`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 2 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 2 of 17
`
`by a party to contain or constitute confidential business information shall be so designated by such
`
`party in writing, or orally at a deposition, conference or hearing. Documents shall be clearly and
`
`prominently marked on their face with the legend: “CONFIDENTIAL” or a comparable notice.
`
`Such information, whether submitted in writing or in oral testimony, shall be treated in accordance
`
`with the terms of this protective order. No party shall redact confidential information in a
`
`document; rather, the disclosing party should simply label the document as Confidential, and if it
`
`becomes relevant, will inform the receiving party subsequently of any particular portion of the
`
`document deemed confidential.
`
`3. In the absence of written permission from the disclosing party or an order by the Court,
`
`any confidential documents or business information submitted in accordance with the provisions
`
`of paragraph 2 above shall not be disclosed to any person other than: (i) outside counsel for parties
`
`to this action, including necessary secretarial and support personnel assisting such counsel; (ii)
`
`qualified persons taking testimony involving such documents or information and necessary
`
`stenographic and clerical personnel thereof; (iii) technical experts and their staff who are employed
`
`for the purposes of this litigation (unless they are otherwise employed by, consultants to, or
`
`otherwise affiliated with a non-governmental party, or are employees of any domestic or foreign
`
`manufacturer, wholesaler, retailer, or distributor of the products, devices or component parts that
`
`are the subject of this action); (iv) the Court and its staff.
`
`4. Confidential business information submitted in accordance with the provisions of
`
`paragraph 2 above shall not be made available to any person designated in paragraph 3(iii) unless
`
`he or she shall have first read this order and shall have signed the undertaking at Attachment A.
`
`However, Attorneys who have filed an appearance in this matter need not sign the undertaking at
`
`4847-7508-1399.2
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 3 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 3 of 17
`
`Attachment A, but shall nevertheless be subject to, and bound by, the provisions of this Protective
`
`Order.
`
`5. If the Court orders, or the disclosing party agrees, that access to, or dissemination of
`
`information submitted as confidential business information shall be made to persons not included
`
`in paragraph 3 above, such matter shall only be accessible to, or disseminated to, such persons
`
`based upon the conditions pertaining to, and obligations arising from this order, and such persons
`
`shall be considered subject to it, unless the Court finds that the information is not confidential
`
`business information as defined in paragraph 1 hereof.
`
`itial business information submitted to the Cou
`_6“.“A~H§L—Cnnfl '
`
`Ma
`
`
`e submitted underm'fi‘theizocalw
`motion orptherpmceedingshal
`
`7. The restrictions upon, and obligations accruing to, persons who become subject to this
`
`order shall not apply to any information submitted in accordance with paragraph 2 above to which
`
`the person asserting the confidential status thereof agrees in writing, or the Court rules, after an
`
`opportunity for hearing, was publicly known at the time it was supplied to the receiving party or
`
`has since become publicly known through no fault of the receiving party.
`
`8. If a party who receives materials or information that has been designated as confidential
`
`and submitted in accordance with paragraph 2 disagrees with respect to such a designation, in full
`
`or in part, it shall notify the disclosing party in writing, and they will thereupon confer as to the
`
`status of the subject information proffered within the context of this order. If the receiving party
`
`and the disclosing party are unable to concur upon the status of the subject information submitted
`
`as confidential business information within ten days from the date of notification of such
`
`disagreement, the party challenging the confidentiality designation may file a motion with the
`
`4847-7508-1399.2
`
`3
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 4 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 4 of 17
`
`Court seeking to remove the confidentiality designation. If such motion is granted, the non-movant
`
`shall compensate the movant for the reasonable expenses and fees associated with the motion. In
`
`the event of a mixed result, the Court may fairly apportion fees and expenses. The Court may sua
`
`sponte question the designation of the confidential status of any information and, after opportunity
`
`for hearing, may remove the confidentiality designation.
`
`9. No less than 10 days (or any other period of time designated by the Court) prior to the
`
`initial disclosure'to a proposed expert of any confidential information submitted in accordance
`
`with paragraph 2, the party proposing to use such expert shall submit in writing the name of such
`
`proposed expert and his or her educational and detailed employment history to the opposing party.
`
`If the opposing party objects to the disclosure of such confidential business information to such
`
`proposed expert as inconsistent with the language or intent of this order or on other grounds, it
`
`shall notify the recipient in writing of its objection and the grounds therefore prior to the initial
`
`disclosure. If the dispute is not resolved on an informal basis Within ten days of receipt of such
`
`notice of objections, the opposing party may file a motion with the Court seeking to block the
`
`proposed expert’s access to the confidential information. During the pendency of the motion, the
`
`expert shall not have access to the disputed information. If the non-movant prevails on the motion,
`
`the moving party shall pay to the non-movant all reasonable fees and expenses associated with
`
`opposing the motion.
`
`In the event of a mixed result, the Court may fairly apportion fees and
`
`expenses.
`
`10. If confidential business information submitted in accordance with paragraph 2 is
`
`disclosed to any person other than in the manner authorized by this protective order, the party
`
`responsible for the disclosure must immediately bring all pertinent facts relating to such disclosure
`
`4847-7508-13992
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 5 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 5 of 17
`
`to the attention of the party that designated the information as confidential, and make every effort
`
`to prevent fitrther disclosure by it or by the person who was the recipient of such information.
`
`11. If any confidential business information which is supplied in accordance with
`
`paragraph 2 above is supplied by a nonparty to this case, such a nonparty shall be considered a
`
`“party” as that term is used in the context of this order. Each nonparty party shall be provided a
`
`copy of this order by the party seeking information from said party.
`
`12. Source Code. A supplier may designate documents,
`
`information, or things that
`
`constitute or contain non-public Source Code of the supplier or of any non-party Whose documents
`
`or information a supplier is permitted to produce in this case as “CONFIDENTIAL SOURCE
`
`CODE—ATTORNEYS’ EYES ONLY INFORMATION.”
`
`A. “Source Code” shall mean source code, object code (i.e., computer instructions
`
`and data definitions expressed in a form suitable for input to an assembler, compiler, or
`
`other translator), microcode, register transfer language (“RTL”), firmware, and hardware
`
`description language (“HDL”), as well as any and all programmer notes, annotations, and
`
`other comments of any type related thereto and accompanying the code. For avoidance of
`
`doubt, this includes source files, make files, intermediate output files, executable files,
`
`header files, resource files, library files, module definition files, map files, object files,
`
`linker files, browse info files, and debug files.
`
`B. Materials designated as CONFIDENTIAL SOURCE CODE— ATTORNEYS’
`
`EYES ONLY INFORMATION shall only be reviewable by SOURCE CODE
`
`QUALIFIED PERSONS and shall not be disclosed to anyone except SOURCE CODE
`
`QUALIFIED PERSONS. SOURCE CODE QUALIFIED PERSONS include the
`
`4847-7508-1399.2
`
`5
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 6 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 6 of 17
`
`following: (1) outside litigation counsel who have filed an appearance in this matter, and
`
`their support staff assisting such counsel who are necessarily incident to this litigation; (2)
`
`personnel at document duplication, coding, imaging or scanning service establishments
`
`retained by, but not regularly employed by, outside litigation counsel as necessarily
`
`incident to the litigation; (3) personnel at interpretation/translation service establishments
`
`retained by, but not regularly employed by, outside litigation counsel as necessarily
`
`incident to the litigation,
`
`including without limitation oral interpreters and document
`
`translators; (4) court reporters, stenographers, and videographers transcribing or recording
`,AT
`testimony at depositions,W who have signed an acknowledgment to be
`
`bound by the Protective Order in this case; and (5) qualified experts (whether testifying
`
`experts or non-testifying consultants) in this case (under paragraph 9 and paragraph 12(C)
`
`of the Protective Order in this case). Nothing in this paragraph shall prevent a supplier from
`
`disclosing its own Source Code to the supplier’s own employees or qualified experts.
`
`Materials designated as CONFIDENTIAL SOURCE CODE—ATTORNEYS’ EYES
`
`ONLY INFORMATION shall not be disclosed to In—House Counsel of a receiving party
`
`or to any other employee of a receiving party.
`
`C. Consistent with paragraph 9 of the Protective Order, qualified experts may
`
`review
`
`CONFIDENTIAL
`
`SOURCE
`
`CODE—ATTORNEYS’
`
`EYES
`
`ONLY
`
`INFORMATION only after the receiving party complies with the provisions of paragraph
`
`9 of this Protective Order for the qualified expert additionally indicating that the proposed
`
`expert will receive CONFIDENTIAL SOURCE CODE-ATTORNEYS’ EYES ONLY
`
`INFORMATION.
`
`D. Source Code shall be provided with the following additional protections:
`
`4847-7508-13992
`
`6
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 7 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 7 of 17
`
`(i) Nothing in this Protective Order shall obligate the parties to produce any
`
`Source Code, nor act as an admission that any particular Source Code is
`
`discoverable.
`
`(ii) Access to Source Code will be given only to SOURCE CODE
`
`QUALIFIED PERSONS and, at depositions, hearings and trial, to witnesses who
`
`would otherwise be permitted access to such Source Code including supplier’s
`
`experts.
`
`(iii) Access to Source Code shall be provided on no more than two “stand-
`
`alone” computer(s) (i.e.,
`
`the computer(s) may not be linked to any network,
`
`including a local area network (“LAN”), an intranet, or the Internet, and may not
`
`be connected to any printer or storage device other than the internal hard disk drive
`
`of the computer).. The stand-alone computer(s) shall be kept in a secure location at
`
`the offices of the supplier’s outside litigation counsel or at such other location as
`
`the supplier and receiving party mutually agree. If the supplier objects to a
`
`particular location for the review of source code, the supplier and receiving party
`
`agree to meet and confer in good faith regarding such objection and present the
`
`dispute to the Court if they are not able to reach agreement The stand-alone secure
`
`computer(s) may be password protected and shall have the Source Code stored on
`
`a hard drive contained inside the computer(s). The supplier shall produce Source
`
`Code in computer searchable format on the stand-alone computer(s) which shall
`
`have standard operating-system-provided tools provided by the receiving party at
`
`least three (3) days before review, such as findstr, grep, diff, AWK, cscript,
`
`command line access, or other agreed upon tools such as SciTools, Understand,
`
`4847-7508-13992
`
`7
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 8 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 8 of 17
`
`PowerGrep, Apple XCode, Microsoft Visual Studio, dtSearch, WinMerge, Sigasi,
`
`Ctgwin, and shall have standard text editors for printing such as Notepad++,
`
`TextWrangler, EditPad and the like. The standalone computer(s) shall, at the
`
`receiving party’s request, include reasonable analysis tools and translation software
`
`appropriate for the type of Source Code and language of any comments. The
`
`receiving party shall be responsible for providing the tools, licenses to the tools
`
`and/or software that it wishes to use so that the supplier may install such tools and
`
`software on the stand-alone computer. To the extent that such tools or software
`
`record local working files or other records reflecting the work performed by the
`
`receiving party, such files and records shall not be reviewed, altered, or deleted by
`
`the supplier. If the supplier objects to particular software tools or software proposed
`
`by the receiving party, the supplier and receiving party agree to meet and confer
`
`regarding such objection and to present the dispute to the Court if they are not able
`
`to reach agreement.
`
`(iv) The receiving party shall provide at least two (2) business days’ notice
`
`to access the source code and shall only have access to the standalone secure
`
`computer(s) during business hours, which for purposes of this paragraph shall be
`
`9:00 am. through 6:00 pm. local time at the reviewing location. The parties are to
`
`cooperate in good faith such that maintaining the Source Code at the offices of the
`
`supplier’s outside litigation counsel shall not unreasonably hinder the receiving
`
`party’s ability to efficiently conduct the prosecution or defense of this case. It is
`
`expected that access to the Source Code shall be provided at the site of any
`
`deposition, hearing or
`
`trial. Proper
`
`identification of all SOURCE CODE
`
`4847-7508-1399.2
`
`8
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 9 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 9 of 17
`
`QUALIFIED PERSONS shall be provided prior to any access to the stand—alone
`
`secure computer.
`
`(V) All SOURCE CODE QUALIFIED PERSONS who will review Source
`
`Code on behalf of a receiving party shall be identified in writing to the supplier at
`
`least two (2) business days in advance of the first time that such person reviews
`
`such Source Code. Such identification shall be in addition to any disclosure
`
`required under paragraphs 12(B) and 12(C) of this Protective Order. The supplier
`
`shall provide these individuals with information explaining how to start, log on to,
`
`and operate the stand-alone computer in order to access the produced Source Code
`
`on the stand-alone secure computer(s). For subsequent reviews by SOURCE CODE
`
`QUALIFIED PERSONS, the receiving party shall give at least one business day
`
`(and at least 24 hours’) notice to the supplier of such review. To the extent that the
`
`receiving party wishes to continue a source code review from one day to the next,
`
`the receiving party shall notify the supplier by 5:00 pm. local time on the day of
`
`the source code review..
`
`(vi) No person other than the supplier may alter, dismantle, disassemble or
`
`modify the stand-alone computer(s) in any way, or attempt to circumvent any
`
`security feature of the computer(s).
`
`(vii) No copies shall be made of Source Code, whether physical, electronic,
`
`or otherwise, other than volatile copies necessarily made in the normal course of
`
`accessing the Source Code on the stand-alone computer(s), except for:
`
`4847-7508-13992
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 10 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 10 of 17
`
`(1) print outs of reasonable portions of the Source Code in
`
`accordance with the provisions of paragraphs 12(D)(ix)-(x) of this
`
`Protective Order; (2) notes and other analysis made of the Source Code, and
`
`(3) such other uses to which the parties may agree or that the Court may
`
`order. The receiving party shall not use any outside electronic device to
`
`copy,
`
`record,
`
`photograph,
`
`or otherwise
`
`reproduce Source Code.
`
`“Reasonable portions of the Source Code” shall be limited to the portions
`
`that are necessary for a qualified expert to discuss when explaining his or
`
`her opinions, and are subject to the limits in section (ix) below. Pages shall
`
`not be printed for the purpose ofreviewing code in the first instance, as code
`
`review is to take place on the stand-alone computer(s). The supplier shall
`
`not unreasonably withhold approval and the parties shall meet and confer in
`
`good faith to resolve any disputes. The receiving party may take notes on a
`
`non-networked laptop, provided such device does not have a camera and
`
`does not have any network connectivity in the source code review room.
`
`The receiving party may not copy Source Code itself into the notes, but may
`
`take note of directories and filenames. The receiving party may not take
`
`such notes on the stand-alone computer(s) containing the Source Code, but
`
`rather only on paper or on the separate non-networked laptop. No
`
`networked devices or recordable media or recordable devices, including
`
`without limitation computers, tablets, smartphones, cellular telephones,
`
`peripheral equipment, cameras, sound recorders, CDs, DVDs, or drives of
`
`any kind, shall be permitted into the source code review room with the
`
`4847-7508-1399.2
`
`10
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 11 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 11 of 17
`
`stand-alone computer(s). Any notes taken regarding Source Code, whether
`
`on paper or electronically, shall be treated as CONFIDENTIAL SOURCE
`
`CODE— ATTORNEYS’ EYES ONLY INFORMATION under
`
`this
`
`Protective Order. The supplier may exercise personal supervision from
`
`outside the review room over the receiving party when the receiving party
`
`is in the Source Code review room. Such supervision, however, shall not
`
`entail review of any work product generated by the receiving party, e.g.,
`
`monitoring the screen of the stand—alone computer, monitoring any surface
`
`reflecting any notes or work product of the receiving party, or monitoring
`
`the key strokes of the receiving party. There will be no video supervision
`
`by any supplier.
`
`(viii) Nothing may be removed from the stand—alone computer, either by the
`
`receiving party or at the request of the receiving party, except for (1) print outsof
`
`reasonable portions of the Source Code in accordance with the provisions of
`
`paragraphs 12(C)(ix)-(x) of this Protective Order; and (2) such other uses to which
`
`the parties may agree or that the Court may order.
`
`(ix) At the request of the receiving party, the supplier shall within three (3)
`
`business days provide one (1) hard copy print out of the specific lines, pages, or
`
`files of the Source Code that the receiving party believes in good faith are necessary
`
`for its qualified expert to discuss when explaining his or her opinions regarding a
`
`relevant feature of an accused or alleged domestic industry product. If the supplier
`
`objects in any manner to the production of the requested source code (e.g., the
`
`request is too voluminous), it shall state its objection within the allotted two (2)
`
`4847-7508-1399.2
`
`ll
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 12 of 17
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 13 of 17
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 14 of 17
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 15 of 17
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 16 of 17
`
`
`
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 17 of 17
`
`