Strike 3 Holdings, LLC v. Doe

CourtDistrict Court, D. Minnesota
DecidedApril 24, 2018
Docket0:18-cv-00768
StatusUnknown

This text of Strike 3 Holdings, LLC v. Doe (Strike 3 Holdings, LLC v. Doe) is published on Counsel Stack Legal Research, covering District Court, D. Minnesota primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Strike 3 Holdings, LLC v. Doe, (mnd 2018).

Opinion

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Strike 3 Holdings LLC, Case No. 18-cv-768 (DSD/FLN) Plaintiff, ORDER

v. John Doe subscriber assigned IP address 107.4.246.135, Defendant. ______________________________________ Adam Gislason, for Plaintiff ________________________________________ THIS MATTER came before the undersigned United States Magistrate Judge on Plaintiff’s ex parte motion for leave to serve a third-party subpoena prior to a Rule 26(f) conference (ECF No. 5). For the reasons set forth below, Plaintiff’s motion is DENIED. A. Background Plaintiff is the owner of “award winning, critically acclaimed adult motion pictures.” ECF No. 1 at ¶ 3. Plaintiff’s motion pictures are distributed on the internet through various adult websites, “Blacked, Tushy, Vixen, and Blacked Raw[,]” and are available for purchase on DVD. Id. On March

21, 2018, Plaintiff initiated this suit against the unnamed Defendant, raising one copyright infringement count under 17 U.S.C. §§ 106(1) and 501. Id. Plaintiff’s Complaint alleges that Defendant, using the BitTorrent protocol, committed “rampant and wholesale copyright infringement by downloading [Plaintiff’s] motion pictures as well as distributing them to others.” Id. at ¶ 4. Plaintiff claims that Defendant infringed “44 movies over an extended period of time.” Id. Plaintiff “only knows Defendant by his or her Internet Protocol [(“IP”)] address.” ECF No. 7 at 1. Defendant’s IP address was ascertained by IPP International U.B., Plaintiff’s investigator, who found that an “IP address [believed to be connected to Defendant] was illegally distributing several of [Plaintiff’s] motion picturers.” Id. In the instant ex parte motion, Plaintiff seeks leave to serve “limited, immediate discovery on Defendant’s [Internet Service Provider (“ISP”)] Comcast

Cable Communications, LLC (“Comcast”).” Id. at 2. To that end, Plaintiff moves to serve a subpoena, pursuant to Federal Rule of Civil Procedure 45, on Comcast. Id. Plaintiff’s Rule 45 subpoena “will only demand the true name and address of Defendant.” Id. Plaintiff represents that it will “only use this information to prosecute the claims made in its Complaint.” Id. Plaintiff claims that without this information, it “cannot serve Defendant nor pursue this lawsuit and protect its copyrights.”1 Id. B. Legal Discussion Plaintiff’s ex parte motion illustrates an ongoing conflict between the Digital Millennium

Copyright Act (DMCA), 17 U.S.C. § 512, the Communications Act, 47 U.S.C. § 551, and Federal Rule of Civil Procedure 45. At the heart of this conflict is whether a copyright owner can use the federal judiciary to discover evidence about a potential, alleged infringer when the infringer’s actual identity is unknown. This friction has been exacerbated by the proliferation of, beginning with

1 The information Plaintiff seeks to subpoena will not establish the identity of the alleged infringer of its copyright. At most, it will identify who subscribes to the internet service that assigned the IP address that Plaintiff’s investigator believes was used to unlawfully view and distribute Plaintiff’s copyrighted films. The case of Killer Joe Nevada, LLC v. Does 1-20, 807 F.3d 908 (8th Cir. 2015), discussed infra, demonstrates this point. In Killer Joe Nevada, the defendant, after being identified by the very process Plaintiff seeks to invoke here, denied she had infringed Killer Joe Nevada’s copyright and filed a counterclaim seeking a declaratory judgment that she had not infringed. 807 F.3d at 911. Plaintiff there immediately moved to voluntarily dismiss its claim of copyright infringement. Id. 2 Napster, peer-to-peer or file sharing computer programs. In 1998, Congress enacted DMCA as a legislative compromise to this conflict. DMCA permitted copyright owners to obtain and serve subpoenas on ISPs to ascertain information about an ISP subscriber alleged to be illegally transmitting copyrighted works via the internet. “DMCA

was the product of lengthy negotiations between copyright owners and [ISPs]. It was designed to strike a balance between the interests of ISPs in avoiding liability for infringing use of their services and the interest of copyright owners in protecting their intellectual property and minimizing online piracy.”2 In Re Charter Commc’n, 393 F.3d 771, 774 (8th Cir. 2005). DMCA permits the clerk of court for a given federal district “to issue a subpoena to a service provider for identification of an alleged infringer.” 17 U.S.C. § 512(h). However, in In Re Charter Communications, the Eighth Circuit held that DMCA’s subpoena provision did not apply to a “copyright owner . . . request[ing] a subpoena for an ISP which merely acts as a conduit for data transferred between two internet users.” 393 F.3d at 776. Put differently, DMCA does not apply to

the facts of the instant case because Comcast, the ISP Plaintiff seeks to subpoena, is acting only as a conduit for data transferred between two internet users. In Re Charter Communications effectively precludes an alleged infringement victim from invoking DMCA to obtain a subpoena to identify

2 DMCA “created . . . [four safe harbors to] protect ISPs from liability for copyright infringement under certain conditions. Each safe harbor applies to a particular ISP function.” In Re Charter Commc’n, 393 F.3d at 775. “The first safe harbor, under § 512(a), limits the liability of ISPs when they do nothing more than transmit, route, or provide connections for copyrighted material—that is, when the ISP is a mere conduit for the transmission.” Id. The remaining three safe harbors protect ISPs when they do nothing more than: “[(1)] system caching, that is, instances when they provide intermediate and temporary storage of material . . . [; (2)] [facilitate] material residing on the ISP’s system or network at the direction of its users . . . [; and (3)] when [an ISP] merely links users to online locations containing infringing material.” Id. 3 infringers using peer-to-peer file sharing.3 393 F.3d 777. In Re Charter Communications relied heavily on the D.C. Circuit’s reasoning in Recording Industry Association of America v. Verizon Internet Service Incorporated, 351 F.3d 1229, 1232 (D.C. Cir .2003), cert denied, 125 S. Ct. 347 (2004). Id. In Verizon, the D.C. Circuit reasoned that

it is the province of Congress, not the federal judiciary, to determine whether to amend DMCA “in order to make it fit a new and unforeseen internet architecture” and “accommodate fully the varied permutations of competing interests that are inevitably implicated by such new technology” attendant to the increased use of peer-to-peer file sharing protocols. 351 F.3d at 1238. Rather than invoke the direct subpoena provision of DMCA, Plaintiff here filed a lawsuit against John Doe, then filed the instant ex parte motion to serve expedited discovery on the third- party ISP, Comcast. Plaintiff is seeking to serve the subpoena under

Related

United States v. Charter Communications, Inc.
393 F.3d 771 (Eighth Circuit, 2005)
Killer Joe Nevada v. Leigh Leaverton
807 F.3d 908 (Eighth Circuit, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
Strike 3 Holdings, LLC v. Doe, Counsel Stack Legal Research, https://law.counselstack.com/opinion/strike-3-holdings-llc-v-doe-mnd-2018.