Elawyers Elawyers
Washington| Change

SYNOPSYS INC. v. MENTOR GRAPHICS CORP., C-12-06467-MMC (DMR). (2015)

Court: District Court, N.D. California Number: infdco20150603888 Visitors: 5
Filed: Jun. 02, 2015
Latest Update: Jun. 02, 2015
Summary: ORDER RE: JOINT DISCOVERY LETTER [DOCKET NO. 391]; MOTION TO SEAL [DOCKET NO. 438] DONNA M. RYU , Magistrate Judge . The parties filed a joint discovery letter in this patent case. [Docket No. 391.] Defendant Mentor Graphics Corporation contends that Plaintiff Synopsys, Inc's treatment of Mentor's source code violated the parties' Stipulated Protective Order ("PO"). Mentor moves for sanctions. For the reasons stated below, Mentor's motion is granted in part and denied in part I. PROTECTI
More

ORDER RE: JOINT DISCOVERY LETTER [DOCKET NO. 391]; MOTION TO SEAL [DOCKET NO. 438]

The parties filed a joint discovery letter in this patent case. [Docket No. 391.] Defendant Mentor Graphics Corporation contends that Plaintiff Synopsys, Inc's treatment of Mentor's source code violated the parties' Stipulated Protective Order ("PO"). Mentor moves for sanctions. For the reasons stated below, Mentor's motion is granted in part and denied in part

I. PROTECTIVE ORDER

The court begins by describing the protective order which gives rise to Mentor's motion for sanctions. See Docket No. 146.

Section 10 of the PO governs the treatment of source code in this litigation. Section 10(a) controls source code that is produced to a receiving party. It provides that electronic copies of source code may only be kept on certain encrypted, password-protected, non-networked computers, and prohibits the emailing or ftp (file transfer protocol) transfer of source code. PO §§ 10(a)(ii), where a party makes its source code available for review. Section 10(b) requires that the source code be made "available for inspection on a secured computer in a secured room without Internet access or network access to other computers. . . ." PO § 10(b)(i). "[T]he Receiving Party shall not copy, remove, or otherwise transfer any portion of the source code onto any recordable media or recordable device. The Designating Party may visually monitor the activities of the Receiving Party's representatives during any source code review, but only to ensure that there is no unauthorized recording, copying, or transmission of the source code." Id.

Section 10(b)(v) provides that after inspecting the source code, the reviewing party can request paper copies of source code for particular uses: "[t]he Receiving Party may request paper copies of limited portions of source code that are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial, but shall not request paper copies for the purpose of reviewing the source code ... in the first instance." PO § 10(b)(v). "The Designating Party may challenge the amount of source code requested in hard copy form." Id.

Section 10(b)(vi) prohibits conversion of paper copies of source code into any electronic format. "The Receiving Party shall not create any electronic or other images of the paper copies and shall not convert any of the information contained in the paper copies into any electronic format. The Receiving Party shall only make additional paper copies if such additional copies are (1) necessary to prepare court filings, pleadings, or other papers (including a testifying expert's expert report), (2) necessary for deposition, or (3) otherwise necessary for the preparation of its case." PO § 10(b)(vi).

II. FACTUAL BACKGROUND

Synopsys' expert on patent infringement is Dr. Shawn Blanton. On September 5, 2014, Synopsys served Dr. Blanton's reply expert report on Mentor. Exhibit 24 to that report included 171 lines of Mentor's source code. The 171 lines were not consecutive: the longest sequential excerpt was 68 lines long, but the majority of the excerpts contained 7 lines of consecutive code or fewer.

After Mentor realized that it had never provided paper copies of the 171 lines of code to Synopsys, Mentor asked Synopsys how it had acquired them. Synopsys explained that its agent Adel Assaad, who was one of the individuals permitted to inspect the source code, had taken typed verbatim notes of the source code during one of his inspection sessions. Mr. Assaad then provided the notes to Dr. Blanton during a WebEx1 session for which Synopsys attorney Aseem Gupta was also present.

III. DISCUSSION

Mentor contends that by having Mr. Assaad type verbatim excerpts of source code into his notes, and then by sharing that source code via WebEx, Synopsys violated three provisions of the PO: Section 10(b)(i), Section 10(b)(vi), and Section 10(a)(iv).2

A. Section 10(b)(i)

Mentor argues that Synopsys violated Section 10(b)(i), which states that a party inspecting the source code "shall not copy, remove, or otherwise transfer any portion of the source code onto any recordable media or recordable device" or "record[], copy[], or transmi[t] . . . the source code." According to Mentor, Mr. Assaad's act of typing lines of source code into his notes constitutes "copying" or "transferring" the source code onto recordable media.

Synopsys counters that typing lines of source code into notes does not constitute "copying" or "transferring." See Thayer Decl. [Docket No. 439] at ¶ 44 (the term "copy" in the context of source code means "hooking up a computer and copying electronically, or scanning, the code"). In fact, according to Synopsys, the PO contemplates that an inspector must be able to type excerpts of code into his or her notes. Since the PO prohibits a party from requesting paper copies of source code for the purpose of performing original analysis, see PO § 10(b)(v), the reviewing party must analyze source code during the inspection. Synopsys contends that Mr. Assaad was doing exactly that when he typed the disputed lines of source code into his notes. Synopsys further explains that because Mentor provided paper copies of source code without the line numbers that are visible during electronic inspection, "it would have been difficult if not impossible ... to request paper copies of source code and then connect those paper copies back to the electronic code that was analyzed during inspection unless the expert typed up excerpts of the code to memorialize his analysis." Letter at 7.

There is some sense in Synopsys' position. The restrictions imposed on the party inspecting the source code (i.e., requiring analysis during inspection, placing limits on the place and time of inspection) could lead the inspector to take detailed notes in order to memorialize his or her analysis and to be able to locate the relevant source code in the paper copies. Thus, it is plausible to read Section 10(b)(i)'s restrictions on copying or transferring code as permitting an inspector to incorporate at least some source code into his or her review notes.

However, Synopsys' argument goes too far. The PO's prohibition against "copying" source code onto recordable media surely must prohibit extensive typing of the source code into one's notes. At the hearing, Synopsys' counsel Phil Woo admitted as much. Synopsys does not explain why it was reasonable to copy 171 lines of code, including 68 consecutive ones. At the hearing, Synopsys' counsel stated that prior to September 5, 2014, Mr. Assaad had never needed to copy more than 20 lines of source code into his notes, but found it necessary to do so on that day because of the volume of source code that had to be analyzed in the small time period between the submission of Mentor's expert report and the due date for Dr. Blanton's reply report. But Synopsys' urgent need for source code does not justify the act of copying large blocks of source code under the PO. Thus, the court concludes that Mr. Assaad's act of capturing 171 lines of source code, including 68 sequential lines, constitutes "copying" source code in violation of Section 10(b)(i) of the PO.

B. Section 10(b)(vi) and Section 10(a)(iv)

Mentor contends that Synopsys also violated Section 10(b)(vi) and Section 10(a)(iv) of the PO. These sections place tight restrictions on the storage and transmission of source code. Paper copies of source code made available for inspection must be stored in a secured, locked area, and may not be converted into any electronic format. PO § 10(b)(vi). Electronic copies of source code produced to a receiving party must be encrypted, viewed only on a non-networked computer, and must not be emailed or stored in an Internet-accessible location for any period of time. Section 10(a)(iv).

To begin with, Section 10(a)(iv) does not apply here, as it governs source code that is produced directly to a party, rather than produced for review by a party. Turning to Section 10(b)(vi), it states that "[t]he Receiving Party shall not create any electronic or other images of the paper copies and shall not convert any of the information contained in the paper copies into any electronic format." This section does not clearly encompass Mr. Assaad's act of typing source code into notes and then converting them into a format viewable via WebEx. This is because Section 10(b)(vi) controls paper copies, and Mr. Assaad's notes were not "paper copies" under the PO.

However, even if Synopsys' behavior did not violate the letter of Section 10(b)(vi), it violated its spirit. Synopsys made no attempt to request paper copies of the 171 lines of code prior to submitting Dr. Blanton's reply report.3 Instead, it side-stepped the process by having Mr. Assaad type large amounts of code into his notes. Had Synopsys received paper copies of source code, Synopsys would have been prohibited from using them in an online conference, for the PO does not permit conversion of paper copies of source code into an electronic format such as a document viewable during a WebEx session.4 By skirting the process for requesting paper copies, Synopsys essentially bypassed the provisions of the PO which would have prevented the conversion of those paper copies into a WebEx document. Under these circumstances, conversion of Mr. Assaad's notes into a WebEx transmission is as inappropriate as a similar conversion of paper copies. Therefore, Synopsys violated Section 10(b)(vi) of the PO when it converted significant amounts of source code in Mr. Assaad's notes into an electronic format viewable on WebEx.

C. Remedies

Mentor seeks the following relief for Synopsys' violation of the PO: (1) to withdraw its approval of Mr. Assaad and Dr. Blanton5 to view any of Mentor's confidential information, including source code and "previously-taken notes" (presumably Mr. Assaad and Dr. Blanton's own notes); (2) to preclude Dr. Blanton from testifying at trial on any topic related to Mentor's confidential information; (3) to preclude Aseem Gupta or anyone who was involved with the WebEx transmission from reviewing Mentor's confidential information; (4) to have Synopsys destroy all electronic and typed copies of Mentor's source code. Mentor does not specify the basis for the court's authority to grant these remedies.

Rule 37 authorizes the imposition of various sanctions for discovery violations, including a party's failure to obey a court order to provide or permit discovery, Fed. R. Civ. P. 37(b)(2)(A), but Mentor does not contend that Synopsys' violation of the PO falls within any of the grounds for sanctions under Rule 37. The PO itself provides for some remedies in the event of improper disclosure of protected materials, but the remedies requested by Mentor go beyond what the PO authorizes. See PO § 15 (if any protected material is disclosed in a manner not authorized by the PO, the disclosing party "shall immediately take all reasonable efforts to prevent further disclosure by each unauthorized person who received such information, and shall immediately require each unauthorized person to return all Protected Material ..., all copies ..., and all documents containing excerpts from or references to the improperly disclosed Protected Material"). In addition, a court may use its inherent power to impose sanctions for discovery abuses that may not be a technical violation of the discovery rules, Halaco Eng'g Co. v. Costle, 843 F.2d 376, 380 (9th Cir. 1988), though "such powers are to be used carefully." Banga v. Experian Info. Solutions, No. C-08-4147 SBA (EMC), 2009 WL 2407419, at *1 (N.D. Cal. Aug. 4, 2009) (citing Chambers v. NASCO, Inc., 501 U.S. 32, 44-45 (1991) ("Because of their very potency, inherent powers must be exercised with restraint and discretion. A primary aspect of that discretion is the ability to fashion an appropriate sanction for conduct which abuses the judicial process.")).

The court now invokes its inherent authority in making determinations regarding Mentor's motion for sanctions. The remedies sought by Mentor are disproportionate to the transgression. Mentor has not explained what prejudice it has suffered as a result of Synopsys' violation. Mentor admits that all of the individuals who had access to the source code typed into Mr. Assaad's notes had permission to access Mentor's source code. Mentor also concedes the relevance of the source code, admits that it would have produced paper copies of the source code in Exhibit 24 had Synopsys requested it, and in fact later provided paper copies of that source code. Synopsys argues that the sanctions sought by Mentor would amount to terminating sanctions, because Dr. Blanton is Mentor's only expert on infringement. Mentor generally does not explain how the sanctions it seeks would serve to restore Mentor.6

On the other hand, Synopsys' violation of the PO is a serious matter that should not go unaddressed. At the hearing, the court required Synopsys' lead outside counsel to file a declaration explaining the circumstances under which the 171 lines of source code were copied and transmitted, and the actions of each individual involved in that process. Synopsys' lead counsel filed the declaration. See Thayer Decl. According to Synopsys, its attorneys advised Mr. Assaad that he could "take notes as needed for his analysis" and both Synopsys' attorneys and Mr. Assaad "had a good faith belief that typing notes including limited fragments of source code into his laptop as necessary to prepare the expert reports would not violate Section 10(b)(i)." Id. at ¶ 44. However, "[n]one of Synopsys' attorneys or Dr. Blanton told Mr. Assaad that he should limit the number of sequential lines of code that he excerpted into his laptop to no more than a certain number." Id. at ¶ 47. As discussed above, it may be the case that Section 10(b)(i) permits the inspector to copy "limited fragments" of source code into reviewer notes, but the copying that occurred in the present circumstances went well beyond "limited fragments." Having reviewed the declaration, the court finds that Synopsys' attorneys at the law firm of Sidley Austin LLP permitted actions that violated the PO by failing to adequately train and supervise individuals regarding the requirements of the PO. The court admonishes those attorneys.

Synopsys is also ordered to destroy all electronic copies of source code, as well as notes containing more than ten sequential lines of source code.7 However, Synopsys need not destroy electronic copies of court filings, drafts of court filings, expert reports or draft expert reports if those documents contain source code.

While the court concludes that it is in inappropriate to preclude Dr. Blanton from testifying at trial on any topic related to Mentor's confidential information, the court agrees that it is appropriate for Mentor to withdraw its approval of Mr. Assaad to view any of Mentor's confidential information, including source code and Mr. Assaad's own notes. However, Mentor shall not unreasonably withhold approval of a replacement for Mr. Assaad as an individual authorized to review source code pursuant to the PO.

IV. CONCLUSION

Mentor's motion for sanctions is granted in part and denied in part.8

IT IS SO ORDERED.

FootNotes


1. "WebEx is an online videoconferencing tool that allows users to place documents online for viewing during the videoconference." Letter at 1 n. 3. Mentor describes Synopsys' attorneys' WebEx page as "a publicly-accessible Web page through which anyone may intercept unprotected transmissions," but Synopsys explains that its WebEx page is secured and password-protected, and that WebEx does not save the information for a session once it concludes. Furthermore, Synopsys notes that the ftp site which it used for transferring Dr. Blanton's reply expert report and Exhibit 24 to that report has been deleted so that those documents can no longer be accessed from that location. Letter at 9.
2. Mentor does not assert that Synopsys disclosed the source code to unauthorized individuals, or that Synopsys used the source code for an improper purpose. Mr. Assaad's notes and electronic copies of Exhibit 24 have been in the possession of Mr. Assaad, Dr. Blanton, Aseem Gupta, and Synopsys attorneys Phil Woo and David DeZern. Mentor acknowledges that all of these individuals are authorized to inspect source code pursuant to the PO. Mentor also does not contend that the source code in Exhibit 24 has been used for any purpose other than that which is permitted by the PO. See PO Section 10(b)(vi).
3. Mentor asserts that it would have given Synopsys paper copies of the code if Synopsys had only asked. Indeed, after Synopsys submitted Dr. Blanton's reply report, Synopsys requested paper copies of the 171 lines of source code, which Mentor then provided.
4. As noted above, see supra n. 1, the parties agree that "WebEx is an online videoconferencing tool that allows users to place documents online for viewing during the videoconference."
5. In this lawsuit, Synopsys brings claims for infringement of four patents. See Compl. [Docket No. 1.] On August 1, 2014, Judge Chesney stayed the case as to Synopsys's fourth claim, pending inter partes review of the asserted patent. See Docket No. 215. That stay is ongoing. See Docket No. 446. On January 20, 2015, Judge Chesney granted summary judgment in favor of Mentor on Synopsys's first, second and third claims, finding that those asserted patents were invalid. See Docket No. 442. Synopsys has appealed this determination to the Federal Circuit. See Docket No. 446. Dr. Blanton is offered as Synopsys's expert on infringement. Because questions about infringement remain at issue—for example, they may arise if inter partes review does not resolve Synopsys's fourth claim or if Judge Chesney's summary judgment order is successfully appealed—Dr. Blanton's expert opinions are still potentially meaningful to Synopsys's case.
6. Indeed, given the timing of its sanctions motion, the overreaching nature of the requested relief, and the utter failure to demonstrate any prejudice, Mentor's motion smacks of gamesmanship rather than an attempt to address a real harm.
7. By requiring Synopsys to destroy all notes containing more than ten sequential lines of code, the court is not interpreting the PO to mean that hand-copying or typing source code does not constitute the "copy, remove, or otherwise transfer" of source code as long as it is under ten sequential lines. Instead, the court has chosen ten sequential lines because Synopsys avers that the "vast majority" of the source code copied by Mr. Assaad were seven lines or fewer, Letter at 7, and the court must fashion a remedy that excises Mr. Assaad's illegitimate notes without requiring the destruction of all of his work product.
8. Synopsys has also filed a motion to seal portions of an exhibits to a declaration associated with the joint discovery letter. [Docket No. 438.] Synopsys has provided declaration in support of its motion to seal establishing that the portions sought to be sealed contain confidential and commercially sensitive information that is sealable. See Docket No. 438-1; Civil L.R. 79-5(d), 79-5(e). Accordingly, the motion to seal is granted.
Source:  Leagle

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer