- eLessons Learned
- Press and Publicity
- About Our Team
- Contact eLL Blog
Tech savvy criminals in the United States beware! Your e-mails stored on servers abroad are discoverable by law enforcement agents in the United States. A technologically clever criminal in the United States may have set up his e-mail account with a different country code to hide e-mails abroad from law enforcement agents in the United States during an investigation. The United States District Court of the Southern District of New York did not reward the particularly tech savvy criminals when it decided In re Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation (“In re Warrant to Search”) on April 25, 2014. In In re Warrant to Search, law enforcement agents in the United States obtained a warrant authorizing the search and seizure of information associated with a specific web-based e-mail account that is stored at the premises of Microsoft Corporation. In response, Microsoft’s Global Criminal Compliance team complied with the warrant to the extent of producing the information stored on servers in the United States. However, the servers in the United States only contained non-content information because the target e-mail account was hosted in Dublin, Ireland, where a server stored all the content information. Thus, Microsoft filed a motion seeking to quash the warrant to the extent that it directs the production of information stored abroad. Microsoft’s obligation to disclose customer information and records to the Government is governed by the Stored Communications Act (the “SCA”). However, Microsoft argued that Federal courts are without authority to issue warrants for the search and seizure of property outside the territorial limits of the United States. The Government contended that the SCA does not implicate principles of extraterritoriality, and as such, Microsoft’s motion must be dismissed. The Court dismissed Microsoft’s motion and required it to produce the digital information from the server in Dublin. The Court found that the SCA was ambiguous regarding principles of extraterritoriality, but the structure of the statute, the legislative history, and the practical consequences undermined Microsoft’s argument. An SCA Warrant allows for law enforcement agents to obtain digital information even when it is stored on servers abroad. Criminal defendants, law enforcement agents, and internet service providers can all learn a lesson from this case. Law enforcement agents in the United States should be aware that digital information stored abroad is not necessarily beyond their grasps. Internet service providers should provide the digital information from all its servers, irrespective of the server’s location, to ensure full compliance with SCA Warrants. And finally, for all the tech savvy criminals out there, your e-mails will be discovered by law enforcement in the United States even if stored on a server in a different country. If you are concerned about hiding your e-mails from law enforcement agents in the United States, I suggest that in addition to storing your e-mails on a server abroad, you should also not use an American internet service provider, such as Microsoft. Gary Discovery received a B.S. in Business Administration, with a concentration in Finance from the Bartley School of Business at Villanova University. He will receive his J.D. from Seton Hall University School of Law in 2015. After graduation, Gary will clerk for a presiding civil judge in the Superior Court of New Jersey.
Employers should take note: erasing and taping over messages that relate to a fired employee is never a good idea. Employers who engage in this type of practice will never escape the wrath of a judge when the fired employee inevitably brings a wrongful termination. Eventually, such action catches up with the defending company and they will have to pay a steep price. Take, for instance, the case Novick v. AXA Network, LLC. The plaintiff was asking the judge for sanctions to be imposed on the defendants because he claimed that the defendants spoliated audio recordings and emails from an eight-week stretch, which ran from late August until early November 2006. The defendants admitted that recordings from this time period were likely erased and taped over. The problem here is that this stretch of time covers the time directly before and directly after Novick’s termination. It should seem obvious to anyone that a company’s failing to preserve any recordings regarding a former employee’s termination is a terrible idea and will likely hurt one’s case in court. It should instead be common sense that when an employee is terminated, and certainly when that termination is contentious, a lawsuit is foreseeable. Thus, the employer should take care to preserve anything that might come into play at trial. Novick asked the judge to sanction the defendants for the spoliation of emails. The defendants could not produce any emails between the two employees at AXA Network, who took over Novick’s accounts, and Novick’s former clients. If these employees were involved with Novick’s clients after Novick was fired, it is only logical that there would have been emails taking place between these employees and those clients! Nevertheless, the defendants could not produce a single e-mail. Sanctions can be imposed on a party for spoliation in violation of a court order under Rule 37(b) of the Federal Rules of Civil Procedure or, where there has been no violation of a court order, a judge can impose sanctions for spoliation under the court’s “inherent power to control litigation.” West v. Goodyear Tire & Rubber Co., 167 F.3d 776, 779 (2d Cir. 1999) (emphasis added). For the court to exercise its inherent power, there must have been a showing of bad faith. United States v. Int’l Bhd. of Teamsters, 948 F.2d 1338, 1345 (2d Cir. 1991). The Novick court in this case found that the defendants did spoliate the audio recordings because they were notified in October 2006 to preserve the recordings for future litigation and to produce those recordings to the plaintiff. In addition, the defendants provided no reason for why or how these recordings were missing. Unsurprisingly, the court suggested that such behavior indicates that the company acted deliberately and therefore possessed a culpable state of mind. The defendants acted in bad faith. The court did not find that the defendants spoliated the email messages, but it still believes they acted in bad faith with respect to the production of the emails because the company failed to search one of their email archives for months due to what was claimed as “human error.” This was clearly a delay tactic, further warranting sanctions. The court invoked its inherent power to control litigation because the defendants acted in bad faith, employed delay tactics, caused substantial costs to be incurred by the plaintiff, and wasted the court’s time. The court imposed an adverse inference jury instruction. Adverse inference instructions can be imposed against a party who had an obligation to preserve evidence at the time it was destroyed, who destroyed the evidence with a culpable state of mind, and who destroyed evidence that was relevant to the opposing party’s claim or defense. Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 107 (2d Cir. 2002). The clear takeaway from this case is that it is better to be safe than sorry; if it is reasonable that a lawsuit may be brought against you, take all measures to preserve any evidence that might have anything to do with that future case. Preserving the evidence will not hurt, but failing to do so will. Logan Teisch received his B.A. in Government and Politics from the University of Maryland, College Park in 2012. He is now a student at Seton Hall University School of Law (Class of 2015), focusing his studies in the area of criminal law. Logan’s prior experiences include interning with the Honorable Verna G. Leath in Essex County Superior Court as well as interning with the Essex County Prosecutor’s Office. Want to read more articles like this? Sign up for our post notification newsletter, here.
Companies issue laptops to their employees to be used for business purposes both in the office and at home. A company’s distributing laptops is joined with the company’s responsibility to preserve the electronically stored information (ESI) when litigation is reasonably anticipated. Every company has its own “ordinary business protocol” to be used in relation to these laptops when a situation requires it, but sometimes these protocols lead to bigger issues. In Hawley v. Mphasis Corp., the United States District Court for the Southern District of New York granted an adverse inference instruction regarding a supervisor’s laptop, but not for the employee laptop. In Hawley, an employee of the defendant company brought an employment discrimination claim and moved for sanctions against the defendant for alleged discovery violations; those of which, in particular, were violations regarding spoliation of information on two company laptops. The employee alleged that the company deleted all information from his work laptop, as well as his supervisor’s information, and did not produce records vital to the defendant’s case. The company countered, arguing that clearing the hard drive of a former employee’s laptop was the business protocol. In evaluating the request for an adverse inference sanction, the district court explained that the plaintiff must demonstrate: “(1) that the party having control over the evidence had an obligation to preserve it at the time it was destroyed; (2) that the records were destroyed with a culpable state of mind; and (3) that the destroyed evidence was relevant to the party’s claim or defense such that a reasonable trier of fact could find that it would support that claim or defense.” Hawley v. Mphasis Corp., No. 12 Civ. 592 (DAB) (JLC), 2014 WL 3610946, at *7 (S.D.N.Y. July 22, 2014) (quoting Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 107 (2d Cir. 2002)). As to the supervisor’s computer, the court held for an adverse inference sanction because the company had a duty to preserve the supervisor’s data from the time of the EEOC filing. Furthermore, the company negligently destroyed the records on the laptop , which were found to be highly relevant to the employee’s case. In regards to the employee’s computer, the court found both a duty and the requisite culpability; however, the court did not believe that the employee sufficiently proved how relevant the information was to his case. The lesson to extract from this case is that the courts do not care if your company’s protocol requires one procedure to be followed (i.e., wiping a hard drive) when it comes to the spoliation of relevant evidence. The company’s wiping the hard drives is trumped by a duty to preserve data when a lawsuit is reasonably anticipated. The ruling in Hawley demonstrates that, in an employment case, the receipt of an EEOC charge triggers the obligation to preserve all data, but it could arise earlier depending on the circumstances. Be aware of when a lawsuit is reasonably anticipated and do not hesitate to act and preserve. Such awareness will help your company in the long run. With that, be on top of the individuals responsible for preserving company data and ensure those individuals are complying with company policy. One does not want to need a hard drive that has no data saved on it. Evidence must be preserved until litigation is resolved or no longer reasonably anticipated, and as courts become stricter with this rule of law, so should every company. A look at the circumstances and a possible deviation from ordinary protocols may be needed. For more information on the case used as precedent, Residential Funding Corp. v. DeGeorge Fin. Corp., click here: http://caselaw.findlaw.com/us-2nd-circuit/1003010.html. Amanda is a third year student at Seton Hall University School of Law, where she is pursuing a J.D. with a certificate in Health Law. Prior to law school, she was a 2011 magna cum laude graduate of Seton Hall University, where she earned Bachelor of Arts in Political Science and a minor in Philosophy. Presently, she is a law clerk at a small firm handling real estate and bankruptcy matters. After graduation this native New Yorker hopes to work at a mid-sized firm in the Big Apple. Want to read more articles like this? Sign up for our post notification newsletter, here.
How many readers are familiar with a class action suit? Do class actions suits seem to be never ending and broad? What is the scope of such suits? In Oppenheimer Fund v. Sanders, the United States Supreme Court addressed the issue of a class action lawsuit in regards to compiling the names and addresses of the members of the class. A class action was brought against Oppenheimer Fund, an open-end diversified investment fund that sells shares to the public at their net asset value plus a sales charge. The respondents bought shares at various times and filed complaints that the shares in the Fund were artificially inflated as they had been overvalued on the Fund’s books. As a result a class action suit was filed. The respondents sought to require the Fund to help compile a list of the names and addresses of the members of the plaintiff class from records kept by using a transfer agent so that individual notices could be sent. The respondents essentially were seeking information about 121,000 people. Of this large number, 103,000 individuals still had shares in the Fund, while 18,000 others had sold their shares. Gathering this information would be time-consuming, as the transfer agent would have to manually sort through paper files. The Second Circuit held that the discovery rules authorized the district court to order the petitioners to assist the respondents in compiling this list of members of the respondent class and to bear the expenses of compilation. The issue was brought before the Supreme Court, which reversed the lower court’s holding, finding that it was an abuse of discretion of the court to require petitioners to bear the expenses of compilation. Here, the respondents could easily hire the transfer agent as a third party to compile the list by paying the agent the same amount that petitioners would have to pay. The Court reasoned that this information must be obtained to comply with the obligation of the respondents’ to prove notice to their class. Additionally, no special circumstances were presented to warrant requiring petitioners to bear the expense. The Court noted that a mere allegation of wrongdoing is an insufficient reason to require the Fund to undertake the financial burdens and risks in compiling the list. Overall, the lesson to be learned here is that in class action lawsuits, where the information sought can be obtained at the same cost to either party, it is the respondents who will bear these expenses to identify members of their own class. Jennifer Whritenour received her B.S. in Political Science and History in 2011 from the University of Scranton. In 2014, Ms. Whritenour graduated from Seton Hall University School of Law.
From June 8–12, 2015, the International Association for Artificial Intelligence and Law (IAAIL) will be holdings its 15th International Conference on Artificial Intelligence & Law (ICAIL). The conference will be held at the University of San Diego School of Law in San Diego, California. During that conference, on June 8, esteemed eDiscovery attorney Jason R. Baron, from Drinker Biddle & Reath LLP, will be hosting the DESI VI Workshop. The Workshop aims to bring together researchers and practitioners to explore innovation and the development of best practices for application of search, classification, language processing, data management, visualization, and related techniques to institutional and organizational records in e-discovery, information governance, public records access, and other legal settings. Questions addressed include: What combinations of machine learning and other techniques can best categorize information in accordance with existing records management policies? Do effective methods exist for performing sentiment analysis and personal information identification in a legally useful way in e-mail and other records of interpersonal communication? How well can we estimate the end-to-end costs of workflows that combine artificial intelligence and human coding to accomplish legal tasks on a broad range of content types? Can proactive insider threat detection leverage information already being collected for records management purposes, and what would be the ethical and legal fallout of such approaches? Are approaches available to reduce the perceived conflicts between privilege and transparency in labeling data for Technology-Assisted Review (TAR) in e-discovery and public records access applications? What technical, procedural, and legal issues arise from recent proposals to shift the focus of e-discovery from relevance to materiality? Where do recent legal cases point to the need for new research to better inform the decision of courts and the practices of parties? What lessons can we draw from recent shared-task evaluations such as TREC and EDI, and how can future shared-task evaluations best be structured? How can current techniques for issue coding be applied to compliance tasks (e.g., in regulatory, enforcement, and investigations settings), and what capability gaps exist that call for new research? What implications do emerging technologies such as deep learning and fine-grained access to behavioral traces have for e-discovery, business intelligence, and records and information management purposes? Baron invites those interested in electronic discovery to submit a refereed or unrefereed paper to the Workshop; however, paper submission is not required to participate. More information about the DESI VI Workshop can be found here.
In cases involving a large amount of e-discovery, it is common for a litigant to be accused of misplacing or destroying relevant evidence. When evidence is lost, the court must evaluate whether sanctions are appropriate, and if so, what type of sanctions should be imposed. In making this determination, the court will consider the following factors: (1) the degree of fault of the spoliation party, (2) the degree of prejudice to the adverse party, and (3) whether there is a less severe punishment that would avoid substantial unfairness to the adverse party while still serving to deter similar spoliation by others in the future. In Micron Technology, Inc. v. Rambus Inc., the parties sued and countersued for claims relating to patent infringement. During discovery, the court determined that Rambus destroyed a significant amount of documents relevant to the lawsuit. Specifically, Rambus engaged in three “shred days” (also known within the company as a “shredding parties”) where evidence was destroyed pursuant to the company’s document retention policy. Much of this evidence, however, was lost after a litigation hold was in place. In order to determine if sanctions were appropriate, the court first analyzed whether there was any bad faith on the part of Rambus. The court explained that bad faith requires a showing that the “spoliating party intended to impair the ability of the potential defendant to defend itself.” The court found that during the shred days, employees were instructed to be selective about which documents they destroyed. Employees were told to “expunge documents questioning the patentability of Rambus inventions,” while at the same time to “look for things to keep that would help establish that Rambus had intellectual property.” Further, Rambus employees testified that they were destroying documents in preparation for the “upcoming battle” of litigation. Ultimately, the court determined that Rambus destroyed documents in bad faith. Next, the court examined whether Rambus’s bad faith shredding parties caused prejudice to its adversary. Prejudice “requires a showing that the spoliation materially affects the substantial rights of the adverse party and is prejudicial to the presentation of its case.” The court explained that when bad faith exists, the spoliating party bears the “heavy burden” of showing a lack of prejudice. The court explained that Rambus failed to meet this heavy burden and enumerated multiple claims and defenses that were prejudiced by Rambus’s bad faith destruction of evidence. Finally, the court considered whether a dispositive sanction is an appropriate sanction under these circumstances. The court explained that when there is “clear and convincing evidence that the spoliation was done in bad faith and was prejudicial to the opposing party, then dismissal may be an appropriate sanction” as long as a lesser sanction would serve as an adequate deterrent. The court considered whether an award of attorney’s fees or other monetary sanctions would be appropriate, but ultimately rejected these “relatively mild sanctions [that were] disproportionate to the degree of fault and prejudice at hand.” Next, the court analyzed whether an adverse jury instruction would be a proper sanction. The court rejected this sanction as being inadequate punishment and deterrence in light of Rambus’s extensive bad faith spoliation. Lastly, the court considered whether an evidentiary sanction would be an adequate remedy. This sanction would foreclose Rambus from offering any evidence related to the subject matter of the destroyed documents. Once again, the court found this sanction to be unsatisfactory due to Rambus’s extensive destruction of evidence. Therefore, after considering the extraordinary circumstances of this case, along with the lesser sanctions available, the court found that the only appropriate sanction was to hold Rambus’s patent-in-suit claims unenforceable against its adversary. In sum, the court held that a dispositive sanction is appropriate when a party destroys evidence in bad faith, the destruction is prejudicial to the adversary, and no lesser sanction would be appropriate to punish and deter similar action. It should be noted that dispositive sanctions are rare, but nonetheless are warranted when “destruction of evidence is of the worst type: intentional, widespread, advantage-seeking, and concealed.” E-DiscoParty, a Seton Hall University School of Law graduate (class of 2014), served on the executive board of the Seton Hall Law Review and is a member of the Interscholastic Moot Court Board. E-DiscoParty currently clerks for a Justice on the Supreme Court of New Jersey.
Big Brother is always watching and listening. If there’s one lesson to take away from the recent NSA scandals it’s that the government is not only capable of tracking your every digital move, but also acting on that capability. Now, according to the Third Circuit, the government can use the broad language of the Stored Communications Act to force cell phone providers to turn over a criminal suspect’s phone’s historical location data. In a lengthy and drawn-out criminal investigation, the Third Circuit became the first federal court of appeals to decide a crucial issue that required balancing a cell phone user's privacy rights with a law enforcement agency’s needs to acquire potentially vital information. The government attempted to use the Stored Communications Act to force a suspect's cell phone company to turnover cell site location information or CSLI. Hoping to prevent an unjust and unwarranted intrusion or breach of a citizen's privacy expectations, the Electronic Frontier Foundation (EFF) filed a response in opposition to the government’s efforts. The Third Circuit was then forced to determine whether or not the government could obtain this information without first establishing probable cause or acquiring a warrant. The information at issue in the matter is commonly kept by all phone companies and service providers as part of their routine business operations. Every time a call is made via a cell phone, signals are transmitted via nearby cell phone towers. These towers then collect and store data that can later be used to establish the general area where the individual was located when making the call at issue. The information would not provide the exact location of the cell phone at the time of the call, but would instead allow the government to infer as to where the party where was located. Even though this would seem like a minor distinction, in the eyes of the court it is incredibly important because it weakens any argument that the cell phone acts as a tracking device which would raise significant Fourth Amendment concerns under Supreme Court precedent. According to the exact language of the Stored Communications Act, a court can order the disclosure of this information if the government “offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or other records or other information sought, are relevant and material to an ongoing criminal investigation.” 18 U.S.C. § 2703. The government argued that it met this burden because the information it was seeking was relevant and material to an investigation of narcotics trafficking and other violent crimes. The EFF attempted to combat these claims by arguing that to obtain the information the government must obtain a warrant by establishing probable cause. Ultimately, however, the court held that the information was in fact obtainable by the government without a warrant or probable cause under the language of the Stored Communications Act. According to the court, the Act’s language provided a specific test to determine whether an order granting the discovery of such information should be granted. If Congress wanted to implement a warrant requirement, it could have specifically done so. Instead, Congress chose the lesser standard of specific and articulable facts. The court, however, also went on to hold that the Act’s language actually granted a magistrate judge discretion as to whether or not to require a warrant showing probable cause. Because the Act states that an order “may be issued” rather than requiring it, a judge deciding whether or not to allow access to such information could require a showing of probable cause. Additionally, the court established that a cell phone customer does not voluntarily share his or her location information with a service provider because the customer is probably unaware that their providers are in fact collecting and storing this historical information. Although the Third Circuit’s holding is strictly limited to the collecting of historical cell phone location information, the decision ultimately has far-reaching consequences. In the field of electronic discovery, privacy is an ongoing topic of debate, especially with the recent revelations of the massive amounts of data the government is in fact already collecting. Because electronically stored information can provide a bevy of potentially vital information in easily manipulated formats, law enforcement agencies will continue to access it wherever possible. Courts will continually be asked to balance individual privacy concerns with the broad policies of discovery. Jeffrey, a Seton Hall University School of Law graduate (Class of 2014), focused his studies primarily in the area of civil practice but has also completed significant coursework concerning the interplay between technology and the legal profession. He was a cum laude graduate of the University of Connecticut in 2011, where he received a B.S. in Business Administration with a concentration in Entrepreneurial Management.
It seems that courts were ruling on the intersection of new technology and discovery practice back in the day. In 1986, the United States Court of International Trade decided motions to compel discovery regarding new technologies in Daewoo Electronics Co., Ltd. v. U.S. The court even noted that “[t]his controversy is a good example of how the development of new technology for using, storing and transmitting information allows parties to test the rules of disclosure or discovery.” There, the court grappled with whether the Department of Commerce met their burden of producing certain documents. The Department of Commerce was accused of committing three faux pas: (1) the tapes provided to the plaintiff was recorded at a much greater density than was stated, (2) data regarding the sale of two separate companies was requested, but not provided, and (3) the government failed to provide material known as an SAS data set. The government argued that they were in strict compliance with an earlier order mandating that they turn over certain evidence. However, the court expressed that it was troubled “by indications that [the government] took an inordinately restrictive view of its obligations under the order.” The government, when ordered to turn over certain tapes, turned over the tapes themselves (which the plaintiff was unable to read), as opposed to the data contained on the tapes. “To say that the data sets into which the computer tapes were transferred are not governed by an order speaking of computer tapes is as if someone has said at the dawn of the era of typewriters that types documents are not governed by a court order speaking of ‘writings.’” Further, the court noted that if the government was acting in earnest, then they had “taken unfair advantage of the court’s lack of familiarity with the variety of further electronic refinements and embodiments of taped information.” Thus, the court granted the plaintiff’s Motion to Compel, setting a precedent for reasonable interpretation of words surrounding new technologies. Matthew G. Miller, a Seton Hall University School of Law graduate (Class of 2014), focuses his practice in the area of Intellectual Property. Matt holds his degree in Chemistry from the University of Chicago. During law school, Matt worked as a legal intern at Gearhart Law, LLC.
“Although not unlimited, relevance, for purposes of discovery, is an extremely broad concept.” See Condit v. Dunne, 225 F.R.D. 100, 105 (S.D.N.Y. 2004). The discovery process is essentially a fact-finding mission. In theory, opposing parties are supposed to work together to make the litigation process more efficient. When both sides refuse to comply, additional motions are required result in additional costs. In the case above, Assured Guaranty Municipal Corp. (“Assured”) wrote financial guaranty policies on three residential mortgage-backed securities (“RMBS”) sponsored by UBS Real Estate Securities Inc. (“UBS”). Id. Assured claimed that UBS breached their contractual obligations by providing false information in regards to credit. Assured filed a motion to compel the production of documents that were generated shortly after the transactions mentioned above. UBS claimed that the documents were irrelevant to the case at hand, and furthermore, such production would be unduly burdensome. The court mentioned that so long as the discovery appears reasonably calculated to lead to the discovery of admissible evidence, it will likely be permissible. The court also stated that only when the burden or expense of the proposed discovery outweighs its likely benefit will the court limit discovery. The court considered: the needs of the case; the amount in controversy; the parties' resources; the importance of the issues at stake in the action; and the importance of the discovery in resolving the issues, will the court limit discovery. The court granted Assured’s motion to compel against UBS. Conversely, UBS claimed that Assured also failed to comply with discovery demands. Assured allegedly failed to provide three categories of documents they claim are not related to the transaction at issue. The documents sought were thought to contain information about Assured's knowledge of the originator's underwriting policies and its knowledge of the practices of the rating agencies. Assured wanted documents to be provided to them; however, Assured has refused to cooperate in return. The court held that the documents requested by UBS could contain information very relevant to the initial contract dispute. This being the case, the motion to compel discovery against Assured was granted. Finally, the parties seemed to have disagreement about the search terms that will be used to search various sources for relevant information. In this regard, the court declined to step in as no expert opinions were provided and the court did not have “technical expertise.” The court left the parties with three options: The parties could learn to cooperate and agree on certain criteria, the parties could re-file a motion to compel with expert affidavits, or the parties could seek the assistance of a neutral independent consultant. The court ultimately left this decision to the parties. In summation, this case demonstrates that failing to cooperate with discovery is essentially a huge waste of time. As we see here, in the end, the court granted both motions to compel. The documents the parties attempted to hide were eventually exchanged. In a profession where time is money, attorneys cannot afford to stall and prolong the very process that makes our system function efficiently.
This case involves a contractual dispute worth $41 million between Juster and North Hudson Sewerage Authority (NHSA). Juster issued a request for production of documents that included 49 requests for documents and a list of 67 proposed search terms. Some of these terms included words such as “fee,” “debt,” “tax,” and “SEC.” NHSA argues that the court should grant a protective order because it already produced 8,000 pages of documents and felt these search terms were too vague. Additionally, NHSA stated that if the court did not grant its protective order, the cost for producing these documents and running the searches should be shifted to Juster. The court did not agree with NHSA’s claims. Not only was there a lack of evidence that the data requested here was inaccessible, the court also applied the seven-factor test set forth in Zubulake v. UBS Warburg. This case has been adopted by the Third Circuit in cases that involve fee shifting. The Zubulake factors include: The extent to which the request is specifically tailored to discover relevant information; The availability of such information from other sources; The total cost of production, compared to the amount in controversy; The total cost of production; The relative ability of each party to control costs and its incentive to do so; The importance of the issues at stake in the litigation; and The relative benefits to the parties of obtaining the information In applying the Zubulake factors to this case, the court held that fee shifting is not warranted. The requests for electronically stored information (ESI) were tailored, as the searches were restricted to a specific time period (2011-2012). Second, it is unknown if this information is available from other sources. The third, fourth, and fifth factors are concerned with the costs associated with the request for ESI. Here, the court found that given the amount of damages at stake, NHSA’s ability to absorb the costs of the ESI requests, and the projected costs are not substantial enough to justify fee shifting. The fact that the litigation had $41 million at issue and the cost of running the keyword searches was approximately between $6,000 and $16,000, the court felt fee shifting would be inappropriate. The final factors are not relevant to this litigation as this is a private contractual dispute between two parties and no public policy is implicated. Overall, these factors weigh heavily in favor of Juster. As a result, this case illustrates that courts are reluctant to sway from the idea that it is the responding party that bears the costs in complying with discovery requests. Only when there is an undue burden on the responding party, or inaccessibility of information, will the court consider fee shifting. Yet, given today’s society, most information is accessible. Additionally, when both parties have comparable discovery requests and both agree to pay their own costs in producing discovery, fee shifting is even less likely to occur. Jennifer Whritenour received her B.S. in Political Science and History in 2011 from the University of Scranton. In May 2014, she received her J.D. from Seton Hall University School of Law.