throbber
§










`
`JOINT MOTION FOR ENTRY OF OPPOSED PROTECTIVE ORDER
`
`
`APPLE INC.,
`
`
`v.
`
`Defendant.
`
`
`
`
`
`
`
`
`
`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 1 of 16 PageID #: 607
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`
`QUEST NETTECH CORPORATION,
`
`
`Plaintiff,
`
`
`Case No. 2:19-cv-00118-JRG
`
`
`JURY TRIAL DEMANDED
`
`Plaintiff Quest NetTech Corporation (“NetTech”) and Defendant Apple, Inc. (“Apple”)
`
`hereby file this Joint Motion seeking entry of a Protective Order. The Parties have met and
`
`conferred and have agreed to all aspects of the protective order except for two issues:
`
`(1) whether outside counsel who are competitive decision-makers should be barred from
`
`having access to competitively-sensitive Protected Material; and
`
`(2) whether outside counsel who receive Protected Material should be subject to a patent
`
`acquisition bar.
`
`NetTech’s proposed Protective Order is attached hereto as Exhibit A, Apple’s proposed
`
`Protective Order is attached hereto as Exhibit B, and a redline showing the differences between
`
`the two is attached hereto as Exhibit C.
`
`I.
`
`Issue 1: Competitive Decisionmaker Issues (Protective Order ¶¶ 12, 13(f))
`
`Plaintiff’s Proposal
`
`Defendant’s Proposal
`
`12. For Protected Material designated
`RESTRICTED - ATTORNEYS’ EYES
`ONLY, access to, and disclosure of, such
`
`
`12. For Protected Material designated
`RESTRICTED - ATTORNEYS’ EYES
`ONLY, access to, and disclosure of, such
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 2 of 16 PageID #: 608
`
`
`Plaintiff’s Proposal
`Protected Material shall be limited to:
`individuals listed in paragraphs 8(a-b), 8(e-g)
`and 8(i-j), provided, however, that access by
`individuals pursuant to paragraph 8(b, e) be
`limited to individuals who exercise no
`competitive decision- making authority on
`behalf of the client . . .
`[Paragraph 8(a), removed from Plaintiff’s
`proposal and present in Defendant’s proposal,
`is “outside counsel of record in this Action for
`the Parties”]
`
`Defendant’s Proposal
`Protected Material shall be limited to:
`individuals listed in paragraphs 8(a-b), 8(e-g)
`and 8(i-j), provided, however, that access by
`individuals pursuant to paragraph 8(a-b, e)
`be limited to individuals who exercise no
`competitive decision- making authority on
`behalf of the client . . .
`[Paragraph 8(a), removed from Plaintiff’s
`proposal and present in Defendant’s
`proposal, is “outside counsel of record in this
`Action for the Parties”]
`
`13(f) Access to Protected Material
`designated RESTRICTED CONFIDENTIAL
`- SOURCE CODE shall be limited to (i)
`outside counsel; (ii) up to three (3) outside
`consultants or experts (i.e., not existing
`employees or affiliates of a Party or an affiliate
`of a Party) retained for the purpose of this
`litigation and approved to access such
`Protected Materials pursuant to paragraph 7
`above; (iii) Court reporters, stenographers and
`videographers retained to record testimony
`taken in this action; (iv) the Court (including
`any Court-appointed mediators or advisors)
`and its personnel; and (v) any other person
`with the prior written consent of the producing
`Party. 
`
`13(f) Access to Protected Material
`designated RESTRICTED CONFIDENTIAL
`- SOURCE CODE shall be limited to (i)
`outside counsel provided that such Outside
`Counsel be limited to outside counsel who
`exercise no competitive decision-making
`authority, as defined by U.S. Steel v. United
`States, 730 F.2d 1465, 1468 n.3 (Fed. Cir.
`1984), on behalf of the client; (ii) up to three
`(3) outside consultants or experts (i.e., not
`existing employees or affiliates of a Party or
`an affiliate of a Party) retained for the
`purpose of this litigation and approved to
`access such Protected Materials pursuant to
`paragraph 8 above; (iii) Court reporters,
`stenographers and videographers retained to
`record testimony taken in this action; (iv) the
`Court (including any Court-appointed
`mediators or advisors) and its personnel; and
`(v) any other person with the prior written
`consent of the producing Party. 
`
`
`
`Plaintiff’s Statement
`
`Defendant seeks a clause prohibiting outside counsel from viewing its protected
`
`information if that counsel is involved in “competitive decisionmaking,” in a departure from the
`
`model order that has serious and wide-ranging consequences. Such a requirement has the
`
`potential to serve as a disqualification of outside counsel, and should be rejected for several
`
`2
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 3 of 16 PageID #: 609
`
`
`reasons.1 First, limiting disclosure of information to those in non-competitive decisionmaker
`
`roles is typically done in the context of in-house counsel, not outside counsel. U.S. Steel Corp. v.
`
`United States, 730 F.2d 1465, 1468 (Fed. Cir. 1984). Second, outside counsel is already
`
`restricted by the prosecution bar and the other requirements of the protective order in receiving,
`
`handling, and using Apple's protected information. A complete bar on outside counsel's ability
`
`to view Apple's source code, including for the purposes of litigating this case, is a drastic
`
`measure considering the other protections in the protective order and that Apple's perceived
`
`harms are speculative at best. See PACid Group, LLC v. Apple, Inc., No. 6;09-cv-143, 2010 WL
`
`10094684, at *4 (E.D. Tex. Feb. 19, 2010) (finding absence of good cause for protective order
`
`restricting access to confidential materials by plaintiff's counsel, because a “reason to believe”
`
`that outside counsel was a competitive decisionmaker "cannot be the basis for restricting an
`
`ongoing attorney-client relationship.") (emphasis added). Here, like in PACid, Apple has not
`
`met its burden in showing the propriety of such a provision.
`
`Should the Court disagree, Plaintiff requests that outside counsel who are competitive
`
`decisionmakers only be disallowed from conducting the source code review (e.g., restricted from
`
`having access to Apple's native source code files), but not be restricted from viewing Apple
`
`source code that is used in expert reports, pleadings, motions, and at trial. Such a provision
`
`would protect the overwhelming majority of Apple's source code without impacting outside
`
`counsel's ability to litigate this case.
`
`
`
`
`
`1 Plaintiff does not concede that any of its outside counsel are, have been, or will be its
`competitive decisionmakers. Rather, Plaintiff opposes this addition out of an abundance of
`caution and to prevent further motions practice regarding its outside counsel's activities which
`could be used to harass, and also interfere with the attorney client relationship.
`
`3
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 4 of 16 PageID #: 610
`
`
`Defendant’s Statement
`
`NetTech’s outside counsel should not be allowed to use Apple’s source code and other
`
`highly confidential information to help NetTech make business decisions. NetTech’s proposal
`
`would, for example, permit its counsel to advise NetTech on additional, unrelated patents that it
`
`could acquire to assert against Apple. Such a use of confidential information is indisputably
`
`improper and contrary to the very purpose of a Protective Order, which is universally well-
`
`established in this and other courts. Yet that is precisely what NetTech’s proposals would allow,
`
`especially when considering that NetTech alarmingly also opposes a patent acquisition bar.
`
`Such a result is manifestly unfair and prejudicial to Apple and should not be countenanced.
`
`The provision Apple requests is routinely entered in patent cases like this one. See, e.g.,
`
`AGIS Software Development LLC v. Apple Inc., No. 17-cv-00516-JRG, Dkt. 51 (E.D. Tex. Oct.
`
`26, 2017) (containing provisions substantially identical to those proposed by Apple here); Uniloc
`
`USA, Inc. v. Samsung Elecs. Am., Inc., No. 2:18-CV-00040, Protective Order (Dkt. No. 38) at 12
`
`(E.D. Tex. May 30, 2018); Smartflash LLC v. Apple, Inc., et al., No. 6:13-CV-447, Revised
`
`Agreed Protective Order (Dkt. No. 176) at 4, 11-12, 13-14 (E.D. Tex. Jul. 10, 2014);
`
`ContentGuard Holdings, Inc. v. Amazon.com, Inc., et al., No. 2:13-CV-01112, Am. Protective
`
`Order (Dkt. No. 152) at 13-15 (E.D. Tex. Jun. 6, 2014); Personal Audio, LLC v. Apple Inc., et
`
`al., No. 9:09-CV-00111, Protective Order (Dkt. No. 118) at 10-14 (E.D. Tex. May 6, 2010);
`
`Online News Link LLC v. Apple Inc., et al., No. 2:09-CV-312, Agreed Protective Order (Dkt. No.
`
`86) at 10-11 (E.D. Tex. Apr. 8, 2010).
`
`The policy reasons for restricting access to highly sensitive litigation materials to
`
`opposing counsel (whether outside counsel or in-house counsel) that are not competitive decision
`
`4
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 5 of 16 PageID #: 611
`
`
`makers2 are well-established. See, e.g., ST Sales Tech Holdings, LLC v. Daimler Chrysler Co.,
`
`No. 6:07-CV-346, 2008 WL 5634214, *8 (E.D. Tex. Mar. 14, 2008) (hereinafter “ST Sales
`
`Tech”) (“Defendants would ultimately be at a high risk of continued litigation [due to inadvertent
`
`disclosure or use]”). Indeed, in tacit acknowledgement of these policy considerations, NetTech
`
`does not dispute that “outside consultants or experts” who are competitive decision makers for
`
`NetTech cannot access discovery materials designated “RESTRICTED - ATTORNEYS’ EYES
`
`ONLY” or “RESTRICTED CONFIDENTIAL SOURCE CODE.” The result should be no
`
`different for NetTech’s outside counsel.
`
`Concerning the facts of this case, NetTech publicly admits in its annual report as recently
`
`as April 16, 2019 that its business model is acquiring patents for licensing and assertion, which
`
`confirms that the heightened protections proposed by Apple are necessary and critical in this case
`
`specifically. See ST Sales Tech, 2008 WL 5634214, at *7; see also Infosint S.A. v. H. Lundbeck
`
`A.S., et al., No. 06-CIV-2869, 2007 WL 1467784, at *4-5 (S.D.N.Y. May 16, 2007) (preventing
`
`patent assertion entity’s outside counsel from accessing confidential materials, as he performed
`
`competitive decision-making by counseling the entity for years “based on his scientific and legal
`
`expertise”); NetTech’s Annual Report (Dkt. 20-3) at 1 (“Our principal operations include the
`
`development, acquisition, licensing and enforcement of intellectual property rights”).
`
`Indeed, the risks of harm to Apple—even through inadvertent use of Apple’s
`
`information—are acute given NetTech’s litigation history of filing more than 40 patent cases in
`
`the last six years and the fact that NetTech’s outside counsel have represented other plaintiffs
`
`against Apple. See AGIS Software Development LLC v. Apple, Inc., No. 17-cv-00516-JRG, Dkt.
`
`
`
`2 At NetTech’s suggestion, Apple added the reference to the U.S. Steel case to provide clarity regarding the criteria
`used for determining who is a competitive decision maker.
`
`5
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 6 of 16 PageID #: 612
`
`
`1 (E.D. Tex., June 21, 2017) (listing same law firm and attorneys as this case). Notably, in the
`
`AGIS case, the same opposing counsel that represent NetTech here stipulated to the very
`
`provision Apple is currently proposing, which underscores the reasonableness (and importance)
`
`of the protection Apple is requesting. Id. NetTech is a non-practicing entity with very few
`
`employees (see https://www.qprc.com/about-quest), which leaves it to rely heavily on outside
`
`counsel for legal and business advice, with counsel’s role likely going “well-beyond the typical
`
`role of outside counsel, even [when compared with] outside counsel who might work with an
`
`entity for years.” ST Sales Tech, 2008 WL 5634214, at *7-8.
`
`In situations like these, where the plaintiff’s business model revolves entirely around
`
`acquiring, enforcing, and licensing patents, “it is difficult to argue that [outside counsel], who is
`
`so heavily involved in these aspects of the business, is somehow not a competitive
`
`decisionmaker.” Id. at *5. Indeed, although NetTech and Apple might not be competitors in the
`
`traditional sense, they nevertheless both “seek to utilize, in one manner or another, intellectual
`
`property as part of a business model for pecuniary gain.” Id. at 6. They are “competitors for the
`
`rights to use the accused systems,” id., and outside counsel who qualify as Plaintiff’s competitive
`
`decisionmakers should be barred from access to Apple’s source code and other sensitive,
`
`confidential materials.
`
`The harm to Apple does not require that NetTech’s counsel intentionally use Apple’s
`
`confidential information outside the context of this litigation; rather, it can occur through
`
`inadvertent disclosure or use. Indeed, courts have long recognized that “[i]t is very difficult for
`
`the human mind to compartmentalize and selectively suppress information once learned, no
`
`matter how well-intentioned the effort may be to do so.” In re Deutsche Bank Trust Co. Ams.,
`
`605 F.3d 1373, 1378 (Fed. Cir. 2010); see also ST Sales Tech, 2008 WL 5634214, at *5 (“Courts
`
`6
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 7 of 16 PageID #: 613
`
`
`have continuously determined that attempting to compartmentalize knowledge is an exercise in
`
`futility.”).
`
`NetTech’s argument is that it would be prejudiced if its outside counsel could not see
`
`Apple’s source code or other highly-confidential material. But this is a red herring since
`
`NetTech’s outside counsel firm has several attorneys, so it can preclude those attorneys who
`
`review Protected Materials from participating in competitive decision-making and conversely
`
`screen those who are competitive decision makers from reviewing Protected Material. See
`
`Notices of Attorney Appearances (Dkt. 7-10) (showing at least 4 attorneys of record for
`
`NetTech). Indeed, in similar circumstances, courts have rejected this same argument. See ST
`
`Sales Tech, 2008 WL 5634214, at *7-8 (“While the Court notes that Plaintiff will be harmed by
`
`having one of its counsel screened from accessing certain information in the case, that harm is
`
`minor compared to the risk of continued harm to Defendants since [plaintiff] has other highly
`
`competent attorneys that have been involved since the beginning of the case.”); see also Infosint,
`
`2007 WL 1467784, at *5 (“While [plaintiff’s] desire to have its trusted [outside] counsel
`
`involved in the litigation is understandable, [defendant’s] desire to keep its proprietary
`
`information protected is a superior interest.”).
`
`To prevent NetTech and its counsel from using Apple’s source code and other highly
`
`confidential information for inappropriate purposes, Apple proposes that access to such
`
`information be limited to NetTech’s outside counsel who are not involved in competitive
`
`decision-making. As noted above, similar provisions have appeared in other protective orders in
`
`this district. Without such provisions, NetTech’s outside counsel who are involved in
`
`competitive decision-making could review Apple’s proprietary materials and use that knowledge
`
`7
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 8 of 16 PageID #: 614
`
`
`– deliberately or accidentally – to advise NetTech on competitive issues, such as patent
`
`monetization or acquisition strategies. This is simply too great a risk for Apple.
`
`
`
`II.
`
`Issue 2: Acquisition Bar (Protective Order ¶ 14)
`
`Plaintiff’s Proposal
`
`Defendant’s Proposal
`
`[None]
`
`Absent written consent by the
`14.
`producing Party, any attorney representing a
`Party, whether in-house or outside counsel, and
`any person associated with a Party and
`permitted to receive the other Party’s Protected
`Material that is designated RESTRICTED --
`ATTORNEYS’ EYES ONLY and/or
`RESTRICTED CONFIDENTIAL SOURCE
`CODE (collectively “HIGHLY SENSITIVE
`MATERIAL”), who obtains, receives, or
`otherwise learns of, in whole or in part, the
`other Party’s HIGHLY SENSITIVE
`MATERIAL of a technical nature under this
`Order shall not: … (ii) be involved in the
`acquisition of patents (including patent
`applications), or the rights to any such
`patents or patent applications with the right to
`sublicense, for assertion against or licensing
`to a Party, pertaining to the field of invention
`of the patent-in-suit on behalf of the receiving
`Party or its acquirer, successor, predecessor,
`or affiliate during the pendency of this Action
`and for 18-months after its conclusion,
`including any appeals, except with respect to
`the acquisition, licensing, or any other
`transaction involving the patent-in-suit
`and/or all patents and patent applications
`related thereto.
`
`
`
`Plaintiff’s Statement
`
`In addition to the agreed-upon prosecution bar, Defendant also seeks the addition of a
`
`non-standard acquisition bar that would prevent outside counsel in this case from any
`
`8
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 9 of 16 PageID #: 615
`
`
`involvement in the acquisition of patents in the pertinent field of technology. Such a provision is
`
`not in the model protective order for good reason. It is Apple’s burden to show that such a bar is
`
`warranted, and Apple cannot to do so. A party seeking a bar must show (1) that the risk of
`
`inadvertent disclosure exists; and (2) that the balance of interests suggests a bar is appropriate.
`
`In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373, 1378 (Fed. Cir. 2010).3
`
`First, Apple cannot show a risk of inadvertent disclosure because none exists. The
`
`plaintiff's status as an NPE similarly does not support handicapping the plaintiff with such a bar.
`
`Garnet Digital, LLC v. Apple, Inc., et al., Civ. No. 6:11-cv-647-LED, Dkt. 374 (E.D. Tex. Sept.
`
`20, 2012) (citing In re Deutsche Bank, 605 F.3d at 1378). Because Apple cannot make a
`
`showing of any risk of inadvertent disclosure, and thus its proposed acquisition bar is not
`
`appropriate.
`
`Second, in balancing the interests of both parties, courts have denied acquisition bars
`
`because they are burdensome to plaintiffs. Sol IP, LLC v. AT&T Mobility LLC, 2:18-cv-0526-
`
`RWS-RSP, Dkt. 129 (E.D. Tex. May 29, 2019) (“[I]n light of the broad scope of activities
`
`covered by the requested acquisition bar and its extended duration, the balance of interests
`
`supports that the proposed acquisition bar is not appropriate.”). Here, such a restriction would
`
`burden Plaintiff’s counsel as well, as such counsel would be unnecessarily bound by the
`
`Protective Order’s restrictions based on nothing but conjecture. Plaintiff’s counsel has already
`
`agreed to be bound by an 18-month prosecution bar, longer than the typical one year. Yet Apple
`
`
`
`3 In this District, prosecution bars and acquisition bars are both analyzed under the In re
`Deutsche Bank framework. See E-Contact Techs., LLC v. Apple, Inc., No. 1:11-CV-426-LED-
`KFG, 2012 WL 11924448, at *1 (E.D. Tex. June 19, 2012)
`
`9
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 10 of 16 PageID #: 616
`
`
`also insists on further handicaps to Plaintiff’s counsel in the form of a burdensome and wide-
`
`ranging acquisition bar.
`
`That outside counsel in this case previously agreed to an acquisition bar for a different
`
`client is unavailing. First, Quest Nettech is a separate client and should not be bound by
`
`decisions it had no involvement in making in cases where it was not a party. Second, one of
`
`Brown Rudnick's other clients, AGIS Software, was not and is not a patent acquisition entity,
`
`whereas Quest Nettech is regularly involved in the acquisition of patents and such a bar would
`
`likely have a material impact on its business.
`
`Should the Court disagree with Plaintiff, it requests a narrow acquisition bar that applies
`
`to patents in the field of the patent-in-suit and is limited only to the activities of Quest Nettech
`
`(rather than all of its related entities and affiliates) against only Apple. Plaintiff also requests
`
`that such a bar be limited to a time period of 1 year after the conclusion of this action.
`
`Defendant’s Statement
`
`NetTech should not be allowed to use Apple’s source code (or other highly confidential
`
`information) to acquire additional patents to assert against Apple. Yet that is precisely what
`
`NetTech’s proposal would allow. Such a result is manifestly unjust and prejudicial to Apple and
`
`should not be allowed.
`
`By agreeing to a patent prosecution bar, NetTech has tacitly acknowledged the possibility
`
`of inadvertent disclosure or use of Apple’s confidential information, and has offered no reasoned
`
`explanation for why Apple would not suffer the same or similar harms without an acquisition
`
`bar. See E-Contact Techs. LLC v. Apple Inc., No. 1:11-CV-00426, 2012 U.S. Dist. LEXIS
`
`190475, at *8-9 (E.D. Tex. Jun. 19, 2012) (finding that by acquiescing to prosecution bar,
`
`plaintiff’s counsel “apparently agree[d]” that there might be a risk of inadvertent disclosure of
`
`10
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 11 of 16 PageID #: 617
`
`
`Apple’s confidential information: “it is hard to conceive that there would be little or no risk of
`
`inadvertent disclosure when these same attorneys advise their client in matters regarding
`
`acquisitions of patents.”); see also Keranos LLC v. Analog Devices, No. 2:10-cv-207, 2012 U.S.
`
`Dist. LEXIS 191605, at *21 (E.D. Tex. Sept. 28, 2012) (“The use of Defendant’s AEO and
`
`Confidential Source Code Information poses an equally high risk to defendants in the context of
`
`patent acquisition as it does in the patent prosecution context”).
`
`Apple proposes a narrowly tailored patent acquisition bar that is limited in time, scope,
`
`and subject matter, which appropriately balances NetTech’s need to litigate the current case and
`
`Apple’s need to protect against inadvertent or improper use of its highly-confidential information
`
`(including source code) for use in acquiring other patents for licensing or litigation against
`
`Apple. Here, the plaintiff NetTech is a non-practicing entity whose sole business is monetizing
`
`patents, including through dozens of lawsuits as discussed above. In circumstances such as
`
`these, courts regularly impose patent acquisition bars, including bars that are broader than that
`
`proposed by Apple. See, e.g., AGIS Software Development LLC v. Apple Inc., No. 17-cv-00516-
`
`JRG, Dkt. 51 (E.D. Tex. Oct. 26, 2017) (containing provisions substantially identical to those
`
`proposed by Apple here); E-Contact Techs., 2012 U.S. Dist. LEXIS 190475, at *6-13, and
`
`associated Protective Order (Dkt. No. 351) at 16-17 (Jul. 5, 2012) (imposing three-year bar on
`
`acquisitions relating to the “functionality, operation, and design” of five technologies, as well as
`
`their “related functionalities,” over plaintiff’s objections); ContentGuard Holdings, Inc. v.
`
`Amazon.com, Inc., et al., No. 2:13-cv-1112, Am. Protective Order (Dkt. No. 152) at 22, 26 (E.D.
`
`Tex. Jun. 6, 2014); Mobile Telecomms. Techs., LLC v. ZTE (USA) Inc., No. 2:13-CV-00946,
`
`Supplemental Protective Order (Dkt. No. 74) at 3-4 (E.D. Tex. Nov. 12, 2015); Mobile
`
`Telecomms. Techs., LLC v. HTC Am., Inc., No. 2:13-CV-00948, Supplemental Protective Order
`
`11
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 12 of 16 PageID #: 618
`
`
`(Dkt. No. 74) at 3-4 (E.D. Tex. Nov. 12, 2015); and Long Corner Consumer Elecs. LLC v. Acer
`
`Am. Corp., et al., No. 2:13-CV-00998, Protective Order (Dkt. No. 77) at 10-12 (E.D. Tex. Jun. 5,
`
`2014).
`
`In particular, Apple proposes that the protective order include an 18-month patent
`
`acquisition bar, which would prohibit NetTech’s (or Apple’s) representatives who receive
`
`information from the opposing party designated “RESTRICTED - ATTORNEYS’ EYES
`
`ONLY” or “RESTRICTED CONFIDENTIAL SOURCE CODE” in this case from acquiring
`
`patents (including patent applications) pertaining to the field of the invention, or the rights to any
`
`such patents or applications with the right to sublicense, for assertion against or licensing to the
`
`opposing party.
`
`Apple’s proposed 18-month time period is reasonable and shorter than other disputed
`
`acquisition bars that have been entered in this district. See, e.g., Hyundai Motor Am. v. Clear
`
`with Computers LLC, No. 6:08-CV-302, 2009 U.S. Dist. LEXIS 132160, at *12-13 (E.D. Tex.
`
`May 11, 2009) (imposing two-year acquisition bar); Karamelion LLC v. ADT LLC, No. 2:18-cv-
`
`00330-JRG, Order on Protective Order (Dkt. No. 36) at 5 (Jan. 24, 2019) (imposing two-year
`
`prosecution bar). Indeed, NetTech has agreed to an 18-month prosecution bar and has offered no
`
`justification for why the same time period should not apply to patent acquisitions.
`
`Apple has carefully tailored the proposed acquisition bar to cover only individuals who
`
`receive information designated “RESTRICTED -- ATTORNEYS’ EYES ONLY” or
`
`“RESTRICTED CONFIDENTIAL SOURCE CODE,” similarly to Long Corner. See Opposed
`
`Mot. for Entry of Protective Order at 11-13 (Dkt. 76) (Jun. 3, 2014) and associated Protective
`
`Order (Dkt. 77) at 10-11 (Jun. 5, 2014).
`
`12
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 13 of 16 PageID #: 619
`
`
`In requesting this acquisition bar Apple has taken into account the “quantity and
`
`sensitivity” of its confidential and proprietary information by still allowing NetTech to acquire
`
`patents for licensing against non-parties, or even against Apple, if the patents are in a different
`
`field of endeavor. See Karamelion, Order on Protective Order at 5 (finding that “quantity and
`
`sensitivity” of Defendants’ confidential information warranted a two-year prosecution bar
`
`against Plaintiff, who maintained an “acquir[e] and assert[]” patent strategy).
`
`The sole Asserted Patent in this case has long since expired, with the total damages
`
`period spanning less than one year. This fact alone raises a concern that NetTech is seeking
`
`Apple’s highly confidential and proprietary technology so it can acquire additional patents to
`
`assert against Apple. This is precisely the type of situation that warrants an acquisition bar. See,
`
`e.g., Hyundai Motor Am. v. Clear with Computers, 2009 U.S. Dist. LEXIS 132160, at *9-13
`
`(imposing acquisition bar in case where plaintiff’s “entire business model…revolves around the
`
`acquisition, enforcement (through litigation), and licensing of patents,” as without acquisition
`
`bar, there was significant risk that defendant’s confidential information would be used against it
`
`in other litigation); see also E-Contact Techs., 2012 U.S. Dist. LEXIS 190475, at *9.
`
`The risk of harm to Apple exists independently of whether NetTech or its counsel would
`
`intentionally use Apple’s confidential information to acquire patent for licensing or assertion
`
`against Apple. As courts have long recognized, “[i]t is very difficult for the human mind to
`
`compartmentalize and selectively suppress information once learned, no matter how well-
`
`intentioned the effort may be to do so.” In re Deutsche Bank, 605 F.3d at 1378; see also ST
`
`Sales Tech, 2008 WL 5634214 at *2, n.4 (“The inquiry is not directed at the attorney’s ethical
`
`standards, since even if the competitor’s counsel acted in the best of faith and in accordance with
`
`the highest ethical standards, the question remains whether access to the moving party’s
`
`13
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 14 of 16 PageID #: 620
`
`
`confidential information would create an unacceptable opportunity for inadvertent disclosure.”)
`
`(internal quotes omitted).
`
`Plaintiff’s request—i.e., the exclusion of any acquisition bar from the protective order—
`
`does not balance the parties’ needs, and is not tailored to protect Apple or its confidential
`
`information. The Court should adopt Apple’s narrowly tailored patent acquisition bar.
`
`Dated: August 19, 2019
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`
`
`
` /s/ Alfred R. Fabricant
`Alfred R. Fabricant
`NY Bar No. 2219392
`Email: afabricant@brownrudnick.com
`Peter Lambrianakos
`NY Bar No. 2894392
`Email: plambrianakos@brownrudnick.com
`Vincent J. Rubino, III
`NY Bar No. 4557435
`Email: vrubino@brownrudnick.com
`BROWN RUDNICK LLP
`7 Times Square
`New York, NY 10036
`Telephone: (212) 209-4800
`Facsimile: (212) 209-4801
`
`Justin Kurt Truelove
`Texas Bar No. 24013653
`Email: kurt@truelovelawfirm.com
`TRUELOVE LAW FIRM, PLLC
`100 West Houston
`Marshall, Texas 75670
`Telephone: (903) 938-8321
`Facsimile: (903) 215-8510
`
`ATTORNEYS FOR PLAINTIFF
`QUEST NETTECH CORPORATION
`
`
`/s/ Travis Jensen (With permission)
`Claudia Wilson Frost – LEAD COUNSEL
`State Bar No. 21671300
`ORRICK, HERRINGTON & SUTCLIFFE
`LLP
`609 Main, 40th Floor
`
`
`
`14
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 15 of 16 PageID #: 621
`
`
`Houston, TX 77002
`Telephone: 713.658.6400
`Facsimile: 713.658.6401
`cfrost@orrick.com
`
`Travis Jensen
`CA Bar No. 259925
`ORRICK, HERRINGTON & SUTCLIFFE
`LLP
`1000 Marsh Road
`Menlo Park, CA 94025
`Telephone: 650.614.7400
`Facsimile: 650.614.7401
`tjensen@orrick.com
`
`Tyler S. Miller
`NY State Bar No. 5122262
`ORRICK, HERRINGTON & SUTCLIFFE
`LLP
`51 West 52nd Street
`New York, NY 10019
`Telephone: 212.506.5338
`Facsimile: 212.506.5151
`tmiller@orrick.com
`
`Melissa Richards Smith
`State Bar No. 24001351
`GILLAM&SMITH, LLP
`303 South Washington Ave.
`Marshall, TX 75670
`Tel: (903) 934-8450
`Fax: (903) 934-9257
`melissa@gillamsmithlaw.com
`
`ATTORNEYS FOR DEFENDANT
`APPLE INC.
`
`
`
`
`
`15
`
`

`

`Case 2:19-cv-00118-JRG Document 46 Filed 08/19/19 Page 16 of 16 PageID #: 622
`
`
`CERTIFICATE OF SERVICE
`
`The undersigned hereby certifies that, on August 19, 2019, all counsel of record who are
`
`deemed to have consented to electronic service are being served with a copy of this document via
`
`the Court’s CM/ECF system per Local Rule CV-5(a)(3).
`
` /s/ Alfred R. Fabricant
` Alfred R. Fabricant
`
`
`
`
`
`16
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket