Synopsys, Inc. v. Ubiquiti Networks, Inc. et al

Filing 201

ORDER by Judge Laurel Beeler adjudicating 198 Discovery Letter Brief.As set forth in the attached order, the court declines to order Synopsys to produce printouts of the source code in question. This denial is without prejudice to a futur e request for source-code printouts, upon a proper showing that such printouts "are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial."The court also remi nds the parties that discovery letter briefs must be filed under the Civil Events category of "Motions and Related Filings > Motions General > Discovery Letter Brief," not as "Letters," on ECF. Signed by Judge Laurel Beeler on May 21, 2018. (lblc1S, COURT STAFF) (Filed on 5/21/2018)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 10 San Francisco Division United States District Court Northern District of California 11 SYNOPSYS, INC., Plaintiff, 12 13 14 15 Case No. 17-cv-00561-WHO (LB) v. UBIQUITI NETWORKS, INC., et al., Defendants. ORDER ADJUDICATING DISCOVERY DISPUTE REGARDING SOURCECODE PRINTOUTS Re: ECF No. 198 16 17 18 INTRODUCTION This litigation centers around allegations by plaintiff Synopsys, Inc. that the defendants used 19 counterfeit license keys to install and use Synopsys software on their computers without a valid 20 license. Synopsys bases its allegations in large part on so-called “call-home data.” Synopsys has 21 alleged that its software “calls home” whenever it is used without a valid license key and transmits 22 information about the computer running the software back to Synopsys. Synopsys has alleged that 23 its call-home data here shows that the defendants accessed Synopsys software more than 39,000 24 times without a valid license key. Defendant Ubiquiti Networks, Inc. (“Ubiquiti”) asserts that 25 Synopsys’s call-home data is vastly overinflating the number of alleged circumventions. 26 Synopsys has provided Ubiquiti with access to certain source code for its software, including 27 source code for its license-management system, for electronic inspection at its counsel’s office in 28 ORDER – No. 17-cv-00561-WHO (LB) 1 California. Synopsys and Ubiquiti raise a dispute about whether Synopsys should be required to 2 produce printouts of its source code for Ubiquiti’s expert witnesses.1 3 4 PRELIMINARY MATTERS 5 The court starts with a few preliminary matters. First, the parties’ joint letter brief was filed as 6 a “Letter” on ECF, not as a discovery letter brief. For internal administrative purposes, discovery 7 letter briefs must be filed under the Civil Events category of “Motions and Related Filings > 8 Motions – General > Discovery Letter Brief.”2 The court cautions that misfiling of discovery letter 9 briefs may cause delays or complications in their resolution. Second, Synopsys raises a complaint about the joint-letter-briefing process.3 Synopsys writes 10 United States District Court Northern District of California 11 that “[a]fter seeing Synopsys’ section of this brief, Defendants completely re-wrote their section to 12 raise new issues and also crafted new declarations advancing attorney argument under the guise of 13 fact testimony.”4 There is nothing wrong with one side revising its section of a letter brief after 14 seeing the other side’s. To the contrary, as the court previously explained, that is one of the central 15 purposes of the joint-letter-brief process: so that the parties can see each other’s positions and 16 arguments, can respond to them, can re-respond to the responses, etc., and thereby (1) try to find 17 areas of compromise and work out their disputes amongst themselves and (2) narrow, sharpen, and 18 focus the issues they cannot resolve before they present those issues to the court.5 Of course, 19 revisions to joint letter briefs must go both ways. If Ubiquiti “completely re-wr[ites]” its section of 20 the letter brief in response to Synopsys’s section, it must give Synopsys a chance to see its 21 revisions and revise its section in re-response as well. And so on. Each successive draft should 22 further sift out issues on which the parties can find compromise (and issues where one side has no 23 Joint Letter Br. – ECF No. 198. Citations refer to material in the Electronic Case File (“ECF”); pinpoint citations are to the ECF-generated page numbers at the top of documents. 24 1 25 2 Order – ECF No. 104 at 6 n.6; Standing Order – ECF No. 104-1. 26 3 See Joint Letter Br. – ECF No. 198 at 6 n.7. 4 Id. 5 See Order – ECF No. 181 at 1–2; Order – ECF No. 165 at 2–3. 27 28 ORDER – No. 17-cv-00561-WHO (LB) 2 1 response to the other side’s arguments and thereby realizes that it should compromise), and the 2 final joint letter brief should include only the core, central unresolved issues and all of the parties’ 3 arguments on those issues (including all the responses they have to the other side’s arguments). 4 That, at least, is the hope. Of course, it is possible to abuse the joint-letter-brief process (e.g., one 5 side could unreasonably delay its responses, or, conversely, one side could give the other side an 6 unreasonably short time to submit its responses). To that, the court reminds the parties once again 7 that they have an obligation to negotiate in good faith and cooperate in discovery.6 With those preliminary matters dispensed with, the court now turns to the merits of the parties’ 8 9 dispute. 10 United States District Court Northern District of California 11 ANALYSIS There does not appear to be any dispute regarding electronic access to Synopsys’s source code: 12 13 Synopsys states, and Ubiquiti does not dispute, that “[a]ll of the code at issue has already been 14 produced” for electronic review at Synopsys’s counsel’s office.7 The parties’ dispute only 15 concerns printouts of the source code. 16 The parties’ Stipulated Protective Order provides that a party “may request paper copies of 17 limited portions of information designated as HIGHLY CONFIDENTIAL – SOURCE CODE . . . 18 that are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other 19 papers, or for deposition or trial, but shall not request paper or electronic copies for the purposes 20 of reviewing the HIGHLY CONFIDENTIAL – SOURCE CODE . . . other than electronically as 21 set forth in paragraph (c) in the first instance.”8 In the event of a dispute regarding source-code 22 23 24 25 26 See, e.g., Order – ECF No. 181 at 2; Order – ECF No. 176 at 5 n.16; Order – ECF No. 165 at 3; Order – ECF No. 153 at 3; Order – ECF No. 136 at 5 & n.16. 6 7 27 Joint Letter Br. – ECF No. 198 at 4 (emphasis removed). 8 Stipulated Protective Order – ECF No. 94 at 16 (¶ 9(d)). 28 ORDER – No. 17-cv-00561-WHO (LB) 3 1 printouts, the party requesting the source code bears the burden of establishing that the source- 2 code printouts are reasonably necessary.9 At least one court has held that even where an expert has conducted an initial electronic 3 4 source-code review and states that source code is necessary for his or her expert report, it may be 5 appropriate in some circumstances to require the expert to conduct a second electronic review so 6 that he or she can further limit the scope of his or her requests, before a court orders production of 7 source-code printouts. Imageware Sys., Inc. v. Fulcrum Biometrics, LLC, No. 13CV936- 8 DMS(JMA), 2014 WL 12489939, at *1 (S.D. Cal. Nov. 26, 2014). Here, Ubiquiti, as the requesting party, bears the burden of persuasion that source-code 9 printouts are “reasonably necessary for the preparation of court filings, pleadings, expert reports, 11 United States District Court Northern District of California 10 or other papers, or for deposition or trial.” The court finds it has not met its burden. With respect 12 to expert reports, Ubiquiti’s expert, Stuart Stubblebine, does not attest that source-code printouts 13 (as opposed to reviewing the source code) are reasonably necessary for him to prepare his expert 14 report. Dr. Stubblebine does not appear to have conducted an initial electronic review of the 15 source code at issue in the first instance.10 At the very least, it seems reasonable to require Dr. 16 Stubblebine to conduct an initial inspection of the source code electronically before requesting 17 printouts, in keeping with the Protective Order’s admonishment that the parties “shall not request 18 paper or electronic copies for the purposes of reviewing the HIGHLY CONFIDENTIAL – 19 SOURCE CODE . . . other than electronically as set forth in paragraph (c) in the first instance.”11 20 21 22 23 24 See id. (“[T]he Receiving Party is the ‘Designating Party’ for purposes of dispute resolution”); id. at 9 (¶ 6.3) (“The burden of persuasion in any such challenge proceeding shall be on the Designating Party.”). 25 10 26 27 9 Another one of Ubiquiti’s experts, Steve Waldbusser, has reviewed more of the source code at issue electronically, but he does not say anything about whether source-code printouts are reasonably necessary for any purpose, see Waldbusser Decl. – ECF No. 198-2, and Ubiquiti does not rely on him in making its printout request. 11 Stipulated Protective Order – ECF No. 94 at 16 (¶ 9(d)). 28 ORDER – No. 17-cv-00561-WHO (LB) 4 1 Cf. Imageware, 2014 WL 12489939, at *1 (requiring expert who had conducted an initial 2 electronic source-code review to conduct a second electronic review before requesting printouts).12 3 Ubiquiti argues that it is unreasonable to require Dr. Stubblebine to travel to Synopsys’s 4 counsel’s office in California to electronically inspect Synopsys’s source code.13 But the parties 5 stipulated that the location for source-code inspections would be their respective counsel’s 6 offices.14 Having made that agreement, Ubiquiti must live with it. Ubiquiti does not cite any cases 7 that support the proposition that the fact that its expert lives far from Synopsys’s counsel’s office 8 renders source-code printouts “reasonably necessary” for purposes of the Protective Order. The cases that Ubiquiti does cite are inapposite. Linex Tech Inc. v. Hewlett Packard Co., No. C 10 13-1820909 (N.D. Cal. Apr. 30, 2013), OpenTV, Inc. v. Apple, Inc., No. 14-cv-01622-JST (KAW), 11 United States District Court Northern District of California 9 2014 WL 5079343 (N.D. Cal. Oct 9, 2014), TVIIM, LLC v. McAfee, Inc., No. 13-cv-04545-VC 12 (KAW), 2014 U.S. Dist. LEXIS 113104 (N.D. Cal. Aug. 14, 2014), and Kelora Systems, LLC v. 13 Target Corp., No. C 11-01548 CW (LB), 2011 WL 6000759 (N.D. Cal. Aug. 29, 2011), 14 concerned disputes about what sort of protective order a court should enter in the first instance 15 (including, in some instances, disputes about whether the protective order should contain specific 16 limits on the amount of source-code printouts a party could request). That is not the issue here. 17 The parties are not negotiating a protective order. They have already stipulated to a protective 18 order, which the court has entered. The court is now applying the parties’ stipulated Protective 19 Order pursuant to its terms.15 20 21 22 23 12 With respect to court filings, pleadings, or other papers, Ubiquiti only states, ipse dixit, that sourcecode printouts are necessary for summary-judgment, Daubert, and in-limine motions, Joint Letter Br. – ECF No. 198 at 4, but it does not explain how or why, much less support those assertions. This is insufficient to carry its burden. 13 24 25 26 27 28 Id. 14 Protective Order – ECF No. 94 at 15 (¶ 9(c)). 15 Ubiquiti also cites two other cases, but neither supports its arguments. Microunity Systems Engineering, Inc. v. Apple Inc., No. 13-mc-80020 LHK (PSG), 2013 WL 2384261 (N.D. Cal. May 30, 2013) involved the application of a protective order entered by the Eastern District of Texas, which the Northern District of California applied in a third-party discovery dispute pursuant to its terms. Id. at *3. Knaggs v. Yahoo! Inc., No. 15-mc-80281-MEJ, 2016 WL 39116350 (N.D. Cal. July 20, 2016), involved discovery in connection with a criminal case in the United Kingdom, where the parties had (cont’d) ORDER – No. 17-cv-00561-WHO (LB) 5 1 CONCLUSION 2 For the foregoing reasons, the court declines to order Synopsys to produce printouts of the 3 source code in question. This denial is without prejudice to a future request for source-code 4 printouts, upon a proper showing that such printouts “are reasonably necessary for the preparation 5 of court filings, pleadings, expert reports, or other papers, or for deposition or trial.” 6 7 IT IS SO ORDERED. 8 Dated: May 21, 2018 ______________________________________ LAUREL BEELER United States Magistrate Judge 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 no preexisting protective order and the court instructed them to meet and confer about confidentiality protections, including potentially seeking a protective order. Id. at *8. 28 ORDER – No. 17-cv-00561-WHO (LB) 6

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?