XR Communications, LLC v. D-Link Systems, Inc.

Filing 113

STIPULATED PROTECTIVE ORDER BETWEEN XR COMMUNICATIONS DBA VIVATO TECHNOLOGIES AND CISCO SYSTEMS, INC. by Magistrate Judge Jay C. Gandhi re Stipulation for Protective Order 110 . (kh)

Download PDF
1 Counsel Listed on Signature Page 2 3 4 UNITED STATES DISTRICT COURT 5 CENTRAL DISTRICT OF CALIFORNIA 6 SANTA ANA DIVISION 7 8 9 10 11 12 XR COMMUNICATIONS dba VIVATO TECHNOLOGIES, Plaintiff, v. D-LINK SYSTEMS, INC., et al. Defendants. 13 14 15 ) ) ) ) ) ) ) ) ) ) ) ) ) ) CASE NO. 8:17-cv-0596-AG(JCGx) consol with SACV 17-0674AG(JCGx), EDCV 17-0744AG(JCGx), CV 17-2945-AG(JCGx), CV 17-2948-AG(JCGx), CV 17-2951AG(JCGx), CV 17-2953-AG(JCGx), CV 17-2959-AG(JCGx), CV 17-2961AG(JCGx) and CV 17-2968-AG(JCGx) STIPULATED PROTECTIVE ORDER BETWEEN XR COMMUNICATIONS DBA VIVATO TECHNOLOGIES AND CISCO SYSTEMS, INC. Hon. Andrew J. Guilford 16 17 18 19 20 21 22 23 24 25 26 27 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE CISCO CASE NO. 8:17-cv-0596-AG(JGCx) 1 XR Communications, LLC, dba Vivato Technologies, Cisco Systems, Inc., (all the 2 above collectively the “Parties,” individually a “Party”), by and through their respective 3 counsel of record, stipulate that the following Stipulated Protective Order shall apply in 4 the above-captioned action, subject to approval and entry by the Court: 5 1. PURPOSE AND LIMITS OF THIS ORDER 6 The Parties agree discovery in this action is likely to involve confidential, 7 proprietary, or private information requiring special protection from public disclosure and 8 from use for any purpose other than this litigation. Accordingly, the Parties hereby 9 stipulate to and petition the Court to enter this Stipulated Protective Order. The Parties 10 acknowledge that this Order does not confer blanket protections on all disclosures or 11 responses to discovery, and the protection it gives from public disclosure and use extends 12 only to the specific material entitled to confidential treatment under the applicable legal 13 principles. The Parties further acknowledge that this Order does not automatically 14 authorize the filing under seal of material designated under this Order. Instead, the 15 Parties must comply with L.R. 79-5.1 if they seek to file anything under seal. This Order 16 does not govern the use at trial of material designated under this Order. 17 2. DESIGNATING PROTECTED MATERIAL 18 2.1 Over-Designation Prohibited. Any party or non-party who designates 19 information or items for protection under this Order as “CONFIDENTIAL,” “HIGHLY 20 CONFIDENTIAL – ATTORNEY EYES ONLY,” or “HIGHLY CONFIDENTIAL – 21 SOURCE CODE” (a “designator”) must only designate specific material that qualifies 22 under the appropriate standards. To the extent practicable, only those parts of documents, 23 items, or oral or written communications that require protection shall be designated. 24 Designations with a higher confidentiality level when a lower level would suffice are 25 prohibited. Mass, indiscriminate, or routinized designations are prohibited. Unjustified 26 designations expose the designator to sanctions, including the Court’s striking all 27 confidentiality designations made by that designator. Designation under this Order is 28 allowed only if the designation is necessary to protect material that, if disclosed to [PROPOSED] STIPULATED PROTECTIVE ORDER 1 CASE NO. 8:17-cv-0596-AG(JGCx) 1 persons not authorized to view it, would cause competitive or other recognized harm. 2 Material may not be designated if it has been made public, or if designation is otherwise 3 unnecessary to protect a secrecy interest. If a designator learns that information or items 4 that it designated for protection do not qualify for protection at all or do not qualify for 5 the level of protection initially asserted, that designator must promptly notify all parties 6 that it is withdrawing the mistaken designation. 7 2.2 Manner and Timing of Designations. Designation under this Order 8 requires the designator to affix the applicable legend (“CONFIDENTIAL,” “HIGHLY 9 CONFIDENTIAL – ATTORNEY EYES ONLY,” or “HIGHLY CONFIDENTIAL – 10 SOURCE CODE”) to each page that contains protected material. For testimony given in 11 deposition or other proceeding, the designator shall specify all protected testimony and 12 the level of protection being asserted. It may make that designation during the deposition 13 or proceeding, or may invoke, on the record or by written notice to all parties on or 14 before the next business day, a right to have up to 21 days from the deposition or 15 proceeding to make its designation. 16 2.2.1 A party or non-party that makes original documents or materials 17 available for inspection need not designate them for protection until after the 18 inspecting party has identified which material it would like copied and produced. 19 During the inspection and before the designation, all material shall be treated as 20 HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY. After the inspecting 21 party has identified the documents it wants copied and produced, the producing 22 party must designate the documents, or portions thereof, that qualify for protection 23 under this Order. 24 2.2.2 Parties shall give advance notice if they expect a deposition or other 25 proceeding to include designated material so that the other parties can ensure that 26 only authorized individuals are present at those proceedings when such material is 27 disclosed or used. The use of a document as an exhibit at a deposition shall not in 28 any way affect its designation. Transcripts containing designated material shall [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 2 CASE NO. 8:17-cv-0596-AG(JGCx) 1 have a legend on the title page noting the presence of designated material, and the 2 title page shall be followed by a list of all pages (including line numbers as 3 appropriate) that have been designated, and the level of protection being asserted. 4 The designator shall inform the court reporter of these requirements. Any 5 transcript that is prepared before the expiration of the 21-day period for 6 designation shall be treated during that period as if it had been designated 7 HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY unless otherwise 8 agreed. After the expiration of the 21-day period, the transcript shall be treated 9 only as actually designated. 10 2.3 Inadvertent Failures to Designate. An inadvertent failure to designate does 11 not, standing alone, waive protection under this Order. Upon timely assertion or 12 correction of a designation, all recipients must make reasonable efforts to ensure that the 13 material is treated according to this Order. 14 3. CHALLENGING CONFIDENTIALITY DESIGNATIONS 15 All challenges to confidentiality designations shall proceed under L.R. 37-1 16 through L.R. 37-4. 17 4. ACCESS TO DESIGNATED MATERIAL 18 4.1 Basic Principles. A receiving party may use designated material only for 19 this litigation. Designated material may be disclosed only to the categories of persons 20 and under the conditions described in this Order. 21 4.2 Disclosure of CONFIDENTIAL Material Without Further Approval. 22 Unless otherwise ordered by the Court or permitted in writing by the designator, a 23 receiving party may disclose any material designated CONFIDENTIAL only to: 24 4.2.1 The receiving party’s outside counsel of record in this action and 25 employees of outside counsel of record to whom disclosure is reasonably 26 necessary; 27 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 3 CASE NO. 8:17-cv-0596-AG(JGCx) 1 4.2.2 The officers, directors, and employees of the receiving party to whom 2 disclosure is reasonably necessary, and who have signed the Agreement to Be 3 Bound (Exhibit A); 4 4.2.3 Experts retained by the receiving party’s outside counsel of record to 5 whom disclosure is reasonably necessary, and who have signed the Agreement to 6 Be Bound (Exhibit A); 7 4.2.4 The Court and its personnel; 8 4.2.5 Outside court reporters and their staff, professional jury or trial 9 consultants, and professional vendors to whom disclosure is reasonably necessary, 10 and who have signed the Agreement to Be Bound (Exhibit A); 11 4.2.6 During their depositions, witnesses in the action to whom disclosure is 12 reasonably necessary and who have signed the Agreement to Be Bound (Exhibit 13 A); and 14 4.2.7 The author or recipient of a document containing the material, or a 15 custodian or other person who otherwise possessed or knew the information. 16 4.3 Disclosure of HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY 17 and HIGHLY CONFIDENTIAL – SOURCE CODE Material Without Further 18 Approval. Unless permitted in writing by the designator, a receiving party may disclose 19 material designated HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or 20 HIGHLY CONFIDENTIAL – SOURCE CODE without further approval only to: 21 4.3.1 The receiving party’s outside counsel of record in this action and 22 employees of outside counsel of record to whom it is reasonably necessary to 23 disclose the information; 24 4.3.2 The Court and its personnel; 25 4.3.3 Outside court reporters and their staff, professional jury or trial 26 consultants, and professional vendors to whom disclosure is reasonably necessary, 27 and who have signed the Agreement to Be Bound (Exhibit A); and 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 4 CASE NO. 8:17-cv-0596-AG(JGCx) 1 4.3.4 The author or recipient of a document containing the material, or a 2 custodian or other person who otherwise possessed or knew the information. 3 4.4 Procedures for Approving or Objecting to Disclosure of HIGHLY 4 CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – 5 SOURCE CODE Material to In-House Counsel or Experts. Unless agreed to in 6 7 writing by the designator: 4.4.1 A party seeking to disclose to in-house counsel any material designated 8 HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY must first make a 9 written request to the designator providing the full name of the in-house counsel, 10 the city and state of such counsel’s residence, and such counsel’s current and 11 reasonably foreseeable future primary job duties and responsibilities in sufficient 12 detail to determine present or potential involvement in any competitive decision- 13 making. In-house counsel are not authorized to receive material designated 14 HIGHLY CONFIDENTIAL – SOURCE CODE. 15 4.4.2 A party seeking to disclose to an expert retained by outside counsel of 16 record any information or item that has been designated HIGHLY 17 CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – 18 SOURCE CODE must first make a written request to the designator that (1) 19 identifies the general categories of HIGHLY CONFIDENTIAL – ATTORNEY 20 EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE information that 21 the receiving party seeks permission to disclose to the expert, (2) sets forth the full 22 name of the expert and the city and state of his or her primary residence, (3) 23 attaches a copy of the expert’s current resume, (4) identifies the expert’s current 24 employer(s), (5) identifies each person or entity from whom the expert has 25 received compensation or funding for work in his or her areas of expertise 26 (including in connection with litigation) in the past five years, and (6) identifies 27 (by name and number of the case, filing date, and location of court) any litigation 28 where the expert has offered expert testimony, including by declaration, report, or [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 5 CASE NO. 8:17-cv-0596-AG(JGCx) 1 testimony at deposition or trial, in the past five years. If the expert believes any of 2 this information at (4) - (6) is subject to a confidentiality obligation to a third party, 3 then the expert should provide whatever information the expert believes can be 4 disclosed without violating any confidentiality agreements, and the party seeking 5 to disclose the information to the expert shall be available to meet and confer with 6 the designator regarding any such confidentiality obligations. 7 4.4.3 A party that makes a request and provides the information specified in 8 paragraphs 4.4.1 or 4.4.2 may disclose the designated material to the identified in- 9 house counsel or expert unless, within seven days of delivering the request, the 10 party receives a written objection from the designator providing detailed grounds 11 for the objection. 12 13 14 4.4.4 All challenges to objections from the designator shall proceed under L.R. 37-1 through L.R. 37-4. 5. SOURCE CODE 15 5.1 Designation of Source Code. If production of source code is necessary, a 16 party may designate it as HIGHLY CONFIDENTIAL – SOURCE CODE if it is, or 17 includes, confidential, proprietary, or trade secret source code. 18 5.2 Location and Supervision of Inspection. Any HIGHLY CONFIDENTIAL – 19 SOURCE CODE produced in discovery shall be made available for inspection, in a 20 format allowing it to be reasonably reviewed and searched, during normal business hours 21 or at other mutually agreeable times, at an office of the designating party’s counsel or 22 another mutually agreeable location. The source code shall be made available for 23 inspection on a secured stand-alone computer (that is, a computer not connected to a 24 network, the Internet, or any peripheral device, except that the stand-alone computer may 25 be connected to a printer or printers and dual-display monitors and will have a mouse 26 connected, all other ports must be disabled) in a secured room, and the inspecting party 27 shall not copy, remove, or otherwise transfer any portion of the source code onto any 28 recordable media or recordable device. No recordable media or recording devices of any [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 6 CASE NO. 8:17-cv-0596-AG(JGCx) 1 kind, including without limitation cameras, cellular telephones, CDs, DVDs, and disk 2 drives, may be permitted into the room containing the source code computers (other than 3 the non-networked computer that the producing party will provide for purposes of typing 4 notes).The producing party may visually monitor the activities of the inspecting party’s 5 representatives during any source code review, but only to ensure that there is no 6 unauthorized recording, copying, or transmission of the source code. 7 The receiving party’s outside counsel and/or expert shall be entitled to take notes 8 relating to the source code. Such notes shall not be used as an end-run around the limits 9 on printing source code set forth in this Order. The receiving party’s outside counsel 10 and/or expert may copy terms used in the source code into the notes only to the extent 11 reasonably necessary to support or rebut the claims and defenses of the parties in this 12 case. The receiving party’s outside counsel and/or expert may not copy complete code 13 modules or lines of the source code into the notes. If the notes contain any source code, 14 then the notes will be treated and marked as “HIGHLY CONFIDENTIAL – SOURCE 15 CODE.” Otherwise, such notes shall be considered and marked as “HIGHLY 16 CONFIDENTIAL – ATTORNEYS’ EYES ONLY.” To the extent that the receiving 17 party’s outside counsel and/or expert requests to take notes electronically, rather than by 18 handwriting, the producing party shall provide a non-networked laptop computer in the 19 room in which a source code computer is located, which the receiving party’s outside 20 counsel and/or expert may use to type their notes. The laptop will be connected to a 21 nonnetworked printer and shall include both Notepad++ and sdelete software utilities. 22 The receiving party’s outside counsel and/or expert may print a copy of their notes at the 23 end of each day of review only on paper pre-marked with the appropriate confidentiality 24 designation, which will be provided by the producing party. Such notes shall be 25 considered the work product of the receiving party; and the producing party shall make 26 no attempt to retrieve the receiving party’s notes from the non-networked computer. The 27 receiving party’s expert may scan the printed notes into electronic files so long as the 28 notes do not contain source code. Such scanning may be performed only on a non[PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 7 CASE NO. 8:17-cv-0596-AG(JGCx) 1 networked scanner (to be provided by the producing party) connected to the non- 2 networked laptop computer in the room in which a source code computer is located. Such 3 scanned copy of the notes may be copied from the non-networked laptop onto an 4 encrypted flash drive (the Producing Party will provide two such flash drives, which may 5 be reused throughout the action), which the reviewer may take with them at the end of the 6 day. Any notes generated from the source code review may be shared with outside 7 counsel and with any outside experts or consultants who are approved to view material 8 designated “HIGHLY CONFIDENTIAL – SOURCE CODE” or “HIGHLY 9 CONFIDENTIAL – ATTORNEYS’ EYES ONLY” under paragraph 4.3 of this Order. 10 One paper copy of the reviewer’s notes may be made for outside counsel, and one 11 additional paper copy may be made for each authorized outside expert or consultant (up 12 to a maximum of 5 copies total for all experts and consultants). No electronic “soft” 13 copies of the reviewer’s notes may be made except as otherwise permitted under this 14 Order. Notice shall be provided to the Producing Party when any copy of a reviewer’s 15 notes is created or transmitted under this paragraph. Except as permitted above, no copies 16 of all or any portion of source code may leave the room in which the source code is 17 inspected except as otherwise provided herein. Further, no other written or electronic 18 record of source code is permitted except as otherwise provided herein. Finally, there 19 shall be no wholesale copying of source code. 20 5.3 Persons Having Access to Source Code. At least five (5) business days prior 21 to the date on which first access by a particular individual is sought to the secured stand- 22 alone computer (five-day notice period), outside counsel of record for the inspecting 23 party shall provide a list of individuals, including attorneys, seeking to access to the 24 stand-alone computer. The producing party shall have the right to object to such access 25 in accordance with this Section 4.4. During the pendency of the five-day notice period, 26 no listed individual shall have access to the stand-alone computer, unless otherwise 27 agreed by the parties. If an objection to any specific listed individual is made, that 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 8 CASE NO. 8:17-cv-0596-AG(JGCx) 1 individual shall not have access to the stand-alone computer until resolution of such 2 objection. 3 5.4 Paper Copies of Source Code Excerpts. Except as otherwise provided herein, 4 no copies of any portion of the source code may leave the secure location in which the 5 source code is inspected. Further, except as provided herein, no written or electronic 6 record of the source code is permitted. Notwithstanding the foregoing, the inspecting 7 party may request printed copies of specific portions of source code designated as 8 HIGHLY CONFIDENTIAL - SOURCE CODE. Within two (2) business days of the 9 printing request, the producing party must either (i) provide up to three (3) paper copies 10 of source code designated as HIGHLY CONFIDENTIAL – SOURCE CODE including 11 Bates numbers and appropriate confidentiality labels when printed, as they appear on any 12 stand-alone computers, of each requested file, correlated to the beginning Bates number 13 of the corresponding print-out, or, alternatively, the producing party may brand printouts 14 with the filepath and filename of each file, as it appears on any stand-alone computer; or 15 (ii) object that a printing request is excessive and/or not done for a permitted purpose. 16 The producing party must retain copies of any portions of source code printed. The entire 17 code or an unreasonably large portion of the code must not be requested. The inspecting 18 party is not entitled to request copies in order to review blocks of source code designated 19 as HIGHLY CONFIDENTIAL – SOURCE CODE elsewhere in the first instance, i.e., as 20 an alternative to reviewing the materials electronically on the stand-alone computers 21 provided by the producing party, as the parties acknowledge and agree that the purpose of 22 the protections herein would be frustrated by printing portions of code for review and 23 analysis elsewhere. Printouts of the source code that exceed 50 continuous pages or 15% 24 or more of a specific software release will be presumed excessive unless the inspecting 25 party provides a compelling justification that such printed portions are necessary. For 26 example, if the requested portion of the source code comprises a complete code module 27 that is directly relevant to the operation of the accused instrumentality, yet that requested 28 portion exceeds the aforementioned page limits, such request may be deemed a [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 9 CASE NO. 8:17-cv-0596-AG(JGCx) 1 compelling justification. If the producing party objects within two (2) business days of a 2 printing request that the printing request is excessive and/or not done for a permitted 3 purpose, the producing party and inspecting party will meet and confer within two (2) 4 business days of the producing party’s objection. If the producing party and the 5 inspecting party cannot resolve the objection, the inspecting party may, within two (2) 6 business days after the meet and confer, seek the Court’s resolution of whether the 7 request is narrowly tailored for a permitted purpose. The burden will be on the inspecting 8 party to demonstrate that such portions are no more than is reasonably necessary for a 9 permitted purpose, and not merely for the purpose of review and analysis in another 10 11 location. 5.5 Access Record. The inspecting party shall maintain a record of any individual 12 who has inspected any portion of the source code in electronic or paper form and such 13 record shall include (i) the name of each person who accessed the source code; (ii) the 14 date of access; and (iii) the location of access. The inspecting party must produce such 15 log to the producing party within one month of final disposition of this action or, during 16 this action, upon seven (7) business days’ advance notice to inspecting party only when 17 the producing party has a good faith reasonable basis for believing that a violation of 18 Section 5.4 of this Stipulated Protective Order has occurred and explains the basis for 19 such belief in writing at the time of the request for the log. The inspecting party shall 20 maintain all paper copies of any printed portions of the source code in a secured, locked 21 area at the office of the inspecting party’s outside counsel of record in this action. The 22 inspecting party may not reproduce the paper copies of the source code, absent written 23 agreement of the producing party. The inspecting party shall not convert any of the 24 information contained in the paper copies into any electronic format other than for the 25 preparation of a pleading, exhibit, expert report, discovery document, deposition 26 transcript, or other Court document. Any paper copies used during a deposition shall be 27 retrieved at the end of each day and must not be left with a court reporter or any other 28 unauthorized individual. [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 10 CASE NO. 8:17-cv-0596-AG(JGCx) 1 5.6 Use of Source Code in Deposition. A party that wants to use any printouts of 2 Source Code designated as HIGHLY CONFIDENTIAL – SOURCE CODE at a 3 deposition must notify the producing party in writing at least three (3) calendar days 4 before the date of the deposition about the specific pages the party intends to actually use 5 at the deposition by Bates production number, and the producing party will bring printed 6 copies of those portions of the code to the deposition. Copies of source code designated 7 as HIGHLY CONFIDENTIAL – SOURCE CODE that are marked as deposition exhibits 8 must not be provided to the court reporter or attached to deposition transcripts; rather the 9 deposition record will identify such an exhibit by its production numbers. All printouts of 10 source code designated as HIGHLY CONFIDENTIAL – SOURCE CODE brought to a 11 deposition must be collected by the producing party at the conclusion of the deposition. 12 In addition (or as an alternative to the use of printouts at a deposition), the producing 13 party shall, on request, make a copy of the source code available on a single stand-alone 14 computer (but otherwise in the same format in which the source code is available under 15 Section 5.2 above) during depositions of witnesses who would otherwise be permitted 16 access to such source code. The requesting party shall make such requests at least seven 17 (7) calendar days before the deposition. The producing party shall make reasonable 18 efforts to comply with such a request made less than seven (7) calendar days before a 19 deposition, provided the request is made in good faith and could not reasonably under the 20 circumstances have been made sooner. 21 5.7 Electronic Images and Electronic Copies of Source Code. Except as 22 provided herein, absent express written permission from the producing party, the 23 inspecting party may not create electronic images, or any other images, or make 24 electronic copies, of the source code designated as HIGHLY CONFIDENTIAL – 25 SOURCE CODE from any paper copy of the source code for use in any manner 26 (including, by way of example only, the inspecting party may not scan source code 27 designated as HIGHLY CONFIDENTIAL – SOURCE CODE to a PDF or photograph 28 the code). Paper copies of the source code designated as HIGHLY CONFIDENTIAL – [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 11 CASE NO. 8:17-cv-0596-AG(JGCx) 1 SOURCE CODE also may not be converted by the inspecting party into an electronic 2 document, and may not be scanned using optical character recognition (“OCR”) 3 technology. The exception to this restriction is for the inspecting party’s expert reports, 4 including any rebuttal reports, and for filings with the Court (subject to the limitations 5 below). In order to safeguard the producing party’s source code that may be replicated in 6 an expert report, the parties agree that any copies of such reports that include any portion 7 of the producing party’s source code may not be transmitted electronically, but must be 8 served by hand delivery or via FedEx next-day delivery. If hard copy documents 9 containing material designated “HIGHLY CONFIDENTIAL - SOURCE CODE” are 10 transported via FedEx, the documents must be secured in a document lock-box. 11 Documents may also be delivered via FedEx next-day delivery on an encrypted USB 12 drive. For avoidance of doubt, copies of such reports where any source code has been 13 redacted or removed may be transmitted electronically subject, however, to the other 14 provisions herein. Images or copies of source code designated as HIGHLY 15 CONFIDENTIAL – SOURCE CODE must not be included in correspondence between 16 the parties (references to production numbers must be used instead), and must be omitted 17 from pleadings and other papers whenever possible. If the receiving party reasonably 18 believes that it needs to submit a portion of source code designated as HIGHLY 19 CONFIDENTIAL – SOURCE CODE as part of a filing with the Court, the parties must 20 meet and confer as to how to make such a filing while protecting the confidentiality of 21 the source code. If the parties are unable to reach agreement at the meet and confer about 22 how such filing shall be made, the inspecting party agrees that it must observe the 23 following minimum protections in making the filing: (i) the inspecting party will rely on 24 expert declarations or other means to describe the relevant feature or functionality of the 25 source code (including by identifying the corresponding production number(s) and line 26 number(s) of the referenced source code), rather than copying portions of the source code 27 into a filing, to the extent possible; (ii) if any portion of source code is included in a 28 filing, the inspecting party will copy the minimal amount of source code that is necessary [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 12 CASE NO. 8:17-cv-0596-AG(JGCx) 1 for purposes of that filing; (iii) the filing will be made only under seal, and all 2 confidential information concerning the source code must be redacted or removed in any 3 public versions of the filed documents; and (iv) the inspecting party’s communication 4 and/or disclosure of electronic files or other materials containing any portion of source 5 code in connection with a filing must at all times be limited solely to individuals who are 6 expressly authorized to view source code under the provisions of this Order, and all such 7 individuals must be identified on the log as reviewers and/or recipients of paper copies in 8 accordance with Section 5.4.. 9 6. PROSECUTION BAR 10 Absent written consent from the designator, any individual who receives access to 11 HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY 12 CONFIDENTIAL – SOURCE CODE information shall not be involved in the 13 prosecution of patents or patent applications concerning the field of the invention of the 14 patents-in-suit for the receiving party or its acquirer, successor, predecessor, or other 15 affiliate during the pendency of this action and for one year after its conclusion, including 16 any appeals. “Prosecution” means drafting, amending, advising on the content of, or 17 otherwise affecting the scope or content of patent claims or specifications. These 18 prohibitions shall not preclude counsel from participating in reexamination or inter partes 19 review proceedings to challenge or defend the validity of any patent, but counsel may not 20 participate in the drafting of amended claims in any such proceedings. 21 7. PROTECTED MATERIAL SUBPOENAED OR ORDERED PRODUCED IN OTHER LITIGATION 22 23 7.1 Subpoenas and Court Orders. This Order in no way excuses non-compliance 24 with a lawful subpoena or court order. The purpose of the duties described in this section 25 is to alert the interested parties to the existence of this Order and to give the designator an 26 opportunity to protect its confidentiality interests in the court where the subpoena or 27 order issued. 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 13 CASE NO. 8:17-cv-0596-AG(JGCx) 1 7.2 Notification Requirement. If a party is served with a subpoena or a court 2 order issued in other litigation that compels disclosure of any information or items 3 designated in this action as CONFIDENTIAL, HIGHLY CONFIDENTIAL – 4 ATTORNEY EYES ONLY, or HIGHLY CONFIDENTIAL – SOURCE CODE, that 5 party must: 6 7 7.2.1 Promptly notify the designator in writing. Such notification shall include a copy of the subpoena or court order; 8 9 7.2.2 Promptly notify in writing the party who caused the subpoena or order to issue in the other litigation that some or all of the material covered by the 10 subpoena or order is subject to this Order. Such notification shall include a copy of 11 this Order; and 12 7.2.3 Cooperate with all reasonable procedures sought by the designator 13 whose material may be affected. 14 7.3 Wait For Resolution of Protective Order. If the designator timely seeks a 15 protective order, the party served with the subpoena or court order shall not produce any 16 information designated in this action as CONFIDENTIAL, HIGHLY CONFIDENTIAL – 17 ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE before a 18 determination by the court where the subpoena or order issued, unless the party has 19 obtained the designator’s permission. The designator shall bear the burden and expense 20 of seeking protection of its confidential material in that court. 21 8. UNAUTHORIZED DISCLOSURE OF DESIGNATED MATERIAL 22 If a receiving party learns that, by inadvertence or otherwise, it has disclosed 23 designated material to any person or in any circumstance not authorized under this Order, 24 it must immediately (1) notify in writing the designator of the unauthorized disclosures, 25 (2) use its best efforts to retrieve all unauthorized copies of the designated material, (3) 26 inform the person or persons to whom unauthorized disclosures were made of all the 27 terms of this Order, and (4) use reasonable efforts to have such person or persons execute 28 the Agreement to Be Bound (Exhibit A). [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 14 CASE NO. 8:17-cv-0596-AG(JGCx) 1 2 3 9. INADVERTENT PRODUCTION OF PRIVILEGED OR OTHERWISE PROTECTED MATERIA When a producing party gives notice that certain inadvertently produced material is 4 subject to a claim of privilege or other protection, the obligations of the receiving parties 5 are those set forth in Federal Rule of Civil Procedure 26(b)(5)(B). This provision is not 6 intended to modify whatever procedure may be established in an e-discovery order that 7 provides for production without prior privilege review pursuant to Federal Rule of 8 Evidence 502(d) and (e). 9 10. FILING UNDER SEAL 10 Without written permission from the designator or a Court order, a party may not 11 file in the public record in this action any designated material. A party seeking to file 12 under seal any designated material must comply with L.R. 79-5.1. Filings may be made 13 under seal only pursuant to a court order authorizing the sealing of the specific material at 14 issue. The fact that a document has been designated under this Order is insufficient to 15 justify filing under seal. Instead, parties must explain the basis for confidentiality of each 16 document sought to be filed under seal. Because a party other than the designator will 17 often be seeking to file designated material, cooperation between the parties in preparing, 18 and in reducing the number and extent of, requests for under seal filing is essential. If a 19 receiving party’s request to file designated material under seal pursuant to L.R. 79-5.1 is 20 denied by the Court, then the receiving party may file the material in the public record 21 unless (1) the designator seeks reconsideration within four days of the denial, or (2) as 22 otherwise instructed by the Court. 23 11. FINAL DISPOSITION 24 Within 60 days after the final disposition of this action, each party shall return all 25 designated material to the designator or destroy such material, including all copies, 26 abstracts, compilations, summaries, and any other format reproducing or capturing any 27 designated material. The receiving party must submit a written certification to the 28 designator by the 60-day deadline that (1) identifies (by category, where appropriate) all [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 15 CASE NO. 8:17-cv-0596-AG(JGCx) 1 the designated material that was returned or destroyed, and (2) affirms that the receiving 2 party has not retained any copies, abstracts, compilations, summaries, or any other format 3 reproducing or capturing any of the designated material. This provision shall not prevent 4 counsel from retaining an archival copy of all pleadings, motion papers, trial, deposition, 5 and hearing transcripts, legal memoranda, correspondence, deposition and trial exhibits, 6 expert reports, attorney work product, and consultant and expert work product, even if 7 such materials contain designated material. Any such archival copies remain subject to 8 this Order. 9 IT IS SO STIPULATED, THROUGH COUNSEL OF RECORD. 10 11 DATED: March 2, 2018 Respectfully submitted, 12 13 RUSS AUGUST & KABAT 14 By: /s/ Christian W. Conkle Marc A. Fenster Reza Mirzaie Philip X. Wang Kent N. Shum Christian W. Conkle Minna Y. Chan 15 16 17 18 19 21 Attorneys for Plaintiff XR COMMUNICATIONS, LLC, dba VIVATO TECHNOLOGIES 22 KIRKLAND & ELLIS LLP 20 23 By: /s/ Sarah E. Piepmeier Sarah E. Piepmeier Email: sarah.piepmeier@kirkland.com Adam R. Alper Email: adam .alper@kirkland.com Sarah L. Forney Email: sarah.forney@kirkland.com 555 California Street 24 25 26 27 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 16 CASE NO. 8:17-cv-0596-AG(JGCx) 1 San Francisco, CA 94104 Tele: 415/439-1400 Fax: 415/439-1500 2 3 Michael W. De Vries Email: michael.devries@kirkland.com KIRKLAND & ELLIS LLP 333 South Hope Street Los Angeles, CA 90071 Tele: 213/680-8400 Fax: 213/680-8500 4 5 6 7 Attorneys for Defendant CISCO SYSTEMS, INC. 8 9 10 11 12 13 14 SIGNATURE ATTESTATION Pursuant to Local Civil Rule 5-4.3.4(a)(2), the undersigned attests that the signatories listed, and on whose behalf this filing is submitted, concur in the filing’s content and have authorized the filing. DATED: March 2, 2018 15 /s/ Sarah E. Piepmeier Sarah E. Piepmeier 16 17 PURSUANT TO STIPULATION, IT IS SO ORDERED. 18 19 20 DATED: March 6, 2018 21 Honorable Judge Jay C. Gandhi United States Magistrate Judge 22 23 24 25 26 27 28 [PROPOSED] STIPULATED PROTECTIVE ORDER RE: CISCO 17 CASE NO. 8:17-cv-0596-AG(JGCx)

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?