From Casetext: Smarter Legal Research

Malibu Media, LLC v. Romer

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Oct 28, 2014
Civil Action No. 13-cv-03190-WYD-MEH (D. Colo. Oct. 28, 2014)

Opinion

Civil Action No. 13-cv-03190-WYD-MEH

10-28-2014

MALIBU MEDIA, LLC, Plaintiff, v. KEVIN ROMER, Defendant.


RECOMMENDATION OF UNITED STATES MAGISTRATE JUDGE

Plaintiff has filed a Motion for Entry of Default Judgment against Kevin Romer [filed September 29, 2014; docket #33]. Pursuant to 28 U.S.C. § 636(b)(1)(B) and D.C. Colo. LCivR 72.1(c), the motion was referred to me for a Report and Recommendation. The matter is briefed to the extent permitted by court rules and the prevailing law and the Court finds oral argument will not assist in the adjudication of the motion. Based upon the record and for the reasons that follow, the Court recommends that the District Court grant in part and deny in part the motion as set forth herein.

Be advised that all parties shall have fourteen (14) days after service hereof to serve and file any written objections in order to obtain reconsideration by the District Judge to whom this case is assigned. Fed. R. Civ. P. 72. The party filing objections must specifically identify those findings or recommendations to which the objections are being made. The District Court need not consider frivolous, conclusive or general objections. A party's failure to file such written objections to proposed findings and recommendations contained in this report may bar the party from a de novo determination by the District Judge of the proposed findings and recommendations. United States v. Raddatz, 447 U.S. 667, 676-83 (1980); 28 U.S.C. § 636(b)(1). Additionally, the failure to file written objections to the proposed findings and recommendations within fourteen (14) days after being served with a copy may bar the aggrieved party from appealing the factual findings of the Magistrate Judge that are accepted or adopted by the District Court. Thomas v. Arn, 474 U.S. 140, 155 (1985); Moore v. United States, 950 F.2d 656, 659 (10th Cir. 1991); Niehaus v. Kansas Bar Ass'n, 793 F.2d 1159, 1164 (10th Cir. 1986).

BACKGROUND

In this case, Plaintiff's allegations involve a complicated technical process used to download copyrighted works (here, motion pictures) through the BitTorrent program; therefore, this Court finds it necessary first to explain how BitTorrent works, then to note its findings of fact in this case.

I. BitTorrent Protocol

Several courts in this country have researched, defined and described the protocol in such a way that even technologically challenged individuals may understand the intricacies of the BitTorrent program. This Court finds particularly instructive and gratefully adopts the description provided by the Honorable Thomas L. Ludington, District Judge for the Eastern District of Michigan, in Patrick Collins, Inc. v. John Does 1-28, No. 12-13670, 2013 WL 359759 (E.D. Mich. Jan. 29, 2013), in which Judge Ludington first defines terms used with the protocol, then describes how BitTorrent operates. Id. at *1-*3. First, the vocabulary used in the technology:

Internet Protocol (IP): The system of communication standards that ensures data packets transmitted over the internet reach their intended destinations.



IP Address: The unique identifying number of a device connected to the internet.



Uniform Resource Locator (URL): The internet address assigned to a web document or resource by which it can be accessed by all web browsers.



File: A collection of related data packets treated as a unit.



Hash Identifier: A 40-character alphanumeric string that forms a unique identifier of an encoded file.



Hypertext Transfer Protocol (HTTP): A system of communication standards that
websites use to communicate with web browsers.



BitTorrent: A peer-to-peer file sharing protocol.



Peer: A BitTorrent user.



Swarm: A group of peers sharing a particular file (identified by its unique hash identifier). A swarm has two types of peers - "leechers" and "seeds." It bears reiterating: to constitute a swarm, all of the peers must be sharing the same file (identified by its unique hash identifier).



Initial Seeder: A BitTorrent user who first takes a particular file (such as a movie), breaks it into pieces, encodes the pieces with hash identifiers, creates a torrent file with the data about that file and its tracker, and makes the complete file available to other BitTorrent users.



Seed: A peer who downloaded a complete file and is uploading all of its pieces to other peers in the swarm.



Leecher: A peer in the process of downloading the file from the other peers. As soon as a leecher downloads new content (a piece of the file), the leecher begins sharing its content with the other leechers in the swarm.



Piece: A one-quarter megabyte size part of a file being shared via BitTorrent (except for the last, smaller piece, which is the size of the remainder of the file).



Tracker: A server containing an updated list of peers in the swarm. It allows a peer to learn about other peers sharing a particular torrent and join the swarm.



Torrent file: The hub of the BitTorrent system, a torrent file is a small file containing the file name, the IP address of the tracker, the number of and size of the pieces, and the hash identifier unique to the pieces of that particular torrent file.
Patrick Collins, Inc., 2013 WL 359759, at *1-*2 (citations omitted). Judge Ludington proceeds to describe the protocol and how BitTorrent works:
BitTorrent, as noted, is a peer-to-peer file sharing protocol. More precisely, it is a peer-to-peer model that improves on prior generations of peer-to-peer networks by solving the "free-rider problem wherein a substantial majority of users downloaded but never uploaded content."



. . .
Briefly, here's how BitTorrent works. A file transfer begins "when one user accesses the Internet through an ISP and intentionally makes a digital file of a work available to the public from his or her computer. This file is referred to as the first 'seed.' Other users, who are referred to as 'peers,' then access the Internet and request the file. These users engage each other in a group, referred to as a 'swarm,' and begin downloading the seed file. As each peer receives portions of the seed, that peer makes those portions available to other peers in the swarm."



Elaborating on the process, BitTorrent.org explains that to download a file, a peer performs six steps:



1. Install BitTorrent (or have done so already).
2. Surf the web.
3. Click on a link to a .torrent file.
4. Select where to save the file locally, or select a partial download to resume.
5. Wait for download to complete.
6. Tell downloader to exit (it keeps uploading until this happens).



BitTorrent's key, as noted, is reciprocity - a peer not only downloads but automatically uploads pieces to other peers. "To keep the torrent operating at maximum capacity, the BitTorrent protocol uses a process called pipelining. Every active peer in a torrent maintains a continuously refreshed queue of requests for pieces, so that no connection is ever left idle after any one piece is downloaded."



"In addition, the protocol has an internal mechanism that makes sure that those peers who are offering little or nothing to the torrent will get little or nothing from it."



In sum, BitTorrent is a reciprocal, decentralized network - and a tough nut to crack for copyright holders:



Data is not stored on a central server. Rather, a user downloads the file in discrete segments from many different users who send data directly to one another. While trackers coordinate and assist peers in locating a swarm, the tracker itself sends out very little data. This makes BitTorrent an extremely efficient mechanism for transferring large files and at the same time, it insulates the protocol itself from anti-piracy efforts because there are no central servers to enjoin from unlawfully distributing copyrighted content. Thus, when copyrighted data is transmitted via BitTorrent, the copyright holder is largely limited to holding the individual file sharers liable for infringement.
Id. at *2-*3 (citations omitted).

II. Findings of Fact

1. Defendant Kevin is an individual residing at 5079 Hahns Peak Drive, Apt 207, Loveland, Colorado 80538. Romer was served with a summons and the Amended Complaint in this action on March 24, 2014. Affidavit of Service, docket #24. 2. Plaintiff's investigator, IPP International UG ("IPP"), established a direct connection with IP address 75.71.86.68, which has been identified by the applicable Internet Service Provider (ISP) as belonging to Defendant Romer. Declaration of Tobias Feiser, November 14, 2013 ("Tobias Declaration"), docket #7-5. 3. IPP downloaded from Romer one or more bits of each of the digital movie files identified by file hashes as follows:

Hit Date UTC

File Hash

Title

11/03/2013

804214E40F3E19E6BB1BF041223C05E2B5DBF7DC

Baby Blues

10/30/2013

5CD20FA4A34CE40E898CEEC6137FE7AE3E2ED6BC

Inside Perfection

10/30/2013

AF4FEA9577B0B1C6C617B7CD3C048BB0283C2448

The Rich Girl Part #2

10/30/2013

841AE30EB3A24D9C3DD23EC404AEE624AF51F21D

The Rich Girl Part #1

10/30/2013

37D44FCBF59A6AED4BCE107A68A76F8743B5C845

Getting Down

10/30/2013

91DC7B1778E4991271119B567B0420D9167F7DD6

Alone Is A Dream Left Behind

10/26/2013

91AF7A51D429BF0E21F54434ED94EEAB5826238A

Spilled Milk

10/23/2013

0AA188B118CC0BEE2E97576329E95EE26C64BB5E

After Hours

10/23/2013

21CB0059F8C803DA79C268CBD6F0560FF42AD035

Hot Sauna

10/23/2013

BA23078533CCBE4BCF265D99A9E6DE3420120683

One Night Stand

10/23/2013

3E60B49558C53CC04D6336A30107A263AF5D75EF

A Little Rain Must Fall

10/07/2013

9A35174890888941570D5DA7DF313CA97D55A5C7

Girls Love Pink and Diamonds

10/07/2013

8373AF619CD811248AFE99516087ACF2F9739585

Spontaneous

10/07/2013

A4F0D5D94A5E801DD216126C439FCEFAEF3A1A3A

Date Night at Home

10/07/2013

2A824AB2281C9EA53A2A153C1B4B5AE3B61C464F

Come Inside From the Cold

10/07/2013

ADB8EAAB9E1AF222D0686290A504F7ECE186279D

She Bad

10/07/2013

DC404D9BB1A9813872BA7D1AE077540B14F9A371

Come from Behind

09/19/2013

1324805ABD0356D543172B86246390BE41CD9DF6

Burning


Tobias Declaration, docket #7-5; see also Exhibit A to Amended Complaint, docket #14-1. 4. Each of the cryptographic file hashes as set forth above correlates to copyrighted movies owned by Plaintiff as identified here:

Title

Registration Number

Date of First Publication Registration Date



A Little Rain Must Fall

PA0001822653

01/23/2013

01/27/2013

After Hours

PA0001780461

11/21/2011

03/10/2012

Alone Is A Dream Left Behind

PA0001860984

08/24/2013

09/10/2013

Baby Blues

PENDING

10/30/2013

11/03/2013

Burning

PA0001860951

07/27/2013

08/26/2013

Come from Behind

PA0001863248

09/23/2013

09/26/2013

Come Inside From the Cold

PA0001862484

09/12/2013

09/18/2013

Date Night at Home

PA0001864689

09/29/2013

09/30/2013

Getting Down

PA0001838601

04/25/2013

05/14/2013

Girls Love Pink and Diamonds

PA0001862290

09/05/2013

09/08/2013

Hot Sauna

PA0001780471

08/31/2011

03/10/2012

Inside Perfection

PA0001817756

12/02/2012

12/16/2012

One Night Stand

PA0001794973

05/02/2012

05/02/2012

She Bad

PA0001862295

08/30/2013

09/08/2013

Spilled Milk

PA0001833299

03/08/2013

04/01/2013

Spontaneous

PA0001860977

08/22/2013

09/10/2013

The Rich Girl Part #1

PA0001780475

11/02/2011

03/10/2012

The Rich Girl Part #2

PA0001762808

11/16/2011

11/30/2011


Amended Complaint ¶ 20; see also Exhibit B to Amended Complaint, docket #14-2. 5. IPP downloaded from Romer one or more bits of each of the digital movie files identified by the file hashes above, and further downloaded a full copy of each file hash from the BitTorrent file distribution network and confirmed through independent calculation that the file hash matched what is listed above. Tobias Declaration, ¶¶ 13-14, docket #7-5. 6. IPP then verified that the digital media file correlating to each file hash listed above contained a copy of a movie which is identical (or alternatively, strikingly similar or substantially similar) to the movie associated with that file hash. Id. at ¶¶ 15-16. 7. This process indicates that Romer downloaded and uploaded Plaintiff's copyrighted works without authorization or payment. Amended Complaint, ¶ 19. 8. The most recent connection between IPP and Romer's IP address for each file hash listed above is included within the column labeled Hit Date UTC. UTC refers to Universal Time which is utilized for air traffic control as well as computer forensic purposes. Id., ¶ 22. 9. IPP also engaged in enhanced surveillance of other digital media files that had been distributed by Romer. Tobias Declaration, ¶ 17, docket #7-5; Amended Complaint, ¶ 24. 10. Plaintiff seeks statutory damages for willful infringement and injunctive relief in this case. Amended Complaint, docket #14 at 7-8.

PROCEDURAL HISTORY

Plaintiff initiated this action on November 21, 2013. The case was originally drawn to Senior Judge Wiley Y. Daniel and to the undersigned as a result of a decision to have the numerous, related cases in this District assigned to a single District Judge and Magistrate Judge for efficiency purposes. On March 20, 2014, Plaintiff filed an Amended Complaint naming Kevin Romer as the sole Defendant in this case. Plaintiff served a summons and the Amended Complaint upon Defendant Romer on March 24, 2014; thus, Romer's answer or other response was due to be filed on or before May 7, 2014. Docket #24. However, Romer filed no answer nor other response before the deadline. This Court held a Scheduling Conference on May 13, 2014 at which the Defendant failed to appear; the Court then issued an Order for Defendant to show cause for his failures to appear and defend. Dockets ## 25, 26. When Defendant failed to respond to the order to show cause, this Court recommended, and the District Court ordered that default be entered against Romer. Dockets ## 29, 30. An Entry of Default was docketed by the Clerk of the Court on July 10, 2014. Docket #31. Plaintiff filed the present motion seeking default judgment on September 29, 2014; although provided the opportunity to do so, Defendant Romer did not respond.

The Court is now fully advised and recommends as follows.

LEGAL STANDARDS

Fed. R. Civ. P. 55 governs motions for default judgment. Rule 55(b)(2) provides the authority for the District Court to enter default judgment. After an entry of default, a defendant cannot defend a claim on the merits. See Olcott v. Delaware Flood Co., 327 F.3d 1115, 1125 (10th Cir. 2003) ("defendant, by his default, admits the plaintiff's well-pleaded allegations of fact") (quoting Jackson v. FIE Corp., 302 F.3d 515, 525 (5th Cir. 2002) (finding that "[a] default judgment is unassailable on the merits.")); see also Adriana Int'l Corp. v. Thoeren, 913 F.2d 1406, 1414 (9th Cir. 1990) ("[A] default judgment generally precludes a trial of the facts except as to damages.").

Even after entry of default, however, it remains for the court to consider whether the unchallenged facts constitute a legitimate basis for the entry of a judgment. See McCabe v. Campos, No. 05-cv-00846-RPM, 2008 WL 576245, at *2 (D. Colo. Feb. 28, 2008) (unpublished) (citing Black v. Lane, 22 F.3d 1395, 1407 (7th Cir. 1994)). In determining whether a claim for relief has been established, the well-pleaded facts of the complaint relating to liability are deemed true. Id. (citing Dundee Cement Co. v. Howard Pipe & Concrete Prods., Inc., 722 F.2d 1319, 1323 (7th Cir. 1983)); see also Personal Indus. Loan Corp. v. Forgay, 240 F.2d 18, 20 (10th Cir. 1957) ("By failing to appear and permitting a default judgment to be entered, [defendant] admitted only facts well pleaded"). In addition, the court accepts the undisputed facts set forth in any affidavits and exhibits. Deery American Corp. v. Artco Equip. Sales, Inc., No. 06-cv-01684-EWN-CBS, 2007 WL 437762, at *3 (D. Colo. Feb. 6, 2007) (unpublished).

"[A] party is not entitled to a default judgment as of right; rather the entry of a default judgment is entrusted to the 'sound judicial discretion' of the court." Cablevision of Southern Connecticut, Ltd. P'ship v. Smith, 141 F. Supp. 2d 277, 281 (D. Conn. 2001) (quoting Shah v. New York State Dep't of Civil Serv., 168 F.3d 610, 615 (2d Cir. 1999)). A trial court is vested with broad discretion in deciding whether to enter a default judgment. Grandbouche v. Clancy, 825 F.2d 1463, 1468 (10th Cir. 1987); see also Weft, Inc. v. G.C. Inv. Assocs., 630 F. Supp. 1138, 1143 (E.D.N.C. 1986) (citing Nishimatsu Constr. Co. v. Houston Nat'l Bank, 515 F.2d 1200, 1206 (5th Cir. 1975)) ("upon a default, a plaintiff is entitled to a determination of liability unless he has failed to state a legal basis for relief or it is clear from the face of the complaint that the allegations are not susceptible of proof").

ANALYSIS

Upon review of the record, the Court recommends finding that default judgment be entered in Plaintiff's favor against Defendant Romer pursuant to Fed. R. Civ. P. 55(b)(2) as follows.

I. Jurisdiction and Liability

In determining whether entry of default judgment is warranted, the court must first consider personal and subject matter jurisdiction. See, e.g., Williams v. Life Sav. & Loan, 802 F.2d 1200, 1203 (10th Cir. 1986) (lack of subject matter jurisdiction constitutes good cause to set aside a default judgment); see also Dennis Garberg & Assoc. v. Pack-Tech Int'l Corp., 115 F.3d 767, 772 (10th Cir. 1997) (district court erred in failing to determine personal jurisdiction issue before considering entry of default judgment). Here, the record reveals that Defendant Romer resides in Colorado and was served with process at his residence, 5079 Hahns Peak Drive, Apt 207, Loveland, Colorado 80538. See docket #24. As such, the Court has personal jurisdiction over Romer. In addition, this is a copyright infringement case, and the federal courts have original jurisdiction in such cases. See 28 U.S.C. § 1338. The Copyright Act creates a cause of action in favor of the owner of a copyright for direct infringement. 17 U.S.C. § 501.

Furthermore, taking its allegations as true, the Plaintiff has established violations of its copyrights by Defendant Romer, in that a computer at Romer's residence participated in an illegal download of eighteen (18) of Plaintiff's copyrighted works. A plaintiff is entitled to a determination of liability unless it has failed to state a legal basis for relief or it is clear from the face of the complaint that the allegations are not susceptible of proof. Weft, Inc., 630 F. Supp. at 1143. Here, Plaintiff alleges the following claims, summarized as follows:

The BitTorrent file distribution network ("BitTorrent") is one of the most common peer-to-peer file sharing venues used for distributing large amounts of data, including ... digital movie files. [Amended Complaint] at ¶ 10. In order to distribute a large file, the BitTorrent protocol breaks a file into many small pieces called bits. Users then exchange these small bits amongst each other[.] Id. at ¶ 12. After the infringer receives all of the bits of a digital media file, the infringer's BitTorrent client software reassembles the bits so that the file may be opened and utilized. Id. at ¶ 13.



Each bit of a BitTorrent file is assigned a unique cryptographic hash value. Id. at ¶ 14. The BitTorrent protocol utilizes cryptographic hash values to ensure each bit is properly routed amongst BitTorrent users as they engage in file sharing. Id. at ¶ 15. The entirety of the digital media file also has a unique cryptographic hash value ... Once infringers complete downloading all bits which comprise a digital media file, the BitTorrent software uses the file hash to determine that the file is complete and accurate. Id. at ¶ 16.



Plaintiff's investigator, IPP International UG, established a direct TCP/IP connection with the Defendant's IP address as set forth on Exhibit A. Id. at ¶ 17. IPP International UG downloaded from Defendant one or more bits of each of the digital movie files identified by the file hashes on Exhibit A. Id. at ¶ 18. Each of the cryptographic file hashes as set forth on Exhibit A correlates to copyrighted movies owned by Plaintiff as identified on Exhibit B. Id. at ¶ 20. IPP International UG [] verified that the digital media file correlating to each file hash listed on Exhibit A contained a copy of a movie which is identical (or alternatively, strikingly similar or substantially similar) to the movie associated with that file hash on Exhibit A. Id. at ¶ 21.



IPP International UG further downloaded a full copy of each file hash from the BitTorrent file distribution network and confirmed through independent calculation that the file hash matched what is listed on Exhibit A. Id. at ¶ 21. IPP International UG downloaded from Defendant one or more bits of each digital media file as identified by its hash value on Exhibit A. The most recent TCP/IP connection between IPP and the Defendant's IP address for each file hash listed in Exhibit A is included within the column labeled Hit Date UTC. Id. at ¶ 22.



By using BitTorrent, Defendant copied and distributed the constituent elements of
each of the original works covered by the Copyrights-in-Suit. Id. at ¶ 32. Plaintiff did not authorize, permit or consent to Defendant's distribution of its works. Id. at ¶ 33. Asa result of the foregoing, Defendant violated Plaintiff's exclusive [copy]right[s]. Id. at ¶ 34. Defendant's infringements were committed "willfully" within the meaning of 17 U.S.C. § 504(c)(2). Id. at ¶ 35.
Motion, docket #33-1 at 4-7.

There are two elements to a copyright infringement claim: "(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original." La Resolana Architects, PA v. Reno, Inc., 555 F.3d 1171, 1177 (10th Cir. 2009) (quoting Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991)). "The plaintiff bears the burden of proof on both elements." Id. (citing Palladium Music, Inc. v. EatSleep Music, Inc., 398 F.3d 1193, 1196 (10th Cir. 2005)).

Here, the Plaintiff alleges it owns the copyrights to each of the works (films) listed above, and provides the registration number, publication date and registration date for each such film. See supra; see also Exhibit B to Amended Complaint, docket #14-2. The Court takes Plaintiff's wellpleaded allegations as true.

For the second element, Plaintiff must prove that Romer "unlawfully appropriated protected portions ofthe copyrighted work." La Resolana Architects, 555 F.3d at 1178 (quoting Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 832 (10th Cir. 1993)). "This requires proving both: (1) that [Defendant], as a factual matter, copied portions of [Plaintiff's] work; and (2) that those elements of the work that were copied were 'protected expression and of such importance to the copied work that the appropriation is actionable.'" Id.; see also Jacobsen v. Deseret Book Co., 287 F.3d 936, 942 (10th Cir. 2002).

"[A] plaintiff can indirectly prove copying (in a factual sense) 'by establishing that a defendant had access to the copyrighted work and that there are probative similarities between the copyrighted material and the allegedly copied material.'" La Resolana Architects, 555 F.3d at 1178 (quoting Country Kids 'N City Slicks, Inc. v. Sheen, 77.F3d 1280, 1284 (10th Cir. 1996)). "A plaintiff may meet the initial burden of establishing access 'by showing that the defendant had a reasonable opportunity to view or [an] opportunity to copy the allegedly infringed work.'" Id. (quoting Autoskill Inc. v. Nat'l Educ. Support Sys., Inc., 994 F.2d 1476, 1490 (10th Cir. 1993), overruled on other grounds by TW Telecom Holdings Inc. v. Carolina Internet Ltd., 661 F.3d 495, 496 (10th Cir. 2011)). "Thus, while a plaintiff is not required to demonstrate the defendant's actual access to the work, 'evidence that only creates a bare possibility that the defendant had access is not sufficient.'" Id. (quoting Mag Jewelry Co. v. Cherokee, Inc., 496 F.3d 108, 117 (1st Cir. 2007)).

Once copying has been established, "liability for copyright infringement will attach only where protected elements of a copyrighted work are copied." Id. at 1180 (quoting Country Kids 'N City Slicks, Inc., 77 F.3d at 1284). "The plaintiff must prove that there is a "substantial similarity between those aspects of Plaintiff's [work] which are legally protectable and the Defendants' [work]." Id. Substantial similarity is measured by whether an "ordinary observer," who is not specifically looking for disparities, would tend to overlook any differences between the works. Id.

In this case, Plaintiff has sufficiently alleged that Romer copied its protected works by demonstrating, through verified testimony, that its investigator was able to download from Romer's IP address one or more bits of each of the digital movie files identified by file hashes, then downloaded a full copy of each file hash from the BitTorrent file distribution network (accessed by Romer) and confirmed through independent calculation that the file hash matched the Plaintiff's copyrighted works. Plaintiff's investigator then verified that the digital media file correlating to each file hash contained a copy of a movie which is identical, strikingly similar or substantially similar to the movie associated with that file hash. In fact, Plaintiff's investigator, Tobias Feiser, declares that he verified the similarity of the works by "view[ing] each movie side-by-side with the corresponding digital movie file identified by its file hash value." Tobias Declaration, ¶ 16, docket #7-5. Taking these well-pled allegations as true, the Court finds that Plaintiff has established Defendant Romer copied Plaintiff's copyright protected works and recommends that the District Court find Romer has committed eighteen (18) direct infringements of the Copyright Act against the Plaintiff.

II. Damages

Here, Plaintiff seeks statutory damages and costs for the eighteen (18) alleged copyright infringements during the period, September-November 2013. Under federal copyright law, "the copyright owner may . . . recover . . . an award of statutory damages for all infringements involved in the action, with respect to any one work . . . a sum of not less than $750 or more than $30,000 as the court considers just." 17 U.S.C. § 504(c)(1). Damages may be increased to up to $150,000 if the infringement is willful. 17 U.S.C. § 504(c)(2).

In this case, Plaintiff seeks $40,500.00 ($2,250.00 per infringement) on the basis of its allegation of willful infringement. Plaintiff also seeks proportionate attorney's fees and costs, in the amount of $1,182.00 and $470.00 respectively. These are also authorized under the statute. Id. § 505. Finally, Plaintiff seeks injunctive relief to prevent any further violations by Romer, pursuant to 28 U.S.C. § 502 as follows:

(A) Permanently enjoin Defendant and all other persons who are in active concert or participation with Defendant from continuing to infringe Plaintiff's copyrighted works;
(B) Order that Defendant delete and permanently remove the digital media files relating to Plaintiff's works from each of the computers under Defendant's possession, custody or control;



(C) Order that Defendant delete and permanently remove the infringing copies of the works Defendant has on computers under Defendant's possession, custody or control.
Amended Complaint, docket #14 at 7. Notably, 17 U.S.C. § 503(b) provides that "the court may order the destruction ... of all copies ... found to have been made or used in violation of the copyright owner's exclusive rights."

This case is one of dozens filed in this District and handled by me as Magistrate Judge. It is also one of hundreds or, perhaps, thousands filed around the country in recent years by Plaintiff and other owners of pornographic films. Many of the defendants named in these lawsuits settle very early in the case. Some of those who do not settle have denied any participation in copyright infringement. Other defendants allege that their wireless connection may have been used by someone else to participate in the alleged swarm against Plaintiff's protected movies.

However, in this case, there is no evidence that anyone other than Romer committed the infringements, and evidence exists of his repeated infringements over a three-month period. Despite being informed both before and during this litigation of the allegations against him, Romer has failed to answer or otherwise defend himself in this case. For these reasons, I believe that Plaintiff has established entitlement to willful infringement damages.

Furthermore, Plaintiff has established at a previous hearing in a related case that courts across the country have typically awarded an average of $2,250.00 per infringement in cases of this type. As an exercise of judicial discretion, I believe that a statutory damage award of $2,250.00 per infringement is appropriate and just in this case to accomplish the intent set forth by Congress in passing the Copyright Act. In addition, Plaintiff's request for $1,652.00 for attorney's fees and costs should be granted.

Finally, Plaintiff seeks injunctive relief prohibiting Defendant Romer from infringing Plaintiff's copyrighted works and requiring Defendant Romer to delete the torrent file relating to Plaintiff's movies from each computer in Defendant Romer's possession, custody or control, and to delete any actual copy of Plaintiff's copyrighted works from such computers. The Court finds that Plaintiff's requests for an order directing Romer to "delete and permanently remove the digital media files relating to Plaintiff's works" and to "delete and permanently remove the infringing copies of the works" from each of the computers under Romer's possession, custody or control are reasonable requests and should be granted.

However, the Plaintiff has failed to proffer evidence sufficient to justify its request to enjoin Romer "from continuing to infringe Plaintiff's copyrighted works"; Plaintiff has produced no evidence that, as of this date, Romer actually possesses the copyrighted works on his computer(s) and continues to upload them to others. Further, there is no evidence today that Romer has downloaded (copied) any other of the Plaintiff's copyrighted works since November 2013.

The Court notes that, if the District Court were to grant Plaintiff's requested injunction for the deletion of Plaintiff's copyrighted works on Romer's computer(s), Romer would be unable to "continue" uploading such works via the BitTorrent system. Therefore, the Court recommends that the District Court deny Plaintiff's request for an order enjoining Romer from "continuing" to infringe on the Plaintiff's copyrighted works.

CONCLUSION

Based on the foregoing, and the entire record provided to the Court, I do respectfully RECOMMEND that the District Court GRANT IN PART AND DENY IN PART the Plaintiff's Motion for Entry of Default Judgment against Kevin Romer[filed September 29, 2014; docket #33] as follows:

1. Enter judgment in Plaintiff's favor against Defendant Kevin Romer for direct copyright infringement of the Plaintiff's copyrighted works, as set forth in Count I of the Complaint;



2. Order Defendant Romer to pay to Plaintiff the sum of $40,500.00 in statutory damages, as authorized by 17 U.S.C. § 504(c)(1), and $1,652.00 for attorney's fees and costs as authorized by 17 U.S.C. § 505;



3. Order Defendant Romer to permanently destroy all the digital media files relating to, and copies of, Plaintiff's copyrighted works made or used by him in violation of Plaintiff's exclusive rights, as well as all masters in his possession, custody or control from which such copies may be reproduced; and



4. Deny Plaintiff's request to "[p]ermanently enjoin Defendant and all other persons who are in active concert or participation with Defendant from continuing to infringe Plaintiff's copyrighted works."

Dated at Denver, Colorado, this 28th day of October, 2014.

BY THE COURT:

/s/

Michael E. Hegarty

United States Magistrate Judge


Summaries of

Malibu Media, LLC v. Romer

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Oct 28, 2014
Civil Action No. 13-cv-03190-WYD-MEH (D. Colo. Oct. 28, 2014)
Case details for

Malibu Media, LLC v. Romer

Case Details

Full title:MALIBU MEDIA, LLC, Plaintiff, v. KEVIN ROMER, Defendant.

Court:UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Date published: Oct 28, 2014

Citations

Civil Action No. 13-cv-03190-WYD-MEH (D. Colo. Oct. 28, 2014)