Attorney-client privilege protected defendants’ lawyers’ communications with PR firm hired to combat negative online treatment

In defending intellectual property claims over video games, defendants’ law firm hired a public relations firm to assist it with “input on legal strategy, including regarding initial pleadings and communications about the case to counteract [plaintiff’s] false and negative statement.” Defendants were allegedly being targeted by negative online attacks by the plaintiff.

During discovery, plaintiff served a subpoena on the hired PR firm, seeking, among other things, all documents relating to the communciations between the PR firm and defendants’ counsel.

Defendants sought to quash the subpoena, arguing the information was protected from disclosure under the attorney-client privilege. The court quashed the subpoena.

It found that because defendants’ counsel (and not defendants themselves) hired the PR firm to provide PR counseling specifically for the purposes of litigation strategy, the attorney-client privilege extended to the communications between the PR firm and defendants’ counsel pertaining to “giving and receiving legal advice about the appropriate response to the lawsuit and making related public statements.”

Specifically, these communications were

  • confidential communications made
  • between lawyers and public relation consultants
  • hired by the lawyers to assist them in dealing with the media in cases or litigation
  • that were made for the purpose of giving or receiving advice
  • directed at handling the client’s legal problems that were undeniably protected by the attorney client privilege.

The court similarly found that the attorney work product doctrine extended to the communications exchanged between the PR firm and defendants’ counsel. As could be seen by the privilege log, documents such as a “draft Answer and Counterclaim” and a “draft press release” would contain “the mental impressions, conclusions, opinions, or legal theories of a party’s attorney or other representative concerning the litigation.” Moreover, documents such as a “draft Answer and Counterclaim” and a “draft press release” were “prepared in anticipation of litigation or for trial.” Defendants’ counsel also did not waive their work-product protection when they shared otherwise valid work product (e.g. draft Answers or Counterclaims) with the PR firm for assistance because the communications were intended to be confidential.

Stardock Systems, Inc. v. Reiche, 2018 WL 6259536 (N.D.Cal. Nov. 30, 2018)

See also: Emails sent through Yahoo account using work computer protected under attorney-client privilege

Anonymous online trademark infringer can be identified through subpoena to domain registrar

Plaintiff trademark owner noticed that an unknown party was using plaintiff’s mark to sell email templates online without plaintiff’s authorization. After the unknown infringer’s domain name registrar (the case does not say whether it was also the web host) refused to take down the allegedly infringing content, plaintiff filed suit against the “John Doe” defendant. Since it needed to learn the identity of the defendant to move the case forward, plaintiff asked the court for early discovery that would permit plaintiff to send a subpoena to the registrar that would compel the registrar to identify its customer.

The court granted the motion for leave to take early discovery. It applied the standard set out in OpenMind Solutions, Inc. v. Does 1-39, 2011 WL 4715200 (N.D. Cal. Oct. 7, 2011) (citing Columbia Ins. Co. v. seescandy.com, 185 F.R.D. 578-80 (N.D. Cal. 1999)), which requires that prior to early discovery being permitted, a plaintiff must show:

  • Plaintiff can identify the missing party with sufficient specificity such that the court can determine that defendant is a real person or entity who could be sued in federal court;
  • Plaintiff has identified all previous steps taken to locate the elusive defendant;
  • Plaintiff’s suit against defendant could withstand a motion to dismiss; and
  • Plaintiff has demonstrated that there is a reasonable likelihood of being able to identify defendant through discovery such that service of process would be possible.

On the first factor, plaintiff had alleged that the Doe defendant owned or was using the specified domain name associated with the offending website to sell email templates using plaintiff’s trademark.

As for the second factor, plaintiff had contacted the domain name registrar, and asked that the information be taken down, but the registrar refused to do so. The domain name alone was not sufficient for plaintiff to identify the Doe defendant, and plaintiff had no other means to identify the Doe defendant besides the registrar’s record which it refused to provide without a subpoena.

Regarding the third factor, plaintiff made the required showing by alleging that it holds a valid trademark for its mark that the Doe defendant used to sell products on the offending website.

And concerning the fourth factor, the plaintiff had alleged that the registrar was the registrar for the domain name associated with the offending website and that it had stated it would pass the complaint information on to the website owner. The court found that plaintiff had thus demonstrated that a subpoena to the registrar should reveal the identity of the Doe defendant.

One should note this court’s willingness to permit early discovery as being in contrast to another court’s recent apparent disdain for a copyright troll plaintiff seeking the identity of an anonymous online infringer.

Marketo, Inc. v. Doe, 2018 WL 6046464 (N.D.Cal. Nov. 19, 2018)

Court labels copyright plaintiff as a troll and shuts down efforts to ID anonymous infringer

When a copyright plaintiff does not know who a particular alleged infringer is, it must first send a subpoena to the ISP assigned the IP address used to commit the alleged infringement. But the rules of procedure do not allow the sending of subpoenas until after the 26(f) conference – a meeting between the plaintiff and defendant (or their lawyers) to discuss the case. A plaintiff cannot have a 26(f) conference if the defendant has not been served with the complaint, and the complaint cannot be served unless the defendant’s identity is known.

So you can see the conundrum. To break out of this not-knowing, plaintiffs in situations like this will ask the court’s help through a motion for leave to take early discovery. That way the plaintiff can learn who the defendant is, serve the complaint, and move the case forward.

In the recent case of Strike 3 Holdings v. Doe, Judge Royce Lamberth of the U.S. District Court for the District of Columbia put a stop to the efforts of a plaintiff that it called a copyright troll right to its face (or at least right in the text of the opinion). The court denied Strike 3’s motion for leave to take early discovery to learn the identity of an unknown BitTorrent user accused of downloading pornography.

The court held that the plaintiff’s request was not specific enough, and the privacy interests of the unknown defendant, together with the social harm of being wrongfully accused of obtaining “particularly prurient pornography” were not outweighed by the trollish plaintiff’s need for the information.

Key to the court’s ruling was the idea that a subpoena in circumstances like this must be able to actually identify a defendant who could be sued. The court noted, however, that

Strike 3 could not withstand a 12(b)(6) motion in this case without resorting to far more intensive discovery machinations sufficiently establishing defendant did the infringing—examining physical evidence (at least the computers, smartphones, and tablets of anyone in the owner’s house, as well as any neighbor or houseguest who shared the Internet), and perhaps even interrogatories, document requests, or depositions. Strike 3’s requested subpoena thus will not—and may never—identify a defendant who could be sued.

The opinion is an entertaining read and conveys the judge’s clear frustration with copyright troll plaintiffs. Below are some of the more memorable quips.

Regarding the flaws of using IP addresses to identify people:

[Plaintiff’s] method [of identifying infringers] is famously flawed: virtual private networks and onion routing spoof IP addresses (for good and ill); routers and other devices are unsecured; malware cracks passwords and opens backdoors; multiple people (family, roommates, guests, neighbors, etc.) share the same IP address; a geolocation service might randomly assign addresses to some general location if it cannot more specifically identify another.

Regarding the public shame of being accused of infringing porn:

… But in many cases, the method is enough to force the Internet service provider (ISP) to unmask the IP address’s subscriber. And once the ISP outs the subscriber, permitting them to be served as the defendant, any future Google search of their name will turn-up associations with the websites Vixen, Blacked, Tushy, and Blacked Raw. The first two are awkward enough, but the latter two cater to even more singular tastes.

How trolls are quick to flee:

Indeed, the copyright troll’s success rate comes not from the Copyright Act, but from the law of large numbers. … These serial litigants drop cases at the first sign of resistance, preying on low-hanging fruit and staying one step ahead of any coordinated defense. They don’t seem to care about whether defendant actually did the infringing, or about developing the law. If a Billy Goat Gruff moves to confront a copyright troll in court, the troll cuts and runs back under its bridge. Perhaps the trolls fear a court disrupting their rinse-wash-and-repeat approach: file a deluge of complaints; ask the court to compel disclosure of the account holders; settle as many claims as possible; abandon the rest.

It’s pretty much extortion:

Armed with hundreds of cut-and-pasted complaints and boilerplate discovery motions, Strike 3 floods this courthouse (and others around the country) with lawsuits smacking of extortion. It treats this Court not as a citadel of justice, but as an ATM. Its feigned desire for legal process masks what it really seeks: for the Court to oversee a high-tech shakedown. This Court declines.

The court’s decision to deny discovery is anything but the rubber stamp approach so many judges in these kinds of cases over the past several years have been accused of employing.

Strike 3 Holdings v. Doe, 2018 WL 6027046 (D.D.C. November 16, 2018)

Court takes into consideration defendant’s privacy in BitTorrent copyright infringement case

Frequent copyright plaintiff Strike 3 Holdings filed a motion with the U.S. District Court for the District of Minnesota seeking an order allowing Strike 3 to send a subpoena to Comcast, to learn who owns the account used to allegedly infringe copyright. The Federal Rules of Civil Procedure created a bootstrapping problem or, as the court called it, a Catch-22, for Strike 3 – it was not able to confer with the unknown Doe defendant as required by Rule 26(f) because it could not identify the defendant, but it could not identify defendant without discovery from Comcast.

The court granted Strike 3’s motion for leave to take early discovery, finding that good cause existed for granting the request, and noting:

  • Strike 3 had stated an actionable claim for copyright infringement,
  • The discovery request was specific,
  • There were no alternative means to ascertain defendant’s name and address,
  • Strike 3 had to know defendant’s name and address in order to serve the summons and complaint, and
  • Defendant’s expectation of privacy in his or her name and address was outweighed by Strike 3’s right to use the judicial process to pursue a plausible claim of copyright infringement.

On the last point, the court observed that the privacy interest was outweighed especially given that the court could craft a limited protective order under Federal Rule of Civil Procedure 26(c) to protect an innocent ISP subscriber and to account for the sensitive and personal nature of the subject matter of the lawsuit.

Strike 3 Holdings, LLC v. Doe, 2018 WL 2278110 (D.Minn. May 18, 2018)

About the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Online marketer’s misappropriation claims against publicly traded former suitor move forward

Plaintiff – a small online marketing company – sued a large, publicly-traded competitor for copyright infringement, misappropriation of trade secrets, deceptive and unfair practices, and breach of contract. The parties had previously signed a nondisclosure agreement and an agreement whereby plaintiff would provide defendant with access to plaintiff’s technology used to monitor the scope of companies’ online presence and the accuracy of information appearing in search engines. The parties had also engaged in discussions about defendant acquiring plaintiff. But after the negotiations broke off, plaintiff discovered that it appeared defendant had appropriated plaintiff’s technology (including copyright-protected materials) into defendant’s own product offerings.

The lower court entered a preliminary injunction against defendant, barring it from offering the allegedly infringing and misappropriating technology. Defendant sought review of the entry of preliminary injunction with the U.S. Court of Appeals for the Eleventh Circuit. The appellate court affirmed the order.

The appellate court rejected defendant’s argument that the lower court had not described specifically enough those trade secrets of plaintiff that defendant had allegedly misappropriated. It also rejected defendant’s arguments that plaintiff’s delay in bringing suit undermined its argument of irreparable harm, that plaintiff failed to show that it was likely to succeed on the merits of its underlying claims, and that the district court erred in weighing the balance of harm and in considering the impact on the public interest.

Advice Interactive Group, LLC v. Web.com Group, Inc., 2018 WL 2246603 (11th Cir., May 16, 2018)

About the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Google can, at least for now, disregard Canadian court order requiring deindexing worldwide

U.S. federal court issues preliminary injunction, holding that enforcement of Canadian order requiring Google to remove search results would run afoul of the Communications Decency Act (at 47 U.S.C. 230)

canada-us
Canadian company Equustek prevailed in litigation in Canada against rival Datalink on claims relating to trade secret misappropriation and unfair competition. After the litigation, Equustek asked Google to remove Datalink search results worldwide. Google initially refused altogether, but after a Canadian court entered an injunction against Datalink, Google removed Datalink results from google.ca. Then a Canadian court ordered Google to delist worldwide, and Google complied. Google objected to the order requiring worldwide delisting, and took the case all the way up to the Canadian Supreme Court, which affirmed the lower courts’ orders requiring worldwide delisting.

So Google filed suit in federal court in the United States, seeking a declaratory judgment that being required to abide by the Canadian order would, among other things, be contrary to the protections afforded to interactive computer service providers under the Communications Decency Act, at 47 U.S.C. 230.

The court entered the preliminary injunction (i.e., it found in favor of Google pending a final trial on the merits), holding that (1) Google would likely succeed on its claim under the Communications Decency Act, (2) it would suffer irreparable harm in the absence of preliminary relief, (3) the balance of equities weighed in its favor, and (4) an injunction was in the public interest.

Section 230 of the Communications Decency Act immunizes providers of interactive computer services against liability arising from content created by third parties. It states that “[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” [More info about Section 230]

The court found that there was no question Google is a “provider” of an “interactive computer service.” Also, it found that Datalink—not Google—“provided” the information at issue. And finally, it found that the Canadian order would hold Google liable as the “publisher or speaker” of the information on Datalink’s websites. So the Canadian order treated Google as a publisher, and would impose liability for failing to remove third-party content from its search results. For these reasons, Section 230 applied.

Summarizing the holding, the court observed that:

The Canadian order would eliminate Section 230 immunity for service providers that link to third-party websites. By forcing intermediaries to remove links to third-party material, the Canadian order undermines the policy goals of Section 230 and threatens free speech on the global internet.

The case provides key insight into the evolving legal issues around global enforcement and governance.

Google, Inc. v. Equustek Solutions, Inc., 2017 WL 5000834 (N.D. Cal. November 2, 2017)

Court allows Microsoft to unmask unknown Comcast users accused of infringement

A federal court in Washington state has given the green light for Microsoft to subpoena records from Comcast to discover the identity of the person or persons associated with an IP address used to activate thousands of unauthorized copies of Microsoft software.

Statue_of_Anonymus_(Budapest,_2013)

Generally, in federal court litigation, a party cannot serve discovery requests or subpoenas until after the plaintiff and defendant have conferred (in a Rule 26(f) conference). But when the plaintiff does not know the identity of the defendant, there is a bootstrapping problem – discovery needs to be taken to find out the defendant with whom to conduct the conference. In situations like this, the plaintiff seeking to unmask an unknown defendant will file its complaint against one or more “John Does,” then ask the court for leave to serve discovery prior to the Rule 26(f) conference.

That is what happened in this case. It is a common tactic used by parties legitimately seeking to enforce intellectual property, as well as parties that may be considered copyright trolls. See, e.g., this early bittorrent case from 2011.

Microsoft filed its complaint and also filed a motion for leave to take discovery prior to the Rule 26(f) conference. Finding that good cause existed for the early discovery, the court granted the motion.

It held that

(1) Microsoft had associated the John Doe Defendants with specific acts of activating unauthorized software using product keys that were known to have been stolen from Microsoft, and had been used more times than were authorized for the particular software,

(2) Microsoft had adequately described the steps it took in an effort to locate and identify the John Doe defendants, specifically by utilizing its “cyberforensics” technology to analyze product key activation data, identifying patterns and characteristics which indicate software piracy,

(3) Microsoft had pleaded the essential elements to state a claim for copyright and trademark infringement, and

(4) the information proposed to be sought through a subpoena appeared likely to lead to identifying information that would allow Microsoft to serve the defendants with the lawsuit.

Microsoft Corp. v. John Does 1-10, 2017 WL 4958047 (W.D. Wash., November 1, 2017)

Image courtesy Dmitrij Rodionov under Creative Commons Attribution-Share Alike 3.0 Unported license. Licensed granted hereby under same terms.

Court orders transfer of domain name at preliminary injunction stage of trademark case

Plaintiff sued a competitor under the Anticybersquatting Consumer Protection Act (15 U.S.C. 1125(d) (“ACPA”)) and brought other trademark-related claims concerning the competitor’s alleged online scam of selling infringing nutritional supplement products. Plaintiff also sued the domain name privacy protection service Namecheap, which the competitor had used to register the domain name. As part of the order granting plaintiff’s motion for preliminary injunction, the court ordered Namecheap to transfer the domain name to plaintiff.

The court noted that a preliminary injunction “is an extraordinary remedy never awarded as of right,” and that the “traditional purpose of a preliminary injunction is to protect the status quo and to prevent irreparable harm during the pendency of the lawsuit.” Given these parameters, one may be reasonably surprised that the court went so far as to transfer the domain name before the case could be taken all the way through trial. Usually the transfer of the domain name is part of the final remedy awarded in a cybersquatting case, whether under the ACPA or the Uniform Domain Name Dispute Resolution Policy.

The opinion did not address the issue of whether the domain name transfer prior to trial might go further than to “protect the status quo”. It would seem the court could have just as easily protected the status quo by ordering the domain name not be used. The court apparently found the evidence to be drastically in favor of plaintiff. And since the defendant-competitor did not show up for the hearing, plaintiff’s evidence went unrebutted.

Nutramax Laboratories, Inc. v. Nutra Max Labs, Inc., 2017 WL 4707447 (D.S.C. October 20, 2017)

See also:

Evan_BrownAbout the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Online terms of service restricting competitor access to website were unenforceable

If you are in the habit of reading online terms and conditions, you may have encountered a provision that looks something like this:

You may not use the site to gain competitive intelligence about [Provider] to compete with [Provider] or its affiliates.

A court recently held that a provision containing essentially this language was not enforceable against a competitor accused of accessing and copying website content. The court found the provision to be an overly broad non-compete covenant under applicable state law, and likely against public policy. For this reason (among others), the court denied the plaintiff website owner’s motion for a temporary restraining order against the defendant competitor.

The court observed that the restriction was without any geographic or temporal limit. Nor was the provision saved by the requirement that use of “competitive intelligence” be the subject of restricted use. In this particular case, plaintiff was complaining of defendant’s use of information on the publicly-visible portions of plaintiff’s website. Under Illinois law, in order for a covenant not to compete be enforceable, the covenant must secure some “protectable interest” such as a trade secret. For purposes of denying the motion for a temporary restraining order, the court found that a covenant restricting the use of such widely disseminated, freely available information is likely unenforceable.

TopstepTrader, LLC v. OneUp Trader, LLC, 2017 WL 2798397 (N.D. Ill. June 28, 2017)

Evan_BrownAbout the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Eleventh Circuit requires copyright owner to obtain registration certificate before filing suit

Although an author owns the copyright in a work the moment he or she creates the work, a court will not hear a case over infringement of the work until the work is registered with the Copyright Office. Here is relevant language from the Copyright Act:

[N]o civil action for infringement of the copyright in any United States work shall be instituted until . . . registration of the copyright claim has been made in accordance with this title.

17 U.S.C. 411(a). Since the Copyright Office issues a certificate of registration when it registers the copyright in a work, one view is that the statute requires a copyright plaintiff to have that registration certificate in hand before filing suit.

But that is not how courts have always applied the statute. Other language in the Copyright Act says that:

the owner of copyright or of any exclusive right in the work may obtain registration of the copyright claim by delivering to the Copyright Office the deposit specified by this section, together with the application and fee specified by sections 409 and 708 [of the Copyright Act].

17 U.S.C. 408(a). Notice how 408(a) does not talk about receiving a registration certificate – it seems to indicate that registration occurs simply by the owner submitting the application, fee and deposit. Some courts have read this portion of the statute this way, and allowed a plaintiff to file suit for copyright infringement after submitting the materials to the Copyright Office but before the registration certificate is issued.

So there is a split among the federal circuits on this issue, namely, between the “registration approach” (requiring certificate in hand) and the “application approach” (requiring only that the application, fee and deposit have been made).

Recently, the Eleventh Circuit Court of Appeals weighed in on the issue. It sided with the registration approach – holding that the plain language of the Copyright Act requires it.

Plaintiff owned the copyright in online articles to which it granted a license to defendant website operator under a subscription agreement. The agreement required defendant to discontinue publication of the licensed content when the agreement terminated. But after termination, the articles remained online. So plaintiff sued for copyright infringement.

The lower court dismissed the action on defendant’s motion because plaintiff had not alleged receipt of the copyright registration certificate in the works at issue. It had only alleged that it had filed the applications to register the copyright claims in the works. Plaintiff sought review with the Eleventh Circuit. On appeal, the court affirmed the dismissal.

The court concluded that the Copyright Act defines registration as a process that requires action by both the copyright owner and the Copyright Office. It relied heavily on language from Section 410 of the Copyright Act that reads as follows:

When, after examination, the Register of Copyrights determines that, in accordance with the provisions of this title, the material deposited constitutes copyrightable subject matter and that the other legal and formal requirements of this title have been met, the Register shall register the claim and issue to the applicant a certificate of registration under the seal of the Copyright Office.

17 U.S.C. 410 (emphasis added). Bolstered by the dictionary definition of “after,” the court held “that registration occurs only after examination of an application necessarily means that registration occurs ‘[l]ater in time than’ or ‘subsequent to’ the filing of the application for registration.”

Fourth Estate Public Benefit Corporation v. Wall-Street.com, LLC, —F.3d —, 2017 WL 2191243 (11th Cir. May 18, 2017)

See also: Is a copyright registration required before filing an infringement lawsuit?

Evan_BrownAbout the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Scroll to top