CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 1 of 7

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Strike 3 Holdings LLC,

Case No. 18-cv-768 (DSD/FLN)

Plaintiff,

ORDER

v. John Doe subscriber assigned IP address 107.4.246.135, Defendant. ______________________________________ Adam Gislason, for Plaintiff ________________________________________ THIS MATTER came before the undersigned United States Magistrate Judge on Plaintiff’s ex parte motion for leave to serve a third-party subpoena prior to a Rule 26(f) conference (ECF No. 5). For the reasons set forth below, Plaintiff’s motion is DENIED. A.

Background Plaintiff is the owner of “award winning, critically acclaimed adult motion pictures.” ECF

No. 1 at ¶ 3. Plaintiff’s motion pictures are distributed on the internet through various adult websites, “Blacked, Tushy, Vixen, and Blacked Raw[,]” and are available for purchase on DVD. Id. On March 21, 2018, Plaintiff initiated this suit against the unnamed Defendant, raising one copyright infringement count under 17 U.S.C. §§ 106(1) and 501. Id. Plaintiff’s Complaint alleges that Defendant, using the BitTorrent protocol, committed “rampant and wholesale copyright infringement by downloading [Plaintiff’s] motion pictures as well as distributing them to others.” Id. at ¶ 4. Plaintiff claims that Defendant infringed “44 movies over an extended period of time.” Id. Plaintiff “only knows Defendant by his or her Internet Protocol [(“IP”)] address.” ECF No.

CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 2 of 7

7 at 1. Defendant’s IP address was ascertained by IPP International U.B., Plaintiff’s investigator, who found that an “IP address [believed to be connected to Defendant] was illegally distributing several of [Plaintiff’s] motion picturers.” Id. In the instant ex parte motion, Plaintiff seeks leave to serve “limited, immediate discovery on Defendant’s [Internet Service Provider (“ISP”)] Comcast Cable Communications, LLC (“Comcast”).” Id. at 2. To that end, Plaintiff moves to serve a subpoena, pursuant to Federal Rule of Civil Procedure 45, on Comcast. Id. Plaintiff’s Rule 45 subpoena “will only demand the true name and address of Defendant.” Id. Plaintiff represents that it will “only use this information to prosecute the claims made in its Complaint.” Id. Plaintiff claims that without this information, it “cannot serve Defendant nor pursue this lawsuit and protect its copyrights.”1 Id. B.

Legal Discussion Plaintiff’s ex parte motion illustrates an ongoing conflict between the Digital Millennium

Copyright Act (DMCA), 17 U.S.C. § 512, the Communications Act, 47 U.S.C. § 551, and Federal Rule of Civil Procedure 45. At the heart of this conflict is whether a copyright owner can use the federal judiciary to discover evidence about a potential, alleged infringer when the infringer’s actual identity is unknown. This friction has been exacerbated by the proliferation of, beginning with

1

The information Plaintiff seeks to subpoena will not establish the identity of the alleged infringer of its copyright. At most, it will identify who subscribes to the internet service that assigned the IP address that Plaintiff’s investigator believes was used to unlawfully view and distribute Plaintiff’s copyrighted films. The case of Killer Joe Nevada, LLC v. Does 1-20, 807 F.3d 908 (8th Cir. 2015), discussed infra, demonstrates this point. In Killer Joe Nevada, the defendant, after being identified by the very process Plaintiff seeks to invoke here, denied she had infringed Killer Joe Nevada’s copyright and filed a counterclaim seeking a declaratory judgment that she had not infringed. 807 F.3d at 911. Plaintiff there immediately moved to voluntarily dismiss its claim of copyright infringement. Id. 2

CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 3 of 7

Napster, peer-to-peer or file sharing computer programs. In 1998, Congress enacted DMCA as a legislative compromise to this conflict. DMCA permitted copyright owners to obtain and serve subpoenas on ISPs to ascertain information about an ISP subscriber alleged to be illegally transmitting copyrighted works via the internet. “DMCA was the product of lengthy negotiations between copyright owners and [ISPs]. It was designed to strike a balance between the interests of ISPs in avoiding liability for infringing use of their services and the interest of copyright owners in protecting their intellectual property and minimizing online piracy.”2 In Re Charter Commc’n, 393 F.3d 771, 774 (8th Cir. 2005). DMCA permits the clerk of court for a given federal district “to issue a subpoena to a service provider for identification of an alleged infringer.” 17 U.S.C. § 512(h). However, in In Re Charter Communications, the Eighth Circuit held that DMCA’s subpoena provision did not apply to a “copyright owner . . . request[ing] a subpoena for an ISP which merely acts as a conduit for data transferred between two internet users.” 393 F.3d at 776. Put differently, DMCA does not apply to the facts of the instant case because Comcast, the ISP Plaintiff seeks to subpoena, is acting only as a conduit for data transferred between two internet users. In Re Charter Communications effectively precludes an alleged infringement victim from invoking DMCA to obtain a subpoena to identify

2

DMCA “created . . . [four safe harbors to] protect ISPs from liability for copyright infringement under certain conditions. Each safe harbor applies to a particular ISP function.” In Re Charter Commc’n, 393 F.3d at 775. “The first safe harbor, under § 512(a), limits the liability of ISPs when they do nothing more than transmit, route, or provide connections for copyrighted material—that is, when the ISP is a mere conduit for the transmission.” Id. The remaining three safe harbors protect ISPs when they do nothing more than: “[(1)] system caching, that is, instances when they provide intermediate and temporary storage of material . . . [; (2)] [facilitate] material residing on the ISP’s system or network at the direction of its users . . . [; and (3)] when [an ISP] merely links users to online locations containing infringing material.” Id. 3

CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 4 of 7

infringers using peer-to-peer file sharing.3 393 F.3d 777. In Re Charter Communications relied heavily on the D.C. Circuit’s reasoning in Recording Industry Association of America v. Verizon Internet Service Incorporated, 351 F.3d 1229, 1232 (D.C. Cir .2003), cert denied, 125 S. Ct. 347 (2004). Id. In Verizon, the D.C. Circuit reasoned that it is the province of Congress, not the federal judiciary, to determine whether to amend DMCA “in order to make it fit a new and unforeseen internet architecture” and “accommodate fully the varied permutations of competing interests that are inevitably implicated by such new technology” attendant to the increased use of peer-to-peer file sharing protocols. 351 F.3d at 1238. Rather than invoke the direct subpoena provision of DMCA, Plaintiff here filed a lawsuit against John Doe, then filed the instant ex parte motion to serve expedited discovery on the thirdparty ISP, Comcast. Plaintiff is seeking to serve the subpoena under Federal Rule of Civil Procedure 45 to ascertain what it describes as Defendant’s name and address.4 However, that very requested material, disclosure of a cable subscriber’s personally identifiable information, is protected under another federal law, the Communications Act. See 47 U.S.C. § 551(c). Specifically, a cable operator, such as Comcast here, “shall not disclose personally identifiable information concerning any subscriber without the prior written or electronic consent of the subscriber concerned.” 47 U.S.C. § 551(c)(1). Furthermore, the Communications Act prohibits a cable provider from disclosing the

3

In In Re Charter Communications, the Eighth Circuit quashed the subpoena that had been issued by the Clerk of Court for the Eastern District of Missouri. 393 F.3d at 774.

4

As discussed in footnote one, supra, the most Plaintiff will obtain from its proposed subpoena is the name and address of the Comcast subscriber who was assigned the IP address Plaintiff’s investigator believes was used to accomplish the infringement. Without further discovery, the information Plaintiff seeks will not establish the actual identity of the infringer. 4

CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 5 of 7

“extent of any viewing or other use by the subscriber of a cable service or other service provided by the cable operator.” 47 U.S.C. § 551(c)(2)(C)(ii)(I). Again, as is the case with DMCA, the conundrum here is that the information Plaintiff seeks through a Rule 45 subpoena poses a direct conflict between Plaintiff’s property interest and Defendant’s privacy protections afforded under federal law in the Communications Act. This direct conflict between DMCA and the Communications Act was argued by the parties in In Re Charter Communications. However, as the Eighth Circuit quashed the subpoena on other grounds, it never reached or resolved this issue. This Court concludes that the conflict between the statutes, DMCA and the Communications Act, compels it to deny Plaintiff’s instant ex parte motion. As the Eighth Circuit reasoned in In Re Charter Communications, when it held that DMCA did not authorize the subpoena the district court had issued, “it is the province of Congress, not the courts, to decide whether to rewrite DMCA ‘in order to make it fit a new and unforseen internet architecture.’” 393 F.3d at 777 (quoting Verizon, 351 F.3d at 1238). This Court is mindful of footnote three in In Re Charter Communications. 393 F.3d at 777 n.3. In dicta, the Eighth Circuit suggested that the procedure adopted here, use of a Rule 45 subpoena in a John Doe lawsuit, is an appropriate work-around of its holding that DMCA does not apply to the subpoena it quashed. The dicta in footnote three, however, ignores the requirements of Federal Rule of Civil Procedure 10(a) that a complaint must name all of the parties. Moreover, footnote three is not a holding. In this Court’s view, footnote three does not compel it to permit the issuance of the requested subpoena here. Finally, that the Eighth Circuit did not address the merits of the conflict between the Communications Act and DMCA, further undermines the applicability of footnote three to the facts at issue here.

5

CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 6 of 7

Indeed, in Killer Joe Nevada, 807 F.3d at 912, the appellant argued that it was an abuse of discretion for the district court to allow a Copyright Act plaintiff to sue an ISP subscriber without first investigating whether the subscriber was responsible for the infringement. As the Eighth Circuit opined, “[a]lthough this Court has not reached that precise question, a plaintiff such as Killer Joe Nevada may properly sue John Doe to ascertain the ISP subscriber.” Id. (emphasis in the original). The Court then held it was not an abuse of discretion for the district court to permit Killer Joe Nevada to proceed as it did, in part, because the appellant there had cited no binding precedent to the contrary. Id. As such, Killer Joe Nevada simply stands for the proposition that it is not an abuse of discretion to permit a plaintiff to proceed as Plaintiff here has. Killer Joe Nevada is not a binding precedent that compels this Court to grant Plaintiff’s motion. Like In Re Charter Communications, Killer Joe Nevada does not include a substantive discussion of the conflict between the Communication Act’s requirement that a cable subscriber’s identity be protected and the process adopted here by Plaintiff, to compel the ISP to disclose the subscribe’s name and address under Rule 45. This Court concludes that it retains the requisite discretion to consider the conflict, in light of Killer Joe Nevada’s express recognition that the Eighth Circuit has not reached the precise question upon which the appellant’s argument rested there. Here, weighing Plaintiff’s property interest against Defendant’s privacy interest, the Court concludes that it must deny Plaintiff’s ex parte motion. From this Court’s perspective there are obvious tensions between DMCA, the Communications Act, and Federal Rule of Civil Procedure 45. The Court is not unsympathetic to Plaintiff’s need to discover the actual identity of the alleged infringer of its copyright; however, the discovery sought by Plaintiff through a Rule 45 subpoena directly collides with federal privacy protections. In the absence of binding Eighth Circuit precedent

6

CASE 0:18-cv-00768-DSD-FLN Document 14 Filed 04/24/18 Page 7 of 7

or further guidance from Congress, this Court is compelled to deny Plaintiff’s ex parte motion. C.

Order Based upon the foregoing, and all of the files, records and proceedings herein, IT IS

HEREBY ORDERED that Plaintiff’s ex parte motion for leave to serve a third-party subpoena prior to a Rule 26(f) conference (ECF No. 5) is DENIED.

DATED: April 24, 2018

s/Franklin L. Noel FRANKLIN L. NOEL United States Magistrate Judge

7

Internet Anonymity and Rule 45.pdf

Page 1 of 7. UNITED STATES DISTRICT COURT. DISTRICT OF MINNESOTA. Strike 3 Holdings LLC, Case No. 18-cv-768 (DSD/FLN). Plaintiff, ORDER. v. John Doe subscriber assigned IP address 107.4.246.135,. Defendant. Adam Gislason, for Plaintiff. THIS MATTER came before the undersigned United States Magistrate ...

33KB Sizes 0 Downloads 183 Views

Recommend Documents

Anonymity, signaling, contributions and ritual
19 Nov 2008 - never use these languages again; people in many societies perform elaborate religious rituals which ... (2003) found that religious communes with strict codes of dress and conduct survived for longer than ..... Andreoni and Petrie (2004

Anonymity, signaling and ritual
politician who raises a big “war chest” is likely to be a formidable campaigner, and this fact itself will ..... For antisocial types, d is a dominant strategy as 2/n < 1.

Rule
1 Oct 2017 - in which everyday life activities take place, and is related to the patient's physical disorder. Orthotics and ... canes, commodes, traction equipment, suction machines, patient lifts, weight scales, and other items ...... (iii) Elevator

Respondent Anonymity and Data-Matching Erik ...
Jul 16, 2007 - The JSTOR Archive is a trusted digital repository providing for ... Signature in Personal Reports," lournal of Applied Psychology, 20 (1936), pp.

Respondent Anonymity and Data-Matching Erik ...
Jul 16, 2007 - Respondent Anonymity and Data-Matching ... The JSTOR Archive is a trusted digital repository providing for long-term preservation and access ...

Rule
Oct 1, 2017 - (8) BUREAU OF TENNCARE (BUREAU) shall mean the administrative unit of TennCare which is responsible for ..... (75) LONG-TERM CARE shall mean programs and services described under Rule 1200-13-01- .01. (76) MCC ...... tional or technical

Rule
Oct 1, 2017 - nance and Administration to provide TennCare-covered benefits to eligible enrollees in the. TennCare Medicaid and ..... fied psychiatrist or a person with at least a Master's degree and/or clinical training in an ac- cepted mental .....

Rule
Oct 1, 2017 - (26) CONTRACTOR shall mean an organization approved by the Tennessee Department of. Finance and Administration to provide TennCare-covered benefits to eligible enrollees in the. TennCare Medicaid and TennCare Standard programs. (27) CON

Rule
Oct 1, 2017 - U.S. Department of Justice, Drug Enforcement Administration or by the ...... TennCare shall not cover drugs considered by the FDA to be Less ...

Mondrian Multidimensional K-Anonymity
Optimal multidimensional anonymization is NP-hard. (like previous optimal ...... re-partition the data into two “runs” (lhs and rhs) on disk. It is worth noting that this ...

Paired Fingerprints to Improve Anonymity Protection - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, ... is proposed in [13], where the minutiae positions extracted from a fingerprint and ... in the orientation and frequency between the two different fingerprints.

Mondrian Multidimensional K-Anonymity
Proposition 2 Every strict multidimensional partitioning can be expressed as a relaxed multidimensional partition- ing. However, if there are at least two tuples in ...

Secret Santa: Anonymity, Signaling, and Conditional ...
ritual, religion, music and dance, voting, charitable donations, and military institutions. We explore the value of anonymity in .... eration in the Prisoner's Dilemma when play is anonymous. Cooperation is enforced by ... Hagen and Bryant (2003) dis

Incognito: Efficient Full-Domain K-Anonymity - CiteSeerX
Jan 21, 1976 - external data to uniquely identify individuals. ... ature to refer to data published in its raw, non-aggregated, ..... mining association rules [2, 16].

Nonatomic Games with Limited Anonymity
use of a congestioned good, such as internet, roads, electricity networks, when ... price in a market, the topic choice for the whole set of young researchers ..... make this simplification to unify our presentation of the three approaches to prove t

Extended anonymity and Paretian relations on infinite ...
Nov 12, 2010 - to define maximal anonymity for a Paretian Suzumura-consistent, .... Let R be the set of all real numbers and N be the set of all positive integers.

Anonymity Part II_ Fair Exchange and Decentralized Mixers.pdf ...
Whoops! There was a problem loading this page. Whoops! There was a problem loading this page. Whoops! There was a problem loading this page. Anonymity ...

Incognito: Efficient Full-Domain K-Anonymity - CiteSeerX
Jan 21, 1976 - Incognito: Efficient Full-Domain K-Anonymity. Kristen LeFevre. David J. DeWitt. Raghu Ramakrishnan. University of Wisconsin - Madison.

Achieving Anonymity via Clustering - Stanford CS Theory
2Department of Computer Science, Stanford University,. Stanford, CA .... year with a maximum of 100 years. In this ... clustering with minimum cluster size r = 2, applied to the table in .... the clause nodes uj have degree at most 3 and cannot be.

Network Cost-Sharing without Anonymity
Jul 18, 2014 - resources (more bandwidth, longer duration, etc.). Suppose that the joint ... With anonymous cost functions, the natural cost shares proposed in [Anshelevich et al., 2008a] are the equal cost ..... We first review why every network cos

Achieving anonymity via clustering - Research at Google
[email protected]; S. Khuller, Computer Science Department, Unversity of Maryland, .... have at least r points.1 Publishing the cluster centers instead of the individual ... with a maximum of 1000 miles, while the attribute age may differ by a

Paired Fingerprints to Improve Anonymity Protection - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, ... Vivekanandha College of Technology for Women, Tiruchengode,.

Predication and Rule-Following
Handbook of Philosophy of Language, Ernest Lepore and Barry Smith (eds.),. Oxford: Oxford University Press, pp. 151-74. Wilson, Mark. 1982. “Predicate Meets Property,” The Philosophical Review, 91, pp.549-. 89. Wright, Crispin. 1989a. “Critical