Finjan, Inc. v. ESET, LLC et al
Filing
457
Order Regarding Protective Order ( 292 ). Signed by Magistrate Judge Bernard G. Skomal on 3/29/19.(dlg)
1
2
3
4
UNITED STATES DISTRICT COURT
5
SOUTHERN DISTRICT OF CALIFORNIA
6
7
FINJAN, INC.,
Plaintiff,
8
9
10
Case No.: 17CV183 CAB (BGS)
ORDER REGARDING
PROTECTIVE ORDER
VIOLATIONS
v.
ESET, LLC and ESET SPOL. S.R.O.,
Defendants.
11
[ECF 292]
12
This dispute concerns alleged violations of the parties’ stipulated Protective Order
13
14
by counsel for Finjan, Mr. Lee. (ECF 292.) In reviewing Eset’s source code, Mr. Lee
15
compiled directory information from the source code computer into a 40-page document
16
that he then produced to a witness during a deposition without any confidentiality
17
designation on the document. (Id.) As explained more fully below, the Court finds Mr.
18
Lee did violate the Protective Order in copying and compiling the directory structure of
19
Eset’s source code from the source code computer. However, the level of sanctions Eset
20
requests are not warranted.
BACKGROUND
21
22
This dispute arose when Finjan’s counsel, Mr. Lee presented a deposition witness
23
with a 40-page document listing the directory structure1 of Eset’s source code (“Exhibit
24
25
26
27
28
The Court refers to the listing Mr. Lee created as “directory structure” or “directories
and subdirectories,” based on the Court’s own review of the document. While it may
contain folder names, as Finjan now refers to them, in earlier filings with the Court,
discussed below, Finjan also described them as directories and subdirectories.
1
1
17CV183 CAB (BGS)
1
3”). The document lacked any confidentiality designation. During a call with the Court
2
regarding this issue, Mr. Lee indicated he had taken notes about the source code on his
3
laptop while reviewing the source code on the source code computer and that the 40-page
4
document presented to the witness was accessible on Finjan’s counsel’s computer
5
network.
6
By prior order, the Court addressed the more immediate dispute as to whether Mr.
7
Lee should be precluded from accessing Eset’s source code based on these possible
8
violations and how to proceed going forward with review of Eset’s source code. (ECF
9
306.) The Court found he could have access to the source code computer subject to
10
certain limitations, including that he treat the directories, subdirectories, and file paths of
11
the source code as he would treat source code with all the limitations imposed by a
12
“HIGHLY CONFIDENTIAL – SOURCE CODE” designation and that he not take notes
13
“onto any recordable media or recordable device” that could constitute “copy[ing],
14
remov[ing], or otherwise transfer[ring] any portion of the source code” or the directories,
15
subdirectories, or file paths as set forth in §9(c) of the Protective Order. (Id.) The Court
16
also imposed these same limitations on anyone else accessing the source code because of
17
the ongoing need for other individuals to also have access to the source code. (Id.)
18
DISCUSSION
19
Eset asserts numerous violations of the Protective Order under a number of
20
different sections. The relevant sections are summarized here in the order they appear in
21
the Protective Order. A summary of the parties’ positions on their application and the
22
Court’s analysis follow.
23
I.
Protective Order
24
Section 2 of the Protective Order is the Definitions section. Section 2.9 is titled
25
“‘HIGHLY CONFIDENTIAL – SOURCE CODE’ Information or Items” and defines
26
HIGHLY CONFIDENTIAL – SOURCE CODE as:
27
28
extremely sensitive “Confidential Information or items” representing
computer code and associated comments and revision histories, formulas,
2
17CV183 CAB (BGS)
1
2
3
4
engineering specifications, or schematics that define or otherwise describe
in detail the algorithms or structure of software or hardware designs,
disclosure of which to another Party or Non-Party would create a
substantial risk of serious harm that could not be avoided by less restrictive
means.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Section 5 addresses designation of protected material. Section 5.2(a), addresses
information in a documentary form (paper or electronic). The first paragraph of the
section requires a producing party to “affix the legend ‘CONFIDENTIAL OR HIGHLY
CONFIDENTIAL – ATTORNEYS’ EYES ONLY’ or ‘HIGHLY CONFIDENTIAL –
SOURCE CODE’ to each page that contains protected material.” The second paragraph
of § 5.2(a) indicates that:
A Party or Non-Party that makes original documents or materials available
for inspection need not designate them for protection until after the
inspecting Party has indicated which material it would like copied and
produced. During the inspection and before the designation, all of the
material made available for inspection shall be deemed “HIGHLY
CONFIDENTIAL – ATTORNEYS’ EYES ONLY.” After the inspecting
Party has identified the documents it wants copied and produced, the
Producing Party must determine which documents, or portions thereof,
qualify for protection under this Order. Then, before producing the
specified documents, the Producing Party must affix the appropriate legend
(“CONFIDENTIAL” or “HIGHLY CONFIDENTIAL – ATTORNEYS’
EYES ONLY” or “HIGHLY CONFIDENTIAL – SOURCE CODE) to each
page that contains Protected Material.
Section 5.2(c) requires “for information produced in some form other than
documentary and for any tangible items, that the Producing Party affix in a prominent
place on the exterior of the container or containers in which the information or item is
24
stored the legend ‘CONFIDENTIAL’ or ‘HIGHLY CONFIDENTIAL – ATTORNEYS’
25
EYES ONLY’ or ‘HIGHLY CONFIDENTIAL – SOURCE CODE.’”
26
27
Section 6 of the Protective Order provides a detailed process to challenge a
confidentiality designation, including the timing of a challenge (§ 6.1), a meet and confer
28
3
17CV183 CAB (BGS)
1
requirement (§ 6.2), and a process for raising an unresolved challenge with the Court
2
(§ 6.3).
3
Section 9, SOURCE CODE, addresses designation, treatment, and procedures for
4
access to and documentation of those that have accessed source code. Section 9(a)
5
provides that “[t]o the extent production of source code becomes necessary in this case, a
6
Producing Party may designate source code as ‘HIGHLY CONFIDENTIAL – SOURCE
7
CODE’ if it comprises or includes confidential, proprietary, or trade secret source code.”
8
Section 9(b) indicates that materials “designated as ‘HIGHLY CONFIDENTIAL –
9
SOURCE CODE’ shall be subject to all the protections afforded to ‘HIGHLY
10
CONFIDENTIAL – ATTORNEYS’ EYES ONLY’ information” and limits disclosure to
11
those “to whom ‘HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY’
12
information may be disclosed, as set forth in Paragraphs 7.3 and 7.4.”
13
14
15
16
17
18
Section 9(c) dictates how any source code will be produced in discovery. It
provides:
The source code shall be made available for inspection on a secured
computer in a secured room without Internet access or network access to
other computers, and the Receiving Party shall not copy, remove, or
otherwise transfer any portion of the source code onto any recordable media
or recordable device.
19
Section 9(d) provides that a “Receiving Party may request paper copies of limited
20
portions of source code that are reasonably necessary for the preparation of court filings,
21
pleadings, expert reports, or other papers, or for deposition or trial, but shall not request
22
paper copies for purposes of reviewing the source code other than electronically as set
23
forth in paragraph (c) in the first instance.” It requires the Producing party to provide the
24
requested source code in paper form with bates numbers and the label HIGHLY
25
CONFIDENTIAL – SOURCE CODE and allows the Producing Party to challenge the
26
amount of source code requested in paper form under § 6. Section 9(e) requires the
27
Receiving Party to keep a record of anyone that has inspected any portion, electronic or
28
paper, of the source code and to keep printed portions in a secured locked area. It also
4
17CV183 CAB (BGS)
1
prohibits creation of “any electronic or other images of the paper copies” and
2
“convert[ing] any of the information contained in the paper copies into any electronic
3
format.” Section 9(e) requires the Receiving Party to “maintain a record of any
4
individual who has inspected any portion of the source code in electronic or paper form.”
5
II.
Parties’ Positions2
Eset’s Position
6
A.
7
Eset asserts that Mr. Lee’s conduct violated § 5.2(a) of the Protective Order
8
because, instead of requesting copies of the directory structure from the source code
9
computer from Eset, it just copied the directories and subdirectories and proceeded to
10
compile and disclose it without any designation. Similarly, ESET asserts Mr. Lee also
11
violated §6 by ignoring the process set out in that section to challenge a designation. In
12
essence, Eset argues that if Finjan believed the directory structure it was compiling from
13
the source code computer should not have the HIGHLY CONFIDENTIAL – SOURCE
14
CODE designation, it should have challenged it through this process rather than taking
15
the information without asking and not designating it at all. Eset also argues Finjan
16
violated § 9 of the Protective Order because the directory structure Mr. Lee copied onto
17
his laptop constitutes source code. By copying it from the source code computer onto his
18
laptop he violated § 9(c)’s prohibition on “copy[ing], remov[ing] or otherwise
19
transfer[ring] any portion of the source code onto any recordable media or recordable
20
device.” Finally, Eset argues Finjan failed to abide by the procedures set out in § 9(d) for
21
obtaining portions of source code.
Finjan’s Position
22
B.
23
Finjan does not dispute the directory structure was copied from the source code
24
computer, compiled into a 40-page document, and presented to a witness without any
25
confidentiality designation. Rather, Finjan argues that there was no violation of the
26
27
2
28
The Court only summarizes pertinent portions of the parties’ arguments. (See Joint
Statement [ECF 345] for each parties’ entire argument.)
5
17CV183 CAB (BGS)
1
Protective Order because the directory structure is not source code. Under Finjan’s
2
interpretation, there is no violation in copying the directory structure or failing to
3
designate it as HIGHLY CONFIDENTIAL – SOURCE CODE because it is not source
4
code and Eset has never designated it as HIGHLY CONFIDENTIAL – SOURCE CODE.
5
Finjan also argues that the directory structure should not be treated as source code or
6
subject to the HIGHLY CONFIDENTIAL – SOURCE CODE designation because of
7
instances when Eset did not treat it as source code. Similarly, as to the electronic
8
copying, Finjan argues that the Protective Order does not prohibit the note taking done by
9
Mr. Lee in the source code room. Further, Finjan argues that by seeing Mr. Lee in the
10
source code room taking notes on a laptop, Eset has waived any objection to his having
11
done it.
12
Finjan also claims it could not have known Eset considered these “folders”3 to be
13
source code or warranting the designation. In Finjan’s view, being on the “source code
14
computer” was not enough to alert it that it was copying source code or material subject
15
to the HIGHLY CONFIDENTIAL – SOURCE CODE designation because such a broad
16
designation would improperly encompass the operating system on the computer, certainly
17
not warranting the HIGHLY CONFIDENTIAL – SOURCE CODE designation. Finjan
18
points to § 5.2(c) to further support this position.
19
///
20
///
21
///
22
23
24
25
26
27
28
3
Although the Court recognizes that Finjan is referring to the directory structure at issue
as “folders” for persuasive effect, that effect is largely lost given Finjan previously
described portions of the exact same information as follows in its Motion to Compel,
“ESET’s source code is structured under a top level directory . . . . There are four
directories under the top level . . . directory . . . . Each of these four directories includes
subdirectories (listed below) located on the source code computer.” (Finjan’s Mot. to
Compel ESET to Supplement its Response to Interrogatory No. 7 [ECF 231].)
6
17CV183 CAB (BGS)
1
III.
Analysis of Violations
Waiver of Eset’s Objections
2
A.
3
Initially, the Court finds that Eset did not waive its objection to Mr. Lee’s
4
electronic note taking. Eset proffered in its response that Mr. Penner presumed that Mr.
5
Lee was using his laptop for a proper purpose. Had he known that Mr. Lee was taking
6
notes, he would have immediately objected. Given both parties conduct as to abiding by
7
this Court’s chambers rules 30-day objection limit, and the numerous times both parties
8
have requested tolling of this rule, the Court finds Mr. Penner’s proffer credible. Eset has
9
brought this dispute timely. They raised it immediately following presentation of Exhibit
10
3 at a deposition.
11
B.
12
Proper Designation
1.
Section 5.2
13
Section 5.2 addresses the manner and timing of designation. Finjan contends that
14
Eset did not comply with § 5.2(c) by affixing to the exterior of the source code computer
15
a label for HIGHLY CONFIDENTIAL – SOURCE CODE thereby reflecting all its
16
contents were designated source code. Because Eset failed to notify Finjan with the
17
label, Finjan did not have the opportunity to object as Finjan would have. (ECF 345 at
18
15).
19
Section 6 lays out the procedure for Finjan to challenge Eset’s confidentiality
20
designations. If Eset failed to properly designate the directories on the source code
21
computer as being source code, then Finjan was not given the opportunity to challenge
22
this designation pursuant to § 6. Of course, the reverse is also true. If Eset properly
23
designated the contents of the source code computer as source code, which necessarily
24
includes the directories, then Finjan would have been obligated to follow the procedures
25
as set forth in § 6, which it readily admits it did not do.
26
Eset argues that § 5.2(a) is the appropriate section for designation of the contents
27
of the source code computer. Subsection (a) applies to paper or electronic documents,
28
whereas subsection (c) controls information produced in some form other than
7
17CV183 CAB (BGS)
1
documentary. The information produced on the source code computer are electronic
2
documents. Therefore subsection (a) controls the manner and timing of the contents of
3
the source code computer, not (c).
4
Subsection (a)’s paragraph one requires Eset to designate each page that contains
5
protected material, which Eset did not do. Subsection (a)’s second paragraph does not
6
require Eset to designate the material until after inspection by Finjan. This second
7
paragraph applies to original documents. Neither party directly addresses whether the
8
documents on the source code computer are original documents. However, Eset does
9
proffer that no single employee has access to the entirety of the source code, including
10
the Chief Technology Officer. (ECF 345 at 6.) Eset goes on to explain that the source
11
code is only made available on a need to know basis. (Id. at 7). Based on this proffer, the
12
Court concludes for the purposes of 5.2(a)’s second paragraph, the documents on the
13
source code computer are deemed original. As such, by operation of subsection (a), until
14
Eset has been given the opportunity to designate which documents qualify for protection,
15
all the documents on the computer are deemed “Highly Confidential-Attorneys Eye
16
Only.”
17
Pursuant to § 5.2(a), had Mr. Lee wanted copies of the directories, he was required
18
to identify which documents he wanted copied, allow Eset to designate appropriately
19
those documents, and then produce them to Mr. Lee. At that point in time, if Mr. Lee did
20
not agree to Eset’s designations, he could appropriately object by following the procedure
21
set forth in § 6 of the Protective Order. Based on § 5.2(a), the Court finds that Finjan
22
would have had the opportunity to object had Mr. Lee identified the documents he
23
wanted copied, i.e., the directories, and then given Eset the chance to designate them
24
accordingly. He simply did not follow the procedure for the manner and timing of
25
designation as set forth in this section of the Protective Order.
26
Eset argues that Mr. Lee copying the directory structure onto its laptop and
27
producing it in a printed document without Eset’s permission facially violated § 5.2(a).
28
Finjan contends Mr. Lee merely took notes for the purpose of identifying code
8
17CV183 CAB (BGS)
1
appropriate for a printing request. In that the second paragraph of § 5.2(a) is applicable
2
to Mr. Lee’s conduct, the Court finds by copying the directories onto his computer, and
3
not allowing Eset the opportunity to determine how to designate those copied directories,
4
Mr. Lee violated this provision. By operation of subsection (a), paragraph 2, Mr. Lee
5
was required to identify which documents he wanted copied, allow Eset to designate
6
appropriately those documents, and then produce them to Mr. Lee. At that point, if Mr.
7
Lee did not agree to Eset’s designation, he could appropriately object by following the
8
procedure set forth in § 6 of the Protective Order. The Court also stresses by operation of
9
this subsection, until Eset had the opportunity to designate the documents Mr. Lee
10
wanted copied, they are deemed Highly Confidential – Attorneys’ Eyes Only. By
11
copying the directories, and not following this procedure, Mr. Lee did an end run around
12
subsection (a), paragraph 2, thereby violating this provision of the Protective Order.
13
2.
Section 9(c)
Unlike § 5.2(a), § 9(c)-(d) refer only to “source code.” These sections do not state
14
15
that they apply to any materials designated as HIGHLY CONFIDENTIAL – SOURCE
16
CODE, a designation broader than source code. Nor does either section incorporate in
17
any way the definition of HIGHLY CONFIDENTIAL – SOURCE CODE.4
18
Additionally, the Protective Order lacks a definition for “source code.” Section 2.9
19
defines materials subject to the HIGHLY CONFIDENTIAL – SOURCE CODE
20
designation, but § 9 does not define “source code.” Therefore, in determining whether
21
Mr. Lee’s conduct violated § 9(c), the issue before the Court is whether he was on proper
22
notice that the contents of the source code computer were designated as source code.
23
24
25
26
27
28
4
Section 9 does refer to the designation. It specifically allows for the production and
designation of source code as HIGHLY CONFIDENTIAL – SOURCE CODE and
indicates how it is to be treated pursuant other sections of the Protective Order. (§ 9(a)(b).)
9
17CV183 CAB (BGS)
1
The Court is persuaded that § 9(c)-(d) is intended to apply to the contents of the
2
“source code computer.” Section 9(c) provides, “Any source code produced in discovery
3
shall be made available for inspection…”. This opening sentence puts all parties on
4
notice that the procedure for inspection deals only with source code. Section 9(c) sets out
5
the parameters for source code review, including the use of a secured room, secured
6
computer, and prohibitions on Internet or network access. The same sentence of the
7
Protective Order within § 9(c) that creates the source code computer subject to all these
8
limitations to keep its contents secure also prohibits copying from it onto any recordable
9
media or recordable device. Although § 9 does not explicitly define source code to
10
encompass the directories and subdirectories of the source code, the Court cannot ignore
11
that they were on the source code computer with all its restrictions for inspection outlined
12
in § 9(c) that only apply to source code discovery placed on the source code computer.
13
By Eset following to the letter the restrictions for source code inspection set forth
14
in § 9(c), it has properly designated all the contents of the source code computer as
15
source code. Mr. Lee was on notice that the electronic documents on the source code
16
computer were being designated by Eset as source code. If Mr. Lee, after inspecting the
17
contents of the source code computer, objected to the directories being included on the
18
computer as source code, he was required to follow the procedures for objecting under
19
§ 6. He did not do this.
Electronic Note Taking – Section 9(c) Violation
20
C.
21
Finjan contends that the electronic note taking by Mr. Lee is not prohibited by
22
§ 9(c) in that it did not constitute “copying, removing or otherwise transferring” source
23
code. The Court disagrees with Finjan’s interpretation of note taking as being separate
24
from the specific language of § 9(c), which prohibits the receiving party from copying or
25
otherwise transferring any portion of the source code onto any recordable device. The
26
Court finds that Mr. Lee’s typing some 40 pages of the directory structure from the
27
source code computer amounts to copying or otherwise transferring what Eset has
28
designated as source code onto his laptop, which is a recordable device. This conduct
10
17CV183 CAB (BGS)
1
was a violation of § 9(c). If he wanted copies of the directories, pursuant to § 9(d), he
2
could have asked Eset for paper copies. He chose not to follow the agreed upon
3
procedure, instead taking it upon himself to copy the directory structure of the source
4
code and then use it at a deposition.
5
Finjan argues strenuously that the directory structure cannot be considered source
6
code under § 9 because it is nothing more than folder names undeserving of any
7
protection. It also argues that including the directories as source code is grossly
8
overbroad in contradiction to § 5.1. The Court concludes that these objections should
9
have been presented through the procedure in § 6 regarding challenging the designation
10
as directed in § 9(d), not after the fact as part of this dispute.
11
Similarly, the Court is not persuaded that Finjan could not have known Eset
12
considered the directory structure to be confidential. Both Eset and Finjan’s filings with
13
the Court have indicated that the directory structure is subject to the HIGHLY
14
CONFIDENTIAL – SOURCE CODE designation and that Finjan knew Eset considered
15
it, at a minimum, to reference source code. In filing a Motion to Compel on March 9,
16
2018, Finjan sought to file portions of these same directories and subdirectories under
17
seal. In its Motion to File Under Seal, Finjan specifically asserted to the Court that
18
“based on Eset’s representations and designations, the portions of the Motion to Compel
19
that Finjan seeks to file under seal5 reference source code designated by ESET as
20
‘HIGHLY CONFIDENTIAL – SOURCE CODE’” under the Protective Order. (Finjan’s
21
Mot. to File Documents Under Seal [ECF 229] (emphasis added).) The only information
22
redacted in Finjan’s Motion to Compel are directories and subdirectories that are included
23
in the 40-page document Finjan created from the source code computer. Similarly, in
24
25
26
27
28
The Court has compared the redacted portions of Finjan’s Motion to Compel, as well as
the chart provided by Finjan in seeking to file those portions under seal and confirmed
the 40-page directory structure Finjan compiled includes these directories and
subdirectories.
5
11
17CV183 CAB (BGS)
1
opposing Finjan’s Motion to Compel, Eset also redacted directory names and indicated in
2
seeking to file those portions under seal that the brief “contained materials designated by
3
Eset as ‘HIGHLY CONFIDENTIAL – SOURCE CODE’” and identified as an example
4
that “the documents above disclose information relating to source code directory
5
structure and file names.” (Eset’s Mot. for Leave to File Documents Under Seal [ECF
6
233] at 2.) Finjan considered these directories and subdirectories to be referencing source
7
code and having been designated as “HIGHLY CONFIDENTIAL – SOURCE CODE”
8
by Eset.
In sum, Mr. Lee’s copying contents of the source code computer, particularly on
9
10
such a large scale, to a recordable media device was a violation of § 9(c).
11
II.
Sanctions
12
Eset seeks sanctions against Finjan for violations of the Protective Order pursuant
13
to Federal Rule of Civil Procedure 37(b)(2). Eset requests: (1) an order requiring Finjan
14
to provide an accounting of all documents, in any form, that include information from the
15
source code computer; (2) as to each document, that Finjan be ordered to provide Eset
16
and the Court a full accounting as to each document, including when and who created it,
17
where it was stored, and to whom it was sent and when; (3) that the contents of all of
18
those documents be submitted to the Court for in-camera review to determine if there
19
were other Protective Order violations; (4) that the Court order each document the Court
20
finds in violation of the Protective Order be destroyed; and (5) that the Court require
21
Finjan to certify destruction of such materials. Pursuant to Rule 37(b)(2)(C), Eset also
22
seeks reasonable expenses and attorney’s fees related to this motion.6
23
24
25
26
27
28
Eset’s request that Mr. Lee be walled off entirely from this case has already been denied
by prior order of the Court. In the Court’s prior Order, Mr. Lee was allowed to continue
to have access to the source code computer, but subject to specific limitations. The Court
prohibited Mr. Lee or anyone else reviewing materials on the source code computer from
copying not only source code, but the directories, subdirectories, or file paths “onto any
recordable media or recordable device” that could constitute “copy[ing], remov[ing], or
6
12
17CV183 CAB (BGS)
1
Finjan argues the sanctions sought regarding an accounting of all individuals
2
having access and an in-camera review are onerous and irrational because there is no
3
actual source code at issue. Finjan points to emails between counsel for the parties that
4
have included portions of the directory structure as an indicator that such remedial
5
measures are unwarranted. In addressing its efforts to resolve this dispute without Court
6
intervention, Finjan explains that it has already offered to destroy all electronic and paper
7
copies of the exhibit and forego any use of it in this action. Finjan also indicates that it
8
has never shown Exhibit 3 to any individuals other than those who are permitted to
9
access materials designated as HIGHLY CONFIDENTIAL – SOURCE CODE.
10
The Court may impose sanctions for violations of a protective orders under Federal
11
Rule of Civil Procedure 37(b)(2). See Westinghouse Elec. Corp. v. Newman &
12
Holtzinger, P.C., 992 F.2d 932, 934-35 (9th Cir. 1993) (quoting Advisory Committee
13
Note, 1970 Amendment, subdivision (b)); see also United States v. Nat’l Med. Enters.,
14
Inc., 792 F.2d 906, 910-11 (9th Cir.1986) (upholding a Rule 37(b) sanction for a party’s
15
violation of the protective order). Rule 37(b)(2)(A) provides as follows:
16
17
18
19
20
21
22
23
If a party or a party’s officer, director, or managing agent—or a witness
designated under Rule 30(b)(6) or 31(a)(4)—fails to obey an order to
provide or permit discovery, including an order under Rule 26(f), 35, or
37(a), the court where the action is pending may issue further just
orders. They may include the following:
(i) directing that the matters embraced in the order or other
designated facts be taken as established for purposes of the action,
as the prevailing party claims;
(ii) prohibiting the disobedient party from supporting or opposing
designated claims or defenses, or from introducing designated
matters in evidence;
(iii) striking pleadings in whole or in part;
24
25
26
27
otherwise transfer[ring] any portion of the source code” or the directories, subdirectories,
or file paths as set forth in §9(c) of the Protective Order.
28
13
17CV183 CAB (BGS)
1
2
3
4
5
6
7
8
9
10
(iv) staying further proceedings until the order is obeyed;
(v) dismissing the action or proceeding in whole or in part;
(vi) rendering a default judgment against the disobedient party; or
(vii) treating as contempt of court the failure to obey any order
except an order to submit to a physical or mental examination.
As to expenses and attorney’s fees, Rule 37(b)(2)(C) provides:
Instead of or in addition to the orders above, the court must order the
disobedient party, the attorney advising that party, or both to pay the
reasonable expenses, including attorney’s fees, caused by the failure,
unless the failure was substantially justified or other circumstances make
an award of expenses unjust.
A violation need not be willful for sanctions to be imposed, however,
11
“[w]illfullness continues to play a role, along with various other factors, in the choice of
12
sanctions.” David v. Hooker, 560 F.2d 412, 419-20 (9th Cir. 1977); see also Liew v.
13
Breen, 640 F.2d 1046, 1050 (9th Cir. 1981) (“Although willfulness need not be present in
14
order to impose sanctions under Rule 37(b), a good faith dispute concerning a discovery
15
question might, in the proper case, constitute substantial justification.”)(internal citations
16
omitted). Similarly, “[w]hile a finding of bad faith is not a requirement for imposing
17
18
19
20
21
22
23
24
25
26
27
sanctions, good or bad faith may be a consideration in determining whether imposition of
sanctions would be unjust.” Hyde & Drath v. Baker, 24 F.3d 1162, 1172 (9th Cir 1994).
The Court finds an award of attorney’s fees and expenses is not warranted. The
violations discussed above were not willful or in bad faith. On the contrary, they seem to
be the result of an erroneous, but not unreasonable interpretation of the Protective Order.
It appears to the Court that Mr. Lee believed that because the directory structure was not
actual code it was not subject to the limitations applicable to source code. As discussed
above, he was wrong. However, based on the parties’ briefing, the distinction between
the actual computer code and its directory structure is not exceptionally clear. And,
unfortunately, the Protective Order is not exceptionally clear on this point either. There
is no definition for source code in § 9 or anywhere else in the Protective Order. There is
28
14
17CV183 CAB (BGS)
1
a definition for items designated as HIGHLY CONFIDENTIAL – SOURCE CODE, but
2
that definition is not just for source code, but encompasses items well beyond source
3
code. The Court finds these “circumstances make an award of expenses unjust.” Fed. R.
4
Civ. P. 37(b)(2)(C).
5
The Court also finds the extensive accounting and in-camera review sought by Eset
6
are not warranted. As discussed above, Finjan has indicated that Exhibit 3 has not been
7
shared beyond those authorized to have access to HIGHLY CONFIDENTIAL –
8
SOURCE CODE and has agreed to destroy all electronic and paper copies of Exhibit 3
9
and make no use of it. Although the Court is aware of Eset’s security concerns in having
10
the scope of the directory structure compiled, the Court also recognizes that counsel has
11
exchanged portions of it by email without the dire concerns raised here. In this respect,
12
the Court finds the destruction of the compiled document appropriate, but the additional
13
accounting requested unnecessary. The Court orders that Finjan destroy all electronic or
14
paper copies of Exhibit 3 or any other paper or electronic document containing the
15
directory structure from the source code computer.
16
17
IT IS SO ORDERED.
Dated: March 29, 2019
18
19
20
21
22
23
24
25
26
27
28
15
17CV183 CAB (BGS)
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?