throbber
Case 1:22-cv-00305-RGA-JLH Document 79 Filed 05/26/23 Page 1 of 3 PageID #: 1039
`
`Frederick L. Cottrell, III
`Director
`302-651-7509
`Cottrell@rlf.com
`May 26, 2023
`
`
`BY CM/ECF
`The Honorable Jennifer L. Hall
`U.S. District Court
`
`District of Delaware
`844 North King Street
`Wilmington, DE 19801-3555
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Re: Robocast, Inc. v. YouTube, LLC, C.A. No. 22-304-RGA-JLH
` Robocast, Inc. v. Netflix, Inc., C.A. No. 22-305-RGA-JLH
`
`Dear Judge Hall:
`
`Defendants respectfully submit this letter for the June 2, 2023 discovery conference
`regarding the disputed terms of the Protective Order to be entered in the above-captioned cases.
`The parties’ competing Protective Order provisions are set forth in Exhibit 1 and Defendants’
`proposed form of order is attached as Exhibit 2.
`
`Source Code: The parties have no dispute over the language of the Protective Order
`defining “computer code” subject
`to “HIGHLY CONFIDENTIAL—SOURCE CODE”
`protection. Produced computer code, as defined by the Protective Order, is treated with the
`relevant source code protections, including being produced on the source code computer.
`Nevertheless, Robocast insists there is a dispute. Robocast contends “only actual source code files
`should be produced on the source code computer” and other “documents that so happen to contain
`‘snippets’ of source code should be produced as normal.” (Ex. 3). First, source code is source
`code, and Robocast has never explained why including other information with source code
`somehow renders it no longer worthy of protection as source code. Second, nothing in the
`definition of “computer code” or anywhere else in the proposed Protective Order limits material
`receiving “HIGHLY CONFIDENTIAL—SOURCE CODE” treatment to “source code files” or
`documents that exclusively contain source code and nothing else—or even uses Robocast’s terms
`or defines their scope. Robocast’s vague “dispute” should be rejected for this reason alone. In
`any event, Robocast’s arguments about treatment of source code in other locations is at best
`premature. To the extent technical documents are produced with excerpts of source code redacted
`and subject to an AEO designation, in addition to a full version on the source code computer,
`Robocast can raise the issue at that time in the context of a concrete and ripe dispute. Third, source
`code is among Defendants’ most sensitive confidential material, and disclosure of these materials
`would cause significant competitive harm regardless of the source. Cf. Intellectual Ventures I
`LLC v. Altera Corp., C.A. No. 10-1065-LPS, Tr. at 26:12-25 (D. Del. July 10, 2012) (“In the
`Court’s view, these hardware design materials and schematics and similar documents are
`analogous to software in a software case and, therefore, are worthy of some type of source code
`
`
`
`
`
`

`

`Case 1:22-cv-00305-RGA-JLH Document 79 Filed 05/26/23 Page 2 of 3 PageID #: 1040
`The Honorable Jennifer L. Hall
`May 26, 2023
`Page 2
`
`like protection.”) (Ex. 4). The parties agree on the proposed language in the Protective Order and
`Robocast’s vague dispute should be rejected.
`
`Paragraph 28(iii): Defendants’ proposal should be adopted because it provides
`Defendants’ source code with the proper protection. First, the information Defendants propose be
`contained within the manifest, i.e., the number and volume of computer code files on the computer
`and the directory structure, is sufficient for the receiving party to understand the scope of the
`contents of the source code computer ahead of any review consistent with the purpose of this
`provision. Second, that the manifest be provided in printed form only is consistent with standard
`practice that source code—which is among Defendants’ most sensitive confidential information—
`is not provided in electronic format. There is also no need for the receiving party to keep the
`manifest post inspection as the producing party must provide a manifest before each review.
`
`Paragraph 28(v): The parties agree that “no electronic or recording devices . . . be
`permitted” within the source code review room, yet Robocast inexplicably contends that laptops
`and tablets are somehow not electronic or recording devices and, thus, permissible inside the
`review room. Robocast is wrong, as laptops and tablets are clearly impermissible electronic
`devices. See, e.g., Inventor Holdings, LLC v. Wal-Mart Stores Inc., C.A. No. 13-96 (GMS), 2014
`WL 437020, at *3 (D. Del. Aug. 27, 2014) (“[I]t is hard to imagine that a ‘personal laptop
`computer’, even one temporarily unable to function as a camera, or temporarily disconnected and
`temporarily incapable of supporting through USB or other means an ability to acquire and/or
`transmit information obtained from the stand-alone computer, would qualify as acceptable under
`the protective order.”). Further, Robocast wants its reviewers to be able to type notes but has not
`identified any problem with note taking by hand and does not propose any restriction on the
`proposed laptop or tablet’s capabilities to protect the code. Robocast rejected Defendants’
`proposed compromise of typing notes on the source code review computer, which would then be
`printed and reviewed by a paralegal not involved in this case solely for compliance with the
`Protective Order. Robocast’s attempt to narrow the scope of “electronic or recording devices”
`would undermine the purpose of locking down the source code computer and review room.
`
`Paragraph 38: Robocast agrees that its attorneys and others who have access to
`Defendants’ AEO and source code designated materials should not be permitted to draft or amend
`claims as part of original prosecution of patents in the agreed field of the alleged inventions, but
`Robocast simultaneously wants an exception to the prosecution bar that extends to all post-grant
`review proceedings where they would be able to draft and amend claims. This exception would
`render the prosecution bar meaningless. Robocast’s counsel will have broad access to Defendants’
`most sensitive confidential information, including Defendants’ source code, but they wish to be
`free to draft or amend patent claims in the agreed field of the alleged inventions in the context of
`post-grant proceedings where amending claims is sometimes permitted. Excepting all post-grant
`review proceedings from the prosecution bar would create the exact risk that the prosecution bar
`is intended to mitigate in the first place—amending or drafting claims in prosecution based on
`Defendants’ highly-confidential information. Counsel and consultants who have reviewed
`Defendants’ highly-confidential information should not be permitted to use this information to
`draft or amend patent claims in the same, agreed field—something that Robocast agrees with in
`the context of original prosecution. Indeed, courts in this District have extended prosecution bars
`to post-grant proceedings based on access to source code, which Robocast’s counsel will have
`access to here. See, e.g., Versata Software, Inc. v. Callidus Software, Inc., No. 12-931-SLR, 2014
`
`
`
`
`
`

`

`Case 1:22-cv-00305-RGA-JLH Document 79 Filed 05/26/23 Page 3 of 3 PageID #: 1041
`The Honorable Jennifer L. Hall
`May 26, 2023
`Page 3
`
`WL 1117804, *1, 2 (D. Del. March 12, 2014); Inventor Holdings, LLC v. Wal-Mart Stores Inc.,
`No. 13-CV-96 (GMS), 2014 WL 4370320, at *2 (D. Del. Aug. 27, 2014). In addition, no exception
`to the prosecution bar is needed for Robocast’s litigation counsel to continue participating in the
`IPRs of the Asserted Patents, as those patents are expired and their claims cannot be amended, so
`Robocast has no interest in its proposed exception that outweighs the need to protect Defendants.
`
`Paragraph 51: The parties agree that export controls apply to each party’s information
`and that the Protective Order should include a statement regarding export controls. The only
`question is which statement is appropriate. The export control provision proposed by Defendants
`is the most effective to protect Defendants’ information as well as promote compliance with
`applicable laws. U.S. export control laws restrict export of technical information, and Defendants
`have a strong interest in complying with those laws and protecting their technical information.
`Defendants’ proposal is consistent with important provisions of U.S export control laws (see, e.g.,
`15 C.F.R. § 734-36) and other protective orders entered in this District, and therefore should be
`adopted. See, e.g., IPA Techs. Inc. v. Google LLC, C.A. No. 18-318 (RGA), D.I. 60 (D. Del. Aug.
`20, 2019) (adopting protective order with similar export control provision) (Ex. 5); Data Engine
`Techs. LLC v. Google LLC, C.A. No. 14-1115-LPS, D.I. 33 (D. Del. Apr. 8, 2015) (“[A]s
`[defendant]’s sourcecode is entitled to stringent protection, that sourcecode may be referenced in
`other Protected Information, and the burden on Plaintiff (e.g., having to ‘purge’ a laptop before
`unrelated foreign travel or taking a different laptop on such travel) is not so strenuous as to
`outweigh [defendant]’s interests.”) (Ex. 6).
`
`Paragraph 52: Robocast wants to freely cross-use documents between the Google and
`Netflix cases. Given Defendants are unrelated entities involved in separate cases, there is no basis
`for Robocast to retain and use one Defendant’s protected information in litigating against the other
`Defendant(s). As a compromise, Defendants have proposed that parties be permitted to retain
`documents “designated for cross-use in the non-settled case by agreement of the settling party or
`by order of the Court.” This is in line with other orders from this District regarding the treatment
`of confidential documents where multiple defendants are involved. See, e.g., AstraZeneca LP v.
`Sigmapharm Labs., LLC, No. 15-1000-RGA (D. Del. Apr. 26, 2016) (D.I. 71 at ¶ 16) (“absent
`written consent from the producing party, Plaintiffs may not produce or otherwise make available
`Defendant’s Protected Information to any other Defendant”) (Ex. 7).
`
`Respectfully,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ Frederick L. Cottrell, III
`
`Frederick L. Cottrell, III (#2555)
`
`All Counsel of Record (via email)
`
`
`
`
`
`cc:
`
`
`
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket