Semafone Limited, et al v. PCI Pal (U.S.) Inc.

Filing 44

STIPULATED PROTECTIVE ORDER. Signed by Magistrate Judge David S. Cayer on 11/17/2022. (brl)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION SYCURIO LIMITED and SYCURIO INC. Plaintiffs, DOCKET NO. 3:21-cv-00486-MOC-DSC v. PCI PAL (U.S.) INC., STIPULATED PROTECTIVE ORDER Defendant. The Court recognizes that disclosure and discovery activity are likely to arise that will require the disclosure of trade secrets, confidential research, development, manufacturing, financial, process, marketing, and business information, or other commercial information within the meaning of Federal Rule of Civil Procedure 26(c). Good cause exists to protect this information from public disclosure. In the absence of a suitable protective order safeguarding the confidentiality of such information, the parties would be hampered in their ability to produce such information. Accordingly, the Court ORDERS that the parties shall adhere to the following: 1. DESIGNATION OF PROTECTED MATERIAL 1.1 This Order shall govern all documents and other products of discovery obtained by the parties from one another, and from third parties, all information copied or derived therefrom, as well as all copies, excerpts, summaries or compilations thereof, including documents produced pursuant to requests authorized by the Federal Rules of Civil Procedure, answers to interrogatories, deposition transcripts, responses to requests for admission, affidavits, declarations, expert reports, and other such material and information as may be produced during the course of this litigation or 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 1 of 22 the litigation captioned Sycurio Limited v. PCI-PAL PLC, et al., Claim No. HP-2021-000030 (High Court of Justice, Business and Property Courts of England & Wales, Intellectual Property List (ChD), Patents Court) (hereinafter, the “UK Litigation”). 1.2 In connection with discovery proceedings, in this action, any party or third party may designate any non-public document, material or information as “CONFIDENTIAL”, “HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY” or “HIGHLY CONFIDENTIAL – SOURCE CODE” (collectively referred to as “Protected Material”). (a) A party may designate as “CONFIDENTIAL” any information, document, or thing that the party reasonably and in good faith believes to contain confidential information within the meaning of Fed. R. Civ. P. 26(c)(1)(G) used by it in, or pertaining to, its business and that is not generally known, and which that party would not normally reveal to third parties or, if disclosed, would require such third parties to maintain in confidence. (b) A party may designate as “HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY” such materials as the party reasonably and in good faith believes to contain particularly sensitive technical information relating to research for and production of current products; technical, business, and research information regarding future products; nonpublic and highly sensitive financial information; marketing and sales information, such as marketing plans and forecasts, customer lists, pricing data, cost data, customer orders, and customer quotations; any pending or abandoned patent applications, foreign or domestic; and such other documents, information, or materials that relate to other proprietary information that the designating party reasonably believes is of such nature and character that disclosure of such information would be harmful to the designating party. 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 2 of 22 (c) A party may designate as “HIGHLY CONFIDENTIAL – SOURCE CODE” information representing computer code and associated comments and revision histories, formulas, engineering specifications, or schematics that define or otherwise describe in detail the algorithms or structure of software or hardware designs, disclosure of which to another Party or Non-Party would create a substantial risk of serious harm that could not be avoided by less restrictive means. Source Code includes human-readable programming language text that defines software, firmware, or electronic hardware descriptions. Source Code includes source-code files, which are text files containing source code. These include, but are not limited to, files containing source code written in “C,” “C++,” Java, JavaScript, PHP, Ruby, C# (C Sharp) assembler, VHDL, Verilog, Python, and digital signal processor programming languages, as well as “include files,” “make” files, link files, and other human-readable text files used in the generation and/or building of software directly executed on a microprocessor, micro-controller, or digital signal processor. Source Code does not include publicly available source code. 1.3 The following information shall not be designated or protected under this Protective Order: (a) Information that is in the public domain at the time of disclosure, including patent file histories, publicly available prior art publications, catalogs and other advertising materials, press releases, and publicly-filed financial statements; (b) Information that at any time is made public through no act of a non- designating party; (c) Information that the designating party has not undertaken with others to maintain in confidence and that is in the possession of or becomes available to the receiving 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 3 of 22 party other than through discovery in this action, but only if the receiving party can show by written documentation that the information independently came into its rightful possession; or (d) Information that is independently developed by the receiving party, as reflected by written documentation demonstrated to be in existence prior to production by the party claiming confidentiality. 1.4 Any documents or things produced pursuant to a discovery request or other written materials exchanged by the parties (including discovery responses, letters, and briefs) that a party desires to designate as Protected Material shall be so designated by marking each page of the document, paper or thing CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE, as appropriate, and indicating the identity of the producing party (e.g., through the use of an identifying prefix to the document identification (Bates) number). 1.5 In the event a party may make available certain of its non-Source Code files for inspection by another party, which files may contain non-confidential material as well as material that may be subject to protection under this Protective Order, with the intent that following such inspection the inspecting party will designate certain of the inspected documents to be copied and furnished to it, such files need not be marked with either confidentiality designation in advance, but shall all be treated as HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY materials. Only those persons identified in paragraph 2.2 below as permitted to view HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY materials may be present at any such inspection. When the producing party copies the documents to furnish to the inspecting party, the producing 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 4 of 22 party shall mark Protected Material with the appropriate confidentiality designation to the extent warranted under paragraph 1.2. 1.6 Whenever a deposition involves a disclosure of Protected Material, the following procedures shall apply: (a) Any party may designate any portion or all of a deposition as CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE by notifying the other parties on the record during the deposition. The Court Reporter shall be asked to make the appropriate confidentiality designation on each page of the transcript that contains CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE information. At that time, all persons not qualified to receive that category of information shall leave the room prior to continuation of the deposition and until the conclusion of such designated testimony; and (b) Any party may also designate any portion or all of a deposition as CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE by notifying the other parties separately in writing within ten days of receipt of the transcript. In such event, the parties shall confer as to the most convenient way to segregate the designated portions of the transcript. All information disclosed at a deposition and all information contained in deposition transcripts shall be treated as CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY or HIGHLY CONFIDENTIAL – SOURCE CODE for a period of ten days after the receipt of the transcript to permit adequate time for review of the transcript and notice to other counsel regarding any designation as Protected Material by a designating party. 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 5 of 22 Provided, however, that if a person is allowed to attend all or a portion of a deposition pursuant to Section 1.6.a. above, that person shall be allowed to review the portion of the transcript for which she or he attended notwithstanding any confidentiality designation that may be made after the deposition. (c) Any portion of the transcript reflecting material designated “HIGHLY CONFIDENTIAL SOURCE CODE” shall be presumptively treated in accordance with the procedures pertaining to Source Code. 2. 2.1 ACCESS TO AND USE OF PROTECTED MATERIAL Protected Material, and all summaries, compilations, and derivations thereof, whether oral or written, shall be maintained in confidence, shall be used solely in the preparation, prosecution, or trial of this action and not for any other purpose, and shall be disclosed only as provided in the following paragraphs. Notwithstanding the preceding sentence, and subject to paragraph 2.2(a), Protected Material may be shared by outside counsel of a Party with outside counsel of the same party representing it in the UK Litigation, for use in that proceeding as appropriate, provided that such counsel agrees in advance to the terms of this Protective Order. 2.2 Information which has been designated as HIGHLY CONFIDENTIAL - ATTORNEY EYES ONLY may be disclosed only to: (a) The outside attorneys of record and their employees who are engaged in assisting in this action or the UK Litigation; provided that such outside attorneys do not include any persons participating in the prosecution of any present or future U.S. patent application (including the reexamination or reissue of any present or future patent) that is a counterpart to or related to the patents-in-suit (“participating” in such prosecution includes preparing or reviewing patent applications, reviewing office actions, preparing or 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 6 of 22 reviewing responses to office actions, and engaging in any discussion or other communication regarding the scope or validity of any claims in such patent applications or in the patents that are the subject of such reexamination or reissue); provided that this exclusion does not apply to persons whose involvement with the prosecution of such patents or patent applications is limited to administrative oversight for billing or project assignment purposes, and further provided that such exclusion shall not prevent litigation counsel from participating in any proceedings attacking the validity of the patents in suit, including any inter partes review or other Patent Trial & Appeal Board proceedings; (b) Independent consultants or experts retained by the party or its attorneys in connection with this action or the UK Litigation, including technical experts, damage and industry experts, patent experts, and jury or trial consultants, together with their employees engaged in assisting in this action (including mock jurors), but only subject to the provisions of paragraph 2.4 below; provided that such independent consultants or experts do not include any persons participating in the prosecution of any present or future patent application (including the reexamination or reissue of any present or future patent) that is a counterpart to or related to the patents-in-suit (“participating“ in such prosecution includes preparing or reviewing patent applications, reviewing office actions, preparing or reviewing responses to office actions, and engaging in any discussion or other communication regarding the scope or validity of any claims in such patent applications or in the patents that are the subject of such reexamination or reissue); provided that this exclusion does not apply to persons whose involvement with the prosecution of such patents or patent applications is limited to administrative oversight for billing or project assignment purposes; 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 7 of 22 (c) The Court and its personnel; (d) Court reporters and their personnel engaged in proceedings incident to preparation for trial or engaged in trial; (e) Professional vendors and their employees, including copy services, trial graphics services, and translation services, engaged by counsel; and (f) Any person who is indicated on the face of a document to have been an author, addressee, or copy recipient of the document, or the original source of the information. 2.3 Information that has been designated as CONFIDENTIAL may be disclosed only to: (a) The persons identified in paragraph 2.2 above; and (b) Any party or employee of a party to whom disclosure is reasonably necessary for this litigant and litigation who has signed the “Agreement to Be Bound by Protective Order” in Exhibit A. 2.4 Protected Material shall be disclosed to consultants and experts only upon the following terms: (a) Prior to any disclosure, the consultant or expert shall be identified in writing to the other parties’ counsel by name, address, and corporate, business or other professional affiliation or employment, together with a copy of the expert’s curriculum vitae and a list of the expert’s litigation or consulting engagements for the past three years; (b) Unless another party notifies the proposing party of any objection and that objection is received within five business days after notification (by fax, by email, or by 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 8 of 22 overnight mail), the consultant or expert shall thereafter be allowed to have access to Protected Material pursuant to the terms and conditions of this Protective Order; (c) In the event of a timely objection, which shall be made in good faith and on reasonable grounds, the proposing party shall refrain from disclosure of Protected Material to the consultant or expert until the objection has been resolved between the parties or ruled upon by the Court; (d) The parties shall endeavor in good faith to resolve the dispute without calling upon the intervention of the Court. The burden is on the objecting party to seek the intervention of the Court by appropriate motion to preclude the proposing party from disclosing Protected Material to the consultant or expert. If no such motion is filed within ten business days of receipt of the objection, the proposing party may disclose Protected Material to the consultant or expert as if no objection had been raised; and (e) No party shall use its right to object to a proposed consultant or expert to interfere with the ability of another party to prepare for any hearing or trial through the use of consultants and experts. 2.5 Prior to receiving any Protected Material, any persons described in sections (b), (d) or (e) of paragraph 2.2 shall be furnished with a copy of this Protective Order and shall execute a copy of the “Agreement to be Bound by Protective Order” attached as Exhibit A. A copy of the signed Agreement shall be maintained by counsel for the party providing such access. 2.6 Nothing in this Protective Order shall prevent any counsel of record from utilizing Protected Material in the examination of any person who is reasonably alleged to be the author or source of the Protected Material or who is reasonably believed to have knowledge relating thereto. In addition, 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 9 of 22 (a) Parties and present employees of the parties, or employees of third parties, may be examined as a witness at depositions and trial and may testify concerning all Protected Material produced or designated by that party, or by the employee's employer if a third party; (b) Former employees of the parties, or former employees of third parties, may be examined and may testify concerning all Protected Material produced or designated by the party or third party that formerly employed such person and which pertains to the period or periods of his/her employment and prior thereto; and (c) Former experts of the parties may be examined and may testify concerning all Protected Material produced or designated by the respective party that pertains to the subject matter of his/her consultation. 2.7 Nothing in this Protective Order shall preclude any party from introducing Protected Material into evidence at any evidentiary hearing or at trial. However, if anyone intends to introduce or refer to Protected Material at any hearing or trial, the party wishing to make the disclosure shall first notify the producing party and provide that party with an opportunity to object and/or to ask the Court to take appropriate precautionary procedures (e.g., clearing the Courtroom, sealing the record, etc.). 2.8 Nothing in this Protective Order shall bar or otherwise restrict any attorney from rendering advice to his/her clients with respect to this litigation and referring to or relying generally upon his/her examination of Protected Material, provided that in rendering such advice and in otherwise communicating with his/her clients, the attorney shall not disclose the content of such information. 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 10 of 22 2.9 All persons in possession of Protected Material shall exercise reasonable and appropriate care with regard to the storage, custody, and use of such information in order to ensure that the provisions of this Protective Order are observed and the confidential nature of the information is maintained. 3. CHALLENGES TO CONFIDENTIALITY DESIGNATIONS 3.1 Any party believing that particular information has been improperly marked, i.e., that it is not in fact CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY, or HIGHLY CONFIDENTIAL – SOURCE CODE, may challenge such designation at any time by raising the issue, in writing to the designating party, and specifically identifying, by document identification (Bates) number, by deposition page and line, or by other appropriate specific identifier, the information whose confidentiality status is challenged. Within five business days of receipt of such writing, the designating party shall either remove or reduce the designation, or respond that it has reviewed the matter and continues to maintain the designation in good faith. 3.2 The parties shall endeavor in good faith to resolve any such dispute without calling upon the intervention of the Court. If the designating party maintains its designation and the parties are unable to reach agreement, the challenging party may bring the issue to the Court, and the parties agree to use any available expedited procedures for doing so. The party asserting confidentiality shall have the burden of establishing the appropriateness of the designation, except that a party claiming that information designated by the other as confidential is in the public domain shall have the burden of proving such public knowledge. 3.3 Challenged information shall be treated as designated until the resolution of the dispute by the parties or ruling by the Court. 4. FILING OF PROTECTED MATERIAL 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 11 of 22 4.1 The parties may not file documents containing Protected Material disclosed by another party unless agreed to in writing by the party that initially disclosed the Protected Material, or unless filed under seal. Given the nature of this case, however, the parties and the Court anticipate a need for the filing of at least some Protected Material under seal. The parties are hereby authorized to file Protected Material under seal provided that each such filing shall be subject to review by the Court. If the Court deems that any filing, or any portion thereof, was not properly filed under seal, the Court may require the filing party to show good cause and the legal basis for why the filing, or portion thereof, should not be unsealed. Unless the Court orders otherwise, all sealed motions and documents shall be filed according to W.D. North Carolina CM/ECF guidelines so they are available electronically to all counsel of record. If sealed filings are not accessible through the Court’s Case Management/Electronic Case Filing System, the parties shall serve opposing counsel by email with a copy of any motion or documents filed under seal. 5. TERMINATION OF LITIGATION 5.1 The obligations of this Protective Order shall survive the termination of the action and continue to bind the parties. Within sixty days after termination of this action by judgment, settlement, or otherwise from which no appeal can be brought, each party shall destroy all documents containing or disclosing Protected Material of any other party. Each party’s outside litigation counsel shall have the right to retain one copy of the pleadings; of motions, memoranda, documents, and papers filed with the Court; of deposition transcripts and exhibits; and of any documents constituting work product. 6. THIRD PARTY DISCOVERY 6.1 In the event that any third party shall be called upon, by subpoena or otherwise, to provide or produce documents or information considered CONFIDENTIAL, HIGHLY 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 12 of 22 CONFIDENTIAL – ATTORNEY EYES ONLY, or HIGHLY CONFIDENTIAL – SOURCE CODE by such third party, such third party may elect to have its information treated in accordance with the terms of this Protective Order by so notifying counsel for all parties in writing. Such third party may also elect to restrict access under paragraph 2.2(a) to the receiving party’s US-based outside attorneys of record and their employees who are engaged in assisting in this action only. Upon service of such notice, such third party may designate documents and information in the manner set forth in this Protective Order, and such third party’s designated information shall be protected in the same manner as that of the parties to this action, subject to any further election made pursuant to this paragraph. 7. INADVERTENT DISCLOSURE 7.1 If a party inadvertently discloses any document or thing containing information that it deems CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY, or HIGHLY CONFIDENTIAL – SOURCE CODE without designating it pursuant to this Protective Order, the disclosing party shall promptly upon discovery of such inadvertent disclosure inform the receiving party in writing, forwarding a replacement copy of the inadvertently disclosed material properly marked with the appropriate confidentiality designation. The receiving party shall thereafter treat the information as if it had been properly marked from the outset and shall make a reasonable effort to retrieve and destroy the unmarked version of the inadvertently disclosed material. Disclosure by the receiving party to unauthorized persons before being notified of the inadvertent disclosure shall not constitute a violation of this Protective Order. Nothing in this Protective Order shall preclude the receiving party from challenging the confidentiality designation of the late-marked material pursuant to the provisions of paragraph 3. 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 13 of 22 7.2 Pursuant to Federal Rule of Evidence 502, the inadvertent or mistaken production or disclosure of documents or other information subject to the attorney-client privilege, the work product doctrine, or other privilege shall not be deemed a waiver of a claim of privilege, either as to the specific information disclosed or as to any other related information. If a producing party inadvertently produces or otherwise discloses to a receiving party information that is subject to such privilege or immunity, the producing party shall promptly upon discovery of such disclosure so advise the receiving party in writing and request that the inadvertently disclosed information be returned or destroyed. The receiving party shall return or destroy all copies of the inadvertently produced material within five business days of receipt of the request. Any notes or summaries referring or relating to any inadvertently produced privileged material shall be destroyed. Nothing in this Protective Order shall preclude the receiving party returning the inadvertently produced material from seeking an order compelling the production of information previously produced inadvertently. 8. MISCELLANEOUS PROVISIONS 8.1 If Protected Material in the possession of any receiving party is subpoenaed by any court, by any administrative or legislative body, or by any other person purporting to have authority to subpoena such information, or is the subject of any discovery request under Rules 30-36 of the Federal Rules of Civil Procedure or any comparable rule of court or of any adjudicative body (such subpoena or discovery request collectively referred to as a ”Third Party Request“), the party to whom the Third Party Request is directed will not produce such information without first giving prompt written notice (including a copy of the Third Party Request) to the attorneys of record for the producing party, no more than three business days after receiving the Third Party Request. The party receiving the Third Party Request must also promptly inform in writing the party who caused 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 14 of 22 the Third Party Request to issue in the other litigation that some or all the material covered by the Third Party Request is subject to this Protective Order. The party receiving the Third Party Request must deliver a copy of this Protective Order promptly to the party in the other action that caused the Third Party Request to issue. 8.2 The producing party shall bear the burden and expense of seeking protection in court of its own Protected Material, and nothing in this Protective Order should be construed as authorizing or encouraging a party receiving a Third Party Request in this action to disobey a lawful directive from another court. Disclosure of information in response to a properly issued Third Party Request shall not constitute a violation of this Protective Order. 8.3 This Protective Order may be modified only by further Order of the Court, whether sua sponte or by agreement of the parties or their counsel and approval by the Court, and is without prejudice to the rights of any party to move for relief from any of its provisions, or to seek or agree to different or additional protection for any particular material or information. 8.4 Treatment by counsel or the parties of information designated CONFIDENTIAL, HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY, or HIGHLY CONFIDENTIAL – SOURCE CODE as designated shall not be construed as an admission by any party that the designated information contains trade secrets or other proprietary or confidential information. Conversely, failure to so designate shall not constitute a waiver of any party’s claims, either within or outside this action, that any such documents or information do contain trade secrets or other proprietary or confidential information. 8.5 No party shall be obligated to challenge the propriety of any designation, and failure to challenge a claim of confidentiality at the time of receipt shall not constitute a waiver of the right to challenge a confidentiality designation at any later time. 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 15 of 22 8.6 By proposing this protective order, neither party shall be deemed to have agreed to the discoverability of information that is covered by this protective order, and entry of this protective order does not mean the Court has determined that information potentially covered by this protective order is discoverable. 9. SOURCE CODE 9.1 Any review and production of Source Code that is determined to be relevant and necessary to the adjudication of the claim in this Action shall be governed by the procedures set forth in this Section 9. The inclusion of this paragraph does not mean that the Parties have agreed that any such Source Code review or production is relevant and/or necessary to the adjudication of the claims of infringement and validity at issue in this Action. 9.2 To the extent it is determined that analysis of the Source Code is necessary, only those limited portions of the producing party’s Source Code that are relevant to the functionality claimed in the Patents-in-Suit and any infringement or validity analysis thereof shall be made available for review, and the parties agree to work together in good faith on this issue. Neither Party shall be required to produce portions of its Source Code that are unrelated to such functionality. 9.3 Protected Material designated as HIGHLY CONFIDENTIAL – SOURCE CODE shall be subject to all of the protections afforded to HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY information including the prosecution bar set forth above, and may be disclosed only to the individuals to whom HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY information may be disclosed. 9.4 Source Code shall be made available for inspection in its original directory structure. The Source Code shall be in a format allowing it to be reasonably reviewed and 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 16 of 22 searched, during normal business hours or at other mutually agreeable times, at an office of the producing party’s Outside Counsel of Record or another mutually agreed upon location. 9.5 The Source Code shall not be zipped or otherwise need to be extracted or unpacked. If multiple versions of Source Code are provided, they shall be clearly identified. 9.6 All persons who will review the Source Code on behalf of the receiving party shall be identified in writing to the producing party at least seven business days in advance of the first time that such person reviews the Source Code. Such identification shall be in addition to any other disclosure required by this Order. The producing party shall provide these individuals with information explaining how to start, log on to, and operate the Source Code Computer in order to access the Source Code on the Source Code Computer. 9.7 For subsequent reviews by the same persons, the receiving party shall give at least three business days (and at least seventy-two hours) notice to the producing party of the identity of those persons who will review the Source Code a subsequent time. Requests made at least fortyeight hours in advance shall be accommodated if it is not burdensome to do so. 9.8 The Source Code shall be made available for inspection on a secured computer (“Source Code Computer”) in a secured room without Internet access or network access to other computers. The receiving party shall not copy, remove, or otherwise transfer any portion of the Source Code onto any recordable media or recordable device. The producing party may monitor the activities of the receiving party’s representatives during any Source Code review. 9.9 Upon a receiving party’s request and with at least seven business days’ notice, the producing party shall bring the Source Code Computer to a deposition that will involve the Source Code so that the witness can respond to questions regarding the Source Code during examination. 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 17 of 22 9.10 The receiving party shall be entitled to take notes relating to the Source Code. The notes may contain the names of Source Code classes, functions, and variables. The notes may include any information as long as they do not contain more than five contiguous lines and fifty total lines of actual, verbatim copied Source Code. 9.11 No electronic devices, including but not limited to cellular phones, PDAs, cameras, and voice recorders will be permitted in the room with the Source Code Computer. Laptops may be used during inspection of the Source Code for notetaking, provided such use is consistent with this Stipulated Protective Order (e.g., any camera, wi-fi, or other non-permitted functionality will not be used). The producing party must provide the receiving party’s Source Code reviewers with a “breakout room” that is separate from the room containing the Source Code Computer, where the receiving party’s Source Code reviewers may keep their cell phones, etc., and have access to the Internet. Such notes, whether handwritten or taken electronically, shall not be the subject of discovery or inquiry at trial. Any copies or printouts of the reviewers’ notes containing Source Code should be marked HIGHLY CONFIDENTIAL-SOURCE CODE. 9.12 The producing party shall install tools that are sufficient for viewing and searching the code produced on the platform produced, if such tools exist and are presently used in the ordinary course of the producing party’s business. The receiving party’s outside counsel, consultants, and/or experts may request that commercially available software tools for viewing and searching Source Code be installed on the Source Code Computer, provided, however, that (a) the receiving party or the producing party possesses an appropriate license to such software tools; (b) the Producing Party approves such software tools, said approval not to be unreasonably withheld; and (c) the receiving party reasonably believes that such software tools would assist the receiving party in performing its review of the Source Code consistent with all of the protections 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 18 of 22 herein. Unless the requested software tools are already available to the producing party, the receiving party must provide the producing party with such licensed software tool(s) at least four (4) days in advance of the date upon which the receiving party wishes to have the additional software tools available for use on the Source Code Computer. 9.13 The Source Code Computer shall include tools to reasonably facilitate an expeditious and efficient inspection of the Source Code. The Parties will work together in good faith to disclose information that will facilitate such efficiency. Subject to the preceding paragraph, the receiving party will include these tools on the source-code computer. 9.14 The receiving party may also have installed additional tools on reasonable notice and request, and at its own expense unless the producing party can have the additional tools installed at no out-of-pocket cost. The receiving party must provide the producing party with the CD or DVD (or download link) to any such tool(s) at least seven business days in advance of the date upon which the receiving party wishes to have the tool(s) available for use. Should it be necessary, other mutually agreed upon tools may be used with the receiving party undertaking actions to enable the same. The producing party may object to the use of any tool requested by the receiving party pursuant to this paragraph, but must do so by notifying the receiving party of its objections and the reasons for its objections within three business days after the reasonable written notice and request (or other reasonable period, depending on the circumstances). 9.15 Subject to paragraphs 9.16-9.17, the receiving party may request receipt of printed paper copies of limited portions of Source Code that are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial, but shall not request paper copies for any other purpose including the purposes of reviewing the Source Code other than electronically as set forth above in the first instance. The receiving party shall not 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 19 of 22 request the printing of Source Code solely to review blocks of Source Code elsewhere, i.e., as an alternative to reviewing that Source Code electronically on the Source Code Computer. 9.16 The receiving party may request printed copies of Source Code by identifying relevant folder name(s), file names(s), starting and ending line numbers and/or other relevant information sufficient to specify the portions to be printed. After reviewing the print request for compliance with this Protective Order, and subject to any challenge, the producing party shall prepare and provide to the receiving party all such Source Code in paper form, including bates numbers and the label “HIGHLY CONFIDENTIAL - SOURCE CODE” either (i) on-site where the Source Code is printed or (ii) by delivery no later than five business days after such Source Code is printed (unless otherwise agreed to by counsel). 9.17 If the producing party objects that the requested printed portions are excessive and/or not done for a permitted purpose, the producing party shall make such objection known to the receiving party within five days. If the parties are unable to resolve the dispute, the receiving party shall have the burden of demonstrating that the requested printouts are reasonable and necessary per the terms of this Protective Order. 9.18 The receiving party shall maintain a record of any individual who has inspected any portion of the Source Code in electronic or paper form. The receiving party shall maintain all paper copies of any printed portions of the Source Code in a secured, locked area. The receiving party shall not create any electronic or other images of the paper copies and shall not convert any of the information contained in the paper copies into any electronic format. The receiving party shall only make additional paper copies if such additional copies are (1) necessary to prepare court filings, pleadings, or other papers (including a testifying expert’s expert report), (2) necessary for deposition, or (3) otherwise necessary for the preparation of its case. Any paper copies used during 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 20 of 22 a deposition shall be retrieved by the producing party at the end of each day and must not be given to or left with a court reporter or any other unauthorized individual. 9.19 If a party determines in good faith that any Source Code must be filed with the Court, it shall provide the receiving party at least seven days-notice prior to doing so work in good faith with the producing party to identify the smallest amount of Source Code necessary to be filed. Such Source Code must be filed under seal in accordance with Local Civil Rule 6.1. SO ORDERED. Signed: November 17, 2022 STIPULATED AND AGREED: /s/_________________________________ Daniel J. Schwartz (admitted pro hac vice) Matthew A. Werber (admitted pro hac vice) Nixon Peabody LLP 70 West Madison, Suite 3500 Chicago, IL 60602-4224 Telephone: (312) 977-4400 djschwartz@nixonpeabody.com mwerber@nixonpeabody.com _________________________________ John F. Morrow, Jr. N.C. Bar No. 23382 Womble Bond Dickinson (US) LLP One West Fourth Street Winston-Salem, NC 27101 Telephone: (336) 721-3584 Facsimile: (336) 733-8429 John.Morrow@wbd-us.com Michael G. Adams N.C. Bar No. 16528 Nicholas H. Lee N.C. Bar No. 47885 PARKER POE ADAMS & BERNSTEIN LLP 620 South Tryon Street, Suite 800 Charlotte, North Carolina 28202 Telephone: (704) 335-9876 Facsimile: (704) 334-4706 mikeadams@parkerpoe.com nicholaslee@parkerpoe.com Counsel for Defendant PCI Pal (US) Inc. Counsel for Plaintiffs 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 21 of 22 EXHIBIT A IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF NORTH CAROLINA CHARLOTTE DIVISION SYCURIO LIMITED and SYCURIO, INC. Plaintiffs, DOCKET NO. 3:21-cv-00486-MOC-DSC v. PCI PAL (U.S.) INC., AGREEMENT TO BE BOUND BY PROTECTIVE ORDER Defendant. I, ____________________________, hereby acknowledge that I received a copy of the Protective Order in this action. I read and understood the Protective Order and agree to be bound by its provisions. I agree not to copy or use any CONFIDENTIAL or HIGHLY CONFIDENTIAL – ATTORNEY EYES ONLY information that may be provided to me for any purpose other than in connection with this action, and I agree not to reveal any such information to any person not authorized by the Protective Order. I further acknowledge and understand that a violation of the Protective Order may subject me to penalties of the Court, and I hereby submit to the jurisdiction of the United States District Court for the Western District of North Carolina in connection with any proceedings concerning enforcement of the Protective Order. Dated: __________________ _________________________ 4879-4332-6780.7 Case 3:21-cv-00486-MOC-DSC Document 44 Filed 11/17/22 Page 22 of 22

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?