Apple Inc. v. Samsung Electronics Co. Ltd. et al

Filing 887

Declaration of Mia Mazza In Support Of Apples Administrative Motion For Clarification Regarding April 12 Order filed byApple Inc.. (Attachments: #1 Exhibit 1, #2 Exhibit 2, #3 Exhibit 3, #4 Exhibit 4, #5 Exhibit 5, #6 Exhibit 6, #7 Exhibit 7, #8 Exhibit 8, #9 Exhibit 9, #10 Exhibit 10, #11 Exhibit 11, #12 Exhibit 12, #13 Exhibit 13, #14 Exhibit 14, #15 Exhibit 15, #16 Exhibit 16, #17 Exhibit 17, #18 Exhibit 18, #19 Exhibit 19, #20 Exhibit 20, #21 Exhibit 21, #22 Exhibit 22, #23 Exhibit 23, #24 Exhibit 24)(Tucher, Alison) (Filed on 4/26/2012)

Download PDF
Exhibit 5 UNITED STATES INTERNATIONAL TRADE COMMISSION Washington, D.C. In the Matter of CERTAIN WIRELESS COMMUNICATION DEVICES, PORTABLE MUSIC AND DATA PROCESSING DEVICES, COMPUTERS AND COMPONENTS THEREOF Inv. No. 337-TA-745 Order No.1: Protective Order WHEREAS, documents and information may be sought, produced or exhibited by and among the parties to the above captioned proceeding, which materials relate to trade secrets or other confidential research, development or commercial information, as such terms are used in the Commission's Rules, 19 C.F.R. Section 21O.34(a)(7), IT IS HEREBY ORDERED THAT: 1. Confidential business information is information which has not been made public and which concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the production, sales, shipments, purchases, transfers, identification of customers, inventories, amount or source of any income, profits, losses, or expenditures of any person, firm, partnership, corporation, or other organization, the disclosure of which information is likely to have the effect of either (1) impairing the Commission's ability to obtain such information as is necessary to perform its statutory functions, or (2) causing substantial harm to the competitive position of the person, firm, partnership, corporation, or other organization from which the information was obtained, unless the Commission is required by law to disclose such information. 2. Any information submitted, either voluntarily or pursuant to order, in this investigation, which is asserted by a supplier to contain or constitute confidential business information shall be so designated by such supplier in writing, or orally at a deposition, conference or hearing, and shall be segregated from other information being submitted. Documents shall be clearly and prominently marked on their face with the legend: "[ supplier's name] CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER," or a comparable notice. Information obtained during discovery and asserted by the supplier to be confidential under this order will be deemed to be confidential unless the administrative law judge or the Commission rules that it is not. When such information is made part of a pleading, or is offered into the evidentiary record, the party offering it must state the basis for its claimed confidentiality. Confidential information whether submitted in writing or in oral testimony shall be disclosed at a hearing only on the in camera record and shall not be made part of the public record of this proceeding. The administrative law judge or the Commission may determine that information alleged to be confidential is not confidential, or that its disclosure is necessary for the proper disposition of the proceeding, at any time before, during or after the close of the hearing herein. If such a determination is made by the administrative law judge, opportunity shall be provided to the supplier of such information to argue its confidentiality, prior to the time that such ruling becomes final. 3. In the absence of written permission from the supplier or an order by the Commission or the administrative law judge, any confidential documents or business information submitted in accordance with the provisions of paragraph 2 above shall not be disclosed to any person other than: (i) outside counsel for parties to this investigation, including necessary secretarial and 2 clerical personnel assisting such counsel, (ii) qualified persons taking testimony involving such documents or information and necessary stenographic and clerical personnel thereof, (iii) technical experts and their staff who are employed by outside counsel under (i) above for the purposes of this litigation (unless they are otherwise employed by, consultants to, or otherwise affiliated with a non-governmental party, or are employees of any domestic or foreign manufacturer, wholesaler, retailer, or distributor of wireless communication devices, portable music and data processing devices, computers and components thereof, which are the subj ect of this investigation), and (iv) the Commission, the administrative law judge, the Commission staff, and personnel of any governmental agency as authorized by the Commission. However see Commission rule 210.5 (b) which conforms to 19 U.S.C. § 1337(n)(2), which clarifies the list of government officers and employees who may have access to confidential business information, and (c) which alerts suppliers to the possibility that confidential business information may be transmitted to a federal district court, subject to such protective order as the district court determines necessary. This result might occur in a limited class of cases because of 28 U.S.C. § 1659. Past Commission practice has been to permit the transfer of confidential business information to another court only with permission of the supplier of the information. Particularly where the supplier is a third party who is involved in neither the Commission investigation nor the district court case, it is important that the supplier be made aware that treatment of confidential information would be governed by the district court's protective order and not that of the Commission following transmittal of the record under this provision. See also Commission rule 210.39 which outlines the circumstances in which the Commission's record, including the in camera record, may be transmitted to a federal district court, subject to such 3 protective order as the district court determines necessary. In addition, referring to Commission Administrative Order No. 97-06, dated February 4, 1997, information submitted under this Protective Order may be disclosed to technical contract personnel who are acting in the capacity of Commission employees, for developing or maintaining the records of this investigation or related proceedings, or in internal audits and investigations relating to the programs and operations of the Commission pursuant to 5 U.S.C. Appendix 3. Any contract personnel will sign appropriate non-disclosure agreements. 1 Where the supplier of information under this order is a third party who is not involved in the Commission investigation, it is important that the supplier be made aware of the disclosure of such information to contract personnel by being provided a copy of the protective order. 4. Confidential business information submitted in accordance with the provisions of paragraph 2 above shall not be made available to any person designated in paragraph 3(i) and (iii) unless he or she shall have first read this order and shall have agreed, by letter filed with the Secretary of this Commission (letter of acknowledgment): (i) to be bound by the terms thereof; (ii) not to reveal such confidential business information to anyone other than another person designated in paragraph 3; and (iii) to utilize such confidential business information solely for purposes of this investigation. Such letter shall also acknowledge that the signatory(ies) has (have) read the order. Such letter shall further state which parties the person filing the letter is involved with and shall state in what capacity he or she is a signatory to the Protective Order (~, as an attorney under Paragraph 3(i) or technical expert under Paragraph 3(iii) and, in the 1 A supplier of confidential business information may request that the administrative law judge identify said contract personnel. 4 case of an attorney, in what jurisdictions he or she is admitted to practice. Each attorney seeking access to confidential business information shall sign such letter individually, but clerical and support personnel (including law clerks and paralegals) of that attorney need not sign. All letters of acknowledgment of this Protective Order shall be served on all non-parties who have theretofore submitted confidential business information in accordance with the provisions of paragraph 2, above. 5. Confidential business information obtained in the Commission proceeding may be used with the consent of the supplier in a parallel district court proceeding under a protective order issued by the district court without losing its confidential status under the protective order in this proceeding as long as the information is not made public in the district court proceeding or by someone who obtains the information from that source or by anyone else. 6. Confidential business information furnished by a supplier may lose its protection under this order if it is disseminated to anyone not authorized to see it either by this protective order or by a protective order issued by a district court in a parallel proceeding protecting confidential business information obtained by the parties under the Commission's protective order. Information obtained pursuant to the Commission's protective order, however, may be produced to the district court under the district court protective order only with the consent of the suppliers of that information. 7. If the Commission or the administrative law judge orders, or if the supplier and all parties to the investigation agree, that access to, or dissemination of, information submitted as confidential business information shall be made to persons not included in paragraphs 3, 5 or 6 above, such matter shall only be accessible to, or disseminated to, such persons based on the 5 conditions pertaining to, and obligations arising from, this order, and such persons shall be considered subject to it unless the Commission or the administrative law judge finds that the information is not confidential business information as defined in paragraph 1 hereof. 8. Any confidential business information submitted to the Commission or the administrative law judge in connection with a motion or other proceeding within the purview of this investigation shall be submitted under a designation that confidential information is contained or attached therein, pursuant to paragraph 2 above. When any confidential business information submitted in accordance with paragraph 2 above is included in an authorized transcript of a deposition or exhibits thereto, arrangements shall be made with the court reporter taking the deposition to bind such confidential portions and separately label them "[supplier's name], CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER." Before a court reporter receives any such information, he or she shall have first read this order and shall have agreed in writing to be bound by the terms thereof. Alternatively, he or she shall sign the agreement included as Attachment A hereto. Copies of each such signed agreement shall be provided to the supplier of such confidential business information and to the Secretary of the Commission. 9. The restrictions upon, and obligations accruing to, persons who become subject to this order shall not apply to any information submitted in accordance with paragraph 2 above to which the person asserting the confidential status thereof agrees in writing, or the Commission or the administrative law judge rules, after proper notice and hearing, was publicly known at the time it was supplied to the receiving party or has since become publicly known through no fault of the receiving party. 6 10. The administrative law judge acknowledges that any document or information submitted as confidential business information pursuant to paragraph 2 above is to be treated as such within the meaning of5 U.S.C. § 522(b)(4) and 18 U.S.c. § 1905, subject to a challenge by any party pursuant to paragraph 12 below or to a final ruling by the Commission, the administrative law judge or its Freedom of Information Act Officer to the contrary, or by appeal of such a ruling, interlocutory or otherwise. 11. If no determination has been made by the administrative law judge or the Commission that the information designated as confidential by the submitter is not confidential, the persons who are recipients of such information shall take all necessary and proper steps to preserve the confidentiality of, and to protect each supplier's rights with respect to, any confidential business information designated by the supplier in accordance with paragraph 2 above. 12. The supplier of any confidential information is hereby notified that Commission regulations 19 C.F.R. § 20 1.19(c) through (e) generally require that the Commission will give notice to a submitter of confidential information upon the Commission's receipt of an FOIA request. 13. The supplier of any confidential information is put on notice that Commission rule 210.20 provides that only a party may move to declassify and that only then are such motions, whether brought at any time during or after the conclusion of an investigation, addressed to and ruled upon by an administrative law judge. Other requests to declassify made by non-parties, such as an FOIA request, will not be referred to the administrative law judge for consideration under the protective order. 7 14. If a party to this order who is a recipient of any business information designated as confidential and submitted in accordance with paragraph 2, disagrees with respect to such a designation, in full or in part, it shall notify the supplier in writing, and they will thereupon confer as to the status of the subject information proffered within the context of this order. If prior to, or at the time of, such a conference, the supplier withdraws its designation of such information as being subject to this order, but nonetheless submits such information for purposes of the investigation, such supplier shall express the withdrawal in writing and shall serve such withdrawal upon all parties, the administrative law judge, and the Commission investigative attorney. If the recipient and supplier are unable to concur upon the status of the subject information submitted as confidential business information within ten days from the date of notification of such disagreement, any party to this order may raise the issue of the designation of such a status to the Commission or to the administrative law judge, and the Commission or the administrative law judge may raise the issue of designation of the confidential status without any request from a party. Upon notice that such confidential status of information is at issue, the party to the investigation which submitted the information and designated it as confidential shall have the burden of proving such confidential status. 15. No less than ten days (or any other period of time designated by the administrative law judge) prior to the initial disclosure to the proposed expert of any confidential information submitted in accordance with paragraph 2, the party proposing to use such expert shall submit in writing the name of such proposed expert and his or her educational and employment history to the supplier. If the supplier objects to the disclosure of such confidential business information to such proposed expert as inconsistent with the language or intent of this order or on other 8 grounds, it shall notify the recipient in writing of its objection and the grounds therefor prior to the initial disclosure. If the dispute is not resolved on an informal basis within ten days of receipt of such notice of objection, motion may be made to the administrative law judge for a ruling on such obj ection. The submission of such confidential business information to such proposed expert shall be withheld pending the ruling of the administrative law judge. The terms of this paragraph shall be inapplicable to experts within the Commission or to experts from other governmental agencies who are consulted with, or used by, the Commission. 16. If confidential business information submitted in accordance with paragraph 2 is disclosed to any person other than in the manner authorized by this protective order, the party responsible for the disclosure must immediately bring all pertinent facts relating to such disclosure to the attention of the supplier and the administrative law judge and, without prejudice to other rights and remedies of the supplier, make every effort to prevent further disclosure by it or by the person who was the recipient of such information. 17. Nothing in this order shall abridge the right of any person to seek judicial review or to pursue other appropriate judicial action with respect to any ruling made by the Commission, its Freedom of Information Act Officer, or the administrative law judge concerning the issue of the status of confidential business information. 18. Upon final termination of this investigation, each party that is subject to this order shall destroy or return to the supplier all items containing confidential business information submitted in accordance with paragraph 2 above, including all copies of such matter which may have been made, but not including copies containing notes or other attorney's work product that may have been placed thereon by counsel for the receiving party. All copies containing such 9 notes or other attorney's work product shall be destroyed. Receipt of material returned to the supplier shall be acknowledged in writing. This paragraph shall not apply to the Commission, including its investigative attorney, and the administrative law judge, which shall retain such material pursuant to statutory requirements and for other recordkeeping purposes, but may destroy those additional copies in its possession which are regarded as surplusage. 19. If any confidential business information which is supplied in accordance with paragraph 2 above is supplied by a non-party to this investigation, such a non-party shall be considered a "supplier" within the meaning of that term as it is used in the context of this order. 20. At or before the final termination of the investigation, copies of confidential information that was in the hands of expert witnesses must be retrieved or destroyed. 21. Except as provided in Commission rule 210.20, the jurisdiction of the administrative law judge over this order terminates upon filing of the initial determination issued at the end of the case. After that date, the Commission has jurisdiction to enforce this order and to issue reprimands and other sanctions. 22. The parties may move to amend this order, but any proposed amendment that would broaden the range of persons having access to confidential business information must be proposed and adopted before such information is supplied in reliance upon the terms of this order, unless all suppliers of confidential information consent to the amendment. 10 23. The Secretary shall serve a copy of this order upon all parties. t?vuJ Q ,ck?t%, \62A~) Paul J. Luckem Chief Administrative Law Judge Issued: November 3,2010 11 ATTACHMENT A NONDISCLOSURE AGREEMENT FOR REPORTER/STENOGRAPHER/TRANSLATOR I, _ _ _ _ _ _ _ _ _ _ _ _ _ _, do solemnly swear that I will not divulge any information communicated to me in any confidential portion of the investigation or hearing in Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof, Inv. No. 337-TA-745, except as permitted in the protective order issued in this case. I will not directly or indirectly use, or allow the use of such information for any purpose other than that directly associated with my official duties in this case. Further, I will not by direct action, discussion, recommendation, or suggestion to any person reveal the nature of content of any information communicated during any confidential portion of the investigation or hearing in this case. I also affirm that I do not hold any position or official relationship with any ofthe participants in said investigation. I am aware that the unauthorized use or conveyance of information as specified above is a violation ofthe Federal Criminal Code and punishable by a fine of up to $10,000, imprisonment of up to ten (10) years, or both. Signed _ _ _ _ _ __ Dated - - - - - - Firm or affiliation CERTAIN WIRELESS COMMUNICATION DEVICES, PORTABLE MUSIC AND DATA PROCESSING DEVICES, COMPUTERS AND COMPONENTS THEREOF Inv. No. 337-TA-745 CERTIFICATE OF SERVICE I, Marilyn R. Abbott, hereby certify that the attached Order has been served by hand upon the Commission Investigative Attorney, Kevin G. Baer, Esq., and the following parties as indicated, November 4, 2010 on _________________________________________ Marilyn R. Ab ot ecretary U.S. International Trade Commission 500 E Street, SW Washington, DC 20436 On Behalf of Complainants Motorola Mobility, Inc.: Charles F. Schill, Esq. Steptoe & Johnson LLP 1330 Connecticut Avenue, NW Washington, DC 20036 Respondent: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 ( ) 'Via Hand Delivery ( )kia Overnight Mail (JVia First Class Mail ( ) Other: _ _ __ ( ) V' Hand Delivery () ia Overnight Mail ( Via First Class Mail ( ) Other: _-:--__ UNITED STATES INTERNATIONAL TRADE COMMISSION Washington, D.C. In the Matter of CERTAIN WIRELESS COMMUNICATION DEVICES, PORTABLE MUSIC AND DATA PROCESSING DEVICES, COMPUTERS AND COMPONENTS THEREOF Inv. No. 337-TA-745 Order No.7: Amending Protective Order (Order No.1) On January 5,2011, pursuant to Commission rules 210.15 and 210.26, and paragraph 22 of Order No.1 (November 3,2010) (Protective Order), complainant Motorola Mobility, Inc. (Motorola) and respondent Apple, Inc. (Apple) moved to amend the Protective Order to provide enhanced confidentiality protections for electronic computer code, and to establish a prosecution bar. (Motion Docket No. 745-2).1 Pursuant to the pending motion the following provisions shall be incorporated as Paragraph Nos. 24-26 in the Protective Order that has issued: 24. Source Code. Motorola and Apple may designate documents, information, or things as "Confidential Business Information Containing Highly Confidential-Source Code Information," which means source code, as that term is defined below, and information related to source code, which is to be protected in the same manner as what is set forth in this Protective Order, subject to additional protections provided below. A. Source code includes human-readable programming language text that defines software, firmware, or electronic hardware descriptions and/or instructions (hereinafter referred to as "source code"). Source code includes, without limitation, computer code, scripts, assembly, object code, source code listings and descriptions of source code, object code listings and descriptions of object code, formulas, engineering specifications, or schematics that define or otherwise describe in detail the algorithms or structure of software. Source code documents at least include (1) printed documents that contain or refer to selected source code components 1 Movants represented that the Commission Investigative Staff does not oppose said motion. ("printed source code"); (2) electronic communications and descriptive documents, such as emails, design documents and programming examples, which contain or refer to selected source code components ("described source code"); (3) electronic source code documents that reside in a source code repository from which software and related data files may be compiled, assembled, linked, executed, debugged and/or tested ("source code files"); and (4) transcripts, reports, video, audio, or other media that include, quote, cite, describe, or otherwise refer to source code, source code files, and/or the development thereof. Source code files include, but are not limited to documents containing source code in "C", "C++", Java, Java scripting languages, assembler languages, command languages and shell languages. Source code files may further include "header files," "make" files, project files, link files, and other human-readable text files used in the generation, compilation, translation, and/or building of executable software, including software intended for execution by an interpreter. Documents and things produced during the course ofthis litigation designated as "Highly Confidential-Source Code Information" shall be protected in accordance with this Protective Order, subject to additional protections provided herein below. Nothing in this Protective Order shall obligate the parties to produce any source code nor act as an admission that any particular source code is discoverable. B. A producing party shall produce source code files by making them available electronically on a stand-alone, non-networked computer without Internet access provided by the producing party ("the Source Code Computer"). The Source Code Computer provided by the producing party shall run a reasonably current version of a mutually agreed upon operating system such as Apple OS X, Microsoft Windows, Linux, or SunOS. Source code files must be produced as they are stored in the ordinary course of business and on a mutually agreed upon computer system. The Source Code Computer shall be produced, stored, and secured at the offices ofthe producing party's outside counselor such other appropriately secure facility as is mutually agreed upon by the parties (termed "the designated facility"). Motorola shall make source code available at the offices of Steptoe & Johnson in Washington, D.C. and the offices of Quinn Emanuel Urquhart & Sullivan in Redwood Shores, California. Apple shall make source code available at the offices of Weil, Gotshal & Manges in New York, New York and Boston, Massachusetts. The parties reserve the right to change locations or identify an additional location at an office of the respective outside counsel for source code inspection. Source code shall be made available for inspection by the persons to whom disclosure is authorized pursuant to this Protective Order, at a mutually convenient time (that, upon reasonable notice includes evenings and weekends) at the designated facilities, with the following exception: No outside counsel who is involved in competitive decision-making, as defined by Us. Steel v. United States, 730 F.2d 1465, 1468 n.3 (Fed. Cir. 1984), on behalf of a party shall have access to material designated as Highly Confidential - Source Code Information. C. Source code shall be provided with the following additional protections: (i) The producing party shall produce source code files as they are stored in the ordinary course of business and shall deliver one copy of the source code files to the designated facility for review on the Source Code Computer. For sake of clarity, the producing party may 2 provide the source code files in read-only form. To the extent that either the Complainant or Respondent considers production of specifically identified source code files in executable form necessary to prove an element of one or more of its claims (or to disprove a claim put forth by the other side), the parties shall meet and confer. The producing party shall install tools that are sufficient for viewing and searching (ii) the code produced, on the platform produced, if such tools exist and are presently used in the ordinary course of the producing party's business. The receiving party's outside counsel andlor experts may request that commercially available software tools for viewing and searching source code be installed on the secured computer, provided, however, that such other software tools are reasonably necessary for the receiving party to perform its review of the source code consistent with all of the protections herein. Specific tools may include, but are not limited multi-file text search tools such as "grep", dtSearch, Understand for Java, Understand for C, Visual Slick Edit, Source-Navigator, PowerGrep and ExamDiffPro or similar programs. Where executable source code is installed on the Source Code computer, the receiving party shall be entitled to install and use appropriate compilers, debuggers and text editors so long as the receiving party agrees that no edits may be performed on the Highly Confidential- Source Code Information. The receiving party must provide the producing party with the CD or DVD containing such licensed software tool(s) at least five (5) days in advance ofthe date upon which the receiving party wishes to have the additional software tools available for use on the Source Code Computer. (iii) The producing party shall make available a laser printer with commercially reasonable printing speeds for on-site printing during inspection of the source code. The receiving party may print portions ofthe source code only when reasonably necessary to prepare court filings or pleadings or other papers (including a testifying expert's expert report or for use as deposition exhibits). The producing party must allow printing of paper copies of portions of source code not to exceed ten (10) contiguous pages, up to a total of 100 printed pages, which the receiving party may take away upon completing an inspection. In the event that the receiving party believes there is a need to print a contiguous portion of source code exceeding ten (10) pages in length or more than 100 pages total, the parties shall meet and confer regarding such need on the day of the inspection if practicable or otherwise as soon thereafter as possible and absent agreement, seek a Court resolution. The receiving party shall not print source code in order to review blocks of source code elsewhere in the first instance, i.e., as an alternative to reviewing that source code electronically on the Source Code Computers. Upon printing any such portions of source code, the printed pages shall be collected by the producing party. The producing party shall Bates number, copy, and label "CONTAINS CONFIDENTIAL BUSINESS INFORMATION INCLUDING HIGHLY CONFIDENTIAL SOURCE CODE" any pages printed by the receiving party and deliver them to the receiving party or object within two business days. If, after meeting and conferring, the producing party and the receiving party cannot resolve the objection, the producing party shall be entitled to seek a resolution from the Chief Administrative Law Judge of whether the printed source code in question is narrowly tailored and was printed for a permitted purpose. The printed pages shall constitute part of the source code produced by the producing party in this action. Each consultant, expert, or attorney 3 will record on a log every page of source code that has been printed ("print logs"). Print logs should be secured in a locked and secure room when not in use. (iv) Any external storage media containing source code shall be disconnected from and/or removed from its Source Code Computer and stored in a locked room, safe or storage cabinet when it is not actually being accessed. (v) The Source Code Computer and the safe or storage cabinet must be kept in a locked and secure room (the "Source Code Review Room"). (vi) No recordable media or recordable devices, including without limitation sound recorders, computers, cellular telephones, peripheral equipment, cameras, CDs, DVDs, or drives of any kind, shall be permitted into the Source Code Review Room. The receiving party's outside counsel and/or experts shall be entitled to take notes relating to the source code but may not copy the source code into the notes and may not take such notes electronically on the Source Code Computer itself or any other computer. No copies of all or any portion of the source code may leave the room in which the source code is inspected except as otherwise provided herein. Further, no other written or electronic record of the source code is permitted except as otherwise provided herein. The producing party may visually monitor the activities of the receiving party's representatives during any source code review, but only to ensure that no unauthorized electronic records of the source code and that no information concerning the source code are being created or transmitted in any way. Such monitor shall not be in the Source Code Review Room, shall not be able to listen any activity taking place in the Source Code Review Room. No video may be made of any activity taking place in the Source Code Review Room, nor shall the monitor be permitted to report on any activities therein other than as may relate to the above-referenced purpose of the monitoring (vii) Except as provided in Paragraph 24(C)(iii) above and 24(C)(xi) below, the receiving party will not copy, remove, or otherwise transfer any source code from the Source Code Computer including, without limitation, copying, removing, or transferring the source code onto any recordable media or recordable device. The receiving party will not transmit any source code in any way from the producing party's facilities or the offices of its outside counsel of record. (viii) The Source Code Computer and/or external storage media used to store the source code shall be password protected and, at the option ofthe producing party, further protected using PGP encryption. (ix) No electronic copies of source code shall be made (including by way of example only, the receiving party may not scan the source code to a PDF or photograph the code), other than volatile copies necessarily made in the course of loading, accessing, compiling, modeling and/or executing the source code or running data processing systems that use or incorporate the source code on the Source Code Computer. Images or copies of source code shall not be 4 included in correspondence between the parties (references to production numbers shall be used instead), and shall be omitted from pleadings and other papers whenever possible. (x) The receiving party's outside counsel of record may make no more than five (5) additional paper copies of any portions of the source code received from a producing party, not including copies attached to court filings or used at depositions, and shall maintain a log of all paper copies of the source code received from a producing party that are delivered by the receiving party to any qualified person under Paragraph 24(B) above. The log shall include the names of the reviewers and/or recipients of paper copies and locations where the paper copies are stored. Upon one reasonable notice to the receiving party by the producing party, the receiving party shall provide a copy of this log to the producing party. (xi) Copies of source code that are marked as deposition exhibits shall not be provided to the court reporter or attached to deposition transcripts; rather, the deposition record will identify the exhibit by its production numbers. All paper copies of source code brought at the deposition shall be securely destroyed in a timely manner following the deposition. (xii) Any printed pages of Source Code shall be stored in a locked safe or storage cabinet when not actually in use. (xiii) The inspecting party shall maintain a log of all individuals who have accessed the Source Code Computer. The log shall be made available to the producing party upon reasonable request. The log shall include the name of each person who accessed the Source Code Computer. Such log and any information from it shall be inadmissible in this Investigation except in connection with proceedings before the Court regarding any alleged violations ofthis Protective Order. (xiv) Unless otherwise agreed in advance by the parties in writing, following each day on which inspection is done under this Order, the receiving party's outside counsel and/or experts shall remove all notes, documents, and all other materials from the Source Code Review Room. (xv) At the end of the above-styled litigation (including any related appeals), any entity receiving source code will certify that: (a) all printed copies of source code have been returned, with the exception of exhibits that were attached to filed pleadings or admitted into evidence; (b) any electronic storage or memory media which may contain source code have been returned, fully reformatted, and/or destroyed; and (c) any access logs maintained by counsel have been archived along with counsel's other records from this litigation. Other than set forth in this subparagraph, counsel may not maintain a file copy of source code material. 25. Prosecution Bar. Absent the written consent ofthe producing party, any person that receives access to confidential material produced pursuant to this Protective Order shall not be involved in the prosecution of patents or patent applications relating to the subject matter of the patents asserted in this action by the opposing party (including but not limited to any application claiming priority to or otherwise related to the patents asserted in this action), before 5 any foreign or domestic agency, including the United States Patent and Trademark Office. Nevertheless, persons having access to materials produced pursuant to this protective order may have limited involvement in reexamination proceedings pertaining to the patent in suit or other related patents, but in these proceedings they are barred against having any involvement, direct or indirect, in the drafting or amending of patent claims, or the supervising of the drafting or amending of patent claims in connection with any such reexamination proceeding. This prohibition on patent prosecution shall begin when access to protected material is first received by the affected individual, and shall end one (1) year after the final resolution of this action, including all appeals. This prosecution bar is personal to the person receiving such protected material and shall not be imputed to any other person or entity. 26. No prejudice. Motorola and Apple agree that amending Protective Order No. 1 in this Investigation is without prejudice to Motorola or Apple's rights to propose, request or otherwise move for different provisions relating to source code production or prosecution bar in any other litigation between Motorola and Apple. Said Motion No. 745-2 is granted. Paul J. Luc i Chief Administrative Law Judge Issued: January 7, 2011 6 CERTAIN WIRELESS COMMUNICATION DEVICES, PORTABLE MUSIC AND DATA PROCESSING DEVICES, COMPUTERS AND COMPONENTS THEREOF Inv. No. 337-TA-745 CERTIFICATE OF SERVICE I, Marilyn R. Abbott, hereby certify that the attached Order has been served by hand upon the Commission Investigative Attorney, Kevin G. Baer, Esq., and the following parties as indicated, on 10, 2011 Marilyn R. Abbott, ecretary U.S. Interna . Trade Commission 500 E Street, SW Washington, DC 20436 On Behalf of Complainants Motorola, Inc. & Motorola Mobility, Inc.: Charles F. Schill, Esq. Steptoe & Johnson LLP 1330 Connecticut Avenue, NW Washington, DC 20036 P-202-429-3000 F-202-429-3902 On Behalf of Respondent Apple Inc.: Mark G. Davis, Esq. Weil, Gotshal & Manges LLP 1300 Eye Street. NW., Suite 900 Washington, DC 20005 P-202-682-7000 F-202-857-0940 ( ) ~ia Hand Delivery ( )!Via Overnight Mail f) Via First Class Mail ( ) Other: _ __ ( ) Via Hand Delivery ( ~;¢ia Overnight Mail ('1 Via First Class Mail ( ) Other: _ _ __ PUBLIC MAILING LIST Heather Hall 9443 Springboro Pike Miamisburg, OH 45342 ( ) Via Hand Delivery ( )}'ia Overnight Mail ("" Via First Class Mail ( ) Other: _ _ __ Kenneth Clair Thomson West 1100 Thirteen Street, NW, Suite 200 Washington, DC 20005 ( ) Via Hand Delivery ( yVia Overnight Mail (vi) Via First Class Mail ( ) Other: _ _ __ LEXIS-NEXIS UNITED STATES INTERNATIONAL TRADE COMMISSION Washington, D.C. In the Matter of CERTAIN MOBILE DEVICES AND RELATED SOFTWARE ORDER NO. 1: Inv. No. 337-TA-750 PROTECTIVE ORDER (November 30, 2010) WHEREAS, documents and information may be sought, produced or exhibited by and among the parties to the above captioned proceeding, which materials relate to trade secrets or other confidential research, development or commercial information, as such terms are used in the Commission's Rules, 19 C.F.R. § 210.5; IT IS HEREBY ORDERED THAT: 1. Confidential business information is information which concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the production, sales, shipments, purchases, transfers, identification of customers, inventories, amount or source of any income, profits, losses, or expenditures of any person, firm, partnership, corporation, or other organization, or other information of commercial value, the disclosure of which is likely to have the effect of either (i) impairing the Commission's ability to obtain such information as is necessary to perform its statutory functions; or (ii) causing substantial harm to the competitive position of the person, firm, partnership, corporation, or other organization from which the information was obtained, unless the Commission is required by law to disclose such information. The term "confidential business information" includes "proprietary information" within the meaning of section 777(b) of the Tariff Act of 1930 (19 U.S.C. § 1677f(b)). 2(a). Any information submitted, in pre hearing discovery or in a pleading, motion, or response to a motion either voluntarily or pursuant to order, in this investigation, which is asserted by a supplier to contain or constitute confidential business information shall be so designated by such supplier in writing, or orally at a deposition, conference or hearing, and shall be segregated from other information being submitted. Documents shall be clearly and prominently marked on their face with the legend: "CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER," or a comparable notice. Such information, whether submitted in writing or in oral testimony, shall be treated in accordance with the terms ofthis protective order. (b). The Administrative Law Judge or the Commission may determine that information alleged to be confidential is not confidential, or that its disclosure is necessary for the proper disposition of the proceeding, before, during or after the close of a hearing herein. If such a determination is made by the Administrative Law Judge or the Commission, opportunity shall be provided to the supplier of such information to argue its confidentiality prior to the time of such ruling. 3. In the absence of written permission from the supplier or an order by the Commission or the Administrative Law Judge, any confidential documents or business information submitted in accordance with the provisions of paragraph 2 above shall not be disclosed to any person other than: (i) outside counsel for parties to this investigation, including necessary secretarial and support personnel assisting such counsel; (ii) qualified persons taking testimony involving such documents or information and necessary stenographic and clerical personnel thereof; (iii) 2 technical experts and their staff who are employed for the purposes of this litigation (unless they are otherwise employed by, consultants to, or otherwise affiliated with a non-governmental party, or are employees of any domestic or foreign manufacturer, wholesaler, retailer, or distributor of the products, devices or component parts which are the subject of this investigation); (iv) the Commission, the Administrative Law Judge, the Commission staff, and personnel of any governmental agency as authorized by the Commission; and (v) the Commission, its employees, and contract personnel who are acting in the capacity of Commission employees, for developing or maintaining the records of this investigation or related proceedings for which this infonnation is submitted, or in internal audits and investigations relating to the programs and operations of the Commission pursuant to 5 U.S.c. Appendix 3.1 4. Confidential business infonnation submitted in accordance with the provisions of paragraph 2 above shall not be made available to any person designated in paragraph 3(i)2 and (iii) unless he or she shall have first read this order and shall have agreed, by letter filed with the Secretary of this Commission: (i) to be bound by the tenns thereof; (ii) not to reveal such confidential business infonnation to anyone other than another person designated in paragraph 3; and (iii) to utilize such confidential business information solely for purposes of this investigation. 5. If the Commission or the Administrative Law Judge orders, or if the supplier and all parties to the investigation agree, that access to, or dissemination of information submitted as confidential business infonnation shall be made to persons not included in paragraph 3 above, such matter shall only be accessible to, or disseminated to, such persons based upon the conditions pertaining to, and obligations arising from this order, and such persons shall be considered subject to it, unless the Commission or the Administrative Law Judge finds that the information is not confidential business infonnation as defmed in paragraph 1 thereof. 3 6. Any confidential business information submitted to the Commission or the Administrative Law Judge in connection with a motion or other proceeding within the purview of this investigation shall be submitted under seal pursuant to paragraph 2 above. Any portion of a transcript in connection with this investigation containing any confidential business information submitted pursuant to paragraph 2 above shall be bound separately and filed under seal. When any confidential business information submitted in accordance with paragraph 2 above is included in an authorized transcript of a deposition or exhibits thereto, arrangements shall be made with the court reporter taking the deposition to bind such confidential portions and separately label them "CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER." Before a court reporter or translator receives any such information, he or she shall have first read this order and shall have agreed in writing to be bound by the terms thereof. Alternatively, he or she shall sign the agreement included as Attachment A hereto. Copies of each such signed agreement shall be provided to the supplier of such confidential business information and the Secretary of the Commission. 7. The restrictions upon, and obligations accruing to, persons who become subject to this order shall not apply to any information submitted in accordance with paragraph 2 above to which the person asserting the confidential status thereof agrees in writing, or the Commission or the Administrative Law Judge rules, after an opportunity for hearing, was publicly known at the time it was supplied to the receiving party or has since become publicly known through no fault ofthe receiving party. 8. The Commission, the Administrative Law Judge, and the Commission investigative attorney acknowledge that any document or information submitted as confidential business information pursuant to paragraph 2 above is to be treated as such within the meaning of 5 4 u.s.C. § 552(b)(4) and 18 U.S.C. § 1905, subject to a contrary ruling, after hearing, by the Commission or its Freedom of Information Act Officer, or the Administrative Law Judge. When such information is made part of a pleading or is offered into the evidentiary record, the data set forth in 19 C.F.R. § 201.6 must be provided except during the time that the proceeding is pending before the Administrative Law Judge. During that time, the party offering the confidential business information must, upon request, provide a statement as to the claimed basis for its confidentiality. 9. Unless a designation of confidentiality has been withdrawn, or a determination has been made by the Commission or the Administrative Law Judge that information designated as confidential, is no longer confidential, the Commission, the Administrative Law Judge, and the Commission investigative attorney shall take all necessary and proper steps to preserve the confidentiality of, and to protect each supplier's rights with respect to, any confidential business information designated by the supplier in accordance with paragraph 2 above, including, without limitation: (a) notifying the supplier promptly of (i) any inquiry or request by anyone for the substance of or access to such confidential business information, other than those authorized pursuant to this order, under the Freedom of Information Act, as amended (5 U.S.C. § 552) and (ii) any proposal to redesignate or make public any such confidential business information; and (b) providing the supplier at least seven days after receipt of such inquiry or request within which to take action before the Commission, its Freedom of Information Act Officer, or the Administrative Law Judge, or otherwise to preserve the confidentiality of and to protect its rights in, and to, such confidential business information. 10. If while an investigation is before the Administrative Law Judge, a party to this order who is to be a recipient of any business information designated as confidential and submitted in 5 accordance with paragraph 2 disagrees with respect to such a designation, in full or in part, it shall notifY the supplier in writing, and they will thereupon confer as to the status of the subject information proffered within the context of this order. If prior to, or at the time of such a conference, the supplier withdraws its designation of such information as being subject to this order, but nonetheless submits such information for purposes of the investigation; such supplier shall express the withdrawal, in writing, and serve such withdrawal upon all parties and the Administrative Law Judge. If the recipient and supplier are unable to concur upon the status of the subject information submitted as confidential business information within ten days from the date of notification of such disagreement, any party to this order may raise the issue of the designation of such a status to the Administrative Law Judge who will rule upon the matter. The Administrative Law Judge may sua sponte question the designation of the confidential status of any information and, after opportunity for hearing, may remove the confidentiality designation. 11. No less than 10 days (or any other period of time designated by the Administrative Law Judge) prior to the initial disclosure to a proposed expert of any confidential information submitted in accordance with paragraph 2, the party proposing to use such expert shall submit in writing the name of such proposed expert and his or her educational and detailed employment history to the supplier. If the supplier objects to the disclosure of such confidential business information to such proposed expert as inconsistent with the language or intent of this order or on other grounds, it shall notifY the recipient in writing of its objection and the grounds therefore prior to the initial disclosure. If the dispute is not resolved on an informal basis within ten days of receipt of such notice of objections, the supplier shall submit immediately each objection to the Administrative Law Judge for a ruling. If the investigation is before the Commission the matter shall be submitted to the Commission for resolution. The submission of such confidential 6 business information to such proposed expert shall be withheld pending the ruling of the Commission or the Administrative Law Judge. The terms of this paragraph shall be inapplicable to experts within the Commission or to experts from other governmental agencies who are consulted with or used by the Commission. 12. If confidential business information submitted in accordance with paragraph 2 is disclosed to any person other than in the manner authorized by this protective order, the party responsible for the disclosure must immediately bring all pertinent facts relating to such disclosure to the attention of the supplier and the Administrative Law Judge and, without prejudice to other rights and remedies of the supplier, make every effort to prevent further disclosure by it or by the person who was the recipient of such information. 13. Nothing in this order shall abridge the right of any person to seek judicial review or to pursue other appropriate judicial action with respect to any ruling made by the Commission, its Freedom of Information Act Officer, or the Administrative Law Judge concerning the issue of the status of confidential business information. 14. Upon final termination of this investigation, each recipient of confidential business information that is subject to this order shall assemble and return to the supplier all items containing such information submitted in accordance with paragraph 2 above, including all copies of such matter which may have been made. Alternatively, the parties subject to this order may, with the written consent of the supplier, destroy all items containing confidential business information and certify to the supplier (or his counsel) that such destruction has taken place. This paragraph shall not apply to the Commission, including its investigative attorney, and the Administrative Law Judge, which shall retain such material pursuant to statutory requirements 7 and for other recordkeeping purposes, but may destroy those additional copies in its possession which it regards as surplusage. Notwithstanding the above paragraph, confidential business information may be transmitted to a district court pursuant to Commission Rule 21O.5(c). 15. If any confidential business information which is supplied III accordance with paragraph 2 above is supplied by a nonparty to this investigation, such a nonparty shall be considered a "supplier" as that term is used in the context of this order. 16. Each nonparty supplier shall be provided a copy of this order by the party seeking information from said supplier. 17. The Secretary shall serve a copy of this order upon all parties. Theodore R. Essex Administrative Law Judge 8 Attachment A NONDISCLOSURE AGREEMENT FOR REPORTER/STENOGRAPHER/TRANSLATOR I, _ _ _ _ _ _ _ _ _ _ _ _, do solemnly swear or affirm that I will not divulge any information communicated to me in any confidential portion of the investigation or hearing in the matter of Certain Mobile Devices and Related Software, Investigation No. 337-TA-750, except as permitted in the protective order issued in this case. I will not directly or indirectly use, or allow the use of such information for any purpose other than that directly associated with my official duties in this case. Further, I will not by direct action, discussion, recommendation, or suggestion to any person reveal the nature or content of any information communicated during any confidential portion of the investigation or hearing in this case. I also affirm that I do not hold any position or official relationship with any of the participants in said investigation. I am aware that the unauthorized use or conveyance of information as specified above is a violation of the Federal Criminal Code and punishable by a fine of up to $10,000, imprisonment of up to ten (10) years, or both. Signed _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Dated - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Firm or affiliation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 9 Inv. No. 337-TA-750 CERTAIN MOBILE DEVICES AND RELATED SOFTWARE PUBLIC CERTIFICATE OF SERVICE I, Marilyn R. Abbott, hereby certifY that the attached ORDER 1 has been served by hand upon, the Commission Investigative Attorney, Benjamin Levi, Esq. and the following parties as indicated on November 30,2010. j}(d# k- ~f (f~u, MariiYJ/ItAbbott U.S. International Trade CommissIOn 500 E Street, SW, Room 112A Washington, D.C. 20436 On Behalf of Complainant Apple Inc.: Edward S. Jou, Esq. WElL, GOTSHALL & MANGES LLP 1300 Eye Street, NW, Suite 900 Washington, DC 20005 ( ) Via Hand Delivery ( ) Via Overnight Delivery ( 0Via First Class Mail ( ) International On Behalf of Respondents Motorola, Inc. and Motorola Mobility, Inc.: Charles F. Schill, Esq. STEPTOE & JOHNSON LLP 1330 Connecticut Avenue, NW Washington, DC 20036 ( ( ( ( ) Via Hand Delivery Via Overnight Delivery ) Via First Class Mail ) International ~ CERTAIN MOBILE DEVICES AND RELATED SOFTWARE Inv. No. 337-TA-750 PUBLIC CERTIFICATE OF SERVICE - PAGE 2 Public Mailing List: Heather Hall LEXIS - NEXIS 9443 Springboro Pike Miamisburg, OH 45342 Kenneth Clair THOMSON WEST 1100 Thirteenth Street, NW, Suite 200 Washington, D.C. 20005 ( ( ) Via Hand Delivery ) Via Overnight Mail Via First Class Mail ) Other:--,-_ __ ( v1 ( ( ( ) Via Hand Delivery ))'ia Overnight Mail ( J5 Via First Class Mail ( ) Other: _ _ __ UNITED STATES INTERNATIONAL TRADE COMMISSION Washingt~n, D.C. In the Matter of CERTAIN MOBILE DEVICES AND RELATED SOFTWARE ORDER NO. 4: Inv. No. 337-TA-750 AMENDING THE PROTECTIVE ORDER (January 14,2011) On January 13,2011, complainant Apple, Inc. ("Apple") and respondents Motorola Inc. and Motorola Mobility, Inc. (collectively "Motorola") filed a joint motion to amend the Protective Order to incorporate provision regarding source code production and a patent prosecution bar. (Motion Docket No. 750-001.) The motion states that the Commission Investigative Staff does not oppose the motion. Order No.1 (Protective Order) is hereby amended to add ~~ 18-20 of as follows: 18. Source Code. Motorola and Apple may designate documents, information, or things as "Confidential Business Information Containing Highly Confidential-Source Code Information," which means source code, as that term is defined below, and information related to source code, which is to be protected in the same manner as what is set forth in this Protective Order, subject to additional protections provided below. A. Source code includes human-readable programming language text that defines software, firmware, or electronic hardware descriptions and/or instructions (hereinafter referred to as "source code"). Source code includes, without limitation, computer code, scripts, assembly, object code, source code listings and descriptions of source code, object code listings and descriptions of object code, formulas, engineering specifications, or schematics that define or otherwise describe in detail the algorithms or structure of software. Source code documents at least include (1) printed documents that contain or refer to selected source code components ("printed source code"); (2) electronic communications and descriptive documents, such as emails, design documents and programming examples, which contain or refer to selected source code components ("described source code"); (3) electronic source code documents that reside in a source code repository from which software and related data files may be compiled, assembled, linked, executed, debugged and/or tested ("source code files"); and (4) transcripts, reports, video, audio, or other media that include, quote, cite, describe, or otherwise refer to source code,. source code files, and/or the development thereof. Source code files include, but are not limited to documents containing source code in "C", "C++", Java, Java scripting languages, assembler languages, command languages and shell languages. Source code files may further include "header files," "make" files, project files, link files, and other human-readable text files used in the generation, compilation, translation, and/or building of executable software, including software intended for execution by an interpreter. Documents and things produced during the course of this litigation designated as "Highly Confidential-Source Code Information" shall be protected in accordance with this Protective Order, subject to additional protections provided herein below. Nothing in this Protective Order shall obligate the parties to produce any source code nor act as an admission that any particular source code is discoverable. B. A producing party shall produce source code files by making them available electronically on a stand-alone, non-networked computer without Internet access provided by the producing party ("the Source Code Computer"). The Source Code Computer provided by the producing party shall run a reasonably current version of a mutually agreed upon operating system such as Apple as x, Microsoft Windows, Linux, or SunOS. Source code files must be produced as they are stored in the ordinary course of business and on a mutually agreed upon computer system. The Source Code Computer shall be produced, stored, and secured at the offices of the producing party's outside counselor such other appropriately secure facility as is mutually agreed upon by the parties (termed "the designated facility"). Motorola shall make source code available at the offices of Steptoe & Johnson in Washington, D.C. and the offices of Quinn Emanuel Urquhart & Sullivan in Redwood Shores, California. Apple shall make source code available at the offices of Weil, Gotshal & Manges in New York, New York and Boston, Massachusetts. The parties reserve the right to change locations or identifY an additional location at an office of the respective outside counsel for source code inspection. Source code shall be made available for inspection by the persons to whom disclosure is authorized pursuant to this Protective Order, at a mutually convenient time (that, upon reasonable notice includes evenings and weekends) at the designated facilities, with the following exception: No outside counsel who is involved in competitive decision-making, as defined by Us. Steel v. United States, 730 F.2d 1465, 1468 n.3 (Fed. Cir. 1984), on behalf of a party Source Code shall have access to material designated as Highly Confidential Information. C. Source code shall be provided with the following additional protections: (i) The producing party shall produce source code files as they are stored in the ordinary course of business and shall deliver one copy of the source code files to the designated facility for review on the Source Code Computer. For sake of clarity, the producing party may provide the source code files in read-only form. To the extent that either the Complainant or Respondent considers production of specifically identified 2 source code files in executable form necessary to prove an element of one or more of its claims (or to disprove a claim put forth by the other side), the parties shall meet and confer. (ii) The producing party shall install tools that are sufficient for viewing and searching the code produced, on the platform produced, if such tools exist and are presently used in the ordinary course of the producing party's business. The receiving party's outside counsel and/or experts may request that commercially available software tools. tOr viewing and searching source code be installed on the secured computer, provided, however, that such other software tools are reasonably necessary for the receiving party to perform its review of the source code consistent with all of the protections herein. Specific tools may inc~ude, but are not limited multi-file text search tools such as "grep", dtSearch, Understand for Java, Understand for C, Visual Slick Edit, Source-Navigator, PowerGrep and ExamDiff Pro or similar programs. Where executable source code is installed on the Source Code computer, the receiving party shall be entitled to install and use appropriate compilers, debuggers and text editors so long as the receiving party agrees that no edits may be performed on the Highly Confidential - Source Code Information. The receiving party must provide the producing party with the CD or DVD containing such licensed software tool( s) at least five (5) days in advance of the date upon which the receiving party wishes to have the additional software tools available for use on the Source Code Computer. (iii) The producing party shall make available a laser printer with commercially reasonable printing speeds for on-site printing during inspection of the source code. The receiving party may print portions of the source code only when reasonably necessary to prepare court filings or pleadings or other papers (including a testifying expert's expert report or for use as deposition exhibits). The producing party must allow printing of paper copies of portions of source code not to exceed ten (10) contiguous pages, up to a total of 100 printed pages, which the receiving party may take away upon completing an inspection. In the event that the receiving party believes there is a need to print a contiguous portion of source code exceeding ten (10) pages in length or more than 100 pages total, the parties shall meet and confer regarding such need on the day of the inspection if practicable or otherwise as soon thereafter as possible and absent agreement, seek a Court resolution. The receiving party shall not print source code in order to review blocks of source code elsewhere in the first instance, i.e., as an alternative to reviewing that source code electronically on the Source Code Computers. Upon printing any such portions of source code, the printed pages shall be collected by the producing party. The producing party shall Bates number, copy, and label "CONTAINS CONFIDENTIAL BUSINESS INFORMATION INCLUDING HIGHL Y CONFIDENTIAL SOURCE CODE" any pages printed by the receiving party and deliver them to the receiving party or object within two business days. If, after meeting and conferring, the producing party and the receiving party cannot resolve the objection, the producing party shall be entitled to seek a resolution from the Chief Administrative Law Judge of whether the printed source code in question is narrowly tailored and was printed for a permitted purpose. The printed pages shall constitute part of the source code produced by the producing party in this action. Each consultant, expert, or attorney will record on a log every page of source code 3 that has been printed ("print logs"). Print logs should be secured in a locked and secure room when not in use. (iv) Any external storage media containing source code shall be disconnected from and/or removed from its Source Code Computer and stored in a locked room, safe or storage cabinet when it is not actually being accessed. (v) The Source Code Computer and the safe or storage cabinet must be kept in a locked and secure room (the "Source Code Review Room"). (vi) No recordable media or recordable devices, including without limitation sound recorders, computers, cellular telephones, peripheral equipment, cameras, CDs, DVDs, or drives of any kind, shall be permitted into the Source Code Review Room. The receiving party's outside counsel and/or experts shall be entitled to take notes relating to the source code but may not copy the source code into the notes and may not take such notes electronically on the Source Code Computer itself or any other computer. No copies of all or any portion of the source code may leave the room in which the source code is inspected except as otherwise provided herein. Further, no other written or electronic record of the source code is permitted except as otherwise provided herein. The producing party may visually monitor the activities of the receiving party's representatives during any source code review, but only to ensure that no unauthorized electronic records of the source code and that no information concerning the source code are being created or transmitted in any way. Such monitor shall not be in the Source Code Review Room, shall not be able to listen any activity taking place in the Source Code Review Room. No video may be made of any activity taking place in the Source Code Review Room, nor shall the monitor be permitted to report on any activities therein other than as may relate to the above-referenced purpose of the monitoring (vii) Except as provided in Paragraph 24(C)(iii) above and 24(C)(xi) below, the receiving party will not copy, remove, or otherwise transfer any source code from the Source Code Computer including, without limitation, copying, removing, or transferring the source code onto any recordable media or recordable device. The receiving party will not transmit any source code in any way from the producing party's facilities or the offices of its outside counsel of record. (viii) The Source Code Computer and/or external storage media used to store the source code shall be password protected and, at the option of the producing party, further protected using PGP encryption. (ix) No electronic copies of source code shall be made (including by way of example only, the receiving party may not scan the source code to a PDF or photograph the code), other than volatile copies necessarily made in the course of loading, accessing, compiling, modeling and/or executing the source code or running data processing systems that use or incorporate the source code on the Source Code Computer. Images or copies of source code shall not be included in correspondence between the parties (references to 4 production numbers shall be used instead), and shall be omitted from pleadings and other papers whenever possible. (x) The receiving party's outside counsel of record may make no more than five (5) additional paper copies of any portions of the source code received from a producing party, not including copies attached to court filings or used at depositions, and shall maintain a log of all paper copies of the source code received from a producing party that are delivered by the receiving party to any qualified person under Paragraph 24(B) above. The log shall include the names of the reviewers and/or recipients of paper copies and locations where the paper copies are stored. Upon one reasonable notice to the receiving party by the producing party, the receiving party shall provide a copy of this log to the producing party. (xi) Copies of source code that are marked as deposition exhibits shall not be provided to the court reporter or attached to deposition transcripts; rather, the deposition record will identifY the exhibit by its production numbers. All paper copies of source code brought at the deposition shall be securely destroyed in a timely manner following the deposition. (xii) Any printed pages of Source Code shall be stored in a locked safe or storage cabinet when not actually in use. (xiii) The inspecting party shall maintain a log of all individuals who have accessed the Source Code Computer. The log shall be made available to the producing party upon reasonable request. The log shall include the name of each person who accessed the Source Code Computer. Such log and any information from it shall be inadmissible in this Investigation except in connection with proceedings before the Court regarding any alleged violations of this Protective Order. (xiv) Unless otherwise agreed in advance by the parties in writing, following each day on which inspection is done under this Order, the receiving party's outside counsel and/or experts shall remove all notes, documents, and all other materials from the Source Code Review Room. (xv) At the end of the above-styled litigation (including any related appeals), any entity receiving source code will certify that: (a) all printed copies of source code have been returned, with the exception of exhibits that were attached to filed pleadings or admitted into evidence; (b) any electronic storage or memory media which may contain source code have been returned, fully reformatted, and/or destroyed; and (c) any access logs maintained by counsel have been archived along with counsel's other records from this litigation. Other than set forth in this subparagraph, counsel may not maintain a file copy of source code material. 19. Prosecution Bar. Absent the written consent of the producing party, any person that receives access to confidential material produced pursuant to this Protective Order shall not be involved in the prosecution of patents or patent applications relating to 5 the subject matter of the patents asserted in this action by the opposing party (including but not limited to any application claiming priority to or otherwise related to the patents asserted in this action), before any foreign or domestic agency, including the United States Patent and Trademark Office. Nevertheless, persons having access to materials produced pursuant to this protective order may have limited involvement in reexamination proceedings pertaining to the patent in suit or other related patents, but in these proceedings they are barred against having any involvement, direct or indirect, in the drafting or amending of patent claims, or the supervising of the drafting or amending of patent claims in connection with any such reexamination proceeding. These prohibitions on patent prosecution shall begin when access to protected material is first received by the affected individual, and shall end one (1) year after the final resolution of this action, including all appeals. This prosecution bar is personal to the person receiving such protected material and shall not be imputed to any other person or entity. 20. No prejudice. Motorola and Apple agree that amending Protective Order No. 1 in this Investigation is without prejudice to Motorola or Apple's rights to propose, request or otherwise move for different provisions relating to source code production or prosecution bar in any other litigation between Motorola and Apple. Said amendments are hereby in effect with the issuance of this order. SO ORDERED. Administrative Law Judge 6 IN THE MATTER OF CERTAIN MOBILE DEVICES~ AND RELATED SOFTWARE THEREOF Inv. No. 337-TA-750 PUBLIC CERTIFICATE OF SERVICE I, Marilyn R. Abbott, hereby certify that the attached ORDER 4 has been served by hand upon, the Commission Investigative Attorney, Benjamin Levi, Esq. and the following parties as indicated on January14, 2011. Marilyn R. Abb Secretary U.S. Internationa Trade Commission 500 E Street, SW, Room l12A Washington, D.C. 20436 ON BEHALF OF COMPLAINANT APPLE INC.: Mark G. Davis, Esq. WElL, GOTSHALL & MANGES LLP. 1300 Eye Street, NW, Ste 900 Washington, DC 20005 ( ) Via Hand Delivery ( )yia Overnight Mail ( ./) Via First Class Mail ( ) Other: _ _ __ ON BEHALF OF RESPONDENTS MOTOROLA, INC. AND MOTOROLA MOBILITY, INC.: Charles F. Schill, Esq. STEPTOE & JOHNSON LLP. 1330 Connecticut Avenue, NW Washington, DC 20036 ( ( ( ( ) Via Hand Delivery ~ia Overnight Mail ) Via First Class Mail ) Other: _ _ __ IN THE MATTER OF CERTAIN MOBILE DEVICES, AND RELATED SOFTWARE THEREOF Inv. No. 337-TA-750 CERTIFICATE OF SERVICE - PAGE 2 PUBLIC MAILING LIST: Heather Hall LEXIS - NEXIS 9443 Springboro Pike Miamisburg, OH 45342 ( ) Via Hand Delivery ( ) Via Overnight Mail ( v)'Via First Class Mail ( ) Other: _ _ __ Kenneth Clair THOMSON WEST 1100 Thirteenth Street, NW, Suite 200 Washington, D.C. 20005 ( ) Via Hand Delivery ( ) Via Overnight Mail ( 0via First Class Mail ( ) Other: _ _ __

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?