OPINION & ORDER
This is a breach" of contract and misappropriation of trade secrets case. The parties are in a dispute over discovery. Defendants ask for a protective order to excuse them from responding to any discovery requests relating to the “Confidential Solutions Methods,” until such time as Plaintiff provides full and complete responses identifying its trade i secrets with reasonable particularity. Defendants also seek an order compelling Plaintiff to amend its responses to Interrogatory Nos. 1 and 16 (and the responses incorporating those Interrogatories’ responses) to identify with reasonable particularity the trade secrets
For the reasons stated below, Defendants’ motion is granted in part. -Most importantly, the Court grants Defendants’ motion for a protective order excusing them from responding to any discovery related to the “Confidential Solutions Methods,” until such time as Plaintiff identifies with reasonable .particularity the trade secrets it allegedly disclosed to Defendants.
BACKGROUND
Plaintiff Vesta, an electronic payments and fraud prevention technology company, has sued Defendants Amdocs Management Limited and Amdocs, Inc. (collectively, “Defendants”), telephorie billihg software and services companies, for breach of contract and misappropriation of trade secrets. First Am. Compl. (FAC) Intro., ECF 52. Beginning in 2006,' the parties collaborated with one another to integrate their services and platforms -in order to appeal to their shared customer based. FAC ¶ 13. In 2009, the parties’ relationship became more strategic in nature as they worked to jointly market their respective services. Id. at ¶ 14. In addition, since 2010, Defendants twice approached Plaintiff about the possibility of Defendants acquiring Plaintiff. Id. Plaintiff and Defendants entered into a series of NonDisclosure/Confidentiality Agreements (NDAs) to preserve confidentiality while sharing information in their effort to develop joint services and products. Id. at ¶¶ 13-15. Now, Plaintiff alleges that Defendants breached these NDAs and stole trade secrets that were shared in the course of the collaboration.
Specifically, Plaintiff alleges that in the course of jointly collaborating on marketing and the possibility of acquisition of Plaintiff by Defendants, Plaintiff shared information with Defendants including “proprietary information about [Plaintiffs] payment- solution” and “confidential and proprietary business and financial information.” Id. at ¶ 17. Plaintiff alleges that Defendants obtained two types of confidential information from Plaintiff:
1) “Solutions Methods,” which include “detailed information about the architecture and design of the solutions, including proprietary payment routines, methodologies and processes,” and
2) “Risk Information,” which includes detailed statistical information about “the prevalence of fraudulent payment transactions in the prepaid mobile device market place” and how Plaintiff “uses fraud data to price its payment solutions.”
Id. at ¶¶ 22, 51.
The alleged stolen information “relates generally to proprietary software and fraud prevention technologies, consumer behavior analyses and service techniques created by [Plaintiff] and used to provide its electronic payment services to the national and international mobile phone industry.” FAC Intro. Plaintiffs First Amended Coriiplaint alleges, among other things, that Defendants stole a compilation of “Confidential Solution Methods,” defined as:
Detailed architectural drawings and sequence flow diagrams that depicted, on a step-by-step basis, how [Plaintiff] would design and implement its payment solution for Metro PCS ... [and] detailed information about how [Plaintiff] implements its system of direct customer notifications to optimize payments and customer retention, including detailed information about [Plaintiffs] proprietary “Text-to-Pay” system ... [and] detailed information about [Plaintiffs]*1150 customer relationship management tools, and how those tools serve to optimize customer loyalty and MNO revenues.
Id. at ¶¶ 32, 164-73.
On May 15, 2015, this Court entered a stipulated scheduling order providing that, by June 5, 2015, Plaintiff would answer Defendants’ interrogatories regarding the trade secrets allegedly misappropriated by Defendants. Scheduling Order, May 15, 2015, ECF 62. Throughout the summer, the parties communicated about the interrogatories and responses through meet and confer letters and discussions. Defs.’ Mot. Compel 8, ECF 105. On September 21, 2015, Defendants filed the present motion. Jd. The Court heard oral argument on Defendants’ motion on November 6, 2015.
STANDARD
Rule 26(b)(1) of the Federal Rules of Civil Procedure provides in relevant part:
Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense— including the existence, description, nature, custody, condition, and location of any documents or other tangible things and the identity and location of persons who know any discoverable matter. For good cause, the court may order discovery of any matter relevant to the subject matter involved in the action. Relevant information need not be admissible at the trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence. All discovery is subject to the limitations imposed by Rule 26(b)(2)(C).
Fed. R. Civ. P. 26(b)(1). Among the limitations stated in Rule 26(b)(2)(C) is the direction that the court must limit the extent of discovery if it determines that “the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.” Fed. R. Civ. P. 26(b)(2)(C)(iii). This is known as the “rule of proportionality.” In addition, Rule 26 provides that the court may, for good cause, issue an order to protect a party or person from oppression or undue burden, including “requiring that a trade secret or other confidential research, development, or commercial information not be revealed or be revealed only in a specified way.” Fed. R. Civ. P. 26(c)(1)(G).
DISCUSSION
The parties’ dispute centers on whether Plaintiff has identified its trade secrets with sufficient particularity for Defendants to be obligated to respond to Plaintiffs discovery requests. A careful review of the many cases presented by both parties makes clear that there is no bright-line answer as to the degree of particularity that must be disclosed in order for discovery to proceed in a trade secrets case. Rather, the Court’s analysis in each case is fact-intensive and the outcome is fact-specific.
At issue in this case are Defendants’ Interrogatory Nos. 1, 15, and 16.
I. Plaintiff must identify its trade secrets with “reasonable particularity” — (Response to Interrogatory Nos. 1, 16)
As an initial matter, the parties' disagree about which standard controls the Court’s resolution of this motion. According to Defendants, Plaintiff must identify with reasonable particularity its “Solutions Methods” trade secrets that it alleges Defendants stole before Defendants are obligated to respond to discovery requests on the same topic. Plaintiff argues that Defendants erroneously rely on a standard based on a California state statute that does not apply in this case. According to Plaintiff, no court in Oregon has adopted the “reasonable particularity” standard and the two District of Oregon cases to address this question have resolved it in favor of discovery without such initial disclosures.
The discovery impasse presented by this case “is not is not uncommon in trade secret cases, and brings into conflict many competing policies.” DeRubeis v. Witten Technologies, Inc.,
In Nike, Inc. v. Enter Play Sports, Inc.,
[determining whether a trade secret has been misappropriated usually involves examining things that the other party considers its own trade secrets. There is no privilege excepting trade secrets from discovery, but courts must exercise discretion to avoid unnecessary disclosures of such information. [Plaintiff will normally be required first to identify, with reasonable particularity the matter which it claims constitutes a trade secret, before it will be allowed (given a proper showing of need) to compel discovery of its adversary’s trade secrets.
[Cjourts have identified at least three policies which support allowing the trade secret plaintiff to take discovery prior to identifying its claimed trade secrets.*1152 First, courts have highlighted a plaintiff’s broad right to discovery under the Federal Rules of Civil Procedure. Second, the trade-secret plaintiff, particularly if it is a company that has hundreds or thousands of trade secrets, may have no way of knowing what trade se-r crets have been misappropriated until it receives discovery on how the defendant is operating. Finally, if the trade secret plaintiff is forced to identify the trade secrets at issue without knowing which of those secrets have been misappropriated, it is placed in somewhat of a “Catch-22” [because] [i]f the list is too general, it will encompass material' that the defendant will be able to show cannot be trade secret. If instead it is too specific, it may miss what the defendant is doing.
Id. (alterations in original) (quoting DeRubeis,
Judge Simon applied the considerations raised in BioD and concluded that NIKE’s descriptions of the trade secrets at issue were sufficient to permit discovery to proceed. Judge Simon cited the fact that Enter Play Sports answered the Complaint and “asserted in its first counterclaim that NIKE’s alleged trade secrets either were not disclosed in EPS’s patent Applications or, to the extent they were, then they were not subject to the protections of the NDA based on the NDA’s express exclusions.” NIKE, 305 F.R.D. .at 646. Accordingly, Judge Simon explained that NIKE’s claimed trade secrets must have been sufficiently clear to Enter .Play Sports to permit Enter Play Sports to make those assertions. Id.
Judge Simon employed the same, analysis in St. Jude Med. S.C., Inc. v. Janssen-Counotte,
As in Nike,- Judge Simon applied the considerations from BioD and concluded that the plaintiff did not need to identify its trade- secrets with,any greater particularity before, taking discovery from the third-party. Id. at 641. The St. Jude plaintiff had a “broad right to discovery.” Id. In addition, the plaintiff had “numerous trade secrets but ... ‘no way of knowing what trade secrets ha[d] been misappropriated until it receive[d]' discovery on how the defendant is operating.’ ” Id. (quoting BioD,
. Neither of , Judge Simon’s opinions adopted the rule applied by many federal courts across the country requiring the party alleging a claim foi? misappropriation of trade secrets to identify its alleged trade secrets with, reasonable particularity before compelling discovery of its adversary’s trade secrets.
As in Nike and St. Jude, this Court applies the BioD analysis to resolve the present case. In doing so, the Court recognizes the “growing consensus” of courts from around the country who have applied the “reasonable particularity” standard to determine whether a party alleging a claim for misappropriation of trade secrets has sufficiently identified its trade secrets before it may compel discovery of its adversary’s trade secrets. See StoneEagle Servs., Inc. v. Valentine, No. 3:12-CV-1687-P,
Requiring Plaintiff in this case to make pre-discovery disclosures of its alleged misappropriated trade secrets is supported by strong practical and policy reasons, including the goal of assisting this Court in “in determining relevancy and the scope of discovery.” See Ikon Office Sols., Inc. v. Konica Minolta Bus. Sols., U.S.A., Inc., No. 3:08-CV-539-RLV-DCK,
At the same time, the policy considerations that weight against this requirement, while important, weigh less heavily in this case than in other cases like Nike and St. Jude. As in every case, Plaintiff has a broad right to discovery under the Federal Rules of Civil Procedure. See, e.g., Epstein v. MCA, Inc.,
The Court must strike a balance in assessing these considerations and determining the appropriate sequence of discovery where misappropriation of trade secrets has been alleged. See Microwave Research Corp. v. Sanders Assocs., Inc.,
II. Plaintiff has not identified its trade secrets with “reasonable particularity”- — (Response to Interrogatory No. 1,16)
Plaintiff argues that, even if this Court applies the “reasonable particularity” stan
Ultimately, whether a plaintiff has-sufficiently disclosed its trade secrets is “a fact-specific question to be decided on a case-by-case basis.” L-3 Commc’ns Corp. v. Jaxon Eng’g & Maint., Inc., No. 10-CV-02868-MSK-KMT,
a description of the trade secrets at issue that is sufficient to (a) put a defendant on notice of the nature of the plaintiffs claims and (b) enable the defendant to determine the relevancy of any requested discovery concerning its trade secrets.
BioD,
The court in Del Monte Fresh Produce Co. set forth a working definition of “reasonable particularity” in identifying allegedly misappropriated trade secrets. As that court noted, it is insufficient to describe the trade secrets by generic category, such as the components of the night vision devices to which the alleged trade secrets relate. Rather, [the party] must identify the specific characteristics of each trade secret, such as a particular drawing, process, procedure or cost/pricing data. It must also describe with reasonable particularity all of its trade secrets, including those involving “business methods, know-how, machines, manufacturing process and procedure, marketing information, pricing data, product designs and manufacturing information, ... [and] supplier and vendor lists” as alleged in the amended counterclaim,
Knights Armament Co. v. Optical Sys. Tech., Inc.,
Plaintiff’s Amended Complaint and Interrogatory Responses offer lengthy narrative descriptions of the alleged trade secrets at issue. In addition, Plaintiff provides “architectural, drawings” and “sequence flow diagrams” for Plaintiffs payment solution. Eads Decl.,Ex. 4, ECF 104. In response to Defendants’ Interrogatory No. 16, Plaintiff provides additional information about the trade secrets it believes that Defendants misappropriated. Plaintiffs Supplemental Responses to First Set of Interrogatories 37, ECF 103. Plaintiff alleges that it provided Defendants with “a complete, high-level explanation of -how to design and implement a comprehensive payment services solution” and “a compilation of several of [Plaintiffs] key methodologies, business rules and best practices.” Id. at 36-37. Plaintiff lists the following categories of information that were included in this “compilation”: omni-channel payment processing methods, mobile user fingerprinting, channel-specific credential and authentication management strategies, idempotent communications protocols, bifurcated funds capture, edge-case management strategies] best practices scorecard and recommendations, text-to-pay strategies, and proprietary management tools. Id. at 37-43.
However, the actual trade secret descriptions Plaintiff offers are broadly
Plaintiff contends that Defendants erroneously “nitpick” each component of Plaintiff s trade secret claim, ignoring that the claim is that of a “compilation trade secret.” Pl.’s Memo. Opp. Mot. Compel 9, ECF 121. Plaintiffs expert, Charles Abbey, explains that “the particular manner in which individual technologies or methods are used, or assembled with other technologies or methods or how they are applied to a particular use [ ] ,to form a comprehensive payments solution can constitute highly proprietary information.” Abbey Deck ¶ 13. However, Plaintiff may not claim that a particular method or process is a trade secret at this stage of the litigation “without identifying the steps in the process and explaining how those steps make [the] method or process unique.” BioD,
Plaintiffs must explain how the combination of much of what appears to be generally known information can constitute a trade secret. It is ’ simply not sufficient for plaintiffs to identify a trade secret as a “method” without some explanation of why that “method” -could be considered a legally protectable trade secret. Plaintiffs must provide some basis for their contention that their methods and processes are unique and thus legally protectable. Contrary to their contention, plaintiffs are not being asked to prove their trade secret claim prior to being able to take discovery. But, they must provide enough detail about their alleged trade secrets to at least suggest that the alleged trade secrets might be legally protectable. To date, they have not done so. In short, plaintiffs must identify théir trade secrets with more specificity than they have done so far.
Id.; see also Switch Commc’ns. Grp.,
In sum, the Court finds that Plaintiff fails to identify its alleged trade secrets with reasonable particularity, as required. See StoneEagle Servs.,
Defendants argue that Plaintiff should be ’barred, absent a showing of good cause, from supplementing or changing what it claims to be the trade secrets it disclosed to Defendants. Plaintiff responds that Defendants’ argument is “overreaching.”
Plaintiffs responses to Interrogatory Nos. 15 and 16 both contain the following “reservation of rights”’language:
Vesta specifically reserves the right to complete its investigation and discovery of the, facts, and to rely at trial or in other proceedings on documents and information in addition to the information provided herein, regardless of whether such information is newly discovered or newly, in existence. Additional discovery and investigation may lead to additions to, changes in, or modifications of these Responses.
Pl.’s Supp. Resp. 30, 36; ECF 103. Defendants cite six cases for the proposition that Plaintiff should not be allowed to “leave the door open to ‘re-construct’ what it claims it disclosed” after seeing Defendants’ discovery responses. Defs.’ Mot. Compel 22, ECF 105. In addition, Defendants allege that Plaintiff has structured its responses in a vague manner to provide a “backdoor” reservation of rights to supplement its responses after it receives discovery. Id. at 23.
The cases cited by Defendants do not, in fact, foreclose ■ the possibility of Plaintiff reserving the right to amend its responses.
Plaintiff cites one case that expressly holds that a plaintiff may supplement a trade secret identification according to Federal Rule of Civil Procedure 26(e). See StoneEagle Servs.,
In sum, the Court does not find that either party cites controlling authority to provide a definitive answer as to whether Plaintiff should be allowed to reserve the right to supplement its trade secret identification. In the absence of such authority, the Court grants Defendants’ motion that Plaintiff be required to show good cause for such supplementation.
Defendants contend that, because of the express terms of the parties’ 2009 NonDisclosure Agreement (NDA), any information that Plaintiff shared with Defendants orally but not in writing cannot constitute a trade secret. Defendants ask the Court to compel Plaintiff to remove any purported “oral” discussions from its Response to Interrogatory Nos. 15 and 16. Plaintiff responds that Defendants are effectively seeking summary judgment that all information shared in a non-written manner between the parties cannot be a trade secret because it was purportedly shared non-confidentially. The Court agrees that Defendants’ argument is premature and denies their request.
The 2009 NDA provides that “[disclosure of the disclosing party’s. Proprietary Information to the receiving party may only be made in writing or other tangible or electronic form that is marked as proprietary and/or confidential information of the disclosing party, or occur by demonstration of any product within the AM-DOCS product.” Rosenzweig Decl. Ex. F ¶ 6 (emphasis added), ECF 112-2. Defendants argue, therefore, that any information that was not shared in writing and marked proprietary and/or confidential cannot constitute a trade secret because the parties did not'have a duty to maintain the secrecy of the information.
Plaintiff disputes Defendants’ interpretation of the text of the 2009 NDA. Plaintiff argues that Defendants’ construction of the contract gives rise to an absurd result: “the parties could not share any trade secret information orally or in face-to-face meetings without waiving the confidentiality of such information.” PL’s Memo. Opp. Mot. Compel 17, ECF 121. Second, Plaintiff argues that, at the very least, the 2009 NDA is ambiguous with respect to orally shared confidential and trade secret information. Third, Plaintiff argues that there is an open question as to whether the parties expressly or impliedly waivéd any contractual provision during their face-to-face meetings.
The Court finds Plaintiffs arguments persuasive. While Defendants may have a compelling argument at summary judgment, granting the motion at this' point would be inappropriate because it requires resolving a disputed issue of contract interpretation.
CONCLUSION
Defendants’ motion for a protective order [105] is granted in part. Defendants do not have to respond to any of Plaintiffs discovery'relating to the “Confidential Solutions Methods” until Plaintiff has identified, with reasonable particularity, the trade secrets which Plaintiff contends it disclosed to Defendants. Within 21 days of this Order, Plaintiff must amend its responses to Defendants’ Interrogatory Nos. 1, 15 and 16, consistent with this Opinion & Order.
IT IS SO ORDERED.
Notes
. Plaintiff’s Response to Interrogatory No. 1 refers the reader to the information outlined in its Responses to Interrogatory Nos. 15 and 16.
. Numerous courts -have held that a party alleging a claim for misappropriation of trade
. California Code of Civil Procedure § 2019.20 provides that ”[i]n any action alleging the misappropriation of a trade secret under the Uniform Trade Secrets Act ..., before commencing discovery relating to the trade secret, the party alleging the misappropriation shall identify the trade secret with reasonable particularity!)]” Oregon has not enacted any such rule,
. The Judicial Conference of the United States approved several significant proposed changes to the Federal Rules of Civil Procedure, including changes to Rule 26(b). These proposed changes will become effective December 1, 2015. This ruling is based on the Rules that are now in effect.
. Five of the six cases cited by Plaintiff do not directly address whether or not a plaintiff may reserve-the-right to supplement its trade secret identification after receiving discovery from a defendant. See DeRubeis v. Witten Technologies, Inc.,
