Synopsys, Inc. v. Mentor Graphics Corporation

Filing 478

Order by Magistrate Judge Donna M. Ryu granting in part and denying in part 391 Discovery Letter Brief.(dmrlc2, COURT STAFF) (Filed on 6/2/2015)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 11 For the Northern District of California United States District Court 10 SYNOPSYS INC, 12 13 No. C-12-06467-MMC (DMR) Plaintiff(s), ORDER RE: JOINT DISCOVERY LETTER [DOCKET NO. 391]; MOTION TO SEAL [DOCKET NO. 438] v. 14 MENTOR GRAPHICS CORP, 15 Defendant(s). ___________________________________/ 16 17 The parties filed a joint discovery letter in this patent case. [Docket No. 391.] Defendant 18 Mentor Graphics Corporation contends that Plaintiff Synopsys, Inc’s treatment of Mentor’s source 19 code violated the parties’ Stipulated Protective Order (“PO”). Mentor moves for sanctions. For the 20 reasons stated below, Mentor’s motion is granted in part and denied in part. 21 22 23 24 I. PROTECTIVE ORDER The court begins by describing the protective order which gives rise to Mentor’s motion for sanctions. See Docket No. 146. Section 10 of the PO governs the treatment of source code in this litigation. Section 10(a) 25 controls source code that is produced to a receiving party. It provides that electronic copies of 26 source code may only be kept on certain encrypted, password-protected, non-networked computers, 27 and prohibits the emailing or ftp (file transfer protocol) transfer of source code. PO §§ 10(a)(ii), 28 10(a)(iv)(i), 10(a)(iv)(4). Section 10(b) governs circumstances, such as the one presented here, 1 where a party makes its source code available for review. Section 10(b) requires that the source 2 code be made “available for inspection on a secured computer in a secured room without Internet 3 access or network access to other computers . . . .” PO § 10(b)(i). “[T]he Receiving Party shall not 4 copy, remove, or otherwise transfer any portion of the source code onto any recordable media or 5 recordable device. The Designating Party may visually monitor the activities of the Receiving 6 Party’s representatives during any source code review, but only to ensure that there is no 7 unauthorized recording, copying, or transmission of the source code.” Id. 8 Section 10(b)(v) provides that after inspecting the source code, the reviewing party can copies of limited portions of source code that are reasonably necessary for the preparation of court 11 For the Northern District of California request paper copies of source code for particular uses: “[t]he Receiving Party may request paper 10 United States District Court 9 filings, pleadings, expert reports, or other papers, or for deposition or trial, but shall not request 12 paper copies for the purpose of reviewing the source code...in the first instance.” PO § 10(b)(v). 13 “The Designating Party may challenge the amount of source code requested in hard copy form.” Id. 14 15 Section 10(b)(vi) prohibits conversion of paper copies of source code into any electronic 16 format. “The Receiving Party shall not create any electronic or other images of the paper copies and 17 shall not convert any of the information contained in the paper copies into any electronic format. 18 The Receiving Party shall only make additional paper copies if such additional copies are (1) 19 necessary to prepare court filings, pleadings, or other papers (including a testifying expert’s expert 20 report), (2) necessary for deposition, or (3) otherwise necessary for the preparation of its case.” PO 21 § 10(b)(vi). 22 23 II. FACTUAL BACKGROUND Synopsys’ expert on patent infringement is Dr. Shawn Blanton. On September 5, 2014, 24 Synopsys served Dr. Blanton’s reply expert report on Mentor. Exhibit 24 to that report included 171 25 lines of Mentor’s source code. The 171 lines were not consecutive: the longest sequential excerpt 26 was 68 lines long, but the majority of the excerpts contained 7 lines of consecutive code or fewer. 27 After Mentor realized that it had never provided paper copies of the 171 lines of code to 28 Synopsys, Mentor asked Synopsys how it had acquired them. Synopsys explained that its agent 2 1 Adel Assaad, who was one of the individuals permitted to inspect the source code, had taken typed 2 verbatim notes of the source code during one of his inspection sessions. Mr. Assaad then provided 3 the notes to Dr. Blanton during a WebEx1 session for which Synopsys attorney Aseem Gupta was 4 also present. 5 III. DISCUSSION 6 Mentor contends that by having Mr. Assaad type verbatim excerpts of source code into his 7 notes, and then by sharing that source code via WebEx, Synopsys violated three provisions of the 8 PO: Section 10(b)(i), Section 10(b)(vi), and Section 10(a)(iv).2 9 A. Section 10(b)(i) Mentor argues that Synopsys violated Section 10(b)(i), which states that a party inspecting 11 For the Northern District of California United States District Court 10 the source code “shall not copy, remove, or otherwise transfer any portion of the source code onto 12 any recordable media or recordable device” or “record[], copy[], or transmi[t] . . . the source code.” 13 According to Mentor, Mr. Assaad’s act of typing lines of source code into his notes constitutes 14 “copying” or “transferring” the source code onto recordable media. 15 Synopsys counters that typing lines of source code into notes does not constitute “copying” 16 or “transferring.” See Thayer Decl. [Docket No. 439] at ¶ 44 (the term “copy” in the context of 17 source code means “hooking up a computer and copying electronically, or scanning, the code”). In 18 fact, according to Synopsys, the PO contemplates that an inspector must be able to type excerpts of 19 code into his or her notes. Since the PO prohibits a party from requesting paper copies of source 20 1 21 22 23 24 “WebEx is an online videoconferencing tool that allows users to place documents online for viewing during the videoconference.” Letter at 1 n. 3. Mentor describes Synopsys’ attorneys’ WebEx page as “a publicly-accessible Web page through which anyone may intercept unprotected transmissions,” but Synopsys explains that its WebEx page is secured and password-protected, and that WebEx does not save the information for a session once it concludes. Furthermore, Synopsys notes that the ftp site which it used for transferring Dr. Blanton’s reply expert report and Exhibit 24 to that report has been deleted so that those documents can no longer be accessed from that location. Letter at 9. 2 25 26 27 28 Mentor does not assert that Synopsys disclosed the source code to unauthorized individuals, or that Synopsys used the source code for an improper purpose. Mr. Assaad’s notes and electronic copies of Exhibit 24 have been in the possession of Mr. Assaad, Dr. Blanton, Aseem Gupta, and Synopsys attorneys Phil Woo and David DeZern. Mentor acknowledges that all of these individuals are authorized to inspect source code pursuant to the PO. Mentor also does not contend that the source code in Exhibit 24 has been used for any purpose other than that which is permitted by the PO. See PO Section 10(b)(vi). 3 1 code for the purpose of performing original analysis, see PO § 10(b)(v), the reviewing party must 2 analyze source code during the inspection. Synopsys contends that Mr. Assaad was doing exactly 3 that when he typed the disputed lines of source code into his notes. Synopsys further explains that 4 because Mentor provided paper copies of source code without the line numbers that are visible 5 during electronic inspection, “it would have been difficult if not impossible...to request paper copies 6 of source code and then connect those paper copies back to the electronic code that was analyzed 7 during inspection unless the expert typed up excerpts of the code to memorialize his analysis.” 8 Letter at 7. 9 There is some sense in Synopsys’ position. The restrictions imposed on the party inspecting the source code (i.e., requiring analysis during inspection, placing limits on the place and time of 11 For the Northern District of California United States District Court 10 inspection) could lead the inspector to take detailed notes in order to memorialize his or her analysis 12 and to be able to locate the relevant source code in the paper copies. Thus, it is plausible to read 13 Section 10(b)(i)’s restrictions on copying or transferring code as permitting an inspector to 14 incorporate at least some source code into his or her review notes. 15 However, Synopsys’ argument goes too far. The PO’s prohibition against “copying” source 16 code onto recordable media surely must prohibit extensive typing of the source code into one’s 17 notes. At the hearing, Synopsys’ counsel Phil Woo admitted as much. Synopsys does not explain 18 why it was reasonable to copy 171 lines of code, including 68 consecutive ones. At the hearing, 19 Synopsys’ counsel stated that prior to September 5, 2014, Mr. Assaad had never needed to copy 20 more than 20 lines of source code into his notes, but found it necessary to do so on that day because 21 of the volume of source code that had to be analyzed in the small time period between the 22 submission of Mentor’s expert report and the due date for Dr. Blanton’s reply report. But Synopsys’ 23 urgent need for source code does not justify the act of copying large blocks of source code under the 24 PO. Thus, the court concludes that Mr. Assaad’s act of capturing 171 lines of source code, including 25 68 sequential lines, constitutes “copying” source code in violation of Section 10(b)(i) of the PO. 26 B. Section 10(b)(vi) and Section 10(a)(iv) 27 28 Mentor contends that Synopsys also violated Section 10(b)(vi) and Section 10(a)(iv) of the PO. These sections place tight restrictions on the storage and transmission of source code. Paper 4 1 copies of source code made available for inspection must be stored in a secured, locked area, and 2 may not be converted into any electronic format. PO § 10(b)(vi). Electronic copies of source code 3 produced to a receiving party must be encrypted, viewed only on a non-networked computer, and 4 must not be emailed or stored in an Internet-accessible location for any period of time. Section 5 10(a)(iv). 6 To begin with, Section 10(a)(iv) does not apply here, as it governs source code that is 7 produced directly to a party, rather than produced for review by a party. Turning to Section 8 10(b)(vi), it states that “[t]he Receiving Party shall not create any electronic or other images of the 9 paper copies and shall not convert any of the information contained in the paper copies into any electronic format.” This section does not clearly encompass Mr. Assaad’s act of typing source code 11 For the Northern District of California United States District Court 10 into notes and then converting them into a format viewable via WebEx. This is because Section 12 10(b)(vi) controls paper copies, and Mr. Assaad’s notes were not “paper copies” under the PO. 13 However, even if Synopsys’ behavior did not violate the letter of Section 10(b)(vi), it 14 violated its spirit. Synopsys made no attempt to request paper copies of the 171 lines of code prior 15 to submitting Dr. Blanton’s reply report.3 Instead, it side-stepped the process by having Mr. Assaad 16 type large amounts of code into his notes. Had Synopsys received paper copies of source code, 17 Synopsys would have been prohibited from using them in an online conference, for the PO does not 18 permit conversion of paper copies of source code into an electronic format such as a document 19 viewable during a WebEx session.4 By skirting the process for requesting paper copies, Synopsys 20 essentially bypassed the provisions of the PO which would have prevented the conversion of those 21 paper copies into a WebEx document. Under these circumstances, conversion of Mr. Assaad’s notes 22 into a WebEx transmission is as inappropriate as a similar conversion of paper copies. Therefore, 23 Synopsys violated Section 10(b)(vi) of the PO when it converted significant amounts of source code 24 in Mr. Assaad’s notes into an electronic format viewable on WebEx. 25 3 26 27 Mentor asserts that it would have given Synopsys paper copies of the code if Synopsys had only asked. Indeed, after Synopsys submitted Dr. Blanton’s reply report, Synopsys requested paper copies of the 171 lines of source code, which Mentor then provided. 4 28 As noted above, see supra n. 1, the parties agree that “WebEx is an online videoconferencing tool that allows users to place documents online for viewing during the videoconference.” 5 1 2 3 4 C. Remedies Mentor seeks the following relief for Synopsys’ violation of the PO: (1) to withdraw its approval of Mr. Assaad and Dr. Blanton5 to view any of Mentor’s confidential information, including source code and “previously-taken notes” (presumably Mr. Assaad and Dr. Blanton’s own 5 notes); (2) to preclude Dr. Blanton from testifying at trial on any topic related to Mentor’s 6 confidential information; (3) to preclude Aseem Gupta or anyone who was involved with the WebEx 7 8 9 11 For the Northern District of California United States District Court 10 12 13 14 15 transmission from reviewing Mentor’s confidential information; (4) to have Synopsys destroy all electronic and typed copies of Mentor’s source code. Mentor does not specify the basis for the court’s authority to grant these remedies. Rule 37 authorizes the imposition of various sanctions for discovery violations, including a party’s failure to obey a court order to provide or permit discovery, Fed. R. Civ. P. 37(b)(2)(A), but Mentor does not contend that Synopsys’ violation of the PO falls within any of the grounds for sanctions under Rule 37. The PO itself provides for some remedies in the event of improper disclosure of protected materials, but the remedies requested by Mentor go beyond what the PO 16 authorizes. See PO § 15 (if any protected material is disclosed in a manner not authorized by the 17 PO, the disclosing party “shall immediately take all reasonable efforts to prevent further disclosure 18 by each unauthorized person who received such information, and shall immediately require each 19 unauthorized person to return all Protected Material..., all copies..., and all documents containing 20 excerpts from or references to the improperly disclosed Protected Material”). In addition, a court 21 may use its inherent power to impose sanctions for discovery abuses that may not be a technical 22 violation of the discovery rules, Halaco Eng’g Co. v. Costle, 843 F.2d 376, 380 (9th Cir. 1988), 23 5 24 25 26 27 28 In this lawsuit, Synopsys brings claims for infringement of four patents. See Compl. [Docket No. 1.] On August 1, 2014, Judge Chesney stayed the case as to Synopsys’s fourth claim, pending inter partes review of the asserted patent. See Docket No. 215. That stay is ongoing. See Docket No. 446. On January 20, 2015, Judge Chesney granted summary judgment in favor of Mentor on Synopsys’s first, second and third claims, finding that those asserted patents were invalid. See Docket No. 442. Synopsys has appealed this determination to the Federal Circuit. See Docket No. 446. Dr. Blanton is offered as Synopsys’s expert on infringement. Because questions about infringement remain at issue—for example, they may arise if inter partes review does not resolve Synopsys’s fourth claim or if Judge Chesney’s summary judgment order is successfully appealed—Dr. Blanton’s expert opinions are still potentially meaningful to Synopsys’s case. 6 1 2 3 though “such powers are to be used carefully.” Banga v. Experian Info. Solutions, No. C-08-4147 SBA (EMC), 2009 WL 2407419, at *1 (N.D. Cal. Aug. 4, 2009) (citing Chambers v. NASCO, Inc., 501 U.S. 32, 44-45 (1991) (“Because of their very potency, inherent powers must be exercised with 4 restraint and discretion. A primary aspect of that discretion is the ability to fashion an appropriate 5 sanction for conduct which abuses the judicial process.”)). 6 7 8 9 11 For the Northern District of California United States District Court 10 12 13 14 15 16 17 The court now invokes its inherent authority in making determinations regarding Mentor’s motion for sanctions. The remedies sought by Mentor are disproportionate to the transgression. Mentor has not explained what prejudice it has suffered as a result of Synopsys’ violation. Mentor admits that all of the individuals who had access to the source code typed into Mr. Assaad’s notes had permission to access Mentor’s source code. Mentor also concedes the relevance of the source code, admits that it would have produced paper copies of the source code in Exhibit 24 had Synopsys requested it, and in fact later provided paper copies of that source code. Synopsys argues that the sanctions sought by Mentor would amount to terminating sanctions, because Dr. Blanton is Mentor’s only expert on infringement. Mentor generally does not explain how the sanctions it seeks would serve to restore Mentor.6 On the other hand, Synopsys’ violation of the PO is a serious matter that should not go 18 unaddressed. At the hearing, the court required Synopsys’ lead outside counsel to file a declaration 19 explaining the circumstances under which the 171 lines of source code were copied and transmitted, 20 and the actions of each individual involved in that process. Synopsys’ lead counsel filed the 21 declaration. See Thayer Decl. According to Synopsys, its attorneys advised Mr. Assaad that he 22 could “take notes as needed for his analysis” and both Synopsys’ attorneys and Mr. Assaad “had a 23 good faith belief that typing notes including limited fragments of source code into his laptop as 24 necessary to prepare the expert reports would not violate Section 10(b)(i).” Id. at ¶ 44. However, 25 “[n]one of Synopsys’ attorneys or Dr. Blanton told Mr. Assaad that he should limit the number of 26 sequential lines of code that he excerpted into his laptop to no more than a certain number.” Id. at ¶ 27 47. As discussed above, it may be the case that Section 10(b)(i) permits the inspector to copy 28 6 Indeed, given the timing of its sanctions motion, the overreaching nature of the requested relief, and the utter failure to demonstrate any prejudice, Mentor’s motion smacks of gamesmanship rather than an attempt to address a real harm. 7 1 2 3 “limited fragments” of source code into reviewer notes, but the copying that occurred in the present circumstances went well beyond “limited fragments.” Having reviewed the declaration, the court finds that Synopsys’ attorneys at the law firm of Sidley Austin LLP permitted actions that violated 4 the PO by failing to adequately train and supervise individuals regarding the requirements of the PO. 5 The court admonishes those attorneys. 6 7 8 9 11 For the Northern District of California United States District Court 10 12 13 14 Synopsys is also ordered to destroy all electronic copies of source code, as well as notes containing more than ten sequential lines of source code.7 However, Synopsys need not destroy electronic copies of court filings, drafts of court filings, expert reports or draft expert reports if those documents contain source code. While the court concludes that it is in inappropriate to preclude Dr. Blanton from testifying at trial on any topic related to Mentor’s confidential information, the court agrees that it is appropriate for Mentor to withdraw its approval of Mr. Assaad to view any of Mentor’s confidential information, including source code and Mr. Assaad’s own notes. However, Mentor shall not 15 unreasonably withhold approval of a replacement for Mr. Assaad as an individual authorized to 16 review source code pursuant to the PO. IV. CONCLUSION 17 18 Mentor’s motion for sanctions is granted in part and denied in part.8 19 IT IS SO ORDERED. 20 Dated: June 2, 2015 21 DONNA M. RYU 22 United States Magistrate Judge 23 24 25 26 27 28 7 By requiring Synopsys to destroy all notes containing more than ten sequential lines of code, the court is not interpreting the PO to mean that hand-copying or typing source code does not constitute the “copy, remove, or otherwise transfer” of source code as long as it is under ten sequential lines. Instead, the court has chosen ten sequential lines because Synopsys avers that the “vast majority” of the source code copied by Mr. Assaad were seven lines or fewer, Letter at 7, and the court must fashion a remedy that excises Mr. Assaad’s illegitimate notes without requiring the destruction of all of his work product. 8 Synopsys has also filed a motion to seal portions of an exhibits to a declaration associated with the joint discovery letter. [Docket No. 438.] Synopsys has provided declaration in support of its motion to seal establishing that the portions sought to be sealed contain confidential and commercially sensitive information that is sealable. See Docket No. 438-1; Civil L.R. 79-5(d), 79-5(e). Accordingly, the motion to seal is granted. 8

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?