Production of Data

Excessive Force, Missing Video Evidence: Were the Cops Trying to Hide Something?

The Philadelphia Police Commissioner and two police officers were accused of spoliation of evidence in an excessive force case. “Spoliation is the destruction or significant alteration of evidence, or the failure to preserve property for another's use as evidence.” Kinsler v. City of Philadelphia, No. CIV.A. 13-6412, 2014 WL 3964925, at *1 (E.D. Pa. Aug. 11, 2014) (internal citations omitted). In this case, there was an incident that led Jeffrey Kinsler to file a lawsuit against the City of Philadelphia for use of excessive force. Subsequently, a witness submitted a 15-to-30-second-long video to the police department of the events that occurred prior to the arrival of the police officers on scene that day. The police department lost the video. Kinsler argues spoliation and asks for a specific jury instruction stating such, as well as sanctions. The court found however, that there was no spoliation. It determined that the video was not relevant to the case because it only showed events that occurred before the officers arrived on scene. Further, a video was in existence that showed the incident at the time the officers were involved. Also, Kinsler never claimed that the accused officers were ever in possession of the lost video. Therefore, there was no spoliation and plaintiff’s motion for sanctions was denied. Moral of the story: If evidence is at all potentially relevant in pending or foreseeable litigation, preserve it, or risk sanctions. Jessie is a third year student at Seton Hall University School of Law (Class of 2015). She graduated from Rutgers University, New Brunswick in 2012 with a B.A. in Philosophy and Political Science.   Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Do E-Discovery Costs Shift?

It is a known fact that electronic discovery is costly.  For which party, however, is e-discovery costly? Does the cost of e-discovery ever shift to the other party or is it shared amongst the parties? The United States District Court for the Eastern District of Pennsylvania recently considered the cost-sharing question in the case of Cochran v. Caldera Med., Inc., when the defendant’s made a motion requesting to share the burden of costs with the plaintiffs.  The defendant argued that it had limited resources and estimated that it would cost $500,000 to collect and produce the ESI in response to the document requests. The judge ultimately denied the defendant’s request, but why? The court began with the presumption that each party must bear its own discovery costs. The judge first addressed the law under Rule 26(b)(2)(B), where the court has the discretion to grant cost sharing and other relief if the producing party shows “that the information is not reasonably accessible because of undue burden or cost.”  Information is found to be accessible if it is stored a readily usable format. The defendant did not provide any documentation in support of its estimate or identify what portion of this estimate was attributable to retrieving accessible information or reviewing documents for privilege, both of which tasks are typically not subject to cost sharing. Without this evidence, the court held that the defendant failed to show that the ESI was not reasonably accessibly as required to allow cost sharing under Rule 26. The court next considered cost sharing under Rule 26(b)(2)(C)(iii), which permits cost sharing if the court determines that “the burden or expense of the proposed discovery outweighs its likely benefit. The court held that the plaintiff document requests were relevant and material information. Thus, using the proportionality factors from Rule 26, held that the burden on the defendant did not outweigh the importance of the discovery and the seriousness of the injuries alleged by the plaintiffs and the defendant must pay. The moral of the story is that cost shifting between parties can only be considered in limited situations according to the FRCP 26. They are if inaccessible data is being requested for production, or if proportionality supports it. Keep this in mind when making your next motion for cost sharing. Click here for a look at Federal Rule 26.  Amanda is a third year student at Seton Hall University School of Law, where she is pursuing a J.D. with a certificate in Health Law. Prior to law school, she was a 2011 magna cum laude graduate of Seton Hall University, where she earned Bachelor of Arts in Political Science and a minor in Philosophy. Presently, she is a law clerk at a small firm handling real estate and bankruptcy matters. After graduation this native New Yorker hopes to work at a mid-sized firm in the Big Apple. Want to read more articles like this?  Sign up for our post notification newsletter, here.

Hiding Bank Account Records Can Be Criminal—Not Just For the Mob!

During the course of discovery, plaintiff Luellen requested that defendant Hodge  produce bank account records.  Hodge failed to produce the bank account records, claiming that the bank, Capital One (and Charter One), had destroyed these records already. Luellen argues that Hodge was aware that the records were being sought for discovery and deliberately allowed the records to be destroyed. Luellen argues that Hodge had two different ways of being aware that the records were relevant to litigation and thus had a duty to preserve the records. First, Hodge was served with Luellen’s interrogatories, requesting information relating to bank accounts in Hodge’s name. Second, Hodge filed a motion for a protective order requesting that the Court quash a subpoena directed to Charter One. The fact that Hodge sought a protective order regarding the bank indicates knowledge that the bank records were sought for discovery. In addition, Luellen claims that in filings dated February 27, 2012, Hodge made statements indicating his awareness of Luellen's pursuit of information regarding Hodge's personal accounts. The argument for spoliation of the bank records is based on the reasonable assumption that if Hodge had directed Charter One to preserve his records when he was served with the first set of interrogatories, then the relevant records would not have been destroyed in accordance with the bank's record retention policy. In a spoliation motion, the party must show that:   (1) the party charged with destroying the evidence had an obligation to preserve it; (2) the records were destroyed with a “culpable state of mind”; and, (3) the destroyed evidence was relevant to the party's claim or defense. In reference to the first element, the court found that “a common sense understanding of the relationship between an account holder and a financial institution leads to the conclusion that Hodge had sufficient control over the documents to be able to direct their preservation.” Hodge should have directed the bank to preserve the records. In reference to the second factor, that the records were destroyed with a culpable state of mind, the court finds that Hodge’s failure to prevent the bank from destroying the records was negligent but not bad faith. The court finally holds that severe sanctions are not warranted in this case because Luellen has not shown that Hodge's failure to preserve the Charter One account records were done in bad faith or that Luellen had been severely disadvantaged by the destruction of the records. Hodge was directed to reimburse Luellen's costs and expenses in the amount of $18.00. The takeaway message here is that while you are in control of bank records, if you can show that you did not act in bad faith when you failed to prevent the banks from destroying the records, you could avoid a spoliation charge. But beware, it is better to anticipate this and prevent it by telling your bank to keep all your records! Rebecca Hsu, a Seton Hall University School of Law student (Class of 2015), focuses her studies in the area of Patent Law, with a concentration in Intellectual Property. She is also certified in Healthcare Compliance, and has worked in Compliance at Otsuka America Pharmaceuticals, Inc.  Prior to law school, she graduated cum laude from UCLA and completed graduate work in Biomedical Science. She has co-authored two medical science research articles, as well as completed fellowships through UCLA Medicine and the Medical College of Wisconsin. In addition to awards for her academic achievements, Rebecca has been honored by awards for her community service with disadvantaged communities. In her spare time, Rebecca regularly practices outdoor rock climbing, and can be found camping in the Adirondacks. Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Is “Discovery On Discovery” Improper?, Part 2

In Freedman v. Weatherford Int’l, Ltd., Weatherford hired law firm Latham & Watkins to review allegations of security fraud made to Weatherford’s whistleblower hotline. Latham found no evidence of fraud. However, a second investigation was conducted by Davis Polk & Wardwell, LLP. Plaintiff’s alleged that Davis’s second investigation reveal that Latham actually discovered evidence of wrongdoing. Plaintiffs sought reports comparing the results of Weatherford’s production with search terms and productions related to the two investigations and search terms proposed by the plaintiff, in order to test the adequacy and reasonableness of Weatherford’s initial production. Weatherford objected, noting that Plaintiff had no legal basis for its request and its requested production was “hugely burdensome.” The District Court for the Southern District of New York held that the plaintiff’s request was “outside the bounds of Rule 26 of the Federal Rules of Civil Procedure . . . [because they did] . . . not proffer an adequate factual basis for their belief that the production [was] deficient.” Plaintiff’s claim that Weatherford’s production was deficient because 85% of the pages produced related to different case was too conclusory. Furthermore, the Court was not surprised that Weatherford used dramatically different search terms here compared to search terms used in the two investigations and a related action, because of the differing class periods and varying false statements. The court also addresses arguments related to Subject matter waiver and the crime-fraud exception of the attorney-client privilege, but these arguments were not related to e-discovery. Aaron Cohen, a Seton Hall University School of Law student (Class of 2015), focused his studies in the area of Family Law. He participated in the Seton Hall Center for Social Justice’s Family Law Clinic. After graduation, he will clerk for a judge in the Superior Court of New Jersey, Family Division. Prior to law school, he was a 2011 cum laude graduate of The George Washington University Columbian College of Arts and Sciences, where he earned a B.A. in Psychology. Want to read more articles like this?  Sign up for our post notification newsletter, here.

To Preserve or Not to Preserve? THAT Is the Question

This dispute stems from Plaintiff Linda Riley’s slip and fall at a Marriott hotel in Hawaii (her husband, James, is another named plaintiff).  As a result of this fall, in simple terms, Riley broke her right leg and sustained permanent nerve damage including sensory motor loss and weakness in her right foot.  Riley contends Marriott was negligent for failing to remove accumulated water (it had been raining that day), provide a non-slip surface, or provide warning signs. The entire accident was recorded on Marriott’s security cameras, and according to the loss prevention manager, the footage is maintained for 30 days.  However, during discovery, instead of being provided with several hours of footage, Riley was only provided with about 7 minutes; the rest was destroyed.  The footage released began about one minute before Riley’s accident, and ended before Riley was even lifted off of the ground! Plaintiff rightfully believed she was prejudiced because:  (1) she is unable to determine how much water was removed from the location and how long it took hotel staff to remove it, and (2) that the loss prevention manager’s testimony regarding the footage cannot be meaningfully challenged because the footage was gone.  This recording was apparently turned over to the Marriott’s liability insurance carrier, but neither Marriott’s investigation into its destruction (if one occurred) nor the results of any such investigation were ever disclosed.  Even maintenance logs—that might have also denoted any water that was removed from the floor or the placement of any signs—were also allegedly destroyed. From this, the court “easily” found Marriott had a duty to preserve both the sweep logs and the video footage from the day of the accident.  Further, the court recognized Marriott’s failure to offer any justification for its failure to preserve the evidence.  For these actions, the court found “at a minimum, gross negligence.”  The question then turned to imposing sanctions. Fortunately for Marriott, their answer was not stricken.  Nonetheless, their failure to preserve evidence still resulted in an adverse inference instruction regarding the video footage, or lack thereof.  This means the absence of a recording can, at trial, corroborate Plaintiffs’ statements that there were no warning signs at the time of the accident and that water had also accumulated on the floor.  Of note here, the jury would not be required to make such an inference.  However, Marriott might not be eager to take that chance.          Samuel is in the Seton Hall University School of Law Class of 2015 pursuing the Intellectual Property concentration. He received his master’s from the Rutgers Graduate School of Biomedical Sciences and became a registered patent agent prior to entering law school.  Want to read more articles like this?  Sign up for our post notification newsletter, here.

What Happens When the Smoking Gun is Thrown in the Recycling Bin?

In January 2014, the Hon. Lawrence E. Kahn in the U.S. District Court for the Northern District of New York granted plaintiff Dataflow, Inc.’s motion for sanctions in a case regarding deleted email correspondence.  Sanctions took the form of the often-case-ending adverse inference, with the judge reserving on the specific language of the adverse inference jury instruction until trial.  Defendant Peerless Insurance Co. might not wait that long, as even the neophyte lawyer can tell when blood is in the water. Dataflow’s claim arose out of a discovery request for production of documents that “targeted, inter alia internal communications and investigations regarding Plaintiffs’ claim.” Dataflow, Inc., v. Peerless Ins. Co., No. 3:11-cv-1127 (LEK/DEP), 2014 WL 148685, *2 (N.D.N.Y. Jan. 13, 2014).   When the defendant failed to produce any internal communications responsive to the document request, the plaintiffs tried again.  After the plaintiffs submitted an even narrower request for production, the defendants still didn’t produce anything responsive. Perhaps smelling something fishy, Dataflow started taking depositions and asking questions about the internal communications at Peerless.  The plaintiffs quickly learned that email was routinely used to communicate about claims.  The emails that Dataflow already asked for.  The emails that Dataflow was told didn’t exist.  The plot thickens. Hon. David E. Peebles, the Magistrate Judge handling discovery in this matter filed a Report and Recommendation urging sanctions be granted and fees shifted.  The District Court, reviewing Judge Peebles’s ruling de novo determined that the Magistrate got it right—and that sanctions are appropriate. The court analyzed the facts of the case under the spoliation framework set forth in Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 107 (2d Cir. 2002): On a motion for sanctions due to spoliation, the moving party must show that: (1) the party having control of the evidence had an obligation to preserve it at the time it was destroyed; (2) that party had a culpable state of mind; and (3) the destroyed evidence was of a nature that a reasonable trier of fact could find that it would support the moving party’s claim or defense. Dataflow, at *2 (citing Residential Funding Corp, at 107). Here, the duty to preserve for an insurance party was triggered when a claim was submitted.  As such, any internal communication regarding that claim is obviously supposed to be preserved.  The culpable state of mind can be inferred by the gross negligence displayed by email deletion resulting from a “system change.”  A “system change” that also conveniently “changed” the methods of preservation of documents related to paid and unpaid claims.  Finally, since the plaintiff was able to prove that the contents of the internal email conversations likely would have supported the plaintiffs’ theory of the case, sanctions in the form of an adverse inference just make sense. Perhaps it’s time for Peerless to have a “system change” with regards to their general counsel. Kevin received a B.S. in Political Science from the University of Scranton (2009), and will receive his J.D. from Seton Hall University School of Law in 2015.  Prior to joining the Seton Hall community, Kevin worked as an eDiscovery professional at two large “white-shoe” law firms in Manhattan. Want to read more articles like this?  Sign up for our post notification newsletter, here.

How Generous Can a Court Be in Rewarding Legal Fees As a Result of Violation of Discovery Rules?

When a party’s violation of discovery rules causes added legal expenses to its adversarial, courts appear to be very generous in approving fee applications. An application only needs to provide itemized ledger entries of attorney/paralegal hours with simple explanation of the relation of the corresponding work to the discovery violation. Courts are going to exercise broad discretion and place the burden on the violating party to show with particularity why each logged hour is unreasonable. It appears that courts will only disprove hours that are obviously excessive or clearly redundant on the face of the ledger. In Tangible Value v. Town Sports International, Inc., Tangible Value (“TV”) sued the defendants for not paying for services provided according to an oral contract, which the defendants denied. The bulk of its claim was reflected in an invoice stating an unpaid balance of about $800,000. Upon discovery request by the defendant, TV, refused to produce metadata and other documents related to the invoice. The court then ordered such production. During the course of the discovery, TV repeatedly provided insufficient documentation as requested and the defendant had to examine the documents and determine their sufficiency, converse with counsels of TV, and initiate court conferences multiple times to compel additional documents. It was later discovered that the invoice was not real but was created by TV after the fact to justify a damage claim. At that point, the defendant filed a motion for contempt and sanction. The court granted the motion. The defendants then filed their fee application seeking to recoup legal expenses as a result of TV’s discovery violation, which  totaled 423.2 hours at rates varying between $180-$562 for attorneys (associates and partners) and $95-$153 for paralegals. The Magistrate Judge of the District Court for the District of New Jersey generously awarded the defendants 384 hours. Several observations can be made on how the court dealt with various legal charges. First, court deemed all charging rates reasonable by comparing the proposed rates to the rates approved previously by the court in other matters. Second, the court automatically approved any hours that were not objected to by TV. Third, once specific objections of hours were made, the court used a great deal of discretion and required particular showing why the hours objected were unreasonable. Fourth, the court approved internal attorney conferences without much hesitation. Fifth, hours logged for preparation for court conference were approved 100%. Sixth, the court was only willing to consider obviously excessive or unnecessarily redundant work as unreasonable. Seventh and most astonishingly, the court was extremely generous in allowing hours associated with legal research and drafting of Motion for Sanction and Fee application, approving a whopping 250 hours, or over 6 weeks’ worth of work for a single attorney! For my fellow law students, that is half of one entire law school semester. Thus, for executives and legal counsels in similar situations, make a good faith effort to obey the discovery request. Otherwise, the other side will surely take full advantage of the generosity of the court and obtain a humongous reimbursement in legal fees. For easy reference, the table below summarizes the court’s disposition of all hours included in defendants’ fee application in the Tangible Value case. Note: DP stands for Document Production. Fee Items Hours Applied Court Comments Reduction of Hours by Court Assessment of deficiencies in initial DP 8.3 none Communications with TV Re deficiencies in initial DP 9.8 2 Court conference/preparation Re deficiencies in initial DP 1.8 none Communications with TV Re deficiencies in its 2nd DP 5.8 none Court conference/preparation Re deficiencies in 2nd DP 3.1 none Investigation of the invoice and assessment of documents related to the derivation of the invoice 19.2 Multiple paralegals on same task. 4.9 Communications with TV Re deficiencies in its DP concerning the invoice 10.7 Two entries on similar work. 4.4 Court conference Re the deficiencies in DP concerning the invoice 0.8 none Assessment of deficiencies in the 3rd DP 2.2 none Communications with TV Re the deficiencies in 3rd DP 2.4 none Assessment of the 4th DP 1.5 none Assessment of the 5th DP 7 Ledger is unclear. 0.5 Communications with TV Re deficiencies in the 5th DP 1 none Assessment of 6th DP and accuracy of TV certifications 5.9 none Communications Re deficiencies in 6th DP and accuracy of certifications 7.7 none Communication with TV Re deficiencies in 7th DP 1.3 none Communication with TV Re deficiencies in 8th DP 0.5 none Letter to Court summarizing DP deficiencies and seeking permission to move to compel 3.9 none Motion to Compel, including drafting, legal research. 23.5 none Oral argument Re Motion to Compel and Status Conference with court. 4.4 none Revision of Scheduling Orders throughout litigation due to discovery delays 4.2 none Letter request for permission to move for sanction, including review and legal research 9.8 Two attorneys repeated same task. 2 Review of TV response to the letter above 8.2 none Motion for Sanction, including legal research and drafting 80.8 none Review of TV response for the Motion for Sanction, preparation of reply, and review of Magistrate Report and Recommendations. 28.1 The 4 hours for reviewing Court Report excessive. 1 Fee application including review of records and case law research 89.9 Excessive only by 12.2 hours 12.2 Review of TV’s opposition to the Fee Application and draft reply 77.7 Excessive  only  by 12.2 hours 12.2 Gang Chen is a Senior Segment Manager in the Intellectual Property Business Group of Alcatel-Lucent, and a4th year evening student at Seton Hall University School of Law focusing on patent law. Want to read more articles like this?  Sign up for our post notification newsletter, here.

How Are Electronic Materials Slipping Through the Cracks? The Scope of eDiscovery Is Limited to Discovery Requests, Not search Terms

We have entered the age of information!  Every conversation, e-mail, text message, attachment, voicemail, and other electronic data are being stored all day, every day.  These types of electronically stored information (a.k.a. “ESI”) are regularly used during litigation.  So why is there a problem collecting information for trial?  Lawyers need to search through these massive amounts of ESI in order to provide the materials to the opposing party before trial.  This process is known as eDiscovery, or electronic discovery, and it has raised a number of issues regarding who, what, where, when, why, and how ESI is produced. The issue discussed here is what defines the scope of eDiscovery.  In ChenOster v. Goldman, Sachs & Co., the court made it clear that the scope of discovery, whether electronic or not, is still defined by traditional discovery requests and demands.  However, what brought forward this conclusion? Traditionally, the process of discovery is the period when lawyers exchange requests and demands for information, documents, and other materials that may be used in the case.  Generally, this can be broken down into three steps: (1) Requesting party will make a discovery request; (2) the opposing party will use any means she deems appropriate to find the materials; and (3) the opposing party will respond to the request in the form of producing the materials or an objection. However, in Chen-Oster, the parties deviated slightly from this traditional process.  Here, the requesting party, the plaintiffs, made traditional discovery requests for ESI.  Then the plaintiffs negotiated with the opposing party, the defendants, in order to determine what search terms would be used to filter through the enormous amounts of ESI available. Now, why is this different from a traditional discovery process?  This is different because both parties collaborated to determine how the ESI requested would be located. The issue presented in Chen-Oster begins upon production of the ESI by the defendants.  The defendants only produced the ESI they deemed to be relevant to the discovery requests set forth by the plaintiffs.  However, the plaintiffs intended to collect all ESI produced by the search terms they agreed upon. This brings us back to the main question:  what defines the scope of eDiscovery?  It is either all ESI located under the agreed upon search terms; or it is only ESI located under the search terms that are relevant to the original discovery request. According to Chen-Oster, an agreement to use specific search terms or discovery protocol does not override discovery demands and requests.  In other words, search terms used to filter through electronic data do not define the scope of discovery.  The scope of discovery is determined by the discovery requests rendered.    Victoria O’Connor Blazeski received her B.S. form Stevens Institute of Technology, and she will receive her J.D. from Seton Hall University School of Law in 2015.  Prior to law school, she worked as an account manager in the Corporate Tax Provision department of Thomson Reuters, Tax & Accounting.  Victoria is a former D3 college basketball player, and she has an interest in tax law and civil litigation.  After graduating, she will clerk for the Hon. Joseph M. Andresini, J.T.C. in the Tax Courts of New Jersey.   Want to read more articles like this?  Sign up for our post notification newsletter, here.

What Happens When ESI Is Lost?

Willfully destroying evidence? Failing to preserve materially relevant evidence? These are just two of the allegations Lisa Alter has made against the Rocky Point School District. Prior to submitting her complaint, Ms. Alter had accused the school district of similar wrongdoings. Alter worked for the Rocky Point School District holding various positions over the years. While employed as the Coordinator of Central Registration/Administrative Assistant within the Human Resources department, Alter alleges that she was subject to a hostile work environment on the basis of her gender. Further, Alter claims that she was retaliated against for complaining to the School District about it. The opinion here is related to a matter regarding electronic discovery in this case. The plaintiff filed a motion to compel discovery and for sanctions. After taking several depositions, plaintiff claims to have discovered new testimony relevant to her most recent motion to compel discovery. Specifically, the plaintiff alleged that: “(1) Defendants both failed to preserve and willfully destroyed evidence, and (2) Defendants continue to intentionally withhold relevant evidence despite repeated demands for production.” The school district had a system for overwriting backup drives. The plaintiff contended that by not stopping the overwriting of the backup drives that it constituted a breach of the defendant’s preservation obligation. The defendant claimed that all information relevant to this case (i.e., emails stored on the school’s employee email system). The duty to preserve arises when litigation is “reasonably foreseeable.” The party that has control over the evidence has an obligation to preserve it. Once evidence is lost, the court then looks to the obligor’s state of mind to determine culpability. Here, the court determined that the defendants did not intentionally lose the data. The burden then shifted to the plaintiff to prove that the lost data was relevant.[1] In the instant case, the court did not find bad faith; thus, it was up to the plaintiff to then prove the relevance of the lost data. Ultimately, the court granted in part and denied in part the plaintiff’s motion. The court found that the plaintiff did not meet her burden of showing that the lost documents were relevant. However, the actions of the defendants that lead to losing materials placed the plaintiff in a position to have to file this motion. Thus, sanctions were awarded in the amount of $1,500.00. The moral of the story: When litigation is pending, or likely to begin, preserve or pay the price. Jessie is a third year student at Seton Hall University School of Law (Class of 2015). She graduated from Rutgers University, New Brunswick in 2012 with a B.A. in Philosophy and Political Science.   Want to read more articles like this?  Sign up for our post notification newsletter, here. [1] When the breaching party acts in bad faith, relevance is assumed.

Does Forwarding Emails To An Opposing Party Qualify As A Sufficient Method of Transfer for Discovery Purposes?

The employee in this case was not an inexperienced layperson, but rather a seasoned and accomplished trial attorney. Yet even with her wealth of knowledge regarding discovery, she was nearly cited for contempt of court as a result of her unfamiliarity with electronic discovery obligations. When obligated to turn over emails to your opposing party during discovery, it is not enough to simply forward the email. Courts require the emails to be in their native form, which means containing the crucial metadata contained within the original email. In Sexton v. Lecavalier, the plaintiff, Byron Sexton, subpoenaed all documents in the defendant’s possession regarding several business entities. The subpoena provided that if these documents were in electronic form, the copies produced must be in their “native” format. In response to the subpoena, the defense attorney produced numerous documents including eleven emails that had been forwarded to her from her client’s Gmail account. The defense attorney claimed that she could not access the emails in their original format and even had an IT expert testify that the emails could not be accessed in their native format because the infrastructure for the email is controlled by Google, who does not allow its users to copy emails in native format. The issue in this case is that the emails were located in the “cloud,” and thus stored with a third party. However, even though a third party held the emails, the plaintiff argues that there are two ways to preserve the crucial metadata. (1) Emails can be downloaded to an email client such as Microsoft Outlook and then saved onto a computer in the format used by the client; and (2) Gmail emails that have been displayed in their “original” format by clicking “show original” and then saved as a PDF. The court held that even though the plaintiff currently lacked access to the files in their native format, this fact does not absolve counsel of her discovery obligations. A growing number of attorneys and courts are realizing the evidentiary value to metadata and as this trend continues, it is becoming crucial for parties to preserve all relevant electronic data. There is currently electronic discovery software in existence, which makes preservation of data a whole lot easier (http://www.ediscovery.com/solutions/collect/ is merely one example of such software). The presiding judge went on to scold both parties for even bringing this discovery disagreement in front of the court. The judge stated that the parties should have resolved this matter outside of court and that the defendant could have provided the emails in a correct format with minimal cost. However, the judge believed that the defense attorney had a good faith belief that the emails could not be provided in their native format and refused to hold her in contempt. It seems that ignorance was the defense attorney’s saving grace. Any practitioners reading this will not have the luxury of such a defense. In order to avoid charges of contempt being levied against you in the future, it would be wise to invest in electronic discovery software. At the very least, you should download Microsoft Outlook and save all of your emails in a format that preserves metadata such as .eml or .msg. As less paper copies of documents are being utilized, and as electronic storage is becoming more prevalent, native documents are going to become an issue increasingly seen by courts. Additionally, resolve any such discovery issues with your opponent. No judge wants his or her time wasted with similar motions compelling discovery. Daniel received a B.A. in Criminology and Criminal Justice from The University of Maryland. He will receive his J.D. from Seton Hall University School of Law in 2015. Presently, Daniel is serving as a legal intern in the Juvenile Justice Clinic. After graduation Daniel will clerk for a trial judge in the Superior Court of New Jersey. Want to read more articles like this?  Sign up for our post notification newsletter, here

  • Find an eLesson


  • Register for Post Notifications

    Subscribe to receive updates whenever a new eLesson is published.

    Manage Subscriptions
  • Let Us Blog Your Event!

    eLessons Learned is fast becoming the site of choice for employers, employees, judges, lawyers, and journalists who are interested in learning more about these areas without being intimidated by the complexity of the topic. In fact, organizations and event coordinators often feature eLessons Learned as their official eDiscovery blog. Fill out our simple registration form to have eLessons Learned be the official blog of your organization or event.

    Register Now
  • Recent Praise

    The blog takes a clever approach to [e-discovery]. Each post discusses an e-discovery case that involves an e-discovery mishap, generally by a company employee. It discusses the conduct that constituted the mishap and then offers its ‘e-lesson’ — a suggestion on how to learn from the mistake and avoid it happening to you.

    Robert Ambrogi

    Legal Tech Blogger and creator of LawSites




    Although I may have missed some, yours is the first article that I have seen addressing Zubulake II. It is often the lost opinion amongst the others.

    Laura A. Zubulake

    Plaintiff, Zubulake v. UBS Warburg


    Click here to see more.
View in: Mobile | Standard