ME2 Productions, Inc. v. John and Jane Does
Filing
5
ORDER. IT IS HEREBY ORDERED that 3 Plaintiff's Ex Parte Motion for Leave to Take Limited Discovery Prior to Rule 26(f) Conference is granted, in part. See Order for details. Signed by Magistrate Judge George Foley, Jr on 3/24/17. (Copies have been distributed pursuant to the NEF - MR)
1
2
3
UNITED STATES DISTRICT COURT
4
DISTRICT OF NEVADA
5
6
7
8
9
10
ME2 PRODUCTIONS, INC.,
)
)
Plaintiff,
)
)
vs.
)
)
JOHN AND JANE DOES,
)
)
Defendants.
)
__________________________________________)
Case No. 2:17-cv-00665-JAD-GWF
ORDER
11
12
This matter is before the Court on Plaintiff’s Ex Parte Motion for Leave to Take Limited
13
Discovery Prior to Rule 26(f) Conference (ECF No. 3), filed on March 6, 2017. Because no
14
Defendants have been named or served, no opposition or reply briefs have been filed.
15
16
BACKGROUND
On March 6, 2017, Plaintiff ME2 Productions, Inc. (Plaintiff) filed a complaint against John
17
and Jane Does (Defendants). Plaintiff asserts that it is the registered owner of the copyright for the
18
motion picture entitled “Mechanic: Resurrection” with copyright registration number PA 1-998-057,
19
2016-08-02. Complaint (ECF No. 1), pg. 3, ¶ 11. Plaintiff alleges a claim of copyright infringement,
20
stating that Defendants reproduced and distributed Plaintiff’s copyrighted work through the use of
21
BitTorrent, a peer-to-peer file sharing system. Id. at pgs. 8-9, ¶¶ 45-52. Plaintiff also asserts a claim
22
for contributory infringement, alleging that through the use of BitTorrent, all Defendants illegally
23
obtained the copyrighted work and assisted others in doing the same. Id. at pgs. 9-10, ¶¶ 53-63.
24
Finally, Plaintiff asserts a claim for vicarious copyright infringement, arguing that Defendants failed
25
to reasonably supervise the use of their respective Internet access points, which allowed others to
26
unlawfully download and share Plaintiff’s work. Id. at pgs. 11-12, ¶¶ 64-69.
27
28
That same day, Plaintiff filed the instant Motion requesting leave to take early discovery to
ascertain the identities of the Doe Defendants from their Internet Service Providers (“ISPs”) through
1
their Internet Protocol (“IP”) address. To obtain the IP addresses of the Defendants using BitTorrent,
2
Plaintiff hired forensic investigator, Maverickeye UG. See Motion (ECF No. 3), Decl. of Daniel
3
Arheidt (“Arheidt Decl.”), Ex. 1. Since Plaintiff can only identify Defendants via their IP addresses,
4
it seeks leave to serve Rule 45 subpoenas on the ISPs and any related intermediary ISPs demanding
5
the true name, address, telephone number, e-mail address and Media Access Control (“MAC”)
6
address of the Defendant to whom the ISP issued an Internet Protocol (“IP”) address. Motion (ECF
7
No. 3), pg. 2, lns. 17–20. Plaintiff asserts that it will only use this information to prosecute the claims
8
made in its Complaint. Id. at lns. 21–22.
9
Plaintiff claims that good cause exists to grant its request because it has identified the
10
Defendants with sufficient specificity, it has properly pled copyright infringement, there is no other
11
way to obtain the Defendants’ true identities, and there is a risk that the ISP will destroy its logs prior
12
to the Rule 26(f) conference. Id. at pgs. 1, 5-8.
13
14
LEGAL STANDARDS
I.
The Cable Privacy Act
15
The Cable Privacy Act generally prohibits cable operators from disclosing personally
16
identifiable information regarding subscribers without the prior written or electronic consent of the
17
subscriber. 47 U.S.C. § 551(c)(1). A cable operator, however, may disclose such information if the
18
disclosure is made pursuant to a court order and the cable operator provides the subscriber with notice
19
of the order. 47 U.S.C. § 551(c)(2)(B). A cable operator is defined as “any person or group of
20
persons (A) who provides cable service over a cable system and directly or through one or more
21
affiliates owns a significant interest in such cable system, or (B) who otherwise controls or is
22
responsible for, through any arrangement, the management and operation of such a cable system.” 47
23
U.S.C. § 522(5). The ISPs that Plaintiff intends to subpoena in this case are cable operators within
24
the meaning of the Act.
25
II.
26
Discovery Requests Prior to the Rule 26(f) Conference
Generally, discovery is not permitted without a court order before the parties have held a
27
conference pursuant to Federal Rule of Civil Procedure 26(f). Fed. R. Civ. P. 26(d)(1). “[H]owever,
28
in rare cases, courts have made exceptions, permitting limited discovery to ensue after filing of the
2
1
complaint to permit the plaintiff to learn the identifying facts necessary to permit service on the
2
defendant.” Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573, 577 (N.D.Cal.1999) (citing
3
Gillespie v. Civiletti, 629 F.2d 637, 642 (9th Cir.1980)). “The Ninth Circuit has held that when the
4
defendants' identities are unknown at the time the complaint is filed, courts may grant plaintiffs leave
5
to take early discovery to determine the defendants' identities ‘unless it is clear that discovery would
6
not uncover the identities, or that the complaint would be dismissed on other grounds.’ ” 808
7
Holdings, LLC v. Collective of December 29, 2011 Sharing Hash, 2012 U.S. Dist. LEXIS 62980, *7
8
(S.D.Cal. May 4, 2012) (quoting Gillespie, 629 F.2d at 642). “A district court's decision to grant
9
discovery to determine jurisdictional facts is a matter of discretion.” Columbia Ins., 185 F.R.D. at
10
578 (citing Wells Fargo & Co. v. Wells Fargo Express Co., 556 F.2d 406, 430 n. 24 (9th Cir.1977)).
11
To determine whether to grant a request for early discovery, the court shall apply the conventional
12
“good cause” standard that weighs the need for discovery to further justice against the prejudice to the
13
opposing party. Semitool, Inc. v. Tokyo Electron Am., Inc., 208 F.R.D. 273, 275–76 (N.D.Cal.2002).
14
Courts in this district apply a three-factor test when considering motions for early discovery to
15
locate certain defendants. Columbia Ins., 185 F.R.D. at 578–80. First, “the plaintiff should identify
16
the missing party with sufficient specificity such that the Court can determine that defendant is a real
17
person or entity who could be sued in federal court.” Id. at 578. Second, the plaintiff “should
18
identify all previous steps taken to locate the elusive defendant” to ensure that the plaintiff has made a
19
good faith effort to identify and serve process on the defendant. Id. at 579. Third, the “plaintiff should
20
establish to the Court's satisfaction that plaintiff's suit against defendant could withstand a motion to
21
dismiss.” Id. (citing Gillespie, 629 F.2d at 642). “[T]o prevent abuse of this extraordinary
22
application of the discovery process and to ensure that the plaintiff has standing to pursue an action
23
against defendant,” plaintiff must show that some act giving rise to liability actually occurred and that
24
the discovery is aimed at identifying the person who allegedly committed the act. Id. at 579–80
25
(citing Plant v. Various John Does, 19 F.Supp.2d 1316, 1321 n. 2 (S.D.Fla.1998)).
26
Typically, District Courts within the Ninth Circuit have found good cause supporting a request
27
for early or expedited discovery in copyright infringement cases where the plaintiff alleges that its
28
copyrighted work has been infringed upon through a peer-to-peer file sharing system, and sought
3
1
early discovery to obtain the identities and addresses of the alleged infringers through their respective
2
ISPs. See, e.g., UMG Recordings, Inc. v. Doe, 2008 WL 4104214 (N.D. Cal. 2008) (granting leave to
3
serve Rule 45 subpoena to identify doe defendant); Malibu Media, LLC v. John Does 1-10, 2012 WL
4
5382304 (C.D. Cal. June 27, 2012) (same).
5
6
7
8
9
10
DISCUSSION
I.
Good Cause Exists for Leave to Conduct Expedited Discovery
Plaintiff has demonstrated good cause exists for leave to take limited early discovery by
successfully pleading the three factors discussed above.
A.
Identification of Missing Parties with Sufficient Specificity
Due to the nature of internet copyright infringement cases, Plaintiff is only required to identify
11
Defendants with sufficient specificity “to ensure that federal requirements of jurisdiction and
12
justiciability can be satisfied.” Columbia Ins., 185 F.R.D. at 578. “[A] plaintiff identifies Doe
13
defendants with sufficient specificity by providing the unique IP addresses assigned to an individual
14
defendant on the day of the allegedly infringing conduct, and by using 'geolocation technology' to
15
trace the IP addresses to a physical point of origin.” 808 Holdings, 2012 WL 1648838, at *4 (quoting
16
OpenMind Solutions, Inc. v. Does 1-39, 2011 WL 4715200 (N.D. Cal. Oct. 7, 2011)).
17
Here, Plaintiff submitted a chart (albeit to its Complaint) that lists the unique IP address which
18
corresponds to each individual Defendant and the ISP it is associated with. See Complaint (ECF No.
19
1-1); see also Arheindt Decl. (ECF No. 3-1). The list also includes the dates and times of the alleged
20
infringing activity, as well as the county and state where each IP address is located. Id. Therefore,
21
Plaintiff has identified the Doe Defendants with sufficient specificity and has presented evidence that
22
the IP addresses are physically located in this district. See OpenMind Solutions, 2011 WL 4715200
23
(concluding that plaintiff satisfied the first factor by identifying the defendants' IP addresses and by
24
tracing the IP addresses to a point of origin within the State of California).
25
B.
26
Plaintiff is also required to describe what good faith attempts have been made to locate and
Previous Attempts to Locate Defendants
27
serve Defendants. See Columbia Ins., 185 F.R.D. at 579. Plaintiff’s motion explains that since this
28
alleged infringement occurred over the internet, its only attempt to identify Defendants has been
4
1
through hiring a forensic investigator to obtain Defendants’ respective IP addresses. See Motion
2
(ECF No. 3); Arheindt Decl. (ECF No. 3-1). Plaintiff maintains that “there is no other way for the
3
Plaintiff to obtain the Defendants’ identities except by serving a subpoena on Defendants’ ISPs.” Id.
4
at pg. 7, lns. 8-9. Thus, Plaintiff argues that it has established good cause. Id. The Court agrees. It
5
appears as though Plaintiff has utilized all available avenues in a good faith effort to identify and
6
locate Defendants. Thus, this factor has been met.
7
C.
8
The last prong requires Plaintiff to show “that an act giving rise to civil liability actually
Ability to Withstand a Motion to Dismiss
9
occurred and that the discovery is aimed at revealing specific identifying features of the person or
10
entity who committed that act.” Columbia Ins., 185 F.R.D. at 580. In other words, Plaintiff must
11
demonstrate that its Complaint is able to withstand a motion to dismiss. Id. at 579.
12
To prevail in a copyright infringement action, a plaintiff “must show: (1) ownership of a valid
13
copyright; and (2) that the defendant violated the copyright owner's exclusive rights under the
14
Copyright Act.” Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir. 2004) (citing 17 U.S.C. § 501(a)
15
(2003); Ets-Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, 1073 (9th Cir. 2000)).
16
Plaintiff’s complaint establishes that Plaintiff is the registered owner of the copyright for the
17
motion picture entitled “Mechanic: Resurrection” with copyright registration number PA 1-998-057,
18
2016-08-02. See Complaint (ECF No. 1-1), pg. 3, ¶ 11. Plaintiff also avers that Defendants illegally
19
obtained Plaintiff’s copyrighted work through the use of the BitTorret protocol and thereafter illegally
20
reproduced and distributed it. Id. at pgs. 8–9, ¶¶ 45–52; Motion (ECF No. 3), pgs. 8-9.
21
Consequently, Plaintiff has alleged a prima facie case of copyright infringement which may withstand
22
a motion to dismiss. In addition, while Plaintiff’s motion does not address the issue of personal
23
jurisdiction, Plaintiff’s Complaint presented evidence that Defendants are located within this district
24
thereby conferring personal jurisdiction over each of them. Id. at pg. 2, ¶ 4. Furthermore, while
25
Plaintiff’s motion does not address the issue of venue, its Complaint sufficiently alleges that venue is
26
proper because although the true identities of Defendants are unknown, each Defendant may be found
27
within this district, and a substantial part of the infringing events giving rise to Plaintiff’s claims
28
occurred in this district. Id. at ¶ 5.
5
1
D.
2
While not a factor, the Columbia Ins. court also requires Plaintiff to demonstrate that the
Whether Requested Discovery Will Lead to Identifying Information
3
requested discovery will lead to identifying information about Defendants that would make service of
4
process possible. 185 F.R.D. at 580. The Court finds that Plaintiff has adequately satisfied this
5
inquiry. Plaintiff’s motion indicates that the only way to correlate the IP addresses that its
6
investigator revealed is through the specific ISPs. As such, a Rule 45 subpoena requiring the ISP to
7
provide Plaintiff with the true name and address of the Defendant to whom the IP address belongs
8
would lead to information that would make service of process possible. Plaintiff also requests that
9
the ISP provide it with the telephone number, e-mail address, and Media Access Control address that
10
corresponds with each IP. However, the Court finds that this information is unnecessary since the
11
true name and address of each Doe Defendant should be sufficient for Plaintiff to effectuate service.
12
13
14
15
16
17
CONCLUSION
For the reasons discussed herein, the Court finds that Plaintiff has met its burden of showing
good cause. Accordingly,
IT IS HEREBY ORDERED that Plaintiff’s Ex Parte Motion for Leave to Take Limited
Discovery Prior to Rule 26(f) Conference (ECF No. 3) is granted, in part, as follows:
1.
Plaintiff may serve the ISP with a Rule 45 subpoena commanding the ISP to
18
provide Plaintiff with the true name and address of the Doe Defendants to
19
whom the ISP assigned an IP address as set forth in Exhibit 1 to the Complaint
20
(ECF No. 1-1). Plaintiff may not subpoena additional information.
21
2.
Plaintiff shall attach a copy of this Order to any Rule 45 subpoena issued
22
pursuant to this Order. The ISP shall, in turn, comply with 47 U.S.C. §
23
551(c)(2)(B), by sending a copy of this Order and the required notice to each
24
Doe Defendant.
25
3.
Within 14 calendar days after service of the subpoena, the ISP shall notify each
26
Doe Defendant that its identity has been subpoenaed by Plaintiff. The
27
Defendant whose identity has been subpoenaed shall have thirty (30) calendar
28
days from the date of such notice to challenge the disclosure by filing an
6
1
2
appropriate pleading with this Court contesting the subpoena.
4.
If the ISP wishes to move to quash the subpoena, it shall do so before the
3
return date of the subpoena. The return date of the subpoena must allow for at
4
least forty-five (45) days from service to production. If a motion to quash or
5
other challenge is brought, the ISP shall preserve the information sought by
6
Plaintiff in the subpoena pending resolution of such motion or challenge.
7
6.
Plaintiff may only use the information disclosed in response to a Rule 45
8
subpoena served on the ISP for the sole purpose of enforcing Plaintiff's rights
9
as set forth in its Complaint.
10
DATED this 24th day of March, 2017.
11
12
13
______________________________________
GEORGE FOLEY, JR.
United States Magistrate Judge
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
7
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?