Court Denies Sanctions for Failure to Preserve Instant Messages

Court Denies Sanctions for Failure to Preserve Instant Messages

OCE North America v. Brazeau, 2010 U.S. Dist. LEXIS 25523 (N.D. Ill. Mar. 18, 2010)

Plaintiff sought to close an evidentiary gap in its trade secret case against defendant by filing a motion for sanctions and an adverse inference based on defendant’s admitted failure to save his instant messages. The court found that defendant had used his employer’s instant messaging system and did not save the messages until well after suit was filed. “Thus, the evidence shows that defendant had, and breached, a duty to preserve those messages.” Id. at *18.

However, the court found that defendant did not act in bad faith. First, defendant testified and claimed that there was no way to save his instant messages. Next he testified that the messages were in fact saved on company servers, just as emails were saved and once he learned that he could change default settings to save the messages, he did so. The Court ruled that because Plaintiff had not offered any evidence that defendant had knowledge that the Instant Messages were not being saved, plaintiff had failed to “prove that defendant’s actions were intentional, reckless or unreasonable.” Id.

In addition, an adverse inference was inappropriate because the existing 55,000 pages of documents produced by producer indicated that plaintiff had suffered little harm. The court stated that the evidence provided “scant evidence of misappropriation.” Therefore, “[g]iven the circumstances, it would be unreasonable…to infer that the missing messages ‘contained the ‘smoking gun’ . . . evidence’ of misappropriation.” Id. at *19.

 

Specificity in Unduly Burdensome ESI Production Motions

Specificity in Unduly Burdensome ESI Production Motions

Cartel Asset Management v. Ocwen Financial Corp., 2010 U.S. Dist. LEXIS 17857 (D. Colo. Feb. 8, 2010)

The dispute involved a misapropriation of trade secrets, breach of contract and fraud claims and at the conclusion of the trial, the jury found for Cartel and against Defendant Ocwen Federal Bank FSB awarding compensatory damages of $ 4,900,000 and punitive damages of $ 3,900,000. The jury also found in favor of Cartel and against Defendant Ocwen Technology Xchange on the claims of breach of contract and fraud, and awarded nominal damages of $ 1 and actual and punitive damages of $ 520,000, respectively.

The District Court Judge, Judge Figa ordered a new trial on the issue of damages because “There was no proper nexus between the amounts awarded and the credible evidence in the case as to damages consistent with the three claims at issue.”

Discovery was reopened as to the issue of damages and Defendants objected to several of Plaintiffs’ interrogatories and requests for production on the grounds that the ESI sought was not reasonably accessible because of undue burden or cost. The court noted that Defendants bore the burden of persuasion, which “cannot be sustained with bald generalizations.” Producers must “present details sufficient to allow the requesting party to evaluate the costs and benefits of searching and producing the identified sources.” Id. at *44.

Defendant’s SVP of Sales and Marketing was responsible for gathering responsive information and claimed that “the process of producing responsive information ‘would affect our profitability and ability to serve our clients.’” Id. at *46. The court analogized this statement as “the e-discovery equivalent of an unsubstantiated claim that the ‘sky is falling.’” Id. The declarant’s statement lacked “specific information indicating how the Ocwen Defendants store electronic information, the number of back-up or archival systems that would have to be searched in the course of responding to Plaintiff’s Second Requests, or Defendants’ capability to retrieve information stored in those back-up or archival systems.” Id. at *45.

Read more

What is Predictive Coding?

What is Predictive Coding?

Moore v. Publicis Groupe, No. 11 Civ. 1279 (ALC)(AJP), 2012 U.S. Dist LEXIS 23350 (S.D.N.Y. Feb. 24, 2012)

Magistrate Judge Peck had previously written an article advocating the use of predictive coding in the appropriate case, but had observed that many attorneys were reluctant to use the technology absent a judicial opinion approving its use. In Moore, Judge Peck approved its use.

The case involved a suit by plaintiff female employees of defendant advertising agency, alleging gender discrimination in pay and promotion practices, as well as unfair terminations, demotions and job reassignments during a corporate reorganization. Although plaintiffs sought to bring some claims as a “collective action”, they had not made any motions to that effect.

At the initial discovery conference, defendant MSL indicated that the parties were discussing use of predictive coding to cull down the over three million electronic documents, but plaintiffs had concerns over its use. The court rejected MSL’s early proposal to review only the top 40,000 documents after the computer had been fully trained, noting that total production would depend upon what the statistics revealed for the results.

After some disputes regarding custodians, MSL proposed to phase the discovery, and complete the first phase before beginning the second. Noting plaintiffs’ concerns regarding sufficient time to complete discovery, the court agreed to extend the deadline in order to pursue the phased approach. Accordingly, the court agreed to delay utilization of certain ESI sources to the second phase to give the plaintiffs time to provide more information to the court regarding those data sources.

The parties agreed to take a random sample of the entire email collection at the 95% confidence level to provide a “seed set” of 2,399 documents to train the software. The review would be conducted by senior attorneys. MSL agreed to provide the documents to plaintiffs, who could add two more sets of issue tags, which would be incorporated into the system coding. Four thousand additional documents would be generated through keyword searches from both defendants and plaintiffs, and all non-privileged documents comprising the seed set would be provided to plaintiffs, whether relevant or not.

The court agreed to seven rounds of iteration; i.e. in each round, 500 documents would be reviewed to determine whether the computer was returning relevant documents. After the seventh round, a random sample (2,399) of document discards would be reviewed to insure that the discards were, in fact, not relevant. The court reserved the right to order additional iterative rounds if plaintiffs objected to the results.

The court then discussed several objections by plaintiffs to its earlier rulings. First, plaintiffs objected that the court’s acceptance of predictive coding allowed defendants to escape certification under Rule 26(g) that their clients’ document production was “complete” and “correct”. The court responded that no attorney could certify that in a document set involving over three million emails that their production was “complete;” however, the rule did not require that. The Rule 26(g)(1)(A) certification applies only “with respect to a disclosure,” which actually applied to Rule 26(a)(1) disclosures involving such information as witnesses or exhibits used to support claims or defenses. Rule 26(g)(1)(B) certifications apply to discovery responses, and did not require completeness, but incorporated the Rule 26(b)(2)(C) proportionality principle.

Plaintiffs’ objection that the court’s acceptance of predictive coding was contrary to Evidence Rule 702 was misplaced, as the rule related to admissibility of evidence at trial, not the process on how documents were searched for and found during discovery.

Plaintiffs’ concerns about the reliability of predictive coding were premature. The court noted that such determinations were not possible until the process was actually run. Proportionality concerns could not be addressed until the number of relevant documents was determined, the nature of the results was evaluated (would highly relevant “smoking guns” be found), or plaintiffs decided whether to seek class certification.

In discussing some lessons for the future, the court noted the results of several studies and projects demonstrating the fallacy that manual review of documents was the “gold standard,” noting the greater accuracy and efficiency of computer-assisted review. Issues with keyword searching were noted—they tended to be over-inclusive and not very effective. The court concluded that computer assisted coding should be used in appropriate cases.

The court also noted the parties’ agreement to use predictive coding in the instant case was an important factor in the court’s decision to allow it, as well as the defendants’ transparency, which the court advocated that parties in future cases should at least discuss.

Other observations made by the court included the inability of determining when review and production could stop until the predictive coding computer had been trained and the results quality control verified. In addition, staging of discovery by starting with sources of data most likely to be relevant is a means of controlling discovery costs, and judges should be willing to grant discovery deadline extensions if additional stages were necessary. Counsel should also utilize their clients’ knowledge about the opposing parties’ systems (if the case involves employment disputes, or cases in which the parties had had extensive knowledge of each other). Finally, the court found it helpful to have the parties’ e-discovery vendors present when ESI issues were discussed.

The court concluded that “computer-assisted review is an available tool and should be seriously considered for use in large-data-volume cases where it may save the producing party (or both parties) significant amounts of legal fees in document review.”

Judge Orders Forensic Examination of ATTORNEY’s hard drive

Judge Orders Forensic Examination of ATTORNEY’s hard drive

Commercial Law Corp. v. FDIC, No. 10-13275, 2012 U.S. Dist. LEXIS 51437 (E.D. Mich. Apr. 12, 2012)

The Plaintiffs in the above captioned case were attorneys attempting to recover attorney’s fees for services rendered to a bank before the bank was taken over by the FDIC in receivorship. Plaintiff asserted that it had valid liens on two branches of the bank, and that documents relating to these liens were executed by the bank on November 1, 2009, five days before the bank went into receivership.

Plaintiff had sent an email in January 2010 to the bank’s board of directors containing draft lien documents. This email had been produced in discovery, and the attachments were not signed by either plaintiff or the bank’s directors.

Defendant contended that it had reason to believe that the lien documents were prepared in January, 2010, after the bank had gone into receivership, and sought a forensic image of the plaintiff’s hard drive to determine when the documents were created. The magistrate judge granted defendant’s motion to compel plaintiff to produce the forensic image, setting forth detailed instructions on the process in order to protect plaintiff’s privileged files.

The district court rejected plaintiff’s arguments that a finding of actual fraud was necessary in order to compel the forensic search. The court stated that “[i]f the Court had before it ‘actual proof of an alleged fraud,’ as Plaintiff contends is required for the Court to grant the computer inspection, the forensic search of Plaintiff’s computer would serve no purpose.” Nevertheless, “extraordinary circumstances” existed which justified the forensic search.

The date that the Plaintiff executed the lien was “clearly relevant to a defense against Plaintiff’s attorney lien claim.” Rule 26’s limitation on the discovery of nonprivileged material was followed by the magistrate’s detailed instructions which were designed to protect the privileged material. The request for the image was based on more that a mere “hunch.” The FDIC had reason to believe that the documents were created at a later date and then backdated.

The fact that defendant had not originally requested metadata in its initial discovery requests was not dispositive, as defendant did not learn of the existence of the January email until it deposed the recipient of the email, well after the submission of the initial discovery requests.

The district court accordingly overruled plaintiff’s objections to the magistrate’s order.

Manufacturing Your Own Evidence: Lessons Learned

Manufacturing Your Own Evidence: Lessons Learned

In Paulina Connery v. Generations Family Medicine, P.C., et al, Plaintiff allegedly changed the bodies of emails sent from Defendants to Plaintiff and used the emails as evidence to support her claim. Plaintiff sued defendant under Title VII of the Civil Rights Act for sexual harrassment as well as Defendants’ retaliation for Plaintiff threatening to file a charge with EEOC.

One of the bodies of the emails Plaintiff supplied to Defendant in paper format is an instruction from the Defendant’s practice administrator to Plaintiff “not to discuss your employment with employees here at GFP or EHS also not to contact EEOC or any outside party”. Defendants’ alleged that the email was falsified and provided analysis from an independent forensic analyst that confirmed their suspicion. Based on the expert’s affidavit, it appears that Plaintiff changed the body of the message when she forwarded it to her personal email account to make it seem as if the practice administrator sent the damaging email. While it is difficult to change the body of a sent email without a lot of computer knowledge, it is very easy to edit the body of an email that is being forwarded. In the Connery case, the forensic expert located the original email that was used as the basis of the forwarded message and determined that it did not mention EEOC at all.

A second email presented by plaintiff in paper format and sent from one of the male Defendants to the Plaintiff states “I was told that you and Bao have your “approach” with one another after hours. I am just kidding around.” The email chain continues with plaintiff responding, “On a personal note please – please STOP!!!!!! helping/creating/talking these gossip rumors about Dr. (name ommitted) and I are having an affair, staying late after work or anything that feed the gossip fire at our office.” Once again the email was a forwarded email and Defendants expert determined that the original email used as a basis for the forwarded email contained no such language.

Defendants requested the Court order forensic analysis of Plaintiff’s computer systems to determine the authenticity of the emails as well as sanctions for intentional falsification of evidence. The Court dismissed the sanctions motion as moot because the Court dismissed the entire case on Summary Judgment.

In Victor Stanley v. Creative Pipe, 2010 WL 3530097 (D. MD. Sept. 9, 2010), Judge Grimm put together a chart of spoliation sanctions organized by judicial circuit which details the different levels of sanctions that are applicable in spoliation cases. Judge Grimm discusses three types of sanctions for spoliation behavior including sanctions in general, dispositive santions, and adverse inference instructions. “Sanctions in general” refers to imposing monetary costs on a participant that created unnecessary court costs for not playing by discovery rules. Adverse inference sanctions refers to a presumption that the evidence that was destroyed was both relevant and damaging to the spoliator. Dispositive sanctions allow a judge to dismiss the entire case.

Judge Grimm’s chart is unique in outlining when and how severe the sanctions should be applied in different cases. In order for the Court to apply dispositive sanctions ”the court must be able to conclude either (1) that the spoliator’s conduct was so egregious as to amount to a forfeiture of his claim, or (2) that the effect of the spoliator’s conduct was so prejudicial that it substantially denied the defendant the ability to defend the claim.” Silvestri v. Gen. motors Corp., 271 F.3d 583, 593 (4th Cir. 2001).

In Paulina Connery, the Court avoided the issue of dispositive motions for spoliation by ruling for the Defendants on the merits.