Recording Industry Ass'n of America v. University of North Carolina

367 F. Supp. 2d 945, 74 U.S.P.Q. 2d (BNA) 1661, 2005 U.S. Dist. LEXIS 7936, 2005 WL 1027099
CourtDistrict Court, M.D. North Carolina
DecidedApril 14, 2005
Docket1:03MC138, 1:03MC139
StatusPublished
Cited by5 cases

This text of 367 F. Supp. 2d 945 (Recording Industry Ass'n of America v. University of North Carolina) is published on Counsel Stack Legal Research, covering District Court, M.D. North Carolina primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Recording Industry Ass'n of America v. University of North Carolina, 367 F. Supp. 2d 945, 74 U.S.P.Q. 2d (BNA) 1661, 2005 U.S. Dist. LEXIS 7936, 2005 WL 1027099 (M.D.N.C. 2005).

Opinion

ORDER

ELIASON, United States Magistrate Judge.

Background

These cases, which are consolidated only for the purposes of this Order, involve attempts by the Recording Industry Association of America (the RIAA) to identify two internet users which it believes infringed the copyrights of its members. The RIAA states that it has information indicating that unknown persons using the screen names “hulk” and “Cadillac-Man@Blubster.com” offered to download to other users a number of computer files containing songs. The RIAA claims that its members own the copyrights for these songs and that the downloads constitute an infringement of those copyrights.

When copyright owners or their representatives learn of a person engaging in infringing activity, they can simply contact the person directly to stop the infringement or else bring a lawsuit to achieve that same result. However, because the alleged infringers in the present cases identify themselves on the internet only by their screen names, the RIAA has been unable to use ordinary means to identify and contact them. Still, the RIAA was able to ascertain that “hulk” receives access to the internet through the University of North Carolina at Chapel Hill (UNC) and that “CadillacMan” receives internet service through North Carolina State University (N.C. State). As their internet service providers (ISPs), UNC and N.C. State should be aware of “hulk” and “Cad-illaeMan’s” true identities. For this reason, the RIAA obtained subpoenas from the Clerk of this Court directed to the schools pursuant to the Digital Millennium Copyright Act (DMCA), 17 U.S.C. § 512. The subpoenas and their attachments identify copyright violations that the RIAA claims “hulk” and “CadillacMan” committed and seek to compel the schools to provide it with the alleged infringers’ actual names, addresses, telephone numbers, and e-mail addresses.

Initially, the schools did not object to the subpoenas and appeared willing to comply. However, they first notified the users that the subpoenas had been issued. After receiving notification, and before the schools complied with the subpoenas, “hulk” filed both a motion to intervene as “John Doe” (“hulk” will hereafter be referred to as “John Doe”) and a motion to quash the subpoena. “CadillacMan” also filed a motion to quash, a motion for a protective order, and later a motion to intervene as “Jane Doe” (“CadillacMan” will hereafter be referred to as “Jane Doe”). (She later filed an amended motion to quash.) The motions to intervene were subsequently granted and briefing continued on the other motions. The briefing was later joined by various amici curiae, including the Electronic Privacy Information Center and IP Justice which support *947 the motions to quash, and various entertainment organizations which oppose the motions. Thereafter, and based on an opinion issued by the Court of Appeals for the District of Columbia Circuit, 1 UNC and N.C. State became uncertain of the lawfulness of the subpoenas and filed their own motions to quash. Finally, because the constitutionality and applicability of the DMCA are being challenged, the United States has now intervened in both cases to defend the statute. All motions have now been briefed by any interested parties and are now before the Court for decisions.

The Digital Millennium Copyright Act

The various arguments raised by the interested parties cannot be placed into context without an initial discussion of the DMCA and, in particular, the sections which give rise to their disagreements. The DMCA was enacted in 1998 and, with respect to the part with which this Court is concerned, it was an effort by Congress,

to resolve the unique copyright enforcement problems caused by the widespread use of the Internet. See Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir.2004); In re Aimster Copyright Litigation, 334 F.3d 643, 655 (7th Cir.2003); DMCA, Pub.L. No. 105-304, 112 Stat. 2860 (1998). Tackling copyright infringement on the Internet required balancing the competing interests of several groups. The first set of competing interests includes those of copyright holders and end users. The DMCA “intended to ‘balance the need for rapid response to potential infringement with the end-users [sic] legitimate interests in not having material removed without recourse.’” Rossi v. Motion Picture As soc. of America, 391 F.3d 1000, 1003 (9th Cir.2004) (quoting S.Rep. No. 105-190, at 21 (1998) (alterations in original)). The second set of competing interests were those of copyright holders and ISPs whose services may be used to infringe copyrights. The DMCA intended to balance the interests of these parties by creating a mechanism for rights holders to inform ISPs of potentially infringing conduct while, at the same time, providing “greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities.” Ellison, 357 F.3d at 1076 (quoting S.Rep. No. 105-190, at 20 (1998); H.R.Rep. No. 105-551, pt. 2, at 49 (1998)).

Corbis Corp. v. Amazon.com, Inc., 351 F.Supp.2d 1090, 1098 (W.D.Wash.2004).

The compromise, as enacted in the DMCA, both preserves copyright enforcement on the internet and provides

immunity to service providers from copyright infringement liability for “passive,” “automatic” actions in which a service provider’s system engages through a technological process initiated by another without the knowledge of the service provider. H.R. Conf. Rep. No. 105-796, at 72 (1998), reprinted in 1998 U.S.C.C.A.N. 649; H.R.Rep. No. 105-551(I), at 11 (1998). This immunity, however, is not presumptive, but granted only to “innocent” service providers who can prove they do not have actual or constructive knowledge of the infringement, as defined under any of the three prongs of 17 U.S.C. §§ 512(c)(1). The DMCA’s protection of an innocent service provider disappears at the mo *948 ment the service provider loses its innocence, i.e., at the moment it becomes aware that a third party is using its system to infringe. At that point, the Act shifts responsibility to the service provider to disable the infringing matter, “preserving] the strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital networked environment.” H.R. Conf. Rep. No. 105-796, at 72 (1998), reprinted in 1998 U.S.C.C.A.N. 649.

ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 625 (4th Cir.2001).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Harms v. Lillie
D. Colorado, 2025
Agence France Presse v. Morel
934 F. Supp. 2d 547 (S.D. New York, 2013)
Interscope Records v. DOES 1-7
494 F. Supp. 2d 388 (E.D. Virginia, 2007)

Cite This Page — Counsel Stack

Bluebook (online)
367 F. Supp. 2d 945, 74 U.S.P.Q. 2d (BNA) 1661, 2005 U.S. Dist. LEXIS 7936, 2005 WL 1027099, Counsel Stack Legal Research, https://law.counselstack.com/opinion/recording-industry-assn-of-america-v-university-of-north-carolina-ncmd-2005.