Ethics

Tired of the “Crap”, Court Sanctions Investors and Lawyers for Several Instances of Spoliation: eDiscovery Case Law

In Clear-View Technologies, Inc., v. Rasnick et al, 5:13-cv-02744-BLF (N.D. Cal. May 13, 2015), California Magistrate Judge Paul S. Grewal sanctioned the defendants $212,320 and also granted a permissive adverse jury instruction that allows the presumption that the defendants’ spoliated documents due to a series of “transgressions” by the defendants and their prior counsel.

You’ve got to love an order that begins this way:

“Deployment of ‘Crap Cleaner’ software—with a motion to compel pending. Lost media with relevant documents. False certification that document production was complete. Failure to take any steps to preserve or collect relevant documents for two years after discussing this very suit. Any one of these transgressions by {the defendants} and their prior counsel might justify sanctions. Taken together, there can be no doubt.”

This case arose from the defendants’ alleged conspiracy with certain former plaintiff’s employees to take over the plaintiff’s company or, failing that, to divert their personnel, intellectual property and investors to a competing enterprise to commercialize the plaintiff’s alcohol tracking product known as the “BarMaster”. As early as May 2011, the plaintiff threatened Defendants with litigation for interfering with the plaintiff’s operations, ultimately filing suit in June 2013.

After the plaintiff’s discovery requests yielded just 422 pages produced by the defendants (including no communications solely between defendants and virtually no communications between defendants and any “co-conspirator” identified in the plaintiff’s requests) the plaintiff moved to compel further production and in September 2014, the court granted the motion and ordered that “(i) Defendants appear by September 23 for depositions regarding ‘document preservation and production,’ and (ii) the parties meet and confer in order to submit to the court by September 30 ‘a plan to retain an independent consultant to do a limited forensic collection and analysis of the media associated with each named defendant.’”

During the depositions, the individual defendants admitted having deleted numerous emails and text messages, failing to preserve devices that potentially responsive data was stored on, failing to search key media and failing to use obvious search terms in the searches that they did perform. Meanwhile, in October 2014, per the parties’ joint agreement, the Court selected the a digital forensics firm (at the defendants’ expense) to perform a forensic analysis of Defendants’ media and email accounts, with the order calling for the defendants to produce over 40 specified electronic media and email accounts for forensic imaging.

The digital forensics firm ultimately found 2,593 relevant documents totaling 12,467 pages – over 12,000 pages more than the defendants had previously produced and also determined that “four separate system optimization and computer cleaning programs were run” (including CCleaner, aka “Crap Cleaner”) on one defendant’s laptop. These programs were loaded onto his laptop and executed on July 22, 2014 – just six days after the filing of the plaintiff’s motion – and resulted in the deletion of “over 50,000 files”. For that and other apparent instances of spoliation of data among the defendants, the plaintiff requested monetary sanctions, an adverse inference instruction and terminating sanctions.

Judge’s Ruling

With regard to the duty to preserve, Judge Grewal stated that “Once upon a time, the federal courts debated exactly when the duty to preserve documents arises. No more. “The duty to preserve evidence begins when litigation is `pending or reasonably foreseeable.’”

Finding that the defendants “were on notice of foreseeable litigation well before spoliation occurred”, that their “spoliation occurred with the required culpable mindset” and that they “failed to produce thousands of documents that contained key terms that the parties designated as relevant to the litigation”, Judge Grewal ruled that “In sum, sanctions are warranted. The only question is what kind.”

Ultimately, Judge Grewal awarded “expenses and fees in this discovery dispute under Fed. R. Civ. P. 37(b)(2)(C)” of $212,320 and granted the request for an adverse instruction that the unproduced material may be deemed to support the plaintiff’s contentions. He also ruled that “Defendants’ prior counsel also must be sanctioned for improperly certifying Defendants’ discovery responses, and for subsequently failing to intervene even after ‘obvious red flags’ arose, such as Defendants’ failure to produce incriminating documents CVT obtained from their third parties.” Also, based on information that the defendants had “stiffed on the bill” for the digital forensics firm, Judge Grewal ruled that “Defendants shall show cause why they should not face further sanctions for this failure.”

Judge Grewal, however, declined to recommend terminating sanctions “in light of public policy and the sufficiency of monetary sanctions and an adverse jury instruction”.

So, what do you think? Should the request for terminating sanctions have been granted? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Are You as “E-Savvy” as You Need to Be in Your “E-Disclosure” Process?: eDiscovery Best Practices

Craig Ball’s Ball in Your Court blog is always an excellent read, even when he writes it “across the pond” over in London. His latest post discusses how “fighting the last war” will eventually cost you when you come across an “e-savvy” opponent.

In Craig’s post, Girding for the E-Savvy Opponent, he mentions that he is presenting the keynote topic opening the Information Governance & eDiscovery Summit conference in London and how, while he was there, they were celebrating the 70th anniversary of VE day. I’ve heard him say before that “Generals are always prepared to fight the last war”, which he analogizes to technology and “e-disclosure” (which is what they call eDiscovery across the pond). Imagine if we were still trying use mounted cavalry to fight against armored tanks? It would be a disaster. As he notes, “In e-disclosure, we still fight the last war, smug in the belief that our opponents will never be e-savvy enough to defeat us.”

Craig notes that “Our old war ways have served so long that we are slow to recognize a growing vulnerability. To date, our opponents have proved unsophisticated, uncreative and un-tenacious.” He observes how our tech-challenged opponents “make it easy” and that he has “more than once heard an opponent defend costly, cumbersome procedures that produce what I didn’t seek and didn’t want with the irrefutable justification of, ‘we did what we always do.’”

But, that won’t always be the case. Craig predicts that “our once tech challenged opponents will someday evolve into Juris Doctor Electronicus.” When those tech challenged opponents evolve into e-savvy opponents, you can expect that they will (among other things): “demand competent search”, “insist on native production”, “compel transparency of scope and process”, “shrewdly use sampling to expose failure” and “demand competence, but not overreach”. With regard to that last point, Craig observes that “E-savvy counsel succeeds not by overreaching but by insisting on mere competence – competent scope, competent processes and competent forms of production. Good, not just good enough.”

Defenses against the e-savvy lawyer may include “the Luddite judge who applies the standards of his or her former law practice to modern evidence” or a strategy “to embed outmoded practices in the rules and to immunize incompetence against sanctions”. But, those won’t work forever. With virtually all evidence today “born electronically”, best practices for handling such evidence cannot be ignored forever. Someday, you will have to face e-savvy opponents on a regular basis, will you be ready?

As usual, Craig has numerous insightful observations in his post, I’ve referenced several of them here, but don’t want to fully steal his thunder, so I recommend you check out his post here.

So, what do you think? Is your organization still “fighting the last war” or are they prepared to deal with an “e-savvy” opponent? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Free Trojans with Your Document Production: eDiscovery Trends

By “trojans”, I mean “malware”, not the other type of “trojans”… 🙂

An Arkansas lawyer representing three Fort Smith police officers in a whistleblower case is seeking sanctions after his computer expert found malware on an external hard drive supplied in response to a discovery request, according to a story by the Northwest Arkansas Democrat Gazette.

According to the story, Attorney Matthew Campbell in North Little Rock has been representing three current and former Fort Smith police officers in the lawsuit since January 2014. He requested emails from the Fort Smith Police Department, and Sebastian County Circuit Judge James O. Cox ordered on May 9, 2014, that they be provided to Campbell as part of discovery in the case. The documents were produced in June 2014. It’s how they were produced that aroused Campbell’s suspicion.

Douglas Carson, the attorney representing Fort Smith and its Police Department, sent Campbell a computer hard drive with the production by Federal Express. According to the story, Campbell said the defendants normally had provided him with requested documents via email, the U.S. Postal Service or through a cloud-based Internet storage service.

So, Campbell decided to have his information technology expert, Geoff Mueller of Austin, Texas, check out the drive first. Guess what he found? Four “Trojans,” one of which was a duplicate.

A “trojan” or “trojan horse” appears to be a legitimate program which unleashes the malware when you are tricked into running it. They can be quite tricky as I reported a few years ago when it happened to me.

“One would have kept my Internet active even if I tried to turn it off, one would have stolen any passwords that I entered in, and the other would have allowed the installation of other malicious software,” Campbell said. “It’s not like these are my only clients, either. I’ve got all my client files in my computer. I don’t know what they were looking for, but just the fact that they would do it is pretty scary.”

In an affidavit filed with the motion Friday, Mueller stated: “Upon informing Mr. Campbell of the presence of these Trojans, he provided me with information that the Fort Smith Police Department claimed to be running a secure system with real-time virus and malware protection. In my experience, if the FSPD system is actually as described, these Trojans would not exist on the system.”

Mueller said the placement of the Trojans in a subfolder named “D:Bales Court Order,” and not in the root directory, “means the Trojans were not already on the external hard drive that was sent to Mr. Campbell and were more likely placed in that folder intentionally with the goal of taking command of Mr. Campbell’s computer while also stealing passwords to his account.”

In addition to the malware found on the drive, Campbell’s motion for sanctions alleges that entire email accounts were deleted, that emails which could have been recovered were purged from the system, and that emails which were previously provided in response to Freedom of Information Act (FOIA) requests had improper deletions. Campbell also states in the motion that the police department’s IT specialist attended a convention ten days after the court granted Campbell’s motion to compel evidence last May. According to Campbell, the expert took classes on secure data deletion, whistleblower investigation and monitoring employee activity, but did not take classes offered on eDiscovery and preservation of evidence.

Campbell is asking for a default judgment for his clients and that the defendants be held in criminal contempt of court, among other sanctions.

So, what do you think? Do you check data produced to you for the presence of malware? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Has the Law Firm Holding Your Data Ever Suffered a Breach? You May Never Know.: eDiscovery Trends

In February, we discussed a report about data breach trends in 2014 and how those trends compared to data breaches in 2013. That report provided breach trends for several industries, including the healthcare industry, which suffered the most breaches last year (possibly because stolen health records are apparently worth big money). But, according to a recent report, you won’t see any trends for law firms because the legal profession almost never publicly discloses a breach.

According to a recent article in The New York Times (Citigroup Report Chides Law Firms for Silence on Hackings, written by Matthew Goldstein), the “unwillingness of most big United States law firms to discuss or even acknowledge breaches has frustrated law enforcement and corporate clients for several years.” This information was according to a recent internal report from Citigroup’s cyberintelligence center that warned bank employees of the threat of attacks on the networks and websites of big law firms.

“Due to the reluctance of most law firms to publicly discuss cyberintrusions and the lack of data breach reporting requirements in general in the legal industry, it is not possible to determine whether cyberattacks against law firms are on the rise,” according to the report, a copy of which was reviewed by The New York Times and discussed in Goldstein’s article.

Issued in February, the report (according to Goldstein’s article) included several observations, such as:

  • It is “reasonable to expect law firms to be targets of attacks by foreign governments and hackers because they are repositories for confidential data on corporate deals and business strategies”;
  • Bank employees “should be mindful that digital security at many law firms, despite improvements, generally remains below the standards for other industries”;
  • Law firms are at “high risk for cyberintrusions” and would “continue to be targeted by malicious actors looking to steal information on highly sensitive matters such as mergers and acquisitions and patent applications.”

According to the article, the bank’s security team also “highlighted several ways hackers had intruded on law firms, by directly breaching their systems, attacking their websites or using their names in so-called phishing efforts to trick people into disclosing personal information”. As a result, Wall Street banks are putting pressure on law firms to do more to prevent the theft of information and are also demanding more documentation from them about online security measures before approving them for assignments.

The report mentioned a handful of law firms who had suffered reported hacks, which apparently led to Citigroup’s distancing itself from the report and stop distributing it.

“The analysis relied on and cited previously published reports. We have apologized to several of the parties mentioned for not giving them an opportunity to respond prior to its publication in light of the sensitive nature of the events described,” said Danielle Romero-Apsilos, a Citigroup spokeswoman.

While law firms apparently aren’t publicly disclosing breaches, they are apparently choosing cyber liability insurance at an increased rate. We will discuss that on Monday.

Thanks to Sharon Nelson and her always excellent Ride the Lightning blog for the tip – her post regarding the story is here.

So, what do you think? How much information do you know about your outside counsel’s security measures? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

California Has an Opinion about Attorney Blogging Too – eDiscovery Trends

Last week, we reported on an updated proposed opinion in California that required that attorneys in that state better be sufficiently skilled in eDiscovery, hire technical consultants or competent counsel that is sufficiently skilled, or decline representation in cases where eDiscovery is required (after reporting on the original proposed opinion back in April). Now, the California State Bar Standing Committee on Professional Responsibility and Conduct (COPRAC) has turned its attention to another relatable topic for me – blogging (by attorneys, of course).

COPRAC has released Proposed Formal Opinion Interim No. 12 0006, which considers: Under what circumstances is “blogging” by an attorney subject to the requirements and restrictions of the Rules of Professional Conduct and related provisions of the State Bar Act regulating attorney advertising? At its Dec. 5, 2014 meeting, COPRAC tentatively approved Proposed Formal Opinion Interim No. 12 0006 for a 90 day public comment distribution, due to expire on March 23rd, 2015 at 5pm PST.

The opinion digest states:

1.     Blogging by an attorney is subject to the requirements and restrictions of the Rules of Professional Conduct and the State Bar Act relating to lawyer advertising if the blog expresses the attorney’s availability for professional employment directly through words of invitation or offer to provide legal services, or implicitly through its description of the type and character of legal services offered by the attorney, detailed descriptions of case results, or both.

2.   A blog that is a part of an attorney’s or law firm’s professional website will be subject to the rules regulating attorney advertising to the same extent as the website of which it is a part.

3.     A stand-alone blog by an attorney that does not relate to the practice of law or otherwise express the attorney’s availability for professional employment will not become subject to the rules regulating attorney advertising simply because the blog contains a link to the attorney or law firm’s professional website.

The opinion also includes a statement of facts analyzing four examples of attorney blogs and which ones are subject to Rule 1-400 of the Rules of Professional Conduct of the State Bar of California. For more information and where to direct comments, click here.

So, what do you think? Should other states have similar rules about attorney blogging? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

New California eDiscovery Competence Proposed Opinion Has Been Revised – eDiscovery Trends

Last April, we reported on a new proposed opinion in California that required that attorneys in that state better be sufficiently skilled in eDiscovery, hire technical consultants or competent counsel that is sufficiently skilled, or decline representation in cases where eDiscovery is required. Now, that opinion has been revised and the comment period has been reset.

The California State Bar Standing Committee on Professional Responsibility & Conduct has released a new version of the Proposed Formal Opinion Interim No. 11-0004, which is designed to establish an attorney’s ethical duties in the handling of discovery of electronically stored information. Now, the first page of the opinion states:

“An attorney’s obligations under the ethical duty of competence evolve as new technologies develop and become integrated with the practice of law. Attorney competence related to litigation generally requires, among other things, and at a minimum, a basic understanding of, and facility with, issues relating to e-discovery, including the discovery of electronically stored information (“ESI”). On a case-by-case basis, the duty of competence may require a higher level of technical knowledge and ability, depending on the e-discovery issues involved in a matter, and the nature of the ESI. Competency may require even a highly experienced attorney to seek assistance in some litigation matters involving ESI. An attorney lacking the required competence for e-discovery issues has three options: (1) acquire sufficient learning and skill before performance is required; (2) associate with or consult technical consultants or competent counsel; or (3) decline the client representation. Lack of competence in e-discovery issues also may lead to an ethical violation of an attorney’s duty of confidentiality.”

The proposed ethics opinion still includes the hypothetical situation discussed in the original version in which a lawyer agrees to opposing counsel’s search of his client’s database using agreed-upon terms with that lawyer mistakenly thinking that a clawback agreement offered by opposing counsel is broader than it is, and will allow him to pull back anything, not just protected ESI, so long as he asserts it was “inadvertently” produced. The remainder of the proposed opinion discusses the attorney’s duties regarding ESI, including the duty of competence and the duty of confidentiality.

The clock is reset and the committee is requesting comments on the revised opinion now through April 9 (by 5pm Pacific time). For more information and where to direct comments, click here.

So, what do you think? Will other states adopt similar ethics opinions? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Judgment of $34 Million against Insurer Dodging Malpractice Claim is a “Dish” Served Cold – eDiscovery Case Law

 

In my hometown of Houston, attempting to deny coverage to a client successfully sued for discovery-related negligence cost OneBeacon Insurance Company a $34 million judgment by a federal jury.

As reported by Robert Hilson in ACEDS (Insurer dodging malpractice claim must pay $34 million for attorney’s discovery blunder, subscription required), OneBeacon Insurance Company attempted to rescind a policy from T. Wade Welch & Associates (TWW), the Houston-based law firm that was sued by former client Dish Network in 2007 after one of its attorneys provided incomplete discovery responses to Dish’s adversary. That failure resulted in so-called “death penalty” sanctions against Dish in a contractual interference case brought by Russian Media Group (RMG), which accepted a $12 million settlement.

After Dish won an arbitration award against TWW for that amount last year, OneBeacon sued TWW in federal court seeking a declaration the law firm voided coverage on its policy by failing to disclose the Dish sanctions prior to entering into that policy. OneBeacon alleged that TWW should have known that those penalties in the Dish case would give rise to a malpractice claim, which would trigger a so-called “prior knowledge exclusion” in the insurance policy that rescinds coverage, the insurer claimed. It also accused the firm of making misrepresentations on its policy application.

However, a jury in the US District Court for the Southern District of Texas begged to differ, finding that:

  • OneBeacon failed to move for a swift settlement with Dish when its liability had become clear; and
  • OneBeacon’s failure to settle the Dish claim amounted to gross negligence.

The jury assessed damages as follows:

  • TWW’s lost profits sustained in the past: $3 million;
  • TWW’s lost profits that, in reasonable probability, it will sustain in the future: $5 million;
  • Sum assessed in exemplary damages for OneBeacon’s gross negligence: $5 million;
  • Sum assessed in exemplary damages because OneBeacon’s conduct was committed knowingly: $7.5 million.

TOTAL: $20.5 million.  Plus, although the OneBeacon policy had a $5 million limit, the “Stowers Doctrine,” which holds that an insurer undertaking the defense of an insured has the obligation to make a good faith attempt to settle the insured’s claim within those policy limits, additionally put the company on the hook for the entire $12.6 million arbitration settlement.  Ouch!

This was after US district Judge Gray Miller, in June, denied summary judgment to OneBeacon, finding that it was not clear from the evidentiary record whether TWW attorneys should have reasonably foreseen the malpractice claim that eventually arose from the Dish sanctions.

For more information on the case, including the jury’s verdict, click here (subscription required).

So, what do you think?  Should OneBeacon have been “on the hook” for the settlement amount or should the “prior knowledge exclusion” have excluded them?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Be Afraid, Be Very Afraid – eDiscovery Horrors!

Today is Halloween.  Every year at this time, because (after all) we’re an eDiscovery blog, we try to “scare” you with tales of eDiscovery horrors.  This is our fifth year of doing so, let’s see how we do this year.  Be afraid, be very afraid!

Did you know that overlaying Bates numbers on image-only Adobe PDF files causes the text of the image not to be captured by eDiscovery processing applications?

What about this?

Finding that the information was relevant and that the defendants “acted with a culpable state of mind” when they failed to preserve the data in its original form, New York Magistrate Judge Ronald L. Ellis granted the plaintiff’s motion for spoliation sanctions against the defendant, ordering the defendant to bear the cost of obtaining all the relevant data in question from a third party as well as paying for plaintiff attorney fees in filing the motion.

Or this?

It’s Friday at 5:00 and I need 15 gigabytes of data processed to review this weekend.

How about this?

Ultimately, it became clear that the defendant had not exported or preserved the data from salesforce.com and had re-used the plaintiffs’ accounts, spoliating the only information that could have addressed the defendant’s claim that the terminations were performance related (the defendant claimed did not conduct performance reviews of its sales representatives).  As a result, Judge Kemp stated that the “only realistic solution to this problem is to preclude Tellermate from using any evidence which would tend to show that the Browns were terminated for performance-related reasons”

Or maybe this?

Could an “unconscionable” eDiscovery vendor actually charge nearly $190,000 to process 505 GB and host it for three months?  Could another vendor charge over $800,000 to re-process and host data (that it had previously hosted) for approximately two months?  Yes, in both cases (though, at least in the second case, the court disallowed over $700,000 of the billed costs).

Scary, huh?  If the possibility of additional processing charges for your PDF files, sanctions because you didn’t preserve data in its original format or preserve it in your cloud-based system or inflated eDiscovery vendor charges scares you, then the folks at eDiscovery Daily will do our best to provide useful information and best practices to enable you to relax and sleep soundly, even on Halloween!

Then again, if it really is Friday at 5:00 and you need 15 gigabytes of data processed to review this weekend (inexpensively, no less), maybe you should check this out.

Of course, if you seriously want to get into the spirit of Halloween, click here.  This will really terrify you!  (Rest in Peace, Robin)

What do you think?  Is there a particular eDiscovery issue that scares you?  Please share your comments and let us know if you’d like more information on a particular topic.

Happy Halloween!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Battle Continues between Attorneys and Client over Attorneys’ Failure to Review Documents – eDiscovery Case Law

In Price Waicukauski & Riley v. Murray, 1:10-cv-1065-WTL-TAB (S.D. Ind. Sept. 18, 2014), Indiana District Judge William T. Lawrence granted the plaintiff’s request for summary judgment for failure to pay attorney’s fees of over $125,000, and refused to issue summary judgment for either party related to a legal malpractice claim for the plaintiff’s admitted failure to review documents produced in the defendants’ case against another party because of a factual dispute regarding the plaintiff’s knowledge of the documents produced.

Case Background

This case was filed in August 2010 by the Plaintiff, Price Waicukauski & Riley, LLC, (“PWR”) against the Defendants, Dennis and Margaret Murray and DPM, Ltd. (“Murrays”), to recover $127,592.91 in attorneys’ fees owed to the plaintiff. The attorneys’ fees stem from the plaintiff’s representation of the defendants in a rather contentious lawsuit against Conseco that spanned more than six years, ultimately settling.  In November 2010, unhappy with the plaintiff’s representation, the defendants filed a counterclaim against the plaintiff alleging legal malpractice.

Legal Malpractice Claim of Breach of Duty of Loyalty

The defendants alleged several allegations of legal malpractice against the plaintiff, including conflict of interest, failure to properly plead federal subject matter jurisdiction and failure to take depositions and conduct discovery as they requested, among other allegations.  One allegation related to the defendants’ claim that the plaintiff breached the duty of loyalty to the defendants by failing (despite the defendant’s request to do so) to review documents before production in the case that revealed a Trust set up on behalf of the plaintiffs that wasn’t disclosed in interrogatory responses.  The plaintiff informed Mr. Murray that it reviewed the documents; however, it ultimately admitted that it did not.  As a result of the misleading interrogatory responses, Conseco filed a motion for sanctions which was granted, resulting in the defendants being ordered to pay over $85,000 in attorneys’ fees to their opponent’s lawyers.

The defendants claimed that the plaintiff knew about the Trust from the outset of its representation; however, the plaintiff (“falsely and underhandedly”, according to the defendants) represented to the magistrate judge assigned to the Underlying Litigation that it had no knowledge of the Trust until the defendants’ accountant produced the Murrays’ tax returns.

Judge’s Analysis and Ruling

The plaintiffs referenced Niswander v. Price Waicukauski & Riley, LLC, where the court held that “[w]hether . . . the Plaintiffs’ attorneys had a duty to review the documents personally before producing them in discovery . . . is simply not something within the knowledge of a layperson.”  However, Judge Lawrence noted, “[t]he Murrays have no expert testimony on either of these two related claims; however, they claim they fall into the above-mentioned exception for when no expert testimony is needed: ‘when the question is within the common knowledge of the community as a whole or when an attorney’s negligence is so grossly apparent that a layperson would have no difficulty in appraising it.’”  Judge Lawrence also agreed with the defendants differentiation of Niswander to this case in that they specifically directed the plaintiff to review the documents while the plaintiffs in Niswander did not.

Judge Lawrence also stated that “[t]he same rings true with the Murrays’ allegation that PWR falsely denied knowledge of the Trust… Again, the Court believes that it is well within the knowledge of a layperson that attorneys should not lie and falsely implicate their own clients in order to shield themselves from liability. Thus, the Court agrees that no expert testimony is needed on this claim regarding the standard of care.”

However, Judge Lawrence decided that “neither party is entitled to summary judgment on this issue” because “there is a factual dispute that precludes granting summary judgment on this claim. PWR maintains that it did not lie; it steadfastly maintains that it had no knowledge of the Trust at the outset of the litigation. Thus, when asked by the magistrate judge when it found out about the Trust, it informed her truthfully. Therefore, whether or not PWR breached a duty that caused injury to the Murrays depends on whom the jury believes: Mr. Murray or PWR.”

Ultimately, Judge Lawrence granted the summary judgment on behalf of the plaintiffs for the attorney’s fees of $127,592.91 (which the defendant did not dispute, but argued that “[t]he successful pursuit of [their] claims would effectively eliminate PWR’s claim”) and denied the defendant’s summary judgment request, but refused a final judgment as outstanding claims remained against the plaintiff.  Judge Lawrence concluded his ruling by noting that “The only claims that remain to be tried are the proximate cause issue with regard to the federal subject matter jurisdiction claim and the allegation of malpractice committed by PWR as a result of its alleged failure to review certain documents that led to sanctions being imposed on Mr. Murray.”

So, what do you think?  Does the failure by the plaintiff to review the defendant’s production constitute legal malpractice?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Privilege Not Waived on Defendant’s Seized Computer that was Purchased by Plaintiff at Auction – eDiscovery Case Law

In Kyko Global Inc. v. Prithvi Info. Solutions Ltd., No. C13-1034 MJP (W.D. Wash. June 13, 2014), Washington Chief District Judge Marsha J. Pechman ruled that the defendants’ did not waive their attorney-client privilege on the computer of one of the defendants purchased by plaintiffs at public auction, denied the defendants’ motion to disqualify the plaintiff’s counsel for purchasing the computer and ordered the plaintiffs to provide defendants with a copy of the hard drive within three days for the defendants to review it for privilege and provide defendants with a privilege log within seven days of the transfer.

In this fraud case, after several of the named defendants settled and confessed to judgment, the plaintiffs obtained a Writ of Execution in which the King County (Washington) Sheriff seized various items of personal property, including a computer owned by one of the defendants.  The computer was sold at a public auction, and an attorney for the plaintiffs outbid a representative sent by the defendants and purchased the computer.  The plaintiffs sent the computer to a third party for analysis and requested a ruling as to the admissibility of potentially attorney-client privileged documents contained on it, while the defendants contended the actions of the plaintiffs violated ethical rules, and requested that the plaintiffs return the computer to defendants, and also requested that the plaintiff’s attorneys should be disqualified from the case.

With regard to the plaintiff’s actions, Judge Pechman ruled that plaintiffs’ acquisition of the computer was not “inherently wrongful”, noting the plaintiffs’ claim that they had not reviewed the materials on the computer at the time of the motion.  She also determined that plaintiff’s “use of a third party vendor to make a copy of the hard drive is not equivalent to metadata mining of documents produced through the normal discovery process, because whereas the hard drive might plausibly contain many documents unprotected by any privilege, metadata mining is expressly aimed at the kind of information one would expect to be protected by attorney-client privilege and/or work-product protections”.  As a result, she denied the defendants’ motion to disqualify the plaintiff’s counsel.

As for the waiver of privilege, Judge Pechman used a balancing test to determine waiver “that is similar to Rule 502(b)”, which included these factors:

  1. the reasonableness of precautions taken to prevent disclosure,
  2. the amount of time taken to remedy the error,
  3. the scope of discovery,
  4. the extent of the disclosure, and
  5. the overriding issue of fairness.

Using the analogy of where “an opposing party discovers a privileged document in the other party’s trash”, Judge Pechman considered the potential waiver of privilege.  However, because the defendant stated in a declaration that she had “someone at her office” reformat the hard drive on the computer and install a new operating system and believed her documents had been erased and were not readily accessible, she related it “to the memo torn into 16 pieces than a document simply placed in a trash can without alteration”.

As a result, Judge Pechman determined that given “Defendants’ prompt efforts to remedy the error by filing a motion with the Court and the general sense that parties should not be able to force waiver of attorneyclient privilege through investigative activities outside the discovery process and a superior understanding of the relevant technology, the Washington balancing test weighs against waiver.”  She also and ordered the plaintiffs to provide defendants with a copy of the hard drive within three days for the defendants to review it for privilege and provide defendants with a privilege log within seven days of the transfer.

So, what do you think?  Were the plaintiff’s counsel actions ethical?  Should privilege have been waived?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.