Microsoft Corporation v. MediaPointe, Inc. et al

Filing 68

PROTECTIVE ORDER by Magistrate Judge Michael R. Wilner re Stipulation for Protective Order #67 . (see document for details) (hr)

Download PDF
1 2 3 4 5 6 7 8 9 10 11 12 Betty Chen (SBN 290588) FISH & RICHARDSON P.C. 633 West 5th Street, 26th Floor Los Angeles, CA 90071 Telephone: (213) 533-4240 Fax: 650-839-5071 Email: bchen@fr.com Kalpana Srinivasan (SBN 237460) ksrinivasan@susmangodfrey.com SUSMAN GODFREY L.L.P. 1900 Avenue of the Stars, Suite 1400 Los Angeles, California 90067-6029 T: (310) 789-3100 / F: (310) 789-3150 Meng Xi (SBN 280099) mxi@susmangodfrey.com Thomas V. DelRosario (SBN 236264) tdelrosario@susmangodfrey.com Justin Kenney (pro hac vice) jkenney@susmangodfrey.com SUSMAN GODFREY L.L.P. 1000 Louisiana, Suite 5100 Houston, Texas 77002-5096 T: (713) 651-9366/F: (713) 654-6666 Jason W. Wolff (SBN 215819) wolff@fr.com FISH & RICHARDSON P.C. 12860 El Camino Real, Suite 400 San Diego, CA 92130 Telephone: (858) 678-5070 Fax: 858-678-5099 Counsel for Plaintiff, Microsoft Corporation [Additional Counsel Listed on Signature Block] Counsel for Defendant and Counterclaimant, MediaPointe, Inc. and Defendant AMHC, Inc. 13 14 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA 15 16 17 MICROSOFT CORPORATION, 19 v. 20 MEDIAPOINTE, INC., AMHC, INC., 21 23 Defendants. MEDIAPOINTE, INC. Counterclaimant, 24 25 v. 26 MICROSOFT CORPORATION 27 STIPULATED PROTECTIVE ORDER Plaintiff, 18 22 Case No. 2:22-cv-01009-MCS-MRW Counterclaim-Defendant. 28 1 1 WHEREAS, Plaintiff Microsoft Corporation (“Microsoft”) and Defendants 2 MediaPointe, Inc. and AMHC, Inc. (collectively “MediaPointe”) (Plaintiff and 3 Defendants each a “Party,” and collectively, the “Parties”) believe that certain 4 information that is or will be encompassed by discovery demands by the Parties 5 involves the production or disclosure of trade secrets, confidential business 6 information, or other proprietary information; WHEREAS, the Parties seek a protective order limiting disclosure thereof in 7 8 accordance with Federal Rule of Civil Procedure 26(c): THEREFORE, it is hereby stipulated among the Parties and ORDERED 9 10 that: 11 1. A. PURPOSES AND LIMITATIONS 12 Discovery in this action is likely to involve production of confidential, 13 proprietary or private information for which special protection from public 14 disclosure and from use for any purpose other than prosecuting this litigation may 15 be warranted. Accordingly, the parties hereby stipulate to and petition the Court to 16 enter the following Stipulated Protective Order. The parties acknowledge that this 17 Order does not confer blanket protections on all disclosures or responses to 18 discovery and that the protection it affords from public disclosure and use extends 19 only to the limited information or items that are entitled to confidential treatment 20 under the applicable legal principles. 21 B. GOOD CAUSE STATEMENT 22 This action is likely to involve trade secrets, customer and pricing lists and 23 other valuable research, development, commercial, financial, technical and/or 24 proprietary information for which special protection from public disclosure and from 25 use for any purpose other than prosecution of this action is warranted. Such 26 confidential and proprietary materials and information consist of, among other 27 28 2 1 things, confidential source code, confidential technical documentation and 2 information, confidential business or financial information, information regarding 3 confidential business practices, or other confidential research, development, or 4 commercial information (including information implicating privacy rights of third 5 parties), information otherwise generally unavailable to the public, or which may be 6 privileged or otherwise protected from disclosure under state or federal statutes, 7 court rules, case decisions, or common law. Accordingly, to expedite the flow of 8 information, to facilitate the prompt resolution of disputes over confidentiality of 9 discovery materials, to adequately protect information the parties are entitled to keep 10 confidential, to ensure that the parties are permitted reasonable necessary uses of 11 such material in preparation for and in the conduct of trial, to address their handling 12 at the end of the litigation, and serve the ends of justice, a protective order for such 13 information is justified in this matter. It is the intent of the parties that information 14 will not be designated as confidential for tactical reasons and that nothing be so 15 designated without a good faith belief that it has been maintained in a confidential, 16 non-public manner, and there is good cause why it should not be part of the public 17 record of this case. C. 18 19 ACKNOWLEDGMENT OF PROCEDURE FOR FILING UNDER SEAL 20 The parties further acknowledge, as set forth in Section 12.3, below, that this 21 Stipulated Protective Order does not entitle them to file confidential information 22 under seal; Local Civil Rule 79-5 sets forth the procedures that must be followed 23 and the standards that will be applied when a party seeks permission from the court 24 to file material under seal. 25 “RESTRICTED 26 CONFIDENTIAL SOURCE CODE,” or “PRIVACY DATA” by any party, as 27 discussed below, will be deemed “information previously designated as - Any information designated “CONFIDENTIAL,” ATTORNEYS’ EYES 28 3 ONLY,” “RESTRICTED 1 confidential” within the meaning of Local Rule 79-5 unless the Court rules 2 otherwise. 3 There is a strong presumption that the public has a right of access to judicial 4 proceedings and records in civil cases. In connection with non-dispositive motions, 5 good cause must be shown to support a filing under seal. See Kamakana v. City and 6 County of Honolulu, 447 F.3d 1172, 1176 (9th Cir. 2006), Phillips v. Gen. Motors 7 Corp., 307 F.3d 1206, 1210-11 (9th Cir. 2002), Makar-Welbon v. Sony Electrics, 8 Inc., 187 F.R.D. 576, 577 (E.D. Wis. 1999) (even stipulated protective orders require 9 good cause showing), and a specific showing of good cause or compelling reasons 10 with proper evidentiary support and legal justification, must be made with respect to 11 Protected Material that a party seeks to file under seal. The parties’ mere designation 12 of Disclosure or Discovery Material as CONFIDENTIAL does not — without the 13 submission of competent evidence by declaration, establishing that the material 14 sought to be filed under seal qualifies as confidential, privileged, or otherwise 15 protectable — constitute good cause. 16 Further, if a party requests sealing related to a dispositive motion or trial, then 17 compelling reasons, not only good cause, for the sealing must be shown, and the 18 relief sought shall be narrowly tailored to serve the specific interest to be protected. 19 See Pintos v. Pacific Creditors Ass’n, 605 F.3d 665, 677–79 (9th Cir. 2010). For 20 each item or type of information, document, or thing sought to be filed or introduced 21 under seal in connection with a dispositive motion or trial, the party seeking 22 protection must articulate compelling reasons, supported by specific facts and legal 23 justification, for the requested sealing order. Again, competent evidence supporting 24 the application to file documents under seal must be provided by declaration. 25 Any document that is not confidential, privileged, or otherwise protectable in 26 its entirety will not be filed under seal if the confidential portions can be redacted. 27 If documents can be redacted, then a redacted version for public viewing, omitting 28 4 1 only the confidential, privileged, or otherwise protectable portions of the document, 2 shall be filed. Any application that seeks to file documents under seal in their 3 entirety should include an explanation of why redaction is not feasible. 4 Producing Confidential Information (defined in Section 2.3 below) imposes a 5 substantial burden and a risk of disclosure of trade secrets. See, e.g., Fed. R. Civ. P. 6 26(c)(1)(G). 7 Confidential Information to no more than is reasonably necessary to prosecute or 8 defend against the specific claims alleged in this Action. The Parties agree that, 9 consistent with Federal Rule of Civil Procedure 34, all requests for Confidential 10 Information will describe the requested discovery material with reasonable 11 particularity. The parties agree to meet and confer in good faith to narrow the scope 12 of requested discovery of Confidential Information to what is reasonably necessary 13 to prosecute or defend against the specific claims alleged in this Action. Therefore, the Parties shall limit their discovery requests for 14 The parties shall only include Protected Material (defined in Section 2.14 15 below) in filings with the Court to the extent that it is reasonably necessary for the 16 Court to decide a disputed issue, including by filing only the relevant excerpts of 17 documents designated as Protected Material. See L.R. 79-5.2.2. If a Party files 18 excessive Protected Material of another Designating Party that is not reasonably 19 necessary for the Court to decide a disputed issue, the Designating Party reserves all 20 rights to seek relief, including to petition the clerk of court to remove or return any 21 unnecessarily filed Protected Material or to move the Court to strike such 22 unnecessarily filed Protected Material. 23 2. DEFINITIONS 24 2.1. Action: this pending federal lawsuit. 25 2.2. Challenging Party: a Party or Non-Party that challenges the designation 26 of information or items under this Order. 27 28 5 1 2.3. “CONFIDENTIAL” Information or Items: information (regardless of 2 how it is generated, stored or maintained) or tangible things that qualify for 3 protection under Federal Rule of Civil Procedure 26(c), and as specified above in 4 the Good Cause Statement. “CONFIDENTIAL” information includes information 5 designated with a more restrictive category, including “RESTRICTED - 6 ATTORNEYS’ EYES ONLY,” “RESTRICTED CONFIDENTIAL SOURCE 7 CODE,” or “PRIVACY DATA.” 8 9 10 2.4. Counsel: Outside Counsel of Record and House Counsel (as well as their support staff). 2.5. Designating Party: a Party or Non-Party that designates information or 11 items that it produces in disclosures or in responses to discovery as 12 “CONFIDENTIAL,” 13 “RESTRICTED CONFIDENTIAL SOURCE CODE,” or “PRIVACY DATA.” 14 2.6. “RESTRICTED - ATTORNEYS’ EYES ONLY,” Disclosure or Discovery Material: all items or information, regardless 15 of the medium or manner in which it is generated, stored, or maintained (including, 16 among other things, testimony, transcripts, and tangible things), that are produced or 17 generated in disclosures or responses to discovery in this matter. 18 2.7. Expert: a person with specialized knowledge or experience in a matter 19 pertinent to the litigation who has been retained by a Party or its counsel to serve as 20 an expert witness or as a consultant in this Action, including support staff. Both 21 experts, and any of their support staff who actively review any materials marked 22 RESTRICTED 23 CONFIDENTIAL SOURCE CODE” for the purpose of helping that expert form an 24 opinion in this case, are subject to the requirements of Section 7.2(c) below. 25 2.8. - ATTORNEYS’ EYES ONLY” or “RESTRICTED House Counsel: attorneys who are employees of a party to this Action. 26 House Counsel does not include Outside Counsel of Record or any other outside 27 counsel. 28 6 2.9. 1 2 Non-Party: any natural person, partnership, corporation, association or other legal entity not named as a Party to this action. 3 2.10. Outside Counsel of Record: attorneys who are not employees of a party 4 to this Action but are retained to represent or advise a party to this Action and have 5 appeared in this Action on behalf of that party or are affiliated with a law firm that 6 has appeared on behalf of that party, and includes support staff. 7 2.11. Party: any party to this Action, including all of its officers, directors, 8 employees, consultants, retained experts, and Outside Counsel of Record (and their 9 support staffs). 2.12. Producing Party: a Party or Non-Party that produces Disclosure or 10 11 Discovery Material in this Action. 12 2.13. Professional Vendors: persons or entities that provide litigation support 13 services (e.g., photocopying, videotaping, translating, preparing exhibits or 14 demonstrations, and organizing, storing, or retrieving data in any form or medium) 15 and their employees and subcontractors. 16 2.14. Protected Material: any Disclosure or Discovery Material that is 17 designated as “CONFIDENTIAL,” “RESTRICTED - ATTORNEYS’ EYES 18 ONLY,” “RESTRICTED CONFIDENTIAL SOURCE CODE,” or “PRIVACY 19 DATA.” 2.15. Receiving Party: a Party that receives Disclosure or Discovery Material 20 21 from a Producing Party. 22 3. SCOPE 23 The protections conferred by this Stipulation and Order cover not only 24 Protected Material (as defined above), but also (1) any information copied or 25 extracted from Protected Material; (2) all copies, excerpts, summaries, or 26 compilations of Protected Material; and (3) any testimony, conversations, or 27 presentations by Parties or their Counsel that might reveal Protected Material. 28 7 1 Any use of Protected Material at trial shall be governed by the orders of the 2 trial judge, rather than this Order. Subject to any challenges under Section 6, below, 3 the Parties will not oppose any reasonable request by the Producing Party that the 4 courtroom be sealed, if allowed by the Court, during the presentation of any 5 testimony, evidence, or argument relating to or involving the use of any Protected 6 Material. 7 4. DURATION 8 Once a case proceeds to trial, information that was designated as 9 CONFIDENTIAL or maintained pursuant to this protective order used or introduced 10 as an exhibit at trial becomes public and will be presumptively available to all 11 members of the public, including the press, unless compelling reasons supported by 12 specific factual findings to proceed otherwise are made to the trial judge in advance 13 of the trial. See Kamakana, 447 F.3d at 1180-81 (distinguishing “good cause” 14 showing for sealing documents produced in discovery from “compelling reasons” 15 standard when merits-related documents are part of court record). Accordingly, the 16 terms of this protective order do not extend beyond the commencement of the trial. 17 5. 18 DESIGNATING PROTECTED MATERIAL 5.1. Exercise of Restraint and Care in Designating Material for Protection. 19 Each Party or Non-Party that designates information or items for protection under 20 this Order must take care to limit any such designation to specific material that 21 qualifies under the appropriate standards. The Designating Party must designate for 22 protection only those parts of material, documents, items or oral or written 23 communications that qualify so that other portions of the material, documents, items 24 or communications for which protection is not warranted are not swept unjustifiably 25 within the ambit of this Order. 26 Mass, indiscriminate or routinized designations are prohibited. Designations 27 that are shown to be clearly unjustified or that have been made for an improper 28 8 1 purpose (e.g., to unnecessarily encumber the case development process or to impose 2 unnecessary expenses and burdens on other parties) may expose the Designating 3 Party to sanctions. 4 If it comes to a Designating Party’s attention that information or items that it 5 designated for protection do not qualify for protection, that Designating Party must 6 promptly notify all other Parties that it is withdrawing the inapplicable designation. 7 5.2. Manner and Timing of Designations. Except as otherwise provided in 8 this Order (see, e.g., second paragraph of section 5.2(a) below), or as otherwise 9 stipulated or ordered, Disclosure or Discovery Material that qualifies for protection 10 under this Order must be clearly so designated before the material is disclosed or 11 produced. 12 13 Designation in conformity with this Order requires: (a) for information in documentary form (e.g., paper or electronic 14 documents, but excluding transcripts of depositions or other pretrial proceedings), 15 that the Producing Party affix, at a minimum, the legend “CONFIDENTIAL,” 16 “RESTRICTED 17 CONFIDENTIAL SOURCE CODE,” or “PRIVACY DATA” 18 “Designating Legend”), to each page that contains protected material. If only a 19 portion of the material on a page qualifies for protection, the Producing Party also 20 must clearly identify the protected portion(s) (e.g., by making appropriate markings 21 in the margins). - ATTORNEYS’ EYES ONLY,” “RESTRICTED - (hereinafter 22 A Party or Non-Party that makes original documents available for inspection 23 need not designate them for protection until after the inspecting Party has indicated 24 which documents it would like copied and produced. During the inspection and 25 before the designation, all of the material made available for inspection shall be 26 deemed “RESTRICTED - ATTORNEYS’ EYES ONLY.” After the inspecting 27 Party has identified the documents it wants copied and produced, the Producing 28 9 1 Party must determine which documents, or portions thereof, qualify for protection 2 under this Order. Then, before producing the specified documents, the Producing 3 Party must affix Designating Legends to each page that contains Protected Material. 4 If only a portion of the material on a page qualifies for protection, the Producing 5 Party also must clearly identify the protected portion(s) (e.g., by making appropriate 6 markings in the margins). 7 (b) for testimony given in depositions or hearings, that the 8 Designating Party, at the deposition or hearing or within ten (10) days after receipt 9 of a deposition or hearing transcript, designate the deposition or hearing transcript 10 or any portion thereof as “CONFIDENTIAL,” “RESTRICTED - ATTORNEYS’ 11 EYES ONLY,” “RESTRICTED - CONFIDENTIAL SOURCE CODE,” or 12 “PRIVACY DATA” pursuant to this Order, by affixing a Designating Legend to 13 each page that contains Protected Material. If only a portion of the material on a 14 page qualifies for protection, the Producing Party also must clearly identify the 15 protected portion(s) (e.g., by making appropriate markings in the margins). Access 16 to the deposition or hearing transcript so designated shall be limited in accordance 17 with the terms of this Order. Until expiration of the 10-day period, the entire 18 deposition or hearing transcript shall be treated as RESTRICTED - ATTORNEYS’ 19 EYES ONLY. 20 (c) for electronic files and documents produced in native electronic 21 format, that the Producing Party append, at a minimum, the legend 22 “CONFIDENTIAL,” 23 “RESTRICTED - CONFIDENTIAL SOURCE CODE,” or “PRIVACY DATA” 24 (hereinafter “Designating Legend”) to the file names or designators information 25 indicating whether the file contains “CONFIDENTIAL,” “RESTRICTED - 26 ATTORNEYS’ EYES ONLY,” or “RESTRICTED CONFIDENTIAL SOURCE “RESTRICTED - 27 28 10 ATTORNEYS’ EYES ONLY,” 1 CODE” material, or shall use any other reasonable method for so designating 2 Protected Materials produced in electronic format. (d) 3 for information produced in some form other than documentary 4 and for any other tangible items, that the Producing Party affix in a prominent place 5 on the exterior of the container or containers in which the information is stored the 6 legend “CONFIDENTIAL,” “RESTRICTED - ATTORNEYS’ EYES ONLY,” 7 “RESTRICTED CONFIDENTIAL SOURCE CODE,” or “PRIVACY DATA.” If 8 only a portion or portions of the information warrants protection, the Producing 9 Party, to the extent practicable, shall identify the protected portion(s). 5.3. 10 To the extent a producing Party believes in good faith that certain 11 Protected Material qualifying to be designated CONFIDENTIAL is so sensitive that 12 its dissemination deserves even further limitation, the producing Party may 13 designate such Protected Material “RESTRICTED - ATTORNEYS’ EYES ONLY,” 14 or to the extent such Protected Material includes or substantially reveals computer 15 source code1 and/or live data (that is, data as it exists residing in a database or 16 databases), the producing Party may designate such Protected Material as 17 “RESTRICTED CONFIDENTIAL SOURCE CODE” (“Source Code Material”), or 18 to the extent such Protected Material includes any information that a producing Party 19 reasonably believes to be subject to federal, state or foreign Data Protection Laws or 20 21 22 23 24 25 26 27 28 “Source code” means computer code, formulas, engineering specifications, or schematics that define or otherwise describe in detail the algorithms or structure of software or hardware designs. Source code includes software, source code, executable code, object code (i.e., computer instructions and data definitions expressed in a form suitable for input to an assembler, compiler, or other translator), microcode, register transfer language (“RTL”), firmware, and hardware description language (“HDL”), as well as any and all programmer notes, annotations, and other comments of any type related thereto and accompanying the code. For avoidance of doubt, this includes source files, make files, intermediate output files, executable files, header files, resource files, library files, module definition files, map files, object files, linker files, browse info files, and debug files. 1 11 1 other privacy obligations, the producing Party may designate such Protected 2 Material as “PRIVACY DATA”. 3 6. CHALLENGING CONFIDENTIALITY DESIGNATIONS 6.1. 4 Timing of Challenges. Any Party or Non-Party may challenge a 5 designation of confidentiality at any time that is consistent with the Court’s 6 Scheduling Order. 6.2. 7 8 resolution process under Local Rule 37-1 et seq. 6.3. 9 10 Meet and Confer. The Challenging Party shall initiate the dispute Joint Stipulation. Any challenge submitted to the Court shall be via a joint stipulation pursuant to Local Rule 37-2. 6.4. 11 The burden of persuasion in any such challenge proceeding shall be on 12 the Designating Party. Frivolous challenges, and those made for an improper 13 purpose (e.g., to harass or impose unnecessary expenses and burdens on other 14 parties) may expose the Challenging Party to sanctions. Unless the Designating 15 Party has waived or withdrawn the confidentiality designation, all parties shall 16 continue to afford the material in question the level of protection to which it is 17 entitled under the Producing Party’s designation until the Court rules on the 18 challenge. 19 7. 20 ACCESS TO AND USE OF PROTECTED MATERIAL 7.1. Basic Principles. A Receiving Party may use Protected Material that is 21 disclosed or produced by another Party or by a Non-Party in connection with this 22 Action only for prosecuting, defending, or attempting to settle this Action, and may 23 not use Protected Material for any other purpose whatsoever, including, without 24 limitation, any other litigation, patent prosecution or acquisition, patent 25 reexamination, inter parties review, or reissue proceedings, or any business or 26 competitive purpose or function. Such Protected Material may be disclosed only to 27 the categories of persons and under the conditions described in this Order, and 28 12 1 Protected Material shall not be distributed, disclosed, or made available to anyone 2 except as expressly provided in this Order. When the Action has been terminated, a 3 Receiving Party must comply with the provisions of section 14 below (FINAL 4 DISPOSITION). 5 Protected Material must be stored and maintained by a Receiving Party at a 6 location and in a secure manner that ensures that access is limited to the persons 7 authorized under this Order. 7.2. 8 9 Disclosure of “CONFIDENTIAL” Information or Items. Unless otherwise ordered by the court or permitted in writing by the Designating Party, a 10 Receiving Party may disclose 11 “CONFIDENTIAL” only to: 12 (a) any information or item designated the Receiving Party’s Outside Counsel of Record in this Action, 13 as well as employees of said Outside Counsel of Record to whom it is reasonably 14 necessary to disclose the information for this Action; (b) 15 16 the officers, directors, and employees (including House Counsel) of the Receiving Party to whom disclosure is reasonably necessary for this Action; (c) 17 Outside Counsel or Experts (as defined in this Order) of the 18 Receiving Party to whom disclosure is reasonably necessary for this Action and who 19 have signed the “Acknowledgment and Agreement to Be Bound” (Exhibit A), 20 provided that (1) before access to an Expert is given, the Expert has completed the 21 Undertaking attached as Exhibit A hereto and the same is served upon the producing 22 Party with a current curriculum vitae2 of the Expert at least seven (7) days before 23 24 25 26 27 For any such person, the curriculum vitae shall identify his/her (i) current employer(s), (ii) each person or entity from whom s/he has received compensation or funding for work in his or her areas of expertise or to whom the s/he has provided professional services, including in connection with a litigation, at any time during the preceding five years; (iii) (by name and number of the case, filing date, and 2 28 13 1 access to the Protected Material is to be given to that Expert. The Designating Party 2 may, within the seven (7) days, notify the receiving Party in writing that it objects 3 to disclosure of Protected Material to the Expert, and state its reasons for objection. 4 The Parties agree to promptly confer and use good faith to resolve any such 5 objection. If the Parties are unable to resolve any objection, the objecting Party may 6 file a motion with the Court within three (3) days of a meet and confer at which the 7 parties agree that they are at an impasse, or within such other time as the Parties may 8 agree, seeking a protective order with respect to the proposed disclosure. The 9 objecting Party shall have the burden of proving the need for a protective order. No 10 disclosure shall occur until all such objections are resolved by agreement or Court 11 order; 12 (d) the court and its personnel; 13 (e) court reporters and their staff; 14 (f) professional jury or trial consultants, mock jurors, and 15 Professional Vendors to whom disclosure is reasonably necessary for this Action 16 and who have signed the “Acknowledgment and Agreement to Be Bound” (Exhibit 17 A); (g) 18 the author or recipient of a document containing the information 19 or a custodian or other person who otherwise possessed or knew the information; 20 and 21 22 23 24 25 26 27 28 location of court) any litigation in connection with which the s/he has offered expert testimony, including through a declaration, report, or testimony at a deposition or trial, during the preceding five years. If such consultant or expert believes any of this information is subject to a confidentiality obligation to a third-party, then the s/he should provide whatever information can be disclosed without violating any confidentiality agreements, and the Party seeking to disclose Protected Material to the consultant or expert shall be available to meet and confer with the designating Party regarding any such engagement. 14 (h) 1 any mediator or settlement officer, and their supporting 2 personnel, mutually agreed upon by any of the parties engaged in settlement 3 discussions. 7.3. 4 For Protected Material designated RESTRICTED - ATTORNEYS’ 5 EYES ONLY, access to, and disclosure of, such Protected Material shall be limited 6 to individuals listed in Sections 7.2(a) and (c-h), above, and up to one House Counsel 7 for the Parties who is a member in good standing of at least one state bar and has 8 responsibility for making decisions dealing directly with the litigation of this Action, 9 but who exercises no competitive decision-making authority on behalf of either 10 11 12 13 Party. 7.4. For Protected Material designated RESTRICTED CONFIDENTIAL SOURCE CODE, the following additional restrictions apply: (a) Access to a Party’s Source Code Material shall be provided only 14 on “stand-alone” computer(s) (that is, the computer may not be linked to any 15 network, including a local area network (“LAN”), an intranet or the Internet) in a 16 secured locked room. The stand-alone computer(s) may be connected to a printer. 17 The stand-alone computer(s) must be part of a setup including an external monitor, 18 keyboard, mouse, table or desk, and chair. And each stand-alone computer shall 19 have at least the following software or equivalent loaded and available at the time of 20 source code review: (1) Linux/Ubuntu (including functionality for regex, libreoffice, 21 vim, python, a pdf reader, and the ability to print to PDF), (2) Visual Studio Code or 22 Eclipse with C, C++, and Java, and (3) build-essential. The stand-alone computer(s) 23 may only be located within the United States at the offices of the producing Party’s 24 outside counsel. The stand-alone computer(s) shall have disk encryption and be 25 password protected. 26 input/output device (e.g., USB memory stick, mobile phone or tablet, camera or any 27 camera-enabled device, CD, floppy disk, portable hard drive, laptop, or any device Except as otherwise provided, use or possession of any 28 15 1 that can access the Internet or any other network or external system, etc.) is 2 prohibited while accessing the computer containing the source code. All persons 3 entering the locked room containing the stand-alone computer(s) must attest that 4 they are not carrying any prohibited items before they will be given access to the 5 stand-alone computer(s). The producing Party may periodically physically “check 6 in” on the receiving Party’s representatives during any stand-alone computer review 7 and may intermittently (i.e., not continuously) visually monitor the activities of the 8 receiving Party’s representatives by knocking on the door to or from outside the 9 room in which the stand alone computer(s) is located to ensure that no unauthorized 10 copying of the Source Code Material is being made or transmitted. The producing 11 Party may not monitor by way of video or recording devices or record (visually, 12 audibly or by other means) the activities of the receiving Party’s representatives; (b) 13 The receiving Party shall make reasonable efforts to restrict its 14 requests for such access to the stand-alone computer(s) to normal business hours, 15 which for purposes of this paragraph shall be 9:00 a.m. through 5:00 p.m. However, 16 upon reasonable notice from the receiving party, the producing Party shall make 17 reasonable efforts to accommodate the receiving Party’s request for access to the 18 stand-alone computer(s) outside of normal business hours. The Parties agree to 19 cooperate in good faith such that maintaining the producing Party’s Source Code 20 Material at the offices of its outside counsel shall not unreasonably hinder the 21 receiving Party’s ability to efficiently and effectively conduct the prosecution or 22 defense of this Action; (c) 23 The producing Party shall provide the receiving Party with 24 information explaining how to start, log on to, and operate the stand-alone 25 computer(s) in order to access the produced Source Code Material on the stand-alone 26 computer(s); 27 28 16 (d) 1 2 The producing Party will produce Source Code Material in computer searchable format on the stand-alone computer(s) as described above; (e) 3 Access to Source Code Material shall be limited to Outside 4 Counsel of Record and up to three (3) Experts per party 3 (not existing employees or 5 affiliates of a Party or an affiliate of a Party) retained for the purpose of this litigation 6 and approved to access such Protected Materials pursuant to 7.2(c) above. (f) 7 To the extent portions of Source Code Material are quoted in an 8 electronic document or image of a document which must be filed or served (“Source 9 Code Document”), either (1) the entire Source Code Document will be stamped and 10 treated as RESTRICTED CONFIDENTIAL SOURCE CODE or (2) those pages 11 containing quoted Source Code Material will be separately stamped and treated as 12 RESTRICTED CONFIDENTIAL SOURCE CODE; (g) 13 Except as set forth in this and the preceding paragraph, no 14 electronic copies of Source Code Material shall be made without prior written 15 consent of the producing Party. The receiving Party may create documents with an 16 electronic copy or image of limited excerpts of Source Code Material (“Source Code 17 Documents”) only to the extent necessary to create Source Code Documents, or any 18 drafts of these documents 4. The receiving Party shall only include such excerpts as 19 are reasonably necessary for the purposes for which such part of the Source Code 20 Material is used. Images or copies of Source Code Material shall not be included in 21 correspondence between the parties (references to production numbers shall be used 22 instead) and shall be omitted from pleadings and other papers except to the extent 23 permitted herein. Any electronic transmission of a file containing a selected portion 24 of the Source Code Material must be encrypted using one of the following software: 25 26 27 28 Herein, MediaPointe, Inc. and AMHC, Inc. are a single party. Drafts of a Source Code Document shall only include those excerpts the Receiving Party believes will be included in the final version of the Source Code Document. 3 4 17 1 BitLocker, FileVault, LUKS, or VeraCrypt. The communication and/or disclosure 2 of electronic files containing any portion of Source Code Material shall at all times 3 be limited to individuals who are authorized to see Source Code Material under the 4 provisions of this Protective Order. Additionally, all electronic copies of Source 5 Code Documents must be labeled “RESTRICTED CONFIDENTIAL SOURCE 6 CODE.” If Source Code Documents are filed with the Court, they must be filed 7 under seal in accordance with the Court’s rules, procedures and orders; 8 (h) No person shall copy, e-mail, transmit, upload, download, print, 9 photograph or otherwise duplicate any portion of the designated “RESTRICTED 10 CONFIDENTIAL SOURCE CODE” material, except that the Receiving Party may 11 request paper copies (“Source Code Printouts”) of limited portions of the Source 12 Code Material, but only if and to the extent reasonably necessary for the preparation 13 of court filings, pleadings, expert reports, or other papers, or for deposition or trial. 14 The producing Party shall print for the Receiving Party no more than three (3) sets 15 of Source Code Material and no more than 50 consecutive pages, for an aggregate 16 total of no more than 1000 pages, during the duration of the case. The Receiving 17 Party may file a motion for leave to print a limited number of additional pages above 18 an aggregate total of 1000 pages upon a showing of good cause. The receiving Party 19 shall not request paper copies for the purposes of reviewing the source code other 20 than electronically as set forth in Section 7.4(a) in the first instance. Within three 21 (3) business days or such additional time as reasonably necessary due to the volume 22 of pages requested, the Producing Party will provide the requested material on 23 watermarked or colored paper bearing Bates numbers and the legend 24 “RESTRICTED CONFIDENTIAL SOURCE CODE” unless objected to as 25 discussed below. Even if within the limits described, the producing Party may, upon 26 a showing of good cause, challenge the amount of source code requested in hard 27 copy form or whether the source code requested in hard copy form is reasonably 28 18 1 necessary to any case preparation activity pursuant to the dispute resolution 2 procedure and timeframes set forth in Section 6, above, whereby the producing Party 3 is the “Challenging Party” for purposes of dispute resolution. Contested Source 4 Code Printouts do not need to be produced to the receiving Party until the matter is 5 resolved by the Court; (i) 6 If the receiving Party’s outside counsel, consultants, or experts 7 obtain printouts of Source Code Material, the receiving Party shall ensure that such 8 outside counsel, consultants, or experts keep the printouts in a secured locked area 9 in the offices of such outside counsel, consultants, or expert. The receiving Party 10 may also temporarily keep the printouts or photocopies at: (i) the Court for any 11 proceedings(s) relating to the Source Code Material, for the dates associated with 12 the proceeding(s); (ii) the sites where any deposition(s) relating to the Source Code 13 Material are taken, for the dates associated with the deposition(s); and (iii) any 14 intermediate location reasonably necessary to transport the printouts to a Court 15 proceeding or deposition); (j) 16 A producing Party’s Source Code Material may only be 17 transported by the receiving Party at the direction of Outside Counsel of Record 18 authorized under Section 7.4(e) above to another person authorized under Section 19 7.4(e) above, on paper or removable electronic media (e.g., a DVD, CD-ROM, or 20 flash memory “stick”) via hand carry, Federal Express or other similarly reliable 21 courier. Any Source Code Material that is stored electronically must be kept in a 22 secured container (e.g., Bitlocker or equivalent) and must be further password 23 protected. 24 electronically over a network of any kind, including a LAN, an intranet, or the 25 Internet. 26 reasonably necessary for filing any Source Code material with the Court. 27 Notwithstanding anything else in this Protective Order, the Parties may make Source Code Material may not be transported or transmitted Source Code Material may only be transported electronically as is 28 19 1 electronic copies, and send by electronic mail, copies of Source Code Documents, 2 and any notes taken during Source Code review pursuant to Section 7.4(k), below, 3 as part of their preparation of draft pleadings and/or expert reports in this case, 4 provided that any such documents sent by electronic mail are sent in a password- 5 protected file using 256-bit or higher encryption, with the password sent via separate 6 electronic mail; 7 (k) The Receiving Party shall be entitled to take notes (electronic or 8 non-electronic) relating to the Source Code but may not copy the Source Code into 9 such notes. To the extent the Receiving Party desires to take notes electronically, 10 the Producing Party shall provide a note-taking computer (e.g., a computer, which 11 is distinct from the standalone computer, that is not linked to any network, including 12 a local area network (“LAN”), an intranet or the Internet, and has image making 13 functionality of any type disabled, including but not limited to camera or video 14 functionality) (“note-taking computer”) with a current, widely used word processing 15 program in the Source Code review room for the Receiving Party’s use in taking 16 such notes. The “note-taking computer” shall be used for the sole purpose of note- 17 taking and shall be retained by the Producing Party. Such notes shall be downloaded 18 to a removable disk or drive for the Receiving Party (but not the Producing Party) to 19 retain, and the computer cleared of such notes. The laptop computer shall have no 20 features which would hinder the complete clearing of the Receiving Party’s notes 21 after such notes have been downloaded. Any such notes shall not include copies or 22 reproductions of portions of the source code; however, the notes may contain 23 filenames, directory names, module names, class names, parameter names, variable 24 names, function names, method names, or procedure names. No copies of any 25 portion of the source code may leave the room in which the source code is inspected 26 except as otherwise provided herein. Further, no other written or electronic record 27 of the source code is permitted except as otherwise provided herein. No notes shall 28 20 1 be made or stored on the inspection computer or left behind at the site where the 2 inspection computer is made available, and any such notes shall be deleted or 3 destroyed by the producing Party, without reviewing the substance of the notes, upon 4 discovery. Notwithstanding the foregoing, any such notes shall be stamped and 5 treated as “RESTRICTED CONFIDENTIAL SOURCE CODE.” The log of such 6 notes need not be produced to any other party absent Court Order (e.g., potentially 7 in connection with a Protective Order violation motion); 8 (l) A list of names of persons who will review Source Code Material 9 on the standalone computer(s) will be provided to the producing Party in conjunction 10 with any written (including email) notice requesting inspection. Prior to the first 11 inspection of any Source Code Material on the stand-alone computer(s), the 12 receiving Party shall provide three (3) business days’ notice to schedule the initial 13 inspection with the producing Party. The receiving Party shall provide reasonable 14 advance notice of any additional inspections. Such notice shall include the names 15 for every individual from the receiving Party who will attend the inspection. The 16 producing Party may maintain a daily log of the names of persons who enter the 17 locked room to view the source code and when they enter and depart; 18 (m) The receiving Party’s outside counsel shall maintain a log of all 19 copies of the Source Code Printouts (received from a producing Party) that are 20 delivered by the receiving Party to any person and a log of any electronic images of 21 Source Code Material. The log shall include the names of the recipients and 22 reviewers of copies and locations where the copies are stored. Upon request by the 23 producing Party, the receiving Party shall provide reasonable assurances and/or 24 descriptions of the security measures employed by the receiving Party and/or person 25 that receives a copy of any portion of the source code; and 26 27 (n) At the Producing Party’s request, all copies of any portion of the Source Code Printouts in whatever form shall be securely destroyed if they are no 28 21 1 longer in use. Copies of Source Code Printouts that are marked as deposition 2 exhibits shall not be provided to the Court Reporter or attached to deposition 3 transcripts; rather, the deposition record will identify the exhibit by its production 4 number(s). 5 7.5. For Protected Material designated PRIVACY DATA, the following 6 additional restrictions apply: 7 (a) “PRIVACY DATA”: refers to any information that a producing 8 Party reasonably believes to be subject to federal, state or foreign Data Protection 9 Laws or other privacy obligations. This provision may not be arbitrarily applied, 10 and is meant as means to designate and secure support data, where available, that is 11 believed to be subject to Data Protection Laws if the receiving party requests to 12 inspect or challenge anonymized summary data. The parties must promptly meet 13 and confer to resolve any disputes regarding a PRIVACY DATA designation. 14 Privacy Data constitutes highly sensitive materials requiring special protection. 15 Examples of such Data Protection Laws include, without limitation, The Gramm- 16 Leach-Bliley Act, 15 U.S.C. § 6801 et seq. (financial information); The Health 17 Insurance Portability and Accountability Act (“HIPAA”) and the regulations 18 thereunder, 45 CFR Part 160 and Subparts A and E of Part 164 (medical 19 information); Regulation (EU) 2016/679 Of the European Parliament and of the 20 Council of 27 April 2016 on the Protection of Natural Persons with Regard to the 21 Processing of Personal Data and on the Free Movement of Such Data, also known 22 as the General Data Protection Regulation (“GDPR”); and the German Federal Data 23 Protection Act (“BDSG”). 24 25 26 27 (b) PRIVACY DATA must be treated with the same provisions as Protected Material designated RESTRICTED CONFIDENTIAL SOURCE CODE. (c) To the extent practical, PRIVACY DATA included in documents, information, or material must be redacted so that the documents, 28 22 1 information, or material can be produced in the ordinary course. For these redacted 2 documents, information, or materials, the receiving party may request that 3 unredacted versions be produced on the source code computer in accordance with 4 Section 7.4 above. (d) 5 If such redactions are not practical to make (e.g., the PRIVACY 6 DATA is clustered in log files or batch files), then the documents, information, or 7 material containing the PRIVACY DATA may be produced on the source code 8 computer in accordance with Section 7.4 above. 9 7.6. Absent written consent from the designating Party, any person 10 associated or affiliated with the Parties and permitted to receive each Party’s 11 Protected Material, who reviews, or otherwise learns, in whole or in part, each 12 Party’s Protected Material marked RESTRICTED - ATTORNEYS’ EYES ONLY 13 or RESTRICTED - CONFIDENTIAL SOURCE CODE under this Order shall not 14 prepare, prosecute, supervise, participate in, or assist in the preparation or 15 prosecution of any U.S., foreign, or international patent application pertaining to (a) 16 content delivery networks (CDNs), (b) any Microsoft products, services, or systems 17 accused by MediaPointe in this Action, (c) the patents asserted in this Action and 18 any patent or application claiming priority to or otherwise related to the patents 19 asserted in this Action (collectively the “Field of Invention”) or (d) any patent 20 application related to the subject matter of any Protected Material marked 21 RESTRICTED 22 CONFIDENTIAL SOURCE CODE, during the pendency of this Action and for (2) 23 years after its conclusion, including any appeals. For purposes of this paragraph, 24 “prosecution” includes any activity related to the competitive business decisions 25 involving (i) the preparation or prosecution (for any person or entity) of patent 26 applications, including among others reexamination and reissue applications or (ii) 27 directly or indirectly participating, drafting, amending, advising, or otherwise - ATTORNEYS’ EYES 28 23 ONLY or RESTRICTED - 1 affecting the scope or maintenance of patent claims. 5 However, these prohibitions 2 shall not preclude each Party’s outside counsel or Expert from participating in any 3 inter partes review, CBM, or post-grant review proceedings, provided that each 4 Party’s outside counsel or Expert do not participate in any claim drafting or 5 amendment of claims in such proceedings. 7.7. 6 Absent written consent from the designating Party, during the pendency 7 of this Action and for (2) years after its conclusion, including any appeals, any 8 person associated or affiliated with the Parties and permitted to receive each Party’s 9 Protected Material, who reviews, or otherwise learns, in whole or in part, another 10 Party’s Protected Material marked RESTRICTED - ATTORNEYS’ EYES ONLY 11 or RESTRICTED - CONFIDENTIAL SOURCE CODE under this Order shall not 12 advise or decide on the purchase or acquisition of any third-party patent or patent 13 application to assert against any Microsoft products, services, or systems (1) accused 14 by MediaPointe in any counterclaims or infringement contentions in this Action, 15 including Microsoft Azure CDN or any Microsoft content delivery networks, or (2) 16 whose particular technical details, including design, structure, or functionality, are 17 described in any Protected Material marked RESTRICTED – ATTORNEYS’ EYES 18 ONLY or RESTRICTED – CONFIDENTIAL SOURCE CODE. Agreement to the 19 acquisition bar shall not preclude any Party or person associated or affiliated with 20 the Parties from seeking a subsequent modification upon a showing of good cause 21 to modify the provision should new facts or information be discovered and the 22 parties are unable to reach an agreement on a compromise following a meet and 23 confer. 7.8. 24 25 26 27 28 Protected Material produced in this litigation may contain Export Controlled Information. Prosecution includes, for example, original prosecution, reissue, and reexamination proceedings. 5 24 (a) 1 “Export Controlled Information” refers to any information 2 subject to applicable export control and economic sanctions laws and regulations, 3 including the Export Administration Regulations (“EAR”, 15 CFR 730 et seq., 4 http://www.bis.doc.gov/) administered by the Department of Commerce, Bureau of 5 Industry and Security, and the Foreign Asset Control Regulations (31 CFR 500 et 6 seq., 7 Department of Treasury, Office of Foreign Assets Control (“OFAC”), and similar 8 laws and regulations in other jurisdictions (“Export Control Laws”). http://www.treas.gov/offices/enforcement/ofac/) (b) 9 administered by the The Producing Party will produce Protected Material to 10 Receiving Parties within the United States, to the extent authorized by Export 11 Control Laws. Receiving Parties may not export, re-export, transfer, disclose, or 12 release (collectively, “Export”) any Export Controlled Information to any 13 destination, person, entity, or end use without first obtaining approval from the U.S. 14 government or as otherwise authorized by Export Control Laws. Outside Counsel, 15 Experts, or other individuals authorized to receive Export Controlled Information 16 will not Export any Export Controlled Information to any foreign person except as 17 permitted by Export Control Laws, and will not transport any Export Controlled 18 Information outside of U.S. territory, without first obtaining approval from the U.S. 19 government or as otherwise authorized by Export Control Laws. Compliance with 20 all Export Control Laws is the sole responsibility of the Receiving Party. 21 7.9. No material designated RESTRICTED CONFIDENTIAL SOURCE 22 CODE may leave the territorial boundaries of the United States. Protected Material 23 that is not designated RESTRICTED CONFIDENTIAL SOURCE CODE may be 24 taken outside the United States if it is both reasonably necessary for a deposition 25 taken in a foreign country and to the extent authorized by Export Control Laws. 26 Nothing in this provision shall prevent Outside Counsel or Experts from travelling 27 outside the United States with their personal electronic devices, including laptops 28 25 1 and/or cellphones, or reviewing their electronic mail while traveling abroad, 2 provided such activities comply with Export Control Laws. 3 contained within this subsection may be amended through the consent of the 4 producing Party to the extent that such agreed to procedures comply with Export 5 Control Laws. The restrictions 6 7.10. Nothing contained herein shall be construed to prejudice any Party’s 7 right to use any Protected Material in taking testimony at any deposition or hearing 8 provided that the Protected Material is only disclosed to person(s) who are: (i) 9 eligible to have access to the Protected Material by virtue of his or her employment 10 with the designating party, (ii) identified in the Protected Material as an author, 11 addressee, or copy recipient of such information, (iii) although not identified as an 12 author, addressee, or copy recipient of such Protected Material, has, in the ordinary 13 course of business, seen or could be expected to see or receive such Protected 14 Material, (iv) court reporters and videographers; (v) the Court; or (vi) other persons 15 entitled hereunder to access to Protected Material. Subject to any challenge to a 16 particular designation under Section 6, above, the Parties will not oppose any 17 reasonable request by the designating Party that the courtroom be sealed, if allowed 18 by the Court, during the presentation of any testimony, evidence, or argument 19 relating to or involving the use of any Protected Material. 20 8. PROTECTED MATERIAL SUBPOENAED OR ORDERED PRODUCED 21 IN OTHER LITIGATION 22 If a Party is served with a subpoena or a court order issued in other litigation 23 that compels disclosure of any information or items designated in this Action as 24 “CONFIDENTIAL,” that Party must: 25 26 (a) promptly notify in writing the Designating Party. notification shall include a copy of the subpoena or court order; 27 28 26 Such (b) 1 promptly notify in writing the party who caused the subpoena or 2 order to issue in the other litigation that some or all of the material covered by the 3 subpoena or order is subject to this Protective Order. Such notification shall include 4 a copy of this Stipulated Protective Order; and (c) 5 cooperate in good faith with respect to all reasonable procedures 6 sought to be pursued by the Designating Party whose Protected Material may be 7 affected. 8 If the Designating Party timely seeks a protective order, the Party served with 9 the subpoena or court order shall not produce any information designated in this 10 action as “CONFIDENTIAL” before a determination by the court from which the 11 subpoena or order issued, unless the Party has obtained the Designating Party’s 12 permission. The Designating Party shall bear the burden and expense of seeking 13 protection in that court of its confidential material and nothing in these provisions 14 should be construed as authorizing or encouraging a Receiving Party in this Action 15 to disobey a lawful directive from another court. 16 9. 17 18 A NON-PARTY’S PROTECTED MATERIAL SOUGHT TO BE PRODUCED IN THIS LITIGATION (a) The terms of this Order are applicable to information produced 19 by a Non-Party in this Action and designated as “CONFIDENTIAL.” 20 information produced by Non-Parties in connection with this litigation is protected 21 by the remedies and relief provided by this Order. Nothing in these provisions 22 should be construed as prohibiting a Non-Party from seeking additional protections. 23 (b) Such In the event that a Party is required, by a valid discovery request, 24 to produce a Non-Party’s confidential information in its possession, and the Party is 25 subject to an agreement with the Non-Party not to produce the Non-Party’s 26 confidential information, then the Party shall: 27 28 27 (1) 1 promptly notify in writing the Requesting Party and the 2 Non-Party that some or all of the information requested is subject to a confidentiality 3 agreement with a Non-Party; (2) 4 promptly provide the Non-Party with a copy of the 5 Stipulated Protective Order in this Action, the relevant discovery request(s), and a 6 reasonably specific description of the information requested; and (3) 7 make the information requested available for inspection by 8 the Non-Party, if requested. 9 (c) If the Non-Party fails to seek a protective order from this court 10 within 14 days of receiving the notice and accompanying information, the Receiving 11 Party may produce the Non-Party’s confidential information responsive to the 12 discovery request. If the Non-Party timely seeks a protective order, the Receiving 13 Party shall not produce any information in its possession or control that is subject to 14 the confidentiality agreement with the Non-Party before a determination by the 15 court. Absent a court order to the contrary, the Non-Party shall bear the burden and 16 expense of seeking protection in this court of its Protected Material. 17 10. UNAUTHORIZED DISCLOSURE OF PROTECTED MATERIAL 18 If a Receiving Party learns that, by inadvertence or otherwise, it has disclosed 19 Protected Material to any person or in any circumstance not authorized under this 20 Stipulated Protective Order, the Receiving Party must immediately (a) notify in 21 writing the Designating Party of the unauthorized disclosures, (b) use its best efforts 22 to retrieve all unauthorized copies of the Protected Material, (c) inform the person 23 or persons to whom unauthorized disclosures were made of all the terms of this 24 Order, and (d) request such person or persons to execute the “Acknowledgment and 25 Agreement to Be Bound” that is attached hereto as Exhibit A. 26 27 28 28 1 11. INADVERTENT PRODUCTION OF PRIVILEGED OR OTHERWISE 2 PROTECTED MATERIAL 3 When a Producing Party gives notice to Receiving Parties that certain 4 inadvertently produced material is subject to a claim of privilege or other protection, 5 the obligations of the Receiving Parties are those set forth in Federal Rule of Civil 6 Procedure 26(b)(5)(B). This provision is not intended to modify whatever procedure 7 may be established in an e-discovery order that provides for production without prior 8 privilege review. Pursuant to Federal Rule of Evidence 502(d) and (e), insofar as 9 the parties reach an agreement on the effect of disclosure of a communication or 10 information covered by the attorney-client privilege or work product protection, the 11 parties may incorporate their agreement in the stipulated protective order submitted 12 to the court. The parties hereby incorporate their agreements provided in their Joint 13 Report pursuant to Federal Rule of Civil Procedure 26. See Dkt. 52. 14 The failure to designate documents, information or material in accordance 15 with this Order and the failure to object to a designation at a given time shall not 16 preclude the filing of a motion at a later date seeking to impose such designation or 17 challenging the propriety thereof. The entry of this Order and/or the production of 18 documents, information and material hereunder shall in no way constitute a waiver 19 of any objection to the furnishing thereof, all such objections being hereby 20 preserved. 21 A designation of Protected Material (i.e., as “CONFIDENTIAL,” 22 “RESTRICTED - ATTORNEYS’ EYES 23 CONFIDENTIAL SOURCE CODE,” or “PRIVACY DATA”) may be made at any 24 time. Inadvertent or unintentional production of documents, information or material 25 that has not been designated as Protected Material shall not be deemed a waiver in 26 whole or in part of a claim for confidential treatment. Any party that inadvertently 27 or unintentionally produces Confidential Information without designating it as 28 29 ONLY,” “RESTRICTED 1 Protected Material may request destruction of that Protected Material by notifying 2 the recipient(s), as soon as reasonably practicable after the producing Party becomes 3 aware of the inadvertent or unintentional disclosure and providing replacement 4 Protected Material that is properly designated. The recipient(s) shall then destroy 5 all copies of the inadvertently or unintentionally produced Protected Materials and 6 any documents, information or material derived from or based thereon. 7 12. 8 9 MISCELLANEOUS 12.1. Right to Further Relief. Nothing in this Order abridges the right of any person to seek its modification by the Court in the future. 10 12.2. Right to Assert Other Objections. By stipulating to the entry of this 11 Protective Order, no Party waives any right it otherwise would have to object to 12 disclosing or producing any information or item on any ground not addressed in this 13 Stipulated Protective Order. Similarly, no Party waives any right to object on any 14 ground to use in evidence of any of the material covered by this Protective Order. 15 12.3. Filing Protected Material. A Party that seeks to file under seal any 16 Protected Material must comply with Local Civil Rule 79-5. Protected Material may 17 only be filed under seal pursuant to a court order authorizing the sealing of the 18 specific Protected Material at issue. If a Party’s request to file Protected Material 19 under seal is denied by the court, then the Receiving Party may file the information 20 in the public record unless otherwise instructed by the court. 21 12.4. Any Party knowing or believing that any other Party is in violation of 22 or intends to violate this Order and has raised the question of violation or potential 23 violation with the opposing Party and has been unable to resolve the matter by 24 agreement may move the Court for such relief as may be appropriate in the 25 circumstances. Pending disposition of the motion by the Court, the Party alleged to 26 be in violation of or intending to violate this Order shall discontinue the performance 27 28 30 1 of and/or shall not undertake the further performance of any action alleged to 2 constitute a violation of this Order. 3 12.5. The inadvertent production of Protected Material by any Party shall not 4 be deemed a publication of the documents, information, or material (or the contents 5 thereof) produced so as to void or make voidable whatever claim the Parties may 6 have as to the proprietary and confidential nature of the documents, information, or 7 other material or its contents. 8 12.6. Pursuant to Federal Rule of Evidence 502(d) and (e), the production of 9 a privileged or work product protected document is not a waiver of privilege or 10 protection from discovery in this case or in any other federal or state proceeding. 11 For example, the mere inadvertent production of a privileged or work product 12 protected document in this case as part of a production is not itself a waiver. The 13 inadvertent production by a Party of Discovery Material subject to the attorney- 14 client privilege, work-product protection, or any other applicable privilege or 15 protection will not waive the applicable privilege and/or protection if a request for 16 return of such inadvertently produced Discovery Material is made promptly after the 17 Producing Party learns of its inadvertent production. Upon a request from any 18 Producing Party who has inadvertently produced Discovery Material that it believes 19 is privileged and/or protected, each Receiving Party shall immediately destroy or 20 return such Protected Material or Discovery Material and all copies to the Producing 21 Party. The parties do not waive any objections as to the production, discoverability, 22 admissibility, or confidentiality of documents. 23 12.7. Each of the Parties shall also retain the right to file a motion with the 24 Court (a) to modify this Order to allow disclosure of Protected Material to additional 25 persons or entities if reasonably necessary to prepare and present this Action; and 26 (b) to apply for additional protection of Protected Material. 27 28 31 1 12.8. This Order shall be binding upon the Parties hereto, their attorneys, and 2 their successors, executors, personal representatives, administrators, heirs, legal 3 representatives, assigns, subsidiaries, divisions, employees, agents, retained 4 consultants and experts, and any persons or organizations over which they have 5 direct control. 6 13. 7 responsible for the interpretation and enforcement of this Agreed Protective Order. 8 After termination of this litigation, the provisions of this Agreed Protective Order 9 shall continue to be binding except with respect to those documents and information 10 that become a matter of public record. This Court retains and shall have continuing 11 jurisdiction over the Parties and recipients of the Protected Material for enforcement 12 of the provisions of this Agreed Protective Order following termination of this 13 litigation. All disputes concerning Protected Material produced under the protection 14 of this Agreed Protective Order shall be resolved by the United States District Court 15 for the Central District of California. In the event anyone shall violate or threaten to 16 violate the terms of this Protective Order, the aggrieved designating Party may 17 immediately apply to obtain injunctive relief against any such person violating or 18 threatening to violate any of the terms of this Protective Order. 19 14. The United States District Court for the Central District of California is FINAL DISPOSITION 20 After the final disposition of this Action, as defined in Section 4, within 60 21 days of a written request by the Designating Party, each Receiving Party must return 22 all Protected Material to the Producing Party or destroy such material. As used in 23 this subdivision, “all Protected Material” includes all copies, abstracts, compilations, 24 summaries, and any other format reproducing or capturing the Protected Material. 25 Whether the Protected Material is returned or destroyed, the Receiving Party must 26 submit a written certification to the Producing Party (and, if not the same person or 27 entity, to the Designating Party) by the 60 day deadline that (1) identifies (by 28 32 1 category, where appropriate) all the Protected Material that was returned or 2 destroyed and (2) affirms that the Receiving Party has not retained any copies, 3 abstracts, compilations, summaries or any other format reproducing or capturing any 4 of the Protected Material. Notwithstanding this provision, Outside Counsel of 5 Record are entitled to retain an archival copy of all pleadings, motion papers, trial, 6 deposition, and hearing transcripts, legal memoranda, correspondence, deposition 7 and trial exhibits, expert reports, attorney work product, and consultant and expert 8 work product, even if such materials contain Protected Material. Any such archival 9 copies that contain or constitute Protected Material remain subject to this Protective 10 Order as set forth in Section 4 (DURATION). 11 15. 12 13 VIOLATION Any violation of this Order may be punished by appropriate measures including, without limitation, contempt proceedings and/or monetary sanctions. 14 15 IT IS SO STIPULATED, THROUGH COUNSEL OF RECORD. 16 17 18 19 20 21 22 23 24 25 26 27 28 33 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Dated: February 9, 2023 /s/_Betty Chen Betty Chen (SBN 290588) FISH & RICHARDSON P.C. 633 West 5th Street, 26th Floor Los Angeles, CA 90071 Telephone: (213) 533-4240 Fax: 650-839-5071 Email: bchen@fr.com Jason W. Wolff (SBN 215819) wolff@fr.com Elliot N. Scher (pro hac vice) scher@fr.com FISH & RICHARDSON P.C. 12860 El Camino Real, Suite 400 San Diego, CA 92130 Telephone: (858) 678-5070 Fax: 858-678-5099 Counsel for Plaintiff Microsoft Corporation 16 17 18 19 20 21 22 23 24 25 26 27 28 34 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Dated: February 9, 2023 /s/ Justin Kenney Kalpana Srinivasan ksrinivasan@susmangodfrey.com SUSMAN GODFREY L.L.P. 1900 Avenue of the Stars, Suite 1400 Los Angeles, California 90067-6029 Telephone: (310) 789-3100 Facsimile: (310) 789-3150 Meng Xi mxi@susmangodfrey.com Thomas V. DelRosario tdelrosario@susmangodfrey.com Justin Kenney (pro hac vice) jkenney@susmangodfrey.com SUSMAN GODFREY L.L.P. 1000 Louisiana, Suite 5100 Houston, Texas 77002-5096 Telephone: (713) 651-9366 Facsimile: (713) 654-6666 Counsel for Defendant and Counterclaimant, MediaPointe, Inc. and Defendant AMHC, Inc 18 19 FOR GOOD CAUSE SHOWN, IT IS SO ORDERED. 20 21 February 9, 2023 DATED: ________________________ 22 23 24 25 /s/ Michael R. Wilner ________________________________ HON. MICHAEL R. WILNER United States Magistrate Judge 26 27 28 35 1 FILER’S ATTESTATION 2 3 Pursuant to Local Rule 5-4.3.4(a)(2), the filer hereby attests that all other signatories to this document concur in the content of, and have authorized, this filing. 4 Dated: February 9, 2023 5 6 7 8 9 10 11 /s/ Justin Kenney Justin C. Kenney jkenney@susmangodfrey.com SUSMAN GODFREY L.L.P. 1000 Louisiana Street, Suite 5100 Houston, TX 77002 T: (713) 651-9366 F: (713) 654-6666 Counsel for Defendants MediaPointe, Inc. and AMHC, Inc. 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 36 1 EXHIBIT A 2 ACKNOWLEDGMENT AND AGREEMENT TO BE BOUND 3 4 I, ______________________________________________ [print or type full name], of 5 _______________________________________________________ [print or type full address], 6 declare under penalty of perjury that I have read in its entirety and understand the Stipulated 7 Protective Order that was issued by the United States District Court for the Central District of 8 California on ______________ in the case of Microsoft Corporation v. MediaPointe, Inc. et al., 9 No. 2:22-cv-01009-MCS-MRW (C.D. Cal.). I agree to comply with and to be bound by all the 10 terms of this Stipulated Protective Order and I understand and acknowledge that failure to so 11 comply could expose me to sanctions and punishment in the nature of contempt. I solemnly 12 promise that I will not disclose in any manner any information or item that is subject to this 13 Stipulated Protective Order to any person or entity except in strict compliance with the provisions 14 of this Order. 15 I further agree to submit to the jurisdiction of the United States District Court for the Central 16 District of California for enforcing the terms of this Stipulated Protective Order, even if such 17 enforcement proceedings occur after termination of this action. 18 I hereby 19 __________________________________________________________________________ 20 [print or type full address and telephone number] as my California agent for service of process in 21 connection with this action or any proceedings related to enforcement of this Stipulated Protective 22 Order. 23 Date: _________________________ 24 City and State where sworn and signed: ________________________________ 25 Printed name:______________________________________ appoint _____________________________ [print or type full name] of 26 27 Signature:_________________________________________ 28 37

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?