- eLessons Learned
- Press and Publicity
- About Our Team
- Contact eLL Blog
Employers should take note: erasing and taping over messages that relate to a fired employee is never a good idea. Employers who engage in this type of practice will never escape the wrath of a judge when the fired employee inevitably brings a wrongful termination. Eventually, such action catches up with the defending company and they will have to pay a steep price. Take, for instance, the case Novick v. AXA Network, LLC. The plaintiff was asking the judge for sanctions to be imposed on the defendants because he claimed that the defendants spoliated audio recordings and emails from an eight-week stretch, which ran from late August until early November 2006. The defendants admitted that recordings from this time period were likely erased and taped over. The problem here is that this stretch of time covers the time directly before and directly after Novick’s termination. It should seem obvious to anyone that a company’s failing to preserve any recordings regarding a former employee’s termination is a terrible idea and will likely hurt one’s case in court. It should instead be common sense that when an employee is terminated, and certainly when that termination is contentious, a lawsuit is foreseeable. Thus, the employer should take care to preserve anything that might come into play at trial. Novick asked the judge to sanction the defendants for the spoliation of emails. The defendants could not produce any emails between the two employees at AXA Network, who took over Novick’s accounts, and Novick’s former clients. If these employees were involved with Novick’s clients after Novick was fired, it is only logical that there would have been emails taking place between these employees and those clients! Nevertheless, the defendants could not produce a single e-mail. Sanctions can be imposed on a party for spoliation in violation of a court order under Rule 37(b) of the Federal Rules of Civil Procedure or, where there has been no violation of a court order, a judge can impose sanctions for spoliation under the court’s “inherent power to control litigation.” West v. Goodyear Tire & Rubber Co., 167 F.3d 776, 779 (2d Cir. 1999) (emphasis added). For the court to exercise its inherent power, there must have been a showing of bad faith. United States v. Int’l Bhd. of Teamsters, 948 F.2d 1338, 1345 (2d Cir. 1991). The Novick court in this case found that the defendants did spoliate the audio recordings because they were notified in October 2006 to preserve the recordings for future litigation and to produce those recordings to the plaintiff. In addition, the defendants provided no reason for why or how these recordings were missing. Unsurprisingly, the court suggested that such behavior indicates that the company acted deliberately and therefore possessed a culpable state of mind. The defendants acted in bad faith. The court did not find that the defendants spoliated the email messages, but it still believes they acted in bad faith with respect to the production of the emails because the company failed to search one of their email archives for months due to what was claimed as “human error.” This was clearly a delay tactic, further warranting sanctions. The court invoked its inherent power to control litigation because the defendants acted in bad faith, employed delay tactics, caused substantial costs to be incurred by the plaintiff, and wasted the court’s time. The court imposed an adverse inference jury instruction. Adverse inference instructions can be imposed against a party who had an obligation to preserve evidence at the time it was destroyed, who destroyed the evidence with a culpable state of mind, and who destroyed evidence that was relevant to the opposing party’s claim or defense. Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 107 (2d Cir. 2002). The clear takeaway from this case is that it is better to be safe than sorry; if it is reasonable that a lawsuit may be brought against you, take all measures to preserve any evidence that might have anything to do with that future case. Preserving the evidence will not hurt, but failing to do so will. Logan Teisch received his B.A. in Government and Politics from the University of Maryland, College Park in 2012. He is now a student at Seton Hall University School of Law (Class of 2015), focusing his studies in the area of criminal law. Logan’s prior experiences include interning with the Honorable Verna G. Leath in Essex County Superior Court as well as interning with the Essex County Prosecutor’s Office. Want to read more articles like this? Sign up for our post notification newsletter, here.
Preserving electronic data can be a challenge for companies with multiple data centers. However, what we have here is a failure to communicate. The case at issue is an ERISA class action against UnumProvident. On November 26, plaintiffs' counsel wrote to request a conference to present their request for a preservation. The court then outlined principles that would serve as the basis for the parties' draft of a proposed order. The court observed, without contradiction from UnumProvident, that UnumProvident already had a duty to preserve any tapes containing emails as of November 4, the date litigation commenced. The order required all back-up tapes or other back-up hard drives, disks or other hardware containing material back-up by the defendants regarding Y2K, regardless of the date or dates of the internal or external e-mails, computer information, or electronic media contained thereon to be preserved. Specifically the plaintiffs requested all internal and external e-mails, generated, created, or dated October 14, 15, and 16 of 2002, and November 18, 19, and 20 of 2002. If the defendants alleged these e-mails were no longer in existence due to routine destruction or otherwise, the defendants had to provide an affidavit explaining circumstances of the unavailability. UnumProvident’s Enterprise Security Architect decided instead of preserved the data to implement a special “snapshot” back-up which would back-up those emails that were on the system as of the day or days the snapshot was taken. UnumProvident could also have directed IBM, their data vendor, to copy email back-up tapes from existing unexpired tapes to other back-up tapes that would contain no expiration date. Similarly, it could have copied the data onto a hard drive or into other computer media. Instead, this snapshot inadvertently caused all of the data on the back-up tapes to be overwritten. The court found that no enterprise officers of UnumProvident had sufficient expertise to discuss the preservation project in a meaningful way. Neither of them took the steps that they needed to take to get sufficiently informed advice on the issues involved. Similarly, there was insufficient supervision of the Enterprise Software Architect's efforts. The officer had also never ordered IBM to preserve emails regarding the six dates. Additionally, the law department of UnumProvident never instructed its officers to confirm that email for the six days had been preserved by IBM. As this issue developed relatively early in discovery, the court found it difficult to determine the extent to which the plaintiffs have suffered any prejudice from the failure to capture all of the UnumProvident emails for the six days. Throughout the whole opinion, the court was very skeptical of the testimony of UnumProvident’s officers. The court determined most of UnumProvident’s actions were inadequate. However, it also determined the accelerated expiration problem that occurred because of the creation of the snapshot was inadvertent and unintended. Therefore, the court did not award any sanctions. It can still be assumed the court would be less trusting of UnumProvident after this debacle and less likely to give them the benefit of the doubt.
On July 31, 1996, plaintiff Omega Engineering Corp. ("Omega"), a New Jersey based company, lost its computer programs relating to design and production permanently from its system. Omega manufactured “highly specialized and sophisticated industrial process measurement devices and control equipment” for NASA and the United States Navy. The deletion of these programs debilitated their ability for manufacturing as well as costed the company millions of dollars in contracts and sales. From 1985 to July 10, 1996, defendant Timothy Lloyd worked as the computer system administrator at Omega. He trained with the Novell computer network and installed it to Omega’s computer system. The program worked to ensure that all of Omega’s documents could be kept on a central file server. Lloyd was the only Omega employee to maintain the Novell client and have “top-level security access” to it; however, the defense asserted that others at the company had access. According to a government expert, access "means that ... [an] account has full access to everything on the server." Lloyd was also the only employee in charge of backing up the information to the server. In 1994 or 1995, Lloyd became difficult. The company moved him laterally in hopes of improving his behavior. A government witness testified that even though it was a lateral move, it was in fact, considered a demotion by the company. Lloyd’s new supervisor asked him about the back-up system and wanted him to loop a couple more people in but he never did. Moreover, he instituted a company-wide policy that employees were no longer allowed to make personal backups of their files. On top of the above issues, there was also a “substandard performance review and raise.” The combination of the two factors, according to the government, showed Lloyd that his employment with the company would soon be terminated. This established Lloyd’s motive to sabotage the Omega computer system. On July 10, 1006, Lloyd was terminated. On July 31, 1996, Omega’s file server would not start up. On July 31, “Lloyd told a third party, that "everybody's job at Omega is in jeopardy.” days later it was realized that all of the information contained on it were permanently lost. More than 1,200 of Omega’s programs were deleted and, as per Lloyd’s policy, none of the employees had their own personal backups. There was no way for any of these programs to be recovered. A search warrant conducted on Lloyd’s house turned up some backup tapes and a file server master hard drive. Experts hired by Omega found that the deletion of information was “intentional and only someone with supervisory-level access to the network could have accomplished such a feat.” The commands necessary to pull off such a purge were characterized as a “time bomb” set to go off on July 31st when an employee logged into the system. There was evidence found by these experts of Lloyd testing these specific commands three different times. This string of commands was further found on the hard drive that was in Lloyd’s home. Lloyd was convicted of a federal count of computer sabotage. It was remanded due to a jury member’s claimed use of outside knowledge during deliberations. Julie received her J.D. from Seton Hall University School of Law in 2014. Prior to law school, she was a 2008 magna cum laude graduate of Syracuse University, where she earned a B.A. in History and a minor in Religion and Society. After law school, Julie will serve as a law clerk to a judge of the Superior Court of New Jersey.
Background Omega Engineering Corporation, an international company based in New Jersey, was once the employer of Timothy Lloyd. To put Omega’s importance into perspective, the U.S. Navy and NASA were two of their clients for highly specialized and sophisticated industrial process measurement devices. According to testimony during the trial, Lloyd worked at Omega as its sole system administrator from 1985 through 1996. In 1995, Lloyd had undergone Novell network training and installed Novell software on Omega’s computer system. Additionally, Lloyd was the only person who maintained and had top-level access to the Omega network. Between 1994 and 1995, Lloyd became belligerent and increasingly truculent. Due to his poor interpersonal skills, he was demoted in May 1995 from manufacturing to support engineer. A woman who had once been Lloyd’s subordinate and had engaged in a romantic relationship with Lloyd, was the individual responsible for replacing Lloyd as manufacturing supervisor. In June 1996, Lloyd instituted a policy to “clean up” all of the individual computers in Omega’s manufacturing department. It was unclear as to why Lloyd was implementing company policies after his demotion. Nonetheless, the policy required employees to save their files to the company’s file server and prohibited them from making their own backups. Lloyd’s manager became suspicious of this policy and requested from Lloyd access to the file server. Lloyd never complied. By the end of June, upper management had enough of Lloyd’s behavior and terminated him in early July 1996. On July 31, Omega’s file server would not boot up. All of Omega’s manufacturing programs on the server, which contained instructions for operating the machines, were gone. Multiple computer experts were brought in to recover the files, but to no avail. The files had not only been deleted, but also had been “purged,” meaning that they were rendered unrecoverable. A leading expert on Novell networking testified at trial that this could only have been done intentionally and by someone with supervisory-level access. The government’s theory included that on July 30, anyone who would log on to the server at any time after that date would “detonate” a program installed by Lloyd that would destroy the information on the Omega file server. The government’s theory was bolstered by the fact that the Secret Service recovered missing Omega backup tapes that had been reformatted as well as a master hard drive from the file server. This had the same string of commands that had functioned as the time bomb program found on the Omega file server. The Decision Ultimately, Lloyd was found guilty of computer sabotage. The jury had deliberated for over twelve hours over the span of three days and had requested testimony in the jury room before they reached their verdict. However, three days after the verdict, one juror said that she had seen on the news, during the trial, about a computer virus called the Philippine “love bug” which allowed the perpetrator to cause great harm by flooding the victim computers and causing them to crash. Whether this affected her decision is unclear; however, the defendant claimed that his 6th Amendment rights had been violated. The district court agreed, granting a new trial. On review, the Court of Appeals reversed the district court’s holding. After a lengthy discussion, the court said that there were significant dissimilarities between the “love bug” and the “time bomb” and most jurors would not confuse the two. Therefore, the appellate court found, the defendant was not prejudiced. Lloyd’s managers should never have allowed a single employee hold as much power as they did. This case highlights the vulnerabilities the company subjects itself to if that is allowed to happen. For example, Omega lost over 1,200 programs and many current and potential clients as well. Akiva Shepard received his J.D. from Seton Hall University School of Law in 2014. Akiva has worked for a New York State Supreme Court Judge in Kings County, and for a NJ real estate firm.
Plaintiff Erick Zayas joined with the Equal Employment Opportunity Commission (EEOC) to sue Ventura Corp. for employment discrimination on the basis of sex in 2007. In essence, Zavas complained that Ventura’s long-standing tradition of hiring women for the position he applied to was discriminatory. Furthermore, Zavas alleged that Ventura destroyed relevant evidence. In its answer, Ventura stated that the fact that no men have filed applications or have not met the position requirements did not support the plaintiffs’ assertion of discrimination. However, during limited discovery a list revealed that qualified men did in fact apply and accounted for 34.5 percent of qualified applicants. The central issue involved application materials received by Ventura. These included materials submitted by e-mail and hard copy resumes. The court first notes that spoliation is “the failure to preserve evidence that is relevant to pending or potential litigation.” The duty to preserve relevant evidence arises once litigation is reasonably anticipated. The court noted that since Ventura was notified in 2007 that it was being charged with sexual discrimination, at that point Ventura should have reasonably anticipated litigation and was thus under the duty to preserve. Ventura attempted to make a statutory argument that resumes did not need to be preserved. The relevant statute, 29 CFR 1602.14 (see http://www.law.cornell.edu/cfr/text/29/1602.14), makes reference to “application forms” and “test papers.” Ventura argued that it required neither application forms nor test papers and that resumes were not mentioned. However, the court rejected this argument. The court noted that the statute also includes the language, “other records having to do with hiring.” The court ultimately held that resumes therefore clearly applied. Ventura’s Human Resource Analyst testified that certain documents were shredded or taken to a warehouse as a result of an office restructuring in 2009. Furthermore, the HR Analyst wasn’t able to find the said documents. The plaintiffs were therefore able to establish that Ventura either lost or destroyed the resumes between 2007 and 2010. Because Ventura was on notice since 2007, the disappearance of these documents constituted a violation of its duty to preserve relevant evidence. Soft copies of resumes delivered by e-mail were also lost in the same time period. In fact, th plaintiffs were able to produce a relevant e-mail to and from Ventura, while Ventura was not able to produce the very same e-mail. This e-mail alone and the fact that other relevant e-mails likely existed in the 2007-2010 period but were nowhere to be found, was sufficient to infer that Ventura likely destroyed them. The court held that sanctions were in order for Ventura’s violation of its duty to preserve. As a result of Ventura’s failure to preserve relevant evidence, the court imposed a “spoliation instruction” or adverse inference instruction. Such an instruction allows the trier of fact to infer that the content of the destroyed relevant evidence was damaging to Ventura’s case. Lesson learned? If you intentionally or unintentionally destroy relevant evidence while under a duty to preserve, an adverse inference instruction will likely bring swift defeat and sway the trier of fact against you. It’s best to preserve evidence and maintain your credibility with the court and trier of fact even with bad facts. Rocco Seminerio is a Seton Hall University School of Law graduate (Class of 2014). Mr. Seminerio focuses in the areas of Estate Planning, Elder Law, and Health Law. He graduated from Seton Hall University in 2011 with a degree in Philosophy. He also has an interest in the life sciences.
In Haskins v. First Am. Title Ins. Co., the court was asked whether a title insurance company (the "Insurer") is in "control" of documents that are in not in the Insurer's possession, but where the Insurer has the contractual right to direct those with possession to produce the documents. The district court found in the affirmative, demonstrating that in some circumstances, the more extensive one's contractual rights, the more extensive its obligations in discovery. The plaintiffs sought class certification, which defined the class as all New Jersey consumers who paid premiums in excess of regulated title insurance refinance rates during the class period. The plaintiffs alleged that the Insurer had overcharged for title insurance over a period of several years. During discovery, plaintiffs sought certain documents in the possession of certain independent title agents, who were not employees of the Insurer, but with whom the Insurer had a contractual relationship. The representative contracts made all documents "available for inspection and examination by [the Insurer] at any reasonable time." The court inquired as to whether such documents are in the "control" of the Insurer, because pursuant to Fed. R. Civ. P. 34(a), a party may request another party to produce documents within that party's "possession, custody, or control." Thus, if such documents were in the "control" of the Insurer, the plaintiffs could properly request that they be produced in discovery. The Insurer argued that it should not be required to produce documents in the physical possession of its agents because it does not possess or control the requested documents. However, the court did not struggle to conclude that the Insurer's agency contracts plainly indicate that it has control over and access to the documents. It drew this conclusion based on the premise that there is control if a party “has the legal right or ability to obtain the documents from another source upon demand.” Haskins demonstrates the potential for increased discovery obligations for those that have negotiated extensive rights in contract. That is, the greater rights in contract, the potential for broader obligations in discovery. While this factor may not drive the decision making for those negotiating contracts, contract parties should at least be aware of this consequence Adam L. Peterson 2014 graduate of Seton Hall University School of Law. While at Seton Hall, Adam was a member of the Seton Hall Law Review and prior to law school Adam was an Environmental Analyst with the New York State Department of Environmental Conservation.
Richard Fraser was an independent contractor working for Nationwide Mutual Insurance Company when he was fired in 1998. Although Fraser argued that he was fired for reporting illegal policies that Nationwide had implemented, Nationwide stated he was fired because he was disloyal to the company. Nationwide found that plaintiff had drafted (but not sent) two letters to two Nationwide competitors, Erie Insurance Company and Zurich American Insurance, expressing Contractors Association members' dissatisfaction with Nationwide and seeking to determine whether Erie and Zurich would be interested in acquiring the policyholders of the agents in the Contractors Association. After discovering the letters, Nationwide also searched its mail file server and found e-mails revealing company trade secrets. Fraser filed a wrongful termination suit against Nationwide, arguing that Nationwide’s accessing Fraser’s e-mail account without permission violated the Electronic Communication Privacy Act and a parallel Pennsylvania statute. The trial court granted Nationwide’s motion for summary judgment and Fraser appealed. The Third Circuit Court of Appeals affirmed the trial court’s ruling that Nationwide had access to the independent contractor’s emails. Nationwide was found to not have violated the ECPA because Nationwide had provided the independent contractor with the e-mail account, the e-mail was hosted on Nationwide’s servers, and the e-mails were acquired after transmission of the e-mails. Therefore, the court held that the e-mails were not intercepted by Nationwide. Title 1 of the ECPA prohibits the interception of e-mails, but Nationwide argued that since the e-mails were reviewed after the transmission of the e-mail, that no interception had occurred. The court agreed and found that for one to intercept e-mail, he must occur contemporaneously, at the time of the transmission. Therefore, as long as the seizure of e-mail occurs after the e-mail is transmitted, a company does not need permission to access the independent contractor’s e-mails. Salim received his B.A. in Applied Communications, with a minor in Legal Studies, from Monmouth University. He received his J.D. from Seton Hall University School of Law in 2014. Salim’s past experiences include interning for a personal injury law firm prior to attending law school, as well as judicial internships in the Civil and Family Divisions.
In this case, Peerless Industries, Inc. sued defendants Crimson AV, LLC claiming patent infringement and design patent infringement arising out of defendant’s manufacture and sale of certain TV mounts. While not a defending party, Sycamore Manufacturing Co., Ltd. (“Sycamore”) is plaintiff's former supplier of these TV mounts and played a vital role in the alleged infringement. Sycamore is located in China, while Peerless and Crimson are both located in the United States. Plaintiffs filed two motions: (1) a motion to compel the deposition of the Sycamore’s president, Tony Jin, and (2) a renewed motion for sanctions, both of which were granted. It was also determined in a previous case that Jin exercised managerial control over both Sycamore and Crimson. Therefore, plaintiff satisfied that Mr. Jin is a managing agent of Crimson. The court stated, “Plaintiff must simply show ‘that there is at least a close question as to whether the witness is a managing agent.’ We already found this to be the case. Furthermore, Mr. Jin clearly satisfies the ‘paramount test,’ which is whether the individual identifies with the corporation's interests as opposed to an adversary's.” The court further ordered that without any showing of hardship, Jin’s deposition would have to take place in the United States and not in China. As for the plaintiff’s renewed motion for sanctions, this motion marked the third time the plaintiff filed a motion regarding the same set of documents. The plaintiff argued that at the deposition of Crimson’s managing director, “it became clear that defendant did not conduct a reasonable investigation regarding Sycamore’s document production or Sycamore’s document retention for purposes of this litigation.” The plaintiff then filed a renewed motion for sanctions. The defendant and Sycamore asserted that certain documents in Sycamore’s possession had been produced. The plaintiff noted, that defendants did not represent that all requested documents were produced or that they were searched for but no longer existed. The plaintiff argued that the defendant wanted to rely on the same declarations as opposed to issuing more specific responses. The court stated that since it had determined Jin was principal of both Crimson and Sycamore and that he exercised a considerable amount of control over both corporations, that he was able to obtain all relevant documents from Sycamore. However, the court found that defendant took a “back seat” approach and instead used a third-party vendor to collect the documents. Finding that neither Crimson nor Jin had apart in the process of obtaining the requested discovery, the court granted the plaintiff’s motion for sanctions. The court held that this “hands-off’ approach is insufficient. “Defendants cannot place the burden of compliance on an outside vendor and have no knowledge, or claim no control, over the process. Finally, the court held that defendants must show that they in fact searched for the requested documents and, if those documents no longer exist or cannot be located, they must specifically verify that it is they who cannot produce. Salim received his B.A. in Applied Communications, with a minor in Legal Studies, from Monmouth University. He received his J.D. from Seton Hall University School of Law in 2014. Salim’s past experiences include interning for a personal injury law firm prior to attending law school, as well as judicial internships in the Civil and Family Divisions. Currently, Salim is taking part in the Immigrants’ Rights/International Human Rights Clinic at Seton Hall Law.
In Brown v. Tellermate Holdings Ltd., Tellermate Holdings, the defendant company, terminated two employees for allegedly failing to meet sales targets over several years. The employees, feeling that they were wrongfully terminated due to their age, filed an employment discrimination action against the company as well as other entities and individuals associated with Tellermate. Throughout pre-trial proceedings, the case was plagued with numerous discovery mishaps. The plaintiffs requested from the defendant company data stored and maintained by Salesforce.com, which would, in theory, evidence plaintiffs’ sales records over the last few years in addition to allowing the plaintiffs to compare their sales figures with other (younger) employees. However, even though numerous discovery conferences were held, numerous discovery motions filed with the court, and several discovery orders issued by the court, the defendant corporation failed to produce the requested data and documents. Ultimately, the plaintiffs filed for judgment and sanctions under Federal Rule 37(b)(2); the court held a three-day evidentiary hearing on the matter. The presiding judge, United States Magistrate Judge Terence P. Kemp, identified three areas in which the defendant company or its counsel failed in its obligations to the plaintiffs and the court in relation to production of documents and data: Defendant’s counsel failed to understand how Tellermate’s data stored with Salesforce.com could be obtained and produced to plaintiffs, which resulted in counsel making false statements to the plaintiffs’ counsel and the court; By failing to understand how the defendant’s data was stored and maintained, defendant’s counsel took no steps to preserve the integrity of the information in Tellermate’s database located with Salesforce.com; Defendant’s counsel failed to learn of the existence of documents relating to a prior age discrimination charge until almost a year after plaintiffs requested the documents; Defendant’s counsel produced a “document dump” resulting from counsel’s use of an overly-broad keyword search that yielded around 50,000 irrelevant documents, which plaintiffs’ counsel could not review within the time period ordered by the court. The Salesforce.com Data Judge Kemp found that Tellermate’s failure to preserve and produce the data logged on Salesforce.com’s website irreparably deprived the plaintiffs of reliable information necessary in supporting their claims. Although defendant’s counsel initially stated that Tellermate “does not maintain salesforce.com information in hard copy format,” “cannot print out accurate historical records from salesforce.com,” and that “discovery of salesforce.com information should be directed at salesforce.com, not Tellermate,” the court found such statements to be on their face false. In fact, Tellermate did have access to the information sought by the plaintiffs as one, and sometimes two, of Tellermate's employees enjoyed the highest level of access to the Salesforce.com information. The court determined that the information eventually produced by the defendants could not be trusted as “even a forensic computer expert has no way to detect hat changes, deletions[,] or additions were made to the database on an historical basis.” Because of Tellermate’s failure to preserve the Salesforce.com data, Judge Kamp precluded Tellermate from providing evidence showing that the plaintiff-employees were terminated for their alleged underperformance. Counsel’s Obligations With Respect to ESI The court found that the defense’s counsel fell short of their well-established obligations to critically examine the documents and data Tellermate provided to them. Tellermate made false representations to its counsel about the data’s availability and therefore caused undue delay in document production as well as false and misleading arguments to be made to plaintiffs’ counsel and to the court. Subsequently, the plaintiffs were forced to file discovery motions before the court to address these discovery issues which produced the Salesforce.com data that was never properly preserved albeit its significance to the plaintiffs’ case. Judge Kemp ultimately determined that counsel for the defendant conducted an inadequate investigation of Tellermate’s electronic data while simultaneously failing to understand the most basic concepts of cloud computing and cloud storage, which led to counsel’s failing to preserve key electronic data. Control of Data Stored in the Cloud As mentioned above, Tellermate and its counsel repeatedly represented to the plaintiffs and to the court that it did not possess and could not produce any of the Salesforce.com data requested by plaintiffs. Additionally, the defendants asserted that in light of those facts, the defendants could not preserve the data stored on Salesforce.com’s databases at any point prior to litigation. Judge Kemp dismissed these claims. The court concluded that, without any factual basis whatsoever, no substantive argument could be made that Tellermate was prohibited from accessing the information stored on the Salesforce.com databases or that Salesforce.com was responsible for preserving Tellermate’s information and data as it was the entity that maintained possession and control of the data. In reality, Tellermate was the custodian of the data stored on the Salesforce.com databases. While information can be stored in locations outside the immediate control of the corporate entity by third party providers, it can still be under the legal control of the owner of the data and therefore must be produced by the owner under Federal Rule 34(a)(1)(A). Additionally, had Tellermate’s counsel critically examined the agreement between Tellermate and Salesforce.com, it would have realized that Tellermate was the owner of all data created by its employees and that Tellermate could, at any time, download the data stored on the Salesforce.com databases for preservation and production purposes. Limitations on Document Production to Avoid “Document Dumps” Tellermate produced to the plaintiffs 50,000 pages of irrelevant documents, classified by Judge Kemp as a “document dump.” Tellermate’s counsel refused to disclose which search terms it used in deciding which documents to produce to the plaintiffs, claiming that the search terms were privileged. In actuality, the court discovered, Tellermate’s counsel only used the full names and nicknames of employees as its search terms, which obviously yielded irrelevant documents. Without reviewing the returned documents, and because the court’s deadline for producing relevant documents was rapidly approaching, Tellermate’s counsel produced to the plaintiffs the documents as “Attorney’s Eyes Only.” The court recognized that a protective order was permitted only when counsel held a good faith belief that such information constituted a “trade secret or other confidential research, development, or proprietary business information, and that such material was entitled to a higher level of protection than otherwise provided in the protective order.” Tellermate could not demonstrate entitlement to this level of protection with respect to the search terms used in procuring documentation for discovery: The alleged burden imposed by a high volume production does not provide the producing party or its counsel free reign to choose a given designation and ignore the Court’s order pertaining to that designation. First, the court looked to whether competitive harm would result from the disclosure of the types of documents produced by Tellermate to a competitor; however, Tellermate’s memorandum on the issue did not contain any evidence about the harm which might result if the plaintiffs were permitted to review any particular document that was labeled “Attorney’s Eyes Only.” Second, Tellermate’s argument as to the harm it would experience was entirely conclusory and was not supported by evidence: Apart from the general concept that disclosure of some types of sensitive information to a competitor may result in harm, it contains no particularized argument which is specific to [the plaintiff], the way in which he was competing with Tellermate, and how the disclosure of any one of the 50,000 pages marked as attorneys-eyes-only would harm Tellermate’s interests. The court was astounded that Tellermate continually failed to meet the burden required to designate the documents as “Attorney’s Eyes Only” and, up until the hearing date, made no effort the redesignate a single page of the 50,000 produced in order to permit the plaintiffs from viewing the documents. Sanctions The court had absolutely no qualms with an award of attorneys’ fees for all motion practice connected to the preservation and production of the Salesforce.com data. “Had Tellermate and its counsel simply fulfilled their basic discovery obligations, neither of these matters would have come before the Court, or at least not in the posture they did.” The court took great concern to the extraordinary lengths the plaintiffs had to go to in order to obtain the documents maintained by the defendant and, even after several rounds of motions, were not able to obtain all of them. The “Attorney’s Eyes Only” designation on the 50,000 documents produced was also unfounded, the court held, and unduly precluded plaintiffs from necessary evidence that supported their case, which warranted fees under Federal Rule 37(a)(5)(A). Conclusion Tellermate provides a warning to all attorneys that the realm of technology in which their clients are constantly interact with is always changing. Therefore, so does the practice of electronic discovery. Counsel must always meet its duties with respect to ESI by engaging in discussions with its clients and opposing counsel about ESI; being aware, and perhaps even knowledgeable, of new and emerging technologies; and investigating and assessing with its clients the sources and status of potentially relevant ESI. By forgoing these practices, counsel opens itself and its clients to easily avoided and costly sanctions. Daniel is the Editor-in-Chief of eLessions Learned and a third-year law student at Duquesne University. To read more about him, click here.  Salesforce.com is a cloud-based customer relationship management system with more than 100,000 corporate customers around the world. Tellermate and its employees used Salesforce.com to track their sales and other interaction with customers. The court recognized that each sales person using the Salesforce.com management system could add, remove, or otherwise change data on their sales account.  See Zubulake v. UBS Warburg LLC, 382 F.Supp.2d 536 (S.D.N.Y. 2005) (counsel had an affirmative duty to monitor preservation an d ensure all sources of discovery information were identified).
In W Holding Co., Inc. v. Chartis Ins. Co. of Puerto Rico, the receiver of Westernbank, FDIC-R brought action under the Financial Institutions Reform, Recovery, and Enforcement Act (FIRREA) against the banks’ directors and officers (D & O’s) for gross negligence, breach of fiduciary duties, fraudulent conveyances, and adverse domination. Prior to discovery, FDIC-R proposed an order establishing a protocol for discovery of Wesernbank’s ESI and to reduce the number of written interrogatories it would receive. The D & O’s offered a competing protocol. The court denied FDIC-R’s request to alter the number of interrogatories and issued a separate order to establish ESI protocol. When FDIC stepped in as a receiver for Westernbank, it possessed 6.8 terabytes of ESI and over 900,000 paper documents. FDIC spent $2.1 million to put the ESI into a system called DMS iConnect (“DMS”), an internal database where the relevant paper documents were scanned into digital images and processed to generate searchable text. FDIC waned to use a second contractor-maintained system called Relativity to give its litigation opponents searchable access to selected data, which will cost $450 per gigabyte to move. FDIC-R wanted D & O to share in the costs. FDIC–R advanced three rationales in support of its proposal: (1) ESI production costs are analogous to “copying costs” borne by the requestor; (2) the Westernbank ESI is “not reasonably accessible” under Rule 26(b)(2)(B); and (3) the seven-factor test applied in Zubulake III requires cost-shifting in this case. The court disagrees with all three FDIC-R’s arguments. As to the argument that production costs are analogous to copying costs, the Court felt that FDIC-R failed to explain how those costs are outside the realm of gathering and preparation expenses customarily borne by responding parties. As for accessibility, the Court disagreed with FDIC-R’s position that Federal Rule of Civil Procedure 26(b)(2)(B) required cost-shifting when large volumes of ESI were involved. To be inaccessible, the FDIC-R would have to argue the “cost or burden” of production is tied to “some technological feature that inhibits accessibility.” However, the FDIC-R failed to raise any technological issues. The court further noted that the relevant data had already been uploaded into a searchable and organized retrieval system. The court also rejected FDIC-R’s third argument that the seven-factor test in Zubulake III requires cost shifting. Zubake also requires that the date in question be inaccessible, which the Court already stated was not. Finally, as to the request to limit the number of interrogatories, the Court believed the requests were “too speculative to merit a ruling at this time.” The Court felt that until the parties take more affirmative discovery steps, there is no ground for the Court to alter the defaults under the Federal Rules of Civil Procedure. Salim received his B.A. in Applied Communications, with a minor in Legal Studies, from Monmouth University. In 2014 he received his J.D. from Seton Hall University School of Law in 2014. Salim’s past experiences include interning for a personal injury law firm prior to attending law school, as well as judicial internships in the Civil and Family Divisions.