Open Access. Powered by Scholars. Published by Universities.®

Civil Procedure Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Civil Procedure

Walk A Mile In The Shoes Of A Copyright Troll: Analyzing And Overcoming The Joinder Issue In Bittorrent Lawsuits, Kristina Unanyan Sep 2015

Walk A Mile In The Shoes Of A Copyright Troll: Analyzing And Overcoming The Joinder Issue In Bittorrent Lawsuits, Kristina Unanyan

The Journal of Business, Entrepreneurship & the Law

This Comment analyzes the issues surrounding joinder of copyright infringers who use BitTorrent, explores how joinder can be used and limited to create a more viable solution for copyright holders and consumers, as well as, supplements the sparse regulations that encompass joinder to create a rule that accommodates this technological era. Part II explains Copyright Law and the procedural aspects of a copyright infringement suit and joinder of defendants. Part III delves into the history of peer-to-peer (P2P) file-sharing lawsuits and provides an illustration of where case law rests today regarding P2P networks. Part IV describes the BitTorrent network and …


The Case Against Combating Bittorrent Piracy Through Mass John Doe Copyright Infringement Lawsuits, Sean B. Karunaratne Nov 2012

The Case Against Combating Bittorrent Piracy Through Mass John Doe Copyright Infringement Lawsuits, Sean B. Karunaratne

Michigan Law Review

Today, the most popular peer-to-peer file-sharing medium is the BitTorrent protocol. While BitTorrent itself is not illegal, many of its users unlawfully distribute copyrighted works. Some copyright holders enforce their rights by suing numerous infringing BitTorrent users in a single mass lawsuit. Because the copyright holder initially knows the putative defendants only by their IP addresses, it identifies the defendants anonymously in the complaint as John Does. The copyright holder then seeks a federal court's permission to engage in early discovery for the purpose of learning the identities behind the IP addresses. Once the plaintiff knows the identities of the …