Securitypoint Holdings, Inc. v. United States ( 2019 )


Menu:
  •       In the United States Court of Federal Claims
    No. 11-268C
    (Filed: April 16, 2019)
    NOT FOR PUBLICATION
    ************************
    SECURITYPOINT HOLDINGS, INC.,
    Plaintiff,                          Motion to compel; Privilege
    logs; RCFC 26(b)(5)(A)(ii);
    Attorney-client  privilege;
    v.                                                Waiver; Common interest
    doctrine; Work product
    doctrine.
    THE UNITED STATES,
    Defendant.
    ********************** **
    ORDER
    Pending now is defendant’s second renewed motion to compel
    documents withheld as privileged, filed on February 26, 2019. This motion
    again concerns defendant’s attempt to probe plaintiff’s finances, valuation of
    its intellectual property, and any outside investors in SecurityPoint or funders
    of the litigation. We have previously protected the disclosure of plaintiff’s
    litigation funding agreements based on the representation of counsel that
    none of them include “any transfer of rights or interest in enforcement of the
    patent or management of the litigation.” Tr. 21 (Nov. 1, 2017 hearing) (ECF
    No. 303). At that same hearing, plaintiff agreed to produce documents
    related to ownership and valuation documents related to an outside investor
    in SecurityPoint, Raptor. In July 2018, as part of a sanction against plaintiff
    for failure to fully produce Raptor documents, we ordered plaintiff to
    produce all remaining documents related to Raptor and any other outside
    investors in SecurityPoint or potential outside investors “to the extent that
    they are not privileged.” Order Granting Mot. For Sanctions 6 (July 17,
    2018) (ECF No. 359). We also ordered plaintiff to maintain a privilege log
    for all documents withheld and to produce it to defendant.
    Those productions have taken place, and the period for discovery has
    ended. Defendant, however, timely filed a motion challenging the
    sufficiency of the privilege logs produced by plaintiff and asking for
    unredacted copies of certain documents. As a remedy for the alleged
    insufficient logs, the government requests that the court review a
    representative sample in camera to confirm what defendant believes are
    inappropriate claims of privilege. Defendant’s motion names 1465 entries in
    those logs as problematic. By the time of oral argument, defendant clarified
    that it was maintaining its challenge as to only documents appearing in that
    list that do not have an attorney listed in the sender or receiver box of the log;
    the rest of their challenges have been abandoned. There are two noted
    exceptions that receive special treatment in defendant’s motion: 1) Oxford
    Valuation Partners Report; and 2) The Prepaid Forward Purchase
    Agreement. We begin with the more general issue of the sufficiency of
    plaintiff’s privilege logs.
    I. SecurityPoint’s Logs
    Defendant argues that plaintiff’s privilege logs are insufficient under
    Rule 26 because they fail to adequately “describe the nature of the
    documents” withheld and fail to do so “in a manner that . . . will enable the
    other party to assess the claim” of privilege. RCFC 26(b)(5)(A)(ii).
    Defendant finds particularly troublesome the lack of document titles and
    email subject lines disclosed. As defendant puts it, “[n]one of the entries
    include any clue as to the content of the document.” Def.’s Mot. 5 (ECF No.
    397). As mentioned above, defendant has abandoned this argument as to
    documents listing an attorney as a sender or receiver. It maintains its request
    to produce those documents that do not list an attorney as the sender or
    receiver, many which involve a transmittal from SecurityPoint personnel to
    individuals at plaintiff’s investor, Raptor.
    Plaintiff responds that it has disclosed more than enough information
    in its logs to comport with Rule 26. It notes that its description of documents
    is much more forthcoming of relevant information than mere document titles
    or email subject lines would be and argues that the date, senders, receivers,
    privileges asserted, and description of documents withheld—the information
    disclosed for each entry in its logs—should be sufficient for defendant’s
    purposes. As a general matter, we agree.
    A survey of the caselaw from this circuit reveals that the rules do not
    require a monolithic form of privilege logs. See Deseret Mgmt. Corp. v.
    United States, 
    76 Fed. Cl. 88
    , 91 (2007) (quoting the advisory committee
    notes from FRCP 26(b)(5)). What is necessary is that the log be sufficient to
    2
    disclose the nature of the document withheld and the basis for withholding
    with enough detail for the other party to assess the claim of privilege.
    Although defendant argues that the logs are wholly insufficient, its own
    briefing largely belies the point. It lists several categories of documents that
    it challenges as not privileged: documents disclosed to non-essential decision
    makers within SecurityPoint; documents disclosed to Lisa Smithson and
    employees of her company as agents or consultants but not for purposes of
    legal advice; documents disclosed to other third parties; and documents sent
    from plaintiff to Raptor (and vice versa). Defendant’s papers take aim at the
    claimed privileges within those tranches of documents. This reveals that,
    instead of a facial challenge to the sufficiency of the logs, defendant
    disagrees with plaintiff’s assertion of attorney-client privilege or work
    product doctrine or believes a waiver of those protections has taken place as
    to a host of documents. We thus conclude that no remedy would be
    appropriate for the mere condition of the logs themselves. 1
    What thus remains at issue after defendant’s abandonment of other
    claims at oral argument are those documents within the above-mentioned
    categories that do not list an attorney in the sender or receiver line. These
    are primarily documents exchanged between Raptor and SecurityPoint. As
    we understand it, defendant’s principle claim is not that these documents
    contain information other than legal advice but that their disclosure by
    plaintiff to Raptor is a waiver of the protection of that advice. Plaintiff’s
    counter-assertion is that the common legal interest it shares with Raptor,
    namely the validity of the patent, protects the disclosure from waiver. We
    find the common interest exception applicable and thus decline to order their
    production to the government.
    A. Common Interest Doctrine
    Normally, a communication that is seeking or giving legal advice that
    is disclosed to a third party waives the attorney-client privilege as to the
    subject of that communication. Eden Isle Marina, Inc. v. United States, 
    89 Fed. Cl. 480
    , 501 (2009). The common interest doctrine, however, operates
    to save such communications from waiver of the privilege if that third party
    1
    And we note that defendant stated affirmatively that it was not seeking new
    logs from SecurityPoint as it believed that would be a waste of time, but also
    as we discuss above, because, as is plain from its papers, it was able to
    ascertain the basis for the privileges asserted and disagreed with them by
    bringing the present motion.
    3
    is “allied in a common legal cause” with the client in the present suit claiming
    privilege. In re Regents of Univ. Of Cal., 
    101 F.3d 1386
    , 1389 (Fed. Cir.
    1996) (quoting In re Grand Jury Duces Tecum, 
    406 F. Supp. 381
    , 386
    (S.D.N.Y. 1975)). The third party need not be a litigant in the present suit,
    or any suit, but its interest shared with the party in the present suit must be a
    legal one, not merely commercial. 2 See B.E. Meyers & Co., Inc. v. United
    States, 
    41 Fed. Cl. 729
    , 732 (1998). The communication must be in
    furtherance of that common purpose. Kansas City Power & Light Co. v.
    United States, 
    138 Fed. Cl. 546
    , 563 (2018) (citing United States v.
    Schwimmer, 
    892 F.2d 237
    , 243 (2nd Cir. 1989)).
    We hold that SecurityPoint and Raptor share a common legal interest
    in the validity of the patent-in-suit, which is at issue in this lawsuit. Raptor
    is an equity investor in SecurityPoint, and, as such, it has a common interest
    in the legal status of the ‘460 patent sufficient to protect its communications
    with SecurityPoint (and vice versa) regarding this lawsuit and other legal
    questions concerning the patent. 3
    B. SecurityPoint Employees and Consultants
    Defendant’s motion also specifically calls out several other sub-
    categories of documents as being subject to waiver of any privilege asserted:
    documents and communications shared too broadly within SecurityPoint
    itself and those shared with Lisa Smithson and employees of her accounting
    firm.
    2
    Defendant’s motion posits that disclosure to a non-attorney would not
    invoke the common interest rule, but we find no support for that rule in the
    caselaw. The case cited by defendant from the Third Circuit was applying a
    specific Delaware evidentiary rule that mandated that conclusion. In re
    Teleglobe Comm’n Corp., 
    493 F.3d 345
    , 364-65 (3rd Cir. 2007) (applying
    Del. R. Evid. 502(B)(3)). The court there noted that the Restatement of Law
    Governing Lawyers did not “emphasize this requirement, though it appears
    in the plain text of the relevant Delaware evidentiary rule.” 
    Id.
     at 364 n.21.
    3
    As we now understand, Raptor also has a separate contractual relationship
    with plaintiff through a litigation funding agreement. Because Raptor has a
    pre-existing equity investment in SecurityPoint, we do not reach the question
    of whether a litigation funding arrangement alone would be sufficient to
    establish a commonality of legal interest.
    4
    1. Management
    Defendant argues that the privilege logs reveal a wide distribution of
    communications claimed to contain legal advice among employees of
    SecurityPoint. This defendant believes is a waiver of the privilege because
    these employees are not themselves decision makers as relates to the legal
    advice nor were they otherwise necessary to the decision making regarding
    that advice. For example, they were not acting at the behest of a corporate
    superior who directed them to obtain legal advice or provide information to
    the corporate attorney. Disclosure of privileged information to persons
    within a corporation that do not have a need for that information is a waiver
    of the attorney-client privilege. See Scott v. Chipotle Mexican Grill, Inc., 94
    F. Supp. 3rd 585, 598 (S.D.N.Y 2015).
    The four documents cited by defendant as examples in its brief,
    however, paint a different picture and perhaps raise a different issue for
    plaintiff. Only two “lower level” employees are among the names found in
    the sender and receiver boxes in the logs. 4 Plaintiff represents in its
    opposition that one is an administrative manager and the other a “strategic
    account manager.” Plaintiff also argues that, in a small company such as
    SecurityPoint, any type of management position would properly be
    considered necessary for the sending and receiving of legal advice. We
    agree. No broad dissemination has been shown, and we are persuaded that
    any legal advice shared among managers at SecurityPoint, a small business,
    would be proper.
    The other issue raised by the logs is that the legal advice or work
    product claimed as protected in these log entries involves disclosure to third
    parties. For several of them, plaintiff claims that the third parties, Dex
    Imaging and Infocus Design, are consulting experts and covered by the
    privilege. Those involving Ms. Smithson, we discuss below.
    There are a few entries involving entities other than plaintiff and
    Raptor throughout defendant’s list of challenged entries. Plaintiff has not
    undertaken to explain each and every entry other than to rest on its
    descriptions provided by its logs or those specifically mentioned above in the
    briefing. 5 Nor, on the other hand, has defendant made more specific
    4
    Other names appearing in those entries, Mr. Ambrefe and Mr. Linehan, are
    principals or high level employees of the company.
    5
    As to Dex Imaging and Infocus Design, plaintiff demurs from answering
    5
    arguments in its briefing as to these others not mentioned above. In fact, the
    first two cited examples in this section above have been abandoned by the
    government as they do not appear in the revised list of challenged entries that
    appears in defendant’s reply brief. Although we are mindful that it is
    plaintiff’s burden to show that the privilege is properly invoked, in light of
    our holding that the logs themselves are not deficient, we are not presented
    with a reason to order their disclosure absent a more concrete argument as to
    why they should be. We are left with the default that the privilege logs have
    properly asserted the privileges claimed for these entries.
    2. Lisa Smithson
    Similar to the category above, disclosure of legal advice to agents of
    the corporation for a purpose other than rendering or obtaining legal advice
    is a waiver, which defendant believes has taken place as it regards Lisa
    Smithson and employees of her accounting firm. Ms. Smithson is the
    Corporate Financial Officer of SecurityPoint, and her firm provides
    accounting services to plaintiff. Defendant raises the issue that, since she is
    an accountant and her firm provides accounting services, the privileges
    invoked may be improper as the communications were for business and
    financial purposes rather than for giving or receiving legal advice or
    preparing documents for litigation.
    Plaintiff retorts that, as the company’s CFO, Ms. Smithson is entitled
    to review legal advice provided by counsel without any waiver arising and is
    further entitled to disseminate that advice to necessary individuals without
    waiving any privileges. Plaintiff also points out that it has produced
    hundreds of documents from Ms. Smithson to defendant already, which, in
    its view, shows that it has properly applied the relevant question of whether
    Ms. Smithson (and her company) were acting merely as accountants or were
    reviewing legal advice properly provided to the company as it pertains to the
    relevant documents. We agree with plaintiff. SecurityPoint has shown a
    those allegations in its briefing as it claims that the issue was not properly
    raised by plaintiff in its pre-motion meet-and-confer. It states, however, that
    it would endeavor to provide more information to defendant. These
    challenged entries do not appear again in defendant’s reply brief nor were
    they mentioned at argument. We note that the entry involving Dex Imaging
    was left off defendant’s final list of challenged entries. We are left in much
    the same position as plaintiff: without a reason to delve into the issue more
    deeply.
    6
    valid reason that the privilege would apply to these documents.
    II. Oxford Valuation Report and Prepaid Forward Purchase Agreement
    The bulk of the briefing concerns two documents, initially withheld,
    then produced after defendant’s motion in redacted form to defendant. The
    first is a valuation of plaintiff’s stock that contains counsel’s views of the
    value of the present litigation, including likelihood of success and particular
    recovery scenarios. The second is a litigation funding agreement involving
    Raptor and other parties. We consider each in turn.
    A. Oxford Valuation Report
    The Oxford Report was authored by Oxford Valuation Partners in
    2016 and was commissioned by plaintiff to provide an independent valuation
    of SecurityPoint’s stock. It is the only such valuation known by defendant
    to exist. Plaintiff originally withheld the entirety of the document from
    defendant, then produced it with pages 39-62 entirely redacted, and now,
    after the present motion, has produced it largely in its original form but with
    many numerical figures withheld, including those that could be used to
    “reverse engineer” the predictions and valuations provided by plaintiff’s
    attorneys.
    Defendant challenges the withholding of any information in the
    document on the basis that the legal advice provided to SecurityPoint in the
    report has been disclosed to an independent third-party, Oxford, and thus the
    protection is waived. Plaintiff argues that Oxford was acting as an agent of
    it by preparing the report and including the advice of counsel at plaintiff’s
    behest. We conclude, however, that the disclosure to Oxford was a waiver. 6
    The report is clear that its purpose was to value SecurityPoint’s stock
    as of July 1, 2016, a non-legal purpose. Defendant presents evidence from
    plaintiff’s contemporary board meeting that the report was commissioned to
    6
    Although we are sympathetic to plaintiff’s point that the information
    withheld as privileged, standing by itself, would not be relevant to the
    underlying issues in the lawsuit, it is contained within the context of a
    document that is relevant to issue of damages, and because the report
    inextricably wound counsel’s valuations of the litigation into the company’s
    stock value, the information cannot be neatly sequestered without ruining
    much of its value to defendant.
    7
    complete a deferred compensation valuation under I.R.C. § 409A. The report
    itself states that it can be used in compliance with that tax provision.
    Subsequent events further confirm the purpose, as defendant lays out in its
    brief. Thus, even if the author was acting as an agent of plaintiff, the reason
    for disclosing the legal advice to Oxford was not for the purpose of giving or
    receiving legal advice. Further, Oxford was not acting as an agent of
    SecurityPoint nor was it merely a conduit of information between counsel
    and client. It was Oxford that authored the report and exercised its judgment
    in how to use the information provided by counsel. It was commissioned to
    provide an independent valuation of the stock, and the rights to the use of the
    report are limited by the cover letter and attached “statement of limiting
    conditions.” See GA 71-72. In sum, we are persuaded that no privilege
    attaches to the Oxford Valuation Report because any privilege over the
    advice given by counsel has been waived by disclosure to Oxford, and the
    document must be produced in unredacted form to defendant.
    B. Prepaid Forward Purchase Agreement
    The final item for our consideration is an agreement between
    SecurityPoint and Raptor that provides for funding of the litigation by Raptor
    up to an agreed upon amount in exchange for a priority return of those funds
    should plaintiff recover them in this lawsuit and an additional return on
    investment if the proceeds of the lawsuit allows. The document, like the
    Oxford Report, was initially withheld from production on the basis of work
    product protection and because we found litigation funding matters to be
    irrelevant based on counsel’s representation that no such agreement included
    an exchange of rights in the patent or control over the litigation. An
    amendment to the Prepaid Forward Purchase Agreement (“PFPA”) was
    produced, however, the language of which suggests to defendant that
    plaintiff’s counsel’s representations were less than wholly forthcoming and
    that some control of the litigation was ceded to Raptor and other investors. 7
    Plaintiff in turn has produced almost all of the original PFPA with certain
    limited redactions. Defendant believes it is entitled to those redacted entries
    now.
    Litigation funding agreements are often considered by the federal
    courts to be protected by the work product doctrine or as otherwise irrelevant
    to the issues at hand. See Miller UK Ltd. v. Caterpillar, Inc., 
    17 F. Supp. 3d 7
    The amendment to the PFPA added several additional parties as funders of
    the litigation.
    8
    711, 730-39 (N.D. Ill. 2014); Lambeth Magnetic Structures, LLC v. Seagate
    Tech. (US) Holdings, Inc., Civil Action No. 16-538. 
    2018 WL 466045
    , at *5-
    6 (W.D. Pa. Jan. 18, 2018) (order denying motion to compel). In the context
    of litigation with the federal government, however, defendant points out that
    the Assignment of Claims Act, 
    31 U.S.C. § 3727
     (2012), might make certain
    provisions relevant to the enforcement of that statute in the litigation or
    whether necessary parties have been joined. Plaintiff counters that the PFPA
    is irrelevant to any issue at bar and that the redacted version provided to
    defendant ought to assuage any concerns regarding assignment of claims or
    joinder. Plaintiff also disputes defendant’s characterization of its prior
    representations to the court and draws a fine distinction in that it represented
    to the court that it had no traditional litigation funding arrangements. This is
    so, in its view, because Raptor has a pre-existing equity interest in
    SecurityPoint and is thus not like a traditional outside funder of litigation.
    Plaintiff maintains its position that the PFPA does not give any control over
    the litigation to any third parties nor any interest in the patent.
    We begin with the initial issue of misrepresentation to the court.
    Although plaintiff’s distinction between a classic litigation funding
    agreement and one made with a party with whom the litigant has a pre-
    existing equity arrangement may have been made in good faith, it certainly
    was not a distinction that the court could have drawn from merely how the
    representation was made. Further, plaintiff has not explained how the other
    entities added as funders by the amendment to the PFPA fit within that
    definition. That said, we do not see a lack of candor with the court or an
    attempt to affirmatively misrepresent.
    There is also the representation that no control of the litigation nor
    interest in the patent was conveyed. Generally, we agree that, by the terms
    of the agreement, plaintiff maintains control of the litigation, but an override
    provision is afforded to the investors should they be of the opinion that
    plaintiff is acting in bad faith by settling or refusing to settle the case. The
    agreement resolves such a dispute by referring it to binding arbitration.
    Again, we find that a good faith distinction between the two positions is
    possible and thus no intent to deceive the court is inferred, but the issue of
    relevance remains.
    It is clear that several of the redactions are merely percentages of
    recovery and funding that are not implicated by any of the concerns raised
    by defendant; there are also several entries, however, that may shed further
    light on the rights and interests of the parties to the PFPA as it pertains to
    9
    control of the litigation. We simply cannot tell from the context alone, and
    we are not in a position to opine on the ultimate importance, or not, of these
    provisions as they pertain to any of the potential issues raised by defendant.
    Therefore, a legitimate need may be present that overcomes a relevance
    objection, but the question of work product protection remains. We
    previously ruled that funding of the litigation was off limits to the
    government. Defendant has raised a potential need for the information now
    due to assignment or joinder. Because work product protection is not
    inviolable and can be overcome by a showing of need, the inquiry is not over.
    The court will have to assess the issue by reviewing the unredacted
    provisions in camera.
    III. Conclusion
    Accordingly, the following is ordered. Defendant’s motion is granted
    as it pertains to the Oxford Valuation Report. Plaintiff must produce it in
    whole to defendant. Plaintiff is furthered ordered to provide an unredacted
    copy of the PFPA to the court for review in camera on or before April 23,
    2019. Defendant’s motion is denied in all other respects.
    s/Eric G. Bruggink
    ERIC G. BRUGGINK
    Senior Judge
    10