Gamboa v. Apple Inc.

Filing 42

ORDER by Magistrate Judge Virginia K. DeMarchi re 35 Dispute Regarding Proposed Protective Order. (vkdlc2, COURT STAFF) (Filed on 11/26/2024)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 SAN JOSE DIVISION 7 8 JULIANNA FELIX GAMBOA, et al., Plaintiffs, 9 10 United States District Court Northern District of California 11 Case No. 24-cv-01270-EKL (VKD) ORDER RE DISPUTE REGARDING PROPOSED PROTECTIVE ORDER v. Re: Dkt. No. 35 APPLE INC., Defendant. 12 13 14 Plaintiffs Julianna Felix Gamboa and Thomas Dorobiala (“plaintiffs”) and defendant 15 Apple Inc. (“Apple”) have agreed to request entry of a two-tier protective order that provides for 16 the exchange of discovery material designated “Confidential” or “Highly Confidential – 17 Attorneys’ Eyes Only” (“HC-AEO”). Dkt. No. 35-1 at 9, 11; Dkt. No. 35-4 at 8, 10. They ask the 18 Court to resolve their disputes regarding certain provisions in the proposed order. Dkt. No. 35. 19 The Court finds this matter suitable for resolution without oral argument. Civil L.R. 7-1(b). 20 21 The Court addresses each disputed provision below. 1. Data Security Protocols (sec. 11(a)) 22 In section 11 of the proposed protective order, the parties agree that they should be 23 required to “implement an information security management system (“ISMS”) to safeguard 24 Protected Materials, including reasonable and appropriate administrative, physical, and technical 25 safeguards, and network security and encryption technologies governed by written policies and 26 procedures.” Dkt. No. 35-1 at 14; Dkt. No. 35-4 at 12-13. They disagree about whether 27 compliance with one or more specific, standard protocols should be required. 28 Citing a recent increase in cyberattacks against law firms and other litigation participants, United States District Court Northern District of California 1 Apple argues that the Court should adopt a provision that requires the parties to comply “with at 2 least one of the then-current versions of the following standards: (a) the International Organization 3 for Standardization’s 27001 standard; (b) the National Institute of Standards and Technology’s 4 (NIST) 800-53 standard; (c) the Center for Internet Security’s Critical Security Controls; or (d) the 5 most recently published version of another widely recognized industry or government 6 cybersecurity framework.” Dkt. No. 35-4 (sec. 11(a)). Plaintiffs argue that the protections Apple 7 advocates are unnecessary and onerous, given the nature of the case and the documents and 8 information likely to be exchanged in discovery, and they propose instead a modified version of 9 the existing provisions in the District’s model protective order. See Dkt. No. 35-1 (sec. 11(a), (b)). 10 In this action, plaintiffs allege that Apple has engaged in anticompetitive conduct by 11 requiring consumers who use Apple mobile devices to use iCloud to back up and store certain 12 files, and by monopolizing (and attempting to monopolize) the market for “full-service” cloud 13 storage on Apple mobile devices. See Dkt. No. 24 ¶¶ 9-12. Apple focuses on the need to 14 “preserve the security of consumer and confidential business data.” Dkt. No. 35 at 5; see also id. 15 at 10-11. However, the Court anticipates that little, if any, user-specific or personally identifiable 16 information, will be produced in discovery, and that any relevant consumer data can be provided 17 in anonymized and/or aggregate form. Similarly, the business data subject to discovery is likely to 18 be no different here than in any other antitrust case. Apple does not identify any specific 19 discovery material that is particularly sensitive or particularly vulnerable; indeed, Apple’s 20 proposed provision would apply to all Protected Materials, whether designated “HC-AEO” or 21 “Confidential.” 22 As Apple has not demonstrated that compliance with one or more of the strict, standard 23 protocols listed in its proposed provision is necessary here, the Court adopts plaintiffs’ proposal: 24 Receiving Party shall implement an information security management system (“ISMS”) to safeguard Protected Materials, including reasonable and appropriate administrative, physical, and technical safeguards, and network security and encryption technologies governed by written policies and procedures designed to protect against any reasonably anticipated threats or hazards to the security of such Protected Material and to protect against unauthorized access to Protected Material. To the extent a party or 2 25 26 27 28 1 2 person does not have an ISMS, they may comply with this provision by having the Protected Material managed by and/or stored with eDiscovery vendors, claims administrators, or other platforms that maintain such an ISMS. 3 4 5 6 2. Multi-Factor Authentication (sec. 11(a)) The parties agree that multi-factor authentication and encryption should be used to prevent 7 unauthorized access to Protected Materials. They appear to disagree regarding the particular 8 implementation of multi-factor authentication, although the nature of that disagreement is 9 somewhat unclear. 10 The Court adopts Apple’s proposal, with one modification (in italics): 15 The Parties shall implement multi-factor authentication for any access to Protected Materials. At a minimum, multi-factor authentication must be implemented on a device-specific basis but need not be implemented on a document-specific basis. The parties shall implement encryption of all Protected Materials (i) in transit outside of network(s) covered by the Party’s ISMS (except as necessary to submit documents to the court in accordance with Section 13 below) and (ii) at rest where reasonably practical. 16 To the extent Apple advocates for a document-specific multi-factor authentication requirement, 17 the Court rejects that requirement as unduly burdensome and unnecessary, in view of the 18 considerations discussed above. 19 3. 11 United States District Court Northern District of California Dkt. No. 35-1 (sec. 11(a)). 12 13 14 20 Data Breach Remediation (sec. 11(b)-(f)) The parties agree that the protective order should include section 16, a provision governing 21 inadvertent or unauthorized disclosure of any “Discovery Material” (i.e. any discovery material 22 produced in the case, and not just “Protected Material”). See Dkt. No. 35-1 (sec. 16); Dkt. No. 35- 23 4 (sec. 16). Section 16 requires a party to (1) “immediately notify” a producing party of the 24 disclosure, (2) provide “all known relevant information concerning the nature and circumstances 25 of the disclosure,” and (3) “promptly take all reasonable measure to retrieve the improperly 26 disclosed Discovery Material and to ensure that no further or greater unauthorized disclosure 27 and/or use thereof is made.” Id. 28 Separately, as part of section 11, the parties describe more rigorous procedures that would 3 United States District Court Northern District of California 1 apply to Protected Material only. They disagree about the circumstances in which such 2 procedures must be used, and about some of the specific procedures. Apple argues that “any 3 unauthorized access, use, or disclosure of Protected Materials or devices containing Protected 4 Materials” should be considered a “Data Breach,” and that Apple’s more rigorous procedures 5 should apply. Dkt. No. 35 at 9; Dkt. No. 35-4 (sec. 11(b)). Plaintiffs argue that the requirements 6 of section 16 are sufficient to address accidental or harmless unauthorized disclosures and that 7 plaintiffs’ more rigorous procedures should apply only in the event of a “cyberattack or other 8 deliberate security breach resulting in actual or potential unauthorized access to Protected 9 Materials.” Dkt. No. 35 at 5; Dkt. No. 35-1 (sec. 11(b)). 10 The Court agrees with plaintiffs that, as a general matter, the provisions of section 16 are 11 sufficient to protect a party’s interests in the event of an inadvertent or unauthorized disclosure of 12 Protected Material. However, those provisions may not be sufficient in the event of a deliberate 13 security breach, where immediate action, additional investigation, and more rigorous remediation 14 measures may be necessary. Thus, the Court adopts plaintiffs’ proposal as reflected in sections 15 11(b)-(f), as that proposal appropriately distinguishes between these circumstances. *** 16 17 The parties shall file a proposed protective order that conforms to the Court’s decision of 18 the disputed issues presented. In addition, the parties are advised that any discovery disputes, 19 including challenges to designations of Protected Material, are subject to the Court’s discovery 20 dispute procedures described in Judge DeMarchi’s Standing Order for Civil Cases, available at 21 https://cand.uscourts.gov/standing-order-for-civil-cases-april-2024/. The parties’ proposed 22 protective order should so state. 23 IT IS SO ORDERED. 24 Dated: November 26, 2024 25 26 Virginia K. DeMarchi United States Magistrate Judge 27 28 4

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?