Kreatio Software Private Limited v. IDG Communications, Inc.

CourtDistrict Court, D. Massachusetts
DecidedDecember 22, 2025
Docket1:23-cv-10273
StatusUnknown

This text of Kreatio Software Private Limited v. IDG Communications, Inc. (Kreatio Software Private Limited v. IDG Communications, Inc.) is published on Counsel Stack Legal Research, covering District Court, D. Massachusetts primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Kreatio Software Private Limited v. IDG Communications, Inc., (D. Mass. 2025).

Opinion

UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS

____________________________________ ) KREATIO SOFTWARE PRIVATE ) LIMITED, ) ) Plaintiff, ) ) v. ) Civil Action No. 23-10273-IT ) IDG COMMUNICATIONS, INC., ) ) Defendant. ) ____________________________________)

ORDER ON PLAINTIFF’S MOTION TO COMPEL [Docket No. 106]

December 22, 2025 Boal, M.J. Plaintiff Kreatio Software Private Limited (“Kreatio”) has moved to compel defendant IDG Communications, Inc. (“Foundry”) to produce certain source code files to Kreatio in native format for inspection by Kreatio’s expert.1 Docket No. 106.2 For the following reasons, this Court denies the motion.

1 As more fully discussed below, the motion originally sought de-designation of Foundry’s source code from “Attorneys’ Eyes Only” to “Confidential” to allow Kreatio’s expert, as well as its client representative, Deepak Kumar, to review the source code. At the December 10, 2025, hearing, however, Kreatio withdrew that request. 2 Judge Talwani referred the motion to the undersigned on November 18, 2025. Docket No. 114. I. RELEVANT BACKGROUND A. The Parties’ Allegations In this action, Kreatio alleges that Foundry used and copied its copyrighted source code trade secrets to make derivative works and distributed the works without Kreatio’s authorization.

See generally First Amended Complaint (“FAC”) at ¶¶ 48-50, 63. Kreatio asserts three claims: (1) copyright infringement under 17 U.S.C. § 501; (2) misappropriation of trade secrets under 18 U.S.C. § 1836; and (3) misappropriation of trade secrets under Massachusetts law. Foundry denies Kreatio’s allegations. According to Foundry, it hired Kreatio to help it develop software for its lead generation business because it was worried it would not meet a required European General Data Protection Regulation deadline that applies to its original “Hermes” software, H0. Counterclaim at ¶ 17; Docket No. 113 at 5. The parties jointly developed that software, known as H1, but it was mired with performance issues that Kreatio was unable to remedy. Counterclaim at ¶¶ 18, 20. Foundry was therefore forced to independently develop its own software, known as H2. Id. at ¶¶ 22-24. Eventually, H2 replaced

H1 so that Foundry no longer needed Kreatio’s services. See generally id. Kreatio then brought this action, asserting baseless claims in retaliation for Foundry ending the relationship. Id. at ¶¶ 29-34. Foundry has asserted several affirmative defenses, including that: Tenth Defense Kreatio’s claims are barred, in whole or in part, because Kreatio’s applicable copyright registrations are invalid, in whole or in part, and/or Kreatio is otherwise attempting to exceed the scope of its registration in that Kreatio seeks to protect unprotectable information, such as, inter alia, the functionality of software components, other public or third-party information, facts, ideas, procedures, methods, systems, processes, concepts, principles, or discoveries. Eleventh Defense Kreatio’s claims are barred, in whole or in part, because critical parts or portions of Kreatio’s alleged protected copyrights are invalid because they consist of unprotectable scenes a faire. Specifically, elements of Kreatio’s alleged copyrighted works are dictated by practical realities, such as by mechanical specifications, software standards and compatibility requirements, as well as standard programming practices, and may not obtain copyright protection as such.

Docket No. 70 at 13-14.3 On March 28, 2025, Foundry provided Kreatio with written notice that it intended to rely on the Abstraction-Filtration-Comparison (“AFC”) test4 to challenge Kreatio’s copyright infringement claims. Docket No. 113 at 8. B. The Stipulated Protective Order On May 10, 2024, Judge Talwani granted the parties’ joint motion for entry of a stipulated protective order. Docket No. 63. The resulting protective order provides three levels of classification for documents. See id. at 2. As relevant here, “HIGHLY CONFIDENTIAL – SOURCE CODE Discovery Material,” refers to “any “‘CONFIDENTIAL Discovery Material’

3 Citations to “Docket No. ___” are to documents appearing on the Court’s electronic docket. They reference the docket number assigned by CM/ECF, and include pincites to the page numbers appearing in the top right corner of each page within the header appended by CM/ECF. 4 The AFC test is a “three-step analysis of ‘abstraction-filtration-comparison’ to weed out the unprotectable elements of a computer program and determine substantial similarity.” Torah Soft Ltd. v. Drosnin, 136 F.Supp.2d 276, 284 (S.D.N.Y. 2001) (citation omitted). Under this analysis: a court must first abstract the program, breaking it into its structural parts at varying levels of abstraction. Next, the court filters out those elements that are not protectable. Finally, the court compares the remaining protectable elements of the plaintiff’s program to the defendants’ work to determine if substantial similarity exists. Id. (internal citations omitted). that a Producing Party reasonably and in good faith believes constitutes or contains a party’s confidential, proprietary, and/or trade secret source code or object code” (“Source Code”). Id. The protective order restricts the persons who may have access to Source Code material. As relevant here, such material may not be shared with a party or a party’s representatives. Id. at

4. In addition to the foregoing persons, “Confidential Material,” on the other hand, may be shared with a party, its board members, officers, insurers, or employees who are actively involved in the prosecution or defense of this case and have a litigation-related need to know the information. Id. at 3. In addition, the protective order restricts the manner of disclosure of material designated as Source Code to “in-person Source Code reviews” under certain secure conditions. See id. at 5-7. Among other things, Source Code must be made available to the receiving party’s outside counsel and/or experts: in a secure room on a secured computer without Internet access or network access to other computers and on which all access ports have been disabled (except for one printer port), as necessary and appropriate to prevent and protect against any authorized copying, transmission, removal or other transfer of any Source Code outside or away from the computer on which the Source Code is provided for inspection. . .

Id. at 5. The receiving party may, however, print limited portions of the Source Code under certain circumstances. See id. at 6. A receiving party may challenge a designation of protected discovery material under the protective order: Challenge to Designation of Protected Discovery Material. If the Non- Producing Party objects to a designation as “CONFIDENTIAL”, “HIGHLY CONFIDENTIAL (AEO),” and/or “HIGHLY CONFIDENTIAL – SOURCE CODE” it may in writing request that the designation be withdrawn. If the Producing Party disagrees with the written request, then the Parties shall meet and confer within 15 days of receiving the written request in a good faith attempt to resolve or narrow the dispute. If withdrawal is not stipulated to within this 15 day period, then the Non- Producing Party may seek an order determining whether the confidentiality designation is appropriate. The designation shall remain in effect until the objection is resolved by the Court. The Producing Party shall have the burden of showing entitlement to the “CONFIDENTIAL”, “HIGHLY CONFIDENTIAL (AEO)”, and/or “HIGHLY CONFIDENTIAL – SOURCE CODE” designation.

Id. at 9. C.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Torah Soft Ltd. v. Drosnin
136 F. Supp. 2d 276 (S.D. New York, 2001)

Cite This Page — Counsel Stack

Bluebook (online)
Kreatio Software Private Limited v. IDG Communications, Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/kreatio-software-private-limited-v-idg-communications-inc-mad-2025.