eDiscoveryDaily

Another Major eDiscovery Acquisition: DTI Acquires Fios – eDiscovery Trends

As reported by Law Technology News and the Litigation Support News and Information Blog, Document Technologies Inc. (DTI), the nation’s largest independent provider of discovery services, facilities management, and knowledge process outsourcing has acquired Fios Inc., one of the electronic discovery industry’s most recognized brands.  The new company will be known as “Fios, A DTI Company.”

Atlanta-based DTI said that Fios was purchased to gain clients and staff. Based in Portland, Ore. and founded in 1999 , Fios also brings software development skills and workflow expertise to the DTI portfolio.

“We felt the opportunity to bring Fios into the DTI family was quite attractive,” said DTI CEO John Davenport Jr. “They have exactly what we look for — an exceptional group of high-performing employees, a respected name, strong relationships with an impressive list of Am Law 100 and Fortune 500 corporate clients, and most importantly, similar values and corporate cultures.”

Terms of the current deal were not disclosed.  DTI has been busy this year – this is its third acquisition of the year, after acquiring Los Angeles computer forensics specialist Data Forté in July and Houston-based legal staffing company Provius in September.

Industry consolidation continues.  This latest acquisition makes at least 44 eDiscovery industry deals so far this year, with companies such as Applied Discovery, CaseCentral, Sanction Solutions, Lateral Data and Digital Reef having been acquired.  Of course, not all acquisitions work out, as we saw recently with the HP/Autonomy purchase.  It will be interesting to see how this acquisition works out and how well DTI integrates all of its recent acquisitions.

So, what do you think?  Will the accelerated pace of eDiscovery acquisitions continue?  If so, who’s next?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiff Hammered with Case Dismissal for “Egregious” Discovery Violations – eDiscovery Case Law

Apparently, destroying your first computer with a sledgehammer and using Evidence Eliminator and CCleaner on your second computer (when you have a duty to preserve both) are not considered to be best practices for preservation.  Who knew?  😉

In Taylor v. Mitre Corp., (E.D. Va. Nov. 8, 2012), Virginia District Court Judge Liam O’Grady upheld the findings by the Magistrate Judge for dismissal of the plaintiff’s claims and payment of the defendant’s reasonable attorney’s fees and costs due to “egregious” discovery conduct.  Here’s why:

  • The plaintiff hired counsel back in 2009 “in anticipation of bringing this lawsuit against Mitre for violations of the FMLA and failure to accommodate his disabilities.  Mr. Taylor’s lawyer immediately put him on clear notice that he was required to maintain all files and documents (electronic and otherwise) related to his claim, and that deleting or discarding such files could result in sanctions including dismissal of his claim.”;
  • The plaintiff filed his EEOC claim in November 2010;
  • Sometime in 2011, the plaintiff “wiped” his work desktop, then “took a sledgehammer to it” and disposed of it in the local landfill (as noted in the footnote: “Mr. Taylor has given varying accounts of the size and type of the hammer he used to wreck the computer, but does not deny that he smashed it with some nature of mallet.”);
  • Before destroying his work computer, the plaintiff “attempted” to back up files from it “but was only partially successful”;
  • In November 2011, the plaintiff filed his complaint;
  • On July 1, the Magistrate Judge “ordered Mr. Taylor to submit his current computer, a laptop, to inspection within a week.”  The plaintiff “had represented that whatever documents he maintained during the partially successful backup operation described above had been transferred to the laptop, and the Defendant won permission to inspect the laptop”;
  • A few days later, the defendant’s forensic expert examined the laptop and determined that the plaintiff had “run a program called Evidence Eliminator, a program whose express purpose is removing ‘sensitive material’ from one’s hard drive and defeating forensic software.”  The plaintiff admitted that “he downloaded the program the same day he learned of the Court’s inspection order”;
  • The plaintiff also ran another program CCleaner (which also erases files from the computer so that they cannot be recovered) “at least twice between the time of the Court’s inspection order and the actual inspection.”

The plaintiff claimed “that CCleaner was set to run automatically, and so even if it did delete relevant documents, the deletion was not intentional.” – a claim that the court found to be “highly suspicious”.  However, when it came to the installation of Evidence Eliminator, Judge O’Grady did not mince words:

“For Mr. Taylor to download and run a program whose express purpose is deletion of evidence in direct response to the Magistrate Judge’s order that his computer be produced for inspection was to blatantly disregard his duties in the judicial system under which he sought relief. The Court finds Mr. Taylor’s conduct to be egregious and highly contemptuous of the inspection order. Mr. Taylor has forfeited his right to pursue his claims with this Court any further.”

So, what do you think?  Is this the most egregious example of spoliation you’ve ever seen?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

The Grossman-Cormack Glossary of Technology Assisted Review – eDiscovery Resources

Do you know what a “Confidence Level” is?  No, I’m not talking about Tom Brady completing football passes in coverage.  How about “Harmonic Mean”?  Maybe if I hum a few bars?  Gaussian Calculator?  Sorry, it has nothing to do with how many Tums you should eat after a big meal.  No, the answer to all of these can be found in the new Grossman-Cormack Glossary of Technology Assisted Review.

Maura Grossman and Gordon Cormack are educating us yet again with regard to Technology Assisted Review (TAR) with a comprehensive glossary that defines key TAR-related terms and also provides some key case references, including EORHB, Global Aerospace, In Re: Actos:, Kleen Products and, of course, Da Silva Moore.  The authors of the heavily cited article Technology-Assisted Review in E-Discovery Can Be More Effective and More Efficient Than Exhaustive Manual Review have provided a new reference document that may help many in the industry understand key TAR concepts better.  Or, at least recognize key terms associated with TAR.  This is version 1.01, published just this month and clearly intended to evolve over time.  As the authors note in the Preamble:

“The introduction of TAR into the legal community has brought with it much confusion because different terms are being used to refer to the same thing (e.g., ‘technology assisted review,’ ‘computer-assisted review,’ ‘computer-aided review,’ ‘predictive coding,’ and ‘content based advanced analytics,’ to name but a few), and the same terms are also being used to refer to different things (e.g., ‘seed sets’ and ‘control sample’). Moreover, the introduction of complex statistical concepts, and terms-of-art from the science of information retrieval, have resulted in widespread misunderstanding and sometimes perversion of their actual meanings.

This glossary is written in an effort to bring order to chaos by introducing a common framework and set of definitions for use by the bar, the bench, and service providers. The glossary endeavors to be comprehensive, but its definitions are necessarily brief. Interested readers may look elsewhere for detailed information concerning any of these topics. The terms in the glossary are presented in alphabetical order, with all defined terms in capital letters.

In the future, we plan to create an electronic version of this glossary that will contain live links, cross references, and annotations. We also envision this glossary to be a living, breathing work that will evolve over time. Towards that end, we invite our colleagues in the industry to send us their comments on our definitions, as well as any additional terms they would like to see included in the glossary, so that we can reach a consensus on a consistent, common language relating to technology assisted review. Comments can be sent to us at mrgrossman@wlrk.com and gvcormac@uwaterloo.ca.”

Live links, with a Table of Contents, in a (hopefully soon) next iteration will definitely make this guide even more useful.  Nonetheless, it’s a great resource for those of us that have bandied around these terms for some time.

So, what do you think?  Will this glossary help educate the industry and help standardize use of the terms?  Or will it lead to one big “Confusion Matrix”? (sorry, I couldn’t resist)  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Sedona Conference Updates Guide for Judges – eDiscovery Trends

Last year, The Sedona Conference® made a public comments version of the Cooperation Proclamation: Resources for the Judiciary available on the Sedona Conference website. The Resources for the Judiciary document aims to provide judges with a foundation for creating a collaborative and non-adversarial approach to managing eDiscovery.  Now, its Judicial Resources guide has been updated and the free version is available on the Sedona Conference web site.

In addition to a Preface that outlines the Vision, Mission and Goal for the Resources, the guide includes the following sections:

  • I. Introduction: Discusses the difference between “active case management” (proactive) and “discovery management” (reactive), while urging judges to take an active case management model approach;
  • II. Review of Existing Literature on E-Discovery for Judges: A compilation of various resources for judges to become more familiar with eDiscovery, including everything from the 2006 amendments to the Federal Rules to local rules and pilot projects, such as the Model Order for Patent eDiscovery;
  • III. General Recommendations for Judges: A list of seven recommendations for how judges handle eDiscovery issues in their cases, along with supporting information and resources;
  • IV. The Stages of Litigation from a Judge’s Perspective: Sections for twenty different stages, ranging from Preservation to Post-Judgment Costs.

Creation of the new edition was led by senior editors Ronald Hedges (a retired magistrate judge from the U.S. District Court for the District of New Jersey, now a consultant) and Kenneth Withers (Sedona’s director of judicial education) with Karen Van Allen serving as editorial coordinator.  Judicial Reviewers were:

  • Hon. Ralph Artigliere, 10th Judicial Circuit Court, Florida (ret.)
  • Hon. John M. Facciola, U.S. Magistrate Judge, District of the District of Columbia
  • Hon. Peter Flynn, Circuit Court of Cook County, Illinois
  • Hon. Elizabeth D. Laporte, U.S. Magistrate Judge, Northern District of California
  • Hon. Elizabeth M. Schwabedissen, General Magistrate, 11th Judicial Circuit Court, Florida
  • Hon. Craig B. Shaffer, U.S. Magistrate Judge, District of Colorado

Apparently, the web site will also have a special password-protected collaboration area exclusively for judges to comment, suggest resources or even submit sample orders, enabling those judges to freely communicate without concern about eavesdropping from outside parties.  And, as always, to submit a public comment, you can download a public comment form here, complete it and fax (yes, fax) it to The Sedona Conference® at 928-284-4240.  You can also email a general comment to them at tsc@sedona.net.

So, what do you think?  Will this guide make for a smoother discovery process?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Perspective on the HP/Autonomy Fiasco – eDiscovery Trends

It’s not exactly Dr. Evil’s $100 billion, but it’s not “chump change” either…

By now, you’ve probably heard that, on Tuesday, Hewlett-Packard (HP) took an $8.8 billion charge resulting from its acquisition of Autonomy back in 2011, one of the largest acquisitions in the eDiscovery industry in history.  HP has called on US and British authorities to investigate what it called “serious accounting improprieties, disclosure failures and outright misrepresentations at Autonomy” before the acquisition in a developing scandal that also involves accounting firms Deloitte and KPMG, who audited the sale.

In a statement, HP said “HP is extremely disappointed to find that some former members of Autonomy’s management team used accounting improprieties, misrepresentations, and disclosure failures to inflate the underlying financial metrics of the company, prior to Autonomy’s acquisition by HP”.  The deal was brokered by former HP CEO Leo Apotheker and Autonomy founder Mike Lynch – both are no longer with HP.

Some notable stats:

  • The $8.8 billion charge is 85% of the widely reported $10.3 billion purchase price that HP paid for Autonomy in October 2011;
  • On Tuesday, HP’s shares traded down $1.74, or 13%, at $11.56 in morning trading – just after the open, they hit $11.35, the lowest level since 2002;
  • HP’s net loss for the fiscal fourth quarter (which ended Oct. 31) was $6.85 billion, compared with net income of $239 million in the same period in 2011.

For his part, Lynch fiercely denies allegations that Autonomy falsified its financial statements. In a statement to the Guardian on Tuesday, his spokesperson said: “HP has made a series of allegations against some unspecified former members of Autonomy Corporation PLC’s senior management team. The former management team of Autonomy was shocked to see this statement today, and flatly rejects these allegations, which are false…HP’s due diligence review was intensive, overseen on behalf of HP by KPMG, Barclays and Perella Weinberg. HP’s senior management has also been closely involved with running Autonomy for the past year…It took 10 years to build Autonomy’s industry-leading technology and it is sad to see how it has been mismanaged since its acquisition by HP.”

Additional articles discussing the HP/Autonomy controversy are available here, here, here and here.  As for what will become of HP and its Autonomy division (that previously acquired Zantaz, Interwoven and Iron Mountain, among others), remains to be seen.  Expect a long legal battle.

So, what do you think?  How will this affect future acquisitions of eDiscovery companies?  Will we all be working with the HP/Autonomy public domain data set someday?  😉  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Defendant Compelled to Produce Additional Discovery to Plaintiff – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

Where the facts of the case led a court to conclude that certain electronically stored information (ESI) could contain evidence relevant to the case, the court ordered a party to comply with its discovery obligations related to that ESI.

In Freeman v. Dal-Tile Corp., No. 5:10-CV-00522-BR, 2012 U.S. Dist. (E.D.N.C. Oct. 2, 2012), a case alleging harassment and discrimination, among other claims, against her former employer Dal-Tile Corporation, the plaintiff brought a motion to compel, asserting that some of the defendant’s discovery responses related to its search for ESI were deficient.

Specifically, the plaintiff sought to compel a keyword search of preserved e-mails belonging to certain individuals for a time frame that began two months after the plaintiff left Dal-Tile. The defendant objected, arguing that because the plaintiff had already left the company during the time frame for e-mails requested, any such e-mails “could not be relevant to Plaintiff’s harassment claims, because ‘the sole issue is whether Dal-Tile knew or should have known of the harassment and failed to take appropriate steps to halt it.’”

North Carolina Magistrate Judge William A. Webb disagreed, stating that it was “reasonable to expect” that e-mails written or received during that time period “could contain historical e-mails, i.e., an e-mail chain, given that the requested search period begins only two months after Plaintiff resigned.” Moreover, the plaintiff’s request hit the mark for other reasons: “The custodians whose e-mail Plaintiff requests to have searched are . . . the human resource officer who investigated Plaintiff’s complaints, and . . . the regional vice-president to whom [the human resources officer] reported her investigation findings.” In addition, the search terms that the plaintiff requested were “appropriately limited in number and scope and, thus, reasonably calculated to lead to the discovery of admissible evidence.”

Moreover, Judge Webb noted, Dal-Tile did “not assert[ ] that it would be unduly burdensome to search the e-mail[s requested]” or the hard drive of the human resources officer, a search of which the plaintiff had included in her request.

Therefore, the plaintiff’s motion was granted.

So, what do you think?  Should the plaintiff’s motion have been granted?  Please share any comments you might have or if you’d like to know more about a particular topic.

From All of Us at CloudNine Discovery and eDiscovery Daily, Happy Thanksgiving!  eDiscovery Daily will resume with new posts next Monday.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Rambus’ “Shred Days” Result in Sanctions Yet Again – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

By the way, the Rambus cases are among the most “famous” from an eDiscovery spoliation standpoint.  As you’ll see from the description below, Rambus is still paying for activities way back in 1998 that have been ruled to be spoliation of data.

In Hynix Semiconductor Inc. v. Rambus, Inc., No. C-00-20905 RMW, 2012 U.S. Dist. (N.D. Cal. Sept. 21, 2012), California District Judge Ronald Whyte used his discretion to fashion an appropriate fact-specific sanctions award after it found a party willfully destroyed evidence despite reasonably foreseeable litigation, it destroyed such evidence in bad faith, and the opposing party suffered prejudice.

In this discovery dispute over spoliation and sanctions in a patent lawsuit, the district court reconsidered this case after its previous decision was vacated by the Federal Circuit and remanded. Previously, in this court, Hynix Semiconductor Inc. et al. (Hynix) had “unsuccessfully urged” that Rambus, Inc. (Rambus) had engaged in the spoliation of evidence, and “its ‘unclean hands’ warranted dismissal of its patent infringement claims.” On appeal, however, the Federal Circuit remanded the case so that the district court could consider it under a different spoliation test, which had been applied in another case presenting an identical spoliation issue, Micron Technology, Inc. v. Rambus Inc., 645 F.3d 1311 (Fed. Cir. 2011) (Micron II).

Therefore, the court had to analyze whether “Rambus destroyed records at a time when litigation was reasonably foreseeable. If so, the court will determine whether Rambus acted in bad faith. Next, the court will determine the nature and extent of any prejudice suffered by Hynix as a result of the spoliation. Finally, the court will decide what sanction is appropriate, if any.”

The court found that Rambus engaged in spoliation of evidence when it destroyed documents on “Shred Days” in 1998, 1999, and 2000 when it invited an outside company to Rambus to shred documents that employees provided for shredding in accordance with the company’s document retention policy. The court found that on those Shred Days, litigation was reasonably foreseeable. Noting that the “important question” was not when Rambus’s duty to preserve arose, “but rather the binary question of whether litigation was reasonably foreseeable by the date on which documents were destroyed,” the court found that although litigation was not foreseeable when Rambus destroyed some of its back-up tapes in July 1998, it was reasonably foreseeable by the time of Shred Day 1998.

At the time the back-up tapes were destroyed in July, the court pointed to numerous questions that existed about the success of Rambus’s patented product and what features the existing patents covered. Management had only held hypothetical discussions about potential targets of litigation, and they had not discussed in depth budgeting for litigation. Destruction of back-up tapes was done “primarily” for “housekeeping” purposes.

By the time Shred Day 1998 occurred, however, Rambus “anticipated instituting litigation.” A Rambus officer, Joel Karp, whom the company hired in 1997 to assess whether competitors were infringing on Rambus’s patents, had advised employees of the company’s documentation retention policy, and “the fact that he advised them to discard documents that questioned the patentability of ideas suggests he had litigation on his mind.” Moreover, a litigation strategy was being “aggressively developed,” and Rambus was turning its attention heavily toward a certain part of its business, which it believed it had to fight to protect.

Thus, finding that Rambus had engaged in spoliation beginning with Shred Day 1998, the court turned to analyze whether Rambus acted with “unclean hands.” The court set forth the applicable standard: “To find bad faith in the spoliation context, ‘the district court must find that the spoliating party intended to impair the ability of the potential defendant to defend itself.’” While Rambus asserted that it conducted document destruction only to execute its “neutral” document retention policy, Hynix argued that regardless of Rambus’s compliance with its own document retention policy, Rambus knew litigation was reasonably foreseeable and destroyed documents in bad faith “to gain a litigation advantage.” In addition, Hynix argued that Karp ordered Rambus employees to destroy documents selectively, keeping ones that would protect their patents and destroying ones that would cause difficulty in litigation.

Parsing the evidence, the court found:

“Although the evidence does not support a conclusion that Rambus deliberately shredded documents it knew to be damaging, the court concludes that Rambus nonetheless spoliated evidence in bad faith or at least willfully. This conclusion is based upon the facts that: (1) Rambus destroyed records when litigation was reasonably foreseeable; (2) Karp, the officer in charge of the destruction, was experienced in litigation and undoubtedly knew that relevant documents should not be destroyed when litigation is reasonably foreseeable; (3) the destruction was part of a litigation plan; (4) one of the motives of the destruction was to dispose of potentially harmful documents; and (5) Rambus shredded a huge number of documents without keeping any records of what it was destroying.”

The court then turned to the issue of whether Rambus’s bad faith spoliation of evidence had prejudiced Hynix. The Micron II court set forth the applicable standard for evaluating prejudice: “‘Prejudice to the opposing party requires a showing that the spoliation materially affect[s] the substantial rights of the adverse party and is prejudicial to the presentation of his case.’ (citation omitted) ‘In satisfying that burden, a party must only come forward with plausible, concrete suggestions as to what [the destroyed] evidence might have been.’” Moreover, if the spoliation had already been determined to have been in bad faith, the spoliating party had a heavy burden to show its document destruction had not prejudiced the other party. Yet, the court cautioned, “the alleged misconduct by the spoliator . . . must relate directly to an issue concerning which the complaint is made.”

Here, Hynix had claimed that Rambus’s patents were invalid, and the court explained, “the invalidity defenses of anticipation and obviousness depend upon how one of ordinary skill in the art would have understood the prior art.” In this case, all prior art was accessible to Hynix and therefore the document destruction did not prejudice Hynix. The other defense of “inadequate written description” similarly turned on information that was available to Hynix. As such, the court found that Hynix’s invalidity defenses were not prejudiced by Rambus’s spoliation of evidence.

On the other hand, however, the court found that Rambus did not overcome Hynix’s allegations of prejudice based on its unenforceability complaint against Rambus. The court found that “it appear[ed] plausible that spoliated evidence might have shed additional light on the scope” of certain disclosure obligations that Rambus had with respect to its patents. Because this allegation offered a concrete suggestion for Hynix as to what the destroyed evidence could have been, Rambus had a heavy burden to disprove prejudice, which the court found it could not overcome.

Having concluded that Rambus “spoliated documents in bad faith and that Hynix has established prejudice,” the court then considered sanctions, noting it had “wide discretion whether to hold the patents-in-suit unenforceable pursuant to Hynix’s unclean hands defense, or to impose a different sanction.”

The court used the following analysis to evaluate the appropriateness of sanctions:

“In gauging the propriety of the sanction, the district court must take into account

“(1) the degree of fault of the party who altered or destroyed the evidence; (2) the degree of prejudice suffered by the opposing party; and (3) whether there is a lesser sanction that will avoid substantial unfairness to the opposing party and, where the offending party is seriously at fault, will serve to deter such conduct by others in the future.” (citation omitted) The sanction ultimately imposed must be commensurate with the analysis of these factors.”

In examining the Rambus’s degree of fault, the court found that

“Rambus’s fault was significant but not as great as that of a spoliator who knows of adverse evidence and specifically alters, hides or destroys that evidence. There is a possibility that Rambus did not destroy any evidence that would have been beneficial to Hynix’s litigation position. However, because Rambus is the party that destroyed documents by the box and bag without keeping any record of what was destroyed, Rambus must suffer the consequences of that uncertainty.”

Hynix’s degree of prejudice was significant, the court held, because it “was arguably prejudiced in its ability to litigate its equitable claims and defenses,” and if it had been able to better litigate them, it possibly could have avoided a royalty fee that was awarded against it based on a previous determination that Rambus’s patents were valid.

Therefore, the court “conclude[d] that the sanction most commensurate with Rambus’s conduct and [the fact that a royalty rate was previously awarded] is to strike from the record evidence supporting a royalty in excess of a reasonable, nondiscriminatory royalty. Such a remedy recognizes that Rambus’s patents have been determined to be valid while at the same time recognizing that Rambus’s spoliation of evidence should preclude it from entitlement to a royalty that places Hynix at a competitive disadvantage.” The court decided to use its discretion to fashion a sanction, noting that “a retrial of the case with either an adverse jury instruction or an evidentiary exclusion order would involve considerably more delay and expense,” and there had already been great delay in reaching a final determination in the case.

So, what do you think?  Was it appropriate to issue sanctions at this point and, if so, were they harsh enough?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Louisiana Order Dictates That the Parties Cooperate on Technology Assisted Review – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

In the case In re Actos (Pioglitazone) Products Liability Litigation, No. 6:11-md-2299, (W.D. La. July 27, 2012), a case management order applicable to pretrial proceedings in a multidistrict litigation consolidating eleven civil actions, the court issued comprehensive instructions for the use of technology-assisted review (“TAR”).

In an order entitled “Procedures and Protocols Governing the Production of Electronically Stored Information (“ESI”) by the Parties,” U.S. District Judge Rebecca Doherty of the Western District of Louisiana set forth how the parties would treat data sources, custodians, costs, and format of production, among others. Importantly, the order contains a “Search Methodology Proof of Concept,” which governs the parties’ usage of TAR during the search and review of ESI.

The order states that the parties “agree to meet and confer regarding the use of advanced analytics” as a “document identification mechanism for the review and production of . . . data.” The parties will meet and confer to select four key custodians whose e-mail will be used to create an initial sample set, after which three experts will train the TAR system to score every document based on relevance. To quell the fears of TAR skeptics, the court provided that both parties will collaborate to train the system, and after the TAR process is completed, the documents will not only be randomly sampled for quality control, but the defendants may also manually review documents for relevance, confidentiality, and privilege.

The governance order repeatedly emphasizes that the parties are committing to collaborating throughout the TAR process and requires that they meet and confer prior to contacting the court for a resolution.

So, what do you think?  Should more cases issue instructions like this?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Email Metadata Leads to Petraeus Resignation – eDiscovery Trends

As reported on by Megan Garber of The Atlantic, email location data led FBI investigators to discover CIA director David Petraeus’ affair with Paula Broadwell that led to his resignation.  The irony is that FBI investigators weren’t aware of, or looking for, information regarding the affair.  Here’s what happened, according to the article.

“Sometime in May, The New York Times reports, Broadwell apparently began sending emails to Jill Kelley, the Petraeus acquaintance (her precise connection to the family isn’t yet fully clear) — and those emails were “harassing,” according to Kelley. The messages were apparently sent from an anonymous (or, at least, pseudonymous) account. Kelley reported those emails to the FBI, which launched an investigation — not into Petraeus, but into the harassing emails.”

“From there, the dominoes began to fall. And they were helped along by the rich data that email providers include in every message they send and deliver — even on behalf of its pseudonymous users. Using the ‘metadata footprints left by the emails,’ the Wall Street Journal reports, ‘FBI agents were able to determine what locations they were sent from. They matched the places, including hotels, where Ms. Broadwell was during the times the emails were sent.’ From there, ‘FBI agents and federal prosecutors used the information as probable cause to seek a warrant to monitor Ms. Broadwell’s email accounts.’”

Once the investigators received that warrant, they “learned that Ms. Broadwell and Mr. Petraeus had set up private Gmail accounts to use for their communications, which included explicit details of a sexual nature, according to U.S. officials. But because Mr. Petraeus used a pseudonym, agents doing the monitoring didn’t immediately uncover that he was the one communicating with Ms. Broadwell.”

Ultimately, monitoring of Ms. Broadwell’s emails identified the link to Mr. Petraeus and the investigation escalated, despite the fact that the investigators “never monitored Mr. Petraeus’s email accounts”.

Needless to say, if the Director of the CIA can be tripped up by email metadata from an account other than his own, it could happen to anyone.  It certainly gives you an idea of the type of information that is discoverable not just from opposing parties, but third parties as well.

So, what do you think?  Have you ever identified additional sources of data through discovery of email metadata?  Please share any comments you might have or if you’d like to know more about a particular topic.

Thanks to Perry Segal’s e-Discovery Insights blog for the tip on this story!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Searching for Email Addresses Can Have Lots of Permutations Too – eDiscovery Best Practices

Tuesday, we discussed the various permutations of names of individuals to include in your searching for a more complete result set, as well as the benefits of proximity searching (broader than a phrase search, more precise than an AND search) to search for names of individuals.  Another way to identify documents associated with individuals is through their email addresses.

Variations of Email Addresses within a Domain

You may be planning to search for an individual based on their name and the email domain of their company (e.g., daustin@cloudnincloudnine.comm), but that’s not always inclusive of all possible email addresses for that individual.  Email addresses for an individual’s domain might appear to be straightforward, but there might be aliases or other variations to search for to retrieve emails to and from that individual at that domain.  For example, here are three of the email addresses to which I can receive email as a member of CloudNine Discovery:

To retrieve all of the emails to and from me, you would have to include all of the above addresses (and others too).  There are other variations you may need to account for, as well.  Here are a couple:

  • Jim Smith[/O=FIRST ORGANIZATION/OU=EXCHANGE ADMINISTRATIVE GROUP (GZEJCPIG34TQEMU)/CN=RECIPIENTS/CN=JimSmith] (legacy Exchange distinguished name from old versions of Microsoft Exchange);
  • IMCEANOTES-Andy+20Zipper_Corp_Enron+40ECT@ENRON.com (an internal Lotus Notes representation of an email address from the Enron Data Set).

As you can see, email addresses from the business domain can be represented several different ways, so it’s important to account for that in your searching for emails for your key individuals.

Personal Email Addresses

Raise your hand if you’ve ever sent any emails from your personal email account(s) through the business domain, even if it’s to remind you of something.  I suspect most of your hands are raised – I know mine is.  Identifying personal email accounts for key individuals can be important for two reasons: 1) those emails within your collection may also be relevant and, 2) you may have to request additional emails from the personal email addresses in discovery if it can be demonstrated that those accounts contain relevant emails.

Searching for Email Addresses

To find all of the relevant email addresses (including the personal ones), you may need to perform searches of the email fields for variations of the person’s name.  So, for example, to find emails for “Jim Smith”, you may need to find occurrences of “Jim”, “James”, “Jimmy”, “JT” and “Smith” within the “To”, “From”, “Cc” and “Bcc” fields.  Then, you have to go through the list and identify the email addresses that appear to be those for Jim Smith.  Any email addresses for which you’re not sure whether they belong to the individual or not (e.g., does jsmith1963@gmail.com belong to Jim Smith or Joe Smith?), you may need to retrieve and examine some of the emails to make that determination.  If he uses nicknames for his personal email addresses (e.g., huggybear2012@msn.com), you should hopefully be able to identify those through emails that he sends to his business account.

In its Email Analytics module, FirstPass® makes it easy to search for email addresses for an individual – simply go to Global Email Search and type in the string to retrieve all email addresses in the collection with that string.  It really streamlines the process of identifying email addresses for an individual and then reviewing those emails.

Whether or not your application simplifies that process, searching by email address is another way to identify documents pertaining to a key individual.  The key is making sure your search includes all the email addresses possible for that individual.

So, what do you think?  How do you handle searching for key individuals within your document collections?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.