Searching over 5,500,000 cases.


searching
Buy This Entire Record For $7.95

Official citation and/or docket number and footnotes (if any) for this case available with purchase.

Learn more about what you receive with purchase of this case.

Killer Joe Nevada, LLC v. Radeljan

United States District Court, D. Colorado

March 24, 2014

KILLER JOE NEVADA, LLC, Plaintiff,
v.
CEDRIC RADELJAN, Defendant.

RECOMMENDATION OF UNITED STATES MAGISTRATE JUDGE

MICHAEL E. HEGARTY, Magistrate Judge.

Plaintiff has filed a Motion for Entry of Default Judgment against Defendant Cedric Radeljan (filed January 17, 2014; doc. #54). Pursuant to 28 U.S.C. § 636(b)(1)(B) and D.C. Colo. LCivR 72.3, the motion was referred to me for a Report and Recommendation on January 21, 2014. (Doc. # 57.) The matter is briefed to the extent required by court rules and the prevailing law, and the Court finds that oral argument is not necessary for the adjudication of the motion. Based upon the record and for the reasons that follow, the Court recommends that the District Court grant in part and deny in part the motion.[1]

BACKGROUND

In this case, Plaintiff's allegations involve a complicated technical process used to download a copyrighted work (here, the motion picture "Killer Joe") through the BitTorrent program; therefore, this Court finds it necessary first to explain how BitTorrent works, then to note its findings of fact in this case.

I. BitTorrent Protocol

Fortunately, several courts in this country have researched, defined and described the protocol in such a way that even technologically challenged individuals may understand the intricacies of the BitTorrent program. This Court finds particularly instructive and gratefully adopts the description provided by the Honorable Thomas L. Ludington, District Judge for the Eastern District of Michigan, in Patrick Collins, Inc. v. John Does 1-28, No. 12-13670, 2013 WL 359759 (E.D. Mich. Jan. 29, 2013), in which Judge Ludington first defines terms used with the protocol, then describes how BitTorrent operates. Id. at *1-*3. First, the vocabulary used in the technology:

Internet Protocol (IP): The system of communication standards that ensures data packets transmitted over the internet reach their intended destinations.
IP Address: The unique identifying number of a device connected to the internet.
Uniform Resource Locator (URL): The internet address assigned to a web document or resource by which it can be accessed by all web browsers.
File: A collection of related data packets treated as a unit.
Hash Identifier: A 40-character alphanumeric string that forms a unique identifier of an encoded file.
Hypertext Transfer Protocol (HTTP): A system of communication standards that websites use to communicate with web browsers.
BitTorrent: A peer-to-peer file sharing protocol.
Peer: A BitTorrent user.
Swarm: A group of peers sharing a particular file (identified by its unique hash identifier). A swarm has two types of peers - "leechers" and "seeds." It bears reiterating: to constitute a swarm, all of the peers must be sharing the same file (identified by its unique hash identifier).
Initial Seeder: A BitTorrent user who first takes a particular file (such as a movie), breaks it into pieces, encodes the pieces with hash identifiers, creates a torrent file with the data about that file and its tracker, and makes the complete file available to other BitTorrent users.
Seed: A peer who downloaded a complete file and is uploading all of its pieces to other peers in the swarm.
Leecher: A peer in the process of downloading the file from the other peers. As soon as a leecher downloads new content (a piece of the file), the leecher begins sharing its content with the other leechers in the swarm.
Piece: A one-quarter megabyte size part of a file being shared via BitTorrent (except for the last, smaller piece, which is the size of the remainder of the file).
Tracker: A server containing an updated list of peers in the swarm. It allows a peer to learn about other peers sharing a particular torrent and join the swarm.
Torrent file: The hub of the BitTorrent system, a torrent file is a small file containing the file name, the IP address of the tracker, the number of and size of the pieces, and the hash identifier unique to the pieces of that particular torrent file.

Patrick Collins, Inc., 2013 WL 359759, at *1-*2 (citations omitted). Judge Ludington proceeds to describe the protocol and how BitTorrent works:

BitTorrent, as noted, is a peer-to-peer file sharing protocol. More precisely, it is a peer-to-peer model that improves on prior generations of peer-to-peer networks by solving the "free-rider problem wherein a substantial majority of users downloaded but never uploaded content."
...
Briefly, here's how BitTorrent works. A file transfer begins "when one user accesses the Internet through an ISP and intentionally makes a digital file of a work available to the public from his or her computer. This file is referred to as the first seed.' Other users, who are referred to as peers, ' then access the Internet and request the file. These users engage each other in a group, referred to as a swarm, ' and begin downloading the seed file. As each peer receives portions of the seed, that peer makes those portions available to other peers in the swarm."
Elaborating on the process, BitTorrent.org explains that to download a file, a peer performs six steps:
1. Install BitTorrent (or have done so already).
2. Surf the web.
3. Click on a link to a torrent file.
4. Select where to save the file locally, or select a partial download to resume.
5. Wait for download to complete.
6. Tell downloader to exit (it keeps uploading until this happens).
BitTorrent's key, as noted, is reciprocity - a peer not only downloads but automatically uploads pieces to other peers. "To keep the torrent operating at maximum capacity, the BitTorrent protocol uses a process called pipelining. Every active peer in a torrent maintains a continuously refreshed queue of requests for pieces, so that no connection is ever left idle after any one piece is downloaded."
"In addition, the protocol has an internal mechanism that makes sure that those peers who are offering little or nothing to the torrent will get little or nothing from it."
In sum, BitTorrent is a reciprocal, decentralized network - and a tough nut to crack for copyright holders:
Data is not stored on a central server. Rather, a user downloads the file in discrete segments from many different users who send data directly to one another. While trackers coordinate and assist peers in locating a swarm, the tracker itself sends out very little data. This makes BitTorrent an extremely efficient mechanism for transferring large files and at the same time, it insulates the protocol itself from anti-piracy efforts because there are no central servers to enjoin from unlawfully distributing copyrighted content. Thus, when copyrighted data is transmitted via BitTorrent, the copyright holder is largely limited to holding the individual file sharers liable for infringement.

Id. at *2-*3 (citations omitted).

II. Findings of Fact

1. Plaintiff is a limited liability corporation organized under the laws of California and located at 662 N. Crescent Heights Blvd., Los Angeles, California 90048.

2. Plaintiff is the owner of United States Copyright Registration Number PAu X-XXX-XXX for the motion picture entitled "Killer Joe" ("Motion Picture"). The work was registered on or about September 27, 2011. (Doc. # 19-2.)

3. Plaintiff's investigator, Crystal Bay Corporation ("CBC"), detected IP addresses 184.99.236.231 and 71.218.172.105 being used to gain access to the internet and distribute and make available for distribution and copying Plaintiff's Motion Picture. Initially, these IP addresses were ascribed to John Doe 2 and John Doe 15, respectively. (Doc. ## 7-1 at 7; 1-1 at 1.)

4. Using its forensic software, Crystal Bay Corporation detected transactions occurring on peer-to-peer networks through which computers using the IP addresses of Doe 2 and Doe 15 to transmit a copy or part of a copy of a digital media file identified by the hash value 1C3ACA6FFCC9C94-C7B5917301AE924FA5A3C7991 ("Hash 1C3A"). (Doc. ## 7-1 at 6-7; 1-1 at 1.) CBC confirmed that Hash 1C3A corresponds to Plaintiff's Motion Picture. (Doc. # 7-1 at 7.)

5. CBC downloaded from these IP addresses files containing a substantial portion of Plaintiff's Motion Picture. (Doc. # 7-1 at 6.) CBC confirmed that reassembling pieces downloaded from these IP addresses produces the Motion Picture in fully playable form. (Doc. # 43 at 8.) The download from Doe 2's IP address occurred on March 3, 2013, and the download from Doe 15's IP address occurred on February 21, 2013. (Doc. ## 1-1; 39-2.)

6. Through the applicable internet service provider, Plaintiff has identified Cedric Radeljan with the Doe 2 and Doe 15 IP addresses. (Doc. ## 43 at 2-3; 39-2.)

7. Defendant Radeljan is an individual residing at 7210 South Algonquian Street, Unit 206, Aurora, Colorado. (Doc. # 46.)

8. These facts indicate that, without permission or authorization, Defendant Radeljan downloaded and uploaded Plaintiff's copyrighted Motion Picture. (Doc. # 43 at 8.)

9. As the subscriber in control of the IP addresses being used to distribute Plaintiff's copyrighted Motion Picture, Defendant Radeljan is the most likely infringer. Defendant Radeljan has failed to appear, plead, or otherwise defend in this action. Therefore, Defendant Radeljan is the only person who can be identified as the infringer.

10. On November 14, 2013, Plaintiff filed the operative Second Amended Complaint in this case naming Cedric Radeljan a/k/a Sedric Radeljan as Defendant. (Doc. # 43.)

11. Defendant Radeljan was served with a summons and the Second Amended Complaint on November 15, 2013. (Doc. # 46.)

12. On December 27, 2013, Plaintiff filed a Motion for Entry of Clerk's Default as to Defendant Radeljan pursuant to Fed.R.Civ.P. 55(a). (Doc. # 49.)

13. On December 30, 2013, the Clerk of the Court entered default for Defendant Radeljan. (Doc. # 50.)

14. Plaintiff seeks statutory damages for willful direct infringement and contributory infringement, as well as injunctive relief. (Doc. # 43.)

PROCEDURAL HISTORY

Plaintiff initiated this action against 20 Doe Defendants on May 19, 2013. (Doc. # 1.) The case was assigned to United States Senior District Judge Wiley Daniel and drawn to United States Magistrate Michael J. Watanabe. (Doc. # 4.) Subsequently, pursuant to 28 U.S.C. § 636(b)(1)(A) and (B) and Fed.R.Civ.P. 72, the case was referred to United States Magistrate Judge Michael E. Hegarty. (Doc. # 8.) On August 26, 2013, Plaintiff filed an Amended Complaint. (Doc. # 19.) Since that time, Plaintiff has dismissed 18 Doe Defendants, leaving only Doe Defendants 2 and 15. On November 14, 2013, Plaintiff filed a Second Amended Complaint identifying Doe Defendants 2 and 15 as a single individual, Cedric Radeljan, a/k/a Sedric Radeljan, who Plaintiff named as the sole Defendant in this case. Plaintiff served a summons and the Second Amended Complaint upon Defendant Radeljan on November 15, 2013; thus, Defendant's answer or other response was due to be filed on or before December 6, 2013. (Doc. # 43.) However, Defendant filed no answer or other response before the deadline; therefore, on December 27, 2013, Plaintiff filed a Motion for Entry of Clerk's Default Against Defendant. (Doc. # 49.) The Clerk of the Court entered default against Defendant on December 30, 2013. (Doc. # 50.) Plaintiff then filed the present motion for default judgment on January 17, 2014, with an attached certificate demonstrating service of the motion upon Defendant. (Doc. ## 54, 54-2.) Nevertheless, Defendant neither responded to the motion nor sought any extension of time within which to respond.

The Court is now fully advised and recommends as follows.

LEGAL STANDARDS

Fed. R. Civ. P. 55 governs motions for default judgment. Rule 55(b)(2) provides the authority for the District Court to enter default judgment. After an entry of default, a defendant cannot defend a claim on the merits. See Olcott v. Delaware Flood Co., 327 F.3d 1115, 1125 (10th Cir. 2003) ("defendant, by his default, admits the plaintiff's well-pleaded allegations of fact") (quoting Jackson v. FIE Corp., 302 F.3d 515, 525 (5th Cir. 2002) (finding that "[a] default judgment is unassailable on the merits.")); see also Adriana Int'l Corp. v. Thoeren, 913 F.2d 1406, 1414 (9th Cir. 1990) ("[A] default judgment generally precludes a trial of the facts except as to damages.").

"Even after entry of default, however, it remains for the court to consider whether the unchallenged facts constitute a legitimate basis for the entry of a judgment." See McCabe v. Campos, No. 05-cv-00846-RPM, 2008 WL 576245, at *2 (D. Colo. Feb. 28, 2008) (unpublished) (citing Black v. Lane, 22 F.3d 1395, 1407 (7th Cir. 1994)). In determining whether a claim for relief has been established, the well-pleaded facts of the complaint relating to liability are deemed true. Id. (citing Dundee Cement Co. v. Howard Pipe & Concrete Prods., Inc., 722 F.2d 1319, 1323 (7th Cir. 1983)); see also Personal Indus. Loan Corp. v. Forgay, 240 F.2d 18, 20 (10th Cir. 1956) ("By failing to appear and permitting a default judgment to be entered, [defendant] admitted only facts well pleaded."). In addition, the court accepts the undisputed facts set forth in any affidavits and exhibits. Deery American Corp. v. Artco Equip. Sales, Inc., No. 06-cv-01684-EWN-CBS, 2007 WL 437762, at *3 (D. Colo. Feb. 6, 2007) (unpublished).

"[A] party is not entitled to a default judgment as of right; rather the entry of a default judgment is entrusted to the sound judicial discretion' of the court." Cablevision of S. Conn., Ltd. P'ship v. Smith, 141 F.Supp.2d 277, 281 (D. Conn. 2001) (quoting Shah v. N.Y. State Dep't of Civil Serv., 168 F.3d 610, 615 (2d Cir. 1999)). A trial court is vested with broad discretion in deciding whether to enter a default judgment. Grandbouche v. Clancy, 825 F.2d 1463, 1468 (10th Cir. 1987); see also Weft, Inc. v. G.C. Inv. Assocs., 630 F.Supp. 1138, 1143 (E.D. N.C. 1986) ("[U]pon a default, a plaintiff is entitled to a determination of liability unless he has failed to state a legal basis for relief or it is clear from the face of the complaint that the allegations are not susceptible of proof." (citing Nishimatsu Constr. Co. v. Hous. Nat'l Bank, 515 F.2d 1200, 1206 (5th Cir. 1975))).

ANALYSIS

Upon review of the record, the Court recommends finding that default judgment be entered in Plaintiff's favor against Defendant Radeljan pursuant to Fed.R.Civ.P. 55(b)(2) as follows.

I. Jurisdiction and Liability

In determining whether entry of default judgment is warranted, the court must first consider personal and subject matter jurisdiction. See, e.g., Williams v. Life Sav. & Loan, 802 F.2d 1200, 1203 (10th Cir. 1986) (lack of subject matter jurisdiction constitutes good cause to set aside a default judgment); see also Dennis Garberg & Assoc. v. Pack-Tech Int'l Corp., 115 F.3d 767, 772 (10th Cir. 1997) (district court erred in failing to determine personal jurisdiction issue before considering entry of default judgment). Here, the record reveals that Defendant Cedric Radeljan resides at 7210 South Algonquian Street, Unit 206, Aurora, Colorado. As Defendant resides in the District of Colorado, the Court has personal jurisdiction over him. In addition, this is a copyright infringement case, and the federal courts have original jurisdiction in such cases. See 28 U.S.C. § 1338. The Copyright Act creates a cause of action in favor of the owner of a copyright for direct infringement. 17 U.S.C. § 501.

Furthermore, taking its allegations as true, the Plaintiff has established violations of its copyrights by Defendant Radeljan, in that a computer using an IP address assigned to him participated in an illegal download of Plaintiff's copyrighted Motion Picture. A plaintiff is entitled to a determination of liability unless it has failed to state a legal basis for relief or it is clear from the face of the complaint that the allegations are not susceptible of proof. Weft, Inc., 630 F.Supp. at 1143.

Here, Plaintiff's Second Amended Complaint includes the following summarized allegations. Defendant installed a BitTorrent Client program onto his computer and visited a torrent site to upload and download Plaintiff's copyrighted Motion Picture. (Doc. # 43 at ¶¶ 15, 27.) Defendant participated in a "swarm, " directly interacting and communicating with other peers. ( Id. at ¶ 32.) Defendant copied a piece of Plaintiff's copyrighted Motion Picture identified by its Unique Hash Number. ( Id. at ¶ 38(A).) Defendant's computer or computers, located in this District, used its or their identified IP addresses to connect to CBC's investigative server and to transmit a full or partial copy of the digital media filed identified by the Motion Picture's unique hash number. ( Id. at ¶ 39.) CBC's agent verified that the digital media file was identical, strikingly similar, or substantially similar to Plaintiff's copyrighted Motion Picture. ( Id. at ¶ 41.) Using the BitTorrent protocol, BitTorrent Client, and the process described above, Defendant copied the constituent elements of Plaintiff's Motion Picture that are original. ( Id. at ¶ 46.)

Defendant's infringements were committed "willfully" within the meaning of 17 U.S.C. § 504(c)(2). (Doc. # 43 at ¶ 49.) Plaintiff has suffered actual damages that were proximately caused by Defendant, including lost sale prices, price erosion, and diminution of the value of its copyright. ( Id. at ¶ 50.) By participating in the BitTorrent swarm with other peers, Defendant induced, caused or materially contributed to the infringing conduct of each other peer. ( Id. at ¶ 54.) Defendant knew or should have known that other BitTorrent users in the swarm were directly infringing Plaintiff's copyrighted Motion Picture. ( Id. at ¶ 57.) Plaintiff suffered actual damages that were proximately caused by each copyright infringement. ( Id. at ¶ 60.)

"There are two elements to a copyright infringement claim: (1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.'" La Resolana Architects, PA v. Reno, Inc., 555 F.3d 1171, 1177 (10th Cir. 2009) (quoting Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991)). "The plaintiff bears the burden of proof on both elements." Id. (citing Palladium Music, Inc. v. EatSleepMusic, Inc., 398 F.3d 1193, 1196 (10th Cir. 2005)).

Here, the Plaintiff alleges it owns the copyright to the Killer Joe Motion Picture described above, and provides the registration number, publication date and registration date for the Motion Picture. ( See Doc. # 43 at 3; see also Doc. # 39-3.) The Court takes Plaintiff's well-pleaded allegations as true.

For the second element, Plaintiff must prove that Defendant "unlawfully appropriated protected portions of the copyrighted work.'" La Resolana Architects, 555 F.3d at 1178 (quoting Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 832 (10th Cir. 1993)). "This requires proving both: (1) that [Defendant], as a factual matter, copied portions of [Plaintiff's] work; and (2) that those elements of the work that were copied were protected expression and of such importance to the copied work that the appropriation is actionable.'" Id .; see also Jacobsen v. Deseret Book Co., 287 F.3d 936, 942 (10th Cir. 2002) (quoting Country Kids N City Slicks, Inc. V. Sheen, 77 F.3d 1280, 1284 (10th Cir. 1996)).

"[A] plaintiff can indirectly prove copying (in a factual sense) by establishing that Defendant[] had access to the copyrighted work and that there are probative similarities between the copyrighted material and the allegedly copied material.'" La Resolana Architects, 555 F.3d at 1178 (quoting Country Kids N City Slicks, Inc., 77 F.3d at 1284) (alteration added). "A plaintiff may meet the initial burden of establishing access by showing that the defendant had a reasonable opportunity to view or [an] opportunity to copy the allegedly infringed work.'" Id. (quoting Autoskill Inc. v. Nat'l Educ. Support Sys., Inc., 994 F.2d 1476, 1490 (10th Cir. 1993), overruled on other grounds by TW Telecom Holdings Inc. V. Carolina Internet Ltd., 661 F.3d 495 (10th Cir. 2011)). "Thus, while a plaintiff is not required to demonstrate the defendant's actual access to the work, evidence that only creates a bare possibility that the defendant had access is not sufficient.'" Id. (quoting Mag Jewelry Co. v. Cherokee, Inc., 496 F.3d 108, 117 (1st Cir. 2007)).

"Once copying has been established, liability for copyright infringement will attach only where protected elements of a copyrighted work are copied.'" Id. at 1180 (quoting Country Kids N City Slicks, Inc., 77 F.3d at 1284). "The plaintiff must prove that there is a substantial similarity between those aspects of Plaintiff's [work] which are legally protectable and the Defendants' [work].'" Id. (quoting Country Kids N City Slickers, Inc., 77 F.3d at 1284). "Substantial similarity is measured by whether an ordinary observer, ' who is not specifically looking for disparities, would tend to overlook any differences between the works." Id. (citation omitted).

In this case, Plaintiff has sufficiently alleged that Defendant copied its protected Motion Picture. Plaintiff has demonstrated, through verified testimony, that its investigator downloaded the Motion Picture, or portions of it, from each Doe Defendant's IP address. (Doc. # 7-1 at 6.) The investigator identified the Motion Picture by its unique "hash checksum, " and by visually comparing the downloaded files with a DVD copy of the Motion Picture provided by Plaintiff. ( Id. at 7.) Having viewed the files and DVD, the investigator confirmed that the files contain a substantial portion of the Motion Picture. ( Id. at 6.) Defendant Radeljan was subsequently identified as the person to whom the IP addresses assigned to Doe Defendants 2 and 15 belonged. (Doc. # 43 at 2-3; 39-2.) Taking these well-pled allegations as true, the Court finds that Plaintiff has established that Defendant Radeljan copied Plaintiff's copyright protected Motion Picture and recommends that the Copyright Act against the Plaintiff.

However, the Court is not convinced that these factual allegations support a claim for contributory infringement. Contributory infringement requires proof of direct infringement by someone other than the defendant. See La Resolana Architects, PA, 555 F.3d at 1181 (citation omitted). Plaintiff alleges that Defendant participated in a BitTorrent "swarm" with other peers to cause the infringement of its copyrighted Motion Picture by other swarm members. However, Plaintiff has not established direct infringement by any other party, and so the claim for indirect contributory infringement by Defendant necessarily fails. See id. Accordingly, the Court recommends that the District Court find the Plaintiff has failed to demonstrate the Defendant's liability as to contributory infringement.

II. Damages

Here, Plaintiff seeks statutory damages and costs for the two (2) alleged copyright infringements in February and March of 2013, as described above. Under federal copyright law, "the copyright owner may... recover... an award of statutory damages for all infringements involved in the action, with respect to any one work... a sum of not less than $750 or more than $30, 000 as the court considers just." 17 U.S.C. § 504(c)(1). Damages may be increased to up to $150, 000 if the infringement is willful. 17 U.S.C. § 504(c)(2). Plaintiff seeks $31, 000.00 from Defendant Radeljan on the basis of its allegations of willful infringement. Plaintiff also seeks attorney's fees in the amount of $3, 150.00 and costs in the amount of $489.70. Attorney's fees and costs are also authorized under the statute. Id. § 505. Finally, Plaintiff seeks injunctive relief to prevent any further violations by Defendant, pursuant to 28 U.S.C. § 502, by requesting that the Court

(A) permanently enjoin the Defendant and all other persons who are in active concert or participation with the Defendant from continuing to infringe the Plaintiff's copyrighted Work;
(B) order that the Defendant delete and permanently remove the torrent file relating to the Plaintiff's copyrighted Work from each of the computers under each [ sic ] the Defendant's possession, custody, or control[; and]
(C) order that the Defendant delete and permanently remove the copy of the Work the Defendant has on the computers under the Defendant's possession, custody, or control.

(Doc. # 43 at 10.) Notably, 17 U.S.C. § 503(b) provides that "the court may order the destruction... of all copies... found to have been made or used in violation of the copyright owner's exclusive rights."

This case is one of dozens alleging copyright infringement via the BitTorrent protocol that are filed in this District and handled by me as Magistrate Judge. Many of the defendants named in these lawsuits settle very early in the case. Some of those who do not settle have denied any participation in copyright infringement. Other defendants allege that their wireless connection may have been used by someone else to participate in the alleged swarm against the plaintiff's protected works. However, in this case, there is no evidence that anyone other than Defendant Radeljan committed the infringements. Despite being informed both before and during this litigation of the allegations against him, Defendant has failed to answer or otherwise defend himself in this case. For these reasons, I believe that Plaintiff has established entitlement to willful infringement damages. Furthermore, courts across the country have awarded anywhere from $2, 250.00 to $30, 000.00 per infringement in cases of this type. Thus, I find that a statutory damage award of $2, 250.00 per infringement is appropriate and just in this case to accomplish the intent set forth by Congress in passing the Copyright Act. In addition, Plaintiff's request for $489.70 in costs is reasonable. However, the Court finds that Plaintiff's request for $3, 150 in attorney's fees, based on 10.5 hours spent by Plaintiff's counsel, is unreasonable. In cases like this one, the Court has determined that 8.5 hours, at an hourly rate of $300.00, is appropriate for calculating attorney's fees. Therefore, the Court finds that Plaintiff is entitled to a total of $2, 550.00 in attorney's fees.

Finally, Plaintiff seeks injunctive relief prohibiting Defendant from infringing Plaintiff's copyrighted Motion Picture and requiring Defendant to delete and permanently remove the torrent file related to the Motion Picture and the copy of the Motion Picture from the computers in Defendant's possession, custody, or control. The Court finds that Plaintiff's request for an order directing Defendant to "delete and permanently remove the torrent file relating to the Plaintiff's copyrighted Work" and "the copy of the Work that the Defendant has" from the computers under the Defendant's possession, custody, or control (doc. # 43 at 12) is reasonable and should be granted.

However, Plaintiff has failed to proffer evidence sufficient to justify its request to enjoin Defendant from continuing to infringe Plaintiff's copyrighted Software; Plaintiff has produced no evidence that, as of this date, Defendant actually possesses the copyrighted Motion Picture on his computer or computers and continues to upload the Motion Picture to others. Further, there is no evidence today that Defendant has downloaded (copied) any of the Plaintiff's copyrighted works since March 3, 2013.

The Court notes that, if the District Court were to grant Plaintiff's requested injunction for the deletion of Plaintiff's copyrighted Motion Picture on Defendant's computer or computers, Defendant would be unable to "continue" uploading such works via the BitTorrent system. Therefore, the Court recommends that the District Court deny Plaintiff's request for an order enjoining Defendant from continuing to infringe on the Plaintiff's copyrighted works.

CONCLUSION

Based on the foregoing, and the entire record provided to the Court, I do respectfully RECOMMEND that the District Court GRANT IN PART AND DENY IN PART the Plaintiff's Amended Motion for Default Judgment against Defendant Cedric Radeljan a/k/a Sedric Radeljan (filed January 17, 2014; doc. #54) as follows:

1. Enter judgment in Plaintiff's favor against Defendant Radeljan for direct copyright infringement of the Plaintiff's copyrighted Motion Picture, as set forth in Count I of the Second Amended Complaint;
2. Order Defendant Radeljan to pay to Plaintiff the sum of $4, 500.00 in statutory damages, as authorized by 17 U.S.C. § 504(c)(1), and $3, 039.70 for attorney's fees and costs as authorized by 17 U.S.C. § 505;
3. Order Defendant Radeljan to remove and permanently delete all torrent files relating to, and copies of, Plaintiff's copyrighted Motion Picture made or used by him in violation of Plaintiff's exclusive rights, as well as all masters in their possession, custody or control from which such copies may be reproduced; and
4. Deny Plaintiff's request to permanently enjoin Defendant from continuing to infringe Plaintiff's copyrighted Motion Picture.

Buy This Entire Record For $7.95

Official citation and/or docket number and footnotes (if any) for this case available with purchase.

Learn more about what you receive with purchase of this case.