Nazomi Communications Inc v. Nokia Corporation et al

Filing 355

PROTECTIVE ORDER, re-entered pursuant to 345 Stipulation.(rmwlc1, COURT STAFF) (Filed on 6/1/2012)

Download PDF
UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA NAZOMI COMMUNICATIONS, INC. V. NO. 5:10-cv-04686 RMW (HRL) NOKIA CORP., et al. PROTECTIVE ORDER Pursuant to Rule 26(c) of the Federal Rules of Civil Procedure, the Court hereby enters the following Protective Order: This Protective Order is issued to facilitate document disclosure and production under the Local Rules of this Court and the Federal Rules of Civil Procedure. Unless modified pursuant to the terms contained in this Order, this Order shall remain in effect through the conclusion of this litigation. In support of this order, the Court finds that: 1. Documents or information containing confidential proprietary and business information and/or trade secrets (“Confidential Information”) that bear significantly on the parties' claims or defenses are likely to be disclosed or produced during the course of discovery in this litigation; 2. The parties to this litigation may assert that public dissemination and disclosure of Confidential Information could injure or damage the party disclosing or producing the Confidential Information and could place that party at a competitive disadvantage; and 3. To protect the respective interests of the parties and to facilitate the progress of disclosure and discovery in this case, the following Order should issue: IT IS THEREFORE ORDERED THAT: 1. Documents or discovery responses containing Confidential Information disclosed or produced by any party in this litigation are referred to as “Protected Documents.” Except as otherwise indicated below, all documents or discovery responses designated by the producing party as “CONFIDENTIAL” or “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY” and which are disclosed or produced to the attorney for the other parties to this litigation are Protected Documents and are entitled to confidential treatment as described below. Documents may also be designated “HIGHLY CONFIDENTIAL — SOURCE CODE,” subject to the provisions stated herein. 2. Protected Documents shall not include (a) advertising materials, (b) materials that on their face show that they have been published to the general public, or (c) documents that have been submitted to any governmental entity without request for confidential treatment. By way of non-limiting example, Protected Documents in one or more of the following categories may qualify for the “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY” designation: (i) non-public technical information, including schematic diagrams, manufacturing and engineering drawings, engineering notebooks, specifications, research notes and materials, technical reference materials, and other nonpublic technical descriptions and/or depictions of the relevant technology; (ii) non-public damage-related information (e.g., the number of products sold, total dollar value of sales products, and profit margins); (iii) non public financial information; (iv) customer lists; (v) business and/or marketing plans; (vi) price lists and/or pricing information; and (vii) information obtained from a non-party pursuant to a current non-disclosure NonDisclosure Agreement (“NDA”). 2 3. At any time after the delivery of Protected Documents, counsel for the party or parties receiving the Protected Documents may challenge the confidential designation of all or any portion thereof by providing written notice thereof to counsel for the party disclosing or producing the Protected Documents. If the parties are unable to agree as to whether the confidential designation of discovery material is appropriate, the party or parties receiving the Protected Documents shall certify to the Court that the parties cannot reach an agreement as to the confidential nature of all or a portion of the Protected Documents. If, after conferring, the parties cannot reach agreement concerning the matter within ten (10) business days after the delivery and receipt of the notice, then the party requesting the de-designation of particular items may file and serve a motion for a further order of this Court directing that the designation shall be so removed. On any such motion, the burden of proof shall lie with the producing party to establish that the information is, in fact, properly designated as CONFIDENTIAL or HIGHLY CONFIDENTIAL — ATTORNEYS' EYES Only information and the receiving party shall establish that the information is an appropriate target of discovery. No party shall be obligated to challenge the propriety of any designation, and failure to do so shall not preclude a subsequent challenge to the propriety of such designation. 4. All Protected Documents are entitled to confidential treatment pursuant to the terms of this Order until and unless the parties formally agree in writing to the contrary or a contrary determination is made by the Court as to whether all or a portion of a Protected Document is entitled to confidential treatment. Protected Documents and any information contained therein shall not be used or shown, disseminated, copied, or in any way communicated to anyone for any purpose whatsoever, except as provided for below. 3 5. Subject to the limitations set forth in this Order, Protected Documents and any information contained therein shall be disclosed only to the following persons (“Qualified Persons”): A. Counsel of record in this action and other disclosed outside counsel for the party or parties receiving Protected Documents or any information contained therein; B. Employees of such counsel (excluding experts and investigators) and outside vendors used to process documents assigned to and necessary to assist such counsel in the preparation and trial of this action, provided such outside vendors agree to maintain the confidentiality of documents pursuant to this Protective Order; C. The Court; D. Experts or consultants that are disclosed and qualified pursuant to the terms of paragraph 19 below; and E. Two (2) in-house counsel for each party, and any employees actually assisting outside counsel or such in-house counsel in preparation of this case, provided that such persons sign the Agreement attached hereto as Exhibit A. Except that, Protected Documents designated “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY” shall not be disclosed to any person allowed access under paragraph 5.E. Counsel for a party may give advice and opinions to his or her client regarding this litigation based on his or her evaluation of designated “CONFIDENTIAL” or “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY” information received by the party — provided that such rendering of advice and opinions shall not reveal the content of such Protected Documents and any information contained therein except by prior written agreement with counsel for the producing 4 party. Counsel receiving “CONFIDENTIAL” or “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY” Protected Documents may not use such information to provide advice or opinions to facilitate prosecution of any patents, to otherwise attempt to secure patent claims (e.g., reissue, reexamination, and certificates of correction), or for any purpose not related to this case. Protected Documents and any information contained therein shall be used solely for the prosecution of this litigation. 6. Protected Documents designated “HIGHLY CONFIDENTIAL — SOURCE CODE” shall be provided with the following further protections: A. HIGHLY CONFIDENTIAL — SOURCE CODE includes human-readable programming language text that defines software, firmware, or electronic hardware descriptions (hereinafter referred to as “source code”). Text files containing source code shall hereinafter be referred to as “source code files.” Source code files include, but are not limited to files containing source in “C”, “C++”, assembler, VHDL, Verilog, and digital signal processor (DSP) programming languages. Source code files further include “.include files,” “make” files, link files, and other human-readable text files used in the generation and/or building of software directly executed on a microprocessor, microcontroller, or DSP. B. Treatment of Source Code. To the extent that either party wishes to obtain access to source code, the following procedures shall apply: i. The producing party shall make all relevant and properly requested source code available for inspection on a stand-alone, non-networked personal computer running a reasonably current version of the Microsoft Windows 5 operating system (“Source Code Computer”). Should it be necessary, other mutually agreed upon operating systems, such as Linux, may also be made available by the producing party. ii. The producing party shall make the source code available electronically and in text searchable form in outside counsel for the producing party’s offices in either Washington DC or the Central District of California. iii. In order to verify that its source code has not later been altered, the producing party may benchmark the materials before they are provided, but shall not install any keystroke or other monitoring software on the Source Code Computer. iv. The receiving party may use appropriate tool software on the Source Code Computer, which shall be installed by the producing party, including text editors and multi-file text search tools such as “grep.” Specific tools may include (but not be limited to): Visual Slick Edit, Source-Navigator, PowerGrep, and ExamDiff Pro, or similar programs. Should it be necessary, other mutually agreed upon tools may be used. Licensed copies of agreed upon tool software shall be downloaded and installed on the Source Code Computer by the producing party, and paid for by the receiving party. v. The Source Code Computer shall be made available from 9 am to 7 pm local time, Monday through Friday (excluding holidays), and other days and/or times, including weekends, upon reasonable request until the close 6 of discovery in this action. Access on weekends or after hours shall be permitted only on three days advanced written notice. vi. The source code is to be treated as HIGHLY CONFIDENTIAL — SOURCE CODE. In addition, the source code is to be treated as CONFIDENTIAL — ATTORNEYS' EYES ONLY, and the receiving party may not disclose the source code to anyone who has not undertaken to abide by the Protective Order. No employee of the receiving party may access or obtain the source code. In no case shall any information designated as HIGHLY CONFIDENTIAL — SOURCE CODE by a Defendant be provided to any other Defendant or Defendant's counsel by any party or counsel absent explicit agreement from the Defendant designating the information. vii. No more than five (5) individuals who qualify under the paragraph 5A or 5D, above, for the receiving party, may have access to the Source Code Computer. In addition, no more than ten (10) additional attorneys and/or experts who qualify under paragraph 5A or 5D, above, for the receiving party, may have access to printed copies of any portion of the producing party's source code. Each time counsel for the receiving party requests a review of source code on the Source Code Computer, it must give at least one business day (and at least 24 hours) notice to the counsel for the producing party that it will be sending individual(s) authorized to review the source code made available on the Source Code Computer. The receiving party shall identify all individuals who will be given access to 7 the source code at least fourteen days prior to any inspection, after which time the producing party may object to providing source code access to any persons so identified. viii. Proper identification of all authorized persons shall be provided prior to any access to the secure facility or the Source Code Computer. Proper identification is hereby defined as a photo identification card sanctioned by the government of a U.S. state, by the United States federal government, or by the nation state of the authorized person's current citizenship. Access to the secure facility or the Source Code Computer may be denied, at the discretion of producing party, to any individual who fails to provide proper identification. The Source Code Computer shall be equipped to print copies of the source code on watermarked pre-Bates numbered paper, which shall be provided by the producing party. Counsel for the producing party will keep the originals of these printed documents, and copies shall be made for counsel for the receiving party on watermarked paper either at the time they are requested (if less than 100 pages) or within 48 hours (if more than 100 pages). Counsel for the receiving party may request up to 10 copies of printed source code. No more than 10% or 500 pages of the total source code for any software release may be in printed form at any one time, and all printed source code shall be logged by the receiving party as noted in paragraph xv below. The supplier may object to any request to deliver copies of printed source code as excessive and/or not done for a permitted 8 purpose. If such objection cannot be resolved by mutual agreement within five (5) business days it shall be submitted to the Court for resolution. In the event the request is for 40 continuous pages or less of source code, the supplier must deliver those pages to counsel for the receiving party within two (2) business days of the printing notwithstanding any such objection. In the event the request is for more than 40 continuous pages or represents 10% or more of a specific software release, the print out shall be presumed excessive and not done for a permitted purpose. If, after meeting and conferring, the supplier and the receiving party cannot resolve the objection, the supplier shall be entitled to seek the Court’s resolution of whether the printed source code in question is narrowly tailored and was printed for a permitted purpose. The burden shall be on the receiving party to demonstrate that such printed portion of the source code was no more than is reasonably necessary for a permitted purpose and not merely printed for the purpose of review and analysis elsewhere. In the event the request is for more than 40 continuous pages, and the parties are unable to resolve the supplier’s objection via meeting and conferring, then at the supplier’s discretion, no portion of the printed source code in question need by delivered to counsel for the receiving party until the issue is resolved by the Court. In the event the objection to print 40 continuous pages or less is sustained by the Court, the pages that were subject to the objection shall be returned to supplier within two (2) business days. If necessary, the receiving party may request, within 24-hours of day needed, 9 to print additional pages in excess of the 500 pages of total source code for a software release, which request the supplier shall not unreasonably deny. i. In the event the request is for more than 40 continuous pages or represents 10% or more of a specific software release, the print out shall be presumed excessive and not done for a permitted purpose. The same guidelines set forth previously in this paragraph for the meet and confer process and any necessary involvement by the Court to resolve disputes relating to printed portions of the code shall apply. Any request for additional pages in excess of the 500 pages of total source code for a software release will be provided in no more than 500-page increments unless otherwise agreed to by the parties. One page of printed Source Code shall mean one column of Source Code printed on one single-sided sheet of paper measuring no more than 8 and 1/2 inches by 11 inches. In addition to other reasonable steps to maintain the security and confidentiality of the producing party's source code, printed copies of the source code maintained by the receiving party must be kept in a locked storage container when not in use. No additional electronic copies of the source code shall be provided. ii. Other than in connection with pleadings filed under seal and depositions designated HIGHLY CONFIDENTIAL — SOURCE CODE, no subsequent copies shall be made of the printed copies provided by the producing party to the requesting party. Hard copies of the source code 10 also may not be converted into an electronic document, and may not be scanned using optical character recognition (“OCR”) technology; iii. No outside electronic devices, including but not limited to laptops, floppy drives, zip drives, or other hardware shall be permitted in the secure room. Nor shall any cellular telephones, personal digital assistants (PDAs), Blackberries, cameras, voice recorders, Dictaphones, telephone jacks or other devices be permitted inside the secure room. Nor shall any nonelectronic devices capable of similar functionality be permitted in the secure room. iv. The receiving party's counsel shall keep a log that records the identity of each individual to whom each hard copy of the source code is provided and when it was first provided to that person, and within thirty days after the issuance of a final, non-appealable decision resolving all issues in the case, the receiving party must serve upon the producing party the log and either return the source code to the producing party, or certify the destruction of, all paper copies of the producing party's source code. In addition, all persons to whom the paper copies of the source code were provided must certify in writing that all copies of the source code were returned to the counsel who provided them the information or destroyed and that they will make no use of the source code or of any knowledge gained from the source code in any future endeavor. v. Any expert consultant retained on behalf of receiving party who is to be given access to producing party's produced source code (whether in 11 electronic form or otherwise) must agree in writing not to perform software development work directly or indirectly intended for commercial purposes relating to Java Hardware Acceleration technology for a period of one year after the issuance of a final, non-appealable decision resolving all issues in the case. This shall not preclude such expert consultants from consulting in future litigation, so long as such consulting does not involve software development work directly or indirectly intended for commercial purposes relating to Java Hardware Acceleration technology. vi. Access to and review of the source code shall be strictly for the purpose of investigating the claims and defenses at issue in the above-styled case. No person shall review or analyze any source code for purposes unrelated to this case, nor may any person use any knowledge gained as a result of reviewing source code in this case in any other pending or future dispute, proceeding, or litigation. 7. The term “copy” as used herein means any photographic, mechanical or computerized copy or reproduction of any document or thing, or any verbatim transcript, in whole or in part, of such document or thing. 8. To the extent that Protected Documents or information contained therein are used in depositions, at hearings, or at trial, such documents or information shall remain subject to the provisions of this Order, along with the transcript pages of the deposition testimony and/or trial testimony referring to the Protected Documents or information contained therein. 12 9. Any court reporter or transcriber who reports or transcribes testimony in this action shall agree that all Confidential Information designated as such under this Order shall remain confidential and shall not be disclosed by them, except pursuant to the terms of this Order, and that any notes or transcriptions of such testimony (and any accompanying exhibits) will be retained by the reporter or delivered to counsel of record. 10. Inadvertent or unintentional production of documents or information containing Confidential Information which are not designated “CONFIDENTIAL,” “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY,” or “HIGHLY CONFIDENTIAL — SOURCE CODE” shall not be deemed a waiver in whole or in part of a claim for confidential treatment. Upon request by the producing party, the receiving party shall immediately destroy or return all copies of such inadvertently produced document(s). The producing party shall have to opportunity to reproduce or designate the returned documents with any of the aforementioned CONFIDENTIAL designations. The receipt of documents or information will not operate as an admission by the receiving party that any particular “CONFIDENTIAL,” “HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY,” or “HIGHLY CONFIDENTIAL — SOURCE CODE” contains or reflects trade secrets or any other type of confidential or proprietary information. Nothing herein shall prevent the receiving party from challenging the propriety of the designation of the documents by submitting a written challenge to the Court. 11. Inspection or production of documents (including physical objects) shall not constitute a waiver of the attorney-client privilege or work product immunity or any other applicable privilege or immunity from discovery if, as soon as reasonably possible after the producing party becomes aware of any inadvertent or unintentional disclosure, the 13 producing party designates any such documents as within the attorney-client privilege or work product immunity or any other applicable privilege or immunity and requests return of such documents to the producing party. Upon request by the producing party, the receiving party shall immediately destroy or return all copies of such inadvertently produced document(s). Nothing herein shall prevent the receiving party from challenging the propriety of the attorney-client privilege or work product immunity or other applicable privilege or immunity designation by submitting a written challenge to the Court. 12. Nothing herein shall alter or change in any way the discovery provisions of the Federal Rules of Civil Procedure. Identification of any individual pursuant to this Protective Order does not make that individual available for deposition or any other form of discovery outside of the restrictions and procedures of the Federal Rules of Civil Procedure or applicable local rules. 13. The party or parties receiving Protected Documents shall not under any circumstances sell, offer for sale, advertise, or publicize Protected Documents or any information contained therein. 14. After termination of this litigation, the provisions of this Order shall continue to be binding, except with respect to those documents and information that become a matter of public record. This Court retains and shall have continuing jurisdiction over the parties and recipients of the Protected Documents for enforcement of the provisions of this Order following termination of this litigation. 15. Upon termination of this action as to any one party by dismissal, judgment, or settlement, counsel for the party or parties receiving Protected Documents shall destroy or return the 14 Protected Documents to the counsel for party or parties disclosing or producing the Protected Documents. The party or parties receiving the Protected Documents may continue to retain and rely upon the Protected Documents and information therein to the extent that one or more of its experts has previously relied on the Protected Documents and information therein in forming their opinion, and that opinion and underlying documents continue to be relevant to the litigation or subsequent appeal. In addition, the party or parties receiving the Protected Documents may keep pleadings, disclosures required under the Patent Local Rules, and their attorney work product which refer or relate to any Protected Documents or information contained therein.. 16. This Order shall be binding upon the parties and their attorneys, successors, executors, personal representatives, administrators, heirs, legal representatives, assigns, subsidiaries, divisions, employees, agents, independent contractors, or other persons or organizations over which they have control. 17. No individual who, on behalf of the Plaintiff, has had access to information designated as HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY or “HIGHLY CONFIDENTIAL — SOURCE CODE” by a Defendant may prosecute, supervise, or assist in the prosecution of any patent application on behalf of the Plaintiff involving the particular technology or information disclosed in the Protected Documents or “HIGHLY CONFIDENTIAL — SOURCE CODE for a period ending one (1) year after the final resolution of this litigation. For purposes of this paragraph, prohibited prosecution shall include, without limitation: invention identification, invention evaluation, the decision whether to file a patent application for an invention, preparation of and/or amendments to original, continuation, divisional, continuation-in-part, request for continued examination, 15 reexamination, reissue, substitute, renewal or convention patent applications, claim drafting, drafting of any document to be filed with the United States Patents and Trademark Office or any foreign patent office, or consultation on any of the above matters with others performing these activities. Notwithstanding the foregoing, no individual subject to prohibited prosecution under this paragraph shall be precluded from performing, supervising, or consulting on routine, patent-related, administrative tasks on behalf of the Plaintiff (e.g., drafting and recording assignment documents, submission of maintenance fees, and drafting or filing requests for certificate(s) of correction). 18. This protective order shall afford all third parties who produce any Protected Documents the same protections afforded to the parties to this action. Specifically, third parties shall be entitled to mark any documents CONFIDENTIAL, HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY, or HIGHLY CONFIDENTIAL — SOURCE CODE and shall also be able to designate any deposition testimony CONFIDENTIAL, HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY, or HIGHLY CONFIDENTIAL — SOURCE CODE. The parties to this action will treat such marked information per the terms of the protective order. To the extent applicable, the remaining provisions of this protective order shall apply to third parties, including the designation HIGHLY CONFIDENTIAL — SOURCE CODE. 19. Before counsel for a party receiving Protected Documents may disclose any such material designated CONFIDENTIAL, HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY, and/or HIGHLY CONFIDENTIAL — SOURCE CODE to a proposed expert or consultant: 16 (i) Counsel shall provide a copy of this Protective Order to such person, who shall sign the Agreement attached hereto as Exhibit A; and (ii) At least ten (10) business days before the first such disclosure, counsel for the receiving party shall notify the producing party in writing of the intent to disclose CONFIDENTIAL, HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY, and/or HIGHLY CONFIDENTIAL — SOURCE CODE discovery material to such person. The notice shall include a copy of the agreement signed by the person and shall identify his or her title, job responsibilities and affiliation(s) with the receiving party. If the person is a consultant or testimonial expert, the notice shall also include a copy of such person's most recent curriculum vitae, which shall include an identification of all such person's past and present employment and/or consulting relationships. If the producing party objects to the disclosure of CONFIDENTIAL, HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY, and/or HIGHLY CONFIDENTIAL — SOURCE CODE material to such person, the producing party shall notify counsel for the receiving party in writing of the producing party's objection(s) to such disclosure prior to the date on which the disclosure is intended to be made. Any objection must be made for good cause, stating with particularity the reasons for the objection. Should the receiving party disagree with the basis for the objection(s), the parties must first attempt to resolve the objection(s) informally. If the informal efforts do not resolve the dispute within five (5) business days, the receiving party may file a motion requesting that the objection(s) be quashed after that five (5) day period has passed. The producing party shall have the burden of proof by a preponderance of the evidence 17 on the issue of the sufficiency of the objection(s). Pending a ruling by the Court upon any such objection(s), the discovery material shall not be disclosed to the person objected to by the producing party. 20. In no case shall any information designated as CONFIDENTIAL INFORMATION by a Defendant be provided to any other Defendant or Defendant's in house counsel by any party or counsel absent explicit agreement from the Defendant designating the information. To the extent that information designated as CONFIDENTIAL INFORMATION by one Defendant is provided to any other Defendant's outside counsel by any party or counsel, the originally producing Defendant shall be given reasonable notice of such disclosure. So ORDERED and SIGNED this 1st day of June, 2012. RONALD M. WHYTE UNITED STATES DISTRICT JUDGE 18 EXHIBIT A UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA NAZOMI COMMUNICATIONS, INC. V. NO. 5:10-cv-04686 RMW (HRL) NOKIA CORP., et al. AGREEMENT TO BE BOUND BY PROTECTIVE ORDER I, _______________________________, hereby acknowledge that I am about to receive Protected Documents and information as defined in the Protective Order agreed to by the parties and so ordered by the Court in this case. I certify my understanding that the Protected Documents and information are being provided to me pursuant to the terms and restrictions of the Protective Order, and that I have been given a copy of and have read and understood my obligations under that Protective Order. I hereby agree to be bound by the terms of the Protective Order. I clearly understand that the Protected Documents and information and my copies or notes relating thereto may only be disclosed to or discussed with those persons permitted by the Protective Order to receive such material. I will return on request all materials containing Protected Documents and information, copies thereof, and notes that I have prepared relating thereto, to outside counsel for the party by whom or on whose behalf I am retained. AGREEMENT TO BE BOUND BY PROTECTIVE ORDER - PAGE 1 I hereby submit to the jurisdiction of this Court for the purpose of enforcement of the Protective Order and waive any and all objections to jurisdiction and venue. I make the above statements under penalty of perjury. Printed Name: Company Name/Address/Phone: AGREEMENT TO BE BOUND BY PROTECTIVE ORDER - PAGE 2

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?