MEMORANDUM OPINION AND ORDER
THIS MATTER comes before the Court on Micron Technology, Inc.’s Motion for Entry of Protective Order, filed May 10, 2012 (Doc. 45)(“Motion”). The Court held a hearing on June 15, 2012. The primary issues are: (i) whether there is good cause to enter a protective order; (ii) whether the Court should require the parties to show good cause each time they seek to desígnate a document as confidential; (iii) whether the Court should require the parties to use Defendant Micron Technology Inc.’s proposed protective order as a basis for the protective order they submit to the Court; (iv) whether the Court should require the parties’ protective order to include a two-tiered designation system for regular confidential documents and attorneys’ eyes only documents; and (v) whether the Court should require each party to notify the other side when their experts are viewing a confidential document and notify the other side what confidential document their expert is viewing. The Court will grant in part and deny in part the Motion seeking a protective order. The Court concludes that Micron Technology has met its burden to show good cause that a protective order is appropriate. The Court will not require the parties to show good cause each time they designate a document as confidential, because such a requirement would be impracticable from a case administration standpoint and would be counterproductive to the
FACTUAL BACKGROUND
There have been two sets of claims asserted in this suit. First, S2 Automation asserts claims against Micron Technology. See Amended Complaint for Breach of Contract, Breach of the Covenant of Good Faith and Fair Dealing, Conversion, Fraudulent Misrepresentation, Negligent Misrepresentation, and Unjust Enrichment, filed April 12, 2012 (Doc. 36)(“Amended Complaint”). Second, Intervenor Micron Semiconductor Israel, Ltd. proposes to assert claims against S2 Automation, S2 Automation Israel, Ltd. (“S2 Israel”), and Yosef Astanovsky. See Counterclaim in Intervention by Micron Semiconductor Israel, Ltd., filed May 3, 2012 (Doc. 42)(“Proposed Counterclaim”).
1. Facts Underlying S2 Automation’s Claims Against Micron Technology.
The Court recites the factual background in this section in the light most favorable to S2 Automation, the plaintiff. “This case arises out of a dispute between the parties involving the operation of a Micron owned computer chip manufacturing facility in Qiryat-Gat, Israel,” which the parties refer to as the “Fab 12” facility. Amended Complaint ¶ 3, at 1. S2 Automation is a New Mexico based company “with its principal place of business in Sandoval County, New Mexico.” Amended Complaint ¶ 1, at 1. It “provide[s] goods and services associated with chip manufacturing processes to Intel Corporation” for Intel’s facilities at various locations throughout the world. Amended Complaint ¶ 6, at 2. Intel previously owned the Fab 12 facility. See Amended Complaint ¶ 8, at 2. In 2008, “Intel sold their Fab 12 production facility to Numonyx.” Amended Complaint ¶ 9, at 2. “In July 2008, S2 [Automation] entered in to a supplier agreement called the Total Spares Management Agreement (‘TSM’) for the Fab 12 facility.” Amended Complaint ¶ 10, at 2. “On or about December 2, 2008, S2 [Automation] and Numonyx entered in to a second agreement called the Statement of Work (‘SOW’) memorializing the services to be provided by S2 [Automation].” Amended Complaint ¶ 11, at 2. “Pursuant to the terms of the SOW, S2 [Automation] took ownership, possession, and control of all of Numonyx’s parts and equipment inventory and laboratory tools,” which the parties refer to as the “Inventory.” Amended Complaint ¶ 12, at 2. “The TSM gave S2 [Automation] the option of repairing, maintaining, or discarding the Inventory it acquired from Numonyx.” Amended Complaint ¶ 13, at 2.
Micron Technology “subsequently purchased Fab 12 from Numonyx in 2010 and assumed all of Numonyx’s contract obligations, including the S2 TSM and SOW agreements,” which the parties refer to as the “S2 Agreements.” Amended Complaint ¶ 17, at 3. “Micron [Technology] did not disclose to S2 [Automation] that [Micron Israel] or any other entity was acquiring the Numonyx assets or that the existing contracts would be assigned to any entity other than Micron [Technology].” Amended Complaint ¶ 21, at 4. “S2 [Automation] was never informed prior to termination of the S2 Agreements that Micron Israel was a party to any agreement and that Micron Israel was anything other that a shipping destination, bill
“As the S2 Agreements termination date approached, Micron [Technologyjs representatives ... arranged for a meeting to conduct a review of S2 [Automationjs Inventory.” Amended Complaint ¶41, at 6. “The stated purpose of the review process was to determine what part of the Inventory Micron [Technology] would purchase so that S2 [Automation] could make arrangements to remove the remaining portion of the Inventory.” Amended Complaint ¶ 41, at 6. Micron Technology representatives acknowledged that S2 Automation owned some of the Inventory stored at the Fab 12 facility. See Amended Complaint ¶42, at 6. Further, no Micron Technology representatives indicated that Micron Technology challenged S2 Automation’s ownership of the Inventory. See Amended Complaint ¶ 44, at 7. Following the Inventory review process, “Micron [Technology] took the position that S2 [Automation] would need to document its ownership of the Inventory” and that “S2 [Automation] no longer had access to Fab 12 or the Micron [Technology] computer systems that would assist it” in documenting ownership. Amended Complaint ¶ 52, at 8. “Micron [Technology] has failed and refused to pay for any Inventory amounts despite demands that it do so.” Amended Complaint ¶ 57, at 9.
“In mid-May 2011, just prior to the termination of S2 [Automationjs Agreements, Micron [Technologyjs Operational Manager, Or Bessor, became concerned that Micron [Technology] would not have enough Aero Track Car Kits and Batteries (collectively ‘Track Cars’)
In support of its Breach of Contract claim, S2 Automation asserts that Micron Technology “assumed the S2 Agreements from Numonyx and has breached those agreements by failing to pay amounts owed to S2 [Automation].” Amended Complaint ¶78, at 11. S2 Automation also asserts that Micron Technology “breached its duty of good faith and fair dealing with respect to its agreements with S2 [Automation].” Amended Complaint ¶82, at 12. S2 Automation further contends that Micron Technology “has
2. Facts Underlying Micron Israel’s Proposed Claims Against S2 Automation.
The Court recites the factual background in this section in the light most favorable to Micron Israel, who has intervened to assert counterclaims. “Micron Israel, a wholly-owned subsidiary of Micron [Technology], owns and operates a semiconductor manufacturing facility based in Kiryat Gat, Israel,” which the parties refer to as Fab 12. Proposed Counterclaim ¶¶ 1,17, at 6, 8. “In 2010, Micron Semiconductor B.V. entered into an agreement whereby it received all of the shares in Numonyx.” Proposed Counterclaim ¶ 20, at 8. “Micron Semiconductor B.V. is a wholly owned subsidiary of Micron Technology.” Proposed Counterclaim ¶ 19, at 8. “Through that transaction, Micron Israel ... assumed the rights of Numonyx Israel related to Fab 12, including all rights against S2 [Automation], S2 Israel, and Astanovsky.” Proposed Counterclaim ¶21, at 8. “From mid-2010, after the Numonyx transaction closed, to the present, Micron Israel has owned and operated Fab 12, where it develops and produces semiconductor wafers in a highly automated environment.” Proposed Counterclaim ¶ 22, at 8.
“Fab 12 uses a system known as Automated Materials Handling System (‘AMHS’) to transport the wafers through the automated manufacturing process.” Proposed Counterclaim ¶23, at 8. Astanovsky served as the manager of the AMHS at Fab 12 since approximately March 2008. See Proposed Counterclaim ¶ 27 at 9. Micron Israel asserts that, in locating a vendor for the AMHS, Astanovsky “knowingly and purposefully directed the work to S2 [Automation] and S2 Israel for his own personal gain.” Proposed Complaint ¶ 29, at 9. “The parties memorialized their agreement in a document styled as Additional Commercial Terms and Conditions to Numonyx Corporation Purchase Agreement Goods & Services Number XXX (‘TSM Agreement’).” Proposed Counterclaim ¶32, at 9. “The TSM agreement required S2 [Automation] to maintain the proper inventory of spare parts at Fab 12 in case they were needed for repair or maintenance so that Fab 12 could operate without risk of unscheduled downtime.” Proposed Counterclaim ¶ 33, at 10. “The TSM agreement did not transfer ownership of the parts owned by Numonyx Israel to S2 [Automation].” Proposed Counterclaim ¶ 35, at 10.
“Throughout the late summer and fall 2008, Numonyx Israel and S2 [Automation] explored the possibility of expanding S2 [Automation]’s relationship to a full service contract, which meant that S2 [Automation] would be responsible for providing all necessary parts and maintenance on the AMHS.” Proposed Counterclaim ¶ 37, at 10. “In December 2008, Numonyx Israel and S2 [Automation] entered into a series of agreements memorializing this new relationship including a Scope of Work Agreement for Equipment Service (‘SOW’) and a document styled as Numonyx Corporation Purchase Agreement (‘Purchase Agreement’).” Proposed Counterclaim ¶ 40, at 10-11. “The SOW required S2 [Automation] to provide preventative and sustaining service and maintenance----” Proposed Counterclaim ¶ 41, at 11. “S2 [Automation] assumed the risk of production increases under the SOW, and was responsible for providing appropriate parts and service to accommodate increase or decreases in production at Fab 12.” Proposed Counterclaim ¶ 45, at 11.
“In November 2010, Micron Israel provided notice to S2 [Automation] of its intent to terminate the parties’ contractual relationship, which termination was effective May 2011.” Proposed Counterclaim ¶ 55, at 14. “After Micron Israel provided S2 [Automation] with notice of termination, S2 [Automation] began further sabotaging Micron Israel and acting to cause damage to Micron Israel.” Proposed Counterclaim ¶ 56, at 14. As an example of these actions, “S2 [Automation], S2 Israel, and Astanovsky wrongfully, willfully, and without Micron Israel’s consent discarded or destroyed valuable parts and equipment owned by Micron Israel.” Proposed Counterclaim ¶ 57, at 14. The “wrongful conduct forced Micron Israel to terminate the contractual relationship between Micron Israel and S2 [Automation].” Proposed Counterclaim ¶ 59, at 15. Micron Israel was “forced at a substantial cost to hire a replacement vendor to restore the damage caused by S2 [Automation]’s misrepresentations, breaches of contract, and unfair trade practices and to purchase additional spare parts that had been wrongfully depleted and not replaced by S2 [Automation], S2 Israel, and Astanovsky.” Proposed Counterclaim ¶ 59, at 15. “The replacement vendor has charged Micron Israel additional monies to perform maintenance and service that should have been performed by S2 [Automation] under the full service agreements.” Proposed Counterclaim ¶ 60, at 15. “Micron Israel would not have had to expend these funds had S2 [Automation] properly maintained and repaired the AMHS and not engaged in the wrongful conduct alleged.” Proposed Counterclaim ¶ 62, at 16. “At times relevant to [Micron Israel’s] claim, the AMHS experienced numerous system and equipment failures that could have been prevented had S2 [Automation] properly maintained and serviced the AMHS.” Proposed Counterclaim ¶ 67, at 16.
PROCEDURAL BACKGROUND
On October 3, 2011, S2 Automation filed its Complaint for Breach of Contract, Conversion, Misrepresentation and Unjust Enrichment. See Doc. 1 (“Original Complaint”). On April 12, 2012, S2 Automation filed its Amended Complaint. See Doc. 36 (“Amended Complaint”). S2 Automation asserts six causes of action against Micron Technology: (i) Breach of Contract; (ii) Breach of Duty of Good Faith and Fair Dealing; (iii) Conversion; (iv) Fraudulent Misrepresentation; (v) Negligent Misrepresentation; and (vi) Unjust Enrichment. See Amended Complaint at 11-15.
On May 10, 2012, Micron Technology filed its Motion seeking a protective order. See Doc. 45. It relates that “S2 [Automation] continues to resist entry of an acceptable protective order.” Motion at 1. Micron Technology states that it has “proposed a protective order that would have protected both parties from a disclosure of their confidential information while allowing the parties to move forward with litigating their claims and defenses as efficiently as possible.” Motion at 1. It notes that S2 Automation has insisted “on terms that are unreasonable and not calculated to protect Micron from the risk of improper disclosure of its confidential information and that of its subsidiaries and suppliers.” Motion at 2. Micron Technology requests: (i) “that the Court enter a protective order, in the form attached hereto as Exhibit ‘A’ ”; and (ii) “that the Court order that the parties may submit documents containing confidential information under seal, in the manner permitted by the Court’s electronic filing system.” Motion at 2. Micron Technology asserts that rule 26(c) of the Federal
More specifically, the proposed Protective Order, filed May 10, 2012 (Doc. 45-1), states:
1. Each party to this litigation or third party that produces or discloses any documents, materials, answers to interrogatories, responses to requests for admission, trial testimony and transcripts thereof, deposition testimony and transcripts thereof, or any other information that the disclosing party believes contains Confidential Information may designate such information as “Confidential” or “Highly Confidential—Attorneys’ Eyes Only.”
a. A disclosing party may designate information as “Confidential” only if, in the good faith belief of such party and its counsel, the unrestricted disclosure of such information could be potentially prejudicial to the business or operations of the party; and
b. A disclosing party may designate information as “Highly Confidential-Attorneys’ Eyes Only” only if, in the good faith belief of such party and its counsel, the document or information contains information considered to be most sensitive by the party, including without limitation trade secret or other highly confidential research, development, financial or other commercial information.
Protective Order ¶ 1, at 2-3. The proposed Protective Order also provides:
4. Information designated “Highly Confidential—Attorneys’ Eyes Only” shall be viewed only by:
a. Outside counsel of record for the parties;
b. Micron in-house legal personnel with a need to know the information in connection with alternative dispute resolution proceedings, settlement negotiations, discovery, preparation for trial, or trial; and
c. Independent experts under the conditions set forth herein.
Protective Order ¶4, at 4. The proposed Protective Order also requires a party to seek the other party’s approval to have its expert view information designated as highly confidential and attorneys’ eyes only. See Protective Order ¶ 5, at 4. A broader range of individuals can view information “designated as ‘Confidential.’ ” Protective Order ¶ 6, at 4-5.
Micron Technology relates that S2 Automation’s proposed changes to the Protective Order are “unacceptable”:
For example, S2’s proposed protective order would only allow for designation of information as attorneys’ eyes only where “there is a real and justifiable basis for needing to protect the information when balanced against the other Parties[’] need to have access to the information in order to pursue and/or to protect its interest in the litigation.” S2 also proposed that the party seeking to designate documents under the protective order would be forced to pay expert costs incurred by the other party resulting from the designation. S2 proposed that the confidentiality designation terminate automatically if the information becomes “otherwise known within the*678 public domain.” This is in contrast to Micron’s proposed form, which would require the parties’ agreement or this Court’s order before the designation maybe removed. (Ex. A ¶ 3.)
Additionally, S2’s proposed order eliminated the restrictions on who may review information designated as “Confidential” and would allow any person who had already had “access” to information designated as “Confidential” or “Highly Confidential—Attorneys’ Eyes Only” to review the information without limitation. S2 also proposed that “This Order shall not be binding upon the independent decision regarding these matters by any other court in any related litigation.” S2 also eliminated the limitation that designated materials only be used in connection with the litigation, further raising the specter that S2 intends to use information obtained in this action for its own unrelated purposes. Finally, S2 proposed that designated materials could continue to be used by the parties in “any related litigation occurring within or without the United States[J” Such a provision is particularly problematic given that S2 has requested that the order not be binding on courts in other jurisdictions.
Motion at 7-8 (citations omitted).
On May 23, 2012, S2 Automation filed its S2’s Response to Motion for Protective Order and Motion for Clawback. See Doc. 59 (“Response”). S2 Automation “disagrees with Micron [Technologyj’s insistence that it should be allowed to self designate virtually all of the documents in the litigation as confidential without any showing of good cause and to impose restrictions on their use in a manner that will impair S2’s ability to prosecute its claims against Micron [Technology].” Response at 1. It argues that “Micron [Technology] bears the burden to demonstrate that particular documents deserve protection as trade secrets or confidential information.” Response at 2. S2 Automation relates that, “[d]espite numerous requests that [Micron Technology] produce documents it does not claim are confidential, it has refused to produce anything at all.” Response at 2. S2 Automation contends that the “Non Disclosure Agreement ... executed by S2 [Automation] and Micron [Technology]^ predecessor in interest illustrates the appropriate level of confidentiality and protection that should be given the documents at issue herein.” Response at 2.
At the hearing on June 15, 2012, the Court stated that, in situations where the parties cannot agree on a confidentiality order, it typically directs them to the one provided in section 40.27 of the Manual for Complex Litigation (Fourth). See Transcript of Hearing at 74:1-19 (taken June 15, 2012)(Court)(“Tr.”).
S2 Automation expressed concern about having to receive Micron Technology’s prior approval to have experts look at the documents and telling Micron Technology which documents it will show its experts. See Tr. at 78:22-79:11 (Holland, Court). The Court asked Micron Technology if it could remove those provisions, and Micron Technology said that it could remove these provisions. See Tr. at 79:24-80:3 (Court, Berge). S2 Automation noted that it had some concerns about the effect of provisions in the protective order that would limit it in other jurisdictions, such as an Israeli court. See Tr. at 80:4-14 (Court). The Court responded that S2 Automation could tell the other court that it has obligations with which it must comply pursuant to an order from this Court. See Tr. at 80:15-21 (Court). S2 Automation stated that it would prefer to have some time to look at the example protective order in the Manual for Complex Litigation Fourth, and the Court responded that the example in that resource will not be helpful, because it does not have a two-tiered designation system. See Tr. at 82:5-82:10 (Holland, Court). The Court related that it would not preclude S2 Automation from returning to the Court with modifications to the protective order but said that the parties must use the basic form Micron Technology has proposed rather than some other form. See Tr. at 82:14-25 (Court). Micron Technology related that it has only identified a small number of documents that it intends to designate as attorneys’ eyes only. See Tr. at 83:1-5 (Berge, Court).
“Federal district courts have broad discretion over discovery.” Morales v. E.D. Etnyre & Co.,
ANALYSIS
The Court will grant the Motion seeking a protective order in part and deny it in part. The Court concludes that Micron Technology has met its burden to show good cause that a protective order is appropriate. The Court will not require the parties to show good cause each time they designate a document as confidential, because such a requirement would be impracticable from a case administration standpoint and would be counterproductive to the speedy resolution of this case. The Court will require the parties to use Micron Technology’s proposed Protective Order as a baseline for the protective order they submit to the Court, because the proposed Protective Order already provides for a two-tiered designation system for confidential information and attorneys’ eyes only information. Such a two-tiered designation system is also appropriate in light of the intellectual property information and other sensitive commercial information that the parties will be exchanging during discovery. The protective order the parties submit to the Court should not require parties to obtain the opposing side’s prior approval to have their experts review attorneys’ eyes only information or require parties to notify the opposing side which documents it is showing to its experts. Once the parties complete the protective order, they should submit it with the Court. If S2 Automation concludes that it has good grounds to seek a modification of the protective order, in case Micron Technology is acting improperly during the discovery process, it may approach the Court with its request for modification.
I. A PROTECTIVE ORDER IS APPROPRIATE TO PROTECT CONFIDENTIAL INFORMATION.
Rule 26(c) provides that, upon a showing of good cause, a court may “issue an order to protect a party or person from annoyance, embarrassment, oppression, or
Micron Technology has shown good cause for entering a protective order. Gregory C. Tollefson, Senior Assistant General Counsel for Micron Technology, has stated the following in a declaration he has submitted -with the Court:
5. One of Micron’s wholly-owned subsidiaries, Micron Semiconductor Israel, Ltd. (“Micron Israel”), owns and operates the manufacturing facility (“Fab 12”) that is at-issue in this ease.
6. Fab 12 has rigorous security and confidentiality procedures in place that are consistent with Micron’s and Micron Israel’s need to protect their intellectual property, manufacturing processes, and operations. For example, Fab 12 is restricted from the public and all employees, contractors or other visitors must be pre-screened and sign confidentiality agreements. These restrictive measures extend to subcontractors engaged by Micron Israel to perform services at Fab 12. Suppliers are required by Micron and its subsidiaries to sign non-disclosure agreements and, in the case of S2, sign additional agreements providing for confidentiality. As a supplier to Fab 12, S2 was subject to these strict confidentiality requirements.
Declaration of Gregory C. Tollefson in Support of Micron Technology, Inc.’s Motion for Entry of Protective Order and Motion for Entry of a Non-Waiver and Claw-Back Order at 2-3 (dated May 9, 2012)(Doc. 47)(“Tollefson Declaration”). According to a declaration Scott E. Randolph, an attorney in Holland & Hart’s Boise, Idaho office, has submitted, “[t]he two-tier approach was particularly important to Micron given that S2 has requested that Micron produce documents, including confidential contracts and pricing information of S2’s competitors and other highly confidential and protected information.” Declaration of Scott E. Randolph in Support of Micron Technology, Inc.’s Motion for Entry of Protective Order and Motion for Entry of a Non-Waiver and Claw-Back Order (dated May 10, 2012), filed May 10, 2012 (Doc. 48)(“Randolph Declaration”).
Intellectual property, trade secrets, and other sensitive commercial information, such as those Micron Technology seeks to protect, fall within the scope of permissible protective orders under rule 26(c). See Fed.R.Civ.P. 26(c)(1)(G); Am. Standard, Inc. v. Pfizer, Inc.,
S2 Automation has expressed hesitancy to enter into a protective order, but the Court concludes that one is appropriate. Micron Technology has provided evidence supporting the conclusion that it has sensitive commercial information that relates to the Fab 12 facility, which is heavily implicated in this case and which it takes significant precautions to protect. Without the proper procedures in place in this litigation, particularly given that the federal court’s docket is open to the public and that trade secrets may be lost if a party does not take precautions to protect them, the Court recognizes that not having a protective order in place could compromise Micron Technology’s commercial position and legal rights. It is much easier to address this situation preemptively, which is the underlying purpose of protective orders, rather than after Micron Technology has suffered harm. The scope of discovery is broad, and, given that broad scope, it is sometimes necessary to have a protective order to reduce the risk that sensitive information parties produce to the other side remains confidential:
The broad definition of relevance under Rule 26(b), reaching material that might lead to admissible evidence, and largely checked only by any applicable privileges, reduces the need for judicial rulings by leaving little basis for resisting most discovery demands. At the same time, the seining effect of the broad definition of relevance can step hard on privacy. The protective order, with its ability to limit the use of material produced in discovery, allows discovery to continue with little judicial involvement. For example, a business might resist producing records disclosing its profit margins on products, understandably concerned about loss of competitive advantage. Production under an order limiting use of the data can solve the problem. It is quickly apparent that protective orders agreed to by counsel are of great utility.
6 J. Moore, supra § 26.101[l][a], at 26-499. Discovery has gotten off track in this case, and one of the ways for the Court to put the case back on track to a speedy resolution, without requiring the Court to supervise every step of the discovery process, is to enter a protective order. See 6 J. Moore, supra § 26.101[l][a], at 26-499 (“The protective order, with its ability to limit the use of material produced in discovery, allows discovery to continue with little judicial involvement.”).
Furthermore, courts, as a practical matter, are more willing to find good cause to enter a protective order in complex commercial litigation:
Nevertheless, most courts take a less stringent view of the “good cause” requirement for stipulated protective orders, particularly in complex litigation. Under this more relaxed view, while it is technically correct that the burden of justifying the confidentiality of each document sought to be covered by the protective order is on the party seeking the order, that party need not make a document-by-document initial showing. Instead, the court may enter a broad “umbrella” protective order on a threshold showing of good cause. After documents are delivered, the opposing party may challenge the confidentiality of particular documents. The party originally seeking the protective order would then have the burden of justifying the order with respect to the challenged documents.
6 J. Moore, supra § 26.104[2], at 26-514. Accord Poliquin v. Garden Way, Inc.,
It is correct that the burden of justifying the confidentiality of each and every document sought to be covered by a protective order remains on the party seeking the protective order; any other conclusion*683 would turn Rule 26(c) on its head. That does not mean, however, that the party seeking the protective order must necessarily demonstrate to the court in the first instance on a document-by-document basis that each item should be protected. It is equally consistent with the proper allocation of evidentiary burdens for the court to construct a broad “umbrella” protective order upon a threshold showing by one party (the movant) of good cause. Under this approach, the umbrella order would initially protect all documents that the producing party designated in good faith as confidential. After the documents delivered under this umbrella order, the opposing party could indicate precisely which documents it believed to be not confidential, and the movant would have the burden of proof in justifying the protective order with respect to those documents. The burden of proof would be at all times on the movant; only the burden of raising the issue with respect to certain documents would shift to the other party.
Cipollone v. Liggett Grp., Inc.,
II. THE COURT WILL REQUIRE THE PARTIES’ TO USE MICRON TECHNOLOGY’S PROPOSED PROTECTIVE ORDER TO DRAFT THE PROTECTIVE ORDER THEY ULTIMATELY SUBMIT TO THE COURT.
As a general practice, when parties cannot agree on the terms of a protective order that covers confidential information, the Court directs the parties to the Manuel for Complex Litigation (Fourth) ’s form protective order on this matter. See Manuel for Complex Litigation (Fourth) § 40.27, at 752-53 (2004). This form, however, does not provide for a two-tiered system of: (i) confidential documents; and (ii) attorneys’ eyes only documents. See Manuel for Complex Litigation (Fourth), supra § 40.27, at 752-53 (“Documents designated confidential shall be shown only to the attorneys, the parties, parties’ experts, actual or proposed witnesses, and other persons whom the attorneys deem necessary to review the documents____”). Additionally, the non-disclosure provisions into which the par
S2 Automation disputes the necessity of a two-tiered system, noting that such a system will require it to incur additional costs and is subject to abuse. In the context of intellectual property, including trade secrets and other sensitive commercial information that gives a party a competitive advantage, a two-tiered system can be appropriate. Protective orders under rule 26(c)(1)(G), which governs protective orders for these categories of information, have become “[o]ne of the most frequently invoked protective order provisions.” 6 J. Moore, supra § 26.105[8][a], at 26-548.1.
The provisions regarding attorneys’ eyes only documents in the proposed Protective Order are as follows:
4. Information designated “Highly Confidential—Attorneys’ Eyes Only” shall be viewed only by:
a. Outside counsel of record for the parties;
b. Micron in-house legal personnel with a need to know the information in connection with alternative dispute resolution proceedings, settlement negotiations, discovery, preparation for trial, or trial; and
c. Independent experts under the conditions set forth herein.
Protective Order ¶4, at 4. The proposed Protective Order also requires a party to seek the other party’s approval to have its expert view information designated as highly confidential and attorneys’ eyes only. See Protective Order ¶ 5, at 4. The Court asked Micron Technology if it could remove those provisions placing additional limitations on experts, and Micron Technology said that it could remove these provisions. See Tr. at 79:24-80:3 (Court, Berge). The Court concludes that removing those provisions limiting disclosing documents to experts is appropriate, because Micron Technology has made no showing that imposing such restrictive conditions on experts is necessary in this case. See MGP Ingredients, Inc. v. Mars, Inc.,
Permitting attorneys’ eyes only restrictions as a general matter, however, in light of the intellectual property concerns Micron Technology faces, is appropriate. Again, this is not an uncommon feature in protective orders in modern complex commercial litigation. These provisions are as much a protection for the party receiving the documents as for the party producing the documents. Such a mechanism highlights for everyone the most sensitive documents, and assures that leaks by the receiving sides are rare and, if they occur, can be more easily traced to the source. Provisions such as these can prevent litigation over improper use of information disclosed under a protective order by clarifying the most sensitive information that the parties disclose. The receiving attorney is rarely in a competitive position with the producing party, and is unlikely to have an incentive to use the information or otherwise disclose it. Clients, already at war with the opposing side, may not feel as limited by professional standards as an attorney, who has separate obligations to the court system and to society to obey court orders.
Once Micron Technology begins to disclose trade secrets to a wider group of people, there is a stronger argument that the information no longer has protection. As the Restatement (Third) of Unfair Competition relates in comment f: “When information is no longer sufficiently secret to qualify for protection as a trade secret, its use should not serve as a basis for the imposition of liability under [a misappropriation theory].” Restatement (Third) of Unfair Competition § 39 cmt. f (1995). Furthermore, with other commercial information Micron Technology has that is confidential but not entitled to any intellectual property protection, allowing that information to get in the hands of others who could be competitors would cause harm to Micron Technology. S2 Automation alleges that it contracts with companies, like Micron Technology, to supply them parts. In light of the nature of its business, it is entirely plausible that S2 Automation works with similar companies who compete with Micron Technology. Furthermore, this litigation has already been contentious so far. The parties have not shown a tendency to work well together.
More importantly, Micron Technology has not opposed production of the material entirely, which a protective order could permit if the circumstances were appropriate. See Fed.R.Civ.P. 26(c)(1)(G) (stating that a court may enter and order “requiring that a trade secret or other confidential research, development, or commercial information not be revealed or be revealed only in a specified way” (emphasis added)). It has simply requested the lesser protection that production take place in a particular manner. If Micron Technology had opposed production entirely, it would have a higher burden to show “that the information sought is a trade secret and then demonstrate that its disclosure might be harmful.” Centurion Indus., Inc. v. Warren Steurer & Assocs.,
Lastly, it is not appropriate for the Court to require a provision in the protective order that the protective order is not binding upon another courts’ decisions on related matters in other litigation. Such a provision could undermine the protective order in this case and allow parties to circumvent its protections. As the Court has stated in the past, quoting from an advisory committee note:
Confidentiality orders are becoming increasingly important in limiting the costs of privilege review and retention, especially in cases involving electronic discovery. But the utility of a confidentiality order in reducing discovery costs is substantially diminished if it provides no protection outside the particular litigation in which the order is entered. Parties are unlikely to be able to reduce the costs of pre-production review for privilege and work product if the consequence of disclosure is that the communications or information could be used by non-parties to the litigation.
Radian Asset Assurance, Inc. v. Coll. of the Christian Bros. of N.M., No. 09-0885,
IT IS ORDERED that Micron Technology, Inc.’s Motion for Entry of Protective Order, filed May 10, 2012 (Doc. 45), is grant
Notes
. Track Cars are "small transport vehicles that carry semiconductor wafers around the production facility.” Amended Complaint ¶ 63, at 10.
. The Corporate Non-Disclosure Agreement (dated December 1, 2008), filed May 23, 2012 (Doc. 59-1), contains the following provision regarding handling confidential information:
Exceptions to the Obligation of Confidentiality. The receiving party will not be liable for the disclosure of any Confidential Information which is:
(a) generally made available publicly or to third parties by the disclosing party without restriction on disclosure;
(b) rightfully received from a third party without any obligation of confidentiality;
(c) rightfully known to the receiving party without any limitation on disclosure prior to its receipt from the disclosing party;
(d) independently developed by employees of the receiving party; or
(e) required to be disclosed in accordance with applicable laws, regulations, court, judicial or other government order, provided that the receiving party shall give to the disclosing party reasonable notice prior to such disclosure and shall comply with any applicable protective order.
Corporate Non-Disclosure Agreement ¶ 4, at 2.
. The Court’s citations to the transcript of the hearing refer to the court reporter's original, unedited version. Any final transcript may contain slightly different page and/or line numbers.
. The example protective order in the Manual for Complex Litigation (Fourth) has a similar structure:
If a party believes that a document designated or sought to be designated confidential by the producing party does not warrant such designation, the party shall first make a good-faith effort to resolve such a dispute with opposing counsel. In the event that such a dispute cannot be resolved by the parties, either party may apply to the court or special master for a determination as to whether the designation is appropriate. The burden rests on the party seeking confidentiality to demonstrate that such designation is proper.
Manual for Complex Litigation (Fourth) § 40.27, at 753 (2004). The Federal Judicial Center is an entity Congress created "to promote improvements in judicial administration in the courts of the United States.” Fed. Judicial Ctr., Federal Judicial Center, http://www.fjc.gov/ (last visited July 23, 2012).
