mba october 26, 2010 cle - e-discovery in state court - seth row materials

21
MULTNOMAH BAR ASSOCIATION OCTOBER 26, 2010 E-DISCOVERY IN STATE COURTS Seth H. Row Parsons Farnell & Grein LLP [email protected] I. PRESERVATION OBLIGATIONS AND SPOLIATION OF ELECTRONICALLY STORED INFORMATION The information below draws on cases from outside of Oregon, and involving mostly federal rules of civil procedure. However, now that electronically stored information (ESI) will be expressly subject to discovery in Oregon state court practice, the same rules and principles should be generally applicable to any case being litigated in Oregon courts. Spoliation of evidence occurs when a piece of information that is relevant to a particular matter in litigation is destroyed or rendered inaccessible. The concept of “spoliation” encompasses many kinds of conduct, from the merely negligent to the willful. Parties have a duty to guard against spoliation of evidence. With the advent of electronic discovery, spoliation issues have regained prominence. Therefore, practitioners need to understand A) when the duty to preserve – that is, to guard against spoliation – is triggered; B) what the ramifications of spoliation are (which is important to know in large part in order to convince others, particularly your clients, that they need to take the duty to preserve seriously); C) how to protect yourself and your client from a claim of spoliation; D) what to do if you suspect that the other side has spoliated evidence. A. Triggering the Duty to Preserve - Pre-Litigation Duties - Document Retention Policies It is clear that the duty to preserve evidence begins when a case is filed. However, the duty to preserve evidence, including electronic evidence, may arise before a claim is filed. Guidance for when this obligation arises with regard to electronic information is the same as for paper documents: the obligation to preserve arises whenever a party reasonably should know that litigation is forthcoming. See, e.g., Silvestri v. General Motors Corporation, 271 F.3d 583, 591 (4 th Cir. 2001) (duty to preserve evidence arises when party reasonably should know that evidence may be relevant to anticipated litigation). In a few cases courts have sanctioned parties who destroyed documents pre-filing. What is often at issue in these cases is the reasonableness of the party's document retention/destruction policy, which is usually offered to excuse or explain the destruction. Courts have long recognized that a reasonable retention policy may be the basis for a defense to spoliation. See, e.g., Arthur Anderson LLP v. United States, 544 U.S. 696, 705, 125 S. Ct. 2129, 2135 (2005) ("It is, of course, not wrongful for a manager to instruct its employees to comply with a valid document retention policy under ordinary circumstances."); Turner v. Hudson Transit Lines, Inc., 142 F.R.D. 68, 69 (S.D.N.Y. 1991) (potential evidence destroyed under record retention policy demonstrated that destruction was negligent and not intentional); Carlucci v. Piper Aircraft Corporation, 102 F.R.D.

Upload: sethrow1

Post on 02-Jul-2015

24 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

MULTNOMAH BAR ASSOCIATION OCTOBER 26, 2010

E-DISCOVERY IN STATE COURTS Seth H. Row

Parsons Farnell & Grein LLP [email protected]

I. PRESERVATION OBLIGATIONS AND SPOLIATION OF ELECTRONICALLY STORED INFORMATION

The information below draws on cases from outside of Oregon, and involving mostly federal rules of civil procedure. However, now that electronically stored information (ESI) will be expressly subject to discovery in Oregon state court practice, the same rules and principles should be generally applicable to any case being litigated in Oregon courts.

Spoliation of evidence occurs when a piece of information that is relevant to a particular matter in litigation is destroyed or rendered inaccessible. The concept of “spoliation” encompasses many kinds of conduct, from the merely negligent to the willful. Parties have a duty to guard against spoliation of evidence. With the advent of electronic discovery, spoliation issues have regained prominence. Therefore, practitioners need to understand A) when the duty to preserve – that is, to guard against spoliation – is triggered; B) what the ramifications of spoliation are (which is important to know in large part in order to convince others, particularly your clients, that they need to take the duty to preserve seriously); C) how to protect yourself and your client from a claim of spoliation; D) what to do if you suspect that the other side has spoliated evidence.

A. Triggering the Duty to Preserve - Pre-Litigation Duties - Document Retention Policies

It is clear that the duty to preserve evidence begins when a case is filed. However, the duty to preserve evidence, including electronic evidence, may arise before a claim is filed. Guidance for when this obligation arises with regard to electronic information is the same as for paper documents: the obligation to preserve arises whenever a party reasonably should know that litigation is forthcoming. See, e.g., Silvestri v. General Motors Corporation, 271 F.3d 583, 591 (4th Cir. 2001) (duty to preserve evidence arises when party reasonably should know that evidence may be relevant to anticipated litigation).

In a few cases courts have sanctioned parties who destroyed documents pre-filing. What is often at issue in these cases is the reasonableness of the party's document retention/destruction policy, which is usually offered to excuse or explain the destruction. Courts have long recognized that a reasonable retention policy may be the basis for a defense to spoliation. See, e.g., Arthur Anderson LLP v. United States, 544 U.S. 696, 705, 125 S. Ct. 2129, 2135 (2005) ("It is, of course, not wrongful for a manager to instruct its employees to comply with a valid document retention policy under ordinary circumstances."); Turner v. Hudson Transit Lines, Inc., 142 F.R.D. 68, 69 (S.D.N.Y. 1991) (potential evidence destroyed under record retention policy demonstrated that destruction was negligent and not intentional); Carlucci v. Piper Aircraft Corporation, 102 F.R.D.

Page 2: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

427, 481-82 (S.D. Fl. 1984) (finding that good faith destruction of information pursuant to bona fide document retention policy could justify failure to produce documents in discovery).

As has always been the case with paper documents, once a party is on notice that documents may be relevant (whether or not a discovery request has been made), it has a duty to suspend any retention/destruction policy. The failure to do so may result in sanctions. Wiginton v. C.B. Richard Ellis, Inc., 02C-6832, 2003 W.L. 22439865, at *7 (N.D. Ill. October 27, 2003) (failure to suspend routine document retention policy once party is put on notice that documents scheduled to be destroyed may be relevant in litigation will cross from negligence to bad faith).

The following cases are examples of courts holding that a document retention policy that allowed documents to be destroyed was reasonable: United States v. Tabor Extrusions, L.P., No. 400CV00255, 2001 LEXIS 24600, at *8-9 (E.D. Ark. December 27, 2001) (government's destruction of documents under retention policy calling for destruction after six years and three months was reasonable; absent evidence that government should have known documents would become material, no sanction was appropriate); McGuire v. Acufex Microsurgical, Inc., 175 F.R.D. 149, 155-56 (D. Mass. 1997) (employers' policy allowing managers to discard drafts of internal investigation reports was reasonable).

The following cases are examples of the cases in which the court held, or at least had evidence to suspect, that the retention policy being offered as a defense to destruction of records was not reasonable: Rambus, Inc. v. Infineon Technologies A.G., 220 F.R.D. 264, 286 (E.D. Va. 2004), subsequent determination, 222 F.R.D. 280 (E.D. Va. 2004) (ordering discovery of attorneys' files about clients document retention program where evidence showed that prior to filing patent infringement lawsuit, client at attorneys' direction had conducted a "shred day"); In Re Prudential Insurance Companies of America Sales Practices Litigation, 169 F.R.D. 598, 615 (D.N.J. 1997) (adverse inference justified despite lack of evidence that employees intentionally destroyed relevant documents; company's "haphazard and uncoordinated approach to document retention" prejudiced opposing party); Reingold v. Wet n' Wild Nevada, Inc., 944 P.2d 800, 802 (Nevada 1997) (defendant sanctioned for spoliation; document destruction policy calling for destruction of documents shortly before statute of limitations expired unreasonable where claims were foreseeable);; Telectron, Inc. v. Overhead Door Corporation, 116 F.R.D. 107, 123 (S.D. Fl. 1987); Lewy v. Remington Arms Company, 836 F.2d 1104, 1112 (8th Cir. 1988) (directing district court to consider in evaluating whether spoliation instruction should be given, whether party's retention policy was reasonable in light of history of lawsuits filed or complaints made in the past; district court should consider whether frequency or magnitude of past complaints render policy on destruction of future documents unreasonable).

The law regarding what is sufficient notice to trigger the duty to preserve is constantly developing as parties become more and more aggressive about asserting claims of spoliation of evidence. Courts have recently considered whether the following events will trigger the duty:

A subjectively frivolous EEOC charge?

A subpoena for documents - does it trigger a duty to preserve other documents if the party may later become more generally involved in the litigation?

Page 3: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

A lawsuit against by a competitor against another competitor for patent infringement?

A complaint from a customer that he was injured by a product?

The answer to questions like these will often depend on the company’s history of litigation. Has that kind of event, in the past, led to litigation? If so, the duty to preserve is more likely to have been triggered.

B. Selected Cases on the Ramifications of Spoliation of Electronic Information

In the last several years there have been many cases considering whether, and if so, what, penalties should be imposed for spoliation of electronic evidence. Below are synposes of just a few of these cases.

- Qualcomm Inc. v. Broadcom Corp., 2008 WL 66932 (S.D. Cal. Jan. 7, 2008).

In patent litigation, plaintiff intentionally failed to produce over 46,000 responsive emails and attempted to hide their failure to produce. Plaintiff used the absence of evidence that would have been established by missing emails in arguments to jury. Court imposed monetary sanctions of $8,568,633 against plaintiff, representing all of defendant’s litigation costs and fees. Based on finding that outside litigation counsel ignored warnings that plaintiff’s production of documents was incomplete, and assisted plaintiff by “reckless conduct,” court directed plaintiff’s counsel to participate in remedial education on preservation of evidence, among other things. Court also referred matter to California State Bar for investigation of attorneys for potential ethical breaches.

- United States v. Philip Morris USA Inc., 2005 LEXIS 13580 (D. D.C. July 21, 2004).

Government complaint alleged, among other things, that Philip Morris researched how to target-market its tobacco products to minors. Court entered order for the preservation of all documents and information potentially relevant to the case. Subsequently, Philip Morris deleted all e-mails more than 60 days old for a period of two years after entry of the preservation order. The government then moved for evidentiary and monetary sanctions. Court found that many e-mails were lost as the result of an automatic deletion process that was not modified to comply with its preservation order and that eleven of Philip Morris's highest ranking employees failed to follow the company's general document retention and preservation policy. Noting the complete destruction of the evidence, the court deemed itself unable to evaluate the harm to the government's case and imposed a $2.75 million monetary sanction against Philip Morris for its violation of the preservation order.

- Omega Patents, LLC v. Fortin Auto Radio, Inc., 2006 WL 2038534 (M.D. Fla. July 19, 2006).

Court imposed monetary sanctions against defendant under Rule 37(d) based upon defendant's delay in producing responsive e-mails notwithstanding defendant's assertion that it could not have produced them sooner without incurring "undue burden and expense."

Page 4: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

- Coleman Holdings, Inc. v. Morgan Stanley & Company, Inc., No. CA03-5045AI, 2005 W.L. 674885 (Fl. Cir. Ct. March 23, 2005)

Uncoordinated search for back-up tapes led to late discovery of documents, partial default judgment and $1.5 billion damages verdict.

- In re Telxon Corp. Securities Litigation, 2004 WL 3192729 (N.D. Ohio 2004)

Sanction of default judgment against defendant warranted where defendant destroyed or failed to preserve electronically stored information, including metadata, in violation of order, where defendant was one of "big four" accounting firms experienced in litigation.

- Williams v. Sprint/United Management Co., 230 F.R.D. 640 (D. Kan. 2005)

No sanction warranted for destruction of metadata where production of metadata was new area of law and practice and preservation order had been ambiguous as to metadata.

- Krumwiede v. Brighton Associates, LLC, 2006 WL 1308629 (N.D. Ill. May 8, 2006).

Plaintiff sued former employer alleging various causes of action including breach of employment agreement and back wages. Former employer filed counterclaim for breach of non-compete agreement and misappropriation of business opportunities. Court found that plaintiff was responsible for willful, bad faith spoliation of evidence and other "hide the ball tactics" and entered summary judgment for former employer on counterclaims.

- In re Old Banc One Shareholders Securities Lit., 2005 WL 3372783 (N.D. Ill. Dec. 8, 2005).

Defendant in class action securities litigation was sanctioned for negligent failure to

institute and communicate a "litigation hold" or document preservation notice within the organization.

- Mosaid Technologies, Inc. v. Samsung Electronics Co., Ltd., 2004 U.S. Dist. LEXIS 23596 (D.N.J. July 7, 2004), affirmed, 2004 LEXIS 25286 (Dec. 7, 2004).

Plaintiff alleged patent infringement by defendant. Plaintiff sought e-mails based on

testimony of former Samsung designer regarding the extensive use of e-mail by Samsung technical personnel. Samsung did not institute a policy to preserve electronic information until well after suit was filed and therefore was unable to produce relevant electronic information, including e-mails, because they had been automatically purged from Samsung's computer system. Magistrate judge recommended an adverse jury instruction that the purged information would have been harmful to Samsung's defense, characterizing Samsung's conduct as "at the least, extremely reckless behavior." Magistrate's recommendation affirmed and upheld by District Judge.

Page 5: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

- Phoenix Four, Inc. v. Strategic Resources Corp., 2006 WL 1409413 (S.D.N.Y. May 23, 2006).

Court cited proposed Fed. R. Civ. P. 26(a) and 26(b)(2) in determining that respondent

and its counsel failed to properly search all sources of potentially relevant documents when they did not search a hidden partition of a server hard drive.

- Tilberg v. Next Management Co., 2005 WL 2759860 (S.D.N.Y. October 24, 2005).

Court ordered plaintiff to share the cost of the forensic expert hired by defendant to search its e-mail servers for purposes of responding to plaintiff's discovery requests. Plaintiff subsequently asserted that expert was unable to access one server and found evidence indicating that additional responsive documents existed despite defendant's assertions to the contrary. Based on this evidence, court extended discovery deadline in plaintiff's favor.

The case law on the ramifications of spoliation of electronic evidence is constantly evolving. Practitioners should keep themselves abreast of this case law or become familiar with how the law of spoliation is evolving in the type of litigation that they practice by visiting one of the many online, searchable databases of e-discovery case law, such as K&L Gates’ case database, at https://extranet1.klgates.com/ediscovery/Search.aspx.

Attached to these materials is a very recent decision in a civil right matter in the Middle District of Florida that will be discussed during the presentation.

C. The Litigation Hold & How to Protect Yourself & Your Clients

1. Important Case Law on Litigation Holds & Electronic Evidence

The concept of a litigation hold is not new. However, with the advent of electronic discovery, spoliation of evidence -- and therefore the litigation hold -- has taken on a new prominence. This is because electronic information is more fragile, and more likely to be inadvertently destroyed, than paper documents. The sheer volume of electronic data created by any organization means that most organizations have to have a mechanism for automatically deleting or archiving the information. In addition, because electronic information can often be deleted by simply hitting a key, the risk of accident loss is increased.

The starting place for discussion of the case law on counsel’s duty with regard to litigation holds in the area of electronic discovery is the Zubulake series of decisions out of the Southern District of New York. Practitioners would do well to familiarize themselves with the facts and essential holdings of this series of decisions because they are frequently cited in both federal and non-federal cases.

The Zubulake series of decisions were issued in 2003-2004, in the context of a hotly contested employment discrimination case, by Judge Shira Scheindlin of the U.S. District Court for the Southern District of New York. The Zubulake court’s emphasis on the active involvement of counsel regarding the institution and monitoring of "litigation holds" foreshadowed and informed the 2006 revisions to the Federal Rules. The spoliation issues arose during a phase of the litigation discussed in the decision commonly referred to Zubulake IV.

Page 6: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

During the course of the backup tape restoration project that was the subject of Zubulake III, the parties discovered that some of the backup tapes were missing. Zubulake v. UBS Warburg LLC, 220 F.R.D. 212 (S.D.N.Y. 2003) ("Zubulake IV "). In addition, certain isolated e-mails created after UBS supposedly began retaining all relevant e-mails were deleted from UBS's system (though they appeared to have been saved on the backup tapes) despite the following policies implemented by UBS:

- Shortly after Zubulake filed her EEOC charge, UBS issued an oral directive to its employees to retain all potentially relevant documents including e-mails and backup tapes.

- After Zubulake's counsel specifically requested e-mails stored on backup tapes, UBS's outside counsel orally instructed UBS's information technology personnel to discontinue their practice of recycling backup tapes.

The remedies sought by the plaintiff were: a) an order requiring UBS to bear the full cost of restoring the remaining backup tapes; b) an adverse inference jury instruction with respect to the content on the missing backup tapes; and c) an order directing UBS to bear the cost of re-deposing certain individuals concerning the issues raised in newly produced e-mails.

The court began by noting that the loss or destruction of documents that should have been preserved for purposes of threatened or pending litigation has the potential to cause significant prejudice to the adverse party. The specific questions presented were how to determine an appropriate penalty for the party that caused the loss and, conversely, how to determine an appropriate remedy for the party injured by the loss. The court recognized that this already difficult issue was further complicated in the case of electronic discovery, both because it is easier to delete or tamper with (both intentionally and inadvertently) and because it is difficult for litigants to craft and follow policies to ensure that all relevant electronic information is preserved. Thus, the opinion in Zubulake IV addressed both the scope of a litigant's duty to preserve electronic information and the consequences of a failure to preserve electronic information that falls within the scope of that duty.

With respect to the duty to preserve evidence, the court recited the existing general rule that a party’s obligation to preserve potentially responsive records (including electronic data) for purposes of litigation arises when the party has notice that the evidence is relevant to litigation or when the party should have known that the evidence may be relevant to future litigation. Id. at 216. Once the obligation to preserve is triggered, a party is not obligated to preserve every shred of paper or byte of electronic data in its organization. It must, however, preserve relevant evidence that might be useful to an adversary. This includes all information that it knows (or reasonably should know) is relevant to the action or potential action, that is reasonably calculated to lead to the discovery of admissible evidence, and that is reasonably likely to be requested during discovery and/or is the subject of a pending document request. The duty of preservation extends to all employees and agents who are likely to be in possession of information to which the duty applies, including "key players" and information technology staff. The duty extends not only to documents in existence at the time the duty attaches, but to all relevant documents created thereafter.

Page 7: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

The Zubulake court stated that a party fulfills the duty to preserve through the prompt creation of and adherence to a discovery management plan that includes the immediate distribution of a "preservation directive" or "litigation hold" and the suspension (or partial suspension) of its routine document retention/destruction policy as it pertains to relevant documents or categories of documents.

The problem was that while UBS's counsel issued such a preservation directive on a timely basis, and adherence to the directive would have met UBS's preservation obligations, UBS's employees did not fully comply with the directive. Further, some of the "lost" tapes should still have been in existence pursuant to UBS's standard document retention/destruction policies without reference to the preservation directive.

The court then outlined the three elements an aggrieved party must establish as a prerequisite to an adverse inference instruction or other sanctions due to spoliation of evidence. These elements were drawn from case law in the Second Circuit, but these same factors are used in virtually all jurisdictions:

1) that the party having control over the evidence had an obligation to preserve it at the time that it was destroyed;

2) that the records were destroyed with a "culpable state of mind" (which includes ordinary negligence and does not necessarily require bad faith);3 and

3) that the destroyed evidence was "relevant," not just in the ordinary sense as tending to prove or disprove a material fact, but also meaning that a reasonable trier of fact could find that it would have been favorable to the party moving for sanctions as being supportive of one or more of its claims or defenses.4

The court found that UBS's duty to preserve had attached and that the loss/destruction of the information was negligent and possibly reckless (though not willful), but that Zubulake failed to prove that the information was likely to support her claims. As a result, the court refused to give an adverse inference instruction to the jury – noting that such an instruction is an extreme sanction that should not be imposed lightly since it tends to make it virtually impossible for the sanctioned party to ultimately prevail on the merits. The court did, however, require UBS to bear the plaintiff's costs for re-deposing certain witnesses for the limited purpose of inquiring into new issues raised by the destruction of evidence and any newly discovered e-mails.

Zubulake IV did not mark the end of issues relating to spoliation in the case. In Zubulake V (Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y. 2004)), after 2 years of discovery disputes and 4 prior written opinions, Zubulake again moved to sanction UBS for failure to produce/tardy production of relevant information. In deciding the sanctions issue, the court framed the questions to be decided as: 1) whether UBS failed to preserve and timely produce relevant information; and 2) if so, whether it acted negligently, recklessly or willfully.

In its opinion, the court wrote at length on the importance of lawyers and clients communicating clearly and effectively with each other throughout the litigation process and noted that when such communication breaks down, there are "usually casualties."

Page 8: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

The court used its opinion as an opportunity to expound on: 1) counsel's obligation to ensure that all relevant discoverable information is preserved by giving clear instructions to the client to preserve such information; and 2) the client's obligation to heed those instructions. The court noted that, early in the litigation, UBS's inside and outside counsel directed it to retain relevant electronic information. Notwithstanding those instructions, UBS employees deleted relevant e-mails and other employees never produced relevant information to counsel. As a result, some e-mails responsive to discovery requests were deleted, and perhaps permanently lost, and others were produced approximately 2 years late. Counsel, in turn: 1) failed to request retained information from one key employee; 2) failed to provide "litigation hold" instructions to another key employee; 3) failed to communicate adequately with another employee about how she maintained her computer files; and 4) failed to safeguard backup tapes that might have contained some of the deleted e-mails, which would have mitigated the damage done by UBS's deletion of those e-mails. Based on these facts, the court found that sanctions were warranted.

After discussing the history of the discovery saga, the law of spoliation of evidence, the continuing obligation of clients and counsel to locate and preserve relevant information, and the failure of both UBS and its counsel to meet those obligations, the court concluded that the failures of both UBS and its counsel were willful and that the lost information would be presumed relevant. In determining what sanctions would be appropriate, the court considered the following goals: the punishment of UBS, the deterrence of future misconduct and the restoration of Zubulake to the position she would have been in had UBS faithfully discharged its discovery obligations. The sanctions assessed by the court included giving an adverse inference instruction to the jury with respect to the missing e-mails, assessing UBS with the cost of any depositions or re-depositions necessitated by the late production, requiring UBS to bear the cost of restoring and producing e-mails from various backup tapes as well as the cost of any depositions or re-depositions related to the information recovered from the backup tapes, and ordering UBS to pay all expenses and attorney's fees incurred by Zubulake in connection with her motion for sanctions.

2. Advising Your Client on Preservation of Evidence

Advising the client as soon as the duty to preserve has been triggered – and, indeed, making a specific inquiry into when the duty has been triggered – is an imperative. The client’s interests will be protected from a future spoliation claim, and the attorney will be protected from any allegation (by the court, the opponent, or the client) of failing to act quickly enough. As the cases above demonstrate, courts are increasingly willing to look at the actions of outside counsel as well as in-house lawyers and businesspeople when assessing whether sanctions should be levied after there has been spoliation.

The following is a general guide to protecting your client and yourself:

As soon as you are retained, ask yourself whether the duty to preserve has been triggered. Is litigation reasonably likely? Assess what has happened so far. Has there been an EEOC charge, a demand letter, a complaint from an injured customer, a claim notice from an insurance company? Any of these are likely to be sufficient notice of reasonably likely litigation. Write a memo to the file documenting your analysis.

Page 9: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

If the duty to preserve has been triggered, check to see if the client has implemented any kind of litigation hold. If the answer is yes, ask for a copy, along with the distribution list and any documentation confirming receipt. Ask the client how they came up with the distribution list. Ask if IT has been advised of the hold and what IT has done. Advise the client that you now have a duty to be involved in monitoring compliance with the hold.

If the client hasn’t done anything yet, send the client a memo advising them of the need to issue a litigation hold and follow up with a discussion. Tell them that you need to be involved in creating the hold memo and determining the distribution list, and monitoring compliance.

Discuss with the client the likely custodians (individual and departmental) of relevant information. Learn about the client’s information management practices – both formal and informal. Who creates potentially relevant data? Where do they keep it? Who else has access to it? What retention periods or processes apply to the data? Create a distribution list. Make sure to include the IT personnel responsible for any janitorial/automatic functions applicable to storage media or applications.

Get the litigation hold out right away. Include enough specificity (time frames, topics, names of players in the dispute) that the people on the distribution list will be able to determine whether they have responsive information. Be over-inclusive. Require that recipients acknowledge that they have read and understand the directive. Ask for feedback, questions, or concerns.

If a data source is under individual control (e.g., data stored on a user’s desktop hard drive), assess whether it is reasonable to ask the individual user simply not to delete or alter the data, or whether the data needs to be copied off of the storage device in order to make sure that the data is preserved. Do not assume that document retention or storage policies are being followed.

D. What to Do If You Suspect Spoliation - Discoverability of Preservation and Production Information

If you suspect that spoliation has taken place, your first instinct may be to run to the judge. In some cases that may be the correct move. However, in most instances, you will need more specific information to back up your suspicions. That is where the concept of discovery-about-discovery comes in. Where the propounding party has a good-faith basis for seeking such discovery, and if the responding party has nothing to hide, counsel will generally be able to reach a compromise that allows some discovery to take place. However, so-called “meta-discovery” is sometimes used as a tactic, and can be rife with problems of privilege, expense and the specter of harassment. As a result, meta-discovery should be and can be resisted if the propounding party is unable to show a genuine need or basis for it.

Page 10: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

1. Discoverability Generally

Meta-discovery will generally be allowed where the propounding party has an objective and good faith basis for believing that information has been wrongfully withheld or destroyed. See American Fast Freight, Inc. v. Nat'l Consol. & Distrib., Inc., 2007 WL 3357694 (W.D. Wash. Nov. 7, 2007) (compelling production of documents regarding data preservation where responding party failed to include electronic data in initial disclosures); see also McKenna v. Nestle Purina PetCare Co., 2007 WL 433291 (S.D. Ohio Feb. 5, 2007) (ordering defendant to answer questions in follow up discovery about discrepancy between its inability to retrieve emails requested in litigation and its ability to access such emails at time of plaintiff's termination).

Where the propounding party relies on mere suspicion that information has been withheld, however, meta-discovery will be denied. Kellogg v. Nike, Inc., 2007 WL 4570871 (D. Neb. Dec. 26, 2007) (plaintiff's counsel's "incredulity" at defendant's inability to produce certain documents was an insufficient basis to permit meta-discovery in light of defendant's explanations for scope of information provided).

Courts are particularly loath to allow discovery into one common target of meta-discovery: preservation instructions (aka litigation "holds") issued in connection with litigation. Such preservation instructions, if created after litigation began or was reasonably foreseeable, are generally protected by attorney-client privilege or the work product doctrine and shielded from discovery. See Gibson v. Ford Motor Co., 2007 WL 41954, *6 (N.D. Ga. Jan. 4, 2007) (noting that “[i]n the Court’s experience, these instructions are often, if not always, drafted by counsel, involve their work product, are often overly inclusive, and the documents they list do not necessarily bear a reasonable relationship to the issues in litigation.”); see also Muro v. Target Corp., 2007 WL 3254463 (N.D.Ill. Nov. 2, 2007) (denying request for production of litigation hold); E.E.O.C. v. Boeing Co., 2007 WL 1146446 (D.Ariz. April 18, 2007) (denying request for Rule 30(b)(6) deposition on document preservation because topic covered by work-product protection). However, even information that is arguably protected as work-product may become fair game for discovery if there are serious questions about spoliation of evidence. See Qualcomm, Inc. v. Broadcom Corp., 2008 WL 638108, *3 (S.D. Cal. March 5, 2008).

Courts have also denied meta-discovery where a party was able to show that the opponent may have destroyed documents in another case, but had no evidence of such tactics in the present case. See In re Honeywell Intern., Inc. Securities Litigation, 230 F.R.D. 293, 302 (S.D.N.Y. 2003) (denying discovery of a non-party’s specific document production efforts pursuant to a subpoena, as well as general document retention policies, despite evidence of document destruction by the defendant in an unrelated matter). The discovery sought also must be targeted to documents or ESI that are directly relevant to a party's claim or defense, as opposed to documents relevant to the general subject matter of the action. If the dispute concerns the production of documents that are only relevant to the general subject matter of the litigation, the request for additional discovery may be denied. See E.E.O.C. v. Boeing Co., 2007 WL 1146446, *2 (D. Ariz. April 18, 2007) (refusing to allow corporate deposition about efforts to locate certain requested documents where documents were only relevant to general subject matter, but not to EEOC's claims or Boeing's defenses); see Fed. R. Cir. P. 26(b)(1).

Page 11: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

One effective way to thwart a motion to compel meta-discovery is to provide the court with detailed information in the form of affidavits to rebut the moving party's factual contentions supporting the request for additional discovery. This is particularly the case where discovery is sought regarding the producing party's contention that ESI is not "reasonable accessible" and thus not subject to discovery under Rule 26(b)(2)(C). For example, in E.E.O.C. v. Boeing Co., 2007 WL 1146446, *3 (D. Ariz. April 18, 2007), Boeing was able to defeat a motion to compel a Rule 30(b)(6) deponent to answer questions about the company's estimated cost to produce certain types of email. The court held that Boeing had already provided sufficient information to the court in the form of affidavits on that topic, in response to the EEOC's motion to compel the email itself. Id.; see Petcou v. C.H. Robinson Worldwide, 2008 WL 542684, *1 (N.D.Ga. Feb. 25, 2008) (magistrate had denied motion to compel production of emails alleged to be not "reasonable accessible" with leave to move for reconsideration after taking discovery on accessibility issue; motion for reconsideration subsequently denied); cf. Wells v. Xpedx, 2007 WL 1200955 (M.D. Fla. April 23, 2007) (opposing party's failure to provide the court with detailed information about its data preservation policies and practices, efforts to search for and retrieve responsive information, and computer system capabilities led to court permitting Rule 30(b)(6) deposition of IT personnel).

2. Remedies

If meta-discovery is being used as a tactic the propounding party will usually seek a great deal of access and information in an effort to drive up costs. Courts, having grown wise to such tactics, frequently limit the scope of the remedy and in some cases have fashioned their own remedies to fit the facts of the case. The remedies available once meta-discovery has been deemed appropriate generally range from the mild, see ATM Exchange, Inc. v. Visa Int'l Serv. Ass'n, 2007 WL 1674230 (S.D. Ohio June 7, 2007) (ordering defendant to provide new verified discovery responses addressing alleged failure to produce responsive documents and lack of document retention policy); Google Inc. v. Am. Blind & Wallpaper Factory, Inc., 2006 WL 3290402 (N.D. Cal. Nov. 13, 2006) (ordering party to verify that it had made good faith effort to produce all responsive information); In re Kmart, 371 B.R. 823 (Bankr. N.D. Ill. 2007) (ordering party to re-do search for documents), to slightly intrusive, see Treppel v. Biovail Corp., 2008 WL 866594 (S.D.N.Y. Apr. 2, 2008) (permitting forensic examination of producing party's laptop to look for allegedly missing documents), to comprehensive, see Vennet v. Am. Intercont'l Univ. Online, 2007 WL 4442321 (N.D. Ill. Dec. 13, 2007) (ordering defendant to permit plaintiff's expert to examine phone system and network, and permitting Rule 30(b)(6) deposition of defendants' records custodian and IT personnel); Wells v. Xpedx, 2007 WL 1200955 (M.D. Fla. April 23, 2007) (permitting deposition of IT personnel on computer system capabilities).

Page 12: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

II. DISCOVERY FROM DATA SOURCES DEEMED “NOT REASONABLY ACCESSIBLE”1

Under Federal Rule of Civil Procedure 26(b)(2)(B) a party may resist production of ESI from sources that are “not reasonably accessible due to undue burden or cost.” Although these is no corollary in the Oregon state court rules, hopefully Oregon courts will look to the federal rules and caselaw for guidance on this issue.

The Federal Rules of Civil Procedure provide an outline for how to proceed when faced with a Rule 26(b)(2)(B) objection. The rule states that “A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost.” The rule establishes a procedure for resolving disputes over the claim:

On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for discovery.

This “two-step” process has been criticized by some as duplicative and meaningless. Nevertheless, it does provide a rules-based approach to challenging the claim. The rule invites a motion to compel to test the claim.

With a motion to compel in mind, your first step should be to insist that your opponent fully comply with the “identification” requirement of the rule. The Advisory Committee notes to the rule make it clear that a responding party invoking Rule 26(b)(2)(B) must:

identify, by category or type, the sources containing potentially responsive information that it is neither searching nor producing. The identification should, to the extent possible, provide enough detail to enable the requesting party to evaluate the burdens and costs of providing the discovery and the likelihood of finding responsive information on the identified sources.

If you anticipated that this issue might arise, you may have included an instruction in your request for production demanding that the responding party provide those details in its response. Under the rule, these questions need not be asked in the form of interrogatories because the notes make it reasonably clear that the responding party has the obligation to provide this information at the same time that it responds to the underlying discovery request. Assuming

1 This section is drawn from my article “Probing Claims That Data Is Not Reasonably Accessible,” PP&D, Vol. 17, No. 1 (2008) the newsletter of The Committee on Pretrial Practice & Discovery of the American Bar Association, Section of Litigation, and is excerpted here with permission of the American Bar Association. The full version of the article with additional citations and notations is available at http://www.abanet.org/litigation/committees/pretrial/home.html.

Page 13: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

that you did not receive that information in the discovery response, you should write to your opponent, referencing the notes and asking that additional detail be provided.

It is important to keep in mind that Rule 26(b)(2)(B) is properly used as an objection to production of information, not to discoverability of information. Therefore, you should make it clear to your opponent that you understand its response to indicate that the sources to which it is referring may contain responsive information that otherwise would be discoverable under Rule 26(b)(1); that is, it has conceded that the source may contain information that is “relevant to any party’s claim of defense” and that is itself admissible or “reasonably calculated to lead to the discovery of admissible evidence.”

But what will you do with the detailed information about the source once you have it? If your opponent takes its obligations seriously, it will give you technical information about the sources it considers not reasonably accessible. At the same time that you are preparing your letter demanding a more complete identification of the sources that your opponent has refused to search, you should be preparing yourself to understand and evaluate its anticipated response. If you have not already done so in connection with a Rule 26(f) conference, you should give serious consideration to retaining an electronic discovery consultant to explore the other party’s contentions.

Hopefully, the letter to your opponent garners a response that gives you information sufficient to either accept or reject the claim that certain information is “not reasonably accessible.” But let’s suppose, as is unfortunately likely, that you encounter resistance. Rather than engage in a lengthy back-and-forth by letter, consider doing some formal discovery to support your probable motion to compel.

Although courts usually dislike litigants engaging in discovery away from the central issue in the case, in this situation, the Advisory Committee notes to the rule will support issuing discovery on e-discovery. The notes state, in the context of a discussion about the two-step, burden-shifting analysis set out in the rule, that:

. . . the court and parties may know little about what information the sources identified as not reasonably accessible might contain, whether it is relevant, and how valuable it may be to the litigation. In such cases, the parties may need some focused discovery, including sampling of the sources, to learn more about what burdens and costs are involved in accessing the information, what the information consists of, and how valuable it is for the litigation in light of information that can be obtained by exhausting other opportunities for discovery.8

Not only do the notes to the rule specifically contemplate discovery about discovery (what some call “meta-discovery”) but several courts have also ordered such discovery when the parties could not agree. For example, in Petcou v. C.H. Robinson Worldwide, the court denied a motion to compel production of email that was alleged to be “not reasonably accessible,” but ordered discovery on the accessibility issue, and allowed the requesting party leave to refile the motion. In Wells v. Xpedx, the court permitted the requesting party to take a corporate representative deposition under Federal Rule of Civil Procedure 30(b)(6), regarding the producing party’s data-preservation policies and practices, its efforts to search for and retrieve

Page 14: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

responsive information, and its computer system capabilities, because the producing party failed to provide the court with sufficient information to back up its claim that data was not reasonably accessible.10

Let me digress a bit to consider what kind of information you should expect from your opponent concerning its data sources. A common question from clients is what data sources may be deemed “off limits” under Rule 26(b)(2)(B). The answer to that question, like most such questions posed to lawyers, is “it depends.” No data sources are necessarily and presumptively “not reasonably accessible,” because the focus of the rule is on the burden or cost of production from that source, not on the particular source itself. The burden or cost to the producing party may arise because of multiple factors. The cost/burden factors that have been recognized by the Rules Committee, commentators, or courts, include:

• “forensic costs” of converting data from a format that is difficult or impossible to search or review to another more accessible format (such as the restoration of data from a backup tape)11

• the cost to review the data for responsiveness, privilege, or other concerns12

• business disruption and “internal” costs

While much has been written about the different categories of data source media formats—for example, “active” or “online,” “nearline,” “backup,” “deleted,” or “legacy”—it is clear that under the appropriate circumstances, a party may need to produce information from a source that appears to be “not reasonably accessible.” Indeed, focusing on the format of any particular source can lead to a good amount of confusion of the issues. For example, in W.E. Aubuchon v. Benefirst, the court began with what it called a “media-based analytical approach” to the issue of whether medical claim files were protected by Rule 26(b)(2)(B).15 The court repeated Judge Scheindlin’s explanation of the different categories of sources in the Zubulake cases, which she had designated as either “accessible” or “inaccessible.” The Aubuchon court ran into a problem applying that analysis to the facts before it and to Rule 26(b)(2)(B) (which was enacted after the Zubulake cases). The Aubuchon court concluded that the data source at issue—a server—was “accessible” under the Zubulake analysis; however, the court also held that the data on the server was not searchable or indexed in any meaningful way. Therefore, the court concluded that despite the media source being “accessible,” the ESI was “not reasonably accessible” under the rule because of the time that would be required to review the data for responsiveness.

Such confusion can be avoided by focusing on the burden associated with complying with the particular discovery request, rather than the type of media on which it is stored, and by viewing the media format as but one of several considerations. Therefore, do not be content with an explanation from your opponent that no documents were produced in response to your request, reasoning that if responsive documents exist, they are on a backup tape, which is not reasonably accessible. By letting you know the media type, your opponent has only begun to answer the hard questions that you should pose to probe its claim.

Whether your opponent plays hardball and requires you to take discovery on the point, or

Page 15: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

agrees to provide information to back up its claim voluntarily, probing a claim that data is “not reasonably accessible” requires asking difficult questions about technical details, vendor relationships, and litigation planning.

As noted above, simply because the data source is a media format that the conventional wisdom would call “inaccessible” does not necessarily mean that discovery from the source would be unreasonably burdensome or costly. Once you learn the media type or format, you should ask additional questions to inform your analysis.

To take one common example, opposing counsel may claim that the email files of a former employee might contain responsive information, but that when the employee left, his or her email account was closed and the data deleted from the email server. The only place that the employee’s email might reside is on one of several backup tapes of the email server created shortly before the account was closed. Your opponent may argue that the former employee’s email files are therefore “not reasonably accessible” because restoring and locating that data on the backup tapes would be burdensome and costly.

You should recognize that this contention rests on a premise about what backup tapes are used for, which is, generally speaking, recovery of data after a catastrophic loss, such as a natural disaster. But what if the opposing party uses backup tapes for purposes other than disaster recovery? What if your opponent’s system is set up in such a way that when an email file goes missing, the company routinely uses the backup tape to restore the data? If that is the case, then your opponent will have a much more difficult time convincing a court that the data source is not reasonably accessible, because the company’s actual business practices make that data source seem a lot more like “nearline” storage (CD-ROMs, external hard drives) than anything else. Why would it be unreasonable for your opponent to restore email data from a backup tape in response to your targeted discovery request if it regularly does the same thing for its own business purposes?

To find out how your opponent treats backup tapes or similar media, serve discovery requests asking for data from its help desk application system (a report, most likely) showing the dates and details of requests for data restoration. The IT help desk at most large companies will track requests for help, IT’s investigation, and the eventual solution. Alternatively, you should notice a corporate representative deposition under Rule 30(b)(6) and ask for information about requests for data restoration from users. If the corporate representative tells you that individual users frequently asked IT for help restoring data that had been accidentally deleted and that IT usually loaded data from backup tapes, that information may be significant in undermining your opponent’s claim that its backup tapes are not reasonably accessible.

You should also be savvy about the attributes of backup tapes. If your opponent claims that it will have to search thousands of tapes to locate the email file of one employee, ask how it reached that conclusion. Even backup tapes that are not externally labeled or indexed may include headers that can be read using a simple scan that would show the backup date and backup software (which could indicate whether the tape contains email or some other data type). Other simple scans may show server-level information. You should ask your opponent what kinds of analysis it has done of the backup tapes to support its contention about the cost and burden of finding the requested data.

Page 16: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

You also should discuss the use of sampling, a compromise that was specifically endorsed in the Federal Rules of Civil Procedure revisions in 2006. The Advisory Committee notes to Rule 26(b)(2)(B) suggest that discovery on the issue of accessibility “might take the form of requiring the responding party to conduct a sampling of information contained on the sources identified as not reasonably accessible . . .” Sampling may involve restoring a few backup tapes selected from different time periods or locations both to determine whether any responsive or truly useful information is likely to be contained on the tapes, and to inform future discussions about cost and burden.

Simply because the data that you seek now resides on a media type that your opponent claims is “not reasonably accessible” does not mean that it has always been so. One line of attack in probing a claim under Rule 26(b)(2)(B) involves finding out when the ESI involved was exiled to its current home (on, say, a backup tape).

All parties have an obligation to preserve data that they reasonably believe is likely to be relevant to pending or anticipated litigation. Although Federal Rule of Civil Procedure 37(e) (formerly (f)) provides a “safe harbor” for destruction of data that occurs pursuant to the “routine, good faith operation of an electronic information system,” the Advisory Committee notes explain that the protections of Rule 37(e) do not mean that a party under a preservation obligation regarding that data may allow an auto-delete system to continue to run unchecked. A party may not allow a routine system operation to destroy all access to a set of data if it is under a duty to preserve that information.

A more complicated situation arises when the data in question was not deleted, but simply moved (or, in IT parlance, “migrated”) from an easily accessible storage media to a less-accessible media, after the preservation obligation arose. For example, what if immediately after a complaint is filed in court, one of the defendant’s employees, who was at the center of the dispute, leaves the company, and his or her email records are removed from the company’s “active” email server? After discovering that the employee’s email is no longer on the server, the company preserves a backup tape made of the email server immediately before the employee left the company. In that case, there probably was no “spoliation,” as the employee’s email still exists. But suppose that the company refuses to produce the email on the basis that it is “not reasonably accessible.”

In factually analogous situations, courts have held that although “downgrading” of data from active to archival or disaster-recovery storage media is not spoliation, the producing party will be unable to shift any of the cost of restoring the archival media so that it can be searched and the data retrieved.21 Therefore, it makes sense to ask questions about where the data that your opponent says is “not reasonably accessible” resided in the recent past, when that data migrated to the less-accessible media, and whether it did so as the result of a routine operation, or as the result of a conscious and specific decision. Although it is unlikely that the answers to questions on this topic will result in data being deemed “reasonably accessible,” it may assist you in arguing that production should be ordered nonetheless under Rule 26(b)(2)(B)’s “good cause” standard and that the producing party should bear the cost.

In the Aubuchon case, the data being sought—static digital images of claim files—were deemed “not reasonably accessible” because those files were not indexed in such a way that

Page 17: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

responsive documents could be identified without the producing party having to manually review each document on the server. The responding party successfully argued that the cost of review for responsiveness was an undue burden. Similarly, in other cases, requests for ESI have been rejected or severely limited by the court where the cost of review for responsiveness (or privilege, or some other concern) was high.

While the cost of reviewing volumes of ESI for privilege or responsiveness is repeatedly cited as one of the worst—if not the worst—side effects of the increasing prominence of electronic discovery, there is no need to blindly accept your opponent’s claims about the cost of performing that review. Instead, take the following steps to explore those claims.

First, discuss with your opponent how it determined the universe of documents that require individual review. Perhaps you have already discussed the use of search terms to allow identification of responsive documents from data sources that the producing party has conceded are reasonably accessible. That is the same kind of conversation you should have about sources that purportedly are not reasonably accessible. Do not allow your opponent to argue that you were unwilling to discuss narrowing the range of data using search terms or concepts, requiring the manual review of every document. The defendants in Petcou v. C.H. Robinson Worldwide, Inc. were able to use that argument to block discovery of company email with “pornographic” or “sexual” content. The email was contained on backup tapes that had to be restored and then reviewed. The Petcou plaintiff would not narrow the scope of the requested data beyond the very broad, and vague, language of the request for production. Because the request would have required defendants to review every email to or from thousands of employees over a six-year time period, and make subjective judgments about what was “pornographic,” on top of incurring the cost of restoring the backup tapes, the court found that the plaintiff could not establish good cause to order the production. Simply talking to your opponent about narrowing search terms or concepts to minimize the burden of a request may help to foreclose a contention that the cost of review renders a source not reasonably accessible.

Second, you also should ask your opponent to give you details about the individual components of its cost estimate and look for line items that simply do not make sense. Is the other party proposing that a team of associates, each billing $300 per hour, perform the review? Has it considered outsourcing review to one of the many companies that will provide contract attorneys to perform review (at a third the cost of big-firm associates) or off-shoring the review at an even lower cost? Is it paying for online hosted review, or is it proposing to use an in-house review tool? What is its vendor proposing to charge for processing, hosting, or production? Is it planning on creating TIFF files of all of the documents prior to review or only those that are selected for production?

The reasonableness of your opponent’s projected cost will depend on the sensitivity of the review, the size of the job, and the resources available to your opponent, all of which the other party should be prepared to share with you and your experts. If your opponent does not share that information with you, it likely will have to share the information with the court.26 If you can use that information to generate cost estimates or bids from your own vendors that are dramatically lower, it may be possible to remove the cost of review as a factor in the accessibility analysis.

Page 18: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

Probing a claim that data is “not reasonably accessible” under Rule 26(b)(2)(B) involves, first, understanding that the rule and the Advisory Committee notes provide a mechanism for resolving such disputes that contemplates discovery on the issue, and, second, asking hard questions of your opponent about the basis for its claim. One overriding trend in court decisions on accessibility issues is to demand that parties disclose to each other, and thoroughly discuss with each other, the details involved in the dispute before they come to court. Those details may be confusing and require the assistance of consultants. However, attorneys owe it to their clients and the courts to diligently pursue negotiated resolution of accessibility issues so that the information that is necessary to resolve each case on its merits can come to light, without unnecessary cost or delay. An added benefit to full disclosure is that if a motion to compel is necessary, an exchange of ESI details will give the parties and the court the information necessary to reach the right decision.

III. METADATA

The new Oregon state court rules provide that the requesting party may designate the form of production. This mimics the federal rules, where there has been extensive litigation over the issue of form of production.

Tied in with the form of production is the issue of metadata. Metadata is the “background” information to any piece of electronic document. Metadata takes several forms. Metadata is fragile and easily altered by mistake. But it can be critical in understanding a document. Many parties resist the production of metadata on the basis that it is unnecessary and not relevant in most cases.

Blanket objections to production of metadata on the basis that it is not relevant miss the point. Metadata allows ESI to be searched, sorted, and categorized. If the metadata is stripped out of ESI when it is produced to the requesting party, the documents are degraded significantly. The producing party retains the ability to sort and search the ESI, for example by creation date, author, edit date, custodian, etc., while the requesting party is left to run (at most) manual searches across the entire data population for dates, names, etc. The result is a significant disparity in the accessibility and utility of the ESI between the producing and requesting parties. Federal Rule of Civil Procedure 34 is specifically intended to eliminate this kind of disparity. As one court recently put it “The advisory committee notes for the 2006 amendments to Rule 34 provide guidance that Defendants' option to produce in a reasonably usable form does not mean that they are free to convert electronically stored information from the form in which it is ordinarily maintained to a different form that makes it more difficult or burdensome for Plaintiff to use the information efficiently in the litigation.” White v. Graceland College, 586 F. Supp. 2d 1250, 1264 (D. Kan. 2008).

Recognizing the importance of metadata to the usability of produced ESI, the leading think-tank on ESI issues, The Sedona Conference Working Group 1, revised its Principle 12 to provide as follows:

Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form,

Page 19: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and the needs of the case.

The Sedona Principles-Second Edition: Best Practices Recommendations and Principles for Addressing Electronic Document Production Principle 12 (Sedona Conference Working Group Series 2007), http:// www. thesedona conference. org/ content/ misc Files/ TSC_ PRINCP_ 2nd _ ed_ 607. pdf (“Sedona Principles 2d” ). The Sedona Principles 2d, and in particular Principle 12 and its comments have been relied on by many courts on the issue of production of metadata. See, e.g., Aguilar v. Immigration & Customs Enforcement Div., 255 F.R.D. 350, 355-57 (S.D. N.Y. 2008). We have no doubt that Judge Stewart would follow suit.

As observed by Judge Maas in Aguilar, courts have “generally ordered the production of metadata when it is sought in the initial document request and the producing party has not yet produced the documents in any form.” Aguilar, 255 F.RD. at 357 (collecting cases). Indeed, Invacare’s position mirrors one of the cases discussed in Aguilar. In Hagenbuch v. v. 3B6 Sistemi Elettronici Industriali S.R.L., 2006 WL 665005 (N.D. Ill. Mar. 8, 2006), a case decided before the 2006 revisions to Rule 34, the defendant, over the plaintiff’s protest, converted all ESI to TIFF images without metadata as part of its production. Id. at *3. The plaintiff moved to compel production in native format. Id. The court sided with plaintiff, noting that the metadata “will allow [plaintiff] to piece together the chronology of events and figure out, among other things, who received what information and when.” Id., at *3.

The relevance or admissibility of metadata is really not the issue when a party requests production of metadata, as the commentary in the Sedona Principles 2d makes clear. The metadata is part of the evidence in the producing party’s possession, as it is kept in the ordinary course of business; it is therefore erroneous to conduct a separate “admissibility” inquiry for a document’s metadata. If the document itself is discoverable, the document must be treated as a whole, metadata included. The issue then becomes whether the producing party may produce only part of the document, degrading its characteristics. Clearly, the rules do not permit the producing party to degrade data in this manner.

Some may propose that running optical character recognition on images is an adequate solution to make electronic documents searchable by the requesting party. OCR is not a substitute for extracted metadata. First, OCR is not 100% accurate. Second, while OCR allows a search of a document, it only allows a search of what the OCR program “sees” in the TIFF image. If any particular piece of information is not reproduced in the TIFF image then an OCR search will not pick it up. Third, different pieces of data will reproduce differently in the TIFF imaging process, meaning that a search using a standard format may not “hit” on all responsive information. Finally, and most importantly, OCR does not allow documents to be sorted and organized by the requesting party according to metadata characteristics, while of course the producing party retains that ability because it has access to the data in native format.

Page 20: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

The recent case of In re Netbank Inc. Securities Litigation, No. 1:07-CV-2298-BBM, 2009 WL 2461036, *22 (N. D. Ga. Aug. 7, 2009), demonstrates the point. In Netbank the plaintiff demanded production in native format in order to be able to “1) determine the identity of the author and editors of the documents; (2) determine the creation and modification dates of the documents; (3) determine whether the documents have attachments; and (4) identify, sort, search or filter documents.” Id. The defendant insisted that TIFF production with the ability to OCR the TIFFs would satisfy the plaintiff’s concerns. Id. The court rejected defendant’s position, and ordered production in native format, principally on the basis that the defendant had only offered “hypothetical problems” with native production. Id. Although the court did not discuss the inadequacy of OCR specifically, implicitly the court rejected the defendant’s contention that OCR of TIFF was an adequate solution.

So, if you have the capability of using metadata to search and review ESI, ask for it. Most commonly, metadata is requested to be included in the “load file” produced by the other side. Negotiations sometimes occur over which metadata fields should be included – each type of software generates different metadata. Make sure that you insist on getting the metadata fields that are going to be most useful to your document review.

Page 21: MBA October 26, 2010 CLE - E-Discovery in State Court - Seth Row Materials

IV. PROPORTIONALITY

The Sedona Conference Working Group 1 has recently published a very influential policy guidance work called the Sedona Conference Commentary on Proportionality in Electronic Discovery. The paper was intended to address a very common complaint about electronic discovery, which is that it is vastly too expensive particularly in the context of average-size and smaller cases, such as those that make up the bulk of the civil docket in Oregon state courts.

In order to provide guidance to courts and litigants about what limits should be placed on

electronic discovery, the Working Group developed the following principles. The Sedona Conference® Principles of Proportionality 1. The burdens and costs of preservation of potentially relevant information should be weighed against the potential value and uniqueness of the information when determining the appropriate scope of preservation. 2. Discovery should generally be obtained from the most convenient, least burdensome, and least expensive sources. 3. Undue burden, expense, or delay resulting from a party’s action or inaction should be weighed against that party. 4. Extrinsic information and sampling may assist in the analysis of whether requested discovery is sufficiently important to warrant the potential burden or expense of its production. 5. Nonmonetary factors should be considered when evaluating the burdens and benefits of discovery. 6. Technologies to reduce cost and burden should be considered in the proportionality analysis.