Symantec Corp. et al v. Sidman et al
Filing
29
Order by Magistrate Judge Nathanael M. Cousins granting in part and denying in part 1 , 25 Motion to Compel.(nclc2, COURT STAFF) (Filed on 4/24/2014)
1
2
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
NORTHERN DISTRICT OF CALIFORNIA
10
SAN FRANCISCO DIVISION
11
12
13
14
15
16
17
SYMANTEC CORP. and SONY DADC
US, INC.,
Plaintiffs,
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
PLAINTIFFS’ MOTION TO COMPEL
v.
Hearing: April 23, 2014
GEORGE SIDMAN and BRUCE
WECKER,
Re: Dkt. 1 (redacted), 25 (unredacted)
Defendants.
18
19
20
21
The primary question presented is whether a person possessing knowledge of
22
“prior art” that could invalidate a patent may shield his identity and the prior art from
23
discovery in a patent infringement lawsuit. Because the Court concludes that defendants
24
have not established that the prior art and the identity of the persons with knowledge of
25
the prior art should be protected as trade secrets, the Court GRANTS the motion to
26
compel on this question.
27
A second question is less novel: whether defendants have established that the
28
attorney-client privilege shields from disclosure 42 written communications between
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
1
client and counsel. The Court concludes that those communications were made in pursuit
2
of legal advice from counsel, so properly were withheld as privileged. As to the attorney-
3
client communications challenged in the motion to compel, the motion is DENIED.
4
I.
5
Background
Plaintiffs in this discovery dispute, Symantec and Sony, are defendants in patent
6
infringement suits consolidated in the U.S. District Court, Eastern District of Texas. The
7
underlying cases concern U.S. Patent No. 5,490,216 (the ’216 Patent), which is a patent
8
about product activation software. Uniloc USA, Inc. et al. v. Activision Blizzard, Inc., No.
9
13-cv-00256 LED (E.D. Tex.). The deadline for fact discovery in the Texas Action is
10
May 2, 2014. Expert reports on patent invalidity are due June 2, 2014. Dkt. 25, Mot. to
11
Compel at 3.
12
The Texas Court has issued a Protective Order under Fed. R. Civ. P. 26(c) to
13
regulate the discovery and use of information that contains trade secrets, confidential,
14
proprietary, and commercially sensitive information. Texas Action, Dkt. 96, issued
15
8/20/2013. That Protective Order would apply to any of the information and documents
16
produced under the subpoenas in this dispute.
17
George Sidman, on behalf of an anonymous client, wrote to Symantec and Sony in
18
November 2013 and stated that the client possessed the “Silver Bullet” that may
19
invalidate the ’216 Patent. Sidman wrote that the client “believes that the product
20
activation methodology within the subject technology predates and may invalidate the
21
Uniloc patent [’216 Patent].” Dkt. 26, Ex. A to Declaration of Fahd Majiduddin, at 1.
22
Sidman, on behalf of the client, offered to sell or license the product to Symantec and
23
Sony and the other parties seeking to invalidate the ’216 Patent. Bruce Wecker is an
24
attorney for the client and was copied on the correspondence from Sidman.
25
Symantec and Sony did not accept this unsolicited invitation. Instead, they served
26
Wecker and Sidman with subpoenas for depositions and documents that would reveal the
27
prior art product, the client, and communications between client and counsel that might
28
provide information revealing the prior art product. Wecker and Sidman produced some
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
2
1
documents, but objected to further production based on various grounds of privilege,
2
trade secrets, privacy, and confidentiality. Most significantly, Wecker and Sidman
3
objected to identifying their client or the prior art product.
The parties conferred but were unable to resolve their dispute. Symantec and Sony
4
5
then moved to compel compliance with their subpoenas. The motion and all other
6
discovery disputes were referred to the undersigned Magistrate Judge by the District
7
Court. Dkt. 12. The Court held a hearing on April 23, 2014. During the hearing, the
8
Court reviewed the following materials in camera that were identified by Sidman and
9
Wecker on a privilege log: items 1, 9, 10, 19, 22, 23, 24, 25, 26, 33, and 42.1 Dkt. 16-1.
10
11
II.
Legal Standard
As a preliminary matter, there is a question about which laws apply to the privilege
12
and trade secret issues presented. In patent litigation, Federal Circuit law applies when
13
resolving discovery disputes that relate to an issue of substantive patent law. In re
14
EchoStar Communications Corp., 448 F.3d 1294, 1298 (Fed. Cir. 2006) (“Federal circuit
15
law applies when deciding whether particular written or other materials are discoverable
16
in a patent case, if those materials relate to an issue of substantive patent law”); see also
17
Bd. of Trustees Leland Stanford Junior Univ. v. Roche Molecular Sys., Inc., 237 F.R.D.
18
618, 623 (N.D. Cal. 2006) ( “issues that relate to discovery disputes and other procedural
19
issues, which are unique to patent cases, should be decided pursuant to Federal Circuit
20
law”); Adobe Sys. Inc. v. Wowza Media Sys., LLC, No. 11-cv-2243 CW (JSC), 2012 WL
21
6554003, at *1 (N.D. Cal. Dec. 14, 2012) (Federal Circuit law applied to dispute over
22
waiver of attorney-client privilege in patent case).
23
In this case, the discovery disputes relate to a substantive patent law issue,
24
specifically as to whether prior art might invalidate the ’216 Patent, so the Court applies
25
Federal Circuit law.
26
27
28
1
The Court will file the in camera materials under seal. Correcting what the Magistrate
Judge said at the end of the hearing, the originals will not be returned to defendants, absent
further order of the Court.
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
3
1
More generally within the federal courts, Federal Rule of Civil Procedure 45
2
governs discovery from persons not a party to a lawsuit. The scope of the discovery that
3
can be requested under Rule 45 is the same as can be requested under Rule 34, which in
4
turn is the same as can be requested under Rule 26(b).2 Rule 26(b) allows a party to
5
obtain discovery concerning any nonprivileged matter that is relevant to any party’s claim
6
or defense.3 The court must limit the scope of the discovery sought if it is unreasonably
7
duplicative, it can be obtained from a source that is more convenient or less burdensome,
8
or the burden of producing it outweighs its likely benefit.4
9
If a person commanded to produce documents by subpoena objects to the
10
document request on a timely basis, the serving party may move to compel the document
11
production.5 The court, however, “must protect a person who is neither a party nor a
12
party’s officer from significant expense resulting from compliance.”6 Additionally, the
13
court may modify or quash a subpoena that requires the disclosure of confidential
14
commercial information.7
15
“Trade secrets” and other “confidential research, development, or commercial
16
information” are explicitly addressed in Rule 26. The Court, for good cause, may issue a
17
protective order to protect this information. To obtain a protective order based upon a
18
trade secret, the party seeking protection “must first establish that the information sought
19
is a trade secret and then demonstrate that its disclosure might be harmful.” Trevino v.
20
21
22
23
2
Fed. R. Civ. P. 45 advisory committee’s note (1970) (“[T]he scope of discovery through
a subpoena is the same as that applicable to Rule 34 and other discovery rules”); Fed. R. Civ. P.
34(a) (“A party may serve on any other party a request within the scope of Rule 26(b)”).
3
Fed. R. Civ. P. 26(b)(1).
4
Fed. R. Civ. P. 26(b)(2)(C).
26
5
Fed. R. Civ. P. 45(c)(2)(B)(i).
27
6
Fed. R. Civ. P. 45(c)(2)(B)(ii).
28
7
24
25
Fed. R. Civ. P. 45(c)(3)(B)(i).
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
4
1
ACB Am., Inc., 232 F.R.D. 612, 617 (N.D. Cal. 2006) (citations omitted). The burden
2
then shifts to the party seeking the discovery to demonstrate that the information is
3
relevant and “necessary to prepare the case for trial.” Id. The court must then weigh the
4
risk of disclosure of the trade secret to unauthorized parties with the risk that a protective
5
order will impede prosecution or defense of the claims. Id. Once the moving party has
6
established relevance and necessity, “the discovery is virtually always ordered.” Id.
7
(quoting Compaq Computer Corp. v. Packard Bell Electronics, Inc., 163 F.R.D. 329, 338
8
(N.D. Cal. 1995) (additional citations omitted)).
In this case, a protective order is already in place in the Texas Action. The parties
9
10
do not question that the protective order would restrict the use of any information
11
produced in response to the subpoenas.
12
III.
Analysis
13
A.
Trade Secrets
14
Neither party could identify a case presenting the peculiar posture of this matter
15
and the Court is not aware of a prior relevant decision. Discovery disputes with third
16
parties often turn on whether the information demanded is relevant and whether the
17
responding party would be unfairly burdened by producing discovery. Not here.
18
In this case, Sidman and Wecker and their invisible client8 approached Symantec
19
and Sony and promoted the fact that they possessed information that would be highly
20
relevant to the Texas Action. In their own words, they possess the “Silver Bullet” to
21
defend the infringement case. The information they possess is so relevant and valuable
22
that Symantec and Sony should want to buy or license the information. In the opinion of
23
the client, the information may invalidate the patent that Symantec and Sony are litigating
24
in Texas. As a result, there is no question that the information sought is highly relevant.
25
8
26
27
28
The label “troll” with some controversy has been affixed to non-practicing entities in
the patent context. Here, Sony and Symantec have not sought to label the “client” as a troll. But
“client” is something different than most patent trolls. Client seeks to remain invisible while
simultaneously proclaiming possession of a precious “Silver Bullet.” Perhaps “Gollum,” a wily
creature clutching at treasure while hiding in the dark, would be most apt.
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
5
There also is no serious argument about burden. The invisible client has stated it
1
2
has information and could be ready to provide it if the price is right. Cases like Convolve,
3
Inc. v. Dell, Inc., No. 10-cv-80071 WHA, 2011 WL 1766486 (N.D. Cal. May 9, 2011),
4
where the Court quashed a subpoena served on a third-party, are distinct. There, the
5
Court was concerned that the subpoena was not narrowly drawn and would impose an
6
unfair burden on an uninvolved bystander. Id. at *2.
If Sidman, Wecker, and their client possess knowledge of “prior art,” by statutory
7
8
definition the art must have been “known or used by others.” 35 U.S.C. § 102(a). This
9
provision has been held to mean “only what was known or used publicly or was
10
accessible to the public.” Globe Linings, Inc. v. City of Corvallis, 555 F.2d 727, 729 (9th
11
Cir. 1977). By vouching that the product possessed by client would invalidate the ’216
12
Patent, Sidman and Wecker are necessarily saying that the activation methodology at
13
some time was not secret.
At bottom, when Sidman and Wecker approached Sony and Symantec with their
14
15
“Silver Bullet” solicitation, they demonstrated an ability and intent to disclose the identity
16
and details of their prior art invalidating the ’216 Patent. To now say that they are bound
17
to keep the information confidential rings hollow.
The Court therefore GRANTS the motion to compel discovery from Sidman and
18
19
Wecker as to the identity of the prior art client and information about the prior art
20
product. The Court concludes that to the extent there is a trade secret in this information,
21
that secret reasonably may be protected by the protective order already in place in the
22
Texas Action.
23
B.
Attorney-Client Privilege
24
Next, the Court considers whether the communications identified on the privilege
25
log provided by Wecker and Sidman should be shielded by the attorney-client privilege.
26
Dkt. 16-1. That privilege “protects the confidentiality of communications between
27
attorney and client made for the purpose of obtaining legal advice.” EchoStar, 203 F.3d
28
at 804.
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
6
The Court reviewed the log and reviewed many of the documents in camera. The
1
2
Court finds that the communications were between attorney and client and were made for
3
the purpose of obtaining legal advice. Moreover, the Court determines that Sidman and
4
Wecker did not waive the privilege even though they delayed producing a log until just
5
before they filed their opposition to the motion to compel. Waivers are disfavored and
6
the Court finds that Sidman and Wecker did not intend to waive the privilege.
7
As a result, the Court DENIES the motion to compel production of the
8
communications set forth on the privilege log.
9
IV.
10
Conclusion
The Court concludes that no privilege protects discovery from Sidman and Wecker
11
of the identity of the prior art client or the prior art product. To the extent this
12
information constitutes a trade secret, that secret reasonably may be protected by the
13
existing protective order. The communications identified by Wecker and Sidman on their
14
privilege log are protected from disclosure by the attorney-client privilege. Accordingly,
15
the Court orders as follows:
16
1.
a.m. at the offices of Latham & Watkins, San Francisco.
17
18
2.
Wecker is ordered to appear for his deposition on Monday, April 28, at 1:30
p.m. at the offices of Latham & Watkins, San Francisco.
19
20
Sidman is ordered to appear for his deposition on Monday, April 28, at 9:00
3.
Before their depositions, Wecker and Sidman are ordered to produce any
21
documents responsive to the subpoenas that are not identified on the
22
privilege log, and that they previously withheld as a trade secret or
23
confidential. (Based on the statements at the hearing, the Court understands
24
that no such documents are in the possession, custody, or control of Wecker
25
and Sidman).
26
4.
governed by the protective order in the Texas Action.
27
28
Any documents and information produced in response to the subpoenas are
5.
The attorney-client privilege assertions made by Sidman and Wecker in
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
7
1
their privilege log are SUSTAINED. They do not need to produce these
2
communications.
3
4
6.
The Court concludes that Sidman and Wecker have not waived the
attorney-client privilege.
5
Any party may object to this nondispositive order within 14 days under Fed. R.
6
Civ. P. 72(a). Any motion for expedited briefing and ruling on an objection should be
7
asserted with the District Court.
8
IT IS SO ORDERED.
9
Date: April 24, 2014
___________________________
NATHANAEL M. COUSINS
United States Magistrate Judge
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Case No. 14-mc-80094 JST (NC)
ORDER GRANTING IN PART
MOT. TO COMPEL
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?