Securitypoint Holdings, Inc. v. United States

CourtUnited States Court of Federal Claims
DecidedApril 16, 2019
Docket11-268
StatusUnpublished

This text of Securitypoint Holdings, Inc. v. United States (Securitypoint Holdings, Inc. v. United States) is published on Counsel Stack Legal Research, covering United States Court of Federal Claims primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Securitypoint Holdings, Inc. v. United States, (uscfc 2019).

Opinion

In the United States Court of Federal Claims No. 11-268C (Filed: April 16, 2019) NOT FOR PUBLICATION ************************

SECURITYPOINT HOLDINGS, INC.,

Plaintiff, Motion to compel; Privilege logs; RCFC 26(b)(5)(A)(ii); Attorney-client privilege; v. Waiver; Common interest doctrine; Work product doctrine. THE UNITED STATES,

Defendant.

********************** **

ORDER

Pending now is defendant’s second renewed motion to compel documents withheld as privileged, filed on February 26, 2019. This motion again concerns defendant’s attempt to probe plaintiff’s finances, valuation of its intellectual property, and any outside investors in SecurityPoint or funders of the litigation. We have previously protected the disclosure of plaintiff’s litigation funding agreements based on the representation of counsel that none of them include “any transfer of rights or interest in enforcement of the patent or management of the litigation.” Tr. 21 (Nov. 1, 2017 hearing) (ECF No. 303). At that same hearing, plaintiff agreed to produce documents related to ownership and valuation documents related to an outside investor in SecurityPoint, Raptor. In July 2018, as part of a sanction against plaintiff for failure to fully produce Raptor documents, we ordered plaintiff to produce all remaining documents related to Raptor and any other outside investors in SecurityPoint or potential outside investors “to the extent that they are not privileged.” Order Granting Mot. For Sanctions 6 (July 17, 2018) (ECF No. 359). We also ordered plaintiff to maintain a privilege log for all documents withheld and to produce it to defendant.

Those productions have taken place, and the period for discovery has ended. Defendant, however, timely filed a motion challenging the sufficiency of the privilege logs produced by plaintiff and asking for unredacted copies of certain documents. As a remedy for the alleged insufficient logs, the government requests that the court review a representative sample in camera to confirm what defendant believes are inappropriate claims of privilege. Defendant’s motion names 1465 entries in those logs as problematic. By the time of oral argument, defendant clarified that it was maintaining its challenge as to only documents appearing in that list that do not have an attorney listed in the sender or receiver box of the log; the rest of their challenges have been abandoned. There are two noted exceptions that receive special treatment in defendant’s motion: 1) Oxford Valuation Partners Report; and 2) The Prepaid Forward Purchase Agreement. We begin with the more general issue of the sufficiency of plaintiff’s privilege logs.

I. SecurityPoint’s Logs

Defendant argues that plaintiff’s privilege logs are insufficient under Rule 26 because they fail to adequately “describe the nature of the documents” withheld and fail to do so “in a manner that . . . will enable the other party to assess the claim” of privilege. RCFC 26(b)(5)(A)(ii). Defendant finds particularly troublesome the lack of document titles and email subject lines disclosed. As defendant puts it, “[n]one of the entries include any clue as to the content of the document.” Def.’s Mot. 5 (ECF No. 397). As mentioned above, defendant has abandoned this argument as to documents listing an attorney as a sender or receiver. It maintains its request to produce those documents that do not list an attorney as the sender or receiver, many which involve a transmittal from SecurityPoint personnel to individuals at plaintiff’s investor, Raptor.

Plaintiff responds that it has disclosed more than enough information in its logs to comport with Rule 26. It notes that its description of documents is much more forthcoming of relevant information than mere document titles or email subject lines would be and argues that the date, senders, receivers, privileges asserted, and description of documents withheld—the information disclosed for each entry in its logs—should be sufficient for defendant’s purposes. As a general matter, we agree.

A survey of the caselaw from this circuit reveals that the rules do not require a monolithic form of privilege logs. See Deseret Mgmt. Corp. v. United States, 76 Fed. Cl. 88, 91 (2007) (quoting the advisory committee notes from FRCP 26(b)(5)). What is necessary is that the log be sufficient to 2 disclose the nature of the document withheld and the basis for withholding with enough detail for the other party to assess the claim of privilege. Although defendant argues that the logs are wholly insufficient, its own briefing largely belies the point. It lists several categories of documents that it challenges as not privileged: documents disclosed to non-essential decision makers within SecurityPoint; documents disclosed to Lisa Smithson and employees of her company as agents or consultants but not for purposes of legal advice; documents disclosed to other third parties; and documents sent from plaintiff to Raptor (and vice versa). Defendant’s papers take aim at the claimed privileges within those tranches of documents. This reveals that, instead of a facial challenge to the sufficiency of the logs, defendant disagrees with plaintiff’s assertion of attorney-client privilege or work product doctrine or believes a waiver of those protections has taken place as to a host of documents. We thus conclude that no remedy would be appropriate for the mere condition of the logs themselves. 1

What thus remains at issue after defendant’s abandonment of other claims at oral argument are those documents within the above-mentioned categories that do not list an attorney in the sender or receiver line. These are primarily documents exchanged between Raptor and SecurityPoint. As we understand it, defendant’s principle claim is not that these documents contain information other than legal advice but that their disclosure by plaintiff to Raptor is a waiver of the protection of that advice. Plaintiff’s counter-assertion is that the common legal interest it shares with Raptor, namely the validity of the patent, protects the disclosure from waiver. We find the common interest exception applicable and thus decline to order their production to the government.

A. Common Interest Doctrine

Normally, a communication that is seeking or giving legal advice that is disclosed to a third party waives the attorney-client privilege as to the subject of that communication. Eden Isle Marina, Inc. v. United States, 89 Fed. Cl. 480, 501 (2009). The common interest doctrine, however, operates to save such communications from waiver of the privilege if that third party

1 And we note that defendant stated affirmatively that it was not seeking new logs from SecurityPoint as it believed that would be a waste of time, but also as we discuss above, because, as is plain from its papers, it was able to ascertain the basis for the privileges asserted and disagreed with them by bringing the present motion. 3 is “allied in a common legal cause” with the client in the present suit claiming privilege. In re Regents of Univ. Of Cal., 101 F.3d 1386, 1389 (Fed. Cir. 1996) (quoting In re Grand Jury Duces Tecum, 406 F. Supp. 381, 386 (S.D.N.Y. 1975)). The third party need not be a litigant in the present suit, or any suit, but its interest shared with the party in the present suit must be a legal one, not merely commercial. 2 See B.E. Meyers & Co., Inc. v. United States, 41 Fed. Cl. 729, 732 (1998). The communication must be in furtherance of that common purpose. Kansas City Power & Light Co. v. United States, 138 Fed. Cl. 546, 563 (2018) (citing United States v.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Martin Schwimmer
892 F.2d 237 (Second Circuit, 1989)
In Re the Regents of the University of California
101 F.3d 1386 (Federal Circuit, 1996)
In Re Teleglobe Communications Corp.
493 F.3d 345 (Third Circuit, 2007)
B.E. Meyers & Co. v. United States
41 Fed. Cl. 729 (Federal Claims, 1998)
Deseret Management Corp. v. United States
76 Fed. Cl. 88 (Federal Claims, 2007)
Eden Isle Marina, Inc. v. United States
89 Fed. Cl. 480 (Federal Claims, 2009)

Cite This Page — Counsel Stack

Bluebook (online)
Securitypoint Holdings, Inc. v. United States, Counsel Stack Legal Research, https://law.counselstack.com/opinion/securitypoint-holdings-inc-v-united-states-uscfc-2019.