throbber
Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 1 of 12
`

`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`JAWBONE INNOVATIONS, LLC,
`Plaintiff,
`
`v.
`APPLE INC.,
`
`Defendant.
`
`Case No. 6:21-CV-00984-ADA
`
`PATENT CASE
`
`JURY TRIAL DEMANDED
`
`FILED UNDER SEAL
`
`
`APPLE’S RESPONSE TO JAWBONE’S OPPOSED MOTION FOR ENTRY OF
`DISPUTED PROTECTIVE ORDER
`
`
`
`
`I.
`
`INTRODUCTION
`
`Defendant Apple Inc. (“Apple”) respectfully requests that this Court enter Apple’s
`
`Proposed Protective Order (Exhibit 1) because it balances Apple’s need to safeguard its source
`
`code and highly confidential information with ensuring fair and available access to discovery to
`
`Plaintiff Jawbone Innovations, LLC (“Jawbone”). Indeed, Apple was the first to initiate
`
`negotiations for a fair protective order in February so that Apple could securely and timely produce
`
`its confidential information to Jawbone. Yet Jawbone and its counsel refused to negotiate in good
`
`faith. Jawbone declared impasse after just one meet and confer and refused all further attempts to
`
`narrow the dispute. In doing so, Plaintiff also reneged on earlier compromises in favor of a new
`
`proposal on which it is refusing to further confer. Plaintiff’s counsel, Fabricant, is taking the same
`
`unreasonable positions with respect to Apple in its other active case, RFCyber Corp. v. Apple Inc.
`
`(Case No. 6:21-cv-00916-ADA). (Exhibit 2.)
`
`Adopting Apple’s Protective Order is not only appropriate given the sensitivity of Apple’s
`
`confidential information at issue in this matter, but it would send a clear message to Jawbone—
`

`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 2 of 12
`

`
`and to future litigants—that parties should negotiate in good faith over protective order provisions
`
`tailored to the individual needs of each case. And, in doing so, deter Jawbone (for the remainder
`
`of this matter) and future litigants from refusing all attempts to engage in meaningful meet and
`
`confer efforts and simply declaring impasse at any and all deviations from the default protective
`
`order. Therefore, and for the reasons set forth below, this Court should adopt Apple’s proposed
`
`protective order, attached as Exhibit 1.1
`
`II.
`
`ARGUMENT
`
`Apple’s proposed protective order fairly balances Apple’s need to safeguard its source code
`
`and highly confidential information with its discovery obligations. The Court’s default protective
`
`order is the foundation for Apple’s proposal, and the additional protections and clarifications in
`
`Apple’s proposal further ensure secure and efficient access to confidential information in this
`
`matter for both Apple and Jawbone. Apple’s proposal is not “replete with restrictions that would
`
`make discovery unduly burdensome, if not impossible.” Dkt. 40 at 3. Apple’s proposed provisions
`
`reflect the real-world restrictions and protections Apple employs for access to and review of its
`
`source code outside of litigation. See Declaration of Robin Goldberg (Exhibit 4, hereinafter
`
`“Goldberg Decl.”) Apple’s proposed additions are reasonable and indeed similar provisions have
`
`been agreed to in other cases before this Court. See, e.g., Koss Corp. v. Apple Inc., Case No. 20-
`
`
`1 A redline version reflecting modifications to the Court’s default order is attached as Exhibit 3.
`Apple has struck provision 5(d) that was in previous proposals sent to Jawbone. Provision 5(d)
`provided that “CONFIDENTIAL” documents, information, and material could be disclosed to:
`“Up to and including three (3) designated representatives of the Receiving Party, who may be,
`but need not be, in-house counsel for the Receiving Party, as well as their immediate paralegals
`and staff, to whom disclosure is reasonably necessary for this case, provided that: (a) each such
`person has agreed to be bound by the provisions of the Protective Order by signing a copy of
`Exhibit 1; and (b) no unresolved objections to such disclosure exist after proper notice has been
`given to all Parties.” Apple does not know whether Jawbone disputes the deletion.
`
`2
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 3 of 12
`

`
`cv-00665-ADA, Dkt. No. 70; Fintiv, Inc. v. Apple, Inc., Case No. 18-cv-372-ADA. Apple’s
`
`versions of the following disputed provisions are fair and warranted.
`
`A. Section 10—Source Code Security
`
`
`
`Apple’s revolutionary products outperform competitors due in large part to its trade secret-
`
`protected source code. (Goldberg Decl. ¶¶ 3, 6.) Apple invested billions of dollars in R&D to
`
`create and maintain a business model built on its novel integration of software and hardware.
`
`(Goldberg Decl. ¶ 5.) Apple’s proposed safeguards are commensurate with the level of security
`
`that Apple employs internally to protect its core assets from inadvertent disclosure. (Goldberg
`
`Decl. ¶¶ 6,7.) Jawbone’s proposal unjustifiably risks disclosure of Apple’s source code, a risk that
`
`is especially pronounced given the broad scope of Jawbone’s infringement allegations, which
`
`accuse nearly every Apple product of infringing the nine patents in suit, and resulting broad scope
`
`of source code produced. (Exhibit 5 at 2-3 (identifying various versions of the iPhone, AirPods,
`
`HomePod, and Mac products).)
`
`Sections 10(b), (d)-(f) safeguard Apple’s source code during inspection. Despite the fact
`
`Apple’s proposal accommodates Jawbone’s request for peripheral devices to be provided with the
`
`source code machine, Jawbone still complains, without basis, about Apple’s provisions for
`
`notification regarding the types of source code review tools that Jawbone prefers to use. The form
`
`order requires a “stand-alone” computer connected to a printer, which Apple is offering. Apple’s
`
`draft proposal further accommodates Jawbone’s request that the review machine “have USB ports
`
`enabled for the use of peripheral devices.” (See Exhibit 1.) Section 10(b) clarifies the machine
`
`will be equipped with a screen, keyboard, and mouse. (Id.; Goldberg Decl. ¶ 13.) Section 10(d)
`
`requires Apple to install source code review tools on the machine that are presently used in the
`
`ordinary course of business. With respect to requests for additional software tools, Apple will not
`
`3
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 4 of 12
`

`
`“reject any tool for any reason” (Dkt. 40 at 5) because “approval shall not be unreasonably
`
`withheld.” (Ex. 1 at § 10(d)). Jawbone anticipates using “standard tools,” so Apple’s proposal
`
`should be a non-issue for Jawbone. Moreover, Jawbone did not explain why it would be
`
`burdensome to identify desired review tools 10 days in advance of its review. The notice period
`
`is necessary to allow Apple a fair opportunity to evaluate the security risk posed by the requested
`
`applications and install the applications on the source code machine. Sections 10(e)-(f) ban
`
`recordable devices in the source code review room to prevent the creation of electronic copies of
`
`source code, and the provisions mirror protections Apple has implemented internally. (Goldberg
`
`Decl. ¶ 10.) Jawbone offers no good reason why Apple should compromise its established security
`
`protocols.
`
`
`
`Section 10(k), contrary to Jawbone’s misreading, allows an expert’s “direct reports and
`
`other support personnel” (Dkt. 40 at 6) to access the source code, so long as Jawbone discloses
`
`those personnel and secures prior written consent. (Section 10(k)(vi)). This approach is consistent
`
`both with Apple’s internal policy of limiting access to individuals on a “need-to-know” basis
`
`(Goldberg Decl. ¶¶ 8, 9) and with the form Protective Order at footnote 2 to Section 11(e), which
`
`requires “personnel helping in the analysis of Source Code Material shall be disclosed pursuant to
`
`Paragraph 5(e).” In sum, there is no real dispute regarding this provision.
`
`
`
`Sections 10(l), (m) reduce risk of inadvertent disclosure of source code material in Court
`
`filings and discovery correspondence. Jawbone contends that the safeguards make written
`
`discovery and court filings “practically impossible.” Dkt. 40 at 4-5. But Section 10(l) merely
`
`requires a meet and confer to agree on a procedure “as to how to make such a [Court] filing while
`
`protecting the confidentiality of the Source Code” and limits the number of continuous blocks of
`
`source code to 5 pages for inclusion in filings or expert reports. Jawbone’s position that Section
`
`4
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 5 of 12
`

`
`10(l) poses an “unnecessary burden” (Dkt. 40 at 5) ignores the consequence of source code
`
`appearing on PACER, where it is instantly available to the general public, which would be near-
`
`impossible to cure. And Jawbone’s concerns about Section 10(m) hindering discovery
`
`correspondence are unfounded. Section 10(m) prohibits the inclusion of “Source Code Material”
`
`in party correspondence, including Hardware Description Language (HDL), Register Transfer
`
`Level (RTL) and Computer Aided Design (CAD) files that describe the hardware design of
`
`components in Apple’s products, as Apple treats this information as akin to source code.
`
`(Goldberg Decl. ¶ 4.) Section 8, however, excludes functions, parameters, file names, path
`
`structures, and other “Source Code-adjacent material” from the definition of “Source Code
`
`Material.” (Exhibit 1 at 9 n.6.) The parties are free to use “Source Code-adjacent material” as
`
`shorthand in discovery correspondence to communicate effectively about source code without
`
`risking exposure of the source code itself.
`
`
`
`Sections 10(n), (o), (v) reduce the risk of inadvertent disclosure by limiting the number
`
`and nature of source code copies. Section 10(n) prohibits making electronic copies of source code
`
`without prior written consent, except as provided in Section 10(l). Section 10(l) limits the number
`
`of printouts to a “reasonable number” that presumptively does not exceed 750 pages.2 Should the
`
`parties disagree about a “reasonable number” of pages to be printed upon request, the provision
`
`requires the “Receiving Party to demonstrate that such printed portions are no more than is
`
`reasonably necessary for a permitted purpose and not merely printed for the purposes of review
`
`and analysis elsewhere.” Having the “Receiving Party” explain its need for printouts beyond the
`
`presumptive limit removes speculation over the Receiving Party’s motives. Jawbone glosses over
`
`
`2 Apple has agreed to increase its previously proposed 200 page presumptive limit to 750 pages.
`This change is reflected in Apple’s proposed protective order (Exhibit 1, § 10(o).).
`
`5
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 6 of 12
`

`
`Apple’s legitimate interests in reducing the risk of inadvertent disclosure by limiting the amount
`
`of continuous blocks of code and instead asserts that Apple should not be allowed to “dictate the
`
`amount of source code on which a party relies on to prove their case.” (Dkt. 40 at 5-6.) Jawbone’s
`
`position is at odds with this Court’s recognition that plaintiffs do not enjoy unlimited source code
`
`printouts. See Verain, LLC v. Micron Tech, Inc., No. 6:21-cv-487-ADA, slip op. at 1, 9 (W.D.
`
`Tex. Apr. 20, 2022) (granting source code printouts in excess of the agreed limits only after
`
`plaintiff identified specific code that it required after completing four full days of in-person
`
`review).
`
`
`
`Section 10(q) states “no expectations of confidentiality for any items left in the [review
`
`room] following each inspection session,” to clarify that Apple will inspect abandoned materials
`
`in the secure source code room to determine what they are and ensure that they are appropriately
`
`secured.
`
`
`
`Section 10(t) assigns to Apple the expense and burden of securely transporting the source
`
`code to a deposition. Because the printouts brought to the deposition are not released to Jawbone,
`
`the copies do not count against the total number of allotted pages. Jawbone’s “work product”
`
`(Dkt. 40 at 7) complaint rings hollow because parties often rely in deposition on documents
`
`identified or otherwise prepared by the other side. Similarly, Jawbone is wrong to contend that
`
`allowing Apple fair notice of the source code Jawbone needs for the deposition would prejudice
`
`Jawbone. If anything, Jawbone benefits from a fact witness prepared to testify on specific source
`
`code files Jawbone is interested in. Finally, Jawbone’s contention that “it is also impractical” to
`
`require 10 days of notice because it may not even know which set of source code it plans to use
`
`defies logic. (Dkt. 40 at 7.) Jawbone must have identified what it contends to be the relevant
`
`source code by the time it serves final infringement contentions on September 21, 2022. (Dkt. 23.)
`
`6
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 7 of 12
`

`
`That leaves Jawbone five months until the close of fact discovery to identify the set of source code
`
`it plans to use in each deposition.
`
`B. Section 1—Confidentiality Designations
`
`Section 1(b) does not “presumptively deem all deposition transcripts” as confidential for
`
`“no good reason.” (Dkt. 40 at 9.) Rather, Section 1(b) provides a time-limited 30-day grace period
`
`to designate a transcript as confidential if there is an inadvertent failure to designate a deposition
`
`transcript as confidential on the record. Given the sensitive nature of the subject matter covered
`
`during depositions, this is an appropriate safeguard that reduces the risk of inadvertent
`
`dissemination of confidential deposition transcripts.
`
`Section 1(d) provides a safeguard against the inadvertent dissemination of native files or
`
`documents by (1) requiring the parties to affix a legend corresponding to the confidentiality
`
`designation to any printed native file and (2) providing a copy of said printed document to the
`
`Producing Party for confirmation that the information in the document has not been altered.
`
`Notably, this provision would only apply when native files are printed “for use at a deposition” or
`
`“for provision in printed form to an expert or consultant,” and Jawbone fails to explain how these
`
`steps require the “disclos[ure] [of] its work product.” (Dkt. 40 at 8.)
`
`C. Section 6—“CONFIDENTIAL” Information
`
`Section 6 ensures documents containing confidential
`
`information are marked
`
`“CONFIDENTIAL.” Jawbone does not explain how this simple clarification “creates the
`
`possibility of a party attempting to designate publicly available documents.” (Dkt. 40 at 10.)
`
`Section 6 applies only to “documents, information, or material that contain or reflect confidential,
`
`proprietary, and/or commercially sensitive information.”
`
`7
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 8 of 12
`

`
`D. Sections 9(b), 11, 12 —Disclosure of “CONFIDENTIAL – ATTORNEYS’
`EYES ONLY” Information to Experts
`
`Section 9(b) is consistent with Apple’s internal policies concerning access to highly
`
`sensitive material, which limits access to known individuals on a “need-to-know” basis to reduce
`
`the risk of inadvertent dissemination. (Goldberg Decl. ¶ 8.) Jawbone, on the other hand, proposes
`
`giving consultants and experts indiscriminate and unfettered access to highly sensitive material,
`
`even before the consultant or expert has agreed to be bound by the operative Protective Order.
`
`Section 11 proposes modestly increasing the default timetable to object to consultants or
`
`experts from 10 to 14 days, and adjusting the 15-day period to seek relief with the Court to 14 days
`
`(up to seven days to meet and confer and up to seven days to seek relief). The modifications are
`
`bilateral, and Jawbone has not identified any reason why it will be unable to comply.
`
`Section 12 provides both parties with the ability to object to additional disclosure of
`
`confidential information to “continued access by that Person for good cause,” along with a
`
`procedure to meet and confer regarding the objection and the ability to file for a protective order
`
`if the objection is not withdrawn. For instance, if previously undisclosed information regarding
`
`an expert is later revealed or otherwise becomes known to a party, this provision preserves that
`
`party’s ability to subsequently object to additional disclosure of Confidential information to that
`
`expert.
`
`E. Section 11—Notice of Disclosure
`
`Section 11 mitigates risk of improper use of “HIGHLY SENSITIVE MATERIAL” (i.e.,
`
`material
`
`that
`
`is designated “CONFIDENTIAL
`
`- ATTORNEY’S EYES ONLY” or
`
`“CONFIDENTIAL - OUTSIDE ATTORNEY’S EYES ONLY - SOURCE CODE”) by requiring
`
`the disclosing Party to notify the Producing Party if a person receiving the material becomes
`
`involved in the design, development, operation, or patenting of audio processing hardware or
`
`8
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 9 of 12
`

`
`software. Given the value of said Protected Material to the Producing Party, it is prudent to require
`
`the consultant or expert (and, by extension, the Party who elected to provide the Protected Material
`
`to the consultant or expert) to provide notice that the consultant or expert is now working in a field
`
`in which he or she recently had access to the Producing Party’s “HIGHLY SENSITIVE
`
`MATERIAL” in that same field. Doing so would allow the Producing Party to investigate and
`
`seek relief from the Court in order to safeguard its Protected Material.
`
`F. Section 13—Prosecution and Acquisition Bar
`
`Section 13 prohibits any counsel for Jawbone that has received “HIGHLY SENSITIVE
`
`MATERIAL” from (1) participating in the prosecution of patents or patent applications within the
`
`field of microphone design, voice activity detection, and audio processing, including noise
`
`suppression; (2) being involved in the acquisition of patents or patent applications within the field
`
`of microphone design, voice activity detection, and audio processing, including noise suppression;
`
`or (3) preparing, drafting, editing, and/or amending claims during post-grant proceedings
`
`involving patents within the field of microphone design, voice activity detection, and audio
`
`processing, including noise suppression.
`
`The purpose of a prosecution bar is to mitigate the risk of inadvertent use of confidential
`
`information learned in litigation by barring litigation counsel’s involvement in strategic decision-
`
`making related to the subject matter of the litigation. Because it is “very difficult for the human
`
`mind to compartmentalize and selectively suppress information once learned,” there is a danger
`
`that a party’s litigation counsel who had accessed another party’s confidential information could
`
`misuse that information, either intentionally or unintentionally, for purposes of competitive
`
`decision-making in proceedings before the Patent Office. In re Deutsche Bank Trust Co. Americas,
`
`605 F.3d 1373, 1379 (Fed. Cir. 2010). “[M]aking strategic decisions on the type and scope of
`
`9
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 10 of 12
`

`
`patent protection” and “strategically amending or surrendering claim scope” are examples of such
`
`competitive decision making. Id. at 1380. Because Jawbone’s litigation counsel will have access
`
`to Apple’s source code and other sensitive information, there is a heightened danger of misuse or
`
`inadvertent disclosure of that information in proceedings before the Patent Office because Jawbone
`
`can draft or modify patent claims to cover Apple’s products based on confidential information that
`
`Jawbone’s litigation counsel obtained in litigation. This concern also applies to the acquisition of
`
`patents because litigation counsel may consciously or subconsciously use knowledge of Apple’s
`
`confidential information to advise a client on which patents to acquire—i.e., patents that may be
`
`asserted against Apple. Apple’s proposed Section 13 is limited to patents and patent applications
`
`within the field of microphone design, voice activity detection, and audio processing, including
`
`noise suppression and is thus narrowly tailored to the technology at issue.
`
`In contrast, there is no rationale for imposing a prosecution or acquisition bar on Apple in
`
`this case. As far as Apple can tell, Jawbone’s only business is licensing and enforcing its patents,
`
`and Jawbone does not sell or otherwise offer products of any kind. Thus, even if, as Jawbone
`
`contends, it has or will produce “highly sensitive material” in this case, there is no danger that
`
`Apple’s attorneys will inadvertently use that material to prosecute or acquire patent claims that
`
`cover Jawbone’s products because there are no such products. See Ring Plus, Inc. v. Cingular
`
`Wireless, LLC, No. 2:06-cv-159, 2007 U.S. Dist. LEXIS 102190, at *11-13 (E.D. Tex. Jul. 24,
`
`2007) (Dkt. No. 127) (explaining that that “[a] one-way prosecution bar is not uncommon” and is
`
`appropriate in circumstances where “the parties are not similarly situated,” such as in the case of
`
`a non-practicing entity who has sued a product manufacturer) (citing cases)); Smartflash LLC v.
`
`Apple Inc., No. 6:13-cv-447, 2014 WL 10986995 (E.D. Tex. May 12, 2014) (Dkt. No. 139)
`
`(implementing unilateral prosecution bar against plaintiff and its counsel).
`
`10
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 11 of 12
`

`
`III. CONCLUSION
`
`
`
`Apple respectfully requests that the Court enter Apple’s proposed PO over Jawbone’s
`
`proposal.
`
`
`Dated: May 17, 2022
`
`FISH & RICHARDSON P.C.
`
`By: /s/ Ricardo J. Bonilla
`
`J. Stephen Ravel
`
`Texas Bar No. 16584975
`steve.ravel@kellyhart.com
`KELLY HART & HALLMAN LLP
`303 Colorado, Suite 2000
`Austin, Texas 78701
`Telephone: (512) 495-6429
`Facsimile: (512) 495-6401
`
`Ricardo J. Bonilla
`Texas Bar No. 24082704
`rbonilla@fr.com
`FISH & RICHARDSON P.C.
`1717 Main Street, Suite 5000
`Dallas, TX 75201
`Telephone: (214) 747-5070
`Facsimile: (214) 747-2091
`
`Benjamin C. Elacqua
`Texas Bar No. 24055443
`elacqua@fr.com
`FISH & RICHARDSON P.C.
`1221 McKinney Street, Suite 2800
`Houston, Texas 77010
`Telephone: (713) 654-5300
`Facsimile: (713) 652-0109
`
`Katherine D. Prescott
`(Pro Hac Vice)
`prescott@fr.com
`Betty H. Chen
`Texas Bar No. 24056720
`bchen@fr.com
`FISH & RICHARDSON P.C.
`500 Arguello Street, Suite 400
`Redwood City, CA 94063
`
`11
`
`

`

`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 12 of 12
`

`
`Telephone: (650) 839-5067
`Facsimile: (650) 839-5071
`
`Daniel R. Gopenko
`DC Bar No. 1018019
`gopenko@fr.com
`FISH & RICHARDSON P.C.
`1000 Maine Avenue, SW, Suite 1000
`Washington, DC 20024
`Telephone: (202) 783-5070
`Facsimile: (202) 783-2331
`
`Qiuyi Wu
`(Pro Hac Vice)
`qwu@fr.com
`FISH & RICHARDSON P.C.
`One Marina Park Drive
`Boston, MA 02210
`Telephone: (617) 542-5070
`Facsimile: (617) 8906
`
`
`
`COUNSEL FOR DEFENDANT
`APPLE INC.
`
`
`
`
`
`CERTIFICATE OF SERVICE
`
`
`
`The undersigned hereby certifies that a true and correct copy of the above and foregoing
`
`document has been served on May 17, 2022, to all counsel of record who are deemed to have
`
`consented to electronic service via the Court’s CM/ECF system.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ Ricardo J. Bonilla
`Ricardo J. Bonilla
`
`
`
`12
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket