STC.UNM v. Intel Corporation

Filing 76

RESPONSE in Opposition re 67 MOTION to Amend/Correct 63 Order on Motion for Protective Order filed by STC. UNM. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Exhibit D)(Pedersen, Steven)

Download PDF
Exhibit C Excerpts from UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS PROTECTIVE ORDER, Judge Ward IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION § § § § § V. PROTECTIVE ORDER WHEREAS, Plaintiff ___________________ and Defendant _____________________, hereafter referred to as “the Parties,” believe that certain information that is or will be encompassed by discovery demands by the Parties involves the production or disclosure of trade secrets, confidential business information, or other proprietary information; WHEREAS, the Parties seek a protective order limiting disclosure thereof in accordance with Federal Rule of Civil Procedure 26(c): THEREFORE, it is hereby stipulated among the Parties and ORDERED that: 1. Each Party may designate as confidential for protection under this Order, in whole or in part, any document, information or material that constitutes or includes, in whole or in part, confidential or proprietary information or trade secrets of the Party or a Third Party to whom the Party reasonably believes it owes an obligation of confidentiality with respect to such document, information or material (“Protected Material”). Protected Material shall be designated by the Party producing it by affixing a legend or stamp on such document, information or material as follows: “CONFIDENTIAL.” The word “CONFIDENTIAL” shall be placed clearly on each page of the Protected Material (except deposition and hearing transcripts) for which such protection is sought. For deposition and hearing transcripts, the word “CONFIDENTIAL” shall be placed on the DESIGNATED MATERIAL or the contents thereof pursuant to this Order shall not make any copies, duplicates, extracts, summaries or descriptions of such DESIGNATED MATERIAL or any portion thereof except as may be reasonably necessary in the litigation of this Action. Any such copies, duplicates, extracts, summaries or descriptions shall be classified DESIGNATED MATERIALS and subject to all of the terms and conditions of this Order. 8. To the extent a producing Party believes that certain Protected Material qualifying to be designated CONFIDENTIAL is so sensitive that its dissemination deserves even further limitation, the producing Party may designate such Protected Material “RESTRICTED -ATTORNEYS’ EYES ONLY,” or to the extent such Protected Material includes computer source code and/or live data (that is, data as it exists residing in a database or databases) (“Source Code Material”), the producing Party may designate such Protected Material as “RESTRICTED CONFIDENTIAL SOURCE CODE.” 9. For Protected Material designated RESTRICTED -- ATTORNEYS’ EYES ONLY, access to, and disclosure of, such Protected Material shall be limited to individuals listed in paragraphs 5(a-c) and (e-g); provided, however, that access by in-house counsel pursuant to paragraph 5(c) be limited to in-house counsel who exercise no competitive decision-making authority on behalf of the client. 10. For Protected Material designated RESTRICTED CONFIDENTIAL SOURCE CODE, the following additional restrictions apply: (a) Access to a Party’s Source Code Material shall be provided only on “stand-alone” computer(s) (that is, the computer may not be linked to any network, including a local area network (“LAN”), an intranet or the Internet). The stand-alone computer(s) may be connected to (i) a printer, or (ii) a device capable of temporarily storing electronic copies solely for the limited purposes permitted 5 pursuant to paragraphs 10 (h and k) below. Additionally, except as provided in paragraph 10(k) below, the stand-alone computer(s) may only be located at the offices of the producing Party’s outside counsel; (b) The receiving Party shall make reasonable efforts to restrict its requests for such access to the stand-along computer(s) to normal business hours, which for purposes of this paragraph shall be 8:00 a.m. through 6:00 p.m. However, upon reasonable notice from the receiving party, the producing Party shall make reasonable efforts to accommodate the receiving Party’s request for access to the stand-alone computer(s) outside of normal business hours. The Parties agree to cooperate in good faith such that maintaining the producing Party’s Source Code Material at the offices of its outside counsel shall not unreasonably hinder the receiving Party’s ability to efficiently and effectively conduct the prosecution or defense of this Action; (c) The producing Party shall provide the receiving Party with information explaining how to start, log on to, and operate the stand-alone computer(s) in order to access the produced Source Code Material on the stand-alone computer(s); (d) The producing Party will produce Source Code Material in computer searchable format on the stand-alone computer(s) as described above; (e) Access to Protected Material designated RESTRICTED CONFIDENTIAL SOURCE CODE shall be limited to outside counsel and up to three (3) outside consultants or experts2 (i.e., not existing employees or affiliates of a Party or an affiliate of a Party) retained for the purpose of this litigation and approved to access such Protected Materials pursuant to paragraph 5(e) above. A receiving Party may include excerpts of Source Code Material in a pleading, exhibit, expert report, discovery document, deposition transcript, other Court document, provided that the Source Code Documents are appropriately marked under this Order, restricted to those who are entitled to have access to them as specified herein, and, if filed with the Court, filed under seal in accordance with the Court’s rules, procedures and orders; (f) To the extent portions of Source Code Material are quoted in a Source Code Document, either (1) the entire Source Code Document will be stamped and treated as RESTRICTED CONFIDENTIAL SOURCE CODE or (2) those pages containing quoted Source Code Material will be separately stamped and treated as RESTRICTED CONFIDENTIAL SOURCE CODE; 2 For the purposes of this paragraph, an outside consultant or expert is defined to include the outside consultant’s or expert’s direct reports and other support personnel, such that the disclosure to a consultant or expert who employs others within his or her firm to help in his or her analysis shall count as a disclosure to a single consultant or expert. 6 (g) (h) The receiving Party shall be permitted to make a reasonable number of printouts and photocopies of Source Code Material, all of which shall be designated and clearly labeled “RESTRICTED CONFIDENTIAL SOURCE CODE,” and the receiving Party shall maintain a log of all such files that are printed or photocopied; (i) Should such printouts or photocopies be transferred back to electronic media, such media shall be labeled “RESTRICTED CONFIDENTIAL SOURCE CODE” and shall continue to be treated as such; (j) If the receiving Party’s outside counsel, consultants, or experts obtain printouts or photocopies of Source Code Material, the receiving Party shall ensure that such outside counsel, consultants, or experts keep the printouts or photocopies in a secured locked area in the offices of such outside counsel, consultants, or expert. The receiving Party may also temporarily keep the printouts or photocopies at: (i) the Court for any proceedings(s) relating to the Source Code Material, for the dates associated with the proceeding(s); (ii) the sites where any deposition(s) relating to the Source Code Material are taken, for the dates associated with the deposition(s); and (iii) any intermediate location reasonably necessary to transport the printouts or photocopies (e.g., a hotel prior to a Court proceeding or deposition); and (k) 11. Except as set forth in paragraph 10(k) below, no electronic copies of Source Code Material shall be made without prior written consent of the producing Party, except as necessary to create documents which, pursuant to the Court’s rules, procedures and order, must be filed or served electronically; A producing Party’s Source Code Material may only be transported by the receiving Party at the direction of a person authorized under paragraph 10(e) above to another person authorized under paragraph 10(e) above, on paper or removable electronic media (e.g., a DVD, CD-ROM, or flash memory “stick”) via hand carry, Federal Express or other similarly reliable courier. Source Code Material may not be transported or transmitted electronically over a network of any kind, including a LAN, an intranet, or the Internet. Source Code Material may only be transported electronically for the purpose of Court proceeding(s) or deposition(s) as set forth in paragraph 10(j) above and is at all times subject to the transport restrictions set forth herein. But, for those purposes only, the Source Code Materials may be loaded onto a stand-alone computer. Any attorney representing a Party, whether in-house or outside counsel, and any person associated with a Party and permitted to receive the other Party’s Protected Material that is designated RESTRICTED -- ATTORNEYS’ EYES ONLY and/or RESTRICTED 7 Jackson Walker IP e-Alert: East Texas Court Adopts Protective Order for Cases Involvin... Page 1 of 2 December 22, 2009 Resources JW Intellectual Property Practice Area JW Intellectual Property Attorneys JW Intellectual Property Publications Contact JW East Texas Court Releases Standard Protective Order for Patent Litigation Cases Involving Source Code By John Jackson During status conference hearings conducted on Monday, December 14, 2009, Magistrate Judge Everingham announced the adoption of a standard Protective Order applicable to patent litigation matters involving source code pending before Judge Ward and Judge Everingham. A copy of this standard Protective Order is available by clicking here. www.jw.com Offices Austin 100 Congress Avenue Suite 1100 Austin, TX 78701 Dallas 901 Main Street Suite 6000 Dallas, TX 75202 Fort Worth 301 Commerce Street Suite 2400 Fort Worth, TX 76102 Houston 1401 McKinney Street Suite 1900 Houston, TX 77010 San Angelo 301 W. Beauregard Avenue Suite 200 San Angelo, TX 76903 San Antonio 112 E. Pecan Street Suite 2400 San Antonio, TX 78205 Paragraph 10 of the Protective Order contains the key provisions relating to source code. Among other things, Paragraph 10 provides as follows:  Access to a Party’s Source Code Material shall be provided       only on “stand-alone” computer(s) (that is, the computer may not be linked to any network, including a local area network (“LAN”), an intranet or the Internet) . . . Additionally, except as provided in paragraph 10(k) below, the stand-alone computer(s) may only be located at the offices of the producing Party’s outside counsel; The receiving Party shall make reasonable efforts to restrict its requests for such access to the stand-along computer(s) to normal business hours, which for purposes of this paragraph shall be 8:00 a.m. through 6:00 p.m. . . . ; The producing Party shall provide the receiving Party with information explaining how to start, log on to, and operate the stand-alone computer(s) in order to access the produced Source Code Material on the stand-alone computer(s); The producing Party will produce Source Code Material in computer searchable format on the stand-alone computer(s) as described above; Access to Protected Material designated RESTRICTED CONFIDENTIAL - SOURCE CODE shall be limited to outside counsel and up to three (3) outside consultants or experts2 (i.e., not existing employees or affiliates of a Party or an affiliate of a Party) . . . ; To the extent portions of Source Code Material are quoted in a Source Code Document, either (1) the entire Source Code Document will be stamped and treated as RESTRICTED CONFIDENTIAL SOURCE CODE or (2) those pages containing quoted Source Code Material will be separately stamped and treated as RESTRICTED CONFIDENTIAL SOURCE CODE; Except as set forth in paragraph 10(k) below, no electronic copies of Source Code Material shall be made without prior written consent of the producing Party; http://images.jw.com/ealert/ip/2009/1222sm.html 4/18/2011 Jackson Walker IP e-Alert: East Texas Court Adopts Protective Order for Cases Involvin... Page 2 of 2 This Protective Order was likely adopted in an effort to avoid disputes between the parties concerning the procedures for producing and using source code in patent litigation. For example, in SBJ IP Holdings 1 LLC v. Blockbuster, Inc., et. al, CA No. 2:09-cv-29, the parties were unable to agree upon the terms of a Protective Order relating to source code and filed competing briefs concerning the procedures for producing source code. On December 4, 2009, Judge Everingham entered an Order providing that source code could be produced on a stand-alone computer at the offices of the producing party’s outside counsel (rather than being produced directly to Plaintiff’s counsel). As in this December 4, 2009 ruling, the standard Protective Order allows the producing party to produce source code on a stand-alone computer at the offices of its outside counsel. While this standard Protective Order was created for use in patent cases involving source code that are pending before Judges Ward and Everingham, other judges in the Eastern District of Texas will likely consider this standard Protective Order to be persuasive authority in connection with disputes concerning source code provisions in patent cases pending in their courts. If you have any questions regarding this e-Alert, please contact John Jackson at 214.953.6109 or jjackson@jw.com. 2 For the purposes of this paragraph, an outside consultant or expert is defined to include the outside consultant’s or expert’s direct reports and other support personnel, such that the disclosure to a consultant or expert who employs others within his or her firm to help in his or her analysis shal count as a disclosure to a single consultant or expert. If you wish to be added to this e-Alert listing, please SIGN UP HERE. If you wish to follow the JW Intellectual Property group on Twitter, please CLICK HERE. Austin Dallas Fort Worth Houston San Angelo San Antonio I.P. e-Alert is published by the law firm of Jackson Walker L.L.P. to inform readers of relevant information in intellectual property law and related areas. It is not intended nor should it be used as a substitute for legal advice or opinion which can be rendered only when related to specific fact situations. For more information, please call 1.866.922.5559 or visit us at www.jw.com. ©2009 Jackson Walker L.L.P. http://images.jw.com/ealert/ip/2009/1222sm.html 4/18/2011

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?