throbber
Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 1 of 33
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`TOUCHSTREAM TECHNOLOGIES, INC.,
`
`
`
`
`
`GOOGLE LLC,
`
`
`
`
`
`
`
`
`
`
`
`Defendant.
`
`Plaintiff,
`
`
`
`v.
`










`
`
`
`
`
`Civil Case No. 6:21-cv-569-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`
`
`JOINT MOTION FOR ENTRY OF DISPUTED PROTECTIVE ORDER
`
`
`The parties jointly move for entry of a protective order. While the parties have reached
`
`agreement on most items, multiple items remain in dispute. The parties’ respective positions are set
`
`forth below. For each disputed item, the party seeking a departure from this Court’s default
`
`protective order has described its position first. A proposed protective order with the disputes
`
`highlighted is attached.
`
`Section 11(g): Encryption of Electronic Images of Source Code
`
`I.
`
`
`Plaintiff’s Proposal
`Do not include Defendant’s proposal.
`
`Defendant’s Proposal
`The receiving Party may create an electronic
`image of a selected portion of the Source Code
`Material only when the electronic file
`containing such image has been encrypted
`using commercially reasonable encryption
`software including password protection.
`
`Defendant’s Position
`A.
`At bottom, Google’s proposals in this submission concern reasonable security measures
`
`needed to protect the company’s sensitive source code and other confidential data. Plaintiff’s counter
`
`proposals instead trade off reasonable security measures in favor of minor conveniences. Source
`
`
`
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 2 of 33
`
`code and other confidential documents exchanged in this litigation pose a serious risk if leaked or
`
`breached, especially for a company like Google that faces constant threats.
`
`Google proposes that the Protective Order include a requirement that electronic images of
`
`Source Code Material be protected using commercially available and industry-standard techniques.
`
`In particular, while the parties have agreed that no electronic images of source code are allowed
`
`“except as necessary” pursuant to § 11(g), there is no restriction on how documents containing such
`
`source code may be transmitted (for example, by email or file sharing service). Google simply
`
`proposes that documents that include such sensitive electronic images be encrypted and password
`
`protected, so that if the document is received by an unintended recipient, the sensitive information
`
`will have some measure of protection.
`
`
`
`Source code is among the most important and confidential information that Google
`
`possesses. Drone Techs., Inc. v. Parrot S.A., 838 F.3d 1283, 1300 n.13 (Fed. Cir. 2016) (“[I]t is well
`
`recognized among lower courts that source code requires additional protections to prevent improper
`
`disclosure because it is often a company’s most sensitive and most valuable property.”). In
`
`electronic form, source code is inherently susceptible to rapid duplication and dissemination. If
`
`Google’s source code were to be exposed, even inadvertently, Google would suffer potentially
`
`devastating competitive harm.1 Id. (advising caution regarding the “significant consequences that
`
`might result from unauthorized or inadvertent disclosure” of source code). This is why courts are
`
`often protective of source code in electronic form, even barring such copies. See, e.g., Finjan, Inc.
`
`v. Cisco Sys., Inc., No. 5:17-cv-72-BLK-SVK, 2019 WL 667766, at *14–16 (N.D. Cal. Feb. 19,
`
`
`1 Despite the best efforts of attorneys and their staff, law firms, large and small, are still susceptible to data breaches or
`leaks, potentially exposing sensitive information. See, e.g., Amid BigLaw Data Attacks, Breaches Surge For Smaller
`Firms, June 15, 2022, available at https://www.law360.com/articles/1498395/amid-biglaw-data-attacks-breaches-
`surge-for-smaller-firms; The Top 11 Legal Industry Cyber Attacks, Arctic Wolf, March 29, 2022, available at
`https://arcticwolf.com/resources/blog/top-legal-industry-cyber-attacks.
`2
`
`
`
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 3 of 33
`
`2019) (“The Receiving Party shall not create any electronic copies or other images of the paper
`
`copies and shall not convert any information contained in the paper copies into any electronic format
`
`without the agreement of the Producing Party or further order of the Court.”); Rockstar Consortium
`
`US LP v. Google Inc., No. 2:31-cv-893, 2014 WL 5831041, at *6–7, 9 (E.D. Tex. June 19, 2014)
`
`(ordering that “the Receiving Party may not create electronic images, or any other images, of the
`
`Source Code,” except for filing in a sealed “Court document”).
`
`
`
`Google’s proposal seeks to further protect against inadvertent disclosure by requiring
`
`encryption and password protection. During the meet and confer process, Google explained that this
`
`provision merely requires using commercially available software included within Microsoft Word
`
`and Adobe Acrobat. Both programs (in addition to other commercially available software) can be
`
`used to apply passwords solely to documents that contain the electronic images. This does not
`
`impose an onerous burden on Plaintiff, and any burden is outweighed by the importance of
`
`maintaining the security of Defendant’s source code. See EPL Holdings, LLC v. Apple Inc., No. C-
`
`12-04306 JST (JSC), 2013 WL 2181584, at *7 (N.D. Cal. May 20, 2013) (concluding that an
`
`inconvenience to the plaintiff “does not outweigh the risk posed by creating electronic copies of
`
`source code unnecessarily”). Moreover, this only applies to a small subset of documents (as defined
`
`in the Protective Order) and any burden can be reduced by omitting any such electronic images in
`
`draft documents until final (while instead referencing production and line numbers in the drafts).
`
`With the increased risk created by electronic images of source code, additional protections are
`
`warranted here to help avoid inadvertent disclosure.
`
`B.
`
`Plaintiff’s Position
`
`A court may issue a protective order, upon a showing of good cause, “to protect a party or
`
`person from annoyance, embarrassment, oppression, or undue burden or expense.” Fed. R. Civ. P.
`
`
`
`
`3
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 4 of 33
`
`26(c)(1). The burden is on the moving party to show why disputed provisions in the protective order
`
`should be added. Jenam Tech, LLC v. Samsung Elecs. Am., Inc., 419CV00250ALMKPJ, 2020 WL
`
`757097, at *1 (E.D. Tex. Feb. 4, 2020). For a disputed provision to meet the “good cause”
`
`requirement, the moving party must show “the necessity of its issuance.” Morgan v. Parc Plaza
`
`Dev., L.P., 3:17-CV-0492-G-BK, 2018 WL 11211461, at *2 (N.D. Tex. Feb. 8, 2018). The moving
`
`party cannot rely on stereotyped and conclusory statements; rather, it must make “a particular and
`
`specific demonstration of fact.” In re Terra Int’l, Inc., 134 F.3d 302, 306 (5th Cir. 1998).
`
`For five of the six disputes addressed in this motion, Google seeks to modify this Court’s
`
`default protective order, meaning that Google has the burden to show why those extra protections
`
`are needed. But throughout this submission, Google relies on speculation and hypotheticals
`
`regarding potential harm without articulating actual case-specific facts giving rise to its concerns.
`
`More than just “minor” inconveniences, Google’s proposals would place cumbersome restrictions
`
`on Touchstream, and Google’s rank speculation does not justify the changes it seeks.
`
`Touchstream has already agreed to restrictions on source code reproduction that go well
`
`beyond this Court’s default provisions. The Court’s default order states that “no electronic copies or
`
`images of Source Code Material shall be made without prior written consent of the producing Party,
`
`except as necessary to create documents that, pursuant to the Court’s rules, procedures, and orders,
`
`must be filed or served electronically,” but Touchstream has further agreed to “only include such
`
`excerpts as are reasonably necessary for the purposes for which such part of the Source Code
`
`Material is used,” to refrain from including “images or copies of Source Code Material in
`
`correspondence between the parties,” and to label all electronic copies “CONFIDENTIAL –
`
`SOURCE CODE.” Ex. A at § 11(g). Now Google seeks to add another, more onerous provision,
`
`under which Touchstream’s counsel and experts will have to enter a password every single time they
`
`
`
`
`4
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 5 of 33
`
`open a draft of a document─such as an expert report or briefing on a dispositive motion─that
`
`contains even the tiniest fragment of Google’s source code. But Google has provided no “particular
`
`and specific demonstration of fact” to justify including this burdensome provision (see Terra Int’l,
`
`134 F.3d at 306), instead alleging in the most general terms that the provision is needed “to further
`
`protect against inadvertent disclosure.” Google cannot meet its burden with speculation and
`
`generalization.
`
`In an attempt to downplay the burden its addition would place on Touchstream’s counsel,
`
`Google argues that it would apply only to a small set of documents because the protective order
`
`already limits how source code can be produced. But those agreed-to protections (which already
`
`exceed this Court’s baseline) are sufficient, and Google cannot show that the disputed provision is
`
`needed by focusing only on the burden to Touchstream. United States v. Aetna Inc., 1:16-CV-01494,
`
`2016 WL 8738421, at *8 (D.D.C. Sept. 14, 2016) (“Relative degree of burdensomeness, however,
`
`is not the sole element of the ‘good cause’ standard; rather, an entity must provide specific examples
`
`of the feared harm in order to obtain additional protection.”). Because it has not pointed to any
`
`“specific examples” that might create a heightened risk of disclosure, “for example, that any party
`
`is being careless with confidential information, or that any party is unusually vulnerable to electronic
`
`hacking or similar threats” (id.), Google further fails to meet its burden.
`
`Nor does Google find support in the authority it cites. EPL Holdings does not address
`
`encryption at all; rather, the court in that case restricted the creation of electronic copies, finding that
`
`“[t]he restrictions ensure that only those electronic copies that are absolutely necessary will be made
`
`and transferred.” EPL Holdings, LLC v. Apple Inc., C-12-04306 JST JSC, 2013 WL 2181584, at *6
`
`(N.D. Cal. May 20, 2013). Here, Touchstream has already agreed to additional provisions, not in the
`
`Court’s default order, that ensure that only necessary copies are made, as described above. And in
`
`
`
`
`5
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 6 of 33
`
`the two cases Google cites that actually address encryption, the parties had already agreed to the
`
`encryption provisions, so there was never any dispute for the court to decide. See, e.g., Finjan, Inc.
`
`v. Cisco Sys., Inc., No. 5:17-cv-72-BLK-SVK, 2019 WL 667766, at *14–16 (N.D. Cal. Feb. 19,
`
`2019); Rockstar Consortium US LP v. Google Inc., No. 2:31-cv-893, 2014 WL 5831041, at *6–7, 9.
`
`In short, Google has not offered any case law supporting its position. It has failed to meet its burden
`
`for including this provision, and the Court should deny its request accordingly.
`
`Section 11(q): Deposition Source Code Computer
`
`II.
`
`
`Defendant’s Proposal
`Do not include Plaintiff’s proposal
`
`Plaintiff’s Proposal
`Upon request by the receiving Party as set
`forth herein, the producing Party shall make a
`secured, stand-alone computer with a
`searchable version of the produced Source
`Code Material (“Deposition Computer”)
`available at any deposition that relates to the
`produced Source Code Material. The
`producing Party shall inform the receiving
`Party of what tools will be installed on the
`Deposition Computer. The receiving Party
`shall notify the producing Party at least seven
`(7) calendar days in advance of the deposition
`that they intend to make use of the Source
`Code Material. The receiving Party may
`request that additional commercially available
`software tools for viewing and searching
`Source Code Material be installed on the
`Deposition Computer, provided, however, that
`(a) the receiving party possesses an appropriate
`license to such software tools; and (b) there is
`a lack of a reasonable objection to such
`software tools by the producing party. The
`receiving Party must provide the producing
`Party with a CD, DVD, or e-mail containing
`such licensed additional software tool(s) at
`least five (5) business days in advance of the
`deposition.
`
`A.
`
`Plaintiff’s Position
`
`
`
`
`6
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 7 of 33
`
`Under Touchstream’s proposal, Google─as the party producing source code─would bring a
`
`computer with a searchable version of all produced source code to depositions of witnesses
`
`knowledgeable about that code. Touchstream does not anticipate deposing more than one or two
`
`source code witnesses, meaning any burdens to Google caused by this provision will be limited in
`
`scope.
`
`Touchstream requests this deposition computer because it cannot anticipate when a source
`
`code deponent will need to see portions of the code not included in Touchstream’s printout requests,
`
`for instance to provide proper context in answering questions about the printed portions.
`
`Touchstream and its source code expert(s) will make best efforts to request printouts of all relevant
`
`portions of the source code, but Google’s own witnesses are most familiar with Google’s code, and
`
`they may find it necessary to view unprinted portions of the code to give the most complete answers
`
`to Touchstream’s questions in depositions. By having the source code available in the deposition
`
`room in a searchable format, Google’s source code witness(es) can efficiently locate and identify
`
`any other portions of the source code needed to answer questions as completely and accurately as
`
`possible. Therefore, to get the full benefit of Touchstream’s limited time with Google’s source code
`
`witnesses, and to minimize the chances that Touchstream will need to reconvene a deposition after
`
`the witness has refreshed his or her memory outside of the deposition, Touchstream respectfully
`
`requests that the Court include this provision in the Protective Order.
`
`While Touchstream understands Google’s sensitivity around source code, Google will have
`
`complete control over the security measures it chooses to protect the requested computer and over
`
`the manner of transport. Google may even choose to use the same machine that it provides for
`
`Touchstream’s source code inspections, as covered elsewhere in § 10 of the parties’ proposed
`
`protective order, eliminating the need to set up a new machine with new security measures. Any
`7
`
`
`
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 8 of 33
`
`burdens associated with setting up and transporting this computer will be outweighed by the benefits
`
`to both parties in allowing Touchstream to elicit full responses to its questions during any source
`
`code deposition.
`
`Touchstream’s requested deposition computer will likely be at issue in only one or two
`
`depositions, and it has the potential to save the parties substantial resources by ensuring that
`
`Google’s witnesses have access to the source code they need to give full and complete answers.
`
`Touchstream therefore respectfully requests inclusion of this provision.
`
`B.
`
`Defendant’s Position
`
`Plaintiff requests that Google provide an additional source code computer available for any
`
`deposition at Touchstream’s request, outside the protections of the locked source code review room
`
`(see § 11(a)) defined in the Protective Order. Not only does this provision significantly increase
`
`Google's logistical burden in preparing for depositions, but the security risks associated with such
`
`an approach far outweigh any alleged benefit to Plaintiff. Google would be required to expose its
`
`valuable source code on yet another computer in an unsecured environment with even more non-
`
`parties in the room (including a court reporter and videographer).
`
`
`
`The parties have already agreed to print reasonable requests for source code relevant to the
`
`case–a process that respects the security concerns of source code while also granting the receiving
`
`Party with advance access to the code before depositions. Under the undisputed provisions of the
`
`Protective Order, Plaintiff is able to request reasonable print outs of source code, receive the printed
`
`pages of source code promptly, and then prepare notes or other work product as needed independent
`
`of source code review and use that printed source code during depositions. However, the agreed-
`
`upon Protective Order is clear that source code review is intended to take place within the locked
`
`room with the stand-alone computer. In contrast, Plaintiff’s proposal seeks to obviate the
`8
`
`
`
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 9 of 33
`
`requirement that Touchstream review source code in the first instance in a secured environment and
`
`allows it to examine Google witnesses on any portion of source code regardless of the code’s
`
`designation and without the added security of the locked room. Beyond just a security risk for
`
`current employee witnesses, Plaintiff’s proposal would be even more worrisome for potential
`
`former-employee witnesses. To the extent Touchstream demands to question third parties about the
`
`source code, such a request goes beyond the bounds of traditional limits on discovery.
`
`
`
`Touchstream claims that it requires this computer so that it can examine Google fact
`
`witnesses on source code that it did not previously identify and print during the Source Code Review.
`
`However, Touchstream fails to explain why its experts and source code reviewers cannot obtain the
`
`necessary Source Code Printouts during the required review. Rather, Touchstream claims that
`
`Google’s witnesses are the most familiar with Google’s code. But that does not explain why the
`
`Court’s default provision should be watered down to offer less source code security in this case, or
`
`why this particular case requires use of a source code computer in addition to Source Code Printouts.
`
`The point of Source Code Printouts, among other things, is to facilitate use of source code outside
`
`of the secured room, safely and efficiently, including for depositions. In fact, this additional source
`
`code discovery proposed by Touchstream is exactly what the Protective Order provisions on source
`
`code seek to curtail. And any inconvenience to Touchstream at depositions should be outweighed
`
`by the importance of maintaining the security of Defendant’s source code. Indeed, use of a source
`
`code computer within a deposition would undermine the heightened security restrictions for the
`
`source code computer and circumvent the agreed upon page limits on Source Code Printouts. See,
`
`e.g., Trans Video Electronics Ltd. v. Time Warner Cable Inc., No. 1:12-cv-01740-LPS, D.I. 38 at 1
`
`(D. Del. Jan. 22, 2015) (holding “Plaintiff's proposal to require a source-code computer at
`
`depositions is DENIED, as it is unnecessary, burdensome (possibly requiring Defendants to set up a
`
`
`
`
`9
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 10 of 33
`
`secure computer at multiple sites), and the risk of harm to Defendants outweighs any incremental
`
`benefit to Plaintiff, particularly given the allowance for printing of source code, to which the parties
`
`have already agreed.”); Int’l Bus. Machines Corp. v. The Priceline Grp. Inc, No. 1:15-cv-00137-
`
`LPS, 2016 WL 6305981, at *2 (D. Del. Sept. 29, 2016) (denying “request that the Court order that
`
`Defendants make available source code computers at the depositions of witnesses who testify about
`
`source code . . . in light of Defendants' concerns with respect to the request, and in the absence of
`
`any authority from IBM suggesting that this should be required.” (citations omitted)). Touchstream
`
`has not identified any decision from this Court adopting such a proposal in a contested situation.
`
`Moreover, Plaintiff’s provision would increase the burden on Google and its witnesses over
`
`the course of discovery. Google is already required to make available the stand-alone source code
`
`computer and a corresponding note-taking computer to Plaintiff, print out identified pages of source
`
`code, and deliver multiple copies to Touchstream. Now, Plaintiff is requesting that Google also
`
`provide potentially multiple source code computers for multiple fact and/or expert depositions.
`
`Touchstream claims in this brief that this will only be required for one or two witnesses, but its actual
`
`proposal is not so limiting and makes no exclusions for expert depositions. Electronic code review
`
`in the context of a deposition is also cumbersome, owing to lengthy delays while a large body of
`
`source code is being searched and creates logistical problems. Plaintiff’s proposal would require
`
`removal of any phones, laptops, and cameras from the deposition room—including those of the court
`
`reporter and videographer, who are not excepted. See Section 11(a). And unlike paper copies of
`
`source code, which can be identified with exhibit numbers, it is difficult to reflect on the record what
`
`electronic source code is being discussed. Finally, many of such depositions may also occur
`
`remotely due to ongoing concerns of COVID-19, making the logistics of such a request even more
`
`complex and uncertain, and it would be impossible to ensure the level of protection necessary for
`
`
`
`
`10
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 11 of 33
`
`the source code computer under Section 11(a). Thus, Touchstream’s request to go beyond the default
`
`Protective Order here should be denied.
`
`Section 13: Acquisition Bar
`
`III.
`
`
`Plaintiff’s Proposal
`Do not include Defendant’s proposal
`
`Defendant’s Proposal
`Absent written consent from the producing
`Party, any individual affiliated with the
`receiving Party who obtains, receives, has
`access to, or otherwise learns, in whole or in
`part, any other Party’s HIGHLY SENSITIVE
`MATERIAL under this Order shall not be
`involved in any activity related to: the (i) the
`acquisition of patents or patent applications
`relating to the Field of Invention or (ii) the
`advising or counseling clients regarding the
`same. This Acquisition Bar shall begin when
`such HIGHLY SENSITIVE MATERIAL is
`first received by the affected individual and
`shall end two (2) years after the conclusion of
`this Action, including any appeals.
`
`A.
`
`Defendant’s Position
`
`The Federal Circuit has recognized
`
`that, despite an attorney’s best efforts
`
`to
`
`compartmentalize separate cases and representations, “it is very difficult for the human mind to
`
`compartmentalize and selectively suppress information once learned, no matter how well-
`
`intentioned the effort may be to do so.” In re Deutsche Bank Tr. Co. Americas, 605 F.3d 1373, 1378
`
`(Fed. Cir. 2010) (citation omitted); see also In re Sibia Neurosciences, Inc., No. 525, 1997 WL
`
`688174 (Fed. Cir. 1997). When attorneys involved in litigation represent a client before the Patent
`
`Office, there is inherently a risk of disclosing defendant’s confidential information: “it is hard to
`
`conceive that there would be little or no risk of inadvertent disclosure when these same attorneys
`
`advise their client in matters regarding acquisitions of patents.” E-Contact Techs., LLC v. Apple,
`
`Inc., No. 1:11-cv-426, 2012 WL 11924448, at *2 (E.D. Tex. June 19, 2012); see also Telebuyer,
`
`
`
`
`11
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 12 of 33
`
`LLC v. Amazon.com, Inc., 2014 U.S. Dist. LEXIS 147049, at *20 (W.D. Wash. July 7, 2014) (“Patent
`
`acquisition creates the same risks of inadvertent use as patent prosecution, in that ‘litigation counsel
`
`may consciously or subconsciously use their knowledge of … confidential information to advise a
`
`client on which patents to acquire.’”).
`
`
`
`Courts have recognized that the rationale for prosecution bars also applies to acquisition bars.
`
`“Litigation counsel who have access to Google’s critical source code and other highly confidential
`
`information should not be permitted to consult with their client strategically under circumstances
`
`where an inadvertent disclosure of what they have seen at the defendant’s stand-alone computer
`
`could potentially be used to harm the defendant.” Inventor Holdings, LLC v. Google, Inc., No. 1:14-
`
`cv-186, 2014 WL 4369504, at *2 (D. Del. Aug. 27, 2014). Similarly, another court entered a
`
`disputed acquisition bar, reasoning that in exchange for “the disclosure of [defendant’s] confidential,
`
`‘crown jewel’ technology to opposing counsel,” an acquisition bar “prevents attorneys from—
`
`inadvertently or otherwise—relying on the confidential information when they advise other parties
`
`anticipating litigation against” the defendant. Catch A Wave Techs., Inc. v. Sirius XM Radio, Inc.,
`
`No. C 12-05791, 2013 WL 9868422, at *1 (N.D. Cal. Aug. 6, 2013).
`
`
`
`The acquisition bar will prevent Touchstream’s counsel, or other persons with access to
`
`Google’s highly sensitive materials (which includes the scope of documents consistent with the
`
`prosecution bar), from inadvertently using Google’s confidential information while advising clients
`
`on potential patents to acquire, which might be asserted against Google. Both this Court and the
`
`Eastern District of Texas have endorsed similar provisions in similar situations. See, e.g., Infogation
`
`Corporation, v. Google LLC, 6:20-cv-00366-ADA, Dkt. No. 47 at § 12; Multimedia Content
`
`Management LLC v. Dish Network LLC, 6:18-cv-00207-ADA, Dkt. No. 94 at 16; Eolas
`
`Technologies, Inc. v. Amazon.com, Inc., No. 15-01038, Dkt. Nos. 81, 82, 98. In balancing the
`
`
`
`
`12
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 13 of 33
`
`interests of both parties, the significant potential harm to Google outweighs the modest restriction
`
`an acquisition bar would place on Touchstream’s counsel and other designated persons with access
`
`to Google highly sensitive material. E-Contact Techs., 2012 WL 11924448, at *2 (“This Court finds
`
`that the potential harm of inadvertent disclosure outweighs the restriction imposed on counsel for
`
`Plaintiff. An acquisition bar should be included in the protective order.”); see also Unwired Planet
`
`LLC v. Apple Inc., No. 12-0505, 2013 WL 1501489, at *7 (D. Nev. Apr. 11, 2013) (finding that
`
`“good cause exists to include in the protective order the bar that Unwired’s outside counsel cannot
`
`use the confidential information obtained in this lawsuit for the purpose of giving advice on patent
`
`acquisitions”).
`
`B.
`
`Plaintiff’s Position
`
`The party seeking an acquisition bar carries the burden of showing good cause for its
`
`inclusion. In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373, 1378 (Fed. Cir. 2010)
`
`(addressing prosecution bars); Jenam Tech, LLC v. Samsung Elecs. Am., Inc., 4:19-cv-00250, 2020
`
`WL 757097, at *1-2 (E.D. Tex. Feb. 4, 2020) (applying same standard to acquisition bars). This
`
`burden is a heavy one, requiring the moving party to show “that the information designated to trigger
`
`the bar, the scope of activities prohibited by the bar, the duration of the bar, and the subject matter
`
`covered by the bar reasonably reflect the risk presented by the disclosure of proprietary competitive
`
`information.” In re Deutsche Bank, 605 F.3d at 1381. Whether this risk for disclosure exists is
`
`determined “by the facts on a counsel-by-counsel basis.” Id. at 1378. Before evaluating whether to
`
`grant an acquisition bar, a court must first be satisfied that the bar is triggered by the relevant kind
`
`of information. Id. at 1381.
`
`Google has not met its heavy burden to justify an acquisition bar here. The only risk Google
`
`has cited in support of its proposed bar is both generic and speculative: namely, that Touchstream
`
`
`
`
`13
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 14 of 33
`
`may inadvertently use “Google’s confidential information while advising clients on potential patents
`
`to acquire, which might be asserted against Google.” But Google has not named these “clients” or
`
`pointed to any particular facts to substantiate the alleged risk, which is fatal to its position. Id. at
`
`1378.
`
`Google further undercuts its position by relying primarily on disputes involving patent
`
`assertion entities whose business models involve acquiring patent portfolios for serial suits against
`
`the same defendants, which may create sufficient risk to justify including a bar. See Unwired Planet
`
`LLC v. Apple Inc., No. 3:12-CV-00505-RCJ, 2013 WL 1501489, at *3 (D. Nev. Apr. 11, 2013)
`
`(“Apple believes it would be highly prejudicial to allow Unwired—a patent holding company—to
`
`benefit from having Apple’s confidential information and to use that information to acquire patents
`
`to assert against Apple’s products.”); E–Contact Techs., LLC v. Apple, Inc., No. 1:11-CV-426
`
`LED/KFG, 2012 WL 11924448, at *1 (E.D. Tex. June 19, 2012) (“Defendants respond that Plaintiff
`
`is a non-practicing patent assertion entity which sues multiple defendants for infringement.”);
`
`Inventor Holdings, LLC v. Google, Inc., No. 1:14-CV-00186 (GMS), 2014 WL 4369504, at *1 (D.
`
`Del. Aug. 27, 2014) (“Given . . . the fact that the plaintiff is a non-practicing entity it is difficult to
`
`envision circumstances in which the inadvertent disclosure of highly confidential information would
`
`not be a risk.”); see also Eolas Techs., Inc. v. Amazon.com, Inc., No. 6:15-cv-01038 (E.D. Tex.),
`
`Dkt. 81 at 16 (describing how the plaintiff had “demonstrated a proclivity for filing continuation
`
`patent applications and then bringing successive lawsuits against individual defendants”). But
`
`Touchstream is not asserting acquired patents─it developed all three asserted patents in-house─and
`
`Google has pointed to no evidence that Touchstream has ever acquired a patent from a third party or
`
`ever intends to do so. Unlike those cases, then, this case does not involve any particularized risk that
`
`
`
`
`14
`
`

`

`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 15 of 33
`
`justifies the inclusion of a bar.2 Nor has Google pointed to any other clients of Touchstream’s
`
`counsel that might raise similar concerns. Yet Google insists on a broad bar that could cause
`
`Touchstream’s counsel substantial harm by prohibiting otherwise legitimate activities, such as
`
`providing routine advice to clients that has nothing to do with Google’s protected information.
`
`Jenam Tech is instructive here. In that case, a court in the Eastern District of Texas denied
`
`the defendant’s request to enter a nearly identical acquisition bar:
`
`Absent written consent from the Designating Party, any individual who receives
`access to HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY” or
`“HIGHLY CONFIDENTIAL – SOURCE CODE” information designated by the
`Designating Party shall not be involved in activity related to: (i) the acquisition of
`patents or patent applications (for any person or entity) relating to the field of the
`invention of the patents in suit (allowing two TCP-variant (or separate protocol)
`connection endpoints to cooperate in supporting a “keepalive” option and having
`an idle time period policy as described therein); or (ii) advising or counseling clients
`regarding the same. This Acquisition Bar shall begin when access to “HIGHLY
`CONFIDENTIAL
`– ATTORNEYS' EYES ONLY”
`or
`“HIGHLY
`CONFIDENTIAL – SOURCE CODE” information is first received by the affected
`individual and shall end two (2) years after final disposition of this action as
`provided herein.
`
`2020 WL 757097 at *1-2, n.1. The plaintiff in Jenam Tech had filed a previous patent suit against
`
`the same defendants (id. at *2), yet the court found even this fact insufficient to demonstrate the
`
`need for the acquisition bar and concluded that the defendants failed to “present[] evidence or
`
`argument necessary” for the court to weigh “the potential harm of inadvertent disclosure against the
`
`restriction upon counsel.” Id. Here, Google requests essentially the same acquisition bar as in Jenam
`
`Tech, yet provides even less justification for it. As i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket