High Point Sarl v. Sprint Nextel Corporation et al
Filing
737
MEMORANDUM AND ORDER denying 592 Motorola's Motion for a Protective Order. Signed by Magistrate Judge David J. Waxse on 2/14/2012. (byk)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF KANSAS
HIGH POINT SARL,
Plaintiff and Counterclaim
Defendant,
v.
SPRINT NEXTEL
CORPORATION, et al.,
Defendants and
Counterclaimants.
)
)
)
)
)
)
)
)
)
)
)
)
CIVIL ACTION
Case No. 09-2269-CM-DJW
MEMORANDUM AND ORDER
Pending before the Court is the Motion for a Protective Order (ECF No. 592) filed by nonparty Motorola Solutions, Inc. (“Motorola”). It requests further protective order protections under
Fed. R. Civ. P. 26(c) and sanctions under Fed. R. Civ. P. 37(b)1 based upon High Point’s alleged use
of confidential documents produced by Motorola in this case to support co-pending patent litigation
in Japan, in violation of the Protective Order entered in this case. As explained below, the motion
is denied.
I.
Background Facts
In December 2008, High Point SARL (hereinafter “High Point”) filed this patent
infringement case against Sprint Nextel Corporation, Sprint Spectrum L.P., SprintCom, Inc., Sprint
Communications Company L.P., Sprint Solutions, Inc., APC PCS, LLC, APC Realty and Equipment
Company, LLC, and STC Two LLC (collectively referred to as “Sprint”). High Point alleges that
1
In its reply (ECF No. 611), Motorola limits its discussion to Fed. R. Civ. P. 26(c) and states
it is not seeking to have High Point’s counsel held in contempt. The Court will therefore limit its
consideration of the motion to Rule 26(c).
Sprint’s cellular CDMA telephone networks infringe upon the four following United States patents
assigned to High Point: Patent No. 5,195,090; Patent No. 5,305,308; Patent No. 5,184,347; and
Patent No. 5,195,091 (collectively the “patents-in-suit”). The patents-in-suit are directed to
telecommunications equipment for a wireless cellular telephone network. Non-party Motorola is
connected to this case because it supplies infrastructure components to Sprint’s cellular telephone
networks that High Point alleges infringe the patents-in-suit.
A.
High Point’s Patent Infringement Case Against KDDI in Japan
At the same time High Point commenced this action, it also brought suit for patent
infringement against KDDI Corporation (“KDDI”) before the Tokyo District Court, alleging that
KDDI’s wireless telecommunications system infringes its Japanese Patent No. 2588498. High
Point’s Japanese patent is a foreign counterpart to one of the patents-in-suit.
In the Japanese proceedings, telecommunications company KDDI asserted a defense of noninfringement based, in part, on the operation of network infrastructure equipment it purchased from
Motorola.
In support of its defense, KDDI submitted two declarations from Motorola’s Senior
Staff Engineer, Michael J. Kirk, describing the operation of KDDI’s network. After KDDI
submitted the first Kirk declaration, the Tokyo court on July 28, 2010 asked KDDI to provide further
information concerning the packet transmission timing of the Motorola equipment. In response, in
September 2010, KDDI offered the second Kirk declaration. On October 15, 2010, the Tokyo court
again requested that KDDI to provide further information concerning packet transmission timing
operation of the Motorola equipment.
B.
Pertinent Protective Order Provisions
The Protective Order entered on June 23, 2009, and amended on December 14, 2010,
2
provides that “Confidential Materials shall be used solely for the purposes of this Action and shall
not be used for any other purpose except as expressly provided herein or by further Order of the
Court.”2 It defines “Confidential Materials” as “[d]ocuments and/or information containing
confidential research, development, marketing, financial and/or competitive information and/or trade
secrets.”3 The Protective Order further provides that it applies to “all Confidential Information
subject to discovery in this Action produced either by a party or non-party in discovery in this
Action.”4 It sets out three tiers of confidentiality: (1) Confidential, (2) Highly Confidential-Outside
Counsel Only, and (3) Highly Restricted Confidential-Source Code. The Protective Order also
provides that “[t]he restrictions on the use of Confidential Materials established by this Protective
Order are applicable only to the use of information received by a party from another party or from
a nonparty. A party is free to use its own information as it pleases.”5 To the Court’s knowledge,
Motorola was not consulted, nor did it participate in, the parties’ drafting and submission of the
Protective Order.
C.
Motorola’s Involvement in this Case
After being served with a subpoena in July 2010, Motorola began producing documents in
October 2010. Motorola had previously filed a motion to intervene for the limited purpose of
moving to disqualify High Point’s lead counsel, Dechert LLC (“Dechert”). The Court denied the
motion but required High Point to obtain special, separate conflicts counsel to handle any discovery
2
First Am. Protective Order (ECF No. 498) at 20, ¶ 25.
3
Id. at 2.
4
Id. at 3, ¶ 1.
5
Id. at 16, ¶ 17.
3
directed at Motorola.6 In April 2010, High Point obtained conflicts counsel, Paul Milcetic, who was
then with the law firm Woodcock Washburn, LLP and later joined the law firm of Barroway Topaz
Kessler Meltzer & Check (“BTKMC”). On January 18, 2011, the Court clarified its prior ruling on
the disqualification of High Point’s lead counsel, Dechert.7 The Court clarified that Dechert could
not take or direct any discovery at Motorola, but was not prohibited from reviewing documents
provided by Motorola to High Point or Sprint or from reviewing Motorola-related documents.
On February 4, 2011, High Point’s conflicts counsel sent a letter to Motorola requesting
permission to allow High Point to provide its counsel in Japan with six Motorola documents for use
in the Japanese KDDI litigation. The asserted purpose in seeking access to the documents was to
“reveal the truth about the Kirk declarations” submitted in the Japanese KDDI litigation. The six
documents sought were designated as “Highly Confidential-Outside Counsel Only” under the
Protective Order entered in this case. On February 9, 2011, Motorola declined the request to allow
High Point to use confidential Motorola documents produced in this case in the Japanese KDDI
litigation. On February 14, 2011, High Point’s conflict’s counsel responded that High Point
disagreed with Motorola’s accusations that it analyzed Motorola’s documents to support the
Japanese KDDI litigation. He further stated that:
Nevertheless, High Point will honor Motorola’s demand that High Point not disclose
the documents to its counsel in Japan and can confirm that all of High Point’s
counsel in the case against Sprint will comply with the above-quoted provision of the
protective order. High Point’s counsel will not use discovery obtained from Motorola
in the Sprint case for any purpose other than the Sprint case.8
6
See Mar. 25, 2010 Mem. & Order (ECF No. 239).
7
See Jan. 18, 2011 Mem. & Order (ECF No. 514).
8
Ex. B to Mot. for Protective Order (ECF No. 593-4).
4
On February 18, 2011, High Point, through its conflicts counsel BTKMC, filed an ex parte
application in the Northern District of Illinois under 28 U.S.C. § 1782 seeking permission to
subpoena Motorola for documents and testimony for use in the Japanese litigation against KDDI.9
The court granted the motion on February 23, 2011.10 High Point thereafter served Motorola with
a subpoena dated February 28, 2011, requesting, inter alia, documents sufficient to show the
identity, operation and components of the Motorola equipment that controls or influence the timing
of packet transmission and voice traffic in KDDI’s cellular network in Japan. Motorola then filed
this motion for a protective order against High Point.
II.
Alleged Violations of the Protective Order
Motorola contends that High Point’s conflicts counsel BTKMC and/or its lead counsel
Dechert violated the Protective Order in this case two times by using Motorola documents produced
in this case for purposes of the Japanese KDDI litigation. According to Motorola, the first violation
occurred when High Point’s counsel reviewed and analyzed confidential documents produced in this
case in order to identify at least six documents that allegedly relate to the two Kirk declarations
submitted in the Japanese KDDI litigation. By the time High Point sent its February 4, 2011 letter
to Motorola, Dechert and/or BTKMC had already identified six specific documents, out of hundreds
of thousands of documents produced by Motorola under the Protective Order, that allegedly include
information relating to the Kirk Declarations. Motorola argues that BTKMC had analyzed the six
documents against the Kirk Declarations in sufficient detail that it had formed the belief that those
9
Under 28 U.S.C. § 1782, federal district courts are authorized to assist foreign litigants and
interested parties in gathering evidentiary materials for use in foreign legal proceedings.
10
In re Application of High Point SARL for an Order to Conduct Discovery for Use in a
Foreign Legal Proceeding Pursuant to 28 U.S.C. § 1782, No. 11-cv-143 (N.D. Ill. Feb. 23, 2011).
5
documents provide information it can use to impeach Mr. Kirk’s statements and would tell “the truth
about the Kirk declarations.” Motorola argues that “[i]t is self-evident that High Point’s counsel had
to search through hundreds of thousands of documents produced by Motorola to locate the six it
thought most promising and identified in BTKMC’s February 4 letter. Those documents were never
specifically mentioned in any discovery request or response in this case.” Motorola points out that
High Point’s search also was not just a cursory review of Motorola’s documents. For example,
among the six documents BTKMC’s letter identifies, one is only a single page from a
several-hundred page document. An extensive analysis was needed to pluck that page out of
Motorola’s production.
Motorola claims that the second violation occurred when High Point’s counsel used
information from Motorola documents in order to help craft the ex parte application in the Northern
District of Illinois seeking permission under 28 U.S.C. § 1782 to subpoena Motorola for documents
and testimony for use in the Japanese litigation against KDDI. This was four days after High Point’s
counsel assured Motorola that it would honor Motorola’s request to keep the Motorola documents
out of the Japan proceeding. Motorola claims that 1782 application was undoubtedly based on and
motived by information gathered from Motorola’s protected materials. The stated purpose of High
Point’s 1782 Application was to rebut evidence that Motorola has itself provided in the KDDI
litigation.
Motorola also argues the timing of High Point’s request for permission to use Motorola
documents and 1782 subpoena application strongly suggests that High Point sought that particular
discovery based on information it gathered during its review of Motorola’s confidential and
protected documents in this case. High Point’s February 4 letter requesting permission to use
6
particular Motorola documents was only two weeks after the Court clarified that Dechert could
review Motorola documents. High Point’s lead law firm, Dechert, which has been advising High
Point on the KDDI case and attending the Japanese Court hearings, knew of the First Kirk
Declaration since April 2010 and the Second Kirk Declaration since September 2010. Dechert,
however, did not seek U.S. discovery from Motorola for use in Japan during the intervening months.
Only after Motorola began its production in October 2010, and only after Dechert was given access
to those documents on January 18, 2011, did High Point request discovery from Motorola in the U.S.
on February 4. Motorola asserts that the timing of the filing therefore strongly indicates that High
Point used knowledge it obtained from its counsel’s review of Motorola’s confidential documents
in mid-January for its 1782 Application filed on February 18, 2011.
High Point denies that there have been any protective order violations. It asserts that it did
not use any confidential Motorola documents except for purposes of this action. It claims that its
counsel did not analyze confidential Motorola documents to support the proceedings in Japan. It did
not seek discovery in aid of the Japan proceedings based upon the Motorola documents. Instead, the
discovery it sought from Motorola for the Japan case is based upon questions the Tokyo court
explicitly raised, and the language it used in crafting its discovery requests is based upon its own
patents. It explains that its conflicts counsel, BTKMC, reviewed and identified the documents in
its February 4, 2011 letter because they show that when Sprint uses Motorola equipment it infringes
the asserted patents, including one of the patents in this case. BTKMC also reviewed the two Kirk
Declarations for this case against Sprint, which are not confidential and were publically available
in April and September 2010.
With regard to its requests seeking permission to serve discovery on Motorola for the Japan
7
KDDI litigation, High Point contends that this was not a violation of the protective order. It states
that its motivation for the 1782 application was based upon KDDI’s persistent failure to supplement
the Kirk declarations as requested by the Tokyo Court. High Point further claims that its requests
for discovery from Motorola were crafted around its own patent, as well as the requests for
information that the Tokyo Court had repeatedly directed at KDDI. High Point’s document requests
seek further information concerning the Kirk declaration as well as the operation of Motorola’s
equipment when it addresses “packet delay,” “jitter” and packet transmission timing. These phrases
are lifted from High Point’s patents and the Tokyo Court’s requests to KDDI for further information
about the operation of the Motorola equipment.
III.
Fed. R. Civ. P. 26(c) Protective Order
Motorola requests a protective order under Fed. R. Civ. P. 26(c) prohibiting High Point from
using any documents produced by Motorola in this case in High Point’s Japanese KDDI litigation,
prohibiting High Point from seeking any discovery from Motorola in support of the KDDI case, and
prohibiting High Point’s conflicts counsel from seeking any additional discovery from Motorola in
this case. Although neither High Point or Motorola raises or discusses the issue, the Court first must
determine whether Motorola, who is not a party in this case but whose confidential documents are
subject to protection under the protective order, has standing to move under Rule 26(c) for additional
protections against High Point regarding the documents it produced in this case.
Under Federal Rule of Civil Procedure 26(c), “[a] party or any person from whom discovery
is sought may move for a protective order in the court where the action is pending.” Upon a
showing of good cause, the court may limit the scope of the disclosure or discovery to certain
matters or require that confidential research, development or commercial information be revealed
8
only in a specified way.11 Based upon High Point and Sprint’s showing of good cause, the Court
entered their proposed Protective Order and later their First Amended Protective Order, which limits
the use of confidential information produced by either a party or a non-party.
Generally, parties to a lawsuit may disseminate information obtained through discovery as
they see fit,12 and discovery is not restricted to the case for which it was produced.13 As Judge
Rushfelt noted in Zapata v. IBP, Inc., the drafters of the rules of civil procedure “could easily have
included a restriction that use of discovery is limited to the litigation in which it is provided, were
such their intent.”14 Instead, the rules “contemplate individualized protection when appropriate upon
a showing of good cause.”15 Upon entry of a protective order under Rule 26(c), however, the parties’
dissemination and use of confidential information become controlled by the terms of the protective
order, and the parties must comply with the terms of the protective order or subject themselves to
possible sanctions.16 In this case, the parties have included confidential documents produced by
non-party Motorola within the scope of the protective order.
Motorola now requests further protections based upon High Point’s violations of the current
protective order through its alleged use of Motorola documents for purposes other than this
11
Fed. R. Civ. P. 26(c)(1)(D) & (G).
12
American Nat’l Bank & Trust Co. of Chicago v. AXA Client Solutions, LLC, No. 00 C 6786,
2002 WL 1067696, at *3 (N.D. Ill. May 28, 2002) (citing Jepson, Inc. v. Makita Elec. Works, Ltd.,
30 F.3d 854, 858 (7th Cir. 1994)).
13
Roberts v. Shawnee Mission Ford, Inc., Nos. 01-2113-CM, 02-2536-CM, 2003 WL
22290237, at *2 (D. Kan. Sept. 25, 2003).
14
Zapata v. IBP, Inc., 160 F.R.D. 625, 628 (D. Kan. 1995).
15
Id.
16
American Nat’l Bank, 2002 WL 1067696, at *3.
9
litigation. The Court finds that Motorola is entitled to move the Court for a protective order under
Rule 26(c). That Rule expressly provides that either a party or “any person from whom discovery
is sought” may move for a protective order. This clearly contemplates that non-parties from whom
discovery is sought, like Motorola here, can move for a protective order under Rule 26(c). At least
one court has recognized that objecting non-parties have a legitimate interest in obtaining a
protective order to protect their confidential commercial documents from disclosure.17 Motorola has
a legitimate interest in protecting the confidential documents it produced in this action and that are
subject to the protective order’s restrictions on use of confidential documents outside this case.
A.
Specific Relief Requested by Motorola
Motorola requests very specific relief in its motion – all based upon High Point’s alleged
improper “use” of documents produced by Motorola for purposes of the KDDI litigation. It requests
that the Court issue a protective order: (1) prohibiting High Point from using in its Japanese KDDI
ligation any Motorola documents produced in this case, (2) prohibiting High Point from seeking,
directly or indirectly, any discovery from Motorola in support of the KDDI case, and (3) prohibiting
High Point’s conflicts counsel from seeking any additional discovery from Motorola in this case.
Before addressing whether Motorola has shown good cause, which would include a showing that
High Point improperly “used” Motorola documents produced in this case in violation of the
Protective Order, the Court will first address whether Motorola can obtain the specific relief it seeks.
17
See In re Northshore Univ. Healthsystem, 254 F.R.D. 338, 342-43 (N.D. Ill. 2008)
(objecting non-parties had a legitimate interest in obtaining a protective order to protect their
confidential commercial documents from disclosure).
10
1.
Order Prohibiting High Point from Using Any Motorola Documents
Produced in this Case in the Japanese KDDI Litigation
Motorola asserts that good cause exists for an order prohibiting High Point from using in the
Japanese KDDI case any Motorola documents produced in this case. The Court, however, notes that
the existing Protective Order already contains this prohibition that confidential Motorola documents
are only to be used for purposes of this action and not for any other purpose, which would include
High Point’s use in the Japanese KDDI litigation. High Point has not moved to modify or amend
the Protective Order to change this prohibition on use of Motorola documents outside this litigation.
It has instead informally requested Motorola’s permission to use documents produced by Motorola
in this case in the KDDI litigation; Motorola, however, has denied that request. High Point has also
requested and obtained permission from the Northern District of Illinois to subpoena Motorola’s
documents for use in the KDDI litigation. Motorola contends that these actions by High Point
constitute a violation of the Protective Order and establish good cause for the further protections it
seeks.
The Court finds that even if Motorola had shown good cause for its request for a protective
order prohibiting High Point from using in its Japanese KDDI ligation any Motorola documents
produced in this case, the relief it seeks is redundant as the existing Protective Order already
prohibits High Point from using Motorola documents produced in this case for any purpose other
than this case. Motorola’s request for an order prohibiting High Point from using in its Japanese
KDDI ligation any Motorola documents produced in this case is therefore denied.
2.
Order Prohibiting High Point from Seeking Any Discovery from
Motorola in Support of the KDDI Case
Motorola also requests that the Court enter an order prohibiting High Point from enforcing
11
the 1782 subpoena or seeking, directly or indirectly, any further discovery from Motorola in support
of the KDDI litigation. It asserts that the Court should prohibit High Point from obtaining any
discovery under the 1782 Subpoena or filing any further applications under 28 U.S.C. § 1782, or any
other process, to seek information from Motorola for use in the KDDI case, regardless of what
counsel High Point hires. Such an order is necessary to ensure that High Point receives no benefit
from its violations of the Protective Order. In addition, absent such an order, High Point may simply
hire new counsel to file another Section 1782 application seeking the same documents or may use
some equivalent process to achieve an equivalent result.
Recognizing that this request may be viewed as having the effect of quashing the 1782
subpoena issued by the Northern District of Illinois, Motorola argues that this Court has jurisdiction
to enter such an order because the issues involved in the instant motion extend beyond the specifics
of that particular subpoena and the requested ruling is necessary to ensure that discovery provided
in this case will receive uniform treatment. It argues that adherence to the provisions of the
Protective Order is an issue with implications that stretch well beyond the 1782 Subpoena. High
Point has subpoenaed a number of Sprint’s vendors in this case, all of which have produced
confidential information to High Point in reliance on the Protective Order.
Motorola’s requested relief goes too far. It essentially asks the Court to quash the 1782
subpoena issued by the Northern District of Illinois. As Motorola itself recognizes, this Court does
not have the authority to quash or modify the 1782 subpoena. Fed. R. Civ. P. 45(c)(3)(A) clearly
provides that “the issuing court must quash or modify a subpoena” under certain circumstances.18
18
Emphasis added.
12
As noted by this Court in Pro Fit Management, Inc. v. Lady of America Franchise Corp.,19 and
Rajala v. McGuire Woods, LLP,20 courts have uniformly held that only the issuing court has the
authority to quash or modify a subpoena. “This is the rule because subpoenas issued under Rule 45
constitute process of the issuing court, and are enforced by that same court.”21 The court in which
the action is filed thus lacks jurisdiction to rule on subpoenas issued from other courts.22
Motorola cites Rajala for the proposition that this Court has jurisdiction to enter an order
which has the effect of quashing the 1782 Subpoena because the issues involved in the instant
motion extend beyond the specifics of that particular subpoena and the requested ruling is necessary
to ensure that discovery provided in this case will receive uniform treatment. The Court in Rajala,
held that:
[W]hen a party files a motion for protective order in this Court that would have the
effect of quashing or modifying a subpoena issued from another district, this Court
may entertain that motion where (1) the issues raised are central to the case and
extend beyond the specifics of the particular subpoena, and (2) the requested ruling
is necessary to insure that general discovery issues will receive uniform treatment,
regardless of the district in which the discovery is pursued.23
The principles set forth in Rajala for when a court can or should entertain a motion for protective
order that would modify or quash a subpoena, however, are not applicable here because the 1782
subpoena relates to different litigation altogether. The 1782 subpoena does not stem from this
litigation, but instead relates to discovery sought for High Point’s Japanese KDDI ligation.
19
No. 08-CV-2662-JAR/DJW, 2011 WL 765836, at *2 (D. Kan. Feb. 25, 2011).
20
No. 08-2638-CM-DJW, 2010 WL 4683979, at *7 (D. Kan. Nov. 12, 2010).
21
Id.
22
Id.
23
Id.
13
Nor does this Court have any authority to prohibit High Point from seeking discovery in the
Japanese KDDI litigation, even if the protective order entered in this case prohibits High Point from
using confidential documents produced by Motorola in this case in the KDDI litigation. The Court’s
authority over High Point’s discovery devices is limited to those made in this case and does not
extend to what discovery High Point may decide to seek in other litigation, including the KDDI
litigation. The fact that the Court entered a protective order, one that was prepared and submitted
by High Point and Sprint and which included a prohibition on using documents produced by nonparty Motorola in this case, does not extend the Court’s authority outside this litigation. Even if the
Court were to find that High Point actually violated the protective order, the Court still does not have
the authority to grant the specific relief sought in the KDDI litigation and the 1782 subpoena for
discovery related to that litigation. Motorola’s requests that the Court enter an order prohibiting
High Point from enforcing the 1782 subpoena or seeking, directly or indirectly, any further
discovery from Motorola in support of the KDDI litigation is therefore denied.
3.
Order Prohibiting High Point’s Conflicts Counsel from Seeking Any
Additional Discovery from Motorola in this Case
Motorola also requests an order prohibiting High Point’s conflicts counsel, BTKMC, from
taking any additional discovery from Motorola in this case. It asserts that it should not be required
to hand over to BTKMC some of its most confidential information – its source code – or any further
discovery that includes confidential information due to the risk of further improper use and
disclosure by BTKMC. It has concerns that additional confidential materials will be reviewed or
mined for information that BTKMC might perceive as useful in other contexts. Motorola indicates
that BTKMC has yet to receive access to its source code, which contains particularly sensitive
information that should not be used except under the very limited circumstances permitted in the
14
protective order. Motorola clarifies in its reply brief that it is not seeking to disqualify BTKMC,
but only asking that BTKMC be prohibited from further pursing additional discovery from Motorola
in this case.
Proceeding under Rule 26(c), Motorola must show good cause for the protections it seeks.
Unlike the previous two requests for relief, the Court does not see any reason preventing it from
ordering the relief sought as long as Motorola makes the requisite showing of good cause. In this
context, where a non-party seeks additional protections based upon a party’s alleged improper use
of its confidential documents, good cause requires a showing that High Point actually violated the
protective order with regard to confidential documents produced by Motorola in this case.
High Point and Motorola spend much of their briefing arguing over whether High Point has
“used” Motorola documents for purposes of the KDDI litigation, and thus violated the protective
order in this case. The Court is not wholly convinced that High Point “used” the Motorola
documents produced in this case for purposes of the KDDI litigation when it requested Motorola’s
permission to use certain documents in the KDDI litigation or when it crafted its 1782 application
to subpoena Motorola’s documents for the KDDI litigation. The Court begins by reviewing the
controlling document here — the First Amended Protective Order. It does not define or provide any
guidance on what constitutes a proper or improper “use” of documents designated as confidential.
The protective order merely states that “Confidential Materials shall be used solely for the purposes
of this Action and shall not be used for any other purpose except as expressly provided herein or by
further Order of the Court.”24
The Court next looks to caselaw for guidance in determining what constitutes “use” of
24
First Am. Protective Order (ECF No. 498) at 20, ¶ 25.
15
confidential documents in other litigation. High Point cites to a 2008 District of Nebraska opinion,
Streck, Inc., v. Research & Diagnostic Systems, Inc.,25 as instructive on this issue. Motorola argues
that Streck is very distinguishable because the court there focused on a party’s mere “general
reference” to protected documents in another proceeding. The Court finds Streck, while not exactly
on point or binding authority, is helpful. In that case, the defendants sought sanctions against the
plaintiff for violating the protective order by its impermissible “use” of confidential documents in
an interference proceeding. The defendants argued that the plaintiff sought the discovery in the
interference proceeding only due to knowledge gained from exposure to the protected documents.
The protective order provided that confidential information could only be used for purposes of that
action and was protected from any unauthorized or unrelated use. The court concluded that the
defendants were straining the term “use” and that it was speculative to assume that actions taken in
the interference proceeding were based upon counsel’s knowledge of confidential materials.26 It
found no violation of the protective order.
Motorola cites a couple cases where courts have found violations of protective orders based
upon improper use rather than disclosure of confidential information. In On Command Video Corp.
v. LodgeNet Entertainment Corp.,27 the Northern District of California court found that the plaintiff
had violated the protective order by using confidential discovery materials obtained in the case for
the purpose of initiating a separate state court lawsuit against the defendant. The court overruled
the magistrate judge’s determination that there was no violation based upon the lack of an express
25
250 F.R.D. 426, 434-35 (D. Neb. 2008).
26
Id. at 435.
27
976 F. Supp. 917, 921 (N.D. Cal. 1997).
16
provision prohibiting the filing of a subsequent action based on protected confidential information.
The court found that under a common sense, plain reading, the purpose of the protective order was
to limit use of confidential information to the case. The plaintiff’s use of the confidential
information to file a separate lawsuit thus violated the protective order.28 In American National
Bank and Trust Co. of Chicago v. AXA Client Solutions, LLC,29 the Northern District of Illinois
found that one of the defendants had used information designated as high confidential for purposes
unrelated to the defense of the lawsuit in violation of the protective order. In that case, one of the
plaintiffs sought sanctions based upon four alleged violations of the protective order. It alleged that
the defendant based certain deposition questions on information contained in confidential
documents, it sent a letter to an entity revealed in confidential documents for a business purpose, its
in-house attorney sent an email containing confidential information to an employee who was not
entitled to review confidential materials, and someone disclosed confidential information to two of
defendant’s employees who were not entitled to receive and review confidential information.30 The
court found that the defendant had violated the protective order by improperly disseminating
confidential information.31 It also found convincing the argument that the defendant had used
confidential information for purposes unrelated to the defense of the lawsuit.32
Motorola also refers the Court to the reasoning used by the Northern District of California
28
Id. at 922.
29
2002 WL 1067696, at *3.
30
Id. at *2.
31
Id. at *3.
32
Id. at *4.
17
in the case, In re eBay Seller Antitrust Litigation.33 In that case, eBay contended that plaintiff’s
counsel violated the protective order by reviewing or “mining” eBay’s confidential documents with
an eye toward evaluating the documents’ potential relevance and possible use in other litigation.
The court agreed that if counsel had reviewed or “mined” eBay’s confidential document produced
pursuant to a protective order for some purpose other than the instant litigation, this would violate
the protective order.34 The court, however, concluded that it was not clear whether an actual
violation occurred and further noted that “any such violation would be devilishly hard to police.”35
In this District, the court has addressed, as the basis for a Rule 60(b) motion to vacate the
judgment, an argument that the plaintiff had violated the protective order by using confidential
information obtained during discovery to amend its patent application. In ICE Corp. v. Hamilton
Sundstrand Corp.,36 the defendants offered circumstantial evidence in the form of billing records to
show that the plaintiffs used confidential information for the purpose of tailoring the claims of
plaintiff’s then-pending patent application – a purpose entirely unrelated to the case.37 The
defendants argued that because certain billing entries indicated that trial counsel worked on patent
issues and worked closely with plaintiff’s patent attorney during the time between production of the
documents and the patent amendment, plaintiff must have utilized the confidential documents in
amending their application. The court found that this was insufficient to show that the plaintiff had
33
No. C07-01882 JF (HRL), 2010 WL 2106004, at *1 (N.D. Cal. May 25, 2010).
34
Id. at *1.
35
Id. at *2.
36
No. 05-4135-JAR, 2010 WL 1284717, at *3 (D. Kan. Mar. 30, 2010).
37
Id.
18
violated the protective order by utilizing confidential documents for a purpose other than the case.38
High Point adamantly denies that there was any analysis or other “use” of Motorola’s
materials for purposes of the case against KDDI or for any other purpose other than this action
against Sprint. The Court finds nothing in the record that directly contradicts this statement.
Motorola argues that High Point “used” its confidential documents when High Point’s counsel
reviewed and analyzed these documents in order to identify at least six documents that allegedly
relate to the two Kirk declarations submitted in the Japanese KDDI litigation. It bases its arguments
upon the timing, wording, and specific documents requested in High Point’s request for permission.
Like the defendant in the ICE Corp. case, Motorola offers circumstantial evidence that High Point’s
counsel used its documents in drafting and creating the request for permission to use six specific
documents and in the 1782 application to subpoena the documents. But the Court is unclear whether
High Point’s improper use of these Motorola documents was the impetus or inspiration for the
request for permission from Motorola and the subsequent 1782 application. High Point claims that
its motivation for the 1782 application was based upon KDDI’s persistent failure to supplement the
Kirk declarations as requested by the Tokyo Court. Its requests for discovery from Motorola were
crafted around its own patent, as well as the requests for information that the Tokyo Court had
repeatedly directed at KDDI.
Although the Court agrees with Motorola that the wording and timing of High Point’s
request for permission and application for 1782 subpoena does raise reasonable suspicions on the
source of High Point’s knowledge of the existence of the six specifically-requested documents, the
Court cannot definitely conclude that High Point in fact impermissibly “used” confidential
38
Id.
19
documents produced by Motorola in this case for purposes of the KDDI litigation. This is partly
because Motorola-supplied infrastructure components are part of the Sprint networks accused of
infringement in this case, as well as the KDDI network accused of infringement in the Japanese
counterpart-patent litigation. There would logically be some overlap in the discovery sought from
Motorola for both cases. Motorola documents relevant and important to High Point’s case here
would also likely be relevant and important to its KDDI litigation. To find that High Point’s request
for permission and 1782 subpoena application were based upon an impermissible “use” of the
confidential documents produced by Motorola in this case requires too much speculation and
drawing of inferences from circumstantial evidence.
The Court concludes that based upon the facts presented, Motorola has not met its burden
of showing that High Point’s lead or conflicts counsel violated the protective order in this case by
using confidential Motorola documents produced in this case for the purpose of obtaining specific
Motorola documents for use in the Japanese KDDI litigation. Motorola therefore has not shown
good cause for its request for an order prohibiting High Point’s conflicts counsel from taking any
additional discovery from Motorola in this case. Motorola’s request for an order prohibiting High
Point’s conflicts counsel, BTKMC, from taking any additional discovery from Motorola in this case
is denied.
VI.
High Point’s Request for Costs and Fees Under Fed. R. Civ. P. 26(c)(3)
In response to Motorola’s motion, High Point requests its costs and fees incurred for
opposing this motion. It argues that an award of fees is warranted because Motorola’s motion is
frivolous and is not “substantially justified.” High Point claims that Motorola has failed to provide
substantial evidence that High Point violated the protective order and the motion is interposed in bad
20
faith. Motorola knew the relevant facts before filing this motion because High Point had already
explained them, but Motorola filed the motion anyway. Finally, High Point claims that Motorola
asserted this motion for the improper purpose of furthering a pattern of obstruction.
Fed. R. Civ. P. 26(c)(3) provides that Rule 37(a)(5) applies to any award of fees and
expenses related to a motion for protective order. Fed. R. Civ. P. 37(a)(5) requires that a prevailing
party recover the reasonable expenses incurred in making or defending against a discovery motion,
unless the non-prevailing party’s position was substantially justified or other circumstances make
an award of expenses unjust. A position is “substantially justified” in the context of Rule 37 “if it
is ‘justified to a degree that could satisfy a reasonable person’ or where ‘reasonable people could
differ as to the appropriateness’ of the objection or response.”39
Motorola claims that it was more than substantially justified in bringing this motion. The
February 4 letter from High Point’s counsel requesting permission to use Motorola documents in
the KDDI litigation plainly indicates that High Point analyzed Motorola’s protected materials for
purposes other than the instant case. After the exchange of correspondence on February 9, and
February 14, Motorola reasonably believed that the issue was resolved. However, four days later,
High Point filed the 1782 Application and subsequently served the 1782 Subpoena, which appears
to be based on the six documents listed in the February 4 Letter. Given High Point’s two violations,
Motorola asserts that it is fully justified in bringing High Point’s violations to the attention of this
Court and seeking a further protective order to maintain the confidentiality of its production under
the Protective Order in this case. What High Point mischaracterizes as obstructive behavior has in
39
See Gipson v. Sw. Bell Tel. Co., No. 08-2017-EFM-DJW, 2009 WL 790203, at *19 (D.
Kan. Mar. 24, 2009), objections sustained in part and overruled in part on other grounds, 2009 WL
4157948 (D. Kan. Nov. 23, 2009).
21
fact been nothing more than Motorola acting appropriately to safeguard the confidentiality of its
information.
Although Motorola failed to sufficiently show that High Point used confidential Motorola
documents produced in this case for purposes of the KDDI litigation, in violation of the protective
order, the Court finds that Motorola was substantially justified in filing its motion for protective
order. Motorola’s motion was based its reasonable concerns that High Point’s actions in seeking
permission to use specific Motorola documents in the KDDI litigation were motivated or assisted
by High Point’s counsel improper use of its confidential documents. Accordingly, the Court denies
High Point’s request that Motorola be required to pay its expenses incurred in connection with the
Motion.
IT IS THEREFORE ORDERED THAT Motorola’s Motion for a Protective Order (ECF
No. 592) is denied.
IT IS FURTHER ORDERED THAT High Point’s request for costs and fees is denied.
IT IS SO ORDERED.
Dated in Kansas City, Kansas on this 14th day of February 2012.
s/ David J. Waxse
David J. Waxse
U.S. Magistrate Judge
cc:
All counsel and pro se parties
22
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?