`
`Washington, D.C.
`
`In the Matter of
`
`CERTAIN ROAD MILLING
`MACHINES AND COMPONENTS
`THEREOF
`
`Inv. No. 337-TA-1067
`
`
`
`Order No. 8: AMENDED PROTECTIVE ORDER
`
`
`
`WHEREAS, documents and information may be sought, produced or exhibited by and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`among the parties to the above captioned proceeding, which materials relate to trade secrets or
`
`
`
`
`
`
`
`other confidential research, development or commercial information, as such terms are used in
`
`
`
`
`
`
`
`
`
`
`
`
`
`the Commission's Rules, 19 C.F.R. 210.5;
`
`IT IS HEREBY ORDERED THAT:
`
`
`
`1.Confidential business information is information which has not been made public and
`
`
`
`
`
`
`
`
`
`
`
`
`
`which concerns or relates to the trade secrets, processes, operations, style of work, or apparatus,
`
`
`
`
`
`
`
`
`
`or to the production, sales, shipments, purchases, transfers, identification of customers,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inventories, amount or source of any income, profits, losses, or expenditures of any person, firm,
`
`
`
`
`
`
`
`partnership, corporation, or other organization, the disclosure of which information is likely to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`have the effect of either (i) irnpairing the Commission's ability to obtain such information as is
`
`
`
`
`
`
`
`necessary to perform its statutory functions; or (ii) causing substantial harm to the competitive
`
`
`
`
`
`
`
`
`
`
`
`
`
`frpm which the
`
`position of the person, firm, partnership, corporation, or other organization
`
`
`
`
`
`
`
`
`
`
`
`information was obtained, unless the Commission is required by law to disclose such
`
`
`
`information.
`
`Page 1 of 26
`
`
`
`
`CATERPILLAR EXHIBIT 1153
`CATERPILLAR v. WIRTGEN
`IPR2017-02188
`
`
`
`
`
`
`
`2.(a) Any information submitted, in prehearing discovery or in a pleading, motion, or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`response to a motion either voluntarily or pursuant to order, in this investigation, which is
`
`
`
`
`
`asserted by a supplier to contain or constitute confidential business information shall be so
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`designated by such supplier in writing, or orally at a deposition, conference or hearing, and shall
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be segregated from other information being submitted. Documents shall be clearly and
`
`
`
`
`
`
`
`prominently marked on their face with the legend: "[supplier's name] CONFIDENTIAL
`
`
`
`
`
`
`
`BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER," or a comparable notice.
`
`
`
`
`
`
`
`
`
`
`
`During the prehearing phase of this investigation, such information whether submitted in writing
`
`
`
`
`
`
`
`
`
`
`
`
`
`or in oral testimony shall be disclosed only in camera before the Commission or the
`
`
`
`administrative law judge.
`
`
`
`(b)The administrative law judge or the Commission may determine that information
`
`
`
`
`
`
`
`
`
`alleged to be confidential is not confidential, or that its disclo_sure is necessary for the proper
`
`
`
`
`
`
`
`
`
`disposition of the proceeding, before, during or after the close of a hearing herein. If such a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`determination is made by the administrative law judge or the Commission, opportunity shall be
`
`
`
`
`
`
`
`provided to the supplier of such information to argue its confidentiality prior to the time of such
`
`
`
`
`
`
`
`ruling.
`
`
`
`3.In the absence of written permission from the supplier or an order by the Commission
`
`
`
`
`
`
`
`
`
`or the administrative law judge, any confidential documents �r business information submitted in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accordance with the provisions of paragraph 2 above shall not be disclosed to any person other
`
`
`
`
`
`
`
`than:. (i) outside counsel for parties to this investigation, including necessary secretarial and
`
`
`
`
`
`
`
`
`
`
`
`support personnel assisting such counsel; (ii) qualified persons taking testimony involving such
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`documents or information and necessary stenographic and clerical personnel thereof; (iii)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`technical experts and their staff who are employed for the purposes of this litigation (unless they
`
`
`
`2
`
`Page 2 of 26
`
`
`
`
`
`are otherwise employed by, consultants to, or otherwise affiliated with a non-governmental
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`party, or are employees of any domestic or foreign manufacturer, wholesaler, retailer, or
`
`
`
`
`
`
`
`
`
`distributor of certain road milling machines and components thereof, which are the subject of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`law judge, the Commission staff, and this investigation); (iv) the Commission, the administrative
`
`
`
`
`
`
`
`personnel of any governmental agency as authorized by the Commission; and (v) the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commission, its employees and Offices, and contract personnel (a) for developing or
`
`
`
`
`
`
`
`
`
`
`
`
`
`maintaining the records of this or a related proceeding, or (b) in internal investigations, audits,
`
`
`
`
`
`
`
`reviews, and evaluations relating to the programs, personnel, and operations of the Commission
`
`
`
`
`
`
`
`
`
`
`
`including under 5 U.S.C. Appendix 3; and (vi) U.S. government employees and contract
`
`
`
`
`
`
`
`
`
`personnel, solely for cybersecurity purposes.
`
`l
`
`
`
`
`
`
`
`
`
`4.Confidential business information submitted in accordance with the provisions of
`
`
`
`
`
`
`
`
`
`
`
`
`
`paragraph 2 above shall not be made available to any person designated in paragraph 3(i) and
`
`
`
`
`
`
`
`
`
`
`
`•. (iii) unless he or she shall have first read this order and shall have agreed, by letter filed with the
`
`
`
`
`
`
`
`
`
`Secretary of this Commission: (i) to be bound by the terms thereof; (ii) not to reveal such
`
`
`
`
`
`
`
`
`
`
`
`confidential business information to anyone other than another person designated in paragraph 3;
`
`
`
`
`
`
`
`
`
`
`
`
`
`and (iii) to utilize such confidential business information solely for purposes of this investigation.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The letter shall also include the following acknowledgement:
`
`2
`
`
`
`I, the undersigned, on behalf of __ , acknowledge that information submitted
`
`
`
`
`
`
`
`
`
`
`
`for purposes of this Investigation may be disclosed to and used:
`
`
`
`(i)by the Commission, its employees and Offices, and contract personnel (a) for
`
`
`
`
`
`
`
`
`
`
`developing or maintaining the records of this or a related proceeding, or (b) in
`
`
`
`
`
`internal investigations, audits, reviews, and evaluations relating to the programs,
`
`
`
`
`
`personnel, and operations of the Commission including under 5 U.S.C. Appendix
`3; or
`
`1
`
`
`
`See Commission Administrative Order 16-01 (Nov. 7, 2015).
`
`
`
`2
`See id.
`
`3
`
`Page 3 of 26
`
`
`
`(ii)by U.S. government employees and contract personnel, solely for
`
`
`
`
`
`
`
`
`cybersecurity purposes. I understand that all contract personnel will sign
`appropriate nondisclosure agreements.
`
`
`
`
`
`
`
`5.If the Commission or the administrative law judge orders, or if the supplier and all
`
`
`
`
`
`
`
`
`
`parties to the investigation agree, that access to, or dissemination of information submitted as
`
`
`
`
`
`
`
`
`
`
`
`confidential business information shall be made to persons not included in paragraph 3 above,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such matter shall only be accessible to, or disseminated to, such persons based upon the
`
`
`
`
`
`
`
`conditions pertaining to, and obligations arising from this order, and such persons shall be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`considered subject to it, unless the Commission or the administrative law judge finds that the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information is not confidential business information as defined in paragraph 1 hereof.
`
`
`
`
`
`6.(a) Any confidential business information submitted to the Commission or the
`
`
`
`
`
`
`
`
`
`
`
`administrative law judge in connection with a motion or other proceeding within the purview of
`
`
`
`
`
`
`
`
`
`
`
`this investigation shall be submitted under seal pursuant to paragraph 2 above. Any portion of a
`
`
`
`
`
`
`
`
`
`
`
`
`
`transcript in connection with this investigation containing any confidential business information
`
`
`
`
`
`
`
`
`
`
`
`submitted pursuant to paragraph 2 above shall be bound separately and filed under seal. When
`
`
`
`
`
`
`
`
`
`any confidential business information submitted in accordance with paragraph 2 above is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`included in an authorize_d transcript of a deposition or exhibits thereto, arrangements shall be
`
`
`
`
`
`
`
`
`
`and portions to bind such confidential made with the court reporter taking the deposition
`
`
`
`
`
`
`
`
`
`separately label them "[supplier's name], CONFIDENTIAL BUSINESS INFORMATION,
`
`
`
`
`
`
`
`
`
`SUBJECT TO PROTECTIVE ORDER." Before a court reporter receives any such information,
`
`
`
`
`
`
`
`to be bound by the terms he or she shall have first read this order and shall have agreed in writing
`
`
`
`
`
`thereof. Alternatively, he or she shall sign the agreement included as Attachment A hereto.
`
`
`
`
`
`
`
`
`
`
`
`of such confidential to the supplier shall be provided Copies of each such signed agreement
`
`
`
`
`
`
`
`
`
`business information and the Secretary of the Commission.
`
`
`
`
`
`4
`
`Page 4 of 26
`
`
`
`
`
`
`
`
`
`
`
`
`
`(b)Submitters are strongly encouraged to encrypt nonpublic documents that are
`
`
`
`
`
`
`
`electronically transmitted to the Commission to protect your sensitive information from
`
`
`
`
`
`
`
`
`
`
`
`
`
`unauthorized disclosure. The USITC secure drop-box system and the El,ectronic Document
`
`
`
`
`
`
`
`
`
`Information System (EDIS) use Federal Information Processing Standards (FIPS) 140-2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cryptographic algorithms to encrypt data in transit. Submitting your nonpublic documents by a
`
`
`
`
`
`means that does not use these encryption algorithms (such as by email) may subject your firm's
`
`
`
`
`
`
`
`
`
`nonpublic information to unauthorized disclosure during transmission. If you choose a non
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encrypted method of electronic transmission, the Commission warns you that the risk of such
`
`
`
`
`
`3
`possible unauthorized disclosure is assumed by you and not by the Commission.
`
`
`
`
`
`
`
`
`
`
`
`7.The restrictions upon, and obligations accruing to, persons who become subject to this
`
`
`
`
`
`
`
`
`
`
`
`order shall not apply to any information submitted in accordance with paragraph 2 above to
`
`
`
`
`
`
`
`
`
`which the person asserting the confidential status thereof agrees in writing, or the Commission or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the administrative law judge rules, after an opportunity for hearing, was publicly known at the
`
`
`
`
`
`
`
`
`
`
`
`time it was supplied to the receiving party or has since become publicly known through no fault
`
`
`
`of the receiving party.
`
`
`
`
`
`
`
`8.The Commission, the administrative law judge, and the Commission investigative
`
`
`
`attorney acknowledge that any document or information submitted as confidential business
`
`
`
`
`
`
`
`
`
`
`
`
`
`information pursuant to paragraph 2 above is to be treated as such within the meaning of 5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S:C. § 552(b )( 4) and 18 U.S.C. § 1905, subject to a contrary ruling, after hearing, by the
`
`
`
`
`
`
`
`
`
`Commission or its Freedom oflnformation Act Officer, or the administrative law judge.
`
`
`
`
`
`
`
`9.Unless a designation of confidentiality has been withdrawn, or a determination has
`
`
`
`
`
`
`
`
`
`
`
`
`
`been made by the Commission or the administrative law judge that information designated as
`
`
`
`
`
`
`
`
`
`confidential, is no longer confidential, the Commission, the administrative law judge, and the
`
`
`
`
`
`
`
`
`
`3 See id.
`
`5
`
`Page 5 of 26
`
`
`
`
`
`
`
`
`
`Commission investigative attorney shall take all necessary and proper steps to preserve the
`
`
`
`
`
`
`
`
`
`confidentiality of, and to protect each supplier's rights with respect to, any confidential business
`
`
`
`
`
`
`
`
`
`
`
`information
`
`
`
`
`
`designated by the supplier in accordance with paragraph 2 above, including, without
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`limitation: (a) notifying the supplier promptly of (i) any inquiry or request by anyone for the
`
`
`
`
`
`
`
`substance of or access of such confidential business information, other than those authorized
`
`
`
`
`
`
`
`
`
`pursuant to this order, under the Freedom oflnformation Act, as amended (5 U.S.C. § 552) and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(ii)any proposal to declassify or make public any such confidential business information; and (b)
`
`
`
`
`
`
`
`providing
`
`
`
`
`
`the supplier at least seven days after receipt of such inquiry or request within which to
`
`
`
`
`
`
`
`
`
`
`
`take action before the Commission, its Freedom of Information Act Officer, or the administrative
`
`
`
`
`
`
`
`
`
`
`
`law judge, or otherwise to preserve the confidentiality of and to protect its rights in, and to, such
`
`
`
`
`
`
`
`
`
`
`
`-confidential business information.
`
`
`
`10.If while an investigation is before the administrative law judge, a party to this order
`
`
`
`
`
`
`
`
`
`
`
`
`
`who is to be a recipient of any business information designated as confidential and submitted in
`
`
`
`
`
`
`
`
`
`accordance with paragraph 2, disagrees with respect to such a designation, in full or in part, it
`
`
`
`
`
`
`
`
`
`
`
`shall notify the supplier in writing, and they will thereupon confer as to the status of the subject
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information proffered within the context of this order. If prior to, or at the time of such a
`
`
`
`
`
`
`
`
`
`
`
`
`
`conference, the supplier withdraws its designation of such information as being subject to this
`
`
`
`
`
`order, but nonetheless submits such information for purposes of the investigation, such supplier
`
`
`
`
`
`
`
`
`
`
`
`
`
`shall express the withdrawal, in writing, and serve such withdrawal upon all parties and the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`administrative law judge. If the recipient and supplier are unable to concur upon the status of the
`
`
`
`
`
`
`
`subject information submitted as confidential business information within ten days from the date
`
`
`
`
`
`
`
`
`
`
`
`
`
`of notification of such disagreement, any party to this order may raise the issue of the
`
`
`
`
`
`
`
`
`
`designation of such a status to the administrative law judge who will rule upon the matter. The
`
`
`
`
`
`6
`
`Page 6 of 26
`
`
`
`
`
`
`
`administrative law judge may sua sponte question the designation of the confidential status of
`
`
`
`
`
`
`
`
`
`
`
`any information and, after opportunity for hearing, may remove the confidentiality designation.
`
`
`
`
`
`
`
`
`
`11.No less than 10 days (or any other period of time designated by the administrative
`
`
`
`
`
`
`
`law judge) prior to the initial disclosure to a proposed expert of any confidential information
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`submitted in accordance with paragraph 2, the party proposing to use such expert shall submit in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`writing the name of such proposed expert and his or her educational and employment history to
`
`
`
`
`
`
`
`
`
`the supplier. If the supplier objects to the disclosure of such confidential business information to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such proposed expert as inconsistent with the language or intent of this order or on other
`
`
`
`
`
`
`
`
`
`
`
`grounds, it shall notify the recipient in writing of its objection and the grounds therefor prior to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the initial disclosure. If the dispute is not resolved on an informal basis within ten days of
`
`
`
`
`
`
`
`
`
`
`
`
`
`receipt of such notice of objections, the supplier shall submit immediately each objection to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`administrative law judge for a ruling. If the investigation is before the Commission the matter
`
`
`
`
`
`
`
`
`
`
`
`
`
`shall be submitted to the Commission for resolution. The submission of such confidential
`
`
`
`
`
`
`
`
`
`·business information to such proposed expert shall be withheld pending the ruling of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commission or the administrative law judge. The terms of this paragraph shall be inapplicable
`
`
`
`
`
`
`
`
`
`
`
`to experts within the Commission or to experts from other governmental agencies who are
`
`
`
`
`
`
`
`
`
`
`
`consulted with or used by the Commission.
`
`
`
`
`
`12.If confidential business information submitted in accordance with paragraph 2 is
`
`
`
`
`
`
`
`
`
`
`
`disclosed to any person other than in the manner authorized by this protective order, the party
`
`
`
`
`
`
`
`
`
`
`
`responsible for the disclosure must immediately bring all pertinent facts relating to such
`
`
`
`
`
`
`
`
`
`disclosure to the attention of the supplier and the administrative law judge and, without prejudice
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to other rtghts and remedies of the supplier, make every effort to prevent further disclosure by it
`
`
`
`
`
`or by the person who was the recipient of such information.
`
`
`
`7
`
`Page 7 of 26
`
`
`
`
`
`
`
`13.Nothing in this order shall abridge the right of any person to seek judicial review or
`
`
`
`
`
`
`
`
`
`by the Commission, to any ruling made judicial action with respect to pursue other appropriate
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`its Freedom of Information Act Officer, or the administrative law judge concerning the issue of
`
`
`
`
`
`
`
`
`
`the status of confidential business information.
`
`
`
`
`
`
`
`
`
`
`
`14.Upon final termination of this investigation, each party that is subject to this order
`
`
`
`shall assemble and return to the supplier all items containing confidential business information
`
`
`
`
`
`
`
`
`
`
`
`submitted in accordance with paragraph 2 above, including all copies of such matter which may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`have been made. Alternatively, the parties subject to this order may, with the written consent of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the supplier; destroy all items containing confidential business information and certify to the
`
`
`
`
`
`
`
`
`
`
`
`supplier ( or his counsel) that such destruction has taken place. This paragraph shall not apply to
`
`
`
`
`
`
`
`
`
`
`
`the Commission, including its investigative attorney, and the Administrative Law Judge, which
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`shall retain such material pursuant to statutory requirements and for other recordkeeping
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purposes, but may destroy such material (including electronic media containing such
`
`
`
`
`
`
`
`
`
`information) in its possession which it regards as surplusage.
`
`
`
`Notwithstanding the above paragraph, confidential business information may be
`
`
`
`
`
`
`
`
`
`
`
`transmitted to a district court pursuant to Commission Rule 210.5( c ).
`
`
`
`
`
`
`
`
`
`
`
`
`
`within accordance 15.If any confidential business information which is supplied
`
`
`
`
`
`
`
`
`
`paragraph 2 above is supplied by a nonparty to this investigation, such a nonparty shall be
`
`
`
`
`
`
`
`
`
`considered a "supplier" as that term is used in the context of this order.
`
`
`
`
`
`
`
`16.Each nonparty supplier shall be provided a copy of this order by the party seeking
`
`
`
`
`
`
`
`information from said supplier.
`
`
`
`
`
`
`
`
`
`17.Confidential Source Code shall mean human-readable programming language text
`
`
`
`
`
`
`
`
`
`
`
`that defines software, firmware, microcode, or electronic hardware descriptions. Confidential
`
`
`
`
`
`8
`
`Page 8 of 26
`
`
`
`
`
`
`
`Source Code includes, without limitation, computer code; scripts; assembly; object code; source
`
`
`
`
`
`
`
`
`
`
`
`
`
`code listings and descriptions of source code; object code listings and descriptions of object code
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(i.e., computer instructions and data definitions expressed in a form suitable for input to an
`
`
`
`
`
`
`
`
`
`
`
`
`
`assembler, compiler, or other translator); Hardware Description Language (HDL); Register
`
`
`
`
`
`
`
`
`
`Transfer Level (RTL) files that describe the hardware design of any ASIC or other chip;
`
`
`
`
`
`
`
`
`
`
`
`
`
`similarly sensitive implementation details; files containing text written in "C," "C++,"
`
`
`
`
`
`
`
`
`
`
`
`
`
`assembler, VHDL, Verilog, and digital signal processor (DSP) programming languages; Matlab
`
`
`
`
`
`
`
`
`
`
`
`
`
`code or other signal processing simulation code; "include files"; "make" files; link files; diffs
`
`
`
`
`
`
`
`
`
`and other human-readable text files used in the generation and/or building of software executed
`
`
`
`
`
`
`
`
`
`
`
`
`
`on a microprocessor, microcontroller, or DSP (e.g., programmer notes, annotations, and other
`
`
`
`
`
`
`
`
`
`
`
`comments of any type related-thereto and accompanying the code). For avoidance of doubt, this
`
`
`
`
`
`
`
`
`
`
`
`includes source files, make files, intermediate output files, executable files, header files, resource
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`files, library files, module definition files, map files, object files, linker files, browse info files,
`
`
`
`
`
`
`
`
`
`and debug files. Confidential Source Code is a form of, and shall be afforded all of the same
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protections as, confidential business information as defined in paragraph 1 hereto unless
`
`
`
`
`
`
`
`otherwise provided in paragraphs 17-28. The restrictions herein on Confidential Source Code do
`
`
`
`
`
`
`
`
`
`not apply to publicly-available source code available as open source code. The parties to this
`
`
`
`
`
`
`
`
`
`
`
`
`
`Investigation and any third parties producing
`
`
`
`
`or voluntarily C:onfidential Source Code, either
`
`
`
`
`
`
`
`
`
`pursuant to a subpoena, are entitled to the protections provided herein.
`
`
`
`18.To the extent that a party wishes to obtain access to Confidential Source Code, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`following procedures may apply at the option of the producing party. Nothing in this Order shall
`
`
`
`
`
`Source Code is or admission by a party that Confidential be construed as a representation
`
`
`
`
`
`
`
`
`
`properly
`
`
`
`
`
`discoverable in this action, or to obligate any party to produce Confidential Source
`
`
`
`9
`
`Page 9 of 26
`
`
`
`
`
`
`
`
`
`
`
`
`
`Code. To the extent production of Confidential Source Code becomes necessary to the
`
`
`
`prosecution or defense of the case, the producing party may designate Confidential Source Code
`
`
`
`
`
`
`
`as "[PRODUCING PARTY's NAME] CONFIDENTIAL SOURCE CODE, OUTSIDE
`
`
`
`
`
`ATTORNEYS' EYES ONLY, SUBJECT TO PROTECTIVE ORDER."
`
`
`
`
`
`
`
`
`
`
`
`
`
`19.Unless otherwise ordered by the Administrative Law Judge, Confidential Source
`
`
`
`
`
`
`
`
`
`Code designated as "[PRODUCING PARTY'S NAME] CONFIDENTIAL SOURCE CODE,
`
`
`
`OUTSIDE ATTORNEYS' EYES ONLY, SUBJECT TO PROTECTIVE ORDER" shall be
`
`
`
`
`
`
`
`subject to the provisions set forth in paragraphs 17 to 28, and may be disclosed, subject to
`
`
`
`
`
`
`
`
`
`
`
`paragraphs 17 to 28, solely to:
`
`
`
`(a)outside counsel representing the parties to this Investigation, as defined in paragraph
`
`
`
`
`
`
`
`
`
`
`
`
`
`3(i), including necessary secretarial and support personnel regularly employed by and assisting
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such counsel, except that, unless otherwise agreed, no outside counsel who is involved in
`
`
`
`
`
`
`
`
`
`
`
`
`
`competitive decision-making of a party or a third party ( excluding said counsel's law firm), as
`
`
`
`
`
`
`
`
`
`defined by In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373, 1378 (Fed. Cir. 2010), shall
`
`
`
`
`
`
`
`
`
`have access to Confidential Source Code designated as "[PRODUCING PARTY'S NAME]
`
`
`
`
`
`
`
`
`
`CONFIDENTIAL SOURCE CODE, OUTSIDE ATTORNEYS' EYES ONLY, SUBJECT TO
`
`
`
`
`
`PROTECTIVE ORDER";
`
`
`
`
`
`
`
`
`
`
`
`(b)personnel at interpretation/translation service establishments retained by, but not
`
`
`
`regularly employed by, outside counsel as necessarily incident to the litigation of this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Investigation, including without limitation oral interpreters and document translators;
`
`
`
`
`
`
`
`
`
`
`
`( c)any outside expert or consultant retained by a party for the purposes of this
`
`
`
`
`
`
`
`
`
`
`
`Investigation and who satisfies paragraph 3(iii) of this Order, provided that disclosure is only to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the extent necessary to perform such work; and provided that: (i) such expert or consultant has
`
`
`
`
`
`
`
`
`
`10
`
`Page 10 of 26
`
`
`
`
`
`agreed to be bound by the provisions of this Order as required by paragraphs 3, 4, and 11 of this
`
`
`
`
`
`
`
`
`
`
`
`Order, (ii) such expert or consultant is not involved in competitive decision-making, as defined
`
`
`
`
`
`
`
`
`
`
`
`by In re Deutsche Bank, 605 F .3d at 13 78, on behalf of a party or a competitor of a party in the
`
`
`
`
`
`
`
`technical subject matter of the confidential business information produced, and (iii) no
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`unresolved objections to such disclosure exist after proper notice has been given to all parties as
`
`
`
`
`
`
`
`
`
`set forth in paragraphs 3, 4, and 11 of this Order;
`
`
`
`
`
`( d)court reporters, stenographers, and videographers retained to record testimony taken
`
`
`
`
`
`
`
`
`
`
`
`in this Investigation, provided that such court reporters, stenographers, and videographers have
`
`
`
`
`
`
`
`
`
`
`
`agreed to be bound by the provisions of this Order;
`
`
`
`
`
`(e)the Commission, the Administrative Law Judge, the Commission Investigative Staff,
`
`
`
`
`
`
`
`
`
`
`
`and personnel of any governmental agency as authorized by the Commission;
`
`
`
`
`
`
`
`
`
`
`
`(f)the Commission, its employees, and contract personnel who ·are acting in the capacity
`
`
`
`of Commission employees, for developing or maintaining the records of this Investigation or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`related proceedings for which this information is submitted, or in internal audits and
`
`
`
`
`
`
`
`investigations relating\\o the programs and operations of the Commission pursuant to 5 U.S.C.
`
`
`
`
`
`
`
`
`
`Appendix 3;
`
`
`
`
`
`
`
`
`
`
`
`(g)any non-parties who are witnesses during a deposition, court hearing, or trial where
`
`
`
`
`
`
`
`
`
`
`
`
`
`specific documentary or testimonial evidence establishes at that time that the Confidential Source
`
`
`
`
`
`
`
`Code or portion of the Confidential Source Code was authored or received by the witness
`
`
`
`
`
`
`
`
`
`without any violation of any confidentiality obligation owed to any party in this Investigation;
`
`
`
`
`
`
`
`
`
`(h)any mediator who is assigned to hear this matter, and his or her staff, subject to their
`
`
`
`
`
`
`
`
`
`agreement to maintain confidentiality to the same degree as required by this Order;
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(i)any other person with the prior written consent of the producing party; and
`
`11
`
`Page 11 of 26
`
`
`
`
`
`
`
`G)a producing party's own employees, 30(b)(6) witnesses, or expert witnesses.
`
`
`
`
`
`
`
`
`
`
`
`
`
`20.The following provisions apply to the production of Confidential Source Code that is
`
`
`
`
`
`
`
`designated "[PRODUCING PARTY'S NAME]CONFIDENTIAL SOURCE CODE, OUTSIDE
`
`
`
`
`
`
`
`
`
`ATTORNEYS' EYES ONLY, SUBJECT TO PROTECTIVE ORDER," unless otherwise agreed
`
`
`
`
`
`
`
`by the producing party:
`
`
`
`(a)All Confidential Source Code shall be made available by the producing party to the
`
`
`
`
`
`
`
`
`
`. receiving party in a secure room on at least one secured, reasonably current stand-alone
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`computer in Washington, D.C., running a reasonably current version of the Microsoft Windows
`
`
`
`
`
`
`
`
`
`. operating system, MA COS, or Unix and with reasonably sufficient RAM and other resources
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and without Internet access or network access to other computers, and all access ports on which
`
`
`
`
`
`
`
`
`
`have been disabled except one port for the printer referred to in paragraph 20(h) hereof, as
`
`
`
`
`
`
`
`
`
`
`
`
`
`necessary and appropriate to prevent and protect against any unauthorized copying, transmission,
`
`
`
`
`
`
`
`
`
`
`
`removal, or other transfer of any Confidential Source Code outside or away from the computer
`
`
`
`
`
`
`
`
`
`
`
`on which the Confidential Source Code is provided for inspection (hereinafter "Confidential
`
`
`
`
`
`
`
`
`
`Source Code Computer"). If it should be necessary, the Confidential Source Code Computer may
`
`
`
`
`
`
`
`
`
`
`
`be configured by the producing party to run other mutually agreed upon operating systems. No
`
`
`
`
`
`
`
`
`
`
`
`more than a total of 15 individuals identified by the receiving party shall have access to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`secure room in which the producing party produced its Confidential Source Code. If additional
`
`
`
`
`
`
`
`
`
`individuals from the receiving party-beyond 15-require access to the secure room, for the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`review of Confidential Source Code belonging to the producing party, access will be granted
`
`
`
`
`
`
`
`upon a reasonable and justifiable request.
`
`
`
`
`
`(b)The producing party shall install tools that are sufficient for viewing and searching
`
`
`
`
`
`
`
`the code produced, on the platform produced, if such tools exist and are presently used in the
`
`
`
`
`
`
`
`12
`
`Page 12 of 26
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ordinary course of the producing party's business. The receiving party's outside counsel,
`
`
`
`
`
`
`
`
`
`experts, and/or consultants may request that commercially available software tools for viewing
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and searching Confidential Source Code be installed on the secured computer, provided,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`however, that such other software tools are reasonably necessary for the receiving party to
`
`
`
`
`
`perform its review of the Confidential Source Code consistent with all of the protections herein.
`
`
`
`
`
`
`
`
`
`Specific tools may include: SciTools Understand, Notepad++, Beyond Compare, XCode tools,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Visual Slick Edit, Source-Navigator, PowerGrep, ExamDiffPro, Matlab, Simulink, or Sigasi, or
`
`
`
`
`
`
`
`
`
`
`
`other similar programs. Additional tools for review of the Confidential Source Code may be
`
`
`
`
`
`
`
`
`
`
`
`used by the receiving party provided the producing party agrees and good cause is shown. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`receiving party must provide the producing party with the CD or DVD containing such licensed
`
`
`
`
`
`
`
`software tool(s) at least two (2) days in advance of the date upon which the receiving party
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wishes to have the additional software tools available for use on the Confidential Source Code
`
`
`
`Computer.
`
`
`
`(c)The producing party shall make the Confidential Source Code available electronically
`
`
`
`
`
`
`
`and in native form or the form that it is kept in the normal course of business in a secure room at
`
`
`
`
`
`
`
`
`
`the offices of the producing party's outside counsel or any other location mutually agreed by the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`parties.
`
`
`
`
`
`( d)In order to verify that its Confidential Source Code has not later been altered, the
`
`
`
`producing party may benchmark the materials to confirm that the materials have not been altered
`
`
`
`
`
`
`
`
`
`
`
`before and after they are ·provided but shall not install any keystroke or other monitoring
`
`
`
`
`
`
`
`
`
`software on the Confidential Source Code Computer.
`
`
`
`
`
`
`
`(e)The Confidential Source Code Computer shall be made available from 9:00 a.m. to
`
`
`
`
`
`
`
`6:00 p.m. local time, Monday through Friday (excluding holidays), and other days and/or times,
`
`
`
`
`
`
`
`
`
`13
`
`Page 13 of 26
`
`
`
`
`
`
`
`including weekends, upon reasonable request until the conclusion of the hearing in this
`
`
`
`
`
`
`
`
`
`
`
`Investigation. The receiving party shall provide at least two (2) business days' notice to access
`
`
`
`
`
`
`
`
`
`
`
`
`
`the source code. Beginning one week prior to the beginning of trial and continuing through the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`end of trial, if requested in advance, access to Confidential Source Code shall be provided, under
`
`
`
`
`
`
`
`
`
`
`
`the same conditions and with the same limitations and restrictions as provided in Paragraphs 1 7-
`
`
`
`
`
`
`
`
`
`28 of this Order, in Washington, D.C.
`
`
`
`(f)With respect to any outside expert or consultant retained by a party for the purposes of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`this Investigation and who satisfies paragraph 3(iii) of this Order, prior to the first inspection of
`
`
`
`
`
`
`
`
`
`
`
`
`
`any Confidential Source Code, or disclosure of print-outs of Confidential Source Code provided
`
`
`
`
`
`
`
`
`
`
`
`in accordance with paragraph 20(h), the requesting party shall provide ten (10) days' notice that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such outside expert or consultant intends to inspect or review Confidential Source Code. If an
`
`
`
`objection
`
`
`
`
`
`
`
`
`
`to an outside expert or consultant is made by the producing party, it will be the burden
`
`
`
`
`
`of the producing party to prove that the individual should not be authorized to inspect the
`
`
`
`
`
`
`
`
`
`
`
`producing party's Confidential Source Code.
`
`
`
`
`
`
`
`
`
`(g)Proper identification of all authorized persons shall be provided prior to any access to
`
`
`
`
`
`
`
`
`
`
`
`the secure room or the Confidential Source Code Computer. Proper identification requires
`
`
`
`
`
`
`
`
`
`
`
`
`
`showing, at a minimum, a photo identification card sanctioned by the government of any State of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the United States, by the government of the United States, or by the nation state of the authorized
`
`
`
`
`
`
`
`person's current citizenship. Access to the secure room or the Confidential Source Code
`
`
`
`
`
`
`
`
`
`
`
`
`
`Computer may be denied, at the discretion of the producing party, to any individual who fails to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`provide proper identification.
`
`
`
`
`
`(h)The Confidential Source Code Computer shall be equipped with a high-speed laser
`
`
`
`
`
`
`
`
`
`printer (with tommercially reasonable printing speeds) to print copies of the Confidential Source
`
`
`
`
`
`
`
`
`
`
`
`
`
`14
`
`Page 14 of 26
`
`
`
`
`
`Code on watermarked pre-Bates numbered paper, which shall be provided by the producing
`
`
`
`
`
`
`
`
`
`
`
`party. The receiving party may print limited portions of the Confidential Source Code only when
`
`
`
`
`
`
`
`
`
`
`
`
`
`reasonably necessary to facilitate the receiving party's preparation of filings with the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Administrative Law Judge or Commission, expert reports, and hearing exhibits, and shall print
`
`
`
`
`
`
`
`
`
`
`
`only such portions as are relevant to the claims and defenses in the case and are reasonably
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`necessary for such purpose. The receiving party shall not print Confidential Source Code in
`
`
`
`
`
`
`
`
`
`order to review blocks of Confidential Source Code elsewhere in the first instance, i.e., as an
`
`
`
`
`
`
`
`
`
`alternative to reviewing that Confidential Source Code electronically on the Confidential Source
`
`
`
`
`
`
`
`
`
`
`
`Code Computer, as the.parties acknowledge and agree that the purpose of the protections herein
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`would be frustrated by printing portions of code for review and analysis elsewhere. If the
`
`
`
`
`
`
`
`producing party objects that the printed portions are excessive and/or not done for a permitted
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, the producing party shall make such objection known to the receiving party within five
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(5)days. Printed portions which exceed 50