UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
___________________________________
|
|
) |
|
|
UNITED STATES OF AMERICA, |
) |
|
|
|
) |
|
|
Plaintiff, |
) |
Civil Action |
|
|
) |
|
|
- against - |
) |
No. 72-344 (AGS) |
|
|
) |
|
|
INTERNATIONAL BUSINESS |
) |
|
|
MACHINES CORPORATION, |
) |
|
|
|
) |
|
|
Defendant. |
) |
|
|
___________________________________ |
) |
|
MEMORANDUM ON PROTECTIVE ORDER ISSUES
______________________________________
Kent Brown (KB-5429)
Sanford M. Adler (SA-7428)
Richard L. Irvine (RI-8783)
Ian Simmons (IS-7468)
James J. Tierney (JT-7842)
U.S. Department of Justice
Antitrust Division
555 4th Street, N.W.
Suite 9901
Washington, D.C. 20001
(202) 307-0797
Attorneys for Plaintiff United States of America
David Turetsky
Deputy Assistant Attorney General
Rebecca P. Dick
Deputy Director of Operations
N. Scott Sacks
Assistant Chief, Computer and Finance Section
August 21, 1995
Page i
TABLE OF CONTENTS
I. OPEN ISSUES............................................................................................................................. 1
A. IBM's business employees and in-house counsel should not obtain confidential
information............................................................................................................... 1
B. The protective order should provide a mechanism to allow third parties to provide
meaningful assistance................................................................................................ 7
C. Government's right to retain and use confidential information for law enforcement
purposes................................................................................................................... 9
D. IBM's remaining objections to the Government's proposed
protective order are without merit ............................................................................. 10
1. Inadvertent waiver of attorney-client privilege................................................ 10
2. Advance disclosure of economic experts and persons who have had prior
access to confidential information.................................................................. 10
3. Confidentiality designations.......................................................................... 11
4. Separate ESO/TUO Investigation.................................................................. 11
II. DISCUSSION............................................................................................................................ 12
A. To prevent the harm that would result from disclosure, the Court should deny
IBM's business employees and in-house lawyers access to nonparty confidential
information ............................................................................................................. 12
B. Third party requests for access to confidential information are foreseeable and
therefore the protective order should include a mechanism to consider such
requests................................................................................................................... 18
C. Established Department practice and statutes recognize the Department's right to
use and maintain documents for law enforcement purposes ......................................... 19
D. IBM offers no principled basis for objecting to the Government's other proposals.......... 21
1. The Government will not agree to overrule establish Second Circuit law
regarding the inadvertent production of privileged documents.......................... 21
2. The Court should deny IBM the unfair advantage it seeks to gain by
requiring advance disclosure of the identity of economic experts and
investigative contacts ................................................................................... 22
3. The protective order should protect against over-inclusive confidentiality
designations................................................................................................. 24
Page ii
III. CONCLUSION......................................................................................................................... 25
Page iii
TABLE OF AUTHORITIES
Cases
Amsted Indus. Inc. v. National Castings, Inc.,
1988 WL 90022 (N.D. Ill. 1988) ....................................................................................................... 16
Bayer AG v. Barr Laboratories, Inc.,
1995 WL 334727 (S.D.N.Y., June 6, 1995)........................................................................................ 19
Brown Bag Software v. Symantec Corp.,
960 F.2d 1465 (9th Cir.), cert. denied sub nom. BB Asset Management v. Symantec Corp,
113 S. Ct. 198 (1992)................................................................................................................... 13- 14
Chesa Inter., Ltd. v. Fashoin Assoc., Inc.,
425 F. Supp. 234 (S.D.N.Y. 1977)..................................................................................................... 16
Coca-Cola Bottling Co. of Shreveport, Inc. v. Coca-Cola Co.,
107 F.R.D. 288 (D. Del. 1985)........................................................................................................... 13
Culligan v. Yamaha Motor Corp.,
110 F.R.D. 122 (S.D.N.Y. 1986)........................................................................................................ 16
Dart Indus., Co. v. Westwood Chemical Co.,
649 F.2d 646 (9th Cir. 1980).............................................................................................................. 15
Dove v. Atlantic Capital Corp.,
963 F.2d 15 (2d Cir. 1992)................................................................................................................ 13
F.T.C. v. Exxon Corp.,
636 F.2d 1336 (D.C. Cir. 1980)......................................................................................................... 13
Heublein, Inc. v. E & J Gallo Winery, Inc.,
1995 WL 168846 (S.D.N.Y. April 4, 1995)........................................................................................ 13
In re Independent Serv. Org. Antitrust Litig.
1995 WL 151739 (D. Kan. March 9, 1995)......................................................................................... 22
Jochims v. Isuzu Motors, Ltd.,
145 F.R.D. 499 (S.D. Iowa 1992)....................................................................................................... 19
Levy v. Weksel,
143 F.R.D. 54 (S.D.N.Y 1992)........................................................................................................... 25
Maryland Cas. Co. v. W. R. Grace & Co.,
1994 LEXIS 11141 (S.D.N.Y., August 10, 1984)................................................................................ 19
Quotron Systems v. Automatic Data Processing,
141 F.R.D. 37 (S.D.N.Y. 1992).......................................................................................................... 16
Richard Wolf Medical Instruments Corp. v. Dory,
Page iv
130 F.R.D. 389 (N.D. Ill. 1990)......................................................................................................... 19
Safe Flight Instruments Corp. v. Sundstrand Data Control, Inc.,
682 F. Supp. 20 (D. Del. 1988)..................................................................................................... 15- 16
Stratagem Dev. Corp. v. Heron Int'l. N.V.,
153 F.R.D. 535 (S.D.N.Y. 1994)........................................................................................................ 21
United States v. CBS, Inc.,
103 F.R.D. 365 (C.D. Cal. 1984)........................................................................................................ 15
United States v. IBM,
No. 72-344 (AGS), slip op. (S.D.N.Y. June 16, 1993)........................................................................... 9
United States v. GAF Corp.,
596 F.2d 10 (2d Cir. 1979)................................................................................................................ 15
United States v. Microsoft, Corp.,
No. C-95-139 WHO (N.D. Calif., May 11, 1995)................................................................................ 16
Statutes
Antitrust Civil Process Act, 15 U.S.C. ァァ 1311-1314........................................................................... 20
Federal Records Act, 44 U.S.C.ァ 3101, et seq..................................................................................... 20
Hart-Scott-Rodino Antitrust Improvements Act of 1976, 15 U.S.C. ァ 18a.............................................. 21
Rules/Miscellaneous
Fed. R. Civ. P. 26(b)(4)(B)................................................................................................................ 24
Fed. R. Civ. P. 26(c)................................................................................................................ 13, 24, 25
H.R. Rep. No. 94-1343, 1976 U.S. Code Cong & Admin News 2596.................................................... 21
Local Rule 46(c)............................................................................................................................... 24
Statement of Basis and Purposes,
43 Fed. Reg. 33,450 (July 31, 1978)................................................................................................... 21
U.S. Dep't of Justice Antitrust Division
Directive ATR 2710.1 (revised April 17, 1992)................................................................................... 20
The United States submits this Memorandum in support of its motion for a protective order and in
Page 2
opposition to defendant International Business Machine Corporation's ("IBM") motion for a protective
order.
I. OPEN ISSUES
The undersigned certifies that the Government and IBM have negotiated in good faith to agree on
all aspects of a confidentiality stipulation and protective order, but despite our best efforts, three principal
issues divide the parties:
A. IBM's business employees and in-house counsel should not obtain confidential information
The parties have been unable to agree on the appropriate designation of confidential information
and the scope of disclosure. IBM's proposed protective order contains a two-tiered designation system.
IBM would classify research and development information and trade secrets as "confidential" and would
classify other information that, if disclosed, would "materially affect the producing party's business,
commercial or financial interests" as "highly confidential." The Government's proposed protective order
protects the identical information, but combines the information into a single "confidential" classification.
(Compare Gov't Protect. Ord., Ex.1 at カ 1(a) with IBM Protect. Ord., Ex. 2 at カ 1(a) & (b).) Under IBM's
two-tiered classification system, nonparty research and development information and trade secrets
designated "confidential" could be disclosed to an unknown and potentially unlimited number of IBM
"directors, officers, and employees." Information designated "highly confidential" could be disclosed to an
unknown number of unidentified IBM in-house litigation counsel.
To prevent competitive injury that would flow from disclosing another person's commercially-
sensitive information to IBM, the Government's proposed protective order would deny IBM's business
employees and in-house counsel access to all confidential information, whether classified "confidential" or
"highly confidential" under IBM's proposal. The Government's proposed protective order, however,
permits IBM's outside counsel and independent experts to have access to such confidential information.
(Compare Gov't Protect. Ord., Ex. 1 at カ 7(c), (d), and (g) with IBM Protect. Ord., Ex. 2 at カカ 6(c)-(f) and
7(c)-(e).) The Government's proposed protective order strikes the appropriate balance between IBM's need
for access to another person's confidential information against the risks and consequences of disclosure of
Page 3
such information to IBM's business employees and in-house counsel.
Resolution of IBM's motion to terminate the judgment will require an assessment of the likely
competitive effect of judgment termination in markets for AS/400 and System/360 ... 390 products and
services. This assessment will require the production of highly-sensitive commercial information from
IBM and from IBM's competitors, customers and other persons who are not parties in this litigation.
(Brown Decl. Ex. 3 at カ 2.)
The Government has initiated efforts to obtain relevant commercial information from IBM. Under
the terms of an interim confidentiality agreement, IBM has produced a handful of its recent AS/400 and
System/360 ... 390 marketing plans. IBM has characterized these plans as "constitut[ing] some of the most
sensitive commercial information in the IBM company." (IBM's Memorandum in Support of its Motion
for Entry of an Appropriate Protective Order to Govern Confidential Information ("IBM Protect. Memo.")
at 1.) The Government's August 4, 1995, discovery request seeks from IBM additional information,
including sales, marketing, advertising and research and development plans and strategies; price, profit and
cost analyses and data; and customer information and other competitive information. IBM has
characterized this additional information as "highly sensitive commercial information." Id.
The Government has informed third parties that it will need to obtain similarly "highly sensitive
commercial information" from IBM's competitors, customers and other third parties. (Brown Decl. Ex. 3
at カ 2.) IBM's one-sided proposed protective order fails to adequately protect the rights and needs of those
nonparties.
Because nonparty commercially-sensitive information is critical to the resolution of the issues
raised by IBM's motion, the Government has described and provided copies, when time permitted, of
IBM's and its proposed protective orders to various IBM competitors and other parties from whom we will
need to obtain information. In response, IBM's direct competitors in the United States and abroad in the
following markets provided declarations: (1) large scale mainframe systems which are architecturally
compatible with the IBM System/360 ... 390 (Amdahl Corporation, Hitachi Data Systems Corporation, and
Fujitsu Limited); (2) repair and maintenance of IBM's AS/400 and System/360 ... 390 products (Bell
Page 4
Atlantic Business Systems Services ("BABSS")); (3) the sale of used IBM equipment (Nelco, Ltd.; AT&T
Systems Leasing Corporation ("AT&T"); El Camino Resources; Computer Sales International, Inc.; and
Meridian Leasing Corporation); and (4) financing of both new and used IBM equipment (Nelco, AT&T,
El Camino, Meridian Leasing, and Computer Sales International). Several of these IBM competitors are
also authorized IBM dealers (Nelco and El Camino). The Government also obtained a declaration from
Computer Lessors and Dealers Association ("CDLA") and a letter outlining the expected testimony, after
her recovery from illness, of the Executive Director of Independent Service Network International
("ISNI"), two industry trade associations. (Brown Decl. Ex. 3 at カ 3.) 1
The nonparty declarants are unanimously opposed to IBM's proposal to allow IBM's business
employees and in-house lawyers to have access to their commercially-sensitive information, whether
classified "confidential" or highly confidential," and unanimous in their support of the Government's
proposed protective order that limits disclosure to IBM's outside counsel and independent experts.
(Handschuh Decl. Ex. 4 at カ 7; Recker Decl. Ex. 5 at カカ 6-7; Felice Decl. Ex. 6 at カカ 10-12; Poisson Decl.
Ex. 7 at カカ 12-13; Steinback Decl. Ex. 8 at カカ 7-8; Harmon Decl. Ex. 9 at カカ 10-11; Yamaji Decl. Ex. 10 at
カ 7; Hansen Decl. Ex. 11 at カカ 11-12; Polster Decl. Ex. 12 at カカ 8-9; Nelson Decl. Ex. 13 at カカ 10-11; see
also Letter from Eiszner to Brown of 8/15/95, Ex. 14 at 2.) Gregory Handschuh, Amdahl's Vice President
and General Counsel, succinctly states the position of all declarants:
Amdahl has been advised that the Government has proposed a protective order in which
disclosure of any information provided by Amdahl and designated as confidential and
proprietary would be limited to outside counsel and outside experts, and has seen a copy
of the proposed protective order as provided to IBM on August 4, 1995. Amdahl strongly
Page 5
endorses the limitations on disclosure contained in the proposed protective order as
necessary to the adequate protection of any information provided by Amdahl which it
considers to be proprietary and confidential.
(Handschuh Decl. Ex. 4 at カ 7.)
All declarants state that they expect the Government to request the production of information
relating to sales and customers; business plans and strategies; research and development information and
technology assessment studies; and sales, price and cost analyses and data. (See, e.g., Felice Decl. Ex. 6 at
カ 5; Harmon Decl. Ex. 9 at カ 4.) The Government will indeed seek this information. (Brown Decl. Ex. 3
at カ 2.) Each declarant indicates that this type of information is "highly sensitive" or "highly confidential"
and that disclosure to IBM would give IBM a significant competitive advantage and severely jeopardize its
ability to compete in relevant AS/400 and System 360 ... 390 markets. (See, e.g., Recker Decl. Ex. 5 at カカ
4-5; Felice Decl. Ex. 6 at カカ 5, 8; Nelson Decl. Ex. 13 at カカ 4, 6-7.) The danger of competitive harm is
especially acute here because IBM is the dominant competitor in the manufacture of System/360 ... 390
compatible processors (Handschuh Decl. Ex. 4 at カ 3); the provision of repair and maintenance service for
the AS/400 and System/360 ... 390 (Felice Decl. Ex. 6 at カ 2); the sale of used AS/400 and System/360 ...
390 equipment (Nelson Decl. Ex. 13 at カ 3); and the provision of financing for AS/400 and System/360 ...
390 equipment (Id.).
The concerns expressed by Stephen J. Felice, Vice President of Sales and Operations of BABSS,
are representative:
BABSS is opposed to disclosure of its confidential information to any employees of IBM,
even if there were provisions in the applicable protective order that required the IBM
employees to use BABSS confidential information solely for purposes of the consent
decree termination proceedings. Assuming the bona fides intentions of IBM employees to
comply with such a requirement, BABSS nevertheless believes that employees of IBM
will be unable to comply with the order. As a practical matter, it is difficult for a person,
who is given highly confidential information that is to be used for one purpose, not to use
that information -- even if unintentionally or subconsciously -- for another purpose.
Moreover, should this happen, enforcement of the protective order is nearly impossible.
(Felice Decl. Ex. 6 at カ 11.)
Page 6
The declarants offer concrete examples of the competitive harm that could flow from disclosure of
commercially-sensitive information to IBM business employees. David E. Harmon, President of El
Camino, correctly surmises that the Government may ask for bid documents and explains that such
documents appear to be the type of document IBM would classify as "confidential" and, therefore, be
subject to disclosure to IBM business employees. (Harmon Decl. Ex. 9 at カ 6.) These documents, when
viewed as a whole, will reveal El Camino's targeted customer base, its overall bidding strategy and pricing,
and disclosure of this information "to the dominant market participant, IBM would be disastrous." (Id.)
Similarly, research and development information appears to be the type of information IBM might classify
as "confidential." Research and development information might include BABSS' proprietary advanced
diagnostics services and tools and methodologies for use in servicing IBM equipment. This information,
in the hands of IBM business employees, could be used to neutralize BABSS' attempts to differentiate its
service from IBM's. (Felice Decl. Ex. 6 at カ 7.) Disclosure to IBM business employees might also place in
jeopardy nonparty relationships with their customers because customer confidential information contained
in nonparty documents might be disclosed. (Recker Decl. Ex. 5 at カ 5.) Certain competitors, such as
Amdahl and Hitachi, are particularly susceptible to serious competitive injury because their customers are
dependent on the System/360 ... 390 operating system and related software, which are controlled by IBM.
(Handschuh Decl. Ex. 4 at カ 6; Hansen Decl. Ex. 11 at カ 7.)
The competitive concerns are not eliminated even if a nonparty's confidential information is
disclosed only to IBM's in-house counsel. Several declarants expressed concern that IBM intends to grant
an unknown number of unnamed in-house litigators access to their confidential information. (Poisson
Decl. Ex. 7 at カ 10; Harmon Decl. Ex. 9 at カ 8; Nelson Decl. Ex. 13 at カ 8.) Others expressed concern that
IBM has failed to provide any assurance that IBM in-house litigators "will not later act in a business
capacity for IBM or will not provide counsel in transactional matters at a later date." (Nelson Decl. Ex. 13
at カ 8; accord, Felice Decl. Ex. 6 at カ 12; Handschuh Decl. Ex. 4 at カ 8; Poisson Decl. Ex. 7 at カ 10;
Steinback Decl. Ex. 8 at カ 6; Harmon Decl. Ex. 9 at カ 8; Polster Decl. Ex. 12 at カ 7.) Simply curing these
defects, however, will not remove the risk that disclosure of confidential information could alter the current
Page 7 .
playing field on which the declarants compete with IBM. Several declarants have legally obtained IBM-
related transactional data from IBM customers who have entered into confidentiality agreements with IBM.
If this information were disclosed to IBM's in-house litigators, they would be in a better position to
recommend the drafting of stricter or different confidentiality agreements, to the detriment of IBM's
competitors. (Harmon Decl. Ex. 9 at カ 9; Polster Decl. Ex. 12 at カ 7; Nelson Decl. Ex. 13 at カ 9.)
Declarants also note that IBM is represented by outside counsel with vast experience in handling
IBM's antitrust litigation in the computer industry, thus minimizing any need for IBM's in-house litigators
to review the confidential information of third parties. (Felice Decl. Ex. 6 at カ 12; Poisson Decl. Ex. 7 at カ
10; Harmon Decl. Ex. 9 at カ 8; Nelson Decl. Ex. 13 at カ 8; see also Brown Decl. Ex. 3 at カ 17.)
Most nonparty declarants have indicated their willingness to respond to reasonable requests for
information to aid the Government's and the Court's consideration of IBM's motion to terminate if, at a
minimum, any protective order restricts disclosure of their confidential information to IBM's outside
counsel and independent experts. If such safeguards are not in place, these same declarants state that they
may each separately intervene to prevent disclosure of their confidential information to IBM's business
employees and in-house lawyers. (Handschuh Decl. Ex. 4 at カ 9; Recker Decl. Ex. 5 at カカ 6-7; Felice
Decl. Ex. 6 at カカ 9-10; Poisson Decl. Ex. 7 at カカ 12-13; Steinback Decl. Ex. 8 at カカ 7-8; Harmon Decl. Ex.
9 at カカ 10-11; Yamaji Decl. Ex. 10 at カカ 6-7; Polster Decl. Ex. 12 at カカ 8-9; Nelson Decl. Ex. 13 at カカ 10-
11.) Moreover, two declarants with relevant information located outside the United States state that,
without adequate safeguards, they will be less inclined to provide such information that may be beyond the
Court's power to compel. (Handschuh Decl. Ex. 4 at カ 9; Felice Decl. Ex. 6 at カ 9.) Thus, IBM's proposed
order would impede discovery and force the Court to act on numerous individual requests for additional
protection. (Brown Decl. Ex. 3 at カ 4.)
B. The protective order should provide a mechanism to allow third parties
to provide meaningful assistance
IBM's proposed protective order fails to provide a mechanism to allow third parties to gain access
to IBM confidential information to assist the Government and the Court in analyzing the competitive
Page 8
effects of terminating the Final Judgment. 2
The Government's proposed protective order expressly provides for the possibility that IBM's
confidential information may have to be disclosed to third parties to allow them to assist the Government
and permit their meaningful participation as amicus curiae. (Gov't Protect. Ord., Ex. 1 at カ 7(i).) Just as
the protective order must prohibit the inappropriate disclosure of nonparty confidential information to
IBM, the Government is mindful that adequate safeguards must be in place to protect against the
inappropriate disclosure of confidential information of IBM or other persons to any third parties who may
assist the Government in this action. Accordingly, any disclosure of confidential information to third
parties would be subject to the same terms as apply to IBM and, thus, would be limited to a third party's
outside counsel and independent experts. (Id. at カ 7; Brown Decl. Ex. 3 at カカ 9-10.) To further minimize
any risk, no disclosure will be made to any third party assisting the Government or the Court as amicus
curiae without first giving the protected party notice and the opportunity to object. (Gov't Protect. Ord.,
Ex. 1 at カカ 7(i), 8; see Brown Decl. Ex. 3 at カ 10.) If the protected party objects, the Government's
proposed protective order would prohibit disclosure until after the Court has ruled. (Id.) 3 This is the same
procedure that currently exists under the Interim Confidentiality Agreement. (Brown Decl. Ex. 3 at カ 14;
Barbur Decl. Ex. F.)
The Government, in opposing intervention in this case, argued that some third parties may
nonetheless assist in developing evidence on the competitive effects of judgment termination and might
also assist the Court as traditional amicus, or in a more active role as "litigation amicus curiae."
(Consolidated Opposition of the United States to Motions to Intervene and Preliminary Recommendations
Regarding Participation by Amicus Curiae at 3, 18-20.)
Page 9 . .
The Government continues to believe that third-party assistance will be useful to development of
an adequate record, in view of the complexity and unusual posture of this case and IBM's objections to an
investigation with meaningful discovery. (Brown Decl. Ex. 3 at カカ 5-8.) The Government has sought in
the past, and anticipates it will continue to seek, information and analysis from at least two third parties,
ISNI and CDLA. (Id. at カ 8.) The Government also anticipates that it may seek to disclose IBM
confidential information to ISNI and CDLA to obtain their assessment of it. (Id.) ISNI and CDLA stand
ready to participate in any way appropriate and, if granted access to IBM confidential information, agree to
be bound by the terms of any protective entered by the Court. (Poisson Decl. Ex. 7 at カ 6; Eiszner Letter,
Ex. 14 at 2.)
ISNI and CDLA also indicate that they will seek leave of the Court to participate in this case
beyond the role traditionally exercised by amicus curiae and will seek access to IBM's confidential
information in order to present expert testimony. (Poisson Decl. Ex. 7 at カカ 2, 4; Eiszner Letter, Ex. 14 at
1-2.) Such expert testimony could facilitate the development of a more complete record for the Court, and
ISNI's and CDLA's outside counsel and independent experts may need access to IBM confidential
information to participate in a meaningful way. (Brown Decl. Ex. 3 at カ 11.)
The Court, in denying intervention, indicated that it would consider applications to participate in
this action as amicus curiae and noted that the Government contemplated a more substantial role for some
third parties as "litigating amici." United States v. IBM, No. 72-344 (AGS), slip. op. at 6-7 (S.D.N.Y. June
16, 1995) (Ex. 17). The Court mentioned "the Government's position because it further confirms that
status other than that of formal intervenor will adequately protect the interests of the Proposed
Intervenors." Id.
The Government's proposed protective order does not confer any rights on any third party, nor
does it grant them access to confidential information. It simply establishes a procedure through which the
Government or the Court may at some future date seek the assistance of third parties, in anticipation that
some third parties may need access to confidential material to offer meaningful assistance. The propriety
of any disclosure can be considered at the time a disclosure request is made. In contrast, IBM has refused
Page 10 . . .
even to include a mechanism in its proposed protective order for third parties to request access to
confidential information.
C. Government's right to retain and use confidential information for law enforcement purposes
Guided by strong public policy, standard Department practice is to seek protective orders
containing provisions that expressly grant the Government the right to use and maintain confidential
information for law enforcement purposes. Thus, the Government proposes the inclusion of a savings
clause to permit disclosure of confidential information, after taking appropriate steps to preserve the
confidentiality of such information, to authorized representatives of the Executive Branch, in the course of
legal proceedings to which the Government is a party, for securing compliance with the final judgment,
and for law enforcement purposes or as otherwise required by law. (Gov't Protect. Ord. Ex. 1 at カ 10(b).)
In any legal proceeding (other than this action or a grand jury proceeding) in which the Department intends
to disclose confidential information, the Department will provide advance notice. ( Id. at カ 11.)
Additionally, the Government could retain confidential information after termination of these proceedings
for law enforcement purposes or as otherwise required by law. (Id. at カ 15.)
IBM would limit the Department's use of confidential information to final judgment proceedings
or where expressly authorized by law. (IBM Protect. Ord. Ex. 2 at カカ 10 & 15.) IBM offers no reasoned
basis for opposing the Government's proposal, nor does it explain how its confidentiality concerns are not
fully protected under that proposal.
The provisions proposed by the Government are essential to permit the Department to carry out its
law enforcement mission of protecting competition. (Brown Decl. Ex. 3 at カ 18.)
D. IBM's remaining objections to the Government's proposed
protective order are without merit
1. Inadvertent waiver of attorney-client privilege
The parties disagree as to whether the Court should enter a protective order that overrules
established Second Circuit law regarding the inadvertent production of privileged documents. The
Government agrees to be bound by the law of the Second Circuit and has proposed an appropriate
Page 11 . .
mechanism to allow a producing party expeditiously to obtain the return of any inadvertently produced
document without resort to the Court. The Government proposes that, upon receiving notice that a
privileged document has been inadvertently produced, the receiving party thereafter will make no use of it
and will preserve the status quo. If the producing party can establish that the document was inadvertently
produced, for example, by providing an affidavit explaining the circumstance of the production, the
document will be returned. IBM, on the other hand, demands the return of any document claimed to have
been inadvertently produced and would deny the receiving party and the Court the right to inquire into the
possibility of waiver based on the circumstances of the disclosure. 4 (Compare Gov't Protect. Ord., Ex. 1 at
カ 14 with IBM Protect. Ord., Ex. 2 at カ 14.)
2. Advance disclosure of economic experts and persons who have
had prior access to confidential information
IBM's proposed protective order would require the Government to give IBM notice before
disclosing confidential information to independent economic experts or to any person whom counsel for
any party in good faith believes to have been a participant in the confidential communication. The
Government will not stipulate to requiring advance notice in these two situations, because such notice is
not necessary to protect IBM's legitimate interests and serves only to give IBM an unfair litigation
advantage. (Compare Gov't Protect. Ord. Ex. 1 at カ 7(d), (f) with IBM Protect. Ord. Ex. 2 at カカ 6(f), (h)
and 7(e), (g).)
3. Confidentiality designations
The Government's proposed protective order contains two provisions to ensure that the producing
parties are not over-inclusive in their designation of confidential information and that the public will have
the greatest possible access to the proceedings consistent with the need to protect confidential information.
Page 12 . .
The Government would require that all confidential designations be made in good faith. IBM refuses to
make this commitment. (Compare Gov't Protect. Ord., Ex. 1 at カ 2 with IBM Protect. Ord., Ex. 2 at カ 2.)
The Government also would require that confidential portions of documents be specifically marked where
the entire document is not confidential. Again, IBM refuses to make this commitment. (Compare Gov't
Protect. Ord., Ex. 1 at カ 4 with IBM Protect. Ord., Ex. 2 at カ 3.)
4. Separate ESO/TUO Investigation
IBM seeks entry of an "appropriate protective order" governing the handling of materials it
produces in response to the Government's request for information and documents issued in an independent
investigation of whether IBM has violated the judgment with its marketing practices for its Enterprise
Server Offering (ESO) and Technology Upgrade Option (TUO). (IBM Protec. Memo. at 4 n.3.) This
request should be denied for several reasons. First, Section XVIII of the Final Judgment contains
provisions to which IBM has already consented for treatment of the information IBM produces in the
ESO/TUO investigation. Second, making discovery in the ESO/TUO investigation a part of the discovery
in this proceeding will needlessly interfere with and delay the independent ESO/TUO investigation. IBM
has made it clear that it opposes unilateral Government investigative discovery and will refuse to produce
additional information or allow any depositions in this proceeding unless it is able to conduct
simultaneously equivalent bilateral discovery of the Government. (IBM Protect. Memo. at 3; Brown Decl.
Ex. 3 at カカ 6 & 7.) This would substantially delay the ESO/TUO investigation. Finally, the separate
ESO/TUO investigation is not properly before this Court. If IBM seeks to have the Government's
ESO/TUO judgment violation investigation collapsed into this proceeding, the Court should require that
IBM file a motion that would permit a full briefing on the issues. The Government respectfully requests
that the Court refrain from reaching any decision on the scope or conduct of the ESO/TUO investigation
on the basis of claims tangentially raised by IBM in its papers in this proceeding.
II. DISCUSSION
A. To prevent the harm that would result from disclosure, the Court should deny IBM's business
employees and in-house lawyers access to nonparty confidential information
Page 13 . . . . . .
IBM's proposed protective order exploits the fact that its competitors, who must produce
commercially-sensitive information in this action, are not now before the Court to protect their interests.
Entry of IBM's protective order will chill third-party participation and give IBM a competitive advantage
because its directors, officers, employees, and in-house litigators would have access to competitively
sensitive nonparty information, while its competitors would be denied equal access to IBM's competitively
sensitive information. This would be an ironic result in an action that is intended to ensure that
competition is not suppressed in the AS/400 and System/360 ... 390 markets that are now dominated by
IBM.
IBM seeks to justify disclosure of confidential information to IBM personnel with the conclusory
and unsupported statement that it needs to disclose nonparty confidential information to its directors,
officers, employees, and in-house litigators to pursue its pending motion to terminate. (IBM Protec.
Memo. at 10-11.) Balanced against these self-serving remarks by counsel are declarations from 10
nonparties who may be called upon to provide confidential information that IBM would then have the right
to disclose to its business employees and in-house counsel. Each declarant objects to IBM's proposed
protective order on the ground that disclosure to IBM employees would cause irreparable competitive
harm. Each strongly endorses the Government's proposed protective order that would limit disclosure to
IBM's outside counsel and independent experts.
Fed. R. Civ. P. 26(c) (7) provides, in pertinent part, that, upon motion by a party or by the person
from whom discovery is sought and for "good cause" shown, the court "may make any order which justice
requires to protect a party or person" so "that a trade secret or other confidential research, development, or
commercial information not be disclosed or be disclosed only in a designated way." The grant or denial of
a protective order rests within the sound discretion of the trial court. Dove v. Atlantic Capital Corp., 963
F.2d 15, 19 (2d Cir. 1992).
In exercising its discretion, the Court must balance the need of IBM's business employees and
inside counsel for the information against the injury that might result if disclosure is ordered. Brown Bag
Software v. Symantec Corp., 960 F.2d 1465, 1470 (9th Cir.) cert. denied sub nom. BB Asset Management
Page 14 .
v. Symantec Corp., 113 S. Ct. 198 (1992); Coca-Cola Bottling Co. of Shreveport, Inc. v. Coca-Cola Co.,
107 F.R.D. 288, 293 (D. Del. 1985); Heublein, Inc. v. E & J Gallo Winery, Inc., 1995 WL 168846 at 2
(S.D.N.Y. April 4, 1995). The Government recognizes that courts sometimes allow in-house counsel
access to confidential information. Where disclosure would present risks of competitive harm, however,
courts have not hesitated to deny in-house counsel access to confidential information. See, e.g., F.T.C. v.
Exxon Corp., 636 F.2d 1336, 1349-51 (D.C. Cir. 1980); Brown Bag Software, 960 F.2d at 1471;
Heublein, Inc., 1995 WL 168846 at 3. Courts are cautious when granting in-house counsel access to
confidential information because they frequently interact with business attorneys and other employees
outside the litigation setting. Courts do not question the integrity of in-house counsel, but recognize that
an in-house lawyer cannot "lock-up trade secrets in his mind, safe
from inadvertent disclosure to his employer once he had read the [confidential] documents." Brown Bag
Software, 960 F.2d at 1471. 5
IBM's proposed protective order and Mr. Rosenberg's declaration would permit IBM to disclose
confidential information to a "group" of unnamed in-house litigators. (IBM Protect. Ord., at カカ 6 (c), 7(c);
Rosenberg Decl. at カ 3.) Moreover, IBM fails to describe in detail any specific attorney's past, current and
anticipated future duties and activities. IBM simply asserts that all IBM's in-house litigators are not
involved in "competitive decision making." (Rosenberg Decl. at カ 3.) IBM offers no explanation of this
term or any factual basis on which this Court can evaluate the claim. IBM does state that in-house
litigators "serve as liaison between IBM's outside litigation counsel and IBM management." ( Id.) This
phrase, without explanation, raises a concern of inadvertent disclosure.
Even if IBM were belatedly to identify a specific attorney and fully detail the attorney's duties, the
Page 15 . . . .
risk of inadvertent use or disclosure of confidential information remains a major concern. During
negotiations to narrow our differences, IBM identified Anthony Clapes and Donald Rosenberg as two
in-house attorneys who might receive nonparty confidential information. Although IBM indicates that
these gentlemen represent the company in litigation matters (Rosenberg Decl. at カ 3), one competitor
believes Mr. Clapes, who supervises Mr. Rosenberg, may play a broader role, including "advocating
business and legal policy on behalf of IBM, particularly as they relate to intellectual property and antitrust
matters." (Handschuh Decl. Ex. 4 at カ 8.) The Government is further concerned if IBM's in-house counsel
obtained confidential information from a competitor and then the two companies became involved in
litigation. IBM's in-house counsel would be placed in a serious conflict situation if counsel had obtained
confidential information that could be used to defend the company.
Three factors support the conclusion that the risk of injury to the producing party outweighs IBM's
need to disclose confidential information to its business employees and inside counsel: (1) the confidential
information sought to be disclosed belongs to nonparties; (2) IBM's role as the dominant competitor in the
relevant AS/400 and System/360 ... 390 markets; and (3) the lack of prejudice to IBM due to the
availability of experienced outside experts and counsel.
In exercising its discretion, the Court should recognize that nonparties are the real parties in
interest with respect to this information and it is their interests that the Court must protect. See United
States v. GAF Corp., 596 F.2d 10, 14 (2d Cir. 1979) ("real party in interest" in protecting disclosure of
documents is the party who provided the documents). Courts routinely provide greater protection to
confidential documents and information obtained from nonparties than that afforded to a party's own
confidential information. In Dart Indus., Co. v. Westwood Chemical Co., 649 F.2d 646, 649 (9th Cir.
1980), the Court stated:
While discovery is a valuable right and should not be unnecessarily restricted, Kyle
Engineering Co. v. Kleppe, 600 F.2d 226, 232 (9th Cir. 1979), the "necessary" restriction
may be broader when a nonparty is the target of discovery. As one district court has
noted, "[t]here appear to be quite strong considerations indicating that . . . discovery would
be more limited to protect third parties from harassment, inconvenience, or disclosure of
confidential documents." Collins and Aikman Corp. v. J.P. Stevens & Co., Inc., 51 F.R.D.
219, 221 (D.S.C. 1971).
Page 16 . . . . . .
Nonparties are entitled to even greater protection where, as here, a nonparty's confidential
information will be disclosed to a direct competitor. United States v. CBS, Inc., 103 F.R.D. 365, 368 (C.D.
Cal. 1984). As we described earlier, the declarants offered numerous ways in which competitive harm
could flow from the disclosure of nonparty confidential information.
Disclosure of confidential information to IBM's business employees poses even greater concerns.
Initially, IBM's proposal for a two-tiered confidentiality system is irrational because the tiers are
ambiguous and provide less protection for trade secrets than other commercially sensitive business
information. In Safe Flight Instruments Corp. v. Sundstrand Data Control, Inc., 682 F. Supp 20, 22 (D.
Del. 1988), the Court cites a long list of federal and state cases for the proposition that courts "often afford
fuller protection to technological information than that extended to ordinary business information." The
great weight of precedent favors heightened protection of trade secrets because "of the threat of serious
economic injury to the discloser of scientific information." Id.
For this reason, courts routinely deny a party's business employees access to confidential
information. Safe Flight Instrument Corp., 682 F. Supp at 22; Chesa Inter., Ltd. v. Fashion Assoc., Inc.,
425 F. Supp. 234, 237 (S.D.N.Y. 1977); Quotron Systems v. Automatic Data Processing, 141 F.R.D. 37,
40 (S.D.N.Y. 1992); Culligan v. Yamaha Motor Corp., 110 F.R.D. 122, 125-26 (S.D.N.Y. 1986).
Furthermore, IBM makes no evidentiary showing that its "need" to disclose confidential information to its
business employees outweighs the competitive risk.
The protective orders entered in Amsted Indus. Inc. v. National Castings, Inc., 1988 WL 90022
(N.D. Ill. 1988) and United States v. Microsoft, Corp., No. C-95-139 WHO (N.D. Calif., May 11, 1995)
(Ex. 20) are instructive. In Amsted Industries, a patent infringement case involving two direct competitors,
the plaintiff sought provisions in a protective order to allow disclosure of defendant's confidential
information to two of its business employees and one in-house lawyer. The defendant objected on the
ground that disclosure of confidential materials to its competitor's employees would result in irreparable
harm. Amsted Indus. Inc, 1988 WL 90022 at 1. In rejecting the plaintiff's request, the Court stated that
"the need for disclosure of even highly relevant information to a competitor may be outweighed by the
Page 17
irreparable harm that can result to the disclosing party." Id. The Court further recognized that, while the
plaintiff might benefit from the assistance of its own employees, its outside counsel "should be able to gain
the technical advice it needs from outside experts (to whom the parties agree disclosure may be made)."
Id. at 2.
In the litigated protective order entered in Microsoft, the Court reached the identical result in a
case involving nonparty confidential information. In Microsoft, the parties agreed to an Interim
Confidentiality Stipulation and Protective Order dated May 2, 1995, which prohibited disclosure of
confidential information except to outside counsel and independent experts. (Ex. 21 at カ D.2, 7; Brown
Decl. Ex. 3 at カ 15.) Thereafter, Microsoft moved for a permanent protective order that would have
established two categories of confidential information, permitting disclosure of all nonparty confidential
information to two designated inside counsel, and "less" confidential trade secrets to certain business
employees of the two defendant companies. (Brown Decl. Ex. 3 at カ 16.) Numerous nonparties who had
produced confidential information to the Government intervened, seeking to prevent disclosure to
defendants' business employees and inside counsel. (Id.) After considering these third-party complaints,
the Court rejected Microsoft's proposal and entered a protective order limiting disclosure to outside counsel
and independent experts. (Id.; Microsoft Pretrial Order Number 3, Confidentiality and Protective Order
(Ex. 20).) 6
IBM's proposal contains no useful criteria for distinguishing between the various levels of
confidentiality and that ambiguity presents the risk that third parties will make the wrong designation.
Further, IBM proposes no safeguards for the confidential information that it would disclose to an
unspecified number of unidentified business persons and in-house lawyers. It offers no explanation as to
Page 18 .
how it plans to bar recipients of confidential information from later participating in matters in which the
information may be relevant. Under these circumstances, third parties who produce confidential materials
could have no confidence that the information will not be inappropriately or inadvertently disclosed to their
disadvantage. We have shown earlier how these problems would impede discovery.
Finally, IBM is well represented by a prominent firm who has been representing IBM in this case
since before the complaint was filed in 1952. The individual outside counsel for IBM's outside law firm
who have appeared in this case have significant experience with the products and competitive issues that
are the subject of these proceedings. (Brown Decl. Ex. 2 at カ 17.) Under the Government's proposed
order, IBM's more detailed work with nonparties' confidential information would be handled by able and
informed outside counsel and independent experts. Of course, under the order, IBM's inside counsel and
business employees would still be able to advise and strategize; they just would be unable to review the
confidential information of IBM's competitors and customers.
For the foregoing reasons, disclosure to IBM's business employees and in-house counsel should
not be permitted. IBM has failed to make any showing of need for the information that outweighs the
competitive damage that would result from disclosure. Such disclosure is unnecessary and would
undermine competition in the AS/400 and System/360 ... 390 markets involved in the litigation, an ironic
consequence, if permitted by the Court.
B. Third party requests for access to confidential information are foreseeable and therefore the
protective order should include a mechanism to consider such requests
IBM objects to the Government's proposal that a protective order contain a mechanism to allow
third parties who assist the Government access to IBM protected material on the grounds that it would
create a "loophole" in the protective order and would permit the Government to freely disclose IBM
confidential information. (IBM Protect. Memo. at 21-22.) IBM offers the seemingly simple solution that
the order be left silent on the issue, thus allowing the Government to later seek a modification to allow
disclosure to third parties. (Id. at 22.)
But, no "loophole" is created. The Government's proposal simply creates a mechanism to permit
third parties to seek access to confidential material (produced by IBM or any other person). Confidential
Page 19 . . . . .
information can be disclosed only with the permission of the producing party or by order of the Court.
Should access to confidential information be granted, any third parties will be bound to the terms of the
protective order and therefore be subject to the same conditions as are applicable to IBM. This hardly
strips the protective order of "any meaning" or allows disclosure to "unidentified third persons." (Id. at 21-
22.)
Moreover, the Government may not later be able to obtain a modification of the protective order
under the stricter standards that govern changes, as opposed to the inclusion of initial provisions, in such
orders. Courts place a heavy burden on a party who seeks to modify a stipulated provision of a protective
order. Richard Wolf Medical Instruments Corp. v. Dory, 130 F.R.D. 389, 392 (N.D. Ill. 1990). Courts
consider whether the need for the modification was foreseeable at the time the parties negotiated the
original protective order. Jochims v. Isuzu, 145 F.R.D. 499, 502 (S.D. Iowa 1992) ("[n]ot surprisingly, a
party's oversight in not negotiating a provision . . . concerning a matter which should have been reasonably
foreseeable at the time of the agreement has been held to not constitute good cause for relief from the
protective order.") 7
ISNI and CDLA have stated that they intend to seek leave of the Court to participate as amicus
curiae, to present expert testimony to aid the Court, and to obtain access to confidential information.
(Poisson Decl. Ex. 7 at カカ 2, 4, 6; Eiszner Letter, Ex. 14 at 1-2.) In addition, the Government may ask
ISNI and CDLA for analysis or information responsive to an IBM submission that will require disclosure
of confidential information. (Brown Decl. Ex. 3 at カ 8.) Although the Government has not firmly decided
to disclose IBM confidential information to ISNI or CDLA, the possibility is clearly foreseeable and
indeed has been foreseen. It is preferable that this issue be resolved now so that all concerned, including
IBM, know that disclosure of their confidential information to third parties is conceivable and understand
Page 20 . . .
the procedures governing such disclosures and for objecting thereto.
Finally, the issue of whether ISNI or CDLA should be given access to confidential information is
not now before the Court need not be addressed now. In the absence of agreement of the parties, that
question is best presented to the Court in the context of a specific request to disclose confidential
information to a third party. At that time, the parties and the Court will be able to devote their attention to
the merits of the request without a needless digression into issues surrounding modification of a protective
order.
C. Established Department practice and statutes recognize the Department's right to use and documents for law enforcement purposes
IBM objects to the provision of the Government's protective order that specify additional
conditions under which the Government may use and disclose confidential information, subject to taking
appropriate steps to preserve the confidentiality of the information. (Gov't Protect. Ord., Ex. 1 at カ 10(b).)
These provisions permit the Government to preserve its ability to retain and use pertinent information for
law enforcement purposes and to make reports to appropriate Executive Branch officials. (Brown Decl.
Ex. 3 at カ 18.)
The provisions serve to implement U.S. Department of Justice Antitrust Division Directive ATR
2710.1 (revised April 17, 1992) (Ex. 23), promulgated pursuant to the Federal Records Act, 44 U.S.C. ァ
3101, et seq. Section 13.b(2) of the directive sets out five criteria under which government attorneys are
required to retain documents after the completion of an investigation or case. Two of those provisions
contemplate that the Government will use retained materials for other law enforcement purposes:
(b) The documents are relevant to a current or actively contemplated Department
investigation or case ...
* * *
(e) Copies of such documents will be of substantial assistance in the Division's
continuing enforcement responsibilities ....
U.S. Dep't of Justice Antitrust Division Directive ATR 2710.1 カ 13.b(2)(b), (e).
The provisions are also consistent with statutes governing the Department's right to retain and use
documents. The Antitrust Civil Process Act ("ACPA"), 15 U.S.C. ァァ 1311-1314, authorizes the
Page 21 . . . . . .
Department to keep copies of documents obtained during civil investigations. Specifically, the ACPA
provides that the Department's document custodian shall "upon written request of the person who produced
such material, return to such person any such material (other than copies thereof . . . made by the
Department of Justice pursuant to subsection (c) of the section)." 15 U.S.C. ァ 1313(e) (emphasis added).
The House Committee Report described how the public interest would be harmed if the Department were
required to return copies (as opposed to originals) of documents in its files:
Retention of copies in these instances will avoid needless future "rounds" of CIDs. Such
information is also important for consistent evenhanded enforcement: It details business practices
that have survived scrutiny, as well as those that have not, and by referring to them, the Division
may easily be able to vindicate similar practices that come under investigation at some future time.
Such equitable treatment may be impossible if the Division is immediately stripped of all such
information once it closes an investigation.
H.R. Rep. No. 94-1343, at 15 n.41, 1976 U.S. Code Cong. & Admin. News at 2610.
Similarly, requiring the return of documents is inconsistent with the Hart-Scott-Rodino Antitrust
Improvements Act of 1976 ("HSR Act"), 15 U.S.C. ァ 18a. In promulgating the Act's implementing
regulations, the Department and the Federal Trade Commission rejected proposals to require the return of
information submitted pursuant to the HSR Act, finding that
Nothing in the language or legislative history of the act appears to prohibit the use of data
submitted under the act for subsequent challenge to a reported acquisition or, in fact, for any other
law enforcement purposes. . . . To return materials after the waiting period expires could seriously
hinder later enforcement efforts.
Statement of Basis and Purposes, 43 Fed. Reg. 33,450, 33,518 (July 31, 1978) (emphasis added).
IBM has offered no principled explanation for its request that the Court enter an order inconsistent
with established Department policy and Congressional mandates and that would hamper the Government's
continuing law enforcement and reporting obligations.
D. IBM offers no principled basis for objecting to the Government's other proposals
1. The Government will not agree to overrule established Second Circuit law regarding
the inadvertent production of privileged documents
The parties are unable to agree on the treatment of inadvertently produced privileged documents.
The Government agrees that the protective order should contain a process for restoring the privilege for
inadvertently disclosed documents, but will not agree to IBM's proposal to overrule controlling legal
Page 22 . .
principles.
In this District, the inadvertent production of privileged documents does not generally result in a
waiver of the privilege. Stratagem Dev. Corp. v. Heron Int'l. N.V., 153 F.R.D. 535, 542-43 (S.D.N.Y.
1994). Whether a waiver has occurred depends on the circumstances of the production and the
reasonableness of the precautions taken. Id. IBM's protective order would allow it to inundate the
Government with requests for the return of any allegedly inadvertently produced document, not just
privileged documents. (IBM Protect. Ord. Ex. 2 at カ 14.) The Government and the Court would be
precluded from inquiring into the facts and circumstances of the alleged inadvertent production as a means
for testing whether the privilege or any other objection to production has been waived. 8
IBM has cited no case where the court, over the other party's objection, entered a protective order
requiring the return of inadvertently produced documents without even allowing an inquiry into the facts
and circumstances of the production. The protective orders entered in Comdisco and Phoenix Computer
Associates (Barbur Decl. at カ 12, Exs. I and J) were both entered by stipulation, as was the inadvertent
disclosure provision in the protective order at issue in In re Independent Serv. Org. Antitrust Litig. 1995
WL 151739 at 4 (D. Kan. March 9, 1995), cited in IBM's brief. (IBM Protect. Memo. at 17.)
The Government agrees to be bound by Second Circuit precedent and to establish an appropriate
process for restoring the privilege in the event of truly inadvertent disclosure. The Government will
stipulate to no more, nor should the Court set in place, over the Government's objection, a process that
does not provide for challenge and review of spurious claims of privilege.
2. The Court should deny IBM the unfair advantage it seeks to gain by requiring advance
disclosure of the identity of economic experts and investigative contacts
IBM would require the Government to give notice before disclosing confidential information to
economic experts and consultants and persons who have, or whom counsel "in good faith believes to have
had prior access to confidential information, or who have been participants in a communication that is the
Page 23
subject of the confidential information." (IBM Protect. Ord. Ex. 2 at カカ 6(h), 7(g).) In the case of persons
in the latter group, both protective orders require that counsel verify that the person had access to the
confidential information before making any disclosure. The Government's protective order, however, does
not require advanced notice be given because such notice is not necessary to protect IBM's confidentiality
interests and would give IBM an unfair litigation advantage. (Gov't Protect. Ord. Ex. 1 at カ 7(f).)
The parties' inability to reach agreement on this issue stems from our basic disagreement over the
nature of this proceeding. The Government has requested the opportunity to conduct an investigation to
obtain information necessary to take a position on the merits of IBM's motion as it applies to the AS/400
and System/360 ... 390 family of products. Thereafter, the parties could conduct any limited bilateral
discovery that may be necessary to prepare for an expedited hearing on any aspect of the judgment as to
which the Government concludes termination would not serve the public interest in competition. IBM
would force both the Government and the Court into making a hasty decision on the merits of IBM's
motion without the information necessary to assess the competitive issues.
The Government, during any investigation, does not advise the subject of the nature and scope of
its investigative activities. The same rule should apply here because IBM can make no showing that it will
be harmed by the disclosure of confidential information to economic experts and persons who have already
had access to the information. Economic experts and consultants for the Government must execute an
agreement certifying that they understand and agree to abide by the terms of the protective order. As to
any person who has had prior access to confidential information, once that fact is in good faith established
by counsel, there is no confidentiality interest to protect. In contrast, during the parties' discussions to
reach agreement on the terms of a stipulated protective order, IBM argued that in the past
technical/industry experts have misused IBM confidential information. Given this representation, the
Government agreed to give IBM advance notice before disclosure to technical or industry experts. In the
absence of a similar showing, the Government should be permitted to conduct its investigation without
undue interference allowed by IBM's premature discovery of economic experts and investigative contacts.
Moreover, identifying economic experts and consultants will give IBM a litigation advantage.
Page 24 . . . .
Generally, a party is not entitled to learn the identity of the other party's non-testifying experts. See Fed. R.
Civ. P. 26(b)(4)(B). Testifying experts need not be identified until bilateral discovery commences, and the
Local Rules contemplate that discovery of experts take place at or near the conclusion of discovery. Local
Rule 46(c). This Court should not allow IBM to use a protective order as a device to gain a litigation
advantage.
3. The protective order should protect against over-inclusive confidentiality designations
IBM has refused to include in its proposed protective order the requirement that a producing party
make a confidential designation in good faith and has objected to the requirement that portions of a
document be marked confidential where the entire document cannot, in good faith, be designated
confidential. (IBM Protec. Memo. at 19 n.6.)
Fed. R. Civ. P. 26(c) places the burden of establishing "good cause" for protecting confidential
information squarely on the party seeking protection. The Government presumes IBM does not intend to
misuse confidentiality designations and is, therefore, surprised that IBM will not acknowledge its
obligation to make "good cause" designations in good faith. Similarly, IBM cannot meet its good cause
burden if it stamps an entire document confidential where only a portion of that document is entitled to
such designation.
IBM's suggestion that the Government has the right to challenge any confidentiality designation
improperly shifts the burden to the Government. (IBM Protect. Memo. at 19 n.6.) The procedure for
challenging a designation create a means for a party to challenge a designation in violation of the
protective order; it does not relieve a designating party of its initial duty to designate only information that
falls within the scope of the order.
IBM's refusal to include provisions to prevent the over-designation of confidential information is
inconsistent with the strong public interest that designation of confidential information not have the effect
of closing judicial proceedings to public inspection. Levy v. Weksel, 143 F.R.D. 54, 55-56 (S.D.N.Y
1992). The provisions proposed by the Government are necessary to prevent over-designation of materials
as "confidential" and to ensure that these proceedings, which already will be closed in large part to public
Page 25 . . .
scrutiny due to the vast amount of properly designated information likely to be involved, will be as open as
possible. 9
Given the clear directive of Rule 26(c) and the need for open proceedings, the Government can see
no principled reason for IBM's refusal to agree to make only appropriate confidentiality designations in
good faith.
III. CONCLUSION
For the reasons outlined, the Court should reject IBM's protective order and grant the
Government's motion for entry of its proposed protective order.
Respectfully submitted,
_________________________
Kent Brown (KB-5429)
Sanford M. Adler (SA-7428)
Richard L. Irvine (RI-8783)
Ian Simmons (IS-7468)
James J. Tierney (JT-7842)
U.S. Department of Justice
Antitrust Division
555 4th Street, N.W.
Suite 9901
Washington, D.C. 20001
(202) 307-0797
August 21, 1995
Page 26
CERTIFICATE OF SERVICE
This is to certify that, by agreement of the parties, the United States' Memorandum on Protective
Order Issues was made available for pick-up at the Antitrust Division's New York Field Office, 26 Federal
Plaza, Room 3630, New York, New York, on August 21, 1995.
_________________________
James J. Tierney (JT-7842)
.
FOOTNOTES
1 The following persons submitted declarations in opposition to IBM's proposed protective order and in support of the Government's: Gregory Handschuh, Vice President and General Counsel of Amdahl Corporation (Ex. 4); James M. Recker, Vice President and Chief Counsel of AT&T (Ex. 5); Stephen J. Felice, Vice-President of Sales and Operations, BABSS (Ex. 6); David E. Poisson, President and Chief Operating Officer, CDLA (Ex. 7); Kenneth B. Steinback, Chairman and Chief Executive Officer, Computer Sales International, Inc. (Ex. 8); David E. Harmon, President, El Camino Resources (Ex. 9); Katsuro Yamaji, General Manager, Fujitsu Legal and Industry Relations Group (Ex. 10); Frederick W. Hansen, Executive Vice President of Hitachi Data Systems Corporation (Ex. 11); John Polster, Associate General Counsel, Meridian Leasing Corporation (Ex. 12); and Richard Nelson, President, Nelco, Ltd. (Ex. 13). The Government was unable to obtain a declaration from ISNI because of the severe illness of its Executive Director. James R. Eiszner, ISNI's outside counsel, discussed the issue of a protective order with the Executive Director before her illness and submitted a letter (Ex. 14) that reflects his understanding of ISNI's views. (Brown Decl. Ex. 3 at カ 3.)
2 IBM has consistently objected to any suggestion that a third party could have access to IBM's confidential information or have an opportunity to discuss the significance of such information with the Government. (Brown Decl. Ex. 3 at カカ 12-13.)
3 The Government's proposed protective order includes within the definition of "party" any third party who may be granted access to protected information pursuant to the terms of the order. Of course, including third parties in the definition does not confer upon them party status. They are included in the definition to make clear that, if they are authorized to review confidential information, they are bound by all of the terms of the protective order.
4 Moreover, IBM's proposed order seeks the return of inadvertently produced materials on any ground and is not limited to privileged information. Thus, it could permit demands for the return of information when further review might reveal that the information initially could have been withheld because, for example, it is not relevant or is merely cumulative of other information.
5 The balance of interests tipped in favor of allowing IBM's in-house litigation support staff access to confidential information. IBM represented that it routinely uses in-house clerical support staff and those individuals are not in a position to inadvertently misuse confidential information. Although IBM's support personnel will have to report to outside counsel, this should not present a hardship because outside counsel maintains offices at IBM's litigation unit in White Plains. (Brown Decl. Ex. 3 at カ 17.)
6 The stipulated protective orders cited by IBM (Barbur Decl. カ 12, Exs. I and J) provide no support for IBM's broad proposal to disclose confidential information to all IBM in-house litigation counsel in this case. Because the protective orders in those cases were consensual, no decision was made as to the merits of disclosure to any inside counsel. Moreover, the orders in those two cases primarily involved treatment of the parties' confidential information and not treatment of the confidential information that may be produced by third parties. Most importantly, the orders in both cases allowed disclosure to only one designated inside counsel, which presented substantially fewer risks than IBM's current proposal for the right to disclose confidential information to any number of unspecified persons who currently happen to work in its in-house litigation department.
7 The Second Circuit decisions on the standard to be applied for modification by a party or an intervening nonparty are not altogether clear and have caused considerable confusion in the lower courts. See Bayer AG v. Barr Laboratories, Inc., 1995 WL 334727 at 9 (S.D.N.Y., June 6, 1995) (the Court weighed various factors, including whether the order was entered by stipulation and whether the requested modification was foreseeable); Maryland Cas. Co. v. W. R. Grace & Co., 1994 LEXIS 11141 at 3 (S.D.N.Y., August 10, 1984) (the Court applied an "extraordinary circumstances or compelling need" test).
8 The Government gives no weight to IBM's argument that entry of its proposed inadvertent production provision is needed to expedite discovery. (See IBM Protect. Memo. at 16, 18-19.) IBM should expect its outside law firm to institute appropriate and reasonable procedures to protect its privileged information with or without a provision regarding inadvertent disclosure of such information.
9 To ensure public access, the Government insisted, and IBM agreed, to include a provision requiring the parties to publicly file all pleadings with confidential information redacted. (Gov't Protect. Ord., Ex. 1 at カ 13; IBM Protect. Ord., Ex. 2 at カ 13.)
|