Explaining the Almost Unexplainable: Source Code Evidence at Trial
Part one of this two-part series explores early discovery considerations with source code evidence and their effect on trial.
May 04, 2020 at 10:00 AM
6 minute read
The past decade has seen a proliferation of products and services that use computer networks, the Internet of Things, or the Industrial Internet of Things. This technological evolution has resulted in increased complexity in litigation involving computer-based products and services. In many types of litigation, such as claims for patent infringement, copyright infringement, trade secret misappropriation, or software licensing disputes, computer source code is at the forefront of the case.
The use of source code evidence at trial, however, introduces unique challenges; principally, the evidence is very difficult to understand for the average fact finder. This two-part series discusses some strategies litigators should consider to effectively present source code evidence beginning with discovery and through trial.
Background
Generally, source code refers to human-readable programmed instructions that specify how computing functionality of a product is logically organized and operates. Each computing function—for example, pressing a button on a smartphone screen or printing a document—has associated source code written by a programmer in a particular programming language. This source code may ultimately take the form of software, firmware, or be implemented as hardware. Software or firmware source code is generally converted (i.e., compiled) into binary form before it can be run on a microprocessor. Hardware source code is similarly converted (i.e., synthesized) into a description of an electronic circuit.
During discovery, it is not uncommon to have source code produced on a secure computer available only to outside counsel and retained experts. Protective orders governing the production of source code largely prohibit dissemination outside this secure environment. Physical copies of the source code are almost always severely limited to a small number of printouts that are far less than the entire source code production.
In view of these restrictions, presentation of this evidence to the fact finder is a significant challenge. Source code is not readily understandable to the average juror. Unlike other documents, like contracts or emails, the average juror rarely has the background to make liability determinations based on their own understanding of the source code. Still, planning and early strategic consideration of these difficulties can be employed to make presentation more efficient and understandable to the fact finder. In this first part of the series, pre-trial strategies such as negotiation of protective order provisions and securing the proper foundation for source code evidence are discussed.
Protective Order Considerations
The protective order presents an early opportunity to shape the use of source code at trial. In large part, protective orders are entered by stipulation of the parties and address the handling of confidential information, including source code, during discovery. A stipulated protective order, however, can have little effect on the actual treatment of source code evidence at trial. (For example, see the N.D. California Model Stipulated Protective Order for Litigation Involving Patents, Highly Sensitive Confidential Information and/or Trade Secrets: "Any use of Protected Material at trial shall be governed by a separate agreement or order").
Still, if source code evidence may be used at trial, a party should consider this during negotiation of the protective order to ensure that the option is not later foreclosed. For example, considerations should include specifying (1) procedures for putting parties (including third parties) on notice of the use of their source code at trial; (2) the number of extra copies of printed code permitted for trial; and (3) the handling and destruction of these extra copies. Parties should also consider specifying the use of watermarked or colored paper for source code printouts to allow for better tracking, and hence protection, of the material. These provisions can help avoid trial surprises such as objections from an opposing party or third party on the use of information considered highly sensitive.
Establishing Source Code Admissibility Through Discovery
Before the fact finder may consider source code evidence, it must be admitted into evidence. In that regard, source code evidence is not unlike other evidence admitted at trial. Ideally, admissibility of source code can be established through deposition of a knowledgeable witness with first-hand knowledge of the source code. Alternatively, admissibility may be achieved through declarations that meet the requirements of FRE 902(11) ("Certified Domestic Records of a Regularly Conducted Activity").
A declaration under FRE 902(11) should address that the source code is a business record under FRE 803(6)(A)-(C). The declaration, from a knowledgeable person, should clearly address when and how the source code was created, how the source code was maintained and documented, and the extent to which source code development is part of the regular practice of the business. Procedurally, a party intending to rely on the declaration must provide reasonable written notice to the adverse party of this intent. The party must also make the declaration and source code evidence available for inspection in advance of trial.
Failure to follow the requirements of FRE 902(11) could result in exclusion of the evidence or worse. For example, in Wi-Lan Inc. v. Sharp Elecs. Corp. (Feb. 14, 2019, D. Del.), the trial court found that a declaration did not meet the requirements of FRE 902(11) because the declarant offered only conclusory statements that were facially inconsistent with comments and metadata in the underlying source code. As a result, the source code was inadmissible and summary judgment granted for failure of proof. Accordingly, it is important for a litigant to start thinking early about how the source code evidence will ultimately be admitted at trial.
Conclusion
If source code evidence is needed at trial, there are easy early steps that can be taken to secure proper foundation for its admissibility. With the proper evidentiary record, the next task is preparing for and presenting the source code evidence in court. The second piece of this two-part series will address that topic, including selecting the proper witness to testify, sealing the courtroom at trial, and the logistics of presentation in court.
David Prange is a partner at Robins Kaplan LLP and leads the trade secrets subpractice. His practice focuses in complex business litigation with an emphasis on intellectual property, including patents, trade secrets, trademarks, and licensing disputes in federal and state courts across the United States. He has litigated and tried multiple cases to successful verdicts involving source code evidence. [email protected]
Benjamen Linden is an associate at Robins Kaplan LLP. His practice is focused on high-tech litigation, including patent infringement, trade secret, licensing, and outsourcing disputes. He has experience presenting and managing the development of source code evidence through all stages of litigation up to and through trial. [email protected]
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLaw Firms Mentioned
Trending Stories
- 1Paul Hastings, Recruiting From Davis Polk, Continues Finance Practice Build
- 2Chancery: Common Stock Worthless in 'Jacobson v. Akademos' and Transaction Was Entirely Fair
- 3'We Neither Like Nor Dislike the Fifth Circuit'
- 4Local Boutique Expands Significantly, Hiring Litigator Who Won $63M Verdict Against City of Miami Commissioner
- 5Senior Associates' Billing Rates See The Biggest Jump
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250