TVIIM, LLC v. McAfee, Inc.
Filing
59
ORDER by Judge Kandis A. Westmore regarding 50 Discovery Letter Brief. The parties shall, within 21 days, file a stipulated protective order consistent with this order. (kawlc1, COURT STAFF) (Filed on 8/14/2014)
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
7
TVIIM, LLC,
v.
8
9
Case No. 13-cv-04545-VC (KAW)
Plaintiff,
ORDER REGARDING 7/17/14 JOINT
DISCOVERY LETTER
MCAFEE, INC.,
Defendant.
Dkt. No. 50
10
United States District Court
Northern District of California
11
12
On July 17, 2014, the parties filed a joint discovery letter concerning disputes over
13
14
Defendant McAfee, Inc.’s proposed protective order to govern discovery in this patent case.
15
(7/17/14 Joint Letter, “Joint Letter,” Dkt. No. 50.)
Upon review of the joint letter, the Court finds that the relevant terms of the Patent Local
16
17
Rule 2-2 Interim Model Protective Order should govern. In addition, McAfee’s proposed
18
prohibition on using protected materials to assert infringement on patents other than the patent-in-
19
suit exceeds the purview of the discovery referral and shall not be included.
20
I.
LEGAL STANDARD
21
When a party from whom discovery is requested moves for a protective order, the court
22
may “for good cause, issue an order to protect a party or person from undue burden or expense.
23
Fed. R. Civ. P. 26(c)(1). In general, “good cause requires the moving party to show that specific
24
prejudice or harm will result if the protective order is not issued.” Dynetix Design Solutions, Inc.
25
v. Synopsys, Inc., C-11-05973 PSG, 2012 WL 1232105, at *2 (N.D. Cal. Apr. 12, 2012), appeal
26
dismissed (Mar. 18, 2014). In patent cases, “[t]he Protective Order authorized by the Northern
27
District of California shall govern unless the Court enters a different protective order.” Patent L.R.
28
2-2.
II.
1
2
DISCUSSION
On July 8, 2014, lead counsel for Plaintiff TVIIM, LLC and Defendant McAfee, Inc. met
3
and conferred regarding the differences between McAfee’s proposed protective order and the
4
Patent Local Rule 2-2 Interim Model Protective Order (hereafter “MPO”). (Joint Letter at 3.)
5
Upon conclusion of the meet and confer, six issues remain unresolved. On July 17, 2014, the
6
parties filed a joint discovery letter seeking court intervention.
7
A.
8
While the parties agree to the conditions under which TVIIM may electronically inspect
9
10
United States District Court
Northern District of California
11
Presumptive Limits on Printing Source Code
McAfee’s source code, they disagree on McAfee’s proposed limits on printing source code. (Joint
Letter at 4.)
The MPO provides that the Requesting Party may only “request paper copies of limited
12
portions of source code that are reasonably necessary for the preparation of court filings,
13
pleadings, expert reports, or other papers, or for deposition or trial.” (MPO ¶ 9(d).) A party cannot
14
request printed source code for the purposes of review. Id.
15
McAfee’s proposal seeks to limit the amount of printed source code to 500 pages or 10%
16
of the total pages for a single software release, and to no more than 10 pages of continuous blocks
17
of source code. (Joint Letter at 3.) McAfee contends that these limits are necessary to protect the
18
internet security of its customers, which include Fortune 500 companies, health care providers,
19
government agencies, and the military. Id. McAfee argues that it needs more stringent limitations
20
because it cannot protect its printed code with the same technological safeguards that it employs
21
with its software programs. Id. at 4.
22
23
24
In opposition, TVIIM contends that McAfee’s proposed limitations regarding printed
source code is unnecessary in light of the existing safeguards in the MPO.
McAfee acknowledges that TVIIM has not inspected the available source code. (Joint
25
Letter at 4.) TVIIM has also, therefore, not requested any printouts. Therefore, at this juncture,
26
any presumptive limits are unnecessary given the existing limitations the MPO places on printed
27
source code, one of the purposes of which is to limit the ability to reconstruct code. Accordingly,
28
2
1
McAfee has not met its burden to show good cause to depart from the MPO, and the parties shall
2
adopt paragraph 9(d).
3
B.
Securing Printed Copies of Source Code
4
The parties disagree on how the printed copies of source code should be secured in a
5
particular location and while being transported. (Joint Letter at 5.) McAfee’s proposal seeks to
6
ensure that printed code is kept as secure as its electronic counterpart, including requiring that
7
printed code be transported in a locked container. Id.
The MPO provides that “Protected Material must be stored and maintained by a Receiving
8
9
Party at a location and in a secure manner that ensures that access is limited to the persons
authorized under this Order.” (MPO ¶ 7.1.) In addition, paragraphs 9(d) and 9(e) specify that
11
United States District Court
Northern District of California
10
printed code must be maintained in a secure and locked area, prohibits the scanning of printed
12
copies, and requires the retrieval of printed code at the end of each day of a deposition. (MPO ¶¶
13
9(d),(e).)
14
McAfee argues that its proposal ensures that printed code would be stored securely by
15
detailing the manner in which printed code would be handled. (Joint Letter at 5.) Specifically,
16
Defendant’s proposed protective order differs from the MPO because it specifies that the printed
17
code, while in transit, would need to be hand-carried in a locked container. Id.
TVIIM contends that the MPO already contains sufficient safeguards to protect printed
18
19
source code, and that McAfee’s proposed restrictions are both unreasonable and unworkable.
20
(Joint Letter at 5-6.) First, parties can only obtain printed portions of source code, never a
21
complete copy. (Joint Letter at 6.) Second, the carrying of a locked container would make an
22
attorney stand out in a crowd, possibly inviting theft. (Joint Letter at 6.) Lastly, McAfee’s
23
proposed procedures do not account for air travel, where locked containers would likely be
24
opened. (Joint Letter at 6.) Therefore, the broad safeguards of the MPO should govern.
McAfee has failed to show good cause to modify the MPO, which already provides
25
26
sufficient security measures to protect printed source code. Accordingly, the parties shall adopt
27
paragraph 7.1 of the MPO.
28
///
3
1
C.
Logging Source Code Access
2
McAfee proposes that the Receiving Party be required to maintain a log of any persons
3
who will be conducting inspections, the dates of those inspections, the Bates number(s) of the
4
copy, and when it was provided to that person. (Joint Letter at 6 n.6.) Additionally, the Receiving
5
Party shall produce the log at “critical junctures in the case when printed code is likely to be
6
shared with the greatest number of people.” (Joint Letter at 6.)
7
The MPO only requires that “[t]he Receiving Party shall maintain a record of any
8
individual who has inspected any portion of the source code in electronic or paper form. (MPO ¶
9
9(e).)
10
United States District Court
Northern District of California
11
12
McAfee contends that these log procedures are a necessary and reasonable measure to
safeguard its code and to hold people accountable for any breaches. (Joint Letter at 6.)
TVIIM contends that Defendant’s proposal is overreaching and unduly burdensome, and
13
that the requirement that the logs be produced during the litigation invades TVIIM’s work product
14
privilege, because McAfee would be able to discern Plaintiff’s thoughts and legal strategies. (Joint
15
Letter at 6.) Further, Plaintiff argues that Defendant has not established how these restrictions
16
would provide it with more safeguards against the disclosure of printed code. Id.
17
Proprietary source code is often at issue in intellectual property cases, and McAfee fails to
18
provide any rationale, beyond mere speculation, that its source code is more at risk than others,
19
and that the MPO’s provisions are inadequate. Without more, McAfee lacks good cause to justify
20
a departure from the MPO. Thus, Paragraph 9(e) shall govern.
21
D.
22
McAfee proposes to impose additional restrictions on the use of protected material with
23
24
Use of Protected Material with Witnesses
witnesses. (Joint Letter at 7.)
Paragraph 7.2(f) of the MPO allows protected material to be shown to witnesses during
25
depositions “to whom disclosure is reasonably necessary” so long as they have signed the
26
“Acknowledgement and Agreement to Be Bound” by the protective order. (MPO ¶ 7.2(f).)
27
Paragraphs 7.2(g) and 7.3(f) provide that protected material may only be shown to authors,
28
4
1
recipients of a document, or people who otherwise possessed or knew of the information. (MPO ¶¶
2
7.2(g), 7.3(f).)
3
McAfee states that it is only proposing an expansion as to Paragraphs 7.2(g) and 7.3(f) to
4
address situations where a non-party, including former employees, would have access to the
5
protected material. (Joint Letter at 7.)
6
TVIIM, however, argues that Paragraph 7.2(f) of the MPO already addresses McAfee’s
7
concerns, and so any additional restrictions are unnecessary. Id. McAfee does not address
8
Paragraph 7.2(f).
9
10
Since McAfee has again failed to articulate why the MPO is insufficient, the parties shall
adopt Paragraphs 7.2(f), 7.2(g), and 7.3(f) of the MPO.
United States District Court
Northern District of California
11
E.
Prohibition on Use of Protected Material to Assert Additional Patents
12
McAfee proposes a prohibition against using protected material to support allegations of
13
infringement on patents other than the patent-in-suit. (Joint Letter at 8.) McAfee contends that this
14
restriction is necessary given the 1400 pages of invalidity contentions it has already produced and
15
that the trial date is scheduled for less than one year from now. Id.
16
The MPO does not contain any limitations on amending the pleadings. McAfee’s
17
proposed limitation on the use of protected material to support a potential amendment to the
18
complaint is premature. If TVIIM seeks to amend the complaint based on protected material it
19
obtains in discovery, McAfee is free to oppose such a motion, which would be noticed before the
20
presiding judge. Thus, it would be beyond the purview of the discovery referral for the
21
undersigned to unilaterally prohibit the use of protected materials to support previously unknown
22
claims of infringement.
23
Accordingly, McAfee’s proposed restriction shall not be included in the protective order.
24
F.
25
McAfee proposes to “prohibit[] discussing the content of the clawbacked documents in
Use of Inadvertently Produced Privileged Material
26
motions to compel production of those documents.” (Joint Letter at 8.) McAfee claims that any
27
discussion in a motion to compel would require the moving party “to retain and analyze these
28
5
1
documents after the clawback request” and would “substantially undermine the very notion of a
2
clawback provision” under Federal Rule of Civil Procedure 26. (Joint Letter at 8.)
3
In opposition, TVIIM contends that such a prohibition “would prevent the court from fairly
4
evaluating whether it should be produced and raises the specter that the producing party could
5
mischaracterize the document.” (Joint Letter at 8.)
6
Neither party addresses the MPO, which provides that “[w]hen a Producing Party gives
7
notice to Receiving Parties that certain inadvertently produced material is subject to a claim of
8
privilege or other protection, the obligations of the Receiving Parties are those set forth in Federal
9
Rule of Civil Procedure 26(b)(5)(B).” (MPO ¶ 13.) Specifically, Rule 26 requires that the
receiving party “may promptly present the information to the court under seal for a determination
11
United States District Court
Northern District of California
10
of the claim.” Fed. R. Civ. P. 26(b)(5)(B). This permits the court to determine whether the
12
document inadvertently produced is actually privileged. Here, McAfee’s proposal would
13
essentially hinder the court’s ability to make such a determination under Rule 26.
14
Thus, the MPO clawback provision is sufficient to ensure that documents inadvertently
15
produced may be clawed back. The parties shall, therefore, incorporate Paragraph 13 of the MPO
16
into their stipulated protective order.
III.
17
18
19
20
21
22
23
CONCLUSION
In light of the foregoing, the parties shall, within 21 days, file a stipulated protective order
consistent with this order.
IT IS SO ORDERED.
Dated: August 14, 2014
______________________________________
KANDIS A. WESTMORE
United States Magistrate Judge
24
25
26
27
28
6
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?