Electronic Discovery

English Court Rules that Respondents Can Use Predictive Coding in Contested Case: eDiscovery Case Law

In Brown v BCA Trading, et. al. [2016] EWHC 1464 (Ch), Mr. Registrar Jones ruled that, with “nothing, as yet, to suggest that predictive coding will not be able to identify the documents which would otherwise be identified through, for example, keyword search”, “predictive coding must be the way forward” in this dispute between parties as to whether the Respondents could use predictive coding to respond to eDisclosure requests.

The May 17 order began by noting that “the question whether or not electronic disclosure by the Respondents should be provided, as they ask, using predictive coding or via a more traditional keyword approach instead” was “contested”.  With the “majority of the documents that may be relevant for the purposes of trial…in the hands of the First Respondent”, the order noted that fact is “relevant to take into account when considering the Respondents’ assertion, presented from their own view and on advice received professionally, that they think predictive coding will be the most reasonable and proportionate method of disclosure.”  The cost for predictive coding was estimated “in the region of £132,000” whereas the costs for a key word search approach was estimated to be “at least £250,000” and could “even reach £338,000 on a worst case scenario” (emphasis added).  In the order, it was acknowledged that the cost “is relevant and persuasive only to the extent that predictive coding will be effective and achieve the disclosure required.”

With that in mind, Mr. Registrar Jones stated the following: “I reach the conclusion based on cost that predictive coding must be the way forward. There is nothing, as yet, to suggest that predictive coding will not be able to identify the documents which would otherwise be identified through, for example, keyword search and, more importantly, with the full cost of employees/agents having to carry out extensive investigations as to whether documents should be disclosed or not. It appears from the information received from the Respondents that predictive coding will be considerably cheaper than key word disclosure.”

The order also referenced the ten factors set out by Master Matthews in the Pyrrho Investments case (the first case in England to approve predictive coding) to help determine that predictive coding was appropriate for that case, with essentially all factors applying to this case as well, except for factor 10 (the parties have agreed on the use of the software, and also how to use it).

So, what do you think?  Do you think parties should always have the right to use predictive coding to support their production efforts absence strong evidence that it is not as effective as other means?  Please share any comments you might have or if you’d like to know more about a particular topic.

For more reading about this case, check out Chris Dale’s post here and Adam Kuhn’s post here.

Don’t forget that tomorrow at 1:00pm ET, ACEDS will be conducting a webinar panel discussion, titled How Automation is Revolutionizing eDiscovery, sponsored by CloudNine.  Our panel discussion will provide an overview of the eDiscovery automation technologies and we will really take a hard look at the technology and definition of TAR and the limitations associated with both.  This time, Mary Mack, Executive Director of ACEDS will be moderating and I will be one of the panelists, along with Bill Dimm, CEO of Hot Neuron and Bill Speros, Evidence Consulting Attorney with Speros & Associates, LLC.  Click on the link here to register.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Denies Defendant’s Motion to Overrule Plaintiff’s Objections to Discovery Requests

Judge Peck Refuses to Order Defendant to Use Technology Assisted Review: eDiscovery Case Law

We’re beginning to see more disputes between parties regarding the use of technology assisted review (TAR) in discovery.  Usually in these disputes, one party wants to use TAR and the other party objects.  In this case, the dispute was a bit different…

In Hyles v. New York City, No. 10 Civ. 3119 (AT)(AJP) (S.D.N.Y. Aug. 1, 2016), New York Magistrate Judge Andrew J. Peck, indicating that the key issue before the court in the discovery dispute between parties was whether (at the plaintiff’s request) the defendants can be forced to use technology assisted review, refused to force the defendant to do so, stating “The short answer is a decisive ‘NO.’”

Case Background

In this discrimination case by a former employee of the defendant, after several delays in discovery, the parties had several discovery disputes.  They filed a joint letter with the court, seeking rulings as to the proper scope of ESI discovery (mostly issues as to custodians and date range) and search methodology – whether to use keywords (which the defendants wanted to do) or TAR (which the plaintiff wanted the defendant to do).

With regard to date range, the parties agreed to a start date for discovery of September 1, 2005 but disagreed on the end date.  In the discovery conference held on July 27, 2016, Judge Peck ruled on a date in between what the plaintiff and defendants – April 30, 2010, without prejudice to the plaintiff seeking documents or ESI from a later period, if justified, on a more targeted inquiry basis.  As to custodians, the City agreed to search the files of nine custodians, but not six additional custodians that the plaintiff requested.  The Court ruled that discovery should be staged, by starting with the agreed upon nine custodians. After reviewing the production from the nine custodians, if the plaintiff could demonstrate that other custodians had relevant, unique and proportional ESI, the Court would consider targeted searches from those custodians.

After the parties had initial discussions about the City using keywords, the plaintiff’s counsel consulted an ediscovery vendor and proposed that the defendants should use TAR as a “more cost-effective and efficient method of obtaining ESI from Defendants.”  The defendants declined, both because of cost and concerns that the parties, based on their history of scope negotiations, would not be able to collaborate to develop the seed set for a TAR process.

Judge’s Ruling

Judge Peck noted that “Hyles absolutely is correct that in general, TAR is cheaper, more efficient and superior to keyword searching” and referenced his “seminal” DaSilva Moore decision and also his 2015 Rio Tinto decision where he wrote that “the case law has developed to the point that it is now black letter law that where the producing party wants to utilize TAR for document review, courts will permit it.”  Judge Peck also noted that “Hyles’ counsel is correct that parties should cooperate in discovery”, but stated that “[c]ooperation principles, however, do not give the requesting party, or the Court, the power to force cooperation or to force the responding party to use TAR.”

Judge Peck, while acknowledging that he is “a judicial advocate for the use of TAR in appropriate cases”, also noted that he is also “a firm believer in the Sedona Principles, particularly Principle 6, which clearly provides that:

Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information.”

Judge Peck went on to state: “Under Sedona Principle 6, the City as the responding party is best situated to decide how to search for and produce ESI responsive to Hyles’ document requests. Hyles’ counsel candidly admitted at the conference that they have no authority to support their request to force the City to use TAR. The City can use the search method of its choice. If Hyles later demonstrates deficiencies in the City’s production, the City may have to re-do its search.  But that is not a basis for Court intervention at this stage of the case.”  As a result, Judge Peck denied the plaintiff’s application to force the defendants to use TAR.

So, what do you think?  Are you surprised by that ruling?  Please share any comments you might have or if you’d like to know more about a particular topic.

Don’t forget that next Wednesday at 1:00pm ET, ACEDS will be conducting a webinar panel discussion, titled How Automation is Revolutionizing eDiscovery, sponsored by CloudNine.  Our panel discussion will provide an overview of the eDiscovery automation technologies and we will really take a hard look at the technology and definition of TAR and the limitations associated with both.  This time, Mary Mack, Executive Director of ACEDS will be moderating and I will be one of the panelists, along with Bill Dimm, CEO of Hot Neuron and Bill Speros, Evidence Consulting Attorney with Speros & Associates, LLC.  Click on the link here to register.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Denies Defendant’s Motion to Overrule Plaintiff’s Objections to Discovery Requests

Court Compels Plaintiff to Provide Social Media Account and Activity Data: eDiscovery Case Law

In Waters v. Union Pacific Railroad Co., No. 15-1287-EFM-KGG (D. Kan. June 21, 2016), Kansas Magistrate Judge Kenneth G. Gale granted the defendant’s motion to compel the plaintiff to produce account information associated with his social media accounts as well as postings from the dates he missed work in conjunction with his injury claims against the defendant.  Judge Gale also granted most of the components of the plaintiff’s motion to compel against the defendant for various discovery requests.

Case Background

In this personal injury case against the plaintiff’s former employer, both parties filed motions to compel against the other.  The defendant asked for the plaintiff to list the names/account names “associated with [his] Facebook and Twitter accounts” and also initially asked for a broad category of information relating to the plaintiff’s social media presence.  After the plaintiff objected, the parties conferred and the defendant limited the scope of its requests to “all social network postings, messages, and photographs that he sent or received” on the work dates he claims he missed as a result of his injuries.  The plaintiff argued that the defendant’s requests for social media data were overly broad, irrelevant, and not proportional to needs of the case.

The plaintiff’s motion to compel related to discovery requests regarding prior injuries suffered by the defendant’s employees, notifications regarding defects or hazards on the defendant’s locomotives, prior notification of safety hazards or injuries relating to water on walkways, statements regarding the plaintiff’s claims, photos of the locomotive in question, and inspection and maintenance reports for the subject locomotive.  The defendant logged various objections to those requests.

Judge’s Ruling

In addressing the defendant’s motion to compel, Judge Gale stated:

“The Court finds that Defendant’s requests are relevant on their face. As stated above, unless a request is improper on its face, ‘the party asserting the objection has the duty to support its objections.’  Plaintiff has failed in this regard. To the contrary, the Court finds that the requests are highly relevant on their face as they seek evidence which could be germane to the extent of Plaintiff’s injuries and damages and state of mind.

Plaintiff has also failed to establish the overbreadth of Defendant’s requests. Following attempts to confer with Plaintiff, Defendant willingly narrowed the scope of the requests at issue. The Court does not agree that the access Defendant seeks to Plaintiff’s social media postings and messages is ‘unfettered’ when Defendant has limited the temporal (i.e. days Plaintiff missed work) and/or substantive subject matter scope of the requests”.

As a result, Judge Gale granted the defendant’s motion to compel.

Not all news was bad for the plaintiff; however, as Judge Gale granted his motion to compel regarding prior injuries and notifications, statements regarding the plaintiff’s claims and inspection and maintenance reports for the subject locomotive.  Only the plaintiff’s request for photos of the locomotive in question was denied.

So, what do you think?  Was the scope of the defendant’s request appropriate or was it overbroad?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

ACEDS Adds its Weight to the eDiscovery Business Confidence Survey: eDiscovery Trends

We’ve covered two rounds of the quarterly eDiscovery Business Confidence Survey created by Rob Robinson and conducted on his terrific Complex Discovery site (previous results are here and here).  It’s time for the Summer 2016 Survey.  Befitting of the season, the survey has a HOT new affiliation with the Association of Certified eDiscovery Specialists (ACEDS).

As before, the eDiscovery Business Confidence Survey is a non-scientific survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem. The term ‘business’ represents the economic factors that impact the creation, delivery, and consumption of eDiscovery products and services.  The purpose of the survey is to provide a subjective baseline for understanding the trajectory of the business of eDiscovery through the eyes of industry professionals.

Also as before, the survey asks questions related to how you rate general business conditions for eDiscovery in your segment of the eDiscovery market, both current and six months from now, a general sense of where you think revenue and profits will be for your segment of the market in six months and which issue do you think will most impact the business of eDiscovery over the next six months, among other questions.  It’s a simple nine question survey that literally takes about a minute to complete.  Who hasn’t got a minute to provide useful information?

Individual answers are kept confidential, with the aggregate results to be published on the ACEDS website (News & Press), on the Complex Discovery blog, and on selected ACEDS Affiliate websites and blogs (we’re one of those and we’ll cover the results as we have for the first two surveys) upon completion of the response period, which started on August 1 and goes through Wednesday, August 31.

What are experts saying about the survey?  Here are a couple of notable quotes:

Mary Mack, Executive Director of ACEDS stated: “The business of eDiscovery is an ever-present and important variable in the equation of legal discovery.  As financial factors are a primary driver in eDiscovery decisions ranging from sourcing and staffing to development and deployment, ACEDS sees value in regularly checking the business pulse of eDiscovery professionals. The eDiscovery Business Confidence Survey provides a tool to help take that pulse on a systematic basis and ACEDS looks forward to sponsoring, participating, and reporting on the results of this salient survey each quarter.”

George Socha, Co-Founder of EDRM and Managing Director of Thought Leadership of BDO stated: “In my experience, the successful conduct of eDiscovery is comprised of a balance of in-depth education, practical execution, and experience-based excellence.  The eDiscovery Business Confidence survey being highlighted by ACEDS is one of many industry surveys that positively contributes to this balance, as it provides a quarterly snapshot into the business of discovery. I highly encourage serious eDiscovery professionals to complete and consider this survey as a key tool for understanding the business challenges and opportunities in our profession.”

The more respondents there are, the more useful the results will be!  What more do you need?  Click here to take the survey yourself.  Don’t forget!

So, what do you think?  Are you confident in the state of business within the eDiscovery industry?  Share your thoughts in the survey and, as always, please share any comments you might have with us or let us know if you’d like to know more about a particular topic.

Don’t forget that next Wednesday at 1:00pm ET, ACEDS will be conducting a webinar panel discussion, titled How Automation is Revolutionizing eDiscovery, sponsored by CloudNine.  Our panel discussion will provide an overview of the eDiscovery automation technologies and we will really take a hard look at the technology and definition of TAR and the limitations associated with both.  This time, Mary Mack, Executive Director of ACEDS will be moderating and I will be one of the panelists, along with Bill Dimm, CEO of Hot Neuron and Bill Speros, Evidence Consulting Attorney with Speros & Associates, LLC.  Click on the link here to register.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

How Automation is Revolutionizing eDiscovery: eDiscovery Trends

I thought about titling this post “Less Than Half of Automation is Revolutionizing eDiscovery” to keep the streak alive, but (alas) all good streaks must come to an end… :o)

If you missed our panel session last month in New York City at The Masters Conference, you missed a terrific discussion about automation in eDiscovery and, particularly an in-depth discussion about technology assisted review (TAR) and whether it lives up to the current hype.  Now, you get another chance to check it out, thanks to ACEDS.

Next Wednesday, ACEDS will be conducting a webinar panel discussion, titled How Automation is Revolutionizing eDiscovery, sponsored by CloudNine.  Our panel discussion will provide an overview of the eDiscovery automation technologies and we will really take a hard look at the technology and definition of TAR and the limitations associated with both.  This time, Mary Mack, Executive Director of ACEDS will be moderating and I will be one of the panelists, along with Bill Dimm, CEO of Hot Neuron and Bill Speros, Evidence Consulting Attorney with Speros & Associates, LLC.

The webinar will be conducted at 1:00 pm ET (which is 12:00 pm CT, 11:00 am MT and 10:00 am PT).  Oh, and 5:00 pm GMT (Greenwich Mean Time).  If you’re in any other time zone, you’ll have to figure it out for yourself.  Click on the link here to register.

If you’re interested in learning about various ways in which automation is being used in eDiscovery and getting a chance to look at the current state of TAR, possible warts and all, I encourage you to sign up and attend.  It should be an enjoyable and educational hour.  Thanks to our friends at ACEDS for conducting the session!

So, what do you think?  Do you think automation is revolutionizing eDiscovery?  As always, please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Less Than Half of Cloud Users Have a Proactive Approach to Security: eDiscovery Trends

How many blog posts in a row can start with the phrase “less than half”?  At least two… :o)

We’ve covered the growth of cloud adoption several times, especially in eDiscovery, including here and here.  However, according to a new survey from Ponemon, organizations apparently aren’t adopting appropriate governance and security measures to protect sensitive data in the cloud.

In the article Ponemon: Cloud Adoption Grows as Security Lags (written by Tara Seals), 73% of respondents to the survey indicated that cloud-based services and platforms are important to their organization’s operations, and 81% of respondents said they will be more so over the next two years.  Not only that, but 36% of respondents said their companies’ total IT and data processing needs were met using cloud resources today and that number is expected to rise to 45% over the next two years!

Unfortunately, 54% of the respondents said their companies do not have a proactive approach to managing security and complying with privacy and data protection regulations in cloud environments, indicating that their organizations are not careful about sharing sensitive information in the cloud with third parties such as business partners, contractors and vendors.  Challenges identified by survey respondents include:

  • Difficulty in controlling or restricting end-user access, which increased from 48% in 2014 to 53% of respondents in 2016;
  • Inability to apply conventional information security in cloud environments (70% of respondents);
  • Inability to directly inspect cloud providers for security compliance (69% of respondents);
  • Shadow IT is also a problem – nearly half (49%) of cloud services are deployed by departments other than corporate IT and an average of 47% of corporate data stored in cloud environments is not managed or controlled by the IT department.

“Cloud security continues to be a challenge for companies, especially in dealing with the complexity of privacy and data protection regulations,” said Larry Ponemon, chairman and founder, Ponemon Institute.

At least there is intent: 65% of respondents said their organizations are committed to protecting confidential or sensitive information in the cloud.

This isn’t the first study we’ve covered by the Ponemon Institute – click here and here for others.  Go Ponemon Go! (see what I did there?)… :o)

By the way, not all cloud solutions are created equal when it comes to security.  Here’s how we do it.

So, what do you think?  How does your organization handle security for cloud based solutions?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Less Than Half the States Have a Technology Competence Requirement for Attorneys: eDiscovery Trends

As you all know, I love a good infographic.  This one reflects the states that require attorneys to stay abreast of changes in technology relating to law practice.  Does your state have a technology competence requirement for its attorneys?

This infographic is available courtesy of Percipient, which is an eDiscovery and legal technology company that provides managed document review and managed eDiscovery services.  As they note in their post about the topic, in 2012 the American Bar Association amended Comment 8 to Model Rule of Professional Conduct 1.1 (Duty of Competence) to address changes in technology. That Comment now reads as follows:

“To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.”

According to Percipient, twenty-four states have either adopted the amended comment or otherwise require attorneys to stay abreast of changes in technology relating to law practice, with twenty-two of them effective today.  The other two states (represented in light blue on the map) – Washington State (September 1, 2016) and Wisconsin (January 1, 2017) – will be effective within the next few months.  So, by their assessment, less than half of all states have a technology competence requirement for its attorneys.

I have no reason to believe that they missed any states that have such a requirement, but they note to inform them if they missed any.  Regardless, the infographic (available here as a standalone PDF) is a great resource for identifying the current status of technology competence requirements across the country.  Thanks, Percipient!

So, what do you think?  Does your state have a technology competence requirement for attorneys?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

 

Another Busy Year Shaping Up for Mergers and Acquisitions: eDiscovery Trends

One of the trends that most thought leaders that we interviewed in our annual thought leader interview series this year identified was that the eDiscovery provider market was finally consolidating and the pace of mergers and acquisitions was accelerating.  So far this year, that trend is proving true.

The latest announcement, the acquisition of Epiq Systems by the private equity owners of Document Technologies Inc (DTI) – and making Epiq the latest Billion Dollar Baby – is already the 20th merger, acquisition or investment involving an eDiscovery software or service provider this year.

Other well-known providers like Recommind, Elite Document Solutions, Content Analyst, Kiersted Systems and Orange Legal Technologies have also already been acquired this year.

As always, to get the latest list of mergers, acquisitions and investments, you can go to Rob Robinson’s Complex Discovery.  His site keeps a running list of mergers, acquisitions and investments in the eDiscovery industry and goes all the way back to 2001 – almost a full 15 years.  That’s even before Kroll merged with Ontrack!  He still calls it a “non-comprehensive overview”, but there are 275 transactions, so it’s pretty darn comprehensive (in my opinion, anyway).

Rob’s list not only keeps you abreast of changes in the industry, it’s a great “way back” machine for those who have been in the industry for a number of years and remember some of the providers who were acquired and no longer exist as their old names.  And, if you want to know who is investing in eDiscovery companies (besides OMERS, the private equity owner of DTI), Rob has that list too.  :o)

Speaking of DTI, they top the list with 11 acquisitions over the years (not counting Epiq), with companies including Data Forte, Falcon Discovery, Fios, Inc., Hudson Global, Inc. (eDiscovery Assets), Merrill Corporation (Legal Solutions Group), Providus, Adept STS, Limited, Applied Discovery, Bridge City Legal, Daticon EED, Unlimited Discovery Group among the acquired.  Big fish.

So, what do you think?  Are you surprised by the number of eDiscovery transactions this year?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Denies Defendant’s Motion to Overrule Plaintiff’s Objections to Discovery Requests

Court Assesses $3 Million Punitive Sanction to Defendant for “Bad Faith” Deletion of Emails: eDiscovery Case Law

 In GN Netcom, Inc. v. Plantronics, Inc., No. 12-1318-LPS (D. Delaware, July 12, 2016), Delaware District Judge Leonard P. Stark, finding a high degree of fault, bad-faith intent to deprive the plaintiff of responsive documents and prejudice caused to the plaintiff’s case, imposed several sanctions against the defendant, including “punitive sanctions in the amount of $3,000,000” for the “intentional and admitted deletion of emails” by the defendant’s Senior Vice President of Sales.

Case Background

In this case with claims of monopolization, attempted monopolization and common-law tortious interference with business relations against the defendant, the defendant (upon receiving a demand letter from the plaintiff in May 2012) promptly issued a litigation hold to relevant employees and provided training sessions to ensure compliance, then issued an updated litigation hold with quarterly reminders once the lawsuit was filed.

However, the defendant’s Senior Vice President of Sales (Don Houston) on several occasions after the lawsuit was filed, replied to email discussions among co-workers, requesting them to be careful about competitive statements and instructing them to delete those email chains where discussions were taking place.  Houston also deleted his own emails, deleting more than 40% of his emails from November 18, 2013 through February 19, 2014 from both his legal folder and his deleted files folder.  In addition, sales team members were instructed to use code words to refer to competitors, such as “zebra” for the plaintiff.

When the defendant’s Associate General Counsel became aware of the deletions, she contacted the IT department, which implemented an anti-email-deletion litigation hold feature and provided her with Houston’s back-up tapes going back to November 2013.  The defendant retained an eDiscovery provider to restore back-up tapes and preserve emails still available and retained another eDiscovery provider to quantify the emails that had been deleted.  The second eDiscovery provider estimated that as many as 90,000 emails were unrecoverable, with as many as 6,000 estimated to be responsive to the plaintiff’s discovery requests.  The defendant chose not to complete the project and did not disclose the analysis for almost ten months; the plaintiff, using its own expert to conduct analysis, determined as many as 15,000 deleted emails would have been responsive to discovery requests.  The plaintiff filed a Motion for Sanctions against the defendant for the deleted emails.

Judge’s Ruling

Judge Stark began the discussion portion of the ruling by stating that “It is undisputed that thousands of Mr. Houston’s emails ‘should have been preserved in the anticipation or conduct of litigation,’ were ‘lost,’ and ‘cannot be restored or replaced through additional discovery.’”  Judge Stark refuted the defendant’s arguments that it took reasonable steps to preserve ESI, that it had no intent to deprive the plaintiff of discovery (and therefore did not act in bad faith) and that the plaintiff had not demonstrated any prejudice, stating, among other things, that:

  • The defendant’s “extensive document preservation efforts do not absolve it of all responsibility for the failure of a member of its senior management to comply with his document preservation obligations”,
  • “in Plantronics’ own words, Mr. Houston instructed others to delete emails ‘for purposes of protecting the business’”, and
  • “Because the Court has found that Plantronics acted in bad faith, the burden shifts to Plantronics to show a lack [of] prejudice to GN resulting from Mr. Houston’s deletion of emails.” Judge Stark refuted the defendant’s three arguments as to lack of prejudice from the deletion of emails.

With the determination that sanctions were in order, Judge Stark rejected the idea of re-opening discovery as a possible remedy.  Instead, he noted that “[m]onetary sanctions, although unable to fully redress the prejudice to GN, are warranted.”

With that in mind, Judge Stark stated the following:

“[T]he Court finds that Plantronics’ high degree of fault, its bad-faith intent to deprive GN of responsive documents, and the prejudice it has caused to GN’s case – along with the difficulties it has created for GN in ‘getting to the bottom of the deletion story’ and its (at times) unwillingness to acknowledge wrongdoing – further merit punitive monetary sanctions.  Therefore, the Court will impose a sanction in the amount of $3,000,000 on Plantronics, payable to GN.”

In addition, Judge Stark added “monetary sanctions in the form of the reasonable fees and costs incurred by GN in connection with the disputes leading to today’s Order”, “possible evidentiary sanctions, if requested by GN and found by the Court to be warranted as this case progresses toward trial”; and “instructions to the jury that it may draw an adverse inference that emails destroyed by Plantronics would have been favorable to GN’s case and/or unfavorable to Plantronics’ defense.”

So, what do you think?  Were the sanctions excessive or were they appropriate?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

We Are Family, I Got All My Attachments and Me: eDiscovery Best Practices

 OK, I know that’s not how the classic Sister Sledge song goes, but I’m such an eDiscovery geek that every time I think of that song these days, I think of keeping email and attachment families together.  One of the most common mistakes that I see clients make is that they forget to account for complete “families” in their email productions, which leads to an incomplete production to opposing counsel.

Having assisted a client with this just the other day, it seems appropriate to revisit this topic…

In most cases these days when an email or attachment is deemed to be responsive, the receiving party expects to also receive any “family” members of the responsive file (with the possible exception of embedded signature logo graphics, which are often considered extraneous and often removed before review).  Attorneys like to have the complete family when reviewing the production from the other side, even if some of the individual files aren’t responsive themselves.  Receiving an email without its corresponding attachments or receiving some, but not all, of the attachments to an email tends to raise suspicions.  Most attorneys don’t want to give opposing counsel a reason to be suspicious of their production, so parties usually agree to produce the entire email “family” in these cases.  Here’s a scenario:

The case involves an employment dispute over non-disclosure of company trade secrets by a company’s employees.  A supervisor at the company verbally requests copies of non-disclosure agreements related to several of his employees from his HR director and the HR director emails a copy of those non-disclosure agreements attached to an email with the subject “Requested files” and the body stating “Here you go…” (or something to that effect).  A search for “non-disclosure” retrieves the attached agreement, but not the email, which doesn’t really have any pertinent information on it.  Only part of the email “family” is responsive to the search.  This is common.

If it’s important to produce all communications between parties at the company regarding non-disclosure agreements, this email communication could be missed – unless your review protocol includes capturing the family members of responsive files and your review software provides an option to view the family members of responsive files and include them in search results.  There are rare cases where parties agree to limit production to actual responsive files and not produce the families, but that’s unusual.

If your case isn’t one of those rare exceptions, make sure you have a well thought out protocol and robust software for including family members in your search results and in your document reviews for responsiveness, as well as automated and manual Quality Assurance (QA) and Quality Control (QC) checks to ensure your production contains complete family groups.  Singing We Are Family doesn’t just make you a Sister Sledge (or 1979 Pittsburgh Pirates) fan, it may also make you an eDiscovery geek, determined to keep family groups together in your production.  :o)

So, what do you think?  How do you handle family groups in discovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.