Patrick Collins, Inc. v. John Does 1 through 34, No. 3:2012cv01474 - Document 6 (S.D. Cal. 2012)

Court Description: ORDER Granting In Part And Denying In Part Plaintiff's Motion For Leave To Serve Third Party Subpoena Prior To A Rule 26(f) Conference (Re Doc. 4 ). Signed by Magistrate Judge David H. Bartick on 7/25/2012. (mdc)

Download PDF
Patrick Collins, Inc. v. John Does 1 through 34 Doc. 6 1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 SOUTHERN DISTRICT OF CALIFORNIA 10 PATRICK COLLINS, INC., 11 12 13 14 Civil No. Plaintiff, v. JOHN DOES 1 through 34, Defendants. 12cv1474-WQH (DHB) ORDER GRANTING IN PART AND DENYING IN PART PLAINTIFF’S MOTION FOR LEAVE TO SERVE THIRD PARTY SUBPOENA PRIOR TO A RULE 26(f) CONFERENCE [ECF No. 4] 15 16 On June 19, 2012, Plaintiff Patrick Collins, Inc. filed a Motion for Leave to Serve Third Party 17 Subpoena Prior to a Rule 26(f) Conference. (ECF No. 4.) Because no Defendant has been named or 18 served, no opposition or reply briefs have been filed. On July 23, 2012, the Court issued an order 19 vacating the July 24, 2012 hearing on Plaintiff’s Motion after finding the matter suitable for decision 20 without oral argument pursuant to Civil Local Rule 7.1(d)(1). (ECF No. 5.) For the reasons discussed 21 below, Plaintiff’s Motion is GRANTED IN PART and DENIED IN PART. 22 I. PROCEDURAL HISTORY 23 On June 18, 2012, Plaintiff filed a Complaint against John Does 1 through 34 (“Defendants”). 24 (ECF No. 1.) Plaintiff asserts it is the registered owner of the copyright for the motion picture entitled 25 “Best New Starlets 2012.” (ECF No. 1, at ¶ 11.) Plaintiff alleges a claim for copyright infringement, 26 stating that Defendants reproduced and distributed Plaintiff’s copyrighted work through the Internet 27 without Plaintiff’s authorization. (Id. at ¶ 45-51.) Plaintiff also pleads contributory copyright 28 infringement, alleging that Defendants illegally obtained the copyrighted work and assisted others in -1- 12cv1474-WQH (DHB) Dockets.Justia.com 1 doing the same. (Id. at ¶ 52-61.) 2 On June 19, 2012, one day after filing the Complaint, Plaintiff filed the instant Motion in which 3 Plaintiff seeks leave to take early discovery to learn the identities of the Doe Defendants from their 4 respective Internet Service Providers (“ISPs”). Specifically, Plaintiff seeks an order permitting it to 5 serve Rule 45 subpoenas on the third party ISPs and any related intermediary ISPs demanding the true 6 name, address, telephone number, e-mail address and Media Access Control (“MAC”) address of the 7 Defendant to whom the ISP issued an Internet Protocol (“IP”) address. (ECF No. 4, at 1:18-21.) 8 Plaintiff attached to its Motion a list of the IP addresses associated with the subscribers it hopes to 9 identify as Defendants. (See ECF No. 4-4, Decl. Tobias Feiser (“Feiser Decl.”), Ex. B.) 10 II. FACTUAL ALLEGATIONS 11 In the Complaint, Plaintiff alleges that the thirty-four Doe Defendants collectively infringed its 12 copyrighted work using a BitTorrent file transfer protocol. (ECF No. 1, at ¶¶ 16-42.) The Defendants 13 are purportedly a collection of “BitTorrent users” or “peers” whose computers are connected for the 14 purpose of sharing a file, otherwise known as a “swarm.” (Id. at ¶ 15 (“The BitTorrent protocol’s 15 popularity stems from its ability to distribute a large file without creating a heavy load on the source 16 computer and network. In short, to reduce the load on the source computer, rather than downloading 17 a file from a single source computer (one computer directly connected to another), the BitTorrent 18 protocol allows users to join a ‘swarm’ of host computers to download and upload from each other 19 simultaneously (one computer connected to numerous computers).”) 20 Plaintiff alleges that following Defendants’ unlawful infringement of its copyrighted work using 21 the BitTorrent protocol and file-sharing “swarm,” Plaintiff retained IPP, Limited (“IPP”), a computer 22 forensic investigation firm, to identify the IP addresses being used to participate in the infringement. 23 (ECF No. 1, at ¶ 36.) Plaintiff further alleges that IPP utilized computer forensic software to determine 24 that each Defendant copied a portion of Plaintiff’s copyrighted work during the same series of 25 transactions and that Defendants were identified by their IP addresses. (Id. at ¶¶ 37-42.) 26 III. LEGAL STANDARDS 27 Generally, discovery is not permitted without a court order before the parties have conferred 28 pursuant to Federal Rule of Civil Procedure 26(f). Fed. R. Civ. P. 26(d)(1). “[H]owever, in rare cases, -2- 12cv1474-WQH (DHB) 1 courts have made exceptions, permitting limited discovery to ensue after filing of the complaint to 2 permit the plaintiff to learn the identifying facts necessary to permit service on the defendant.” 3 Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573, 577 (N.D. Cal. 1999) (citing Gillespie v. Civiletti, 4 629 F.2d 637, 642 (9th Cir. 1980)). Requests for early or expedited discovery are granted upon a 5 showing by the moving party of good cause. See Semitool, Inc. v. Tokyo Electron Am., Inc., 208 F.R.D. 6 273, 275-76 (N.D. Cal. 2002) (applying “the conventional standard of good cause in evaluating 7 Plaintiff’s request for expedited discovery”). 8 “The Ninth Circuit has held that when the defendants’ identities are unknown at the time the 9 complaint is filed, courts may grant plaintiffs leave to take early discovery to determine the defendants’ 10 identities ‘unless it is clear that discovery would not uncover the identities, or that the complaint would 11 be dismissed on other grounds.’” 808 Holdings, LLC v. Collective of December 29, 2011 Sharing Hash, 12 No. 12-cv-0186 MMA (RBB), 2012 U.S. Dist. LEXIS 62980, *7 (S.D. Cal. May 4, 2012) (quoting 13 Gillespie, 629 F.2d at 642). “A district court’s decision to grant discovery to determine jurisdictional 14 facts is a matter of discretion.” Columbia Ins., 185 F.R.D. at 578 (citing Wells Fargo & Co. v. Wells 15 Fargo Express Co., 556 F.2d 406, 430 n.24 (9th Cir. 1977)). 16 District courts apply a three-factor test when considering motions for early discovery to identify 17 certain defendants. Id. at 578-80. First, “the plaintiff should identify the missing party with sufficient 18 specificity such that the Court can determine that defendant is a real person or entity who could be sued 19 in federal court.” Id. at 578. Second, the plaintiff “should identify all previous steps taken to locate the 20 elusive defendant” to ensure that the plaintiff has made a good faith effort to identify and serve process 21 on the defendant. Id. at 579. Third, the “plaintiff should establish to the Court’s satisfaction that 22 plaintiff’s suit against defendant could withstand a motion to dismiss.” Id. (citing Gillespie, 629 F.2d 23 at 642). “[T]o prevent abuse of this extraordinary application of the discovery process and to ensure 24 that the plaintiff has standing to pursue an action against defendant,” plaintiff must show that some act 25 giving rise to liability actually occurred and that the discovery is aimed at identifying the person who 26 allegedly committed the act. Id. at 579-80 (citing Plant v. Various John Does, 19 F. Supp. 2d 1316, 27 1321 n.2 (S.D. Fla. 1998)). 28 /// -3- 12cv1474-WQH (DHB) 1 IV. ANALYSIS 2 Plaintiff seeks an order permitting it to subpoena three ISPs for documents and information 3 sufficient to identify the subscribers of the assigned IP addresses listed in Exhibit B to declaration of 4 Tobias Feiser filed in support of Plaintiff’s Motion: (1) Cox Communications; (2) Road Runner; and 5 (3) SBC Internet Services. (ECF No. 4-4, Feiser Decl., Ex. B.) 6 A. Identification of Missing Parties with Sufficient Specificity 7 First, Plaintiff must identify the Doe Defendants with enough specificity to enable the Court to 8 determine that the defendant is a real person or entity who would be subject to the jurisdiction of this 9 Court. Columbia Ins., 185 F.R.D. at 578. This court has “determined that a plaintiff identifies Doe 10 defendants with sufficient specificity by providing the unique IP addresses assigned to an individual 11 defendant on the day of the allegedly infringing conduct, and by using ‘geolocation technology’ to trace 12 the IP addresses to a physical point of origin.” 808 Holdings, 2012 U.S. Dist. LEXIS 62980, at *10 13 (quoting OpenMind Solutions, Inc. v. Does 1-39, No. C-11-3311 MEJ, 2011 U.S. Dist. LEXIS 116552, 14 at *5-6 (N.D. Cal. Oct. 7, 2011); Pink Lotus Entm’t, LLC v. Does 1-46, No. C-11-02263 HRL, 2011 U.S. 15 Dist. LEXIS 65614, at *6-7 (N.D. Cal. June 21, 2011)). 16 Here, Plaintiff submitted a chart listing the unique IP address corresponding to each Defendant 17 on the dates and times of the purportedly infringing activity, as well as the city and state in which each 18 IP address is located. (ECF No. 4-4, Feiser Decl., Ex. B.) Consequently, Plaintiff has identified the Doe 19 Defendants with sufficient specificity. See OpenMind Solutions, 2011 U.S. Dist. LEXIS 116552, at *6 20 (concluding that plaintiff satisfied the first factor by identifying the defendants’ IP addresses and by 21 tracing the IP addresses to a point of origin within the State of California); Pink Lotus Entm’t, 2011 U.S. 22 Dist. LEXIS 65614, at *6 (same). In addition, Plaintiff has presented evidence that the identified the 23 IP addresses are physically located in this district. (See ECF No. 4-4, Feiser Decl., Ex. B.) 24 B. Previous Attempts to Locate Defendants 25 Next, Plaintiff must describe all prior steps it has taken to identify the Doe Defendants in a good 26 faith effort to locate and serve them. See Columbia Ins., 185 F.R.D. at 579. In its Motion, Plaintiff 27 describes the efforts it made to learn the IP addresses of each Doe Defendant. (ECF No. 4-2, Feiser 28 Decl., at ¶¶ 13-21.) However, Plaintiff generally maintains that there are no other practical measures -4- 12cv1474-WQH (DHB) 1 available to determine the actual identities of the Doe Defendants. (ECF No. 4, at 4.) Indeed, Plaintiff 2 asserts that the second factor is satisfied because “there is no other way for Plaintiff to obtain 3 Defendants’ identities, except by serving a subpoena on Defendants’ ISPs demanding it.” (Id.) 4 Thus, Plaintiff appears to have obtained and investigated the available data pertaining to the 5 alleged infringements in a good faith effort to locate each Doe Defendant. See Digital Sin, Inc. v. Does 6 1-5698, No. C 11-04397 LB, 2011 U.S. Dist. LEXIS 128033, at *4-5 (N.D. Cal. Nov. 4, 2011); 7 OpenMind Solutions, 2011 U.S. Dist. LEXIS 116552, at *5-6; MCGIP, LLC v. Does 1-149, 2011 U.S. 8 Dist. LEXIS 85363, at *4-5 (N.D. Cal. Aug. 3, 2011); Pink Lotus Entm’t, 2011 U.S. Dist. LEXIS 65614, 9 at *6-7. 10 C. Ability to Withstand a Motion to Dismiss 11 “Finally, to be entitled to early discovery, [Plaintiff] must demonstrate that its Complaint can 12 withstand a motion to dismiss.” 808 Holdings, 2012 U.S. Dist. LEXIS 62980, at *13 (citing Columbia 13 Ins., 185 F.R.D. at 579). 14 1. Ability to State a Claim Upon Which Relief Can Be Granted 15 In order to establish copyright infringement, a plaintiff must show: (1) ownership of a valid 16 copyright, and (2) that the defendant violated the copyright owner’s exclusive rights under the Copyright 17 Act. Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir. 2004); 17 U.S.C. § 501(a). Here, Plaintiff 18 alleges it owns the registered copyright of the motion picture that Defendants copied using the 19 BitTorrent protocol and BitTorrent Client. (ECF No. 1, at ¶ 46-47.) Plaintiff also alleges it did not 20 authorize, permit, or consent to Defendants’ copying of its work. (ECF No. 1, at ¶ 48.) It appears 21 Plaintiff has stated a prima facie claim for copyright infringement that can withstand a motion to 22 dismiss. 23 2. 24 The plaintiff bears the burden of establishing jurisdictional facts. See Columbia Ins. Co., 185 25 F.R.D. at 578. Plaintiff’s Motion does not discuss whether this Court has personal jurisdiction over the 26 Doe Defendants. However, Plaintiff’s Complaint indicates that all of the potential thirty-four Doe 27 Defendants are located in this judicial district. (See ECF No. 1-1, Ex. A (showing that each IP address 28 is located in San Diego County). The Complaint also alleges that each of Defendants’ acts of copyright Personal Jurisdiction -5- 12cv1474-WQH (DHB) 1 infringement occurred using an IP address traced to a physical location in this district, that each 2 Defendant resides in California, and/or each Defendant “has engaged in continuous and systematic 3 business activity” in California. (ECF No. 1, at ¶ 4.) 4 Therefore, at this early juncture, it appears Plaintiff has alleged sufficient facts to show it can 5 likely withstand a motion to dismiss for lack of personal jurisdiction because all of the Doe Defendants 6 have an IP address that was traced to a location in this district. See 808 Holdings, 2012 U.S. Dist. 7 LEXIS 62980, at *11. 8 2. Venue 9 “The venue of suits for infringement of copyright is not determined by the general provision 10 governing suits in the federal district courts, rather by the venue provision of the Copyright Act.” 11 Goldberg v. Cameron, 482 F. Supp. 2d 1136, 1143 (N.D. Cal. 2007) (citing 28 U.S.C. § 1400(a); 12 Lumiere v. Mae Edna Wilder, Inc., 261 U.S. 174, 176 (1923)). ) “In copyright infringement actions, 13 venue is proper ‘in the district in which the defendant or his agent resides or may be found.’” Brayton 14 Purcell LLP v. Recordon & Recordon, 606 F.3d 1124, 1128 (9th Cir. 2010) (quoting 28 U.S.C. § 15 1400(a)). “The Ninth Circuit interprets this statutory provision to allow venue ‘in any judicial district 16 in which the defendant would be amendable to personal jurisdiction if the district were a separate 17 state.’” Id. (quoting Columbia Pictures Television v. Krypton Broad. of Birmingham, Inc., 106 F.3d 18 284, 289 (9th Cir. 1994)). 19 Plaintiff does not address venue in the Motion. In the Complaint, however, Plaintiff alleges 20 venue is proper because although the true identities of the Doe Defendants are unknown, each Defendant 21 may be found in this district, and a substantial part of the infringing acts complained of occurred in this 22 district. (ECF No.1, at ¶ 5.) All thirty-four Defendants appear to have IP addresses in this district. 23 Accordingly, Plaintiff’s Complaint can likely survive a motion to dismiss. 24 D. Cable Privacy Act 25 Finally, the Court must consider the requirements of the Cable Privacy Act, 47 U.S.C. § 551. 26 The Act generally prohibits cable operators from disclosing personally identifiable information 27 regarding subscribers without the prior written or electronic consent of the subscriber. 47 U.S.C. § 28 551(c)(1). A cable operator, however, may disclose such information if the disclosure is made pursuant -6- 12cv1474-WQH (DHB) 1 to a court order and the cable operator provides the subscriber with notice of the order. 47 U.S.C. § 2 551(c)(2)(B). The ISPs that Plaintiff intends to subpoena in this case are cable operators within the 3 meaning of the Act. 4 5 6 V. CONCLUSION For the reasons set forth above, Plaintiff’s Motion for Leave to Serve Third Party Subpoena Prior to a Rule 26(f) Conference is GRANTED. 7 Plaintiff may serve subpoenas on the ISPs for the thirty-four Doe Defendants, seeking the true 8 name and address of those individuals with the IP addresses located in this judicial district as set forth 9 on Exhibit A to Plaintiff’s Complaint. That information (i.e, the subscriber’s true name and address) 10 should be sufficient for Plaintiff to be able to identify and serve the Doe Defendants. The Court finds 11 it is not necessary for the ISPs to release Defendants’ telephone numbers, e-mail addresses or MAC 12 addresses. Thus, Plaintiff’s request to seek early discovery regarding Defendants’ telephone numbers, 13 e-mail addresses and MAC addresses is DENIED. 14 Each subpoena must provide a minimum of forty-five days’ notice before any production and 15 shall be limited to one category of documents identifying the particular subscriber or subscribers on the 16 “Hit Date (UTC)” listed on Exhibit A to Plaintiff’s Motion. (ECF No. 1-1.) The requested information 17 should be limited to the name and address of each subscriber. Any subpoenaed third party may seek 18 a protective order if it determines there is a legitimate basis for doing so. 19 The ISPs shall have fourteen calendar days after service of the subpoenas to notify the 20 subscribers that their identity has been subpoenaed by Plaintiff. Each subscriber whose identity has 21 been subpoenaed shall then have thirty calendar days from the date of the notice to seek a protective 22 order or file any other responsive pleading. 23 Plaintiff shall serve a copy of this Order with any subpoena obtained and served pursuant to this 24 Order to the named ISPs. The ISPs, in turn, must provide a copy of this Order along with the required 25 notice to any subscriber whose identity is sought pursuant to this Order. 26 No depositions or written discovery to Defendants are authorized at this time. 27 IT IS SO ORDERED. 28 DATED: July 25, 2012 DAVID H. BARTICK United States Magistrate Judge -7- 12cv1474-WQH (DHB)

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.