`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`JAWBONE INNOVATIONS, LLC,
`Plaintiff,
`
`v.
`APPLE INC.,
`
`Defendant.
`
`Case No. 6:21-CV-00984-ADA
`
`PATENT CASE
`
`JURY TRIAL DEMANDED
`
`FILED UNDER SEAL
`
`
`APPLE’S RESPONSE TO JAWBONE’S OPPOSED MOTION FOR ENTRY OF
`DISPUTED PROTECTIVE ORDER
`
`
`
`
`I.
`
`INTRODUCTION
`
`Defendant Apple Inc. (“Apple”) respectfully requests that this Court enter Apple’s
`
`Proposed Protective Order (Exhibit 1) because it balances Apple’s need to safeguard its source
`
`code and highly confidential information with ensuring fair and available access to discovery to
`
`Plaintiff Jawbone Innovations, LLC (“Jawbone”). Indeed, Apple was the first to initiate
`
`negotiations for a fair protective order in February so that Apple could securely and timely produce
`
`its confidential information to Jawbone. Yet Jawbone and its counsel refused to negotiate in good
`
`faith. Jawbone declared impasse after just one meet and confer and refused all further attempts to
`
`narrow the dispute. In doing so, Plaintiff also reneged on earlier compromises in favor of a new
`
`proposal on which it is refusing to further confer. Plaintiff’s counsel, Fabricant, is taking the same
`
`unreasonable positions with respect to Apple in its other active case, RFCyber Corp. v. Apple Inc.
`
`(Case No. 6:21-cv-00916-ADA). (Exhibit 2.)
`
`Adopting Apple’s Protective Order is not only appropriate given the sensitivity of Apple’s
`
`confidential information at issue in this matter, but it would send a clear message to Jawbone—
`
`
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 2 of 12
`
`
`
`and to future litigants—that parties should negotiate in good faith over protective order provisions
`
`tailored to the individual needs of each case. And, in doing so, deter Jawbone (for the remainder
`
`of this matter) and future litigants from refusing all attempts to engage in meaningful meet and
`
`confer efforts and simply declaring impasse at any and all deviations from the default protective
`
`order. Therefore, and for the reasons set forth below, this Court should adopt Apple’s proposed
`
`protective order, attached as Exhibit 1.1
`
`II.
`
`ARGUMENT
`
`Apple’s proposed protective order fairly balances Apple’s need to safeguard its source code
`
`and highly confidential information with its discovery obligations. The Court’s default protective
`
`order is the foundation for Apple’s proposal, and the additional protections and clarifications in
`
`Apple’s proposal further ensure secure and efficient access to confidential information in this
`
`matter for both Apple and Jawbone. Apple’s proposal is not “replete with restrictions that would
`
`make discovery unduly burdensome, if not impossible.” Dkt. 40 at 3. Apple’s proposed provisions
`
`reflect the real-world restrictions and protections Apple employs for access to and review of its
`
`source code outside of litigation. See Declaration of Robin Goldberg (Exhibit 4, hereinafter
`
`“Goldberg Decl.”) Apple’s proposed additions are reasonable and indeed similar provisions have
`
`been agreed to in other cases before this Court. See, e.g., Koss Corp. v. Apple Inc., Case No. 20-
`
`
`1 A redline version reflecting modifications to the Court’s default order is attached as Exhibit 3.
`Apple has struck provision 5(d) that was in previous proposals sent to Jawbone. Provision 5(d)
`provided that “CONFIDENTIAL” documents, information, and material could be disclosed to:
`“Up to and including three (3) designated representatives of the Receiving Party, who may be,
`but need not be, in-house counsel for the Receiving Party, as well as their immediate paralegals
`and staff, to whom disclosure is reasonably necessary for this case, provided that: (a) each such
`person has agreed to be bound by the provisions of the Protective Order by signing a copy of
`Exhibit 1; and (b) no unresolved objections to such disclosure exist after proper notice has been
`given to all Parties.” Apple does not know whether Jawbone disputes the deletion.
`
`2
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 3 of 12
`
`
`
`cv-00665-ADA, Dkt. No. 70; Fintiv, Inc. v. Apple, Inc., Case No. 18-cv-372-ADA. Apple’s
`
`versions of the following disputed provisions are fair and warranted.
`
`A. Section 10—Source Code Security
`
`
`
`Apple’s revolutionary products outperform competitors due in large part to its trade secret-
`
`protected source code. (Goldberg Decl. ¶¶ 3, 6.) Apple invested billions of dollars in R&D to
`
`create and maintain a business model built on its novel integration of software and hardware.
`
`(Goldberg Decl. ¶ 5.) Apple’s proposed safeguards are commensurate with the level of security
`
`that Apple employs internally to protect its core assets from inadvertent disclosure. (Goldberg
`
`Decl. ¶¶ 6,7.) Jawbone’s proposal unjustifiably risks disclosure of Apple’s source code, a risk that
`
`is especially pronounced given the broad scope of Jawbone’s infringement allegations, which
`
`accuse nearly every Apple product of infringing the nine patents in suit, and resulting broad scope
`
`of source code produced. (Exhibit 5 at 2-3 (identifying various versions of the iPhone, AirPods,
`
`HomePod, and Mac products).)
`
`Sections 10(b), (d)-(f) safeguard Apple’s source code during inspection. Despite the fact
`
`Apple’s proposal accommodates Jawbone’s request for peripheral devices to be provided with the
`
`source code machine, Jawbone still complains, without basis, about Apple’s provisions for
`
`notification regarding the types of source code review tools that Jawbone prefers to use. The form
`
`order requires a “stand-alone” computer connected to a printer, which Apple is offering. Apple’s
`
`draft proposal further accommodates Jawbone’s request that the review machine “have USB ports
`
`enabled for the use of peripheral devices.” (See Exhibit 1.) Section 10(b) clarifies the machine
`
`will be equipped with a screen, keyboard, and mouse. (Id.; Goldberg Decl. ¶ 13.) Section 10(d)
`
`requires Apple to install source code review tools on the machine that are presently used in the
`
`ordinary course of business. With respect to requests for additional software tools, Apple will not
`
`3
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 4 of 12
`
`
`
`“reject any tool for any reason” (Dkt. 40 at 5) because “approval shall not be unreasonably
`
`withheld.” (Ex. 1 at § 10(d)). Jawbone anticipates using “standard tools,” so Apple’s proposal
`
`should be a non-issue for Jawbone. Moreover, Jawbone did not explain why it would be
`
`burdensome to identify desired review tools 10 days in advance of its review. The notice period
`
`is necessary to allow Apple a fair opportunity to evaluate the security risk posed by the requested
`
`applications and install the applications on the source code machine. Sections 10(e)-(f) ban
`
`recordable devices in the source code review room to prevent the creation of electronic copies of
`
`source code, and the provisions mirror protections Apple has implemented internally. (Goldberg
`
`Decl. ¶ 10.) Jawbone offers no good reason why Apple should compromise its established security
`
`protocols.
`
`
`
`Section 10(k), contrary to Jawbone’s misreading, allows an expert’s “direct reports and
`
`other support personnel” (Dkt. 40 at 6) to access the source code, so long as Jawbone discloses
`
`those personnel and secures prior written consent. (Section 10(k)(vi)). This approach is consistent
`
`both with Apple’s internal policy of limiting access to individuals on a “need-to-know” basis
`
`(Goldberg Decl. ¶¶ 8, 9) and with the form Protective Order at footnote 2 to Section 11(e), which
`
`requires “personnel helping in the analysis of Source Code Material shall be disclosed pursuant to
`
`Paragraph 5(e).” In sum, there is no real dispute regarding this provision.
`
`
`
`Sections 10(l), (m) reduce risk of inadvertent disclosure of source code material in Court
`
`filings and discovery correspondence. Jawbone contends that the safeguards make written
`
`discovery and court filings “practically impossible.” Dkt. 40 at 4-5. But Section 10(l) merely
`
`requires a meet and confer to agree on a procedure “as to how to make such a [Court] filing while
`
`protecting the confidentiality of the Source Code” and limits the number of continuous blocks of
`
`source code to 5 pages for inclusion in filings or expert reports. Jawbone’s position that Section
`
`4
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 5 of 12
`
`
`
`10(l) poses an “unnecessary burden” (Dkt. 40 at 5) ignores the consequence of source code
`
`appearing on PACER, where it is instantly available to the general public, which would be near-
`
`impossible to cure. And Jawbone’s concerns about Section 10(m) hindering discovery
`
`correspondence are unfounded. Section 10(m) prohibits the inclusion of “Source Code Material”
`
`in party correspondence, including Hardware Description Language (HDL), Register Transfer
`
`Level (RTL) and Computer Aided Design (CAD) files that describe the hardware design of
`
`components in Apple’s products, as Apple treats this information as akin to source code.
`
`(Goldberg Decl. ¶ 4.) Section 8, however, excludes functions, parameters, file names, path
`
`structures, and other “Source Code-adjacent material” from the definition of “Source Code
`
`Material.” (Exhibit 1 at 9 n.6.) The parties are free to use “Source Code-adjacent material” as
`
`shorthand in discovery correspondence to communicate effectively about source code without
`
`risking exposure of the source code itself.
`
`
`
`Sections 10(n), (o), (v) reduce the risk of inadvertent disclosure by limiting the number
`
`and nature of source code copies. Section 10(n) prohibits making electronic copies of source code
`
`without prior written consent, except as provided in Section 10(l). Section 10(l) limits the number
`
`of printouts to a “reasonable number” that presumptively does not exceed 750 pages.2 Should the
`
`parties disagree about a “reasonable number” of pages to be printed upon request, the provision
`
`requires the “Receiving Party to demonstrate that such printed portions are no more than is
`
`reasonably necessary for a permitted purpose and not merely printed for the purposes of review
`
`and analysis elsewhere.” Having the “Receiving Party” explain its need for printouts beyond the
`
`presumptive limit removes speculation over the Receiving Party’s motives. Jawbone glosses over
`
`
`2 Apple has agreed to increase its previously proposed 200 page presumptive limit to 750 pages.
`This change is reflected in Apple’s proposed protective order (Exhibit 1, § 10(o).).
`
`5
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 6 of 12
`
`
`
`Apple’s legitimate interests in reducing the risk of inadvertent disclosure by limiting the amount
`
`of continuous blocks of code and instead asserts that Apple should not be allowed to “dictate the
`
`amount of source code on which a party relies on to prove their case.” (Dkt. 40 at 5-6.) Jawbone’s
`
`position is at odds with this Court’s recognition that plaintiffs do not enjoy unlimited source code
`
`printouts. See Verain, LLC v. Micron Tech, Inc., No. 6:21-cv-487-ADA, slip op. at 1, 9 (W.D.
`
`Tex. Apr. 20, 2022) (granting source code printouts in excess of the agreed limits only after
`
`plaintiff identified specific code that it required after completing four full days of in-person
`
`review).
`
`
`
`Section 10(q) states “no expectations of confidentiality for any items left in the [review
`
`room] following each inspection session,” to clarify that Apple will inspect abandoned materials
`
`in the secure source code room to determine what they are and ensure that they are appropriately
`
`secured.
`
`
`
`Section 10(t) assigns to Apple the expense and burden of securely transporting the source
`
`code to a deposition. Because the printouts brought to the deposition are not released to Jawbone,
`
`the copies do not count against the total number of allotted pages. Jawbone’s “work product”
`
`(Dkt. 40 at 7) complaint rings hollow because parties often rely in deposition on documents
`
`identified or otherwise prepared by the other side. Similarly, Jawbone is wrong to contend that
`
`allowing Apple fair notice of the source code Jawbone needs for the deposition would prejudice
`
`Jawbone. If anything, Jawbone benefits from a fact witness prepared to testify on specific source
`
`code files Jawbone is interested in. Finally, Jawbone’s contention that “it is also impractical” to
`
`require 10 days of notice because it may not even know which set of source code it plans to use
`
`defies logic. (Dkt. 40 at 7.) Jawbone must have identified what it contends to be the relevant
`
`source code by the time it serves final infringement contentions on September 21, 2022. (Dkt. 23.)
`
`6
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 7 of 12
`
`
`
`That leaves Jawbone five months until the close of fact discovery to identify the set of source code
`
`it plans to use in each deposition.
`
`B. Section 1—Confidentiality Designations
`
`Section 1(b) does not “presumptively deem all deposition transcripts” as confidential for
`
`“no good reason.” (Dkt. 40 at 9.) Rather, Section 1(b) provides a time-limited 30-day grace period
`
`to designate a transcript as confidential if there is an inadvertent failure to designate a deposition
`
`transcript as confidential on the record. Given the sensitive nature of the subject matter covered
`
`during depositions, this is an appropriate safeguard that reduces the risk of inadvertent
`
`dissemination of confidential deposition transcripts.
`
`Section 1(d) provides a safeguard against the inadvertent dissemination of native files or
`
`documents by (1) requiring the parties to affix a legend corresponding to the confidentiality
`
`designation to any printed native file and (2) providing a copy of said printed document to the
`
`Producing Party for confirmation that the information in the document has not been altered.
`
`Notably, this provision would only apply when native files are printed “for use at a deposition” or
`
`“for provision in printed form to an expert or consultant,” and Jawbone fails to explain how these
`
`steps require the “disclos[ure] [of] its work product.” (Dkt. 40 at 8.)
`
`C. Section 6—“CONFIDENTIAL” Information
`
`Section 6 ensures documents containing confidential
`
`information are marked
`
`“CONFIDENTIAL.” Jawbone does not explain how this simple clarification “creates the
`
`possibility of a party attempting to designate publicly available documents.” (Dkt. 40 at 10.)
`
`Section 6 applies only to “documents, information, or material that contain or reflect confidential,
`
`proprietary, and/or commercially sensitive information.”
`
`7
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 8 of 12
`
`
`
`D. Sections 9(b), 11, 12 —Disclosure of “CONFIDENTIAL – ATTORNEYS’
`EYES ONLY” Information to Experts
`
`Section 9(b) is consistent with Apple’s internal policies concerning access to highly
`
`sensitive material, which limits access to known individuals on a “need-to-know” basis to reduce
`
`the risk of inadvertent dissemination. (Goldberg Decl. ¶ 8.) Jawbone, on the other hand, proposes
`
`giving consultants and experts indiscriminate and unfettered access to highly sensitive material,
`
`even before the consultant or expert has agreed to be bound by the operative Protective Order.
`
`Section 11 proposes modestly increasing the default timetable to object to consultants or
`
`experts from 10 to 14 days, and adjusting the 15-day period to seek relief with the Court to 14 days
`
`(up to seven days to meet and confer and up to seven days to seek relief). The modifications are
`
`bilateral, and Jawbone has not identified any reason why it will be unable to comply.
`
`Section 12 provides both parties with the ability to object to additional disclosure of
`
`confidential information to “continued access by that Person for good cause,” along with a
`
`procedure to meet and confer regarding the objection and the ability to file for a protective order
`
`if the objection is not withdrawn. For instance, if previously undisclosed information regarding
`
`an expert is later revealed or otherwise becomes known to a party, this provision preserves that
`
`party’s ability to subsequently object to additional disclosure of Confidential information to that
`
`expert.
`
`E. Section 11—Notice of Disclosure
`
`Section 11 mitigates risk of improper use of “HIGHLY SENSITIVE MATERIAL” (i.e.,
`
`material
`
`that
`
`is designated “CONFIDENTIAL
`
`- ATTORNEY’S EYES ONLY” or
`
`“CONFIDENTIAL - OUTSIDE ATTORNEY’S EYES ONLY - SOURCE CODE”) by requiring
`
`the disclosing Party to notify the Producing Party if a person receiving the material becomes
`
`involved in the design, development, operation, or patenting of audio processing hardware or
`
`8
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 9 of 12
`
`
`
`software. Given the value of said Protected Material to the Producing Party, it is prudent to require
`
`the consultant or expert (and, by extension, the Party who elected to provide the Protected Material
`
`to the consultant or expert) to provide notice that the consultant or expert is now working in a field
`
`in which he or she recently had access to the Producing Party’s “HIGHLY SENSITIVE
`
`MATERIAL” in that same field. Doing so would allow the Producing Party to investigate and
`
`seek relief from the Court in order to safeguard its Protected Material.
`
`F. Section 13—Prosecution and Acquisition Bar
`
`Section 13 prohibits any counsel for Jawbone that has received “HIGHLY SENSITIVE
`
`MATERIAL” from (1) participating in the prosecution of patents or patent applications within the
`
`field of microphone design, voice activity detection, and audio processing, including noise
`
`suppression; (2) being involved in the acquisition of patents or patent applications within the field
`
`of microphone design, voice activity detection, and audio processing, including noise suppression;
`
`or (3) preparing, drafting, editing, and/or amending claims during post-grant proceedings
`
`involving patents within the field of microphone design, voice activity detection, and audio
`
`processing, including noise suppression.
`
`The purpose of a prosecution bar is to mitigate the risk of inadvertent use of confidential
`
`information learned in litigation by barring litigation counsel’s involvement in strategic decision-
`
`making related to the subject matter of the litigation. Because it is “very difficult for the human
`
`mind to compartmentalize and selectively suppress information once learned,” there is a danger
`
`that a party’s litigation counsel who had accessed another party’s confidential information could
`
`misuse that information, either intentionally or unintentionally, for purposes of competitive
`
`decision-making in proceedings before the Patent Office. In re Deutsche Bank Trust Co. Americas,
`
`605 F.3d 1373, 1379 (Fed. Cir. 2010). “[M]aking strategic decisions on the type and scope of
`
`9
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 10 of 12
`
`
`
`patent protection” and “strategically amending or surrendering claim scope” are examples of such
`
`competitive decision making. Id. at 1380. Because Jawbone’s litigation counsel will have access
`
`to Apple’s source code and other sensitive information, there is a heightened danger of misuse or
`
`inadvertent disclosure of that information in proceedings before the Patent Office because Jawbone
`
`can draft or modify patent claims to cover Apple’s products based on confidential information that
`
`Jawbone’s litigation counsel obtained in litigation. This concern also applies to the acquisition of
`
`patents because litigation counsel may consciously or subconsciously use knowledge of Apple’s
`
`confidential information to advise a client on which patents to acquire—i.e., patents that may be
`
`asserted against Apple. Apple’s proposed Section 13 is limited to patents and patent applications
`
`within the field of microphone design, voice activity detection, and audio processing, including
`
`noise suppression and is thus narrowly tailored to the technology at issue.
`
`In contrast, there is no rationale for imposing a prosecution or acquisition bar on Apple in
`
`this case. As far as Apple can tell, Jawbone’s only business is licensing and enforcing its patents,
`
`and Jawbone does not sell or otherwise offer products of any kind. Thus, even if, as Jawbone
`
`contends, it has or will produce “highly sensitive material” in this case, there is no danger that
`
`Apple’s attorneys will inadvertently use that material to prosecute or acquire patent claims that
`
`cover Jawbone’s products because there are no such products. See Ring Plus, Inc. v. Cingular
`
`Wireless, LLC, No. 2:06-cv-159, 2007 U.S. Dist. LEXIS 102190, at *11-13 (E.D. Tex. Jul. 24,
`
`2007) (Dkt. No. 127) (explaining that that “[a] one-way prosecution bar is not uncommon” and is
`
`appropriate in circumstances where “the parties are not similarly situated,” such as in the case of
`
`a non-practicing entity who has sued a product manufacturer) (citing cases)); Smartflash LLC v.
`
`Apple Inc., No. 6:13-cv-447, 2014 WL 10986995 (E.D. Tex. May 12, 2014) (Dkt. No. 139)
`
`(implementing unilateral prosecution bar against plaintiff and its counsel).
`
`10
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 11 of 12
`
`
`
`III. CONCLUSION
`
`
`
`Apple respectfully requests that the Court enter Apple’s proposed PO over Jawbone’s
`
`proposal.
`
`
`Dated: May 17, 2022
`
`FISH & RICHARDSON P.C.
`
`By: /s/ Ricardo J. Bonilla
`
`J. Stephen Ravel
`
`Texas Bar No. 16584975
`steve.ravel@kellyhart.com
`KELLY HART & HALLMAN LLP
`303 Colorado, Suite 2000
`Austin, Texas 78701
`Telephone: (512) 495-6429
`Facsimile: (512) 495-6401
`
`Ricardo J. Bonilla
`Texas Bar No. 24082704
`rbonilla@fr.com
`FISH & RICHARDSON P.C.
`1717 Main Street, Suite 5000
`Dallas, TX 75201
`Telephone: (214) 747-5070
`Facsimile: (214) 747-2091
`
`Benjamin C. Elacqua
`Texas Bar No. 24055443
`elacqua@fr.com
`FISH & RICHARDSON P.C.
`1221 McKinney Street, Suite 2800
`Houston, Texas 77010
`Telephone: (713) 654-5300
`Facsimile: (713) 652-0109
`
`Katherine D. Prescott
`(Pro Hac Vice)
`prescott@fr.com
`Betty H. Chen
`Texas Bar No. 24056720
`bchen@fr.com
`FISH & RICHARDSON P.C.
`500 Arguello Street, Suite 400
`Redwood City, CA 94063
`
`11
`
`
`
`Case 6:21-cv-00984-ADA Document 51 Filed 05/24/22 Page 12 of 12
`
`
`
`Telephone: (650) 839-5067
`Facsimile: (650) 839-5071
`
`Daniel R. Gopenko
`DC Bar No. 1018019
`gopenko@fr.com
`FISH & RICHARDSON P.C.
`1000 Maine Avenue, SW, Suite 1000
`Washington, DC 20024
`Telephone: (202) 783-5070
`Facsimile: (202) 783-2331
`
`Qiuyi Wu
`(Pro Hac Vice)
`qwu@fr.com
`FISH & RICHARDSON P.C.
`One Marina Park Drive
`Boston, MA 02210
`Telephone: (617) 542-5070
`Facsimile: (617) 8906
`
`
`
`COUNSEL FOR DEFENDANT
`APPLE INC.
`
`
`
`
`
`CERTIFICATE OF SERVICE
`
`
`
`The undersigned hereby certifies that a true and correct copy of the above and foregoing
`
`document has been served on May 17, 2022, to all counsel of record who are deemed to have
`
`consented to electronic service via the Court’s CM/ECF system.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ Ricardo J. Bonilla
`Ricardo J. Bonilla
`
`
`
`12
`
`