throbber
Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 1 of 18
`Case 1:19-cv-11586—IT Document 58-1 Filed 03/31/20 Page 1 of 18
`
`
`
`
`
`
`EXHIBIT A
`
`EXHIBIT A
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 2 of 18
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`DISTRICT OF MASSACHUSETTS
`
`PHILIPS NORTH AMERICA LLC,
`
`
`
`
`
`FITBIT, INC.
`
`
`
`
`
`v.
`
`
`
`Plaintiff,
`
`Defendant.
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`[PROPOSED] PROTECTIVE ORDER
`
`C.A. No. 1:19-cv-11586
`
`
`
`WHEREAS, documents and information may be sought, produced or exhibited by and
`
`among the parties to the above captioned proceeding, which materials relate to trade secrets or
`
`other confidential research, development or commercial information;
`
`IT IS HEREBY ORDERED THAT:
`
`1. Confidential business information is information which concerns or relates to the trade
`
`secrets, processes, operations, style of work, or apparatus, or to the production, sales, shipments,
`
`purchases, transfers, identification of customers, inventories, amount or source of any income,
`
`profits, losses, or expenditures of any person, firm, partnership, corporation, or other organization,
`
`or other information of commercial value, the disclosure of which is likely to have the effect of
`
`either causing substantial harm to the competitive position of the person, firm, partnership,
`
`corporation, or other organization from which the information was obtained.
`
`2. Any information submitted, in discovery or in a pleading, motion, or response to a
`
`motion either voluntarily or pursuant to lawful discovery request, or a court order, which is asserted
`
`4847-7508-1399.2
`
`1
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 3 of 18
`
`
`
`by a party to contain or constitute confidential business information shall be so designated by such
`
`party in writing, or orally at a deposition, conference or hearing. Documents shall be clearly and
`
`prominently marked on their face with the legend: “CONFIDENTIAL” or a comparable notice.
`
`Such information, whether submitted in writing or in oral testimony, shall be treated in accordance
`
`with the terms of this protective order. No party shall redact confidential information in a
`
`document; rather, the disclosing party should simply label the document as Confidential, and if it
`
`becomes relevant, will inform the receiving party subsequently of any particular portion of the
`
`document deemed confidential.
`
`3. In the absence of written permission from the disclosing party or an order by the Court,
`
`any confidential documents or business information submitted in accordance with the provisions
`
`of paragraph 2 above shall not be disclosed to any person other than: (i) outside counsel for parties
`
`to this action, including necessary secretarial and support personnel assisting such counsel; (ii)
`
`qualified persons taking testimony involving such documents or information and necessary
`
`stenographic and clerical personnel thereof; (iii) technical experts and their staff who are employed
`
`for the purposes of this litigation (unless they are otherwise employed by, consultants to, or
`
`otherwise affiliated with a non-governmental party, or are employees of any domestic or foreign
`
`manufacturer, wholesaler, retailer, or distributor of the products, devices or component parts that
`
`are the subject of this action); (iv) the Court and its staff.
`
`4. Confidential business information submitted in accordance with the provisions of
`
`paragraph 2 above shall not be made available to any person designated in paragraph 3(iii) unless
`
`he or she shall have first read this order and shall have signed the undertaking at Attachment A.
`
`However, Attorneys who have filed an appearance in this matter need not sign the undertaking at
`
`4847-7508-1399.2
`
`2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 4 of 18
`
`
`
`Attachment A, but shall nevertheless be subject to, and bound by, the provisions of this Protective
`
`Order.
`
`5. If the Court orders, or the disclosing party agrees, that access to, or dissemination of
`
`information submitted as confidential business information shall be made to persons not included
`
`in paragraph 3 above, such matter shall only be accessible to, or disseminated to, such persons
`
`based upon the conditions pertaining to, and obligations arising from this order, and such persons
`
`shall be considered subject to it, unless the Court finds that the information is not confidential
`
`business information as defined in paragraph 1 hereof.
`
`6. Any confidential business information submitted to the Court in connection with a
`
`motion or other proceeding shall be submitted under seal pursuant to the Local Rules.
`
`7. The restrictions upon, and obligations accruing to, persons who become subject to this
`
`order shall not apply to any information submitted in accordance with paragraph 2 above to which
`
`the person asserting the confidential status thereof agrees in writing, or the Court rules, after an
`
`opportunity for hearing, was publicly known at the time it was supplied to the receiving party or
`
`has since become publicly known through no fault of the receiving party.
`
`8. If a party who receives materials or information that has been designated as confidential
`
`and submitted in accordance with paragraph 2 disagrees with respect to such a designation, in full
`
`or in part, it shall notify the disclosing party in writing, and they will thereupon confer as to the
`
`status of the subject information proffered within the context of this order. If the receiving party
`
`and the disclosing party are unable to concur upon the status of the subject information submitted
`
`as confidential business information within ten days from the date of notification of such
`
`disagreement, the party challenging the confidentiality designation may file a motion with the
`3
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 5 of 18
`
`
`
`Court seeking to remove the confidentiality designation. If such motion is granted, the non-movant
`
`shall compensate the movant for the reasonable expenses and fees associated with the motion. In
`
`the event of a mixed result, the Court may fairly apportion fees and expenses. The Court may sua
`
`sponte question the designation of the confidential status of any information and, after opportunity
`
`for hearing, may remove the confidentiality designation.
`
`9. No less than 10 days (or any other period of time designated by the Court) prior to the
`
`initial disclosure to a proposed expert of any confidential information submitted in accordance
`
`with paragraph 2, the party proposing to use such expert shall submit in writing the name of such
`
`proposed expert and his or her educational and detailed employment history to the opposing party.
`
`If the opposing party objects to the disclosure of such confidential business information to such
`
`proposed expert as inconsistent with the language or intent of this order or on other grounds, it
`
`shall notify the recipient in writing of its objection and the grounds therefore prior to the initial
`
`disclosure. If the dispute is not resolved on an informal basis within ten days of receipt of such
`
`notice of objections, the opposing party may file a motion with the Court seeking to block the
`
`proposed expert’s access to the confidential information. During the pendency of the motion, the
`
`expert shall not have access to the disputed information. If the non-movant prevails on the motion,
`
`the moving party shall pay to the non-movant all reasonable fees and expenses associated with
`
`opposing the motion. In the event of a mixed result, the Court may fairly apportion fees and
`
`expenses.
`
`10. If confidential business information submitted in accordance with paragraph 2 is
`
`disclosed to any person other than in the manner authorized by this protective order, the party
`
`responsible for the disclosure must immediately bring all pertinent facts relating to such disclosure
`
`4847-7508-1399.2
`
`4
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 6 of 18
`
`
`
`to the attention of the party that designated the information as confidential, and make every effort
`
`to prevent further disclosure by it or by the person who was the recipient of such information.
`
`11. If any confidential business information which is supplied in accordance with
`
`paragraph 2 above is supplied by a nonparty to this case, such a nonparty shall be considered a
`
`“party” as that term is used in the context of this order. Each nonparty party shall be provided a
`
`copy of this order by the party seeking information from said party.
`
`12. Source Code. A supplier may designate documents, information, or things that
`
`constitute or contain non-public Source Code of the supplier or of any non-party whose documents
`
`or information a supplier is permitted to produce in this case as “CONFIDENTIAL SOURCE
`
`CODE–ATTORNEYS’ EYES ONLY INFORMATION.”
`
`A. “Source Code” shall mean source code, object code (i.e., computer instructions
`
`and data definitions expressed in a form suitable for input to an assembler, compiler, or
`
`other translator), microcode, register transfer language (“RTL”), firmware, and hardware
`
`description language (“HDL”), as well as any and all programmer notes, annotations, and
`
`other comments of any type related thereto and accompanying the code. For avoidance of
`
`doubt, this includes source files, make files, intermediate output files, executable files,
`
`header files, resource files, library files, module definition files, map files, object files,
`
`linker files, browse info files, and debug files.
`
`B. Materials designated as CONFIDENTIAL SOURCE CODE– ATTORNEYS’
`
`EYES ONLY INFORMATION shall only be reviewable by SOURCE CODE
`
`QUALIFIED PERSONS and shall not be disclosed to anyone except SOURCE CODE
`
`QUALIFIED PERSONS. SOURCE CODE QUALIFIED PERSONS include the
`5
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 7 of 18
`
`
`
`following: (1) outside litigation counsel who have filed an appearance in this matter, and
`
`their support staff assisting such counsel who are necessarily incident to this litigation; (2)
`
`personnel at document duplication, coding, imaging or scanning service establishments
`
`retained by, but not regularly employed by, outside litigation counsel as necessarily
`
`incident to the litigation; (3) personnel at interpretation/translation service establishments
`
`retained by, but not regularly employed by, outside litigation counsel as necessarily
`
`incident to the litigation, including without limitation oral interpreters and document
`
`translators; (4) court reporters, stenographers, and videographers transcribing or recording
`
`testimony at depositions, hearings or trial, who have signed an acknowledgment to be
`
`bound by the Protective Order in this case; and (5) qualified experts (whether testifying
`
`experts or non-testifying consultants) in this case (under paragraph 9 and paragraph 12(C)
`
`of the Protective Order in this case). Nothing in this paragraph shall prevent a supplier from
`
`disclosing its own Source Code to the supplier’s own employees or qualified experts.
`
`Materials designated as CONFIDENTIAL SOURCE CODE–ATTORNEYS’ EYES
`
`ONLY INFORMATION shall not be disclosed to In-House Counsel of a receiving party
`
`or to any other employee of a receiving party.
`
`C. Consistent with paragraph 9 of the Protective Order, qualified experts may
`
`review CONFIDENTIAL
`
`SOURCE CODE–ATTORNEYS’ EYES ONLY
`
`INFORMATION only after the receiving party complies with the provisions of paragraph
`
`9 of this Protective Order for the qualified expert additionally indicating that the proposed
`
`expert will receive CONFIDENTIAL SOURCE CODE-ATTORNEYS’ EYES ONLY
`
`INFORMATION.
`
`D. Source Code shall be provided with the following additional protections:
`6
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 8 of 18
`
`
`
`(i) Nothing in this Protective Order shall obligate the parties to produce any
`
`Source Code, nor act as an admission that any particular Source Code is
`
`discoverable.
`
`(ii) Access to Source Code will be given only to SOURCE CODE
`
`QUALIFIED PERSONS and, at depositions, hearings and trial, to witnesses who
`
`would otherwise be permitted access to such Source Code including supplier’s
`
`experts.
`
`(iii) Access to Source Code shall be provided on no more than two “stand-
`
`alone” computer(s) (i.e., the computer(s) may not be linked to any network,
`
`including a local area network (“LAN”), an intranet, or the Internet, and may not
`
`be connected to any printer or storage device other than the internal hard disk drive
`
`of the computer).. The stand-alone computer(s) shall be kept in a secure location at
`
`the offices of the supplier’s outside litigation counsel or at such other location as
`
`the supplier and receiving party mutually agree. If the supplier objects to a
`
`particular location for the review of source code, the supplier and receiving party
`
`agree to meet and confer in good faith regarding such objection and present the
`
`dispute to the Court if they are not able to reach agreement The stand-alone secure
`
`computer(s) may be password protected and shall have the Source Code stored on
`
`a hard drive contained inside the computer(s). The supplier shall produce Source
`
`Code in computer searchable format on the stand-alone computer(s) which shall
`
`have standard operating-system-provided tools provided by the receiving party at
`
`least three (3) days before review, such as findstr, grep, diff, AWK, cscript,
`
`command line access, or other agreed upon tools such as SciTools, Understand,
`7
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 9 of 18
`
`
`
`PowerGrep, Apple XCode, Microsoft Visual Studio, dtSearch, WinMerge, Sigasi,
`
`Ctgwin, and shall have standard text editors for printing such as Notepad++,
`
`TextWrangler, EditPad and the like. The standalone computer(s) shall, at the
`
`receiving party’s request, include reasonable analysis tools and translation software
`
`appropriate for the type of Source Code and language of any comments. The
`
`receiving party shall be responsible for providing the tools, licenses to the tools
`
`and/or software that it wishes to use so that the supplier may install such tools and
`
`software on the stand-alone computer. To the extent that such tools or software
`
`record local working files or other records reflecting the work performed by the
`
`receiving party, such files and records shall not be reviewed, altered, or deleted by
`
`the supplier. If the supplier objects to particular software tools or software proposed
`
`by the receiving party, the supplier and receiving party agree to meet and confer
`
`regarding such objection and to present the dispute to the Court if they are not able
`
`to reach agreement.
`
`(iv) The receiving party shall provide at least two (2) business days’ notice
`
`to access the source code and shall only have access to the standalone secure
`
`computer(s) during business hours, which for purposes of this paragraph shall be
`
`9:00 a.m. through 6:00 p.m. local time at the reviewing location. The parties are to
`
`cooperate in good faith such that maintaining the Source Code at the offices of the
`
`supplier’s outside litigation counsel shall not unreasonably hinder the receiving
`
`party’s ability to efficiently conduct the prosecution or defense of this case. It is
`
`expected that access to the Source Code shall be provided at the site of any
`
`deposition, hearing or trial. Proper identification of all SOURCE CODE
`
`4847-7508-1399.2
`
`8
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 10 of 18
`
`
`
`QUALIFIED PERSONS shall be provided prior to any access to the stand-alone
`
`secure computer.
`
`(v) All SOURCE CODE QUALIFIED PERSONS who will review Source
`
`Code on behalf of a receiving party shall be identified in writing to the supplier at
`
`least two (2) business days in advance of the first time that such person reviews
`
`such Source Code. Such identification shall be in addition to any disclosure
`
`required under paragraphs 12(B) and 12(C) of this Protective Order. The supplier
`
`shall provide these individuals with information explaining how to start, log on to,
`
`and operate the stand-alone computer in order to access the produced Source Code
`
`on the stand-alone secure computer(s). For subsequent reviews by SOURCE CODE
`
`QUALIFIED PERSONS, the receiving party shall give at least one business day
`
`(and at least 24 hours’) notice to the supplier of such review. To the extent that the
`
`receiving party wishes to continue a source code review from one day to the next,
`
`the receiving party shall notify the supplier by 5:00 p.m. local time on the day of
`
`the source code review..
`
`(vi) No person other than the supplier may alter, dismantle, disassemble or
`
`modify the stand-alone computer(s) in any way, or attempt to circumvent any
`
`security feature of the computer(s).
`
`(vii) No copies shall be made of Source Code, whether physical, electronic,
`
`or otherwise, other than volatile copies necessarily made in the normal course of
`
`accessing the Source Code on the stand-alone computer(s), except for:
`
`4847-7508-1399.2
`
`9
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 11 of 18
`
`
`
`(1) print outs of reasonable portions of the Source Code in
`
`accordance with the provisions of paragraphs 12(D)(ix)-(x) of this
`
`Protective Order; (2) notes and other analysis made of the Source Code, and
`
`(3) such other uses to which the parties may agree or that the Court may
`
`order. The receiving party shall not use any outside electronic device to
`
`copy, record, photograph, or otherwise reproduce Source Code.
`
`“Reasonable portions of the Source Code” shall be limited to the portions
`
`that are necessary for a qualified expert to discuss when explaining his or
`
`her opinions, and are subject to the limits in section (ix) below. Pages shall
`
`not be printed for the purpose of reviewing code in the first instance, as code
`
`review is to take place on the stand-alone computer(s). The supplier shall
`
`not unreasonably withhold approval and the parties shall meet and confer in
`
`good faith to resolve any disputes. The receiving party may take notes on a
`
`non-networked laptop, provided such device does not have a camera and
`
`does not have any network connectivity in the source code review room.
`
`The receiving party may not copy Source Code itself into the notes, but may
`
`take note of directories and filenames. The receiving party may not take
`
`such notes on the stand-alone computer(s) containing the Source Code, but
`
`rather only on paper or on the separate non-networked laptop. No
`
`networked devices or recordable media or recordable devices, including
`
`without limitation computers, tablets, smartphones, cellular telephones,
`
`peripheral equipment, cameras, sound recorders, CDs, DVDs, or drives of
`
`any kind, shall be permitted into the source code review room with the
`
`4847-7508-1399.2
`
`10
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 12 of 18
`
`
`
`stand-alone computer(s). Any notes taken regarding Source Code, whether
`
`on paper or electronically, shall be treated as CONFIDENTIAL SOURCE
`
`CODE– ATTORNEYS’ EYES ONLY INFORMATION under this
`
`Protective Order. The supplier may exercise personal supervision from
`
`outside the review room over the receiving party when the receiving party
`
`is in the Source Code review room. Such supervision, however, shall not
`
`entail review of any work product generated by the receiving party, e.g.,
`
`monitoring the screen of the stand-alone computer, monitoring any surface
`
`reflecting any notes or work product of the receiving party, or monitoring
`
`the key strokes of the receiving party. There will be no video supervision
`
`by any supplier.
`
`(viii) Nothing may be removed from the stand-alone computer, either by the
`
`receiving party or at the request of the receiving party, except for (1) print outsof
`
`reasonable portions of the Source Code in accordance with the provisions of
`
`paragraphs 12(C)(ix)-(x) of this Protective Order; and (2) such other uses to which
`
`the parties may agree or that the Court may order.
`
`(ix) At the request of the receiving party, the supplier shall within three (3)
`
`business days provide one (1) hard copy print out of the specific lines, pages, or
`
`files of the Source Code that the receiving party believes in good faith are necessary
`
`for its qualified expert to discuss when explaining his or her opinions regarding a
`
`relevant feature of an accused or alleged domestic industry product. If the supplier
`
`objects in any manner to the production of the requested source code (e.g., the
`
`request is too voluminous), it shall state its objection within the allotted two (2)
`11
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 13 of 18
`
`
`
`business days pursuant to this paragraph. Any printed portion that consists of more
`
`than twenty-five (25) pages of a continuous block of Source Code shall be
`
`presumed to be excessive. Without permission by the supplier or leave from the
`
`Court, the receiving party may request printed copies of no more than five hundred
`
`(500) pages of total Source Code. In the event of a dispute, the parties will meet
`
`and confer within five (5) business days of the objection being raised, and if they
`
`cannot resolve it the parties will raise it with the Court.
`
`(x) Hard copy print outs of Source Code shall be provided on Bates
`
`numbered and watermarked or colored paper clearly labeled CONFIDENTIAL
`
`SOURCE CODE–ATTORNEYS’ EYES ONLY INFORMATION on each page
`
`and shall be maintained by the receiving party's outside litigation counsel or
`
`SOURCE CODE QUALIFIED PERSONS in a secured locked area. The receiving
`
`party may also temporarily keep the print outs at: (1) the Court for any
`
`proceedings(s) relating to the Source Code, for the dates associated with the
`
`proceeding(s); (2) the sites where any deposition(s) relating to the Source Code are
`
`taken, for the dates associated with the deposition(s); and (3) any intermediate
`
`location reasonably necessary to transport the print outs (e.g., a hotel prior to a
`
`Court proceeding or deposition). For avoidance of doubt, an access-restricted
`
`location within the facilities of outside litigation counsel or a qualified expert, such
`
`as a conference room within an access restricted office or a locked drawer or
`
`cabinet, shall constitute a secured locked area. The receiving party shall exercise
`
`due care in maintaining the security of the print outs at these temporary locations.
`
`No further hard copies of such Source Code shall be made and the Source Code
`
`4847-7508-1399.2
`
`12
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 14 of 18
`
`
`
`shall not be transferred into any electronic format or onto any electronic media
`
`except that:
`
`1. The receiving party is permitted to make up to three (3) additional
`
`hard copies for use at a deposition. One hard copy of the source code may
`
`be marked as an exhibit for the deposition, and then maintained by counsel
`
`for the party presenting the exhibit during the deposition in a secured locked
`
`area. All other copies shall be destroyed immediately after the deposition is
`
`concluded.
`
`2. The receiving party is permitted to make up to five (5) additional
`
`hard copies for the Court in connection with a filing, hearing, or trial, and
`
`of only the specific pages directly relevant to and necessary for deciding the
`
`issue for which the portions of the Source Code are being filed or offered.
`
`To the extent portions of Source Code are quoted in a filing, either (1) the
`
`entire document will be stamped and treated as CONFIDENTIAL
`
`SOURCE CODE–ATTORNEYS’ EYES ONLY INFORMATION; or (2)
`
`those pages containing quoted Source Code will be separately stamped and
`
`treated as CONFIDENTIAL SOURCE CODE– ATTORNEYS’ EYES
`
`ONLY INFORMATION.
`
`3. Electronic copies of Source Code may be made to be included in
`
`documents which, pursuant to the Court’s rules, procedures and order(s),
`
`may be filed or served electronically. Only the necessary amount of
`
`electronic copies to effectuate such filing or service may be stored on any
`
`4847-7508-1399.2
`
`13
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 15 of 18
`
`
`
`receiving party server, hard drive, thumb drive, or other electronic storage
`
`device at any given time. After any such electronic filing or service, the
`
`receiving party may maintain reasonable copies of such filings, but shall
`
`delete all other electronic copies of Source Code from all receiving party
`
`electronic storage devices.
`
`4.
`
`5. The supplier shall, on request, make a searchable electronic copy
`
`of the Source Code available on a stand-alone computer during depositions
`
`of witnesses who would otherwise be permitted access to such Source Code.
`
`The receiving party shall make such request at the time of the notice for
`
`deposition.
`
`(xi) Nothing in this Protective Order shall be construed to limit how a
`
`supplier may maintain material designated as CONFIDENTIAL SOURCE CODE–
`
`ATTORNEYS’ EYES ONLY INFORMATION.
`
`(xii) Outside litigation counsel for the receiving party with custody of
`
`CONFIDENTIAL
`
`SOURCE
`
`CODE–ATTORNEYS’
`
`EYES
`
`ONLY
`
`INFORMATION shall maintain a source code log containing the following
`
`information: (1) the identity of each person granted access to the CONFIDENTIAL
`
`SOURCE CODE–ATTORNEYS’ EYES ONLY INFORMATION; and (2) the first
`
`date on which such access was granted. Outside litigation counsel for the receiving
`
`party will produce, upon request, each such source code log to the supplier within
`
`twenty (20) days of the final disposition of the case.
`14
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 16 of 18
`
`
`
`13.
`
`Access for Designated In-House Counsel and Prosecution Bar. The term
`
`“Designated In-House Counsel” means an in-house attorney who has met the conditions
`
`specified in this paragraph 13 for access to certain information designated under this Protective
`
`Order. A party may designate no more than three (3) in-house counsel in total under this
`
`paragraph 13.
`
`(b)
`
`Each person designated as a Designated In-House Counsel must read the
`
`Protective Order including any Addenda thereto, and must agree, by letter filed served on
`
`all parties: (i) to be bound by the terms thereof; (ii) not to reveal information designated
`
`under the Protective Order to anyone other than another person properly designated under
`
`this paragraph or under paragraph 3; (iii) to utilize such information solely for purposes
`
`of this dispute; (iv) to the acknowledgement printed at paragraph 4 of this Protective
`
`Order, which acknowledgement shall be printed in the letter; and (v) to be bound by the
`
`Prosecution Bar in paragraph 14 below.
`
`(d)
`
`An in-house counsel who has been designated as a Designated In-House
`
`Counsel, and whose letter of agreement has been served in accordance with section (b)
`
`above, may thereafter have access to materials designated under this Protective Order
`
`except that:
`
`(1)
`
`No Designated In-House Counsel shall have access to any
`
`materials designated “CONFIDENTIAL SOURCE CODE–ATTORNEYS’ EYES
`
`ONLY INFORMATION” or otherwise designated as containing Source Code.
`
` (e) Nothing in this paragraph 13 shall be construed to prevent any
`
`designating party from agreeing, if it so desires, to share information it has
`
`designated under this Protective Order with any other party or person.
`
`4847-7508-1399.2
`
`15
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 17 of 18
`
`14.
`
`Prosecution Bar
`
`(a)
`
`Any Designated In-House Counsel of Complainants who personally
`
`receives and reviews any material designated under this Protective Order, shall not
`
`participate in the preparation or prosecution of any patent, patent application,
`
`reexamination petition, or reissue application, or the drafting or revising of patent claims,
`
`directed to wearable monitoring devices, such as activity trackers and fitness trackers,
`
`including health and activity monitoring devices, that may be worn on the wrist like a
`
`watch or bracelet or attached to clothing, from the time of receipt of such material
`
`through and including the first to occur of the following: (i) one (1) year following the
`
`expiration of the last patent being asserted in this case; (ii) one (1) year following the
`
`complete resolution of this case through entry of a final non-appealable judgment or
`
`order for which appeal has been exhausted; or (iii) one ( 1) year following the complete
`
`settlement of all claims against all the parties in this action.
`
`(b) Nothing in this Prosecution Bar shall prohibit any Designated In-House
`
`Counsel from participating in any post-grant proceedings before the United States Patent
`
`and Trademark Office (or any similar agency of a foreign government), including but not
`
`limited to inter partes review, covered business method review, post-grant review, or ex
`
`parte reexamination, to the extent that such person’s participation does not involve the
`
`drafting or amending of patent claims for wearable monitoring devices, such as activity
`
`trackers and fitness trackers, including health and activity monitoring devices, that may
`
`be worn on the wrist like a watch or bracelet or attached to clothing.
`
`
`
`16
`
`
`
`
`
`
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 58-1 Filed 03/31/20 Page 18 of 18
`
`
`
`Attachment A
`
`NONDISCLOSURE AGREEMENT
`
`I, ___________________ , do solemnly swear or affirm that I will not divulge any
`
`information communicated to me in any confidential portion of the present Philips North
`
`America, Inc v. Fitbit LLC litigation pending in the District of Massachusetts, Case. No. C.A.
`
`No. 1:19-cv-11586, except as permitted in the protective order issued in this case. I will not
`
`directly or indirectly use, or allow the use of such information for any purpose other than that
`
`directly associated with my official duties in this case.
`
`Further, I will not by direct action, discussion, recommendation, or suggestion to any
`
`person reveal the nature or content of any information communicated during any confidential
`
`portion of this proceeding or hearing in this case. I also affirm that I do not hold any position or
`
`official relationship with any of the participants in this case aside from the role I have been
`
`engaged to perform in this litigation.
`
`I am aware that the unauthorized use or conveyance of information as specified above is
`
`a violation of Court’s protective order, and sanctionable as contempt.
`
`Signed: ___________________________
`
`Printed Name: ______________________
`
`Dated: ____________________________
`
`Firm or affiliation: __________________
`
`
`
`4847-7508-1399.2
`
`17
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket