Boy Racer, Inc v. Doe 2-52, No. 5:2011cv02834 - Document 12 (N.D. Cal. 2011)

Court Description: ORDER GRANTING-IN-PART PLAINTIFF BOY RACER, INC.'S EX PARTE APPLICATION FOR LEAVE TO TAKE LIMITED DISCOVERY PRIOR TO RULE 26(F) CONFERENCE by Judge Paul S. Grewal granting in part 3 Ex Parte Application (psglc1S, COURT STAFF) (Filed on 8/5/2011)

Download PDF
Boy Racer, Inc v. Doe 2-52 Doc. 12 1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 10 SAN JOSE DIVISION 11 BOY RACER, 12 13 14 15 16 ) ) Plaintiff, ) v. ) ) ) JOHN DOES 2-52, ) ) Defendants. ) ___________________________________ ) Case No.: C 11-02834 LHK (PSG) ORDER GRANTING-IN-PART PLAINTIFF BOY RACER, INC.’S EX PARTE APPLICATION FOR LEAVE TO TAKE LIMITED DISCOVERY PRIOR TO RULE 26(F) CONFERENCE (Docket No. 3) 17 Plaintiff Boy Racer, Inc. (“Boy Racer”) applies ex parte for leave to take expedited and 18 limited discovery prior to the Fed. R. Civ. P. 26(f) conference. In Boy Racer, Inc. v. Does 1-52, 19 Case No. 11-2329, this court granted Boy Racer’s motion for leave to take limited discovery as to 20 Doe 1 only, and ordered Does 2-52 be severed and reassigned to an Article III judge.1 Does 2-52 21 were severed and assigned the new case number above. Judge Koh is the presiding judge in this 22 severed matter and any discovery matters have been referred to the undersigned.2 23 In the order granting-in-part Boy Racer’s motion for leave to take limited discovery as to 24 Doe 1 only, the undersigned noted that the motion raised the same issues as those recently addressed 25 by the court in response to a near-identical motion for leave to take expedited discovery in Diabolic 26 27 28 1 See Docket No. 8. 2 See Docket No. 7. ORDER, page 1 Dockets.Justia.com 1 Video Productions, Inc. v. Does 1-2099.3 There, the undersigned granted leave to take expedited 2 discovery, but only as to Doe 1. The court severed Does 2-2,099 and ordered the claims against 3 Does 2-2,099 be reassigned to an Article III judge with the recommendation that the claims against 4 Does 2-2,099 be dismissed without prejudice and, if re-filed within 20 days, deemed a continuation 5 of the original action for purposes of the statute of limitations. 6 In Diabolic, the undersigned found that the copyright owner had not adequately explained 7 how or why the peer-to-peer architecture of the BitTorrent protocol differed from other file-sharing 8 protocols considered in Leface Records, LLC,4 Interscope Records,5 BMG Music,6 or Twentieth 9 Century Fox Film Corp.7 In each of those cases, the peer-to-peer nature of the protocol was 10 insufficient to justify joinder of dozens of otherwise unrelated defendants in a single action. 11 As previously discussed in Diabolic, before allowing expedited discovery to uncover the 12 identity of unnamed defendants, the district courts of this circuit must determine whether either of 13 two conditions applies. The first is whether the requested discovery would fail to uncover the 14 identities sought.8 The second is whether the claim against the defendant could be dismissed.9 As to 15 the first Gillespie condition,10 whether or not the individuals identified are ultimately liable under 16 3 17 18 See Diabolic Video Productions, Inc. v. Does 1-2099, No. 5:10-cv-05865-PSG, Amended Order Granting-In-Part Motion for Leave to Take Limited Discovery Prior to Rule 26(f) Conference (Docket No. 16). 4 No. 5:07-cv-298-BR, 2008 WL 544992 (E.D.N.C. Feb. 27, 2008). 5 No. 6:04-cv-197-Orl-22DAB, 2004 U.S. Dist. LEXIS 27782 (M.D. Fla. Apr. 1, 2004). 6 No. 06-01579, 2006 U.S. Dist. LEXIS 53237 (N.D. Cal. Jul. 31, 2006). 7 No. C 04-04862, Docket No. 12 (N.D. Cal. Nov. 16, 2004). 19 20 21 22 8 23 24 25 26 27 28 See Gillespie v. Civiletti, 629 F.2d 637, 642 (9th Cir. 1980); see also Columbia Ins. Co. v. SeesCandy.com, 185 F.R.D. 573, 577 (N.D. Cal. 1999) (“With the rise of the Internet has come the ability to commit certain tortious acts, such as defamation, copyright infringement, and trademark infringement, entirely on-line. The tortfeasor can act pseudonymously or anonymously and may give fictitious or incomplete identifying information. Parties who have been injured by these acts are likely to find themselves chasing the tortfeasor from [ISP] to ISP, with little or no hope of actually discovering the identity of the tortfeasor. In such cases the traditional reluctance for permitting filings against John Doe defendants or fictitious names and the traditional enforcement of strict compliance with service requirements should be tempered by the need to provide injured parties with a forum in which they may seek redress for grievances.”). 9 See id. at 642. 10 See id. ORDER, page 2 1 Boy Racer’s theory of infringement, the court is once again satisfied that the discovery sought here 2 would uncover the identities that Boy Racer seeks. Boy Racer seeks leave to subpoena various 3 Internet Service Providers (“ISP”) associated with certain IP addresses to produce the names, 4 addresses, email addresses, phone numbers, and Media Access Control numbers associated with 5 each IP address alleged to have conducted infringing activity. The Hansmeier Declaration explains 6 that Media Copyright Group, LLC’s proprietary file sharing forensic software captured the unique IP 7 address of each Doe Defendant. If provided with the IP address and the date and time of the 8 infringing activity, the ISP can identify the Doe Defendant since the information is contained in its 9 subscriber activity log files. 10 To address the second Gillespie condition and to distinguish the technical architecture of 11 BitTorrent from those file-sharing protocols which other courts have found failed to justify joinder, 12 Boy Racer explains that users of the BitTorrent protocol have a higher degree of interactivity and 13 engage in “deep and sustained collaboration with their peers,” as follows: 14 15 16 17 18 19 20 21 First, the protocol breaks a single large file into a series of smaller distributable pieces. Then, an initial file-provider (the “seeder”) intentionally elects to distribute the pieces to third parties. This is called “seeding.” Other users (“peers”) on the network, download a small “torrent” file that contains directions on where to find the seeder as well as an index of the pieces. The torrent file is loaded into BitTorrent software, and the software follows the directions on where to find the seeder as well as an index of the pieces. The torrent file is loaded into BitTorrent software, and the software follows the directions in the torrent file to connect to the seeder. When a piece download is complete, the peers automatically become seeders with respect to the downloaded pieces. In other words, each peer in a swarm transforms from a pure downloader (a “leecher” in BitTorrent vernacular) to a peer that is simultaneously downloading and distributing pieces of a file. By this mechanism, each peer collaborates with others in the swarm to complete the distribution of a file. A piece shared by the initial seeder or any later seeders will be distributed amongst the peers countless times over– even if the seeder leaves the swarm. Users can be connected to one another over the span of weeks simply via the initial download.11 22 Boy Racer goes on to note: 23 24 25 26 27 The BitTorrent file distribution protocol leads to a rapid viral spreading of a file through willful peer users, all of whom are both intentionally uploading and downloading portions of the file simultaneously. As more peers intentionally join the swarm for the copyrighted works, the likelihood of a successful download increases. Due to the nature of the BitTorrent protocol, any peer that has downloaded a file prior to the time a subsequent peer downloads the same file is automatically a possible, and even a likely, source of the file for the subsequent peer. Indeed, a majority of the prominent adult content torrent-indexing websites mandate that users maintain a minimum upload/download ratio, which means that users who download a file via the 28 11 See Docket No. 3 at 25. ORDER, page 3 1 2 3 BitTorrent protocol are highly likely to serve as seeders in order to assure that they meet ratio requirements. Essentially, because of the nature of the swarm downloads, every infringer is simultaneously illegally downloading and distributing copyrighted material through collaboration from many other infringers, through a number of ISPs, in numerous jurisdictions around the country– although this lawsuit is isolated to peers who are believed to be located exclusively in California.12 4 According to Boy Racer, this greater extent of “cooperation and concerted action” among BitTorrent 5 users than among users of other protocols makes joinder proper here. 6 Even with the description of the BitTorrent technology provided by Mr. Hansmeier, the court 7 remains unpersuaded that the peer-to-peer architecture of the BitTorrent technology justifies the 8 joinder of otherwise unrelated defendants in a single action. First, the Hansmeier declaration argues 9 at length about the "concerted activity" within a given swarm. Presumably he does so in response to 10 the concern highlighted by Judge Ryu13 that users in different swarms have nothing in common other 11 than downloading the same work, which as this court and others have noted is insufficient under our 12 precedent. But the Hansmeier declaration itself offers overwhelming evidence that the IP addresses 13 were in fact gathered from multiple swarms.14 Second, even if the IP addresses at issue in this 14 motion all came from a single swarm, there is no evidence to suggest that each of the addresses 15 "acted in concert" with all of the others. In fact, the nearly six-week span covering the activity 16 associated with each of the addresses calls into question whether there was ever common activity 17 linking the 51 addresses in this case. In this age of instant digital gratification, it is difficult to 18 imagine, let alone believe, that an alleged infringer of the copyrighted work would patiently wait six 19 weeks to collect the bits of the work necessary to watch the work as a whole. At the very least, there 20 is no proof that bits from each of these 51 addresses were ever assembled into a single swarm. As 21 the court previously explained, under this court's precedent regarding other file sharing protocols, 22 23 24 25 12 26 See id. at 26. 13 27 28 See Pacific Century Intern. Ltd. v. Does 1-101, Case No. 11-02533, Docket No. 7 (N.D. Cal. Jul. 8, 2011). 14 See, e.g., Docket No. 3, paragraph 13 ("[the first step in the infringer-identification process is to locate swarms where peers are distributing the copyrighted creative works."); paragraph 15 ("I used all three methods to locate swarms associated with Plaintiff's exclusive license."). ORDER, page 4 1 merely infringing the same copyrighted work over this period is not enough.15 Finally, nothing in 2 the BitTorrent architecture changes the fact that each defendant also will likely have a different 3 defense. As the district court in BMG Music put it: 4 5 6 7 8 9 Comcast subscriber John Doe 1 could be an innocent parent whose internet access was abused by her minor child, while John Doe 2 might share a computer with a roommate who infringed Plaintiffs’ works. John Does 3 through 203 could be thieves, just as Plaintiffs believe, inexcusably pilfering Plaintiffs’ property and depriving them, and their artists, of the royalties they are rightly owed.16 Boy Racer’s motion is therefore GRANTED, but only as to Doe 2 and as follows. IT IS HEREBY ORDERED that Boy Racer is allowed to serve immediate discovery on Doe 2's ISP listed in Exhibit A to the Complaint by serving a Rule 45 subpoena that seeks information 10 sufficient to identify Doe 2, including the name, addresses, telephone numbers, and email addresses 11 of Doe 2. Boy Racer’s counsel shall issue its subpoena and shall include a copy of this order. 12 IT IS FURTHER ORDERED that the ISP will have 30 days from the date of service upon it 13 to serve Doe 2 with a copy of the subpoena and a copy of this order. The ISP may serve Doe 2 using 14 any reasonable means, including written notice sent to Doe 2's last known address, transmitted either 15 by first-class mail or via overnight service. The ISP and Doe 2 each shall have 30 days from the 16 date of service to file any motions in this court contesting the subpoena (including a motion to quash 17 or modify the subpoena). If that 30-day period lapses without Doe 2 or the ISP contesting the 18 subpoena, the ISP shall have 10 days to produce to Boy Racer the information responsive to the 19 subpoena with respect to Doe 2. 20 IT IS FURTHER ORDERED that the ISP shall not assess any charge to Boy Racer in 21 advance of providing the information requested in the subpoena, and that the ISP that receives a 22 subpoena and elects to charge for ths costs of production shall provide a billing summary and cost 23 reports that serve as a basis for such billing summary and any costs claimed by the ISP. 24 IT IS FURTHER ORDERED that the ISP shall preserve all subpoenaed information pending 25 26 27 28 15 See Diabolic Video Productions, Inc. v. Does 1-2099, No. 5:10-cv-05865-PSG, Amended Order Granting-In-Part Motion for Leave to Take Limited Discovery Prior to Rule 26(f) Conference (Docket No. 16). 16 See BMG Music v. Does 1-203, Case No. 04-650, 2004 WL 953888, at *1 (E.D. Pa. Apr. 2, 2004). ORDER, page 5 1 the ISP delivering such information to Boy Racer or the final resolution of a timely filed and granted 2 motion to quash the subpoena with respect to such information. 3 IT IS FURTHER ORDERED that any information disclosed to Boy Racer in response to a 4 subpoena may be used by Boy Racer solely for the purpose of protecting its rights under the 5 Copyright Act, 17 U.S.C. § 101 et seq. 6 IT IS FURTHER RECOMMENDED that Does 3-52 be severed from this action and Boy 7 Racer’s action against Does 3-52 be dismissed without prejudice. The undersigned further 8 recommends that if Boy Racer refiles separate complaints against Does 3-52 within 20 days of this 9 order, such actions should be deemed a continuation of the original action for purposes of the statute 10 11 12 of limitations. IT IS SO ORDERED. Dated: August 5, 2011 13 14 PAUL S. GREWAL United States Magistrate Judge 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ORDER, page 6

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.