throbber
Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 1 of 13
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Michael O. Stevens, OSB No. 095198
`michael@hillsborofirm.com
`STEVENS & LEGAL, LLC
`3699 NE John Olsen Avenue
`Hillsboro, OR 97124
`Tel: (971) 533-6178
`Fax: (971) 228-2608
`
`J. Curtis Edmondson, CASB No. 236105 (pro hac vice)
`jcedmondson@edmolaw.com
`Kiren Rockenstein, OSB No. 175638
`kirenr@edmolaw.com
`EDMONDSON IP LAW
`3699 NE John Olsen Avenue
`Hillsboro, OR 97124
`Tel: (503) 336-3749
`Fax: (503) 482-7418
`
`David H. Madden, OSB No. 080396
`dhm@mersenne.com
`MERSENNE LAW LLC
`9600 SW Oak Street, Suite 500
`Tigard, OR 97223
`Tel: (503) 679-1671
`Fax: (503) 512-6113
`
`Attorneys for Defendant JOHN HUSZAR
`
`
`
`UNITED STATES DISTRICT COURT
`
`DISTRICT OF OREGON
`
`PORTLAND DIVISION
`
`
`
`DALLAS BUYERS CLUB, LLC,
`
`
`v.
`
`JOHN HUSZAR,
`
`
`
`
`
`
`
`
`Plaintiff,
`
`Defendant.
`
`Case No.: 3:15-cv-0907-AC
`
`DEFENDANT’S MOTION FOR
`SUMMARY JUDGMENT
`
`FRCP 56
`
`ORAL ARGUMENT REQUESTED
`
`
`
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 1
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 2 of 13
`
`NOTICE OF MOTION
`
`Defendant John Huszar (“Huszar”) moves for summary judgment of non-infringement on
`
`the grounds that Huszar has absolute immunity under 17 U.S.C. §§ 512(a) and 512(b) as the
`
`transactions at issue were routed through a Tor Exit Node; Plaintiff Dallas Buyers Club (“DBC”)
`
`failed to produce a true and correct “depository copy” by the close of discovery, precluding DBC
`
`from proving its case under the best evidence rule; and DBC’s torrent monitoring company misled
`
`this Court and other Courts about the quality and integrity of MaverickMonitor. This motion will
`
`be heard before the Honorable John Acosta in the District of Oregon, Federal Courthouse, located
`
`at 1000 SW 3rd Ave #740, Portland, OR 97204 pursuant to the scheduling order at Docket 133.
`
`I.
`
`SUMMARY
`
`
`MEMORANDUM
`
`Huzar moves for summary judgment of non-infringement on the following grounds:
`
`
`
`
`
`
`
`
`II.
`
`Huszar has statutory copyright infringement immunity under 17 U.S.C. §§ 512(a) and
`512(b) for an ISP (internet service provider), as he operated as an ISP with a Tor server;
`and/or
`DBC cannot “prove up” its case as DBC has failed to produce a true and correct “depository
`copy” by the close of discovery. This precludes DBC from satisfying an essential element
`of infringement; and/or
`Any data generated from the “MaverickMonitor” torrent monitoring system cannot be
`relied upon for the purposes of proving any “infringement”. The software was built without
`any formal specifications, has no documentation, has never been tested, and has no reports
`on error rates.
`
`INTRODUCTION
`Huszar is the last defendant in an extensive litigation campaign, stretching from Sydney to
`
`Portland, the long way around, where DBC has sued thousands of defendants for allegedly
`
`downloading the movie Dallas Buyers Club, and has then asked for payments ranging from
`
`$2,000.00 to $10,000.00 for a $2.99 movie. The allegations are the same in all countries –
`
`defendants went to torrent sites, like “PirateBay” and downloaded the movie and infringed. What
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 2
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 3 of 13
`
`these cases have in common, oddly enough, is a software company in Germany, known by various
`
`names, but here known as “Maverickeye” which makes
`
`the “detection” software
`
`“MaverickMonitor”. MaverickMonitor is allegedly the cat’s meow in torrent monitoring
`
`technology.
`
`What distinguishes this case, from the other thousands, is that Huszar ran a Tor Server as
`
`an ISP, giving him statutory immunity. Also, Huszar did not agree with DBC, and rather than take
`
`their assertions at face value that the monitoring software was anything special, he hired an expert
`
`to look at and evaluate the code – Dr. Kal Toth. Dr. Toth’s evaluation is telling; the code is nothing
`
`but a stitched together patchwork of open source software based on “Monotorrent”. Despite the
`
`fact that MaverickMonitor could have chosen to verify the entire movie on the alleged infringer’s
`
`hard drive, MaverickMonitor chose instead to grab only 16KB of raw data to “prove”
`
`infringement. 16KB out of a 4GB movie is a miniscule drop in the bucket, and certainly wholly
`
`insufficient to ‘prove’ infringement.
`
`What is equally strange is despite producing this blockbuster hit, DBC, who has sued
`
`thousands of people, has never had a copy of the depository copy of the movie. The depository
`
`copy was sitting on film reels, likely at Universal Studios. That raises a bigger question – what
`
`was MaverickMonitor looking at when they compared the thousands of infringed works?
`
`III. UNDISPUTED FACTS
`A. There are both a theatrical film version and a DVD version of Dallas Buyers Club
`
`
`
`DBC applied for and received a copyright certificate on the theatrical version of Dallas
`
`Buyers Club. (RJN 1-1). The theatrical version was published on November 1, 2013. Id. Six reels
`
`of film was deposited with the Copyright Office by Carly Seabrook. (RJN 1-2). The theatrical
`
`version of the movie was released in the United States at the Mill Valley Film Festival on October
`
`10, 2013. (RJN 1-3).
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 3
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 4 of 13
`
`The theatrical version was subsequently reedited into a “DVD”. The DVD version of the
`
`film was released on February 4, 2014. (RJN 1-4). The DVD version contains extra material not
`
`present in the theatrical version. (See Vorrath Decl,). Namely, the DVD version contains extra
`
`material not present in the theatrical version.
`
`B. DBC hires MaverickMonitor to track infringements
`
`Beginning in 2013, DBC began a campaign to sue individuals in the United States and
`
`other countries for alleged infringement. Over 300 lawsuits were filed in the United States against
`
`at least 1000 defendants.
`
`The MaverickMonitor software has no formal specifications, no test plan, no user manual,
`
`or any documentation commonly associated with commercial software development. (See Toth
`
`Decl.). There is no documentation describing how the software works in real-time, what type of
`
`computer servers it operates on, how many computer servers it operates on, the failure rate of either
`
`the computer servers and/or the software. There was no documentation on how a particular torrent
`
`is located, how the torrent is processed, how the hash is processed, how data is collected from the
`
`swarm, and how a PCAP (packet capture) is generated. (See Rockenstein Decl., Exhibit 1, Toth
`
`Expert Report)
`
`This software was developed by one or two programmers in German who have had no
`
`formal training in software development or validation processes.
`
`C. Defendant Huszar operates an ISP with Tor installed
`
`Huszar runs a small ISP in Oregon City where he configured a “Tor Exit Relay” using IP
`
`address 173.11.1.241. The Tor virtual machine (VM) was located on a server that also stored
`
`multiple business-related VMs. The Tor VM operated entirely independently and was the only
`
`VM with access to the IP address at issue in this case. (Docket 40 aka Second Huszar Decl. ¶ 17;
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 4
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 5 of 13
`
`Docket 39 aka First Huszar Decl. ¶ 8; Huszar Dep. 47:24-48:2.)
`
`D. This Lawsuit
`
`On May 27, 2015, DBC sued Integrity Computer Systems for the infringement of Dallas
`
`Buyers Club (Docket 1) as a “Doe”. On October 29, 2015, Huszar made a “pro-se” appearance at
`
`Docket 15, stating that his system had no record of the infringing materials. Huszar offered to help
`
`then Plaintiff’s attorney Carl Crowell locate the infringer, but was rebuffed. On November 3, 2015,
`
`Crowell moved to strike Huszar’s appearance; oddly Crowell made no mention that Huszar tried
`
`to cooperate. Then Crowell filed an opposition to Huszar’s motion appearance at docket 15.
`
`(Docket 22). Huszar responded to Crowell’s opposition. (Docket 26). Huszar raised several
`
`defenses, including the DMCA Defense. (Docket 27-1).
`
`The case progressed. An order was entered instructing an adverse jury instruction be
`
`entered. (Docket 95). Discovery was taken on DBC’s 30(b)(6) designee on topics regarding the
`
`“works” (Michael Wickstrom); and the operation of the BitTorrent monitoring system, (Robert
`
`Young).
`
`IV. ARGUMENT
`
`Summary judgment is appropriate “if the pleadings, the discovery and disclosure materials
`
`on file, and any affidavits show that there is no genuine issue as to any material fact and that the
`
`movant is entitled to judgment as a matter of law.” Celotex Corp. v. Catrett, 477 U.S. 317, 323,
`
`106 S. Ct. 2548 (1986). “To establish a claim of copyright infringement by reproduction, the
`
`plaintiff must show ownership of the copyright and copying by the defendant.” Kelly v. Arriba
`
`Soft Corp., 336 F.3d 811, 817 (9th Cir. 2003).
`
`
`1. SUMMARY JUDGMENT IS APPROPRIATE AS HUSZAR OPERATED A
`TOR EXIT NODE; DBC FAILED TO PRODUCE THE DEPOSITORY COPY;
`AND DBC REPEATEDLY MISLED THIS COURT ABOUT THE SOURCE
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 5
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 6 of 13
`
`AND INTEGRITY OF THE BITTORRENT MONITORING SYSTEM
`
`
`A. Huszar has statutory immunity under 17 U.S.C. §§ 512(a) and 512(b)
`
`When the world-wide-web exploded in 1993 with the introduction of the Mozilla web
`
`browser, copyrighted material was passed through ISPs. In 1998, Congress passed the Digital
`
`Millennium Copyright Act (DMCA) to protect computer operators from liability when transitory
`
`material passed through their networks. 17 U.S.C. § 512.
`
`17 U.S.C. § 512(a) states as follows:
`
`(a) Transitory Digital Network Communications.—A service provider shall
`not be liable for monetary relief, or, except as provided in subsection (j), for
`injunctive or other equitable relief, for infringement of copyright by reason
`of the provider’s transmitting, routing, or providing connections for,
`material through a system or network controlled or operated by or for the
`service provider, or by reason of the intermediate and transient storage of
`that material in the course of such transmitting, routing, or providing
`connections, if—
`(1) the transmission of the material was initiated by or at the direction of a
`person other than the service provider;
`(2) the transmission, routing, provision of connections, or storage is carried
`out through an automatic technical process without selection of the material
`by the service provider;
`(3) the service provider does not select the recipients of the material except
`as an automatic response to the request of another person;
`(4) no copy of the material made by the service provider in the course of
`such intermediate or transient storage is maintained on the system or
`network in a manner ordinarily accessible to anyone other than anticipated
`recipients, and no such copy is maintained on the system or network in a
`manner ordinarily accessible to such anticipated recipients for a longer
`period than is reasonably necessary for the transmission, routing, or
`provision of connections; and
`(5) the material is transmitted through the system or network without
`modification of its content.
`
`17 U.S.C. § 512(b) states as follows:
`
`(b) System Caching.—
`(1)Limitation on liability.—A service provider shall not be liable for
`monetary relief, or, except as provided in subsection (j), for injunctive or
`other equitable relief, for infringement of copyright by reason of the
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 6
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 7 of 13
`
`intermediate and temporary storage of material on a system or network
`controlled or operated by or for the service provider in a case in which—
`(A) the material is made available online by a person other than the service
`provider;
`(B) the material is transmitted from the person described in subparagraph
`(A) through the system or network to a person other than the person
`described in subparagraph (A) at the direction of that other person; and
`(C) the storage is carried out through an automatic technical process for the
`purpose of making the material available to users of the system or network
`who, after the material is transmitted as described in subparagraph (B),
`request access to the material from the person described in subparagraph
`(A), if the conditions set forth in paragraph (2) are met.
`
`
`
`
`17 U.S.C. § 512(a), provides broad immunity to service providers that merely serve as
`
`conduits or caching servers for internet communications. As stated in Perfect 10, Inc. v. CCbill
`
`LLC, 488 F.3d 1102 (9th Cir. 2007):
`
`Section 512(a) provides a broad grant of immunity to service providers
`whose connection with the material is transient. When an individual clicks
`on an Internet link, his computer sends a request for the information. The
`company receiving that request sends that request on to another computer,
`which sends it on to another. After a series of such transmissions, the request
`arrives at the computer that stores the information. The requested
`information is then returned in milliseconds, not necessarily along the same
`path. In passing the information along, each intervening computer makes a
`short-lived copy of the data. A short time later, the information is displayed
`on the user's computer.
`
`Tor (The Onion Router) is open source software that allows a person to configure their
`
`
`
`computer to serve as an “exit point” for internet browsing for any other computer on the internet.
`
`(See Edmondson Decl, Exhibits 4 and 5). In short, the software allows a person to act as a public
`
`service “virtual private network”. Tor has many laudable uses, for example, if you are critical of
`
`the Venezuelan government, you can make a post to a political blog from Caracas without having
`
`the security police trace your IP address and throw you in jail. The negative aspect of Tor is that
`
`some people may use it for infringing uses. In either case, the operator of the Tor exit node cannot
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 7
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 8 of 13
`
`monitor the transactions, nor be held responsible for their transmission.
`
`
`
`Plaintiff has made no allegations, nor produced any evidence, that would support its claims
`
`that Huszar did anything besides run an ISP. In fact, Plaintiff admitted as much as explaining that
`
`17 U.S.C. § 512(c) cannot be used as a defense in this case. (See Docket 22). Further, under
`
`examination from Mr. Crowell at Huszar’s deposition, there was no dispute a Tor node was used.
`
`(See Exhibit 1, Huszar Deposition on February 2, 2016).
`
`
`
`Further, this Court recognized Huszar was running a Tor Service as a Service Provider. As
`
`stated at Docket 95:
`
`Defendant decided to stop running the Tor Node because of the demands of
`this lawsuit and Plaintiff’s counsel, and as such Defendant was not
`concerned about migrating the Tor VM or losing the Tor software and
`associated data when he used the RAID tool to overwrite the hard drives in
`an attempt to repair the drives.
`
`What distinguishes this case from the “run of the mill BitTorrent case” is Plaintiff produced
`
`evidence that the alleged infringer was using a Tor Node.
`
`DBC failed to produce the depository copy
`
`B.
`
`To establish a prima facie case of copyright infringement, a plaintiff “must show ownership
`
`of the allegedly infringed material” and “demonstrate that the alleged infringers violated at least
`
`one exclusive right granted to copyright holders under 17 U.S.C. § 106.” A&M Records, Inc. v.
`
`Napster, Inc., 239 F.3d 1004, 1013 (9th Cir. 2001). In order to obtain a copyright registration, an
`
`applicant must deposit as a part of his application a "copy" or "copies" of the original work.
`
`Put simply, DBC must do three things to prove infringement of its movie:
`
`1) Provide the registration certificate;
`
`2) Produce a copy of the work that is the subject of the registration certificate; and
`
`3) Show that Huszar copied (e.g. violated the exclusive right) for that work.
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 8
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 9 of 13
`
`DBC failed to produce evidence regarding the second element – the depository copy that
`
`it needs to make the comparison. Since DBC did not provide these documents to Huszar by the
`
`discovery cutoff, it is precluded from using substitute documents (such as the movies in the .tar
`
`files).
`
`
`
`Federal Rules Evidence (FRE) 1002, states:
`
`An original writing, recording, or photograph is required in order to prove
`its content unless these rules or a federal statute provides otherwise.
`
`FRE 1002 aims to guard against incomplete or fraudulent proof by requiring the possessor
`
`of an original to produce it, unless it can be shown to have been lost or destroyed through no fault
`
`of the proponent. While FRE 1002 has most often been invoked in contract cases, it has also been
`
`invoked in cases dealing with copyright infringement when trying to assess the “substantial
`
`similarity” of an allegedly infringing work to the original. See Seiler v. Lucasfilm, Ltd., 808 F.2d
`
`1316, 1319 (9th Cir. 1987) (“There can be no proof of ‘substantial similarity’ and thus of copyright
`
`infringement unless Seiler’s works are juxtaposed with Lucas’ and their contents compared.”)
`
`(applying the best evidence rule in a copyright action); id. (“[P]roof of the infringement claim
`
`consists of the works alleged to be infringed.”); accord Airframe Sys., Inc. v. L-3 Commc’ns Corp.,
`
`658 F.3d 100, 107 (1st Cir. 2011) (“Having presented no evidence sufficient to prove the content
`
`of its registered source code versions, Airframe cannot show that any of its registered works is
`
`substantially similar to the allegedly infringing M3 program.”); Gen. Universal Sys., Inc. v. Lee,
`
`379 F.3d 131, 146 (5th Cir. 2004) (per curiam) (“Without providing its own source code for
`
`comparison, GUS did not satisfy the requirement that the infringed and infringing work be
`
`compared side-by-side.”).
`
`Absent evidence of the copyrighted work and the allegedly infringing works, the record is
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 9
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 10 of 13
`
`insufficient to allow appellate review of the jury’s verdict. See, e.g., Olson v. Nat’l Broad. Co.,
`
`855 F.2d 1446, 1448, 1451 (9th Cir. 1988) (granting JMOL to copyright defendant because no
`
`reasonable jury could have found substantial similarity); cf. Shaw v. Lindheim, 919 F.2d 1353,
`
`1355 (9th Cir. 1990) (“We have frequently affirmed summary judgment in favor of copyright
`
`defendants on the issue of substantial similarity.”).
`
`The court in Seiler also addressed the issue of the copyright registration stating that while
`
`“Section 410(c) makes the copyright certificate prima facie evidence of "the validity of the
`
`copyright and of the facts stated in the certificate."…”, “None of the statements in the certificate
`
`can be of any use therefore until Seiler proves that the reconstructions are the same as the originals.
`
`Prima facie evidence of statements in the certificate is irrelevant until that proof has been made.”.
`
`During discovery, Huszar requested categories of documents which included the
`
`depository copies (Defendant’s Requests for Production, Second Requests (No. 19)). DBC did not
`
`provide the depository copies. Discovery closed in this case on January 12, 2018, and no depository
`
`copy was provided by this date. It was the responsibility of DBC to provide Huszar with a copy of
`
`the depository works, since the work was not produced, it is impossible for DBC to lay the
`
`foundation for its case, as these documents were not produced in discovery.
`
`DBC may argue that Huszar is required to access the depository directly from the
`
`Copyright Office. The problem with this is that DBC has not provided any evidence that this
`
`depository copy is the same as the version they allege has been infringed. The DVD/online
`
`streaming version are not the original documents. FRE 1002. Since DBC will not have the
`
`copyrighted work available for its case in chief, there is nothing for DBC to “compare against” for
`
`the purpose of proving infringement. DBC’s case fails as a matter of law, and judgment should be
`
`entered in favor of Huszar.
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 10
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 11 of 13
`
`
`
`C.
`
`
`
`Results and data regarding infringement from MaverickEye’s torrent “monitoring”
`software are inadmissible
`
`Huszar requested DBC produce a copy of the source code, documentation, test data, etc.
`
`that was used to monitor Huszar’s IP address. DBC initially objected to this request, but the parties
`
`agreed that the code and any other documents related to the code would be produced.
`
`Huszar retained Dr. Kal Toth who looked at the code and produced a report. Dr. Toth is
`
`eminently qualified to testify on software verification, validation, and reliability having managed
`
`the development of such systems in industry and taught hundreds of students in Portland on
`
`industry standards for the development of reliable software. Dr. Toth did a thorough examination
`
`of the code and found that it is based on an open source computer program known as
`
`“Monotorrent” and “SharpPcap”. There is no real evidence in the code where the programs had
`
`been modified, nor is there any apparent release history documented in the code. Some of Dr.
`
`Toth’s observations from his report are:
`
`¶5.6 - The reliability of MaverickMonitor cannot be assessed without
`objective evidence that recommended patches and updates released by the
`open source development teams, namely, MonoTorrent and SharpPcap,
`have been applied or installed. Such evidence has not been provided.
`
`¶5.7 - MaverickMonitor has a large code base of over 140,0000 lines of
`source code (LOC). This means that the number of latent (undetected)
`defects could be quite large. There is no evidence of effective testing.
`
`¶5.11 - No evidence has been provided that adequate testing was conducted
`during development. Patzer in [3a, Skype Deposition of Michael Patzer,
`October 13, 2016] confirmed that his team did not test the BitTorrent
`software
`to
`verify
`that
`it
`operated
`correctly.
`
`In the absence of verifiable evidence, an objective software professional
`cannot conclude that MaverickMonitor detects the IP addresses of
`infringing BitTorrent users correctly, consistently and reliably.
`
`(See Rockenstein Decl, Exhibit 1, Toth Expert Report)
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 11
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 12 of 13
`
`
`
`At issue here is whether this Court would admit data created by an untested and unverified
`
`computer system. Ultimately, software cannot “testify”, only an expert can testify as to what the
`
`software produces. The Seventh Circuit looked at this issue and denied admissibility of expert
`
`testimony under Daubert where all the expert did was “rely” on advertisements about a software
`
`product. Autotech Technology v. Automationdirect.Com, 471 F.3d 745, 749 (7th Cir. 2006).
`
`Bizarrely, DBC’s fact and expert witness, Robert Young, testified that he never installed and ran
`
`the MaverickMonitor software on any server despite being designated by DBC as its 30(b)(6)
`
`designee on software. (See Exhibit 2, Young Deposition, p. 106:15-18). DBC, a company that used
`
`software to sue thousands of people, has no idea how this software works.
`
`An expert cannot “create” reliable data from an “unreliable” computer system. Perhaps
`
`Maverickmonitor worked 50% of the time. The problem is that we have no idea for this case which
`
`side of the coin was up for Huszar, nor does DBC, or MaverickMonitor. It is, technically speaking,
`
`simply the equivalent of a random number generator, and as such any data generated from the
`
`MaverickMonitor system should be excluded. As such DBC has no data whatsoever to show that
`
`Huszar infringed.
`
`
`
`CONCLUSION
`
`DBC has sued thousands of people in the United States and many more across the world
`
`for the alleged infringements of its movie, Dallas Buyer’s Club. All of this was done using a flawed
`
`and unreliable BitTorrent monitoring system known as MaverickMonitor. If the Court had known
`
`this software was of such poor quality and reliability, would they have even allowed early
`
`discovery under FRCP 26? That is a question that may never be answered since these motions are
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 12
`
`

`

`Case 3:15-cv-00907-AC Document 138 Filed 02/28/18 Page 13 of 13
`
`brought ex-parte before there is any discovery. However, here Huszar demonstrated with an
`
`inspection of the code that MaverickMonitor’s claim of “100% accuracy” is a complete fraud.
`
`Huszar respectfully requests this Court grant his motion for summary judgment and deem
`
`him the prevailing party.
`
`
`
`DATED: February 28, 2018
`
`
`
`
`
`Respectfully submitted,
`
`STEVENS & LEGAL, LLC
`
`
`/s/ Michael O. Stevens
`Michael O. Stevens, OSB No. 095198
`michael@hillsborofirm.com
`Attorney for Defendant
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
`Page 13
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket