Finjan, Inc. v. ESET, LLC et al

Filing 239

ORDER on Discovery Dispute Regarding Interrogatory No. 6 [ECF 215 ]. Signed by Magistrate Judge Bernard G. Skomal on 3/23/2018.(jjg)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 SOUTHERN DISTRICT OF CALIFORNIA 10 11 FINJAN, INC., Case No.: 17CV183 CAB (BGS) Plaintiff, 12 13 v. 14 ORDER ON DISCOVERY DISPUTE REGARDING INTERROGATORY NO. 6 ESET, LLC and ESET SPOL. S.R.O., Defendants. 15 [ECF 215] 16 17 Plaintiff Finjan, Inc. (“Finjan”) seeks to compel further responses to Finjan’s 18 19 Interrogatory No. 6 (“ROG 6”) which seeks ESET, LLC and ESET spol. S.R.O.’s 20 (“ESET”) noninfringement contentions. (Joint Statement on Discovery Issue Relating to 21 ESETs Response to Finjan’s Interrogatory No. 6, ECF 215 at 1-31.) ESET opposes 22 providing any further response. (Id. at 4-6.) For the reasons set forth below, Finjan’s 23 request is GRANTED in part and DENIED in part. 24 25 26 27 28 1 The Court references the CM/ECF pagination. ECF 215 corresponds to the parties’ Joint Statement and ECF 215-1 corresponds to Exhibit A, ESET’s Response to Plaintiff’s Second Set of Interrogatories. 1 17CV183 CAB (BGS) 1 I. BACKGROUND 2 ROG 6 states: 3 Separately for each Asserted Claim of the Asserted Patents, identify all legal and factual bases for your contention that ESET does not infringe such claim, including a chart that identifies each claim element that ESET contends is not satisfied by the Accused Instrumentality(ies) for that claim, and a substantive, particularized description of how and why that element is not satisfied, including citation to specific components and functions of the Accused Instrumentality(ies) and all documents and things in support of your position, including source code modules. 4 5 6 7 8 (ECF No. 215-1 at 8.) 9 10 ESET responded without waiving its general and specific objections. (ECF No. 11 215-1 at 8.) As to each patent-in-suit it provided a chart which listed in italics the 12 limitations the accused instrumentalities do not infringe. (Id. at 10-20.) As to some of 13 the patents-in-suit ESET also provided a brief explanation as to how the products do not 14 infringe the asserted claims. For example, “it does not practice the claimed methods” 15 (ECF 215-1 at 11, 15); “its products only function downstream of the web server” (id. at 16 11); “[it] does not provide ‘memory storing a first rule set’” (id.); “it does not provide the 17 ‘network interface’ component of the system” (id. at 14); “its products do not modify 18 Downloadables to append any information to the end of the Downloadable, nor do any of 19 the products generate a Downloadable Security Profile” (id. at 16); “it does not supply at 20 least the ‘processor,’ ‘memory,’ ‘operating system probes,’ or ‘interrupter.” (Id. at 18.) 21 II. 22 DISCUSSION Finjan argues that ESET’s response is insufficient. As to ESET’s chart, Finjan 23 seeks explanation why any element is not met since Finjan’s infringement contentions 24 explain how that element is in fact met. (ECF No. 215 at 2.) Finjan cites to various 25 districts’ local patent rules and decisions applying them that require detailed explanations 26 in support of noninfringement contentions. (Id. at 3 nn. 1-4.) As to the additional 27 descriptions ESET set forth as to some of the patents-in-suit, (detailed above), Finjan 28 complains that ESET does not tie these short descriptions to claim elements nor does 2 17CV183 CAB (BGS) 1 ESET provide any support for its position. (Id.) Finjan claims prejudice for this 2 conclusory response in that it is not on fair notice of ESET’s noninfringement 3 contentions, and it cannot focus its discovery efforts and develop its case. (Id. at 4.) 4 ESET argues the ROG goes beyond the permitted 25 interrogatories, is premature, 5 and overly burdensome. (ECF No. 215 at 5.) Further, it asserts that its response is 6 sufficient, identifying the specific elements missing from the claims, and has explained 7 why those elements are missing. (Id.) ESET contends it cannot prove a negative. (Id. at 8 It is not possible for it to identify specific source code and documents to prove what 9 ESET’s code does not do. (Id. at 7.) 10 A. 11 In general, the Federal Rules of Civil Procedure provide that “parties may obtain Legal Standards 12 discovery regarding any non-privileged matter that is relevant to any party’s claim or 13 defense and proportional to the needs of the case.” Fed. R. Civ. P. 26(b)(1). District 14 courts have broad discretion in determining what is relevant regarding discovery. 15 Facedouble, Inc. v. Face.com, No. 12cv1584 DMS (MDD), 2014 WL 585868, at *1 16 (S.D. Cal. Feb. 13, 2014). Limits on discovery may be issued where the “burden or 17 expense outweighs the likely benefits.” Id. (citing Fed. R. Civ. P. 26(b)). 18 “An interrogatory may relate to any matter that may be inquired into under Rule 19 26(b).” Fed. R. Civ. P. 33(a)(2). Furthermore, “[e]ach interrogatory must, to the extent it 20 is not objected to, be answered separately and fully in writing under oath.” Rule 21 33(b)(3). In certain circumstances the responding party has the option to answer the 22 interrogatory by specifying responsive records and making those available to the 23 interrogating party. Rule 33(d). 24 Contention interrogatories are distinct from interrogatories seeking the 25 identification of witnesses or documents related to allegations. In re Grand Casinos Inc. 26 Sec. Litig., 181 F.R.D. 615, 618 (D. Minn. 1998). Contention interrogatories may ask 27 another party to state all the facts on which it bases its contentions. Id. Further, a 28 contention interrogatory is appropriate during the early phases of discovery where 3 17CV183 CAB (BGS) 1 answering them would “‘contribute meaningfully’ to (1) clarifying the issues of the case; 2 (2) narrowing the scope of the dispute; (3) setting up early settlement discussion; or (4) 3 exposing a substantial basis for a motion under Rule 11 or Rule 56.” HTC Corp. v. Tech. 4 Props. Ltd., No. C08-00882, 2011 WL 97787, at *2 (N.D. Cal. Jan. 12, 2011) (quoting In 5 re Convergent Techs. Sec.Litig., 108 F.R.D. 328, 338-39 (N.D. Cal. 1985)). “A non- 6 infringement contention interrogatory is appropriate where plaintiff has provided its 7 infringement contentions with corresponding claim charts, thereby allowing defendant to 8 respond.” Audatex N. Am. Inc. v. Mitchell Int’l, Inc., No. 13cv1523 BEN (BLM), 2014 9 WL 4961437, at *3 (S.D. Cal. Oct. 3, 2014); see also Facedouble, Inc. 2014 WL 585868, 10 11 at *2. B. 12 13 Analysis 1. Waiver of Objections In its response to ROG 6, ESET objected generally and specifically, alleging in 14 part that it was premature and well beyond the twenty-five limit for interrogatories. (ECF 15 No. 215-1 at 8-9.) However, ESET then responded “subject to and without waiving” 16 these objections. (Id. at 9.) This language is typically referred to as a conditional 17 response. 18 Written responses to requests for production of documents must be unconditional, 19 and may not reserve the right to raise objections in the future. Language such as “without 20 waiving objections” preserves nothing. Consumer Elecs. Ass’n v. Compras and Buys 21 Magazine, Inc., No. 08-21085-CIV, 2008 WL 4327253, at *3 (S.D. Fl. Sept. 18, 2008). 22 Objections preceding such language are deemed waived, and the response to the 23 discovery request stands. Estridge v. Target Corp., No. 11-61490-CIV, 2012 WL 24 527051, at *2 (S.D. Fla. Feb. 16, 2012). Notwithstanding, if the response puts the 25 requesting party on notice that the responding party is withholding certain documents, 26 that objection is preserved so long as the requesting party is not left guessing as to what 27 documents are being withheld. Sprint Commc’ns Co., v. Comcast Cable Commc’ns, 28 LLC, Nos 11-2684, 2685, 2686 –JWL, 2014 WL 1569963, at *3 (D. Kan. April 18, 4 17CV183 CAB (BGS) 1 2014). In such a case the objection is not waived. Instead, the proper procedure is to 2 challenge the objection by bringing a motion to compel and requiring the responding 3 party to defend the merits of its response. 4 The Court finds that ESET’s objections based on prematurity and excessive 5 interrogatories waived. However, it finds ESET’s response to ROG 6 has preserved its 6 objections as to overly broad and unduly burdensome. 7 8 9 2. Whether the Scope of Interrogatory 6 is Overly Broad and Burdensome; and Whether Supplemental Responses are Necessary As an initial matter, the Court notes that ROG 6 asks ESET to “identify all 10 legal and factual bases,” as well as citations to all documents and things in 11 support” of its position. (ECF 215-1 at 8 (emphasis added).) The Court finds this 12 request is overly broad and unduly burdensome. An interrogatory may reasonably 13 ask for the material and principal facts which support a contention. However, to 14 require all facts, applications of law, all documents and things “would too often 15 require a laborious, time consuming analysis.” IBP, Inc. v. Mercantile Bank of 16 Topeka, 179 F.R.D. 316, 321 (D. Kan. 1998). The burden to answer then 17 outweighs its benefit. Id. The request’s excessively burdensome nature becomes 18 especially clear when considering Finjan’s stated purpose for asking it: to be given 19 fair notice of ESET’s noninfringement contentions and to be able to focus its 20 discovery efforts. (ECF No. 215 at 4.) Satisfying these purposes does not 21 however, require ESET to reply with the entire body of legal and factual evidence 22 in its possession. Therefore, the Court narrows this interrogatory to require ESET 23 to state the principal and material factual and legal bases for asserting its non- 24 infringement contentions, including identifying the principal and material evidence 25 upon which it relies. See e.g. High Point SARL v. Sprint Nextel Corp., No. 09- 26 2269, 2011 WL 197875, at *2 (D. Kan. Jan. 20, 2011) (citing Anderson v. UPS, 27 Inc., No. 09-2526, 2010 WL 4822564, at *6 (D. Kan. Nov. 22, 2010)). 28 5 17CV183 CAB (BGS) 1 Applying this narrower interrogatory to ESET’s response to ROG 6, the 2 Court find ESET needs to supplement its response. ESET’s chart lists the elements 3 missing from the accused instrumentalities without further explanation as to how 4 they do not infringe the particular element. Various jurisdictions have found that a 5 “recit[ation of the] various claim terms and . . . unexplained denials of 6 infringement” is not a sufficient response to a non-infringement contention. G. 7 Vincent, Ltd. v. Dux Area, Inc., No. C09-383, 2009 WL 5125387, at *1 (W.D. 8 Wash. Dec. 18, 2009); see also Emcore Corp. v. Optimum Corp., No. 06-1202, 9 2007 WL 852557, at *2 (W.D. Pa. Mar. 16, 2007). The Court concurs with these 10 courts, and finds that ESET’s merely listing the missing elements is not an 11 adequate response. 12 ESET asserts that its chart explains why the elements are not present in the 13 Accused Instrumentalities by listing the missing elements in italics. (ECF No. 215 14 at 5.) ESET contends that Finjan’s request does not ask ESET to explain why any 15 element is not met, based on Finjan’s infringement contentions. (Id. n.5.) 16 Interrogatory Number 6 states: 17 Separately for each Asserted Claim of the Asserted Patents, identify all legal and factual bases for your contention that ESET does not infringe such claim, including a chart that identifies each claim element that ESET contends is not satisfied by the Accused Instrumentality(ies) for that claim, and a substantive, particularized description of how and why that element is not satisfied, including citation to specific components and functions of the Accused Instrumentality(ies) and all documents and things in support of your position, including source code modules. 18 19 20 21 22 23 (ECF No. 215-1 at 8 (emphasis added).) 24 It is clear that ROG 6 is requesting ESET to answer “how” and “why” each 25 element is not satisfied. And the Court’s narrowing of the interrogatory does not modify 26 ESET’s obligation to respond accordingly. 27 ESET asserts that “Finjan’s contention interrogatory seeks the impossible by 28 asking ESET to prove a negative.” (ECF No. 215 at 5.) ESET argues that Finjan is 6 17CV183 CAB (BGS) 1 seeking proof of “where in the ESET documents and source code the missing elements 2 are not described.” (ECF No. 215 at 5.) Finjan argues it is not asking ESET to prove a 3 negative, but rather to explain why any element is not met based on Finjan’s infringement 4 contentions showing how that element is in fact met. (Id. at 4.) Accordingly, the Court 5 finds that to the extent that Finjan has in fact shown how that element is met, ESET is to 6 supplement its chart in accordance with this order by stating the principal and material 7 factual and legal bases for asserting its non-infringement contentions, including 8 identifying the principal and material evidence upon which it relies. 9 As regards source code, pursuant to Audatex, if a party seeks to support its non- 10 infringement arguments with source code, it must “provide citations to the appropriate 11 sections of the code.” Audatex, 2014 WL 4961437, at *4. Such citations are used as a 12 guide for the opposing party, and could be in the form of a narrative, index, or table of 13 contents, etc. Facedouble, Inc. 2014 WL 585868, at *2. Therefore, if any of ESET’s 14 non-infringement arguments are supported by certain aspects of its source code, it must 15 provide citations to the appropriate sections thereof. If, on the other hand, ESET does not 16 intend to rely on its source code to argue noninfringement, it should so state in its 17 supplemental response. ESET also claims that it has satisfied Finjan’s request by incorporating Section 1.A 18 19 of its Invalidity Contentions which provides explanations as to how it does not infringe. 20 (ECF No. 215 at 6.) ESET also points to its particularized descriptions of how and why 21 the elements are not satisfied.2 (Id. at 5.) Finjan in turn argues that these purported 22 23 2 24 25 26 27 28 ESET has asserted numerous reasons for non-infringement, including: invalidity (ECF No. 215-1 at 10, 12, 13, 14, 17, & 18); “it does not practice the claimed methods” (id. at 11 & 15); “its products only function downstream of the web server” (id. at 11); “[it] does not provide ‘memory storing a first rule set’” (id.); “it does not provide the ‘network interface’ component of the system” (id. at 14); “its products do not modify Downloadables to append any information to the end of the Downloadable, nor do any of the products generate a Downloadable Security Profile” (id. at 16); “it does not supply at least the ‘processor,’ ‘memory,’ ‘operating system probes,’ or ‘interrupter” (id. at 18.) 7 17CV183 CAB (BGS) 1 “descriptions” do no more than briefly state for certain patents (but not all) that its 2 products do not perform certain functions without tying these statements to claim 3 elements or providing any support. (Id. at 2.) Pursuant to this Order, the Court makes no determination as to whether ESET’s 4 5 incorporation of Section 1.A of its Invalidity Contentions as well as its particularized 6 descriptions satisfactorily fill in the missing information in ESET’s chart. The Court 7 concurs that “[i]t is not the role of the judge to state what constitutes specific reasons and 8 relevant distinctions. Rather, it is my role to determine if [Defendant] has complied with 9 the spirit of the rule.” Emcore Corp. v. Optimum Corp., No. 06-1202, 2007 WL 852557, 10 at *2 (W.D. Pa. Mar. 16, 2007). ESET will have to supplement its chart so that it 11 complies with this Court’s order. 12 III. CONCLUSION 13 Therefore, for the reasons stated above, the Court grants Finjan’s request in part, 14 and orders ESET to supplement their response to Plaintiff’s Interrogatory Number 6 in 15 accordance with this Order. 16 17 IT IS SO ORDERED. Dated: March 23, 2018 18 19 20 21 22 23 24 25 26 27 28 8 17CV183 CAB (BGS)

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?