Posts By :

Doug Austin

This is What WON’T Be On Our 2019 eDiscovery Year in Review Webcast Tomorrow: eDiscovery Trends

Tomorrow, CloudNine will conduct the webcast 2019 eDiscovery Year in Review.  As 2019 has been a busy year, we have a lot of topics planned for tomorrow – everything from key case law decisions to important data privacy trends to whether lawyers are “failing” at cybersecurity and it will be a challenge to get through them all.  But, we still couldn’t cover everything – there was simply too much that happened this year to cover it all.  So, here are some notable events and trends that we covered on eDiscovery Daily this year that we won’t have time to discuss tomorrow.  Enjoy!

To Preserve Sanction Potential, Plaintiff Fights To NOT Have Claim Against Them Dismissed: Yes, you read that right. In DR Distrib., LLC v. 21 Century Smoking, Inc., Illinois District Judge Iain D. Johnston denied the defendants’ Motion for Leave to Amend their counterclaim to remove their own defamation counterclaim (Count VIII) against the plaintiffs – a move to which the plaintiffs objected, because it could eliminate their chance to pursue sanctions against the defendants for ESI spoliation.

Discovery Can’t Be Stayed While Motion to Dismiss is Considered, Court Says: In Udeen v. Subaru of America, Inc., New Jersey Magistrate Judge Joel Schneider denied the defendants’ request that all discovery be stayed until their Motion to Dismiss is decided, but, with the proviso that only limited and focused discovery on core issues would be permitted.

Firm IT Director Predicts “Carnage” in Legal Tech Consolidation: Not since Clubber Lang predicted “pain” in Rocky III has the state of legal tech consolidation been stated quite this way. Is that good news or bad news for consumers of legal tech software and services?

Is eDiscovery “Too Practical” to Offer as Part of Law School Curriculums?: We’ve certainly noted before how slow law schools are to provide eDiscovery education. But, are they slow to push for it because eDiscovery is “too practical”? At least one law school dean suggests that might be the case.

Another Case Where Intent to Deprive is Put in the Hands of the Jury: In Woods v. Scissons, Arizona Chief District Judge G. Murray Snow granted in part and denied in part the plaintiff’s motion for sanctions for spoliation of video footage of an arrest incident involving the plaintiff and the defendant (a police officer with the Prescott Police Department), ruling that non-party City of Prescott violated a duty to preserve evidence of the alleged incident, but that the question of intent should be submitted to the jury to determine appropriate sanctions.

Mary Mack and Kaylee Walstad acquire the EDRM from Duke Law: In a rare two-post day for us at eDiscovery Daily, we broke the news that Mary Mack and Kaylee Walstad, the former executive director and former vice president of client engagement, respectively, of The Association of Certified E-Discovery Specialists (ACEDS) announced that they have acquired the Electronic Discovery Reference Model (EDRM) from the Bolch Judicial Institute at Duke Law School.  Before that, ACEDS announced its new leadership as well.

Why Process in eDiscovery? Isn’t it “Review Ready”?: I’ve been asked a variation of this question for years. But, perhaps the best answer to this question lies in Craig Ball’s new primer – Processing in E-Discovery.

Despite Email from Defendants Instructing to Destroy Evidence, Court Declines Sanctions: In United States et al. v. Supervalu, Inc. et al., Illinois District Judge Richard H. Mills, despite an email produced by the defendants with instructions to their pharmacies to destroy evidence, denied the relators’ motion for sanctions, stating: “Upon reviewing the record, the Court is unable to conclude that Defendants acted in bad faith. If the evidence at trial shows otherwise and bad faith on the part of the Defendants is established, the Court can revisit the issue and consider one or both of the sanctions requested by the Relators or another appropriate sanction.”  {OK, we might mention this one}

Court Infers Bad Faith for Plaintiffs Use of Ephemeral Messaging App: In Herzig v. Arkansas Foundation for Medical Care, Inc., Arkansas District Judge P.K. Holmes, III indicated his belief that the use and “necessity of manually configuring [the messaging app] Signal to delete text communications” on the part of the plaintiffs was “intentional and done in bad faith”. However, Judge Holmes declined to consider appropriate sanctions, ruling that “in light of the [defendant’s] motion for summary judgment, Herzig and Martin’s case can and will be dismissed on the merits.”

Despite Email from Defendants Instructing to Destroy Evidence, Court Declines Sanctions: In United States et al. v. Supervalu, Inc. et al., Illinois District Judge Richard H. Mills, despite an email produced by the defendants with instructions to their pharmacies to destroy evidence, denied the relators’ motion for sanctions, stating: “Upon reviewing the record, the Court is unable to conclude that Defendants acted in bad faith. If the evidence at trial shows otherwise and bad faith on the part of the Defendants is established, the Court can revisit the issue and consider one or both of the sanctions requested by the Relators or another appropriate sanction.”  {OK, we might mention this one}

If this is what didn’t make the cut, tune in tomorrow (noon CST, 1:00pm EST, 10:00am PST) to see what did!

So, what do you think?  What do you think was most notable about eDiscovery in 2019?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Infers Bad Faith for Plaintiffs Use of Ephemeral Messaging App: eDiscovery Case Law

We’re catching up on notable cases from earlier in the year.  Here’s one that’s notable regarding the use of ephemeral messaging and spoliation sanctions.

In Herzig v. Arkansas Foundation for Medical Care, Inc., No. 2:18-CV-02101 (W.D. Ark. July 3, 2019), Arkansas District Judge P.K. Holmes, III indicated his belief that the use and “necessity of manually configuring [the messaging app] Signal to delete text communications” on the part of the plaintiffs was “intentional and done in bad faith”.  However, Judge Holmes declined to consider appropriate sanctions, ruling that “in light of the [defendant’s] motion for summary judgment, Herzig and Martin’s case can and will be dismissed on the merits.”

Case Background

In this case where the plaintiffs alleged unlawful termination due to age discrimination, the parties conferred and agreed that the defendant might request data from the plaintiffs’ mobile phones and that the parties had taken reasonable measures to preserve potentially discoverable data from alteration or destruction.  In July 2018, the defendant served requests for production on the plaintiffs and, in September 2018, Plaintiffs Brian Herzig and Neal Martin produced screenshots of parts of text message conversations from Martin’s mobile phone, including communications between Herzig and Martin, but nothing more recent than August 20, 2018, even after a motion to compel.

After the August production, Martin installed the application Signal (which allows users to send and receive encrypted text messages accessible only to sender and recipient, and to change settings to automatically delete these messages after a short period of time) on his phone.  Herzig had done so while working at the defendant.  Herzig and Martin set the application to delete their communications and, as a result, disclosed no additional text messages to the defendant, which was unaware of their continued communication using Signal until Herzig disclosed it in his deposition near the end of the discovery period.  The defendant filed a motion for dismissal or adverse inference on the basis of spoliation.

Judge’s Ruling

In assessing the defendant’s motion, Judge Holmes stated that “Herzig and Martin had numerous responsive communications with one another and with other AFMC employees prior to responding to the requests for production on August 22, 2018 and producing only some of those responsive communications on September 4, 2018. They remained reluctant to produce additional communications, doing so only after AFMC’s motion to compel. Thereafter, Herzig and Martin did not disclose that they had switched to using a communication application designed to disguise and destroy communications until discovery was nearly complete. Based on the content of Herzig and Martin’s earlier communications, which was responsive to the requests for production, and their reluctance to produce those communications, the Court infers that the content of their later communications using Signal were responsive to AFMC’s requests for production. Based on Herzig and Martin’s familiarity with information technology, their reluctance to produce responsive communications, the initial misleading response from Martin that he had no responsive communications, their knowledge that they must retain and produce discoverable evidence, and the necessity of manually configuring Signal to delete text communications, the Court believes that the decision to withhold and destroy those likely-responsive communications was intentional and done in bad faith.”

However, Judge Holmes also stated: “This intentional, bad-faith spoliation of evidence was an abuse of the judicial process and warrants a sanction. The Court need not consider whether dismissal, an adverse inference, or some lesser sanction is the appropriate one, however, because in light of the motion for summary judgment, Herzig and Martin’s case can and will be dismissed on the merits.”  As a result, the requested sanctions were denied as moot.

So, what do you think?  Should use of an ephemeral messaging app when a duty to preserve attaches lead to significant sanctions?  Please let us know if any comments you might have or if you’d like to know more about a particular topic.

Case opinion link courtesy of eDiscovery Assistant.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Markets Are Growing and Legal Tech Investments Are “Skyrocketing”. So, Who’s Buying?: eDiscovery Trends

No, I don’t mean who’s buying the drinks.  Though the growth of the markets and the growth in legal tech investment is certainly worth celebrating (especially for those who’ve seen their investments pay off).  ;o)  But what I’m asking is: who’s buying the technology?

First, the investment part.  As discussed earlier this week in Legaltech News® (As Legal Tech Investments Skyrocket, Startups Combat Tech Adoption Perceptions, written by Victoria Hudgins), it’s been a record-setting year for investments in legal tech, with the industry reaching the $1.2 billion threshold this year for the first time, according to Bob Ambrogi’s excellent LawSites blog.  And, that was as of the middle of September!

Hudgins has some excellent quotes from several C-Suite execs from legal tech companies that have received funding from investors and part of the tone of the article is the challenge associated with convincing investors that tech-averse lawyers will really buy the software.  As an example, Litify chief revenue officer Terry Dohrmann, whose law firm management software company raised $2.5 million in 2018 and $50 million last June, noted that there are differences in pitching legal tech to investors.

“The short answer is yes, there is a difference,” Dohrmann said. “A lot of that is driven by the universal acceptance that law firms are a little behind in adoption of technology.”

So, it’s the law firms that are fueling this growth in the market?  Maybe partially, but I’m not so sure they are the major factor.

As we’ve covered many times before, Rob Robinson on his terrific Complex Discovery site tracks the eDiscovery specific mergers, acquisitions and investments here (he’s got them all the way back to 2001).  By my count, we’ve had 44 such transactions so far this year (that we know of), with a total estimated amount (at least where amounts are available) of over $560 million, just for eDiscovery company investments.  And, that doesn’t include two investments of over $2.5 billion which have been announced, but not closed.  So, that $1.2 billion threshold could be shattered before year’s end.  Crikey!

Also, as we covered just last week, Rob presented his worldwide eDiscovery services and software overview for 2019 to 2024 on Complex Discovery last month and his annual “mashup” of industry estimates shows the eDiscovery Software and Services market is expected to grow an estimated 12.93% Compound Annual Growth Rate (CAGR) per year from 2019 to 2024 from $11.23 billion to $20.63 billion per year.  Here’s the combined eDiscovery markets for 2019 to 2024, represented graphically:

Of that, the eDiscovery Software market is expected to grow at an even larger estimated 13.05% CAGR per year from $3.39 billion in 2019 to $6.26 billion in 2024, growing about 85% in five years.  Here’s the eDiscovery software market for 2019 to 2024:

Which leaves the eDiscovery Services market, which is expected to grow at an estimated 12.88% CAGR per year from 2019 to 2024 from $7.84 billion to $14.37 billion per year.  Here’s the eDiscovery services market for 2019 to 2024:

Charts courtesy of Complex Discovery.

So, who’s buying?  Seems a lot of the technology is being purchased by the service providers, who are (in turn) using it to provide services to corporations, law firms and government entities, who are buying those services.  Obviously, corporations, law firms and government entities are buying some of the technology as well and law firms providing some of the eDiscovery services.  But, it seems like it’s the service providers who have the biggest impact on the growth of the market.  Do you agree?

So, what do you think?  Will the growth of the market and the “skyrocketing” investment in legal tech continue?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Despite Email from Defendants Instructing to Destroy Evidence, Court Declines Sanctions: eDiscovery Case Law

In United States et al. v. Supervalu, Inc. et al., NO. 11-3290 (C.D. Ill. Nov. 18, 2019), Illinois District Judge Richard H. Mills, despite an email produced by the defendants with instructions to their pharmacies to destroy evidence, denied the relators’ motion for sanctions, stating: “Upon reviewing the record, the Court is unable to conclude that Defendants acted in bad faith. If the evidence at trial shows otherwise and bad faith on the part of the Defendants is established, the Court can revisit the issue and consider one or both of the sanctions requested by the Relators or another appropriate sanction.”

Case Background

In this case, the defendants produced in discovery a January 27, 2012 email from a pharmacy district manager for 33 Shop ‘n Save pharmacies, instructing those pharmacies to “throw away all your competitor’s price matching lists and get rid of all signs that say we match prices.” The email was sent seven days after the January 20, 2012 government agents’ visits to the defendants’ pharmacies, including one of the district manager’s pharmacies, five days after the manager learned of the visit by a Special Agent with the Department of Health and Human Services, Office of Inspector General (“HHS-OIG”), and three days after the defendants received a subpoena from the Government requesting documents regarding the price match program.

The relators further alleged it appeared that another district manager ordered the destruction of signage promoting the defendants’ price match program after visits by government agents and service of the HHS-OIG subpoena and also alleged the defendants waited until almost the end of discovery to produce the January 27, 2012 email.  As a result, they requested the entry of an Order imposing appropriate sanctions against the defendants for what they alleged was (1) Defendants’ failure to timely issue a litigation hold; (2) the intentional destruction of material evidence relating to defendants’ price match program; and (3) their subsequent efforts to conceal and obstruct discovery of their spoliation of evidence, including the wrongful withholding of material evidence of the spoliation until just days before the close of discovery in this case.

The defendants, in turn, claimed (1) they timely issued a litigation hold in this matter; (2) did not intentionally destroy material evidence; and (3) did not attempt to conceal and obstruct discovery of any alleged spoliation of evidence.  The Defendants claimed they issued three litigation holds: (1) one to individuals in the corporate business department on January 30, 2012; (2) one to all Pharmacy District Managers on February 20, 2012; and (3) one to the corporate marketing and advertising executives on March 15, 2012.  Alleging there were inconsistencies in both the number and timing of the litigation holds between defendant declarations, the relators asked the Court for an in camera review of the three litigation holds noted above.

Judge’s Ruling

Judge Mills, in noting that “A showing of bad faith—like destroying evidence to hide adverse information—is a prerequisite to imposing sanctions for missing evidence”, ruled as follows:

“The Court does not believe that an in camera review of the Defendants’ litigation holds is necessary at this time. At this time, the Court does not believe that sanctions are warranted based on the Defendants’ alleged failure to timely issue a litigation hold, their intentional destruction of evidence relating to the price match program, or their efforts to conceal and obstruct discovery of the spoliation of evidence. Upon reviewing the record, the Court is unable to conclude that Defendants acted in bad faith. If the evidence at trial shows otherwise and bad faith on the part of the Defendants is established, the Court can revisit the issue and consider one or both of the sanctions requested by the Relators or another appropriate sanction.

Ergo, the Relators’ motion for sanctions [d/e 205] is DENIED.”

So, what do you think?  Do the defendants’ actions seem to be in bad faith or was the Court’s ruling appropriate?  Please let us know if any comments you might have or if you’d like to know more about a particular topic.

Case opinion link courtesy of eDiscovery Assistant.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

It’s E-Discovery Day 2019! Check Out Today’s Webcasts and In Person Events!: eDiscovery Best Practices

It’s time for another E-Discovery Day!  By my count, this is the fifth annual event that includes a combination of webcasts and in-person events to promote discussion and education of eDiscovery (we won’t hold it against them that they want to spell it with that pesky dash).  Here are links to some of the webcasts and in-person events happening today!

According to Exterro, the organizer of the event, there were 2,660 participants in 19 webcasts and 14 in-person events last year.  This year, I count a whopping 22 webcasts and 16 in-person events and the earliest webcast started at midnight Pacific time!  You may have already missed it!  And that’s only the ones officially listed on the E-Discovery Day webcasts page here, there are others I’ve seen as well.  You can participate by hosting your own educational webcast and submit one for the list.  Eeegads! (or is it E-eegads?)… ;o)

In addition, there are also several in-person events and networking opportunities around the country – here is a link to those.  Some are happy hours and other networking events, others are actual local educational events.  Click on the event in your area to RSVP and find out more – there’s still time!

So, what do you think?  Are you “celebrating” E-Discovery Day?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Here’s Something that Canada and South Carolina Have in Common: eDiscovery Trends

They both just recently adopted changes to their rules of professional conduct that include a duty of technology competence.

Leave it to Bob Ambrogi – the source of all duty of technology competence updates on his excellent LawSites blog for the information.  Here’s the lowdown:

Canada

As Bob reported way back in 2017, the Federation of Law Societies of Canada had proposed changes to its Model Code of Professional Conduct that would include a duty of technology competence similar to ABA Model Rule 1.1, Comment 8.  On Oct. 19, the Federation formally amended its Model Code to include that duty of technology competence. Similar to the ABA rule, the Federation’s duty is embodied in comments to its rule on maintaining competence, Rule 3.1-2. These new comments say:

[4A] To maintain the required level of competence, a lawyer should develop an understanding of, and ability to use, technology relevant to the nature and area of the lawyer’s practice and responsibilities. A lawyer should understand the benefits and risks associated with relevant technology, recognizing the lawyer’s duty to protect confidential information set out in section 3.3.

[4B] The required level of technological competence will depend on whether the use or understanding of technology is necessary to the nature and area of the lawyer’s practice and responsibilities and whether the relevant technology is reasonably available to the lawyer. In determining whether technology is reasonably available, consideration should be given to factors including:

(a) The lawyer’s or law firm’s practice areas;

(b) The geographic locations of the lawyer’s or firm’s practice; and

(c) The requirements of clients.

Bob notes that “Just as individual states must adopt an ABA model rule, the individual Canadian provincial and territorial law societies must adopt this rule.”  So, we’ll see how quickly that happens.

South Carolina

The day before Thanksgiving, the Supreme Court of South Carolina approved a package of amendments to the state’s Rules of Professional Conduct, all based on the 2012 amendments to the ABA Model Rules of Professional Conduct, which included a duty of technology competence as embodied in ABA Model Rule 1.1, Comment 8.  This made South Carolina the 38th state to adopt a duty of technology competence based on ABA Model Rule 1.1, Comment 8.  See the map above and Bob’s post here for all 38 states.

The new South Carolina provision is a modified version of the ABA model rule. It is found in a new Comment 6 to Rule 1.1, and reads:

“To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including a reasonable understanding of the benefits and risks associated with technology the lawyer uses to provide services to clients or to store or transmit information related to the representation of a client, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.”

In its order, the Supreme Court also amended Rule 1.6 (and comment 20 to Rule 1.6), pertaining to confidentiality of information, to add a paragraph (c), which reads:

“A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.”

Bob notes that South Carolina’s rule adds a restrictive clause to that, so that the duty extends only to “technology the lawyer uses to provide services to clients or to store or transmit information related to the representation of a client” and I agree with Bob that lawyers need to also understand the technology that their clients use as well.  So, maybe it’s more like 37 1/2 states have adopted a duty of technology competence?  ;o)  Regardless, Bob’s posts linked above provide more information on the updates from both jurisdictions.

So, what do you think?  Are you surprised that we still have 12 states that haven’t adopted a duty of technology competence?  Please share any comments you might have or if you’d like to know more about a particular topic.

Image Copyright © LawSites

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

In United States v. Caputo, No. 3:18-cr-00428-IM (D. Or Nov. 6, 2019), Oregon District Judge Karin J. Immergut denied the defendant’s motion to suppress emails and evidence derived from a warrantless search of Defendant’s workplace email account, finding “any expectation of privacy in Defendant’s work email was objectively unreasonable under the military’s computer-use policies in effect at his workplace.”

Case Background

In this case where the defendant was indicted on four counts of wire fraud, the defendant filed a motion to suppress emails and evidence derived from a warrantless search of the defendant’s workplace email account.  The Government’s response to the motion provided additional facts about the email account and the context in which it received copies of the defendant’s emails, including an image of the banner message displayed when the defendant logged on to his work computer system and two policies which governed the defendant’s computer use at work.

During the period at issue in this case, the warning banner advised (among other things) that at any time, the US Government may inspect and seize data stored on the information system.  The defendant was also subject to the Oregon National Guard’s acceptable use policy and Employees of the Oregon National Guard, including the defendant, were required to sign the policy before they received computer access. They also had to acknowledge and recertify their understanding of the policy annually.

Judge’s Ruling

Judge Immergut noted that “Defendant has not offered any evidence that he had a subjective expectation of privacy in his work email” and stated that “any expectation of privacy in Defendant’s work email was objectively unreasonable under the military’s computer-use policies in effect at his workplace.”

Judge immergut also rejected two cases that the defendant cited to support his claim of a reasonable expectation of privacy, stating that “neither case requires suppression here” and that “[u]nder these circumstances, it was objectively unreasonable for Defendant to expect privacy in his work email.”  As a result, Judge Immergut denied the defendant’s motion to suppress.

So, what do you think?  Should employees expect privacy within their work email accounts?  Please let us know if any comments you might have or if you’d like to know more about a particular topic.

Case opinion link courtesy of eDiscovery Assistant.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

In Commonwealth v. Davis, No. 56 MAP 2018 (Pa. Nov. 20, 2019), the Supreme Court of Pennsylvania, in a 4-3 ruling, overturned a lower-court order that required a criminal suspect to turn over a 64-character password to his computer, concluding that “compelling the disclosure of a password to a computer, that is, the act of production, is testimonial” and rejecting the Commonwealth’s argument that provision of the password was a foregone conclusion, finding that “the prohibition of application of the foregone conclusion rationale to areas of compulsion of one’s mental processes would be entirely consistent with” US Supreme Court decisions.

Case Background

In this case involving alleged child-pornography activities, agents of the Office of Attorney General (“OAG”) executed a search warrant at Appellant’s apartment based upon a video found to contain child pornography being shared via a peer-to-peer file-sharing network (eMule) from an IP address associated with the appellant.  At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer.  When the agent requested that Appellant provide him with the password to the computer, he responded: “It’s 64 characters and why would I give that to you? We both know what’s on there. It’s only going to hurt me. No f*cking way I’m going to give it to you.”  Appellant was charged with two counts of disseminating child pornography in violation of 18 Pa.C.S. § 6312(c), and two counts of criminal use of a communication facility in violation of 18 Pa.C.S. § 7512(a).

On December 17, 2015, the Commonwealth filed with the trial court a pre-trial motion to compel Appellant to divulge the password to his HP 700 computer. Appellant responded by invoking his right against self-incrimination.  The trial court focused on the question of whether the encryption was testimonial in nature, and, thus, protected by the Fifth Amendment.  Applying the foregone conclusion exception, the trial court determined that the information the Commonwealth sought from Appellant was a foregone conclusion, in that the facts to be conveyed by Appellant’s act of production of his password already were known to the government. As, according to the trial court, Appellant’s revealing his password would not provide the Commonwealth with any new evidence, and would simply be an act that permitted the Commonwealth to retrieve what was already known to them, the foregone conclusion exception was satisfied.  A three-judge panel of the Superior Court later affirmed that ruling, leading to appeal to the Pennsylvania Supreme Court.

Judge’s Ruling

In the majority opinion written by Justice Debra Todd, she wrote:

“Based upon these cases rendered by the United States Supreme Court regarding the scope of the Fifth Amendment, we conclude that compelling the disclosure of a password to a computer, that is, the act of production, is testimonial. Distilled to its essence, the revealing of a computer password is a verbal communication, not merely a physical act that would be nontestimonial in nature. There is no physical manifestation of a password, unlike a handwriting sample, blood draw, or a voice exemplar. As a passcode is necessarily memorized, one cannot reveal a passcode without revealing the contents of one’s mind. Indeed, a password to a computer is, by its nature, intentionally personalized and so unique as to accomplish its intended purpose — keeping information contained therein confidential and insulated from discovery. Here, under United States Supreme Court precedent, we find that the Commonwealth is seeking the electronic equivalent to a combination to a wall safe — the passcode to unlock Appellant’s computer. The Commonwealth is seeking the password, not as an end, but as a pathway to the files being withheld. As such, the compelled production of the computer’s password demands the recall of the contents of Appellant’s mind, and the act of production carries with it the implied factual assertions that will be used to incriminate him. Thus, we hold that compelling Appellant to reveal a password to a computer is testimonial in nature.”

Judge Todd also, after commenting on several US Supreme Court rulings, stated “the prohibition of application of the foregone conclusion rationale to areas of compulsion of one’s mental processes would be entirely consistent with the Supreme Court decisions, surveyed above, which uniformly protect information arrived at as a result of using one’s mind. To broadly read the foregone conclusion rationale otherwise would be to undercut these pronouncements by the high Court.”

Judge Max Baer offered the dissenting opinion, stating: “In my opinion, the compulsion of Appellant’s password is an act of production, requiring him to produce a piece of evidence similar to the act of production requiring one to produce a business or financial document”.  He also stated: “Under the majority’s reasoning, the compelled production of documents would be tantamount to placing the defendant on the stand and requiring him to testify as to the location of the documents sought. The mere fact that Appellant is required to think in order to complete the act of production, in my view, does not immunize that act of production from the foregone conclusion rationale.”

Nonetheless, by a 4-3 vote, the Pennsylvania Supreme Court reversed the order of the Superior Court and remanded the matter to the Superior Court, for remand to the trial court, for proceedings consistent with the majority Opinion.

Here’s a case from earlier this year with a different result.

So, what do you think?  Should defendants be ordered to provide their passcodes, even if it leads to incriminating evidence against them?  Please let us know if any comments you might have or if you’d like to know more about a particular topic.

Happy Thanksgiving!

Case opinion link courtesy of eDiscovery Assistant.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

It’s Time for Your Annual “Mashup” of eDiscovery Market Estimates!: eDiscovery Trends

The appearance of the mashed potato graphic can only mean one thing.  Nope, not that it’s Thanksgiving week (though, many of us will enjoy our mashed potatoes this Thursday).  It means that it’s time for the eDiscovery Market Size Mashup that Rob Robinson compiles and presents on his Complex Discovery site each year.

It’s become an annual tradition for Rob to release it earlier and earlier each year, and, this year, he released his worldwide eDiscovery services and software overview for 2019 to 2024 on November 12 (not quite before Halloween like I predicted last year, but still eight days earlier than last year, so it might happen next year).  ;o)

This is the eighth(!) year we have covered the “mashup”(!) and we can continue to gauge how accurate those first predictions were.  The first “mashup” covered estimates for 2012 to 2017 and the second one covered 2013 to 2018.  Last year, we took a look how close the estimate was for 2018 back then.  This year, we can look at the original 2019 with a look back at the estimates for 2014-2019 (in two parts).  We’ve also covered estimates for 2015 to 2020, 2016 to 2021, 2017 to 2022 and 2018 to 2023 and will undoubtedly look at those in future years.

Taken from a combination of public market sizing estimations as shared in leading electronic discovery publications, posts, and discussions (sources listed on Complex Discovery), the following eDiscovery Market Size Mashup shares general market sizing estimates for the software and services area of the electronic discovery market for the years between 2019 and 2024.

Here are some highlights (based on the estimates from the compiled sources on Rob’s site):

  • The eDiscovery Software and Services market is expected to grow an estimated 12.93% Compound Annual Growth Rate (CAGR) per year from 2019 to 2024 from $11.23 billion to $20.63 billion per year. Services will comprise approximately 69.7% of the market and software will comprise approximately 30.3% by 2024.
  • The eDiscovery Software market is expected to grow at an estimated 13.05% CAGR per year from $3.39 billion in 2019 to $6.26 billion in 2024. In 2019, software comprises 30.2% of the market and, by 2024, approximately 64% of the eDiscovery software market is expected to be “off-premise” – a.k.a. cloud and other Software-as-a-Service (SaaS)/Platform-as-a-Service (PaaS)/Infrastructure-as-a-Service (IaaS) solutions.
  • The eDiscovery Services market is expected to grow at an estimated 12.88% CAGR per year from 2019 to 2024 from $7.84 billion to $14.37 billion per year. The breakdown of the services market by 2024 is expected to be as follows: 63% review, 20% processing and 17% collection.

If we look at the original “mashup” that we covered for 2014-2019 (in two parts), the original eDiscovery Software and Services market estimate for 2019 was $10.56 billion, the original Software portion of the estimate was $3.38 billion and the original Services portion of the estimate was $7.18 billion.  So, the original software estimate was understated at .01 billion, while the original services estimate was understated by .66 billion.  Overall, that’s an understatement of .67 billion.  A reversal from last year, where all of the 2018 estimates were overstated from the actual 2018 numbers reported last year.

A couple of other notable stats:

  • The U.S. constitutes approximately 63% of worldwide eDiscovery software and services spending in 2019, with that number decreasing to approximately 58% by 2024.
  • Off-Premise software spending constitutes approximately 54% of worldwide eDiscovery software spending in 2019, with that number increasing to approximately 64% by 2023. That’s a considerably slower move to off-premise than previously forecast five years ago (78% by 2019).  So, on-premise software is still a significant portion of the software market and is expected to be for some time to come.

So, what do you think?  Do any of these numbers surprise you?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Here’s a Webcast to Learn about Important eDiscovery Developments for 2019: eDiscovery Webcasts

I know it seems like we just conducted a webcast (we did, three days ago), but we already have another one coming up!  2019 was another busy year from an eDiscovery, cybersecurity and data privacy standpoint.  What do you need to know about those important 2019 events?  Here’s a webcast that will discuss what you need to know about important 2019 events and how they impact your eDiscovery efforts.

On Wednesday, December 11 at noon CST (1:00pm EST, 10:00am PST), CloudNine will conduct the webcast 2019 eDiscovery Year in Review.  In this one-hour webcast that’s CLE-approved in selected states, we will discuss key events and trends in 2019, what those events and trends mean to your discovery practices and provide our predictions for 2020. Key topics include:

  • How Much Data is Being Transmitted Every Minute on the Internet in 2019
  • What a Lawyer’s Notification Duty When a Data Breach Occurs
  • General Data Protection Regulation (GDPR) and Data Privacy Fines
  • Biometric Security and Data Privacy Litigation
  • Cell Phone Passwords and the Fifth Amendment
  • How Organizations Are Doing on Compliance with the California Consumer Privacy Act (CCPA)
  • Social Media and Judges Accepting “Friend” Requests from Litigants
  • How #metoo and Investigations are Impacting eDiscovery within Organizations
  • Whether Emojis Are the Next eDiscovery Challenge
  • The Challenge to Obtain Significant Spoliation Sanctions under the New Rule 37(e)
  • Whether Lawyers Are “Failing” at Cybersecurity?
  • Outside Hackers vs. Internal Employees As Cybersecurity Threat
  • Sanctions Resulting from Inadvertent Disclosure of Privileged Information

As always, I’ll be presenting the webcast, along with Tom O’Connor.  To register for it, click here – it’s not too late! Even if you can’t make it, go ahead and register to get a link to the slides and to the recording of the webcast (if you want to check it out later).  If you want to learn how key events and trends in 2019 can affect your eDiscovery practice in 2020, this webcast is for you!

So, what do you think?  Do you have FOMO (fear of missing out) on important info for 2019?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.