From Casetext: Smarter Legal Research

Oracle Corp. v. ORG Structure Innovations LLC

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA OAKLAND DIVISION
Oct 24, 2011
Case No. 11-cv-03549-SBA (N.D. Cal. Oct. 24, 2011)

Opinion

Case No. 11-cv-03549-SBA

10-24-2011

ORACLE CORPORATION, a Delaware corporation, and ORACLE AMERICA, INC., a Delaware corporation, Plaintiffs, v. ORG STRUCTURE INNOVATIONS LLC, a Texas limited liability company, and PAUL MORINVILLE, an individual resident of Indiana, Defendants.

HOGAN LOVELLS US LLP Maren J. Clouse Attorneys for Plaintiffs ORACLE CORPORATION and ORACLE AMERICA, INC. FARNEY DANIELS LLP Steven R. Daniels 800 South Austin Avenue, Suite 200 Georgetown, Texas 78626 Attorneys for Defendants ORG STRUCTURE INNOVATIONS LLC and PAUL MORINVILLE


K.T. Chenan (Cal. Bar No. 133967)

Clayton C. James (pro hac vice application pending)

Srecko Vidmar (Cal. Bar No. 241120)

Maren J. Clouse (Cal. Bar No. 228726)

HOGAN LOVELLS US LLP

Peter J. O'Rourke (Cal. Bar No. 227164)

ORACLE CORPORATION

Attorneys for Plaintiffs

ORACLE CORPORATION

and ORACLE AMERICA, INC.

STIPULATED [PROPOSED]

PROTECTIVE ORDER

Hon. Saundra Brown Armstrong

STIPULATED PROTECTIVE ORDER

WHEREAS, certain documents and information have been and may be sought, produced, or exhibited by and between the Parties relating to the Parties' financial, competitive, personnel, or other commercially sensitive information that the Party making the production deems confidential;

WHEREAS, it has been agreed by and among the Parties, through their respective counsel, that, to expedite discovery and to preserve the confidentiality of certain documents and information, a protective order should be entered by the Court; and

WHEREAS, the Court has reviewed the terms and conditions of this Protective Order,

IT IS HEREBY ORDERED THAT:

1. Definitions

(a) "Party" means a named Party in this case or in any related case identified in paragraph 3(a). "Person" means an individual or an entity. "Producer" means a person who produces information via the discovery process in this case. "Recipient" means a person who receives information via the discovery process in this case.

(b) "Confidential" information is information concerning a person's business operations, business processes, or product design and development within the scope of Rule 26(c)(1)(G), the disclosure of which a Party believes in good faith would likely harm that Party's competitive position, or the disclosure of which would contravene an obligation of confidentiality to a third person or to a Court.

(c) "Highly Confidential" information is information concerning a person's current or future business or technical trade secrets and plans, pricing data, or non-public financials within the scope of Rule 26(c)(1)(G), the disclosure of which a Party believes in good faith would likely significantly harm that Party's competitive position, or the disclosure of which would contravene an obligation of confidentiality to a third person or to a Court.

(d) "Expert" means a person who is retained or specially employed to provide expert testimony in this case or in any related case identified in paragraph 3(a).

(e) "Consultant" means a person who is retained or specially employed to provide technical or specialized assistance in this case or in any related case identified in paragraph 3(a), but who is not expected to and does not testify in this case or in any related case identified in paragraph 3(a).

2. Designation of Information as Confidential or Highly Confidential

(a) A person's designation of information as Confidential or Highly Confidential means that the person believes in good faith, upon reasonable inquiry, that the information qualifies as such.

(b) A person designates information in a document or thing as Confidential or Highly Confidential by clearly and prominently marking the document or thing, or the electronic medium on which it is produced, "CONFIDENTIAL" or "HIGHLY CONFIDENTIAL." A Producer may make documents or things containing Confidential or Highly Confidential information available for inspection and copying without marking them as confidential without forfeiting a claim of confidentiality, so long as the Producer causes copies of the documents or things to be marked as Confidential or Highly Confidential before providing them to the Recipient.

(c) A person designates information in deposition testimony as Confidential or Highly Confidential by stating on the record at the deposition that the information is Confidential or Highly Confidential or by advising all Parties, the stenographer, and the videographer in writing, within fourteen days after receipt of the final deposition transcript, that the information is Confidential or Highly Confidential. Pages of transcribed deposition testimony or exhibits to depositions that reveal Confidential or Highly Confidential information must be separately bound by the court reporter and may not be disclosed to anyone except as permitted under this Stipulated Protective Order.

(d) A person's failure to designate a document, thing, or testimony as Confidential or Highly Confidential does not constitute forfeiture of a claim of confidentiality as to any other document, thing, or testimony.

(e) A person who has designated information as Confidential or Highly Confidential may withdraw the designation by written notification to all Parties in the case.

(f) If a Party disputes a Producer's designation of information as Confidential or Highly Confidential, the Party shall notify the Producer in writing and describe the basis for the dispute, identifying the specific document(s) or thing(s) as to which the designation is disputed and proposing a new designation for such materials. The Party and the Producer shall then meet and confer to attempt to resolve the dispute without the Court's involvement. The Producer bears the burden of proving that the information is properly designated as Confidential or Highly Confidential, but the information shall remain subject to the Producer's Confidential or Highly Confidential designation until the Court rules on the dispute. A Party's failure to contest a designation of information as Confidential or Highly Confidential is not an admission that the information was properly designated as such.

3. Use and Disclosure of Confidential or Highly Confidential Information

(a) Subject to the restrictions of this Protective Order, Confidential and Highly Confidential information may be used only for purposes of this civil action and the related civil actions: ORG Structure Innovations LLC v. Oracle Corporation and Oracle America, Inc., Case No. 11-cv-3307 (N.D. Ill. filed May 17, 2011) and Paul Morinville and ORG Structure Innovations LLC v. Oracle Corporation and Oracle America, Inc., Case No. 11-cv-3307 (W.D. Tex. filed Aug. 19, 2011).

(b) Absent written permission from the Producer or further order by the Court, the Recipient may not disclose Confidential information to any person other than the following:

i. the Court, jury, and court personnel;

ii. a Party's outside counsel of record, including necessary paralegal, secretarial, and clerical personnel assisting such counsel;

iii. a Party's in-house counsel;

iv. court reporters, stenographers and videographers retained to record testimony taken in this action, and their staff;

v. during his or her deposition, the author, recipient, or custodian of the information; any witness designated to testify on behalf of the Producer pursuant to Federal Rule of Civil Procedure 30(b)(6) with respect to a topic that includes the subject matter of the information; or any other person who otherwise possessed or knew the information; vi. professional jury or trial consultants and mock jurors, provided that each such person has signed the Undertaking annexed hereto as Exhibit A agreeing to be bound by the terms of this Protective Order;

vii. graphics, translation, trial, and e-discovery service persons retained by a Party; provided, however, that each such person has signed the Undertaking annexed hereto as Exhibit A agreeing to be bound by the terms of this Protective Order; and

viii. subject to conditions (A), (B), and (C) below, Experts and Consultants and their staff whom a Party employs for purposes of this litigation.

(A) At least ten (10) days before the first disclosure of Confidential or Highly Confidential information to an Expert, the Party proposing to make the disclosure must serve the Producer with a written identification of the Expert and a copy of his or her curriculum vitae. If the Producer has good cause to object to the disclosure (which does not include challenging the qualifications of the Expert), it must serve the Party proposing to make the disclosure with a written objection within five (5) days after service of the identification. Unless the parties resolve the dispute within five (5) days after service of the objection, the Producer must move the Court promptly for a ruling, and the Confidential or Highly Confidential information may not be disclosed to the Expert without the Court's approval.

(B) Confidential information, but not Highly Confidential information or Highly Confidential - Source Code information addressed in paragraph 4, may be disclosed to a Party's Consultants without disclosure of the identity of such Consultants as long as the Consultant is not a past, current, or expected future director, officer, shareholder, investor, owner, manager, principal, partner, or employee of a Party or a Party's competitor.

(C) Any Expert or Consultant having access to Confidential, Highly Confidential, or Highly Confidential - Source Code information shall be given a copy of this Protective Order and such Expert or Consultant must agree to be bound by this Protective Order. Before any disclosure of Confidential, Highly Confidential, or Highly Confidential - Source Code information occurs, such Expert or Consultant shall execute the Undertaking attached hereto as Exhibit A.

(c) Absent written permission from the Producer or further order by the Court, the Recipient may not disclose Highly Confidential information to any person other than those identified in paragraph 3(b)(i), (ii), (iv), (v), (vi), (vii), and (viii).

(d) A Party who wishes to disclose Confidential or Highly Confidential information to a person not authorized under paragraph 3(b) or 3(c) must first make a reasonable attempt to obtain the Producer's permission. If the Party is unable to obtain permission, it may move the Court to obtain permission.

4. Source Code

All software produced in this case in the form of readable source code or assembly code shall be subject to the disclosure and dissemination restrictions applicable to the materials designated as Highly Confidential, regardless of whether it is so marked, and shall be subject to the following additional protections given the particularly sensitive nature of source code:

(a) Any source code shall be deemed to be produced by being made available for inspection, upon written request and with reasonable notice, at the offices of the Producer's outside counsel of record, or at an otherwise mutually agreeable secure location that is reasonably convenient for the Recipient and the Recipient's Experts and/or disclosed Consultants, at a date and time mutually agreed to by the Parties. The Recipient shall be restricted to a reasonable number of inspections.

(b) The source code shall be made available for inspection on a stand-alone computer ("the Source Code Computer") in a private room. The Source Code Computer shall not have access to any networks or other computers, including the Internet, and the Producer shall provide and install tools or programs necessary to view the code produced on the Source Code Computer.

(c) The Recipient's outside counsel, Experts, and/or disclosed Consultants shall be entitled to take notes relating to the source code but may not copy the source code into the notes. Any notes taken pursuant to this subparagraph by outside counsel, Experts, and/or disclosed Consultants shall be treated as source code for the purposes of disclosure and dissemination, but the notes are not discoverable. The Recipient shall not copy, remove, transmit, or otherwise transfer any source code from the Source Code Computer, including without limitation copying, removing, transmitting, or transferring any source code to any other computers or peripheral equipment. The Source Code Computer shall always be maintained and secured at the offices of the Producer's outside counsel, under the control of the Producer's outside counsel, or at an otherwise mutually agreeable location that is reasonably convenient for the Recipient and the Recipient's Experts and/or disclosed Consultants where access to the Source Code Computer is under the control of the Producer's outside counsel and subject to the protections outlined in this Protective Order. Only persons identified in Paragraphs 3(b)(ii) and 3(b)(viii) herein shall have access to the Source Code Computer.

(d) Unless agreed otherwise in advance by the Parties in writing, following each inspection, the Recipient's outside counsel, Experts, and/or disclosed Consultants shall remove all notes, documents, laptops, and other materials from the room that may contain work product and/or attorney-client privileged information. The Producer shall not be responsible for the physical safety of any items left in the room following each inspection session; however, nothing in this paragraph overrides the Producer's ethical obligations with respect to such materials.

(e) Following inspection, the Recipient may identify limited relevant portions of the source code that the Recipient deems reasonably necessary to prepare its case. The Producer shall produce within seven (7) days a paper copy of the limited relevant portions of the source code identified by the Recipient directly to the Recipient's outside counsel of record, and the paper copy shall be marked "HIGHLY CONFIDENTIAL - SOURCE CODE." The parties may, at a later date, agree in writing to alternate production arrangements.

(f) The Recipient's outside counsel of record shall maintain and store the paper copy of the source code at their offices in a secure manner that prevents duplication of or unauthorized access to the source code including, for example, storing the source code in a locked room or cabinet at all times when it is not in use. Experts and Consultants shall not retain or store any copies of source code.

(g) The Recipient may not create electronic images of the source code from the paper copy (e.g., may not scan the source code to a .pdf file) except that the Recipient may create an electronic copy or image of selected portions of the source code only when reasonably necessary to accomplish any filing with the Court or to serve any pleadings or other papers on any other Party (including expert reports). Images or copies of source code shall not be included in correspondence between Parties (references to production numbers shall be used instead) and shall be omitted from pleadings and other papers except to the extent permitted herein.

(h) The Recipient's outside counsel may make no more than three (3) additional paper copies of the source code, which shall be maintained in the manner set forth in subsection (f) above. Notwithstanding this restriction, additional copies may be made as reasonably necessary for the preparation of pleadings or other Court filings, exhibits, expert reports, discovery documents, depositions, and other Court documents.

(i) Absent written permission from the Producer or further order by the Court, the Recipient may not disclose Highly Confidential - Source Code information to any person other than those identified in paragraph 3(b)(i), (ii), (iv), (v), (vi), (vii), and (viii).

(j) Highly Confidential - Source Code information may not be disclosed to a Party's Consultants without disclosure of the identity of such Consultants in the manner set forth in Section 3(b)(viii)(A).

(k) Highly Confidential - Source Code information may not be disclosed to a past, current, or expected future director, officer, shareholder, investor, owner, manager, principal, partner, or employee of a Party or a Party's competitor.

(l) A Party who wishes to disclose Highly Confidential - Source Code information to a person not identified in paragraph 3(b)(i), (ii), (iv), (v), (vi), (vii), and (viii) must first make a reasonable attempt to obtain the Producer's permission. If the Party is unable to obtain permission, it may move the Court to obtain permission.

(m) The Recipient may include excerpts of source code in a pleading, exhibit, expert report, discovery document, deposition, other Court document, or any drafts of these documents ("Source Code Documents"). The Recipient shall only include such excerpts as are reasonably necessary for the purposes for which such part of the source code is used. As an example, excerpts of approximately 25 to 40 lines in length would be allowed.

(n) To the extent portions of source code are quoted in a Source Code Document, either (i) the entire document will be marked "HIGHLY CONFIDENTIAL - SOURCE CODE" or (ii) those pages containing quoted source code will be separately bound and marked "HIGHLY CONFIDENTIAL - SOURCE CODE." Notwithstanding anything in this Protective Order, Source Code Documents shall not be filed in the public record. All Source Code Documents filed must be filed under seal, if the Court grants leave to do so.

(o) All paper copies containing source code shall be securely destroyed if they are no longer necessary to the litigation. Copies of source code that are marked as deposition exhibits shall not be provided to the court reporter or attached to deposition transcripts; rather, the deposition record shall identify the exhibit by its production number(s).

(p) The Recipient may not copy source code onto any form of electronic media, including without limitation, hard drives, removable electronic media (such as diskettes, CD-ROM, DVD, PC card, flash media, etc.), or network servers, except (i) to the extent loaded into RAM or virtual RAM as required by a computer's operating system for viewing or analysis purposes, (ii) to the extent necessary to create a Source Code Document, or (iii) as otherwise expressly provided herein.

(q) Source code may not be transported or transmitted electronically over a network of any kind, including over a local area network (LAN), intranet, or the Internet. Nothing in this Protective Order shall obligate the Parties to produce any source code or act as an admission that any particular source code is discoverable.

5. Prosecution Bar

From the date of the entry of this Protective Order, until eighteen (18) months after a final, non-appealable judgment or order or the complete settlement of all claims asserted against all Parties in this litigation, any attorney who is outside counsel or any patent agent, Expert, or Consultant subject to this Protective Order who obtains, receives or otherwise learns technical information of a Party that is designated as Confidential, Highly Confidential, or Highly Confidential - Source Code information shall not participate, directly or indirectly, in the acquisition, preparation, or prosecution of the patents-in-suit or of any patent or patent application, whether new or currently pending, that is reasonably related to the patents-in-suit or the subject matter thereof before any foreign or domestic agency, including the United States Patent and Trademark Office. For purposes of this paragraph, "prosecution" includes directly or indirectly drafting, amending, advising, or otherwise affecting the scope or maintenance of patent claims. Nothing in this Protective Order shall prevent or preclude other attorneys or patent agents in the law firms representing the parties in this action who have not been exposed to or otherwise seen, reviewed, discussed, or accessed any materials, testimony or information designated hereunder as Confidential, Highly Confidential, or Highly Confidential - Source Code information from participating, directly or indirectly, in the activities described above. Moreover, nothing in this Protective Order shall prevent or preclude an attorney having access to such information from serving as billing or client attorney on matters involving the activities described above and being handled by other attorneys or patent agents in such attorney's firm, so long as such attorney does not otherwise participate substantively in the proscribed activities.

6. Inadvertent Failure to Designate

An inadvertent failure to designate qualified information, documents, or things as Confidential, Highly Confidential, or Highly Confidential - Source Code does not, standing alone, waive the Producer's right to secure protection under this Order. Upon discovery of an inadvertent failure to designate, the Producer may notify the Recipient in writing that it is designating such material as Confidential, Highly Confidential, or Highly Confidential - Source Code. Upon receipt of such notice, the Recipient shall make all reasonable efforts to ensure that the material is treated in accordance with the terms of this Order, subject to the right to challenge the propriety of such designation(s). The Producer shall provide substitute copies of documents bearing the confidentiality designation. The Recipient shall also make all reasonable efforts to retrieve any documents from anyone who had received the documents before the Recipient was notified of the inadvertent failure to designate and who is no longer permitted to access the documents under the new designation.

7. Filing with the Court and Use in Proceedings

(a) This Protective Order does not, by itself, authorize the filing of any document under seal. No document may be filed under seal without prior leave of court. A Party wishing to file under seal a document containing Confidential, Highly Confidential, or Highly Confidential -Source Code information must move the Court for permission to file the document under seal before the document's due date and consistent with Local Rules 79-5 and 7-11. If a Party obtains permission to file a document under seal, it must also (unless excused by the Court) file a public-record version that excludes any Confidential, Highly Confidential, or Highly Confidential - Source Code information.

(b) If a Party wishes to file in the public record a document that another Producer has designated as Confidential, Highly Confidential, or Highly Confidential - Source Code, the Party must advise the Producer of the document no later than five (5) business days before the document is due to be filed, so that the Producer may move the Court to require the document to be filed under seal.

(c) Persons not permitted access to Confidential, Highly Confidential, or Highly Confidential - Source Code information under the terms of this Protective Order shall not be present at depositions while such information is discussed or otherwise disclosed. Pre-trial and trial proceedings shall be conducted in a manner, subject to the supervision of the Court, to protect such information from disclosure to unauthorized persons.

8. Non-Party Use of This Protective Order

A non-party producing material voluntarily or pursuant to a subpoena or a court order may designate such material in the same manner and shall receive the same level of protection under this Protective Order as any Party to this lawsuit. Non-parties shall use reasonable care when designating documents or information as Confidential or Highly Confidential. Nothing in this Order shall prevent a Recipient from objecting to such designation.

9. Document Disposal

Upon the conclusion of this case, each Party must return to the Producer all documents and copies of documents containing the Producer's Confidential, Highly Confidential, or Highly Confidential - Source Code information, and must destroy all notes, memoranda, or other materials derived from or in any way revealing such information. Alternatively, if the Producer agrees, the Party may destroy all documents and copies of documents containing the Producer's Confidential, Highly Confidential, or Highly Confidential - Source Code information. The Party returning and/or destroying such information must promptly certify in writing its compliance with the requirements of this paragraph. Notwithstanding the requirements of this paragraph, a Party and its counsel may retain one complete set of all documents filed with the Court, remaining subject to all requirements of this Protective Order. Nothing in this Protective Order shall diminish or excuse any existing obligation or right with respect to designated material.

10. Originals

A legible photocopy of a document may be used as the "original" for all purposes in this action. The actual "original," in whatever form the Producer has it, must be made available to any other Party within ten (10) days after a written request.

11. Survival of Obligations

This Protective Order's obligations shall survive the conclusion of this case.

IT IS SO STIPULATED AND AGREED.

HOGAN LOVELLS US LLP

Maren J. Clouse

Attorneys for Plaintiffs

ORACLE CORPORATION

and ORACLE AMERICA, INC.

FARNEY DANIELS LLP

Steven R. Daniels

800 South Austin Avenue, Suite 200

Georgetown, Texas 78626

Attorneys for Defendants

ORG STRUCTURE INNOVATIONS LLC

and PAUL MORINVILLE
IT IS SO ORDERED.

Jacqueline Scott Corley

United States Magistrate Judge
I, Maren J. Clouse, attest that Steven R. Daniels has read and approved this Stipulated [Proposed] Protective Order and consents to its filing in this action.

EXHIBIT A

UNITED STATES DISTRICT COURT

NORTHERN DISTRICT OF CALIFORNIA

OAKLAND DIVISION

ORACLE CORPORATION, a Delaware corporation, and ORACLE AMERICA, INC., a Delaware corporation, Plaintiffs,

v.

ORG STRUCTURE INNOVATIONS LLC, a Texas limited liability company, and PAUL MORINVILLE, an individual resident of Indiana, Defendants.

Case No. 11-cv-03549-SBA

UNDERTAKING OF

[INSERT NAME]

Hon. Saundra Brown Armstrong

I, [insert name], state the following under penalties of perjury as provided by law:

I have been retained by [insert Party's name] as an expert or consultant in connection with this case. I will be receiving material that is covered by the Court's Protective Order dated [fill in date]. I have read the Court's protective order and understand that the information I receive is provided pursuant to the terms and conditions in that Order.

I agree to be bound by the Court's Protective Order. I agree to use the information provided to me solely for the purposes of this case. I understand that neither the information nor any notes concerning that information may be disclosed to anyone who is not bound by the Court's Protective Order. I agree to return the information provided to me and any notes concerning that information to the attorney for [insert name of retaining Party] or to destroy the information and any notes at that attorney's request.

I submit to the jurisdiction of the Court that issued the Protective Order for purposes of enforcing that Order. I give up any objections I might have to that Court's jurisdiction over me or to the propriety of venue in that court.

(signature)

Subscribed and sworn to before me this ___ day of ___, 20___. Notary Public


Summaries of

Oracle Corp. v. ORG Structure Innovations LLC

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA OAKLAND DIVISION
Oct 24, 2011
Case No. 11-cv-03549-SBA (N.D. Cal. Oct. 24, 2011)
Case details for

Oracle Corp. v. ORG Structure Innovations LLC

Case Details

Full title:ORACLE CORPORATION, a Delaware corporation, and ORACLE AMERICA, INC., a…

Court:UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA OAKLAND DIVISION

Date published: Oct 24, 2011

Citations

Case No. 11-cv-03549-SBA (N.D. Cal. Oct. 24, 2011)