throbber
Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 1 of 13
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN FRANCISCO DIVISION
`
`STRIKE 3 HOLDINGS, LLC,
`Plaintiff,
`
`v.
`
`JOHN DOE SUBSCRIBER ASSIGNED IP
`ADDRESS 107.130.100.9,
`Defendant.
`
`
`
`
`
`Case No. 23-cv-05494-PHK
`
`ORDER (1) GRANTING STRIKE 3
`HOLDINGS, LLC’S EX PARTE
`APPLICATION FOR LEAVE TO
`SERVE THIRD-PARTY SUBPOENA
`AND (2) ISSUING PROTECTIVE
`ORDER
`Re: Dkt. No. 8
`
`Now before the Court is Plaintiff Strike 3 Holdings, LLC’s (“Strike 3”) Ex Parte Application
`for Leave to Serve a Third-Party Subpoena Prior to a Rule 26(f) Conference. [Dkt. 8]. Because
`Defendant John Doe, subscriber assigned IP address number 107.130.100.9, (“Defendant Doe”) has
`not been identified or served, no opposition has been filed. Having reviewed Strike 3’s application
`and all supporting documents, the Court GRANTS the ex parte application. Further, on the Court’s
`own motion, the Court additionally ISSUES a limited Protective Order for the reasons set forth
`below.
`
`BACKGROUND
`Strike 3 alleges that it is the assignee of copyrights registered with the U.S. Copyright Office
`
`to certain adult motion pictures distributed through various adult websites and DVD sales. See Dkt.
`1 at 1, 6. Strike 3 indicates it is a Delaware corporation located in Camden, Delaware. Id. at ¶ 12.
`
`Defendant Doe was named in the Complaint solely in connection with a specific Internet
`Protocol (“IP”) address. [Dkt. 1]. “An IP address is a ‘unique numerical address’ assigned to every
`computer and can serve as its identifying characteristic.” United States v. Henderson, 906 F.3d
`1109, 1111 n.1 (9th Cir. 2018). An IP address is not a physical address but instead is a unique
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 2 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`identifier for every computer or server connected to the Internet. United States v. Forrester, 512
`F.3d 500, 510 n.5 (9th Cir. 2008). As is well-known, consumers and households connect their home
`computers and other devices to the Internet by subscribing to such service through a vendor called
`an internet service provider (“ISP”), often a cable company, telecommunications company, or other
`similar service provider. Nat’l Cable & Telecommunications Ass’n v. Brand X Internet Servs., 545
`U.S. 967, 974 (2005) (“The traditional means by which consumers in the United States access the
`network of interconnected computers that make up the Internet is through “dial-up” connections
`provided over local telephone facilities. Using these connections, consumers access the Internet by
`making calls with computer modems through the telephone wires owned by local phone companies.
`Internet service providers (ISPs), in turn, link those calls to the Internet network, not only by
`providing a physical connection, but also by offering consumers the ability to translate raw Internet
`data into information they may both view on their personal computers and transmit to other
`computers connected to the Internet.”) (citations omitted).
`When a subscriber (or consumer) signs up for Internet service, the ISP assigns an IP address
`to that subscriber – essentially renting out the IP address to the consumer for the duration of their
`subscription service period. Columbia Ins. Co. v. seescandy.com, 185 F.R.D. 573, 575 (N.D. Cal.
`1999) (“On the Internet, computers find each other by reference to Internet Protocol (IP) addresses,
`which are a series of numbers that are used to specify the address of a particular machine connected
`to the Internet. Domain names are alphanumeric strings that are associated with particular IP
`addresses. Thus to find the computer at 129.99.135.66, a user might type in uscourts.gov, and would
`never need to know the actual IP address.”). The consumer does not own the IP address – it is
`controlled by the ISP and allocated to subscribers when they sign up for service. UMG Recordings,
`Inc. v. Doe, No. 08-cv-1193-SBA, 2008 WL 4104214, at *2 (N.D. Cal. Sept. 3, 2008) (“[W]hen an
`ISP is given a defendant’s IP address and the date and time of infringement, it quickly and easily
`can identify the name and address of a Doe defendant, i.e., the ISP’s subscriber, because that
`information is contained in the ISP’s subscriber activity log files.”) (citation omitted). Because the
`ISP sends monthly or regular bills to the subscriber and has the original service application
`documents from each subscriber, and because the ISP knows which of its IP addresses were assigned
`2
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 3 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`to which customers, it follows that an ISP’s internal records should typically include information
`sufficient to link a customer with the account corresponding to a particular IP address. Id.
`Here, Strike 3 avers that it traced the IP address used by Defendant Doe’s device to a physical
`address in the Northern District of California using a geolocation tool developed by a vendor called
`Maxmind, Inc. (“Maxmind”). [Dkt. 1 at ¶ 9; Dkt. 8 at 17]. Using Maxmind, Strike 3 avers that it
`identified Defendant Doe in this case as a subscriber using assigned IP address 107.130.100.9. See
`Dkt. 1 at ¶ 9; Dkt. 8 at 17. Further, Strike 3 alleges, from information obtained by Maxmind, that
`AT&T Internet (“AT&T”) is the ISP for and owner of the IP address which was allocated to
`Defendant Doe as part of their subscription for internet service from AT&T. [Dkt. 8 at 9].
`Defendant Doe is accused of using an internet-connected device and a peer-to-peer file
`distribution network called BitTorrent to download and distribute, through the internet, copies of
`Strike 3’s copyrighted motion pictures without license or authorization. See Dkt. 1 at ¶¶ 18–44.
`BitTorrent is a software-implemented protocol for sharing electronic files (such as digitized files of
`motion pictures, television shows, and other content) directly between individuals’ internet-
`connected devices. UMG Recordings, 2008 WL 4104214 at *1 (“The Internet and peer-to-peer
`(P2P) networks have spawned an illegal trade in copyrighted works. By downloading P2P software,
`and logging onto a P2P network, an individual may upload (distribute) or download (copy), without
`authorization, countless copyrighted music and video files to or from any other P2P network user
`worldwide. [. . .] [S]imilar online media distribution systems emerged that have attempted to
`capitalize on the growing illegal market that Napster fostered. These include Ares, KaZaA,
`eDonkey, BitTorrent, DirectConnect, and Gnutella, among others.”) (citations and footnote
`omitted). Strike 3 alleges that Defendant Doe used BitTorrent for “downloading Strike 3’s motion
`pictures as well as distributing them to others[]” and “has been recorded infringing 24 movies over
`an extended period of time.” See Dkt. 1 at ¶ 4.
`
`As a further part of its investigation, Strike 3 alleges it is the owner and operator of an
`investigative technology tool called “VXN Scan.” Id. at ¶ 28. Using VXN Scan, Strike 3 allegedly
`established direct communication connections over the internet (using a “TCP/IP” (or Transmission
`Control Protocol/Internet Protocol) connection) between Strike 3’s investigators’ computers and
`3
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 4 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Defendant Doe’s device (which was connected to the internet at the IP address named in the
`Complaint) during a time period when Defendant Doe’s device was connected to the internet and
`was using BitTorrent. Id. at ¶ 30. According to the Complaint, VXN Scan searches for and obtains
`“.torrent” files from the target device and then downloads complete copies of the digital media files
`that correlate to those “.torrent” files to determine whether those downloaded files are infringing
`copies of one of Strike 3’s copyrighted works. Id. at ¶¶ 25–33. Strike 3 further alleges that VXN
`Scan used metadata called the “Info Hash” value from a .torrent file downloaded from Defendant
`Doe’s device to download a portion of the same digital media file directly from Defendant Doe’s
`device via the BitTorrent network (thus essentially emulating the distribution of digital files of
`motion pictures from Defendant Doe to another BitTorrent user via the internet). Id. at ¶ 36. A
`comparison of the digital media files apparently revealed that Defendant Doe downloaded and
`distributed copies of portions of Strike 3’s copyrighted works without authorization. Id. at ¶¶ 35–
`44.
`
`Based on these foregoing allegations, on October 25, 2023, Strike 3 filed its Complaint
`against Defendant Doe alleging copyright infringement under the Copyright Act. See Dkt. 1. On
`November 9, 2023, Strike 3 filed the instant ex parte application requesting leave to serve AT&T
`with a subpoena under Fed. R. Civ. P. 45. [Dkt. 8]. Strike 3 alleges that AT&T has the ability to
`identify Defendant Doe through the IP address discovered by the investigation discussed herein,
`because Maxmind’s geolocation service has identified AT&T as the owner of the IP address named
`in the Complaint. Id. at 17. Strike 3 represents that the requested subpoena will be limited to seeking
`from AT&T the name and physical address of the individual(s) having the account associated with
`Defendant Doe’s IP address of 107.130.100.9. Id.
`
`I.
`
`DISCUSSION
`LEAVE TO SERVE AN EARLY, LIMITED SUBPOENA ON AT&T.
`Pursuant to Rule 26(d)(1), a party may not seek discovery from any source prior to the
`parties’ conference required by Rule 26(f). However, per Rule 26(d)(1), the Court has authority to
`allow discovery prior to the Rule 26(f) conference and thus outside this timing limitation. See also
`Fed. R. Civ. P. 26 advisory committee’s note (1993) (“Discovery can begin earlier if authorized . .
`4
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 5 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`. by local rule, order, or stipulation. This will be appropriate in some cases[.]”).
`The Court may authorize early discovery before the Rule 26(f) conference if the requesting
`party establishes “good cause” for the early discovery. Semitool, Inc. v. Tokyo Electron Am. Inc.,
`208 F.R.D. 273, 276 (N.D. Cal. 2002). “Good cause may be found where the need for expedited
`discovery, in consideration of the administration of justice, outweighs prejudice to the responding
`party.” Id.
`As with all discovery matters, “Rule 26 vests the trial judge with broad discretion to tailor
`discovery narrowly and to dictate the sequence of discovery.” Crawford-El v. Britton, 523 U.S.
`574, 598 (1998). “And the court may also set the timing and sequence of discovery.” Id. at 599
`(citing Fed. R. Civ. P. 26(d)). Thus, the decision whether or not to grant early discovery under Rule
`26(d) is within the Court’s discretion. Quinn v. Anvil Corp., 620 F.3d 1005, 1015 (9th Cir. 2010)
`(“We review district court rulings on discovery matters for abuse of discretion.”). Further, a
`decision to deny early discovery under Rule 26(d) “will not be disturbed except upon the clearest
`showing that denial of discovery results in actual and substantial prejudice to the complaining
`litigant.” Med Vets, Inc. v. VIP Petcare Holdings, Inc., 811 F. App’x 422, 424 (9th Cir. 2020)
`(quoting Hallett v. Morgan, 296 F.3d 732, 751 (9th Cir. 2002)). In evaluating a motion for expedited
`discovery, the District Court in Med Vets considered the following factors to determine whether
`good cause exists to justify the requested early discovery: (1) whether a preliminary injunction is
`pending; (2) the breadth of the discovery request; (3) the purpose for requesting the expedited
`discovery; (4) the burden on the defendants to comply with the requests; and (5) how far in advance
`of the typical discovery process the request was made. Med Vets, Inc. v. VIP Petcare Holdings,
`Inc., No. 18-CV-02054-MMC, [Dkt. 45] at *3 (N.D. Cal. Nov. 28, 2018) (quoting Rovio Ent. Ltd.
`v. Royal Plush Toys, Inc., 907 F. Supp. 1086, 1099 (N.D. Cal. 2012)). The Ninth Circuit affirmed
`the District Court’s decision on the request for expedited discovery. Med Vets, 811 F. App’x at 424.
`A request for early discovery, such as the instant ex parte application, may arise particularly
`in a case involving alleged wrongful conduct in connection with use of the internet. As discussed
`by precedent:
`
`
`With the rise of the Internet has come the ability to commit certain tortious acts,
`5
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 6 of 13
`
`
`
`such as defamation, copyright infringement, and trademark infringement, entirely
`on-line. The tortfeasor can act pseudonymously or anonymously and may give
`fictitious or incomplete identifying information. Parties who have been injured by
`these acts are likely to find themselves chasing the tortfeasor from Internet Service
`Provider (ISP) to ISP, with little or no hope of actually discovering the identity of
`the tortfeasor.
`
`In such cases the traditional reluctance for permitting filings against John Doe
`defendants or fictitious names and the traditional enforcement of strict compliance
`with service requirements should be tempered by the need to provide injured parties
`with an (sic) forum in which they may seek redress for grievances. However, this
`need must be balanced against the legitimate and valuable right to participate in
`online forums anonymously or pseudonymously. People are permitted to interact
`pseudonymously and anonymously with each other so long as those acts are not in
`violation of the law. This ability to speak one’s mind without the burden of the
`other party knowing all the facts about one’s identity can foster open
`communication and robust debate. Furthermore, it permits persons to obtain
`information relevant to a sensitive or intimate condition without fear of
`embarrassment. People who have committed no wrong should be able to participate
`online without fear that someone who wishes to harass or embarrass them can file
`a frivolous lawsuit and thereby gain the power of the court's order to discover their
`identity.
`
`Thus some limiting principals should apply to the determination of whether
`discovery to uncover the identity of a defendant is warranted.
`
`Columbia Ins., 185 F.R.D. at 578 (footnote omitted).
`Columbia thus identified four factors to assist in determining whether a plaintiff has
`established good cause to conduct early discovery to identify Doe Defendants. Courts look to
`“whether the plaintiff (1) identifies the Doe defendant with sufficient specificity that the court can
`determine that the defendant is a real person who can be sued in federal court, (2) recounts the steps
`taken to locate and identify the defendant, (3) demonstrates that the action can withstand a motion
`to dismiss, and (4) proves that the discovery is likely to lead to identifying information that will
`permit service of process.” Zoosk Inc. v. Doe, No. 4:10-CV-04545, 2010 WL 5115670, at *2 (N.D.
`Cal. Dec. 9, 2010) (citing Columbia, 185 F.R.D. at 578–80). Additionally, the Ninth Circuit has
`relied on the first and third factors as weighing in favor of granting early discovery to determine an
`unknown defendant’s identity. See, e.g., Young v. Transp. Deputy Sheriff I, 340 F. App’x 368, 369
`(9th Cir. 2009); Gillespie v. Civiletti, 629 F.2d 637, 642 (9th Cir. 1980); Wakefield v. Thompson,
`177 F.3d 1160, 1163 (9th Cir. 1999).
`Applying the Columbia factors here, the Court find that all four factors weigh in favor of the
`requested, limited early discovery. First, Strike 3 sufficiently alleges enough details to enable this
`6
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 7 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Court to establish Defendant Doe is more than likely an actual individual who can be legally sued
`in federal court. Strike 3 alleges Defendant Doe downloaded Strike 3’s copyrighted adult motion
`pictures and distributed them via the BitTorrent network. [Dkt. 1 at ¶¶ 7–8]. Strike 3 alleges that
`one way for Defendant Doe to obtain the digital film files was to specifically direct their BitTorrent
`client to download the copyrighted media files from a source on the internet. [Dkt. 8 at 13]. The
`Court notes that Strike 3’s pleadings do not eliminate entirely the possibility that Defendant Doe
`obtained the files without using the internet, such as through some form of direct file transfer from
`a locally connected device, through a transfer from a portable memory device such as a USB drive,
`or through some form of copying from a DVD. Nevertheless, the Court acknowledges that one
`reasonably plausible means by which Defendant Doe obtained the digitized film files at issue was
`through download over the internet.
`With regard to distributing the digital film files, Strike 3 avers that Defendant Doe had to
`specifically set up their BitTorrent client to allow other BitTorrent users to obtain copies of the
`copyrighted media files from the peer-to-peer network connected via the internet to Defendant Doe’s
`computer (or other electronic device). See Dkt. 1 at 1, 6. These allegations strongly suggest
`Defendant Doe is an identifiable person, a subscriber of the IP address identified by Strike 3, and
`thus a natural person who can be legally sued in federal court. Strike 3 Holdings, LLC v. Doe, No.
`17-CV-07051-LB, 2018 WL 357287, at *2 (N.D. Cal. Jan. 10, 2018). Strike 3 alleges it traced each
`download back to Defendant Doe’s IP address geolocated in the Northern District of California,
`thereby establishing a high likelihood that this Court has jurisdiction over Defendant Doe. [Dkt. 1
`at ¶¶ 7–8].
`
`Second, Strike 3 provides a detailed account of steps taken in its attempts to locate and
`identify Defendant Doe. Strike 3 alleges Defendant Doe downloaded and distributed Strike 3’s
`adult motion pictures using the IP address identified herein, and this IP address was allegedly traced
`back to the Northern District of California. Id. Strike 3 allegedly used multiple methods available
`to them to attempt to obtain Defendant Doe’s identity, including web searches, reviews of numerous
`sources of authority, and discussions with investigators and cyber security consultants. [Dkt. 8 at
`18]. Strike 3 alleges that knowing Defendant Doe’s IP address by itself is not enough to establish
`7
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 8 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Defendant Doe’s identity. Id. Strike 3’s expert corroborates the inability to obtain Defendant Doe’s
`identity solely from the IP address. [Dkt. 8-1 at 22 (Declaration of Patrick Paige: “Based on [his]
`experience in similar cases, Defendant’s ISP AT&T Internet is the only entity that can correlate the
`IP address to its subscriber and identify [the] Defendant.”)]. The Court finds that Strike 3’s efforts
`are sufficient to satisfy this factor. See Strike 3 Holdings LLC v. Doe, No. 18-CV-06938-WHO,
`2019 WL 402358, at *2 (N.D. Cal. Jan. 31, 2019) (finding plaintiff’s efforts sufficient, including
`web searches of the IP addresses, references to other sources of authority, and a declaration from an
`IT expert stating that the service provider was the only entity with the ability to identify the
`defendant).
`
`Third, Strike 3’s Complaint could withstand a motion to dismiss because the Court concludes
`that Strike 3 sufficiently pleads copyright infringement under the Copyright Act. “To establish a
`prima facie case of direct copyright infringement, [a party] must show that he owns the copyright,
`and that [the alleged infringer] violated one of the exclusive rights set forth in 17 U.S.C. § 106.”
`Bell v. Wilmott Storage Servs., LLC, 12 F.4th 1065, 1071 (9th Cir. 2021). “In addition, direct
`infringement requires the plaintiff to show causation (also referred to as ‘volitional conduct’) by the
`defendant.” Perfect 10, Inc. v. Giganews, Inc., 847 F.3d 657, 666 (9th Cir. 2017) (citing Fox Broad.
`Co. v. Dish Network L.L.C., 747 F.3d 1060, 1067 (9th Cir. 2013)). Section 106 of the Copyright
`Act grants copyright owners six exclusive rights: reproduction, preparation of derivative works,
`distribution, public performance, public display, and digital audio transmission of the copyrighted
`work. Fahmy v. Jay-Z, 908 F.3d 383, 393–94 (9th Cir. 2018).
`Here, Strike 3 claims ownership of the copyrights for the adult movies that Defendant Doe
`allegedly downloaded and subsequently distributed to others, all without obtaining authorization or
`license from Strike 3. [Dkt. 1 at ¶ 46]. Strike 3 alleges that “by downloading the torrent files,
`Defendant [Doe] triggered a cascade of technical operations, making Defendant [Doe] the
`‘proximate cause’ of all of the violations of Plaintiff’s copyrights.” [Dkt. 8 at 14]. Without passing
`on the ultimate merits of this case, the Court finds that at this stage Strike 3’s Complaint could
`withstand a motion to dismiss because it has established a prima facie case of copyright
`infringement.
`
`8
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 9 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Finally, Strike 3 has established that the requested, limited early discovery is likely to lead
`to identifying information which will likely reveal the identity of Defendant Doe. In order to
`establish this factor, a Plaintiff must “provide enough concrete details about who these individuals
`are or how they eventually could be identified, located, and served.” Biesenbach v. Does 1–3, No.
`21-CV-08091-DMR, 2022 WL 17371156, at *4 (N.D. Cal. July 18, 2022). Strike 3 alleges that, as
`the ISP for Defendant Doe, AT&T has information which would identify Defendant Doe. [Dkt. 1
`at ¶ 5]. AT&T allegedly has in its possession the subscriber’s name and physical address, since
`some natural person signed up for and is paying AT&T for the internet service associated with the
`IP address at issue here. [Dkt. 8-1 at 22 (Declaration of Patrick Paige: “Based on [his] experience
`in similar cases, Defendant’s ISP AT&T Internet is the only entity that can correlate the IP address
`to its subscriber and identify [the] Defendant.”)]. Strike 3 claims AT&T is in a position to provide
`this limited information in response to the requested early subpoena, and Strike 3 argues that, after
`receipt of such, it will be able to identify Defendant Doe and ultimately serve process. [Dkt. 8 at
`9]. “Even if the subscriber is not the proper defendant, learning his or her identity may allow Strike
`3 to work with the subscriber to locate that individual.” Strike 3 Holdings, 2019 WL 402358, at *3.
`Accordingly, the Court finds that Strike 3 has made a sufficient showing to satisfy this factor.
`Further, applying the good cause factors identified by the District Court in Med Vets leads
`to the same result. Med Vets, No. 18-CV-02054-MMC, [Dkt. 45] at *3, aff’d Med Vets, 811 F.
`App’x at 424. First, while a preliminary injunction is not pending, here the requested early discovery
`is needed to allow the case to proceed against an unidentified defendant. Second, Strike 3 represents
`to the Court that the breadth of the proposed discovery request is limited and narrow: the proposed
`subpoena will only seek from AT&T the name and physical address of the natural person who is the
`subscriber for the IP address at issue. Third, the purpose for requesting the expedited discovery is
`discussed above: Strike 3 alleges it needs the discovery in order to be able to identify the person
`who is Defendant Doe and thus to allow this case to go forward. Fourth, the burden on the target of
`the discovery to comply with the requests appears cabined by Strike 3’s commitment to seek only
`limited discovery from AT&T and not free-ranging discovery to try to identify Defendant Doe.
`Finally, Strike 3’s request is presented at the outset of this case and thus far in advance of the typical
`9
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 10 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`discovery process, but this is by necessity since Strike 3 alleges it needs to identify Defendant Doe
`in order to pursue the case beyond this filing stage. In sum, in light of the District Court Med Vets
`factors, the Court finds that Strike 3 has demonstrated good cause warranting the requested, early
`and limited discovery.
`In light of the facts and evidence presented to the Court and applying these facts to the legal
`standards for early discovery, the Court finds that Strike 3 has demonstrated good cause warranting
`the requested early, limited discovery (specifically, the proposed subpoena to AT&T) to determine
`the identity of Defendant Doe. Here, in consideration of the administration of justice, the need for
`the requested discovery (to identify the defendant and allow the case to go forward) outweighs the
`prejudice to AT&T (the target of the requested discovery) in light of the limited and narrow nature
`of the requested subpoena. Semitool, 208 F.R.D. at 276. Indeed, here the copyright infringement
`claims are supported by evidence of technical investigation resulting in multiple alleged instances
`of copyright infringement linked to the one, identified IP address. Cf. id. (“It should be noted that
`courts have recognized that good cause is frequently found in cases involving claims of infringement
`and unfair competition.”). Therefore, the Court GRANTS leave to serve the limited, proposed third-
`party subpoena on AT&T prior to the Rule 26(f) conference in this matter.
`PROTECTIVE ORDER
`II.
`Courts have discretion to issue a protective order sua sponte for “good cause” in order to
`“protect a party or person from annoyance, embarrassment, oppression, or undue burden or
`expense[.]” Fed. R. Civ. P. 26(c). To establish “good cause,” there must be a demonstration of
`specific prejudice or harm that would result from the absence of a protective order. Phillips ex rel.
`Ests. of Byrd v. General Motors Corp., 307 F.3d 1206, 1210–11 (9th Cir. 2002). “[B]road
`allegations of harm, unsubstantiated by specific examples or articulated reasoning, do not satisfy
`the Rule 26(c) test [for good cause].” Beckman Indus. v. Int’l Ins. Co., 966 F.2d 470, 476 (9th Cir.
`1992). With regard to a specific type of harm implicated here, the Ninth Circuit acknowledges that
`people use pseudonyms in their internet communications “when anonymity is necessary ‘to preserve
`privacy in a matter of sensitive and highly personal nature[.]’” Does I thru XXIII v. Advanced Textile
`Corp., 214 F.3d 1058, 1068 (9th Cir. 2000) (balancing “the need for anonymity against the general
`10
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 11 of 13
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`presumption that parties’ identities are public information and the risk of unfairness to the opposing
`party”).
`Here, good cause exists to protect the privacy and rights of the person who will presumably
`be identified by AT&T (whether that person is Defendant Doe or a third party who pays for the
`internet service from AT&T for the subject IP address). In this situation, anonymity is necessary to
`preserve privacy and protect the person to be identified by AT&T from annoyance and
`embarrassment because of the sensitive and highly personal nature of adult motion pictures. See
`Strike 3 Holdings, LLC, 2018 WL 357287, at *3 (recognizing that “[a]n allegation that individually
`illegally downloaded adult motion pictures likely goes to matters of a sensitive and highly personal
`nature, including one’s sexuality”). Further, because AT&T’s information produced in response to
`the requested subpoena may not lead to the proper subscriber, it is necessary to protect the identity
`of any potential and innocent third parties, as well as protect them from annoyance, embarrassment,
`or unfairness from deprivation of privacy. Strike 3 Holdings, LLC v. Doe, No. 23-CV-01985-AMO,
`2023 WL 3483288, at *2 (N.D. Cal. May 15, 2023).
`Considering the subscriber’s potential status as an innocent third party and the sensitive and
`personal nature of the subject matter of the suit for both the subscriber and Defendant Doe, the Court
`accordingly issues a limited protective order. Any information produced in response to the
`requested subpoena to Strike 3 by AT&T will be treated as confidential and shall be treated
`following the restrictions in and as if it were designated “Confidential” under the Northern District
`of
`California’s Model
`Protective Order
`for
`Standard
`Litigation.
`
`See
`https://www.cand.uscourts.gov/forms/model-protective-orders/. This presumptive confidential
`treatment of any such material or information produced in response to the requested subpoena shall
`continue until Defendant Doe (or any other third party identified by AT&T in response to the
`subpoena) has the opportunity to file a motion with the Court to proceed in the litigation
`anonymously and pursuant to a Stipulated Protective Order, and the Court has had a chance to rule
`on that motion. Additionally, a protective order of this nature would comport with Strike 3’s
`admitted policy of respecting privacy in these matters, and Strike 3 indicates that it does not oppose
`entry of such a protective order (but rather Strike 3 welcomes such a protective order). [Dkt. 8 at
`11
`
`Northern District of California
`United States District Court
`
`

`

`Case 3:23-cv-05494-PHK Document 9 Filed 12/29/23 Page 12 of 13
`
`
`
`21].
`
`Accordingly in light of the showing of good cause, and in order to preserve the privacy of
`(and protect from annoyance and embarrassment to) Defendant Doe and any other third parties
`whose information may be produced by AT&T, and further in light of Strike 3’s non-opposition,
`the Court ISSUES a protective order to the limited extent that any information produced by AT&T
`in response to the requested subpoena will be treated as confidential by all parties in this matter,
`following the restrictions for “Confidential” designated material under the Court’s Model Protective
`Order for Standard Litigation. That confidential treatment shall continue until the Court rules upon
`any motion filed by Defendant Doe (or any other impacted third party) to continue confidential
`treatment of that information and, in the case of Defendant Doe, to be allowed to proceed in this
`litigation anonymously. See Strike 3 Holdings, 2018 WL 357287, at *3 (citing IO Grp., Inc. v. Does
`1–19, No. C 10-03851 SI, 2010 WL 5071605, at *2 (N.D. Cal. Dec. 7, 2010)). If Defendant Doe or
`any other third party fails to file a motion for leave to proceed anonymously within thirty days after
`receiving notice from Strike 3 that AT&T has produced their information, Strike 3 may file a motion
`seeking withdrawal or modification of the limited protective order. Cf. Strike 3 Holdings, 2018 WL
`357287 at *3 (citing IO Grp., 2010 WL 5071605, at *3). The Court further

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket