eBay Inc. et al v. PartsRiver, Inc.
Filing
83
ORDER re (330 in 4:11-cv-01548-CW) Stipulation/Joint Discovery Letter, filed by 1-800-Flowers.com, Inc., Rockler Companies, Inc., Kelora Systems, LLC, Circuitcity.Com Inc., OfficeMax Inc., Target Corporation, Amazon.com, Inc., Dell, Inc., Newegg Inc., Hewlett-Packard Development Company, L.P., Costco Wholesale Corporation, Office Depot, Inc.. Signed by Judge Beeler on 8/29/2011. (lblc1, COURT STAFF) (Filed on 8/29/2011)
1
2
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
Northern District of California
10
Oakland Division
KELORA SYSTEMS, LLC,
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
Plaintiff,
v.
No. C 11-01548 CW (LB)
ORDER RE DISCOVERY LETTER
RE PROTECTIVE ORDER
13
TARGET CORPORATION, et al.,
[ECF No. 330]
14
15
Defendants.
_____________________________________/
16
EBAY INC. AND MICROSOFT CORP.,
17
Plaintiffs,
No. C 10-04947 CW (LB)
(Related)
v.
18
KELORA SYSTEMS, LLC,
19
20
Defendant.
_____________________________________/
21
CABELA’S, INC.,
22
No. C 11-01398 CW (LB)
Plaintiff,
v.
23
KELORA SYSTEMS, LLC,
24
25
Defendant.
_____________________________________/
26
27
28
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
(Related)
1
NEBRASKA FURNITURE MART, INC.,
2
No. C 11-02284 CW (LB)
Plaintiff,
v.
(Related)
3
KELORA SYSTEMS, LLC,
4
5
Defendant.
_____________________________________/
6
I. INTRODUCTION
7
The district court has referred all discovery matters in the above-captioned patent case and the
8
related cases to the undersigned. Referral Order, ECF No. 333 at 2.1 On August 11, 2011, Kelora
9
Systems, LLC and the other parties2 (collectively “the Accused Infringers”) submitted a joint
order regarding the source code inspection environment and the restrictions on patent prosecution.
12
For the Northern District of California
discovery statement that detailed disputes over certain provisions in the parties’ proposed protective
11
UNITED STATES DISTRICT COURT
10
ECF No. 330 at 2.
13
Generally, Kelora proposes changes to the district’s model protective order for patent cases, and
14
the Accused Infringers propose using the model order. Exhibit A (ECF No. 330-1) shows the
15
parties’ proposed modifications, and Exhibit D (ECF No. 330-3) is the district’s model order. As
16
summarized below, the court generally finds that the provisions of the model order should apply and
17
rules accordingly.
18
With regard to the source code inspection environment, the court orders as follows: (1) the
19
Accused Infringers do not have to provide a complete, functional build environment for the source
20
code; (2) the Accused Infringers do not have to provide access to the source code after normal work
21
hours and on holidays and weekends upon Kelora’s notice and demand; (3) authorized individuals
22
inspecting the source code may bring their personal cell phones and laptop computers into the source
23
24
1
25
26
27
28
Citations are to the clerk’s electronic case file (ECF) with pin cites to the electronic page
numbers at the top (as opposed to the bottom) of the page.
2
The other parties in the related cases are eBay, Inc., Microsoft Corporation, Nebraska
Furniture Mart, Inc., Cabela’s Inc., Target Corporation, OfficeMax Incorporated, ShopKo Stores
Operating Co., LLC, National Business Furniture, LLC, Rockler Companies, Inc.,
1-800-Flowers.com, Inc., PC Connection, Inc., Mason Companies, Inc. d/b/a Maryland Square,
Amazon.com, Inc., Dell, Inc., Office Depot, Inc., Newegg Inc., Costco Wholesale Corporation,
Hewlett-Packard Development Company, L.P., CircuitCity.com Inc.
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
2
1
code inspection room; (4) the source code does not have to be made available for inspection within
2
twenty miles of the trial location; (5) the Accused Infringers do not have to provide two Source
3
Code Computers on which Kelora may observe the running software in an environment that
4
approximates real-world conditions; (6) Kelora’s authorized outside counsel and/or experts may not
5
require the installation on the Source Code Computers of commercially available, licensed software
6
tools for viewing, searching, and annotating the source code; (7) a back-up copy of the source code
7
does not have to be kept on the secured Source Code Computers; (8) the producing party must
8
challenge the amount of source code requested in hard copy; (9) the Accused Infringers may visually
9
monitor Kelora’s inspection of source code but only to ensure that there is no unauthorized
recording, copying, or transmission of the source code; and (10) the Accused Infringers’s log of
11
printed source code may include the dates and times of any access.
12
For the Northern District of California
UNITED STATES DISTRICT COURT
10
With regard to the prosecution bar issues, the court orders: (1) the prosecution bar shall not
13
include Kelora’s proposed limitation “on behalf of the Receiving Party;” (2) the prosecution bar
14
shall not include Kelora’s requested clarification that prosecution not include distinguishing prior art
15
or advising or consulting regarding the same; and (13) the subject matter of the prosecution bar
16
should be limited to patents or applications relating to “search engines, web search, or database or
17
server search technology.”
18
II. FACTUAL BACKGROUND
19
Kelora is the owner by assignment of all right, title and interest in U.S. Patent No. 6,275,821
20
(“‘821 patent”), which is entitled “Method and system for executing a guided parametric search” and
21
was issued by the U.S. Patent & Trademark Office (“PTO”) on August 14, 2001. Second Amended
22
Complaint, ECF No. 334 at 3. The PTO issued a reexamination certificate for the ‘821 patent on
23
November 2, 2010. Id.
24
There are four related cases involving the ‘821 patent in this district: ebay Inc. and Microsoft
25
Corp. v. Kelora Systems, LLC, CV 10-4947 CW (filed by eBay and Microsoft, which are seeking a
26
declaratory judgment of invalidity, noninfringement, and/or that intervening rights apply with
27
respect to the amended claims); Cabela’s, Inc. v. Kelora Systems, LLC, CV 11-1398 CW (seeking
28
the same); Nebraska Furniture Mart, Inc. v. Kelora Systems, LCC, CV 11-2284 CW (seeking the
same); and Kelora Systems, LLC v. Target Corp., et al., CV 11-1548 CW (infringement action
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
3
1
2
3
brought by the patent holder).
The parties in these actions have submitted a joint discovery statement asking the court to rule on
certain disputes pertaining to the parties’ proposed stipulated protective order. ECF No. 330 at 2.
4
5
6
III. LEGAL STANDARDS
A. General Standard for Issuance of Protective Order
Upon a showing of “good cause,” a court may “protect a party or person from annoyance,
or other confidential . . . commercial information not be revealed, or be revealed only in a specified
9
way.” Fed.R.Civ.P. 26(c); see In re Violation of Rule 28(D), 635 F.3d 1352, 1357 (Fed. Cir. 2011).
10
The party seeking a protective order has the burden of showing that the protection is warranted. Id.
11
Generally, good cause requires the moving party to show that specific prejudice or harm will result
12
For the Northern District of California
embarrassment, oppression, or undue burden or expense” in discovery by “requiring that trade secret
8
UNITED STATES DISTRICT COURT
7
if the protective order is not issued. Rivera v. NIBCO, Inc., 384 F.3d 822, 826 (9th Cir. 2004). And,
13
in this context, the courts administer a balancing test of the conflicting interests between the
14
protection of Rule 26(c) of the Federal Rules of Civil Procedure and the broad mandate of the
15
admissibility of information in discovery conferred by Rule 26(b)(1). See, e.g., Brown Bag
16
Software v. Symantec Corp., 960 F.2d 1465, 1472 (9th Cir. 1992).
17
Here, the parties agree that a protective order is warranted. See ECF No. 330 at 2. They merely
18
disagree as to certain aspects of its implementation, focusing on a few proposed modifications to the
19
district’s model protective order.
20
The model protective order has been approved by the court and governs discovery unless the
21
court enters a different protective. See United States District Court for the Northern District of
22
California’s Stipulated Protective Orders webpage, at http://cand.uscourts.gov/stipprotectorder
23
(“The protective orders on this page are court-approved model forms to which counsel may stipulate
24
in a particular case.”); N.D. Cal. Patent L.R. 2-2 (“The Protective Order authorized by the Northern
25
District of California shall govern discovery unless the Court enters a different protective order.”);
26
see generally Acer America Corp. v. Technology Properties, Nos. C08-00877 JF (HRL),
27
08-00882-JF, 08-00884-JF, 2009 WL 1363551, at *1 (N.D. Cal. May 14, 2009). Accordingly, the
28
court treats the model protective order as setting forth presumptively reasonable conditions
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
4
1
regarding the treatment of highly confidential information.
2
B. Standard for Inclusion of Patent Prosecution Bar
3
The determination of whether a protective order should include a patent prosecution bar is a
4
matter governed by Federal Circuit law. In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373,
5
1378 (Fed. Cir. 2010). A party seeking to include a prosecution bar in a protective order carries the
6
burden of showing good cause for its inclusion. Id. Again, in this case, the parties agree that
7
prosecution bar is necessary but disagree as to the terms implementing one.
8
9
10
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
IV. DISCUSSION
A. Issues Regarding the Source Code Inspection Environment
1. Whether the Accused Infringers must provide “a complete, functional build
environment for the source code of its accused instrumentalities”
The parties dispute whether the protective order must include a provision requiring the Accused
13
Infringers to provide “a complete, functional build environment for the source code of its accused
14
instrumentalities, including build instructions, scripts and/or other information used in the ordinary
15
course of business to develop, build, test and debug the source code.” See ECF No. 330-1 at 10.
16
Kelora argues that the Accused Infringers must provide a complete, functional build environment
17
because compiling the source code into object code and running the resulting software on a
18
computer may assist Kelora’s counsel and experts in evaluating the Accused Instrumentalities and is
19
therefore within the broad scope of discovery provided under Rule 26(b)(1). ECF No. 330 at 4.
20
Kelora also argues that the Accused Infringers have not identified any clearly defined and serious
21
injury that would stem from this provision. Id.
22
The Accused Infringers argue that Kelora seeks to covert the model protective order into an
23
order to create systems and produce information. ECF No. 330 at 8. And, as to the demanded
24
source code itself, the Accused Infringers claim that Kelora’s proposal would effectively require
25
each Accused Infringer to provide source code for the entire accused website even though the vast
26
majority of the source code for each accused website is completely unrelated to the accused
27
functionality. Id.
28
The court finds that a departure from the district’s model protective order is unwarranted because
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
5
1
the benefits of making it easier for Kelora to evaluate the Accused Infringers’ source code do not
2
outweigh the burdens associated with the proposal. See generally Brookhaven Typesetting Services,
3
Inc. v. Adobe Systems, Inc., No. C-01-20813 RMW, 2007 WL 2429653, at *7-*8 (N.D. Cal. Aug.
4
24, 2007) (discussing textual analysis and other alternatives to compiling source code in order to
5
evaluate whether the code is infringing). Liberal discovery is intended to ensure that the requesting
6
party has the information necessary to make its case but this does not imply that the requesting party
7
may force the producing party to undertake burdensome measures merely for the convenience of the
8
requesting party. See generally Intel Corp. v. VIA Technologies, Inc., 198 F.R.D. 525, 528 (N.D.
9
Cal. 2000) (“The protective order must actually prejudice presentation of the moving party’s case,
10
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
13
14
15
not merely increase the difficulty of managing the litigation.”).
2. Whether access to the source code must be provided after normal work hours and on
holidays and weekends
The parties dispute whether the Accused Infringers must provide access to the source code after
normal work hours and on holidays and weekends. See ECF No. 330-1 at 11.
Kelora argues that its investigation of the Accused Instrumentalities may be prejudiced by an
16
inflexible limitation to business hours, while the minor inconvenience of arranging for after-hours
17
access can in no way be considered the sort of clearly defined and serious injury that, according to
18
Kelora, the Accused Infringers must show. ECF No. 330 at 4-5.
19
The Accused Infringers argue that Kelora’s proposal is unreasonable and burdensome as it
20
would permit Kelora to force an Accused Infringer’s counsel to keep its office open on holidays and
21
weekends whenever Kelora feels like inspecting source code. Id. at 9. The Accused Infringers
22
further assert that there is no reason why Kelora cannot complete its source code inspection during
23
normal business hours. Id.
24
At this point, the dispute is about whether Kelora may unilaterally determine its after-hours
25
access to the source code. Faced with a merely hypothetical problem, the court finds that the
26
burdens outweigh the benefits of ordering Kelora’s proposal. However, if Kelora determines that
27
normal business hours do not provide adequate time to review the source code and the parties are
28
unable to work out a schedule providing Kelora with sufficient access, the court orders the parties to
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
6
1
submit another joint letter at that time.
2
3
3. Whether the authorized individuals inspecting the source code may bring their personal
cell phones and laptop computers into the source code inspection room
4
The parties dispute whether authorized individuals inspecting the source code may bring their
5
personal cell phones and laptop computers into the source code inspection room. See ECF No. 330-
6
1 at 11. Kelora argues that its proposal would allow the individuals to take notes and stay in touch
7
with the outside world and that the items are basic work tools. ECF No. 330 at 5. The Accused
8
Infringers do not provide any counter-arguments in the joint letter. The court finds Kelora’s
9
proposal to be reasonable. However, the court notes that this mitigates in favor of letting the
10
Accused Infringers visually monitor Kelora’s review of the source code.
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
4. Whether the source code must be made available for inspection within twenty miles of
the trial location
13
14
The parties dispute whether the source code must be made available for inspection within twenty
miles of the trial location. See ECF No. 330-1 at 11-12.
15
Kelora argues that its investigation of the Accused Instrumentalities and presentation at trial
16
might be prejudiced without these provisions, while the Accused Infringers have identified no
17
clearly defined and serious injury justifying their more restrictive proposals. ECF No. 330 at 5.
18
The Accused Infringers argue that Kelora’s proposal is unnecessary because fact discovery will
19
be over long before trial begins and thus no inspections will take place anywhere during the trial. Id.
20
at 9. The Accused Infringers further argue that the proposal is burdensome on those parties whose
21
counsels’ offices are more than 20 miles from the Oakland courthouse — which would include most
22
parties. Id. Finally, the Accused Infringers claim that the proposal is unnecessary, since the
23
proposed protective order allows a party to request paper copies of limited portions of source code
24
that are reasonably necessary for trial. Id.
25
The court finds that Kelora’s proposal is unnecessary and burdensome for the reasons asserted
26
by the Accused Infringers.
27
///
28
///
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
7
1
5. Whether the Accused Infringers must provide two Source Code Computers on which
2
Kelora may observe the running software in an environment that approximates real-world
3
conditions
4
The parties dispute whether the Accused Infringers must provide two Source Code Computers on
conditions. See ECF No. 330-1 at 12. Kelora argues that it will be prejudiced if it cannot observe
7
the running software in an environment that approximates real-world conditions. ECF No. 330 at 5-
8
6. The Accused Infringers assert the arguments described above in section 1. ECF No. 330 at 8.
9
Here too, the court finds that a departure from the district’s model protective order is unwarranted
10
because the benefits of making it easier for Kelora to evaluate the Accused Infringers’ source code
11
does not outweigh the burdens associated with the proposal. See generally Brookhaven Typesetting
12
For the Northern District of California
which Kelora may observe the running software in an environment that approximates real-world
6
UNITED STATES DISTRICT COURT
5
Services, Inc., 2007 WL 2429653, at *7-*8.
13
6. Whether Kelora’s authorized outside counsel and/or experts may request installation on
14
the Source Code Computers of commercially available, licensed software tools for viewing,
15
searching, and annotating the source code
16
The parties dispute whether Kelora’s authorized outside counsel and/or experts may request
17
installation on the Source Code Computers of commercially available, licensed software tools for
18
viewing, searching, and annotating the source code. See ECF No. 330-1 at 12. Kelora argues that
19
its investigation of the Accused Instrumentalities might be prejudiced without these provisions,
20
while the Accused Infringers have identified no clearly defined and serious injury justifying their
21
more restrictive proposals. ECF No. 330 at 6. It explains that this proposal will permit it to
22
annotate, number the lines of, and bates label paper copies of source code for permitted litigation
23
purposes. Id. The Accused Infringers argue that this proposal is unreasonable because the
24
computers containing source code are generally highly-secure machines that do not permit any files
25
to be transferred onto or away from the machine. Id. at 9. The court finds that the burdens outweigh
26
the benefits of Kelora’s proposal and that the model protective order language is appropriate.
27
///
28
///
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
8
1
2
7. Whether a back-up copy of the source code may be made on the secured Source Code
Computers, to remain there subject to all the provisions governing source code
3
The parties dispute whether a back-up copy of the source code may be made on the secured
4
Source Code Computers, to remain there subject to all the provisions governing source code. ECF
5
No. 330-1 at 13. Kelora argues this will preserve the source code in the exact form in which it is
6
produced and that its investigation might be prejudiced without it. ECF No. 330 at 6. The Accused
7
Infringers do not explicitly address this issue. The court finds that this issue is moot based on its
8
determination with regard to the sixth issue.
9
10
8. Whether the producing party must challenge the amount of source code requested in
hard copy
The parties dispute whether the producing party must challenge the amount of source code
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
requested in hard copy. ECF No. 330-1 at 13-14. The Accused Infringers argue that Kelora’s
13
proposal should be rejected because source code is extremely confidential and the burden should be
14
on the party trying to convert source code to paper, which is much less secure. ECF No. 330 at 10.
15
The Accused Infringers claim that the model protective order places the burden on the requesting
16
party. Id. Kelora does not provide any counter-arguments in the joint letter.
17
The court notes that the model protective order’s procedures require the producing party to
18
challenge the amount of source code that is requested in hard copy. See Exhibit D-1, ECF No. 330
19
at 15. But the court finds that Kelora’s proposed language is unnecessary.
20
21
22
9. Whether the Accused Infringers may visually monitor Kelora’s inspection of source
code
The parties dispute whether the Accused Infringers may visually monitor Kelora’s inspection of
23
source code. See ECF No. 330-1 at 15. Kelora argues that this would invade its work product.
24
ECF No. 330 at 6. The Accused Infringers respond that, given the extremely confidential nature of
25
source code, it is reasonable for representatives of the Accused Infringers to visually monitor Kelora
26
as it inspects the source code but only to ensure that there is no unauthorized recording, copying, or
27
transmission of the source code. Id. at 10. Kelora’s proposal is inconsistent with the model
28
protective order, which has been approved by the court. Absent a more specific argument as to why
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
9
1
the Accused Infringers’ visual monitoring invades Kelora’s work product, the court finds that the
2
burdens of Kelora’s proposal outweigh its benefits.
3
4
5
10. Whether the Accused Infringers’s log of printed source code may include the dates and
times of any access
The parties also dispute whether the Accused Infringers’s log of printed source code may include
6
the dates and times of any access. The same arguments and rationale as discussed above with
7
respect to the ninth issue apply here. Accordingly, the court rejects Kelora’s proposal.
8
B. Issues Regarding the Prosecution Bar
9
10
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
13
1. Whether individuals who receive highly confidential technical information may draft
patents and claims for entities other than Kelora
The parties dispute whether individuals who receive highly confidential technical information
may draft patents and claims for entities other than Kelora. See ECF No. 330-1 at 27-28.
Kelora argues that the Accused Infringers have offered no evidence that any counsel in this case
14
is involved in “competitive decision-making” on behalf of any other clients. ECF No. 330 at 11.
15
The Accused Infringers counter that the prosecution bar proposed by Kelora’s counsel would
16
merely prohibit them from prosecuting on behalf of the recently formed holding company asserting
17
the patent in this case. Id. at 16. The Accused Infringers further argue that limiting a bar to
18
activities done on behalf of a client who is the receiving party also ignores complexities that may
19
arise if a “receiving party” is later acquired or otherwise reorganized. Id. Additionally, the Accused
20
Infringers claim that if a bar is applied only to prosecution work done on behalf of one party, a
21
potentially huge risk remains that the counsel-in-question may use confidential information to
22
benefit other clients, who may well be competitors of the disclosing party. Id. (citing re Deutsche
23
Bank Trust Co., 605 F.3d 1373, 1380-81 (Fed. Cir. 2010)). Finally, the Accused Infringers assert
24
hat the Federal Circuit’s emphasis on performing factual inquiries on a counsel-by-counsel basis
25
(not a client-by-client basis) dictates that prosecution bar restrictions should follow each affected
26
counsel, not one particular client of a counsel. Id.
27
The Federal Circuit has held that “a party seeking imposition of a patent prosecution bar must
28
show that the information designated to trigger the bar, the scope of activities prohibited by the bar,
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
10
1
the duration of the bar, and the subject matter covered by the bar reasonably reflect the risk
2
presented by the disclosure of proprietary competitive information.” In re Deutsche Bank Trust Co.
3
Americas, 605 F.3d at 1381. In this case, the information designated to trigger the bar is highly
4
confidential, technical information such as source code. See ECF No. 330-1 at 8-9. “In contrast
5
with financial data or business information, confidential technical information, including source
6
code, is clearly relevant to a patent application and thus may pose a heightened risk of inadvertent
7
disclosure.” Applied Signal Technology, Inc. v. Emerging Markets Communications, Applied Signal
8
Technology, Inc. v. Emerging Markets Communications, Inc., No. C-09-02180 SBA (DMR), 2011
9
WL 197811, at *2 (N.D. Cal. Jan. 20, 2011) (citing Deutsche Bank Trust Co. Americas, 605 F.3d at
advising, or otherwise affecting the scope or maintenance of patent claims,” which is appropriately
12
For the Northern District of California
1381). The scope of prohibited activities is limited to “directly or indirectly drafting, amending,
11
UNITED STATES DISTRICT COURT
10
limited. ECF No. 330-1 at 28; see Applied Signal Technology, Inc., 2011 WL 197811, at *2. And it
13
ends two years after the conclusion of the litigation. ECF No. 330-1 at 28; see Applied Signal
14
Technology, Inc., 2011 WL 197811, at *2 (finding that two-year post-litigation bar was reasonable).
15
And, as discussed below, the Accused Infringers’ compromise restricts the subject matter to the
16
prosecution of patents or patent applications relating to search engines, web search, or database or
17
server search technology. Given these representations, the court finds that the Accused Infringers’
18
proposed prosecution bar reasonably reflects the risks presented by the disclosure of the Accused
19
Infringers’ proprietary competitive information. See In re Deutsche Bank Trust Co., 605 F.3d at
20
1380 (holding that attorneys involved in “strategic decisions on the type and scope of patent
21
protection that might be available or worth pursuing” or “strategically amending or surrendering
22
claim scope during prosecution” generally may be subject to a prosecution bar); see also Applied
23
Signal Technology, Inc., 2011 WL 197811, at *2 .
24
Kelora’s argument does not explicitly address why the court should distinguish activities done
25
on behalf of Kelora from those same activities when done on behalf of other clients. It implies that
26
certain counsel have other clients for whom they do patent prosecution work that does not rise to the
27
level of competitive decision-making. But, if there are specific individuals who seek to be exempted
28
from the prosecution bar, Kelora must show (1) that counsel’s representation of the client in matters
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
11
1
before the PTO does not and is not likely to implicate competitive decision-making related to the
2
subject matter of the litigation so as to give rise to a risk of inadvertent use of confidential
3
information learned in litigation, and (2) that the potential injury to the moving party from
4
restrictions imposed on its choice of litigation and prosecution counsel outweighs the potential
5
injury to the opposing party caused by such inadvertent use. In re Deutsche Bank Trust Co.
6
Americas, 605 F.3d at 1381.
7
2. Whether “prosecution” as used in the prosecution bar includes distinguishing prior art
8
or advising and/or consulting regarding the same with persons who may be involved in
9
“prosecution” as defined in the protective order
10
The parties dispute whether “prosecution” as used in the prosecution bar includes distinguishing
prior art or advising and/or consulting regarding the same with persons who may be involved in
12
For the Northern District of California
UNITED STATES DISTRICT COURT
11
“prosecution” as defined in the protective order. See ECF No. 330-1 at 28.
13
Kelora argues that distinguishing prior art poses no threat of disclosure of any confidential
14
information of the Accused Infringers and that precluding coordination on prior art distinctions
15
would be unfairly prejudicial to Kelora’s ability to defend the validity of its patents with
16
consistency. ECF No. 330 at 14.
17
But, in Deutsche Bank, the Federal Circuit indicated that “investigating prior art relating to those
18
inventions” likely constituted competitive decision-making. 605 F.3d at 1380. Following this
19
guidance, the court rejects Kelora’s proposed clarification.
20
3. Whether the subject matter of the prosecution bar should be limited to patents or
21
applications relating to “guided parametric search” or “search engines, web search, or
22
database or server search technology”
23
The parties dispute the appropriate subject matter of the prosecution bar. See ECF No. 330-1 at
24
28. Kelora argues that it should be limited to patents or applications relating to “guided parametric
25
search,” which it asserts is the general subject matter at issue in this case. ECF No. 330 at 11. The
26
Accused Infringers propose that the subject matter of the prosecution bar should be defined as
27
“search engines, web search, or database or server search technology.” Id. at 17. They argue that
28
their proposal is appropriately tailored to protect their confidential information from inadvertent use.
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
12
1
Id. They also assert that Kelora’s proposed scope is both ambiguous and overly narrow. Id. at 17-
2
18.
3
The patent claims a “process for identifying a single item from a family of items” that is run on a
4
single, local computer or over the internet. ECF No. 330-4 at 2-3. In support of their proposed
5
subject-matter scope, the Accused Infringers argue that the asserted claims require client-server
6
communications, providing and reading data files, accepting selection criteria, displaying a feature
7
screen, and determining what satisfies selection criteria. ECF No. 330 at 17. Kelora does not refute
8
this in the joint letter.
9
“[I]n determining the scope of the proposed prosecution bar, the relevant question is not to which
reasonably could be used, i.e. the areas of technology where there is risk that individuals may
12
For the Northern District of California
field the accused products are currently limited, but instead in which fields the patented technology
11
UNITED STATES DISTRICT COURT
10
inadvertently exploit their new knowledge in future patent prosecution.” Applied Signal
13
Technology, Inc., 2011 WL 197811, at *2 . Applying this principle, the court orders that the subject
14
matter of the prosecution bar should be limited to patents or applications relating to “search engines,
15
web search, or database or server search technology.”
16
17
18
V. CONCLUSION
For the foregoing reasons, the court orders the parties to submit a stipulated protective order that
complies with this order within ten days.
19
This disposes of ECF No. 330.
20
IT IS SO ORDERED.
21
Dated: August 29, 2011
_______________________________
LAUREL BEELER
United States Magistrate Judge
22
23
24
25
26
27
28
ORDER RE PROTECTIVE ORDER
C 11-01548 CW (LB)
13
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?