Abstract

http://ssrn.com/abstract=1969587
 


 



Computer Software-Related Litigation: Discovery and the Overly-Protective Order


Lydia Pallas Loren


Lewis & Clark Law School

Andy Johnson-Laird


Johnson-Laird Inc.

December 7, 2011

Federal Courts Law Review, Forthcoming
Lewis & Clark Law School Legal Studies Research Paper No. 2012-5

Abstract:     
Litigation involving allegations of intellectual property infringement concerning computer software is some of the most complex, time consuming, and expensive litigation in which private parties engage. Certain practices in discovery, including, most significantly, the use of poorly drafted discovery agreements that also include “overly protective” orders, increase that expense dramatically. Regardless of whether the allegation is patent infringement, copyright infringement, or trade secret misappropriation, prosecuting and defending the assertions in the case requires a probing analysis of the computer source code. In these types of cases, both parties will engage forensic software analysts to assist the lawyers in preparation for trial and to provide expert witness testimony for the court. The forensic software analysts will dissect the computer source code, often examining the source code of both parties, looking for signs of infringement or misappropriation as well as for technical explanations for similarities in the way the code is written or structured. But first, the computer source code must be disclosed to the opposing party. Such disclosure is almost always done pursuant to a protective order, typically stipulated to by the attorneys. Lawyers often agree to protective orders that significantly and unnecessarily increase the costs of discovery.

Attorneys should pay careful attention to the provisions addressing the requirements of production and analysis. Additionally, attorneys must understand the consequences of the clauses contained in protective orders in these types of litigation. As described in this article, it is possible to provide robust protection for disclosed source code while at the same time not unnecessarily and dramatically increasing the cost of discovery by weaponizing the protective order.

The goals of this article are three-fold. First, we seek to help lawyers understand the process of forensic software analysis. Second, we provide a set of model clauses aimed at avoiding pitfalls in the design of the discovery process, including model clauses for a protective order of appropriate scope and with appropriate protections from further disclosure of the source code that is produced. Third, for judges who are asked to intervene in discovery battles, including fights over the proper scope of a protective order, this article is meant to assist in evaluating the parties’ arguments.

Number of Pages in PDF File: 50

Keywords: discovery, protective orders, patent infringement, copyright infringement, trade secret misappropriation, computer software, litigation

JEL Classification: K41, O34

working papers series





Download This Paper

Date posted: December 24, 2011 ; Last revised: May 14, 2014

Suggested Citation

Loren, Lydia Pallas and Johnson-Laird, Andy, Computer Software-Related Litigation: Discovery and the Overly-Protective Order (December 7, 2011). Federal Courts Law Review, Forthcoming; Lewis & Clark Law School Legal Studies Research Paper No. 2012-5. Available at SSRN: http://ssrn.com/abstract=1969587 or http://dx.doi.org/10.2139/ssrn.1969587

Contact Information

Lydia Pallas Loren (Contact Author)
Lewis & Clark Law School ( email )
10015 SW Terwilliger Blvd.
Portland, OR 97219
United States
503-768-6755 (Phone)
503-768-6671 (Fax)
Andy Johnson-Laird
Johnson-Laird Inc. ( email )
850 NW Summit Ave.
Portland, OR Oregon 97210
United States
(503) 274-0784 (Phone)
HOME PAGE: http://www.jli.com
Feedback to SSRN


Paper statistics
Abstract Views: 1,426
Downloads: 157
Download Rank: 114,303
Paper comments
No comments have been made on this paper

© 2014 Social Science Electronic Publishing, Inc. All Rights Reserved.  FAQ   Terms of Use   Privacy Policy   Copyright   Contact Us
This page was processed by apollo4 in 0.297 seconds