eDiscovery

Home Depot’s “Extremely Broad” Request for Social Media Posts Denied – eDiscovery Case Law

 

In Mailhoit v. Home Depot, CV 11 03892 DOC (SSx) (C.D. Cal.; Sept. 7, 2012), Magistrate Judge Suzanne Segal ruled that the three out of four of the defendant’s discovery requests failed Federal Rule 34(b)(1)(A)’s “reasonable particularity” requirement, were, therefore, not reasonably calculated to lead to the discovery of admissible evidence and were denied.

Case Background

The plaintiff had been a manager of the defendant's store in Burbank, California, and filed a suit against her employer after being fired, charging unlawful discrimination based on gender, as well as failure to accommodate her known physical disability.  The plaintiff testified at her deposition that she suffers from post traumatic stress disorder, depression and isolation, and has cut herself off from communication with friends because of Defendant’s alleged wrongdoing.  The defendant argued “that it is entitled to Plaintiff’s communications posted on social networking sites (“SNS”) such as Facebook and LinkedIn to test Plaintiff’s claims about her mental and emotional state.”

Defendant’s Motion to Compel

The defendant filed a Motion to Compel Further Responses to Defendant’s Request for Production of Documents, which included a request for (among other things):

“Any profiles, postings or messages (including status updates, wall comments, causes joined, groups joined, activity streams, blog entries) from social networking sites from October 2005(the approximate date Plaintiff claims she first was discriminated against by Home Depot), through the present, that reveal, refer, or relate to any emotion, feeling, or mental state of Plaintiff, as well as communications by or from Plaintiff that reveal, refer, or relate to events that could reasonably be expected to produce a significant emotion, feeling, or mental state”.

The defendant also requested “[t]hird-party communications to Plaintiff that place her own communications in context”, “[a]ll social networking communications between Plaintiff and any current or former Home Depot employees” and any pictures posted to the plaintiff’s profile or otherwise linked via tagging.

Judge Rules against Defendant in Three of Four Categories

Judge Segal noted that “while a party may conduct discovery concerning another party’s emotional state, the discovery itself must still comply with the general principles underlying the Federal Rules of Civil Procedure that govern discovery.  A court can limit discovery if it determines, among other things, that the discovery is…unreasonably cumulative or duplicative”.  Since Rule 34(b) requires the requesting party to describe the items to be produced with “reasonable particularity”, Judge Segal ruled that “three of the four categories of SNS communications sought by Defendant fail Rule 34(b)(1)(A)’s ‘reasonable particularity’ requirement”, only granting the defendant’s request for social networking communications between Plaintiff and any current or former Home Depot employees.

So, what do you think?  Should the defendant’s requests have been denied, or were they “unreasonably cumulative”?  Please share any comments you might have or if you’d like to know more about a particular topic.

Thanks to the Ride the Lightning blog for the tip on this case!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Inadvertent Disclosure? Got Clawback? – eDiscovery Best Practices

 

As discovery becomes more complex and voluminous, it seems as though we’re seeing more and more cases where inadvertent disclosures of privileged documents are becoming more common.  In just the past couple of months, we’ve discussed two cases on this blog, where the producing parties were forced to waive privilege of those documents when they failed the now popular five factor test to determine whether an inadvertent disclosure entitles the producing party to have the documents returned.  Perhaps if they had a well-defined “clawback” agreement, the results would have been different?

What is a “Clawback” Agreement?

A clawback agreement enables the parties in a case to agree – in advance – that if privileged documents are inadvertently produced during discovery, privilege on those documents won’t be waived. The inadvertently produced documents are instead returned to the producing party, or destroyed by the receiving party – either way, they are not used by the receiving party.  As part of that agreement, each party is able to identify documents that it has inadvertently produced and request that they be returned or destroyed by the opposing party.  Per the clawback agreement, the opposing party agrees to comply with that request and not make a claim of waiver.

Protection of Waiver under FRE 502

Federal Rule of Evidence 502 (FRE 502) was enacted in 2008 to provide additional reassurances for parties dealing with the problem of inadvertent waiver.  Under FRE 502, inadvertent disclosure of privileged material does not operate as a waiver if three conditions are met:

  • The disclosure is inadvertent
  • The holder of the privilege took reasonable steps to prevent disclosure
  • The holder promptly took reasonable steps to rectify the error

What a Clawback Agrement Should Include

To promote compliance with the three conditions, the clawback agreement should address each one, clearly stating that inadvertent production of privileged material will not waive privilege, and addressing the steps that should be taken to avoid inadvertent disclosure, as well as to rectify the error, if such inadvertent disclosure occurs.  The definition of “reasonable steps” in each case is in the eye of the beholder, so it’s a good idea to establish and agree on specific steps, if possible.  The clawback agreement should also clearly define the procedure to be followed if assertion of privilege is disputed.

Because of FRE 502, if a clawback agreement is incorporated into a protective order entered by the court early in the case, it ensures court approval of the process in case there are disagreements and is binding on the parties, including third parties.  If you can’t agree on the terms of the clawback agreement with the opposing party early in the case and establishing the protection that it affords is important, you may need to file a motion with the court to get a clawback order entered.

So, what do you think?  Do your cases typically include a court-filed clawback agreement?  Have those agreements ever been used to protect inadvertently disclosed privileged information?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiffs Should Pay for Extensive Discovery Prior to Class Certification – eDiscovery Case Law

 

Have you ever joined a health club, then later tried to cancel your membership?  Did the health club make it easy to do so?  If not, then this case is for you.

In Boeynaems v. LA Fitness International, LLC, No. 10-2326, 2012 U.S. Dist. (E.D. Pa. Aug. 16, 2012), Pennsylvania District Judge Michael Baylson held that “where (1) class certification is pending and (2) the plaintiffs have asked for very extensive discovery, compliance with which will be very extensive, that absent compelling equitable circumstances to the contrary, the plaintiffs should pay for the discovery they seek . . . . Where the burden of discovery expense is almost entirely on the defendant, principally because the plaintiffs seek class certification, then the plaintiffs should share the costs.”

This case emerged from two separate claims filed by plaintiffs who claimed they “encountered deception and breaches concerning their desire to terminate their membership” with the national gym chain LA Fitness. The two cases were consolidated, and the plaintiffs were seeking class certification so that other plaintiffs could join the suit.

After recounting the discovery history between the parties, Judge Baylson noted that this case arose because of an unresolved dispute, including who should bear the cost of continued discovery. To produce ESI requested by the plaintiffs, LA Fitness approximated it would cost the company hundreds of thousands of additional dollars. LA Fitness had already incurred expenses for discovery tasks previously undertaken, including the review of thousands of e-mails, review of “(1) over 500,000 Member Notes from five states for 30 months looking for certain terms, (2) over 1,000 boxes of cancellation requests, of which Plaintiffs reviewed only 70 boxes, (3) over 19,000 pages of documents, and (4) an electronic search of over 32,000 e-mails, maintained by five custodians.” Moreover, LA Fitness asserted that its review of “a sampling of these Member Notes has exhibited only an extremely small proportion with any evidence probative of Plaintiffs’ claims.”

Judge Baylson pointed out that as a result of the extensive review already undertaken by LA Fitness, the plaintiffs had already “already amassed, mostly at Defendant’s expense, a very large set of documents that may be probative as to the class action issue.” In fairness, Judge Baylson concluded that the costs should now shift to the plaintiffs: “In other words, given the large amount of information defendant has already provided, plaintiffs need to assess the value of additional discovery for their class action motion. If plaintiffs conclude that additional discovery is not only relevant, but important to proving that a class should be certified, then plaintiffs should pay for that additional discovery from this date forward, at least until the class action determination is made.” Also, “if the plaintiffs have confidence in their contention that the court should certify the class, then the plaintiffs should have no objection to making an investment.” Moreover, Judge Baylson noted its counsel could afford the investment, as the plaintiffs were represented by “the very successful and well-regarded Philadelphia firm of Berger & Montague. . . . If the Berger & Montague firm believes that this case is meritorious, it has the financial ability to make the investment in discovery.”

Therefore, for production of any requested documents going forward, the plaintiffs were found to have the responsibility for bearing the costs.

So, what do you think?  Should the plaintiffs pay for additional discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Proper Wildcard Searching: Why You Should Give a Dam* – eDiscovery Best Practices

 

When we launched eDiscoveryDaily over two years ago, I relayed a story where I provided search strategy assistance to a client that had already agreed upon several searches with opposing counsel.  One search related to mining activities, so the attorney decided to use a wildcard of “min*” to retrieve variations like “mine”, “mines” and “mining”.  That one search retrieved over 300,000 files with hits.

Why?  Because there are 269 words in the English language that begin with the letters “min”.  Words like “mind”, “mingle”, “minimal”, “miniscule” and “minutia” were all being retrieved in this search for files related to “mining”.  We ultimately had to go back to opposing counsel and negotiate a revised search that was more appropriate.

Recently, I encountered another client, who was trying to use “dam*” to retrieve variations of “damage” and “damages”.  Unfortunately, they also retrieved “dame”, “damp” and, well, “damn”.  There are 86 total words in the English language that begin with the letters “dam”.  Darn it!

Methods to Retrieve the Correct Wildcard Variations

In that blog post, I talked about the benefits of stem searching (if your application’s search engine supports stem searches) to capture the specific variations of a word (like “mine” or “damage”) and Morewords.com, which shows list of words that begin with your search string.  For example, to get all 269 words beginning with “min”, go here.  Substitute any characters for “min” in the URL to see the words that start with those characters.  Choose the variations you want and incorporate them into the search instead of the wildcard – i.e., use “(mine or “mines or mining)” instead of “min*” to retrieve a more precise result set without sacrificing recall.  Personally, I almost never use wildcards – I prefer to identify the variations and just use them, it’s more precise.

Introducing Spelling Variations into the Mix

The above approaches assume that words are spelled correctly in the collection – if they are not, those misspellings won’t be retrieved.  Misspellings can include Optical Character Recognition (OCR) errors, where the OCR application fails to render all words read from an image file with 100% accuracy (this is common, especially when the resolution of the image is less than optimal).  So, you can get “words” in the collection such as “min1ng” or “MININ6”.

To combat this, you’ll need to identify the variations of the terms you wish to use, then you can use a search tool like CloudNine Discovery’s Early Case Assessment application, (FirstPass®, powered by Venio FPR™), that supports "fuzzy" searching, which is a mechanism by finding alternate words that are close in spelling to the word you're looking for (usually one or two characters off).  FirstPass will display all of the words – in the collection – close to the word you’re looking for, so if you’re looking for “mining”, you can find variations such as “min1ng”, “MININ6” or even “minig” – that could be relevant.  Then, simply select the variations you wish to include in the search.  You’ll need to repeat this for each of the variations of the terms you wish to use, but it will enable you to pick up those misspellings and OCR errors to ensure completeness.

So, what do you think?  Do you use wildcards in your searches?  Are you sure you’re getting just the terms you want?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Another Disclosure of Privileged Documents Fails the Five Factor Test – eDiscovery Case Law

 

In Inhalation Plastics, Inc. v. Medex Cardio-Pulmonary, Inc., 2:07-CV-116 (N.D. Ohio), Ohio Magistrate Judge Norah McCann King found that the defendant had waived the attorney-client privilege was waived for 347 emails inadvertently produced, because they failed all factors in the five factor test to determine whether the inadvertent disclosure entitles the producing party to the return of the documents in question.

Background of Inadvertent Disclosure

In a breach of contract lawsuit, the defendant produced 7,500 hard copy pages including 347 pages of emails (4.6% of the total) for which legal personnel were senders or recipients. The defendant did not assert privilege on any of the 347 pages of emails until the plaintiff sought to depose those legal personnel. As a result of the defendant seeking to assert privilege on those emails, the plaintiff filed a motion for a determination that the documents are not privileged and submitted them for in camera review.

Five Factor Test

Noting that the producing party has the burden to prove that the disclosure of privileged documents was truly inadvertent, Judge King referenced the now popular five factor test to determine whether an inadvertent disclosure entitles the producing party to have the documents returned, as follows:

“(1) the reasonableness of precautions taken in view of the extent of document production, (2) the number of inadvertent disclosures, (3) the magnitude of the disclosure, (4) any measures taken to mitigate the damage of the disclosures, and (5) the overriding interests of justice.”

Analysis of Factors

With regard to the first factor, despite the fact that the defendant claimed that this production “was reviewed by several layers of attorneys who isolated the privileged documents and prepared for electronic production in the same way” as their previous productions, Judge King noted that the defendant did not specify “who reviewed the production, what steps were taken to review the documents for privilege or whether the production was different in form from prior productions” and noted that no privilege log was produced.  As a result, Judge King found that the defendant failed the first factor.

With regard to the second factor, Judge King compared the rate of disclosure of privileged documents in this case (4.6% of the total) to two other cases where privilege was also waived (134 out of 10,085 pages and 93 documents out of 15,000 documents respectively) and found the number of disclosures to be “relatively high”, so the defendant failed the second factor.

Regarding the third factor, the fact that the documents appeared to be relevant to the plaintiff's claims and they attempted to use them in depositions caused the defendant to fail the third factor.

On the fourth factor, the defendant did immediately invoke privilege when it discovered that the documents had been inadvertently produced.  However, they did not follow the procedure in Federal Rule of Civil Procedure 26(b)(5)(B), which requires:

“If information produced in discovery is subject to a claim of privilege . . . the party making the claim may notify any party that received the information of the claim and the basis for it. After being notified, a party . . . may promptly present the information to the court under seal for a determination of the claim. The producing party must preserve the information until the claim is resolved.”

As Judge King noted, “Medex did not identify any particular documents covered by the privilege, did not provide a proper privilege log and, beyond conclusory statements, Medex did not state a basis for the claimed privilege.”  So, they failed the fourth factor.

At this point, if this was a boxing match, it would be stopped.  In granting the plaintiff’s motion, Judge King stated: “To summarize, the Court finds that Medex did not take reasonable precautions to protect its privileged information, the number of documents disclosed is significant, no privilege log was provided at the time of disclosure, the contents of some of the documents may be relevant to the heart of the dispute, and Medex made insufficient attempts to mitigate its damage even after it learned of the disclosure.”

So, what do you think?  What do you to ensure your firm will pass the five factor test for inadvertent disclosures of privileged documents?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Acquisitions: Industry Consolidation Continues

 

If you think there have been a lot of acquisitions in the eDiscovery industry, you’re right.  Now, thanks to Rob Robinson and his Complex Discovery blog, you can get a sense of just how many acquisitions there have been.  Rob has provided a post showing 10 Years of eDiscovery Mergers, Acquisitions and Investments.

While Rob acknowledges that it’s a “non-comprehensive overview” of “key and publicly announced eDiscovery related mergers, acquisitions and investments since 2002”, he does provide 133 of them in the list – dating all the way back to April of 2002 when Kroll and Ontrack became one company.  For each, he provides the announcement date, acquired company, acquiring or investing company and acquisition amount (if known).  The early years (2002-2005) only have ten entries total, so there could certainly (and understandably) be some early years acquisitions unaccounted for.  Nonetheless, a few observations:

  • Since the beginning of 2010, there have been at least 79 mergers, acquisitions and investments (over half the list).  There have been 5 acquisitions (and one investment) since the beginning of August alone.
  • What is the largest acquisition on the list (based on those that show reported acquisition amounts)?  If you said the HP acquisition of Autonomy in August of last year ($11.7 billion), you’d be wrong.  The largest acquisition on the list is Symantec’s purchase of Veritas software way back in December of 2004 ($13.5 billion).  Veritas had made its own acquisition of KVS less than 10 months earlier.
  • The company with the most acquisitions on the list is Huron, with 6 acquisitions.  Close on their heels is Symantec (5 acquisitions), LexisNexis (4 acquisitions), Thomson Reuters (4 acquisitions, when they acquired LiveNote back in 2006, they were still known as Thomson) and Autonomy (4 acquisitions, then acquired themselves by HP last year).
  • Just because you’ve been acquired once doesn’t mean you can’t be acquired again.  Applied Discovery, Black Letter Discovery, CaseLogistix, CT Summation and Kroll were all acquired twice during this span and Daticon was acquired three times!
  • Think a major, long term software company can’t be acquired?  Two products that have been around for decades, Summation and Concordance, have each been acquired in the past decade – Summation twice (by Wolters Kluwer in 2004 and AccessData in 2010).
  • Think that eDiscovery is only for specialized companies?  Think again.  Heavyweights such as HP (3 acquisitions), Computer Associates (3 acquisitions), IBM (2 acquisitions), Deloitte (2 acquisitions) and Microsoft (1 acquisition) all acquired eDiscovery companies over the last 10 years.

Thanks, Rob, for such an informative compilation of eDiscovery acquisitions, mergers and investments!

So, what do you think?  Do you think eDiscovery consolidation will continue at this pace?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Twitter Loses Appeal in People v. Harris

 

As reported in the Gibbons E-Discovery Law Alert blog, Twitter filed an appeal of the trial court’s decision in People v. Harris with the Appellate Division, First Department in New York, arguing that Twitter users have the right to quash subpoenas pursuant to Twitter’s terms of service agreement as well as because defendants’ constitutional rights are implicated by a government-issued subpoena to a third party.  Unfortunately for Twitter, it didn’t take long for the appellate court panel to rule, as they denied Twitter’s motion for a stay of enforcement of the Trial Court’s order to produce Malcolm Harris’s tweets last week.

Attempts to Quash the Subpoena Fail

Back in April, Harris, an Occupy Wall Street activist facing criminal charges, tried to quash a subpoena seeking production of his Tweets and his Twitter account user information in his New York criminal case.  That request was rejected, so Twitter then sought to quash the subpoena themselves, claiming that the order to produce the information imposed an “undue burden” on Twitter and even forced it to “violate federal law”.

Then, on June 30, New York Criminal Court Judge Matthew Sciarrino Jr. ruled that Twitter must produce tweets and user information of Harris, noting: “If you post a tweet, just like if you scream it out the window, there is no reasonable expectation of privacy. There is no proprietary interest in your tweets, which you have now gifted to the world. This is not the same as a private email, a private direct message, a private chat, or any of the other readily available ways to have a private conversation via the internet that now exist…Those private dialogues would require a warrant based on probable cause in order to access the relevant information.”  Judge Sciarrino indicated that his decision was “partially based on Twitter's then terms of service agreement”, which was subsequently modified to add the statement “You Retain Your Right To Any Content You Submit, Post Or Display On Or Through The Service.”

Twitter Continues to Fight Ruling

After the ruling, the New York District Attorney filed an order for Twitter to show cause as to why they should not be held in contempt for failure to produce the tweets. Twitter responded by seeking the stay of enforcement pending the appeal.  Last week, Twitter was given a deadline by the Trial Court during a hearing on the District Attorney’s motion to produce Harris’s information by Friday September 14 or face a finding of contempt. Judge Sciarrino even went so far as to warn Twitter that he would review their most recent quarterly financial statements in determining the appropriate financial penalty if Twitter did not obey the order.

So, what do you think?  With the appeal denied, will Twitter finally produce the plaintiff’s information?  What impact does this case have on future subpoenas of Twitter user information?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Quality Control, Making Sure the Numbers Add Up

 

Yesterday, we wrote about tracking file counts from collection to production, the concept of expanded file counts, and the categorization of files during processing.  Today, let’s walk through a scenario to show how the files collected are accounted for during the discovery process.

Tracking the Counts after Processing

We discussed the typical categories of excluded files after processing – obviously, what’s not excluded is available for searching and review.  Even if your approach includes a technology assisted review (TAR) methodology such as predictive coding, it’s still likely that you will want to do some culling out of files that are clearly non-responsive.

Documents during review may be classified in a number of ways, but the most common ways to classify documents as to whether they are responsive, non-responsive, or privileged.  Privileged documents are also typically classified as responsive or non-responsive, so that only the responsive documents that are privileged need be identified on a privilege log.  Responsive documents that are not privileged are then produced to opposing counsel.

Example of File Count Tracking

So, now that we’ve discussed the various categories for tracking files from collection to production, let’s walk through a fairly simple eMail based example.  We conduct a fairly targeted collection of a PST file from each of seven custodians in a given case.  The relevant time period for the case is January 1, 2010 through December 31, 2011.  Other than date range, we plan to do no other filtering of files during processing.  Duplicates will not be reviewed or produced.  We’re going to provide an exception log to opposing counsel for any file that cannot be processed and a privilege log for any responsive files that are privileged.  Here’s what this collection might look like:

  • Collected Files: 101,852 – After expansion, 7 PST files expand to 101,852 eMails and attachments.
  • Filtered Files: 23,564 – Filtering eMails outside of the relevant date range eliminates 23,564 files.
  • Remaining Files after Filtering: 78,288 – After filtering, there are 78,288 files to be processed.
  • NIST/System Files: 0 – eMail collections typically don’t have NIST or system files, so we’ll assume zero files here.  Collections with loose electronic documents from hard drives typically contain some NIST and system files.
  • Exception Files: 912 – Let’s assume that a little over 1% of the collection (912) is exception files like password protected, corrupted or empty files.
  • Duplicate Files: 24,215 – It’s fairly common for approximately 30% of the collection to include duplicates, so we’ll assume 24,215 files here.
  • Remaining Files after Processing: 53,161 – We have 53,161 files left after subtracting NIST/System, Exception and Duplicate files from the total files after filtering.
  • Files Culled During Searching: 35,618 – If we assume that we are able to cull out 67% (approximately 2/3 of the collection) as clearly non-responsive, we are able to cull out 35,618 files.
  • Remaining Files for Review: 17,543 – After culling, we have 17,543 files that will actually require review (whether manual or via a TAR approach).
  • Files Tagged as Non-Responsive: 7,017 – If approximately 40% of the document collection is tagged as non-responsive, that would be 7,017 files tagged as such.
  • Remaining Files Tagged as Responsive: 10,526 – After QC to ensure that all documents are either tagged as responsive or non-responsive, this leaves 10,526 documents as responsive.
  • Responsive Files Tagged as Privileged: 842 – If roughly 8% of the responsive documents are privileged, that would be 842 privileged documents.
  • Produced Files: 9,684 – After subtracting the privileged files, we’re left with 9,684 responsive, non-privileged files to be produced to opposing counsel.

The percentages I used for estimating the counts at each stage are just examples, so don’t get too hung up on them.  The key is to note the numbers in red above.  Excluding the interim counts in black, the counts in red represent the different categories for the file collection – each file should wind up in one of these totals.  What happens if you add the counts in red together?  You should get 101,852 – the number of collected files after expanding the PST files.  As a result, every one of the collected files is accounted for and none “slips through the cracks” during discovery.  That’s the way it should be.  If not, investigation is required to determine where files were missed.

So, what do you think?  Do you have a plan for accounting for all collected files during discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Quality Control, It’s a Numbers Game

 

Previously, we wrote about Quality Assurance (QA) and Quality Control (QC) in the eDiscovery process.  Both are important in improving the quality of work product and making the eDiscovery process more defensible overall.  For example, in attorney review, QA mechanisms include validation rules to ensure that entries are recorded correctly while QC mechanisms include a second review (usually by a review supervisor or senior attorney) to ensure that documents are being categorized correctly.  Another overall QC mechanism is tracking of document counts through the discovery process, especially from collection to production, to identify how every collected file was handled and why each non-produced document was not produced.

Expanded File Counts

Scanned counts of files collected are not the same as expanded file counts.  There are certain container file types, like Outlook PST files and ZIP archives that exist essentially to store a collection of other files.  So, the count that is important to track is the “expanded” file count after processing, which includes all of the files contained within the container files.  So, in a simple scenario where you collect Outlook PST files from seven custodians, the actual number of documents (emails and attachments) within those PST files could be in the tens of thousands.  That’s the starting count that matters if your goal is to account for every document in the discovery process.

Categorization of Files During Processing

Of course, not every document gets reviewed or even included in the search process.  During processing, files are usually categorized, with some categories of files usually being set aside and excluded from review.  Here are some typical categories of excluded files in most collections:

  • Filtered Files: Some files may be collected, and then filtered during processing.  A common filter for the file collection is the relevant date range of the case.  If you’re collecting custodians’ source PST files, those may include messages outside the relevant date range; if so, those messages may need to be filtered out of the review set.  Files may also be filtered based on type of file or other reasons for exclusion.
  • NIST and System Files: Many file collections also contain system files, like executable files (EXEs) or Dynamic Link Library (DLLs) that are part of the software on a computer which do not contain client data, so those are typically excluded from the review set.  NIST files are included on the National Institute of Standards and Technology list of files that are known to have no evidentiary value, so any files in the collection matching those on the list are “De-NISTed”.
  • Exception Files: These are files that cannot be processed or indexed, for whatever reason.  For example, they may be password-protected or corrupted.  Just because these files cannot be processed doesn’t mean they can be ignored, depending on your agreement with opposing counsel, you may need to at least provide a list of them on an exception log to prove they were addressed, if not attempt to repair them or make them accessible (BTW, it’s good to establish that agreement for disposition of exception files up front).
  • Duplicate Files: During processing, files that are exact duplicates may be put aside to avoid redundant review (and potential inconsistencies).  Some exact duplicates are typically identified based on the HASH value, which is a digital fingerprint generated based on the content and format of the file – if two files have the same HASH value, they have the same exact content and format.  Emails (and their attachments) may be identified as duplicates based on key metadata fields, so an attachment cannot be “de-duped” out of the collection by a standalone copy of the same file.

All of these categories of excluded files can reduce the set of files to actually be searched and reviewed.  Tomorrow, we’ll illustrate an example of a file set from collection to production to illustrate how each file is accounted for during the discovery process.

So, what do you think?  Do you have a plan for accounting for all collected files during discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: No Sanctions For Spoliation With No Bad Faith

 

In Sherman v. Rinchem Co., No. 11-2932, 2012 U.S. App. (8th Cir. Aug. 6, 2012), the plaintiff in a defamation case against his former employer appealed the district court’s denial of both his summary judgment motion and request for an adverse inference jury instruction. The district court had decided the case under Minnesota law, which “provides that ‘even when a breach of the duty to preserve evidence is not done in bad faith, the district court must attempt to remedy any prejudice that occurs as a result of the destruction of the evidence.’” In contrast, as the Eighth Circuit pointed out, in this case where the parties had diversity, and a question remained as to whether state or federal spoliation laws were applicable, federal law requires “a finding of intentional destruction indicating a desire to suppress the truth” in order to impose sanctions.

The plaintiff was fired from his employer after he allegedly lied during the employer’s investigation of complaints about his behavior. As part of the investigation, the plaintiff was interviewed by the employer’s human resources director, where the director took notes. The plaintiff argued that he requested the employer provide him with the notes because he believed they were critical to his case. However, the human resources director claimed she lost the notes, but she did not destroy them.

Arguing that the employer’s loss of the notes amounted to spoliation of evidence, the plaintiff “contended that the district court should grant his motion for summary judgment or, in the alternative, give an adverse-inference instruction to the jury for spoliation of evidence.” The court, however, found that at most the employer’s actions were negligent, not in bad faith, and therefore would not support the sanctions sought by the plaintiff. In the course of speaking to the plaintiff and his counsel on the record, the plaintiff’s counsel conceded that it did appear the employer’s actions were non-intentional and amounted only to negligence. The district court ultimately denied the plaintiff’s motion for summary judgment without prejudice, offering that he could return and seek another remedy short of summary judgment or an adverse inference instruction.

First, the Eighth Circuit found that in diversity actions, “federal law applies to the imposition of sanctions for the spoliation of evidence” in this case because “a direct conflict exists between federal law and Minnesota law.” Therefore, for spoliation sanctions to be applicable, the court had to find bad faith. Furthermore, the record reflected—and the plaintiff conceded—there had been no bad faith on the part of the employer.

Therefore, the court upheld the denial of the plaintiff’s motion for summary judgment and request for an adverse inference instruction.

So, what do you think?  Should either court have allowed the sanctions?  Or should lesser sanctions be allowed?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.