MEMORANDUM AND ORDER
In this ease, Plaintiff John Wiley & Sons, Inc. (‘Wiley” or “Plaintiff’) alleges that 30 unidentified “John Doe” defendants used peer-to-peer file-sharing software to illegally copy and distribute Wiley’s copyrighted works and infringe Wiley’s trademarks. John Doe No. 9 (“Doe No. 9”) has moved for a protective order and to quash a subpoena that Wiley has served on nonparty Cablevision Systems (“Cablevision”) for the production of Doe No. 9’s identifying information. For the reasons discussed below, the motion is DENIED.
I. BACKGROUND
Wiley is a global publisher of books and journals and assignee of the copyright to the seven written works at issue in this case. (Complaint, dated May 11, 2012 (“Complaint” or “Compl.”) ¶¶ 7-11 (Dkt. No. I)).
On July 27, 2012, Doe No. 9, proceeding pro se and anonymously, moved to quash the subpoena and for a protective order on the basis that “the subpoena seeks documents and information which are confidential and palpably irrelevant to the pending proceedings.” (Motion to Quash and for a Protective Order, dated July 27, 2012 (“Motion” or “Motion to Quash”) ¶ 2 (Dkt. No. 7)). Doe No. 9 states that “I have never utilized BitTorrent to download the plaintiffs trade book ‘Window[s] 7 Secrets.’” (Id.). She asserts that because her IP address “was not locked and could have been accessed by an unknown party at an unknown location via ‘piggybacking,’ ” Wiley is unable to show that she is the person who downloaded Wiley’s book. (Id. ¶4). Doe No. 9 also argues that “there is improper joinder, improper venue, and a lack of personal jurisdiction,” (id. ¶2), and that she “was never personally served or contacted regarding the nature of this ease until July 16, 2012[,] when Cablevision sent a letter to my address by United States Postal Service that included this court’s order and subpoena requiring [Cablevision] to turn over documents ... related to the services provided to me by their company.” (Id. ¶ 5).
On August 8, 2012, Wiley filed an opposition to Doe No. 9’s Motion to Quash, arguing that the Motion “should be denied as moot because Cablevision responded to the subpoena and disclosed to Wiley the identity of John Doe No. 9.” (Pl.’s Opp. at 1). Wiley contended that Cablevision produced Doe No. 9’s name and address by facsimile on August 6, 2012 after “Doe No. 9 apparently failed to deliver a copy of his or her motion to quash to Cablevision before the deadline that Cablevision had set expired.” (Id.). On August 13, 2012, Doe No. 9 filed a letter with the Court explaining that she had served a copy of her Motion on Cablevision on August 10, but was told at that time that Cablevision had already released her information to Wiley. (Letter from John Doe #9 to Hon. Judge Laura Ta[y]lor Swain, dated Aug. 13, 2012 (Dkt. No. 11)). Doe No. 9 also argued that the “mere fact that the Plaintiff has the [identifying] information does not make the Motion moot.” (Id.).
I agree that Doe No. 9’s motion is not moot merely because Cablevision has already responded to the subpoena, because Wiley “can be ordered to return the information and prohibited from using it.” Sony Music Entm’t Inc. v. Does 1-40,
“The burden of persuasion in a motion to quash a subpoena and for a protective order is borne by the movant.” Pegoraro v. Marrero, No. 10 Civ. 00051(AJN)(KNF),
A. Motion to Quash
Under Rule 45 of the Federal Rules of Civil Procedure, a court must quash or modify a subpoena if the subpoena “requires disclosure of privileged or other protected matter, if no exception or waiver applies.” Fed.R.Civ.P. 45(c)(3)(A)(iii). Courts in this Circuit have recognized that Internet users have a limited First Amendment privacy interest in anonymous Internet usage, including “the use of [peer-to-peer] file copying networks to download, distribute or make available for distribution copyrighted” material in electronic form. Sony Music,
However, in the file-sharing context, First Amendment protection “is limited, and is subject to other considerations.” Sony Music,
1. Prima Facie Claim of Copyright Infringement
Wiley has made a concrete showing of a prima facie claim of copyright infringement by alleging (1) its ownership of the registered copyright for Windows 7 Secrets, and (2) specific details regarding unlawful copying and distribution of this work, including the date and time at which the copying occurred, the file-sharing technology used, and the IP address of the computer from which the file was copied. See, e.g., Sony Music,
Wiley’s request is specific, as it seeks concrete and narrow information: the name and address of the subscriber associated with Doe No. 9’s IP address, which Wiley alleges was used to infringe its copyright to Windows 7 Secrets. In Sony Music, the court found a virtually identical request to satisfy this factor because it was “sufficiently specific to establish a reasonable likelihood that the discovery request would lead to identifying information that would make possible service upon particular defendants who could be sued in federal court.” Sony Music,
3. Absence of Alternative Means to Obtain Subpoenaed Information
In support of its application for issuance of the subpoenas, Wiley has explained that use of the BitTorrent software is “largely anonymous” except insofar as it requires a user to broadcast the user’s IP address. (Dunnegan Decl. ¶ 5). Wiley further attests that it “cannot determine the identity and contact information for each of the defendants without obtaining [such] information from the ISPs by subpoena.” (Id. ¶ 6). Doe No. 9 has not refuted this assertion, as is her burden, or otherwise established that Wiley could obtain her identity by other means. Therefore, Wiley has established that it lacks the means to obtain the subscriber’s identifying information, other than by subpoena. See, e.g., Sony Music,
4. Wiley’s Need for the Subpoenaed Information
“Ascertaining the identities and residences of the Doe defendants is critical to [Wiley’s] ability to pursue litigation, for without this information, [Wiley] will be unable to serve process.” Id. Again, Doe No. 9 does not explain how, in the absence of a subpoena such as the one here, Wiley can identify potential infringers of its intellectual property rights or otherwise protect its interests in
5. Doe No. '9’s Expectation of Privacy
ISP subscribers have a minimal expectation of privacy in the transmission or distribution of copyrighted material. See, e.g., Arista Records,
Citing K-Beech, Inc. v. John Does 1-37, 11-CV-3995 (DRH)(GRB) (E.D.N.Y. May 1, 2012), Doe No. 9 argues that permitting Wiley’s use of expedited discovery to obtain her identity has the potential to “wrest quick settlements” from innocent persons, because “the embarrassment of public exposure might be too great, the legal system too daunting and expensive” to wait for Wiley to put forth competent evidence that Doe No. 9 is the person who conducted the illegal download. (Motion to Quash ¶ 12).
Further, there is nothing in the record to suggest that Wiley has engaged in any of the improper practices that took place in K-Beech or that Wiley seeks to use “the Court and its subpoena powers to obtain sufficient information to shake down the John Does,” as the plaintiffs’ counsel was found to have done in K-Beech. Id. at *5. Doe No. 9 may have a valid defense that she was not the individual responsible for the Windows 7 Secrets download alleged in the Complaint. If so, that defense will be litigated at the appropriate time. Given the foregoing analysis of the Sony Music factors, however, the prospect of such a defense does not raise a First Amendment privacy interest that would justify concealing Doe No. 9’s identity so as to protect her from suit altogether. Arista Records,
Rule 26 permits a court, for good cause, to “issue an order to protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense.” Fed.R.Civ.P. 26(c)(1). For reasons identical to those discussed above, I do not find good cause to issue a protective order.
C. Joinder, Venue, and Personal Jurisdiction
Finally, Doe No. 9 has raised issues of improper joinder, venue, and lack of personal jurisdiction. Although Doe No. 9 raises “a fair issue as to whether all these claims against [30] apparently unrelated individuals should be joined in one lawsuit, discussion of joinder is not germane to the motionf] to quash before the Court, as the remedy for improper joinder is severance ... and not the quashing of the subpoena at issue here.” Sony Music,
III. CONCLUSION
For the reasons set forth above, Doe No. 9’s motion to quash and for a protective order is DENIED. Doe No. 9 may raise any appropriate challenge to joinder, venue, or personal jurisdiction once she has been named and served with an amended complaint.
SO ORDERED.
Notes
. These works are: (1) The Fat Burning Bible, (2) Windows 7 Secrets, (3) The Six-Figure Second Income, (4) How to Build a Super Vocabulary, (5) Presentation Secrets 2011, and (6) 101 Small Business Ideas for Under $5000. (Compl. at Sch. A).
. BitTorrent software enables a computer to exchange electronic flies, such as electronic copies of the works published by Wiley, with other computers (or "peers”) through the Internet. (Compl. ¶¶ 14-15). Computers running the software send or receive pieces of a particular file until a copy of the entire work has been exchanged with one or more computers. (Id. ¶ 14). After BitTorrent completes a download of the entire work, the computer on which it is running continuously distributes copies of the file to other computers until the user manually disconnects from the software. (Id.).
. Although the Complaint refers to the defendants as "John Does,” Wiley's opposition papers suggest that Doe No. 9 is a woman. (See Plaintiff's Opposition to Defendant John Doe No. 9's Motion to Quash a Subpoena to an Internet Service Provider ("Pl.’s Opp.”) at 2 (referring to
. Judge Swain referred this case to me for general pre-trial supervision while the Motion was pending (Dkt. No. 12), and, as it is non-disposi-tive, it is appropriate for me to decide. See 28
. I reject Doe No. 9's assertion that her identity is not discoverable because it is "palpably irrelevant to the pending proceedings.” (Motion to Quash ¶ 2). Even if Doe No. 9 is not the person who downloaded Windows 7 Secrets, as she argues, evidence is relevant if "it has any tendency to make a fact more or less probable than it would be without the evidence” and “the fact is of consequence in determining the action.” Fed. R.Evid. 401(a)-(b) (emphasis added). Rule 26 permits discovery of the "identity and location of persons who know of any [relevant] matter.” Fed.R.Civ.P. 26(b)(1). Doe No. 9 clearly knows whether she is the individual who conducted the download at issue and that fact is plainly relevant. As Doe No. 9 is a person who knows of a relevant matter, her identity is discoverable under Rule 26(b)(1).
. Cablevision’s current terms of use are identical in this respect. See Optimum Online Terms of Service ¶ 11(A), http://www.optimum.net/Terms (effective Oct. 2011, last visited Sept. 17, 2012) ("Subscriber acknowledges and agrees that Ca-blevision has the right to monitor content and your use of the Optimum Online Service electronically from time to time and to disclose any information as necessary to satisfy any law, regulation or other governmental request....”).
. Although Doe No. 9 does not provide the full citation to the K-Beech opinion to which she refers, it appears that she is citing to the In re BitTorrent decision, which addressed four related cases, of which K-Beech was one. See In re BitTorrent,
. Moreover, Doe No. 9 has acknowledged that she did not secure her IP address and that "[t]here was nothing preventing a stranger or a neighbor or a person passing by on the bus from using [her] insecure IP address.” (Motion to
. Rule 26 requires that any motion for a protective order "include a certification that the mov-ant has in good faith conferred or attempted to confer with other affected parties in an effort to resolve the dispute without court action.” Fed. R.Civ.P. 26(c). As Doe No. 9 has not done so, she also does not meet the procedural prerequisites to obtain a protective order under Rule 26.
