Intellectual Ventures II LLC v. First National Bank of Omaha
Filing
44
PROTECTIVE ORDER (stipulated) - Ordered by Magistrate Judge F.A. Gossett. (AOA)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEBRASKA
INTELLECTUAL VENTURES II LLC, a
Limited Liability Company,
Plaintiff,
Case No. 8:13-cv-00167
v.
FIRST NATIONAL BANK OF OMAHA,
Defendant.
STIPULATED PROTECTIVE ORDER
This matter is before the Court on the parties’ Motion for Entry of Protective Order
(filing 43). Having reviewed the matter, a Protective Order is entered as follows:
Proceedings and Information Governed.
1.
This Order and any amendments or modifications hereto (“Protective Order”)
shall govern any document, information or other thing furnished by any party, to any other party,
and includes non-parties who receive a subpoena in connection with this action. The information
protected includes, but is not limited to, answers to interrogatories, answers to requests for
admission, responses to requests for production of documents, deposition transcripts and
videotapes, deposition exhibits, and other writings or things produced, given or filed in this
action that are designated by a party as “Confidential,” “Confidential—Outside Attorney Eyes
Only,” or “Restricted—Confidential Source Code” in accordance with the terms of this Order, as
well as, to the extent allowed under the provisions of this order, any copies, excerpts, abstracts,
analyses, summaries, descriptions, or other forms of recorded information containing, reflecting,
or disclosing such information.
Designation and Maintenance of Information.
2.
For purposes of this Protective Order, (a) the “Confidential” designation shall
mean that the material is comprised of confidential trade secrets or commercial information
which is not publicly known and is of technical or commercial advantage to its possessor, in
accordance with Fed. R. Civ. P. 26(c)(7), or other information required by law or agreement to
be kept confidential, (b) the “Confidential Outside Attorney Eyes Only” designation shall mean
that the document is comprised of information that the producing party deems especially
sensitive, which may include, but is not limited to, confidential research and development,
financial, data security, technical, marketing, any other sensitive trade secret information, or
information capable of being utilized for the preparation or prosecution of a patent application
dealing with such subject matter, and (c) the “Restricted—Confidential Source Code”
designation shall mean that the material contains a party’s “Source Code,” which shall mean
documents containing confidential, proprietary and/or trade secret source code. Materials
designated “Confidential,” “Confidential Outside Attorney Eyes Only,” or “Restricted—
Confidential Source Code” are collectively referred to as “Protected Information.” Protected
Information does not include, and this Protective Order shall not apply to, information that is
already in the knowledge or possession of the party to whom disclosure is made unless that party
is already bound by agreement not to disclose such information, or information that has been
disclosed to the public or third persons in a manner making such information no longer
confidential and disclosure of any such information shall not be a violation of this Order.
Documents and materials marked in a manner similar to any designation of Protected
Information shall be treated as “Confidential Outside Attorney Eyes Only,” subject to any
written agreement of the parties to otherwise designate the documents and materials in question.
No party is required to include in a privilege log documents created after the filing of this case
except as provided under N.D. California Patent Local Rule 3-7.
3.
Documents and things produced during the course of this litigation within the
scope of paragraph 2(a) above, may be designated by the producing party as containing
Confidential Information by placing on each page and each thing a legend substantially as
follows:
CONFIDENTIAL
SUBJECT TO PROTECTIVE ORDER
Documents and things produced during the course of this litigation within the scope of
paragraph 2(b) above may be designated by the producing party as containing Confidential
Attorney Eyes Only Information by placing on each page and each thing a legend substantially
as follows:
CONFIDENTIAL OUTSIDE ATTORNEY EYES ONLY
SUBJECT TO PROTECTIVE ORDER
Documents and things produced during the course of this litigation within the scope of
paragraph 2(c) above shall be designated and produced in accordance with the provisions set
forth in paragraph 4 below.
A party may designate information disclosed at a deposition as Confidential, Confidential
Outside Attorney Eyes Only, or Restricted—Confidential Source Code, by requesting the
reporter to so designate the transcript or any portion thereof at the time of the deposition. If no
such designation is made at the time of the deposition, any party shall have fourteen (14)
calendar days after the date of the deposition to designate, in writing to the other parties and to
2
the court reporter, whether the transcript is to be designated as Confidential, Confidential
Outside Attorneys Eyes Only, or Restricted—Confidential Source Code. If no such designation
is made at the deposition or within such fourteen (14) calendar day period (during which period,
the transcript shall be treated as Confidential Outside Attorneys Eyes Only Information, unless
the disclosing party consents to less confidential treatment of the information), the entire
deposition will be considered devoid of Confidential Information or Confidential Outside
Attorneys Eyes Only Information. Each party and the court reporter shall attach a copy of any
final and timely written designation notice to the transcript and each copy thereof in its
possession, custody or control, and the portions designated in such notice shall thereafter be
treated in accordance with this Protective Order.
It is the responsibility of counsel for each party to maintain materials containing
Confidential, Confidential Outside Attorneys Eyes Only, or Restricted—Confidential Source
Code in a secure manner and appropriately identified so as to allow access to such information
only to such persons and under such terms as is permitted under this Protective Order.
4.
Protected Information designated “Restricted—Confidential Source Code” shall
be designated, reviewed, produced, used, and protected in accordance with the following
provisions:
a.
Source Code, to the extent any producing party agrees to provide any such
information, shall ONLY be made available for inspection, not produced except as
provided for below, and shall be made available in electronic format at one of the
following locations chosen at the sole discretion of the producing party: (1) if producing
party is Defendant – Kutak Rock’s office in Omaha; and (2) if the producing party is
Intellectual Ventures – Feinberg Day’s Menlo Park, offices. The parties may agree to
alternative locations. Source Code will be loaded on a single, non-networked computer
that is password protected and maintained in a secure, locked area (“Source Code
Computer”). Use or possession of any input/output device (e.g., USB memory stick,
cameras or any camera-enabled device, CDs, floppy disk, portable hard drive, laptop,
smartphone, etc.) is prohibited while accessing the Source Code Computer. The Source
Code Computer will be made available for inspection during regular business hours, upon
reasonable notice to the producing party, which shall not be less than ten (10) business
days in advance of the initial requested inspection, and not less than four (4) business
days in advance of any requested inspection thereafter.
b.
The receiving party’s outside counsel and/or experts may request that
commercially available licensed software tools for viewing and searching Source Code
be installed on the Source Code Computer. The receiving party must provide the
producing party with the CD or DVD containing such software tool(s) at least four (4)
business days in advance of the inspection.
c.
The receiving party’s outside counsel and/or expert shall be entitled to
take notes relating to the Source Code but may not copy any portion of the Source Code
into these notes. No copies of all or any portion of the Source Code may leave the room
in which the Source Code is inspected except as otherwise provided herein. Further, no
3
other written or electronic record of the Source Code is permitted except as otherwise
provided herein.
d.
No person shall copy, email, transmit, upload, download, print,
photograph or otherwise duplicate any portion of the Source Code, except that the
receiving party may request a reasonable number of pages of Source Code to be printed
by the producing party, but only if and to the extent necessary for use in this action.
Within five (5) business days or such additional time as necessary due to volume
requested, the producing party will provide the requested material on watermarked or
colored paper bearing Bates numbers and, unless objected to as discussed below, the
legend:
RESTRICTED CONFIDENTIAL—SOURCE CODE
SUBJECT TO PROTECTIVE ORDER
The printed pages shall constitute part of the Source Code produced by the producing
party in this action. At the inspecting parties’ request, up to two additional sets (or
subsets) of printed Source Code may be requested and provided by the producing party in
a timely fashion.
e.
If the producing party objects that the printed portions are not reasonably
necessary to any case preparation activity, the producing party shall make such objection
known to the receiving party within five (5) business days. If after meeting and
conferring the producing party and the receiving party cannot resolve the objection
(where such meet-and-confer need not take place in person), the receiving party may seek
a Court resolution of whether the producing party should be required to produce the
printed Source Code in question. Contested Source Code print outs need not be produced
to the requesting party until the matter is finally resolved by the Court. Failure to object
under this provision does not indicate that the producing party concedes the relevance of
the printed Source Code to any issue and will not prejudice the producing party’s right to
raise any objection to the use of that printed Source Code.
f.
Any printed pages of Source Code, and any other documents or things
reflecting Source Code that have been designated by the producing party as
“RESTRICTED CONFIDENTIAL—SOURCE CODE” may not be copied, digitally
imaged or otherwise duplicated, except in limited excerpts necessary to attach as exhibits
to depositions, expert reports, or court filings as discussed below.
g.
Any paper copies designated “RESTRICTED CONFIDENTIAL—
SOURCE CODE” shall be stored or viewed only at (1) the offices of outside counsel for
the receiving party; (2) the offices of outside experts or consultants who have been
approved to access Source Code; (3) the site where any deposition is taken; (4) the Court;
or (5) any intermediate location necessary to transport the information to a hearing, trial
or deposition. Any such paper copies shall be maintained at all times in a secure location
under the direct control of counsel responsible for maintaining the security and
confidentiality of the designated materials. Source Code shall be considered export
restricted and shall not leave the continental United States for any reason.
4
h.
A list of names of persons who will inspect the Source Code will be
provided to the producing party in conjunction with any written (including email) notice
requesting inspection. The producing party shall maintain a daily log of the names of
persons who enter the locked room to view the Source Code and when they enter and
depart. The producing party shall be entitled to have a person observe all entrances and
exits from the Source Code viewing room, and to a copy of the log.
i.
Unless otherwise agreed in advance by the parties in writing, following
each inspection, the receiving party’s outside counsel and/or experts shall remove all
notes, documents, and all other materials from the room that may contain work product
and/or attorney-client privileged information. The producing party shall not be
responsible for any items left in the room following each inspection session.
j.
The receiving party will not copy, remove, or otherwise transfer any
portion of the Source Code from the Source Code Computer including, without
limitation, copying, removing, or transferring any portion of the Source Code onto any
other computers or peripheral equipment. The receiving party will not transmit any
portion of the Source Code in any way from the location of the Source Code inspection.
k.
Only the following individuals shall have access to “RESTRICTED
CONFIDENTIAL—SOURCE CODE” materials, absent the express written consent of
the producing party or further court order:
(1)
Outside counsel of record for the parties to this action, including
any attorneys, paralegals, technology specialists and clerical employees of their
respective law firms;
(2)
Up to nine (9) outside experts or consultants per party, preapproved in accordance with Sections II.A–2.F and specifically identified as
eligible to access Source Code;
(3)
The Court, any Special Master and/or technical advisor (if one is
appointed), the jury, court personnel, and court reporters or videographers
recording testimony or other proceedings in this action. Court reporters and/or
videographers shall not retain or be given copies of any portions of the Source
Code. If used during a deposition, the deposition record will identify the exhibit
by its production numbers; and
(4)
While testifying at deposition or trial in this action only: (i) any
current or former officer, director or employee of the producing party or original
source of the information; (ii) any person designated by the producing party to
provide testimony pursuant to Rule 30(b)(6) of the Federal Rules of Civil
Procedure; and/or (iii) any person who authored, previously received (other than
in connection with this litigation), or was directly involved in creating, modifying,
or editing the Source Code, as evident from its face or reasonably certain in view
of other testimony or evidence.
5
l.
The receiving party’s outside counsel shall maintain a log of all copies of
the Source Code (received from a producing party) that are delivered by the receiving
party to any qualified person under Subparagraph k above. The log shall include the
names of the recipients and reviewers of copies and locations where the copies are stored.
Upon request by the producing party, the receiving party shall provide reasonable
assurances and/or descriptions of the security measures employed by the receiving party
and/or qualified person that receives a copy of any portion of the Source Code;
m.
Except as provided in this Subparagraph m, the receiving party may not
create electronic images, or any other images, of the Source Code from the paper copy
for use on a computer (e.g., may not scan the source code to a PDF, or photograph the
code). The receiving party may create an electronic copy or image of limited excerpts of
Source Code only to the extent necessary in a pleading, exhibit, expert report, discovery
document, deposition transcript, other Court document, or any drafts of these documents
(“SOURCE CODE DOCUMENTS”). The receiving party shall only include such
excerpts as are reasonably necessary for the purposes for which such part of the Source
Code is used. Images or copies of Source Code shall not be included in correspondence
between the parties (references to production numbers shall be used instead) and shall be
omitted from pleadings and other papers except to the extent permitted herein. The
receiving party may create an electronic image of a selected portion of the Source Code
only when the electronic file containing such image has been encrypted using
commercially reasonable encryption software including password protection. The
communication and/or disclosure of electronic files containing any portion of Source
Code shall at all times be limited to individuals who are authorized to see Source Code
under the provisions of this Protective Order. The receiving party shall maintain a log of
all electronic images and paper copies of Source Code in its possession or in the
possession of its retained consultants, including the names of the recipients and reviewers
of any electronic or paper copies and the locations where the copies are
stored. Additionally, all electronic copies must be labeled “RESTRICTED
CONFIDENTIAL—SOURCE CODE.”
n.
To the extent portions of Source Code are quoted in a SOURCE CODE
DOCUMENT, either: (1) the entire document will be stamped and treated as
RESTRICTED CONFIDENTIAL—SOURCE CODE; or (2) those pages containing
quoted Source Code will be separately bound, and stamped and treated as RESTRICTED
CONFIDENTIAL—SOURCE CODE.
o.
All copies of any portion of the Source Code in whatever form shall be
securely destroyed if they are no longer in use. Copies of Source Code that are marked as
deposition exhibits shall not be provided to the Court Reporter or attached to deposition
transcripts; rather, the deposition record will identify the exhibit by its production
numbers.
p.
The receiving party’s outside counsel may only disclose a copy of the
Source Code to individuals specified in Subparagraph k above (e.g., Source Code may
not be disclosed to in-house counsel).
6
q.
To the extent that any information designated “Confidential,”
“Confidential Outside Attorneys Eyes Only,” or “Restricted—Confidential Source Code”
is subject to United States export control, distribution review and handling of such
information by and for the receiving party shall be fully and at all times compliant with
International Traffic in Arms Regulation (see 22 U.S.C. § 2278 and Subchapter M of
Title 22 of the CFR) and Export Administration Regulations (see 50 U.S.C. §§ 17011706, 2401-2420 and Subchapter C of Title 15 of the CFR).
Inadvertent Failure to Designate.
5.
The inadvertent failure to designate or withhold any information as confidential or
privileged will not be deemed to waive a later claim as to its confidential or privileged nature, or
to stop the producing party from designating such information as confidential at a later date in
writing and with particularity. The producing party shall immediately, upon discovery of the
inadvertent failure to designate, notify the other parties of the error in writing and provide
replacement pages bearing the appropriate confidentiality legend. The information shall be
treated by the receiving party as Protected Information from the time the receiving party is
notified in writing of the change in the designation.
Challenge to Designations.
6.
A receiving party may challenge a producing party's designation at any time. Any
receiving party disagreeing with a designation may request in writing that the producing party
change the designation. The producing party shall then have fourteen (14) days after receipt of a
challenge notice to advise the receiving party whether or not it will change the designation. If the
parties are unable to reach agreement after the expiration of this fourteen (14) day time frame,
and after the parties have met and conferred, the receiving party may at any time thereafter seek
a Court Order to alter the confidential status of the designated information. Until any dispute
under this paragraph is ruled upon by the Court, the designation shall remain in full force and
effect and the information shall continue to be accorded the confidential treatment required by
this Protective Order.
Disclosure and Use of Confidential Information.
7.
Protected Information may only be used for purposes of preparation, trial and
appeal of this action. Protected Information may not be used under any circumstances for
prosecuting any patent application, for patent licensing or for any other purpose.
8.
Subject to paragraph 10 below, Protected Information designated Confidential may be
disclosed by the receiving party only to the following individuals provided that such individuals
are subject to the terms of this Protective Order: (a) four (4) employees of the receiving party, or
of suppliers, manufacturers, potential indemnitors, or indemnitors of the receiving party, who are
required in good faith to provide assistance in the conduct of this litigation, including any
settlement discussions, and who are identified as such in writing to counsel for the designating
party in advance of the disclosure; (b) four (4) in-house counsel who are identified by the
receiving party, and who may be employed by suppliers, manufacturers, potential indemnitors,
and indemnitors of the receiving party; (c) outside counsel for the receiving party; (d) supporting
7
personnel employed by (b) and (c), such as paralegals, legal secretaries, data entry clerks, legal
clerks and private photocopying services; (e) experts, consultants, or technical advisors; (f) any
persons requested by counsel to furnish services such as document coding, image scanning,
mock trial, jury profiling, translation services, court reporting services, demonstrative exhibit
preparation, or the creation of any computer database from documents; and (g) those individuals
designated in paragraph 12(c).
9.
Subject to paragraph 10 below, Confidential Outside Attorney Eyes Only
Information may be disclosed by the receiving party only to the following individuals provided
that such individuals are subject to the terms of this Protective Order: (a) outside counsel for the
receiving party; (b) supporting personnel employed by (a), such as paralegals, legal secretaries,
data entry clerks, legal clerks, private photocopying services; (c) experts, consultants, or
technical advisors; and (d) those individuals designated in paragraph 12(c).
10.
Further, prior to disclosing Protected Information to a receiving party's proposed
expert or consultant, the receiving party shall provide to the producing party a signed
Confidentiality Agreement in the form attached as Exhibit A, the resume or curriculum vitae of
the proposed expert or consultant, the expert or consultant's business affiliation, any current and
past consulting relationships in the industry, and any cases in which the expert or consultant has
testified as an expert at trial or by deposition within the preceding five (5) years. The producing
party shall thereafter have fourteen (14) days from receipt of the Confidentiality Agreement to
object to any proposed individual. Such objection must be made for good cause and in writing,
stating with particularity the reasons for objection. Failure to object within fourteen (14) days
shall constitute approval. If the parties are unable to resolve any objection, the receiving party
may apply to the Court to resolve the matter. There shall be no disclosure to any proposed
individual during the fourteen (14) day objection period, unless that period is waived by the
producing party, or if any objection is made, until the parties have resolved the objection, or the
Court has ruled upon any resultant motion.
11.
Counsel shall be responsible for the adherence by third-party vendors to the terms
and conditions of this Protective Order. Counsel may fulfill this obligation by obtaining a signed
Confidentiality Agreement in the form attached as Exhibit B.
12.
Protected Information designated Confidential or Confidential Outside Attorney
Eyes Only may be disclosed to a person, not already allowed access to such information under
this Protective Order, if:
(a)
the information was previously received or authored by the person or was
authored or received by a director, officer, employee or agent of the company for which
the person is testifying as a Rule 30(b)(6) designee;
(b)
the designating party is the person or is a party for whom the person is a
director, officer, employee, consultant or agent; or
(c)
counsel for the party designating the material agrees that the material may
be disclosed to the person. In the event of disclosure under this paragraph, only the
reporter, the person, his or her counsel, the judge and persons to whom disclosure may be
8
made, and who are bound by the Protective Order, may be present during the disclosure
or discussion of Confidential Information. Disclosure of material pursuant to this
paragraph shall not constitute a waiver of the confidential status of the material so
disclosed.
Prosecution Bar.
13.
Any employee or attorney for a receiving party who obtains, receives, or
otherwise learns information designated CONFIDENTIAL – OUTSIDE ATTORNEYS’ EYES
ONLY INFORMATION and/or RESTRICTED CONFIDENTIAL–SOURCE CODE relating to
a producing party’s legacy, current or planned products (collectively, “HIGHLY
CONFIDENTIAL INFORMATION”) shall not prepare, prosecute, supervise, or assist in the
preparation or prosecution (including interferences, re-examinations and other proceedings) of
any patent or patent application pertaining to the patents-in-suit before any foreign or domestic
agency, including the United States Patent and Trademark Office. This prohibition on patent
prosecution shall begin when access to such HIGHLY CONFIDENTIAL INFORMATION is
first received by the affected individual, and shall end two years after the conclusion of this
Action, including all appeals. This prosecution bar is personal to the person obtaining, receiving,
or learning of such HIGHLY CONFIDENTIAL INFORMATION and shall not be imputed to
any other person or entity. Notwithstanding the foregoing, this paragraph shall not prohibit any
employee or attorney for a party from assisting in any re-examination or any other post-grant
review proceeding relating to the patents-in-suit, any patents within the same patent family as a
patent-in-suit, or any patents to which a patent-in-suit claims priority; provided, however, no
such employee or attorney may use or rely upon HIGHLY CONFIDENTIAL INFORMATION
or its knowledge thereof in connection with such re-examination or post-grant review
proceeding.
Non-Party Information.
13.
The existence of this Protective Order shall be disclosed to any person producing
documents, tangible things or testimony in this action who may reasonably be expected to desire
confidential treatment for such documents, tangible things or testimony. Any such person may
designate documents, tangible things or testimony as Protected Information pursuant to this
Protective Order.
Filing Documents With the Court.
14.
In the event that any party wishes to submit Protected Information to the Court,
the party shall follow the procedures prescribed by the Court, including those identified in the
Court’s CM/ECF Civil and Criminal Administrative Procedures Manual and Users Guide.
No Prejudice.
15.
Producing or receiving Protected Information, or otherwise complying with the
terms of this Protective Order, shall not (a) operate as an admission by any party that any
particular Protected Information contains or reflects trade secrets or any other type of
confidential or proprietary information; (b) prejudice the rights of a party to object to the
production of information or material that the party does not consider to be within the scope of
9
discovery; (c) prejudice the rights of a party to seek a determination by the Court that particular
materials be produced; (d) prejudice the rights of a party to apply to the Court for further
protective orders; or (e) prevent the parties from agreeing in writing to alter or waive the
provisions or protections provided for herein with respect to any particular information or
material.
Conclusion of Litigation.
16.
Within sixty (60) calendar days after final judgment in this action, including the
exhaustion of all appeals, or within sixty (60) calendar days after dismissal pursuant to a
settlement agreement, each party or other person subject to the terms of this Protective Order
shall be under an obligation to destroy or return to the producing party all materials and
documents containing Protected Information, and to certify to the producing party such
destruction or return. However, outside counsel for any party shall be entitled to retain all court
papers, trial transcripts, exhibits and attorney work provided that any such materials are
maintained and protected in accordance with the terms of this Protective Order. The obligations
of this paragraph shall not extend to disaster recovery tapes to the extent information housed on
such tapes is not accessible in the ordinary course of business. This paragraph shall not operate
to terminate the effect of this Protective Order, and the provisions of this Protective Order shall
continue to be binding after termination of this litigation (except with respect to those documents
and information that become a matter of public record).
Other Proceedings.
17.
By entering this Order and limiting the disclosure of information in this case, the
Court does not intend to preclude another court from finding that information may be relevant
and subject to disclosure in another case. Any person or parties subject to this Protective Order
that may be subject to a motion to disclose another party's information designated Confidential
pursuant to this Protective Order, shall promptly notify that party of the motion so that it may
have an opportunity to appear and be heard on whether that information should be disclosed.
Remedies.
18.
It is Ordered by the Court that this Protective Order will be enforced by the
sanctions set forth in Rule 37(b) of the Federal Rules of Civil Procedure and such other sanctions
as may be available to the Court, including the power to hold parties or other violators of this
Protective Order in contempt. All other remedies available to any person(s) injured by a violation
of this Protective Order are fully reserved.
19.
Any party may petition the Court for good cause shown, in the event such party
desires relief from a term or condition of this Order.
IT IS SO ORDERED.
BY THE COURT:
Dated February 27, 2014.
S/ F.A. Gossett
United States Magistrate Judge
10
EXHIBIT A
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEBRASKA
CONFIDENTIALITY AGREEMENT FOR EXPERT
1. My name is: ____________________________________________________________.
2. I reside at: _____________________________________________________________.
3. My present employer is: __________________________________________________.
4. I hereby affirm that:
•
Information, including documents and things, designated as “Confidential,”
“Confidential Outside Attorney Eyes Only,” or “Restricted—Confidential Source
Code” (collectively, “Protected Information”) as defined in the Protective Order
entered in the above-captioned action (hereinafter “Protective Order”), is being
provided to me pursuant to the terms and restrictions of the Protective Order.
•
I have been given a copy of and have read the Protective Order.
•
I am familiar with the terms of the Protective Order and I agree to comply with and to
be bound by such terms.
5. I submit to the jurisdiction of this Court for enforcement of the Protective Order.
6. I agree not to use any Protected Information disclosed to me pursuant to the Protective
Order except for purposes of the above-captioned litigation and not to disclose any such
information to persons other than those specifically authorized by said Protective Order,
without the express written consent of the party who designated such information as
confidential or by order of this Court. I also agree to notify any stenographic, clerical or
technical personnel who are required to assist me of the terms of this Protective Order
and of its binding effect on them and me.
7. I understand that I am to retain all Protected Information in a secure manner, and that all
such documents and materials are to remain in my personal custody until the completion
of my assigned duties in this matter, whereupon all such documents and materials,
including all copies thereof, and any writings prepared by me containing any Protected
Information are to be returned to counsel who provided me with such documents and
materials.
8. In accordance with the provisions of the Protective Order (if applicable), I have attached
my resume, curriculum vitae, or other information to this executed Confidentiality
Agreement sufficient to identify my current employer and employment history, my
11
business affiliations, any current and past consulting relationships in the industry, and any
cases in which the expert or consultant has testified as an expert at trial or by deposition
within the preceding five years.
9. I state under penalty of perjury under the laws of the United States of America that the
foregoing is true and correct.
By: _____________________________________________
Executed On: ____________________
12
EXHIBIT B
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEBRASKA
CONFIDENTIALITY AGREEMENT FOR THIRD-PARTY VENDORS
I hereby affirm that:
Information, including documents and things, designated as “Confidential,” “Confidential
Outside Attorney Eyes Only,” or “Restricted—Confidential Source Code” (collectively,
“Protected Information”) as defined in the Protective Order entered in the abovecaptioned action (hereinafter “Protective Order”), is being provided to me pursuant to the
terms and restrictions of the Protective Order.
I have been given a copy of and have read the Protective Order.
I am familiar with the terms of the Protective Order and I agree to comply with and to be
bound by such terms.
I submit to the jurisdiction of this Court for enforcement of the Protective Order. I agree
not to use any Protected Information disclosed to me pursuant to the Protective Order
except for purposes of the above-captioned litigation and not to disclose any such
information to persons other than those specifically authorized by said Protective Order,
without the express written consent of the party who designated such information as
confidential or by order of this Court.
I state under penalty of perjury under the laws of the United States of America that the foregoing
is true and correct.
By: _____________________________________________
Executed On: ____________________
13
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?