throbber
UNITED STATES INTERNATIONAL TRADE COMMISSION
`Washington, D.C.
`
`
`
`In the Matter of
`
`CERTAIN WEARABLE ELECTRONIC
`DEVICES WITH ECG FUNCTIONALITY
`AND COMPONENTS THEREOF
`
`
`
`
`
`Inv. No. 337-TA-1266
`
`
`ORDER NO. 7:
`
`
`
`
`AMENDING THE PROTECTIVE ORDER
`
`(August 18, 2021)
`
`Complainant AliveCor, Inc. and Respondent Apple Inc. (collectively, “the Private Parties”)
`
`moved (1266-002) to amend the Protective Order (Order No. 1) that issued on May 26, 2021, to
`
`include enhanced confidentiality provisions for source code. The Private Parties submit that the
`
`Commission Office of Import Investigations Staff does not oppose the proposed amendments. Mot.
`
`at 3.
`
`The Private Parties’ joint motion (1266-002) is hereby granted. The provisions set forth in
`
`Appendix A to this order shall be incorporated as Paragraph Nos. 18-28 of the Protective Order in
`
`this investigation.
`
`SO ORDERED.
`
`
`
`
`
`
`
`
`
`_____________________________
`Cameron Elliot
`Administrative Law Judge
`
`

`

`
`
`
`
`
`
`
`
`APPENDIX A
`
`18.
`
`Source Code. A Producing Party may designate documents, information, or things
`
`that constitute or contain non-public Source Code as “HIGHLY CONFIDENTIAL SOURCE
`
`CODE SUBJECT TO PROTECTIVE ORDER.” Nothing in this Order shall be construed as a
`
`representation or admission that Source Code is properly discoverable in this action, or to obligate
`
`any Party to produce any Source Code.
`
`19.
`
`Definitions.
`
`A.
`
`B.
`
`“Producing Party” shall mean any Private Party or non-party that makes
`Source Code available for review.
`“Receiving Party” shall mean any Party or non-party other than the
`Producing Party that reviews Source Code provided by the Producing
`party.
`“Source Code” shall mean computer code, scripts, assembly, binaries,
`object code, source code listings (e.g., file names and path structure),
`descriptions of source code (e.g., descriptions of declarations, functions,
`and parameters), object code listings and descriptions of object code,
`Hardware Description Language (HDL) or Register Transfer Level (RTL)
`files that describe the hardware design of any ASIC or other chip, and
`Computer Aided Design (CAD) files that describe the hardware design of
`any component.
`Source Code Qualified Persons. Unless otherwise ordered by the Administrative
`
`C.
`
`20.
`
`Law Judge or permitted in writing by a Producing Patty, materials designated “HIGHLY
`
`CONFIDENTIAL SOURCE CODE SUBJECT TO PROTECTIVE ORDER” shall not be
`
`disclosed to anyone except the following persons (“SOURCE CODE QUALIFIED PERSONS”):
`
`A.
`
`B.
`
`Outside Counsel of Record who have signed the Agreement to be bound
`by the Protective Order in this Investigation, and staff assisting such
`counsel who are necessarily incident to the litigation of this Investigation;
`The Commission, the Administrative Law Judge, the Commission
`Investigative Staff, Commission personnel and contract personnel who are
`acting in the capacity of Commission employees as indicated in
`Paragraphs 3 and 4 of this Protective Order;
`
`

`

`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`Court reporters, stenographers and videographers transcribing or recording
`testimony at depositions, hearings, or trial in this Investigation, who have
`signed an acknowledgment to be bound by the Protective Order, as
`indicated in Paragraph 6 of this Protective Order;
`Qualified experts or consultants retained by a Private Party for purposes of
`this Investigation under Paragraphs 11 and 21 of this Protective Order
`(hereinafter, “Qualified Experts”);
`Any third parties who are witnesses during a deposition, court hearing, or
`trial where specific documentary or testimonial evidence establishes that
`the Highly Confidential Source Code portion of the Highly Confidential
`Source Code was authored or received by the witness without any
`violation of any confidentiality obligation owed to any Party in this
`Investigation; and
`Anyone else to whom the Producing Party consents, as long as such
`individual signs an acknowledgment to be bound by the Protective Order,
`and, if applicable, the “Certification of Consultant Regarding Protective
`Order” attached hereto as Exhibit A, and such consent is expressly
`provided in writing by Outside Counsel of Record for the Producing Party.
`Nothing in this paragraph shall prevent a Producing Party from disclosing
`its Source Code to the Producing Party’s own employees or Qualified
`Experts.
`21. Qualified Experts. A Qualified Expert may only
`
`review HIGHLY
`
`CONFIDENTIAL SOURCE CODE SUBJECT TO PROTECTIVE ORDER after:
`
`A.
`
`B.
`
`C.
`D.
`
`Being expressly identified to the Producing Party as seeking access to
`HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO
`PROTECTIVE ORDER at least five (5) business days prior to said
`Qualified Expert’s first inspection of HIGHLY CONFIDENTIAL
`SOURCE CODE SUBJECT TO PROTECTIVE ORDER;
`Providing the Producing Party with signed copies of acknowledgments to
`be bound by the Protective Order, and the “Certification of Consultant
`Regarding Protective Order” attached hereto as Exhibit A;
`Complying with the notice provisions of Paragraphs 11 and 22; and
`Disclosing the proposed expert’s educational and detailed employment
`history to the Producing Party, which shall include at least
`i. an up-to-date curriculum vitae of the Qualified Expert
`(including the Qualified Expert’s business/professional title
`and business address);
`ii. any previous or current relationship with any of the Private
`Parties to this Investigation, including direct relationships and
`relationships through entities owned or controlled by the
`
`
`
`2
`
`

`

`E.
`
`Qualified Expert;
`iii. a list of other cases in which the Qualified Expert has testified
`(at trial or deposition) within the last five (5) years;
`iv. a list of all companies by which the proposed Qualified Expert
`has consulted or by which the proposed Qualified Expert has
`been employed within the last five (5) years, the dates of the
`consultancy or employment, a brief description of the subject
`matter of the consultancy or employment; and
`v. an identification of all pending patent applications on which
`the Qualified Expert is named as an inventor, in which the
`Qualified Expert has any ownership interest, or as to which the
`Qualified Expert has had or presently anticipates in the future
`any involvement in advising on, consulting on, preparing,
`prosecuting, drafting, editing, amending, or otherwise affecting
`the scope of the claims.
`Further, the Party seeking to disclose protected material shall provide such
`other information regarding the Qualified Expert’s professional activities
`reasonably requested by the Producing Party for it to evaluate whether
`good cause exists to object to the disclosure of protected material to the
`Qualified Expert, including but not limited to an identification of any
`individual or entity with or for whom the Qualified Expert is employed or
`provides consulting services relating to the functionality, operation, and
`design of wearable electronic devices with ECG and PPG functionalities
`for purposes of detecting atrial fibrillation (generally or as described in
`any patent in suit).
`This paragraph does not require the disclosing party to disclose aspects of
`any expert’s business or profession or companies with which the proposed
`expert has consulted or by which the proposed expert has been employed
`to the extent such information is confidential or subject to a non-disclosure
`agreement; in any such instance, the disclosing party will describe the
`confidential experience in such a manner so as to enable the other parties
`to determine that no valid concerns exist regarding the disclosing party’s
`retention of that expert.
`Notice. In accordance with Paragraph 21 of this Protective Order, and if the
`
`F.
`
`22.
`
`Producing Party objects to the disclosure of such HIGHLY CONFIDENTIAL SOURCE CODE
`
`SUBJECT TO PROTECTIVE ORDER to a Qualified Expert as inconsistent with the language or
`
`intent of this order or on other grounds, it shall notify the Receiving Party in writing of its objection
`
`and the grounds therefore no more than 10 business days after the above-described written
`
`submission of the Qualified Expert by the Receiving Party, or no less than 3 business days prior
`
`
`
`3
`
`

`

`to the initial disclosure of HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO
`
`PROTECTIVE ORDER to the Qualified Expert (whichever of the two periods is shorter as
`
`measured from the date that the Receiving Party’s identification of the Qualified Expert under
`
`Paragraph 21). If the dispute is not resolved on an informal basis within five days of receipt of
`
`such notice of objections, the Producing Party shall submit immediately each objection to the
`
`Administrative Law Judge for a ruling. If the investigation is before the Commission, the matter
`
`shall be submitted to the Commission for resolution. The submission of such HIGHLY
`
`CONFIDENTIAL SOURCE CODE SUBJECT TO PROTECTIVE ORDER to Qualified Expert
`
`shall be withheld pending the ruling of the Commission or the Administrative Law Judge. The
`
`terms of this paragraph shall be inapplicable to experts within the Commission or to experts from
`
`other governmental agencies who are consulted with or used by the Commission.
`
`23.
`
`Production of HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO
`
`PROTECTIVE ORDER. Source code shall be provided with the following additional
`
`protections:
`
`A.
`
`B.
`
`Any Source Code that is produced by Complainant shall be made
`available for inspection in electronic format at the [[
`]] office
`of its outside counsel, Quinn Emanuel Urquhart & Sullivan, LLP, or any
`other location mutually agreed by the Parties. Any Source Code that is
`produced by Apple Inc. will be made available for inspection at the
`[[
`]] office of its outside counsel, Fish & Richardson,
`P.C., or any other location mutually agreed by the Parties. Source Code
`will be made available for inspection between the hours of 9 a.m. and 6
`p.m. local time on business days (i.e., weekdays that are not Federal
`holidays), although the Parties will be reasonable in accommodating
`reasonable requests to conduct inspections at other times. Unless
`otherwise requested or agreed to by the Parties in advance of any
`inspection of Source Code, all Source Code produced by the Producing
`Party shall be made available simultaneously at the same review location,
`and if possible on the same Source Code Computer. For the avoidance of
`doubt, this does not require all Parties’ Source Code to be made available
`at a single, same location or on a single, same Source Code Computer.
`Prior to the first inspection of Source Code, the Receiving Party shall
`
`
`
`4
`
`

`

`C.
`
`provide seven (7) days’ notice that the Receiving Party intends to inspect
`the Source Code. The Receiving Party shall provide no fewer than
`seventy-two (72) hours’ notice prior to any subsequent inspections of
`Source Code. The foregoing first inspection notice period shall not apply
`in the event that the Producing Party makes Additional Source Code
`available during an ongoing inspection by the Receiving Party that was
`not previously produced when the Receiving Party’s inspection began—in
`which case the Producing Party will use best efforts to make the
`Additional Source Code available to the Receiving Party during the
`ongoing review or at the soonest time after the ongoing review that is
`mutually acceptable to the Parties. Permission for access outside of the
`aforementioned times will not be unreasonably withheld, in light of, and to
`accommodate for COVID-19 in-person review limitations.
`Source Code that is designated “HIGHLY CONFIDENTIAL SOURCE
`CODE SUBJECT TO PROTECTIVE ORDER” shall be produced for
`inspection and review subject to the following provisions, unless
`otherwise agreed by the Producing Party:
`i. All Source Code shall be made available by the Producing Party to the
`Receiving Party’s outside counsel and/or experts in a secure room on a
`secured computer without Internet access or network access to other
`computers and on which all access ports have been disabled (except
`for one printer port), as necessary and appropriate to prevent and
`protect against any unauthorized copying, transmission, removal or
`other transfer of any Source Code outside or away from the computer
`on which the Source Code is provided for inspection (the “Source
`Code Computer” in the “Source Code Review Room”). The
`Producing Party shall install tools that are sufficient for viewing and
`searching the code produced, on the platform produced, if such tools
`exist and are presently used in the ordinary course of the Producing
`Party’s business. The Receiving Party’s outside counsel and/or
`experts may request that commercially available software tools for
`viewing and searching Source Code be installed on the secured
`computer, provided, however, that (a) the Receiving Party possesses
`an appropriate license to such software tools; (b) the Producing Party
`approves such software tools (with approval not being unreasonably
`withheld); and (c) such other software tools are reasonably necessary
`for the Receiving Party to perform its review of the Source Code
`consistent with all of the protections herein. Such commercially
`available software tools shall not be capable of compiling, assembling,
`or building the source code and must otherwise be consistent with the
`security purposes of this Protective Order and, for example, shall not
`re-activate the secure computer’s ports, reactivate any of its wireless
`devices or capabilities, re-activate electronic or physical copying, or
`otherwise defeat the security provisions. The Receiving Party must
`provide the Producing Party with the CD or DVD containing such
`licensed software tool(s) at least five (5) business days in advance of
`
`
`
`5
`
`

`

`iii.
`
`iv.
`
`the date upon which the Receiving Party wishes to have the additional
`software tools available for use on the Source Code Computer.
`ii. No recordable media or recordable devices, including without
`limitation sound recorders, computers, cellular telephones, peripheral
`equipment, cameras, CDs, DVDs, or drives of any kind, shall be
`permitted into the Source Code Review Room.
`The Receiving Party’s outside counsel and/or experts shall be entitled
`to take notes relating to the Source Code but may not copy or include
`any portions or sections of the Source Code into the notes and may not
`take such notes electronically on the Source Code Computer itself or
`any other computer.
`The Producing Party may visually monitor the activities of the
`Receiving Party’s representatives during any Source Code review, but
`only to ensure that no unauthorized electronic records of the Source
`Code and no information concerning the Source Code are being
`created or transmitted in any way.
`v. No copies of all or any portion of the Source Code may leave the room
`in which the Source Code is inspected except as otherwise provided
`herein. Further, no other written or electronic record of the Source
`Code is permitted except as otherwise provided herein.
`a. The Producing Party shall make available a laser printer with
`commercially reasonable printing speeds for on-site printing
`during inspection of the Source Code. The Receiving Party
`may print limited portions of the Source Code that the
`Receiving Party believes in good faith are necessary to understand
`a relevant feature of an accused product.
`b. Any printed portion that consists of more than fifteen (15)
`pages of a continuous block of Source Code shall be presumed
`to be excessive, absent the agreement of the Producing Party or
`an order from the Administrative Law Judge. The burden shall
`be on the Receiving Party to demonstrate the need for such a
`printed copy of continuous block of Source Code in excess of
`the fifteen (15) page limit. The Receiving Party may print out
`no more than one-hundred and fifty (150) pages total for any
`Source Code software release (i.e., version). With respect to
`both the ten-page limit of continuous block of Source Code and
`the one-hundred-fifty-page limit of total Source Code
`referenced in this subsection, the Parties agree to meet and
`confer in good faith to resolve any dispute should it become
`evident once review of Source Code starts that these limits are
`too low. The burden to demonstrate they are too low shall
`remain with the Receiving Party. One page of printed Source
`Code shall mean one column of Source Code printed in size 12
`font on one single-sided sheet of paper, measuring 8 and 1/2
`
`
`
`6
`
`

`

`inches by 11 inches. The Receiving Party shall not print
`Source Code in order to review blocks of Source Code
`elsewhere in the first instance, i.e., as an alternative to
`reviewing that Source Code electronically on the Source Code
`Computer, as the Parties acknowledge and agree that the
`purpose of the protections herein would be frustrated by
`printing portions of code for review and analysis elsewhere,
`and that printing is permitted only when necessary to prepare
`court filings or pleadings or other papers (including a testifying
`expert’s expert report). Upon printing any such portions of
`Source Code, the printed pages shall be collected by the
`Producing Party. The Producing Party shall Bates number,
`copy, and label “HIGHLY CONFIDENTIAL SOURCE CODE
`SUBJECT TO PROTECTIVE ORDER” any pages printed by
`the Receiving Party. Within three (3) business days, the
`Producing Party shall either (i) provide one (1) hard copy set of
`such pages to the Receiving Party or (ii) inform the Receiving
`Party that it objects because the printed portions are excessive
`and/or not done for a permitted purpose. The Producing Party
`and Receiving Party agree to meet and confer within two (2)
`business days of service of the Producing Party’s objection to
`attempt to resolve such objection. If the Supplier and Receiving
`Party cannot resolve such objection during this meet and
`confer, the Receiving Party may file a motion to compel the
`production of the requested Source Code. The burden shall be
`on the Receiving Party to demonstrate that such printed
`portions are no more than is reasonably necessary for a
`permitted purpose and not merely printed for the purposes of
`review and analysis elsewhere. The printed pages shall
`constitute part of the Source Code produced by the Producing
`Party in this action.
`c. During the review of Source Code, if the Receiving Party believes
`in good faith that contemporaneous access to print-outs of
`particular pages of the Source Code is necessary to further the
`Source Code review, the Receiving Party may request and the
`Producing Party shall promptly provide one (1) hard copy print
`out of such pages. All printed copies of such Source Code shall
`be returned to the supplying party after such contemporaneous
`access by the Receiving Party, and at a minimum at the end of
`each day of source code review. The Receiving Party shall limit
`its requests for contemporaneous access to printouts to those
`pages actually necessary to conduct the Source Code review.
`Further, the limits of Section 23(C)(v)(b) of this addendum shall
`apply to this provision also for purposes of printing on any given
`day. For the avoidance of doubt, printing under this Section
`23(C)(v)(c) shall not apply to the production limit of one-
`hundred-fifty (150) pages total for printed source code under
`
`
`
`7
`
`

`

`Section 23(C)(v)(b).
`vi. All persons who will review a Producing Party’s Source Code on
`behalf of a Receiving Party, including members of a Receiving Party’s
`outside law firm and Qualified Experts, shall be identified in writing to
`the Producing Party at least five (5) days in advance of the first time
`that such person reviews such Source Code. Such identification shall
`be in addition to any other disclosure required under this Order. All
`persons viewing Source Code shall sign on each day they view Source
`Code a log that will include the names of persons who enter the locked
`room to view the Source Code and when they enter and depart. The
`Producing Party shall be entitled to a copy of the log upon one (1)
`business day’s advance notice to the Receiving Party.
`vii. Unless otherwise agreed in advance by the Parties in writing,
`following each day on which inspection is done under this Order, the
`Receiving Party’s outside counsel and/or experts shall remove all
`notes, documents, and all other materials from the Source Code
`Review Room. The Producing Party shall not be responsible for any
`items left in the room following each inspection session, and the
`Receiving Party shall have no expectation of confidentiality for any
`items left in the room following each inspection session without a
`prior agreement to that effect. Proper identification of all authorized
`persons shall be provided prior to any access to the secure room or the
`computer containing Source Code. Proper identification requires
`showing, at a minimum, a photo identification card sanctioned by the
`government of any State of the United States, by the government of
`the United States, or by the nation state of the authorized person’s
`current citizenship. Access to the secure room or the Source Code
`Computer may be denied, at the discretion of the supplier, to any
`individual who fails to provide proper identification.
`viii. Other than as provided above, the Receiving Party will not copy,
`remove, or otherwise transfer any Source Code from the Source Code
`Computer including, without limitation, copying, removing, or
`transferring the Source Code onto any recordable media or recordable
`device. The Receiving Party will not transmit any Source Code in any
`way from the Producing Party’s facilities or the offices of its outside
`counsel of record.
`The Receiving Party’s outside counsel of record may make no more
`than three (3) additional paper copies of any portions of the Source
`Code received from a Producing Party pursuant to Paragraph 23(C)(v),
`not including copies attached to court filings, used at depositions, or
`provided to the Commission Investigative Staff, and shall maintain a
`log of all paper copies of the Source Code. The log shall include the
`names of the reviewers and/or recipients of paper copies and locations
`where the paper copies are stored. Upon one (1) business day’s
`advance notice to the Receiving Party by the Producing Party, the
`
`ix.
`
`
`
`8
`
`

`

`xii.
`
`xi.
`
`Receiving Party shall provide a copy of this log to the Producing
`Party.
`x. An additional one (1) copy of printed Source Code received from a
`Producing Party pursuant to Paragraph 23(C)(v) shall be provided by
`the Producing Party to the Commission Investigative Staff upon
`request.
`The Receiving Party’s outside counsel of record and any person
`receiving a copy of any Source Code shall maintain and store any
`paper copies of the Source Code at their offices in a manner that
`prevents duplication of or unauthorized access to the Source Code,
`including, without limitation, storing the Source Code in a locked
`room or cabinet at all times when it is not in use. The Receiving Party
`shall limit access to any printed portions of the source code to “Source
`Code Qualified Persons” and defined above by paragraph 20 of this
`source code protective order.
`Except as provided in this sub-paragraph, absent express written
`permission from the Producing Party, the Receiving Party may not
`create electronic images, or any other images, or make electronic
`copies, of the Source Code from any paper copy of Source Code for
`use in any manner (including by way of example only, the Receiving
`Party may not scan the Source Code to a PDF or photograph the code).
`Images or copies of Source Code shall not be included in
`correspondence between the Parties (references to production numbers
`shall be used instead), and shall be omitted from pleadings and other
`papers whenever possible. If a Party reasonably believes that it needs
`to submit a portion of Source Code as part of a filing with the Court,
`the Parties shall meet and confer as to how to make such a filing while
`protecting the confidentiality of the Source Code and such Source
`Code will not be filed absent agreement from the Producing Party that
`the confidentiality protections will be adequate. If a Producing Party
`agrees to produce an electronic copy of all or any portion of its Source
`Code or provide written permission to the Receiving Party that an
`electronic or any other copy needs to be made for a Court filing, access
`to the Receiving Party’s submission, communication, and/or disclosure
`of electronic files or other materials containing any portion of Source
`Code (paper or electronic) shall at all times be limited solely to
`individuals who are expressly authorized to view Source Code under
`the provisions of this Order. Where the Producing Party has provided
`the express written permission required under this provision for a
`Receiving Party to create electronic copies of Source Code, the
`Receiving Party shall maintain a log of all such electronic copies of
`any portion of Source Code in its possession or in the possession of its
`retained consultants, including the names of the reviewers and/or
`recipients of any such electronic copies, and the locations and manner
`in which the electronic copies are stored. Additionally, any such
`
`
`
`9
`
`

`

`electronic copies must be labeled “HIGHLY CONFIDENTIAL
`SOURCE CODE SUBJECT TO PROTECTIVE ORDER” as provided
`for in this Order.
`Use of HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO
`
`24.
`
`PROTECTIVE ORDER.
`
`C.
`
`B.
`
`A. Where absolutely necessary in connection with a filing or expert report, or where
`required by the Administrative Law Judge, a Receiving Party may make only as
`many copies, and only of the specific pages, as needed for submission of original
`Source Code printouts to be included in confidential pleadings, infringement
`contentions, expert reports, and/or witness statements, where such pleadings,
`infringement contentions, expert reports, and/or witness statements are designated
`HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO PROTECTIVE
`ORDER. If a Producing Party’s Source Code is quoted or set forth in a
`confidential pleading, infringement contentions, expert report, and/or witness
`statement, the Receiving Party will limit the amount of such Source Code to what
`is reasonably necessary for the Receiving Party to make its point.
`For depositions, a Receiving Party may, on reasonable notice, request that
`Producing Party provide at the deposition an electronic copy of Producing Party
`Source Code that it made available for inspection. The computer upon which the
`Source Code is made available at the deposition shall include appropriate
`software analysis tools as discussed in Paragraph 23.
`A Party that wishes to use any printed copies of Producing Party’s Source Code at
`a deposition or at a hearing may not make copies of the material for this purpose
`without Producing Party’s prior written consent. Absent such consent, the Party
`must provide Producing Party with five (5) business days’ advance notice of its
`need for printed copies and identify the required pages by production number.
`Producing Party will then either authorize the Party to prepare copies for use in
`the deposition or hearing or agree to supply copies itself on the day of the
`deposition or hearing. At the conclusion of the deposition or hearing, the copies
`will be returned to Producing Party or destroyed. Copies will not be attached to
`any deposition transcripts. Any copies prepared for use at a hearing that are not
`admitted into evidence shall be destroyed or returned to Producing Party. The
`entire transcript of any deposition at which Producing Party’s Source Code is
`disclosed will be treated as designated HIGHLY CONFIDENTIAL SOURCE
`CODE SUBJECT TO PROTECTIVE ORDER for thirty (30) days. During that
`period, Producing Party may designate any portion of the deposition transcript as
`HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO PROTECTIVE
`ORDER by giving written notice to the reporter and all parties. The court
`reporter shall separately bind and label transcript pages that Producing Party
`designates as HIGHLY CONFIDENTIAL SOURCE CODE SUBJECT TO
`PROTECTIVE ORDER. Any portions that the Party does not designate during
`that 30-day period will then be treated as CONFIDENTIAL BUSINESS
`INFORMATION SUBJECT TO PROTECTIVE ORDER.
`
`
`
`10
`
`

`

`D.
`
`E.
`
`A Receiving Party’s Outside Counsel of Record will maintain the delivered copy
`sets of the Source Code in a locked location at the office(s) of Outside Counsel of
`Record to which they were delivered and where they will not be accessible to
`persons other than SOURCE CODE QUALIFIED PERSONS. No copy set will
`be removed from the location to which it was delivered without prior approval
`from Producing Party. In addition to other reasonable steps to maintain the
`security and confidentiality of Producing Party’s Source Code, printed copies of
`the Source Code maintained by the Receiving Party must be kept in a locked
`storage container when not being actively reviewed.
`The Receiving Party’s Counsel of Record shall keep a log that records the identity
`of each SOURCE CODE QUALIFIED PERSON to whom each hard copy of the
`Source Code is provided and when it was provided to that person. Within thirty
`(30) days after the issuance of a final, non-appealable decision resolving all issues
`in the Investigation, upon request, the Receiving Party must serve upon Producing
`Party the log. In addition, any Outside Consultants of the Receiving Party with
`whom the paper copies of the Source Code were shared must certify in writing
`that all copies of the Source Code that was shared with them at the offices of
`Outside Counsel were retained by the counsel, who provided them the
`information, and that the Outside Consultants will make no use of the Source
`Code or of any knowledge gained from the Source Code in any future endeavor.
`The Commission Investigative Staff shall have the right to review material
`produced in this Investigation in the same manner that such material is made
`available to any private party.
`Secure Storage, No Export. Source Code must be stored and maintained at a
`location in the United States and in a secure manner that ensures that access is
`limited to the persons authorized under this Order. To ensure compliance with
`applicable United States Export Administration Regulations, source code may not
`be exported outside the United States or released to any foreign national (even if
`within the United States).
`H. Within sixty (60) calendar days after the determination in this Investigation
`becomes final (as is understood in 28 U.S.C. § 1659(a)), the Receiving Party must
`serve upon the Producing Party a certification of the destruction of all copies of
`the Producing Party’s Source Code. Any copies of Source Code shall be
`destroyed using a secure shredder that will prevent access to the materials by non-
`SOURCE CODE QUALIFIED PERSONS. The shredded materials shall be
`disposed of in a manner that will preserve the confidentiality of the contents
`consistent with this Protective Order. The destruction of Producing Party’s
`Source Code shall be conducted by SOURCE CODE QUALIFIED PERSONS
`only.
`Access to and review of Source Code shall be strictly for the purpose of
`investigating the claims and defenses at issue in the above-styled case. No person
`shall review or analyze any Source Code for purposes unrelated to this case, nor
`may any person use any knowledge gained as a result of reviewing Source Code
`
`F.
`
`G.
`
`I.
`
`
`
`11
`
`

`

`in this Investigation in any other pending or future dispute, proceeding, or
`litigation.
`No prejudice. The Private Parties agree that seeking entry and entry of this
`
`25.
`
`Protective Order Addendum are without prejudice to any party’s rights to seek relief from these
`
`provisions relating to Source Code production, or to propose, request, or otherwise move for
`
`different provisions relating to Source Code production, in this or any other litigation.
`
`26.
`
`This Protective Order Addendum shall not diminish any existing restriction with
`
`respect to CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE
`
`ORDER, as defined in paragraph 2 of the Protective Order. The Private Parties acknowledge and
`
`agree that this Protective Order Addendum is a supplement to the Protective Order entered in this
`
`action on May 26, 2021. The Protective Order applies to all material designated pursuant to this
`
`Protective Order Addendum. To the extent that there is any confusion or conflict between
`
`protect

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket