- eLessons Learned
- Press and Publicity
- About Our Team
- Contact eLL Blog
Welcome to the new eLessons Learned
eLessons Learned features insightful content authored primarily by law students from throughout the country. The posts are written to appeal to a broad spectrum of readers, including those with little eDiscovery knowledge.
Each blog post: (a) identifies cases that address technology mishaps; (b) exposes the specific conduct that caused a problem; (c) explains how and why the conduct was improper; and (d) offers suggestions on how to learn from these mistakes and prevent similar ones from reoccurring.
Visit our signature feature, e-Discovery Origins: Zubulake, designed to give readers a primer on the e-discovery movement through blog posts about the Zubulake series of court opinions which helped form the foundation for e-discovery. Go There
Interested students may apply for the opportunity to write for e-Lessons Learned by filling out the simple application. Go There
We all know that break-ups can be difficult, but when a person’s conduct crosses certain boundaries, it can become harassment. Whether this is done physically or electronically, the damage remains the same. In People v. Kucharski, the plaintiff and the defendant ended a two-and-a-half year relationship. Rather than take the high road, the defendant decided to alter the plaintiff’s MySpace page, post lewd pictures and obscene comments, and change her login information. After a bench trial the defendant was convicted on two counts of violating the Electronic Harassment Statute and one count of violating the Encryption Statute, which he appealed. Following their separation, the defendant logged onto the plaintiff’s MySpace account, which he created on her behalf, and made certain alterations. Specifically, the defendant posted a picture of the plaintiff in underwear and replaced her profile information with lewd and obscene comments. Detectives served a warrant to MySpace to obtain the e-mail address associated with the account as well as the IP address of the computer that accessed the account during the time in question. The investigation led to the home of the defendant, who lived with his parents and younger sibling. Shortly thereafter, most of the plaintiffs profile information was deleted and she was no longer able to access her account. The state had to show that the defendant used electronic communication to make an obscene comment with intent to offend. The the defendant does not argue that the State failed to show that the alterations to the MySpace page were done with intent to offend. Rather, the defendant argues only that 1) there was insufficient evidence to show that he altered the MySpace page and 2) the alterations were not “obscene.” The court did not buy this argument. The overwhelming evidence demonstrated that the defendant was in possession of the photograph that replaced the initial profile picture, the defendant had a motive, and these were the only two individuals who knew the login information. Furthermore, the court found the comments and posts made by the defendant to be “disgusting to the senses” or “abhorrent to morality or virtue.” Simply put, the defendant could have expressed the same ideas in a different and more tolerable manner. Finally, the defendant appealed his conviction based on the Encryption Statute for changing the login information and preventing the plaintiff from accessing her account. The court looked at the dictionary definition of “encryption:” “[T]he use of any protective or disruptive measure, including, without limitation, cryptography, enciphering, encoding, or a computer contaminant, to: (1) prevent, impede, delay, or disrupt access to any data, information, image, program, signal, or sound; (2) cause or make any data, information, image, program, signal, or sound unintelligible or unusable; or (3) prevent, impede, delay, or disrupt the normal operation or use of any component, device, equipment, system, or network.” The court overturned the defendant’s conviction, finding him not guilty of Unlawful Encryption. The court reasoned that simply placing a password on a document does not involve the transformation, manipulation, or destruction of data. Therefore, changing the password did not fall within the meaning of encryption as used within the statute. Would you agree?
This particular dispute revolved around ProconGPS, Inc.’s, the plaintiff, desire to introduce infringement charts or alternatively to amend its infringement contentions pursuant to Patent Local Rule 3–6 so the contentions were consistent with its infringement charts. The Northern District of California issued an opinion without oral argument granting the plaintiff’s motion to compel. These charts were provided as an answer to Skypatrol, LLC’s, the defendant, interrogatories asking for ProconGPS's evidence that the defendant performs, induces, and/or contributes to the infringement of each of the asserted claims of the patents-in-suit. The defendant argued the charts expanded the scope of allegations. Conversely, the plaintiff responded that the charts simply provided in more detail the information it obtained during discovery. The dispute is governed by Patent Local Rule 3-6 which stated: Amendment of the Infringement Contentions or the Invalidity Contentions may be made only by order of the Court upon a timely showing of good cause. Non-exhaustive examples of circumstances that may, absent undue prejudice to the non-moving party, support a finding of good cause include: (a) A claim construction by the Court different from that proposed by the party seeking amendment; (b) Recent discovery of material, prior art despite earlier diligent search; and (c) Recent discovery of nonpublic information about the Accused Instrumentality which was not discovered, despite diligent efforts, before the service of the Infringement Contentions. The court focused on section (c) and determined that the plaintiff had been diligent. The defendant had produced its discovery documents very slowly. Only 2,478 pages of documents were produced by December 7, 2012. About 500,000 more pages were produced in 2013 and the defendant’s source code was not made available until January 30th with paper copies produced in February. Additionally, the plaintiff proved the information was nonpublic because it was almost entirely made up of material that Skypatrol has designated “Highly Confidential–Attorneys' Eyes Only.” The defendant tried to argue the inclusion of the charts would prejudice it. However the defendant could not sway the court as it was not subject to any further discovery requests and no new products were added to the infringement claim. It appears that this is simply a case where Skypatrol could have prevailed had it provided its documents in a more timely fashion. Since the defendant did not produce everything before the Infringement Contentions as described in Patent Local Rule 3-6(c), the plaintiff was able to utilize Patent Local Rule 3-6. George is a graduate of Seton Hall University School of Law (Class of 2014). George complated both the Health and Intellectual Property Concentrations and is especially interested in patent law. He received both a B.E. and M.E. at Stevens Institute of Technology in Biomedical and Systems Engineering, respectively. During his time at Seton Hall, George worked as a law clerk at Stone Law in Colts Neck, NJ, where he assisted in the drafting of litigation documents and Office Actions with the United States Patent and Trademark Office.
United States Magistrate Judge Leslie G. Foschio dismissed the plaintiff’s motion to compel defendant to meet and confer on ESI protocol for the defendant’s predictive coding due to the fact that the defendant was willing to meet with the plaintiff and their respective ESI consultants, minus any consultants that had previously worked on the the defendant’s case against the plaintiffs. And, while it was necessary for Judge Foschio to make a judgment on this issue, the more essential question concerning what is required to be disclosed by a producing party when using predictive coding for ESI production is still left unanswered. Gordon, et. al. v. Kaleida Health, et. al., concerns employees filing suit, under the Fair Labor Standards Act (FLSA), against the employer for unpaid wages and overtime pay. The parties had been in discussions about how to review the defendant’s large volume of e-mails (between 200,000-300,000) for over a year, using key-word search methodology, but to no avail. On June 27, 2012, the court requested the parties’ joint or individual protocols to be implemented for the ESI production. When neither party presented protocol, the court ordered the completion of ESI discovery by October 23, 2012, and non-ESI discovery by January 23, 2013. On September 7, 2012, after communication back and forth, the defendant emailed the plaintiff notifying them that the defendant planned on using predictive coding and informing the plaintiff that the defendant would not participate in discussions establishing protocol with the plaintiff’s ESI consultants. Although, the plaintiff requested a discussion of protocol to be used for assuring successful search methods in the defendant’s predictive coding, on September 25, 2013, the defendant sent the plaintiff its ESI protocol and stated that they would subsequently send a list of the defendants’ email custodians. On October 1, 2013, the plaintiff sent a letter objecting to the defendant’s ESI protocol and noting issues that needed to be discussed and resolved between the two parties, and their respective ESI consultants, prior to the implementation of the defendant’s predictive coding. The plaintiff then filed a Motion to Compel, along with a Memorandum of Law In Support, for the defendant to engage in ESI protocol discussions with both parties’ ESI consultants present, and, if no agreement was reached, for both parties to submit their respective protocols to the court for a ruling as to which should be adopted. On October 16, 2012, the defendants filed an Attorney Declaration in Opposition To Motion To Compel ESI Meet and Confer and a Memorandum of Law in Opposition in which the plaintiffs filed a Reply Memorandum of Law. The plaintiffs relied heavily on Moore v. Publicis Groupe & MLS Group, 287 F.R.D. 182 (S.D.N.Y. 2009) in their memorandums, in asserting that parties intending to use predictive coding for producing ESI, are required to discuss and agree on a protocol to guide the production of documents. Predictive coding allows for a party to “train” the computer software to search for any and all relevant ESI found on the respective computer/hard drive, by feeding the computer a number of “seed set documents.” The software uses the “seed set documents” as a template of what the parties want produced for further examination pending trial. And, while the court in Moore stated that “cooperation” and “transparency” was necessary “in all aspects of preservation and production of ESI,” the plaintiffs in this case seem to take the Moore ruling a step further by attempting to compel the defendants to not only cooperate with ESI protocol discussions, but also to provide the plaintiff with the “seed set documents” the defendant planned on using for predictive coding. The defendants clarified that there was never an issue with meeting and conferring with Plaintiff on discussing an agreed-upon ESI protocol; however, the plaintiff’s ESI consultants that had previously provided services to the defendant in this case were to be excluded and disqualified from the parties’ protocol discussions. Furthermore, the defendant relied on the general principle that the producing party has “sound discretion” in ESI production, to contest the the plaintiff’s assertion that the court should order parties to agree on specific protocol in guiding the defendant’s predictive coding. And in response to the plaintiff’s reliance on Moore, the defendant pointed out that the court did not require the defendants in that case to provide the plaintiffs with the “seed set documents,” but rather, the defendants volunteered the documents used in their production search method. Given the fact that the defendant was willing to meet and confer with the plaintiffs and the plaintiffs’ ESI consultants, the court did not find it necessary to compel the defendant to do so. Since the defendant’s Attorney Declaration stated that the defendant was aware of its discovery obligations under Local R.Civ. P. 26(f)(3) (parties must attempt to reach an agreement on ESI discovery) and Fed.R.Civ.P. 34 (courts can find a producing parties search unreasonable and noncompliant with its production duties), Magistrate Judge Foschio did not find it necessary to remind the defendant of the possible considerations concerning their use of predictive coding. The plaintiff’s motion was dismissed without prejudice, having made clear that a requesting party must omit all ESI consultants from meet and confers that have previously serviced a producing party on the same case, if requested to do so; however, the question left unanswered is what is required to be disclosed to the requesting party when the producing party is using predictive coding and “seed set documents” to gather ESI production.
A growing trend in insurance disputes is a demand for insurers to have access to the claimant’s social media content. In January 2013, the District of Montana had to consider whether to compel a woman to produce all of her social media photos. The court did not grant this request and the decision serves as a good example of what is, or is not, an effective way to request this information. One plaintiff claimed she injured her head, neck, and back in an automobile accident when the vehicle she was driving was struck from behind. Her mother also suffered injuries in the accident. At the time of the accident, they were insured under an automobile liability policy issued by the defendant. The plaintiffs made a claim for uninsured motorist benefits under the policy. The defendant moved under Fed.R.Civ.P. 37 for an order compelling the plaintiffs to respond to discovery requests for the production of their social network site content. The defendant’s rationale for the request was the plaintiffs alleged a “host of physical and emotional injuries.” In respect to the mother, Defendant argued “there is no good reason for her to shield information that might shed light on her or her daughter's injuries.” The request stated as follows: Request for Production No. 18: Please produce a full printout of all of Plaintiff [driver]’s social media website pages and all photographs posted thereon including, but not limited to, Facebook, Myspace, Twitter, LinkedIn, LiveJournal, Tagged, Meetup, myLife, Instagram and MeetMe from August 26, 2008 to the present. Request for Production No. 19: Please produce a full printout of all of Plaintiff’s [mother's] so-cial media website pages and all photographs posted thereon including, but not limited to, Facebook, Myspace, Twitter, LinkedIn, LiveJournal, Tagged, Meetup, myLife, Instagram and Meet-Me from August 26, 2008 to the present. As you can imagine, the court felt these requests were overbroad. It is well settled that social media content is discoverable, but the requestor must make a threshold showing that publicly available information on those sites undermines the plaintiff’s claims. The defendant did not come forward with any evidence that the content of either of the plaintiffs' public postings in any way undermined their claims in this case. Absent such a showing, the defendant was not entitled to delve carte blanche into any of the nonpublic sections of plaintiffs' social networking accounts, let alone all of them. This case should serve as a lesson to other insurance litigants. You should only request access to social media accounts if you can make a threshold showing that the social media content will be relevant and hold admissible evidence. Otherwise you will rightly be admonished for undergoing a “fishing expedition” and your requests will be promptly denied.
In this case, the plaintiff, an inmate at Rikers Island, brought a motion for spoliation of evidence and alleged the defendants breached their duty to preserve evidence. The evidence in question is video footage relevant to the litigation regarding the assault on the plaintiff which occurred on May 24, 2011, by other prison inmates in a holding cell at the Bronx Criminal Courthouse. The defendants claim that they do not have a duty to preserve the surveillance footage because by the time they were given notice, the footage had been deleted. The defense states that even if they had a duty to preserve, they met this obligation by saving eight minutes of surveillance that they deemed to be relevant. On the day of the assault, the holding cell in which the plaintiff was placed in with approximately sixteen to seventeen other inmates was under twenty-four hour video surveillance. That same day, Jacqueline Brantley, the former Assistant Deputy Warden Executive Officer at the Bronx Criminal Courthouse, reviewed the video footage to determine the course of events specifically for a period of three hours. Brantley was the only person to view the three hours of footage and therefore she was the only one who could testify in court regarding this evidence. The three hours of video footage is extremely relevant to the case. The footage included evidence of not only the plaintiff’s injuries, but also how the Department of Corrections protected the inmates and how they responded to the incident. The tapes also show the presence and identity of possible witnesses to the assault and help create a visual timeline of events in the holding cell. The Southern District of New York stated that the defendants should have known within a week of the assault that the surveillance footage would be relevant to a future lawsuit. While the Department of Corrections destroyed the footage pursuant to the Department’s automatic video recycling procedures, prior to the filing of the claim by Taylor, the Department did manage to save eight minutes of footage. This begs the following question to be asked: Why did the department not preserve the entire three hours of footage? As a result, the plaintiff in this case sought sanctions for spoliation of evidence with the deletion of the footage. A party seeking sanctions for the spoliation of evidence must establish the following three elements: The party having control over the evidence had an obligation to preserve it at the time it was destroyed; The records were destroyed with a culpable state of mind; and The destroyed evidence was relevant to the party’s claim… such that a reasonable trier of fact could find that it would support that claim. Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 107 (2d. Cir. 2002). If the moving party can establish these three elements, then the court has the ability to impose sanctions under Rule 37 of the Federal Rules of Civil Procedure. The defendants here should have anticipated that the plaintiff would file a lawsuit against the Department for its failure for protect the plaintiff in the holding cell. Therefore, the defendants should have reasonably known that any evidence depicting the plaintiff’s treatment in the holding cell would be relevant to the litigation. The obligation to preserve the video footage in this case attached at the time of the assault due to its relevance. The defendants should have known that the entire three hours of footage would be relevant and that two four minute video clips would be insufficient. Since the entire footage has been destroyed, the defendants breached their preservation duty. The destruction of evidence by the defendants was done in a culpable state of mind and destroyed knowingly. Therefore, the defendants were negligent in allowing the footage to be deleted. However, the defendants were not grossly negligent in their failure to preserve, as no relevant evidence here has been claimed to have been destroyed after the plaintiff filed his Notice of Claim, approximately sixty-five days after the assault occurred. Additionally, the destroyed evidence would have been favorable and relevant to the plaintiff’s claims and defenses in this case. This evidence would have shown the three hour period of time the plaintiff was left injured in the holding cell as well as the failure of the Corrections Officers to protect him and remove him from the cell when he was covered in blood after the assault. The Court found that for these reasons the destruction of evidence prejudiced the plaintiff. Therefore, the following sanctions were ordered by the court: 1) the preclusion of Brantley from testifying about what she saw when she reviewed the deleted footage; 2) the use of an adverse inference jury instruction; and 3) the award of attorney’s fees and costs to the plaintiff. To avoid having a similar outcome, potential defendants should immediately preserve any relevant evidence in matters that they know or should reasonably know will give rise to litigation. Jennifer Whritenour received her B.S. in Political Science and History in 2011 from the University of Scranton. She is received her J.D. from Seton Hall University School of Law in May 2014.
A common problem in e-Discovery is what to do when your adversary is withholding relevant information. An even worse problem is when you know your adversary is withholding relevant information, but you are not precisely certain what that information is. This was the problem for the defendant in NOLA Spice Designs, LLC v. Haydel Enterprises, Inc. who sought—but was ultimately denied—a forensic examination of the plaintiff’s computers. In NOLA Spice Designs, a trademark infringement case, the defendant filed a motion to compel the plaintiff to submit its computers to forensic examinations. The plaintiff challenged the motion by arguing that the forensic examinations failed the proportionality requirement of Federal Rule of Civil Procedure 26(b)(2). This rule prevents a party from requesting discovery when “the burden or expense of the proposed discovery outweighs its likely benefit.” In the context of forensic computer examinations, the court explained such an examination will not be permitted when the request is overly broad and the connection between the computer and claims are “unduly vague or unsubstantiated in nature.” Although the court noted that forensic computer examinations are not uncommon in civil discovery, the court clarified that a mere suspicion that your adversary is dishonestly withholding information is an insufficient basis to order a forensic computer examination. The defendant in NOLA Spice Designs requested the forensic computer examination on the basis that it “has good reasons to believe that something in Plaintiff’s statements is not true” and “that is has suspected all along that its opponents have records that they refuse to produce.” The court characterized the defendant’s reasons as the precise type of skepticism and unwarranted suspicion of dishonesty that are insufficient to warrant an invasive computer forensic examination. Moving forward, litigants should be mindful that courts may be sensitive to confidentiality and privacy concerns when overly broad discovery is requested. Although electronic discovery permits litigants to exchange massive amount of information, that exchange is still subject to the traditional rules of discovery, such as proportionality. In order to combat the hurdle of proportionality, a party who is suspicious that an opponent is withholding information should limit its discovery requests to the specific information that is suspected of being withheld. If the requesting party obtains some information, then it will at least have a reasonable basis to proceed with broader discovery requests because the party can prove to the court that the opposing party has not been forthright. This puts the requesting party in a far greater position than merely seeking an intrusive computer forensic examination with no basis other than mere suspicion of dishonest activity. Helvidius Priscus, a Seton Hall University School of Law graduate (class of 2014), served on the executive board of the Seton Hall Law Review and was a member of the Interscholastic Moot Court Board. Helvidius now clerks for a Justice on the Supreme Court of New Jersey.  “Computer forensics is the practice of collecting, analyzing and reporting on digital information in a way that is legally admissible.” Forensic ctrl, Introduction to Computer Forensics, http://forensiccontrol.com/resources/beginners-guide-computer-forensics/ (last visited Feb. 12, 2014).  Of course, it is difficult to ask for something if you are not sure what exactly you are missing. Nonetheless, the court in NOLA Spice Designs made clear that asking for everything is not the way to go. Starting with small and specific discovery requests (even if they are shots in the dark) may be the better choice because a court is unlikely to find that such requests fail the proportionality requirement.
Although this case does not deal directly with e-discovery, the ruling can have major e-discovery ramifications. Skipping to the end of this very long and complicated decision in Flinthill, the Judge’s conclusion was that the plaintiff in this case was trying to exact revenge on those she felt had wronged her in a messy divorce proceeding. For our purposes, however, the plaintiff and her counsel should have reviewed the discovery they got before bringing a lawsuit and claiming they never got that same discovery. A condensed version of this soap-opera case is as follows: Plaintiff filed for divorce from her husband (Wagner) in 2005, in aMarylandcourt. He was a minority interest stockholder in the company “Spacelink International LLC.” In 1998, “Flinthill Trust” was established to receive the payments for the disbursements of this stock interest. Spacelink was sold in 2005, which left Wagner with around $13 million. $10 million of these funds were evenly divided between Plaintiff and her husband on September 1, 2005. The Plaintiff then filed to freeze Wagner’s interests. TheFairfaxCountycourt issued three orders: 1) prohibiting the trustee of the Flinthill trust from transferring trust assets for at least 60 days; 2) to provide an accounting of all the trust’s assets; and 3) prohibiting any further distribution of funds unless otherwise agreed upon. A stipulation was agreed upon and signed by both parties agreeing to Wagner’s providing two separate accountings of the trust’s comings and goings. Both of those accountings were dutifully made. In addition, a large amount of financial material was exchanged during discovery leading up to a hearing in May of 2006. During that time, Plaintiff did not make any requests to compel discovery, nor did she claim that any of theFairfaxcourt orders were not complied with. The record showed that Wagner and his lawyers repeatedly invited the plaintiff and her lawyers to meet with the trustee to go over the finances of the trust to make sure everything was kosher. Instead of taking them up on their invitation, she brought sixteen months-worth of litigation, which was ultimately deemed by the court to be frivolous and sanction-worthy. The four claims that the plaintiff brought were: 1) Breach of Contract (against Wagner and his people); 2) Breach of Fiduciary Duty (against the trustee); 3) Conspiracy (against various individuals); and 4) Conversion (also against various people). The claim that we are going to focus on, as it deals directly with discovery, is Count 1. In it, she alleged that Wagner breached the stipulation by “frustrating the accounting of trust assets . . . .” Defendants argued that there were four volumes that were transferred to Plaintiff that fully included all of the proper accounting information. The plaintiff’s lawyer claimed that they needed to get a report that was “based on generally accepted accounting principles, and not a compilation of documents,” and the failure to condense those documents constituted a breach of contract. The problem was that the plaintiff’s attorney clearly admitted to not reading the accounting documents that were provided to him, and to not bothering to read any of the ten to thirty boxes of materials relating to the trust that were in the plaintiff’s home. The court took particular offense to this, admonishing “how do you know you are missing something if you do not bother to look at what you have?” Curiously, Plaintiff’s attorney was unable to specifically identify, even two years later, any gaps in the documents that he was litigating about. The court made it clear that the plaintiff and her lawyer were responsible to review the documents already in their possession. If they lack the particular expertise required to do such a review, they were to hire an expert who was capable of the job. The defendants then went on to request for sanctions to be levied against both the plaintiff and her attorney for either willfully or negligently conducting a reasonable inquiry. Additionally, they could not have reasonably believed that this breach of contract suit was grounded in either fact or law. The court then carefully went through the other 3 claims by the plaintiff, and found that they were equal in their egregiousness for either outright lying to the court or failing to reasonably base their case in law. In the end, the court sanctioned the plaintiff and her attorney to the tune of $884,627.26 to cover the defendant’s attorney costs and witness fees. This ruling can have some serious ramifications for plaintiffs in cases with e-discovery. Much discovery material these days is in the form of Electronically Stored Information (ESI). ESI can be particularly volume-heavy, and, therefore, costly to thoroughly review. The information that can be stored on one memory stick is vastly larger than the 10-30 boxes of papers discussed in this case. Still, the court held that it was the responsibility of the requesting party to review the information they receive. If they can’t, they need to hire someone who can. By no means should that party bring a law suit claiming they didn’t get that information. It could end up being very costly for them. Akiva Shepard received his J.D. from Seton Hall University School of Law in 2014. Akiva has worked for a New York State Supreme Court Judge in Kings County and for a NJ real estate firm.
In this case, Plaintiff AMEC Environment and Infrastructure, Inc. (“AMEC”) sued six former employees and Geosyntec Consultants Inc. (“Geosyntec”) after AMEC employees went to work for Geosyntec. AMEC alleges that defendants took confidential and/or trade secret information and competed unfairly with AMEC’s existing and prospective business relationships. The claims include unauthorized access of computer information, misappropriations of trade secrets, breach of contract, and interference with AMEC’s contractual relations with its employees and clients, breach of fiduciary duties, interference with prospective economic advantage, and unfair business practices. In this particular dispute, the parties each complained about the sufficiency of discovery responses made to each other. Geosyntec disputed to the sufficiency of AMEC’s responses to interrogatory questions designed to shine light on why AMEC’s trademark designations are trade secrets that deserve protection. AMEC’s disputed over whether Geosyntec should have provided information about its solicitation of AMEC employees it did not hire, whether it should provide oral, as well as written solicitations of employees it did hire, and whether its search terms for e-discovery were sufficient. To resolve these issue, the Court ordered the parties to each designate five trade secrets for AMEC to answer before mediation. Furthermore, the Court ordered answers to interrogatories to be provided on a schedule pegged to the end of fact discovery, as well as mediation. Finally, the Court ordered that parties memorialize their agreement on the record to confer about other e-discovery issues. In regards to the e-discovery issues, Plaintiffs contended that defendant Geosyntec left out obvious custodians and search terms in their discovery. Defendant counters that its searches were too broad in that they resulted a hit rate of 8%. Even at that rate, Geosyntec stated it already produced 200,000 documents and therefore needed to narrow the search terms. Ultimately, Judge Beeler reserved a decision. The judge refused to intervene in the dispute, believing that the parties know their discovery better and are better suited to manage it on their own. She noted that the parties agreed to meet and confer on their own to resolve and dispute. Judge Beeler also noted in regards to the breadth of email searches, that overly broad searches are just “useless ways of getting at the smoking gun emails.” Salim received his B.A. in Applied Communications, with a minor in Legal Studies, from Monmouth University. He received his J.D. from Seton Hall University School of Law in 2014. Salim’s past experiences include interning for a personal injury law firm prior to attending law school, as well as judicial internships in the Civil and Family Divisions. Currently, Salim is taking part in the Immigrants’ Rights/International Human Rights Clinic at Seton Hall Law.
How involved does a district court have to be in discovery issues? This is the main issue that the Colorado Supreme Court tackled in this case. The Court drew a firm line and interpretation on one of the state’s discovery rules and remanded to the district dourt so they could follow it. The plaintiff, DCP Midstream, LP brought a case for eleven breach of contract (among other claims) against the defendant, Anadarko Petroleum Corporation. The two companies transport, gather, and process natural gas in Northeastern Colorado. DCP Midstream transported the gas from wells and took them to be processed and sold. DCP Midstream had contractual relationships, known as "gas purchase, gathering, and processing agreements" with a number of companies to carry this out. One of the companies that DCP Midstream did regular business with was Kerr-McGee Oil, which was acquired by Anadarko Petroleum. It was then, according to the plaintiff, when the relationship soured. DCP claims that Anadarko told Kerr-McGee to “transport and process natural gas in violation of DCP's contractual rights” and brought suit accordingly. DCP’s claims regarded eleven contracts specifically which covered about 900 wells. DCP asked for document production using 58 requests. These requests asked for Anadarko’s “complete contract file” for the thousands of wells that it operates as well as the title opinions for them. Anadarko objected to many of these requests claiming that they were not relevant to the claims contained in the complaint and as such, outside the scope of discovery under Colorado Rules of Civil Procedure 26(b)(1). Further, Anadarko claimed that the opinions asked for were privileged attorney-client communications but that claim won’t be addressed here. The trial court did not hear argument regarding Anadarko’s objections and merely granted DCP’s motion to compel. Their written order read, “DCP was entitled to discovery that is or may become relevant and, because DCP's "breach [of contract] claim may expand and may ultimately encompass thousands of wells," DCP was entitled to discovery that may lead to more specific allegations…”” Anadarko petitioned the Supreme Court of Colorado for review. The Supreme Court found jurisdiction to take the case and discussed extensively the state rules, how the scope of discovery should be determined, and the role of the Court in all of it. Specifically, the Court talked about the above-cited 26(b)(1) which granted parties as a matter of right, the ability to ask for discovery for anything that is not privileged that is “relevant to the claim or defense of any party.” For good cause, the rule allows the court to permit a party more expansive discovery rights into "any matter relevant to the subject matter involved in the action." The distinction between the discovery allowed as a matter of right and that to be allowed for good cause was troubling to the Court. The Court said that there was no easily explainable difference between what a “claim or defense” is versus what is “subject matter.” Instead, the Court pointed to the advisory committee notes on the rule which advocated looking at the rule more practically. The notes suggested that the Courts, when there is a discovery objection, determine the scope of discovery and tailor it to the “reasonable needs of the action.” It is this approach that the Court adopted for the state of Colorado. The Court (and the state rules that it pointed to) also made it inescapably clear how vital the role of the trial court is in the discovery process. Active judicial management is needed to decide scope of discovery questions in light of the action calls for and what is reasonable. The trial court, in this case, did not make any findings on that question and instead just put through an order without any tailoring at all. The Supreme Court remanded the case to the trial court so they may make findings pursuant to their approach to the rule. Trial court judges of Colorado beware! If you don’t take an active role in deciding discovery objections, the Supreme Court will just remand and you will have to look at it again, anyway. Isn’t it just easier to manage your responsibility the first time? Julie will receive her J.D. from Seton Hall University School of Law, where she is serving as President of the Family Law Society and was a Student Attorney for the Center for Social Justice’s Family Law Clinic, in 2014. Prior to law school, she was a 2008 magna cum laude graduate of Syracuse University, where she earned a B.A. in History and a minor in Religion and Society. After law school, Julie will serve as a law clerk to a judge of the Superior Court of New Jersey.
Once bitten, twice shy. The classic idiom stands for the general proposition that when an individual is hurt by someone or something, they tend to avoid that person or situation in the future. Well, it looks like the defendant in Hart v. Dillon Companies did not learn its lesson as it will face spoliation sanctions for the second time in two years. In 2011, the defendant’s bad faith destruction of company videotapes led to an adverse inference ruling. E.E.O.C. v. Dillon Companies, Inc., F. Supp. 2d 1141 (D.Colo. 2011). Now the company faces additional spoliation sanctions, once again for accidentally erasing pertinent recorded evidence. The plaintiff’s 21 years of employment at the defendant’s grocery store came to an end when it was alleged that she had been abusing her power as the store’s bookkeeper by paying herself at a marked-up rate. The decision to terminate the plaintiff was partially based on a secretly recorded conversation that occurred between the plaintiff and the defendant’s loss prevention specialist. On November 1, 2011, the former employee filed an E.E.O.C. charge of discrimination against her former employer, believing that her termination was the result of age discrimination. Knowing that the plaintiff had hired an attorney, the defendant denied her request for arbitration, and the plaintiff filed its complaint on March 1, 2012. At some point between the arbitration denial on November 7, 2011, and the filing of the complaint, the recording of the plaintiff’s interview was accidentally erased. On March 1, 2012, the defendant employer initiated a litigation hold, but this was too little too late. The damage had already been done, and the plaintiff filed a motion for sanctions for the spoliation of the recorded evidence. Adding insult to injury, the Colorado District Court actually cited to the defendant’s previous spoliation case when laying out the issues of spoliation. According to that decision, the issues of spoliation are: (1) is the evidence relevant to an issue at trial; (2) did the party have a duty to preserve the evidence because it knew or should have known, that litigation was imminent; and (3) was the other party prejudiced by the destruction of the evidence. With regards to the first issue, the court found that the recorded interview was obviously relevant to the case because it played a role in the defendant’s decision to terminate the plaintiff’s employment. Discussing the second element, the court found that the duty to preserve the evidence began on November 7, 2011, because at the time of the arbitration denial the defendant was well-aware litigation was likely. This was the trigger event that marked the defendant’s duty to institute a litigation hold. In fact, evidence existed that the defendant’s labor relations manager was well aware that the plaintiff’s attorney and arbitration request signified an intent to litigate the issue.In terms of prejudice, the court found that the plaintiff was prejudiced by the destruction because several factual disputes existed as to what occurred during the secretly recorded interview. Finding the defendant “highly culpable” for the four month delay, the court also determined that the failure to collect the tape recording from “a key player” was an example of grossly negligent or willful behavior. Even though the defendant may not have shown an intent to destroy the evidence, the company had control over the tape and the responsibility to preserve it. Therefore, the plaintiff’s motion for sanctions was granted. Sanctions have not yet been determined, though, as the court set a future hearing to determine the precise amount of sanctions to impose. While E.E.O.C. charges, like those brought by the plaintiff here, do not always lead to litigation, companies should get in the habit of instituting litigation holds whenever they face charges like these. Even if the chances of litigation appear remote, if possible the company should seek to preserve all pertinent evidence to avoid this type of scenario. In this matter, if the company had issued a litigation hold when it received the E.E.O.C. charge or even upon receiving the arbitration request, it could have avoided the sanctions it will now receive. Companies are risking too much by not immediately preserving all the evidence relevant to the potential case. Here, if the defendant had learned from its previous bad experience with evidence spoliation, it could have instituted better preservation procedures that would have avoided the significant penalties it now confronts. Jeffrey, a Seton Hall University School of Law Student (Class of 2014), focuses his studies primarily in the area of civil practice but has also completed significant coursework concerning the interplay between technology and the legal profession. He was a cum laude graduate of the University of Connecticut in 2011, where he received a B.S. in Business Administration with a concentration in Entrepreneurial Management. Presently, Jeff serves as a legal clerk at a personal injury law firm in Rochelle Park, New Jersey.