Email

eDiscovery Case Law: Apple Wins 1.05 Billion Dollar Verdict Against Samsung

 

Yes, that’s billion, with a “b”.

A jury of nine on Friday found that Samsung infringed all but one of the seven patents at issue in a high-stakes court battle between Apple Inc. and Samsung Electronics Co. The patent that they determined hadn’t infringed was a patent covering the physical design of the iPad. The jurors found all seven of Apple's patents valid—despite Samsung's attempts to have them thrown out. They also determined that Apple didn't violate any of the five patents Samsung asserted in the case.

Apple had been requesting $2.5 billion in damages.  While the award was much less than that, it was still larger than Samsung’s estimates and is among the largest intellectual-property awards on record.  Trial Judge Lucy Koh could also triple the damage award because the jury determined Samsung had acted willfully.

Interviewed after the trial, some of the jurors cited video testimony from Samsung executives and internal emails as key to the verdict.  Jury foreman Velvin Hogan indicated that video testimony from Samsung executives made it "absolutely" clear the infringement was done on purpose.  Another juror, Manuel Ilagan, said , "The e-mails that went back and forth from Samsung execs about the Apple features that they should incorporate into their devices was pretty damning to me."

The verdict was returned Friday afternoon after 22 hours of deliberation, despite the fact that the verdict form contained as many as 700 points the jury (including charges brought against different subsidiaries of the two companies addressing multiple patents and numerous products).

Role of Adverse Inference Sanction

As noted on this blog just a few days ago, Samsung received an adverse inference instruction from California Magistrate Judge Paul S. Grewal just prior to the start of trial as failure to turn “off” the auto-delete function in Samsung’s proprietary “mySingle” email system resulted in spoliation of evidence as potentially responsive emails were deleted after the duty to preserve began.  As a result, Judge Grewal ordered instructions to the jury to indicate that Samsung had failed to preserve evidence and that evidence could be presumed relevant and favorable to Apple.

However, after Samsung accused Apple to have also destroyed and tampered with evidence that could have benefited Samsung in the trial, Judge Lucy Koh decided to modify the “adverse inference” verdict issued for the jury to include instructions that Apple had also failed to preserve evidence.  Therefore, it appears as though the adverse inference instruction was neutralized and did not have a significant impact in the verdict; evidently, enough damning evidence was discovered that doomed Samsung in this case.

Samsung, of course, is expected to appeal.

So, what do you think?  Will this verdict impact discovery in future intellectual property cases?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery History: Zubulake’s e-Discovery

 

In the 22 months since this blog began, we have published 133 posts related to eDiscovery case law.  When discussing the various case opinions that involve decisions regarding to eDiscovery, it’s easy to forget that there are real people impacted by these cases and that the story of each case goes beyond just whether they preserved, collected, reviewed and produced electronically stored information (ESI) correctly.  A new book, by the plaintiff in the most famous eDiscovery case ever, provides the “backstory” that goes beyond the precedent-setting opinions of the case, detailing her experiences through the events leading up to the case, as well as over three years of litigation.

Laura A. Zubulake, the plaintiff in the Zubulake vs. UBS Warburg case, has written a new book: Zubulake's e-Discovery: The Untold Story of my Quest for Justice.  It is the story of the Zubulake case – which resulted in one of the largest jury awards in the US for a single plaintiff in an employment discrimination case – as told by the author, in her words.  As Zubulake notes in the Preface, the book “is written from the plaintiff’s perspective – my perspective. I am a businessperson, not an attorney. The version of events and opinions expressed are portrayed by me from facts and circumstances as I perceived them.”  It’s a “classic David versus Goliath story” describing her multi-year struggle against her former employer – a multi-national financial giant.

Zubulake begins the story by developing an understanding of the Wall Street setting of her employer within which she worked for over twenty years and the growing importance of email in communications within that work environment.  It continues through a timeline of the allegations and the evidence that supported those allegations leading up to her filing of a discrimination claim with the Equal Employment Opportunity Commission (EEOC) and her subsequent dismissal from the firm.  This Allegations & Evidence chapter is particularly enlightening to those who may be familiar with the landmark opinions but not the underlying evidence and how that evidence to prove her case came together through the various productions (including the court-ordered productions from backup tapes).  The story continues through the filing of the case and the beginning of the discovery process and proceeds through the events leading up to each of the landmark opinions (with a separate chapter devoted each to Zubulake I, III, IV and V), then subsequently through trial, the jury verdict and the final resolution of the case.

Throughout the book, Zubulake relays her experiences, successes, mistakes, thought processes and feelings during the events and the difficulties and isolation of being an individual plaintiff in a three-year litigation process.  She also weighs in on the significance of each of the opinions, including one ruling by Judge Shira Scheindlin that may not have had as much impact on the outcome as you might think.  For those familiar with the opinions, the book provides the “backstory” that puts the opinions into perspective; for those not familiar with them, it’s a comprehensive account of an individual who fought for her rights against a large corporation and won.  Everybody loves a good “David versus Goliath story”, right?

The book is available at Amazon and also at CreateSpace.  Look for my interview with Laura regarding the book in this blog next week.

So, what do you think?  Are you familiar with the Zubulake opinions?  Have you read the book?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: The Number of Pages in Each Gigabyte Can Vary Widely

 

A while back, we talked about how the average number of pages in each gigabyte is approximately 50,000 to 75,000 pages and that each gigabyte effectively culled out can save $18,750 in review costs.  But, did you know just how widely the number of pages per gigabyte can vary?

The “how many pages” question comes up a lot and I’ve seen a variety of answers.  Michael Recker of Applied Discovery posted an article to their blog last week titled Just How Big Is a Gigabyte?, which provides some perspective based on the types of files contained within the gigabyte, as follows:

“For example, e-mail files typically average 100,099 pages per gigabyte, while Microsoft Word files typically average 64,782 pages per gigabyte. Text files, on average, consist of a whopping 677,963 pages per gigabyte. At the opposite end of the spectrum, the average gigabyte of images contains 15,477 pages; the average gigabyte of PowerPoint slides typically includes 17,552 pages.”

Of course, each GB of data is rarely just one type of file.  Many emails include attachments, which can be in any of a number of different file formats.  Collections of files from hard drives may include Word, Excel, PowerPoint, Adobe PDF and other file formats.  So, estimating page counts with any degree of precision is somewhat difficult.

In fact, the same exact content ported into different applications can be a different size in each file, due to the overhead required by each application.  To illustrate this, I decided to conduct a little (admittedly unscientific) study using yesterday’s one page blog post about the Apple/Samsung litigation.  I decided to put the content from that page into several different file formats to illustrate how much the size can vary, even when the content is essentially the same.  Here are the results:

  • Text File Format (TXT): Created by performing a “Save As” on the web page for the blog post to text – 10 KB;
  • HyperText Markup Language (HTML): Created by performing a “Save As” on the web page for the blog post to HTML – 36 KB, over 3.5 times larger than the text file;
  • Microsoft Excel 2010 Format (XLSX): Created by copying the contents of the blog post and pasting it into a blank Excel workbook – 128 KB, nearly 13 times larger than the text file;
  • Microsoft Word 2010 Format (DOCX): Created by copying the contents of the blog post and pasting it into a blank Word document – 162 KB, over 16 times larger than the text file;
  • Adobe PDF Format (PDF): Created by printing the blog post to PDF file using the CutePDF printer driver – 211 KB, over 21 times larger than the text file;
  • Microsoft Outlook 2010 Message Format (MSG): Created by copying the contents of the blog post and pasting it into a blank Outlook message, then sending that message to myself, then saving the message out to my hard drive – 221 KB, over 22 times larger than the text file.

The Outlook example was probably the least representative of a typical email – most emails don’t have several embedded graphics in them (with the exception of signature logos) – and most are typically much shorter than yesterday’s blog post (which also included the side text on the page as I copied that too).  Still, the example hopefully illustrates that a “page”, even with the same exact content, will be different sizes in different applications.  As a result, to estimate the number of pages in a collection with any degree of accuracy, it’s not only important to understand the size of the data collection, but also the makeup of the collection as well.

So, what do you think?  Was this example useful or highly flawed?  Or both?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Judge Scheindlin Says “No” to Self-Collection, “Yes” to Predictive Coding

 

When most people think of the horrors of Friday the 13th, they think of Jason Voorhees.  When US Immigration and Customs thinks of Friday the 13th horrors, do they think of Judge Shira Scheindlin?

As noted in Law Technology News (Judge Scheindlin Issues Strong Opinion on Custodian Self-Collection, written by Ralph Losey, a previous thought leader interviewee on this blog), New York District Judge Scheindlin issued a decision last Friday (July 13) addressing the adequacy of searching and self-collection by government entity custodians in response to Freedom of Information Act (FOIA) requests.  As Losey notes, this is her fifth decision in National Day Laborer Organizing Network et al. v. United States Immigration and Customs Enforcement Agency, et al., including one that was later withdrawn.

Regarding the defendant’s question as to “why custodians could not be trusted to run effective searches of their own files, a skill that most office workers employ on a daily basis” (i.e., self-collect), Judge Scheindlin responded as follows:

“There are two answers to defendants' question. First, custodians cannot 'be trusted to run effective searches,' without providing a detailed description of those searches, because FOIA places a burden on defendants to establish that they have conducted adequate searches; FOIA permits agencies to do so by submitting affidavits that 'contain reasonable specificity of detail rather than merely conclusory statements.' Defendants' counsel recognize that, for over twenty years, courts have required that these affidavits 'set [ ] forth the search terms and the type of search performed.' But, somehow, DHS, ICE, and the FBI have not gotten the message. So it bears repetition: the government will not be able to establish the adequacy of its FOIA searches if it does not record and report the search terms that it used, how it combined them, and whether it searched the full text of documents.”

“The second answer to defendants' question has emerged from scholarship and caselaw only in recent years: most custodians cannot be 'trusted' to run effective searches because designing legally sufficient electronic searches in the discovery or FOIA contexts is not part of their daily responsibilities. Searching for an answer on Google (or Westlaw or Lexis) is very different from searching for all responsive documents in the FOIA or e-discovery context.”

“Simple keyword searching is often not enough: 'Even in the simplest case requiring a search of on-line e-mail, there is no guarantee that using keywords will always prove sufficient.' There is increasingly strong evidence that '[k]eyword search[ing] is not nearly as effective at identifying relevant information as many lawyers would like to believe.' As Judge Andrew Peck — one of this Court's experts in e-discovery — recently put it: 'In too many cases, however, the way lawyers choose keywords is the equivalent of the child's game of 'Go Fish' … keyword searches usually are not very effective.'”

Regarding search best practices and predictive coding, Judge Scheindlin noted:

“There are emerging best practices for dealing with these shortcomings and they are explained in detail elsewhere. There is a 'need for careful thought, quality control, testing, and cooperation with opposing counsel in designing search terms or keywords to be used to produce emails or other electronically stored information.' And beyond the use of keyword search, parties can (and frequently should) rely on latent semantic indexing, statistical probability models, and machine learning tools to find responsive documents.”

“Through iterative learning, these methods (known as 'computer-assisted' or 'predictive' coding) allow humans to teach computers what documents are and are not responsive to a particular FOIA or discovery request and they can significantly increase the effectiveness and efficiency of searches. In short, a review of the literature makes it abundantly clear that a court cannot simply trust the defendant agencies' unsupported assertions that their lay custodians have designed and conducted a reasonable search.”

Losey notes that “A classic analogy is that self-collection is equivalent to the fox guarding the hen house. With her latest opinion, Schiendlin [sic] includes the FBI and other agencies as foxes not to be trusted when it comes to searching their own email.”

So, what do you think?  Will this become another landmark decision by Judge Scheindlin?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Types Of Metadata and How They Impact Discovery

 

If an electronic document is a “house” for information, then metadata could be considered the “deed” to that house. There is far more to explaining a house than simply the number of stories and the color of trim. It is the data that isn’t apparent to the naked eye that tells the rest of the story. For a house, the deed lines out the name of the buyer, the financier, and the closing date among heaps of other information that form the basis of the property. For an electronic document, it’s not just the content or formatting that holds the key to understanding it. Metadata, which is data about the document, contains information such as the user who created it, creation date, the edit history, and file type. Metadata often tells the rest of the story about the document and, therefore, is often a key focus of eDiscovery, such as in cases like this one we recently covered here.

There are many different types of metadata and it is important to understand each with regard to requesting that metadata in opposing counsel productions and being prepared to produce it in your own productions.  Examples include:

  • Application Metadata: This is the data created by an application, such as Microsoft® Word, that pertains to the ESI (“Electronically Stored Information”) being addressed. It is embedded in the file and moves with it when copied, though copying may alter the application metadata.
  • Document Metadata: These are properties about a document that may not be viewable within the application that created it, but can often be seen through a “Properties” view (for example, Word tracks the author name and total editing time).
  • Email Metadata: Data about the email.  Sometimes, this metadata may not be immediately apparent within the email application that created it (e.g., date and time received). The amount of email metadata available varies depending on the email system utilized.  For example, Outlook has a metadata field that links messages in a thread together which can facilitate review – not all email applications have this data.
  • Embedded Metadata: This metadata is usually hidden; however, it can be a vitally important part of the ESI. Examples of embedded metadata are edit history or notes in a presentation file. These may only be viewable in the original, native file since it is not always extracted during processing and conversion for eDiscovery.
  • File System Metadata: Data generated by the file system, such as Windows, to track key statistics about the file (e.g., name, size, location, etc.) which is usually stored externally from the file itself.
  • User-Added Metadata: Data created by a user while working with, reviewing, or copying a file (such as notes or tracked changes).
  • Vendor-Added Metadata: Data created and maintained by an eDiscovery vendor during processing of the native document.  Don’t be alarmed, it’s impossible to work with some file types without generating some metadata; for example, you can’t review and produce individual emails within a custodian’s Outlook PST file without generating those out as separate emails (either in Outlook MSG format or converted to an image format, such as TIFF or PDF).

Some metadata, such as user-added tracked changes or notes, could be work product that may affect whether a document is responsive or contains privileged information, so it’s important to consider that metadata during review, especially when producing in native format.

So, what do you think? Have you been involved in cases where metadata was specifically requested as part of discovery? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: You May Need to Collect from Custodians Who Aren’t There

 

A little over a week ago, we talked about how critical the first seven to ten days are in the case once litigation hits.  Key activities to get a jump on the case include creating a list of key employees most likely to have documents relevant to the litigation and interviewing those key employees, as well as key department representatives, such as IT for information about retention and destruction policies.  These steps are especially important as they may shed light on custodians you might not think about – the ones who aren’t there.

No, I’m not talking about the Coen brothers’ movie The Man Who Wasn’t There, starring Billy Bob Thornton, I’m talking about custodians who are no longer with the organization.

Let’s face it, when key employees depart an organization, many of those organizations have a policy in place to preserve their data for a period of time to ensure that any data in their possession that might be critical to company operations is still available if needed.  Preserving that data may occur in a number of ways, including:

  • Saving the employee’s hard drive, either by keeping the drive itself or by backing it up to some other media before wiping it for re-use;
  • Keeping any data in their network store (i.e., folder on the network dedicated to the employee’s files) by backing up that folder or even (in some cases) simply leaving it there for access if needed;
  • Storage and/or archival of eMail from the eMail system;
  • Retention of any portable media in the employee’s possession (including DVDs, portable hard drives, PDAs, cell phones, etc.).

As part of the early fact finding, it’s essential to determine the organization’s retention policy (and practices, especially if there’s no formal policy) for retaining data (such as the examples listed above) of departed employees.  You need to find out if the organization keeps that data, where they keep it, in what format, and for how long.

When interviewing key employees, one of the typical questions to ask is “Do you know of any other employees that may have responsive data to this litigation?”  The first several interviews with employees often identify other employees that need to be interviewed, so the interview list will often grow to locate potentially responsive electronically stored information (ESI).  It’s important to broaden that question to include employees that are no longer with the organization to identify any that also may have had responsive data and try to gather as much information about each departed employee as possible, including the department in which they worked, who their immediate supervisor was and how long they worked at the company.  Often, this information may need to be gathered from Human Resources.

Once you’ve determined which departed employees might have had responsive data and whether the organization may still be retaining any of that data, you can work with IT or whoever has possession of that data to preserve and collect it for litigation purposes.  Just because they aren’t there doesn’t mean they’re not important.

So, what do you think?  Does your approach for identifying and collecting from custodians include those who aren’t there?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: “Naked” Assertions of Spoliation Are Not Enough to Grant Spoliation Claims

 

In Grabenstein v. Arrow Electronics, Inc., No. 10-cv-02348-MSK-KLM, 2012 U.S. Dist. LEXIS 56204 (D. Colo. Apr.23, 2012), Colorado Magistrate Judge Kristen L. Mix denied the plaintiff’s motion for sanctions, finding that their claims of spoliation were based on “naked” assertions that relevant eMails must exist even though the plaintiff could not demonstrate that such other eMails do or did exist.  The motion was also denied because the plaintiff could not establish when the defendant had deleted certain eMail messages, thereby failing to prove claims that the defendant violated its duty to preserve electronic evidence. Judge Mix noted that sanctions are not justified when documents are destroyed in good faith pursuant to a reasonable records-retention policy, if that’s prior to the duty to preserve such documents.

In this employment discrimination case, the plaintiff filed a motion for sanctions, claiming that the defendant failed to retain all eMail messages exchanged internally as well as between the defendant and the plaintiff’s insurer, MetLife, regarding the plaintiff’s short-term disability leave.

Defining the requirement for a finding of spoliation, Judge Mix stated, “A spoliation sanction is proper where (1) a party has a duty to preserve evidence because it knew, or should have known, that litigation was imminent, and (2) the adverse party was prejudiced by the destruction of the evidence.”

Here, Judge Mix found the plaintiff’s contentions that relevant eMails were missing to be “fatally unclear” since neither the plaintiff nor the defendant knew whether other such eMails existed. The plaintiff was also unable to provide any verification that MetLife’s log of relevant eMails exchanged with the defendant was incomplete or had been altered. As a result, Judge Mix was “unable to find that the e-mails produced by MetLife are incomplete and that Defendant destroyed the only complete versions of those e-mails”.

There were some eMails which the defendant admittedly did not preserve.  As to whether those eMails had been deleted after the duty to preserve them had arisen, Judge Mix discussed the standard under the spoliation doctrine: “‘[I]n most cases, the duty to preserve evidence is triggered by the filing of a lawsuit. However, the obligation to preserve evidence may arise even earlier if a party has notice that future litigation is likely.’” Here, Judge Mix found that the plaintiff had not produced any evidence that the defendant should have anticipated litigation prior to receiving actual notice of the filing of the lawsuit. The plaintiff was also unable to show any evidence at all when the defendant had destroyed the eMails that would rebut the defendant’s attorney’s statement that the eMails were deleted prior to the start of litigation. As a result, the plaintiff did not meet its burden of establishing that the defendant had violated its duty to preserve.

While finding that the defendants had violated a records retention policy regulation applicable to the Equal Employment Opportunity Commission when it deleted the eMails, Judge Mix found that it had not done so in bad faith, and it had been simply following its own eMail retention policy in the normal course of business. Accordingly, the plaintiff’s motion for sanctions was denied.

So, what do you think?  Was the ruling fair or should the defendants have been sanctioned for the deleted eMails?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Smoking Gun Shoots Blanks, Google Wins Latest Battle in “Smartphone War” with Oracle

 

Despite a significant inadvertent disclosure of information during Google's litigation with Oracle Corp., U.S. District Judge William Alsup last Thursday (May 31) dismissed claims that its Android mobile phone platform infringes Oracle's copyrights relating to the Java computer language.

Oracle had accused Google of infringing the "structure, sequence and organization" of 37 of Java's application programming interface (API) application. Referring to this case as “the first of the so-called smartphone war cases”, Alsup ruled in the 41-page decision that the particular Java elements Google replicated were free for all to use under copyright law, noting: "So long as the specific code used to implement a method is different, anyone is free under the Copyright Act to write his or her own code to carry out exactly the same function or specification of any methods used in the Java API"

Summarizing the validity of Oracle’s claim, Judge Alsup stated:

“Of the 166 Java packages, 129 were not violated in any way.  Of the 37 accused, 97 percent of the Android lines were new from Google and the remaining three percent were freely replicable under the merger and names doctrines.  Oracle must resort, therefore, to claiming that it owns, by copyright, the exclusive right to any and all possible implementations of the taxonomy-like command structure for the 166 packages and/or any subpart thereof – even though it copyrighted only one implementation.  To accept Oracle’s claim would be to allow anyone to copyright one version of code to carry out a system of commands and thereby bar all others from writing their own different versions to carry out all or part of the same commands.  No holding has ever endorsed such a sweeping proposition.”

Judge Alsup indicated that he was not ruling that Java API packages are free for all to use, stating: “This order does not hold that Java API packages are free for all to use without license.  It does not hold that the structure, sequence, and organization of all computer programs may be stolen. Rather, it holds on the specific facts of this case, the particular elements replicated by Google were free for all to use under the Copyright Act.”

Oracle filed suit against Google in San Francisco federal court in August 2011 claiming that the Android mobile operating system infringed Java copyrights and patents (to which Oracle obtained the rights after acquiring Sun Microsystems in 2010) and once valued damages in the case at $6 billion. In the first phase of the trial, the jury returned a verdict that said Google infringed the structure, sequence, and organization of 37 API packages; however, they deadlocked on Google's affirmative defense that it only made fair use of Java technology and Alsup had not yet ruled on whether the APIs could be copyrighted.  He has now.

Oracle is expected to appeal.

So, what do you think?  Will Oracle appeal and should they do so?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Inadmissibility of Text Messages Being Appealed

 

Last October, we covered a case – Commonwealth v. Koch, No. 1669-MDA-2010, 2011 Pa. Super. LEXIS 2716 (Sept. 16, 2011) – where a Pennsylvania Superior Court ruled text messages inadmissible, declaring that parties seeking to introduce electronic materials, such as cell phone text messages and email, must be prepared to substantiate their claim of authorship with “circumstantial evidence” that corroborates the sender's identity.  That case, where Amy N. Koch was originally convicted at trial on drug charges (partially due to text messages found on her cell phone), is now being appealed to the state Supreme Court.

This article from The Legal Intelligencer regarding the case, notes the following:

“The justices limited the appeal to two issues, leaving the language used by the state intact.

First, the justices will examine whether the text messages “were not offered for their truth” and were therefore admissible. The state questioned whether the Superior Court, in reversing a Cumberland County judge’s decision to admit the texts, had ruled against its own previous holding in another case and thusly created “uncertainty in the law.”

The high court is also tasked with reviewing the case in terms of Pa.R.E. 901, on “Requirement of Authentication or Identification.” According to the Tuesday allocatur grant, prosecutors asked the court to examine whether the Superior Court panel “misapprehended” Rule 901, again going against its own jurisprudence and again creating “uncertainty.”

Despite a victory before the intermediate appellate court, Koch’s attorney called the justice’s decision to take up the case “good news.”

For Camp Hill, Pa., attorney Michael O. Palermo Jr., the challenge represents a chance for the high court to set precedent against electronic documents “blindly coming into evidence.”

“I have a problem with that and I hope the Supreme Court does too,” Palermo told The Legal following the grant of allocatur.”

So, what do you think?  Was the Superior court right in ruling against the admission of these text messages as evidence? Will the State Supreme Court uphold the decision to rule the text messages as inadmissible?  If they do, will that decision create more eDiscovery problems than it solves?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Tips for Saving Money in Litigation

 

A recent article on The National Law Journal (entitled Top 12 tips for saving money in litigation, authored by Damon W.D. Wright) had some good tips for – you guessed it – saving money during litigation.  I thought it would be worth discussing some of these, especially those that relate to eDiscovery cost savings practices.

  1. Conduct targeted preservation and collection: As the author notes, the duty to preserve is “not supposed to cause business operations to grind to a halt” and “the focus should be on the specific subject matter, evidence and likely witnesses in the case”.  If you promptly investigate and quickly identify those likely custodians and act to preserve their data, you’re probably satisfying your duty to preserve.  Just don’t lose sight of organization-wide processes that affect those likely witnesses, such as automated deletion policies, and suspend them for those witnesses, at least.  Don’t make the same mistake that EchoStar did.
  2. Calibrate the budget to the amount and importance of the case:  Ralph Losey, in his interview with eDiscovery Daily, spoke about bottom line proportional review and the idea of setting a budget based on the size and potential exposure of each case.  It simply doesn’t make sense to spend the same amount of effort in routine cases as it does for the “bet your company on the outcome” cases.
  3. File in a fast-moving court: Or pursue transfer if you’re the defendant.  Certainly, the longer a case drags out, the more expensive it is, and that includes for eDiscovery.
  4. Know the court: The author addresses this from a general perspective, but it could be important from an eDiscovery perspective, as a part of that.  Enough case law related to eDiscovery exists now that many judges have started to establish at least some track record with regard to issues such as spoliation, proportionality and sharing of eDiscovery costs.  It’s important to know how your judge views those issues.
  5. Have a key client liaison: Nobody knows the client better than the client themselves, so identifying the right person to serve as a liaison between the client and counsel can not only improve communications, but also streamline process and save costs.  As the author noted, the ideal client liaison will “know the organization well and have the authority, perseverance and communication skill needed to get the attention of others.”
  6. Select vendors and experts with care: The author notes that “you should always obtain price estimates (comparing ‘apples to apples’)” when considering eDiscovery vendors.  As a part of that, it’s important to make sure those comparisons are truly “apples to apples” and comprehensive.  Are per GB processing charges for the original (compressed) GB size or expanded?  Do hosting charges include per user fees or other ancillary charges or are they strictly per GB?  It’s important to make sure those distinctions are clear when comparing. 
  7. Try to get along with opposing counsel: While some are easier to get along with than others, the ability to cooperate with opposing counsel and discuss various discovery issues in the Fed.R.Civ.P. 26(f) conference (such as limits to discovery, form of production, privilege, etc.) will save considerable costs up front if the parties can agree.
  8. Allow opposing counsel to inspect and copy documents at their expense: Although most collections are predominantly in electronic form, there are still paper documents to be addressed and if you can make a non-privileged collection available for them to go through and select and copy the documents they want, that saves on your production costs.
  9. Limit e-mail production by custodians, search terms and date range: As the author noted and eDiscovery Daily previously noted, it’s not only a good idea for producing parties to limit production scope, but model orders to limit scope in patent cases are now being adopted in various jurisdictions, including Texas.
  10. Seek agreement on a narrowed privilege log and a no-waiver order: If you’re successful in #7 above, this should be part of what you try to negotiate.  It helps if both parties have similar concerns regarding the effort and cost to determine privilege and prepare a privilege log.
  11. Pursue cost-shifting for discovery: As yesterday’s post reflects, courts are more often expecting requesting parties to share in the discovery costs when the requests for information result in an undue burden or cost for the producing party.  And, as the author noted, the model order establishes specific parameters for patent cases and the expectation for requesting parties to pay for additional discovery.
  12. Stipulate to facts not in dispute: Why conduct discovery on facts not in dispute?  The author’s recommendation for early stipulations is a great idea for eliminating discovery in areas where it’s not necessary.

So, what do you think?  Did you get some good ideas?  Please share any comments you might have or if you’d like to know more about a particular topic.

eDiscovery Daily will resume with new posts on Tuesday after the Easter holidayHave an eggs-cellent weekend!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.