Synopsys, Inc. v. Ubiquiti Networks, Inc. et al
Filing
201
ORDER by Judge Laurel Beeler adjudicating 198 Discovery Letter Brief.As set forth in the attached order, the court declines to order Synopsys to produce printouts of the source code in question. This denial is without prejudice to a futur e request for source-code printouts, upon a proper showing that such printouts "are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial."The court also remi nds the parties that discovery letter briefs must be filed under the Civil Events category of "Motions and Related Filings > Motions General > Discovery Letter Brief," not as "Letters," on ECF. Signed by Judge Laurel Beeler on May 21, 2018. (lblc1S, COURT STAFF) (Filed on 5/21/2018)
1
2
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
NORTHERN DISTRICT OF CALIFORNIA
10
San Francisco Division
United States District Court
Northern District of California
11
SYNOPSYS, INC.,
Plaintiff,
12
13
14
15
Case No. 17-cv-00561-WHO (LB)
v.
UBIQUITI NETWORKS, INC., et al.,
Defendants.
ORDER ADJUDICATING DISCOVERY
DISPUTE REGARDING SOURCECODE PRINTOUTS
Re: ECF No. 198
16
17
18
INTRODUCTION
This litigation centers around allegations by plaintiff Synopsys, Inc. that the defendants used
19
counterfeit license keys to install and use Synopsys software on their computers without a valid
20
license. Synopsys bases its allegations in large part on so-called “call-home data.” Synopsys has
21
alleged that its software “calls home” whenever it is used without a valid license key and transmits
22
information about the computer running the software back to Synopsys. Synopsys has alleged that
23
its call-home data here shows that the defendants accessed Synopsys software more than 39,000
24
times without a valid license key. Defendant Ubiquiti Networks, Inc. (“Ubiquiti”) asserts that
25
Synopsys’s call-home data is vastly overinflating the number of alleged circumventions.
26
Synopsys has provided Ubiquiti with access to certain source code for its software, including
27
source code for its license-management system, for electronic inspection at its counsel’s office in
28
ORDER – No. 17-cv-00561-WHO (LB)
1
California. Synopsys and Ubiquiti raise a dispute about whether Synopsys should be required to
2
produce printouts of its source code for Ubiquiti’s expert witnesses.1
3
4
PRELIMINARY MATTERS
5
The court starts with a few preliminary matters. First, the parties’ joint letter brief was filed as
6
a “Letter” on ECF, not as a discovery letter brief. For internal administrative purposes, discovery
7
letter briefs must be filed under the Civil Events category of “Motions and Related Filings >
8
Motions – General > Discovery Letter Brief.”2 The court cautions that misfiling of discovery letter
9
briefs may cause delays or complications in their resolution.
Second, Synopsys raises a complaint about the joint-letter-briefing process.3 Synopsys writes
10
United States District Court
Northern District of California
11
that “[a]fter seeing Synopsys’ section of this brief, Defendants completely re-wrote their section to
12
raise new issues and also crafted new declarations advancing attorney argument under the guise of
13
fact testimony.”4 There is nothing wrong with one side revising its section of a letter brief after
14
seeing the other side’s. To the contrary, as the court previously explained, that is one of the central
15
purposes of the joint-letter-brief process: so that the parties can see each other’s positions and
16
arguments, can respond to them, can re-respond to the responses, etc., and thereby (1) try to find
17
areas of compromise and work out their disputes amongst themselves and (2) narrow, sharpen, and
18
focus the issues they cannot resolve before they present those issues to the court.5 Of course,
19
revisions to joint letter briefs must go both ways. If Ubiquiti “completely re-wr[ites]” its section of
20
the letter brief in response to Synopsys’s section, it must give Synopsys a chance to see its
21
revisions and revise its section in re-response as well. And so on. Each successive draft should
22
further sift out issues on which the parties can find compromise (and issues where one side has no
23
Joint Letter Br. – ECF No. 198. Citations refer to material in the Electronic Case File (“ECF”);
pinpoint citations are to the ECF-generated page numbers at the top of documents.
24
1
25
2
Order – ECF No. 104 at 6 n.6; Standing Order – ECF No. 104-1.
26
3
See Joint Letter Br. – ECF No. 198 at 6 n.7.
4
Id.
5
See Order – ECF No. 181 at 1–2; Order – ECF No. 165 at 2–3.
27
28
ORDER – No. 17-cv-00561-WHO (LB)
2
1
response to the other side’s arguments and thereby realizes that it should compromise), and the
2
final joint letter brief should include only the core, central unresolved issues and all of the parties’
3
arguments on those issues (including all the responses they have to the other side’s arguments).
4
That, at least, is the hope. Of course, it is possible to abuse the joint-letter-brief process (e.g., one
5
side could unreasonably delay its responses, or, conversely, one side could give the other side an
6
unreasonably short time to submit its responses). To that, the court reminds the parties once again
7
that they have an obligation to negotiate in good faith and cooperate in discovery.6
With those preliminary matters dispensed with, the court now turns to the merits of the parties’
8
9
dispute.
10
United States District Court
Northern District of California
11
ANALYSIS
There does not appear to be any dispute regarding electronic access to Synopsys’s source code:
12
13
Synopsys states, and Ubiquiti does not dispute, that “[a]ll of the code at issue has already been
14
produced” for electronic review at Synopsys’s counsel’s office.7 The parties’ dispute only
15
concerns printouts of the source code.
16
The parties’ Stipulated Protective Order provides that a party “may request paper copies of
17
limited portions of information designated as HIGHLY CONFIDENTIAL – SOURCE CODE . . .
18
that are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other
19
papers, or for deposition or trial, but shall not request paper or electronic copies for the purposes
20
of reviewing the HIGHLY CONFIDENTIAL – SOURCE CODE . . . other than electronically as
21
set forth in paragraph (c) in the first instance.”8 In the event of a dispute regarding source-code
22
23
24
25
26
See, e.g., Order – ECF No. 181 at 2; Order – ECF No. 176 at 5 n.16; Order – ECF No. 165 at 3;
Order – ECF No. 153 at 3; Order – ECF No. 136 at 5 & n.16.
6
7
27
Joint Letter Br. – ECF No. 198 at 4 (emphasis removed).
8
Stipulated Protective Order – ECF No. 94 at 16 (¶ 9(d)).
28
ORDER – No. 17-cv-00561-WHO (LB)
3
1
printouts, the party requesting the source code bears the burden of establishing that the source-
2
code printouts are reasonably necessary.9
At least one court has held that even where an expert has conducted an initial electronic
3
4
source-code review and states that source code is necessary for his or her expert report, it may be
5
appropriate in some circumstances to require the expert to conduct a second electronic review so
6
that he or she can further limit the scope of his or her requests, before a court orders production of
7
source-code printouts. Imageware Sys., Inc. v. Fulcrum Biometrics, LLC, No. 13CV936-
8
DMS(JMA), 2014 WL 12489939, at *1 (S.D. Cal. Nov. 26, 2014).
Here, Ubiquiti, as the requesting party, bears the burden of persuasion that source-code
9
printouts are “reasonably necessary for the preparation of court filings, pleadings, expert reports,
11
United States District Court
Northern District of California
10
or other papers, or for deposition or trial.” The court finds it has not met its burden. With respect
12
to expert reports, Ubiquiti’s expert, Stuart Stubblebine, does not attest that source-code printouts
13
(as opposed to reviewing the source code) are reasonably necessary for him to prepare his expert
14
report. Dr. Stubblebine does not appear to have conducted an initial electronic review of the
15
source code at issue in the first instance.10 At the very least, it seems reasonable to require Dr.
16
Stubblebine to conduct an initial inspection of the source code electronically before requesting
17
printouts, in keeping with the Protective Order’s admonishment that the parties “shall not request
18
paper or electronic copies for the purposes of reviewing the HIGHLY CONFIDENTIAL –
19
SOURCE CODE . . . other than electronically as set forth in paragraph (c) in the first instance.”11
20
21
22
23
24
See id. (“[T]he Receiving Party is the ‘Designating Party’ for purposes of dispute resolution”); id. at
9 (¶ 6.3) (“The burden of persuasion in any such challenge proceeding shall be on the Designating
Party.”).
25
10
26
27
9
Another one of Ubiquiti’s experts, Steve Waldbusser, has reviewed more of the source code at issue
electronically, but he does not say anything about whether source-code printouts are reasonably
necessary for any purpose, see Waldbusser Decl. – ECF No. 198-2, and Ubiquiti does not rely on him
in making its printout request.
11
Stipulated Protective Order – ECF No. 94 at 16 (¶ 9(d)).
28
ORDER – No. 17-cv-00561-WHO (LB)
4
1
Cf. Imageware, 2014 WL 12489939, at *1 (requiring expert who had conducted an initial
2
electronic source-code review to conduct a second electronic review before requesting printouts).12
3
Ubiquiti argues that it is unreasonable to require Dr. Stubblebine to travel to Synopsys’s
4
counsel’s office in California to electronically inspect Synopsys’s source code.13 But the parties
5
stipulated that the location for source-code inspections would be their respective counsel’s
6
offices.14 Having made that agreement, Ubiquiti must live with it. Ubiquiti does not cite any cases
7
that support the proposition that the fact that its expert lives far from Synopsys’s counsel’s office
8
renders source-code printouts “reasonably necessary” for purposes of the Protective Order.
The cases that Ubiquiti does cite are inapposite. Linex Tech Inc. v. Hewlett Packard Co., No. C
10
13-1820909 (N.D. Cal. Apr. 30, 2013), OpenTV, Inc. v. Apple, Inc., No. 14-cv-01622-JST (KAW),
11
United States District Court
Northern District of California
9
2014 WL 5079343 (N.D. Cal. Oct 9, 2014), TVIIM, LLC v. McAfee, Inc., No. 13-cv-04545-VC
12
(KAW), 2014 U.S. Dist. LEXIS 113104 (N.D. Cal. Aug. 14, 2014), and Kelora Systems, LLC v.
13
Target Corp., No. C 11-01548 CW (LB), 2011 WL 6000759 (N.D. Cal. Aug. 29, 2011),
14
concerned disputes about what sort of protective order a court should enter in the first instance
15
(including, in some instances, disputes about whether the protective order should contain specific
16
limits on the amount of source-code printouts a party could request). That is not the issue here.
17
The parties are not negotiating a protective order. They have already stipulated to a protective
18
order, which the court has entered. The court is now applying the parties’ stipulated Protective
19
Order pursuant to its terms.15
20
21
22
23
12
With respect to court filings, pleadings, or other papers, Ubiquiti only states, ipse dixit, that sourcecode printouts are necessary for summary-judgment, Daubert, and in-limine motions, Joint Letter Br. –
ECF No. 198 at 4, but it does not explain how or why, much less support those assertions. This is
insufficient to carry its burden.
13
24
25
26
27
28
Id.
14
Protective Order – ECF No. 94 at 15 (¶ 9(c)).
15
Ubiquiti also cites two other cases, but neither supports its arguments. Microunity Systems
Engineering, Inc. v. Apple Inc., No. 13-mc-80020 LHK (PSG), 2013 WL 2384261 (N.D. Cal. May 30,
2013) involved the application of a protective order entered by the Eastern District of Texas, which the
Northern District of California applied in a third-party discovery dispute pursuant to its terms. Id. at
*3. Knaggs v. Yahoo! Inc., No. 15-mc-80281-MEJ, 2016 WL 39116350 (N.D. Cal. July 20, 2016),
involved discovery in connection with a criminal case in the United Kingdom, where the parties had
(cont’d)
ORDER – No. 17-cv-00561-WHO (LB)
5
1
CONCLUSION
2
For the foregoing reasons, the court declines to order Synopsys to produce printouts of the
3
source code in question. This denial is without prejudice to a future request for source-code
4
printouts, upon a proper showing that such printouts “are reasonably necessary for the preparation
5
of court filings, pleadings, expert reports, or other papers, or for deposition or trial.”
6
7
IT IS SO ORDERED.
8
Dated: May 21, 2018
______________________________________
LAUREL BEELER
United States Magistrate Judge
9
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
no preexisting protective order and the court instructed them to meet and confer about confidentiality
protections, including potentially seeking a protective order. Id. at *8.
28
ORDER – No. 17-cv-00561-WHO (LB)
6
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?