Mick Haig Productions, e.K. vs. Does, et al.

Filing 13

MOTION for Extension of Time to Reply re: 10 MOTION for Sanctions, MOTION for Attorney Fees (in the alternative) MOTION for Attorney Fees filed by Does 1-670 with Brief/Memorandum in Support. (Attachments: # 1 Exhibit(s) Proposed Reply, # 2 Affidavit(s) Matthew Zimmerman, # 3 Affidavit(s) Paul Alan Levy) (Zimmerman, Matthew)

Download PDF
UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION MICK HAIG PRODUCTIONS, E.K., Plaintiff, v. DOES 1-670 Defendant. ) ) ) ) ) ) ) ) ) ) ) ) CA. 3:10-cv-01900-N DEFENDANTS’ REPLY IN SUPPORT OF THEIR MOTION FOR ATTORNEY’S FEES OR SANCTIONS I. INTRODUCTION In his “Response Regarding Case Activity” of April 15, 2011 (“Response”),1 Plaintiff’s counsel Evan Stone fails to provide any colorable justification for his intentional misuse of the Court’s subpoena power for the purpose of coercing settlements of claims of alleged pornography downloading. Moreover, Mr. Stone fails to fully comply with the Court's April 1, 2011, demand that he fully account for his actions. Mr. Stone’s repeated misuse of invasive federal subpoenas, which he now admits resulted in the improper disclosure of the identities of Internet subscribers, cannot be ignored. Defendants respectfully request that Mr. Stone again be ordered to make a full and complete accounting of his actions, including disclosing all information obtained pursuant to his improperly issued subpoenas – including but not limited to all identities obtained and all subsequent communications to the Defendants whom those letters identified. Defendants further request that their motion for sanctions now be granted. II. ATTORNEY STONE’S RESPONSE TO THE COURT’S ACCOUNTING ORDER On April 1, 2011, the Court granted preliminary relief in response to Defendants’ motion for sanctions, ordering in part that Plaintiff’s counsel “disclose all actions taken by him in connection with issuing subpoenas.” In his Response, Mr. Stone disclosed the following (among other) information: • “[S]ubpoenas were in fact served on several service providers in control of the internet accounts by which the [allegedly] infringing activity in this case occurred.” Response at 1. • Mr. Stone issued subpoenas to ten Internet service providers (“ISPs”) seeking identity-related information about Internet subscribers. Those subpoenas were all 1 Mr. Stone failed to serve Defendants’ counsel with his Response. Undersigned counsel was not made aware of the filing until the Court independently brought the matter to counsel’s attention. Counsel was granted access to the filing on May 18, 2011. See Affidavit of Paul Levy of May 27, 2011 (“Levy Aff.”) at ¶ 2. The material filed by Mr. Stone does not appear to include any personally identifiable information about any Internet subscriber (although Mr. Stone admits that he obtained such material), and Defendants do not in any case quote such personally identifiable information in this Reply. 1 issued after the filing of Plaintiff’s Motion for Leave to Take Discovery Prior to Rule 26(f) Conference (DN 2, filed September 30, 2010) and after the Court ordered that ISPs preserve the information sought instead of granting Plaintiff’s Motion for pre-conference discovery (DN 3, issued October 21, 2010). Response at 1-2; DN 12-1 (copies of subpoenas) at 1, 6, 10, 20, 24, 28, 32, 38, 43, 47. • Mr. Stone issued these subpoenas to Charter Communications, Clearwire, Comcast, Cox, Frontier Communications, Insight Communications, Time Warner Cable, WideOpen West, Windstream NuVox, and Verizon. DN 12-1 (copies of subpoenas) at 1, 6, 10, 20, 24, 28, 32, 38, 43, 47. • Mr. Stone received information in response to his subpoenas from at least two ISPs: Verizon and Frontier Communications. Response at 2. • Mr. Stone represents that he was unable to access any of the information about its subpoenaed subscribers as provided by Verizon. Response at 2. • Frontier Communications “provided Plaintiff with records for account holders to which accounts were assigned on the dates and times the infringing activities occurred.” Response at 2. Mr. Stone indicates that “[t]hese records are no longer in Plaintiff’s possession,” implying that Mr. Stone destroyed or otherwise disposed of that material obtained as a result of the issuance of his subpoenas. • Mr. Stone contacted ISP account holders, presumably of Frontier Communications, although not clarified in Mr. Stone’s response. Response at 3. III. ARGUMENT A. Plaintiff’s Counsel Has Not Presented Even a Colorable Excuse for Having Issued Subpoenas in Violation of Rule 45. Federal Rule of Civil Procedure 26(d) states: A party may not seek discovery from any source before the parties have conferred as required by Rule 26(f), except in a proceeding exempted from initial disclosure under Rule 26(a)(1)(B), or when authorized by these rules, by stipulation, or by court order. 2 Notwithstanding the absence of a Rule 26(f) discovery conference, and despite his failure to meet any of the other Rule 26(d) conditions that would have authorized pre-conference discovery, Mr. Stone issued subpoenas and obtained Internet subscriber identity information. Mr. Stone offers two arguments against being sanctioned for such blatantly improper behavior. First, Mr. Stone theorizes that he could have chosen an alternative procedure (a subpoena pursuant to 17 U.S.C. § 512(h)) in place of the procedure for which he sought and was denied authorization. DN 7 at 1. Second, Mr. Stone argues that the Court’s explicit denial of his discovery request was not “normal” and thus “robbed Plaintiff of th[e] opportunity” to conduct discovery in the manner to which he was accustomed and in which his client preferred. Id. at 12. Neither argument has merit. Mr. Stone’s musings about the “normality” of the Court’s decision merit little if any discussion. Mr. Stone and his client must comply with the Federal Rules of Civil Procedure, even if he feels that it inconveniences him or his client. Mr. Stone’s other argument fares little better. Whether or not Mr. Stone could have used an alternative vehicle such as a subpoena under 17 U.S.C. § 512(h) is irrelevant for two reasons. First, he did not issue – and indeed could not have issued – such a subpoena. Instead, he filed suit and issued subpoenas under Rule 45. See, e.g., DN 12-1 at 2 (form subpoena issued by Stone to Charter Communications Legal Department on October 22, 2010, invoking Rule 45). Once suit is filed, proceedings are governed by the Federal Rules of Civil Procedure and subpoenas must be issued pursuant to Rule 45 which requires (among other things) that discovery be authorized according to the conditions set forth in Rule 26(d). No such conditions were met. By contrast, subpoenas authorized under 17 U.S.C. § 512(h) are pre-discovery subpoenas and are inapplicable when suit has already been filed. See, e.g., Recording Indus. Ass'n of Am. v. Univ. of N.C. at Chapel Hill, 367 F. Supp. 2d 945, 958 (D.M.N.C. 2005). In any event, any attempt to seek identity information related to the Doe Defendants in this case pursuant to 17 U.S.C. § 512(h) would be unlawful inasmuch as such a subpoena may only be issued to an ISP that stores on its servers material that is infringing or the subject of 3 infringing activity. See, e.g., Recording Indus. Ass'n of Am. v. Verizon Internet Servs., 351 F.3d 1229, 1233 (D.C. Cir. 2003); see also Recording Indus. Ass'n of Am. v. Charter Communs., Inc., 393 F.3d 771, 777 (8th Cir. 2005). Plaintiff’s counsel does not allege (and has no basis to allege) that the ISPs that were illegitimately subpoenaed were in any way storing allegedly infringing material on their servers. To the contrary, counsel admits that it was the end users – not ISPs – that hosted the material in question. See, e.g., Complaint (DN 1) at ¶ 9 (“The torrent site hosts and distributes small reference files known as “torrents.” Although torrents do not contain actual audio/visual media, they instruct a user’s computer where to go and how to get the desired file.”); ¶ 10 (“A tracker directs a BitTorrent user’s computer to other users who have a particular file, and then facilitates the download process from those users.”). Section 512(h) is structurally linked to the storage functions of an ISP and not to its transmission functions, such as those listed in 17 U.S.C. § 512(a). Verizon, 351 F.3d at 1237. In short, none of the information sought by Stone could have been lawfully obtained pursuant to alternative process such as a 17 U.S.C. § 512(h) subpoena. B. Plaintiff’s Counsel Has Not Fully Accounted for His Actions in Connection With the Improper Issuance of Subpoenas. Notwithstanding the Court’s Order to “disclose all actions taken by him in connection with issuing subpoenas,” explicitly including but not limited to “any communications with or materials produced by any Internet Service Provider” and “any communications with the Defendant Does or their representatives,” and despite acknowledging that he obtained readable account information from at least one ISP (Frontier Communications), Mr. Stone has refused to disclose what account information he received or the content and nature of any of the (admitted) subsequent communications with those individuals. Instead, Mr. Stone deceptively asserts that he has had no contact with Doe Defendants as he (by definition) does not know who such Doe Defendants are. That is, Mr. Stone acknowledges issuing subpoenas to ten ISPs in pursuit of Doe Defendants tied to IP addresses associated with subscriber accounts, and he acknowledges obtaining information about and contacting some of those subscribers – as he says in paragraph 6 4 of his response, “only account holders have been contacted” – but he declines to describe them as “Doe Defendants” and therefore refuses to identify those subscribers to Defendants’ counsel or to the Court. Such statements amount to mere sophistry. Mr. Stone’s deceptive answers contravene both the letter and spirit of the Court’s Order and should not be tolerated. To begin with, such protestations are beside the point and gain Mr. Stone nothing: any subscriber information obtained pursuant to an improper subpoena is an unwarranted and impermissible invasion of privacy, whether or not it is related to one of the Doe Defendants. If the “account holders” are non-parties, they enjoy greater privacy protection under the discovery rules precisely because they are even more vulnerable to harm when (as here) litigants take it upon themselves to invent their own discovery standards. See, e.g., Doe v. 2themart.com, 140 F.Supp.2d 1088, 1095 (W.D. Wash. 2001) (“[N]on-party disclosure is only appropriate in the exceptional case where the compelling need for the discovery sought outweighs the First Amendment rights of the anonymous speaker.”). More directly, Mr. Stone’s own cover letters to the subpoenaed ISPs indicate that the account holders are the very Does Mr. Stone is seeking; Stone asks the ISPs to produce “records regarding customers who used your internet service for the unauthorized reproduction and distribution of my client’s copyrighted motion picture.” DN 12-1 (copies of subpoenas and accompanying communication) at 1, 6, 10, 20, 24, 28, 32, 38, 43, 47 (emphasis added). Indeed, Mr. Stone makes no such distinction in this or other mass copyright infringement actions, regularly seeking to hold subscribers responsible for the activity taking place over that subscriber’s connection. See, e.g., Exhibit 1 to the Affidavit of Matthew Zimmerman of May 27, 2011 (“Zimmerman Aff.”) at 2 (requesting without authority (in cover letter attached to a 17 U.S.C. § 512(h) subpoena for identity information) that subscribers’ Internet accounts be blocked or suspended, without a judicial finding of infringement and regardless of who actually made use of the account). 5 C. Attorney Stone’s Response and Accompanying Documentation Should Be Unsealed. In its Order of April 1, 2011, the Court ordered Mr. Stone to identify (among other things) “materials produced by any Internet Service Provider,” “communications with Defendant Does,” and other potentially personally identifiable information. Accordingly, the Court ordered Mr. Stone to file under seal. DN 11. Mr. Stone has not in fact produced any personally identifiable information, and making Mr. Stone’s submissions publicly available may assist individual Defendants who check the Court’s electronic docket; they will certainly inform the public about the events in this case. Therefore, applying the presumption that the public has a right to access all judicial documents, Defendants request that Stone’s Response and accompanying documentation – Docket Numbers 12 and 12-1 – be unsealed. See, e.g., Nixon v. Warner Communications, Inc., 435 U.S. 589, 597 (1978) (recognizing a “general right to inspect and copy public records and documents, including judicial records and documents.”). However, if any future submissions by Stone include personally identifiable information, he should be ordered to file unredacted copies under seal to protect the individuals at risk, but to e-file copies from which personally identifying information has been redacted. Copies of both versions should be served on undersigned counsel for the Does. IV. CONCLUSION Plaintiff’s counsel Evan Stone sought permission from this Court to issue invasive discovery to obtain the identities of literally hundreds of individuals from across the country – most of whom appear to reside outside of this Court’s jurisdiction – who he alleged downloaded pornographic films in order to coerce settlements. This Court declined that invitation, correctly recognizing the potential for abuse in what Mr. Stone proposed. Undeterred, Mr. Stone went forward anyway, issuing subpoenas, obtaining subscriber information, and – presumably – issuing settlement letters demanding the payment of thousands of dollars. Especially as Mr. Stone continues to pursue similar actions all across the country, utilizing similar tactics in which he issues subpoenas for identity information with the sole aim 6 of coercing settlements, such abuse of the discovery process cannot be tolerated. Defendants respectfully request the following: • That Mr. Stone be ordered to fully comply with the Court’s accounting order, identifying (and providing copies of) any material obtained in response to the subpoenas in question and identifying (and providing copies of) all subsequent communications with any individuals identified. • That Docket Numbers 12 and 12-1 be unsealed and filed on the Court’s ECF docket. • That Defendants’ motion for sanctions be granted. Dated: May 27, 2011 Respectfully submitted, /s/ Matthew Zimmerman___________ Matthew Zimmerman mattz@eff.org Cindy Cohn cindy@eff.org ELECTRONIC FRONTIER FOUNDATION 454 Shotwell Street San Francisco, CA 94110 T: (415) 436-9333 F: (415) 436-9993 www.eff.org /s/ Paul Alan Levy________________ Paul Alan Levy plevy@citizen.org Public Citizen Litigation Group 1600 20th Street, NW Washington, D.C. 20009 T: (202) 588-1000 http://www.citizen.org/litigation 7 Certificate of Service On May 27, 2011, I electronically submitted the foregoing document with the clerk of court for the U.S. District Court, Northern District of Texas, using the electronic case filing system of the court. I hereby certify that I have served all counsel and/or pro se parties of record electronically or by another manner authorized by Federal rule of Civil Procedure 5 (b)(2). /s/ Matthew Zimmerman Matthew Zimmerman (SBN 212423) Senior Staff Attorney Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Tel: (415) 436-9333 Fax: (415) 436-3339

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?