`§
`§
`§
`§
`§
`§
`§
`§
`§
`§
`
`JOINT MOTION FOR ENTRY OF OPPOSED PROTECTIVE ORDER
`
`
`APPLE INC.,
`
`
`v.
`
`Defendant.
`
`
`
`
`
`
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 1 of 16 PageID #: 607
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`
`QUEST NETTECH CORPORATION,
`
`
`Plaintiff,
`
`
`Case No. 2:19-cv-00118-JRG
`
`
`JURY TRIAL DEMANDED
`
`Plaintiff Quest NetTech Corporation (“NetTech”) and Defendant Apple, Inc. (“Apple”)
`
`hereby file this Joint Motion seeking entry of a Protective Order. The Parties have met and
`
`conferred and have agreed to all aspects of the protective order except for two issues:
`
`(1) whether outside counsel who are competitive decision-makers should be barred from
`
`having access to competitively-sensitive Protected Material; and
`
`(2) whether outside counsel who receive Protected Material should be subject to a patent
`
`acquisition bar.
`
`NetTech’s proposed Protective Order is attached hereto as Exhibit A, Apple’s proposed
`
`Protective Order is attached hereto as Exhibit B, and a redline showing the differences between
`
`the two is attached hereto as Exhibit C.
`
`I.
`
`Issue 1: Competitive Decisionmaker Issues (Protective Order ¶¶ 12, 13(f))
`
`Plaintiff’s Proposal
`
`Defendant’s Proposal
`
`12. For Protected Material designated
`RESTRICTED - ATTORNEYS’ EYES
`ONLY, access to, and disclosure of, such
`
`
`12. For Protected Material designated
`RESTRICTED - ATTORNEYS’ EYES
`ONLY, access to, and disclosure of, such
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 2 of 16 PageID #: 608
`
`
`Plaintiff’s Proposal
`Protected Material shall be limited to:
`individuals listed in paragraphs 8(a-b), 8(e-g)
`and 8(i-j), provided, however, that access by
`individuals pursuant to paragraph 8(b, e) be
`limited to individuals who exercise no
`competitive decision- making authority on
`behalf of the client . . .
`[Paragraph 8(a), removed from Plaintiff’s
`proposal and present in Defendant’s proposal,
`is “outside counsel of record in this Action for
`the Parties”]
`
`Defendant’s Proposal
`Protected Material shall be limited to:
`individuals listed in paragraphs 8(a-b), 8(e-g)
`and 8(i-j), provided, however, that access by
`individuals pursuant to paragraph 8(a-b, e)
`be limited to individuals who exercise no
`competitive decision- making authority on
`behalf of the client . . .
`[Paragraph 8(a), removed from Plaintiff’s
`proposal and present in Defendant’s
`proposal, is “outside counsel of record in this
`Action for the Parties”]
`
`13(f) Access to Protected Material
`designated RESTRICTED CONFIDENTIAL
`- SOURCE CODE shall be limited to (i)
`outside counsel; (ii) up to three (3) outside
`consultants or experts (i.e., not existing
`employees or affiliates of a Party or an affiliate
`of a Party) retained for the purpose of this
`litigation and approved to access such
`Protected Materials pursuant to paragraph 7
`above; (iii) Court reporters, stenographers and
`videographers retained to record testimony
`taken in this action; (iv) the Court (including
`any Court-appointed mediators or advisors)
`and its personnel; and (v) any other person
`with the prior written consent of the producing
`Party.
`
`13(f) Access to Protected Material
`designated RESTRICTED CONFIDENTIAL
`- SOURCE CODE shall be limited to (i)
`outside counsel provided that such Outside
`Counsel be limited to outside counsel who
`exercise no competitive decision-making
`authority, as defined by U.S. Steel v. United
`States, 730 F.2d 1465, 1468 n.3 (Fed. Cir.
`1984), on behalf of the client; (ii) up to three
`(3) outside consultants or experts (i.e., not
`existing employees or affiliates of a Party or
`an affiliate of a Party) retained for the
`purpose of this litigation and approved to
`access such Protected Materials pursuant to
`paragraph 8 above; (iii) Court reporters,
`stenographers and videographers retained to
`record testimony taken in this action; (iv) the
`Court (including any Court-appointed
`mediators or advisors) and its personnel; and
`(v) any other person with the prior written
`consent of the producing Party.
`
`
`
`Plaintiff’s Statement
`
`Defendant seeks a clause prohibiting outside counsel from viewing its protected
`
`information if that counsel is involved in “competitive decisionmaking,” in a departure from the
`
`model order that has serious and wide-ranging consequences. Such a requirement has the
`
`potential to serve as a disqualification of outside counsel, and should be rejected for several
`
`2
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 3 of 16 PageID #: 609
`
`
`reasons.1 First, limiting disclosure of information to those in non-competitive decisionmaker
`
`roles is typically done in the context of in-house counsel, not outside counsel. U.S. Steel Corp. v.
`
`United States, 730 F.2d 1465, 1468 (Fed. Cir. 1984). Second, outside counsel is already
`
`restricted by the prosecution bar and the other requirements of the protective order in receiving,
`
`handling, and using Apple's protected information. A complete bar on outside counsel's ability
`
`to view Apple's source code, including for the purposes of litigating this case, is a drastic
`
`measure considering the other protections in the protective order and that Apple's perceived
`
`harms are speculative at best. See PACid Group, LLC v. Apple, Inc., No. 6;09-cv-143, 2010 WL
`
`10094684, at *4 (E.D. Tex. Feb. 19, 2010) (finding absence of good cause for protective order
`
`restricting access to confidential materials by plaintiff's counsel, because a “reason to believe”
`
`that outside counsel was a competitive decisionmaker "cannot be the basis for restricting an
`
`ongoing attorney-client relationship.") (emphasis added). Here, like in PACid, Apple has not
`
`met its burden in showing the propriety of such a provision.
`
`Should the Court disagree, Plaintiff requests that outside counsel who are competitive
`
`decisionmakers only be disallowed from conducting the source code review (e.g., restricted from
`
`having access to Apple's native source code files), but not be restricted from viewing Apple
`
`source code that is used in expert reports, pleadings, motions, and at trial. Such a provision
`
`would protect the overwhelming majority of Apple's source code without impacting outside
`
`counsel's ability to litigate this case.
`
`
`
`
`
`1 Plaintiff does not concede that any of its outside counsel are, have been, or will be its
`competitive decisionmakers. Rather, Plaintiff opposes this addition out of an abundance of
`caution and to prevent further motions practice regarding its outside counsel's activities which
`could be used to harass, and also interfere with the attorney client relationship.
`
`3
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 4 of 16 PageID #: 610
`
`
`Defendant’s Statement
`
`NetTech’s outside counsel should not be allowed to use Apple’s source code and other
`
`highly confidential information to help NetTech make business decisions. NetTech’s proposal
`
`would, for example, permit its counsel to advise NetTech on additional, unrelated patents that it
`
`could acquire to assert against Apple. Such a use of confidential information is indisputably
`
`improper and contrary to the very purpose of a Protective Order, which is universally well-
`
`established in this and other courts. Yet that is precisely what NetTech’s proposals would allow,
`
`especially when considering that NetTech alarmingly also opposes a patent acquisition bar.
`
`Such a result is manifestly unfair and prejudicial to Apple and should not be countenanced.
`
`The provision Apple requests is routinely entered in patent cases like this one. See, e.g.,
`
`AGIS Software Development LLC v. Apple Inc., No. 17-cv-00516-JRG, Dkt. 51 (E.D. Tex. Oct.
`
`26, 2017) (containing provisions substantially identical to those proposed by Apple here); Uniloc
`
`USA, Inc. v. Samsung Elecs. Am., Inc., No. 2:18-CV-00040, Protective Order (Dkt. No. 38) at 12
`
`(E.D. Tex. May 30, 2018); Smartflash LLC v. Apple, Inc., et al., No. 6:13-CV-447, Revised
`
`Agreed Protective Order (Dkt. No. 176) at 4, 11-12, 13-14 (E.D. Tex. Jul. 10, 2014);
`
`ContentGuard Holdings, Inc. v. Amazon.com, Inc., et al., No. 2:13-CV-01112, Am. Protective
`
`Order (Dkt. No. 152) at 13-15 (E.D. Tex. Jun. 6, 2014); Personal Audio, LLC v. Apple Inc., et
`
`al., No. 9:09-CV-00111, Protective Order (Dkt. No. 118) at 10-14 (E.D. Tex. May 6, 2010);
`
`Online News Link LLC v. Apple Inc., et al., No. 2:09-CV-312, Agreed Protective Order (Dkt. No.
`
`86) at 10-11 (E.D. Tex. Apr. 8, 2010).
`
`The policy reasons for restricting access to highly sensitive litigation materials to
`
`opposing counsel (whether outside counsel or in-house counsel) that are not competitive decision
`
`4
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 5 of 16 PageID #: 611
`
`
`makers2 are well-established. See, e.g., ST Sales Tech Holdings, LLC v. Daimler Chrysler Co.,
`
`No. 6:07-CV-346, 2008 WL 5634214, *8 (E.D. Tex. Mar. 14, 2008) (hereinafter “ST Sales
`
`Tech”) (“Defendants would ultimately be at a high risk of continued litigation [due to inadvertent
`
`disclosure or use]”). Indeed, in tacit acknowledgement of these policy considerations, NetTech
`
`does not dispute that “outside consultants or experts” who are competitive decision makers for
`
`NetTech cannot access discovery materials designated “RESTRICTED - ATTORNEYS’ EYES
`
`ONLY” or “RESTRICTED CONFIDENTIAL SOURCE CODE.” The result should be no
`
`different for NetTech’s outside counsel.
`
`Concerning the facts of this case, NetTech publicly admits in its annual report as recently
`
`as April 16, 2019 that its business model is acquiring patents for licensing and assertion, which
`
`confirms that the heightened protections proposed by Apple are necessary and critical in this case
`
`specifically. See ST Sales Tech, 2008 WL 5634214, at *7; see also Infosint S.A. v. H. Lundbeck
`
`A.S., et al., No. 06-CIV-2869, 2007 WL 1467784, at *4-5 (S.D.N.Y. May 16, 2007) (preventing
`
`patent assertion entity’s outside counsel from accessing confidential materials, as he performed
`
`competitive decision-making by counseling the entity for years “based on his scientific and legal
`
`expertise”); NetTech’s Annual Report (Dkt. 20-3) at 1 (“Our principal operations include the
`
`development, acquisition, licensing and enforcement of intellectual property rights”).
`
`Indeed, the risks of harm to Apple—even through inadvertent use of Apple’s
`
`information—are acute given NetTech’s litigation history of filing more than 40 patent cases in
`
`the last six years and the fact that NetTech’s outside counsel have represented other plaintiffs
`
`against Apple. See AGIS Software Development LLC v. Apple, Inc., No. 17-cv-00516-JRG, Dkt.
`
`
`
`2 At NetTech’s suggestion, Apple added the reference to the U.S. Steel case to provide clarity regarding the criteria
`used for determining who is a competitive decision maker.
`
`5
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 6 of 16 PageID #: 612
`
`
`1 (E.D. Tex., June 21, 2017) (listing same law firm and attorneys as this case). Notably, in the
`
`AGIS case, the same opposing counsel that represent NetTech here stipulated to the very
`
`provision Apple is currently proposing, which underscores the reasonableness (and importance)
`
`of the protection Apple is requesting. Id. NetTech is a non-practicing entity with very few
`
`employees (see https://www.qprc.com/about-quest), which leaves it to rely heavily on outside
`
`counsel for legal and business advice, with counsel’s role likely going “well-beyond the typical
`
`role of outside counsel, even [when compared with] outside counsel who might work with an
`
`entity for years.” ST Sales Tech, 2008 WL 5634214, at *7-8.
`
`In situations like these, where the plaintiff’s business model revolves entirely around
`
`acquiring, enforcing, and licensing patents, “it is difficult to argue that [outside counsel], who is
`
`so heavily involved in these aspects of the business, is somehow not a competitive
`
`decisionmaker.” Id. at *5. Indeed, although NetTech and Apple might not be competitors in the
`
`traditional sense, they nevertheless both “seek to utilize, in one manner or another, intellectual
`
`property as part of a business model for pecuniary gain.” Id. at 6. They are “competitors for the
`
`rights to use the accused systems,” id., and outside counsel who qualify as Plaintiff’s competitive
`
`decisionmakers should be barred from access to Apple’s source code and other sensitive,
`
`confidential materials.
`
`The harm to Apple does not require that NetTech’s counsel intentionally use Apple’s
`
`confidential information outside the context of this litigation; rather, it can occur through
`
`inadvertent disclosure or use. Indeed, courts have long recognized that “[i]t is very difficult for
`
`the human mind to compartmentalize and selectively suppress information once learned, no
`
`matter how well-intentioned the effort may be to do so.” In re Deutsche Bank Trust Co. Ams.,
`
`605 F.3d 1373, 1378 (Fed. Cir. 2010); see also ST Sales Tech, 2008 WL 5634214, at *5 (“Courts
`
`6
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 7 of 16 PageID #: 613
`
`
`have continuously determined that attempting to compartmentalize knowledge is an exercise in
`
`futility.”).
`
`NetTech’s argument is that it would be prejudiced if its outside counsel could not see
`
`Apple’s source code or other highly-confidential material. But this is a red herring since
`
`NetTech’s outside counsel firm has several attorneys, so it can preclude those attorneys who
`
`review Protected Materials from participating in competitive decision-making and conversely
`
`screen those who are competitive decision makers from reviewing Protected Material. See
`
`Notices of Attorney Appearances (Dkt. 7-10) (showing at least 4 attorneys of record for
`
`NetTech). Indeed, in similar circumstances, courts have rejected this same argument. See ST
`
`Sales Tech, 2008 WL 5634214, at *7-8 (“While the Court notes that Plaintiff will be harmed by
`
`having one of its counsel screened from accessing certain information in the case, that harm is
`
`minor compared to the risk of continued harm to Defendants since [plaintiff] has other highly
`
`competent attorneys that have been involved since the beginning of the case.”); see also Infosint,
`
`2007 WL 1467784, at *5 (“While [plaintiff’s] desire to have its trusted [outside] counsel
`
`involved in the litigation is understandable, [defendant’s] desire to keep its proprietary
`
`information protected is a superior interest.”).
`
`To prevent NetTech and its counsel from using Apple’s source code and other highly
`
`confidential information for inappropriate purposes, Apple proposes that access to such
`
`information be limited to NetTech’s outside counsel who are not involved in competitive
`
`decision-making. As noted above, similar provisions have appeared in other protective orders in
`
`this district. Without such provisions, NetTech’s outside counsel who are involved in
`
`competitive decision-making could review Apple’s proprietary materials and use that knowledge
`
`7
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 8 of 16 PageID #: 614
`
`
`– deliberately or accidentally – to advise NetTech on competitive issues, such as patent
`
`monetization or acquisition strategies. This is simply too great a risk for Apple.
`
`
`
`II.
`
`Issue 2: Acquisition Bar (Protective Order ¶ 14)
`
`Plaintiff’s Proposal
`
`Defendant’s Proposal
`
`[None]
`
`Absent written consent by the
`14.
`producing Party, any attorney representing a
`Party, whether in-house or outside counsel, and
`any person associated with a Party and
`permitted to receive the other Party’s Protected
`Material that is designated RESTRICTED --
`ATTORNEYS’ EYES ONLY and/or
`RESTRICTED CONFIDENTIAL SOURCE
`CODE (collectively “HIGHLY SENSITIVE
`MATERIAL”), who obtains, receives, or
`otherwise learns of, in whole or in part, the
`other Party’s HIGHLY SENSITIVE
`MATERIAL of a technical nature under this
`Order shall not: … (ii) be involved in the
`acquisition of patents (including patent
`applications), or the rights to any such
`patents or patent applications with the right to
`sublicense, for assertion against or licensing
`to a Party, pertaining to the field of invention
`of the patent-in-suit on behalf of the receiving
`Party or its acquirer, successor, predecessor,
`or affiliate during the pendency of this Action
`and for 18-months after its conclusion,
`including any appeals, except with respect to
`the acquisition, licensing, or any other
`transaction involving the patent-in-suit
`and/or all patents and patent applications
`related thereto.
`
`
`
`Plaintiff’s Statement
`
`In addition to the agreed-upon prosecution bar, Defendant also seeks the addition of a
`
`non-standard acquisition bar that would prevent outside counsel in this case from any
`
`8
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 9 of 16 PageID #: 615
`
`
`involvement in the acquisition of patents in the pertinent field of technology. Such a provision is
`
`not in the model protective order for good reason. It is Apple’s burden to show that such a bar is
`
`warranted, and Apple cannot to do so. A party seeking a bar must show (1) that the risk of
`
`inadvertent disclosure exists; and (2) that the balance of interests suggests a bar is appropriate.
`
`In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373, 1378 (Fed. Cir. 2010).3
`
`First, Apple cannot show a risk of inadvertent disclosure because none exists. The
`
`plaintiff's status as an NPE similarly does not support handicapping the plaintiff with such a bar.
`
`Garnet Digital, LLC v. Apple, Inc., et al., Civ. No. 6:11-cv-647-LED, Dkt. 374 (E.D. Tex. Sept.
`
`20, 2012) (citing In re Deutsche Bank, 605 F.3d at 1378). Because Apple cannot make a
`
`showing of any risk of inadvertent disclosure, and thus its proposed acquisition bar is not
`
`appropriate.
`
`Second, in balancing the interests of both parties, courts have denied acquisition bars
`
`because they are burdensome to plaintiffs. Sol IP, LLC v. AT&T Mobility LLC, 2:18-cv-0526-
`
`RWS-RSP, Dkt. 129 (E.D. Tex. May 29, 2019) (“[I]n light of the broad scope of activities
`
`covered by the requested acquisition bar and its extended duration, the balance of interests
`
`supports that the proposed acquisition bar is not appropriate.”). Here, such a restriction would
`
`burden Plaintiff’s counsel as well, as such counsel would be unnecessarily bound by the
`
`Protective Order’s restrictions based on nothing but conjecture. Plaintiff’s counsel has already
`
`agreed to be bound by an 18-month prosecution bar, longer than the typical one year. Yet Apple
`
`
`
`3 In this District, prosecution bars and acquisition bars are both analyzed under the In re
`Deutsche Bank framework. See E-Contact Techs., LLC v. Apple, Inc., No. 1:11-CV-426-LED-
`KFG, 2012 WL 11924448, at *1 (E.D. Tex. June 19, 2012)
`
`9
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 10 of 16 PageID #: 616
`
`
`also insists on further handicaps to Plaintiff’s counsel in the form of a burdensome and wide-
`
`ranging acquisition bar.
`
`That outside counsel in this case previously agreed to an acquisition bar for a different
`
`client is unavailing. First, Quest Nettech is a separate client and should not be bound by
`
`decisions it had no involvement in making in cases where it was not a party. Second, one of
`
`Brown Rudnick's other clients, AGIS Software, was not and is not a patent acquisition entity,
`
`whereas Quest Nettech is regularly involved in the acquisition of patents and such a bar would
`
`likely have a material impact on its business.
`
`Should the Court disagree with Plaintiff, it requests a narrow acquisition bar that applies
`
`to patents in the field of the patent-in-suit and is limited only to the activities of Quest Nettech
`
`(rather than all of its related entities and affiliates) against only Apple. Plaintiff also requests
`
`that such a bar be limited to a time period of 1 year after the conclusion of this action.
`
`Defendant’s Statement
`
`NetTech should not be allowed to use Apple’s source code (or other highly confidential
`
`information) to acquire additional patents to assert against Apple. Yet that is precisely what
`
`NetTech’s proposal would allow. Such a result is manifestly unjust and prejudicial to Apple and
`
`should not be allowed.
`
`By agreeing to a patent prosecution bar, NetTech has tacitly acknowledged the possibility
`
`of inadvertent disclosure or use of Apple’s confidential information, and has offered no reasoned
`
`explanation for why Apple would not suffer the same or similar harms without an acquisition
`
`bar. See E-Contact Techs. LLC v. Apple Inc., No. 1:11-CV-00426, 2012 U.S. Dist. LEXIS
`
`190475, at *8-9 (E.D. Tex. Jun. 19, 2012) (finding that by acquiescing to prosecution bar,
`
`plaintiff’s counsel “apparently agree[d]” that there might be a risk of inadvertent disclosure of
`
`10
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 11 of 16 PageID #: 617
`
`
`Apple’s confidential information: “it is hard to conceive that there would be little or no risk of
`
`inadvertent disclosure when these same attorneys advise their client in matters regarding
`
`acquisitions of patents.”); see also Keranos LLC v. Analog Devices, No. 2:10-cv-207, 2012 U.S.
`
`Dist. LEXIS 191605, at *21 (E.D. Tex. Sept. 28, 2012) (“The use of Defendant’s AEO and
`
`Confidential Source Code Information poses an equally high risk to defendants in the context of
`
`patent acquisition as it does in the patent prosecution context”).
`
`Apple proposes a narrowly tailored patent acquisition bar that is limited in time, scope,
`
`and subject matter, which appropriately balances NetTech’s need to litigate the current case and
`
`Apple’s need to protect against inadvertent or improper use of its highly-confidential information
`
`(including source code) for use in acquiring other patents for licensing or litigation against
`
`Apple. Here, the plaintiff NetTech is a non-practicing entity whose sole business is monetizing
`
`patents, including through dozens of lawsuits as discussed above. In circumstances such as
`
`these, courts regularly impose patent acquisition bars, including bars that are broader than that
`
`proposed by Apple. See, e.g., AGIS Software Development LLC v. Apple Inc., No. 17-cv-00516-
`
`JRG, Dkt. 51 (E.D. Tex. Oct. 26, 2017) (containing provisions substantially identical to those
`
`proposed by Apple here); E-Contact Techs., 2012 U.S. Dist. LEXIS 190475, at *6-13, and
`
`associated Protective Order (Dkt. No. 351) at 16-17 (Jul. 5, 2012) (imposing three-year bar on
`
`acquisitions relating to the “functionality, operation, and design” of five technologies, as well as
`
`their “related functionalities,” over plaintiff’s objections); ContentGuard Holdings, Inc. v.
`
`Amazon.com, Inc., et al., No. 2:13-cv-1112, Am. Protective Order (Dkt. No. 152) at 22, 26 (E.D.
`
`Tex. Jun. 6, 2014); Mobile Telecomms. Techs., LLC v. ZTE (USA) Inc., No. 2:13-CV-00946,
`
`Supplemental Protective Order (Dkt. No. 74) at 3-4 (E.D. Tex. Nov. 12, 2015); Mobile
`
`Telecomms. Techs., LLC v. HTC Am., Inc., No. 2:13-CV-00948, Supplemental Protective Order
`
`11
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 12 of 16 PageID #: 618
`
`
`(Dkt. No. 74) at 3-4 (E.D. Tex. Nov. 12, 2015); and Long Corner Consumer Elecs. LLC v. Acer
`
`Am. Corp., et al., No. 2:13-CV-00998, Protective Order (Dkt. No. 77) at 10-12 (E.D. Tex. Jun. 5,
`
`2014).
`
`In particular, Apple proposes that the protective order include an 18-month patent
`
`acquisition bar, which would prohibit NetTech’s (or Apple’s) representatives who receive
`
`information from the opposing party designated “RESTRICTED - ATTORNEYS’ EYES
`
`ONLY” or “RESTRICTED CONFIDENTIAL SOURCE CODE” in this case from acquiring
`
`patents (including patent applications) pertaining to the field of the invention, or the rights to any
`
`such patents or applications with the right to sublicense, for assertion against or licensing to the
`
`opposing party.
`
`Apple’s proposed 18-month time period is reasonable and shorter than other disputed
`
`acquisition bars that have been entered in this district. See, e.g., Hyundai Motor Am. v. Clear
`
`with Computers LLC, No. 6:08-CV-302, 2009 U.S. Dist. LEXIS 132160, at *12-13 (E.D. Tex.
`
`May 11, 2009) (imposing two-year acquisition bar); Karamelion LLC v. ADT LLC, No. 2:18-cv-
`
`00330-JRG, Order on Protective Order (Dkt. No. 36) at 5 (Jan. 24, 2019) (imposing two-year
`
`prosecution bar). Indeed, NetTech has agreed to an 18-month prosecution bar and has offered no
`
`justification for why the same time period should not apply to patent acquisitions.
`
`Apple has carefully tailored the proposed acquisition bar to cover only individuals who
`
`receive information designated “RESTRICTED -- ATTORNEYS’ EYES ONLY” or
`
`“RESTRICTED CONFIDENTIAL SOURCE CODE,” similarly to Long Corner. See Opposed
`
`Mot. for Entry of Protective Order at 11-13 (Dkt. 76) (Jun. 3, 2014) and associated Protective
`
`Order (Dkt. 77) at 10-11 (Jun. 5, 2014).
`
`12
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 13 of 16 PageID #: 619
`
`
`In requesting this acquisition bar Apple has taken into account the “quantity and
`
`sensitivity” of its confidential and proprietary information by still allowing NetTech to acquire
`
`patents for licensing against non-parties, or even against Apple, if the patents are in a different
`
`field of endeavor. See Karamelion, Order on Protective Order at 5 (finding that “quantity and
`
`sensitivity” of Defendants’ confidential information warranted a two-year prosecution bar
`
`against Plaintiff, who maintained an “acquir[e] and assert[]” patent strategy).
`
`The sole Asserted Patent in this case has long since expired, with the total damages
`
`period spanning less than one year. This fact alone raises a concern that NetTech is seeking
`
`Apple’s highly confidential and proprietary technology so it can acquire additional patents to
`
`assert against Apple. This is precisely the type of situation that warrants an acquisition bar. See,
`
`e.g., Hyundai Motor Am. v. Clear with Computers, 2009 U.S. Dist. LEXIS 132160, at *9-13
`
`(imposing acquisition bar in case where plaintiff’s “entire business model…revolves around the
`
`acquisition, enforcement (through litigation), and licensing of patents,” as without acquisition
`
`bar, there was significant risk that defendant’s confidential information would be used against it
`
`in other litigation); see also E-Contact Techs., 2012 U.S. Dist. LEXIS 190475, at *9.
`
`The risk of harm to Apple exists independently of whether NetTech or its counsel would
`
`intentionally use Apple’s confidential information to acquire patent for licensing or assertion
`
`against Apple. As courts have long recognized, “[i]t is very difficult for the human mind to
`
`compartmentalize and selectively suppress information once learned, no matter how well-
`
`intentioned the effort may be to do so.” In re Deutsche Bank, 605 F.3d at 1378; see also ST
`
`Sales Tech, 2008 WL 5634214 at *2, n.4 (“The inquiry is not directed at the attorney’s ethical
`
`standards, since even if the competitor’s counsel acted in the best of faith and in accordance with
`
`the highest ethical standards, the question remains whether access to the moving party’s
`
`13
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 14 of 16 PageID #: 620
`
`
`confidential information would create an unacceptable opportunity for inadvertent disclosure.”)
`
`(internal quotes omitted).
`
`Plaintiff’s request—i.e., the exclusion of any acquisition bar from the protective order—
`
`does not balance the parties’ needs, and is not tailored to protect Apple or its confidential
`
`information. The Court should adopt Apple’s narrowly tailored patent acquisition bar.
`
`Dated: August 19, 2019
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`
`
`
` /s/ Alfred R. Fabricant
`Alfred R. Fabricant
`NY Bar No. 2219392
`Email: afabricant@brownrudnick.com
`Peter Lambrianakos
`NY Bar No. 2894392
`Email: plambrianakos@brownrudnick.com
`Vincent J. Rubino, III
`NY Bar No. 4557435
`Email: vrubino@brownrudnick.com
`BROWN RUDNICK LLP
`7 Times Square
`New York, NY 10036
`Telephone: (212) 209-4800
`Facsimile: (212) 209-4801
`
`Justin Kurt Truelove
`Texas Bar No. 24013653
`Email: kurt@truelovelawfirm.com
`TRUELOVE LAW FIRM, PLLC
`100 West Houston
`Marshall, Texas 75670
`Telephone: (903) 938-8321
`Facsimile: (903) 215-8510
`
`ATTORNEYS FOR PLAINTIFF
`QUEST NETTECH CORPORATION
`
`
`/s/ Travis Jensen (With permission)
`Claudia Wilson Frost – LEAD COUNSEL
`State Bar No. 21671300
`ORRICK, HERRINGTON & SUTCLIFFE
`LLP
`609 Main, 40th Floor
`
`
`
`14
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 15 of 16 PageID #: 621
`
`
`Houston, TX 77002
`Telephone: 713.658.6400
`Facsimile: 713.658.6401
`cfrost@orrick.com
`
`Travis Jensen
`CA Bar No. 259925
`ORRICK, HERRINGTON & SUTCLIFFE
`LLP
`1000 Marsh Road
`Menlo Park, CA 94025
`Telephone: 650.614.7400
`Facsimile: 650.614.7401
`tjensen@orrick.com
`
`Tyler S. Miller
`NY State Bar No. 5122262
`ORRICK, HERRINGTON & SUTCLIFFE
`LLP
`51 West 52nd Street
`New York, NY 10019
`Telephone: 212.506.5338
`Facsimile: 212.506.5151
`tmiller@orrick.com
`
`Melissa Richards Smith
`State Bar No. 24001351
`GILLAM&SMITH, LLP
`303 South Washington Ave.
`Marshall, TX 75670
`Tel: (903) 934-8450
`Fax: (903) 934-9257
`melissa@gillamsmithlaw.com
`
`ATTORNEYS FOR DEFENDANT
`APPLE INC.
`
`
`
`
`
`15
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 16 of 16 PageID #: 622
`
`
`CERTIFICATE OF SERVICE
`
`The undersigned hereby certifies that, on August 19, 2019, all counsel of record who are
`
`deemed to have consented to electronic service are being served with a copy of this document via
`
`the Court’s CM/ECF system per Local Rule CV-5(a)(3).
`
` /s/ Alfred R. Fabricant
` Alfred R. Fabricant
`
`
`
`
`
`16
`
`