Riding Films, Inc. v. Does 129-193
Filing
14
OPINION AND ORDER denying 5 & 6 motion to quash subpoena and motion for severance. Signed by Magistrate Judge Norah McCann King on 7/01/13. (rew)
IN THE UNITED STATES DISTRICT COURT
FOR THE SOUTHERN DISTRICT OF OHIO
EASTERN DIVISION
RIDING FILMS, INC.,
Plaintiff,
vs.
Civil Action 2:13-cv-46
Judge Marbley
Magistrate Judge King
JOHN DOES 129-193,
Defendants.
OPINION AND ORDER
This is a copyright action in which plaintiff alleges that
defendants copied and distributed plaintiff’s copyrighted work, the
motion picture “Dawn Rider.”
Complaint, Doc. No. 1, ¶ 5.
are otherwise identified only by IP addresses.
Complaint.
Defendants
Exhibit B, attached to
This matter is now before the Court on defendant Doe No.
163’s Motion to Quash Subpoena and Motion for Severance, Doc. No. 5,
and defendant Doe No. 189’s Motion to Quash Subpoena and Motion for
Severance, Doc. No. 6.
For the reasons that follow, the motions are
DENIED.
I.
ALLEGATIONS, CLAIMS AND PROCEDURAL BACKGROUND
Plaintiff Riding Films, Inc., a limited liability company, is a
developer, producer and/or distributor of motion pictures that has
exclusive ownership rights over a motion picture entitled “Dawn
Rider.”
Complaint, ¶¶ 3, 5, 8, 9.
Plaintiff alleges that unknown
defendant Does 129-193 (collectively, “Doe defendants” or “unknown
1
defendants”) copied and distributed plaintiff’s copyrighted work, Dawn
Rider.
Id. at ¶ 5.
According to plaintiff, Doe defendants used a
peer-to-peer (“P2P”) network known as “BitTorrent protocol” or
“torrent.”
Id.
Plaintiff alleges that individuals, such as the
unknown defendants, joined together as a “swarm” in order to use the
BitTorrent protocol to illegally download copyrighted material:
The BitTorrent protocol makes even small computers with low
bandwidth capable of participating in large data transfers
across a P2P network. The initial file-provider
intentionally elects to share a file with a torrent
network. This initial file is called a seed. Other users
(“peers”) connect to the network and connect to the seed
file to download. As yet additional peers request the same
file each additional user becomes a part of the network
from where the file can be downloaded. However, unlike a
traditional peer-to-peer network, each new file downloader
is receiving a different piece of the data from users who
have already downloaded the file that together comprises
the whole. This piecemeal system with multiple pieces of
data coming from peer members is usually referred to as a
“swarm.” The effect of this technology makes every
downloader also an uploader of the illegally transferred
file(s). This means that every “node” or peer user who has
a copy of the infringing copyrighted material on a torrent
network can also be a source of download, and thus
distributor for that infringing file.
Id.
Plaintiff goes on to allege that the possibility of successfully
downloading increases when more peers join the swarm:
This distributed nature of BitTorrent leads to a rapid
viral spreading of a file throughout peer users. As more
peers join the swarm, the likelihood of a successful
download increases. Because of the nature of a BitTorrent
protocol, any seed peer that has downloaded a file prior to
the time a subsequent peer downloads the same file can
automatically be a source for the subsequent peer so long
as that first seed peer’s computer is online at the time
the subsequent peer downloads a file. Essentially, because
of the nature of the swarm downloads as described above,
every infringer is stealing copyrighted material from other
potential infringers in numerous jurisdictions around the
world, and each is also distributing infringing material.
2
Id. at ¶ 6.
According to plaintiff, Doe defendants’ copyright infringements
permit them and others to illegally obtain and distribute at no cost
plaintiff’s unauthorized copyrighted works.
Id. at ¶ 8.
Distributing
even a portion of an unlawful copy of a copyrighted work, such as Dawn
Rider, “can result in the nearly instantaneous worldwide distribution
of that single copy to an unlimited number of people.”
Id.
On January 16, 2013, plaintiff filed the instant action, alleging
that Doe defendants unauthorized copying, distribution and use of
plaintiff’s copyrighted work by the Doe defendants violated
plaintiff’s exclusive rights in Dawn Rider.
Id. at ¶¶ 12-17.
Plaintiff alleges that Doe defendants’ willful, intentional, wanton
and/or malicious and/or outrageous acts of copyright infringement
(made with full knowledge of plaintiff’s ownership copyrights of Dawn
Rider) will cause plaintiff irreparable injury unless they are
restrained and enjoined.
Id. at ¶¶ 18-21.
Plaintiff seeks statutory
and punitive damages for each act of infringement of its copyright as
well as costs and attorneys’ fees.
Id. at ¶ 22-25.
Plaintiff also
seeks injunctive relief prohibiting each Doe defendant from further
infringing plaintiff’s copyright and ordering each defendant to
destroy all copies of the copyrighted Dawn Rider made in violation of
plaintiff’s copyrights.
Id. at ¶ 26.
At the time the action was filed, plaintiff did not know the
names of the Doe defendants.
Id. at ¶ 10.
Instead, plaintiff knew
each defendant only by (1) the internet protocol (“IP”) address
assigned to that defendant by his or her internet service provider,
3
and (2) the date and time that the infringing activity of each
defendant was observed.
Id.
See also id. at ¶ 16 (“The Plaintiff has
identified each Defendant by the IP address assigned to that Defendant
by his or her ISP and the date and at the time at which the infringing
activity of each Defendant was observed.”).
Plaintiff alleges that
each Doe defendant committed violations of the same law (17 U.S.C. §
101, et seq.) “within the same series of transactions or occurrences
(e.g. downloading and distribution of the same copyrighted Motion
Picture [Dawn Rider] owned by Plaintiff) and by using the same means
(BitTorrent network).”
Id. at ¶ 11.
Plaintiff also alleges that “all
of the infringements alleged in this lawsuit arise from the exact same
unique copy of Plaintiff’s movie as evidenced by the cryptographic
hash value.
Id.
The Defendants are all part of the exact same ‘swarm.’”1
According to plaintiff, the Doe defendants’ illegal acts occurred
in the same series of transactions and the Doe Defendants conspired
together to copy and/or distribute Dawn Rider:
Defendants’ acts occurred in the same series of
transactions because each Defendant downloaded and/or
distributed, or offered to distribute the Motion Picture
[Dawn Rider] to other infringers on the network, including
the Doe Defendants and/or other network users, who in turn
downloaded and/or distributed the Motion Picture.
Therefore, the Defendants each conspired with other
infringers on the BitTorrent network to copy and/or
distribute the Motion Picture, either in the same
transaction or occurrence or a series of transactions or
occurrences.
Id.
On the same day that the Complaint was filed, plaintiff also
1
“That value acts as a ‘unique digital fingerprint’ that ensures a piece of
data belongs in a particular torrent file.” Malibu Media, LLC v. Pelizzo,
NO. 12-22768-CIV-SEITZ/SIMONTON, 2012 U.S. Dist. LEXIS 180980, at *4 (S.D.
Fla. Dec. 21, 2012) (citations omitted).
4
filed an ex parte motion seeking to conduct limited, expedited
discovery of non-party internet service providers in order to
determine the identities of defendants.
Doc. No. 2.
Specifically,
plaintiff sought leave to serve a subpoena pursuant to Fed. R. Civ. P.
45 on certain ISPs in order to discover the name, address(es),
telephone number(s), e-mail address(es) and MAC address of each Doe
defendant that plaintiff has identified to date (as well as those
plaintiff may identify in the future).
Id. at 20-21.
Plaintiff
represents that it will use this information only for the purpose of
pursuing its claims in this litigation.
Id. at 21.
This Court
granted plaintiff’s ex parte motion, concluding that plaintiff had
established good cause because it could not meet its service
obligation under Fed. R. Civ. P. 4 without the requested discovery.
Order, Doc. No. 4, pp. 1-2.
On February 22, 2013, plaintiff issued a subpoena to WideOpenWest
(“WOW”), seeking information attached to certain IP addresses (“the
subpoenaed information”):
In accordance with the attached court order, please provide
all records and information sufficient to identify the
people or entities whose Internet Protocol Address (“IP
Address”) are listed in Attachment A to this Subpoena
including the following: personal and business names, any
and all addresses, any and all telephone numbers, any and
all e-mail addresses, and Media Access Control addresses
(“MAC Addresses”).
Exhibit A, attached to Doc. Nos. 5 and 6 (“the subpoena”).
The
subpoena identified a response date of March 12, 2013, which was later
extended to April 5, 2013.
Id.; Exhibit D, attached to Doc. Nos. 5
and 6.
On February 28, 2013, WOW notified the persons associated with
5
the identified IP addresses that WOW had received a subpoena seeking
disclosure of its customer information.
Nos. 5 and 6.
Exhibit D, attached to Doc.
WOW further advised these customers that it is legally
obligated to respond to the subpoena, but that the customers
associated with the targeted IP addresses could move to quash the
subpoena.
Id.
Thereafter, two of the Doe defendants, Nos. 163 and 189 (“the
moving defendants”), filed motions to quash and motions to sever the
claims against the various Doe defendants.
See Doc. Nos. 5 and 6.
Plaintiff opposes these motions, Doc. Nos. 7 and 8, and the moving
defendants have filed a reply, Doc. Nos. 9 and 10.2
These matters are
therefore now ripe for resolution.
II.
REQUEST TO QUASH SUBPOENAS
A.
Standard
The Federal Rules of Civil Procedure grant parties the right to
“obtain discovery regarding any nonprivileged matter that is relevant
to any party’s claim or defense. . . .”
Fed. R. Civ. P. 26(b)(1).
Relevance for discovery purposes is extremely broad.
Lewis v. ACB
Business Services, Inc., 135 F.3d 389, 402 (6th Cir. 1998).
However,
“district courts have discretion to limit the scope of discovery where
the information sought is overly broad or would prove unduly
burdensome to produce.”
Surles ex rel. Johnson v. Greyhound Lines,
2
The motions to quash and motions to sever, as well as the opposing memoranda
and reply memoranda, are identical except for reference to the specific
moving Doe defendant. For ease of reference, the Court will refer only to
the first filed motion and related briefs, i.e., Motion to Quash and Motion
to Sever, Doc. No. 5 (“Motion”); Plaintiff’s Memorandum in Opposition to
Defendant Doe No. 163’s Anonymous Motion to Quash Subpoena and Motion for
Severance, Doc. No. 7 (“Memo. in Opp.”); Reply Memorandum in Support of
Motion to Quash Subpoena and Motion for Severance, Doc. No. 9 (“Reply”).
6
Inc., 474 F.3d 288, 305 (6th Cir. 2007) (citing Fed. R. Civ. P.
26(b)(2)).
In determining the proper scope of discovery, a district
court balances a party’s “right to discovery with the need to prevent
‘fishing expeditions.’”
Conti v. Am. Axle & Mfg., No. 08-1301, 326
Fed. Appx. 900, at *907 (6th Cir. May 22, 2009) (quoting Bush v.
Dictaphone Corp., 161 F.3d 363, 367 (6th Cir. 1998)).
Under Rule 45 of the Federal Rules of Civil Procedure, parties
may command a nonparty to, inter alia, produce documents.
Civ. P. 45(a)(1).
Fed. R.
Rule 45 further provides that “the issuing court
must quash or modify a subpoena that . . . requires disclosure of
privileged or other protected matter, if no exception or waiver
applies; or subjects a person to undue burden.”
45(c)(3)(A)(iii), (iv).
Fed. R. Civ. P.
Although irrelevance or overbreadth are not
specifically listed under Rule 45 as a basis for quashing a subpoena,
courts “have held that the scope of discovery under a subpoena is the
same as the scope of discovery under Rule 26.”
Hendricks v. Total
Quality Logistics, LLC, 275 F.R.D. 251, 253 (S.D. Ohio 2011) (internal
quotation marks omitted).
The movant bears the burden of persuading
the court that a subpoena should be quashed.
See, e.g., Baumgardner
v. Lousiana Binding Serv., No. 1:11-cv-794, 2013 U.S. Dist. LEXIS
27494, at *4 (S.D. Ohio Feb. 28, 2013); Williams v. Wellston City Sch.
Dist., No. 2:09-cv-566, 2010 U.S. Dist. LEXIS 122796, at *21 (S.D.
Ohio Nov. 2, 2010).
B.
Discussion
Although unclear at times, the motions appear to raise the
following arguments in support of the requests to quash the subpoena:
7
(1) the moving defendants have standing to challenge the subpoena,
which requires the disclosure of privileged and/or protected
information and which imposes an undue burden, Motion, pp. 2, 4;
Reply, pp. 3-5; (2) the action is an effort to extort or coerce
settlements, Motion, p. 4; Reply, pp. 3, 8-10, 19; and (3) the
subpoena is not supported by good cause, Motion, p. 10; Reply, pp. 68.
The Court shall address each argument in turn.
1.
Standing
The parties disagree whether the moving defendants, who are not
the recipients of the subpoena, have standing to challenge the
subpoena directed to WOW, a third party.
“[A]bsent a claim of
privilege, a party has no standing to challenge a subpoena to a
nonparty.”
Novovic v. Greyhound Lines, Inc., 2:09-CV-00753, 2012 U.S.
Dist. LEXIS 9203, at *23 (S.D. Ohio Jan. 26, 2012) (quoting Donahoo v.
Ohio Dep’t of Youth Servs., 211 F.R.D. 303, 306 (N.D. Ohio 2002))
(internal quotation marks omitted).
See also Mann v. University of
Cincinnati, Nos. 95-3195 and 95-3292, 1997 U.S. App. LEXIS 12482, at
*13 (6th Cir. May 27, 1997) (citing 9A Charles Alan Wright and Arthur
R. Miller, Federal Practice and Procedure § 2459 (1995) (noting that
“ordinarily a party has no standing to seek to quash a subpoena issued
to someone who is not a party to the action unless the party claims
some personal right or privilege with regard to the documents
sought”)); Waite, Schneider, Bayless & Chesley Co. L.P.A. v. Davis,
No. 1:11-cv-0851, 2013 U.S. Dist. LEXIS 5253, at *14-15 (S.D. Ohio
Jan. 14, 2013) (“The only basis upon which a party could have standing
to quash a non-party subpoena would be a claim or personal right or
8
privilege.”) (citing Hackmann v. Auto Owners, Ins. Co., No. 2:05-cv876, 2009 U.S. Dist. LEXIS 15128 (S.D. Ohio Feb. 6, 2009)) (internal
citations omitted).
Personal rights or privileges supporting a claim
to standing “have been recognized with respect to personal bank
records, information in a personnel file, corporate bank records, or
Indian tribal records.”
Waite, Schneider, Bayless & Chesley Co.
L.P.A., 2013 U.S. Dist. LEXIS 5253, at *15.
Here, the Court understands that the moving defendants raise
three arguments to support their claim to standing, which the Court
shall address in turn.
a.
Personal right and proprietary interest in
confidential information
The moving defendants first argue that they have “standing to
move to quash the subpoena because it seeks disclosure of
identification information considered to be confidential and over
which [the moving defendants have] personal and proprietary
interests.”
Motion, p. 2 (citing, inter alia, Fed. R. Civ. P.
45(c)(3)(A)).
See also Reply, pp. 3-4 (citing cases for the
proposition that a claim to personal right or privilege in the
subpoenaed documents gives rise to a party’s standing to quash a nonparty subpoena and asserting that “Defendant has satisfied its
burden.”).
The moving defendants therefore apparently believe that
the subpoenaed information (name, address, telephone number, e-mail
address and MAC address associated with each IP address) is
confidential and/or is information over which they have a personal or
proprietary interest because they have an expectation of privacy in
this information.
See Reply, pp. 4-5 (citing Third Degree Films, Inc.
9
v. Does 1-108, No. 11-3007, 2012 WL 716221, at *2 (D. Md. Feb. 28,
2012) (concluding that a Doe defendant has standing to challenge a
subpoena because, inter alia, the Doe defendant has a privacy
interest, however minimal, in the contact information associated with
the IP address)).
The moving defendants further contend that “this
Court cannot conclude with any reasonable certainty that plaintiffs
have overcome the expectation of privacy by putative defendants.”
Id.
at 5 [sic].
Plaintiff disagrees, arguing that the moving defendants have no
privacy right in the subpoenaed information and that plaintiff’s right
to judicial process to protect its copyright outweighs any right to
privacy or to remain anonymous under the First Amendment to the United
States Constitution.
Memo. in Opp., pp. 4-5.
Plaintiff further
contends that the moving defendants had no reasonable expectation of
privacy in the subpoenaed information because they voluntarily
provided the information to a third-party ISP.
Plaintiff’s arguments are well-taken.
Id. at 5.
As an initial matter, the
moving defendants have not explained how the subpoenaed information is
similar to the type of information that this Court has previously
recognized as giving rise to standing.
See Waite, Schneider, Bayless
& Chesley Co. L.P.A., 2013 U.S. Dist. LEXIS 5253, at *15 (finding
personal rights or privileges attach to “personal bank records,
information in a personnel file, corporate bank records, or Indian
tribal records”).
Moreover, the moving defendants have not described
how, and the Court is not persuaded that, the subpoenaed records, if
disclosed, would harm the moving defendants or otherwise invade their
10
privacy.
Indeed, another district court within this circuit recently
rejected similar motions to quash a subpoena seeking the same
information as does the instant subpoena.
See, e.g., Breaking Glass
Pictures v. Doe, No. 3:13-CV-75, 2013 U.S. Dist. LEXIS 83225, at *4-6
(E.D. Tenn. June 13, 2013); Sojo Prods., Inc. v. Does 1-67, Nos. 3:12cv-599, 3:12-cv-600; 3:12-cv-601, 3:12-cv-602, 3:12-cv-603, 2013 U.S.
Dist. LEXIS 58602, at *4-7 (E.D. Tenn. Apr. 24, 2013); Safety Point
Prods. v. Does 1-57, No. 3:12-cv-601, 2013 U.S. Dist. LEXIS 49521, at
*3-5 (E.D. Tenn. Apr. 5, 2013).
In permitting expedited discovery so
as to enable plaintiffs in those cases to identify the unknown
defendants, the District Court for the Eastern District of Tennessee
noted that the defendants had not identified any privilege (such as
attorney-client or doctor-patient privilege) “that protects a person’s
name, address or phone from disclosure.”
2013 U.S. Dist. LEXIS 83225, at *5.
See also Sojo Prods., Inc., 2013
U.S. Dist. LEXIS 58602, at *5-6 (same).
U.S. Dist. LEXIS 49521, at *3-4.
Breaking Glass Pictures,
Cf. Safety Point Prods., 2013
That court concluded that the
unidentified defendants had no reasonable expectation of privacy in
the subpoenaed information because the defendants had already shared
that information with the ISP in order to obtain internet service.
Safety Point Prods., 2013 U.S. Dist. LEXIS 49521, at *4-5; Sojo
Prods., Inc., 2013 U.S. Dist. LEXIS 58602, at *5-6 (same).
Cf.
Breaking Glass Pictures, 2013 U.S. Dist. LEXIS 83225, at *5
(concluding that requested information is neither privileged nor
protected because defendants already shared the information with the
11
The Court finds this reasoning persuasive.3
ISP).
For all of these reasons, the Court concludes that the moving
defendants have failed to establish that they have standing to quash
the subpoena based on a personal or proprietary interest in the
subpoenaed information.
b.
Undue burden
The moving defendants also argue that they have “standing to move
to quash the subpoena because it imposes an undue burden under Fed. R.
Civ. P. 45(c)(3)(A)(iv).”
Motion, p. 2.4
See also id. at 3-4 (“If
this Court should force Wide Open West to turn over the requested
information, the risk [the moving defendants] would suffer
reputational injury even if Plaintiffs [sic] allegations are later
disproven are too great and present an undue burden to [the moving
defendants] under Fed. R. Civ. P. 45(c)(3)(a)(iv) [sic].”).
Plaintiff, however, contends that the moving defendants, who are not
the responding parties to the subpoena, lack standing to assert that
production of the subpoenaed information imposes an undue burden.
Memo. in Opp., pp. 5-6.
The moving defendants’ suggestion that they personally will face
an undue burden if WOW produces the subpoenaed information is
unavailing.
Rule 45 requires that the party issuing the subpoena
3
To the extent that they may have asserted such an argument, see Reply,
p. 6, the moving defendants similarly fail to explain how production of the
subpoenaed information infringes on any First Amendment right. Moreover, it
is well-established that the First Amendment does not protect copyright
infringement. See, e.g., Breaking Glass Pictures, 2013 U.S. Dist. LEXIS
83225, at *6 (citing First Time Videos v. Does 1-500, 276 F.R.D. 241 (N.D.
Ill. 2011)); Sojo Prods., Inc., 2013 U.S. Dist. LEXIS 58602, at *6-7 (same).
4
As discussed supra, this subdivision provides, in pertinent part, that “the
issuing court must quash or modify a subpoena that . . . subjects a person to
undue burden.” Fed. R. Civ. P. 45(c)(3)(A)(iv).
12
“take steps to avoid imposing undue burden or expense on a person
subject to the subpoena.”
Fed. R. Civ. P. 45(c)(1) (emphasis added).
Cf. Info-Hold, Inc. v. Sound Merch., Inc., 538 F.3d 448, 457 (6th Cir.
2008) (“‘[D]istrict courts have discretion to limit the scope of
discovery where the information sought is overly broad or would prove
unduly burdensome to produce.’”) (quoting Surles ex rel. Johnson v.
Greyhound Lines, Inc., 474 F.3d 288, 305 (6th Cir. 2007)) (emphasis
added).
Accordingly, this Court and another district court in this
circuit have previously concluded that only the entity responding to
the subpoena has standing to challenge the subpoena on the basis of
undue burden.
See Levitin v. Nationwide Mut. Ins. Co., 2:12-cv-34,
2012 U.S. Dist. LEXIS 177738, at *14-15 (S.D. Ohio Dec. 14, 2012)
(“Here, the subpoenas are directed to Plaintiff’s prior employers.
Thus, only Plaintiff’s prior employers have standing to challenge the
subpoenas on the ground that production of the subpoenaed documents
would pose an undue burden expense.”); McNaughton-McKay, Elec. Co. v.
Linamar Corp., No. 09-cv-11165, 2010 U.S. Dist. LEXIS 59275, at *9-10
(E.D. Mich. June 15, 2010) (“Defendant [which was not the recipient of
the subpoena] does not have standing to argue that Chrysler’s
compliance with the subpoena will cause undue burden where Chrysler
has not objected to the subpoena on this ground.”).
Cf. Donahoo v.
Ohio Dep’t of Youth Servs., 211 F.R.D. 303, 306 (N.D. Ohio Mar. 1,
2002) (“The party to whom the subpoena is directed is the only party
with standing to oppose it.”).
Here, the moving defendants are not required to respond to the
subpoena; it is WOW which is the responding party.
13
WOW has not moved
to quash the subpoena, nor has it even suggested that responding to
the subpoena will impose an undue burden on it.
Moreover, plaintiff’s
representation that WOW has already produced subpoenaed information
regarding other Doe defendants is uncontroverted.
See Memo. in Opp.,
p. 6 (“In fact Wide Open West has not only represented that it will
respond to the subpoenas after giving its customers thirty days’
notice, it has actually responded by providing the information for
other John Doe Defendants as of 4/15/13.”).
Under these
circumstances, the moving defendants have not established that they
have standing because the subpoena imposes an undue burden on them.
c.
“Affected by” the subpoena
Finally, the moving defendants’ conclusory reference to Fed. R.
Civ. P. 45(c)(3)(B) does not confer standing on the moving defendants.
Motion, p. 2 (citing, without elaborating, that this subsection
“allows a person affected by, but not subject to, a subpoena to move
to quash to [sic] subpoena”).
To the extent that the moving
defendants’ reliance on this provision suggests that they are
“affected by” the subpoena because they have a personal or proprietary
interest or because the subpoena imposes an undue burden, those
arguments fail for the reasons discussed supra.
Similarly, to the
extent that the conclusory reference is based on alleged reputational
harm, see id., that assertion is without merit for the reasons
discussed infra.
Accordingly, the Court cannot conclude that the
moving defendants have standing to object to the subpoena or that the
subpoena imposes an undue burden on the moving defendants.
14
2.
Risk of extortion
Even if the moving defendants had standing to challenge the
subpoena, their arguments contesting production of the subpoenaed
information would nevertheless be unpersuasive.
For example, the
moving defendants contend that a subscriber is not necessarily
responsible for illegal downloads simply because that activity is
associated with a subscriber’s address:
Multiple individuals may use
a single IP address and any one of those users, other than the
subscriber, may have improperly downloaded protected information.
Reply, pp. 1-3.
The moving defendants therefore argue that some
courts (but not within this circuit) have recognized that “[t]his type
of fishing expedition [obtaining identity and contact information of
subscribers] leads to an extortion risk[.]”
Motion, p. 4 (citing VPR
Internationale v. Does 1-1017, No. 11-2068, 2011 U.S. Dist. LEXIS
64656, at *4 (C.D. Ill. Apr. 29, 2011)).
More specifically, the
moving defendants suggest that the prospect of public embarrassment
arising from disclosure of their identities pressures innocent Doe
defendants into settlements.
See Reply, pp. 3 (“This risk of false
positives gives rise to the potential for coercing unjust settlements
from innocent defendants such as individuals who want to avoid the
embarrassment of having their names publicly associated with
allegations of illegally downloading.”) (citing Digital Sin, Inc. v.
Does 1-176, 279 F.R.D. 239, 242 (S.D. N.Y. 2012)), 8-10, 19
(“Plaintiff may be merely seeking this contact information in order to
bother a list of IP address holders who are not reliably going to be
found infringers, with unfounded allegations and demands for
15
payment.”).
However, other than these generalized fears, the moving
defendants have offered no evidence (or even allegations) that the
plaintiff in this action has engaged in abusive litigation tactics.
Under these circumstances, the Court is not persuaded that imputing
such guilt to plaintiff and precluding the pursuit of this action is
appropriate.
See, e.g., Malibu Media, LLC v. Doe, 285 F.R.D. 273, 278
(S.D. N.Y. 2012) (“[N]one of the instances of improper litigation
tactics that have been brought to our attention involve plaintiff or
plaintiff’s counsel.
We are reluctant to prevent plaintiff from
proceeding with its case based only on a ‘guilt-by-association’
rationale.”).
The Court also notes that, unlike the allegations of
illegal downloads in other actions addressing coercive settlements,
cf. id, this litigation does not involve the alleged downloading of
pornography.
Moreover, even if this case did present a risk of public
embarrassment, the Doe defendants may take measures to protect
themselves.
See, e.g., Malibu Media, LLC v. Doe, 902 F. Supp. 2d 690
(E.D. Penn. 2012) (granting motions to proceed anonymously).
Additionally, should the Doe defendants later establish that
plaintiff’s claims have been vexatiously pursued or frivolous, or if
the Doe defendants prevail in this action, they may seek sanctions
and/or reimbursement for their costs and fees.
See Fed. R. Civ. P.
11; 28 U.S.C. § 1927; 17 U.S.C. § 505; Fed. R. Civ. P. 54.
For all
these reasons, the moving defendants’ motions to quash the subpoena
based on a generalized fear of extortion is not well-taken.
16
3.
Good cause
The moving defendants also argue that the Court should quash the
subpoena because it is not supported by good cause.
Motion, p. 10
(“Good cause exists to quash the subpoena served on Wide Open West to
compel the disclosure of the name, address, telephone number and email address of [the moving defendants].”); Reply, pp. 6-8 (arguing
that determining whether good cause exists to permit expedited
discovery requires a showing of good cause and citing to cases outside
this circuit for factors that the court must weigh), 19 (“Good cause
exists to quash the subpoena[.]”).
For example, the moving defendants
contend that the subpoenaed information does not establish that the
subscribers are the actual infringers.
Reply, pp. 6-8.
The moving defendants’ arguments are not well-taken.
As noted
supra, this Court previously concluded that plaintiff’s request for
expedited discovery was supported by good cause.
Order, Doc. No. 4
(citing Arista Records, LLC v. Does 1-15, 2007 WL 5254326, *2) (S.D.
Ohio May 17, 2007)).
See also Breaking Glass Pictures v. Does, No.
2:13-cv-389, 2013 U.S. Dist. LEXIS 88090 (S.D. Ohio June 24, 2013)
(finding good cause and permitting expedited discovery in copyright
infringement case in order to obtain the identity of each Doe
defendant).
To the extent that the moving defendants apparently ask
the Court to revisit this conclusion, they have offered nothing to
establish that the prior decision was erroneous.
For example, the
moving defendants argue at length that the mere identification of the
subscriber does not necessarily establish that the subscriber was the
person who illegally downloaded the copyrighted work.
17
Reply, pp. 6-8.
However, nothing in Rule 45 permits a court to quash a subpoena based
on “a general denial of liability.”
See, e.g., First Time Videos, LLC
v. Doe, 276 F.R.D. 241, 250 (N.D. Ill. 2011).
P. 45.
See also Fed. R. Civ.
Instead, arguments related to the merits of the allegations
are appropriately addressed in the context of a motion to dismiss or a
motion for summary judgment rather than on a motion to quash.
See,
e.g., First Time Videos, LLC, 276 F.R.D. at 250.
The moving defendants’ arguments related to privacy and abusive
litigation tactics, Reply, pp. 8-9, are likewise unavailing for the
reasons discussed supra.
Similarly, arguments that the subpoenaed
information is irrelevant because that information “cannot give you
the identity of the infringer[,]” Motion, p. 9, are not well-taken.
As this Court previously concluded, plaintiff cannot meet its service
obligation under Fed. R. Civ. P. 4 without the requested discovery.
Order, Doc. No. 4, pp. 1-2.
Moreover, Rule 26 authorizes broad
discovery, including discovery that “appears reasonably calculated to
lead to the discovery of admissible evidence.”
26(b)(1).
Fed. R. Civ. P.
Therefore, even if discovery later reveals that it was
someone other than the subscriber who violated plaintiff’s copyright,
the subpoenaed information (the subscriber’s contact information) is
likely to lead to the discovery of admissible information, i.e., the
identity of the actual infringer.
In short, the moving defendants’
request to quash the subpoena is without merit.
III. REQUESTS TO SEVER THE DOE DEFENDANTS
The moving defendants also ask the Court to sever the Doe
defendants, contending that joinder is improper under Fed. R. Civ. P.
18
20.
Motion, pp. 4-9; Reply, pp. 10-16.
Rule 20 permits persons to be
joined as defendants in one action if (1) “any right to relief is
asserted against them jointly, severally, or in the alternative with
respect to or arising out of the same transaction, occurrence, or
series of transactions or occurrences[,]” and (2) the claims against
the various defendants share a common question of law or fact.
R. Civ. P. 20(a)(2).
Fed.
“Under the Rules, the impulse is toward
entertaining the broadest possible scope of action consistent with
fairness to the parties; joinder of claims, parties and remedies is
strongly encouraged.”
715, 724 (1966).
United Mine Workers of Am. v. Gibbs, 383 U.S.
See also Brown v. Worthington Steel, 211 F.R.D. 320,
324 (S.D. Ohio 2002) (“Courts liberally permit joinder under Rule
20(a).”)
(citing United Mine Workers of Am., 383 U.S. at 724).
To
that end, courts in this circuit give the terms “transaction” and
“occurrence” a broad and liberal interpretation.
Lasa Per L'Industria
Del Marmo Societa Per Azioni v. Alexander, 414 F.2d 143, 147 (6th Cir.
1969). “The purpose of Rule 20(a) is to promote judicial economy and
trial convenience.”
Evans v. Midland Funding LLC, 574 F. Supp. 2d
808, 811 (S.D. Ohio 2008) (quoting Lee v. Dell Products, L.P., No.
3:06cv0001, 2006 U.S. Dist. LEXIS 75573, 2006 WL 2981301, *7 (M.D.
Tenn. Oct. 16, 2006) (internal quotation marks omitted)).
“However, even if the requirements of Rule 20 are met, a district
court nevertheless retains considerable discretion to sever defendants
if it finds that the objectives of the rule are not fostered, or that
joinder would result in prejudice, expense, or delay.”
Voltage
Pictures, LLC v. Does 1-43, No. 1:13CV465, 2013 U.S. Dist. LEXIS
19
63764, at *5 (N.D. Ohio May 3, 2013).
The Court shall address each of
the requirements under Rule 20(a)(2) in turn.
A.
Same Transaction or Series of Transactions
The moving defendants specifically argue that the mere
allegations that the Doe defendants acted as a “swarm” or participated
in BitTorrent technology is insufficient to establish that they
engaged in a single transaction or in a series of closely related
transactions under Rule 20.
Motion, pp. 4-8; Reply, pp. 10-17.
Both
parties acknowledge, see Memo. in Opp., p. 7; Reply, p. 10, and this
Court agrees, that federal courts within this circuit and across the
country5 are divided on whether or not membership in the same swarm
satisfies the joinder requirements under Rule 20.
See, e.g., Voltage
Pictures, LLC, 2013 U.S. Dist. LEXIS 63764, at *5-6 (collecting
cases); Patrick Collins, Inc., 2013 U.S. Dist. LEXIS 50674, at *12-14
(same); Third Degree Films, Inc. v. Doe, No. 12-cv-14106, 2013 U.S.
Dist. LEXIS 44131, at *17 (E.D. Mich. Mar. 18, 2013) (“In short, the
heart of this disagreement is whether the mere alleged participation
of a group of defendants in the same ‘swarm’ is, in itself, sufficient
to satisfy Rule 20(a)(2)'s ‘same transaction, occurrence, or series of
transactions or occurrences’ requirement, or if it instead simply
5
Even district courts within the same district in this circuit are split.
See, e.g., Voltage Pictures, LLC, 2013 U.S. Dist. LEXIS 63764, at *11-12
(permitting joinder); Night of the Templar, LLC v. Doe, No. 1:13-CV-396, 2013
U.S. Dist. LEXIS 51625, at *11 (N.D. Ohio Apr. 10, 2013) (severing claims
after finding that “participation in a specific swarm is too imprecise a
factor absent additional information relating to the alleged copyright
infringement to support joinder under Rule 20(a)”); Patrick Collins, Inc. v.
John Does 1-33, No. 4:12-cv-13309, 2013 U.S. Dist. LEXIS 50674 (E.D. Mich.
Feb. 27, 2013) (denying request to sever claims); Patrick Collins, Inc. v.
Doe, No. 11-cv-15231, 2012 U.S. Dist. LEXIS 40536, at *9-13 (E.D. Mich. Mar.
26, 2012) (finding that alleged participation in a swarm did not support
joinder under Rule 20).
20
shows that the defendants ‘committed the same type of violation in the
same way.’”) (quoting Next Phase Distrib., Inc. v. John Does 1-27, 284
F.R.D. 165, 168-69 (S.D.N.Y. 2012)).
Some courts severing claims in swarm cases have concluded that
simply participating in a swarm does not necessarily establish that
defendants participated in the same transaction or occurrence.
See,
e.g., Night of the Templar, LLC, 2013 U.S. Dist. LEXIS 51625, at *9-10
(“‘Merely alleging that the Doe defendants all used the same filesharing protocol, BitTorrent, to conduct copyright infringement of
Plaintiff’s film without any indication that they acted in concert
fails to satisfy the arising out of the . . . same series of
transactions or occurrences requirement.’”) (quoting Hard Drive Prod.,
Inc. v. Does 1-188, 809 F. Supp. 2d 1150, 1151 (N.D. Cal. 2011));
Patrick Collins, Inc. v. Doe, No. 11-cv-15231, 2012 U.S. Dist. LEXIS
40536, at *9-13 (E.D. Mich. Mar. 26, 2012) (“[T]he the court concludes
that simply alleging the use of BitTorrent technology, like earlier
P2P file sharing protocols, does not comport with the requirements
under Rule 20(a) for permissive joinder.”).
For example, unknown
defendants may access the swarm at different times.
Night of the
Templar, LLC, 2013 U.S. Dist. LEXIS 51625, at *10 (“Plaintiff’s IP
address exhibits indicate that Defendants accessed the swarm at
different times, on different days, using different BitTorrent
clients.
This suggests that Defendants were not wrapped up in a
single factual occurrence.”) (internal citations omitted); Patrick
Collins, Inc., 2012 U.S. Dist. LEXIS 40536, at *10 (“Each of the IP
addresses connected to the investigative server at different times and
21
dates to download a piece of the Work and there is no allegation that
any of the computers associated with the IP addresses downloaded or
uploaded pieces of the Work with each other.”).
Accessing a swarm at
different times suggests that computer users were not acting
simultaneously or in concert, which persuades some courts that the
actions of those users were not part of the same transaction or series
of transactions.
See, e.g., Patrick Collins, Inc., 2012 U.S. Dist.
LEXIS 40536, at *12 (“The absence of information concerning the number
of total users in the swarm, coupled with the BitTorrent protocol’s
ability to quickly share files further demonstrates that it is
implausible that any of the Doe defendants were simultaneously sharing
pieces of plaintiff’s Work”) (emphasis added); Patrick Collins, Inc.
v. Doe, No. 12-12596, 2012 U.S. Dist. LEXIS 187556, at *3-4 (E.D.
Mich. Aug. 28, 2012) (“This, combined with the fact that ‘its users
share files in relatively quick time frame, ranging anywhere from
fifteen minutes to a few hours,’ means that it is seemingly
implausible that any of the Doe defendants simultaneously shared
pieces of the Work with each other, and thus acted ‘in concert’
sufficient to grant permissive joinder under Rule 20(a).”) (emphasis
added).
Conversely, some courts have concluded that joinder under Rule 20
does not necessarily require simultaneous or concerted action.
See,
e.g., Patrick Collins Inc. v. John Does 1-28, No. 12-13670, 2013 U.S.
Dist. LEXIS 11349, at *21 (E.D. Mich. Jan. 29, 2013) (“Joinder under
the federal rules, however, does not require simultaneity — ‘concerted
action is not required for joinder.’”) (quoting Patrick Collins, Inc.
22
v. Doe, 282 F.R.D. 161, 168 (E.D. Mich. 2012)); Nucorp, Inc. v. Does
1-24, No. 2:11-CV-15222, 2012 U.S. Dist. LEXIS 187547, at *14 (E.D.
Mich. Oct. 18, 2012) (“[C] oncerted action is not a requirement for
joinder under Rule 20(a)(2).”) (emphasis in original); Patrick
Collins, Inc., 282 F.R.D. at 167 (“But, a concert of action is not
required since Plaintiff alleges a right to relief severally against
Defendants.”).
Instead, “[o]ther courts have permitted joinder, based
on the theory that the claims are ‘logically related,’ and that the
collaborative activity of the members of the swarm demonstrates that
they engaged in the same transaction or series of transactions.”
Voltage Pictures, LLC, 2013 U.S. Dist. LEXIS 63764, at *6 (collecting
cases).
See also Patrick Collins Inc. v. John Does 1-28, No. 12-
13670, 2013 U.S. Dist. LEXIS 11349, at *14-15 (E.D. Mich. Jan. 29,
2013) (“The ‘logical relationship’ test, in turn, ‘is satisfied if
there is substantial evidentiary overlap in the facts giving rise to
the cause of action against each defendant.
In other words, the
defendants’ allegedly infringing acts, which give rise to the
individual claims of infringement, must share an aggregate of
operative facts.’”) (quoting In re EMC Corp., 677 F.3d 1351, 1358
(Fed. Cir. 2012)).
In addition, at least one district court in this
circuit has concluded that allegations that defendants, inter alia,
used the same digital file satisfied Rule 20(a)(2)’s “same
transaction, occurrence, or series of transactions or occurrences”
requirement.
Third Degree Films v. Does 1-36, No. 11-CV-15200, 2012
U.S. Dist. LEXIS 87891, at *28-32 (E.D. Mich. May 29, 2012).
See also
Patrick Collins, Inc. v. John Does 1-33, No. 4:12-cv-13309, 2013 U.S.
23
Dist. LEXIS 50674 (E.D. Mich. Feb. 27, 2013) (recommending, inter
alia, that motions to sever be denied without prejudice where
defendants shared the same digital file in the same swarm).
Cf.
Voltage Pictures, LLC, 2013 U.S. Dist. LEXIS 63764, at *8-11 (finding
that allegations that unknown defendants participating in the same
swarm downloading the same motion picture was sufficient to support
permissive joinder at the preliminary stage).
In Third Degree Films, the district court noted that, by virtue
of uploading in a swarm, the unknown defendants helped pass on pieces
of the copyrighted work:
[E]ach defendant allegedly participated in the same swarm
for the same digital encoding of the Work and thereby
jointly contributed to the illegal distribution of the Work
to others. By undoubtedly uploading to other peers in the
swarm, which enabled those peers to upload to still other
peers, all 36 Doe Defendants jointly contributed to either
growing the swarm or maintaining its existence.
Id. at *27-28.
See also Voltage Pictures, LLC, 2013 U.S. Dist. LEXIS
63764, at *11 n.2 (“[E]ach [defendant] participated in the BitTorrent
swarm as an uploader (distributor) and downloader (copier) of the
illegally transferred file.”); Patrick Collins Inc., 2013 U.S. Dist.
LEXIS 11349, at *18-19 (“‘[I]t is difficult to see how the sharing and
downloading activity alleged in the Complaint — a series of
individuals connecting either directly with each other or as part of a
chain or ‘swarm’ of connectivity designed to illegally copy and share
the exact same copyrighted file —
could not constitute a 'series of
transactions or occurrences' for purposes of Rule 20(a).’”) (quoting
Digital Sin, Inc. v. Does 1-176, 279 F.R.D. 239, 244 (S.D.N.Y.2012))
(emphasis in original).
Although the court in Third Degree Films
24
acknowledged that future discovery might reveal that the plaintiff had
failed to satisfy the requirements for joinder under Rule 20(a)(2) or
that severance is appropriate, that court nevertheless concluded that
joinder was proper at the initial stages of the litigation.
Third
Degree Films, 2012 U.S. Dist. LEXIS 87891, at *29-33.
Here, the Complaint alleges that the Doe defendants used the
BitTorrent protocol to join together in a “swarm” in order to
illegally download copyrighted material.
Complaint, ¶ 5.
More
specifically, the Complaint alleges that the unidentified defendants
all violated the same law (17 U.S.C. § 101 et seq.) in the same series
of transactions (downloading and distributing the same file, Dawn
Rider) by using the same means (the BitTorrent protocol).
11.
Id. at ¶
According to plaintiff, “[t]he infringed work was included in one
file related to the torrent file; in other words, all of the
infringements alleged in this lawsuit arise from the exact same unique
copy of Plaintiff’s movie as evidenced by the cryptographic hash
value.”
Id.
The unknown defendants’ alleged wrongful acts occurred
in the same series of transactions or occurrences because each
defendant downloaded and/or distributed, or offered to distribute Dawn
Rider to other infringers on the network who in turn downloaded and/or
distributed this movie.
Id.
Plaintiff therefore believes that the
unidentified defendants “each conspired with other infringers on the
BitTorrent network to copy and/or distribute the Motion Picture,
either in the same transaction or occurrence or in a series of
transactions or occurrences.”
Id.
Construing the terms “transaction” and “occurrence” broadly, see
25
Lasa Per L'Industria Del Marmo Societa Per Azioni v. Alexander, 414
F.2d at 147, and keeping in mind that joinder is strongly encouraged,
see United Mine Workers of Am. v. Gibbs, 383 U.S. at 724, this Court
concludes that plaintiff has alleged facts sufficient to satisfy the
“same transaction, occurrence, or series of transactions or
occurrences” requirement at this preliminary stage of proceedings.
See, e.g., Third Degree Films, 2012 U.S. Dist. LEXIS 87891, at *29-33;
Patrick Collins, Inc. v. Doe, 286 F.R.D. 319, 321-22 (E.D. Mich.
2012).
B.
Common Question of Law or Fact
Rule 20 also requires that a plaintiff establish that claims
against all defendants share a common question of fact or law.
R. Civ. P. 20(a)(2)(B).
Fed.
Here, as discussed supra, plaintiff has
alleged that the Doe defendants (1) violated the same law (17 U.S.C. §
101 et seq.); (2) infringed plaintiff’s rights in Dawn Rider by using
the same digital file; and (3) used the same BitTorrent protocol.
The
Court concludes that these allegations, at this preliminary stage,
satisfy Rule 20(a)(2)(B).
See, e.g., Third Degree Films, 2012 U.S.
Dist. LEXIS 87891, at *13-14 (finding that the plaintiff had
adequately pled facts satisfying Rule 20(a)(2)(B) where plaintiff
alleged the same causes of action involving the same digital file and
the same investigation led to discovery of defendants’ IP addresses);
Patrick Collins, Inc. v. John Does 1-33, No. 4:12-cv-13309, 2013 U.S.
Dist. LEXIS 50674, at *11 (same); Patrick Collins, Inc. v. Doe, 286
F.R.D. at 322.
26
C.
Other Considerations
In addition to arguing that plaintiff has failed to satisfy the
requirements for joinder under Rule 20(a)(2), the moving defendants
apparently also ask this Court to sever the claims against the
defendants because of, inter alia, the “tremendous risk of creating
unfairness and denying individual justice to those sued” as well as
the risk of extortion.
See, e.g., Motion, p. 5; Reply, pp. 15, 17.
In reaching its decision to deny the moving defendants’ request to
sever, this Court is aware of these concerns, which have been echoed
in the decisions of other courts.
Cf. Night of the Templar, LLC v.
Doe, No. 1:13-CV-396, 2013 U.S. Dist. LEXIS 51625, at *5 (“Rather,
plaintiffs often seek to take advantage of the resources of federal
courts to force small, individual settlements.”); Third Degree Films,
Inc. v. Doe, No. 12-cv-14106, 2013 U.S. Dist. LEXIS 44131, at *36-44
(noting the risk of forced settlements and a plaintiff’s desire to
join defendants in order to avoid paying multiple filing fees).
However, as discussed supra, the law affords remedies should
defendants establish that plaintiff has engaged in abusive litigation
tactics or that plaintiff’s claims are frivolous.
See Fed. R. Civ. P.
11; 28 U.S.C. § 1927; 17 U.S.C. § 505; Fed. R. Civ. P. 54.
See also
Patrick Collins, Inc. v. John Does 1-33, No. 4:12-cv-13309, 2013 U.S.
Dist. LEXIS 50674, at *25-27 (declining to exercise discretionary
severance on the basis of general fears of forced settlement in the
absence of case-specific allegations of coercion).
In light of these
safeguards, the Court is not persuaded that its discretion is best
exercised in severing the claims at this stage of the proceedings.
27
Cf. Sojo Prod. Inc. v. Does 1-67, Nos. 3:12-CV-599, 3:12-CV-600, 3:12CV-601, 3:12-CV-602, 3:12-CV-603, 2013 U.S. Dist. LEXIS 58602, at *8
(E.D. Tenn. Apr. 24, 2013) (denying without prejudice request as
“premature.
The Court does not have information sufficient to gauge
the appropriateness of the joinder of the Defendants at this time, and
severing these claims at this early stage of litigation is likely to
cause delays and hinder disposition of these matters”).
WHEREUPON, defendant Doe No. 163’s Motion to Quash Subpoena and
Motion for Severance, Doc. No. 5 (“Doe No. 163’s Motion”) and
defendant Doe No. 189’s Motion to Quash Subpoena and Motion for
Severance, Doc. No. 6, are DENIED.
July 1, 2013
s/Norah McCann King
Norah McCann King
United States Magistrate Judge
28
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?