Disney Enterprises, Inc. et al v. Hotfile Corp. et al
Filing
118
REPLY to Response to Motion re 104 Plaintiff's MOTION for Protective Order PLAINTIFFS' MOTION FOR A PROTECTIVE ORDER REGARDING PLAINTIFFS' ANTIPIRACY INVESTIGATIONS AND ENFORCEMENT PROCEDURES filed by Columbia Pictures Industries, Inc., Disney Enterprises, Inc., Twentieth Century Fox Film Corporation, Universal City Studios Productions LLLP, Warner Bros. Entertainment Inc.. (Attachments: # 1 Exhibit A)(Stetson, Karen)
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF FLORIDA
CASE NO. 11-20427-JORDAN
DISNEY ENTERPRISES, INC.,
TWENTIETH CENTURY FOX FILM CORPORATION,
UNIVERSAL CITY STUDIOS PRODUCTIONS LLLP,
COLUMBIA PICTURES INDUSTRIES, INC., and
WARNER BROS. ENTERTAINMENT INC.,
Plaintiffs,
v.
HOTFILE CORP., ANTON TITOV, and
DOES 1-10.
Defendants.
/
PLAINTIFFS’ REPLY MEMORANDUM OF LAW IN SUPPORT OF
PLAINTIFFS’ MOTION FOR A PROTECTIVE ORDER REGARDING
PLAINTIFFS’ ANTIPIRACY INVESTIGATIONS AND ENFORCEMENT
PROCEDURES
Plaintiffs’ motion for a protective order, supported by testimony from each
Plaintiff’s responsible in-house counsel, demonstrates that the strategies Plaintiffs use to
detect and respond to online infringement of their copyrighted works are highly sensitive
and kept in close confidence. Armed with information about which online locations
Plaintiffs police, how they identify infringing content, which works they protect at which
times, and which types of infringement trigger enforcement action, online content thieves
– in particular the pirate “link” sites that are Defendants’ paid “Affiliates” – could readily
circumvent those efforts. In opposition, Defendants fail even to acknowledge Plaintiffs’
counsels’ testimony, much less refute it. Before engaging in such intrusive and
prejudicial discovery, Defendants must do more than come up with speculative theories
of relevance. But that is all they have done. Even then, most of Defendants’ theories are
premised on a fundamental misreading of the DMCA and cannot bear scrutiny.
ARGUMENT
I.
DEFENDANTS’ LAUNDRY LIST OF THEORIES ONLY CONFIRMS
1
THAT THE ANTIPIRACY MATERIALS ARE IRRELEVANT.
The fact that Plaintiffs sent takedown notices, and the nature of Defendants’
responses to those notices, are relevant to Defendants’ being put on notice as to the sheer
scale of the infringement on their site, and to Defendants’ ability to claim the DMCA safe
harbor with respect to the specific infringements for which they received notices. There
is no dispute as to that. Importantly, Plaintiffs are already producing all such takedown
notices and have offered to produce their internal records of Defendants’ responses to
those notices. But there is no relevance whatsoever to other materials sought by
Defendants’ subpoenas, such as how Plaintiffs and their vendors select titles for
enforcement and generate takedown notices, which websites they monitor for
1
Defendants’ suggestion that Plaintiffs lack standing to bring this motion is incorrect.
See Opp. at 6. Indeed, the only case cited by Defendants, Bender v. Tropic Star Seafood,
Inc., No. 4:07-cv-438-SPM/WCS, 2008 WL 2824450, at *2 (N.D. Fla. July 21, 2008),
itself provides that “[a] party has standing to object to this third-party subpoena duces
tecum with respect to privilege, trade secrets, confidential research, commercial
information, or similar grounds personal to the party.” Id. at *2 n.1. That is precisely
what Plaintiffs have done. A party also may raise relevance objections to third-party
discovery. See Armor Screen Corp. v. Storm Catcher, Inc., No. 07-81091-Civ., 2008 WL
5049277, at *2 (S.D. Fla. Nov. 25, 2008).
infringement and the times at which they do so, or which instructions and advice
Plaintiffs exchange with their vendors, and Defendants have not shown any.
Instead, Defendants deluge the Court with a sea of contrived reasons why
Plaintiffs’ antipiracy strategies and procedures are supposedly relevant, apparently
hoping that the sheer number of arguments will make up for their unpersuasiveness.2 In
fact, most of the theories are transparently specious. As for those with any marginal
merit, Plaintiffs have already agreed to produce responsive information. Otherwise,
Defendants’ demands are really just an application for a license to go on a fishing
expedition that could potentially highly prejudice Plaintiffs’ antipiracy operations.
Most of Defendants’ relevance arguments are predicated upon a fundamental
misunderstanding of the DMCA. Because the DMCA deprives service providers of a
safe harbor if they fail to remove files identified as infringing in takedown notices, see 17
U.S.C. § 512(c)(1)(C), Defendants incorrectly conclude that the DMCA obligates
copyright owners to send notices. Based on that misapprehension, they erroneously
conclude that the processes by which the Plaintiffs searched for and found infringements,
as well as the reasons behind their decisions to send notices, are relevant to this case. See
Opp. at 10, 11-12. But that is not how the DMCA works. The DMCA does not require
copyright owners to send notices at all. See Mot at 4-5.3 To be eligible for DMCA safe
harbor, Defendants must satisfy several independent requirements; responding to notices
is just one of them. See Id. at 4. If notices are sent, a service provider’s eligibility for
DMCA safe harbor turns on whether the notice contains the requisite statutory elements
and whether the service provider properly responds to it – not why the copyright owner
sent it, how the copyright owner learned of the infringement, or what other or additional
2
Defendants further confuse matters, seemingly by design, by failing to explain which
theories of relevance relate to which requests for production.
3
Defendants, Opp. at 12, misleadingly quote from Perfect 10, Inc. v. Visa Int’l Serv.
Ass’n, 494 F.3d 788, 795 n.4 (9th Cir. 2007), to argue that copyright owners are obligated
to send notices. However, the cited passage does not support that proposition. It refers to
a different issue – notices that do not contain the required statutory elements. To
encourage compliant notices, Congress provided that substantially non-compliant notices
cannot be considered in determining whether a service provider has actual knowledge of
infringement. 17 U.S.C. § 512(c)(3)(B)(i). Defendants take the Visa quote far out of
context. There is no authority or good faith argument that copyright owners are obligated
to send DMCA notices.
2
things the copyright owner could have done instead. When the DMCA is properly
understood, Defendants’ theories of relevance fall away.
1. Defendants’ Knowledge and Control: Defendants’ principal argument is that
Plaintiffs’ strategies for searching for infringements on the Internet, and for responding to
infringements once they are discovered, are somehow relevant to Defendants’ knowledge
of and ability to control infringements on Defendants’ website.4 Opp. at 8. First, to state
the obvious, Defendants’ knowledge and Defendants’ ability to control infringement on
Defendants’ website have nothing to do with Plaintiffs’ strategies about how to find and
respond to acts of online infringement. There is nothing Defendants could learn from
Plaintiffs’ strategies, except how to circumvent them. They will cast no light on what
Defendants know about infringement on their site, what strategies are available to
Defendants to deal with it, or whether Defendants made use of any of those strategies.
Plaintiffs’ strategies are especially irrelevant given that no one external to Hotfile
has any visibility whatsoever into Hotfile’s system. Plaintiffs cannot see what files are
stored on Hotfile’s servers, how many are infringing and how many (if any) are not.
Instead, like astronomers looking at some far off dark planet, outsiders like the Plaintiffs
must surmise what is going on inside of Hotfile by seeking clues outside of it – clues like
links to movies on linking sites or blogs – or clues like the data streams that begin
flowing from Hotfile when one clicks on one of the links posted on a linking site.
Because of the striking asymmetry between what Defendants know about Hotfile,
and what outsiders like Plaintiffs know, outsiders trying to find infringing content on
Hotfile must use completely different tools, strategies and mechanisms than those
available to Defendants. See Mot. at 6. Defendants fail to address that critical
distinction. But it renders the discovery Defendants seek wholly irrelevant.5
4
See 17 U.S.C. § 512(c)(1)(A) (denying safe harbor to service providers that have actual
knowledge of infringing activity or are aware of facts and circumstances from which such
activity is apparent); 17 U.S.C. § 512(c)(1)(B) (denying safe harbor to service providers
that have the right and ability to control infringing activity and receive a financial benefit
attributable to infringing activity).
5
The filtering technology Defendants could use to identify infringing content on their
servers is publicly available, as even Defendants acknowledge, Opp. at 17, and it is wellknown to Defendants; indeed, Defendants appear to have recently started using it. The
parties also have agreed that Plaintiffs will produce to Defendants materials analyzing the
3
2. Files For Which Notices Were Not Sent: Again misconstruing the DMCA,
Defendants claim that they are entitled to know if Plaintiffs declined to issue notifications
with respect to any infringing files on Hotfile. Opp. 8-9. But, as discussed above, under
the DMCA, Plaintiffs have the right to decide to send notices or not, for any reason.6
See, e.g., UMG Recordings, Inc. v. Veoh Networks Inc., No. CV 07-5744 AHM (AJWx),
2010 WL 1407316, at *1 (C.D. Cal. April 6, 2010) (“That UMG declined to avail itself of
the DMCA’s notice and takedown procedures could…easily reflect a good-faith belief on
UMG’s part that Veoh did not qualify for DMCA safe-harbor protection…”).
Defendants’ argument about “fair use,” Opp. at 8, is inapposite speculation. Defendants
are being sued for distributing full-length movies and television programs, not the short
clips at issue in the YouTube case Defendants cite. There is no credible claim that
distribution to the public of full-length, unlicensed movies or television could be fair use.
See, e.g., BMG Music v. Gonzalez, 430 F.3d 888, 889-91 (7th Cir. 2007); A&M Records,
Inc. v. Napster, Inc., 239 F.3d 1004, 1014-18 (9th Cir. 2001).
Defendants also claim to need discovery into Antipiracy Materials to determine
whether any content was “authorized” for distribution through Hotfile (because
authorized files might constitute a “substantial noninfringing use”). Opp. at 8-9. But
Defendants do not need to go on a fishing expedition to find out if Plaintiffs authorized
distribution of content through Hotfile. Defendants can simply ask Plaintiffs that
question directly – and already have.7
3. Counterclaim: Defendants claim they need discovery for a counterclaim they
might bring against one Plaintiff. Id. at 9 But that is not how discovery works: parties
are not entitled to take discovery for a counterclaim they have not pleaded, nor against
effectiveness, advantages or disadvantages of such filtering technology. Plaintiffs’
processes for locating links to infringing content on third party websites, which have
nothing to do with that filtering technology, is irrelevant.
6
See Paramount Pictures Corp. v. Carol Publ’g Group, 11 F. Supp. 2d 329, 337
(S.D.N.Y. 1998) (“[T]here is no legal duty to instigate legal proceedings.”); Patry on
Copyright § 5:155 (copyright owners have discretion whether to sue on claims).
7
See, e.g., Defs.’ RFP to Pls. No. 16 (seeking all documents “evidencing any authorized
uploading, downloading or sharing on the Internet of any works YOU own”). In
response , Plaintiffs have offered to provide Defendants with information to demonstrate
that, in fact, there are no “authorized” distributions of Plaintiffs’ works through Hotfile.
4
parties (such as the other four Plaintiffs, and their vendors) against whom they have not
even threatened a counterclaim. Respectfully, if Defendants have a good faith basis for
bringing a counterclaim, they can bring it, but they are not entitled to intrusive discovery
on claims not in the case. Moreover, as to the one Plaintiff that Defendants claim once
removed some files in error, the parties have scheduled a Rule 30(b)(6) deposition so that
Defendants may satisfy themselves that there is no basis for any claim. Defendants have
not even suggested a claim against any other Plaintiff, and nothing in the other Plaintiffs’
or vendors’ files could conceivably be relevant to the claim Defendants have threatened.
4. Complaint Allegations that Reference Takedowns: Defendants assert that
Plaintiffs’ Complaint has somehow put their antipiracy efforts “in issue.” Opp. at 10.
That is incorrect, and Defendants must mischaracterize Plaintiffs’ allegations in the
Complaint to even make the argument.
The Complaint alleges that Plaintiffs must continuously send takedown notices to
Hotfile while Defendants induce users to continually upload new infringing files. Compl.
¶ 37. It also alleges that Hotfile implemented a specific feature on its site that creates
multiple copies of the same uploaded file, each with its own link, thereby ensuring that
infringing files remain accessible on the Hotfile system even after one of the links is
disabled in response to a takedown notice. Id. ¶ 38. It was this specific feature that
Plaintiffs alleged “stymie[d]” the effectiveness of their takedown notices. Id. Neither of
these allegations has any relationship to the processes or decision-making behind
Plaintiffs’ takedown notices, and Plaintiffs have never suggested otherwise. In any event,
relevance turns on whether a matter actually relates to a claim or a defense in a case, not
on whether it can be tied in some tangential way to a statement in a complaint.8
5. Estoppel: Defendants claim they need to explore whether Plaintiffs should be
“estopped” from suing on particular files because they declined to issue notifications for
those files. Opp. at 11. Defendants’ estoppel defense is one that no court has ever
8
Defendants’ theory – that it is relevant whether Plaintiffs are “overwhelmed” by or
“helpless” to stop infringement of their content, Opp. at 10 – again relies on a
fundamental misunderstanding of the DMCA. Plaintiffs are not required to send, or
prove their inability to send, takedown notices, or otherwise address their ability or
inability to police their content online. See supra at 2-3. Eligibility for DMCA safe
harbor turns on Defendants’ conduct alone.
5
sanctioned, and that directly conflicts with the structure of the DMCA. The courts and
Congress have both emphatically rejected the notion that sending a takedown notice is a
prerequisite to an infringement suit; not issuing a notice cannot bar an infringement
claim. See Mot. at 4-5. An estoppel defense is also unavailable to Defendants for an
additional reason: in the Eleventh Circuit, an estoppel defense requires proof that “the
copyright owner acted such that the alleged infringer has a right to believe” the use of the
work is authorized and “relies on the copyright owner’s conduct to his detriment.” HGI
Assocs., Inc. v. Wetmore Printing Co., 427 F.3d 867, 875 (11th Cir. 2005). Here
Defendants do not identify any conduct by the copyright owners that they relied upon as
authorization to use their works and cannot rely on the absence of takedown notices
because copyright owners are under no obligation to send notices at all.
6. Plaintiffs’ and Defendants’ DMCA Compliance: Defendants repeat their
argument that discovery is needed to prove both Plaintiffs’ and Defendants’ “compliance
under the DMCA,” Opp. at 11-13, but their argument consists of nothing but vague
generalizations about the need to have a “full understanding of the issue.” Id. at 12. The
only portion of the Antipiracy Materials with any conceivable relevance to the issue of
Defendants’ compliance with the DMCA is the portion comprising Plaintiffs’ takedown
notices, all of which are being produced to the Defendants.9 These notices are valid if
they contain the required statutory elements set forth in 17 U.S.C. § 512(c)(3)(A).
Compliance with that requirement can be determined by looking at the notices. There is
no need to produce copious, proprietary documentation pertaining to Plaintiffs’ antipiracy
strategies and methods. Whether Hotfile behaved consistently with the requirements of
the DMCA notice provision depends on whether it expeditiously blocked access to
infringing content identified in takedown notices. 17 U.S.C. § 512(c)(1)(C). That is
determined exclusively by looking to Defendants’ conduct, and the evidence relating to
that conduct – records identifying what Defendants did in response to takedown notices
9
Defendants ascribe sinister motive to the fact that Plaintiffs “unilaterally gathered”
documents from the antipiracy vendors. Opp. at 17. But Plaintiffs gathered takedown
notices and certain other documents to produce them to Defendants. Moreover, contrary
to the impression Defendants try to create, Opp. at 3, Plaintiffs identified the antipiracy
vendors in their initial disclosures on the single issue that they “sent [notices] to Hotfile
on behalf of the plaintiff[s].” That does not open up all of Plaintiffs’ antipiracy
operations to irrelevant discovery.
6
are exclusively in Defendants’ possession. The processes, decisions and strategies
related to a copyright owner’s investigation of infringement and preparation of a
takedown notice have no bearing on a service provider’s compliance with the DMCA.
*
*
*
Finally, Defendants rely on Viacom Int’l Inc. v. YouTube Inc., No. C-08-80211
MISC. JF (PVT), 2009 WL 102808 (N.D. Cal. Jan. 14, 2009). However, the facts in that
case stand in stark contrast to the facts here. In YouTube: (i) the alleged infringement
principally involved short video clips rather than full-length movies and television
programs, raising the issue of whether arguable fair use claims might complicate
identification of infringing clips; (ii) it was accepted that copyright owners were
themselves uploading video clips to YouTube; and (iii) the plaintiffs had alleged that
“YouTube obstructs plaintiffs’ efforts to locate” their works on the site. Id. at *1. And
the antipiracy vendor did “not dispute[] the relevance of the document requests as they
relate to plaintiffs.” Id. at *4. The principal issues litigated appear to have been burden
and cost shifting. YouTube does not support Defendants’ discovery here.
II.
DEFENDANTS HAVE NOT MADE THE REQUIRED HEIGHTENED
SHOWING OF NECESSITY ESSENTIAL TO OBTAIN HIGHLY
PREJUDICIAL DISCOVERY.
Defendants’ theories of relevance are truly baseless; the one or two marginal
theories pertain to discovery that Plaintiffs have already agreed to provide. Defendants’
pitiful showing cannot begin to meet the burden required for discovery of Plaintiffs’
highly sensitive and closely-guarded antipiracy functions carried out by Plaintiffs’ inhouse counsel and persons acting at their direction. Courts “balance the party’s interest
in obtaining access against the other party’s interest in keeping the information
confidential.” Chicago Tribune Co. v. Bridgestone/Firestone, Inc., 263 F.3d 1304, 1313
(11th Cir. 2001); Harrison v. Burlage, No. 08-80989-CIV, 2009 WL 2230794, at *4
(S.D. Fla. July 23, 2009). Indeed, even where materials are potentially relevant, courts
routinely use their authority under Rule 26 to bar discovery where the potential
evidentiary value is outweighed by the potential prejudice from discovery. See, e.g.,
Zeng Liu v. Donna Karan Int’l, Inc., 207 F. Supp. 2d 191, 192-93 (S.D.N.Y. 2002)
(“even if such discovery were relevant . . . the risk of injury to the plaintiffs if such
[confidential immigration documents] were disclosed outweighs the need for its
7
disclosure”); In re Del-Val Fin. Corp. Sec. Litig., 158 F.R.D. 275, 277 (S.D.N.Y. 1994)
(denying discovery where “the potential harm of releasing [confidential documents]
outweighs their possible relevance”); Flynn v. Goldman Sachs & Co., No. 91 CIV. 0035,
1993 WL 362380, at *3 (S.D.N.Y. Sept. 16, 1993) (“the relevance of the material
contained in the [confidential] documents is too weak for me to find that the plaintiff’s
need outweighs the harm that would be caused by disclosure”). This is no less true in
cases where discovery materials are subject to confidentiality orders. See infra at 9;
Fambo v. Alterra Healthcare Corp., No. 08-CV-795S, 2010 WL 335013, at *3
(W.D.N.Y. Jan. 22, 2010) (refusing to order production of sensitive material not shown to
be relevant despite presence of protective order); Viacom Int’l Inc. v. YouTube Inc., 253
F.R.D. 256, 260 (S.D.N.Y. 2008) (protective order insufficient without justification for
production of sensitive material). Any balancing must be resolved in Plaintiffs’ favor.
A. Plaintiffs’ Testimony Demonstrates the Prejudice From Disclosure.
Each of Plaintiffs’ in-house counsel submitted declarations in support of
Plaintiffs’ Motion for a Protective Order explaining in detail, including by specific
examples, how improper disclosure of online investigative and enforcement strategies
and processes could result in circumvention of their antipiracy efforts. See Docket Nos.
106-10 at ¶ 6; 106-11 at ¶¶ 6-7, 106-12 at ¶ 8, 106-13 at ¶ 5, 106-14 at ¶¶ 6-7.
Defendants do not even attempt to rebut this testimony. Instead, Defendants falsely
assert that Plaintiffs have offered only “conclusory statements” in support of their
motion. See Opp. at 14. Plaintiffs’ detailed, unrebutted testimony establishes that
improper disclosure of their Antipiracy Materials could severely prejudice Plaintiffs.
Where the materials are not even relevant, there is no reason to take such a risk.
Plaintiffs’ testimony also establishes that Plaintiffs keep certain information about
their antipiracy operations, such as their means of locating and identifying infringing
content and their criteria for issuing notifications of infringement, in strict confidence.
See Docket Nos. 106-10 at ¶ 7; 106-11 at ¶¶ 4-5, 106-12 at ¶ 9, 106-13 at ¶ 4, 106-14 at ¶
8. Defendants’ argument to the contrary, Opp. at 15, is supported only by an inapposite
newspaper article reporting that one antipiracy vendor publicly discussed some generic
information about its work for a different client on a different case. See Opp. at 15. But
Plaintiffs are not bringing this motion to defend the vendors’ trade secrets, they are
8
bringing it to protect their own. Defendants have failed to rebut Plaintiffs’ evidence that
the Antipiracy Materials in question are highly sensitive. Indeed, it is intuitively obvious
that content owners’ antipiracy strategies are extremely sensitive.
B. Defendants Fail to Make a Showing of Necessity.
Because Defendants have not shown that the Antipiracy Materials are even
relevant, they obviously cannot make the even higher showing that they are necessary to
their case. Further, Defendants’ concession that evidence about the available
mechanisms for identifying infringing content online “may be publicly available,” Opp.
at 17, defeats any claim that they need discovery of how Plaintiffs search for their content
in order to prove what Defendants can or cannot do. Defendants have plainly failed to
make the required showing of necessity.
C. The Protective Order Does Not Cure the Prejudice to Plaintiffs.
The existence of a protective order does not eliminate the potential prejudice to
Plaintiffs, particularly where, as here, Defendants themselves – and the pirate link sites
that are Defendants’ paid “Affiliates” – are the very targets of Plaintiffs’ antipiracy
efforts. Fundamentally, a protective order is not a cure for a lack of relevance. See, e.g.,
Fambo, 2010 WL 335013, at *2-*3. And contrary to Defendants’ suggestion, the mere
existence of a protective order limiting sensitive materials to attorneys only is not a
panacea. Even a “careful and extensive” protective order is “not as safe as
nondisclosure,” and there should be “no occasion to rely on them, without a preliminary
proper showing justifying production” of sensitive material. YouTube, 253 F.R.D. at 260.
See also, e.g., Bell Atl. Bus. Sys. Serv., Inc. v. Hitachi Data Sys. Corp., No. M8-85, 1995
WL 13115, at *1 (S.D.N.Y. Jan. 13, 1995) (“no protective order could possibly be
devised which could guarantee security for the [confidential material] once it left IBM’s
hands”); In re Worlds of Wonder Sec. Litig., 147 F.R.D. 214, 216 (N.D. Cal. 1992)
(existing protective order “inadequate” to guard trade secrets); Specialty Chems. &
Servs., Inc. v. Chandler, No. Civ. A. 1:87 CV-2338 MHS, 1988 WL 618583, at *8 (N.D.
Ga. Sept. 29, 1988) (“the possible injury that would ensue from disclosure, even under a
protective order, outweighs defendants’ need for the information”). Defendants cannot
use the attorneys’ eyes only provision as justification to obtain materials that are not a
proper subject of discovery in the first place.
9
III.
PLAINTIFFS’ MOTION IS TIMELY UNDER THE COURT’S ORDER AT
THE JULY 8, 2011 STATUS CONFERENCE.
Defendants also claim that this motion was untimely filed. That claim is devoid
of merit. This motion was filed on July 22, 2011– the date by which the Court directed it
could be timely filed. Defendants’ inexplicable argument to the contrary ignores the
Court’s order at the July 8, 2011 status conference.
Early in discovery in this case, to allow for a greater opportunity to meet and
confer, the parties stipulated and moved the Court for an order that “all motions of the
parties related to discovery, including … motions for protective order, shall be filed
within sixty (60) days of the occurrence of the grounds of the motion.” Docket No 69-1
at 1 (emphasis added). The court denied that joint motion without prejudice. However,
because both sides had been operating in reliance on the parties’ stipulation, at the July 8,
2011 status conference, the Court instructed the parties that any motions rendered
untimely by its denial of that motion, which includes Plaintiffs’ protective order motion,
would be timely if filed by July 22, 2011. July 8, 2011 Tr. at 14:1-6, 15:4-10 (attached
hereto as Exhibit A). Plaintiffs filed on July 22.10 Defendants’ arguments about the dates
on which a motion for a protective order might otherwise have been due in the absence of
the parties’ stipulation or the Court’s order, Opp. at 5-6, are academic.11
CONCLUSION
For the reasons stated, Plaintiffs respectfully request that the Court grant
Plaintiffs’ motion for a protective order.
10
Although Defendants cite to the Court’s subsequent order further extending the
deadline for motions to compel, see Opp. at 6 n.7, that order has nothing to do with the
timeliness of the present motion. That order merely extended the deadline for certain
motions beyond the initial court-ordered date of July 22. Whether or not that order
applied to protective orders is irrelevant, since Plaintiffs filed the current motion for a
protective order on the initial July 22, 2011 date ordered by the Court.
11
Equally baseless is Defendants’ complaint that Plaintiffs did not recite the full text of
each and every discovery request that Plaintiffs reference in their motion. See Opp. at 3
n.5. Plaintiffs are not separately moving on those other requests, but rather seek an
instruction from the Court that Defendants may not use broad readings of their other
more general discovery requests to circumvent any relief Plaintiffs obtain with respect to
the specific requests for which they seek a protective order.
10
Dated: August 12, 2011
Respectfully submitted,
By: /s/ Karen L. Stetson
Karen L. Stetson
GRAY-ROBINSON, P.A.
1221 Brickell Avenue
16th Floor
Miami, Fl 33131
Telephone: (305) 461-6880
Facsimile: (305) 461-6887
MOTION PICTURE ASSOCIATION
OF AMERICA, INC.
Karen R. Thorland (Pro Hac Vice)
15301 Ventura Blvd.
Building E
Sherman Oaks, CA 91403
Phone: (818) 995-6600
Fax: (818) 285-4403
JENNER & BLOCK LLP
Steven B. Fabrizio (Pro Hac Vice)
Duane C. Pozza (Pro Hac Vice)
Luke C. Platzer (Pro Hac Vice)
1099 New York Ave., N.W.
Suite 900
Washington, DC 20001
Telephone: (202) 639-6000
Facsimile: (202) 639-6066
Attorneys for Plaintiffs
11
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?