Finjan, Inc. v. ESET, LLC et al
Filing
272
ORDER Denying Finjan's Motion to Compel ESET to Supplement their Response to Interrogatory No. 7 [ECF 231 ]. Signed by Magistrate Judge Bernard G. Skomal on 6/13/2018. (jjg)
1
2
3
4
5
6
UNITED STATES DISTRICT COURT
7
SOUTHERN DISTRICT OF CALIFORNIA
8
9
FINJAN, INC.,
Case No.: 17CV183 CAB (BGS)
Plaintiff,
10
11
v.
12
ORDER DENYING FINJAN’S
MOTION TO COMPEL ESET TO
SUPPLEMENT THEIR RESPONSE
TO INTERROGATORY NO. 7
ESET, LLC and ESET SPOL. S.R.O.,
13
Defendants.
14
[ECF 231]
15
16
17
Finjan, Inc. moves to compel ESET to supplement its response to Finjan’s
18
Interrogatory No. 7, (ECF 231), which asks ESET to identify the directories and
19
subdirectories of ESET’s produced source code corresponding to each of ESET’s accused
20
products. (Motion to Compel ESET to Supplement Their Response to Interrogatory No.
21
7 (“Mot.”) at 2.) ESET opposes providing any further response, arguing it has already
22
provided a sufficient explanation how to obtain this information in its initial and amended
23
interrogatory responses. (Opposition to Finjan’s Motion to Compel (“Opp’n”) [ECF
24
235].) For the reasons set forth below, Finjan’s motion is DENIED.
25
26
LEGAL STANDARDS
In general, the Federal Rules of Civil Procedure provide that “parties may obtain
27
discovery regarding any non-privileged matter that is relevant to any party’s claim or
28
defense and proportional to the needs of the case.” Fed. R. Civ. P. 26(b)(1). District
1
17CV183 CAB (BGS)
1
courts have broad discretion in permitting or denying discovery. Hallett v. Morgan, 296
2
F.3d 732, 751 (9th Cir. 2002); see also Facedouble, Inc. v. Face.com, No. 12cv1584
3
DMS (MDD), 2014 WL 585868, at *1 (S.D. Cal. Feb. 13, 2014).
Federal Rule of Civil Procedure 33 authorizes the use of interrogatories. “An
4
5
interrogatory may relate to any matter that may be inquired into under Rule 26(b).” Fed.
6
R. Civ. P. 33(a)(2). Furthermore, “[e]ach interrogatory must, to the extent it is not
7
objected to, be answered separately and fully in writing under oath.” Rule 33(b)(3).
8
9
10
DISCUSSION
I.
Parties’ Arguments
Finjan’s Interrogatory No. 7 states:
11
For the source code that You produced or made available for inspection or
will produce and make available for inspection, identify the products that
correspond to the source code including the name and version number of
each product, the directories and subdirectories of the source code
corresponding to each of the products, the last date the source code was
modified for each of the products, and which portion, if any, of the code You
contend is prior art to the Asserted Patents. (Mot. at 2 (emphasis added by
Finjan))
12
13
14
15
16
17
Finjan believes ESET should be required to produce a table identifying which of
18
the subdirectories1 located on the source code computers under three named directories
19
correspond2 to each of the accused products. Finjan characterizes ESET’s current
20
21
22
23
24
25
26
27
28
1
There are many subdirectories under three directories that are at issue in this motion. A
fourth directory is apparently not at issue because ESET has already identified which
subdirectories in that directory correspond to the accused products. (Mot. at 4, n. 1.)
2
The Court notes that what Finjan means by “correspond” in asking for “the directories
and subdirectories of the source code corresponding to each of the products” is vague and
unclear. Arguably, explaining that all of the products use a common set of modules in
the modules subdirectory and all products are capable of running them tells Finjan that all
those subdirectories “correspond” to each of the products. ESET’s answer, seemingly
understanding what Finjan is actually seeking, attempts to explain under what
circumstances the modules will actually run.
2
17CV183 CAB (BGS)
1
responses as evasive and incomplete. More specifically, Finjan argues ESET’s
2
instructions on how to determine which subdirectories correspond to each product are
3
vague because they require Finjan to identify the major version number and then compare
4
it to a non-exhaustive list of exceptions and account for certain carve outs under which
5
portions of a module may be skipped. Finjan also takes issue with the vagueness of
6
ESET’s statement that “just because a module is loaded by a product does not mean the
7
module will ever be executed.” Additionally, Finjan argues that ESET’s direction that
8
“for any specific product, the exact list of modules the product loads can be determined
9
by searching for files whose filenames are ‘emxxx.dat’ or ‘emxxx.dll’ where the xxx is a
10
three-digit number” is insufficient because it is not clear how this information relates to
11
prior instructions and ESET’s response does not indicate what three-digit number should
12
be used to perform this search.3
13
ESET argues it has sufficiently responded to Interrogatory No. 7 by providing an
14
explanation how and when its modules are loaded by different accused products.4 In
15
short, ESET explains in its brief that it does not makes sense to identify what modules
16
correspond to products in a table because its modules are plug-and-play components used
17
in multiple accused products that run under certain circumstances, i.e. version number,
18
version of the Accused Instrumentality, platform. ESET argues its responses to
19
Interrogatory No. 7 provide a narrative explaining how to map each module with the
20
Accused Instrumentalities accounting for these factors. More specifically, ESET
21
emphasizes that its response explains that all the modules in a specified subdirectory are
22
23
3
24
25
26
27
28
Finjan additionally argues that even if it had the three-digit number, it could not perform
the search because the source code had not been fully indexed. Regardless of whose fault
that is, ESET’s Opposition indicates it is now fully indexed. (Opp’n at 9.)
4
ESET provided both a First Response and Amended Response. (Mot., Ex. A (first); Ex.
B (amended).) The First Response provided the instructions or mapping discussed in the
parties’ arguments and the Amended Response adds a table consisting of the Accused
Instrumentalities in one column and a corresponding Directory on Source Code
Computer in a second column.
3
17CV183 CAB (BGS)
1
capable of running with all versions of the Accused Instrumentalities with a major
2
version number greater than 3. ESET’s brief also expands on what a major version
3
number is and how to search for it. As to Finjan’s complaint that it is not clear what is
4
meant in stating that some portions of modules will be skipped, ESET notes that its
5
response explains that “some modules, as shown in the source code for those modules,
6
have certain functionality that may be skipped unless the product meets a certain required
7
minimum version number.” Again, in its brief, ESET expands upon this to explain that
8
when new functionality is added to newer versions of modules, only newer versions of
9
the Accused Instrumentalities can take advantage of the new functionality. As to the next
10
exception Finjan criticizes — “just because a module is loaded by a product does not
11
mean the module will ever be executed” — ESET provides, as an example when a
12
module might not be executed, when the end user chooses to disable a feature of the
13
Accused Instrumentality. And, as to the exceptions listed as to numerous modules, ESET
14
argues Finjan should be able to understand that certain modules only load with version
15
numbers at a certain number or higher and on certain platforms and follow that
16
explanation to determine when the modules are loaded by the Accused Instrumentalities.
17
ESET also argues that its instruction regarding searching for ‘emxxx.dat’ or ‘emxxx.dll’
18
files where the xxx is a three-digit number is a specific way for Finjan to confirm which
19
modules were loaded in any specific version of the Accused Instrumentalities. And, the
20
three digit number can be found in the source code. Finally, as to LiveGrid, ESET
21
explains that it features are separate and apart from any Accused Instrumentalities and it
22
is not possible for ESET, or anyone, to map it to the Accused Instrumentalities.
23
As to the burden on each party in following ESET’s road map, Finjan wants ESET
24
to do the work and create a table. Finjan argues that this should impose very little burden
25
on ESET because it has unfettered access to its source code and would be a great burden
26
on Finjan because it is only allowed to manually take notes when reviewing ESET’s
27
source code. ESET argues that it would take ESET as much time as Finjan to follow
28
ESET’s instructions to generate the mapping Finjan seeks and would require ESET to
4
17CV183 CAB (BGS)
1
divert its engineers from their real work for ESET, essentially functioning as Finjan’s
2
experts. Additionally, ESET explains that the table that Finjan demands would not be
3
accurate or even makes sense to create because only certain portions of modules may be
4
executed with certain versions of the Accused Instrumentalities and the same module
5
may have segments of code that are restricted to different versions of Accused
6
Instrumentalities. And, finally, ESET argues there is no basis for Finjan to rely on
7
protective order restrictions — manually taking notes when reviewing source code — to
8
argue the burden on it is greater than it would be for ESET.
9
II.
10
Analysis
The only case either party relies on in their briefing is Facedouble, Inc. v.
11
Face.com. 2014 WL 585868. The Facedouble court required a defendant to “provide a
12
guide or road map to its source code” to the plaintiff in response to an interrogatory
13
asking the defendant to describe the steps of its technology. Id. at *2. The defendant’s
14
initial response relied on Rule 33(d) and only provided its source code. Id.
15
Finjan relies on Facedouble to argue ESET must identify the source code
16
corresponding to the accused products to provide a road map to the source code. (Mot. at
17
3.) ESET argues it has already done what the Facedouble court required by providing
18
instructions for mapping the Accused Instrumentalities to specific directories and
19
explaining how the code is structured. (Opp’n at 6-7.) This, ESET argues, allows Finjan
20
to identify which modules correspond with the Accused Instrumentalities. (Id. at 7.)
21
The Court agrees that Facedouble is not exactly on point because Interrogatory No.
22
7 is not seeking an explanation how ESET’s products work or operate, but rather a table
23
mapping subdirectories to particular products. 2014 WL 585868, *2 (“interrogatory asks
24
Defendant to describe, in narrative form, the steps by which the accused technology
25
provides facial recognition”); see also Audatex N. Am. Inc. v. Mitchell Int’l, Inc., No.
26
13CV1523 BEN (BLM), 2014 WL 4961437, at *6 (interrogatory requested identification
27
“of documents, including relevant source code excerpts, that describe the operation of
28
certain identified features and functionalities of the accused products.”) However, as
5
17CV183 CAB (BGS)
1
Finjan argues elsewhere in its brief, Finjan does need to understand ESET’s source code
2
to understand ESET’s products’ functionality.
3
ESET has provided significantly more than the defendant in Facedouble. The
4
defendant in Facedouble simply provided its source code. Facedouble, 2014 WL
5
585868, *2; see also Laserdynamics, Inc. v. Asus Computer Int’l., 2009 WL 153161, at
6
*2 (E.D. Tex. Jan. 21, 2009) (reliance on source code citations without narrative
7
description of functionality insufficient in response to interrogatory on functionality of
8
product). ESET has provided more than the defendant in Audatex. In Audatex, the
9
defendant provided the source code with files and file names in a system of folders with
10
names and some narrative responses describing the operation of the accused software, but
11
did not explain how the source code performed certain features and functions. Here,
12
ESET has provided its source code and a detailed explanation of the source code’s
13
organization and structure with directories and subdirectories. And critically, it has gone
14
many steps further by explaining when the Accused Instrumentalities will and will not
15
run the modules.
16
Based on the briefing, Finjan did not even attempt to follow the road map ESET
17
provided, but instead looked at it, found it was not in the simplified table format Finjan
18
preferred and demanded ESET do the work to create a table. The Court is not going to
19
require ESET to go that far. ESET is not required to provide more than the road map
20
already provided. The explanation provided sufficiently answers Finjan’s Interrogatory
21
No. 7. And specifically, as to LiveGrid, Finjan has not explained why it is entitled to a
22
road map of LiveGrid features when its components are not part of the Accused
23
Instrumentalities.
24
25
26
CONCLUSION
Finjan’s Motion to Compel is DENIED.
Dated: June 13, 2018
27
28
6
17CV183 CAB (BGS)
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?