throbber
Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 1 of 14
`Case 3:20-mc-80079—JCS Document 19-1 Filed 05/13/20 Page 1 of 14
`
`
`
`
`
`
`EXHIBIT A
`
`EXHIBIT A
`
`
`
`
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 2 of 14
`
`BRETT J. WILLIAMSON (SB # 145235)
` (bwilliamson@omm.com)
`CAMERON W. WESTIN (SB # 290999)
` (cwestin@omm.com)
`O’MELVENY & MYERS LLP
`610 Newport Center Drive, 17th Floor
`Newport Beach, California 92660
`Telephone: (949) 823-6900
`Facsimile: (949) 823-6904
`
`Attorneys for Amicus Curiae HULU, LLC
`
`
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN FRANCISCO DIVISION
`
`Canon, Inc.
`
`Plaintiff,
`
`v.
`TCL Electronics Holdings, Ltd., et al.
`
`Defendants.
`
`Case No. 3:20-mc-80079-JCS
`BRIEF OF AMICUS CURIAE
`HULU, LLC
`
`
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 3 of 14
`
`
`
`TABLE OF CONTENTS
`
`
`Page
`INTRODUCTION ..................................................................................................... 1
`HULU’S AMICUS POSITIONS ............................................................................... 2
`I.
`Roku’s Motion Has Ramifications for Hulu’s Interests, Which
`Should Be Considered in Deciding Roku’s Motion ............................. 2
`Imposing Remote Review of Source Code in Patent Litigation Is
`Inherently and Incurably Insecure ........................................................ 4
`III. The Potential Consequences of Making Source Code Available
`for Remote Review Are Significant ...................................................... 7
`CONCLUSION .......................................................................................................... 8
`
`
`II.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`- i -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 4 of 14
`
`
`
`TABLE OF AUTHORITIES
`
`
`Page(s)
`
`CASES
`Ctr. for Biological Diversity v. Jewell,
`2013 WL 4127790 (N.D. Cal. Aug. 9, 2013) ....................................................... 2
`In re Roxford Foods Litig.,
`790 F. Supp. 987 (E.D. Cal. 1991) ....................................................................... 3
`Infineon Techs. N. Am. Corp. v. Mosaid Techs., Inc.,
`2006 WL 3050849 (N.D. Cal. Oct. 23, 2006) ...................................................... 3
`NGV Gaming, Ltd. v. Upstream Point Molate, LLC,
`355 F. Supp. 2d 1061 (N.D. Cal. 2005) ................................................................ 3
`OTHER AUTHORITIES
`Loren et al., Computer Software-Related Litigation, Discovery and the
`Overly-Protective Source Code, Fed. Courts Law Review Vol. 6,
`Issue 1 (2012)) .............................................................................................. 5, 7, 8
`U.S. DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS, Standing
`Order Regarding Pretrial Procedures in Civil Cases Assigned to
`Chief District Judge Rodney Gilstrap During The Present COVID-
`19 Pandemic ......................................................................................................... 2
`U.S. DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA,
`Model Stipulated Protective Order for Litigation Involving Patents,
`Highly Sensitive Confidential Information, and/or Trade Secrets, §
`9(c) ........................................................................................................................ 5
`
`
`
`
`
`
`
`- ii -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 5 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`INTRODUCTION
`Hulu, LLC (“Hulu”) is a provider of both live and on-demand streaming
`video. Hulu is headquartered in Santa Monica, California. Since its initial release
`to the public in March of 2008, Hulu has offered streaming video-on-demand
`(“SVOD”) services, and in May of 2017 it launched the Hulu Live service, offering
`subscribers the ability to have access to the same TV channels provided by
`traditional cable providers, delivered through Hulu’s streaming Internet platform.
`Hulu’s SVOD and Live services are subscription-based, with an announced total of
`over 30 million subscribers as of December 2019.1 Hulu’s services are available
`through a web browser-based platform, as well as on the platforms of numerous
`device makers, including Roku, Inc. (“Roku”).2
`Hulu is not a party to the underlying litigation brought by Canon, Inc.
`(“Canon”) in the Eastern District of Texas.3 Nor is Hulu’s source code the subject
`of discovery in that litigation or the subject of Roku’s Motion To Modify And/Or
`Quash Plaintiff Canon Inc.’s Subpoena and For A Protective Order To Prevent
`Remote Source Code Review (ECF No. 1) (hereinafter “Roku’s Motion”). As
`Roku’s Motion correctly notes, however, the potential exposure of Roku’s source
`code to malicious actors poses a threat to Hulu’s own efforts to secure its streaming
`content and services. ECF No. 1 at 15 (“[A]ny breach could also compromise the
`intellectual property of Roku’s content partners, such as Netflix and Hulu.”). In
`addition, Hulu, like numerous other California-based technology companies
`
`1 See Declaration of Cameron W. Westin In Support of Brief of Amicus Curiae
`Hulu, LLC (filed concurrently herewith, hereinafter “Westin Decl.”) Ex. 1 (The
`Walt Disney Company, First Quarter Earnings for Fiscal 2020 (Feb. 4, 2020),
`available at https://thewaltdisneycompany.com/app/uploads/2020/02/q1-fy20-
`earnings.pdf).
`2 See Westin Decl., Ex. 2 (Hulu - Supported Devices, available at
`https://help.hulu.com/s/article/supported-devices?language=en_US).
`3 Canon Inc. v. TCL Elecs. Holdings Ltd., Case No. 2:18-cv-00546-JRG (E.D. Tex.
`Dec. 27, 2018).
`
`
`
`
`
`
`
`- 1 -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 6 of 14
`
`
`
`involved in patent litigation in courts throughout the country, is also often required
`to make its own highly valuable and sensitive source code available for inspection
`during discovery. Hulu has significant and serious concerns about the diminished
`security to that source code if similar requests are granted in patent cases where
`Hulu’s source code has been or will be made available for inspection.
`Hulu recognizes the unprecedented challenges posed to existing discovery
`procedures during the COVID-19 pandemic. Hulu appreciates and takes seriously
`the Court’s expectation that counsel and the parties will make extra efforts to
`resolve discovery issues amicably, ECF No. 12, and the Eastern District of Texas’s
`directive that parties advance the “goal of allowing code review to efficiently and
`effectively continue . . . while protecting the security of the source code—which is
`highly sensitive and valuable information—as best as possible under the
`circumstances,” U.S. DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS,
`Standing Order Regarding Pretrial Procedures in Civil Cases Assigned to Chief
`District Judge Rodney Gilstrap During The Present COVID-19 Pandemic, ¶ 19.
`Proposals such as Canon’s, however, which seek to force companies to expose their
`highly sensitive and valuable source code to the vulnerabilities inherent in remote
`inspection, do not protect that code “as best as possible under the circumstances.”
`Hulu, by and through its undersigned counsel, submits this amicus brief so that the
`Court may consider the implications of forcing remote review of source code to
`Hulu and other technology companies.
`HULU’S AMICUS POSITIONS
`Roku’s Motion Has Ramifications for Hulu’s Interests, Which Should Be
`Considered in Deciding Roku’s Motion
`
`I.
`
`“District courts frequently welcome amicus briefs from non-parties
`concerning legal issues that have potential ramifications beyond the parties directly
`involved or if the amicus has unique information or perspective that can help the
`court beyond the help that the lawyers for the parties are able to provide.” Ctr. for
`BRIEF OF AMICUS CURIAE HULU, LLC
`
`CASE NO. 3:20-MC-80079-JCS
`
`- 2 -
`
`
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 7 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Biological Diversity v. Jewell, 2013 WL 4127790, at *4 (N.D. Cal. Aug. 9, 2013)
`(quoting NGV Gaming, Ltd. v. Upstream Point Molate, LLC, 355 F. Supp. 2d 1061,
`1067 (N.D. Cal. 2005)). “There are no strict prerequisites that must be established
`prior to qualifying for amicus status; an individual seeking to appear as amicus
`must merely make a showing that his participation is useful to or otherwise
`desirable to the court.” Infineon Techs. N. Am. Corp. v. Mosaid Techs., Inc., 2006
`WL 3050849, at *3 (N.D. Cal. Oct. 23, 2006) (quoting In re Roxford Foods Litig.,
`790 F. Supp. 987, 997 (E.D. Cal. 1991)).
`Roku’s Motion, and the risk to Hulu’s source code that Roku’s Motion seeks
`to avoid, has direct ramifications for Hulu. Hulu’s streaming content is provided
`securely on compatible devices from numerous manufacturers, including various
`digital media players sold by Roku.4 The content provided by Hulu’s services and
`its technology drives the demand for Hulu’s subscription services, and comes from
`content partners including networks, cable television providers, studios, and from
`Hulu’s own developed content. Declaration of Brett Henry In Support of Brief of
`Amicus Curaie Hulu, LLC (filed concurrently herewith, hereinafter “Henry Decl.”)
`at ¶ 4. Hulu has strict obligations to its content providers to maintain their content
`in a secure and piracy-free environment. Henry Decl., ¶ 5. Hulu must do so in an
`environment where it receives millions of malicious requests for data from hackers
`per day. Henry Decl., ¶ 6. Hulu thus expends significant efforts to ensure that all
`of its device manufacturing partners’ systems, including Roku’s, contain the
`strongest security measures possible to protect its services’ content from being
`improperly downloaded and pirated. For example, Roku’s native development kit
`(“NDK”) is extremely restrictive, and only a subset of Hulu programmers has
`
`
`4 See Westin Decl., Ex. 3 (Hulu | Roku Channel Store, available at
`https://channelstore.roku.com/details/2285/hulu); Ex. 4 (Hulu - Supported Roku
`Models, available at https://help.hulu.com/s/article/supported-
`roku?language=en_US). See also ECF No. 1 at 2, 15.
`
`
`
`
`
`
`
`- 3 -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 8 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`access to it. Henry Decl., ¶ 15. Were Roku’s source code to be exposed publicly or
`to malicious actors⎯a possibility that would increase significantly due to remote
`review (see ECF No. 1 at 13-14)⎯Hulu’s content would also be less protected from
`such hacking, and its relationship with content partners could in turn be irreparably
`damaged. Henry Decl., ¶¶ 16-17.
`Moreover, Canon’s attempt to force Roku to expose its source code to the
`risks inherent in remote review has ramifications for Hulu and other technology
`companies beyond the immediate dispute. Hulu, like Roku, is often required to
`make its own highly sensitive and valuable source code available for inspection in
`connection with patent litigations.5 To do so, Hulu, like Roku, depends on
`protective orders that limit this inspection to standalone computers that are isolated
`from the Internet and local or external networks.6 Canon’s request that the Eastern
`District of Texas modify the protective order under which Roku’s source code was
`originally produced would mean that Hulu, as well as other technology companies
`subject to discovery in the legal process, may similarly be forced to forego the time-
`tested practice of source code review on secured standalone computers for the
`inherently more vulnerable risks associated with connecting that source code and
`transmitting it on the Internet.
`II.
`Imposing Remote Review of Source Code in Patent Litigation Is
`Inherently and Incurably Insecure
`
`The industry standard of permitting source code review only on standalone
`
`5 Like Roku in the underlying Eastern District of Texas litigation, Hulu is also
`regularly subpoenaed to make its source code available for inspection in connection
`with litigations where Hulu is not a party. Westin Decl., Ex. 5 (third party
`subpoena for Hulu source code in Uniloc 2017 LLC v. Vudu, Inc., C.A. No. 19-183
`(CFC) (D. Del. Jan. 30, 2019)).
`6 See, e.g., DivX, LLC v. Hulu, LLC, 2:19-cv-1606 (PSG)(DFMx), ECF No. 111, 15
`(C.D. Cal. Mar. 5, 2019); Sound View Innovations, LLC v. Hulu, Inc., 2:17-cv-
`04146-JAK-PLA, ECF No. 57, 16 (C.D. Cal. June 2, 2017); Transvideo Elec., Ltd.
`v. Hulu, Inc., 13-cv-1399 (LPS), ECF No. 43, 20 (D. Del. Aug. 7, 2013).
`BRIEF OF AMICUS CURIAE HULU, LLC
`
`- 4 -
`CASE NO. 3:20-MC-80079-JCS
`
`
`
`
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 9 of 14
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`non-Internet connected computers is based on the established understanding that
`source code made available for inspection on a computer connected to the Internet
`is more vulnerable to malicious access or hacking by unauthorized third parties.
`See, e.g., Westin Decl., Ex. 6 (Loren et al., Computer Software-Related Litigation,
`Discovery and the Overly-Protective Source Code, Fed. Courts Law Review Vol. 6,
`Issue 1 (2012)) at 59 (“Prohibiting the stand-alone computer from being connected
`to the internet or existing internal networks is an appropriate solution to guard
`against unauthorized access via the ‘back door’ of the Internet or an Intranet in the
`same office.”). Indeed, this District’s Model Protective Order for Patent Cases
`anticipates source code being made available for inspection and provides for
`precisely these protections, requiring that “source code shall be made available for
`inspection on a secured computer in a secured room without Internet access or
`network access to other computers.” U.S. DISTRICT COURT FOR THE NORTHERN
`DISTRICT OF CALIFORNIA, Model Stipulated Protective Order for Litigation
`Involving Patents, Highly Sensitive Confidential Information, and/or Trade Secrets,
`§ 9(c).
`As noted in Section I, supra, Hulu relies on such protections in connection
`with discovery of its own source code, making its source code available for
`inspection by opposing counsel and experts only on standalone computers with no
`connectivity to the Internet, and in secure facilities at outside counsel’s office in
`order to strictly control who has access, what tools can be connected to the
`reviewing device, and what devices are brought into and out of the review room.
`The risk posed by the exposure of its highly sensitive and valuable source
`code is so great that Hulu imposes restrictions on its own engineers’ access to that
`code. Their access is limited to only the portions of the source code necessary to
`perform their assigned tasks, rather than to the vast swaths of source code that may
`be made available during litigation. Henry Decl., ¶ 9. Moreover, Hulu engineers
`are not permitted any access to source code unless they are physically on the
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`- 5 -
`
`
`
`
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 10 of 14
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`premises at Hulu, or utilizing Hulu’s secure and heavily regulated virtual private
`network (“VPN”). Henry Decl., ¶ 10. That VPN access, like all access, is limited
`to the portions of code necessary to complete the engineer’s assigned tasks, guarded
`by multi-factor authentication requirements, and monitored to ensure that engineers
`do not violate established security protocols during use or attempt to venture
`beyond their authorized portions of the source code. Id. To implement these
`security protocols, Hulu spends significant financial and physical security resources
`every time an engineer is authorized to access its source code remotely. Id. No
`such authorization can be provided in connection with outside experts or opposing
`counsel in the course of litigation, due to the heightened risk and lack of complete
`control over their activities, whether malicious or merely lacking in the necessary
`security protocols. Henry Decl., ¶ 11.
`Allowing remote review of Hulu’s source code by opposing counsel and their
`retained experts would introduce myriad security challenges, even if those counsel
`and experts acted according to the protocols proposed by Canon. See ECF No. 1 at
`9-10. Counsel and experts cannot be permitted to review the source code remotely
`via their own personal computers, because Hulu would be unable to evaluate
`whether those computers were free from malware or other malicious software
`through which an unauthorized third-party might access the source code. Henry
`Decl., ¶ 13. Instead, Hulu would be required to prepare and provide, for each
`counsel conducting the review and for each expert, a computer and monitoring
`equipment securely connected to its VPN (or containing encrypted versions of the
`source code itself), and ship these materials to the reviewing experts. Henry Decl.,
`¶ 13. For each individual reviewing the source code, Hulu would then need to
`employ one person to monitor an expert’s activities via a Wi-Fi or cellular camera
`during the review, while another person monitors usage of the computer to ensure
`no improper activity occurs. Henry Decl., ¶ 12; see also ECF No. 1 at 13-15. Even
`if Hulu had the ability to enforce such supervision and surveillance for limited
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`- 6 -
`
`
`
`
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 11 of 14
`
`
`periods of time during regular business hours, the cost in resources and employee
`time to Hulu (multiplied by each individual granted remote access to the source
`code) would be significant, if not prohibitive.
`Despite such efforts, the risks inherent in allowing remote review of source
`code by multiple individuals in connection with litigation cannot be eliminated.
`Source code made available for third party inspection on computers connected to
`the Internet is inherently more vulnerable to malicious activity. Henry Decl., ¶ 8.
`For example, even when source code is stored on a computer in encrypted form,
`during review the source code may necessarily be unencrypted inside a computer’s
`memory, or on the screen itself. Henry Decl., ¶ 14; see also Westin Decl., Ex. 6
`(Loren et al., Computer Software-Related Litigation) at 23. This unencrypted
`source code is particularly susceptible to hacking. Id. Making source code
`available for inspection on standalone computers significantly reduces these risks
`by limiting that unencrypted viewing to an isolated room with no Internet
`connection and no available recording devices. Id.
`Thus, even under the best of circumstances, assuming total compliance with
`applicable protective orders by opposing counsel and their experts, requiring remote
`review of Hulu’s source code by an opposing litigants’ attorneys and experts
`presents unjustifiable costs and risks to Hulu. These costs and risks to Hulu would
`multiply with each additional individual reviewing the code. Henry Decl., ¶ 13.
`III. The Potential Consequences of Making Source Code Available for
`Remote Review Are Significant
`
`The potential consequences, both to Hulu’s content and its business
`relationships, of unsecure remote reviewing of Roku’s source are discussed above.
`See Section I, supra. The potential consequences of Hulu’s source code being
`subjected to such insecure protocols are, to Hulu, far greater.
`Hulu’s source code is among its most vital assets. Henry Decl., ¶ 7. That
`source code is the product of investing enormous sums of money and countless
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`- 7 -
`
`
`
`
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 12 of 14
`
`
`person-hours on the part of Hulu’s engineers over the companies’ twelve years of
`existence, id., resulting in numerous filed and issued U.S. patents and the
`development of countless additional trade secrets.7 If, however, this proprietary
`source code were to be made publicly available, the source code’s value could
`irreparably be destroyed. See Westin Decl., Ex. 6 at 21 (“[I]n this age of rapid and
`global dissemination, parties fear that if proprietary source code being disclosed
`were to be leaked to the outside world the value could be totally destroyed in a
`matter of hours, if not minutes, and could never be recaptured.”).
`Moreover, were Hulu’s operating system (“OS”) source code to become
`publicly available, malicious actors could hijack that code to essentially sell access
`to a free and uncontrolled version of Hulu, or download and pirate Hulu’s
`proprietary and copyrighted content. Henry Decl., ¶ 18. Hulu would thus lose its
`paying subscribers drawn to Hulu’s content and its proprietary user interface, and
`its ability to sell advertisements contained in that content (Hulu’s other primary
`source of revenue). Moreover, such a scenario would deeply impair Hulu’s
`relationships with its content providers, and thus Hulu’s entire business model. Id.
`CONCLUSION
`Hulu’s source code, like that of numerous technology companies located in
`this District and throughout the State, is among its most valuable assets. Placing
`that source code at increased risk of falling into the hands of malicious actors
`presents dire consequences for Hulu and its business.
`
`
`
`7 See Westin Decl., Ex. 7 (U.S. Patent and Trademark Website listing 151 issued
`U.S. Patents and published U.S. patent applications assigned to Hulu, LLC,
`available at https://assignment.uspto.gov/patent/index.html#/patent/search/
`resultAssignee?assigneeName=HULU%20LLC).
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`- 8 -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 13 of 14
`
`
`Dated: May 13, 2020
`
`
`
`
`
`
`O’MELVENY & MYERS LLP
`BRETT J. WILLIAMSON
`CAMERON W. WESTIN
`
`By: /s/ Brett J. Williamson
`
`Brett J. Williamson (SB # 145235)
`bwilliamson@omm.com
`Cameron W. Westin (SB # 290999)
`cwestin@omm.com
`O’MELVENY & MYERS LLP
`610 Newport Center Drive, 17th Floor
`Newport Beach, California 92660
`Telephone: (949) 823-6900
`Facsimile: (949) 823-6904
`
`Attorneys for Amicus Curiae
`Hulu, LLC
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`- 9 -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

`

`Case 3:20-mc-80079-JCS Document 19-1 Filed 05/13/20 Page 14 of 14
`
`
`CERTIFICATE OF SERVICE
`The undersigned hereby certifies that on May 13, 2020, a true and accurate
`copy of the BRIEF OF AMICUS CURIAE HULU, LLC was electronically filed
`with the Court to be served by operation of the Court’s electronic filing system.
`
`Dated: May 13, 2020
`
`Respectfully submitted,
`
`By:
`
`/s/ Brett J. Williamson
`Brett J. Williamson
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`- 10 -
`
`BRIEF OF AMICUS CURIAE HULU, LLC
`CASE NO. 3:20-MC-80079-JCS
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket