Production

Sanctions for Violating Motion to Compel Production? Not Yet. – eDiscovery Case Law

In Fidelity National Title Insurance Co. v. Captiva Lake Investments, LLC, No. 4:10-CV-1890 (CEJ), 2012 U.S. Dist. (E.D. Mo. Nov. 16, 2012), where a party’s “conduct [did not] rise[ ] to the level of a willful violation of the order compelling production” because it was continually working toward the proper production of documents requested by its adversary, a court concluded that the adversary’s motion for sanctions was premature.

Involved in a declaratory judgment action related to policy coverage, Captiva Lake Investments asked insurer Fidelity National to produce the claims file and documents in its possession that were related to Fidelity’s “evaluation of coverage under the policy at issue.”

Fidelity responded but did not produce or include in its privilege log two categories of documents: the Major Claims Reports and data maintained in Fidelity’s Claims Processing System (“CPS”). When Captiva discovered this, it requested the data, but Fidelity merely produced an updated privilege log, claiming it could withhold the documents under privilege. Captiva filed a motion to compel, and the court granted it, ordering Fidelity to produce the information. Fidelity, however, still failed to produce only some of the requested data. Captiva then filed this motion for sanctions.

The court noted that under Rule 37 of the Federal Rules of Civil Procedure, “‘there must be an order compelling discovery, a willful violation of that order, and prejudice to the other party’” in order for the court to properly impose sanctions. Here, although Fidelity had produced only some of the information requested by Captiva, and although “the proceedings in this case present an extremely unflattering picture of Fidelity’s document and data management practices,” Fidelity was continuing to attempt to locate additional missing reports and was producing ones that it found; in addition, after producing some—but not complete—information from the CPS, Fidelity indicated to Captiva that it “‘was in contact with e-discovery specialists to figure out what else can be done with respect to the information in CPS.’”

Therefore, the court found that Fidelity’s failure to produce the data was not a willful violation of the order compelling production and denied Captiva’s motion for sanctions.

So, what do you think?  Should Fidelity have been sanctioned for failing to complete production?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Class Action Plaintiffs Required to Provide Social Media Passwords and Cell Phones – eDiscovery Case Law

We’ve seen several cases where social media data was requested – with some requests granted (including this one, this one and this one) and other requests denied (including this one, this one and this one).  Here is a recent case where the request was granted.

Considering proportionality and accessibility concerns in EEOC v. Original Honeybaked Ham Co. of Georgia, 11-cv-02560-MSK-MEH, 2012 U.S. Dist. (D. Colo. Nov. 7, 2012), Colorado Magistrate Judge Michael Hegarty held that where a party had showed certain of its adversaries’ social media content and text messages were relevant, the adversaries must produce usernames and passwords for their social media accounts, usernames and passwords for e-mail accounts and blogs, and cell phones used to send or receive text messages to be examined by a forensic expert as a special master in camera.

Case Background

This case began when the EEOC sued employer The Original Honeybaked Ham Company of Georgia (“HBH”) on behalf of a class alleging sexual harassment and retaliation. During discovery, HBH requested “numerous categories of documents designed to examine the class members’ damages—emotional and financial—as well as documents going to the credibility and bias of the class members,” and the company moved the court to compel their production.

Among the documents HBH requested were “full unredacted” social media content and text messages. HBH requested such electronically stored information (ESI) because “[m]any of the class members ha[d] utilized electronic media to communicate—with one another or with their respective insider groups—information about their employment with/separation from Defendant HBH, this lawsuit, their then-contemporaneous emotional state, and other topics and content that [HBH] contend[ed] may be admissible in this action.” For example, HBH had “obtained one affected former employee’s Facebook pages” and found that they “contain[ed] a significant variety of relevant information, and further, that other employees posted relevant comments on this Facebook account.”

Court Analysis of Document Request

Judge Hegarty noted that the variety of topics that class members discussed via electronic communications could be viewed “logically as though each class member had a file folder titled ‘Everything About Me,’ which they have voluntarily shared with others.” Therefore, because the documents—if they were in hard copy—would be discoverable if relevant, their existence in electronic form made them likewise discoverable: “The fact that [documents] exist[ ] in cyberspace on an electronic device is a logistical and, perhaps, financial problem, but not a circumstance that removes the information from accessibility by a party opponent in litigation.” Moreover, the fact that the “Everything About Me” folder was stored in this instance on Facebook made the documents perhaps more susceptible to discovery: “There is a strong argument that storing such information on Facebook and making it accessible to others presents an even stronger case for production, at least as it concerns any privacy objection. It was the claimants (or at least some of them) who, by their own volition, created relevant communications and shared them with others.”

As for their relevance, Judge Hegarty ticked through the categories of documents on the Facebook page that HBH had already obtained and noted that each were potentially relevant. Accordingly, and because “other employees posted relevant comments on this Facebook account,” Judge Hegarty required the production of each class member’s social media content.

Also driving Judge Hegarty’s decision was a concern for proportionality: “The cumulative exposure to the Defendant is most definitely well into the low-to-mid seven-figure range. This is important to note when addressing whether the potential cost of producing the discovery is commensurate with the dollar amount at issue.”

Judge’s Ruling

Ultimately, Judge Hegarty held that each class member should produce the following ESI and related devices: cell phones used to send or receive text messages during the relevant period, information necessary to access social media websites used during the relevant period, and information necessary to access “any e-mail account or web blog or similar/related electronically accessed internet or remote location used for communicating with others or posting communications or pictures” during the relevant period.

Protocol for Production Using a Special Master

Though the relevant information was discoverable, Judge Hegarty established a specific protocol for its production. First, the court would appoint a forensic expert to serve as a Special Master to review the produced ESI in camera. “[T]he parties [would] collaborate to create (1) a questionnaire to be given to the Claimants with the intent of identifying all such potential sources of discoverable information; and (2) instructions to be given to the Special Master defining the parameters of the information he will collect.” Judge Hegarty gave the parties specific procedures to follow in the instance of a disagreement during this process. The Special Master could then begin review.

Following in camera review by the special master, Judge Hegarty stipulated that it would also “review the information in camera and require the production to Defendant of only that information which the Court determines is legally relevant under the applicable rules.” The court would then provide the material to the EEOC, which would have an opportunity to conduct a privilege review. The EEOC would then produce nonprivileged information to HBH along with a privilege log. The court would return irrelevant materials to the EEOC and provide a method for the EEOC to contest any relevancy determinations.

Regarding costs of the review, Judge Hegarty ordered the cost of forensic evaluation to be split equally between the parties. Judge Hegarty noted, “The information ordered to be produced is discoverable—information which, if it exists, was created by the Claimants.” However, the court reserved the option to revisit the allocation of costs and to relieve the Plaintiff/Claimants of monetary responsibility if the effort produced little or no relevant information.

So, what do you think?  Was the judge correct in requiring production of user names, passwords and cell phones for each class member?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Percentage of eDiscovery Sanctions Cases Declining – eDiscovery Trends

According to Kroll Ontrack, the percentage of eDiscovery cases addressing sanctions “dropped by approximately ten percent” compared to 2011, while “cases addressing procedural issues more than doubled”.  Let’s take a closer look at the numbers and look at some cases in each category.

As indicated in their December 4 news release, in the past year, Kroll Ontrack experts summarized 70 of the most significant state and federal judicial opinions related to the preservation, collection, review and production of electronically stored information (ESI). The breakdown of the major issues that arose in these eDiscovery cases is as follows:

  • Thirty-two percent (32%) of cases addressed sanctions regarding a variety of issues, such as preservation and spoliation, noncompliance with court orders and production disputes.  Out of 70 cases, that would be about 22 cases addressing sanctions this past year.  Here are a few of the recent sanction cases previously reported on this blog.
  • Twenty-nine percent (29%) of cases addressed procedural issues, such as search protocols, cooperation, production and privilege considerations.  Out of 70 cases, that would be about 20 cases.  Here are a few of the recent procedural issues cases previously reported on this blog.
  • Sixteen percent (16%) of cases addressed discoverability and admissibility issues.  Out of 70 cases, that would be about 11 cases.  Here are a few of the recent discoverability / admissibility cases previously reported on this blog.
  • Fourteen percent (14%) of cases discussed cost considerations, such as shifting or taxation of eDiscovery costs.  Out of 70 cases, that would be about 10 cases.  Here are a few of the recent eDiscovery costs cases previously reported on this blog.
  • Nine percent (9%) of cases discussed technology-assisted review (TAR) or predictive coding.  Out of 70 cases, that would be about 6 cases.  Here are a few of the recent TAR cases previously reported on this blog, how many did you get?

While it’s nice and appreciated that Kroll Ontrack has been summarizing the cases and compiling these statistics, I do have a couple of observations/questions about their numbers (sorry if they appear “nit-picky”):

  • Sometimes Cases Belong in More Than One Category: The case percentage totals add up to 100%, which would make sense except that some cases address issues in more than one category.  For example, In re Actos (Pioglitazone) Products Liability Litigation addressed both cooperation and technology-assisted review, and Freeman v. Dal-Tile Corp. addressed both search protocols and discovery / admissibility.  It appears that Kroll classified each case in only one group, which makes the numbers add up, but could be somewhat misleading.  In theory, some cases belong in multiple categories, so the total should exceed 100%.
  • Did Cases Addressing Procedural Issues Really Double?: Kroll reported that “cases addressing procedural issues more than doubled”; however, here is how they broke down the category last year: 14% of cases addressed various procedural issues such as searching protocol and cooperation, 13% of cases addressed various production considerations, and 12% of cases addressed privilege considerations and waivers.  That’s a total of 39% for three separate categories that now appear to be described as “procedural issues, such as search protocols, cooperation, production and privilege considerations” (29%).  So, it looks to me like the percentage of cases addressing procedural issues actually dropped 10%.  Actually, the two biggest category jumps appear to be discoverability and admissibility issues (2% last year to 16% this year) and TAR (0% last year to 9% this year).

So, what do you think?  Has your organization been involved in any eDiscovery opinions this year?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

More Self-Documentation Features for Review Solutions – eDiscovery Best Practices

As we discussed yesterday, one feature of review solutions that often gets overlooked is the ability for the review solution to automatically document searching and review activities.  Not only does that make it easier to identify potential issues in the process; it also facilitates the ability for attorneys to demonstrate a defensible approach to discovery to the court.

Yesterday, we discussed self-documentation with regard to keeping a search history to support easy “tweaking” of searches and document the natural iterative process of searching, facilitating the ability for attorneys to demonstrate a defensible search approach to discovery to the court. Let’s discuss two other areas where self-documentation can assist in the discovery analysis and review process:

Review Set Assignment and Tracking: When a review effort requires multiple reviewers to meet the review and production deadline, assigning documents to each reviewer and tracking each reviewer’s progress to estimate completion is critical and can be extremely time consuming to perform manually (especially for large scale review projects involving dozens or even hundreds of reviewers).  A review application, such as OnDemand®, that automates the assignment of documents to the reviewers and automatically tracks their review activity and throughput eliminates that manual time, enabling the review supervisor to provide feedback to the reviewers for improved review results as well as reassign documents as needed to maximize reviewer productivity.

Track Tag and Edit Activity: Review projects involving multiple attorneys and reviewers can be difficult to manage.  The risk of mistakes is high.  For example, privileged documents can be inadvertently tagged non-privileged and important notes or comments regarding individual documents can be inadvertently deleted.  One or more of the users in your case could be making these mistakes and not even be aware that it’s occurring.  A review application, such as OnDemand®, that tracks each tagging/un-tagging event and each edit to any field for a document can enable you to generate an audit log report to look for potential mistakes and issues.  For example, generate an audit log report showing any documents where the Privileged tag was applied and then removed.  Audit log reports are a great way to identify mistakes that have occurred, determine which user made those mistakes, and address those mistakes with them to eliminate future occurrences.  Using the self-documentation feature of an audit log report can enable you to avoid inadvertent disclosures of privileged documents and other potential eDiscovery production issues.

So, what do you think?  How important are self-documentation features in a review solution to you?  Can you think of other important self-documentation features in a review solution?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Defendant Compelled to Produce Additional Discovery to Plaintiff – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

Where the facts of the case led a court to conclude that certain electronically stored information (ESI) could contain evidence relevant to the case, the court ordered a party to comply with its discovery obligations related to that ESI.

In Freeman v. Dal-Tile Corp., No. 5:10-CV-00522-BR, 2012 U.S. Dist. (E.D.N.C. Oct. 2, 2012), a case alleging harassment and discrimination, among other claims, against her former employer Dal-Tile Corporation, the plaintiff brought a motion to compel, asserting that some of the defendant’s discovery responses related to its search for ESI were deficient.

Specifically, the plaintiff sought to compel a keyword search of preserved e-mails belonging to certain individuals for a time frame that began two months after the plaintiff left Dal-Tile. The defendant objected, arguing that because the plaintiff had already left the company during the time frame for e-mails requested, any such e-mails “could not be relevant to Plaintiff’s harassment claims, because ‘the sole issue is whether Dal-Tile knew or should have known of the harassment and failed to take appropriate steps to halt it.’”

North Carolina Magistrate Judge William A. Webb disagreed, stating that it was “reasonable to expect” that e-mails written or received during that time period “could contain historical e-mails, i.e., an e-mail chain, given that the requested search period begins only two months after Plaintiff resigned.” Moreover, the plaintiff’s request hit the mark for other reasons: “The custodians whose e-mail Plaintiff requests to have searched are . . . the human resource officer who investigated Plaintiff’s complaints, and . . . the regional vice-president to whom [the human resources officer] reported her investigation findings.” In addition, the search terms that the plaintiff requested were “appropriately limited in number and scope and, thus, reasonably calculated to lead to the discovery of admissible evidence.”

Moreover, Judge Webb noted, Dal-Tile did “not assert[ ] that it would be unduly burdensome to search the e-mail[s requested]” or the hard drive of the human resources officer, a search of which the plaintiff had included in her request.

Therefore, the plaintiff’s motion was granted.

So, what do you think?  Should the plaintiff’s motion have been granted?  Please share any comments you might have or if you’d like to know more about a particular topic.

From All of Us at CloudNine Discovery and eDiscovery Daily, Happy Thanksgiving!  eDiscovery Daily will resume with new posts next Monday.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Louisiana Order Dictates That the Parties Cooperate on Technology Assisted Review – eDiscovery Case Law

During this Thanksgiving week, we at eDiscovery Daily thought it would be a good time to catch up on some cases we missed earlier in the year.  So, we will cover a different case each day this week.  Enjoy!

In the case In re Actos (Pioglitazone) Products Liability Litigation, No. 6:11-md-2299, (W.D. La. July 27, 2012), a case management order applicable to pretrial proceedings in a multidistrict litigation consolidating eleven civil actions, the court issued comprehensive instructions for the use of technology-assisted review (“TAR”).

In an order entitled “Procedures and Protocols Governing the Production of Electronically Stored Information (“ESI”) by the Parties,” U.S. District Judge Rebecca Doherty of the Western District of Louisiana set forth how the parties would treat data sources, custodians, costs, and format of production, among others. Importantly, the order contains a “Search Methodology Proof of Concept,” which governs the parties’ usage of TAR during the search and review of ESI.

The order states that the parties “agree to meet and confer regarding the use of advanced analytics” as a “document identification mechanism for the review and production of . . . data.” The parties will meet and confer to select four key custodians whose e-mail will be used to create an initial sample set, after which three experts will train the TAR system to score every document based on relevance. To quell the fears of TAR skeptics, the court provided that both parties will collaborate to train the system, and after the TAR process is completed, the documents will not only be randomly sampled for quality control, but the defendants may also manually review documents for relevance, confidentiality, and privilege.

The governance order repeatedly emphasizes that the parties are committing to collaborating throughout the TAR process and requires that they meet and confer prior to contacting the court for a resolution.

So, what do you think?  Should more cases issue instructions like this?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Defendant Claiming Not Reasonably Accessible Data Has Some ‘Splaining To Do – eDiscovery Case Law

In Murray v. Coleman, No. 08-CV-6383, 2012 U.S. Dist. (W.D.N.Y. Sept. 12, 2012), the plaintiff alleged harassment and retaliation in connection with his employment with the New York State Department of Correctional Services (DOCS). This discovery dispute arose when the plaintiff requested access to certain electronic records, alleging that the defendants withheld them.

In his motion, the plaintiff asserted that the defendants “never provided a ‘chronological e-mail history of any kind.’” In response, defense counsel “simply aver[red] that after plaintiff filed this motion to compel, he provided plaintiff with…‘the documents sought’ and, therefore, plaintiff’s motion is ‘moot.’” The plaintiff responded to the defendant’s reply, asserting that “‘virtually no electronic records [were] included’ in defendant’s discovery responses.”

Because the defense counsel’s response to the plaintiff’s motion was “terse,” New York Magistrate Judge Jonathan Feldman stated that it was “difficult . . . to determine whether defendants have in fact produced all relevant electronic records and e-mails as demanded by plaintiff.” Lacking in defense counsel’s response were “details regarding how and where electronically stored information (“ESI”) is held, what efforts were made to preserve relevant ESI, and the method used by defendants to locate, search and produce relevant ESI.”

As such, Judge Feldman “construe[d the defendants’] response as a claim that ESI, including e-mails, [were] not . . . produced because the data demanded [was] destroyed or [was] not ‘reasonably accessible’” pursuant to Rule 26(b)(2)(B) of the Federal Rules of Civil Procedure, which requires a producing party to “show that the information is not reasonably accessible because of undue burden or cost.”

Therefore, because the defendants had not sufficiently demonstrated that the ESI was not reasonably accessible, Judge Feldman ordered as follows:

“Defense counsel shall file an affidavit of a person with direct knowledge of DOCS’s document and e-mail retention system stating: (1) the document/e-mail retention policy used by DOCS currently and during the relevant time periods, (2) the dates of e-mails “reasonably accessible” for production in this litigation, (3) the back up or legacy system, if any, used by DOCS to preserve or archive e-mails that are no longer “reasonably accessible” and whether responsive documents or data may potentially be found on such back up or legacy systems, (4) whether accessing archived or back up e-mails would be unduly burdensome or costly and why, and (5) the date when a litigation hold or document preservation notice was put in place by DOCS regarding this matter and either a copy of or a description of the preservation or litigation hold utilized by DOCS.”  [emphasis added]

Judge Feldman ordered the defense to provide this affidavit within 30 days.

So, what do you think?  Was this an appropriate ruling given the situation?  Or did the defendant deserve sanctions?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Defendant Ordered to Retain Outside Vendor, Monetary Sanction Awarded – eDiscovery Case Law

In Carrillo v. Schneider Logistics, Inc. (C.D. Cal. Oct. 5, 2012), California Magistrate Judge David Bristow ordered the defendant to “retain, at its expense, an outside vendor, to be jointly selected by the parties, to collect electronically stored information and email correspondence”.  The defendant was ordered to produce all surveillance videotapes responsive to plaintiffs’ discovery requests and monetary sanctions were awarded for plaintiff’s attorney fees and costs incurred as a result of the defendant’s discovery violations.

Sequence of Events of Defendant’s Discovery Failures

In this class action wage and hour case against the defendants (a Wal-Mart provider), the plaintiffs filed a Motion to Compel responses to the first set of requests for production of documents.  Here’s a sequence of events that led to the filing of the motion (all dates in 2012):

  • On February 1, plaintiffs propounded their First Set of Requests for Production of Documents to the defendant;
  • The defendant provided its initial responses on March 12 and supplemental responses on April 4;
  • The plaintiffs, believing that the defendant’s document production was incomplete, began a series of meet and confers with the defendant, and expressed concern that the defendant had not produced all responsive non-privileged documents;
  • On May 31, the plaintiffs filed a Motion to Compel regarding the defendant’s failure to produce documents relating to Wal-Mart and their alleged failure to conduct a proper search and produce responsive documents;
  • After the Court ordered the parties to further meet and confer, the parties resolved their dispute and submitted a proposed order, which resulted in the Court ordering the defendant to supplement its responses to the requests for production of documents and produce responsive documents, including those relating to Wal-Mart. The defendant was also ordered to produce a custodian of records and person most knowledgeable regarding Schneider’s document retention policies;
  • Following the Court’s Order, the defendant produced an additional 23,000 documents, many of which related to categories of documents the defendant previously claimed did not exist;
  • The defendant also designated two employees to address the defendant’s retention policies and its efforts to search for responsive documents. When these witnesses appeared for their depositions, however, they were unable to answer many basic questions regarding the defendant’s document retention policies and the defendant’s search for responsive documents;
  • On July 10, the plaintiffs deposed an area manager for the defendant who testified that she had deleted various emails, including reports, continued to delete documents up to the date of her deposition, and that she had never received an instruction advising her not to delete such emails;

This led the plaintiffs to file their Motion to Compel on August 23, as they identified a “substantial number of emails and surveillance videotapes which had not been produced”.

Judge Bristow’s Ruling

Noting that the “record reflects – at best – a haphazard search for records”, Judge Bristow stated that the defendant had “disregarded its obligation to conduct a reasonably diligent search for responsive documents, including, as explained below, electronically stored information.”  Noting that at least 20 employees of the defendant regularly used “@wal-mart.com” email accounts for conducting business, the judge also noted that the defendant had still not produced any emails from those accounts and discounted the defendant’s contention that it had “no control” over those documents since the defendant’s employees used the Wal-Mart email address as their primary work email account.  The judge also ruled that the defendant had withheld surveillance videotapes and that it had not taken adequate steps to preserve documents.

As a result, the defendant was ordered to retain an outside vendor to collect ESI and email correspondence within 45 days and produce all responsive videotapes within 10 days.  The plaintiff was given 11 days to file a brief detailing their claim for attorneys’ fees and costs, with the defendant having two weeks to respond regarding the reasonableness of the stated costs.  Judge Bristow did deny the plaintiff’s request for other sanctions without prejudice as “premature”.

So, what do you think?  Have you seen other cases where parties were ordered to retain an outside vendor?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Another Social Media Discovery Request Ruled Overbroad – eDiscovery Case Law

As was the case in Mailhoit v. Home Depot previously, Ohio Magistrate Judge Mark R. Abel ruled in Howell v. The Buckeye Ranch, Case No. 2:11-cv-1014 (S. D. Ohio Oct. 1, 2012) that the defendant’s request (to compel the plaintiff to provide her user names and passwords for each of the social media sites she uses) was overbroad.

Background on Defendant’s Request

In this employment discrimination action where the plaintiff alleged that male supervisors, senior youth leaders, and coworkers sexually harassed her, the defendant filed a Motion to Compel in August to compel the plaintiff to give them her user names and passwords for each of the social media sites she uses.  The defendant contended that information on the plaintiff’s social media sites “may be relevant to (1) whether the alleged sexual acts occurred and (2) her present emotional state”, indicating their belief that the plaintiff “is not currently impaired by serious emotional distress and is enjoying life”.

The plaintiff contended that the defendant’s discovery request was “overbroad and unduly burdensome” and that the defendant had “offered no evidence or other reason to back up” their speculation that there might be relevant information in the private sections of her social media sites.  The defendant countered that the plaintiff testified as to several impacts of the alleged sexual harassment and that she cannot regularly update her Facebook account, yet her Facebook public pages contained evidence that the plaintiff still regularly updates her account.

Judge Abel’s Ruling

Judge Abel acknowledged that “[r]elevant information in the private section of a social media account is discoverable”, but that “a litigant has no right to serve overbroad discovery requests that seek irrelevant information”.  Comparing the request of electronic social media data to that of hard copy documents, Judge Abel stated:

“The fact that the information defendants seek is in an electronic file as opposed to a file cabinet does not give them the right to rummage through the entire file. The same rules that govern the discovery of information in hard copy documents apply to electronic files. Defendants are free to serve interrogatories and document requests that seek information from the accounts that is relevant to the claims and defenses in this lawsuit. Plaintiff’s counsel can then access the private sections of Howell’s social media accounts and provide the information and documents responsive to the discovery requests.”

Judge Abel did note that the plaintiff “remains under an obligation to preserve all the information” in her social media accounts, so the defendants would presumably be able to access that information through requests for specific relevant information.

So, what do you think?  How does this case compare to other cases (such as these three cases) where user names and passwords to social media sites were granted?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Government Document Productions Can Be Like Water Torture – eDiscovery Case Law

In Botell v. United States, 2012 U.S. Dist. (E.D. Cal. Sept. 18, 2012), Magistrate Judge Gregory Hollows noted that the US Government’s “document production performance in these proceedings has been akin to a drop-by-drop water torture” and ordered a preclusion order prohibiting the US Government “from presenting evidence in its case that had been requested by plaintiffs in the Requests for Production, but which has not been produced” as of the date of the order.  The US was also still required to produce the documents, whether they planned to use them or not.  Judge Hollows also noted that the “Plaintiff has not waived any motion to seek further sanctions regarding non-production of documents, or spoliation of documents.”

In this wrongful death and personal injury action at Lassen Volcanic National Park when a mortared rock wall gave way killing one child and injuring another, the US Government produced over 7,000 pages of documents, yet, it was noted that “there is a glaring lack of production of emails from defendant’s agents and employees” with emails having only been produced from one custodian.  As five other custodians were referenced in the produced emails, the plaintiffs contended that emails should have been produced from them as well.  With regard to the back up of emails, one of the defendant declarations described the backup policy as follows: “[b]ack-up emails are retained for 30 days only, unless they are subject to a litigation hold notice or pertain to the BP Gulf Oil spill.”

Judge Hollows ordered the defendants to provide a declaration describing “searches conducted to locate physical and electronic copies of emails” responsive to production requests, noting the declaration “shall state the steps taken to locate these emails, whether any such emails exist, and if not, a definitive statement that they no longer exist. If further responsive documents are located, they shall be produced at the time declarations are filed.”

Summarizing the production issue in his order, Judge Hollows noted as follows:

“At this juncture, the United States has purportedly been looking for documents for months, yet the undersigned, to the date of the hearing, does not have confidence that an organized, thorough search has been performed. Rather, defendant’s document production performance in these proceedings has been akin to a drop-by-drop water torture. At some point, plaintiff must be protected from the United States’ further belated production of pertinent documents.”

As a result, Judge Hollows issued the preclusion order, with the possibility of more sanctions to come.

So, what do you think?  Was the ruling harsh enough?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.