UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

51
UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Transcript of UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Page 1: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

UNIVERSITY OF HOUSTONSUMMER III 2009 – 5397 E-DISCOVERY

Produce!

Page 2: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

The E-Discovery Process-Overview

PreservatioPreservationn

CollectionCollection AnalysisAnalysis

DiscoveryDiscovery

PlanPlan

ESIESI

ProcessingProcessing

LegalLegal

ReviewReviewProductionProduction

MeetMeet

&&

ConferConfer

Rule 16Rule 16

SchedulingScheduling

ConferenceConference

PHASE 1PHASE 1

COLLECTIOCOLLECTIONN

& SCOPE& SCOPE

PHASE 2PHASE 2

PLANNING &PLANNING &

NEGOTIATINNEGOTIATINGG

PHASE 3PHASE 3

EXECUTIONEXECUTION

Page 3: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

PHASE 3 Actions & Decisions

1.1. Selection of E-Selection of E-Discovery Discovery Vendor(s)Vendor(s)

2.2. Management of Management of Vendor(s)Vendor(s)

3.3. Analysis of Vendor Analysis of Vendor Reports during Reports during ProcessingProcessing

4.4. Decisions on Decisions on Filtering CriteriaFiltering Criteria

5.5. Negotiate Keyword Negotiate Keyword List & ProcessingList & Processing

6.6. Coordination of Coordination of any Vendor any Vendor TestimonyTestimony

1.1. Develop Review Develop Review PlanPlan

2.2. Single or Multi-Single or Multi-Phase?Phase?

3.3. Contract Attys?Contract Attys?

4.4. Review Review Platform[s]Platform[s]

5.5. Limited Review Limited Review due to Clawback?due to Clawback?

6.6. Prioritize Review Prioritize Review per Rolling per Rolling Production Production AgreementAgreement

7.7. Develop Privilege Develop Privilege Log[s]Log[s]

1.1. Coordinate Coordinate Productions per Productions per “Rolling” “Rolling” AgreementAgreement

2.2. Confirm Confirm AuthenticationAuthentication

3.3. Oversee and Log Oversee and Log ProductionsProductions

4.4. Audit E-Audit E-Discovery Discovery Vendor QA/QC Vendor QA/QC ProcessesProcesses

ESIESI

ProcessingProcessing

LegalLegal

ReviewReviewProductionProduction

Page 4: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

ESI Processing Cost Mgmt Opportunities

1.1. Selection of E-Selection of E-Discovery Discovery Vendor(s)Vendor(s)

2.2. Management of Management of Vendor(s)Vendor(s)

3.3. Analysis of Analysis of Vendor Reports Vendor Reports during during ProcessingProcessing

4.4. Decisions on Decisions on Filtering CriteriaFiltering Criteria

5.5. Negotiate Negotiate Keyword List & Keyword List & ProcessingProcessing

6.6. Coordination of Coordination of any Vendor any Vendor TestimonyTestimony

ESIESI

ProcessingProcessing

Based on the Discovery Plan, vendor selection should consider amount and type[s] of ESI, the type[s] of

processing planned, the time allowed to process it, and the amount of it that is expected to pass the filters to legal

review. To facilitate the process, it is best to have standing Master Agreements with the vendor[s] of choice.

The decision of who will manage the ED process is essentially important. Client-management is always best

from a cost management perspective.

The ability of the vendor to generate reports on the ESI as it is processed [the earlier the better], is essential. Always select vendors who can meet your needs in this regard. Of special importance is keyword “hit reports” that quantify the number and total volume of “hits” for each keyword.

Once quantitative reports are generated by the EDVendor, decisions on filtering criteria can be made. Start with

highly selective criteria and expand as needed, to assure hi responsive rates early to allow production to begin.

This is especially important with keywords, which is why this was negotiated earlier in Phase 2.

To the extent that burden or other arguments to limit processing of ESI are relevant, identify the responsible

party early so preparation can begin.

Page 5: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Legal Review Cost Mgmt Opportunities

1.1. Develop Review Develop Review PlanPlan

2.2. Single or Multi-Single or Multi-Phase?Phase?

3.3. Contract Attys?Contract Attys?

4.4. Review Review Platform[s]Platform[s]

5.5. Limited Review Limited Review due to Clawback?due to Clawback?

6.6. Prioritize Review Prioritize Review per Rolling per Rolling Production Production AgreementAgreement

7.7. Develop Privilege Develop Privilege Log[s]Log[s]

LegalLegal

ReviewReview

As soon as it becomes apparent what kind of

volume of data will make it to legal review, decide how to proceed: Single review with Trial

Counsel, or multi- review with initial

review performed by lower cost alternatives.

If contract attys are selected, several options exist:1] Self-contracted, hourly2] Specialty firm, hourly or unit rate3] All-inclusive fixed price

Selection of review platform is critical. If the file count is high [tens of thousands], conceptual-grouping platforms are proven to reduce cost

significantly.

Based on the perceived sensitivity of the

document collection, consider producing

without legal review, subject to a privilege claw-back agreement.

Focus initial review on the “low-hanging fruit” so production can begin

early, minimizing complaint from the

requesting party. This gives more time to cull

subsequent productions.

Many EDV hosting platforms can auto-produce privilege

logs for files so-coded during review.

Page 6: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Production Cost Mgmt Opportunities

1.1. Coordinate Coordinate Productions per Productions per “Rolling” “Rolling” AgreementAgreement

2.2. Confirm Confirm AuthenticationAuthentication

3.3. Oversee and Log Oversee and Log ProductionsProductions

4.4. Audit E-Audit E-Discovery Discovery Vendor QA/QC Vendor QA/QC ProcessesProcesses

ProductionProductionHaving negotiated the form of production in the Meet and Confer, the ED vendor can generate the

production[s] during normal hours, and not the usual weekend 24/7 panic blitzkrieg, for which

premiun charges apply. This also allows time for proper QA to confirm redactions, privileges, etc.

Having negotiated a protocol for production of native files, the EDV can generate the

production accordingly, along with the cross-reference file with the authentication code [e.g

hash values].

Depending on the size and schedule of the productions, stay vigilant as to the schedule to

avoid last-minute surcharges.

Be sure your EDV is maintaining timely QA on the process. This tends to get behind and can create

delays and last-minute problems.

Page 7: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

D’Onofrio v. SFX Sports Group, Inc.

Rule 34(b) allows the requesting party to specify production format for electronic documents (i.e. native format, tiff or in an online repository).

When the production format is not specified or if the responding party objects to the requested format, the responding party must state its preferred production format.

Page 8: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

D’Onofrio v. SFX Sports Group, Inc.

According to the Rule, the default production format may be either a form (or forms) in which the information is “ordinarily maintained” or in a “reasonably usable” form.

Page 9: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

D’Onofrio v. SFX Sports Group, Inc.

Key Points:

What was the form of the request from the plaintiff?

What’s the relevant language from the Rule?

What was the Court’s reaction?

How would this play out under Texas Rules?

Page 10: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

10

The Rule in Texas

Texas Rule of Civil Procedure 196.4

Requesting party “must specifically request production of electronic or magnetic data and specify the form in which the requesting party wants it produced.” Tex. R. Civ. P. 196.4.

If responding party cannot produce the material in the

form requested after expending reasonable efforts, the party must object. Id.

Finally, if the court orders the responding party to

comply with the request, the court must also order that the requesting party pay the reasonable expenses of any extraordinary steps required to retrieve and produce the information. Id.

Page 11: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

D’Onofrio v. SFX Sports Group, Inc.

Key Points:

What was the form of the request from the plaintiff?

What’s the relevant language from the Rule?

What was the Court’s reaction?

Page 12: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

D’Onofrio v. SFX Sports Group, Inc.

The court concluded plaintiff's instruction referred to physical file cabinets

or folders and that the request could not be read reasonably to include electronic "files."

even if the request were read to refer to electronic files, plaintiff had not specifically requested production of electronic data solely in its original form with accompanying metadata.

The court would not compel production of the business plan with accompanying metadata because that production had not been specifically requested by plaintiff.

Page 13: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Victor Stanley sought a ruling that Creative Pipe had waived the privilege with regard to 165 electronic documents. 

The parties had previously agreed to a joint protocol to search and retrieve relevant ESI responsive to Victor Stanley’s Rule 34 requests.  The protocol contained detailed search and information retrieval instructions, including nearly five pages of keyword/phrase search terms aimed at locating responsive ESI.

©2008 De la Rosa & Chaumette 13

Victor Stanley Inc. v. Creative Pipe Inc.

Page 14: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Early on, Creative Pipe notified the court that individualized privilege review of the responsive ESI would delay production unnecessarily and cause undue expense.  To address this concern, Creative Pipe requested a “clawback agreement.”

Later, after the discovery deadline was extended, Creative Pipe announced a document-by-document privilege review, so no clawback agreement was needed. 

©2008 De la Rosa & Chaumette 14

Victor Stanley Inc. v. Creative Pipe Inc.

Page 15: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

After privileged documents produced, Creative Pipe claimed that the production of any privileged or protected information had been inadvertent and sent privilege logs.

Two phases of Creative Pipe’s privilege review:

A privilege keyword search performed on those ESI files (4.9 gigabytes) that were in text-searchable format. 

The other ESI files (33.7 gigabytes), defense counsel and an individual defendant performed a manual privilege review, BUT “this review was undertaken by reviewing the page titles

of the documents.” ©2008 De la Rosa &

Chaumette 15

Victor Stanley Inc. v. Creative Pipe Inc.

Page 16: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

The Court did not like Creative Pipe’s explanations:

Creative Pipe vague in description of the keywords used for text-searchable review,

No test of the reliability of the keyword search (sampling of the documents determined to be privileged and those that are not).

The Court found a privilege waiver because Creative Pipe failed to take reasonable precautions.

©2008 De la Rosa & Chaumette 16

Victor Stanley Inc. v. Creative Pipe Inc.

Page 17: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

The Sedona Conference suggests:

Practice Point 7.  Parties should expect that their choice of search methodology will need to be explained, either formally or informally, in subsequent legal contexts (including in depositions, evidentiary proceedings, and trials).

©2008 De la Rosa & Chaumette 17

Victor Stanley Inc. v. Creative Pipe Inc.

Page 18: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

The Sedona Conference suggests:

Practice Point 6.  Parties should make a good faith attempt to collaborate on the use of particular search and information retrieval methods, tools and protocols (including as to keywords, concepts, and other types of search parameters).

©2008 De la Rosa & Chaumette 18

Victor Stanley Inc. v. Creative Pipe Inc.

Page 19: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Remember: The court discussed the utility of privilege logs, and the burden for the court that in camera review of disputed documents entails, something “about which the parties and their attorneys often seem to be blissfully unconcerned.” 

©2008 De la Rosa & Chaumette 19

Victor Stanley Inc. v. Creative Pipe Inc.

Page 20: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

United States v. O’Keefe

Key points:

Why is this case under the heading “Should Expert Testimony be Required to Explain to the Trier of Fact How Search Protocols Were Constructed?”

Page 21: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

United States v. O’Keefe

Key points:

Magistrate Judge John M. Facciola ordered the parties to collaborate on production after the co-defendant filed a motion to compel claiming the government failed to meet its discovery obligations. 

Judge Facciola further suggested that any judicial review of search methods may demand the services of an expert witness, observing that lawyers and judges who attempt to determine whether search terms are effective venture "where angels fear to tread."

Page 22: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

For your consideration…

Consider the Boolean negotiation on pp. 236 – 38.

How would you approach a Boolean search?

How do you approach the other side?

Craig Ball on Boolean terms

Page 23: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Williams v. Sprint/United Management

Remember this one?

Page 24: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

When do these rules apply?

What if the case was filed before December 1, 2006? Which rules apply? Why?

Williams v. Sprint/United Management Co.,230 F.R.D. 640 (D. Kan. Sept. 29, 2005).

– Court extensively discusses production of metadata in litigation.– Court explicitly considers:

Sedona Principles for Electronic Document Production. The proposed FRCP changes.

Hopson v. Mayor of Baltimore, 232 F.R.D. 228 (D. Md. Nov. 22, 2005).

Extensive analysis of waiver and privilege in the context of the new rules.

Page 25: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Williams v. Sprint/United Management

Court ordered an employer in an employment discrimination case to restore the metadata it had “scrubbed” or “erased” from Excel spreadsheet files and “unlock” them.

“When the Court orders a party to produce an electronic document in the form in which it is regularly maintained, i.e., in its native format or as an active file, that production must include all metadata . . . .”

Page 26: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Williams v. Sprint/United Management

What if the other side does not ask for it?

What does “all metadata” mean?

How do you avoid that?

Consider file type. Consider which metadata – or embedded data – matters. Ask how the information is to be used.

Page 27: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Wyeth v. Impax Laboratories, Inc.

Impax moved to compel Wyeth to produce electronic data in native format, including metadata, and to produce a document database that was created for purposes of the litigation. 

Court relies on Williams v. Sprint/United Management Co., 230 F.R.D. 640, 646 (D. Kan. 2005) and the District of Delaware Default Standard for e-Discovery. Why is this important?

Page 28: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Wyeth v. Impax Laboratories, Inc.

Conclusion: “emerging standards of electronic discovery appear to articulate a general presumption against the production of metadata.”

No particularized need for the metadata or the document database, and found that Wyeth complied with its discovery obligation by producing image files in TIFF.

Page 29: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Wyeth v. Impax Laboratories, Inc.

Why is this case in the book?

Consideration of the different forms of “metadata.” Case is a bridge to the privilege discussions in a few

weeks. Shows the precedential value given to Sedona in this

area.

Page 30: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Ferron v. Search Cactus, Inc.

Attorney brought an action under the Ohio Consumer Sales Practices Act for unlawful, deceptive spam.

Ferron claimed that the emails he received from Search Cactus were misleading and deceptive, in that they offered “free products” without adequately disclosing the conditions attached to claiming those purported “prizes.”

Page 31: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Ferron v. Search Cactus, Inc.

Search Cactus requested an inspection of Ferron’s computer systems to determine whether the emails and website visits were a legitimate consumer transaction under the statute.

Search Cactus sought to determine “whether Plaintiff’s opening of the emails and any attempts to obtain free merchandise were part of a business designed to profit from email litigation.”

Page 32: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Ferron v. Search Cactus, Inc.

So what were the parties’ approaches?

Ferron sought to limit the forensic inspection to only one small segment of his computers.

Search Cactus argued that complete images of the entire drives were necessary.

Apparently, Search Cactus suspected Ferron of hiding the history in other areas of the drives and of deleting it, or at least trying to.

Page 33: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Ferron v. Search Cactus, Inc.

The court allowed a full forensic examination, because: (1) Ferron had failed to preserve relevant evidence; (2) Ferron had not produced the relevant information;

and (3) Ferron’s computer system was the only place where

the evidence requested was contained

The court recognized Ferron’s concerns regarding confidential and privileged information. For that reason, it protected Ferron’s rights during the computer inspections.

Page 34: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Fed. R. Civ. P. 26(b)(2)(B)

(B) Specific Limitations on Electronically Stored Information. A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C)[.]

Page 35: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

McPeek v. Ashcroft

202 F.R.D. 31 (D.D.C. 2001).Magistrate Judge Facciola & “marginal utility.”

Plaintiff alleges retaliation following his filing an EEOC complaint alleging sexual harassment.

After discovery requests, defendants searched for electronic and paper documents, but plaintiff wanted DOJ to search its backup systems for potentially discoverable information.

Page 36: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

McPeek v. Ashcroft

In order to assess the situation, Court ordered restoration of backup e-mails over a one year period, and "carefully" document the time and expense in doing that search.

Based on the results of that sampling, the parties would be allowed to argue about any further search.

In dicta, an "adverse inference" warning …

Page 37: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Rowe Entertainment v. William Morris

(1) the specificity of the discovery requests;

(2) the likelihood of discovering critical information;

(3) the availability of such information from other sources;

(4) the purposes for which the responding party maintains the requested data;

Page 38: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Rowe Entertainment v. William Morris

(5) the relative benefit to the parties of obtaining the information;

(6) the total cost associated with production;

(7) the relative ability of each party to control costs and its incentive to do so; and

(8) the resources available to each party.

Page 39: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Zubulake I

Court warned that the prevailing cost-shifting analysis from Rowe might favor large corporations when engaged in litigation with private parties, a result which could “undermine the ‘strong public policy favor[ing] resolving disputes on their merits,’ and may ultimately deter the filing of potentially meritorious claims.”

Page 40: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Zubulake I

Factors to determine whether costs should be shifted: a. The extent to which the request is specifically

tailored to discover relevant information; b. The availability of such information from other

sources; c. The total cost of production, compared to the

amount in controversy;

The marginal utility factors…most important of all. SeeMcPeek v. Playboy.

Page 41: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Zubulake I

Factors to determine whether costs should be shifted: d. The total cost of production, compared to the

resources available to each party; e. The relative ability of each party to control

costs and its incentive to do so; f. The importance of the issues at stake in the

litigation; and g. The relative benefits to the parties of obtaining

the information.

Page 42: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Zubulake III

Court examined these factors and ordered the responding party to endure seventy-five percent and the requesting party twenty-five percent of the total estimated cost for restoring and searching the defendant’s e-mail backup tapes throughout discovery.

Page 43: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Wiginton v. CB Richard Ellis, Inc.

Class action complaint – WHY IS THIS IMPORTANT?

Plaintiffs sought discovery of e-mails. What were they looking for? Sexual harassment case.

pornographic material Defendant produced sample, from eleven offices,

of backup tapes, from which Kroll extracted the data and, pursuant to court-defined search terms, found responsive documents.

Page 44: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Wiginton v. CB Richard Ellis, Inc.

Clear that responsive documents on backup tapes.Question becomes whether the cost of producing

would be an "undue burden" justifying cost-shifting. The court modified the Zubulake test by adding a

factor that considers “importance of the requested discovery in resolving the issues of the litigation.”

Therefore, because factors favor cost-shifting, but presumption is that responding party pays for discovery costs, defendant pay 25% and plaintiffs 75% of the costs of production.

Page 45: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Wiginton v. CB Richard Ellis, Inc.

What’s the impact of the new factor? Even in Wiginton?

Why add it?

Page 46: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Application to Facts

Court decides that all documents were to be produced electronically in TIFF format with Optical Character Recognition.

Defendant want the cost of processing the documents should be shifted to the plaintiff, saying the cost of conversion to OCR would likely exceed $200,000 and that “it does not itself seek to use the OCR process, and any extra expense would be incurred on it behalf solely for Plaintiff’s convenience.” 

Page 47: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Application to Facts

What sort of things would you like to know? Estimates from the vendors What types of documents are they? How did they end up as TIFFs? Is it realistic for the Defendant to say “no” to OCR?

Proctor & Gamble Co. v. S.C. Johnson & Son, Inc., 2009 WL 440543 (E.D. Tex. Feb 19, 2009) (court says “no”).

Page 48: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Application to Facts

In this securities litigation, plaintiff sought to compel discovery of backup tapes from all the individual defendants.

The defendants contended that restoring the back-up tapes could cost upwards of $124,000. The court noted “surprisingly” that the parties had neither entered into any electronic discovery protocol nor had they discussed searching backup tapes.

Page 49: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Application to Facts

Court determined without analysis that the backup tapes were not reasonably accessible, but the plaintiff had established “good cause” for further discovery.

Court cited Zubulake in holding that defendant must initially assume cost of searching back-up tapes and prepare an affidavit detailing the results and costs.

Once a partial search is done, the court can then query whether cost-shifting under Zubulake I is appropriate.

In re Veeco Instruments. Inc. Securities Litigation, 2007 WL 983987 (S.D.N.Y. April 2, 2007).

Page 50: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

Application to Facts

In a class action lawsuit, defendant brought a motion to require plaintiffs to pay 50% of the defendant’s third-party vendor electronic discovery costs incurred to date.

Court rejected the motion as inappropriate and untimely, stating that any assertion that sources or electronically stored information are inaccessible or that production is unduly burdensome, justifying cost shifting or sharing, must be brought before the costs are incurred, to give the requesting party and the court an opportunity to consider alternatives.

Cason-Merenda v. Detroit Med. Ctr., 2008 WL 2714239 (E.D. Mich. July 7, 2008).

Page 51: UNIVERSITY OF HOUSTON SUMMER III 2009 – 5397 E-DISCOVERY Produce!

The high level points…

Be specific in what you want and what you have done.

Don’t quickly throw in the towel!

Understand that different media produced differently.

Consider sampling, but validate. (Corollary: Start with e-mail. Produce it first and work on the rest.)

Metadata matters.