News & Analysis as of

Protective Orders

Mine Your Own Business: Multinational Mining Company Seeks Protection Of Alleged Trade Secrets During Discovery

Last week, multinational mining giant Rio Tinto asked a federal court in Manhattan to shield its document disclosures to the Securities and Exchange Commission (SEC) from the public eye....more

Court Rules on Scope of Plaintiff Discovery Requests: eDiscovery Case Law

by CloudNine on

In Performance Pulsation Control, Inc. v. Sigma Drilling Techs., LLC, et al., No. 4:17-CV-00450 (E.D. Tex. Fe. 13, 2018), Texas District Judge Amos L. Mazzant granted the plaintiff’s motion to compel in part, ordering the...more

Court Rejects Church’s Appeal, Upholding $4,000 Daily Sanction

by Zapproved LLC on

Padron v. Watchtower Bible & Tract Soc’y of New York, Inc., No. D070723 (Cal. Ct. App. Nov. 9, 2017). This negligence and failure to warn case arose from an allegation of childhood sexual abuse in a religious organization....more

District Court Largely Denies Defendants’ Requested Protective Order On Variety Of Discovery Requests In Consolidated Class...

by Carlton Fields on

On November 15, 2017, we reported on two class actions alleging that the “EquityComp” workers’ compensation insurance program marketed and sold by Applied Underwriters (“defendants”) violated California insurance law and...more

10 Steps to Navigate the Labyrinth of E-Discovery for Small to Mid-Size Firms

by Pessin Katz Law, P.A. on

The practice of exchanging discovery in federal litigation has ballooned to its own cottage industry within the practice of law. Many law firms tout expertise in the practice “Electronic Discovery Law.” Heady conferences...more

ITC Denies Request to Modify Protective Order

by Jones Day on

In a recent Notice, the Commission denied Respondents’ motion to modify the administrative protective order (APO) to permit them to use a third party’s confidential business information in related European proceedings....more

Court Cites Risk Of Competitive Misuse To Deny Modification Of Protective Order

by Orrick - IP Landscape on

Order Denying Motion to Modify Protective Order, PhishMe, Inc., v. Wombat Security Technologies, D. Del. (September 18, 2017) (Judge Christopher J. Burke) - As demonstrated by Judge Burke’s order, courts are reluctant to...more

Subpoenas on Customers Blocked in MRI Patent Case

In a recent multi-district case involving patent infringement allegations relating to MRI imaging, Judge Stearns granted motions for protective orders directed to untimely-served subpoenas on third party customers. The case...more

District Court Decides Flurry Of Discovery Motions In Dispute Between Reinsurer And Insurer Over Underlying Asbestos Claims

by Carlton Fields on

The Eastern District of Pennsylvania recently ruled on several discovery motions in a reinsurance dispute between R&Q Reinsurance Company (“R&Q”) and St. Paul Fire and Marine Insurance Company (“St. Paul”) over underlying...more

Employer's 'Solicitous Treatment' of Alleged Perpetrator May Create a Hostile Environment for Coworker/Victim

Can an employer’s perceived preferential treatment of an alleged rapist create a hostile work environment for the female employee who reported the rape? The Ninth Circuit Court of Appeals recently held that a jury should...more

Amgen v. Sandoz: Pegfilgrastim Litigation Update

by Goodwin on

On July 17, 2017, in the ongoing Amgen v. Sandoz litigation regarding Sandoz’s proposed biosimilar of Neulasta® (pegfilgrastim), the magistrate judge ordered, among other things, that Amgen is entitled to discovery from...more

Series: Defend Trade Secrets Act | Stopping Further Leaks: Protecting Trade Secrets While Litigating Misappropriation

by Fish & Richardson on

Trade secrets derive their commercial value from being secret. When trade secrets are misappropriated, litigation may be necessary to stop a competitor from exploiting them in the marketplace. Yet litigating...more

The Wells Fargo PII Epic Fail – Chapter II

The law firm that inadvertently produced records containing personally-identifying information (“PII”) relating to 50,000 Wells Fargo customers in response to a third-party subpoena, which we first reported on, went before a...more

New York Appellate Court Curtails NY AG Investigatory Subpoena on Constitutional Grounds

by Jones Day on

On June 21, 2017, a New York appellate court curtailed on constitutional grounds an investigative subpoena issued by the New York Attorney General. In the Matter of Evergreen Assoc., Inc., 54 N.Y.S.2d. 135 (App. Div. 2017)....more

GAO Protective Orders (Post-Award Protest Primer #5)

Post-award protests generally involve arguments about confidential, source-selection sensitive information – proprietary bid and proposal material, past performance data, cost and pricing information, nonpublic agency...more

Fundamentals of Document and ESI Discovery

by Knobbe Martens on

Preserving Evidence: •“The duty to preserve evidence begins when litigation is ‘pending or reasonably foreseeable.’” Micron Tech., Inc. v. Rambus, Inc., 645 F.3d 1311, 1320 (Fed. Cir. 2011) •“It is, of course, not...more

Court Rules that Plaintiff’s Request for Data from Defendant is “Extraordinarily Burdensome”: eDiscovery Case Week

by CloudNine on

In Solo v. United Parcel Services Co., No. 14-12719 (E.D. Mich. Jan. 10, 2017), Michigan Magistrate Judge R. Steven Whalen agreed that the defendant showed that the level of data requested by the plaintiff “would be...more

The E-Discovery Digest - June 2017

The seventh edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more

Workplace Violence Occurring At Alarming Rate: Time For Employers To Be Proactive

by Fisher Phillips on

It’s a news headline we’ve seen too often, including several times in recent weeks: another disgruntled employee or former employee has entered the workplace and killed or injured coworkers. What can you do to minimize the...more

First Department Finds Work-Product Protection Not Waived by Storage of Documents on Company Laptop

On June 6, 2017, the First Department had an opportunity to apply—and reaffirm—last month’s decision in Peerenboom v. Marvel Entm’t, LLC, where the Court held that use of a company email system for personal purposes “does...more

Fifth Circuit Confirms that Documents Listed on a Privilege Log Are Not Per-Se Privileged

If one party in a lawsuit merely identifies documents on a privilege log without detail, does the other party bear the burden of showing that the withheld materials were not privileged, in order get access to those documents?...more

Unmet Garmin Factor 3 Proves Fatal for Additional Discovery Request

by Jones Day on

In Polygroup Ltd. v. Willis Electric Co., Ltd., the Patent Trial and Appeal Board denied a Patent Owner request for documents already provided in a co-pending lawsuit but restricted from use by a protective order....more

Real Property & Title Insurance Update: Week Ending April 28 & May 5, 2017

by Carlton Fields on

REAL PROPERTY UPDATE - Foreclosure: final summary judgment in borrower’s favor inappropriate where borrower merely asserted that lender mistakenly filed copy of original note with court, instead of original, and where...more

Court Approves Defendant’s Proposed Random Sampling Production Plan: eDiscovery Case Law

by CloudNine on

In Duffy v. Lawrence Memorial Hospital, No. 14-2256 (D. Kansas, Mar. 31, 2017), Kansas Magistrate Judge Teresa J. James granted the Motion to Modify Discovery Order from the defendant (and counterclaimant), where it asked the...more

Not a Trade Secret

by Pessin Katz Law, P.A. on

In U.S. v Jennifer Salgado & Jenny’s Tax Service, (No. 1:16-CV-03186-SMJ, Mar. 24, 2017) the U.S. District Court for the Eastern District of Washington (the “Court”) held that a taxpayer’s client list and client identifying...more

106 Results
|
View per page
Page: of 5
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.