`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`TOUCHSTREAM TECHNOLOGIES, INC.,
`
`
`
`
`
`GOOGLE LLC,
`
`
`
`
`
`
`
`
`
`
`
`Defendant.
`
`Plaintiff,
`
`
`
`v.
`
`§
`§
`§
`§
`§
`§
`§
`§
`§
`§
`
`
`
`
`
`Civil Case No. 6:21-cv-569-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`
`
`JOINT MOTION FOR ENTRY OF DISPUTED PROTECTIVE ORDER
`
`
`The parties jointly move for entry of a protective order. While the parties have reached
`
`agreement on most items, multiple items remain in dispute. The parties’ respective positions are set
`
`forth below. For each disputed item, the party seeking a departure from this Court’s default
`
`protective order has described its position first. A proposed protective order with the disputes
`
`highlighted is attached.
`
`Section 11(g): Encryption of Electronic Images of Source Code
`
`I.
`
`
`Plaintiff’s Proposal
`Do not include Defendant’s proposal.
`
`Defendant’s Proposal
`The receiving Party may create an electronic
`image of a selected portion of the Source Code
`Material only when the electronic file
`containing such image has been encrypted
`using commercially reasonable encryption
`software including password protection.
`
`Defendant’s Position
`A.
`At bottom, Google’s proposals in this submission concern reasonable security measures
`
`needed to protect the company’s sensitive source code and other confidential data. Plaintiff’s counter
`
`proposals instead trade off reasonable security measures in favor of minor conveniences. Source
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 2 of 33
`
`code and other confidential documents exchanged in this litigation pose a serious risk if leaked or
`
`breached, especially for a company like Google that faces constant threats.
`
`Google proposes that the Protective Order include a requirement that electronic images of
`
`Source Code Material be protected using commercially available and industry-standard techniques.
`
`In particular, while the parties have agreed that no electronic images of source code are allowed
`
`“except as necessary” pursuant to § 11(g), there is no restriction on how documents containing such
`
`source code may be transmitted (for example, by email or file sharing service). Google simply
`
`proposes that documents that include such sensitive electronic images be encrypted and password
`
`protected, so that if the document is received by an unintended recipient, the sensitive information
`
`will have some measure of protection.
`
`
`
`Source code is among the most important and confidential information that Google
`
`possesses. Drone Techs., Inc. v. Parrot S.A., 838 F.3d 1283, 1300 n.13 (Fed. Cir. 2016) (“[I]t is well
`
`recognized among lower courts that source code requires additional protections to prevent improper
`
`disclosure because it is often a company’s most sensitive and most valuable property.”). In
`
`electronic form, source code is inherently susceptible to rapid duplication and dissemination. If
`
`Google’s source code were to be exposed, even inadvertently, Google would suffer potentially
`
`devastating competitive harm.1 Id. (advising caution regarding the “significant consequences that
`
`might result from unauthorized or inadvertent disclosure” of source code). This is why courts are
`
`often protective of source code in electronic form, even barring such copies. See, e.g., Finjan, Inc.
`
`v. Cisco Sys., Inc., No. 5:17-cv-72-BLK-SVK, 2019 WL 667766, at *14–16 (N.D. Cal. Feb. 19,
`
`
`1 Despite the best efforts of attorneys and their staff, law firms, large and small, are still susceptible to data breaches or
`leaks, potentially exposing sensitive information. See, e.g., Amid BigLaw Data Attacks, Breaches Surge For Smaller
`Firms, June 15, 2022, available at https://www.law360.com/articles/1498395/amid-biglaw-data-attacks-breaches-
`surge-for-smaller-firms; The Top 11 Legal Industry Cyber Attacks, Arctic Wolf, March 29, 2022, available at
`https://arcticwolf.com/resources/blog/top-legal-industry-cyber-attacks.
`2
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 3 of 33
`
`2019) (“The Receiving Party shall not create any electronic copies or other images of the paper
`
`copies and shall not convert any information contained in the paper copies into any electronic format
`
`without the agreement of the Producing Party or further order of the Court.”); Rockstar Consortium
`
`US LP v. Google Inc., No. 2:31-cv-893, 2014 WL 5831041, at *6–7, 9 (E.D. Tex. June 19, 2014)
`
`(ordering that “the Receiving Party may not create electronic images, or any other images, of the
`
`Source Code,” except for filing in a sealed “Court document”).
`
`
`
`Google’s proposal seeks to further protect against inadvertent disclosure by requiring
`
`encryption and password protection. During the meet and confer process, Google explained that this
`
`provision merely requires using commercially available software included within Microsoft Word
`
`and Adobe Acrobat. Both programs (in addition to other commercially available software) can be
`
`used to apply passwords solely to documents that contain the electronic images. This does not
`
`impose an onerous burden on Plaintiff, and any burden is outweighed by the importance of
`
`maintaining the security of Defendant’s source code. See EPL Holdings, LLC v. Apple Inc., No. C-
`
`12-04306 JST (JSC), 2013 WL 2181584, at *7 (N.D. Cal. May 20, 2013) (concluding that an
`
`inconvenience to the plaintiff “does not outweigh the risk posed by creating electronic copies of
`
`source code unnecessarily”). Moreover, this only applies to a small subset of documents (as defined
`
`in the Protective Order) and any burden can be reduced by omitting any such electronic images in
`
`draft documents until final (while instead referencing production and line numbers in the drafts).
`
`With the increased risk created by electronic images of source code, additional protections are
`
`warranted here to help avoid inadvertent disclosure.
`
`B.
`
`Plaintiff’s Position
`
`A court may issue a protective order, upon a showing of good cause, “to protect a party or
`
`person from annoyance, embarrassment, oppression, or undue burden or expense.” Fed. R. Civ. P.
`
`
`
`
`3
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 4 of 33
`
`26(c)(1). The burden is on the moving party to show why disputed provisions in the protective order
`
`should be added. Jenam Tech, LLC v. Samsung Elecs. Am., Inc., 419CV00250ALMKPJ, 2020 WL
`
`757097, at *1 (E.D. Tex. Feb. 4, 2020). For a disputed provision to meet the “good cause”
`
`requirement, the moving party must show “the necessity of its issuance.” Morgan v. Parc Plaza
`
`Dev., L.P., 3:17-CV-0492-G-BK, 2018 WL 11211461, at *2 (N.D. Tex. Feb. 8, 2018). The moving
`
`party cannot rely on stereotyped and conclusory statements; rather, it must make “a particular and
`
`specific demonstration of fact.” In re Terra Int’l, Inc., 134 F.3d 302, 306 (5th Cir. 1998).
`
`For five of the six disputes addressed in this motion, Google seeks to modify this Court’s
`
`default protective order, meaning that Google has the burden to show why those extra protections
`
`are needed. But throughout this submission, Google relies on speculation and hypotheticals
`
`regarding potential harm without articulating actual case-specific facts giving rise to its concerns.
`
`More than just “minor” inconveniences, Google’s proposals would place cumbersome restrictions
`
`on Touchstream, and Google’s rank speculation does not justify the changes it seeks.
`
`Touchstream has already agreed to restrictions on source code reproduction that go well
`
`beyond this Court’s default provisions. The Court’s default order states that “no electronic copies or
`
`images of Source Code Material shall be made without prior written consent of the producing Party,
`
`except as necessary to create documents that, pursuant to the Court’s rules, procedures, and orders,
`
`must be filed or served electronically,” but Touchstream has further agreed to “only include such
`
`excerpts as are reasonably necessary for the purposes for which such part of the Source Code
`
`Material is used,” to refrain from including “images or copies of Source Code Material in
`
`correspondence between the parties,” and to label all electronic copies “CONFIDENTIAL –
`
`SOURCE CODE.” Ex. A at § 11(g). Now Google seeks to add another, more onerous provision,
`
`under which Touchstream’s counsel and experts will have to enter a password every single time they
`
`
`
`
`4
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 5 of 33
`
`open a draft of a document─such as an expert report or briefing on a dispositive motion─that
`
`contains even the tiniest fragment of Google’s source code. But Google has provided no “particular
`
`and specific demonstration of fact” to justify including this burdensome provision (see Terra Int’l,
`
`134 F.3d at 306), instead alleging in the most general terms that the provision is needed “to further
`
`protect against inadvertent disclosure.” Google cannot meet its burden with speculation and
`
`generalization.
`
`In an attempt to downplay the burden its addition would place on Touchstream’s counsel,
`
`Google argues that it would apply only to a small set of documents because the protective order
`
`already limits how source code can be produced. But those agreed-to protections (which already
`
`exceed this Court’s baseline) are sufficient, and Google cannot show that the disputed provision is
`
`needed by focusing only on the burden to Touchstream. United States v. Aetna Inc., 1:16-CV-01494,
`
`2016 WL 8738421, at *8 (D.D.C. Sept. 14, 2016) (“Relative degree of burdensomeness, however,
`
`is not the sole element of the ‘good cause’ standard; rather, an entity must provide specific examples
`
`of the feared harm in order to obtain additional protection.”). Because it has not pointed to any
`
`“specific examples” that might create a heightened risk of disclosure, “for example, that any party
`
`is being careless with confidential information, or that any party is unusually vulnerable to electronic
`
`hacking or similar threats” (id.), Google further fails to meet its burden.
`
`Nor does Google find support in the authority it cites. EPL Holdings does not address
`
`encryption at all; rather, the court in that case restricted the creation of electronic copies, finding that
`
`“[t]he restrictions ensure that only those electronic copies that are absolutely necessary will be made
`
`and transferred.” EPL Holdings, LLC v. Apple Inc., C-12-04306 JST JSC, 2013 WL 2181584, at *6
`
`(N.D. Cal. May 20, 2013). Here, Touchstream has already agreed to additional provisions, not in the
`
`Court’s default order, that ensure that only necessary copies are made, as described above. And in
`
`
`
`
`5
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 6 of 33
`
`the two cases Google cites that actually address encryption, the parties had already agreed to the
`
`encryption provisions, so there was never any dispute for the court to decide. See, e.g., Finjan, Inc.
`
`v. Cisco Sys., Inc., No. 5:17-cv-72-BLK-SVK, 2019 WL 667766, at *14–16 (N.D. Cal. Feb. 19,
`
`2019); Rockstar Consortium US LP v. Google Inc., No. 2:31-cv-893, 2014 WL 5831041, at *6–7, 9.
`
`In short, Google has not offered any case law supporting its position. It has failed to meet its burden
`
`for including this provision, and the Court should deny its request accordingly.
`
`Section 11(q): Deposition Source Code Computer
`
`II.
`
`
`Defendant’s Proposal
`Do not include Plaintiff’s proposal
`
`Plaintiff’s Proposal
`Upon request by the receiving Party as set
`forth herein, the producing Party shall make a
`secured, stand-alone computer with a
`searchable version of the produced Source
`Code Material (“Deposition Computer”)
`available at any deposition that relates to the
`produced Source Code Material. The
`producing Party shall inform the receiving
`Party of what tools will be installed on the
`Deposition Computer. The receiving Party
`shall notify the producing Party at least seven
`(7) calendar days in advance of the deposition
`that they intend to make use of the Source
`Code Material. The receiving Party may
`request that additional commercially available
`software tools for viewing and searching
`Source Code Material be installed on the
`Deposition Computer, provided, however, that
`(a) the receiving party possesses an appropriate
`license to such software tools; and (b) there is
`a lack of a reasonable objection to such
`software tools by the producing party. The
`receiving Party must provide the producing
`Party with a CD, DVD, or e-mail containing
`such licensed additional software tool(s) at
`least five (5) business days in advance of the
`deposition.
`
`A.
`
`Plaintiff’s Position
`
`
`
`
`6
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 7 of 33
`
`Under Touchstream’s proposal, Google─as the party producing source code─would bring a
`
`computer with a searchable version of all produced source code to depositions of witnesses
`
`knowledgeable about that code. Touchstream does not anticipate deposing more than one or two
`
`source code witnesses, meaning any burdens to Google caused by this provision will be limited in
`
`scope.
`
`Touchstream requests this deposition computer because it cannot anticipate when a source
`
`code deponent will need to see portions of the code not included in Touchstream’s printout requests,
`
`for instance to provide proper context in answering questions about the printed portions.
`
`Touchstream and its source code expert(s) will make best efforts to request printouts of all relevant
`
`portions of the source code, but Google’s own witnesses are most familiar with Google’s code, and
`
`they may find it necessary to view unprinted portions of the code to give the most complete answers
`
`to Touchstream’s questions in depositions. By having the source code available in the deposition
`
`room in a searchable format, Google’s source code witness(es) can efficiently locate and identify
`
`any other portions of the source code needed to answer questions as completely and accurately as
`
`possible. Therefore, to get the full benefit of Touchstream’s limited time with Google’s source code
`
`witnesses, and to minimize the chances that Touchstream will need to reconvene a deposition after
`
`the witness has refreshed his or her memory outside of the deposition, Touchstream respectfully
`
`requests that the Court include this provision in the Protective Order.
`
`While Touchstream understands Google’s sensitivity around source code, Google will have
`
`complete control over the security measures it chooses to protect the requested computer and over
`
`the manner of transport. Google may even choose to use the same machine that it provides for
`
`Touchstream’s source code inspections, as covered elsewhere in § 10 of the parties’ proposed
`
`protective order, eliminating the need to set up a new machine with new security measures. Any
`7
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 8 of 33
`
`burdens associated with setting up and transporting this computer will be outweighed by the benefits
`
`to both parties in allowing Touchstream to elicit full responses to its questions during any source
`
`code deposition.
`
`Touchstream’s requested deposition computer will likely be at issue in only one or two
`
`depositions, and it has the potential to save the parties substantial resources by ensuring that
`
`Google’s witnesses have access to the source code they need to give full and complete answers.
`
`Touchstream therefore respectfully requests inclusion of this provision.
`
`B.
`
`Defendant’s Position
`
`Plaintiff requests that Google provide an additional source code computer available for any
`
`deposition at Touchstream’s request, outside the protections of the locked source code review room
`
`(see § 11(a)) defined in the Protective Order. Not only does this provision significantly increase
`
`Google's logistical burden in preparing for depositions, but the security risks associated with such
`
`an approach far outweigh any alleged benefit to Plaintiff. Google would be required to expose its
`
`valuable source code on yet another computer in an unsecured environment with even more non-
`
`parties in the room (including a court reporter and videographer).
`
`
`
`The parties have already agreed to print reasonable requests for source code relevant to the
`
`case–a process that respects the security concerns of source code while also granting the receiving
`
`Party with advance access to the code before depositions. Under the undisputed provisions of the
`
`Protective Order, Plaintiff is able to request reasonable print outs of source code, receive the printed
`
`pages of source code promptly, and then prepare notes or other work product as needed independent
`
`of source code review and use that printed source code during depositions. However, the agreed-
`
`upon Protective Order is clear that source code review is intended to take place within the locked
`
`room with the stand-alone computer. In contrast, Plaintiff’s proposal seeks to obviate the
`8
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 9 of 33
`
`requirement that Touchstream review source code in the first instance in a secured environment and
`
`allows it to examine Google witnesses on any portion of source code regardless of the code’s
`
`designation and without the added security of the locked room. Beyond just a security risk for
`
`current employee witnesses, Plaintiff’s proposal would be even more worrisome for potential
`
`former-employee witnesses. To the extent Touchstream demands to question third parties about the
`
`source code, such a request goes beyond the bounds of traditional limits on discovery.
`
`
`
`Touchstream claims that it requires this computer so that it can examine Google fact
`
`witnesses on source code that it did not previously identify and print during the Source Code Review.
`
`However, Touchstream fails to explain why its experts and source code reviewers cannot obtain the
`
`necessary Source Code Printouts during the required review. Rather, Touchstream claims that
`
`Google’s witnesses are the most familiar with Google’s code. But that does not explain why the
`
`Court’s default provision should be watered down to offer less source code security in this case, or
`
`why this particular case requires use of a source code computer in addition to Source Code Printouts.
`
`The point of Source Code Printouts, among other things, is to facilitate use of source code outside
`
`of the secured room, safely and efficiently, including for depositions. In fact, this additional source
`
`code discovery proposed by Touchstream is exactly what the Protective Order provisions on source
`
`code seek to curtail. And any inconvenience to Touchstream at depositions should be outweighed
`
`by the importance of maintaining the security of Defendant’s source code. Indeed, use of a source
`
`code computer within a deposition would undermine the heightened security restrictions for the
`
`source code computer and circumvent the agreed upon page limits on Source Code Printouts. See,
`
`e.g., Trans Video Electronics Ltd. v. Time Warner Cable Inc., No. 1:12-cv-01740-LPS, D.I. 38 at 1
`
`(D. Del. Jan. 22, 2015) (holding “Plaintiff's proposal to require a source-code computer at
`
`depositions is DENIED, as it is unnecessary, burdensome (possibly requiring Defendants to set up a
`
`
`
`
`9
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 10 of 33
`
`secure computer at multiple sites), and the risk of harm to Defendants outweighs any incremental
`
`benefit to Plaintiff, particularly given the allowance for printing of source code, to which the parties
`
`have already agreed.”); Int’l Bus. Machines Corp. v. The Priceline Grp. Inc, No. 1:15-cv-00137-
`
`LPS, 2016 WL 6305981, at *2 (D. Del. Sept. 29, 2016) (denying “request that the Court order that
`
`Defendants make available source code computers at the depositions of witnesses who testify about
`
`source code . . . in light of Defendants' concerns with respect to the request, and in the absence of
`
`any authority from IBM suggesting that this should be required.” (citations omitted)). Touchstream
`
`has not identified any decision from this Court adopting such a proposal in a contested situation.
`
`Moreover, Plaintiff’s provision would increase the burden on Google and its witnesses over
`
`the course of discovery. Google is already required to make available the stand-alone source code
`
`computer and a corresponding note-taking computer to Plaintiff, print out identified pages of source
`
`code, and deliver multiple copies to Touchstream. Now, Plaintiff is requesting that Google also
`
`provide potentially multiple source code computers for multiple fact and/or expert depositions.
`
`Touchstream claims in this brief that this will only be required for one or two witnesses, but its actual
`
`proposal is not so limiting and makes no exclusions for expert depositions. Electronic code review
`
`in the context of a deposition is also cumbersome, owing to lengthy delays while a large body of
`
`source code is being searched and creates logistical problems. Plaintiff’s proposal would require
`
`removal of any phones, laptops, and cameras from the deposition room—including those of the court
`
`reporter and videographer, who are not excepted. See Section 11(a). And unlike paper copies of
`
`source code, which can be identified with exhibit numbers, it is difficult to reflect on the record what
`
`electronic source code is being discussed. Finally, many of such depositions may also occur
`
`remotely due to ongoing concerns of COVID-19, making the logistics of such a request even more
`
`complex and uncertain, and it would be impossible to ensure the level of protection necessary for
`
`
`
`
`10
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 11 of 33
`
`the source code computer under Section 11(a). Thus, Touchstream’s request to go beyond the default
`
`Protective Order here should be denied.
`
`Section 13: Acquisition Bar
`
`III.
`
`
`Plaintiff’s Proposal
`Do not include Defendant’s proposal
`
`Defendant’s Proposal
`Absent written consent from the producing
`Party, any individual affiliated with the
`receiving Party who obtains, receives, has
`access to, or otherwise learns, in whole or in
`part, any other Party’s HIGHLY SENSITIVE
`MATERIAL under this Order shall not be
`involved in any activity related to: the (i) the
`acquisition of patents or patent applications
`relating to the Field of Invention or (ii) the
`advising or counseling clients regarding the
`same. This Acquisition Bar shall begin when
`such HIGHLY SENSITIVE MATERIAL is
`first received by the affected individual and
`shall end two (2) years after the conclusion of
`this Action, including any appeals.
`
`A.
`
`Defendant’s Position
`
`The Federal Circuit has recognized
`
`that, despite an attorney’s best efforts
`
`to
`
`compartmentalize separate cases and representations, “it is very difficult for the human mind to
`
`compartmentalize and selectively suppress information once learned, no matter how well-
`
`intentioned the effort may be to do so.” In re Deutsche Bank Tr. Co. Americas, 605 F.3d 1373, 1378
`
`(Fed. Cir. 2010) (citation omitted); see also In re Sibia Neurosciences, Inc., No. 525, 1997 WL
`
`688174 (Fed. Cir. 1997). When attorneys involved in litigation represent a client before the Patent
`
`Office, there is inherently a risk of disclosing defendant’s confidential information: “it is hard to
`
`conceive that there would be little or no risk of inadvertent disclosure when these same attorneys
`
`advise their client in matters regarding acquisitions of patents.” E-Contact Techs., LLC v. Apple,
`
`Inc., No. 1:11-cv-426, 2012 WL 11924448, at *2 (E.D. Tex. June 19, 2012); see also Telebuyer,
`
`
`
`
`11
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 12 of 33
`
`LLC v. Amazon.com, Inc., 2014 U.S. Dist. LEXIS 147049, at *20 (W.D. Wash. July 7, 2014) (“Patent
`
`acquisition creates the same risks of inadvertent use as patent prosecution, in that ‘litigation counsel
`
`may consciously or subconsciously use their knowledge of … confidential information to advise a
`
`client on which patents to acquire.’”).
`
`
`
`Courts have recognized that the rationale for prosecution bars also applies to acquisition bars.
`
`“Litigation counsel who have access to Google’s critical source code and other highly confidential
`
`information should not be permitted to consult with their client strategically under circumstances
`
`where an inadvertent disclosure of what they have seen at the defendant’s stand-alone computer
`
`could potentially be used to harm the defendant.” Inventor Holdings, LLC v. Google, Inc., No. 1:14-
`
`cv-186, 2014 WL 4369504, at *2 (D. Del. Aug. 27, 2014). Similarly, another court entered a
`
`disputed acquisition bar, reasoning that in exchange for “the disclosure of [defendant’s] confidential,
`
`‘crown jewel’ technology to opposing counsel,” an acquisition bar “prevents attorneys from—
`
`inadvertently or otherwise—relying on the confidential information when they advise other parties
`
`anticipating litigation against” the defendant. Catch A Wave Techs., Inc. v. Sirius XM Radio, Inc.,
`
`No. C 12-05791, 2013 WL 9868422, at *1 (N.D. Cal. Aug. 6, 2013).
`
`
`
`The acquisition bar will prevent Touchstream’s counsel, or other persons with access to
`
`Google’s highly sensitive materials (which includes the scope of documents consistent with the
`
`prosecution bar), from inadvertently using Google’s confidential information while advising clients
`
`on potential patents to acquire, which might be asserted against Google. Both this Court and the
`
`Eastern District of Texas have endorsed similar provisions in similar situations. See, e.g., Infogation
`
`Corporation, v. Google LLC, 6:20-cv-00366-ADA, Dkt. No. 47 at § 12; Multimedia Content
`
`Management LLC v. Dish Network LLC, 6:18-cv-00207-ADA, Dkt. No. 94 at 16; Eolas
`
`Technologies, Inc. v. Amazon.com, Inc., No. 15-01038, Dkt. Nos. 81, 82, 98. In balancing the
`
`
`
`
`12
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 13 of 33
`
`interests of both parties, the significant potential harm to Google outweighs the modest restriction
`
`an acquisition bar would place on Touchstream’s counsel and other designated persons with access
`
`to Google highly sensitive material. E-Contact Techs., 2012 WL 11924448, at *2 (“This Court finds
`
`that the potential harm of inadvertent disclosure outweighs the restriction imposed on counsel for
`
`Plaintiff. An acquisition bar should be included in the protective order.”); see also Unwired Planet
`
`LLC v. Apple Inc., No. 12-0505, 2013 WL 1501489, at *7 (D. Nev. Apr. 11, 2013) (finding that
`
`“good cause exists to include in the protective order the bar that Unwired’s outside counsel cannot
`
`use the confidential information obtained in this lawsuit for the purpose of giving advice on patent
`
`acquisitions”).
`
`B.
`
`Plaintiff’s Position
`
`The party seeking an acquisition bar carries the burden of showing good cause for its
`
`inclusion. In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373, 1378 (Fed. Cir. 2010)
`
`(addressing prosecution bars); Jenam Tech, LLC v. Samsung Elecs. Am., Inc., 4:19-cv-00250, 2020
`
`WL 757097, at *1-2 (E.D. Tex. Feb. 4, 2020) (applying same standard to acquisition bars). This
`
`burden is a heavy one, requiring the moving party to show “that the information designated to trigger
`
`the bar, the scope of activities prohibited by the bar, the duration of the bar, and the subject matter
`
`covered by the bar reasonably reflect the risk presented by the disclosure of proprietary competitive
`
`information.” In re Deutsche Bank, 605 F.3d at 1381. Whether this risk for disclosure exists is
`
`determined “by the facts on a counsel-by-counsel basis.” Id. at 1378. Before evaluating whether to
`
`grant an acquisition bar, a court must first be satisfied that the bar is triggered by the relevant kind
`
`of information. Id. at 1381.
`
`Google has not met its heavy burden to justify an acquisition bar here. The only risk Google
`
`has cited in support of its proposed bar is both generic and speculative: namely, that Touchstream
`
`
`
`
`13
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 14 of 33
`
`may inadvertently use “Google’s confidential information while advising clients on potential patents
`
`to acquire, which might be asserted against Google.” But Google has not named these “clients” or
`
`pointed to any particular facts to substantiate the alleged risk, which is fatal to its position. Id. at
`
`1378.
`
`Google further undercuts its position by relying primarily on disputes involving patent
`
`assertion entities whose business models involve acquiring patent portfolios for serial suits against
`
`the same defendants, which may create sufficient risk to justify including a bar. See Unwired Planet
`
`LLC v. Apple Inc., No. 3:12-CV-00505-RCJ, 2013 WL 1501489, at *3 (D. Nev. Apr. 11, 2013)
`
`(“Apple believes it would be highly prejudicial to allow Unwired—a patent holding company—to
`
`benefit from having Apple’s confidential information and to use that information to acquire patents
`
`to assert against Apple’s products.”); E–Contact Techs., LLC v. Apple, Inc., No. 1:11-CV-426
`
`LED/KFG, 2012 WL 11924448, at *1 (E.D. Tex. June 19, 2012) (“Defendants respond that Plaintiff
`
`is a non-practicing patent assertion entity which sues multiple defendants for infringement.”);
`
`Inventor Holdings, LLC v. Google, Inc., No. 1:14-CV-00186 (GMS), 2014 WL 4369504, at *1 (D.
`
`Del. Aug. 27, 2014) (“Given . . . the fact that the plaintiff is a non-practicing entity it is difficult to
`
`envision circumstances in which the inadvertent disclosure of highly confidential information would
`
`not be a risk.”); see also Eolas Techs., Inc. v. Amazon.com, Inc., No. 6:15-cv-01038 (E.D. Tex.),
`
`Dkt. 81 at 16 (describing how the plaintiff had “demonstrated a proclivity for filing continuation
`
`patent applications and then bringing successive lawsuits against individual defendants”). But
`
`Touchstream is not asserting acquired patents─it developed all three asserted patents in-house─and
`
`Google has pointed to no evidence that Touchstream has ever acquired a patent from a third party or
`
`ever intends to do so. Unlike those cases, then, this case does not involve any particularized risk that
`
`
`
`
`14
`
`
`
`Case 6:21-cv-00569-ADA Document 74 Filed 07/18/22 Page 15 of 33
`
`justifies the inclusion of a bar.2 Nor has Google pointed to any other clients of Touchstream’s
`
`counsel that might raise similar concerns. Yet Google insists on a broad bar that could cause
`
`Touchstream’s counsel substantial harm by prohibiting otherwise legitimate activities, such as
`
`providing routine advice to clients that has nothing to do with Google’s protected information.
`
`Jenam Tech is instructive here. In that case, a court in the Eastern District of Texas denied
`
`the defendant’s request to enter a nearly identical acquisition bar:
`
`Absent written consent from the Designating Party, any individual who receives
`access to HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY” or
`“HIGHLY CONFIDENTIAL – SOURCE CODE” information designated by the
`Designating Party shall not be involved in activity related to: (i) the acquisition of
`patents or patent applications (for any person or entity) relating to the field of the
`invention of the patents in suit (allowing two TCP-variant (or separate protocol)
`connection endpoints to cooperate in supporting a “keepalive” option and having
`an idle time period policy as described therein); or (ii) advising or counseling clients
`regarding the same. This Acquisition Bar shall begin when access to “HIGHLY
`CONFIDENTIAL
`– ATTORNEYS' EYES ONLY”
`or
`“HIGHLY
`CONFIDENTIAL – SOURCE CODE” information is first received by the affected
`individual and shall end two (2) years after final disposition of this action as
`provided herein.
`
`2020 WL 757097 at *1-2, n.1. The plaintiff in Jenam Tech had filed a previous patent suit against
`
`the same defendants (id. at *2), yet the court found even this fact insufficient to demonstrate the
`
`need for the acquisition bar and concluded that the defendants failed to “present[] evidence or
`
`argument necessary” for the court to weigh “the potential harm of inadvertent disclosure against the
`
`restriction upon counsel.” Id. Here, Google requests essentially the same acquisition bar as in Jenam
`
`Tech, yet provides even less justification for it. As i