Electronic Discovery

Predictive Analytics: It’s Not Just for Review Anymore – eDiscovery Trends

One of the most frequently discussed trends in this year’s annual thought leader interviews that we conducted was the application of analytics (including predictive analytics) to Information Governance.  A recent report published in the Richmond Journal of Law & Technology addresses how analytics can be used to optimize Information Governance.

Written by Bennett B. Borden & Jason R. Baron (who was one of our thought leaders discussing that very topic), Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice, 20 RICH. J.L. & TECH. 7 (2014) is written for those who are not necessarily experts in the field.  It provides a synopsis of why and how predictive coding first emerged in eDiscovery and defines important terms related to the topic, then discusses aspects of an information governance program where application of predictive coding and related analytical techniques is most useful. Most notably, the authors provide a few “early” examples of the use of advanced analytics, like predictive coding, for non-litigation contexts to illustrate the possibilities for applying the technology.  Here is a high-level breakdown of the report:

Introduction (pages 1-3): Provides a high-level introduction of the topics to be discussed.

A. The Path to Da Silva Moore (pages 3-14): Provides important background to the evolution of managing electronically stored information (ESI) and predictive coding (fittingly, it begins with the words “In the beginning”).  Starting on page 9, the authors discuss “The Da Silva Moore Precedent”, providing a detailed account of the Da Silva Moore case (our post here summarizes our coverage of the case) and also references other cases, as well: In re Actos (Pioglitazone) Products Liability Litigation, Global Aerospace Inc., et al, v. Landow Aviation, L.P., Kleen Products v. Packaging Corp. of America, EORHB, Inc. v. HOA Holdings and In Re: Biomet M2a Magnum Hip Implant Products Liability Litigation.  Clearly, the past couple of years have provided several precedents for the use of predictive coding in litigation.

B. Information Governance and Analytics in the Era of Big Data (pages 15-20): This section provides definitions and important context for terms such as “big data”, “analytics” and “Information Governance”.  It’s important to have the background on these concepts before launching into how analytics can be applied to optimize Information Governance.

C. Applying the Lessons of E-Discovery In Using Analytics for Optimal Information Governance: Some Examples (pages 21-31): With the background of sections A and B under your belt, the heart of the report then gets into the actual application of analytics in different scenarios, using “True Life Examples” that are “’ripped from’ the pages of the author’s legal experience, without embellishment”.  These examples where analytics are used include:

  • A corporate client is being sued by a former employee in a whistleblower qui tam action;
  • A highly regulated manufacturing client decided to outsource the function of safety testing some of its products and a director of the department whose function was being outsourced, despite being offered a generous severance package, demanded four times the severance amount and threatened to go to the company’s regulator with a list of ten supposed major violations that he described in the email if he did not receive what he was asking for.
  • A major company received a whistleblower letter from a reputable third party alleging that several senior personnel were involved with an elaborate kickback scheme that also involved FCPA violations.
  • An acquisition agreement between parties contained a provision such that if the disclosures made by the target were found to be off by a certain margin within thirty days of the acquisition, the purchase price would be adjusted.

In each case, the use of analytics either resulted in a quick settlement, proved the alleged violations to be unfounded, or resulted in an appropriate adjustment in the purchase price of the acquired company.  These real world examples truly illustrate how analytics can be applied beyond the document review stage of eDiscovery.

Conclusion (pages 31-32): While noting that the authors’ intent was to “merely scratch the surface” of the topic, they offer some predictions for the end of the decade and note “expected demand on the part of corporate clients for lawyers to be familiar with state of the art practices in the information governance space”.  In other words, your clients are going to expect you to understand this.

The report is an easy read, even for novices to the technology, and is a must-read for anyone looking to understand more about applying analytics to Information Governance.  Bennett and Jason are both with Drinker Biddle & Reath LLP and are also co-chairs of the Information Governance Initiative (here is our recent blog post about IGI).

So, what do you think? Has your organization applied analytics to big data to reduce or eliminate litigation costs? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Finds Rule for Arranging and Labeling Documents Does Not Apply to ESI – eDiscovery Case Law

 

In Anderson Living Trust v. WPX Energy Prod., No. CIV 12-0040 JB/LFG (D.N.M. Mar. 6, 2014), New Mexico District Judge James O. Browning granted the defendants’ Motion to Reconsider an earlier discovery ruling that would have required the defendants to arrange and label the discovery documents they had already produced, on the grounds that under Rule 34, this production was not considered electronically stored information.

At issue in this hearing was whether “a party must, under Rule 34(b)(2)(E)(i) of the Federal Rules of Civil Procedure, arrange and label electronically stored information (‘ESI’) to correspond to the categories in the request, or whether compliance with rule 34(b)(2)(E)(ii)—production of ESI in the form that the requesting party requests, or in another reasonably usable form—is sufficient.” This question was applied to the production of approximately 20,000 pages of hard copy documents, which the defendants had scanned and produced in the format requested by the plaintiffs.

Previously in the course of discovery for this case, both parties had reached an agreement concerning discovery for the defendants to convert particular hard copy documents “in the order they were maintained within each file” to “fully searchable PDF files.” However, once production was completed according to the plaintiffs’ specifications, the plaintiffs filed a motion to compel the defendants to arrange and label the scanned document in order to “designate which of the Plaintiffs’ numbered requests these documents are responsive to.” The plaintiffs maintained that they could not manage the “tens of thousands of pages of documents” produced by the defendants “[w]ithout knowing which documents correspond with specific requests and whether the Defendants have, in fact, produced any documents responsive to some requests…”.

The defendants voluntarily provided the plaintiffs with an index of their production in response to the motion to compel, and argued that requiring them to “parse through the verbiage of each request and narrow down precisely which file was produced in response to which request would take a significant amount of time” and would therefore be unduly burdensome.

Initially, Judge Browning was inclined to side with the plaintiffs, but after hearing the defendants’ Motion to Reconsider, it was concluded that under Rule 34, scanned hard copy documents would not be considered ESI, and therefore the requirement that “documents be produced either in the usual course of business or labeled to correspond to categories in the request” does not apply. Therefore, the defendants had met their discovery obligations.

Judge Browning stated in part: “From the evidence available to the Court, it appears that the Plaintiffs did more than merely ‘stipulate’ to the form of production – it appears the Defendants were the one making most of the concessions: they agreed to the Plaintiffs’ request to scan hard copy documents into ESI for the Plaintiffs’ convenience, and they assented to the Plaintiffs’ request to convert the information into PDF form, rather than the cheaper and more familiar [from the Defendants’ perspective] TIFF form.”

Therefore, the defendants’ Motion to Reconsider was granted, with the conclusion that the “defendants’ production of discovery in PDF format – consisting of items stored as ESI before the litigation, as well as approximately 20,000 pages of documents that existed in hard copy form before being rendered into ESI for production – is adequate, and no further production or labeling is required.”

So, what do you think? Should electronically stored information be defined solely as documents that already existed in electronic format prior to litigation? Should it be reasonably logical to assume that documents produced as discovery be arranged and labeled to correspond with responsive requests? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Peruse, But Don’t Friend Potential Jurors on Social Media – eDiscovery Trends

 

Unless limited by law or court order, a lawyer may review a juror’s or potential juror’s Internet presence, which may include postings by the juror or potential juror in advance of and during a trial, but a lawyer may not communicate directly or through another with a juror or potential juror.  So says a new formal opinion from the American Bar Association (ABA) Standing Committee on Ethics and Professionalism.

Formal Opinion 466 is a nine page PDF document which is designed to cover the responsibilities for lawyers who are reviewing jurors’ Internet presence.  For the purposes of this opinion, Internet-based social media sites that readily allow account-owner restrictions on access are referred to as “electronic social media” or “ESM” sites – of which the opinion gives current examples like Facebook, MySpace, LinkedIn, and Twitter. 

Under Model Rule 3.5(b) of the ABA Model Rules of Professional Conduct, a lawyer may not communicate with a potential juror leading up to trial or any juror during trial unless authorized by law or court order.  With that in mind, the opinion addresses three levels of lawyer review of juror Internet presence:

1. passive lawyer review of a juror’s website or ESM that is available without making an access request where the juror is unaware that a website or ESM has been reviewed;

2. active lawyer review where the lawyer requests access to the juror’s ESM; and

3. passive lawyer review where the juror becomes aware through a website or ESM feature of the identity of the viewer.

To illustrate whether each activity violates Rule 3.5 (b), the opinion analogizes each of the activities to real world contact, as follows:

1. In the world outside of the Internet, a lawyer or another, acting on the lawyer’s behalf, would not be engaging in an improper ex parte contact with a prospective juror by driving down the street where the prospective juror lives to observe the environs in order to glean publicly available information that could inform the lawyer’s jury-selection decisions.  So, passive review of a juror’s website or ESM, that is available without making an access request, and of which the juror is unaware, does not violate Rule 3.5(b).

2. This would be akin to driving down the juror’s street, stopping the car, getting out, and asking the juror for permission to look inside the juror’s house because the lawyer cannot see enough when just driving past and it would be the type of ex parte communication prohibited by Model Rule 3.5(b).

3. This is akin to a neighbor’s recognizing a lawyer’s car driving down the juror’s street and telling the juror that the lawyer had been seen driving down the street.  A lawyer who uses a shared ESM platform to passively view juror ESM under these circumstances does not communicate with the juror. The lawyer is not communicating with the juror; the ESM service is communicating with the juror based on a technical feature of the ESM.

Also, under Model Rule 3.3(b), if a lawyer discovers criminal or fraudulent conduct by a juror related to the proceeding, the lawyer must take reasonable remedial measures including, if necessary, disclosure to the tribunal.  However, the opinion hedged on a lawyer’s duty to notify the court when the conduct is merely “improper”, but stops short of being criminal or fraudulent.

So, what do you think? Do any of the parameters of this opinion surprise you? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Rule 37(e) Amended Again – eDiscovery Trends

Last month, we discussed significant changes made to Rule 37(e), which had been hotly debated (as reflected in our recent thought leader series) and was the source of many of the 2,354 public comments filed regarding the recent proposed rules changes.  Earlier this month (on April 10th and 11th), the Advisory Committee on Civil Rules met to review proposed amendments to the Rules of Civil Procedure, including recommended changes to those proposed amendments as published for public comment and further changes were made to Rule 37(e).

Discussion regarding Rule 37(e) occurred on the second day of the two-day meeting and a final version of the proposed amended rule was presented for the consideration of the full Advisory Committee (also known as the “Duke Subcommittee”), which was ultimately approved by that committee without opposition and will now be submitted to the Standing Committee for its review and potential approval.  Here is the new, much simpler, proposed rule:

(e)  FAILURE TO PRESERVE ELECTRONICALLY STORED INFORMATION.  If electronically stored information that should have been preserved in the anticipation or conduct of litigation is lost because a party failed to take reasonable steps to preserve the information, and the information cannot be restored or replaced through additional discovery, the court may:

(1)  Upon a finding of prejudice to another party from loss of the information, order measures no greater than necessary to cure the prejudice;

(2)  Only upon a finding that the party acted with the intent to deprive another party of the information’s use in the litigation:

(A)  presume that the lost information was unfavorable to the party;

(B)  instruct the jury that it may or must presume the information was unfavorable to the party; or

(C)  dismiss the action or enter a default judgment.

During the meetings, the Advisory Committee also unanimously approved proposed amendments to Rules 1, 4, 16, 26, and 34.  The proposed amendments will be considered at the next meeting of the Standing Committee on May 29-30.

The full report of the meetings including the text of the proposed amendments to rules 1, 4, 16, 26, and 34 are available in the Advisory Committee’s 580 page(!) Agenda Book here.  Discussion of Rule 37(e) starts on page 369 – you can click on Tab 3 in the Agenda to jump straight to that section.

Click here, here, here and here for previous posts on this blog regarding the proposed rules changes.

So, what do you think? Are the latest changes an improvement?  Will there be more changes? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Use of a Bulk File Changer to Manipulate Metadata Leads to Sanctions for Defendant – eDiscovery Case Law

 

In T&E Investment Group, LLC v. Faulkner, Nos. 11-CV-0724-P, 3:11-CV-1558-P (N.D. Tex. Feb. 12, 2014), Texas District Judge Jorge A. Solis upheld the earlier recommendation of the Magistrate Judge to order an adverse inference sanction, along with monetary sanctions, against the defendant for manipulation of metadata.

In this litigation, it had been ordered that “a third party independent computer forensic expert jointly selected by the parties shall be permitted by defendants to have access to all of the computers used by the defendants during the year 2011, wherever located, for examination of their hard drives.” After examining the three computers produced by the defendants, the expert determined that one of the computers produced by an individual defendant had been manipulated.

In his report, the expert specifically stated that the defendant “created a new profile on PCL-03, copied data to it, and used a bulk file changer to alter the data in an apparent ‘attempt to make it look like that was his computer that he used all the time’.” It was noted that the majority of the manipulated data was not related to the issues of the lawsuit. Further, the expert “believed that someone used the bulk file changer to hide the existence of a computer that had not been produced in this case,” and identified the computer that was not produced as “Alienware.”

Evidence in the expert’s report indicated that the last use of the Alienware computer had been inside the individual defendant’s home, the day after defendants were ordered to produce all computers relevant to the litigation. Additionally, the report found that the missing computer had been connected to the computer identified as PCL-03, which contained the manipulated data. And further, evidence indicated that during the relevant time period, the defendant had sent emails from the Alienware computer.

The defendant testified that he had used the bulk fire changer only to attempt to “set them as read only,” allegedly so they could not be deleted, and further categorized the copied files as “a multitude of things related to our investor files, a lot of photos, PDFs, Word documents, just standard stuff that we update our investor base with.” However, it was ultimately concluded that this testimony was false.

The plaintiffs requested sanctions, and limited consideration to the three specific computers produced by the defendants, while denying the defendants’ objection to consideration of the absent Alienware computer because “a finding that Defendants manipulated data on PCL-03 in order to avoid production of the Alienware computer or any other relevant evidence remains a viable ground for sanctions.”

Broadly, the Magistrate Judge ruled that the defendants had a duty to preserve “the evidence at issue, including PCL-03, the Alienware computer, and any other computer used by Defendants in 2011 in their possession, custody, or control.” Additionally, it was deemed that despite the individual defendant’s insistence that the unproduced computer was not within his home, the “evidence overwhelmingly support[ed]” the determination of the expert with regards to the manipulated data and the existence and use of the Alienware computer.

It was ruled that the individual defendant “acted in bad faith” by altering the metadata on PCL-03 to make it appear that he had used the computer “for a number of years,” and that he had made false statements to the court about manipulating the data, and further that it was done “in the context” of the defendant’s failure to produce the Alienware computer. While the Magistrate Judge concluded that the plaintiffs had not been “irreparably prejudiced,” requisite prejudice was established because “a reasonable fact finder could conclude” that there was relevant information contained on the non-produced computer, and that spoliation had occurred. Therefore, the Magistrate Judge recommended that the jury be “given a spoliation instruction that would entitle the jury to draw an adverse inference that a party who intentionally spoliated evidence did so in order to conceal evidence that was unfavorable to that party.” In addition, a recommendation was made for monetary sanctions of $27,500.

Judge Solis, upon conducting a de novo review and hearing objections from the defendants, accepted the recommendations of the Magistrate Judge in imposing both the adverse inference and monetary sanctions against the defendants. 

So, what do you think? Are adverse sanctions sufficient to suggest electronic evidence that is not present due to data manipulation? Should a more stringent order be placed in cases where it is determined that evidence has been deliberately not produced? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

New California Proposed Opinion Requires eDiscovery Competence – eDiscovery Trends

 

If a new proposed opinion in California is adopted, attorneys in that state had better be sufficiently skilled in eDiscovery, hire technical consultants or competent counsel that is sufficiently skilled, or decline representation in cases where eDiscovery is required.

The California State Bar Standing Committee on Professional Responsibility & Conduct has released Proposed Formal Opinion Interim No. 11-0004, which is designed to establish an attorney’s ethical duties in the handling of discovery of electronically stored information.  As stated on the first page of the opinion:

“Attorney competence related to litigation generally requires, at a minimum, a basic understanding of, and facility with, issues relating to e-discovery, i.e., the discovery of electronically stored information (“ESI”). On a case-by-case basis, the duty of competence may require a higher level of technical knowledge and ability, depending on the e-discovery issues involved in a given matter and the nature of the ESI involved. Such competency requirements may render an otherwise highly experienced attorney not competent to handle certain litigation matters involving ESI. An attorney lacking the required competence for the e-discovery issues in the case at issue has three options: (1) acquire sufficient learning and skill before performance is required; (2) associate with or consult technical consultants or competent counsel; or (3) decline the client representation. Lack of competence in e-discovery issues can also result, in certain circumstances, in ethical violations of an attorney’s duty of confidentiality, the duty of candor, and/or the ethical duty not to suppress evidence.”

The proposed ethics opinion includes a hypothetical situation in which a lawyer agrees to opposing counsel’s search of his client’s database using agreed-upon terms with that lawyer mistakenly thinking that a clawback agreement offered by opposing counsel is broader than it is, and will allow him to pull back anything, not just protected ESI, so long as he asserts it was “inadvertently” produced.  Ultimately, the lawyer learns the search produced privileged information and also showed that his client had deleted some potentially relevant documents as part of a regular document retention policy, breaching his duty of competence and his duty to maintain client confidences and to protect privileged information.  Oops!

The remainder of the proposed eight page opinion discusses those very attorney duties regarding ESI, including the duty of competence and the duty of confidentiality.

The committee is requesting comments on the proposed opinion through June 24.  For more information and where to direct comments, click here.

So, what do you think? Are ethics opinions like this needed to establish competency requirements for attorneys? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiffs Triumph in Second Motion to Enforce Court Ordered Production of Email Attachments – eDiscovery Case Law

 

In Skepnek v. Roper & Twardowsky, LLC, 11-4102-KHV (D. Kan. Jan. 27, 2014), Kansas Magistrate Judge James P. O’Hara ruled on a second motion filed by the plaintiffs to enforce a discovery order that was not followed completely by the defendants – specifically, the plaintiffs sought to compel the production of email attachments that were not produced along with the emails themselves.

The defendants opposed the motion to enforce, first by claiming that the plaintiffs had failed to meet and confer with them regarding the production of the Electronically Stored Information (ESI). While federal rules state that a party filing a motion has a duty to confer with opposing counsel, the local rules for this district expand upon that duty, specifically stating that “a ‘reasonable effort’ to confer means more than mailing or faxing a letter to the opposing party” and that the parties must in good faith “converse, confer, compare views, consult and deliberate, or in good faith attempt to do so.”

Judge O’Hara noted that the opposing parties had exchanged correspondence and held a telephone conference in attempt to resolve this discovery dispute without the court’s intervention, and ruled that the plaintiffs had made a reasonable effort to confer with regard to producing email attachments.

The defendants also objected that the plaintiffs had waived their right to object to the form of production, which was at issue in that it resulted in emails being produced with the attachments missing. The defendants had been ordered to produce “all internal communications among defendants…that pertain to Requests for Production Nos. 6, 7, 10, and 11,” as well as “all electronic communications between Angela Roper, Kenneth Thyne or anyone else associated with Roper & Twardowsky, LLC and the fifteen individuals listed by defendants in their motion.” These emails had been produced in PDF format, which did not result in the attachments being produced.

The plaintiffs suggested that if the ESI had been produced in native format, the attachments would have been included in production. Here, the defendants countered that they have always produced documents in PDF format, including emails, and that it would be “duplicative and burdensome to comply with plaintiffs’ request.” Further, the defendants had claimed that their “e-mail server search was not capable of producing the attachments to the e-mails,” but offered to produce specific attachments requested by the plaintiffs.

Judge O’Hara noted that producing attachments that have not previously been produced is not duplicative, and questioned why the defendants would be able to “produce specific attachments upon request,” when they claimed it was “impossible” to include all of the attachments. Additionally, the defendants did not offer evidence that producing the attachments would be burdensome, and the plaintiffs had not requested re-production of all documents. Instead, they “point[ed] out that one way defendants could [produce the missing attachments] is by producing the e-mails in their native format.”

Stating that the defendants “do not have the leisure of picking and choosing what responsive documents to produce,” Judge O’Hara ordered the defendants to produce all relevant communications, including attachments. No sanctions were imposed, since “both parties are at fault to some degree for failing to adequately confer early on regarding the production of ESI,” but the defendants’ request to have the plaintiffs pay for their production time was denied.

So, what do you think? Should a phone conference constitute a reasonable effort to confer with regard to the production format of ESI? Is PDF ever an appropriate format to produce email communications when attachments are relevant to the litigation at issue? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Daughter’s Facebook Post Voids $80,000 Settlement – eDiscovery Trends

My boss reminded me that we haven’t had a good social media disaster story in a while, so here goes.  I know it’s a few weeks old, but it’s still a good story if you haven’t heard it.

As reported a few weeks ago on CNN, the former head of a private preparatory school in Miami lost out an $80,000 discrimination settlement after his daughter boasted about it on Facebook.

When Patrick Snay, the former head of Gulliver Preparatory School, filed an age discrimination complaint when his 2010-11 contract wasn’t renewed, the school and Snay came to an agreement in which Snay would be paid $10,000 in back pay, as well as an $80,000 settlement.

He was all set.  Then, his daughter posted a comment to Facebook, as follows:

“Mama and Papa Snay won the case against Gulliver. Gulliver is now officially paying for my vacation to Europe this summer. SUCK IT.”

And, she sent it to her 1,200 Facebook followers, which included many current and former Gulliver students and word got back to school officials.

The problem?   It seems that Snay had a confidentiality agreement which stated that neither Snay nor his wife could speak about the settlement to anyone except for his attorneys and other professional advisers.  That included their daughter.  Within a few days, Gulliver Schools sent a letter to Snay’s attorneys stating that Snay had broken the confidentiality agreement and that he would not be receiving the $80,000 settlement.

Snay filed a motion to enforce the settlement and initially won in a Circuit Court ruling. However, the school appealed and the Third District Court of Appeals for the State of Florida agreed that Snay had, in fact, violated confidentiality and reversed the Circuit Court ruling.  Goodbye $80,000.

Sometimes the case is lost even after it’s won.

That’s why it’s important to think before you hit send.  Even if you’re still in grade school.

So, what do you think? Have you seen any cases lately that turned on social media evidence? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiff Sanctioned for Spoliation of Digital Evidence in Sexual Harassment Lawsuit – eDiscovery Case Law

 

In Calderon v. Corporacion Puertorrique a de Salud, No. 12-1006 (FAB) (D.P.R. Jan. 16, 2014), the plaintiff was found to have violated his duty to preserve evidence during the discovery phase of this sexual harassment lawsuit. Sanctions were imposed, though not to the extent requested by the defendants.

The discovery dispute began over the Electronically Stored Information (ESI) produced by the plaintiff, which were in the form of messages from his phone exchanged between the plaintiff and a particular identified email address belonging to an unknown person who was alleged to be the harasser. The plaintiff produced relevant messages to the defendants, but also admitted that some of the messages had been deleted from his phone. In response, the defendants filed a motion in limine that sought to have all of the messages excluded, and requesting that the case be dismissed.

While the motion in limine was still pending, the defendants received ESI from the plaintiff’s phone service provider, which contained the plaintiff’s phone and text messages spanning the time period relevant to the case. These records showed that at least 38 messages, including some from the alleged harasser and others that were “the numerous text messages that [plaintiff] sent in response” were not among those messages produced by the plaintiff to the defendants. Therefore, the defendants filed a supplemental motion based on the missing messages that asked to sanction the plaintiff by dismissing the case, since spoliation of evidence had occurred.

The plaintiff filed a motion to quash, with the argument that the defendants had subpoenaed the plaintiff’s service provider before the discovery deadline, and had not given adequate pre-service notice. Therefore, the plaintiff claimed that the subpoena which resulted in the discovery of missing messages should be quashed as procedurally defective. However, it was noted that had the defendants given notice of the subpoena and the plaintiff objected, the subpoena would not have been quashed. Further, the late disclosure of the defendants’ receipt of phone records was determined to be harmless to the plaintiff.

In considering the motions, District Judge Francisco A. Besosa found that spoliation had indeed occurred. This was based on discovery of the 38 messages the plaintiff had deleted, some of which had included photos that were also not produced by the plaintiff. Additionally, the plaintiff’s records revealed that he had “reasonably foresaw litigation and had a duty to preserve relevant evidence,” because the plaintiff had contacted his attorney via his phone prior to the point where he admitted to “forwarding some messages…so that he ‘would be able to print’ them.” Judge Besosa stated that this constituted “conscious abandonment of potentially useful evidence” and indicated that the plaintiff believed the deleted messages would not help his side of the case.

While spoliation had been found to occur, Judge Besosa declined to sanction the plaintiff by dismissing the case, citing that dismissal of an entire lawsuit as a sanction is generally reserved for extreme cases, as cited in Benitez-Garcia v. Gonzalez-Vega, 468 F.3d 1, 5 (1st Cir. 2006), which stated: “[I]t has long been our rule that a case should not be dismissed with prejudice except when a plaintiff’s misconduct is particularly egregious or extreme.” Instead, Judge Besosa ruled that an adverse inference instruction to the jury was the most appropriate sanction for this case.

So, what do you think? Should the court consider quashing evidence that would not have been likely quashed during normal proceedings, if a party obtains such evidence outside of established processes? Are adverse inference instructions truly sufficient to exclude or caution against potential spoliation of evidence? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Litigation Support Professionals Are Certifiable, Too – eDiscovery Trends

We’ve covered programs from The Organization of Legal Professionals (OLP) in the past, including this prior post regarding their certification program for eDiscovery project management.  Now, the OLP has announced that it has finalized preparations for a new Litigation Support Certification Exam.

As announced on their site, the Certified Litigation Support Certification Exam (CLSP®), developed in conjunction with Pearson Learning Solutions, a $7 billion company that specializes in certification examinations for a wide variety of industries, incorporates content created by OLP members including eDiscovery and legal technology lawyers, consultants and experts. According to the announcement, OLP is the first organization to offer a Litigation Support Certification Exam.

The exam and prep course aren’t just for anybody who can study and take a test, candidates must complete an application form found in the Candidate Handbook and demonstrate prior work experience and/or education.  The requirements for demonstrating prior experience depend on whether or not you hold a J.D., baccalaureate degree, A.A./A.S. degree and/or are employed in the position of attorney or paralegal.  Specific eligibility requirements can be found here.

According to Chere Estrin, President of the OLP, the prep course offers self-paced, 24×7 accessible online learning tools and resources so learners can work at their own pace and schedule. Each course requires about 4 hours of dedicated study time. The course curriculum is comprised of all important and relevant learning objectives as identified by top legal field professionals and that cover all vital aspects ensuring knowledge development while best preparing the learner for the certification exam.

The topics covered are quite comprehensive and include:

  • Technology Topics including: Media, Hardware, Software and Terminology
  • Appropriate Uses of Software
  • eDiscovery Topics including: eDiscovery Definitions, File Extensions and Terminology
  • Case Law Topics including: Legal Procedure and Rulings, FRCP, The Sedona Conference and Other Resources
  • Legal Project Management Topics including: Information Management, Backup, Records Management and Legal Hold
  • Cost Controls and Budget Metrics
  • Early Case Assessment Topics including: Early Case Assessment, Matter Life Cycle, Matter Planning and Software Applications
  • Metadata Topics including: Metadata Forensics
  • Data Storage Topics including: Data Processing and Document Coding
  • Best Practices Topics including: Production Format, Records Retention
  • Risk Control and Management
  • Search Tools Topics including Software Applications, Review Tools, Forensics, Authentication and Hardware/Software

The cost for the prep course is $695 for OLP members ($895 for non-members) and the cost of the exam is $395 for OLP members ($595 for non-members) – individual membership is $125 per year, so it pays to be a member if you’re going to sign up for either the prep course or the exam.  Candidates for the exam will be able to schedule the date of the examination starting May 15, 2014 through the purchase of a voucher.  The exam will be administered in a secured facility in over 1,000 global locations including the U.S., Canada, Australia, the UK, Japan, Europe, Mexico, Puerto Rico, Brazil, Venezuela, and South Africa.

For more information about the CLSP® prep course and exam, click here.  You can also download the Candidate Handbook, available here.

So, what do you think?  Are you a litigation support professional?  If so, does the idea of a certification program appeal to you?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.