Affinity Credit Union v. Apple Inc.

CourtDistrict Court, N.D. California
DecidedMarch 29, 2024
Docket4:22-cv-04174
StatusUnknown

This text of Affinity Credit Union v. Apple Inc. (Affinity Credit Union v. Apple Inc.) is published on Counsel Stack Legal Research, covering District Court, N.D. California primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Affinity Credit Union v. Apple Inc., (N.D. Cal. 2024).

Opinion

1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 AFFINITY CREDIT UNION, et al., Case No. 22-cv-04174-JSW

8 Plaintiffs, ORDER RESOLVING DISCOVERY 9 v. DISPUTES

10 APPLE INC., Re: Dkt. No. 72 Defendant. 11

12 13 Now before the Court for consideration is the Joint Letter Brief regarding Disputed 14 Provisions of Proposed Protective Order and Protocol for Electronically Stored Information (“ESI 15 Protocol”). (Dkt. No. 72.) The Court finds the matter appropriate for resolution without further 16 briefing or telephone conference. See Civ. L.R. 7-1(b); Civil Standing Order No. 7. 17 Plaintiffs Affinity Credit Union, Greenstate Credit Union, and Consumers Co-Op Credit 18 Union (“Plaintiffs”) and Defendant Apple Inc. (“Apple”) have submitted competing proposed 19 Protective Orders and ESI Protocols. Although the competing proposed orders are substantially 20 identical, Plaintiffs believe Apple’s desired security and confidentiality measures go too far. 21 Apple counters that stringent measures are necessary because hackers increasingly target law firms 22 to access confidential information, and it fears that certain documents could be used by Plaintiffs 23 to gain commercial advantage in future negotiations. 24 The parties’ dispute seemingly places in conflict two important concerns: on the one hand, 25 expeditiously litigating this putative class action, and, on the other, safeguarding the parties (and 26 innocent non-parties) from disclosure and misuse of their private information. Resolution is much 27 simpler than this dispute would suggest because the least restrictive measures proposed by 1 enters the final Protective Order and ESI Protocol in subsequent docket entries. 2 A. The Court Adopts Provisions from Each of the Proposed Protective Orders. 3 The parties disagree regarding one issue in Section 9 and two issues in Section 11 of the 4 proposed Protective Orders. As discussed below, the Court adopts language from each of the 5 parties’ proposals. 6 1. The Court Approves Apple’s Language Regarding Discovery Material Designated As “Highly Confidential – Attorneys’ Eyes Only.” 7 8 The parties agree to include a category of confidential document production for “Highly 9 Confidential” information that “is extremely confidential and/or sensitive in nature and [that] the 10 Producing Party reasonably believes . . . is likely to (1) cause economic harm or significant 11 competitive disadvantage to the Producing Party or (2) reveal personal identifiable information.” 12 (Dkt. No. 72-1, at 1.) Apple seeks to make this category “Attorneys’ Eyes Only,” meaning that no 13 client representatives may view the information. Plaintiffs propose permitting up to three client 14 representatives and their immediate staff to access Highly Confidential materials. 15 Apple argues that Plaintiffs may use the Highly Confidential materials for improper 16 purposes, including in future negotiations with Apple. Plaintiffs contend that Apple’s concern 17 lacks a reasonable basis because Plaintiffs and Apple are not competitors and because Apple uses 18 standardized terms for all issuer banks. 19 While Plaintiffs’ position has merit, the proposed “Highly Confidential” definition only 20 relates to materials that could “cause economic harm or significant competitive disadvantage.” 21 Because Plaintiffs and Apple are not competitors, and because Apple uses standardized terms, this 22 definition cannot realistically cover a significant number of materials that impact Plaintiffs’ ability 23 to assess the strengths and weaknesses of their case. The Court would be skeptical if the “Highly 24 Confidential” designation were used more than sparingly to shield competitive information. 25 The Court thus adopts Apple’s proposed language limiting this category to Attorneys’ 26 Eyes Only. Plaintiffs may challenge the designation of some or all of the materials as Highly 27 Confidential at a later date if Plaintiffs have a good faith basis to believe the designations are 1 2. The Court Approves Plaintiffs’ Language Regarding Data Security. 2 Apple seeks an order requiring the parties to comply with one of three strict security 3 protocols, reasoning that the trend in recent years has been for firms and courts to require stricter 4 measures. Apple also requests language requiring multi-factor authentication for access to 5 confidential materials. Plaintiffs argue that Apple’s cybersecurity protocols are impractical and 6 expensive. They point out that, in the only identified similar case involving Apple’s proposed 7 protocols, the plaintiffs and their experts spent 250 hours over the course of eight weeks to 8 implement the protocols. (Dkt. No. 72, at 3.) Finally, Plaintiffs assert that Apple’s proposed 9 language regarding multi-factor authentication is overbroad and ambiguous. 10 Apple’s proposed language is a departure from the Model Protective Order for this 11 District. Although the trend may be to adopt increasingly strict cybersecurity protocols, the Court 12 finds that Plaintiffs’ proposed language is more than sufficient. Where the Model Protective 13 Order requires Protected Material to be “stored and maintained. . . in a secure manner,” (see 14 “Model Protective Order for Standard Litigation,” ¶ 7.1, available at 15 https://www.cand.uscourts.gov/forms/model-protective-orders/), Plaintiff’s proposed language 16 goes above and beyond: It requires the Receiving Party to “implement an information security 17 management system (“ISMS”), including reasonable and appropriate administrative, physical, and 18 technical safeguards and network security and encryption technologies governed by written 19 policies and procedures, designed to protect against any reasonably anticipated threats or hazards 20 to the security of such Protected Material and to protect against unauthorized access to Protected 21 Material.” (Dkt. No. 72-1, at 3.) This is more than sufficient. 22 The Court also finds Plaintiffs’ language regarding multi-factor authentication to be 23 sufficient. Apple’s proposed language of “for any access” is vague, and it is unclear how the 24 Court would enforce the provision. It is unclear to the Court if, for example, authentication would 25 be required when opening every draft of a brief or letter, or if authentication when logging into 26 one’s computer is sufficient. Plaintiffs’ language of “to prevent unauthorized access” is judicially 27 administrable: if a breach occurs because an access point lacked multi-factor authentication, the 1 3. The Court Adopts Plaintiffs’ Language Regarding Data Breach Discovery. 2 The parties define a “Data Breach” as including “any cyberattack or other deliberate 3 security breach. . . including as a result of or following an inadvertent disclosure.” (Dkt. No. 72-1, 4 at 4.) In the event of a Data Breach, “the Parties shall meet and confer in good faith regarding any 5 adjustments that should be made to the discovery process and discovery schedule in this action.” 6 (Id. at 5.) Apple seeks the following language be added: “Further, the Receiving Party shall 7 submit to reasonable discovery concerning the Data Breach.” (Id.) 8 Apple contends that its proposed language is reasonable, appropriate, and fulfills the 9 purpose of the protective order. Plaintiffs respond that it is unreasonable to mandate data breach 10 discovery and assert that a party can make an application for discovery if a breach occurs. 11 The Court is concerned that Apple’s language would invite satellite disputes unrelated to 12 resolution of this action. Moreover, Section 11(c) of the proposed Protective Orders requires 13 compliance with “reasonable request(s) that Receiving Party investigate, remediate, and mitigate 14 the effects of a Data Breach. . . [and] promptly provide any information that is reasonably 15 requested by Producing Party and that relates to any such Data Breach. . . .” (Id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
Affinity Credit Union v. Apple Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/affinity-credit-union-v-apple-inc-cand-2024.