Judgments

Decision Information

Decision Content

T-2058-12

2014 FC 161

Voltage Pictures LLC (Plaintiff)

v.

John Doe and Jane Doe (Defendants)

Indexed as: Voltage Pictures LLC v. John Doe

Federal Court, Aalto P.—Toronto, June 25, 2013 and February 20, 2014.

Copyright — Infringement — Motion for Norwich order seeking names, addresses of subscribers of Internet service provider TekSavvy Solutions Inc. (TekSavvy) — Plaintiff pursuing litigation against subscribers for unauthorized copying, distribution of copyrighted cinematographic works over peer-to-peer networks — Arguing, inter alia, that principles in BMG Canada Inc. v. John Doe (BMG) met, TekSavvy having to release information on subscribers — Whether order should be made granting plaintiff right to examine TekSavvy as non-party to litigation; what protections should be built into order to minimize invasion of privacy of subscribers — Order warranted as plaintiff demonstrating bona fide case of copyright infringement, meeting criteria of Federal Courts Rules, r. 238 — Privacy considerations not shield for wrongdoing, must yield to request for information — Intellectual property ipso facto worthy of protection — Plaintiff meeting principles enunciated in BMG — Enforcement of plaintiff’s rights outweighing privacy interests of subscribers — However, privacy rights to be invaded minimally — Court wary of spectre of copyright trolls, flood of cases involving subscribers — Intent to enforce intellectual property rights essential requirement in commencing proceedings — U.K., U.S. courts imposing safeguards against misuse of Norwich orders — Considerations flowing from case law including that moving party must demonstrate bona fide case; that safeguards be put in place; that Court retain authority to ensure Norwich order not abused — Action herein was to proceed as specially managed action, case management judge to be appointed, draft demand letter to be reviewed by Court — Motion granted.

Privacy — Motion for Norwich order seeking names, addresses of subscribers of Internet service provider — Plaintiff seeking to pursue litigation against subscribers for unauthorized copying, distribution of copyrighted cinematographic works over peer-to-peer networks — Whether order should be made granting plaintiff right to examine TekSavvy as non-party to litigation; what protections should be built into order to minimize invasion of privacy of subscribers — Order warranted — Privacy considerations not shield for wrongdoing, must yield to request for information — Enforcement of plaintiff’s rights outweighing privacy interests of subscribers — However, privacy rights to be invaded minimally — Action herein was to proceed as specially managed action, case management judge to be appointed, draft demand letter to be reviewed by Court — Order thus balancing rights of subscribers, plaintiff.

Practice — Discovery — Examination for Discovery — Motion for Norwich order seeking names, addresses of subscribers of Internet service provider — Plaintiff seeking to pursue litigation against subscribers for unauthorized copying, distribution of copyrighted cinematographic works over peer-to-peer networks — Whether order should be made granting plaintiff right to examine TekSavvy as non-party to litigation — Principles applying to equitable bill of discovery applying to test to be met under Federal Courts Rules, r. 238 — Order warranted as plaintiff demonstrating bona fide case of copyright infringement, meeting criteria of r. 238 — Plaintiff meeting principles enunciated in BMG Canada Inc. v. John Doe; that decision still binding on Court.

This was a motion for an order seeking the names and addresses of subscribers of TekSavvy Solutions Inc. (TekSavvy), an Internet service provider (ISP). The type of order requested by the plaintiff was a Norwich order, which requires a third party to disclose information in their possession regarding unlawful conduct.

The plaintiff, a film production company, sought to pursue litigation against the subscribers for the unauthorized copying and distribution of its copyrighted cinematographic works over peer-to-peer networks using the BitTorrent Protocol through TekSavvy. A forensic investigation identified the Internet Protocol addresses of the subscribers who offered the works for transfer or distribution. The plaintiff argued, inter alia, that it met all of the principles enunciated in BMG Canada Inc. v. John Doe (BMG), and that TekSavvy should be ordered to release the information on the subscribers. The intervener Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic (CIPPIC) argued, inter alia, that the Court should not readily compel innocent third parties to divulge information that breaches the privacy expectations of individuals.

At issue was whether the order should be made to grant the plaintiff the right to examine TekSavvy as a non-party to the litigation to obtain contact information of the subscribers; and if so, what protections should be built into the order to protect or minimize the invasion of privacy of the subscribers.

Held, the motion should be granted.

The plaintiff demonstrated a bona fide case of copyright infringement. In BMG, the Federal Court of Appeal determined that the legal principles that apply to the equitable bill of discovery apply to the test that a plaintiff must satisfy under rule 238 of the Federal Courts Rules. An order is warranted where a plaintiff has a bona fide claim and meets the criteria of rule 238. On the basis of the current case law, there did not seem to have been a shift from the bona fide standard as established in BMG to the higher standard of a prima facie case. That decision was still binding. Privacy considerations should not be a shield for wrongdoing and must yield to an injured party’s request for information from non-parties. This should be the case irrespective of the type of right the claimant holds. Intellectual property is ipso facto assumed to be worthy of legal protection where a valid cause of action is established. Copyright is a valuable asset which should not be easily defeated by infringers. It was not clear in this case that the protection of copyright was the sole motivating factor supporting the plaintiff’s claim. In addition to establishing that it had a bona fide claim, the plaintiff also provided evidence that it holds copyright over the works alleged to have been infringed. The enforcement of the plaintiff’s rights as a copyright holder outweighed the privacy interests of the affected Internet users. However, that was not the end of the matter. It was necessary to ensure that the privacy rights at issue were invaded in the most minimal way possible.

The plaintiff’s position that infringers should not hide behind a veil of Internet anonymity would be an acceptable position but for the spectre of the “copyright troll” and the mischief that is created by compelling ISPs to reveal private information about their customers. There is also the spectre of flooding the Court with an enormous number of cases involving the subscribers, many of whom may have perfectly good defences to the alleged infringement. Finally, the damages against individual subscribers even on a generous consideration of the Copyright Act damage provisions may be minuscule compared to the cost, time and effort in pursuing a claim against the subscriber. As to the principles that should guide Norwich orders, commencing proceedings in intellectual property cases is an essential requirement in the sense that there must be an intention to enforce intellectual property rights. A review of cases from the United Kingdom and the United States suggested, inter alia, that those jurisdictions are concerned with sanctioning a business model that coerces innocent people into settlements, and appear open to imposing safeguards and overseeing the disclosure process to ensure that plaintiffs do not misrepresent the effects of the Norwich order. A non-exhaustive list of considerations flows from cases in the U.S., the U.K. and Canada, including: that the moving party must demonstrate a bona fide case; that safeguards must be put in place so that alleged infringers receiving any “demand” letter from a party obtaining an order under rule 238 or a Norwich order not be intimidated into making a payment without the benefit of understanding their legal rights and obligations; and that, when issuing a Norwich order, the Court may retain the authority to ensure that it is not abused by the party obtaining it and can impose terms on how its provisions are carried out.

As a result, to maintain control over the implementation of the order, it was determined that the action herein was to proceed as a specially managed action and that a case management judge would be appointed to monitor the conduct of the plaintiff in its dealings with the alleged infringers. Further, the draft demand letter was to be reviewed by the Court to ensure that there would be no inappropriate language. The order herein thus balanced the rights of Internet users who were alleged to have downloaded the copyrighted works against the rights of the plaintiff to enforce its rights in those works.

STATUTES AND REGULATIONS CITED

Canadian Charter of Rights and Freedoms, being Part I of the Constitution Act, 1982, Schedule B, Canada Act 1982, 1982, c. 11 (U.K.) [R.S.C., 1985, Appendix II, No. 44], ss. 7, 8.

Copyright Act, R.S.C., 1985, c. C-42, ss. 35, 38.1.

Federal Courts Rules, SOR/98-106, r. 238.

Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5.

TREATIES AND OTHER INSTRUMENTS CITED

Convention for the Protection of Human Rights and Fundamental Freedoms, November 4, 1950, 213 U.N.T.S. 221.

CASES CITED

followed:

BMG Canada Inc. v. John Doe, 2005 FCA 193, [2005] 4 F.C.R. 81.

applied:

1654776 Ontario Ltd. v. Stewart, 2013 ONCA 184, 114 O.R. (3d) 745; Media CAT Ltd. v. Adams & Ors, [2011] EWPCC 6 (BAILII), [2011] F.S.R. 28; Golden Eye (International) Ltd. & Anor v. Telefonica UK Ltd., [2012] EWHC 723 (Ch.) (BAILII).

considered:

TCYK, LLC v. Does 1 – 88, 2013 U.S. Dist. LEXIS 88402 (N.D. Ill., 2013); Norwich Pharmacal Co. v. Customs and Excise Comrs., [1974] A.C. 133 (H.L.); Voltage Pictures LLC v. Jane Doe, 2011 FC 1024, 395 F.T.R. 315; Rugby Football Union v. Consolidated Information Services, [2012] UKSC 55, [2013] 1 All E.R. 928; Malibu Media, LLC v. John Does, 902 F. Supp. 2d 690 (E.D. Pa., 2012); Ingenuity 13 LLC v. John Doe, 2013 WL 1898633 (C.D. Cal., 2013); Malibu Media, LLC v. John Does 1-5, 285 F.R.D. 273 (D. N.Y., 2012); Third Degree Films v. Does 1-47, 286 F.R.D. 188 (D. Mass., 2012); Combat Zone, Inc. v. Does 1-84, 2013 U.S. Dist. LEXIS 35439 (D. Mass., 2013); Voltage Pictures, LLC v. Does 1-198, Does 1-12, Does 1-34, Does 1-371, (1:13-cv-00293-CL)(D. Or., 2013).

referred to:

Warman v. Wilkins Fournier, 2010 ONSC 2126, 100 O.R. (3d) 648 (Div. Ct.); R. v. Trapp, 2011 SKCA 143 (CanLII), [2012] 4 W.W.R. 648; R. v. Ward, 2012 ONCA 660, 112 O.R. (3d) 321; Digital Sin, Inc. v. Does 1-27, 2012 U.S. Dist. LEXIS 78832 (S.D. N.Y., 2012); Breaking Glass Pictures v. Does 1-84, 2012 U.S. Dist. LEXIS 88984 (N.D. Ohio, 2013); Malibu Media, LLC v. John Does, Subscriber Assigned IP Address 69.249.252.44, 2013 U.S. Dist. LEXIS 77264 (D. Pa., 2013); Patrick Collins, Inc. v. John Doe 1, 2012 U.S. Dist. LEXIS 71122 (E.D. N.Y., 2013); Hard Drive Prods., Inc. v. Does 1-90, 2012 U.S. Dist. LEXIS 45509 (N.D. Cal., 2012); In re BitTorrent Adult Film Copyright Infringement Cases, 2012 U.S. Dist. LEXIS 61447 (E.D. N.Y., 2012).

AUTHORS CITED

Yiu, Melody. “A New Prescription for Disclosure: Reformulating the Rules for the Norwich Order” (2007), 65 U.T. Fac. L. Rev. 41.

MOTION for an order seeking the names and addresses of subscribers of TekSavvy Solutions Inc., an Internet service provider, on the basis that the plaintiff sought to pursue litigation against the subscribers for copyright infringement. Motion granted.

APPEARANCES

P. James Zibarras and John Philpott for plaintiff.

Nicholas McHaffie and Christian Tacit for defendant.

David Fewer for intervener Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic.

SOLICITORS OF RECORD

Brauti Thorning Zibarras LLP, Toronto, for plaintiff.

TekSavvy Solutions Inc. c/o Stikeman Elliott LLP, Ottawa, for defendant.

The following are the reasons for order and order rendered in English by

Aalto P.:

“… the rise of so-called ‘copyright trolls’ – plaintiffs who file multitudes of lawsuits solely to extort quick settlements – requires courts to ensure that the litigation process and their scarce resources are not being abused.”[1]

INTRODUCTION

[1]        Do persons who download copyrighted material from the internet using a peer-to-peer (P2P) network and the BitTorrent Protocol (BitTorrent) through the auspices of an Internet service provider (ISP) have a right to privacy such that their contact information not be revealed to the party whose copyright is being infringed? If they are infringing copyright what remedy, if any, should the Court impose? These are the questions at issue on this motion. While at first blush the answer may seem simple enough, in reality given the issues in play the answers require a delicate balancing of privacy rights versus the rights of copyright holders. This is especially so in the context of modern day technology and users of the Internet.

[2]        In essence, in this proceeding the plaintiff (Voltage) seeks the names and addresses of some 2 000 subscribers (subscribers) of an ISP known as TekSavvy Solutions Inc. This type of order is often referred to as a Norwich[2] order—a litigation tool requiring non-parties to a litigation to be subject to discovery or being compelled to provide information.

[3]        Voltage seeks the names and addresses so that they can pursue litigation against the subscribers for the unauthorized copying and distribution of Voltage’s copyrighted cinematographic works (works). The case engages provisions of the Copyright Act, R.S.C., 1985, c. C-42 and the Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5 (PIPEDA).

[4]        Pursuant to an order of this Court, the Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic (CIPPIC) was granted leave to intervene on this motion in order to enhance the record and provide arguments and evidence to assist the Court in determining the issue and to put the position of the subscribers and Voltage in an appropriate context. To that end, CIPPIC filed evidence by way of affidavit and cross-examined the main deponent who gave evidence on behalf of Voltage. CIPPIC also filed extensive written representations. TekSavvy, the ISP took no position on the motion.

[5]        CIPPIC has raised a number of objections to Voltage’s motion. It argues that privacy considerations and broader interests of justice should prevail in the particular circumstances of this case.

[6]        Specifically, CIPPIC alleges that Voltage’s true intentions are not motivated by any rights it may hold under the Copyright Act. CIPPIC characterizes Voltage and Canipre Inc. (Canipre) the forensic investigation company retained by Voltage to track the names of the subscribers as “copyright trolls” engaged in “speculative invoicing” which seeks to intimidate individuals into easy settlements by way of demand letters and threats of litigation. It is alleged that the cost and the uncertainty or stigma of litigation coerces most individuals into making payments, whether or not they were involved in the unauthorized copying and distribution of films on the internet. The Court is cautioned not to become an inadvertent tool assisting parties in this type of business model.

FACTS

[7]        Extensive affidavit evidence was filed on the motion as well as extensive case briefs. Voltage filed the affidavit of Barry Logan (Logan affidavit) the owner and principal forensic consultant of Canipre. Voltage also filed two affidavits of John Philpott (Philpott affidavits), an associate with the law firm representing Voltage which attached the affidavit of Michael Wickstrom of Voltage and the affidavit of Mathias Gartner, an information technology expert. CIPPIC also filed evidence in the form of an affidavit of Timothy Lethbridge (Lethbridge affidavit) which also dealt with technical issues relating to the Internet. CIPPIC also filed the affidavit of Alexander Cooke (Cooke affidavit), a law student who conducted searches to locate file-sharing lawsuits commenced by Voltage.

[8]        Voltage sought to strike the Lethbridge affidavit on the grounds that the witness had no direct knowledge of the matters in issue and was not an expert on the areas on which he opined. Voltage pointed to lengthy sections of the cross-examination to demonstrate that Mr. Lethbridge lacked expertise on issues relating to the case and the use of BitTorrent. However, in the end result, the Lethbridge affidavit should be accepted subject to the qualifications advanced by Voltage.

[9]        Voltage is a film production company which among other films produced the Oscar nominated film The Hurt Locker. The second of the Philpott affidavits provides evidence both directly and indirectly through the Michael Wickstrom affidavit that Voltage in fact owns copyright in the works.

[10]      In 2012 Voltage retained Canipre to investigate whether any of Voltage’s cinematographic works (works) were being copied and distributed in Canada over P2P networks using BitTorrent.

[11]      Apparently, BitTorrent is a P2P file-sharing protocol that facilitates the distribution of large amounts of data over the Internet. The non-party TekSavvy is an ISP based in Canada which provides its customers with access to the Internet.

[12]      There appears to be little dispute about how the technology works. When a file is uploaded to a BitTorrent network that is referred to as “seeding”. Other P2P network users, called “peers”, can then connect to the user seeding the file. BitTorrent breaks a file into numerous small data packets, each of which is identifiable by a unique hash number created using a hash algorithm. Once the file is broken into packets other peers are able to download different sections of the same file from different users. Each new peer is directed to the most readily available packet they wish to download. Peers copy files from multiple users who may have the file available on the BitTorrent network. The peer then becomes a seeder as the data packet is distributed to other peers connected to the BitTorrent network. Once a packet is downloaded it is then available to other users who are also connected to the BitTorrent network.

[13]      Voltage retained the services of Canipre to conduct a forensic investigation of the works that had been downloaded from BitTorrent networks. The software used by Canipre was able to identify the IP [Internet Protocol] address of each seeder and peer who offered any of the works for transfer or distribution. This software was able to identify the IP address of the user; the date and time the file was distributed; the P2P network used; and, the file’s metadata including the name of the file and its size (collectively the file data).

[14]      The file data was reviewed and transactions were isolated geographically to Ontario and to TekSavvy customers. This forensic investigation has resulted in some 2 000 subscribers being identified by their unique IP address assigned to them by TekSavvy.

[15]      CIPPIC, in its evidence, qualifies the extent to which useful information can necessarily be obtained from the ISP. That is, IP addresses do not necessarily result in obtaining the person who may have engaged in downloading the works. For example, on an open non-password protected Wi-Fi network, any stranger could use a BitTorrent client to download connect. This frequently happens at Internet cafes and the like. Thus, the particular infringer may not be able to be identified.

[16]      Voltage has had a history in the U.S. of commencing file-sharing lawsuits such as this. According to the Cooke affidavit there are 22 file-sharing lawsuits in the American Federal Court system where Voltage is listed as a plaintiff. The majority involve unknown alleged infringers. The total number of unknown alleged infringers is in the range of 28 000.

POSITIONS OF THE PARTIES TO THE MOTION

[17]      As there is no “real” defendant in this proceeding other than the named John Doe and Jane Doe, there was no party which could oppose this motion. Thus, CIPPIC sought intervener status which was granted and it argued against making the order requested by Voltage.

Position of Voltage

[18]      Voltage’s position on this motion is relatively straightforward. That is, the identified subscribers have infringed the copyright of Voltage by downloading or distributing the works and are therefore prima facie liable under the Copyright Act for infringement. Thus, TekSavvy should be ordered to produce the contact information for the subscribers who are all potential defendants to this action.

[19]      Relying primarily upon BMG Canada Inc. v. John Doe, 2005 FCA 193, [2005] 4 F.C.R. 81 (BMG) (discussed in greater detail below) Voltage argues that it has met all of the principles enunciated in BMG and TekSavvy should be ordered to release the information on the subscribers. It is to be noted as well that the position of Voltage was that it fully intends to pursue claims against the subscribers.

Position of CIPPIC

[20]      The position of CIPPIC is that no information should be released by TekSavvy, as this will infringe the privacy rights of the subscribers and may affect the scope of protection offered to anonymous online activity.

[21]      They argue that there are important public policy issues involving the intersection of law and technology which require careful consideration and balancing by the Court before ordering third parties to reveal private information. They argue that this type of request of the Court may extend beyond mere infringers to require information about whistle-blowers and confidential sources of documents leaked in the public interest.

[22]      To that end, CIPPIC argues that the right to privacy is implicitly a protected right under sections 7 and 8 of the Canadian Charter of Rights and Freedoms [being Part I of the Constitution Act, 1982, Schedule B, Canada Act 1982, 1982, c. 11 (U.K.) [R.S.C., 1985, Appendix II, No. 44]]. Thus, it is argued, the Court should not readily compel innocent third parties to divulge information which breaches the privacy expectations of individuals and which, in a rapidly changing technological environment, may not provide the real information relating to the unlawful conduct.

[23]      CIPPIC points to the jurisprudence evolving in other jurisdictions, particularly the U.S. and United Kingdom, to argue that Canadian courts should not be quick to issue this kind of order without first considering the real objective of the party seeking the information.

[24]      CIPPIC argues that this type of litigation is, in fact, merely a business model to coerce payments from individuals who do not wish to incur the cost of defending a lawsuit and would rather pay something to an entity such as Voltage than pay lawyers. This type of business approach has been the subject of discussion in those other jurisdictions (discussed in greater detail below). Therefore, the Court should not be an unwitting tool of “copyright trolls”.

[25]      However, it must be noted that on this motion, whether Voltage is or is not a “copyright troll” in pursuing information from TekSavvy is not for determination. The only issue is whether the test for granting a Norwich order has been met in accordance with the jurisprudence.

Relevant Legislation

[26]      Before embarking on a consideration of the issues raised by the parties it is useful to set out the relevant legislation and rules which are engaged in this motion.

[27]      First, rule 238 of the Federal Courts Rules [SOR/98-106] provides for granting leave to examine non-parties to an action. It reads as follows:

Examination of non-parties with leave

238. (1) A party to an action may bring a motion for leave to examine for discovery any person not a party to the action, other than an expert witness for a party, who might have information on an issue in the action.

Personal service on non-party

(2) On a motion under subsection (1), the notice of motion shall be served on the other parties and personally served on the person to be examined.

Where Court may grant leave

(3) The Court may, on a motion under subsection (1), grant leave to examine a person and determine the time and manner of conducting the examination, if it is satisfied that

(a) the person may have information on an issue in the action;

(b) the party has been unable to obtain the information informally from the person or from another source by any other reasonable means;

(c) it would be unfair not to allow the party an opportunity to question the person before trial; and

(d) the questioning will not cause undue delay, inconvenience or expense to the person or to the other parties.

[28]      As discussed below, subrule 238(3) of the Federal Courts Rules is very much aligned with the principles set out in BMG.

[29]      The two statutes engaged are the Copyright Act and PIPEDA. The relevant sections referred to by the parties to this motion are as follows:

Copyright Act, R.S.C., 1985, c. C-42

Liability for infringement

35. (1) Where a person infringes copyright, the person is liable to pay such damages to the owner of the copyright as the owner has suffered due to the infringement and, in addition to those damages, such part of the profits that the infringer has made from the infringement and that were not taken into account in calculating the damages as the court considers just.

Proof of profits

(2) In proving profits,

(a) the plaintiff shall be required to prove only receipts or revenues derived from the infringement; and

(b) the defendant shall be required to prove every element of cost that the defendant claims.

Statutory damages

38.1 (1) Subject to this section, a copyright owner may elect, at any time before final judgment is rendered, to recover, instead of damages and profits referred to in subsection 35(1), an award of statutory damages for which any one infringer is liable individually, or for which any two or more infringers are liable jointly and severally,

(a) in a sum of not less than $500 and not more than $20,000 that the court considers just, with respect to all infringements involved in the proceedings for each work or other subject-matter, if the infringements are for commercial purposes; and

(b) in a sum of not less than $100 and not more than $5,000 that the court considers just, with respect to all infringements involved in the proceedings for all works or other subject-matter, if the infringements are for non-commercial purposes.

Infringement of subsection 27(2.3)

(1.1) An infringement under subsection 27(2.3) may give rise to an award of statutory damages with respect to a work or other subject-matter only if the copyright in that work or other subject-matter was actually infringed as a result of the use of a service referred to in that subsection.

Deeming — infringement of subsection 27(2.3)

(1.11) For the purpose of subsection (1), an infringement under subsection 27(2.3) is deemed to be for a commercial purpose.

Infringements not involved in proceedings

(1.12) If the copyright owner has made an election under subsection (1) with respect to a defendant’s infringements that are for non-commercial purposes, they are barred from recovering statutory damages under this section from that defendant with respect to any other of the defendant’s infringements that were done for non-commercial purposes before the institution of the proceedings in which the election was made.

  No other statutory damages

(1.2) If a copyright owner has made an election under subsection (1) with respect to a defendant’s infringements that are for non-commercial purposes, every other copyright owner is barred from electing to recover statutory damages under this section in respect of that defendant for any of the defendant’s infringements that were done for non-commercial purposes before the institution of the proceedings in which the election was made.

If defendant unaware of infringement

(2) If a copyright owner has made an election under subsection (1) and the defendant satisfies the court that the defendant was not aware and had no reasonable grounds to believe that the defendant had infringed copyright, the court may reduce the amount of the award under paragraph (1)(a) to less than $500, but not less than $200.

Special case

  (3) In awarding statutory damages under paragraph (1)(a) or subsection (2), the court may award, with respect to each work or other subject-matter, a lower amount than $500 or $200, as the case may be, that the court considers just, if

(a) either

(i) there is more than one work or other subject-matter in a single medium, or

(ii) the award relates only to one or more infringements under subsection 27(2.3); and

(b) the awarding of even the minimum amount referred to in that paragraph or that subsection would result in a total award that, in the court’s opinion, is grossly out of proportion to the infringement.

Collective societies

(4) Where the defendant has not paid applicable royalties, a collective society referred to in section 67 may only make an election under this section to recover, in lieu of any other remedy of a monetary nature provided by this Act, an award of statutory damages in a sum of not less than three and not more than ten times the amount of the applicable royalties, as the court considers just.

Factors to consider

(5) In exercising its discretion under subsections (1) to (4), the court shall consider all relevant factors, including

(a) the good faith or bad faith of the defendant;

(b) the conduct of the parties before and during the proceedings;

(c) the need to deter other infringements of the copyright in question; and

(d) in the case of infringements for non-commercial purposes, the need for an award to be proportionate to the infringements, in consideration of the hardship the award may cause to the defendant, whether the infringement was for private purposes or not, and the impact of the infringements on the plaintiff.

No award

(6) No statutory damages may be awarded against

(a) an educational institution or a person acting under its authority that has committed an act referred to in section 29.6 or 29.7 and has not paid any royalties or complied with any terms and conditions fixed under this Act in relation to the commission of the act;

(b) an educational institution, library, archive or museum that is sued in the circumstances referred to in section 38.2;

(c) a person who infringes copyright under paragraph 27(2)(e) or section 27.1, where the copy in question was made with the consent of the copyright owner in the country where the copy was made; or

(d) an educational institution that is sued in the circumstances referred to in subsection 30.02(7) or a person acting under its authority who is sued in the circumstances referred to in subsection 30.02(8).

Exemplary or punitive damages not affected

(7) An election under subsection (1) does not affect any right that the copyright owner may have to exemplary or punitive damages.

[30]      These sections of the Copyright Act provide a complete code for the recovery of damages for copyright infringement. Voltage argues that it has demonstrated a bona fide case of infringement and is entitled to pursue the alleged infringers for damages in accordance with these sections of the Copyright Act.

[31]      The relevant sections of PIPEDA are as follows:

Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5<i>

7.

Disclosure without knowledge or consent

(3) For the purpose of clause 4.3 of Schedule 1, and despite the note that accompanies that clause, an organization may disclose personal information without the knowledge or consent of the individual only if the disclosure is

(c) required to comply with a subpoena or warrant issued or an order made by a court, person or body with jurisdiction to compel the production of information, or to comply with rules of court relating to the production of records;

(i) required by law.

Disclosure without consent

(5) Despite clause 4.5 of Schedule 1, an organization may disclose personal information for purposes other than those for which it was collected in any of the circumstances set out in paragraphs (3)(a) to (h.2).

[32]      CIPPIC relies on these sections of PIPEDA to argue that the Court should weigh carefully releasing any information about the subscribers. Such information can be released by TekSavvy if “required by law”.

ISSUES

[33]      Should an order be made granting Voltage the right to examine TekSavvy as a non-party to the litigation in order to obtain contact information of the subscribers?

[34]      If such an order is made what protections should be built into the order to protect or minimize the invasion of the privacy interests of Internet users?

[35]      As noted briefly above and discussed more fully below, there are important competing policy considerations as to whether the Norwich order should be granted in this kind of situation. Such an order is a discretionary and extraordinary order. For the reasons discussed below, given that Voltage has demonstrated a bona fide case of copyright infringement, a Norwich order will be granted. This order will be granted with qualifications intended to protect the privacy rights of individuals, and ensure that the judicial process is not being used to support a business model intended to coerce innocent individuals to make payments to avoid being sued.

ANALYSIS

[36]      There is developing jurisprudence in Canada and in this Court dealing with Norwich orders. The leading case in Canada is BMG, and the Court of Appeal for Ontario recently waded into this area in 1654776 Ontario Ltd. v. Stewart, 2013 ONCA 184, 114 O.R. (3d) 745. A consideration of these cases must be conducted to determine whether the threshold facts demonstrate that Voltage is entitled to the order requested.

Bona Fide v. Prima Facie Standard in Canada

[37]      In BMG, the Honourable Justice Edgar Sexton on behalf of the Federal Court of Appeal addressed the tension between the privacy rights of Internet users and copyright holders in the context of illegal downloading and sharing of music.

[38]      The Court determined that the legal principles which apply to the equitable bill of discovery apply to the test that a plaintiff must satisfy under rule 238 of the Federal Courts Rules. An order is warranted where a plaintiff has a bona fide claim and meets the criteria of rule 238.

[39]      BMG provides a framework for consideration of the issues on this motion. The observations of the Court on the requirement of a bona fide claim have been put in issue by CIPPIC. In BMG it was held that a bona fide standard was preferable to the higher standard of a prima facie case because the burden of establishing the higher standard would have the effect of stripping the plaintiffs of a remedy. Justice Sexton noted the difficulty of requiring a plaintiff to establish copyright infringement when it has neither the identity of the person they wish to sue nor the details of what was allegedly done by that person.

[40]      According to the Court, establishing a bona fide claim requires a plaintiff to show: (1) that they really do intend to bring an action for infringement of copyright based upon the information they obtain, and (2) that there is no other improper purpose for seeking the identity of these persons. The Court said this, at paragraph 34:

In my view, it would make little sense to require proof of a prima facie case at the stage of the present proceeding. The appellants do not know the identity of the persons they wish to sue, let alone the details of precisely what was done by each of them such as to actually prove infringement. Such facts would only be established after examination for discovery and trial. The appellants would be effectively stripped of a remedy if the Courts were to impose upon them, at this stage, the burden of showing a prima facie case. It is sufficient if they show a bona fide claim, i.e. that they really do intend to bring an action for infringement of copyright based upon the information they obtain, and that there is no other improper purpose for seeking the identity of these persons. [Emphasis added.]

[41]      With respect to the balancing of competing interests, Justice Sexton identified the privacy issued raised by the case as “an important consideration” and noted that the balance between privacy interest and public interest are in play where confidential information is sought to be revealed. The Court made the following observations (at paragraphs 36, 37 and 39–41):

Privacy Issues

I agree with the motions Judge’s characterization of the 5th criteria—that is—the public interest in favour of disclosure must outweigh the legitimate privacy concerns of the person sought to be identified if a disclosure order is made.

All respondents raise the privacy issue. It is [an] important consideration. Pursuant to PIPEDA, ISPs are not entitled to “voluntarily” disclose personal information such as the identities requested except with the customer’s consent or pursuant to a court order. Indeed, pursuant to paragraph 7(3)(c), subsection 8(8) and section 28 of PIPEDA, any organization that receives a request for the release of personal information must “retain the information for as long as is necessary to allow the individual to exhaust any recourse” under PIPEDA. Failure to comply could result in the organization being found guilty of an offence punishable on summary conviction or an indictable offence.

The delicate balance between privacy interests and public interest has always been a concern of the Court where confidential information is sought to be revealed. Although PIPEDA had not been enacted at the time of the Glaxo decision, Stone J.A. nonetheless noted at paragraph 62:

I am not persuaded that this is a sufficient justification for refusing to disclose the identity of the importers in the present case. While section 107 implies that information collected pursuant to the Act will be treated as confidential, section 108 indicates that it is susceptible to disclosure in certain situations. I am thus doubtful that importers have a high expectation of confidentiality regarding the information which they furnish to customs officials. More important, I am sceptical about the expectation and degree of confidentiality associated with the nature of the information which the appellant seeks. As the House of Lords observed in Norwich Pharmacal, supra, the names of the importers are likely to pass through many hands before reaching those of customs officials. It is therefore not reasonable to regard the identity of the importers as particularly sensitive information. In my opinion, in the circumstances of this case the public interest in ensuring that the appellant is able to pursue in the courts those who have allegedly violated its patent rights outweighs the public interest in maintaining the confidentiality of the importers’ names.

He also approved, at paragraph 26, of the statement of Viscount Dilhorne in Norwich as follows:

Subject to the public interest in protecting the confidentiality of information given to Customs, in my opinion it is clearly in the public interest and right for protection of patent holders, where the validity of the patent is accepted and the infringement of it not disputed, that they should be able to obtain by discovery the names and addresses of the wrongdoers from someone involved but not a party to the wrongdoing.

The reasoning in Glaxo and Norwich is compelling. Intellectual property laws originated in order to protect the promulgation of ideas. Copyright law provides incentives for innovators—artists, musicians, inventors, writers, performers and marketers—to create. It is designed to ensure that ideas are expressed and developed instead of remaining dormant. Individuals need to be encouraged to develop their own talents and personal expression of artistic ideas, including music. If they are robbed of the fruits of their efforts, their incentive to express their ideas in tangible form is diminished.

Modern technology such as the Internet has provided extraordinary benefits for society, which include faster and more efficient means of communication to wider audiences. This technology must not be allowed to obliterate those personal property rights which society has deemed important. Although privacy concerns must also be considered, it seems to me that they must yield to public concerns for the protection of intellectual property rights in situations where infringement threatens to erode those rights. [Emphasis added.]

[42]      In these passages the Court viewed the conflict as one between privacy interests and “public interest” or “public concerns”. In order to protect those privacy interests the Court went on at paragraphs 42 to 45 to observe that courts granting disclosure may wish to give specific direction as to the type of information to be disclosed and the manner in which it can be used. The option of a confidentiality order was also referenced. The Court stated (at paragraphs 42, 44 and 45):

Thus, in my view, in cases where plaintiffs show that they have a bona fide claim that unknown persons are infringing their copyright, they have a right to have the identity revealed for the purpose of bringing action. However, caution must be exercised by the courts in ordering such disclosure, to make sure that privacy rights are invaded in the most minimal way.

Also, as the intervener, Canadian Internet Policy and Public Interest Clinic, pointed out, plaintiffs should be careful not to extract private information unrelated to copyright infringement, in their investigation. If private information irrelevant to the copyright issues is extracted, and disclosure of the user’s identity is made, the recipient of the information may then be in possession of highly confidential information about the user. If this information is unrelated to copyright infringement, this would be an unjustified intrusion into the rights of the user and might well amount to a breach of PIPEDA by the ISPs, leaving them open to prosecution. Thus in situations where the plaintiffs have failed in their investigation to limit the acquisition of information to the copyright infringement issues, a court might well be justified in declining to grant an order for disclosure of the user’s identity.

In any event, if a disclosure order is granted, specific directions should be given as to the type of information disclosed and the manner in which it can be used. In addition, it must be said that where there exists evidence of copyright infringement, privacy concerns may be met if the court orders that the user only be identified by initials, or makes a confidentiality order.

[43]      On this issue of copyright infringement, the Court made these observations (at paragraphs 46, 47 and 53):

Infringement of Copyright

As has been mentioned, the motions Judge made a number of statements relating to what would or would not constitute infringement of copyright. (See paragraph 15(f) of these reasons). Presumably he reached these conclusions because he felt that the plaintiffs, in order to succeed in learning the identity of the users, must show a prima facie case of infringement.

In my view, conclusions such as these should not have been made in the very preliminary stages of this action. They would require a consideration of the evidence as well as the law applicable to such evidence after it has been properly adduced. Such hard conclusions at a preliminary stage can be damaging to the parties if a trial takes place and should be avoided.

The motions Judge found no evidence of secondary infringement contrary to subsection 27(2) [as am. by S.C. 1997, c. 24, s. 15] of the Copyright Act because there was “no evidence of knowledge on the part of the infringer.” This ignores the possibility of finding infringement even without the infringer’s actual knowledge, if indeed he or she “should have known” there would be infringement. Copyright Act subsection 27(2):

[44]      Finally, the Court suggested the need to consider the costs of the party required by the order to co-operate and disclose the sought after information, in this case, TekSavvy.

[45]      The principles to be taken from BMG are as follows:

(a)       a plaintiff must have a bona fide case;

(b)       a non-party, in this case TekSavvy, must have information on an issue in the proceeding;

(c)       an order of the Court is the only reasonable means of obtaining the information;

(d)       that fairness requires the information be provided prior to trial; and,

(e)       any order made will not cause undue delay, inconvenience or expense to the third–party or others.

[46]      Voltage argues that it has met all of these factors and therefore is entitled to the remedy it seeks. With respect to (a) it argues it has demonstrated a bona fide case by virtue of the statement of claim issued in this case together with the results of the forensic investigation identifying IP addresses engaged in the copying of the works. With respect to (b) the IP addresses are known to TekSavvy but not Voltage and therefore TekSavvy is the only reasonable source of the information. With respect to (c) TekSavvy will, quite properly, not reveal the information without a court order. With respect to (d) Voltage should be allowed to protect its rights and fairness demands that persons who infringe copyright not be shielded from liability by the anonymity of the Internet and its protocols. With respect to (e) Voltage argues that without a remedy this case is meaningless as the information is not accessible. Those that infringe ought not to do so with impunity, and the Court can set the terms of such access to information. Further, TekSavvy will be reimbursed for its reasonable costs in providing the information.

[47]      Voltage argues that support for its position is found in Voltage Pictures LLC v. Jane Doe, 2011 FC 1024, 395 F.T.R. 315, a case which was unopposed and in which Mr. Justice Shore relied on BMG to hold that Voltage had a bona fide claim against the defendants solely for the reason that it had brought a copyright infringement action against the two Doe defendants. It is not clear what evidence Voltage provided to link the IP addresses to the infringement in that case.

[48]      CIPPIC suggests that the use of Norwich orders is a new development in Canada and that BMG is but one piece of the puzzle relating to the proper balancing of conflicting interests. It asserts that post-BMG, courts in Ontario and other jurisdictions have refined the test set out therein so as to “achieve a better balance among the interests of the plaintiffs, the defendants, third parties and justice”. However, I am not persuaded that on the basis of the current jurisprudence there has been a shift from the bona fide standard as established in BMG to the higher standard of a prima facie case.

[49]      Ontario’s Court of Appeal has very recently expressed the same view on the first criteria for a Norwich order. In Stewart, the Court of Appeal [of Ontario] disagreed with the approach endorsed by CIPPIC and set out by the province’s Divisional Court in Warman v. Wilkins Fournier, 2010 ONSC 2126, 100 O.R. (3d) 648. The Divisional Court [at paragraph 42] had imposed “a more robust” prima facie standard because the case engaged a freedom of expression interest. The Court of Appeal [for Ontario] in Stewart stated that this was inappropriate because step five of the Norwich analysis already allows for the balancing of competing interests.

[50]      In Stewart the granting of disclosure was held to be designed to facilitate access to justice. Justice Juriansz, speaking for the Court, made the following observations (at paragraphs 58–60):

What I draw from these authorities is that the threshold for granting disclosure is designed to facilitate access to justice by victims of wrongdoers whose identity is not known. Judicial treatment of the Norwich application procedure should reflect its nature as an equitable remedy.

There is no requirement that the applicant show a prima facie case. The nature and apparent strength of the applicant’s potential action should be weighed together with the other relevant factors.

The lower threshold at step one does not make Norwich relief widely available. Norwich relief is not available against a mere witness. Norwich relief is only available, as Lord Reid explained in Norwich, at p. 175 A.C., against a person who is “mixed up in the tortious acts of others so as to facilitate their wrongdoing” even though this is “through no fault of his own”. Most significantly, the apparent strength of the applicant’s case may be considered in applying the other factors.

[51]      The bona fide standard therefore does not mean that relief is readily available but it is the strength of a plaintiff’s case that should be considered in applying the other Norwich factors. It should be noted that despite stating that the appellant before the Court had difficulty establishing the elements of an underlying cause of action, the Court found that bona fides were established because the appellant was not engaged in “mere fishing” and the proposed action was not frivolous (at paragraph 75).

[52]      CIPPIC argues that the Court in BMG did not strike the right balance between the competing interests. However, this argument is difficult to assess when the Court in BMG did not actually apply the enumerated principles to the facts of that case. CIPPIC seems simply to be asserting that only a higher standard would strike the appropriate balance.

[53]      One commentator has pointed out that courts have repeatedly eschewed the prima facie standard for interlocutory measures (Melody Yiu, “A New Prescription for Disclosure: Reformulating the Rules for the Norwich Order” (Spring 2007), 65 U.T. Fac. L. Rev. 41). There is even less of a case for applying this standard to a Norwich remedy because of its role as a sort of “gatekeeper to the courthouse”. In most other disputes, defeat on an interlocutory matter does not necessarily foreclose access to justice for a wronged party. The article suggests that over-inclusion is preferable to under-inclusion where Norwich orders are concerned.

[54]      Whether this conclusion needs to be qualified when it involves wide-reaching violations of privacy is debatable. Privacy considerations should not be a shield for wrongdoing and must yield to an injured party’s request for information from non-parties. This should be the case irrespective of the type of right the claimant holds. The protection of intellectual property is ipso facto assumed to be worthy of legal protection where a valid cause of action is established (Yiu, at page 64). There is little dispute with the correctness of this assertion. Copyright is a valuable asset which should not be easily defeated by infringers. The difficulty in this case is that it is not clear that the protection of copyright is the sole motivating factor supporting Voltage’s claim in this Court. The import of the evidence in the Cooke affidavit suggests but does not prove that Voltage may have ulterior motives in commencing this action and may be a copyright troll.

Conclusion on Prima facie Case

[55]      In the end result, there is no doubt that BMG is binding on this Court. So far, Canadian Courts have not moved to a higher prima facie standard. Although the determinative issue in BMG proved to be the complete lack of evidence, the Court nevertheless found it necessary to address and clarify the question of whether the plaintiffs could obtain the disclosure sought pursuant to rule 238. The determination that a bona fide case was sufficient was not obiter.

[56]      In my view of the evidence on this motion, Voltage has established that it does have a bona fide claim as set out in the statement of claim. That bona fide claim flows from the allegations in the statement of claim and from the forensic investigation evidence in support of this motion. Voltage has also provided evidence that it in fact holds copyright over the works alleged to have been infringed. This is all in line with the principles established in BMG.

[57]      The enforcement of Voltage’s rights as a copyright holder outweighs the privacy interests of the affected Internet users. However, that is not the end of the matter. As part of making any Norwich order, the Court must ensure that privacy rights are invaded in the most minimal way possible, as discussed in paragraphs 42–45 of BMG.

Limitations on a Norwich Order

[58]      Having determined that Voltage is entitled to a form of Norwich order, the question becomes what limitations the Court should impose to protect or minimize the privacy risks as it relates to the subscribers. It is to this issue that CIPPIC’s submissions better relate. It is also instructive to consider what the courts in other jurisdictions have done to balance the rights of a copyright holder versus Internet user’s privacy rights.

[59]      Voltage argues that there is no reasonable expectation of privacy risk in using P2P networks as to do so puts private information about the individual into the public domain, and when individuals use these types of networks they reveal publicly their IP address and the files being copied. Voltage relies upon R. v. Trapp, 2011 SKCA 143 (CanLII), [2012] 4 W.W.R. 648 and R. v. Ward, 2012 ONCA 660, 112 O.R. (3d) 321. Voltage’s position is that infringers ought not to be able to hide behind a veil of Internet anonymity.

[60]      This would be an acceptable position but for the spectre raised of the “copyright troll” as it applies to these cases and the mischief that is created by compelling the TekSavvy’s of the world to reveal private information about their customers. There is also the very real spectre of flooding the Court with an enormous number of cases involving the subscribers many of whom may have perfectly good defences to the alleged infringement. Finally, the damages against individual subscribers even on a generous consideration of the Copyright Act damage provisions may be minuscule compared to the cost, time and effort in pursuing a claim against the subscriber.

[61]      CIPPIC has relied upon the experience in other jurisdictions to support its position. The issues raised by the parties have been addressed by courts in both the U.S. and the U.K. The U.K., in particular, provides a framework for the types of safeguards the court can employ to protect the interests of Internet users.

United Kingdom

[62]      The nature of the order sought by Voltage is known in the U.K. and elsewhere as a Norwich order. This form of relief draws its name from a 1974 House of Lords case involving suspected patent infringement (Norwich Pharmacal case) in which the House of Lords reviewed and modified the “equitable bill of discovery” remedy. The old equitable bill of discovery allowed an injured party to bring an action to discover the name of the wrongdoer where necessary to pursue redress. Under the Norwich principle today, parties can seek disclosure of information if that information is required to seek redress for an actionable wrong. U.K. courts accept that the privacy of Internet users may be sacrificed to allow redress to claimants wronged by illegal or tortious activity. However, courts remain concerned with the proportionality of orders in circumstances similar to this case brought by Voltage.

[63]      There are three cases from the U.K. courts which highlight the concerns which Norwich order cases pose as it relates to Internet users. One case holds that anonymity of Internet users is not an obstacle to disclosure where an actionable wrong exists. Two of the cases discuss the lawfulness of arrangements through which some parties are choosing to target P2P sharing and downloading activities.

[64]      As noted by CIPPIC, the modern approach to the Norwich remedy was addressed by U.K.’s Supreme Court most recently in Rugby Football Union v. Consolidated Information Services, [2012] UKSC 55 (BAILII), [2013] 1 All E.R. 928.

[65]      This case involved the resale of rugby tickets on a website operated by the defendant. The claimant Rugby Football Union (RFU) was alone responsible for the issuance of tickets for matches played at its stadium. Because it had a policy of allocating tickets in a way that developed the sport and enhanced its popularity, RFU did not allow ticket prices to be inflated. RFU alleged that arguable wrongs were involved in the advertisement and sale of tickets above face value through the defendant’s website. It was not disputed before the Supreme Court that the sale of tickets via the website arguably constituted an actionable wrong. It was held that RFU had no readily available alternative means of discovering who the possible wrongdoers were other than by means of a Norwich order.

[66]      In its reasons, the Supreme Court addressed the principles that should guide Norwich orders. It noted that cases post-Norwich Pharmacal have stressed the need for flexibility and discretion in considering whether to grant disclosure. Significantly, the Court confirmed that it is not necessary that an applicant intend to bring legal proceedings in respect of the alleged wrong. Rather, any form of redress, from disciplinary action to a dismissal of an employee, would suffice to ground an application for disclosure pursuant to a Norwich order. In my view, the bringing of proceedings in intellectual property cases is an essential requirement in the sense that there must be an intention to enforce intellectual property rights.

[67]      However, the Court concluded that disclosure is to be ordered only if it is a “necessary and proportionate response in all the circumstances”. The Court also held that necessity does not require that the remedy be one of last resort.

[68]      While this is a developing area of law, there is also a series of well-known cases brought by Media C.A.T. Ltd. (Media CAT) and lengthy discussion of the mischief which these cases can create. Media CAT alleged copyright infringement in pornographic films by way of P2P sharing software. Media CAT obtained several Norwich orders which resulted in revealing tens of thousands of names and addresses of alleged infringers.

[69]      In Media CAT Ltd. v. Adams & Ors, [2011] EWPCC 6 (BAILII), [2011] F.S.R. 28, Patents County Court Judge Birss addressed a number of concerns raised by Media CAT’s conduct following the granting of the Norwich order, but in the context of Media CAT’s attempt to discontinue the 27 claims it commenced.

[70]      Much of the decision concerns itself with the question of whether Media CAT had standing to bring the claim of copyright infringement, and subsequently, to seek that it be discontinued. Media CAT alleged the right to do so on the basis of its contract with a copyright owner giving it the right to claim and prosecute any person identified as having made available for download films covered by the agreement.

[71]      Notwithstanding this narrow point, however, the case is worth reviewing because it illustrates the abuse that can occur when a plaintiff such as Media CAT receives a Norwich order with no safeguards given to the broader context of the rights of the alleged infringers.

[72]      Although Judge Birss was not actually sitting in review of the decision to grant the Norwich orders, he addressed the Court’s jurisdiction to grant such a remedy. He noted that the orders were granted in this case on the basis of statements from technical experts in support of the infringement claim.

[73]      The Court described in some detail the letter writing campaign embarked on by Media CAT’s solicitors once the Norwich order was obtained. The campaign involved sending out a “letter of claim” to tens of thousands of individuals. The letter consisted of 6 pages of legal and technical discussions, 3 attachments, including the Court’s order for disclosure, and an invitation to look at ACS:Law’s website for “Notes on Evidence” [at paragraph 17]. The letter of claim represented Media CAT as a copyright protection society, which it was not, and sought £495 in compensation.

[74]      Judge Birss identified a number of misleading statements in the letters and concluded that the impact of the letter on recipients would be significant: “The letter would be understood by many people as a statement that they have been caught infringing copyright in pornographic film, that Media CAT has evidence of precisely that and that a court has already looked into the matter” (at paragraph 18). In fact, he noted that the court’s office had received telephone calls from people in tears on receipt of the letter.

[75]      Judge Birss stated that most ordinary members of the public do not appreciate that the Norwich order is not based on a finding of infringement and that people would be tempted to pay out of the desire to avoid embarrassment, whether or not they had done anything wrong.

[76]      With respect to the sum sought, the Court remarked that no breakdown of the £495 sum was provided. The Court also wondered how it could be the case that out of the 10 000 letters sent, only 27 recipients, those parties to the claim before him, refused to pay.

[77]      The Court concluded that the letters misrepresented Media CAT’s standing to bring proceedings, it overstated the merits of its case, and asserted an untested basis for infringement, arising out of “authorized” infringement by others.

[78]      The decision then discusses an interesting turn of events that took place days before the Court was to hear Media CAT’s case. It appears that ACS:Law came to court offices with 27 notices of discontinuance and represented that following the discontinuance, it would reissue the claims.

[79]      The concern that Media CAT and ACS:Law lacked an interest in pressing the claims was expressed as follows (at paragraph 100):

Whether it was intended or not, I cannot imagine a system better designed to create disincentives to test the issues in court. Why take cases to court and test the assertions when one can just write more letters and collect payments from a proportion of the recipients?

[80]      Finally, the Court considered whether it could restrain Media CAT from continuing its letter writing campaign. The Court noted that courts retain control over the use of documents and information obtained by the disclosure process and that parties may only use the products of disclosure for purposes of the action in which it was disclosed. From this, the Court reasoned that it had the jurisdiction to regulate the use of the information obtained through a Norwich order. Thus, an order restraining the use of the information disclosed could be nothing more than an order varying the original Norwich order.

[81]      This case provides helpful guidance to courts so that they craft orders that are not open-ended, leaving the party who obtains the order to use it unfairly, or abusively and without restriction.

[82]      Another English decision bearing on these issues is the 2012 decision Golden Eye (International) Ltd. & Anor v. Telefonica UK Ltd., [2012] EWHC 723 (Ch.) (BAILII) in which Golden Eye, a licensee of copyrights in pornographic movies, sought a Norwich order in relation to over some 9 000 alleged infringers. The lengthy decision of Justice Arnold also offers guidance on the types of limits that should be placed on the use of Norwich orders. As here, a public interest organization (Consumer Focus), was granted intervener status and represented the interests of the unidentified alleged infringers.

[83]      Golden Eye and the other claimants alleged that 9 124 IP addresses had been obtained through the use of a tracking service to determine that subscribers had made available copyright material for P2P copying. Golden Eye sought the names and addresses from the ISP, Telefonica. Telefonica did not object to the order. Telefonica consented to a draft order and a draft letter prepared for distribution to the alleged infringers. The draft order provided that Telefonica was to receive £2.20 for each name and address requested by the claimants and £2 500 as security for costs. In addition, a copy of a draft letter which would be sent to the alleged infringers was attached to the draft order.

[84]      The draft letter was some three pages in length and was full of legal jargon. It also included a proposed settlement to the alleged infringer in the amount of £700 as compensation.

[85]      While several issues were raised in the case, the issue bearing most on the facts of this case relates to whether the claimants were genuinely intending to seek redress. Consumer Focus argued that the division of revenue noted above suggested a money-making endeavor on the part of Golden Eye. It also claimed that the sum of £700 requested in the draft letter was unsupported and unsupportable.

[86]      Consumer Focus further argued that the claimants were equivocal about their willingness to pursue infringement actions. Golden Eye’s discontinuance of two of the three claims brought after receiving Norwich orders in similar circumstances was said to suggest a desire to avoid judicial scrutiny. Golden Eye did not explain why these claims were discontinued, nor did it provide information with respect to how many subscribers were identified with respect to those orders and how many letter of claim, if any, were sent out.

[87]      However, the Court was satisfied that Golden Eye had a genuine commercial desire to obtain compensation for the infringement of their copyright. With respect to the claimants’ pursuit of settlements, the Court noted that it is not a requirement for the grant of a Norwich order that the applicant intend or undertake to bring proceedings against the wrongdoer: “Sending a letter before action with a view to persuading the wrongdoer to agree to pay compensation and to give an undertaking not to infringe in the future is one way of seeking redress. There is no requirement for the intending claimant to commit himself to bringing proceedings if redress cannot be obtained consensually” (at paragraph 109).

[88]      Mr. Justice Arnold also said that a claimant faced with multiple infringers is entitled to be selective as to which ones he sues. The cost of litigation may be relevant in making such a decision. He found that the evidence was “sufficiently cogent to establish a good arguable case” [at paragraph 105] had been made out that unlawful file-sharing had occurred.

[89]      The Court acknowledged that the monitoring software used to identify the users may misidentify users for a number of technical reasons, including an incorrectly synchronized clock. Non-technical reasons might also lead to an innocent party being identified. However, the existence of these uncertainties was not sufficient to rule that the claimants had not established on the evidence that an arguable case of infringement had occurred for the purpose of granting a Norwich order.

[90]      The Court also addressed whether the order sought was proportional having regard to the privacy and data protection rights of the intended defendants. It noted that both the claimants’ and the alleged infringers’ rights are protected by specific articles of the EU [European Union] Charter and the European Convention on Human Rights [Convention for the Protection of Human Rights and Fundamental Freedoms, November 4, 1950, 213 U.N.T.S. 221]. Striking a balance between those rights required the following approach, set out at paragraph 117 of the decision:

(i)         neither Article as such has precedence over the other; (ii) where the values under the two Articles are in conflict, an intense focus on the comparative importance of the specific rights being claimed in the individual case is necessary; (iii) the justifications for interfering with or restricting each right must be taken into account; (iv) finally, the proportionality test – or “ultimate balancing test” – must be applied to each.

[91]      Ultimately, the Court determined that it was necessary for the information sought to be disclosed to allow the claimants to protect their copyright rights. However, proportionality could still be achieved through the terms of the order granted by the Court.

[92]      Noting that the draft order prepared by Golden Eye required it to attach a copy of the Court’s order to its letter of claim, the Court stressed that the intended defendants should be spared unnecessary anxiety and distress and should not be given the wrong impression with respect to the meaning of the order.

[93]      With respect to the draft letter, Justice Arnold remarked that although it was not the role of the Court to supervise pre-action correspondence, the circumstances of a case such as this required the Court to carefully consider the terms of the draft letter of claim. In coming to this conclusion, the Court considered that this type of order would affect ordinary consumers who may not be guilty of infringement, who may not have access to specialized legal services and who may be embarrassed and may not consider it cost-effective to defend the claim, even if innocent.

[94]      Justice Arnold observed that the letter should reflect the following points:

(a)       make clear the fact that an order for disclosure has been made does not mean that the court has considered the merits of allegation of infringement against the recipient;

(b)       the letter acknowledge that the intended defendant may not be the person who was responsible for the infringing acts. This takes into account the multiple reasons why account holders associated with certain IP addresses may not be the actual infringers;

(c)       if the letter sets out the consequences to the alleged infringer of a successful claim, it must also acknowledge the consequences to the relevant claimant of an unsuccessful claim;

(d)       the response time be reasonable. The letter proposed a response time in 14 days which Justice Arnold deemed unreasonable. The Court considered 28 days to be reasonable; and,

(e)       threats to shut down the Internet connection were unacceptable. The Court found it unacceptable for the claimant to threaten to make “an application to your ISP to show down or terminate your internet connection” [at paragraph 130].

[95]      The claimant’s request for £700 as compensation was argued to be unsupported and unsupportable. The draft letter made no attempt to explain or justify the sum and Consumer Focus took the position that it was inconceivable that every alleged infringer caused the copyright owners a loss of £700.

[96]      The Court accepted Consumer Focus’s position and noted that as the claimants had no information about the scale of infringement committed by each infringer, the amount claimed was inappropriate. In intellectual property cases in the U.K. it is usual for claimants to seek disclosure from defendants before electing between inquiry as to damages and an account of profits. The Court therefore instructed as follows regarding quantum (at paragraphs 134 and 138):

If the Claimants were genuinely interested in seeking accurately to quantify their losses, then it seems to me that they would wish to seek some form of disclosure at least in the first instance. I appreciate that it may not be cost-effective for disclosure to be pursued if the Intended Defendant is unwilling to cooperate, but I do not consider that that justifies demanding an arbitrary figure from all the Intended Defendants in the letter of claim.

Accordingly, I do not consider that the Claimants are justified in sending letters of claim to every Intended Defendant demanding the payment of £700. What the Claimants ought to do is to proceed in the conventional manner, that is to say, to require the Intended Defendants who do not dispute liability to disclose such information as they are able to provide as to the extent to which they have engaged in P2P file sharing of the relevant Claimants’ copyright works. In my view it would be acceptable for the Claimants to indicate that they are prepared to accept a lump sum in settlement of their claims, including the request for disclosure, but not to specify a figure in the initial letter. The settlement sum should be individually negotiated with each Intended Defendant.

[97]      Finally, the Court considered but rejected a number of “safeguards” proposed by the intervener. These included notification of the alleged infringers; appointing a supervising solicitor; providing for a group litigation order; and establishing test cases. In all of the circumstances of the cases, Justice Arnold did not deem them appropriate at that juncture of the proceedings.

[98]      However, an alternative safeguard was proposed by Justice Arnold and accepted by the claimants. He placed a condition on the order that any resulting claims be brought in the Patents County Court, ensuring that they would be handled by a specialized tribunal. This is equivalent in our Court to having the matter specially managed which forms part of the order made herein.

[99]      In granting the Norwich order, Justice Arnold concluded with comments regarding the balancing of rights as follows (at paragraph 146):

As discussed above, I have not accepted that the agreements between Golden Eye and the Other Claimants are champertous. Nor have I been persuaded that those agreements mean that the Other Claimants are not genuinely intending to try to seek redress. It does not follow, however, that it is appropriate, when balancing the competing interests, to make an order which endorses an arrangement under which the Other Claimants surrender total control of the litigation to Golden Eye and Golden Eye receives about 75% of the revenues in return. On the contrary, I consider that that would be tantamount to the court sanctioning the sale of the Intended Defendants’ privacy and data protection rights to the highest bidder. Accordingly, in my judgment, to make such an order would not proportionately and fairly balance the interests of the Other Claimants with the Intended Defendants’ interests. (I do not consider Golden Eye to have any legitimate interest separate from those of the Other Claimants for this purpose.) If the Other Claimants want to obtain redress for the wrongs they have suffered, they must obtain it themselves. [Emphasis added.]

[100]   In all, Justice Arnold’s decision in Golden Eye provides useful guidance as to the form and restrictions of an order compelling production by a third-party. The major points from both the U.S. and the U.K. cases are summarized in the conclusion, below.

U.S. CASES

[101]   In the U.S., copyright holders seeking to ascertain the names and addresses of unnamed alleged infringers are required to file a motion for “expedited discovery”, or more precisely, a motion for leave to serve third party subpoenas.

[102]   There is a plethora of U.S. cases involving large numbers of alleged copyright infringers which has produced much judicial commentary about “copyright trolls”. The following is a list of those cases which have been reviewed, but only some of which are discussed below: Digital Sin, Inc. v. Does 1-27, 2012 U.S. Dist. LEXIS 78832 (S.D. N.Y., 2012); TCYK, LLC v. Does 1-88, 2013 U.S. Dist. LEXIS 88402 (N.D. Ill., 2013) [cited above]; Breaking Glass Pictures v. Does 1-84, 2012 U.S. Dist. LEXIS 88984 (N.D. Ohio, 2013); Malibu Media, LLC v. John Does, Subscriber Assigned IP Address 69.249.252.44, 2013 U.S. Dist. LEXIS 77264 (D. Pa., 2013); Patrick Collins, Inc. v. John Doe 1, 2012 U.S. Dist. LEXIS 71122 (E.D. N.Y., 2013); Malibu Media, LLC v. John Does, 902 F. Supp. 2d 690 (E.D. Pa., 2012); Ingenuity 13 LLC v. John Doe, 2013 WL 1898633 (C.D. Cal., 2013); Malibu Media, LLC v. John Does 1-5, 285 F.R.D. 273 (D. N.Y., 2012); Third Degree Films v. Does 1-47, 286 F.R.D. 188 (D. Mass., 2012); Hard Drive Prods., Inc. v. Does 1-90, 2012 U.S. Dist. LEXIS 45509 (N.D. Cal., 2012); Combat Zone, Inc. v. Does 1-84, 2013 U.S. Dist. LEXIS 35439 (D. Mass., 2013); and, Voltage Pictures, LLC v. Does 1-198, Does 1-12, Does 1-34, Does 1-371, (1:13-cv-00293-CL)(D. Or., 2013). Many of these cases arise in the context of the pornographic film industry where an alleged infringer may settle quickly and on advantageous terms to the plaintiff to avoid embarrassment and to avoid being identified. There is no suggestion that is the case here.

[103]   As in the U.K., courts in the U.S. appear to accept that identifying alleged infringers for purposes of pursuing copyright infringement claims is merited, but the courts have expressed concern with the use of the courts’ subpoena powers to “troll” for quick and easy settlements.

[104]   U.S. courts have not shied away from using strong language to admonish the “low-cost, low-risk revenue model” tactics of copyright owners, and in particular adult film companies: “It has become clear in many cases that the companies have no intention of pursuing litigation, but rather initiate a lawsuit to hold a proverbial guillotine over the accused downloaders’ heads to extract settlement because of the fear of embarrassment over being accused of downloading pornography” (see, for example, Patrick Collins, Inc. v. John Doe 1, 2012 U.S. Dist. LEXIS 71122 (E.D. N.Y., 2013) [cited above], at page 8).

[105]   Ingenuity 13 LLC v. John Doe, 2013 WL 1898633 (C.D. Cal., 2013) [cited above], a decision cited by CIPPIC, is a particularly egregious example of these cases and involves a “copyright-enforcement crusade” commenced by a group of attorneys. The decision against the plaintiff was rendered by Judge Wright, one of the most vocal judicial critics of the business model employed by many plaintiffs in these cases. However, the case is not helpful in this case because the facts as they relates to “copyright trolls” involves misrepresentation and fraudulent practices on the part of the plaintiff. No actual evidence of misrepresentation or fraudulent practices is before the Court on this motion. It is only raised as a possibility given Voltage’s approach in other litigation in the U.S. discussed below. However, in one colourful passage Judge Wright observes (at page 1):

Plaintiffs have outmaneuvered the legal system. They’ve discovered the nexus of antiquated copyright laws, paralyzing social stigma, and unaffordable defense costs. And they exploit this anomaly by accusing individuals of illegally downloading a single pornographic video. Then they offer to settle-for a sum calculated to be just below the cost of a bare-bones defense. For these individuals, resistance is futile; most reluctantly pay rather than have their names associated with illegally downloading porn. So now, copyright laws originally designed to compensate starving artists allow, starving attorneys in this electronic-media era to plunder the citizenry. [Footnotes omitted.]

[106]   Because of the U.S. civil procedure code, judges have opted to utilize the court’s discretionary powers over joinder of claims to address abuses of power. It is within this context that U.S. courts have opined on “copyright trolls” and their targeting of individuals without any concern to the differences between cases and the factual and legal culpability of numerous defendants. The potential for coercing individuals into settlement is often cited as a reason to prohibit joinder, even where the formal requirements of the rules of civil procedure are met.

[107]   Stories regarding coercive litigation tactics employed by “copyright trolls” have affected courts which are hesitant to encourage such activity (see, for example, Malibu Media, LLC v. John Does 1-5, 285 F.R.D. 273 (D. N.Y., 2012) [cited above]. In that case, the judge permitted joinder of claims because she was of the view that many of the concerns regarding the pressure to settle could be mitigated by anonymity of the alleged infringer. The Court also took the position that the nature of work that is protected (adult films) and its accompanying level of embarrassment should not affect the propriety of joinder.

[108]   In Third Degree Films, v. Does 1-47, 286 F.R.D. 188 (D. Mass., 2012), the judge described the approach employed by courts across the country as follows (at pages 4–6):

Against this backdrop of mass lawsuits and potentially abusive litigation tactics, courts nationwide have become sceptical of allowing the adult film companies unfettered access to the judicial processes of subpoenas and early discovery. Furthermore, many courts are eradicating these mass filings on the ground that joinder of tens, hundreds, and sometimes thousands of alleged infringers is improper, and some have admonished the plaintiff adult film companies for evading such substantial court filing fees as they have through the joinder mechanism. Still, a number of courts have upheld the joinder of Doe defendants as proper and efficient, issued subpoenas, and permitted early discovery. [Footnotes omitted.]

[109]   The Court also described some of the more egregious tactics used by the plaintiffs, such as in one case harassing telephone calls demanding $2 900 to end the litigation (page 15).

[110]   The pursuit of non-judicial remedies aimed at extracting quick settlements from alleged infringers have led judges to deny remedies to plaintiffs (see, Hard Drive Prods., Inc. v. Does 1-90, 2012 U.S. Dist. LEXIS 45509 (N.D. Cal., 2012)). The Court considered the plaintiff’s admission that to its knowledge neither it nor any other defendant had ever served a single alleged infringer after early discovery had been granted. Thus, the plaintiff had failed to establish that granting discovery would lead to identification of and service of the alleged infringers.

[111]   However, in an Oregon case involving Voltage (Voltage Pictures, LLC v. Does 1-198, Does 1-12, Does 1-34, Does 1-371, (1:13-cv-00293-CL)(D. Or., 2013) [cited above]), the Court suggested the most appropriate method to protect against the risk of coercion is to sever the alleged infringers and require them to be sued individually (see also, Combat Zone, Inc. v. Does 1-84, 2013 U.S. Dist. LEXIS 35439 (D. Mass., 2013) [cited above]).

[112]   The Oregon Court was not merely concerned with Voltage’s avoidance of filing fees, rather, it strongly criticized Voltage for its “underhanded business model” aimed at raising profits. Judge Aiken expressed doubt about Voltage’s claim that it was interested in defending P2P copyright infringement. The sample demand letter before the Court showed that Voltage threatened punitive damages and, in the Court’s view, suggested that liability of the alleged infringers was a foregone conclusion. The Court characterized Voltage’s attempt to use scare tactics and “paint all Doe users, regardless of degree of culpability in the same light” (at page 11) as an abuse of process. The Court observed (at page 10):

Accordingly, plaintiff’s tactic in these BitTorrent cases appears to not seek to litigate against all the Doe defendants, but to utilize the court’s subpoena powers to drastically reduce litigation costs and obtain, in effect, $7,500 for its product which, in the case of Maximum Conviction, can be obtained for $9.99 on Amazon for the Blu-Ray/DVD combo or $3.99 for digital rental.

[113]   This highlights an issue raised by CIPPIC to the effect that damage claims in these mass infringement cases often far exceeds any actual damage that may have occurred.

[114]   Further, U.S. courts have taken a dim view of demand letters that stated that alleged infringers are being notified because they actually infringed and the case would be dropped if settlement was reached. Courts have characterized this information as erroneous because it assumes that the person who pays for Internet access at a given location is the same individual who allegedly infringed copyright. For example, in Combat Zone, following other judges, the judge characterized this assumption as tenuous and analogous to the assumption that a person who pays the telephone bill also made a specific telephone call (citing In re BitTorrent Adult Film Copyright Infringement Cases, 2012 U.S. Dist. LEXIS 61447 (E.D. N.Y., 2012), at page 3).

[115]   Counsel for Voltage in this case argued that this case was about nothing more than joinder of defendants. However, in my view that is a mischaracterization. Private information is being sought and the Court ought not to order its release unless there is some protection against it being misused as it has been in the U.S. copyright troll cases.

[116]   Notably, no draft letter or order was provided in this case although during the course of argument counsel for Voltage outlined the contents of a proposed letter. Given the order being made herein, the letter will be subject to judicial scrutiny.

[117]   Very few U.S. cases address the alleged infringers’ privacy and anonymity rights. This issue was most closely canvassed in Malibu Media, LLC v. John Does, 902 F. Supp. 2d 690 (E.D. Pa., 2012) [cited above], wherein five of the alleged infringers sought to quash third-party subpoenas and moved against the filing of a single complaint joining all of them. Malibu Media, the producer of adult films and copyright holder, was one of the plaintiffs that had initiated proceedings against unidentified alleged infringers across multiple jurisdictions.

[118]   In the course of the action Malibu Media’s approach to litigation was described as follows (at pages 695–696):

When Plaintiff receives this information from the ISPs, it contacts the subscribers associated with the IP addresses, usually by letter, advising them of the lawsuits and offering them an opportunity to settle by payment of a monetary sum. The content of the letters is not yet in the record. Nor does the Court have any information as to the amount of money that Plaintiff typically demands, or whether and to what extent negotiations take place and ultimately lead to settlements. If the John Doe defendant who receives the letter agrees to pay, Plaintiff dismisses the complaint against that defendant with prejudice and without any further court proceedings, thus avoiding the public disclosure of the defendant's identity. If the John Doe defendant refuses to settle, or Plaintiff has been unable to serve the complaint within the 120 days required under Rule 4(m) of the Federal Rules of Civil Procedure, subject to any extension granted by the court, with whatever information is provided by the ISP, Plaintiff dismisses the complaint against that defendant without prejudice to Plaintiff’s ability to commence a subsequent action against that defendant. In this fashion, Plaintiff has initiated hundreds of lawsuits in various district courts throughout the country, but has not yet proceeded to trial in any case. [Emphasis added.]

[119]   This appears to be a typical description of how copyright trolling or speculative invoicing works. In that case the alleged infringers argued that their right to remain anonymous outweighed the plaintiff’s potential proprietary interests in the copyright. The Court disagreed and held that the third-party subpoenas did not unduly burden these potential defendants. The Court acknowledged that its order impeded the right to anonymity on the Internet and implicates First Amendment rights under the U.S. Constitution. Nonetheless, the Court determined that the standard used by prior courts when granting third-party subpoenas was an appropriate means of balancing competing interests at stake. This standard requires the court to balance five factors:

(1)       the concreteness of the plaintiff’s showing of a prima facie claim of actionable harm;

(2)       the specificity of the discovery request;

(3)       the absence of alternative means to obtain the subpoenaed information;

(4)       the need for the subpoenaed information to advance the claim; and

(5)       the objecting party’s expectation of privacy.

[120]   These factors bear some similarity to the BMG factors discussed above. The Court was of the view that the factors weighed in favour of the plaintiff because any detriment to the expectation of privacy could be mitigated by granting their request to proceed anonymously.

[121]   The Court also acknowledged that subscriber information may not directly identify defendants but noted that it would likely allow the plaintiff to identify the actual infringer. Curiously, the Court did not consider whether this was likely to occur considering the plaintiff’s approach to this litigation, set out above. The Court did state, however, that: “The purpose of the joinder rules is to promote efficiency, not to use Federal District Courts as small claims collection agencies, by putting economic pressure on individuals who do not have substantive liability” (at page 701).

[122]   Ultimately, the Court did not sever the claims but rather stayed all claims but those of the five alleged infringers who brought the motions. He ordered these to proceed forward as a “Bellweather trial” (a type of test case intended to give parties an indication of what is likely to happen in future proceedings of the same nature).

[123]   Interestingly, the Court also provided the following warning, suggesting that the plaintiff’s intention to actually pursue claims may be relevant in future proceedings (at page 701):

Although the Court cannot prevent the parties from settling these claims, the Court assumes that Plaintiff will welcome this opportunity to prove its claims promptly pursuant to the Federal Rules of Civil Procedure, the Federal Rules of Evidence, and the copyright laws, which may, if Plaintiff is successful, lead to an injunction enjoining the practices about which Plaintiff complains. If Plaintiff decides instead to continue to "pick off" individual John Does, for confidential settlements, the Court may draw an inference that Plaintiff is not serious about proving its claims, or is unable to do so. [Emphasis added.]

[124]   Despite these judicial pronouncements, courts in the U.S. remain somewhat ambiguous on the question of whether a plaintiff’s intention to pursue litigation against alleged infringers is relevant to allowing disclosure of information.

[125]   These decisions also provide almost no analysis of evidence required to establish a prima facie case, which is part of the good cause standard applied. In most of these cases reference is made to evidence from forensic investigators. The good cause standard was met where the evidence identified the IP address of each alleged infringer, the city in which the address was located, the date and time of the infringing activity and the ISP of the address (Malibu Media, 902 F. Supp. 2d 690 [cited above]).

Summary of U.K. and U.S. cases

[126]   The decisions reviewed suggest that courts in both the U.K. and U.S. are particularly concerned with sanctioning a business model that coerces innocent people into settlements.

[127]   Both jurisdictions appear open to imposing safeguards and overseeing the disclosure process to ensure that plaintiffs do not misrepresent the effects of the Norwich order.

[128]   These courts have also generally accepted that users identified by the disclosure may not be the actual infringers but may have information that leads to the alleged infringer. Cases such as Combat Zone are particularly useful as guidelines because they prohibit plaintiffs from referring to letter recipients as defendants.

[129]   With respect to privacy concerns, the cases in both jurisdictions suggest that such issues are of secondary importance as the law generally does not shield wrongdoing for reasons of privacy. Thus, the question of the extent of actual wrongdoing, once it has been established, is important.

[130]   U.S. law clearly imposes a prima facie standard on plaintiffs but it is difficult to ascertain how the evidence mentioned in the cases meets that higher standard. It could be that U.S. courts are far more familiar with these types of claims and the evidence required to establish infringement. Interestingly, U.S. courts acknowledge that the identified IP address subscriber may not be the actual infringer for a number of reasons, but do not discuss the technical flaws of techniques used to trace IP addresses, an issue identified by CIPPIC.

[131]   U.K. courts require claimants to establish an arguable case of infringement. In Golden Eye the Court held that technical and non-technical uncertainties were not sufficient to deny the request for disclosure.

[132]   Thus, although CIPPIC asserts that U.S. and U.K. cases recognize a need to assess the strength of a cause of action as a pre-requisite, it is not clear from a review of these cases what this actually means in practice. Based on the evidence on this motion there is a bona fide case of copyright infringement. The real question is the form of remedy.

CONCLUSION

[133]   Having considered all of the evidence of the parties, their submissions and the jurisprudence, there is a number of principles to be gleaned. These principles are in addition to the tests to be applied from BMG. The Court should give consideration to these principles to weigh and balance the privacy rights of potentially innocent users of the Internet versus the right of copyright holders to enforce their rights. The Court ought to balance these rights in assessing the remedy to be granted. Where evidence suggests that an improper motive may be lurking in the actions of a copyright holder plaintiff, the more stringent the order. However, it would only be in a case where there was compelling evidence of improper motive on behalf of a plaintiff in seeking to obtain information about alleged infringers that a Court might consider denying the motion entirely. The Copyright Act engages the Court to enforce copyright and the rights that go with the creation of copyrighted works. Absent a clear improper motive the Court should not hesitate to provide remedies to copyright holders whose works have been infringed.

[134]   In summary, the following is a non-exhaustive list of considerations which flow from cases in the U.S., U.K. and Canada:

(a)       The moving party must demonstrate a bona fide case;

(b)       Putting safeguards in place so that alleged infringers receiving any “demand” letter from a party obtaining an order under rule 238 or a Norwich order not be intimidated into making a payment without the benefit of understanding their legal rights and obligations;

(c)        When issuing a Norwich order the Court may retain the authority to ensure that it is not abused by the party obtaining it and can impose terms on how its provisions are carried out;

(d)       The party enforcing the Norwich order should pay the legal costs and disbursements of the innocent third-party;

(e)       Specific warnings regarding the obtaining of legal advice or the like should be included in any correspondence to individuals who are identified by the Norwich order;

(f)        Limiting the information provided by the third party by releasing only the name and residential address but not telephone numbers and e-mail addresses;

(g)       Ensuring there is a mechanism for the Court to monitor the implementation of the Norwich order;

(h)       Ensuring that the information that is released remains confidential and not be disclosed to the public and be used only in connection with the action;

(i)         Requiring the party obtaining the order to provide a copy of any proposed “demand” letter to all parties on the motion and to the Court prior to such letter being sent to the alleged infringers;

(j)         The Court should reserve the right to order amendments to the demand letter in the event it contains inappropriate statements;

(k)        Letters sent to individuals whose names are revealed pursuant to Court order must make clear that the fact that an order for disclosure has been made does not mean that the Court has considered the merits of the allegations of infringement against the recipient and made any finding of liability;

(l)         Any demand letter should stipulate that the person receiving the letter may not be the person who was responsible for the infringing acts;

(m)      A copy of the Court order, or the entire decision should be included with any letter sent to an alleged infringer; and,

(n)       The Court should ensure that the remedy granted is proportional.

[135]   On the facts of this case, there is some evidence that Voltage has been engaged in litigation which may have an improper purpose. However, the evidence is not sufficiently compelling for this Court at this juncture in the proceeding to make any definitive determination of the motive of Voltage. They have demonstrated on their evidence that they own copyright in the works; that the forensic investigation concluded that there are alleged infringers who have downloaded the works via the P2P and BitTorrent system; that TekSavvy, a non-party is the ISP that has information such as names and addresses of its subscribers who are alleged by Voltage to have infringed; quite properly, TekSavvy will not release any information in the absence of a court order; that it is fair that Voltage have access to the information to enforce its copyright; and, given the terms of the order made, production of such information will not delay, inconvenience or cause expense to TekSavvy or others.

[136]   Counsel for TekSavvy helpfully put in perspective the issues TekSavvy has with respect to revealing information and there was evidence of notifications which TekSavvy had made available to its customers. TekSavvy also sought payment of its reasonable costs in the event it had to release information. Any dispute regarding those costs can be resolved by the case management judge.

[137]   In order to ensure the Court maintains control over the implementation of the order, this action will proceed as a specially managed action and a case management judge will be appointed who will monitor, as necessary, the conduct of Voltage in its dealings with the alleged infringers.

[138]   Further, in order to ensure there is no inappropriate language in any demand letter sent to the alleged infringers, the draft demand letter will be provided to the Court for review. The letter should contain a statement that no Court has yet found any recipient of the letter liable for infringement and that recipients should seek legal assistance. The reasonable legal costs, administrative costs and disbursements of TekSavvy in providing the information will be paid to TekSavvy prior the information being provided. The information will be limited only to the name and address of the IP addresses as set out in the schedule to the affidavit of Barry Logan which schedule is attached as Schedule A to these reasons and order. Any further directions or additions to the order will be dealt with by the case management judge. All participants on this motion and any intended defendant shall be able to seek a case conference with the case management judge to review issues arising in the proceeding.

[139]   In my view, the order herein balances the rights of Internet users who are alleged to have downloaded the copyrighted works against the rights of Voltage to enforce its rights in those works. A case management judge will be in a good position to maintain that balance and ensure that Voltage does not act inappropriately in the enforcement of its rights to the detriment of innocent Internet users.

ORDER

            THIS COURT ORDERS that:

1.         This action shall continue as a specially managed proceeding and be referred to the Office of the Chief Justice for the appointment of a case management judge.

2.         TekSavvy Solutions Inc. (TekSavvy) shall disclose to the plaintiff the contact information, in the form of the names and addresses, to the extent it is able, of the TekSavvy customer accounts (subscribers) associated with the IP addresses attached as Exhibit B to the affidavit of Barry Logan.

3.         All reasonable legal costs, administrative costs and disbursements incurred by TekSavvy in abiding by this order shall be paid by the plaintiff to TekSavvy.

4.         The reasonable legal costs and disbursements of TekSavvy referred to in paragraph 3 herein shall be paid prior to the release to the plaintiff of the information referred to in paragraph 2 herein.

5.         The plaintiff shall include a copy of this order in any correspondence that is sent to any of the subscribers identified by TekSavvy pursuant to this order.

6.         Any of the subscribers may request a full copy of these reasons for order and order from the plaintiff and the plaintiff shall provide a copy at no charge to each subscriber requesting a copy.

7.         Any separate actions commenced by the plaintiff against any of the subscribers shall be case managed in connection with this case.

8.         Any correspondence sent by Voltage to any subscriber shall clearly state in bold type that no Court has yet made a determination that such subscriber has infringed or is liable in any way for payment of damages.

9.         A draft of the proposed letter to be sent to subscribers shall be provided to the parties to this motion and to the Court and be the subject of a case conference with the case management judge to review and approve the contents of the letter before being sent to any subscriber.

10.      The release of the information by TekSavvy shall remain confidential and not be disclosed to any other parties without further order of the Court and only be used by the plaintiff in connection with the claims in this action.

11.      The plaintiff shall undertake to the Court not to disclose to the general public by making or issuing a statement to the media any of the information obtained from TekSavvy.

12.      All participants on this motion and any intended defendant shall have the right to seek a case conference with the case management judge to review issues arising in the proceeding.

13.      Any further amendments or additions to this order shall be within the discretion of the case management judge.



[1] Judge Ronald Guzman, TCYK, LLC v. Does 1 – 88, 2013 U.S. Dist. LEXIS 88402 (U.S. District Court for the Northern District of Illinois), at p. 3.

[2] Norwich Pharmacal Co. v. Customs and Excise Comrs., [1974] A.C. 133 (H.L.). This type of order first came to light in this case. These types of orders are now part of the Canadian litigation landscape and require innocent third parties to disclose information in their possession regarding unlawful conduct. A discussion of these orders is found later in these reasons.

 You are being directed to the most recent version of the statute which may not be the version considered at the time of the judgment.