Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017

By Mike Hamilton
March 01, 2018

In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.

|

Sometimes Just Sending a Legal Hold Is Enough

Case: New Mexico Oncology and Hematology Consultants, Ltd. v. Presbyterian Healthcare Services (D. N. M. Aug 16, 2017)

Why This Case Is Important

Collecting everything isn't necessary. If your preservation processes are “reasonable” under the circumstances, then simply sending detailed legal hold notices to key custodians may be sufficient.

Case Facts

In this antitrust and RICO dispute between healthcare organizations, the plaintiff moved for spoliation sanctions based on the defendant's legal hold procedures. They had four qualms about the process:

  • Too much employee discretion given to determine relevance
  • Employees were forced to delete or archive potentially relevant emails based on their data retention policies
  • Not enough employees were initially placed on hold: 35 at the outset, but growing to 209 total
  • A server-side hold was put into place for all key custodians

Ruling

  • Rejected Motion Due to Lack of Prejudice. The court rejected most of the plaintiff's arguments due to the lack of evidence to prove prejudice or bad faith.
  • Reasonableness, Not Perfection Required. Upon review, the court found that the plaintiff had a reasonable preservation process, including a detailed legal hold notice, which advised, “When in doubt, preserve” and instructed the first custodians on hold to refer other key custodians.
  • Implement a Server-Side Hold. Again, without evidence that the plaintiff was prejudiced by the defendant for not implementing a server-side hold, the court could not find sanctions. The court did however state, “the best approach is to implement a server-side hold on all digital data utilized by key employees and to later use search algorithms to parse relevance.”

Expert Opinion

“A lot of speculative motions were brought in the past, and unfortunately were granted. Even today I think that parties, particularly those who may not be as familiar with the requirements of the rule [FRCP 37(e)], or who may think that they have a judge who isn't that familiar with the requirements of the rule, will still try to bring these motions to gain leverage in hard fought litigation … and I think it's been very heartening to see there have been a number of decisions that have denied sanctions in speculative situations this year.”

— Gareth Evans, Esq., Co-Chair, e-Discovery Practice Group, Gibson Dunn.

|

Custodian Search for Responsive Data is OK if…

Case: Mirmina v. Genpact LLC (D. Conn. July 27, 2017)

Why This Case Is Important

Counsel-supervised custodian search for responsive data is a defensible process, especially if no factual evidence of foul play is presented.

Case Facts

The plaintiff filed a motion to compel the defendant to conduct an additional search for electronically stored information (ESI). Going outside the agreed e-discovery protocol, the plaintiff was “concerned” that the defendant withheld communications that were responsive. The defendant's concerns centered around letting counsel rely “upon an employee directly involved in the underlying claims of the suit to search her own emails for responsive documents.”

In response, the defendant argued that the search for responsive files was “coordinated and overseen by counsel,” which complies with acceptable preservation practices.

Ruling

  • Plaintiff's Motion Denied. No evidence was given to support the plaintiff's assumption that the defendant “deliberately or by neglect” withheld communications.
  • Steps the Defendant's Counsel Used to Supervise ESI Search. 1) Issued a timely legal hold; 2) Instructed custodians of search parameters; 3) Explained importance of search to custodians; and 4) Gave guidance when custodians had questions around the search.
  • No Evidence of Foul Play. As the court noted by citing several cases, parties cannot rely on speculation to warrant e-discovery orders or sanctions, especially as the defendant offered counsel's sworn representation that all responsive documents were produced.

Expert Opinion

“Good supervision by counsel and really good tracking of that supervision, and the ability to speak to that supervision to the court, can overcome speculation about whether or not your searching has been adequate. It's a pretty commonsense proposition, but supervision and careful tracking of that supervision are really important components of a defensible e-discovery plan.”

— Bree Kelly, Esq., Attorney, K&L Gates, and Editor, EDiscoveryLaw.com

|

The Duty to Preserve Extends to Third Parties

Case: Ronnie Van Zant, Inc. v. Artimus Pyle (S.D.N.Y. Aug 28, 2017)

Why This Case Is Important

With increasing amounts of information stored on various data sources, it's paramount when placing legal holds to consider including third parties who may have relevant data.

Case Facts

In this action for a breach of a consent order involving the famous southern rock band, Lynyrd Skynyrd, the defendant was accused of failing to have a third party, the director of a documentary about the band, preserve relevant text messages when switching to a new phone after the lawsuit commenced.

The defendant argued that they should not be sanctioned for spoliation of the text messages because the director was a contractor, not an employee, and the alleged lost data was outside their custody or control. The court did not agree.

Ruling

  • Preservation Duty Extended to Third Party. Even though the third party was not a party in the case, the court imposed adverse inference sanctions on the defendant for the third party's failure to preserve the text messages.
  • Defendant had “Control” of the Text Messages. Under FRCP 34, a party must produce documents in its “custody, possession, or control.” Based on the “practical ability” test for “control,” the judge ruled that the defendant had the practical ability to ensure the third party's preservation of the text messages.
  • Intent to Deprive Based on Deletion of Texts, But Not Photos. To issue an adverse inference under FRCP 37(e), the judge must find that the offending party acted with an intent to deprive. The basis for this intent stemmed from the fact that the third party did not have the texts but kept photos from the phone, which was “evidence of deliberate behavior that sanctions are intended to prevent.”

Expert Opinion

“There's little to lose anywhere in sending this kind of preservation notice to third parties because if they comply with it, then you've covered yourself and you're not in trouble. If they don't comply with it, you've covered yourself and you're not in trouble, because the fact that you sent the notice and they didn't comply with it proves that the documents weren't within your care, custody or control. I would recommend that practitioners and in-house counsel modify their procedures to identify third parties that might have documents and really be very broad in sending preservation notices to third parties, because usually there's little to lose and you can insulate yourself from these kind of spoliation claims.”

— David Cohen, Esq., Head of E-Discovery Group, Reed Smith LLP

|

Preservation Miscue Leads to E-Discovery Trainwreck

Case: Moody v. CSX Transp., Inc. (W.D.N.Y. Sep 21, 2017)

Why This Case Is Important

If you fail to put in place policies and procedures for taking “reasonable steps” to ensure the proper preservation of relevant data, then you're leaving yourself open to spoliation sanctions under Rule 37(e).

Case Facts

In this case involving a railway accident, data from the involved train's black box recorder was downloaded to a company laptop. According to the defendant's policy that downloaded data should have been backed up to a central data repository.

But in the four years between the accident and the filing of the complaint, the company never transferred the data and the laptop crashed. Based on this loss of data, the plaintiff moved for spoliation sanctions, claiming the defendant did not take “reasonable steps” to preserve the lost electronic data.

Ruling

  • “Reasonable Steps” Not Taken. The importance of the lost data, the severity of the incident, the likelihood of litigation and the sophistication of the defendant's IT infrastructure, all taken into consideration, made the court rule that the defendant did not use “reasonable steps” to preserve the relevant data.
  • Adverse Jury Instruction Awarded. Since the defendant did not take “reasonable steps” to preserve, the court ruled that FRCP 37(e) spoliation sanctions may apply. Based on the importance of the evidence and the egregious conduct that led to the spoliation activity, the court issued an adverse jury instruction against the defendant.
  • Proof Required. The court noted that the defendant, or anyone who has lost relevant data, must be prepared to offer proof that it took reasonable steps to avoid the loss. In this case, the defendant did not offer proof.

Expert Opinion

“Number one, have a policy. Number two, have a way to communicate it effectively. Also have a way to follow up on it … I would think you also have to monitor the hold; you have to be able to discipline people who fail in a hold.”

— Ronald Hedges, U.S. Magistrate Judge (Ret.), District of New Jersey

|

Conclusions

Several decisions from recent months have served to clarify the broad contours of reasonable, defensible preservation policies:

  • Send detailed legal hold notices to key custodians.
  • Supervise their preservation efforts — and document that supervision.
  • Speculative arguments about spoliation will not convince the court without evidence, especially if reasonable preservation policies are in place.
  • When in doubt, cast a broad net with your legal hold notices.
  • However, the best policies in the world won't matter if you don't follow them.

*****
Mike Hamilton is the Director of E-Discovery Programs at Exterro. With a legal and business background, Hamilton is experienced and passionate about creating thoughtful, out-of-the-box educational resources that help keep legal teams interested and on top of emerging need to know e-discovery issues.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.