RAW FILMS, LTD. v. JOHN DOES 1-15

Filing 12

MEMORANDUM. ( SIGNED BY HONORABLE MARY A. MCLAUGHLIN ON 3/23/12. ) 3/27/12 ENTERED AND COPIES E-MAILED.(gn, )

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RAW FILMS, LTD. v. JOHN DOES 1-15 : : : : : CIVIL ACTION NO. 11-7248 MEMORANDUM McLaughlin, J. March 23, 2012 The plaintiff filed this suit on November 21, 2011, alleging that each of fifteen Doe defendants infringed the copyright in its motion picture by reproducing and distributing it over the Internet using a peer-to-peer file-sharing protocol called BitTorrent. The Doe defendants are identified solely by internet protocol (“IP”) addresses corresponding to the Internet connections alleged to have been used to infringe the plaintiff’s copyright. The Court granted an earlier motion by the plaintiff for leave to file subpoenas on the Internet Service Providers (“ISP”) servicing the IP addresses identified in the complaint to help determine the identity of the Doe defendants. No Doe defendant to date has been identified by the plaintiff or served with the complaint. Two of the Doe defendants, made aware of the subpoenas by their ISPs, have moved to quash those subpoenas and sever the case as to all other Doe defendants. Because the joinder of the fifteen Doe defendants is proper and quashing the subpoenas issued would be inappropriate at this stage of the litigation, the Court will deny the defendants’ motions. I. Complaint The plaintiff claims that the Doe defendants, each identified only by an IP address, willfully copied, reproduced, redistributed, performed, and displayed its motion picture, “Bareback Street Gang” (the “Work”) by means of the file-sharing protocol known as BitTorrent, in violation of federal copyright law, 17 U.S.C. § 106(1) et seq. A. Compl. ¶¶ 44-49. BitTorrent According to the plaintiff, the BitTorrent protocol facilitates file-sharing by permitting multiple users to download and upload the same file simultaneously. An initial “seeder” begins the process by using a BitTorrent client program to break the file intended for sharing (“original file”) into identically sized “pieces,” each of which has a unique alphanumeric hash code, and creating a “torrent,” which records those hash codes and permits other client programs to identify, download, and reassemble the pieces into the original file. Id. ¶¶ 13-21. When other users, known as “peers,” download the torrent file, the BitTorrent protocol signals that those peers are seeking to download the original file, and the seeder begins to distribute pieces to those users. Once a peer has downloaded a piece, it serves as a source of that piece to other peers possessing the torrent and seeking to download the original file. When a peer has downloaded all of the pieces, the client program -2- continues to distribute the file like the initial seeder. In this way, the initial seeder and peers serve to share and distribute the original file in an activity known as a “swarm.” Id. ¶¶ 28-31. B. Activity of Does 1-15 Each of the Doe defendants is alleged to have participated in the same “swarm” sharing and distributing the plaintiff’s Work. Id. ¶ 32. The plaintiff used forensic software to track and identify BitTorrent activity involving a specific copy of the Work that was identified by its own “Unique Hash Number.” The investigation identified fifteen IP addresses, corresponding to the Doe defendants here, that participated in the same swarm by transmitting a piece of this version of the Work using the BitTorrent protocol. Each IP address connected to a server established by the plaintiff’s investigator and transmitted a piece of the same copy of a file constituting the plaintiff’s Work between July and October 2011. Id. ¶¶ 35-40, Ex. A. By participating in the same swarm, the defendants are each alleged to have directly infringed the plaintiff’s copyright in the Work and to have “induced, caused[,] or materially contributed to the infringing conduct” of the other defendants. Id. ¶¶ 48, 54. -3- II. Procedural History After the plaintiff filed suit but before identifying any Doe defendants, it moved for leave to serve subpoenas on Cavalier Telephone, Comcast Cable, and Verizon Internet Services, the ISPs that service the fifteen IP addresses the plaintiff alleges were used to infringe its copyright. The subpoenas commanded each ISP served to provide the plaintiff with the “true name, address, telephone number, e-mail address and Media Access Control address of the Defendant to whom the ISP assigned an IP address” identified in Exhibit A to the motion (and the complaint). The Court granted that motion in part but denied the plaintiff’s request to rule in advance on objections to those subpoenas.1 (ECF No. 4). On February 10, 2012, a Motion to Quash or Modify the Subpoena was filed by one Doe defendant (identifying him or herself by the e-mail address johndoe07248@yahoo.com), requesting that the Court sever the remaining defendants from the case under Federal Rule of Civil Procedure 21. (ECF No. 5). The plaintiff opposed that motion on February 24, 2012, arguing that the requirements for permissive joinder had been met and that severance would impair its ability to enforce its rights. 1 The subpoena authorized by the Court directs ISPs that are “cable operators” as defined by federal statute to notify its subscribers of the subpoena. Pl.’s Proposed Order ¶ 4 (ECF No. 3) (citing 47 U.S.C. § 551(c)(2)(B)). -4- On February 28, 2012, another Doe defendant (identified by the email address johndoeedpa1234@yahoo.com), apparently using an IP address serviced by Verizon Internet Services, filed a motion with the Court. (ECF No. 7). That motion seeks severance of the remaining Doe defendants, the quashing of the subpoena served on his ISP, and/or the issuance of a protective order staying all discovery in the case until his or her interests can be heard. The plaintiff opposed that motion on March 13, 2012. III. Discussion The Court finds that the allegations of the complaint make joinder appropriate at this early stage of litigation because the plaintiff asserts a right to relief against all Doe defendants that appears, given the technology involved, to arise out of the same series of transactions or occurrences and because common questions of law or fact seem to be raised with respect to all Doe defendants by virtue of the use of BitTorrent to transmit the same copy of the plaintiff’s Work. Further, the Court finds that (a) the information sought in the subpoenas is relevant to the plaintiff’s claims; and (b) under the circumstances, the plaintiff’s right to pursue its claims of infringement by means of discovering subscriber information outweighs the moving defendant’s asserted rights to remain anonymous in connection with the alleged infringing activity. As a result, the Court will deny the moving defendants’ motions to quash or modify the -5- subpoenas. A. Joinder “Persons . . . may be joined in one action as defendants if: (A) any right to relief is asserted against them jointly, severally, or in the alternative with respect to or arising out of the same transaction, occurrence, or series of transactions or occurrences; and (B) any question of law or fact common to all defendants will arise in the action.” P. 20(a)(2). Fed. R. Civ. Where misjoinder occurs, “[o]n motion or on its own, the court may at any time, on just terms, add or drop a party. The court may also sever any claim against a party.” Fed. R. Civ. P. 21. Although the United States Court of Appeals for the Third Circuit has not directly interpreted Rule 20(a), it has held that events comprising the same transaction or occurrence bear a “logical relationship to one another” and feature “the same factual issues [or] the same factual and legal issues.” Transamerica Occidental Life Ins. Co. v. Aviation Office of Am., Inc., 292 F.3d 384, 390 (3d Cir. 2002) (interpreting the relationship of compulsory counterclaims under Rule 13, which must arise out of the same transaction or occurrence). The general policy of the rules regarding joinder is “toward entertaining the broadest possible scope of action consistent with fairness to the parties,” and joinder “is -6- strongly encouraged.” United Mine Workers v. Gibbs, 383 U.S. 715, 724 (1966); see also Hagan v. Rogers, 570 F.3d 146, 152 (3d Cir. 2009) (quoting Gibbs). The purpose of Rule 20(a) is “to promote trial convenience” and prevent a multiplicity of lawsuits. However, severance of parties where joinder is not required is committed to the court’s discretion if it finds that the objectives of the rule are not fostered, or that joinder could “result in prejudice, expense or delay.” 7 Charles Alan Wright, et al., Federal Practice & Procedure § 1652 (3d ed. 2001). Here, the plaintiff argues that joinder of the Doe defendants in a single action is appropriate because “the claims against all defendants are logically related and Plaintiff is seeking joint and several liability,” and that the defendants, as members of the same BitTorrent swarm, participated in the same series of transactions or occurrences. No defendant has appeared in this matter, as no defendant has been served with the complaint. However, based on the plaintiff’s characterizations of the nature of the BitTorrent technology and the allegations against each Doe defendant, the Court cannot accept the moving Does’ arguments that a finding of misjoinder is appropriate at this stage. As a result, the Court will not sever the proceedings as to each defendant at this stage. The Court may review the propriety of joinder later in the proceedings, once -7- the defendants are served and appear. By that time, a variety of defenses or other arguments as to why joinder is inappropriate, may be raised by the defendants. The plaintiff alleges that it retained a forensic investigator, who determined that each of the fifteen Doe defendants copied a piece of the same copy of the Work as identified by a particular cryptographic hash value, and that each of the defendants’ computers connected to the investigator’s server and transmitted at least a piece of the Work. ¶¶ 35, 37-39. Compl. By using BitTorrent to upload or download the same file, the Doe defendants are part of the same “swarm.” This is so even though each defendant’s activity occurred during different times over a seventy-four day period. Three pairs of Doe defendants are alleged to have participated in the swarm on the same day, although no act of transmittal is alleged to have occurred within fourteen hours of another. Compl. Ex. A. Based on the plaintiff’s allegations regarding the nature of BitTorrent, the pieces of the Work copied by each defendant may have been transmitted by or subsequently sent to other defendants, albeit indirectly, because “recipient peers . . . automatically begin delivering the piece they just received to other peers in the same swarm.” Id. ¶ 33. Even if no Doe defendant directly transmitted a piece of the Work to another Doe defendant, the Court is satisfied that at this stage -8- of the litigation the claims against each Doe defendant appear to arise out of the same series of transactions or occurrences, namely, the transmission of pieces of the same copy of the Work to the same investigative server. The claims against each defendant are logically related because they will feature largely duplicative proof regarding the nature of BitTorrent, the plaintiff’s ownership interest in the copyright for the Work, and the forensic investigation conducted by the plaintiff. These common questions of fact are likely to arise along with the legal standards for direct and contributory copyright infringement liability. The joining of the fifteen defendants that have these elements in common will, at this point, prevent a multiplicity of lawsuits. Thus, the requirements of Rule 20(a)(2) are met, and its purposes furthered. Additionally, at this stage of litigation, joinder will not result in prejudice to any defendant or result in needless delay. Indeed, severance of the action as requested by the two moving Doe defendants would require the filing of separate actions and the issuance of new subpoenas on the internet service providers serving the IP addresses in this case in order to identify each defendant. Neither of these steps would “secure the just, speedy, and inexpensive determination” of the action. Fed. R. Civ. P. 1. No defendant will be prejudiced by joinder at -9- this stage, as none has been served in the matter or required to respond to the complaint. Instead, the defendants may benefit from joinder by permitting them to obtain the same discovery from the plaintiff or allowing them to see any defenses raised by other Doe defendants. See Call of the Wild Movie, LLC v. Does 1- 1062, 770 F. Supp. 2d 332, 344 (D.D.C. 2011) (citing London-Sire Records, Inc. v. Doe 1, 542 F. Supp. 2d 153, 161 (D. Mass. 2008)). The defendants may challenge the appropriateness of joinder later in the proceedings. Courts faced with allegations of copyright infringement brought against multiple unnamed defendants based on the use of BitTorrent have split on whether joinder is appropriate. Compare Hard Drive Prods., Inc. v. Does 1-55, No. 11-2798, 2011 WL 4889094, at *5 (N.D. Ill. Oct. 12, 2011) (joinder appropriate); Donkeyball Movie, LLC v. Does 1-171, 810 F. Supp. 2d 20, 27-28 (D.D.C. 2011) (same) with Hard Drive Prods. Inc. v. Does 1-30, No. 11-345, 2011 WL 4915551, at *4 (E.D. Va. Oct. 17, 2011) (joinder inappropriate); Hard Drive Prods., Inc. v. Does 1-188, 809 F. Supp. 2d 1150, 1156-64 (N.D. Cal. 2011) (same). Courts that have permitted joinder appear to have taken the same approach as this Court by finding it appropriate as an initial matter and permitting any defendant, once named and served, to challenge the appropriateness of joinder later in the case. See, e.g., K-Beech Inc. v. Does 1-57, No. 11-358, 2011 WL -10- 5597303 (M.D. Fla. Nov. 1, 2011); Call of the Wild, 770 F. Supp. 2d at 344; Donkeyball Movie, 810 F. Supp. 2d at 28. This is consistent with the Rules, which grant the district court power to drop parties and sever claims “at any time, on just terms.” Fed. R. Civ. P. 21. Other courts have found severance appropriate where a plaintiff made similar allegations to those in this case. See, e.g., On the Cheap, LLC v. Does 1-5011, No. 10-4472, 2011 WL 4018258, at *2-*3 (N.D. Cal. Sept. 6, 2011). On the Cheap had numerous factual characteristics that distinguish it from the present case.2 In addition to featuring over five thousand Doe defendants, which created a “logistical nightmare,” many were located out of the district and several defendants had already appeared and raised a variety of defenses. Here, no defendant has appeared or even been identified pursuant to the subpoenas 2 Similarly, many of the other district court opinions cited in support of the defendants’ requests for severance are based on old technology, see LaFace Records, LLC v. Does 1-38, No. 07-298, 2008 WL 544992 (E.D.N.C. Feb. 27, 2008); alleged violations of multiple copyrighted works rather than a single work, see BMG Music v. Does 1-203 No. 04-650, 2004 WL 953888, at *1 (E.D. Pa. Apr. 2, 2004)); or involved defendants that had seemingly been joined “arbitrarily,” see Twentieth Century Fox Film Corp. v. Does 1-12, No. 04-4862, 2004 WL 3241669, at *1 (N.D. Cal. Nov. 16, 2004). Indeed, district courts ruling on the propriety of “swarm joinder” have found the specificity of the factual allegations brought to weigh heavily on the outcome of the Rule 20(a) analysis. See, e.g., Patrick Collins, Inc. v. Does 1-2590, No. 11-2766, 2011 WL 4407172, at *5 (N.D. Cal. Sept. 22, 2011) (collecting cases and finding results “highly dependent on the information the plaintiff presented”). -11- served on the defendants’ ISPs. One moving defendant suggests that the variety of defenses that could be raised by the Doe defendants renders joinder inappropriate because it will not foster judicial economy or promote the efficient resolution of the claims in this case. Def. Mot. 5 (ECF No. 5) (citing BMG Music v. Does 1-203, No. 04650, 2004 WL 953888, at *1 (E.D. Pa. Apr. 2, 2004)). However, no defenses have been raised to date in this case, and indeed, consolidating early discovery for the purpose of determining the scope of claims and defenses will foster judicial economy. Should that process reveal disparate defenses as to each party, the Court would consider such a fact relevant on a later review of joinder’s propriety. The Rules grant the Court authority to revisit the issue of misjoinder at a later point in the case, either by motion or sua sponte. With this procedural protection in mind, the Court will deny the motions to sever the defendants without prejudice to their ability to raise the issue of misjoinder at a later time. B. Motions to Quash One moving defendant also requests that the subpoenas served on the ISPs in this case be quashed, challenging the relevance of the information sought by the subpoena and claiming -12- a First Amendment interest in remaining anonymous. The Court will deny this request. The moving Doe objects to the subpoena served on his or her ISP because (a) it may not directly identify the infringing party but instead an innocent third party, and thus falls outside the scope of permissible discovery; and (b) he or she claims a privacy interest in the records sought. Def. Mot. 14-17. A court must quash a subpoena under certain circumstances, including when it subjects a person to undue burden. A court may quash or modify a subpoena if it requires disclosure of “a trade secret or other confidential research, development, or commercial information” or requires a nonparty to “incur substantial expense.” It may modify a subpoena if the serving party “shows a substantial need for the testimony or material that cannot otherwise be met without undue hardship.” 45(c)(3). Fed. R. Civ. P. Neither of the moving Doe’s arguments raises valid grounds for quashing the subpoena served on Verizon. Proceeding with discovery to obtain the identity of Doe defendants so that they may be served is proper and within the scope of permissible discovery. The plaintiff moved for leave to serve discovery prior to a Rule 26(f) conference in order to do so. Pl.’s Mot. 4 (ECF No. 3). Discovery for the purpose of identifying Doe defendants is permissible. See, e.g., Blakeslee v. Clinton County, 336 F. App’x 248, 250 (3d Cir. 2009). -13- The Court found good cause for ordering that discovery, see Fed. R. Civ. P. 26(b)(1), because the plaintiff showed that a subpoena seeking the subscriber information associated with the allegedly infringing IP addresses would be the only way for the plaintiff to identify the proper defendants in this case and proceed with its claims against them.3 23, Pl.’s Mot. Ex. See Declaration of Tobias Fieser ¶ 9, The information sought is thus highly relevant to the plaintiff’s claims. The moving Doe also argues that the subpoena must be quashed because disclosure of his or her identity is violative of a First Amendment right to engage in anonymous online communication. Def. Mot. 17. The Constitution protects the right to engage in anonymous communication, and that protection extends to the Internet. See Reno v. ACLU, 521 U.S. 844, 870 3 The Court acknowledges that Verizon’s compliance with the subpoena may not directly reveal the identity of an infringer. Indeed, the subscriber information Verizon discloses will only reveal the account holder’s information, and it may be that a third party used that subscriber’s IP address to commit the infringement alleged in this case. See, e.g., BMG Music v. Does 1-203, No. 04-650, 2004 WL 953888, at *1 (E.D. Pa. Apr. 2, 2004) (acknowledging this limitation on ISP-level subpoenas). Moreover, the Rules permit parties to obtain discovery of “the identity and location of persons who know of any discoverable matter.” Fed. R. Civ. P. 26(b)(1). One moving Doe argues that the individual whose identity is revealed by the subpoena may not be the infringer because of “numerous issues, from open wireless networks being illegally invaded, IP address spoofing[, and] human and collection errors.” Mot. 21. These are not grounds on which to quash a subpoena otherwise demonstrated to be proper. The moving Doe may raise these and any other nonfrivolous defenses in the course of litigating the case. -14- (1997). The First Amendment is implicated by civil subpoenas seeking the identify of anonymous individuals. ex rel. Patterson, 357 U.S. 449, 462 (1958). NAACP v. Alabama However, anonymous speech is not entitled to absolute protection, particularly if the speech consists of copyright infringement. Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 555-56, 569 (1985); see also In re Capital Cities/ABC, Inc., 918 F.2d 140, 143-44 (11th Cir. 1990) (“[T]he first amendment is not a license to trammel on legally recognized rights in intellectual property.”) (quoting Dallas Cowboys Cheerleaders, Inc. v. Scoreboard Posters, Inc., 600 F.2d 1184, 1188 (5th Cir. 1979)). The U.S. Court of Appeals for the Third Circuit has not articulated a standard for balancing the need for discovery against the right to anonymous speech. Courts around the country have applied standards that vary according to the nature of the protected speech and the showing required to overcome that protection. See In re Anonymous Online Speakers, 661 F.3d 1168, 1174-76 (9th Cir. 2011) (noting that courts have required showings ranging from a “good faith standard” to one demonstrating the plaintiff’s ability “to survive a hypothetical motion for summary judgment”).4 4 The most exacting standard appears to have been applied by the Delaware Supreme Court in the context of a defamation case. See Doe v. Cahill, 884 A.2d 451 (Del. 2005). The court required the plaintiff to “submit sufficient evidence to establish a prima facie case for each essential element” of the claim of defamation -15- The Second Circuit is the only federal appellate court to have adopted a test balancing the right to obtain relevant discovery to pursue a claim of copyright infringement against the constitutional privilege to engage in anonymous speech online. See Arista Records, LLC v. Doe 3, 604 F.3d 110, 114 (2d Cir. 2010).5 The Second Circuit’s test is derived from a 2004 district court opinion that laid out a five-factor test for balancing intellectual property rights against First Amendment anonymity interests. See Sony Music Entertainment Inc. v. Does 1-40, 326 F. Supp. 2d 556, 564-67 (S.D.N.Y. 2004) (adopting the test after a review of the considerations that had been applied by district courts to date).6 before the court would permit discovery of the alleged defamer’s identity. Id. at 467. The Court finds application of such a standard inappropriate in the present context because Cahill involved a different type of claim and, more importantly, a different kind of speech. The plaintiff in Cahill was a city councilman whose performance in office had been criticized on an Internet blog. Thus Cahill presented concerns over chilling political speech, which is entitled to the highest level of protection under the First Amendment. See McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 342 (1995) (describing the lengthy history of courts safeguarding the right to publish political speech anonymously). 5 As the Ninth Circuit noted, “the paucity of appellate precedent is not surprising because discovery disputes are not generally appealable on an interlocutory basis and mandamus review is very limited.” In re Anonymous Online Speakers, 661 F.3d at 1175. 6 The test has since been applied by district courts sitting in the D.C., First, Third, Fourth, Sixth, Seventh, Ninth, and Tenth Circuits. See Art of Living Foundation v. Does, No. 105022, 2011 WL 3501830, at *3 (N.D. Cal. Aug. 10, 2011); First -16- In Sony Music, the court, faced with alleged infringement of musical copyrights, evaluated a Doe defendant’s motion to quash a subpoena served on the defendant’s ISP that sought to uncover her identity so that she could be served with process. Among other grounds, the Doe defendant argued that the First Amendment protected her right to engage in online filesharing anonymously. The court recognized the protection afforded to the potentially expressive practice of file-sharing (by choosing a collection files to upload and download). The court also acknowledged the limited protection the Constitution affords to speech constituting copyright infringement and the need for that protection to give way when a civil subpoena, issued in connection with claim of copyright infringement, seeks information necessary to advance that claim. Id. at 562. The test set forth by the Sony Music court analyzes the following five factors to determine whether the need for disclosure outweighs the right to anonymity where the speech alleged is copyright infringement: (1) a prima facie claim of infringement; (2) the specificity of the information sought from Time Videos, LLC v. Does 1-500, 276 F.R.D. 241, 248-49 (N.D. Ill. 2011); Call of the Wild, 770 F. Supp. 2d at 341; Warner Bros. Records, Inc. v. Doe, No. 08-116, 2008 WL 5111884, at *7 (E.D.N.C. Sept. 26, 2008); Fonovisa, Inc. v. Does 1-9, No. 071515, 2008 WL 919701, at *9 (W.D. Pa. Apr. 3, 2008); Interscope Records v. Does 1-14, 558 F. Supp. 2d 1176, 1178 (D. Kan. 2008); London-Sire Records, Inc. v. Doe 1, 542 F. Supp. 2d 153, 163 (D. Mass. 2008); LaFace Records, LLC v. Does 1-5, No. 07-187, 2007 WL 2867351, at *2 (W.D. Mich. Sept. 27, 2007). -17- the ISP; (3) a lack of alternative means of obtaining that information; (4) a “central need” for the information in order to bring the claim; and (5) the expectation of privacy held by the objecting party. Id. at 564-65. Finding that the information sought by the plaintiff’s subpoena was necessary to advance its claim, the court denied the motion to quash. Id. at 567. The Court concludes that such a test strikes the appropriate balance between the limited protection afforded to speech that constitutes copyright infringement and the need for the plaintiff to serve a defendant with process in order to advance non-frivolous claims of infringement. As discussed above, the third and fourth factors of the Sony Music test weigh against quashing the subpoena because the plaintiff has shown that obtaining the subscriber information possessed by the ISPs is the only reasonable means of discovering the identity of the subscribers whose IP addresses were used to commit the alleged infringement here. Additionally, the complaint makes a prima facie claim of copyright infringement, which requires “(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.” Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., Inc., 499 U.S. 340, 361 (1991). The plaintiff has alleged that it owns the copyright in “Bareback Street Gang” and that the defendants, through use of BitTorrent, connected to the -18- plaintiff’s investigative server and copied elements of the Work. The first Sony Music factor thus weighs against quashing the subpoena. The subpoena is specific enough to give rise to a reasonable likelihood that information facilitating service upon proper defendants will be disclosed if the ISPs comply. The subpoena here seeks the name, address, telephone number, e-mail address and “Media Access Control” address (which identifies the specific equipment using the IP address) of the subscriber to whom the served ISP assigned the specific IP addresses at the dates and times of the alleged infringement identified in Exhibit A to the complaint. Again, although the provision of this information may not directly identify the proper defendants, it is sufficiently tailored to lead to the identification of those individuals. Thus, the second Sony Music factor weighs against quashing the subpoena. Finally, courts analyzing the expectation of privacy possessed by internet users engaging in online file-sharing have concluded that such expectation is at most minimal because those individuals have already voluntarily given up certain information by engaging in that behavior. A Doe defendant who has allegedly used the internet to unlawfully download and disseminate copyrighted material does not have a significant expectation of privacy. Accord In re Verizon Internet Servs., Inc., 257 F. -19- Supp. 2d 244, 267 (D.D.C. 2003) (engaging in peer-to-peer filesharing is akin to “essentially opening up the computer to the world”). Even if the moving Does retained a reasonable expectation of privacy in their subscriber information, that interest is substantially outweighed by the need to disclose it so that the plaintiff may proceed with bringing what appear to be non-frivolous claims of copyright infringement that cannot be advanced by other means. to quash the subpoena. Thus, the Court will deny the motions This denial is without prejudice to the right of any served ISP or other Doe defendant to raise a timely objection to a subpoena served pursuant to the Court’s order of December 28, 2011. Finally, the second moving Doe defendant asks the Court to enter a protective order that will stay discovery in this case “until such time as [his or her] interests . . . can be heard and considered,” Mot. 25, but the Court does not understand the basis for this request. The Rules permit the Court to enter a protective order “for good cause,” in order to “protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense.” Fed. R. Civ. P. 26(c)(1). The moving defendant has not put forth the basis for the entry of such a protective order. To the extent that Doe has argued that his or her interests have not yet been heard as to the appropriateness of the subpoena, those arguments have been addressed above in the -20- discussion of the motion to quash. Otherwise, a party may not proceed to litigate in federal court anonymously except in rare circumstances. Fed. R. Civ. P. 10(a); see also Doe v. Megless, 654 F.3d 404, 408 (3d Cir. 2011) (finding that “exceptional cases” may merit permitting a party to proceed anonymously upon a showing of a reasonable fear of severe harm). The second moving Doe has not alleged that he or she fears “severe harm” resulting from the requirement to appear if he or she wishes to defend against the claims the plaintiff has brought. The Court will not enter a protective order at this time. An appropriate order shall issue. -21-

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?