Privileged

Don’t Get Judge Peck Started on Rule 502(d) Orders: eDiscovery Best Practices

As I noted a couple of weeks ago on this blog, LegalTech® New York 2015 (LTNY) earlier this month had three free judges panel sessions that were CLE or Ethics credit eligible, that included several notable judges, including Judge Andrew J. Peck. These sessions covered the judges’ review of top preservation decisions for 2014, their thoughts on the proposed FRCP amendments and their opinions of what’s wrong with discovery today. In each of those sessions, you heard these questions from Judge Peck at one point during the session.

“How many of you use Federal Rule of Evidence 502(d) non-waiver orders? Or, if you’re inside counsel, (how many) instruct your outside counsel to do so?”

In the last session, fellow panelist and Judge Frank Maas asked a follow-up question, which drew a big laugh: “How many of you have been asked that question at this conference by Judge Peck?”

For those who don’t know, here is the text of FRCP Rule 502(d): Controlling Effect of a Court Order. A federal court may order that the privilege or protection is not waived by disclosure connected with the litigation pending before the court — in which event the disclosure is also not a waiver in any other federal or state proceeding.”

In one of the sessions, Judge Peck discussed the significance of Rule 502(d), as follows: “it is a rule that says you don’t have to be careful, you don’t have to show that you’ve done a careful privilege screening, and it says that if the court enters a 502(d) order, it’s a non-waiver of privilege in that case and it’s a non-waiver of privilege in any subsequent state or federal case, even with different parties.”

While making it clear that “I’m never saying that you shouldn’t be as careful as possible to protect your client’s privilege”, Judge Peck related a story of one case where a firm had a potentially privileged group of documents and the associate was reviewing the documents late at night, creating two piles – one for privileged, one for not privileged – got up to get a drink, came back and got the piles mixed up, resulting in privileged documents being inadvertently produced. Naturally, he said, the other side “didn’t just let them off the hook” about whether that waived the privilege or not and there were motions back and forth about it, which a 502(d) order would have eliminated.

With regard to any potential downsides to filing a 502(d) order, Judge Peck made it clear that “in my mind, there is no downside to having such an order”, noting that the only downside he has heard is that “if you’re before the wrong judge, the famous Neanderthal judge that everyone worries about, that judge might say that you need to produce all your documents next week and you don’t need to do a privilege review.” But, he dismissed that as unlikely and, noted that it is “against the rules”.

Judge Peck doesn’t just advocate use of 502(d) orders, he provides a sample order on his page in the Southern District of New York web site, noting that “it’s a simple two paragraph order – the first paragraph gives you the 502(d) protection to the fullest extent and the second paragraph essentially says that nothing in this order will serve to prevent you from doing a careful review for privilege, confidentiality or anything else.” He acknowledged that he “stole that (second) paragraph from a lawyer presenting at the Georgetown conference a few years ago”.

Judge Peck also mentioned The Sedona Conference Commentary on the Protection of Privileged ESI (released last year, it can be downloaded here), which not only includes his sample order, but another (longer) example as well.

So, what do you think? Do you use 502(d) orders in your cases? If not, why not? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

2014 eDiscovery Case Law Year in Review, Part 4

As we noted yesterday, Wednesday and Tuesday, eDiscoveryDaily published 93 posts related to eDiscovery case decisions and activities over the past year, covering 68 unique cases! Yesterday, we looked back at cases related to privilege and inadvertent disclosures, requests for social media, cases involving technology assisted review and the case of the year – the ubiquitous Apple v. Samsung dispute. Today, let’s take a look back at cases related to sanctions and spoliation.

We grouped those cases into common subject themes and will review them over the next few posts. Perhaps you missed some of these? Now is your chance to catch up!

SPOLIATION / SANCTIONS

I’ll bet that you won’t be surprised that, once again, the topic with the largest number of case law decisions related to eDiscovery are those related to sanctions and spoliation issues. Of the 68 cases we covered this past year, 28 percent of them (19 total cases) related to sanctions and spoliation issues. Sometimes requests for sanctions are granted, sometimes they’re not. Here they are.

Plaintiff Sanctioned After its “Failure to Take the Most Basic Document Preservation Steps”: In SJS Distribution Systems, Inc. v. Sam’s East, Inc., New York Magistrate Judge Robert M. Levy found the plaintiff’s failure to take “the most basic document preservation steps,” including issuing a litigation hold – “even after it discovered the packaging nonconformities and filed this action” – constituted gross negligence. As a result, an adverse inference instruction sanction was issued against the plaintiff and the defendant was awarded its costs and attorney’s fees associated with its motion to compel.

Sanctions Awarded when Defendant Failed to Preserve Relevant Evidence: In Zest IP Holdings, LLC v. Implant Direct Manufacturing, LLC., California Magistrate Judge William V. Gallo granted the Plaintiff’s motion for sanctions because parties are “required to preserve evidence relevant to litigation and to prevent spoliation.” Judge Gallo found that the Defendant “failed to preserve multiple documents that are relevant to Plaintiff’s claims with the requisite culpable state of mind to support a finding of spoliation of evidence”.

Search Process for ESI Called into Question, but Court Denies Sanctions for Plaintiff: In Brown v. West Corp., the plaintiff filed a motion to compel, claiming the defendant had been insufficient in its handling of searching for Electronically Stored Information (ESI) relevant to discovery. The plaintiff additionally contested a prior order from a magistrate judge, requiring the defendant to explain its search processes to the defendant. Ultimately, Nebraska Senior District Judge Lyle E. Strom denied the requested sanctions and rejected the challenge to the prior order.

Bad Faith Violations in Discovery Lead to Sanctions for Defendant: Regarding the case In re Pradaxa (Dabigatran Etexilate) Products Liability Litigation, the defendants’ repeated failure to preserve and produce documents during discovery was found to be in bad faith. The defendants were ordered to produce the documents, or to explain why they couldn’t be produced, and to pay a hefty fine plus the plaintiff’s costs and fees for pursuing discovery motions. The order left room for additional future sanctions, should the bad faith behavior continue.

Clawback Rights Upheld and Plaintiff Sanctioned for Refusal to Comply Concerning Inadvertently Produced Privileged Documents: In RIPL Corp. v. Google Inc., seven discovery-related motions were heard concerning this trademark infringement action. The various motions to seal, compel, enforce, and sanction were filed after the parties had entered into a stipulated protective order. Washington District Judge Ricardo S. Martinez granted in part, denied in part, and deferred in part the various motions.

Sanctions Denied over Destruction of Audio Evidence in Discrimination Lawsuit: In Sokn v. Fieldcrest Cmty. Unit School Dist. No. 8, the plaintiff filed a motion for default and sanctions relating to spoliation of evidence with a federal court, after a district court issued a Report and Recommendation (R&R) to deny the motion. Illinois Senior District Judge Joe Billy McDade ultimately declined to impose sanctions, due to a lack of evidence regarding the timing of alleged spoliation, and the plaintiff’s inability to establish bad faith on the part of the defendants.

Plaintiff Sanctioned for Spoliation of Digital Evidence in Sexual Harassment Lawsuit: In Calderon v. Corporacion Puertorrique a de Salud, the plaintiff was found to have violated his duty to preserve evidence during the discovery phase of this sexual harassment lawsuit. Sanctions were imposed, though not to the extent requested by the defendants.

Use of a Bulk File Changer to Manipulate Metadata Leads to Sanctions for Defendant: In T&E Investment Group, LLC v. Faulkner, Texas District Judge Jorge A. Solis upheld the earlier recommendation of the Magistrate Judge to order an adverse inference sanction, along with monetary sanctions, against the defendant for manipulation of metadata.

Defendants – and Defendants’ Counsel – Sanctioned for Delays in Producing ESI: In Knickerbocker v Corinthian Colleges, Washington District Judge James L. Robart imposed sanctions against the defendants and the defendants’ counsel for their delays in producing Electronically Stored Information (ESI) during discovery, despite the fact that spoliation of evidence was ultimately avoided.

Court Refuses to Dismiss Spoliation Claim Due to Defendant’s Failure to Produce Key Native File with Metadata: In Raines v. College Now Greater Cleveland, Inc., Ohio District Judge James S. Gwin refused to dismiss the plaintiff’s claim of tortious spoliation of evidence due to the defendant’s failure to produce the metadata associated with a key report authored by the plaintiff.

Court Denies Sanctions for Deletion of “Smoking Gun” Email, Grants Defendants’ Motion for Summary Judgment: In the case In re Text Messaging Antitrust Litig., Illinois District Judge Matthew F. Kennelly not only denied the plaintiffs’ request for an adverse inference sanction against the defendants for destroying emails, but also granted the defendants’ motion for summary judgment, as the plaintiffs failed to provide any supporting circumstantial evidence to meet their burden of proof.

Failure to Preserve Cloud-Based Data Results in Severe Sanction for Defendant: In Brown v. Tellermate Holdings, Magistrate Judge Terence Kemp granted plaintiffs’ motion for judgment and motion to strike, ruling that the defendant could not “present or rely upon evidence that it terminated the Browns’ employment for performance-related reasons” and enabling the plaintiffs to use documents produced by the defendant “designated as attorneys’-eyes-only” to be used by the plaintiffs “without restriction”, due to the defendant’s failure to preserve or produce data from their Salesforce.com database.

Texas Supreme Court Reverses Spoliation Ruling, Remands Case for New Trial: In Brookshire Bros., Ltd. v. Aldridge, the Supreme Court of Texas determined “that imposition of the severe sanction of a spoliation instruction was an abuse of discretion” in the trial court, reversed the court of appeals’ judgment and remanded the case for a new trial.

Circuit Court Affirms Denial of Sanctions Over Spoliation by Defendant: In Automated Solutions Corp. v. Paragon Data Sys., Inc., the Sixth Circuit court affirmed the holdings of the district court, rejecting the plaintiff’s arguments that the district court abused its discretion by denying plaintiff’s motion for spoliation sanctions due to defendant’s failure to preserve information on a hard drive and server. The circuit court also affirmed the ruling by both the magistrate and district judge that the defendant’s back-up tapes were not subject to the duty to preserve.

Court Grants Motion for Spoliation Sanctions Due to Data that is “Less Accessible”: In Mazzei v. Money Store, New York Magistrate Judge Ronald L. Ellis granted the plaintiff’s motion for spoliation sanctions against the defendant, ordering the defendant to bear the cost of obtaining all the relevant data in question from a third party as well as paying for plaintiff attorney fees in filing the motion.

Failure to Preserve Data on Various Devices Causes Special Master to Recommend Default Judgment: In Small v. University Medical Center of Southern Nevada, Special Master Daniel B. Garrie, calling the defendant’s widespread failure to preserve data a “mockery of the orderly administration of justice”, recommended that the court enter an order of default judgment, along with further sanctions, in favor of the plaintiffs.

Plaintiff Slips, But Defendant Takes the Fall: In Riley v. Marriott Int’l, New York Magistrate Judge Marian W. Payson agreed with the plaintiffs that spoliation of data had occurred when the defendant failed to preserve video surveillance and “sweep logs” after one of the plaintiffs slipped and fell in the defendant’s hotel garage and that the defendant was at least grossly negligent for not preserving the information. However, the judge denied the plaintiffs request for summary judgment, granting an adverse inference instruction instead.

The Watergate 18 Minute Gap in Audio Recordings Has Nothing on This Case: In Novick v. AXA Network, LLC, New York Magistrate Judge Kevin Nathaniel Fox granted the plaintiff’s request for sanctions against the defendant, awarding an adverse inference jury instruction for several weeks of spoliated audio recordings and also awarding “reasonable attorney’s fees and costs” associated with the motion as well as retaking several depositions.

Finding Defendant’s Destruction of Documents to be “Planned, Repeated and Comprehensive”, Court Awards Judgment to Plaintiff: In Regulatory Fundamentals Group v. Governance Risk Management Compliance, New York District Judge Katherine B. Forrest granted the plaintiff’s motion for sanctions and ordered that judgment be entered for the defendant’s “planned, repeated, and comprehensive” destruction of highly-relevant documents.

That concludes our look back at 68 cases from last year – the most we’ve ever covered! Do you think discovery issues are being disputed more than ever before? If so, do you think the new Federal rules changes (once they’re implemented) will reverse that trend? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

2014 eDiscovery Case Law Yhttps://cloudnine.com/ediscoverydaily/case-law/2014-ediscovery-case-law-year-in-review-part-3/ear in Review, Part 3

As we noted yesterday and the day before, eDiscoveryDaily published 93 posts related to eDiscovery case decisions and activities over the past year, covering 68 unique cases! Yesterday, we looked back at cases related to eDiscovery cost sharing and reimbursement, fee disputes and production format disputes. Today, let’s take a look back at cases related to privilege and inadvertent disclosures, requests for social media, cases involving technology assisted review and the case of the year – the ubiquitous Apple v. Samsung dispute.

We grouped those cases into common subject themes and will review them over the next few posts. Perhaps you missed some of these? Now is your chance to catch up!

PRIVILEGE / INADVERTENT DISCLOSURES

There were a couple of cases related to privilege issues, including one where privilege was upheld when the plaintiff purchased the defendant’s seized computer at auction! Here are two cases where disclosure of privileged documents was addressed:

Privilege Not Waived on Defendant’s Seized Computer that was Purchased by Plaintiff at Auction: In Kyko Global Inc. v. Prithvi Info. Solutions Ltd., Washington Chief District Judge Marsha J. Pechman ruled that the defendants’ did not waive their attorney-client privilege on the computer of one of the defendants purchased by plaintiffs at public auction, denied the defendants’ motion to disqualify the plaintiff’s counsel for purchasing the computer and ordered the plaintiffs to provide defendants with a copy of the hard drive within three days for the defendants to review it for privilege and provide defendants with a privilege log within seven days of the transfer.

Plaintiff Can’t “Pick” and Choose When it Comes to Privilege of Inadvertent Disclosures: In Pick v. City of Remsen, Iowa District Judge Mark W. Bennett upheld the magistrate judge’s order directing the destruction of an inadvertently-produced privileged document, an email from defense counsel to some of the defendants, after affirming the magistrate judge’s analysis of the five-step analysis to determine whether privilege was waived.

SOCIAL MEDIA

Requests for social media data in litigation continue, though there were not as many disputes over it as in years past (at least, not with cases we covered). Here are three cases related to social media data:

Plaintiff Ordered to Produce Facebook Photos and Messages as Discovery in Personal Injury Lawsuit: In Forman v. Henkin, a Motion to Compel was granted in part for a defendant who requested authorization to obtain records of the plaintiff’s private postings to Facebook.

Plaintiff Ordered to Re-Open Social Media Account for Discovery: In Chapman v. Hiland Operating, LLC, while noting that he was “skeptical” that reactivating the plaintiff’s Facebook account would produce any relevant, noncumulative information, North Dakota Magistrate Judge Charles S. Miller ordered the plaintiff to “make a reasonable, good faith attempt” to reactivate her Facebook account.

Order for Financial Records and Facebook Conversations Modified Due to Privacy Rights: In Stallings v. City of Johnston City, Illinois Chief District Judge David R. Herndon modified an earlier order by a magistrate judge in response to the plaintiff’s appeal, claiming that the order violated the privacy rights of the plaintiff, and of minor children with whom the plaintiff had held conversations on Facebook.

TECHNOLOGY ASSISTED REVIEW

Technology assisted review continued to be discussed and debated between parties in 2014, with some disputes involving how technology assisted review would be conducted as opposed to whether it would be conducted at all. Courts continued to endorse technology assisted review and predictive coding, even going so far as to suggest the use of it in one case. Here are six cases involving the use of technology assisted review in 2014:

Court Rules that Unilateral Predictive Coding is Not Progressive: In In Progressive Cas. Ins. Co. v. Delaney, Nevada Magistrate Judge Peggy A. Leen determined that the plaintiff’s unannounced shift from the agreed upon discovery methodology, to a predictive coding methodology for privilege review was not cooperative. Therefore, the plaintiff was ordered to produce documents that met agreed-upon search terms without conducting a privilege review first.

Court Rules in Dispute Between Parties Regarding ESI Protocol, Suggests Predictive Coding: In a dispute over ESI protocols in FDIC v. Bowden, Georgia Magistrate Judge G. R. Smith approved the ESI protocol from the FDIC and suggested the parties consider the use of predictive coding.

Court Sides with Defendant in Dispute over Predictive Coding that Plaintiff Requested: In the case In re Bridgepoint Educ., Inc., Securities Litigation, California Magistrate Judge Jill L. Burkhardt ruled that expanding the scope of discovery by nine months was unduly burdensome, despite the plaintiff’s request for the defendant to use predictive coding to fulfill its discovery obligation and also approved the defendants’ method of using search terms to identify responsive documents for the already reviewed three individual defendants, directing the parties to meet and confer regarding the additional search terms the plaintiffs requested.

Though it was “Switching Horses in Midstream”, Court Approves Plaintiff’s Predictive Coding Plan: In Bridgestone Americas Inc. v. Int’l Bus. Mach. Corp., Tennessee Magistrate Judge Joe B. Brown, acknowledging that he was “allowing Plaintiff to switch horses in midstream”, nonetheless ruled that that the plaintiff could use predictive coding to search documents for discovery, even though keyword search had already been performed.

Court Approves Use of Predictive Coding, Disagrees that it is an “Unproven Technology”: In Dynamo Holdings v. Commissioner of Internal Revenue, Texas Tax Court Judge Ronald Buch ruled that the petitioners “may use predictive coding in responding to respondent’s discovery request” and if “after reviewing the results, respondent believes that the response to the discovery request is incomplete, he may file a motion to compel at that time”.

Court Opts for Defendant’s Plan of Review including TAR and Manual Review over Plaintiff’s TAR Only Approach: In Good v. American Water Works, West Virginia District Judge John T. Copenhaver, Jr. granted the defendants’ motion for a Rule 502(d) order that merely encouraged the incorporation and employment of time-saving computer-assisted privilege review over the plaintiffs’ proposal disallowing linear privilege review altogether.

APPLE V. SAMSUNG

Every now and then, there is a case that just has to be covered. Whether it be for the eDiscovery related issues (e.g., adverse inference sanction, inadvertent disclosures, eDiscovery cost reiumbursement) or the fact that billions of dollars were at stake or the fact that the case earned its own “gate” moniker, the Apple v. Samsung case demanded attention. Here are the six posts (just from 2014, we have more in previous years) about this case:

Quinn Emanuel Sanctioned for Inadvertent Disclosure, Samsung Escapes Sanction: California Magistrate Judge Paul S. Grewal has now handed down an order on motions for sanctions against Samsung and the Quinn Emanuel law firm in the never-ending Apple v. Samsung litigation for the inadvertent disclosure of confidential agreements that Apple had with Nokia, Ericsson, Sharp and Philips – now widely referred to as “patentgate”.

Apple Can’t Mention Inadvertent Disclosure in Samsung Case: Back in January, Quinn Emanuel Urquhart & Sullivan LLP was sanctioned for their inadvertent disclosure in the Apple vs Samsung litigation (commonly referred to as “patentgate”). California Magistrate Judge Paul S. Grewal handed down an order on motions for sanctions against Quinn Emanuel (in essence) requiring the firm to “reimburse Apple, Nokia, and their counsel for any and all costs and fees incurred in litigating this motion and the discovery associated with it”. Many felt that Samsung and Quinn Emanuel got off lightly. Now, Apple can’t even mention the inadvertent disclosure in the upcoming Samsung trial.

Apple Wins Another $119.6 Million from Samsung, But It’s Only 6% of What They Requested: Those of you who have been waiting for significant news to report from the Apple v. Samsung litigation, your wait is over! As reported last week in The Recorder, a California Federal jury ordered Samsung on Friday to pay Apple $119.6 million for infringing three of Apple’s iPhone patents. However, the award was a fraction of the nearly $2.2 billion Apple was requesting.

Samsung and Quinn Emanuel Ordered to Pay Over $2 Million for “Patentgate” Disclosure: Remember the “patentgate” disclosure last year (by Samsung and their outside counsel firm of Quinn Emanuel Urquhart & Sullivan LLP) of confidential agreements that Apple had with Nokia? Did you think they were going to avoid having to pay for that disclosure? The answer is no.

Court Refuses to Ban Samsung from Selling Products Found to Have Infringed on Apple Products: Apple may have won several battles with Samsung, including ultimately being awarded over $1 billion in verdicts, as well as a $2 million sanction for the inadvertent disclosure of its outside counsel firm (Quinn Emanuel Urquhart & Sullivan LLP) commonly known as “patentgate”. But, Samsung has may have won the war with the court’s refusal to ban Samsung from selling products that were found to have infringed on Apple products.

Apple Recovers Part, But Not All, of its Requested eDiscovery Costs from Samsung: Apple won several battles with Samsung, including ultimately being awarded over $1 billion in verdicts, as well as a $2 million sanction for the inadvertent disclosure of its outside counsel firm (Quinn Emanuel Urquhart & Sullivan LLP) commonly known as “patentgate”, but ultimately may have lost the war when the court refused to ban Samsung from selling products that were found to have infringed on Apple products. Now, they’re fighting over relative chicken-feed in terms of a few million that Apple sought to recover in eDiscovery costs.

Tomorrow, we will cover cases related to the most common theme of the year (three guesses and the first two don’t count). Stay tuned!

So, what do you think? Did you miss any of these? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscoveryDaily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Plaintiff Can’t “Pick” and Choose When it Comes to Privilege of Inadvertent Disclosures – eDiscovery Case Law

In Pick v. City of Remsen, C 13-4041-MWB (N.D. Iowa Sept. 15, 2014), Iowa District Judge Mark W. Bennett upheld the magistrate judge’s order directing the destruction of an inadvertently-produced privileged document, an email from defense counsel to some of the defendants, after affirming the magistrate judge’s analysis of the five-step analysis to determine whether privilege was waived.

Case Background

In this wrongful termination case, the plaintiff served a request for production of documents that included “all relevant non-privileged emails initiated by or received by the City of Remsen in regard to the Plaintiff and/or any of the issues set forth in Plaintiff’s complaint”.  Among the documents produced was an email, dated July 14, 2012, from defense counsel to Remsen Utility Board members and others discussing an upcoming Utility Board meeting.  Defense counsel learned of the email’s inadvertent disclosure on March 25, 2014, when the plaintiff served supplemental discovery responses on defense counsel and contacted plaintiff’s counsel within 34 minutes of the discovery.

Defense counsel asked that the email be destroyed. The plaintiff’s counsel suggested the email could be redacted to protect “advice relating to procedure,” but indicated he intended to rely on the remainder of the email unless ordered otherwise by the court.  The defendants’ filed a motion requesting that the court order the email’s destruction as an inadvertently produced privileged document, which the magistrate judge granted.

Judge’s Ruling

The Magistrate Judge, Leonard Strand, had applied the five-step analysis to determine the proper range of privilege to extend.  Those five factors were, as follows:

  1. The reasonableness of the precautions taken to prevent inadvertent disclosure in view of the extent of document production: Judge Strand found that the privileged email was “inconspicuously located among various non-privileged email messages”, which, based on the fact that defendants turned over to their counsel 440 pages of documents (including 183 pages of email messages, some pages of which contained more than one email), was upheld as “completely fair and accurate”;
  2. The number of inadvertent disclosures: Since there was only one inadvertent disclosure, Judge Bennett upheld the ruling as “not clearly erroneous”;
  3. The extent of the disclosures: Though the email was sent to six people, all six were privileged recipients of the email, so Judge Bennett upheld the ruling as “not clearly erroneous”;
  4. The promptness of measures taken to rectify the disclosure: Because defense counsel contacted plaintiff’s counsel just 34 minutes after learning of the email’s inadvertent disclosure and requested its destruction, Judge Bennett upheld the ruling as “not clearly erroneous”; and
  5. Whether the overriding interest of justice would be served by relieving the party of its error: Judge Strand, finding that the plaintiff “clearly has other evidence that he intends to rely on in support of his various claims”, ruled in favor of the defendant in this factor as well, which Judge Bennett upheld.

Judge Bennett summarized as follows: “The email is classic legal advice that should be protected by the attorney-client privilege…This interest of justice would be harmed here by permitting Pick to use the email at trial…Given the important nature of the attorney-client privilege and the manner in which the email was inadvertently disclosed, Judge Strand’s conclusion that the overriding interest in justice factor weighed against waiver is not clearly erroneous. Accordingly, Pick’s objection is overruled.”

So, what do you think?  Did defense counsel’s quick reaction to the disclosure save the email’s privileged status?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

How Mature is Your Organization in Handling eDiscovery? – eDiscovery Best Practices

A new self-assessment resource from EDRM helps you answer that question.

A few days ago, EDRM announced the release of the EDRM eDiscovery Maturity Self-Assessment Test (eMSAT-1), the “first self-assessment resource to help organizations measure their eDiscovery maturity” (according to their press release linked here).

As stated in the press release, eMSAT-1 is a downloadable Excel workbook containing 25 worksheets (actually 27 worksheets when you count the Summary sheet and the List sheet of valid choices at the end) organized into seven sections covering various aspects of the e-discovery process. Complete the worksheets and the assessment results are displayed in summary form at the beginning of the spreadsheet.  eMSAT-1 is the first of several resources and tools being developed by the EDRM Metrics group, led by Clark and Dera Nevin, with assistance from a diverse collection of industry professionals, as part of an ambitious Maturity Model project.

The seven sections covered by the workbook are:

  1. General Information Governance: Contains ten questions to answer regarding your organization’s handling of information governance.
  2. Data Identification, Preservation & Collection: Contains five questions to answer regarding your organization’s handling of these “left side” phases.
  3. Data Processing & Hosting: Contains three questions to answer regarding your organization’s handling of processing, early data assessment and hosting.
  4. Data Review & Analysis: Contains two questions to answer regarding your organization’s handling of search and review.
  5. Data Production: Contains two questions to answer regarding your organization’s handling of production and protecting privileged information.
  6. Personnel & Support: Contains two questions to answer regarding your organization’s hiring, training and procurement processes.
  7. Project Conclusion: Contains one question to answer regarding your organization’s processes for managing data once a matter has concluded.

Each question is a separate sheet, with five answers ranked from 1 to 5 to reflect your organization’s maturity in that area (with descriptions to associate with each level of maturity).  Default value of 1 for each question.  The five answers are:

  • 1: No Process, Reactive
  • 2: Fragmented Process
  • 3: Standardized Process, Not Enforced
  • 4: Standardized Process, Enforced
  • 5: Actively Managed Process, Proactive

Once you answer all the questions, the Summary sheet shows your overall average, as well as your average for each section.  It’s an easy workbook to use with input areas defined by cells in yellow.  The whole workbook is editable, so perhaps the next edition could lock down the calculated only cells.  Nonetheless, the workbook is intuitive and provides a nice exercise for an organization to grade their level of eDiscovery maturity.

You can download a copy of the eMSAT-1 Excel workbook from here, as well as get more information on how to use it (the page also describes how to provide feedback to make the next iterations even better).

The EDRM Maturity Model Self-Assessment Test is the fourth release in recent months by the EDRM Metrics team. In June 2013, the new Metrics Model was released, in November 2013 a supporting glossary of terms for the Metrics Model was published and in November 2013 the EDRM Budget Calculators project kicked off (with four calculators covered by us here, here, here and here).  They’ve been busy.

So, what do you think?  How mature is your organization in handling eDiscovery?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Denies Plaintiff’s Fallback Request for Meet and Confer after Quashing its Subpoena – eDiscovery Case Law

 

In Boston Scientific Corporation v. Lee, 1:13-cv-13156-DJC, (N.D. Cal., Aug 4, 2014), California Magistrate Judge Paul S. Grewal found time to preside over a case other than Apple v. Samsung and granted the motion to quash the plaintiff’s subpoena for the defendant’s laptops, refusing the plaintiff’s fallback position to meet and confer and referencing Leave it to Beaver in the process.

The defendant left the employment of the plaintiff and began working for a competitor, which caused the case to be filed against him, claiming theft of trade secrets and violation of a confidentiality agreement (by downloading confidential information onto a USB thumb drive).  The defendant’s new employer assigned him a laptop when he started his employment, which he used to both perform his job duties and communicate with his attorneys. Several weeks after the lawsuit was filed, the defendant’s employer segregated this laptop with a third party e-discovery vendor, and issued him a second one.

The defendant’s employer also produced forensic information about the contents of the first laptop to the plaintiff in the form of file listing reports, which disclose extensive metadata of the files contained on the laptop, USB reports, and web browsing history reports.  When the plaintiff pressed for more, the defendant’s employer offered to have an independent vendor review a full forensic image of the first laptop to search for pertinent information, including a review of any deleted files.  The plaintiff refused, requesting forensic discovery from both laptops and issued a subpoena, to which the defendant’s employer filed a motion to quash.

Judge Grewal began his order as follows:

“This case illustrates a recurring problem in all civil discovery, especially in intellectual property cases. A party demands the sun, moon and stars in a document request or interrogatory, refusing to give even a little bit. The meet and confer required by a court in advance of a motion is perfunctory at best, with no compromise whatsoever. But when the parties appear before the court, the recalcitrant party possesses newfound flexibility and a willingness to compromise. Think Eddie Haskell singing the Beaver's praises to June Cleaver, only moments after giving him the business in private. Having considered the arguments, the court GRANTS Nevro's motion to quash.”

Explaining his decision, Judge Grewal stated “No doubt there exists discoverable information on the two laptops, but by demanding nothing less than a complete forensic image of not just one but two laptops belonging to a direct competitor, Boston Scientific demands too much. Such imaging will disclose privileged communications related to the litigation as well as irrelevant trade secrets from a nonparty-competitor.  Boston Scientific's subpoena therefore seeks discovery of protected matter, something plainly not permitted under Rule 45, rendering the subpoena overbroad and imposing an undue burden on Nevro.”

Judge Grewal noted that the plaintiff “[a]s a fall back”, proposed what the defendant’s employer had originally proposed: the retention of an independent vendor to “review a full forensic image of the Initial Laptop to search for pertinent information, including a review of any deleted files.”  Judge Grewal closed the door on that request as well, stating “to allow Boston Scientific now to seek shelter from a fallback position that Nevro previously tendered in good faith would make a mockery of both parties' obligation to meet and confer in good faith from the start.  The time to tap flexibility and creativity is during meet and confer, not after.”

So, what do you think?  Should the plaintiff have been granted its fall back request or was it too late for compromise?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Refuses to Ban Samsung from Selling Products Found to Have Infringed on Apple Products – eDiscovery Case Law

Apple may have won several battles with Samsung, including ultimately being awarded over $1 billion in verdicts, as well as a $2 million sanction for the inadvertent disclosure of its outside counsel firm (Quinn Emanuel Urquhart & Sullivan LLP) commonly known as “patentgate”.  But, Samsung has may have won the war with the court’s refusal to ban Samsung from selling products that were found to have infringed on Apple products.

Last Wednesday, U.S. District Judge Lucy H. Koh refused to permanently ban Samsung from selling several mobile phones and tablets that a jury found infringed on Apple patents, ruling Apple hadn’t shown that it would suffer irreparable harm to its reputation.  In her order, Judge Koh stated that the plaintiff hadn’t provided sufficient evidence that it will suffer lost sales specifically due to Samsung’s infringement of the three patents at issue, nor had it demonstrated that the patented inventions drive consumer demand for Samsung’s infringing products.

In its motion for a permanent injunction, Apple had argued that the nearly $120 million in damages that was awarded in May wasn’t enough to compensate Apple for the harm caused by Samsung’s infringement. Apple stated that the ban was necessary to separate Apple’s reputation as an “amazingly innovative company” from Samsung’s reputation as a “fast follower.”

Apple argued that trial evidence demonstrated a causal nexus between the alleged sales-based harm and Samsung’s infringing behavior, but argued, however, that when reputational harm is alleged, the second prong of the irreparable harm test falls away and no separate proof of causal nexus is required.  However, Judge Koh found “no reason to depart from the Federal Circuit’s guidance that a patentee must demonstrate a causal nexus between infringement and any alleged irreparable harm – including injury to reputation.”  She also noted that “Samsung argues persuasively that Apple’s reputation has proved extremely robust … weakening Apple’s claim that it has suffered or will suffer irreparable harm to its reputation from infringement of only three patents.”

So, what do you think?  Will the Apple-Samsung litigation ever end?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Samsung and Quinn Emanuel Ordered to Pay Over $2 Million for “Patentgate” Disclosure – eDiscovery Case Law

Remember the “patentgate” disclosure last year (by Samsung and their outside counsel firm of Quinn Emanuel Urquhart & Sullivan LLP) of confidential agreements that Apple had with Nokia?  Did you think they were going to avoid having to pay for that disclosure?  The answer is no.

In a June 20 ruling by California Magistrate Judge Paul S. Grewal, he began by noting “With the present quiet on the docket, it is easy to forget the long tumult of this case that once reigned. The ceremonial courtroom has cleared. The fire drills of motions on shortened time have ceased. All that remains for now, at least for the undersigned, is the relatively mundane issue of what makes for reasonable fees.

The fees at issue arise from this court’s order awarding sanctions to Apple and Nokia. The sanctions followed the court’s finding that Samsung and Quinn Emanuel were responsible for the unauthorized distribution of Apple and Nokia confidential information. Samsung and QE object to certain of the fees Apple and Nokia now claim, which means the court must wade into the billing entries and make various calls. So, here goes.”

The summary of events related to the inadvertent disclosure by Quinn Emanuel are described here and the details of the sanction applied to Quinn Emanuel are described here.

The question in this order turned to the fees and costs requested by Apple and Nokia.  Section C of the order was titled “With Limited Exceptions, Apple And Nokia’s Requests Have Been Sufficiently Supported To Sustain The Requested Award” and Judge Grewal stated that “in the over four hundred pages of correspondence and billing records submitted for review, the court has identified only 19 records that it finds troubling” (those were entries where partners and senior associates block billed ten or more hours on “drafting,” “preparing” “revising” or paying “attention to” various briefs and were listed in detail, along with the reduced amount after a 20% reduction penalty).

As for the rest of the entries, Judge Grewal commented that “[t]he court notes and appreciates that both Apple and Nokia have applied a series of discounts to their requests already” and ordered that, aside from the noted exceptions “the court finds that the remaining costs and fees requested by Apple and Nokia are reasonable and shall be awarded.  No later than 30 days from this order, Samsung and QE are to pay Nokia a total of $1,145,027.95 and Apple a total of $893,825.77 in fees and costs.” (emphasis added)

So, what do you think? Were those amounts awarded excessive?  Or did Samsung and Quinn Emanual get off lightly?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Want My Production? Here’s my Database! – eDiscovery Trends

A couple of weeks ago, we covered a case where the US Government was ordered to continue providing access to an eDiscovery database to a defendant in a criminal case.  That case shed light on a growing trend in the industry that I have also observed personally – “producing” documents to opposing counsel by providing access to the documents via a hosted eDiscovery solution.

In Craig Ball’s Lawyer’s Guide to Forms of Production (that we recently covered here), Craig identified hosted production as one of the options for forms of production that can be requested.  However, as Craig notes, “More commonly, hosted data and online review tools are used internally by a producing party’s counsel to search the data for privileged and responsive items rather than as a means to afford access to the requesting party. The items identified are then duplicated onto transfer media (e.g., optical disks or a hard drive) and produced in one or more of the formats described above.”

That is certainly true, though more parties in litigation are choosing to provide access to the online database as a means of production (“production without production” as Craig calls it).  While I don’t have any statistics to point to, that has at least been my recent experience as platform manager for OnDemand®, CloudNine Discovery’s own hosted eDiscovery platform.

Typically, there are two options for producing documents by providing online access: 1) provide access to the existing database, or 2) create a new database of produced documents.  Here are the pros and cons of each:

  • Existing Database: Many parties provide access to portions of their existing eDiscovery database.  This reduces costs because the data is already hosted and may be a way for both parties to share hosting costs.  In those instances, security becomes paramount.  As attorneys need to exclude access to non-responsive or privileged documents and other work product, the eDiscovery application needs to provide the ability to limit the documents that users can see as well as limit the fields that users can see.  In addition, it’s important to have a well-documented plan for the database administrator to follow to ensure that the correct rights are assigned.  If not, inadvertent disclosures of documents or data fields used during review and production can occur.
  • New Database: While it may cost more to create a new database of produced documents (essentially doubling the storage of those documents into a new database), it is much easier to secure privileged information and attorney work product because those documents and data fields simply aren’t there, essentially eliminating the possibility of an inadvertent disclosure due to incorrect rights assignments.  In these cases, the receiving party often agrees to bear the costs of hosting their portion of the data.

In both cases, the advantages to the receiving party include access to the same produced documents in the same format in which they were reviewed using the same search and analytical tools that the producing party used to produce the documents, putting both parties on equal footing.

So, what do you think?  Have you been part of a hosted production?  If so, how did it go?  Were you on the producing or receiving end?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Clawback Rights Upheld and Plaintiff Sanctioned for Refusal to Comply Concerning Inadvertently Produced Privileged Documents – eDiscovery Case Law

 

In RIPL Corp. v. Google Inc., No. 2:12-cv-02050-RSM, 2013 U.S. Dist. (W.D. Wash. Dec. 17, 2013), seven discovery-related motions were heard concerning this trademark infringement action. The various motions to seal, compel, enforce, and sanction were filed after the parties had entered into a stipulated protective order. Washington District Judge Ricardo S. Martinez granted in part, denied in part, and deferred in part the various motions.

The protective order in force included a clawback provision, which required inadvertently produced attorney-client privileged documents to be returned or destroyed, with certification for the deletion or destruction of the documents, provided the party invoking the provision took the steps of “promptly notifying the recipient(s) and expressly articulating the basis for the asserted privilege or immunity.”

In the filing, the defendant stated that privileged documents had been inadvertently produced to the plaintiff on July 2, 2013. However, counsel for the defendant did not realize the documents had been disclosed until August 12, 2013, while preparing for the defendant’s deposition. The defendant conducted a search the next day for other privileged documents that may have been disclosed, and communicated via email with the plaintiff to exercise the clawback provision. The plaintiff at this point refused to return or destroy the documents at issue.

When the defendant filed a motion to enforce the protective order and clawback provision, it also requested that the plaintiff be sanctioned for filing documents under seal that quoted the privileged documents at issue, and filed a request to strike, along with other motions.

In arguing the motion to enforce, the plaintiff claimed that the defendant had waived its right to claw back the documents because “prompt” and “inadvertent” had not been defined under the protective order. The plaintiff cited the balancing test of Federal Rule of Evidence 502(b) for waiving attorney-client privilege with regards to “inadvertent” and claimed that the clawback request had not been “prompt.”

Judge Martinez rejected the arguments of the plaintiff concerning the clawback request, stating that there is “no requirement that, in order to supplant Rule 502(b), an agreement provide adequate detail regarding ‘what constitutes inadvertence, what precautionary measures are required, and what the producing party’s post production responsibilities are to escape waiver.’” Simply, it was ruled that “terms like ‘inadvertence’ and ‘prompt’ need not be defined in the protective order” under Rule 502. The plaintiff was ordered to certify the deletion or destruction of all unredacted copies of the privileged documents at issue within ten days.

The defendant’s request for sanctions were denied concerning the plaintiff’s filing documents under seal that contained quotes from attorney-client privileged documents. However, Judge Martinez ordered the plaintiff to pay the defendant’s fees and costs for bringing the motion, as a sanction for refusing to comply with the clawback provision and “hold[ing] the documents hostage for roughly two months in violation of the Protective Order.”

So, what do you think? Should a time limit be imposed as the definition of “prompt” with regard to stipulated protective orders? Should parties be permitted to submit attorney-client privileged information under seal when privileged documents are received inadvertently? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.