12.07.2015 Views

a friend-of-the-court brief in support of the defendants - Reporters ...

a friend-of-the-court brief in support of the defendants - Reporters ...

a friend-of-the-court brief in support of the defendants - Reporters ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Case5:10-cv-05022-LHK Document96 Filed08/31/11 Page4 <strong>of</strong> 7123456789101112131415161718192021222324252627c. The American Civil Liberties Union (“ACLU”) is a nationwide, nonpr<strong>of</strong>it, nonpartisanorganization with over 500,000 members, dedicated to <strong>the</strong> pr<strong>in</strong>ciples <strong>of</strong> liberty and equality embodied<strong>in</strong> <strong>the</strong> Constitution and our nation’s civil rights laws. The American Civil Liberties Foundation <strong>of</strong>Nor<strong>the</strong>rn California is <strong>the</strong> regional affiliate <strong>of</strong> <strong>the</strong> ACLU. Founded <strong>in</strong> 1920, <strong>the</strong> ACLU has vigorouslydefended free speech for over n<strong>in</strong>ety years <strong>in</strong> federal and California <strong>court</strong>s to protect <strong>the</strong> constitutionalguarantees afforded free speech and free expression by <strong>the</strong> First Amendment and by Article 1 sections2 and 3 <strong>of</strong> <strong>the</strong> California Constitution. The ACLU has also been at <strong>the</strong> forefront <strong>in</strong> <strong>support</strong><strong>in</strong>g effortsto ensure that <strong>the</strong> Internet rema<strong>in</strong>s a free and open forum for <strong>the</strong> exchange <strong>of</strong> <strong>in</strong>formation and ideas.ACLU attorneys have represented parties or amici <strong>in</strong> a number <strong>of</strong> cases <strong>in</strong>volv<strong>in</strong>g free speech on <strong>the</strong>Internet, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> follow<strong>in</strong>g: ACLU v. Reno, 521 U.S. 844 (1997); Ashcr<strong>of</strong>t v. ACLU, 535 U.S.564 (2002); Fair Hous<strong>in</strong>g Council <strong>of</strong> San Fernando Valley v. Roommates.Com, LLC, 521 F.3d 1157(9th Cir. 2008) (en banc); Yahoo! Inc. v. La Ligue Contre le Racisme et L'antisemitisme, 433 F.3d1199 (9th Cir. 2006); Barrett v. Rosenthal, 40 Cal.4th 33 (2007); Pavlovich v. Superior Court, 29Cal.4th 262 (2002); O’Grady v. Superior Court, 139 Cal.App.4th 1423 (2006) (<strong>in</strong>volv<strong>in</strong>g right toanonymous speech); Bank Julius Baer & Co. v. Wikileaks, 535 F.Supp.2d 980 (N.D. Cal. 2008).3. S<strong>in</strong>ce <strong>the</strong> turn <strong>of</strong> <strong>the</strong> century, all four amici have sought to encourage <strong>the</strong> development <strong>of</strong>First Amendment precedent requir<strong>in</strong>g <strong>court</strong>s to cast a skeptical eye on subpoenas that seek to compel<strong>the</strong> identification <strong>of</strong> anonymous Internet speakers, and <strong>the</strong>y have been <strong>in</strong>volved <strong>in</strong> many <strong>of</strong> <strong>the</strong> majorcases <strong>in</strong> which <strong>the</strong> standard for decid<strong>in</strong>g whe<strong>the</strong>r to allow or to enforce such subpoenas has beenestablished, beg<strong>in</strong>n<strong>in</strong>g with cases such as Melv<strong>in</strong> v. Doe, 836 A.2d 42 (Pa. 2003); Dendrite v. Doe,775 A.2d 756 (N.J. App. 2001); Doe v. 2<strong>the</strong>Mart.com, 140 F. Supp.2d 1088, 1093 (W.D. Wash.2001), and cont<strong>in</strong>u<strong>in</strong>g <strong>in</strong>to <strong>the</strong> present. E.g., Koch Industries v. Doe, 2011 WL 1775765 (D. Utah May9, 2011); USA Technologies v. Doe, 713 F. Supp.2d 901 (N.D. Cal. 2010). In some <strong>of</strong> <strong>the</strong>se casesamici have represented Does and Internet Service Providers <strong>in</strong> respond<strong>in</strong>g to subpoenas; <strong>in</strong> o<strong>the</strong>rs,amici have appeared as amicus curiae, <strong>of</strong>ten sign<strong>in</strong>g <strong>the</strong> same <strong>brief</strong>.4. Amici have also appeared, largely as amici, <strong>in</strong> many cases <strong>in</strong> which record<strong>in</strong>g companiesand movies companies have sought to identify large numbers <strong>of</strong> anonymous <strong>in</strong>dividuals charged with28 -4-No. CV -10-5022-LHK-HRL, MOTION OF PUBLIC CITIZEN ET AL. FOR LEAVE TO FILE AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96 Filed08/31/11 Page5 <strong>of</strong> 7123456789101112131415161718192021222324252627mak<strong>in</strong>g copies <strong>of</strong> record<strong>in</strong>gs and movies available for download<strong>in</strong>g through file-shar<strong>in</strong>g s<strong>of</strong>tware; <strong>in</strong>those cases, amici have argued for appropriate procedural safeguard<strong>in</strong>g for <strong>the</strong> <strong>defendants</strong>. In MickHaig Productions v. Does 1-670, 3:10-cv-01900-N (N.D. Tex.), attorneys for Public Citizen and EFFwere appo<strong>in</strong>ted as guardians ad litem for <strong>the</strong> anonymous Internet users to respond to a motion forleave to take discovery to identify <strong>the</strong> <strong>defendants</strong> who were sued for allegedly download<strong>in</strong>g apornographic film entitled “Der Gute Onkel.”5. This experience makes amici uniquely well equipped to expla<strong>in</strong> to <strong>the</strong> Court why JudgeLloyd has understated <strong>the</strong> evidentiary requirements imposed on pla<strong>in</strong>tiffs <strong>in</strong> <strong>the</strong> “<strong>in</strong>fr<strong>in</strong>gement-bydownload<strong>in</strong>g”cases and overstated <strong>the</strong> difference between <strong>the</strong> legal standards imposed <strong>in</strong> those casesand <strong>in</strong> <strong>the</strong> o<strong>the</strong>r cases <strong>in</strong>volv<strong>in</strong>g subpoenas to identify anonymous Internet speakers. Amici alsoexpla<strong>in</strong> <strong>the</strong> dangers posed by Judge Lloyd’s adoption <strong>of</strong> a rule that pla<strong>in</strong>tiffs seek<strong>in</strong>g to identify <strong>the</strong>iranonymous critics can evade <strong>the</strong> normal standard for enforcement <strong>of</strong> such subpoenas by chang<strong>in</strong>g <strong>the</strong>name <strong>of</strong> <strong>the</strong> cause <strong>of</strong> action on which those subpoenas are based.6. The Local Rules do not appear to impose any limit on <strong>the</strong> length <strong>of</strong> amicus <strong>brief</strong>s. To <strong>the</strong>extent Local Rule 72-2 applies to this proposed amicus <strong>brief</strong>, amici request that <strong>the</strong> Court grant leaveto exceed that page limit <strong>in</strong> order to provide <strong>the</strong> Court with <strong>the</strong> appropriate background on <strong>the</strong> orig<strong>in</strong>sand development <strong>of</strong> <strong>the</strong> case law concern<strong>in</strong>g <strong>the</strong> right to engage <strong>in</strong> anonymous speech on <strong>the</strong> Internet.7. Counsel for <strong>the</strong> <strong>defendants</strong>, Joshua Koltun, consents to this motion. Counsel for pla<strong>in</strong>tiff,Karl Kronenberg, <strong>in</strong>dicated that pla<strong>in</strong>tiff does not consent to this motion.CONCLUSIONAmici’s motion for leave to file <strong>the</strong> attached <strong>brief</strong> should be granted.Respectfully submitted,/s/ Scott MichelmanPaul Alan Levy (DC Bar No. 946400)Scott Michelman (Bar No. 236574)Public Citizen Litigation GroupEmail: plevy@citizen.orgth1600 20 Street N.W.Wash<strong>in</strong>gton, D.C. 2000928 -5-No. CV -10-5022-LHK-HRL, MOTION OF PUBLIC CITIZEN ET AL. FOR LEAVE TO FILE AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96 Filed08/31/11 Page6 <strong>of</strong> 7123456789101112131415161718192021222324252627August 31, 2011Telephone: 202/588-1000Facsimile: 202/588-7795Aden J. F<strong>in</strong>eAden J. F<strong>in</strong>e (Bar No. 186728)af<strong>in</strong>e@aclu.orgAmerican Civil Liberties Union Foundation125 Broad St., 18th FloorNew York, New York 10004Telephone: 212/549-2693Facsimile: (212) 549-2652/s/ Michael T, RisherMichael T. Risher (Bar No. 191627)Email: mrisher@aclunc.orgAmerican Civil Liberties Union Foundation<strong>of</strong> Nor<strong>the</strong>rn California39 Drumm Street, 2nd FloorSan Francisco, California 94111Telephone: 415/621-2493Facsimile: 415/255-1478/s/ Mat<strong>the</strong>w Zimmerman___________Mat<strong>the</strong>w Zimmerman (Bar No. 212423)mattz@eff.orgElectronic Frontier Foundation454 Shotwell StreetSan Francisco, CA 94110Telephone: 415/436-9333 x127Facsimile: 415/436-9993www.eff.orgAttorneys for Amici Curiae28 -6-No. CV -10-5022-LHK-HRL, MOTION OF PUBLIC CITIZEN ET AL. FOR LEAVE TO FILE AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96 Filed08/31/11 Page7 <strong>of</strong> 7123456CERTIFICATE OF SERVICEI hereby certify that, on this 31st date <strong>of</strong> August, 2011, I filed this Motion for Leave to File asAmici Curiae, and <strong>the</strong> accompany<strong>in</strong>g amicus <strong>brief</strong>, through <strong>the</strong> Court’s ECF system, which will causecopies to be served electronically on counsel for all parties./s/ Mat<strong>the</strong>w ZimmermanMat<strong>the</strong>w Zimmerman (Bar No. 212423)78910111213141516171819202122232425262728 -7-No. CV -10-5022-LHK-HRL, MOTION OF PUBLIC CITIZEN ET AL. FOR LEAVE TO FILE AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page2 <strong>of</strong> 29123456789101112131415161718TABLE OF CONTENTSInterest <strong>of</strong> Amici Curiae ............................................................................................................ 2Summary <strong>of</strong> Argument .............................................................................................................. 5ARGUMENT ............................................................................................................................. 5A. The Constitution Limits Compelled Identification <strong>of</strong> Anonymous InternetSpeakers ................................................................................................................ 5B. The Qualified Privilege for Anonymous Speech Supports a Five-Part Standardfor Identification <strong>of</strong> Doe Defendants That Demands Show<strong>in</strong>gs, Not JustAllegations, and a Balanc<strong>in</strong>g <strong>of</strong> Interests ............................................................. 7C. Consistent Authority <strong>in</strong> This District Requires an Evidentiary Show<strong>in</strong>g, NotJust a Properly Pleaded Compla<strong>in</strong>t ..................................................................... 10D. Cases Involv<strong>in</strong>g Download<strong>in</strong>g <strong>of</strong> Copyrighted Songs and Movies Do NotJustify Adoption <strong>of</strong> a Weaker Standard for Identify<strong>in</strong>g Anonymous Speakers . 12E. Pla<strong>in</strong>tiff Has Not Followed <strong>the</strong> Steps Required Before Identification <strong>of</strong> JohnDoe Speaker May Be Ordered <strong>in</strong> This Case ....................................................... 161. Pla<strong>in</strong>tiff Has Not Produced Sufficient Evidence to Show That It CanSucceed on <strong>the</strong> Merits <strong>of</strong> Its Claim ........................................................ 162. The Balance <strong>of</strong> Interests Tips Decidedly <strong>in</strong> Doe’s Favor ........................ 20CONCLUSION ....................................................................................................................... 2219202122232425262728CASE NO. 10-cv-5022 LHK HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAEii


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page3 <strong>of</strong> 291TABLE OF AUTHORITIES234567891011121314151617181920212223242526CASESAlvis Coat<strong>in</strong>gs v. Does,2004 WL 2904405 (W.D.N.C. Dec. 2, 2004). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10, 19Anonymous Onl<strong>in</strong>e Speakers v. United States District Court,2011 WL 61635 (9th Cir. 2011). ............................................13Arista Records v. Doe 3,604 F.3d 110 (2d Cir.2010).....................................11, 12, 13, 15, 18Ashcraft v. Conoco, Inc.,218 F.3d 282 (4th Cir. 2000).................................................6Assessment Technologies <strong>of</strong> WI v. WIREdata, Inc.,361 F.3d 434 (7th Cir. 2004)................................................22In re Baxter,2001 WL 34806203 (W.D. La. Dec. 20, 2001) .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Best Western Int’l v. Doe,2006 WL 2091695 (D. Ariz. July 25, 2006). ....................................9Bose Corp. v. Consumers Union,466 U.S. 485 (1984).......................................................22Bursey v. United States,466 F.2d 1059 (9th Cir. 1972) . ..............................................5Call <strong>of</strong> <strong>the</strong> Wild Movie v. Does 1-1,062,770 F. Supp.2d 332 (D.D.C. 2011)...........................................13Cervantes v. Time,464 F.2d 986 (8th Cir. 1972)..............................................6, 18Chapl<strong>in</strong>ksy v. New Hampshire,315 U.S. 568 (1942)...................................................... 2City <strong>of</strong> Los Angeles v. Lyons,461 U.S. 95 (1983)........................................................22Columbia Insurance Company v. Seescandy.com,185 F.R.D. 573 (N.D. Cal. 1999).................................... 6, 9, 11, 16Dendrite v. Doe,775 A.2d 756 (N.J. App. 2001).......................................... passimDoe v. Cahill,884 A.2d 451 (Del. 2005). ............................................. passim2728 -iii-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page4 <strong>of</strong> 291234567891011121314151617181920212223242526Doe v. 2<strong>the</strong>Mart.com,140 F. Supp.2d 1088 (W.D. Wash. 2001).......................................6Doe I and II v. Individuals whose true names are unknown,561 F. Supp.2d 249 (D. Conn. 2008).......................................10, 19Down<strong>in</strong>g v. Monitor Publ’g Co.,415 A.2d 683 (N.H. 1980)..................................................18FEC v. Florida for Kennedy Committee,681 F.2d 1281 (11th Cir. 1982).............................................. 5Ealy v. Littlejohn,569 F.2d 219 (5th Cir. 1978).................................................5Fodor v. Doe,2011 WL 1629572 (D. Nev. April 27, 2011).....................................9Ha<strong>in</strong>es v. Liggett Group,975 F.2d 81 (3d Cir. 1992) .................................................21Highfields Capital Management v. Doe,385 F. Supp.2d 969 (N.D. Cal. 2005). ..................................10, 11, 16Immunomedics v. Doe,775 A.2d 773 (N.J. Super. 2001).............................................19Independent Newspapers v. Brodie,966 A.2d 432 (Md. 2009). ..................................................8In re Does 1-10,242 S.W.3d 805 (Tex. App. 2007).............................................8Koch Industries v. Doe,2011 WL 1775765 (D. Utah May 9, 2011)......................................9Kr<strong>in</strong>sky v. Doe 6,72 Cal. Rptr.3d 231 (Cal. App. 2008)..........................................8Lee v. Department <strong>of</strong> Justice,413 F.3d 53 (D.C. Cir. 2005).................................................6Maxon v. Ottawa Publ’g Co.,929 N.E.2d 666 (Ill. App. 2010). .............................................9McIntyre v. Ohio Elec. Cmsn.,514 U.S. 334 (1995)......................................................4, 5Med<strong>in</strong>a-Morales v. Ashcr<strong>of</strong>t,371 F.3d 520 (9th Cir. 2004)................................................222728 -iv-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page5 <strong>of</strong> 29123456789101112131415161718192021222324252627Melv<strong>in</strong> v. Doe,49 Pa. D. & C. 4th 449, 2000 WL 33311704 (Pa. Com. Pl. 2000),app. dism., 789 A.2d 696 (Pa. Super, 2001),rev’d, 836 A.2d 42 (Pa. 2003)................................................9Melv<strong>in</strong> v. Doe,575 Pa. 264, 836 A.2d 42 (2003)..............................................9Missouri ex rel. Classic III v. Ely,954 S.W.2d 650 (Mo. App. 1997)............................................20Mobilisa v. Doe,170 P.3d 712 (Ariz. App. Div. 1 2007)......................................8, 15Mortgage Specialists v. Implode-Explode Heavy Industries,999 A.2d 184 (N.H. 2010)...................................................8Osband v. Woodford,290 F.3d 1036 (9th Cir. 2002)...............................................21Pilchesky v. Gatelli,12 A.3d 430 (Pa.Super. 2011).............................................8, 19Reunion Industries v. Doe 1,80 Pa. D. & C. 4th 449, 2007 WL 1453491 (Pa. Com. Pl. 2007). . . . . . . . . . . . . . . . . . . . 19SaleHoo Group v. Doe,722 F. Supp.2d 1210 (W.D. Wash. 2010).......................................9Shoen v. Shoen,5 F.3d 1289 (9th Cir.1993). .................................................6S<strong>in</strong>clair v. TubeSockTedD,596 F. Supp.2d 128 (D.D.C. 2009)...........................................10Solers v. Doe,977 A.2d 941 (D.C. 2009)...................................................9Sony Music Enterta<strong>in</strong>ment v. Does 1–40,326 F. Supp.2d 556 (S.D.N.Y.2004).................................11, 12, 13, 15Stern v. Marshall,131 S. Ct. 2594, 180 L.Ed.2d 475 (2011). .....................................21Swiger v. Allegheny Energy,2006 WL 1409622 (E.D. Pa. May 19, 2006)....................................17United States v. Curtis,237 F.3d 598 (6th Cir. 2001)................................................21Universal Communication Systems v. Lycos, Inc.,478 F.3d 413 (1st Cir. 2007)................................................1828 -v-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page6 <strong>of</strong> 29123456789101112131415161718192021222324252627USA Technologies v. Doe,713 F. Supp.2d 901 (N.D. Cal. 2010). .........................................9Vernor v. Autodesk, Inc.,621 F.3d 1102 (9th Cir. 2010)...............................................21CONSTITUTION, STATUTES AND RULESConstitutionUnited States Constitution,StatutesTitle III.................................................................21First Amendment..................................................... passim28 U.S.C. § 636................................................................21Computer Fraud and Abuse Act,18 U.S.C. § 1030 .........................................................9Copyright Code,17 U.S.C. § 412..........................................................21RulesFederal Rules <strong>of</strong> Civil ProcedureRule 72.................................................................21Rule 72(a)...............................................................21Local RulesRule 72-2...............................................................21MISCELLANEOUSEisenh<strong>of</strong>er & Liebesman, Caught by <strong>the</strong> Net,10 Bus<strong>in</strong>ess Law Today No. 1 (Sept.-Oct. 2000).. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Fischman, Protect<strong>in</strong>g <strong>the</strong> Value <strong>of</strong> Your Goodwill from Onl<strong>in</strong>e Assault,www.fhdlaw.com/html/ bruce_article.htm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Fischman, Your Corporate Reputation Onl<strong>in</strong>e,www.fhdlaw.com/html/corporate reputation.htm .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Human Rights USA, US Citizen Sues Web Host<strong>in</strong>g Company for Identify<strong>in</strong>g Him toThai Government,http://humanrightsusa.org/<strong>in</strong>dex.php?option=com_content& task=view&id=227&Itemid=189. .....................................................20Lessig, The Law <strong>of</strong> <strong>the</strong> Horse: What Cyber Law Might Teach,113 Harv. L. Rev. 501, 504-505 (1999).........................................528 -vi-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page7 <strong>of</strong> 291234Thompson, On <strong>the</strong> Net, <strong>in</strong> <strong>the</strong> Dark,California Law Week, Volume 1, No. 9, at 16, 18 (1999).. . . . . . . . . . . . . . . . . . . . . . . . . 16Werthammer, RNN Sues Yahoo Over Negative Web Site,Daily Freeman, November 21, 2000, www.zwire.com/site/news.cfm?newsid=1098427&BRD=1769&PAG=461&dept_id =4969&rfi=8. . . . . . . . . . . . . . . . . . . . . . . . . 165678910111213141516171819202122232425262728 -vii-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page8 <strong>of</strong> 29123456789101112131415161718192021222324252627This appeal <strong>in</strong>volves an issue which, until <strong>the</strong> magistrate judge’s rul<strong>in</strong>g <strong>in</strong> this case, has beenaddressed consistently by state appellate <strong>court</strong>s and federal trial <strong>court</strong>s across <strong>the</strong> country: whatprocedures apply, and what show<strong>in</strong>gs are required, when a pla<strong>in</strong>tiff asserts a claim for defamation orsome o<strong>the</strong>r tort based on anonymous onl<strong>in</strong>e speech and seeks to identify <strong>the</strong> anonymous speaker?Based on <strong>the</strong> well-accepted First Amendment right to speak anonymously, and recogniz<strong>in</strong>g that FirstAmendment rights cannot be <strong>in</strong>fr<strong>in</strong>ged without a compell<strong>in</strong>g state <strong>in</strong>terest, <strong>the</strong>se <strong>court</strong>s have uniformlyheld that anonymous would-be <strong>defendants</strong> must be notified <strong>of</strong> <strong>the</strong> threat to <strong>the</strong>ir First Amendmentright to speak anonymously, would-be pla<strong>in</strong>tiffs must make both a legal and an evidentiary show<strong>in</strong>g<strong>of</strong> merit before government power may be deployed to identify anonymous critics, and <strong>the</strong> <strong>court</strong> mustbalance <strong>the</strong> <strong>in</strong>terests <strong>of</strong> <strong>the</strong> pla<strong>in</strong>tiff <strong>in</strong> secur<strong>in</strong>g relief from genu<strong>in</strong>e harm based on a real violation <strong>of</strong>his rights, and <strong>of</strong> <strong>the</strong> defendant <strong>in</strong> rema<strong>in</strong><strong>in</strong>g anonymous. The magistrate judge’s decision <strong>in</strong> <strong>the</strong> caseat bar conflicts with <strong>the</strong>se pr<strong>in</strong>ciples and should not stand.This case began as an action for defamation by <strong>the</strong> United States chapter <strong>of</strong> “Art <strong>of</strong> Liv<strong>in</strong>g”(“AoL”), an <strong>in</strong>ternational “nondenom<strong>in</strong>ational” organization “dedicated to <strong>the</strong> teach<strong>in</strong>gs <strong>of</strong> HisHol<strong>in</strong>ess Sri Sri Ravi Shankar.” DN 37 at 2; Compla<strong>in</strong>t 16, 23. The anonymous <strong>defendants</strong> areformer members <strong>of</strong> <strong>the</strong> AoL movement, resident abroad, who publish two blogs that savage pla<strong>in</strong>tiffas a religious cult that rips <strong>of</strong>f its adherents, and that seek to demystify AoL’s teach<strong>in</strong>gs which, <strong>the</strong>ycontend, are ei<strong>the</strong>r glorified versions <strong>of</strong> well-known yoga techniques or utter bunk. See generally,Request for Judicial Notice, DN 29-2, 29-3. In addition to publish<strong>in</strong>g <strong>the</strong>ir own critical comments,<strong>defendants</strong> provided a forum for comments by o<strong>the</strong>r anonymous critics, some <strong>of</strong> whom have also beennamed as anonymous <strong>defendants</strong>. Id. In addition to br<strong>in</strong>g<strong>in</strong>g defamation claims, pla<strong>in</strong>tiff allegedpost<strong>in</strong>g <strong>the</strong> “Breath Water Sound” manual <strong>in</strong>fr<strong>in</strong>ged <strong>the</strong> pla<strong>in</strong>tiff’s copyright, and that <strong>the</strong> manualsconta<strong>in</strong><strong>in</strong>g <strong>the</strong> “teach<strong>in</strong>gs” are trade secrets. Pla<strong>in</strong>tiff issued subpoenas for <strong>the</strong> identities <strong>of</strong> <strong>the</strong>bloggers and commenters, and sought an <strong>in</strong>junction compell<strong>in</strong>g removal <strong>of</strong> <strong>the</strong> entire blogs from <strong>the</strong>Internet, as well as compensatory and punitive damages.After this Court dismissed pla<strong>in</strong>tiff’s defamation claims, DN 83, pla<strong>in</strong>tiff amended itscompla<strong>in</strong>t to drop <strong>the</strong> defamation claims, DN 85, but still sought to identify <strong>the</strong> defendant bloggers.28No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page9 <strong>of</strong> 29123456789101112131415161718192021222324252627Magistrate Judge Lloyd granted discovery to identify one <strong>of</strong> <strong>the</strong> two bloggers based on <strong>the</strong> copyrightclaims alone, DN 90, predicated on an erroneous legal conclusion.Well-established precedent <strong>in</strong> state and federal <strong>court</strong>s throughout <strong>the</strong> United States requiresa <strong>court</strong> to balance a pla<strong>in</strong>tiff’s <strong>in</strong>terest <strong>in</strong> proceed<strong>in</strong>g with a valid lawsuit aga<strong>in</strong>st <strong>the</strong> First Amendmentright <strong>of</strong> anonymous speakers to reta<strong>in</strong> <strong>the</strong>ir anonymity by requir<strong>in</strong>g pla<strong>in</strong>tiffs to produce evidence—not mere allegations <strong>in</strong> a compla<strong>in</strong>t—show<strong>in</strong>g that <strong>the</strong>re is a realistic chance that <strong>the</strong> lawsuit willbe successful. Judge Lloyd decl<strong>in</strong>ed to apply that authority because he concluded that copyright issomehow different, and that when a pla<strong>in</strong>tiff sues for copyright <strong>in</strong>fr<strong>in</strong>gement, it is sufficient thatpla<strong>in</strong>tiff allege key factual po<strong>in</strong>ts. Id. at 6. Amici, who have played a lead<strong>in</strong>g role <strong>in</strong> develop<strong>in</strong>g <strong>the</strong>national consensus standard regard<strong>in</strong>g <strong>the</strong> test for identify<strong>in</strong>g anonymous Internet speakers, and havealso been deeply <strong>in</strong>volved <strong>in</strong> anonymous speech cases <strong>in</strong>volv<strong>in</strong>g claims <strong>of</strong> copyright <strong>in</strong>fr<strong>in</strong>gement,submit this <strong>brief</strong> to expla<strong>in</strong> why Judge Lloyd’s analysis should be rejected.INTEREST OF AMICI CURIAEAs more fully set forth <strong>in</strong> <strong>the</strong> motion for leave to file as amici curiae, Public Citizen is aconsumer advocacy organization, and <strong>the</strong> ACLU, ACLU Foundation <strong>of</strong> Nor<strong>the</strong>rn California, andElectronic Frontier Foundation are civil liberties organizations. Amici work on a range <strong>of</strong> issues;among those issues is <strong>the</strong> right <strong>of</strong> Internet users to speak anonymously so long as <strong>the</strong>y have done nowrong. S<strong>in</strong>ce <strong>the</strong> turn <strong>of</strong> <strong>the</strong> century, amici have sought to encourage <strong>the</strong> development <strong>of</strong> FirstAmendment precedent requir<strong>in</strong>g <strong>court</strong>s to cast a skeptical eye on subpoenas that seek to compel <strong>the</strong>identification <strong>of</strong> anonymous Internet speakers, and <strong>the</strong>y have been <strong>in</strong>volved <strong>in</strong> many <strong>of</strong> <strong>the</strong> major cases<strong>in</strong> which <strong>the</strong> standard for decid<strong>in</strong>g whe<strong>the</strong>r to allow or to enforce such subpoenas has been established.Amici have also appeared, largely as amici, <strong>in</strong> many cases <strong>in</strong> which record<strong>in</strong>g companies and moviescompanies have sought to identify large numbers <strong>of</strong> anonymous <strong>in</strong>dividuals charged with mak<strong>in</strong>gcopies <strong>of</strong> record<strong>in</strong>gs and movies available for download<strong>in</strong>g through file-shar<strong>in</strong>g s<strong>of</strong>tware; <strong>in</strong> thosecases, amici have argued for appropriate procedural safeguards for <strong>the</strong> <strong>defendants</strong>. This experiencemakes amici uniquely well equipped to expla<strong>in</strong> why Judge Lloyd has understated <strong>the</strong> evidentiaryrequirements imposed on pla<strong>in</strong>tiffs <strong>in</strong> <strong>the</strong> “<strong>in</strong>fr<strong>in</strong>gement-by-download<strong>in</strong>g” cases and overstated <strong>the</strong>28 -2-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page10 <strong>of</strong> 2912345678910111213141516171819202122232425difference between <strong>the</strong> legal standards <strong>in</strong> <strong>the</strong> two classes <strong>of</strong> cases. Amici also expla<strong>in</strong> <strong>the</strong> dangersposed by Judge Lloyd’s adoption <strong>of</strong> a rule that pla<strong>in</strong>tiffs seek<strong>in</strong>g to identify <strong>the</strong>ir anonymous criticscan evade <strong>the</strong> normal standard for enforcement <strong>of</strong> such subpoenas by chang<strong>in</strong>g <strong>the</strong> name <strong>of</strong> <strong>the</strong> cause<strong>of</strong> action on which those subpoenas are based.SUMMARY OF ARGUMENTFederal and state <strong>court</strong>s throughout <strong>the</strong> country have applied well-accepted First Amendment1/pr<strong>in</strong>ciples to cases such as this one and have held, follow<strong>in</strong>g <strong>the</strong> so-called Dendrite test, thatanonymous would-be <strong>defendants</strong> must be notified <strong>of</strong> <strong>the</strong> threat to <strong>the</strong>ir First Amendment right to speakanonymously, would-be pla<strong>in</strong>tiffs must make both a legal and an evidentiary show<strong>in</strong>g <strong>of</strong> merit beforegovernment power may be deployed to identify anonymous critics, and <strong>the</strong> <strong>court</strong> must balance <strong>the</strong><strong>in</strong>terests <strong>of</strong> <strong>the</strong> pla<strong>in</strong>tiff <strong>in</strong> secur<strong>in</strong>g relief from genu<strong>in</strong>e harm based on a real violation <strong>of</strong> his rights,and <strong>of</strong> <strong>the</strong> defendant <strong>in</strong> rema<strong>in</strong><strong>in</strong>g anonymous.The pr<strong>in</strong>cipal advantage <strong>of</strong> <strong>the</strong> Dendrite test is its flexibility. It balances <strong>the</strong> <strong>in</strong>terests <strong>of</strong> <strong>the</strong>pla<strong>in</strong>tiff who claims to have been wronged aga<strong>in</strong>st <strong>the</strong> <strong>in</strong>terest <strong>in</strong> anonymity <strong>of</strong> <strong>the</strong> Internet speakerwho claims to have done no wrong. In that way, it provides for a prelim<strong>in</strong>ary determ<strong>in</strong>ation based ona case-by-case, <strong>in</strong>dividualized assessment <strong>of</strong> <strong>the</strong> equities. It avoids creat<strong>in</strong>g a false dichotomy betweenprotection for anonymity and <strong>the</strong> right <strong>of</strong> victims to be compensated for <strong>the</strong>ir harms. It ensures thatonl<strong>in</strong>e speakers who engage <strong>in</strong> flagrant <strong>in</strong>fr<strong>in</strong>gement <strong>of</strong> <strong>in</strong>tellectual property rights or who makeactionable statements about public figures, companies, or private <strong>in</strong>dividuals will not be immune fromidentification and from be<strong>in</strong>g brought to justice. At <strong>the</strong> same time, <strong>the</strong> standard helps ensure thatpersons with legitimate reasons for us<strong>in</strong>g o<strong>the</strong>rs’ <strong>in</strong>tellectual property, or for criticiz<strong>in</strong>g public figures,will be allowed to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> secrecy <strong>of</strong> <strong>the</strong>ir identity as <strong>the</strong> First Amendment allows.The Dendrite test also has <strong>the</strong> advantage <strong>of</strong> discourag<strong>in</strong>g lawsuits whose real objective is <strong>the</strong>“out<strong>in</strong>g” <strong>of</strong> anonymous speakers. In <strong>the</strong> first few years <strong>of</strong> <strong>the</strong> Internet, thousands <strong>of</strong> lawsuits werefiled seek<strong>in</strong>g to identify onl<strong>in</strong>e speakers, and enforcement <strong>of</strong> subpoenas was almost automatic. ISPs2627281/Dendrite Int’l v. Doe, 775 A.2d 756 (N.J. App.2001).-3-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page11 <strong>of</strong> 29123456789101112131415161718192021222324252627reported stagger<strong>in</strong>g statistics about <strong>the</strong> number <strong>of</strong> subpoenas <strong>the</strong>y received. Although no firm numberscan be cited, experience leads amicus to believe that <strong>the</strong> number <strong>of</strong> suits be<strong>in</strong>g filed to identify onl<strong>in</strong>espeakers dropped after Dendrite was decided. Decisions that adopted strict legal and evidentiarystandards for defendant identification sent a signal to would-be pla<strong>in</strong>tiffs and <strong>the</strong>ir counsel to stop andth<strong>in</strong>k before <strong>the</strong>y sue. At <strong>the</strong> same time, <strong>the</strong> identification <strong>of</strong> many onl<strong>in</strong>e speakers, and publicityabout verdicts aga<strong>in</strong>st formerly anonymous <strong>defendants</strong>, discouraged some would-be posters from<strong>in</strong>dulg<strong>in</strong>g <strong>in</strong> <strong>the</strong> sort <strong>of</strong> Wild West behavior that once prevailed.Judge Lloyd decided not to follow <strong>the</strong> Dendrite l<strong>in</strong>e <strong>of</strong> cases because copyright <strong>in</strong>fr<strong>in</strong>gementis not protected by <strong>the</strong> First Amendment and, he thought, federal <strong>court</strong>s apply a different standard <strong>in</strong>such cases. But Judge Lloyd applied a false dichotomy – nei<strong>the</strong>r defamation, nor trademark<strong>in</strong>fr<strong>in</strong>gement, nor any <strong>of</strong> <strong>the</strong> o<strong>the</strong>r allegedly wrongful speech at issue <strong>in</strong> <strong>the</strong> Dendrite l<strong>in</strong>e <strong>of</strong> cases isprotected by <strong>the</strong> First Amendment, but that has never been taken as a reason why pla<strong>in</strong>tiffs alleg<strong>in</strong>gsuch wrongdo<strong>in</strong>g should be able to obta<strong>in</strong> <strong>the</strong>ir critics’ identities based on mere allegations, withouta show<strong>in</strong>g <strong>of</strong> wrongdo<strong>in</strong>g. The cases on which Judge Lloyd relied effectively applied a Dendrite-typebalanc<strong>in</strong>g analysis because <strong>the</strong>y deemed <strong>the</strong> speech at issue to be low-value speech, but <strong>the</strong> reason why<strong>the</strong> speech was devalued was not simply that <strong>in</strong>fr<strong>in</strong>gement was <strong>the</strong> cause <strong>of</strong> action, but because <strong>of</strong> <strong>the</strong>nature <strong>of</strong> <strong>the</strong> speech — mak<strong>in</strong>g hundred <strong>of</strong> musical record<strong>in</strong>gs or copyrighted movies available fordownload without any use <strong>of</strong> <strong>the</strong> songs for commentary on an issue <strong>of</strong> public <strong>in</strong>terest, much lesstransformative use <strong>of</strong> <strong>the</strong> material. Here, <strong>in</strong> contrast, <strong>the</strong> materials are used to <strong>support</strong> an argumentthat AoL is not what it appears and to allow for commentary on that argument. And even <strong>in</strong> cases<strong>in</strong>volv<strong>in</strong>g non-transformative music downloads, <strong>the</strong> pla<strong>in</strong>tiffs provided not just allegations <strong>of</strong><strong>in</strong>fr<strong>in</strong>gement but admissible evidence arguably sufficient to make out a case <strong>of</strong> <strong>in</strong>fr<strong>in</strong>gement aga<strong>in</strong>steach <strong>of</strong> <strong>the</strong> <strong>defendants</strong>, and <strong>the</strong> <strong>court</strong>s weighed <strong>the</strong> <strong>in</strong>terests <strong>of</strong> copyright holders <strong>in</strong> prevent<strong>in</strong>gwidespread <strong>in</strong>fr<strong>in</strong>gement aga<strong>in</strong>st <strong>the</strong> <strong>in</strong>terests <strong>of</strong> <strong>the</strong> alleged downloaders. Yet Judge Lloyd acceptedmere allegations on a key issue, <strong>the</strong> existence <strong>of</strong> actual harm, and conducted no balanc<strong>in</strong>g <strong>of</strong> <strong>the</strong>parties’ respective <strong>in</strong>terests. Consequently, his analysis should be rejected and his order grant<strong>in</strong>gpla<strong>in</strong>tiff’s discovery motion should be reversed.28 -4-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page12 <strong>of</strong> 29123456789101112131415161718192021222324252627ARGUMENTA. The Constitution Limits Compelled Identification <strong>of</strong> AnonymousInternet Speakers.The First Amendment protects <strong>the</strong> right to speak anonymously:[A]n author is generally free to decide whe<strong>the</strong>r or not to disclose his or her trueidentity. The decision <strong>in</strong> favor <strong>of</strong> anonymity may be motivated by fear <strong>of</strong> economicor <strong>of</strong>ficial retaliation, by concern about social ostracism, or merely by a desire topreserve as much <strong>of</strong> one’s privacy as possible. Whatever <strong>the</strong> motivation may be . . .<strong>the</strong> <strong>in</strong>terest <strong>in</strong> hav<strong>in</strong>g anonymous works enter <strong>the</strong> marketplace <strong>of</strong> ideas unquestionablyoutweighs any public <strong>in</strong>terest <strong>in</strong> requir<strong>in</strong>g disclosure as a condition <strong>of</strong> entry.Accord<strong>in</strong>gly, an author’s decision to rema<strong>in</strong> anonymous, like o<strong>the</strong>r decisionsconcern<strong>in</strong>g omissions or additions to <strong>the</strong> content <strong>of</strong> a publication, is an aspect <strong>of</strong><strong>the</strong> freedom <strong>of</strong> speech protected by <strong>the</strong> First Amendment.* * *Under our Constitution, anonymous pamphleteer<strong>in</strong>g is not a pernicious, fraudulentpractice, but an honorable tradition <strong>of</strong> advocacy and <strong>of</strong> dissent.McIntyre v. Ohio Elec. Cmsn., 514 U.S. 334, 341-342, 356 (1995) (emphasis added).Internet speakers may choose to speak anonymously for a variety <strong>of</strong> reasons. They may wishto avoid hav<strong>in</strong>g <strong>the</strong>ir views stereotyped accord<strong>in</strong>g to <strong>the</strong>ir racial, ethnic or class characteristics, or<strong>the</strong>ir gender. They may be associated with an organization but want to express an op<strong>in</strong>ion <strong>of</strong> <strong>the</strong>irown, without runn<strong>in</strong>g <strong>the</strong> risk that, despite <strong>the</strong> standard disclaimer aga<strong>in</strong>st attribution <strong>of</strong> op<strong>in</strong>ions to<strong>the</strong> group, readers will assume that <strong>the</strong> group feels <strong>the</strong> same way. They may want to say or implyth<strong>in</strong>gs about <strong>the</strong>mselves that <strong>the</strong>y are unwill<strong>in</strong>g to disclose o<strong>the</strong>rwise. And <strong>the</strong>y may wish to sayth<strong>in</strong>gs that might make o<strong>the</strong>r people angry and stir a desire for retaliation.Although <strong>the</strong> Internet allows anonymous communication, it creates an unparalleled capacityto monitor every speaker and to discover his or her identity. Because <strong>of</strong> <strong>the</strong> Internet’s technology,any speaker who sends an e-mail or visits a website leaves an electronic footpr<strong>in</strong>t that, if saved by <strong>the</strong>recipient, starts a path that can be traced back to <strong>the</strong> orig<strong>in</strong>al sender. See Lessig, The Law <strong>of</strong> <strong>the</strong>Horse: What Cyber Law Might Teach, 113 Harv. L. Rev. 501, 504-505 (1999). Thus, anybody wi<strong>the</strong>nough time, resources and <strong>in</strong>terest, if coupled with <strong>the</strong> power to compel disclosure <strong>of</strong> <strong>the</strong><strong>in</strong>formation, can learn who is say<strong>in</strong>g what to whom. To avoid <strong>the</strong> Big Bro<strong>the</strong>r implications <strong>of</strong>unlimited enforcement <strong>of</strong> such power to uncover <strong>the</strong> identities <strong>of</strong> anonymous Internet speakers whohave done noth<strong>in</strong>g but exercise <strong>the</strong>ir First Amendment rights, <strong>the</strong> law must allow such subpoenas only28 -5-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page13 <strong>of</strong> 29123456789101112131415161718192021222324252627where <strong>the</strong> party seek<strong>in</strong>g disclosure can make some evidentiary show<strong>in</strong>g that <strong>the</strong> lawsuit has actualmerit, when <strong>the</strong> balance <strong>of</strong> <strong>the</strong> parties’ <strong>in</strong>terests warrants such disclosure.The <strong>court</strong>s have recognized <strong>the</strong> serious chill<strong>in</strong>g effect that subpoenas seek<strong>in</strong>g to identifyanonymous speakers can have on dissenters and <strong>the</strong> First Amendment <strong>in</strong>terests that are implicatedby such subpoenas. E.g., FEC v. Florida for Kennedy Committee, 681 F.2d 1281, 1284-1285 (11thCir. 1982); Ealy v. Littlejohn, 569 F.2d 219, 226-230 (5th Cir. 1978); Bursey v. United States, 466F.2d 1059, 1084-1086 (9th Cir. 1972). In an analogous area <strong>of</strong> law, <strong>court</strong>s developed a standard forcompelled disclosure <strong>of</strong> <strong>the</strong> sources <strong>of</strong> libelous speech, recogniz<strong>in</strong>g a qualified privilege aga<strong>in</strong>stdisclosure <strong>of</strong> o<strong>the</strong>rwise anonymous sources. In those cases, <strong>court</strong>s apply a three-part test, under whicha litigant seek<strong>in</strong>g to identify an anonymous speaker has <strong>the</strong> burden <strong>of</strong> show<strong>in</strong>g that (1) <strong>the</strong> issue onwhich <strong>the</strong> material is sought is not just relevant to <strong>the</strong> action, but goes to <strong>the</strong> heart <strong>of</strong> <strong>the</strong> case; (2)disclosure <strong>of</strong> <strong>the</strong> source to prove <strong>the</strong> issue is “necessary” because <strong>the</strong> party seek<strong>in</strong>g disclosure is likelyto prevail on all <strong>the</strong> o<strong>the</strong>r issues <strong>in</strong> <strong>the</strong> case; and (3) <strong>the</strong> discover<strong>in</strong>g party has exhausted all o<strong>the</strong>rmeans <strong>of</strong> prov<strong>in</strong>g this part <strong>of</strong> his case. Lee v. Department <strong>of</strong> Justice, 413 F.3d 53, 60 (D.C. Cir.2005); Ashcraft v. Conoco, Inc., 218 F.3d 282, 288 (4th Cir. 2000); Shoen v. Shoen, 5 F.3d 1289 (9thCir.1993); Cervantes v. Time, 464 F.2d 986 (8th Cir. 1972).As one <strong>court</strong> said <strong>in</strong> refus<strong>in</strong>g to order identification <strong>of</strong> anonymous Internet speakers whoseidentities were allegedly relevant to <strong>the</strong> defense aga<strong>in</strong>st a shareholder derivative suit, “If Internet userscould be stripped <strong>of</strong> that anonymity by a civil subpoena enforced under <strong>the</strong> liberal rules <strong>of</strong> civildiscovery, this would have a significant chill<strong>in</strong>g effect on Internet communications and thus on basicFirst Amendment rights.” Doe v. 2<strong>the</strong>Mart.com, 140 F. Supp.2d 1088, 1093 (W.D. Wash. 2001). Seealso Columbia Insurance Co. v. Seescandy.com, 185 F.R.D. 573, 578 (N.D. Cal. 1999):People are permitted to <strong>in</strong>teract pseudonymously and anonymously with eacho<strong>the</strong>r so long as those acts are not <strong>in</strong> violation <strong>of</strong> <strong>the</strong> law. This ability to speak one’sm<strong>in</strong>d without <strong>the</strong> burden <strong>of</strong> <strong>the</strong> o<strong>the</strong>r party know<strong>in</strong>g all <strong>the</strong> facts about one’s identitycan foster open communication and robust debate. . . . People who have committedno wrong should be able to participate onl<strong>in</strong>e without fear that someone whowishes to harass or embarrass <strong>the</strong>m can file a frivolous lawsuit and <strong>the</strong>reby ga<strong>in</strong><strong>the</strong> power <strong>of</strong> <strong>the</strong> <strong>court</strong>’s order to discover <strong>the</strong>ir identities.(emphasis added).28 -6-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page14 <strong>of</strong> 29123456789101112131415161718192021222324252627B. The Qualified Privilege for Anonymous Speech Supports a Five-PartStandard for Identification <strong>of</strong> Doe Defendants That Demands Show<strong>in</strong>gs,Not Just Allegations, and Balanc<strong>in</strong>g Interests.Apply<strong>in</strong>g <strong>the</strong>se concerns, <strong>court</strong>s have recognized that <strong>the</strong> mere fact that a pla<strong>in</strong>tiff has fileda lawsuit over a particular piece <strong>of</strong> speech does not create a compell<strong>in</strong>g government <strong>in</strong>terest <strong>in</strong> tak<strong>in</strong>gaway <strong>the</strong> defendant’s anonymity. The challenge for <strong>court</strong>s is to f<strong>in</strong>d a standard that makes it nei<strong>the</strong>rtoo easy nor too hard to identify anonymous speakers. Sett<strong>in</strong>g <strong>the</strong> bar “too low will chill potentialposters from exercis<strong>in</strong>g <strong>the</strong>ir First Amendment right to speak anonymously. The possibility <strong>of</strong> los<strong>in</strong>ganonymity <strong>in</strong> a future lawsuit could <strong>in</strong>timidate anonymous posters <strong>in</strong>to self-censor<strong>in</strong>g <strong>the</strong>ir commentsor simply not comment<strong>in</strong>g at all.” Doe v. Cahill, 884 A.2d 451, 457 (Del. 2005). But sett<strong>in</strong>g <strong>the</strong> bartoo high will make it impossible for pla<strong>in</strong>tiffs with perfectly valid claims to identify wrongdoers andproceed with <strong>the</strong>ir cases.Court have drawn on <strong>the</strong> media’s privilege aga<strong>in</strong>st reveal<strong>in</strong>g sources <strong>in</strong> civil cases to enunciatea similar rule protect<strong>in</strong>g aga<strong>in</strong>st <strong>the</strong> identification <strong>of</strong> anonymous Internet speakers. The lead<strong>in</strong>gdecision on this subject, Dendrite v. Doe, 775 A.2d 756 (N.J. App. 2001), established a five-partstandard that been a model followed or adapted throughout <strong>the</strong> country:1. Give Notice: Courts require <strong>the</strong> pla<strong>in</strong>tiff (and sometimes <strong>the</strong> Internet ServiceProvider) to provide reasonable notice to <strong>the</strong> potential <strong>defendants</strong> and an opportunityfor <strong>the</strong>m to defend <strong>the</strong>ir anonymity before issuance <strong>of</strong> any subpoena.2. Require Specificity: Courts require <strong>the</strong> pla<strong>in</strong>tiff to allege with specificity <strong>the</strong>speech or conduct that has allegedly violated its rights.3. Ensure Facial Validity: Courts review each claim <strong>in</strong> <strong>the</strong> compla<strong>in</strong>t to ensure thatit states a cause <strong>of</strong> action upon which relief may be granted based on each statementand aga<strong>in</strong>st each defendant.4. Require An Evidentiary Show<strong>in</strong>g: Courts require <strong>the</strong> pla<strong>in</strong>tiff to produceevidence <strong>support</strong><strong>in</strong>g each element <strong>of</strong> its claims.5. Balance <strong>the</strong> Equities: Weigh <strong>the</strong> potential harm (if any) to <strong>the</strong> pla<strong>in</strong>tiff frombe<strong>in</strong>g unable to proceed aga<strong>in</strong>st <strong>the</strong> harm to <strong>the</strong> defendant from los<strong>in</strong>g <strong>the</strong> FirstAmendment right to anonymity.Id. at 760-61.A somewhat less exact<strong>in</strong>g standard, formulated <strong>in</strong> Cahill, requires <strong>the</strong> submission <strong>of</strong> evidenceto <strong>support</strong> <strong>the</strong> pla<strong>in</strong>tiff’s claims, but not an explicit balanc<strong>in</strong>g <strong>of</strong> <strong>in</strong>terests after <strong>the</strong> evidence is deemed28 -7-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page15 <strong>of</strong> 29123456789101112131415161718192021222324252627o<strong>the</strong>rwise sufficient to <strong>support</strong> discovery. Cahill, 884 A.2d 451. In Cahill, <strong>the</strong> Delaware SuperiorCourt had ruled that a town councilman who sued over statements attack<strong>in</strong>g his fitness to hold <strong>of</strong>ficecould identify <strong>the</strong> anonymous posters so long as he was not proceed<strong>in</strong>g <strong>in</strong> bad faith and couldestablish that <strong>the</strong> statements about him were actionable because <strong>the</strong>y might have a defamatorymean<strong>in</strong>g. However, <strong>the</strong> Delaware Supreme Court ruled that a pla<strong>in</strong>tiff must put forward evidencesufficient to establish a prima facie case on all elements <strong>of</strong> a defamation claim that ought to be with<strong>in</strong>his control without discovery, <strong>in</strong>clud<strong>in</strong>g that <strong>the</strong> statements are false. The Cahill <strong>court</strong> rejected <strong>the</strong>f<strong>in</strong>al “balanc<strong>in</strong>g” stage <strong>of</strong> <strong>the</strong> Dendrite standard.All <strong>of</strong> <strong>the</strong> o<strong>the</strong>r state appellate <strong>court</strong>s, plus several federal district <strong>court</strong>s, that have addressed<strong>the</strong> issue <strong>of</strong> subpoenas to identify anonymous Internet speakers have adopted some variant <strong>of</strong> <strong>the</strong>Dendrite or Cahill standards. Several <strong>court</strong>s expressly endorse <strong>the</strong> Dendrite test, requir<strong>in</strong>g notice andopportunity to respond, legally valid claims, evidence <strong>support</strong><strong>in</strong>g those claims, and f<strong>in</strong>ally an explicitbalanc<strong>in</strong>g <strong>of</strong> <strong>the</strong> reasons <strong>support</strong><strong>in</strong>g disclosure and <strong>the</strong> reasons <strong>support</strong><strong>in</strong>g cont<strong>in</strong>ued anonymity.These decisions <strong>in</strong>clude:Mobilisa v. Doe, 170 P.3d 712 (Ariz. App. 2007), where a private company sought toidentify <strong>the</strong> sender <strong>of</strong> an anonymous email message who had allegedly hacked <strong>in</strong>to <strong>the</strong>company’s computers to obta<strong>in</strong> <strong>in</strong>formation that was conveyed <strong>in</strong> <strong>the</strong> message.Directly follow<strong>in</strong>g <strong>the</strong> Dendrite decision, and disagree<strong>in</strong>g with <strong>the</strong> Delaware SupremeCourt’s rejection <strong>of</strong> <strong>the</strong> balanc<strong>in</strong>g stage, <strong>the</strong> <strong>court</strong> analogized an order requir<strong>in</strong>gidentification <strong>of</strong> an anonymous speaker to a prelim<strong>in</strong>ary <strong>in</strong>junction aga<strong>in</strong>st speech.The Court called for <strong>the</strong> pla<strong>in</strong>tiff to present evidence sufficient to defeat a motion forsummary judgment, followed by a balanc<strong>in</strong>g <strong>of</strong> <strong>the</strong> equities between <strong>the</strong> two sides.Independent Newspapers v. Brodie, 966 A.2d 432 (Md. 2009), where <strong>the</strong> <strong>court</strong>required notice to Doe, specification <strong>of</strong> <strong>the</strong> defamatory words <strong>in</strong> full context, primafacie show<strong>in</strong>g, and, “if all else is satisfied, balanc[<strong>in</strong>g] <strong>the</strong> anonymous poster’s FirstAmendment right <strong>of</strong> free speech aga<strong>in</strong>st <strong>the</strong> strength <strong>of</strong> <strong>the</strong> prima facie case <strong>of</strong>defamation presented by <strong>the</strong> pla<strong>in</strong>tiff and <strong>the</strong> necessity for disclosure <strong>of</strong> <strong>the</strong>anonymous defendant’s identity.” 966 A.2d at 457.Mortgage Specialists v. Implode-Explode Heavy Industries, 999 A.2d 184 (N.H.2010), where a mortgage lender sought to identify <strong>the</strong> author <strong>of</strong> comments say<strong>in</strong>g thatits president “was caught for fraud back <strong>in</strong> 2002 for sign<strong>in</strong>g borrowers names andbought his way out.” The New Hampshire Supreme Court held that “<strong>the</strong> Dendrite testis <strong>the</strong> appropriate standard by which to strike <strong>the</strong> balance between a defamationpla<strong>in</strong>tiff’s right to protect its reputation and a defendant's right to exercise free speechanonymously.”Pilchesky v. Gatelli, 12 A.3d 430 (Pa. Super. 2011), which held that a city council28 -8-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page16 <strong>of</strong> 29123456789101112131415161718192021222324chair had to meet <strong>the</strong> Dendrite test before she could identify constituents whosescabrous accusations <strong>in</strong>cluded sell<strong>in</strong>g out her constituents, prostitut<strong>in</strong>g herself afterhav<strong>in</strong>g run as a reformer, and gett<strong>in</strong>g patronage jobs for her family.Several o<strong>the</strong>r <strong>court</strong>s use a Cahill-like summary judgment standard. For example:Kr<strong>in</strong>sky v. Doe 6, 72 Cal. Rptr.3d 231 (Cal. App. 2008), where <strong>the</strong> appellate <strong>court</strong>reversed a trial <strong>court</strong> decision allow<strong>in</strong>g an executive to learn <strong>the</strong> identity <strong>of</strong> severalonl<strong>in</strong>e critics who allegedly defamed her by such references as “a managementconsist<strong>in</strong>g <strong>of</strong> boobs, losers and crooks.”In re Does 1-10, 242 S.W.3d 805 (Tex. App. 2007), which reversed a decisionallow<strong>in</strong>g a hospital to identify employees who allegedly violated patientconfidentiality and disparaged <strong>the</strong>ir employer through posts on a blog.Solers v. Doe, 977 A.2d 941 (D.C. 2009), where <strong>the</strong> <strong>court</strong> held that a governmentcontractor could identify an anonymous whistleblower who said that pla<strong>in</strong>tiff wasus<strong>in</strong>g unlicensed s<strong>of</strong>tware if it produced evidence that <strong>the</strong> statement was false. The2/<strong>court</strong> adopted Cahill and expressly rejected Dendrite’s balanc<strong>in</strong>g stage.Similarly, <strong>in</strong> Melv<strong>in</strong> v. Doe, 49 Pa. D&C 4th 449 (Pa. Com. Pl. 2000), rev’d on o<strong>the</strong>r grounds,836 A.2d 42 (2003), <strong>the</strong> trial judge ordered disclosure only after f<strong>in</strong>d<strong>in</strong>g genu<strong>in</strong>e issues <strong>of</strong> materialfact requir<strong>in</strong>g trial. Although its hold<strong>in</strong>g reached only <strong>the</strong> issue <strong>of</strong> appellate jurisdiction, <strong>in</strong> revers<strong>in</strong>g<strong>the</strong> order <strong>of</strong> disclosure, <strong>the</strong> Pennsylvania Supreme Court expressly recognized <strong>the</strong> right to speakanonymously and sent <strong>the</strong> case back for a determ<strong>in</strong>ation <strong>of</strong> whe<strong>the</strong>r, under Pennsylvania libel law,actual economic harm must be proved as an element <strong>of</strong> <strong>the</strong> cause <strong>of</strong> action:[C]ourt-ordered disclosure <strong>of</strong> Appellants’ identities presents a significant possibility<strong>of</strong> trespass upon <strong>the</strong>ir First Amendment rights. There is no question that generally, <strong>the</strong>constitutional right to anonymous free speech is a right deeply rooted <strong>in</strong> public policythat goes beyond this particular litigation, and that it falls with<strong>in</strong> <strong>the</strong> class <strong>of</strong> rights thatare too important to be denied review. F<strong>in</strong>ally, it is clear that once Appellants’identities are disclosed, <strong>the</strong>ir First Amendment claim is irreparably lost as <strong>the</strong>reare no means by which to later cure such disclosure.836 A.2d at 50 (emphasis added)Federal district <strong>court</strong>s have repeatedly followed Cahill and Dendrite. See Best Western Int’lv. Doe, 2006 WL 2091695 (D. Ariz. July 25, 2006) (<strong>court</strong> used five-factor test drawn from Cahill,Dendrite and o<strong>the</strong>r decisions); Fodor v. Doe, 2011 WL 1629572 (D. Nev. April 27, 2011) (followed252627282/In Maxon v. Ottawa Publ’g Co., 929 N.E.2d 666 (Ill. App. 2010), <strong>the</strong> Ill<strong>in</strong>ois Court <strong>of</strong> Appealsfound it unnecessary to apply <strong>the</strong> First Amendment to a petition for pre-litigation discoverybecause <strong>the</strong> state’s rules already required a verified compla<strong>in</strong>t, specification <strong>of</strong> <strong>the</strong> defamatorywords, determ<strong>in</strong>ation that a valid claim was stated, and notice to <strong>the</strong> Doe.-9-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page17 <strong>of</strong> 29123456789101112131415161718192021222324252627Dendrite); Koch Industries v. Doe, 2011 WL 1775765 (D. Utah May 9, 2011) (reject<strong>in</strong>g discoveryto identify <strong>defendants</strong> <strong>in</strong> case alleg<strong>in</strong>g various trademark claims, breach <strong>of</strong> contract, and violation <strong>of</strong><strong>the</strong> Computer Fraud and Abuse Act because “‘The case law . . . has begun to coalesce around <strong>the</strong>basic framework <strong>of</strong> <strong>the</strong> test articulated <strong>in</strong> Dendrite,’” quot<strong>in</strong>g SaleHoo Group v. Doe, 722 F. Supp.2d1210, 1214 (W.D. Wash. 2010) (alleg<strong>in</strong>g trademark and defamation claims)); In re Baxter, 2001 WL34806203 (W.D. La. Dec. 20, 2001) (preferred Dendrite approach, required show<strong>in</strong>g <strong>of</strong> reasonablepossibility or probability <strong>of</strong> success); S<strong>in</strong>clair v. TubeSockTedD, 596 F. Supp.2d 128, 132 (D.D.C.2009) (did not choose between Cahill and Dendrite because pla<strong>in</strong>tiff loses under ei<strong>the</strong>r standard);Alvis Coat<strong>in</strong>gs v. Does, 2004 WL 2904405 (W.D.N.C. Dec. 2, 2004) (identification allowed basedon defamation and trademark claims after consider<strong>in</strong>g detailed affidavit about how comments werefalse); Doe I and II v. Individuals whose true names are unknown, 561 F. Supp.2d 249 (D. Conn.2008) (identification ordered after pla<strong>in</strong>tiffs provided detailed affidavits show<strong>in</strong>g basis for claims <strong>of</strong>defamation and <strong>in</strong>tentional <strong>in</strong>fliction <strong>of</strong> emotional distress).Although <strong>the</strong>se cases set out slightly different standards, each requires a <strong>court</strong> to weigh <strong>the</strong>pla<strong>in</strong>tiff’s <strong>in</strong>terest <strong>in</strong> identify<strong>in</strong>g <strong>the</strong> person who has allegedly violated its rights aga<strong>in</strong>st <strong>the</strong> <strong>in</strong>terestsimplicated by <strong>the</strong> potential violation <strong>of</strong> <strong>the</strong> First Amendment right to anonymity, thus ensur<strong>in</strong>g thatFirst Amendment rights are not trammeled unnecessarily. Put ano<strong>the</strong>r way, <strong>the</strong> qualified privilegeto speak anonymously requires <strong>court</strong>s to review a would-be pla<strong>in</strong>tiff’s claims and <strong>the</strong> evidence<strong>support</strong><strong>in</strong>g <strong>the</strong>m to ensure that <strong>the</strong> pla<strong>in</strong>tiff has a valid reason for pierc<strong>in</strong>g <strong>the</strong> speaker’s anonymity.C. Consistent Authority <strong>in</strong> This District Requires an Evidentiary Show<strong>in</strong>g,Not Just a Properly Pleaded Compla<strong>in</strong>t.Until Judge Lloyd issued his rul<strong>in</strong>g, consistent authority <strong>in</strong> <strong>the</strong> Nor<strong>the</strong>rn District <strong>of</strong> Californiarequired pro<strong>of</strong>, not just allegations, before discovery to identify anonymous Internet speakers couldbe enforced. The lead<strong>in</strong>g op<strong>in</strong>ion was authored by Magistrate Judge Wayne Brazil <strong>in</strong> HighfieldsCapital Mgmt. v. Doe, 385 F. Supp.2d 969, 976 (N.D. Cal. 2005), and adopted by Judge Chesney.This case <strong>in</strong>volved post<strong>in</strong>gs on a Yahoo! message board about Highfields, <strong>the</strong> largest shareholder <strong>in</strong>a company called Silicon Graphics, <strong>in</strong>clud<strong>in</strong>g a number <strong>of</strong> comments that purported to be authored28 -10-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page18 <strong>of</strong> 29123456789101112131415161718192021222324252627by Highfields, <strong>in</strong> context mock<strong>in</strong>g both Highfields and SGI. Highfields’s compla<strong>in</strong>t cited various<strong>the</strong>ories <strong>of</strong> defamation, commercial disparagement, and unfair competition, as well as a variety <strong>of</strong>state and federal trademark claims, but <strong>the</strong> <strong>court</strong> refused to allow discovery to identify <strong>the</strong> anonymousposters. Judge Brazil’s op<strong>in</strong>ion squarely endorsed <strong>the</strong> Dendrite analysis and held that <strong>the</strong>re was<strong>in</strong>sufficient evidence <strong>of</strong> likely confusion, <strong>of</strong> false statements <strong>of</strong> fact, or <strong>of</strong> damage to <strong>the</strong> pla<strong>in</strong>tiff. Id.at 977-989. But even if <strong>the</strong>re had been some pro<strong>of</strong> <strong>of</strong> wrongdo<strong>in</strong>g, Judge Brazil recommendedquash<strong>in</strong>g <strong>the</strong> subpoena because <strong>the</strong>re was so little reason to believe that any possibly wrongfulconduct had harmed <strong>the</strong> pla<strong>in</strong>tiff and because <strong>the</strong> right to post anonymous criticisms <strong>of</strong> publiclytraded companies was too important to be sacrificed <strong>in</strong> such a case; consequently, <strong>the</strong> balance <strong>of</strong>harms tipped decidedly <strong>in</strong> favor <strong>of</strong> reta<strong>in</strong><strong>in</strong>g anonymity. Highfields was followed <strong>in</strong> USATechnologies v. Doe, 713 F. Supp.2d 901 (N.D. Cal. 2010), where <strong>the</strong> pla<strong>in</strong>tiff claimed bothdefamation and federal securities law violations.The need for evidence is also shown by Columbia Insurance Co. v. Seescandy.com, 185F.R.D. 573, 578 (N.D. Cal. 1999). The claim <strong>in</strong> Seescandy was that <strong>the</strong> anonymous registrant <strong>of</strong>certa<strong>in</strong> doma<strong>in</strong> names <strong>in</strong>fr<strong>in</strong>ged <strong>the</strong> pla<strong>in</strong>tiff’s trademark. Although <strong>the</strong> op<strong>in</strong>ion discussed a motionto dismiss standard, its ultimate rul<strong>in</strong>g depended on <strong>the</strong> consideration <strong>of</strong> evidence — that defendanthad sent <strong>the</strong> pla<strong>in</strong>tiff copies <strong>of</strong> thirty-one emails that defendant had received request<strong>in</strong>g pla<strong>in</strong>tiff’sproducts: “[M]ost importantly, pla<strong>in</strong>tiff can show actual confusion, <strong>court</strong>esy <strong>of</strong> <strong>the</strong> 31 emails . . ..Evidence <strong>of</strong> actual confusion is strong pro<strong>of</strong> <strong>of</strong> <strong>the</strong> fact <strong>of</strong> likelihood <strong>of</strong> confusion. . . . Pla<strong>in</strong>tiff’sshow<strong>in</strong>g is sufficient to demonstrate that <strong>the</strong> Kumar <strong>defendants</strong> have committed an unlawful act forwhich a federal cause <strong>of</strong> action can subsist.” Seescandy, 185 F.R.D. at 580 (punctuation and citationomitted).D. Cases Involv<strong>in</strong>g Download<strong>in</strong>g <strong>of</strong> Copyrighted Songs and Movies Do Not JustifyAdoption <strong>of</strong> a Weaker Standard for Identify<strong>in</strong>g Anonymous Speakers.Judge Lloyd decl<strong>in</strong>ed to apply Highfields Capital because he believed that <strong>the</strong>re is a lesser testrequir<strong>in</strong>g only allegations <strong>of</strong> wrongdo<strong>in</strong>g when <strong>the</strong> pla<strong>in</strong>tiff alleges copyright <strong>in</strong>fr<strong>in</strong>gement. To<strong>support</strong> this rul<strong>in</strong>g, Judge Lloyd cited both Sony Music Enterta<strong>in</strong>ment v. Does 1–40, 326 F. Supp.2d28 -11-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page19 <strong>of</strong> 29123456789101112131415161718192021222324252627556 (S.D.N.Y.2004), and Arista Records v. Doe 3, 604 F.3d 110, 119 (2d Cir.2010), which appliedSony’s hold<strong>in</strong>g. For several reasons, this argument is wrong.Both cases, and many o<strong>the</strong>rs like it, were filed by record<strong>in</strong>g companies aga<strong>in</strong>st large numbers<strong>of</strong> anonymous Internet users who downloaded copyrighted record<strong>in</strong>gs <strong>of</strong> popular music though fileshar<strong>in</strong>gservices. The present amici also filed as amici <strong>in</strong> Sony, and have filed as amici <strong>in</strong> severalo<strong>the</strong>r such cases (<strong>in</strong>clud<strong>in</strong>g more recent cases brought by movie studios). Amici became <strong>in</strong>volved<strong>in</strong> those cases, not out <strong>of</strong> any sympathy for <strong>the</strong> download<strong>in</strong>g <strong>of</strong> copyrighted record<strong>in</strong>gs, but because<strong>the</strong> mass nature <strong>of</strong> <strong>the</strong> lawsuits posed a danger that procedural and substantive justice for some <strong>of</strong> <strong>the</strong><strong>in</strong>dividual <strong>defendants</strong> might be overlooked <strong>in</strong> <strong>the</strong> pla<strong>in</strong>tiffs’ haste to discourage illegal download<strong>in</strong>g.Although <strong>the</strong> pla<strong>in</strong>tiffs <strong>in</strong> those cases were generally well-established copyright holders, unlesspla<strong>in</strong>tiffs were required to come forward with real evidence to identify <strong>defendants</strong>, less scrupulouspla<strong>in</strong>tiffs whose real objective was to identify critics for purposes <strong>of</strong> humiliation or retaliation mightabuse copyright litigation to achieve those ends. Accord<strong>in</strong>gly amici argued that pla<strong>in</strong>tiffs <strong>in</strong> fileshar<strong>in</strong>gcases should be required to present actual evidence, as opposed to mere allegations, beforedisclosure <strong>of</strong> identify<strong>in</strong>g <strong>in</strong>formation was required.And, <strong>in</strong> fact, that is what <strong>the</strong> <strong>court</strong>s held, and that is what <strong>the</strong> pla<strong>in</strong>tiffs <strong>in</strong> <strong>the</strong> file-shar<strong>in</strong>g casesconsistently did. In <strong>the</strong> typical case, <strong>the</strong> pla<strong>in</strong>tiff would file a compla<strong>in</strong>t that listed several differentcopyrighted sound record<strong>in</strong>gs <strong>of</strong> well-known musical artists <strong>the</strong> download<strong>in</strong>g <strong>of</strong> which could beattributed to each <strong>of</strong> <strong>the</strong> several hundred <strong>defendants</strong>. Pla<strong>in</strong>tiff would also attach an affidavitexpla<strong>in</strong><strong>in</strong>g <strong>the</strong> method by which <strong>the</strong> download<strong>in</strong>g had been detected, and averr<strong>in</strong>g that <strong>the</strong> affiant had,<strong>in</strong> fact, listened to <strong>the</strong> musical files be<strong>in</strong>g downloaded to ascerta<strong>in</strong> that each <strong>in</strong>dividual defendant was<strong>of</strong>fer<strong>in</strong>g <strong>the</strong> specified copyrighted record<strong>in</strong>g for download. In Sony, <strong>the</strong> op<strong>in</strong>ion <strong>of</strong> <strong>the</strong>n-District JudgeDenny Ch<strong>in</strong> held that this evidence was required for <strong>the</strong> <strong>defendants</strong> to be identified. 326 F. Supp.2dat 565-566. Although Arista Records did not expressly hold that actual evidence was required, itrecited <strong>the</strong> evidence <strong>in</strong> <strong>the</strong> record that was comparable to what Sony had held was required, 604 F.3dat 121-123, and it endorsed Sony’s hold<strong>in</strong>g that pla<strong>in</strong>tiff must make a prima facie “show<strong>in</strong>g.”Moreover, <strong>the</strong> Arista Records <strong>court</strong> analyzed Doe’s fair use argument, f<strong>in</strong>d<strong>in</strong>g that <strong>the</strong> evidence <strong>in</strong>28 -12-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page20 <strong>of</strong> 29123456789101112131415161718192021222324252627<strong>the</strong> record <strong>support</strong>ed <strong>the</strong> pla<strong>in</strong>tiff on three <strong>of</strong> <strong>the</strong> four fair use factors, and that only once defendantwas identified could <strong>the</strong> <strong>court</strong> evaluate his argument that he “may’ have had a permissible purposefor copy<strong>in</strong>g and shar<strong>in</strong>g <strong>the</strong> music found <strong>in</strong> his file-shar<strong>in</strong>g folder.”Moreover, although <strong>the</strong> <strong>court</strong>s <strong>in</strong> <strong>the</strong> file-shar<strong>in</strong>g cases did not expressly adopt <strong>the</strong> Dendritebalanc<strong>in</strong>g stage, <strong>the</strong>y implicitly did so <strong>in</strong>s<strong>of</strong>ar as <strong>the</strong>y based <strong>the</strong>ir decisions on what <strong>the</strong>y characterizedas <strong>the</strong> low value <strong>of</strong> <strong>the</strong> speech at issue. In Sony, Judge Ch<strong>in</strong> agreed that <strong>the</strong> choice <strong>of</strong> which musicalrecord<strong>in</strong>gs to make available for download, and <strong>the</strong> “performance” <strong>of</strong> those works when <strong>the</strong>y wereactually downloaded, <strong>in</strong>volved speech, but both <strong>court</strong>s agreed that such speech is distant from <strong>the</strong> coreconcerns <strong>of</strong> <strong>the</strong> First Amendment, and hence that <strong>the</strong> level <strong>of</strong> First Amendment protection for suchspeech is low, or even “limited.” 326 F. Supp.2d at 564. Ano<strong>the</strong>r <strong>court</strong> called <strong>the</strong> First Amendment<strong>in</strong>terest at stake <strong>in</strong> such cases “m<strong>in</strong>imal,” expla<strong>in</strong><strong>in</strong>g that “file-sharers’ ultimate aim ‘is not tocommunicate a thought or convey an idea’ but to obta<strong>in</strong> movies and music for free.” Call <strong>of</strong> <strong>the</strong> WildMovie v. Does 1-1,062, 770 F. Supp.2d 332, 349 (D.D.C. 2011).But it was <strong>the</strong> nature <strong>of</strong> <strong>the</strong> speech, not <strong>the</strong> name <strong>of</strong> <strong>the</strong> cause <strong>of</strong> action, that affected <strong>the</strong> level<strong>of</strong> protection afforded under <strong>the</strong> First Amendment. This approach is confirmed by <strong>the</strong> N<strong>in</strong>th Circuit’sdecision <strong>in</strong> Anonymous Onl<strong>in</strong>e Speakers v. United States District Court, 2011 WL 61635 (9th Cir.2011). Pla<strong>in</strong>tiff brought a variety <strong>of</strong> claims aga<strong>in</strong>st a rival, <strong>in</strong>clud<strong>in</strong>g defamation, tortious <strong>in</strong>terferencewith bus<strong>in</strong>ess relations and with contract, and after discovery to identify Doe speakers connected with<strong>the</strong> rival was denied <strong>in</strong> part and granted <strong>in</strong> part, both sides sought mandamus. As Doe argued <strong>in</strong> hispapers <strong>in</strong> this case, DN 73 at 4-5, strictly speak<strong>in</strong>g <strong>the</strong> N<strong>in</strong>th Circuit’s op<strong>in</strong>ion does not determ<strong>in</strong>e <strong>the</strong>precise standard to be applied <strong>in</strong> future cases because, on mandamus, <strong>the</strong> <strong>court</strong> <strong>of</strong> appeals reviewsonly for clear error. Id. at *6. However, <strong>in</strong> decid<strong>in</strong>g that <strong>the</strong> trial <strong>court</strong> did not commit clear error <strong>in</strong>grant<strong>in</strong>g discovery about <strong>the</strong> identity <strong>of</strong> three <strong>of</strong> <strong>the</strong> <strong>defendants</strong>, <strong>the</strong> N<strong>in</strong>th Circuit said that, if <strong>the</strong>speech <strong>of</strong> <strong>the</strong> Does <strong>in</strong> that case was commercial, <strong>the</strong>n <strong>the</strong> district <strong>court</strong>’s application <strong>of</strong> <strong>the</strong> Cahillstandard to allow this compelled identification would not be clear error because that standard affordsgreater protection than would be accorded to anonymous commercial speech. The nature <strong>of</strong> <strong>the</strong>causes <strong>of</strong> action did not figure <strong>in</strong>to <strong>the</strong> analysis.28 -13-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page21 <strong>of</strong> 29123456789101112131415161718192021222324252627Moreover, <strong>the</strong> fact that a pla<strong>in</strong>tiff alleges copyright <strong>in</strong>fr<strong>in</strong>gement is no more reason to grantdiscovery <strong>of</strong> a speaker’s identity than <strong>the</strong> fact than a pla<strong>in</strong>tiff may allege defamation, or trademark<strong>in</strong>fr<strong>in</strong>gement, or tortious <strong>in</strong>terference with bus<strong>in</strong>ess expectancies, or disclosure <strong>of</strong> confidential<strong>in</strong>formation <strong>in</strong> breach <strong>of</strong> an employment agreement, or <strong>in</strong>vasion <strong>of</strong> privacy or computer fraud andabuse, or any <strong>of</strong> <strong>the</strong> o<strong>the</strong>r causes <strong>of</strong> action that have been at issue <strong>in</strong> Dendrite and its progeny. Justas copyright <strong>in</strong>fr<strong>in</strong>gement is unprotected by <strong>the</strong> First Amendment, so are false statements publishedabout public figures with actual malice unprotected by <strong>the</strong> First Amendment, and so is <strong>the</strong> disclosureor trade secrets, or <strong>of</strong> confidential <strong>in</strong>formation obta<strong>in</strong>ed through employment under a promise <strong>of</strong>secrecy and <strong>the</strong> like. The key <strong>in</strong>sight <strong>of</strong> <strong>the</strong> Dendrite l<strong>in</strong>e <strong>of</strong> cases is that, at <strong>the</strong> <strong>in</strong>itial stages <strong>of</strong> <strong>the</strong>litigation when discovery is be<strong>in</strong>g sought to identify <strong>the</strong> defendant, <strong>the</strong> pla<strong>in</strong>tiff has only alleged <strong>the</strong>wrongdo<strong>in</strong>g which, if found, would remove <strong>the</strong> speech from <strong>the</strong> First Amendment’s protection. Thedenial <strong>of</strong> First Amendment protection based on <strong>the</strong> assumption that <strong>the</strong> speech is unprotected begs<strong>the</strong> question.To avoid <strong>the</strong> substitution <strong>of</strong> allegation for pro<strong>of</strong> <strong>in</strong> <strong>the</strong> sensitive context <strong>of</strong> <strong>the</strong> FirstAmendment right to anonymous speech, an evidentiary show<strong>in</strong>g should be required before a speakeris unmasked. Despite <strong>the</strong> broad nationwide consensus on this po<strong>in</strong>t, Judge Lloyd decided to acceptmere allegations that AoL had suffered actual harm from <strong>the</strong> publication.Indeed, as <strong>the</strong> Arizona Court <strong>of</strong> Appeals said <strong>in</strong> Mobilisa v. Doe, several policy reasonscounsel aga<strong>in</strong>st adopt<strong>in</strong>g a “less-str<strong>in</strong>gent standard . . . depend[<strong>in</strong>g] on <strong>the</strong> manner <strong>in</strong> which a pla<strong>in</strong>tiffhas framed its claim. Whe<strong>the</strong>r <strong>the</strong> claim is one for defamation or a property-based claim, <strong>the</strong> potentialfor chill<strong>in</strong>g anonymous speech rema<strong>in</strong>s <strong>the</strong> same.” 170 P.3d at 719. Moreover, “adopt<strong>in</strong>g differ<strong>in</strong>gstandards could encourage assertion <strong>of</strong> non-defamation claims simply to reap <strong>the</strong> benefit <strong>of</strong> aless-str<strong>in</strong>gent standard.” Id. This case provides an excellent example <strong>of</strong> this phenomenon: a copyrightclaim based on <strong>the</strong> post<strong>in</strong>g <strong>of</strong> a brochure used around <strong>the</strong> world appears to have been manufacturedfor <strong>the</strong> purpose <strong>of</strong> pursu<strong>in</strong>g this lawsuit, with <strong>the</strong> California chapter <strong>of</strong> AoL hav<strong>in</strong>g registered <strong>the</strong>copyright only after Doe had removed <strong>the</strong> document from his web site. F<strong>in</strong>ally, “adopt<strong>in</strong>g a s<strong>in</strong>glestandard would both permit ease <strong>of</strong> application . . . and better enable consistent decision mak<strong>in</strong>g.” Id.28 -14-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page22 <strong>of</strong> 29123456789101112131415161718192021222324Based on questions asked at argument <strong>in</strong> some <strong>of</strong> <strong>the</strong>se cases, two o<strong>the</strong>r dist<strong>in</strong>ctions between<strong>the</strong> run <strong>of</strong> Dendrite cases and cases based on file-shar<strong>in</strong>g may well have animated such decisions asSony and Call <strong>of</strong> <strong>the</strong> Wild Movie. First, <strong>in</strong> most such cases, <strong>the</strong> pla<strong>in</strong>tiff is a well-established musicor movie company, or an agent act<strong>in</strong>g on <strong>the</strong>ir behalf, that is unlikely to have any motivation forpurs<strong>in</strong>g <strong>the</strong> litigation apart from <strong>the</strong> desire to obta<strong>in</strong> damages or, <strong>in</strong>deed, to deter <strong>in</strong>fr<strong>in</strong>gement byo<strong>the</strong>rs. Second, <strong>in</strong> most such cases, it is highly unlikely that an anonymous defendant who has beenwrongly sued will suffer retaliation or o<strong>the</strong>r adverse consequences, apart from <strong>the</strong> disagreeablecircumstance <strong>of</strong> hav<strong>in</strong>g to defend <strong>the</strong> action on <strong>the</strong> merits or pay a settlement to avoid hav<strong>in</strong>g todefend <strong>the</strong> case, as a result <strong>of</strong> be<strong>in</strong>g wrongly identified despite <strong>the</strong> absence <strong>of</strong> a valid claim for relief. 3/In sum, <strong>the</strong>re is no pr<strong>in</strong>cipled reason why AoL’s <strong>in</strong>tellectual property claim <strong>in</strong> this case shouldreceive less scrut<strong>in</strong>y than <strong>the</strong> <strong>in</strong>tellectual property claims at issue <strong>in</strong> such cases as Highfields Capitaland Columbia Insurance, before <strong>the</strong> Doe loses his right <strong>of</strong> anonymous speech. Judge Lloyd’sdeparture from <strong>the</strong> standards previously accepted <strong>in</strong> this Court, and <strong>in</strong> cases around <strong>the</strong> country,should be rejected.E. Pla<strong>in</strong>tiff Has Not Followed <strong>the</strong> Steps Required Before Identification <strong>of</strong>John Doe Speaker May Be Ordered <strong>in</strong> This Case.The first, second and third stages <strong>of</strong> <strong>the</strong> Dendrite test have been satisfied—<strong>the</strong> Does got noticeand an opportunity to oppose discovery, pla<strong>in</strong>tiff identified <strong>the</strong> words whose publication is <strong>the</strong> subject<strong>of</strong> <strong>the</strong> litigation, and pla<strong>in</strong>tiff has pleaded <strong>the</strong> bare elements <strong>of</strong> a copyright <strong>in</strong>fr<strong>in</strong>gement action. AoL,however, has not produced admissible evidence <strong>support</strong><strong>in</strong>g it claim or satisfied <strong>the</strong> balanc<strong>in</strong>g test.1. Pla<strong>in</strong>tiff Has Not Produced Sufficient Evidence to Show That It Can Succeed on<strong>the</strong> Merits <strong>of</strong> Its Claim.No person should be subjected to compulsory identification through a <strong>court</strong>’s subpoena powerunless <strong>the</strong> pla<strong>in</strong>tiff produces sufficient evidence <strong>support</strong><strong>in</strong>g each element <strong>of</strong> a cause <strong>of</strong> action to showa realistic chance <strong>of</strong> w<strong>in</strong>n<strong>in</strong>g a lawsuit aga<strong>in</strong>st that defendant. This requirement has been followed252627283/The situation may be different if <strong>the</strong> material allegedly shared is deemed shameful, such as <strong>in</strong>recent cases where allegedly downloaded work is a pornographic film. E.g., Mick HaigProductions v. Does 1-670, 3:10-cv-01900-N (N.D. Tex.).-15-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page23 <strong>of</strong> 29123456789101112131415161718192021222324252627by every federal <strong>court</strong> and every state appellate <strong>court</strong> that has addressed <strong>the</strong> standard for identify<strong>in</strong>ganonymous Internet speakers, because it prevents pla<strong>in</strong>tiffs from be<strong>in</strong>g able to identify critics simplyby fil<strong>in</strong>g facially adequate compla<strong>in</strong>ts.Pla<strong>in</strong>tiffs <strong>of</strong>ten argue that <strong>the</strong>y need to identify <strong>the</strong> <strong>defendants</strong> simply to proceed with <strong>the</strong>ircase. However, no relief is generally awarded to pla<strong>in</strong>tiffs until <strong>the</strong>y come forward with evidence <strong>in</strong><strong>support</strong> <strong>of</strong> <strong>the</strong>ir claims, and <strong>the</strong> Court should recognize that identification <strong>of</strong> o<strong>the</strong>rwise anonymousspeakers is a major form <strong>of</strong> relief <strong>in</strong> cases like this. Requir<strong>in</strong>g actual evidence to enforce subpoenasis particularly appropriate where <strong>the</strong> relief itself may underm<strong>in</strong>e, and thus violate, <strong>defendants</strong>’ FirstAmendment right to speak anonymously.Indeed, <strong>in</strong> a number <strong>of</strong> cases, pla<strong>in</strong>tiffs have succeeded <strong>in</strong> identify<strong>in</strong>g <strong>the</strong>ir critics and <strong>the</strong>nsought no fur<strong>the</strong>r relief from <strong>the</strong> <strong>court</strong>. Thompson, On <strong>the</strong> Net, <strong>in</strong> <strong>the</strong> Dark, California Law Week,Volume 1, No. 9, at 16, 18 (1999). Some lawyers who are highly respected <strong>in</strong> <strong>the</strong>ir own legalcommunities have admitted that identification <strong>of</strong> <strong>the</strong>ir clients’ anonymous critics may be all that <strong>the</strong>ydesire to achieve <strong>in</strong> <strong>the</strong> lawsuit. E.g., Werthammer, RNN Sues Yahoo Over Negative Web Site, DailyFreeman, November 21, 2000, www.zwire.com/site/news.cfm?newsid=1098427&BRD=1769&PAG=461&dept_id =4969&rfi=8. An early advocate <strong>of</strong> us<strong>in</strong>g discovery procedures to identifyanonymous critics has urged corporate executives to use discovery first, and to decide whe<strong>the</strong>r to suefor libel only after <strong>the</strong> critics have been identified and contacted privately. Fischman, Your CorporateReputation Onl<strong>in</strong>e, www.fhdlaw.com/html/corporate_ reputation. htm; Fischman, Protect<strong>in</strong>g <strong>the</strong>Value <strong>of</strong> Your Goodwill from Onl<strong>in</strong>e Assault, www.fhdlaw.com/html/ bruce_article.htm.Lawyers who represent pla<strong>in</strong>tiffs <strong>in</strong> <strong>the</strong>se cases have also urged companies to br<strong>in</strong>g suit, evenif <strong>the</strong>y do not <strong>in</strong>tend to pursue <strong>the</strong> action to a conclusion, because “[t]he mere fil<strong>in</strong>g <strong>of</strong> <strong>the</strong> John Doeaction will probably slow <strong>the</strong> post<strong>in</strong>gs.” Eisenh<strong>of</strong>er & Liebesman, Caught by <strong>the</strong> Net, 10 Bus<strong>in</strong>essLaw Today No. 1 (Sept.-Oct. 2000), at 40. These lawyers have similarly suggested that clients decidewhe<strong>the</strong>r it is worth pursu<strong>in</strong>g a lawsuit only after f<strong>in</strong>d<strong>in</strong>g out who <strong>the</strong> defendant is. Id. See Swiger v.Allegheny Energy, 2006 WL 1409622 (E.D. Pa. May 19, 2006) (company represented by one <strong>of</strong>largest and most respected law firms <strong>in</strong> Philadelphia filed Doe lawsuit, obta<strong>in</strong>ed identity <strong>of</strong> employee28 -16-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page24 <strong>of</strong> 29123456789101112131415161718192021222324who criticized it onl<strong>in</strong>e, fired <strong>the</strong> employee, and dismissed <strong>the</strong> lawsuit without obta<strong>in</strong><strong>in</strong>g any judicialremedy o<strong>the</strong>r than <strong>the</strong> removal <strong>of</strong> anonymity). Even <strong>the</strong> pendency <strong>of</strong> a subpoena may have <strong>the</strong> effect<strong>of</strong> deterr<strong>in</strong>g o<strong>the</strong>r members <strong>of</strong> <strong>the</strong> public from discuss<strong>in</strong>g <strong>the</strong> pla<strong>in</strong>tiff.To address this potential abuse, <strong>court</strong>s have borrowed by analogy <strong>the</strong> hold<strong>in</strong>gs <strong>of</strong> cases<strong>in</strong>volv<strong>in</strong>g <strong>the</strong> disclosure <strong>of</strong> anonymous sources. Those cases require a party seek<strong>in</strong>g discovery <strong>of</strong><strong>in</strong>formation protected by <strong>the</strong> First Amendment to show that <strong>the</strong>re is reason to believe that <strong>the</strong><strong>in</strong>formation sought will, <strong>in</strong> fact, help its case. In re Petroleum Prods. Antitrust Litig., 680 F.2d 5,6-9 (2d Cir. 1982); Richards <strong>of</strong> Rockford v. PGE, 71 F.R.D. 388, 390-391 (N.D. Cal. 1976). Ineffect, <strong>the</strong> pla<strong>in</strong>tiff should be required to present admissible evidence establish<strong>in</strong>g a prima facie caseto “satisfy <strong>the</strong> trial <strong>court</strong> that he has evidence to establish that <strong>the</strong>re is a genu<strong>in</strong>e issue <strong>of</strong> fact regard<strong>in</strong>g<strong>the</strong> falsity <strong>of</strong> <strong>the</strong> publication.” Down<strong>in</strong>g v. Monitor Publ’g Co., 415 A.2d 683, 686 (N.H. 1980);Cervantes v. Time, 464 F.2d 986, 993-994 (8th Cir. 1972). “Mere speculation and conjecture about<strong>the</strong> fruits <strong>of</strong> such exam<strong>in</strong>ation simply will not suffice.” Id. at 994. 4/The extent to which a pla<strong>in</strong>tiff who seeks to compel identification <strong>of</strong> an anonymous criticshould be required to <strong>of</strong>fer pro<strong>of</strong> to <strong>support</strong> each <strong>of</strong> <strong>the</strong> elements <strong>of</strong> his claims at <strong>the</strong> outset <strong>of</strong> his casevaries with <strong>the</strong> nature <strong>of</strong> <strong>the</strong> element. In suits for defamation or disclosure <strong>of</strong> <strong>in</strong>side <strong>in</strong>formation,several elements <strong>of</strong> <strong>the</strong> pla<strong>in</strong>tiff’s claim will ord<strong>in</strong>arily be based on evidence to which <strong>the</strong> pla<strong>in</strong>tiff,and <strong>of</strong>ten not <strong>the</strong> defendant, is likely to have easy access. For example, <strong>the</strong> pla<strong>in</strong>tiff is likely to haveample means <strong>of</strong> prov<strong>in</strong>g that a statement is false (<strong>in</strong> a defamation action) or rests on confidential<strong>in</strong>formation (<strong>in</strong> a suit for disclosure <strong>of</strong> <strong>in</strong>side <strong>in</strong>formation). Where, as here, <strong>the</strong> Doe defendant hasa substantial fair use claim, based on <strong>the</strong> contention that he published <strong>the</strong> Breath Water Sound manualto show that its contents were mean<strong>in</strong>gless pap, <strong>the</strong> copyright own<strong>in</strong>g pla<strong>in</strong>tiff should be able to showthat <strong>the</strong> fair use factors tend <strong>in</strong> its favor; and, as <strong>in</strong> Arista, <strong>the</strong> Court should consider those fair usefactors that can be properly explored without a deposition <strong>of</strong> <strong>the</strong> anonymous defendant. Moreover,252627284/Down<strong>in</strong>g took comfort from <strong>the</strong> fact that pla<strong>in</strong>tiff <strong>the</strong>re was represented by “respectedcounsel.” 415 A.2d at 686. However, <strong>the</strong> standard should not rest on <strong>the</strong> quality <strong>of</strong> <strong>the</strong>lawyers appear<strong>in</strong>g <strong>in</strong> <strong>the</strong> case. Less experienced lawyers, and even pro se parties, who <strong>of</strong>tenseek subpoenas to identify anonymous critics, should receive equal respect before <strong>the</strong> law.-17-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page25 <strong>of</strong> 29123456789101112131415161718192021222324252627<strong>the</strong>re is a real question <strong>in</strong> this case whe<strong>the</strong>r pla<strong>in</strong>tiff is entitled to any relief, because <strong>the</strong> manual wasremoved from <strong>the</strong> blog months before this lawsuit was <strong>in</strong>itiated, follow<strong>in</strong>g a copyright compla<strong>in</strong>t froma different Art <strong>of</strong> Liv<strong>in</strong>g entity, and <strong>the</strong> belated registration <strong>of</strong> <strong>the</strong> copyright precludes any claim forstatutory damages or attorney fees. Because <strong>the</strong> manual is generally dissem<strong>in</strong>ated for free, <strong>the</strong>re areno lost pr<strong>of</strong>its, and <strong>the</strong> orig<strong>in</strong>al allegations <strong>of</strong> actual damages was based on <strong>the</strong> adverse effect <strong>of</strong> <strong>the</strong>Does’ criticisms, which is defamation <strong>in</strong>jury, not <strong>in</strong>tellectual property <strong>in</strong>jury. Cf. UniversalCommunication Systems v. Lycos, Inc., 478 F.3d 413, 423-424 (1st Cir. 2007).Nor can pla<strong>in</strong>tiff effectively argue that requir<strong>in</strong>g evidence to <strong>support</strong> <strong>the</strong>ir claims is a burdenso onerous that pla<strong>in</strong>tiffs who can likely succeed on <strong>the</strong> merits <strong>of</strong> <strong>the</strong>ir claims will be unable topresent such pro<strong>of</strong> at <strong>the</strong> outset <strong>of</strong> <strong>the</strong>ir cases. Many pla<strong>in</strong>tiffs succeeded <strong>in</strong> identify<strong>in</strong>g Doe<strong>defendants</strong> <strong>in</strong> jurisdictions that follow Dendrite and Cahill. E.g., Does v. Individuals whose truenames are unknown, supra; Alvis Coat<strong>in</strong>gs v. Does, supra. Indeed, <strong>in</strong> Immunomedics v. Doe, 775A.2d 773 (N.J. Super. 2001), a companion case to Dendrite, where <strong>the</strong> pla<strong>in</strong>tiff claimed defendanthad breached an employment agreement, disclosed confidential <strong>in</strong>formation, and violated her duty<strong>of</strong> loyalty, <strong>the</strong> <strong>court</strong> applied Dendrite but ordered that <strong>the</strong> anonymous speaker be identified. InDendrite itself, two <strong>of</strong> <strong>the</strong> Does were identified while two were protected aga<strong>in</strong>st discovery.F<strong>in</strong>ally, unlike <strong>the</strong> typical Dendrite-type case <strong>in</strong> which discovery is needed so that pla<strong>in</strong>tiffcan serve <strong>the</strong> defendant, <strong>the</strong> Doe has waived formal service, answered <strong>the</strong> compla<strong>in</strong>t, and apparentlyplans to move for summary judgment. Doe has also stipulated that he will respond to writtendiscovery, and pla<strong>in</strong>tiff has not shown that it needs any o<strong>the</strong>r discovery to prevail on its claims. Thecase thus resembles <strong>the</strong> approach followed <strong>in</strong> Pennsylvania even before a Pennsylvania appellate<strong>court</strong> adopted Dendrite <strong>in</strong> Pilchesky v. Gatelli: Doe <strong>defendants</strong> were allowed to take discovery from<strong>the</strong> pla<strong>in</strong>tiff to pierce its affidavits and to move for summary judgment. Only if that motion wasdenied did <strong>the</strong> <strong>court</strong> enforce <strong>the</strong> subpoena to identify <strong>the</strong> Doe. Reunion Industries v. Doe 1, 80 Pa.D. & C.4th 449, 2007 WL 1453491 (Pa. Com. Pl. 2007); Melv<strong>in</strong> v. Doe, 49 Pa. D. & C. 4th 449, 451-452, 2000 WL 33311704 (Pa. Com. Pl. 2000), app. dism., 789 A.2d 696 (Pa. Super. 2001), rev’d, 836A.2d 42 (Pa. 2003). At <strong>the</strong> very least, <strong>the</strong> Court should withhold judgment on discovery until it has28 -18-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page26 <strong>of</strong> 29123456789101112131415161718192021222324252627addressed Doe’s planned motion for summary judgment.2. The Balance <strong>of</strong> Interests Tips Decidedly <strong>in</strong> Doe’s Favor.Even if AoL had presented enough evidence to warrant identify<strong>in</strong>g defendant,[t]he f<strong>in</strong>al factor to consider <strong>in</strong> balanc<strong>in</strong>g <strong>the</strong> need for confidentiality versus discoveryis <strong>the</strong> strength <strong>of</strong> <strong>the</strong> movant’s case . . .. If <strong>the</strong> case is weak, <strong>the</strong>n little purpose willbe served by allow<strong>in</strong>g such discovery, yet great harm will be done by revelation <strong>of</strong>privileged <strong>in</strong>formation. In fact, <strong>the</strong>re is a danger <strong>in</strong> such a case that it was brought justto obta<strong>in</strong> <strong>the</strong> names . . .. On <strong>the</strong> o<strong>the</strong>r hand, if a case is strong and <strong>the</strong> <strong>in</strong>formationsought goes to <strong>the</strong> heart <strong>of</strong> it and is not available from o<strong>the</strong>r sources, <strong>the</strong>n <strong>the</strong> balancemay sw<strong>in</strong>g <strong>in</strong> favor <strong>of</strong> discovery if <strong>the</strong> harm from such discovery is not too severe.Missouri ex rel. Classic III v. Ely, 954 S.W.2d 650, 659 (Mo. App. 1997).Similarly, Dendrite called for such <strong>in</strong>dividualized balanc<strong>in</strong>g when <strong>the</strong> pla<strong>in</strong>tiff seeks tocompel identification <strong>of</strong> an anonymous Internet speaker:[A]ssum<strong>in</strong>g <strong>the</strong> <strong>court</strong> concludes that <strong>the</strong> pla<strong>in</strong>tiff has presented a prima facie cause <strong>of</strong>action, <strong>the</strong> <strong>court</strong> must balance <strong>the</strong> defendant’s First Amendment right <strong>of</strong> anonymousfree speech aga<strong>in</strong>st <strong>the</strong> strength <strong>of</strong> <strong>the</strong> prima facie case presented and <strong>the</strong> necessity for<strong>the</strong> disclosure <strong>of</strong> <strong>the</strong> anonymous defendant’s identity to allow <strong>the</strong> pla<strong>in</strong>tiff to properlyproceed.775 A.2d at 760.A standard comparable to <strong>the</strong> test for grant or denial <strong>of</strong> a prelim<strong>in</strong>ary <strong>in</strong>junction, where <strong>the</strong><strong>court</strong> considers <strong>the</strong> likelihood <strong>of</strong> success and balances <strong>the</strong> equities, is particularly appropriate becausean order <strong>of</strong> disclosure is an <strong>in</strong>junction—not even a prelim<strong>in</strong>ary <strong>in</strong>junction. In every case, a refusalto quash a subpoena for <strong>the</strong> name <strong>of</strong> an anonymous speaker causes irreparable <strong>in</strong>jury, because oncespeakers lose anonymity, <strong>the</strong>y can never get it back. But denial <strong>of</strong> a motion to identify <strong>the</strong> defendantbased on ei<strong>the</strong>r lack <strong>of</strong> sufficient evidence or balanc<strong>in</strong>g <strong>the</strong> equities does not compel dismissal <strong>of</strong> <strong>the</strong>compla<strong>in</strong>t. Pla<strong>in</strong>tiffs can renew <strong>the</strong>ir motions after submitt<strong>in</strong>g more evidence. Moreover, <strong>the</strong><strong>in</strong>clusion <strong>of</strong> a balanc<strong>in</strong>g stage allows Does to show that identification may expose <strong>the</strong>m to significantdanger <strong>of</strong> extra-judicial retaliation. In that case, <strong>the</strong> <strong>court</strong> might require a greater quantum <strong>of</strong> evidenceon <strong>the</strong> elements <strong>of</strong> pla<strong>in</strong>tiff’s claims so that <strong>the</strong> equities can be correctly balanced.This case presents a strik<strong>in</strong>g example <strong>of</strong> <strong>the</strong> importance <strong>of</strong> <strong>the</strong> balanc<strong>in</strong>g stage <strong>of</strong> <strong>the</strong> Dendriteanalysis. Doe <strong>in</strong>ternet speakers around <strong>the</strong> world use Internet Service Providers based <strong>in</strong> <strong>the</strong> UnitedStates for <strong>the</strong>ir onl<strong>in</strong>e dissent<strong>in</strong>g activities because American ISP’s are normally protective <strong>of</strong> <strong>the</strong>ir28 -19-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page27 <strong>of</strong> 29123456789101112131415161718192021222324252627users’ anonymity, and because <strong>the</strong> First Amendment limits <strong>the</strong> use <strong>of</strong> government power to stripdissenters <strong>of</strong> <strong>the</strong>ir anonymity. The past few years have provided dramatic examples <strong>of</strong> <strong>the</strong> way <strong>in</strong>which foreign democracy movements have been able to use social networks like Facebook andmicroblogg<strong>in</strong>g platforms like Twitter to fur<strong>the</strong>r <strong>the</strong>ir fight for basic human rights. And only recently,we have been rem<strong>in</strong>ded <strong>of</strong> <strong>the</strong> serious consequences that face dissenters whose identities arediscovered by foreign authorities. Human Rights USA, US Citizen Sues Web Host<strong>in</strong>g Company forIdentify<strong>in</strong>g Him to Thai Government, http://humanrightsusa.org/<strong>in</strong>dex.php?option=com_content&task=view&id=227&Itemid=189 (Thai emigre deta<strong>in</strong>ed, <strong>in</strong>terrogated and charged, and his Thailandresidentfamily threatened, after Canadian ISP provided his identify<strong>in</strong>g <strong>in</strong>formation to Thai authoritiespursu<strong>in</strong>g violations <strong>of</strong> Thai lèse majesté laws forbidd<strong>in</strong>g even truthful criticism <strong>of</strong> <strong>the</strong> k<strong>in</strong>g).It is all too easy to br<strong>in</strong>g a bogus <strong>in</strong>tellectual property claim and hence out a critic, who can<strong>the</strong>n be subjected to extra-judicial self-help <strong>in</strong> a jurisdiction with no First Amendment and, <strong>in</strong>deed,no tradition <strong>of</strong> <strong>the</strong> rule <strong>of</strong> law. Here, <strong>the</strong>re is evidence <strong>in</strong> <strong>the</strong> record that <strong>the</strong> Doe whom MagistrateJudge Lloyd has ordered identified faces severe consequences if he is publicly named as a defendant<strong>in</strong> this case after be<strong>in</strong>g identified pursuant to subpoena. Skywalker Affidavit 4, DN 15.On <strong>the</strong> o<strong>the</strong>r side <strong>of</strong> <strong>the</strong> balance, <strong>the</strong> Court should consider <strong>the</strong> strength <strong>of</strong> <strong>the</strong> pla<strong>in</strong>tiff’s case,its <strong>in</strong>terest <strong>in</strong> redress<strong>in</strong>g <strong>the</strong> alleged violations, and its need for immediate identification <strong>of</strong> defendant.The Court can consider not only <strong>the</strong> strength <strong>of</strong> <strong>the</strong> pla<strong>in</strong>tiff’s evidence but also <strong>the</strong> nature <strong>of</strong> <strong>the</strong>allegations, <strong>the</strong> likelihood <strong>of</strong> significant damage to <strong>the</strong> pla<strong>in</strong>tiff, and <strong>the</strong> extent to which <strong>the</strong> pla<strong>in</strong>tiff’sown actions are responsible for <strong>the</strong> problems <strong>of</strong> which he compla<strong>in</strong>s. Here, because Doe has waivedformal service and is respond<strong>in</strong>g to written discovery, it is unclear why pla<strong>in</strong>tiff needs to know hisidentity at ths time. Moreover, Doe appears to have a strong fair use defense for his post<strong>in</strong>g <strong>of</strong> <strong>the</strong>Breath Water Sound manual—to illustrate his commentary about it, Request for Judicial Notice at325, Exhibit E10. See also DN 27 at 5-6. There is also serious reason to question whe<strong>the</strong>r pla<strong>in</strong>tiffis entitled to any relief based on its <strong>in</strong>fr<strong>in</strong>gement allegation. There can be no claim for statutorydamages or attorney fees, because pla<strong>in</strong>tiff did not even apply to register <strong>the</strong> copyright until severalyears after it was first published, and two months after <strong>the</strong> <strong>in</strong>fr<strong>in</strong>gement ceased. Compla<strong>in</strong>t 49-50;28 -20-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page28 <strong>of</strong> 291234567891011121314Skywalker Affidavit 10; 17 U.S.C. § 412. Moreover, when <strong>the</strong> violation ended months before suitwas brought, <strong>the</strong>re is reason to question whe<strong>the</strong>r an <strong>in</strong>junction would be proper. Indeed, unlesspla<strong>in</strong>tiff can show that it faces ongo<strong>in</strong>g <strong>in</strong>jury or a reasonable likelihood <strong>of</strong> future <strong>in</strong>jury, it lacksstand<strong>in</strong>g to seek <strong>in</strong>junctive relief. City <strong>of</strong> Los Angeles v. Lyons, 461 U.S. 95, 105 (1983). And <strong>the</strong>claims for compensatory damages appear to be weak at best, <strong>in</strong> light <strong>of</strong> <strong>the</strong> fact that <strong>the</strong> manual wasnot sold, but ra<strong>the</strong>r is used <strong>in</strong> a course that is given without charge. Skywalker Affidavit 11.Indeed, given <strong>the</strong> circumstances <strong>of</strong> this case, it is even possible that Doe might prevail <strong>in</strong> <strong>the</strong> equitabledefense <strong>of</strong> copyright misuse. Vernor v. Autodesk, Inc., 621 F.3d 1102, 1115 (9th Cir. 2010);Assessment Technologies <strong>of</strong> WI v. WIREdata, Inc., 361 F.3d 434, 437 (7th Cir. 2004).Consider<strong>in</strong>g both sides <strong>of</strong> <strong>the</strong> equitable balance, <strong>the</strong> balance <strong>of</strong> hardships tips decidedly <strong>in</strong>Doe’s favor, and consequently <strong>the</strong> Court should not enforce <strong>the</strong> subpoena until it concludes thatpla<strong>in</strong>tiff if very likely to succeed on <strong>the</strong> merits.CONCLUSIONDoe’s objection to Judge Lloyd’s order should be susta<strong>in</strong>ed. 5/15161718192021222324252627285/28 U.S.C. § 636, Rule 72 <strong>of</strong> <strong>the</strong> Federal Rules <strong>of</strong> Civil Procedure, and Local Rule 72-2 providefor review based on a standard <strong>of</strong> “clear error” or “contrary to law.” Because Doe’s objectionsconcern <strong>the</strong> application <strong>of</strong> <strong>the</strong> First Amendment, de novo review <strong>of</strong> <strong>the</strong> Magistrate’s decisionis required. Bose Corp. v. Consumers Union, 466 U.S. 485 (1984). Even if <strong>the</strong> ord<strong>in</strong>ary “clearerror” or “contrary to law” standard applies, see 28 U.S.C. § 636; Fed. R. Civ. P. 72(a); N.D.Cal. Local Rule 72-2, <strong>the</strong> issues before this Court <strong>in</strong>volve questions <strong>of</strong> law. When <strong>court</strong>sreview pure questions <strong>of</strong> law us<strong>in</strong>g a contrary to law standard, <strong>court</strong>s conduct a de novo review<strong>of</strong> such legal questions. Med<strong>in</strong>a-Morales v. Ashcr<strong>of</strong>t, 371 F.3d 520, 531 (9th Cir. 2004). SeeOsband v. Woodford, 290 F.3d 1036, 1041 (9th Cir. 2002) (review<strong>in</strong>g a Magistrate’s orderunder <strong>the</strong> “contrary to law” standard and not<strong>in</strong>g that questions <strong>of</strong> law are reviewed de novounder this standard); Ha<strong>in</strong>es v. Liggett Group, 975 F.2d 81, 91 (3d Cir. 1992) (same); see alsoUnited States v. Curtis, 237 F.3d 598, 607 (6th Cir. 2001) (for review <strong>of</strong> a Magistrate’s orders,mixed questions <strong>of</strong> fact and law are treated as questions <strong>of</strong> law and reviewed de novo).Local Rule 72-2 appears to provide that Judge Lloyd’s rul<strong>in</strong>g could become f<strong>in</strong>al if <strong>the</strong> Courtdoes not take any action on <strong>the</strong> objection with<strong>in</strong> fourteen days. If <strong>the</strong> objections are “deemeddenied” pursuant to that provision, amici reserve for appeal <strong>the</strong> possible argument that <strong>the</strong>local rule is contrary to Federal Rule 72(a), which provides that upon <strong>the</strong> fil<strong>in</strong>g <strong>of</strong> timelyobjections, <strong>the</strong> district judge “must consider” those objections and “must . . . set aside any part<strong>of</strong> <strong>the</strong> order that is clearly erroneous or is contrary to law.” Moreover, because Judge Lloydis not an Article III judge, it is open to question whe<strong>the</strong>r he can make a f<strong>in</strong>al determ<strong>in</strong>ation <strong>of</strong><strong>the</strong> application <strong>of</strong> <strong>the</strong> First Amendment to <strong>the</strong> enforceability <strong>of</strong> <strong>the</strong> subpoena. See Stern v.Marshall, 131 S. Ct. 2594, 180 L.Ed.2d 475 (2011).-21-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE


Case5:10-cv-05022-LHK Document96-1 Filed08/31/11 Page29 <strong>of</strong> 29123456789101112131415161718192021222324252627August 31, 2011Respectfully submitted,/s/ Scott MichelmanPaul Alan Levy (DC Bar No. 946400)Scott Michelman (Bar No. 236574)Public Citizen Litigation GroupEmail: plevy@citizen.orgth1600 20 Street N.W.Wash<strong>in</strong>gton, D.C. 20009Telephone: 202/588-1000Facsimile: 202/588-7795/s/ Mat<strong>the</strong>w Zimmerman___________Mat<strong>the</strong>w Zimmerman (Bar No. 212423)mattz@eff.orgElectronic Frontier Foundation454 Shotwell StreetSan Francisco, CA 94110Telephone: 415/436-9333 x127Facsimile: 415/436-9993www.eff.org/s/ Aden J. F<strong>in</strong>eAden J. F<strong>in</strong>e (Bar No. 186728)af<strong>in</strong>e@aclu.orgAmerican Civil Liberties Union Foundation125 Broad St., 18th FloorNew York, New York 10004Telephone: 212/549-2693Facsimile: (212) 549-2652/s/ Michael T, RisherMichael T. Risher (Bar No. 191627)Email: mrisher@aclunc.orgAmerican Civil Liberties Union Foundation<strong>of</strong> Nor<strong>the</strong>rn California39 Drumm Street, 2nd FloorSan Francisco, California 94111Telephone: 415/621-2493Facsimile: 415/255-1478Attorneys for Amici Curiae28 -22-No. CV -10-5022-LHK-HRL, BRIEF OF PUBLIC CITIZEN ET AL. AS AMICI CURIAE

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!