throbber
Exhibit B
`
`Exhibit B
`
`
`

`
`Counter Proposal Three:
`
`
`[PROPOSED] ADDENDUM TO PROTECTIVE ORDER
`
`IT IS HEREBY ORDERED THAT Order No. 1, the Protective Order for this investigation, is
`
`supplemented with the following provisions:
`
`
`24.
`
`Documents designated "[supplier's name] CONFIDENTIAL BUSINESS
`
`INFORMATION-SOURCE CODE, SUBJECT TO PROTECTIVE ORDER"
`
`shall be provided with the following further protections:
`
`A.
`
`Source Code includes human-readable programming language text that defines
`
`software, firmware, or electronic hardware descriptions (hereinafter referred to as
`
`"source code"). Text files containing source code shall hereinafter be referred to
`
`as "source code files." Source code files include, but are not limited to files
`
`containing source code written in "C", "C++", assembler, VHDL, Verilog, and
`
`digital signal processor (DSP) programming languages. Source code files further
`
`include ".include files," "make" files, link files, and other human-readable text
`
`files used in the generation and/or building of software directly executed
`
`on a microprocessor, micro-controller, or DSP. Source code does not
`
`include binary executable files and object code files, nor does it include
`
`tools such as compilers or linkers.1
`
`
`1 The parties agree that binary executable files and object code files do not need to be produced. To the extent
`
`binary executable files and object code files are required to be produced, they shall be afforded the same protection
`as other "Source Code" defined in this section.
`
`
`
`

`
`B.
`
`Treatment of Source Code. To the extent that any party wishes to obtain access to
`
`source code, the following procedures shall apply:
`
`i.
`
`The supplier shall make all relevant and properly requested source code
`
`available for inspection on a stand-alone, non-networked personal
`
`computer running a reasonably current version of the Microsoft Windows
`
`operating system ("Source Code Computer"). Alternatively, solely at the
`
`supplier's option, the supplier may make such code available on a
`
`computer that is networked, as deemed secure by the supplier such that the
`
`party wishing to obtain access to the source code cannot provide network
`
`access to the computer beyond the specific access enabled or desired by the
`
`supplier. The Source Code Computer shall be locked down so that
`
`additional peripheral devices cannot be connected to the Source Code
`
`Computer by the Receiving Party. Should it be necessary, the Source Code
`
`Computer may be configured by the supplier to run other mutually agreed
`
`upon operating systems, such as Linux. Upon request by the receiving
`
`party, the producing party shall install, at the receiving party’s expense,
`
`one or more of the following types of software to aid in reviewing source
`
`code: UE Studio, Cygwin, MS Visual Studio Suite, Understand, Eclipse,
`
`Visual Slick Edit, PowerGrep, and Source-Navigator.
`
`
`
`ii.
`
`The supplier shall make the source code available electronically and in the
`
`form as kept in the ordinary course of business in a secure room at the
`
`offices of outside counsel for the supplier (or affiliated counsel's offices) in
`
`Deleted: either:
`Deleted: (1) the offices of outside
`counsel for the supplier located in
`Washington, D.C. to be selected by the
`supplier or (2)
`Deleted: or the supplier's facilities
`
`

`
`the greater Boston, MA area to be selected by the supplier. The supplier
`
`need not produce in executable format absent further agreement of the
`
`parties or order of the Chief Administrative Law Judge.
`
`Deleted: The Receiving Party shall
`select one of the two locations no later
`than five (5) days after the amendment to
`the Protective Order is granted, and the
`source code will be produced at only one
`of the two locations for the entirety of
`this action.
`
`
`
`iii.
`
`In order to verify that its source code has not later been altered, the
`
`supplier may benchmark the materials before they are provided, but shall
`
`not install any keystroke or other monitoring software on the Source Code
`
`Computer.
`
`
`
`iv.
`
`The Source Code Computer shall be made available from 8 am to 6 pm
`
`local time, Monday through Friday (excluding holidays), and other days
`
`and/or times, including weekends, upon reasonable request until the close
`
`of discovery in this action. Access on weekends shall be permitted on one
`
`business day's written notice. Access on or after hours (6:00 pm to 12:00
`
`midnight) shall be permitted on four (4) hours written notice on the same
`
`business day. The Source Code Computer will not be permitted to run
`
`searches or other operational parameters regarding the Source Code
`
`outside of the hours during which it is made available pursuant to this
`
`section.
`
`
`
`v.
`
`The source code is to be treated as "[supplier's name] CONFIDENTIAL
`
`BUSINESS INFORMATION-SOURCE CODE, SUBJECT TO
`
`PROTECTIVE ORDER," and the receiving party may not disclose the
`
`Deleted: To the extent that the
`receiving party desires reasonable Access
`on weekends or after hours, supplier will
`consider such requests in good faith, and
`such requested access will not be
`unreasonably withheld.
`
`

`
`source code or the content of the source code to anyone who has not
`
`undertaken to abide by the Protective Order. No employee of the receiving
`
`party may access or obtain the source code. In no case shall any
`
`information designated as "[supplier's name] CONFIDENTIAL
`
`BUSINESS INFORMATION-SOURCE CODE, SUBJECT TO
`
`PROTECTIVE ORDER" by a Respondent be provided to any other
`
`Respondent or Respondent's counsel by any party or counsel absent
`
`explicit agreement from the party designating the information.
`
`
`
`vi. No more than five (5) individuals who qualify under the paragraph 3 of
`
`this Protective Order, for the receiving party, may have access to the
`
`Source Code Computer. For each day that counsel for the receiving party
`
`requests a review of the Source Code Computer, it must give at least one
`
`business day (and at least 24 hours) notice to the counsel for the supplier
`
`that it will be sending individual(s) authorized to review the source code
`
`made available on the Source Code Computer. The receiving party shall
`
`identify all individuals who will be given access to the source code at least
`
`ten (10) business days prior to any inspection, as required by paragraph 15,
`
`during which time the supplier may object to providing source code access
`
`to any persons so identified, provided that access will not be unreasonably
`
`denied.
`
`
`
`Deleted: N
`
`Deleted: In addition, no more than ten
`(10) additional attorneys and/or experts
`who qualify under paragraph 3, of this
`Protective Order, for the receiving party,
`may have access to printed copies of any
`portion of the supplier's source code.
`Deleted: two
`Deleted: s
`Deleted: 48
`
`Deleted: If an objection to an
`individual is made by the supplier, it will
`be the burden of the requesting party to
`prove that individual should be
`authorized to inspect the supplier's source
`code.
`
`

`
`vii. Proper identification of all authorized persons shall be provided prior to
`
`any access to the secure facility or the Source Code Computer. Proper
`
`identification is hereby defined as a photo identification card sanctioned by
`
`the government of a U.S. state, by the District of Columbia, by the United
`
`States federal government, or by the nation state of the authorized person's
`
`current citizenship. Access to the secure facility or the Source Code
`
`Computer may be denied, at the discretion of the supplier, to any
`
`individual who fails to provide proper identification.
`
`
`
`viii. The Source Code Computer shall be equipped with a printer to print copies
`
`of the source code on watermarked pre-Bates numbered paper, which shall
`
`be provided by the supplier. Counsel for the supplier will keep the
`
`originals of these printed documents, and copies shall be made for counsel
`
`for the receiving party on watermarked paper within two (2) business days
`
`of the printing of any such portions by the receiving party. Counsel for the
`
`receiving party may request up to 10 copies of printed source code. No
`
`more than 10% or 500 pages of the total source code for any software
`
`release may be in printed form at any one time, and all printed source code
`
`shall be logged by the receiving party as noted in paragraph xv below. If
`
`necessary, the receiving party may request, within 24-hours of day needed,
`
`to print additional pages in excess of the 500 pages of total source code for
`
`a software release, which request the supplier shall not unreasonably deny.
`
`Any request for additional pages in excess of the 500 pages of total source
`
`Deleted: Additionally, the receiving
`party shall not print any continuous block
`of source code that results in more than
`10 printed pages.
`
`Deleted: , or continuous blocks that
`exceed 10 pages
`
`

`
`code for a software release will be provided in no more than 500-page
`
`increments unless otherwise agreed to by the parties. One page of printed
`
`Source Code shall mean one column of Source Code printed on one single-
`
`sided sheet of paper measuring no more than 8 and 1/2 inches by 11
`
`inches. Upon printing any such portion of Source Code, the receiving party
`
`shall log the location of the electronic file(s) printed such that the
`
`electronic file(s) may be readily located. Such logging may include, but is
`
`not limited to, complete filenames, directory paths, version numbers, and
`
`revision numbers. The receiving party shall supply this log to the
`
`supplying party at the end of each review session. The receiving party's
`
`failure to adequately log the location of the file(s) it prints shall be at least
`
`one non-exclusive ground on which the supplying party may object and
`
`properly refuse to produce the printed pages. In addition to other
`
`reasonable steps to maintain the security and confidentiality of the
`
`supplier's source code, printed copies of the source code maintained by the
`
`receiving party must be kept in a locked storage container when not in use.
`
`No electronic copies of the source code shall be provided by the supplier
`
`beyond the Source Code Computer. The supplier shall maintain a Source
`
`Code access log identifying, for each and every time any Source Code is
`
`viewed, accessed, or analyzed: (1) the name of each person who accessed
`
`the Source Code; (2) the date and time of access; (3) the length of time of
`
`access: and (4) whether any hard copies of any portion of Source Code
`
`were printed.
`
`

`
`
`
`ix.
`
`The receiving party's outside counsel and/or technical advisers shall be
`
`entitled to take notes relating to the Source Code but may not copy the
`
`Source Code into the notes. The receiving party's outside counsel and/or
`
`technical advisers shall not take notes electronically on the Source Code
`
`Computer itself or any other computer. No copies of all or any portion of
`
`the Source Code may leave the room in which the Source Code is
`
`inspected, except as otherwise provided herein. Furthermore, no other
`
`written or electronic record of the Source Code is permitted except as
`
`otherwise provided herein.
`
`
`
`x.
`
`The receiving party's outside counsel of record, experts or consultants shall
`
`maintain and store any paper copies of the source code or any notes,
`
`analyses or descriptions of source code at their offices in a manner that
`
`prevents duplication of or unauthorized access to the source code,
`
`including, without limitation, storing the source code in a locked room or
`
`cabinet at all times when it is not in use.
`
`
`
`xi. Other than in connection with pleadings filed under seal and depositions
`
`designated "[supplier's name] CONFIDENTIAL BUSINESS
`
`INFORMATION-SOURCE CODE, SUBJECT TO PROTECTIVE
`
`ORDER," no copies shall be made of the printed copies provided by the
`
`supplier to the requesting party.
`
`

`
`
`
`xii. Except as otherwise provided within this paragraph, the receiving party
`
`will not create electronic images of the source code from the paper copies
`
`for use on a computer (e.g., may not scan the source code to a .PDF or
`
`other image) or otherwise copy, save, and/or store the source code onto any
`
`memory device or drive. The receiving party may only create an electronic
`
`copy or image of selected portions of the source code when relevant and
`
`necessary for any filing with the Court, the service of any pleadings or
`
`other papers on any party, and testifying expert reports, consulting expert
`
`written analyses and related drafts. The receiving party may not create an
`
`electronic copy or image of selected portions of the Source Code
`
`exceeding five (5) printed pages of code in a single document unless the
`
`electronic copy has been encrypted using commercially reasonable
`
`encryption software including password protection. The communication
`
`and/or disclosure of electronic versions of the source code shall at all times
`
`be limited to individuals who are authorized to see source code under the
`
`provision of this Protective Order. Additionally any copies must be labeled
`
`"[supplier's name] CONFIDENTIAL BUSINESS INFORMATION-
`
`SOURCE CODE, SUBJECT TO PROTECTIVE ORDER."
`
`Notwithstanding any of the foregoing in no event shall the receiving party
`
`scan the paper copy of the source code using optical character recognition
`
`("OCR") technology or otherwise seek to render text-searchable any source
`
`code. Nor shall the receiving party seek to communicate electronically any
`
`

`
`copy of the source code, including through email, FTP, or any other means
`
`of electronic communication.
`
`
`
`xiii. No outside electronic devices, including but not limited to laptops, floppy
`
`drives, USB-connectable devices, zip drives, or other hardware shall be
`
`permitted in the secure room. Nor shall any cellular telephones,
`
`Blackberries, personal digital assistants (PDAs), cameras, voice recorders,
`
`Dictaphones, telephone jacks, or other devices be permitted inside the
`
`secure room.
`
`
`
`xiv. Unless otherwise agreed in advance by the parties in writing, following
`
`each inspection, the receiving party's outside counsel and/or technical
`
`advisers shall remove all notes, documents, and all other materials from the
`
`room that may contain work product and/or attorney-client privileged
`
`information. The supplying party shall not be responsible for any items left
`
`in the room following each inspection session, and the receiving party shall
`
`have no expectation of confidentiality for any items left in the room
`
`following each inspection session without prior agreement to that effect.
`
`
`
`xv. The receiving party’s counsel shall keep a log that records the identity of
`
`each individual to whom any hard copy of the source code is provided and
`
`when it was provided to that person. Within thirty days after the issuance
`
`of a final decision resolving all issues in the Investigation, the receiving
`
`

`
`party must serve upon the producing party the log and certify the
`
`destruction of all paper copies of the producing party’s source code. In
`
`addition, all persons to whom the paper copies of the source code were
`
`provided must certify in writing that all copies of the source code were
`
`returned to the counsel who provided them the information and that they
`
`will make no use of the source code or of any knowledge gained from the
`
`source code in any future endeavor.
`
`
`
`xvi. Any expert or consultant retained on behalf of receiving party who is to be
`
`given access to supplier's produced Source code (whether in electronic
`
`form or otherwise) must agree in writing not to perform software
`
`development work directly or indirectly intended for commercial purposes
`
`relating to any functionality covered by the source code reviewed by such
`
`expert or consultant for a period of one year after the issuance of a final,
`
`non-appealable decision resolving all issues in the case. This shall not
`
`preclude such experts from consulting in future litigation, so long as such
`
`consulting does not involve software development work directly or
`
`indirectly intended for commercial purposes relating to any functionality
`
`covered by the source code reviewed by such expert or consultant.
`
`
`
`xvii. Access to and review of the source code shall be strictly for the purpose of
`
`investigating the claims and defenses at issue in the above-styled case. No
`
`person shall review or analyze any source code for purposes unrelated to
`
`Deleted: The receiving party's counsel
`shall keep a log that records the identity
`of each individual to whom each hard
`copy of the source code is provided and
`when it was provided to that person, and
`shall produce such log no later than the
`time its first expert reports relating to
`Source Code are due, regardless of any
`restrictions or stipulations on expert
`discovery, whether in this order or
`subsequent to this order. Further, the log
`will be supplemented with each new
`expert report relating to Source Code, 10
`days after trial, and at the termination of
`this action. Within thirty days after the
`issuance of a final, non-appealable
`decision resolving all issues in the case,
`the receiving party must serve upon the
`supplier the log and serve upon the
`supplier all paper copies of the supplier's
`source code as well as documents,
`pleadings, reports, and notes reflecting or
`referring to such source code. In addition,
`all persons to whom the paper copies of
`the source code were provided must
`certify in writing that all copies of the
`source code were returned to the counsel
`who provided them the information and
`that they will make no. use of the Source
`code or of any knowledge gained from
`the Source code in any future endeavor.
`
`

`
`this case, nor may any person use any knowledge gained as a result of
`
`reviewing source code in this case in any other pending or future dispute,
`
`proceeding, or litigation.
`
`
`
`xviii. For depositions, at least ten (10) business days before the date of the
`
`deposition, the receiving party shall notify the supplying party that the
`
`receiving party wishes to have a copy of the produced Source Code
`
`available electronically and in the form as kept in the ordinary course of
`
`business at the deposition. The computer upon which Source Code is made
`
`available at the deposition shall include development environments and
`
`tools used to develop the Source Code. Upon such request, which will not
`
`be unreasonably denied:
`
`(a) Nokia shall, at its own discretion, designate the venue of such
`
`deposition in the agreed-upon city, and shall make available a copy
`
`of the produced Source Code electronically and in text searchable
`
`form at the deposition. Nokia shall have full discretion relating to
`
`arrangements to ensure security for the Source Code. Nokia is
`
`willing to absorb the costs associated with producing the Source
`
`Code at the deposition for a reasonable number of depositions, at
`
`no more than two (2) deposition venues.
`
`
`
`(b) LG shall, at its own discretion, designate the venue of such
`
`deposition in the agreed-upon city, and shall make available a copy
`
`

`
`of the produced Source Code electronically and in the form as kept
`
`in the ordinary course of business at the deposition. LG shall have
`
`full discretion relating to arrangements to ensure security for the
`
`Source Code. LG is willing to absorb the costs associated with
`
`producing the Source Code at the deposition for a reasonable
`
`number of depositions, at no more than two (2) deposition venues.
`
`
`
`(c) HTC shall, at their own discretion, designate the venue of such
`
`deposition in the agreed-upon city, and shall make available a copy
`
`of the produced Source Code electronically and in the form as kept
`
`in the ordinary course of business at the deposition. HTC shall have
`
`full discretion relating to arrangements to ensure security for the
`
`Source Code. HTC is willing to absorb the costs associated with
`
`producing the Source Code at the deposition for a reasonable
`
`number of depositions, at no more than two (2) deposition venues.
`
`
`
`(d) RIM shall, at its own discretion, designate the location and
`
`venue of such deposition, including in the offices of RIM's outside
`
`counsel or in or around RIM's offices, and shall make available a
`
`copy of the produced RIM Source Code electronically and in text
`
`searchable form at the deposition. RIM shall have full discretion
`
`relating to arrangements to ensure security for the RIM Source
`
`Code. RIM shall bear the costs associated with producing such
`
`

`
`electronic and text searchable RIM Source Code at the deposition
`
`for a reasonable number of depositions.
`
`
`
`Copies of Source Code that are marked as deposition exhibits shall not be
`
`provided to the court reporter or attached to deposition transcripts; rather,
`
`the deposition record will identify the exhibit by its production numbers.
`
`The deposition transcript shall be designated and is to be treated as
`
`"[supplier's name] CONFIDENTIAL BUSINESS INFORMATION---
`
`SOURCE CODE, SUBJECT TO PROTECTIVE ORDER."
`
`
`
`xix. The Commission Investigation Staff Attorney shall have the same rights to
`
`Deleted: i
`
`review and receive documents and things designated "[supplier's name]
`
`CONFIDENTIAL BUSINESS INFORMATION-SOURCE CODE,
`
`SUBJECT TO PROTECTIVE ORDER" by any party as outside counsel
`
`for any party has under this order. The Commission Investigative Staff
`
`Attorney shall have the same obligations as any party under this order,
`
`including obligations related to the storage and maintenance of Source
`
`Code and notes.
`
`
`
`25. All discovery material exchanged among the parties in this action shall be used solely for
`
`prosecution and defense of the claims in the above-captioned case and shall not be used
`
`for any business, commercial, competitive, personal or other purpose. Moreover, any
`
`individual who personally receives any information designated as "[supplier's name]
`
`

`
`CONFIDENTIAL BUSINESS INFORMATION, SUBJECT TO PROTECTIVE
`
`ORDER" or "[supplier's name] CONFIDENTIAL BUSINESS INFORMATION-
`
`SOURCE CODE, SUBJECT TO PROTECTIVE ORDER" shall not be involved directly
`
`or indirectly (e.g., by advising) in any of the following activities: preparing, prosecuting,
`
`drafting, editing, and/or amending of patent applications, specifications, claims, and/or
`
`responses to office actions (including reissue, reexaminations, and certificates of
`
`correction), before any foreign or domestic agency, including the United States Patent and
`
`Trademark Office, relating to the particular technology or information disclosed in the
`
`documents or information designated "[supplier's name] CONFIDENTIAL BUSINESS
`
`INFORMATION, SUBJECT TO PROTECTIVE ORDER" or "[supplier's name]
`
`CONFIDENTIAL BUSINESS INFORMATION-SOURCE CODE, SUBJECT TO
`
`PROTECTIVE ORDER" which that individual received, for a period ending one (1) year
`
`after the final resolution of this litigation. This bar is not intended to preclude counsel
`
`from participating in reexamination proceedings on behalf of a party challenging the
`
`validity of a patent where counsel will not be involved in crafting claims, but it is
`
`intended to preclude counsel from participating directly or indirectly in reexamination
`
`proceedings on behalf of a patentee where counsel will be involved in crafting claims.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket