Motorola Mobility, Inc. v. Microsoft Corporation

Filing 45

Joint MOTION for Protective Order by Motorola Mobility, Inc.. (Attachments: #1 Exhibit A, #2 Text of Proposed Order)(Mullins, Edward)

Download PDF
Motorola Mobility, Inc. v. Microsoft Corporation Doc. 45 Att. 1 EXHIBIT A Dockets.Justia.com UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA CASE NO. 1:10-cv-24063-MORENO MOTOROLA MOBILITY, INC., Plaintiff / Counterclaim Defendant, v. MICROSOFT CORPORATION, Defendant / Counterclaim Plaintiff. ) ) ) ) ) ) ) ) ) ) ) PROTECTIVE ORDER REGARDING THE DISCLOSURE AND USE OF DISCOVERY MATERIALS Motorola Mobility, Inc. ("Motorola Mobility") and Microsoft Corporation ("Microsoft") hereby stipulate that this protective order should be entered and will govern the conduct of discovery in this case. 1. Confidential Business Information is information which has not been made public and which concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the production, sales, shipments, purchases, transfers, identification of customers, inventories, amount or source of any income, profits, losses, or expenditures of any person, firm, partnership, corporation, or other organization, the disclosure of which information is likely to have the effect of causing substantial harm to the competitive position of the person, firm, partnership, corporation, or other organization from which the information was obtained, unless the Court is required by law to disclose such information. CASE NO. 1:10-cv-24063-MORENO 2. (a) Any information submitted in pre-trial discovery or in a pleading, motion, or response to a motion in this action, either voluntarily or pursuant to order, and which is asserted by a supplier to contain or constitute Confidential Business Information shall be so designated by such supplier in writing, or orally at a deposition, conference, or hearing, and shall be segregated from other information being submitted. Documents shall be clearly and prominently marked on their face with the legend: "[SUPPLIER'S NAME] CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER" or a comparable notice. During the pre-trial phase of this action, such information, whether submitted in writing or in oral testimony, shall be disclosed only in camera before the Court and shall be filed only under seal, pursuant to Rule 5.4 of the Local Rules of the United States District Court for the Southern District of Florida. (b) The Court may determine that information alleged to be confidential is not confidential, or that its disclosure is necessary for the proper disposition of the proceeding before, during, or after the close of the action herein. If such a determination is made by the Court, opportunity shall be provided to the supplier of such information to argue its confidentiality prior to the time of such ruling. 3. In the absence of written permission from the supplier or an order from the Court, any confidential documents or business information submitted in accordance with the provisions of paragraph 2 above shall not be disclosed to any person other than: (i) outside counsel for parties to this action, including necessary secretarial and support personnel assisting such counsel; 2 CASE NO. 1:10-cv-24063-MORENO (ii) qualified persons taking testimony involving such documents or information and necessary stenographic and clerical personnel thereof; (iii) litigation; and (iv) 4. the Court. Confidential Business Information submitted in accordance with the technical experts and their staff who are employed for the purposes of this provisions of paragraph 2 above shall not be made available to any person designated in paragraph 3(iii) unless he or she shall have first read this order and shall have signed a writing substantially provided as Attachment A hereto, a copy of which shall be provided to both parties, manifesting agreement: (i) (ii) to be bound by the terms thereof; not to reveal such Confidential Business Information to anyone other than another person designated in paragraph 3; and (iii) this action. 5. If the Court orders, or if the supplier and all parties to the action agree, to utilize such Confidential Business Information solely for purposes of that access to or dissemination of information submitted as Confidential Business Information shall be made to persons not included in paragraph 3 above, such matter shall only be accessible to or disseminated to such persons based upon the conditions pertaining to, and obligations 3 CASE NO. 1:10-cv-24063-MORENO arising from this order, and such persons shall be considered subject to it, unless the Court finds that the information is not Confidential Business Information as defined in paragraph 1 hereof. 6. In addition to the persons included in paragraph 3 above, Confidential Business Information contained in responses to interrogatories, answers to requests for admission, submissions to the Court, expert reports (exclusive of exhibits and source code excerpts), opinions and orders of the Court may be accessible to or disseminated to the following two in-house counsel, who are members of at least one state bar in good standing, with direct responsibility for managing this litigation: (a) for Motorola Mobility, Tom Miller and Richard A. Wulff; (b) for Microsoft, T. Andrew Culbert and David E. Killough. provided that (1) Confidential Business Information pertaining to licensing or other commercially sensitive financial information shall not be made available under this paragraph 6 to such designated in-house counsel; the supplier shall designate such Confidential Business Information pertaining to licensing or other commercially sensitive financial information as "[SUPPLIER'S NAME] CONFIDENTIAL FINANCIAL INFORMATION ­ OUTSIDE ATTORNEYS' EYES ONLY ­ SUBJECT TO PROTECTIVE ORDER" and promptly provide a redacted version of such document that may be disseminated to the two in-house counsel designated under this paragraph 6; and (2) such in-house counsel shall have first read this order and shall have signed a writing substantially provided as Attachment A hereto, a copy of which shall be provided to both parties, manifesting agreement: (i) to be bound by the terms thereof; 4 CASE NO. 1:10-cv-24063-MORENO (ii) not to reveal such Confidential Business Information to anyone other than another person designated in paragraph 3; and (iii) this action. 7. Subject to the restrictions of paragraph 6 above, the two in-house counsel to utilize such Confidential Business Information solely for purposes of designated therein shall not be excluded from any confidential portion of the trial or other inCourt proceedings in this case. 8. Any Confidential Business Information submitted to the Court in connection with a motion or other proceeding within the purview of this action shall be submitted under seal pursuant to paragraph 2 above. Any portion of a transcript in connection with this action containing any Confidential Business Information submitted pursuant to paragraph 2 above shall be bound separately and filed under seal. When any Confidential Business Information submitted in accordance with paragraph 2 above is included in an authorized transcript of a deposition or exhibits thereto, arrangements shall be made with the court reporter taking the deposition to bind such confidential portions and separately label them [SUPPLIER'S NAME], CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER. Before a court reporter receives any such information, he or she shall have first read this order and shall have agreed in writing to be bound by the terms thereof. Alternatively, he or she shall sign the agreement included as Attachment B hereto. Copies of each such signed agreement shall be provided to the supplier of such Confidential Business Information. 5 CASE NO. 1:10-cv-24063-MORENO 9. The restrictions upon, and obligations accruing to, persons who become subject to this order shall not apply to any information submitted in accordance with paragraph 2 above to which the person asserting the confidential status thereof agrees in writing, or the Court rules after an opportunity for hearing, that the information was publicly known at the time it was supplied to the receiving party or has since become publicly known through no fault of the receiving party. 10. If while this action is before the Court, a party to this order who is to be a recipient of any business information designated as confidential and submitted in accordance with paragraph 2 disagrees with respect to such a designation, in full or in part, it shall notify the supplier in writing and they will thereupon confer as to the status of the subject information proffered within the context of this order. If prior to or at the time of such a conference, the supplier withdraws its designation of such information as being subject to this order, but nonetheless submits such information for purposes of the action, such supplier shall express the withdrawal in writing, and serve such withdrawal upon all parties. If the recipient and supplier are unable to concur upon the status of the subject information submitted as Confidential Business Information within ten days from the date of notification of such disagreement, any party to this order may raise the issue of the designation of such a status to the Court who will rule upon the matter. The Court may sua sponte question the designation of the confidential status of any information and, after opportunity for hearing, may remove the confidentiality designation. 11. No less than 10 days (or any other period of time designated by the Court) prior to the initial disclosure to a proposed expert of any confidential information submitted in accordance with paragraph 2, the party proposing to use such expert shall submit in writing the 6 CASE NO. 1:10-cv-24063-MORENO name of such proposed expert and his or her educational and employment history to the supplier. If the supplier objects to the disclosure of such Confidential Business Information to such proposed expert as inconsistent with the language or intent of this order or on other grounds, it shall notify the recipient in writing of its objection and the grounds therefor prior to the initial disclosure. If the dispute is not resolved on an informal basis within ten days of receipt of such notice of objection, the supplier shall submit immediately each objection to the Court for a ruling. The submission of such Confidential Business Information to such proposed expert shall be withheld pending the ruling of the Court. 12. If Confidential Business Information submitted in accordance with paragraph 2 is disclosed to any person other than in the manner authorized by this protective order, the party responsible for the disclosure must immediately bring all pertinent facts relating to such disclosure to the attention of the supplier and the Court and, without prejudice to other rights and remedies of the supplier, make every effort to prevent further disclosure by it or by the person who was the recipient of such information. 13. Nothing in this order shall abridge the right of any person to seek judicial review or to pursue other appropriate judicial action with respect to any ruling made by the Court concerning the issue of the status of Confidential Business Information. 14. Upon final termination of this action, each party that is subject to this order shall assemble and return to the supplier all items containing Confidential Business Information submitted in accordance with paragraph 2 above, including all copies of such matter which may have been made. Alternatively, the parties subject to this order may, with the written 7 CASE NO. 1:10-cv-24063-MORENO consent of the supplier, destroy all items containing Confidential Business Information and certify to the supplier (or his counsel) that such destruction has taken place. 15. If any Confidential Business Information which is supplied in accordance with paragraph 2 above is supplied by a nonparty to this action, such a nonparty shall be considered a "supplier" as that term is used in the context of this order. 16. Each nonparty supplier shall be provided a copy of this order by the party seeking information from said supplier. 17. The inadvertent production of any document or information (whether designated as Confidential Business Information or not) shall not be deemed to waive any attorney-client privilege, work product protection, or other privilege or immunity that would otherwise attach to the document or information produced, or to other documents or information, so long as the procedures of paragraphs 18 and 19 below are followed. 18. If a producing party or person discovers that a privileged, protected, or otherwise immune document or information has been produced, the party or person must, promptly after discovery, notify all other party or parties of the claim of privilege or other protection or immunity. Upon such notice, each other party shall use its best efforts to retrieve the original and all copies of the identified document or information of which the party is aware, shall promptly destroy all such copies of the identified document or information, and shall notify the producing party in writing that it has done so within ten (10) calendar days of receiving such notice. Such destruction shall not constitute an acknowledgement that the identified document or information is, in fact, privileged or entitled to protection or immunity and shall not preclude any 8 CASE NO. 1:10-cv-24063-MORENO party from later moving the Court to compel the production of the identified document or information. Within a reasonable time after notifying the other party or parties of a claim of privilege or other protection or immunity, the Producing Party shall provide a privilege log for those materials. 19. If a receiving party receives any document or information that appears to be subject to an attorney-client privilege, work product protection, or other privilege or immunity that would otherwise attach to the document or information, and where it is reasonably apparent that the document or information was provided or made available through inadvertence, the receiving party must refrain from examining the document or information any more than is essential to ascertain whether the document or information is likely privileged, protected, or otherwise immune, and shall immediately notify the producing party in writing that the receiving party possesses material that appears to be privileged, protected, or otherwise immune. The procedures of paragraph 18 shall then apply. 20. The parties have agreed to follow the provisions of Fed. R. Civ. P. 26(b)(4)(B)-(D), as amended effective December 1, 2010, with respect to the protection of draft expert reports and communications between a party's attorney(s) and an expert(s). In addition, the parties have agreed that notes taken by the parties' experts in the course of the preparation of their reports, drafts of the expert reports, and all communications between counsel for the parties and their experts (including, but not limited to, emails and other written correspondence) (all of the foregoing hereinafter referred to as "Expert Work Product") need not be retained and shall be not produced in this or any other action. Expert Work Product shall not include communications, information and things that are relied upon by the expert in his or her opinions, or which otherwise form the basis of the expert's report. Neither the terms of this paragraph nor 9 CASE NO. 1:10-cv-24063-MORENO the parties' agreement to them implies that any of the information restricted from discovery in this paragraph would otherwise be discoverable. 21. Confidential Source Code shall mean human-readable programming language text that defines software, firmware, or electronic hardware descriptions. Confidential Source Code includes, without limitation, computer code; scripts; assembly; object code; source code listings and descriptions of source code; object code listings and descriptions of object code; Hardware Description Language (HDL); Register Transfer Level (RTL) files that describe the hardware design of any ASIC or other chip; similarly sensitive implementation details; files containing text written in "C," "C++," assembler, VHDL, Verilog, and digital signal processor (DSP) programming languages; ".include files;" "make" files; link files; and other humanreadable text files used in the generation and/or building of software directly executed on a microprocessor, microcontroller, or DSP. Confidential Source Code is a form of, and shall be afforded all of the same protections as, Confidential Business Information as defined in paragraph 1 hereto unless otherwise provided in paragraphs 21 to 26. The restrictions herein on Confidential Source Code do not apply to publicly-available source code available as open source code. 22. To the extent that a party wishes to obtain access to Confidential Source Code, the following procedures may apply at the option of the supplier. Nothing in this Order shall be construed as a representation or admission by a party that Confidential Source Code is properly discoverable in this action, or to obligate any party to produce Confidential Source Code. 10 CASE NO. 1:10-cv-24063-MORENO 23. Documents or things that comprise a party's confidential, proprietary and/or trade secret source code or object code may be designated CONFIDENTIAL SOURCE CODE. Documents or things that include or are accompanied by confidential, proprietary and/or trade secret source code or object code may be designated CONFIDENTIAL SOURCE CODE only if such confidential, proprietary and/or trade secret source code or object code cannot reasonably be segregated from the document or thing. The following conditions shall govern the production, review and use of documents or things designated CONFIDENTIAL SOURCE CODE. 24. All information designated as CONFIDENTIAL SOURCE CODE shall be subject to the following provisions: (i) Subject to the following notice provisions and each producing party's written objections, each producing party shall make its responsive CONFIDENTIAL SOURCE CODE continuously available for inspection during discovery and through the conclusion of the trial in this action. Any single reviewing session (conducted during one business day or during consecutive business days of review) shall be conducted during regular business hours (9:00 A.M. to 6:00 P.M. local time) on four (4) calendar days' written (including email) notice, or during such other hours as may be mutually and reasonably agreed upon on reasonable notice. (ii) A list of names of persons who will view the source code will be provided to the producing party in conjunction with the written notice requesting inspection. The receiving party shall maintain a daily log of the names of persons who enter the source code viewing room (see paragraph 24(iv) below) to view the source code and note on the log when these persons enter and depart. The producing party shall be entitled to have a person observe all 11 CASE NO. 1:10-cv-24063-MORENO entrances and exits from the source code viewing room, and to receive a copy of the log, but shall not otherwise be entitled to observe the receiving party's inspection. (iii) All source code produced pursuant to these provisions will be made available by the producing party at the following locations: · By Motorola Mobility, at the offices of Ropes & Gray LLP, 111 South Wacker Drive, 46th Floor, Chicago, Illinois 60606; · By Microsoft, at the offices of Sidley Austin LLP, 1501 K Street NW, Washington, DC 20005; and · By third parties, at such location(s) as may be mutually agreed to by the producing third party and the requesting party, or as otherwise ordered by the Court. (iv) All source code will be made available in a private room, on a secured computer without Internet access or network access to other computers, as necessary and appropriate to prevent and protect against any unauthorized copying, transmission, removal, or other transfer of any source code outside or away from the computer on which the source code is provided for inspection (the "Source Code Computer"). The producing party shall be obligated to install such reasonable tools or programs necessary to review and search the code produced on the platform produced, as specified by the receiving party, which the receiving party may provide if the producing party does not have. For example, prior to the date of the inspection, a text editor or IDE capable of performing syntax highlighting should be installed on the Source Code Computer. The producing party shall not be obligated to install tools or programs capable of compiling and running source code. To the extent the receiving party provides the producing party with tools or programs to install for use during a reviewing session, any such tools or programs must be provided no later than five (5) business days in advance of the first reviewing 12 CASE NO. 1:10-cv-24063-MORENO session for which such installation is desired. Thereafter, such tools or programs shall remain on the Source Code Computer throughout the discovery period, absent agreement to the contrary. (v) The receiving party's outside counsel and/or technical advisers shall be entitled to take notes relating to the source code but may not copy the source code into the notes. Such notes shall be subject to the provisions of paragraph 24(x) below. No copies of all or any portion of the source code may leave the room in which the source code is inspected. Furthermore, no other written or electronic record of the source code is permitted except as otherwise provided herein. (vi) During inspection of the code, the receiving party may compile a list of source code files to be produced. The receiving party will only identify such files as are reasonably necessary to facilitate the receiving party's preparation of the case, including (1) when reasonably necessary to prepare any filing with the Court or to serve any pleadings or other papers on any other party, (2) to prepare internal attorney work product materials, (3) or to prepare other necessary case materials such as testifying expert reports, consulting expert written analyses, and related drafts and correspondences. In no event may the receiving party identify more than those files necessary to analyze the issues in this case during the duration of the case without prior written approval by the producing party. Upon identification of such files by the receiving party, the producing party shall print, append production numbers to, and label such files with the file's complete file path (e.g., ./product1/source/main/test/test.h) and the designation CONFIDENTIAL SOURCE CODE. If the producing party objects that identified files are not reasonably necessary to any case preparation activity, the producing party shall make such objection known to the receiving party within five (5) business days of the identification of any files by the receiving party. If, after meeting and conferring, the producing 13 CASE NO. 1:10-cv-24063-MORENO party and the receiving party cannot resolve the objection, the producing party shall be entitled to seek a judicial resolution of whether or not the identified source code in question is reasonably necessary to any case preparation activity. In the absence of any objection, or upon resolution of any such dispute by the Court, the producing party shall provide one printed copy of the identified files to the receiving party within five (5) business days of the identification of such files by the receiving party or, if applicable, resolution of a dispute by the Court. The printed pages shall constitute part of the source code produced by the producing party in this action. (vii) Unless otherwise agreed in advance by the parties in writing, following each reviewing session (conducted during one business day or during consecutive business days of review), the receiving party's outside counsel and/or technical advisers shall remove all notes, documents, laptops, and all other materials from the room that may contain work product and/or attorney-client privileged information. The producing party shall not be responsible for any items left in the room following each inspection session. (viii) The receiving party will not copy, remove, or otherwise transfer any source code from the Source Code Computer including, without limitation, copying, removing, or transferring the source code onto any other computers or peripheral equipment. The receiving party will not transmit any source code in any way from the producing party's facilities or the offices of its outside counsel of record. (ix) Documents designated CONFIDENTIAL SOURCE CODE may only be viewed by or disclosed to outside counsel or the receiving party's technical advisers approved by the producing party and their necessary support personnel. The term "technical adviser" shall mean an independent, outside expert witness or consultant with whom counsel 14 CASE NO. 1:10-cv-24063-MORENO may deem it appropriate to consult, subject to the following provision. Documents designated CONFIDENTIAL SOURCE CODE may not be disclosed to in-house counsel. (x) A party desiring to disclose information to a technical adviser shall give prior written notice to the producing party or non-party, who shall have ten (10) business days after such notice is given to object in writing. A party desiring to disclose CONFIDENTIAL SOURCE CODE information to a technical adviser must provide the following information for each technical adviser: (i) name, address, curriculum vitae, current employer, and employment (including consulting) history for the past four (4) years; and (ii) a listing of cases in which the witness has testified as an expert at trial or by deposition within the preceding four years. No CONFIDENTIAL SOURCE CODE information shall be disclosed to such expert(s) or consultant(s) until after the expiration of the foregoing notice period. (xi) The outside counsel and technical advisers (who have been approved to access source code under paragraphs 24(ix) and 24(x) above) for a receiving party shall maintain and store any paper copies of the source code or notes related to such source code (as referenced in paragraphs 24(v) and 24(vi)) at their offices in a manner that prevents duplication of or unauthorized access to the source code or notes, including, without limitation, storing the source code or notes in a locked room or cabinet at all times when those materials are not in use; (xii) The receiving party's outside counsel of record may make no more than five additional paper copies of any portions of the source code files identified pursuant to paragraph 24(vi), not including copies attached to court filings, and shall maintain a log of all copies of the source code (received from a producing party) that are provided by the receiving party to any qualified person. The log shall include the names of the recipients and reviewers of 15 CASE NO. 1:10-cv-24063-MORENO copies and locations where the copies are stored. Any paper copies of source code shall be designated CONFIDENTIAL SOURCE CODE ­ and shall be stored or viewed only at (1) the offices of outside counsel for the receiving party, (2) the offices of technical advisers who have been approved to access source code under paragraphs 24(ix) and 24(x), (3) the site where any deposition is taken, (4) the Court, or (5) any intermediate location necessary to transport the information to a hearing, trial, or deposition. Any such paper copies shall be maintained at all times in a locked and secure location. The producing party shall not unreasonably deny a receiving party's request to make (and log) additional copies, providing that the request is for good cause and for use that otherwise complies with this order. The producing party shall be entitled to a copy of the log upon request, and at the conclusion of the litigation. (xiii) The receiving party may include excerpts of source code in a pleading, exhibit, expert report, discovery document, deposition transcript, other Court document, or any drafts of these documents ("Source Code Documents"). The receiving party shall only include such excerpts as are reasonably necessary for the purposes for which such part of the source code is used -- as an example, excerpts of approximately 25 to 40 lines in length are presumptively reasonable. (xiv) To the extent portions of source code are quoted in a Source Code Document, either (1) the entire document will be stamped CONFIDENTIAL SOURCE CODE or (2) those pages containing quoted source code will be separately bound, and stamped as CONFIDENTIAL SOURCE CODE. All Source Code Documents shall also be marked with the legend "CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER," or a comparable notice, and shall be treated as Confidential Business Information pursuant to this Protective Order. 16 CASE NO. 1:10-cv-24063-MORENO (xv) All paper copies of source code shall be securely destroyed if they are no longer necessary in the litigation (e.g., extra copies at the conclusion of a deposition). Copies of source code that are marked as deposition exhibits shall not be provided to the court reporter or attached to deposition transcripts; rather, the deposition record will identify the exhibit by its production numbers. (xvi) The receiving party may not create electronic images, or any other images, of the source code from the paper copy for use on a computer (e.g., may not scan the source code to a PDF, or photograph the code). The receiving party may create an electronic copy or image of selected portions of the source code only when reasonably necessary to accomplish any filing with the Court or to serve any pleadings or other papers on any other party (including expert reports). Images or copies of source code shall not be included in correspondence between the parties (references to production numbers shall be used instead) and shall be omitted from pleadings and other papers except to the extent permitted herein. 25. Unless otherwise ordered by the Court, Confidential Source Code designated as "CONFIDENTIAL SOURCE CODE" shall be subject to the provisions set forth in paragraphs 21 to 26 and may be disclosed, subject to paragraphs 21 to 26, solely to: (a) outside counsel representing the parties to this action, as defined in paragraph 3(i), including necessary secretarial and support personnel regularly employed by and assisting such counsel, except that, unless otherwise agreed, no outside counsel who is involved in competitive decision-making, as defined by U.S. Steel v. United States, 730 F.2d 1465, 1468 n.3 (Fed. Cir. 1984), shall have access to Confidential Source Code designated as "CONFIDENTIAL SOURCE CODE;" 17 CASE NO. 1:10-cv-24063-MORENO (b) any outside expert or consultant retained by a party for the purposes of this action and who satisfies paragraph 3(iii) of this Order, provided that disclosure is only to the extent necessary to perform such work; and provided that: (i) such expert or consultant has agreed to be bound by the provisions of this Order as required by paragraphs 3, 4, and 11 of this Order, (ii) such expert or consultant is not involved in competitive decision-making, as defined by U.S.. Steel v. United States, 730 F.2d 1465, 1468 n.3 (Fed. Cir. 1984), on behalf of a party or a competitor of a party in the technical subject matter of the Confidential Business Information produced, and (iii) no unresolved objections to such disclosure exist after proper notice has been given to all parties as set forth in paragraphs 3, 4, and 11 of this Order; (c) court reporters, stenographers, and videographers retained to record testimony taken in this action, provided that such court reporters, stenographers, and videographers have agreed to be bound by the provisions of this Order as required by paragraph 4 of this Order; (d) (e) the Court; any persons who are witnesses during a deposition, court hearing, or trial where specific documentary or testimonial evidence establishes at that time that the Confidential Source Code or portion of the Confidential Source Code was authored or received by the witness without any violation of any confidentiality obligation owed to any party in this action; 18 CASE NO. 1:10-cv-24063-MORENO (f) any mediator who is assigned to hear this matter, and his or her staff, subject to their agreement to maintain confidentiality to the same degree as required by this Order; (g) any other person with the prior written consent of the supplier. 26. Access to and review of the Confidential Source Code shall be strictly for the purpose of investigating the claims and defenses at issue in this action. No person shall review or analyze any Confidential Source Code for purposes unrelated to this action, nor may any person use any knowledge gained as a result of reviewing Confidential Source Code in this action in any other pending or future dispute, proceeding, patent prosecution, or litigation. AGREED AND STIPULATED TO: Dated: April 6, 2011 By: /s/ Edward M. Mullins Dated: April 6, 2011 By: /s/ Roberto Martinez Roberto Martinez Curtis Miner COLSON HICKS EIDSON 255 Alhambra Circle, Penthouse Coral Gables, FL 33134 Telephone: (305) 476-7400 Attorneys for Defendant / Counterclaim Plaintiff MICROSOFT CORPORATION David T. Pritikin Richard A. Cederoth Douglas I. Lewis John W. McBride SIDLEY AUSTIN LLP One South Dearborn Chicago, IL 60603 Telephone: (312) 853-7000 Edward M. Mullins Hal M. Lucas Astigarraga Davis Mullins & Grossman, P.A. 701 Brickell Avenue, 16th Floor Miami, FL 33131 Telephone: (305) 372-8282 Attorneys for Plaintiff / Counterclaim Defendant MOTOROLA MOBILITY, INC. Jesse J. Jenner Steven Pepe Khue V. Hoang Leslie M. Spencer Ropes & Gray LLP 1211 Avenue of the Americas New York, NY 10020 Telephone: (212) 596-9000 19 CASE NO. 1:10-cv-24063-MORENO Norman H. Beamer Mark D. Rowland Gabrielle E. Higgins Ropes & Gray LLP 1900 University Avenue, 6th Floor East Palo Alto, CA 94303 Telephone: (650) 617-4000 Kevin J. Post Megan F. Raymond Ropes & Gray LLP One Metro Center 700 12th Street NW, Suite 900 Washington, DC 20005 Telephone: (202) 508-4600 Brian R. Nester Kevin C. Wheeler SIDLEY AUSTIN LLP 1501 K Street NW Washington, DC 20005 Telephone: (202) 736-8000 20 Attachment A UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA CASE NO. 1:10-cv-24063-MORENO MOTOROLA MOBILITY, INC., Plaintiff / Counterclaim Defendant, v. MICROSOFT CORPORATION, Defendant / Counterclaim Plaintiff. ) ) ) ) ) ) ) ) ) ) ) CONFIDENTIALITY AGREEMENT PURSUANT TO PROTECTIVE ORDER I, _______________________, hereby certify that I have read the Protective Order Regarding the Disclosure and Use of Discovery Materials (the "Order") in the above-captioned case, that I agree to comply with the Order in all respects, and that I hereby submit and waive any objection to the jurisdiction of the United States District Court for the Southern District of Florida for the adjudication of any dispute concerning or related to my compliance with the Order. I understand and agree, in particular, that any Confidential Business Information and any copies, excerpts, or summaries thereof, as well as any knowledge or information derived from any of the aforementioned items, may be used solely for purposes of this litigation and may not CASE NO. 1:10-cv-24063-MORENO be used for any other purpose, including without limitation, and business, commercial or academic purpose. I further understand and agree that failure to abide fully by the terms of the Order may result in legal action against me, including being held in contempt of court and liability for monetary damages. Signature: Please print or type the following: Name: Title and Affiliation: Address: Telephone: 2 Attachment B UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA CASE NO. 1:10-cv-24063-MORENO MOTOROLA MOBILITY, INC., Plaintiff / Counterclaim Defendant, v. MICROSOFT CORPORATION, Defendant / Counterclaim Plaintiff. ) ) ) ) ) ) ) ) ) ) ) NONDISCLOSURE AGREEMENT FOR REPORTER/STENOGRAPHER/TRANSLATOR I, ________________________, do solemnly swear or affirm that I will not divulge any information communicated to me in any confidential portion of the action or hearing in Motorola Mobility, Inc. v. Microsoft Corporation, Civil Action No. 1:10-cv-24063-MORENO, except as permitted in the protective order issued in this case. I will not directly or indirectly use or allow the use of such information for any purpose other than that directly associated with my official duties in this case. Further, I will not by direct action, discussion, recommendation, or suggestion to any person reveal the nature or content of any information communicated during any confidential portion of the action or hearing in this case. CASE NO. 1:10-cv-24063-MORENO I also affirm that I do not hold any position or official relationship with any of the participants in said action. Signed _______________________________________________ Dated ________________________________________________ Firm or Affiliation ______________________________________ 2

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?