throbber
UNITED STATES INTERNATIONALTRADE COMMISSION
`
`Washington, D.C.
`
`In the Matter of
`
`CERTAIN ROAD MILLING
`MACHINES AND COMPONENTS
`THEREOF
`
`Inv. No. 337-TA-1067
`
`
`
`Order No. 8: AMENDED PROTECTIVE ORDER
`
`
`
`WHEREAS, documents and information may be sought, produced or exhibited by and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`among the parties to the above captioned proceeding, which materials relate to trade secrets or
`
`
`
`
`
`
`
`other confidential research, development or commercial information, as such terms are used in
`
`
`
`
`
`
`
`
`
`
`
`
`
`the Commission's Rules, 19 C.F.R. 210.5;
`
`IT IS HEREBY ORDERED THAT:
`
`
`
`1.Confidential business information is information which has not been made public and
`
`
`
`
`
`
`
`
`
`
`
`
`
`which concerns or relates to the trade secrets, processes, operations, style of work, or apparatus,
`
`
`
`
`
`
`
`
`
`or to the production, sales, shipments, purchases, transfers, identification of customers,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inventories, amount or source of any income, profits, losses, or expenditures of any person, firm,
`
`
`
`
`
`
`
`partnership, corporation, or other organization, the disclosure of which information is likely to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`have the effect of either (i) irnpairing the Commission's ability to obtain such information as is
`
`
`
`
`
`
`
`necessary to perform its statutory functions; or (ii) causing substantial harm to the competitive
`
`
`
`
`
`
`
`
`
`
`
`
`
`frpm which the
`
`position of the person, firm, partnership, corporation, or other organization
`
`
`
`
`
`
`
`
`
`
`
`information was obtained, unless the Commission is required by law to disclose such
`
`
`
`information.
`
`Page 1 of 26
`
`
`
`
`CATERPILLAR EXHIBIT 1153
`CATERPILLAR v. WIRTGEN
`IPR2017-02188
`
`

`

`
`
`
`
`2.(a) Any information submitted, in prehearing discovery or in a pleading, motion, or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`response to a motion either voluntarily or pursuant to order, in this investigation, which is
`
`
`
`
`
`asserted by a supplier to contain or constitute confidential business information shall be so
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`designated by such supplier in writing, or orally at a deposition, conference or hearing, and shall
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be segregated from other information being submitted. Documents shall be clearly and
`
`
`
`
`
`
`
`prominently marked on their face with the legend: "[supplier's name] CONFIDENTIAL
`
`
`
`
`
`
`
`BUSINESS INFORMATION, SUBJECT TO PROTECTIVE ORDER," or a comparable notice.
`
`
`
`
`
`
`
`
`
`
`
`During the prehearing phase of this investigation, such information whether submitted in writing
`
`
`
`
`
`
`
`
`
`
`
`
`
`or in oral testimony shall be disclosed only in camera before the Commission or the
`
`
`
`administrative law judge.
`
`
`
`(b)The administrative law judge or the Commission may determine that information
`
`
`
`
`
`
`
`
`
`alleged to be confidential is not confidential, or that its disclo_sure is necessary for the proper
`
`
`
`
`
`
`
`
`
`disposition of the proceeding, before, during or after the close of a hearing herein. If such a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`determination is made by the administrative law judge or the Commission, opportunity shall be
`
`
`
`
`
`
`
`provided to the supplier of such information to argue its confidentiality prior to the time of such
`
`
`
`
`
`
`
`ruling.
`
`
`
`3.In the absence of written permission from the supplier or an order by the Commission
`
`
`
`
`
`
`
`
`
`or the administrative law judge, any confidential documents �r business information submitted in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accordance with the provisions of paragraph 2 above shall not be disclosed to any person other
`
`
`
`
`
`
`
`than:. (i) outside counsel for parties to this investigation, including necessary secretarial and
`
`
`
`
`
`
`
`
`
`
`
`support personnel assisting such counsel; (ii) qualified persons taking testimony involving such
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`documents or information and necessary stenographic and clerical personnel thereof; (iii)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`technical experts and their staff who are employed for the purposes of this litigation (unless they
`
`
`
`2
`
`Page 2 of 26
`
`

`

`
`
`are otherwise employed by, consultants to, or otherwise affiliated with a non-governmental
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`party, or are employees of any domestic or foreign manufacturer, wholesaler, retailer, or
`
`
`
`
`
`
`
`
`
`distributor of certain road milling machines and components thereof, which are the subject of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`law judge, the Commission staff, and this investigation); (iv) the Commission, the administrative
`
`
`
`
`
`
`
`personnel of any governmental agency as authorized by the Commission; and (v) the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commission, its employees and Offices, and contract personnel (a) for developing or
`
`
`
`
`
`
`
`
`
`
`
`
`
`maintaining the records of this or a related proceeding, or (b) in internal investigations, audits,
`
`
`
`
`
`
`
`reviews, and evaluations relating to the programs, personnel, and operations of the Commission
`
`
`
`
`
`
`
`
`
`
`
`including under 5 U.S.C. Appendix 3; and (vi) U.S. government employees and contract
`
`
`
`
`
`
`
`
`
`personnel, solely for cybersecurity purposes.
`
`l
`
`
`
`
`
`
`
`
`
`4.Confidential business information submitted in accordance with the provisions of
`
`
`
`
`
`
`
`
`
`
`
`
`
`paragraph 2 above shall not be made available to any person designated in paragraph 3(i) and
`
`
`
`
`
`
`
`
`
`
`
`•. (iii) unless he or she shall have first read this order and shall have agreed, by letter filed with the
`
`
`
`
`
`
`
`
`
`Secretary of this Commission: (i) to be bound by the terms thereof; (ii) not to reveal such
`
`
`
`
`
`
`
`
`
`
`
`confidential business information to anyone other than another person designated in paragraph 3;
`
`
`
`
`
`
`
`
`
`
`
`
`
`and (iii) to utilize such confidential business information solely for purposes of this investigation.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The letter shall also include the following acknowledgement:
`
`2
`
`
`
`I, the undersigned, on behalf of __ , acknowledge that information submitted
`
`
`
`
`
`
`
`
`
`
`
`for purposes of this Investigation may be disclosed to and used:
`
`
`
`(i)by the Commission, its employees and Offices, and contract personnel (a) for
`
`
`
`
`
`
`
`
`
`
`developing or maintaining the records of this or a related proceeding, or (b) in
`
`
`
`
`
`internal investigations, audits, reviews, and evaluations relating to the programs,
`
`
`
`
`
`personnel, and operations of the Commission including under 5 U.S.C. Appendix
`3; or
`
`1
`
`
`
`See Commission Administrative Order 16-01 (Nov. 7, 2015).
`
`
`
`2
`See id.
`
`3
`
`Page 3 of 26
`
`

`

`(ii)by U.S. government employees and contract personnel, solely for
`
`
`
`
`
`
`
`
`cybersecurity purposes. I understand that all contract personnel will sign
`appropriate nondisclosure agreements.
`
`
`
`
`
`
`
`5.If the Commission or the administrative law judge orders, or if the supplier and all
`
`
`
`
`
`
`
`
`
`parties to the investigation agree, that access to, or dissemination of information submitted as
`
`
`
`
`
`
`
`
`
`
`
`confidential business information shall be made to persons not included in paragraph 3 above,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such matter shall only be accessible to, or disseminated to, such persons based upon the
`
`
`
`
`
`
`
`conditions pertaining to, and obligations arising from this order, and such persons shall be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`considered subject to it, unless the Commission or the administrative law judge finds that the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information is not confidential business information as defined in paragraph 1 hereof.
`
`
`
`
`
`6.(a) Any confidential business information submitted to the Commission or the
`
`
`
`
`
`
`
`
`
`
`
`administrative law judge in connection with a motion or other proceeding within the purview of
`
`
`
`
`
`
`
`
`
`
`
`this investigation shall be submitted under seal pursuant to paragraph 2 above. Any portion of a
`
`
`
`
`
`
`
`
`
`
`
`
`
`transcript in connection with this investigation containing any confidential business information
`
`
`
`
`
`
`
`
`
`
`
`submitted pursuant to paragraph 2 above shall be bound separately and filed under seal. When
`
`
`
`
`
`
`
`
`
`any confidential business information submitted in accordance with paragraph 2 above is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`included in an authorize_d transcript of a deposition or exhibits thereto, arrangements shall be
`
`
`
`
`
`
`
`
`
`and portions to bind such confidential made with the court reporter taking the deposition
`
`
`
`
`
`
`
`
`
`separately label them "[supplier's name], CONFIDENTIAL BUSINESS INFORMATION,
`
`
`
`
`
`
`
`
`
`SUBJECT TO PROTECTIVE ORDER." Before a court reporter receives any such information,
`
`
`
`
`
`
`
`to be bound by the terms he or she shall have first read this order and shall have agreed in writing
`
`
`
`
`
`thereof. Alternatively, he or she shall sign the agreement included as Attachment A hereto.
`
`
`
`
`
`
`
`
`
`
`
`of such confidential to the supplier shall be provided Copies of each such signed agreement
`
`
`
`
`
`
`
`
`
`business information and the Secretary of the Commission.
`
`
`
`
`
`4
`
`Page 4 of 26
`
`

`

`
`
`
`
`
`
`
`
`
`
`(b)Submitters are strongly encouraged to encrypt nonpublic documents that are
`
`
`
`
`
`
`
`electronically transmitted to the Commission to protect your sensitive information from
`
`
`
`
`
`
`
`
`
`
`
`
`
`unauthorized disclosure. The USITC secure drop-box system and the El,ectronic Document
`
`
`
`
`
`
`
`
`
`Information System (EDIS) use Federal Information Processing Standards (FIPS) 140-2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cryptographic algorithms to encrypt data in transit. Submitting your nonpublic documents by a
`
`
`
`
`
`means that does not use these encryption algorithms (such as by email) may subject your firm's
`
`
`
`
`
`
`
`
`
`nonpublic information to unauthorized disclosure during transmission. If you choose a non­
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encrypted method of electronic transmission, the Commission warns you that the risk of such
`
`
`
`
`
`3
`possible unauthorized disclosure is assumed by you and not by the Commission.
`
`
`
`
`
`
`
`
`
`
`
`7.The restrictions upon, and obligations accruing to, persons who become subject to this
`
`
`
`
`
`
`
`
`
`
`
`order shall not apply to any information submitted in accordance with paragraph 2 above to
`
`
`
`
`
`
`
`
`
`which the person asserting the confidential status thereof agrees in writing, or the Commission or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the administrative law judge rules, after an opportunity for hearing, was publicly known at the
`
`
`
`
`
`
`
`
`
`
`
`time it was supplied to the receiving party or has since become publicly known through no fault
`
`
`
`of the receiving party.
`
`
`
`
`
`
`
`8.The Commission, the administrative law judge, and the Commission investigative
`
`
`
`attorney acknowledge that any document or information submitted as confidential business
`
`
`
`
`
`
`
`
`
`
`
`
`
`information pursuant to paragraph 2 above is to be treated as such within the meaning of 5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S:C. § 552(b )( 4) and 18 U.S.C. § 1905, subject to a contrary ruling, after hearing, by the
`
`
`
`
`
`
`
`
`
`Commission or its Freedom oflnformation Act Officer, or the administrative law judge.
`
`
`
`
`
`
`
`9.Unless a designation of confidentiality has been withdrawn, or a determination has
`
`
`
`
`
`
`
`
`
`
`
`
`
`been made by the Commission or the administrative law judge that information designated as
`
`
`
`
`
`
`
`
`
`confidential, is no longer confidential, the Commission, the administrative law judge, and the
`
`
`
`
`
`
`
`
`
`3 See id.
`
`5
`
`Page 5 of 26
`
`

`

`
`
`
`
`
`
`Commission investigative attorney shall take all necessary and proper steps to preserve the
`
`
`
`
`
`
`
`
`
`confidentiality of, and to protect each supplier's rights with respect to, any confidential business
`
`
`
`
`
`
`
`
`
`
`
`information
`
`
`
`
`
`designated by the supplier in accordance with paragraph 2 above, including, without
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`limitation: (a) notifying the supplier promptly of (i) any inquiry or request by anyone for the
`
`
`
`
`
`
`
`substance of or access of such confidential business information, other than those authorized
`
`
`
`
`
`
`
`
`
`pursuant to this order, under the Freedom oflnformation Act, as amended (5 U.S.C. § 552) and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(ii)any proposal to declassify or make public any such confidential business information; and (b)
`
`
`
`
`
`
`
`providing
`
`
`
`
`
`the supplier at least seven days after receipt of such inquiry or request within which to
`
`
`
`
`
`
`
`
`
`
`
`take action before the Commission, its Freedom of Information Act Officer, or the administrative
`
`
`
`
`
`
`
`
`
`
`
`law judge, or otherwise to preserve the confidentiality of and to protect its rights in, and to, such
`
`
`
`
`
`
`
`
`
`
`
`-confidential business information.
`
`
`
`10.If while an investigation is before the administrative law judge, a party to this order
`
`
`
`
`
`
`
`
`
`
`
`
`
`who is to be a recipient of any business information designated as confidential and submitted in
`
`
`
`
`
`
`
`
`
`accordance with paragraph 2, disagrees with respect to such a designation, in full or in part, it
`
`
`
`
`
`
`
`
`
`
`
`shall notify the supplier in writing, and they will thereupon confer as to the status of the subject
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information proffered within the context of this order. If prior to, or at the time of such a
`
`
`
`
`
`
`
`
`
`
`
`
`
`conference, the supplier withdraws its designation of such information as being subject to this
`
`
`
`
`
`order, but nonetheless submits such information for purposes of the investigation, such supplier
`
`
`
`
`
`
`
`
`
`
`
`
`
`shall express the withdrawal, in writing, and serve such withdrawal upon all parties and the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`administrative law judge. If the recipient and supplier are unable to concur upon the status of the
`
`
`
`
`
`
`
`subject information submitted as confidential business information within ten days from the date
`
`
`
`
`
`
`
`
`
`
`
`
`
`of notification of such disagreement, any party to this order may raise the issue of the
`
`
`
`
`
`
`
`
`
`designation of such a status to the administrative law judge who will rule upon the matter. The
`
`
`
`
`
`6
`
`Page 6 of 26
`
`

`

`
`
`
`
`administrative law judge may sua sponte question the designation of the confidential status of
`
`
`
`
`
`
`
`
`
`
`
`any information and, after opportunity for hearing, may remove the confidentiality designation.
`
`
`
`
`
`
`
`
`
`11.No less than 10 days (or any other period of time designated by the administrative
`
`
`
`
`
`
`
`law judge) prior to the initial disclosure to a proposed expert of any confidential information
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`submitted in accordance with paragraph 2, the party proposing to use such expert shall submit in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`writing the name of such proposed expert and his or her educational and employment history to
`
`
`
`
`
`
`
`
`
`the supplier. If the supplier objects to the disclosure of such confidential business information to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such proposed expert as inconsistent with the language or intent of this order or on other
`
`
`
`
`
`
`
`
`
`
`
`grounds, it shall notify the recipient in writing of its objection and the grounds therefor prior to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the initial disclosure. If the dispute is not resolved on an informal basis within ten days of
`
`
`
`
`
`
`
`
`
`
`
`
`
`receipt of such notice of objections, the supplier shall submit immediately each objection to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`administrative law judge for a ruling. If the investigation is before the Commission the matter
`
`
`
`
`
`
`
`
`
`
`
`
`
`shall be submitted to the Commission for resolution. The submission of such confidential
`
`
`
`
`
`
`
`
`
`·business information to such proposed expert shall be withheld pending the ruling of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commission or the administrative law judge. The terms of this paragraph shall be inapplicable
`
`
`
`
`
`
`
`
`
`
`
`to experts within the Commission or to experts from other governmental agencies who are
`
`
`
`
`
`
`
`
`
`
`
`consulted with or used by the Commission.
`
`
`
`
`
`12.If confidential business information submitted in accordance with paragraph 2 is
`
`
`
`
`
`
`
`
`
`
`
`disclosed to any person other than in the manner authorized by this protective order, the party
`
`
`
`
`
`
`
`
`
`
`
`responsible for the disclosure must immediately bring all pertinent facts relating to such
`
`
`
`
`
`
`
`
`
`disclosure to the attention of the supplier and the administrative law judge and, without prejudice
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to other rtghts and remedies of the supplier, make every effort to prevent further disclosure by it
`
`
`
`
`
`or by the person who was the recipient of such information.
`
`
`
`7
`
`Page 7 of 26
`
`

`

`
`
`
`
`13.Nothing in this order shall abridge the right of any person to seek judicial review or
`
`
`
`
`
`
`
`
`
`by the Commission, to any ruling made judicial action with respect to pursue other appropriate
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`its Freedom of Information Act Officer, or the administrative law judge concerning the issue of
`
`
`
`
`
`
`
`
`
`the status of confidential business information.
`
`
`
`
`
`
`
`
`
`
`
`14.Upon final termination of this investigation, each party that is subject to this order
`
`
`
`shall assemble and return to the supplier all items containing confidential business information
`
`
`
`
`
`
`
`
`
`
`
`submitted in accordance with paragraph 2 above, including all copies of such matter which may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`have been made. Alternatively, the parties subject to this order may, with the written consent of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the supplier; destroy all items containing confidential business information and certify to the
`
`
`
`
`
`
`
`
`
`
`
`supplier ( or his counsel) that such destruction has taken place. This paragraph shall not apply to
`
`
`
`
`
`
`
`
`
`
`
`the Commission, including its investigative attorney, and the Administrative Law Judge, which
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`shall retain such material pursuant to statutory requirements and for other recordkeeping
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purposes, but may destroy such material (including electronic media containing such
`
`
`
`
`
`
`
`
`
`information) in its possession which it regards as surplusage.
`
`
`
`Notwithstanding the above paragraph, confidential business information may be
`
`
`
`
`
`
`
`
`
`
`
`transmitted to a district court pursuant to Commission Rule 210.5( c ).
`
`
`
`
`
`
`
`
`
`
`
`
`
`within accordance 15.If any confidential business information which is supplied
`
`
`
`
`
`
`
`
`
`paragraph 2 above is supplied by a nonparty to this investigation, such a nonparty shall be
`
`
`
`
`
`
`
`
`
`considered a "supplier" as that term is used in the context of this order.
`
`
`
`
`
`
`
`16.Each nonparty supplier shall be provided a copy of this order by the party seeking
`
`
`
`
`
`
`
`information from said supplier.
`
`
`
`
`
`
`
`
`
`17.Confidential Source Code shall mean human-readable programming language text
`
`
`
`
`
`
`
`
`
`
`
`that defines software, firmware, microcode, or electronic hardware descriptions. Confidential
`
`
`
`
`
`8
`
`Page 8 of 26
`
`

`

`
`
`
`
`Source Code includes, without limitation, computer code; scripts; assembly; object code; source
`
`
`
`
`
`
`
`
`
`
`
`
`
`code listings and descriptions of source code; object code listings and descriptions of object code
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(i.e., computer instructions and data definitions expressed in a form suitable for input to an
`
`
`
`
`
`
`
`
`
`
`
`
`
`assembler, compiler, or other translator); Hardware Description Language (HDL); Register
`
`
`
`
`
`
`
`
`
`Transfer Level (RTL) files that describe the hardware design of any ASIC or other chip;
`
`
`
`
`
`
`
`
`
`
`
`
`
`similarly sensitive implementation details; files containing text written in "C," "C++,"
`
`
`
`
`
`
`
`
`
`
`
`
`
`assembler, VHDL, Verilog, and digital signal processor (DSP) programming languages; Matlab
`
`
`
`
`
`
`
`
`
`
`
`
`
`code or other signal processing simulation code; "include files"; "make" files; link files; diffs
`
`
`
`
`
`
`
`
`
`and other human-readable text files used in the generation and/or building of software executed
`
`
`
`
`
`
`
`
`
`
`
`
`
`on a microprocessor, microcontroller, or DSP (e.g., programmer notes, annotations, and other
`
`
`
`
`
`
`
`
`
`
`
`comments of any type related-thereto and accompanying the code). For avoidance of doubt, this
`
`
`
`
`
`
`
`
`
`
`
`includes source files, make files, intermediate output files, executable files, header files, resource
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`files, library files, module definition files, map files, object files, linker files, browse info files,
`
`
`
`
`
`
`
`
`
`and debug files. Confidential Source Code is a form of, and shall be afforded all of the same
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protections as, confidential business information as defined in paragraph 1 hereto unless
`
`
`
`
`
`
`
`otherwise provided in paragraphs 17-28. The restrictions herein on Confidential Source Code do
`
`
`
`
`
`
`
`
`
`not apply to publicly-available source code available as open source code. The parties to this
`
`
`
`
`
`
`
`
`
`
`
`
`
`Investigation and any third parties producing
`
`
`
`
`or voluntarily C:onfidential Source Code, either
`
`
`
`
`
`
`
`
`
`pursuant to a subpoena, are entitled to the protections provided herein.
`
`
`
`18.To the extent that a party wishes to obtain access to Confidential Source Code, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`following procedures may apply at the option of the producing party. Nothing in this Order shall
`
`
`
`
`
`Source Code is or admission by a party that Confidential be construed as a representation
`
`
`
`
`
`
`
`
`
`properly
`
`
`
`
`
`discoverable in this action, or to obligate any party to produce Confidential Source
`
`
`
`9
`
`Page 9 of 26
`
`

`

`
`
`
`
`
`
`
`
`
`
`Code. To the extent production of Confidential Source Code becomes necessary to the
`
`
`
`prosecution or defense of the case, the producing party may designate Confidential Source Code
`
`
`
`
`
`
`
`as "[PRODUCING PARTY's NAME] CONFIDENTIAL SOURCE CODE, OUTSIDE
`
`
`
`
`
`ATTORNEYS' EYES ONLY, SUBJECT TO PROTECTIVE ORDER."
`
`
`
`
`
`
`
`
`
`
`
`
`
`19.Unless otherwise ordered by the Administrative Law Judge, Confidential Source
`
`
`
`
`
`
`
`
`
`Code designated as "[PRODUCING PARTY'S NAME] CONFIDENTIAL SOURCE CODE,
`
`
`
`OUTSIDE ATTORNEYS' EYES ONLY, SUBJECT TO PROTECTIVE ORDER" shall be
`
`
`
`
`
`
`
`subject to the provisions set forth in paragraphs 17 to 28, and may be disclosed, subject to
`
`
`
`
`
`
`
`
`
`
`
`paragraphs 17 to 28, solely to:
`
`
`
`(a)outside counsel representing the parties to this Investigation, as defined in paragraph
`
`
`
`
`
`
`
`
`
`
`
`
`
`3(i), including necessary secretarial and support personnel regularly employed by and assisting
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such counsel, except that, unless otherwise agreed, no outside counsel who is involved in
`
`
`
`
`
`
`
`
`
`
`
`
`
`competitive decision-making of a party or a third party ( excluding said counsel's law firm), as
`
`
`
`
`
`
`
`
`
`defined by In re Deutsche Bank Trust Co. Americas, 605 F.3d 1373, 1378 (Fed. Cir. 2010), shall
`
`
`
`
`
`
`
`
`
`have access to Confidential Source Code designated as "[PRODUCING PARTY'S NAME]
`
`
`
`
`
`
`
`
`
`CONFIDENTIAL SOURCE CODE, OUTSIDE ATTORNEYS' EYES ONLY, SUBJECT TO
`
`
`
`
`
`PROTECTIVE ORDER";
`
`
`
`
`
`
`
`
`
`
`
`(b)personnel at interpretation/translation service establishments retained by, but not
`
`
`
`regularly employed by, outside counsel as necessarily incident to the litigation of this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Investigation, including without limitation oral interpreters and document translators;
`
`
`
`
`
`
`
`
`
`
`
`( c)any outside expert or consultant retained by a party for the purposes of this
`
`
`
`
`
`
`
`
`
`
`
`Investigation and who satisfies paragraph 3(iii) of this Order, provided that disclosure is only to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the extent necessary to perform such work; and provided that: (i) such expert or consultant has
`
`
`
`
`
`
`
`
`
`10
`
`Page 10 of 26
`
`

`

`
`
`agreed to be bound by the provisions of this Order as required by paragraphs 3, 4, and 11 of this
`
`
`
`
`
`
`
`
`
`
`
`Order, (ii) such expert or consultant is not involved in competitive decision-making, as defined
`
`
`
`
`
`
`
`
`
`
`
`by In re Deutsche Bank, 605 F .3d at 13 78, on behalf of a party or a competitor of a party in the
`
`
`
`
`
`
`
`technical subject matter of the confidential business information produced, and (iii) no
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`unresolved objections to such disclosure exist after proper notice has been given to all parties as
`
`
`
`
`
`
`
`
`
`set forth in paragraphs 3, 4, and 11 of this Order;
`
`
`
`
`
`( d)court reporters, stenographers, and videographers retained to record testimony taken
`
`
`
`
`
`
`
`
`
`
`
`in this Investigation, provided that such court reporters, stenographers, and videographers have
`
`
`
`
`
`
`
`
`
`
`
`agreed to be bound by the provisions of this Order;
`
`
`
`
`
`(e)the Commission, the Administrative Law Judge, the Commission Investigative Staff,
`
`
`
`
`
`
`
`
`
`
`
`and personnel of any governmental agency as authorized by the Commission;
`
`
`
`
`
`
`
`
`
`
`
`(f)the Commission, its employees, and contract personnel who ·are acting in the capacity
`
`
`
`of Commission employees, for developing or maintaining the records of this Investigation or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`related proceedings for which this information is submitted, or in internal audits and
`
`
`
`
`
`
`
`investigations relating\\o the programs and operations of the Commission pursuant to 5 U.S.C.
`
`
`
`
`
`
`
`
`
`Appendix 3;
`
`
`
`
`
`
`
`
`
`
`
`(g)any non-parties who are witnesses during a deposition, court hearing, or trial where
`
`
`
`
`
`
`
`
`
`
`
`
`
`specific documentary or testimonial evidence establishes at that time that the Confidential Source
`
`
`
`
`
`
`
`Code or portion of the Confidential Source Code was authored or received by the witness
`
`
`
`
`
`
`
`
`
`without any violation of any confidentiality obligation owed to any party in this Investigation;
`
`
`
`
`
`
`
`
`
`(h)any mediator who is assigned to hear this matter, and his or her staff, subject to their
`
`
`
`
`
`
`
`
`
`agreement to maintain confidentiality to the same degree as required by this Order;
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(i)any other person with the prior written consent of the producing party; and
`
`11
`
`Page 11 of 26
`
`

`

`
`
`
`
`G)a producing party's own employees, 30(b)(6) witnesses, or expert witnesses.
`
`
`
`
`
`
`
`
`
`
`
`
`
`20.The following provisions apply to the production of Confidential Source Code that is
`
`
`
`
`
`
`
`designated "[PRODUCING PARTY'S NAME]CONFIDENTIAL SOURCE CODE, OUTSIDE
`
`
`
`
`
`
`
`
`
`ATTORNEYS' EYES ONLY, SUBJECT TO PROTECTIVE ORDER," unless otherwise agreed
`
`
`
`
`
`
`
`by the producing party:
`
`
`
`(a)All Confidential Source Code shall be made available by the producing party to the
`
`
`
`
`
`
`
`
`
`. receiving party in a secure room on at least one secured, reasonably current stand-alone
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`computer in Washington, D.C., running a reasonably current version of the Microsoft Windows
`
`
`
`
`
`
`
`
`
`. operating system, MA COS, or Unix and with reasonably sufficient RAM and other resources
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and without Internet access or network access to other computers, and all access ports on which
`
`
`
`
`
`
`
`
`
`have been disabled except one port for the printer referred to in paragraph 20(h) hereof, as
`
`
`
`
`
`
`
`
`
`
`
`
`
`necessary and appropriate to prevent and protect against any unauthorized copying, transmission,
`
`
`
`
`
`
`
`
`
`
`
`removal, or other transfer of any Confidential Source Code outside or away from the computer
`
`
`
`
`
`
`
`
`
`
`
`on which the Confidential Source Code is provided for inspection (hereinafter "Confidential
`
`
`
`
`
`
`
`
`
`Source Code Computer"). If it should be necessary, the Confidential Source Code Computer may
`
`
`
`
`
`
`
`
`
`
`
`be configured by the producing party to run other mutually agreed upon operating systems. No
`
`
`
`
`
`
`
`
`
`
`
`more than a total of 15 individuals identified by the receiving party shall have access to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`secure room in which the producing party produced its Confidential Source Code. If additional
`
`
`
`
`
`
`
`
`
`individuals from the receiving party-beyond 15-require access to the secure room, for the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`review of Confidential Source Code belonging to the producing party, access will be granted
`
`
`
`
`
`
`
`upon a reasonable and justifiable request.
`
`
`
`
`
`(b)The producing party shall install tools that are sufficient for viewing and searching
`
`
`
`
`
`
`
`the code produced, on the platform produced, if such tools exist and are presently used in the
`
`
`
`
`
`
`
`12
`
`Page 12 of 26
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`ordinary course of the producing party's business. The receiving party's outside counsel,
`
`
`
`
`
`
`
`
`
`experts, and/or consultants may request that commercially available software tools for viewing
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and searching Confidential Source Code be installed on the secured computer, provided,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`however, that such other software tools are reasonably necessary for the receiving party to
`
`
`
`
`
`perform its review of the Confidential Source Code consistent with all of the protections herein.
`
`
`
`
`
`
`
`
`
`Specific tools may include: SciTools Understand, Notepad++, Beyond Compare, XCode tools,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Visual Slick Edit, Source-Navigator, PowerGrep, ExamDiffPro, Matlab, Simulink, or Sigasi, or
`
`
`
`
`
`
`
`
`
`
`
`other similar programs. Additional tools for review of the Confidential Source Code may be
`
`
`
`
`
`
`
`
`
`
`
`used by the receiving party provided the producing party agrees and good cause is shown. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`receiving party must provide the producing party with the CD or DVD containing such licensed
`
`
`
`
`
`
`
`software tool(s) at least two (2) days in advance of the date upon which the receiving party
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wishes to have the additional software tools available for use on the Confidential Source Code
`
`
`
`Computer.
`
`
`
`(c)The producing party shall make the Confidential Source Code available electronically
`
`
`
`
`
`
`
`and in native form or the form that it is kept in the normal course of business in a secure room at
`
`
`
`
`
`
`
`
`
`the offices of the producing party's outside counsel or any other location mutually agreed by the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`parties.
`
`
`
`
`
`( d)In order to verify that its Confidential Source Code has not later been altered, the
`
`
`
`producing party may benchmark the materials to confirm that the materials have not been altered
`
`
`
`
`
`
`
`
`
`
`
`before and after they are ·provided but shall not install any keystroke or other monitoring
`
`
`
`
`
`
`
`
`
`software on the Confidential Source Code Computer.
`
`
`
`
`
`
`
`(e)The Confidential Source Code Computer shall be made available from 9:00 a.m. to
`
`
`
`
`
`
`
`6:00 p.m. local time, Monday through Friday (excluding holidays), and other days and/or times,
`
`
`
`
`
`
`
`
`
`13
`
`Page 13 of 26
`
`

`

`
`
`
`
`including weekends, upon reasonable request until the conclusion of the hearing in this
`
`
`
`
`
`
`
`
`
`
`
`Investigation. The receiving party shall provide at least two (2) business days' notice to access
`
`
`
`
`
`
`
`
`
`
`
`
`
`the source code. Beginning one week prior to the beginning of trial and continuing through the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`end of trial, if requested in advance, access to Confidential Source Code shall be provided, under
`
`
`
`
`
`
`
`
`
`
`
`the same conditions and with the same limitations and restrictions as provided in Paragraphs 1 7-
`
`
`
`
`
`
`
`
`
`28 of this Order, in Washington, D.C.
`
`
`
`(f)With respect to any outside expert or consultant retained by a party for the purposes of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`this Investigation and who satisfies paragraph 3(iii) of this Order, prior to the first inspection of
`
`
`
`
`
`
`
`
`
`
`
`
`
`any Confidential Source Code, or disclosure of print-outs of Confidential Source Code provided
`
`
`
`
`
`
`
`
`
`
`
`in accordance with paragraph 20(h), the requesting party shall provide ten (10) days' notice that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such outside expert or consultant intends to inspect or review Confidential Source Code. If an
`
`
`
`objection
`
`
`
`
`
`
`
`
`
`to an outside expert or consultant is made by the producing party, it will be the burden
`
`
`
`
`
`of the producing party to prove that the individual should not be authorized to inspect the
`
`
`
`
`
`
`
`
`
`
`
`producing party's Confidential Source Code.
`
`
`
`
`
`
`
`
`
`(g)Proper identification of all authorized persons shall be provided prior to any access to
`
`
`
`
`
`
`
`
`
`
`
`the secure room or the Confidential Source Code Computer. Proper identification requires
`
`
`
`
`
`
`
`
`
`
`
`
`
`showing, at a minimum, a photo identification card sanctioned by the government of any State of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the United States, by the government of the United States, or by the nation state of the authorized
`
`
`
`
`
`
`
`person's current citizenship. Access to the secure room or the Confidential Source Code
`
`
`
`
`
`
`
`
`
`
`
`
`
`Computer may be denied, at the discretion of the producing party, to any individual who fails to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`provide proper identification.
`
`
`
`
`
`(h)The Confidential Source Code Computer shall be equipped with a high-speed laser
`
`
`
`
`
`
`
`
`
`printer (with tommercially reasonable printing speeds) to print copies of the Confidential Source
`
`
`
`
`
`
`
`
`
`
`
`
`
`14
`
`Page 14 of 26
`
`

`

`
`
`Code on watermarked pre-Bates numbered paper, which shall be provided by the producing
`
`
`
`
`
`
`
`
`
`
`
`party. The receiving party may print limited portions of the Confidential Source Code only when
`
`
`
`
`
`
`
`
`
`
`
`
`
`reasonably necessary to facilitate the receiving party's preparation of filings with the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Administrative Law Judge or Commission, expert reports, and hearing exhibits, and shall print
`
`
`
`
`
`
`
`
`
`
`
`only such portions as are relevant to the claims and defenses in the case and are reasonably
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`necessary for such purpose. The receiving party shall not print Confidential Source Code in
`
`
`
`
`
`
`
`
`
`order to review blocks of Confidential Source Code elsewhere in the first instance, i.e., as an
`
`
`
`
`
`
`
`
`
`alternative to reviewing that Confidential Source Code electronically on the Confidential Source
`
`
`
`
`
`
`
`
`
`
`
`Code Computer, as the.parties acknowledge and agree that the purpose of the protections herein
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`would be frustrated by printing portions of code for review and analysis elsewhere. If the
`
`
`
`
`
`
`
`producing party objects that the printed portions are excessive and/or not done for a permitted
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, the producing party shall make such objection known to the receiving party within five
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(5)days. Printed portions which exceed 50

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket