Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al
Filing
200
MOTION for Protective Order by Uniloc Singapore Private Limited, Uniloc USA, Inc.. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Exhibit D, # 5 Text of Proposed Order)(Nelson, Edward)
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF TEXAS
TYLER DIVISION
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
SONY CORPORATION OF AMERICA,
ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
DISK DOCTORS LABS, INC. ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
NATIONAL INSTRUMENTS CORP.,
ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
ENGRASP, INC., ET AL.
Defendants.
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-373
PATENT CASE
CASE NO. 6:10-CV-471
PATENT CASE
CASE NO. 6:10-CV-472
PATENT CASE
CASE NO. 6:10-CV-591
PATENT CASE
UNILOC USA, INC., ET AL.
Plaintiffs,
§
§
§
§
§
§
§
vs.
BMC SOFTWARE, INC., ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
§
§
§
§
§
§
§
vs.
FOXIT CORPORATION, ET AL.
Defendants.
SYMANTEC CORPORATION, ET AL.
Plaintiffs,
§
§
§
§
§
§
§
vs.
UNILOC USA, INC., ET AL.
Defendants.
CASE NO. 6:10-CV-636
PATENT CASE
CASE NO. 6:10-CV-691
PATENT CASE
CASE NO. 6:11-CV-33
PATENT CASE
PLAINTIFFS’ MOTION FOR ENTRY OF PROTECTIVE ORDER
Pursuant to Federal Rule of Civil Procedure 26(c), Plaintiffs Uniloc USA, Inc. and Uniloc
(Singapore) Private Limited (collectively, “Uniloc”) ask that the Court enter the Protective Order
attached as Exhibit A.
I.
PROTECTIVE ORDER NEGOTIATIONS WITH DEFENDANTS
Uniloc first sent Defendants a proposed protective order on May 22, 2011, which
included a framework for review of Defendants’ source code. No Defendant responded with
comments to the proposed protective order; though numerous Defendants contacted Uniloc
proposing widely varying review protocols and restrictions on early source code production.
2
In turn, Uniloc explained that the following, basic parameters are essential to effective
and efficient source code review:
Means for production: Standalone computer, or transmittal on a disk or
laptop.
Format: Production (i) in a native format such that the code can be reviewed
with developers’ tools (source code files .c, .cpp, .cs, .java, etc.) and (ii) in the
same directories as the code is kept on the developer’s computer so the
reviewer can step through the code line-by-line and determine what functions
call other functions and modules.
Code Review Tools: Subject to consultation, free tools such as Visual
Express Studio should be installed on the review computer.
Printing: Permission to make reasonable print-outs on pre-labeled Batesnumbered pages (with the “SOURCE CODE ─ ATTORNEY’S EYES
ONLY” confidentiality designation).1
Consultant Approval: Consent for Uniloc’s consultant to review the
produced source code.
Note-Taking: Permission to use a laptop for note-taking (the producing party
may disable input/output connections).
Uniloc believes that these minimum parameters are reasonable. In fact, Uniloc has performed
dozens of source code reviews in this and related cases under these, or substantially similar,
conditions.
Uniloc ultimately resent its proposed protective order to Defendants on July 5, 2011.
(Exh. B, Nelson Letter). The document has since been through two rounds of revisions with
1
Note that the Protective Order that Uniloc asks this Court to enter represents a document
advanced from Uniloc’s original proposal in the sense that it includes negotiated provisions that
are agreeable to Uniloc and Defendants alike. For example, the Protective Order includes a
departure from the enumerated printing parameter. Despite the fact that printing portions of code
at the time of review is ideal, Uniloc’s proposed Order reflects its willingness to allow the
producing Defendant to print the code excerpts as requested by Uniloc and to send those excerpts
to Uniloc post-review.
3
some, but not all, parties to the pending Uniloc cases.2
The material revisions in Defendants’ most recent draft include multiple unworkable
restrictions and limitations, prompting a meet and confer across all cases on Thursday, July 28.
Over twenty Defendants or Defendant groups participated; but the participants were unable to
resolve the outstanding issues and are at an impasse.
The Docket Control Order sets August 15, 2011 as the deadline for exchanging additional
disclosures. Uniloc believes that entering a protective order in advance of this deadline will
ensure that these disclosures are timely and that there are established, uniform rules for
conducting source code reviews going forward.
II.
SOURCE CODE REVIEW PROTOCOL ISSUES
The majority of differences among the parties involve the disclosure, review and
handling of Defendants’ respective source code. In an effort to highlight the differences for the
Court, Uniloc attaches a comparison of Uniloc’s proposed protective order (Exh. A) with
Defendants’ most recent iteration. (See Exh. C, showing Defendants’ changes in redline). It
bears mention that many Defendants have reached agreements with Uniloc on interim source
code review procedures that are consistent with the protective order Uniloc submits for entry.
a. Location of source code computer
The parties have agreed that source code may be produced on a standalone computer (the
“Source Code Computer”). (Exh. C, at ¶ 20(a)). Uniloc proposes, however, that the Source
Code Computer be located: (i) at any office of the Producing Party’s outside counsel in Texas,
(ii) any place of business of the Producing Party in Texas, or (iii) if mutually agreed to, any other
2
That the Defendant drafts are not endorsed by all Defendants is a complicating issue.
4
location. Defendants’ draft removes the requirement to produce the Source Code Computer in
Texas. (Exh. C, at ¶ 20(a)).
Uniloc believes that the Source Code Computer should be located in Texas (absent
mutual agreement of the parties) for a variety of reasons: (i) This case is pending in Texas and
any trial will be conducted in Texas and any source code will eventually have to be in Texas for
that purpose, (ii) all Defendants have retained local counsel in Texas, and (iii) most Defendants
are represented by outside counsel who have offices in Texas. Furthermore, if Defendants have
carte blanche to produce the Source Code Computer at any location, they could use the location
of the Source Code Computer offensively as a mechanism to drive up costs and hinder efficient
discovery.
b. Production of source code as it is kept in the normal course of business
Uniloc believes that any source code should be produced as it is kept in the normal course
of business. This position is consistent with Rule 34(b)(2)(E)(i), which provides that “[a] party
must produce documents as they are kept in the usual course of business…” Fed. R. Civ P.
34(b)(2)(E)(i) (emphasis added).
Defendants removed this provision in their recent draft, which is contrary to the
requirements of the Federal Rules. (See Exh. C, at ¶ 20(a)). Uniloc’s position is consistent with
the Federal Rules and requests that this provision be incorporated to ensure the code review is no
more burdensome for Uniloc than for Defendants.
c. Use of a laptop to take notes
Uniloc’s primary consultant has a medical condition, arthritis, which makes taking hand
written notes difficult. Given the voluminous amount of code review expected in this case,
5
Uniloc believes that using a laptop for note taking is reasonable. Defendants’ draft would forbid
the use of a laptop for note taking. (Exh. C, at ¶ 20(d)).
To the extent that Defendants are concerned about unauthorized access to any notes on
Uniloc’s consultant’s laptop, the Court should be aware that the laptop has a variety of security
features, including: (i) the use of a hidden TruCrypt partition using 256 bit AES (rated by the
National Security Agency for top secret documents3), (ii) a 30+ character password in addition to
the password file being secured with Syskey, and (iii) the TruCrypt partition has an additional
20+ character password that is not the same as the login. Thus, Uniloc believes that it has taken
sufficient precautions and has adequately addressed any legitimate security concerns. In fact,
notes on the laptop would arguably be more secure than any handwritten notes on paper.
d. Audible monitoring of source code reviews
Uniloc has yielded to Defendants’ request to visually monitor any source code review in
order to ensure compliance with the requirements of the protective order (such as not copying
source code to an external device). However, Defendants proposal would permit them to audibly
monitor such reviews. (Exh. C, at ¶ 20(g)). Such is unjustifiably intrusive and would permit
Defendants to eavesdrop on conversations between Uniloc counsel and consultant. Courts have
rejected attempts by opposing counsel to similarly monitor counsel and their experts while
conducting inspections and reviews. See Mancuso v. D.R.D. Towing Co., L.L.C., 2006 U.S. Dist.
LEXIS 9672, at *6 (E.D. La. Mar. 10, 2006).
e. Restrictive limitations on printing
Defendants seek to limit the number of source code pages that may be printed to fifty
pages. (Exh. C, at ¶ 20(i)). This is an unworkable limitation for a variety of reasons. First,
3
See http://csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf.
6
Uniloc does not know how many files are relevant for a given Defendant’s activation technology
until it has an opportunity to review the code. Second, Uniloc has no control over the size of the
relevant files.
A file might be three to four pages long, or it could be 100 pages long
(particularly if there are substantial programmer’s comments contained within).
Given
Defendants’ proposed restriction, Uniloc might not be able to print more than one partial file.
Third, it is possible that certain Defendants use more than one activation technology, or that the
source code has undergone revisions over time. Defendants’ printing restrictions would prevent
Uniloc from printing relevant pages/files for use in this case and necessitate multiple trips to
review the same code.
Uniloc has agreed that it will not “request printed copies of Source Code in order to
review blocks of Source Code elsewhere in the first instance, i.e., as an alternative to reviewing
that Source Code electronically on the Source Code Computer.” (Exh. C, at ¶ 20(i)) As Uniloc
has no desire to print large sections of non-relevant code, this should adequately address
Defendants’ concerns.
III.
UNILOC HAS ENTERED INTO INTERIM REVIEW PROTOCOLS WITH
NUMEROUS DEFENDANTS THAT ARE SUBSTANTIALLY SIMILAR, IF NOT
IDENTICAL, TO THE PROCEDURES PROPOSED IN UNILOC’S PROPOSED
PROTECTIVE ORDER
In order for Uniloc to review early source code disclosures pursuant to the Court’s Order
dated May 20, 2011, Uniloc has entered into interim review protocols with numerous
Defendants. In fact, Uniloc has signed what is essentially a full-blown, interim protective order
with Defendants Adobe, BMC Software, Freedom Scientific, National Instruments, Pinnacle
Systems, SafeNet, Aladdin Systems, and Oynx Graphics (the “Adobe Defendants”). (See Exh.
D). The agreement with the Adobe Defendants is materially the same as Uniloc’s present
proposed protective order and includes the following:
7
1. Source Code Computer available in Texas (Exh. D, at ¶20(a));
2. Notes to be taken on a laptop (Exh. D, at ¶ 20(b); see also ¶ 20(d));
3. No hard printing limitations (Exh. D, at ¶20(f));
4. No audible monitoring of the review proceedings.
In fact, in the pending cases alone, Uniloc has conducted a number of code reviews
subject to similar arrangements, and those reviews have run smoothly. Since Uniloc’s interim
code review procedures have proved successful, Uniloc sees no reason why these procedures
should not be adopted and applied to all Defendants.
IV.
CONCLUSION
Uniloc respectfully requests that the Court enter its proposed protective order without
further modification in order to establish uniform rules for further source code reviews, and to
otherwise permit discovery to proceed on August 15, 2011 unimpeded.
Dated: August 2, 2011.
Respectfully Submitted,
/s/ Edward R Nelson, III
Edward R. Nelson, III
Attorney-in-Charge
Texas State Bar No. 00797142
Barry J. Bumgardner
Texas State Bar No. 24041918
Steven W. Hartsell
Texas State Bar No. 24040199
S. Brannon Latimer
Texas State Bar No. 24060137
Jaime K. Olin
Texas State Bar No. 24070363
NELSON BUMGARDNER CASTO, P.C.
3131 West 7th Street, Suite 300
Fort Worth, Texas 76107
(817) 377-9111
(817) 377-3485 (fax)
enelson@nbclaw.net
8
barry@nbclaw.net
shartsell@nbclaw.net
blatimer@nbclaw.net
jolin@nbclaw.net
T. John Ward, Jr.
Texas State Bar. No. 00794818
J. Wesley Hill
Texas State Bar. No. 24032294
WARD & SMITH LAW FIRM
111 West Tyler St.
Longview, Texas 75601
Tel: (903) 757-6400
Fax: (903) 757-2323
jw@wsfirm.com
wh@wsfirm.com
COUNSEL FOR PLAINTIFFS UNILOC USA,
INC. AND UNILOC SINGAPORE PRIVATE
LIMITED
CERTIFICATE OF CONFERENCE
Counsel for Uniloc scheduled a meet and confer for July 28 to discuss the proposed
protective order and invited Defendants to attend. A significant number of defendants and
defendant groups participated on the July 28 call. The discussions have conclusively resulted in
an impasse, leaving an open issue for the Court to resolve.
/s/ Edward R. Nelson, III
Edward R. Nelson, III
CERTIFICATE OF SERVICE
The undersigned certifies that on August 2, 2011, the foregoing document was filed
electronically in compliance with Local Rule CV-5(a). As such, this motion was served on all
counsel who have consented to electronic service. Local Rule CV-5(a)(3)(A).
/s/ Edward R. Nelson, III
Edward R. Nelson, III
9
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?