Posts By :

Doug Austin

Defendant Had Duty to Preserve Despite No Physical Possession of Documents – eDiscovery Case Law

In Haskins v. First American Title Insurance Co., No. 10-5044 (RMB/JS), 2012 U.S. Dist. (D.N.J. Oct. 18, 2012), a court found that an insurance company had a duty to issue a litigation hold to its independent title agents because litigation was reasonably foreseeable and the duty to preserve extends to third parties, as long as the documents are “within a party’s possession, custody, or control.” Although it did not have physical possession, the insurance company controlled the agents’ documents because it had “‘the legal right or ability to obtain the documents from [the agents] upon demand.’”

Customers sued First American Title Insurance Company for its alleged scheme to overcharge for title insurance when they refinanced their residential mortgages. During discovery, the plaintiffs sought access to closing documents that were not physically held by First American but by its independent title agents. Because Rule 34(a) of the Federal Rules of Civil Procedure permits a requesting party to seek access only to documents that are within another party’s “possession, custody, or control,” the court considered whether that “control” extended to documents in the hands of the independent title agents.

First establishing that control exists when “a party ‘has the legal right or ability to obtain the documents from another source upon demand’” and that “a party is not required to have physical possession of documents for control to be present,” the court highlighted the specific language in contracts between First American and its independent title agents that conferred control upon the company: “make all Documentation available for inspection and examination by COMPANY at any reasonable time” and “permit First American to examine, audit and copy all financial information and records upon reasonable prior notice.”

That some of the contracts contained language indicating that the files were the agent’s property did not negate First American’s “continued right of access to and use of its agents’ files” or disrupt its control “of the files within the meaning of Rule 34.” Moreover, any attempted argument by First American that it could not “‘force’ its agents to comply” with the company’s production request would be without merit because “First American [could] claim that the agent breached its contract if the agent [did] not produce the requested files.”

Concluding that First American possessed control over the agents’ documents requested by the plaintiffs, the court considered next whether First American had a legal obligation to issue a litigation hold ordering its agents to preserve requested documents. Because the “duty to preserve documents arises when a party ‘knows or reasonably should know’ that litigation is foreseeable,” and because the duty extends even to third parties, as long as the documents are “within a party’s possession, custody, or control,” First American, which was already engaged in litigation with the plaintiffs, had a duty to issue the litigation hold to its independent title agents.

Therefore, the court ordered First American to (1) send requests for copies of closing documents to its independent title agents who had closing documents that the parties had agreed would be produced and (2) issue a litigation hold to its agents to preserve the documents requested by the plaintiffs.

So, what do you think?  Was the court correct to order First American to issue the hold?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Sanctions for Violating Motion to Compel Production? Not Yet. – eDiscovery Case Law

In Fidelity National Title Insurance Co. v. Captiva Lake Investments, LLC, No. 4:10-CV-1890 (CEJ), 2012 U.S. Dist. (E.D. Mo. Nov. 16, 2012), where a party’s “conduct [did not] rise[ ] to the level of a willful violation of the order compelling production” because it was continually working toward the proper production of documents requested by its adversary, a court concluded that the adversary’s motion for sanctions was premature.

Involved in a declaratory judgment action related to policy coverage, Captiva Lake Investments asked insurer Fidelity National to produce the claims file and documents in its possession that were related to Fidelity’s “evaluation of coverage under the policy at issue.”

Fidelity responded but did not produce or include in its privilege log two categories of documents: the Major Claims Reports and data maintained in Fidelity’s Claims Processing System (“CPS”). When Captiva discovered this, it requested the data, but Fidelity merely produced an updated privilege log, claiming it could withhold the documents under privilege. Captiva filed a motion to compel, and the court granted it, ordering Fidelity to produce the information. Fidelity, however, still failed to produce only some of the requested data. Captiva then filed this motion for sanctions.

The court noted that under Rule 37 of the Federal Rules of Civil Procedure, “‘there must be an order compelling discovery, a willful violation of that order, and prejudice to the other party’” in order for the court to properly impose sanctions. Here, although Fidelity had produced only some of the information requested by Captiva, and although “the proceedings in this case present an extremely unflattering picture of Fidelity’s document and data management practices,” Fidelity was continuing to attempt to locate additional missing reports and was producing ones that it found; in addition, after producing some—but not complete—information from the CPS, Fidelity indicated to Captiva that it “‘was in contact with e-discovery specialists to figure out what else can be done with respect to the information in CPS.’”

Therefore, the court found that Fidelity’s failure to produce the data was not a willful violation of the order compelling production and denied Captiva’s motion for sanctions.

So, what do you think?  Should Fidelity have been sanctioned for failing to complete production?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Problems with Review? It’s Not the End of the World – eDiscovery Best Practices

If you’re reading this, the Mayans were wrong… 🙂

If 2012 will be remembered for anything from an eDiscovery standpoint, it will be remembered for the arrival of Technology Assisted Review (TAR), aka Computer Assisted Review (CAR), as a court accepted method for conducting eDiscovery review.  Here are a few of the recent TAR cases reported on this blog.

Many associate TAR with predictive coding, but that’s not the only form of TAR to assist with review.  How the documents are organized for review can make a big difference in the efficiency of review, not only saving costs, but also improving accuracy by assigning similar documents to the same reviewer.  Organizing documents with similar content into “clusters” enables each reviewer to make quicker review decisions (for example, by looking at one document to determine responsiveness and applying the same categorization to duplicates or mere variations of that first document).  This also promotes consistency by enabling the same reviewer to review all similar documents in a cluster avoiding potential inadvertent disclosures where one reviewer marks a document as privileged while another reviewer fails to mark a copy of the that same document as such and that document gets produced.

Hot Neuron’s Clustify™ is an example of clustering software that examines the text in your documents, determines which documents are related to each other, and groups them into clusters, labeling each cluster with a set of keywords which provides a quick overview of the cluster, as well as a “representative document” against which all other documents in the cluster are compared.

Clustering can make review more efficient and effective for these types of documents:

  • Email Message Threads: The ability to group messages from a thread into a cluster enables the reviewer to quickly identify the email(s) containing the entire conversation, categorize those and either apply the same categorization to the rest or dismiss as duplicative (if so instructed).
  • Routine Reports: Periodic reports – such as a weekly accounts receivable report – that are generated can be grouped together in a cluster to enable a single reviewer to make a relevancy determination and quickly apply it to all documents in the cluster.
  • Versions of Documents: The content of each draft of a document is often similar to the previous version, so categorizing one version of the document could be quickly applied to the rest of the versions.
  • Published Documents: Publishing a file to Adobe PDF format generates an exact copy (from Word, Excel or other application) of the original file in content, but different in format, so these documents won’t be identified as “dupes” based on their HASH value.  With clustering, those documents still get grouped together so that those non-HASH dupes are still identified and addressed.

Within the parameters of a review tool like OnDemand®, which manages the review process and delivers documents quickly and effectively for review, clustering documents can speed decision making during review, saving considerable time and review costs, yet improving consistency of document classifications.

So, what do you think?  Have you used clustering software to organize documents for review?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Daily will take a break for the holidays and will return on Wednesday, January 2, 2013. Happy Holidays from all of us at Cloudnine Discovery and eDiscovery Daily!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Class Action Plaintiffs Required to Provide Social Media Passwords and Cell Phones – eDiscovery Case Law

We’ve seen several cases where social media data was requested – with some requests granted (including this one, this one and this one) and other requests denied (including this one, this one and this one).  Here is a recent case where the request was granted.

Considering proportionality and accessibility concerns in EEOC v. Original Honeybaked Ham Co. of Georgia, 11-cv-02560-MSK-MEH, 2012 U.S. Dist. (D. Colo. Nov. 7, 2012), Colorado Magistrate Judge Michael Hegarty held that where a party had showed certain of its adversaries’ social media content and text messages were relevant, the adversaries must produce usernames and passwords for their social media accounts, usernames and passwords for e-mail accounts and blogs, and cell phones used to send or receive text messages to be examined by a forensic expert as a special master in camera.

Case Background

This case began when the EEOC sued employer The Original Honeybaked Ham Company of Georgia (“HBH”) on behalf of a class alleging sexual harassment and retaliation. During discovery, HBH requested “numerous categories of documents designed to examine the class members’ damages—emotional and financial—as well as documents going to the credibility and bias of the class members,” and the company moved the court to compel their production.

Among the documents HBH requested were “full unredacted” social media content and text messages. HBH requested such electronically stored information (ESI) because “[m]any of the class members ha[d] utilized electronic media to communicate—with one another or with their respective insider groups—information about their employment with/separation from Defendant HBH, this lawsuit, their then-contemporaneous emotional state, and other topics and content that [HBH] contend[ed] may be admissible in this action.” For example, HBH had “obtained one affected former employee’s Facebook pages” and found that they “contain[ed] a significant variety of relevant information, and further, that other employees posted relevant comments on this Facebook account.”

Court Analysis of Document Request

Judge Hegarty noted that the variety of topics that class members discussed via electronic communications could be viewed “logically as though each class member had a file folder titled ‘Everything About Me,’ which they have voluntarily shared with others.” Therefore, because the documents—if they were in hard copy—would be discoverable if relevant, their existence in electronic form made them likewise discoverable: “The fact that [documents] exist[ ] in cyberspace on an electronic device is a logistical and, perhaps, financial problem, but not a circumstance that removes the information from accessibility by a party opponent in litigation.” Moreover, the fact that the “Everything About Me” folder was stored in this instance on Facebook made the documents perhaps more susceptible to discovery: “There is a strong argument that storing such information on Facebook and making it accessible to others presents an even stronger case for production, at least as it concerns any privacy objection. It was the claimants (or at least some of them) who, by their own volition, created relevant communications and shared them with others.”

As for their relevance, Judge Hegarty ticked through the categories of documents on the Facebook page that HBH had already obtained and noted that each were potentially relevant. Accordingly, and because “other employees posted relevant comments on this Facebook account,” Judge Hegarty required the production of each class member’s social media content.

Also driving Judge Hegarty’s decision was a concern for proportionality: “The cumulative exposure to the Defendant is most definitely well into the low-to-mid seven-figure range. This is important to note when addressing whether the potential cost of producing the discovery is commensurate with the dollar amount at issue.”

Judge’s Ruling

Ultimately, Judge Hegarty held that each class member should produce the following ESI and related devices: cell phones used to send or receive text messages during the relevant period, information necessary to access social media websites used during the relevant period, and information necessary to access “any e-mail account or web blog or similar/related electronically accessed internet or remote location used for communicating with others or posting communications or pictures” during the relevant period.

Protocol for Production Using a Special Master

Though the relevant information was discoverable, Judge Hegarty established a specific protocol for its production. First, the court would appoint a forensic expert to serve as a Special Master to review the produced ESI in camera. “[T]he parties [would] collaborate to create (1) a questionnaire to be given to the Claimants with the intent of identifying all such potential sources of discoverable information; and (2) instructions to be given to the Special Master defining the parameters of the information he will collect.” Judge Hegarty gave the parties specific procedures to follow in the instance of a disagreement during this process. The Special Master could then begin review.

Following in camera review by the special master, Judge Hegarty stipulated that it would also “review the information in camera and require the production to Defendant of only that information which the Court determines is legally relevant under the applicable rules.” The court would then provide the material to the EEOC, which would have an opportunity to conduct a privilege review. The EEOC would then produce nonprivileged information to HBH along with a privilege log. The court would return irrelevant materials to the EEOC and provide a method for the EEOC to contest any relevancy determinations.

Regarding costs of the review, Judge Hegarty ordered the cost of forensic evaluation to be split equally between the parties. Judge Hegarty noted, “The information ordered to be produced is discoverable—information which, if it exists, was created by the Claimants.” However, the court reserved the option to revisit the allocation of costs and to relieve the Plaintiff/Claimants of monetary responsibility if the effort produced little or no relevant information.

So, what do you think?  Was the judge correct in requiring production of user names, passwords and cell phones for each class member?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

According to IDC, Big Data is Only Getting Bigger – eDiscovery Trends

According to the International Data Corporation (IDC), big data is only getting bigger.  In the publication IDC iView “Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East,” (sponsored by EMC), which is excerpted here, the “digital universe” is growing even faster than we thought.

As the report notes: “at the midpoint of a longitudinal study starting with data collected in 2005 and extending to 2020, our analysis shows a continuously expanding, increasingly complex, and ever more interesting digital universe.”  IDC’s sixth annual study of the digital universe contains some interesting findings, including:

  • From 2005 to 2020, the digital universe will grow by a factor of 300, from 130 exabytes to 40,000 exabytes, or 40 trillion gigabytes (more than 5,200 gigabytes for every man, woman, and child in 2020). From now until 2020, the digital universe will about double every two years.
  • The investment in spending on IT hardware, software, services, telecommunications and staff that could be considered the “infrastructure” of the digital universe and telecommunications will grow by 40% between 2012 and 2020. As a result, the investment per gigabyte (GB) during that same period will drop from $2.00 to $0.20. Of course, investment in targeted areas like storage management, security, big data, and cloud computing will grow considerably faster.
  • A majority of the information in the digital universe, 68% in 2012, is created and consumed by consumers — watching digital TV, interacting with social media, sending camera phone images and videos between devices and around the Internet, and so on. Yet enterprises have liability or responsibility for nearly 80% of the information in the digital universe.
  • Only a tiny fraction of the digital universe has been explored for analytic value. IDC estimates that by 2020, as much as 33% of the digital universe will contain information that might be valuable if analyzed.
  • By 2020, nearly 40% of the information in the digital universe will be “touched” by cloud computing providers — meaning that a byte will be stored or processed in a cloud somewhere in its journey from originator to disposal.
  • The first Digital Universe Study was published in 2007.  At that time, IDC’s forecast for the digital universe in 2010 was 988 exabytes (in 2002, there were 5 exabytes in the world, representing an estimated growth of 19,760% in eight years).  Based on actuals, it was later revised to 1,227 exabytes (an actual growth of 24,540% in eight years).  So far, data is growing even faster than anticipated.

The report excerpt breaks out several graphs to illustrate where the digital universe is now and where it’s headed, showing how, as IT costs rise, the costs per GB will fall considerably and also showing the “geography” of the digital universe, with the US currently accounting for 32% of the digital universe.  According to IDC, the share of the digital universe attributable to emerging markets is up to 36% in 2012 and is expected to be 62% by 2020.

Obviously, this has considerable eDiscovery ramifications as data within organizations will continue to grow exponentially and a combination of good information governance programs and effective retrieval technology will be even more vital to keep eDiscovery manageable and costs in check.

So, what do you think?  Do you have a plan in place to manage exponential data growth?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Trend Has Shifted Against Reimbursement of eDiscovery Costs – eDiscovery Case Law

Last year, the trend seemed to be to award the prevailing party reimbursement of eDiscovery costs, including in this case and this case.  Now, that trend appears to have been reversed with those requests being denied (or reversed) by the courts, including this case and this case.  Now, here is another case where reimbursement of eDiscovery costs was denied.

In adhering to the Third Circuit’s 2012 decision in Race Tires America, Inc. v. Hoosier Racing Tire Corp., a district court declined to permit a prevailing party to bill its opponent under 28 U.S.C. § 1920(4) in Abbott Point of Care, Inc. v. Epocal, Inc., No. CV-08-S-543-NE, 2012 U.S. Dist. (N.D. Ala. Nov. 5, 2012) for costs associated with its eDiscovery database because such a request did not comport with a strict interpretation of the statute.

In a lawsuit originally based on Abbott’s allegations that Epocal infringed four of its patents and tortiously interfered with the employment contracts of some of its former employees, a jury awarded Epocal a fully favorable decision. The judgment provided that all costs associated with the lawsuit were taxed to Abbott; accordingly, Epocal filed a bill of costs with the court. This dispute arose when Abbott objected to Epocal’s bill of costs.

The points of the bill that Abbott disputed included “$175,390 in eDiscovery database charges through discovery (item 5) [and] $165,108 in eDiscovery database charges through trial (item 6).” The court pointed out that although “Abbott object[ed] to Epocal’s recovery of any costs for the creation and maintenance of an electronic discovery database under § 1920(4),” the Eleventh Circuit had not issued any controlling guidance on how courts within its limits should interpret the language of Section 1920(4). {emphasis added}

The court noted that Abbott relied on, and many district courts—including those within the Eleventh Circuit—also turned to Race Tires, where “[t]he Third Circuit emphasized that the determination of whether a particular cost can be awarded pursuant to § 1920 is purely a matter of statutory construction.” Section 1920(4) permits taxation only for “‘exemplification’ or ‘making copies,’” and the Third Circuit further explained that those actions meant “‘produc[ing] illustrative evidence or the authentication of public records.’” The court noted that because the statute did not provide for such relief, “[t]he Third Circuit refused to give any weight to equitable considerations, including the importance of database services to the ultimate act of production, the technical skill required to create a database, and the ‘efficiencies and cost savings resulting from the efforts of electronic discovery consultants.’” Moreover, the Third Circuit “refused to allow costs for any of the steps that might lead up to the actual copying of documents or other materials, including ‘gathering, preserving, processing, searching, culling, and extracting’ discoverable information.”

Although the court was “sympathetic to the practical arguments advanced by Epocal,” it declined to extend the scope of the Third Circuit’s interpretation of Section 1920(4). Noting that “[u]nfortunately . . . the law does not always favor efficiency or practicality,” the court followed the Third Circuit’s “thorough, reasonable, and persuasive interpretation of that statute.” As such, it found that Epocal would “not be permitted to recover any costs for the maintenance of an electronic discovery database” and therefore it did not need to distinguish between the costs Epocal requested for eDiscovery charges incurred at different times during the litigation.

So, what do you think?  Should the costs have been reimbursed?  Should prevailing parties have some means for recouping their eDiscovery costs?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Baby, You Can Drive My CARRM – eDiscovery Trends

Full disclosure: this post is NOT about the Beatles’ song, but I liked the title.

There have been a number of terms applied to using technology to aid in eDiscovery review, including technology assisted review (often referred to by its acronym “TAR”) and predictive coding.  Another term is Computer Assisted Review (which lends itself to the obvious acronym of “CAR”).

Now, the Electronic Discovery Reference Model (EDRM) is looking to provide an “owner’s manual” to that CAR with its new draft Computer Assisted Review Reference Model (CARRM), which depicts the flow for a successful CAR project.  The CAR process depends on, among other things, a sound approach for identifying appropriate example documents for the collection, ensuring educated and knowledgeable reviewers to appropriately code those documents and testing and evaluating the results to confirm success.  That’s why the “A” in CAR stands for “assisted” – regardless of how good the tool is, a flawed approach will yield flawed results.

As noted on the EDRM site, the major steps in the CARRM process are:

Set Goals

The process of deciding the outcome of the Computer Assisted Review process for a specific case. Some of the outcomes may be:

  • reduction and culling of not-relevant documents;
  • prioritization of the most substantive documents; and
  • quality control of the human reviewers.

Set Protocol

The process of building the human coding rules that take into account the use of CAR technology. CAR technology must be taught about the document collection by having the human reviewers submit documents to be used as examples of a particular category, e.g. Relevant documents. Creating a coding protocol that can properly incorporate the fact pattern of the case and the training requirements of the CAR system takes place at this stage. An example of a protocol determination is to decide how to treat the coding of family documents during the CAR training process.

Educate Reviewer

The process of transferring the review protocol information to the human reviewers prior to the start of the CAR Review.

Code Documents

The process of human reviewers applying subjective coding decisions to documents in an effort to adequately train the CAR system to “understand” the boundaries of a category, e.g. Relevancy.

Predict Results

The process of the CAR system applying the information “learned” from the human reviewers and classifying a selected document corpus with pre-determined labels.

Test Results

The process of human reviewers using a validation process, typically statistical sampling, in an effort to create a meaningful metric of CAR performance. The metrics can take many forms, they may include estimates in defect counts in the classified population, or use information retrieval metrics like Precision, Recall and F1.

Evaluate Results

The process of the review team deciding if the CAR system has achieved the goals of anticipated by the review team.

Achieve Goals

The process of ending the CAR workflow and moving to the next phase in the review lifecycle, e.g. Privilege Review.

The diagram does a good job of reflecting the linear steps (Set Goals, Set Protocol, Educate Reviewer and, at the end, Achieve Goals) and a circle to represent the iterative steps (Code Documents, Predict Results, Test Results and Evaluate Results) that may need to be performed more than once to achieve the desired results.  It’s a very straightforward model to represent the process.  Nicely done!

Nonetheless, it’s a draft version of the model and EDRM wants your feedback.  You can send your comments to mail@edrm.net or post them on the EDRM site here.

So, what do you think?  Does the CARRM model make computer assisted review more straightforward?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

How Are You Handling Defensible Deletion? – eDiscovery Best Practices

According to the Compliance, Governance and Oversight Council (CGOC), information volume doubles every 18-24 months and 90% of the data in the world has been created in the last two years.  So, many organizations are drowning in electronically stored information (ESI) and costs associated with managing that ESI for eDiscovery are continuing to rise.  An effective plan for information governance that includes defensible deletion of ESI is an effective way of keeping that ESI from overwhelming your organization.  But, what percentage of organizations is defensibly deleting data?  A new survey from eDJGroup is attempting to find out.

Defensible deletion of ESI that has little or no business value and is not subject to legal hold is a good business practice that is protected through Rule 37(e) of the Federal Rules of Civil Procedure (commonly known as the “safe harbor” rule) which states:

Failure to Provide Electronically Stored Information. Absent exceptional circumstances, a court may not impose sanctions under these rules on a party for failing to provide electronically stored information lost as a result of the routine, good-faith operation of an electronic information system.

Barry Murphy’s article (Defensible Deletion Gaining Steam) on eDiscovery Journal discusses the eDJGroup survey and provides some interim results to two of the questions asked:

  1. Do you believe defensible deletion of information is necessary in order to manage growing volumes of digital information?: As of the article date on December 4, an overwhelming 93.0% of all respondents have said ‘yes’, 2.3% have said ‘no’ and 4.7% have said ‘don’t know / unsure’.  Frankly, I’m surprised that anybody doesn’t believe that defensible deletion is necessary!
  2. Does your organization currently defensibly delete information?: As of the article date on December 4, 14.0% of all respondents have said ‘yes, for all systems’, 54.7% have said ‘yes, in some systems’, 16.3% have said ‘no’ and 15.1% have said ‘don’t know’.  That means that over 2/3 of respondents so far (68.7%) defensibly delete information in at least some systems.

As of the article date, there had been 86 respondents.  But, the survey is not over!  You can take the survey here and contribute to the results.  Murphy says the ‘survey will close later this month, so be sure to take it now’, but doesn’t provide a specific date that it closes (one would hope it would be at the end of the month to be as inclusive as possible).  Nonetheless, ‘all respondents will get a summary of the results and have a chance to win a $250 gift card’, so it’s worthwhile to participate.

So, what do you think?  Does your organization have an information governance plan that includes defensible deletion of data?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Percentage of eDiscovery Sanctions Cases Declining – eDiscovery Trends

According to Kroll Ontrack, the percentage of eDiscovery cases addressing sanctions “dropped by approximately ten percent” compared to 2011, while “cases addressing procedural issues more than doubled”.  Let’s take a closer look at the numbers and look at some cases in each category.

As indicated in their December 4 news release, in the past year, Kroll Ontrack experts summarized 70 of the most significant state and federal judicial opinions related to the preservation, collection, review and production of electronically stored information (ESI). The breakdown of the major issues that arose in these eDiscovery cases is as follows:

  • Thirty-two percent (32%) of cases addressed sanctions regarding a variety of issues, such as preservation and spoliation, noncompliance with court orders and production disputes.  Out of 70 cases, that would be about 22 cases addressing sanctions this past year.  Here are a few of the recent sanction cases previously reported on this blog.
  • Twenty-nine percent (29%) of cases addressed procedural issues, such as search protocols, cooperation, production and privilege considerations.  Out of 70 cases, that would be about 20 cases.  Here are a few of the recent procedural issues cases previously reported on this blog.
  • Sixteen percent (16%) of cases addressed discoverability and admissibility issues.  Out of 70 cases, that would be about 11 cases.  Here are a few of the recent discoverability / admissibility cases previously reported on this blog.
  • Fourteen percent (14%) of cases discussed cost considerations, such as shifting or taxation of eDiscovery costs.  Out of 70 cases, that would be about 10 cases.  Here are a few of the recent eDiscovery costs cases previously reported on this blog.
  • Nine percent (9%) of cases discussed technology-assisted review (TAR) or predictive coding.  Out of 70 cases, that would be about 6 cases.  Here are a few of the recent TAR cases previously reported on this blog, how many did you get?

While it’s nice and appreciated that Kroll Ontrack has been summarizing the cases and compiling these statistics, I do have a couple of observations/questions about their numbers (sorry if they appear “nit-picky”):

  • Sometimes Cases Belong in More Than One Category: The case percentage totals add up to 100%, which would make sense except that some cases address issues in more than one category.  For example, In re Actos (Pioglitazone) Products Liability Litigation addressed both cooperation and technology-assisted review, and Freeman v. Dal-Tile Corp. addressed both search protocols and discovery / admissibility.  It appears that Kroll classified each case in only one group, which makes the numbers add up, but could be somewhat misleading.  In theory, some cases belong in multiple categories, so the total should exceed 100%.
  • Did Cases Addressing Procedural Issues Really Double?: Kroll reported that “cases addressing procedural issues more than doubled”; however, here is how they broke down the category last year: 14% of cases addressed various procedural issues such as searching protocol and cooperation, 13% of cases addressed various production considerations, and 12% of cases addressed privilege considerations and waivers.  That’s a total of 39% for three separate categories that now appear to be described as “procedural issues, such as search protocols, cooperation, production and privilege considerations” (29%).  So, it looks to me like the percentage of cases addressing procedural issues actually dropped 10%.  Actually, the two biggest category jumps appear to be discoverability and admissibility issues (2% last year to 16% this year) and TAR (0% last year to 9% this year).

So, what do you think?  Has your organization been involved in any eDiscovery opinions this year?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

“Rap Weasel” Forced to Honor $1 Million Reward Offered via YouTube – eDiscovery Case Law

It isn’t every day that eDiscoveryDaily has reason to reference The Hollywood Reporter in a story about eDiscovery case law, but even celebrities have eDiscovery preservation obligations during litigation.  In Augstein v. Leslie, 11 Civ. 7512 (HB) (SDNY Oct. 17, 2012), New York District Judge Harold Baer imposed an adverse inference sanction against hip hop and R&B artist Ryan Leslie for “negligent destruction” of a hard drive returned to him by the plaintiff after a $1 million reward was offered via YouTube.  On November 28, a jury ordered him to pay the $1 million reward to the plaintiff.

Reward Offered, then Refused

While Leslie was on tour in Germany in 2010, a laptop and external hard drive (that contained some of Leslie’s songs not yet released) were stolen.  Capitalizing on his popularity on social media, Leslie initially offered $20,000 for return of the items, then, on November 6, 2010, a video on YouTube was posted increasing the reward to $1 million.  The increase of the reward was also publicized on Leslie’s Facebook and Twitter accounts.  After Augstein, a German auto repair shop owner, returned the laptop and hard drive, Leslie refused to pay the reward alleging “the intellectual property for which he valued the laptop was not present on the hard drive when it was returned”.

Plaintiff’s Arguments as to Why Reward was not Warranted

Leslie attempted to make the case that when he used the word “offer,” that he really meant something different. He argued that a reasonable person would have understood mention of a reward not as a unilateral contract, but instead as an “advertisement” – an invitation to negotiate.

Leslie’s other argument was that, regardless whether it was an “offer” or not, Augstein failed to perform because he did not return the intellectual property, only the physical property.  Leslie claimed that he and several staff members tried to access the data on the hard drive but were unable to do so.  Leslie sent the hard drive to the manufacturer, Avastor, which ultimately deleted the information and sent Leslie a replacement drive.  The facts associated with the attempts to recover information from the hard drive and requests by the manufacturer to do the same were in dispute between Leslie, his assistant, and Avastor, who claimed no request for data recovery was made by Leslie or anyone on his team.

Judge’s Responses and Decision

Regarding Leslie’s characterization of the offer as an “advertisement”, Judge Baer disagreed, noting that “Leslie’s videos and other activities together are best characterized as an offer for a reward. Leslie ‘sought to induce performance, unlike an invitation to negotiate [often an advertisement], which seeks a reciprocal promise.’”

Regarding Leslie’s duty to preserve the hard drive, Judge Baer noted: “In this case, Leslie was on notice that the information on the hard drive may be relevant to future litigation and, as a result, had an obligation to preserve that information. Augstein contacted Leslie personally and through his attorney regarding the payment of the reward, and a short time later, the hard drive was sent by Leslie to Avastor….Leslie does not dispute these facts.”  As a result, Judge Baer found that “Leslie and his team were at least negligent in their handling of the hard drive.”

Citing Zubulake among other cases with respect to negligence as sufficient for spoliation, Judge Baer ruled “I therefore impose a sanction of an adverse inference; it shall be assumed that the desired intellectual property was present on the hard drive when Augstein returned it to the police.”  This led to the jury’s decision and award last month, causing the New York Post to characterize Leslie as a “Rap Weasel”, which Leslie himself poked fun at on Instagram.  Only in America!

So, what do you think?  Was the adverse inference sanction warranted?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.