DONNA M. RYU, Magistrate Judge.
The parties filed a joint discovery letter in this patent case. [Docket No. 391.] Defendant Mentor Graphics Corporation contends that Plaintiff Synopsys, Inc's treatment of Mentor's source code violated the parties' Stipulated Protective Order ("PO"). Mentor moves for sanctions. For the reasons stated below, Mentor's motion is
The court begins by describing the protective order which gives rise to Mentor's motion for sanctions. See Docket No. 146.
Section 10 of the PO governs the treatment of source code in this litigation. Section 10(a) controls source code that is produced to a receiving party. It provides that electronic copies of source code may only be kept on certain encrypted, password-protected, non-networked computers, and prohibits the emailing or ftp (file transfer protocol) transfer of source code. PO §§ 10(a)(ii), where a party makes its source code available for review. Section 10(b) requires that the source code be made "available for inspection on a secured computer in a secured room without Internet access or network access to other computers. . . ." PO § 10(b)(i). "[T]he Receiving Party shall not copy, remove, or otherwise transfer any portion of the source code onto any recordable media or recordable device. The Designating Party may visually monitor the activities of the Receiving Party's representatives during any source code review, but only to ensure that there is no unauthorized recording, copying, or transmission of the source code." Id.
Section 10(b)(v) provides that after inspecting the source code, the reviewing party can request paper copies of source code for particular uses: "[t]he Receiving Party may request paper copies of limited portions of source code that are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial, but shall not request paper copies for the purpose of reviewing the source code ... in the first instance." PO § 10(b)(v). "The Designating Party may challenge the amount of source code requested in hard copy form." Id.
Section 10(b)(vi) prohibits conversion of paper copies of source code into any electronic format. "The Receiving Party shall not create any electronic or other images of the paper copies and shall not convert any of the information contained in the paper copies into any electronic format. The Receiving Party shall only make additional paper copies if such additional copies are (1) necessary to prepare court filings, pleadings, or other papers (including a testifying expert's expert report), (2) necessary for deposition, or (3) otherwise necessary for the preparation of its case." PO § 10(b)(vi).
Synopsys' expert on patent infringement is Dr. Shawn Blanton. On September 5, 2014, Synopsys served Dr. Blanton's reply expert report on Mentor. Exhibit 24 to that report included 171 lines of Mentor's source code. The 171 lines were not consecutive: the longest sequential excerpt was 68 lines long, but the majority of the excerpts contained 7 lines of consecutive code or fewer.
After Mentor realized that it had never provided paper copies of the 171 lines of code to Synopsys, Mentor asked Synopsys how it had acquired them. Synopsys explained that its agent Adel Assaad, who was one of the individuals permitted to inspect the source code, had taken typed verbatim notes of the source code during one of his inspection sessions. Mr. Assaad then provided the notes to Dr. Blanton during a WebEx
Mentor contends that by having Mr. Assaad type verbatim excerpts of source code into his notes, and then by sharing that source code via WebEx, Synopsys violated three provisions of the PO: Section 10(b)(i), Section 10(b)(vi), and Section 10(a)(iv).
Mentor argues that Synopsys violated Section 10(b)(i), which states that a party inspecting the source code "shall not copy, remove, or otherwise transfer any portion of the source code onto any recordable media or recordable device" or "record[], copy[], or transmi[t] . . . the source code." According to Mentor, Mr. Assaad's act of typing lines of source code into his notes constitutes "copying" or "transferring" the source code onto recordable media.
Synopsys counters that typing lines of source code into notes does not constitute "copying" or "transferring." See Thayer Decl. [Docket No. 439] at ¶ 44 (the term "copy" in the context of source code means "hooking up a computer and copying electronically, or scanning, the code"). In fact, according to Synopsys, the PO contemplates that an inspector must be able to type excerpts of code into his or her notes. Since the PO prohibits a party from requesting paper copies of source code for the purpose of performing original analysis, see PO § 10(b)(v), the reviewing party must analyze source code during the inspection. Synopsys contends that Mr. Assaad was doing exactly that when he typed the disputed lines of source code into his notes. Synopsys further explains that because Mentor provided paper copies of source code without the line numbers that are visible during electronic inspection, "it would have been difficult if not impossible ... to request paper copies of source code and then connect those paper copies back to the electronic code that was analyzed during inspection unless the expert typed up excerpts of the code to memorialize his analysis." Letter at 7.
There is some sense in Synopsys' position. The restrictions imposed on the party inspecting the source code (i.e., requiring analysis during inspection, placing limits on the place and time of inspection) could lead the inspector to take detailed notes in order to memorialize his or her analysis and to be able to locate the relevant source code in the paper copies. Thus, it is plausible to read Section 10(b)(i)'s restrictions on copying or transferring code as permitting an inspector to incorporate at least some source code into his or her review notes.
However, Synopsys' argument goes too far. The PO's prohibition against "copying" source code onto recordable media surely must prohibit extensive typing of the source code into one's notes. At the hearing, Synopsys' counsel Phil Woo admitted as much. Synopsys does not explain why it was reasonable to copy 171 lines of code, including 68 consecutive ones. At the hearing, Synopsys' counsel stated that prior to September 5, 2014, Mr. Assaad had never needed to copy more than 20 lines of source code into his notes, but found it necessary to do so on that day because of the volume of source code that had to be analyzed in the small time period between the submission of Mentor's expert report and the due date for Dr. Blanton's reply report. But Synopsys' urgent need for source code does not justify the act of copying large blocks of source code under the PO. Thus, the court concludes that Mr. Assaad's act of capturing 171 lines of source code, including 68 sequential lines, constitutes "copying" source code in violation of Section 10(b)(i) of the PO.
Mentor contends that Synopsys also violated Section 10(b)(vi) and Section 10(a)(iv) of the PO. These sections place tight restrictions on the storage and transmission of source code. Paper copies of source code made available for inspection must be stored in a secured, locked area, and may not be converted into any electronic format. PO § 10(b)(vi). Electronic copies of source code produced to a receiving party must be encrypted, viewed only on a non-networked computer, and must not be emailed or stored in an Internet-accessible location for any period of time. Section 10(a)(iv).
To begin with, Section 10(a)(iv) does not apply here, as it governs source code that is produced directly to a party, rather than produced for review by a party. Turning to Section 10(b)(vi), it states that "[t]he Receiving Party shall not create any electronic or other images of the paper copies and shall not convert any of the information contained in the paper copies into any electronic format." This section does not clearly encompass Mr. Assaad's act of typing source code into notes and then converting them into a format viewable via WebEx. This is because Section 10(b)(vi) controls paper copies, and Mr. Assaad's notes were not "paper copies" under the PO.
However, even if Synopsys' behavior did not violate the letter of Section 10(b)(vi), it violated its spirit. Synopsys made no attempt to request paper copies of the 171 lines of code prior to submitting Dr. Blanton's reply report.
Mentor seeks the following relief for Synopsys' violation of the PO: (1) to withdraw its approval of Mr. Assaad and Dr. Blanton
Rule 37 authorizes the imposition of various sanctions for discovery violations, including a party's failure to obey a court order to provide or permit discovery, Fed. R. Civ. P. 37(b)(2)(A), but Mentor does not contend that Synopsys' violation of the PO falls within any of the grounds for sanctions under Rule 37. The PO itself provides for some remedies in the event of improper disclosure of protected materials, but the remedies requested by Mentor go beyond what the PO authorizes. See PO § 15 (if any protected material is disclosed in a manner not authorized by the PO, the disclosing party "shall immediately take all reasonable efforts to prevent further disclosure by each unauthorized person who received such information, and shall immediately require each unauthorized person to return all Protected Material ..., all copies ..., and all documents containing excerpts from or references to the improperly disclosed Protected Material"). In addition, a court may use its inherent power to impose sanctions for discovery abuses that may not be a technical violation of the discovery rules, Halaco Eng'g Co. v. Costle, 843 F.2d 376, 380 (9th Cir. 1988), though "such powers are to be used carefully." Banga v. Experian Info. Solutions, No. C-08-4147 SBA (EMC), 2009 WL 2407419, at *1 (N.D. Cal. Aug. 4, 2009) (citing Chambers v. NASCO, Inc., 501 U.S. 32, 44-45 (1991) ("Because of their very potency, inherent powers must be exercised with restraint and discretion. A primary aspect of that discretion is the ability to fashion an appropriate sanction for conduct which abuses the judicial process.")).
The court now invokes its inherent authority in making determinations regarding Mentor's motion for sanctions. The remedies sought by Mentor are disproportionate to the transgression. Mentor has not explained what prejudice it has suffered as a result of Synopsys' violation. Mentor admits that all of the individuals who had access to the source code typed into Mr. Assaad's notes had permission to access Mentor's source code. Mentor also concedes the relevance of the source code, admits that it would have produced paper copies of the source code in Exhibit 24 had Synopsys requested it, and in fact later provided paper copies of that source code. Synopsys argues that the sanctions sought by Mentor would amount to terminating sanctions, because Dr. Blanton is Mentor's only expert on infringement. Mentor generally does not explain how the sanctions it seeks would serve to restore Mentor.
On the other hand, Synopsys' violation of the PO is a serious matter that should not go unaddressed. At the hearing, the court required Synopsys' lead outside counsel to file a declaration explaining the circumstances under which the 171 lines of source code were copied and transmitted, and the actions of each individual involved in that process. Synopsys' lead counsel filed the declaration. See Thayer Decl. According to Synopsys, its attorneys advised Mr. Assaad that he could "take notes as needed for his analysis" and both Synopsys' attorneys and Mr. Assaad "had a good faith belief that typing notes including limited fragments of source code into his laptop as necessary to prepare the expert reports would not violate Section 10(b)(i)." Id. at ¶ 44. However, "[n]one of Synopsys' attorneys or Dr. Blanton told Mr. Assaad that he should limit the number of sequential lines of code that he excerpted into his laptop to no more than a certain number." Id. at ¶ 47. As discussed above, it may be the case that Section 10(b)(i) permits the inspector to copy "limited fragments" of source code into reviewer notes, but the copying that occurred in the present circumstances went well beyond "limited fragments." Having reviewed the declaration, the court finds that Synopsys' attorneys at the law firm of Sidley Austin LLP permitted actions that violated the PO by failing to adequately train and supervise individuals regarding the requirements of the PO. The court admonishes those attorneys.
Synopsys is also ordered to destroy all electronic copies of source code, as well as notes containing more than ten sequential lines of source code.
While the court concludes that it is in inappropriate to preclude Dr. Blanton from testifying at trial on any topic related to Mentor's confidential information, the court agrees that it is appropriate for Mentor to withdraw its approval of Mr. Assaad to view any of Mentor's confidential information, including source code and Mr. Assaad's own notes. However, Mentor shall not unreasonably withhold approval of a replacement for Mr. Assaad as an individual authorized to review source code pursuant to the PO.
Mentor's motion for sanctions is