Malibu Media, LLC v. John Doe, No. 2:2015cv03504 - Document 36 (E.D.N.Y. 2016)

Court Description: ORDER denying 10 Motion to Quash and Motion for Protective Order. For the reasons set forth in the attached Memorandum and Order, Defendant's: (i) motion for reconsideration is granted, but upon reconsideration, the Court adheres to its orig inal decision contained in the July 29, 2015 Discovery Order; (ii) motion to quash is denied; and (iii) motion for a protective order is denied. Consistent with the Court's Discovery Order, and on Plaintiff's consent, Defendant may litigat e this action anonymously through the close of discovery. An Order lifting the stay of this Court's July 29, 2015 Discovery Order will be filed separately in this action, and in all other actions in which a stay of the Discovery Order was imposed. Ordered by Magistrate Judge Steven I. Locke on 8/23/2016. (Walsh, Kenneth)

Download PDF
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK -----------------------------------------------------------------------X MALIBU MEDIA, LLC, MEMORANDUM AND ORDER 15-CV-3504 (JFB)(SIL) Plaintiff, -againstJOHN DOE, subscriber assigned IP address 98.116.160.61, Defendant. -----------------------------------------------------------------------X LOCKE, Magistrate Judge: Presently before the Court in this copyright infringement action is Defendant John Doe’s (“Defendant” or “Doe”) Motion to Quash Subpoena and Motion for a Protective Order, which Plaintiff Malibu Media, LLC (“Plaintiff” or “Malibu Media”) opposes. See Docket Entry (“DE”) [10], [14]. For the reasons set forth herein, Defendant’s motion is denied. I. BACKGROUND The relevant factual background, as well as a description of the relevant “BitTorrent” technology, is discussed at length in this Court’s July 29, 2015 Order granting Plaintiff’s Motion for Expedited Discovery (the “Discovery Order”), and is incorporated herein by reference. See DE [9]. Nevertheless, the following facts provide relevant context for the instant motion. A. The Parties and the Discovery Order Malibu Media is a California corporation engaged in the production and distribution of adult erotic films through its website “X-art.com.” See Declaration of 1 Colette Pelissier Field (the “Field Decl.”), DE [16], ¶¶ 3-7. Through monthly or annual subscriptions, Malibu Media offers access to an online library of copyrighted video content. Id. at ¶ 6. According to Plaintiff, piracy of its copyrighted content is “a serious threat to [its] business because more people steal [Malibu Media’s] works via BitTorrent than pay for subscriptions.” Id. at ¶ 10. Relevant for purposes of this action, Plaintiff alleges that Defendant infringed upon the copyrights that Malibu Media owns for eighteen original works of authorship. See Compl., DE [1], ¶ 29, Ex. B. The Doe Defendant is the Internet subscriber assigned the Internet Protocol (“IP”) address 98.116.160.61. Id. at Ex. A. Although Malibu Media “only knows defendant by his, her or its IP Address,” see id. at ¶ 9, by establishing a direct connection with Defendant’s IP address, Malibu Media’s investigator, IPP International UG (“IPP International”), downloaded from Defendant one or more bits of each of the eighteen digital movie files identified in the Complaint. Id. at ¶¶ 1820. According to Plaintiff, between February 10, 2015 and May 23, 2015, Defendant illegally copied and distributed eighteen movies to which Malibu Media owns the copyright. Id. at ¶ 20. To that end, Plaintiff alleges that “Defendant is a habitual and persistent BitTorrent user and copyright infringer.” Id. at ¶ 25. Accordingly, by way of Complaint dated June 16, 2015, Malibu Media commenced this action against the Doe Defendant, alleging one count of direct copyright infringement in violation of 17 U.S.C. §§ 106, 501. Id. at ¶¶ 28-33. 2 Although Plaintiff does not know the Doe Defendant’s identity, Malibu Media alleges that “Defendant’s Internet Service Provider can identify the Defendant.” Id. at ¶¶ 9, 10. Accordingly, on July 13, 2015, Plaintiff filed a motion seeking leave to serve a third-party subpoena on Verizon Internet Services (“Verizon”) pursuant to Fed. R. Civ. P. 26(f) (the “Discovery Motion”). See DE [4]. Specifically, Malibu Media sought permission to “demand the true name and address of the Defendant.” See Memorandum of Law in Support of Plaintiff’s Motion for Leave to Serve a Third Party Subpoena Prior to a Rule 26(f) Conference (“Discovery Mot. Mem.”), DE [5], at 4. According to Plaintiff, “without [that] information, Plaintiff cannot serve the Defendant nor pursue this lawsuit to protect its valuable copyrights.” Id. On July 29, 2015, the Court granted the Discovery Motion, holding that “Malibu Media has demonstrated good cause for limited expedited discovery designed to ascertain the names and addresses of the Doe Defendants.” Discovery Order at 9.1 However, in light of “the high risk of false positives in the identification process . . . combined with the sensitive nature of the copyright material at issue,” the Court issued a Protective Order governing the manner in which such information would be disclosed. Id. at 10-12. Pursuant to the Protective Order, within sixty days of receiving a subpoena from Malibu Media, Defendant’s Internet Service Provider (“ISP”) was required to provide notice thereof to Defendant, who is the Internet subscriber associated with the IP address at issue. Id. at 11. Upon receiving such Certain references in the Discovery Order are to more than one Defendant because Malibu Media filed numerous similar lawsuits followed by the same motion for expedited discovery concerning the identities of various Doe Defendants. See Discovery Order at 1-2 (identifying the fifteen cases to which the Discovery Order applies). 1 3 notice from the ISP, Defendant then had sixty days to file any motion with this Court seeking to contest the subpoena or litigate the subpoena anonymously. Id. If, after sixty days, Defendant did not contest disclosure of his identity, the ISP was required to either produce information responsive to the subpoena or file its own motion to quash within ten days. Id. at 12. B. The Instant Motion On or about August 7, 2015, Defendant received a letter from Verizon informing him that Verizon received a subpoena from Malibu Media seeking disclosure of Defendant’s name and address (the “Verizon Subpoena”). See Motion to Quash Subpoena and Motion for a Protective Order by Defendant John Doe (“Def.’s Mot.”), DE [10], ¶ 2. On September 28, 2015, Defendant filed the instant motion seeking an Order: (i) quashing the Verizon Subpoena pursuant to Fed. R. Civ. P. 45(d), and (ii) protecting his identity from disclosure pursuant to Fed. R. Civ. P. 26(c). Id. at ¶¶ 55, 62. According to Defendant, he “did not copy or transmit Plaintiff’s copyrighted works . . . and was not a part of Plaintiff’s alleged BitTorrent ‘swarm.’” Id. at ¶ 4. Defendant further argues that “Plaintiff has failed to show ‘good cause’ for the expedited discovery [provided for in the Discovery Order] because it couldn’t establish a prima facie claim and its claim that there is no alternative means of obtaining the desired information was inadequate.” Id. at ¶ 63. To that end, relying on a 2008 paper published by the University of Washington Department of Computer Science, Defendant argues, among other things, that the “common approach for identifying infringing users in the popular BitTorrent file sharing network is not 4 conclusive.” Id. at ¶¶ 8-11 (quoting Tadayoshi Kohno, Arvind Krishnamurthy & Michael Piatek, University of Washington, Challenges and Directions for Monitoring P2P File Sharing Networks – or – Why My Printer Received a DMCA Takedown Notice (available at www.dmca.cs.washington.edu/dmca_hotsec08.pdf) [hereinafter Univ. of Wash. Paper]). According to Defendant, “practically any Internet user[] can be framed for copyright infringement and even without being explicitly framed, innocent users may still be identified as an infringer even if they have never used [peer-topeer] software.” Id. at ¶ 8. In opposition, Plaintiff argues, among other things: (i) that Defendant lacks standing to oppose the Verizon Subpoena; (ii) that the Court did not err in concluding that good cause existed to allow for expedited discovery; and (iii) that Defendant fails to identify a legally cognizable reason to quash the Verizon Subpoena pursuant to Fed. R. Civ. P. 45. See Plaintiff’s Response in Opposition to Defendant’s Motion to Quash (“Pl.’s Opp’n”), DE [14], at 1-2. Malibu Media further argues that the University of Washington Paper does not actually support Defendant’s position because “Plaintiff used the exact process that the study recommends . . . .” Id. at 5. Plaintiff does not oppose allowing Defendant to proceed anonymously through the conclusion of discovery. Id. at 1. On October 6, 2015, this Court stayed the directives and relief provided for in the Discovery Order “[b]ecause the arguments advanced in the Doe Defendant’s Motion to Quash raise[d] serious questions as to whether good cause exists . . . to permit the expedited pre-answer discovery provided for in [the Discovery Order] . . . 5 .”2 See DE [12]. The Court held an evidentiary hearing on Defendant’s motion on April 20, 2016. See DE [30]. At the evidentiary hearing, Plaintiff offered testimony from: (i) Michael Patzer, Senior Assistant Architect for the German copyright infringement detection firm Excipio, which designed the monitoring software that Malibu Media relied upon in detecting Defendant’s allegedly infringing activity; and (ii) Patrick Paige, Plaintiff’s forensic expert, who conducted tests to verify the accuracy of Excipio’s monitoring software. See Transcript of April 20, 2016 Evidentiary Hearing (“Tr.”), DE [34-1], at 6:21-8:4, 41:3-6, 106:6-15. Although the Court invited testimony from the authors of the University of Washington Paper, Defendant did not present any witnesses. Following the evidentiary hearing, the parties submitted post-hearing briefs. See Defendant’s Post-Hearing Memorandum (“Def.’s Supp. Br.”), DE [33]; Plaintiff’s Supplemental Brief (“Pl.’s Supp. Br.”), DE [34]. II. DISCUSSION At the outset, the Court notes that the parties disagree regarding the applicable standard. Although styled as a motion to quash pursuant to Fed. R. Civ. P. 45, Defendant claims that its “arguments on the ‘good cause’ inquiry [are] based on Rule 26.” See Defendant’s Reply to Plaintiff’s Opposition to Motion to Quash (“Def.’s Reply Mem.”), DE [17], at 1. Defendant also “asks that this Court, among other things, reconsider [its] finding” that good cause existed to permit expedited discovery. Def.’s Mot. ¶ 21; see also Def.’s Reply Mem. at 1 (observing that the “court The October 6, 2015 Order applied to this case and all other cases brought by Malibu Media against John Doe defendants on similar grounds currently pending in this Court. See DE [12] at 3. 2 6 has discretion to reconsider its orders”). Therefore, the Court reviews the instant motion as both a motion for reconsideration of the Court’s Discovery Order and a motion to quash the already issued Verizon Subpoena. However, regardless of which standard applies, for the reasons set forth herein, Defendant’s motion is denied. A. Motion for Reconsideration Motions for reconsideration are governed by Local Civil Rule 6.3, which requires that the movant “set forth concisely the matters or controlling decisions which the party believes the court has overlooked.” Pickering-George v. Attorney Gen. of U.S., No. 10-CV-1103, 2011 WL 52363, at *1 (E.D.N.Y. Jan. 5, 2011) (quoting Local Civ. R. 6.3) (internal alteration omitted). Therefore, to prevail on a motion for reconsideration, “a movant must show that the Court has overlooked controlling decisions or factual matters that, had they been considered, might reasonably have altered the result.” Paradysz Matera Co., Inc. v. Robertson, No. 04-CV-1779, 2004 WL 1713902, at *1 (S.D.N.Y. July 29, 2004) (citing Range Road Music, Inc. v. Music Sales Corp., 90 F. Supp. 2d 390, 391-92 (S.D.N.Y. 2000)); see also Shrader v. CSX Transp., Inc., 70 F.3d 255, 257 (2d Cir. 1995) (“[R]econsideration will generally be denied unless the moving party can point to controlling decisions or data that the court overlooked—matters, in other words, that might reasonably be expected to alter the conclusion reached by the court.”). It is well-established that “[t]he standard for a motion for reconsideration is demanding, and should be ‘narrowly construed and strictly applied so as to avoid repetitive arguments on issues that have been considered fully by the Court.’” Henry v. Alliance for Health, Inc., No. 05-CV-1264, 7 2006 WL 3050873, at *1 (E.D.N.Y. Oct. 18, 2006) (quoting Wechsler v. Hunt Health Sys., Ltd., 186 F. Supp. 2d 402, 410 (S.D.N.Y. 2002)); see also Hunt v. Enzo Biochem, Inc., No. 06 Civ. 170, 2007 WL 1346652, at *1 (S.D.N.Y. May 7, 2007) (“A motion for reconsideration is not . . . a second bite at the apple for a party dissatisfied with a court’s ruling.”) (internal quotation omitted). Ultimately, motions for reconsideration “are committed to the sound discretion of the district court.” Image Processing Techs. v. Canon Inc., No. 10-CV-3867, 2012 WL 253097, at *1 (E.D.N.Y. Jan. 26, 2012). Here, relying primarily on the University of Washington Paper, Defendant “asks that this Court . . . reconsider [its] finding of good cause” to allow for expedited discovery because “Plaintiff has failed to . . . establish a prima facie claim and its claim that there is no alternative means of obtaining the desired information was inadequate.” Defs.’ Mot. ¶¶ 21, 63. In opposition, Plaintiff argues that, insofar as Defendant’s motion is construed as a motion for reconsideration, it: (i) is untimely, and (ii) “fails to argue any basis upon which the Court may find it committed clear error or abused its discretion in finding that Plaintiff demonstrated ‘good cause’ to serve the subpoena.” Pl.’s Opp’n at 9. As an initial matter, Local Civil Rule 6.3 provides that, “[u]nless otherwise provided by the Court or by statute or rule, a notice of motion for reconsideration . . . shall be served within fourteen (14) days after the entry of the Court’s determination of the original motion . . . .” Local Civil Rule 6.3. Here however, the Court’s July 29, 2015 Protective Order provided that, upon being informed of the Verizon Subpoena by his ISP, Defendant had “a period of 60 days to file any motions with this Court 8 contesting the Subpoena (including a motion to quash or modify the Subpoena), as well as any request to litigate the Subpoena anonymously.” Discovery Order at 1112. Because Defendant received notification of the Verizon Subpoena on August 7, 2015, the instant motion, which Defendant filed on September 28, 2015, is timely. Further, because of the unusual posture of the case, in that Plaintiff is seeking preanswer discovery, Defendant’s motion for reconsideration is his first chance to make his substantive arguments. Accordingly, reconsideration is appropriate. Nevertheless, for the reasons that follow, the analysis and conclusions contained in the University of Washington Paper do not alter the Court’s determination that good cause exists to allow for limited expedited discovery.3 In the University of Washington Paper, the authors analyze “the methods by which copyright holders currently monitor the BitTorrent file sharing network,” and ultimately conclude that “a common approach for identifying infringing users is not conclusive.” See Univ. of Wash. Paper § 1. In reaching their conclusion, the authors differentiate between “direct detection” and “indirect detection” of copyright infringers. Id. at § 2. Whereas direct detection “involves connecting to a peer . . . and then exchanging data with that peer,” indirect detection “relies on the set of peers returned by the coordinating tracker [of a BitTorrent swarm] only, [and] treating this list as authoritative as to whether or not IPs are actually exchanging data within the swarm.” Id. According to the authors, “[t]he main weakness in current methods of Defendant has not identified any other controlling law or facts that the Court failed to consider in its Discovery Order. Therefore, the instant analysis is limited to whether the University of Washington Paper is sufficient to establish that good cause does not exist to allow for expedited discovery of the Doe Defendant’s identification information. 3 9 detecting copyright infringement in BitTorrent appears to be the treatment of indirect reports as conclusive evidence of participation.” Id. at § 4 (emphasis added). To that end, the authors note that “direct detection is more conclusive . . . .” Id. at § 2. Accordingly, the authors ultimately conclude that “[a] more thorough approach to detecting infringement in BitTorrent would be to . . . download data directly from the suspected user and verify its contents.” Id. at § 6.1. Relying on the University of Washington Paper, Defendant claims that “the common approach for identifying infringing users in the popular BitTorrent file sharing network is not conclusive” and that “practically any Internet user[] can be framed for copyright infringement and even . . . innocent users may still be identified as an infringer even if they have never used [peer-to-peer] software.” Defs.’ Mot. ¶ 8. According to Defendant, “[t]he research results demonstrate several simple techniques that a malicious user could use to frame arbitrary IP addresses as network endpoints which are infringing the copyrights.” Id. at ¶ 9. However, at the evidentiary hearing, Patzer provided detailed, credible testimony regarding Excipio’s copyright infringement detection methods, and explained why the concerns identified in the University of Washington Paper do not apply to Excipio’s methods. See Tr. 30:6-39:11. According to Patzer, indirect detection, which was addressed in the University of Washington Paper, involves connecting to a “tracker,” which contains a file listing all of the IP addresses seeding the relevant torrent file, and then pursing action against each of the IP addresses identified on the list. Id. at 33:12-35:20. However, 10 when relying on indirect detection, it is “not verified that any of the clients are sharing the content.” Id. at 35:18-20. According to Patzer, this method results in action against “IP addresses appearing on the lists which are not sharing content.” Id. at 37:20-24. To that end, Patzer testified that “the ills that were discussed [in the University of Washington Paper], and the problems of false positives, . . . are related to indirect monitoring.” Id. at 42:19-23. In contrast, Patzer testified that Excipio has adopted the “exact procedure” recommended in the University of Washington Paper by relying on direct methods of detection to identify copyright infringers, including Defendant in this action. Id. at 39:4-10, 42:13-15. In employing a direct detection method, Excipio “do[es] a real connection” with the seeder and “actually exchange[s] data.” Id. To that end, Patzer testified that “[w]hen [Excipio has] collected IP addresses, [it] will connect to every single IP address in the list.” Id. at 36:16-17. By actually exchanging data with the seeder, Excipio “can be sure that person or that IP address has really shared that content we were looking for.” Id. at 39:4-8. Indeed, Patzer testified that “at no time worldwide has it ever been proven that any of the IP addresses that [Excipio has] indicated shared the content that the client asked [Excipio] to verify as being inaccurate.” Id. at 45:3-11. Moreover, to the extent that the University of Washington Paper identifies methods of “spoofing” IP addresses so that innocent users are framed, Patzer testified that, by making a direct connection to the seeder, “it is not possible” for such misidentification of IP addresses to occur. Id. at 40:14-18. 11 Because Excipio employs the exact method that the University of Washington Paper recommends to identify copyright infringers, Defendant’s argument that “the common approach for identifying infringing users in the popular BitTorrent file sharing network is inconclusive” lacks merit. See Defs.’ Mot. ¶ 11; Tr. 30:6-39:11. Therefore, the University of Washington Paper does not change the Court’s conclusion that good cause exists to allow for the limited expedited discovery provided for in the July 29, 2015 Discovery Order. Accordingly, while the Court grants Defendant’s motion for reconsideration of its July 29, 2015 Discovery Order based on the arguments above, upon reconsideration, the Court adheres to its original decision. B. Motion to Quash Subpoena Next, the Court considers the Defendant’s motion under the motion to quash standard. Pursuant to Fed. R. Civ. P. 45, a court “must quash or modify a subpoena that: (i) fails to allow reasonable time to comply; (ii) requires a person to comply beyond the geographical limits specified in Rule 45(c); (iii) requires disclosure of privileged or other protected matter . . . ; or (iv) subjects a person to undue burden.” Fed. R. Civ. P. 45(d)(3)(A)(i)-(iv). The party issuing the subpoena bears the initial burden of demonstrating “that the information sought is relevant and material to the allegations and claims at issue in the proceedings.” Night Hawk Ltd. v. Briarpatch Ltd., No. 03 Civ. 1382, 2003 WL 23018833, at *8 (S.D.N.Y. Dec. 23, 2003). Once the subpoena’s relevance has been established, “the party seeking to quash . . . bears the burden of demonstrating that the subpoena is over-broad, duplicative, or unduly burdensome.” Kingsway Fin. Servs., Inc. v. Pricewaterhouse-Coopers LLP, No. 03 Civ. 12 5560, 2008 WL 4452134, at *4 (S.D.N.Y. Oct. 2, 2008). Ultimately, “[d]ecisions to limit discovery as overbroad, duplicative, or unduly burdensome are left to the sound discretion of the trial judge.” Corbett v. eHome Credit Corp., No. 10-CV-26, 2010 WL 3023870, at *3 (E.D.N.Y. Aug. 2, 2010). Here, insofar as Defendant seeks to quash the Verizon Subpoena pursuant to Fed. R. Civ. P. 45, Defendant only argues that he will be unduly burdened in “proving a third party’s use of his IP address” if his identifying information is disclosed to Verizon. See Def.’s Mot. ¶ 42. Nevertheless, in similar situations, other courts have considered whether a defendant’s identity, including the defendant’s name and address, was “privileged or otherwise protected information” such that a subpoena to a non-party ISP should be quashed. See, e.g., Malibu Media, LLC v. John Doe Subscriber Assigned IP Address 24.90.139.137, No. 15 Civ. 7788, 2016 WL 1651869, at *2 (S.D.N.Y. Apr. 26, 2016) (analyzing “whether the First Amendment protects an internet subscriber’s identity from disclosure” in denying the defendant’s motion to quash pursuant to Fed. R. Civ. P. 45). Therefore, the Court considers whether compliance with the Verizon Subpoena would result in: (i) an undue burden for Defendant, or (ii) the disclosure of privileged or otherwise protected information. 1. Whether Defendant will be Subjected to Undue Burden as a Result of the Verizon Subpoena According to Defendant, if his “identifying information is given to Plaintiff, [he] will be subjected to the undue burden of proving [a] third party’s abuse of his IP address, which is practically impossible for Defendant given Defendant’s limited knowledge on internet and BitTorrent even if his IP address was used by unknown 13 malicious internet users.” Def.’s Mot. ¶ 42. However, it is well-established that, “[t]he general rule is that a party does not have standing to object to a subpoena issued to a third-party witness unless the movant has alleged some personal privacy right or privilege to the documents sought.” McNerney v. Archer Daniels Midland Co., 164 F.R.D. 584, 587 (W.D.N.Y. 1995) (citing Langford v. Chrysler Motors Corp., 513 F.2d 1121 (2d Cir. 1975)); see also Revander v. Denman, No. 00 Civ. 1810, 2004 WL 97693, at *1 (S.D.N.Y. Jan. 21, 2004) (observing that “a party generally does not have standing to challenge a subpoena issued to a third-party witness unless a personal privacy right or privilege is implicated”). To that end, even where the defendant “has alleged some personal privacy right or privilege to the documents sought,” see McNerney, 164 F.R.D. at 587, the defendant still lacks standing to oppose a third-party subpoena on undue burden grounds. See Malibu Media, LLC v. John Doe No. 4, No. 12 Civ. 2950, 2012 WL 5987854, at *2 (S.D.N.Y. Nov. 30, 2012) (“This Court agrees with Malibu that Doe No. 4 lacks standing to quash the subpoena [served on Verizon] on undue burden grounds.”); John Doe Subscriber Assigned IP Address 24.90.139.137, 2016 WL 1651869, at *2 n.1 (holding that the defendant lacked standing to oppose a subpoena on undue burden grounds, but analyzing whether the defendant had a privacy right to the discovery sought); see also Malibu Media, LLC v. John Does 1-21, No. 12-CV-835, 2012 WL 3590902, at *2 (D. Colo. Aug. 21, 2012) (“Even where a party has standing to quash a subpoena based on privilege or a personal right, he or she lacks standing to object on the basis of undue burden.”); Malibu Media, LLC v. John Does 1-15, No. 12-CV-2077, 2012 WL 3089383, at *9 (E.D. 14 Pa. July 20, 2012) (“Defendant is not faced with an undue burden because the subpoena is directed at the internet service provider and not the Defendant.”). Here, Defendant lacks standing to oppose the Verizon Subpoena on undue burden grounds. Although the Verizon Subpoena is directed to his ISP, Defendant claims that he “will be subjected to the undue burden of proving [a] third party’s abuse of his IP address . . . .” Def.’s Mot. ¶ 21. However, because “the burden of literal compliance with this subpoena falls to a third-party, Verizon,” Doe lacks standing to oppose the Verizon Subpoena on undue burden grounds. John Doe No. 4, 2012 WL 5987854, at *2; see also John Does 1-15, 2012 WL 3089383, at *8 (“It is the service provider that is compelled to disclose the information, and thus, its prerogative to claim an undue burden.”). Therefore, Defendant’s motion to quash insofar as he claims that the Verizon Subpoena results in an undue burden is denied. 2. Whether the Verizon Subpoena Requires Disclosure of Privileged or Otherwise Protected Information The Supreme Court has “recognized that the First Amendment protects anonymous speech.” Sony Music Entm’t Inc. v. Does 1-40, 326 F. Supp. 2d 556, 562 (S.D.N.Y. 2004) (citing Buckley v. Am. Constitutional Law Found., Inc., 525 U.S. 182, 200, 119 S. Ct. 636, 646 (1999)). Moreover, “[i]t is well-settled that the First Amendment’s protection extends to the Internet.” Id. (citing Reno v. Am. Civil Liberties Union, 521 U.S. 844, 870, 117 S. Ct. 2329, 2344 (1997)). Nevertheless, “[t]he First Amendment . . . does not protect copyright infringement, and the Supreme Court . . . has rejected First Amendment challenges to copyright infringement actions.” Id. (citing Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 15 555-56, 105 S. Ct. 2218, 2228 (1985)); see also Arista Records, LLC v. Doe 3, 604 F.3d 110, 118 (2d Cir. 2010) (“The First Amendment does not . . . provide a license for copyright infringement.”); Malibu Media, LLC v. John Does 1-11, No. 12 Civ. 3810, 2013 WL 3732839, at *5 (S.D.N.Y. July 16, 2013) (“Courts in this District have recognized that internet users have a limited First Amendment privacy interest in anonymous internet usage, including the use of peer-to-peer file-sharing networks, but this interest does not protect those who use their anonymity to infringe the copyrights of others.”). To that end, in evaluating whether to quash a subpoena issued to an ISP seeking the defendant’s identity, courts in the Second Circuit consider the following factors: (1) a concrete showing of a prima facie claim of actionable harm; (2) specificity of the discovery request; (3) the absence of alternative means to obtain the subpoenaed information; (4) a central need for the subpoenaed information to advance the claim; and (5) the party’s expectation of privacy. Sony Music, 326 F. Supp. 2d at 564-65; see also Arista Records, LLC, 604 F.3d at 119 (holding that the Sony Music standard “constitutes an appropriate general standard for determining whether a motion to quash, to preserve the objecting party’s anonymity, should be granted”); John Doe No. 4, 2012 WL 5987854, at *3 (applying the Sony Music factors in denying the defendant’s motion to quash a subpoena seeking disclosure of the defendant’s identity). For the reasons set forth herein, the Court concludes that the Sony Music factors mandate denial of Defendant’s motion to quash. 16 i. Whether Plaintiff Establishes a Prima Facie Claim of Harm To establish a prima facie claim for copyright infringement, a plaintiff must establish: “(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.” Arden v. Columbia Pictures Indus., Inc., 908 F. Supp. 1248, 1257 (S.D.N.Y. 1995); see also Kwan v. Schlein, 634 F.3d 224, 229 (2d Cir. 2011) (discussing elements of a prima facie copyright infringement claim). Relevant to this action, “the use of [peer-to-peer] systems to download and distribute copyrighted music has been held to constitute copyright infringement.” Sony Music, 326 F. Supp. 2d at 565. Here, Plaintiff adequately alleges a prima facie case of actionable harm against the Doe Defendant for copyright infringement. According to Plaintiff, Malibu Media is the “registered owner” of the copyrights to the eighteen movies that Defendant allegedly illegally downloaded and distributed. See Compl. ¶¶ 2, 20-21. Plaintiff further alleges that, “Defendant downloaded, copied, and distributed a complete copy of Plaintiff’s movies without authorization . . . .” Id. at ¶ 20. To that end, at the evidentiary hearing, Patzer offered credible testimony regarding the methods that Excipio used on behalf of Malibu Media in identifying the Doe Defendant’s IP address as an infringer of its copyrighted material. See Tr. 8:5-16:16. Accordingly, Plaintiff’s allegations and evidence submitted in support thereof are sufficient at this juncture to establish a prima facie claim for copyright infringement against Defendant. See John Does 1-11, 2013 WL 3732839, at *6 (“Plaintiff has made a concrete, prima facie case of copyright infringement by alleging ownership of the registered copyright and 17 alleging unlawful downloading, copying, and distribution of this work by specifying the type of technology used, the IP address from which the file was accessed and shared, and the date and time of the infringement.”); In re BitTorrent Adult Film Copyright Infringement Cases, 296 F.R.D. 80, 87 (E.D.N.Y. 2012) (“Plaintiffs . . . have set forth prima facie claims of actionable harm by alleging ownership of registered, copyrighted works that have been infringed.”); John Wiley & Sons, Inc. v. Doe Nos. 130, 284 F.R.D. 185, 189 (S.D.N.Y. 2012) (holding that the plaintiff established a prima facie claim of copyright infringement by alleging its ownership of the copyrighted material and “specific details regarding unlawful copying and distribution of this work”). Relying on Next Phase Distribution, Inc. v. John Does 1-27, 284 F.R.D. 165 (S.D.N.Y. 2012), Defendant argues in opposition that “judges in [the] S.D.N.Y. are seriously questioning the eligibility of the copyright protection for obscene motion pictures.” See Def.’s Reply Mem. at 4. However, in Next Phase Distribution, Inc., the court held that, although “the case law is unsettled regarding whether pornography may legitimately be copyrighted, for the limited purposes of this Motion for Discovery, the fact that [the plaintiff] is the registered copyright owner of the Motion Picture satisfies the requirement of a prima facie showing of copyright infringement.” 284 F.R.D. at 171 n.5. Indeed, the court allowed the plaintiff to serve a subpoena on the defendant’s ISP because the plaintiff “alleged a prima facie case of copyright infringement and it [could not] identify [the John Doe defendant] without a courtordered subpoena.” Id. Similarly, Malibu Media’s allegations that it is the registered 18 owner of the copyrights at issue in this action are sufficient to allege a prima facie case for copyright infringement. See also In re BitTorrent Adult Film Copyright Infringement Cases, 296 F.R.D. at 87 n.8 (“For purposes of this analysis, it is assumed that plaintiffs’ works are entitled to copyright protection, though that may be an open question.”). Defendant further contends that “Malibu has not established a violation by the individual to whom the relevant IP address is registered.” Def.’s Mot. ¶ 28 (emphasis in original). To that end, courts have acknowledged that “[t]he fact that a copyrighted work was illegally downloaded from a certain IP address does not necessarily mean that the owner of that IP address was the infringer.” Media Prods., Inc. v. Does 1-26, No. 12 Civ. 3719, 2012 WL 2190613, at *1 (S.D.N.Y. June 12, 2012); see also Digital Sin, Inc. v. Does 1-179, No. 11 Civ. 8172, 2012 WL 8282825, at *1 (S.D.N.Y. Feb. 1, 2012) (“[S]uch discovery creates a cognizable risk that the names produced could include individuals who did not in fact download the copyrighted material.”). Nevertheless, the possibility that a third party downloaded and distributed the copyrighted works, as opposed to the Internet subscriber himself, does not preclude a finding that the plaintiff has established a prima facie claim of copyright infringement. See Patrick Collins v. John Doe 1, 945 F. Supp. 2d 367, 377 (E.D.N.Y. 2013) (“[W]hile it is a reasonable possibility that the Defendant here did not commit any copyright infringement because another individual did so using his IP address, such as a different family member, visitor, neighbor, or passerby, it is an equally reasonable possibility that the Defendant committed the accused of act.”); Patrick 19 Collins, Inc. v. Does 1-6, No. 12 Civ. 2964, 2012 WL 2001957, at *1 (S.D.N.Y. June 1, 2012) (allowing for expedited discovery despite acknowledging that “the true infringer could just as easily be a third party who had access to the internet connection”); see also Malibu Media, LLC v. Doe, No. 15-CV-8252, 2016 U.S. Dist. LEXIS 92096, at *14 (D.N.J. July 14, 2016) (“Plaintiff would be unable to enforce its rights if any defendant could quash a subpoena based on the mere possibility that someone else had used the defendant subscriber’s IP address to perpetuate the alleged infringement.”); Malibu Media LLC v. Doe, No. 13-12178, 2013 WL 3945978, at *4 (E.D. Mich. July 31, 2013) (“While there is a possibility that a third party has somehow gained access to Defendant’s IP address, the more likely explanation is that it is Defendant who is distributing Plaintiff’s works.”). To that end, Patzer testified that, based on his analysis of “raw information,” including the Doe Defendant’s IP address, Transmission Control Protocol (“TCP”) port number, and software used to download and distribute Malibu Media’s copyrighted material, he was able to conclude that Malibu Media’s copyrighted content was not only disseminated from the same IP address, but also from the same computer. Id. at 57:17-58:3, 59:4-17, 60:4-12, 67:10-19; see also Tr. Ex. 3 (log of raw information). Although it is ultimately possible that someone other than the Doe Defendant distributed Malibu Media’s copyrighted content from this computer, Plaintiff’s evidence and allegations are sufficient at this stage to establish a prima facie claim for copyright infringement.4 To the extent that Defendant contends that a proxy server may have resulted in a misidentification of the Doe Defendant in this action, see Def.’s Supp. Br. at 3, Patzer testified that “there is nothing in [the] record and all of [his] data that indicates that a proxy server was involved here.” See Tr. 90:14-21. 4 20 Finally, relying on Malibu Media, LLC v. John Does 1-10, No. 12-CV-3623, 2012 WL 5382304, at *3 (C.D. Cal. June 27, 2012), Defendant argues that “Malibu conspicuously fails to present any evidence that John Doe either uploaded, downloaded, or even possessed a complete copyrighted video.”5 See Def.’s Mot. ¶ 29. To that end, at the evidentiary hearing, Patzer testified that, after connecting to a peer sharing Malibu Media’s copyrighted material, Excipio downloaded sixteen kilobytes of data to compare to Malibu Media’s original source content in order to “make sure that the content in the entirety is the same.” See Tr. 16:2-11, 39:4-8, 62:16-63:10. According to Defendant, “16 kilobytes, which is only two seconds of the video, are not enough to show copying of constituent elements of the work” because “[s]uch an infinitesimal portion cannot be said to contain any substantive content.” Def.’s Supp. Br. at 2. As an initial matter, Patzer testified that, although Exhibit B to the Complaint depicts “one individual exchange [of data] for each title” of Malibu Media’s copyrighted material, Excipio actually engaged in multiple data exchanges per title. See Tr. 61:15-25, 62:11-24. Therefore, Malibu Media’s evidence of infringement is not actually limited to a single sixteen-kilobyte clip. Id. at 25:11-26:7. Moreover, in John Does 1-10, the court actually allowed the plaintiff to serve a subpoena on the defendant’s ISP and “decline[d] to opine whether transmitting pieces of a copyrighted work using BitTorrent, without transmitting all of the pieces, Defendant also relies on Malibu Media, LLC v. Doe, 82 F. Supp. 3d 650 (E.D. Pa. 2015) in support of his argument that “16 kilobytes, which is only two seconds of the video, are not enough to show copying of constituent elements of the work . . . .” See Def.’s Supp. Br. at 2. However, Doe is distinguishable, as in that case, the Eastern District of Pennsylvania held that the plaintiff’s evidence was insufficient to warrant summary judgment on its claim for copyright infringement. 82 F. Supp. 3d at 351-52. 5 21 constitutes copyright infringement.” 2012 WL 5382304, at *3. Indeed, the Second Circuit has held that “a copyright infringement may occur by reason of a substantial similarity that involves only a small portion of each work.” Burroughs v. MetroGoldwyn-Mayer, Inc., 683 F.2d 610, 624 n.14 (2d Cir. 1982); see also Patrick Collins, 945 F. Supp. 2d at 377 (rejecting the argument that “transmitting only pieces of a copyrighted work, as opposed to transmitting all of the pieces, cannot constitute copyright infringement” and denying the defendant’s motion to dismiss). Accordingly, Plaintiff’s allegations are sufficient at this stage to state a plausible claim for copyright infringement against the Doe Defendant. Because Plaintiff has pled copyright infringement sufficient to establish a prima facie claim, this factor weighs in favor of denying Defendant’s motion to quash. ii. Whether Plaintiff’s Discovery Requests are Sufficiently Specific The second factor of the Sony Music standard requires that the discovery request is “sufficiently specific enough ‘to establish a reasonable likelihood that the discovery request would lead to identifying information that would make possible service upon the Defendant.” Malibu Media, LLC v. Doe, No. 15-CV-2624, 2015 WL 6116620, at *3 (S.D.N.Y. Oct. 16, 2015) (quoting Sony Music, 326 F. Supp. 2d at 566); see also John Does 1-11, 2013 WL 3732839, at *5 n.1 (S.D.N.Y. July 16, 2013) (“Discovery requests must be sufficiently specific to establish a reasonable likelihood that the discovery request would lead to identifying information that would make possible service upon particular defendants who could be sued in federal court.”) (internal quotation omitted); In re BitTorrent Adult Film Copyright Infringement 22 Cases, 296 F.R.D. at 93 (allowing for disclosure of names and addresses, but not email addresses or phone numbers). Here, the Verizon Subpoena is sufficiently specific to establish a reasonable likelihood that it will lead to information that will make service on the Doe Defendant possible. Pursuant to this Court’s July 29, 2015 Discovery Order, Malibu Media may only subpoena the John Doe defendant’s name and address. See Discovery Order at 11. Indeed, other courts have held that similar requests were sufficiently specific in denying motions to quash. See, e.g., John Doe Subscriber Assigned IP Address 24.90.139.137, 2016 WL 1651869, at *2 (observing that “the name and current and permanent address of the subscriber associated with the identified IP address” was “highly specific, and reasonably likely to lead to identifying information that would make possible service upon the Defendant”) (internal alterations omitted); Doe, 2015 WL 6116620, at *3 (holding that the same information was “sufficiently specific”); John Doe No. 4, 2012 WL 5987854, at *3 (holding that the plaintiff’s request for the defendant’s name, current and permanent address, e-mail address, and Media Access Control Address was “highly specific”). Because the Verizon Subpoena is sufficiently specific, this factor weighs in favor of denying Defendant’s motion to quash. iii. Whether Alternative Means Exist to Obtain the Information Plaintiff Seeks in the Verizon Subpoena Here, Plaintiff has established that it does not have alternative practical means of obtaining the Doe Defendant’s identity such that it can effect service. According to Malibu Media, prior to seeking leave to issue the Verizon Subpoena, it 23 “searched for Defendant’s IP address on various web search tools, . . . conducted its own research on its ability to identify Defendant by reviewing numerous sources of authority, . . . [and] discussed the issue at length with its computer forensics investigator . . . .” Pl.’s Opp’n at 16. These efforts are sufficient to establish that alternative means of learning Defendant’s identity do not exist. See, e.g., John Doe Subscriber Assigned IP Address 24.90.139.137, 2016 WL 1651869, at *2 (holding that the plaintiff had “no other practical means of obtaining the information to serve process on the Defendant” where the plaintiff had “no information about the Defendant’s identity other than the IP Address used to make the unauthorized copies”); Malibu Media, LLC v. Doe, No. 15 Civ. 4381, 2015 WL 4923114, at *1 (S.D.N.Y. Aug. 18, 2015) (“Plaintiff has no other means of learning Defendant’s name and address, and the ISP is statutorily prohibited from providing this information to Malibu Media absent a court order.”) (citing 47 U.S.C. § 551(c)); Digital Sin, Inc. v. Does 1-176, 279 F.R.D. 239, 241 (S.D.N.Y. 2012) (“Absent a Court-ordered subpoena, many of the ISPs, who qualify as ‘cable operators’ for purposes of 47 U.S.C. § 522(5), are effectively prohibited by 47 U.S.C. § 551(c) from disclosing the identities of the putative defendants to Plaintiff.”). Relying on Malibu Media, LLC v. Doe, No. 15 Civ. 1883, 2015 WL 1780965 (S.D.N.Y. Apr. 10, 2015), Defendant counters that “Plaintiff’s assertion that there is no alternative means of obtaining the desired information is inadequate.” Def.’s Mot. ¶ 30. However, unlike that case, in which the court denied the plaintiff’s motion for expedited discovery where its “submissions [were] devoid of any information 24 describing what, if any, alternative means the plaintiff attempted to use to obtain the defendant’s identity,” 2015 WL 1780965, at *2, here, as discussed above, Malibu Media made sufficient efforts to ascertain the Doe Defendant’s identity and contact information without a subpoena. See Pl.’s Opp’n at 16. Defendant further argues that “the Paige declaration that Judge Fox found deficient [in Doe] is identical to the Paige declaration submitted in support of the motion for this case.” Def.’s Mot. ¶ 31. However, in opposition to Defendant’s instant motion, Paige submitted a supplemental declaration and provided credible testimony at the April 20, 2016 evidentiary hearing. See Supplemental Declaration of Patrick Paige (“Paige Supp. Decl.”), DE [15]. In his Supplemental Declaration, Paige states that, based on his work experience, he knows “that the only entity able to correlate an IP address to a specific individual at a given date and time is the Internet Service Provider.” Id. at ¶ 15 (emphasis in original). According to Paige, “law enforcement and copyright holders must subpoena Internet Service Providers because without the information identifying the subscriber of the IP address, they are unable to otherwise identify an anonymous internet subscriber.” Id. at ¶ 14 (emphasis in original). To that end, Paige testified that “it is common knowledge in law enforcement as well as in the private sector” that, pursuant to a “congressional act,” an ISP will not “provide a civil litigant its subscriber’s information without a subpoena.” Tr. 103:12-23; see also 47 U.S.C. § 551(c)(1) (“Except as provided in paragraph (2), a cable operator shall not disclose personally identifiable information concerning any subscriber without the prior written or electronic consent of the subscriber concerned . . . .”). Paige’s 25 declarations and credible testimony are sufficient to establish that Plaintiff lacks alternative means to obtain the Doe Defendant’s identity. Because Plaintiff lacks alternative means of obtaining the information it seeks in the Verizon Subpoena, this factor weighs in favor of denying Defendant’s motion to quash. iv. Whether the Subpoenaed Information is Necessary to Advance Plaintiff’s Claims It is well-established that a defendant’s identity is critical in advancing a plaintiff’s claim. See Sony Music, 326 F. Supp. 2d at 566 (“Ascertaining the identities and residences of the Doe defendants is critical to plaintiffs’ ability to pursue litigation, for without this information, plaintiffs will be unable to serve process.”); see also John Doe Subscriber Assigned IP Address 24.90.139.137, 2016 WL 1651869, at *2 (“Without learning the Defendant’s identity and address, the Plaintiff will be unable to serve process and pursue its claim.”). Indeed, Defendant does not dispute that his identity is necessary for Malibu Media to effect service and proceed with its claims against him. Because Defendant’s identity is necessary to advance Plaintiff’s claims, this factor weighs in favor of denying Defendant’s motion to quash. v. Whether Defendant has an Expectation of Privacy Courts in the Second Circuit “have held that ISP subscribers have a minimal expectation of privacy in the sharing of copyrighted material.” John Does 1-11, 2013 WL 3732839, at *6 (citing Arista Records LLC, 603 F.3d at 118). To that end, courts have observed that, although defendants in similar actions “have privacy interests due to the nature of the subject infringement, those interests do not ‘give way to 26 plaintiff[’s] right to use the judicial process to pursue what appear to be meritorious copyright infringement claims.’” Next Phase Distribution, Inc. v. Does 1-138, No. 11 Civ. 9706, 2012 WL 691830, at *3 (S.D.N.Y. Mar. 1, 2012) (quoting Sony Music, 326 F. Supp. 2d at 566); see also Arista Records LLC, 604 F.3d at 124 (“[W]e regard Doe 3’s expectation of privacy for sharing copyrighted music through an online filesharing network as simply insufficient to permit him to avoid having to defend against a claim of copyright infringement.”); Rotten Records, Inc. v. Doe, 107 F. Supp. 3d 257, 259 (W.D.N.Y. 2015) (“Plaintiff’s interest in learning Defendant’s name and address outweighs Defendant’s privacy interest.”). Because Defendant’s privacy interest is “minimal,” and is outweighed by Plaintiff’s interest in obtaining the discovery it seeks, see John Does 1-11, 2013 WL 3732839, at *6, this factor weighs in favor of denying Defendant’s motion to quash. Accordingly, because all of the relevant factors weigh in favor of Malibu Media, Defendant’s motion to quash is denied. C. Motion for Protective Order Finally, relying on Fed. R. Civ. P. 26, Defendant argues that “[g]ood cause exists for a protective order to prevent the disclosure of Defendant’s identifying information because the disclosure of such information would subject Defendant to the annoyance, embarrassment, oppression, and undue burden and expense of being subject to Plaintiff’s attempt to try to extract a settlement out of Defendant.” Def.’s Mot. ¶¶ 55, 56. However, for the reasons set forth herein, both in adhering to the Court’s original decision upon reconsideration, and in denying Defendant’s motion to 27 quash, as well as for the reasons discussed in the Court’s July 29, 2015 Discovery Order, the Court concludes that good cause does not exist to issue the protective order that Defendant seeks in the instant motion. See John Wiley & Sons, Inc., 284 F.R.D. at 192 (declining to issue a protective order where each of the factors in the balancing analysis weighed in favor of denying the defendant’s motion to quash). Therefore, Defendant’s motion for a “protective order to prevent the disclosure of [his] identifying information” is denied. III. CONCLUSION For the reasons set forth herein, Defendant’s: (i) motion for reconsideration is granted, but upon reconsideration, the Court adheres to its original decision contained in the July 29, 2015 Discovery Order; (ii) motion to quash is denied; and (iii) motion for a protective order is denied. Consistent with the Court’s Discovery Order, and on Plaintiff’s consent, see Pl.’s Opp’n at 21-22, Defendant may litigate this action anonymously through the close of discovery. See Discovery Order at 12; see also John Doe No. 4, 2012 WL 5987854, at *4-5 (denying motion to quash, but allowing the defendant to proceed anonymously). An Order lifting the stay of this Court’s July 29, 2015 Discovery Order will be filed separately in this action, and in all other actions in which a stay of the Discovery Order was imposed. Dated: Central Islip, New York August 23, 2016 SO ORDERED /s/ Steven I. Locke STEVEN I. LOCKE United States Magistrate Judge 28

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.