throbber
Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 1 of 17
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 2 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 2 of 17
`
`by a party to contain or constitute confidential business information shall be so designated by such
`
`party in writing, or orally at a deposition, conference or hearing. Documents shall be clearly and
`
`prominently marked on their face with the legend: “CONFIDENTIAL” or a comparable notice.
`
`Such information, whether submitted in writing or in oral testimony, shall be treated in accordance
`
`with the terms of this protective order. No party shall redact confidential information in a
`
`document; rather, the disclosing party should simply label the document as Confidential, and if it
`
`becomes relevant, will inform the receiving party subsequently of any particular portion of the
`
`document deemed confidential.
`
`3. In the absence of written permission from the disclosing party or an order by the Court,
`
`any confidential documents or business information submitted in accordance with the provisions
`
`of paragraph 2 above shall not be disclosed to any person other than: (i) outside counsel for parties
`
`to this action, including necessary secretarial and support personnel assisting such counsel; (ii)
`
`qualified persons taking testimony involving such documents or information and necessary
`
`stenographic and clerical personnel thereof; (iii) technical experts and their staff who are employed
`
`for the purposes of this litigation (unless they are otherwise employed by, consultants to, or
`
`otherwise affiliated with a non-governmental party, or are employees of any domestic or foreign
`
`manufacturer, wholesaler, retailer, or distributor of the products, devices or component parts that
`
`are the subject of this action); (iv) the Court and its staff.
`
`4. Confidential business information submitted in accordance with the provisions of
`
`paragraph 2 above shall not be made available to any person designated in paragraph 3(iii) unless
`
`he or she shall have first read this order and shall have signed the undertaking at Attachment A.
`
`However, Attorneys who have filed an appearance in this matter need not sign the undertaking at
`
`4847-7508-1399.2
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 3 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 3 of 17
`
`Attachment A, but shall nevertheless be subject to, and bound by, the provisions of this Protective
`
`Order.
`
`5. If the Court orders, or the disclosing party agrees, that access to, or dissemination of
`
`information submitted as confidential business information shall be made to persons not included
`
`in paragraph 3 above, such matter shall only be accessible to, or disseminated to, such persons
`
`based upon the conditions pertaining to, and obligations arising from this order, and such persons
`
`shall be considered subject to it, unless the Court finds that the information is not confidential
`
`business information as defined in paragraph 1 hereof.
`
`itial business information submitted to the Cou
`_6“.“A~H§L—Cnnfl '
`
`Ma
`
`
`e submitted underm'fi‘theizocalw
`motion orptherpmceedingshal
`
`7. The restrictions upon, and obligations accruing to, persons who become subject to this
`
`order shall not apply to any information submitted in accordance with paragraph 2 above to which
`
`the person asserting the confidential status thereof agrees in writing, or the Court rules, after an
`
`opportunity for hearing, was publicly known at the time it was supplied to the receiving party or
`
`has since become publicly known through no fault of the receiving party.
`
`8. If a party who receives materials or information that has been designated as confidential
`
`and submitted in accordance with paragraph 2 disagrees with respect to such a designation, in full
`
`or in part, it shall notify the disclosing party in writing, and they will thereupon confer as to the
`
`status of the subject information proffered within the context of this order. If the receiving party
`
`and the disclosing party are unable to concur upon the status of the subject information submitted
`
`as confidential business information within ten days from the date of notification of such
`
`disagreement, the party challenging the confidentiality designation may file a motion with the
`
`4847-7508-1399.2
`
`3
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 4 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 4 of 17
`
`Court seeking to remove the confidentiality designation. If such motion is granted, the non-movant
`
`shall compensate the movant for the reasonable expenses and fees associated with the motion. In
`
`the event of a mixed result, the Court may fairly apportion fees and expenses. The Court may sua
`
`sponte question the designation of the confidential status of any information and, after opportunity
`
`for hearing, may remove the confidentiality designation.
`
`9. No less than 10 days (or any other period of time designated by the Court) prior to the
`
`initial disclosure'to a proposed expert of any confidential information submitted in accordance
`
`with paragraph 2, the party proposing to use such expert shall submit in writing the name of such
`
`proposed expert and his or her educational and detailed employment history to the opposing party.
`
`If the opposing party objects to the disclosure of such confidential business information to such
`
`proposed expert as inconsistent with the language or intent of this order or on other grounds, it
`
`shall notify the recipient in writing of its objection and the grounds therefore prior to the initial
`
`disclosure. If the dispute is not resolved on an informal basis Within ten days of receipt of such
`
`notice of objections, the opposing party may file a motion with the Court seeking to block the
`
`proposed expert’s access to the confidential information. During the pendency of the motion, the
`
`expert shall not have access to the disputed information. If the non-movant prevails on the motion,
`
`the moving party shall pay to the non-movant all reasonable fees and expenses associated with
`
`opposing the motion.
`
`In the event of a mixed result, the Court may fairly apportion fees and
`
`expenses.
`
`10. If confidential business information submitted in accordance with paragraph 2 is
`
`disclosed to any person other than in the manner authorized by this protective order, the party
`
`responsible for the disclosure must immediately bring all pertinent facts relating to such disclosure
`
`4847-7508-13992
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 5 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 5 of 17
`
`to the attention of the party that designated the information as confidential, and make every effort
`
`to prevent fitrther disclosure by it or by the person who was the recipient of such information.
`
`11. If any confidential business information which is supplied in accordance with
`
`paragraph 2 above is supplied by a nonparty to this case, such a nonparty shall be considered a
`
`“party” as that term is used in the context of this order. Each nonparty party shall be provided a
`
`copy of this order by the party seeking information from said party.
`
`12. Source Code. A supplier may designate documents,
`
`information, or things that
`
`constitute or contain non-public Source Code of the supplier or of any non-party Whose documents
`
`or information a supplier is permitted to produce in this case as “CONFIDENTIAL SOURCE
`
`CODE—ATTORNEYS’ EYES ONLY INFORMATION.”
`
`A. “Source Code” shall mean source code, object code (i.e., computer instructions
`
`and data definitions expressed in a form suitable for input to an assembler, compiler, or
`
`other translator), microcode, register transfer language (“RTL”), firmware, and hardware
`
`description language (“HDL”), as well as any and all programmer notes, annotations, and
`
`other comments of any type related thereto and accompanying the code. For avoidance of
`
`doubt, this includes source files, make files, intermediate output files, executable files,
`
`header files, resource files, library files, module definition files, map files, object files,
`
`linker files, browse info files, and debug files.
`
`B. Materials designated as CONFIDENTIAL SOURCE CODE— ATTORNEYS’
`
`EYES ONLY INFORMATION shall only be reviewable by SOURCE CODE
`
`QUALIFIED PERSONS and shall not be disclosed to anyone except SOURCE CODE
`
`QUALIFIED PERSONS. SOURCE CODE QUALIFIED PERSONS include the
`
`4847-7508-1399.2
`
`5
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 6 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 6 of 17
`
`following: (1) outside litigation counsel who have filed an appearance in this matter, and
`
`their support staff assisting such counsel who are necessarily incident to this litigation; (2)
`
`personnel at document duplication, coding, imaging or scanning service establishments
`
`retained by, but not regularly employed by, outside litigation counsel as necessarily
`
`incident to the litigation; (3) personnel at interpretation/translation service establishments
`
`retained by, but not regularly employed by, outside litigation counsel as necessarily
`
`incident to the litigation,
`
`including without limitation oral interpreters and document
`
`translators; (4) court reporters, stenographers, and videographers transcribing or recording
`,AT
`testimony at depositions,W who have signed an acknowledgment to be
`
`bound by the Protective Order in this case; and (5) qualified experts (whether testifying
`
`experts or non-testifying consultants) in this case (under paragraph 9 and paragraph 12(C)
`
`of the Protective Order in this case). Nothing in this paragraph shall prevent a supplier from
`
`disclosing its own Source Code to the supplier’s own employees or qualified experts.
`
`Materials designated as CONFIDENTIAL SOURCE CODE—ATTORNEYS’ EYES
`
`ONLY INFORMATION shall not be disclosed to In—House Counsel of a receiving party
`
`or to any other employee of a receiving party.
`
`C. Consistent with paragraph 9 of the Protective Order, qualified experts may
`
`review
`
`CONFIDENTIAL
`
`SOURCE
`
`CODE—ATTORNEYS’
`
`EYES
`
`ONLY
`
`INFORMATION only after the receiving party complies with the provisions of paragraph
`
`9 of this Protective Order for the qualified expert additionally indicating that the proposed
`
`expert will receive CONFIDENTIAL SOURCE CODE-ATTORNEYS’ EYES ONLY
`
`INFORMATION.
`
`D. Source Code shall be provided with the following additional protections:
`
`4847-7508-13992
`
`6
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 7 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 7 of 17
`
`(i) Nothing in this Protective Order shall obligate the parties to produce any
`
`Source Code, nor act as an admission that any particular Source Code is
`
`discoverable.
`
`(ii) Access to Source Code will be given only to SOURCE CODE
`
`QUALIFIED PERSONS and, at depositions, hearings and trial, to witnesses who
`
`would otherwise be permitted access to such Source Code including supplier’s
`
`experts.
`
`(iii) Access to Source Code shall be provided on no more than two “stand-
`
`alone” computer(s) (i.e.,
`
`the computer(s) may not be linked to any network,
`
`including a local area network (“LAN”), an intranet, or the Internet, and may not
`
`be connected to any printer or storage device other than the internal hard disk drive
`
`of the computer).. The stand-alone computer(s) shall be kept in a secure location at
`
`the offices of the supplier’s outside litigation counsel or at such other location as
`
`the supplier and receiving party mutually agree. If the supplier objects to a
`
`particular location for the review of source code, the supplier and receiving party
`
`agree to meet and confer in good faith regarding such objection and present the
`
`dispute to the Court if they are not able to reach agreement The stand-alone secure
`
`computer(s) may be password protected and shall have the Source Code stored on
`
`a hard drive contained inside the computer(s). The supplier shall produce Source
`
`Code in computer searchable format on the stand-alone computer(s) which shall
`
`have standard operating-system-provided tools provided by the receiving party at
`
`least three (3) days before review, such as findstr, grep, diff, AWK, cscript,
`
`command line access, or other agreed upon tools such as SciTools, Understand,
`
`4847-7508-13992
`
`7
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 8 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 8 of 17
`
`PowerGrep, Apple XCode, Microsoft Visual Studio, dtSearch, WinMerge, Sigasi,
`
`Ctgwin, and shall have standard text editors for printing such as Notepad++,
`
`TextWrangler, EditPad and the like. The standalone computer(s) shall, at the
`
`receiving party’s request, include reasonable analysis tools and translation software
`
`appropriate for the type of Source Code and language of any comments. The
`
`receiving party shall be responsible for providing the tools, licenses to the tools
`
`and/or software that it wishes to use so that the supplier may install such tools and
`
`software on the stand-alone computer. To the extent that such tools or software
`
`record local working files or other records reflecting the work performed by the
`
`receiving party, such files and records shall not be reviewed, altered, or deleted by
`
`the supplier. If the supplier objects to particular software tools or software proposed
`
`by the receiving party, the supplier and receiving party agree to meet and confer
`
`regarding such objection and to present the dispute to the Court if they are not able
`
`to reach agreement.
`
`(iv) The receiving party shall provide at least two (2) business days’ notice
`
`to access the source code and shall only have access to the standalone secure
`
`computer(s) during business hours, which for purposes of this paragraph shall be
`
`9:00 am. through 6:00 pm. local time at the reviewing location. The parties are to
`
`cooperate in good faith such that maintaining the Source Code at the offices of the
`
`supplier’s outside litigation counsel shall not unreasonably hinder the receiving
`
`party’s ability to efficiently conduct the prosecution or defense of this case. It is
`
`expected that access to the Source Code shall be provided at the site of any
`
`deposition, hearing or
`
`trial. Proper
`
`identification of all SOURCE CODE
`
`4847-7508-1399.2
`
`8
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 9 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 9 of 17
`
`QUALIFIED PERSONS shall be provided prior to any access to the stand—alone
`
`secure computer.
`
`(V) All SOURCE CODE QUALIFIED PERSONS who will review Source
`
`Code on behalf of a receiving party shall be identified in writing to the supplier at
`
`least two (2) business days in advance of the first time that such person reviews
`
`such Source Code. Such identification shall be in addition to any disclosure
`
`required under paragraphs 12(B) and 12(C) of this Protective Order. The supplier
`
`shall provide these individuals with information explaining how to start, log on to,
`
`and operate the stand-alone computer in order to access the produced Source Code
`
`on the stand-alone secure computer(s). For subsequent reviews by SOURCE CODE
`
`QUALIFIED PERSONS, the receiving party shall give at least one business day
`
`(and at least 24 hours’) notice to the supplier of such review. To the extent that the
`
`receiving party wishes to continue a source code review from one day to the next,
`
`the receiving party shall notify the supplier by 5:00 pm. local time on the day of
`
`the source code review..
`
`(vi) No person other than the supplier may alter, dismantle, disassemble or
`
`modify the stand-alone computer(s) in any way, or attempt to circumvent any
`
`security feature of the computer(s).
`
`(vii) No copies shall be made of Source Code, whether physical, electronic,
`
`or otherwise, other than volatile copies necessarily made in the normal course of
`
`accessing the Source Code on the stand-alone computer(s), except for:
`
`4847-7508-13992
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 10 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 10 of 17
`
`(1) print outs of reasonable portions of the Source Code in
`
`accordance with the provisions of paragraphs 12(D)(ix)-(x) of this
`
`Protective Order; (2) notes and other analysis made of the Source Code, and
`
`(3) such other uses to which the parties may agree or that the Court may
`
`order. The receiving party shall not use any outside electronic device to
`
`copy,
`
`record,
`
`photograph,
`
`or otherwise
`
`reproduce Source Code.
`
`“Reasonable portions of the Source Code” shall be limited to the portions
`
`that are necessary for a qualified expert to discuss when explaining his or
`
`her opinions, and are subject to the limits in section (ix) below. Pages shall
`
`not be printed for the purpose ofreviewing code in the first instance, as code
`
`review is to take place on the stand-alone computer(s). The supplier shall
`
`not unreasonably withhold approval and the parties shall meet and confer in
`
`good faith to resolve any disputes. The receiving party may take notes on a
`
`non-networked laptop, provided such device does not have a camera and
`
`does not have any network connectivity in the source code review room.
`
`The receiving party may not copy Source Code itself into the notes, but may
`
`take note of directories and filenames. The receiving party may not take
`
`such notes on the stand-alone computer(s) containing the Source Code, but
`
`rather only on paper or on the separate non-networked laptop. No
`
`networked devices or recordable media or recordable devices, including
`
`without limitation computers, tablets, smartphones, cellular telephones,
`
`peripheral equipment, cameras, sound recorders, CDs, DVDs, or drives of
`
`any kind, shall be permitted into the source code review room with the
`
`4847-7508-1399.2
`
`10
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 11 of 17
`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 11 of 17
`
`stand-alone computer(s). Any notes taken regarding Source Code, whether
`
`on paper or electronically, shall be treated as CONFIDENTIAL SOURCE
`
`CODE— ATTORNEYS’ EYES ONLY INFORMATION under
`
`this
`
`Protective Order. The supplier may exercise personal supervision from
`
`outside the review room over the receiving party when the receiving party
`
`is in the Source Code review room. Such supervision, however, shall not
`
`entail review of any work product generated by the receiving party, e.g.,
`
`monitoring the screen of the stand—alone computer, monitoring any surface
`
`reflecting any notes or work product of the receiving party, or monitoring
`
`the key strokes of the receiving party. There will be no video supervision
`
`by any supplier.
`
`(viii) Nothing may be removed from the stand—alone computer, either by the
`
`receiving party or at the request of the receiving party, except for (1) print outsof
`
`reasonable portions of the Source Code in accordance with the provisions of
`
`paragraphs 12(C)(ix)-(x) of this Protective Order; and (2) such other uses to which
`
`the parties may agree or that the Court may order.
`
`(ix) At the request of the receiving party, the supplier shall within three (3)
`
`business days provide one (1) hard copy print out of the specific lines, pages, or
`
`files of the Source Code that the receiving party believes in good faith are necessary
`
`for its qualified expert to discuss when explaining his or her opinions regarding a
`
`relevant feature of an accused or alleged domestic industry product. If the supplier
`
`objects in any manner to the production of the requested source code (e.g., the
`
`request is too voluminous), it shall state its objection within the allotted two (2)
`
`4847-7508-1399.2
`
`ll
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 12 of 17
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 13 of 17
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 14 of 17
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 15 of 17
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 16 of 17
`
`

`

`Case 1:19-cv-11586-IT Document 59-2 Filed 04/02/20 Page 17 of 17
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket