Symantec Corp. et al v. Sidman et al

Filing 29

Order by Magistrate Judge Nathanael M. Cousins granting in part and denying in part 1 , 25 Motion to Compel.(nclc2, COURT STAFF) (Filed on 4/24/2014)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 10 SAN FRANCISCO DIVISION 11 12 13 14 15 16 17 SYMANTEC CORP. and SONY DADC US, INC., Plaintiffs, Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART PLAINTIFFS’ MOTION TO COMPEL v. Hearing: April 23, 2014 GEORGE SIDMAN and BRUCE WECKER, Re: Dkt. 1 (redacted), 25 (unredacted) Defendants. 18 19 20 21 The primary question presented is whether a person possessing knowledge of 22 “prior art” that could invalidate a patent may shield his identity and the prior art from 23 discovery in a patent infringement lawsuit. Because the Court concludes that defendants 24 have not established that the prior art and the identity of the persons with knowledge of 25 the prior art should be protected as trade secrets, the Court GRANTS the motion to 26 compel on this question. 27 A second question is less novel: whether defendants have established that the 28 attorney-client privilege shields from disclosure 42 written communications between Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 1 client and counsel. The Court concludes that those communications were made in pursuit 2 of legal advice from counsel, so properly were withheld as privileged. As to the attorney- 3 client communications challenged in the motion to compel, the motion is DENIED. 4 I. 5 Background Plaintiffs in this discovery dispute, Symantec and Sony, are defendants in patent 6 infringement suits consolidated in the U.S. District Court, Eastern District of Texas. The 7 underlying cases concern U.S. Patent No. 5,490,216 (the ’216 Patent), which is a patent 8 about product activation software. Uniloc USA, Inc. et al. v. Activision Blizzard, Inc., No. 9 13-cv-00256 LED (E.D. Tex.). The deadline for fact discovery in the Texas Action is 10 May 2, 2014. Expert reports on patent invalidity are due June 2, 2014. Dkt. 25, Mot. to 11 Compel at 3. 12 The Texas Court has issued a Protective Order under Fed. R. Civ. P. 26(c) to 13 regulate the discovery and use of information that contains trade secrets, confidential, 14 proprietary, and commercially sensitive information. Texas Action, Dkt. 96, issued 15 8/20/2013. That Protective Order would apply to any of the information and documents 16 produced under the subpoenas in this dispute. 17 George Sidman, on behalf of an anonymous client, wrote to Symantec and Sony in 18 November 2013 and stated that the client possessed the “Silver Bullet” that may 19 invalidate the ’216 Patent. Sidman wrote that the client “believes that the product 20 activation methodology within the subject technology predates and may invalidate the 21 Uniloc patent [’216 Patent].” Dkt. 26, Ex. A to Declaration of Fahd Majiduddin, at 1. 22 Sidman, on behalf of the client, offered to sell or license the product to Symantec and 23 Sony and the other parties seeking to invalidate the ’216 Patent. Bruce Wecker is an 24 attorney for the client and was copied on the correspondence from Sidman. 25 Symantec and Sony did not accept this unsolicited invitation. Instead, they served 26 Wecker and Sidman with subpoenas for depositions and documents that would reveal the 27 prior art product, the client, and communications between client and counsel that might 28 provide information revealing the prior art product. Wecker and Sidman produced some Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 2 1 documents, but objected to further production based on various grounds of privilege, 2 trade secrets, privacy, and confidentiality. Most significantly, Wecker and Sidman 3 objected to identifying their client or the prior art product. The parties conferred but were unable to resolve their dispute. Symantec and Sony 4 5 then moved to compel compliance with their subpoenas. The motion and all other 6 discovery disputes were referred to the undersigned Magistrate Judge by the District 7 Court. Dkt. 12. The Court held a hearing on April 23, 2014. During the hearing, the 8 Court reviewed the following materials in camera that were identified by Sidman and 9 Wecker on a privilege log: items 1, 9, 10, 19, 22, 23, 24, 25, 26, 33, and 42.1 Dkt. 16-1. 10 11 II. Legal Standard As a preliminary matter, there is a question about which laws apply to the privilege 12 and trade secret issues presented. In patent litigation, Federal Circuit law applies when 13 resolving discovery disputes that relate to an issue of substantive patent law. In re 14 EchoStar Communications Corp., 448 F.3d 1294, 1298 (Fed. Cir. 2006) (“Federal circuit 15 law applies when deciding whether particular written or other materials are discoverable 16 in a patent case, if those materials relate to an issue of substantive patent law”); see also 17 Bd. of Trustees Leland Stanford Junior Univ. v. Roche Molecular Sys., Inc., 237 F.R.D. 18 618, 623 (N.D. Cal. 2006) ( “issues that relate to discovery disputes and other procedural 19 issues, which are unique to patent cases, should be decided pursuant to Federal Circuit 20 law”); Adobe Sys. Inc. v. Wowza Media Sys., LLC, No. 11-cv-2243 CW (JSC), 2012 WL 21 6554003, at *1 (N.D. Cal. Dec. 14, 2012) (Federal Circuit law applied to dispute over 22 waiver of attorney-client privilege in patent case). 23 In this case, the discovery disputes relate to a substantive patent law issue, 24 specifically as to whether prior art might invalidate the ’216 Patent, so the Court applies 25 Federal Circuit law. 26 27 28 1 The Court will file the in camera materials under seal. Correcting what the Magistrate Judge said at the end of the hearing, the originals will not be returned to defendants, absent further order of the Court. Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 3 1 More generally within the federal courts, Federal Rule of Civil Procedure 45 2 governs discovery from persons not a party to a lawsuit. The scope of the discovery that 3 can be requested under Rule 45 is the same as can be requested under Rule 34, which in 4 turn is the same as can be requested under Rule 26(b).2 Rule 26(b) allows a party to 5 obtain discovery concerning any nonprivileged matter that is relevant to any party’s claim 6 or defense.3 The court must limit the scope of the discovery sought if it is unreasonably 7 duplicative, it can be obtained from a source that is more convenient or less burdensome, 8 or the burden of producing it outweighs its likely benefit.4 9 If a person commanded to produce documents by subpoena objects to the 10 document request on a timely basis, the serving party may move to compel the document 11 production.5 The court, however, “must protect a person who is neither a party nor a 12 party’s officer from significant expense resulting from compliance.”6 Additionally, the 13 court may modify or quash a subpoena that requires the disclosure of confidential 14 commercial information.7 15 “Trade secrets” and other “confidential research, development, or commercial 16 information” are explicitly addressed in Rule 26. The Court, for good cause, may issue a 17 protective order to protect this information. To obtain a protective order based upon a 18 trade secret, the party seeking protection “must first establish that the information sought 19 is a trade secret and then demonstrate that its disclosure might be harmful.” Trevino v. 20 21 22 23 2 Fed. R. Civ. P. 45 advisory committee’s note (1970) (“[T]he scope of discovery through a subpoena is the same as that applicable to Rule 34 and other discovery rules”); Fed. R. Civ. P. 34(a) (“A party may serve on any other party a request within the scope of Rule 26(b)”). 3 Fed. R. Civ. P. 26(b)(1). 4 Fed. R. Civ. P. 26(b)(2)(C). 26 5 Fed. R. Civ. P. 45(c)(2)(B)(i). 27 6 Fed. R. Civ. P. 45(c)(2)(B)(ii). 28 7 24 25 Fed. R. Civ. P. 45(c)(3)(B)(i). Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 4 1 ACB Am., Inc., 232 F.R.D. 612, 617 (N.D. Cal. 2006) (citations omitted). The burden 2 then shifts to the party seeking the discovery to demonstrate that the information is 3 relevant and “necessary to prepare the case for trial.” Id. The court must then weigh the 4 risk of disclosure of the trade secret to unauthorized parties with the risk that a protective 5 order will impede prosecution or defense of the claims. Id. Once the moving party has 6 established relevance and necessity, “the discovery is virtually always ordered.” Id. 7 (quoting Compaq Computer Corp. v. Packard Bell Electronics, Inc., 163 F.R.D. 329, 338 8 (N.D. Cal. 1995) (additional citations omitted)). In this case, a protective order is already in place in the Texas Action. The parties 9 10 do not question that the protective order would restrict the use of any information 11 produced in response to the subpoenas. 12 III. Analysis 13 A. Trade Secrets 14 Neither party could identify a case presenting the peculiar posture of this matter 15 and the Court is not aware of a prior relevant decision. Discovery disputes with third 16 parties often turn on whether the information demanded is relevant and whether the 17 responding party would be unfairly burdened by producing discovery. Not here. 18 In this case, Sidman and Wecker and their invisible client8 approached Symantec 19 and Sony and promoted the fact that they possessed information that would be highly 20 relevant to the Texas Action. In their own words, they possess the “Silver Bullet” to 21 defend the infringement case. The information they possess is so relevant and valuable 22 that Symantec and Sony should want to buy or license the information. In the opinion of 23 the client, the information may invalidate the patent that Symantec and Sony are litigating 24 in Texas. As a result, there is no question that the information sought is highly relevant. 25 8 26 27 28 The label “troll” with some controversy has been affixed to non-practicing entities in the patent context. Here, Sony and Symantec have not sought to label the “client” as a troll. But “client” is something different than most patent trolls. Client seeks to remain invisible while simultaneously proclaiming possession of a precious “Silver Bullet.” Perhaps “Gollum,” a wily creature clutching at treasure while hiding in the dark, would be most apt. Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 5 There also is no serious argument about burden. The invisible client has stated it 1 2 has information and could be ready to provide it if the price is right. Cases like Convolve, 3 Inc. v. Dell, Inc., No. 10-cv-80071 WHA, 2011 WL 1766486 (N.D. Cal. May 9, 2011), 4 where the Court quashed a subpoena served on a third-party, are distinct. There, the 5 Court was concerned that the subpoena was not narrowly drawn and would impose an 6 unfair burden on an uninvolved bystander. Id. at *2. If Sidman, Wecker, and their client possess knowledge of “prior art,” by statutory 7 8 definition the art must have been “known or used by others.” 35 U.S.C. § 102(a). This 9 provision has been held to mean “only what was known or used publicly or was 10 accessible to the public.” Globe Linings, Inc. v. City of Corvallis, 555 F.2d 727, 729 (9th 11 Cir. 1977). By vouching that the product possessed by client would invalidate the ’216 12 Patent, Sidman and Wecker are necessarily saying that the activation methodology at 13 some time was not secret. At bottom, when Sidman and Wecker approached Sony and Symantec with their 14 15 “Silver Bullet” solicitation, they demonstrated an ability and intent to disclose the identity 16 and details of their prior art invalidating the ’216 Patent. To now say that they are bound 17 to keep the information confidential rings hollow. The Court therefore GRANTS the motion to compel discovery from Sidman and 18 19 Wecker as to the identity of the prior art client and information about the prior art 20 product. The Court concludes that to the extent there is a trade secret in this information, 21 that secret reasonably may be protected by the protective order already in place in the 22 Texas Action. 23 B. Attorney-Client Privilege 24 Next, the Court considers whether the communications identified on the privilege 25 log provided by Wecker and Sidman should be shielded by the attorney-client privilege. 26 Dkt. 16-1. That privilege “protects the confidentiality of communications between 27 attorney and client made for the purpose of obtaining legal advice.” EchoStar, 203 F.3d 28 at 804. Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 6 The Court reviewed the log and reviewed many of the documents in camera. The 1 2 Court finds that the communications were between attorney and client and were made for 3 the purpose of obtaining legal advice. Moreover, the Court determines that Sidman and 4 Wecker did not waive the privilege even though they delayed producing a log until just 5 before they filed their opposition to the motion to compel. Waivers are disfavored and 6 the Court finds that Sidman and Wecker did not intend to waive the privilege. 7 As a result, the Court DENIES the motion to compel production of the 8 communications set forth on the privilege log. 9 IV. 10 Conclusion The Court concludes that no privilege protects discovery from Sidman and Wecker 11 of the identity of the prior art client or the prior art product. To the extent this 12 information constitutes a trade secret, that secret reasonably may be protected by the 13 existing protective order. The communications identified by Wecker and Sidman on their 14 privilege log are protected from disclosure by the attorney-client privilege. Accordingly, 15 the Court orders as follows: 16 1. a.m. at the offices of Latham & Watkins, San Francisco. 17 18 2. Wecker is ordered to appear for his deposition on Monday, April 28, at 1:30 p.m. at the offices of Latham & Watkins, San Francisco. 19 20 Sidman is ordered to appear for his deposition on Monday, April 28, at 9:00 3. Before their depositions, Wecker and Sidman are ordered to produce any 21 documents responsive to the subpoenas that are not identified on the 22 privilege log, and that they previously withheld as a trade secret or 23 confidential. (Based on the statements at the hearing, the Court understands 24 that no such documents are in the possession, custody, or control of Wecker 25 and Sidman). 26 4. governed by the protective order in the Texas Action. 27 28 Any documents and information produced in response to the subpoenas are 5. The attorney-client privilege assertions made by Sidman and Wecker in Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 7 1 their privilege log are SUSTAINED. They do not need to produce these 2 communications. 3 4 6. The Court concludes that Sidman and Wecker have not waived the attorney-client privilege. 5 Any party may object to this nondispositive order within 14 days under Fed. R. 6 Civ. P. 72(a). Any motion for expedited briefing and ruling on an objection should be 7 asserted with the District Court. 8 IT IS SO ORDERED. 9 Date: April 24, 2014 ___________________________ NATHANAEL M. COUSINS United States Magistrate Judge 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Case No. 14-mc-80094 JST (NC) ORDER GRANTING IN PART MOT. TO COMPEL 8

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?