ONEAMERICA FINANCIAL PARTNERS, INC. v. T-SYSTEMS NORTH AMERICA, INC. et al
Filing
93
ORDER granting in part and denying in part 41 Motion to Maintain Document Under Seal and granting in part and denying in part 56 Motion to Maintain Document Under Seal. Signed by Magistrate Judge Denise K. LaRue on 3/9/2016 (See Entry for details) (CBU)
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF INDIANA
INDIANAPOLIS DIVISION
ONEAMERICA FINANCIAL
PARTNERS, INC.,
Plaintiff,
vs.
T-SYSTEMS NORTH AMERICA, INC.,
et al.,
Defendants.
)
)
)
)
)
)
)
)
)
)
)
No. 1:15-cv-01534-TWP-DKL
Entry on Plaintiff’s Motion to Maintain Certain Portions of Documents Under Seal [doc. 41]
and TSNA’s Motion to Seal Its Motion to Bifurcate and for Speedy Trial on Count III of Its
Counterclaim [doc. 56]
This cause comes before the Court on Plaintiff’s Motion to Maintain Certain Portions
of Documents Under Seal [doc. 41] and TSNA’s Motion to Seal Its Motion to Bifurcate and for
Speedy Trial on Count III of Its Counterclaim [doc. 56]. District Judge Tanya Walton Pratt
referred the motions to the undersigned for ruling. Having considered the motions and
supporting materials, the Court decides as follows.
Background
OneAmerica Financial Partners, Inc. brought this action against T-Systems North
America, Inc. (“TSNA”), and T-Systems International GmbH for breach of contract,
fraudulent inducement, fraud, negligence, and promissory estoppel and for breach of
guaranty against T-Systems International. Several years ago, OneAmerica decided to
outsource certain Information Technology (“IT”) services.
It hired technology
consultants to develop a Request for Proposal for Information Technology Infrastructure
Services (“RFP”). OneAmerica and TSNA executed a Master Information Technology
Services Agreement (“MITSA”), pursuant to which TSNA was to provide certain IT
services and equipment to OneAmerica. In this action, OneAmerica alleges that TSNA
failed to provide the high quality IT services as promised under the MITSA. TSNA has
counterclaimed for breach of contract, fraud, and declaratory relief.
OneAmerica moves to maintain under seal certain portions of the RFP [docs. 6-1
through 6-4], the MITSA [docs. 7-1 through 7-6], T-Systems North America, Inc.’s Answer,
Affirmative Defenses, Reliance on Jury Demand, and Counter-Complaint (“Counter-Complaint”)
[docs. 19 and 19-1], and corresponding portions of OneAmerica Financial Partner, Inc.’s UnRedacted Answer and Affirmative Defenses to T-Systems North America, Inc.’s CounterComplaint and Jury Demand (“Answer to Counter-Complaint”) [doc. 33]. Plaintiff states that
it requests “the Court to maintain under seal only the contents which identify specific
details about [its] software, applications, hardware, vendors, regional locations, and
Information Technology (“IT”) policies and procedures.” [Pl.’s Mot. Maintain Certain
Portions of Docs. Under Seal, doc. 41 at 1.] It argues good cause exists “to maintain these
portions of the documents under seal in order to prevent a potential data breach of
OneAmerica’s IT systems.” [Id.] Given the voluminous filings at issue (in excess of 1,000
pages), OneAmerica did not file copies of the documents with the portions at issue
redacted, but states that it will do so at the Court’s direction.
OneAmerica submits that it is not necessary to disclose specific information about
its IT systems to the public at this stage of the litigation because such information “will
2
not materially assist the public in understanding and monitoring” the case. [Pl.’s Br. Supp.
Mot. Maintain Certain Portions of Docs. Under Seal, doc. 42 at 2.] Those portions of the
documents that are disclosed to the public, it argues, will allow interested parties to know
who is using the courts, to understand the judicial decisions in the case, and to monitor
the Court’s resolution of the issues. [Id. at 5.] If the claims, defenses, or counterclaims
focus on specific software or hardware, OneAmerica argues that the disclosure to the
public of information relating to such software or hardware can be addressed at that time,
but disclosure of details is unnecessary at this early stage of the litigation. [Id. at 2.]
The Court previously denied OneAmerica’s motion to seal the RFP and MITSA in
their entireties and to seal a portion of the Counter-Complaint. However, the Court
allowed OneAmerica to attempt to make a sufficient showing that the documents and
portions thereof should be maintained under seal. [See doc. 31].
OneAmerica filed two affidavits in support of its current motion, the affidavit of
Kevin Weston, Vice President of IT Infrastructure Resource Management at OneAmerica
Financial Partners, Inc. [doc. 42-1] and the affidavit of Yaniv Schiff, Director of Digital
Forensics at Forensicon, Inc. [doc. 42-2]. Weston states that “there is good cause” to
maintain portions of the documents under seal “because they reveal sensitive details
about OneAmerica’s IT infrastructure and IT systems that increase the risk of a data
breach to OneAmerica’s IT systems.” [Doc. 42-1 at 2, ¶ 6.] He continues: “The portions
of information that OneAmerica must maintain under seal are those portions which
identify the specific software and applications that OneAmerica utilizes, specific
hardware that OneAmerica uses, OneAmerica’s vendors, OneAmerica’s regional office
3
locations, and the details of OneAmerica’s IT operations, policies and procedures.” [Id.
¶ 7.] According to Weston, “each reveals vulnerabilities and access points for hackers to
perpetrate a data breach.” [Id. at 3, ¶ 7.] The software and applications are identified by
name in portions of the MITSA, RFP, and Counter-Complaint. [Id. at 3, ¶ 8.] With
knowledge of “specific hardware information such as vendor, product name, serial
number, and model,” Weston states, “a hacker can more easily perpetrate a ‘social
engineering’ hack whereby the hacker is able to trick or manipulate a OneAmerica
employee into performing actions or divulging confidential information to the hacker”
and with knowledge of “precise devices and models” of hardware, a hacker “could
exploit known vulnerabilities in such hardware published in various locations on the socalled ‘Dark Web.’” [Id. ¶ 9.]
Weston asserts that it is important not to disclose the identity of OneAmerica’s IT
vendors and contacts because hackers could exploit vulnerabilities there to gain access to
OneAmerica’s systems. [Id. at 4, ¶ 10.] He states that the list of OneAmerica’s regional
offices should not be revealed, specially “in tandem with the identities of the specific
software, applications, and hardware operating at those locations” because hackers could
use that information to “target regional corporate locations as remote access points to
breach larger corporate networks and enterprise data centers.” [Id. ¶ 11.] Portions of the
regional locations may be perceived to have less security than OneAmercia’s
headquarters and primary enterprise data centers, and thus may be “likely hacker
targets.” [Id.] Furthermore, according to Weston, the details of OneAmerica’s “IP
operations, policies, and procedures” included in portions of the MITSA “disclose
4
OneAmerica’s highly confidential IT information, including specific passwords, system
commands, and recovery processes.” [Id. ¶ 12.] That information would give hackers
insight into OneAmerica’s recovery processes, which could reveal vulnerabilities. [Id.]
OneAmerica argues that disclosure of the above information “could assist a hacker
in exploiting vulnerabilities in [its] system to perpetrate a data breach similar to the recent
Anthem breach subjecting millions of people’s confidential personal information to
exposure.” [Id. at 5, ¶ 13.] The threat of data breaches is increased, Weston submits, “by
the fact that TSNA’s defenses and counter-claims are based in part on allegations that
OneAmerica’s IT systems are outdated and antiquated.” [Id. ¶ 14.] And because it is in
the midst “of a massive transition … to a new IT infrastructure service provider,” Plaintiff
asserts that it is unusually vulnerable to a data breach at this time. [Id. ¶ 15.] Weston
states that a data breach “would affect hundreds of thousands of OneAmerica customers
by putting their confidential personal and financial information at risk,” including their
“personally identifiable information such as social security numbers, account numbers,
and other identification numbers” and “could also expose OneAmerica’s proprietary
business data.” [Id. ¶ 16.]
In addition to being Director of Digital Forensics, Schiff is a Certified Computer
Examiner and a member of the High Technology Crime Investigation Association and
International Association of Computer Investigative Specialists. He has served as an
adjunct professor teaching computer forensics at Loyola University in Chicago, Illinois.
[Doc. 42-2 at 1 ¶¶ 2-4.] Schiff has not reviewed the RFP or MITSA, but states that he has
“a general understanding of the topics in those documents” as well as in TSNA’s
5
Counter-Complaint and OneAmerica’s Answer thereto. [Id. at 2, ¶ 6.] He asserts that
certain types of information that OneAmerica seeks to maintain under seal could assist a
hacker to breach OneAmerica’s IT systems or to obtain confidential information through
social engineering. [Id. at 2, ¶ 7.] In particular, “information identifying OneAmerica’s
software, applications, hardware, contractors and IT policies and procedures could assist
hackers in breaching [its] IT systems.” [Id.; see also id. at 2-4, ¶¶ 8-11, 13.] Further,
disclosure of OneAmerica’s regional locations, including non-office regional locations
such as data centers, which are not typically widely known or generally available to the
public, could assist hackers in breaching OneAmerica’s IT systems. [Id. at 4, ¶ 12.]
According to Schiff, OneAmerica “is already a prime target for hackers because it
is a financial institution holding personally identifiable and confidential financial
information for hundreds of thousands of customers” and it is “at an increased risk” for
being targeted for a data breach because: (1) Defendants have alleged that its IT systems
are antiquated and need to be replaced, and (2) it is presently transitioning to a new IT
service provider, “which could make it more difficult to detect and thwart a data breach.”
[Id. at 4-5, ¶ 14.] Finally, Schiff suggests that the risk is increased because information
that a hacker would otherwise have to spend time and effort gathering to assess
OneAmerica’s IT system’s security is “provide[d] in a single source information.” [Id. at
5, ¶ 14.] Both Weston and Schiff state essentially that one cannot know how a hacker
would execute a breach of OneAmerica’s IT systems. [Id. at 2, ¶ 7; doc. 42-1 at 2-3, ¶ 7.]
TSNA filed its motion to seal in order to provide OneAmerica with an opportunity
to meet the good cause standard for maintaining under seal certain information
6
contained in TSNA’s motion to bifurcate and for speedy trial as well as Exhibit 1 attached
to the motion to bifurcate. [See Sealed T-Sys. N. Am., Inc.’s Mot. Bifurcate & for Speedy Trial
on Count III of its Counterclaim, doc. 55; Billing Resolution, Termination, and Asset Purchase
Agreement and Amendment to the Master Information Technology Services Agreement”
(“Billing Agreement”), doc. 55-1.] TSNA disagrees with OneAmerica’s position that
certain agreements and information should be maintained under seal.
Discussion
“Documents that affect the disposition of federal litigation are presumptively open
to public view ... unless a statute, rule, or privilege justifies confidentiality.” In re Specht,
622 F.3d 697, 701 (7th Cir. 2010). The “right of public access … enable[s] interested
members of the public ... to know who [is] using the courts, to understand judicial
decisions, and to monitor the judiciary’s performance of its duties.” Goesel v. Boley Int’l
(H.K.) Ltd., 738 F.3d 831, 833 (7th Cir. 2013) (chambers opinion). Courts recognize limited
matters subject to seal, including trade secrets and other confidential commercial
information. See United States v. Sanford-Brown, Ltd., 788 F.3d 696, 712 (7th Cir. 2015); Fed.
R. Civ. P. 26(c)(1)(G). If material may be subject to seal, then the court weighs two
competing interests: “the moving party’s interest in privacy and the public’s interest in
transparency.” Sanford-Brown, 788 F.3d at 712.
A court may shield a document or portion thereof from the public only if there is
good cause to do so. See, e.g., Bond v. Utreras, 585 F.3d 1061, 1074 (7th Cir. 2009); Citizens
First Nat’l Bank v. Cincinnati Ins. Co., 178 F.3d 943, 945 (7th Cir. 1999). If “good cause is
shown, parties may seal documents to protect their own interests or interests of third
7
parties.” Ratajczak v. Beazley Sols. Ltd., No. 13-C-045, 2013 WL 6817308, at *1 (E.D. Wis.
Dec. 23, 2013) (citing, ineter alia, Bank of Am., N.A. v. First Mut. Bancorp of Ill., No. 09–5108,
2010 WL 2921845, at *1 (N.D .Ill. July 22, 2010) (“The court will protect financial
information about ‘third party borrowers,’ that is, people and entities who are not parties
to this case.”).
A. OneAmerica’s Motion to Seal
OneAmerica seeks to maintain under seal portions of certain documents that
identify details about its (1) software, applications, or hardware, (2) vendors, (3) regional
locations, and (4) IT policies and procedures. In responding to OneAmerica’s motion,
TSNA first contends that Plaintiff failed to identify any statute, rule, privilege, or legal
citation to justify sealing the portions of the documents at issue. While OneAmerica’s
motion and supporting brief may have been deficient in this regard, its reply brief has
cited appropriate authority. [See Pl.’s Reply, doc. 52 at 3-5 (citing cases).] Courts have
concluded that concerns about hackers and a cyber attack justified sealing information
about a company’s IT systems. See, e.g., Music Grp. Macao Comm. Offshore Ltd. v. Foote,
No. 14-CV-03078 JSC, 2015 WL 3993147, at *5-6 (N.D. Cal. June 30, 2015) (finding a
compelling reason to seal portions of exhibit discussing plaintiff’s network infrastructure
and security systems); EON Corp IP Holdings LLC v. Cisco Sys. Inc, No. 12-CV-01011-JST,
2014 WL 1017514, at *2 (N.D. Cal. Mar. 11, 2014) (finding compelling reasons to seal
portion of documents that disclose “confidential technology, product configurations,
security features, and network configurations”); In re Google Inc. Gmail Litig., No. 13–MD–
02430–LHK, 2013 WL 5366963, at *3 (N.D .Cal. Sept. 25, 2013) (sealing information about
8
how users’ interactions with the Gmail system effect the transmission of messages based
on Google’s assertions that “hackers and spammers could use this information to
circumvent Google’s anti-virus and anti-spam mechanisms”); Metavante Corp. v. Emigrant
Sav. Bank, No. 05-CV-1221, 2009 WL 637165, at *1 (E.D. Wis. Mar. 11, 2009) (granting
motion to seal email that appeared to contain “confidential information on specific types
of software used by [defendant]”).
TSNA argues that OneAmerica failed to offer an explanation as to how a hacker
would use any specific information to undertake a data breach. While Plaintiff did not
offer a specific explanation, both Weston and Schiff essentially state that it is impossible
to predict what information would be most useful for a hacker or how a hacker would
execute a breach of OneAmerica’s IT systems. TSNA criticizes Schiff for not reading the
RFP or MITSA, which he did not. Nonetheless, he states that he is familiar with the topics
in those documents, the Counter-Complaint, and the Answer thereto, and that the types of
information that Plaintiff seeks to protect could assist a hacker to breach OneAmerica’s
IT systems or obtain confidential information. The Court credits his opinions.
Zahran v. Trans Union Corp., No. 01–cv–1700, 2002 WL 31010822, at *3 (N.D. Ill.
Sept. 9, 2002), TSNA maintains, supports its position that Plaintiff has failed to justify the
sealing of any document. In that case the defendant moved the court to enter a protective
order and to seal certain exhibits and statements in the pleadings, which it argued
contained trade secrets and other confidential commercial information. Id. at *1. The
exhibits at issue contained portions of the defendant’s consumer relations center Dispute
Training Guide and subscriber agreements entered into between the defendant and
9
several of its customers. Id. at *2. The defendant argued that anyone who gained
unauthorized access to its consumer relations system “could alter the consumer credit
database using the information contained in the Dispute Training Guide,” thus
compromising the database. Id. The court “decline[d] to grant a protective order because
of the remote possibility that someone could hack into the database and alter information,
possibly using the information gleaned from the Dispute Training Guide,” reasoning that
“[o]nce the hackers gain access, the integrity and security of [the defendant’s] system is
already compromised.” Id. at *3. Thus, the defendant attempted to justify sealing
documents based on what a hacker could do after a hacker already had gained access.
Here, in contrast, OneAmerica argues that a seal is appropriate in order to prevent a
hacker from gaining access in the first place. Further, Zahran was decided in 2002, more
than thirteen years ago, and before the recent data breaches that occurred at Target,
Anthem, and even the government. While there was a risk of data breaches then, the risk
is of an even greater concern now. And, as Plaintiff argues, the risk of exposure includes
a risk to the confidential personal and financial information of hundreds of thousands of
its customers, including personally identifiable information such as social security
numbers and account numbers.
TSNA also challenges OneAmerica’s attempt to seal information already in the
public domain. There is less justification for protecting information that is already public.
See Kingery v. Quicken Loans, Inc., No. 2:12-CV-01353, 2014 WL 1794863, at *4-5 (S.D.W.
Va. May 6, 2014) (stating the need was not compelling). Here, however, the Court is
persuaded by the assertion that the risk would be heightened because information a
10
hacker would otherwise have to spend time and effort to obtain is “provide[d] in a single
source information.” As OneAmerica notes, under Indiana law, a compilation can
constitute a trade secret or be commercially valuable even if its individual component
parts would not be. See Ind. Code § 24-2-3-2 (defining “trade secret” under the Indiana
Uniform Trade Secret Act to include a compilation of information); N. Elec. Co. v. Torma,
819 N.E.2d 417, 426-29 (Ind. Ct. App. 2004) (concluding that compilation of data, some of
which was already in the public domain, was entitled to trade secret protection). While
some information that Plaintiff seeks to protect may be public, for example, the location
of its regional offices, it does not appear that information about where OneAmerica’s data
centers and servers are located is also public. Further, it is the compilation of information
about OneAmerica’s IT systems that OneAmerica seeks to protect.
Moreover, the Court agrees that at this stage of the litigation it is unclear that the
information in the RFP and MITSA sought to be protected will be at issue in this action.
Thus, the public interest in disclosure of the information relating to OneAmerica’s IT
systems is weak. See, e.g., In re Google Inc. Gmail Litig., 2013 WL 5366963, at *3 (noting that
the public interest in the disclosure of the information is not strong where the material
“is unlikely to be critical to the substantive issue of liability”). If identification of the
software, applications, hardware, vendors, regional locations, and IT policies and
procedures becomes critical to the substantive issues in this case, the Court may reweigh
OneAmerica’s interest in privacy and the public’s interest in transparency.
11
Plaintiff asks the Court to seal all of Schedule Y to the MITSA regarding
OneAmerica’s IT operations, policies, and procedures. It argues that the section of the
MITSA reporting such information reveals its “highly confidential information,”
including specific passwords, system commands, and recovery processes. [Pl.’s Br. Supp.,
doc. 42 at 13.] TSNA does not object to redacting specific passwords, system commands,
and recovery processes within Schedule Y. The Court would agree that the portions of
Plaintiff’s IT operations, policies, and procedures should be maintained under seal.
However, Schedule Y has not been filed with the Court and thus there is nothing to seal
and no way to verify the contents of Schedule Y. Although the record suggests that the
MITSA has Schedules identified as Schedule A through Schedule BB, the documents filed
with the Court only contain schedules up to Schedule I. [See doc. 7-1 at 13; docs. 7-1
through 7-6.] It seems that perhaps the entire state court record has not been filed with
this Court. The parties should verify that the entire record has been filed, and if not, then
they should take steps to remedy any omission.
Lastly, TSNA contends that Plaintiff seeks to conceal information about
OneAmerica’s wrongful conduct rather than seeking to seal actual trade secret or
confidential business information. The Court’s review of the allegations of the CounterComplaint and Answer to the Counter-Complaint that Plaintiff seeks to seal suggests that
this may be accurate. Defendants point to one example: “while OneAmerica claims this
Court should redact portions of paragraphs 8, 10, 15 and 38 of the Counter-Complaint
because they specifically identify data center locations, OneAmerica then seeks to redact
12
information well beyond the identity of the locations.”1 [TSNA’s Resp. Br., doc. 46 at 10.]
The Court’s review of the unredacted Answer to Counter-Complaint [doc. 33] as compared
to the redaction thereto [doc. 35] confirms this to be true. It seems that OneAmerica may
have been overzealous in redacting information from its Answer to the Counter-Complaint,
redacting more information than it indicates that it seeks to protect.
The same criticism can be made with respect to the other paragraphs of the
Counter-Complaint and Answer (docs. 19 and 33) that OneAmerica seeks to protect.
Plaintiff asserts that it seeks to protect the locations of its data centers and the identities
of some of its applications, which the Court agrees should be protected, but
OneAmerica’s redaction goes well beyond those pieces of information.
OneAmerica asserts that it also seeks to protect “potential vulnerabilities” in its
applications, servers, and data centers. But this appears to be an effort to protect the
allegations of its alleged wrongful conduct. Thus, no information shall be redacted from
paragraphs 27 and 28, and only the name of the city shall be redacted from paragraph 37.
In addition, OneAmerica may redact the following information from the
corresponding paragraphs OneAmerica’s Answer to the Counter-Complaint: from paragraph
10, line 3, the words after “network” through the end of the first sentence; and from
paragraph 36, the names of the two cities and one state.
Paragraph 37 of the Counter-Complaint also mentions the location of a data center, and it was
redacted in document 35.
1
13
B. TSNA’s Motion to Seal
Turning to TSNA’s motion, OneAmerica filed a response in partial support of
TSNA’s motion to seal. [Doc. 66.] The response states that TSNA’s Motion to Bifurcate
does not contain any specific information about OneAmerica’s IT systems, and thus,
OneAmerica does not seek to seal that motion. A proposed redacted version of the Billing
Agreement was submitted with the response. [See doc. 66-1.] OneAmerica argues that
information that could put OneAmerica’s and its customers’ information at risk should
not be exposed “particularly where that information is not central to the issues that have
been briefed.” [Pl. OneAmerica Finan. Partners, Inc.’s Br. Partial Support TSNA’s Mot. Seal,
doc. 66 at 2.] TSNA’s Motion to Bifurcate concerns Section 1.1 of the Billing Agreement.
OneAmerica asserts that the specific IT software and assets identified later in the
Agreement are not at issue, and the parties’ briefing has not cited any sections or
schedules that reference them. Therefore, it seems that redaction in lieu of filing under
seal in accordance with Local Rule 5-11(c) is appropriate. See S.D. Ind. L.R. 5-11(c)(2)
(“When any of the confidential information in a document is irrelevant or immaterial to
resolution of the matter at issue, the filing party may redact, by blacking out, the
confidential information in lieu of filing under seal.”) The parties and the Court should
refer to the redacted copy of the Billing Agreement that is attached to Plaintiff OneAmerica
Financial Partners, Inc.’s Brief in Partial Support of TSNA’s Motion to Seal [see doc. 66-1.]
However, the unredacted copy of the Billing Agreement, which is attached to TSNA’s
Motion to Bifurcate and for Speedy Trial on Count III of Its Counterclaim, shall be maintained
under seal.
14
Conclusion
For the foregoing reasons, the Court GRANTS IN PART AND DENIES IN PART
Plaintiff’s Motion to Maintain Certain Portions of Documents under Seal [doc. 41]:
(1) The sealed documents that are part of Electronic Filing Nos. 6 and 7 in this case [see
docs. 6-1 through 6-4 and 7-1 through 7-6] shall be maintained under seal;
(2) Exhibit A to TSNA’s Counterclaims, Excerpt from TSNA Application Collection Worksheets
[doc. 19-1] shall be maintained under seal;
(3) Electronic Filing Nos. 19 and 33 shall be maintained under seal; and
(4) Within 14 days of this date, the parties shall file new redacted versions of the CounterComplaint [doc. 19] and Answer to the Counter-Complaint [doc. 33], respectively,
redacting the following:
¶ 8, in the third line, the six words between “in” and “and,” which identify the location
of one of the data centers;
¶ 10, the words following “primarily housed” through the end of the sentence;
¶ 15, the entire parenthetical at the end of the sentence;
¶ 26, the three names of the applications contained in the parenthetical in line 3 and
the name of the city in line 5;
¶ 34, the name of the city and state in line 6;
¶ 36(B), the name of the city in line 1;
¶ 36(C), the names of the two cities and one state;
¶ 37, the name of the city in the last line;
¶ 38, the city and state identified on the second line;
15
¶ 54, the identities of the three applications at the end of the sentence; and
Exhibit A to the Counter-Complaint.
No information shall be redacted from ¶¶ 27, 28, and 36(A) and (D); and
The following shall be redacted from corresponding paragraphs of the Answer to
Counter-Complaint:
¶ 10, line 3, the words after “network” through the end of the sentence; and
¶ 36, the names of the two cities and one state.
The Court GRANTS IN PART AND DENIES IN PART TSNA’s Motion to Seal Its
Motion to Bifurcate and for Speedy Trial on Count III of Its Counterclaim [doc. 56]. The
unredacted copy of the Billing Agreement [doc. 55-1] shall be maintained under seal and
OneAmerica’s proposed redacted Billing Agreement [doc. 66-1] shall be substituted for the
unredacted version in the public record. The Motion to Bifurcate [doc. 55] shall be
unsealed in 14 days.
SO ORDERED: 03/09/2016
Electronic Distribution to All Counsel of Record
16
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?