Explaining the Almost Unexplainable: Source Code Evidence at Trial
Part one of this two-part series explores early discovery considerations with source code evidence and their effect on trial.
May 04, 2020 at 10:00 AM
6 minute read
|
The past decade has seen a proliferation of products and services that use computer networks, the Internet of Things, or the Industrial Internet of Things. This technological evolution has resulted in increased complexity in litigation involving computer-based products and services. In many types of litigation, such as claims for patent infringement, copyright infringement, trade secret misappropriation, or software licensing disputes, computer source code is at the forefront of the case.
The use of source code evidence at trial, however, introduces unique challenges; principally, the evidence is very difficult to understand for the average fact finder. This two-part series discusses some strategies litigators should consider to effectively present source code evidence beginning with discovery and through trial.
|Background
Generally, source code refers to human-readable programmed instructions that specify how computing functionality of a product is logically organized and operates. Each computing function—for example, pressing a button on a smartphone screen or printing a document—has associated source code written by a programmer in a particular programming language. This source code may ultimately take the form of software, firmware, or be implemented as hardware. Software or firmware source code is generally converted (i.e., compiled) into binary form before it can be run on a microprocessor. Hardware source code is similarly converted (i.e., synthesized) into a description of an electronic circuit.
During discovery, it is not uncommon to have source code produced on a secure computer available only to outside counsel and retained experts. Protective orders governing the production of source code largely prohibit dissemination outside this secure environment. Physical copies of the source code are almost always severely limited to a small number of printouts that are far less than the entire source code production.
In view of these restrictions, presentation of this evidence to the fact finder is a significant challenge. Source code is not readily understandable to the average juror. Unlike other documents, like contracts or emails, the average juror rarely has the background to make liability determinations based on their own understanding of the source code. Still, planning and early strategic consideration of these difficulties can be employed to make presentation more efficient and understandable to the fact finder. In this first part of the series, pre-trial strategies such as negotiation of protective order provisions and securing the proper foundation for source code evidence are discussed.
|Protective Order Considerations
The protective order presents an early opportunity to shape the use of source code at trial. In large part, protective orders are entered by stipulation of the parties and address the handling of confidential information, including source code, during discovery. A stipulated protective order, however, can have little effect on the actual treatment of source code evidence at trial. (For example, see the N.D. California Model Stipulated Protective Order for Litigation Involving Patents, Highly Sensitive Confidential Information and/or Trade Secrets: "Any use of Protected Material at trial shall be governed by a separate agreement or order").
Still, if source code evidence may be used at trial, a party should consider this during negotiation of the protective order to ensure that the option is not later foreclosed. For example, considerations should include specifying (1) procedures for putting parties (including third parties) on notice of the use of their source code at trial; (2) the number of extra copies of printed code permitted for trial; and (3) the handling and destruction of these extra copies. Parties should also consider specifying the use of watermarked or colored paper for source code printouts to allow for better tracking, and hence protection, of the material. These provisions can help avoid trial surprises such as objections from an opposing party or third party on the use of information considered highly sensitive.
|Establishing Source Code Admissibility Through Discovery
Before the fact finder may consider source code evidence, it must be admitted into evidence. In that regard, source code evidence is not unlike other evidence admitted at trial. Ideally, admissibility of source code can be established through deposition of a knowledgeable witness with first-hand knowledge of the source code. Alternatively, admissibility may be achieved through declarations that meet the requirements of FRE 902(11) ("Certified Domestic Records of a Regularly Conducted Activity").
A declaration under FRE 902(11) should address that the source code is a business record under FRE 803(6)(A)-(C). The declaration, from a knowledgeable person, should clearly address when and how the source code was created, how the source code was maintained and documented, and the extent to which source code development is part of the regular practice of the business. Procedurally, a party intending to rely on the declaration must provide reasonable written notice to the adverse party of this intent. The party must also make the declaration and source code evidence available for inspection in advance of trial.
Failure to follow the requirements of FRE 902(11) could result in exclusion of the evidence or worse. For example, in Wi-Lan Inc. v. Sharp Elecs. Corp. (Feb. 14, 2019, D. Del.), the trial court found that a declaration did not meet the requirements of FRE 902(11) because the declarant offered only conclusory statements that were facially inconsistent with comments and metadata in the underlying source code. As a result, the source code was inadmissible and summary judgment granted for failure of proof. Accordingly, it is important for a litigant to start thinking early about how the source code evidence will ultimately be admitted at trial.
|Conclusion
If source code evidence is needed at trial, there are easy early steps that can be taken to secure proper foundation for its admissibility. With the proper evidentiary record, the next task is preparing for and presenting the source code evidence in court. The second piece of this two-part series will address that topic, including selecting the proper witness to testify, sealing the courtroom at trial, and the logistics of presentation in court.
David Prange is a partner at Robins Kaplan LLP and leads the trade secrets subpractice. His practice focuses in complex business litigation with an emphasis on intellectual property, including patents, trade secrets, trademarks, and licensing disputes in federal and state courts across the United States. He has litigated and tried multiple cases to successful verdicts involving source code evidence. [email protected]
Benjamen Linden is an associate at Robins Kaplan LLP. His practice is focused on high-tech litigation, including patent infringement, trade secret, licensing, and outsourcing disputes. He has experience presenting and managing the development of source code evidence through all stages of litigation up to and through trial. [email protected]
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLaw Firms Mentioned
Trending Stories
- 1Judicial Ethics Opinion 24-61
- 2Decision of the Day: School District's Probe Was a 'Sham'; Title IX Administrator Showed Sex-Based Bias
- 3US Magistrate Judge Embry Kidd Confirmed to 11th Circuit
- 4Shaq Signs $11 Million Settlement to Resolve Astrals Investor Claims
- 5McCormick Consolidates Two Tesla Chancery Cases
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250