Disney Enterprises, Inc. et al v. Hotfile Corp. et al
Filing
85
REPLY to Response to Motion re 72 Plaintiff's MOTION to Compel RESPONSES TO REQUESTS FOR PRODUCTION OF DOCUMENTS AND INTERROGATORIES (Public Redacted Version)Plaintiff's MOTION to Compel RESPONSES TO REQUESTS FOR PRODUCTION OF DOCUMENTS AND INTERROGATORIES (Public Redacted Version) PLAINTIFFS' REPLY MEMORANDUM IN SUPPORT OF MOTION TO COMPEL (PUBLIC REDACTED VERSION) filed by Columbia Pictures Industries, Inc., Disney Enterprises, Inc., Twentieth Century Fox Film Corporation, Universal City Studios Productions LLLP, Warner Bros. Entertainment Inc.. (Stetson, Karen)
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF FLORIDA
CASE NO. 11-20427-JORDAN
DISNEY ENTERPRISES, INC.,
TWENTIETH CENTURY FOX FILM CORPORATION,
UNIVERSAL CITY STUDIOS PRODUCTIONS LLLP,
COLUMBIA PICTURES INDUSTRIES, INC., and
WARNER BROS. ENTERTAINMENT INC.,
Plaintiffs,
v.
HOTFILE CORP., ANTON TITOV, and
DOES 1-10.
Defendants.
/
PLAINTIFFS’ REPLY MEMORANDUM IN SUPPORT OF MOTION TO COMPEL
RESPONSES TO REQUESTS FOR PRODUCTION OF DOCUMENTS AND
INTERROGATORIES
PUBLIC REDACTED VERSION
Through more than four weeks of active negotiations with plaintiffs, the only significant
objections defendants argued were relevance and burden; defendants now abandon those
objections altogether. Platypus Wear, Inc. v. Clarke Modet & Co., No. 06-20976-CIV, 2007 WL
4557158, at *2-3 (S.D. Fla. Dec. 21, 2007) (objections not raised in response to motion to
compel are waived). Defendants’ new objections do not fare any better. As for Content
Reference and User Data, defendants now rest their argument on the Stored Communications Act
(“SCA”), an objection that can only be termed frivolous given that “consent” is an express
exception to the SCA and defendants’ users have contractually consented to disclosure of the
requested information. As for Affiliate Data, plaintiffs are seeking the identities only of
defendants’ most highly paid Affiliates – each of whom defendants have paid [------------------------] to upload or host links to infringing content. In the structure of defendants’ business, these
top Affiliates are defendants’ key business associates. Plaintiffs are entitled to know who they
are because they are likely to be some of the most important witnesses and sources of discovery
in this case. As for source code, defendants all but ignore the legion of comparable cases in
which courts have ordered production of and ultimately relied on source code, and analyses
based on source code, as key evidence. Instead, defendants rely on a single ruling. But Viacom
is sui generis in that the source code at issue there involved what is arguably one of the most
valuable and guarded trade secrets in the world, the secret algorithms for the Google search
engine. This case raises no such extraordinary circumstances. Finally, on revenue data,
defendants fail to rebut the obvious relevance of the limited data plaintiffs are seeking.
There is nothing unusual about the discovery plaintiffs are seeking. These are the same
categories of discovery routinely sought and produced in comparable cases, and heavily relied on
by courts in finding comparable infringers liable.1
1
In ten pages plaintiffs cannot untangle defendants’ many misstatements and false accusations.
But, to be clear, there is no corporate relationship between any plaintiff and UMG Recordings
or the Veoh case (Opp. at 2); plaintiffs did not “ambush” defendants with this motion (id.), but
rather filed only after extensive negotiation and after the parties had acknowledged that they
had exhausted productive discussion on these issues, see Reply Declaration of Duane C. Pozza
in Support of Motion to Compel (“Pozza Reply Decl.”) ¶¶ 2-4; and, remarkably, defendants
falsely attribute their colorful “murder by litigation” quote to Nimmer, Opp. at 1, who does not
appear to have ever said it. Defendants already have been chastised for having
“mischaracterized” a governing legal standard, Order, Dkt #59, at n.3; defendants’ opposition
seems to be more of the same. Plaintiffs stand ready to respond in detail to any of defendants’
false accusations as the Court would like. Here, plaintiffs will stick to the issues.
ARGUMENT
I.
The Requested Content Reference and User Data Should Be Produced.
Defendants’ objection to producing complete Content Reference and User Data is
premised on the argument that the SCA somehow prohibits the discovery. According to
defendants, because the SCA prohibits disclosure of the content files, plaintiffs have no right to
the full Content Reference and User Data and plaintiffs’ “proposed statistical analysis [is]
impossible.” Opp. at 7. But defendants are wrong about the SCA.
The SCA is inapplicable because defendants’ users contractually agree to the disclosure
of this information both in Hotfile’s Terms of Service and in its Privacy Policy. The SCA
explicitly permits disclosure pursuant to “the lawful consent of the originator or … the subscriber
in the case of [a] remote computing service.” 18 U.S.C. § 2702(b)(3). In Hotfile’s Terms of
Service, users explicitly grant such consent:
Hotfile reserves the right to access, review, preserve, and disclose any User
Content, as it reasonably believes is necessary to do any of the following: (1)
satisfy any applicable law, regulation, legal process or governmental request…
Hotfile will not reproduce, distribute, display or exploit any User Content except
at your direction as part of the Service, or as Hotfile otherwise deems necessary
to comply with any legal obligation.
Declaration of Duane C. Pozza in Support of Motion to Compel (“Pozza Decl.”) Ex. B at 2-3
(emphasis added). Hotfile’s Privacy Policy, to which users also contractually agree, is equally
explicit:
Hotfile cooperates with government and law enforcement officials and private
parties to enforce and comply with the law. We may disclose Personal
Information and any other information about you to government or law
enforcement officials or private parties if, in our discretion, we believe it is
necessary or appropriate for any of the following reasons: to respond to legal
requests (including court orders and subpoenas) …
Pozza Ex. C at 2 (emphasis added).
Here, there is no question that defendants’ users have granted any consent necessary
under the SCA. See Deering v. CenturyTel, Inc., No. CV-10-63-BLG-RFC, 2011 WL 1842859,
at *2-3 (D. Mont. May 16, 2011) (user agreement to online privacy policy sufficient consent
under the Electronic Communications Privacy Act (“ECPA”), of which the SCA is a part);
Mortensen v. Bresnan Commc’n, LLC, NO. CV 10-13-BLG-RFC, 2010 WL 5140454, at *5-6
(D. Mont. Dec. 13, 2010) (consent under ECPA established based on online subscriber
agreement and privacy notice); see also United States v. Noriega, 764 F. Supp. 1480, 1491 (S.D.
2
Fla. 1991) (inmate consented to recording of telephone call under ECPA where orientation
manual, telephone sticker, and consent form disclosed that calls could be recorded); PerkinsCarillo v. Systemax, Inc., No. CIV. 1:03CV2836-TW, 2006 WL 1553957, at *15-16 (N.D. Ga.
May 26, 2006) (consent under ECPA satisfied by agreeing to workplace policy that permitted
monitoring).2
Defendants’ SCA argument is also a red herring in that defendants argue against
production of content files, but plaintiffs do not seek to compel production of any content files at
this time. Rather, plaintiffs seek to compel production of Content Reference and User Data,
neither of which includes the actual content files, and neither of which is the “contents” of a
communication subject to the SCA. Defendants do not contend that the SCA prohibits
disclosure of Content Reference or User Data. Nor could they. The same Viacom case on which
defendants rely ordered production of data about the actual content files – i.e., data comparable
to the Content Reference and User Data plaintiffs seek here. Viacom Int’l Inc. v. YouTube Inc.,
253 F.R.D. 256, 265 (S.D.N.Y. 2008) (“the ECPA does not bar disclosure of non-content data
about the private videos (e.g., the number of times each video has been viewed on YouTube.com
or made accessible on a third-party website through an ‘embedded’ link to the video). …
Plaintiffs need the requested non-content data so that they can . . . have an opportunity to obtain
discovery of allegedly infringing private videos claimed to be public.”); see also, e.g., Gilday v.
Dubois, 124 F.3d 277, 296 & n.27 (1st Cir. 1997) (information about communication, including
date, time and length of a call, does not constitute “contents” of communication under ECPA);
Hill v. MCI WorldCom Commc’ns, Inc., 120 F. Supp. 2d 1194, 1196 (S.D. Iowa 2000) (same).
With or without the actual content files, the full Content Reference and User Data is
highly relevant. That data will, for example, show downloads by U.S. users, which defendants
themselves argue is necessary to show actionable infringement. Opp. at 6; see Mot. at 12. The
data also will provide metadata such as file name and size, which will identify infringed copies
of plaintiffs’ copyrighted works. This data would provide evidence of direct infringement. It
2
Just recently defendants made a proposal to provide plaintiffs with some subset of data and
content files – i.e., the content files they now say would be illegal to produce. Defendants’
proposal, however, was crafted to prevent plaintiffs from being able to conduct relevant
statistical analyses. It was only after plaintiffs counter-proposed reasonable changes to enable
such statistical analyses that defendants, after more than five weeks of negotiations, raised their
SCA objection. Pozza Reply Decl. ¶ 4.
3
would also enable plaintiffs to conduct their statistical analyses based on file name and other
metadata. While defendants would argue this evidence is not as strong without the actual content
files, because file names may not accurately identify the contents of a file or may be
insufficiently descriptive, it would still be admissible and highly probative evidence to be
weighed by the finder of fact.
Moreover, the full Content Reference and User Data would show which URL links were
publicly posted on websites and, therefore, which files had been authorized for public
distribution. Reply Declaration of Ian Foster in Support of Motion to Compel (“Foster Reply
Decl.”) ¶ 15. The SCA does not bar production of content files made publicly available. See
Snow v. DirecTV, Inc., 450 F.3d 1314, 1320-21 (11th Cir. 2006) (“The legislative history and the
statutory structure clearly show that Congress did not intend to criminalize or create civil liability
for acts of individuals who ‘intercept’ or ‘access’ communications that are otherwise readily
accessible by the general public”); H.R. Rep No. 99-647, at 66 (1986) (a user who posts a
message on an online system “with a reasonable basis for knowing that such communications are
freely made available to the public, should be considered to have given consent to the disclosure
or use of the communication”). For this reason, courts order production of publicly available
content from service providers. E.g., Louis Vuitton Malletier, S.A. v. Akanoc Solutions, Inc., No.
C 07-03952 JW, 2008 WL 3200822, at *1 (N.D. Cal. Aug. 7, 2008).3
Plaintiffs are entitled to obtain discovery to conduct relevant data analyses that would
show the extent of infringement of plaintiffs’ works and the overwhelming use of Hotfile for
copyright infringement. Defendants have agreed to provide much of the requested data fields,
Opp. at 8-9, but only for a sliver of content files – which would preclude both analyses.
Defendants attempt to turn the discovery process on its head by arguing that plaintiffs must first
identify each of their infringed titles, using only public sources and independent investigation,
and only then request data about these infringements from defendants. First, the statistical
analyses would be critical regardless of how many works are in suit. Second, quantifying the
extent of infringement of plaintiffs’ copyrights is hardly a “fishing expedition,” Opp. at 5, or
unusual, where plaintiffs have already stated an infringement claim against defendants for their
3 The
out-of-circuit authority defendants cite, Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d
965, 990 (C.D. Cal. 2010), and Viacom, 253 F.R.D. at 264, support plaintiffs here. Both courts
held that communications were protected only when the user controlled and limited access to
the communications. Crispin, 717 F. Supp. 2d at 991; Viacom, 253 F.R.D. at 264-65.
4
operation of Hotfile. Plaintiffs seek discovery from the best source available – defendants – to
show the extent of infringement. Mot. at 8-9. That is common practice in copyright cases and
even defendants acknowledge the numerous precedents. Opp. at 5. Defendants do not cite a
comparable copyright case, and plaintiffs are unaware of any, that denied a plaintiff the right to
take discovery as to the number of plaintiff’s works infringed. To the contrary, courts have
ordered defendants affirmatively to turn on server logging features to capture the relevant direct
infringement data, Columbia Pictures Industries v. Bunnell, No. CV 06-1093FMCJCX, 2007
WL 2080419, at *4, *14 (C.D. Cal, May 29, 2007), and have sanctioned defendants for refusing
to produce this data, Columbia Pictures Industries, Inc. v. Fung, No 06-cv-05578 (C.D. Cal.
Aug. 10, 2007) (Pozza Reply Ex. B). The patent cases defendants cite on this point, Opp. at 5,
are inapposite. See Samsung SDI Co. Ltd. v. Matsushita Elec. Indus. Co. Ltd., No. CV 05-8493,
2007 WL 4302701, at *2-3 (C.D. Cal. June 27, 2007) (denying motion to compel where special
local rule for patent cases “impos[ed] a limitation on a party seeking discovery”); Micro Motion,
Inc. v. Kane Steel Co., 894 F.2d 1318, 1324-25 (Fed. Cir. 1990) (quashing subpoena where
litigant sought information from nonparty competitor).
Finally, defendants’ arguments about particular fields of the data are largely non-issues:
Complete URLs. Defendants object to producing the full URL because that would be a
“live” link to the content file. Opp. at 9. Provided defendants do not remove the file name or
unique file identifier, and provided that each truncated URL still uniquely identifies only a single
file on defendants’ system, plaintiffs have no objection.
User geographic records. Plaintiffs requested both IP address and user-reported location
data because it is unclear when defendants began preserving IP addresses for download and
upload records. However, if defendants can assure the Court that they have preserved IP
addresses for all download and upload records, plaintiffs will accept just the IP addresses.
Status of files. Defendants want to produce data showing the reason for files being
disabled only for files that they disabled in response to a takedown notice. Opp. at 11. Plaintiffs,
however, need data showing the reason any files were disabled, not just files disabled in response
to a takedown notice. First, a defendant’s disabling of files for any reason (e.g., porn files) is
evidence of the defendant’s ability to control its system, which is relevant both to vicarious
infringement and any DMCA defense. E.g., Arista Records LLC v. Usenet.com Inc., 633 F.
Supp. 2d 124, 157 (S.D.N.Y. 2009) (“Usenet II”) (holding same). Second, to be eligible for
5
DMCA safe harbor, defendants are obligated to disable infringing files when they have
knowledge from any source, not just from takedown notices. See 17 U.S.C. § 512(c)(1)(A).
Plaintiffs already have discovered evidence that defendants had knowledge of specific infringing
files from sources other than takedown notices (Pozza Reply Ex. I); plaintiffs must be permitted
to determine whether (and why) defendants disabled the files. Viacom does not provide
otherwise. Opp. at 11 n.10. Even under Viacom, which plaintiffs believe to be wrongly decided,
defendants would be ineligible for DMCA safe harbor for failing to disable specific infringing
files of which they have knowledge. Viacom Int’l Inc. v. YouTube, Inc., 718 F. Supp. 2d 514,
528-29 (S.D.N.Y. 2010).
II.
The Requested Affiliate Data Should Be Produced.
Defendants misstate plaintiffs’ request for Affiliate Data. Plaintiffs are seeking
identifying Affiliate information only for the top 500 highest paid Affiliates (uploaders or
websites). Mot. at 12-13. This information is clearly relevant. Defendants have paid these top
Affiliates anywhere from [---------] to over [----------] for uploading content to Hotfile (in the
case of users) or promoting content (in the case of websites). Pozza Ex. G. By defendants’
math, each Affiliate is paid an average of $0.002 for each download of a file uploaded by the
Affiliate. Opp. at 11. Thus, an Affiliate defendants paid [---------] is responsible for uploading
content downloaded [-------------------]; an Affiliate defendants paid [----------] is responsible for
uploading content downloaded [---------------------]. These are key business associates of
defendants.
These top Affiliates, who performed crucial functions for defendants, are likely to be
important witnesses and sources of relevant information and discovery. Infringers in defendants’
position almost always deny their knowledge and intent. It is hardly surprising that, in numerous
comparable cases, third parties, including former employees and business associates, have
provided the most incriminating evidence against defendants, including key documents
defendants failed to produce. E.g., Usenet II, 633 F. Supp. 2d at 133-35 (former employees
provided key evidence of misconduct); Arista Records LLC v. Lime Group LLC, No. 06 CV
5936, -- F. Supp. 2d --, 2011 WL 1742029, at *6 (S.D.N.Y. May 2, 2011) (former president
supplied key evidence); Columbia Pictures Indus., Inc. v. Fung, No. CV 06-5578 SVW (JCx),
2009 WL 6355911, at *9, *13 (C.D. Cal. Dec. 21, 2009) (forum moderators); Columbia Pictures
Indus., Inc. v. Bunnell, 06-cv-01093 FMC-JCx, 2007 WL 4877701, at *4 (C.D. Cal. Dec. 13,
6
2007) (former administrators). Hotfile’s very top Affiliates are likely to have participated in
communications with defendants revealing defendants’ knowledge of, and intent to foster and
profit from, infringement, as well as communications concerning defendants’ efforts to
undermine copyright enforcement. This is true whether or not the Affiliates themselves
infringed plaintiffs’ works. Opp. at 12. The ability to discover the identities of such witnesses is
central to the discovery process.4
Defendants’ privacy arguments are equally baseless. Defendants have the burden of
proving that a foreign privacy law applies and would preclude disclosure. Consejo De Defensa
Del Estado De La Republica De Chile v. Espirito Santo Bank, No. 09-20613-CIV, 2010 WL
2162868, at *2 (S.D. Fla. May 26, 2010). Defendants’ bare citation to two foreign statutes
without discussion or argument does not satisfy that burden. In fact, the two statutes do not bar
disclosure in this case, because the Affiliate Data, by defendants’ affirmative choice, resides on
computer servers in the United States and defendants obtained their foreign users’ consent to the
transfer of this data to the United States for storage. Pozza Ex. C at 1 (“The information Hotfile
collects about you and your usage of the Service will be transmitted to and stored by Hotfile on
servers in the United States”). Consent to transfer to another country is an explicit exception to
the cited statutes. Leibnitz Ex. K at art. 26 ¶ 1(a), Ex. J at art. 36a ¶ 6.1. Once transferred to the
United States, such data is no longer governed by the European laws. See Pozza Reply Ex. C
(Wall Street Journal, March 16, 2011) (discussing that EU is now proposing but has not yet
extended law to cover data residing in non-EU countries). Moreover, both statutes have
“consent” and “legal claims” exceptions under which, for the reasons discussed in regard to the
SCA, disclosure would be permitted even if the statutes applied. Leibnitz Ex. K at art. 26
¶¶ 1(a), (d); Ex. J at art. 36a ¶¶ 6.1, 6.4 (similar).5
Finally, there is no First Amendment issue raised by disclosure of Affiliate information.
Plaintiffs are seeking disclosure of the identities of individuals because they are defendants’
4
5
Nor is it consequential whether Affiliate witnesses reside in the United States or abroad.
Indeed, given defendants’ claim to operate from Bulgaria, Opp. at 13, Affiliates having close
relations to defendants are likely to reside abroad.
Of course, even if foreign laws prohibited disclosure, which they do not, given the importance
of this data to plaintiffs, this Court could still order the discovery, particularly since defendants
have not even attempted to meet their burden of proving that the relevant factors weigh in
favor of nondisclosure. E.g., Societe Nationale Industrielle Aerospatiale v. U.S. District
Court, 482 U.S. 522, 544 n.29 (1987); Espirito Santo Bank, 2010 WL 2162868, at *2.
7
business associates, not because they have engaged in a speech activity. See SaleHoo Group,
Ltd. v. ABC Co., 722 F. Supp. 2d 1210, 1214-15 (W.D. Wash. 2010). An offline defendant could
not keep the identities of its relevant business associates secret merely because they preferred to
operate anonymously. It is no different online.
III.
Source Code Should Be Produced.
Access to Hotfile’s source code is essential so that plaintiffs can establish technical facts
directly related to their core allegations. By way of example only, defendants’ source code is
central to proving plaintiffs’ allegation that defendants have the ability to control copyright
infringement on their system, and have refused to exercise that control. See Compl. ¶ 62; Usenet
II, 633 F. Supp. 2d at 157; Declaration of Ian Foster in Support of Motion to Compel (“Foster
Decl.”) ¶¶ 9, 11. The source code is also central to showing that defendants have the ready
ability to implement effective filtering technologies to mitigate infringement. Mot. at 18; Foster
Decl. ¶ 11. And source code is central to proving plaintiffs’ allegations that defendants have
designed their system to facilitate infringement and to undermine copyright owner enforcement
efforts. Compl. ¶ 61; Mot. at 18; Foster Decl. ¶¶ 9-10. Indeed, courts in other online
infringement cases have relied on source code features as proof of the defendant’s knowledge of
and intent to foster infringement. Lime Group, 2011 WL 1742029, at *19-20; Fung, 2009 WL
6355911, at *14; Usenet II, 633 F. Supp. 2d at 148, 153.
The importance of source code in this case far exceeds the “relevant and necessary”
standard cited by defendants. Opp. at 14. Only source code analysis can definitively establish
many significant technical matters in this case. Foster Decl. ¶¶ 8, 13; see Foster Reply Decl.
¶¶ 2-14. Defendants’ assertion that observation and testing of their system from the outside,
without access to source code, is sufficient is simply wrong. External observation would not
enable plaintiffs to discover or analyze “administrative” functions which are only available to the
site operator. See Foster Reply Decl. ¶¶ 7-8. External testing would not allow plaintiffs to
determine whether special features are available to certain classes of users, such as top Affiliates.
Id. ¶ 5. Nor would external testing allow plaintiffs to establish how Hotfile functioned prior to
the litigation, which is plainly relevant given that defendants changed their copyright practices
following the filing of this action. Id. ¶ 6.6 Hotfile’s source code would definitively and
6
Plaintiffs also cannot rely on depositions of hostile engineers on complex and nuanced
technology issues, especially where, as here, there will be language barriers. Even with a
8
unambiguously establish how Hotfile’s system was designed and functions, and what it can and
cannot do – as a matter of scientific fact.
The authorities do not require a showing of strict necessity, just that the code will provide
evidence regarding issues central to claims or defenses in the case. E.g., In re Facebook PPC
Advertising Litig., No. C09-03043 JF (HRL), 2011 WL 1324516, at *3 (N.D. Cal. Apr. 6, 2011)
(granting production of requested source code relevant to performance of a filter, noting that no
other evidence would substitute for analysis of code itself); Metavante Corp. v. Emigrant Sav.
Bank, No. 05-CV-1221, 2008 WL 4722336, at *2 (E.D. Wis. Oct. 24, 2008).
Defendants’ trade secret objection – based on a single case, in which plaintiff primarily
sought production of Google’s search engine source code – cannot be a bar to production of such
important evidence. Google’s search engine source code is one of the most closely guarded and
valuable trade secrets in the world. Without doubt, Google’s search engine source code – the
product of “over a thousand person-years” of work, Viacom, 253 F.R.D. at 259 (emphasis added)
– gives it an unparalleled advantage over competitors. That situation is sui generis. Defendants
have not submitted evidence showing Hotfile’s source code is remotely comparable. See Opp.
Ex. 2 (Titov Decl.) ¶ 8 (vaguely indicating that “Hotfile’s technology optimizes the experience
for Premium users while, at the same time, providing a more efficient service for all users”).
Plaintiffs provide the most pertinent authorities. Mot. at 17-18. Defendants attempt to
distinguish those cases by arguing that those defendants were blatant infringers whereas Hotfile
is a legitimate “storage” business. Opp. at 2, 16 & n.21. But defendants here pay uploaders for
heavily downloaded content, and have publicly admonished users not to use Hotfile for storage,
but only for files that will be actively promoted for distribution. Pozza Reply Exs. D-E.
Defendants cannot rely on claims of innocence to bar discovery that would refute those claims.
Hotfile source code is central to this case, and there is no reason why the carefully crafted
security measures contained in the Protective Order entered by this Court – negotiated
specifically to protect defendants’ source code – are insufficient. Mot. at 17.
IV.
The Requested Monthly Revenue Information Should Be Produced.
Plaintiffs have already narrowed their request for financial information to monthly
revenues related to Hotfile. Defendants ignore the obvious relevance. A defendant’s intent can
cooperative witness, testimony on such detailed technical subject matters would result in an
ambiguous and incomplete record. Foster Decl. ¶ 13.
9
be proven by circumstantial evidence, including motive, and the amount of profit earned from
infringement is highly probative of an infringer’s motive. See Metro-Goldwyn-Mayer Studios,
Inc. v. Grokster, Ltd., 545 U.S. 913, 940 (2005). Plaintiffs’ theory here is that defendants
knowingly and intentionally promote copyright infringement to profit from it. Plainly, someone
earning $5 million a month from infringement has a far greater incentive to encourage that
infringement than someone earning $500 a month.
Moreover, defendants’ argument that their “flat fee” pricing immunizes them from
liability is incorrect. First, whether defendants’ revenue comes from advertising or subscription
payments, defendants’ business model depends upon attracting subscribers using the lure of
popular infringing content as the “draw.” Indeed, after this litigation was filed, defendants
terminated some infringers and traffic to the Hotfile website appeared to plummet. Pozza Reply
Exs. F-H. The monthly revenue data should demonstrate such a drop and quantify defendants’
economic incentive to turn a blind eye to repeat infringers. E.g., Ellison v. Robertson, 357 F.3d
1072, 1079 (9th Cir. 2004) (relevant evidence includes cancellation of subscription based on lack
of infringing content). Second, Grokster’s reliance on the “commercial sense” of the infringer’s
business is not limited to advertising models and, since Grokster, courts have applied the same
analysis to subscription fee models. Usenet II, 633 F. Supp. 2d at 156-57. Third, defendants
selectively quote from the DMCA legislative history; two sentences after the passage quoted by
defendants, Congress makes clear that financial benefit “would, however, include any such [flat]
fees where the value of the service lies in providing access to infringing material.” S. Rep. No.
105-190, at 45 (1998); H.R. Rep. 105-551(II), at 54 (1998) (same).
Finally, defendants are mistaken that disclosure of financial information is subject to a
heightened “necessary” standard. Financial information need only be relevant to be disclosed.
See Bellosa v. Universal Tile Restoration, Inc., No. 08-60054-CIV, 2008 WL 2620735, at *4
(S.D. Fla. June 30, 2008) (ordering production of financial records without showing of
necessity); Capone v. Estate of Ison, No. 06-80945, 2008 WL 2277507, at *4 (S.D. Fla. May 30,
2008) (same).7
7 Defendants citation to Empire of Carolina, Inc. v. Mackle, 108 F.R.D. 323 (S.D. Fla. 1985))
and two out-of-circuit cases is inapposite, because the Eleventh Circuit has declined to impose
a higher standard than relevance even for disclosure of confidential tax records. See Maddow
v. Proctor & Gamble Co., Inc., 107 F.3d 846, 853 (11th Cir. 1997); Bellosa, 2008 WL
2620735, at *4 (noting same).
10
Dated: June 24, 2011
Respectfully submitted,
By: /s/ Karen L. Stetson
Karen L. Stetson
GRAY-ROBINSON, P.A.
1221 Brickell Avenue
16th Floor
Miami, Fl 33131
Telephone: (305) 461-6880
Facsimile: (305) 461-6887
MOTION PICTURE ASSOCIATION
OF AMERICA, INC.
Karen R. Thorland (Pro Hac Vice)
15301 Ventura Blvd.
Building E
Sherman Oaks, CA 91403
Phone: (818) 995-6600
Fax: (818) 285-4403
JENNER & BLOCK LLP
Steven B. Fabrizio (Pro Hac Vice)
Duane C. Pozza (Pro Hac Vice)
Luke C. Platzer (Pro Hac Vice)
1099 New York Ave., N.W.
Suite 900
Washington, DC 20001
Telephone: (202) 639-6000
Facsimile: (202) 639-6066
Attorneys for Plaintiffs
11
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that on this 24th Day of June, 2011, I served the following
documents on all counsel of record on the attached service list via the Court’s CM/ECF
filing system:
Plaintiffs’ Reply Memorandum in Support of Motion to Compel Responses
to Requests for Production of Documents and Interrogatories
I further certify that I am admitted to the United States Court for the Southern District of
Florida and certify that this certificate of Service was executed on this date at
Washington, D.C.
By: /s/ Karen L. Stetson
Karen L. Stetson
SERVICE LIST
Disney Enterprises, Inc., et al. v. Hotfile Corp. et al.
CASE NO. 11-CIV-20427-JORDAN
RASCO KLOCK
Janet T. Munn
jmunn@rascoklock.com
283 Catalonia Ave., Suite 200
Coral Gables, FL 33134
Phone: 305-476-7101
Fax: 305-476-7102
FARELLA BRAUN + MARTEL LLP
Anthony P. Schoenberg
tschoenberg@fbm.com
Roderick M. Thompson
rthompson@fbm.com
N. Andrew Leibnitz
aleibnitz@fbm.com
Deepak Gupta
dgupta@fbm.com
Janel Thamkul
jthamkul@fbm.com
235 Montgomery Street
San Francisco, CA 94104
Phone: 415-954-4400
Attorney for Defendants Hotfile Corp. and
Anton Titov
Attorneys for Defendants Hotfile Corp. and
Anton Titov
BOSTON LAW GROUP, PC
Valentin Gurvits
vgurvits@bostonlawgroup.com
825 Beacon Street, Suite 20
Newton Centre, MA 02459
Phone: 617-928-1804
Attorneys for Defendants Hotfile Corp. and
Anton Titov
2
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?