Spoliation By Plaintiff? Deleting Text Messages Can Result In Court Sanctions

This case provides an important lesson for any person involved in a lawsuit involving text messages as evidence. Here, a group of employees was suing their employer for discrimination under Title VII. When the discovery process began, the defendants requested a number of text messages relating to the conduct of the employees during the relevant time period of the discrimination. These text messages were permitted to be discoverable by the defendant and the plaintiff was ordered to turn over the relevant text messages. The plaintiffs’ lawyer then gave the plaintiffs instructions to preserve all data relevant to the case; otherwise they could face sanctions by the court, which could negatively impact their suit. Spoliation is the legal term for deleting or destroying information sought by the opposing party. This is precisely what occurred here. Apparently the plaintiffs felt that if they simply deleted a portion of the requested text messages that the defendant would have no way to access that information and thus the problem would be solved; if there even was a problem to begin with. When the defendant discovered that these texts had not been turned over with the rest of the discovery they inquired about their whereabouts. The plaintiffs responded that the texts had been deleted. Obviously perturbed, the defendant then subpoenaed the mobile carrier, T-Mobile, and recovered the deleted texts. However, now the plaintiffs had a problem; they had deliberately attempted to conceal and destroy relevant information. The defendant then filed a motion to dismiss based on the actions of the plaintiff. The court granted the motion in part but denied the dismissal of all charges.  Though, the court did impose sanctions upon the plaintiff, which carried the potential to seriously harm their case even if everything else went well. The simple lesson here is that you should never conceal, delete, or destroy any relevant information sought by the opposing party. Ultimately the content of the text messages remains unimportant in light of the plaintiffs’ spoliation. The plaintiffs should have followed their lawyer’s instruction to preserve the information. Had they turned over the information, their lawyer would have been able to combat the text messages in court in front of the jury. However, due to their actions, they were sanctioned and essentially handcuffed their counselor from undercutting any information contained within the text messages. Spoliation is never the answer even if you are required to turn over information that does not weigh in your favor. These plaintiffs learned the hard way; do not make the same mistake and follow your lawyer’s instructions.  A.S. Mitchell received his B.A. in Political Science from the University of Central Florida (2008). He will receive his J.D. from Seton Hall University School of Law in 2015. Want to read more articles like this?  Sign up for our post notification newsletter, here.

What Happens When Video Evidence Is Changed, But Not Deleted?

In May 2014, Hon. Janet Bond Arterton, U.S.D.J. for the District of Connecticut ruled that sanctions were not appropriate in a case involving the conversion of a security video’s native format.  Plaintiff Robert Crawford brought a motion for spoliation sanctions—including an adverse-inference instruction and monetary sanctions—against the Defendant City of New London for an alleged failure to preserve a hard drive containing video of Crawford’s arrest.  Plaintiff, whose underlying claim involves excessive force issues, suggested that the original format of a security video may have been capable of being enhanced, and as such, Defendants had a duty to preserve that original version, and turn it over for discovery.  Judge Arterton disagreed. In examining whether sanctions were appropriate, the court first set about defining the parameters of spoliation. The court noted “[s]poliation is the destruction or significant alteration of evidence, or the failure to preserve property for another’s use as evidence in pending or reasonably foreseeable litigation.” Crawford v. City of New London, 2014 WL 2168430, *2 (D. Conn. May 23, 2014) (quoting West v. Goodyear Tire & Rubber, Co., 167 F.3d 776, 779 (2d Cir. 1999)).  Later, the court analyzed the adverse-inference charge, and articulated “[a] party seeking an adverse inference instruction based on the destruction of evidence must establish (1) that the party having control over the evidence had an obligation to preserve it at the time it was destroyed; (2) that the records were destroyed with a culpable state of mind; and (3) that the destroyed evidence was relevant to the party’s claim or defense such that a reasonable trier of fact could find that it would support that claim or defense.” Id. (quoting Chin v. Port. Auth. of N.Y. & N.J., 685 F.3d 135, 162 (2d Cir. 2012)). Here, the court noted that Defendants’ duty to preserve stemmed from a hold letter received pursuant to the Freedom of Information Act on June 24—nearly five months after the incident took place, and more than four months after New London’s retention policy allows for transferring of data to portable storage.  As such, while the Defendants certainly had a duty to preserve, there was no specific need for multiple copies of duplicative information.  New London hadn’t breached the preservation duty. But what about “Significant Alteration?”  Spoliation isn’t just about destruction.  Plaintiffs argued that in converting the video evidence from the format present on the hard drive to the portable storage versions on DVD, Defendants sacrificed the integrity of metadata, or of the files themselves such that they could no longer be enhanced for use in trial presentation.  This novel argument suggested that were enhanced versions of the video available, perhaps the jury could see that Crawford’s arrest on February 4, 2010, was enacted using excessive force. The court was not persuaded by this argument.  Testimony from the City of New London’s Chief Information Officer indicated that the conversion to DVD was lossless, in that the new format preserved the video in every material way.  Absent proof to the alternative, the moving party was unable to demonstrate “that the destroyed [or significantly altered] evidence was relevant . . . ” under the standards set forth in Federal Rule of Evidence 401. Defendants were prepared for litigation, and they reasonably preserved all necessary data responsive to discovery request.  Defendants’ retention policy for the original hard drive housing security footage is acceptable, and preserving the data on portable media after formatting the drive is an added precaution going well-beyond the standard of care.  Crawford is fortunate that Judge Arterton didn’t force Plaintiffs to cover the costs of responding to the motion—if this author was on the bench, he might have. Kevin received a B.S. in Political Science from the University of Scranton (2009), and will receive his J.D. from Seton Hall University School of Law in 2015.  Prior to joining the Seton Hall community, Kevin worked as an eDiscovery professional at two large “white-shoe” law firms in Manhattan. Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Is a Preservation Order Against a Resigning Employee Inappropriate As To An Employer-Supplied Computer?

It is common for an employer to supply company-owned laptop computers to its employees for doing their work. It is also not uncommon for such an employee to be involved in litigation with a third party where the company-owned computers used by the employee are subject to potential electronic discovery. Knowledge or expectation of such litigation by the employee gives rise to a duty to preserve. In many situations, the employee ends up resigning from the employment and having to return the company laptop computer to the employer.  In this whole sequence of events, what should the employee do as to the laptop computer in order to satisfy his/her duty to preserve and thus defeat a motion for preservation order by his/her adversarial? The case of Cognate Bioservices v. Smith sheds some light onto this issue. In Cognate Bioservices v. Smith, Cognate sued Smith for violations of the Computer Fraud Abuses Act and misappropriation of products and trade Secret in the Northern Division of the District Court for the District of Maryland. Smith was previously the CEO of Cognate and had access to trade secrets stored on Cognate servers as well as in a laptop computer provided to Smith by Cognate. Smith then resigned and became the head of the US operation of an Israeli competitor of Cognate, MacroCure. Smith, however, did not give the laptop back to Cognate until more than two years after his termination with Cognate. During that time, he had accessed the Cognate server as well as the laptop computer still in his hands, giving rise to the suspicion by Cognate that he had downloaded trade secrets from Cognate.  For his work with MacroCure, Smith bought a second laptop (the Dell laptop) and was reimbursed for the purchase price by MacroCure. Soon after the start of this litigation in the federal court, Smith resigned from MacroCure. Cognate moved the Court to issue a preservation order as to the Dell laptop and Smith objected. This federal action was filed on June 19, 2013. Smith gave Cognate notice that the Dell laptop he used in connection with his employment at MacroCure would be returned after his resignation. Smith then returned the Dell laptop to MacroCure in late July or early August 2013. The motion for preservation order was filed August 15, 2013. After the filing of the motion, Smith contacted the person to whom he returned the Dell laptop, Idan Peer, and requested that he not dispose or delete any of the files on the computer. In addition, Smith’s counsel provided Cognate with Peer’s mailing address.  Cognate argue that the preservation order is still necessary because, by returning the Dell laptop, Smith has demonstrated the urgent need for an order preserving evidence and he also appears to have the practical ability to obtain the return of that evidence. The court disagreed and held that Smith compiled with his duty to preserve material evidence with respect to the Dell laptop. Court-issued preservation order is inappropriate when such duty is met and there is no evidence showing risk of spoliation of evidence. The court is more willing to rely on the duty to preserve to regulate conduct without resorting to preservation orders. This is regardless of whether there is undue burden for Smith to obtain a return of the Dell laptop. Thus, if an employee gets into a similar situation, to avoid a preservation order, make sure that notice about the return of the employer-provided computer is given to the adversarial, that the person receiving the computer is notified as to preserving the data on the computer, and that the information about the custody of the computer is given to the adversarial. Gang Chen is a Senior Segment Manager in the Intellectual Property Business Group of Alcatel-Lucent, and a fourth-year evening student at Seton Hall University School of Law focusing on Patent Law. Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Is “Discovery On Discovery” Improper?, Part 2

In Freedman v. Weatherford Int’l, Ltd., Weatherford hired law firm Latham & Watkins to review allegations of security fraud made to Weatherford’s whistleblower hotline. Latham found no evidence of fraud. However, a second investigation was conducted by Davis Polk & Wardwell, LLP. Plaintiff’s alleged that Davis’s second investigation reveal that Latham actually discovered evidence of wrongdoing. Plaintiffs sought reports comparing the results of Weatherford’s production with search terms and productions related to the two investigations and search terms proposed by the plaintiff, in order to test the adequacy and reasonableness of Weatherford’s initial production. Weatherford objected, noting that Plaintiff had no legal basis for its request and its requested production was “hugely burdensome.” The District Court for the Southern District of New York held that the plaintiff’s request was “outside the bounds of Rule 26 of the Federal Rules of Civil Procedure . . . [because they did] . . . not proffer an adequate factual basis for their belief that the production [was] deficient.” Plaintiff’s claim that Weatherford’s production was deficient because 85% of the pages produced related to different case was too conclusory. Furthermore, the Court was not surprised that Weatherford used dramatically different search terms here compared to search terms used in the two investigations and a related action, because of the differing class periods and varying false statements. The court also addresses arguments related to Subject matter waiver and the crime-fraud exception of the attorney-client privilege, but these arguments were not related to e-discovery. Aaron Cohen, a Seton Hall University School of Law student (Class of 2015), focused his studies in the area of Family Law. He participated in the Seton Hall Center for Social Justice’s Family Law Clinic. After graduation, he will clerk for a judge in the Superior Court of New Jersey, Family Division. Prior to law school, he was a 2011 cum laude graduate of The George Washington University Columbian College of Arts and Sciences, where he earned a B.A. in Psychology. Want to read more articles like this?  Sign up for our post notification newsletter, here.

To Preserve or Not to Preserve? THAT Is the Question

This dispute stems from Plaintiff Linda Riley’s slip and fall at a Marriott hotel in Hawaii (her husband, James, is another named plaintiff).  As a result of this fall, in simple terms, Riley broke her right leg and sustained permanent nerve damage including sensory motor loss and weakness in her right foot.  Riley contends Marriott was negligent for failing to remove accumulated water (it had been raining that day), provide a non-slip surface, or provide warning signs. The entire accident was recorded on Marriott’s security cameras, and according to the loss prevention manager, the footage is maintained for 30 days.  However, during discovery, instead of being provided with several hours of footage, Riley was only provided with about 7 minutes; the rest was destroyed.  The footage released began about one minute before Riley’s accident, and ended before Riley was even lifted off of the ground! Plaintiff rightfully believed she was prejudiced because:  (1) she is unable to determine how much water was removed from the location and how long it took hotel staff to remove it, and (2) that the loss prevention manager’s testimony regarding the footage cannot be meaningfully challenged because the footage was gone.  This recording was apparently turned over to the Marriott’s liability insurance carrier, but neither Marriott’s investigation into its destruction (if one occurred) nor the results of any such investigation were ever disclosed.  Even maintenance logs—that might have also denoted any water that was removed from the floor or the placement of any signs—were also allegedly destroyed. From this, the court “easily” found Marriott had a duty to preserve both the sweep logs and the video footage from the day of the accident.  Further, the court recognized Marriott’s failure to offer any justification for its failure to preserve the evidence.  For these actions, the court found “at a minimum, gross negligence.”  The question then turned to imposing sanctions. Fortunately for Marriott, their answer was not stricken.  Nonetheless, their failure to preserve evidence still resulted in an adverse inference instruction regarding the video footage, or lack thereof.  This means the absence of a recording can, at trial, corroborate Plaintiffs’ statements that there were no warning signs at the time of the accident and that water had also accumulated on the floor.  Of note here, the jury would not be required to make such an inference.  However, Marriott might not be eager to take that chance.          Samuel is in the Seton Hall University School of Law Class of 2015 pursuing the Intellectual Property concentration. He received his master’s from the Rutgers Graduate School of Biomedical Sciences and became a registered patent agent prior to entering law school.  Want to read more articles like this?  Sign up for our post notification newsletter, here.

What Happens When the Smoking Gun is Thrown in the Recycling Bin?

In January 2014, the Hon. Lawrence E. Kahn in the U.S. District Court for the Northern District of New York granted plaintiff Dataflow, Inc.’s motion for sanctions in a case regarding deleted email correspondence.  Sanctions took the form of the often-case-ending adverse inference, with the judge reserving on the specific language of the adverse inference jury instruction until trial.  Defendant Peerless Insurance Co. might not wait that long, as even the neophyte lawyer can tell when blood is in the water. Dataflow’s claim arose out of a discovery request for production of documents that “targeted, inter alia internal communications and investigations regarding Plaintiffs’ claim.” Dataflow, Inc., v. Peerless Ins. Co., No. 3:11-cv-1127 (LEK/DEP), 2014 WL 148685, *2 (N.D.N.Y. Jan. 13, 2014).   When the defendant failed to produce any internal communications responsive to the document request, the plaintiffs tried again.  After the plaintiffs submitted an even narrower request for production, the defendants still didn’t produce anything responsive. Perhaps smelling something fishy, Dataflow started taking depositions and asking questions about the internal communications at Peerless.  The plaintiffs quickly learned that email was routinely used to communicate about claims.  The emails that Dataflow already asked for.  The emails that Dataflow was told didn’t exist.  The plot thickens. Hon. David E. Peebles, the Magistrate Judge handling discovery in this matter filed a Report and Recommendation urging sanctions be granted and fees shifted.  The District Court, reviewing Judge Peebles’s ruling de novo determined that the Magistrate got it right—and that sanctions are appropriate. The court analyzed the facts of the case under the spoliation framework set forth in Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 107 (2d Cir. 2002): On a motion for sanctions due to spoliation, the moving party must show that: (1) the party having control of the evidence had an obligation to preserve it at the time it was destroyed; (2) that party had a culpable state of mind; and (3) the destroyed evidence was of a nature that a reasonable trier of fact could find that it would support the moving party’s claim or defense. Dataflow, at *2 (citing Residential Funding Corp, at 107). Here, the duty to preserve for an insurance party was triggered when a claim was submitted.  As such, any internal communication regarding that claim is obviously supposed to be preserved.  The culpable state of mind can be inferred by the gross negligence displayed by email deletion resulting from a “system change.”  A “system change” that also conveniently “changed” the methods of preservation of documents related to paid and unpaid claims.  Finally, since the plaintiff was able to prove that the contents of the internal email conversations likely would have supported the plaintiffs’ theory of the case, sanctions in the form of an adverse inference just make sense. Perhaps it’s time for Peerless to have a “system change” with regards to their general counsel. Kevin received a B.S. in Political Science from the University of Scranton (2009), and will receive his J.D. from Seton Hall University School of Law in 2015.  Prior to joining the Seton Hall community, Kevin worked as an eDiscovery professional at two large “white-shoe” law firms in Manhattan. Want to read more articles like this?  Sign up for our post notification newsletter, here.

Recycling—Helps the Earth, Saves Lives, and Destroys Electronic Evidence

“Recycle,” “conserve,” “waste,” and “pollution” are terms that were implanted into the minds of each of us at a young age and are now they are being instilled into companies worldwide as a measure to reduce operational costs. Companies such as JPC Equestrian, Inc. have begun recycling and reusing “cleaned” electronic devices from former employees, which would normally not be an issue if companies had a company-wide server or cloud-based software that held all of the information stored within the device. However, since JPC Equestrian, Inc. does not have a company-wide server, once an employee leaves, the company has a procedure in place to “scub” the computer and reassign it to another without care for the electronic information within the device. In Kearney v. JPC Equestrian, Inc., Mark Kearney, a former employee, sued JPC Equestrian, Inc. (“JPC”) for the failure to produce emails relevant to the claim he is asserting. Kearney commenced this lawsuit against JPC when they wrongfully terminated his employment, and breached his sales agreements by either failing to pay him sales commissions or by paying reduced commissions that did not satisfy contractual obligations. Kearney through the discovery process received email documentation from numerous employees and executives dating back to 2005. The discovery submission included JPS turning over 250 pages of documents relevant to the parties and situations involved. However, Kearney requested information for "all relevant emails," which in his original discovery requests, were defined as "[a]ll emails that mention, or refer to the Plaintiff, however, marginally, in any way shape or form from 2002 through 2010." Kearney v. JPC Equestrian, Inc., 2014 U.S. Dist. LEXIS 153975, *5 (M.D. Pa. Oct. 30, 2014). Kearney was missing three years of discovery. Kearney only received documentation dating back to 2005 because the information dating back to 2002 did not exist or does not exist anymore and cannot be recovered. JPS claims that the information cannot be recovered because the computers that would have held that data were wiped clean and erased before the device was transitioned to another employee. JPS has found loopholes around document retention and the court agreed. The court held that JPS’ procedure of document retention was acceptable and the court has, “no basis to conclude that the defendants have withheld responsive documents, or that there is any basis to compel a further response regarding potentially relevant email communication.” Id. at *7. Unfortunately, this holding allows companies an avenue to discard potential and relevant information pertaining to potential litigation that otherwise would have been saved if not for the guise of recycling and employee cost saving. This holding should be reversed and JPS should be penalized for its failure to maintain adequate records for an appropriate period of time. The court should not excuse a company, no matter the size or market capitalization, for not maintaining the electronic information of employees who work within the company. Not only is that bad preservation practice, its poor business practice. Recycling and the protection of our planet is important but those ideals should not give rise to loopholes of common electronic document preservation practices, which are becoming as worldwide and important as protecting the planet itself. Timothy received his B.A. from Rutgers University in 2011. He began his post-college life working in Trenton, New Jersey, at a lobbying and non-profit management organization before attending law school in the fall of 2012. He will receive his J.D. from Seton Hall University School of Law in 2015. Timothy has had a diverse set of experiences during his time in law school and has found his calling in Tax Law. Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Will There Be a Presumption that ESI Is Inaccessible?

Parties requesting e-discovery speak up or forever be subject to possible cost-shifting.  Generally, the responding party bears its own costs of complying with discovery requests; however, the rules of discovery allow a trial judge to shift the cost to the requesting party in certain circumstances.  Cost-shifting does not even become a possibility unless there is first a showing that the electronically stored information (“ESI”) is inaccessible.  However, if neither party submits to the Court that the ESI is accessible, then courts can presume it to be inaccessible.  This should be especially concerning to the requesting party, who typically does not bear the burden to pay for such costs. In Zeller v. South Central Emergency Medical Services, Inc., Richard Zeller (“Employee”) filed an action against his former employer, South Central Emergency Medical Services (“Employer”) alleging an unlawful and retaliatory discharge under the Family Medical Leave Act (“FMLA”).  The Employee was out of work pursuant to the FMLA for approximately a month.  He alleged that, upon his return to work, the Employer did not restore him to his previous position and retaliated against him for using the FMLA.  The Employer claimed that the Employee was fired for excessive absenteeism. The e-discovery issue in this case involved the allocation of costs to recover e-mails between the Employee and his doctors.  In this matter, there was no formal motion for a cost-shifting protective order, rather the issue was raised by both parties in their submissions to the court on outstanding discovery issues.  Typically, the rule is for cost-shifting to be possible, there must first be a showing of inaccessibility.  Here, the court presumed that the parties agreed the information sought was inaccessible because neither party submitted that the ESI was accessible.  Once the court presumed that the ESI was inaccessible, the court then analyzed whether discovery costs should be shifted by applying the seven-factor test from the Zubulake Court.  In Zeller, the court held that some cost-shifting to the Employer, the requesting party, was appropriate. Although the ESI in Zeller was most likely inaccessible, parties requesting e-discovery can still learn a valuable lesson from this case.  The requesting party should submit to the court that the ESI sought is accessible to avoid both a presumption of inaccessibility and the possibility of cost-shifting.  Requesting parties should not leave it up to the producing party to bear the burden of showing that the ESI is inaccessible because the courts are now willing to presume this finding if neither party contends otherwise.         Gary Discovery received a B.S. in Business Administration, with a concentration in Finance from the Bartley School of Business at Villanova University.  He will receive his J.D. from Seton Hall University School of Law in 2015.  After graduation, Gary will clerk for a presiding civil judge in the Superior Court of New Jersey. Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Is An Employer Permitted To Monitor and Review An Employee’s Internet Activity and Usage?

On March 10, 20108, Marc Liebeskind began working at Rutgers Facilities Business Administration Department.  By March 28 of that year, Liebeskind was terminated for lacking the basic skill set needed to perform his job in addition to having a poor attitude while on the job. Liebeskind’s supervisors had suspected he was spending an unreasonable amount of time on non-work related activities on his work computer. Having doubts about Liebeskind’s work performance, his supervisors reviewed the browsing history on Liebeskind’s computer by using an application called IEHistoryView. It is important to note that this search only entailed browsing history, and there is no evidence that Liebeskind’s supervisors were granted any access to his personal or password-protected information and accounts. After his termination, Liebeskind filed suit against Rutgers University and his supervisors, claiming invasion of privacy, among other claims. On appeal, the New Jersey Superior Court Appellate Division affirmed the lower court’s ruling, which ruling struck down all claims that Liebeskind’s privacy was violated as a result of his supervisors’ investigating the browser history on his computer. The appellate court referenced the New Jersey Supreme Court’s Stengart ruling, which had set the precedent for an employer’s right to monitor employee Internet activity and usage. Closely followed in previous eLessons Learned posts, the 2010 Stengart ruling held that an employee’s email communication with her attorney, using a company-issued computer, but via a personal, password-protected email account was held to be protected by the attorney-client privilege. However, the court’s decision to uphold Stengart’s privacy was not intended to forbid employers from monitoring employees’ actions on company-issued computers or devices in the future. In Stengart, New Jersey’s highest court stated: “Companies can adopt lawful policies relating to computer use to protect the assets, reputation, and productivity of a business and to ensure compliance with legitimate corporate policies.” As noted in Liebeskind, Rutgers’ “Acceptable Use Policy for Computing and Information Technology Resources” was in effect during the time of Liebeskind’s employment. This policy expressly stated that an employee’s privacy “may be superseded by the University’s requirement to protect the integrity of information technology resources, the rights of all users and the property of the University.” Additionally, Rutgers University “[r]eserve[d] the right to examine material stored on or transmitted through its facilities.” Unlike the findings in Stengart, the court established that Liebeskind did not have a “reasonable expectation of privacy.” In addition, the court agreed that Rutgers had a “legitimate interest in monitoring and regulating plaintiff’s workplace computer.” All companies can learn from this case and the policies in place at Rutgers that protected its right to monitor and search an employee’s computer. One of the most important lessons to be learned here is the need for a written internet usage policy. At the very least, these written policies should mandate that employees are expected to use the Internet and their work issued computers for work related activities only. Additionally, the possible disciplinary actions for any violation of this policy should be made available to employees. As seen in in this case, the existence of an internet usage policy and the reserved right of a company to monitor its employee’s Internet activity is the key to eliminate an employee’s reasonable expectation of privacy.

How Are Electronic Materials Slipping Through the Cracks? The Scope of eDiscovery Is Limited to Discovery Requests, Not search Terms

We have entered the age of information!  Every conversation, e-mail, text message, attachment, voicemail, and other electronic data are being stored all day, every day.  These types of electronically stored information (a.k.a. “ESI”) are regularly used during litigation.  So why is there a problem collecting information for trial?  Lawyers need to search through these massive amounts of ESI in order to provide the materials to the opposing party before trial.  This process is known as eDiscovery, or electronic discovery, and it has raised a number of issues regarding who, what, where, when, why, and how ESI is produced. The issue discussed here is what defines the scope of eDiscovery.  In ChenOster v. Goldman, Sachs & Co., the court made it clear that the scope of discovery, whether electronic or not, is still defined by traditional discovery requests and demands.  However, what brought forward this conclusion? Traditionally, the process of discovery is the period when lawyers exchange requests and demands for information, documents, and other materials that may be used in the case.  Generally, this can be broken down into three steps: (1) Requesting party will make a discovery request; (2) the opposing party will use any means she deems appropriate to find the materials; and (3) the opposing party will respond to the request in the form of producing the materials or an objection. However, in Chen-Oster, the parties deviated slightly from this traditional process.  Here, the requesting party, the plaintiffs, made traditional discovery requests for ESI.  Then the plaintiffs negotiated with the opposing party, the defendants, in order to determine what search terms would be used to filter through the enormous amounts of ESI available. Now, why is this different from a traditional discovery process?  This is different because both parties collaborated to determine how the ESI requested would be located. The issue presented in Chen-Oster begins upon production of the ESI by the defendants.  The defendants only produced the ESI they deemed to be relevant to the discovery requests set forth by the plaintiffs.  However, the plaintiffs intended to collect all ESI produced by the search terms they agreed upon. This brings us back to the main question:  what defines the scope of eDiscovery?  It is either all ESI located under the agreed upon search terms; or it is only ESI located under the search terms that are relevant to the original discovery request. According to Chen-Oster, an agreement to use specific search terms or discovery protocol does not override discovery demands and requests.  In other words, search terms used to filter through electronic data do not define the scope of discovery.  The scope of discovery is determined by the discovery requests rendered.    Victoria O’Connor Blazeski received her B.S. form Stevens Institute of Technology, and she will receive her J.D. from Seton Hall University School of Law in 2015.  Prior to law school, she worked as an account manager in the Corporate Tax Provision department of Thomson Reuters, Tax & Accounting.  Victoria is a former D3 college basketball player, and she has an interest in tax law and civil litigation.  After graduating, she will clerk for the Hon. Joseph M. Andresini, J.T.C. in the Tax Courts of New Jersey.   Want to read more articles like this?  Sign up for our post notification newsletter, here.

  • Find an eLesson

  • Register for Post Notifications

    Subscribe to receive updates whenever a new eLesson is published.

    Manage Subscriptions
  • Let Us Blog Your Event!

    eLessons Learned is fast becoming the site of choice for employers, employees, judges, lawyers, and journalists who are interested in learning more about these areas without being intimidated by the complexity of the topic. In fact, organizations and event coordinators often feature eLessons Learned as their official eDiscovery blog. Fill out our simple registration form to have eLessons Learned be the official blog of your organization or event.

    Register Now
  • Recent Praise

    The blog takes a clever approach to [e-discovery]. Each post discusses an e-discovery case that involves an e-discovery mishap, generally by a company employee. It discusses the conduct that constituted the mishap and then offers its ‘e-lesson’ — a suggestion on how to learn from the mistake and avoid it happening to you.

    Robert Ambrogi

    Legal Tech Blogger and creator of LawSites

    Although I may have missed some, yours is the first article that I have seen addressing Zubulake II. It is often the lost opinion amongst the others.

    Laura A. Zubulake

    Plaintiff, Zubulake v. UBS Warburg

    Click here to see more.
View in: Mobile | Standard