eDiscoveryDaily

eDiscovery Case Law: Court Denies Criminal Defendant’s Attempt to Quash Twitter Subpoena

 

In People v. Harris, 2011NY080152 (N.Y. Crim. Ct. Apr. 20, 2012), Criminal Court Judge Matthew A. Sciarrino, Jr. ruled that the defendant lacked standing to move to quash the prosecution’s subpoena served upon Twitter, a third-party in the case, for records of the defendant’s Twitter account. The defendant was a protester arrested during a march on the Brooklyn Bridge as part of the Occupy Wall Street movement, and in prosecuting the case, the prosecution sought his Twitter records for the time period relevant to the defendant’s involvement in the march.

In denying the defendant’s motion to quash, Judge Sciarrino analogized a subpoena issued to a third-party online social networking service like Twitter to one issued against a bank for a bank customer’s account information. The judge noted that in such bank cases a customer has “no proprietary or possessory interests” in his bank records, as they are the business records of the bank. Similarly, here, when the defendant signed up for Twitter, he agreed to certain terms, including a license that he granted to Twitter to “use, display and distribute” his Tweets. “Twitter’s license to use the defendant’s Tweets means that the Tweets the defendant posted were not his,” and therefore he had no proprietary interest in the Tweets.

Judge Sciarrino also acknowledged that although the defendant’s belief that he had a privacy interest in his own Tweets was “understandable,” it was “without merit.” The court pointed out that the “very nature and purpose” of Twitter is to help its users share information instantaneously with the world. Although a user may believe the Fourth Amendment should provide him online the same protection he would receive in his physical home, he is mistaken: Twitter users "may think that the same 'home' principle may be applied to their Twitter account. When in reality the user is sending information to the third party, Twitter. At the same time the user is also granting a license for Twitter to distribute that information to anyone, any way and for any reason it chooses."

Judge Sciarrino also denied the defendant’s motion to intervene in proceedings to quash the prosecution’s subpoena. It also found that the court is “compelled to evaluate the subpoena under federal laws governing internet communications,” that is, the Stored Communications Act; as such, the subpoena was proper because the defendant had a required hearing and notice, the information sought was relevant and material to the case, and the subpoena was not overly broad in its request.

So, what do you think?  Did the judge make the right call or should the defendant have been able to quash the subpoena?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: EDRM and Statistical Sampling

 

I’ve been proud to be a member of The Electronic Discovery Reference Model (EDRM) for the past six years (all but the first year) and I’m always keen to report on activities and accomplishments of the various working groups within EDRM.  Since this blog was founded, we’ve reported on 1) the unveiling of the EDRM Data Set, which has become a standard for useful eDiscovery test and demo data, 2) the EDRM Metrics Privilege Survey (which I helped draft), to collect typical volumes and percentages of privileged documents throughout the industry, 3) Model Code of Conduct which focuses on the ethical duties of eDiscovery service providers, and 4) the collaboration between EDRM and ARMA and subsequent joint Information Governance white paper.  EDRM’s latest announcement yesterday is a new guide, Statistical Sampling Applied to Electronic Discovery, which is now available for review and comment. 

As EDRM notes in their announcement, “The purpose of the guide is to provide guidance regarding the use of statistical sampling in e-discovery contexts. Most of the material is definitional and conceptual, and is intended for a broad audience. The later material and the accompanying spreadsheet provide additional information, particularly technical information, to people in e-discovery roles who become responsible for developing further expertise in this area.”

The Guide is comprised of six sections, as follows:

  1. Introduction: Includes basic concepts and definitions, alludes to mathematical techniques to be discussed in more detail in subsequent sections, identifies potential eDiscovery situations where sampling techniques may be useful and identifies areas not covered in this initial guide.
  2. Estimating Proportions within a Binary Population: Provides some common sense observations as to why sampling is useful, along with a straightforward explanation of statistical terminology and the interdependence of sample size, margin of error/confidence range and confidence level.
  3. Guidelines and Considerations: Provides guidelines for effective statistical sampling, such as cull prior to sampling, account for family relationships, simple vs. stratified random sampling and use of sampling in machine learning, among others.
  4. Additional Guidance on Statistical Theory: Covers mathematical concepts such as binomial distribution, hypergeometric distribution, and normal distribution.  Bring your mental “slide-rule”!
  5. Examples Using the Accompanying Excel Spreadsheet: Describes an attached workbook (EDRM Statistics Examples 20120427.xlsm) that contains six sheets that include a notes section as well as basic, observed and population normal approximation models and basic and observed binomial methods to assist in learning these different sampling methods.
  6. Validation Study: References a Daegis article that provides an empirical study of sampling in the eDiscovery context.  In addition to that article, consider reading our previous posts on determining an appropriate sample size to test your search, how to generate a random selection and a practical example to test your search using sampling.

Comments can be posted at any of the EDRM Statistical Sampling pages, or emailed to the group at mail@edrm.net.  As a big proponent of statistical sampling as an effective and cost-effective method for verifying results, I’m very interested to see where this guide goes and how people will use it.  BTW, EDRM’s Annual Kickoff Meeting is next week (May 16 and 17) in St. Paul, MN – it’s not too late to become a member and help shape the future of eDiscovery with other industry leaders!

So, what do you think?  Do you perform statistical sampling to verify results within your eDiscovery process?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: No Race Tires on This Vehicle, Taxation of eDiscovery Costs Granted

 

The trend for defendants requesting plaintiffs to be responsible for eDiscovery costs when they lose is continuing.  Sometimes that request is granted, at least partially, as in this case and this case.  In another case, taxation of eDiscovery costs was initially granted, but then reversed due to the parties' agreement to split the costs.  Then, there’s the case of Race Tires America, Inc. v. Hoosier Racing Tire CorporationLast May, the winning defendants were awarded $367,000 as reimbursement for eDiscovery costs.  (Hoosier Daddy!)  But, then in March of this year, an appellate court reversed all but $30,370 of those costs, implementing a narrow interpretation of 28 U.S.C. § 1920(4) for assigning those costs.  Now, a new case addresses the issue of taxation of costs once again.

In the case In re Online DVD Rental Antitrust Litig., No. M 09-2029 PJH, (N.D. Cal. Apr. 20, 2012), a federal court recently broadly interpreted the language in the federal statute governing the taxation of costs, 28 U.S.C. § 1920(4).

In this class action involving claims that Netflix had reached an agreement with Walmart to divide the market for sales and online rentals of DVDs, Netflix won summary judgment and filed a motion seeking to recover its costs, including those relating to eDiscovery. After the clerk awarded the costs, the plaintiff subscribers filed a motion with the court seeking review of the award.

In denying the plaintiffs’ request to limit the costs, the court rejected the Third Circuit’s narrow view of 28 U.S.C. § 1920(4) as expressed in its recent decision in the Race Tires America, Inc. v. Hoosier Racing Tire Corp. case, which vacated the district court’s approval of many eDiscovery costs. Although the court noted the Third Circuit’s “well-reasoned opinion,” the California court concluded that “in the absence of directly analogous Ninth Circuit authority, and in view of the court’s prior order in connection with the Blockbuster subscriber plaintiffs’ motion for review of the clerk's taxation of costs, broad construction of section 1920 with respect to electronic discovery production costs—under the facts of this case—is appropriate.” Ultimately, the court awarded the defendants slightly more than $700,000 in costs.

So, what do you think?  Will this ruling isolate the Race Tires case as an anomaly?  Will our monthly Netflix subscription rates go down?  (Probably not.)  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: Deidre Paknad on CGOC’s Information Lifecycle Governance Leader Reference Guide

 

Yesterday, we talked about the Information Lifecycle Governance Leader Reference Guide from the Compliance, Governance and Oversight Council (CGOC).  The guide provides a program for operationalizing an effective defensive disposal program for expired data, which is an increasingly important issue for many organizations as organizational data doubles every 18-24 months.

Deidre Paknad, Director of Information Lifecycle Governance (ILG) Solutions for IBM, is a well-known thought leader in the legal and information governance domain and one of the authors of the guide, as well as the founder of CGOC (and also a previous thought leader interviewee on this blog).  Deidre has also been a member of several Sedona Conference working groups since 2005 and has co-chaired the EDRM IGRM project since 2010.  I recently interviewed Deidre and asked her some questions regarding the goals for the guide, the target audience and how it fits in with other information governance initiatives in the industry.

Who is the target audience for this guide in terms of job functions and/or size of organization?

The guide is for companies and their Information Governance leaders who are looking to transform legal, records and IT practices to drive substantial cost savings and risk reduction.  It is for business leaders or stakeholders such as the Chief Information Officer (CIO), General Counsel (GC) and records managers who are looking for program models to define, operationalize and improve processes that enable defensible disposal of unnecessary data. The goal is to curb storage growth and lower costs associated with IT, eDiscovery and processing, to not only save money but also lower organizational risk going forward. Based on insight from 1700+ CGOC corporate practitioners, it is apparent that organizations with extensive preservation requirements due to litigation and regulation requirements who retain large amounts of data are in need of such a leadership guide.

Are there any success stories or examples of organizations using the principles described in this guide that you can provide?

Yes. We just had a very successful summit in February with more than 100 corporate practitioners (the proceedings documentation from the CGOC web site are available here).  Anthony Perkins of BNY Mellon provided the keynote speech regarding the high cost of information and how IT organizations are responding.  BNY Mellon and several others are setting new benchmarks and advancing ILG practices for defensible disposal that have become strategic enterprise initiatives.  Scott Bancroft of Novartis International also shared their experience in how they structured an effective governance program.  In the panel discussion, practitioners (such as Jason R. Baron of the National Archives and Records Administration, Eckhard Herych of Novartis and Mark Tabs and Thomas Zingale of UBS) shared their own experience and leadership on assessing process maturity to drive process improvement.  From those proceedings, you can see how Legal, RIM, IT and program office leaders (i.e., members of our target audience) share their experience to modernize their practices and collectively transform their enterprise processes for cost saving and risk reduction.

As this guide references the Information Governance Reference Model (IGRM) – which, of course, is a part of the Electronic Discovery Reference Model (EDRM) – how does this guide and the efforts of CGOC fit in with the EDRM-ARMA initiative?

We established CGOC in 2004 and it has grown to a community of over 1700 experts in retention, legal holds, discovery, and privacy exclusively for corporate practitioners. Its charter is to create a forum in which Legal, IT, RIM, Privacy and compliance executives can get the insight, interaction, and information they need to make good business decisions. CGOC fills the critical practitioners’ gap between ARMA and The Sedona Conference, providing the ability to move from theory to efficient practices. CGOC also provides educational seminars, benchmarking surveys, group workshops, an annual Summit and retreat, white papers by expert faculty, a professional networking website, and regional working groups to corporate litigation, discovery, privacy, records management and program office leaders and practitioners.  Membership in the forum is free to qualified executives.

What are your expectations/goals/hopes that you envision for how the guide is used and adopted?

In the fall of 2010, CGOC issued its Information Governance Benchmark Report, which presented findings from their first survey of legal, records management (RIM) and IT practitioners in Global 1000 companies. The report confirmed that CGOC members viewed defensible disposal as the most essential outcome of a good governance program  but revealed challenges with funding and cross organizational cooperation that impeded program launch or effectiveness. The ILG Guide now simply provides members with a construct for how to operationalize an effective program and overcome these barriers. By leveraging the guide, program leaders can clearly see the sixteen processes to coalesce Legal, RIM, Business, Privacy and IT processes to lower cost and risk. The impacts to the enterprise (and resulting costs) are high when legal, records and IT don't work in concert, and the cost of doing nothing is even higher.  Organizations can improve information economics by operationalizing their information lifecycle governance program using this guide, resulting in significant cost savings and reduced risk going forward.  We are excited to be able to provide such a guide to our member organizations.

Thanks, Deidre, for participating in the interview!

And to the readers, as always, please share any comments you might have or if you’d like to know more about a particular topic!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: CGOC’s Information Lifecycle Governance Leader Reference Guide

With all of the recent attention on technology-assisted review and current case law related to that subject, it’s sometimes easy to forget that most sanctions are issued because of failure to preserve potentially responsive data.  A sound Information Governance (aka Records Management) policy is the first step to enabling organizations to meet their preservation obligations by getting control of the data up front.  Organizations such as EDRM and ARMA have focused on Information Governance and have even collaborated on a January report on Information Governance.  Another organization focused on Information Governance is the Compliance, Governance and Oversight Council (CGOC).  In the fall of 2010, CGOC issued its Information Governance Benchmark Report, which presented findings from their first survey of legal, records management (RIM) and IT practitioners in Global 1000 companies.  Recently, CGOC developed a new guide for helping organizations with succeed in improving information and eDiscovery economics.

For most organizations, information volume doubles every 18-24 months and 90% of the data in the world has been created in the last two years. In a typical company in 2011, storing that data consumed about 10% of the IT budget. At a growth rate of 40% (even as storage unit costs decline), storing this data will consume over 20% of the typical IT budget by 2014.  Accumulating, storing and litigating data without value is simply no longer an economically viable proposition.  The 36 page Information Lifecycle Governance Leader Reference Guide (written by Deidre Paknad and Rani Hublou) provides a program for operationalizing an eff­ective defensive disposal program for expired data and overcome the barriers to do so.  It can be downloaded here from the CGOC site (if you don’t have a user account, you’ll have to create one, but it’s free).  The guide shows how to:

  • Define the economic and business objectives of an information governance program to quantify savings and ensure appropriate funding for change;
  • Establish a program strategy;
  • Structure an organization that aligns functional silos to ensure savings and business objectives are achieved;
  • Identify and improve the business processes for defensible disposal and risk reduction; and
  • Audit these processes to ensure systemic, sustainable change.

Aside from the Introduction and Conclusion, the guide is divided into five parts, as follows:

  • Defining Program Strategy: The focus is simple – to dispose of unnecessary data and keep only the data that has business utility or is subject to legal hold or regulatory record keeping requirements.
  • Setting Quantifiable Cost and Risk Reduction Goals: Setting goals with primary focus on how to lower storage and infrastructure costs from defensible disposal, lower risk through improved governance instrumentation and lower eDiscovery costs through governance instrumentation and lower enterprise data volume.  This section provides a particularly useful eDiscovery Cost Reduction section (page 13) that demonstrates the potential cost savings due to defensible disposal of unnecessary data and a Risk Reduction section (page 14) that provides a risk matrix to assess the risk level of each data process.
  • Operationalizing the Strategy: Putting the plan into place involves defining business objectives for the program and means for measuring achievement, defining processes and practices to achieve the objectives, establish accountability for outcomes and defining staff and instrumentation required to work the plan.
  • Program Leadership: For any program to be successful, you need buy in at the top.  That includes an Executive Committee (including the CIO, CFO, General Counsel), a Senior Advisory Group comprised of line of business leaders (division executives) to provide the staff­ and support needed to achieve the defined goals, a plan for achievement measurement and accountability and an execution timeline.
  • Process Maturity and Management: Each process should be assessed as to its level of maturity (from Level 1-ad hoc to Level 4-automated and cross-functional).  The effort required in each department to achieve the objectives should be clearly mapped out and an audit process should be established for confirming that the governance programs meet objectives and raising issues when there are issues.

All in all, the guide provides an excellent approach for organizations to address implementation of an information lifecycle governance program and illustrates the benefits and cost savings for doing so.  With organizational data doubling every 18-24 months, information governance costs for many organizations will skyrocket without an effective plan to manage the explosion of data.

So, what do you think?  Has your organization implemented an effective information governance program?  Does it have any of the components outlined in the CGOC guide?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Court Grants Plaintiff’s Motion to Compel Mirror-Imaging of Defendant’s Computers

 

In approving a motion for expedited discovery in United Factory Furniture Corp. v. Alterwitz, No. 2:12-cv-00059-KJD-VCF, (D. Nev. Apr. 6, 2012), Magistrate Judge Cam Ferenbach granted the plaintiff’s motion for a mirror-imaging order after determining the benefit outweighed the burden of the discovery, and it denied as unnecessary the plaintiff’s motion for an order to preserve evidence and a preliminary injunction from spoliation of evidence.

The plaintiff filed this motion after discovering that the defendants appeared to be tampering with the plaintiff’s computers. One of the defendants previously had been an employee of the company where he was responsible for the plaintiff company’s computer server and network services. The plaintiff alleged that he had created a “back door” to the company server that allowed him to access and alter confidential company information, such as business plans and financial, customer, and trade secret information. The other defendant, also the plaintiff’s former employee, appeared to have in her possession confidential information, as she stated she knew what the plaintiff company was writing in e-mails about her and she had—in a prior lawsuit—produced company e-mails that were neither to nor from her.

Judge Ferenbach considered the plaintiff’s motion for expedited discovery under the applicable rule that although pursuant to the Federal Rule of Civil Procedure 26(d), generally a party may not seek discovery from any source before the parties have held a Rule 26(f) conference, a court may permit expedited discovery upon a showing of good cause. Judge Ferenbach found good cause here “based on plaintiff’s allegations that defendants have access to plaintiff’s computer server, defendants have been deleting files and relevant evidence, and that evidence of their conduct, which is central to the litigation, will be erased through normal use of defendants’ computer . . . .”

In reviewing the plaintiff’s request that the court enter a mirror-imaging order, Judge Ferenbach pointed out that all information stored on a computer is discoverable, except where the request for production imposes an undue burden and expense and/or constitutes an invasion of privileged or private matter. Judge Ferenbach found no such undue burden or invasion would occur by applying and analyzing the facts against a five-pronged test:

(1) “The needs of the case” prong was met because information on the defendants’ computers was directly relevant and had to remain unaltered for the case to be litigated fairly.

(2) “The amount in controversy” prong was satisfied because the plaintiff had alleged it had suffered at least $75,000 in damages.

(3) “The importance of the issues at stake” prong was satisfied because the plaintiff had alleged the case involved the defendants’ accessing information involving business strategy, confidential customer information, and trade secrets, and the court acknowledged it had a responsibility to protect against the dissemination and misuse of such information.

(4) “The potential for finding relevant material” prong was met because the contents of the defendants’ computers were at the center of the case.

(5) “The importance of the proposed discovery in resolving the issues” prong was met because the documents and information at issue could not be produced another way.

Furthermore, the court noted, ordering mirror imaging would not result in undue expense to the defendants as the plaintiffs were paying the costs. The court additionally took measures to protect the defendants’ privacy and privilege interests by structuring the order so that a neutral computer expert would perform the mirror imaging, the expert would serve as an officer of the court, and the mirror image would be held in a sealed envelope in the clerk of court’s office until the conclusion of litigation, unless the plaintiff had reason to believe spoliation of evidence had occurred. At that time, the plaintiff could move the court for access to the mirror image.

Judge Ferenbach declined to enter a preservation order or issue a temporary injunction. He found a preservation order unnecessary because a duty existed to preserve evidence because “litigants owe an ‘uncompromising duty to preserve’ what they know or reasonably should know will be relevant evidence in a pending lawsuit,” and the complaint against the defendants and the information contained on the defendants’ computers was directly relevant to the suit against them. Judge Ferenbach found the preliminary injunction unnecessary because it ordered mirror imaging.

So, what do you think?  Were the mirror-images warranted?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: For an Appropriate eDiscovery Outcome, Call the Master

 

Special Master, that is.

Last week, Fios sponsored a webcast entitled Special Masters & e-Discovery with Craig Ball, who, in addition to being a prolific contributor to continuing legal and professional education programs throughout the US (and previous thought leader interviewee on this blog) has served as court-appointed special master in 30 cases (including at least one case covered here).  Not surprisingly, the webcast was very informative, reflecting Craig’s considerable experience and knowledge in having served in that role in so many cases.  A few highlights:

  • Appointing a Special Master: In Federal cases, Fed. R. Civ. P. 53 discusses the ability for a court to appoint a master with the parties’ consent.  Several states also have equivalent rules, for example, Rule 171 of the Texas Rules of Civil Procedure governs the ability to do so in Texas.
  • Circumstances Where Special Master is Most Often Required: Special masters are typically called in when special knowledge is required that neither party (nor their experts) possesses, or when one party is suspected of malfeasance.  Craig estimated that about half of the thirty cases where he has been retained have been because of suspected malfeasance by one party.  From an expertise standpoint, Craig noted that he most often fills this role related to a computer forensics need.
  • To Be “Special”, You Need to “Master” More than One Skill: Special masters need not only to be able to understand the law, they also need to understand systems, forms of ESI, mechanisms for preservation and formats of production.  In other words, they need the ability to “speak Geek”.
  • Special Masters Are Different From Mediators: A mediator’s job is to obtain agreement between parties.  While a special master may also do that to a degree, he/she must also apply good sense to the situation.  Craig’s analogy was that “just because both lawyers believe that they can fly” doesn’t mean that the special master should concur with that agreement.
  • Why Not Rely on the Judge for Such Services?:  Craig noted that many judges don’t have the technical expertise to adequately address all eDiscovery issues, so a special master can be called upon to provide recommendations regarding those issues to the Court.
  • Special Masters Are, Unsurprisingly, Not Free: Typically, they charge “senior partner” rates, reflecting their advanced level of expertise and experience.  Who pays?  It depends on the case, but potential malfeasance by a party can slant the costs to that party.  Special masters add value that can result in potentially significant cost savings to one or both parties, so they typically recoup those costs (and, often, a lot more).

The webcast also referenced two articles related to the subject of special masters and eDiscovery:

  • E‐Discovery: A Special Master's Perspective: Written by Craig himself, this nine page article talks about the pros and cons of Special Masters, the eight questions that lawyers need to be able to answer when working with special masters and the three typical reasons that eDiscovery fails, among other topics.  It also provides a terrific appendix with a two page Exemplar ESI Special Master Appointment Order.
  • Special Masters and e-Discovery: The Intersection of Two Recent Revisions to Federal Rules of Civil Procedure: This fifty-nine page article was written by The Honorable Shira A. Scheindlin (United States District Judge for the Southern District of New York and presiding judge of the notable Zubulake v. UBS Warburg case) & Jonathan M. Redgrave (founding partner of the firm of Redgrave, Daley, Ragan & Wagner and Chair Emeritus of The Sedona Conference’s® Working Group on Best Practices for Electronic Document Retention and Production).  It discusses the changes to Rule 53, governing the appointment of special masters and the changes to the Federal Rules for eDiscovery, suggesting appropriate uses for special masters for legal and technical issues.

If you missed the webcast (which is too bad, because Craig was entertaining and informative, as always), these articles provide good information on the use of special masters in eDiscovery.

So, what do you think?  Have you ever used a special master to address eDiscovery issues?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery BREAKING Case Law: Judge Carter Upholds Judge Peck’s Predictive Coding Order

A few weeks ago, in Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ. 1279 (ALC) (AJP) (S.D.N.Y. Feb. 24, 2012), Magistrate Judge Andrew J. Peck of the U.S. District Court for the Southern District of New York issued an opinion making it likely the first case to accept the use of computer-assisted review of electronically stored information (“ESI”) for this case.  However, on March 13, District Court Judge Andrew L. Carter, Jr. granted plaintiffs’ request to submit additional briefing on their February 22 objections to the ruling.  In that briefing (filed on March 26), the plaintiffs claimed that the protocol approved for predictive coding “risks failing to capture a staggering 65% of the relevant documents in this case” and questioned Judge Peck’s relationship with defense counsel and with the selected vendor for the case, Recommind.  Then, on April 5, Judge Peck issued an order in response to Plaintiffs’ letter requesting his recusal, directing plaintiffs to indicate whether they would file a formal motion for recusal or ask the Court to consider the letter as the motion.  On April 13, (Friday the 13th, that is), the plaintiffs did just that, by formally requesting the recusal of Judge Peck.

Now, on April 25 (signed two days ago and filed yesterday), Judge Carter has issued an opinion and order in the case, upholding Judge Peck’s opinion approving computer-assisted review.  In the opinion and order, Judge Carter noted:

“[T]he Court adopts Judge Peck’s rulings because they are well reasoned and they consider the potential advantages and pitfalls of the predictive coding software. The Court has thoroughly reviewed the ESI protocol along with the parties’ submissions.  At the outset, the Court notes that Plaintiffs and Judge Peck disagree about the scope of Plaintiffs’ acquiescence concerning the use of the method. Judge Peck’s written order states that Plaintiffs have consented to its use, (Opinion and Order at 17 (“The decision to allow computer-assisted review in this case was relatively easy – the parties agreed to its use (although disagreed about how best to implement such review.”))), while Plaintiffs argue that Judge Peck’s order mischaracterizes their position (Pl. Reply, dated March 19, 2012, at 4-5). Nevertheless, the confusion is immaterial because the ESI protocol contains standards for measuring the reliability of the process and the protocol builds in levels of participation by Plaintiffs. It provides that the search methods will be carefully crafted and tested for quality assurance, with Plaintiffs participating in their implementation. For example, Plaintiffs’ counsel may provide keywords and review the documents and the issue coding before the production is made. If there is a concern with the relevance of the culled documents, the parties may raise the issue before Judge Peck before the final production. Further, upon the receipt of the production, if Plaintiffs determine that they are missing relevant documents, they may revisit the issue of whether the software is the best method. At this stage, there is insufficient evidence to conclude that the use of the predictive coding software will deny Plaintiffs access to liberal discovery. “

“Plaintiffs’ arguments concerning the reliability of the method are also premature. It is difficult to ascertain that the predictive software is less reliable than the traditional keyword search. Experts were present during the February 8 conference and Judge Peck heard from these experts. The lack of a formal evidentiary hearing at the conference is a minor issue because if the method appears unreliable as the litigation continues and the parties continue to dispute its effectiveness, the Magistrate Judge may then conduct an evidentiary hearing. Judge Peck is in the best position to determine when and if an evidentiary hearing is required and the exercise of his discretion is not contrary to law. Judge Peck has ruled that if the predictive coding software is flawed or if Plaintiffs are not receiving the types of documents that should be produced, the parties are allowed to reconsider their methods and raise their concerns with the Magistrate Judge. The Court understands that the majority of documentary evidence has to be produced by MSLGroup and that Plaintiffs do not have many documents of their own. If the method provided in the protocol does not work or if the sample size is indeed too small to properly apply the technology, the Court will not preclude Plaintiffs from receiving relevant information, but to call the method unreliable at this stage is speculative.”

“There simply is no review tool that guarantees perfection. The parties and Judge Peck have acknowledged that there are risks inherent in any method of reviewing electronic documents. Manual review with keyword searches is costly, though appropriate in certain situations. However, even if all parties here were willing to entertain the notion of manually reviewing the documents, such review is prone to human error and marred with inconsistencies from the various attorneys’ determination of whether a document is responsive. Judge Peck concluded that under the circumstances of this particular case, the use of the predictive coding software as specified in the ESI protocol is more appropriate than keyword searching. The Court does not find a basis to hold that his conclusion is clearly erroneous or contrary to law. Thus, Judge Peck’s orders are adopted and Plaintiffs’ objections are denied.”

So, what do you think?  Will this settle the issue?  Or will the plaintiffs attempt another strategy to derail the approved predictive coding plan?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Is the Third Time the Charm for Technology Assisted Review?

 

A few weeks ago, in Da Silva Moore v. Publicis Groupe & MSL Group, Magistrate Judge Andrew J. Peck issued an opinion making it the first case to accept the use of computer-assisted review of electronically stored information (“ESI”) for this case.  Or, so we thought.  Now, the plaintiff has objected to the plan and even formally requested the recusal of Judge Peck.  Conversely, in Kleen Products LLC v. Packaging Corporation of America, et al., the plaintiffs have asked Magistrate Judge Nan Nolan to require the producing parties to employ a technology assisted review approach (referred to as "content-based advanced analytics," or CBAA) in their production of documents for discovery purposes, and that request is currently being considered.  Now, there’s a third case where the use of technology assisted review is actually being approved in an order by the judge.

In Global Aerospace Inc., et al, v. Landow Aviation, L.P. dba Dulles Jet Center, et al, Virginia State Circuit Court Judge James H. Chamblin ordered that the defendants can use predictive coding for discovery in this case, despite the plaintiff's objections that the technology is not as effective as human review.  The order was issued after the defendants issued a motion requesting either that predictive coding technology be allowed in the case or that the plaintiffs pay any additional costs associated with traditional review.  The defendant has an 8 terabyte data set that they are hoping to reduce to a few hundred gigabytes through advanced culling techniques.

In ruling, Judge Chamblin noted: “Having heard argument with regard to the Motion of Landow Aviation Limited Partnership, Landow Aviation I, Inc., and Landow Company Builders, Inc., pursuant to Virginia Rules of Supreme Court 4:1(b) and (c) and 4:15, it is hereby ordered Defendants shall be allowed to proceed with the use of predictive coding for purposes of processing and production of electronically stored information.”

Judge Chamblin’s order specified 60 days for processing, and another 60 days for production and noted that the receiving party will still be able to question "the completeness of the contents of the production or the ongoing use of predictive coding."  (Editor’s note: I would have included the entire quote, but it’s handwritten and Judge Chamblin has handwriting almost as bad as mine!)

As in the other cases, it will be interesting to see what happens next.  Will the plaintiff attempt to appeal or even attempt a Da Silva-like push for recusal of the Judge?  Or will they accept the decision and gear their efforts toward scrutinizing the resulting production?  Stay tuned.

So, what do you think?  Will this be the landmark case that becomes the first court-approved use of technology assisted review?  Or will the parties continue to “fight it out”?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Careers: Achieving Success as a Non-Attorney in a Law Firm: Find/Make the Right Environment, Part 1

 

Last week, I introduced a new series regarding achieving success as a non-attorney in a law firm.  One key to achieving success is being in an environment that permits it. In the next posts I’m going to talk about the type of environment that fosters growth and success. Let me make it very clear, however, that I am NOT suggesting you look at these posts and decide that it’s time to call a recruiter! There are a few things you should keep in mind as you read the first few posts in this series:

  • It is unlikely that any firm is going to be the perfect environment.
  • Even if you determine your firm may not be the best place to attain your ultimate goals, it may be exactly what you need today.  It may be the right place to develop essential skills that you’ll need.
  • If things aren’t in place at your firm today that would make it the right environment, that could be an opportunity rather than a negative. I’ll expand on that a bit later in the series.

So, my purpose in talking about “the right environment” is not to encourage you to start shopping around.  I’m discussing this so that if and when the time does come for you to move on, you can use these points as a guide for assessing firms you are considering:

  1. How significant is the litigation practice to the firm?  If litigation is a small part of the firm’s overall practice, that could hinder your chance for senior level status.  You’ve got a better chance of being noticed if you are working in a practice area that is very significant to the firm.
  2. How widely used is technology in the firm?  This is becoming less and less of an issue — especially at large firms.  Occasionally, however, I still run into firms that have a fair number of attorneys who just don’t want to use technology.  Don’t be concerned specifically about the use of litigation support technology.  If the attorneys are technically solid otherwise, this could be an opportunity rather than a negative.
  3. How aggressive is the firm’s marketing?  This is an indication that the firm recognizes the need to be competitive and has taken steps to do so.  Does the firm highlight litigation support and electronic discovery services in its marketing to potential clients?  If it doesn’t, this might be an opportunity rather than a negative.

Tomorrow, we’ll continue with additional things to look at when assessing an environment. So, what do you think?  Do you have suggestions for what to look for?  Please let us know or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.