throbber
Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 1 of 24
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`ARIGNA TECHNOLOGY LIMITED,
` Plaintiff,
`
`
`
`GOOGLE LLC,
` Defendant.
`
`v.
`
`
`
`
`







`
`
`Case No. 6:21-cv-1045-ADA
`
`
`
` JURY TRIAL DEMANDED
`
`ORDER REGARDING PROTECTIVE ORDER
`The parties sent the Court an email submission disputing the entry of a protective order.
`
`The Court hereby resolves the dispute.
`
`Summary of the Issue
`
`Arigna:
`
`Whether the Court should enter the Court’s default protective order, as modified to include
`
`provisions the parties mutually accepted and a provision allowing secure electronic transfer of
`
`source code material.
`
`Google:
`
`Whether the Court should deny Arigna’s protective order, which includes a provision to
`
`permit secure electronic transfer of source code material which the parties neither mutually
`
`accepted nor discussed during meet and confer.
`
`Requested Relief
`
`Arigna requests the Court to enter the attached protective order.
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 2 of 24
`
`Google requests the Court to deny Arigna’s request and enter Google’s requested
`
`Protective Order, which omits the source code provision and permits the parties to meet and confer
`
`in the event source code is to be reviewed or produced.
`
`Arigna’s Position
`
`Arigna and Google have been negotiating a protective order for over six weeks. The
`
`parties’ negotiations have reached an impasse, and Arigna asks the Court to enter its default
`
`protective order, as modified to include several additional provisions on which Google and agree
`
`and one provision—regarding electronic transfer of source code—that Arigna seeks and Google
`
`has not accepted.
`
`The parties have negotiated and mutually accepted several additions to the Court’s default
`
`protective order. For example, Arigna accepted a provision Google proposed to limit the number
`
`of in-house counsel who may view protected material without prior written consent as well as
`
`several of Google’s proposed source code provisions. Google has similarly accepted provisions
`
`Arigna proposed allowing disclosures to mock jurors who have agreed not to disclose the material.
`
`While Arigna and Google have reached these agreements, the parties’ latest exchanges of
`
`drafts show that no more can be negotiated, as parties continue to propose and reject the same
`
`provisions.
`
`Arigna believes the Court’s default protective order for patent cases is well-suited to this
`
`case, as it was carefully designed to be. Rather than consume the Court’s time by going provision
`
`by provision through the disputed protective order provisions, Arigna recognizes that the Court’s
`
`default protective order already represents that compromise. Arigna is satisfied with the Court’s
`
`default protective order where the parties have not otherwise agreed.
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 3 of 24
`
`Arigna asks this Court for only one exception: that paragraph 11(l) be changed to allow
`
`Source Code Materials to be transferred by secure electronic transfer, rather than only by hard
`
`copy or physical media. This addition accomplishes the same goal as the Court’s default, i.e., the
`
`highest protection of a party’s confidential source code. But it also accounts for the reality that
`
`secure electronic transfer is necessary to facilitate the process of drafting and reviewing expert
`
`reports. Secure electronic transfer of source code materials would allow outside counsel and
`
`experts to share draft reports that reference or include source code materials electronically, greatly
`
`reducing the complexity of producing and reviewing draft expert reports.
`
`Arigna respectfully asks the Court to enter the attached default protective order that has
`
`been modified to include the parties’ additional agreed provisions and to allow source code transfer
`
`by secure electronic means.
`
`Google’s Position
`
`While the parties have made some progress toward agreement through negotiations, Arigna
`
`overstates that progress as mutual acceptance of several provisions. Arigna mischaracterizes that
`
`its proposed protective order “includes provisions the parties mutually accepted.”
`
`Google requests simplifying the dispute by removing provisions about source code
`
`entirely. Because the accused features in this case lie in components supplied by third parties,
`
`Google is not required to make its own confidential source code for inspection in this case. Arigna,
`
`however, insists on keeping source code provisions in the protective order, and goes further by
`
`permitting electronic transfer of source code material, a provision that is not found in this Court’s
`
`default protective order. Arigna’s source code requests are premature, as Google has not made
`
`available for inspection any source code in this case and Google does not expect to do so for its
`
`own confidential source code in this case. Instead, relevant source code in this matter will come
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 4 of 24
`
`from third party suppliers, who have not had any involvement in the negotiation of the protective
`
`order and its source code provisions.
`
`Alternatively, if the Court is inclined to enter a protective order addressing source code,
`
`then Arigna’s request for electronic transfer of source code should be denied. Arigna provides no
`
`support for permitting electronic transfer of source code. As this Court is well-aware, source code
`
`is among a company’s most valuable and protected assets. The purpose of the protective order is
`
`to protect very sensitive information like source code and prevent disclosure, inadvertent or
`
`otherwise. Permitting electronic transfer of source code greatly increases the risk of a protective
`
`order violation. It is also prejudicial and unfair to third party suppliers who may produce or make
`
`available for inspection source code later in this action subject to the protective order, as those
`
`third parties have had no opportunity to object to Arigna’s electronic transfer provision.
`
`Arigna’s rationale for its request focuses on facilitating drafting expert reports, but
`
`electronic transfer is unnecessary for that because they instead can cite to Bates pages and line
`
`numbers of printed source code pages. Further, Arigna’s request is premature, as expert discovery
`
`is still months away from now.
`
`If Google or third party suppliers are later in a position to make source code available for
`
`inspection, then the parties can revisit then whether the protective order should address source
`
`code. Google thus requests the Court enter Google’s version of the protective order.
`
`Resolution
`
`The Court generally defaults to its model protective order and deviates as little as possible
`
`from its model protective order except by agreement of the parties.
`
`The Court will enter Arigna’s version of the protective order, which contains restrictions
`
`on using source code like the model protective order. The Court finds no reason to permit secure
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 5 of 24
`
`electronic transfer and removes this provision. The parties’ agreed terms to transfer by hard copy
`
`and physical media is convenient enough. Source code is among a company’s most valuable and
`
`protected assets. Arigna articulates no justification for risking exposure of source code via
`
`electronic transfer. The Court likewise sees no reason to delay entering a protective order with
`
`source code provisions if third parties are likely to need source code protection.
`
`The Court hereby enters the appended Protective Order.
`
`
`
`SIGNED this 12th day of April, 2022.
`
`
`
`
`
`
`
`ALAN D ALBRIGHT
`UNITED STATES DISTRICT JUDGE
`
`
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 6 of 24
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`ARIGNA TECHNOLOGY LIMITED,
` Plaintiff,
`
`
`
`GOOGLE LLC,
` Defendant.
`
`v.
`
`
`
`
`





`
`
`
`Case No. 6:21-cv-1045-ADA
`
`
`
` JURY TRIAL DEMANDED
`
`PROTECTIVE ORDER
`WHEREAS, Plaintiff Arigna Technology Limited and Defendant Google LLC, hereafter referred
`
`to as “the Parties,” believe that certain information that is or will be encompassed by discovery
`
`demands by the Parties involves the production or disclosure of trade secrets, confidential business
`
`information, or other proprietary information;
`
`WHEREAS, the Parties seek a protective order limiting disclosure thereof in accordance with
`
`Federal Rule of Civil Procedure 26(c):
`
`THEREFORE, it is hereby stipulated among the Parties and ORDERED that:
`
`1.
`
`Each Party may designate as confidential for protection under this Order, in whole or in
`
`part, any document, information, or material that constitutes or includes, in whole or in
`
`part, confidential or proprietary information or trade secrets of the Party or a Third Party
`
`to whom the Party reasonably believes it owes an obligation of confidentiality with respect
`
`to such document, information, or material (“Protected Material”). Protected Material shall
`
`be designated by the Party producing it by affixing a legend or stamp on such document,
`
`information, or material as follows: “CONFIDENTIAL.” The word “CONFIDENTIAL”
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 7 of 24
`
`shall be placed clearly on each page of the Protected Material (except deposition and
`
`hearing transcripts and natively produced documents) for which such protection is sought.
`
`For deposition and hearing transcripts, the word “CONFIDENTIAL” shall be placed on
`
`the cover page of the transcript (if not already present on the cover page of the transcript
`
`when received from the court reporter) by each attorney receiving a copy of the transcript
`
`after that attorney receives notice of the designation of some or all of that transcript as
`
`“CONFIDENTIAL.”
`
` For natively produced Protected Material,
`
`the word
`
`“CONFIDENTIAL” shall be placed in the filename of each such natively produced
`
`document.
`
`2.
`
`Any document produced before issuance of this Order, including pursuant to the Court’s
`
`Order Governing Proceedings - Patent Case, with the designation “Confidential” or the like
`
`shall receive the same treatment as if designated “CONFIDENTIAL” under this order and
`
`any such documents produced with the designation “Confidential - Outside Attorneys’
`
`Eyes Only” shall receive the same treatment as if designated “CONFIDENTIAL -
`
`OUTSIDE ATTORNEYS’ EYES ONLY” under this Order, unless and until such
`
`document is re-designated to have a different classification under this Order.
`
`3.
`
`With respect to documents, information, or material designated “CONFIDENTIAL,”
`
`“CONFIDENTIAL - ATTORNEYS’ EYES ONLY,” “CONFIDENTIAL - OUTSIDE
`
`ATTORNEYS’ EYES ONLY,” or “CONFIDENTIAL
`
`- SOURCE CODE”
`
`(“DESIGNATED MATERIAL”),1 subject to the provisions herein and unless otherwise
`
`
`1 The term DESIGNATED MATERIAL is used throughout this Protective Order to refer to the
`class of materials designated as “CONFIDENTIAL,” “CONFIDENTIAL - ATTORNEYS’ EYES
`ONLY,” “CONFIDENTIAL - OUTSIDE ATTORNEYS’ EYES ONLY,” or “CONFIDENTIAL
`- SOURCE CODE,” individually and collectively.
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 8 of 24
`
`stated, this Order governs, without limitation: (a) all documents, electronically stored
`
`information, and/or things as defined by the Federal Rules of Civil Procedure; (b) all
`
`pretrial, hearing or deposition testimony, or documents marked as exhibits or for
`
`identification in depositions and hearings; (c) pretrial pleadings, exhibits to pleadings and
`
`other court filings; (d) affidavits; and (e) stipulations. All copies, reproductions, extracts,
`
`digests, and complete or partial summaries prepared from any DESIGNATED
`
`MATERIALS shall also be considered DESIGNATED MATERIAL and treated as such
`
`under this Order.
`
`4.
`
`A designation of Protected Material (i.e., “CONFIDENTIAL,” “CONFIDENTIAL -
`
`ATTORNEYS’ EYES ONLY,” “CONFIDENTIAL - OUTSIDE ATTORNEYS’ EYES
`
`ONLY,” or “CONFIDENTIAL - SOURCE CODE”) may be made at any time. Inadvertent
`
`or unintentional production of documents, information, or material that has not been
`
`designated as DESIGNATED MATERIAL shall not be deemed a waiver in whole or in
`
`part of a claim for confidential treatment. Any party that inadvertently or unintentionally
`
`produces Protected Material without designating it as DESIGNATED MATERIAL may
`
`request destruction of that Protected Material by notifying the recipient(s), as soon as
`
`reasonably possible after the producing Party becomes aware of the inadvertent or
`
`unintentional disclosure, and providing replacement Protected Material that is properly
`
`designated. The recipient(s) shall then destroy all copies of the inadvertently or
`
`unintentionally produced Protected Materials and any documents, information, or material
`
`derived from or based thereon.
`
`5.
`
`“CONFIDENTIAL” documents, information, and material may be disclosed only to the
`
`following persons, except upon receipt of the prior written consent of the designating party,
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 9 of 24
`
`upon order of the Court, or as set forth in paragraph 15 herein:
`
`
`
`
`
`
`
`
`
`(a)
`
`(b)
`
`(c)
`
`(d)
`
`(a)
`
`outside counsel of record in this Action2 for the Parties;
`
`employees of such counsel assigned to and reasonably necessary to assist such
`counsel in the litigation of this Action;
`
`up to two in-house counsel for the Parties who either have responsibility for making
`decisions dealing directly with the litigation of this Action, or who are assisting
`outside counsel in the litigation of this Action;
`
`Up to and including three (3) designated representatives of each of the Parties to the
`extent reasonably necessary for the litigation of this Action, except that any Party
`may in good faith request the other Party’s consent to designate one or more
`additional representatives, the other Party shall not unreasonably withhold such
`consent, and the requesting Party may seek leave of Court to designate such
`additional representative(s) if the requesting Party believes the other Party has
`unreasonably withheld such consent.
`
`Outside consultants or experts retained for the purpose of this litigation, provided
`that: (1) such consultants or experts are not presently employed by the Parties or
`of an affiliate of a Party hereto for purposes other than this Action3; (2) before
`access is given, the consultant or expert has completed the Undertaking attached as
`Appendix A hereto and the same is served upon the producing Party with a current
`curriculum vitae of the consultant or expert, including a list of other cases in which
`the individual has provided a report or testified (at trial or deposition) and a list of
`companies that the individual has been employed by or provided consulting
`services pertaining to the field of the invention of the patent(s)-in-suit or the
`products accused of infringement within the last four years and a brief description
`of the subject matter of the consultancy or employment, at least ten (10) days
`before access to the Protected Material is to be given to that consultant or expert
`to object to and notify the receiving Party in writing that it objects to disclosure of
`Protected Material to the consultant or expert. The Parties agree to promptly confer
`and use good faith to resolve any such objection. If the Parties are unable to resolve
`any objection, the objecting Party may file a motion with the Court within fifteen
`(15) days of receipt of the notice, or within such other time as the Parties may agree,
`seeking a protective order with respect to the proposed disclosure. The objecting
`Party shall have the burden of proving the need for a protective order. No disclosure
`shall occur until all such objections are resolved by agreement or Court order.
`
`
`
`(e)
`
`independent litigation support services, including persons working for or as court
`reporters, graphics or design services, jury or trial consulting services, and
`
`2 This “Action” means Case No. 6:21-cv-1045-ADA.
`3 For avoidance of doubt, an independent expert or consultant retained (as opposed to employed)
`by a Party on another litigation would not be precluded under this section.
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 10 of 24
`
`
`
`
`
`
`6.
`
`(f)
`
`(g)
`
`photocopy, document imaging, and database services retained by counsel and
`reasonably necessary to assist counsel with the litigation of this Action;
`mock jurors who have signed an undertaking or agreement agreeing not to publicly
`disclose Protected Material and to keep any information concerning Protected
`Material confidential;
`
`any mediator who is assigned to hear this matter, and his or her staff, subject to
`their agreement to maintain confidentiality to the same degree as required by this
`Protective Order; and
`
`(h)
`
`the Court and its personnel.
`
`A Party shall designate documents, information, or material as “CONFIDENTIAL” only
`
`upon a good faith belief that the documents, information, or material contains confidential
`
`or proprietary information or trade secrets of the Party or a Third Party to whom the Party
`
`reasonably believes it owes an obligation of confidentiality with respect to such documents,
`
`information, or material.
`
`7.
`
`Documents, information, or material produced in this Action, including but not limited to
`
`Protected Material designated as DESIGNATED MATERIAL, (i) shall be used only for
`
`prosecuting, defending, or attempting to settle this Action, (ii) shall not be used for any
`
`other purpose. Any person or entity who obtains access to DESIGNATED MATERIAL or
`
`the contents thereof pursuant to this Order shall not make any copies, duplicates, extracts,
`
`summaries, or descriptions of such DESIGNATED MATERIAL or any portion thereof
`
`except as may be reasonably necessary in the litigation of this Action. Any such copies,
`
`duplicates, extracts, summaries, or descriptions shall be classified DESIGNATED
`
`MATERIALS and subject to all of the terms and conditions of this Order.
`
`8.
`
`To the extent a producing Party believes that certain Protected Material qualifying to be
`
`designated CONFIDENTIAL is so sensitive that its dissemination deserves even further
`
`limitation, the producing Party may designate such Protected Material “CONFIDENTIAL
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 11 of 24
`
`- ATTORNEYS’ EYES ONLY” or “CONFIDENTIAL - OUTSIDE ATTORNEYS’ EYES
`
`ONLY,” or to the extent such Protected Material includes computer source code and/or
`
`live data (that is, data as it exists residing in a database or databases) (“Source Code
`
`Material”),
`
`the producing Party may designate such Protected Material as
`
`“CONFIDENTIAL - SOURCE CODE.”
`
`9.
`
`For Protected Material designated CONFIDENTIAL - ATTORNEYS’ EYES ONLY,
`
`access to, and disclosure of, such Protected Material shall be limited to individuals listed
`
`in paragraphs 5(a–c) and (e–j); provided, however, that access by in-house counsel
`
`pursuant to paragraph 5(c) be limited to in-house counsel who exercise no competitive
`
`decision-making authority on behalf of the client and nothing in this paragraph 9 precludes
`
`outside counsel for a Party from informing their client(s) of high-level damages
`
`information, such as discussing estimated damages to aid in settlement discussions and
`
`advising on damages models.
`
`10.
`
`For Protected Material designated CONFIDENTIAL - OUTSIDE ATTORNEYS’ EYES
`
`ONLY, access to, and disclosure of, such Protected Material shall be limited to individuals
`
`listed in paragraphs 5(a–b) and (e–j); provided, however, that the designating Party shall
`
`accommodate reasonable requests to provide summary information to in-house counsel
`
`designated pursuant to paragraph 5(c) who exercise no competitive decision-making
`
`authority on behalf of the client and reasonably require access to such information.
`
`11.
`
`For Protected Material designated CONFIDENTIAL - SOURCE CODE, the following
`
`additional restrictions apply:
`
`(a)
`
`Access to a Party’s Source Code Material shall be provided only on “stand-alone”
`computer(s) (that is, the computer may not be linked to any network, including a
`local area network (“LAN”), an intranet or the Internet).
`
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 12 of 24
`
`(b)
`
`The stand-alone computer(s) may be connected to (i) a printer, or (ii) a device
`capable of temporarily storing electronic copies solely for the limited purposes
`permitted pursuant to paragraphs 11(h and k) below. Additionally, except as
`provided in paragraph 11(k) below, the stand-alone computer(s) may only be
`located within the continental United States at the offices of the producing Party’s
`outside counsel or its vendors. Use or possession of any input/output device (e.g.,
`USB memory stick, mobile phone or tablet, camera or any camera-enabled device,
`CD, floppy disk, portable hard drive, laptop, or any device that can access the
`Internet or any other network or external system, etc.) is prohibited while accessing
`the computer containing the source code. All persons entering the locked room
`containing the stand-alone computer(s) must agree to affirm that they are not
`carrying any prohibited items before they will be given access to the stand-alone
`computer(s). The producing Party may periodically “check in” on the activities of
`the receiving Party’s representatives during any stand-alone computer review and
`may visually monitor the activities of the receiving Party’s representatives from
`outside the room in which the stand-alone computer(s) is located, but only to
`ensure that no unauthorized electronic records of the Source Code Material and no
`information concerning the Source Code Material are being created or transmitted
`in any way. The producing Party may not record (visually, audibly or by other
`means) the activities of the receiving Party’s representatives.
`
`The receiving Party shall make reasonable efforts to restrict its requests for such
`access to the stand-alone computer(s) to normal business hours, which for purposes
`of this paragraph shall be 8:00 a.m. through 6:00 p.m. However, upon reasonable
`notice from the receiving Party, the producing Party shall make reasonable efforts
`to accommodate the receiving Party’s request for access to the stand-alone
`computer(s) outside of normal business hours. The Parties agree to cooperate in
`good faith such that maintaining the producing Party’s Source Code Material at the
`offices of its outside counsel or its vendors shall not unreasonably hinder the
`receiving Party’s ability to efficiently and effectively conduct the prosecution or
`defense of this Action.
`
`The producing Party shall provide the receiving Party with information explaining
`how to start, log on to, and operate the stand-alone computer(s) in order to access
`the produced Source Code Material on the stand-alone computer(s).
`
`The producing Party will produce Source Code Material in computer searchable
`format on the stand-alone computer(s) as described above.
`
`Access to Source Code Material shall be limited to outside counsel and up to three
`(3) outside consultants or experts4 (i.e., not existing employees or affiliates of a
`
`4 For the purposes of this paragraph, an outside consultant or expert is defined to include the outside
`consultant’s or expert’s direct reports and other support personnel, such that the disclosure to a
`consultant or expert who employs others within his or her firm to help in his or her analysis shall
`
`
`(e)
`
`(f)
`
`(c)
`
`(d)
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 13 of 24
`
`Party or an affiliate of a Party or competitor identified by the Producing Party with
`reasonable specificity) retained for the purpose of this litigation and approved to
`access such Protected Materials pursuant to paragraph 5(e) above. A receiving
`Party may include excerpts of Source Code Material in an exhibit to a pleading,
`expert report, or deposition transcript (collectively, “Source Code Exhibits”),
`provided that the Source Code Exhibits are appropriately marked under this Order,
`restricted to those who are entitled to have access to them as specified herein, and,
`if filed with the Court, filed under seal in accordance with the Court’s rules,
`procedures, and orders.
`
`To the extent portions of Source Code Material are quoted in a Source Code
`Exhibit, either (1) the entire Source Code Exhibit will be stamped and treated as
`CONFIDENTIAL - SOURCE CODE or (2) those pages containing quoted Source
`Code Material will be separately stamped and treated as CONFIDENTIAL -
`SOURCE CODE.
`
`Except as set forth in paragraph 11(k) below, no electronic copies of Source Code
`Material shall be made without prior written consent of the producing Party, except
`as necessary to create documents that, pursuant to the Court’s rules, procedures,
`and order, must be filed or served electronically.
`
`The receiving Party shall be permitted to make a reasonable number of printouts and
`photocopies of Source Code Material, which shall presumptively be a total of ten
`(10), all of which shall be designated and clearly labeled “CONFIDENTIAL -
`SOURCE CODE,” and the receiving Party shall maintain a log of all such files that
`are printed or photocopied.
`
`Should such printouts or photocopies be permissibly transferred back to electronic
`media, such media shall be labeled “CONFIDENTIAL - SOURCE CODE” and
`shall continue to be treated as such.
`
`If the receiving Party’s outside counsel, consultants, or experts obtain printouts or
`photocopies of Source Code Material, the receiving Party shall ensure that such
`outside counsel, consultants, or experts keep the printouts or photocopies in a
`secured locked area in the offices of such outside counsel, consultants, or expert.
`The receiving Party may also temporarily keep the printouts or photocopies at: (i) the
`Court for any proceedings(s) relating to the Source Code Material, for the dates
`associated with the proceeding(s); (ii) the sites where any deposition(s) relating to
`the Source Code Material are taken, for the dates associated with the deposition(s);
`and (iii) any intermediate location reasonably necessary to transport the printouts or
`photocopies (e.g., a hotel prior to a Court proceeding or deposition), provided that
`
`(g)
`
`(h)
`
`
`
`(i)
`
`
`
`(j)
`
`(k)
`
`
`count as a disclosure to a single consultant or expert, provided that such personnel helping in the
`analysis of Source Code Material shall be disclosed pursuant to Paragraph 5(f).
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 14 of 24
`
`(m)
`
`(n)
`
`the printouts or photocopies are kept in a secure manner that ensures access is
`limited to the persons authorized under this Order.
`
`(l) A producing Party’s Source Code Material may only be transported by the
`receiving Party at the direction of a person authorized under paragraph 11(f) above
`to another person authorized under paragraph 11(f) above on paper or removable
`electronic media (e.g., a DVD, CD-ROM, or flash memory “stick”) via hand carry,
`Federal Express, or other similarly reliable courier. Source Code Material may not
`be transported or transmitted electronically over a network of any kind, including
`a LAN, an intranet, or the Internet.
`
`The receiving Party’s outside counsel and/or expert shall be entitled to take notes
`relating to the source code but may not copy any portion of the source code into
`the notes. No copies of all or any portion of the source code may leave the room
`in which the source code is inspected except as otherwise provided herein. Further,
`no other written or electronic record of the source code is permitted except as
`otherwise provided herein. No notes shall be made or stored on the inspection
`computer, or left behind at the site where the inspection computer is made
`available, and any such notes shall be deleted or destroyed by the producing Party,
`without reviewing the substance of the notes, upon discovery. Notwithstanding the
`foregoing, any such notes shall be stamped and treated as “CONFIDENTIAL -
`SOURCE CODE.”
`
`A list of names of persons who will review Source Code Material on the stand-
`alone computer(s) will be provided to the producing Party in conjunction with any
`written (including email) notice requesting inspection. Prior to the first inspection
`of any Source Code Material on the stand-alone computer(s), the receiving Party
`shall provide five (5) business days’ notice to schedule the initial inspection with
`the producing Party. The receiving Party shall provide three (3) business days’
`notice in advance of scheduling any additional inspections. Such notice shall
`include the names and titles for every individual from the receiving Party who will
`attend the inspection. The producing Party may maintain a daily log of the names
`of persons who enter the locked room to view the source code and when they enter
`and depart.
`
`The receiving Party’s outside counsel shall maintain a log of all copies of the
`Source Code Printouts (received from a producing Party) that are delivered by the
`receiving Party to any person. The log shall include the names of the recipients
`and reviewers of copies and locations where the copies are stored. Upon request
`by the producing Party, the receiving Party shall provide reasonable assurances
`and/or descriptions of the security measures employed by the receiving Party
`and/or person that receives a copy of any portion of the source code.
`
`All copies of any portion of the Source Code Printouts shall be securely destroyed
`if they are no longer in use. Copies of Source Code Printouts that are marked as
`deposition exhibits shall not be provided to the Court Reporter or attached to
`
`(o)
`
`(p)
`
`

`

`
`12.
`
`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 15 of 24
`
`deposition transcripts; rather, the deposition record will identify the exhibit by its
`production numbers.
`
`Any attorney representing a Party, whether in-house or outside counsel, and any person
`
`associated with a Party and permitted to receive the other Party’s Protected Material that
`
`are technical in nature (e.g., non-damages) and is designated CONFIDENTIAL -
`
`ATTORNEYS’ EYES ONLY, CONFIDENTIAL - OUTSIDE ATTORNEYS’ EYES
`
`ONLY, and/or CONFIDENTIAL - SOURCE CODE (collectively “HIGHLY SENSITIVE
`
`MATERIAL”), who obtains, receives, has access to, or otherwise learns, in whole or in
`
`part, said Party’s HIGHLY SENSITIVE MATERIAL under this Order shall not prepare,
`
`prosecute, supervise, or assist in the preparation or prosecution of any patent application
`
`pertaining to the Field of the Invention of the patents-in-suit during the pendency of this
`
`Action and for one year after its conclusion, including any appeals. “Field of Invention”
`
`refers to (a) radio frequency (RF) power amplifiers and power detection, and phase
`
`correction techniques and circuits, (b) any products, services, or systems accused of
`
`infringement in this Action, or (c) the patents asserted in this Action and any patent or
`
`application claiming priority to or otherwise related to the patents asserted in this Action.
`
`To ensure compliance with the purpose of this provision, each Party shall create an “Ethical
`
`Wall” between those persons with access to HIGHLY SENSITIVE MATERIAL and any
`
`individuals who prepare, prosecute, supervise or assist in the preparation or prosecution of
`
`any patent application pertaining to the Field of Invention of the patents in suit. Nothing in
`
`this Order shall prevent a person with access to HIGHLY SENSITIVE MATERIAL from
`
`participating in a PTO proceeding, e.g., IPR or PGR, except for that person shall not
`
`participate—directly or indirectly—in the amendment of any claim(s).
`
`13.
`
`Nothing in this Order shall require production of documents, information, or other material
`
`

`

`Case 6:21-cv-01045-ADA Document 47 Filed 04/12/22 Page 16 of 24
`
`that a Party contends is protected from disclosure by the attorney-client privilege, the work
`
`product doctrine, or other privilege, doctrine, or immunity. If documents, information, or
`
`other material subject to a c

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket