Electronic Discovery

Sedona Conference Updates Guide for Judges – eDiscovery Trends

Last year, The Sedona Conference® made a public comments version of the Cooperation Proclamation: Resources for the Judiciary available on the Sedona Conference website. The Resources for the Judiciary document aims to provide judges with a foundation for creating a collaborative and non-adversarial approach to managing eDiscovery.  Now, its Judicial Resources guide has been updated and the free version is available on the Sedona Conference web site.

In addition to a Preface that outlines the Vision, Mission and Goal for the Resources, the guide includes the following sections:

  • I. Introduction: Discusses the difference between “active case management” (proactive) and “discovery management” (reactive), while urging judges to take an active case management model approach;
  • II. Review of Existing Literature on E-Discovery for Judges: A compilation of various resources for judges to become more familiar with eDiscovery, including everything from the 2006 amendments to the Federal Rules to local rules and pilot projects, such as the Model Order for Patent eDiscovery;
  • III. General Recommendations for Judges: A list of seven recommendations for how judges handle eDiscovery issues in their cases, along with supporting information and resources;
  • IV. The Stages of Litigation from a Judge’s Perspective: Sections for twenty different stages, ranging from Preservation to Post-Judgment Costs.

Creation of the new edition was led by senior editors Ronald Hedges (a retired magistrate judge from the U.S. District Court for the District of New Jersey, now a consultant) and Kenneth Withers (Sedona’s director of judicial education) with Karen Van Allen serving as editorial coordinator.  Judicial Reviewers were:

  • Hon. Ralph Artigliere, 10th Judicial Circuit Court, Florida (ret.)
  • Hon. John M. Facciola, U.S. Magistrate Judge, District of the District of Columbia
  • Hon. Peter Flynn, Circuit Court of Cook County, Illinois
  • Hon. Elizabeth D. Laporte, U.S. Magistrate Judge, Northern District of California
  • Hon. Elizabeth M. Schwabedissen, General Magistrate, 11th Judicial Circuit Court, Florida
  • Hon. Craig B. Shaffer, U.S. Magistrate Judge, District of Colorado

Apparently, the web site will also have a special password-protected collaboration area exclusively for judges to comment, suggest resources or even submit sample orders, enabling those judges to freely communicate without concern about eavesdropping from outside parties.  And, as always, to submit a public comment, you can download a public comment form here, complete it and fax (yes, fax) it to The Sedona Conference® at 928-284-4240.  You can also email a general comment to them at tsc@sedona.net.

So, what do you think?  Will this guide make for a smoother discovery process?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Perspective on the HP/Autonomy Fiasco – eDiscovery Trends

It’s not exactly Dr. Evil’s $100 billion, but it’s not “chump change” either…

By now, you’ve probably heard that, on Tuesday, Hewlett-Packard (HP) took an $8.8 billion charge resulting from its acquisition of Autonomy back in 2011, one of the largest acquisitions in the eDiscovery industry in history.  HP has called on US and British authorities to investigate what it called “serious accounting improprieties, disclosure failures and outright misrepresentations at Autonomy” before the acquisition in a developing scandal that also involves accounting firms Deloitte and KPMG, who audited the sale.

In a statement, HP said “HP is extremely disappointed to find that some former members of Autonomy’s management team used accounting improprieties, misrepresentations, and disclosure failures to inflate the underlying financial metrics of the company, prior to Autonomy’s acquisition by HP”.  The deal was brokered by former HP CEO Leo Apotheker and Autonomy founder Mike Lynch – both are no longer with HP.

Some notable stats:

  • The $8.8 billion charge is 85% of the widely reported $10.3 billion purchase price that HP paid for Autonomy in October 2011;
  • On Tuesday, HP’s shares traded down $1.74, or 13%, at $11.56 in morning trading – just after the open, they hit $11.35, the lowest level since 2002;
  • HP’s net loss for the fiscal fourth quarter (which ended Oct. 31) was $6.85 billion, compared with net income of $239 million in the same period in 2011.

For his part, Lynch fiercely denies allegations that Autonomy falsified its financial statements. In a statement to the Guardian on Tuesday, his spokesperson said: “HP has made a series of allegations against some unspecified former members of Autonomy Corporation PLC’s senior management team. The former management team of Autonomy was shocked to see this statement today, and flatly rejects these allegations, which are false…HP’s due diligence review was intensive, overseen on behalf of HP by KPMG, Barclays and Perella Weinberg. HP’s senior management has also been closely involved with running Autonomy for the past year…It took 10 years to build Autonomy’s industry-leading technology and it is sad to see how it has been mismanaged since its acquisition by HP.”

Additional articles discussing the HP/Autonomy controversy are available here, here, here and here.  As for what will become of HP and its Autonomy division (that previously acquired Zantaz, Interwoven and Iron Mountain, among others), remains to be seen.  Expect a long legal battle.

So, what do you think?  How will this affect future acquisitions of eDiscovery companies?  Will we all be working with the HP/Autonomy public domain data set someday?  😉  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Defendant Compelled to Produce Additional Discovery to Plaintiff – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

Where the facts of the case led a court to conclude that certain electronically stored information (ESI) could contain evidence relevant to the case, the court ordered a party to comply with its discovery obligations related to that ESI.

In Freeman v. Dal-Tile Corp., No. 5:10-CV-00522-BR, 2012 U.S. Dist. (E.D.N.C. Oct. 2, 2012), a case alleging harassment and discrimination, among other claims, against her former employer Dal-Tile Corporation, the plaintiff brought a motion to compel, asserting that some of the defendant’s discovery responses related to its search for ESI were deficient.

Specifically, the plaintiff sought to compel a keyword search of preserved e-mails belonging to certain individuals for a time frame that began two months after the plaintiff left Dal-Tile. The defendant objected, arguing that because the plaintiff had already left the company during the time frame for e-mails requested, any such e-mails “could not be relevant to Plaintiff’s harassment claims, because ‘the sole issue is whether Dal-Tile knew or should have known of the harassment and failed to take appropriate steps to halt it.’”

North Carolina Magistrate Judge William A. Webb disagreed, stating that it was “reasonable to expect” that e-mails written or received during that time period “could contain historical e-mails, i.e., an e-mail chain, given that the requested search period begins only two months after Plaintiff resigned.” Moreover, the plaintiff’s request hit the mark for other reasons: “The custodians whose e-mail Plaintiff requests to have searched are . . . the human resource officer who investigated Plaintiff’s complaints, and . . . the regional vice-president to whom [the human resources officer] reported her investigation findings.” In addition, the search terms that the plaintiff requested were “appropriately limited in number and scope and, thus, reasonably calculated to lead to the discovery of admissible evidence.”

Moreover, Judge Webb noted, Dal-Tile did “not assert[ ] that it would be unduly burdensome to search the e-mail[s requested]” or the hard drive of the human resources officer, a search of which the plaintiff had included in her request.

Therefore, the plaintiff’s motion was granted.

So, what do you think?  Should the plaintiff’s motion have been granted?  Please share any comments you might have or if you’d like to know more about a particular topic.

From All of Us at CloudNine Discovery and eDiscovery Daily, Happy Thanksgiving!  eDiscovery Daily will resume with new posts next Monday.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Rambus’ “Shred Days” Result in Sanctions Yet Again – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

By the way, the Rambus cases are among the most “famous” from an eDiscovery spoliation standpoint.  As you’ll see from the description below, Rambus is still paying for activities way back in 1998 that have been ruled to be spoliation of data.

In Hynix Semiconductor Inc. v. Rambus, Inc., No. C-00-20905 RMW, 2012 U.S. Dist. (N.D. Cal. Sept. 21, 2012), California District Judge Ronald Whyte used his discretion to fashion an appropriate fact-specific sanctions award after it found a party willfully destroyed evidence despite reasonably foreseeable litigation, it destroyed such evidence in bad faith, and the opposing party suffered prejudice.

In this discovery dispute over spoliation and sanctions in a patent lawsuit, the district court reconsidered this case after its previous decision was vacated by the Federal Circuit and remanded. Previously, in this court, Hynix Semiconductor Inc. et al. (Hynix) had “unsuccessfully urged” that Rambus, Inc. (Rambus) had engaged in the spoliation of evidence, and “its ‘unclean hands’ warranted dismissal of its patent infringement claims.” On appeal, however, the Federal Circuit remanded the case so that the district court could consider it under a different spoliation test, which had been applied in another case presenting an identical spoliation issue, Micron Technology, Inc. v. Rambus Inc., 645 F.3d 1311 (Fed. Cir. 2011) (Micron II).

Therefore, the court had to analyze whether “Rambus destroyed records at a time when litigation was reasonably foreseeable. If so, the court will determine whether Rambus acted in bad faith. Next, the court will determine the nature and extent of any prejudice suffered by Hynix as a result of the spoliation. Finally, the court will decide what sanction is appropriate, if any.”

The court found that Rambus engaged in spoliation of evidence when it destroyed documents on “Shred Days” in 1998, 1999, and 2000 when it invited an outside company to Rambus to shred documents that employees provided for shredding in accordance with the company’s document retention policy. The court found that on those Shred Days, litigation was reasonably foreseeable. Noting that the “important question” was not when Rambus’s duty to preserve arose, “but rather the binary question of whether litigation was reasonably foreseeable by the date on which documents were destroyed,” the court found that although litigation was not foreseeable when Rambus destroyed some of its back-up tapes in July 1998, it was reasonably foreseeable by the time of Shred Day 1998.

At the time the back-up tapes were destroyed in July, the court pointed to numerous questions that existed about the success of Rambus’s patented product and what features the existing patents covered. Management had only held hypothetical discussions about potential targets of litigation, and they had not discussed in depth budgeting for litigation. Destruction of back-up tapes was done “primarily” for “housekeeping” purposes.

By the time Shred Day 1998 occurred, however, Rambus “anticipated instituting litigation.” A Rambus officer, Joel Karp, whom the company hired in 1997 to assess whether competitors were infringing on Rambus’s patents, had advised employees of the company’s documentation retention policy, and “the fact that he advised them to discard documents that questioned the patentability of ideas suggests he had litigation on his mind.” Moreover, a litigation strategy was being “aggressively developed,” and Rambus was turning its attention heavily toward a certain part of its business, which it believed it had to fight to protect.

Thus, finding that Rambus had engaged in spoliation beginning with Shred Day 1998, the court turned to analyze whether Rambus acted with “unclean hands.” The court set forth the applicable standard: “To find bad faith in the spoliation context, ‘the district court must find that the spoliating party intended to impair the ability of the potential defendant to defend itself.’” While Rambus asserted that it conducted document destruction only to execute its “neutral” document retention policy, Hynix argued that regardless of Rambus’s compliance with its own document retention policy, Rambus knew litigation was reasonably foreseeable and destroyed documents in bad faith “to gain a litigation advantage.” In addition, Hynix argued that Karp ordered Rambus employees to destroy documents selectively, keeping ones that would protect their patents and destroying ones that would cause difficulty in litigation.

Parsing the evidence, the court found:

“Although the evidence does not support a conclusion that Rambus deliberately shredded documents it knew to be damaging, the court concludes that Rambus nonetheless spoliated evidence in bad faith or at least willfully. This conclusion is based upon the facts that: (1) Rambus destroyed records when litigation was reasonably foreseeable; (2) Karp, the officer in charge of the destruction, was experienced in litigation and undoubtedly knew that relevant documents should not be destroyed when litigation is reasonably foreseeable; (3) the destruction was part of a litigation plan; (4) one of the motives of the destruction was to dispose of potentially harmful documents; and (5) Rambus shredded a huge number of documents without keeping any records of what it was destroying.”

The court then turned to the issue of whether Rambus’s bad faith spoliation of evidence had prejudiced Hynix. The Micron II court set forth the applicable standard for evaluating prejudice: “‘Prejudice to the opposing party requires a showing that the spoliation materially affect[s] the substantial rights of the adverse party and is prejudicial to the presentation of his case.’ (citation omitted) ‘In satisfying that burden, a party must only come forward with plausible, concrete suggestions as to what [the destroyed] evidence might have been.’” Moreover, if the spoliation had already been determined to have been in bad faith, the spoliating party had a heavy burden to show its document destruction had not prejudiced the other party. Yet, the court cautioned, “the alleged misconduct by the spoliator . . . must relate directly to an issue concerning which the complaint is made.”

Here, Hynix had claimed that Rambus’s patents were invalid, and the court explained, “the invalidity defenses of anticipation and obviousness depend upon how one of ordinary skill in the art would have understood the prior art.” In this case, all prior art was accessible to Hynix and therefore the document destruction did not prejudice Hynix. The other defense of “inadequate written description” similarly turned on information that was available to Hynix. As such, the court found that Hynix’s invalidity defenses were not prejudiced by Rambus’s spoliation of evidence.

On the other hand, however, the court found that Rambus did not overcome Hynix’s allegations of prejudice based on its unenforceability complaint against Rambus. The court found that “it appear[ed] plausible that spoliated evidence might have shed additional light on the scope” of certain disclosure obligations that Rambus had with respect to its patents. Because this allegation offered a concrete suggestion for Hynix as to what the destroyed evidence could have been, Rambus had a heavy burden to disprove prejudice, which the court found it could not overcome.

Having concluded that Rambus “spoliated documents in bad faith and that Hynix has established prejudice,” the court then considered sanctions, noting it had “wide discretion whether to hold the patents-in-suit unenforceable pursuant to Hynix’s unclean hands defense, or to impose a different sanction.”

The court used the following analysis to evaluate the appropriateness of sanctions:

“In gauging the propriety of the sanction, the district court must take into account

“(1) the degree of fault of the party who altered or destroyed the evidence; (2) the degree of prejudice suffered by the opposing party; and (3) whether there is a lesser sanction that will avoid substantial unfairness to the opposing party and, where the offending party is seriously at fault, will serve to deter such conduct by others in the future.” (citation omitted) The sanction ultimately imposed must be commensurate with the analysis of these factors.”

In examining the Rambus’s degree of fault, the court found that

“Rambus’s fault was significant but not as great as that of a spoliator who knows of adverse evidence and specifically alters, hides or destroys that evidence. There is a possibility that Rambus did not destroy any evidence that would have been beneficial to Hynix’s litigation position. However, because Rambus is the party that destroyed documents by the box and bag without keeping any record of what was destroyed, Rambus must suffer the consequences of that uncertainty.”

Hynix’s degree of prejudice was significant, the court held, because it “was arguably prejudiced in its ability to litigate its equitable claims and defenses,” and if it had been able to better litigate them, it possibly could have avoided a royalty fee that was awarded against it based on a previous determination that Rambus’s patents were valid.

Therefore, the court “conclude[d] that the sanction most commensurate with Rambus’s conduct and [the fact that a royalty rate was previously awarded] is to strike from the record evidence supporting a royalty in excess of a reasonable, nondiscriminatory royalty. Such a remedy recognizes that Rambus’s patents have been determined to be valid while at the same time recognizing that Rambus’s spoliation of evidence should preclude it from entitlement to a royalty that places Hynix at a competitive disadvantage.” The court decided to use its discretion to fashion a sanction, noting that “a retrial of the case with either an adverse jury instruction or an evidentiary exclusion order would involve considerably more delay and expense,” and there had already been great delay in reaching a final determination in the case.

So, what do you think?  Was it appropriate to issue sanctions at this point and, if so, were they harsh enough?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Louisiana Order Dictates That the Parties Cooperate on Technology Assisted Review – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

In the case In re Actos (Pioglitazone) Products Liability Litigation, No. 6:11-md-2299, (W.D. La. July 27, 2012), a case management order applicable to pretrial proceedings in a multidistrict litigation consolidating eleven civil actions, the court issued comprehensive instructions for the use of technology-assisted review (“TAR”).

In an order entitled “Procedures and Protocols Governing the Production of Electronically Stored Information (“ESI”) by the Parties,” U.S. District Judge Rebecca Doherty of the Western District of Louisiana set forth how the parties would treat data sources, custodians, costs, and format of production, among others. Importantly, the order contains a “Search Methodology Proof of Concept,” which governs the parties’ usage of TAR during the search and review of ESI.

The order states that the parties “agree to meet and confer regarding the use of advanced analytics” as a “document identification mechanism for the review and production of . . . data.” The parties will meet and confer to select four key custodians whose e-mail will be used to create an initial sample set, after which three experts will train the TAR system to score every document based on relevance. To quell the fears of TAR skeptics, the court provided that both parties will collaborate to train the system, and after the TAR process is completed, the documents will not only be randomly sampled for quality control, but the defendants may also manually review documents for relevance, confidentiality, and privilege.

The governance order repeatedly emphasizes that the parties are committing to collaborating throughout the TAR process and requires that they meet and confer prior to contacting the court for a resolution.

So, what do you think?  Should more cases issue instructions like this?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Email Metadata Leads to Petraeus Resignation – eDiscovery Trends

As reported on by Megan Garber of The Atlantic, email location data led FBI investigators to discover CIA director David Petraeus’ affair with Paula Broadwell that led to his resignation.  The irony is that FBI investigators weren’t aware of, or looking for, information regarding the affair.  Here’s what happened, according to the article.

“Sometime in May, The New York Times reports, Broadwell apparently began sending emails to Jill Kelley, the Petraeus acquaintance (her precise connection to the family isn’t yet fully clear) — and those emails were “harassing,” according to Kelley. The messages were apparently sent from an anonymous (or, at least, pseudonymous) account. Kelley reported those emails to the FBI, which launched an investigation — not into Petraeus, but into the harassing emails.”

“From there, the dominoes began to fall. And they were helped along by the rich data that email providers include in every message they send and deliver — even on behalf of its pseudonymous users. Using the ‘metadata footprints left by the emails,’ the Wall Street Journal reports, ‘FBI agents were able to determine what locations they were sent from. They matched the places, including hotels, where Ms. Broadwell was during the times the emails were sent.’ From there, ‘FBI agents and federal prosecutors used the information as probable cause to seek a warrant to monitor Ms. Broadwell’s email accounts.’”

Once the investigators received that warrant, they “learned that Ms. Broadwell and Mr. Petraeus had set up private Gmail accounts to use for their communications, which included explicit details of a sexual nature, according to U.S. officials. But because Mr. Petraeus used a pseudonym, agents doing the monitoring didn’t immediately uncover that he was the one communicating with Ms. Broadwell.”

Ultimately, monitoring of Ms. Broadwell’s emails identified the link to Mr. Petraeus and the investigation escalated, despite the fact that the investigators “never monitored Mr. Petraeus’s email accounts”.

Needless to say, if the Director of the CIA can be tripped up by email metadata from an account other than his own, it could happen to anyone.  It certainly gives you an idea of the type of information that is discoverable not just from opposing parties, but third parties as well.

So, what do you think?  Have you ever identified additional sources of data through discovery of email metadata?  Please share any comments you might have or if you’d like to know more about a particular topic.

Thanks to Perry Segal’s e-Discovery Insights blog for the tip on this story!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Searching for Email Addresses Can Have Lots of Permutations Too – eDiscovery Best Practices

Tuesday, we discussed the various permutations of names of individuals to include in your searching for a more complete result set, as well as the benefits of proximity searching (broader than a phrase search, more precise than an AND search) to search for names of individuals.  Another way to identify documents associated with individuals is through their email addresses.

Variations of Email Addresses within a Domain

You may be planning to search for an individual based on their name and the email domain of their company (e.g., daustin@cloudnincloudnine.comm), but that’s not always inclusive of all possible email addresses for that individual.  Email addresses for an individual’s domain might appear to be straightforward, but there might be aliases or other variations to search for to retrieve emails to and from that individual at that domain.  For example, here are three of the email addresses to which I can receive email as a member of CloudNine Discovery:

To retrieve all of the emails to and from me, you would have to include all of the above addresses (and others too).  There are other variations you may need to account for, as well.  Here are a couple:

  • Jim Smith[/O=FIRST ORGANIZATION/OU=EXCHANGE ADMINISTRATIVE GROUP (GZEJCPIG34TQEMU)/CN=RECIPIENTS/CN=JimSmith] (legacy Exchange distinguished name from old versions of Microsoft Exchange);
  • IMCEANOTES-Andy+20Zipper_Corp_Enron+40ECT@ENRON.com (an internal Lotus Notes representation of an email address from the Enron Data Set).

As you can see, email addresses from the business domain can be represented several different ways, so it’s important to account for that in your searching for emails for your key individuals.

Personal Email Addresses

Raise your hand if you’ve ever sent any emails from your personal email account(s) through the business domain, even if it’s to remind you of something.  I suspect most of your hands are raised – I know mine is.  Identifying personal email accounts for key individuals can be important for two reasons: 1) those emails within your collection may also be relevant and, 2) you may have to request additional emails from the personal email addresses in discovery if it can be demonstrated that those accounts contain relevant emails.

Searching for Email Addresses

To find all of the relevant email addresses (including the personal ones), you may need to perform searches of the email fields for variations of the person’s name.  So, for example, to find emails for “Jim Smith”, you may need to find occurrences of “Jim”, “James”, “Jimmy”, “JT” and “Smith” within the “To”, “From”, “Cc” and “Bcc” fields.  Then, you have to go through the list and identify the email addresses that appear to be those for Jim Smith.  Any email addresses for which you’re not sure whether they belong to the individual or not (e.g., does jsmith1963@gmail.com belong to Jim Smith or Joe Smith?), you may need to retrieve and examine some of the emails to make that determination.  If he uses nicknames for his personal email addresses (e.g., huggybear2012@msn.com), you should hopefully be able to identify those through emails that he sends to his business account.

In its Email Analytics module, FirstPass® makes it easy to search for email addresses for an individual – simply go to Global Email Search and type in the string to retrieve all email addresses in the collection with that string.  It really streamlines the process of identifying email addresses for an individual and then reviewing those emails.

Whether or not your application simplifies that process, searching by email address is another way to identify documents pertaining to a key individual.  The key is making sure your search includes all the email addresses possible for that individual.

So, what do you think?  How do you handle searching for key individuals within your document collections?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

What’s in a Name? Potentially, a Lot of Permutations – eDiscovery Best Practices

When looking for documents in your collection that mention key individuals, conducting a name search for those individuals isn’t always as straightforward as you might think.  There are potentially a number of different ways names could be represented and if you don’t account for each one of them, you might fail to retrieve key responsive documents – OR retrieve way too many non-responsive documents.  Here are some considerations for conducting name searches.

The Ever-Limited Phrase Search vs. Proximity Searching

Routinely, when clients give me their preliminary search term lists to review, they will always include names of individuals that they want to search for, like this:

  • “Jim Smith”
  • “Doug Austin”

Phrase searches are the most limited alternative for searching because the search must exactly match the phrase.  For example, a phrase search of “Jim Smith” won’t retrieve “Smith, Jim” if his name appears that way in the documents.

That’s why I prefer to use a proximity search for individual names, it catches several variations and expands the recall of the search.  Proximity searching is simply looking for two or more words that appear close to each other in the document.  A proximity search for “Jim within 3 words of Smith” will retrieve “Jim Smith”, “Smith, Jim”, and even “Jim T. Smith”.  Proximity searching is also a more precise option in most cases than “AND” searches – Doug AND Austin will retrieve any document where someone named Doug is in (or traveling to) Austin whereas “Doug within 3 words of Austin” will ensure those words are near each other, making is much more likely they’re responsive to the name search.

Accounting for Name Variations

Proximity searches won’t always account for all variations in a person’s name.  What are other variations of the name “Jim”?  How about “James” or “Jimmy”?  Or even “Jimbo”?  I have a friend named “James” who is also called “Jim” by some of his other friends and “Jimmy” by a few of his other friends.  Also, some documents may refer to him by his initials – i.e., “J.T. Smith”.  All are potential variations to search for in your collection.

Common name derivations like those above can be deduced in many cases, but you may not always know the middle name or initial.  If so, it may take performing a search of just the last name and sampling several documents until you are able to determine that middle initial for searching (this may also enable you to identify nicknames like “JayDog”, which could be important given the frequently informal tone of emails, even business emails).

Applying the proximity and name variation concepts into our search, we might perform something like this to get our “Jim Smith” documents:

(jim OR jimmy OR james OR “j.t.”) w/3 Smith, where “w/3” is “within 3 words of”.  This is the syntax you would use to perform the search in OnDemand®, CloudNine Discovery’s online review tool.

That’s a bit more inclusive than the “Jim Smith” phrase search the client originally gave me.

BTW, why did I use “jim OR jimmy” instead of the wildcard “jim*”?  Because wildcard searches could yield additional terms I might not want (e.g., Joe Smith jimmied the lock).  Don’t get wild with wildcards!  Using the specific variations you want (e.g., “jim OR jimmy”) is usually best.

Thursday, we will talk about another way to retrieve documents that mention key individuals – through their email addresses.  Same bat time, same bat channel!

So, what do you think?  How do you handle searching for key individuals within your document collections?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Judge Carter Refuses to Recuse Judge Peck in Da Silva Moore – eDiscovery Trends

It seems like ages ago when New York Magistrate Judge Andrew J. Peck denied the motion of the plaintiffs in Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ. 1279 (ALC) (AJP) to recuse himself in the case.  It was all the way back in June.  Now, District Court Judge Andrew L. Carter, Jr. has ruled on the plaintiff’s recusal request.

In his order from last Wednesday (November 7), Judge Carter stated as follows:

“On the basis of this Court’s review of the entire record, the Court is not persuaded that sufficient cause exists to warrant Magistrate Judge Peck’s disqualification…Judge Peck’s decision accepting computer-assisted review … was not influenced by bias, nor did it create any appearance of bias.”

Judge Carter also noted, “Disagreement or dissatisfaction with Magistrate Judge Peck’s ruling is not enough to succeed here…A disinterested observer fully informed of the facts in this case would find no basis for recusal”.

Since it has been a while, let’s recap the case for those who may have not been following it and may be new to the blog.

Back in February, Judge Peck issued an opinion making this case likely the first case to accept the use of computer-assisted review of electronically stored information (“ESI”) for this case.  However, on March 13, District Court Judge Andrew L. Carter, Jr. granted the plaintiffs’ request to submit additional briefing on their February 22 objections to the ruling.  In that briefing (filed on March 26), the plaintiffs claimed that the protocol approved for predictive coding “risks failing to capture a staggering 65% of the relevant documents in this case” and questioned Judge Peck’s relationship with defense counsel and with the selected vendor for the case, Recommind.

Then, on April 5, Judge Peck issued an order in response to Plaintiffs’ letter requesting his recusal, directing plaintiffs to indicate whether they would file a formal motion for recusal or ask the Court to consider the letter as the motion.  On April 13, (Friday the 13th, that is), the plaintiffs did just that, by formally requesting the recusal of Judge Peck (the defendants issued a response in opposition on April 30).  But, on April 25, Judge Carter issued an opinion and order in the case, upholding Judge Peck’s opinion approving computer-assisted review.

Not done, the plaintiffs filed an objection on May 9 to Judge Peck’s rejection of their request to stay discovery pending the resolution of outstanding motions and objections (including the recusal motion, which has yet to be ruled on.  Then, on May 14, Judge Peck issued a stay, stopping defendant MSLGroup’s production of electronically stored information.  Finally, on June 15, in a 56 page opinion and order, Judge Peck denied the plaintiffs’ motion for recusal, which Judge Carter has now upheld.

So, what do you think?  Will Judge Carter’s decision not to recuse Judge Peck restart the timetable for predictive coding on this case?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Defendant Claiming Not Reasonably Accessible Data Has Some ‘Splaining To Do – eDiscovery Case Law

In Murray v. Coleman, No. 08-CV-6383, 2012 U.S. Dist. (W.D.N.Y. Sept. 12, 2012), the plaintiff alleged harassment and retaliation in connection with his employment with the New York State Department of Correctional Services (DOCS). This discovery dispute arose when the plaintiff requested access to certain electronic records, alleging that the defendants withheld them.

In his motion, the plaintiff asserted that the defendants “never provided a ‘chronological e-mail history of any kind.’” In response, defense counsel “simply aver[red] that after plaintiff filed this motion to compel, he provided plaintiff with…‘the documents sought’ and, therefore, plaintiff’s motion is ‘moot.’” The plaintiff responded to the defendant’s reply, asserting that “‘virtually no electronic records [were] included’ in defendant’s discovery responses.”

Because the defense counsel’s response to the plaintiff’s motion was “terse,” New York Magistrate Judge Jonathan Feldman stated that it was “difficult . . . to determine whether defendants have in fact produced all relevant electronic records and e-mails as demanded by plaintiff.” Lacking in defense counsel’s response were “details regarding how and where electronically stored information (“ESI”) is held, what efforts were made to preserve relevant ESI, and the method used by defendants to locate, search and produce relevant ESI.”

As such, Judge Feldman “construe[d the defendants’] response as a claim that ESI, including e-mails, [were] not . . . produced because the data demanded [was] destroyed or [was] not ‘reasonably accessible’” pursuant to Rule 26(b)(2)(B) of the Federal Rules of Civil Procedure, which requires a producing party to “show that the information is not reasonably accessible because of undue burden or cost.”

Therefore, because the defendants had not sufficiently demonstrated that the ESI was not reasonably accessible, Judge Feldman ordered as follows:

“Defense counsel shall file an affidavit of a person with direct knowledge of DOCS’s document and e-mail retention system stating: (1) the document/e-mail retention policy used by DOCS currently and during the relevant time periods, (2) the dates of e-mails “reasonably accessible” for production in this litigation, (3) the back up or legacy system, if any, used by DOCS to preserve or archive e-mails that are no longer “reasonably accessible” and whether responsive documents or data may potentially be found on such back up or legacy systems, (4) whether accessing archived or back up e-mails would be unduly burdensome or costly and why, and (5) the date when a litigation hold or document preservation notice was put in place by DOCS regarding this matter and either a copy of or a description of the preservation or litigation hold utilized by DOCS.”  [emphasis added]

Judge Feldman ordered the defense to provide this affidavit within 30 days.

So, what do you think?  Was this an appropriate ruling given the situation?  Or did the defendant deserve sanctions?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.