Saniefar v. Moore et al

Filing 142

ORDER REGARDING PRIVILEGE LOG signed by Magistrate Judge Barbara A. McAuliffe on 04/23/2019. IT IS HEREBY ORDERED as follows: Within thirty (30) days from the date of this Order, Defendants shall produce all non-privileged all law firm e-mails and r elated documents regarding Plaintiff's two underlying ADA lawsuits, along with a detailed privilege log for all such e-mails for which they claim attorney-client or work product protection. The privilege log must minimally contain the following information: (1) the nature of the document or communication; (2) the date of the document or communication; (3) its source; (4) the intended recipient; (5) each individual or entity that received it; (6) the purpose for which it was prepared; (7) th e nature of the privilege asserted; and (8) sufficient facts to allow the Court to assess whether the document or communication falls within the privilege. The Court sets a telephonic status conference regarding discovery on May 30, 2019, at 10:0 0 AM in Courtroom 8 (BAM) before the undersigned. The parties may appear at the conference with each party using the following dial-in number and access code: dial-in number 1-877-411-9748; access code 3190866. Failure to comply with this order may result in the imposition of sanctions, including evidentiary sanctions. (Gonzales, V)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 FOR THE EASTERN DISTRICT OF CALIFORNIA 10 11 FATEMEH SANIEFAR, 12 13 14 15 Plaintiff, v. Case No. 1:17-cv-00823-LJO-BAM ORDER REGARDING PRIVILEGE LOG (Doc. No. 135) RONALD D. MOORE, et al., Defendants. 16 17 Currently pending before the Court is Defendants’ request to produce a categorical privilege 18 log. The request originally was submitted to the Court through its informal discovery dispute 19 resolution procedure. However, following an informal conference with the parties on March 29, 20 2019, the Court determined that Defendants’ request was not amenable to informal resolution, and 21 set the matter for hearing on April 19, 2019. (Doc. No. 135.) 22 On April 12, 2019, Defendants filed their brief asserting that a document-by-document 23 privilege log is unduly burdensome for the requests at issue, which are limited to email 24 communications, and they should be permitted to submit a “categorical” privilege log for internal 25 law firm communications. (Doc. No. 137.) 26 contending that the nature of this action requires a detailed privilege log. (Doc. No. 138.) Plaintiff also submitted a brief in opposition, 27 Having considered the briefs and record on file, the Court found the matter capable of 28 resolution without oral argument. Therefore, the hearing set for April 19, 2019, was vacated, and 1 1 the matter submitted on the papers pursuant to Local Rule 230(g). For the reasons discussed below, 2 Defendants’ request to submit a categorical privilege log shall be DENIED. 3 I. Background 4 Plaintiff brings this action under the Racketeer Influenced and Corrupt Organizations Act 5 (“RICO”), 18 U.S.C. § 1961, against Defendants Ronald D. Moore, Tanya E. Moore, Kenneth 6 Randolph (“Randy”) Moore, Marejka Sacks, Elmer Leroy Falk, Zachary M. Best, Moore Law Firm, 7 Mission Law Firm, Geoshua Levinson, Rick D. Moore, West Coast CASp and ADA Services 8 (“West Coast CASp”), Ronny Loreto and Does 1-100. Plaintiff’s action stems from allegations 9 that Defendants are each part of a criminal enterprise that uses fraudulent Americans with 10 Disabilities Act (“ADA”) actions, predicated on false allegations of disability, injury and standing, 11 to collect quick settlements from California businesses and citizens. Plaintiff alleges that the 12 scheme is accomplished through predicate acts of mail fraud and wire fraud.1 13 On March 1, 2019, Plaintiff filed a motion to compel Defendants to provide supplemental 14 responses, documents and a privilege log in response to Plaintiff’s Request for Production of 15 Documents, Set One. (Doc. No. 119.) 16 On March 18, 2019, with the assistance of the parties’ letter briefs, the Court held an 17 informal discovery dispute conference to address issues raised by the motion to compel. As to the 18 production of documents, Plaintiff complained that Defendants had produced only a handful of 19 documents and had asserted attorney-client privilege or work product protection for the remainder 20 of the requested documents but had failed to produce a privilege log. Plaintiff also asserted that 21 any protection for attorney-client privilege or attorney-work product had been waived based on the 22 crime fraud exception, and Defendants should be ordered to produce the requested documents. 23 Defendants countered that Plaintiff had failed to establish or explain how the crime fraud exception 24 applied to any of the ADA cases for which Plaintiff sought the production of documents. 25 Defendants also claimed that Plaintiff's requests were overbroad, burdensome and harassing as they 26 27 28 1 To state a claim for mail and wire fraud, a plaintiff must establish, in addition to the other elements of a RICO claim, “(1) a scheme or artifice devised with (2) the specific intent to defraud and (3) use of the United States mail or interstate telephone wires in furtherance thereof.” Orr v. Bank of Am., 285 F.3d 764, 782 (9th Cir. 2002). 2 1 sought production of all documents and communications ever exchanged between a law firm, its 2 clients and its staff regarding approximately 250 to 1,400 plus ADA lawsuits. Plaintiff clarified at 3 the conference that the initial requests had been narrowed to the 250 cases prosecuted by Ronald 4 Moore. After considering the parties’ arguments, the Court continued the hearing on the motion to 5 compel, and directed the parties to meet and confer on the following issues: (1) narrowing the 6 scope of Plaintiff's document requests; (2) Defendants’ possible rolling production of a privilege 7 log; (3) the terms of a protective order; (4) whether witnesses and evidence would be presented at 8 the hearing regarding the crime-fraud exception; and (5) preparation of a joint statement re 9 discovery disagreement. (Doc. No. 128.) 10 Following the conference, in an effort to limit the scope of the requests, Plaintiff provided 11 Defendants with a tentative list of proposed categories of documents related to two Moore v. 12 Saniefar matters filed by Ronald Moore against Plaintiff in 2014 and 2017 (“Saniefar ADA cases”). 13 (Doc. 138-2, Declaration of Moji Saniefar at ¶ 10 and Ex. C.) 14 Nevertheless, during the meet and confer process in advance of the hearing, the parties were 15 unable to resolve issues regarding the reduced scope of Plaintiff’s discovery requests and the scope 16 and form of Defendants’ privilege log. Therefore, on March 29, 2019, the Court held an informal 17 discovery dispute conference. At the conference, Plaintiff affirmed that the dispute before the Court 18 was limited to the privilege log for the two prior Saniefar ADA cases. Plaintiff asserted that a 19 privilege log for the Saniefar ADA cases was necessary to assist in preparation of any motion to 20 compel based on the crime-fraud exception. Defendants indicated that even as limited to the 21 Saniefar ADA cases, there were approximately 8,000 e-mail documents for which creating a 22 privilege log would be overburdensome. Because the issue of Defendants' privilege log was not 23 amenable to informal resolution based on the parties’ limited letter briefs and arguments, the Court 24 set the matter for hearing. In advance of the hearing, the Court directed Plaintiff to provide search 25 terms to narrow down the 8,000 e-mails. The Court also directed the parties to submit concise 26 briefs identifying the narrowed requests for production at issue, the search terms provided, the 27 resulting number of responsive documents, the scope and form of the privilege log contemplated 28 by Federal Rule of Civil Procedure 26(b)(5), and the burden, if any, of preparing a document-by3 1 document privilege log. Additionally, the Court vacated the hearing on the pending motion to 2 compel (Doc. No. 135.) 3 On April 12, 2019, the parties submitted their briefing. (Doc. Nos. 137, 138.) The parties 4 dispute the scope and form of the privilege log for law firm e-mails and related documents regarding 5 the two underlying ADA cases Defendants prosecuted against Plaintiff in 2014 and 2017.2 6 Defendants assert that creating “a ‘document-by-document’ privilege log for thousands upon 7 thousands of law firm e-mails and related documents” is overly burdensome. (Doc. No. 137 at 2.) 8 Defendants therefore contend that they should be permitted to submit a categorical privilege log. 9 In contrast, Plaintiff asserts that a document-by-document privilege log is required under Federal 10 Rule of Civil Procedure 26(b)(5) because of the nature of this RICO action, which concerns 11 fraudulent and racketeering conduct committed directly by the attorney defendants and their 12 accomplices in providing legal services. 13 A. (Doc. No. 138 at 5.) Defendants’ Position 14 As background, Defendants explain that in an effort to compromise, they recently provided 15 Plaintiff with a 425 item “document-by-document” privilege log with respect to “case file” 16 documents, and they also produced 20,000 pages of non-privileged documents. (Doc. No. 137 at 17 2.) However, Defendants report that there are approximately 7,500 other documents referred to as 18 “e-mails” (i.e., electronic communications, attachments or other documents) for which Defendants 19 claim that preparing a detailed privilege log would be unreasonable and overly burdensome. 20 Defendants also note that while Plaintiff provided proposed search terms to narrow the responsive 21 documents, those terms triggered 96% of the original documents. Defendants therefore believe 22 they should be permitted to create, for all internal law firm e-mails, a categorical privilege log 23 which identifies the number of documents withheld, the date ranges for the communications, and a 24 declaration indicating that the e-mails were exchanged between law firm employees in connection 25 the two underlying ADA actions. Defendants also are willing to provide a “document-by- 26 document” privilege log for “email” communications with any non-employees, including with the 27 28 2 Plaintiff has reserved her right to bring additional motions as to other requests that have been outstanding since October 2018. 4 1 firm’s client Ronald Moore, third party investigators and experts. (Id. at 9.) 2 In proposing the categorical privilege log for all internal law firm e-mails, Defendants argue 3 that a “document-by-document” privilege log is overly burdensome and is not required by Federal 4 Rule of Civil Procedure 26(b)(5). Defendants also argue that Plaintiff has not established a 5 reasonable likelihood that the crime-fraud exception applies to allow for in camera review of any 6 privileged documents. Instead, Defendants claim that the request for a document-by-document 7 privilege log is an unfocused fishing expedition that Defendants should not be forced to finance. Plaintiff’s Position 8 B. 9 Plaintiff concedes that Defendants have produced a privilege log for the 2,000 “case files.”3 10 However, Plaintiff points out that these files ultimately contained only 425 privileged documents, 11 not the 2,000 privileged documents as was previously claimed by Defendants to argue burden. 12 Plaintiff also points out that Defendants not only have failed to produce the non-privileged “case 13 files” (presumably, approximately 1,575 documents) as of April 12, but also failed to produce these 14 non-privileged documents four months ago in response to Plaintiff’s discovery requests.4 15 With regard to the approximately 7,500-8,000 “e-mails,” Plaintiff confirms submission of 16 search terms to narrow the scope and volume of privileged e-mails. However, when Defendants 17 were asked to disclose the number of privileged e-mails, they were unable to do so, claiming that 18 not all, but most of the e-mails would be privileged, and an exact amount would not be known until 19 the review was completed. (Doc. No. 138 at 4.) Plaintiff complains that although Defendants 20 received Plaintiff’s document requests in October 2018, they had not engaged in a meaningful 21 review of documents until after Plaintiff filed her motion to compel and the parties participated in 22 discovery conferences with the Court. 23 As to the scope of the privilege log, Plaintiff contends that the nature of this case requires a 24 detailed privilege log, not a categorical log. Plaintiff acknowledges that the bulk of documents 25 requested from Defendants will necessarily include privileged and work-product material because 26 3 27 28 Plaintiff variously refers to these documents as “client files” or “case files.” For ease of understanding, the Court refers to these documents as “case files.” 4 If Defendants have not already done so, Defendants shall produce the non-privileged documents from the “case files” within seven (7) days of the date of this Order. 5 1 the mail and wire fraud claims are directed at two law firms and its lawyers, investigators and legal 2 staff in the prosecution of fraudulent ADA claims. Plaintiff contends, however, that lawyers should 3 not be permitted to use the attorney-client privilege and work product doctrine to shield their 4 allegedly criminal conduct, noting that the crime-fraud exception allows for a waiver of such 5 protection. Plaintiff asserts that, as the proponent of the exception, she has no access to privileged 6 material, making the ability to review a detailed privilege log critical in order to challenge any 7 asserted privilege or protection. 8 II. Legal Standard 9 Rule 26(b)(5) of the Federal Rules of Civil Procedure provides that when a party withholds 10 information otherwise discoverable under the rules by claiming that it is privileged or subject to 11 protection as trial preparation material, the party must: “(i) expressly make the claim; and (ii) 12 describe the nature of the documents, communications, or tangible things not produced or 13 disclosed—and do so in a manner that, without revealing information itself privileged or protected, 14 will enable other parties to assess the claim.” Fed. R. Civ. P. 26(b)(5). 15 Rule 26(b)(5) does not expressly require the production of a “document-by-document” 16 privilege log. See Patriot Rail Corp. v. Sierra Railroad Company, 2016 WL 1213015, at *1 (E.D. 17 Cal. Mar. 20, 2016). Rather, as the Advisory Committee commented: 18 19 20 21 The rule does not attempt to define for each case what information must be provided when a party asserts a claim of privilege or work product protection. Details concerning time, persons, general subject matter, etc., may be appropriate if only a few items are withheld, but may be unduly burdensome when voluminous documents are claimed to be privileged or protected, particularly if the items can be described by categories. Fed. R. Civ. P. 26, Advisory Committee Notes to 1993 Amendments. However, the Ninth Circuit 22 has recognized that one method of expressly claiming attorney-client privilege or work product 23 protection is a document-by-document privilege log. See In re Grand Jury Investigation, 974 F.2d 24 1068, 1071 (9th Cir.1992) (finding that one of the means to sufficiently establish the attorney-client 25 privilege is a privilege log identifying for each document the following information: “(a) the 26 attorney and client involved, (b) the nature of the document, (c) all persons or entities shown on the 27 document to have received or sent the document, (d) all persons or entities known to have been 28 6 1 furnished the document or informed of its substance, and (e) the date the document was generated, 2 prepared, or dated”). Blanket assertions of the attorney-client privilege are “extremely disfavored.” 3 Clarke v. Am. Commerce Nat. Bank, 974 F.2d 127, 129 (9th Cir. 1992). Rather, “[t]he privilege 4 must ordinarily be raised as to each record sought to allow the court to rule with specificity” Id.; 5 see also United States v. El Paso Co., 682 F.2d 530, 541–42 (5th Cir.1982) (attempt to invoke 6 privilege rejected, due in part to the failure to “particularize its assertion of the privilege” with 7 respect to each specific document), cert. denied, 466 U.S. 944, 104 S.Ct. 1927, 80 L.Ed.2d 473 8 (1984). 9 III. Discussion 10 As indicated above, Defendants contend that creating a document-by-document privilege 11 log for internal law firm e-mails collected from individual law firm employees, including Tanya 12 Moore, Zachary Best, Marejka Sacks, Whitney Law, David Guthrie, Isaac Medrano, and Jessica 13 Mendoza, is “an extremely time-consuming process” and is “unreasonable and overly 14 burdensome.” (Doc. No. 137 at 9.) Defendants further contend that nothing in Rule 26(b)(5) 15 requires a line-by-line privilege log, particularly where it would be “unduly burdensome and 16 inappropriate.” (Id. at 7.) 17 Defendants have not established to the Court’s satisfaction that creating a document-by- 18 document privilege log would be unduly burdensome. Although Defendants have identified 19 approximately 7,500 responsive documents, they do not provide any information as to how many 20 of those documents are purportedly protected by the attorney-client privilege or work product 21 doctrine and would have to be included in a privilege log. Indeed, there is no assertion from 22 Defendants that all 7,500 of the documents are protected or that they have completed even a cursory 23 review of the documents to assess such privilege or protection. 24 Defendants have relied heavily on In re Imperial Corp. of Am. v. Shields, 174 F.R.D. 475 25 (S.D. Cal. 1997) (“Shields”) to suggest that the court should not require them to produce a 26 document-by-document privilege log and they instead should be allowed to create a categorical 27 privilege log. (Doc. No. 137 at 7-8.) The Court does not find Defendants’ reliance on Shields 28 persuasive. In Shields, the district court found that the creation of a document-by-document 7 1 privilege log of documents to be “unreasonable and overly burdensome” because the case involved 2 multiple parties (approximately 50) and law firms (approximately 20) and “hundreds of thousands, 3 if not millions, of documents.” Id. at 478-79. The burdensome nature of discovery in Shields is 4 not presented here, where the document requests have been narrowed in scope, potentially resulting 5 in only a few thousand documents subject to a claimed privilege, not the “hundreds of thousands” 6 or “millions” contemplated in Shields. Additionally, as Plaintiff points out, Shields did not involve 7 the same type or number of defendants or the same allegations of a RICO enterprise that included 8 law firm defendants charged with mail and wire fraud. Importantly, even the Shields court 9 recognized that a document-by-document privilege log “has been, undoubtedly will, and should 10 remain, the traditional format.” Id. at 478. 11 Defendants also have claimed that a categorical privilege log should be permitted because 12 Plaintiff has not established a reasonable likelihood that the crime-fraud exception applies in order 13 to allow for in camera review. (Doc. No. 137 at 4-5.) Defendants argument, suggesting that 14 Plaintiff should have presented evidence that the crime-fraud exception applies, misses the mark. 15 (Id. at 5 ) (“Yet, Plaintiff should not have filed this lawsuit unless she already had evidence that the 16 crime-fraud exception applies since it is allegedly a key component of her case.”). In United States 17 v. Zolin, 491 U.S. 554, 565 (1989), the Supreme Court held that in camera review of privileged 18 information may be used to establish whether the crime-fraud exception applies. The Court set forth 19 a two-step analysis for determining whether in camera review is appropriate. First, there must be a 20 showing of a factual basis adequate to support a good faith belief by a reasonable person that in 21 camera review may reveal evidence to establish that the crime-fraud exception applies. Id. at 572. 22 If this showing is made, then the district court has the discretion to conduct an in camera review. 23 Id. Contrary to Plaintiff’s suggestion, a prima facie showing of crime-fraud is not required before 24 an in camera inspection is appropriate. In re Grand Jury Investigation, 974 F.2d at 1073 (citations 25 omitted). Rather, as the Ninth Circuit has clarified, “Zolin requires only a factual showing sufficient 26 to support a reasonable, good-faith belief that review of the privileged documents ‘may reveal 27 evidence to establish the claim that the crime fraud exception applies.’” Id. (emphasis in original). 28 At this juncture, the absence of a privilege log—categorical or otherwise—renders it 8 1 impossible for Plaintiff to request that the Court conduct an in camera review of any documents 2 for which a privilege or protection is asserted. Moreover, courts and parties addressing the crime- 3 fraud exception generally have required a detailed privilege log to assist in review. See, e.g., Tri- 4 State Hosp. Supply Corp. v. United States, 226 F.R.D. 118, 134 (D.D.C. 2005) (to assess whether 5 the crime-fraud exception applied to documents submitted for in camera review, court required “a 6 reasonably detailed privilege log”); JPMorgan Chase Bank, N.A. v. Winget, 2017 U.S. Dist. LEXIS 7 103115, at *35 (E.D. Mich. Jul. 5, 2017) (noting privilege log containing sufficient detail beyond 8 conclusory allegations will help party “to determine whether the crime-fraud exception to any claim 9 of privilege applies”); Promed, Inc. v. Pavlas, 2012 U.S. Dist. LEXIS 167367, at *4-*5 (S.D. Ga. 10 Nov. 26, 2012) (court found it could not assess whether crime-fraud exception applied based on 11 “summary privilege log” and required party asserting privilege to submit a more detailed log, 12 setting forth the following information as to each responsive document or communication: (1) the 13 nature of the document or communication; (2) the date of the document or communication; (3) its 14 source; (4) the intended recipient; (5) each individual or entity that received it; (6) the purpose for 15 which it was prepared; (7) the nature of the privilege asserted; and (8) sufficient facts to allow the 16 Court to assess whether the document or communication falls within the privilege”). 17 After careful consideration, the Court finds that Defendants have not established that 18 creating a document-by-document privilege log would be unduly burdensome as to Plaintiff’s 19 narrowed request. A document-by-document privilege log is both appropriate and reasonable under 20 the facts presented with respect to the e-mails at issue. 21 III. Conclusion and Order 22 For the reasons stated, IT IS HEREBY ORDERED as follows: 23 1. Within thirty (30) days from the date of this Order, Defendants shall produce all 24 non-privileged all law firm e-mails and related documents regarding Plaintiff’s two underlying 25 ADA lawsuits, along with a detailed privilege log for all such e-mails for which they claim attorney- 26 client or work product protection. 27 28 2. The privilege log must minimally contain the following information: (1) the nature of the document or communication; (2) the date of the document or communication; (3) its source; 9 1 (4) the intended recipient; (5) each individual or entity that received it; (6) the purpose for which it 2 was prepared; (7) the nature of the privilege asserted; and (8) sufficient facts to allow the Court to 3 assess whether the document or communication falls within the privilege; 4 3. The Court sets a telephonic status conference regarding discovery on May 30, 2019, 5 at 10:00 AM in Courtroom 8 (BAM) before the undersigned. The parties may appear at the 6 conference with each party using the following dial-in number and access code: dial-in number 1- 7 877-411-9748; access code 3190866; and 8 9 4. Failure to comply with this order may result in the imposition of sanctions, including evidentiary sanctions. 10 11 12 13 IT IS SO ORDERED. Dated: /s/ Barbara April 23, 2019 A. McAuliffe _ UNITED STATES MAGISTRATE JUDGE 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 10

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?