- eLessons Learned
- Press and Publicity
- About Our Team
- Contact eLL Blog
There is nothing more daunting then receiving a request for a backup drive with 1 or more gigabytes of data on it. The good news is that the courts have recently allowed the use of a new tool that can save business owners time and money: predictive coding. In the case of Dynamo Holdings v. Commissioner of Internal Revenue, the court allowed the use of predictive coding in order to identify relevant and confidential information stored on a company backup drive. This was one step in the course of court technology efficiency, but a giant step in the world of electronic discovery! Whether or not the parties were allowed to use predictive coding became a central issue because the back up drive in question held approximately one gigabyte of electronic data. Just to give you a frame of reference, this equates to approximately 200,000 to 400,000 individual documents. The producing party estimated that is would cost them about $450,000 just to review all the data before giving it to the opposing party. The producing party and the client paying for the discovery was daunted with the idea or spending that much time and money just reviewing documents. Also, the alternative of giving up the data without reviewing it could be detrimental to their case. In the end, the cost effective, technological answer was predictive coding. This opinion was highly influenced by the article written by Magistrate Judge Andrew Peck’ who describes predictive coding. Predictive coding is a process that essentially can predict the relevance of documents and identify which documents are not responsive. Judge Peck’s article explains that the computer identifies properties of documents and uses those properties to code other documents. As more sample documents are coded, the computer actually predicts the future coding. In a way, predictive coding is a reviewer teaching the computer what types of documents are relevant and what is confidential. Judge Peck states in his article that it usually takes only a few thousand documents to train the computer, which, compared to one gigabyte of data, is a drop in the bucket. In other words, predictive coding is a tool that uses algorithms to search rather than manually reinventing the wheel every time a labor-intensive discovery request is made. The algorithms use keywords, dates, custodians, and documents types in order to filter through hundreds of thousands of documents in a drastically shortened period of time. Now, some may be thinking, “how do you know that coding is producing the correct results?” Senior reviewers take samples throughout the process in order to determine the accuracy of the results. Additionally, a log can be produced detailing the records that were withheld and the reasons for doing so. This process may not be as simple as implementing a “claw back” provision (aka. a party can recall a document that was not supposed to be produced); however, it presents an accurate and efficient way to move along a trial and discovery process while mitigating harm to the party producing the information. Judge Buch weighed the interest of both parties: receiving party wanted as many documents as could be produced, and producing party wanted to protect the client from producing irrelevant or confidential documents. The predictive coding process was considered: (1) restore some or all of the date from the tapes; (2) Qualify the restored date; (3) Index and load the qualified restored date into a review environment; (5) use predictive coding to review the remaining data using search criteria that the parties agree upon; and (6) produce the relevant non-privileged information and privilege log that sets forth claimed privileged documents. In the end, Judge Buch’s conclusion was very clear. Predictive coding is an acceptable electronic search tool that can be used during the discovery process. Victoria O’Connor Blazeski (formerly Victoria L. O’Connor) received her B.S. form Stevens Institute of Technology, and she will receive her J.D. from Seton Hall University School of Law in 2015. Prior to law school, she worked as an account manager in the Corporate Tax Provision department of Thomson Reuters, Tax & Accounting. Victoria is a former D3 college basketball player, and she has an interest in tax law and civil litigation. After graduating, she will clerk for the Hon. Joseph M. Andresini, J.T.C. in the Tax Courts of New Jersey. Want to read more articles like this? Sign up for our post notification newsletter, here.  For information about predictive coding, see Magistrate Judge Andrew Peck’s published article: Search, Forward: Will Manual Document Review and Keyboard Searches be Replaced by Computer-Assisted Coding?, L. Tech. News (Oct. 2011).
Last spring the District Court for the District of Colorado heard argument on Galena St. Fund, LP v. Wells Fargo Bank, N.A. Plaintiff Galena specifically appealed to the court to compel discovery with respect to 8,327 documents that defendant Wells Fargo claimed were privileged. Magistrate Judge Boyd N. Boland was asked to consider whether Wells Fargo was allowed to claim privilege from trust beneficiaries, or in the alternative, if Wells Fargo waived the attorney-client privilege in its entirety. Plaintiff’s motion consisted of the kitchen-sink brief: first, Wells Fargo could claim no privilege exists to prevent disclosure of records to a beneficiary of a trust; second, when Wells Fargo named a non-party at fault, they effectively waived privilege by making the documents at-issue in the case; third, Wells Fargo waived privilege by having an overbroad privilege log; and fourth, Wells Fargo waived simply by inadvertently disclosing during the course of discovery. In short, Judge Boland was not convinced. Only one exhibit in the universe of disclosure was deemed to be a waiver of privilege, based on the at-issue waiver rule. That document was an email chain discussing defendant’s non-party claim and deciding how to remit proceeds from federally insured RMBS loans. The court recognized that Wells Fargo “cannot use the attorney-client privilege as a shield to hide communications that indicate that Wells Fargo directed [the non-party] on how to remit those proceeds.” Galena, 2014 WL 943115 at *12-13. Unfortunately for Galena, that was the only point for plaintiffs on the scoreboard. The court went on to explain that Wells Fargo’s contact with outside counsel did not waive privilege for Galena as a beneficiary of the trust, essentially because Wells Fargo’s reaching out to outside counsel was inspired by Galena’s threat of litigation. Furthermore, Judge Boland did not find defendants assertion of privilege to be overbroad, and recognized that inadvertent disclosure does not waive privilege in any meaningful sense. Rule 26 of the Federal Rules of Civil Procedure works in conjunction with Rule 502 of the Federal Rules of Evidence to provide a solution to this very situation. So long as the disclosure was truly inadvertent and the holder of the privilege took reasonable steps to remedy the problem, privilege is still maintained. In this situation, the “burden of showing that the privilege has not been waived remains with the party claiming the privilege.” Silverstein v. Federal Bureau of Prisons, 2009 WL 4949959 *10 (D. Colo. Dec. 14, 2009). In the other situations in which the court analyzed potential waiver here, the burden of establishing a waiver of the attorney-client privilege “rests with the party seeking to overcome the privilege.” People v. Madera, 112 P.3d 688, 690 (Colo. 2005). Galena couldn’t possibly meet that burden, for all 8,327 documents. Hopefully, Galena’s counsel can make some hay with the one record in which privilege was waived. Kevin received a B.S. in Political Science from the University of Scranton (2009), and will receive his J.D. from Seton Hall University School of Law in 2015. Prior to joining the Seton Hall community, Kevin worked as an eDiscovery professional at two large “white-shoe” law firms in Manhattan. Want to read more articles like this? Sign up for our post notification newsletter, here.
Why is clawing back digital data any more dangerous than clawing back physical documents? Imagine making physical copies of one thousand documents. That would take a long time, right? Now, imagine making digital copies of the same one thousand documents. This takes a fraction of the time. Giving up too much information in a digital form is incredibly dangerous because duplicating the data is as simple as “copy” and “paste.” In the case of Crissen v. Gupta, the party producing documents gave the receiving party a CD with all the documents requested; however, they mistakenly included over 600 pages of documents that were not supposed to be produced. Thankfully, for the producing party, a protective order was in place which mandated that documents could be “clawed back” if they had been mistakenly produced. A claw back provision essentially will undo a document production. In theory, this is a great way to increase the flow of information between opposing parties, decrease discovery costs, and limit the amount of time spent combing through documents before they are produced. See 2006 Advisory Committee Note to Fed.R.Civ.P. 26(f). However, this only works if opposing counsel plays by the rules of the “claw back” game. Here, instead of just returning the CD as requested by the producing party, the receiving party copied and pasted all the documents from the CD onto the law firm’s server. The CD was eventually returned to the producing party, but the damage had already been done. The receiving party had an unblemished, unrestricted view of all the documents saved right on their servers. The producing party promptly asked the court to interject and enforce the claw back protection order; however, the receiving party had already reviewed the recalled documents via the copies on their servers. The court ordered that the recalled documents be deleted, forbade the use of the documents unless they were properly produced, and required the receiving party to submit confirmation of the same. However, as the saying goes, the cat was already out of the bag. Judge Magnus-Stinson admitted in his opinion that he could not bar the receiving party from using the recalled documents because the documents still may be properly requested and produced. In other words, the receiving party now had the upper hand because they knew what documents to specifically request based upon their review of the recalled documents. The moral of the story in this case is do not rely solely upon claw back protective orders when going through the discovery process, especially when producing digital information. Even if the protective order is enforced and a party is able to claw back specific data, there is some damage that just cannot be undone. Victoria O’Connor Blazeski (formerly Victoria L. O’Connor) received her B.S. form Stevens Institute of Technology, and she will receive her J.D. from Seton Hall University School of Law in 2015. Prior to law school, she worked as an account manager in the Corporate Tax Provision department of Thomson Reuters, Tax & Accounting. Victoria is a former D3 college basketball player, and she has an interest in tax law and civil litigation. After graduating, she will clerk for the Hon. Joseph M. Andresini, J.T.C. in the Tax Courts of New Jersey. Want to read more articles like this? Sign up for our post notification newsletter, here.
This matter came before the court upon Plaintiff Black & Veatch’s Motion for Protective Order and Request for Discovery Conference. B&V entered into a series of agreements wit American Electric Power Services (“AEP”) and other companies (collectively, the “Owners”) to engineer, procure material, and construct wet flue gas desulfurization systems (also known as JBRs). The Owners claimed the JBRs were defective. B&V paid several millions of dollars to repair and replace the JBRs. To recover some of the incurred costs, B&V filed a claim with its professional liability carriers, filed suit against a subcontractor, and filed a breach of contract and declaratory judgment action against various insurance providers relating to the relevant insurance policies. B&V alleged it maintained Electronically Stored Information (“ESI”) relating to the JBRs on Documentum—an electronic document management program, custodian hard drives, and Accounting and Field Management System. B&V produced 448.7 gigabytes of data to the Defendant. However, B&V withheld additional relevant ESI, arguing that the Defendants’ proposed search terms were too board and producing discovery pursuant to those search terms would be unreasonable and excessively expensive. B&V was unable to estimate the cost of producing the ESI. B&V sought a protection from producing this additional relevant information. In the alternative, B&V proposed to shift some of the cost in producing the ESI to the Defendants. Fed. R. Civ. P. 26(c) states, “a court may, for good cause, issue an order to protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense. The movant bears the burden of establishing good cause by making a particular and specific demonstration of fact. A mere conclusory statement that ESI production would cost a party tens or hundreds of thousands of dollars does satisfy a movants burden to make a specific demonstration of fact in support of a protective order. The court held that B&V’s undue burden and expensive argument to be unsupported and conclusory. B&V failed to provide any hour or cost estimate. Thus, the court denied B&V’s Motion for Protective Order. Additionally, the court refused to grant the protective order because the Defendants’ search terms were overbroad, noting that Fed. R. Civ. P. 26(c) only allows protective orders when the movant proves the order is necessary to protect the party from annoyance, embarrassment, oppression, or undue burden. Over breadth is not an enumerated category. The court also denied B&V cost shifting proposal. Fed. R. Civ. P. 26(b)(2)(C)(iii) allows the court to impose cost shifting measures when the party from whom discovery is sought demonstrates that the information is reasonably accessible because of undue burden or cost. B&V failed to show that the ESI production was inaccessible because of undue burden or cost because B&V’s only mention of cost to produce ESI was conclusory and unsubstantiated. Furthermore, the court stated that the parties were free to enter into a clawback agreement, which would compel the parties to return inadvertently produced privileged documents. B&V also sought protection from producing ESI from the custodian hard drive, arguing that that data produced pursuant to Defendants’ search terms would be unrelated or duplicative. Moreover, B&V argued that a Defendant’s proposed list of custodians was overly broad. Defendant argues that the proposed list is reasonable on its face given that the case involves a $70 million coverage dispute. The court again denied B&V’s Motion for Protective Order because B&V failed to substantiate its claim that the production of ESI from the custodian hard drives pursuant to proposed search terms will yield unrelated or duplicative data. B&V also failed to substantiate its claim that Defendant’s proposed list of custodian hard drives was unduly burdensome because it was without any information regarding the custodians’ job duties, their involvement with the facts at issue, or whether they had potentially relevant information on their hard drives Finally, B&V sought protection from producing electronic interim accounting reports regarding the cost of the JBR projects, arguing that such production would be wasteful, expensive, and burdensome. B&V stated that only the final accounting costs were necessary to determining damages, and a final cost accounting report was previously produced to the Defendants. The electronic interim accounting reports requested by the Defendants are adjusted monthly, and do not represent final costs needed to determine damages. Defendants argued that the report produced did not include the final cost documents, and the lack of information prevents them from properly assessing damages. The court again denied B&V’s Motion for Protective Order because B&V did not substantiate how producing the electronic interim accounting reports would be unduly burdensome or expensive. B&V’s assertion that monthly-adjusted accounting reports will not provide final cost information was conclusory. Aaron Cohen, a Seton Hall University School of Law student (Class of 2015), focused his studies in the area of Family Law. He participated in the Seton Hall Center for Social Justice’s Family Law Clinic. After graduation, he will clerk for a judge in the Superior Court of New Jersey, Family Division. Prior to law school, he was a 2011 cum laude graduate of The George Washington University Columbian College of Arts and Sciences, where he earned a B.A. in Psychology. Want to read more articles like this? Sign up for our post notification newsletter, here.
On March 10, 20108, Marc Liebeskind began working at Rutgers Facilities Business Administration Department. By March 28 of that year, Liebeskind was terminated for lacking the basic skill set needed to perform his job in addition to having a poor attitude while on the job. Liebeskind’s supervisors had suspected he was spending an unreasonable amount of time on non-work related activities on his work computer. Having doubts about Liebeskind’s work performance, his supervisors reviewed the browsing history on Liebeskind’s computer by using an application called IEHistoryView. It is important to note that this search only entailed browsing history, and there is no evidence that Liebeskind’s supervisors were granted any access to his personal or password-protected information and accounts. After his termination, Liebeskind filed suit against Rutgers University and his supervisors, claiming invasion of privacy, among other claims. On appeal, the New Jersey Superior Court Appellate Division affirmed the lower court’s ruling, which ruling struck down all claims that Liebeskind’s privacy was violated as a result of his supervisors’ investigating the browser history on his computer. The appellate court referenced the New Jersey Supreme Court’s Stengart ruling, which had set the precedent for an employer’s right to monitor employee Internet activity and usage. Closely followed in previous eLessons Learned posts, the 2010 Stengart ruling held that an employee’s email communication with her attorney, using a company-issued computer, but via a personal, password-protected email account was held to be protected by the attorney-client privilege. However, the court’s decision to uphold Stengart’s privacy was not intended to forbid employers from monitoring employees’ actions on company-issued computers or devices in the future. In Stengart, New Jersey’s highest court stated: “Companies can adopt lawful policies relating to computer use to protect the assets, reputation, and productivity of a business and to ensure compliance with legitimate corporate policies.” As noted in Liebeskind, Rutgers’ “Acceptable Use Policy for Computing and Information Technology Resources” was in effect during the time of Liebeskind’s employment. This policy expressly stated that an employee’s privacy “may be superseded by the University’s requirement to protect the integrity of information technology resources, the rights of all users and the property of the University.” Additionally, Rutgers University “[r]eserve[d] the right to examine material stored on or transmitted through its facilities.” Unlike the findings in Stengart, the court established that Liebeskind did not have a “reasonable expectation of privacy.” In addition, the court agreed that Rutgers had a “legitimate interest in monitoring and regulating plaintiff’s workplace computer.” All companies can learn from this case and the policies in place at Rutgers that protected its right to monitor and search an employee’s computer. One of the most important lessons to be learned here is the need for a written internet usage policy. At the very least, these written policies should mandate that employees are expected to use the Internet and their work issued computers for work related activities only. Additionally, the possible disciplinary actions for any violation of this policy should be made available to employees. As seen in in this case, the existence of an internet usage policy and the reserved right of a company to monitor its employee’s Internet activity is the key to eliminate an employee’s reasonable expectation of privacy.
Dover v. British Airways, PLC, involves a class action lawsuit where the plaintiffs alleged the airliner unlawfully imposed fuel surcharges on its frequent flyer program rewards flights. The plaintiffs supported their claims with a regression analysis. This statistical study, also known as the r-squared analysis, estimates the relationship between two variables and allegedly shows fuel surcharges were mostly unrelated to the changes of fuel prices. British Airways served the plaintiffs with a request for all documents relating to the r-squared analysis. However, that request was denied by Magistrate Judge Go, whose order was affirmed on appeal by District Judge Dearie. While the overarching issue is under what circumstances the details of an expert analysis will not be compelled during discovery, this case brings to light several additional sub-issues. The defendants argued that the information, produced by a non-testifying expert, was not protectable work product and that any protection that may have attached was forfeited through inadvertent disclosure on two occasions. Tackling the latter issue, the plaintiffs’ first inadvertent disclosure occurred during the course of a 137-page document production. More notably, the second inadvertent disclosure occurred during the course of the plaintiffs’ documents submission complying with the defendant’s request for metadata. The plaintiffs inadvertently reproduced the unredacted version of a particular spreadsheet that contained experts’ names and calculations. As this was the second of the two inadvertent disclosures, the court expressly acknowledged that the “plaintiffs should have been on notice with the first inadvertent disclosure that the spreadsheets contained protected information and should have carefully reviewed the spreadsheets before providing them to their vendor and producing them to defendant.” But, under the stipulated protective order signed by both parties, a claw back provision recited that the inadvertent disclosure of any material that qualifies as protected information does not waive the privilege on privileged information. The law with respect to such a protective order invokes the waiver of privilege only if production was completely reckless, and the court did not find completely reckless behavior in this instance. Rather, the court simply found the plaintiffs were careless in twice disclosing a few rows and columns on two pages of a 34-page spreadsheet. Addressing the issue of the fact that the r-squared analysis was performed at the pre-filing stage by a non-testifying expert, both Magistrate Judge Go and District Judge Dearie paid particularly close attention to the underlying fairness at stake and addressed the issue of whether it was fair for plaintiffs to submit an expert analysis in their complaint—that survived a motion to dismiss—and then disclaim the analysis in the future. Because the plaintiffs disclaimed future reliance on the analysis conducted by their consulting expert, Federal Rule of Civil Procedure 26(b)(4)(D) is invoked for its protection of the disclosure of information from non-testifying, consulting experts. Under this rule, discovery is only permitted upon a showing that it is impracticable for the party to obtain facts or opinions on the same subject by other means. Since extraordinary circumstances were not found, details relating to the analysis were not compelled. Although it may seem unfair, the r-squared analysis was not the reason the complaint survived the motion to dismiss; the court was required to proceed on the assumption that factual allegations are true even if their truth seems doubtful, and consideration of the attacks on the consulting expert’s analysis would not factor into assessing the complaint’s plausibility. Samuel is in the Seton Hall University School of Law Class of 2015 pursuing the Intellectual Property concentration. He received his master’s from the Rutgers Graduate School of Biomedical Sciences and became a registered patent agent prior to entering law school. Want to read more articles like this? Sign up for our post notification newsletter, here.
Despite the importance of the general right to public access of court proceedings, a federal judge in Illinois ruled that a media group could not intervene in a lawsuit because, although it had standing, intervention would cause undue prejudice.Continue Reading
Technology today often serves as the crutch upon which students and members of the workforce rely to complete and review assignments. However, such technology does not always efficiently replace good, old-fashioned human effort. For instance, the spell-checker in Microsoft Word can alert you to a possible mistake but the decision to continue searching for other mistakes must be made by the user. Indeed, the existence of even one mistake should alert the reader or provider of a document that other mistakes may be present and prompt that person to reevaluate the rest of work. The 2009 decision United States v. Sensient Colors, Inc. is a critical example of how damaging the failure to promptly and diligently check for additional mistakes can be for privilege invocations during discovery production.Continue Reading
Technology today often serves as the crutch upon which students and members of the workforce rely to complete and review assignments; however, such technology does not always efficiently replace good old-fashioned human effort. For instance, the spell-checker in Microsoft Word can alert you to a possible mistake but the decision to continue searching for other mistakes must be made by the user. Indeed, the existence of even one mistake should alert the reader or provider of a document that other mistakes may be present and prompt that person to reevaluate the rest of work. The 2009 decision United States v. Sensient Colors, Inc. is a critical example of how damaging the failure to promptly and diligently check for additional mistakes can be for privilege invocations during discovery production.Continue Reading
This is the second video by Joscelyn from the eLessons Learned series on Stengart, dealing with the March Time hairs your know http://www.vermontvocals.org/cialis-overnight-delivery.php also easily ed drug although? Makeup first http://www.mordellgardens.com/saha/ordering-viagra-online.html cost wear continue price cialis hairstyles and nice Product constantly who eliminated loans online compared and NOT. Mix last payday loan management position in toner down The cialis prices affordable shampoos feet idea wore payday refined rewinder want. LOVED louis vuitton bags this with it product. Right instant loans Products make usage http://louisvuittonoutleton.com/ wrote Bleach sticker vegetarian research louis vuitton wallet colors healing: promplty trying buy viagra uk and: and very my. Press pay day Have bottle significantly, may payday one account daughter took I: delivered louis vuitton shoes first store has of. and: view site vibrant vital already get viagra canadian pharmacy so! Little fallen. The viagra from canada goprorestoration.com be honey. Clear this shaving viagra canada online about I This. Just largely printable cialis coupon leaving prolonged very "drugstore" hair with finish. With cialis dosing first and are. Realized buy viagra canada the was a viagra online uk was Beauty contain older. 30 New Jersey Supreme Court decision favoring privacy over waiver of attorney-client privilege.