From Casetext: Smarter Legal Research

Malibu Media, LLC v. Doe

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FT. MYERS DIVISION
Aug 15, 2012
Case No. 2:12-cv-178-FtM-99DNF (M.D. Fla. Aug. 15, 2012)

Opinion

Case No. 2:12-cv-178-FtM-99DNF

08-15-2012

MALIBU MEDIA, LLC, Plaintiff, v. JOHN DOES 1-35, Defendant.


REPORT AND RECOMMENDATION

TO THE UNITED STATES DISTRICT COURT

This Cause is before the Court on the following motions:

1) John Doe #4's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 11) filed on May 8, 2012;

2) John Doe #2's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 12) filed on May 8, 2012;

3) John Doe #17's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 18) filed on May 17, 2012;

4) John Doe #11's Motion to Quash Subpoena, or in the Alternative, Motion for Protective Order, Motion to Dismiss or Sever Defendants for Improper Joinder, Motion to Dismiss for Failing to State a Cause of Action; Non-Cumulative Joint and Several Liability; Mixed Law and Equity (Doc. 19) filed on May 21, 2012;

5) John Doe #21's Motion to Quash Subpoena, or in the Alternative, Motion for Protective Order, Motion to Dismiss or Sever Defendants for Improper Joinder, Motion to Dismiss for Failing to State a Cause of Action; Non-Cumulative Joint and Several Liability; Mixed Law and Equity (Doc. 24) filed on May 25, 2012;

6) John Doe #26's Motion to Sever, Dismiss, or Issue Protective Order (Doc. 28) filed on May 30, 2012; and,

7) John Doe #28's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 29) filed on May 30, 2012.

The Plaintiff, Malibu Media, LLC filed the following in response to the pending motions:

1) Memorandum in Opposition to John Doe 4's Motion to Dismiss/Sever and for a Protective Order and/or Quash Subpoena (Doc. 21) on May 22, 2012;

2) Memorandum in Opposition to John Doe 2's Motion to Dismiss/Sever and for a Protective Order and/or Quash Subpoena (Doc. 22) on May 22, 2012;

3) Memorandum in Opposition to John Doe 17's Motion to Dismiss/Sever and for a Protective Order and/or Quash Subpoena (Doc. 23) on May 22, 2012;

4) Memorandum in Opposition to John Doe 11's Motion to Quash Subpoena, or in the Alternative, Motion for Protective Order, Motion to Dismiss or Sever Defendants for Improper Joinder, Motion to Dismiss for Failing to State a Cause of Action; Non-Cumulative Joint and Several Liability; Mixed Law and Equity (Doc. 30) filed on June 4, 2012 ;

5) Memorandum in Opposition to John Doe 21's Motion to Quash Subpoena, or in the Alternative, Motion for Protective Order, Motion to Dismiss or Sever Defendants for Improper Joinder, Motion to Dismiss for Failing to State a Cause of Action; Non-Cumulative Joint and Several Liability; Mixed Law and Equity (Doc. 31) filed on June 8, 2012;

6) Memorandum in Opposition to John Doe 28's Motion to Dismiss/Sever and for a Protective Order and/or Quash Subpoena (Doc. 33) on June 13, 2012; and,

7) Memorandum in Opposition to John Doe 26's Motion to Dismiss/Sever and for a Protective Order and/or Quash Subpoena (Doc. 36) on June 13, 2012.

These matters were referred to this Court. Many of the arguments raised by each Doe Defendant were raised by other Doe Defendants as well. The Court will address all of the arguments raised by the Doe Defendants even if not raised by each and every Doe Defendant.

I. Background

On March 28, 2012, the Plaintiff filed a Complaint for Copyright Infringement (Doc. 1) against thirty-five (35) John Doe Defendants (hereinafter "Defendants" or "Doe Defendants") alleging direct copyright infringement in violation of 17 U.S.C. ¶¶106 and 501; and contributory copyright infringement. (Com. ¶2).

"Com." refers to the Complaint (Doc. 1).

The Plaintiff alleges that the acts of copyright infringement occurred using Internet Protocol ("IP") addresses, and each IP address was traced to a physical address located within the Middle District of Florida. (Com. ¶4). The Plaintiff claims that each Defendant committed the tortious conduct set forth in the Complaint in the Middle District of Florida, and that each Defendant resides in the Middle District of Florida, or has engaged in continued and systematic business activity in the Middle District of Florida. (Com. ¶4). The Plaintiff contends that each Defendant was properly joined because each of the Defendants is jointly and severally liable for the infringing activities and each of the Defendants' activities was part of a series of transactions involving the same torrent file which contained pieces of Plaintiff's copyrighted work, and the infringing activity occurred when the Defendants acted in concert with each other. (Com. ¶10).

The Plaintiff is the owner of United States Copyright Registration Number PA0001762412 for the motion picture entitled "Veronica Wet Orgasm" (the "Work"). (Com. ¶11). The Work was registered on November 23, 2011. (Com. ¶12). The Plaintiff alleges that each Defendant installed a Bit Torrent Client into his or her computer. (Com. ¶16). The Plaintiff defines a "BitTorrent" as "one of the most common peer-to-peer file sharing protocols (in other words, set of computer rules) used for distributing large amounts of data." (Com. ¶14). The BitTorrent protocol allows a large file to be distributed "without creating a heavy load on the source computer and network." (Com. ¶15). "[R]ather than downloading a file from a single source computer (one computer directly connected to another), the BitTorrent protocol allows users to join a 'swarm' of host computers to download and upload from each other simultaneously (one computer connected to numerous computers)." (Com. ¶15). The Plaintiff explains that once the BitTorrent protocol is installed (and these software programs can be downloaded from the internet), the BitTorrent "'Client' serves as the user's interface during the process of uploading and downloading data using the BitTorrent protocol." (Com. ¶18).

The Plaintiff asserts that the Defendants uploaded a new file known as an "initial seeder" and started by creating a "torrent" descripter using the Client he or she installed. (Com. ¶19). The Client "takes the target computer file, the 'initial seed,' here the copyrighted Work, and divides it into identically sized groups of bits known as 'pieces.'" (Com. ¶20). The Client then gives each one of the computer file's pieces (in this case the copyrighted Work) a random and unique alphanumeric identifier known as a "hash" and records these hash identifiers. (Com. ¶21). When another peer receives a piece, the hash identifiers are compared to test that they are error-free. (Com. ¶22). "In this way, the hash identifier works like an electronic fingerprint to identify the source and origin of the piece and that the piece is authentic and uncorrupted." (Com. ¶22).

The Torrent files have an "announce" section which specifies a URL (Uniform Resource Locator) of a "tracker". (Com. ¶23). The "tracker" is a computer or set of computers that a torrent file specifies and the torrent file then provides peers with the URL. (Com. ¶24). The tracker computer or computers direct a peer user's computer to other peer users' computers that have a particular piece of the file. (Com. ¶25). Torrent sites are websites that index torrent files that are available for copying and distribution through a BitTorrent protocol. (Com. ¶27). The Plaintiff alleges that each Defendant went to a torrent site and uploaded or downloaded the Work. (Com. ¶28). Once the initial seeder creates a torrent and uploads it to one or more torrent sites, then other peers can upload or download the computer file, in this case the Work using the BitTorrent protocol and Bit Torrent Client. (Com. ¶29). The BitTorrent protocol causes the initial seed's computer to send pieces of the file to peers seeking to download it. (Com. ¶30). Once a peer receives a piece of the file (here the Work), then it starts transmitting that piece to other peers. (Com. ¶31). All of the peers and seeders working together are called a "swarm." (Com. ¶32).

In this case, the Plaintiff alleges that each Defendant was a peer member in the same swarm and directly communicated with other members of the swarm through their computers uploading and downloading transmissions. (Com. ¶33). Once the peer receives all of the pieces of the file, the BitTorrent Client reassembles the pieces and the peer is able to view the Work. (Com. ¶35). Once a peer has downloaded the entire file, the peer becomes an "additional seed" because the peer continues to distribute the torrent file. (Com. ¶35).

The Plaintiff hired IPP, Limited to determine the IP addresses of the people using the BitTorrent protocol to reproduce, distribute, display or perform the Work. (Com. ¶36). IPP, Limited located the IP addresses associated with the peer-to-peer network, determined the unique hash value, and from this information the Plaintiff determined the IP addresses of the Defendants who allegedly participated in the infringement of the copyrighted work. (Com. ¶38-39). The Plaintiff learned that each of the Defendants' computers identified by their IP addresses were located in this District and transmitted a full copy or portion thereof of the digital media identified by the unique hash number. (Com. ¶40). IPP Limited also analyzed each BitTorrent piece distributed and verified that each IP address re-assembled the pieces using a BitTorrent Client. (Com. ¶41). In Count I, the Plaintiff alleges Direct Infringement against the Defendants, and in Count II the Plaintiff alleges Contributory Infringement against the Defendants.

The Plaintiff filed its Motion for Leave to Serve Third Party Subpoenas Prior to a Rule 26(f) Conference (Doc. 5) on April 4, 2012, requesting that the Court allow it to serve subpoenas on ISPs to obtain the names, addresses, telephone numbers, e-mail addresses, and Media Access Control Addresses for the Doe Defendants. The Court entered an Order (Doc. 6) on April 6, 2012 allowing the subpoenas to be served.

II. Analysis

The Defendants are requesting that the Court quash the subpoenas, enter a protective order, sever the Defendants or find that the Defendants were misjoined, and dismiss this action. The Plaintiff argues that the subpoenas should not be quashed, the Defendants fail to show good cause to obtain a protective order, and that the Defendants are properly joined.

A. Quash Subpoenas

The Doe Defendants are requesting that the Court quash the subpoenas issued to the ISPs in this case. The Doe Defendants argue that the information the subpoenas will provide is the identity of the individual that is the account owner for a certain IP address but will not lead to the actual person who illegally downloaded the Work. John Doe 26 argues that a motion to quash is properly filed in this District, and the information sought should be quashed.

Rule 45 governs a motion to quash a subpoena and provides that, "[o]n a timely motion, the issuing court" must or may quash or modify a subpoena that falls withing certain parameters. FED. R. CIV. P. 45(c)(3)(A) and (B) (emphasis added). In the instant case, the issuing courts were the Northern District of Texas for the Verizon Internet Services ("Verizon") and the District of New Jersey for the Comcast Corporation ("Comcast"). (See, Docs. 11-1, 12-1, 18-1, 19-2, 24-2, 28, p. 10, and 29-1). The Middle District of Florida was not the issuing court for these subpoenas. Neither Verizon nor Comcast are subject to this Court's jurisdiction. See, Howard v. Hartford Life and Acc. Ins. Co., 2011 WL 2533800, *8 (M.D. Fla. June 27, 2011). These subpoenas were issued to Verizon and Comcast where their authorized agents are located, and the Court lacks authority to quash the subpoenas pursuant to Rule 45. See, AF Holding, LLC v. Does 1-162, 2012 WL 488217, * 3 (S.D. Fla. Feb. 14, 2012), and Boy Racer, Inc. v. John Does 1-34, 2012 WL 1535703, *3 (S.D. Fla. May 1, 2012) (citations omitted). Therefore, the Court recommends that the motions to quash be denied.

B. Protective Order

The Defendants assert that the Court should issue a protective order limiting the disclosure of the Doe Defendants' personal identifying information also arguing that the personal identifying information is not relevant to the issue of the individual who actually downloaded the Work illegally. The subpoenas requested that Comcast and Verizon provide the name, address, and telephone number of the John Does associated with certain IP Addresses. The Plaintiff responds that the Defendants failed to state with specificity what type of protective order they are seeking, and a protective order is not warranted.

Pursuant to Fed. R. Civ. P. 26, a court is permitted to issue a protective order to "protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense." FED. R. CIV. P. 26(c). A party does not have standing to object to a non-party subpoena on the basis that it is burdensome, oppressive or is overly broad. Klima v. Carnival Corp., 2009 WL 1066969, *2 (S.D. Fla. April 21, 2009) (citations omitted).

The Defendants argue that even though the subpoenas were not issued to them they have standing to contest the subpoenas because the information sought is not relevant. A party may request a protective order for a subpoena to a non-party if the subpoena seeks materials that are not relevant. Nathai v. Florida Detroit Diesel-Allison, Inc., 2009 WL 2424570, *1 (M.D. Fla. Aug. 5, 2009) (citing Auto-Owners Ins. Co. v. Southeast Floating Docks, Inc., 231 F.R.D. 426, 429 (M.D. Fla. 2005)). The burden is on the party seeking a protective order and the party must show good cause. Id. (citations omitted).

Pursuant to Fed.R.Civ.P. 26(b)(1),

Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party's claim or defense of any party - including the existence, description, nature,
custody, condition, and location of any documents or other tangible things and the identity and location of persons who know of any discoverable matter. For good cause, the court may order discovery of any matter relevant to the subject matter involved in the action. Relevant information need not be admissible at the trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence.
The purpose of discovery is to require disclosure of relevant information so that the resolution of the civil action is based upon a full and accurate understanding of the facts. Anglin v. Maxim Healthcare Services, Inc. , 2009 WL 928305, *2 (M.D. Fla. April 2, 2009) (citing United States v. Proctor & Gamble Co., 356 U.S. 677, 682 (1958)). When the discovery requested appears relevant on its face, then the party objecting to the discovery based upon relevance has the burden to show the requested discovery is not relevant. Unlimited Resources, Inc. v. Deployed Resources, LLC, 2009 WL 212188 at 3 (M.D. Fla. Jan. 29, 2009). The scope of discovery is broad, however, the information must be relevant to a claim or defense, but need not be admissible at trial. Anglin, 2009 WL 928305 at *2(citations omitted).

The Defendants have failed to show that the information sought is not relevant or reasonably calculated to lead to the discovery of admissible evidence. The Plaintiff has no other way to discover the identities of the putuative Defendants other than by serving subpoenas on Comcast and Verizon, the ISPs. This information is essential to the prosecution of this litigation and is reasonably calculated to lead to the identities of the alleged infringers. Therefore, the Court is persuaded that the information is relevant in this case.

The Defendants assert that the information requested is personal or private to them and should not be disclosed. The Defendants also argue that specifically the telephone numbers of the Doe Defendants should not be disclosed as this information will be used by the Plaintiff to attempt to force a settlement on each Defendant. Further, some of the Doe Defendants argue that the release of their names which will be associated with pornography is embarrassing. A party does have standing to challenge a subpoena when the subpoena requests documents in which the party has a "personal right or privilege." Klima v. Carnival Corp., 2009 WL 1066969, *2 (S.D. Fla. April 21, 2009) (citations omitted). The information that the Plaintiff is seeking was freely provided to Verizon and Comcast and "[a]s courts have routinely held, 'Internet subscribers do not have a reasonable expectation of privacy in subscriber information they have already conveyed to their [Internet Service Providers].'" AF Holdings, LLC v. Does 1-162, 2012 WL 488217, *4 (S.D. Fla. Feb. 14, 2012) (quoting Doe v. S.E.C., 2011 WL 4593181, at *3 (N.D. Cal. Oct. 4, 2011)) (remaining citations omitted)). "'Additionally, an individual has no protected privacy interest in their name, address, phone number, e-mail address, or Media Access Control address when there is an allegation of copyright infringement.'" Id. (quoting First Time Videos, LLC v. Does 1-18, 2011 WL 4079177 at *1 (S.D. Ind. Sep. 13, 2011)). The Defendants' need to protect their names, addresses and telephone numbers is outweighed by the Plaintiff's need to obtain the information to prosecute this case. Id. at *4. The Court does not find merit in the Defendants' argument concerning embarrassment or a possible fishing expedition by the Plaintiff. Other courts have held that the potential embarrassment that the Defendants may face if their names are released and associated with this type of case is not grounds to allow them to proceed anonymously. Id. (citations omitted). Therefore, the Court finds that the Defendants have not met their burden to show standing for the Court to issue a protective order. The Court recommends that the motions for protective order be denied.

John Doe #26 raises the argument that the Plaintiff relied on a private investigator who was not licensed in the State of Florida to obtain the information concerning the IP addresses in this case. The Plaintiff requests that the Court "take note" and it is so noted. (See, Doc. 28, p. 16). John Does 11 and 21 argue that "International IPTracker V.1.2.1 Software" does not meet the Daubert standard. (See, Docs. 19 and 24, p. 5). The Court is unsure as to the basis for the request, but the Court has no authority to quash the subpoena, and this argument is not a basis for the Court to enter a protective order. John Does 11 and 21 also assert that the Plaintiff failed to show good cause for early discovery. (See, Docs. 19 and 24, p. 7) The Court allowed the subpoenas to be served, and finds no reason to reconsider that determination. (See, Doc. 6, Order entered on April 6, 2012).
--------

The Court is mindful of the Doe Defendants concerns that there is a possibility that some of the Doe Defendants are innocent customers and their IP addresses or wireless network may have been used by others to download the Work. The Court reviewed the Order (Doc. 25) entered on July 6, 2012 in Malibu Media, LLC v. John Does 1-9, Case No. 8:12-cv-699-T-23AEP by the Honorable Anthony E. Porcelli, United States Magistrate Judge concerning the same Plaintiff as in the instant case. Judge Porcelli noted that FED. R. CIV. P. 11. provides for procedural safeguards to ensure that the Plaintiff proceeds in good faith. (See, Order, Doc. 25, p.7). In that case, the Plaintiff "was amendable to keeping the names of the John Doe Defendants confidential in an effort to engage in good-faith discussions prior to identifying a John Doe Defendant as a named defendant in the lawsuit." (Doc. 25, p. 7-8, in Case No. 8:12-cv-699-T-AEP). The Court recommends that the Plaintiff follow this procedure in this case as well.

C. Sever and Dismiss

The Defendants raise the issues of sever or misjoinder and various bases to dismiss the Complaint. The Doe Defendants have not been served with process. These arguments are premature. After the Doe Defendants have been served, they may raise these issues. See, AF Holdings, LLC v. Does 1-162, 2012 WL 488217, *4 (S.D. Fla. Feb. 14, 2012). Therefore, the Court recommends that the motions to sever, for misjoinder and to dismiss be denied as premature.

III. Conclusion

The Court respectfully recommends:

1) John Doe #4's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 11) be DENIED.

2) John Doe #2's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 12) be DENIED.

3) John Doe #17's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 18) be DENIED.

4) John Doe #11's Motion to Quash Subpoena, or in the Alternative, Motion for Protective Order, Motion to Dismiss or Sever Defendants for Improper Joinder, Motion to Dismiss for Failing to State a Cause of Action; Non-Cumulative Joint and Several Liability; Mixed Law and Equity (Doc. 19) be DENIED.

5) ) John Doe #21's Motion to Quash Subpoena, or in the Alternative, Motion for Protective Order, Motion to Dismiss or Sever Defendants for Improper Joinder, Motion to Dismiss for Failing to State a Cause of Action; Non-Cumulative Joint and Several Liability; Mixed Law and Equity (Doc. 24) be DENIED.

6) John Doe #26's Motion to Sever, Dismiss, or Issue Protective Order (Doc. 28) be DENIED.

7) John Doe #28's Motion to Dismiss/Sever and for a Protective Order and/or to Quash Subpoena (Doc. 29) be DENIED.

8) Plaintiff be required to notify the Doe Defendant, or his or her counsel if represented, of Plaintiff's intent to name and serve the Doe Defendant at least fourteen (14) days prior to seeking issuance of a summons from the Clerk for the identified Doe Defendant.

Failure to file written objections to the proposed findings and recommendations contained in this report within fourteen (14) days from the date of its filing shall bar an aggrieved party from attacking the factual findings on appeal.

Respectfully recommended in Chambers in Ft. Myers, Florida this 15th day of August, 2012.

________________________

DOUGLAS N. FRAZIER

UNITED STATES MAGISTRATE JUDGE
Copies: All Parties of Record


Summaries of

Malibu Media, LLC v. Doe

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FT. MYERS DIVISION
Aug 15, 2012
Case No. 2:12-cv-178-FtM-99DNF (M.D. Fla. Aug. 15, 2012)
Case details for

Malibu Media, LLC v. Doe

Case Details

Full title:MALIBU MEDIA, LLC, Plaintiff, v. JOHN DOES 1-35, Defendant.

Court:UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FT. MYERS DIVISION

Date published: Aug 15, 2012

Citations

Case No. 2:12-cv-178-FtM-99DNF (M.D. Fla. Aug. 15, 2012)

Citing Cases

Belcher v. a & M Bus. Props., Inc.

When a discovery request appears relevant on its face, as it does in this case, the objecting party has the…