Evidence

Image Isn’t Everything, Court Says, Denying Plaintiff’s Request for Imaging on Defendant’s Hard Drives – eDiscovery Case Law

In Design Basics, LLC. v. Carhart Lumber Co., 8:13CV125 (D. Neb. Nov. 24, 2014), Nebraska Magistrate Judge Cheryl R. Zwart, after an extensive hearing on the plaintiff’s motion to compel “full disk imaging of Defendant’s hard drives, including Defendant’s POS server, secretaries’ computers, UBS devices. . .”, denied the motion after invoking the mandatory balancing test provided in FRCP Rule 26(b)(2)(C).

In this design misappropriation case, the plaintiff filed the motion to compel, arguing “that it is entitled to a full forensic image of the defendant’s server, and every computer or computer data storage device or location used by the company and any of its employees”.  The plaintiff’s counsel stated that he litigates design misappropriation cases nationwide, and he always (except perhaps in a rare case) is granted the right to image a defendant company’s entire computer system. Judge Zwart noted that, after being afforded an opportunity to brief the issue and submit further evidence, the plaintiff’s counsel cited no cases supporting this argument.

The defendant filed a motion for protective order seeking relief from that request and arguing that it had determined that the secretaries’ computers did not contain relevant information.

In issuing her ruling denying the plaintiff’s motion to compel and granting the defendant’s motion for protective order, Judge Zwart stated:

“Plaintiff’s demand for all of the defendant’s computer data is consistent with the position of its expert, but it is not consistent with the balancing required under Rule 26(b)(2)(C) of the Federal Rules of Civil Procedure.  Based on the arguments of counsel held today and the evidence of record, Defendant’s counsel has provided both electronic and paper copies of all blue prints, has performed Plaintiff’s requested search on the emails copied from the 11 computers, and has already invested many hours reviewing thousands of documents for privilege. Defense counsel offered to produce the nonprivileged emails to Plaintiff’s counsel for his review, and has provided dates for taking the deposition of Defendant’s president. Plaintiff’s counsel has neither reviewed the emails nor deposed anyone. This case is more than 18 months old.

In the end, the plaintiff failed to show good cause why additional computer data must be collected from the defendant. Taking into consideration the factors listed in Fed. R. Civ. P. 26(b)(2)(C), the court is convinced that allowing imaging of every computer or data storage device or location owned or used by the defendant, including all secretaries’ computers, is not reasonable and proportional to the issues raised in this litigation.”

So, what do you think?  Was the plaintiff overreaching in its request?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Twitter Might “Bug” You if You Want to Retrieve Archive Data – eDiscovery Best Practices

 

Thanks to the Google Alerts that I set up to send me new stories related to eDiscovery, I found an interesting blog post from an attorney that appears to shed light on an archival bug within Twitter that could affect people who may want to retrieve Twitter archival data for eDiscovery purposes.

In Erik J. Heels’ blog, his latest post (Twitter Bug Makes Tweet Archives Unreliable For eDiscovery), he starts by noting that his very first tweet of October 30, 2008 is no longer active on his site – his earliest tweet was dated September 5, 2010.  All attempts to try to locate the tweets were unsuccessful and customer service was no help.

After some digging, Erik found out that, on October 13, 2010, Twitter announced the “new Twitter” which included a new user interface.  As part of that revamping, Twitter changed the format for its status URLs (Tweets) so that the sequential number at the end of each Tweet (the Tweet ID) changed length, eventually doubling from nine digits in 2008 to 18 digits today (which supports up to one quintillion tweets).

Then, on December 12, 2012, Twitter announced that users could export archives of their Tweets (via your account’s Settings page).  The result is a nine field comma-separated values (CSV) file with information, including the tweet ID.  So, now you could retrieve your old tweets that were no longer actively stored, right?  Not necessarily.

As Erik found out, when he exported the file and went to retrieve old tweets, some of his tweet IDs actually pointed to other people’s tweets!  You can see the details of his tests in his blog post or via his 60 second YouTube video here.

Obviously, if you need to retrieve archived tweets for eDiscovery purposes, that’s not a good thing.

As it happens, CloudNine Discovery has our own Twitter account (@Cloud9Discovery) and has since August of 2009 (we were known as Trial Solutions back then), so I decided to run my own test and exported our archive.  Here’s what I found:

  • Our very first tweet was August 17, 2009 (Trial Solutions Ranks 2,830 on the Exclusive 2009 Inc. 5000).  It retrieved correctly.  The bit.ly link within the tweet isn’t hyperlinked, but if you copy and paste it into the browser address, it correctly retrieves (obviously, this will only be the case if the referenced web page still exists).
  • In fact, all of the early tweets that I tested retrieved with no problem.
  • Then, on December 1, 2010, I encountered the first tweet that didn’t retrieve correctly (one of our blog posts titled eDiscovery Project Management:  Effectively Manage Your Staff) with a tweet ID of 9924696560635900 (Full URL: https://twitter.com/Cloud9Discovery/status/9924696560635900).  It didn’t point to a different person’s tweet, it simply said “Sorry, that page doesn’t exist!”
  • From that point on, none of the tweets that I tried to retrieve would retrieve – all gave me the “page doesn’t exist” message.
  • I even tried to retrieve our tweet of yesterday’s blog post (Defendant Ordered to Produce Archived Emails Even Though Plaintiff Failed to Produce Theirs – eDiscovery Case Law) via the tweet ID provided in the archive file (535098008715538000).  Even it wouldn’t retrieve.  Wait a minute, what’s going on here!

I then retrieved our tweet of yesterday’s blog post by clicking on it directly within Twitter.  Here is the URL to the tweet with the ID at the end: https://twitter.com/Cloud9Discovery/status/535098008715538434.

See the problem?  The tweet IDs don’t match.

I ultimately determined that all of the tweet IDs provided in the archive file starting on December 1, 2010 end with two or more zeroes.  Starting on November 5, 2010, they all end with at least one zero.  When I started testing those, I re-created Erik’s problem:

Our tweet on November 29, 2010 titled eDiscovery Trends: Sanctions at an All-Time High, (tweet ID: 9199940811100160) actually retrieves a tweet by @aalyce titled @StylesFever snog liam marry louis and niall can take me out 😉 hehe.  Whoops!

It appears as though the archive file provided by Twitter is dropping all digits of the tweet ID after the fifteenth digit and replacing them with zeroes, effectively pointing to either an invalid or incorrect page and rendering the export effectively useless.  Hopefully, Twitter can fix it – we’ll see.  In the meantime, don’t rely on it and be prepared to address the issue if your case needs to retrieve archived data from Twitter.  Thanks, Erik, for the heads up!

So, what do you think?  Have you ever had to preserve or produce data from Twitter in litigation?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Simply Deleting a File Doesn’t Mean It’s Gone – eDiscovery Best Practices

 

I seem to have picked up a bit of a bug and I’m on cold medicine, so my writing brain is a bit fuzzy.  As a result, so I’m revisiting a topic that has come up a few times over the years that we covered early on in the blog’s history.  I should be back in the saddle with new posts next week!

Disk drives use an index or table to keep track of where each file begins and ends on the disk.  You may have heard terms such as “FAT” (file allocation table) or NTFS ({Windows} NT File System) – these filing systems enable the file to be retrieved quickly on the drive.  They’re like a “directory” of all of the active files on the disk.  When a file is “deleted” (i.e., actually deleted, not just moved to the Recycle Bin), the data for that file isn’t actually removed from the disk (in most cases).  Instead, the entry pertaining to it is removed from the filing system.  As a result, the area on the disk where the actual data is located becomes unallocated space.

Unallocated space, also known as inactive data or drive free space, is the area of the drive not allocated to active data. On a Windows machine, deleted data is not actually destroyed, but the space on the drive that can be reused to store new information. Until the unallocated space is overwritten with new data, the old data remains.  This data can be retrieved (in most cases) using forensic techniques. On MAC O/S 10.5 and higher, there is an application that overwrites sectors when a file is deleted. This process more securely destroys data, but even then it may be possible to recover data out of unallocated space.

Because the unallocated space on a hard drive or server is that portion of the storage space to which data may be saved, it is also where many applications “temporarily” store files when they are in use. For instance, temporary Internet files are created when a user visits a web page, and these pages may be “cached” or temporarily stored in the unallocated space.  Rebooting a workstation or server can also clear some data from the unallocated space on its drive.

Since computers are dynamic and any computer operation may write data to the drive, it is nearly impossible to preserve data in the unallocated space on the hard drive and that data is not accessible without special software tools. To preserve data from the unallocated space of a hard drive, the data must be forensically collected, which basically copies the entire drive’s contents, including every sector (whether those sectors contain active data or not). Even then, data in the unallocated space may not be complete. Because the unallocated space is used to store new data, writing a new file may overwrite part of a deleted file, leaving only part of that file in the unallocated space.

Nonetheless, “deleted” files have been recovered, collected and produced in numerous lawsuits, despite efforts of some producing parties to destroy that evidence.

So, what do you think?  Have you ever recovered deleted data that was relevant to litigation?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery in Arbitration Has Become Less…Arbitrary – eDiscovery Trends

 

When you think of eDiscovery, you typically think of it as it relates to litigation – two sides of a case requesting and producing electronically stored information (ESI) as one means of identifying evidence designed to lead to resolution of a lawsuit.  But litigation is just one method for dispute resolution.  Another method is arbitration.  But, do arbitrators really “get” eDiscovery?

According to a new article in Corporate Counsel (Arbitrators Finally 'Get' E-discovery, written by Josh M. Leavitt), they finally do – thanks to the issuance of new rules (though some of those rules have actually been around for a while).  Leavitt observes that proponents of arbitration have considered the cost and delays of discovery “inconsistent with core principles of arbitration such as efficiency and cost-effectiveness” and that it was “not uncommon to go through substantial arbitrations without participating in anything remotely resembling either a federal e-discovery conference with opposing counsel or a prearbitration conference where the arbitration panel engaged the parties in meaningful and technically sound discussions about e-discovery.”

The end result was often either an ineffective, costly and/or manipulated discovery process.  However, as Leavitt notes, arbitral bodies JAMS and the American Arbitration Association (AAA) “now have protocols for e-discovery, as do several of the international arbitration providers”.

JAMS

The former Judicial Arbitration and Mediation Services, now known as JAMS, Inc., published in January 2010 its Recommended Arbitration Discovery Protocols to “provide JAMS arbitrators with an effective tool that will help them exercise their sound judgment in furtherance of achieving an efficient, cost-effective process which affords the parties a fair opportunity to be heard.”  Also, Rule 16 of JAMS Comprehensive Arbitration Rules (also added in 2010) covers topics such as preliminary conferences, formats of production, metadata, custodians and cost shifting.

American Arbitration Association (AAA)

Last October, the AAA added new rules R-22 and R-23 to its Commercial Arbitration Rules and Mediation Procedures, which establishes parameters for arbitrators to manage exchange of ESI, impose ESI search parameters and make cost allocations and sanction noncompliance.  Also, the International Centre for Dispute Resolution® (ICDR), the international arm of the AAA, has published a 3 page Guidelines for Arbitrators Concerning Exchanges of Information to establish the authority for arbitrators to manage ESI and impose sanctions for noncompliance with their ESI orders.

With these resources available, arbitrators can make the process of eDiscovery less…arbitrary.

So, what do you think? Have you managed discovery in arbitration? Was it efficient?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Rules that Joint Stipulation Supports Plaintiff’s Production of Images Instead of Native Files – eDiscovery Case Law

In Melian Labs, Inc. v. Triology LLC, No. 13-cv-04791-SBA (N.D. Cal. Sept. 4, 2014), California Magistrate Judge Kandis A. Westmore denied the plaintiff’s motion to compel discovery in native form because the production format had been agreed upon under the parties’ ESI protocol under the Joint Rule 26(f) Report filed by the parties that supported production in “paper, PDF, or TIFF format”.

In this trademark dispute, the plaintiff sought a declaratory judgment that its website did not infringe upon the defendant’s trademark, but rather, that the defendant’s use of the trademark infringed on the plaintiff’s senior trademark rights.

On March 26, 2014, the parties filed a case management conference statement (referred to as the “Joint Rule 26(f) Report”), and informed the district court that:

“With respect to the production of electronic data and information, the parties agree that the production of metadata beyond the following fields are not necessary in this lawsuit absent a showing of a compelling need: Date Sent, Time Sent, Date Received, Time Received, To, From, CC, BCC, and Email Subject. The parties agree to produce documents electronic form in paper, PDF, or TIFF format, and spreadsheets and certain other electronic files in native format when it is more practicable to do so.”

The plaintiff began its document production on June 23 and had produced 1218 pages of documents to date.  On August 1, the defendant complained about the format of the plaintiff’s document production of its electronically stored information (“ESI”), claiming that the produced PDFs were stripped of all metadata in violation of the agreement of the parties and that the spreadsheets were not produced in native format.  The defendant contended that the plaintiff’s production of “7 large PDF image documents, which each appear to be a compilation of ESI improperly collected and produced,” were violative of Federal Rule of Civil Procedure 34(b)(2)(E), because they were not produced in their native format and are not reasonably usable.  The defendant also contended that the plaintiff failed to comply with the Joint Rule 26(f) Report by refusing to produce all spreadsheets in native format – the plaintiff acknowledged that some of its spreadsheet printouts were difficult to read, and, in those cases, it produced the spreadsheets in native format (Excel) upon request, but contended that the parties never agreed to produce all spreadsheets in native format.

Judge Westmore stated that “Triology’s complaint is purely one of form and, at this juncture, it is not claiming that Melian’s production is incomplete. Rule 34(b) only requires that the parties produce documents as they are kept in the usual course of business or in the form ordinarily maintained unless otherwise stipulated. Fed. R. Civ. P. 34(b)(2)(E). The parties’ Joint Rule 26(f) Report is a stipulation, and, therefore, Rule 34(b) does not govern. Further, the Joint Rule 26(f) Report does not require that all ESI be produced electronically. Instead, it states that ESI may be produced in paper, PDF or TIFF.”

Judge Westmore also noted that “Triology fails to articulate why metadata is important to emails, when every email should contain the information sought on the face of the document.”  As a result, he ruled that the defendant’s “request to compel the production of all emails in a searchable or native format is denied”.

So, what do you think?  Did the Joint Rule 26(f) Report allow the plaintiff to produce PDFs with no metadata or was the defendant still entitled to native files with at least the email metadata?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Twitter Sues for the Right to be More Transparent – Social Tech eDiscovery

Back in July, we took a look at Twitter’s Transparency Report to show government requests for data over the last six months of 2013 (we had previously looked at their very first report here).  However, because Twitter is barred by law from disclosing certain details on government surveillance requests, the Transparency Report is not as transparent as Twitter would like.  So, on Tuesday, Twitter filed suit against the FBI and the Justice Department, seeking the ability to release more detailed information on government surveillance of Twitter users.

As reported by The Huffington Post, Twitter is asking a judge for permission to publish its full transparency report, including the number of so-called “national security letters” and Foreign Intelligence Surveillance Act orders that it receives. Twitter claims that restrictions on its ability to speak about government surveillance requests are unconstitutional under the First Amendment.

“We’ve tried to achieve the level of transparency our users deserve without litigation, but to no avail,” Twitter said in a blog post announcing the lawsuit, which was filed in federal court.  “It’s our belief that we are entitled under the First Amendment to respond to our users’ concerns and to the statements of U.S. government officials by providing information about the scope of U.S. government surveillance – including what types of legal process have not been received. We should be free to do this in a meaningful way, rather than in broad, inexact ranges.

So, today, we have filed a lawsuit in federal court seeking to publish our full Transparency Report, and asking the court to declare these restrictions on our ability to speak about government surveillance as unconstitutional under the First Amendment. The Ninth Circuit Court of Appeals is already considering the constitutionality of the non-disclosure provisions of the NSL law later this week.”

Transparency reports are typically issued by companies to disclose numerous statistics related to requests for user data, records, and website content. These reports indicate the frequency and authority that governments request data or records over the given period. Due to the creation of these reports, the public may be informed of the private information governments gain access to via search warrants, court subpoenas and other methods.  Many other major communication platforms provide Transparency Reports as well, such as Facebook, LinkedIn, Google and Microsoft.

In Twitter’s most recent Transparency Report, they received 2,058 requests for information on its users over the previous six months from governments around the world – a 46 percent increase from 1,410 requests received the previous six months.  Over 61 percent of those requests (1,257 total) came from the US Government (Japan was next on the list with a mere 192 requests).

Twitter said it supports the USA Freedom Act of 2014, which was introduced earlier this year by Sen. Patrick Leahy (D-Vt.). The bill would allow for greater public reporting about government surveillance requests.

A copy of Twitter’s filed complaint can be found here.

So, what do you think?  Do you agree with Twitter that they deserve the right to greater transparency?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Denies Plaintiff’s Fallback Request for Meet and Confer after Quashing its Subpoena – eDiscovery Case Law

 

In Boston Scientific Corporation v. Lee, 1:13-cv-13156-DJC, (N.D. Cal., Aug 4, 2014), California Magistrate Judge Paul S. Grewal found time to preside over a case other than Apple v. Samsung and granted the motion to quash the plaintiff’s subpoena for the defendant’s laptops, refusing the plaintiff’s fallback position to meet and confer and referencing Leave it to Beaver in the process.

The defendant left the employment of the plaintiff and began working for a competitor, which caused the case to be filed against him, claiming theft of trade secrets and violation of a confidentiality agreement (by downloading confidential information onto a USB thumb drive).  The defendant’s new employer assigned him a laptop when he started his employment, which he used to both perform his job duties and communicate with his attorneys. Several weeks after the lawsuit was filed, the defendant’s employer segregated this laptop with a third party e-discovery vendor, and issued him a second one.

The defendant’s employer also produced forensic information about the contents of the first laptop to the plaintiff in the form of file listing reports, which disclose extensive metadata of the files contained on the laptop, USB reports, and web browsing history reports.  When the plaintiff pressed for more, the defendant’s employer offered to have an independent vendor review a full forensic image of the first laptop to search for pertinent information, including a review of any deleted files.  The plaintiff refused, requesting forensic discovery from both laptops and issued a subpoena, to which the defendant’s employer filed a motion to quash.

Judge Grewal began his order as follows:

“This case illustrates a recurring problem in all civil discovery, especially in intellectual property cases. A party demands the sun, moon and stars in a document request or interrogatory, refusing to give even a little bit. The meet and confer required by a court in advance of a motion is perfunctory at best, with no compromise whatsoever. But when the parties appear before the court, the recalcitrant party possesses newfound flexibility and a willingness to compromise. Think Eddie Haskell singing the Beaver's praises to June Cleaver, only moments after giving him the business in private. Having considered the arguments, the court GRANTS Nevro's motion to quash.”

Explaining his decision, Judge Grewal stated “No doubt there exists discoverable information on the two laptops, but by demanding nothing less than a complete forensic image of not just one but two laptops belonging to a direct competitor, Boston Scientific demands too much. Such imaging will disclose privileged communications related to the litigation as well as irrelevant trade secrets from a nonparty-competitor.  Boston Scientific's subpoena therefore seeks discovery of protected matter, something plainly not permitted under Rule 45, rendering the subpoena overbroad and imposing an undue burden on Nevro.”

Judge Grewal noted that the plaintiff “[a]s a fall back”, proposed what the defendant’s employer had originally proposed: the retention of an independent vendor to “review a full forensic image of the Initial Laptop to search for pertinent information, including a review of any deleted files.”  Judge Grewal closed the door on that request as well, stating “to allow Boston Scientific now to seek shelter from a fallback position that Nevro previously tendered in good faith would make a mockery of both parties' obligation to meet and confer in good faith from the start.  The time to tap flexibility and creativity is during meet and confer, not after.”

So, what do you think?  Should the plaintiff have been granted its fall back request or was it too late for compromise?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Privilege Not Waived on Defendant’s Seized Computer that was Purchased by Plaintiff at Auction – eDiscovery Case Law

In Kyko Global Inc. v. Prithvi Info. Solutions Ltd., No. C13-1034 MJP (W.D. Wash. June 13, 2014), Washington Chief District Judge Marsha J. Pechman ruled that the defendants’ did not waive their attorney-client privilege on the computer of one of the defendants purchased by plaintiffs at public auction, denied the defendants’ motion to disqualify the plaintiff’s counsel for purchasing the computer and ordered the plaintiffs to provide defendants with a copy of the hard drive within three days for the defendants to review it for privilege and provide defendants with a privilege log within seven days of the transfer.

In this fraud case, after several of the named defendants settled and confessed to judgment, the plaintiffs obtained a Writ of Execution in which the King County (Washington) Sheriff seized various items of personal property, including a computer owned by one of the defendants.  The computer was sold at a public auction, and an attorney for the plaintiffs outbid a representative sent by the defendants and purchased the computer.  The plaintiffs sent the computer to a third party for analysis and requested a ruling as to the admissibility of potentially attorney-client privileged documents contained on it, while the defendants contended the actions of the plaintiffs violated ethical rules, and requested that the plaintiffs return the computer to defendants, and also requested that the plaintiff’s attorneys should be disqualified from the case.

With regard to the plaintiff’s actions, Judge Pechman ruled that plaintiffs’ acquisition of the computer was not “inherently wrongful”, noting the plaintiffs’ claim that they had not reviewed the materials on the computer at the time of the motion.  She also determined that plaintiff’s “use of a third party vendor to make a copy of the hard drive is not equivalent to metadata mining of documents produced through the normal discovery process, because whereas the hard drive might plausibly contain many documents unprotected by any privilege, metadata mining is expressly aimed at the kind of information one would expect to be protected by attorney-client privilege and/or work-product protections”.  As a result, she denied the defendants’ motion to disqualify the plaintiff’s counsel.

As for the waiver of privilege, Judge Pechman used a balancing test to determine waiver “that is similar to Rule 502(b)”, which included these factors:

  1. the reasonableness of precautions taken to prevent disclosure,
  2. the amount of time taken to remedy the error,
  3. the scope of discovery,
  4. the extent of the disclosure, and
  5. the overriding issue of fairness.

Using the analogy of where “an opposing party discovers a privileged document in the other party’s trash”, Judge Pechman considered the potential waiver of privilege.  However, because the defendant stated in a declaration that she had “someone at her office” reformat the hard drive on the computer and install a new operating system and believed her documents had been erased and were not readily accessible, she related it “to the memo torn into 16 pieces than a document simply placed in a trash can without alteration”.

As a result, Judge Pechman determined that given “Defendants’ prompt efforts to remedy the error by filing a motion with the Court and the general sense that parties should not be able to force waiver of attorneyclient privilege through investigative activities outside the discovery process and a superior understanding of the relevant technology, the Washington balancing test weighs against waiver.”  She also and ordered the plaintiffs to provide defendants with a copy of the hard drive within three days for the defendants to review it for privilege and provide defendants with a privilege log within seven days of the transfer.

So, what do you think?  Were the plaintiff’s counsel actions ethical?  Should privilege have been waived?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Transparency Reports for Other Companies – Social Tech eDiscovery

Over the past couple of weeks, we’ve taken a fresh look at Twitter’s Law Enforcement Policies and their latest Transparency Report to show government requests for data, looked at (for the first time) LinkedIn’s Privacy and Law Enforcement Data Request Guidelines and Transparency Report and, yesterday, looked at Facebook’s policies and Government Request Reports.  Today, we will look at Transparency Reports for other companies.

Many other high profile companies also provide reports showing government requests for data, not just social media companies.  Some, like Google, provide a highly interactive report to navigate to various types of requests, ranging from government requests to remove data to requests for information about their users.  Others, like Apple, provide a simple one page letter with broad ranges of information requests and accounts affected (Apple’s latest letter is over a year old).  Some are current (through the end of 2013 at least), others have not been updated to reflect data since the end of 2012.  Evidently, some companies take transparency more seriously than others!  With that in mind, here are links to reports for various high profile technology companies where you might have data:

I tried to pull up the Transparency Report for Pinterest, but the link immediately redirects to their help page, so it’s only transparent if you can read really fast!

Obviously, in these modern times, our data (both personal and professional) is stored by a number of companies and law enforcement entities will request data from those companies for investigative purposes.  It’s a good idea to know how those companies respond to those requests and what rights you have as a customer.

So, what do you think?  Have you needed to request user information from any high profile technology companies for litigation purposes?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Facebook’s Policies and Government Request Reports – Social Tech eDiscovery

Two weeks ago, we took a fresh look at Twitter’s Law Enforcement Policies and their latest Transparency Report to show government requests for data, then last week (for the first time), we looked at LinkedIn’s Privacy and Law Enforcement Data Request Guidelines and Transparency Report.  This week, we’ll take a look at Facebook’s policies and Government Request Reports.

We originally looked at Facebook’s law enforcement policies back in 2010 – this policy was updated extensively by the time we looked at it again in 2012.  The good news is that the policy has remain largely unchanged since our last look – the main difference is the option to submit records requests online as well as via email, snail mail or fax (you still have to be a law enforcement officer to submit the request).

Facebook, similar to Twitter and LinkedIn, posts biannual Transparency Reports, however the company uniquely calls them “Global Government Request Reports”.  Facebook began publishing these reports last year, and posted the first one on June 30, 2013 for the first six months of 2013 – the latest report available is for the last six months of 2013.  The main page gives you an interactive map to click on to select a continent, then you can select a country for which get a specific report.  Or, you can download the entire report as a comma-separated values (.CSV) file to review all of the countries at once.

The downloaded entire report covers: 1) The countries that requested information from Facebook about their users, 2) The number of requests received from each of those countries, 3) The number of users/accounts specified in those requests, and 4) The percentage of these requests in which Facebook was required by law to disclose at least some data.  It also includes instances in which Facebook has removed content that governments have identified as illegal (e.g., posts denying the holocaust are illegal in Germany).  If you select the country individually via the interactive map, you also get a breakdown of the first three numbers for the types of requests (e.g., Search Warrant, Subpoena, Emergency Disclosures, Other).

In the latest report, the US had 12,598 requests for user data (44.8% of the total of 28,147 worldwide), referencing 18,715 user accounts (47.6% of the total of 39,320 worldwide) and some data was produced in 81.02% of the requests.  The next highest country was India (3,598 requests involving 4,711 accounts).  We’re number one!

Facebook, like other social media platforms, continues to push the US government to allow more transparency in releasing specific numbers and types of national security-related requests. Colin Stretch, Facebook’s General Counsel, made an all-encompassing comment about the topic: Government transparency and public safety are not mutually exclusive ideals. Each can exist simultaneously in free and open societies, and they help make us stronger. We strongly encourage all governments to provide greater transparency about their efforts aimed at keeping the public safe, and we will continue to be aggressive advocates for greater disclosure.”

You can get more information about the reports here and look at their FAQ page here.

What other sites have reports?  We’ll take a look at that tomorrow.

So, what do you think?  Have you needed to request information from Facebook for litigation purposes?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.