Wireless Recognition Technologies LLC v. A9.com, Inc. et al
Filing
96
Joint MOTION for Protective Order (Entry of) by A9.com, Inc., Amazon.com, Inc., Google, Inc.,, Nokia, Inc., Ricoh Innovations, Inc., Wireless Recognition Technologies LLC. (Attachments: # 1 Exhibit 1-Proposed Protective Order with Competing Proposals, # 2 Exhibit 2-Plaintiff's Proposed Protective Order, # 3 Exhibit 3-Defendants' Proposed Protective Order, # 4 Exhibit 4-Dkt. No. 241 from LTT case, # 5 Exhibit 5-Dkt. No. 169 from LTT case, # 6 Exhibit Dkt. No. 169-1 from LTT case, # 7 Exhibit 7-ST Sales v. Daimler-LEXIS, # 8 Exhibit 8-Yudell Power of Attorney)(Shvodian, Daniel)
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
WIRELESS RECOGNITION
TECHNOLOGIES LLC,
Plaintiff,
vs.
A9.COM, INC., AMAZON.COM, INC.,
GOOGLE INC., NOKIA, INC., and
RICOH INNOVATIONS, INC.,
Defendants.
)
)
)
)
)
)
)
)
)
)
)
)
)
CIVIL NO. 2:10-CV-00364-TJW-CE
JOINT MOTION FOR ENTRY OF PROTECTIVE ORDER
TABLE OF CONTENTS
Page
A.
Whether In-House Counsel Or Other Individuals Should Be Permitted Access
To Highly Confidential Financial Information (Section 5 of the Proposed
Protective Order).................................................................................................................. 1
1.
2.
B.
Plaintiff’s Position.................................................................................................... 1
Defendants’ Position ................................................................................................ 2
Adequate Procedures To Protect Defendants’ Highly Confidential Source
Code And Plaintiff’s Ability To Access The Same (Sections 6(b)(i), 6(b)(ix)
and 6(b)(xi-xv) of the Proposed Protective Order) .............................................................. 3
1.
2.
C.
Plaintiff’s Position.................................................................................................... 3
Defendants’ Position ................................................................................................ 5
Treatment Of Subpoenas Or Court Orders To Compel Protected Documents
(Section 14 of the Proposed Protective Order) .................................................................... 8
1.
2.
D.
Plaintiff’s Position.................................................................................................... 8
Defendants’ Position ................................................................................................ 8
Patent Prosecution Bar (Section 23 of the Proposed Protective Order)............................. 10
1.
2.
E.
Plaintiff’s Position.................................................................................................. 10
Defendants’ Position .............................................................................................. 11
Whether The Parties Must OCR Documents Before Producing Them, And If
So, Whether The OCR Costs Should Be Split Between The Parties (Section 31
of the Proposed Protective Order)...................................................................................... 13
1.
Plaintiff’s Position.................................................................................................. 13
2.
Defendants’ Position .............................................................................................. 14
i
TABLE OF AUTHORITIES
Page(s)
CASES
Brown v. Braddick,
595 F.2d 961 (5th Cir. 1979) .............................................................................................. 9
FTC v. Exxon Corp.,
636 F.2d 1336 (D.C. Cir. 1980) ........................................................................................ 13
In re Deutsche Bank Trust Co. Americas,
605 F.3d 1373 (Fed. Cir. 2010)....................................................................... 10, 11, 12, 13
In re Genentech, Inc.,
566 F.3d 1338 (Fed. Cir. 2009)......................................................................................... 14
Light Transformation Technologies. LLC v. Anderson Custom Electronics, Inc.,
Case No. 2:09-cv-354 (E.D. Tex. Mar. 30, 2011) .............................................................. 2
ST Sales Tech Holdings, LLC v. Daimler Chrysler Co.,
2008 U.S. Dist. LEXIS 107096 (E.D. Tex. Mar. 14, 2008)............................................ 2, 3
U.S. Steel Corp. v. United States,
730 F.2d 1465 (Fed. Cir. 1984)..................................................................................... 1, 12
RULES
Federal Rule of Civil Procedure 26 ................................................................................................ 9
Federal Rule of Civil Procedure 34 .............................................................................................. 15
Federal Rule of Civil Procedure 45(c)(2)(B) .................................................................................. 9
ii
Pursuant to the Discovery Order entered in this case (Dkt. No. 63), the parties hereby
jointly move the Court for entry of a Protective Order.
The parties have extensively conferred and narrowed their disputes, but they have not
been able to completely reach an agreement regarding some of the specific provisions in an
Agreed Protective Order for the above case.
Attached hereto for the Court’s consideration are the parties’ proposed Protective Orders.
Specifically, attached as “Exhibit 1” is a consolidated version of the proposed Protective Order,
wherein the text that is agreed upon is not highlighted, the text proposed by Plaintiff but objected
to by Defendants is highlighted in blue, and the text proposed by Defendants but objected to by
Plaintiff is highlighted in yellow. The parties have also attached Plaintiff’s proposed Protective
Order as “Exhibit 2” and Defendants’ proposed Protective Order as “Exhibit 3.” The parties’
positions on the remaining issues are as set forth below.
A.
Whether In-House Counsel Or Other Individuals Should Be Permitted Access To
Highly Confidential Financial Information (Section 5 of the Proposed Protective
Order)
1.
Plaintiff’s Position
The in-house counsel for Plaintiff Wireless Recognition Technologies LLC (“WRT”) has
responsibility for making decisions dealing directly with this litigation and also assists outside
counsel with the present action. Accordingly, WRT seeks to permit its in-house counsel access
to Defendants’ financial information relating to the Accused Instrumentalities, in order that he
may make decisions and engage in meaningful settlement negotiations.
WRT’s position is entirely proper. First, the “competitive decision-making” test is the
standard for determining whether in-house counsel should see sensitive or confidential
information. U.S. Steel Corp. v. United States, 730 F.2d 1465 (Fed. Cir. 1984). It is not a matter
of dispute that Plaintiff WRT is a non-practicing entity. Therefore, WRT does not compete with
Defendants, and there could be no possible competitive harm from WRT’s in-house counsel
seeing financial information for purposes of case supervision and settlement.
1
Secondly, this Court has already decided the issue under a similar if not an identical set
of facts in favor of plaintiff. Light Transformation Techs. LLC v. Anderson Custom Elecs., Inc.,
Order, Case No. 2:09-cv-354 (E.D. Tex. Mar. 30, 2011).1 There, the non-practicing entity was
Light Transformation Technologies LLC, whose parent was Acacia Research Corporation,2 the
same parent entity as that of the present Plaintiff WRT. The scope of language used there was
also the same as that offered presently by WRT, given the context of the Protective Order.3
2.
Defendants’ Position
Defendants object to Plaintiff’s proposal to allow its in-house counsel, who is a
competitive decision maker, access to Defendants’ highly confidential financial information.
Plaintiff’s counsel, Brad Botsch, who is responsible for managing this litigation is a business
development executive of Plaintiff’s parent, Acacia Research Group, a patent acquisition and
licensing entity. Mr. Botsch advises and participates in business decisions relating to licensing
and enforcement of patents acquired by Acacia, including patents acquired by its subsidiary,
Plaintiff WRT. (See Dkt. No. 78-1 (Botsch Decl.) at ¶¶ 2-5.) This Court has held that when a
company’s “entire business model with [its] patent-holding companies … revolves around the
acquisition, enforcement (through litigation), and licensing of patent …, it is difficult to argue
that someone such as [its in-house counsel], who is heavily involved in these aspects of the
business, is somehow not a competitive decisionmaker.” See, e.g., ST Sales Tech Holdings, LLC
v. Daimler Chrysler Co., 2008 U.S. Dist. LEXIS 107096, *22-26 (E.D. Tex. Mar. 14, 2008)
(granting protective order denying access to counsel for patent licensing entity).4 Thus, based on
Plaintiff/Acacia’s business model, all of its in-house counsel are competitive decision makers.
1
Ex. 4 (Dkt. No. 241).
2
Ex. 5 (Dkt. No. 169 at ¶ 4, 3).
3
Ex. 6 (Dkt. No. 169-1 at ¶ 9, 6).
4
Ex. 7.
2
Furthermore, under the balancing test of U.S. Steel, the substantial and potentially
dangerous risk of inadvertent disclosure outweighs any need that in-house counsel may have for
such information.
Plaintiff/Acacia could use Defendants’ highly confidential financial
information to their detriment in determining which patents to acquire or assert and in pricing its
patent licenses with other companies.
However, in-house counsel managing litigation for
Plaintiff does not need access to Defendants’ highly confidential financial information to
prosecute or settle Plaintiff’s claims in the litigation. Plaintiff’s outside counsel and independent
financial experts will have access to such information, and like other competitors and investors
who must make financial decisions, Plaintiff’s in-house counsel can make decisions about
settlement based on its outside counsel’s advise and publicly available information.
Compounding the problem are the facts that Plaintiff has filed several suits against the
Defendants already on the same products, and continues to prosecute additional patents in the
Patent Office. (Dkt. No. 68-2 (Yudell Decl.) at ¶¶ 1, 4.) Plaintiff seeks to provide its in-house
counsel access to highly confidential financial information about Defendants’ products and
unfettered ability to participate in prosecution of Plaintiff’s patents, thereby allowing Plaintiff to
steer the patents in directions where Defendants’ highly confidential financial information might
project sales to be most critical. See ST Sales Tech Holdings, 2008 U.S. Dist. LEXIS 107096 at
*18-20.
Thus, Plaintiff’s proposal to permit in-house counsel or other undefined in-house
individuals access to Defendants’ highly confidential financial information must be rejected.
B.
Adequate Procedures To Protect Defendants’ Highly Confidential Source Code And
Plaintiff’s Ability To Access The Same (Sections 6(b)(i), 6(b)(ix) and 6(b)(xi-xv) of
the Proposed Protective Order)
1.
Plaintiff’s Position
It is with reluctance that Plaintiff WRT requests the Court’s intervention on the issue of
treatment of source code and spends the Court’s valuable energy on such matter. While the
present Defendants, like all Defendants, seek to protect their source code, WRT requires
3
sufficient access to the source code to enable its technical experts to support its infringement
case.
Starting with the entirety of the Protective Order, itself, the nearly forty-page draft was
originally drafted by Defendants. As Defendants’ production will likely outweigh WRT’s, they
are obviously motivated to devise as complicated and oppressive a set of terms and conditions as
possible, and even a cursory review of the document illustrates they that have done just that.
In the source code paragraph itself, WRT requested a few concessions from Defendants
who have refused to budge away from their original language.
WRT has reasonably requested that its expert be able to use an electronic storage device
(e.g., flash drive) under the strict provisions of the ten-page paragraph – under a stand-alone,
non-networked personal computer with no peripheral devices – and that Defendants ensure the
source code works with software utilities under their harshly imposed conditions.5 Defendants
deny the former storage request and would permit the latter only at their option and WRT’s
expense. Despite that the code review is at Defendants’ facilities, on their computer with their
restrictions, Defendants have refused to offer technical help in operating the source code if
WRT’s expert requires it.6
Defendants have provided strict conditions on the number of pages to be printed, the
number of blocks of code, the security conditions of the printed pages, and requirement of an
access log to the pages identifying who, when and how long they are viewed.7 They would
prohibit printed copies of the source code, other than attached to sealed court filings, expert
reports and the like.8 They would prohibit electronic copies even where reasonably necessary,
and prohibit character recognition needed by experts in sifting through thousands of lines of
5
See Ex. 1, § 6(b)(i).
6
Id.
7
See Ex. 1, § 6(b)(ix).
8
See Ex. 1, § 6(b)(xi).
4
code.9 They would deny any type of storage of the code that WRT’s expert may need to get its
job done in a reasonable and efficient manner.10
Defendants’ set of conditions imposes a veritable mine field of requirements making the
activities of WRT’s expert extremely difficult to accomplish and therefore unduly expensive for
its client. Moreover, the conditions are moot since source code is to be treated as highly
confidential,11 and WRT’s expert must agree to and acknowledge the provisions of the
Protective Order under the provisions of Exhibit A.12
That Defendants seek to force this onerous, ten-page set of rules on Plaintiff WRT, with
little or no room for compromise, is a notable illustration of WRT’s challenge in resolving
disputes with the Defendants.
2.
Defendants’ Position
The parties agree that the Defendants’ Highly Confidential Source Code should be
afforded additional protections beyond those provided for other Confidential Information.
Defendants’ proposed provisions acknowledge the highly sensitive nature of the respective
parties’ Source Code and outline specific procedures that provide reasonable restrictions on
access and safeguards to prevent unauthorized dissemination and use of such material.
Plaintiff’s proposed provisions, on the other hand, attempt to circumvent the requirements for
inspecting the Source Code at a secure site and do not provide much heightened security beyond
what is required for Highly Confidential - Outside Counsel Only. Plaintiff also objects to many
of Defendants’ provisions based on the purported inconvenience to its outside counsel.
Defendants insist that there should be reasonable restrictions on any copies made of the
Source Code reviewed at the secure site. In particular, Defendants’ provisions prohibit making
9
See Ex. 1, § 6(b)(xii).
10
See Ex. 1, § 6(b)(xiii).
11
See Ex. 1, § 6(a).
12
See Ex. 1, § 6(b)(vii).
5
any paper copies or electronic images of the Source Code except to the extent relevant and
necessary for any pleading, exhibits, expert reports, depositions, or other court documents. (See
Ex. 1, § 6(b)(xi) and (xii).) This prohibition does not impede Plaintiff’s access to the Source
Code or litigation of its case. Furthermore, Defendants insist that paper copies may not be
scanned using OCR or converted into a text-searchable format, which would otherwise obviate
the requirement that access to searchable copies of the Source Code be limited to the secure site.
Plaintiff’s counter-proposals for these provisions that prohibit copies “except as may be
reasonably necessary in the litigation of this action” fails to articulate the specific type of
activities that would permitted. Absent this type of clarity, the producing party loses control
over what copies can be made, and subsequently where they may end up, and the parties will be
left to debate later whether a copy was “reasonably necessary.” Defendants’ proposal avoids this
ambiguity.
Defendants’ proposal also defines specific limits on the amount of Source Code that may
be printed at any given time (e.g., no more than 10% or 500 pages) as well as other reasonable
steps to maintain the security and confidentiality of the Source Code (e.g., copies kept in secure
locked area). (See Ex. 1, § 6(b)(ix).) Without these restrictions, Plaintiff would be free to print
the entirety of Source Code files, including portions not needed for its case. Defendants also
expect the receiving party to maintain an access log of all copies of the Source Code in its
possession, which will be produced upon request, that identifies who received copies of the
Source Code and when it was provided, as well as a certification at the end of case that all copies
of the Source Code have been returned. (See Ex. 1, § 6(b)(xiv).) The purpose of the log is to
provide the producing party with a record of all individuals that accessed the material in case a
breach in confidentiality is discovered later. Plaintiff objects to making the log available and
certifying the return of Source Code because it would be burdensome on its counsel, but the
security of the Source Code should be paramount and the alleged burdens on Plaintiff are
6
minimal. The parties also disagree on whether additional peripheral devices may be connected
to the Source Code Computer13 or brought into the secure site. (See Ex. 1, § 6(b)(i) and (xiii).)
Again, these provisions do not hinder Plaintiff’s ability to review the Source Code and are meant
to ensure that copies of the Source Code are not taken from or communicated electronically
outside of the secure site. Plaintiff’s proposal to permit a flash drive to store copies of the
Source Code (§ 6(b)(i)), which can then be taken and reviewed elsewhere, flies in the face of
requiring the Source Code be inspected at the secure site. In addition, the parties dispute whether
the cost of providing any additional tools or software utilities should be borne by the receiving
party. (Id.) Defendants assert that since these programs are not essential for accessing the
Source Code but rather merely aid in its review, they should be provided at the receiving party’s
expense. Furthermore, Plaintiff’s requirement that Defendants provide “the help of personnel
with appropriate technical expertise” to assist in its review of the Source Code goes beyond the
requirements of providing instructions on how to operate the Source Code Computer in the
Court’s standard protective order, which Defendants have already agreed to provide.
Finally, Defendants seek further assurance that any experts or consultants retained by the
parties that access the Source Code will agree to not perform software development work for
commercial purposes related to the functionality covered by the Source Code reviewed for a
period of one year after substantive involvement in this litigation. (Ex. 1, § 6(b)(xv).) The
rationale for this provision is to help ensure that an expert does not improperly utilize any portion
of the Source Code it reviewed, since it is hard to separate the knowledge of the source code
from one’s memory. Plaintiff’s stated opposition is that an expert will have already signed the
Protective Order, but the potential for inadvertent use in this instance greatly exceeds the limited
restriction placed on a potential expert.
13
The parties do not dispute that a printer may be connected to the Source Code Computer to
print copies of the Source Code on watermarked pre-Bates numbered paper, which is separately
addressed in § 6(b)(ix) of Exhibit 1.
7
C.
Treatment Of Subpoenas Or Court Orders To Compel Protected Documents
(Section 14 of the Proposed Protective Order)
1.
Plaintiff’s Position
In reference to subpoenas or court orders to compel protected documents served on a
receiving party, the parties agree that the receiving party is to notify the producing party
promptly.
After such notice, Plaintiff departs company from Defendants’ draft. As the information
sought belongs to the producing party, Plaintiff has the receiving party tender notice to the
producing party, who will attend to the matter accordingly and bear the corresponding duties and
obligations. As the producing party has a vested interest in preserving the protected status of its
own information, it is in the best position to assume such duties as well as to absorb the
associated costs.
On the contrary, Defendants’ draft imposes a set of conditions on the receiving party,
including the type of notice to the producing party, the type of notice to the party causing the
subpoena to be issued, and on the party in the other action that caused the subpoena to issue.
Like Plaintiff’s proposal, the fees are absorbed by the producing party. These actions are clearly
designed to have the receiving party inform all necessary parties about the protected status of the
producing party’s information. However, Plaintiff WRT’s position is more logical as it places
the burden on the party whose information is sought – namely, the producing party – and does
not have the receiving party perform actions whose fees are absorbed by the producing party.
2.
Defendants’ Position
Consistent with the purposes of a protective order, Defendants’ proposed language gives
a party that produces confidential information in this case an opportunity to ensure that such
confidentiality is protected if the information in the possession of the receiving party is the
subject of a third party subpoena. Plaintiff, on the other hand, seeks to absolve the receiving
party of any responsibility for responding to such a subpoena by shifting that responsibility to the
party from which it obtained the information in discovery. Plaintiff would even require the
8
producing party to indemnify the receiving party. Plaintiff’s proposal turns the purpose of a
protective order under Federal Rule of Civil Procedure 26 on its head: rather than protecting a
party producing discovery in this case, it exposes that party to liability.
Furthermore, Plaintiff’s proposal imposes duties and obligations on a producing party and
its counsel that they may not be able to meet. For any subpoena or court order directed to a
receiving party that would require disclosure of a producing party’s designated highly
confidential information, Plaintiff’s proposal would allow the receiving party to shift
responsibility to the producing party’s counsel “to attend to all matters associated with such
subpoena or court order on behalf of receiving party,” and provides that “the producing party
shall bear all duties and obligations relating to the matter, including without limitation
indemnification of receiving party in regard thereto” (emphasis added). Thus, if the subpoena or
court order sought any information designated as highly confidential by a producing party,
regardless of whether it sought other information as well, Plaintiff’s proposal would allow the
subpoenaed receiving party to simply wash its hands of the whole matter by giving notice to the
producing party. However, the producing party’s counsel may have conflicts that prevent it from
acting on behalf of the receiving party in any capacity, especially as to aspects of a subpoena
going beyond the confidential information of the producing party.
Moreover, only the
subpoenaed party can serve objections under Federal Rule of Civil Procedure 45(c)(2)(B), such
that the producing party could not respond in such a manner, and would be limited to the more
expensive option of moving to quash or modify the subpoena. If the subpoena commands
production of more than the producing party’s highly confidential information, the producing
party may not have standing to make such a motion. Brown v. Braddick, 595 F.2d 961 (5th Cir.
1979) (no standing where the movant lacks personal right or privilege with respect to the
materials subpoenaed).
9
D.
Patent Prosecution Bar (Section 23 of the Proposed Protective Order)
1.
Plaintiff’s Position
Plaintiff WRT is willing to impose upon itself a patent prosecution bar, just not one so
open ended and extreme in its language as set forth by Defendants.
WRT’s proposed language prohibits counsel who receives confidential information from
providing advice or opinions to facilitate patent prosecution.
The language makes two
exceptions. The first is that counsel may take part in reexamination proceedings, which is fair in
that if Defendants’ counsel may challenge the validity of the patents-in-suit, then Plaintiff’s
counsel should be able to challenge them. Secondly, it also excludes confidential financial
information, which rightfully does not belong in a prosecution bar. In re Deutsche Bank Trust
Co. Ams., 605 F.3d 1373, 1381 (Fed. Cir. 2010) (“[F]inancial data and other sensitive business
information, even if deemed confidential, would not normally be relevant to a patent application
and thus would not normally be expected to trigger a patent prosecution bar.”). Accordingly, it
achieves the Federal Circuit’s balancing test between the risk of inadvertent use of Defendants’
confidential information and harm to Plaintiff in its choice of counsel.14
On the other hand, Defendants propose barring virtually any prosecution activity,
including preparing, prosecuting, drafting, editing, and/or amending of patent applications,
specifications, claims, and/or responses to office actions. Their proposed bar prohibits work on
reissues, where the specification may be amended for clarification purposes, and claims may be
amended to further narrow them, none of which activities could adversely impact Defendants.
14
Id. “[A] patent prosecution bar must show on a counsel-by-counsel basis: (1) that counsel’s
representation of the client in matters before the PTO does not and is not likely to implicate
competitive decisionmaking related to the subject matter of the litigation so as to give rise to a
risk of inadvertent use of confidential information learned in litigation, and (2) that the potential
injury to the moving party from restrictions imposed on its choice of litigation and prosecution
counsel outweighs the potential injury to the opposing party caused by such inadvertent use.”
10
While seemingly offering to permit WRT’s counsel to participate in reexaminations,
Defendants’ offering is indeed empty and riddled with inconsistencies. Defendants’ offered
language states that counsel is not precluded from taking part in reexaminations, but only where
the validity of claims is challenged, except that counsel may not craft the claims. It also states
that counsel may not participate, either directly or indirectly in the proceedings either. Exactly
how WRT’s counsel may participate in reexaminations in a meaningful way for its client is a
mystery.
Despite Defendants’ de facto prohibition of participation in reexaminations,
Defendants’ litigation counsel, themselves, may institute such reexaminations; in other words,
Defendants’ counsel may attack the validity of Plaintiff WRT’s claims before the U.S. Patent and
Trademark Office, yet Plaintiff WRT’s own counsel may not defend against such action without
likely violating Defendants’ propounded language.
Defendants’ proposed over-reach even extends to three years beyond the final resolution
of the cases in the action. Accordingly, despite that all claims may be settled with all Defendants
in the present action, Defendants would like to bar Plaintiff WRT’s own counsel for another
three years after that. That counsel most knowledgeable about WRT’s patent portfolio would be
prohibited from serving their client for years after the present action, at no disadvantage to the
present Defendants, can hardly be considered a fair offering by Defendants.
Accordingly, rather than balancing their interests with Plaintiff WRT’s interest in its
choice of counsel, Defendants ignore WRT’s interests altogether. Id. (“[T]he court should
consider . . . the potential difficulty the client might face if forced to rely on other counsel for the
pending litigation or engage other counsel to represent it before the PTO.”).
2.
Defendants’ Position
Defendants propose a patent prosecution bar that will permit the exchange of highly
confidential information in this litigation, including design and source code information for the
accused products, while removing the danger that such information could be used, even
inadvertently, during the prosecution of patents for Plaintiff or others. (See Ex. 1 at pp. 26-27
(yellow highlighting).) In evaluating the appropriateness of a protective order, a court must
11
consider the risk and potential danger of “inadvertent or accidental disclosure” and weigh it
against the potential burden and impairment the protective order may have on the other party.
U.S. Steel Corp., 730 F.2d at 1468.
In applying U.S. Steel to the evaluation of a proposed patent prosecution bar in Deutsche
Bank, the Federal Circuit instructed that the initial inquiry is whether the individuals that will be
subject to the bar are involved in “competitive decision making,” which included “making
strategic decisions on the type and scope of patent prosecution that might be available or worth
pursuing for such inventions, writing, reviewing, or approving new patent applications or
continuations-in-part of application to cover those inventions, or strategically amending or
surrendering claim scope during prosecution.” 605 F.3d at 1380. The Federal Circuit held that
when attorneys are involved in such patent prosecution activities, there is a risk of inadvertent
disclosure, and therefore such attorneys should not be exempted from a prosecution bar. Id. The
Federal Circuit then said that the risk of use or inadvertent disclosure should be balanced against
potential harm of the restriction, such as denying the patentee the right to continue using
prosecution counsel that has a history of representing the patentee. Id. at 1380-81.
Here, Defendants’ proposed patent prosecution bar is narrowly tailored to individuals
who obtain highly confidential information, which includes product design and source code
information. These individuals would pose a risk of inadvertent disclosure if they were allowed
to participate in the prohibited activities of “preparing, prosecuting, drafting, editing, and/or
amending of patent applications, specifications, claims, and/or responses to office actions . . .”
(See Ex. 1 at p. 27.) Thus, the individuals that would be subject to Defendants’ proposed patent
prosecution bar satisfy the initial “competitive decision making” portion of the analysis recited in
Deutsche Bank. 605 F.3d at 1380.
The second portion of the Deutsche Bank analysis is also satisfied because Plaintiff will
not be unduly prejudiced by Defendants’ proposal. Plaintiff’s litigation counsel does not have a
history of representing Plaintiff in patent prosecution matters. For several years, Plaintiff has
used Craig Yudell as its prosecution counsel. Mr. Yudell has been involved with the prosecution
12
of Plaintiff’s patents since early 2009, and he is counsel of record for: the patent-in-suit, the
related ‘474 patent asserted in a separate litigation against the same Defendants and products, the
reexamination proceedings regarding the ‘474 patent that were instigated by a third party, and
the prosecution of a patent application that is a continuation of the application that led to the
patent-in-suit. (See, e.g., Ex. 8.) Thus, Plaintiff is well represented and will not be unduly
prejudiced if its litigation counsel is subject to Defendants’ proposed patent prosecution bar.
By contrast, Plaintiff’s proposed “patent prosecution bar” is not a bar of any type.
Plaintiff’s proposal merely states that a receiving party may not use any of the confidential
information produced in this case during patent prosecution activities. (Ex. 1 at p. 26 (blue
highlighting).) That proposal would allow individuals receiving Defendants’ highly confidential
information, including source code for the accused products, to participate in patent prosecution
for anyone, including Plaintiff, on subject matter identical to that at issue in this litigation.
Plaintiff’s proposal fails to address the danger of inadvertent use, which the Federal Circuit has
recognized as almost inevitable for someone in a competitive decision making position. See
Deutsche Bank, 605 F.3d at 1378 (“[I]t is very difficult for the human mind to compartmentalize
and selectively suppress information once learned, no matter how well-intentioned the effort may
be to do so.”) (citing FTC v. Exxon Corp., 636 F.2d 1336, 1350 (D.C. Cir. 1980)). And given
that Plaintiff continues to prosecute continuation applications, as well as a reexamination of a
related patent asserted by Plaintiff against Defendants in a separate litigation, there is great
danger that Plaintiff would make inadvertent use of Defendants’ highly confidential information.
Therefore, Plaintiff’s proposal is inadequate and must be rejected.
E.
Whether The Parties Must OCR Documents Before Producing Them, And If So,
Whether The OCR Costs Should Be Split Between The Parties (Section 31 of the
Proposed Protective Order)
1.
Plaintiff’s Position
The sole contention before the Court is whether Defendants must perform optical
character recognition (“OCR”) of their electronically produced documents.
13
Defendants’ refusal to OCR the documents before they are produced is respectfully not
understood. It hardly bears mentioning that Defendants will likely produce many thousands of
pages of documents in response to Plaintiff WRT’s requests for production, or that it would be
much easier and cost effective for the owners of the documents to perform the OCR before they
are transmitted to WRT. It also bears little mention that the Defendants, most notably Google,
are some of the largest holders and purveyors of information facilities in the entire world. That
Defendants would not comply with the simple request is emblematic of Defendants’ inflexibility
in resolving issues with WRT and preserving the Court’s valuable time and resources.
2.
Defendants’ Position
The final dispute between the parties concerns the format of documents produced in this
litigation. (See Ex. 1 at p. 31, § 31.) To be clear, this issue does not concern the format for
production of electronically stored information, such as email or source code, which by its very
natures is already in an electronically searchable format. Rather, this dispute concerns the format
for the production of paper documents that are imaged for electronic production, as well as other
electronic documents that are not electronically searchable.
Plaintiff proposes that, for all
documents that are not electronically searchable, the producing party must perform optical
character recognition (“OCR”) so that the receiving party can more easily search those
documents. (See id. (blue highlighting).)
While Plaintiff’s proposal is made in neutral terms such that the OCR burden is placed on
the producing party, this will impose Plaintiff’s litigation costs onto Defendants because accused
infringers produce the majority of documents in a patent litigation. In re Genentech, Inc., 566
F.3d 1338, 1345 (Fed. Cir. 2009) (“In patent infringement cases, the bulk of the relevant
evidence usually comes from the accused infringer.”). Thus, through the guise of the Proposed
Protective Order, Plaintiff attempts to transfer a portion of its anticipated litigation costs onto
Defendants by requiring Defendants to OCR all electronically produced files. Id. Plaintiff,
however, can show no good cause to transfer this OCR burden and cost to Defendants, and
therefore Plaintiff’s proposal should be rejected. Instead, the parties should simply be required
14
to comply with Rule 34 of the Federal Rules of Civil Procedure and produce “documents as they
are kept in the usual course of business . . .”
WHEREFORE PREMISES CONSIDERED, Plaintiff and Defendants respectfully
request the Court to make a determination and enter an Protective Order in this matter as
submitted by the parties.
Dated: August 18, 2011
Respectfully submitted,
By:
/s/ Cameron H. Tousi
Cameron H. Tousi (admitted pro hac vice)
Virginia State Bar No.: 43668
David M. Farnum (admitted pro hac vice)
Ralph P. Albrecht (admitted pro hac vice)
ALBRECHT TOUSI & FARNUM, PLLC
1701 Pennsylvania Avenue, NW, Suite 300
Washington, DC 20006
Telephone: 202.349.1490
Facsimile: 202.318.8788
Email: chtousi@atfirm.com
Email: dmfarnum@atfirm.com
Email: rpalbrecht@atfirm.com
William E. Davis, III
Texas State Bar No. 24047416
THE DAVIS FIRM, P.C.
111 W. Tyler Street
Longview, TX 75601
Telephone: 903.230.9090
Facsimile: 903.230.9661
E-mail: bdavis@bdavisfirm.com
Attorneys for Plaintiff and Counterdefendant
WIRELESS RECOGNITION
TECHNOLOGIES LLC
15
By:
/s/ Daniel T. Shvodian
James F. Valentine (admitted pro hac vice)
California State Bar No. 149269
Daniel T. Shvodian (admitted pro hac vice)
California State Bar No. 184576
PERKINS COIE LLP
3150 Porter Drive
Palo Alto, CA 94304-1212
Telephone: 650.838.4300
Facsimile: 650.838.4350
E-mail: JValentine@perkinscoie.com
E-mail: DShvodian@perkinscoie.com
Michael C. Smith
Texas State Bar No. 18650410
SIEBMAN, BURG, PHILLIPS & SMITH, LLP
P.O. Box 1556
Marshall, TX 75671-1556
Telephone: 903.938.8900
Facsimile: 972.767.4620
E-mail: michaelsmith@siebman.com
Attorneys for Defendants and Counterclaimants
A9.COM, INC., AMAZON.COM, INC., and
GOOGLE INC.
By:
/s/ Michael C. Smith
Michael C. Smith
Texas State Bar No. 18650410
SIEBMAN, BURG, PHILLIPS & SMITH, LLP
P.O. Box 1556
Marshall, TX 75671-1556
Telephone: 903.938.8900
Facsimile: 972.767.4620
E-mail: michaelsmith@siebman.com
Robert F. Perry (admitted pro hac vice)
Allison H. Altersohn (admitted pro hac vice)
KING & SPALDING LLP
1185 Avenue of the Americas
New York, NY 10036
Telephone: 212.556.2100
Facsimile: 212.556.2222
16
E-mail: rperry@kslaw.com
E-mail: aaltersohn@kslaw.com
Attorneys for Defendant
NOKIA INC.
By:
/s/ Michael E. Jones
Michael E. Jones
Texas State Bar No. 18650410
Allen Franklin Gardner
POTTER MINTON P.C.
110 N. College, Suite 500
P.O. Box 359
Tyler, TX 75710-0359
Telephone: 903.597.8311
Facsimile: 903.593.0846
E-mail: mikejones@potterminton.com
E-mail: allengardner@potterminton.com
Mark D. Rowland (admitted pro hac vice)
ROPES & GRAY LLP
1900 University Avenue, 6th Floor
East Palo Alto, CA 94303-2284
Telephone: 650.617.4016
Facsimile: 650.566.4144
Email: mark.rowland@ropesgray.com
Attorneys for Defendant and Counterclaimant
RICOH INNOVATIONS, INC.
17
CERTIFICATE OF SERVICE
The undersigned certifies that the foregoing document was filed electronically in
compliance with Local Rule CV-5(a). As such, this document was served on all counsel who are
deemed to have consented to electronic service. Local Rule CV-5(a)(3)(A). Pursuant to Fed. R.
Civ. P. 5(d) and Local Rule CV-5(d) and (e), all other counsel of record not deemed to have
consented to electronic service were served with a true and correct copy of the foregoing by
email, on this 18th day of August, 2011.
/s/ Daniel T. Shvodian
Daniel T. Shvodian
09234-0001/LEGAL21565012.1
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?