throbber
Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15071 Page 1 of 15
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`
`SOUTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`v.
`
`Plaintiff,
`
`ESET, LLC and ESET SPOL. S.R.O.,
`
`Defendants.
`
`
`
`
`
` Case No.: 17CV183 CAB (BGS)
`
`ORDER REGARDING
`PROTECTIVE ORDER
`VIOLATIONS
`
`[ECF 292]
`
`This dispute concerns alleged violations of the parties’ stipulated Protective Order
`
`by counsel for Finjan, Mr. Lee. (ECF 292.) In reviewing Eset’s source code, Mr. Lee
`
`compiled directory information from the source code computer into a 40-page document
`
`that he then produced to a witness during a deposition without any confidentiality
`
`designation on the document. (Id.) As explained more fully below, the Court finds Mr.
`
`Lee did violate the Protective Order in copying and compiling the directory structure of
`
`Eset’s source code from the source code computer. However, the level of sanctions Eset
`
`requests are not warranted.
`
`BACKGROUND
`
`This dispute arose when Finjan’s counsel, Mr. Lee presented a deposition witness
`
`with a 40-page document listing the directory structure1 of Eset’s source code (“Exhibit
`
`
`
`1 The Court refers to the listing Mr. Lee created as “directory structure” or “directories
`and subdirectories,” based on the Court’s own review of the document. While it may
`contain folder names, as Finjan now refers to them, in earlier filings with the Court,
`discussed below, Finjan also described them as directories and subdirectories.
`
`1
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15072 Page 2 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`3”). The document lacked any confidentiality designation. During a call with the Court
`
`regarding this issue, Mr. Lee indicated he had taken notes about the source code on his
`
`laptop while reviewing the source code on the source code computer and that the 40-page
`
`document presented to the witness was accessible on Finjan’s counsel’s computer
`
`network.
`
`By prior order, the Court addressed the more immediate dispute as to whether Mr.
`
`Lee should be precluded from accessing Eset’s source code based on these possible
`
`violations and how to proceed going forward with review of Eset’s source code. (ECF
`
`306.) The Court found he could have access to the source code computer subject to
`
`certain limitations, including that he treat the directories, subdirectories, and file paths of
`
`the source code as he would treat source code with all the limitations imposed by a
`
`“HIGHLY CONFIDENTIAL – SOURCE CODE” designation and that he not take notes
`
`“onto any recordable media or recordable device” that could constitute “copy[ing],
`
`remov[ing], or otherwise transfer[ring] any portion of the source code” or the directories,
`
`subdirectories, or file paths as set forth in §9(c) of the Protective Order. (Id.) The Court
`
`also imposed these same limitations on anyone else accessing the source code because of
`
`the ongoing need for other individuals to also have access to the source code. (Id.)
`
`DISCUSSION
`
`Eset asserts numerous violations of the Protective Order under a number of
`
`different sections. The relevant sections are summarized here in the order they appear in
`
`the Protective Order. A summary of the parties’ positions on their application and the
`
`22
`
`Court’s analysis follow.
`
`23
`
`I.
`
`Protective Order
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Section 2 of the Protective Order is the Definitions section. Section 2.9 is titled
`
`“‘HIGHLY CONFIDENTIAL – SOURCE CODE’ Information or Items” and defines
`
`HIGHLY CONFIDENTIAL – SOURCE CODE as:
`
`extremely sensitive “Confidential Information or items” representing
`computer code and associated comments and revision histories, formulas,
`
`2
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15073 Page 3 of 15
`
`
`
`engineering specifications, or schematics that define or otherwise describe
`in detail the algorithms or structure of software or hardware designs,
`disclosure of which to another Party or Non-Party would create a
`substantial risk of serious harm that could not be avoided by less restrictive
`means.
`
`
`Section 5 addresses designation of protected material. Section 5.2(a), addresses
`
`information in a documentary form (paper or electronic). The first paragraph of the
`
`section requires a producing party to “affix the legend ‘CONFIDENTIAL OR HIGHLY
`
`CONFIDENTIAL – ATTORNEYS’ EYES ONLY’ or ‘HIGHLY CONFIDENTIAL –
`
`SOURCE CODE’ to each page that contains protected material.” The second paragraph
`
`of § 5.2(a) indicates that:
`
`A Party or Non-Party that makes original documents or materials available
`for inspection need not designate them for protection until after the
`inspecting Party has indicated which material it would like copied and
`produced. During the inspection and before the designation, all of the
`material made available for inspection shall be deemed “HIGHLY
`CONFIDENTIAL – ATTORNEYS’ EYES ONLY.” After the inspecting
`Party has identified the documents it wants copied and produced, the
`Producing Party must determine which documents, or portions thereof,
`qualify for protection under this Order. Then, before producing the
`specified documents, the Producing Party must affix the appropriate legend
`(“CONFIDENTIAL” or “HIGHLY CONFIDENTIAL – ATTORNEYS’
`EYES ONLY” or “HIGHLY CONFIDENTIAL – SOURCE CODE) to each
`page that contains Protected Material.
`
`
`Section 5.2(c) requires “for information produced in some form other than
`
`documentary and for any tangible items, that the Producing Party affix in a prominent
`
`place on the exterior of the container or containers in which the information or item is
`
`stored the legend ‘CONFIDENTIAL’ or ‘HIGHLY CONFIDENTIAL – ATTORNEYS’
`
`EYES ONLY’ or ‘HIGHLY CONFIDENTIAL – SOURCE CODE.’”
`
`Section 6 of the Protective Order provides a detailed process to challenge a
`
`confidentiality designation, including the timing of a challenge (§ 6.1), a meet and confer
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`3
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15074 Page 4 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`requirement (§ 6.2), and a process for raising an unresolved challenge with the Court
`
`(§ 6.3).
`
`
`
`Section 9, SOURCE CODE, addresses designation, treatment, and procedures for
`
`access to and documentation of those that have accessed source code. Section 9(a)
`
`provides that “[t]o the extent production of source code becomes necessary in this case, a
`
`Producing Party may designate source code as ‘HIGHLY CONFIDENTIAL – SOURCE
`
`CODE’ if it comprises or includes confidential, proprietary, or trade secret source code.”
`
`Section 9(b) indicates that materials “designated as ‘HIGHLY CONFIDENTIAL –
`
`SOURCE CODE’ shall be subject to all the protections afforded to ‘HIGHLY
`
`CONFIDENTIAL – ATTORNEYS’ EYES ONLY’ information” and limits disclosure to
`
`those “to whom ‘HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY’
`
`information may be disclosed, as set forth in Paragraphs 7.3 and 7.4.”
`
`Section 9(c) dictates how any source code will be produced in discovery. It
`
`14
`
`provides:
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`The source code shall be made available for inspection on a secured
`computer in a secured room without Internet access or network access to
`other computers, and the Receiving Party shall not copy, remove, or
`otherwise transfer any portion of the source code onto any recordable media
`or recordable device.
`
`
`
`Section 9(d) provides that a “Receiving Party may request paper copies of limited
`
`portions of source code that are reasonably necessary for the preparation of court filings,
`
`pleadings, expert reports, or other papers, or for deposition or trial, but shall not request
`
`paper copies for purposes of reviewing the source code other than electronically as set
`
`forth in paragraph (c) in the first instance.” It requires the Producing party to provide the
`
`requested source code in paper form with bates numbers and the label HIGHLY
`
`CONFIDENTIAL – SOURCE CODE and allows the Producing Party to challenge the
`
`amount of source code requested in paper form under § 6. Section 9(e) requires the
`
`Receiving Party to keep a record of anyone that has inspected any portion, electronic or
`
`paper, of the source code and to keep printed portions in a secured locked area. It also
`
`4
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15075 Page 5 of 15
`
`
`
`prohibits creation of “any electronic or other images of the paper copies” and
`
`“convert[ing] any of the information contained in the paper copies into any electronic
`
`format.” Section 9(e) requires the Receiving Party to “maintain a record of any
`
`individual who has inspected any portion of the source code in electronic or paper form.”
`
`II.
`
`Parties’ Positions2
`
`A. Eset’s Position
`
`Eset asserts that Mr. Lee’s conduct violated § 5.2(a) of the Protective Order
`
`because, instead of requesting copies of the directory structure from the source code
`
`computer from Eset, it just copied the directories and subdirectories and proceeded to
`
`compile and disclose it without any designation. Similarly, ESET asserts Mr. Lee also
`
`violated §6 by ignoring the process set out in that section to challenge a designation. In
`
`essence, Eset argues that if Finjan believed the directory structure it was compiling from
`
`the source code computer should not have the HIGHLY CONFIDENTIAL – SOURCE
`
`CODE designation, it should have challenged it through this process rather than taking
`
`the information without asking and not designating it at all. Eset also argues Finjan
`
`violated § 9 of the Protective Order because the directory structure Mr. Lee copied onto
`
`his laptop constitutes source code. By copying it from the source code computer onto his
`
`laptop he violated § 9(c)’s prohibition on “copy[ing], remov[ing] or otherwise
`
`transfer[ring] any portion of the source code onto any recordable media or recordable
`
`device.” Finally, Eset argues Finjan failed to abide by the procedures set out in § 9(d) for
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`obtaining portions of source code.
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`B.
`
`Finjan’s Position
`
`Finjan does not dispute the directory structure was copied from the source code
`
`computer, compiled into a 40-page document, and presented to a witness without any
`
`confidentiality designation. Rather, Finjan argues that there was no violation of the
`
`
`
`2 The Court only summarizes pertinent portions of the parties’ arguments. (See Joint
`Statement [ECF 345] for each parties’ entire argument.)
`
`5
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15076 Page 6 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Protective Order because the directory structure is not source code. Under Finjan’s
`
`interpretation, there is no violation in copying the directory structure or failing to
`
`designate it as HIGHLY CONFIDENTIAL – SOURCE CODE because it is not source
`
`code and Eset has never designated it as HIGHLY CONFIDENTIAL – SOURCE CODE.
`
`Finjan also argues that the directory structure should not be treated as source code or
`
`subject to the HIGHLY CONFIDENTIAL – SOURCE CODE designation because of
`
`instances when Eset did not treat it as source code. Similarly, as to the electronic
`
`copying, Finjan argues that the Protective Order does not prohibit the note taking done by
`
`Mr. Lee in the source code room. Further, Finjan argues that by seeing Mr. Lee in the
`
`10
`
`source code room taking notes on a laptop, Eset has waived any objection to his having
`
`11
`
`done it.
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`Finjan also claims it could not have known Eset considered these “folders”3 to be
`
`source code or warranting the designation. In Finjan’s view, being on the “source code
`
`computer” was not enough to alert it that it was copying source code or material subject
`
`to the HIGHLY CONFIDENTIAL – SOURCE CODE designation because such a broad
`
`designation would improperly encompass the operating system on the computer, certainly
`
`not warranting the HIGHLY CONFIDENTIAL – SOURCE CODE designation. Finjan
`
`points to § 5.2(c) to further support this position.
`
`19
`
`///
`
`20
`
`///
`
`21
`
`///
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`3 Although the Court recognizes that Finjan is referring to the directory structure at issue
`as “folders” for persuasive effect, that effect is largely lost given Finjan previously
`described portions of the exact same information as follows in its Motion to Compel,
`“ESET’s source code is structured under a top level directory . . . . There are four
`directories under the top level . . . directory . . . . Each of these four directories includes
`subdirectories (listed below) located on the source code computer.” (Finjan’s Mot. to
`Compel ESET to Supplement its Response to Interrogatory No. 7 [ECF 231].)
`
`6
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15077 Page 7 of 15
`
`
`
`III. Analysis of Violations
`
`A. Waiver of Eset’s Objections
`
`Initially, the Court finds that Eset did not waive its objection to Mr. Lee’s
`
`electronic note taking. Eset proffered in its response that Mr. Penner presumed that Mr.
`
`Lee was using his laptop for a proper purpose. Had he known that Mr. Lee was taking
`
`notes, he would have immediately objected. Given both parties conduct as to abiding by
`
`this Court’s chambers rules 30-day objection limit, and the numerous times both parties
`
`have requested tolling of this rule, the Court finds Mr. Penner’s proffer credible. Eset has
`
`brought this dispute timely. They raised it immediately following presentation of Exhibit
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`3 at a deposition.
`
`11
`
`12
`
`B.
`
`Proper Designation
`
`1.
`
`Section 5.2
`
`13
`
`
`
`Section 5.2 addresses the manner and timing of designation. Finjan contends that
`
`14
`
`15
`
`16
`
`17
`
`Eset did not comply with § 5.2(c) by affixing to the exterior of the source code computer
`
`a label for HIGHLY CONFIDENTIAL – SOURCE CODE thereby reflecting all its
`
`contents were designated source code. Because Eset failed to notify Finjan with the
`
`label, Finjan did not have the opportunity to object as Finjan would have. (ECF 345 at
`
`18
`
`15).
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Section 6 lays out the procedure for Finjan to challenge Eset’s confidentiality
`
`designations. If Eset failed to properly designate the directories on the source code
`
`computer as being source code, then Finjan was not given the opportunity to challenge
`
`this designation pursuant to § 6. Of course, the reverse is also true. If Eset properly
`
`designated the contents of the source code computer as source code, which necessarily
`
`includes the directories, then Finjan would have been obligated to follow the procedures
`
`as set forth in § 6, which it readily admits it did not do.
`
`26
`
`
`
`Eset argues that § 5.2(a) is the appropriate section for designation of the contents
`
`27
`
`28
`
`of the source code computer. Subsection (a) applies to paper or electronic documents,
`
`whereas subsection (c) controls information produced in some form other than
`
`7
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15078 Page 8 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`documentary. The information produced on the source code computer are electronic
`
`documents. Therefore subsection (a) controls the manner and timing of the contents of
`
`the source code computer, not (c).
`
`
`
`Subsection (a)’s paragraph one requires Eset to designate each page that contains
`
`protected material, which Eset did not do. Subsection (a)’s second paragraph does not
`
`require Eset to designate the material until after inspection by Finjan. This second
`
`paragraph applies to original documents. Neither party directly addresses whether the
`
`documents on the source code computer are original documents. However, Eset does
`
`proffer that no single employee has access to the entirety of the source code, including
`
`the Chief Technology Officer. (ECF 345 at 6.) Eset goes on to explain that the source
`
`code is only made available on a need to know basis. (Id. at 7). Based on this proffer, the
`
`Court concludes for the purposes of 5.2(a)’s second paragraph, the documents on the
`
`source code computer are deemed original. As such, by operation of subsection (a), until
`
`Eset has been given the opportunity to designate which documents qualify for protection,
`
`all the documents on the computer are deemed “Highly Confidential-Attorneys Eye
`
`16
`
`Only.”
`
`17
`
`
`
`Pursuant to § 5.2(a), had Mr. Lee wanted copies of the directories, he was required
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`to identify which documents he wanted copied, allow Eset to designate appropriately
`
`those documents, and then produce them to Mr. Lee. At that point in time, if Mr. Lee did
`
`not agree to Eset’s designations, he could appropriately object by following the procedure
`
`set forth in § 6 of the Protective Order. Based on § 5.2(a), the Court finds that Finjan
`
`would have had the opportunity to object had Mr. Lee identified the documents he
`
`wanted copied, i.e., the directories, and then given Eset the chance to designate them
`
`accordingly. He simply did not follow the procedure for the manner and timing of
`
`designation as set forth in this section of the Protective Order.
`
`26
`
`
`
`Eset argues that Mr. Lee copying the directory structure onto its laptop and
`
`27
`
`28
`
`producing it in a printed document without Eset’s permission facially violated § 5.2(a).
`
`Finjan contends Mr. Lee merely took notes for the purpose of identifying code
`
`8
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15079 Page 9 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`appropriate for a printing request. In that the second paragraph of § 5.2(a) is applicable
`
`to Mr. Lee’s conduct, the Court finds by copying the directories onto his computer, and
`
`not allowing Eset the opportunity to determine how to designate those copied directories,
`
`Mr. Lee violated this provision. By operation of subsection (a), paragraph 2, Mr. Lee
`
`was required to identify which documents he wanted copied, allow Eset to designate
`
`appropriately those documents, and then produce them to Mr. Lee. At that point, if Mr.
`
`Lee did not agree to Eset’s designation, he could appropriately object by following the
`
`procedure set forth in § 6 of the Protective Order. The Court also stresses by operation of
`
`this subsection, until Eset had the opportunity to designate the documents Mr. Lee
`
`wanted copied, they are deemed Highly Confidential – Attorneys’ Eyes Only. By
`
`copying the directories, and not following this procedure, Mr. Lee did an end run around
`
`subsection (a), paragraph 2, thereby violating this provision of the Protective Order.
`
`2.
`
`Section 9(c)
`
`14
`
`
`
`Unlike § 5.2(a), § 9(c)-(d) refer only to “source code.” These sections do not state
`
`15
`
`16
`
`that they apply to any materials designated as HIGHLY CONFIDENTIAL – SOURCE
`
`CODE, a designation broader than source code. Nor does either section incorporate in
`
`17
`
`any way the definition of HIGHLY CONFIDENTIAL – SOURCE CODE.4
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Additionally, the Protective Order lacks a definition for “source code.” Section 2.9
`
`defines materials subject to the HIGHLY CONFIDENTIAL – SOURCE CODE
`
`designation, but § 9 does not define “source code.” Therefore, in determining whether
`
`Mr. Lee’s conduct violated § 9(c), the issue before the Court is whether he was on proper
`
`notice that the contents of the source code computer were designated as source code.
`
`
`
`4 Section 9 does refer to the designation. It specifically allows for the production and
`designation of source code as HIGHLY CONFIDENTIAL – SOURCE CODE and
`indicates how it is to be treated pursuant other sections of the Protective Order. (§ 9(a)-
`(b).)
`
`9
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15080 Page 10 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`The Court is persuaded that § 9(c)-(d) is intended to apply to the contents of the
`
`“source code computer.” Section 9(c) provides, “Any source code produced in discovery
`
`shall be made available for inspection…”. This opening sentence puts all parties on
`
`notice that the procedure for inspection deals only with source code. Section 9(c) sets out
`
`the parameters for source code review, including the use of a secured room, secured
`
`computer, and prohibitions on Internet or network access. The same sentence of the
`
`Protective Order within § 9(c) that creates the source code computer subject to all these
`
`limitations to keep its contents secure also prohibits copying from it onto any recordable
`
`media or recordable device. Although § 9 does not explicitly define source code to
`
`encompass the directories and subdirectories of the source code, the Court cannot ignore
`
`that they were on the source code computer with all its restrictions for inspection outlined
`
`in § 9(c) that only apply to source code discovery placed on the source code computer.
`
`13
`
`
`
`By Eset following to the letter the restrictions for source code inspection set forth
`
`14
`
`15
`
`16
`
`17
`
`18
`
`in § 9(c), it has properly designated all the contents of the source code computer as
`
`source code. Mr. Lee was on notice that the electronic documents on the source code
`
`computer were being designated by Eset as source code. If Mr. Lee, after inspecting the
`
`contents of the source code computer, objected to the directories being included on the
`
`computer as source code, he was required to follow the procedures for objecting under
`
`19
`
`§ 6. He did not do this.
`
`20
`
`C. Electronic Note Taking – Section 9(c) Violation
`
`21
`
`
`
`Finjan contends that the electronic note taking by Mr. Lee is not prohibited by
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`§ 9(c) in that it did not constitute “copying, removing or otherwise transferring” source
`
`code. The Court disagrees with Finjan’s interpretation of note taking as being separate
`
`from the specific language of § 9(c), which prohibits the receiving party from copying or
`
`otherwise transferring any portion of the source code onto any recordable device. The
`
`Court finds that Mr. Lee’s typing some 40 pages of the directory structure from the
`
`source code computer amounts to copying or otherwise transferring what Eset has
`
`designated as source code onto his laptop, which is a recordable device. This conduct
`
`10
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15081 Page 11 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`was a violation of § 9(c). If he wanted copies of the directories, pursuant to § 9(d), he
`
`could have asked Eset for paper copies. He chose not to follow the agreed upon
`
`procedure, instead taking it upon himself to copy the directory structure of the source
`
`code and then use it at a deposition.
`
`Finjan argues strenuously that the directory structure cannot be considered source
`
`code under § 9 because it is nothing more than folder names undeserving of any
`
`protection. It also argues that including the directories as source code is grossly
`
`overbroad in contradiction to § 5.1. The Court concludes that these objections should
`
`have been presented through the procedure in § 6 regarding challenging the designation
`
`as directed in § 9(d), not after the fact as part of this dispute.
`
`Similarly, the Court is not persuaded that Finjan could not have known Eset
`
`considered the directory structure to be confidential. Both Eset and Finjan’s filings with
`
`the Court have indicated that the directory structure is subject to the HIGHLY
`
`CONFIDENTIAL – SOURCE CODE designation and that Finjan knew Eset considered
`
`it, at a minimum, to reference source code. In filing a Motion to Compel on March 9,
`
`2018, Finjan sought to file portions of these same directories and subdirectories under
`
`seal. In its Motion to File Under Seal, Finjan specifically asserted to the Court that
`
`“based on Eset’s representations and designations, the portions of the Motion to Compel
`
`19
`
`that Finjan seeks to file under seal5 reference source code designated by ESET as
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`‘HIGHLY CONFIDENTIAL – SOURCE CODE’” under the Protective Order. (Finjan’s
`
`Mot. to File Documents Under Seal [ECF 229] (emphasis added).) The only information
`
`redacted in Finjan’s Motion to Compel are directories and subdirectories that are included
`
`in the 40-page document Finjan created from the source code computer. Similarly, in
`
`
`
`5 The Court has compared the redacted portions of Finjan’s Motion to Compel, as well as
`the chart provided by Finjan in seeking to file those portions under seal and confirmed
`the 40-page directory structure Finjan compiled includes these directories and
`subdirectories.
`
`11
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15082 Page 12 of 15
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`opposing Finjan’s Motion to Compel, Eset also redacted directory names and indicated in
`
`seeking to file those portions under seal that the brief “contained materials designated by
`
`Eset as ‘HIGHLY CONFIDENTIAL – SOURCE CODE’” and identified as an example
`
`that “the documents above disclose information relating to source code directory
`
`structure and file names.” (Eset’s Mot. for Leave to File Documents Under Seal [ECF
`
`233] at 2.) Finjan considered these directories and subdirectories to be referencing source
`
`code and having been designated as “HIGHLY CONFIDENTIAL – SOURCE CODE”
`
`by Eset.
`
`In sum, Mr. Lee’s copying contents of the source code computer, particularly on
`
`10
`
`such a large scale, to a recordable media device was a violation of § 9(c).
`
`11
`
`II.
`
`Sanctions
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`Eset seeks sanctions against Finjan for violations of the Protective Order pursuant
`
`to Federal Rule of Civil Procedure 37(b)(2). Eset requests: (1) an order requiring Finjan
`
`to provide an accounting of all documents, in any form, that include information from the
`
`source code computer; (2) as to each document, that Finjan be ordered to provide Eset
`
`and the Court a full accounting as to each document, including when and who created it,
`
`where it was stored, and to whom it was sent and when; (3) that the contents of all of
`
`those documents be submitted to the Court for in-camera review to determine if there
`
`were other Protective Order violations; (4) that the Court order each document the Court
`
`finds in violation of the Protective Order be destroyed; and (5) that the Court require
`
`Finjan to certify destruction of such materials. Pursuant to Rule 37(b)(2)(C), Eset also
`
`22
`
`seeks reasonable expenses and attorney’s fees related to this motion.6
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`6 Eset’s request that Mr. Lee be walled off entirely from this case has already been denied
`by prior order of the Court. In the Court’s prior Order, Mr. Lee was allowed to continue
`to have access to the source code computer, but subject to specific limitations. The Court
`prohibited Mr. Lee or anyone else reviewing materials on the source code computer from
`copying not only source code, but the directories, subdirectories, or file paths “onto any
`recordable media or recordable device” that could constitute “copy[ing], remov[ing], or
`
`12
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15083 Page 13 of 15
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`Finjan argues the sanctions sought regarding an accounting of all individuals
`
`having access and an in-camera review are onerous and irrational because there is no
`
`actual source code at issue. Finjan points to emails between counsel for the parties that
`
`have included portions of the directory structure as an indicator that such remedial
`
`measures are unwarranted. In addressing its efforts to resolve this dispute without Court
`
`intervention, Finjan explains that it has already offered to destroy all electronic and paper
`
`copies of the exhibit and forego any use of it in this action. Finjan also indicates that it
`
`has never shown Exhibit 3 to any individuals other than those who are permitted to
`
`access materials designated as HIGHLY CONFIDENTIAL – SOURCE CODE.
`
`The Court may impose sanctions for violations of a protective orders under Federal
`
`Rule of Civil Procedure 37(b)(2). See Westinghouse Elec. Corp. v. Newman &
`
`Holtzinger, P.C., 992 F.2d 932, 934-35 (9th Cir. 1993) (quoting Advisory Committee
`
`Note, 1970 Amendment, subdivision (b)); see also United States v. Nat’l Med. Enters.,
`
`Inc., 792 F.2d 906, 910-11 (9th Cir.1986) (upholding a Rule 37(b) sanction for a party’s
`
`violation of the protective order). Rule 37(b)(2)(A) provides as follows:
`
`If a party or a party’s officer, director, or managing agent—or a witness
`designated under Rule 30(b)(6) or 31(a)(4)—fails to obey an order to
`provide or permit discovery, including an order under Rule 26(f), 35, or
`37(a), the court where the action is pending may issue further just
`orders. They may include the following:
`(i) directing that the matters embraced in the order or other
`designated facts be taken as established for purposes of the action,
`as the prevailing party claims;
`(ii) prohibiting the disobedient party from supporting or opposing
`designated claims or defenses, or from introducing designated
`matters in evidence;
`(iii) striking pleadings in whole or in part;
`
`
`
`otherwise transfer[ring] any portion of the source code” or the directories, subdirectories,
`or file paths as set forth in §9(c) of the Protective Order.
`
`
`
`
`13
`
`17CV183 CAB (BGS)
`
`

`

`Case 3:17-cv-00183-CAB-BGS Document 457 Filed 03/29/19 PageID.15084 Page 14 of 15
`
`
`
`
`
`
`
`
`
`
`
`(iv) staying further proceedings until the order is obeyed;
`(v) dismissing the action or proceeding in whole or in part;
`(vi) rendering a default judgment against the disobedient party; or
`(vii) treating as contempt of court the failure to obey any order
`except an order to submit to a physical or mental examination.
`
`As to expenses and attorney’s fees, Rule 37(b)(2)(C) provides:
`
`Instead of or in addition to the orders above, the court must order the
`disobedient party, the attorney advising that party, or both to pay the
`reasonable expenses, including attorney’s fees, caused by the failure,
`unless the failure was substantially justified or other circumstances make
`an award of expenses unjust.
`
`A violation need not be willful for sanctions to be imposed, however,
`
`“[w]illfullness continues to play a role, along with various other factors, in the choice of
`
`sanctions.” David v. Hooker, 560 F.2d 412, 419-20 (9th Cir. 1977); see also Liew v.
`
`Breen, 640 F.2d 1046, 1050 (9th Cir. 1981) (“Although willfulness need not be present in
`
`order to impose sanctions under Rule 37(b), a good faith dispute concerning a discovery
`
`question might, in the proper case, constitute substantial justification.”)(internal citations
`
`omitted). Similarly, “[w]hile a finding of bad faith is not a requirement for imposing
`
`sanctions, good or bad faith may be a consideration in determining whether imposition of
`
`sanctions would be unjust.” Hy

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket