Securitypoint Holdings, Inc. v. United States

In the United States Court of Federal Claims No. 11-268C (Filed: April 16, 2019) NOT FOR PUBLICATION ************************ SECURITYPOINT HOLDINGS, INC., Plaintiff, Motion to compel; Privilege logs; RCFC 26(b)(5)(A)(ii); Attorney-client privilege; v. Waiver; Common interest doctrine; Work product doctrine. THE UNITED STATES, Defendant. ********************** ** ORDER Pending now is defendant’s second renewed motion to compel documents withheld as privileged, filed on February 26, 2019. This motion again concerns defendant’s attempt to probe plaintiff’s finances, valuation of its intellectual property, and any outside investors in SecurityPoint or funders of the litigation. We have previously protected the disclosure of plaintiff’s litigation funding agreements based on the representation of counsel that none of them include “any transfer of rights or interest in enforcement of the patent or management of the litigation.” Tr. 21 (Nov. 1, 2017 hearing) (ECF No. 303). At that same hearing, plaintiff agreed to produce documents related to ownership and valuation documents related to an outside investor in SecurityPoint, Raptor. In July 2018, as part of a sanction against plaintiff for failure to fully produce Raptor documents, we ordered plaintiff to produce all remaining documents related to Raptor and any other outside investors in SecurityPoint or potential outside investors “to the extent that they are not privileged.” Order Granting Mot. For Sanctions 6 (July 17, 2018) (ECF No. 359). We also ordered plaintiff to maintain a privilege log for all documents withheld and to produce it to defendant. Those productions have taken place, and the period for discovery has ended. Defendant, however, timely filed a motion challenging the sufficiency of the privilege logs produced by plaintiff and asking for unredacted copies of certain documents. As a remedy for the alleged insufficient logs, the government requests that the court review a representative sample in camera to confirm what defendant believes are inappropriate claims of privilege. Defendant’s motion names 1465 entries in those logs as problematic. By the time of oral argument, defendant clarified that it was maintaining its challenge as to only documents appearing in that list that do not have an attorney listed in the sender or receiver box of the log; the rest of their challenges have been abandoned. There are two noted exceptions that receive special treatment in defendant’s motion: 1) Oxford Valuation Partners Report; and 2) The Prepaid Forward Purchase Agreement. We begin with the more general issue of the sufficiency of plaintiff’s privilege logs. I. SecurityPoint’s Logs Defendant argues that plaintiff’s privilege logs are insufficient under Rule 26 because they fail to adequately “describe the nature of the documents” withheld and fail to do so “in a manner that . . . will enable the other party to assess the claim” of privilege. RCFC 26(b)(5)(A)(ii). Defendant finds particularly troublesome the lack of document titles and email subject lines disclosed. As defendant puts it, “[n]one of the entries include any clue as to the content of the document.” Def.’s Mot. 5 (ECF No. 397). As mentioned above, defendant has abandoned this argument as to documents listing an attorney as a sender or receiver. It maintains its request to produce those documents that do not list an attorney as the sender or receiver, many which involve a transmittal from SecurityPoint personnel to individuals at plaintiff’s investor, Raptor. Plaintiff responds that it has disclosed more than enough information in its logs to comport with Rule 26. It notes that its description of documents is much more forthcoming of relevant information than mere document titles or email subject lines would be and argues that the date, senders, receivers, privileges asserted, and description of documents withheld—the information disclosed for each entry in its logs—should be sufficient for defendant’s purposes. As a general matter, we agree. A survey of the caselaw from this circuit reveals that the rules do not require a monolithic form of privilege logs. See Deseret Mgmt. Corp. v. United States, 76 Fed. Cl. 88, 91 (2007) (quoting the advisory committee notes from FRCP 26(b)(5)). What is necessary is that the log be sufficient to 2 disclose the nature of the document withheld and the basis for withholding with enough detail for the other party to assess the claim of privilege. Although defendant argues that the logs are wholly insufficient, its own briefing largely belies the point. It lists several categories of documents that it challenges as not privileged: documents disclosed to non-essential decision makers within SecurityPoint; documents disclosed to Lisa Smithson and employees of her company as agents or consultants but not for purposes of legal advice; documents disclosed to other third parties; and documents sent from plaintiff to Raptor (and vice versa). Defendant’s papers take aim at the claimed privileges within those tranches of documents. This reveals that, instead of a facial challenge to the sufficiency of the logs, defendant disagrees with plaintiff’s assertion of attorney-client privilege or work product doctrine or believes a waiver of those protections has taken place as to a host of documents. We thus conclude that no remedy would be appropriate for the mere condition of the logs themselves. 1 What thus remains at issue after defendant’s abandonment of other claims at oral argument are those documents within the above-mentioned categories that do not list an attorney in the sender or receiver line. These are primarily documents exchanged between Raptor and SecurityPoint. As we understand it, defendant’s principle claim is not that these documents contain information other than legal advice but that their disclosure by plaintiff to Raptor is a waiver of the protection of that advice. Plaintiff’s counter-assertion is that the common legal interest it shares with Raptor, namely the validity of the patent, protects the disclosure from waiver. We find the common interest exception applicable and thus decline to order their production to the government. A. Common Interest Doctrine Normally, a communication that is seeking or giving legal advice that is disclosed to a third party waives the attorney-client privilege as to the subject of that communication. Eden Isle Marina, Inc. v. United States, 89 Fed. Cl. 480, 501 (2009). The common interest doctrine, however, operates to save such communications from waiver of the privilege if that third party 1 And we note that defendant stated affirmatively that it was not seeking new logs from SecurityPoint as it believed that would be a waste of time, but also as we discuss above, because, as is plain from its papers, it was able to ascertain the basis for the privileges asserted and disagreed with them by bringing the present motion. 3 is “allied in a common legal cause” with the client in the present suit claiming privilege. In re Regents of Univ. Of Cal., 101 F.3d 1386, 1389 (Fed. Cir. 1996) (quoting In re Grand Jury Duces Tecum, 406 F. Supp. 381, 386 (S.D.N.Y. 1975)). The third party need not be a litigant in the present suit, or any suit, but its interest shared with the party in the present suit must be a legal one, not merely commercial. 2 See B.E. Meyers & Co., Inc. v. United States, 41 Fed. Cl. 729, 732 (1998). The communication must be in furtherance of that common purpose. Kansas City Power & Light Co. v. United States, 138 Fed. Cl. 546, 563 (2018) (citing United States v. Schwimmer, 892 F.2d 237, 243 (2nd Cir. 1989)). We hold that SecurityPoint and Raptor share a common legal interest in the validity of the patent-in-suit, which is at issue in this lawsuit. Raptor is an equity investor in SecurityPoint, and, as such, it has a common interest in the legal status of the ‘460 patent sufficient to protect its communications with SecurityPoint (and vice versa) regarding this lawsuit and other legal questions concerning the patent. 3 B. SecurityPoint Employees and Consultants Defendant’s motion also specifically calls out several other sub- categories of documents as being subject to waiver of any privilege asserted: documents and communications shared too broadly within SecurityPoint itself and those shared with Lisa Smithson and employees of her accounting firm. 2 Defendant’s motion posits that disclosure to a non-attorney would not invoke the common interest rule, but we find no support for that rule in the caselaw. The case cited by defendant from the Third Circuit was applying a specific Delaware evidentiary rule that mandated that conclusion. In re Teleglobe Comm’n Corp., 493 F.3d 345, 364-65 (3rd Cir. 2007) (applying Del. R. Evid. 502(B)(3)). The court there noted that the Restatement of Law Governing Lawyers did not “emphasize this requirement, though it appears in the plain text of the relevant Delaware evidentiary rule.” Id. at 364 n.21. 3 As we now understand, Raptor also has a separate contractual relationship with plaintiff through a litigation funding agreement. Because Raptor has a pre-existing equity investment in SecurityPoint, we do not reach the question of whether a litigation funding arrangement alone would be sufficient to establish a commonality of legal interest. 4 1. Management Defendant argues that the privilege logs reveal a wide distribution of communications claimed to contain legal advice among employees of SecurityPoint. This defendant believes is a waiver of the privilege because these employees are not themselves decision makers as relates to the legal advice nor were they otherwise necessary to the decision making regarding that advice. For example, they were not acting at the behest of a corporate superior who directed them to obtain legal advice or provide information to the corporate attorney. Disclosure of privileged information to persons within a corporation that do not have a need for that information is a waiver of the attorney-client privilege. See Scott v. Chipotle Mexican Grill, Inc., 94 F. Supp. 3rd 585, 598 (S.D.N.Y 2015). The four documents cited by defendant as examples in its brief, however, paint a different picture and perhaps raise a different issue for plaintiff. Only two “lower level” employees are among the names found in the sender and receiver boxes in the logs. 4 Plaintiff represents in its opposition that one is an administrative manager and the other a “strategic account manager.” Plaintiff also argues that, in a small company such as SecurityPoint, any type of management position would properly be considered necessary for the sending and receiving of legal advice. We agree. No broad dissemination has been shown, and we are persuaded that any legal advice shared among managers at SecurityPoint, a small business, would be proper. The other issue raised by the logs is that the legal advice or work product claimed as protected in these log entries involves disclosure to third parties. For several of them, plaintiff claims that the third parties, Dex Imaging and Infocus Design, are consulting experts and covered by the privilege. Those involving Ms. Smithson, we discuss below. There are a few entries involving entities other than plaintiff and Raptor throughout defendant’s list of challenged entries. Plaintiff has not undertaken to explain each and every entry other than to rest on its descriptions provided by its logs or those specifically mentioned above in the briefing. 5 Nor, on the other hand, has defendant made more specific 4 Other names appearing in those entries, Mr. Ambrefe and Mr. Linehan, are principals or high level employees of the company. 5 As to Dex Imaging and Infocus Design, plaintiff demurs from answering 5 arguments in its briefing as to these others not mentioned above. In fact, the first two cited examples in this section above have been abandoned by the government as they do not appear in the revised list of challenged entries that appears in defendant’s reply brief. Although we are mindful that it is plaintiff’s burden to show that the privilege is properly invoked, in light of our holding that the logs themselves are not deficient, we are not presented with a reason to order their disclosure absent a more concrete argument as to why they should be. We are left with the default that the privilege logs have properly asserted the privileges claimed for these entries. 2. Lisa Smithson Similar to the category above, disclosure of legal advice to agents of the corporation for a purpose other than rendering or obtaining legal advice is a waiver, which defendant believes has taken place as it regards Lisa Smithson and employees of her accounting firm. Ms. Smithson is the Corporate Financial Officer of SecurityPoint, and her firm provides accounting services to plaintiff. Defendant raises the issue that, since she is an accountant and her firm provides accounting services, the privileges invoked may be improper as the communications were for business and financial purposes rather than for giving or receiving legal advice or preparing documents for litigation. Plaintiff retorts that, as the company’s CFO, Ms. Smithson is entitled to review legal advice provided by counsel without any waiver arising and is further entitled to disseminate that advice to necessary individuals without waiving any privileges. Plaintiff also points out that it has produced hundreds of documents from Ms. Smithson to defendant already, which, in its view, shows that it has properly applied the relevant question of whether Ms. Smithson (and her company) were acting merely as accountants or were reviewing legal advice properly provided to the company as it pertains to the relevant documents. We agree with plaintiff. SecurityPoint has shown a those allegations in its briefing as it claims that the issue was not properly raised by plaintiff in its pre-motion meet-and-confer. It states, however, that it would endeavor to provide more information to defendant. These challenged entries do not appear again in defendant’s reply brief nor were they mentioned at argument. We note that the entry involving Dex Imaging was left off defendant’s final list of challenged entries. We are left in much the same position as plaintiff: without a reason to delve into the issue more deeply. 6 valid reason that the privilege would apply to these documents. II. Oxford Valuation Report and Prepaid Forward Purchase Agreement The bulk of the briefing concerns two documents, initially withheld, then produced after defendant’s motion in redacted form to defendant. The first is a valuation of plaintiff’s stock that contains counsel’s views of the value of the present litigation, including likelihood of success and particular recovery scenarios. The second is a litigation funding agreement involving Raptor and other parties. We consider each in turn. A. Oxford Valuation Report The Oxford Report was authored by Oxford Valuation Partners in 2016 and was commissioned by plaintiff to provide an independent valuation of SecurityPoint’s stock. It is the only such valuation known by defendant to exist. Plaintiff originally withheld the entirety of the document from defendant, then produced it with pages 39-62 entirely redacted, and now, after the present motion, has produced it largely in its original form but with many numerical figures withheld, including those that could be used to “reverse engineer” the predictions and valuations provided by plaintiff’s attorneys. Defendant challenges the withholding of any information in the document on the basis that the legal advice provided to SecurityPoint in the report has been disclosed to an independent third-party, Oxford, and thus the protection is waived. Plaintiff argues that Oxford was acting as an agent of it by preparing the report and including the advice of counsel at plaintiff’s behest. We conclude, however, that the disclosure to Oxford was a waiver. 6 The report is clear that its purpose was to value SecurityPoint’s stock as of July 1, 2016, a non-legal purpose. Defendant presents evidence from plaintiff’s contemporary board meeting that the report was commissioned to 6 Although we are sympathetic to plaintiff’s point that the information withheld as privileged, standing by itself, would not be relevant to the underlying issues in the lawsuit, it is contained within the context of a document that is relevant to issue of damages, and because the report inextricably wound counsel’s valuations of the litigation into the company’s stock value, the information cannot be neatly sequestered without ruining much of its value to defendant. 7 complete a deferred compensation valuation under I.R.C. § 409A. The report itself states that it can be used in compliance with that tax provision. Subsequent events further confirm the purpose, as defendant lays out in its brief. Thus, even if the author was acting as an agent of plaintiff, the reason for disclosing the legal advice to Oxford was not for the purpose of giving or receiving legal advice. Further, Oxford was not acting as an agent of SecurityPoint nor was it merely a conduit of information between counsel and client. It was Oxford that authored the report and exercised its judgment in how to use the information provided by counsel. It was commissioned to provide an independent valuation of the stock, and the rights to the use of the report are limited by the cover letter and attached “statement of limiting conditions.” See GA 71-72. In sum, we are persuaded that no privilege attaches to the Oxford Valuation Report because any privilege over the advice given by counsel has been waived by disclosure to Oxford, and the document must be produced in unredacted form to defendant. B. Prepaid Forward Purchase Agreement The final item for our consideration is an agreement between SecurityPoint and Raptor that provides for funding of the litigation by Raptor up to an agreed upon amount in exchange for a priority return of those funds should plaintiff recover them in this lawsuit and an additional return on investment if the proceeds of the lawsuit allows. The document, like the Oxford Report, was initially withheld from production on the basis of work product protection and because we found litigation funding matters to be irrelevant based on counsel’s representation that no such agreement included an exchange of rights in the patent or control over the litigation. An amendment to the Prepaid Forward Purchase Agreement (“PFPA”) was produced, however, the language of which suggests to defendant that plaintiff’s counsel’s representations were less than wholly forthcoming and that some control of the litigation was ceded to Raptor and other investors. 7 Plaintiff in turn has produced almost all of the original PFPA with certain limited redactions. Defendant believes it is entitled to those redacted entries now. Litigation funding agreements are often considered by the federal courts to be protected by the work product doctrine or as otherwise irrelevant to the issues at hand. See Miller UK Ltd. v. Caterpillar, Inc., 17 F. Supp. 3d 7 The amendment to the PFPA added several additional parties as funders of the litigation. 8 711, 730-39 (N.D. Ill. 2014); Lambeth Magnetic Structures, LLC v. Seagate Tech. (US) Holdings, Inc., Civil Action No. 16-538. 2018 WL 466045, at *5- 6 (W.D. Pa. Jan. 18, 2018) (order denying motion to compel). In the context of litigation with the federal government, however, defendant points out that the Assignment of Claims Act, 31 U.S.C. § 3727 (2012), might make certain provisions relevant to the enforcement of that statute in the litigation or whether necessary parties have been joined. Plaintiff counters that the PFPA is irrelevant to any issue at bar and that the redacted version provided to defendant ought to assuage any concerns regarding assignment of claims or joinder. Plaintiff also disputes defendant’s characterization of its prior representations to the court and draws a fine distinction in that it represented to the court that it had no traditional litigation funding arrangements. This is so, in its view, because Raptor has a pre-existing equity interest in SecurityPoint and is thus not like a traditional outside funder of litigation. Plaintiff maintains its position that the PFPA does not give any control over the litigation to any third parties nor any interest in the patent. We begin with the initial issue of misrepresentation to the court. Although plaintiff’s distinction between a classic litigation funding agreement and one made with a party with whom the litigant has a pre- existing equity arrangement may have been made in good faith, it certainly was not a distinction that the court could have drawn from merely how the representation was made. Further, plaintiff has not explained how the other entities added as funders by the amendment to the PFPA fit within that definition. That said, we do not see a lack of candor with the court or an attempt to affirmatively misrepresent. There is also the representation that no control of the litigation nor interest in the patent was conveyed. Generally, we agree that, by the terms of the agreement, plaintiff maintains control of the litigation, but an override provision is afforded to the investors should they be of the opinion that plaintiff is acting in bad faith by settling or refusing to settle the case. The agreement resolves such a dispute by referring it to binding arbitration. Again, we find that a good faith distinction between the two positions is possible and thus no intent to deceive the court is inferred, but the issue of relevance remains. It is clear that several of the redactions are merely percentages of recovery and funding that are not implicated by any of the concerns raised by defendant; there are also several entries, however, that may shed further light on the rights and interests of the parties to the PFPA as it pertains to 9 control of the litigation. We simply cannot tell from the context alone, and we are not in a position to opine on the ultimate importance, or not, of these provisions as they pertain to any of the potential issues raised by defendant. Therefore, a legitimate need may be present that overcomes a relevance objection, but the question of work product protection remains. We previously ruled that funding of the litigation was off limits to the government. Defendant has raised a potential need for the information now due to assignment or joinder. Because work product protection is not inviolable and can be overcome by a showing of need, the inquiry is not over. The court will have to assess the issue by reviewing the unredacted provisions in camera. III. Conclusion Accordingly, the following is ordered. Defendant’s motion is granted as it pertains to the Oxford Valuation Report. Plaintiff must produce it in whole to defendant. Plaintiff is furthered ordered to provide an unredacted copy of the PFPA to the court for review in camera on or before April 23, 2019. Defendant’s motion is denied in all other respects. s/Eric G. Bruggink ERIC G. BRUGGINK Senior Judge 10