Social Technology

2013 eDiscovery Year in Review: eDiscovery Case Law, Part 1

It’s time for our annual review of eDiscovery case law!  We had more than our share of sanctions granted and denied, as well as disputes over admissibility of electronically stored information (ESI), eDiscovery cost reimbursement, production formats and search parameters, among other things.  So, as we did last year and also the year before, let’s take a look back at 2013!

Last year, eDiscoveryDaily published 78 posts related to eDiscovery case decisions and activities over the past year, covering 62 unique cases!  And, believe it or not, we still didn’t cover every case that had eDiscovery impact.  Sometimes, you want to cover other topics too.

Nonetheless, for the cases we did cover, we grouped them into common subject themes and will review them over the next few posts (a few of them could be categorized in more than one category, so we took our best shot).  Perhaps you missed some of these?  Now is your chance to catch up!

ADMISSIBILITY AND DUTY TO PRESERVE AND PRODUCE

Admissibility of ESI, and the duty to preserve and produce it, is more at issue than ever.  As always, there are numerous disputes about data being produced and not being produced.  Here are ten cases related to admissibility and the duty to preserve and produce ESI:

Court Rules Defendant Doesn’t Have Controls of PCs of Former Members, Denies Plaintiff’s Motion to CompelTo require a party to produce evidence in discovery, the party must have “possession, custody, or control” of the evidence. In Kickapoo Tribe of Indians of the Kickapoo Reservation in Kansas v. Nemaha Brown Watershed Joint District No. 7, the defendant did not have control over the personal computers of its former members, employees, or staff; it did not have the legal right to obtain information from them “on demand.” Therefore, the court rejected the plaintiff’s motion to compel and refused to order the forensic examination of the personal computers of current or former members, employees, or staff.

Court Rejects Defendant’s “Ultra-Broad” Request, Denies Motion to Compel ProductionIn NOLA Spice Designs, LLC v. Haydel Enters., Inc., Louisiana Magistrate Judge Joseph C. Wilkinson, Jr. denied a motion to compel a plaintiff and its principal (a third-party defendant) to produce their passwords and usernames for all websites with potentially relevant information and to compel a forensic examination of its computers.

Plaintiff Needs More Than “Mere Hope” to Discover Defendant’s Personal InfoIn Salvato v. Miley, a wrongful death action, Florida Magistrate Judge Philip R. Lammens denied the plaintiff’s motion to compel the defendant’s responses to discovery requests “based on Plaintiff’s very limited showing as to the relevance of the requested discovery and the broadly drafted discovery requests”.

Court Compels Discovery of Plaintiff’s Facebook Posts as RelevantIn Moore v. Miller, Colorado Senior District Judge John L. Kane ruled (over the plaintiff’s privacy objections) that the plaintiff’s Facebook posts and activity log must be produced because they related to his claims of physical injury and emotional distress and because the plaintiff put his posts directly at issue by discussing the incident giving rise to the lawsuit online.

Court Rules that Stored Communications Act Applies to Former Employee EmailsIn Lazette v. Kulmatycki, the Stored Communications Act (SCA) applied when a supervisor reviewed his former employee’s Gmails through her company-issued smartphone; it covered emails the former employee had not yet opened, but not emails she had read but not yet deleted.

Google Compelled to Produce Search Terms in Apple v. SamsungIn Apple v. Samsung, California Magistrate Judge Paul S. Grewal granted Apple’s motion to compel third party Google to produce the search terms and custodians used to respond to discovery requests and ordered the parties to “meet and confer in person to discuss the lists and to attempt to resolve any remaining disputes regarding Google’s production.”

Plaintiff Granted Access to Defendant’s DatabaseIn Advanced Tactical Ordnance Systems, LLC v. Real Action Paintball, Inc., Indiana Magistrate Judge Roger B. Cosbey took the unusual step of allowing the plaintiff direct access to a defendant company’s database under Federal Rule of Civil Procedure 34 because the plaintiff made a specific showing that the information in the database was highly relevant to the plaintiff’s claims, the benefit of producing it substantially outweighed the burden of producing it, and there was no prejudice to the defendant.

Yet Another Request for Facebook Data DeniedIn Potts v. Dollar Tree Stores, Inc., Tennessee District Judge William Haynes ruled that the defendant “lacks any evidentiary showing that Plaintiff’s public Facebook profile contains information that will reasonably lead to the discovery of admissible evidence” and, therefore, denied the defendant’s motion to compel regarding same.

Stored Communications Act Limits Production of Google EmailsIn Optiver Australia Pty. Ltd. & Anor. v. Tibra Trading Pty. Ltd. & Ors., California Magistrate Judge Paul S. Grewal granted much of the defendant’s motion to quash subpoena of Google for electronic communications sent or received by certain Gmail accounts allegedly used by employees of the defendant because most of the request violated the terms of the Stored Communications Act.

Another Social Media Request Denied as a “Carte Blanche” RequestIn Keller v. National Farmers Union Property & Casualty Co., the defendants filed a motion to compel the plaintiff’s to respond to various discovery requests. While Magistrate Judge Jeremiah Lynch granted their request to compel the plaintiffs to produce medical records, he denied the defendant’s request “to delve carte blanche into the nonpublic sections of Plaintiffs’ social networking accounts”.

EDISCOVERY COST REIMBURSEMENT

As usual, eDiscovery cost reimbursement was a “mixed bag” as the cases where the prevailing party was awarded reimbursement of eDiscovery costs and the cases where requests for reimbursement of eDiscovery costs was denied (or only partially granted) was about even.  Here are six cases, including one where the losing plaintiff was ordered to pay $2.8 million for predictive coding of one million documents(!):

Cost-Shifting Inappropriate when Data is Kept in an Accessible FormatIn Novick v. AXA Network, New York Magistrate Judge Kevin Nathaniel Fox ruled that cost-shifting was inappropriate where data was kept in an accessible format.

Apple Wins Case, But Loses its Bid to Have Most of its Costs CoveredIn Ancora Technologies, Inc. v. Apple, Inc., California District Judge Yvonne Gonzalez Rogers granted in part and denied in part Ancora’s Motion for Review of Clerks’ Order on the Bill of Costs of prevailing party Apple, reducing the awarded amount from $111,158.23 down to $20,875.48, including disallowing over $71,000 in storage and hosting costs.

Another Case where Reimbursement of eDiscovery Costs are DeniedIn The Country Vintner of North Carolina, LLC v. E. & J. Gallo Winery, Inc., when deciding which costs are taxable, the Fourth Circuit chose to follow the Third Circuit’s reasoning in Race Tires America, Inc. v. Hoosier Racing Tire Corp., which read 28 U.S.C. § 1920(4) narrowly. Specifically, the court approved taxation of file conversion and transferring files onto CDs as “[f]ees for exemplification and the costs of making copies of any materials where the copies are necessarily obtained for use in the case” but no other tasks related to electronically stored information (ESI).

In False Claims Act Case, Reimbursement of eDiscovery Costs Awarded to PlaintiffIn United States ex rel. Becker v. Tools & Metals, Inc., a qui tam False Claims Act litigation, the plaintiffs sought, and the court awarded, costs for, among other things, uploading ESI, creating a Relativity index, and processing data over the objection that expenses should be limited to “reasonable out-of-pocket expenses which are part of the costs normally charged to a fee-paying client.” The court also approved electronic hosting costs, rejecting a defendant’s claim that “reasonableness is determined based on the number of documents used in the litigation.” However, the court refused to award costs for project management and for extracting data from hard drives where the plaintiff could have used better means to conduct a “targeted extraction of information.”

Court Says Scanning Documents to TIFF and Loading into Database is TaxableIn Amana Society, Inc. v. Excel Engineering, Inc., Iowa District Judge Linda R. Reade found that “scanning [to TIFF format] for Summation purposes qualifies as ‘making copies of materials’ and that these costs are recoverable”.

Must Losing Plaintiff Pay Defendant $2.8 Million for Predictive Coding of One Million Documents? Court Says YesIn Gabriel Technologies Corp. v. Qualcomm Inc., District Judge Anthony J. Battaglia awarded the defendant over $12.4 million in attorneys’ fees to be paid by the losing plaintiff in the case. The amount included over $2.8 million for “computer-assisted, algorithm-driven document review” and nearly $392,000 for contract attorneys to review documents identified by the algorithm as responsive.

We’re just getting started!  Tomorrow, we will cover cases related to production format disputes, search disputes and technology assisted review.  Stay tuned!

So, what do you think?  Did you miss any of these?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

He Sees You When You’re Sleeping — eDiscovery Trends

 

A recent post in the Law Librarians Blog illustrates not only the different ways in which personal data can be captured, but also the continued growth of devices that might contain that data.

In He Sees You When You’re Sleeping, He Knows When You’re Awake…, the authors discuss potential tracking of mouse movements, current data tracking on smart TVs and even the possibility for data to be kept and tracked on…your toothbrush:

  • An October story from Ars Technica discusses how Facebook is working on a way to log cursor movements, beyond tracking where someone clicks on a page to determine an ad’s effectiveness.  According to the Wall Street Journal, Facebook wants to pay attention to the areas a cursor lingers over, even without a click or other interaction.  And, if you’re using a mobile device, Facebook will still be noting when, for instance, “a user’s newsfeed is visible at a given moment on the screen of his or her mobile phone.”
  • Imagine if your toothbrush could keep track of your brushing habits?  According to ZDNet, Salesforce CEO Marc Benioff sees that happening.  “Everything is on the Net. And we will be connected in phenomenal new ways," said Benioff. Benioff highlighted how his toothbrush of the future will be connected. The new Philips toothbrush is Wi-Fi based and have GPS. "When I go into the dentist he won't ask if I brushed. He will say what's your login to your Philips account. There will be a whole new level of transparency with my dentist”.
  • One device that is already capturing your personal data is the smart TV, in some cases whether you want it or not.  A blogger in the U.K. has discovered that his LG smart TV sends details about his viewing habits back to LG servers.  Those habits also include the file names of items viewed from a connected USB stick.  There is a setting in the TV that purports to turn this behavior off (it’s on by default).  It doesn’t work as data is forwarded to LG no matter what the setting.  LG’s response to the disclosure was less than reassuring – “The advice we have been given is that unfortunately as you accepted the Terms and Conditions on your TV, your concerns would be best directed to the retailer,” the representatives wrote in a response to the blogger. “We understand you feel you should have been made aware of these T’s and C’s at the point of sale, and for obvious reasons LG are unable to pass comment on their actions.”

Nice.  Imagine a case where, in addition to hard drives and smart phones, data collectors need to perform collection on flatscreen TVs and toothbrushes?  If it sounds farfetched, remember that, several years ago, cell phones didn’t store data and texts didn’t even exist.

So, what do you think?  What is the most unusual device from which you’ve ever collected data?   Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Crispin v. Christian Audigier Inc. – eDiscovery Replay

Even those of us at eDiscovery Daily have to take an occasional vacation (see above); however, instead of “going dark” for the week, we thought we would use the week to do something interesting.  Up to this week, we have had 815 posts over 3+ years of the blog.  Some have been quite popular, so we thought we would “replay” the top four all-time posts this week in terms of page views since the blog began (in case you missed them).  Casey Kasem would be proud!  Until recently, this post was the most viewed of all time; with nearly 1,300 lifetime views, it is still the second most viewed post all time, originally published way back in December 2010.  Enjoy!

______________________________

Discoverability of social media content has been a big topic this year, with several cases addressing the issue, including this one, previously discussed on eDiscovery Daily.  The holiday week look back at cases concludes with Crispin v. Christian Audigier Inc., 2010 U.S. Dist. Lexis 52832 (C.D. Calif. May 26, 2010), which addresses whether ‘private’ data on social networks is discoverable.

This copyright infringement claim brought by artist Buckley Crispin against defendant and designer Christian Audigier, alleges that Audigier used artwork outside the scope of the original oral license between the parties and also sub-licensed the artwork to other companies and individuals (named as co-defendants) without Crispin’s consent.  The defendants served subpoenas on social media providers Facebook, MySpace, and Media Temple, directing them to turn over all communications between Crispin and Audigier, as well as any communications referencing the co-defendants.

Crispin sought to quash the subpoenas, arguing that they sought private electronic communications protected under the Stored Communications Act of 1986 (SCA), prohibiting Electronic Communication Services (ECS) and Remote Computing Services (RCS) providers from turning over those communications, but the motion was denied because Magistrate Judge John E. McDermott determined that Facebook, MySpace, and Media Temple did not qualify for protection from disclosure under the SCA.  Crispin moved for reconsideration with the U.S. District Court for the Central District of California.

District Court Judge Margaret Morrow’s decision partially reversed and partially vacated Judge McDermott’s order, finding that the SCA’s protections (and associated discovery preclusions) include at least some of the content hosted on social networking sites, including the private messaging features of social networking sites protected as private email.  She also concluded that because Facebook, MySpace, and Media Temple all provide private messaging or email services as well as electronic storage, they all qualify as both ECS and RCS providers, with appropriate SCA protections.

However, regarding Facebook wall postings and MySpace comments, Judge Morrow determined that there was insufficient evidence to determine whether these wall postings and comments constitute private communications as the user’s privacy settings for them were less clear and ordered a new evidentiary hearing regarding the portions of the subpoenas that sought those communications.

This opinion sets a precedent that, in future cases, courts may allow protection to social networking and web hosting providers from discovery based on SCA protections as ECS and RCS providers and may consider social media ESI protected, based on the provider’s privacy controls and the individual user’s privacy settings.

So, what do you think?  Is this the most significant eDiscovery case of 2010?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Rejects Defendant’s “Ultra-Broad” Request, Denies Motion to Compel Production – eDiscovery Case Law

 

In NOLA Spice Designs, LLC v. Haydel Enters., Inc., No. 12-2515 (E.D. La. Aug. 2, 2013), Louisiana Magistrate Judge Joseph C. Wilkinson, Jr. denied a motion to compel a plaintiff and its principal (a third-party defendant) to produce their passwords and usernames for all websites with potentially relevant information and to compel a forensic examination of its computers.

In this trademark infringement case under the Lanham Act, the defendant moved to compel the plaintiff and its principal to produce “‘passwords and user names to all online websites related to the issues in this litigation, including social media, weblogs, financial information and records,’” and to “submit their computers to an exhaustive forensic examination . . . with ‘access to full electronic content [including] online pages and bank accounts, including without limitation, online postings, weblogs, and financial accounts, for a time period from October 13, 2009 to the present, including deleted and archived content.”  

The plaintiff and its principal refused to disclose passwords and user names based on “privacy and confidentiality objections.”  While acknowledging that the defendant is correct in stating that “there is no protectable privacy or confidentiality interest in material posted or published on social media”, Judge Wilkinson noted that the defendant’s citation and arguments “miss the point”.  Judge Wilkinson stated that “ultra-broad request for computer passwords and user names poses privacy and confidentiality concerns that go far beyond published social media matters and would permit Haydel to roam freely through all manner of personal and financial data in cyberspace pertaining to” the plaintiff and its principal.

With regard to the request for forensic examination of the computers of the plaintiff and its principal, Judge Wilkinson acknowledged that such an examination is “within the scope of ESI discovery contemplated by Fed. R. Civ. P. 34(a)(1)(A).  However, “such requests are also subject to the proportionality limitations applicable to all discovery under Rule 26(b)(2)(C), including the prohibition of discovery that is unreasonably cumulative or duplicative or that could be obtained from some more convenient, less burdensome or less expensive source, or the benefit of which is outweighed by its burden or expense, when considering the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake and the importance of the proposed discovery to those issues.”  {emphasis added}

While “restrained and orderly computer forensic examinations” have been permitted when it’s been demonstrated that the producing party “has defaulted in its discovery obligations by unwillingness or failure to produce relevant information by more conventional means”, a party’s “mere skepticism that an opposing party has not produced all relevant information is not sufficient to warrant drastic electronic discovery measures”, added Judge Wilkinson.

As a result, Judge Wilkinson ruled that “this overly broad request seeking electronically stored information (ESI), which far exceeds the proportionality limits imposed by Fed. R. Civ. P. 26(b)(2)(C) – expressly made applicable to ESI by Rule 26(b)(2)(B) – is denied.” {emphasis added}

So, what do you think?  Did the defendant’s request exceed proportionality limits?   Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Daily is Three Years Old!

We’ve always been free, now we are three!

It’s hard to believe that it has been three years ago today since we launched the eDiscoveryDaily blog.  We’re past the “terrible twos” and heading towards pre-school.  Before you know it, we’ll be ready to take our driver’s test!

We have seen traffic on our site (from our first three months of existence to our most recent three months) grow an amazing 575%!  Our subscriber base has grown over 50% in the last year alone!  Back in June, we hit over 200,000 visits on the site and now we have over 236,000!

We continue to appreciate the interest you’ve shown in the topics and will do our best to continue to provide interesting and useful posts about eDiscovery trends, best practices and case law.  That’s what this blog is all about.  And, in each post, we like to ask for you to “please share any comments you might have or if you’d like to know more about a particular topic”, so we encourage you to do so to make this blog even more useful.

We also want to thank the blogs and publications that have linked to our posts and raised our public awareness, including Pinhawk, Ride the Lightning, Litigation Support Guru, Complex Discovery, Bryan College, The Electronic Discovery Reading Room, Litigation Support Today, Alltop, ABA Journal, Litigation Support Blog.com, Litigation Support Technology & News, InfoGovernance Engagement Area, EDD Blog Online, eDiscovery Journal, Learn About E-Discovery, e-Discovery Team ® and any other publication that has picked up at least one of our posts for reference (sorry if I missed any!).  We really appreciate it!

As many of you know by now, we like to take a look back every six months at some of the important stories and topics during that time.  So, here are some posts over the last six months you may have missed.  Enjoy!

Rodney Dangerfield might put it this way – “I Tell Ya, Information Governance Gets No Respect

Is it Time to Ditch the Per Hour Model for Document Review?  Here’s some food for thought.

Is it Possible for a File to be Modified Before it is Created?  Maybe, but here are some mechanisms for avoiding that scenario (here, here, here, here, here and here).  Best of all, they’re free.

Did you know changes to the Federal eDiscovery Rules are coming?  Here’s some more information.

Count Minnesota and Kansas among the states that are also making changes to support eDiscovery.

By the way, since the Electronic Discovery Reference Model (EDRM) annual meeting back in May, several EDRM projects (Metrics, Jobs, Data Set and the new Native Files project) have already announced new deliverables and/or requested feedback.

When it comes to electronically stored information (ESI), ensuring proper chain of custody tracking is an important part of handling that ESI through the eDiscovery process.

Do you self-collect?  Don’t Forget to Check for Image Only Files!

The Files are Already Electronic, How Hard Can They Be to Load?  A sound process makes it easier.

When you remove a virus from your collection, does it violate your discovery agreement?

Do you think that you’ve read everything there is to read on Technology Assisted Review?  If you missed anything, it’s probably here.

Consider using a “SWOT” analysis or Decision Tree for better eDiscovery planning.

If you’re an eDiscovery professional, here is what you need to know about litigation.

BTW, eDiscovery Daily has had 242 posts related to eDiscovery Case Law since the blog began!  Forty-four of them have been in the last six months.

Our battle cry for next September?  “Four more years!”  🙂

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Can You Figure Out How I Wrote this Blog Post? – eDiscovery Trends

I have to be honest, this blog post contains quite a bit of content from one of the early posts from this blog.  However, there is something different about this version of the content – it looks a bit unusual.  Can you figure out how I wrote it?  See if you can figure it out before you get to the bottom.  I promise I haven’t lost my mind.

Types of exceptions file

It’s important to note that efforts to quote fix quote these files will often change the files parentheses and the meta data associated with them parentheses, so it’s important to establish with opposing counsel what measures to address the exceptions are acceptable. Some files may not be recoverable and you need to agree up front how far to go to attempt to recover them.

  • Corrupted files colon files can become corrupted 4 a variety of reasons, from application failures 2 system crashes to computer viruses. I recently had a case where 40 percent of the collection what’s contained in to corrupt Outlook PST file dash fortunately, we were able to repair those files and recover the messages. If you have read Lee accessible backups of the files, try to restore them from backup. If not, you will need to try using a repair utility. Outlook comes with a utility called scan PST. Exe that scans and repairs PST and OST file, and there are utilities parenthesis including freeware utilities parenthesis available via the web foremost file types. If all else fails, you can hire a-data recovery expert, but that can get very expensive.
  • Password protected files colon most collections usually contain at least some password protected files. Files can require a password to enable them to be edited, or even just to view them. As the most popular publication format, PDF files are often password protected from editing, but they can still be feud 2 support review parenthesis though some search engines May fail to index them parenthesis. If a file is password protected, you can try to obtain the password from the custodian providing the file dash if the custodian is unavailable or unable to remember the password, you can try a password cracking application, which will run through a series of character combinations to attempt to find the password. Be patient, it takes time, and doesn’t always succeed.
  • Unsupported file types corn in most collections, there are some unusual file types that art supported by the review application, such as file for legacy or specialized applications parenthesis E. G. AutoCAD for engineering drawing parenthesis. You may not even initially no what type of files they are semi colon if not, you can find out based on file extension by looking the file extension up in file ext. If your review application can’t read the file, it also can’t index the files for searching or display them 4 review. If those file maybe responses 2 discovery requests, review them with the natives application to determine they’re relevancy.
  • No dash text file colon files with no searchable text aren’t really exceptions dash they have to be accounted for, but they won’t be retrieved in searches, so it’s important to make sure they don’t quote slip through the cracks unquote. It’s common to perform optical character recognition parenthesis Boosie are parenthesis on Tiff files and image only PDF files, because they are common document 4 minutes. Other types of no text files, such as pictures in JTAG or PNG format, are usually not oser, unless there is an expectation that they will have significant text.

Did you figure it out?  I “dictated” the above content using speech-to-text on my phone, a Samsung Galaxy 3.  I duplicated the formatting from the earlier post, but left the text the way that the phone “heard” it.  Some of the choices it made were interesting: it understands “period” and “comma” as punctuation, but not “colon”, “quote” or “parenthesis”.  Words like “viewed” became “feud”, “readily” became “read Lee” and “OCR” became “Boosie are”.  It also often either dropped or added an “s” to words that I spoke.

These days, more ESI is discoverable from sources that are non-formalized, including texts and “tweets”.  Acronyms and abbreviations (and frequent misspelling of words) is common in these data sources (whether typed or through bad dictation), which makes searching them for responsive information very challenging.  You need to get creative when searching these sources and use mechanisms such as conceptual clustering to group similar documents together, as well as stemming and fuzzy searching to find variations and misspellings of words.

Want to see the original version of the post?  Here it is.

So, what do you think?  How do you handle informal communications, like texts and “tweets”, in your searching of ESI?   Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiff Needs More Than “Mere Hope” to Discover Defendant’s Personal Info – eDiscovery Case Law

We’ve seen several cases where social media or personal data was requested – with some requests granted (including this one, this one, this one, this one and this one) and other requests denied (including this one, this one, this one and this one).  Here is another recent case where the request was denied.

In Salvato v. Miley, No. 5:12-CV-635-Oc-10PRL (M.D. Fla. June 11, 2013), a wrongful death action, Florida Magistrate Judge Philip R. Lammens denied the plaintiff’s motion to compel the defendant’s responses to discovery requests “based on Plaintiff’s very limited showing as to the relevance of the requested discovery and the broadly drafted discovery requests”.

In this case, the plaintiff sued two police officers for causing their son’s death by using excessive force and failing to provide medical treatment. During discovery, the plaintiff filed a motion to compel one officer’s responses to the discovery requests. The interrogatories in question sought information about the defendant’s cell phone numbers, e-mail addresses, social media accounts, and list-serve or message board membership. The contested requests for production sought cell phone records, including all text messages; e-mails; social media messages and other communications; and comments made on websites or message boards that related to the allegations in the plaintiff’s complaint. The defendant objected, arguing that the requests sought confidential information and invaded his privacy, sought irrelevant information and amounted to a fishing expedition, and were intended to annoy, embarrass, and oppress him.

Judge Lammens found the plaintiff “failed to make a threshold showing that the requested information is reasonably calculated to lead to the discovery of admissible evidence.” The plaintiff’s argument in support of the relevancy of the requests was that they seek “‘information about statements that Defendant Brown made about the incident at issue in this case, which could include admissions against interest, and could certainly lead to the discovery of admissible evidence.’” Judge Lammens ruled that the “mere hope” that the texts, e-mails, and other communications might contain an admission is not enough to allow the plaintiff “open access to [the defendant’s] private communications with third parties.” Accordingly, the judge rejected the plaintiff’s attempt “to conduct ‘a fishing expedition’” because he did “‘not have a generalized right to rummage at will through information that Plaintiff has limited from public view.’”

So, what do you think?  Should the motion to compel have been granted?   Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Compels Discovery of Plaintiff’s Facebook Posts as Relevant – eDiscovery Case Law

In Moore v. Miller, No.: 10-cv-651-JLK, 2013 (D. Colo. June 6, 2013), Colorado Senior District Judge John L. Kane ruled (over the plaintiff’s privacy objections) that the plaintiff’s Facebook posts and activity log must be produced because they related to his claims of physical injury and emotional distress and because the plaintiff put his posts directly at issue by discussing the incident giving rise to the lawsuit online.

In this case, the defendants filed a motion to enforce the court’s order to compel the plaintiff’s production of “writings related to his arrest, his tax records, and his employment records.” As part of those writings, the defendants asked for his Facebook records and activity log and documents he posted on his websites. The defendants claimed that the plaintiff did not comply because he only partially produced writings, including “‘an incomplete and highly-redacted printout of Plaintiff’s Facebook wall posts’” and he did not produce an activity log.

The plaintiff relied on his interpretation of “about his arrest” to narrow the scope of the order compelling production. The court remarked that narrowing the scope to this extent would “exclude writings relevant to the arrest such as writings relating to Mr. Moore’s bias, emotional and physical states before and after the arrest and his alleged physical and mental injuries.” Moreover, the court noted that the defendants’ request for Facebook information extended to “all of his missing Facebook posts” and the activity log.

The plaintiff argued that this expanded scope sought irrelevant evidence and would invade his privacy. But the court found the plaintiff’s allegations of physical injury and emotional distress warranted a more in-depth review of his social media account. His “Facebook activity is relevant to his claims of emotional pain and suffering (for which he claims $750,000 in damages) as well as his claims of physical pain ($750,000) and humiliation ($500,000).” Moreover, the plaintiff “reputedly has chosen to share his version of events online often and in many different forums, including detailed and specific descriptions of what he alleges happened to him on March 25, 2008, as well as the injuries he allegedly suffers to this day.” {emphasis added}

Although the plaintiff requested that the data be reviewed in camera, the court found its protective order would protect the plaintiff’s privacy.

The court also granted the defendants’ motion for attorneys’ fees related to the motion, noting “how unfortunate it is that the parties’ differing interpretations about the scope of ordered discovery spawned a chain of hostile emails and ultimately the instant motion. Where the nature or scope of an Order is contested, the best course of action is for the disputing parties jointly to file a motion for clarification.” In addition, the motion sought the defendant’s current address, tax returns, and employment history: “No party should have to resort to motion practice to obtain information as elemental as a party opponent’s address.”

So, what do you think?  Was the judge right to allow discovery of the plaintiff’s Facebook information?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Appellate Court Denies Sanctions for Routine Deletion of Text Messages – eDiscovery Case Law

In PTSI, Inc. v. Haley, No. 684 WDA 2012, 2013 Pa. Super. (Pa. Super. Ct. May 24, 2013), the appellate court denied a motion for spoliation sanctions where the defendants routinely deleted text messages and other data to “clean up” their personal electronic devices: the volume of messages and limited amount of phone storage made it difficult to retain all data and still use the phone for messaging.

Here, the plaintiff filed claims of conversion, breach of the duty of loyalty, and breach of fiduciary duty against its former at-will employees and their new competing business. The trial court dismissed all claims at summary judgment. It also denied PTSI’s motion seeking sanctions for spoliation, because the deletion of electronically stored information, including text messages, was not relevant to the summary judgment decision.

During discovery, PTSI filed a motion seeking sanctions based on its two former employees’ deletion of electronic records from their computers and phones, including text messages. The company claimed the information was “vital to the prosecution of this case” and could not be “feasibly reconstructed or retrieved without enormous time and expense to PTSI, if at all.”

Under Pennsylvania law, the court had to evaluate three factors to determine the appropriate sanction: “(1) the degree of fault of the party who altered or destroyed the evidence; (2) the degree of prejudice suffered by the opposing party; and (3) whether there is a lesser sanction that will avoid substantial unfairness to the opposing party and, where the offending party is seriously at fault, will serve to deter such conduct by others in the future.”

To determine the level of fault, the court considered the extent of the duty to preserve the evidence, based on whether litigation is foreseeable and whether the evidence might be prejudicial to the opposing party, and whether the evidence was destroyed in bad faith. The court also considered proportionality in making decisions, including five factors spelled out in the comments to the Pennsylvania Rules of Civil Procedure:

  • the nature and scope of the litigation, including the importance and complexity of the issues and the amounts at stake;
  • the relevance of electronically stored information and its importance to the court’s adjudication in the given case;
  • the cost, burden and delay that may be imposed on the parties to deal with electronically stored information;
  • the ease of producing electronically stored information and whether substantially similar information is available with less burden; and
  • any other factors relevant under the circumstances.

Here, the amount in controversy and the importance of the issues involving the data did not support awarding a discovery sanction. Moreover, PTSI could not show that its former employees’ “innocent clean up of personal electronic devices to allow them to function was unusual, unreasonable or improper under the circumstances.” Because the defendants “routinely deleted text messages, often on a daily basis, so as not to unduly encumber their iPhones” and because of “the volume of text messages that are frequently exchanged by cell phone users and the limited amount of storage on cell phones, it would be very difficult, if not impossible, to save all text messages and to continue to use the phone for messaging.” Furthermore, the order of preservation was entered well after any relevant data would have already been created and deleted. In addition, similar information was available from other sources and custodians; the forensic examiner in the case unearthed more than 1,000 e-mails from the employees’ computers. Finally, any spoliation inference could not defeat the summary judgment motion.

The appellate court agreed with the trial court’s reasoning and found no abuse of discretion.

So, what do you think?  Should the sanctions have been granted?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Just a Reminder to Think Before You Hit Send – eDiscovery Best Practices

With Anthony Weiner’s announcement that he is attempting a political comeback by running for mayor on New York City, it’s worth remembering the “Twittergate” story that ultimately cost his congressional seat in the first place – not to bash him, but to remind all of us how important it is to think before you hit send (even if he did start his campaign by using a picture of Pittsburgh’s skyline instead of NYC’s — oops!).  Here is another reminder of that fact.

Chili’s Waitress Fired Over Facebook Post Insulting ‘Stupid Cops’

As noted on jobs.aol.com, a waitress at an Oklahoma City Chili’s posted a photo of three Oklahoma County Sheriff’s deputies on her Facebook page along with the comment: “Stupid Cops better hope I’m not their server FDP.” (A handy abbreviation for F*** Da Police.)

The woman, Ashley Warden, might have had reason to hold a grudge against her local police force. Last year she made national news when her potty-training toddler pulled down his pants in his grandmother’s front yard, and a passing officer handed Warden a public urination ticket for $2,500. (The police chief later apologized and dropped the charges, while the ticketing officer was fired.)

Nonetheless, Warden’s Facebook post quickly went viral on law enforcement sites and Chili’s was barraged with calls demanding that she be fired. Chili’s agreed. “With the changing world of digital and social media, Chili’s has Social Media Guidelines in place, asking our team members to always be respectful of our guests and to use proper judgement when discussing actions in the work place …,” the restaurant chain said in a statement. “After looking into the matter, we have taken action to prevent this from happening again.”

Best Practices and Social Media Guidelines

Another post on jobs.aol.com discusses some additional examples of people losing their jobs for Facebook posts, along with six tips for making posts that should keep you from getting fired, by making sure the posts would be protected by the National Labor Relations Board (NLRB), which is the federal agency tasked with protecting employees’ rights to association and union representation.

Perhaps so, though, as the article notes, the NLRB “has struggled to define how these rights apply to the virtual realm”.  It’s worth noting that, in their statement, Chili’s referred to violation of their social media guidelines as a reason for the termination.  As we discussed on this blog some time ago, having a social governance policy in place is a good idea to govern use of outside email, chat and social media that covers what employees should and should not do (and the post identified several factors that such a policy should address).

Thinking before you hit send in these days of pervasive social media means, among other things, being familiar with your organization’s social media policies and ensuring compliance with those policies.  If you’re going to post anything related to your job, that’s important to keep in mind.  To think before you hit send also involves educating yourself as to what you should and should not do when posting to social media sites.

Of course it’s also important to remember that social media factors into discovery more than ever these days, as these four cases (just from the first few months of this year) illustrate.

So, what do you think?  Does your organization have social media guidelines?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Daily will return after the Memorial Day Holiday.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.