONS, INC.,
12
13
v.
DOES 1-2099,
14
Defendants.
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Plaintiff,
)
)
)
)
)
)
)
)
)
)
Case No.: 10-CV-5865-PSG
AMENDED ORDER GRANTING-INPART MOTION FOR LEAVE TO
TAKE LIMITED DISCOVERY PRIOR
TO RULE 26(F) CONFERENCE
(Re: Docket No. 8)
On December 23, 2010, Plaintiff Diabolic Video Productions, Inc. (“Diabolic”) filed this
lawsuit for copyright infringement against 2,099 separate “Doe” Defendants. Ordinarily, Fed. R.
Civ. P. 26(d)(1) precludes discovery before the conference required under the Fed. R. Civ. P. 26(f).
Pursuant to the court’s scheduling order, the parties were to have met as required by Fed. R. Civ. P.
26(f) no later than March 1, 2011. That meeting has not taken place, and Diabolic now moves for
leave to take discovery in advance of the meeting required by Fed. R. Civ. P. 26(f). Diabolic
specifically seeks leave to serve subpoenas on several enumerated ISPs to obtain the true identities
of Doe Defendants for purpose of service in accordance with Fed. R. Civ. P. 4.
“[I]n rare cases, courts have made exceptions, permitting limited discovery to ensue after
the filing of the complaint to permit the plaintiff to learn the identifying facts necessary to permit
service on the defendant.”1 After a careful review of the record and precedent in this Circuit,
1
Columbia Ins. Co. v. SeesCandy.com, 185 F.R.D. 573, 577 (N.D. Cal. 1999).
Case No.: 10-5865
ORDER
1
1
District and elsewhere, this court finds only a limited basis for the exceptional relief Diabolic
2
seeks. Diabolic’s motion therefore is GRANTED, but only IN PART, for the reasons explained
3
below.
4
5
The court further orders that Does 2 through 2,099 are SEVERED from this action, and the
claims against Does 2 through 2,099 are ordered reassigned, as explained below.
6
I.
BACKGROUND
7
Diabolic alleges it is a motion production company whose copyright titles include “Tampa
8
Swingers Party,” a work registered in United States Copyright Office under Registration Number
9
PAU 3-472-891. Diabolic alleges that its copyrights are being infringed in the same manner by
United States District Court
For the Northern District of California
10
each of the 2,099 unnamed defendants. According to Diabolic, each of the defendants are illegally
11
downloading and distributing the films using an online media distribution network often referred to
12
as a “peer-to-peer” or “P2P” network.
13
Diabolic’s complaint does not identify any particular file-sharing protocol used by the
14
alleged network. But in a declaration submitted by Jon Nicolini in support of Diabolic’s motion,
15
Mr. Nicolini references the well-known protocol “BitTorrent.” The BitTorrent protocol is a
16
decentralized method of distributing data. Since its release approximately 10 years ago, BitTorrent
17
has allowed users to share files anonymously with other users. Instead of relying on a central
18
server to distribute data directly to individual users, the BitTorrent protocol allows individual users
19
to distribute data amount themselves by exchanging pieces of the file with each other to eventually
20
obtain a whole copy of the file. When using the BitTorrent protocol, every user simultaneously
21
receives information from and transfers information to one another.
22
In the BitTorrent vernacular, individual downloaders/distributors of a particular file are
23
called “peers.” The group of peers involved in downloading/distributing a particular file is called a
24
“swarm.” A server which stores a list of peers in a swarm is called a “tracker.” A computer
25
program that implements the BitTorrent protocol is called a BitTorrent “client.”
26
The BitTorrent protocol operates as follows. First, a user locates a small “torrent” file.
27
This file contains information about the files to be shared and about the tracker, the computer that
28
coordinates the file distribution. Second, the user loads the torrent file into a BitTorrent client,
Case No.: 10-5865
ORDER
2
1
which automatically attempts to connect to the tracker listed in the torrent file. Third, the tracker
2
responds with a list of peers and the BitTorrent client connects to those peers to begin downloading
3
data from and distributing data to the other peers in the swarm. When the download is complete,
4
the BitTorrent client continues distributing data to the peers in the swarm until the user manually
5
disconnects form the swarm or the BitTorrent client otherwise does the same.
According to Diabolic, efforts at combating BitTorrent-based copyright infringement have
7
been stymied by BitTorrent’s decentralized nature. Because there are no central servers to enjoin
8
from unlawfully distributing copyrighted content, there is no primary target on which to focus anti-
9
piracy efforts. Indeed, the same decentralization that makes the BitTorrent protocol an extremely
10
United States District Court
For the Northern District of California
6
robust and efficient means of transferring enormous quantities of data also acts to insulate it from
11
anti-piracy measures. To overcome these obstacles, Diabolic contracted with the anti-piracy firm
12
Copyright Enforcement Group, LLC (“CEG”), who are able to use proprietary technology to
13
identify the particular BitTorrent users sharing their copyrighted works. What CEG specifically
14
provides as its service are the alleged infringers’ Internet Protocol (“IP”) addresses together with
15
the date and time the alleged infringement took place. While these IP addresses provide a form of
16
identification, “[t]raditionally, the default requirement in federal court is that the plaintiff must be
17
able to identify the defendant sufficiently that a summons can be served on the defendant. This
18
requires that the plaintiff be able to ascertain the defendant’s name and address.”2
19
Because an IP address by itself is insufficient to perform this task, Diabolic seeks leave to
20
subpoena various Internet Service Providers (“ISP”) associated with the IP addresses CEG has
21
secured. The proposed subpoena would compel production of the names, addresses, email
22
addresses, phone numbers, and Media Access Control numbers associated with each IP address
23
alleged to be linked to infringing activity.
24
25
26
27
28
2
Columbia Ins. Co., 185 F.R.D. at 577 (citing Fed. R. Civ. P. 4).
Case No.: 10-5865
ORDER
3
1
II.
DISCUSSION
In the Ninth Circuit, exceptions to the general rule against expedited discovery are
3
disfavored.3 But a district court always has jurisdiction to determine facts relevant to whether or
4
not it has personal jurisdiction.4 As a result, “where the identity of alleged defendants will not be
5
known prior to the filing of a complaint . . . the plaintiff should be given an opportunity through
6
discovery to identify the unknown defendants, unless it is clear” that one of two conditions
7
applies.5 The first is where discovery would not uncover the identities sought.6 The second is
8
where the claim against the defendant could be dismissed.7 These conditions are imposed because,
9
as Judge Jensen observed over a decade ago, “[p]eople who have committed no wrong should be
10
United States District Court
For the Northern District of California
2
able to participate online without fear that someone who wishes to harass or embarrass them can
11
file a frivolous lawsuit and thereby gain the power of the court’s order to discovery their identity.”8
12
As to the first Gillespie condition, whether or not the individuals identified are ultimately
13
liable under Diabolic’s theory of infringement, the court is satisfied that the discovery sought here
14
would uncover the identities that Diabolic seeks. The Nicolini Declaration explains that CEG has
15
previously sent notices authorized under the Digital Millenium Copyright Act to each ISP. Each
16
notice included the identity of an accused file and the IP address of the computer having that file
17
18
19
20
21
22
23
24
25
26
27
28
3
See Wakefield v. Thompson, 177 F.3d 1160, 1162 (9th Cir. 1999) (citing Gillespie v. Civiletti, 629
F.2d 637, 642 (9th Cir. 1980)); see also Gomez v. Serv. Employees Int’l Local 87, No. C 10-01888
RS, 2010 WL 4704407, at *3 (N.D. Cal. Nov. 12, 2010).
4
See Wells Fargo & Co. v. Wells Fargo Express Co., 556 F.2d 406, 430 n.24 (9th Cir. 1977).
5
Gillespie, 629 F.2d at 642; see also Columbia Ins. Co., 185 F.R.D. at 573 (“With the rise of the
Internet has come the ability to commit certain tortious acts, such as defamation, copyright
infringement, and trademark infringement, entirely on-line. The tortfeasor can act pseudonymously
or anonymously and may give fictitious or incomplete identifying information. Parties who have
been injured by these acts are likely to find themselves chasing the tortfeasor from [ISP] to ISP,
with little or no hope of actually discovering the identity of the tortfeasor. In such cases the
traditional reluctance for permitting filings against John Doe defendants or fictitious names and the
traditional enforcement of strict compliance with service requirements should be tempered by the
need to provide injured parties with an forum in which they may seek redress for grievances.”).
6
See Gillespie, 629 F.2d at 642.
7
See id. at 642.
8
Columbia Ins. Co., 185 F.R.D. at 578.
Case No.: 10-5865
ORDER
4
1
available for download along with the timestamp associated with it. In the notice, CEG included
2
its contact information and requested that the ISP forward the notice to the ISP’s subscriber
3
associated with the IP address. The IP addresses included in Diabolic’s proposed subpoenas are
4
those for whom CEG has received no response or settlement agreement. While other courts have
5
rightly noted that the relationship between accused activity linked to an IP address and subscriber
6
information associated with that IP address is imperfect at best,9 this imperfection does not make it
7
“clear,” as our Circuit requires,10 that the discovery sought would fail in uncovering the identity of
8
individuals responsible for that activity.
9
The court is not satisfied, however, as to the second Gillepsie condition, because as to all
United States District Court
For the Northern District of California
10
but a single Doe, Diabolic’s complaint would, and should, be dismissed for misjoinder. While
11
“joinder of claims, parties and remedy is strongly encouraged,”11 Fed. R. Civ. P. 20 sets forth
12
specific standards for permissive joinder. Under Rule 20, parties may be joined in a single lawsuit
13
where the claims against them arise from a single transaction or a series of closely related
14
transactions. If misjoinder is apparent, Fed. R. Civ. P. 21 is clear that misjoinder “is not a ground
15
for dismissing an action.” But while an action may not dismissed for misjoinder, a court may on
16
just terms drop a party at any time.12 Indeed, this court has long dismissed parties based on
17
misjoinder,13 and continues to do so up to the present day, absent some prejudice to the plaintiff
18
such as the running of the statute of limitations.14
19
20
21
9
See VPR Internationale v. Does 1-1017, Case 2:11-cv-02068-HAB-DGB (C.D. Ill. Apr. 29,
2011), Docket No. 15 at 2.
22
10
Gillespie, 629 F.2d at 642.
23
11
United Mine Workers v. Gibbs, 383 U.S. 715, 724 (1966).
24
12
See Fed. R. Civ. P. 21.
25
13
26
27
28
See United States ex rel. North Santiam Watershed Council v. Kinross Gold USA, Inc., No. C 963673 THE, 1998 WL 118176, at *2 (N.D. Cal. Mar. 9, 1998).
14
See, e.g. IO Group, Inc. v. Does 1-19, No. C. 10-03851 SI, 2010 WL 5071605, at * 3-4 (N.D.
Cal. Dec. 7, 2010), IO Group, Inc. v. Does 1-435, No. C. 10-04382 SI, 2011 WL 1219290, at * 2
(N.D. Cal. Jan. 10, 2011).
Case No.: 10-5865
ORDER
5
1
Here, the complaint alleges that 2,099 different defendants reproduced its copyrighted film
2
on at least forty-nine different days. The complaint further alleges that all 2,099 defendants have
3
acted in cooperation with one another “by agreeing to provide, and actually providing, on a P2P
4
network, an infringing reproduction of at least substantial portions of Diabolic’s copyrighted
5
Motion Picture, in anticipation of the other Defendants doing likewise with respect to that work
6
and/or other works.”15 Citing Mr. Nicolini’s identification of a common hash, or alphanumeric
7
representation, among all Defendants’ content files, Diabolic contends that Defendants joined in a
8
common “swarm,” or upload and download of the copyrighted work, that qualifies as the single
9
transaction or series of closely-related transactions recognized under Rule 20. This court and
United States District Court
For the Northern District of California
10
others, however, have repeatedly held that the mere allegation that defendants have used the same
11
peer-to-peer network to infringe a copyrighted work is insufficient to meet the standards for joinder
12
set forth in Rule 20.16 Apart from its lone allegation that Defendants all used the same P2P
13
network to reproduce and distribute Diabolic’s copyrighted work, Diabolic offers no allegations
14
whatsoever to support its theory of a single or closely-related transactional theory.
15
16
To be fair, other courts have deferred the question of joinder and severance until after
discovery has been authorized and a motion to quash filed.17 But in each of these cases, the court
17
18
19
20
21
22
23
24
25
26
27
28
15
12/23/10 Compl. (Docket No. 1) ¶ 11.
16
See, e.g., BMG Music v. Does, No. C 06-01579, 2006 U.S. Dist. LEXIS 53237 (N.D. Cal. Jul.
31, 2006) (finding improper joinder of four Doe defendants where the complaint alleged that each
defendant used the same ISP to engage in distinct acts of infringement on separate dates at separate
times); Twentieth Century Fox Film Corp. v. Does 1-12, No. C 04-04862, Docket No. 12 (N.D.
Cal. Nov. 16, 2004) (severing twelve Doe defendants in a copyright infringement case where
although defendants used the same ISP to allegedly infringe motion picture recordings); Laface
Records, LLC v. Does 1-38, No. 5:07-CV-298-BR, 2008 WL 544992 (E.D.N.C. Feb. 27, 2008)
(ordering the severance of claims against thirty-eight defendants where plaintiff alleged each
defendant used the same ISP as well as the same peer-to-peer network to commit the alleged
copyright infringement); Interscope Records v. Does 1-25, 2004 U.S. Dist. LEXIS 27782 (M.D.
Fla. Apr. 1, 2004) (recommending sua sponte severance of multiple defendants in action where
only connection between defendants was allegation that they used same ISP and P2P network to
conduct copyright infringement); see also; cf. In the Matter of DIRECTV, INC. 2004 U.S. Dist.
LEXIS 24263, No. C 02-5912 (N.D. Cal. Jul. 26, 2004) (severing and dismissing hundreds of
defendants in a case alleging that defendants purchased and used modified access cards and other
pirate access devices to permit view plaintiff’s programming without authorization).
17
See, e.g. Call of the Wild Movie, LLC v. Does 1-1.062, Civ. Action Nos. 10-455 (BAH), 10-569
(BAH), 10-1520 (BAH), 2011 WL 996786, at *3 (D.D.C. Mar. 22, 2011) (collecting cases).
Case No.: 10-5865
ORDER
6
1
appears to have accepted the argument that a file-sharing protocol like BitTorrent “makes every
2
downloader also an uploader of the illegally transferred file(s).”18 But neither this case law, nor
3
Diabolic, explains how or why the technical architecture of BitTorrent is any different from those
4
of the file-sharing protocols considered in Leface Records, LLC,19 Interscope Records,20 BMG
5
Music,21 or Twentieth Century Fox Film Corp.22 In each of those cases, the peer-to-peer nature of
6
the protocol was insufficient to justify joinder of dozens of otherwise unrelated defendants in a
7
single action. Here, Diabolic proposes to join not merely dozens, but thousands, of defendants in a
8
single action. While the court is limited in its technical understanding by the ex parte nature of
9
Diabolic’s motion, it can take notice of the fact that the protocols at issues in those earlier cases,
United States District Court
For the Northern District of California
10
like the BitTorrent protocol here, were of precisely the same peer-to-peer architecture. Diabolic’s
11
motion therefore is GRANTED, but only as to Doe 1 and as follows.
12
IT IS HEREBY ORDERED that Diabolic is allowed to serve immediate discovery on Doe
13
1’s ISP listed in Exhibit A to the Complaint by serving a Rule 45 subpoena that seeks information
14
sufficient to identify Doe 1, including the name, addresses, telephone numbers, and email
15
addresses of Doe 1. Diabolic’s counsel shall issue its subpoena in substantially the same form as
16
the example attached as Exhibit 1 to Diabolic’s Ex Parte Application for Leave to Take Limited
17
Discovery Prior to a Rule 26 Conference, and shall include a copy of this order.
18
IT IS FURTHER ORDERED that the ISP will have 30 days from the date of service upon it
19
to serve Doe 1 with a copy of the subpoena and a copy of this order. The ISP may serve Doe 1
20
using any reasonable means, including written notice sent to Doe 1’s last known address,
21
transmitted either by first-class mail or via overnight service. The ISP and Doe 1 each shall have
22
30 days from the date of service to file any motions in this court contesting the subpoena (including
23
24
25
26
27
28
18
Id. at *5.
19
No. 5:07-CV-298-BR, 2008 WL 544992 (E.D.N.C. Feb. 27, 2008).
20
No. 6:04-CV-197-Orl-22DAB, 2004 U.S. Dist. LEXIS 27782 (M.D. Fla. Apr. 1, 2004).
21
No. 06-01579, 2006 U.S. Dist. LEXIS 53237, (Patel, J.) (N.D. Cal. July 31, 2006).
22
No. C 04-04862, Docket No. 12 (N.D. Cal. Nov.16, 2004).
Case No.: 10-5865
ORDER
7
1
a motion to quash or modify the subpoena). If that 30-day period lapses without Doe 1 or the ISP
2
contesting the subpoena, the ISP shall have 10 days to produce to Diabolic the information
3
responsive to the subpoena with respect to Doe 1.
4
IT IS FURTHER ORDERED that the ISP shall not assess any charge to Diabolic in
5
advance of providing the information requested in the subpoena, and that the ISP that receives a
6
subpoena and elects to charge for the costs of production shall provide a billing summary and cost
7
reports that serve as a basis for such billing summary and any costs claimed by the ISP.
8
9
United States District Court
For the Northern District of California
10
IT IS FURTHER ORDERED that the ISP shall preserve all subpoenaed information
pending the ISP’s delivering such information to Diabolic or the final resolution of a timely filed
and granted motion to quash the subpoena with respect to such information.
11
IT IS FURTHER ORDERED that any information disclosed to Diabolic in response to a
12
subpoena may be used by Diabolic solely for the purpose of protecting its rights under the
13
Copyright Act, 17 U.S.C. § 101 et seq.
14
IT IS FURTHER ORDERED that Does 2 through 2099 are SEVERED from this action and
15
that the claims against Does 2 through 2,099 be reassigned to an Article III judge. In view of the
16
misjoinder described above, the undersigned respectfully recommends that the claims against Does
17
2 through 2,099 be dismissed without prejudice. The undersigned further recommends that if
18
Diabolic can refile separate complaints against Does 2 through 2,099 within 20 days of this order,
19
such actions should be deemed a continuation of the original action for purposes of the statute of
20
limitations.23
21
IT IS SO ORDERED.
22
Dated: May 31, 2011
_________________________________
PAUL S. GREWAL
United States Magistrate Judge
23
24
25
26
27
28
23
This court is ordering reassignment to an Article III judge because, absent the consent of all
parties, a Magistrate Judge does not have authority to make case-dispositive rulings. See, e.g.,
Tripati v. Rison, 847 F.2d 548, 549 (9th Cir. 1988).
Case No.: 10-5865
ORDER
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?