Rockstar Consortium US LP et al v. Google Inc

Filing 80

Joint MOTION for Protective Order by Google Inc, NetStar Technologies LLC, Rockstar Consortium US LP. (Attachments: # 1 Exhibit A Proposed Protective Order, # 2 Exhibit B Plaintiffs' Brief, # 3 Exhibit C Defendant's Brief)(Blackburn, Shawn)

Download PDF
Exhibit C Google Inc.’s Briefing in Support of Entry of a Protective Order 01980.00010/6023142.2 1 Exhibit C: Defendant’s Statement Defendant respectfully submits its arguments in support of its positions on the disputed issues in the parties’ proposed Protective Order. Plaintiff’s suggestion that its proposals follow the Court’s model Protective Order, and Defendant’s do not is misleading. Both parties propose deviating from the model order in certain instances. For example, Plaintiff’s proposal regarding mock juror accessibility to Defendant’s Designated Material is not supported by the model order. And, Plaintiff admits that it deviates from the model order with respect to the prosecution bar. Plaintiff similarly took provisions from the various protective orders from other cases to which it cites to find support for its various positions. As cited below, many of those very same cases support Defendant’s positions as well. In all events, there is good cause for the protections Defendant seeks for its confidential and sensitive information, and where Defendant’s proposals vary from the terms of the model order, they are warranted under the circumstances of the case and do not unjustifiably hamper discovery. I. DISPUTES REGARDING SOURCE CODE REVIEW Defendant proposed certain safeguards to balance protection of its confidential and proprietary source code with Plaintiff’s ability to conduct its review of that source code in an efficient manner. See e.g., E-Contact Technologies, LLC v. Apple, Inc., Case No. 1:11-cv00426-LED-KFG (E.D. Tex. June 19, 2012), D.I. 344, at 7 (recognizing the importance of protecting source code). Although the parties resolved many issues concerning source code review, the following three provisions concerning review of Defendant’s highly confidential and proprietary source code remain in dispute. 01980.00010/6023142.2 2 A. A Personal Laptop Should Not Be Permitted in the Secure Source Code Review Environment (Paragraph 11(a)) The parties have agreed that source code will be loaded onto two non-networked computers that are password protected and maintained in a secure, locked area for inspection. (See Proposed Protective Order, ¶ 11(a).) The parties have also agreed that use or possession of any input/output devices, including USB memory sticks, cameras or any camera-enabled device, CDs, floppy disk, portable hard drive, or any devices that can access the Internet or any other network or external system are prohibited while accessing the computers containing the source code. (Id.) The issue in dispute is whether use or possession of a personal laptop computer additionally may be permitted in the secure, locked area where source code inspection occurs, as requested by Plaintiff. (Id.) Permitting a personal laptop in the locked area, however, would undermine the parties’ agreement to exclude input/output devices. Having a personal laptop in the source code review room in view of the source code inspection computers, even if it is not connected to a network, will make it easier for an expert or consultant to copy the code into a document on the laptop, in violation of the Protective Order. (See ¶ 11(c)) (“The Receiving Party’s outside counsel and/or expert or consultant shall be entitled to take notes relating to the Source Code but may not copy any portion of the Source Code into the notes.”)(emphasis added). This is why courts in this District routinely bar any and all personal computer use in the secure source code inspection area. See, e.g., Geotag Inc. v. Frontier Commc’ns Corp., Case No. 10-0570 (E.D. Tex. Jan. 8, 2013) (denying plaintiff’s request that a note-taking computer be allowed within the secure source code room; “The Court is unconvinced that sufficient review of Defendants’ source code requires a cellular telephone or note-taking computer. In light of the highly confidential nature of the source code, allowing these devices within the secure room would significantly increase the 01980.00010/6023142.2 3 possibility of inadvertent disclosure.”); Blue Calypso, Inc. v. Groupon, Case No. 6:12-cv-486, D.I. 160 (E.D. Tex. Oct. 29, 2013), ¶ 8f (precluding the use of computers in the source code review room, and explicitly providing that notes cannot be taken “electronically on the Source Code Computer or any other computer”); E-Contact Technologies, LLC v. Apple, Inc., Case No. 1:11-cv-00426-LED-KFG, D.I. 344 (E.D. Tex. June 19, 2012), at 7-8 (denying the plaintiff’s request to be allowed to take notes on a laptop during source code review); Eolas Techs. Inc. v. Adobe Sys Inc., Case No. 6:09-cv-00446-LED, D.I. 423 (E.D. Tex. Sept. 10, 2010), ¶ 13(b)(iii) (precluding the use of personal computers in the source code review room) . Moreover, Plaintiff’s proposal would not even prevent someone reviewing source code from taking pictures of the source code with the laptop’s camera. Plaintiff’s stated basis for seeking to bring a personal computer into the secure review environment is simply that it will facilitate its consultants’ and experts’ review of Defendant’s source code because it will allow for them to take notes while reviewing the source code, search their own materials for information, revise claim charts, and draft sections of reports. But, as cited above, courts in this District routinely preclude the use of personal computers in source code review rooms, and have explicitly rejected this as a grounds for allowing a personal laptop in a source code inspection room. See Geotag Inc., Case No. 10-0570 (E.D. Tex. Jan. 8, 2013); E-Contact, Case No. 1:11-cv-00426-LED-KFG, D.I. 344, at 7-8. Plaintiff attempts to distinguish E-Contact, arguing that there the plaintiff could print the source code and take it to a laptop to prepare work product. But, in this case, nothing precludes the receiving party or its experts or consultants from taking written notes in compliance with the Protective Order to a laptop nearby, such as a guest office, to create the expert or consultant’s work product. That it takes more time to take “handwritten notes with pen and paper” does not 01980.00010/6023142.2 4 warrant significantly increasing the possibility of inadvertent disclosure and copying of source code by allowing a personal laptop in the secure source code inspection room. Plaintiff also cites to Bluebonnett Telecomms. LLC v. Sony Ericsson Mobile Communications (USA) Inc., No. 2 :13-cv-00505-JRG (E.D. Tex), but that case is distinguishable. There, the plaintiff argued that it needed access to a personal laptop during source code inspections because some of the source code was public, so the experts and consultants needed to be able to compare the source code on the inspection computers to the public code. Id. D.I. 25. That is not the case here. Further, Defendant already addressed Plaintiff’s concerns regarding facilitating source code review. It agreed to allow Plaintiff access to two standalone source code inspection computers, rather than one, because Plaintiff represented that this additional access would facilitate the source code review. Thus, an additional personal computer is not necessary. Additionally, Plaintiff’s paid consultants and experts presumably are experienced professionals capable of efficiently conducting review and analysis of source code on two non-networked computers without increasing the risk of inadvertent disclosure through the use of a third, personal computer in the secure source code inspection area. Lastly, Plaintiff argues that Defendant has been subject to Protective Orders that permit the use of a personal laptop in the source code inspection room without any resulting harm. Defendant, however, should not have to wait for harm to occur to maintain the security of its highly sensitive source code. As Plaintiff points out, it has accused a broad swath of Defendant’s products and services, including its very successful search and advertising services. If the source code for these products and services were to be used improperly, it could be catastrophic to 01980.00010/6023142.2 5 Defendant’s business. Thus, it is entirely reasonable to preclude the use of a laptop during source code inspection as supported by Defendants’ cited authority. B. The Number of Pages of Printouts of Source Code Should be Limited (Paragraph 11(g)) Defendant proposes that the Protective Order also include the provision that “in no event may Rockstar print more than 25 consecutive pages, or an aggregate total of more than 500 pages, of source code during the duration of the case without prior written approval by the producing party.” (See Proposed Protective Order, ¶ 11(g).) And, Defendant’s proposal further makes clear that Defendant will not unreasonably withhold written approval to exceed the permitted number of printed pages of source code. Id. Plaintiff does not agree to such a restriction. Id. Plaintiff’s desire to be entitled to an essentially unlimited number of printed pages of source code is unacceptable. The protection of Defendant’s source code is of paramount importance, and Plaintiff’s outside counsel and approved experts and consultants will have ample opportunity to review Defendant’s source code on the secure computers. Thus, printing of source code should be kept to an absolute minimum. This is true of both the aggregate number of pages printed, and the number of consecutive pages printed. Restrictions on the latter are just as important as limitations on the aggregate number of pages because they prevent the existence of a printout of an entire program that could then be easily implemented by a competitor. The imposition of page limits on printing of source code, as proposed by Defendant, is both necessary and non-controversial. See, e.g., E-Contact Tech., LLC v. Apple, Inc., Case No. 110426, D.I. 344 (E.D. Tex. June 19, 2012), at 7 (adopting Defendants’ proposal that “Plaintiff should only be able to print 10 consecutive pages and 500 aggregate pages of source code”); see also MicroUnity v. Acer, No. 2:10-cv-00091-TJW, D.I. 304 (E.D. Tex., Aug. 23, 2011), ¶ 11(a) 01980.00010/6023142.2 6 (limiting the receiving party from printing no more than 10 consecutive pages of source code, stating that no more than 10% or 500 pages of the total amount of source code available, whichever is less, may be in printed form at any one time, and providing that the receiving party may request additional printed pages and the producing party shall not unreasonably deny such request). Plaintiff contends that it should not be limited to an “arbitrary” limit of source code printouts, but rather should only be limited to a “reasonable number of pages” because it broadly accuses “at least a dozen accused instrumentalities”1 and does not yet know how many pages it will need. In the first instance, Defendant’s proposal is not “arbitrary.” It is consistent with the limitations in E-Contact and Superspeed, LLC v. Google, cited by Plaintiff. Superspeed, LLC v. Google Inc., Case No. 4:12-cv-01688, D.I. 38 (S.D. Tex. Jan. 10, 2013), ¶ 3.B.(iv). Moreover, that Plaintiff’s infringement case asserting well over one-hundred claims against Defendant is overbroad does not justify an unlimited number of printouts of Defendant’s source code. In any event, to alleviate Plaintiff’s concerns regarding not yet knowing how many pages of source code it will need, and in an effort to reach a compromise, Defendant suggested that Plaintiff can return printed pages of source code that it no longer needs and Defendant will credit that page count back to Plaintiff. Neither of the cases by Plaintiff include such a provision. Plaintiff, however, rejected this offer. Plaintiff’s position also disregards that Defendant’s proposal specifically allows for printing of additional pages upon prior written approval and that Defendant’s approval “will not unreasonably be withheld.” And, even if written approval were not provided, nothing precludes Plaintiff from seeking relief from the Court if it determines, after reaching the limit of 25 1 That Plaintiff does not know how many products it accuses of infringement illustrates the improper nature of its specific infringement contentions to date. 01980.00010/6023142.2 7 consecutive pages or 500 aggregate pages of source code printouts, that it legitimately needs more. Plaintiff contends that this will only ensure more motion practice. Not so. Even if Plaintiff’s proposal is accepted, there is no guarantee that the parties will agree on what is a “reasonable” number of printed pages of source code. Defendant’s proposal provides guidelines which should minimize additional motion practice. Finally, Plaintiff again argues that Defendant has been subject to Protective Orders that did not include numerical printing limits for source code without any resulting harm. Once again, Defendant should not have to wait for harm to occur in order to maintain the security of its highly sensitive source code. The Court should limit the printing of source code as proposed by Defendant. C. Source Code Should Only be Transported by Hand. (Paragraph 11(j)) The parties agree that materials designated “RESTRICTED CONFIDENTIAL SOURCE CODE” shall be stored or viewed at a limited set of locations, and agree on those locations and that they shall be maintained at all times in a secure location under the direct control of an approved expert or consultant, or counsel. (See Proposed Protective Order, ¶ 11(j).) Plaintiff, however, proposes a disclaimer that nothing precludes the receiving party “from mailing, shipping, or delivering source code” between the approved locations. But this language completely undermines the provision that Rockstar agreed to—that source code remain in the direct control of approved experts or consultants, or counsel. For example, Plaintiff’s proposal would allow it to put printed copies of Defendant’s highly sensitive source code into the U.S. Mail. U.S. Mail is not under the direct control of anyone associated with this case or under the Protective Order. Indeed, if the printed source code is lost in the mail, there will be no one who can answer for where it went, who obtained access to it, etc. The same is true of other services, like FedEx, that Plaintiff may use to mail, 01980.00010/6023142.2 8 ship, or deliver source code. Even if they offer tracking services, there is not a single person responsible for the constant security of the code. Plaintiff argues that this provision should be included because Plaintiff should not be required to hand-deliver printed copies of source code to its approved experts or consultants. Defendant does not insist that counsel hand-deliver source code printouts. Rather, counsel can retain a courier to make these deliveries. That courier can ensure that the printed source code is delivered to the right person and that Defendant’s most sensitive materials are adequately protected for the entirety of the trip. And, that person can answer any questions that may arise if something unexpected occurs in transit. This does not impose an onerous burden on Plaintiff, and any burden is greatly outweighed by the importance of maintaining the security of Google’s source code. Moreover, nothing precludes Plaintiff’s approved experts and consultants from reviewing printed pages of source code in counsel’s offices, altogether eliminating the need to transport them. II. DISPUTES REGARDING ACCESS TO DESIGNATED MATERIAL A. In-House Counsel Should Not Have Access to “RESTRICTED – ATTORNEYS’ EYES ONLY” or “RESTRICTED – ATTORNEYS’ EYES ONLY – PROSECUTION BAR” Information (Paragraph 10) Plaintiff is a non-practicing entity in the business of acquiring patents and filing lawsuits to collect licensing revenues. Some of Defendant’s major competitors, including Apple and Microsoft, are members of Plaintiff. Thus, it is important in this case that Defendant’s highly confidential information not be accessible to anyone internally at Plaintiff. Especially given Plaintiff’s ownership, there is significant potential for competitive danger to Defendant if its “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTED-ATTORNEYS’ EYES ONLY-PROSECUTION BAR” material is accessible internally at Plaintiff. Thus, the circumstances of this case warrant a departure from the Court’s model Protective Order on this 01980.00010/6023142.2 9 issue. Departure from the model order on this issue is not unprecedented, as evidenced by several of the cases cited by Plaintiff. See MicroUnity v. Acer, No. 2:10-cv-00091-TJW, Dkt 244-2, 244-3, D.I. 304 (E.D. Tex., Aug. 23, 2011), ¶ 10 (not granting in-house counsel access to highly confidential information); PersonalWeb Technologies, LLC v. NEC Corp. of America, No. 6:11-CV-00656, D.I. 89 (E.D. Tex., Aug. 7, 2012), ¶ I.B.2. (in-house counsel does not have access to Outside Counsel’s Eyes Only material); Blue Calypso, Inc. v. Groupon, No. 6:12-cv486, D.I. 160 (E.D. Tex., Oct. 24, 2013), ¶ 5 (not granting in-house counsel access to highly confidential information); Eolas Techs. Inc. v, Adobe Sys. Inc., Case No. 6:09-cv-00446-LED, D.I. 423 (E.D. Tex., Sept. 10, 2010), ¶ 9(c) (same). Plaintiff does not refute that the nature of its business or its ownership present a danger to allowing in-house counsel to see “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTED-ATTORNEYS’ EYES ONLY-PROSECUTION BAR” material. Rather, Plaintiff contends that disclosure to in-house counsel is acceptable because its counsel will not exercise competitive decision-making authority on behalf of the client. (See Proposed Protective Order, ¶ 10.) Before granting counsel access to an opposing party’s highly confidential information, however, courts in this District consider who the counsel are and their duties. For example, in Life Technologies Corp. v. Biosearch Technologies, Inc., 2001 WL 1157860 (E.D. Tex. Mar. 29, 2011), the Court granted in-house counsel access to the opposing party’s highly confidential information only after an analysis of the specific individual counsel’s activities, association, and relationship with the party. See also Nike, Inc. v. Adidas America, Inc., Case No. 9:06–cv–43 (E.D.Tex. Sept. 21, 2006), D.I. 58 (refusing to modify a protective order to grant in-house counsel access to confidential information because there was a substantial risk for inadvertent 01980.00010/6023142.2 10 disclosure of trade secrets.). This is a particularly important inquiry for a patent holding and licensing company like Plaintiff, which very likely has attorneys who wear legal and business hats. See e.g., Diagnostic Systems Corp. v. Symantec Corp., 2008 WL 9396387, *5-6 (C.D. Cal. 2008) (describing how attorneys had both business and legal roles at company whose only business was “to analyze, investigate, and attempt to enforce the patents-in-suit”). Here, however, Plaintiff provided no facts that would justify allowing in-house counsel reviewing “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTEDATTORNEYS’ EYES ONLY-PROSECUTION BAR” material. Plaintiff has not identified its in-house counsel. Plaintiff has provided no description of in-house counsel’s actual responsibilities or roles, much less any explanation of how that in-house counsel could not and would not use Defendant’s highly confidential information in other aspects of their jobs as inhouse counsel for an entity owned by Google’s competitors. Nor has Plaintiff provided any basis to allay Defendant’s legitimate concern of inadvertent or unintentional disclosure or use of Defendant’s “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTEDATTORNEYS’ EYES ONLY-PROSECUTION BAR” material.2 The risk of disclosure or use of such material is too high and outweighs any need for Plaintiff’s in-house counsel to have access to the material. 2 Causing Defendant more concern is that Plaintiff will not even have its in-house counsel commit to not engage in competitive decision making. During negotiations over the proposed Protective Order, Defendant asked Plaintiff if the designated in-house counsel would execute something confirming that they are not competitive decision-makers. Plaintiff’s counsel responded:“[w]e are not willing to have in-house people sign any additional agreement or affirmation as it is unnecessary because they will be bound by the protective order.” That Plaintiff is not willing to do so raises significant concerns regarding who Plaintiff wishes to show Defendant’s “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTEDATTORNEYS’ EYES ONLY-PROSECUTION BAR” material. 01980.00010/6023142.2 11 Moreover, Plaintiff cannot show that its ability to litigate this case will be hampered if inhouse counsel do not have access to “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTED-ATTORNEYS’ EYES ONLY-PROSECUTION BAR” material. See Brown Bag Software v. Symantec Corp., 960 2d. 1465, 1471 (9th Cir. 1992) (analyzing the risk of impairment of a party’s case if its in-house counsel does not have access to the opposing party’s confidential information). Plaintiff’s outside counsel and its independent experts and consultants will have access to such information (under the terms of the Protective Order), so there is no reason why Plaintiff’s in-house counsel must also have access. Indeed, just last week, Plaintiff agreed to a Protective Order in another matter against Defendant and others, under which its inhouse counsel does not have access to such material. (See Rockstar Consortium US LP et al. v. ASUSTeK Computer, Inc., Case No. 2:13-cv-00894-JRG, D.I. 108, (E.D. Tex. May 19, 2014), Ex. A-Proposed Protective Order, ¶ I.B.2.) When asked about this inconsistency, Plaintiff’s counsel merely stated that the in-house counsel responsible for this case wants access to this material, with no further explanation. But, if Plaintiff can litigate the ASUSTeK case without its in-house counsel’s access to “RESTRICTED – ATTORNEYS’ EYES ONLY” and “RESTRICTED-ATTORNEYS’ EYES ONLY-PROSECUTION BAR” material, there is no reason to believe it cannot do so here. B. Mock Jurors Should Not Have Access to Designated Material (Paragraphs 6(f) and 33) The parties dispute whether mock jurors shall have access to Designated Material. Defendant does not believe that they should. But, Plaintiff contends that it needs to disclose Defendant’s Designated Material to mock jurors because without doing so, it cannot have a meaningful mock trial. In other words, Plaintiff’s position is merely driven by its strategic desire to conduct a mock trial. 01980.00010/6023142.2 12 The Court should adopt Defendant’s proposal because mock jurors should not have access to Defendant’s Designated Material. It is entirely reasonable to minimize the dissemination of Defendant’s Designated Material. If used in a mock trial by Plaintiff, Defendant has no control over who will see its Designated Material; it does not control who the mock jurors are or what they are told. Indeed, Defendant will not even know that a mock trial was conducted until after it has already been conducted and if the case has not settled before the pretrial conference. Thus, Defendant has no opportunity to vet and police the conduct of the mock jurors—whose identities it will never know—selected by Plaintiff. (See Standing Order Regarding Mock Juries for Cases Assigned to Judge Rodney Gilstrap and Judge Roy S. Payne.) Plaintiff has not identified any case law to Defendant that supports its request that mock jurors have access to Designated Material. The Court’s model Protective Order also does not grant mock jurors access to Designated Material. And, here too, Plaintiff agreed to a Protective Order in another matter, wherein mock jurors would not have access to Designated Material. (See Rockstar Consortium US LP et al. v. ASUSTeK Computer, Inc., Case No. 2:13-cv-00894JRG, D.I. 108 (E.D. Tex. May 19, 2014), Ex. A-Proposed Protective Order, ¶ I.A.6.e (giving access to “Confidential” information to “non-technical jury or trial consulting services not including mock jurors.”) There is no reason why mock jurors must have access to Designated Material here, but not in ASUSTeK. At best, Plaintiff cites to the Protective Order in PersonalWeb, where Defendant agreed that mock jurors could have access to “CONFIDENTIAL” information. But, the Protective Order there limited such access to only one tier—that of “CONFIDENTIAL” information. Plaintiff’s proposal does not; it would allow mock jurors to have access to RESTRICTED - ATTORNEYS' EYES ONLY," "RESTRICTED - 01980.00010/6023142.2 13 ATTORNEYS' EYES ONLY – PROSECUTION BAR," or "RESTRICTED CONFIDENTIAL SOURCE CODE” information.3 Plaintiff argues that its proposal protects Defendant’s Designated Material by including specific provisions that must be followed before sharing Designated Material with mock jurors. (See Proposed Protective Order, ¶ 33.) But, these provisions do not eliminate Defendant’s concerns for multiple reasons. Contrary to Plaintiff’s claim that its proposal prohibits the viewing of Defendant’s Designated Material, Plaintiff’s proposal would allow Plaintiff to make “presentations” about Designated Material. When asked what this means, Plaintiff’s counsel explained that if it identifies a “hot” document, it will put an image of that document in a PowerPoint presentation that will be shown to mock jurors. In other words, the mock jurors will see the actual Designated Material. Similarly, Plaintiff’s proposal would allow it to play deposition testimony for jurors. But that testimony itself is Designated Material, not a mere summary of such material. Under Plaintiff’s proposal, it could play the testimony of an engineer explaining the technical details of the “secret sauce” of how Defendant’s search or advertising systems operate. This is highly sensitive information that should not be disseminated. Plaintiff’s strategic plan to have a mock trial simply does not outweigh the importance of maintaining the confidentiality of Defendant’s Designated Material. C. The Parties Should Jointly Prevent Third-party Attorney Access to Designated Material (Paragraph 12) The parties dispute whether the parties shall move jointly for a protective order in the event counsel for a non-party witness declines to join the protective order prior to the 3 Plaintiff’s proposal says “not including Source Code Material,” and does not use the designation language used in the proposed Protective Order. Thus, it is difficult to know what Plaintiff does and does not intend to show to mock jurors with respect to source code. For example, a technical document or presentation could include a few lines of source code. Defendant cannot determine if this is the type of document Plaintiff would show mock jurors. 01980.00010/6023142.2 14 examination of that witness. The parties have an identical dispute in Rockstar Consortium US LP et al. v. ASUSTeK Computer, Inc., Case No. 2:13-cv-00894-JRG, D.I. 108 (E.D. Tex. May 19, 2014). Defendant defers to the Court’s ruling on this issue in that case. III. DISPUTE REGARDING SCOPE OF PROSECUTION BAR Plaintiff’s counsel and its experts will have access to the highly confidential and proprietary information of Defendant. A prosecution bar prevents a patent holder from improperly (even if inadvertently) using a party’s proprietary information during prosecution or post-grant challenge proceedings to modify claims so that they read on the disclosing party’s products. As reflected in their proposals, the parties agree that a prosecution bar should apply to Plaintiff. The dispute that remains is whether it should apply to Prosecution Activity involving claims on a method, apparatus, or system directed to the technology of the patents-in-suit. Defendant proposes that the prosecution bar should apply to (1) Prosecution Activity on behalf of a party asserting a patent in this case involving claims on a method, apparatus, or system directed to the technology of the patents-in-suit, and (2) Prosecution Activity involving claims on a method, apparatus, or system directed to the technology of the patents-in-suit, which is consistent with the prosecution bars in some of the cases cited by Plaintiff. See PersonalWeb Technologies, LLC v. NEC Corp. of America, case 6:11-CV-00656, D.I. 89, ¶ 2A; Eolas Techs. Inc. v, Adobe Sys. Inc., Case No. 6:09-cv-00446-LED, D.I. 423, ¶ 5a. Plaintiff proposes that the prosecution bar should apply to Prosecution Activity on behalf of a party asserting a patent in this case or “its acquirer, successor, predecessor, or other affiliate.” In other words, under Plaintiff’s proposal, persons with access to prosecution bar materials would not be permitted to engage in Prosecution Activity on behalf of Rockstar, its acquirer, successor, predecessor, or affiliates (whatever that means) but would be permitted to do so on behalf of other entities. 01980.00010/6023142.2 15 Contrary to Plaintiff’s arguments, the risk of use of Defendant’s highly confidential information in patent prosecution is the same, regardless of who the represented party is. Thus, persons with access to Defendant’s prosecution bar materials should not be able to engage in such Prosecution Activity for any entity. Again, this is particularly important in this case. Plaintiff is a consortium of several companies, including Defendant’s competitors Apple and Microsoft. Unless these members are what Plaintiff considers its “affiliates,” under Plaintiff’s proposal, Rockstar’s attorneys (as well as approved experts and consultants) with access to Defendant’s prosecution bar materials would be free to engage in Prosecution Activity on behalf of Google competitors like Apple and Microsoft. Even if Prosecution Activity on behalf of these competitors were barred by Plaintiff’s proposal, however, it would still allow for Prosecution Activity on behalf of any other entity, which risks the improper use of Defendant’s prosecution bar materials. Similarly, Defendant’s proposed definition of “Prosecution Activity” includes “(3) provide advice, counsel or suggestions regarding, or in any other way influencing, claim scope and/or language, embodiment(s) for claim coverage, claim(s) for prosecution, or products or processes for coverage by claim(s) on behalf of a patentee or assignee of patentee’s rights.” (underlining added). Plaintiff’s definition excludes this language because Plaintiff does not agree to the underlined portion. Again, Plaintiff contends that it should not be limited from providing advise influencing claim scope and/or language, etc., for parties other than Rockstar. But, as explained above, the danger of use of Defendant’s highly confidential prosecution bar materials in advising on claims is the same, regardless of the represented party. IV. DISPUTE REGARDING INCLUSION OF ACQUISITION BAR Defendant proposes an acquisition bar because Plaintiff is a non-practicing entity in the business of acquiring patents and filing lawsuits to collect licensing revenues. It would be highly 01980.00010/6023142.2 16 prejudicial to allow Plaintiff, who practices no patents and is in the business of filing lawsuits, to benefit from having access to Defendant’s confidential information and to use that information to acquire patents to assert against Defendant’s products and services. See, e.g., Unwired Planet LLC v. Apple Inc., No. 12-0505, 2013 WL 1501489, at *7 (D. Nev. Apr. 11, 2013) (finding that “good cause exists to include in the protective order the bar that Unwired’s outside counsel cannot use the confidential information obtained in this lawsuit for the purpose of giving advice on patent acquisitions”); E-Contact Technologies, LLC v. Apple, Inc., Case No. 1:11-cv-00426LED-KFG (E.D. Tex. June 19, 2012), D.I. 344, at 3-4 (“This Court finds that the potential harm of inadvertent disclosure outweighs the restriction imposed on counsel for Plaintiff. An acquisition bar should be included in the protective order.”); see also PersonalWeb Technologies, LLC v. NEC Corp. of America, case 6:11-CV-00656, D.I. 89, ¶ 2B (barring both prosecution and acquisition activity). Defendant’s proposed acquisition bar is narrowly tailored and a reasonable safeguard to ensure that any person reviewing any of its prosecution bar materials shall not, for a period of two years following the conclusion of this case, engage in any activity related to the acquisition of patents or patent applications or advising or counseling clients regarding the same. In other words, what it precludes is a person having access to Defendant’s prosecution bar materials using that information, even if inadvertently, to acquire patents or applications, or advise clients regarding such acquisitions. This is not an attempt to escape infringement allegations or to stifle competition, as Plaintiff argues, but merely ensures that individuals with access to such information do not inadvertently use it improperly.4 4 The parties’ dispute in paragraph 9 citing to paragraphs 13 and 14 is tied to the dispute regarding the Acquisition Bar. Defendant’s proposal includes a reference to the paragraphs 01980.00010/6023142.2 17 discussing the Prosecution Bar and the Acquisition Bar. Plaintiff’s proposal references only the Prosecution Bar. 01980.00010/6023142.2 18

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?