Summary
finding that because the accessed files were located in a shared folder on a P2P network, "[n]o authorization was needed since the files accessed were accessible to the general public"
Summary of this case from LabMD, Inc. v. Tiversa Holding Corp.Opinion
CIVIL NO. 07-CV-4702.
February 23, 2009
MEMORANDUM OPINION AND ORDER
Before the Court is Plaintiffs' Motion to Dismiss Defendant's Counterclaims. In their Amended Complaint, Plaintiffs Motown Record Company, L.P., UMG Recordings, Inc., Zomba Recording LLC, SONY BMG Music Entertainment, and Elektra Entertainment Group, Inc. (collectively "Plaintiffs") allege infringement of various copyrights and exclusive rights under 17 U.S.C. § 505 against Defendant John Kovalcik ("Defendant"). Defendant has asserted six counterclaims against Plaintiffs including Trespass to Chattels; Computer Fraud and Abuse under 18 U.S.C. § 1030; Abuse of Process; Defamation of Character; Declaratory Judgment; and Civil Conspiracy. Plaintiffs seek the dismissal of each of Defendant's Counterclaims. For the reasons listed below, the Court will grant Plaintiffs' Motion to Dismiss.
I. FACTUAL AND PROCEDURAL BACKGROUND
Plaintiffs are each copyright owners or licensees of exclusive rights under United States law with respect to certain copyrighted sound recordings. Among the rights held by Plaintiffs are the exclusive rights to reproduce and distribute to the public recordings for which they hold a valid certificate of Copyright Registration.
Am. Compl. ¶ 11.
Am. Compl. ¶ 12.
Peer-to-peer ("P2P") file copying networks allow individual internet users to unlawfully distribute copyrighted sound recordings. P2P online distribution systems enable internet users to search for files stored on other users' computers and transfer exact copies of those recordings from one computer to another via the internet. Users of P2P networks are identifiable via the Internet Protocol ("IP") address unique to each computer and accessible during the transfer of a file from one computer to another. On November 8, 2007, Plaintiffs filed what is known as a "John Doe" Complaint for copyright infringement, stating that they had identified an IP address over which illegal file sharing was taking place, but had not yet identified the individual associated with that IP address. On the same date the Court granted Plaintiffs' Standing Order for Discovery specifically requesting permission to serve subpoenas to those entities capable of matching specific IP addresses to the individuals and their computers.
Am. Compl. ¶ 13.
See "John Doe" Compl. [Doc. No 1].
See Second Amended Standing Order for Immediate Discovery [Doc. No. 2].
One of the entities served a subpoena was the University of Pennsylvania, where Defendant is enrolled as a student. Via his IP address, on June 21, 2007 Plaintiffs believe that they were able to identify Defendant as having used a P2P network to download and distribute sound recordings for which they hold the copyright. Plaintiffs believe and allege that Defendant's continuous and ongoing acts of downloading and distributing copyrighted materials is ongoing.
Am. Compl. ¶¶ 14, 15.
Because Defendant was on notice that the sound recordings were copyrighted materials by virtue of the notices of copyright that appear on the widely available published copies of each sound recording, Plaintiffs allege that Defendant committed willful and intentional copyright infringement and are therefore entitled to statutory damages pursuant to 17 U.S.C. § 504(c). Moreover, Plaintiffs seek injunctive relief under 17 U.S.C. §§ 502 and 503 as well as attorneys fees and costs pursuant to 17 U.S.C. § 505.
Am. Compl. ¶¶ 18, 19.
Defendant submitted an Amended Answer containing general denials, affirmative defenses and six counterclaims. Defendant contends that he is in the Eastern District of Pennsylvania during the school year, but maintains a permanent residence in Massachusetts. Defendant alleges that Plaintiffs, who did not write or record the songs in question, have not demonstrated copyright ownership or registration. Claiming that the record companies such as Plaintiffs have been abusing the federal court system, Defendant alleges that they use unlicensed investigators to illegally invade personal computers and obtain IP addresses. Defendant further alleges that Plaintiffs routinely target university students with so-called "John Doe" lawsuits filed for the sole purpose of activating the discovery powers of the court system to match unnamed individuals with known IP addresses. According to Defendant, once Plaintiffs have matched individuals to IP addresses, they then provide those names to a "Settlement Support Center," whose sole purpose is to contact prospective defendants and threaten them with a federal lawsuit in order to extract a settlement payment.
Answer, Facts Common to Counterclaims ¶ 2.
Answer ¶ 4.
Answer ¶ 5.
Answer ¶ 6.
Answer ¶ 8.
Defendant argues that in order to enhance their leverage to acquire settlement agreements, Plaintiffs file a number of federal suits, such as the one brought against Defendant, as an intimidation tactic that creates a concerted pattern of "sham litigation. Plaintiffs' true intent is not to obtain legal relief, claims Defendant, but to "intimidate, harass, and oppress the Defendant and other users of computer networks" using the same boilerplate complaint against tens of thousands of defendants. Furthermore, Defendant argues that he was not physically in Pennsylvania at the time the alleged illegal transfer of music took place and Plaintiffs have not observed any specific instance of Defendant illegally downloading files. According to Defendant he has never configured any computer to publicly share files and that Plaintiffs never obtained permission to gather information from his computer. Based on the foregoing facts Defendant alleges six counterclaims against Plaintiffs including Trespass to Chattels; Computer Fraud and Abuse under 18 U.S.C. § 1030; Abuse of Process; Defamation of Character; Declaratory Judgment; and Civil Conspiracy.
Answer ¶¶ 9-10.
Answer ¶¶ 12-13.
Answer at ¶¶ 17-18.
Answer at ¶¶ 19-20.
Plaintiffs have filed a Motion for Leave to File a Response to Defendant's Reply to the Motion to Dismiss Counterclaims. In turn, Defendant filed a Motion in Opposition, citing Plaintiffs' failure to comply with the Court's rules and procedures. Plaintiffs' Motion for Leave to File a Reply is denied as untimely. Plaintiffs did not file the required Motion for Leave to File a Reply and the attached Reply until August 20, 2008, 41 days after Defendant's Response was filed. The Court requires that parties wishing to file a Reply file a Motion for Leave to File with the Reply attached within ten (10) days of the memoranda to which the Reply responds. Plaintiffs argue that they were unaware that any such rule existed. The Eastern District of Pennsylvania's Federal Practice Rules Annotated, which includes the policies and procedures of each judge, is readily available both in print and via the District's Web site. Parties who come before the Court are obliged to be aware of and follow such rules. As rightly pointed out in Defendant's Objections to the Motion for Leave to File, Plaintiff failed to avail themselves of and follow the Court's procedures and the Motion for Leave to File is denied.
II. LEGAL STANDARD
A. Legal Standard for Rule 12(b)(6) Motion to Dismiss
When considering a motion to dismiss pursuant to Federal Rule of Civil Procedure 12(b)(6), a court must accept as true all allegations in the complaint and all reasonable inferences that can be drawn therefrom, and view them in the light most favorable to the plaintiff. The United States Supreme Court has recently clarified this standard of review, explaining that "[a] plaintiff's obligation to provide the grounds of his entitlement to relief requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do" without the allegation of sufficient facts in support. In order to survive a motion to dismiss, a plaintiff must allege facts that "raise a right to relief above the speculative level, on the assumption that all the allegations in the complaint are true (even if doubtful in fact)." A court may grant a 12(b)(6) motion only "if it appears to a certainty that no relief could be granted under any set of facts which could be proved."
Rocks v. City of Philadelphia, 868 F.2d 644, 645 (3d Cir. 1989).
Bell Atl. Corp. v. Twombly, 127 S. Ct. 1955, 1965 (2007).
Id..
D.P. Enter. Inc. v. Bucks County Cmty. Coll., 725 F.2d 943, 944 (3d Cir. 1984).
III. DISCUSSION
A. TRESPASS TO CHATTELS (COUNT I)
Defendant alleges that Plaintiffs "intentionally and without authorization, intruded into a personal computer to obtain information," depriving Defendant of the use and possession of his computer. In determining whether a tort committed in the Commonwealth of Pennsylvania such as trespass to chattel has occurred the Court is bound by the state's definition of that tort. "A trespass to a chattel may be committed by intentionally (a) dispossessing another of the chattel; or (b) using or intermeddling with chattel in the possession of another. Essentially, the elements required for trespass to chattel are the same elements required for copyright infringement in a file sharing context. To this end, a court of this district has spoken directly to the question of whether conversion and trespass to chattel are viable claims against a copyright infringement action. "The tests for these claims require nothing more than what is required under copyright law to establish infringement." The court goes on to state, "These claims are preempted under 17 U.S.C, § 301(a)." The Court agrees that the elements required for a claim of trespass to chattel are indeed the same elements required to establish copyright infringement of music files shared over computers, and therefore is allowed by the federal statute in situations such as the current context. A claim of trespass to chattel is preempted by federal statute and therefore Count I of Defendant's Counterclaims will be dismissed. B. COMPUTER FRAUD AND ABUSE ( 18 U.S.C. 1030) (COUNT II)
Answer, Counterclaims, ¶¶ 25, 26.
Pestco v. Associated Products, Inc., 880 A.2d 700 (Pa Super Ct.) (citing Restatement of 2d Torts § 217).
Healthcare Advocates Inc. v. Harding, Earley, Follmer, Frailey, 497 F. Supp. 2d 627, 650 (E.D. Pa. 2007)
Id. 17 U.S.C. § 301(a) states that "all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come with the subject matter of copyright as specified by sections 102 and 103. . . . are governed exclusively by this title. Thereafter, no person is entitled to any such right or equivalent right in any such work under the common law or statutes of any State."
See also Dun Bradstreet Software Servs. v. Grace Consulting., Inc., 307 F.3d 197, 217 (3d Cir. 2002).
In his second counterclaim, Defendant asserts that as an "investigative precursor to their sham litigation" Plaintiffs accessed Defendant's computer system without authorization and obtained information from that computer system in violation of Defendant's rights. Defendant alleges that such accessing of a computer without authorization is in violation of 18 U.S.C. § 1030, the Computer Fraud and Abuse Act ("CFAA") because Plaintiffs intended to defraud Defendant and have caused damages in an amount exceeding $5,000.
See Answer, Counterclaims, ¶ 30.
Id. at ¶¶ 31-32.
The Third Circuit has determined that a claim under 18 U.S.C. § 1030(a)(4) has four elements: "(1) a defendant has accessed a `protected computer;' (2) has done so without authorization or by exceeding such authorization as was granted; (3) has done so `knowingly' and `with intent to defraud; and (4) as a result has furthered the intended fraud and obtained anything of value." In the instant case Defendant's Counterclaim has done little more than reiterate the language of the statute. Under the standard set forth by the Supreme Court in Twombly that pleadings require more than "labels and conclusions, and a formulaic recitation of the elements," Defendant has not properly plead the elements of his counterclaim.
Defendant does not identify the specific section of the Computer Fraud and Abuse Act that Plaintiffs have allegedly violated. However, the Court has determined that § 1030(a)(4) is the most applicable to the facts of this case.
P.C. Yonkers Inc. v. Celebrations the Party and Seasonal Superstore, LLC, 428 F.3d 504, 508 (3d Cir. 2005).
Bell Atl. Corp. v. Twombly, 550 U.S. 544 (2007).
Defendant fails to allege or support with any facts that his computer was "protected" in any way. Regardless, because Defendant was using the program Limewire on the computer in question and because the files Plaintiff allegedly accessed were contained in the "share" folder, any allegation that the computer should be considered private or "protected," would be tenuous as best. The fact that the accessed files were in the share folder negates the second element under the statute that Plaintiffs acted without authorization or exceeded the authorization given to them. No authorization was needed since the files accessed were accessible to the general public. No files other than those contained in Defendant's "share" file are relevant to Defendant's Counterclaims. Defendant does make sufficient allegations as to the third factor of whether Plaintiffs "knowingly" accessed Defendant's computer with an intent to defraud specifically claiming that access to the files were sought as part of a larger extortion scheme; however, merely alleging one of four statutory elements is not enough. With regard to the fourth factor, that the computer invasion must have yielded something of value, Defendant offers no facts or allegations of specific damages of any value, nor anything that totals an amount exceeding $5,000.
18 U.S.C. 1030(e)(8)(A) defines damages as losses over a one year period "aggregating at least $5,000 in value." Defendant offers no specific damages or reasons as to how he arrived at a total amount of damages relating to the alleged fraud exceeding the $5,000 requirement.
18 U.S.C. 1030(e)(8)(A) defines damages as losses over a one year period "aggregating at least $5,000 in value." Defendant offers no specific damages or reasons as to how he arrived at a total amount of damages relating to the alleged fraud exceeding the $5,000 requirement.
Defendant's Counterclaim for Computer Fraud and Abuse under the CFAA has failed to state a claim upon which relief can be granted and therefore will be dismissed.
C. ABUSE OF PROCESS (COUNT III) NOERR-PENNINGTON DOCTRINE
Defendant lodges a counterclaim of abuse of process against Plaintiffs. He grounds his allegation of abuse of process on the contention that Plaintiffs knew that their investigation of copyright infringement was flawed because they could not positively identify infringers. Defendant further alleges that the "John Doe" action originally filed against him by Plaintiffs was merely a ruse to obtain an ex parte subpoena and to force his university to disclose protected information about him and that any and all action against him was taken to induce settlement with other parties against whom the Plaintiffs have also filed copyright infringement actions.
Answer, Counterclaims ¶ 37.
Answer at ¶ 36.
Answer at ¶ 39.
Plaintiffs argue that Defendant's counterclaim of abuse of process is barred by the Noerr-Pennington Doctrine, which protects a company's rights to lobby the government for redress in order to protect business interests. Traditionally, theNoerr-Pennington Doctrine is applied in an anti-trust context; however, because it is based on the First Amendment right to petition courts, the Supreme Court has since extended the doctrine to include all types of government entities, including the courts. Plaintiffs argue that their action, in particular their original "John Doe" action against the Defendant is the exact conduct thatNoerr-Pennington is meant to protect and that Defendant makes no specific allegations of abuse of process other than generalist statements that the action is meant to "harass and threaten" Defendant in an effort to induce a settlement.
Plaintiffs also argue that Defendant's defamation and civil conspiracy claims are barred by the Noerr-Pennington Doctrine, but the Court will only address the counterclaim of abuse of process as it relates to the Noerr-Pennington analysis.
See California Motor Transport Co. v. Trucking Unlimited, 404 U.S. 508 (1972). See also Brownsville Golden Age Nursing Home, Inc. v. Wells, 839 F.2d 155, 160 (E.D. Pa. 1988). "The rule that liability cannot be imposed for damage caused by inducing legislative, administrative, or judicial action is applicable here."
Mot. to Dis., p. 8
Defendant specifically alleges that Plaintiffs' efforts to obtain a subpoena was an abuse of process. Plaintiffs obtained the subpoena in order to identify the user of the IP address which was being used for illegal file sharing. That subpoena was obtained through proper procedures; the Court granted the request for such specific discovery. Plaintiffs used the appropriate legal channels to seek information regarding the identity of the owner of the IP address, and did so in accordance with the limitations of the subpoena. The Court agrees that Plaintiffs have a right to protect their business interests, which in this case comes in the form of copyright and have done so within the boundaries of the law and Court-sanctioned procedures. Therefore, Defendant's counterclaim of abuse of process is barred by the Noerr-Pennington Doctrine.
Answer, Counterclaims ¶ 36.
See Second Amended Standing Order for Immediate Discovery [Doc. No. 2]. "Plaintffs may take immediate discovery on each "Doe" Defendant's Internet Service Provider ("ISP") to obtain the identity of the Doe Defendant, including name, address, telephone number, e-mail address, and Media Access Control addresses for each Defendant."
The Third Circuit has specifically extended theNoerr-Pennington Doctrine to claims of abuse of process, See Cheminor Drugs, Ltd. v. Ethyl Corp., 168 F.3d 119, 122 (3d. 1999).
Defendant further argues that the Noer-Pennington Doctrine does not apply to the instant case because Plaintiffs' case is based on "sham litigation." Defendant is correct that Noerr-Pennington does not apply "to petitions or lawsuits that are mere sham to cover what is actually nothing more than an attempt to interfere directly with the business relationships of a competitor. However, in order to prove that Plaintiffs' action is part of a "sham litigation," Defendant must show that (1) the claim is "objectively baseless and (2) the lawsuit must conceal "an attempt to interfere directly with the business relationships of a competitor."
Cheminor Drugs, 168 F.3d at 122.
Id. at 122.
In reference to the first prong of the sham litigation test, the Defendant must show that Plaintiffs' lawsuit is "objectively baseless in the sense that no reasonable litigant would realistically expect success on the merits. If an objective litigant could conclude that the suit is reasonably calculated to elicit a favorable outcome, the suit is immunized underNoerr . . ." The Third Circuit has determined that some showing of probably cause is a sufficient defense against a sham litigation claim. "Probable cause to institute civil proceedings requires no more than a reasonable belief that there is a chance that a claim may be held valid upon adjudication.
Prof'l Real Estate Investors v. Columbia Pictures Indus., 508 U.S. 49, 60-61 (1993).
Cheminor, 168 F.3d at 122.
Plaintiffs have well-pleaded that their protected, copyrighted materials were being shared over a specific IP address that has been identified as belonging to the Defendant. Defendant's retort that Plaintiffs cannot establish that he actually used the computer on the occasion charged in the Complaint does not diminish Plaintiffs' claim that songs were being illegally shared, thereby creating ample probable cause to institute a copyright infringement action. The Court finds that Plaintiffs' Complaint is not "objectively baseless," and that the "sham litigation exception" does not apply.
Because the Court finds that Defendant has not established the first factor of a "sham litigation" with regard to Plaintiffs Complaint, it does not need to analyze the second factor to establish Noer-Pennington immunity against the Counterclaim of Abuse of Process. Plaintiffs' Counterclaim of Abuse of Process is barred by the Noerr-Pennington Doctrine and accordingly will be dismissed.
See Id. at 122-123. Although the Court is not obligated to analyze the second factor needed to prove a "sham litigation," it is clear that Defendant's argument would also fail to show "an attempt to interfere directly with the business relationships of a competitor." The Defendant is not a business competitor of Plaintiffs, nor does Defendant claim to be. Hence, Plaintiffs' Complaint creates no interference in business relationships of either the Defendant or Plaintiffs' business competitors.
D. DOCTRINE OF JUDICIAL IMMUNITY (COUNTS IV AND V)
Defendant also lodges counterclaims of defamation (Count IV) and declaratory judgment (Count V). Plaintiffs argue that each of Defendant's counterclaims should be barred by Pennsylvania's doctrine of judicial immunity; however, the Court will address only the counterclaims for defamation and declaratory judgment in relation to the doctrine. The Pennsylvania courts recognize that "communications made within the regular course of judicial proceedings and which are pertinent and material to the redress of relief sought" are privileged. The Third Circuit has also held as follows:
Post v. Mendel, 507 A.2d 351, 355 (Pa.Super.Ct. 1991).
The judicial privilege — often referred to, in Pennsylvania, as "judicial immunity" — extends to communications which are issued in the regular course of judicial proceedings and which are pertinent and material to the redress or relief sought. The privilege exists because there is a realm of communication essential to the exploration of legal claims that would be hindered were there not the protection afforded by the privilege. Without the protection of the privilege for communications necessary to such exploration, access to the courts would be impaired, witnesses would be intimidated and lawyers' efforts in pursuit of their clients causes would be chilled. Therefore, the privilege (1) only applies to communications, and (2) does not apply to communication not either pertinent and material to the redress or relief sought, or essential to the exploration of legal claims in litigation.
Gen. Refractories Co. v. Fireman's Funds Ins. Co., 337 F.3d 297, 312 (3d Cir. 2004).
While it is clear that the doctrine of judicial immunity applies to communications, including court filings, it does not encompass conduct. It is Plaintiffs' conduct as opposed to specific communications that form the basis of Defendant's counterclaims, excepting the counterclaims for defamation and declaratory judgment, which fall under the doctrine of judicial immunity. The counterclaims are based on court communications essential to the underlying redress of relief sought. Defendant claims that Plaintiffs have defamed him by naming the songs illegally downloaded and/or shared in violation of copyright law. However, specifically identifying which copyrighted material was infringed upon is certainly "pertinent and material" to the statutory relief sought by Plaintiffs in the Complaint and therefore protected by judicial immunity.
Moreover, Defendant's counterclaim seeking a declaratory judgment of non-infringement is based on, "Plaintiffs' practice of dismissing claims without prejudice, after accusing defendants of criminal and civil wrongdoing. . . ." Plaintiffs' alleged prior, unrelated court proceedings in which they voluntarily dismissed claims would be protected communication. The Court documents detailing those voluntary dismissals provide the basis for Defendant's claim. As a result, the Court will dismiss Defendant's counterclaims for defamation and declaratory judgment.
See Answer, Counterclaims, ¶ 47.
E. CIVIL CONSPIRACY (COUNT VI)
In his last counterclaim, Defendant alleges that Plaintiffs have participated in a civil conspiracy and that the overt acts alleged in furtherance of the conspiracy include the allegations in all counterclaims. He further alleges that Defendant has been damaged by those conspiratorial acts and is entitled to recover those damages as well as collect punitive damages from Plaintiffs jointly and severally.
Answer at ¶¶ 53-54.
Answer at ¶¶ 57-58.
Defendant bases his counterclaim for civil conspiracy on "the illegal methods described in Counts I, II, III, and IV." The elements required for Trespass to Chattel, Count I, have been analyzed by the Court as actions permitted by federal statute in order for the Plaintiff to show copyright infringement in a file sharing context and are pre-empted by 18 U.S.C. § 1030. Additionally, the Court has analyzed Defendant's counterclaim for computer fraud and abuse, Count II and concluded that Defendant has not properly alleged the statutory elements. Count III for abuse of process has been deemed barred by the Noerr-Pennington Doctrine, and Count IV for Defamation and Count V for Declaratory Judgment are barred under the doctrine of judicial immunity. Because the actions inherent in Counts I, II. III and IV provide the basis for Defendant's civil conspiracy allegations and each has been dismissed by the Court, Defendant has failed to present a claim upon which relief can be granted; Count VI for civil conspiracy is therefore dismissed.
An appropriate Order follows.
ORDER
AND NOW, on this 23rd day of February, 2009, upon consideration of Plaintiffs' Motion to Dismiss Defendant's Counterclaims [Doc. 24]; Defendant's Response [Doc. No. 27]; Plaintiffs' Motion For Leave to File a Reply [Doc. No. 30]; Defendant's Objections to Plaintiffs' Response [Doc. No. 31]; Plaintiffs' Response in Support of Leave to File [Doc. No. 32]; and Defendant's Objections to Plaintiff's Response [Doc. No. 34], it is herebyORDERED that Plaintiff's Motion For Leave to File a Reply is DENIED. It is further ORDERED that Defendant's Counterclaims are DISMISSED.
It is so ORDERED.