eDiscoveryDaily

Appeals Court Reverses Terminating Sanctions Against Plaintiff for Deletion of Emails: eDiscovery Case Law

In Flagship Theatres of Palm Desert, LLC v. Century Theatres, Inc. et. al., No. B257148, Consolidated  with Nos. B259552 and B261149 (Cal. App., May 24, 2016), the Court of Appeals of California, Second District determined that the trial court “abused its discretion” by “granting terminating sanctions in a case in which the prejudice to the non-offending party can be ameliorated by a more limited remedy”.  As a result, the appeals court reversed the judgment and remanded it back to the trial court with a lesser sanction, prohibiting the plaintiff “from offering evidence of acts, events, or communications occurring during the period” when one of the plaintiffs deleted emails.

Case Background

In this antitrust suit, the plaintiffs, who operated a movie theater, claimed that the defendants had conspired to keep the most popular films from being distributed to the plaintiff’s theater and filed suit in 2006.  For the next two years, the case proceeded through discovery, and each side requested and received documents from the other. Most notably, in December 2006, one defendant served a set of requests for production in which it requested numerous categories of documents from the plaintiffs.  Ultimately, the plaintiffs voluntarily dismissed movie distributor defendants from the case, but added Cinemark as a defendant following Cinemark’s acquisition of Century.

From the date of production in 2007 until the trial court granted summary judgment in July 2008, no defendant moved for further production.  That summary judgment decision was reversed by the appellate court in 2011 and remanded back to the trial court for further proceedings.

In the summer of 2012, one of the plaintiffs (Tabor) began experiencing problems sending and receiving email from the AT&T account that he used for both personal and business email.  On the advice of an AT&T customer service representative, he deleted thousands of email messages to free up space, deleting the earliest emails up to February 19, 2009.  The plaintiffs then received another discovery request from the new defendant (Cinemark) requesting emails. Upon realizing that he had deleted items he had a duty to preserve, Tabor attempted to recover the emails but was unsuccessful. When Cinemark learned that Tabor had deleted the emails, it moved for sanctions. The trial court denied the motion because it was unable to fully evaluate the extent of prejudice to Cinemark. Subsequently, Cinemark renewed its motion for sanctions. This time, the trial court granted the motion and the plaintiff appealed.

Appellate Court’s Ruling

The court noted that “Cinemark likely suffered some prejudice, and it is entitled to a remedy to compensate for this prejudice. But the potential for prejudice is limited to the period between the spring of 2007 [the time period up to which the plaintiff had previous produced relevant ESI] and February 19, 2009 because the relevant emails outside that period, with some minor exceptions, were saved. Accordingly, the trial court abused its discretion by not limiting appropriate sanctions to the period between the spring of 2007 and February 19, 2009.”

The appellate court also disagreed with the trial court opinion that the plaintiffs “must be able to establish that they actually sought to license and play enough films to generate 40% of the cumulative box office grosses”, noting that the plaintiffs might have realized that distributors were unwilling to give them certain kinds of movies and simply stopped requesting them.  Because the appellate court determined that the deletion of emails outside of the 2007-2009 time frame was “small scale and innocuous”, it determined that there was no justification for additional sanctions.

As a result, the appellate court reversed the judgment and remanded it back to the trial court with a lesser sanction, prohibiting the plaintiff “from offering evidence of acts, events, or communications occurring during the period” between spring 2007 and February 19, 2009 (unless Cinemark offered evidence during that time period that was “more than nonsubstantive, peripheral, or foundational”, in which case, the plaintiffs could present evidence and seek damages pertaining to that time period).

So, what do you think?  Was the appellate court sanction a more appropriate remedy?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Here’s One Group of People Who May Not Be a Fan of Big Data Analytics: eDiscovery Trends

Most of us love the idea of big data analytics and how it can ultimately benefit us, not just in the litigation process, but in business and life overall.  But, there may be one group of people who may not be as big a fan of big data analytics as the rest of us: criminals who are being sentenced at least partly on the basis of predictive data analysis regarding the likelihood that they will be a repeat offender.

This article in the ABA Journal (Legality of using predictive data to determine sentences challenged in Wisconsin Supreme Court case, written by Sony Kassam), discusses the case of 34-year-old Eric Loomis, who was arrested in Wisconsin in February 2013 for driving a car that had been used in a shooting.  He ultimately pled guilty to eluding an officer and no contest to operating a vehicle without the owner’s consent. Loomis, a registered sex offender, was then sentenced to six years in prison because a score on a test noted he was a “high risk” to the community.

During his appeal in April, Loomis challenged the use of the test’s score, saying it violated his right to due process of law because he was unable to review the algorithm and raise questions about it.

As described in The New York Times, the algorithm used is known as COMPAS (Correctional Offender  Management Profiling for Alternative Sanctions).  Compas is an algorithm developed by a private company, Northpointe Inc., that calculates the likelihood of someone committing another crime and suggests what kind of supervision a defendant should receive in prison. The algorithm results come from a survey of the defendant and information about his or her past conduct.  Company officials at Northpointe say the algorithm’s results are backed by research, but they are “proprietary”. While Northpointe does acknowledge that men, women and juveniles all receive different assessments, the factors considered and the weight given to each are kept secret.

The secrecy and the use of different scales for men and women are at the heart of Loomis’ appeal, which an appellate court has referred to the Wisconsin Supreme Court, which could rule on the appeal in the coming days or weeks.

Other states also use algorithms, including Utah and Virginia, the latter of which has used algorithms for more than a decade.  According to The New York Times, at least one previous prison sentence involving Compas was appealed in Wisconsin and upheld.  And, algorithms have also been used to predict potential crime hot spots: Police in Chicago have used data to identify people who are likely to shoot or get shot and authorities in Kansas City, Mo. have used data to identify possible criminals.  We’re one step closer to pre-crime, folks.

So, what do you think?  Should algorithms that have a significant effect on people’s lives be secret?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Sanctions Plaintiff for Failing to Preserve Customer Communications: eDiscovery Case Law

Remember Matthew Enterprise, Inc. v. Chrysler Group, where court the granted the defendant’s motion to compel production from the plaintiff’s customer communications database?  Apparently, that production didn’t go so well…

In Matthew Enterprise, Inc. v. Chrysler Group, LLC, No. 13-cv-04236-BLF (N.D. Cal. May 23, 2016), California Magistrate Judge Paul S. Grewal, in one of his last orders before leaving the bench, determined that there was “no question that spoliation has occurred” and granted the defendant’s motion for sanctions for spoliation, “in its entirety, except for the proposed remedy”, opting for a middle ground between the parties’ proposals on what the remedy should be.

Case Background

In this price discrimination dispute between an auto manufacturer and its dealer (which does business as Stevens Creek Chrysler Jeep Dodge Ram), the defendant previously moved to compel the plaintiff to produce emails from the personal accounts of the plaintiff employees (because the plaintiff did not furnish all its employees with email accounts, many of them used their personal accounts for business purposes) and from the plaintiff’s customer communications database operated by an outside vendor.  In December 2015, the court denied the motion with respect to the personal emails but granted the motion with respect to the customer communications database, noting that the plaintiff did have control of that data, having already produced data from this source (we covered that ruling here).

After further investigation, however, the plaintiff discovered that it simply had very few documents to produce.  For example, “around June or July 2013, [the plaintiff] changed email vendors for its corporate-assigned email accounts” and “did not retain…the emails contained on the previous email system.”  In addition, because the outside vendor that maintains and operates the plaintiff’s customer communications database automatically deletes “all records of communication; inbound/outbound email, read receipt notifications and manually entered notes by a dealership representative” after 25 months, effectively all customer communications from the period at issue were lost irretrievably when the plaintiff reached out for that data in July 2015.  The parties did not dispute that the duty to preserve documents attached when the plaintiff sent a litigation threat letter in August 1, 2012.

As a result, the defendant filed an instant motion for sanctions for spoliation, seeking an order precluding the plaintiff from offering testimony or interrogatory responses relating to several topics, including those related to diversion and the effect of the defendant’s incentive program on the plaintiff’s decision to raise prices in August 2012.

Judge’s Ruling

Judge Grewal began his order with the following statement:

“The rules governing parties’ duties to preserve data do not demand perfection. Only when a party should have preserved electronically stored information ‘in the anticipation or conduct of litigation’ and when that party ‘failed to take reasonable steps to preserve it’ may a court order corrective measures.  The standard is an attainable one.”

With regard to the plaintiff’s steps to preserve the information, Judge Grewal stated “There is no question that spoliation has occurred. Stevens Creek does not dispute that it should have preserved the emails and the AVV communications. Stevens Creek took literally no action to preserve the information. And, despite Stevens Creek’s belated best efforts, these communications are lost forever.”

As for whether that spoliation prejudiced the defendant, Judge Grewal noted that “Stevens Creek’s lackadaisical attitude towards document preservation took away” the opportunity for the defendant to ask the jury to decide whether its anecdotal evidence undercut the plaintiff’s statistical evidence.  Because of that, Judge Grewal determined that “[n]ot only has spoliation occurred, but it also has prejudiced Chrysler.”

With regard to the remedy, Judge Grewal opted for a “middle ground” between what the defendant requested (noting that “precluding evidence on diversion would effectively decide the case for Chrysler”) and what the plaintiff proposed “allowing Chrysler to introduce communications, subject to the Federal Rules of Evidence, post-dating the alleged price discrimination period as if they came from that period itself.”  Judge Grewal did adopt the plaintiff’s suggestion, but also ordered that the defendant would be allowed to present evidence regarding the plaintiff’s spoliation when the plaintiff offered certain testimony, that the presiding judge would be allowed to “giv[e] the jury instructions to assist in its evaluation of such evidence or argument,” and that the defendant would be awarded “reasonable attorney’s fees” incurred in bringing the motion.

So, what do you think?  Did the court go far enough with its sanctions of the plaintiff?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Is Search Still Important in eDiscovery? I Say Yes: eDiscovery Best Practices

With the acceptance of predictive coding and other technology assisted review mechanisms growing over the past few years, some feel that keyword search is no longer important as a “key” (pun intended) component of the eDiscovery process.  In a new article published last week, I discussed why search is so important in eDiscovery and why law firms and e-discovery companies need better search solutions.

In Inside Counsel (3 reasons e-discovery companies needs better search solutions), the author (Amanda Cicatelli) sat down with me and also with Jeff Nace, VP of Product Management at ONE Discovery Inc. to discuss these and other topics regarding search in eDiscovery.  Both CloudNine and ONE Discovery (along with several other eDiscovery providers) are customers of dtSearch, a text retrieval engine which is embedded in many of the eDiscovery software platforms available on the market today.  I have personally used dtSearch with a handful of different eDiscovery platforms and it is ideal for supporting even very large multi-million document, multi-terabyte collections with effective and fast information retrieval.

Let’s face it, with the total amount of data being captured and stored by organizations doubling every 1.2 years, the ability to quickly and effectively search through data stores that are growing exponentially has become more important than ever to meet discovery obligations within reasonable costs.  Effective search solutions help manage and control discovery costs to help litigants stay within reasonable budgets.

In the article, Nace and I talk about the reasons that companies need effective search solutions, the recurring problems with eDiscovery and ways to address the issues that companies face when trying to manage the growing sizes and sources of electronically stored information (ESI) out there.  Thanks to Inside Counsel and Amanda Cicatelli for the opportunity to discuss the state of eDiscovery searching today and thanks as well as the folks at dtSearch for coordinating the interview!

You can check out the article here.

So, what do you think?  How effectively does your eDiscovery platform search through large collections of ESI?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Settles Dispute Between Parties on Number of Custodians to Search and Produce: eDiscovery Case Law

In Family Wireless #1, LLC et. al. v. Automotive Technologies, Inc., No. 15-01310 (D. Conn., May 19, 2016), Connecticut Magistrate Judge Sarah A. L. Merriam partially granted the plaintiff’s motion to compel the defendant to search and produce ESI from additional custodians, finding that “three of the six proposed custodians’ files are likely to include information relevant to this matter, and defendant has not met its burden of showing that inclusion of these three individuals would be unduly burdensome”.

Case Background

In this action for breach of contract, misrepresentation, unjust enrichment, and unfair trade practices between a franchisor and its franchisee, the parties met and conferred multiple times over the course of this litigation in an effort to come to a mutually agreeable list of ESI search terms and custodians.  The parties agreed to the search of the electronic files of seven custodians, but failed to agree on six additional custodians, leading to the plaintiff’s motion to compel.

The plaintiffs requested the inclusion of six additional custodians in the ESI search, arguing that, even though they were lower level employees, they “are believed to have been involved in both decision making and day to day operations relevant to the claims and defenses raised in the litigation”.  The defendants argued that a search of the emails of these individuals was duplicative and would not produce any relevant information that has not already been exchanged and that searching the files of the additional custodians would be overly burdensome, resulting in tens of thousands of additional documents and hours of costly review, partly based on a test search of two of the proposed custodians that “captured 51,583 e-mail family hits” to be reviewed for relevance.

Judge’s Ruling

Judge Merriam stated that she was “not persuaded that the addition of the six proposed custodians would be unduly burdensome for defendant. As defendant acknowledged during the conference, limitations on search parameters can be implemented so as to exclude the production of duplicative emails, addressing the concern that this production would consist of many emails that had been previously produced through the prior searches of the higher-level custodians. Using ‘de-duplication’ measures to limit the search should alleviate some of the cost and time concerns that defendant raises.”  Judge Merriam also was not swayed by the defendant’s arguments regarding relevance, indicating that “[t]he mere fact that many documents have already been produced is not sufficient to establish that there are no other relevant materials to be found.”

However, while Judge Merriam found “that plaintiffs have established good cause for expanding the ESI search to include three additional custodians”, she found that “no showing of good cause has been made by plaintiffs to search the ESI of the other three proposed custodians” during the in-person Discovery Conference the Court held to discuss the issues.  Therefore, Judge Merriam partially granted the plaintiff’s motion to compel the defendant to search and produce ESI from three additional custodians.

So, what do you think?  Should the court have ordered production from all six custodians?  Or was a partial production appropriate?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Determines Granting Defendant’s Motion to Request Overseas Documents is ‘Futile’: eDiscovery Case Law

In Al-Ameri et. al. v. Johns Hopkins Hospital, No. GLR-15-1163 (D.Md. May 26, 2016), Maryland Magistrate Judge Stephanie A. Gallagher denied the defendant’s motion to compel on the basis that compelling the discovery sought would be futile.

Case Background

In this medical malpractice case, the defendant served the plaintiffs with its discovery requests in July 2015.  Although the plaintiffs responded to the defendant’s interrogatories and document requests in October 2015, the defendant contended that the response was insufficient, with all of the disputed discovery requests seek documents that are located in the United Arab Emirates (UAE).

The plaintiffs did not challenge the relevance of the supplemental discovery sought, the defendant’s entitlement to the discovery sought, or that the plaintiffs’ heretofore-provided documents were not sufficiently responsive to the defendant’s requests. Instead, the plaintiffs indicated that they had made good faith efforts to obtain the requested documents from relevant entities in the UAE, but to no avail so far.  The plaintiffs even provided the defendant with authorizations to independently obtain the medical records from the UAE facilities, with plaintiffs’ counsel maintaining that it had “made numerous efforts” to produce itemized lien information from both the UAE hospitals and the UAE embassy.  Nonetheless, after conferring with plaintiffs’ counsel to address the purported deficiencies in the production, the defendant filed an instant motion to compel production.

Judge’s Ruling

Regarding the motion, Judge Gallagher stated:

“The so-called ‘discovery dispute’ regarding these document requests, then, is not really a dispute at all. Plaintiffs concede that they must produce the existing requested documents, but the fact remains that, for over a year, they have tried, and failed, to do so. Thus, as discussed during the status conference call, there is no reason to grant Defendant’s motion as to Requests Nos. 4, 5, 20, and 21, since doing so would be futile. Plaintiffs are not engaging in gamesmanship or withholding information. They acknowledge that the documents are crucial to the case, but are presently unable to obtain them. Compelling these documents would not suddenly change Plaintiffs’ situation or make the documents producible.”  As a result, Judge Gallagher denied the defendant’s motion because compelling the discovery would be futile.

So, what do you think?  Was the court correct to deny the motion?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Is a Blended Document Review Rate of $466 Per Hour Excessive?: Best of eDiscovery Daily

Even those of us at eDiscovery Daily have to take an occasional vacation (which, as you can see by the picture above, means taking the kids to their favorite water park); however, instead of “going dark” for a few days, we thought we would take a look back at some topics that we’ve covered in the past.  Today’s post is our all-time most viewed post ever.  I guess it struck a nerve with our readers!  Enjoy!

______________________________

Remember when we raised the question as to whether it is time to ditch the per hour model for document review?  One of the cases we highlighted for perceived overbilling was ruled upon here.

In the case In re Citigroup Inc. Securities Litigation, No. 09 MD 2070 (SHS), 07 Civ. 9901 (SHS) (S.D.N.Y. Aug. 1, 2013), New York District Judge Sidney H. Stein rejected as unreasonable the plaintiffs’ lead counsel’s proffered blended rate of more than $400 for contract attorneys—more than the blended rate charged for associate attorneys—most of whom were tasked with routine document review work.

In this securities fraud matter, a class of plaintiffs claimed Citigroup understated the risks of assets backed by subprime mortgages. After the parties settled the matter for $590 million, Judge Stein had to evaluate whether the settlement was “fair, reasonable, and adequate and what a reasonable fee for plaintiffs’ attorneys should be.” The court issued a preliminary approval of the settlement and certified the class. In his opinion, Judge Stein considered the plaintiffs’ motion for final approval of the settlement and allocation and the plaintiffs’ lead counsel’s motion for attorneys’ fees and costs of $97.5 million. After approving the settlement and allocation, Judge Stein decided that the plaintiffs’ counsel was entitled to a fee award and reimbursement of expenses but in an amount less than the lead counsel proposed.

One shareholder objected to the lead counsel’s billing practices, claiming the contract attorneys’ rates were exorbitant.

Judge Stein carefully scrutinized the contract attorneys’ proposed hourly rates “not only because those rates are overstated, but also because the total proposed lodestar for contract attorneys dwarfs that of the firm associates, counsel, and partners: $28.6 million for contract attorneys compared to a combined $17 million for all other attorneys.” The proposed blended hourly rate was $402 for firm associates and $632 for firm partners. However, the firm asked for contract attorney hourly rates as high as $550 with a blended rate of $466. The plaintiff explained that these “contract attorneys performed the work of, and have the qualifications of, law firm associates and so should be billed at rates commensurate with the rates of associates of similar experience levels.” In response, the complaining shareholder suggested that a more appropriate rate for contract attorneys would be significantly lower: “no reasonable paying client would accept a rate above $100 per hour.” (emphasis added)

Judge Stein rejected the plaintiffs’ argument that the contract attorneys should be billed at rates comparable to firm attorneys, citing authority that “clients generally pay less for the work of contract attorneys than for that of firm associates”:

“There is little excuse in this day and age for delegating document review (particularly primary review or first pass review) to anyone other than extremely low-cost, low-overhead temporary employees (read, contract attorneys)—and there is absolutely no excuse for paying those temporary, low-overhead employees $40 or $50 an hour and then marking up their pay ten times for billing purposes.”

Furthermore, “[o]nly a very few of the scores of contract attorneys here participated in depositions or supervised others’ work, while the vast majority spent their time reviewing documents.” Accordingly, the court decided the appropriate rate would be $200, taking into account the attorneys’ qualifications, work performed, and market rates.

For this and other reasons, the court found the lead counsel’s proposed lodestar “significantly overstated” and made a number of reductions. The reductions included the following amounts:

  • $7.5 million for document review by contract attorneys that happened after the parties agreed to settle; 20 of the contract attorneys were hired on or about the day of the settlement.
  • $12 million for reducing the blended hourly rate of contract attorneys from $466 to $200 for 45,300 hours, particularly where the bills reflected that these attorneys performed document review—not higher-level work—all day.
  • 10% off the “remaining balance to account for waste and inefficiency which, the Court concludes, a reasonable hypothetical client would not accept.”

As a result, the court awarded a reduced amount of $70.8 million in attorneys’ fees, or 12% of the $590 million common fund.

So, what do you think?  Was the requested amount excessive?   Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Can You Figure Out How I Wrote this Blog Post?: Best of eDiscovery Daily

Even those of us at eDiscovery Daily have to take an occasional vacation (which, as you can see by the picture above, means taking the kids to their favorite water park); however, instead of “going dark” for a few days, we thought we would take a look back at some topics that we’ve covered in the past.  Today’s post takes a look back at a little experiment I performed (which was two phones ago for me, by the way).  Enjoy!

______________________________

I have to be honest, this blog post contains quite a bit of content from one of the early posts from this blog.  However, there is something different about this version of the content – it looks a bit unusual.  Can you figure out how I wrote it?  See if you can figure it out before you get to the bottom.  I promise I haven’t lost my mind.

Types of exceptions file

It’s important to note that efforts to quote fix quote these files will often change the files parentheses and the meta data associated with them parentheses, so it’s important to establish with opposing counsel what measures to address the exceptions are acceptable. Some files may not be recoverable and you need to agree up front how far to go to attempt to recover them.

  • Corrupted files colon files can become corrupted 4 a variety of reasons, from application failures 2 system crashes to computer viruses. I recently had a case where 40 percent of the collection what’s contained in to corrupt Outlook PST file dash fortunately, we were able to repair those files and recover the messages. If you have read Lee accessible backups of the files, try to restore them from backup. If not, you will need to try using a repair utility. Outlook comes with a utility called scan PST. Exe that scans and repairs PST and OST file, and there are utilities parenthesis including freeware utilities parenthesis available via the web foremost file types. If all else fails, you can hire a-data recovery expert, but that can get very expensive.
  • Password protected files colon most collections usually contain at least some password protected files. Files can require a password to enable them to be edited, or even just to view them. As the most popular publication format, PDF files are often password protected from editing, but they can still be feud 2 support review parenthesis though some search engines May fail to index them parenthesis. If a file is password protected, you can try to obtain the password from the custodian providing the file dash if the custodian is unavailable or unable to remember the password, you can try a password cracking application, which will run through a series of character combinations to attempt to find the password. Be patient, it takes time, and doesn’t always succeed.
  • Unsupported file types corn in most collections, there are some unusual file types that art supported by the review application, such as file for legacy or specialized applications parenthesis E. G. AutoCAD for engineering drawing parenthesis. You may not even initially no what type of files they are semi colon if not, you can find out based on file extension by looking the file extension up in file ext. If your review application can’t read the file, it also can’t index the files for searching or display them 4 review. If those file maybe responses 2 discovery requests, review them with the natives application to determine they’re relevancy.
  • No dash text file colon files with no searchable text aren’t really exceptions dash they have to be accounted for, but they won’t be retrieved in searches, so it’s important to make sure they don’t quote slip through the cracks unquote. It’s common to perform optical character recognition parenthesis Boosie are parenthesis on Tiff files and image only PDF files, because they are common document 4 minutes. Other types of no text files, such as pictures in JTAG or PNG format, are usually not oser, unless there is an expectation that they will have significant text.

Did you figure it out?  I “dictated” the above content using speech-to-text on my phone, a Samsung Galaxy 3 (yes, that was three years and four versions ago, I will have to update the “experiment” soon to see if the speech-to-text is any better now on my Apple iPhone 6).  I duplicated the formatting from the earlier post, but left the text the way that the phone “heard” it.  Some of the choices it made were interesting: it understands “period” and “comma” as punctuation, but not “colon”, “quote” or “parenthesis”.  Words like “viewed” became “feud”, “readily” became “read Lee” and “OCR” became “Boosie are”.  It also often either dropped or added an “s” to words that I spoke.

These days, more ESI is discoverable from sources that are non-formalized, including texts and “tweets”.  Acronyms and abbreviations (and frequent misspelling of words) is common in these data sources (whether typed or through bad dictation), which makes searching them for responsive information very challenging.  You need to get creative when searching these sources and use mechanisms such as conceptual clustering to group similar documents together, as well as stemming and fuzzy searching to find variations and misspellings of words.

Want to see the original version of the post?  Here it is.

So, what do you think?  How do you handle informal communications, like texts and “tweets”, in your searching of ESI?   Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Data May Be Doubling Every Couple of Years, But How Much of it is Original?: Best of eDiscovery Daily

Even those of us at eDiscovery Daily have to take an occasional vacation (which, as you can see by the picture above, means taking the kids to their favorite water park); however, instead of “going dark” for a few days, we thought we would take a look back at some topics that we’ve covered in the past.  Today’s post takes a look back at the challenge of managing duplicative ESI during eDiscovery.  Enjoy!

______________________________

According to the Compliance, Governance and Oversight Council (CGOC), information volume in most organizations doubles every 18-24 months (now, it’s more like every 1.2 years). However, just because it doubles doesn’t mean that it’s all original. Like a bad cover band singing Free Bird, the rendition may be unique, but the content is the same. The key is limiting review to unique content.

When reviewers are reviewing the same files again and again, it not only drives up costs unnecessarily, but it could also lead to problems if the same file is categorized differently by different reviewers (for example, inadvertent production of a duplicate of a privileged file if it is not correctly categorized).

Of course, we all know the importance of identifying exact duplicates (that contain the exact same content in the same file format) which can be identified through MD5 and SHA-1 hash values, so that they can be removed from the review population and save considerable review costs.

Identifying near duplicates that contain the same (or almost the same) information (such as a Word document published to an Adobe PDF file where the content is the same, but the file format is different, so the hash value will be different) also reduces redundant review and saves costs.

Then, there is message thread analysis. Many email messages are part of a larger discussion, sometimes just between two parties, and, other times, between a number of parties in the discussion. To review each email in the discussion thread would result in much of the same information being reviewed over and over again. Pulling those messages together and enabling them to be reviewed as an entire discussion can eliminate that redundant review. That includes any side conversations within the discussion that may or may not be related to the original topic (e.g., a side discussion about the latest misstep by Anthony Weiner).

Clustering is a process which pulls similar documents together based on content so that the duplicative information can be identified more quickly and eliminated to reduce redundancy. With clustering, you can minimize review of duplicative information within documents and emails, saving time and cost and ensuring consistency in the review. As a result, even if the data in your organization doubles every couple of years, the cost of your review shouldn’t.

So, what do you think? Does your review tool support clustering technology to pull similar content together for review? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

No Victory Laps on Social Media: eDiscovery Trends

This is the second time this month I’ve covered a “social media gone wrong” story (here was the previous story I covered), but I just couldn’t ignore this story.

As covered by the ABA Journal (Clients drop firm after lawyer uses Twitter to celebrate ‘win’ against parents of disabled children, written by Martha Neil), a British law firm suffered a sudden loss of business over the last few days, after a series of tweets by a founding partner who serves as its managing director ignited a firestorm.

Mark Small of Baker Small heads a law firm known for its leading niche representation of local government councils defending against claims by parents seeking “special educational needs” funding for disabled children.  However, Small was perceived as “gloating” over a lack of funding for disabled children by a number of observers. They pointed to a tweet about “a great ‘win’ last week which sent some parents into a storm!” and a tweet apparently responding to criticism that included a photo of a kitten and said Baker had received “great tweets” and had “just shared them with my cat,” the newspaper reports.

By Sunday, with parents lobbying their own local authorities not to hire Baker Small again, the firm began to apologize for the tweets that upset the parents, deleting the tweets and flooding its Twitter feed with re-tweets that supported parents.

However, it may already be too late to reverse the damage.  At least eight local authorities, nearly half of the twenty represented by Baker Small in special-education cases have said they have either suspended their contracts with the firm or said they intend to do so, the Guardian reports.

When it comes to the ability to reach the world through social media posts, it’s important to remember that with great power comes great responsibility.  Victory laps on social media are often not a good idea.  Just ask this daughter of a laid off school administrator who told the world on Facebook to “SUCK IT”, costing her father an $80,000 discrimination settlement.

So, what do you think?  Have you ever made a social media post that you regretted?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.