Welcome to the new eLessons Learned

eDiscovery Written by Law Students

eDiscovery Written by Law Students

eLessons Learned features insightful content authored primarily by law students from throughout the country. The posts are written to appeal to a broad spectrum of readers, including those with little eDiscovery knowledge.

Law + Technology + Human Error

Law + Technology + Human Error

Each blog post: (a) identifies cases that address technology mishaps; (b) exposes the specific conduct that caused a problem; (c) explains how and why the conduct was improper; and (d) offers suggestions on how to learn from these mistakes and prevent similar ones from reoccurring.

New to the eDiscovery world?

New to the eDiscovery world?

Visit our signature feature, e-Discovery Origins: Zubulake, designed to give readers a primer on the e-discovery movement through blog posts about the Zubulake series of court opinions which helped form the foundation for e-discovery. Go There

Contribute to eLessons Learned

Contribute to eLessons Learned

Interested students may apply for the opportunity to write for e-Lessons Learned by filling out the simple application. Go There

Searching Through Gigabytes of Data? Predictive Coding Is the Answer

There is nothing more daunting then receiving a request for a backup drive with 1 or more gigabytes of data on it.  The good news is that the courts have recently allowed the use of a new tool that can save business owners time and money: predictive coding. In the case of Dynamo Holdings v. Commissioner of Internal Revenue, the court allowed the use of predictive coding in order to identify relevant and confidential information stored on a company backup drive.  This was one step in the course of court technology efficiency, but a giant step in the world of electronic discovery! Whether or not the parties were allowed to use predictive coding became a central issue because the back up drive in question held approximately one gigabyte of electronic data.  Just to give you a frame of reference, this equates to approximately 200,000 to 400,000 individual documents.  The producing party estimated that is would cost them about $450,000 just to review all the data before giving it to the opposing party. The producing party and the client paying for the discovery was daunted with the idea or spending that much time and money just reviewing documents.  Also, the alternative of giving up the data without reviewing it could be detrimental to their case.  In the end, the cost effective, technological answer was predictive coding. This opinion was highly influenced by the article written by Magistrate Judge Andrew Peck’ who describes predictive coding.[1]  Predictive coding is a process that essentially can predict the relevance of documents and identify which documents are not responsive.  Judge Peck’s article explains that the computer identifies properties of documents and uses those properties to code other documents. As more sample documents are coded, the computer actually predicts the future coding.  In a way, predictive coding is a reviewer teaching the computer what types of documents are relevant and what is confidential.  Judge Peck states in his article that it usually takes only a few thousand documents to train the computer, which, compared to one gigabyte of data, is a drop in the bucket. In other words, predictive coding is a tool that uses algorithms to search rather than manually reinventing the wheel every time a labor-intensive discovery request is made.  The algorithms use keywords, dates, custodians, and documents types in order to filter through hundreds of thousands of documents in a drastically shortened period of time. Now, some may be thinking, “how do you know that coding is producing the correct results?”  Senior reviewers take samples throughout the process in order to determine the accuracy of the results. Additionally, a log can be produced detailing the records that were withheld and the reasons for doing so. This process may not be as simple as implementing a “claw back” provision (aka. a party can recall a document that was not supposed to be produced); however, it presents an accurate and efficient way to move along a trial and discovery process while mitigating harm to the party producing the information. Judge Buch weighed the interest of both parties: receiving party wanted as many documents as could be produced, and producing party wanted to protect the client from producing irrelevant or confidential documents.  The predictive coding process was considered: (1) restore some or all of the date from the tapes; (2) Qualify the restored date; (3) Index and load the qualified restored date into a review environment; (5) use predictive coding to review the remaining data using search criteria that the parties agree upon; and (6) produce the relevant non-privileged information and privilege log that sets forth claimed privileged documents. In the end, Judge Buch’s conclusion was very clear.  Predictive coding is an acceptable electronic search tool that can be used during the discovery process.   Victoria O’Connor Blazeski (formerly Victoria L. O’Connor) received her B.S. form Stevens Institute of Technology, and she will receive her J.D. from Seton Hall University School of Law in 2015.  Prior to law school, she worked as an account manager in the Corporate Tax Provision department of Thomson Reuters, Tax & Accounting.  Victoria is a former D3 college basketball player, and she has an interest in tax law and civil litigation.  After graduating, she will clerk for the Hon. Joseph M. Andresini, J.T.C. in the Tax Courts of New Jersey.   Want to read more articles like this?  Sign up for our post notification newsletter, here. [1] For information about predictive coding, see Magistrate Judge Andrew Peck’s published article:  Search, Forward: Will Manual Document Review and Keyboard Searches be Replaced by Computer-Assisted Coding?, L. Tech. News (Oct. 2011).

Denial of Discovery Request: Can One Refuse to Produce Documents?

Executive Mgmt. Services, Inc. v. Fifth Third Bank is not a riveting case to read. It involves a rather mundane breach of contract claim by the plaintiff alleging wrongdoing by the defendant. Namely, Executive Management Services brought suit against Fifth Third Bank alleging that the bank had made misleading statements regarding interest-rate swaps. While the subject matter of the claim would fail to interest anyone, the procedural elements and motion practice offer a far more interesting and educational prospect. In building their defense, Fifth Third Bank sent Executive Management Services multiple discovery requests, which included tax returns, financial statements, and documents referring or relating to their (EMS) loan applications. However, Executive Management Services refused to produce the requested discovery on three grounds. First, EMS argued that the requested as they have "not claimed to be unsophisticated regarding standard commercial banking," only that they "did not understand the risks of the swap transactions." Second, the EMS argued that the defendant’s discovery requests were "overly board and unduly burdensome." Third, EMS claimed privilege regarding the requested documents under both attorney-client privilege and the work product doctrine. The court rejected EMS’s first argument right out of the gate. EMS claimed that the documents sought were not relevant to the issue at bar and therefore did not need to be turned over to their adversary. EMS claimed these documents were irrelevant because they had "not claimed to be unsophisticated regarding standard commercial banking," but rather that "did not understand the risks of the swap transactions." However, the court was not persuaded by this argument because even though this was a new area of investment banking, it remained the same procedure and protocol as any form of investment banking. Therefore, EMS’s past actions in commercial banking provided them with a foundation by which to understand this new field of investment and thus the documents proving this foundation were relevant. The court also rejected EMS’s argument that the documents were privileged under attorney-client privilege and the work product doctrine. While there may have been concerns regarding the confidentiality of these documents the court stated that the protective order in place addressed and negated all of the concerns posed by this argument. EMS’s second argument seems like it could have had the most impact out of the three; however, hardly any effort at all was put forth in crafting it. The plaintiffs simply stated that the production of such documents was unduly burdensome and overbroad and left it at that. There was no further development of this argument and therefore the court rejected it on its face. If the plaintiffs had put forth any evidence regarding why the request was overbroad or unduly burdensome the court may have limited the requested discovery. The plaintiffs should have offered evidence regarding why this request was unduly burdensome and overbroad; their failure to do so resulted in the court rejecting this argument on its face.   A.S. Mitchell received his B.A. in Political Science from the University of Central Florida (2008). He will receive his J.D. from Seton Hall University School of Law in 2015.   Want to read more articles like this?  Sign up for our post notification newsletter, here.

What Should A Party Do When It Receives A Confusing Discovery Response?

Were the defendants at fault for providing to the plaintiffs a CD containing information confusing to the plaintiffs? A court found that, no, the parties should have communicated with each other in order to facilitate the discovery process. The issue arose when the defendants provided a CD to the plaintiffs containing information the plaintiffs had requested. However, the plaintiffs did not know how the defendants collected the information on the CD, nor did the plaintiffs know how the contents were responsive to their discovery requests. Based on this incident, the plaintiffs filed this motion to appoint a neutral discovery master to oversee the discovery process. The plaintiffs also argued that the defendants had not been timely with their discovery submissions. However, as the court pointed out, the plaintiffs had not been timely. Ultimately, the court found that if the parties had merely taken the time to communicate with each other that this motion likely could have been avoided. The court further stated that the parties must, “meet and confer in good faith in order to communicate about issues of untimely or confusing production and resolve them without judicial intervention.” Thus, the court dismissed the motion. Jessie is a third-year student at Seton Hall University School of Law (Class of 2015). She graduated from Rutgers University, New Brunswick in 2012 with a B.A. in philosophy and Political Science.  Want to read more articles like this?  Sign up for our post notification newsletter, here.

In the Eyes of the Court, What Is the Difference Between the Words “Related To” Verses “Concerning” in Discovery Requests?

The District Court for Massachusetts held that “the use of broad terms such as ‘relate to’ or ‘relating to’ provides no basis upon which an individual or entity can reasonably determine what documents may or may not be responsive.” In doing so, the court ordered the defendants to produce documents responsive to a request and that request calls for documents “related to” a topic, the court modified the requests to strike the language “related to” and replacing it with “concerning.” This holding comes in response to the plaintiff’s Motion to Compel defendants Reposes to Document Requests and Production of all documents. The plaintiff in this case is the previous employer of the two defendants, husband and wife.  The defendants were both employed by the plaintiff in different sectors for several years. The company now disputes that trade secrets developed by both parties were the sole property of them. Keep in mind, one of the defendants now works with a competitor company, so you can see the importance of these trade secrets. The plaintiffs brought claims alleging violation of the Computer Fraud and Abuse Act (“CFAA”), conversion, misappropriation of trade secrets, and breach of fiduciary duty. Soon thereafter, the defendants offered responses to the first set of Requests for Document Production. In summary, there are limits to the scope of discovery under Rule 26(b). They are: (1) unreasonably cumulative or duplicative, or is obtainable from some other source that is more convenient, less burdensome, or less expensive; (2) the party seeking discovery has had ample opportunity by discovery in the action to obtain the information sought; or (3) the burden or expense of the proposed discovery outweighs its likely benefit, taking into account the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the litigation, and the importance of the projected discovery in resolving the issues. See Fed. R. Civ. P. 26(b)(2)(C). The defendant former employees objected to discovery on the grounds that the requests were overly broad and unduly burdensome. The court agreed in the finding that the requests were overly broad, specifically because they call for documents “related to” a topic. Use of the word “concerning” would be the correct qualifying language. To see video of the morning session at court on this case, click here. Amanda is a third-year student at Seton Hall University School of Law, where she is pursuing a J.D. with a certificate in Health Law. Prior to law school, she was a 2011 magna cum laude graduate of Seton Hall University, where she earned Bachelor of Arts in Political Science and a minor in Philosophy. Presently, she is a law clerk at a small firm handling real estate and bankruptcy matters. After graduation this native New Yorker hopes to work at a mid-sized firm in the Big Apple.   Want to read more articles like this?  Sign up for our post notification newsletter, here.

Prophylactics Do Not Protect Pharmaceutical Companies From Data and Document Discovery Laws!

In this case, the plaintiff Nicole Baker sued Bayer Healthcare Pharmaceutical Inc., complaining that the Bayer product Mirena was not adequately accompanied by warnings of its side effects. Baker asked Bayer to produce databases that contains sales calls made by the marketing and sales department to physician’s offices. The sales calls notes also contained conversations between sales representatives and healthcare providers. Bayer argued that only the sales calls notes concerning Baker’s treating physician are relevant. Bayer also argued that producing all the sales calls notes are unduly burdensome and excessive in light of the needs of the case. Ultimately, the court found in favor of the plaintiff, and finds that the databases containing all sales calls must be produced due to their relevance to the current case. Federal Rule of Civil Procedure 26(b)(1) permits “discovery regarding any nonprivileged matter that is relevant to any party's claim or defense.” The information sought “need not be admissible at the trial” so long as it “appears reasonably calculated to lead to the discovery of admissible evidence.” The crux of the plaintiff’s argument is that all the sales call notes, not just limited to those related to her physician, are relevant to her case because they would ascertain whether the pharmaceutical company is overpromoting the product Mirena. Overproduction would mean that there could be dilution or nullification of any warnings, thereby rendering the warnings inadequate. The plaintiff argued that the volume and substance of the sales calls notes establish whether there was a vigorous, aggressive sales campaign to the medical profession, leading to failure to heed written warnings. While this argument appears to be attenuated, it does fall under the standard of being reasonably calculated to lead to the discovery of admissible evidence. The court thought although it was a burden to the defendant, all of the sales calls notes are relevant to establishing if Bayer’s Mirena campaign was so pervasive that any doctor, including the plaintiff’s, would fail to pay attention to warnings about the product’s side effects.   Rebecca Hsu, a Seton Hall University School of Law student (Class of 2015), focuses her studies in the area of patent law, with a concentration in Intellectual Property. She is also certified in Healthcare Compliance, and has worked in Compliance at Otsuka America Pharmaceuticals, Inc.  Prior to law school, she graduated cum laude from UCLA and completed graduate work in biomedical science. She has co-authored two medical science research articles, as well as completed fellowships through UCLA Medicine and the Medical College of Wisconsin. In addition to awards for her academic achievements, Rebecca has been honored by awards for her community service with disadvantaged communities. In her spare time, Rebecca regularly practices outdoor rock climbing, and can be found camping in the Adirondacks. Want to read more articles like this?  Sign up for our post notification newsletter, here

Consumer Credit Reporting Leads to Flurry of Discovery-Based Motion Practice

After requesting and receiving a consumer credit disclosure from defendant Experian, plaintiff Edward Dixon noticed that Experian was not reporting his payment history concerning his mortgage account held by Green Tree Servicing, LLC.  While Dixon admits that his mortgage account was previously held by GMAC Mortgage until the account was discharged in bankruptcy, he argued that his payment history with Green Tree should nevertheless have been reported by Experian because he continued to make mortgage payments to Green Tree post-bankruptcy. After filing suit against Experian alleging violations of the Fair Credit Reporting Act, Dixon served seventy Requests for Production and 40 topics for Experian’s Rule 30(b)(6) corporate witness.  While Experian asserts it has already produced 966 pages of discovery, Dixon asked the court to compel Experian to provide supplemental responses, specifically, in their native format as originally requested. After discussing Rule 34 and Rule 26 in explaining the dynamics of ESI-related discovery, the court noted that Dixon explicitly requested that Experian produce electronically stored information in the electronic form in which it is normally kept.  Dixon's request further defined the applicable terms of “electronically stored information” and “native format” so there would no confusion as to the nature of his discovery request.  In response, Experian produced the information in unsearchable PDF format but did not address ESI or object to Dixon’s ESI specifications.  Thus, the court ruled, “Experian waived any objection to the ESI format requested by Dixon pursuant to Rule 34(b)(1)(C).” This waiver by failure to object was perhaps Experian’s greatest oversight.  Not only did the court subsequently grant Dixon’s motion to compel as to his requests for discovery in native format, but the court made clear that “[i]t is not Dixon’s burden to now explain why the native format…would be more useful to him than the .pdfs.”  Even though Experian was not ordered to export the documents into a readable format such as Microsoft Word or Excel, Experian was still ordered to produce the documents in their requested native format. In addition to compelling documents in their native format, Dixon also asked the court to compel internal and external communications and written policies pertaining to how mortgage accounts of bankrupt consumers are and should be reported.  Experian argued that it has already produced a complete, text-searchable version of the 2012 Credit Reporting Resource Guide and argues that no further information need be produced.  Agreeing with Dixon, the court found that internal and external communications, “including those pertaining to how mortgage accounts of bankrupt consumers are and should be reported” are relevant to the policies included in the Guide and help established whether Experian’s procedures were reasonable.  Further, the court ordered Experian to, at least, conduct a search as to whether any communications or emails with Green Tree regarding Dixon’s dispute exist because such communications are relevant to Dixon’s claims.  In the event Experian found no communications exist, the court advised Experian to “state so in its amended responses.” The court then examined several of Dixon’s specific discovery requests.  Dixon requested that Experian produce “any and all name scans, snap shots, or other periodic backups of Plaintiff’s file,” presumably in an attempt to demonstrate the content of his credit file at various points in time.  Dixon argued such request went to the reasonableness of Experian’s policy that post-bankruptcy payments not be reported.  Experian countered, stating that such request is unduly burdensome, overly broad, neither relevant to the litigation, nor reasonably calculated to lead to the discovery of admissible evidence and vague and ambiguous as to the meaning of its terms.  The court ultimately agreed with Experian and held that “even if the discovery were relevant . . . the burden on Experian in compiling such ‘periodic backups’ that do not already exist outweigh Dixon’s need for the information” especially since the court ordered Experian to provide Dixon with documentation in native format.  The motion to compel this periodic backup information was denied. In ruling on Dixon’s motion to compel documents Dixon believes Experian is withholding, the court found little support that Experian was actually withholding documents and ruled that “Dixon’s suspicion that additional documents may exist is an insufficient basis on which to compel discovery.”  The court additionally declined to award any expenses to Dixon related to this motion. The court then concluded by reviewing Experian’s motion for a protective order based on Experian’s assertion that Dixon’s Rule 30(b)(6) deposition notice exceeds the scope of discovery permitted by Rule 26(b).  Experian requested protection from six of the thirty-one topics identified by Dixon that Experian believes are not relevant to this case.  The court granted protection for five of these six topics: protection from depositions on Experian’s periodic backups; protection from depositions on the exportation of consumer credit files into a readable format; protection from depositions regarding e-mail records; protection from depositions regarding a confidential, one-page document that produced in another lawsuit, and; protection from depositions concerning the identities of Experian representatives most knowledgeable regarding searching and positing queries to an internal database.  Many of these protections were granted on the basis that the court had already compelled Experian to produce documents in their native format, thus eliminating the need for excessive depositions aimed at acquiring the same or similar information. The court, however, denied the motion for protective order as to communications between Experian and Consumer Data Industry Association, the organization responsible for producing the 2012 Guide relied on by Experian for guidelines on credit reporting.  The court held that should Experian produce responsive communications, then “Dixon is entitled to pursue this topic in Rule 30(b)(6) deposition.” Based on the foregoing, the court granted in part and denied in part Dixon’s motion to compel.  Similarly, the court granted in part and denied in part Experian’s motion for a protective order and ordered Experian to make a Rule 30(b)(6) witness available to Dixon for deposition on the single topic if circumstances so demand.  The court concluded by extending the discovery deadline to allow the parties to comply with the court order. Nicole was a 2010 magna cum laude graduate of Northeastern University located in Boston, Massachusetts where she earned her B.A. in English and Political Science.  She will receive her J.D. from Seton Hall University School of Law in 2015.  After graduation, Nicole will serve as a clerk to a trial judge of the Superior Court of New Jersey in the Morris-Sussex Vicinage. Want to read more articles like this?  Sign up for our post notification newsletter, here.

When Does One Need to Produce ESI Generated By A Third Party?

This matter was before the Court on the Plaintiff, Equal Employment Opportunity Commission’s (“EEOC”) Motion to Compel Agreed-Upon Form of Defendant SVT’s Discovery Responses. EEOC requested electronically stored information (“ESI”) held by Kronos, a third party hiring program that SVT used to allow applicants to apply online for positions in its stores, after identifying perceived deficiencies with SVT’s previous production of data held by Kronos. Kronos allowed SVT specific access to custom reports relevant to SVT’s online application program, but did not allow SVT access to the raw data used to generate those specific, custom reports. EEOC argued that, without this additional information from Kronos, it could not determine whether SVT could satisfy its discovery obligation. SVT argued that it did not have direct access to the raw data requested by EEOC, and that Kronos only provided it with a limited range of query and reporting capacity. Moreover, SVT argued that “the data, as kept in the ordinary course of SVT’s business and viewed through SVT’s views and reports, looks very different from how it is stored in Kronos’ proprietary format.” Kronos explained that it would cost $23,500 to generate a report that complies with EEOC’s discovery request. Federal Rule of Civil Procedure 34(b)(1)(C) states that a party requesting production of ESI “may specify the form or forms in which electronically store information is to be produced. Federal Rule of Civil Procedure 34(b)(2)(E) states the procedure that apply to producing ESI: (i) A party must produce documents as they are kept in the usual course of business or must organize and label them to correspond to the categories in the request; (ii) If a request does not specify a form for producing electronically stored information, a party must produce it in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms; and (iii) A party need not produce the same electronically stored information in more than one form. Federal Rule of Civil Procedure 26 states: A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C). The court may specify conditions for the discovery. The court held that ”the data stored by Kronos that SVT can produce through the custom reports already available to it through its contract with Kronos is reasonably accessible, and must be produced in EEOC’s designated format.” The court also noted that any hiring decision made by SVT would have been based on the reports available to SVT from Kronos under their contract. Thus, the custom reports were kept by SVT in its usual course of business. However, the court held that the “data housed by Kronos in forms or reports that are not already available to SVT through the custom reports that Kronos set up for it is not reasonably accessible to SVT because of both undue burden and cost.” Furthermore, the court held that EEOC must bear all the cost of production that is not reasonably accessible to SVT through its reporting capabilities. Thus, the court concluded that if “EEOC want[ed] to obtain the data directly from Kronos as a customized program and report tailored specifically to the EEOC’s discovery request at the estimated cost of $23,500, the EEOC [would] have to pay the cost of the discovery.” In an effort to minimize motion practice, EEOC should have requested the specific, custom reports available to SVT by Kronos because any hiring decision would have been made after considering only those custom reports. It is not likely EEOC would have discovered any relevant information from ESI in a form that was not available to SVT. Aaron Cohen, a Seton Hall University School of Law student (Class of 2015), focused his studies in the area of Family Law. He participated in the Seton Hall Center for Social Justice’s Family Law Clinic. After graduation, he will clerk for a judge in the Superior Court of New Jersey, Family Division. Prior to law school, he was a 2011 cum laude graduate of The George Washington University Columbian College of Arts and Sciences, where he earned a B.A. in Psychology. Want to read more articles like this?  Sign up for our post notification newsletter, here.

Like Copying, A Party Can Recoup the Cost of Scanning

This incident arises under the premise that courts have allowed prevailing parties to recover the costs of converting paper documents into electronic files when the parties agreed that responses to discovery requests would be produced in an electronic format. The defendants sent the plaintiffs a bill for just over $65,000 for the costs of scanning nearly 450,000 documents they produced during discovery.  While the judge did not exactly award that amount to defendants, he came extraordinarily close. The plaintiffs tried to fight the costs by arguing first that they were made in responding to discovery and thus unrecoverable, and second that they were produced for convenience and therefore unnecessary.  The court was unpersuaded by either argument. Surveying the case law in the Fifth Circuit and other jurisdictions, the judge determined that the cost of scanning paper documents into an electronic format was equivalent to making copies.  Notably, only scanning and file format conversion was considered equivalent, and not other activities including, for example: collecting and preserving ESI, processing and indexing ESI, and keyword searching ESI for responsive and privileged documents.  That was precisely the reason the judge required supplemental briefing from the defendants and did not outright award the costs they sought.  The defendants’ invoices may have included other unrecoverable costs, and in order to recover in the subsequent briefings they would need to show which specific costs were attributable to scanning or making copies.  In a subsequent order, the judge did find the plaintiffs were responsible for over $50,000 of the defendants’ document production costs. In short, this case stands for the very simple proposition that “costs” includes “scanning” just as it also historically includes “photocopying.” Samuel is in the Seton Hall University School of Law Class of 2015 pursuing the Intellectual Property concentration. He received his master’s from the Rutgers Graduate School of Biomedical Sciences and became a registered patent agent prior to entering law school. Want to read more articles like this?  Sign up for our post notification newsletter, here.

Can a Party Refuse to Produce Archival Documents When an Opposing Party Cannot Produce its Own Archival Documents Due to its Lack of an Archive? No!

It may make sense in the eyes of some parties that discovery obligations should be equal. These parties believe that they should not have to do any extra work above and beyond what their adversary is doing to prepare the documents and information that will be turned over in discovery. Relying on this belief, though, in refusing to comply with a discovery obligation, will most likely not be a successful strategy in the courtroom. This very belief is what Blue Coat Systems relied on in the above case. Finjan brought suit against Blue Coat for patent infringement. Finjan requested a number of different documents relating to the case. Specifically, Finjan was looking for emails produced by eight different custodians at Blue Coat. Blue Coat was also requesting emails from eight different custodians at Finjan, as well. On its face, Blue Coat had no issue with Finjan’s request and was willing to comply. However, Blue Coat did choose to pick a fight with Finjan over its having to search through custodial emails from its archival systems. Blue Coat argued it should not have to do this, and it should only have to produce emails from its active systems, because Finjan was not being required to do the same thing. The reason Finjan was not being ordered to produce emails from its own archival systems, though, while Blue Coat was, was because Finjan did not even have an archival system to begin with! Blue Coat argued that if Finjan did not have to go through its archives, then they should not have to do so, either. As much as Blue Coat wanted to complain about Finjan not having to search the archives like they had to do, though, the court did not wholeheartedly buy this as a legitimate reason for not complying with Finjan’s request. The court said that at no point had Blue Coat disputed the relevance of the information Finjan was seeking. Blue Coat was simply “balking” at the idea that its custodians should have to turn over email other than that from its active systems all because Finjan cannot physically produce its own former employees’ emails. The court did not completely dismiss Blue Coat’s argument, though. The court admits that Blue Coat may have had a legitimate beef about having to dig through its archives while Finjan was incapable of doing the same. Nevertheless, “one party’s discovery shortcomings are rarely enough to justify another’s.” Certainly where, as here, the requested documents are relevant to the case (they do mention Finjan, after all), the request is reasonable, and Blue Coat will not be able to use Finjan’s inabilities as a justification for its refusal to produce. The court ultimately compelled Blue Coat to produce all archival emails that mention Finjan from the eight designated custodians. So what is the lesson to be learned from all of this? Well, for starters, if a party does not want to have to take the time and effort to search through its archives, then do not have archives at all! But more importantly, do not use the opposing party’s inabilities and failures to justify your own. Do what has been reasonably requested, or else the judge will just compel you to do it any way and explain her reasoning in a very public, published opinion for all to read. Logan Teisch received his B.A. in Government and Politics from the University of Maryland, College Park in 2012. He is now a student at Seton Hall University School of Law (Class of 2015), focusing his studies in the area of criminal law. Logan’s prior experiences include interning with the Honorable Verna G. Leath in Essex County Superior Court as well as interning with the Essex County Prosecutor’s Office. Want to read more articles like this?  Sign up for our post notification newsletter, here.

Before A Lawsuit Is Filed, Can A Company Be Required To Preserve Evidence? In NY, The Duty Can Be Triggered Even Without A Cause of Action

This case arose against the backdrop of a criminal trial involving a rabbi who was convicted of multiple counts of sexually related crimes against a girl beginning when she was twelve years old. During the rabbi’s trial, the presiding judge made several announcements notifying the audience that photography was stringently forbidden. This prohibition was also displayed on numerous signs in the courthouse and courtroom. Even though these notices were on display, numerous audience members took photographs of the juvenile victim during her testimony. Company Lemon Juice, the plaintiff, and two others, Joseph Fried and Yona Weissman, were arrested for violating the judge’s prohibition on photography. However, Lemon Juice was not sitting with Fried and Weissman in the courtroom, where an officer of the court discovered Fried and Weissman took pictures of the juvenile on their cellular phone. The court officer later discovered a photograph on Twitter of the juvenile victim. The image on Twitter resembled the image he viewed on the cellular phone of Fried and Weissman earlier that day. The Twitter account used to upload the photograph to the internet was in the name of Lemon Juice. The Twitter account also showed a picture of Lemon Juice. Subsequently, Lemon Juice was arrested and charged with second-degree criminal contempt for acting in concert with Fried and Weissman. After fourteen court appearances to defend himself, the charges against Lemon Juice were dismissed after a prosecutorial investigation found that Lemon Juice had no connection to the Twitter account that was the subject of the charges. The background leads to the case that is the subject of this article. After the charges against Lemon Juice were dropped, he sought a court order to compel Twitter “to disclose basic subscriber information, records, internet protocol addresses or similar information sufficient to identify the individual or individuals who owned or operated the subject account and logged into or tweeted on the subject account.” Lemon Juice also sought a court order compelling Twitter to preserve documents containing information relevant to the upload of the picture of the juvenile victim. Lemon Juice is seeking this information in order to secure the identity of the person who uploaded the image so he can name that person in a tort action. An order for a pre-action disclosure to be ordered by a court, the requested information must be sought solely for the purpose of determining who should be named as the defendant. It is not allowable as a fishing expedition to gauge whether a cause of action truly exists. Despite this prohibition on fishing expeditions, a plaintiff need only provide a factual basis to show that a prima facie cause of action exists. These facts will be construed in a light most favorable to plaintiff as well. In this case, Lemon Juice provided a sufficient factual basis to prove a prima facie action for intentional infliction of emotional distress. Additionally, the court addressed a possible argument from the creator of the Twitter account. The argument would be that freedom of speech protects his or her behavior because anonymous speech via the internet is afforded First Amendment protection. In this case however, because Lemon Juice suffered tortious damage, the First Amendment does not protect the unnamed defendant’s speech. The court ordered Twitter to disclose the user information sought for the account pertinent to this motion.       As to the preservation of evidence, the court ruled that Twitter must preserve the documents requested by Lemon Juice. The court stated, “prior to the commencement of an action [in New York state court], disclosure to preserve information may be obtained by court order pursuant to CPLR 3102(c). When a potential plaintiff invokes CPLR 3102(c) for the purpose of preserving information, the existence of a claim need not be demonstrated with certainty.” In this case, Lemon Juice greatly exceeded this threshold to compel preservation because he demonstrated a prima facie cause of action. There are two lessons to be gleaned from this case. The first is that anonymous on internet posting will not necessarily preserve your anonymity. If you post something that potentially constitutes a tort on another individual, the First Amendment will not save you. The more relevant lesson is that the duty to preserve may be triggered even if a plaintiff cannot demonstrate the existence of a claim with certainty. Companies with possible pending litigation can be required to preserve documents and evidence even if a lawsuit has not yet been commenced. Daniel received a B.A. in Criminology and Criminal Justice from The University of Maryland. He will receive his J.D. from Seton Hall University School of Law in 2015. Presently Daniel is serving as a legal intern in Seton Hall’s Juvenile Justice Clinic. After graduation Daniel will clerk for a trial judge in the Superior Court of New Jersey. Want to read more articles like this?  Sign up for our post notification newsletter, here

  • Find an eLesson

  • Register for Post Notifications

    Subscribe to receive updates whenever a new eLesson is published.

    Manage Subscriptions
  • Let Us Blog Your Event!

    eLessons Learned is fast becoming the site of choice for employers, employees, judges, lawyers, and journalists who are interested in learning more about these areas without being intimidated by the complexity of the topic. In fact, organizations and event coordinators often feature eLessons Learned as their official eDiscovery blog. Fill out our simple registration form to have eLessons Learned be the official blog of your organization or event.

    Register Now
  • Recent Praise

    The blog takes a clever approach to [e-discovery]. Each post discusses an e-discovery case that involves an e-discovery mishap, generally by a company employee. It discusses the conduct that constituted the mishap and then offers its ‘e-lesson’ — a suggestion on how to learn from the mistake and avoid it happening to you.

    Robert Ambrogi

    Legal Tech Blogger and creator of LawSites

    Although I may have missed some, yours is the first article that I have seen addressing Zubulake II. It is often the lost opinion amongst the others.

    Laura A. Zubulake

    Plaintiff, Zubulake v. UBS Warburg

    Click here to see more.