`WASHINGTON, D.C.
`
`Before the Honorable David P. Shaw
`Administrative Law Judge
`
`
`In the Matter of:
`
`CERTAIN SEMICONDUCTOR DEVICES AND
`CONSUMER AUDIOVISUAL PRODUCTS
`CONTAINING THE SAME
`
`
`
`
` Investigation No. 337-TA-1047
`
`
`
`
`
`
`COMPLAINANT BROADCOM CORPORATION’S OPPOSITION TO THIRD-PARTY
`ARM’S MOTION FOR A PROTECTIVE ORDER [Motion Docket No. 1047-025]
`
`Broadcom opposes ARM’s motion for a protective order [Motion Docket No. 1047-025],
`
`which, just days before depositions are set to begin, seeks to add many onerous and unnecessary
`
`requirements to the protective order’s existing provisions regarding source code. ARM’s
`
`Proposed Addendum, if adopted this late in discovery, would likely necessitate a massive
`
`document clawback, force depositions to be retaken or postponed, and almost assuredly delay the
`
`procedural schedule for this Investigation. And it would do so despite there being little reason to
`
`believe ARM actually needs the additional restrictions it seeks.
`
`On April 13, 2017, Broadcom served its first and second set of document requests. At
`
`least Requests for Production 24 and 25were directed to the source code associated with the
`
`pdoucts at issue in this Investigation. ARM’s source code is incorporated into the audiovisual
`
`processing units of SoCs manufactured by LG and Sigma, which perform functions that are
`
`relevant to the patents asserted in this investigation, and responsive to these requests. Indeed, the
`
`relevancy of ARM’s source code should have been apparent to LG and Sigma from the very
`
`outset of this Investigation as all of the patents relating to audiovisual processing. Despite being
`
`aware of these requests since April, LG waited until July 6, 2017, nearly four months later,
`
`
`
`1
`
`
`
`before notifying ARM that its source code was relevant, and being produced in this
`
`Investigation. Sigma waited even longer, and apparently did not inform ARM that its source
`
`code was being produced until August 2. See ARM’s August 7, 2017, Letter to ALJ Shaw at 1.
`
`As a result of Respondents’ delay, Broadcom was not presented with ARM’s Proposed
`
`Addendum until July 17. A meet and confer with ARM took place on July 24, just a week before
`
`Broadcom’s infringement contentions—supported extensively by source code—were due. At
`
`that point, Broadcom was unable to agree to ARM’s a six-page Proposed Addendum, with
`
`extensive rewrites that had the potential to completely derail the source code review process.
`
`And adopting the Proposed Addendum now would effectively derail fact discovery with
`
`depositions of LG corporate witnesses commencing in Korea on August 10.
`
`This dispute is yet another byproduct of the Respondents’ delays in discovery that
`
`necessitated Broadcom’s motion to compel, which the ALJ granted-in-part in Order No. 15. As
`
`the ALJ acknowledged in that order, “documents relating to the structure, design, and operation
`
`of the accused products . . . should have been produced by now.” Order No. 15 at 3. Because
`
`Respondents apparently failed to timely review their own source code, or at least delayed
`
`informing ARM that certain of its source code was responsive to Broadcom’s discovery requests
`
`and must be produced in this Investigation, ARM’s Proposed Addendum was presented to
`
`Broadcom well past the point at which such an extensive modification of the protective order
`
`could be agreed to.
`
`In addition, ARM’s six-page Proposed Addendum is not necessary to protect ARM’s
`
`source code. ARM is not a competitor to any of the parties to this Investigation—it only makes
`
`software. Mot. at 1. Order No. 10, the protective order currently in place, includes extensive
`
`provisions governing the production of the parties’ highly confidential source code and was
`
`
`
`2
`
`
`
`negotiated by parties who are direct competitors and who are each represented by experienced
`
`ITC counsel, none of whom thought the restrictions proposed by ARM were necessary, because
`
`they are not.
`
`A.
`
`ARM’s Proposed Addendum to the Protective Order Is Unworkable
`
`ARM’s Proposed Addendum is just as long as the source code provisions already in place
`
`in the Amended Protective Order. And, as ARM details in its motion, the Proposed Addendum
`
`would impose unique, new restrictions on how ARM source code is handled that differ
`
`substantially from the protections currently in place. But neither ARM nor its customers, LG and
`
`Sigma, have identified where ARM’s source code is located within the LG or Sigma productions,
`
`or to which LG or Sigma products ARM’s source code relates. While counsel for LG suggested
`
`that ARM’s source code might mostly be in two file directories in LG’s source code production,
`
`counsel for LG has also stated that ARM source code may be in various other locations as well.
`
`When the parties met and conferred prior to ARM filing its motion, Broadcom suggested that
`
`ARM’s source code could be provided on a separate computer, but this was never done.1
`
`Likewise, while Sigma informed Broadcom on August 2 that it would be producing ARM code,
`
`it did not inform Broadcom where this code would be located in the production or to which
`
`Sigma products the ARM code relates.
`
`Broadcom thus has no mechanism from distinguishing the ARM code from other source
`
`code in LG’s and Sigma’s productions, meaning that granting ARM’s motion would force
`
`Broadcom to treat the entirety of LG’s and Sigma’s source code as ARM code. This would
`
`potentially result in a massive clawback as Broadcom’s source code reviewers have printed a
`
`number of excerpts of the LG and Sigma source code in the past weeks that may exceed the fifty-
`
`
`1 ARM states that its source code “can be provided on a separate review computer,” Mot. at 7
`n.5, but this was not actually done.
`
`
`
`3
`
`
`
`continuous-page and 750-total-page limitations in ARM’s Proposed Addendum. At a minimum,
`
`every printout would have to be reviewed to determine whether it was compliant with the new
`
`ARM provisions.
`
`The potentially massive clawback that would be necessary to comply with the Proposed
`
`Addendum would be especially disruptive now. Depositions of LG’s witnesses in Korea are
`
`scheduled to begin on August 10. Broadcom agreed to begin depositions at this early date in
`
`reliance on assurances from LG that it had produced all relevant source code, including the ARM
`
`code, because Broadcom intends to ask these witnesses questions about the source code. If
`
`Broadcom has to return the portions of the source code it intends to use, these depositions may
`
`have to be postponed or retaken. Postponing or delaying depositions on source code—some of
`
`the most important depositions in the Investigation—would do serious violence to the procedural
`
`schedule. Expert discovery would also likely have to be delayed, because understanding the
`
`source code is critical to understanding how the products operate, which in turn is critical to
`
`understanding whether they infringe the asserted patents, which would in turn, jeopardize the
`
`hearing date. .
`
`The Proposed Addendum would also permit ARM to halt Broadcom’s review of LG and
`
`Sigma code entirely, because it would require Broadcom to give notice of its experts and then
`
`afford ARM up to ten days to confirm whether the experts could review ARM’s code. While
`
`ARM represented that it had no objection to the experts Broadcom identified to ARM shortly
`
`after the parties met and conferred, Mot. at 5 n.4, Broadcom has since retained two additional
`
`experts to review source code. And in any event, ARM would not agree to remove this provision
`
`even though it is entirely superfluous if ARM in fact has no objection to Broadcom’s experts.
`
`And with the ongoing LG depositions, Sigma’s depositions likely beginning in the next two
`
`
`
`4
`
`
`
`weeks,2 and expert reports due in September, a ten-day delay in source code review would be
`
`extremely prejudicial to Broadcom.
`
`And even if ARM immediately agreed to allow all of Broadcom’s experts to review its
`
`source code, its Proposed Addendum would seriously hinder the pace of review because it
`
`prohibits reviewers from taking notes on electronic devices. One of Broadcom’s experts
`
`estimates he lost approximately two hours of review time when he was asked by LG to take
`
`notes by hand instead of on a (camera- and wifi-disabled) laptop. With hundreds of gigabytes of
`
`source code to review—much of it produced on or shortly before the July 28, 2017, deadline set
`
`forth in Order No. 15—any delay at this point jeopardizes the entire procedural schedule.
`
`At least some of the practical problems that would arise from entering ARM’s Proposed
`
`Addendum could have been avoided if Respondents had only timely complied with their
`
`discovery obligations.
`
`For its part, Sigma refused to produce the ARM source code even after the July 28
`
`deadline, arguing that source code relating to how its SoCs use hardware components to process
`
`video was irrelevant, even though several of the asserted patents are directed to precisely this.
`
`Only when Broadcom insisted that this relevant source code be produced did Sigma disclose that
`
`some of it was from ARM. ARM’s August 7, 2017, letter suggests that the fact its source code is
`
`being produced by two respondents is all the more reason to adopt its Proposed Addendum.3 To
`
`the contrary, it is all the more reason Respondents should have timely complied with their
`
`
`2 Sigma has not yet confirmed the availability of its deponents beyond saying that it will likely
`be within the next two weeks.
`3 Broadcom notes that ARM did not inform Broadcom, much less meet and confer, prior to filing
`its August 7, 2017, letter, which purports to supplement its Motion. Broadcom objects to this
`procedurally-improper attempt at supplementation.
`
`
`
`5
`
`
`
`discovery obligations rather than delay their source code productions until the cutoff specified in
`
`Order No. 15, or later.
`
`B.
`
`The Existing Protective Order Will Adequately Protect ARM’s Source Code
`
`ARM has failed to meet its burden to show it is entitled to a protective order. ARM
`
`begins by arguing that Broadcom has previously requested similar source code provisions in
`
`Investigation where it was required to produce source code as a third party. But this argument is
`
`highly misleading. In each Investigation cited by ARM, there was no prior source code
`
`provision in the protective order. See Certain Electronic Devices including Wireless
`
`Communication Devices, Tablet Computers, Media Players, and Televisions, and Components
`
`Thereof, Inv. 337-TA-862, Order No. 1 (Jan. 9, 2013) (original protective order without source
`
`code provision); Certain Wireless Devices with 3G and/or 4G Capabilities and Components
`
`Thereof, Inv. 337-TA-868, Order No. 1 (Jan. 31, 2013) (original protective order without source
`
`code provision); In the Matter of Certain Portable Electronic Communications Devices,
`
`including Mobile Phones and Components Thereof, Inv. 337-TA-885, Order No. 1 (June 26,
`
`2013) (original protective order without source code provision). None of these cases involved the
`
`situation present here: where a third-party seeks to add to an existing source code provision an
`
`additional provision, of nearly the same length, singling out that third-party’s source code for
`
`special treatment.
`
`Indeed, nowhere in ARM’s motion is there any explanation for why its source code
`
`merits special protection. ARM generally notes that it is a software company, while the parties to
`
`this Investigation make both software and hardware. But that fact does not make the software
`
`created by the parties any less valuable. If anything, the fact that the parties are hardware
`
`companies should give ARM comfort, as it means they are not direct competitors—indeed, two
`
`
`
`6
`
`
`
`of the parties are ARM’s customers—and thus production of ARM’s source code in this
`
`Investigation poses little risk of competitive harm.
`
`By contrast, the current source code provisions in the protective order were negotiated by
`
`parties that are direct competitors. These parties include sophisticated technology companies
`
`who are advised by attorneys with decades of experience practicing before the ITC. And yet,
`
`none of these parties thought the restrictions in ARM’s Proposed Addendum were necessary.
`
`Specifically, ARM argues that excluding electronic devices from the review room is
`
`necessary to prevent “the receiving party from fully describing ARM Source Code, for example
`
`using pseudocode . . . .” Mot. at 7. But handwritten notes could still fully describe the source
`
`code using pseudocode. And the existing protective order prevents the parties from directly
`
`copying the code into their notes in any form, and reviewers must also disable all wifi or camera
`
`features on their devices to ensure copies are not made and transmitted. All that removing
`
`electronic devices from the review room will achieve is to make the review slower—indeed, one
`
`of Broadcom’s reviewers estimates it will be the equivalent of losing two hours of review time
`
`each day.
`
`Second, ARM argues that it requires additional restrictions on the electronic filing of
`
`portions of its source code, first requiring the parties to attempt to file the documents in paper
`
`form, and then limiting submissions of electronic copies to no more than five contiguous pages
`
`unless ARM grants permission for more. This does nothing more than impose a cumbersome
`
`process for filings that would require multiple parties’ permission to submit copies of source
`
`code in one form or another. And it ignores the fact that the existing protective order obligates
`
`any electronic filings containing source code to be made under seal in any event, meaning the
`
`practical effect of this provision is nil.
`
`
`
`7
`
`
`
`Third, ARM seeks to limit print outs of source code to no more than fifty contiguous
`
`pages or 750 cumulative pages. While limitations on print outs are included in some protective
`
`orders, as ARM notes, ARM does not actually explain why fifty contiguous pages or 750
`
`cumulative pages are appropriate for its source code. Page limitations like these are particularly
`
`inappropriate in this case where some of the Respondents have produced hundreds of gigabytes
`
`of source code. While ARM claims the relevant ARM source code is included in only a “small
`
`minority” of products, Mot. 7 n.5, without knowing where ARM’s source code is located in the
`
`LG and Sigma production, it is impossible for Broadcom to know its size and whether the
`
`proposed page limits are reasonable. For the same reason, it is impossible to know whether the
`
`limitations on transport and shipment of ARM’s source code are reasonable or, given these
`
`restrictions, whether it would be possible to comply with the proposed requirement to destroy all
`
`copies of source code used in a deposition once the deposition is completed.
`
`Further complicating matters is the fact that ARM’s special restrictions would apply just
`
`to LG’s and Sigma’s source code, while the source code produced by the other respondents
`
`would be governed by a different set of (different) rules. Indeed, these inconsistent rules could
`
`both be in play in the upcoming LG depositions, as some of LG’s SoCs contain ARM code, and
`
`some of LG’s chips are made by other Respondents who do not use ARM code. Trying to sort
`
`through the various rules regarding what code can and cannot be used at depositions, and how it
`
`may get there, and what must happen to it afterward, is not going to ensure confidentiality.
`
`ARM’s Proposed Addendum invites confusion and chaos instead at the worst possible time—in
`
`the last days of fact discovery as the parties are set to begin depositions in four different
`
`countries.
`
`
`
`8
`
`
`
`In stark contrast to the confusing and unnecessary provisions of the ARM Proposed
`
`Addendum, the Amended Protective Order currently in place is working just fine. The parties to
`
`this Investigation have now produced hundreds of gigabytes of source code—source code they
`
`believe is every bit as valuable as ARM’s source code. Yet, there have been no issues with
`
`maintaining the confidentiality of this source code, the parties have been able to review it
`
`efficiently for the most part, and use it to prepare responses to contention interrogatories and to
`
`prepare for depositions without any hiccups. And one other third party supplier has already
`
`agreed to proceed under the Amended Protective Order.
`
`There is simply no need to further amend a protective order that is working and trusted by
`
`every other party to this case. And it is too late, the Investigation has proceeded to far into
`
`discovery, to make the drastic changes ARM seeks. Had ARM’s customers been diligent about
`
`their production of source code, this may have been avoided, but they failed to timely produce
`
`discovery, violated the ALJ’s order, and now ARM’s request simply cannot be accommodated
`
`without derailing discovery and delaying this Investigation.
`
`Accordingly, Broadcom requests that the ALJ deny ARM’s motion for a protective order.
`
`
`
`Date: August 8, 2017
`
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`/s/ John M. Caracappa
`John M. Caracappa
`Matthew N. Bathon
`Stephanie L. Roberts
`STEPTOE & JOHNSON LLP
`1330 Connecticut Avenue, NW
`Washington, DC 20036
`Tel: (202) 429-3000
`Fax: (202) 429-3902
`
`Counsel for Broadcom Corporation
`
`
`
`By:
`
`
`9
`
`
`
`CERTIFICATE OF SERVICE
`
` I
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via EDIS
`
` hereby certify that on this 8th day of August, 2017, a true and correct copy of the foregoing
`Complainant Broadcom Corporation’s Opposition to Third-Party ARM’s Motion for a
`Protective Order [Motion Docket No. 1047-025] was served on the following parties in the
`manner indicated:
`
`Lisa R. Barton
`Secretary
`U.S. International Trade Commission
`500 E Street, S.W.
`Washington, D.C. 20436
`
`The Honorable David P. Shaw
`Administrative Law Judge
`U.S. International Trade Commission
`500 E Street, S.W., Room 317
`Washington, D.C. 20436
`
`John Thuermer
`Attorney Advisor
`U.S. International Trade Commission
`500 E Street, S.W., Room 317
`Washington, D.C. 20436
`Johnjames.thuermer@usitc.gov
`
`Kecia J. Reynolds, Esq.
`PILLSBURY WINTHROP SHAW PITTMAN LLP
`1200 Seventeenth Street, NW
`Washington, DC 20036
`Telephone: (202) 664-8025
`Facsimile: (202) 663-8007
`Sigma-ITC@pillsburylaw.com
`
`Counsel for Respondent Sigma Designs, Inc.
`Doris Johnson Hines
`FINNEGAN, HENDERSON, FARABOW, GARRETT &
`DUNNER, LLP
`910 New York Avenue, N.W.
`Washington, D.C. 20001-4413
`Telephone: (202) 408-4000
`Facsimile: (202) 408-4400
`LG-Broadcom-1047@finnegan.com
`
`Counsel for Respondents LG Electronics, Inc. and LG
`Electronics U.S.A., Inc., Respondents
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via EDIS
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via Email (pdf file)
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via Email (pdf file)
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via Email (pdf file)
`
`
`
`Cono A. Carrano
`AKIN, GUMP, STRAUSS, HAUER & FELD LLP
`1333 New Hampshire Avenue, N.W.
`Washington, D.C. 20036-1564
`Telephone: (202) 887-4000
`Facsimile: (202) 887-4288
`AG-VIZIO-BROADCOM@akingump.com
`
`Counsel for Respondent Vizio, Inc.
`
`Joseph V. Colaianni
`FISH & RICHARDSON P.C.
`1425 K Street, NW, 11th Floor
`Washington, DC 20005
`Telephone: (202) 783-5070
`Facsimile: (202) 783-2331
`FRService_MediaTek-Broadcom1047@fr.com
`
`Counsel for Respondents MediaTek Inc. and MediaTek USA
`Inc., and MStar Semiconductor Inc.
`
`T. Cy Walker
`Shawnna M. Yashar
`BAKER & HOSTETLER LLP
`1050 Connecticut Avenue NW
`Washington, DC 20036
`Phone: 202-861-1500
`Facsimile: 202-861-1783
`Funai-Broadcom-1047@bakerlaw.com
`
`Counsel for Respondents Funai Corporation, Funai Electric
`Co., Ltd. and P&F USA, Inc.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via Email (pdf file)
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via Email (pdf file)
`
`Via First Class Mail
`Via Hand Delivery
`Via Overnight Courier
`Via Email (pdf file)
`
`/s/ Lawrence Loretoni
`
`
`
`
`
`
`
`