Академический Документы
Профессиональный Документы
Культура Документы
T-662-16
SIMPLIFIED ACTION
FEDERAL COURT
B E T W E E N:
VOLTAGE PICTURES, LLC, COBBLER NEVADA, LLC, PTG NEVADA, LLC, CLEAR
SKIES NEVADA, LLC, GLACIER ENTERTAINMENT S.A.R.L. OF LUXEMBOURG, GLACIER
FILMS 1, LLC, AND FATHERS & DAUGHTERS NEVADA, LLC
Applicants
- and -
Respondents
Kenneth R. Clark
Patrick Copeland
Tel: 416.863.1500
Fax: 416.863.1515
Sean N. Zeitz
Tel.: 416.789.0652
Fax: 416.789.9015
David Fewer
Tamir Israel
SIMPLIFIED ACTION
FEDERAL COURT
BETWEEN:
VOLTAGE PICTURES, LLC, COBBLER NEVADA, LLC, PTG NEVADA, LLC, CLEAR
SKIES NEVADA, LLC, GLACIER ENTERTAINMENT S.A.R.L. OF LUXEMBOURG, GLACIER
FILMS 1, LLC, AND FATHERS & DAUGHTERS NEVADA, LLC
Applicants
- and -
Respondents
INDEX
37162402.1
TAB 1
Court File No. T-662-16
SIMPLIFIED ACTION
FEDERAL COURT
BETWEEN:
VOLTAGE PICTURES, LLC, COBBLER NEVADA, LLC, PTG NEVADA, LLC, CLEAR
SKIES NEVADA, LLC, GLACIER ENTERTAINMENT S.A.R.L. OF LUXEMBOURG, GLACIER
FILMS 1, LLC, AND FATHERS & DAUGHTERS NEVADA, LLC
Applicants
- and -
TAKE NOTICE THAT the Applicants (collectively, the “Voltage Parties”) will make a motion to
the Court on September 23 and 24, 2019 pursuant to the direction of the Case Management
Judge, the Honourable Mr. Justice Boswell, dated January 22, 2019.
DEFINITIONS
1. Making a Work available for download by means of the BitTorrent network by offering
the file for uploading, or actually uploading a work;
2. Advertising by way of the BitTorrent Prototcol that a Work was available for download;
3. Failing to take reasonable steps to ensure that Unlawful Acts 1 and 2 did not take place
in respect of an internet account controlled by a subscriber and by doing so authorizing
such Unlawful Acts.
“Direct Infringers” includes persons who have performed one or more of Unlawful Acts 1 or 2,
or who have unlawfully copied a Work.
“Internet Account Subscribers” are persons who are contractually obligated to an internet
service provider to pay for internet services.
“Authorizing Infringers” includes persons such as Internet Account Subscribers who have
performed Unlawful Acts 3 or who have authorized an unlawful copy of a Work.
2
2
"Works” are the following cinematographic works, owned by the Owner listed below:
# Owner Title
1. COBBLER NEVADA, LLC THE COBBLER
2. PTG NEVADA, LLC PAY THE GHOST
3. CLEAR SKIES NEVADA, LLC GOOD KILL
4. FATHERS & DAUGHTERS NEVADA, LLC FATHERS AND DAUGHTERS
5. GLACIER FILMS 1, LLC and GLACIER AMERICAN HEIST
ENTERTAINMENT S.A.R.L. of LUXEMBOURG
b) describing the “Class” as all natural persons residing in Canada who are Direct Infringers
or who are Authorizing Infringers;
c) appointing Robert Salna, James Rose and Loridana Cerrelli as the Representative
Respondents for the Class;
d) stating the nature of the claims being asserted against the Class are for copyright
Infringement of the Works pursuant to section 27 of the Copyright Act, R.S.C., 1985, c. C-
42 (the “Copyright Act”);
e) stating the nature of the relief claimed against the Class is as follows:
(i) a declaration that each member of the Class has infringed the Applicants’ copyright
in the Works contrary to ss. 27(1), 27(2) and 27(2.3) of the Copyright Act;
(ii) a declaration that the applicable Applicant owns the copyright in each Work;
(iv) an interim, interlocutory and permanent injunction restraining each member of the
Class, any and all persons acting on behalf of or in conjunction with any of them,
and any and all persons with notice of such injunction from infringing the copyright
in the Works, including by way of the Unlawful Acts;
(v) statutory damages pursuant to s. 38.1(a) or 38.1(b) of the Copyright Act, as the
case may be;
(viii) such further relief as is requested by the Applicants and that this Honourable
Court finds just;
3
f) setting out the common questions of law or fact for the Class; - - - - -
3
g) specifying the time and manner for Class members to opt out of the class proceeding;
h) approving the form and content of notice to the Class (“Notice”); and
3) the claims of the Class members raise common issues of fact or law as follows:
Copyright Infringement
(i) Are each of the Works original cinematographic works in which copyright
subsists?
(ii) Does the relevant Applicant own the copyright in the appropriate Works?
a. acts that by the Copyright Act only the owner of the copyright has the
right to do;
b. acts that are listed in paragraphs 27(2)(b) to (d) of the Copyright Act
and that the Respondents knew or should have known infringes
copyright; or
(v) Did any of the Applicants consent to or authorize any of the Unlawful Acts?
i. possess sufficient control over the use of their internet accounts and
associated computers and internet devices such that they authorized,
sanctioned, approved or countenanced the infringements as
particularized in Unlawful Acts 1 or 2;
Defences
(vii) Does the Class have any available defences to copyright infringement,
including any defence based on fair dealing?
Relief
4) these questions predominate over any questions affecting only individual members;
5) a class action is the preferable procedure for the fair and efficient resolution of the common
questions of law or fact because, in addition the above:
a) would fairly and adequately represent the interests of the Class; and
b) do not have, on the common questions of law or fact, an interest that conflicts with the
interests of other Class members;
7) Class members may opt out of the class action at any time prior to the commencement of
hearing;
8) at least two weeks prior to the hearing of the certification motion, the Voltage Parties will have
served and filed a plan for the proceeding that sets out a workable method of advancing the
proceeding on behalf of the class and notifying members as to how the proceeding is
progressing. This litigation plan shall provide information in respect of:
b) particulars regarding obtaining counsel for the new proposed class members James Rose
and Loridana Cerrelli;
c) Notice being provided to the proposed Class in accordance with Rule 334.32 of the Rules;
d) the content of the Notice of Certification will comply with the requirements of Rule
334.32(5) of the Federal Courts Rules in a form agreed to by the Parties or as otherwise
approved by the Court;
5
5
e) the Applicants’ counsel and counsel for the representative Respondents shall post a copy
of the Notice of Certification on their respective websites and, if certified, the Applicants’
counsel will also send a copy of the Notice of Certification to each proposed class member
by way of the Notice & Notice system set out in the Copyright Act or as otherwise directed
by the Court.
f) an Opt-Out Form shall be prepared for those Class members who do not wish to
participate in the class proceeding after the hearing of the common issues, and permitting
the Class members to know what the consequences are of opting out as opposed to being
subject to any order affecting the Class;
h) technical and expert evidence regarding the reliability of the technical evidence regarding
the software used to identify class members shall be deferred to the hearing on the merits
of the common issues, if any, as it is not necessary for determining the issues of
certification;
l) the certification hearing is proposed to be conducted in the ordinary course and consistent
with the procedures applicable to Applications in the Federal Courts Rules and any
agreement as between the parties or as otherwise directed by the Court;
m) following the certification hearing and receipt of the Court's judgement on the common
issues, the Class members shall be identified and notified of the judgement in the same
manner as set out above; and
n) to the extent any issues are found to be suitable for a hearing on common issues, a case
management conference is to be held to set a schedule for the hearing on common issues.
6
6
THE FOLLOWING DOCUMENTARY EVIDENCE will be used at the hearing of the motion:
a) the evidence filed in the Norwich motion identifying Mr. Salna as a proposed class
representative;
d) such other materials as the Plaintiffs may tender and the Honourable Court may allow.
Kenneth R. Clark
Patrick Copeland
Tel: 416.863.1500
Fax: 416.863.1515
Sean N. Zeitz
Tel: 416.789.0652
Fax: 416.789.9015
David Fewer
Tamir Israel
37172696.1
TAB 2
Court File No. T-662-16'
SIMPLIFIED ACTION
FEDERAL COURT
BETWEEN:
VOLTAGE PICTURES, LLC, COBBLER NEVADA, LLC, PTG NEVADA, LLC, CLEAR
SKIES NEVADA, LLC, GLACIER ENTERTAINMENT S.A.R.L. OF LUXEMBOURG, GLACIER
FILMS 1, LLC, AND FATHERS & DAUGHTERS NEVADA, LLC
Applicants
- and -
Respondents
1. I am the former Chief Executive Officer and a Senior Developer at GuardaLey, Ltd
(“GuardaLey”), a company which I founded in 2008. I created GuardaLey to provide
clients with the ability to monitor the downloading and distribution of their copyrighted
works. I designed, implemented, programmed, maintained and monitor GuardaLey’s data
collection system used to track and identify users’ Internet Protocol (“IP”) addresses used
by people to distribute works via the BitTorrent Protocol. GuardaLey licences this
detection system to Maverickeye UG (“Maverickeye") which Maverickeye uses to track
and identify the IP addresses using the BitTorrent protocol for various clients.
2. I have read the Affidavit of Daniel Macek dated May 19, 2016 (the “Macek Affidavit”),
which is attached hereto as Exhibit “A”. To my knowledge, Mr. Macek no longer works
with Maverickeye. I am in agreement with the contents of the Macek Affidavit and repeat
and rely on it herein as if it were my own evidence. For clarity, I am in agreement with the
following statements and restate them below, modified to incorporate my involvement and
with a few clarifications:
2
(a) BitTorrent is a popular P2P “file sharing” protocol which enables the decentralized
distribution of computer files over the internet between individual internet users,
rather than through a centralized source. The BitTorrent network is an international
network that take place over the internet. It is not typically limited to any one
jurisdiction or nationality.
(b) First, some terminology: a user "uploads” a computer file to someone who
requests the file form such user. A user "downloads” a computer file from someone
who “uploads" that file to them. In other words, and as more fully set out below,
an “uploader” offers a file (such as one of the Works) for download and when
requested, sends that file to the downloader. This is, in basic terms, the manner
in which the Works have been distributed over P2P networks.
(c) A users who wishes to upload or download a computer file, which could include a
motion picture, music, computer software or other forms of computer files, can run
a program that implements the BitTorrent protocol (a ‘client’). There are many
forms of programs that run the BitTorrent protocol, each of which functions in a
similar fashion. The client software itself, or third party search engines, allow a
user to search for a particular file (e.g. movie, music file, etc.). Once the file is
chosen, the client then automatically searches for other clients using the same
BitTorrent protocol that broadcasts that they also have in their library the same file.
(d) A user who wishes to “share” a computer file (e.g. a motion picture) with other
users of the BitTorrent software places that computer file in a computer location
(folder) that is known to the specific software that is running a BitTorrent protocol.
To be more precise, the user (or the user’s software) has to open that file and
create a .torrent file for it that then can be shared. The BitTorrent software then
offers that file for download to anyone who is using compatible BitTorrent software
and who requests that particular file. Participating in sharing also stores the file in
a “known” folder and shares it with other participants.
(e) A users then starts downloading a file by requesting it from the uploader who has
offered that file for download. A user who is uploading the file being requested on
their computer is said to be "seeding” the file. Other users of the BitTorrent
software (called “peers”) are able to connect directly to the user seeding the fil& $
■■ r,.
and can begin downloading it. In an automated and collaborative process, each.)
“peer” who has a copy of the same specific file in question can then share that file
(or, more typically, portions of it) with others.
Typically, BitTorrent software breaks a file into numerous small data packets, each
of which is identifiable by a unique “hash” number created using a mathematical
algorithm. Once the file is broken down into these smaller packets, peers can
download different segments of the same file from different users.
As peers download the various packets which, when taken together constitute the
entire file, those same individuals then also become seeders for other users who
wish to download the same material.
Eventually, the entire computer file (such as one of the Works) is obtained by
downloading from one or many persons all of the required packets. The BitTorrent
software then assembles the completed file on the downloader’s computer. At that
point, the user may then use the file (e.g. watch the movie). Any particular
uploader may have only provided a small portion of the entire file that was
downloaded, or it may have provided a large portion of the entire file, or the entire
file. The downloader (peer) eventually acts as well as a “seeder” and can
thereafter distribute the computer file to other users connected to the BitTorrent
network unless steps are taken to avoid this occurring.
A users does not typically copy an entire file from one users, but from multiple
“peers” that have previously downloaded the file and have it available through their
BitTorrent software.
Typically, every users who is copying or who has copied a file is simultaneously
offering to distribute portions of it to every other user connected to the BitTorrent
network. The goal of the system is to distribute files over many computers and
internet connections, which in turn tends to minimize data transfers from any one
individual and keep individual expenses and bandwidth usage (i.e. internet usage)
low, and most importantly today, an increase of availability. You can shut down a
host but not thousands of sources.
4
IP Addresses
(k) An internet protocol (“IP1’) address is a unique, numerical label which is assigned
to every device, such as a computer, router or switch, connected to the internet.
An IP address allows the logical location of these devices to be determined by
other devices using the internet, and for data to be sent to such devices, and
differentiated from other devices. Once of the core functions of an IP address is
to allow data sent over the internet to be received by the intended recipient device.
(l) An internet service provider ("ISP”) allocates and IP address to devices connected
to its network. ISPs are assigned blocks or ranges of IP addresses. The range
assigned to any ISP can be found in publically available databases on the internet.
It is therefore possible to determine which ISP has been allocated a particular IP
address at a particular date and time.
(m) ISPs track the IP addresses assigned to their customers at any given time and
typically retain “user logs” of that information. Only the ISP can correlate an IP
address to identity of its customer. The ISP’s customer may be (and often is) the
individual who is utilizing BitTorrent software to distribute files, particularly if the
assigned IP address is only used by a single device.
(n) in many cases, the ISP’s customer may be getting their internet delivered through
a “router” supplied by the ISP, a device that allows many devices to use the
customer's internet connection (and the customer’s specifically allocated IP
address) with other devices connected to it. In a residential setting, for example,
the ISP could allocate to a customer an IP address to be used by a WiFi router,
which will then have a number of wireless or wired devices connecting to the router
(e.g. phone, table, computer). Each of those devices could be used
simultaneously by different individuals.
(o) As an example, a home could have one IP address assigned to it. and have maltiy
family members simultaneously using that IP address through a router. In such a;'
case, and in many other cases, I would expect that a responsible customer would
have the knowledge of who was using the particular internet account at a
specifically identified date and time, or would have the ability to know that.
(p) IP addresses are sometimes allocated to a customer for a long period of time, In
other cases, more frequently, the IP addresses change and are dynamically
allocated bv the ISP to the cusiome..
(q) The software that is used to track infringers has been purpose-built to track P2P
"sharing" of computer files as part of my day-to-day job. Given that the BitTorrent
protocol is an open and shared network, it is not difficult for the software to
determine who at any particular time is offering for upload one of the works I am
tracking by reference to their IP address. No other information is available about
the uploader of a work without the assistance of the relevant ISP. In typical
operation, the software will run in the background for several days and collect data
on the offering for upload of the works. It does this in a manner that is designed
to avoid false positives and to avoid certain pitfalls of the fact that on the internet
IP Addresses will change from time to time.
(r) The Forensic Software searches P2P networks for computer files corresponding
to the Works and it identifies the IP address of each person who was offering any
of these files for uploading. This information (i.e. the particular file being
transferred and the IP address(es) of the uploader(s)) is available to anyone that
is connected to the P2P network and is freely shared. If the information wasn’t
shared and therefore known, no-one would be able to use the software to transfer
files.
(s) As part of the investigation, the Forensic Software downloaded copies of the Works
that were made available for uploading on the P2P networks. These reference
works were then used to search for others Works being offered for upload. The
following identifying information was recorded in respect of the users offering to
upload the Works:
(i) the IP address assigned to the uploader by his or her ISP at the time of the
scan (after a software-generated pause to ensure the IP address was
reliable); f./
the date and time at which the Work was made available for upload by the
uploader in the form of a computer file; and
(iii) the file’s metadata, which includes the name of the computer file containing
the Work and the size of the file, as well as the BitTorrent "hash" identifying
the particular version of the Work.
(iv) Between November 14, 2015 and March 24, 2016, Mr. Macek used
forensic software called MaverikMonitor (the “Forensic Software") to scan
P2P networks for the presence of the Works. This scan collected (and
continues to collect) data on the offering for upload of the Works by users
of the BitTorrent software.
In reviewing the File Data, we noted that MaverickMonitor had located the IP
address 174.112.37.227 which, at various times, was making available for upload
all five of the Works. We traced this IP address through an ARIN network search
to Rogers Cable Communications Inc., a Canadian ISP. In addition to the user at
this IP address offering all of the Works for upload, this IP address was chosen as
it been sampled on many occasions, which ensures that the data collected on this
user was reliable.
Mr. Macek had been provided with a control copy of each of the Works as a guide
for investigating infringements. The Forensic Software compared the portions of
the computer files corresponding to the Works downloaded from Mr. Salna with
the equivalent portions of the control copies, and as a result he confirmed that the
files offered for uoload by Mr. Salna, as listed in the File Data, are reproductions
of the Works.
The MaverickMonitor software would be used to identify potential infringers in
application in the same manner as set out above.
35755689.5 ..Dc.m.AMlM.....................................
M Certifying Officer, i certify only the signature which appears
on document and assume no responsibility for the content
of this document.
In testimony whereof I have hereto set my hand and
official seal today ./Mo/ifts/rte?........... this ....pLt-'h’J................
day of,.,.J.wUV.fc.........
T _ GEORGE VOURKAS
f ^ -^ 11?irVr Certifying Officer
,yyj 4/t£(J
TAB A
EXHIBIT A TO THE AFFIDAVIT OF BENJAMIN PERINO
O fF tC
VOLTAGE PICTURES, LLC, COBBLER NEVADA, LLC, PTG NEVADA, LLC, CLEAR SKIES
NEVADA, LLC, GLACIER ENTERTAINMENT S.A.R.L. OF LUXEMBOURG, GLACIER FILMS
1, LLC, AND FATHERS & DAUGHTERS NEVADA, LLC
- " Applicants
and
Respondent
MaverickEye developed and runs a system for monitoring filesharing' systems that I use as part
particularly with respect to movies. The process by which P2P networks are used to distribute
copyrighted works is outlined below, as well as the manner In which I have identified the IP
2. I make this affidavit in support of a request to identify one of the anonymous persons
who our system has located offering to upload one of our client’s movies. I make this affidavit
on the basis of my own work, and if I rely on the facts of others,;! state them herein and I believe
3. The Applicant, Voltage Pictures LLC (“Voltage”), is a movie production company based
in Los Angeles, California and it is one of our clients. In 2015 onwards, Voltage requested that I
determine whether certain of its films were being offered for upload by Canadian internet users
4. The relevant movies for this Application that I was instructed to locate on P2P networks
are set out below (the “Works”). The party who owns the copyright in each film is also listed in
# Title Owner
5. In order to assess whether the Works were being offered for upload by the users of .the
• . • ■ ' ' • c.
P2P network, I watched each of the 5 Works. Schedule B contains screenshots of the:,send
credits for each of the Works..; These screenshots demonstrate that the Applicants are listed in
the credits of each of the Works as owning the copyright. I also note that the Voltage logo
VJ
■ * v/
6, Through custom software outlined more fully below, i was able .to identify numerous
■/
instances of the Works being offered for upload and distributed using P2P networks using the
"BitTorrent” protocol.
7. BitTorrent is a popular P2P 'Tile sharing" protocol which; enables the^ decentralized
distribution of computer files over the internet between individual internet users,5 rather than
i
through a centralized source. The BitTorrent network is. an international network that takes
place over the internet. It is not typically limited to any one jurisdiction or nationality.
8. First, some terminology: a user “uploads” a computer file to someone who requests the
file from such user. A user “downloads” a computer file from someone who “uploads” that file to
them. In other words,.andias more fully set out below, an “uploader” offers a file (such as one of
the Works) for download and when requested, sends that file to the downloader. This is, in
basic terms, the manner in which the Works have been distributed over P2P networks.
9. A user who wishes to upload or download a computer file, which could includes motion
picture, music, computer software or other forms of computer files, can run a program that
implements the BitTorrent protocol (a 'client'). There are many forms of programs that run the
BitTorrent protocol, each of which functions in a similar fashion. The client software itself, or
third party search engines, allow a user to search for a particular file (e.g. movie, music file,
etc.). Once the file is chosen, the client then automatically searches for other clients running the
same BitTorrent protocol that broadcast that they also have in their library the same file.
10. A user who wishes to “share11 a computer file (e.g: a motion picture) with other users of
the BitTorrent software places that computer file in a computer location (folder) that is known to
the specifio software that is running the BitTorrent protocol. The BitTorrent software then offers
11, A user then starts downloading a file by requesting it from the uploader who has offered
that file for download. A user who is uploading the file being requested on their computer is said
tq be “seeding” the file. Other users of the BitTorrent software (called “peers") are able to
connect directly to the user seeding the file and can begin-downloading it. In an automated and I
collaborative process, each "peer” who has a copy of the same specific file in question can then ]
share that file (or, more typically, portions of it) with others.
12. Typically, BitTorrent software breaks a file into numerous small data packets, each of
the file is broken down into these smaller packets, peers can download different segments of
13. As peers download the various packets which, when taken together constitute the entire
file, those same individuals then also become seeders for other users who wish to download the
14. Eventually, the entire computer file (such as one of the Works) is obtained by
downloading from one or many persons all of the required packets. The BitTorrent software
then assembles the completed file on the downloader’s computer. At that point, the user may
then use.the file (e.g., watch the movie). Any particular uploader may have only provided a
small portion of the entire file that was downloaded, or it may have provided a large portion of
the entire file, or the entire file. The downloader (peer) eventually acts as well as a “seeder" and
can thereafter distribute the computer file to other users connected to the BitTorrent network
have previously downloaded the file .and have it available through their BitTorrent software.
16. Typically, every user who is copying or who has copied a file is simultaneously offering
to distribute portions of it to every other user connected to the BitTorrent network. The goal of
the system is to distribute files over many computers and internet connections, which in turn
tends to mthimize data transfers from any one individual and keep individual expenses and
IP Addresses
17, An internet protocol (“IP") address is a unique, numerical label which is assigned to
every device, such as a computer, router or switch, connected to the internet. An IP address
allows the location of these devices to be determined by other devices using the internet, and
for data to be sent to such devices, and differentiated from other devices. One of the core
functions of an IP address is to allow data sent over the internet to be received by the intended
network. ISP’s are assigned blocks or ranges of IP addresses. The range assigned t<*$jj
determine which ISP has been allocated a particular IP address at a particular date a'nftvSflUMtf*- v^
. ■ariicuSa*'
19. ISP’s track the IP addresses assigned to their customers at any given time and typieaffy
• ■ IT)
retain "user logs” of that information. Only the ISP can correlate an IP address to the identity of
its customer. The ISP’s customer may be (and often is) the individual who is utilizing BitTorrent
software to distribute files, particularly if the assigned IP address is only used by a single device,
20. In many cases, the ISP’s customer may be getting their internet delivered through a
"router” supplied by the ISP, a device that allows many devices to use the customer's internet
connection (and the customer’s specificaily allocated IP address) with other devices connected
to it. In a residential setting, for example, the ISP could allocate to a customer an IP address to
be used by a WiFi router, which will then have a number of wireless or wired devices connecting
to the router (e.g. phone, tablet, computer). Each of those devices could be used
21. As an example,-a home could have one IP address assigned to it, and have many family
members simultaneously using that IP address through a router. In such a case, and-in many
other cases, I would expect that a responsible customer would have the knowledge of who was
using the particular internet account at the specifically identified date and time, or would have
22. IP addresses are sometimes allocated to a customer for a long period of time. In other
cases, more frequently, the IP addresses change and are dynamically allocated by the ISP to
the customer.
23. The software that is used to track infringers has been purpose-built to track P2P
“sharing’’ of computer files as part of my day-to-day job. Given that the BitTorrent protocol is an
open and shared network, it is not difficult for the software to determine who at any particular
time is offering for upload one of the works I am tracking by reference to their IP address. No
other information is available about the uploader of a work without the assistance of the relevant
ISP. In typical operation, the software vi/ill run in‘the background for several days and collect
data on the offering for upload of the works. It does this in a manner that is designed to avoid
UJmSdi
false positives and to avoid certain pitfalls of the fact that on the internet IP Addresses will
24. Between November 14, 2015 and March 24, 2016, I used forensic software called
MaverikMonitor (the “Forensic Software”) to scan P2P networks for the presence of the Works.
This scan collected (and continues to collect) data on the offering for upload of the Works by
users of the BitTorrent software. I was tasked with monitoring and analyzing the results of this
investigation.
25. The Forensic Software searches P2P networks for computer files corresponding to the
Works and it identifies the IP address of each person who was offering any of these files for
uploading. This information (i.e. the particular file, being transferred and the IP address(es) of
the uploader(s)) is available to anyone that is connected to the P2P network and is freely
shared. If the information wasn’t shared, no-one would be able to use the software to transfer
files.
26. As part of the investigation, the Forensic Software downloaded copies of the Works that
were made available for uploading on the P2P networks. These reference works were then
used to search for others Works being offered for upload. The following identifying information
(a) the IP address assigned to;the uploader by his or her ISP at the time of the scan
(b) the date and time at which the Work was made available for upload by the
(c) the file’s metadata, which includes the name of the cornputer file containing the >
Work and the size of the file, as well as the BitTorrent "hash’’ identifying the
27. In reviewing the File. Data, we, located the IP address 174.112.37.227 which, at various
times, was making available for upload all, five of the Works. We traced this IP address through
an ARIN network search to Rogers Cable Communications Inc., a Canadian ISP. In addition to
the. user at this IP address offering all of the Works for upload, this IP address was chosen as it
been sampled on many occasions, which ensures that the data collected on this user was
reliable. The File Data collected on this IP address, including the times at which the data was
28. I am informed by counsel that this IP address is associated with the individual named in
29. I have been provided with a control copy of each of the Works as a guide for
j!
investigating infringements. Through the Forensic Software I have compared the portions of
f
i the computer files corresponding to the Works downloaded from John Doe #1 with the
equivalent portions of the control copies, and as a result I confirm that the files offered for
upload by John Doe #1 as listed in the File Data, are reproductions of the Works.
30. Once provided with the IP address and the File Data, it is my understanding that ISPs
(including Rogers) can use their subscriber logs to identify the individual whose account was
assigned the particular IP address as at the date and time set out in the File Data. It is my
understanding that the information retained by the ISP would tend to be the name, address,
24
9
cd<
V.-'
phone number and (potentially) email addresses of their customers. From this information, one
may determine who is John Doe #1. Only an ISP can correlate the IP address to the real
identity of its customer. I am aware of no other method by which John Doe #1 could be reliably
identified.
The characters, entities and incidents portrayed herein and the names used herein
are fictitious, and any similarity to the name, character or history of any person or
entity is entirely coincidents: and unintentional
Ownership of this motion picture is protected by copyright and other applicable laws
of the United States of America and other countries. Any unauthorized duplication,
distribution, or exhibition of this motion picture (including soundtrack) is
pronihited and conic result in criminal prosecution as well as civil liability.
90 KILL
u.m SKtts !H’vao«, LfX IS THE AUTHDR Of IHJa MBUON HCriiRi' FOB fiJt lalHPOS! Hr
COfVRtCHl AMO OIHES I.AJ1.
fat; ChBMACTEIIS, ENTITIES AND INCIDENTS NOPrft^TEti HEfitIN AND thE KANCD U3tf. HEREIN
TOC riLtmoUf., ft NO ANY SIHIURnr TO THE nanc, CHABACTCB ON history of any pesson or
^ ENTITY I« CHT1HELY COINCIDENTAL AND liNINTEfUIONAL.
OWNERSHIP Or THIS MOTION PJCTOBC IS PROTECTED BY COPY/UGHT «NO OTHCH A(><>LtCA3L'Z LBUh
Of THE UNITED STATES t>? ANEiUCA AND OTHER COUNTRIES. ANY t'NAUTTiPHlIl.O OUP^ICATTON,
OISTRIBJnCN. DR rkHIBITION Or IHtf. MOTION PICTURE (INCUJDIN8 SOUNOTPAEK) IS PROHrflIfF.0
AND COULD KESOLT JN CHJMINAu PfiODCCUTIiTN AS uELl A£ Cl-JU. URLIIUTV.
VOLTAGE
Pir;i uhi-
: /
:-"W'-y^y^
IS^pel
*PIS11! lil.'.V Y0I1K MAH
fiiihis >, Osi-jniii livfjdi, ac ti (Ft jijiMt ‘J !!m nA-y. jx&.'s Hr m »fi
I,‘it iiUi'fcllW, t',' *.;s r/l I=>iiiilf-‘l wrtrijid AI.I.II urif K-r ht"t( liltfl hid® 3I( I.'.tldtt li'.i)
i’.y'di t! t.‘« c.iii-;.c‘.imi(m«0iiI^/c1 tuij Ftiiwtt r'ltrittd'.iYfj w'wijvi’j1 ani
I
technicolor SAG-AFTRA
/ --nr ONE UNION K0NL<
fills motioi! piituro 'S jnotwted urMter the lav/s ol Iho Omteii Srate-; nnc- otl»i conntiios. Any un wtlHntl
ilofilit'alioii dislriliiilioii w ethihilii/ii is slM'ty pratiilriled and ma> (i-sidl m S"lli civil and erimiiMl /kwH.'i's.
The pstEoiis, chaiaole;:. and wants dupicled in this TIir ate tictitious. Any similarity to actual poisons, living or
dead, is pUMly coi'icidental.
fHendr|ie^'__ 1 _ ^ ^ ^. *. 5 £6 [Sp UTCTime - relatcdticJtmame
174.11237.227 50001 bt pTorrent3.43 American
. Heist (2014) [I080p] F90A026EFC4SiB2C7l499lb7D4D60E886S2490B3" 1547447175 Rogers Cable 2015-12-29 07:25:20 American Heist
174.112.37.227 63685 bt plorrent 3.4.5 American Heist (2014) [1080p] F90A026EFC451B2C714991D7D4D60EB8682490B3 1547447175 Rogers Cable 2016-01-06 06:29:36 American Heist
174.11237.227 61808 bt pTorrent 3.4.5 American Heist (2014) [1080p] F90A026EFC451B2C714991D7D4D60E88682490B3 1547447175 Rogers Cable 2016-01-07 01:47:08 American Heist
174.11237.227 55110 bt pTorrent 3.4.5 American Heist (2014) [1080p] F30AQ26EFC451B2C714991D7D4D60E886S2490B3 ' 1S47447175 Rogers Cable 2016-01-12 07:31:31- American Heist
174.11237.227 57136 bt pTorrent 3.43 American Heist (2014) [1080p] F90A026EFC4SlB2C71499iD7D4D60E88682490B3 1547447175 Rogers Cable 2016-01-15 06:29:09 American Heist
174.11237.227 65510 bt pTorrent 3.4.5 American.Heist (2014) [1080p] F90A026EFC451B2C714991D7D4D60E8868249OB3 1547447175 Rogers Cable 2016-01-15 07:34:40 American Heist
174.11237.227 61804 bt pTorrent 3.4.5 American Heist (2014) [lOSOp] F90A026EFC451B2C714991D7D4D60E88682490B3 1547447175 Rogers Cabie 2016-01-26 01:06:07 American Heist
174.11237.227 60724 bt. pTorrent 3.4.5 Fathers.and.Daughters.2015.8RRip.XViD-ETRG C8C2316B7D67E5738D46B7F92E6E53056E5431B9 .740122657 Rogers Cable 2016-03-10 02:23:04 Fathers and Daughters
174.11237.227 53469 bt pTorrent 3.43 Good Kill (2014) - 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2015-12-05 04:34:47 Good Kill
174.11237.227 56811 bt pTorrent 3.43 Good Kill (2014). - . 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2015-12-05 04:45:52 Good Kill ,
174.11237.227 58843 bt pTorrent 3.4.5 Good Kill (2014) 7E3E21SEASFE465D9E33AA12E8FD4CE3301BBDB4 . 847833031 Rogers Cable 2015-12-07 07:23:51 Good Kill ■
174.11237.227 51679 bt pTorrent 3.45 Good Kiii (2014) 7E3E215EA8FE465D9B3AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2015-12-20 0033:23 Good Kill
174.11237.227 50891 bt pTorrent 3.43 Good Kill (2014) 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable.. 2015-12-20 03:29:10 Good Kill
174.11237:227 61765 bt pTorrent 3.43 Good Kill (2014) 7E3E21SEA8FE465D9E33AA12ESFD4CE3301BBDB4 847833031 Rogers Cable 2015-12-20 04:29:05 Good Kill
174.11237.227 63235 bt pTorrent 3.4.5 Good Kiil (2014) 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-01-12 07:05:35 Good KIII .
174.11237.227 51583 bt pTorrent 3.4.5 Good Kill (2014) 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-01-15 06:10:11 Good Kill
174.11237.227 60821 bt pTorrent 3.43 Good Kill (2014) 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-01-15 06:40:13 Good Kill
174.11237.227 51377 bt pTorrent 3.4.5 Good Kill (2014) 7E3E21SEABFE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-01-15 07:41:35 Good Kill
174.11237.227 62761 bt pTorrent 3.43 Good Kiii (2014) . 7E3E215EASFE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-01-24 04:45:34 Good Kill
174,11237.227 62815 bt pTorrent 3.43 Good Kill (2014) 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-02-02 08:33:19 Good Kill
174.U237.227 56079 bt pTorrent 3.43 Good Kill (2014) 7E3E215EA8FE465D9E33AA12E8FD4CE3301BBDB4 847833031 Rogers Cable 2016-02-18 03:45:27 Good Kill
174.112.37.227 62398 bt pTorrent 3.4.5 Pay.the-Ghost.2015.HDRip.XViD-ETRG 0495EFG34B5B1374A2DEA4513372A5A18F022848 ■741359954 Rogers Cable 2015-11-14 06:36:35 Pay the Ghost
174:11237.227 63989 bt pTorrent 3.4.5 Pay.the.Ghost.2015.HDRip.XViD-ETRG 0495EF034B5B1374A2dEA4S13372ASAl8F022848 741359954 Rogers Cabie 2015-11-14 06:42:59 Pay the Ghost
174.11237.227 57826 bt pTorrent 3.43 Pay.the.Ghost.201S.HDRip.XViD-£TRG ; 0495EF034B5B1374A2DEA4513372ASA18F022848 741359954 Rogers Cable 2015-12-05 06:28:45 Pay the Ghost
174.11237.227 63352 bt pTorrent 3.43 Pay,the.Ghost.2015.HDRip.XViD-ETRG . 0495EF034B5B1374A2DEA4513372A5A18F022848 74135995V Rogers Cable 201S-12-10 08:25:03 Pay the Ghost
174.112.37.227 65468 bt pTorrent 3.43 Pay Ehe.Ghostu2015.HDRip.XViD-ETRG 0495EF034B5B1374A2DEA4513372A5A18F022848 741359954 Rogers Cable 2015-12-11 05:31:35 Pay the Ghost
174.11237.227 55567 bt pTorrent 3.43 Pay.the.Ghost.2015.HDRip.XViD-ETRG 0495EF034B5B1374A2DEA4513372A5A18F022848 741359954 Rogers Cable 2016-01-06 06:04:33 Pay the Ghost
174.11237.227 60203 bt pTorrent 3.43 Pay.the.Ghost.2015-HDRip.XViD-ETRG 049SEF034BSB1374A2DEA4513372A5A18F022848 741359954 Rogers Cable 2016-01-06 06:18:52 Pay the Ghost
174,11237.227 59381 bt pTorrent 3.43 Pay.the.Ghost2015.HDRip.XVil>ETRG 0495EF034B5B1374A2DEA4513372A5A18F022848 741359954'Rogers Cable 2016-01-06 07:05:12 Pay the Ghost
174.11237.227 55607 bt pTorrent 3.43 Pay.the.Ghost.2015.HDRip.XViD--ETRG 0495EF034BSB1374A2DEA4513372A5A18Fb22848 741359954 Rogers Cable : 2016-01-07 02:19:24 Pay the Ghost
174.11237.227 50163 bt pTorrent 3.43 Pay.the.Ghost.201S.HDRip.XViD-ETRG . G495EF034B5B1374A2DEA4513372A5A18F022848 741359954 Rogers Cable 2016-01-07 02:53:45 Pay the Ghost
174.11237.227 51283 bt pTorrentS.43 Pay.the.Ghost^OlS.HDRipJCVitAETRG 0495EF034B5B1374A2DEA4S13372ASA18F02284S 741359954 Rogers Cabie 2016-01-14 08:1455 Pay the Ghost
174.11237.227 57990 bt pTorrent 3.43 Pay,the.Ghost.2015.HDRip0(ViD-ETRG 0495EF034B5B1374A2DEA4513372A5A18F022848 741359954. Rogers Cable 2016-01-14 08:39:25 Pay the Ghost
174.11237.227 53057 bt pTorrent 3,43 Pay.the.Ghost.201S.HDRip.XViD-ETRG . 0495EF034B5B1374A2DEA4513372A5A18F022848 741359954 Rogers Cable 2016-02-06 07:14:34 Pay the Ghost
174.11237.227 56781 bt pTorrent 3.4.5 Pay.the.Ghost.2015.HDRip.XViD-ETRG 0495EF034B5B1374A2DEA4513372A5A18Fb22848 741359954 Rogers Cabie 2016-02-06 07:25:27 Pay the Ghost
174.11237.227 56405 bt pTorrent 3.43 Pay.the.Ghost2015.HORip.XViD-ETRG 049SEF034BSBi374A2DEA4513372ASA18F022848 741359954 Rogers Cabie 2016-02-06 08:15:33 Pay the Ghost
174.11237.227 65218 bt pTorrent 3.43 She’s Funny That Way (2014) 71BD9186D7C7D9C43B738E856B88C26D625EF437 78894679G Rogers Cable 2015-12-23 11:04:51 She s Funny That Way
174.11237.227 53412 bt pTorrent 3.45 She's Funny That Way (2014) 71BD91B6D7C7D9C43B738ES56B88C26D625EF437 788946796 Rogers Cable 2015-12-23 13:03:57 She s Funny That Way
174.11237.227 59485 bt pTorrent 3.45 She’s Funny That Way (2014) 71BD91B6D7C7D9C438738E8S6B88C26D625EF437 788946796 Rogers Cable 2016-01-03 07:45:13 She s Funny That Way
174.11237.227 64206 bt pTorrent 3.45 She's Funny TTiat Way (2014) 71B091B6D7C7D9C43B738E856B88C26D62SEF437 788946796 Rogers Cabie 2016-01-03 08:01:38 She s Funny That Way
174.11237.227 53746 bt pTorrent 3.45 She's Funny That Way (2014) 71BD91B6D7C7D9C43B738E8S6B88C26D625EF437 788946796 Rogers Cable 2016-01-27 18:21:05 She s Funny That Way
174.11237.227 51095 bt pTorrent 3.4.5 The Cobbler 2014 72Qp WEB-DLx264 AC3-JYK CCFAB212F02FOBB3BFAFE948FB109580D2DC08A5 2453491448 Rogers Cable 2015-12-02 08:30:05 The Cobbler
174.11237,227 59355 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212F02F0B83BFAFE948F3109580D2DC08A5 2453491448 Rogers Cable 2015-12-11 07:15:20 The Cobbler
174.11237.227 59549 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 ACB-JYK CCFAB.212F02FOBB3BFAFE948F3109580D2DC08AS 245349144$ Rogers Cabie 2015-12-11 07:16:57 The Cobbler ;x
174.11237.227 61591 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 A3-JYK CCFAB212F02FOBB3BFAFE948F3109580D2DC08AS 2453491448 Rogers Cable 2015-12-11 07:22:39 The Cobbler '\W\
2453491448 Rogers Cable 2005-12-19 16:57:51 The Cobbler . Y/A
174.112.37.227 59786 bt pTorrent 3.4.5 The Cobbler 2014 720p WEB-DL x264 ACB-JYK CCFAB212F02FOBB3BFAFE948F3109580D2DC08A5
The Cobbler - / \ ^
174.11237.227 . 60003 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 ACB-JYK CCFAB212F02F0BB3BFAFE948F31O9S8QD2DC08A5 2453491448 Rogers Cable= 2015-12-19 16:58:39
174.11237.227 60703 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 ACB-JYK CCFAB212F02F0BB3BFAFE948F3109580D2DC08A5 2453491448 Rogers Cable 2015-12-19 17:02:09 The Cobbler ^-;- q
174.H2.37.227 50363 bt (Horrent 3.45 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212F02FOBB3BFAFE948F3109S80D2DC08A5 2453491448 Rogers Cable 2016-01-27 21:4mmPifhe Cobbler
174.11237.227 52593 bt • UTorrent 3.4.5 The Cobbler 2014 720p WEB-OLx264 AC3-JYK CCFAB212F02F08B3BFAFE948F3109580P2DC08A5 2453491448 RogereCable 2016-01-27 The Cobbler
174.112.37.227 56743 bt pTorrent 3.4.5 The Cobbler 2014 720p WEB-OL x264 AC3-JYK CCFAB212F02FOBB3BFAFE948F3109580D2DC08A5 2453491448 Rogers Cable 2016^01-27 2350:09 The Cobbler
174.112.37.227 61789 bt UTorrent 3.4.5 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212F02FOBB3BFAFE948F3109580D2DC08A5 2453491448 Rogers Cable 2016-01-22 00:54:47 The Cobbler
174.112.37.227 51790 bt pTorrent 3.4.5 The Cobbler 2014 720p WEB-DL x264 ACB-JYK CCFAB212F02F0BB3BFAFE948F3109S8dD2DC08A5 2453491448 Rogers.Cable 2016-01-28 02:05:59 The Cobbler
174.112.37.227 6SS08 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 AO-JYK CCFAB212F02F0BB3BFAFE948F3109580D2DC08|A5 2453491448 Rogers Cable 201602-03 04:32:15 The Cobbler
174.112.37.227 64774 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212F02F0BB3BFAFE948B109580D2DC0?A5 2453491448 Rogers Cable 2016-03-10 02:37:04 The Cobbler
174.112.37.227 54009 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212F02F0BB3BFAFE948F3109580D2DCO8A5 2453491448 Rogers Cable 201603-10 03:39:15 The Cobbler
174.112.37.227 59177 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212FO2FOSB3BFAFE948F3109580D2DC0&A5 2453491448 Rogers Cable 201603-10 04:3650 The Cobbler
174.112.37.227 60098 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x2S4 AC3-JYK CCFAB212F02FOBB3BFAFE948F3109580D2DC08A5 2453491448 Rogers Cable 201603-10 04:39:21 The Cobbler
174.112.37.227 55136 bt pTorrent 3.45 The Cobbler 2014 720p WEB-DL x264 AC3-JYK CCFAB212F02FOBB3BFAFE948F310958GD2DC08AS 2453491448 Rogers Casle 201603-10 05:40:49 The Cobbler
174.112.37.227 51619 bt pTorrent 3.4.5 The Cobbler 2014720p WEB-DL x264 ACB-JYK CCFAB212F02F08B3BFAFE948F310958pD2DC08A5 2453491448 Rogers Cable 201603-24 05:25:06 The Cobbler
174.112.37.227 S1668 bt pTorrent 3.4.5 The Cobbler 2014 720p WEB-DL x264 ACB-JYK CCFAB212F02F0BB3BFAFE948F310958bD2DCO8A5 2453491448 Rogers Cable 201603-24 05:25:15 The Cobbler
31
^2
TABS
Court File No. T-662-16
SIMPLIFIED ACTION
FEDERAL COURT
BETWEEN:
- and -
Table of Contents
Overview................................................................................................................. 34
Part I — Facts........................................................................................................ 41
A. Summary of Internet Copyright Infringement..................................... 41
B. The Parties and the Works.................................................................... 42
C. The BitTorrent Protocol Allows for the “Sharing” of Computer Files,
Such as the Works............................................................................................ 43
D. The Forensic Software Monitors Copyright Infringements............... 43
E. Mr. Salna was identified as his internet account was found to have
been offering to upload all of the Works........................................................ 44
F. The Respondents as a proposed class will typically fall into one of
two categories of infringer................................................................................ 45
G. Common Issues Definition..................................................................... 46
Part II — Issues..................................................................................................... 48
Part III — Submissions......................................................................................... 48
A. The Proceeding Should Be Certified........................................................ 48
1. The pleadings disclose a reasonable cause of action.................... 49
2. There is an identifiable class of two or more persons..................... 52
3. The claims of Voltage as against the proposed class members
raise common questions of fact and law..................................................... 54
4. A class procedure is the preferable procedure................................ 59
5. There is an appropriate representative respondent.........................61
6. Litigation Plan....................................................................................... 61
Part IV — Order Sought........................................................................................ 62
Part V — List of Authorities...................................................................................64
Appendix 1 - Litigation Plan.................................................................................65
Appendix 2 - Sample Certification Notice...........................................................71
34
Overview
occurred.
class proceeding, with the class being a class of respondents (as opposed to
terms of time, money, and judicial resources than would otherwise be the case
proceedings.
3. Certifying the proceeding will permit a single trial of the common issues,
4. Any concerns that the certification will lead to an abusive process can
be alleviated through the mechanisms set out herein, and through the
supervision by the Court. The matter will either proceed to a hearing on the
proceeding can opt-out and proceed to their own hearing on the merits. As
35
5. The primary driver for choosing a class proceeding rather than mass
infringements. The process should keep costs low for both owners and
to $5,000, plus costs. The cost of litigation being what it is, there is little
incentive for film producers (being the copyright owners) to pursue judicial
intervention to curb the mass infringement of their works given the scope of
legal expenses, or for that matter, the time and effort involved in litigation
generally.
Spreading the cost of litigation over many defendants is in all of the parties’
bests interests.
8. Ideally, the class proceeding will permit copyright owners whose works
with damages being more like a speeding ticket, and yet still be able to recover
appropriate compensation for the use of their work, as well as their legal
36
expenses. A speeding ticket-sized award will deter infringers, but it will not
9. If specific infringers feel that even the “speeding ticket” is unfair, they
may choose to opt-out of the process and pursue their own defence, in an
independent (or mass) proceeding, or they may negotiate with the copyright
an infringer was hacked, even a speeding ticket might not be fair. In our
infringers avoid paying for their entertainment because they do not have any
above.
10. The opting-out process will therefore serve as a “safety valve”, allowing
while the typical case of intentional infringement will be dealt with summarily.
plan):
juncture);
matter;
Work);
issues;
ISPs confirming that the Certification Notice has been sent to the
(ii) Class Members may agree to pay damages award (if any)
ownership of copyright);
40
examinations;
evidence;
Respondents.
12. The Class Respondents would comprise the individuals whose internet
upload the Works during the prior six month period. Six months was chosen
as ISPs are required to keep information for that period of time under the
41
members may be identifiable prior to that time, but this time frame was chosen
in order to avoid needless work by the ISPs who may not be retaining data past
six months (being the statutory minimum amount of time). Class Respondents’
Part I — Facts
13. The internet is now sufficiently powerful to easily transfer movies from
15. Voltage has been tracking online piracy of their movies for some time,
software, Voltage has been able to link individuals to infringements by his (or
1 To give a sense of the scope and scale of the infringements, originally as at the date of the
Notice of Application, approximately 55,000 IP addresses were located that were offering to
distribute the Works through the BitTorrent Protocol. As at the date of this document,
42
16. The Applicants are movie production companies forming part of the
infringement of its films through peer to peer (or person to person) networks
17. The relevant movies for the underlying application (/.e. the Works), are
set out below. The relevant Voltage party who owns the copyright in each film
# Title Owner
approximately 2,000 unique IP addresses were detected offering to distribute the Works in six
months immediately prior.
43
18. Through the above-noted custom software, the Applicants were able to
identify numerous instances of the Works being offered for upload and
19. A user who wishes to “share” a computer file (e.g. a motion picture) with
other users of the BitTorrent software places that computer file in a computer
location (folder) that is known to the specific software that is running the
BitTorrent protocol. The BitTorrent software then offers that file for download
to anyone who is using compatible BitTorrent software and who requests that
particular file.
20. Voltage hires consultants that use software that has been purpose-built
and shared network (i.e. the users publicly broadcast to the internet what they
are doing/offering), it is not difficult for the software to determine who at any
particular time is offering for upload one of the designated works by reference
44
21. In all cases, the forensic software used by Voltage will have detected
the following:
b. the forensic software will have sampled the work being offered
and Mr. Salna, one of the proposed representative respondents, was identified
by Rogers as being the owner of the internet account assigned this IP address
at the relevant times. This IP address was chosen from thousands of possible
choices as it contained frequent samples that would ensure that it was reliable,
and was a user who was offering for upload all of the Works.
23. Mr. Salna claimed that it was his tenants who were performing the
respondents, Mr. Rose and Ms. Cerrelli, as being the tenants who had access
24. Mr. Salna was notified that the infringements were taking place but has
taken no action to monitor who is using his internet account, or what they are
work;
whose internet account was not only detected offering a Work for upload, but
the infringing file being offered will have been sampled to ensure that it is fact
27. Voltage will submit in the hearing on the merits that each Respondent is
liable for copyright infringement of the Works on at least one of two theories:
who have been notified that their internet has been used to unlawfully distribute
one or more of the Works, and took no step to rectify such infringement.
29. Voltage submits that the Common Issues in this matter are as follows:
Copyright Infringement
(ii) Does the relevant Applicant own the copyright in the appropriate
Works?
Defences
Relief
Part II — Issues
31. In its essence, this motion is whether it is better to have one test case
32. Rule 334.162 mandates that a case must be certified if the requirements
of that Rule are fulfilled. The Supreme Court of Canada has held that
f) Voltage must have prepared a plan for the proceeding that sets out
34. Each of these conditions has been satisfied. The Court has no
35. The threshold that Voltage must meet in order to establish a reasonable
case has no chance of success, even if the facts alleged in the notice of
36. Voltage are movie production companies that own the copyright in their
37. Voltage has pleaded that each of the Respondent Class members have
the Unlawful Acts. The Supreme Court of Canada in this very proceeding has
held that this uploading of the Works amounts to illegal sharing of copyrighted
content. In other words, the cause of action against Direct Infringers is clearly
proper.
38. Further, the Supreme Court has discussed the issues regarding
infringe copyright in the 2004 SOCAN case (“CAIP"). In that case, internet
their networks was the issue. The question was whether an ISP being aware
that the infringement was taking place would lead to a finding of copyright
39. In this matter, the proposed Respondent Class will be comprised entirely
will be persons who have permitted others to use their internet accounts to
the Notice and Notice system that their accounts have been used to commit
have to be addressed at the hearing on the merits. For example, is prior notice
Another question may be whether the ISPs’ contract with their subscriber, such
41. Who, exactly, is committing the infringement is part of the factual and
try to pierce the technological veil of the internet to allow easy identification of
infringers and provide copyright owners with less costly and more effective
statutory damages for such infringement to balance the rights of owners and
have them take measures to ensure that their internet account is not being
as to what their internet accounts are being used for. While it may well be that
the owner of the account may not be sophisticated, there is a legal obligation
to not sit by and fail to be reasonably informed as to the uses that are being put
to their internet account. A wilfully blind person is a person who has been put
strategic ignorance with a view to avoiding liability. In this case, it will be argued
that the wilful blindness occurs when “free movies” are being watched by the
subscriber or others around them, which should raise suspicions and further
inquiry.
43. It is therefore submitted that Voltage has a sufficient factual and legal
basis for their claims in the pleadings and have disclosed a reasonable cause
of action.
44. There are three criteria for finding the existence of an “identifiable class”:
53
application; and
45. The class must be defined sufficiently narrowly such that the three
onerous and does not need to show that “everyone in the class shares the
same interest in the resolution of the asserted common issue”. Rather, Voltage
46. Voltage has proposed the following class definition: all persons residing
in Canada who are Direct Infringers or who are Authorizing Infringers, or both.
47. Each member of the proposed class definition has been detected
account was offering to upload (e.g. distribute) at least one Work to the public
without colour of right. Each class member will have been sent a notice as set
out in paragraph 11.b, above, that would inform them of the infringing activity
taking place on their account, and allow for them to mitigate their actions. Each
and the acts that constitute infringement are identical for each proposed class
member.
which type of infringer the class member would be when the infringement is
first detected. However, it is not necessary to know which type they are,
because in either case they would be liable for copyright infringement either
is defined without reference to the merits of the application and has a rational
connection between the common issues and the proposed class definition.
51. The underlying question to whether the claims raise common questions
of fact and law is whether allowing the suit to proceed as a class proceeding
common issues to be determinative of the suit. Rather, the claims against the
class members must share a substantial common ingredient that would justify
a class action.
of the suit against each class member. The common question does not require
an identical answer for all members of the class or for the answer to benefit
54. The standard of proof for satisfying the commonality requirement is low.
Voltage must only show “some basis in fact” to support the proposed common
evidence at the certification stage. This standard only requires that there are
“sufficient facts to satisfy the applications judge that the conditions for
certification have been met to a degree that should allow the matter to proceed
55. In the notice of motion, Voltage identified the following nine issues of
Copyright Infringement
appropriate Works?
Act?
Unlawful Acts?
Unlawful Acts 1 or 2;
57
Defences
Relief
56. Questions (i) and (ii) (copyright subsistence and ownership of copyright)
concern five different works, each owned by a different Voltage entity. These
two questions, for one of the Works, are common to each Respondent that
Voltage alleges infringed said work. Although the answer to questions (i) and
(ii) for all five Works will not be relevant to each of the Respondents, there is
58
no requirement for the answers to the common question to benefit ail of the
Respondents equally.
57. Questions (iii), (iv) and (v) (copyright infringement and authorization of
same) are legal questions based on the same factual matrix common to all
58. Question (vi) comprises legal questions that are relevant to all
Authorizing Infringers. Like question (i) and (ii), the fact that question (vi) is not
fact and law that is based on the same fact scenario. It is Voltage’s position
“defence” but a user’s right) as the Works are being offered to third parties for
copying, and are not being “used” by the infringer at all. While it is possible
that there could be a defence that the subscriber was hacked or was mis-
identified in some way, these issues generally are the same as those put
forward by the proposed Representative Respondents (i.e. that they did not do
59
it). As such, any analysis of available defences be very similar between each
60. The answers to questions (viii) and (ix) (quantum of damages and
request the same quantum of statutory damages from each class member and
are not going to be seeking actual damages. The goal is to obtain a fair
that the Court permit class members to opt out of the matter after the
62. It is therefore submitted that all of the issues in this Application can be
determined as common questions of law and fact and that a single hearing on
the merits can decide the fairly for all class members, with a safety valve
Court must determine whether other available means of resolving the claim are
60
64. The Supreme Court of Canada has held that Parliament intended the
Notice and Notice regime “to allow copyright owners to protect and vindicate
their rights as quickly, easily and efficiently as possible while ensuring fair
treatment of all”.
65. Certification of the class is consistent with this goal. Hearing all of the
reducing the number of proceedings and reducing the need for additional
judges, courtrooms and court staff. A single hearing on the common issues
also ensures consistent factual and legal findings between the applications.
66. If the Respondents have unique issues to raise, all Respondents would
retain the right to opt-out of the class and have their issues heard separately.
67. As set out in the Litigation Plan, any class members that wished to opt-
out would be part of a case managed proceeding that would permit these
68. The proposed Representative Respondents are typical, in that they are
to opt out, they would still be subject to a claim for copyright infringement and
would have to proceed to a hearing on the same facts and the same law. Mr.
Salna’s internet account was the sole account out of thousands that was found
to have been simultaneously offering for upload all of the Works. He blamed
Respondents, and they too have denied that they are responsible (although
6. Litigation Plan
69. The Litigation Plan summarized paragraph 11 and set out more
fulsomely in Appendix “1” set out a detailed procedure that Voltage proposes
be used to minimize any potential abuse of the system and yet provide the
mass infringements.
62
and that an order be issued certifying this motion as set out above. Voltage
intends to present a form of draft order to the Court prior to the hearing that
addresses any concerns that the Respondents may raise in their responding
materials.
September 9, 2019
Barristers and Solicitors
Brookfield Place
181 Bay Street, Suite 1800
Toronto, Canada M5J 2T9
Kenneth R. Clark
Patrick Copeland
Tel: 416.865.1500
Fax: 416.863.1515
Sean N. Zeitz
Tel: 416.789.0652
Fax: 416.789.9015
David Fewer
Tamir Israel
Authorities
Motion as presented to the Court except to the extent that paras. 8(a) and (b)
are now moot given that CIPPIC has been granted leave to intervene in the
process and the Mr. Rose and Ms. Cerrelli have been added as class
respondents. The litigation plan is set out here, and discussion regarding it is
juncture);
matter;
66
Work);
issues;
ISPs confirming that the Certification Notice has been sent to the
(ii) Class Members may agree to pay damages award (if any)
ownership of copyright);
examinations;
evidence;
Respondents.
1. Notice to class members as set out in para. 8(c) of the Notice of Motion and
as required by Rule 334.32 is set out below in paras, (b) and (g). Voltage
submits that the factors set out in R. 334.32 are fulfilled thereby, including
minimizing the cost of giving notice, the nature of the relief, the size and
numbers of the class, and the likelihood that some of all of the class
members will opt out of the class proceeding, as well as the residence of
approved by the Court will be translated into French and combined into a
a) The notice sets out that the proceeding is a class proceeding where the
b) The opt-out procedure for each class member including the time and
manner for a class member to opt out of the proceeding is set out
therein.
d) Sections 334.23(d) and (e) are not relevant as they only apply to a
Plaintiff/Applicant class.
notice.
3. Once approved, the Certification Notice would be posted on the Aird &
Berlis website, and could also be posted on class counsel’s website. The
utility of posting a website notice would not be high as most individuals will
4. To protect the identities of the subscribers, the “opt out form” is included in
the Certification notice in the sense that class member would email
Applicants’ counsel their reference number and their desire to opt-out. This
information would periodically be shared with the Court and class counsel
and records kept of those members who wished to opt out. Their identities
Application and following any second notification regarding opting back into
the matter.
TAB 2
71
The claim in this matter is that you or someone using your internet account has used
a BitTorrent peer-to-peer network to unlawfully download and/or unlawfully offer to
upload one of the above-listed films.
Specifically in respect of your case, the film in question was: <Film or Films> and the
unlawful activity was detected at the following date and time (UTC time):
<Date Time of Infringements:*.
IF YOU DO NOT OPT OUT, THE LAWYERS FOR THE DEFENDANT CLASS WILL
DEFEND YOUR RIGHTS AUTOMATICALLY THROUGH THEIR DEFENCE OF THE
DESIGNATED CLASS RESPONDENTS WITHOUT ANY ACTION BEING TAKEN
BY YOU, AND WITHOUT ANY IMMEDIATE FINANCIAL CONSEQUENCE.
YOU WILL ALSO HAVE THE OPTION TO OPT-OUT ONCE THE MERITS OF THIS
ACTION HAVE BEEN DETERMINED AND ANY AMOUNT OF DAMAGES SET,
AND YOU MAY ALSO AT YOUR OPTION OPT BACK IN TO THE APPLICATION
AT THAT POINT.
Please note that you must immediately take steps to (a) stop copyright infringement
from occurring on your internet account and (b) secure your internet (by e.g.
changing the WiFi password) so that no unauthorized third party can infringe
copyright by using your internet account. Please contact us by email at
copvrightenforcement@airdberlis.com within 14 days of this notice giving us your
reference number and by letting us know what steps you have taken as per the
above. Your efforts will be noted and taken into account in this proceeding.
Alberta - https://www.lawsocietv.ab.ca/public/lawyer-referral/
British Columbia - http://www.cbabc.orq/for-the-public/lawyer-referral-service
Manitoba - http://www.communitvlegal.mb.ca/proqrams/law-phone-in-and-lawver-
referral-proqram/
New Brunswick - https://secure.lawsocietv-
barreau.nb.ca/memberdirectory/Search.aspx
Newfoundland and Labrador - http://publiclegalinfo.com/
Nova Scotia - https://www.legalinfo.org/how-lisns-can-help/i-need-a-lawyer
Ontario - https://lsrs.lsuc.on.ca/lsrs/
Prince Edward Island - http://www.lawsocietvpei.ca/find-a-lawyer
Quebec- https://www.barreau.qc.ca/en/directorv-lawvers/
Saskatchewan - http://www.lawsocietv.sk.ca/for-the-public/how-do-i-find-a-
lawver.aspx
NO COURT HAS YET DETERMINED THAT YOU ARE LIABLE FOR COPYRIGHT
INFRINGEMENT FOR THE DISTRIBUTION OF ANY OF THE CLAIMANTS’
MOVIES NOR THAT YOU ARE LIABLE FOR ANY DAMAGES FOR ANY
POTENTIAL COPYRIGHT INFRINGEMENT.
Note that Aird & Berlis LLP is not your lawyer. We can be located at Brookfield
Place Suite 1800, Box 754 181 Bay Street, Toronto Ontaio M5J 2T9.
Yours truly,
Aird & Berlis LLP
37122417.6