Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://feeds.lexblog.com/E-discoveryLawReview

  1. <?xml version="1.0" encoding="utf-8"?>
  2. <rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
  3.   <channel>
  4.      <title>E-Discovery Law Review</title>
  5.      <link>http://www.ediscoverylawreview.com/</link>
  6.      <description>Electronic Discovery Lawyers &amp; Attorneys : Cozen O&apos;Connor Law Firm : Data Preservation &amp; E-Discovery Disputes</description>
  7.      <language>en</language>
  8.      <copyright>Copyright 2013</copyright>
  9.      <lastBuildDate>Thu, 26 Sep 2013 09:35:22 -0800</lastBuildDate>
  10.      <pubDate>Thu, 26 Sep 2013 09:35:22 -0800</pubDate>
  11.      <generator>http://www.movabletype.org</generator>
  12.      <docs>http://blogs.law.harvard.edu/tech/rss</docs>
  13.  
  14.            <item>
  15.         <title>Connecticut Appellate Court Dismisses Appeal of Discovery Order Finding that the Order Did Not Constitute a Final Judgment</title>
  16.         <description><![CDATA[<p>&nbsp;<img alt="" align="left" width="75" height="101" src="http://www.ediscoverylawreview.com/uploads/image/Hard drive stethoscope.jpg" /></p>
  17. <p style="margin: 12pt 0in 0pt">In <i>Radzick v. Connecticut Children&rsquo;s Medical Center</i>, No. 34952, 2013 Conn. App. LEXIS 454 (Conn. App. Ct. Sept. 17, 2013) the Connecticut Appellate Court dismissed defendant Connecticut Children&rsquo;s Medical Center&rsquo;s (&ldquo;CCMC&rdquo;) appeal of a trial court discovery order.&nbsp;Francisco A. Sylvester, an employee of CCMC, treated Jonathan Radzick, a minor, for Chron&rsquo;s disease.&nbsp;Sylvester prescribed Remicade as part of his treatment of Jonathan and Jonathan died from T-cell lymphoma.&nbsp;Paul Radzick, plaintiff and administrator of Jonathan Radzick&rsquo;s estate, brought suit, alleging that Sylvester knew that Remicade&rsquo;s manufacturer had circulated warnings about fatal T-cell lymphoma and that Sylvester failed to obtain parental permission to prescribe Remicade for Jonathan.</p>
  18. <p style="text-indent: 0.5in; margin: 12pt 0in 0pt">In discovery, plaintiff sought to determine what Sylvester knew about Remicade and when.&nbsp;Specifically, plaintiff wanted to search three computers Sylvester had access to during the time he treated Jonathan.&nbsp;The discovery dispute centered around electronically stored information (&ldquo;ESI&rdquo;) on those three computers.&nbsp;On July 19, 2012, the trial court granted plaintiff&rsquo;s motion to compel and ordered plaintiff be permitted to image the hard drives of the three personal computers Sylvester had used, and that their contents be forensically examined.&nbsp;The court addressed defendant&rsquo;s concern that the computers contained confidential patient information and private information from use by Sylvester&rsquo;s family members by requiring that anyone involved with imaging or investigating the computers sign a protective order.&nbsp;The court also required that the forensic investigation of the computers be conducted by an independent forensic consultant who would be hired and supervised by a discovery master.&nbsp;Sylvester appealed.</p>
  19. <p style="text-indent: 0.5in; margin: 12pt 0in 0pt">The appellate court looked to the two prong test in <i>State v. Curcio</i>, 191 Conn. 27, 463 A.2d 566 (1983) to determine if the July 19, 2012 discovery order was an appealable final judgment.&nbsp;Under <i>Curcio</i>, in order to be appealable, the order must satisfy at least one of these two prongs: (1) the ruling must terminate &ldquo;a separate and distinct proceeding,&rdquo; or (2) the ruling must so conclude &ldquo;the rights of the parties that further proceedings cannot affect them.&rdquo;</p>
  20. <p style="text-indent: 0.5in; margin: 12pt 0in 0pt">The Court of Appeals rejected Sylvester&rsquo;s argument that the July 19, 2012 order was akin to other discovery orders that met the first prong in which discovery orders directed at nonparties authorized public disclosure of confidential information.&nbsp;However, the July 19, 2012 order was directed at Sylvester, a party, and protected confidential information of nonparties that may be on his computers by appointing a discovery master and including an in camera review before any information was to be disseminated.</p>
  21. <p style="text-indent: 0.5in; margin: 12pt 0in 0pt">The appellate court held that the July 19, 2012 order also did not meet the second prong, reasoning that the rights of the defendants are not &ldquo;irretrievably lost&rdquo; because of the order.&nbsp;In fact, the rights of the defendants may never even be compromised because of the safeguards in the order.&nbsp;The court dismissed the appeal.</p>
  22. <p style="text-indent: 0.5in; margin: 12pt 0in 0pt">This case serves as a reminder of the potential importance ESI can play in the outcome of a case and of the importance of maintaining proper ESI retention and production protocols.</p>]]></description>
  23.         <link>http://www.ediscoverylawreview.com/2013/09/articles/connecticut-appellate-court-dismisses-appeal-of-discovery-order-finding-that-the-order-did-not-constitute-a-final-judgment/</link>
  24.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2013/09/articles/connecticut-appellate-court-dismisses-appeal-of-discovery-order-finding-that-the-order-did-not-constitute-a-final-judgment/</guid>
  25.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  26.         <pubDate>Thu, 26 Sep 2013 01:25:38 -0800</pubDate>
  27.         <dc:creator>Thomas M. Jones</dc:creator>
  28.      
  29.      </item>
  30.            <item>
  31.         <title>How Will Proposed Changes to Federal e-Discover Rules Affect Your Practice?</title>
  32.         <description><![CDATA[<p>The Federal Rules of Civil Procedure (Rules) may change the case management, scope, and sanctions related to e-discovery in federal courts, starting in late 2015.&nbsp;Proposed changes seek to encourage early and active case management, ensure proportionality in e-discovery, and advance cooperation among parties.&nbsp;</p>
  33. <p style="margin: 12pt 0in 0pt">The Committee on Rules of Practice and Procedure made draft versions of these rules available for public comment through February 15, 2014.&nbsp;The proposed changes to the Rules as related to e-discovery are summarized in <a href="http://www.cozen.com/news-resources/publications/2013/proposed-changes-to-federal-e-discovery-rules"><font color="#0000ff">this Alert</font></a>, and all of the proposed changes are available <a href="http://www.uscourts.gov/uscourts/rules/preliminary-draft-proposed-amendments.pdf"><font color="#0000ff">here</font></a>.</p>
  34. <p style="margin: 12pt 0in 0pt">These changes may impact your practice, positively or negatively, depending on who you represent and the nature of the cases you try.&nbsp;Therefore we strongly encourage you to <a href="http://www.uscourts.gov/RulesAndPolicies/rules/proposed-amendments.aspx"><font color="#0000ff">submit comments</font></a> prior to the February 15 deadline, or to participate in one of the three public hearings on the proposed rules (Washington, D.C., on November 7, 2013; Phoenix on January 9, 2014; or Dallas on February 7, 2014).</p>]]></description>
  35.         <link>http://www.ediscoverylawreview.com/2013/09/articles/how-will-proposed-changes-to-federal-ediscover-rules-affect-your-practice/</link>
  36.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2013/09/articles/how-will-proposed-changes-to-federal-ediscover-rules-affect-your-practice/</guid>
  37.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">Federal</category><category domain="http://www.ediscoverylawreview.com/tags">Procedure</category><category domain="http://www.ediscoverylawreview.com/tags">Public</category><category domain="http://www.ediscoverylawreview.com/articles">Sanctions</category><category domain="http://www.ediscoverylawreview.com/tags">case</category><category domain="http://www.ediscoverylawreview.com/tags">civil</category><category domain="http://www.ediscoverylawreview.com/tags">comment</category><category domain="http://www.ediscoverylawreview.com/tags">cooperation</category><category domain="http://www.ediscoverylawreview.com/tags">eDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">management</category><category domain="http://www.ediscoverylawreview.com/tags">of</category><category domain="http://www.ediscoverylawreview.com/tags">preservation</category><category domain="http://www.ediscoverylawreview.com/tags">proportionality</category><category domain="http://www.ediscoverylawreview.com/tags">rules</category>
  38.         <pubDate>Thu, 05 Sep 2013 10:22:00 -0800</pubDate>
  39.         <dc:creator>Scott Galla</dc:creator>
  40.      
  41.      </item>
  42.            <item>
  43.         <title>Google Invited to the Apple v. Samsung Discovery Dispute:  Court Orders Third Party Google to Produce Search Terms and Custodians used to Respond to Apple&apos;s Requests for Production</title>
  44.         <description><![CDATA[<p>&nbsp;</p>
  45. <p>by Terri A. Thomas</p>
  46. <p style="text-align: justify; margin: 12pt 0in 0pt">In the continuing patent infringement saga between Plaintiff Apple, Inc. (&ldquo;Apple&rdquo;) and Defendants Samsung Electronics Co., Ltd., Samsung Electronics America, Inc., and Samsung Telecommunications America, LLC (collectively &ldquo;Samsung&rdquo;), Magistrate Judge Paul S. Grewal of the District Court of Northern California ordered third party Google, Inc. (&ldquo;Google&rdquo;) to produce a list of the search terms and custodians Google used to respond to Apple&rsquo;s requests for production.&nbsp;Case No. 12-CV-0630-LHK (PSG), Dkt. 501, filed May 9, 2013.</p>
  47. <p style="text-align: justify; margin: 12pt 0in 0pt">Apple was not, in the present motion, seeking to compel additional discovery from Google, nor was it opposing Google&rsquo;s objections to Apples requests; Apple sought only to know &ldquo;how Google created the universe from which it produced documents&rdquo; in order to &ldquo;evaluate the adequacy of [its] search&rdquo;.&nbsp;Google initially objected based on attorney-client privilege and work-product grounds, though recognized that &ldquo;courts generally have not found protection for that type of information.&rdquo;&nbsp;<i>See Formfactor, Inc. v. Micro-Probe, Inc.</i>, Case No. C-10-03095 PJH (JCS), 2012 U.S. Dist. LEXIS 62233, 2012 WL 1575093, at *7 n.4 (N.D. Cal. May 3. 2012) (listing cases explaining why search terms are not work product).&nbsp;The court considered Google&rsquo;s complaint that &ldquo;the impact of requiring non-parties to provide complete &lsquo;transparency&rsquo; into their search methodology and custodians in responding to non-party subpoenas whenever unsubstantiated claims of production deficiencies are made would be extraordinary&rdquo;, and that providing its list of search terms and custodians would open it to further burdensome discovery by Apple.</p>
  48. <p style="text-align: justify; margin: 12pt 0in 0pt">The court cites to <i>The Sedona Conference Cooperation Proclamation</i> (The Sedona Conference, Preface (Nov. 2012)) and the principles of &ldquo;cooperative, collaborative, and transparent discovery&rdquo;, and relies heavily on Judge Nolan&rsquo;s holding in <i>DeGeer v. Gillis</i>, wherein Her Honor stated that &ldquo;[t]he proper and most efficient course of action would have been agreement by [the third party and the defendants] as to search terms and data custodians prior to [the third party&rsquo;s] electronic document retrieval.&rdquo;&nbsp;755 F. Supp. 2d 909 (N.D. Ill. 2010).&nbsp;</p>
  49. <p style="text-align: justify; margin: 12pt 0in 0pt">The court ultimately held that &ldquo;transparency and collaboration is essential to meaningful, cost-effective discovery&rdquo;, and such policies apply equally to parties and third-parties alike, and ordered Google to produce its search terms and custodians to Apple.</p>
  50. <p style="text-align: justify; margin: 12pt 0in 0pt">This case makes clear that search terms and custodians are not protected work product.&nbsp;If a third-party has to disclose search terms and custodians, certainly parties to litigation will have to do so.&nbsp;Courts are continuing to require greater transparency in the discovery process, and requesting and producing parties would be well-served in cooperating and attempting to reach agreement on search terms and custodians early in the discovery planning process.</p>]]></description>
  51.         <link>http://www.ediscoverylawreview.com/2013/05/articles/google-invited-to-the-apple-v-samsung-discovery-dispute-court-orders-third-party-google-to-produce-search-terms-and-custodians-used-to-respond-to-apples-requests-for-production/</link>
  52.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2013/05/articles/google-invited-to-the-apple-v-samsung-discovery-dispute-court-orders-third-party-google-to-produce-search-terms-and-custodians-used-to-respond-to-apples-requests-for-production/</guid>
  53.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  54.         <pubDate>Thu, 23 May 2013 14:24:59 -0800</pubDate>
  55.         <dc:creator>Thomas M. Jones</dc:creator>
  56.      
  57.      </item>
  58.            <item>
  59.         <title>U.S. District Court for the Northern District of California Adopts New Electronic Discovery Guidelines Effective November 27, 2012</title>
  60.         <description><![CDATA[<p><strong><span style="font-size: small">by Terri A. Thomas</span></strong></p>
  61. <p style="text-align: justify; margin: 12pt 0in 0pt"><span style="font-size: small">The U.S. District Court for the Northern District of California unanimously adopted new guidelines regarding the discovery of electronically stored information (&ldquo;ESI&rdquo;).&nbsp;The guidelines are tools &ldquo;designed to promote cooperative e-discovery planning&nbsp;.&nbsp;.&nbsp;.&nbsp;that is tailored and proportionate to the needs of [a] particular case.&rdquo;&nbsp;The Court released:</span></p>
  62. <p style="text-align: justify; margin: 12pt 0in 0pt 0.25in"><span style="font-size: small">&middot;<span style="font: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>Guidelines for the Discovery of Electronically Stored Information (&ldquo;ESI Guidelines&rdquo;);</span></p>
  63. <p style="text-align: justify; margin: 12pt 0in 0pt 0.25in"><span style="font-size: small">&middot;<span style="font: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>An ESI checklist for use during the Rule 26(f) meet and confer process; and</span></p>
  64. <p style="text-align: justify; margin: 12pt 0in 0pt 0.25in"><span style="font-size: small">&middot;<span style="font: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>A Model Stipulated Order Re:&nbsp;the Discovery of Electronically Stored Information.</span></p>
  65. <p style="text-align: justify; text-indent: 0in; margin: 12pt 0in 0pt"><span style="font-size: small">These documents are available in full at http://www.cand.uscourts.gov/eDiscoveryGuidelines</span></p>
  66. <p style="text-align: justify; text-indent: 0in; margin: 12pt 0in 0pt"><span style="font-size: small">In addition, as part of the Joint Case Management Statements filed by the parties pursuant to Civil Local Rule 16-9, the parties must certify that they have each reviewed the ESI Guidelines and confirm that the parties have met and conferred pursuant to Fed. R. Civ. P. 26(f) regarding reasonable and proportionate steps taken to preserve evidence relevant to the issues reasonably evident in the action.</span></p>
  67. <p style="text-align: justify; text-indent: 0in; margin: 12pt 0in 0pt"><span style="font-size: small">The ESI Guidelines were developed to &ldquo;encourage reasonable electronic discovery with the goal of limiting the cost, burden and time spent, while ensuring that information subject to discovery is preserved and produced to allow for fair adjudication of the merits.&rdquo;&nbsp;Most notably, the ESI Guidelines expressly adopt the proportionality standards articulated in Fed. R. Civ. P. 26(b)(2)(C) and 26(g)(1)(B)(iii) and apply it to preservation obligations.&nbsp;ESI Guidelines 1.03; 2.01.&nbsp;The ESI Guidelines also encourage cooperation between the parties, beginning at the early stages of discovery, and the appointment of e-discovery liaisons who are versed in the technical aspects of e-discovery for the respective parties. </span></p>
  68. <p style="text-align: justify; text-indent: 0in; margin: 12pt 0in 0pt"><span style="font-size: small">In an effort to aid in and further encourage cooperation between the parties, the Court created a Rule 26(f) checklist for use during the meet and confer process, which highlights the relevant areas the Court believes parties should be addressing at the 26(f) stage relative to ESI.&nbsp;This includes designation of information that &ldquo;the party believes could contain relevant information but [] has determined, under the proportionality factors, should not be preserved.&rdquo;</span></p>
  69. <p style="text-align: justify; text-indent: 0in; margin: 12pt 0in 0pt"><span style="font-size: small">Finally, the Court drafted a Model Stipulated Order.&nbsp;The Model Order specifically calls for the parties to identify the dates and custodians for whom ESI is to be preserved, with the caveat that custodians may be added or removed as reasonably necessary.&nbsp;The Model Order also requires the party to designate relevant information, which, because of proportionality standards, will not be preserved.&nbsp;Additionally, the Model Order calls for the parties to agree on the production format and any phasing of discovery, and includes a Fed. R. Evid. 502(d) agreement that production of privileged and work-product documents will not constitute a waiver of such privilege(s).&nbsp;Of course, as this is a Model Order, the Court indicates in the Model Order itself its willingness to modify the Order by Stipulation of the parties or good cause.</span></p>
  70. <p><span style="font-size: small">In adopting the ESI Guidelines and Model Order, the Court attempts to provide some measure of clarity to parties of their preservation obligations; however, at least initially, this is based largely on cooperation and agreement between the parties.&nbsp;Still, such Model Orders and Guidelines are an important step in ensuring early communication of e-discovery issues.</span></p>]]></description>
  71.         <link>http://www.ediscoverylawreview.com/2012/12/articles/us-district-court-for-the-northern-district-of-california-adopts-new-electronic-discovery-guidelines-effective-november-27-2012/</link>
  72.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/12/articles/us-district-court-for-the-northern-district-of-california-adopts-new-electronic-discovery-guidelines-effective-november-27-2012/</guid>
  73.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">ESI</category><category domain="http://www.ediscoverylawreview.com/tags">courts</category><category domain="http://www.ediscoverylawreview.com/tags">discovery</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery</category><category domain="http://www.ediscoverylawreview.com/tags">eDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">electronically stored information</category>
  74.         <pubDate>Mon, 17 Dec 2012 07:35:17 -0800</pubDate>
  75.         <dc:creator>Mike Zabel</dc:creator>
  76.      
  77.      </item>
  78.            <item>
  79.         <title>Judge Orders Parties to Keep it &quot;Kleen&quot;</title>
  80.         <description><![CDATA[<p><img hspace="5" alt="" vspace="5" align="left" width="179" height="250" src="http://www.ediscoverylawreview.com/uploads/image/shutterstock_7428088.jpg" />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The first rule of successful lawyering is that one must be a zealous advocate for his or her client.&nbsp;While this mantra is essential to best practice, it should not be followed to the exclusion of traditional trial etiquette.&nbsp;This was the message propounded by the Honorable Nan R. Nolan of the United States District Court for the Northern District of Illinois in her recent order calling for collaboration and cooperation during eDiscovery.&nbsp;</p>
  81. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In <i>Kleen Products, LLC v. Packaging Corp. of America</i>, Plaintiffs brought a class action suit against manufacturers of containerboard charging antitrust violations under Section 1 of the Sherman Act.&nbsp;The first of many disputes in the litigation concerned the use of predictive coding technology, a form of computer-assisted review used to aid document search and production.&nbsp;Plaintiffs sparked this debate when they asked Judge Nolan to order Defendants to revamp their system of production to employ a specific kind of content-based analytics. &nbsp;Judge Nolan signed a joint Stipulation and Order in August, in which Plaintiffs agreed to withdraw their demand that Defendants apply this particular methodology with respect to any requests for production served prior to October 1, 2013. &nbsp;</p>
  82. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In response to the current flood of motions pertaining to interrogatories and document requests, Judge Nolan&rsquo;s order emphasizes cooperation and proportionality, quoting the Sedona Conference&rsquo;s Cooperation Proclamation at the outset: &ldquo;Lawyers have twin duties of loyalty: While they are retained to be zealous advocates for their clients, they bear a professional obligation to conduct discovery in a diligent and candid manner. . . . Cooperation does not conflict with the advancement of their clients' interests&mdash;it enhances it.&rdquo;&nbsp;These words of wisdom were directed predominantly at Plaintiffs&rsquo; most recent set of interrogatories, which, according to Judge Nolan, &ldquo;violated the spirit of cooperation that this Court has encouraged.&rdquo;&nbsp;Only three days after one of the defendants, Georgia Pacific, went above and beyond to produce certain requested information pertaining to individuals within its corporate structure who had received the litigation hold notice, Plaintiffs issued a Sixth Set of Interrogatories demanding extensive background information on each person identified.&nbsp;Judge Nolan referred to the proportionality standards of FRCP 26(b)(2)(C)(iii) in granting Georgia Pacific&rsquo;s motion for a protective order.</p>
  83. <p style="margin: 12pt 0in 0pt"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Judge Nolan did, however, grant Plaintiffs&rsquo; motion to compel the production of additional document custodians directed at two particular defendants, concluding that &ldquo;in an antitrust case such as this, Plaintiffs are at least entitled to a sample of lower-level and plant-level employees to determine if they possess significant and non-duplicative information.&rdquo;&nbsp;Judge Nolan stated that while certain production requests can be found to violate the proportionality standards of FRCP 26(b)(2)(C), the party objecting to discovery must provide specific evidence to demonstrate the burden, which the defendants here failed to do.</span></p>
  84. <p style="margin: 12pt 0in 0pt"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Judge Nolan capped off the final order of her judicial career with some parting guidance to the parties, as well as the legal community at large, regarding eDiscovery propriety and protocol: </span></p>
  85. <p style="text-align: justify; margin: 0in 0.5in 0pt">&nbsp;</p>
  86. <p style="text-align: justify; margin: 0in 0.5in 0pt">First, the approach should be started early in the case. It is difficult or impossible to unwind procedures that have already been implemented. Second, in multiple party cases represented by separate counsel, it may be beneficial for liaisons to be assigned to each party. Finally, to the extent possible, discovery phases should be discussed and agreed to at the onset of discovery.<span>&nbsp;&nbsp;&nbsp;&nbsp; </span></p>
  87. <p style="text-align: justify; margin: 0in 0.5in 0pt">&nbsp;</p>
  88. <p style="margin: 0in 0in 0pt"><i>Kleen Products</i> instructs that practitioners should take heed of Judge Nolan&rsquo;s suggestions and attempt to comply with the spirit of collaborative and proportional eDiscovery. While zealous advocacy remains a hallmark of legal representation, vigorous client activism and cooperative litigation are certainly not mutually exclusive.</p>]]></description>
  89.         <link>http://www.ediscoverylawreview.com/2012/11/articles/judge-orders-parties-to-keep-it-kleen/</link>
  90.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/11/articles/judge-orders-parties-to-keep-it-kleen/</guid>
  91.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">Class action</category><category domain="http://www.ediscoverylawreview.com/tags">coding</category><category domain="http://www.ediscoverylawreview.com/tags">discovery request</category><category domain="http://www.ediscoverylawreview.com/tags">eDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">predictive</category><category domain="http://www.ediscoverylawreview.com/tags">production</category><category domain="http://www.ediscoverylawreview.com/tags">proportionality</category>
  92.         <pubDate>Wed, 07 Nov 2012 09:48:00 -0800</pubDate>
  93.         <dc:creator>Dylan Alper</dc:creator>
  94.      
  95.      </item>
  96.            <item>
  97.         <title>Pennsylvania Supreme Court to Address Admissibility of Text Messages as Evidence</title>
  98.         <description><![CDATA[<p>&nbsp;<em>This piece was first published on the blog <a href="http://www.fromthesidebar.com">From the Sidebar</a>&nbsp;and is reprinted with permission.</em></p>
  99. <p style="line-height: 13.5pt; margin: 0in 0in 7.5pt; background: white; vertical-align: baseline"><span style="color: #555555; font-size: 10pt">By Hayes Hunt and Michael Zabel</span></p>
  100. <p style="line-height: 13.5pt; widows: 2; margin: 0in 0in 0pt; outline-style: none; outline-color: invert; outline-width: 0px; orphans: 2; background: white; vertical-align: baseline; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px"><span style="color: #555555; font-size: 10pt"><img hspace="12" alt="" align="left" width="125" height="83" src="http://www.fromthesidebar.com/text%20message.jpg" />Today, oral argument will be heard in </span><em><span style="border-bottom: windowtext 1pt; border-left: windowtext 1pt; padding-bottom: 0in; padding-left: 0in; padding-right: 0in; color: #555555; font-size: 10pt; border-top: windowtext 1pt; border-right: windowtext 1pt; padding-top: 0in"><a href="http://www.applieddiscovery.com/ws_display.asp?filter=Case%20Summaries%20Detail&amp;item_id=%7BAF12893F-44BC-445D-91CD-2ACBD54711F0%7D"><span style="color: #c7062a; text-decoration: none; text-underline: none">Commonwealth v. Koch</span></a></span></em><span style="color: #555555; font-size: 10pt">, a case in which the Pennsylvania Supreme Court is confronted with a question that is increasingly important: When to admit a text message into evidence at trial?</span>&nbsp;</p>
  101. <p style="text-align: justify; line-height: 13.5pt; widows: 2; margin: 0in 0in 0pt; outline-style: none; outline-color: invert; outline-width: 0px; orphans: 2; background: white; vertical-align: baseline; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px"><span style="color: #555555; font-size: 10pt">The question matters because electronic messaging &ndash; such as text messages or instant messages &ndash; is a significant and growing source of potential evidence. In 2010, an estimated&nbsp;<a style="outline-style: none; outline-color: invert; outline-width: 0px" href="http://www.itu.int/net/pressoffice/press_releases/2010/39.aspx"><span style="border-bottom: windowtext 1pt; border-left: windowtext 1pt; padding-bottom: 0in; padding-left: 0in; padding-right: 0in; color: #c7062a; border-top: windowtext 1pt; border-right: windowtext 1pt; text-decoration: none; padding-top: 0in; text-underline: none">6.1 trillion text messages</span></a>&nbsp;were sent (that&rsquo;s over 200,000 messages&nbsp;</span><em style="outline-style: none; outline-color: invert; outline-width: 0px"><span style="border-bottom: windowtext 1pt; border-left: windowtext 1pt; padding-bottom: 0in; padding-left: 0in; padding-right: 0in; color: #555555; font-size: 10pt; border-top: windowtext 1pt; border-right: windowtext 1pt; padding-top: 0in">per second</span></em><span style="color: #555555; font-size: 10pt">). Attorneys now realize that a key piece of evidence is an exchange of text or instant messages instead of an e-mail or an old-fashioned letter.</span></p>
  102. <p style="text-align: justify; line-height: 13.5pt; widows: 2; margin: 0in 0in 0pt; outline-style: none; outline-color: invert; outline-width: 0px; orphans: 2; background: white; vertical-align: baseline; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px"><span style="color: #555555; font-size: 10pt">When seeking to introduce a text or instant message at trial, one of the biggest evidentiary hurdles is establishing authenticity. (<a style="outline-style: none; outline-color: invert; outline-width: 0px" href="http://federalevidence.com/rules-of-evidence#Rule901"><span style="border-bottom: windowtext 1pt; border-left: windowtext 1pt; padding-bottom: 0in; padding-left: 0in; padding-right: 0in; color: #c7062a; border-top: windowtext 1pt; border-right: windowtext 1pt; text-decoration: none; padding-top: 0in; text-underline: none">FRE 901</span></a>). State and federal courts across the country have been applying FRE 901 and its state rule equivalents to text and instant messages.</span></p>
  103. <p style="text-align: justify; line-height: 13.5pt; widows: 2; margin: 0in 0in 0pt; outline-style: none; outline-color: invert; outline-width: 0px; orphans: 2; background: white; vertical-align: baseline; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px"><span style="color: #555555; font-size: 10pt">How do you show that a text message from Joe Smith is a text message from Joe Smith?&nbsp;<img hspace="12" alt="" align="right" width="75" height="107" src="http://www.fromthesidebar.com/pen.jpg" />&nbsp;The &nbsp;answer is not as simple as &ldquo;it came from Smith&rsquo;s phone number.&rdquo;&nbsp; This is no different than what is required to authenticate a handwritten letter.&nbsp; A letter from Mary Jones may bear her signature, but that signature could be forged.&nbsp; A court would likely require the proponent produce something beyond the letter itself as evidence such as a witness who could identify her signature.</span></p>
  104. <p style="text-align: justify; line-height: 13.5pt; widows: 2; margin: 0in 0in 0pt; outline-style: none; outline-color: invert; outline-width: 0px; orphans: 2; background: white; vertical-align: baseline; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px"><span style="color: #555555; font-size: 10pt">Similarly, the developing case law across the country says that something more is needed for text messages and instant messages.&nbsp; Federal and state courts are grappling with the question of what that &ldquo;something more&rdquo; can be.&nbsp; Most commonly (and unsurprisingly), courts favor authentication by means of testimony from either the sender or recipient of the message (</span><em style="outline-style: none; outline-color: invert; outline-width: 0px"><span style="border-bottom: windowtext 1pt; border-left: windowtext 1pt; padding-bottom: 0in; padding-left: 0in; padding-right: 0in; color: #555555; font-size: 10pt; border-top: windowtext 1pt; border-right: windowtext 1pt; padding-top: 0in"><a style="outline-style: none; outline-color: invert; outline-width: 0px" href="http://caselaw.findlaw.com/ny-supreme-court-appellate-division/1604136.html"><span style="color: #c7062a; text-decoration: none; text-underline: none">People v. Agudelo</span></a></span></em><span style="color: #555555; font-size: 10pt">).&nbsp; In&nbsp;</span><em style="outline-style: none; outline-color: invert; outline-width: 0px"><span style="border-bottom: windowtext 1pt; border-left: windowtext 1pt; padding-bottom: 0in; padding-left: 0in; padding-right: 0in; color: #555555; font-size: 10pt; border-top: windowtext 1pt; border-right: windowtext 1pt; padding-top: 0in">Koch</span></em><span style="color: #555555; font-size: 10pt">, the Superior Court held that the text messages at issue were not properly authenticated because there was no confirming testimony from the senders or recipients of the disputed messages and no contextual clues within the messages themselves that revealed the identity of the sender. Interestingly, the court also rejected the idea that the defendant&rsquo;s physical proximity to the cell phone when it was seized was probative of the defendant&rsquo;s authorship of the text messages made days or weeks earlier.</span></p>
  105. <p style="text-align: justify; line-height: 13.5pt; widows: 2; margin: 0in 0in 7.5pt; outline-style: none; outline-color: invert; outline-width: 0px; orphans: 2; background: white; vertical-align: baseline; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px"><span style="color: #555555; font-size: 10pt"><img hspace="12" alt="" align="left" width="125" height="91" src="http://www.fromthesidebar.com/textmessage.jpg" />It will be interesting to see whether the Pennsylvania Supreme Court agrees with the lower court&rsquo;s analysis or opts for a different standard of authentication.&nbsp; Regardless of the court&rsquo;s answer, however, the safest way to get a text or instant message admitted into evidence will be to produce the sender or recipient of that message at trial.</span></p>]]></description>
  106.         <link>http://www.ediscoverylawreview.com/2012/10/articles/pennsylvania-supreme-court-to-address-admissibility-of-text-messages-as-evidence/</link>
  107.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/10/articles/pennsylvania-supreme-court-to-address-admissibility-of-text-messages-as-evidence/</guid>
  108.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">admissibility</category><category domain="http://www.ediscoverylawreview.com/tags">admissible</category><category domain="http://www.ediscoverylawreview.com/tags">cell phone</category><category domain="http://www.ediscoverylawreview.com/tags">cellular phone</category><category domain="http://www.ediscoverylawreview.com/tags">eDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">electronic communication</category><category domain="http://www.ediscoverylawreview.com/tags">evidence</category><category domain="http://www.ediscoverylawreview.com/tags">instant messages</category><category domain="http://www.ediscoverylawreview.com/tags">text messages</category>
  109.         <pubDate>Tue, 16 Oct 2012 05:25:32 -0800</pubDate>
  110.         <dc:creator>Mike Zabel</dc:creator>
  111.      
  112.      </item>
  113.            <item>
  114.         <title>Social Media Login and Password Discovery Requests: A Useful Tool in the Quest for Truth or an Invasion of Privacy?  One Pennsylvania Court Helps Navigate the Debate</title>
  115.         <description><![CDATA[<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The July 5, 2012 decision of the Allegheny County Court of Common Pleas in <i>Trail v. Lesko</i> explores the legal landscape relating to the scope of discovery of social media.&nbsp;</p>
  116. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Judge Wettick spends the majority of the <i>Lesko</i> opinion laying the groundwork for his holding. &nbsp;The opinion begins with an introduction to <i>Facebook</i> and social networking sites, followed by a synopsis of nine Pennsylvania cases where the discoverability of social media was at issue (many of which were reviewed <span style="font-size: larger"><a href="http://www.ediscoverylawreview.com/tags/facebook/">here</a></span>) <img alt="" align="right" style="width: 171px; height: 122px" src="http://www.ediscoverylawreview.com/uploads/image/shutterstock_72840718(4).jpg" />and an overview of the law in other jurisdictions.&nbsp; He notes that the &ldquo;consistent train of reasoning&rdquo; found in the case law is to require the party seeking discovery to point to facts suggesting that relevant information may be contained within the non-public portions of a <i>Facebook</i> profile.&nbsp; While privacy settings do not offer absolute protection from discovery, it appears that they can go a long way, as courts often use any profile content that is publicly accessible to determine whether a<i> Facebook</i> user&rsquo;s full profile is potentially relevant.&nbsp;</p>
  117. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;In <i>Lesko</i>, the plaintiff alleged serious injuries from a car accident, and the defendant originally claimed he was not the driver of the vehicle involved.&nbsp; In an increasingly popular attempt at debunking their opponent&rsquo;s factual assertions, the parties filed cross motions to compel access to each other&rsquo;s <i>Facebook </i>accounts.&nbsp;</p>
  118. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Since the defendant denied driving the vehicle involved, plaintiff argued that postings surrounding the time period at issue were relevant to determine the defendant&rsquo;s whereabouts.&nbsp; However, in response to Plaintiff&rsquo;s Request for Admissions, the defendant admitted he was driving the car.<a class=" FCK__AnchorC" title="" href="#_ftn1" name="_ftnref1"><span><span><span><font color="#0000ff">[1]</font></span></span></span></a>&nbsp; Accordingly, Judge Wettick denied plaintiff&rsquo;s request, finding that the defendant&rsquo;s <i>Facebook </i>information was no longer relevant in light of his admission.</p>
  119. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The defendant asserted that <i>Facebook </i>photographs of the plaintiff socializing at a bar and &ldquo;drinking at a party&rdquo; cast doubt on his claim of serious injuries.&nbsp; The Judge was not persuaded, however, noting that since the plaintiff never alleged that he was bedridden, the photos were not inconsistent with his alleged injuries.</p>
  120. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;In possibly the most useful part of the opinion for future litigants resisting discovery requests for social networking information, Judge Wettick maps out the basis for his opinion, explaining, &ldquo;I base my rulings on Pa.R.C.P. No. 4011(b) which bars discovery that would cause &lsquo;unreasonable annoyance, embarrassment, oppression &hellip;&rsquo;&nbsp; This rule will reach intrusions that are not covered by any constitutional right to privacy or any common law or statutory privileges.&rdquo;&nbsp; The Judge explained that a blanket court order to provide <i>Facebook </i>login information likely allows access to much more information than is relevant to the litigation, which could be particularly embarrassing for a person who thought they were only sharing such information with &ldquo;Friends.&rdquo;&nbsp; The opinion then clarifies that discovery must be <i>unreasonably </i>intrusive to be barred.&nbsp; Thus, although ordering court access to one&rsquo;s <i>Facebook</i> account might have the unfortunate consequence of causing embarrassment, the sharing of personal information that underlies the entire concept of <i>Facebook </i>can negate a user&rsquo;s claim to privacy.&nbsp;</p>
  121. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;With this overview of the current legal landscape memorialized in the <i>Lesko </i>opinion, it will be interesting to watch the law evolve as additional courts rule on the discoverability of social media.&nbsp; Regardless of what happens in the future, one aspect of the developing law has clearly emerged: if a <i>Facebook </i>post is publicly accessible, the user should be prepared to share that post and all related account information with anyone interested &mdash; &ldquo;Friend&rdquo; or foe.</p>
  122. <div><br clear="all" />
  123. <hr size="1" width="33%" align="left" />
  124. <div id="ftn1">
  125. <p><a class=" FCK__AnchorC" title="" href="#_ftnref1" name="_ftn1"><span><span><span><font color="#0000ff">[1]</font></span></span></span></a><font size="2"> </font>Question of the day: Did the defendant admit he was driving the car to avoid turning over his prized <i>Facebook </i>login information?</p>
  126. </div>
  127. </div>
  128. <p>&nbsp;</p>]]></description>
  129.         <link>http://www.ediscoverylawreview.com/2012/10/articles/social-media-login-and-password-discovery-requests-a-useful-tool-in-the-quest-for-truth-or-an-invasion-of-privacy-one-pennsylvania-court-helps-navigate-the-debate/</link>
  130.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/10/articles/social-media-login-and-password-discovery-requests-a-useful-tool-in-the-quest-for-truth-or-an-invasion-of-privacy-one-pennsylvania-court-helps-navigate-the-debate/</guid>
  131.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">Facebook</category><category domain="http://www.ediscoverylawreview.com/tags">Social Media</category><category domain="http://www.ediscoverylawreview.com/tags">discovery of social media in lawsuits</category><category domain="http://www.ediscoverylawreview.com/tags">discovery of social networking sites</category><category domain="http://www.ediscoverylawreview.com/tags">discovery request</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery</category><category domain="http://www.ediscoverylawreview.com/tags">social media and disclosure of confidential information</category>
  132.         <pubDate>Fri, 05 Oct 2012 10:21:52 -0800</pubDate>
  133.         <dc:creator>Katie Beran</dc:creator>
  134.      
  135.      </item>
  136.            <item>
  137.         <title>Shifting E-Discovery Costs to the Plaintiff in a Potential Class Action: a Pennsylvania Federal Court Tells Plaintiffs&apos; Counsel to &quot;Make the  Investment in Discovery&quot;</title>
  138.         <description><![CDATA[<p><span style="line-height: 200%; ">In what could be a significant opinion for federal class action defendants seeking to limit their e-discovery costs, a court in the Eastern District of Pennsylvania recently held in </span><i style="line-height: 200%; "><a href="http://www.ediscoverylawreview.com/uploads/file/Boeynaems v_ LA Fitness.pdf">Boeynaems v. LA Fitness International, LLC</a></i><span style="line-height: 200%; ">, No. 10-2326, No. 11-2644 (E.D. Pa. Aug. 16, 2012), that plaintiffs who were seeking broad discovery regarding class certification issues &ndash; including extensive ESI requests -- should share in the costs of the defendant&rsquo;s discovery production. <img src="http://www.ediscoverylawreview.com/uploads/image/lawyer cash.jpg" width="200" height="234" vspace="10" hspace="10" align="left" alt="" />&nbsp; &nbsp;</span></p>
  139. <p style="margin-top:0in;text-indent:.5in;line-height:200%">Recognizing that the potential for a class action suit &ldquo;dramatically increases the economic&nbsp;pressure on the defendant&rdquo; and that the economic burden of discovery production regarding certification often falls primarily on the defendant, Judge Michael Baylson wrote, &ldquo;[D]iscovery burdens should not force either party to succumb to a settlement that is based on the cost of litigation rather than the merits of the case.&rdquo;&nbsp; Where there is a substantial discovery dispute prior to class certification, Judge Baylson held, &ldquo;economic motivation and fairness are relevant factors in determining cost-shifting of disputed discovery burdens.&rdquo;&nbsp;</p>
  140. <p style="margin-top:0in;text-indent:.5in;line-height:200%">In <i>Boeynaems</i>, the five individual plaintiffs had asserted deception and breach of contract actions relating to their attempts to cancel their gym memberships with the defendant.&nbsp; In the process of seeking class certification for what they anticipated would be a very large class, the plaintiffs sought extensive discovery from defendants.&nbsp; After the defendant had already provided some discovery &nbsp;to the plaintiffs, substantial disputes arose between the parties about the scope of remaining discovery to be provided by the defendant.&nbsp; Among other things, the plaintiffs sought &ldquo;millions of items&rdquo; of ESI (electronically stored information).&nbsp; The cost of production of that ESI, the court noted, was &ldquo;a significant factor in the defense of the litigation.&rdquo;</p>
  141. <p style="margin-top:0in;text-indent:.5in;line-height:200%">In determining how to allocate discovery costs between the parties, the court focused on the specific circumstances of the case.&nbsp; Discovery in the case was called &ldquo;asymmetrical,&rdquo; in that discovery production and its attendant expenses were rather small for the plaintiffs, and potentially huge for the defendant.&nbsp; &nbsp;The court noted while class determination requires a &ldquo;searching inquiry&rdquo; and &ldquo;very detailed analysis,&rdquo; the plaintiffs had already amassed a very large set of documents that were potentially probative of the class action issue.&nbsp; With that in mind, the court held that the plaintiffs should bear the economic responsibility of any future discovery efforts in regard to class determination:</p>
  142. <p style="margin-top:0in;margin-right:.5in;margin-bottom:
  143. 12.0pt;margin-left:.5in">The Court is persuaded, it appearing that Defendant has borne all of the costs of complying with Plaintiffs&rsquo; discovery to date, that the costs burden must now shift to Plaintiffs, if Plaintiffs believe that they need additional discovery.&nbsp; In other words, given the large amount of information Defendant has already provided, Plaintiffs need to assess the value of additional discovery for their class action motion.&nbsp; If Plaintiffs conclude that additional discovery is not only relevant, but important to proving that a class should be certified, then Plaintiffs should pay for that additional discovery from this date forward, at least until the class action determination is made.</p>
  144. <p style="margin-top:0in;text-indent:.5in;line-height:200%">Remarkably, in arriving at its decision, the court took into consideration the economic resources of the plaintiffs&rsquo; counsel.&nbsp; The court observed that the plaintiffs&rsquo; counsel was a &ldquo;very successful and well regarded&rdquo; firm, and reasoned that if that firm &ldquo;believes that this case is meritorious, it has the financial ability to make the investment in discovery[.]&rdquo;&nbsp; The court further noted that while the discovery costs were likely not recoverable from the defendant in the event of&nbsp; plaintiff victory,<a href="file:///C:/Users/mzabel/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/XSPUKIEL/Boeynaems%20blog%20piece%20(2).docx#_ftn1" name="_ftnref1" title=""><span style="font-size:12.0pt;Times New Roman&quot;,&quot;serif&quot;;Times New Roman&quot;;">[1]</span></a> the court would likely allow the firm&rsquo;s &ldquo;out-of-pocket costs to be deductible from any award to a class, assuming a class was certified.&rdquo;</p>
  145. <p style="margin-top:0in;text-indent:.5in;line-height:200%">Although federal rules have allowed the courts to shift discovery costs for years, <i>Boeynaems</i> appears to be the first instance in which a federal court has&nbsp; addressed the shifting of discovery costs in a pre-class determination setting.&nbsp; Judge Baylson&rsquo;s analysis in <i>Boeynaems</i> should present a useful resource to a defendant who is facing the prospect of class action litigation and seeking to limit the potential for extensive e-discovery costs.</p>
  146. <div><br clear="all" />
  147. <hr align="left" width="33%" />
  148. <div id="ftn1">
  149. <p><a href="file:///C:/Users/mzabel/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/XSPUKIEL/Boeynaems%20blog%20piece%20(2).docx#_ftnref1" name="_ftn1" title=""><span style="font-size:10.0pt;Times New Roman&quot;,&quot;serif&quot;;">[1]</span></a> For this proposition, the court cited to the recent, major e-discovery case <i><a href="http://www.ediscoverylawreview.com/uploads/file/Third%20Circuit%20Race%20Tires%20opinion.pdf">Race Tires America v. Hoosier Racing Tire Corp</a>.</i>, 674 F.3d 158 (3d Cir. 2012). &nbsp;You can find <a href="http://www.ediscoverylawreview.com/2012/03/articles/flattened-by-race-tires-the-third-circuit-limits-what-types-of-ediscovery-costs-are-recoverable-by-a-prevailing-party/">our analysis of the <i>Race Tires </i>opinion here</a>.</p>
  150. </div>
  151. </div>]]></description>
  152.         <link>http://www.ediscoverylawreview.com/2012/09/articles/shifting-ediscovery-costs-to-the-plaintiff-in-a-potential-class-action-a-pennsylvania-federal-court-tells-plaintiffs-counsel-to-make-the-investment-in-discovery/</link>
  153.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/09/articles/shifting-ediscovery-costs-to-the-plaintiff-in-a-potential-class-action-a-pennsylvania-federal-court-tells-plaintiffs-counsel-to-make-the-investment-in-discovery/</guid>
  154.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">Class action</category><category domain="http://www.ediscoverylawreview.com/tags">ESI</category><category domain="http://www.ediscoverylawreview.com/tags">Eastern District of Pennsylvania</category><category domain="http://www.ediscoverylawreview.com/tags">Third Circuit</category><category domain="http://www.ediscoverylawreview.com/tags">cost sharing</category><category domain="http://www.ediscoverylawreview.com/tags">costs</category><category domain="http://www.ediscoverylawreview.com/tags">discovery</category><category domain="http://www.ediscoverylawreview.com/tags">discovery request</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery compliance</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery costs</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery plan</category><category domain="http://www.ediscoverylawreview.com/tags">electronically stored information</category><category domain="http://www.ediscoverylawreview.com/tags">federal courts</category><category domain="http://www.ediscoverylawreview.com/tags">litigation hold</category><category domain="http://www.ediscoverylawreview.com/tags">recovery</category><category domain="http://www.ediscoverylawreview.com/tags">recovery of e-discovery costs</category><category domain="http://www.ediscoverylawreview.com/tags">unproduced documents</category>
  155.         <pubDate>Tue, 11 Sep 2012 10:24:52 -0800</pubDate>
  156.         <dc:creator>Mike Zabel</dc:creator>
  157.      
  158.      </item>
  159.            <item>
  160.         <title>Impact of Chin Decision on Pension Committee</title>
  161.         <description><![CDATA[<p>&nbsp;</p>
  162. <p>&nbsp;</p>
  163. <p style="margin: 0in 0in 0pt"><span style="font-size: medium">&nbsp;&nbsp;&nbsp;&nbsp; The Second Circuit&rsquo;s recent decision in <i><span style="color: #262626">Chin v. Port Authority</span></i><span style="color: #262626">, Nos. 10-1904-cv(L), 10-2031-cv(XAP), 2012 U.S. App. LEXIS 14088 (2d Cir. July 10, 2012)</span>, appears to have overruled the 2010 opinion from the Southern District of New York in <i>The Pension Committee of the University of Montreal Pension Plan, et al. v. Banc of America Securities, et al</i>, 685 F. Supp. 2d 456 (S.D.N.Y. 2010).</span></p>
  164. <p style="margin: 0in 0in 0pt"><span style="font-size: medium">&nbsp;</span></p>
  165. <p style="margin: 0in 0in 0pt"><span style="font-size: medium">&nbsp;&nbsp;&nbsp;&nbsp; The <i>Pension Committee </i>decision, written by Judge Shira Scheindlin, was one of the first cases to recognize the importance of issuing written litigation holds.&nbsp;In <i>Pension Committee</i>,the court recognized that the failure to issue a written litigation hold constitutes gross negligence <i>per se</i>.&nbsp;<i>See id. </i>at 465 (citing <i>Zubulake v. UBS Warburg LLC</i>, 229 F.R.D. 422 (S.D.N.Y. 2004)).&nbsp;Although some of the plaintiffs in the case issued a written litigation hold, they did not do so until almost three years after commencing their action.&nbsp;<i>Pension Commitee</i>,<i> </i>685 F.&nbsp;Supp. 2d&nbsp;at 476-477.&nbsp;Moreover, the litigation hold was not issued until years after the <i>Zubulake</i> decision, in which the Southern District of New York articulated the necessity to issue written litigation holds.&nbsp;<i>See id</i>.&nbsp;Based on the conduct of these plaintiffs, the court noted that a jury could infer that any missing documents were relevant, and that the defendants were prejudiced due to their absence.&nbsp;<i>See id.</i> at 478.&nbsp;</span></p>
  166. <p style="margin: 0in 0in 0pt"><span style="font-size: medium">&nbsp;</span></p>
  167. <p style="margin: 0in 0in 0pt"><span style="font-size: medium">&nbsp;&nbsp;&nbsp;&nbsp; In contrast, in <i>Chin</i>, the Second Circuitrejected the idea that failure to issue a litigation hold necessarily constitutes gross negligence <i>per se</i>,although the decision does not articulate whether the litigation hold at issue was written or oral<i>.&nbsp;</i>Consequently, the <i>Chin</i> decision places less of a burden on litigants to issue litigation holds.&nbsp;</span></p>
  168. <p><span style="font-size: medium">&nbsp;&nbsp;&nbsp;&nbsp; Nevertheless, because of the potential benefits they provide, parties would be well served to continue to issue written litigation holds.&nbsp;Among the benefits of issuing a written litigation hold are avoiding spoliation issues and ensuring that key evidence is preserved.&nbsp;Further, the time, effort, and cost required to issue a written litigation hold is minimal.&nbsp;In addition, written litigation holds will help to protect those parties litigating in courts outside of the Second Circuit, which have not yet addressed the issue.</span></p>
  169. <p style="margin: 0in 0in 0pt">&nbsp;</p>
  170. <p>&nbsp;</p>]]></description>
  171.         <link>http://www.ediscoverylawreview.com/2012/07/articles/impact-of-chin-decision-on-pension-committee/</link>
  172.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/07/articles/impact-of-chin-decision-on-pension-committee/</guid>
  173.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  174.         <pubDate>Mon, 30 Jul 2012 07:35:17 -0800</pubDate>
  175.         <dc:creator>Rachel S. Fendell</dc:creator>
  176.      
  177.      </item>
  178.            <item>
  179.         <title>Second Circuit Refuses to Find Failure to Issue Litigation Hold Gross Negligence Per Se</title>
  180.         <description><![CDATA[<p><img alt="" align="right" width="120" height="160" src="http://www.ediscoverylawreview.com/uploads/image/Litigation Hold.jpg" />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Reviewing a motion for sanctions for spoliation of evidence, the United States Court of Appeal for the Second Circuit rejected the argument that failure to issue a litigation hold constitutes gross negligence <i>per se</i>.&nbsp;<i>Chin v. Port Authority</i>, Nos. 10-1904-cv(L), 10-2031-cv(XAP), 2012 U.S. App. LEXIS 14088, at *68 (2d Cir. July 10, 2012). &nbsp;Instead, the Second Circuit held that failure to issue a litigation hold is just one factor in the spoliation analysis.</p>
  181. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In <i>Chin</i>, the plaintiffs brought an action under Title VII of the Civil Rights Act of 1964 for failure to promote seven police officers of Asian descent.&nbsp;The basis for the plaintiffs&rsquo; motion for sanctions was the destruction of promotion folders that had been used as part of the relevant promotion decisions. &nbsp;The folders were destroyed at some point after the defendant received notice of the plaintiffs&rsquo; EEOC charge.&nbsp;In their motion, the plaintiffs sought an adverse inference instruction from the district court.&nbsp;The district court denied the motion finding that the plaintiffs had ample alternative sources of evidence&nbsp;and that the destruction of the promotion folders was negligent, but not grossly so.</p>
  182. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; On appeal, the plaintiffs argued that failure to issue a litigation hold amounted to gross, rather than simple, negligence.&nbsp;The Second Circuit rejected this argument, and held that &ldquo;the better approach is to consider the failure to adopt good preservation practices as one factor in the determination of whether discovery sanctions should issue.&rdquo;&nbsp;<i>Id. </i>(internal quotations omitted).</p>
  183. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Furthermore, the Second Circuit also noted that even if the defendant&rsquo;s actions were grossly negligent, the District Court was not required to give an adverse inference instruction.&nbsp;Instead, &ldquo;a &lsquo;case-by-case approach to the failure to produce relevant evidence,&rsquo; at the discretion of the district court, is appropriate.&rdquo;&nbsp;<i>Id.</i> (quoting <i>Residential Funding Corp. v. DeGeorge Fin. Corp.</i>, 306 F.3d 99, 108 (2d. Cir. 2002)).</p>
  184. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; It is important to note the <i>Chin</i> decision does not indicate that parties should stop issuing litigation holds altogether.&nbsp;The absence or presence of a litigation hold is still a factor in determining whether a party&rsquo;s preservation practices were so flawed as to justify sanctions.&nbsp;However, the decision should provide relief to any party that inadvertently fails to issue a litigation hold and faces a motion for sanctions.&nbsp;The <i>Chin</i> decision makes clear that a party&rsquo;s failure to issue a litigation hold is not sufficient in and of itself to prove gross negligence and the applicability of sanctions.</p>
  185. <p style="margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For more on Litigation Holds, including what should be in them and when they are necessary, please see these two previous posts by Rachel Fendell: <a href="http://www.ediscoverylawreview.com/2011/08/articles/litigation-holds-take-1/">Litigation Holds, Take 1</a> and <a href="http://www.ediscoverylawreview.com/2011/08/articles/litigation-holds-take-2/">Litigation Holds, Take 2</a>.</p>]]></description>
  186.         <link>http://www.ediscoverylawreview.com/2012/07/articles/second-circuit-refuses-to-find-failure-to-issue-litigation-hold-gross-negligence-per-se/</link>
  187.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/07/articles/second-circuit-refuses-to-find-failure-to-issue-litigation-hold-gross-negligence-per-se/</guid>
  188.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  189.         <pubDate>Thu, 19 Jul 2012 10:01:25 -0800</pubDate>
  190.         <dc:creator>Kevin Kelly</dc:creator>
  191.      
  192.      </item>
  193.            <item>
  194.         <title>Judge Refuses Recusal in Da Silva Moore</title>
  195.         <description><![CDATA[<p>&nbsp;</p>
  196. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Drama stirred in the burgeoning e-discovery world on March 15, 2012, when Magistrate Judge Andrew Peck denied Plaintiffs&rsquo; request that he recuse himself from <i>Da Silva Moore v. Publicis Groupe</i>, No. 11-CV-1279 (ALC) (AJP) (S.D. N.Y. June 15, 2012).</span></p>
  197. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Plaintiffs moved for recusal in the aftermath of Judge Peck&rsquo;s February 24, 2012 order, allowing the use of predictive coding and adopting Defendant-MSL&rsquo;s protocol for its use.&nbsp;This is the latest development in the ongoing saga of this case, the first to judicially-endorse the use of predictive coding in electronic discovery. &nbsp;The Defendants proposed using predictive coding to wade through the approximately 3 million electronic documents involved in the discovery.</span></p>
  198. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Plaintiffs claim that recusal is warranted because Judge Peck&rsquo;s &ldquo;advocacy of predictive coding&rdquo; renders him biased. &nbsp;Specifically, Plaintiffs pointed to an article Judge Peck wrote for Law Technology News, &ldquo;Search, Forward,&rdquo; an article Judge Peck himself called a &ldquo;sign of judicial approval of predictive coding&rdquo; for appropriate cases.&nbsp;At the first conference with the parties, Judge Peck said to the defendants, who were pushing the use of predictive coding: &nbsp;&ldquo;You must have thought you died and went to Heaven when this case was referred to me.&rdquo; &nbsp;Judge Peck spoke publicly in support of predictive coding as a panelist for a LegalTech conference and at several e-discovery CLEs.&nbsp;Plaintiffs&rsquo; also alleged improper ex-parte contact with one of the co-panelists at LegalTech, and a partner at the firm representing Defendants, Ralph Losey.&nbsp;</span></p>
  199. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Plaintiffs filed their motion for recusal on April 13, 2012, after informally requesting Judge Peck recuse himself on March 28, shortly after Judge Peck issued the Court&rsquo;s formal opinion adopting MSL&rsquo;s Electronically Stored Information (&ldquo;ESI&rdquo;) protocol on February 24. 2012 WL 607412 (S.D. N.Y. Feb. 24, 2012) (Peck, M.J.) <i>adopted by</i> 2012 WL 1446534 (S.D. N.Y. Apr. 26, 2012).</span></p>
  200. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Judge Peck denied the motion for recusal, finding the motion untimely and meritless.&nbsp;The motion was held untimely because Judge Peck had informed both parties about his &ldquo;Search, Forward&rdquo; article, LegalTech speaking engagement, and his acquaintance with Losey months before the plaintiffs moved for recusal.&nbsp;He noted that Plaintiffs waited to seek his recusal until after he adopted MSL&rsquo;s predictive coding protocol, citing agreement with a Second Circuit opinion, which held that such untimely recusal motions may be improperly used as a fall-back position to an unfavorable ruling. &nbsp;<i>See</i>, <i>Weisshaus v. Fagan</i>, 456 F. App&rsquo;x 32, 34 (2d Cir. 2012).</span></p>
  201. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Additionally, Judge Peck held the recusal motion was meritless because the parties were already discussing the use of predictive coding before the case was referred to him on November 28, 2011.&nbsp;Plaintiffs had been open to using predictive coding from the beginning, but disagreed with Defendants about the specific protocol.&nbsp;Judge Peck found the Plaintiff&rsquo;s allegations that he had taken &ldquo;personal offense&rdquo; to Plaintiffs&rsquo; filing of objections to his rulings, had &ldquo;chastised and yelled at Plaintiffs&rsquo; counsel&rdquo;, and had &ldquo;intimidated Plaintiffs for disagreeing with rulings&rdquo; to have been taken out of context and to be insufficient to overcome a judge&rsquo;s presumption of impartiality.&nbsp;</span></p>
  202. <p style="text-align: justify; line-height: normal; margin: 12pt 0in 0pt"><span style="font-size: 12pt">Importantly, the Plaintiffs &ldquo;never accused Judge Peck of actual bias or sought to impugn Judge Peck&rsquo;s integrity&rdquo; but sought his recusal only on the basis that the facts, taken together, &ldquo;create an appearance of partiality.&rdquo;&nbsp;Apparently finding that a &ldquo;reasonable person knowing and understanding all of the relevant facts&rdquo; would not find such an appearance of partiality (<i>United States v. Bayless</i>, 201 F.3d 116, 126&ndash;27 (2d Cir.), <i>cert. denied</i>, 529 U.S. 1061 (2000)), Judge Peck denied Plaintiffs&rsquo; motion for recusal.</span></p>
  203. <p><span style="line-height: 115%; font-size: 12pt">No doubt the legal community will continue to keep a close watch as the drama of <i>Da Silva Moore</i> continues.</span></p>]]></description>
  204.         <link>http://www.ediscoverylawreview.com/2012/06/articles/judge-refuses-recusal-in-da-silva-moore/</link>
  205.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/06/articles/judge-refuses-recusal-in-da-silva-moore/</guid>
  206.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  207.         <pubDate>Wed, 20 Jun 2012 08:56:52 -0800</pubDate>
  208.         <dc:creator>Thomas M. Jones</dc:creator>
  209.      
  210.      </item>
  211.            <item>
  212.         <title>Pennsylvania Announces E-Discovery Amendments to Rules of Civil Procedure</title>
  213.         <description><![CDATA[<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img alt="" align="right" width="75" height="99" src="http://www.ediscoverylawreview.com/uploads/image/shutterstock_28766500(2).jpg" /> Pennsylvania recently adopted amendments to its Rules of Civil Procedure that govern e-discovery practice in the Commonwealth.&nbsp;Although the amendments to Rules 4009 and 4011 (requests for production and the scope of discovery, respectively) use the federal term &ldquo;electronically stored information,&rdquo; the Rules Committee specifically did not incorporate federal jurisprudence, and instead declared that &ldquo;[e-discovery] is to be determined by traditional principles of proportionality under Pennsylvania law.&rdquo;&nbsp;Explanatory Comment A, Pa. R.C.P. No. 4009.&nbsp;Without the guidance of nearly a decade of e-discovery case law and detailed procedure under the federal rules, practitioners and their clients should be cautious regarding their obligations approaching and during litigation.</p>
  214. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Pennsylvania is in the minority of states that do not adopt, in whole or in part, the federal rules governing e-discovery.&nbsp;As of February 2012, at least thirty states &ldquo;based their new e-discovery rules on the [Federal Rules of Civil Procedure].&rdquo;<a title="" href="#_ftn1" name="_ftnref1"><span><span><span style="font-size: 12pt">[1]</span></span></span></a>&nbsp;While Pennsylvania&rsquo;s new rules do not incorporate the entirebody of federal jurisprudence on e-discovery, practitioners will find the Rules&rsquo; proportionality standard somewhat familiar.&nbsp;In deciding discovery disputes, courts in should consider:</p>
  215. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the nature and scope of the litigation, including the importance and complexity of the issues and the amounts at stake;</p>
  216. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the relevance of electronically stored information and its importance to the court's adjudication in the given case;</p>
  217. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the cost, burden, and delay that may be imposed on the parties to deal with electronically stored information;</p>
  218. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the ease of producing electronically stored information and whether substantially similar information is available with less burden; and</p>
  219. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; any other factors relevant under the circumstances.</p>
  220. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; These factors are actually quite similar to those governing the scope of discovery under the federal rules: the &ldquo;needs of the case, the amount in controversy, the parties&rsquo; resources, the importance of the issues at stake&rdquo; and the &ldquo;importance of the discovery in resolving the issues.&rdquo;&nbsp;Fed. R. Civ. P. 26(b)(2)(C)(i)-(iii). Without an existing body of Pennsylvania case law to interpret the rules, federal case law will almost certainly be cited by litigants attempting to bring meaning to the new standard.&nbsp;The Explanatory Comment makes clear, however, that trial court judges are not bound by federal law when deciding any disputes over e-discovery.</p>
  221. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The new rules provide standards for the Courts to <i>resolve </i>discovery disputes but leave litigants in Pennsylvania with almost no guidance on how to <i>avoid</i> such disputes entirely.&nbsp;The new rules do encourage cooperation amongst the parties, suggesting the use of &ldquo;electronic searching, sampling, cost sharing, and non-waiver agreements to fairly allocate discovery burdens and costs.&rdquo;&nbsp;Explanatory Comment C, Pa.R.C.P. No. 4009. &nbsp;Unlike the federal rules, however, the Pennsylvania rules provide almost no instruction on how e-discovery should be handled.&nbsp;In seeking electronically stored information, the requesting party must be &ldquo;as specific as possible&rdquo; and may state the format in which the material is to be produced.&nbsp;Pa. R.C.P. No. 4009.1(b); Note, Pa. R.C.P. No. 4009.11.&nbsp;The other responding party may produce the material in that format or object to the request.&nbsp;Pa. R.C.P. No. 4009.1(b).&nbsp;If no specific format is requested, the producing party may use a &ldquo;form in which [the information] is ordinarily maintained or in a reasonably useable form.&rdquo;&nbsp;<u>Id.</u>&nbsp;No other guidance is provided.</p>
  222. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There is no standard in the rules with which parties can support their demands or objections during discovery.&nbsp;As a result, the parties may be less likely to reach agreement and more likely to seek intervention from the court.&nbsp;Moreover, there is no standard in the rules that provides consistent e-discovery procedures amongst the trial courts.&nbsp;Until a more extensive body of case law arises that interprets the new rules, each judge could be left to create his or her own procedure.&nbsp;</p>
  223. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Pennsylvania has adopted a clean-slate approach to e-discovery and it will take time to develop jurisprudence that gives effective guidance to practitioners and the judiciary.&nbsp;The federal judicial system has spent almost ten years developing e-discovery principles since the&nbsp;<i>Zubulake v. UBS Warburg</i> decisions first addressed these issues.&nbsp;Fortunately, Pennsylvania can turn to an existing e-discovery practice nationwide that continues to evolve alongside new technology and methodology.&nbsp;As practitioners begin operating under the new rules, courts should build upon existing e-discovery scholarship to bring decisional clarity to the new Rules.<a title="" href="#_ftn2" name="_ftnref2"><span><span><span style="font-size: 12pt">[2]</span></span></span></a></p>
  224. <div><br clear="all" />
  225. <hr size="1" width="33%" align="left" />
  226. <div id="ftn1">
  227. <p style="margin: 0in 0in 0pt"><a title="" href="#_ftnref1" name="_ftn1"><span><span><span style="font-size: 10pt">[1]</span></span></span></a><font size="2"> Thomas Y. Allman, E-Discovery in Federal and State Courts after the 2006 Federal Amendments 3 (Feb. 9, 2012), <i>available at </i><a href="http://www.krollontrack.com/publications/2012%20fed%20state%20ediscovery%20rules.pdf?utm_source=ED&amp;utm_medium=Email&amp;utm_campaign=ED-Rediscovered-2012-02-15-ExternalWebinarFup&amp;utm_content=download.">http://www.krollontrack.com/publications/2012%20fed%20state%20ediscovery%20rules.pdf?utm_source=ED&amp;utm_medium=Email&amp;utm_campaign=ED-Rediscovered-2012-02-15-ExternalWebinarFup&amp;utm_content=download.</a></font></p>
  228. </div>
  229. <div id="ftn2">
  230. <p style="margin: 0in 0in 0pt"><a title="" href="#_ftnref2" name="_ftn2"><span><span><span style="font-size: 10pt">[2]</span></span></span></a><font size="2"> For example, in 2010 the Sedona Conference offered its &ldquo;Commentary on Proportionality in Electronic Discovery,&rdquo; including commentary on the Federal Rules.&nbsp;<a href="http://www.cozen.com/attorney_detail.asp?d=1&amp;atid=285">Dave Walton</a>, co-chair of Cozen O&rsquo;Connor&rsquo;s E-Discovery Task Force, contributed to the dialogue as the Conference was drafting its Commentary.&nbsp;You can review a copy <a href="https://thesedonaconference.org/publication/sedona-conference%C2%AE-commentary-proportionality">here</a>.</font></p>
  231. </div>
  232. </div>
  233. <p>&nbsp;</p>]]></description>
  234.         <link>http://www.ediscoverylawreview.com/2012/06/articles/pennsylvania-announces-ediscovery-amendments-to-rules-of-civil-procedure/</link>
  235.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/06/articles/pennsylvania-announces-ediscovery-amendments-to-rules-of-civil-procedure/</guid>
  236.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery</category><category domain="http://www.ediscoverylawreview.com/tags">eDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">electronically stored information</category><category domain="http://www.ediscoverylawreview.com/tags">pennsylvania</category><category domain="http://www.ediscoverylawreview.com/tags">proportionality</category><category domain="http://www.ediscoverylawreview.com/tags">rules</category>
  237.         <pubDate>Mon, 11 Jun 2012 10:25:16 -0800</pubDate>
  238.         <dc:creator>Michael Broadbent</dc:creator>
  239.      
  240.      </item>
  241.            <item>
  242.         <title>The Ultimate Price--New York Court Dismisses Case as Spoliation Sanction</title>
  243.         <description><![CDATA[<p>&nbsp;</p>
  244. <p style="text-align: justify; margin: 12pt 0in 0pt">The Supreme Court in New York County recently dismissed a $20 million suit in a sanctioning order in response to the Plaintiff&rsquo;s destruction of electronically stored information (&ldquo;ESI&rdquo;). In <i>915 Broadway Associates LLC v. Paul, Hastings, Janofsky &amp; Walker, LLP</i>, 34 Misc. 3d 1229A (N.Y. Sup. Ct. 2012), the court made clear that it would not tolerate spoliation of evidence and that it was willing to impose even the severest of sanctions.</p>
  245. <p style="text-align: justify; margin: 12pt 0in 0pt">The Plaintiff was initially a party to a separate action involving a failed real estate deal, as a result of which a litigation hold letter was issued in April, 2008. Broadway settled the real estate action and brought this malpractice suit against its former attorneys in August of 2008. The attorneys were allegedly responsible for failing to advise Broadway that the letter of credit provided to it in connection with the real estate deal expired during negotiations, in spite of evidence that Broadway was at least in partly responsible.</p>
  246. <p style="text-align: justify; margin: 12pt 0in 0pt">By 2008, it was well-established law, consistent with the <i>Zubulake</i> decisions, that once a party reasonable anticipates litigation, it must suspend its routine document retention and destruction policy and put in place a litigation hold to ensure the preservation of relevant documents. See <i>Zubulake v. UBS Warburg LLC</i>, 220 F.R.D. 212, 218 (S.D. N.Y. 2003). However, even though the litigation hold letter from April 2008 was sent to the primary custodians, at least one principal actively deleted relevant emails. Further, the company made no effort to suspend the automatic destruction policy of emails, which resulted in the permanent destruction of every email intentionally deleted. Additionally, the court found that nine of fourteen key custodians had deleted relevant documents. Perhaps the worst violation, however, occurred after the Defendant had raised its spoliation concerns with the court, when Broadway decommissioned and discarded an email served without preserving any of the relevant ESI.</p>
  247. <p style="text-align: justify; margin: 12pt 0in 0pt">The court reiterated that circulation of a litigation hold alone is not sufficient to meet a party&rsquo;s discovery obligations. Instead, a party must take affirmative steps to ensure potentially relevant evidence is identified and preserved. This includes not only avoiding affirmative acts of destruction, but also taking active steps, if required, to stop automatic deletion features. When evidence is destroyed, even mere negligence is sufficient to warrant sanctions.&nbsp;And when documents are destroyed as the result of, at a minimum, gross negligence, the court will presume the destroyed documents were relevant.</p>
  248. <p style="text-align: justify; margin: 12pt 0in 0pt">In this instance, the court determined that dismissal was the only remedy capable of addressing the prejudice caused by the intentional and reckless destruction of ESI. In addition to dismissing the Plaintiff&rsquo;s $20 million suit, the court also awarded attorney&rsquo;s fees and costs.</p>
  249. <p style="text-align: justify; margin: 12pt 0in 0pt">This case reinforces the need to not only issue a litigation hold, but to monitor compliance with it and take affirmative steps to ensure that potentially relevant information is collected and preserved. Even negligence in document preservation can result in sanctions.</p>]]></description>
  250.         <link>http://www.ediscoverylawreview.com/2012/05/articles/the-ultimate-pricenew-york-court-dismisses-case-as-spoliation-sanction/</link>
  251.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/05/articles/the-ultimate-pricenew-york-court-dismisses-case-as-spoliation-sanction/</guid>
  252.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  253.         <pubDate>Sat, 26 May 2012 18:49:38 -0800</pubDate>
  254.         <dc:creator>Thomas M. Jones</dc:creator>
  255.      
  256.      </item>
  257.            <item>
  258.         <title>A Spoliation Ace in the Hole</title>
  259.         <description><![CDATA[<p>&nbsp;<img hspace="5" alt="" vspace="5" align="left" style="width: 167px; height: 110px" src="http://www.ediscoverylawreview.com/uploads/image/shutterstock_39931864(2).jpg" />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;A district court case decided last month shows how a company&rsquo;s email retention and litigation hold policies can affect claims of spoliation by adverse parties in litigation.&nbsp;In <i><a href="http://www.ediscoverylawreview.com/uploads/file/https___ecf_almd_uscourts_gov_cgi-bin_show_temp_pl_file=file0_986525339112756.pdf">Danny Lynn Electrical v. Veolia ES Solid Waste</a></i>, No. 2:09CV192-MHT, 2012 U.S. Dist. LEXIS 31685, at *2 (M.D. Ala. March 9, 2012), the Plaintiffs filed a motion for sanctions alleging the Defendants had &ldquo;blatantly disregarded their duty to preserve electronic information in this case.&rdquo;&nbsp;Specifically, the Plaintiffs alleged that the Defendants failed to implement a litigation hold, deleted a number of email accounts, and failed to disable an email &ldquo;auto delete&rdquo; function after litigation commenced.&nbsp;They requested the full spectrum of sanctions, including monetary penalties, adverse evidentiary inferences, and the striking of affirmative defenses.</p>
  260. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Despite the Plaintiffs&rsquo; accusations, the court found that sanctions were unwarranted.&nbsp;First, the court explained that to evaluate whether sanctions are appropriate in a spoliation case, it must consider the importance of the destroyed evidence, the culpability of the defending party, fundamental fairness, and whether the destroyed evidence is available from other sources.&nbsp;Applying these factors to the case at hand, the court questioned whether any spoliation had actually occurred.&nbsp;Even assuming spoliation had occurred, however, the court found that the Defendants had not acted in bad faith.</p>
  261. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In coming to its decision, the court noted that while a few emails may have been accidentally deleted due to a computer virus, from the very beginning of the litigation, the Defendants regularly made tape backups of all emails.&nbsp;The tape backup system was later replaced by a system that created email backups on the company network.&nbsp;Throughout the course of the litigation, the Defendants regularly supplied emails from these backup systems in response to Plaintiffs&rsquo; discovery requests.&nbsp;The court concluded that even if some emails had been lost, the Defendants did not act in bad faith because they &ldquo;have expended great effort to insure that the plaintiffs receive information from both their live and archived email system by providing document review technology and allowing access to its database.&rdquo;&nbsp;Therefore, the court decided sanctions were not appropriate.</p>
  262. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The decision highlights how an up-front investment in data management technologies and policies can lead to real cost savings from a litigation standpoint.&nbsp;These investments not only decrease the costs &ndash; in both time and money &ndash; of responding to discovery requests, but also show good faith effort should an adverse party allege spoliation and request sanctions.&nbsp;A company that formulates sound email retention and litigation hold policies, documents and disseminates these policies, and conducts regular audits to ensure these policies are properly implemented will have a readymade shield to employ any time another party makes a spoliation claim.&nbsp;In the long run, these investments can save the company from the tedium of having to justify every email deletion on a case-by-case basis.&nbsp;When it comes to defending against potential spoliation claims, being proactive, rather than reactive, will go a long way to ensure you always have the winning hand.</p>]]></description>
  263.         <link>http://www.ediscoverylawreview.com/2012/04/articles/a-spoliation-ace-in-the-hole/</link>
  264.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/04/articles/a-spoliation-ace-in-the-hole/</guid>
  265.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  266.         <pubDate>Tue, 17 Apr 2012 05:57:02 -0800</pubDate>
  267.         <dc:creator>Brian Kint</dc:creator>
  268.      
  269.      </item>
  270.            <item>
  271.         <title>Flattened By Race Tires: The Third Circuit Limits What Types of E-Discovery Costs Are Recoverable by a Prevailing Party</title>
  272.         <description><![CDATA[<p><img width="250" height="188" align="right" alt="" src="http://www.ediscoverylawreview.com/uploads/image/gavel 2.jpg" />On March 16, 2012, in <i><a href="http://www.ediscoverylawreview.com/uploads/file/Third Circuit Race Tires opinion.pdf">Race Tires America, Inc. v. Hoosier Racing Tire Corp. et al</a>.</i>,<a name="_ftnref1" title="" href="file://cozen.com/PHL/users/MZabel/Documents/E-discovery%20blog/Third%20Circuit%20-%20Race%20Tires%20blog%20post.docx#_ftn1"><span style="font-size:12.0pt;Times New Roman&quot;,&quot;serif&quot;;Times New Roman&quot;;">[1]</span></a> the<a href="http://www.ca3.uscourts.gov/"> U.S. Court of Appeals for the Third Circuit</a> adopted a conservative view of the types of e-discovery costs recoverable by a prevailing party in federal court.&nbsp; In a precedential opinion intended to &ldquo;provide definitive guidance to the district courts in our Circuit,&rdquo; the Third Circuit held that&nbsp; the costs of &ldquo;scanning and file format conversion&rdquo; are recoverable by a prevailing party, but many other attendant e-discovery costs are not.</p>
  273. <p><b>Federal Rules for Recovering Costs</b></p>
  274. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; As e-discovery costs rise and become more common, a growing number of federal courts have been called upon to determine whether those costs are &ldquo;taxable&rdquo; &ndash; i.e., whether a prevailing party in federal court may recover the costs that it incurred in&nbsp; producing ESI for discovery.&nbsp; <a href="http://www.law.cornell.edu/rules/frcp/rule_54">Federal Rule of Civil Procedure 54(d)(1)</a> allows for &ldquo;costs&rdquo; (except for attorney&rsquo;s fees) to be awarded to a prevailing party, and Congress defined what those &ldquo;costs&rdquo; are in <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">28 U.S.C. &sect; 1920</a>.&nbsp; The debate over e-discovery costs arises almost entirely out of <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920(4)</a>, which states that taxable costs include:</p>
  275. <p style="margin-top:12.0pt;margin-right:.5in;margin-bottom:
  276. 0in;margin-left:.5in;margin-bottom:.0001pt">&nbsp;Fees for exemplification and the costs of making copies of any materials where the copies are necessarily obtained for use in the case[.]</p>
  277. <p>As federal courts grapple with <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920(4)</a> in the context of e-discovery, they key question tends to be what parts of the e-discovery process are encompassed by &ldquo;exemplification&rdquo; and &ldquo;making copies of any materials.&rdquo;</p>
  278. <p style="text-indent:.5in">In <i>Race Tires</i>, the Third Circuit was presented the opportunity to address the applicability of <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920(4)</a> to e-discovery costs.&nbsp; Last year, <a href="http://www.ediscoverylawreview.com/2011/06/articles/recovering-ediscovery-costs-in-federal-court/">this blog wrote about an opinion</a> from the <a href="http://www.pawd.uscourts.gov/">U.S. District Court for the Western District of Pennsylvania</a> that took a broad view of the terms in <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920(4)</a>, and awarded to the successful defendants in an anti-trust case over $367,000 in e-discovery costs for work done by third-party vendors and consultants that was &ldquo;highly technical&rdquo; and &ldquo;not the type of services that attorneys or paralegals are trained for or capable of providing.&rdquo;&nbsp;</p>
  279. <p><b>The Third Circuit Opinion</b></p>
  280. <p style="text-indent:.5in">The Third Circuit reversed that District Court&rsquo;s decision in <i>Race Tires</i>, as the appellate court opted for a limited, rather than expansive reading of &sect; 1920(4).&nbsp; The court identified only&nbsp; two e-discovery costs that were recoverable in the case: 1) the conversion of native files<a name="_ftnref2" title="" href="file://cozen.com/PHL/users/MZabel/Documents/E-discovery%20blog/Third%20Circuit%20-%20Race%20Tires%20blog%20post.docx#_ftn2"><span style="font-size:12.0pt;Times New Roman&quot;,&quot;serif&quot;;Times New Roman&quot;;">[2]</span></a> to an ESI format which had been agreed upon by the parties, and 2) the scanning of physical documents to create digital duplicates<b>.&nbsp; </b>As a result, the court reduced the defendants&rsquo; award of costs to just over $30,000.</p>
  281. <p style="text-indent:.5in">In the opinion, Judge Vanaskie emphasized the historical purpose of <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920</a> and its statutory predecessors, and the &ldquo;&lsquo;American rule&rsquo; against shifting the expense of&nbsp; litigation to the losing party.&rdquo;&nbsp; The court cited Supreme Court precedent for the principle that <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920</a> was intended to provide &ldquo;rigid controls on cost-shifting in federal courts&rdquo; and thus that the statute &ldquo;defines the full extent of a federal court&rsquo;s power to shift litigation costs absent express statutory authority.&rdquo;</p>
  282. <p><b>&ldquo;Making Copies&rdquo;</b></p>
  283. <p><b>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </b>In its most important piece of analysis, the court concluded that e-discovery services such as ESI collection and preservation, indexing and processing, and keyword searching do not fall within the meaning of the term &ldquo;making copies&rdquo; found in <a href="http://www.gpo.gov/fdsys/pkg/USCODE-2009-title28/pdf/USCODE-2009-title28-partV-chap123-sec1920.pdf">&sect; 1920(4)</a>.&nbsp; The court expressly rejected the argument that because such services are a necessary part of the process of ESI production, they are the modern equivalent of making copies. Such notions, the court wrote, &ldquo;are untethered from the statutory mooring.&rdquo;</p>
  284. <p style="text-indent:.5in">Prior to the ESI era, Judge Vanaskie noted, there could also be a lengthy process involved in producing copies for discovery which included collecting, processing, and reviewing paper files for relevancy and privilege, and the costs of those activities were never taxable under the statute.&nbsp; Similarly, the court reasoned, the costs of &ldquo;gathering, preserving, processing, searching, culling and extracting ESI&rdquo; may be necessary expenses leading up to the production of ESI, but they cannot be considered the costs of &ldquo;making copies.&rdquo;</p>
  285. <p style="margin-right:.5in">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Several components of e-discovery do qualify as &ldquo;making copies,&rdquo; according to the Third Circuit.&nbsp; The court expressly approved of scanning paper documents into electronic form and transferring VHS tapes to DVD as taxable costs.&nbsp; Additionally, because the parties in <i>Race Tires </i>had agreed to produce ESI in TIFF<a name="_ftnref3" title="" href="file://cozen.com/PHL/users/MZabel/Documents/E-discovery%20blog/Third%20Circuit%20-%20Race%20Tires%20blog%20post.docx#_ftn3"><span style="font-size:12.0pt;Times New Roman&quot;,&quot;serif&quot;;Times New Roman&quot;;">[3]</span></a> format, the court allowed the defendants to recover the costs of converting non-TIFF electronic files into TIFF format.&nbsp; These recoverable costs represented roughly $30,000 worth of the defendants&rsquo; e-discovery bill, which totaled more than $367,000.</p>
  286. <p style="margin-right:.5in"><b>Recovering E-Discovery Costs with <i>Race Tires</i></b></p>
  287. <p style="margin-right:.5in"><b>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </b><i>Race Tires</i> offers reasonably clear guidelines for the recovery of e-discovery costs by a prevailing party in a district court in the Third Circuit.&nbsp; Under <i>Race Tires</i>, a prevailing party should be able to recover 1) the cost of scanning physical documents and 2) the cost of converting electronic files into another format that has been agreed upon by the parties in a discovery plan or case management order.&nbsp; A prevailing party should not expect, however, to recover the costs of gathering, preserving, processing, searching, culling and extracting ESI &ndash; services which will often represent the bulk of e-discovery costs.&nbsp; In short, <i>Race Tires</i> gives some certainty, but little relief to litigants facing expensive e-discovery bills. &nbsp;</p>
  288. <div><br clear="all" />
  289. <hr align="left" width="33%" />
  290. <div id="ftn1">
  291. <p><a name="_ftn1" title="" href="file://cozen.com/PHL/users/MZabel/Documents/E-discovery%20blog/Third%20Circuit%20-%20Race%20Tires%20blog%20post.docx#_ftnref1"><span style="font-size:10.0pt;Times New Roman&quot;,&quot;serif&quot;;">[1]</span></a> No. 11-2316, 2012 U.S. App. LEXIS 5511 (3d Cir. March 16, 2012).</p>
  292. </div>
  293. <div id="ftn2">
  294. <p><a name="_ftn2" title="" href="file://cozen.com/PHL/users/MZabel/Documents/E-discovery%20blog/Third%20Circuit%20-%20Race%20Tires%20blog%20post.docx#_ftnref2"><span style="font-size:10.0pt;Times New Roman&quot;,&quot;serif&quot;;">[2]</span></a> As the Third Circuit explained, &ldquo;the native file format is the file structure defined by the original creating application.&rdquo; For example, a document which was originally created in Microsoft Word is a Word (or .doc) file in its native file format.</p>
  295. </div>
  296. <div id="ftn3">
  297. <p><a name="_ftn3" title="" href="file://cozen.com/PHL/users/MZabel/Documents/E-discovery%20blog/Third%20Circuit%20-%20Race%20Tires%20blog%20post.docx#_ftnref3"><span style="font-size:10.0pt;Times New Roman&quot;,&quot;serif&quot;;">[3]</span></a> &ldquo;<a href="http://en.wikipedia.org/wiki/Tagged_Image_File_Format">Tagged Image File Format</a>,&rdquo; a type of electronic file.&nbsp;</p>
  298. </div>
  299. </div>]]></description>
  300.         <link>http://www.ediscoverylawreview.com/2012/03/articles/flattened-by-race-tires-the-third-circuit-limits-what-types-of-ediscovery-costs-are-recoverable-by-a-prevailing-party/</link>
  301.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/03/articles/flattened-by-race-tires-the-third-circuit-limits-what-types-of-ediscovery-costs-are-recoverable-by-a-prevailing-party/</guid>
  302.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">ESI</category><category domain="http://www.ediscoverylawreview.com/tags">Race Tires</category><category domain="http://www.ediscoverylawreview.com/tags">Third Circuit</category><category domain="http://www.ediscoverylawreview.com/tags">costs</category><category domain="http://www.ediscoverylawreview.com/tags">discovery</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery consultants</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery costs</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery plan</category><category domain="http://www.ediscoverylawreview.com/tags">eDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">electronic communication</category><category domain="http://www.ediscoverylawreview.com/tags">electronically stored information</category><category domain="http://www.ediscoverylawreview.com/tags">exemplification</category><category domain="http://www.ediscoverylawreview.com/tags">federal courts</category><category domain="http://www.ediscoverylawreview.com/tags">recovery of e-discovery costs</category>
  303.         <pubDate>Thu, 22 Mar 2012 13:11:53 -0800</pubDate>
  304.         <dc:creator>Mike Zabel</dc:creator>
  305.      
  306.      </item>
  307.            <item>
  308.         <title>Simple Mistakes Lead to Discovery Sanctions Against Delta Air Lines</title>
  309.         <description><![CDATA[<p><img alt="" align="left" width="90" height="90" src="http://www.ediscoverylawreview.com/uploads/image/Mystery Box.jpg" />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Judge Timothy C. Batten, Sr., of the District Court for the Northern District of Georgia, imposed discovery sanctions against Delta Air Lines after it failed to disclose documents contained in backup tapes and hard drives that had been inadvertently overlooked by Delta&rsquo;s counsel and IT personnel.&nbsp;The opinion is <i>In re Delta/Airtran Baggage Fee Antitrust Litigation</i>, 2012 U.S. Dist. LEXIS 13462 (N.D. Ga. February 3, 2012).&nbsp;</p>
  310. <p style="text-indent: 0.5in; margin: 0in 0in 10pt">In the underlying action, Plaintiffs allege that Delta conspired with other airlines to impose a baggage fee on a passenger&rsquo;s first bag.&nbsp;During discovery, Plaintiffs served Delta with document requests, seeking all documents related to its decision to impose a first-bag fee on its air passengers.&nbsp;Delta responded by producing approximately 103,000 pages of documents prior to the close of discovery.&nbsp;Delta made a similar production to the Department of Justice, which was also investigating the baggage fees.</p>
  311. <p style="text-indent: 0.5in; margin: 0in 0in 10pt">Later while responding to a discovery request from the Department of Justice in a separate investigation, Delta produced documents relevant to the baggage fee action that had not previously been produced.&nbsp;When the Department of Justice noticed the discrepancy and contacted Delta, Delta notified Plaintiffs and the court, and opened an investigation into its document production efforts.</p>
  312. <p style="text-indent: 0.5in; margin: 0in 0in 10pt">The investigation revealed two sources of unproduced documents.&nbsp;First, the contents of a number of custodian hard drives were never uploaded to Delta&rsquo;s electronic information management program.&nbsp;Only documents uploaded to the program were reviewed for production.&nbsp;Second, during its investigation, Delta&rsquo;s IT personnel found an unmarked box containing backup tapes of server information in the office that manages document discovery responses.&nbsp;The tapes contained documents that were relevant to the baggage fee litigation.&nbsp;Delta eventually released an additional 60,000 pages of documents to Plaintiffs.</p>
  313. <p style="text-indent: 0.5in; margin: 0in 0in 10pt">As a result, Plaintiffs sought discovery sanctions from Delta.&nbsp;The court found that Delta was subject to sanctions for two violations.&nbsp;First, the court determined that Delta had failed to make a reasonable inquiry into the completeness of its discovery responses as it had certified pursuant to FRCP 26(g).&nbsp;The court indicated that Delta should have done a better job making sure that the IT department followed its instructions and produced the correct documents.&nbsp;Based on the violation of FRCP 26(g), the court awarded Plaintiffs reasonable expenses, including attorney&rsquo;s fees, caused by Delta&rsquo;s violation.&nbsp;Second, the court determined that Delta had breached its obligation to supplement its discovery requests pursuant to FRCP 26(e).&nbsp;According to the court, Delta should have been more diligent in searching such an obvious area for tapes related to the investigation.&nbsp;Given its failure under FRCP 26(e), the court imposed sanctions under FRCP 37 and awarded Plaintiffs reasonable expenses and attorney&rsquo;s fees caused by Delta&rsquo;s failure, including fees and expenses related to the motion for sanctions, the extended discovery period, and a separate motion for spoliation sanctions.</p>
  314. <p style="margin: 0in 0in 10pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Errors in e-discovery practice can easily occur to any party.&nbsp;The key to avoiding the situation is taking an active role not only in creating sound e-discovery procedures, but also ensuring that all personnel are aware of the importance of diligently following them.&nbsp;A simple lack of vigilance on the part of any party can lead to an oversight, and as demonstrated by Judge Batten, such an oversight can lead to sanctions.&nbsp;</p>]]></description>
  315.         <link>http://www.ediscoverylawreview.com/2012/03/articles/simple-mistakes-lead-to-discovery-sanctions-against-delta-air-lines/</link>
  316.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/03/articles/simple-mistakes-lead-to-discovery-sanctions-against-delta-air-lines/</guid>
  317.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/articles">Sanctions</category><category domain="http://www.ediscoverylawreview.com/tags">attorney&apos;s fees</category><category domain="http://www.ediscoverylawreview.com/tags">discovery request</category><category domain="http://www.ediscoverylawreview.com/tags">disovery sanctions</category><category domain="http://www.ediscoverylawreview.com/tags">e-deDiscovery</category><category domain="http://www.ediscoverylawreview.com/tags">ediscovery misconduct</category><category domain="http://www.ediscoverylawreview.com/tags">production</category><category domain="http://www.ediscoverylawreview.com/tags">rule 26(e)</category><category domain="http://www.ediscoverylawreview.com/tags">rule 26(g)</category><category domain="http://www.ediscoverylawreview.com/tags">rule 37</category><category domain="http://www.ediscoverylawreview.com/tags">unproduced documents</category>
  318.         <pubDate>Fri, 16 Mar 2012 11:59:12 -0800</pubDate>
  319.         <dc:creator>Kevin Kelly</dc:creator>
  320.      
  321.      </item>
  322.            <item>
  323.         <title>New York Appellate Division Rules Producing Party Must Bear the Cost of ESI Production</title>
  324.         <description><![CDATA[<p><!--[if gte mso 9]><xml>
  325. <o:OfficeDocumentSettings>
  326. <o:AllowPNG />
  327. </o:OfficeDocumentSettings>
  328. </xml><![endif]--><!--[if gte mso 9]><xml>
  329. <w:WordDocument>
  330. <w:View>Normal</w:View>
  331. <w:Zoom>0</w:Zoom>
  332. <w:TrackMoves />
  333. <w:TrackFormatting />
  334. <w:PunctuationKerning />
  335. <w:ValidateAgainstSchemas />
  336. <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  337. <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  338. <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  339. <w:DoNotPromoteQF />
  340. <w:LidThemeOther>EN-US</w:LidThemeOther>
  341. <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  342. <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  343. <w:Compatibility>
  344. <w:BreakWrappedTables />
  345. <w:SnapToGridInCell />
  346. <w:WrapTextWithPunct />
  347. <w:UseAsianBreakRules />
  348. <w:DontGrowAutofit />
  349. <w:SplitPgBreakAndParaMark />
  350. <w:EnableOpenTypeKerning />
  351. <w:DontFlipMirrorIndents />
  352. <w:OverrideTableStyleHps />
  353. </w:Compatibility>
  354. <m:mathPr>
  355. <m:mathFont m:val="Cambria Math" />
  356. <m:brkBin m:val="before" />
  357. <m:brkBinSub m:val="&#45;-" />
  358. <m:smallFrac m:val="off" />
  359. <m:dispDef />
  360. <m:lMargin m:val="0" />
  361. <m:rMargin m:val="0" />
  362. <m:defJc m:val="centerGroup" />
  363. <m:wrapIndent m:val="1440" />
  364. <m:intLim m:val="subSup" />
  365. <m:naryLim m:val="undOvr" />
  366. </m:mathPr></w:WordDocument>
  367. </xml><![endif]--><!--[if gte mso 9]><xml>
  368. <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  369. DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  370. LatentStyleCount="267">
  371. <w:LsdException Locked="false" Priority="0" SemiHidden="false"
  372. UnhideWhenUsed="false" QFormat="true" Name="Normal" />
  373. <w:LsdException Locked="false" Priority="0" SemiHidden="false"
  374. UnhideWhenUsed="false" QFormat="true" Name="heading 1" />
  375. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 2" />
  376. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 3" />
  377. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 4" />
  378. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 5" />
  379. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 6" />
  380. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 7" />
  381. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 8" />
  382. <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 9" />
  383. <w:LsdException Locked="false" Priority="39" Name="toc 1" />
  384. <w:LsdException Locked="false" Priority="39" Name="toc 2" />
  385. <w:LsdException Locked="false" Priority="39" Name="toc 3" />
  386. <w:LsdException Locked="false" Priority="39" Name="toc 4" />
  387. <w:LsdException Locked="false" Priority="39" Name="toc 5" />
  388. <w:LsdException Locked="false" Priority="39" Name="toc 6" />
  389. <w:LsdException Locked="false" Priority="39" Name="toc 7" />
  390. <w:LsdException Locked="false" Priority="39" Name="toc 8" />
  391. <w:LsdException Locked="false" Priority="39" Name="toc 9" />
  392. <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" />
  393. <w:LsdException Locked="false" Priority="10" SemiHidden="false"
  394. UnhideWhenUsed="false" QFormat="true" Name="Title" />
  395. <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" />
  396. <w:LsdException Locked="false" Priority="0" Name="Body Text" />
  397. <w:LsdException Locked="false" Priority="11" SemiHidden="false"
  398. UnhideWhenUsed="false" QFormat="true" Name="Subtitle" />
  399. <w:LsdException Locked="false" Priority="22" SemiHidden="false"
  400. UnhideWhenUsed="false" QFormat="true" Name="Strong" />
  401. <w:LsdException Locked="false" Priority="20" SemiHidden="false"
  402. UnhideWhenUsed="false" QFormat="true" Name="Emphasis" />
  403. <w:LsdException Locked="false" Priority="59" SemiHidden="false"
  404. UnhideWhenUsed="false" Name="Table Grid" />
  405. <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" />
  406. <w:LsdException Locked="false" Priority="1" SemiHidden="false"
  407. UnhideWhenUsed="false" QFormat="true" Name="No Spacing" />
  408. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  409. UnhideWhenUsed="false" Name="Light Shading" />
  410. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  411. UnhideWhenUsed="false" Name="Light List" />
  412. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  413. UnhideWhenUsed="false" Name="Light Grid" />
  414. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  415. UnhideWhenUsed="false" Name="Medium Shading 1" />
  416. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  417. UnhideWhenUsed="false" Name="Medium Shading 2" />
  418. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  419. UnhideWhenUsed="false" Name="Medium List 1" />
  420. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  421. UnhideWhenUsed="false" Name="Medium List 2" />
  422. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  423. UnhideWhenUsed="false" Name="Medium Grid 1" />
  424. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  425. UnhideWhenUsed="false" Name="Medium Grid 2" />
  426. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  427. UnhideWhenUsed="false" Name="Medium Grid 3" />
  428. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  429. UnhideWhenUsed="false" Name="Dark List" />
  430. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  431. UnhideWhenUsed="false" Name="Colorful Shading" />
  432. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  433. UnhideWhenUsed="false" Name="Colorful List" />
  434. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  435. UnhideWhenUsed="false" Name="Colorful Grid" />
  436. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  437. UnhideWhenUsed="false" Name="Light Shading Accent 1" />
  438. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  439. UnhideWhenUsed="false" Name="Light List Accent 1" />
  440. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  441. UnhideWhenUsed="false" Name="Light Grid Accent 1" />
  442. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  443. UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" />
  444. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  445. UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" />
  446. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  447. UnhideWhenUsed="false" Name="Medium List 1 Accent 1" />
  448. <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" />
  449. <w:LsdException Locked="false" Priority="34" SemiHidden="false"
  450. UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" />
  451. <w:LsdException Locked="false" Priority="29" SemiHidden="false"
  452. UnhideWhenUsed="false" QFormat="true" Name="Quote" />
  453. <w:LsdException Locked="false" Priority="30" SemiHidden="false"
  454. UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" />
  455. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  456. UnhideWhenUsed="false" Name="Medium List 2 Accent 1" />
  457. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  458. UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" />
  459. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  460. UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" />
  461. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  462. UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" />
  463. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  464. UnhideWhenUsed="false" Name="Dark List Accent 1" />
  465. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  466. UnhideWhenUsed="false" Name="Colorful Shading Accent 1" />
  467. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  468. UnhideWhenUsed="false" Name="Colorful List Accent 1" />
  469. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  470. UnhideWhenUsed="false" Name="Colorful Grid Accent 1" />
  471. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  472. UnhideWhenUsed="false" Name="Light Shading Accent 2" />
  473. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  474. UnhideWhenUsed="false" Name="Light List Accent 2" />
  475. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  476. UnhideWhenUsed="false" Name="Light Grid Accent 2" />
  477. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  478. UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" />
  479. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  480. UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" />
  481. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  482. UnhideWhenUsed="false" Name="Medium List 1 Accent 2" />
  483. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  484. UnhideWhenUsed="false" Name="Medium List 2 Accent 2" />
  485. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  486. UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" />
  487. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  488. UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" />
  489. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  490. UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" />
  491. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  492. UnhideWhenUsed="false" Name="Dark List Accent 2" />
  493. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  494. UnhideWhenUsed="false" Name="Colorful Shading Accent 2" />
  495. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  496. UnhideWhenUsed="false" Name="Colorful List Accent 2" />
  497. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  498. UnhideWhenUsed="false" Name="Colorful Grid Accent 2" />
  499. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  500. UnhideWhenUsed="false" Name="Light Shading Accent 3" />
  501. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  502. UnhideWhenUsed="false" Name="Light List Accent 3" />
  503. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  504. UnhideWhenUsed="false" Name="Light Grid Accent 3" />
  505. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  506. UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" />
  507. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  508. UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" />
  509. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  510. UnhideWhenUsed="false" Name="Medium List 1 Accent 3" />
  511. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  512. UnhideWhenUsed="false" Name="Medium List 2 Accent 3" />
  513. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  514. UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" />
  515. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  516. UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" />
  517. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  518. UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" />
  519. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  520. UnhideWhenUsed="false" Name="Dark List Accent 3" />
  521. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  522. UnhideWhenUsed="false" Name="Colorful Shading Accent 3" />
  523. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  524. UnhideWhenUsed="false" Name="Colorful List Accent 3" />
  525. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  526. UnhideWhenUsed="false" Name="Colorful Grid Accent 3" />
  527. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  528. UnhideWhenUsed="false" Name="Light Shading Accent 4" />
  529. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  530. UnhideWhenUsed="false" Name="Light List Accent 4" />
  531. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  532. UnhideWhenUsed="false" Name="Light Grid Accent 4" />
  533. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  534. UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" />
  535. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  536. UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" />
  537. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  538. UnhideWhenUsed="false" Name="Medium List 1 Accent 4" />
  539. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  540. UnhideWhenUsed="false" Name="Medium List 2 Accent 4" />
  541. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  542. UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" />
  543. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  544. UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" />
  545. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  546. UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" />
  547. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  548. UnhideWhenUsed="false" Name="Dark List Accent 4" />
  549. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  550. UnhideWhenUsed="false" Name="Colorful Shading Accent 4" />
  551. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  552. UnhideWhenUsed="false" Name="Colorful List Accent 4" />
  553. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  554. UnhideWhenUsed="false" Name="Colorful Grid Accent 4" />
  555. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  556. UnhideWhenUsed="false" Name="Light Shading Accent 5" />
  557. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  558. UnhideWhenUsed="false" Name="Light List Accent 5" />
  559. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  560. UnhideWhenUsed="false" Name="Light Grid Accent 5" />
  561. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  562. UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" />
  563. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  564. UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" />
  565. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  566. UnhideWhenUsed="false" Name="Medium List 1 Accent 5" />
  567. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  568. UnhideWhenUsed="false" Name="Medium List 2 Accent 5" />
  569. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  570. UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" />
  571. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  572. UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" />
  573. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  574. UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" />
  575. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  576. UnhideWhenUsed="false" Name="Dark List Accent 5" />
  577. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  578. UnhideWhenUsed="false" Name="Colorful Shading Accent 5" />
  579. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  580. UnhideWhenUsed="false" Name="Colorful List Accent 5" />
  581. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  582. UnhideWhenUsed="false" Name="Colorful Grid Accent 5" />
  583. <w:LsdException Locked="false" Priority="60" SemiHidden="false"
  584. UnhideWhenUsed="false" Name="Light Shading Accent 6" />
  585. <w:LsdException Locked="false" Priority="61" SemiHidden="false"
  586. UnhideWhenUsed="false" Name="Light List Accent 6" />
  587. <w:LsdException Locked="false" Priority="62" SemiHidden="false"
  588. UnhideWhenUsed="false" Name="Light Grid Accent 6" />
  589. <w:LsdException Locked="false" Priority="63" SemiHidden="false"
  590. UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" />
  591. <w:LsdException Locked="false" Priority="64" SemiHidden="false"
  592. UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" />
  593. <w:LsdException Locked="false" Priority="65" SemiHidden="false"
  594. UnhideWhenUsed="false" Name="Medium List 1 Accent 6" />
  595. <w:LsdException Locked="false" Priority="66" SemiHidden="false"
  596. UnhideWhenUsed="false" Name="Medium List 2 Accent 6" />
  597. <w:LsdException Locked="false" Priority="67" SemiHidden="false"
  598. UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" />
  599. <w:LsdException Locked="false" Priority="68" SemiHidden="false"
  600. UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" />
  601. <w:LsdException Locked="false" Priority="69" SemiHidden="false"
  602. UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" />
  603. <w:LsdException Locked="false" Priority="70" SemiHidden="false"
  604. UnhideWhenUsed="false" Name="Dark List Accent 6" />
  605. <w:LsdException Locked="false" Priority="71" SemiHidden="false"
  606. UnhideWhenUsed="false" Name="Colorful Shading Accent 6" />
  607. <w:LsdException Locked="false" Priority="72" SemiHidden="false"
  608. UnhideWhenUsed="false" Name="Colorful List Accent 6" />
  609. <w:LsdException Locked="false" Priority="73" SemiHidden="false"
  610. UnhideWhenUsed="false" Name="Colorful Grid Accent 6" />
  611. <w:LsdException Locked="false" Priority="19" SemiHidden="false"
  612. UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" />
  613. <w:LsdException Locked="false" Priority="21" SemiHidden="false"
  614. UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" />
  615. <w:LsdException Locked="false" Priority="31" SemiHidden="false"
  616. UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" />
  617. <w:LsdException Locked="false" Priority="32" SemiHidden="false"
  618. UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" />
  619. <w:LsdException Locked="false" Priority="33" SemiHidden="false"
  620. UnhideWhenUsed="false" QFormat="true" Name="Book Title" />
  621. <w:LsdException Locked="false" Priority="37" Name="Bibliography" />
  622. <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" />
  623. </w:LatentStyles>
  624. </xml><![endif]--><!--[if gte mso 10]>
  625. <style>
  626. /* Style Definitions */
  627. table.MsoNormalTable
  628. {mso-style-name:"Table Normal";
  629. mso-tstyle-rowband-size:0;
  630. mso-tstyle-colband-size:0;
  631. mso-style-noshow:yes;
  632. mso-style-priority:99;
  633. mso-style-parent:"";
  634. mso-padding-alt:0in 5.4pt 0in 5.4pt;
  635. mso-para-margin:0in;
  636. mso-para-margin-bottom:.0001pt;
  637. mso-pagination:widow-orphan;
  638. font-size:12.0pt;
  639. font-family:"Times New Roman","serif";
  640. mso-bidi-font-family:"Times New Roman";
  641. mso-bidi-theme-font:minor-bidi;}
  642. </style>
  643. <![endif]-->&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img width="200" vspace="5" align="right" border="5" hspace="5" height="140" alt="" src="http://www.ediscoverylawreview.com/uploads/image/images(1).jpg" />It is no secret that a large-scale document production, especially one involving extensive ESI, can come at a high cost.<span style="mso-spacerun:yes">&nbsp; </span>Although courts have been split in deciding which party is responsible for bearing this cost, the New York Appellate Division, First Department determined last week that the cost of searching for, retrieving and producing ESI should be borne by the producing party.<span style="mso-spacerun:yes">&nbsp; </span><span style="mso-spacerun:yes">&nbsp;&nbsp;</span></p>
  644. <p class="MsoBodyText"><span style="mso-tab-count:1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>In <i style="mso-bidi-font-style:normal">U.S. Bank Nat. Assoc. v. GreenPoint Mortgage Funding, Inc.</i>, 2012 N.Y. Slip Op 01515 (N.Y. App. Div. Feb. 28, 2010), <span style="mso-spacerun:yes">&nbsp;</span>plaintiff, assignee of securitized mortgage loans, sued defendant, originator of the loans, for &ldquo;gross violations&rdquo; of the representations and warranties regarding the attributes of the loans and the policies and practices under which the loans were originated, underwritten and serviced.<span style="mso-spacerun:yes">&nbsp; </span></p>
  645. <p class="MsoBodyText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In February 2009, plaintiff served defendant with their first request for production of documents.<span style="mso-spacerun:yes">&nbsp; </span>Rather than producing the documents requested, on April 28, 2009, defendant submitted a letter to the court seeking a ruling on, among other things, whether the production should be conditioned on plaintiff&rsquo;s confirmation that it would pay the cost of production.<span style="mso-spacerun:yes">&nbsp;&nbsp; </span>On December 11, 2009, defendant moved to stay discovery and for a protective order conditioning production of discovery on compliance with a protocol that provided that each party would pay for its own discovery requests.<span style="mso-spacerun:yes">&nbsp; </span>Plaintiff opposed the motion arguing that they should not have to bear the costs of production, which could run into the millions of dollars.<span style="mso-spacerun:yes">&nbsp; </span>On April 13, 2010, the court denied defendant&rsquo;s motion for a protective order but endorsed its contention that the party seeking discovery bears the cost of production.<span style="mso-spacerun:yes">&nbsp; </span></p>
  646. <p style="text-indent:.5in" class="MsoBodyText">The Appellate Division pointed out that this area of law has become unsettled as a result of the high cost of locating and producing ESI.<span style="mso-spacerun:yes">&nbsp; </span>While some courts have held that the requesting party should bear the entire cost of discovery, others, including the Southern District of New York in <i style="mso-bidi-font-style:normal">Zubulake v. UBS Warburg, LLC</i>, 217 F.R.D. 309, 317-318 (S.D.N.Y. 2003), have held that the cost should fall on the producing party.<span style="mso-spacerun:yes">&nbsp; </span></p>
  647. <p style="text-indent:.5in" class="MsoBodyText">The Appellate Division determined that <i style="mso-bidi-font-style:normal">Zubulake</i> presents the most practical framework for allocating discovery costs.<span style="mso-spacerun:yes">&nbsp; </span><i style="mso-bidi-font-style:normal">Zubulake</i> requires, consistent with the Federal Rules of Civil Procedure, &ldquo;the producing party to bear the initial cost of searching for, retrieving and producing discovery, but permits the shifting of costs between the parties.&rdquo;<span style="mso-spacerun:yes">&nbsp; </span>When determining whether costs should be shifted, the court continued, courts should follow the seven <i style="mso-bidi-font-style:normal">Zubulake</i> factors, which are:</p>
  648. <p style="margin-top:6.0pt;margin-right:0in;margin-bottom:
  649. 0in;margin-left:.5in;margin-bottom:.0001pt" class="MsoBodyText">(1) the extent to which the request is specifically tailored to discover relevant information;</p>
  650. <p style="margin-top:6.0pt;text-indent:.5in" class="MsoBodyText">(2) the availability of such information from other sources;</p>
  651. <p style="margin-top:6.0pt;text-indent:.5in" class="MsoBodyText">(3) the total cost of production, compared to the amount in controversy;</p>
  652. <p style="margin-top:6.0pt;text-indent:.5in" class="MsoBodyText">(4) the total cost of production, compared to the resources available to each party;</p>
  653. <p style="margin-top:6.0pt;text-indent:.5in" class="MsoBodyText">(5) the relative ability of each party to control costs and its incentive to do so;</p>
  654. <p style="margin-top:6.0pt;text-indent:.5in" class="MsoBodyText">(6) the importance of the issues at stake in the litigation; and</p>
  655. <p style="margin-top:6.0pt;text-indent:.5in" class="MsoBodyText">(7) the relative benefits to the parties of obtaining the information.</p>
  656. <p class="MsoBodyText"><span style="mso-tab-count:1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>The Appellate Division found this rule controlling for three reasons.<span style="mso-spacerun:yes">&nbsp; </span>First, requiring the producing party to bear its own costs of discovery supports &ldquo;the strong public policy favoring resolving disputes on their merits.&rdquo;<span style="mso-spacerun:yes">&nbsp; </span>Second, commentators and courts have recently called into question the validity of the &ldquo;requestor pays&rdquo; rule.<span style="mso-spacerun:yes">&nbsp; </span>Third, this standard is consistent with the long-standing New York rule that expenses incurred in connection with disclosure are to be paid by the respective producing parties and said expenses may be taxed as disbursements by the prevailing party.<span style="mso-spacerun:yes">&nbsp; </span></p>
  657. <p class="MsoBodyText"><span style="mso-tab-count:1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>The Appellate Division applied this rule and determined that defendant&rsquo;s motion for a protective order was premature.<span style="mso-spacerun:yes">&nbsp; </span>Defendant should have first made a motion to limit or strike plaintiff&rsquo;s discovery request on the ground that it was overly broad, irrelevant, or unduly burdensome.<span style="mso-spacerun:yes">&nbsp; </span>If defendant believed costs for producing ESI were still prohibitive after resolution of that motion, defendant should have then filed a motion for the costs to be shifted to the plaintiff. <span style="mso-spacerun:yes">&nbsp;</span>Because the record contained no evidence supporting defendant&rsquo;s proposed fee structure, the court refused to offer an opinion on the propriety of shifting costs in this matter.<span style="mso-spacerun:yes">&nbsp; </span></p>
  658. <p class="MsoBodyText"><span style="mso-tab-count:1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>Whether other jurisdictions follow New York&rsquo;s lead is yet to be seen.<span style="mso-spacerun:yes">&nbsp; </span>Stay tuned to ediscoverylawreview.com for further details and analysis of this emerging issue.<span style="mso-spacerun:yes">&nbsp; </span></p>]]></description>
  659.         <link>http://www.ediscoverylawreview.com/2012/03/articles/new-york-appellate-division-rules-producing-party-must-bear-the-cost-of-esi-production/</link>
  660.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/03/articles/new-york-appellate-division-rules-producing-party-must-bear-the-cost-of-esi-production/</guid>
  661.         <category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/tags">cost</category><category domain="http://www.ediscoverylawreview.com/tags">document</category><category domain="http://www.ediscoverylawreview.com/tags">e-discovery</category><category domain="http://www.ediscoverylawreview.com/tags">production</category>
  662.         <pubDate>Tue, 06 Mar 2012 08:37:17 -0800</pubDate>
  663.         <dc:creator>Calli Varner</dc:creator>
  664.      
  665.      </item>
  666.            <item>
  667.         <title>Magistrate Judge Peck&apos;s Message to the Bar:  Predictive Coding Should Be &quot;Seriously Considered&quot;</title>
  668.         <description><![CDATA[<p><img alt="" align="left" width="100" height="151" src="http://www.ediscoverylawreview.com/uploads/image/E-Disco Update.jpg" /></p>
  669. <p style="line-height: 200%; margin: 12pt 0in 0pt">Ediscoverylawreview.com first discussed this emerging issue in its blog post on February 15, 2012.&nbsp;As anticipated, Magistrate Judge Peck issued an opinion detailing his reasons for authorizing the use of predictive coding in <i>Da Silva Moore v. Publicis Group</i>, No. 11-CV-1279 (S.D.N.Y. Feb. 25, 2012).&nbsp;Judge Peck&rsquo;s position on predictive coding can be summarized by a single statement in his Opinion:&nbsp;&ldquo;What the Bar should take away from this Opinion is that computer-assisted review is an available tool and should be seriously considered for use in large-data-volume cases where it may save the producing party (or both parties) significant amounts of legal fees in document review.&rdquo;</p>
  670. <p style="line-height: 200%; margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; As Judge Peck noted, this Opinion appears to be the first wherein the Court approved predictive coding.&nbsp;He emphasized that while manual document reviews are still considered the &ldquo;gold standard,&rdquo; studies have shown that &ldquo;computerized searches are at least as accurate, if not more so, than manual review.&rdquo;&nbsp;Even keyword searches, in Judge Peck&rsquo;s opinion, are the equivalent of a game of &ldquo;Go Fish&rdquo; because the &ldquo;requesting party guesses which keywords might produce evidence to support its case without having much, if any, knowledge of the responding party&rsquo;s &lsquo;cards.&rsquo; <u>i.e.</u>, the terminology used by the responding party&rsquo;s custodians.&rdquo;</p>
  671. <p style="line-height: 200%; margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Judge Peck listed five considerations in his approving the use of predictive coding:</p>
  672. <p style="margin: 12pt 1in 0pt">(1) the parties&rsquo; agreement; (2) the vast amount of ESI to be reviewed (over three million documents); (3) the superiority of computer-assisted review to the available alternatives (<u>i.e.</u>, linear manual review or keyword searches); (4) the need for cost effectiveness and proportionality under Rule 26(b)(2)(C); and (5) the transparent process proposed by [the defendant].</p>
  673. <p style="line-height: 200%; margin: 12pt 0in 0pt">Judge Peck particularly emphasized the importance of the transparency that the defendant used in its proposed ESI search protocol and the presence of e-discovery vendors at hearings to assist the Court in understanding various ESI issues.</p>
  674. <p style="line-height: 200%; margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; While Judge Peck recognized that predictive coding was not appropriate in every case, he emphasized that it should be considered in large-scale matters.&nbsp;Importantly, he stated, &ldquo;[c]ounsel no longer have to worry about being the &lsquo;first&rsquo; or &lsquo;guiena pig&rsquo; for judicial acceptance of computer-assisted review.&rdquo;&nbsp;As he stated, predictive coding &ldquo;now can be considered judicially-approved for use in appropriate cases.&rdquo;</p>
  675. <p style="line-height: 200%; margin: 12pt 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Predictive coding is a tool that should be examined and may be appropriate in a number of cases.&nbsp;It is important to involve counsel at the beginning of litigation so that document review tools, including predictive coding, can be considered for the matter and so that the company can be transparent &ndash; with the Court and its adversary &ndash; as to its e-discovery efforts.</p>]]></description>
  676.         <link>http://www.ediscoverylawreview.com/2012/03/articles/opinions/magistrate-judge-pecks-message-to-the-bar-predictive-coding-should-be-seriously-considered/</link>
  677.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/03/articles/opinions/magistrate-judge-pecks-message-to-the-bar-predictive-coding-should-be-seriously-considered/</guid>
  678.         <category domain="http://www.ediscoverylawreview.com/articles">Opinions</category>
  679.         <pubDate>Fri, 02 Mar 2012 13:03:48 -0800</pubDate>
  680.         <dc:creator>F Brenden Coller</dc:creator>
  681.      
  682.      </item>
  683.            <item>
  684.         <title>Federal Court Incentivizes Narrow e-Discovery Through Cost Shifting</title>
  685.         <description><![CDATA[<p><img hspace="6" alt="" align="left" width="212" height="123" src="http://www.ediscoverylawreview.com/uploads/image/e-discovery.jpg" />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A case does not have to involve complex commercial litigation or technical patent disputes to create serious electronic discovery problems.&nbsp;An excellent example of just how messy e-Discovery can get, even with age-old claims, is found in <i>Cannata, et al. v. Wyndham Worldwide Corp., et al.</i>.&nbsp;There, employee plaintiffs brought claims against employer defendants, alleging sexual discrimination, sexual harassment, hostile work environment, constructive discharge, and retaliation. &nbsp;In an order issued February 17, 2012, Magistrate Judge Cam Ferenbach of the United States District Court of Nevada took charge of an ongoing ESI back-and-forth between plaintiffs and defendants in this case.</p>
  686. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Over the course of the litigation, plaintiffs sought to broaden the scope of e-Discovery by increasing the number of search terms and custodians, while the defendants insisted on strictly adhering to a prior court order requiring narrow search terms. The prior order permitted only 10 search terms and avoided using &ldquo;or&rdquo; within the context of the searches if at all possible.&nbsp;Defendants further objected to including sexual terms in the searches, claiming that they were irrelevant because they had not been mentioned in any facts asserted by plaintiffs or in any depositions.</p>
  687. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Plaintiffs insisted that such an approach would not yield all of the evidence relevant to their case. Plaintiffs instead proposed that the parties jointly engage in a process by which the plaintiffs supply an initial list of 100 search terms and 50 email custodians.&nbsp;Defendants would then run the search terms through the custodians&rsquo; files and provide a search term &ldquo;hit&rdquo; report to the plaintiffs.&nbsp;Plaintiffs would then work with defendants to determine whether the searches were yielding too many duplicate items or irrelevant documents.</p>
  688. <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Not surprisingly, this joint approach did not work and the court decided that it must appoint an e-Discovery Special Master to oversee the process.&nbsp;The court got even more specific though, stating that the process would include only narrowly tailored search terms. &ldquo;Indiscriminate terms, such as a defendant&rsquo;s name, are inappropriate unless combined with narrowing search criteria that sufficiently reduce the risk of overproduction.&rdquo;&nbsp;The court went on to even provide the methods for conducting the searches (e.g. &ldquo;Each disjunctive combination of analogous words shall be delimited by parentheses&rdquo;).</p>
  689. <p style="text-indent: 0.5in; margin: 0in 0in 0pt">To incentivize a narrowly tailored process, the court ordered that plaintiffs would be required to reimburse defendants for the e-Discovery costs incurred in complying with the order if the final set of combined search terms and sites searched exceeded 40.&nbsp;For each term over 40, plaintiffs would reimburse defendants 5% of their e-Discovery compliance costs from the date of the February 17, 2012 order through the end of discovery.&nbsp;</p>
  690. <p style="text-indent: 0.5in; margin: 0in 0in 0pt">As the <i>Cannata v. Wyndham </i>court recognized, the e-discovery process can be expensive and burdensome, even when narrowly tailored to address the parties&rsquo; claims.&nbsp;Just because a claim seems straightforward and grounded in the real world, rather than electronic data, that does not mean that parties should not begin planning and budgeting for e-Discovery as early as possible.&nbsp;&nbsp;&nbsp;</p>
  691. <p style="margin: 0in 0in 0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>]]></description>
  692.         <link>http://www.ediscoverylawreview.com/2012/02/articles/federal-court-incentivizes-narrow-ediscovery-through-cost-shifting/</link>
  693.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/02/articles/federal-court-incentivizes-narrow-ediscovery-through-cost-shifting/</guid>
  694.         <category domain="http://www.ediscoverylawreview.com/">Articles</category>
  695.         <pubDate>Tue, 28 Feb 2012 08:11:23 -0800</pubDate>
  696.         <dc:creator>Lisa Myers</dc:creator>
  697.      
  698.      </item>
  699.            <item>
  700.         <title>All&apos;s &quot;Well&quot; for Halliburton: No Sanctions Result from BP&apos;s Spoliation Claims</title>
  701.         <description><![CDATA[<p><img alt="" align="left" width="191" height="136" src="http://www.ediscoverylawreview.com/uploads/image/Pic for Blog Posting.bmp" /><span style="font-size: larger">United States District Judge Carl Barbier recently affirmed Magistrate Judge Sally Shushan&rsquo;s denial of BP&rsquo;s motion for spoliation sanctions against Halliburton Energy Services, Inc.&nbsp;BP alleged that Halliburton &ldquo;intentionally destroyed evidence&rdquo; and &ldquo;violated the Court&rsquo;s orders regarding the production of documents.&rdquo;&nbsp;For these violations, BP sought sanctions including an adverse finding against Halliburton, attorneys&rsquo; fees, and an order compelling Halliburton to deliver a computer used in producing 3D modeling results.&nbsp;Judge Shushan refused to make an adverse finding and refused to award attorneys&rsquo; fees but ordered Halliburton to deliver the modeling computer for forensic testing.&nbsp;</span></p>
  702. <p style="margin: 12pt 0in 0pt"><span style="font-size: larger">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; By way of background, one of Halliburton&rsquo;s main defenses in this multi-district litigation included the assertion that foam cement that Halliburton pumped into the Macondo well on April 19, 2010 was stable.&nbsp;Access to Halliburton&rsquo;s testing results was integral to prove or disprove this defense.&nbsp;Another of Halliburton&rsquo;s main defenses involved BP&rsquo;s alleged engineering decisions to use fewer centralizers than Halliburton had recommended inside the well.&nbsp;Halliburton&rsquo;s proprietary Displace 3D Simulator (&ldquo;Simulator&rdquo;) allowed engineers to predict with accuracy the possibility of channeling.&nbsp;Halliburton employees conducted an analysis of the April 19 cementing operation using the Simulator that allegedly indicated that there was no channeling at the Macondo well.</span></p>
  703. <p style="margin: 12pt 0in 0pt"><span style="font-size: larger">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BP asserted that Halliburton intentionally destroyed the results of physical slurry testing as it related to foam cement used in the wells because &ldquo;it wanted to eliminate any risk that this evidence would be used against it at trial.&rdquo;&nbsp;Judge Shushan, however, determined that BP failed to establish the three elements necessary to secure an adverse inference: 1) Halliburton&rsquo;s duty to preserve; 2) Halliburton&rsquo;s bad faith breach of the duty; and 3) that BP was prejudiced.&nbsp;Judge Shushan determined that BP had not demonstrated prejudice and refused BP&rsquo;s request for an adverse finding as to the cement tests.&nbsp;</span></p>
  704. <p style="margin: 12pt 0in 0pt"><span style="font-size: larger">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Similarly, BP sought Halliburton&rsquo;s post-incident Simulator modeling.&nbsp;BP argued that the proprietary nature of the model rendered it unavailable to BP or other litigants.&nbsp;Halliburton, however, revealed that the results of the Simulator modeling were &ldquo;gone.&rdquo;&nbsp;BP then argued that Halliburton should transfer the computer on which the Simulator modeling had been completed to a third party for forensic testing.&nbsp;Halliburton agreed to submit the computer to a third-party and to make its software available to BP pursuant to a software escrow agreement.&nbsp;Judge Shushan ordered Halliburton to produce the computer for forensic testing and ordered the parties to split the costs.&nbsp;</span></p>
  705. <p style="margin: 12pt 0in 0pt"><span style="font-size: larger">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The mysterious disappearance of evidence in most cases would result in a plethora of sanctions.&nbsp;How, then, did Halliburton fare so well?&nbsp;One possible reason might be Halliburton&rsquo;s contention that the cement testing that BP referenced used off-the shelf materials that had little or no relevance to the case.&nbsp;Perhaps this fact contributed to Master Shushan&rsquo;s finding that BP was not prejudiced.&nbsp;Another likely reason includes Halliburton&rsquo;s willingness to cooperate with BP to conduct forensic testing of its computer.&nbsp;In contentious cases, a little cooperation goes a long way.&nbsp;In all cases, especially in the e-discovery context, sound record-keeping and cooperation with all parties remains essential to avoiding costly and embarrassing sanctions.&nbsp;</span></p>]]></description>
  706.         <link>http://www.ediscoverylawreview.com/2012/02/articles/alls-well-for-halliburton-no-sanctions-result-from-bps-spoliation-claims/</link>
  707.         <guid isPermaLink="false">http://www.ediscoverylawreview.com/2012/02/articles/alls-well-for-halliburton-no-sanctions-result-from-bps-spoliation-claims/</guid>
  708.         <category domain="http://www.ediscoverylawreview.com/tags">Adverse</category><category domain="http://www.ediscoverylawreview.com/">Articles</category><category domain="http://www.ediscoverylawreview.com/articles">Sanctions</category><category domain="http://www.ediscoverylawreview.com/tags">attorneys&apos;</category><category domain="http://www.ediscoverylawreview.com/tags">bad</category><category domain="http://www.ediscoverylawreview.com/tags">cooperation</category><category domain="http://www.ediscoverylawreview.com/tags">faith</category><category domain="http://www.ediscoverylawreview.com/tags">fees</category><category domain="http://www.ediscoverylawreview.com/tags">finding</category><category domain="http://www.ediscoverylawreview.com/tags">spoliation</category>
  709.         <pubDate>Tue, 21 Feb 2012 10:15:33 -0800</pubDate>
  710.         <dc:creator>Diana Lin</dc:creator>
  711.      
  712.      </item>
  713.      
  714.   </channel>
  715. </rss>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//feeds.lexblog.com/E-discoveryLawReview

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda