TVIIM, LLC v. McAfee, Inc.

Filing 59

ORDER by Judge Kandis A. Westmore regarding 50 Discovery Letter Brief. The parties shall, within 21 days, file a stipulated protective order consistent with this order. (kawlc1, COURT STAFF) (Filed on 8/14/2014)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 TVIIM, LLC, v. 8 9 Case No. 13-cv-04545-VC (KAW) Plaintiff, ORDER REGARDING 7/17/14 JOINT DISCOVERY LETTER MCAFEE, INC., Defendant. Dkt. No. 50 10 United States District Court Northern District of California 11 12 On July 17, 2014, the parties filed a joint discovery letter concerning disputes over 13 14 Defendant McAfee, Inc.’s proposed protective order to govern discovery in this patent case. 15 (7/17/14 Joint Letter, “Joint Letter,” Dkt. No. 50.) Upon review of the joint letter, the Court finds that the relevant terms of the Patent Local 16 17 Rule 2-2 Interim Model Protective Order should govern. In addition, McAfee’s proposed 18 prohibition on using protected materials to assert infringement on patents other than the patent-in- 19 suit exceeds the purview of the discovery referral and shall not be included. 20 I. LEGAL STANDARD 21 When a party from whom discovery is requested moves for a protective order, the court 22 may “for good cause, issue an order to protect a party or person from undue burden or expense. 23 Fed. R. Civ. P. 26(c)(1). In general, “good cause requires the moving party to show that specific 24 prejudice or harm will result if the protective order is not issued.” Dynetix Design Solutions, Inc. 25 v. Synopsys, Inc., C-11-05973 PSG, 2012 WL 1232105, at *2 (N.D. Cal. Apr. 12, 2012), appeal 26 dismissed (Mar. 18, 2014). In patent cases, “[t]he Protective Order authorized by the Northern 27 District of California shall govern unless the Court enters a different protective order.” Patent L.R. 28 2-2. II. 1 2 DISCUSSION On July 8, 2014, lead counsel for Plaintiff TVIIM, LLC and Defendant McAfee, Inc. met 3 and conferred regarding the differences between McAfee’s proposed protective order and the 4 Patent Local Rule 2-2 Interim Model Protective Order (hereafter “MPO”). (Joint Letter at 3.) 5 Upon conclusion of the meet and confer, six issues remain unresolved. On July 17, 2014, the 6 parties filed a joint discovery letter seeking court intervention. 7 A. 8 While the parties agree to the conditions under which TVIIM may electronically inspect 9 10 United States District Court Northern District of California 11 Presumptive Limits on Printing Source Code McAfee’s source code, they disagree on McAfee’s proposed limits on printing source code. (Joint Letter at 4.) The MPO provides that the Requesting Party may only “request paper copies of limited 12 portions of source code that are reasonably necessary for the preparation of court filings, 13 pleadings, expert reports, or other papers, or for deposition or trial.” (MPO ¶ 9(d).) A party cannot 14 request printed source code for the purposes of review. Id. 15 McAfee’s proposal seeks to limit the amount of printed source code to 500 pages or 10% 16 of the total pages for a single software release, and to no more than 10 pages of continuous blocks 17 of source code. (Joint Letter at 3.) McAfee contends that these limits are necessary to protect the 18 internet security of its customers, which include Fortune 500 companies, health care providers, 19 government agencies, and the military. Id. McAfee argues that it needs more stringent limitations 20 because it cannot protect its printed code with the same technological safeguards that it employs 21 with its software programs. Id. at 4. 22 23 24 In opposition, TVIIM contends that McAfee’s proposed limitations regarding printed source code is unnecessary in light of the existing safeguards in the MPO. McAfee acknowledges that TVIIM has not inspected the available source code. (Joint 25 Letter at 4.) TVIIM has also, therefore, not requested any printouts. Therefore, at this juncture, 26 any presumptive limits are unnecessary given the existing limitations the MPO places on printed 27 source code, one of the purposes of which is to limit the ability to reconstruct code. Accordingly, 28 2 1 McAfee has not met its burden to show good cause to depart from the MPO, and the parties shall 2 adopt paragraph 9(d). 3 B. Securing Printed Copies of Source Code 4 The parties disagree on how the printed copies of source code should be secured in a 5 particular location and while being transported. (Joint Letter at 5.) McAfee’s proposal seeks to 6 ensure that printed code is kept as secure as its electronic counterpart, including requiring that 7 printed code be transported in a locked container. Id. The MPO provides that “Protected Material must be stored and maintained by a Receiving 8 9 Party at a location and in a secure manner that ensures that access is limited to the persons authorized under this Order.” (MPO ¶ 7.1.) In addition, paragraphs 9(d) and 9(e) specify that 11 United States District Court Northern District of California 10 printed code must be maintained in a secure and locked area, prohibits the scanning of printed 12 copies, and requires the retrieval of printed code at the end of each day of a deposition. (MPO ¶¶ 13 9(d),(e).) 14 McAfee argues that its proposal ensures that printed code would be stored securely by 15 detailing the manner in which printed code would be handled. (Joint Letter at 5.) Specifically, 16 Defendant’s proposed protective order differs from the MPO because it specifies that the printed 17 code, while in transit, would need to be hand-carried in a locked container. Id. TVIIM contends that the MPO already contains sufficient safeguards to protect printed 18 19 source code, and that McAfee’s proposed restrictions are both unreasonable and unworkable. 20 (Joint Letter at 5-6.) First, parties can only obtain printed portions of source code, never a 21 complete copy. (Joint Letter at 6.) Second, the carrying of a locked container would make an 22 attorney stand out in a crowd, possibly inviting theft. (Joint Letter at 6.) Lastly, McAfee’s 23 proposed procedures do not account for air travel, where locked containers would likely be 24 opened. (Joint Letter at 6.) Therefore, the broad safeguards of the MPO should govern. McAfee has failed to show good cause to modify the MPO, which already provides 25 26 sufficient security measures to protect printed source code. Accordingly, the parties shall adopt 27 paragraph 7.1 of the MPO. 28 /// 3 1 C. Logging Source Code Access 2 McAfee proposes that the Receiving Party be required to maintain a log of any persons 3 who will be conducting inspections, the dates of those inspections, the Bates number(s) of the 4 copy, and when it was provided to that person. (Joint Letter at 6 n.6.) Additionally, the Receiving 5 Party shall produce the log at “critical junctures in the case when printed code is likely to be 6 shared with the greatest number of people.” (Joint Letter at 6.) 7 The MPO only requires that “[t]he Receiving Party shall maintain a record of any 8 individual who has inspected any portion of the source code in electronic or paper form. (MPO ¶ 9 9(e).) 10 United States District Court Northern District of California 11 12 McAfee contends that these log procedures are a necessary and reasonable measure to safeguard its code and to hold people accountable for any breaches. (Joint Letter at 6.) TVIIM contends that Defendant’s proposal is overreaching and unduly burdensome, and 13 that the requirement that the logs be produced during the litigation invades TVIIM’s work product 14 privilege, because McAfee would be able to discern Plaintiff’s thoughts and legal strategies. (Joint 15 Letter at 6.) Further, Plaintiff argues that Defendant has not established how these restrictions 16 would provide it with more safeguards against the disclosure of printed code. Id. 17 Proprietary source code is often at issue in intellectual property cases, and McAfee fails to 18 provide any rationale, beyond mere speculation, that its source code is more at risk than others, 19 and that the MPO’s provisions are inadequate. Without more, McAfee lacks good cause to justify 20 a departure from the MPO. Thus, Paragraph 9(e) shall govern. 21 D. 22 McAfee proposes to impose additional restrictions on the use of protected material with 23 24 Use of Protected Material with Witnesses witnesses. (Joint Letter at 7.) Paragraph 7.2(f) of the MPO allows protected material to be shown to witnesses during 25 depositions “to whom disclosure is reasonably necessary” so long as they have signed the 26 “Acknowledgement and Agreement to Be Bound” by the protective order. (MPO ¶ 7.2(f).) 27 Paragraphs 7.2(g) and 7.3(f) provide that protected material may only be shown to authors, 28 4 1 recipients of a document, or people who otherwise possessed or knew of the information. (MPO ¶¶ 2 7.2(g), 7.3(f).) 3 McAfee states that it is only proposing an expansion as to Paragraphs 7.2(g) and 7.3(f) to 4 address situations where a non-party, including former employees, would have access to the 5 protected material. (Joint Letter at 7.) 6 TVIIM, however, argues that Paragraph 7.2(f) of the MPO already addresses McAfee’s 7 concerns, and so any additional restrictions are unnecessary. Id. McAfee does not address 8 Paragraph 7.2(f). 9 10 Since McAfee has again failed to articulate why the MPO is insufficient, the parties shall adopt Paragraphs 7.2(f), 7.2(g), and 7.3(f) of the MPO. United States District Court Northern District of California 11 E. Prohibition on Use of Protected Material to Assert Additional Patents 12 McAfee proposes a prohibition against using protected material to support allegations of 13 infringement on patents other than the patent-in-suit. (Joint Letter at 8.) McAfee contends that this 14 restriction is necessary given the 1400 pages of invalidity contentions it has already produced and 15 that the trial date is scheduled for less than one year from now. Id. 16 The MPO does not contain any limitations on amending the pleadings. McAfee’s 17 proposed limitation on the use of protected material to support a potential amendment to the 18 complaint is premature. If TVIIM seeks to amend the complaint based on protected material it 19 obtains in discovery, McAfee is free to oppose such a motion, which would be noticed before the 20 presiding judge. Thus, it would be beyond the purview of the discovery referral for the 21 undersigned to unilaterally prohibit the use of protected materials to support previously unknown 22 claims of infringement. 23 Accordingly, McAfee’s proposed restriction shall not be included in the protective order. 24 F. 25 McAfee proposes to “prohibit[] discussing the content of the clawbacked documents in Use of Inadvertently Produced Privileged Material 26 motions to compel production of those documents.” (Joint Letter at 8.) McAfee claims that any 27 discussion in a motion to compel would require the moving party “to retain and analyze these 28 5 1 documents after the clawback request” and would “substantially undermine the very notion of a 2 clawback provision” under Federal Rule of Civil Procedure 26. (Joint Letter at 8.) 3 In opposition, TVIIM contends that such a prohibition “would prevent the court from fairly 4 evaluating whether it should be produced and raises the specter that the producing party could 5 mischaracterize the document.” (Joint Letter at 8.) 6 Neither party addresses the MPO, which provides that “[w]hen a Producing Party gives 7 notice to Receiving Parties that certain inadvertently produced material is subject to a claim of 8 privilege or other protection, the obligations of the Receiving Parties are those set forth in Federal 9 Rule of Civil Procedure 26(b)(5)(B).” (MPO ¶ 13.) Specifically, Rule 26 requires that the receiving party “may promptly present the information to the court under seal for a determination 11 United States District Court Northern District of California 10 of the claim.” Fed. R. Civ. P. 26(b)(5)(B). This permits the court to determine whether the 12 document inadvertently produced is actually privileged. Here, McAfee’s proposal would 13 essentially hinder the court’s ability to make such a determination under Rule 26. 14 Thus, the MPO clawback provision is sufficient to ensure that documents inadvertently 15 produced may be clawed back. The parties shall, therefore, incorporate Paragraph 13 of the MPO 16 into their stipulated protective order. III. 17 18 19 20 21 22 23 CONCLUSION In light of the foregoing, the parties shall, within 21 days, file a stipulated protective order consistent with this order. IT IS SO ORDERED. Dated: August 14, 2014 ______________________________________ KANDIS A. WESTMORE United States Magistrate Judge 24 25 26 27 28 6

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?