The Volokh Conspiracy
Mostly law professors | Sometimes contrarian | Often libertarian | Always independent
Court Quashes Subpoena to Florida Election Officials in US Dominion v. My Pillow
From Magistrate Judge Lauren Louis's decision in Griffin v. MyPillow, Inc. (S.D. Fla.), posted today:
This action arises from an out-of-district subpoena directed to the Supervisor of Elections for Monroe County, Florida, issued in connection with US Dominion, Inc. et al. v. My Pillow, Inc. et al., Case No. 1:21-cv-00445-CJN (D.D.C.) … (the "District of Columbia Case").
The District of Columbia Case is an action for defamation brought by plaintiffs US Dominion and its subsidiaries … against defendants My Pillow and its CEO, Michael Lindell, who are Respondents in the instant proceeding. Plaintiffs, who are manufacturers of vote tabulation systems used in elections throughout the country, set out in their complaint that My Pillow and Lindell promoted then-President Donald J. Trump's election-related claims (that the 2020 U.S. presidential election had been stolen from him) to boost their My Pillow product sales among audiences watching certain news outlets, knowing these claims to be false….
Plaintiffs assert that these claims have been resoundingly discredited and rejected in numerous courts, by various agencies of the Federal government, by election officials in numerous states, and by election specialists…. In their complaint, Plaintiffs assert that, on February 4, 2021, they again put the defendants on notice of the falsity of their statements, pointing the defendants to the alleged flaws in the report and data that the defendants had used to support their election-related claims. In response, the defendants asserted, in television interviews, that they were being targeted by Plaintiffs.
The next day, and after having been put on notice by Plaintiffs regarding the alleged falsities of his statements, Lindell broadcasted a purportedly sham documentary-style movie, which is described in greater detail in the complaint. Plaintiffs contend that, apart from promoting My Pillow's products in that movie, Lindell knowingly lied that the discredited report and allegedly manufactured data obtained from conspiracy theorists both were proof that the 2020 presidential election had been stolen, due to algorithms hacked into Plaintiffs' vote tabulation machines….
On September 7, 2022, Respondents served the Subpoena on the Supervisor, commanding production of 22 different categories of information related to the voting system used by Monroe County, Florida during the 2020 U.S. presidential election. The requested information includes forensic copies of all computer drives affiliated or attached to the Supervisor's vote tabulation system, forensic copies of certain files generated by the vote tabulation systems, diagrams of the Supervisor's computer networks running the election system, MAC addresses for election equipment, network logs, credentials for encryption services used by the election system, lists of personnel who had access to the election system before and shortly after the November 2020 presidential election, vote tabulation documents generated during the November 2020 election, documents produced in relation to the November 2020 election, documents related to intrusion attempts on the election system, contracts and agreements with the supplier of the election system, and contracts and agreements related to network security and cybersecurity….
The Supervisor seeks to quash the Subpoena on three grounds. First, the Supervisor argues that compliance with the Subpoena constitutes a threat to the cybersecurity of the election system in Monroe County. According to the Supervisor, Respondents seek the production of information (network diagrams, MAC addresses, IP addresses, and credentials) that would permit the infiltration of Monroe County's voting system; the Supervisor contends that production of this information would constitute a security breach in violation of 6 U.S.C. §§ 1501–1510 and Florida Statutes § 212.318, and there is a significant risk that the information would be publicly disclosed even if subject to a protective order. Moreover, the Supervisor asserts that the information sought is protected from disclosure under Florida Statutes § 119.0725. And, the Supervisor contends that the information sought constitutes "other protected matter" requiring that the Subpoena be quashed, under Rule 45(d)(3)(A)(iii).
Second, the Supervisor argues that the Subpoena should be quashed because it seeks production of confidential and proprietary trade secrets. Specifically, the Supervisor contends that the information sought constitutes trade secrets under Florida law and that the information, particularly the source code and associated documentation, is otherwise confidential pursuant to the Voting System Agreement between the Supervisor and Plaintiffs. Accordingly, the Supervisor asserts that production of documents requested in Requests 1(a)–(h), 2(a)–(b), 3(a), and 3(c) would require the Supervisor to violate the Voting System Agreement.
Third, the Supervisor argues that Subpoena should be quashed because compliance would impose an undue burden on the Supervisor. Specifically, the Supervisor argues that the Subpoena is unduly burdensome because the Supervisor is a non-party; the Subpoena covers an extensive time span, with four of the requests being "unlimited" in scope; the Subpoena calls for production of documents and materials, the creation of which is beyond the scope of the Supervisor and her staff's expertise (e.g., forensic images); and compliance with the Subpoena will require hundreds of hours of work and will be unduly expensive. Last, the Supervisor argues that disclosure of the requested materials would likely require that the Monroe County voting system be replaced…. Upon weighing the relevant factors, the Court finds that, with respect to [the contested requests], the Subpoena must be quashed, as unduly burdensome….
The burden of proof in demonstrating that compliance with a subpoena presents an undue burden lies with the party opposing the subpoena, while the party seeking to enforce a subpoena bears the burden of demonstrating that the request is relevant. To determine whether a subpoena imposes an undue burden, the Court must balance the requesting party's need for the discovery against the burden imposed upon the subpoenaed party. Courts consider the following factors in this analysis: "(1) relevance of the information requested; (2) the need of the party for the documents; (3) the breadth of the document request; (4) the time period covered by the request; (5) the particularity with which the party describes the requested documents; and (6) the burden imposed." Wiwa v. Royal Dutch Petroleum Co. (5th Cir. 2004). "The status of the subpoena recipient as a non-party is also a factor that can weigh against disclosure in the undue burden inquiry." …
As to the first Wiwa factor, the specific relevance of the information in the Supervisor's possession is tenuous. In the Motion, the Supervisor asserts that the requested information is not relevant. In their Response, Respondents point to evidence in the public record about Dominion's vote tabulation systems that purportedly establish Respondents' reasonable basis to pursue the requested information, generally. For example, the Response identifies Dominion's ImageCast X equipment, and D-Suite 5.5-B and D-Suite 5.5-C software, as containing vulnerabilities or anomalies, thus providing a reasonable basis for the information sought from the Supervisor, as that information purportedly bears on the truth or falsity of Mr. Lindell's statements. . However, at oral argument, the Supervisor proffered that Monroe County does not use this particular equipment or software, and instead uses "ImageCast Evolution" equipment, in addition to software that is several versions out of date. This proffer is supported by the Voting System Agreement attached to the Motion, , which identifies the Supervisor's equipment as the ImageCast Evolution system. While the Subpoena appears to appreciate there are different Dominion hardware systems in use, see , the particular equipment and software that the Supervisors uses, which has not been identified as containing vulnerabilities, weakens a finding that the information the Supervisor actually possesses is relevant, irrespective of whether the information sought, generally, is relevant.
However, it is not my finding that the information Respondents seek is irrelevant, and I make no finding as to the relevance of the information sought. Rather, it is my finding that the information the Supervisor possesses is of tenuous relevance. Indeed, as the Supervisor argued at oral argument, there appears to be a difference between what she possesses and what Respondents assert that information will support as evidence. Accordingly, I find that the first factor does not weigh in favor of either side.
I nonetheless turn to Respondents' need for the information sought. As to the second factor, Respondents' need for the information sought from the Supervisor is here diminished. Indeed, Respondents have served subpoenas identical to that here on at least 39 other Dominion customers. Further, the United States District Court for the District of Columbia has entered a protective order governing the production of confidential information. Thus, whatever need Respondents have for the information sought in the Subpoena, the need for the information the Supervisor possesses is diminished in light of the 38 other identical non-party subpoenas.
Next, I turn to the burden compliance would impose on the Supervisor. Regarding the third Wiwa factor, the breadth of the documents requested is indisputably voluminous. Relatedly, and dovetailing with the fourth factor, the Subpoena is overbroad, in part. In Request 1, Respondents seek, from a non-party, "forensic images of every computer drive and memory device that is part of the voting system and every piece of hardware that is part of or used by the voting system." (summarizing Request 1). In Request 2, Respondents seek, without specifying any time period, forensic copies of specific file formats generated from tabulators and ballot marking devices, in addition to "all data related to the November 2020 Election subject to the 22-month voter records retention requirement under U.S. federal law." As to this request, the Subpoena is overbroad. And in Request 3, which at oral argument Respondents confirmed is contingent on receiving productions responsive to Requests 1 and 2, Respondents seek a complete network map of the Supervisor's Dominion election tabulation system, digital addresses for the hardware, network logs (again, not time-limited), log-in credentials to bypass encryption services, and a list of personnel who had access to the network from January 1, 2019 through November 30, 2020.
Because the Supervisor's Dominion election equipment has been used in elections since the November 2020 general election time, I questioned the Parties whether forensic images and copies of the relevant drives and systems requested in Requests 1 and 2, from the time of the November 2020 general election, could even be created or whether, by virtue of their subsequent use, the drives will have necessarily changed. Because counsel for Respondents explained that what is sought is an image of the drives as they were immediately following the 2020 general election, the Supervisor could not represent that the data would still exist. The Supervisor proffered that she could not, without hiring an outside service, determine whether she can create the forensic images and copies from the time period requested. The expense of attempting to collect the responsive data—indeed, of even determining whether it would be possible to collect that data—is unquestionably burdensome. Moreover, Respondents' counsel agreed that images that fail to accurately reveal the status of data following the election would not be relevant to the defenses advanced. The information sought is, essentially, a digital copy of a non-party's entire election system. And in this regard, the Supervisor's status as a non-party is relevant. I afford the Supervisor's non-party status great weight in light of the voluminous information requested.
Finally, while the Subpoena describes the documents requested with particularity, the burden imposed in complying with Requests 1–3 is otherwise undue. The Motion is premised, in part, on the burden compliance would impose coinciding with the Supervisor's preparation for and administration of the 2022 general election leading up to and during early-November 2022. That election has since passed and, as noted above, Respondents consented at oral argument to an extension of time to comply with Requests 4(a) and 4(b). Accordingly, I recognize that the burden has diminished since the filing of the instant Motion.
However, the Supervisor attested that her office employs only nine people, none of whom possess the technical knowledge or expertise required to generate productions responsive to Requests 1, 2, and 3(a)–(d). Thus, to comply with Requests 1, 2, and 3(a)–(d), the Supervisor would have to incur the expense of outside computer experts, which she represents "would probably be Dominion"; although, the Supervisor did not provide the estimated cost of compliance. In any event, the Supervisor further attested that she likely will have to replace her election system if that system's network maps and drives are disclosed, either to ensure that the system is not hacked or to restore public confidence in the system. There has been no proffer advanced to discredit this attestation. The concern is not unreasonable in light of the special importance placed on cybersecurity surrounding election systems, which both sides recognize, and the potential handling or disclosure of the requested information should the District of Columbia Case proceed to dispositive pretrial motions or public trial. While the Supervisor has not adduced evidence of the cost of replacing the election system, review of the Voting System Agreement attached to the Motion reveals that, in 2013 when the Supervisor licensed her system from Plaintiffs, the system cost more than $700,000.00. That cost, in 2022, likely remains high….
I am not persuaded by Respondents' argument that courts have previously ordered the disclosure of election system software. When asked at the hearing whether any court had ever done so, Respondents pointed to Dominion Voting Systems, Inc. v. Wisconsin Elections Commission (Wis. Ct. App. 2020). However, that case involved an appeal regarding the scope of an administrative agency's proposed confidentiality and nondisclosure agreement that would permit a candidate's campaign to gain access to software components of a voting system used in the November 2016 general election, pursuant to the campaign's statutory right to do so under Wisconsin law.
Respondents also pointed to United States District Judge Amy Totenberg's August 11, 2022 Order in Curling v. Raffensperger (N.D. Ga.). There, among other things, the court denied Respondents' motion to intervene in the Northern District of Georgia so that Respondents could gain access to an expert report filed under seal in that court, for use in support of Respondents' defense in the District of Columbia Case. Respondents characterize the expert report as providing a "roadmap explaining how to hack election equipment," and argue that forensic copies of the Supervisors entire election system plus network maps "certainly" should be produced in litigation with appropriate protections if the roadmap to hack that system can be produced in litigation. (emphasis omitted). The Court is not convinced. If anything, the argument runs in the other direction. Accordingly, neither case advanced by Respondents militates against quashing the Subpoena.
For all these reasons, weighing the tenuous relevance of the information in the Supervisor's possession, Respondents' diminished need for the information sought from the Supervisor, the high burden on the Supervisor of compliance, and considering the Supervisor's status as a non- party, I find that the burden on the Supervisor of complying with Requests 1 through 3 is undue.
Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of Reason.com or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
Parts of the Supervisor's response (and I think the court's decision) seem untenable to me. In no particular order:
- How does a state entity have "trade secrets" that can be protected? The software company providing the voting machines might have trade secrets but the Supervisor appears to be asserting trade secrets in the state's own name, not as a contractual obligation to vendors.
- Furthermore, any such "trade secrets" or cybersecurity details would normally seem to justify filing the reply under seal, not refusing to reply at all.
- This is especially true when the underlying reason for the subpoena is to determine whether the cybersecurity protections were adequate.
- Undue burden may be an appropriate argument given the breadth of the subpoena but the whining about 'we don't have enough staff' and 'we'd have to hire somebody' goes exactly nowhere when a private company makes those arguments. It frustrates me when courts hold government entities to a lower standard than they do the rest of us.
- The 'time passed' argument uncompelling but from the snippets we have, I can't tell whether the judge is simply wrong on the technology or right but explaining it very badly.
There are more discrete ways of influencing election results than having a crowd rush the Capital, and Trump has in the past floated future plans by accusing the Democrats of doing what he has in mind.
If one want to hack the election machines, a complete roadmap could come in handy. Using litigation resulting from accusing the other side of doing what one plans to oneself as the means to force others to gove one that information would be pretty much par for the course as far as the way this crowd operates.
Queen Almathea - the Sioervisor’s main argument is that this information would allow the election machines to be hacked, so if it’s disclosed, everything has to be completely replaced with an entirely different system. The Supervisor isn’t stupid here. Neither, it appears, is the Judge.
....and so Dominion continues to hide behind "trade secrets".
I don't think that interpretation flies, Queen. If Dominion had trade secrets that need protecting, they were entirely capable of asserting that right themselves.
Queen:
Lack of a working reply makes commenting today difficult.
"Bumble-do you not think trade secrets law is legit or that technology companies don’t highly value them?"
I am not familiar enough with "trade secret law" to comment on that aspect. Of course companies highly value trade secrets but in this case (voting machine technology) I think there needs to be a way for the public to be assured that the technology isn't and can't be used for nefarious purposes.
He does say that, Queen, but it's a null argument. If you serve me (a private entity) with a subpoena, I can't refuse to comply because of a mere confidentiality clause. The most I can do is let the party that would actually be harmed know about the subpoena so they can intervene to quash in their own name. As a party to the case, Dominion was already on notice. I don't know whether they moved to quash or not but if they did, the Supervisor's argument is irrelevant and if they didn't, the Supervisor's argument is wrong.
Why couldn't the information requested and the proceeding occur under seal?
This is the usual unsophisticated conclusion, but fundamentally the opposite is true. Relying on “security through obscurity” always leads to tears. At the very least, you must consider who watches the watchers and how to ensure backdoors do not exist. Even if you have somehow found a brilliant and honest person to implement your project, everyone makes errors, perhaps leaving a crippling weakness to be exploited by some future insider.
The only thing that works in these cases is security by design, and a design that has been viewed by thousands of eyes is inherently safer than anything closed source. There is a reason why places like Google and Microsoft use tried and true open source crypto algorithms. I think exactly the opposite of what you assert is true. If the US wanted truly secure voting machines, they would mandate only the purchase of open source gear.
If the machines can be hacked if only someone had access to them, then they can be hacked. Security through obscurity is thought of as bad in the security world. Your stuff should be robust enough that it can't be hacked even if someone has your code. If you can't meet that standard then we shouldn't be trusting our votes to your machines.
But I totally believe that their security is bad enough that disclosures *would* be bad.
From the physical appearance of the posts; I am assuming that the dreadful Reason software (re Reply function) is still in effect...it certainly has been preventing me from Replying for quite some time.
Speaking as a nerd, I'd expect a well-run organization to have at least the mission critical disk contents under some form of change control, in which case the state of the disks as of the election could be reconstructed. It would _not_ be a forensic copy -- I've done forensics and it's too late for that.
Obviously I'm not the only one for whom the ability to reply has been disabled.
So, I'll write this (and if inspired to do so, more of the same) as I read down the page.
Btw, who on earth would hire this company in the future, given its eagerness to abuse its customers?
@Rossami: Opinion reads, "Specifically, the Supervisor contends that the information sought constitutes trade secrets under Florida law..." It's fair to ask if this is true, but absurd to deny that it is true absent an examination of said law. The Commission certainly has information that it is normally entitled to keep secret. What would YOU call that?
Submitting the information under seal is of course no guarantee against its revelation and the Commission is entitled to conclude, IMHO, that doing so would constitute sufficient cause so as to require it to replace its system, thus generating a burden, which is the claim accepted by the Court.
You claim that such burdens would not be considered significant by a court were the party private may be true, but it is contrary to what the Court explains should be its burden in deciding the issue. That the courts do in fact regularly fail to do their duty is not a reason to complain about it doing so here, merely a complaint about what is normal. Calling the Commissions claim of right to consideration it is entitled to "whining" appears to be an endorsement of an abusive "normal" and isn't a good look for you. Had Marie Antionette actually said "Let them eat cake!" no one ought have complained about her subsequent death, and on the evidence here it seems no one ought complain should it happen to you in the manner prosibed by Shakepeare's character.
ReaderY You appear to be suggesting that Dominion is acting as an agent of Trump's "crowd" in an attempt to enable Trump's "crowd" to hack Dominions installed base in a future election. Which is Trump Derangement Syndrome on stilts. Really, you are a loon.
"ReaderY You appear to be suggesting that Dominion is acting as an agent of Trump’s “crowd”"
No, he wasn't. Dominion wouldn't need to get source to their voting machines from a third party. I'm would think that the subpoena at issue was by My Pillow's lawyers.
OK, I'm not seeing much more worth replying to, but the observation that the Supervisor's claim that she can't release Dominion's trade secrets to Dominion because of her confidentiality agreement with Dominion is indeed laughable.
But there's no reason to believe said software is bulletproof and giving it to anyone other than Dominion might rightly make the system unusable in the eyes of the Elections Commission. This also applies to other information (network design, etc.) being given to anyone, including Dominion (though if Dominion never had that information I'd be a bit surprised, unless there was a different and for some reason more trusted entity that did the installation).
This is a big kerfuffle over nothing, of course. There was fairly obvious fraud committed in the 2020 election (e.g., in Cobo Hall after midnight) -- the only significant question is whether it affected the final result. And the visible fraud wasn't done by hacking voting machines.
I am impressed that the lack of a working "Reply" has make the discussions far more civil than usual.
One further thought occurs: Dominion may not really want what its subpoena requests. If it had wanted the subpoena complied with it presumably would have made its requests in a more incremental and reasonable fashion, assuming any sort of competence on its part, which I do.
Don Nico:
Well it certainly has cut down on the number of comments.
@MatthewSlyfield: I stand corrected. Which also makes the Supervisor’s reply that it is being required to break its confidentiality agreement non-risible, though there’s a different party to the suit better positioned to defend those secrets. I was mainly relying on almathea’s gloss, which was of course a mistake.
ReaderY, though as I said clearly driven by TDS, is in this instance being less of a loon than I averred.
I see “edit” is also somewhat non-functional, though it works as “replace”, and if you copy your post before hitting the button and then paste that into the blank space you can do what you need to.
Ron Unz's software, which allows reply but (unfortunately (IMHO), doesn't have a tree structure, is the best known to me and maybe simply ought to be licensed by Reason. Getting from here to anything non-crappy is going to be a long slog.
As a software and systems engineer with some experience in security topics, I'll echo what Artifex said about "security through obscurity" being distrusted. The only things that should be hidden are the authentication secrets (passwords or private keys). If knowing MAC addresses really allows am exploit, the system is already broken and the state is just trying to hide the fact.
Likewise what A nerdy Fred said about change control; they should be able to reconstruct the approved configuration at an arbitrary point back in time. Practically all safety-critical systems, and most other safety-related systems (meaning failures have some safety effect but would not plausibly cause death or severe injury), are required to have that kind of tracking. Election systems should be held to a similar standard.
"production of confidential and proprietary trade secrets. Specifically, the Supervisor contends that the information sought constitutes trade secrets under Florida law and that the information, particularly the source code and associated documentation, is otherwise confidential pursuant to the Voting System Agreement between the Supervisor and Plaintiffs"
How do you sue someone for libel and then hide behind this?
As truth is a defense, you either don't sue or you have to accept all your secrets being learned. Discovery is a *itch...
Nothing to see here. Move along. Most secure election in history. Move along. Nothing to see here.
The MyPillow guy seems to have plenty of fans among the Volokh Conspiracy's audience.
Which says plenty about this white, male, right-wing blog, none of it good.
Thank you Rev. Costco. Your long history of thoughtful comments has placed you in the running to receive the VC Commenter of the Year Award . Good luck and carry on.
"– How does a state entity have “trade secrets” that can be protected? The software company providing the voting machines might have trade secrets but the Supervisor appears to be asserting trade secrets in the state’s own name, not as a contractual obligation to vendors.
– Furthermore, any such “trade secrets” or cybersecurity details would normally seem to justify filing the reply under seal, not refusing to reply at all."
I run into that a lot in the education field -- Pearson's truly asinine PARCC exam is a good example, where the LSAT and such are published after the exam is graded, Pearson refused to do so.
It got messy because when students told their parents about some of the (allegedly) inappropriate questions on the PARCC, Pearson forced the school districts (government entities) to punish students for talking to their parents.
The argument is that the contract the state entity signed forces it to act as the private entity wants it to -- and while not a good analogy, I'm thinking "agent of the police" and what courts have said when someone who wasn't a cop was able to act on behalf of the cops to do things the cops themselves couldn't do.
The question I ask is if the state entity ought to be allowed to sign away the third party rights of citizens, or if such a contract is against public policy and hence void as to the confidentiality.
Yet another anecdote of Dr. Ed's that never happened.
Pearson did get state and local government schools to punish students for publicly revealing some of the content of the PARCC tests. At least one of these cases came after a parent posted the reported question online in social media.
There were several years that this mini-scandal took place over, and it covered several states - state and federal legislators got into the deal, demanding to know why a private company was monitoring students social media and getting schools to punish students over "leaking" test questions after the exams.
So, you are wrong, and his anecdote (roughly) did happen. It was talked about in the NYT and WashPo, even, not just a bunch of 'local stories'.
Have you ever considered actually checking before you make these sorts of authoritative declarations, or do you just like to display your knowledge like you displayed your expertise in worker's comp law?
Oh, well, if you repeat his completely unsourced anecdote, it magically becomes true because you mention some media outlets. But, no, there was no such incident in which students told their parents about "inappropriate questions" on the PARCC exam and Pearson "forced" school districts to "punish" students for "talking to their parents."
Pearson was complaining about the "leaking" of school questions, and yes, asking the school districts to punish the students. The legislators were upset that Pearson was monitoring test taker social media, potentially misusing the private information of the test takers. As I said, this was something that showed up in major media publications; hardly secret or local-only material.
This is easy to find using a search engine of your choice, if you are not incompetent. I mean, even someone like Dr Ed can manage it - why can't you?
@Gandydancer
"though there’s a different party to the suit better positioned to defend those secrets"
I am not a lawyer, but my limited understanding is that a party would not be allowed to oppose a opposing party subpoena to a non-party.
@ Gandydancer - You are misreading my argument. I assume that the Supervisor's claim that the information constitutes trade secrets is true. I merely question whether that is a proper argument for the Supervisor to be making. Based on the available snippets, they may be trade secrets, but they are not his trade secrets - they are Dominion's.
The Commission may have its own information that it wants to keep confidential but those are not and cannot be trade secrets. As a government entity, I'm pretty sure they have to assert a confidentiality right under some other clause.
@Rossami
"Based on the available snippets, they may be trade secrets, but they are not his trade secrets – they are Dominion’s."
This is true, but the Supervisor's possession/awareness of those trade secrets is almost certainly subject to an NDA.
My understanding is that one element of trade secret law is that it loses trade secret status if it is disclosed to anyone not legally obligated to keep the secret.
Therefore either the trade secret claim is false or the Supervisor is subject to a non-disclosure agreement regarding the trade secrets.
Queen correctly referenced the Federal Rules of Civil Procedure 45(d)(3)(B) to understand this motion to quash.
Briefly:
1. Dominion sued My Pillow in federal court in DC.
2. My Pillow issued a subpoena to the Supervisor of Elections in Monroe County, Florida, for a lot of information about voting systems used in that county in the 2020 election.
3. Rule 45 allows a person "subject to or affected by a subpoena" (possibly but not necessarily the recipient) to move to quash on various grounds but that motion is made in "the court for the district where compliance is required", which is why this motion is heard in federal court in Florida rather than DC.
4. One of the possible grounds for such a motion is that compliance would require divulging a trade secret. Note there is no requirement that it be movant's trade secret, here the Supervisor is entitled to object to divulging Dominion's trade secrets too.
5. The court, after weighing the factors, may grant or deny the motion, or modify the subpoena as appropriate to the circumstances.
In the end the confidentiality/trade secret issue didn't figure in the court's analysis, and it partially quashed the subpoena based on relevance, need, and the burden of compliance.
The level of "legal analysis" one routinely encounters at this white, male, disaffected, polemically partisan, bigot-friendly blog generates sympathy for the law schools that hired the Conspirators.* That scant academic/legal veneer is no longer detectable.
But if they don't learn from their mistakes in this regard, they deserve everything that is coming their way.
* The spirit of the holiday season inclines me to include South Texas College Of Law Houston, just this once.
Using voting machines which contain unviewable trade secrets just seems wrong.