Wireless Recognition Technologies LLC v. A9.com, Inc. et al
Filing
96
Joint MOTION for Protective Order (Entry of) by A9.com, Inc., Amazon.com, Inc., Google, Inc.,, Nokia, Inc., Ricoh Innovations, Inc., Wireless Recognition Technologies LLC. (Attachments: # 1 Exhibit 1-Proposed Protective Order with Competing Proposals, # 2 Exhibit 2-Plaintiff's Proposed Protective Order, # 3 Exhibit 3-Defendants' Proposed Protective Order, # 4 Exhibit 4-Dkt. No. 241 from LTT case, # 5 Exhibit 5-Dkt. No. 169 from LTT case, # 6 Exhibit Dkt. No. 169-1 from LTT case, # 7 Exhibit 7-ST Sales v. Daimler-LEXIS, # 8 Exhibit 8-Yudell Power of Attorney)(Shvodian, Daniel)
EXHIBIT 1
DRAFT
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
WIRELESS RECOGNITION
TECHNOLOGIES LLC,
Plaintiff,
v.
A9.COM, INC.,
AMAZON.COM, INC.,
GOOGLE, INC.,
NOKIA, INC.
and
RICOH INNOVATIONS, INC.
Defendants.
)
)
)
)
)
)
)
)
)
)
)
)
)
)
)
C.A. No. 2:10-cv-00364-TJW-CE
JURY TRIAL DEMANDED
[PROPOSED] STIPULATED PROTECTIVE ORDER
This protective order (“Protective Order”) is issued to expedite the flow of discovery
materials, to facilitate the prompt resolution of disputes over confidentiality of discovery
materials, to adequately protect information the parties are entitled to keep confidential, to ensure
that only materials the parties are entitled to keep confidential are subject to such treatment, and
to ensure that the parties are permitted reasonably necessary uses of such materials in preparation
for and in the conduct of trial, pursuant to Fed. R. Civ. P. 26(c) and any other applicable rule of
this Court. Unless modified or terminated pursuant to the terms contained in this Protective
Order, this Protective Order shall remain in effect through the conclusion of the above-captioned
case.
In support of this Stipulated Protective Order, the Court finds that:
a.
Documents or information containing confidential research, development,
proprietary and competitively sensitive business or commercial information or trade secrets
DRAFT
(“Confidential Information”) that bear significantly on the parties’ claims or defenses are likely
to be disclosed or produced during the course of discovery in the above-captioned cases;
b.
The parties to these litigations assert that public dissemination and disclosure of
Confidential Information could injure or damage the party disclosing or producing the
Confidential Information and could place that party at a competitive disadvantage; and
c.
To protect the respective interests of the parties and to facilitate the progress of
disclosure and discovery in these cases, the following Stipulated Protective Order should issue.
IT IS THEREFORE ORDERED THAT:
1.
Designation of Certain Discovery Material. Documents, excerpts, summaries,
pleadings, reports, declarations, affidavits, testimony, transcripts, physical objects, or other
discovery material containing “Confidential” or “CONFIDENTIAL” Information (as defined in
paragraph 2) disclosed, produced, or otherwise provided by any party in this litigation, and any
non-party (“third party”) from whom discovery is sought in connection with these actions, are
referred to as “Protected Documents.” Except as otherwise indicated below, all information,
documents, or other discovery material designated by the producing party as CONFIDENTIAL,
HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c)
or HIGHLY CONFIDENTIAL – SOURCE CODE and which are disclosed, produced, or
otherwise provided to the attorneys for the other parties to these litigation matters are Protected
Documents and are entitled to confidential treatment as described below.
2.
Protected Documents shall not include: (a) published or publicly disseminated
advertising materials; (b) materials that have been published to the general public; (c) documents
that have been submitted to any governmental entity without request for confidential treatment or
2
DRAFT
that otherwise do not qualify for confidential treatment under applicable governmental laws or
regulations; (d) any information that the receiving party can show by written records was already
known to it prior to the disclosure, provided that it was either (i) received from the producing
party and was not received under an obligation of confidentiality to the producing party, or (ii)
received from a source who obtained the information lawfully and under no obligation of
confidentiality to the producing party; (e) any information that the receiving party can show by
written records was received by it after the disclosure from a source who obtained the
information lawfully and under no obligation of confidentiality to the producing party; (f) any
information that the receiving party can show was independently developed by it after the time
of disclosure by personnel who did not have access to the producing party’s Confidential
information.
a.
A party may designate as CONFIDENTIAL those materials which that
producing party in good faith believes constitute Confidential Information that is used by
it in, or pertaining to, its business, which information is not generally known and which
that party would normally not reveal to third parties or, if disclosed, would require such
third parties to maintain in confidence.
Protected Documents shall qualify for the
CONFIDENTIAL designation if such Protected Documents comprise information that:
(i) has not been made public; (ii) includes trade secret or other confidential research,
development, or commercial information the disclosure of which the disclosing party
reasonably believes could cause harm to the business operations of the disclosing party or
provide improper business or commercial advantage to others; (iii) is protected by a right
to privacy under federal or state law or any other applicable privilege or right related to
3
DRAFT
confidentiality or privacy; and (iv) has not been marked or otherwise designated
CONFIDENTIAL — OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c).
b.
Any highly confidential information may be designated as HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c).
Protected Documents shall qualify for the HIGHLY CONFIDENTIAL – OUTSIDE
COUNSEL ONLY (or the variations of paragraph 2.c) designation if such Protected
Documents satisfy the definition of paragraph 2.a hereinabove, and further comprise: (i)
non-public technical information, including schematic diagrams, manufacturing and
engineering drawings, engineering notebooks, specifications, research notes and
materials, technical reference materials, and other non-public technical descriptions
and/or depictions of the relevant technology; (ii) non-public damage-related information
(e.g., the number of products sold, total dollar value of sales products, and profit
margins); (iii) non-public financial information; (iv) customer lists; (v) business and/or
marketing plans; (vi) price lists and/or pricing information; (vii) license or settlement
agreements; and (viii) information obtained from a nonparty pursuant to a current
confidentiality or other type of non-disclosure agreement (“NDA”).
c.
Protected Documents designated CONFIDENTIAL should be so
identified at the time of service of such Protected Documents by including on each page,
or on the front page of each document, the legend “CONFIDENTIAL.” Protected
Documents designated HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or
the variations set forth in this paragraph 2.c) should be so identified at the time of service
of such Protected Documents by including on each page, or on the front page of each
4
DRAFT
document, any of legends “HIGHLY CONFIDENTIAL,” “OUTSIDE COUNSEL
ONLY,” or “HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY.”
d.
Any documents (including physical objects) made available for inspection
prior to the production of copies of items selected by the requesting party shall initially
be considered, as a whole, designated CONFIDENTIAL (unless otherwise designated at
the time of inspection) and shall be subject to this Order. Thereafter, the producing party
shall have a reasonable time to review and designate any requested documents as
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), or HIGHLY CONFIDENTIAL SOURCE CODE prior to
furnishing copies to the receiving party.
3.
Challenge to Designation/No Obligation to Challenge. At any time after the
delivery of Protected Documents, counsel for the party or parties receiving the Protected
Documents may challenge the confidential designation of one or more Protected Documents by
providing written notice thereof to counsel for the party disclosing or producing the Protected
Documents. If, after conferring, the parties cannot reach agreement concerning the matter within
ten (10) business days after the receipt of the notice, then the party requesting the de-designation
of particular items may file and serve a motion for a further order of this Court directing that the
designation shall be so removed. On any such motion, the burden of proof shall lie with the
producing party to establish that the information is, in fact, properly designated as
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c) or HIGHLY CONFIDENTIAL – SOURCE CODE information. No
party shall be obligated to challenge the propriety of any designation, and failure to do so shall
not preclude a subsequent challenge to the propriety of such designation.
5
DRAFT
4.
Access to Protected Documents.
All Protected Documents are entitled to
confidential treatment pursuant to the terms of this Protective Order until and unless the parties
formally agree in writing to the contrary or a contrary determination is made by the Court as to
whether a Protected Document is entitled to confidential treatment. Protected Documents and
any information contained therein shall not be used or shown, disseminated, or in any way
communicated to anyone for any purpose whatsoever, except for use in the above-captioned
cases.
5.
Subject to the limitations set forth in this Protective Order, Protected Documents
and any information contained therein shall be disclosed only to the following persons
(“Qualified Persons”):
a.
Outside counsel of record in the above-captioned cases;
b.
Employees of such counsel (excluding experts and investigators) and
outside vendors, including e-discovery, graphics, animation, translation, and jury
consultant vendors but not including mock jurors, assigned to and necessary to assist such
counsel in the preparation and trial of these actions, provided such outside vendors agree
to maintain the confidentiality of documents pursuant to this Protective Order by signing
the Agreement attached hereto as Exhibit A;
c.
The Court (including clerks, other Court personnel, and jury members);
d.
Independent experts or consultants (including non-testifying experts or
consultants) that are disclosed and qualified pursuant to the terms of paragraph 25 below;
e.
Only
with
respect
to
Protected
Documents
designated
“CONFIDENTIAL”, for each party, two (2) in-house counsel or in-house personnel of an
in-house legal department whose daily responsibilities focus on legal issues and who are
6
DRAFT
not involved in product development or competitive decision making, provided that such
in-house counsel or in-house personnel have responsibility for managing this litigation
and sign the Agreement attached hereto as Exhibit A, subject to the remaining terms of
this section;
f.
Any court reporter (other than Court personnel referenced in paragraph 5.c
above) or videographer present in his or her official capacity at any hearing, deposition,
or other proceeding in this action, provided that such court reporter or videographer agree
to maintain the confidentiality of documents pursuant to this Protective Order by signing
the Agreement attached hereto as Exhibit A;
g.
Any person who is identified as an author or recipient, including receipt
by copy, of any document, information therein or tangible medium. Such persons shall
be considered “Qualified Persons” solely with respect to the specific document,
information therein, or tangible medium; and
h.
Witnesses for the party producing the document, who have access in the
course of their employment to the document, and who are being examined on the subject
of the document. Parties reserve the right to object and move for protective order to
prevent the disclosure of document(s) to a witness, should such disclosure violate a
corporate policy precluding the witness from gaining access to the document(s).
Except that, paragraph 5.e above shall not apply to Protected Documents designated HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c) or
HIGHLY CONFIDENTIAL – SOURCE CODE. [Notwithstanding the foregoing, Protected
Documents designated HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c) that consists of financial information relating to the Accused
7
DRAFT
Instrumentalities and not technical information, may be accessed by and disclosed to the
individuals listed in paragraph 5.e., provided that such individuals are counsel being members of
at least one state bar in good standing.]1 In addition, any Protected Documents designated by a
Defendant shall not be provided by the Plaintiff to any other Defendant or Defendants’ counsel
absent explicit agreement from the Defendant designating such information. Counsel for a party
may give advice and opinions to his or her client regarding this case based on his or her
evaluation of documents and information designated CONFIDENTIAL or HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c) received
by the party — provided that such rendering of advice and opinions shall not directly reveal the
content of such Protected Documents and any information contained therein except by prior
written agreement with counsel for the producing party.
Protected Documents and any
information contained therein shall be used solely for the purposes of above-captioned case and
any appeal(s) of this action.
6.
Protected Documents designated HIGHLY CONFIDENTIAL – SOURCE CODE
shall be provided with the following further protections:
a.
HIGHLY CONFIDENTIAL – SOURCE CODE includes human-readable
programming language text that defines software, firmware, or electronic hardware
descriptions (hereinafter referred to as “source code”). Text files containing source code
shall hereinafter be referred to as “source code files.” Source code files include, but are
not limited to files containing source code written in C, C++, Java, assembler, VHDL,
Verilog, SQL, and similar programming languages. Source code files further include
“make” files, “include” files, script files, “link” files, and other human-readable text files
1
Text bracketed and highlighted in blue is proposed by Plaintiff WRT, while text bracketed
and highlighted in yellow is proposed by Defendants.
8
DRAFT
used in the generation and/or building of software directly executed on a microprocessor,
microcontroller, or digital signal processor (DSP). Source code does not include binary
executable files and object code files, nor does it include tools such as compilers or
linkers.2
b.
Treatment of Source Code. To the extent that any party wishes to obtain
access to Confidential Information designated as HIGHLY CONFIDENTIAL –
SOURCE CODE, the following procedures shall apply:
i.
The producing party shall make all relevant and properly requested
source code available for inspection on a stand-alone, non-networked, personal
computer running a reasonably current version of the Microsoft Windows
operating systems (“Source Code Computer”). The Source Code Computer shall
be locked down so that additional peripheral devices cannot be connected to the
Source Code Computer by the Receiving Party[, except that the Computer shall
be connectible to a printer and a device capable of temporarily storing electronic
copies (e.g., flash drive) solely for the limited purposes provided in this paragraph
6]. Should it be [requested by receiving party] [necessary], the Source Code
Computer [shall] [may] be configured by the producing party to run other
mutually agreed upon operating systems, such as Linux, and software utilities,
which will [be provided at the receiving party’s expense, to] allow counsel and
experts to view, search, or analyze the source code; provided that such utilities are
reasonable and non-destructive to the source code. The producing party shall
2
The parties agree that binary executable files, object code files, compilers, and linkers do not
need to be produced. To the extent binary executable files and object code files are required to
be produced, they shall be afforded the same protection as other “Source Code” defined in this
section.
9
DRAFT
provide the receiving party with information explaining how to start, log on to,
and operate the Source Code Computer in order to access the produced source
code thereon [in a user-friendly manner. If the receiving party shall be unable to
operate the Source Code Computer to review the source code in a timely manner,
the producing party shall provide in a timely and efficient manner the help of
personnel with appropriate technical expertise to assist the receiving party].
ii.
The producing party shall make the source code available
electronically and in text searchable format on the Source Code Computer in a
secure room at either: (1) the U.S. offices of outside counsel for the producing
party; or (2) a secure facility in the U.S. selected by the producing party. The
producing party need not produce source code in executable format absent further
agreement of the parties or order of the Court. The parties agree to cooperate in
good faith such that maintenance of and access to the producing party’s source
code at the foregoing locations shall not unreasonably hinder the receiving party’s
ability to efficiently and effectively conduct the prosecution or defense of this
action.
iii.
In order to verify that its source code has not later been altered, the
producing party may benchmark the materials before they are provided, but shall
not install any keystroke or other monitoring software on the Source Code
Computer.
iv.
If the producing party has additional reasonable security
precautions which are not unduly burdensome on the receiving party’s time and
resources, the receiving party shall comply with such security precautions. If the
10
DRAFT
parties cannot reach agreement on such additional security provisions, either party
may request the Court to intervene on the matter.
v.
The Source Code Computer shall be made available to a receiving
party for the inspection of source code upon reasonable request from 8 am to 6
pm local time, Monday through Friday (excluding holidays), and other days
and/or times, upon reasonable request until the close of discovery in this action.
Access after hours shall be permitted only on three (3) business days advanced
written notice absent exigent circumstances.
vi.
The source code is to be treated as HIGHLY CONFIDENTIAL—
SOURCE CODE, and the receiving party may not disclose the source code or the
content of the source code to anyone who has not undertaken to abide by the
Protective Order. No employee of the receiving party may access or obtain the
source code.
In no case shall any information designated as HIGHLY
CONFIDENTIAL – SOURCE CODE by a Defendant be provided to any other
Defendant or Defendant’s counsel by any party or counsel absent explicit
agreement from the party designating the information.
vii.
No more than three (3) individuals who qualify under paragraph
5.a or paragraph 5.d, above, for the receiving party, may have access to the
Source Code Computer. In addition, no more than five (5) additional attorneys
and/or experts who qualify under paragraph 5.a or paragraph 5.d, above, for the
receiving party, may have access to printed copies of any portion of the producing
party’s source code. For each day that counsel for the receiving party requests a
review of the Source Code Computer, it must give at least two (2) business days
11
DRAFT
(and at least 48 hours) notice to the counsel for the producing party that it will be
sending individual(s) authorized to review the source code made available on the
Source Code Computer. The receiving party shall identify all individuals who
will be given access to the source code at least ten (10) business days prior to any
inspection, during which time the producing party may object to providing source
code access to any persons so identified, provided that access will not be
unreasonably denied. If an objection to an individual is made by the producing
party, it will be the burden of the requesting party to prove that individual should
be authorized to inspect the producing party’s source code.
viii.
Proper identification of all authorized persons shall be provided
prior to any access to the secure facility or the Source Code Computer. Proper
identification is hereby defined as a photo identification card sanctioned by the
government of a U.S. state, by the United States federal government, or by the
nation state of the authorized person’s current citizenship. Access to the secure
facility or the Source Code Computer may be denied, at the discretion of the
producing party, to any individual who fails to provide proper identification.
ix.
The Source Code Computer shall be equipped with a functioning,
high-speed printer to print copies of the source code on watermarked pre-Bates
numbered paper, which shall be provided by the producing party. Counsel for the
producing party will keep the originals of these printed documents, and copies
shall be made for counsel for the receiving party on watermarked paper either at
the time they are requested (if less than 50 pages) or within 48 hours (if more than
50 pages). Counsel for the receiving party may request up to five (5) copies of
12
DRAFT
printed source code. [No more than 10% or 500 pages of the total source code for
any software release, whichever is less, may be in printed form at any one time,
and all printed source code shall be logged by the receiving party as noted in
paragraph 6.b.xiv below. Additionally, the receiving party shall not print any
continuous block of source code that results in more than 10 printed pages. If
necessary, the receiving party may request to print additional pages in excess of
the 500 pages of total source code for a software release, or continuous blocks
that exceed 10 pages, which request the producing party shall not unreasonably
deny.
In addition to other reasonable steps to maintain the security and
confidentiality of the producing party’s source code, printed copies of the source
code maintained by the receiving party must be kept in a secure locked area when
not in use. No electronic copies of the source code shall be provided by the
producing party beyond the Source Code Computer. The producing party shall
maintain a Source Code access log identifying, for each and every time any
Source Code is viewed, accessed, or analyzed: (1) the name of each person who
accessed the Source Code; (2) the date and time of access; (3) the length of time
of access: and (4) whether any hard copies of any portion of Source Code were
printed.]
x.
The receiving party’s outside counsel of record, experts or
consultants shall maintain and store any paper copies of the source code or any
notes, analyses, or descriptions of source code at their offices in a manner that
prevents duplication of or unauthorized access to the source code, including
13
DRAFT
without limitation, storing the source code in a secure locked area when not in
use.
xi.
[Any person or entity who obtains access to the source code or the
contents thereof pursuant to this Order shall not make any copies, duplicates,
extracts, summaries or descriptions of such material or any portion thereof except
as may be reasonably necessary in the litigation of this action. Any such copies,
duplicates, extracts, summaries or descriptions shall be classified HIGHLY
CONFIDENTIAL – SOURCE CODE and subject to all of the terms and
conditions of this Order.] [No paper copies shall be made of the printed copies of
any portions of the source code provided by the producing party to the requesting
party other than copies attached to sealed court filings, expert reports, discovery
documents, or to be appropriated used in depositions.]
xii.
[Any person or entity who obtains access to the source code or the
contents thereof pursuant to this Order shall not make any electronic copies of
such material or any portion thereof except as may be reasonably necessary in the
litigation of this action. Any such electronic copies shall be subject to all of the
terms and conditions of this Order.] [Except as otherwise provided within this
paragraph, the receiving party will not create electronic images of the source code
from the paper copies for use on a computer (e.g., may not scan the source code to
a .PDF or other image) or otherwise copy, save, and/or store the source code onto
any memory device or drive. The receiving party may only create an electronic
copy or image of selected portions of the source code when relevant and
necessary for any pleading, exhibit, testifying expert reports, consulting expert
14
DRAFT
written analyses and related drafts, discovery document, deposition transcript, or
other Court document, provided that such source code is appropriately marked
under this Order, restricted to those who are entitled to have access to them as
specified herein, and, if filed with the Court, filed under seal in accordance with
the Court’s rules, procedures, and orders. The receiving party may not create an
electronic copy or image of selected portions of the Source Code exceeding five
(5) printed pages of code in a single document unless the electronic copy has been
encrypted using commercially reasonable encryption software including password
protection.] The communication and/or disclosure of electronic versions of the
source code shall at all times be limited to individuals who are authorized to see
source code under the provision of this Protective Order. Additionally, all copies
must
be
labeled
HIGHLY
CONFIDENTIAL
–
SOURCE
CODE.
[Notwithstanding any of the foregoing, in no event shall the receiving party scan
the paper copy of the source code using optical character recognition (“OCR”)
technology or otherwise seek to render text-searchable any source code. Nor shall
the receiving party seek to communicate electronically any copy of source code,
including through e-mail, FTP, or any other means of electronic communication.]
xiii.
[No outside electronic devices, including but not limited to laptops,
floppy drives, USB-connectable devices, zip drives, or other hardware shall be
permitted in the secure room. Nor shall any cellular telephones, Blackberries,
personal digital assistants (PDAs), cameras, voice recorders, Dictaphones,
telephone jacks, or other devices be permitted inside the secure room.]
15
DRAFT
xiv.
The receiving party’s counsel shall keep a log of all copies of
source code in its possession or in the possession of its retained experts or
consultants, including the names of each recipient of any hard copy of the source
code and when it was provided to that person. [A copy of the log must be made
available for inspection by the receiving party at the producing party’s request.
Within thirty (30) days after the issuance of a final, non-appealable decision
resolving all issues in the case, the receiving party must serve upon the producing
party the log and serve upon the producing party all paper copies of the producing
party’s source code as well as documents, pleadings, reports, and notes reflecting
or referring to such source code. In addition, all persons to whom the paper
copies of the source code were provided must certify in writing that all copies of
the source code were returned to the counsel who provided them the information
and that they will make no use of the source code or of any knowledge gained
from the source code in any future endeavor.]
xv.
[Any expert or consultant retained on behalf of receiving party
who is to be given access to producing party’s produced source code (whether in
electronic form or otherwise) must agree in writing not to perform software
development work directly or indirectly intended for commercial purposes
relating to any functionality covered by the source code reviewed by such expert
or consultant for a period of one year after any substantive involvement in the
case. This shall not preclude such experts or consultants from consulting in future
litigation, so long as such consulting does not involve software development work
16
DRAFT
directly or indirectly intended for commercial purposes relating to any
functionality covered by the source code reviewed by such expert or consultant.]
xvi.
Access to and review of the source code shall be strictly for the
purpose of investigating the claims and defenses at issue in the above-captioned
cases. No person shall review or analyze any source code for purposes unrelated
to these cases, nor may any person use any knowledge gained as a result of
reviewing source code in these cases in any other pending or future dispute,
proceeding, or litigation.
xvii.
A receiving party may include excerpts of source code in a
pleading, exhibit, expert report, discovery document, deposition transcript, or
other Court document, provided that such source code is appropriately marked
under this Order, restricted to those who are entitled to have access to them as
specified herein, and, if filed with the Court, filed under seal in accordance with
the Court's rules, procedures and orders.
7.
Limited Access By Certain Deposition Witnesses.
Protected Documents
designated CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or
the variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE, may be
disclosed to a witness not already allowed access to such information under this Protective Order
only if counsel for the party designating the material as CONFIDENTIAL, HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c), or
HIGHLY CONFIDENTIAL – SOURCE CODE agrees in writing or on the record, before
disclosure, that the material may be disclosed to the witness. Notwithstanding an agreement to
disclose CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
17
DRAFT
variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE to any witness,
the witness may not copy, take notes on, retain copies of, nor take out of the deposition room any
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE used or
reviewed at such deposition. The producing party may also require that the transcript and
exhibits not be copied by the witness, and that no notes be made of the transcript or the exhibits.
In the event of disclosure under this paragraph, only the reporter, deponent, his/her counsel, and
persons to whom disclosure may be made, and who are bound by the Protective Order, may be
present during the disclosure or discussion of CONFIDENTIAL, HIGHLY CONFIDENTIAL –
OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c), or HIGHLY
CONFIDENTIAL – SOURCE CODE Protected Documents. Disclosure of material pursuant to
this paragraph shall not constitute a waiver of the confidential status of the material so disclosed.
8.
Copies. The term “copy” as used herein means any photographic, mechanical or
computerized copy or reproduction of any document or thing, or any verbatim transcript, in
whole or in part, of such document or thing.
9.
Use of Protected Documents at Depositions, Hearings or at Trial. To the extent
that Protected Documents or information contained therein are used in depositions, at hearings,
or at trial, such documents or information shall remain subject to the provisions of this Protective
Order, along with the transcript pages of the deposition testimony and/or trial testimony referring
to the Protected Documents or information contained therein. Any deposition transcript meeting
the appropriate definitions of paragraph 2 hereinabove, in whole or in part, may be designated
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE by an
18
DRAFT
appropriate statement at the time such testimony is given or thereafter by notifying the other
parties in writing of the portions of such testimony to be so designated within thirty (30) days
from receipt of the deposition transcript. Upon such request, the reporter shall mark the original
and all copies of the transcript as designated. Unless the parties otherwise agree, the entire
transcript of all such depositions shall be deemed designated as HIGHLY CONFIDENTIAL –
OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c) for thirty (30) days from
receipt of the transcript. Any portions so designated shall thereafter be treated in accordance
with the terms of this Protective Order. If a party chooses to designate deposition testimony later
than the 30 day period, it must do so with written notice. The party receiving the written notice
will treat the deposition testimony per the designation under this Protective Order. Any use of
the testimony or submission of such testimony to the Court prior to the late designation need not
be retracted. Nothing in this paragraph shall prevent the receiving party from objecting to the
designation, following the procedures and burdens of proof otherwise set forth herein for
objecting to confidentiality designations.
10.
Any court reporter or transcriber who reports or transcribes testimony in this
action shall agree that all Confidential Information designated as such under this Protective
Order shall remain confidential and shall not be disclosed by them, except pursuant to the terms
of this Protective Order.
11.
Related Material. The restrictions on the use of Protected Documents established
by this Protective Order shall extend to:
a.
Briefs, memoranda or other writings filed with the Court and exhibits
thereto that contain or reflect the content of any such Protected Documents provided that
such writings are designated as CONFIDENTIAL, HIGHLY CONFIDENTIAL –
19
DRAFT
OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c), or HIGHLY
CONFIDENTIAL – SOURCE CODE as provided for by paragraphs 2 and 6 hereto on at
least the first page of the writing; and
b.
All copies, extracts and complete or partial summaries prepared from such
Protected Documents.
12.
Filings Under Seal.
All transcripts of depositions, exhibits, answers to
interrogatories, pleadings, briefs, and other documents submitted to the Court which have been
designated as CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY
(or the variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE or which
contain information so designated shall be filed under seal. The filing party shall be responsible
for informing the Clerk of the Court that the filing should be sealed and for placing the legend
“FILED UNDER SEAL PURSUANT TO PROTECTIVE ORDER” above the caption and
conspicuously on each page of the filing. Exhibits to a filing shall conform to the labeling
requirements set forth in this Order. If a pretrial pleading filed with the Court, or an exhibit
thereto, discloses or relies on Confidential Information, the portions of the pleading having such
Confidential Information shall be redacted to the extent necessary and the pleading or exhibit
filed publicly with the Court.
13.
Financial Summaries. For the mutual convenience of the parties, Defendants may
generate certain financial summaries for the purpose of the above-captioned cases. To the extent
Defendants produce such financial summaries in a native format (e.g., a Word, Excel, or other
native file), or to the extent Plaintiff puts any such financial summary or the information from
any such financial summary into a document in a native format, Plaintiff shall password protect
that document on an encrypted media. All such financial summaries are to be designated
20
DRAFT
HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph
2.c). To the extent that any such financial summaries are transmitted from or to authorized
recipients outside of the receiving party’s counsel’s office, the transmission shall be by email or
by hand (and encrypted if in electronic format), or by a secure transport carrier (e.g., Federal
Express).
14.
Subpoenas or Court Orders to Compel Disclosure of Protected Documents. If a
receiving party is served with a subpoena or court order that would compel disclosure of any
information, documents or things designated in this action as CONFIDENTIAL, HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c), or
HIGHLY CONFIDENTIAL – SOURCE CODE, the receiving party must so notify the
producing party in writing (by fax or email) promptly as soon as reasonably possible and in any
event, before any compliance under such subpoena or court order is requested or required. [The
receiving party shall tender notice of the foregoing to counsel for the party whose
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE designated
documents are being requested, whereupon producing party’s counsel shall immediately attend
to all matters associated with such subpoena or court order on behalf of receiving party, and the
producing party shall bear all duties and obligations relating to the matter, including without
limitation indemnification of receiving party in regard thereto.] [Such notification must include
a copy of the subpoena or order. The receiving party must also immediately inform in writing
the party who caused the subpoena or order to issue that some or all of the documents covered by
the subpoena or order is the subject of this Protective Order. In addition, the receiving party
must deliver a copy of this Protective Order promptly to the party in the other action that caused
21
DRAFT
the subpoena or order to issue. The purpose of imposing these duties is to alert the interested
parties to the existence of this Protective Order and to afford the producing party in these cases
an opportunity to protect its confidentiality interests in the court from which the subpoena or
order issued. The producing party shall bear the burdens and the expenses of seeking protection
in that court of its designated material. Nothing in these provisions should be construed as
authorizing or encouraging a receiving party in this action to disobey a lawful directive from
another court.]
15.
Inadvertent Failure to Designate.
Inadvertent or unintentional production of
documents or information containing Confidential Information which are not designated
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE shall not be
deemed a waiver in whole or in part of a claim for confidential treatment. Upon request by the
producing party, the receiving party shall reasonably, at receiving party’s option, either return or
destroy all copies of such inadvertently produced document(s). The producing party shall have
the opportunity to reproduce or designate the returned documents with any of the aforementioned
designations. The return of documents or information will not operate as an admission by the
receiving party that any particular CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE
COUNSEL ONLY (or the variations of paragraph 2.c), or HIGHLY CONFIDENTIAL –
SOURCE CODE contains or reflects trade secrets or any other type of confidential or proprietary
information. Nothing herein shall prevent the receiving party from challenging the propriety of
the designation of the documents by submitting a written challenge to the Court.
16.
Inadvertent Disclosure of Privileged Materials.
Inspection or production of
documents (including physical objects) shall not constitute a waiver of the attorney-client
22
DRAFT
privilege or work product immunity or any other applicable privilege or immunity from
discovery if, as soon as reasonably possible after the producing party becomes aware of any
inadvertent or unintentional disclosure, the producing party designates any such documents as
within the attorney-client privilege or work product immunity or any other applicable privilege
or immunity, promptly requests return of such documents to the producing party in writing, and
provides a privilege log for such inadvertently or unintentionally produced documents. Upon
request by the producing party, the receiving party shall gather and return all copies of such
inadvertently produced document(s), except for any pages that contain, constitute or reflect
attorney work product or attorney-client privileged communications, which pages shall instead
be destroyed and certified as such to the producing party. If the receiving party contests the
privilege or work product designation by the producing party, the receiving party shall give the
producing party written notice of the reason for the disagreement and shall retain one copy of the
disputed document for use in resolving the dispute. In such case, the receiving party shall seek
an Order from the Court compelling the production of the material. If no such Order is sought
within thirty (30) days, then all copies of the disputed document shall be returned in accordance
with this paragraph. Absent a Court Order to the contrary, the parties hereby agree and stipulate
that any privilege or immunity that was originally present will remain intact once any such
document is returned or confirmed as destroyed by the recipient.
17.
No Effect on Federal Rules of Civil Procedure. Nothing herein shall alter or
change in any way the discovery provisions of the Federal Rules of Civil Procedure or the
Federal Rules of Evidence. Identification of any individual pursuant to this Protective Order
does not make that individual available for deposition or any other form of discovery outside of
23
DRAFT
the restrictions and procedures of the Federal Rules of Civil Procedure, and the Local Court
Rules of the United States District Court for the Eastern District of Texas.
18.
Advertising or Sale of Protected Documents Prohibited. The party or parties
receiving Protected Documents shall not under any circumstances sell, offer for sale, advertise,
or publicize Protected Documents or any information contained therein.
19.
Termination and Disposition Upon Conclusion. The provisions of this Protective
Order may not be modified, waived, or terminated except by the written stipulation of counsel or
order of the Court. After termination of these litigations, the provisions of this Protective Order
shall continue to be binding, except with respect to those documents and information that
become a matter of public record. This Court retains and shall have continuing jurisdiction over
the parties and recipients of the Protected Documents for enforcement of the provisions of this
Protective Order following termination of the above-captioned cases.
20.
Each of the Parties shall retain the right to file a motion with the Court (i) to
modify this Order to allow disclosure of Protected Documents to additional persons or entities if
reasonably necessary to prepare and present this action and (ii) to apply for additional protection
of Protected Documents.
21.
Except as otherwise provided in paragraph 6.b.xiv above, within sixty (60)
calendar days, after termination of this action, including any appeals, all persons and entities
(including experts and consultants) who received Protected Documents shall either destroy or
return all Protected Documents to the counsel for the party or parties disclosing or producing the
Protected Documents.
The choice of whether Protected Documents should be returned or
destroyed shall be made by the receiving party. As used in this paragraph, “all Protected
Documents” includes all copies, abstracts, compilations, summaries or any other form of
24
DRAFT
reproducing or capturing of any of the Protected Documents. The receiving party shall certify the
return or destruction of such Protected Documents to the producing party, upon the producing
party’s request. Notwithstanding this provision, Counsel of Record may retain an archival copy
of all pleadings, motion papers, any documents or materials filed or used in court, exhibits
offered or introduced into evidence at trial, legal memoranda, correspondence, or attorney work
product, even if such materials contain Protected Documents. Counsel of Record may also retain
an archival copy of deposition transcripts (including exhibits) of the current and former
employees and experts of the party that each respective Counsel of Record represents, expert
reports (including exhibits) produced by the experts of the party that each respective Counsel of
Record represents, and discovery requests and responses (including exhibits) produced by the
party that each respective Counsel of Record represents, even if such materials contain Protected
Documents. Each Defendant may retain an archived copy of deposition transcripts (including
exhibits) of its own current and former employees and experts, but only to the extent that such
materials do not contain any Protected Documents of another Defendant. Any such archival
copies that contain or constitute Protected Documents remain subject to this Protective Order as
set forth in paragraph 19 above and shall be maintained in confidence by the party retaining the
materials, subject to paragraph 5. Notwithstanding the foregoing, outside counsel of record
receiving Protected Documents are not required to delete information that may reside on their
respective firm’s electronic disaster recovery systems which are overwritten in the normal course
of business. However, outside counsel receiving Protected Documents agree that no Protected
Documents marked CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL
ONLY (or the variations of paragraph 2.c) or HIGHLY CONFIDENTIAL – SOURCE CODE
shall intentionally be retrieved from the electronic disaster recovery systems after termination of
25
DRAFT
this action by dismissal, judgment, or settlement.
In the event Protected Documents are
inadvertently retrieved through use of the electronic disaster recovery systems for another
purpose, such materials shall be destroyed or promptly returned.
22.
Others Bound by Order. This Protective Order shall be binding upon the parties
and their attorneys, successors, executors, personal representatives, administrators, heirs, legal
representatives, assigns, subsidiaries, divisions, employees, agents, independent contractors, or
other persons or organizations over which they have control.
23.
Exclusion Relating to Patent Prosecution. [Counsel or parties receiving Protected
Documents designated HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c) or HIGHLY CONFIDENTIAL – SOURCE CODE from another
party may not use such information to provide advice or opinions to facilitate prosecution of any
patents. This prohibition is not intended to preclude counsel from participating in reexamination
proceedings on behalf of a party challenging the validity of a patent. The foregoing exclusion of
this paragraph 23 does not apply to individuals listed in paragraph 5.e and who may receive
Protected Documents designated HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY
(or the variations of paragraph 2.c), that consists of financial information relating to the Accused
Instrumentalities and not technical information, pursuant to paragraph 5.]
[All discovery
material exchanged among the parties in this action shall be used solely for prosecution and
defense of the claims in the above-captioned cases and shall not be used for any business,
commercial, competitive, personal or other purpose.
Moreover, any person who obtains,
receives, or otherwise learns, in whole or in part, any information designated as HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c) or
HIGHLY CONFIDENTIAL – SOURCE CODE shall not be involved directly or indirectly (e.g.,
26
DRAFT
by advising) in any of the following activities: preparing, prosecuting, drafting, editing, and/or
amending of patent applications, specifications, claims, and/or responses to office actions
(including reissue, reexamination, and certificates of correction) relating to the patents-in-suit,
the subject matter disclosed in the patents-in-suit, and/or the products and technology accused in
the above-captioned cases, before any foreign or domestic agency, including the United States
Patent and Trademark Office, for a period ending three (3) years after the final resolution of
these cases. This bar is not intended to preclude counsel from participating in reexamination
proceedings on behalf of a party challenging the validity of a patent, where counsel will not be
involved in crafting claims, but it is intended to preclude counsel from participating directly or
indirectly in reexamination proceedings on behalf of a patentee.]
24.
Third Parties. This Protective Order shall afford all third parties who produce any
Protected Documents the same protections afforded to the parties to the above-captioned cases.
Specifically, third parties shall be entitled to mark any documents CONFIDENTIAL, HIGHLY
CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c), or
HIGHLY CONFIDENTIAL – SOURCE CODE and shall also be able to designate any
deposition testimony CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL
ONLY (or the variations of paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE.
The parties to these actions will treat such marked information per the terms of this Protective
Order. To the extent applicable, the remaining provisions of this Protective Order shall apply to
third parties, including the designation HIGHLY CONFIDENTIAL – SOURCE CODE. A third
party’s use of this Protective Order to protect its CONFIDENTIAL, HIGHLY CONFIDENTIAL
– OUTSIDE COUNSEL ONLY (or the variations of paragraph 2.c), or HIGHLY
CONFIDENTIAL – SOURCE CODE documents does not entitle that third party access to such
27
DRAFT
documents produced by any party in the above-captioned cases. A copy of this Protective Order
shall be served along with any subpoena served in connection with this action.
a. If Protected Documents sought by a receiving party are subject to a confidentiality
obligation of the producing party to a third party, the producing party shall
promptly request permission from such third party to produce the requested
Protected Documents and shall provide a copy of this Protective Order to the third
party. If the third party does not consent to production of the requested Protected
Documents, then the producing party shall promptly give notice to the receiving
party of the third party’s lack of consent, and the receiving party may make a
motion to the Court for an order compelling production of the requested Protected
Documents.
A producing party is not required to produce such Protected
Documents unless and until the third party provides consent or the Court issues an
order compelling production of the requested Protected Documents. A producing
party producing Protected Documents subject to a confidentiality obligation to a
third
party
may
CONFIDENTIAL
designate
–
the
OUTSIDE
Protected
COUNSEL
Documents
as
HIGHLY
ONLY
or
HIGHLY
CONFIDENTIAL – SOURCE CODE.
25.
party
Access to Protected Documents by Experts or Consultants. Before counsel for a
receiving
Protected
Documents
may
disclose
any
such
material
designated
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), and/or HIGHLY CONFIDENTIAL – SOURCE CODE to a
proposed expert or consultant:
28
DRAFT
a.
Counsel shall provide a copy of this Protective Order to such person, who
shall sign the Agreement attached hereto as Exhibit A; and
b.
At least ten (10) business days before the first such disclosure, counsel for
the receiving party shall notify the producing party in writing of the intent to disclose
CONFIDENTIAL, HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the
variations of paragraph 2.c), and/or HIGHLY CONFIDENTIAL – SOURCE CODE
discovery material to such person. The notice shall include a copy of the Agreement
attached hereto as Exhibit A signed by the person and shall identify his or her title, job
responsibilities and affiliation(s), if any, with the receiving party. The notice shall also
include a copy of such person’s most recent curriculum vitae, which shall include an
identification of all such person’s post-college employment relationships, and a list of
other cases in which the individual has testified (at trial or deposition) within the last four
years.
c.
If the producing party objects to the disclosure of CONFIDENTIAL,
HIGHLY CONFIDENTIAL – OUTSIDE COUNSEL ONLY (or the variations of
paragraph 2.c), or HIGHLY CONFIDENTIAL – SOURCE CODE material to such
person, the producing party shall notify counsel for the receiving party in writing of the
producing party’s objection(s) to such disclosure within ten (10) business days of
receiving notice of intent to disclose. Any objection must be made for good cause,
stating with particularity the reasons for the objection.
Should the receiving party
disagree with the basis for the objection(s), the parties must first attempt to resolve the
objection(s) informally. If the informal efforts do not resolve the dispute within ten (10)
business days, the receiving party may file a motion requesting that the objection(s) be
29
DRAFT
quashed after that ten (10) day period has passed. The producing party shall have the
burden of proof by a preponderance of the evidence on the issue of the sufficiency of the
objection(s). Pending a ruling by the Court upon any such objection(s), the discovery
material shall not be disclosed to the person objected to by the producing party.
26.
Party’s Own Information. The restrictions on the use of Protected Documents
established by this Protective Order are applicable only to Protected Documents received by a
party from another party or from a non-party as a direct result of these cases. A party is free to
do whatever it desires with its own Protected Documents.
27.
Modifications in Writing. Nothing herein shall prevent disclosure beyond the
terms of this Protective Order if counsel for the designating party consents in writing or on the
record to such disclosure, or if the Court, after notice to all affected parties, orders such
disclosure.
Any particular consent given under this Protective Order with respect to
confidentiality of the particular document shall not be deemed a general waiver of any other
designation.
28.
Violation of this Protective Order. Any Party knowing or believing that any other
party is in violation of or intends to violate this Order and has raised the question of violation or
potential violation with the opposing party and has been unable to resolve the matter by
agreement may move the Court for such relief as may be appropriate in the circumstances.
Pending disposition of the motion by the Court, the Party alleged to be in violation of or
intending to violate this Order shall discontinue the performance of and/or shall not undertake
the further performance of any action alleged to constitute a violation of this Order.
30
DRAFT
29.
Notice.
All notices required by this Protective Order are to be served via
facsimile or email to the attorney(s) for each of the Defendants and Plaintiff listed in the
signature block below for each party.
30.
Privilege Unaffected.
Nothing in this Order shall be construed to effect an
abrogation, waiver or limitation of any kind on the rights of each of the Parties to assert any
applicable discovery or trial privilege.
31.
Production Format. The parties shall produce all documents, whether deemed
Protected Documents or otherwise, in the TIFF electronic format with a load file – specifically a
form that preserves the page breaks between documents and otherwise allows separate
documents to be identified. The parties further agree that the parties [shall] [do not need to]
perform optical character recognition (OCR) on the foregoing electronically produced files prior
to their production. Notwithstanding the foregoing, if by their nature, certain documents are best
viewable in their native formats (e.g., financial documentation), a party may choose to produce
such documents in their respective native formats and will accommodate the requesting party’s
requests to produce such documents in their respective native formats, so long as the burden is
not cumulative or overly burdensome. Each party shall make every attempt to work in good
faith in order to accommodate the technical or other feasibility requirements of the requesting
party with respect to the format of produced documents, so long as such requests are reasonable,
provide sufficient time, and are not duplicative, burdensome or financially unreasonable to
accommodate.
31
DRAFT
ACCEPTED AND AGREED:
/s/ Cameron H. Tousi
Cameron H. Tousi (pro hac vice)
Virginia State Bar No.: 43668
ALBRECHT TOUSI & FARNUM PLLC
1701 Pennsylvania Ave, NW Ste 300
Washington, D.C. 20006
Tel: (202) 349-1490
Fax: (202) 318-8788
Email: chtousi@atfirm.com
/s/
Michael C. Smith
Michael C. Smith
Texas State Bar No. 18650410
SIEBMAN, BURG, PHILLIPS & SMITH, LLP
P.O. Box 1556
Marshall, TX 75671-1556
Telephone: 903.938.8900
Facsimile: 972.767.4620
E-mail: michaelsmith@siebman.com
William E. Davis, III
Texas State Bar No. 24047416
THE DAVIS FIRM P.C.
111 W. Tyler St.
Longview, TX 75601
Telephone: (903) 230-9090
Facsimile: (903) 230-9661
E-mail: bdavis@bdavisfirm.com
James F. Valentine (pro hac vice)
California State Bar No. 149269
Daniel T. Shvodian (pro hac vice)
California State Bar No. 184576
PERKINS COIE LLP
3150 Porter Drive
Palo Alto, CA 94304
Telephone: 650.838.4300
Facsimile: 650.838.4350
E-mail: JValentine@perkinscoie.com
E-mail: DShvodian@perkinscoie.com
ATTORNEYS FOR PLAINTIFF
WIRELESS RECOGNITION
TECHNOLOGIES LLC
ATTORNEYS FOR DEFENDANTS
A9.COM, INC. AND AMAZON.COM, INC.
32
DRAFT
/s/
Michael C. Smith
Michael C. Smith
Texas State Bar No. 18650410
SIEBMAN, BURG, PHILLIPS & SMITH, LLP
P.O. Box 1556
Marshall, TX 75671-1556
Telephone: 903.938.8900
Facsimile: 972.767.4620
E-mail: michaelsmith@siebman.com
James F. Valentine (pro hac vice)
California State Bar No. 149269
Daniel T. Shvodian (pro hac vice)
California State Bar No. 184576
PERKINS COIE LLP
3150 Porter Drive
Palo Alto, CA 94304
Telephone: 650.838.4300
Facsimile: 650.838.4350
E-mail: JValentine@perkinscoie.com
E-mail: DShvodian@perkinscoie.com
ATTORNEYS FOR DEFENDANT
GOOGLE INC.
33
DRAFT
/s/
Michael C. Smith
Michael C. Smith
Texas State Bar No. 18650410
SIEBMAN, BURG, PHILLIPS & SMITH, LLP
P.O. Box 1556
Marshall, TX 75671-1556
Telephone: 903.938.8900
Facsimile: 972.767.4620
E-mail: michaelsmith@siebman.com
Robert F. Perry (pro hac vice)
Allison H. Altersohn (pro hac vice)
KING & SPALDING LLP
1185 Avenue of the Americas
New York, NY 10036
Telephone: 212.556.2100
Facsimile: 212.556.2222
E-mail: rperry@kslaw.com
E-mail: aaltersohn@kslaw.com
ATTORNEYS FOR DEFENDANT
NOKIA INC.
34
DRAFT
/s/
Michael E. Jones
Michael E. Jones
Texas State Bar No. 18650410
Allen Franklin Gardner
POTTER MINTON P.C.
110 N. College
Suite 500
P.O. Box 359
Tyler, TX 75710-0359
Telephone: 903.597-8311
Facsimile: 903.593.0846
E-mail: mikejones@potterminton.com
E-mail: allengardner@potterminto.com
Mark D. Rowland (pro hac vice)
ROPES & GRAY
1900 University Avenue, 6th Floor
East Palo Alto, CA 94303-2284
Telephone: 650.617.4016
Facsimile: 650.566.4144
E-mail: mark.rowland@ropesgray.com
ATTORNEYS FOR DEFENDANT
RICOH INNOVATIONS, INC.
35
DRAFT
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
WIRELESS RECOGNITION
TECHNOLOGIES LLC,
Plaintiff,
v.
A9.COM, INC.,
AMAZON.COM, INC.,
GOOGLE, INC.,
NOKIA, INC.
and
RICOH INNOVATIONS, INC.
Defendants.
)
)
)
)
)
)
)
)
)
)
)
)
)
)
)
C.A. No. 2:10-cv-00364-TJW-CE
JURY TRIAL DEMANDED
EXHIBIT A
ACKNOWLEDGEMENT AND AGREEMENT
TO BE BOUND BY PROTECTIVE ORDER
I, ________________________________________, declare that:
1.
My present residential address is ______________________________________
___________________________________________.
2.
My present employer is ________________________________________ and the
address of my present employer is _________________________________________________.
3.
My present occupation or job description is ______________________________
_____________________________________________________________________________.
4
I certify my understanding that the Protected Documents and information are
being provided to me pursuant to the terms and restrictions of the Protective Order, and that I
DRAFT
have been given a copy of and have read and understood my obligations under that Protective
Order. I hereby agree to be bound by the terms of the Protective Order. I clearly understand that
the Protected Documents and information, and my copies or notes relating thereto, may only be
disclosed to or discussed with those persons permitted by the Protective Order to receive such
material.
5.
Upon the termination of this action or at any time requested by outside counsel for
the party by whom I am retained, I will return to such counsel all materials containing Protected
Documents and information, copies thereof, and notes that I have prepared relating thereto.
6.
I hereby submit to the jurisdiction of this Court for the purpose of enforcement of
the Protective Order and waive any and all objections to jurisdiction and venue.
7.
I declare under penalty of perjury under the laws of the United States of America
that the foregoing is true and correct.
Executed on ________________________
____________________________________
[printed name]
____________________________________
[signature]
2
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?