Bradford Technologies, Inc. v. NCV Software.com et al

Filing 166

ORDER REGARDING FURTHER SANCTIONS. Signed by Magistrate Judge Elizabeth D. Laporte on 8/6/2013. (rmm2S, COURT STAFF) (Filed on 8/6/2013)

Download PDF
1 2 3 4 5 IN THE UNITED STATES DISTRICT COURT 6 FOR THE NORTHERN DISTRICT OF CALIFORNIA 7 8 BRADFORD TECHNOLOGIES, INC, Plaintiff, 9 ORDER REGARDING FURTHER SANCTIONS v. 10 ro ...... No. C 11-04621 EDL s 11 NCV SOFTWARE. COM, et al., =:.::: 12 Defendants. ____________________________./ CJ 0 .......... .......... ""' u .......... 13 14 s 15 sanctions. The sanctions issue arises from Plaintiffs president's (Jeff Bradford) and its counsel's 16 (Roger Wintle) admitted breach of a Stipulated Protected Order ("SPO"). Attorney Wintle turned 17 over Defendants' "attorney's eyes only" source code to Bradford, who viewed it. On December 6, 18 2013, the Court entered a stipulated order sanctioning Plaintiff in the amount of$96,939.27 for 19 violating the SPO. (Dkt. 131.) The Court deferred ruling on Defendants' request for terminating or 20 additional sanctions pending expedited discovery on the extent and impact of Plaintiffs use of 21 Defendants' source code, which has now been completed. (Dkt. 132.) t:<B =ro uu ..,.c..,. ~ 1-< ~.~ ~o ~ CIS Pending before the Court is Defendants' request for terminating, monetary, and evidentiary Q) .... ..c: "'t:: "g 0 ::=Z = Q) ;;;;J.;:i 1-< 0 ~:.I.. The parties briefed the issue of further sanctions, and the Court held a hearing on June 25, 2013. 22 23 At this hearing, the Court indicated that terminating sanctions were not warranted but that additional 24 monetary sanctions were. The Court also noted that evidentiary sanctions may be appropriate at trial. 25 After the hearing, Defendants requested a written ruling regarding sanctions. 26 II. 27 28 Background Plaintiff brings this case against Defendants for, among other things, breach of contract and misappropriation of trade secrets. Plaintiff alleges that Defendant Biggers worked as a computer programmer for Plaintiff, the developer of ClickForms and CompCruncher appraisal software, from 1 approximately 2007 to 2009. After Biggers was terminated, Plaintiff claims to have discovered 2 another software product on the market, Canvas, that was very similar to a version of CompCruncher 3 that Biggers participated in developing during his employment with Plaintiff. Plaintiffs lawsuit 4 followed. 5 In February 2012, the parties' counsel began negotiating a Stipulated Protective Order 6 ("SPO") in preparation for a mediation. Plaintiffs president, Jeff Bradford, signed an "Agreement 7 to be Bound by the Stipulated Protective Order" on April3, 2012. (Sneddon Decl. Ex. K, Dkt. 72- 8 2.) The Court entered the SPO in late May 2010. (Dkt. 55.) The SPO provided that material 9 designed Highly Confidential could not be shared with an opposing party or its officers. (Id.) 10 After Defendants transmitted their source code to Plaintiffs counsel Roger Wintle via 11 compact disc, Wintle gave the source code discs to Bradford in a sealed Federal Express envelope. 12 (10/29/12 Bradford Decl. 13 could deliver them to Blackbag Technologies for analysis. (Id. 14 not deliver the source code disc to Blackbag because he subsequently learned that they did not 15 perform software analysis. (10/29/12 Bradford Decl. 16 unopened FedEx envelope. (Id. ~ 18, Dkt. 83.) According to Bradford, he obtained the discs so that he ~ ~ ~~ 15-17.) Bradford states that he did 18.) Instead, Bradford states, he retained the 19.) 17 After several postponements, the parties scheduled a mediation for October 12, 2012. At 18 the mediation, the parties were going to exchange expert comparisons ofthe parties' source code. 19 Prior to the mediation, Bradford asked Mark Linne, one of Plaintiffs officers, to put together a 20 document comparing the user interface elements of Plaintiffs CompCruncher and Defendants' 21 Canvas applications for the mediation. (Supp. Sneddon Decl. Ex. D, Linne Dep. at 28.) Linne 22 created a comparison PowerPoint that compared screenshots of the two applications. (Id. at 28-29; 23 6/4/13 Linne Decl. 24 code, and he had no training in source code. (10/29/12 Linne Decl. 25 ~ 6.) According to Linne, at no time did he have access to the Canvas source ~ 3; 6/04/13 Linne Decl. ~ 4.) On October 9, 2012, not having hired any expert to analyze the Canvas source code, Bradford 26 decided to look at the Canvas source code himself to see if it contained any of Plaintiffs source 27 code. (10/29/12 Bradford Decl. 28 he realized that the zip files on the discs were password protected and emailed Wintle for the ~~ 22-23.) When Bradford went to look at the Canvas source code, 2 1 password. (2d Supp. Sneddon Decl. Ex. F.) Wintle responded 2 code, and Bradford used it. (Supp. Sneddon Decl. Ex. C, Brad rd Dep. at 66.) Bradford looked at 3 Canvas code for approximately two hours. (Id. at 79.) Bradfor also copied the Canvas source code 4 from the disc to his computer. (Id. at 81 . . 82.) According to Br ford, he had to copy the Canvas 5 source code files to open it and examine it. (Id.; 6/4/13 Bradfo 6 ith the password for the source Decl. ,-r 15.) Bradford examined the code using the Beyond Compar software and a Delphi program 7 environment. (Supp. Sneddon Decl. Ex. C, Bradford Dep. at 7 , 79.) According to Bradford, he did 8 not transfer the Canvas source code file to any other location o his computer or a USB storage 9 device or an external hard drive. (Supp. Sneddon Decl. Ex. C, radford Dep. at 82.) Bradford 10 11 claims he returned the discs to Wintle the next day. (10/29/12 radford Decl. ,-r 37.) At the October 12, 2012 mediation, Defendants learned ~or the first time that Wintle violated 12 the SPO by delivering the highly confidential discs to Bradford Bradford states that Defendants' 13 counsel verbally demanded that Bradford return all the discs an delete any copies that he might 14 have made. (6/4/13 Bradford Decl. ,-r 8.) Defendants' counsel trongly deny that they ever made 15 such a demand to Bradford. They further deny that they were e er in the same room as him at the 16 mediation. (2d Supp. Sneddon Decl. ,-r 8.) 17 1-< & Immediately after the mediation, Defendants' counselS eddon emailed Wintle and, among 18 other things, demanded that Wintle advise his clients to "prese e all documents in their possession, 19 custody or control relevant to this lawsuit, including any and al documents ... pertaining to their 20 access to my clients' source code and their 'analysis' of the tw programs." (Supp. Sneddon Decl. 21 Ex. A.) Defendants reiterated their preservation request in thei motion for sanctions filed October 22 12, 2012. (Dkt. 70 at 20.) 23 On Octo her 17, 20 13, Defendants filed counterclaims ainst Plaintiff for misappropriation 24 of trade secrets, intentional interference with prospective economic advantage, unfair competition 25 and injunctive relief, premised in part on Bradford's violation of the SPO. (Dkt. 76.) Among other 26 things, Defendants sought the return of the source code discs. 27 28 On October 18,2013, this Court set a briefing schedule for sanctions and ordered Plaintiffs counsel to "immediately return the three source code disks in question to Defendant's counsel, 3 1 destroy any electronic or hard copies of the disks generated therefrom, and preserve all data, source 2 code and documents derived in any way from the disks in question or the data contained on those 3 disks." (Dkt. 81.) The Court further ordered both parties "maintain in place an appropriate litigation 4 hold on all documents related to the claims and counterclaims at issue in this lawsuit, including but 5 not limited to their respective evaluations of the other side's code." (Id.) On October 24, 2012, 6 Plaintiff returned the discs to Defendants. (Stip. Sanctions Order at~ 4, Dkt. 131.) 7 Around the time that Plaintiff returned the discs, Bradford deleted the Canvas source code 8 from his computer by putting the Canvas source code files in the trash bin on his desktop and then 9 emptying it. (Supp. Sneddon Decl. Ex. C, Bradford Dep. at 83.) Bradford testified that he deleted 10 those files because he was instructed to do so, but he could not remember who told him to delete the E 11 source code files. (Id. at 97-98.) Bradford further testified that he preserved the comparison =:.::: c:s 12 documents he created when he looked at the Canvas source code. (Id. at 99.) ... ........... rll ... 13 Meanwhile, Mark Linne was in the process of wiping his work-issued laptop clean. In a 14 striking coincidence, according to Linne's June 2013 declaration, he notified Bradford verbally ~ c:s ...... t:~ Q uu ..,.c...., l;j 0 a. (.) 1-< ~ .~ rllo E = \ljt: 15 immediately after the mediation that he was going to leave Plaintiffs employ. (6/4/13 Linne Decl. 16 ~~ = 17 7.) Because he used this work laptop in developing a new business, he wanted to prevent Plaintiff 18 from accessing this "private and confidential information." (Id. 19 returned to Colorado after the mediation, he took his laptop to Staples and had the hard drive wiped. 20 (Id. 21 or heard of the Litigation Hold Memorandum or Sneddon's October 12, 2013 preservation request. 22 (Id. 23 could not produce the PowerPoint presentation Linne created for the October 12, 2012 mediation, 24 despite attempting to forensically recover it. (Supp. Sneddon Decl. Ex. F.) Q) ..... ...t:: "g 0 ;:: z Q) ~-5 1-< 0 ~ 25 7, 8.) Linne claims that he had decided to move on prior to the mediation. (6/4/13 Linne Decl. ~ ~ ~ ~ 9.) Consequently, when Linne 10.) Linne claims, both in his declaration and in his deposition testimony, that he had not seen 10; Supp. Sneddon Decl. Ex. D, Linne Dep. at 30-31.) Because of Linne's actions, Plaintiff On November 30, 2013, Wintle circulated a litigation hold memo to Defendants' counsel. 26 (Supp. Sneddon Decl. Ex. B.) There is no evidence, however, that Wintle circulated this 27 memorandum to Plaintiffs employees. Bradford testified that he believed it was circulated, but he 28 cannot recall when it was sent or who sent it. (Supp. Sneddon Decl. Ex. C, Bradford Dep. at 95-96.) 4 1 As noted above, on December 6, 2012, the Court entered the parties' stipulated sanctions 2 order and ordered Plaintiffto pay Defendants $96,939.27. (Dkt. 131.) The parties stipulated that 3 Plaintiff and Bradford willfully violated the SPO by taking possession of and reviewing the Canvas 4 source code. The order required Plaintiff to circulate a litigation hold memo, enjoined Bradford 5 from possessing and viewing any of Defendants' source code discs or code derived therefrom, and 6 provided for expedited discovery regarding what Bradford did with the Canvas source code. The 7 stipulated sanctions order also required Bradford to declare that he had not retained any copies of 8 Defendants' source code. (ld. ~ 2h.) 9 Additionally, the stipulated sanctions order, like the Court's previous order, required 10 Plaintiff, Bradford, and Wintle to preserve relevant evidence. Specifically, they were to preserve "all ·e t:c.S 11 documents in their possession, custody, or control relevant to this lawsuit, including without Q =:.:::: tlj 12 limitation any and all documents, emails, electronic files and other information pertaining to their .... ....... a.. _ ....... (.) .... .~ ....... ~ ,...<-+-< y 0 13 access to Defendants' source code and other trade secrets including BTl and Mr. Bradford's analysis ;.... 14 of Defendants' source code and any disclosure, copying, or use of that source code." (ld. e 15 1'-lt:: 16 Sneddon Decl. Ex. E, 12/7/12 Bradford Decl.) Bradford stated, among other things, that he 17 "individually and on behalf of BTl and AppraisalWorld have not retained any copies of Defendants' 18 source code." (ld.) tlj uu ~ ~o ~ ~ ~ 5.) On December 7, 2012, Bradford served on Defendants the required declaration. (Supp. Q) ... ,..s::::: -g 0 ;::Z = Q) ;;;;J,.S ;.... 0 J:,.l.; 19 The Court issued another order on January 4, 2013. The Court deferred ruling on the 20 terminating sanctions until the completion of discovery "on the extent and impact of Plaintiffs use 21 of Defendants' source code in violation of the SPO." (Dkt. 132.) From this point through June 2013, Defendants engaged in discovery regarding Bradford's 22 23 use of Canvas source code. Bradford continued to use his laptop, and the only step he took to 24 preserve the evidence on the laptop was not to delete the files on it. (Supp. Sneddon Decl. Ex. C., 25 Bradford Dep. at 98.) Because Bradford was still using his laptop, Defendants were not able to 26 arrange for forensic imaging of the laptop until January 21, 2013 at 1:00 p.m. (Supp. Sneddon Decl. 27 ~ 28 his laptop on January 21, 2013. (ld. Ex. C, Bradford Dep. at 99-102.) 5.) At his deposition, Bradford testified that he could not remember doing anything unusual with 5 1 After forensic imaging, Defendants' expert Donald Vilfer prepared a report. (Id. Ex. H, 2 Vilfer Rep.) In sum, Vilfer opined that: 3 Based on the above we have concluded that the CANVAS Source Code disk had been accessed using this computer, that they were copied and saved and tools were used to analyze the code of the proprietary software. No full copies of the software were found to have remained on the computer, but we did locate portions of the code saved out to documents using code comparison software. This means that evidence of the use of the CANVAS Source Code was deleted, along with the proprietary files, virtually eviscerating our ability to assess whether further actions were taken with respect to the CANVAS Source Code files. Even with the files having been deleted, we could have gleaned information from the files in the recycle bin but for the fact that the recycle bin was emptied just prior to our arrival to acquire the forensic image. Additionally, over 1,200 files were modified the morning we acquired the forensic image and 29 were deleted that morning. 4 5 6 7 8 9 Some action was also taken with the laptop to cause an update to all the Windows registry keys and subkeys related to USB devices so that they all reflected a last written date and time of 1/21/2013 at 10:18 AM, just a few hours before the forensic imaging. This hampers our ability to ascertain if the CANVAS Source Code files were copied to any of those devices. 10 t:': ......l a t:t.B 11 = t:':l uu ..,.4-< =:..:::: 12 CJ 0 .......... .......... "" u "-l .......... Q.;!; "-lo 13 ~ 14 ~a ~ Q) 15 Court held a hearing and indicated that terminating sanctions were not appropriate but that a further ~t:: "'0 0 16 monetary award for the expenses entailed in the expedited discovery was and that evidentiary = 17 sanctions may be appropriate if raised at an appropriate time. The Court ordered the parties to file a 18 joint statement regarding monetary sanctions and mediation. After the parties filed their joint 19 statement, in which Defendants' requested a written order, the Court set forth a procedure for 20 discovery in advance of mediation. (Dkt. 165.) 21 III. (Id. at 12.) Plaintiff submitted a rebuttal report by their expert, Sandeep Chatterjee. After the parties fully briefed the issue of whether additional sanctions were warranted, the .... ...c:: ~z Q) ~.s ~ 0 ~ Discussion 22 A. 23 Defendants argue that terminating sanctions are warranted because discovery has revealed 24 that not only did Wintle and Bradford violate the SPO by transmitting and reviewing Defendants' 25 Canvas source code, but Plaintiff has also violated the Court's sanctions order by willfully and in 26 bad faith modifying and destroying evidence. (Supp. Mem. at 16.) Defendants also assert that 27 Plaintiff has lied to this Court on multiple occasions. (Reply Mem. at 2.) 28 Terminating Sanctions The Ninth Circuit employs a multi-factor test when considering case-dispositive sanctions 6 1 under Rule 37(b)(2): "(1) the public's interest in expeditious resolution oflitigation; (2) the court's 2 need to manage its dockets; (3) the risk of prejudice to the party seeking sanctions; (4) the public 3 policy favoring disposition of cases on their merits; and (5) the availability of less drastic sanctions .. 4 .. The sub-parts of the fifth factor are whether the court has considered lesser sanctions, whether it 5 tried them, and whether it warned the recalcitrant party about the possibility of case-dispositive 6 sanctions." Connecticut Gen. Life Ins. Co. v. New Images of Beverly Hills, 482 F.3d 1091, 1096- 7 1097 (9th Cir. 2007). The Ninth Circuit has cautioned that this test is not mechanical, but instead 8 "provides the district court with a way to think about what to do, not a set of conditions precedent for 9 sanctions or a script that the district court must follow." Id. "What is most critical for case- 10 dispositive sanctions, regarding risk of prejudice and of less drastic sanctions, is whether the 11 discovery violations 'threaten to interfere with the rightful decision of the case."' See Valley Eng'rs =:..::: 12 v. Elec. Eng'g Co .. 158 F.3d 1051, 1057 (9th Cir. 1998) (quoting Adriana Intl. Corp. v. Lewis & Co .. .... 0 .... u .......... .... .~ ~ 13 913 F.2d 1406, 1412 (9th Cir.1990)). The court considers the same factors regarding terminating 14 sanctions under its inherent powers that it considers in the Rule 37 context. Anheuser-Busch. Inc. v. ~a ~ Cl) 15 Natural Beverage Distribs., 69 F.3d 337, 348 (9th Cir. 1995). oot:: "'0 0 16 = 17 this case. As in most cases, the first and second factors favor terminating sanctions, and the fourth 18 and fifth factors disfavor them. The key, then, is whether there is evidence that Defendants' have 19 suffered any prejudice due to Plaintiffs conduct. Defendants have not produced any evidence of 20 prejudice. There is no evidence that Plaintiff used Defendants' source code in its own products. The 21 reason the Court ordered expedited discovery in the first place was to determine whether Defendants 22 were correct in their suspicion that Plaintiff gained a commercial advantage by using Defendants' 23 source code to upgrade its commercial software products. (Dkt. 132 at 1.) Defendants point out that 24 they cannot tell with complete certainty what Bradford did with the source code because he deleted 25 the source code from his laptop. While Bradford's sloppiness regarding preservation is itself 26 sanctionable and made it impossible to know exactly what he did, Defendants' discovery has not 27 produced any evidence that Plaintiff incorporated Defendants' source code into any of Plaintiffs 28 products - a result that would be difficult to hide even if the intervening steps taken to do so were CIS ...... a t:c£ 0 CIS uu ...,.<+-< CJ rl.! 1-< r~.~O .... ..s:: ~z Cl) ~;9 1-< 0 ~ Although it is a close issue, the Court does not find terminating sanctions to be appropriate in 7 1 2 erased. Further, in hindsight, the orders requiring Plaintiff to preserve all evidence regarding the 3 source code could have been clearer insofar as they required Plaintiff to preserve evidence while at 4 the same time ordering Plaintiff to return discs and delete source code, as Defendants requested. 5 This arguable ambiguity militates against dismissal. This is not to say that the Court's orders were 6 inconsistent, or that Plaintiff should not have carried out both duties simultaneously or, at minimum, 7 sought clarification from Defendants or, if necessary, the Court. As Defendants point out, Plaintiff 8 could have hired a forensics firm to take an image of Bradford's laptop and then permanently delete 9 the source code. Alternatively, Plaintiff could have decommissioned the laptop, removed the hard 10 drive, and delivered it to a third party for safekeeping. (Supp. Mem. at 19 n.89; Reply Mem. at 6 11 n.l9.) Moreover, Plaintiff should have at least sought clarification before deleting significant 12 evidence in the face of multiple orders requiring preservation. 13 Nevertheless, because there is no evidence of source code theft, and because there was some 14 arguable ambiguity in the preservation orders, the Court will not issue the ultimate sanction of 15 dismissal. 16 B. 17 The Court will, however, order sanctions short of dismissal. The expedited discovery has Other Sanctions 18 adduced evidence that Plaintiff, Bradford, Linne, and counsel were derelict in their duty to preserve 19 evidence and that Bradford has made inconsistent representations to the Court. Bradford deleted 20 Defendants' source code from his computer despite two Court orders emphasizing the need to 21 preserve relevant evidence. There is no question that the source code Bradford viewed on his laptop 22 was relevant to his "copying or use" of that very source code. Plaintiff also made no effort to 23 preserve the state of the evidence on Bradford's laptop after the mediation or otherwise quarantine 24 the laptop's hard drive. Bradford's vague and self-serving testimony that someone told him to delete 25 the source code, but he cannot recall who did so, is not persuasive; more persuasive is Defendants' 26 counsel's declaration that neither she nor her colleague instructed Bradford to delete any source 27 code. Because Bradford deleted the source code from his laptop, Defendants cannot ascertain 28 exactly what he did with it. This is carelessness at best and spoliation at worst. 8 1 Plaintiffs failure to notify Linne of his preservation obligations and circulate the Litigation 2 Hold memo to him, iftrue, is further evidence ofPlaintiffs sloppiness. The timing of Linne's 3 wiping his hard drive is itself suspicious. Although there is reason to believe that the PowerPoint 4 Linne created did not involve Defendants' source code, 1 Linne conceded that he deleted it after the 5 after the October 12, 2012 mediation for what he described as a coincidence of purely personal 6 reasons. It troubling to accept that Linne, an executive vice president at Plaintiff, did not receive or 7 did not notice the Litigation Hold memo that Plaintiff was ordered to circulate or that he was not 8 otherwise made aware of the Court's preservation orders. Either Linne was never notified of his 9 preservation obligations, or he ignored them. Either situation is inexcusable. 10 ~ ....... There is also evidence that Bradford's laptop was modified just hours before Defendants' E 11 expert was scheduled to examine it. (Supp. Sneddon Decl. Ex. H, Vilfer Rep.) Namely, (a) the =:..:::: ~ 12 recycle bin was accessed and modified (.llh at 6); (b) 29 files were deleted (id. at 8); (c) 1,200 files CJ 0 ......... a. (.) ........... ......... Q .~ rllo 13 were modified but not accessed (id. at 10); and (d) the registry keys and subkeys for USB storage t:t.E Q uu ............ riJ 1-< 14 devices all showed that date as the last written time, preventing Defendants' expert from determining ~ ~ E 11) 15 whether Canvas files were copied to those devices (id. at 9). Plaintiff disagrees with the significance rJJt:: "0 0 16 of these facts and supplies a declaration from its own expert rebutting portions of Defendants' = 17 expert's opinions, particularly regarding USB devices. (6/4/13 Wintle Decl. Ex. B, Chatterjee Rep.) 18 Notwithstanding this disagreement, Plaintiff does not dispute that certain files were deleted and that 19 something caused the registry keys to show the same information. While there may be innocent 20 explanations for these changes, Plaintiffs failure to preserve Bradford's laptop intact despite 21 knowing that it was about to be examined is more evidence of Plaintiffs cavalier disregard of its 22 obligations to preserve evidence related to Defendant's source code. .... ..d ~z 11) ;;;;J~ 1-< 0 ~ 23 24 Not only has Plaintiff disregarded its duty to preserve evidence relevant to the source code issue, but Bradford seems to have been overly casual as to his duty of candor to the Court. Bradford 25 1 26 27 28 Linne testified that the PowerPoint he created compared the user interface of the CompCruncher application with the user interface of a freely available Canvas application; it did not compare source code. (Supp. Sneddon Decl. Ex. D, Linne Dep. at 28-29; 6/4/13 Linne Decl. ~~5-6.) Linne also avers that Attachment I to the Vilfer Report is a report that he developed and converted into the missing PowerPoint. (6/4/13 Linne Decl. ~ 12.) This document does not contain Canvas source code, but instead focuses on the appearance and functional aspects of the Canvas application. (Supp. Sneddon Decl. Ex. H, Vilfer Rep. Attach. I.) 9 1 averred in his October 29, 2012 Declaration that he did not save or copy any information from the 2 source code disc. At his deposition during the expedited discovery phase, however, he testified that 3 he did copy Defendants' source code software to his computer. (Supp. Sneddon Decl. Ex. C, 4 Bradford Dep. at 81 ). Bradford does not address this discrepancy directly but rather insists that he 5 had to copy or save the source code files to his computer in order to use them for his review. (6/4113 6 Bradford Decl. 7 source code and then using it someplace else. (6/25/13 Hr'g Tr. at 6, Dkt. 164.) The Court finds it 8 difficult to reconcile Bradford's declaration with his deposition testimony. 9 ~ 15.) Bradford suggests that he thought "copying" meant making an image of the Additionally, when Bradford agreed to be bound by the SPO, he certified that he read and 10 understood the SPO. (Sneddon Decl. Ex. K.) At his deposition, however, Bradford testified that he ro ·a 11 never saw the full protective order. (Supp. Sneddon Decl. Ex. C, Bradford Dep. at 71.) Not reading :s:.::: = ro 12 a protective order is no excuse for later violating the protective order when one certifies that one has "t ~ 13 read it. It is in fact the opposite of an excuse. The Court may well allow Bradford's credibility to be .~ ~ ~.;!3 14 impeached at trial regarding whether he saved and copied Defendants' source code and whether he 8 15 read and violated the SPO. t:c.B uu ·c u ........... rllo ~ ~ Q) oo..c: "g "'g ~z $ J3 1-< &; 16 The Court will also make an additional monetary award of the reasonable expenses that 17 Defendants incurred in taking expedited discovery regarding Plaintiffs use of Defendants' source 18 code, but excluding those that Defendants incurred in pursuit of their counterclaims. Consistent with 19 the Court's July 29, 2013 Order (Dkt. 165), the parties' should notify the Court by August 12, 2013 20 whether they can resolve the amount of monetary sanctions. Further, neither Plaintiff nor any expert 21 whom Plaintiff retains may rely on any code comparison documents Bradford created using 22 Defendants' source code, nor may Plaintiff or any expert whom Plaintiff retains rely on the 23 PowerPoint created by Linne. 24 25 26 27 28 10 1 IV. Conclusion 2 In light of Plaintiffs conduct, the Court finds that additional sanctions are warranted as set 3 forth above. 4 5 Dated: 6 IT IS SO ORDERED. ~ ~( Wl], 7 8 9 10 eli ....... E t:..S 11 =:.::::: eli 12 .... 0 "" ........... "-l .... .~ ~ 13 Q uu ..,.4-< fj (.) 1-< "-lCi ~ ~ 14 E 15 oo.t: 16 il) .... ...t:: 'i 0 ~z = il) ~.;3 1-< 0 ~ 17 18 19 20 21 22 23 24 25 26 27 28 11

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?