AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
ORDER GRANTING IN PART AND DENYING IN PART MOTION TO COMPEL COMPLIANCE WITH SUBPOENA DUCES TECUM
I. INTRODUCTION
This case raises three vital interests: (1) the national interest in a judicial system to reach informed decisions through the power of a subpoena to compel a third party to produce relevant information; (2) the third-partyâs interest in not being compelled by a subpoena to reveal confidential business information and devote resources to a distant
In aid of the Governmentâs position in the case of ACLU v. Gonzales, Civil Action No. 98-CV-5591 pending in the Eastern District of Pennsylvania, United States Attorney General Alberto R. Gonzales has subpoenaed Google, Inc., (âGoogleâ) to compile and produce a massive amount of information from Googleâs search index, and to turn over a significant number of search queries entered by Google users. Google timely objected to the Governmentâs request. Following the requisite meet and confer, the Government filed the present Miscellaneous Action in this District to compel Google to comply with the subpoena. On March 14, 2006, this Court held a hearing on the Governmentâs Motion.
II. PROCEDURAL BACKGROUND
In 1998, Congress enacted the Child Online Protection Act (âCOPAâ), which is now codified as 47 U.S.C. § 231. COPA prohibits the knowing making of a communication by means of the World Wide Web, âfor commercial purposes that is available to any minor and that includes material that is harmful to minors,â subject to certain affirmative defenses. 47 U.S.C. § 231(a)(1). For this purpose, the statute defines the phrase âmaterial that is harmful to minorsâ to mean material that is either obscene or material that meets each prong of a three-part test: â(A) the average person, applying contemporary community standards, would find, taking the material as a whole and with respect to minors, is designed to appeal to, or is designed to pander to, the prurient interest; (B) depicts, describes, or represents, in a manner patently offensive with respect to minors, an actual or simulated sexual act or sexual conduct, an actual or simulated normal or perverted sexual act, or a lewd exhibition of the genitals or post-pubescent female breast; and (C) taken as a whole, lacks serious literary, artistic, political, or scientific value for minors.â 47 U.S.C. § 231(e)(6).
Upon enactment of COPA, the American Civil Liberties Union and several other plaintiffs (âPlaintiffsâ) filed an action in the Eastern District of Pennsylvania, challenging the constitutionality of the Act. The district court granted Plaintiffsâ motion for a preliminary injunction on the grounds that COPA is likely to be found unconstitutional on its face for violating the First Amendment rights of adults. ACLU v. Reno, 31 F.Supp.2d 473 (E.D.Pa.1999). The United States Court of Appeals for the Third Circuit affirmed the grant of the preliminary injunction. ACLU v. Reno, 217 F.3d 162 (3d Cir.2000). After granting certiorari, the Supreme Court of the United States vacated the judgment of the Third Circuit, and remanded the case to that court for further review of the district courtâs grant of preliminary injunction in favor of Plaintiffs. The Third Circuit again affirmed the preliminary injunction, ACLU v. Ashcroft, 322 F.3d 240 (3d Cir.2003), and the Supreme Court again granted certiorari.
The Supreme Court affirmed the preliminary injunction and held that there was an insufficient record before it by which the Government could carry its burden to show that less restrictive alternatives may be more effective than the provisions of COPA. Ashcroft v. ACLU, 542 U.S. 656, 673, 124 S.Ct. 2783, 159 L.Ed.2d 690 (2004). Of these alternatives directed at preventing minors from viewing âharmful to minorsâ material on the Internet, the Court focused on blocking and filtering software programs which âimpose selective restrictions on speech at the receiving end, not universal restrictions at the source.â Id. at 667, 124 S.Ct. 2783. To âallow the parties to update and supplement the factual record to reflect current technological realities,â the Court remanded the
Following remand, Plaintiffs filed a First Amended Complaint (âFACâ). (98-CV-5591LR, E.D. Pa., Docket Item No. 175). Apparently, in preparing its defense, the Government initiated a study designed to somehow test the effectiveness of blocking and filtering software. To provide it with data for its study, the Government served a subpoena on Google, America Online, Inc. (âAOLâ), Yahoo! Inc. (âYahooâ), and Microsoft, Inc. (âMicrosoftâ). The subpoena required that these companies produce a designated listing of the URLs which would be available to a user of their services. The subpoena also required the companies to produce the text of usersâ search queries. AOL, Yahoo, and Microsoft appear to be producing data pursuant to the Governmentâs request. Google, however, objected.
Google is a Delaware corporation headquartered in Mountain View, CA, that, like AOL, Yahoo, and Microsoft, also provides search engine capabilities. Based on the Governmentâs estimation, and uncontested by Google, Googleâs search engine is the most widely used search engine in the world, with a market share of about 45%. The search engine at Google yields URLs in response to a search query entered by a user. The search queries entered may be of varying lengths, and incorporate a number of terms and connectors. Upon receiving a search query, Google produces a responsive list of URLs from its search index in a particular order based on algorithms proprietary to Google.
The initial subpoena to Google sought production of an electronic file containing two general categories. First, the subpoena requested â[a]ll URLâs that are available to be located to a query on your companyâs search engine as of July 31, 2005.â (Decl. of Joel McElvain, Ex. A (âSubpoenaâ) at 4.) In negotiations with Google, this request was later narrowed to a âmulti-stage randomâ sampling of one million URLs in Googleâs indexed database. As represented to the Court at oral argument, the Government now seeks only 50,000 URLs from Googleâs search index. Second, the government also initially sought â[a]ll queries that have been entered on your companyâs search engine between June 1, 2005 and July 31, 2005 inclusive.â (Subpoena at 4.) Following further negotiations with Google, the Government narrowed this request to all queries that have been entered on the Google search engine during a one-week period. During the course of the present Miscellaneous Action, the Government further restricted the scope of its request, and now represents that it only requires 5,000 entries from Googleâs query log in order to meet its discovery needs.
Despite these modifications in the scope of the subpoena, Google maintained its objection to the Governmentâs requests. Before the Court is a motion to compel Google to comply with the modified subpoena, namely, for a sample of 50,000 URLs from Googleâs search index and 5,000 search queries entered by Googleâs users from Googleâs query log.
III. STANDARDS
Rule 45 of the Federal Rules of Civil Procedure governs discovery of nonparties by subpoena. Fed. R. Civ. P. 45 (âRule 45â). The Advisory Committee Notes to the 1970 Amendment to Rule 45 state that the âscope of discovery through a subpoena is the same as that applicable to Rule 34 and other discovery rules.â Rule 45 advisory committeeâs note (1970). Under Rule 34, the rule governing the production of documents between parties, the proper scope of discovery is as specified in Rule 26(b). Fed. R. Civ. P. 34. See also Heat & Control, Inc. v. Hester Industries, Inc., 785 F.2d 1017 (Fed.Cir.1986) (ârule 45(b)(1) must be read in light of Rule 26(b)â); Exxon Shipping Co. v. U.S. Dept. of Interior, 34 F.3d 774, 779 (9th Cir.1994) (applying both Rule 26 and Rule 45 standards to rule on a motion to quash subpoena).
Rule 26(b), in turn, permits the discovery of any non-privileged material ârelevant to the claim or defense of any party,â where ârelevant information need not be admissible at trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence.â Rule 26(b)(1). Rele
Rule 26 also specifies that â[a]ll discovery is subject to the limitations imposed by Rule 26(b)(2)(i), (ii), and (iii)â which requires that discovery methods be limited where:
(1) the discovery sought is unreasonably cumulative or duplicative, or is obtainable from some source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity by discovery in the action to obtain the information sought; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, taking into account the needs of the case, the amount in controversy, the partiesâ resources, the importance of the issues at stake in the litigation, and the importance of the proposed discovery in resolving the issues.
The Advisory Committee Notes to the 1983 amendments to Rule 26 state that â[t]he objective is to guard against redundant or disproportionate discovery by giving the court authority to reduce the amount of discovery that may be directed to matters that are otherwise proper subjects of inquiry.â However, the commentators also caution that âthe court must be careful not to deprive a party of discovery that is reasonably necessary to afford a fair opportunity to defend and prepare the case.â Rule 26 advisory committeeâs note (1983).
In addition to the discovery standards under Rule 26 incorporated by Rule 45, Rule 45 itself provides that âon timely motion, the court by which a subpoena was issued shall quash or modify the subpoena if it.. .subjects a person to undue burden.â Rule 45(3)(A). Of course, âif the sought-after documents are not relevant, nor calculated to lead to the discovery of admissible evidence, then any burden whatsoever imposed would be by definition âundue.â â Compaq Computer Corp. v. Packard Bell Elec., Inc., 163 F.R.D. 329, 335-36 (N.D.Cal.1995). Underlying the protections of Rule 45 is the recognition that âthe word ânon-party' serves as a constant reminder of the reasons for the limitations that characterize âthird-partyâ discovery.â Dart Indus. Co. v. Westwood Chem. Co., 649 F.2d 646, 649 (9th Cir.1980) (citations omitted). Thus, a court determining the propriety of a subpoena balances the relevance of the discovery sought, the requesting partyâs need, and the potential hardship to the party subject to the subpoena. Heat & Control, 785 F.2d at 1024.
IV. DISCUSSION
Google primarily argues that the information sought by the subpoena is not reasonably calculated to lead to evidence admissible in the underlying litigation, and that the production of information is unduly burdensome. The Court discusses each of these objections in turn, as well as the Courtâs own concerns about the potential interests of Googleâs users.
A. Relevance
Any information sought by means of a subpoena must be relevant to the claims and defenses in the underlying case. More precisely, the information sought must be âreasonably calculated to lead to admissible evidence.â Rule 26(b). This requirement is liberally construed to permit the discovery of information which ultimately may not be admissible at trial. Overbroad subpoenas seeking irrelevant information may be quashed or modified. See, e.g., Moon v. SCP Pool Corp., 232 F.R.D. 633, 637 (C.D.Cal.2005) (quashing subpoena seeking the production of all purchasing information where the underlying contract dispute was limited to a particular geographic region); W.E. Green v. Baca, 219 F.R.D. 485, 490 (C.D.Cal.2003) (providing a survey of cases where in limiting the scope of a subpoena, district courts âeffectively sustain[] an objection that the requests are vague, ambiguous, or overbroad in part, and overrules in partâ).
This Court does not have the benefit of involvement with the underlying litigation. The Court adheres to the principle stated in Truswal Systems Corp. v. Hydro-Air Engi
However, the Court does not construe a general policy of permissiveness to require this Court to abdicate its responsibility to review a subpoena under the Federal Rules when presented with a motion to compel. The Court has reviewed the decisions comprising the lengthy procedural history of this case in the Eastern District of Pennsylvania, the Third Circuit, and the Supreme Court, as well as Plaintiffsâ current complaint. The Court has heard the parties at oral argument
1. Sample of URLs
As narrowed by negotiations with Google and through the course of this Miscellaneous Action, the Government now seeks a sample of 50,000 URLs from Googleâs search index. In determining whether the information sought is reasonably calculated to lead to admissible evidence, the party seeking the information must first provide the Court with its plans for the requested information. See Northwestern Memorial v. Ashcroft, 362 F.3d 923, 931 (7th Cir.2004). The Governmentâs disclosure of its plans for the sample of URLs is incomplete. The actual methodology disclosed in the Governmentâs papers as to the search index sample is, in its entirety, as follows: âA human being will browse a random sample of 5,000-10,000 URLs from Googleâs index and categorize those sites by contentâ (Supp. Decl. of Phillip B. Stark, Ph.D (âSupp. Stark Decl.â) It 4) and from this information, the Government intends to âestimate. . .the aggregate properties of the websites that search engines have indexed.â (Governmentâs Reply Memorandum in Support of the Motion to Compel Compliance with Subpoena Duces Tecum (âReplyâ), Docket Item No. 21 at 4:8-9.) The Governmentâs disclosure only describes its methodology for a study to categorize the URLs in Googleâs search index, and does not disclose a study regarding the effectiveness of filtering software. Absent any explanation of how the âaggregate propertiesâ of material on the Internet is germane to the underlying litigation
Based on the Governmentâs statement that this information is to act as a âtest set for the studyâ (Reply at 3:20) and a general statement that the purpose of the study is to âevaluate the effectiveness of content filtering software,â (Reply at 3:2-5) the Court is able to envision a study whereby a sample of 50,000 URLs from the Google search index may be reasonably calculated to lead to admissible evidence on measuring the effectiveness of filtering software. In such a study, the Court imagines, the URLs would be categorized, run through the filtering software, and the effectiveness of the filtering software ascertained as to the various categories of URLs. The Government does not even provide this rudimentary level of general detail as to what it intends to do with the sample of URLs to evaluate the effectiveness of filtering software, and at the hearing neither confirmed nor denied the Courtâs speculations about the study.
As the court in Northwestern Memorial colorfully noted, âand of course, pretrial discovery is a fishing expedition and one canât know what one has caught until one fishes [b]ut Fed.R.Civ.P. 45(e) allows the fish to object, and when they do so the fisherman has to come up with more,â 362 F.3d at 931â it is difficult for a court to determine the relevance of information where the party seeking the information does not concretely disclose its plans for the information sought. Given the broad definition of relevance in Rule 26, and the current narrow scope of the subpoena, despite the vagueness with which the Government has disclosed its study, the Court gives the Government the benefit of the doubt. The Court finds that 50,000 URLs randomly selected from Googleâs data base for use in a scientific study of the effectiveness of filters is relevant to the issues in the ease of ACLU v. Gonzales.
2. Search Queries
In its original subpoena the Government sought a listing of the text of all search queries entered by Google users over a two month period. As defined in the Governmentâs subpoena, âqueriesâ include only the text of the search string entered by a user, and not âany additional information that may be associated with such a text string that would identify the person who entered the text string into the search engine, or the computer from which the text string was entered.â (Subpoena at 4.) The Government has narrowed its request so that it now seeks only a sample of 5,000 such queries from Googleâs query log. The Government discloses its plans for the query log information as follows: âA random sample of approximately 1,000 Google queries from a one-week period will be run through the Google search engine. A human being will browse the top URLs returned by each search and categorize the sites by content.â (Supp. Stark Deel. H 3.) To the extent that the URLs obtained by the researchers as a result of running the search queries provided are then used to create âa sample of a relevant population of websites that can be categorized and used to test filtering softwareâ (Reply at 5) similar to the sample created from URLs from Googleâs search index, the Court finds that were the Government to run these URLs through the filtering software and analyze the results, the information sought would be reasonably calculated to lead to admissible evidence.
Googleâs arguments challenging the relevance of the search queries to the Governmentâs study center around its contention that a number of additional factors exist which may mitigate the correlation between a search query and the search result. (Googleâs Opposition to the Governmentâs Motion to Compel (âOpp.â), Docket Item No. 12 at 6:9-8:l.) In particular, Google cites to the presence of a safe search filter, customized searches, or advanced preferences all potentially activated at the user end and not reflected in the userâs search string. (Opp. at 6:17-7:2.) Google also argues that the list of search queries does not distinguish between sources of the queries such as adults, minors, automatic queries generated by a program, known as âbotâ queries, and artificial queries generated by individual users. (Opp. at 7:3-22.) Contrary to Googleâs belief, the broad
B. Undue Burden
This Court is particularly concerned anytime enforcement of a subpoena imposes an economic burden on a non-party. Under Rule 45(3)(a), a court may modify or quash a subpoena even for relevant information if it finds that there is an undue burden on the non-party. Undue burden to the non-party is evaluated under both Rule 26 and Rule 45. See Exxon Shipping Co. v. U.S. Dept. of Interior., 34 F.3d 774, 779 (9th Cir.1994).
1. Technological Burden of Production
Google argues that it faces an undue burden because it does not maintain search query or URL information in the ordinary course of business in the format requested by the Government. (Opp. at 16:22-15.) As a general rule, non-parties are not required to create documents that do not exist, simply for the purposes of discovery. Insituform, Tech., Inc. v. Cat Contracting, Inc., 168 F.R.D. 630, 633 (N.D.Ill.1996). In this case, however, Google has not represented that it is unable to extract the information requested from its existing systems. Google contends that it must create new code to format and extract query and URL data from many computer banks, in total requiring up to eight full time days of engineering time. Because the Government has agreed to compensate Google for the reasonable costs of production, and given the extremely scaled-down scope of the subpoena as modified, the Court does not find that the technical burden of production excuses Google from complying with the subpoena. Later in this Order, the Court addresses other concerns with respect to this information, however.
Google also argues that even if the Government compensates Google for its engineering time, if the Government plans on executing a high volume of searches on Google, such searches would lead to an interference with Googleâs search engine and disrupt use by users and advertisers. (Opp. at 16:24-17:3.) The Government only intends to run 1,000 to 5,000 of the search queries through the Google search engine. (Supp. Stark Deck 114.) Furthermore, these searches will be run by humans who will then categorize the search results and record their findings. (Supp. Stark Deck 114.) Given the volume and rate of the proposed study, the Court finds that the additional burden on Googleâs search engine caused by the Governmentâs study as represented to the Court, is likely to be de minimus.
2. Potential for Loss of User Trust
Google also argues that it will be unduly burdened by loss of user trust if forced to produce its usersâ queries to the Government. Google claims that its success is attributed in large part to the volume of its users and these users may be attracted to its search engine because of the privacy and anonymity of the service. According to Google, even a perception that Google is acquiescing to the Governmentâs demands to release its query log would harm Googleâs business by deterring some searches by some users. (Opp. at 18.)
Googleâs own privacy statement indicates that Google users could not reasonably expect Google to guard the query log from disclosure to the Government. Googleâs privacy statement at www.google.com/priva-cypolicy.html states only that Google will protect âpersonal informationâ of users. âPersonal informationâ is expressly defined for users at www.google.com/privacy faq.
However, even if an expectation by Google users that Google would prevent disclosure to the Government of its usersâ search queries is not entirely reasonable, the statistic cited by Dr. Stark that over a quarter of all Internet searches are for pornography (Supp. Stark Deck H 4), indicates that at least some of Googleâs users expect some sort of privacy in their searches.
3. Trade Secret
Rule 45(e)(3)(B) provides additional protections where a subpoena seeks trade secret or confidential commercial information from a nonparty. Once the nonparty shows that the requested information is a trade secret or confidential commercial information, the burden shifts to the requesting party to show a âsubstantial need for the testimony or material that cannot be otherwise met without undue hardship and assures that the person to whom the subpoena is addressed will be reasonably compensated.â Rule 45(c)(3)(B). Upon such a showing, âthe court may order appearance or production only upon specified conditions.â Id. See also Klay v. All Humana, Inc., 425 F.3d 977, 983 (11th Cir.2005); Heat & Control, Inc. v. Hester Industries, Inc., 785 F.2d 1017, 1025 (Fed.Cir.1986).
a. Search Index and Query Log as Trade Secrets
Trade secret or commercially sensitive information must be âimportant proprietary informationâ and the party challenging the subpoena must make âa strong showing that it has historically sought to maintain the confidentiality of this information.â Compaq Computer Corp. v. Packard Bell Elec., Inc., 163 F.R.D. 329, 338 (N.D.Cal. 1995). A statistically significant sample of Googleâs search index and Googleâs query log would have independent economic value from not being known generally to the public. The disclosure of a statistically significant sample of Googleâs search index or query log may permit competitors to estimate information about Googleâs indexing methods or Googleâs users. (Deck of Matt Cutts (âCutts Deckâ) HH 26, 27.) By declaration, Google represents that it does not share this information with third parties and it has security procedures to maintain the confidentiality of this information. (Cutts Deck 111129-35; Deck of Marty Lev.)
At oral argument, counsel for Google acknowledged that samples from its proprietary search index and query log of 50,000 URLs and 5,000 search queries are far less likely to lead to trade secret disclosure than the Governmentâs original requests. Because Google still continues to claim informa
b. Entanglement in the Underlying Litigation
Googleâs remaining trade secret argument is that despite the narrowness of the sample provided, it would become entangled in the underlying litigation where further discovery would risk trade secret disclosure. Rule 45(c)(3)(B) was intended to provide protection for the intellectual property of non-parties. See Mattel, Inc. v. Walking Mountain Prod., 353 F.3d 792, 814 (9th Cir.2003) (citing Rule 45 advisory committeeâs notes (1991)). On the one hand, a determination of the propriety of further discovery is for another set of motions, and not the one presently before the Court. On the other hand, further discovery in this case that would require disclosure of Googleâs trade secrets is not merely a remote possibility. The Government has represented that it has sufficient information from other search engines with which to perform its study, but seeks information from Google because such information would add âsubstantial lusterâ to its study â ostensibly because there is something unique about the world of Google. The nature and extent of that uniqueness, if sufficient to add substantial luster to the Governmentâs study, is also likely to be a matter of discovery for Plaintiffs in the underlying suit involving more than the Governmentâs proposed âfifteen-minute depositionâ of a Google engineer to confirm that the statisticianâs procedure had been followed.
In light of the comments of Plaintiffsâ counsel at the hearing, the Court can foresee further entanglement based on Plaintiffsâ challenge to the Governmentâs ultimate study. In litigation where the ultimate question is not whether there is adult material on the Internet, but fundamentally about limiting the access by minors to such adult material, it is quite likely that Plaintiffs will challenge the sample produced by Google as not representative of what minors search for or encounter on the Internet. Such an inquiry would require additional discovery, some of which may implicate Googleâs confidential commercial information. At the hearing, Plaintiffsâ counsel stated that it had already commenced such discovery with respect to a search engine included in the Governmentâs study. In other words, this Court is concerned that a narrow sample of Googleâs proprietary index and query log, while in itself not likely to lead to the disclosure of confidential information, may act as the thin blade of the wedge in exposing Google to potential disclosure of its confidential commercial information.
c. Substantial Need
The burden thus shifts to the Government to demonstrate that the requested discovery is relevant and essential to a judicial determination of its case. See Upjohn Co. v. Hygieia Biological Laboratories, 151 F.R.D. 355, 358 (E.D.Cal.1993). Because âthere is no absolute privilege for trade secrets and similar confidential information,â Centurion Indus., Inc. v. Warren Steurer and Assoc., 665 F.2d 323, 325 (10th Cir.1981) (citing Federal Open Market Committee v. Merrill, 443 U.S. 340, 362, 99 S.Ct. 2800, 61 L.Ed.2d 587 (1979)), the district courtâs role in this inquiry is to balance the need for the trade secrets against the claim of injury resulting from disclosure. Heat & Control, 785 F.2d at 1025. The determination of substantial need is particularly important in the context of enforcing a subpoena when discovery of trade secret or confidential commercial information is sought from non-parties. See Mattel, 353 F.3d at 814.
Google contends that it should not be compelled to produce its search index or query log because the information sought by the Government is readily available from open URL databases such as Alexa and transparent search engines such as Dogpile, or that the Government already has sufficient information from AOL, Yahoo, and Microsoft. As
In this case, the Government has demonstrated a substantial need for some information from Google in creating a set of URLs to run through filtering software. It is uncontested that Google is the market leader with over 45% of the search engine market. (Supp. Stark Decl. UU 4-5.) Because Google has the greatest market share, the Governmentâs study may be significantly hampered if it did not have access to some information from the most often used search engine.
k- Cumulative and Duplicative Discovery
What the Government has not demonstrated, however, is a substantial need for both the information contained in the sample of URLs and sample of search query text. Furthermore, even if the information requested is not a trade secret, a district court may in its discretion limit discovery on a finding that âthe discovery sought is unreasonably cumulative or duplicative, or is obtainable from some other source that is more convenient, less burdensome, or less expensive.â Rule 26(b)(2)(i). See In re Sealed Case (Medical Records), 381 F.3d 1205, 1215 (D.C.Cir.2004) (citing the advisory committeeâs notes to Rule 26 and finding that âthe last sentence of Rule 26(b)(1) was added in 2000 âto emphasize the need for active judicial use of subdivision (b)(2) to control excessive discoveryââ). From this Courtâs interpretation of the Governmentâs general statements of purpose for the information requested, both the sample of URLs and the set of search queries are aimed at providing a list of URLs which will be categorized and run through the filtering software in an effort to determine the effectiveness of filtering software as to certain categories. Both sources of the URL âtest setâ list seem to be open to the same sorts of criticism by Plaintiffs in the underlying litigation. The content of these objections are not germane to the Courtâs determination of whether the information sought is relevant under the broad dictates of Rule 26, but the actual similarity of the two categories of information sought in their presumed utility to the Governmentâs study indicates that it would be unreasonably cumulative and duplicative to compel Google to hand over both sets of proprietary information. To borrow the Governmentâs vivid analogy, in order to aid the Government in its study of the entire elephant, the Court may burden a non-party to require production of a picture of the elephantâs tail, but it is within this Courtâs discretion to not require a non-party to produce another picture of the same tail.
Faced with duplicative discovery, and with the Government not expressing a preference as to which source of the test set of URLs it prefers, this Court exercises its discretion pursuant to Rule 26(b)(2) and determines that the marginal burden of loss of trust by Googleâs users based on Googleâs disclosure of its usersâ search queries to the Government outweighs the duplicative disclosureâs likely benefit to the Governmentâs study. Accordingly, the Court grants the Governmentâs motion to compel only as to the sample of 50,000 URLs from Googleâs search index.
C. Protective Order
As trade secret or confidential business information, Googleâs production of a list of URLs to the Government shall be protected by protective order. Generally, âthe selective disclosure of protectable trade secrets is not per se âunreasonable and oppressive,â when appropriate protective measures are imposed.â Heat & Control, 785 F.2d at 1025. The Court recognizes that Google was unable to negotiate the particular provisions of the
The Court grants the motion to compel as to a set of 50,000 URLs from Googleâs search index and orders the parties to show cause, if any, on or before April 3, 2006, why a designation of the produced information as âConfidentialâ under the existing protective order is insufficient protection for Googleâs confidential commercial information.
D. Privacy
The Court raises, sua sponte, its concerns about the privacy of Googleâs users apart from Googleâs business goodwill argument. In Gill v. Gulfstream Park Racing Assoc., the First Circuit held that âconsiderations of the public interest, the need for confidentiality, and privacy interests are relevant factors to be balancedâ in a Rule 26(c) determination regarding the subpoena of documents used to prepare an allegedly defamatory report issued by a non-party trade association. 399 F.3d 391, 402 (1st Cir.2005) (citing, as also concerned with the interest of privacy in the context of discovery, Seattle Times Co. v. Rhinehart, 467 U.S. 20, 35 n. 21, 104 S.Ct. 2199, 81 L.Ed.2d 17 (1984), In re Sealed Case (Medical Records), 381 F.3d at 1215, and Ellison v. Am. Natâl Red Cross, 151 F.R.D. 8, 11 (D.N.H.1993)).
The Government contends that there are no privacy issues raised by its request for the text of search queries because the mere text of the queries would not yield identifiable information. Although the Government has only requested the text strings entered (Subpoena at 4), basic identifia