Bite Tech, Inc. et al v. X2 Impact, Inc.
Filing
40
ORDER granting in part and denying in part dft's 31 Motion for Protective Order and to Modify Subpoena by Judge Ricardo S Martinez.(RS)
1
2
3
4
5
6
7
8
9
UNITED STATES DISTRICT COURT
WESTERN DISTRICT OF WASHINGTON
AT SEATTLE
10
11
12
13
14
BITE TECH, INC. and i1
BIOMETRICS, INC.,
CASE NO. C12-1267RSM
ORDER ON DEFENDANT’S
MOTION FOR PROTECTIVE
ORDER AND TO MODIFY
SUBPOENA
Plaintiffs,
15
16
17
18
19
20
21
22
v.
X2 IMPACT, INC.,
Defendant.
I. INTRODUCTION
This matter is before the Court pursuant to Defendant’s Fed. R. Civ. P. 26(c) motion for
protective order on Plaintiffs’ request for production of documents and third party subpoenas.
Dkt. # 31. Pursuant to Fed. R. Civ. P. 45(c), Plaintiffs also move to modify one of the third party
subpoenas issued by this Court. Id. For the reasons set forth below, Defendant’s motion is
23
GRANTED in part and DENIED in part.
24
25
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 1
II. BACKGROUND
1
In May 2011, Bite Tech, Inc. (“Bite Tech”) and X2 Impact, Inc. (“X2”) entered into a
2
3
Technology License Agreement (“Agreement”) that provided Bite Tech with an exclusive
4
worldwide license on X2’s impact sensing technology. Under the Agreement, Bite Tech was to
5
develop, market and manufacture an impact sensing mouthguard that would enable real-time
6
monitoring of impact forces for athletes, military troops and others at risk of concussions or
7
similar harms. In January 2012, Bite Tech completed $2 million in advance royalty payments to
8
X2. Then in March 2012, X2 sent Bite Tech a notice of termination alleging that Bite Tech was
9
insolvent. The Agreement provides for rightful termination if Bite Tech becomes insolvent or
10
institutes bankruptcy proceedings. Bite Tech has denied the allegations of insolvency and X2 has
11
declined to reimburse Bite Tech’s $2 million royalty payment. Consequently, Bite Tech and i1
12
Biometrics, Inc.1 (collectively “Plaintiffs”) brought this breach of contract action against X2.
13
In August 2012, Plaintiffs submitted requests for production of documents to X2, and X2
14
served timely written objections. On October 24, 2012, parties’ counsel conferred regarding the
15
requests and X2 stood by its objections to No. 16 and 17, maintaining that the requested
16
information is overly broad, confidential and proprietary. Dkt. # 31, pp. 2-3.
17
No. 16: All documents relating to any or potential investment by any source of capital,
18
19
including but not limited to venture capital funds or firms, in X2.
No. 17: All documents relating to the License Agreement between X2 on the one hand
20
21
and any source of capital, including but not limited to venture capital funds or firms. Dkt. # 33,
22
Ex. 1.
23
24
25
26
Formerly BTMF Holding, Inc., i1 Biometrics, Inc. is the portion of Bite Tech’s
business related to the mouthguards’ development. Dkt. # 29, 30.
1
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 2
1
2
Following the discovery conference, Plaintiffs notified X2 via email that they are serving
subpoenas to Arrow Electronics, Inc. (“Arrow”), Kodiak Financial Group, LLC (“Kodiak”) and
3
Microsoft Corp. (“Microsoft”), which are third parties alleged of providing investments or
4
financing to X2. The subpoena to Arrow was issued from the District of Colorado. The
5
subpoena to Kodiak was issued from the Southern District of New York. The subpoena to
6
Microsoft was issued from this Court.
7
On November 14, 2012, the Court entered a Stipulated Protective Order limiting the
8
parties’ disclosure of confidential information. Dkt. # 28. On November 20, 2012, parties’
9
counsel held a second discovery conference to confer about the subpoena requests. The parties
10
agreed to designate any third party materials produced under the Stipulated Protective Order, but
11
12
13
were unable to resolve the issues concerning X2’s financing and investments. Specifically, X2
disputes Plaintiffs’ requests to Arrow Nos. 1-4, Kodiak Nos. 1-4 and 7, and Microsoft Nos. 1-3.
Arrow, Kodiak and Microsoft Nos. 1-3
14
1. All documents relating to any or potential investment in, or purchase of, X2.
15
2. All documents relating to financing you considered or actually provided to X2
16
including, but not limited to, any due diligence you did regarding X2.
17
18
19
3. All executed agreements relating to any financing you provided to X2, including but
not limited to promissory notes. Dkt. # 33, Ex. 3A-C (emphasis omitted).
20
Arrow and Kodiak No. 4
21
4. All documents relating to any ownership interest you had, or currently have, in X2.
22
Dkt. # 33, Ex. 3A, C (emphasis omitted).
23
Kodiak No. 7
24
7. All documents reflecting communications regarding any actual or potential investment
25
26
in, or purchase of X2. Dkt. # 33, Ex. 3C (emphasis omitted).
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 3
1
2
X2 moves for: (1) a protective order restricting Plaintiffs’ request for production No. 16
and 17; (2) a protective order on Plaintiffs’ subpoena to Arrow, restricting production requests
3
Nos. 1-4; (3) a protective order on Plaintiffs’ subpoena to Kodiak, restricting production requests
4
Nos. 1-4 and 7; and (4) a protective order and modification of Plaintiffs’ subpoena to Microsoft,
5
restricting production requests and/or deleting Nos. 1-3.
III. DISCUSSION
6
7
A. Legal Standard
8
The Federal Rules of Civil Procedure allow for broad discovery. See Fed. R. Civ. P.
9
26(b)(1); Shoen v. Shoen, 5 F.3d 1289, 1292 (9th Cir. 1993). “Parties may obtain discovery
10
regarding any non-privileged matter that is relevant to any party’s claim or defense. . .” Fed. R.
11
Civ. P. 26(b)(1). Relevant information for purposes of discovery is information “reasonably
12
13
14
calculated to lead to the discovery of admissible evidence.” Surfvivor Media Inc. v. Survivor
Prods., 406 F.3d 625, 635 (9th Cir. 2005). District courts have broad discretion in determining
relevancy for discovery purposes. Id. (citing Hallett v. Morgan, 296 F.3d 732, 751 (9th Cir.
15
2002); see U.S. Fidelity and Guar. Co. v. Lee Investments L.L.C., 641 F.3d 1126, 1136 (9th Cir.
16
2011) (“District courts have wide latitude in controlling discovery, and [their] rulings will not be
17
18
19
20
overturned in the absence of a clear abuse of discretion.” (internal quotation and citations
omitted)). A court may “issue an order to protect a party or person from annoyance,
embarrassment, oppression, or undue burden or expense.” Fed. R. Civ. P. 26(c)(1). This includes
21
limiting disclosure of trade secrets “or other confidential research, development or commercial
22
information.” Fed. R. Civ. P. 26(c)(1)(G). The party seeking the protective order must
23
demonstrate good cause, specifying the particularized prejudice or harm that will result if it is not
24
granted. Phillips v. General Motors Co., 307 F.3d 1206, 1210-11 (9th Cir. 2002). When
25
protective order disputes involve conflicting interests over confidential information, a balancing
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 4
1
2
test is appropriate. See Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1469-70 (9th Cir.
1992).
3
B.
Production Requests for No. 16 and 17
4
Plaintiffs’ requests for production No. 16 and 17 seek documents “relating to” any sources or
5
“potential” sources of third party financing or investment to X2. X2 moves for a protective order,
6
arguing that the requests are overbroad, irrelevant, and merely a pretext to elicit detailed
7
confidential information. Dkt. # 31, p. 7. Plaintiffs argue that since the identities of X2’s funding
8
sources are publicly available online, the information is not confidential. Dkt. # 34, pp. 13-14.
9
They further argue that X2’s claim is inapposite since the parties agreed to keep “highly
10
confidential” materials from disclosure under the Stipulated Protective Order. Dkt. # 34, p. 13.
11
X2 maintains that the Stipulated Protective Order is insufficient, because it nonetheless results in
12
13
Plaintiffs, as direct competitors, gaining access to competitively sensitive information. Dkt. # 31,
p. 7.
14
The Court must balance two competing interests. On the one hand, X2 has shown good cause,
15
alleging that disclosure of confidential investment sources to its competitors will result in harm to
16
its business. On the other hand, Plaintiffs are entitled to seek information that is relevant to their
17
18
19
claim that X2’s termination of the Agreement was pretextual and premised on a lack of
investment opportunities while bound by the Agreement. While some of X2’s investment
20
information may be publicly available, Plaintiffs’ broad request for all actual and potential
21
sources of capital includes confidential information as well. The damaging effect of releasing this
22
information to a competitor outweighs its relevance to the extent it reaches beyond the
23
Agreement’s scope and duration. Nonetheless, financing information pertaining to the
24
Agreement and the parties’ respective obligations carries greater weight, as it is directly relevant
25
to the Plaintiffs’ claims and underlying litigation.
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 5
1
2
As such, the Court finds that Plaintiffs’ request No. 16, which simply seeks all documents relating
to any actual or potential sources of X2’s capital, is overbroad on its face. The request is not
3
limited in time or scope to the instant litigation. In contrast, No. 17 specifically seeks documents
4
between X2 and any source of capital as it relates to the Agreement. The request is narrow in
5
scope and does not seek information beyond the context of the parties’ Agreement. Therefore, a
6
protective order on No. 16 is GRANTED and No. 17 is DENIED.
7
C. Third Party Subpoenas
8
Typically only a subpoena’s recipient has standing to challenge the subpoena in the
9
issuing court. See Daimler Truck N. Am. L.L.C. v. Younessi, No. 08-5011, 2008 WL 2519845, at
10
*1 (W.D. Wash. June 20, 2008) (citing Fed. R. Civ. P. 45(c)(2)(B)). However, a party may move
11
to quash or modify third party subpoenas when its own privacy interests may be implicated.
12
13
Johnson v. U.S. Bancorp., No. 11-2010, 2012 WL 6726523, at *2 (W.D. Wash. Dec. 27, 2012)
(citing Koh v. S.C. Johnson & Son, Inc., No. 09-0927, 2011 WL 940227, at *2 (N.D. Cal. Feb. 18,
14
2011)). Parties are also permitted to seek a protective order from the presiding court in order to
15
restrict the party seeking discovery from asserting certain requests from third parties. Fed. R.
16
Civ. P. 26(c)(1); see Becker v. Precor, Inc., No. 08-1755, 2009 WL 3013656, at *4 (W.D. Wash.
17
18
19
Sep. 16, 2009). X2 moves to modify the Microsoft subpoena as it was issued from this Court,
and also moves for a protective order on the Arrow, Kodiak and Microsoft subpoenas. X2 has
20
demonstrated an interest in protecting confidential financing information from its competitor, and
21
may accordingly bring forth the motion to modify Plaintiffs’ Microsoft subpoena. X2’s motion
22
for a protective order on the Arrow, Kodiak and Microsoft subpoenas is also proper.
23
1. Arrow Subpoena Nos. 1-4
24
In its subpoena to Arrow, Plaintiffs seek documents relating to: (1) any actual or potential
25
investments or purchase of X2, (2) any financing considered or provided to X2 such as due
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 6
1
2
diligence, (3) executed agreements of financing such as promissory notes, and (4) any ownership
interest it had or currently has in X2. X2 disputes these requests as being irrelevant to any of
3
Plaintiffs’ claims or defenses, serving only as a pretext to acquire competitively sensitive
4
information and interfere with X2’s business relations. Dkt. # 31, p. 5. Plaintiffs argue that the
5
inquiry is relevant and that the requests are “narrowly time bound.” Dkt. # 34, p. 14.
6
For the reasons discussed above, X2 has demonstrated a legitimate interest in restricting
7
disclosure of its financial arrangements from a competitor. On the other hand, X2’s funding
8
information is highly relevant as it relates to the Agreement and the parties’ joint efforts in the
9
mouthguard’s development. Plaintiffs’ scope of inquiry on Nos. 1-4, however, is overbroad on its
10
11
12
13
face because it is not “narrowly time bound” to the Agreement. This is further evidenced by
Plaintiffs’ remaining requests in the Arrow subpoena, specifying the production of documents as
it relates to Bite Tech or the Agreement. As such, X2’s motion for a protective order restricting
the production of documents requested in Nos. 1-4 of the Arrow subpoena is GRANTED.
14
2. Kodiak Subpoena Nos. 1-4 and 7
15
Plaintiffs’ request on Nos. 1-4 in the Kodiak subpoena is identical to Nos. 1-4 in the Arrow
16
subpoena. X2 additionally disputes No. 7, which seeks “documents reflecting communications
17
regarding any actual or potential investment in, or purchase of X2.” Dkt. # 33, Ex. 3C. Plaintiffs
18
19
20
emphasize that Kodiak’s investment in X2 is public information that is readily found online.
While news of the investment is publicly known, the details of the arrangement are confidential.
21
As discussed above, the requests for Nos. 1-4 are overbroad because they reach beyond the
22
context of the Agreement. Moreover, No. 7 appears to be a duplicative request of No. 1, because
23
“documents” as defined in the subpoena are to be construed in the broadest sense, which includes
24
any materials evidencing “communications.” Dkt. # 33, Ex. 3C. Therefore, X2’s motion for a
25
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 7
1
2
protective order restricting the production of documents requested in Nos. 1-4 and 7 of the
Kodiak subpoena is GRANTED.
3
3. Microsoft Subpoena Nos. 1-3
4
X2’s motion for a protective order or to modify Plaintiffs’ Microsoft subpoena Nos. 1-3 is
5
identical to Nos.1-3 in the Arrow and Kodiak subpoenas. For the same reasons, X2’s motion for
6
a protective order restricting the production of documents requested in Nos. 1-3 of the Microsoft
7
subpoena is GRANTED. As the protective order adequately addresses the issue, a separate order
8
quashing or modifying Nos.1-3 is not necessary in this case.
9
IV. CONCLUSION
10
11
12
Having reviewed the relevant pleadings, the declarations and exhibits attached thereto,
and the remainder of the record, the Court hereby finds and ORDERS:
(1) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ production
13
14
request No. 16 is GRANTED.
(2) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ production
15
request No. 17 is DENIED.
16
(3) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ subpoena to
17
Arrow Electronics, Inc. (Nos. 1-4) is GRANTED.
18
19
(4) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ subpoena to
Kodiak Financial Group, LLC (Nos. 1-4, 7) is GRANTED.
20
21
(5) Defendant’s Fed. R. Civ. P. 26(c) motion for a protective order on Plaintiffs’ subpoena to
Microsoft Corp. (Nos. 1-3) is GRANTED, and subpoena shall not be modified.
22
23
//
24
//
25
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 8
1
2
3
(6) The Clerk is directed to forward a copy of this Order to plaintiffs and to all counsel of
record.
Dated this 17th day of January 2013.
4
A
5
RICARDO S. MARTINEZ
UNITED STATES DISTRICT JUDGE
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
ORDER ON DEFENDANT’S MOTION FOR
PROTECTIVE ORDER AND TO MODIFY
SUBPOENA - 9
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?