This Page

has been moved to new address

The eDiscovery Paradigm Shift

Sorry for inconvenience...

Redirection provided by Blogger to WordPress Migration Service
----------------------------------------------------- Blogger Template Style Name: Snapshot: Madder Designer: Dave Shea URL: mezzoblue.com / brightcreative.com Date: 27 Feb 2004 ------------------------------------------------------ */ /* -- basic html elements -- */ body {padding: 0; margin: 0; font: 75% Helvetica, Arial, sans-serif; color: #474B4E; background: #fff; text-align: center;} a {color: #DD6599; font-weight: bold; text-decoration: none;} a:visited {color: #D6A0B6;} a:hover {text-decoration: underline; color: #FD0570;} h1 {margin: 0; color: #7B8186; font-size: 1.5em; text-transform: lowercase;} h1 a {color: #7B8186;} h2, #comments h4 {font-size: 1em; margin: 2em 0 0 0; color: #7B8186; background: transparent url(http://www.blogblog.com/snapshot/bg-header1.gif) bottom right no-repeat; padding-bottom: 2px;} @media all { h3 { font-size: 1em; margin: 2em 0 0 0; background: transparent url(http://www.blogblog.com/snapshot/bg-header1.gif) bottom right no-repeat; padding-bottom: 2px; } } @media handheld { h3 { background:none; } } h4, h5 {font-size: 0.9em; text-transform: lowercase; letter-spacing: 2px;} h5 {color: #7B8186;} h6 {font-size: 0.8em; text-transform: uppercase; letter-spacing: 2px;} p {margin: 0 0 1em 0;} img, form {border: 0; margin: 0;} /* -- layout -- */ @media all { #content { width: 700px; margin: 0 auto; text-align: left; background: #fff url(http://www.blogblog.com/snapshot/bg-body.gif) 0 0 repeat-y;} } #header { background: #D8DADC url(http://www.blogblog.com/snapshot/bg-headerdiv.gif) 0 0 repeat-y; } #header div { background: transparent url(http://www.blogblog.com/snapshot/header-01.gif) bottom left no-repeat; } #main { line-height: 1.4; float: left; padding: 10px 12px; border-top: solid 1px #fff; width: 428px; /* Tantek hack - http://www.tantek.com/CSS/Examples/boxmodelhack.html */ voice-family: "\"}\""; voice-family: inherit; width: 404px; } } @media handheld { #content { width: 90%; } #header { background: #D8DADC; } #header div { background: none; } #main { float: none; width: 100%; } } /* IE5 hack */ #main {} @media all { #sidebar { margin-left: 428px; border-top: solid 1px #fff; padding: 4px 0 0 7px; background: #fff url(http://www.blogblog.com/snapshot/bg-sidebar.gif) 1px 0 no-repeat; } #footer { clear: both; background: #E9EAEB url(http://www.blogblog.com/snapshot/bg-footer.gif) bottom left no-repeat; border-top: solid 1px #fff; } } @media handheld { #sidebar { margin: 0 0 0 0; background: #fff; } #footer { background: #E9EAEB; } } /* -- header style -- */ #header h1 {padding: 12px 0 92px 4px; width: 557px; line-height: 1;} /* -- content area style -- */ #main {line-height: 1.4;} h3.post-title {font-size: 1.2em; margin-bottom: 0;} h3.post-title a {color: #C4663B;} .post {clear: both; margin-bottom: 4em;} .post-footer em {color: #B4BABE; font-style: normal; float: left;} .post-footer .comment-link {float: right;} #main img {border: solid 1px #E3E4E4; padding: 2px; background: #fff;} .deleted-comment {font-style:italic;color:gray;} /* -- sidebar style -- */ @media all { #sidebar #description { border: solid 1px #F3B89D; padding: 10px 17px; color: #C4663B; background: #FFD1BC url(http://www.blogblog.com/snapshot/bg-profile.gif); font-size: 1.2em; font-weight: bold; line-height: 0.9; margin: 0 0 0 -6px; } } @media handheld { #sidebar #description { background: #FFD1BC; } } #sidebar h2 {font-size: 1.3em; margin: 1.3em 0 0.5em 0;} #sidebar dl {margin: 0 0 10px 0;} #sidebar ul {list-style: none; margin: 0; padding: 0;} #sidebar li {padding-bottom: 5px; line-height: 0.9;} #profile-container {color: #7B8186;} #profile-container img {border: solid 1px #7C78B5; padding: 4px 4px 8px 4px; margin: 0 10px 1em 0; float: left;} .archive-list {margin-bottom: 2em;} #powered-by {margin: 10px auto 20px auto;} /* -- sidebar style -- */ #footer p {margin: 0; padding: 12px 8px; font-size: 0.9em;} #footer hr {display: none;} /* Feeds ----------------------------------------------- */ #blogfeeds { } #postfeeds { }

Thursday, March 20, 2008

Search Terms and FRCP 26(b) (2)(B)

City of Seattle v. Prof'l Basketball Club, LLC, 2008 WL 539809 (W.D. Wash. Feb. 25, 2008) is a great example for all of us to understand the seriousness and importance of detailed preperation for the Rule 26(f) meetings and how the courts (or at least this court) views the agreements reached between the parties at this meetings.

Overview
The discovery dispute in this decision involved the City of Seattle's request to have defendant Professional Basketball Club, LLC (“PBC”) search for and produce responsive emails for six of its eight members. In January 2008, PBC produced approximately 150,000 emails from two members of PBC. It objected to producing emails for the remaining six PBC members because such a search would “increase the universe exponentially” and would generally produce irrelevant documents. The City moved to compel production of the requested emails.

The court first considered whether the requisite principal-agent relationship existed to establish that PBC had the legal right to obtain documents upon demand from its members. The court analyzed PBC’s operating agreement under Oklahoma law, and concluded that the City had met its burden in establishing that PBC had “possession, custody, or control” over the at-issue documents for purposes of Fed. R. Civ. P. 34(a).

Next, the court found that the substance of the requested emails – information regarding the formation of PBC and the Sonics' finances – may be relevant to the underlying issues. Given the liberal discovery rules, the court declined to limit the City's inquiry on relevancy grounds. It stated that, whether such evidence warrants admissibility is a distinctly separate question that would be addressed at the appropriate time.

Finally, the court observed that the Federal Rules contemplate a specific requirement when a party objects to the production of electronically stored information, citing Fed. R. Civ. P. 26(b)(2)(B). The court faulted PBC’s lack of specificity, stating that PBC had not explained why producing the emails at issue would be unnecessarily burdensome.

It continued: PBC also states in its moving papers that the emails add “nothing to the case except mountains of work for no return.” But a bald assertion that discovery will be burdensome is insufficient in light of Fed. R. Civ. P. 26(b) (2)(B). The Court is not permitted to presume the potential burdensome effects upon a party. The parties have already agreed upon a group of search terms that PBC previously used to search Messrs. Bennett and McClendon's emails and the Court assumes those terms may be used again to make further searches efficient.
Thus, the court granted the City’s motion and ordered PBC to produce the emails of the remaining PBC members within two weeks of the order.

The City of Seattle is represented in the case by K&L Gates attorneys Jeffrey C. Johnson, Paul J. Lawrence, Thomas Slade Gorton, III, Jonathan H. Harrison, and Michelle D. Jensen, along with Thomas Aquinas Carr and Gregory Colin Narver of the Seattle City Attorney's Office.

Labels: , , , , ,

Wednesday, March 19, 2008

Legal Holds

Gregg Mayer posted the following quick article on Legal Holds inthe CIOLaw.org Blog in the Litigation Hold Section on February 18th, 2008. It provides a great foundation for understanding the subject of Legal Holds and provides links to extensive commentary from the Sedona Conference.

What’s a legal hold?
A legal hold is a communication throughout your company that all information that may be relevant to litigation must be preserved, including the outpourings and influx of hundreds of email messages. A legal hold is triggered when your company reasonably anticipates litigation.

No universal answer exists for when litigation is “reasonably anticipated.” It is a highly fact-intensive analysis. Generally, reasonable anticipation of litigation “arises when an organization is on notice of a credible threat it will become involved in litigation or anticipates taking action to initiate litigation,” according to The Sedona Conference Commentary On Legal Holds: The Trigger & The Process. The Sedona Conference is a popular and well-regarded think tank made up of judges, lawyers and academics who discuss issues of complex litigation.
Once triggered, a legal hold must be implemented efficiently. Failing to properly preserve ESI after litigation is reasonably anticipated may result in sanctions from a court, including an adverse jury instruction that whatever the company destroyed should be considered in the worst possible light against the company.

As explained by the Sedona Conference:
Once the duty to preserve information arises, an organization must decide what to preserve and how to accomplish that preservation. In some circumstances, the duty to preserve requires only that a limited number of known historical documents be located and preserved. In other circumstances, the scope of the information is larger and the sources of the information may not be known to counsel.

Knowing about legal holds, and having the capability to implement them quickly and seamlessly, is critical to being ready when your company faces legal trouble.

To read the complete Sedona report on legal holds: The Sedona Conference Commentary On Legal Holds: The Trigger & The Process.

Labels: , , ,

Legal Holds Impact Document Retention Policy

Gregg Mayer posted the following quick article on Legal Holds inthe CIOLaw.org Blog in the Litigation Hold Section on March 19th, 2008. It is a great addition to my previous post on Records Rentention Policy as it shows how Legal Holds impact Document Rentention Policy.

Companies implement document retention policies to determine how long information should be stored. These policies must include electronically stored information. For example, a company may decide it wants to purge emails after 21 days, like the Maryland company Echostar’s policy. Of course, simply executing the policy is not always enough.

A key caveat to normal retention policies is to make sure they are modified to accommodate “legal holds” – a duty placed on the company to preserve relevant information once litigation is reasonably anticipated. Echostar learned that lesson the hard way.
According the Maryland federal court in Broccoli v. Echostar Communications, Echostar’s email archiving system worked like this:

Under Echostar’s extraordinary email/document retention policy, the email system automatically sends all items in a user’s “sent items” folder over seven days old to the user’s “deleted items” folder, and all items in a user’s “deleted items” folder over 14 days old are then automatically purged from the user’s “deleted items” folder. The user’s purged emails are not recorded or stored in any back up files. Thus, when 21-day-old emails are purged, they are forever unretrievable.

In January 2001, the plaintiff in Broccoli v. Echostar Communications told Echostar about his potential sexual harassment and Title VII claims. More letters and emails additionally notified Echostar of the litigation.

The plaintiff was fired in November 2001. Another letter came in December 2001 threatening litigation, and a lawsuit was filed in February 2002. Echostar did not adjust its retention policy until December 2001. This, it turned out, was wrong.

The judge explained Echostar had actual notice of the claims as early as January 2001. Echostar should have started preserving emails nearly 11 months before it did. As a result, the judge sanctioned Echostar by offering an “adverse spoliation of evidence instruction” – whatever was destroyed may be considered in the worst possible light against Echostar.

Needless to say, Echostar lost the case.

Retention policies are a necessary part of business. Just as necessary is a company’s ability to modify a retention policy whenever litigation is reasonably anticipated.
Read more about the Echostar case in this news article.

Labels: ,

Document Retention Policies and Practices

I recently found a checklist for Document Retention Policies and Practices written by Cecil A. Lynn III, Director of Industry Relations at LexisNexis Applied Discovery. And although this list is not comprehensive, it provides an extremely strong foundation up which to build your organizations list. Following is his list:

1. Maintain Document Retention Policies And Practices.
Every company should have a comprehensive, regularly audited document retention policy. The policy not only sets forth the procedures for the uniform and timely destruction of documents - both electronic and paper - but also establishes a consistent plan that is applied company-wide. A good document retention policy coupled with vigilant enforcement may be a company's best defense against claims of spoliation of evidence. The Federal Rules offer safe harbor for companies that lose data during the routine, good-faith operation of their electronic information systems. See FRCP 37(f). The "routine" requirement may be evidenced, in part, by a document retention policy. Counsel should review the company's retention program to ensure that it is current, applies to all employees in all locations, and is regularly monitored and enforced.

2. Understand The Corporation's Electronic Information Systems.
Case law underscores the need for outside counsel to become familiar with their client's electronic information and data retention architecture. See Phoenix Four Inc. v. Strategic Resources Corp., 2006 U.S. Dist. LEXIS 32211 at * 16-17 (S.D.N.Y. 2006) and Zubulake v. UBS Warburg, LLC, 229 F.R.D. 422, 432 (S.D.N.Y. 2004). The responsibility is even greater for in-house counsel who often provide a necessary link between the company's information technology (IT) department and outside counsel. Thus, corporate legal departments should develop a solid working relationship with the company's IT department and an understanding of the company's IT systems. Such an understanding is vital to the successful implementation of a document retention policy and will prove invaluable in evaluating preservation efforts in litigation.

3. Implement And Monitor Litigation Hold Procedures, When Appropriate.
The notion of document and information preservation is not something new to corporations. Several regulations impose preservation requirements on certain companies for the retention of documents and, in some cases, impose criminal penalties for their unlawful destruction. At common law, a company has a duty to preserve documents and electronic data when it "knows or reasonably should know" that information may be relevant to pending or anticipated litigation. Zubulake v. UBS Warburg, LLC, 220 F.R.D. 212, 216 (S.D.N.Y. 2003). Once litigation is anticipated, a party must suspend its routine document retention/ destruction policy and put in place a litigation hold to preserve what it knows, or reasonably should know, is relevant to the action. See Hynix Semiconductor, Inc. v. Rambus, 2006 U.S. Dist. LEXIS 30690, *66-67 (N.D. Cal. 2006) and Samsung Elecs. Co. v. Rambus, 2006 U.S. Dist. LEXIS 50007, *96-99 (E.D. Va. 2006).

Corporate counsel must determine appropriate trigger points for "anticipation of litigation" and develop litigation hold procedures to implement upon such triggers. See Cache La Poudre Feeds, LLC v. Land O'Lakes, Inc., 2007 U.S. Dist. LEXIS 15277 at *23-24 (D. Co. March 2, 2007); see also Heng Chan v. Triple 8 Palace Inc., 2005 U.S. Dist. LEXIS 16520 at *16 (S.D.N.Y. 2005) (counsel has an obligation to monitor compliance with the company's preservation obligations). Counsel should be proactive and ensure that litigation hold procedures are being complied with.

4. Communicate With Key Custodians And Key Data Stewards.
When practical, counsel should communicate face-to-face with key players to make sure that they understand the seriousness of the preservation obligation and the consequences of destruction of potentially relevant evidence. Counsel should inquire about the potential witnesses's personal practices for document management and retention and determine whether it is consistent with company policy and determine whether the individual keeps potentially discoverable material on sources that are not online with the company's computer systems (e.g., home computer, PDA, pocket drive, etc.) Most importantly, counsel must explain the custodian's ongoing preservation obligation. A written litigation hold notice should be sent to these individuals that reminds them of their responsibilities under the company's document retention policy and specifically cautions them to refrain from altering, modifying or deleting potentially relevant information.

Counsel should also communicate with the "data stewards" - the IT staff who manage the resources on which key players create/store corporate data. Discuss whether it is appropriate or necessary to take a mirror image of the relevant storage devices and make sure that any auto-delete functionality is disabled. Counsel and IT should make sure that relevant active files are not deleted, converted to backup tape, or otherwise downgraded. Metadata should be preserved, even if the determination has not yet been made to produce it.

5. Establish An E-Discovery Committee.
In-house counsel should consider putting together a team with representatives from the IT department, records management, corporate compliance and the legal department to develop and implement an action plan for litigation involving electronic discovery. This team will be responsible for keeping the legal department apprised of procedural or staff changes that impact document retention policies, including any litigation holds in place. The IT representatives would advise of the latest technologies acquired by the company that impact data storage or relate to the company's document retention program.

Counsel may also want to interview and train potential Rule 30(b)(6) witnesses, ideally members of the committee who have knowledge and can effectively articulate their expertise with all aspects of the company's computer processing and storage capabilities.

6. Implement A Plan To Maintain Data Formats And Map Data Sources.
Electronic information can be maintained in a variety of formats and on multiple types of media. Corporate counsel should work closely with the IT department to determine how information is preserved and whether data is converted or degraded for storage or archival purposes. Counsel should also be aware of the range of potential sources for relevant information and collaborate with IT to develop a "data map" which profiles the company's sources and locations of electronically stored information. A data map can set out in detail the company's different active data creation and storage systems and give valuable insight into the potential cost - in terms of time and money - of preserving and collecting the information. Data mapping profiles may include details about:

  • the applications and file types in use at the company, including details on proprietary or unique applications and integrated databases - particularly business-critical applications or those which are likely targets of discovery;
  • the range of electronic communications, such as: email, instant messaging, voicemail, and Voice Over Internet Protocol applications, and including details about server organization, physical locations, and backup protocols for each;
  • network storage and file servers, including information about server organization, physical location, and backup protocols;
  • workstation distributions and configurations;
  • remote user set-up (i.e., are employees able to VPN in from their home computers?);
  • distribution and use of mobile devices, including laptops and PDAs, with specific attention to whether data on such devices is captured or "synched" in any formal fashion.

7. Establish A Collection Methodology So That Responsive Data Can Be Securely Stored Prior To Processing, Review And Production.
There are several collection methodologies and technologies that can realize significant cost savings for corporations. In-house counsel should explore these techniques to determine if they are right for the company. For example, corporations can establish a "black box" service on which duplicate copies of relevant emails are automatically stored. The black box reduces the risk of deletion. If the company is involved in multiple pieces of litigation where the same documents are at issue, counsel may want to consider building a central data repository. Document repositories can save the corporation time and money as the company may need to review the documents only once and information about the documents such as relevance, privilege, Bates stamps and redactions can all be retained and reused in subsequent litigation.

8. Determine What Information Is Not Reasonably Accessible Due To Undue Burden Or Cost.
While the general rule is that parties may obtain discovery on any matter relevant to the claims or defenses involved in the case, see FRCP 26(b)(1), the rules offer limitations where data sources are not reasonably accessible due to undue cost or burden. See FRCP 26(b)(2)(B). However, even if the data sources are deemed not reasonably accessible, the court may still order production and set conditions on the requested production, including cost shifting. See FRCP 26(b)(2).

A data map will assist counsel in the determination of whether data sources are arguably not reasonably accessible. Counsel should also discuss the potential cost and burden with their IT department and a data collection specialist to determine whether selective restoration or sampling of inaccessible data is appropriate. For some data, restoration may still be cost prohibitive given the amount at stake in the litigation.

9. Take Proactive Steps To Prevent The Potential Inadvertent Production Of Privileged Documents.
The sheer volume of electronically stored information that may be produced in litigation increases the risk of inadvertent production of privileged or protected documents. However, there are steps that corporate departments can take prior to litigation to reduce the risk of inadvertent production. If practical, privileged documents can be segregated, coded, or tagged in the ordinary course of business thereby reducing the risk that they will be commingled with non-privileged data. Boilerplate tags and footers that read "attorney-client privilege" may be insufficient to identify a protected document, particularly if the tag is automatically and indiscriminately applied to every email generated from a particular user.

10. Communicate Regularly With Outside Counsel.
In-house counsel must fully understand the company's preservation, collection and production procedures relating to electronically stored information and be able to discuss them with their outside counsel. This is particularly important in the beginning stages of litigation when the parties meet and confer under Rule 26(f). In-house counsel may want to be present during this conference to assist outside counsel. Of course, the extent of counsel's involvement may vary depending upon the size and complexity of the case, the amount of the controversy, the location of the litigation and the volume of potentially relevant data.

As corporate counsel get more involved in the corporation's litigation matters and document retention policies and practices, they will feel more confident and comfortable with the electronic discovery-related changes to the Federal Rules of Civil Procedure. Education and communication are two keys to litigation preparedness. Both will make certain that the legal department can make reasonable and defensible choices regarding the collection, preservation and production of documents in litigation.

Labels: , , , , , , , , , , , ,

Tuesday, March 18, 2008

Qualcomm Inc. v. Broadcom Corp, 2008 WL 66932 (S.D. Cal. Jan. 7, 2008)

In a possible response to the question that I posed in my last post of whether or not the Zubulake rulings are still relevant, Broadcom has recently been awarded over $8 Million in Attorneys Fees and Qualcomm’s Lawyers have been referred to the California State Bar Due to Discovery Misconduct.

This may be the answer to whether Zubulake continues to have "teeth" in regards to the responsibilities/critieria of legal teams to produce or not produce ESI. Or, it may just be an example of the ignorance and/or arrogance on the part of the Qualcomm legal team? However, it is hard to believe that anyone involved in such an important case would be ignorant to the requirements set down by Zubulake.

This case, which is rapidly taking on the legendary status of Zubulake, involved the failure by Qualcomm’s attorneys to turn over 46,000 e-mails, many of which were deemed highly relevant to Broadcom’s core defenses. Qualcomm brought the suit in 2005, alleging Broadcom’s infringement of several of Qualcomm’s patents. One of Broadcom’s key defenses hinged on whether Qualcomm participated in a Joint Video Team (“JVT”) in 2002 and early 2003.

Broadcom argued that evidence of such participation would show that the patents at issue were unenforceable due to waiver. Throughout the case, Qualcomm’s lawyers repeatedly argued (and its witnesses testified in depositions) that Qualcomm did not participate in the JVT in the key time period. As the case progressed, however, e-mails surfaced that suggested that Qualcomm did, in fact, participate in the JVT in 2002. While preparing for trial, one of Qualcomm’s attorneys found an e-mail sent to one of Qualcomm’s witnesses in 2002 that welcomed her to a mailing list related to the JVT. That attorney then searched the witness’ laptop and found 21 other e-mails, some from 2002, where the parties discussed issues related to participation in the JVT. None of these e-mails had been produced to Broadcom.

Nevertheless, Qualcomm’s trial team decided not to produce the e-mails, claiming that they were not responsive to the discovery requests. During trial, Broadcom discovered the existence of the e-mails and Qualcomm finally produced them. Ultimately, Broadcom learned that Qualcomm had more than 46,000 e-mails responsive to the discovery requests that it failed to produce.

On January 7, after a number of oral arguments and an initial ruling by the court awarding attorneys’ fees, the court ordered Qualcomm to pay Broadcom over $8.5 million in attorneys’ fees (with credit for amounts already paid in response to a previous order) and referred a number of Qualcomm’s attorneys to the State Bar of California for an investigation in to possible ethical violations.

Labels: , , , , , , ,