LAUREL BEELER, Magistrate Judge.
This litigation centers around allegations by plaintiff Synopsys, Inc. that the defendants used counterfeit license keys to install and use Synopsys software on their computers without a valid license. Synopsys bases its allegations in large part on so-called "call-home data." Synopsys has alleged that its software "calls home" whenever it is used without a valid license key and transmits information about the computer running the software back to Synopsys. Synopsys has alleged that its call-home data here shows that the defendants accessed Synopsys software more than 39,000 times without a valid license key. Defendant Ubiquiti Networks, Inc. ("Ubiquiti") asserts that Synopsys's call-home data is vastly overinflating the number of alleged circumventions.
Synopsys has provided Ubiquiti with access to certain source code for its software, including source code for its license-management system, for electronic inspection at its counsel's office in California. Synopsys and Ubiquiti raise a dispute about whether Synopsys should be required to produce printouts of its source code for Ubiquiti's expert witnesses.
The court starts with a few preliminary matters. First, the parties' joint letter brief was filed as a "Letter" on ECF, not as a discovery letter brief. For internal administrative purposes, discovery letter briefs must be filed under the Civil Events category of "Motions and Related Filings > Motions — General > Discovery Letter Brief."
Second, Synopsys raises a complaint about the joint-letter-briefing process.
With those preliminary matters dispensed with, the court now turns to the merits of the parties' dispute.
There does not appear to be any dispute regarding electronic access to Synopsys's source code: Synopsys states, and Ubiquiti does not dispute, that "[a]ll of the code at issue has already been produced" for electronic review at Synopsys's counsel's office.
The parties' Stipulated Protective Order provides that a party "may request paper copies of limited portions of information designated as HIGHLY CONFIDENTIAL — SOURCE CODE . . . that are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial, but shall not request paper or electronic copies for the purposes of reviewing the HIGHLY CONFIDENTIAL — SOURCE CODE . . . other than electronically as set forth in paragraph (c) in the first instance."
At least one court has held that even where an expert has conducted an initial electronic source-code review and states that source code is necessary for his or her expert report, it may be appropriate in some circumstances to require the expert to conduct a second electronic review so that he or she can further limit the scope of his or her requests, before a court orders production of source-code printouts. Imageware Sys., Inc. v. Fulcrum Biometrics, LLC, No. 13CV936-DMS(JMA), 2014 WL 12489939, at *1 (S.D. Cal. Nov. 26, 2014).
Here, Ubiquiti, as the requesting party, bears the burden of persuasion that source-code printouts are "reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial." The court finds it has not met its burden. With respect to expert reports, Ubiquiti's expert, Stuart Stubblebine, does not attest that source-code printouts (as opposed to reviewing the source code) are reasonably necessary for him to prepare his expert report. Dr. Stubblebine does not appear to have conducted an initial electronic review of the source code at issue in the first instance.
Ubiquiti argues that it is unreasonable to require Dr. Stubblebine to travel to Synopsys's counsel's office in California to electronically inspect Synopsys's source code.
The cases that Ubiquiti does cite are inapposite. Linex Tech Inc. v. Hewlett Packard Co., No. C 13-1820909 (N.D. Cal. Apr. 30, 2013), OpenTV, Inc. v. Apple, Inc., No. 14-cv-01622-JST (KAW), 2014 WL 5079343 (N.D. Cal. Oct 9, 2014), TVIIM, LLC v. McAfee, Inc., No. 13-cv-04545-VC (KAW), 2014 U.S. Dist. LEXIS 113104 (N.D. Cal. Aug. 14, 2014), and Kelora Systems, LLC v. Target Corp., No. C 11-01548 CW (LB), 2011 WL 6000759 (N.D. Cal. Aug. 29, 2011), concerned disputes about what sort of protective order a court should enter in the first instance (including, in some instances, disputes about whether the protective order should contain specific limits on the amount of source-code printouts a party could request). That is not the issue here. The parties are not negotiating a protective order. They have already stipulated to a protective order, which the court has entered. The court is now applying the parties' stipulated Protective Order pursuant to its terms.
For the foregoing reasons, the court declines to order Synopsys to produce printouts of the source code in question. This denial is without prejudice to a future request for source-code printouts, upon a proper showing that such printouts "are reasonably necessary for the preparation of court filings, pleadings, expert reports, or other papers, or for deposition or trial."