Lone Star Silicon Innovations LLC v. Toshiba Corporation et al
Filing
215
ORDER RE 201 203 DISPUTE OVER "SOURCE CODE" CONFIDENTIALITY DESIGNATION. Signed by Judge Alsup on 12/20/2017. (whalc2, COURT STAFF) (Filed on 12/20/2017)
1
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE NORTHERN DISTRICT OF CALIFORNIA
8
9
11
For the Northern District of California
United States District Court
10
LONE STAR SILICON INNOVATIONS
LLC,
Plaintiff,
12
13
14
15
16
No. C 17-04034 WHA
v.
ORDER RE DISPUTE
OVER “SOURCE CODE”
CONFIDENTIALITY
DESIGNATION
TOSHIBA CORPORATION, TOSHIBA
AMERICA ELECTRONIC COMPONENTS,
INC., and TOSHIBA AMERICA, INC.,
Defendants.
/
17
18
This is a dispute between defendants Toshiba Corporation, Toshiba America Electronic
19
Components, Inc., and Toshiba America, Inc. (collectively, “Toshiba”) and plaintiff Lone Star
20
Silicon Innovations LLC about the proper scope of certain confidentiality designations under
21
our district’s Patent Local Rule 2-2 Interim Model Protective Order (“Protective Order”). The
22
Protective Order provides for three confidentiality designations:
23
24
25
26
27
28
2.2
“CONFIDENTIAL” Information or Items: information
(regardless of how it is generated, stored or maintained) or tangible
things that qualify for protection under Federal Rule of Civil
Procedure 26(c).
*
*
*
2.8
“HIGHLY CONFIDENTIAL — ATTORNEYS’ EYES
ONLY” Information or Items: extremely sensitive “Confidential
Information or Items,” disclosure of which to another Party or
Non-Party would create a substantial risk of serious harm that
could not be avoided by less restrictive means.
1
2
3
4
5
6
2.9
“HIGHLY CONFIDENTIAL — SOURCE CODE”
Information or Items: extremely sensitive “Confidential
Information or Items” representing computer code and associated
comments and revision histories, formulas, engineering
specifications, or schematics that define or otherwise describe in
detail the algorithms or structure of software or hardware designs,
disclosure of which to another Party or Non-Party would create a
substantial risk of serious harm that could not be avoided by less
restrictive means.
Toshiba seeks to designate twelve of its process flows and process recipes for making a
7
semiconductor die as “HIGHLY CONFIDENTIAL — SOURCE CODE” pursuant to Section
8
2.9 of the Protective Order. These documents — which Toshiba had previously produced to
9
Lone Star while this case was pending in the Eastern District of Texas but clawed back after the
case transferred here — “describe the step-by-step process for making a device from a blank
11
For the Northern District of California
United States District Court
10
silicon wafer, and . . . set forth particular settings, conditions and/or parameters for a particular
12
step within the process flow.” Toshiba claims these documents are its “crown jewels that can
13
be used in a similar fashion as computer codes in a software case to replicate . . . Toshiba’s
14
semiconductor manufacturing processes.” Although the documents are not “computer code” or
15
“associated with computer code,” Toshiba contends they qualify as “formulas, engineering
16
specifications, or schematics that define or otherwise describe in detail the algorithms or
17
structure of . . . hardware designs” within the meaning of Section 2.9 (Dkt. No. 201-1 at 2–3).
18
Lone Star agrees that the documents at issue qualify as “HIGHLY CONFIDENTIAL —
19
ATTORNEYS’ EYES ONLY” under Section 2.8 but disputes that they qualify as “HIGHLY
20
CONFIDENTIAL — SOURCE CODE” under Section 2.9. According to Lone Star, Section
21
2.9 should be read to cover only “computer code” and materials “associated with computer
22
code” (see, e.g., Dkt. No. 203 at 4, 6). This order disagrees. The plain text of Section 2.9 lists
23
“computer code and associated comments and revision histories” as a category separate and
24
apart from “formulas,” “engineering specifications,” and “schematics.” All four categories fall
25
within the scope of “extremely sensitive ‘Confidential Information or Items’” covered by
26
Section 2.9 so long as they “define or otherwise describe in detail the algorithms or structure of
27
software or hardware designs, disclosure of which to another Party or Non-Party would create a
28
substantial risk of serious harm that could not be avoided by less restrictive means.” Contrary
2
1
to Lone Star, Section 2.9’s reference to “comments and revision histories” “associated” with
2
computer code does not mean that “formulas, engineering specifications, or schematics” fall
3
under Section 2.9 only if they are also “associated” with computer code.
4
Lone Star claims the security afforded to materials with the “source code” designation
5
makes sense only in light of the “unique nature of computer code and its documentation,” in
6
that anyone “with an off-the-shelf compiler and the software source code . . . could easily
7
replicate and distribute unlimited copies of the software product” (Dkt. No. 203 at 2). In a
8
similar vein, Lone Star cites three other protective orders from other cases that have defined
9
“source code” more narrowly, and protests that expanding the designation beyond computer
code and “associated” materials will make discovery in patent cases unduly burdensome (id. at
11
For the Northern District of California
United States District Court
10
2–4). None of these arguments are persuasive.
12
First, easy unauthorized copying and distribution is a concern particularly prominent in,
13
but not exclusive to, computer code. It remains conceivable that materials not “associated” with
14
computer code nevertheless describe the details of an easily replicable product in such a manner
15
as to warrant the highest level of confidentiality. Section 2.9 clearly contemplates this
16
possibility, as it defines such materials — regardless of category — by their ability to “define or
17
otherwise describe in detail the algorithms or structure of software or hardware designs,
18
disclosure of which to another Party or Non-Party would create a substantial risk of serious
19
harm that could not be avoided by less restrictive means.” This, combined with the explicit
20
inclusion of “formulas, engineering specifications, [and] schematics” that meet the foregoing
21
criteria, indicates that Section 2.9 encompasses confidentiality concerns both within and
22
without the specific category of computer code and “associated” materials.
23
Second, the three other protective orders cited by Lone Star do not compel a contrary
24
conclusion. For starters, those protective orders from other cases are not the Protective Order at
25
issue here. Moreover, read in context, the passages cited by Lone Star are readily
26
distinguishable. Two specifically defined “source code” and its attendant protections while the
27
third specifically defined “Highly Confidential Code” (Dkt. Nos. 203-2–203-4 (emphasis
28
added)). In contrast, Section 2.9 does not purport to define “code” but instead defines the
3
1
universe of all “extremely sensitive ‘Confidential Information or Items’” that deserve a
2
“HIGHLY CONFIDENTIAL — SOURCE CODE” designation. The inclusion of the phrase
3
“source code” in the designation itself does not override the simple fact that the plain text of
4
Section 2.9 contemplates non-source code material that nevertheless deserves protection on par
5
with actual source code.
6
Third, and in a similar vein, Lone Star’s warning that Section 2.9 will render discovery
7
unduly burdensome in patent cases unless limited to computer code and “associated” materials
8
is unfounded. As stated, Section 2.9 does not cover all “formulas, engineering specifications, or
9
schematics” but only those that require protection on par with true source code because they
“define or otherwise describe in detail the algorithms or structure of software or hardware
11
For the Northern District of California
United States District Court
10
designs, disclosure of which to another Party or Non-Party would create a substantial risk of
12
serious harm that could not be avoided by less restrictive means.” This important limitation is
13
sufficiently stringent to both distinguish Section 2.9 from Section 2.8 (which does not require
14
that designated materials “define or otherwise describe in detail the algorithms or structure of
15
software or hardware designs”) and avert the practical discovery problems Lone Star envisions.
16
Indeed, neither side offered any evidence that the plain language of Section 2.9 has ever
17
hampered discovery in another patent case in our district.
18
It is therefore unsurprising that the parties have not unearthed any other decision
19
analyzing the issue of whether or not Section 2.9 extends beyond computer code and
20
“associated” materials. During oral argument, counsel for Toshiba pointed to Telebuyer, LLC v.
21
Amazon.com, Inc., No. 13–cv–1677, 2014 WL 5804334 (W.D. Wash. July 7, 2014) (Judge
22
Barbara Rothstein), as the closest decision on point. In Telebuyer, Amazon sought a protective
23
order on materials designated as “source code” and proposed defining that term as “computer
24
code and associated comments and revision histories, formulas, engineering specifications, or
25
schematics that define or otherwise describe in detail the algorithms or structure of software or
26
hardware designs.” Id. at *3. Telebuyer protested that the definition was overbroad because it
27
encompassed “routinely disclosed documents that have nothing to do with source code.” The
28
district court concluded:
4
1
2
3
4
5
6
[A]t this point in the litigation, Amazon is best qualified to
determine whether these elements actually do relate to source
code. Telebuyer has given the Court no specific reason not to err
on the side of caution when dealing with highly technical
materials.
Furthermore, Amazon’s proposed definition is a verbatim
transcription of the model Stipulated Protective Order for source
code in the United States District Court for the Northern District of
California. That court has substantial expertise in this area of law,
and its model order reflects the cumulative wisdom of the court
and the bar in that jurisdiction.
7
Ibid. (citation omitted).
8
It would be circuitous for this order to rely on Telebuyer as authoritative in interpreting
9
the Protective Order, given that Telebuyer actually relied on the wording of the Protective Order
10
extent Telebuyer is instructive, however, it cuts against Lone Star and in favor of adhering to
For the Northern District of California
United States District Court
(as representing the cumulative experience of our district) in reaching its outcome. To the
11
12
the plain language of the Protective Order. True, Telebuyer arguably suggested that Section 2.9
13
required the materials at issue to be “relate[d] to source code” and apparently conflated the
14
definition of “source code” itself with our definition of materials deserving of protection on par
15
with source code. Significantly, however, Telebuyer nevertheless declined to limit the
16
protection afforded under Section 2.9 to literal computer code, opting instead to “err on the side
17
of caution when dealing with highly technical materials.” In doing so, Telebuyer implicitly
18
recognized the practical fact that, when it comes to confidentiality designations, what matters is
19
not whether particular materials can accurately be described as literal “source code” but
20
whether they deserve protection on par with source code.
21
Although this order rejects Lone Star’s narrow reading of Section 2.9, it nevertheless
22
concludes Toshiba has not shown that the “HIGHLY CONFIDENTIAL — SOURCE CODE”
23
designation is warranted here. The plain language of Section 2.9 does not encompass all
24
“formulas, engineering specifications, or schematics.” Whether or not specific materials
25
actually “define or otherwise describe in detail the algorithms or structure of software or
26
hardware designs, disclosure of which to another Party or Non-Party would create a substantial
27
risk of serious harm that could not be avoided by less restrictive means,” is a question that must
28
be answered on the facts of each particular case. Here, the undersigned judge personally
5
1
reviewed a sample of the documents Toshiba seeks to designate as “HIGHLY
2
CONFIDENTIAL — SOURCE CODE” and finds that they do not require protection on par
3
with true source code, especially since they were previously produced and apparently remained
4
in Lone Star’s possession for seven months without raising any reason for concern that such
5
possession created “a substantial risk of serious harm” to Toshiba.
6
This order therefore DENIES Toshiba’s request for a ruling that it properly designated
7
twelve process flows and process recipes as “HIGHLY CONFIDENTIAL — SOURCE CODE”
8
under our Protective Order. At least on this record, the lesser designation of “HIGHLY
9
CONFIDENTIAL — ATTORNEYS’ EYES ONLY” is sufficient. This ruling is without
prejudice to the possibility that Toshiba may show, on an improved record, that more stringent
11
For the Northern District of California
United States District Court
10
protections are required for specific documents at issue.
12
13
IT IS SO ORDERED.
14
15
Dated: December 20, 2017.
WILLIAM ALSUP
UNITED STATES DISTRICT JUDGE
16
17
18
19
20
21
22
23
24
25
26
27
28
6
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?