- eLessons Learned
- Press and Publicity
- About Our Team
- Contact eLL Blog
Plaintiff Steve Pick filed suit against Defendant City of Remsen (and other defendants) alleging, among other claims, violations of constitutional rights pursuant to 42 U.S.C. § 1983. Pick served the city with a discovery request. The city then produced 440 pages of documents, including 183 pages of e-mails. Some pages contained more than one email. The defendant’s inadvertently disclosed an email that was originally sent to six privileged recipients. Within thirty-four minutes of discovering that the email had been inadvertently produced, defense counsel contacted the plaintiff’s counsel. Defense counsel explained that the email was mistakenly produced and was protected by attorney-client privilege. Defense counsel asked that the email be destroyed. The plaintiff’s counsel refused. Defendants’ filed a motion request that the court order the email’s destruction as an inadvertently produced privileged document. Applying the middle-of-the-road approach, the Magistrate Judge held Defendants had not waived attorney-client privilege by the inadvertent disclosure, and ordered the email to be destroyed. Plaintiff appealed. Plaintiff objected to the analysis of the Magistrate Judge conducted pursuant to the middle-of-the-road test. The District Court recognized that three approaches have been developed to analyze inadvertent disclosures of privileged information. Including the lenient approach, the strict approach, and the middle-of-the-road approach. Having already held that the middle-of-the-road approach applies in diversity cases, the court held that the middle-of-the-road approach also applies in federal question cases. Furthermore, the court applied a “clearly erroneous or contrary to law” standard of review Pursuant to the middle-of-the-road approach, the court considers five factors in determining whether the inadvertent disclosure waived attorney-client privilege. The factors are as follows: 1) the reasonableness of the precautions taken to prevent inadvertent disclosure in view of the extent of document production; 2) the number of inadvertent disclosures; 3) the extent of the disclosures; 4) the promptness of measures taken to rectify the disclosure; and 5) whether the overriding interest of justice would be served by relieving the party of its error. Plaintiff objected to the Magistrate Judge’s analysis under the first, third, and fifth factors. Plaintiff objected to the Magistrate Judge’s conclusion that defense counsel took reasonable precautions prevent disclosure, alleging that defense counsel’s failure to create a privilege log was unreasonable, the privileged email was not inconspicuously located among non-privileged emails, and defense counsel’s review process—being the sole reviewer—was unreasonable. The court held that defense counsel’s failure to prepare a privilege log was not unreasonable because defense counsel’s review of the responsive documents did not reveal any privileged information. Further, the court held that the Magistrate Judge correctly concluded the privileged email to be inconspicuously located among non-privileged documents. The privileged email was located on the same page as a non-privileged email. Moreover, the privileged email was located on two pages of the 183 pages of emails, and 440 total pages of documents, produced. Likewise, the court found defense’s counsel’s review process to be reasonable. It is reasonable for an attorney to review discovery responses without non-lawyer staff. Thus, the court upheld the Magistrate Judge’s determination that first factor weighed in favor of maintaining the email’s privileged status. Although the Magistrate Judge found the third factor to weigh in favor of waiver of the attorney-client privilege, Plaintiff objected to the factual finding that the privileged email was disclosed to not others. The plaintiff alleged that the privileged email was disclosed to its six recipients, thereby increasing the extent of the inadvertent disclosure. However, the court noted that the plaintiff ignored the Magistrate Judge’s conclusion that the six recipients were privileged recipients. Thus, the Magistrate Judge’s factual determination as to the extent of the disclosure was not clearly erroneous. Finally, the plaintiff objected to the Magistrate Judge’s conclusion that the plaintiff would not suffer unfair prejudice by maintaining the email’s privilege protection. The court upheld that Magistrate Judge’s finding that the plaintiff had other evidence he intended to rely on by virtue of the fact that the plaintiff progressed with action for over nine months with out the benefit of the privileged email. The court also upheld the Magistrate Judge’s conclusion that the plaintiff could not reasonably rely on the privileged email to support his case because any attorney reviewing a document production with a large number of non-privileged documents would realize that the disclosure was inadvertent. Further, the court quoted the Magistrate Judge’s holding that “‘absent the mistaken disclosure, Pick and his attorneys would not know and would not have the right to know, the contents of the [email].’” Therefore, “the interest of justice would be harmed hereby permitting Pick to use the email at trial.” There is no real harm in zealously representing your client’s interest after inadvertently receiving privileged information. Plaintiff’s attorney correctly chose to find a way to strip the email of its privilege protection in order to use the email to support the plaintiff’s case. However, attorneys should recognize an argument in favor of waiver of attorney-client privilege may be futile in instances similar to the facts above. Aaron Cohen, a Seton Hall University School of Law student (Class of 2015), focused his studies in the area of family law. He participated in the Seton Hall Center for Social Justice’s Family Law Clinic. After graduation, he will clerk for a judge in the Superior Court of New Jersey, Family Division. Prior to law school, he was a 2011 cum laude graduate of The George Washington University Columbian College of Arts and Sciences, where he earned a B.A. in psychology. Want to read more articles like this? Sign up for our post notification newsletter, here.
On December 16, 2015, the Honorable Susan D. Wingenton granted GDC’s Motion to Quash Defendants William Baroni and Bridget Kelly’s subpoena duces tecum, which asked the GDC to produce “Any and all handwritten or typed notes, stenographic transcripts and audio and/or video recordings of witness interviews conducted by Gibson Dunn during its representation of the Office of the Governor of New Jersey from on or about January 16, 2014 to the present.” Defendants also included a request to produce any and all metadata and document properties for all typed notes and interviews as well. In her Opinion, Judge Wingeton took certain issue with the ethically questionable document preparation methods of the GDC, yet ultimately decided to grant the Motion to Quash. The GDC had a somewhat perplexing response to Defendant’s first requests as to notes, transcripts and recordings of witness interviews conducted by the GDC during its representation of the OGNJ. They claimed that no such materials currently existed. Here, the GDC deviated from normative interview information collecting techniques; here witness interviews were summarized electronically by one attorney while the interviews were being conducted and then edited electronically into a single, final version. This differed greatly from their former methods of practice, where contemporaneous notes were taken by GDC interviewers and that those notes were preserved after the summaries were completed. By contrast, the GDC clearly intended that contemporaneous notes of the witness interviews and draft summaries would not be preserved, as they were overwritten during revisions and in preparing the final summary. The Court found this to be “unorthodox” at the least, and noted its disapproval of their actions, likening them to have the same effect as deleting or shredding documents. Unfortunately, however, the Court had no reason to doubt the GDC’s honesty with respect to their methods or their responses to Defendant’s request for documents. The Court did sympathize with the both Baroni and Kelly, but granted the motion anyway. It is clear to see that the GDC’s actions, though ultimately condoned by the Court, were not done with the intent to deliver a full and honest discovery of the requested materials. While the Court may have deemed such actions as legal, GDC’s document preparation methods raise many ethical implications, and could have clearly been used to destroy important information that Defendants here were entitled to. Indeed, this method of refining interview summaries and information could have easily omitted details the defense may have found useful. Doing so did not provide the defense with the transparent information they should have received by request; instead they had to make due with the GDC’s white-washing of the information. In all, the GDC should have been more responsible and fair with the way it conducted and kept record of it’s interviews. This method of refining information can only seek to unfairly hurt their opposing counsel. Garrett Keating received his Bachelor’s degree from Trinity College (2011) and majored in both Political Science and Public Policy and Law; he will receive his J.D. from Seton Hall University School of Law in 2016. He has worked primarily in the legal fields of Medical Malpractice, Personal Injury, and Class Action law
In this case, the plaintiff sued her former employer for violating the Fair Labor Standards Act by requiring her to work forty-eight hours a week without an uninterrupted lunch break, and only compensated her for forty hours per week. In order to rebut these allegations, the defendants requested, among other things, the plaintiff’s Facebook account information during the relevant time period. When the plaintiff refused to comply with the request, the defendant sought relief from the court for an order compelling her to produce the following discovery: Using the ‘Download Your Information,’ feature or other comparable technique, produce a complete history of your Facebook account, including without limitation all wall posts, status updates, pictures, messages, communications to or from your account, and any other content displayed at any time on your Facebook account. The defendants argued that this information was necessary for two reasons: 1) to prove the plaintiff was engaged in non-work-related activities during the time she claimed to be working, and 2) to disprove the plaintiff’s emotional distress claim. As to the first purpose, the court held that the defendants were not able to support their position that a broad inspection of the plaintiff’s social media account was reasonably calculated to lead to the discovery of evidence demonstrating where the plaintiff was during the hours she claimed to be working. “Defendants have not made a sufficient predicate showing that this broad class of material is reasonably calculated to lead to the discovery of evidence establishing Plaintiff's whereabouts during the Relevant Time Period.” However, the court agreed that the discovery of limited social media information was permissible to uncover activity relating to the plaintiff’s emotional distress and any potential alternative causes of that distress. Therefore, the court order the plaintiff to produce “a sampling of Plaintiff's Facebook activity for the period November 2011 to November 2013, limited to any specific references to the emotional distress Plaintiff claims she suffered in the Complaint, and any treatment she received in connection therewith.” (internal quotations omitted). The court also ordered the plaintiff to preserve all of her Facebook account information for the duration of the litigation because the defendants were permitted to request the rest of the plaintiff’s Facebook activity after reviewing the sampling if they discovered probative evidence. Danielle is a third year student at Seton Hall University School of Law (Class of 2016). Prior to law school, she graduated magna cum laude from The College of New Jersey, where she earned her B.S. in Criminology with a minor in Arabic. After graduation, Danielle will clerk for a civil judge in the Superior Court of New Jersey.
United States Magistrate Judge Kathleen Tomlinson of the Eastern District of New York recently denied a defendant law firm’s motion to impose sanctions and an adverse inference against its former client. At the evidentiary hearing, the court heard testimony from two of the plaintiff’s employees, who recounted a series of unfortunate events and office Google-ing that lead to the destruction of all documents regarding the plaintiff’s financial condition in 2009. The present issue arises from a terminated construction contract nearing its 20th anniversary. In May of 1996, Abcon Associates, Inc. was retained by the USPS for a construction project in Queens, New York. Within the year, USPS terminated its contract and eventually Abcon and its president, Michael Zenobia, Jr. and his wife were ordered to pay a $2 million judgment to the United States Fidelity and Guaranty Company (USF&G). To pay this, Abcon and the Zenobias borrowed $2 million from New York Community Bancorp, Inc. (NYCB). In April of 1998, Abcon retained Haas & Najarian LLP (H&N) to sue USPS. Abcon and H&N entered into a legal services agreement agreeing that would retain a lien in any amounts recovered from USPS, subordinate to any funds owed to NYCB. After protracted litigation (10 years!) Abcon received a $2.4 million judgment, and then effectively lost it due to various judgments and claims against it. In 2008, a court order directed distribution of money to H&N (resulting in a final payment of $463,000 for its legal fees). Another creditor appealed that order, and Abcon argued that H&N should return the money paid to it. H&N, apparently seeing the writing on the wall that it was now or never to get paid, refused to return the payment. On June 30, 2009, Abcon’s creditors settled among each other. Abcon objected to the distribution of money, claiming again that H&N should not have been paid before NYCB. Abcon filed a complaint against H&N on February 27, 2012, alleging breach of contract of the parties’ legal services agreement. During discovery, H&N requested: “All documents concerning Abcon's outstanding liabilities as of June 30, 2009 in excess of the sum of $5,000 owed to Persons other than [the previous litigation’s creditors]” and “Documents concerning Abcon's financial condition of June 30, 2009, including by way of specification but not limitation, a balance sheet and an accounts payable ledger.” Essentially, H&N wanted to be able to show that even if they were wrongfully paid in 2009, returning the money would benefit Abcon’s creditors, not Abcon. Abcon contended that they had absolutely no documents that were responsive to those two requests, due to an office move resulting in extreme downsizing of files and power outages that totally corrupted any possibly responsive electronically stored data. They were responsible prior to when Abcon “became inactive” and moved offices to a smaller location in September 2009, Patricia Van Dusen’s, a long-term Abcon employee and “Director of Information Services,” job was to sort the files and keep items that needed to be saved, and destroy the rest. In order to determine what needed to be saved, Van Dusen conducted internet research on what should be kept, maintained, etc. and threw out those documents before June 30, 2009. Next, Abcon’s Director of Marketing and Sales (and apparently also its “de facto IT person”) Eros Adragna, did not protect the company’s electronic data during the office move. As one might expect, this ended poorly: multiple power outages occurred at the new location and, big surprise, Abcon’s server was outdated and vulnerable to viruses. Adragna tried to back up the data but it was too late: nothing that he saved was responsive to H&N’s discovery request. Both Van Dusen and Adragna testified before the magistrate that they did not think or know there was a “litigation hold” on Abcon’s financial records, even though Abcon was the party who eventually filed suit. In the end, Abcon lucked out. While the court found that Abcon had a duty to preserve potential evidence, the scope of that duty did not necessarily extend to the 2009 financial documents because H&N’s legal argument that it didn’t breach the contract was so unexpected that Abcon could not have reasonably anticipated that the documents would have been relevant to its breach of contract case. Abcon’s employees breached their duty to preserve documents, but as the court says, “at most” acted negligently as to documents that were not clearly relevant to H&N’s defense. Therefore, the court declined to issue sanctions and an adverse inference against Abcon. Business owners, especially small business owners should learn from Abcon—don’t trust the determination of destruction of files to a couple of internet searches run by a non-attorney, and don’t entrust the preservation of data to someone also in charge of running the company’s marketing and sales. Van Dusen should have consulted with an attorney, and Abcon or Adragna should have contacted an IT specialist to preserve the data as soon as they realized there were problems with the server. When preserving data is a side-hobby, possibly important documents that you have a duty to preserve will inevitably fall through the cracks. Angela Raleigh is a third year law student at Seton Hall University School of Law. She attended Montclair State University, graduating summa cum laude, and owes her interest in law to her late great-uncle, Michael Mastrangelo, who let her “work” in his law firm at age four.
This case involves an employment discrimination claim that the plaintiff, Anthony Smith, levied against his former employer, Hillshire Brands, under the Family Medical Leave Act (FMLA). The plaintiff was an employee of Hillshire Brands and in a letter dated August of 2013, he was given time off of work under the FMLA until February of 2014, but Smith’s employment was terminated in September of 2013. During the course of this suit, both parties became engaged in various discovery disputes, one of which is the subject of this order dated June 20, 2014. The defendant served the plaintiff with documents requests, which would show the plaintiff’s activity on social media websites. The defendant’s request was, Request No. 15: All documents constituting or relating in any way to any posting, blog, or other statement you made on or through any social networking website, including but not limited to Facebook.com, MySpace.com, Twitter.com, Orkut.com, that references or mentions in any way Hillshire and/or the matters referenced in your Complaint. Request No. 18: Electronic copies of your complete profile on Facebook, MySpace, and Twitter (including all updates, changes, or modifications to your profile) and all status updates, messages, wall comments, causes joined, groups joined, activity streams, blog entries, details, blurbs, and comments for the period from January 1, 2013, to present. To the extent electronic copies are not available, please provide these documents in hard copy form. In response to these document requests, the plaintiff refused to provide his complete profile on social media websites because most of the information had no relevance to the defendant’s claims or defenses in this case. So, the defense filed a motion to compel and stated the social media profile could offer a diary of the plaintiff’s activities, thoughts, mental condition, and actions, which relate to the plaintiff’s claims for emotional distress. Also, the defendant claims the information stored in the plaintiff’s profile may provide insight as to whether the plaintiff abused his FMLA leave, which was cited as the reason for his termination. The legal standard for discovery requires that any information sought to be relevant. This seems ambiguous, but luckily, the Federal Rules of Evidence provide further details regarding what is relevant. Rule 26 requires any document requests to be tailored so that it appears to be reasonably calculated to lead to the discovery of admissible evidence. The court here states that allowing the defendant unfettered access to the social media profiles of the plaintiff would allow the defense to case “too wide a net for relevant information.” The court here cites another case, Ogden v. All-Star Career School, 2014 WL 1646934, at *4 (D. Kan. 2014), which stated, Ordering plaintiff to permit access to or produce complete copies of his social networking accounts would permit defendant to cast too wide a net and sanction an inquiry into scores of quasi-personal information that would be irrelevant and non-discoverable. Defendant is no more entitled to such unfettered access to plaintiff’s personal email and social networking communications than it is to rummage through the desk drawers and closets in plaintiff's home. In addition to the problem of casting “too wide a net,” the court also stated that social network activity might not be as relevant to an emotional distress claim as one might think. The reason is that a severely depressed person may have a good day or several good days and choose to post about those days and avoid posting about moods more reflective of his or her actual emotional state. As a result of this analysis the court granted the defendant’s document request as it relates to only information that references the plaintiff’s emotional state and potential reasons for that emotional state. Daniel received a B.A. in Criminology and Criminal Justice from The University of Maryland. He will receive his J.D. from Seton Hall University School of Law in 2015. Presently Daniel is serving as counsel in the Juvenile Justice Clinic. After graduation Daniel will clerk for a trial judge in the Superior Court of New Jersey. Want to read more articles like this? Sign up for our post notification newsletter, here
In April 2014, the Honorable Dominic J. Squatrito from the District Court for the District of Connecticut handed down a decision that dismissed all but one of plaintiff Ray Tedeschi’s claims against defendant Kason Credit Corporation (“KCC”), a collections agency that wrongfully targeted Tedeschi based on a telephone mix-up. On Both parties moved for summary judgment on claims of invasion of privacy and intentional infliction of emotional distress. Tedeschi’s claims were largely unsupportable – not the least of which being his assertion that Kason Credit Corporation should face an evidentiary adverse inference instruction based on spoliation of electronic evidence. In sum and substance, Tedeschi claimed that KCC was harassing Tedeschi with nearly twenty phone calls over the course of a yearlong period, seeking to collect a debt from a consumer who listed Tedeschi’s new home phone number as a means of contact. Tedeschi continually informed KCC that he was not the debtor, and asked that KCC stop calling. Tedeschi v. Kason Credit Corp., No. 3:10CV00612 DJS, 2014 WL 1491173 *2-3 (D. Conn. Apr. 15, 2014). KCC, on the other hand, denied the volume of calls asserted by the plaintiff, and instead asserted that only two phone calls took place over that same period of time. Id. KCC further alleged that the behavior met the standards of the Fair Debt Collection Practices Act, 15. U.S.C. § 1692, and was not actionable. Recognizing a dispute of fact, the Court left this claim intact. However, it’s unlikely that Tedeschi’s claim will pass muster with any jury. Here’s why: When deposing the CEO of KCC, Karl Dudek, plaintiff learned that a “fact sheet” was generated for Tedeschi’s matter that tracked calls from KCC employees to Tedeschi’s phone number. In response to an inquiry, Dudek indicated that the fact sheet “has probably been printed out 20 times.” Id. at *16. Tedeschi argued that the print-out produced at the time of the deposition did not satisfy discovery requirements, since the print-out was dated December 2010, and that the original print-out must have been destroyed. KCC was able to demonstrate that the print-out was unchanged in substance or form from the first request date in June 2010 to the produced copy in December 2010. Relying on Residential Funding Corp. v. DeGeorge Financial Corp., 306 F.3d 99 (2d Cir. 2002), the court outlined the criteria for an adverse inference: the moving party must demonstrate that the party having control over the evidence had a duty to preserve it at the time of destruction, that the evidence was destroyed with a culpable state of mind, and that the destroyed evidence would support the moving party’s claim or defense. Judge Squatrito found that KCC did not have a duty to preserve print-outs, since the print-outs “merely duplicate ‘original evidence.’” Id. at *17. Since Tedeschi was unable to support a claim that the electronic data was destroyed with any culpable state of mind, the claim necessarily fails. See Zubulake v. UBS Warburg LLC, 220 F.R.D. 212, 218 (S.D.N.Y. 2003) (“A party . . . must retain all relevant documents[,] but not multiple identical copies[,] in existence at the time the duty to preserve attaches, and any relevant documents created thereafter.”). Plaintiff’s claims against KCC were doomed from the start, and Tedeschi would have been smart to see the writing on the wall – if not the words on the print-outs. Kevin received a B.S. in Political Science from the University of Scranton (2009), and will receive his J.D. from Seton Hall University School of Law in 2015. Prior to joining the Seton Hall community, Kevin worked as an eDiscovery professional at two large “white-shoe” law firms in Manhattan. Want to read more articles like this? Sign up for our post notification newsletter, here.
This case involves ACT, a career guidance service firm that assists job seekers throughout their job search, suing Daniel Drasin, the administrator of a blog known as Random Convergence. According to ACT, Drasin exercises editorial control over the blog. ACT complains that the blog disparage ACT's services and damages ACT's business and reputation. On March 11, 2013, Magistrate Judge Kristin Mix granted ACT's motion to serve third party subpoenas on Drasin, demanding that he produce the name and contact information for each of the people who posted disparaging remarks on Drasin’s blog. On April 18, 2013, Drasin, then self-represented, filed a third-party motion to quash the subpoenas, stating that they violated the bloggers’ rights to First Amendment right to anonymous speech. He also argued that most individuals who posted comments on the Blog did so anonymously, and he explained that he had no records of those who chose to remain anonymous. The court sided with Drasin and quashed the subpoena. The court found that the Subpoena imposes two types of burden on Drasin. First, in order to comply with the subpoena, Drasin must surrender his personal hard drives to ACT for up to thirty days. Personal computers generally cannot function without their hard drives, so this requirement would force Drasin to spend up to thirty days without the use of his personal computer. Second, forcing Drasin to surrender his hard drives to ACT would give ACT access to Drasin's personal files. Moreover, ACT has alternative means to obtain the information it seeks, such as serving a subpoena on Google. The court also found persuasive that the benefits of the Subpoena appear to be minimal, as there is no indication in the record that Drasin possesses any information that would be relevant in the Colorado Action beyond that which he has already provided. The takeaway message is that subpoenas can be quashed if discovery imposes an undue burden, if the information is irrelevant to the action, and if there are other avenues from which the information can be obtained. Rebecca Hsu, a Seton Hall University School of Law student (Class of 2015), focuses her studies in the area of Patent Law, with a concentration in Intellectual Property. She is also certified in Healthcare Compliance, and has worked in Compliance at Otsuka America Pharmaceuticals, Inc. Prior to law school, she graduated cum laude from UCLA and completed graduate work in Biomedical Science. She has co-authored two medical science research articles, as well as completed fellowships through UCLA Medicine and the Medical College of Wisconsin. In addition to awards for her academic achievements, Rebecca has been honored by awards for her community service with disadvantaged communities. In her spare time, Rebecca regularly practices outdoor rock climbing, and can be found camping in the Adirondacks. Want to read more articles like this? Sign up for our post notification newsletter, here
Last summer the District Court for the Northern District of Illinois decided a case that allows your old boss into your home. Well . . . not literally. Magistrate Judge Geraldine Soat Brown granted a motion to compel discovery for a plaintiff-employer over objection of defendant-employee. The plaintiff, Network Cargo Systems U.S.A., Inc. claimed that its former employee, Caroline Pappas, stole proprietary technology and destroyed other electronic data upon termination. Plaintiff denied the request, and consented to limited discovery. After expedited discovery took place, plaintiff returned to the court requesting that an independent technology investigator be granted access to all of Ms. Pappas’s electronic devices. The court ordered defendant’s counsel to “determine what electronic devices [Pappas] used between 4/1/13 [2 months before termination] and 2/14/14 [the hearing date].” Network Cargo Sys. U.S.A., Inc. v. Pappas, No. 2014 WL 1856773 *2 (N.D. Ill. May 7, 2014). A week later, counsel indicated six devices: two personal computers, an iPad, an iPhone, a Blackberry (which was returned to Network), and a work laptop provided by defendant’s new employer. After the court’s order, the parties agreed to split the cost of imaging three personal devices: the personal computers and the iPad. Once the imaging was performed by the independent consultant, it was determined that three previously undisclosed flash drives had been connected to defendant’s personal computers during the relevant time frame. Id. The plaintiff demanded immediate access to those flash drives, as they may contain relevant evidence. The court agreed, even though the initial connection of the flash drives to the personal computers happened months after the employee was terminated from Network. The court insisted that plaintiff pay the full cost of imaging the additional devices, though, stating “[t]he likelihood that Pappas was using these flash drives to transfer Network’s confidential information would seem to become more remote with the passage of time.” Id. at *3. Defendant Pappas was forced to turn over flash drives and personal computers. While the target of the investigation is possible stolen proprietary material, through forensic imaging the independent consultant had access to each and every file on the device. Perhaps Pappas can take solace in the fact that her iPhone wasn’t subject to discovery, as the device likely contains more sensitive data than just high scores to Candy Crush. Kevin received a B.S. in Political Science from the University of Scranton (2009), and will receive his J.D. from Seton Hall University School of Law in 2015. Prior to joining the Seton Hall community, Kevin worked as an eDiscovery professional at two large “white-shoe” law firms in Manhattan. Want to read more articles like this? Sign up for our post notification newsletter, here.
Executive Mgmt. Services, Inc. v. Fifth Third Bank is not a riveting case to read. It involves a rather mundane breach of contract claim by the plaintiff alleging wrongdoing by the defendant. Namely, Executive Management Services brought suit against Fifth Third Bank alleging that the bank had made misleading statements regarding interest-rate swaps. While the subject matter of the claim would fail to interest anyone, the procedural elements and motion practice offer a far more interesting and educational prospect. In building their defense, Fifth Third Bank sent Executive Management Services multiple discovery requests, which included tax returns, financial statements, and documents referring or relating to their (EMS) loan applications. However, Executive Management Services refused to produce the requested discovery on three grounds. First, EMS argued that the requested as they have "not claimed to be unsophisticated regarding standard commercial banking," only that they "did not understand the risks of the swap transactions." Second, the EMS argued that the defendant’s discovery requests were "overly board and unduly burdensome." Third, EMS claimed privilege regarding the requested documents under both attorney-client privilege and the work product doctrine. The court rejected EMS’s first argument right out of the gate. EMS claimed that the documents sought were not relevant to the issue at bar and therefore did not need to be turned over to their adversary. EMS claimed these documents were irrelevant because they had "not claimed to be unsophisticated regarding standard commercial banking," but rather that "did not understand the risks of the swap transactions." However, the court was not persuaded by this argument because even though this was a new area of investment banking, it remained the same procedure and protocol as any form of investment banking. Therefore, EMS’s past actions in commercial banking provided them with a foundation by which to understand this new field of investment and thus the documents proving this foundation were relevant. The court also rejected EMS’s argument that the documents were privileged under attorney-client privilege and the work product doctrine. While there may have been concerns regarding the confidentiality of these documents the court stated that the protective order in place addressed and negated all of the concerns posed by this argument. EMS’s second argument seems like it could have had the most impact out of the three; however, hardly any effort at all was put forth in crafting it. The plaintiffs simply stated that the production of such documents was unduly burdensome and overbroad and left it at that. There was no further development of this argument and therefore the court rejected it on its face. If the plaintiffs had put forth any evidence regarding why the request was overbroad or unduly burdensome the court may have limited the requested discovery. The plaintiffs should have offered evidence regarding why this request was unduly burdensome and overbroad; their failure to do so resulted in the court rejecting this argument on its face. A.S. Mitchell received his B.A. in Political Science from the University of Central Florida (2008). He will receive his J.D. from Seton Hall University School of Law in 2015. Want to read more articles like this? Sign up for our post notification newsletter, here.
In this case, the plaintiff Nicole Baker sued Bayer Healthcare Pharmaceutical Inc., complaining that the Bayer product Mirena was not adequately accompanied by warnings of its side effects. Baker asked Bayer to produce databases that contains sales calls made by the marketing and sales department to physician’s offices. The sales calls notes also contained conversations between sales representatives and healthcare providers. Bayer argued that only the sales calls notes concerning Baker’s treating physician are relevant. Bayer also argued that producing all the sales calls notes are unduly burdensome and excessive in light of the needs of the case. Ultimately, the court found in favor of the plaintiff, and finds that the databases containing all sales calls must be produced due to their relevance to the current case. Federal Rule of Civil Procedure 26(b)(1) permits “discovery regarding any nonprivileged matter that is relevant to any party's claim or defense.” The information sought “need not be admissible at the trial” so long as it “appears reasonably calculated to lead to the discovery of admissible evidence.” The crux of the plaintiff’s argument is that all the sales call notes, not just limited to those related to her physician, are relevant to her case because they would ascertain whether the pharmaceutical company is overpromoting the product Mirena. Overproduction would mean that there could be dilution or nullification of any warnings, thereby rendering the warnings inadequate. The plaintiff argued that the volume and substance of the sales calls notes establish whether there was a vigorous, aggressive sales campaign to the medical profession, leading to failure to heed written warnings. While this argument appears to be attenuated, it does fall under the standard of being reasonably calculated to lead to the discovery of admissible evidence. The court thought although it was a burden to the defendant, all of the sales calls notes are relevant to establishing if Bayer’s Mirena campaign was so pervasive that any doctor, including the plaintiff’s, would fail to pay attention to warnings about the product’s side effects. Rebecca Hsu, a Seton Hall University School of Law student (Class of 2015), focuses her studies in the area of patent law, with a concentration in Intellectual Property. She is also certified in Healthcare Compliance, and has worked in Compliance at Otsuka America Pharmaceuticals, Inc. Prior to law school, she graduated cum laude from UCLA and completed graduate work in biomedical science. She has co-authored two medical science research articles, as well as completed fellowships through UCLA Medicine and the Medical College of Wisconsin. In addition to awards for her academic achievements, Rebecca has been honored by awards for her community service with disadvantaged communities. In her spare time, Rebecca regularly practices outdoor rock climbing, and can be found camping in the Adirondacks. Want to read more articles like this? Sign up for our post notification newsletter, here