UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA
April 20, 2010
GLOBAL COMMUNICATIONS, INC., PLAINTIFF,
EASYLINK SERVICES INTERNATIONAL CORPORATION, DEFENDANT.
The opinion of the court was delivered by: Hon. Andrew J. Wistrich United States Magistrate Judge
STIPULATED PROTECTIVE ORDER ENYON
The parties to this action stipulate to, and seek entry of, the following Protective Order:
1. "Confidential" information is information that, ingood faith, a party believes to contain (a) proprietary or commercially sensitive information which is not publicly known and which its owner would not reveal to others except in confidence; (b) personal financial information; or (c) information that should otherwise be subject to confidential treatment under the Federal Rules of Civil Procedure. If a person producing information under this Order (the "Producing Person") designates information as "Confidential," the designated information shall be treated as Confidential unless successfully challenged under ¶ 11. When producing documents, the Producing Person shall mark each page containing Confidential information as "Confidential."
2. "Restricted Confidential" information shall be limited to information that, in good faith, a party believes to contain (a) current and past (to the extent they reflect on current) business planning and financial information; (b) trade secrets; (c) past or current company personnel or employee information; (d) source code; and (e) information concerning a party's sales or the design, structure or workings of a party's products or systems which would, if it became known to other parties, harm the competitive position of its owner. If a Producing Person designates information as Restricted Confidential under this Order, the designated information shall be treated as Restricted Confidential unless successfully challenged under ¶ 11. When producing documents, the Producing Person shall mark each page containing Restricted Confidential information as "Restricted Confidential." 3. Any Producing Person, whether or not a party to this action, may designate information as Confidential or Restricted Confidential under this Order.
4. When a document is designated as Confidential or Restricted Confidential, the designation includes not only the document so designated, but also any information derived from that document, and any copies, excerpts, summaries, or compilations thereof.
5. A person receiving information under this Order (the "Receiving Person") shall use Confidential or Restricted Confidential information (together, "Protected Information") only to conduct this litigation or any other litigation involving EasyLink Services International Corporation and j2 Global Communications, Inc.
6. By receiving information under this Order, all Receiving Persons agree to be subject to the jurisdiction of this Court concerning their use of Protected Information. All receiving persons other than attorneys, their staff, and independent companies engaged by outside litigation counsel to perform litigation support service, shall sign an acknowledgment in the form attached hereto as Exhibit A, indicating that they have read and understood the terms of this Order and agree to submit to the jurisdiction of the Central District of California for enforcement of this Order. Counsel for each party shall maintain all original acknowledgments, and will produce the same to the opposing party when so ordered by the Court.
7. A Receiving Person may disclose Restricted Confidential information only to the following:
a. outside litigation counsel retained by a party in this action or in any other litigation involving EasyLink Services International Corporation and j2 Global Communications, Inc., including attorneys, their staff, and independent companies engaged by outside litigation counsel to perform litigation support services;
b. independent experts or consultants retained by outside litigation
c. any person giving testimony in this action at deposition, trial or hearing witnesses, but only if the person giving testimony is the creator, author or recipient of the Restricted Confidential information, provided that such persons may not retain any documents containing Restricted Confidential information provided to them at such deposition, trial or hearing;
d. the Court, its personnel and any court reporters involved in taking or transcribing testimony in this action; and
e. any other person by written agreement of the parties or by order of the Court.
Any person who receives Restricted Confidential information is prohibited from prosecuting, preparing, or having any substantive involvement with any patent application on behalf of any party to this action relating to e-mail to fax or fax to e-mail services, products, systems, or methods.
8. A Receiving Person may disclose Confidential information only to the following:
a. persons listed in ¶ 7; and
b. any person giving testimony in this action at deposition, trial or hearing witnesses, but only for purposes of reasonable, material, and relevant testimony or preparation of such testimony in the litigation, provided that such persons may not retain any documents containing Protected Information; and
c. employees of the Receiving Person to whom disclosure is reasonably necessary for the management, supervision, or oversight of the litigation.
9. Before a Receiving Person can share Protected Information received from another party in the litigation with an independent expert or consultant under ¶
7.b, the Receiving Person shall provide the Producing Person written notice of its intention, which shall include the proposed expert's curriculum vitae as well as a list of any previous or current relationship with any party to this action. If the Producing Person objects to the disclosure, it must send a written objection, including a detailed explanation of its objection, that is received within ten business days after the Producing Person's receipt of the written notice. Absent a timely written objection, the Receiving Person may share Protected Information with the independent expert. If the Producing Person makes a timely written objection, the Receiving Person shall not share Protected Information with the independent expert until the objection is resolved by agreement or by the Court. If the parties cannot resolve this dispute, they may proceed under the Local Rules addressing discovery disputes, with the Producing Person bearing the burden of filing a motion and establishing good cause to support its objection. A producing party shall not seek discovery with respect to a consultant or other non-testifying expert of a party who has received Protected Information, absent a Court order pursuant to a motion made by the producing party.
10. If not so designated in the transcript, deposition testimony shall be deemed Restricted Confidential until thirty days following the reporter's distribution of the final transcript. During those thirty days, a Producing Person may designate portions of the transcript under ¶ 1 or ¶ 2 by sending written designations to all parties to this action.
11. If a Receiving Person disagrees with a designation of information under ¶ 1 or ¶ 2, it shall provide the Producing Person written notice of its challenge. If the parties cannot resolve this dispute, they may proceed under the Local Rules addressing discovery disputes, with the Producing Person bearing the burden of filing a motion and showing that the information is Confidential or Restricted Confidential. If the parties are not able to resolve the dispute, and the Producing Person does not file a motion for Protective Order within thirty (30) days of receipt of written notice, the information shall lose its designation of Confidential or Restricted Confidential. Failure to challenge a designation immediately does not waive a Receiving Person's ability to bring a later challenge.
12. Source code designated "Restricted Confidential" and produced in electronic form shall be maintained in the sole custody and control of the Producing Person and shall be maintained, respectively, at the New York office of lead outside counsel for EasyLink (with respect to source code produced by EasyLink) and at the New York office of lead outside counsel for j2 (with respect to source code produced by j2). The Parties may vary the location by mutual agreement. The source code shall be made accessible to outside counsel for the Receiving Person and their independent experts or consultants who are actively assisting in the litigation during normal business hours upon five (5) days advance notice of the review.
(a) The Producing Person shall make its source code available in electronic form-if it exists in such form -on a stand-alone, i.e., non-networked, standard personal computer with Microsoft Windows operating system installed in accordance with its standard installation processes. In the event that the source code to be produced does not exist in electronic form, the Producing Person shall so certify in writing and will meet and confer in good faith to make arrangements for the mutually-convenient review of such code;
(b) The Producing Person shall provide a dedicated, stand-alone printer connected to the computer used for source code review, and it shall be loaded with paper bearing pre-printed production control numbering. The Receiving Party's outside counsel and/or independent experts or consultants may print excerpts of the Restricted Source Code that they in good faith consider to be relevant to the claim or defense of any party and only to the extent necessary to perform his or her responsibilities in connection with the action. No more than 500 pages of hard copies of source code may be printed, absent consent by the Producing Person (which consent shall not be unreasonably withheld). The originals of any printouts shall be provided to counsel for the Producing Person on that same day. The Producing Person's counsel shall deliver copies of the printouts to the Receiving Person's outside counsel within two (2) business days. The printouts of source code excerpts are to be maintained at all times in a secure location at the offices of outside counsel for the Receiving Person and may be reviewed by experts, consultants, and outside counsel only at outside counsel's offices. The printouts or any of the information contained in the hard copies shall not be converted into an electronic format, without the express consent of the Producing Person, which consent shall not be unreasonably withheld.
(c) The Receiving Person's outside counsel and/or independent experts or consultants shall be permitted to save, to a file on the hard drive of the stand-alone computer used for source code review, excerpts of the Producing Person's source code for storage or future potential printing. Such file(s) shall be preserved by the Producing Person until the conclusion of the Action.
(d) Upon request by the Receiving Person, the Producing Person shall work in good faith with the Receiving Person to provide software and/or tools used by the Producing Person and their independent experts or consultants who are actively assisting in the litigation to work with the source code, to the extent lawful and feasible. In the event that the Receiving Person's outside counsel and/or independent experts or consultants requests that any source code analytical software be installed on the computer to be used for source code review, the Receiving Person's outside counsel shall notify the Producing Person's counsel and provide a copy of the source code analytical software to be installed. The Producing Person shall install such source code analytical software within three (3) business days of the Receiving Person's request. If the Producing Person objects to the installation of the requested source code analytical software requested and provided by the Receiving Person, the burden shall be on the Producing Person to promptly meet and confer and, if the issue cannot be resolved, to seek relief from the Court. Further, if the Receiving Person's outside counsel and/or independent experts or consultants desires such analytical software to be installed or configured in a particular manner, counsel for the Receiving Person shall provide instructions to the Producing Person and the Producing Person shall make every reasonable effort to comply with the Receiving Person's request. By way of example, such source code analytical software may include (but will not be limited to) text editors, such as emacs, Unix utilities, such as Grep, environments such as Visual Studio and Cygwyn and multi-file text search tools, Visual Slick Edit, Source-Navigator, PowerGrep and ExamDiff Pro, or similar programs.
(e) All source code shall be produced for review in its native format and shall be in a form that is fully searchable, if possible. If the source code does not exist in searchable form, the Producing Person shall provide a written explanation and will meet and confer in good faith to reach a reasonable accommodation for the efficient review of such code.;
(f) No source code produced pursuant to this Paragraph 12 shall be redacted, password protected, deleted, modified or otherwise concealed or withheld from review by the Receiving Person's outside counsel and/or independent experts or consultants.
13. If a Producing Person inadvertently fails to designate material as Protected Information at the time of production, it shall notify all Receiving Persons of its failure as soon as possible after discovery. The Producing Person shall promptly supply all Receiving Persons with new copies of any documents bearing corrected confidentiality designations.
14. Any discovery documents produced in this litigation may be later designated as "Attorney Client Privileged" or "Attorney Work Product" promptly upon discovery by the Producing Person that any such privileged or immune document was produced through inadvertence, mistake, or other error, and no waiver of privilege or immunity shall be deemed to have occurred. Upon such designation, the Receiving Person promptly shall make best efforts to collect all copies of the documents and return them to the Producing Person.
15. In the event that any Protected Information is used in any proceeding in connection with this litigation, it shall not lose its Confidential or Restricted Confidential status through such use, and the parties shall take all steps reasonably required to protect its confidentiality during such use.
16. To the extent that any Confidential or Restricted Confidential information subject to this Protective Order (or any pleading, motion, or memorandum referring to them) is proposed to be filed or is filed with the Court, those materials and papers, or any portion thereof which discloses Confidential or Restricted Confidential information, shall be presented to the judge (by the filing party) accompanied by an application to file under seal in accordance with the procedures set forth in Local Rule 79-5.1 and shall be marked "CONFIDENTIAL INFORMATION FILED UNDER SEAL" on the outside of the sealing envelopes; such application shall be directed to the judge to whom the papers are directed. Pending a ruling on the application submitted in accordance with Local Rule 79-5.1, the papers or portions thereof subject to the application shall be lodged under seal. However, only those portions of filings containing Confidential or Restricted Confidential information shall be filed under seal. The filing party shall also file with the Court for regular filing a redacted version of any filing submitted under Local Rule 79-5.1 in which any Confidential and/or Restricted Confidential information shall be redacted.
17. Nothing in this Order precludes any person from disclosing or using in any manner its own information, or information not obtained under this Order, even if the same information is also produced under this Order.
18. Nothing in this Order precludes any person from showing a document containing Protected Information to an individual who prepared or received the document, or from disclosing Protected Information to a current employee, officer or director of the Producing Person.
19. No information may be withheld from discovery on the ground that the material to be disclosed requires protection greater than that afforded by this Protective Order unless the party claiming a need for greater protection moves for an order providing such special protection pursuant to Rule 26(c) and Local Rules 37-1 through 37-4.
20. The Parties acknowledge and agree that nothing in this protective order is intended to be construed inconsistently with the rights and obligations of the Parties under Local Rules 37-1 through 37-4 governing cooperation during discovery, and that, in the event of any inconsistency, the procedures defined by the Local Rules shall govern. If the Parties wish to file the Joint Stipulation (or portions thereof) required by Local Rule 37-2 under seal, the Parties may file a separate stipulation to that effect, or the moving party may file an ex parte application making the appropriate request. The Parties acknowledge and agree that the stipulation or ex parte application must demonstrate good cause as to why the Joint Stipulation or portions thereof should be filed under seal.
21. Within sixty days of the termination of litigation between the parties, all Protected Information shall be destroyed or returned to the Producing Person, except that one designated outside litigation counsel of record for each party may maintain in its files one copy of each deposition transcript, each document filed with the Court, and each correspondence transmitted between outside counsel for the parties to this action.
So ORDERED AND SIGNED this __20th___ day of __April, 2010.
EXHIBIT A CERTIFICATE OF COMPLIANCE
I, (print name), declare as follows: I certify that I have received a copy of the Stipulated Protective Order ("Order") in the matter captioned j2 Global Communications, Inc. v. EasyLink Services International Corp. United States District Court for the Central District of California, Case No. CV-09-4189 DDP (AJWx), which governs the production and use of Protected Information in this case. I have read and understand the Order. I hereby acknowledge that I am bound by the Order, and I agree to abide by it. I further understand that the Protected Information many only be used in strict accordance with the terms of the Order and then only for the prosecution and defense of this litigation.
I further acknowledge that I may be held responsible for any failure on my part to comply with the provisions of the Order, and I agree to subject myself to the jurisdiction of the United States District Court for the Central District of California, for the purpose of enforcing the Order.
I hereby declare under penalty of perjury that the foregoing is true and correct.
© 1992-2010 VersusLaw Inc.