`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`IDENTITY SECURITY LLC,
`
`Plaintiff,
`v.
`
`APPLE INC.
`
`
`
`Defendant.
`
`Civil Action No. 1:22-cv-58-ADA
`
`
`Jury Trial Demanded
`
`The Court, having held a discovery hearing on September 13, 2023, hereby orders as
`
`Order
`
`
`
`
`
`
`
`follows with respect to that hearing between Plaintiff Identity Security LLC (“Identity Security”)
`
`and Defendant Apple Inc. (“Apple”):
`
`(1)
`
`Identity Security seeks to compel productions with respect to certain damages-related
`
`Requests for Production. Apple is ordered to produce any non-privileged responsive
`
`documents to Identity Security’s Requests for Production Nos. 11, 17–19, 21, 28, 29–30,
`
`36, 51, 57, 59–60, and 63–64 no later than September 20, 2023. To the extent Apple has
`
`searched for responsive documents to any particular request and believes no responsive
`
`documents exist, Apple will confirm that in writing to counsel for Identity Security.
`
`(2) The parties dispute whether Apple should produce conjoint analyses for the Accused
`
`Products. Apple is ordered to search for and produce any non-privileged documents
`
`responsive to Requests for Production Nos. 31 and 32 on the same terms described in
`
`paragraph (1), above.
`
`(3) The parties dispute the sufficiency of Apple’s response to Interrogatory No. 18, which
`
`requests responsive information regarding how the Accused Products handle certain
`
`accused “digital identity data.” The Court denied Plaintiff’s request for a supplemental
`
`
`
`1
`
`
`
`Case 1:22-cv-00058-ADA Document 140 Filed 09/23/23 Page 2 of 5
`
`response but stated that Identity Security may serve a 30(b)(6) topic regarding the
`
`information sought by Interrogatory No. 18, subject to the limit of approximately twelve
`
`30(b)(6) topics discussed in (5) below.
`
`(4) The parties dispute the sufficiency of Apple’s response to Interrogatory No. 20, which
`
`relates to the encryption of certain memory in the Accused Products. The Court has
`
`reviewed the response, finds it sufficient, and denies Identity Security’s motion to compel
`
`a further response to this interrogatory.
`
`(5)
`
`Identity Security served Apple with a Rule 30(b)(6) Notice with 164 topics after deposing
`
`five Apple engineers in their personal capacity. Apple responded to 76 topics in that Notice
`
`by designating past witness testimony already covering the noticed topic as its corporate
`
`testimony. The Court stated that 164 topics was “too many by a pretty big factor” and
`
`ordered Identity Security to identify a total of approximately one dozen 30(b)(6) topics (not
`
`including certain interrogatory-related topics described herein). Apple may designate past
`
`testimony as responsive to those topics but, to the extent Identity Security wants to ask
`
`additional questions on that topic, Apple must designate a corporate witness or witnesses
`
`to be deposed on such topic, even if that means a witness who previously testified in a
`
`personal capacity may be deposed a second time.
`
`(6) The parties dispute the sufficiency and scope of Apple’s production of licensing materials.
`
`Apple’s responses to relevant requests for production said: “Apple has produced or will
`
`produce responsive executed licenses on which it intends to rely to the extent Apple is able
`
`to locate such documents within its possession, custody, or control after a reasonable
`
`search.” Both sides need to not limit their production to what they intend to rely on.
`
`Regardless, Identity Security’s motion to compel is denied based on Apple’s
`
`
`
`2
`
`
`
`Case 1:22-cv-00058-ADA Document 140 Filed 09/23/23 Page 3 of 5
`
`representations to the Court that it has conducted a reasonable search and produced or will
`
`produce any licenses “relevant in this case” after reviewing the allegations in the
`
`“infringement contentions,” the asserted “patents,” and “relevant . . . technology” (Tr. at
`
`29:18–25, 30:11–12), and has not withheld otherwise responsive licenses.
`
`(7) The parties dispute whether Apple should be required to engage in further searches related
`
`to certain high-level business strategy documents related to the accused functionalities. The
`
`Court stated, “I’m assuming Apple has searched Apple-wide with regard to [the accused]
`
`functionality.” Tr. 35:15–17. Apple responded by stating that it has “searched the
`
`documents of those who have worked directly on this product, including during
`
`development” and the documents of “the most senior person within this architecture group”
`
`who is “the most likely to have these documents.” Tr. 36:5–14. Apple explained that it
`
`would produce the documents it located in the search it had already performed by the end
`
`of the week of 9/19. Apple will also provide 30(b)(6) testimony on this topic. Based on
`
`these representations, the Court denied Identity Security’s request.
`
`(8)
`
`Identity Security seeks to compel the production of certain usage data in the Accused
`
`Products. Apple has agreed to produce usage data related to the accused functionalities of
`
`the Accused Products, to the extent it can be located after a reasonable search, by
`
`September 22, 2023. Identity Security’s motion to compel on this issue is thus denied as
`
`moot.
`
`(9)
`
`Identity Security moved to compel the production of certain technical documents. Apple
`
`represented that it “has conducted a reasonable investigation regarding these documents
`
`and produced them to the extent they exist.” The parties will work together to identify
`
`documents by Bates number that Apple says have been produced or for Apple to confirm
`
`
`
`3
`
`
`
`Case 1:22-cv-00058-ADA Document 140 Filed 09/23/23 Page 4 of 5
`
`that additional responsive documents do not exist after conducting a reasonable search.
`
`Otherwise, the motion to compel is denied as moot.
`
`(10) Identity Security seeks to compel Apple to identify alleged non-infringing alternatives in
`
`advance of 30(b)(6) depositions. Apple has agreed to supplement its response to
`
`Interrogatory No. 8 reasonably in advance of a 30(b)(6) deposition on the topic of alleged
`
`non-infringing alternatives. Identity Security’s motion to compel on this issue is thus
`
`denied as moot.
`
`(11) The parties dispute the sufficiency of Apple’s response to Identity Security’s Interrogatory
`
`No. 21, which seeks identification of any multi-user functionality on iPad devices, the dates
`
`any such functionality was offered to consumers, and usage data for any such functionality.
`
`Apple is ordered, at its option, to fully answer Interrogatory No. 21—for clarity, to the
`
`extent no responsive information is available, a written confirmation of that fact is an
`
`answer. Apple may alternatively provide 30(b)(6) testimony on this information.
`
`(12) The parties dispute the sufficiency of Apple’s responses to Interrogatories 15 and 17. The
`
`Court denies Identity Security’s motion to compel further interrogatory responses. The
`
`Court stated that Plaintiff may “expand [its] 30(b)(6) topics by one” if Identity Security
`
`“feel[s] there’s something specific that is missing.” Tr. at 47:18–23.
`
`(13) Certain dates relating to the close of fact and expert discovery, as well as expert reports,
`
`will be adjusted by roughly two weeks as proposed by Identity Security.
`
`(14) With respect to the alleged invalidity of each Asserted Claim, Apple will identify no more
`
`than five (5) Prior Art Grounds for each Asserted Claim by September 20, 2023.
`
`
`
`
`
`
`
`4
`
`
`
`Case 1:22-cv-00058-ADA Document 140 Filed 09/23/23 Page 5 of 5
`
`It is so ORDERED.
`
`SIGNED this 23rd day of September, 2023.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5
`
`