Privileged

Percentage of eDiscovery Sanctions Cases Declining – eDiscovery Trends

According to Kroll Ontrack, the percentage of eDiscovery cases addressing sanctions “dropped by approximately ten percent” compared to 2011, while “cases addressing procedural issues more than doubled”.  Let’s take a closer look at the numbers and look at some cases in each category.

As indicated in their December 4 news release, in the past year, Kroll Ontrack experts summarized 70 of the most significant state and federal judicial opinions related to the preservation, collection, review and production of electronically stored information (ESI). The breakdown of the major issues that arose in these eDiscovery cases is as follows:

  • Thirty-two percent (32%) of cases addressed sanctions regarding a variety of issues, such as preservation and spoliation, noncompliance with court orders and production disputes.  Out of 70 cases, that would be about 22 cases addressing sanctions this past year.  Here are a few of the recent sanction cases previously reported on this blog.
  • Twenty-nine percent (29%) of cases addressed procedural issues, such as search protocols, cooperation, production and privilege considerations.  Out of 70 cases, that would be about 20 cases.  Here are a few of the recent procedural issues cases previously reported on this blog.
  • Sixteen percent (16%) of cases addressed discoverability and admissibility issues.  Out of 70 cases, that would be about 11 cases.  Here are a few of the recent discoverability / admissibility cases previously reported on this blog.
  • Fourteen percent (14%) of cases discussed cost considerations, such as shifting or taxation of eDiscovery costs.  Out of 70 cases, that would be about 10 cases.  Here are a few of the recent eDiscovery costs cases previously reported on this blog.
  • Nine percent (9%) of cases discussed technology-assisted review (TAR) or predictive coding.  Out of 70 cases, that would be about 6 cases.  Here are a few of the recent TAR cases previously reported on this blog, how many did you get?

While it’s nice and appreciated that Kroll Ontrack has been summarizing the cases and compiling these statistics, I do have a couple of observations/questions about their numbers (sorry if they appear “nit-picky”):

  • Sometimes Cases Belong in More Than One Category: The case percentage totals add up to 100%, which would make sense except that some cases address issues in more than one category.  For example, In re Actos (Pioglitazone) Products Liability Litigation addressed both cooperation and technology-assisted review, and Freeman v. Dal-Tile Corp. addressed both search protocols and discovery / admissibility.  It appears that Kroll classified each case in only one group, which makes the numbers add up, but could be somewhat misleading.  In theory, some cases belong in multiple categories, so the total should exceed 100%.
  • Did Cases Addressing Procedural Issues Really Double?: Kroll reported that “cases addressing procedural issues more than doubled”; however, here is how they broke down the category last year: 14% of cases addressed various procedural issues such as searching protocol and cooperation, 13% of cases addressed various production considerations, and 12% of cases addressed privilege considerations and waivers.  That’s a total of 39% for three separate categories that now appear to be described as “procedural issues, such as search protocols, cooperation, production and privilege considerations” (29%).  So, it looks to me like the percentage of cases addressing procedural issues actually dropped 10%.  Actually, the two biggest category jumps appear to be discoverability and admissibility issues (2% last year to 16% this year) and TAR (0% last year to 9% this year).

So, what do you think?  Has your organization been involved in any eDiscovery opinions this year?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Cloning of Computer Files: When There’s a Will, There’s a Way – eDiscovery Case Law

In Matter of Tilimbo, No. 329/M-2007, 2012 N.Y. Misc. (Surr. Ct., Bronx Cnty. Aug. 22, 2012), a court held it was permissible to order cloning of computer files where doing so did not place an unreasonable burden on a nonparty, appropriate steps were taken to protect any privileged information, and the nonparty had not previously produced the requested information in hard copy.

In this claim based on a will contest, the plaintiffs moved for an order permitting their computer forensic expert to examine the personal computer hard drive of a nonparty witness, the deceased’s attorney Patrick Wynne, limited to finding and reviewing documents related to Rose Tilimbo, her will, as well as a deed transfer from her to Salvatore Tilimbo that formed the basis of the will contest. Wynne objected on the basis that he had already, at the court’s direction, been deposed on the subject and “provided an affirmation stating that he conducted the requisite diligent search of his ‘computer files and any other [additional] relevant files’ and did not find responsive documents or computer files.” He argued that “a balancing of the sanctity of the attorney-client privilege against the scope of permissible discovery warrant[ed] the denial of the motion.”

Noting that ESI of a nonparty is discoverable, the court held that so long as it did not place an unreasonable burden on Wynne, a solo practitioner, the examination and cloning of Wynne’s computer was permissible. Although Wynne had produced in hard copy all of the documents he said he possessed, the court pointed out that such disclosures did not prevent the ESI itself from being sought. In addition, Wynne had not been able to produce any documents related to the deed transfer at issue, and any such documents that existed would clearly be material and relevant to the case. Therefore, the court offered the following parameters for the cloning:

“The court finds that the cloning would not place an unreasonable burden upon Wynne if all of the computers can be cloned at his office in four hours or less on a date and at a time that he selects, which may include in whole or in part a time after normal business hours. Alternatively, the cloning will be allowed outside of Wynne’s office if it can be done by removing the computer(s) on a Saturday at any time selected by Wynne and returned to his office by Monday between 8:30 and 9:00 a.m. If Wynne prefers, the computer(s) may be removed from his office on any other day, provided the computer(s) are returned to his office within 24 hours. If the cloning is to be done outside of Wynne’s office and more than one computer is to be cloned, then at Wynne’s option, only one computer may be removed from his office at a time. In the event that the cloning can be accomplished within the time allocated herein either at Wynne’s office or by removal of the computer(s), Wynne shall have the right to select whether or not he wants the cloning to be done at his office. In the event that the cloning requested by the movants cannot be performed within the time frame provided herein, the court finds that the disruption to Wynn’s practice of law outweighs the benefits that the movants might obtain from the information provided by the cloning. Furthermore, should a computer be removed from Wynne’s office and not returned within the time provided herein, the movants shall pay Wynne $200 for each hour or part thereof that the return is delayed.”

In addition, the forensic analysts were limited to locating documents likely to lead to discoverable evidence related to the decedent and were given specific instructions on what to do with any unrelated documents that were accidentally uncovered.

So, what do you think?  Should cloning of the computer have been allowed?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Inadvertent Disclosure? Got Clawback? – eDiscovery Best Practices

 

As discovery becomes more complex and voluminous, it seems as though we’re seeing more and more cases where inadvertent disclosures of privileged documents are becoming more common.  In just the past couple of months, we’ve discussed two cases on this blog, where the producing parties were forced to waive privilege of those documents when they failed the now popular five factor test to determine whether an inadvertent disclosure entitles the producing party to have the documents returned.  Perhaps if they had a well-defined “clawback” agreement, the results would have been different?

What is a “Clawback” Agreement?

A clawback agreement enables the parties in a case to agree – in advance – that if privileged documents are inadvertently produced during discovery, privilege on those documents won’t be waived. The inadvertently produced documents are instead returned to the producing party, or destroyed by the receiving party – either way, they are not used by the receiving party.  As part of that agreement, each party is able to identify documents that it has inadvertently produced and request that they be returned or destroyed by the opposing party.  Per the clawback agreement, the opposing party agrees to comply with that request and not make a claim of waiver.

Protection of Waiver under FRE 502

Federal Rule of Evidence 502 (FRE 502) was enacted in 2008 to provide additional reassurances for parties dealing with the problem of inadvertent waiver.  Under FRE 502, inadvertent disclosure of privileged material does not operate as a waiver if three conditions are met:

  • The disclosure is inadvertent
  • The holder of the privilege took reasonable steps to prevent disclosure
  • The holder promptly took reasonable steps to rectify the error

What a Clawback Agrement Should Include

To promote compliance with the three conditions, the clawback agreement should address each one, clearly stating that inadvertent production of privileged material will not waive privilege, and addressing the steps that should be taken to avoid inadvertent disclosure, as well as to rectify the error, if such inadvertent disclosure occurs.  The definition of “reasonable steps” in each case is in the eye of the beholder, so it’s a good idea to establish and agree on specific steps, if possible.  The clawback agreement should also clearly define the procedure to be followed if assertion of privilege is disputed.

Because of FRE 502, if a clawback agreement is incorporated into a protective order entered by the court early in the case, it ensures court approval of the process in case there are disagreements and is binding on the parties, including third parties.  If you can’t agree on the terms of the clawback agreement with the opposing party early in the case and establishing the protection that it affords is important, you may need to file a motion with the court to get a clawback order entered.

So, what do you think?  Do your cases typically include a court-filed clawback agreement?  Have those agreements ever been used to protect inadvertently disclosed privileged information?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Another Disclosure of Privileged Documents Fails the Five Factor Test – eDiscovery Case Law

 

In Inhalation Plastics, Inc. v. Medex Cardio-Pulmonary, Inc., 2:07-CV-116 (N.D. Ohio), Ohio Magistrate Judge Norah McCann King found that the defendant had waived the attorney-client privilege was waived for 347 emails inadvertently produced, because they failed all factors in the five factor test to determine whether the inadvertent disclosure entitles the producing party to the return of the documents in question.

Background of Inadvertent Disclosure

In a breach of contract lawsuit, the defendant produced 7,500 hard copy pages including 347 pages of emails (4.6% of the total) for which legal personnel were senders or recipients. The defendant did not assert privilege on any of the 347 pages of emails until the plaintiff sought to depose those legal personnel. As a result of the defendant seeking to assert privilege on those emails, the plaintiff filed a motion for a determination that the documents are not privileged and submitted them for in camera review.

Five Factor Test

Noting that the producing party has the burden to prove that the disclosure of privileged documents was truly inadvertent, Judge King referenced the now popular five factor test to determine whether an inadvertent disclosure entitles the producing party to have the documents returned, as follows:

“(1) the reasonableness of precautions taken in view of the extent of document production, (2) the number of inadvertent disclosures, (3) the magnitude of the disclosure, (4) any measures taken to mitigate the damage of the disclosures, and (5) the overriding interests of justice.”

Analysis of Factors

With regard to the first factor, despite the fact that the defendant claimed that this production “was reviewed by several layers of attorneys who isolated the privileged documents and prepared for electronic production in the same way” as their previous productions, Judge King noted that the defendant did not specify “who reviewed the production, what steps were taken to review the documents for privilege or whether the production was different in form from prior productions” and noted that no privilege log was produced.  As a result, Judge King found that the defendant failed the first factor.

With regard to the second factor, Judge King compared the rate of disclosure of privileged documents in this case (4.6% of the total) to two other cases where privilege was also waived (134 out of 10,085 pages and 93 documents out of 15,000 documents respectively) and found the number of disclosures to be “relatively high”, so the defendant failed the second factor.

Regarding the third factor, the fact that the documents appeared to be relevant to the plaintiff's claims and they attempted to use them in depositions caused the defendant to fail the third factor.

On the fourth factor, the defendant did immediately invoke privilege when it discovered that the documents had been inadvertently produced.  However, they did not follow the procedure in Federal Rule of Civil Procedure 26(b)(5)(B), which requires:

“If information produced in discovery is subject to a claim of privilege . . . the party making the claim may notify any party that received the information of the claim and the basis for it. After being notified, a party . . . may promptly present the information to the court under seal for a determination of the claim. The producing party must preserve the information until the claim is resolved.”

As Judge King noted, “Medex did not identify any particular documents covered by the privilege, did not provide a proper privilege log and, beyond conclusory statements, Medex did not state a basis for the claimed privilege.”  So, they failed the fourth factor.

At this point, if this was a boxing match, it would be stopped.  In granting the plaintiff’s motion, Judge King stated: “To summarize, the Court finds that Medex did not take reasonable precautions to protect its privileged information, the number of documents disclosed is significant, no privilege log was provided at the time of disclosure, the contents of some of the documents may be relevant to the heart of the dispute, and Medex made insufficient attempts to mitigate its damage even after it learned of the disclosure.”

So, what do you think?  What do you to ensure your firm will pass the five factor test for inadvertent disclosures of privileged documents?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Daily is Two Years Old Today!

 

It’s hard to believe that it has been two years ago today since we launched the eDiscoveryDaily blog.  Now that we’ve hit the “terrible twos”, is the blog going to start going off on rants about various eDiscovery topics, like Will McAvoy in The Newsroom?   Maybe.  Or maybe not.  Wouldn’t that be fun!

As we noted when recently acknowledging our 500th post, we have seen traffic on our site (from our first three months of existence to our most recent three months) grow an amazing 442%!  Our subscriber base has nearly doubled in the last year alone!  We now have nearly seven times the visitors to the site as we did when we first started.  We continue to appreciate the interest you’ve shown in the topics and will do our best to continue to provide interesting and useful eDiscovery news and analysis.  That’s what this blog is all about.  And, in each post, we like to ask for you to “please share any comments you might have or if you’d like to know more about a particular topic”, so we encourage you to do so to make this blog even more useful.

We also want to thank the blogs and publications that have linked to our posts and raised our public awareness, including Pinhawk, The Electronic Discovery Reading Room, Unfiltered Orange, Litigation Support Blog.com, Litigation Support Technology & News, Ride the Lightning, InfoGovernance Engagement Area, Learn About E-Discovery, Alltop, Law.com, Justia Blawg Search, Atkinson-Baker (depo.com), ABA Journal, Complex Discovery, Next Generation eDiscovery Law & Tech Blog and any other publication that has picked up at least one of our posts for reference (sorry if I missed any!).  We really appreciate it!

We like to take a look back every six months at some of the important stories and topics during that time.  So, here are some posts over the last six months you may have missed.  Enjoy!

We talked about best practices for issuing litigation holds and how issuing the litigation hold is just the beginning.

By the way, did you know that if you deleted a photo on Facebook three years ago, it may still be online?

We discussed states (Delaware, Pennsylvania and Florida) that have implemented new rules for eDiscovery in the past few months.

We talked about how to achieve success as a non-attorney in a law firm, providing quality eDiscovery services to your internal “clients” and how to be an eDiscovery consultant, and not just an order taker, for your clients.

We warned you that stop words can stop your searches from being effective, talked about how important it is to test your searches before the meet and confer and discussed the importance of the first 7 to 10 days once litigation hits in addressing eDiscovery issues.

We told you that, sometimes, you may need to collect from custodians that aren’t there, differentiated between quality assurance and quality control and discussed the importance of making sure that file counts add up to what was collected (with an example, no less).

By the way, did you know the number of pages in a gigabyte can vary widely and the same exact content in different file formats can vary by as much as 16 to 20 times in size?

We provided a book review on Zubulake’s e-Discovery and then interviewed the author, Laura Zubulake, as well.

BTW, eDiscovery Daily has had 150 posts related to eDiscovery Case Law since the blog began.  Fifty of them have been in the last six months.

P.S. – We still haven't missed a business day yet without a post.  Yes, we are crazy.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Google Awarded $1 Million from Oracle, But Denied Discovery Costs

 

As noted in SiliconBeat and ARN, Judge William Alsup ordered Oracle on Tuesday to pay Google $1 million as reimbursement for Google’s fees for a court-appointed expert in their court battle over intellectual property and Google’s Android software.  However, the ruling is only a partial victory for Google, who was seeking $4 million from Oracle in reimbursement of costs associated with the case.

Claims Against Google Dismissed Despite Inadvertent Disclosure

As you may recall, claims against Google that its Android mobile phone platform infringes Oracle's copyrights relating to the Java computer language were dismissed by Judge Alsup back on May 31.  The claims were dismissed despite a significant inadvertent disclosure of information during discovery by Google, where drafts of a privileged email were not caught by Google’s search technology since they didn’t include the words “Attorney Work Product”, nor were they yet addressed to in-house counsel.  Judge Alsup ruled late last year that the draft emails were not privileged and the Federal Circuit court upheld that ruling.  However, these rulings did not ultimately cost Google as Oracle’s claims were dismissed.  As Judge Alsup noted, “Oracle initially sought six billion dollars in damages and injunctive relief but recovered nothing after nearly two years of litigation and six weeks of trial.”  Oracle plans to appeal.

Google Seeks Recovery of Costs

As the prevailing party, Google was able to seek recovery of costs and did so, seeking nearly $4 million from Oracle.  As noted above, Judge Alsup awarded Google $1 million as reimbursement for Google’s fees for a court-appointed expert.  However, Judge Alsup rejected Google's request that Oracle also pay $2.9 million for discovery-related costs, calling the search giant's arguments "unpersuasive".

“The problem with Google's e-discovery bill of costs is that many of [the] item-line descriptions seemingly bill for 'intellectual effort' such as organizing, searching, and analyzing the discovery documents," Judge Alsup stated in the ruling. "Most egregious are attempts to bill costs for 'conferencing,' 'prepare for and participate in kickoff call,' and communications with co-workers, other vendors, and clients. These are non-taxable intellectual efforts.”

So, what do you think?  Should Google have been reimbursed more?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: More Sanctions for Fry’s Electronics

 

In E.E.O.C. v Fry’s Electronics, Inc., No. C10-1562RSL, 2012 U.S. Dist. (W.D. Wash. July 3, 2012), Washington District Judge Robert S. Lasnik ordered several sanctions against the defendant in this sexual harassment case (including ordering the defendant to pay $100,000 in monetary sanctions and ordering that certain evidence be considered presumptively admissible at trial), but stopped short of entering a default judgment against the defendant.  This ruling came after having previously ordered sanctions against the defendant less than two months earlier.

Prior Sanctions

On May 10, Judge Lasnik granted in part plaintiffs' motion for sanctions in this case, finding that the defendant had spoliated evidence, including data and computer hard drives. In that ruling, Judge Lasnik believed that the prejudicial effect of the spoliation could be counteracted by “(a) instructing the jury that one of the justifications for firing [one of the plaintiffs] was pretextual and (b) allowing plaintiff considerable leeway in arguing what information might have been gleaned from the computer hard drives had they not been destroyed by defendant”. At the time, Judge Lasnik also indicated “some concern regarding the efficacy and thoroughness of defendant's searches” which led to more information being discovered after he ordered a second search.

Additional Spoliation and Misconduct

During a Rule 30(b)(6) deposition held on May 30, the plaintiffs learned for the first time that the accused individual had previously been accused of sexual harassment in 2001 and that an investigation had been conducted. According to Judge Lasnik, the defendant “intentionally withheld this information and the related documents from discovery by raising unfounded objections and ‘negotiating’ a narrowing of the discovery requests” and found the defendant's conduct to be “unfair, unwarranted, unprincipled, and unacceptable”.

Misconduct by the defendants noted by Judge Lasnik also included the redaction of responsive information, “[e]ven after defendant's objections to certain discovery requests were overruled”, as well as production of hundreds of pages of information with the “fallacious argument” that they were relevant to the claims.

Consideration of Default Judgment Sanction

Judge Lasnik noted that it is “once again left to determine whether to strike defendant's answer and enter default judgment against it”, but noted that dismissal is a “harsh sanction” and the following factors must be considered when determining “whether a dispositive sanction is appropriate under either its inherent powers or Rule 37(b): (1) the public's interest in the expeditious resolution of litigation; (2) the Court's need to manage its docket efficiently and effectively; (3) the risk of prejudice to the party seeking sanctions; (4) the public policy in favor of considering cases on the merits; and (5) the availability of less drastic sanctions.”  While finding that the first three factors supported a dispositive sanction, Judge Lasnik ruled against a dispositive sanction in factor 4, indicating that “[t]he public has an interest in a determination of those issues based on the facts, rather than by judicial fiat”.

Lesser Sanctions Ordered

Instead, Judge Lasnik ordered lesser sanctions, indicating that “Defendant's affirmative defenses related to (i) its efforts to prevent and correct harassment in the workplace, (ii) plaintiffs' failure to utilize protective and corrective opportunities provided by defendant, (iii) its good faith and/or privilege to act as it did in this case are STRICKEN.” He also stated that certain documents and testimony related to “other complaints or reports of sexual harassment” at the company were “presumptively admissible at trial”. He also ordered sanctions of $100,000 “to offset the excess costs caused by defendant’s discovery violations, to punish unacceptable behavior, and as a deterrent to future bad conduct” to be split evenly between the two individual plaintiffs, the EEOC and the Court Clerk.

So, what do you think?  Are you surprised that the defendant didn’t receive a default judgment sanction?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Counsel, The Inadvertent Disclosure "Buck" Stops With You

 

Here is yet another case of inadvertently disclosed privileged documents.  In Blythe v. Bell, 2012 NCBC 42, North Carolina Business Superior Court Judge James L. Gale denied a motion for an order compelling the return of privileged documents inadvertently disclosed by the defendants, ruling that privilege had been waived on those documents.

In this case, the defendants produced 3.5 million documents on two hard drives which were ultimately determined to contain approximately 1,700 potentially privileged documents (the documents were to or from the outside counsel’s domain, an easy criteria to identify potentially privileged documents).  The defendants contracted with an outside consultant (Computer Ants) to obtain, process, and search their eMails for responsive documents.  For their part, the plaintiffs questioned whether Computer Ants was sufficiently qualified as an expert in electronic discovery to reasonably justify Defendants’ reliance on it to protect against the production of privileged information.  Prior to establishing Computer Ants, the owner (Thomas Scott) had worked as a truck driver, a Bass Pro Shop Security Manager, a respiratory therapist, and a financial auditor for a retail seller.  He had “never provided any forensic computer services in the context of a lawsuit” nor had ever “been engaged as a computer expert or provided an opinion in any legal proceeding”.  Sounds as if the plaintiffs had a legitimate concern.

Judge Gale used a five-factor balancing test previously used in Morris v. Scenera Research, LLC, which considers: “(1) the reasonableness of the precautions taken to prevent inadvertent disclosure; (2) the number of inadvertent disclosures; (3) the extent of the disclosures; (4) any delay in measures taken to rectify the disclosures; and (5) the overriding interests of justice.”

Judge Gale noted that “One federal district court characterizes the need for advance efforts to protect against waiver as “’paramount.’”  However, the defendant produced “the hard drives prepared by Computer Ants without any review or sampling or other quality assurance effort to assess whether the consultant’s efforts had been successful in eliminating privileged communications. Defendants admit that they relied exclusively on ‘this contractor and this procedure’ to filter out documents potentially subject to the attorney-client privilege.”

Since “the multi-factor balancing test applied by the federal courts on this record is controlled by the first factor”, Judge Gale, while noting that the “court takes no pleasure in finding the waiver of attorney-client privilege”, nonetheless had no choice but to do so based on the first factor alone.

So, what do you think?  How do you evaluate your eDiscovery provider to ensure their qualifications?  What precautions do you take to prevent inadvertent disclosure?  Please share any comments you might have or if you’d like to know more about a particular topic.

Source: JD Supra, via Brooks, Pierce, McLendon, Humphrey & Leonard LLP

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Types Of Metadata and How They Impact Discovery

 

If an electronic document is a “house” for information, then metadata could be considered the “deed” to that house. There is far more to explaining a house than simply the number of stories and the color of trim. It is the data that isn’t apparent to the naked eye that tells the rest of the story. For a house, the deed lines out the name of the buyer, the financier, and the closing date among heaps of other information that form the basis of the property. For an electronic document, it’s not just the content or formatting that holds the key to understanding it. Metadata, which is data about the document, contains information such as the user who created it, creation date, the edit history, and file type. Metadata often tells the rest of the story about the document and, therefore, is often a key focus of eDiscovery, such as in cases like this one we recently covered here.

There are many different types of metadata and it is important to understand each with regard to requesting that metadata in opposing counsel productions and being prepared to produce it in your own productions.  Examples include:

  • Application Metadata: This is the data created by an application, such as Microsoft® Word, that pertains to the ESI (“Electronically Stored Information”) being addressed. It is embedded in the file and moves with it when copied, though copying may alter the application metadata.
  • Document Metadata: These are properties about a document that may not be viewable within the application that created it, but can often be seen through a “Properties” view (for example, Word tracks the author name and total editing time).
  • Email Metadata: Data about the email.  Sometimes, this metadata may not be immediately apparent within the email application that created it (e.g., date and time received). The amount of email metadata available varies depending on the email system utilized.  For example, Outlook has a metadata field that links messages in a thread together which can facilitate review – not all email applications have this data.
  • Embedded Metadata: This metadata is usually hidden; however, it can be a vitally important part of the ESI. Examples of embedded metadata are edit history or notes in a presentation file. These may only be viewable in the original, native file since it is not always extracted during processing and conversion for eDiscovery.
  • File System Metadata: Data generated by the file system, such as Windows, to track key statistics about the file (e.g., name, size, location, etc.) which is usually stored externally from the file itself.
  • User-Added Metadata: Data created by a user while working with, reviewing, or copying a file (such as notes or tracked changes).
  • Vendor-Added Metadata: Data created and maintained by an eDiscovery vendor during processing of the native document.  Don’t be alarmed, it’s impossible to work with some file types without generating some metadata; for example, you can’t review and produce individual emails within a custodian’s Outlook PST file without generating those out as separate emails (either in Outlook MSG format or converted to an image format, such as TIFF or PDF).

Some metadata, such as user-added tracked changes or notes, could be work product that may affect whether a document is responsive or contains privileged information, so it’s important to consider that metadata during review, especially when producing in native format.

So, what do you think? Have you been involved in cases where metadata was specifically requested as part of discovery? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Documentation is Key to a Successful Discovery Effort

 

We like to point out good articles about eDiscovery on this blog to keep our readers aware of trends and best practices.  I recently read an article on InsideCounsel titled E-discovery: Memorializing the e-discovery process, written by Alvin Lindsay, which had some good specific examples of where good documentation is important to prevent sanctions and save litigation costs.

Litigation Holds

The author notes that, since the Zubulake opinions issued by Judge Shira Scheindlin in 2003 and 2004, 1) most jurisdictions have come to expect that parties must issue a litigation hold “as soon as litigation becomes reasonably foreseeable”, and 2) “oral” litigation holds are unlikely to be sufficient since the same Judge Scheindlin noted in Pension Committee that failure to issue a “written” litigation hold constitutes “gross negligence”.  His advice: “make sure the litigation hold is in writing, and includes at minimum the date of issue, the recipients and the scope of preservation”.  IT personnel responsible for deleting “expired” data (outside of retention policies) also need to receive litigation hold documentation; in fact, “it can be a good idea to provide a separate written notice order just for them”.  Re-issuing the hold notices periodically is important because, well, people forget if they’re not reminded.  For previous posts on the subject of litigation holds, click here and here.

Retention Policies and Data Maps

Among the considerations for documentation here are the actual retention and destruction policies, system-wide backup procedures and “actual (as opposed to theoretical) implementation of the firm’s recycle policy”, as well as documentation of discussions with any personnel regarding same.  A data map provides a guide for legal and IT to the location of data throughout the company and important information about that data, such as the business units, processes and technology responsible for maintaining the data, as well as retention periods for that data.  The author notes that many organizations “don’t keep data maps in the ordinary course of business, so outside counsel may have to create one to truly understand their client’s data retention architecture.”  Creating a data map is impossible for outside counsel without involvement and assistance at several levels within the organization, so it’s truly a group effort and best done before litigation strikes.  For previous posts on the subject of data maps, click here and here.

Conferences with Opposing Counsel

The author discusses the importance of documenting the nature and scope of preservation and production and sums up the importance quite effectively by stating: “If opposing parties who are made aware of limitations early on do not object in a timely fashion to what a producing party says it will do, courts will be more likely to invoke the doctrines of waiver and estoppel when those same parties come to complain of supposed production infirmities on the eve of trial.”  So, the benefits of documenting those limitations early on are clear.

Collecting, Culling and Sampling

Chain of custody documentation (as well as a through written explanation of the collection process) is important to demonstrating integrity of the data being collected.  If you collect at a broad level (as many do), then you need to cull through effective searching to identify potentially responsive ESI.  Documenting the approach for searching as well as the searches themselves is key to a defensible searching and culling process (it helps when you use an application, like FirstPass®, powered by Venio FPR™, that keeps a history of all searches performed).  As we’ve noted before, sampling enables effective testing and refinement of searches and aids in the defense of the overall search approach.

Quality Control

And, of course, documenting all materials and mechanisms used to provide quality assurance and control (such as “materials provided to and used to train the document reviewers, as well as the results of QC checks for each reviewer”) make it easier to defend your approach and even “clawback” privileged documents if you can show that your approach was sound.  Mistakes happen, even with the best of approaches.

So, what do you think?  These are some examples of important documentation of the eDiscovery process – can you think of others?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.