NU IMAGE, INC. v. DOES
Filing
5
MOTION for Order FOR LEAVE TO TAKE DISCOVERY PRIOR TO RULE 26(f) CONFERENCE by NU IMAGE, INC. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Text of Proposed Order)(Kurtz, Nicholas)
UNITED STATES DISTRICT COURT FOR THE
DISTRICT OF COLUMBIA
NU IMAGE, INC.
)
)
Plaintiff,
)
)
v.
)
)
DOES 1 – 6,500
)
)
Defendants.
)
_______________________________________)
CA. 1:11-cv-00301-RLW
MOTION FOR LEAVE TO TAKE DISCOVERY
PRIOR TO RULE 26(f) CONFERENCE
Plaintiff, by counsel, pursuant to the Federal Rules of Civil Procedure, respectfully
moves this Court for leave to take discovery prior to the Rule 26(f) conference for the reasons
stated in its accompanying Memorandum of Points & Authorities filed contemporaneously
herewith. Plaintiff requests a hearing on this matter, if necessary, on an expedited basis.
Respectfully submitted,
NU IMAGE, INC.
DATED: February 17, 2011
By:
/s/
Thomas M. Dunlap (D.C. Bar # 471319)
Nicholas A. Kurtz (D.C. Bar # 980091)
DUNLAP, GRUBB & WEAVER, PLLC
1200 G Street, NW Suite 800
Washington, DC 20005
Telephone: 202-316-8558
Facsimile: 202-318-0242
tdunlap@dglegal.com
nkurtz@dglegal.com
Attorneys for the Plaintiff
1
UNITED STATES DISTRICT COURT FOR THE
DISTRICT OF COLUMBIA
NU IMAGE, INC.
)
)
Plaintiff,
)
)
v.
)
)
DOES 1 – 6,500
)
)
Defendants.
)
_______________________________________)
CA. 1:11-cv-00301-RLW
MEMORANDUM OF POINTS AND AUTHORITIES
IN SUPPORT OF MOTION FOR LEAVE TO TAKE DISCOVERY
PRIOR TO RULE 26(f) CONFERENCE
TABLE OF CONTENTS
I. INTRODUCTION ........................................................................................................................1
II. ARGUMENT ..............................................................................................................................2
A. PRECEDENTS OF COURTS ALLOWING DISCOVERY TO IDENTIFY DOE
DEFENDANTS ...................................................................................................................2
B. OVERVIEW OF PLAINTIFF’S ALLEGATIONS AND FACTUAL SHOWINGS.....5
1. Overview of the P2P Infringing Activity...................................................................6
2. Preliminary Identification of Defendants...................................................................8
C. PLAINTIFF HAS SHOWN GOOD CAUSE FOR THE DISCOVERY AND HAS
MADE A PRIMA FACIE SHOWING THAT DEFENDANTS DID INFRINGE
PLAINTIFF’S COPYRIGHTS..........................................................................................12
III. CONCLUSION........................................................................................................................16
i
TABLE OF AUTHORITIES
Cases
A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001) ..........................................13
Achte/Neunte Boll Kino Beteiligungs GMBH & CO KG v. Does 1- 4,577,
Case No. 10-453 (D.D.C.) ...................................................................................................4
Arista Records LLC v. Does 1-19, 551 F. Supp. 2d 1 (D.D.C. Apr. 28, 2008).........................4, 14
Arista Records, LLC v. Doe No. 1, 254 F.R.D. 480 (E.D.N.C. 2008) ..........................................15
Call of the Wild Movie, LLC v. Does 1-358, Case No. 10-455 (D.D.C.) .......................................4
Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573, 578-80 (N.D. Cal. 1999) ....................4, 12
Cornered, Inc. v. Does 1-2,177, Case No. 10-1476 (D.D.C.)..........................................................4
Couch v. U.S., 409 U.S. 322 (1973) ..............................................................................................15
Dean v. Barber, 951 F.2d 1210 (11th Cir. 1992) .............................................................................3
Donkeyball Movie, LLC v. Does 1-171, Case No. 10-1520 (D.D.C.) ............................................4
Elvis Presley Enter., Inc. v. Passport Video, 349 F.3d 622 (9th Cir. 2003) ..................................14
Entm’t Tech. Corp. v. Walt Disney Imagineering, No. Civ. A. 03-3546, 2003 WL 22519440
(E.D. Pa. Oct. 2, 2003).............................................................................................5
Equidyne Corp. v. Does 1-21, 279 F. Supp. 2d 481 (D. Del. 2003)................................................3
G2 Productions LLC v. Does 1-83, Case No. 10-41 (D.D.C.) ........................................................4
Gary v. United States, No. 3:97-CV-658, 1998 WL 834853 (E.D. Tenn.) ............................. 15-16
Gillespie v. Civiletti, 629 F.2d 637 (9th Cir. 1980).........................................................................3
Guest v. Leis, 255 F.3d 325 (6th Cir. 2001) ..................................................................................14
In re Aimster Copyright Litig., 334 F.3d 643 (7th Cir. 2003) .......................................................13
In re Gren, 633 F.2d 825 (9th Cir. 1980) .......................................................................................16
ii
Interscope Records v. Does 1-14, 558 F. Supp. 2d 1176 (D. Kan. 2008)......................................14
Laxalt v. McClatchy, 809 F.2d 885 (D.C. Cir 1987) .....................................................................15
Lions Gate Films, Inc., et al. v. Does 1-5, Case No. 05-386 (EGS) (D.D.C.) .................................4
Lynn v. Radford, No. 99-71007, 2001 WL 514360 (E.D. Mich. 2001) ........................................15
Maclin v. Paulson, 627 F.2d 83 (7th Cir. 1980) ..............................................................................3
Maverick Entertainment Group, Inc. v. Does 1-1,000, Case No. 10-569 (D.D.C.).........................4
Metro-Goldwyn-Mayer Pictures Inc., et al. v. Does 1-10, Case No. 04-2005 (JR) (D.D.C.) .........4
Munz v. Parr, 758 F.2d 1254 (8th Cir. 1985) ..................................................................................3
Murphy v. Goord, 445 F.Supp.2d 261 (W.D.N.Y. 2006)................................................................2
Pleasants v. Allbaugh, 208 F.R.D. 7 (D.D.C. 2002)......................................................................15
Pod-Ners, LLC v. Northern Feed & Bean of Lucerne LLC, 204 F.R.D. 675 (D. Colo. 2002) .....13
Qwest Comm. Int’l, Inc. v. WorldQuest Networks, Inc., 213 F.R.D. 418 (D. Colo. 2003) ............5
Rocker Mgmt. LLC v. John Does, No. 03-MC-33 2003 WL 22149380 (N.D. Cal. 2003).............4
Semitool, Inc. v. Tokyo Electron Am., Inc., 208 F.R.D. 273 (N.D. Cal. 2002) ........................5, 14
Smith v. Maryland, 442 U.S. 735 (1979).......................................................................................15
Sony Music Entm’t, Inc. v. Does 1–40, 326 F. Supp. 2d 556 (S.D.N.Y. 2004)...................... 14-15
Twentieth Century Fox Film Corporation, et al. v. Does 1-9, Case No. 04-2006 (EGS) (D.D.C.).4
UMG Recordings v. Does 1-4, 64 Fed. R. Serv. 3d (Callaghan) 305 (N.D. Cal. March 6, 2006) ..3
UMG Recordings, et al. v. Does 1-199, Case No. 04-093 (CKK) (D.D.C.) ...................................4
UMG Recordings, Inc. v. Doe, 2008 WL 4104214 (N.D. Cal. 2008) ..................................... 13-14
U.S. v. Hambrick, 55 F. Supp. 2d 504 (W.D. Va. 1999) ...............................................................15
U.S. v. Kennedy, 81 F. Supp. 2d 1103 (D. Kan. 2000) .................................................................15
U.S. v. Miller, 425 U.S. 435 (1976)...............................................................................................15
iii
Valentin v. Dinkins, 121 F.3d 72 (2d Cir. 1997) ......................................................................... 2-3
Voltage Pictures, LLC v. Does 1-5,000, Case No. 10-00873 (D.D.C.)...........................................4
Wakefield v. Thompson, 177 F.3d 1160 (9th Cir. 1999).................................................................2
Warner Bros. Records, Inc. v. Does 1-6, 527 F.Supp.2d 1 (D.D.C. 2007)..................................3, 5
West Bay One, Inc. v. Does 1- 2,000, Case No. 10-481 (D.D.C.) ..................................................4
Worldwide Film Entertainment LLC v. Does 1-749, Case No. 10-38 (D.D.C.) .............................4
Yokohama Tire Corp. v. Dealers Tire Supply, Inc., 202 F.R.D. 612 (D. Ariz. 2001).....................5
Statutes
17 U.S.C. §106...............................................................................................................................13
Miscellaneous
Melville B. Nimmer & David Nimmer, Nimmer on Copyright, § 14.06[A] (2003) .....................14
iv
MEMORANDUM OF POINTS AND AUTHORITIES
I. INTRODUCTION
Plaintiff, a film producer and motion picture copyright holder, filed a Complaint to stop
Defendants from copying and distributing to others over the Internet unauthorized copies (files)
of the motion pictures for which it holds the exclusive licensing and copyrights, specifically “The
Expendables” (the “Motion Picture”). Using so-called “peer-to-peer” (“P2P”) file “swapping”
networks, Defendants’ infringements allow them and untold others unlawfully to obtain and
distribute for free the copyrighted Motion Picture that Plaintiff invested substantial sums of
money to make. Plaintiff sued Defendants as “Doe” Defendants because Defendants committed
their infringements using on-line pseudonyms (“user names” or “network names”), not their true
names. At this point, Plaintiff has only been able to identify the Doe Defendants by their
Internet Protocol (“IP”) address and the date and time of alleged infringement.
The only way that Plaintiff can determine Defendants’ actual names is from the non-party
Internet Service Providers (“ISPs”) to which Defendants subscribe and from which Defendants
obtain Internet access, as this information is readily available to the ISPs from documents they
keep in the regular course of business. Accordingly, Plaintiff seeks leave of Court to serve
limited discovery prior to a Rule 26(f) conference on several of the non-party ISPs solely to
determine the true identities of the Doe Defendants, as well as any other infringers that Plaintiff
identifies during the course of this litigation, as Plaintiff’s infringement monitoring efforts are
on-going and continuing. Therein, Plaintiff request that the Court enter an order allowing
1
Plaintiff to serve Rule 45 subpoenas on the ISPs immediately and that the ISPs shall comply with
the subpoenas.1
If the Court grants this Motion, Plaintiff will serve subpoenas on the ISPs requesting the
identifying information. If the ISPs cannot themselves identify one or more of the Doe
Defendants but can identify an intermediary ISP as the entity providing online services and/or
network access to such Defendants, Plaintiff will then serve a subpoena on that ISP requesting
the identifying information for the relevant Doe Defendants. In either case, these ISPs will be
able to notify their subscribers that this information is being sought, and, if so notified, each
Defendant will have the opportunity to raise any objections before this Court. Thus, to the extent
that any Defendant wishes to object, he or she will be able to do so.
II. ARGUMENT
A. PRECEDENTS OF COURTS ALLOWING DISCOVERY TO IDENTIFY DOE
DEFENDANTS
Courts routinely allow discovery to identify “Doe” defendants. See, e.g., Murphy v.
Goord, 445 F.Supp.2d 261, 266 (W.D.N.Y. 2006) (in situations where the identity of alleged
defendants may not be known prior to the filing of a complaint, the plaintiff should have an
opportunity to pursue discovery to identify the unknown defendants); Wakefield v. Thompson,
177 F.3d 1160, 1163 (9th Cir. 1999) (error to dismiss unnamed defendants given possibility that
identity could be ascertained through discovery); Valentin v. Dinkins, 121 F.3d 72, 75-76 (2d
Cir. 1997) (plaintiff should have been permitted to conduct discovery to reveal identity of
1
Because Plaintiff does not currently know the identity of any of the Defendants, Plaintiff cannot
ascertain any of the Defendants’ position on this Motion or serve any of the Defendants with this
Motion.
2
defendant); Dean v. Barber, 951 F.2d 1210, 1215 (11th Cir. 1992) (error to deny plaintiff’s
motion to join John Doe defendant where identity of John Doe could have been determined
through discovery); Munz v. Parr, 758 F.2d 1254, 1257 (8th Cir. 1985) (error to dismiss claim
merely because defendant was unnamed; “Rather than dismissing the claim, the court should
have ordered disclosure of Officer Doe’s identity”); Gillespie v. Civiletti, 629 F.2d 637, 642 (9th
Cir. 1980) (“where the identity of alleged defendants [are not] known prior to the filing of a
complaint . . . the plaintiff should be given an opportunity through discovery to identify the
unknown defendants”); Maclin v. Paulson, 627 F.2d 83, 87 (7th Cir. 1980) (where “party is
ignorant of defendants’ true identity . . . plaintiff should have been permitted to obtain their
identity through limited discovery”); Equidyne Corp. v. Does 1-21, 279 F. Supp. 2d 481, 483 (D.
Del. 2003) (allowing pre-Rule 26 conference discovery from ISPs to obtain identities of users
anonymously posting messages on message boards).
In similar copyright infringement cases brought by motion picture studios and record
companies against Doe defendants, courts have consistently granted plaintiffs’ motions for leave
to take expedited discovery to serve subpoenas on ISPs to obtain the identities of Doe
Defendants prior to a Rule 26 conference. See Warner Bros. Records, Inc. v. Does 1-6, 527
F.Supp.2d 1, 2 (D.D.C. 2007) (allowing plaintiffs to serve a Rule 45 subpoena upon Georgetown
University to obtain the true identity of each Doe defendant, including each defendant's true
name, current and permanent addresses and telephone numbers, email address, and Media
Access Control (“MAC”) address) (citing Memorandum Opinion and Order, UMG Recordings,
Inc. v. Does 1-199, No. 04-093(CKK) (D.D.C. March 10, 2004); Order, UMG Recordings v.
Does 1-4, 64 Fed. R. Serv. 3d (Callaghan) 305 (N.D. Cal. March 6, 2006)).
3
In fact, for the past few years, federal district courts throughout the country, including
this Court, have granted expedited discovery in Doe Defendant lawsuits that are factually similar
to the instant lawsuit.2 In these cited cases and others like them, copyright holder plaintiffs have
obtained the identities of P2P network users from ISPs through expedited discovery using
information similar to that gathered by Plaintiff in the instant case, and they have used that
information as the basis for their proposed subpoenas to these ISPs.
Courts consider the following factors when granting motions for expedited discovery to
identify anonymous Internet users: (1) whether the plaintiff can identify the missing party with
sufficient specificity such that the Court can determine that defendant is a real person or entity
who could be sued in federal court; (2) all previous steps taken by the plaintiff to identify the
Doe Defendant; and (3) whether the plaintiff’s suit could withstand a motion to dismiss.
Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573, 578-80 (N.D. Cal. 1999); see also Rocker
Mgmt. LLC v. John Does, No. 03-MC-33 2003 WL 22149380, *1-2, (N.D. Cal. 2003) (applying
Seescandy.com standard to identify persons who posted libelous statements on Yahoo! message
board; denying request for expedited discovery where the postings in question were not libelous).
Plaintiff here is able to demonstrate each one of these factors.
2
Such cases include Arista Records LLC v. Does 1-19, 551 F. Supp. 2d 1, 7 (D.D.C. Apr. 28,
2008) (Kollar-Kotelly, J.); Metro-Goldwyn-Mayer Pictures Inc., et al. v. Does 1-10, Case No.
04-2005 (D.D.C.) (Robertson, J.); Twentieth Century Fox Film Corporation, et al. v. Does 1-9,
Case No. 04-2006 (D.D.C.) (Sullivan, J.); Lions Gate Films, Inc., et al. v. Does 1-5, Case No. 05386 (D.D.C.) (Sullivan, J.); UMG Recordings, et al. v. Does 1-199, Case No. 04-093 (D.D.C.)
(Kollar-Kotelly, J.); Worldwide Film Entertainment LLC v. Does 1-749, Case No. 10-38
(D.D.C.) (Kennedy, Jr., J.); G2 Productions LLC v. Does 1-83, Case No. 10-41 (D.D.C.) (KollarKotelly, J.); Achte/Neunte Boll Kino Beteiligungs GMBH & CO KG v. Does 1- 4,577, Case No.
10-453 (D.D.C.) (Collyer, J.); West Bay One, Inc. v. Does 1- 2,000, Case No. 10-481 (D.D.C.)
(Bates, J.); Call of the Wild Movie, LLC v. Does 1-358, Case No. 10-455 (D.D.C.) (Urbina, J.);
Maverick Entertainment Group, Inc. v. Does 1-1,000, Case No. 10-569 (D.D.C.) (Leon, J.);
Voltage Pictures, LLC v. Does 1-5,000, Case No. 10-00873 (D.D.C.) (Urbina, J.); Cornered, Inc.
v. Does 1-2,177, Case No. 10-1476 (D.D.C.) (Kollar-Kotelly, J.); Donkeyball Movie, LLC v.
Does 1-171, Case No. 10-1520 (D.D.C.) (Sullivan, J.).
4
Overall, courts have wide discretion in discovery matters and have also allowed
expedited discovery when “good cause” is shown. See Warner Bros. Records, Inc. v. Does 1-6,
527 F.Supp.2d 1, 2 (D.D.C. 2007); Semitool, Inc. v. Tokyo Electron Am., Inc., 208 F.R.D. 273,
275-76 (N.D. Cal. 2002); Qwest Comm. Int’l, Inc. v. WorldQuest Networks, Inc., 213 F.R.D.
418, 419 (D. Colo. 2003); Entm’t Tech. Corp. v. Walt Disney Imagineering, No. Civ. A. 033546, 2003 WL 22519440, at *4 (E.D. Pa. Oct. 2, 2003) (applying a reasonableness standard: “a
district court should decide a motion for expedited discovery on the entirety of the record to date
and the reasonableness of the request in light of all of the surrounding circumstances”)
(quotations omitted); Yokohama Tire Corp. v. Dealers Tire Supply, Inc., 202 F.R.D. 612, 613-14
(D. Ariz. 2001) (applying a good cause standard).
B. OVERVIEW OF PLAINTIFF’S ALLEGATIONS AND FACTUAL SHOWINGS
As alleged in the complaint, the Doe Defendants, without authorization, used an online
media distribution system to download the copyrighted Motion Picture and distribute it to other
users on the P2P network, including by making the copyrighted Motion Picture for which
Plaintiff holds the exclusive sale and distribution rights available for distribution to others. See
Complaint at ¶12. In the instant case, Plaintiff has engaged Guardaley, Limited (“Guardaley”), a
provider of online anti-piracy services for the motion picture industry, to monitor this infringing
activity. See Declaration of Ben Perino (“Perino Decl.”), ¶¶ 1-2, 10 [attached to this Motion as
Exhibit A]; see also Declaration of Daniel Arheidt (“Arheidt Decl.”) ¶ 1, 6-7 [attached to this
Motion as Exhibit B].
5
1. Overview of the P2P Infringing Activity
The Internet is a vast collection of interconnected computers and computer networks that
communicate with each other. Perino Decl., ¶ 4. It allows hundreds of millions of people
around the world to freely and easily exchange ideas and information, including academic
research, literary works, financial data, music, audiovisual works, graphics, and an unending and
ever-changing array of other data. Id. Unfortunately, the Internet also has afforded opportunities
for the wide-scale infringement of copyrighted motion pictures. Id. Once a motion picture has
been transformed into an unsecured digital format, it can be copied further and distributed an
unlimited number of times over the Internet, without significant degradation in picture or sound
quality. Id.
To copy and distribute copyrighted motion pictures over the Internet, many individuals
use online media distribution systems or so-called P2P networks. Id. at ¶ 5. P2P networks, at
least in their most common form, are computer systems that enable Internet users to (1) make
files (including motion pictures) stored on each user’s computer available for copying by other
users; (2) search for files stored on other users’ computers; and (3) transfer exact copies of files
from one computer to another via the Internet. Id.
At any given moment and depending on the particular P2P network involved, anywhere
from thousands to millions of people, either across the country or around the world, unlawfully
use the P2P network to connect to one another’s computers to upload (distribute) or download
(copy) copyrighted material. Id. at ¶ 6. The P2P systems represent a “viral” distribution of
digital files: each user of the system who copies a digital file from another user can then
distribute the file to still other users and so on, so that copies of an infringing file can be
distributed to millions of people worldwide with breathtaking speed. Id.
6
Further, a person who uses a P2P network is free to use any alias (or “network name”)
whatsoever, without revealing his or her true identity to other users. Perino Decl., ¶ 6. Thus,
while Plaintiff has observed the infringement occurring on the Internet, it does not know the true
identities of those individuals who are committing the infringement. Id.
Additionally, the P2P methodologies for which Guardaley monitored for Plaintiff’s
Motion Picture make even small computers with low bandwidth capable of participating in large
data transfers across a P2P network. Perino Decl., ¶ 7; Arheidt Decl., ¶ 4. The initial fileprovider intentionally elects to share a file using a P2P network. Id. This is called “seeding.”
Id. Other users (“peers”) on the network connect to the seeder to download. Id. As additional
peers request the same file, each additional user becomes a part of the network (or “swarm”)
from where the file can be downloaded. See id. However, unlike a traditional peer-to-peer
network, each new file downloader is receiving a different piece of the data from each user who
has already downloaded that piece of data, all of which pieces together comprise the whole. Id.
This means that every “node” or peer user who has a copy of the infringing copyrighted material
on a P2P network—or even a portion of a copy—can also be a source of download for that
infringing file, potentially both copying and distributing the infringing work simultaneously. Id.
This distributed nature of P2P leads to a rapid viral spreading of a file throughout peer
users. Perino Decl., ¶ 8; Arheidt Decl., ¶ 5. As more peers join the swarm, the likelihood of a
successful download increases. Id. Because of the nature of a P2P protocol, any seed peer who
has downloaded a file prior to the time a subsequent peer downloads the same file is
automatically a possible source for the subsequent peer so long as that first seed peer is online at
the time the subsequent peer downloads a file. Id.
7
2. Preliminary Identification of Defendants
On behalf of Plaintiff, Guardaley engaged in a specific process utilizing its specially
designed software technology to identify direct infringers of Plaintiff’s copyrights using
protocols investigated by Guardley’s software on P2P networks. Arheidt Decl., ¶ 7; see Perino
Decl., ¶ 10. All of the infringers named as Doe Defendants were identified in the following way:
Guardaley software is connected to files of illegal versions of the Motion Picture. Arheidt Decl.,
¶ 8; see Perino Decl., ¶ 10. All infringers connected to those files are investigated through
downloading a part of the file placed on their computer. Id. This evidence is then saved on
Guardaley’s service. Id.
Once Guardaley’s searching software program identifies an infringer in the way
described herein for the Motion Picture for which Plaintiff owns the exclusive licensing and
distribution rights, Guardaley obtains the IP address of a user offering the file for download.
Arheidt, ¶ 9; see Perino Decl., ¶ 10. When available, Guardaley also obtains the user’s
pseudonym or network name and examines the user’s publicly available directory on his or her
computer for other files that lexically match Plaintiff’s Motion Picture. Id. In addition to the file
of the motion picture itself, Guardaley downloads or otherwise collects publicly available
information about the network user that is designed to help Plaintiff identify the infringer. Id.
Among other things, Guardaley downloads or records for each file downloaded: (a) the time and
date at which the file or a part of the file was distributed by the user; (b) the IP address assigned
to each user at the time of infringement; and, in some cases, (c) the video file’s metadata (digital
data about the file), such as title and file size, that is not part of the actual video content, but that
is attached to or contained within the digital file and helps identify the content of the file. Id.
8
Guardaley then creates evidence logs for each user that store all this information in a database.
Id.
An IP address is, in combination with the date, a unique numerical identifier that is
automatically assigned to a user by its ISP each time a user logs on to or accesses the network.
Arheidt Decl., ¶ 10. Each time a subscriber logs on, he or she may be assigned a different (or
“dynamic”) IP address unless the user obtains from his/her ISP a static IP address. Id. ISPs are
assigned certain blocks or ranges of IP addresses by the Internet Assigned Numbers
Authority (“IANA”) or a regional internet registry such as the American Registry for Internet
Numbers (“ARIN”). See id. ISPs keep track of the IP addresses assigned to their subscribers at
any given moment and retain such “user logs” for a very limited amount of time, sometimes as
little as weeks or even days, before erasing the data they contain. Arheidt Decl., ¶ 10; Perino
Decl., ¶ 12. These user logs provide the most accurate—and often the only—means to connect
an infringer’s identity to its infringing activity. Arheidt Decl., ¶ 10.
Although users’ IP addresses are not automatically displayed on the P2P networks, any
user’s IP address is readily identifiable from the packets of publicly available data being
exchanged. Arheidt Decl., ¶ 11. The exact manner in which Guardaley determines a user’s IP
address varies by P2P network. Id.
An infringer’s IP address is significant because it is becomes a unique identifier that,
along with the date and time of infringement, specifically identifies a particular computer using
the Internet. Arheidt, ¶ 12. However, the IP address does not enable Guardaley to ascertain with
certainty the exact physical location of the computer or to determine the infringer’s identity. Id.
It only enables Guardaley to trace the infringer’s access to the Internet to a particular ISP. Id.
Subscribing to and setting up an account with an ISP is the most common and legitimate way for
9
someone to gain access to the Internet. Id. An ISP can be a telecommunications service
provider such as Verizon, an Internet service provider such as America Online, a cable Internet
service provider such as Comcast, or even an entity such as a university that is large enough to
establish its own network and link directly to the Internet. Id.
Here, the IP addresses Guardaley identified for Plaintiff enable Guardaley to determine
which ISP was used by each infringer to gain access to the Internet. Arheidt Decl., ¶ 13.
Publicly available databases located on the Internet list the IP address ranges assigned to various
ISPs. Id. However, some ISPs lease or otherwise allocate certain of their IP addresses to other
unrelated, intermediary ISPs. Id. Since these ISPs consequently have no direct relationship—
customer, contractual, or otherwise—with the end-user, they are unable to identify the Doe
Defendants through reference to their user logs, but they can identify the intermediary ISP to
which that IP address has been allocated. Id. The intermediary ISPs’ own user logs, therefore,
should permit identification of the Doe Defendants. Id.
Guardaley determined that the Doe Defendants here were using ISPs listed in Exhibit C
to Plaintiff’s Motion for Leave to Take Discovery Prior to Rule 26(f) Conference, together with
various other ISPs operating both within and outside the District of Columbia, to gain access to
the Internet and distribute and make available for distribution and copying Plaintiff’s copyrighted
motion picture. Arheidt Decl., ¶ 13. A sample of the IP addresses for the Doe Defendants
Plaintiff has identified as of the date of this Motion are also attached to this Motion as Exhibit
C.3 Plaintiff specifically requests leave to conduct discovery on all of the Doe Defendants it has
been able to identify to date, as well as any other infringers that Plaintiff identifies during the
3
Exhibit C provides the Court with a random sampling of ten (10) IP addresses identified for
Doe Defendants for each Internet Service Provider Plaintiff has identified as providing services
to Doe Defendants that have infringed Plaintiff’s Motion Pictures.
10
course of this litigation, as Plaintiff’s infringement monitoring efforts are on-going and
continuing. Perino Decl., ¶ 13; Arheidt Decl., ¶ 18.
Guardaley then downloaded the motion picture file, or a substantial part of it, and other
identifying information described above and created evidence logs for each Doe Defendant.
Arheidt Decl., ¶ 14; see Perino Decl., ¶ 10. Once Guardaley identified the ISP used by the Doe
Defendants to gain access to the Internet from the IP address, an e-mail was sent to the relevant
contact at each ISP informing them of the Doe Defendant’s IP address and the date and time of
the infringing activity. Arheidt Decl., ¶ 14. That e-mail message requested that each ISP retain
the records necessary to identify its subscriber who was assigned that IP address at that date and
time. Id. Once provided with the IP address, plus the date and time of the infringing activity, the
Doe Defendant’s ISPs quickly and easily can use their respective subscriber logs to identify the
name and address of the ISP subscriber who was assigned that IP address at that date and time.
Id.
Lastly, Guardaley confirms that the digital audiovisual files it downloaded are actual
copies of Plaintiff’s Motion Picture. Arheidt Decl., ¶ 16. It is possible for digital files to be
mislabeled or corrupted; therefore, Guardaley (and accordingly, Plaintiff) does not rely solely on
the labels and metadata attached to the files themselves to determine which motion picture is
copied in the downloaded file, but also to confirm through a visual comparison between the
downloaded file and the Motion Picture themselves. Id.
As to Plaintiff’s copyrighted Motion Picture, as identified in the Complaint, a member of
Guardaley watches a DVD copy of the Motion Picture provided by Plaintiff. Arheidt Decl., ¶ 17.
After Guardaley identified the Doe Defendants and downloaded the motion pictures they were
11
distributing, Guardaley opened the downloaded files, watched them and confirmed that they
contain a substantial portion of the motion picture identified in the Complaint. Id.
C. PLAINTIFF HAS SHOWN GOOD CAUSE FOR THE DISCOVERY AND HAS
MADE A PRIMA FACIE SHOWING THAT DEFENDANTS DID INFRINGE
PLAINTIFF’S COPYRIGHTS.
First, Plaintiff has sufficiently identified the Doe Defendants through the unique IP
address each Doe Defendant was assigned at the time of the unauthorized distribution of the
copyrighted Motion Picture. See Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. at 578-80.
These Defendants gained access to the Internet through their respective ISPs (under cover of an
IP address) only by setting up an account with the various ISPs. The ISPs can identify each
Defendant by name through the IP address by reviewing its subscriber activity logs. Thus,
Plaintiff can show that all Defendants are “real persons” whose names are known to the ISP and
who can be sued in federal court.
Second, Plaintiff has specifically identified the steps taken to identify Defendants’ true
identities. Plaintiff has obtained each Defendant’s IP address and the date and time of the
Defendant’s infringing activities, has traced each IP address to specific ISPs, and has made
copies of the Motion Picture each Defendant unlawfully distributed or made available for
distribution. Therefore, Plaintiff has obtained all the information it possibly can about the
Defendants without discovery from the ISPs.
Third, Plaintiff has asserted a prima facie claim for direct copyright infringement in its
Complaint that can withstand a motion to dismiss. Specifically, Plaintiff has alleged that: (a) it
owns the exclusive rights under the registered copyright for the Motion Picture, and (b) the Doe
12
Defendants copied or distributed the copyrighted Motion Picture without Plaintiff’s
authorization. See Complaint, ¶¶ 9-15. These allegations state a claim for copyright
infringement. See 17 U.S.C. §106(1)(3); In re Aimster Copyright Litig., 334 F.3d 643, 645 (7th
Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004) (“Teenagers and young adults who have access
to the Internet like to swap computer files containing popular music. If the music is copyrighted,
such swapping, which involves making and transmitting a digital copy of the music, infringes
copyright.”); A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014-15 (9th Cir. 2001)
(“Napster users who upload file names to the search index for others to copy violate plaintiffs’
distribution rights. Napster users who download files containing copyrighted music violate
plaintiffs’ reproduction rights”).
Here, good cause exists because ISPs typically retain user activity logs containing the
information sought for only a limited period of time before erasing the data. If that information
is erased, Plaintiff will have no ability to identify the Defendants, and thus will be unable to
pursue its lawsuit to protect its copyrighted work. Where “physical evidence may be consumed
or destroyed with the passage of time, thereby disadvantaging one or more parties to the
litigation,” good cause for discovery before the Rule 26 conference exists. Qwest Comm., 213
F.R.D. at 419; see also Pod-Ners, LLC v. Northern Feed & Bean of Lucerne LLC, 204 F.R.D.
675, 676 (D. Colo. 2002) (allowing discovery prior to Rule 26 conference to inspect items in
defendant’s possession because items might no longer be available for inspection if discovery
proceeded in the normal course).
Good cause exists here for the additional reason that a claim for copyright infringement
presumes irreparable harm to the copyright owner. See UMG Recordings, Inc. v. Doe, 2008 WL
4104214 (N.D. Cal. 2008) (finding good cause for expedited discovery exists in Internet
13
infringement cases, where a plaintiff makes a prima facie showing of infringement, there is no
other way to identify the Doe defendant, and there is a risk an ISP will destroy its logs prior to
the conference); Melville B. Nimmer & David Nimmer, Nimmer on Copyright, § 14.06[A], at
14-03 (2003); Elvis Presley Enter., Inc. v. Passport Video, 349 F.3d 622, 631 (9th Cir. 2003).
The first and necessary step that Plaintiff must take to stop the infringement of its valuable
copyrights and exclusive licensing and distribution rights is to identify the Doe Defendants who
are copying and distributing the Motion Picture. This lawsuit cannot proceed without the limited
discovery Plaintiff seeks because the ISPs are the only entities that can identify the otherwise
anonymous Defendants. Courts regularly permit early discovery where such discovery will
“substantially contribute to moving th[e] case forward.” Semitool, 208 F.R.D. at 277.
Finally, Defendants have no legitimate expectation of privacy in the subscriber
information they provided to the ISPs much less in downloading and distributing the copyrighted
Motion Picture without permission. See Interscope Records v. Does 1-14, 558 F. Supp. 2d 1176,
1178 (D. Kan. 2008) (a person using the Internet to distribute or download copyrighted music
without authorization is not entitled to have their identity protected from disclosure under the
First Amendment); see also Arista Records LLC v. Does 1-19, 551 F. Supp. 2d 1, 8-9 (D.D.C.
Apr. 28, 2008) (Kollar-Kotelly, J.) (finding that the “speech” at issue was that doe defendant’s
alleged infringement of copyrights and that “courts have routinely held that a defendant’s First
Amendment privacy interests are exceedingly small where the ‘speech’ is the alleged
infringement of copyrights”); Guest v. Leis, 255 F.3d 325, 336 (6th Cir. 2001) (“computer users
do not have a legitimate expectation of privacy in their subscriber information because they have
conveyed it to another person—the system operator”); Sony Music Entm’t, Inc. v. Does 1–40,
326 F. Supp. 2d 556, 566 (S.D.N.Y. 2004) (“defendants have little expectation of privacy in
14
downloading and distributing copyrighted songs without permission”); Arista Records, LLC v.
Doe No. 1, 254 F.R.D. 480, 481 (E.D.N.C. 2008); U.S. v. Hambrick, 55 F. Supp. 2d 504, 508
(W.D. Va. 1999), aff’d, 225 F.3d 656 (4th Cir. 2000). This is because a person can have no
legitimate expectation of privacy in information he or she voluntarily communicates to third
parties. See, e.g., Smith v. Maryland, 442 U.S. 735, 743-44 (1979); U.S. v. Miller, 425 U.S. 435,
442-43 (1976); Couch v. U.S., 409 U.S. 322, 335-36 (1973); Guest v. Leis, 255 F.3d at 335; U.S.
v. Kennedy, 81 F. Supp. 2d 1103, 1110 (D. Kan. 2000); U.S. v. Hambrick, 55 F. Supp. 2d at 508.
Although Defendants copied and distributed the Motion Picture without authorization
using fictitious user names, their conduct was not thus anonymous. Using publicly available
technology, the unique IP address assigned to each Defendant at the time of infringement can be
readily identified. When Defendants entered into a service agreement with the ISPs, they
knowingly and voluntarily disclosed personal identification information to it. As set forth above,
this identification information is linked to the Defendant’s IP address at the time of infringement,
and recorded in the ISP’s respective subscriber activity logs. Because Defendants can, as a
consequence, have no legitimate expectation of privacy in this information, this Court should
grant Plaintiff leave to seek expedited discovery of it. Absent such leave, Plaintiff will be unable
to protect its copyrighted Motion Picture from continued infringement.
Where federal privacy statutes authorize disclosure pursuant to a court order, courts have
held that a plaintiff must make no more than a showing of relevance under the traditional
standards of Rule 26. See Laxalt v. McClatchy, 809 F.2d 885, 888 (D.C. Cir 1987) (court found
“no basis for inferring that the statute replaces the usual discovery standards of the FRCP . . .
with a different and higher standard”); Pleasants v. Allbaugh, 208 F.R.D. 7, 12 (D.D.C. 2002);
accord Lynn v. Radford, No. 99-71007, 2001 WL 514360, at *3 (E.D. Mich. 2001); Gary v.
15
United States, No. 3:97-CV-658, 1998 WL 834853, at *4 (E.D. Tenn.); see also In re Gren, 633
F.2d 825, 828 n.3 (9th Cir. 1980) (“court order” provision of Fair Credit Reporting Act requires
only “good faith showing that the consumer records sought are relevant”) (internal quotation
omitted). Plaintiff clearly has met that standard, as the identity of Defendants is essential to
Plaintiff’s continued prosecution of this action.
III. CONCLUSION
For the foregoing reasons, Plaintiff respectfully submits that the Court should grant the
Motion for Leave to Take Discovery Prior to Rule 26 Conference and enter an Order
substantially in the form of the attached Proposed Order. Plaintiff requests permission to serve a
Rule 45 subpoena on the ISPs it has identified as of this date, and those it identifies in the future,
so that the ISPs can divulge the true name, address, telephone number, e-mail address, and MAC
address of each Doe Defendant that Plaintiff has identified to date, and those it identifies in the
future during the course of this litigation and an order that the ISPs shall comply with the
subpoenas. To the extent that any ISP, in turn, identifies a different entity as the ISP providing
network access and online services to the Doe Defendants, Plaintiff also seeks leave to serve, on
any such later identified ISP, limited discovery sufficient to identify the Doe Defendant prior to
the Rule 26 conference.
Plaintiff will only use this information to prosecute its claims. Without this information,
Plaintiff cannot pursue its lawsuit to protect its Motion Picture from past and ongoing, repeated
infringement.
16
Respectfully submitted,
NU IMAGE, INC.
DATED: February 17, 2011
By:
/s/
Thomas M. Dunlap (D.C. Bar # 471319)
Nicholas A. Kurtz (D.C. Bar # 980091)
DUNLAP, GRUBB & WEAVER, PLLC
1200 G Street, NW Suite 800
Washington, DC 20005
Telephone: 202-316-8558
Facsimile: 202-318-0242
tdunlap@dglegal.com
nkurtz@dglegal.com
Attorneys for the Plaintiff
17
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?