Bite Tech, Inc. et al v. X2 Impact, Inc.

Filing 40

ORDER granting in part and denying in part dft's 31 Motion for Protective Order and to Modify Subpoena by Judge Ricardo S Martinez.(RS)

Download PDF
1 2 3 4 5 6 7 8 9 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 10 11 12 13 14 BITE TECH, INC. and i1 BIOMETRICS, INC., CASE NO. C12-1267RSM ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA Plaintiffs, 15 16 17 18 19 20 21 22 v. X2 IMPACT, INC., Defendant. I. INTRODUCTION This matter is before the Court pursuant to Defendant’s Fed. R. Civ. P. 26(c) motion for protective order on Plaintiffs’ request for production of documents and third party subpoenas. Dkt. # 31. Pursuant to Fed. R. Civ. P. 45(c), Plaintiffs also move to modify one of the third party subpoenas issued by this Court. Id. For the reasons set forth below, Defendant’s motion is 23 GRANTED in part and DENIED in part. 24 25 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 1 II. BACKGROUND 1 In May 2011, Bite Tech, Inc. (“Bite Tech”) and X2 Impact, Inc. (“X2”) entered into a 2 3 Technology License Agreement (“Agreement”) that provided Bite Tech with an exclusive 4 worldwide license on X2’s impact sensing technology. Under the Agreement, Bite Tech was to 5 develop, market and manufacture an impact sensing mouthguard that would enable real-time 6 monitoring of impact forces for athletes, military troops and others at risk of concussions or 7 similar harms. In January 2012, Bite Tech completed $2 million in advance royalty payments to 8 X2. Then in March 2012, X2 sent Bite Tech a notice of termination alleging that Bite Tech was 9 insolvent. The Agreement provides for rightful termination if Bite Tech becomes insolvent or 10 institutes bankruptcy proceedings. Bite Tech has denied the allegations of insolvency and X2 has 11 declined to reimburse Bite Tech’s $2 million royalty payment. Consequently, Bite Tech and i1 12 Biometrics, Inc.1 (collectively “Plaintiffs”) brought this breach of contract action against X2. 13 In August 2012, Plaintiffs submitted requests for production of documents to X2, and X2 14 served timely written objections. On October 24, 2012, parties’ counsel conferred regarding the 15 requests and X2 stood by its objections to No. 16 and 17, maintaining that the requested 16 information is overly broad, confidential and proprietary. Dkt. # 31, pp. 2-3. 17 No. 16: All documents relating to any or potential investment by any source of capital, 18 19 including but not limited to venture capital funds or firms, in X2. No. 17: All documents relating to the License Agreement between X2 on the one hand 20 21 and any source of capital, including but not limited to venture capital funds or firms. Dkt. # 33, 22 Ex. 1. 23 24 25 26 Formerly BTMF Holding, Inc., i1 Biometrics, Inc. is the portion of Bite Tech’s business related to the mouthguards’ development. Dkt. # 29, 30. 1 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 2 1 2 Following the discovery conference, Plaintiffs notified X2 via email that they are serving subpoenas to Arrow Electronics, Inc. (“Arrow”), Kodiak Financial Group, LLC (“Kodiak”) and 3 Microsoft Corp. (“Microsoft”), which are third parties alleged of providing investments or 4 financing to X2. The subpoena to Arrow was issued from the District of Colorado. The 5 subpoena to Kodiak was issued from the Southern District of New York. The subpoena to 6 Microsoft was issued from this Court. 7 On November 14, 2012, the Court entered a Stipulated Protective Order limiting the 8 parties’ disclosure of confidential information. Dkt. # 28. On November 20, 2012, parties’ 9 counsel held a second discovery conference to confer about the subpoena requests. The parties 10 agreed to designate any third party materials produced under the Stipulated Protective Order, but 11 12 13 were unable to resolve the issues concerning X2’s financing and investments. Specifically, X2 disputes Plaintiffs’ requests to Arrow Nos. 1-4, Kodiak Nos. 1-4 and 7, and Microsoft Nos. 1-3. Arrow, Kodiak and Microsoft Nos. 1-3 14 1. All documents relating to any or potential investment in, or purchase of, X2. 15 2. All documents relating to financing you considered or actually provided to X2 16 including, but not limited to, any due diligence you did regarding X2. 17 18 19 3. All executed agreements relating to any financing you provided to X2, including but not limited to promissory notes. Dkt. # 33, Ex. 3A-C (emphasis omitted). 20 Arrow and Kodiak No. 4 21 4. All documents relating to any ownership interest you had, or currently have, in X2. 22 Dkt. # 33, Ex. 3A, C (emphasis omitted). 23 Kodiak No. 7 24 7. All documents reflecting communications regarding any actual or potential investment 25 26 in, or purchase of X2. Dkt. # 33, Ex. 3C (emphasis omitted). ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 3 1 2 X2 moves for: (1) a protective order restricting Plaintiffs’ request for production No. 16 and 17; (2) a protective order on Plaintiffs’ subpoena to Arrow, restricting production requests 3 Nos. 1-4; (3) a protective order on Plaintiffs’ subpoena to Kodiak, restricting production requests 4 Nos. 1-4 and 7; and (4) a protective order and modification of Plaintiffs’ subpoena to Microsoft, 5 restricting production requests and/or deleting Nos. 1-3. III. DISCUSSION 6 7 A. Legal Standard 8 The Federal Rules of Civil Procedure allow for broad discovery. See Fed. R. Civ. P. 9 26(b)(1); Shoen v. Shoen, 5 F.3d 1289, 1292 (9th Cir. 1993). “Parties may obtain discovery 10 regarding any non-privileged matter that is relevant to any party’s claim or defense. . .” Fed. R. 11 Civ. P. 26(b)(1). Relevant information for purposes of discovery is information “reasonably 12 13 14 calculated to lead to the discovery of admissible evidence.” Surfvivor Media Inc. v. Survivor Prods., 406 F.3d 625, 635 (9th Cir. 2005). District courts have broad discretion in determining relevancy for discovery purposes. Id. (citing Hallett v. Morgan, 296 F.3d 732, 751 (9th Cir. 15 2002); see U.S. Fidelity and Guar. Co. v. Lee Investments L.L.C., 641 F.3d 1126, 1136 (9th Cir. 16 2011) (“District courts have wide latitude in controlling discovery, and [their] rulings will not be 17 18 19 20 overturned in the absence of a clear abuse of discretion.” (internal quotation and citations omitted)). A court may “issue an order to protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense.” Fed. R. Civ. P. 26(c)(1). This includes 21 limiting disclosure of trade secrets “or other confidential research, development or commercial 22 information.” Fed. R. Civ. P. 26(c)(1)(G). The party seeking the protective order must 23 demonstrate good cause, specifying the particularized prejudice or harm that will result if it is not 24 granted. Phillips v. General Motors Co., 307 F.3d 1206, 1210-11 (9th Cir. 2002). When 25 protective order disputes involve conflicting interests over confidential information, a balancing 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 4 1 2 test is appropriate. See Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1469-70 (9th Cir. 1992). 3 B. Production Requests for No. 16 and 17 4 Plaintiffs’ requests for production No. 16 and 17 seek documents “relating to” any sources or 5 “potential” sources of third party financing or investment to X2. X2 moves for a protective order, 6 arguing that the requests are overbroad, irrelevant, and merely a pretext to elicit detailed 7 confidential information. Dkt. # 31, p. 7. Plaintiffs argue that since the identities of X2’s funding 8 sources are publicly available online, the information is not confidential. Dkt. # 34, pp. 13-14. 9 They further argue that X2’s claim is inapposite since the parties agreed to keep “highly 10 confidential” materials from disclosure under the Stipulated Protective Order. Dkt. # 34, p. 13. 11 X2 maintains that the Stipulated Protective Order is insufficient, because it nonetheless results in 12 13 Plaintiffs, as direct competitors, gaining access to competitively sensitive information. Dkt. # 31, p. 7. 14 The Court must balance two competing interests. On the one hand, X2 has shown good cause, 15 alleging that disclosure of confidential investment sources to its competitors will result in harm to 16 its business. On the other hand, Plaintiffs are entitled to seek information that is relevant to their 17 18 19 claim that X2’s termination of the Agreement was pretextual and premised on a lack of investment opportunities while bound by the Agreement. While some of X2’s investment 20 information may be publicly available, Plaintiffs’ broad request for all actual and potential 21 sources of capital includes confidential information as well. The damaging effect of releasing this 22 information to a competitor outweighs its relevance to the extent it reaches beyond the 23 Agreement’s scope and duration. Nonetheless, financing information pertaining to the 24 Agreement and the parties’ respective obligations carries greater weight, as it is directly relevant 25 to the Plaintiffs’ claims and underlying litigation. 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 5 1 2 As such, the Court finds that Plaintiffs’ request No. 16, which simply seeks all documents relating to any actual or potential sources of X2’s capital, is overbroad on its face. The request is not 3 limited in time or scope to the instant litigation. In contrast, No. 17 specifically seeks documents 4 between X2 and any source of capital as it relates to the Agreement. The request is narrow in 5 scope and does not seek information beyond the context of the parties’ Agreement. Therefore, a 6 protective order on No. 16 is GRANTED and No. 17 is DENIED. 7 C. Third Party Subpoenas 8 Typically only a subpoena’s recipient has standing to challenge the subpoena in the 9 issuing court. See Daimler Truck N. Am. L.L.C. v. Younessi, No. 08-5011, 2008 WL 2519845, at 10 *1 (W.D. Wash. June 20, 2008) (citing Fed. R. Civ. P. 45(c)(2)(B)). However, a party may move 11 to quash or modify third party subpoenas when its own privacy interests may be implicated. 12 13 Johnson v. U.S. Bancorp., No. 11-2010, 2012 WL 6726523, at *2 (W.D. Wash. Dec. 27, 2012) (citing Koh v. S.C. Johnson & Son, Inc., No. 09-0927, 2011 WL 940227, at *2 (N.D. Cal. Feb. 18, 14 2011)). Parties are also permitted to seek a protective order from the presiding court in order to 15 restrict the party seeking discovery from asserting certain requests from third parties. Fed. R. 16 Civ. P. 26(c)(1); see Becker v. Precor, Inc., No. 08-1755, 2009 WL 3013656, at *4 (W.D. Wash. 17 18 19 Sep. 16, 2009). X2 moves to modify the Microsoft subpoena as it was issued from this Court, and also moves for a protective order on the Arrow, Kodiak and Microsoft subpoenas. X2 has 20 demonstrated an interest in protecting confidential financing information from its competitor, and 21 may accordingly bring forth the motion to modify Plaintiffs’ Microsoft subpoena. X2’s motion 22 for a protective order on the Arrow, Kodiak and Microsoft subpoenas is also proper. 23 1. Arrow Subpoena Nos. 1-4 24 In its subpoena to Arrow, Plaintiffs seek documents relating to: (1) any actual or potential 25 investments or purchase of X2, (2) any financing considered or provided to X2 such as due 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 6 1 2 diligence, (3) executed agreements of financing such as promissory notes, and (4) any ownership interest it had or currently has in X2. X2 disputes these requests as being irrelevant to any of 3 Plaintiffs’ claims or defenses, serving only as a pretext to acquire competitively sensitive 4 information and interfere with X2’s business relations. Dkt. # 31, p. 5. Plaintiffs argue that the 5 inquiry is relevant and that the requests are “narrowly time bound.” Dkt. # 34, p. 14. 6 For the reasons discussed above, X2 has demonstrated a legitimate interest in restricting 7 disclosure of its financial arrangements from a competitor. On the other hand, X2’s funding 8 information is highly relevant as it relates to the Agreement and the parties’ joint efforts in the 9 mouthguard’s development. Plaintiffs’ scope of inquiry on Nos. 1-4, however, is overbroad on its 10 11 12 13 face because it is not “narrowly time bound” to the Agreement. This is further evidenced by Plaintiffs’ remaining requests in the Arrow subpoena, specifying the production of documents as it relates to Bite Tech or the Agreement. As such, X2’s motion for a protective order restricting the production of documents requested in Nos. 1-4 of the Arrow subpoena is GRANTED. 14 2. Kodiak Subpoena Nos. 1-4 and 7 15 Plaintiffs’ request on Nos. 1-4 in the Kodiak subpoena is identical to Nos. 1-4 in the Arrow 16 subpoena. X2 additionally disputes No. 7, which seeks “documents reflecting communications 17 regarding any actual or potential investment in, or purchase of X2.” Dkt. # 33, Ex. 3C. Plaintiffs 18 19 20 emphasize that Kodiak’s investment in X2 is public information that is readily found online. While news of the investment is publicly known, the details of the arrangement are confidential. 21 As discussed above, the requests for Nos. 1-4 are overbroad because they reach beyond the 22 context of the Agreement. Moreover, No. 7 appears to be a duplicative request of No. 1, because 23 “documents” as defined in the subpoena are to be construed in the broadest sense, which includes 24 any materials evidencing “communications.” Dkt. # 33, Ex. 3C. Therefore, X2’s motion for a 25 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 7 1 2 protective order restricting the production of documents requested in Nos. 1-4 and 7 of the Kodiak subpoena is GRANTED. 3 3. Microsoft Subpoena Nos. 1-3 4 X2’s motion for a protective order or to modify Plaintiffs’ Microsoft subpoena Nos. 1-3 is 5 identical to Nos.1-3 in the Arrow and Kodiak subpoenas. For the same reasons, X2’s motion for 6 a protective order restricting the production of documents requested in Nos. 1-3 of the Microsoft 7 subpoena is GRANTED. As the protective order adequately addresses the issue, a separate order 8 quashing or modifying Nos.1-3 is not necessary in this case. 9 IV. CONCLUSION 10 11 12 Having reviewed the relevant pleadings, the declarations and exhibits attached thereto, and the remainder of the record, the Court hereby finds and ORDERS: (1) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ production 13 14 request No. 16 is GRANTED. (2) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ production 15 request No. 17 is DENIED. 16 (3) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ subpoena to 17 Arrow Electronics, Inc. (Nos. 1-4) is GRANTED. 18 19 (4) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ subpoena to Kodiak Financial Group, LLC (Nos. 1-4, 7) is GRANTED. 20 21 (5) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ subpoena to Microsoft Corp. (Nos. 1-3) is GRANTED, and subpoena shall not be modified. 22 23 // 24 // 25 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 8 1 2 3 (6) The Clerk is directed to forward a copy of this Order to plaintiffs and to all counsel of record. Dated this 17th day of January 2013. 4 A 5 RICARDO S. MARTINEZ UNITED STATES DISTRICT JUDGE 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ORDER ON DEFENDANT’S MOTION FOR PROTECTIVE ORDER AND TO MODIFY SUBPOENA - 9

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?