Martinelli v. Johnson & Johnson et al

Filing 28

STIPULATION and ORDER signed by Chief Judge Morrison C. England, Jr., on 4/13/16, ORDERING that the foregoing 26 Stipulation is hereby ADOPTED by the Court and shall govern the production of electronically stored information and paper documents. (Kastilahn, A)

Download PDF
1 TUCKER ELLIS LLP Mollie F. Benedict - SBN 187084 2 mollie.benedict@tuckerellis.com 3 Amanda Villalobos - SBN 262176 4 5 6 7 amanda.villalobos@tuckerellis.com 515 South Flower Street Forty-Second Floor Los Angeles, CA 90071-2223 Telephone: 213.430.3400 Facsimile: 213.430.3409 Attorneys for Defendants JOHNSON & JOHNSON 8 and MCNEIL NUTRITIONALS, LLC TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 BURSOR & FISHER, P.A. L. Timothy Fisher (State Bar No. 191626) 10 Julia A. Luster (State Bar No. 295031) 1990 North California Boulevard, Suite 940 11 Walnut Creek, CA 94596 Telephone: (925) 300-4455 12 Facsimile: (925) 407-2700 13 E-Mail: ltfisher@bursor.com jluster@bursor.com 14 BURSOR & FISHER, P.A. Scott A. Bursor (State Bar No. 276006) 15 888 Seventh Avenue New York, NY 10019 16 Telephone: (212) 989-9113 Facsimile: (212) 989-9163 17 E-Mail: scott@bursor.com 18 Attorneys for Plaintiff JOANN MARTINELLI 19 20 UNITED STATES DISTRICT COURT 21 EASTERN DISTRICT OF CALIFORNIA 22 23 JOANN MARTINELLI, individually and on 24 25 26 behalf of all others similarly situated, Plaintiff, v. JOHNSON & JOHNSON and McNEIL 27 NUTRITIONALS, LLC, 28 Defendants. ) Case No. 2:15-cv-01733-MCE-EFB ) ) STIPULATED ESI AND HARD COPY ) PROTOCOL ) ) ) ) ) ) ) STIPULATED ESI AND HARD COPY PROTOCOL 1 The Parties hereby agree to the following protocol for production of electronically stored 2 information (“ESI”) and paper (“hardcopy”) documents. Subject to the agreed upon Protective Orders in 3 this Action, this protocol governs all productions in this action. This protocol has the objective to 4 facilitate the just, speedy, and inexpensive completion of discovery of ESI and hardcopy documents and 5 to promote, whenever possible, the early resolution of disputes, including any disputes pertaining to 6 scope or costs regarding the discovery of ESI without Court intervention. Nothing in this protocol shall 7 limit a party’s right to seek or object to discovery as set out in applicable rules, to rely on any Protective 8 Order entered in this action concerning protection of confidential or otherwise sensitive information, or TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 to object to the authenticity or admissibility of any hardcopy document or ESI produced in accordance 10 with this protocol. The mere production of ESI as part of a mass production shall not itself constitute a 11 waiver for any purpose. 12 A. GENERAL AGREEMENTS 13 1. Ongoing Cooperation among the Parties 14 The parties are aware of the importance the Court places on cooperation and commit to continue 15 to consult and cooperate reasonably as discovery proceeds. The parties recognize that the failure of 16 counsel or the parties to this action to cooperate in facilitating and reasonably limiting discovery 17 requests and responses raises litigation costs and contributes to the risk of sanctions. The parties agree 18 that their counsel’s zealous representation of them is not compromised by conducting discovery in a 19 cooperative manner. 20 2. Proportionality 21 a. Reasonable Discovery Limits. The proportionality standard set forth in Rule 26(b)(2)(C) 22 of the Federal Rules of Civil Procedure (“FRCP”)1 shall apply to discovery in this action. Consistent 23 with that proportionality standard, the parties agree to cooperate in identifying and agreeing to 24 appropriate limits on discovery, including limits on the number of custodians, discoverable data sources, 25 and relevant time periods. The parties shall not be obligated to collect or produce ESI created after the 26 date of filing of the initial complaint in this action. 27 b. Discoverable Custodians and Non-Custodial Data Sources. Consistent with the 28 proportionality standard, within twenty one (21 )days after the Court’s entry of this protocol, each party 1 Unless otherwise indicated, all statutory references herein are to the FRCP. 2 STIPULATED ESI AND HARDCOPY PROTOCOL 1 shall provide to the other party a list of the party’s twelve (12) most likely custodians, as well as a list of 2 non-custodial data repositories whose reasonably accessible emails and other ESI the party will search 3 for relevant information. Custodians shall be identified by name, title, dates of employment by the 4 party, and a brief description of their employment duties. The parties agree to meet and confer in good 5 faith in order to reach agreement on the lists of custodians whose emails and other ESI will be searched, 6 and to agree upon such list (the “Final Custodian List”) within fourteen (14) days of the date each party 7 receives the other party’s proposed list of twelve (12) most likely custodians. Absent a showing of good 8 cause, and subject to any further agreement among the parties, the list(s) provided pursuant to this TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 paragraph shall be the presumptive limit on permissible ESI discovery. If any custodian or data source 10 identified on the Final Custodian List is located outside the United States, the parties shall meet and 11 confer regarding such matters as relevancy and privacy of the data at issue and, as applicable, the timing 12 of production of any such data. 13 c. Discovery Concerning Preservation and Collection Efforts. Discovery concerning the 14 preservation and collection efforts of another party can contribute to unnecessary expense and delay and 15 may inappropriately implicate work product and attorney-client privileged matters. If there is a dispute 16 concerning the scope of a party’s preservation or collection efforts, the parties or their counsel must 17 meet and confer and fully explain their reason for believing additional efforts are, or are not, relevant 18 and proportional pursuant to Rule 26(b)(1). In particular, before initiating discovery about preservation 19 and collection, a party shall confer with the other party concerning the specific need for such discovery, 20 including its relevance to claims and defenses, and the suitability of alternative means for obtaining the 21 information. 22 d. On-Site Inspections of ESI. On-site inspections of ESI under Rule 34(b) shall be 23 permitted only upon a good-faith showing by the requesting party of good cause and specific need or 24 upon agreement of the parties. As appropriate, the Court may condition on-site inspections of ESI, as 25 authorized in the preceding sentence, to be performed by independent third-party experts, and the Court 26 may set other conditions it may deem appropriate. 27 e. Non-Discoverable ESI. Consistent with the proportionality standard set forth in the 28 FRCP, absent a party’s specific written notice for good cause, the following categories of ESI are presumed to be inaccessible and not discoverable: 3 STIPULATED ESI AND HARDCOPY PROTOCOL 1 i. 2 3 ESI deleted in the normal course of business before the time a preservation obligation in this action came into effect; ii. Backup data files that are maintained in the normal course of business for 4 purposes of disaster recovery, including, but not limited to, backup tapes, disks, 5 SAN, and other forms of media that are substantially duplicative of data that are 6 more accessible elsewhere; 7 iii. Deleted, “slack,” fragmented, or unallocated data only accessible by forensics; 8 iv. Random access memory (RAM), temporary files, or other ephemeral data that are TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 10 difficult to preserve without disabling the operating system; v. 11 12 files, cache files, and cookies; vi. 13 14 On-line access data such as,(without limitation, temporary internet files, history Data in metadata fields frequently updated automatically, such as last-opened or last-printed dates; vii. Electronic data (e.g., call logs, email, calendars, contact data, notes, and text 15 messages) sent to or from mobile devices (e.g., iPhone, iPad, Android, and 16 Blackberry devices), provided that copies of all such electronic data are routinely 17 saved elsewhere (such as on a server, laptop, desktop computer, or ‘cloud’ 18 storage); 19 viii. Voicemail, including Telephone or VOIP voice messages; 20 ix. Text messages and instant messages that are not retained in the ordinary course of 21 business; 22 x. SAS program and data files; 23 xi. Server, system, network, or software application logs; 24 xii. Data remaining from systems no longer in use that are unintelligible on the 25 26 systems currently in use; xiii. Electronic data temporarily stored by laboratory equipment or attached electronic 27 equipment, provided that such data are not ordinarily preserved as part of a 28 laboratory report; and 4 STIPULATED ESI AND HARDCOPY PROTOCOL 1 xiv. 2 Structural files not material to individual file contents (e.g., .CCS, .XSL, .XML, .DTD, etc.). 3 f. Disaster-Recovery Backup Data. Consistent with the proportionality standard of the 4 FRCP, absent a party’s specific written notice for good cause, no party shall be required to modify or 5 suspend procedures, including rotation of backup media, used in the normal course of business to back 6 up data and systems for disaster recovery purposes. Absent a showing of good cause, such backup media 7 shall be considered to be not reasonably accessible. Nothing in this provision obviates a party’s duty to 8 implement a litigation hold. TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 3. 10 No Designation of Discovery Requests Productions of hardcopy documents and ESI in the reasonably usable form set out in this 11 protocol, including Attachment A, need not be organized and labeled to correspond to the categories in 12 the requests. 13 4. Inadvertent Production 14 The inadvertent production of any emails, ESI, or other material constituting or containing attorney15 client privileged information or attorney work-product, or which constitutes or contains information 16 protected by any applicable privacy law or regulation, shall be governed by provisions contained in the 17 Protective Order previously entered in this action. 18 B. ELECTRONICALLY STORED INFORMATION 19 1. Production in Reasonably Usable Form 20 a. The parties shall produce ESI in reasonably usable form. Except as stated in paragraphs 21 B.2 and B.3 below or as agreed hereafter by the parties, such reasonably usable form shall be the single22 page TIFF-image format with extracted or OCR text and associated metadata as set out in Attachment 23 A, which is incorporated in full into this protocol. If the receiving party for good cause explained in the 24 request seeks production in native format of specifically identified ESI produced originally in TIFF25 image form, the producing party shall respond reasonably and in good faith to any such request. 26 b. Redactions. The Producing Party may redact from any TIFF image, metadata field, or 27 native file material that is protected from disclosure by applicable privilege or immunity, that is 28 governed by California Civil Code § 1798.1 or that the Protective Order entered in this Action allows to be redacted. 5 STIPULATED ESI AND HARDCOPY PROTOCOL 1 c. Each party may make requests for good cause seeking production of specifically 2 identified documents in color. 3 2. Electronic Spreadsheets, Presentations, Desktop Databases, and Multimedia Files 4 Electronic spreadsheets (e.g., Excel), electronic presentations (e.g., PowerPoint), desktop 5 databases (e.g., Access), and audio/video multimedia files that have been identified as responsive shall 6 be produced in native format, unless they are authorized to be redacted in accordance with Paragraph 1.b 7 above. After such redactions, the producing party either shall produce the redacted file in the reasonably 8 usable form set out in Attachment A or shall produce the redacted copy in native format. TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 3. 10 Enterprise Databases and Database Management Systems In instances in which discoverable ESI in an enterprise database or database management system 11 (e.g., Oracle, SQL server, DB2) can be produced in an already existing and reasonably available report, 12 the parties shall collect and produce, in the reasonably usable TIFF-image form described in Attachment 13 A, the discoverable material in that report format. If an existing report form is not reasonably available, 14 the parties shall export from the original database discoverable information in a format compatible with 15 Microsoft Excel or Microsoft Access, and the information shall be produced in that native format. 16 4. Additional Procedures for Native Format Files 17 a. Procedures for assigning production numbers and confidentiality information to files 18 produced in native format are addressed in Appendix A, incorporated herein, at Paragraph A.15. 19 b. Any party seeking to use, in any proceeding in this action, files produced in native format 20 shall do so subject to the following: 21 i. If the native file has been converted to TIFF-image or hardcopy, the original 22 production number and confidentiality designation shall be stamped on each page 23 of the resulting TIFF-image or hardcopy document representing the original 24 native-format file, with a suffix added to the production number to identify the 25 particular page in the file (e.g., XYZ00001_001). In addition, the MD5 or SHA-1 26 hash value of the native file from which the TIFF-image or hardcopy document 27 was generated shall be placed on the first page of the TIFF-image or hardcopy 28 document; 6 STIPULATED ESI AND HARDCOPY PROTOCOL 1 ii. If the file will be used in its native format, the party seeking to use the native file 2 shall first provide to other parties, sufficiently in advance of such use that the 3 producing party can confirm that the file to be used is the same as the file 4 produced, both the production number and the MD5 or SHA-1 hash value of the 5 file; and 6 iii. Use of a file in native format, or use of a TIFF-image or hardcopy document the file being used is an accurate and complete depiction of the original native- 9 TUCKER ELLIS LLP representing the original native-format file shall constitute a representation that 8 Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 7 format file. 10 5. Use of Search Filters 11 a. To contain costs associated with the identification of relevant ESI for review and 12 production, the parties may meet and confer to discuss either the use of reasonable search terms, file 13 types, and date ranges, or the use of advanced search and retrieval technologies, including predictive 14 coding or other technology-assisted review. The parties agree to meet and confer in good faith to reach 15 agreement on a list of search terms and protocols for the production of ESI. During such discussions, 16 the producing party shall retain the sole right and responsibility to manage and control searches of its 17 data files. If the producing party makes revisions to search terms or advanced technology procedures in 18 order to make them more accurate and cost-effective, the producing party agrees to meet and confer with 19 the requesting party regarding such revisions. A party’s failure to meet and confer or to make a timely 20 request for different or additional searches as described in this paragraph shall waive that party’s right to 21 object to the sufficiency of the searches actually conducted. 22 b. If, prior to the conduct of any searches, a receiving party believes in good faith that the 23 producing party’s decisions would result in deficiencies in production, the receiving party may make 24 prompt, reasonable requests for different or additional searches. The producing party shall respond 25 reasonably to such requests. Any proposed search terms shall be narrowly tailored to particular a issue. 26 Indiscriminate terms, such as the producing party’s name or its product names, are inappropriate unless 27 combined with narrowing search criteria that sufficiently reduce the risk of over-inclusion. 28 c. The fact that any electronic file has been identified in agreed-upon searches shall not prevent any party from withholding such file from production on the ground that it is protected from 7 STIPULATED ESI AND HARDCOPY PROTOCOL 1 disclosure by applicable privilege or immunity, that is protected from disclosure by California Civil 2 Code § 1798.1 or that the Protective Order entered in this Action allows to be withheld. 3 d. Nothing in this section shall limit a party’s right to seek reasonably agreement from the 4 other parties or a Court ruling to modify previously agreed-upon search terms or procedures for 5 advanced search and retrieval technologies. 6 e. The producing party shall propose an initial list of search terms to the requesting party. 7 The parties agree to meet and confer in good faith to finalize a list of acceptable search terms within 8 sixty (60) days of finalizing the Final Custodian List. Should the parties be unable to resolve any TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 disputes cooperatively, they shall promptly bring their unresolved dispute(s) to the Court’s attention. 10 f. The parties agree that a “hit” on a search term is not the sole factor in determining 11 whether ESI is responsive to party’s requests for production. For the avoidance of doubt, the producing 12 party is not required to produce ESI containing a search term if the ESI is not otherwise responsive to a 13 party’s requests for production in this action, if it is protected from disclosure by applicable privilege, or 14 that the Protective Order entered in this action allows the ESI to otherwise be withheld. The parties 15 further agree that ESI that does not contain a “hit” on a search term may be excluded from production. 16 6. Email Threading 17 a. Email threads are email communications that contain prior or lesser-included email 18 communications that also may exist separately in the party’s electronic files. A most inclusive email 19 thread is one that contains all of the prior or lesser-included emails, including attachments, for that 20 branch of the email thread. The parties agree that removal of wholly-included, prior-in-time, or lesser21 included versions from potential production will reduce all parties’ costs of document review, 22 production, and litigation-support hosting. Accordingly, each party may produce or list on any required 23 privilege log only the most inclusive email threads. 24 b. Following production of the most inclusive email threads, and for good cause, a receiving 25 party may make reasonable requests, with respect to most-inclusive email threads particularly identified 26 in the requests, for metadata associated with individual prior or lesser-included emails within the 27 identified most inclusive email threads. Upon such request, the producing party shall cooperate 28 reasonably in responding to any such requests. 7. Avoidance of Duplicate Production 8 STIPULATED ESI AND HARDCOPY PROTOCOL 1 “Duplicate ESI” means files that are exact duplicates based on the files’ MD5 or SHA-1 hash 2 values. The producing party need produce only a single copy of responsive Duplicate ESI. A producing 3 party shall take reasonable steps to de-duplicate ESI globally (i.e., both within a particular custodian’s 4 files and across all custodians). Entire document families may constitute Duplicate ESI. De-duplication 5 shall not break apart families. When the same Duplicate ESI exists in the files of multiple custodians, 6 those persons shall be listed in the Custodian field identified in Paragraph A.14(c) of Attachment A. 7 C. DOCUMENTS THAT EXIST ONLY IN HARDCOPY (PAPER) FORM 8 A party may produce documents that exist in the normal course of business only in hardcopy TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 form either (a) in their original hardcopy form, or (b) scanned and produced, with Bates numbers added 10 and redacted as necessary in accordance with the procedures set out in Attachment A. Except as set out 11 in section A.4 above, the scanning of original hardcopy documents does not otherwise require that the 12 scanned images be treated as ESI. 13 DATED: April 8, 2016 TUCKER ELLIS LLP 14 15 By: 16 17 18 19 20 21 /s/ Amanda Villalobos Mollie F. Benedict - SBN 187084 mollie.benedict@tuckerellis.com Amanda Villalobos - SBN 262176 amanda.villalobos@tuckerellis.com 515 South Flower Street Forty-Second Floor Los Angeles, CA 90071-2223 Telephone:213.430.3400 Facsimile: 213.430.3409 Attorneys for Defendants MCNEIL NUTRITIONALS, LLC and JOHNSON & JOHNSON 22 23 24 25 26 27 28 9 STIPULATED ESI AND HARDCOPY PROTOCOL 1 2 DATED: April 8, 2016 BURSOR & FISHER, P.A. 3 By: 4 5 6 7 8 TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 /s/ Julia A. Luster L. Timothy Fisher - SBN 191626 ltfisher@bursor.com Julia A. Luster - SBN 295031 jluster@bursor.com 1990 North California Blvd., Suite 940 Walnut Creek, CA 94596 Telephone:925.300.4455 Facsimile: 925.407.2700 Attorneys for Plaintiff JOANN MARTIENLLI 10 11 12 ORDER 13 14 The foregoing stipulation is hereby adopted by the Court and shall govern the production of 15 electronically stored information and paper documents. 16 IT IS SO ORDERED. 17 Dated: April 13, 2016 18 19 20 21 22 23 24 25 26 27 28 10 STIPULATED ESI AND HARDCOPY PROTOCOL 1 2 ATTACHMENT A A1. Image Files. Files produced in *.tif format will be single page black and white *.tif 3 images at 300 DPI, Group IV compression. To the extent possible, original orientation will be 4 maintained (i.e., portrait-to-portrait and landscape-to-landscape). Each *.tif image will be assigned a 5 unique name matching the production number of the corresponding page. Such files will be grouped in 6 folders of no more than 1,000 *.tif files each unless necessary to prevent a file from splitting across 7 folders. Files will not be split across folders and separate folders will not be created for each file. 8 Production (“Bates”) numbers shall be endorsed on the lower right corner of all images. This number 9 shall be a unique, consistently formatted identifier that will: TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 10 a. be consistent across the production; 11 b. contain no special characters; and 12 c. be numerically sequential within a given file. 13 Bates numbers should be a combination of an alpha prefix along with an 8 digit number (e.g. 14 ABC00000001). The number of digits in the numeric portion of the Bates number format should not 15 change in subsequent productions. Confidentiality designations, if any, will be endorsed on the lower 16 left corner of all images and shall not obscure any portion of the original file. 17 A2. File Text. Except where ESI contains text that has been redacted under assertion of 18 privilege or other protection from disclosure, full extracted text will be provided in the format of a single 19 *.txt file for each file (i.e., not one *.txt file per *.tif image). Where ESI contains text that has been 20 redacted under assertion of privilege or other protection from disclosure, the redacted *.tif image will be 21 OCR’d and file-level OCR text will be provided in lieu of extracted text. Searchable text will be 22 produced as file-level multi-page UTF-8 text files with the text file named to match the beginning 23 production number of the file. The full path of the text file must be provided in the *.dat data load file. 24 The text file shall include interlineated image keys/bates numbers sufficient to show, for all TIFF-image 25 pages, the bates-numbered page of the associated text. 26 A3. Word Processing Files. Word processing files, including without limitation Microsoft 27 Word files (*.doc and *.docx), will be produced in the above format with tracked changes, comments, 28 and hidden text showing. ATTACHMENT A 1 A4. Presentation Files. To the extent that presentation files, including without limitation 2 Microsoft PowerPoint files (*.ppt and *.pptx), are produced in *.tif image format, such *.tif images will 3 display comments, hidden slides, speakers’ notes, and similar data in such files. 4 A5. Spreadsheet or Worksheet Files. To the extent that spreadsheet files, including, without 5 limitation, Microsoft Excel files (*.xls or *.xlsx), are produced in *.tif image format, such *.tif images 6 will display hidden rows, columns, and worksheets, if any, in such files. 7 A6. Parent-Child Relationships. Parent-child relationships (e.g., the associations between 8 emails and their attachments) will be preserved. Email and other ESI attachments will be produced as TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 independent files immediately following the parent email or ESI record. Parent-child relationships will 10 be identified in the data load file pursuant to paragraph A.14 below. 11 A7. Dynamic Fields. Files containing dynamic fields such as file names, dates, and times will 12 be produced showing the field code (e.g., “[FILENAME]” or “[AUTODATE]”), rather than the values 13 for such fields existing at the time the file is processed. 14 A8. English Language. To the extent any data exists in more than one language, the data will 15 be produced in English, if available. If no English version of a file is available, the producing party shall 16 not have an obligation to produce an English translation of the data. 17 A9. Embedded Objects. Some Microsoft Office and .RTF files may contain embedded 18 objects. Such objects typically are the following file types: Microsoft Excel, Word, PowerPoint, Project, 19 Outlook, and Access; and PDF. Subject to claims of privilege and immunity, as applicable, objects with 20 those identified file types shall be extracted as separate files and shall be produced as attachments to the 21 file in which they were embedded. 22 A10. Compressed Files. Compressed file types (i.e., .CAB, .GZ, .TAR. .Z, .ZIP) shall be 23 decompressed in a reiterative manner to ensure that a zip within a zip is decompressed into the lowest 24 possible compression resulting in individual files. 25 A11. Encrypted Files. The producing party will take reasonable steps, prior to production, to 26 unencrypt any discoverable electronically stored information that exists in encrypted format (e.g., 27 because password-protected) and that can be reasonably unencrypted. 28 A12. Scanned Hardcopy Documents 2 ATTACHMENT A 1 a. In scanning hardcopy documents, multiple distinct documents should not 2 be merged into a single record, and single documents should not be split 3 into multiple records (i.e., hard copy documents should be logically 4 unitized). 5 b. If a producing party is requested, and agrees, to provide OCR text for document level and provided in document-level *.txt files named to match 8 the production number of the first page of the document to which the OCR 9 TUCKER ELLIS LLP scanned images of hard copy documents, OCR should be performed on a 7 Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 6 text corresponds. OCR text should not be delivered in the data load file or 10 any other delimited text file. 11 c. In the case of an organized compilation of separate hardcopy documents— 12 for example, a binder containing several separate documents behind 13 numbered tabs—the document behind each tab should be scanned 14 separately, but the relationship among the documents in the binder should 15 be reflected in proper coding of the family fields set out below. 16 A13. 17 In following the requirements of Paragraph A.1, the producing party shall take reasonable steps Production Numbering. 18 to ensure that attachments to documents or electronic files are assigned production numbers that directly 19 follow the production numbers on the documents or files to which they were attached. If a production 20 number or set of production numbers is skipped, the skipped number or set of numbers will be noted. In 21 addition, wherever possible, each *.tif image will have its assigned production number electronically 22 “burned” onto the image. 23 24 A14. Data and Image Load Files. a. Load Files Required. Unless otherwise agreed, each production will 25 include a data load file in Concordance (*.dat) format and an image load 26 file in Opticon (*.opt) format. 27 b. Load File Formats. 28 3 ATTACHMENT A 1 i. Load file names should contain the volume name of the production 2 media. Additional descriptive information may be provided after 3 the volume name. For example, both ABC001.dat or 4 ABC001_metadata.dat would be acceptable. 5 ii. Unless other delimiters are specified, any fielded data provided in 6 a load file should use Concordance default delimiters. Semicolon 7 (;) should be used as multi-entry separator. 8 iii. TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 the first line a list of the fields provided in the order in which they 10 11 Any delimited text file containing fielded data should contain in are organized in the file. c. Fields to be Included in Data Load File. For all documents or electronic 12 files produced, the following metadata fields for each document or 13 electronic file, if available at the time of collection and processing and 14 unless such metadata fields are protected from disclosure by attorney- 15 client or work-product privilege, or California Civil Code § 1798.1, will 16 be provided in the data load file pursuant to subparagraph (a), above, 17 except to the extent that a document or electronic file has been produced 18 with redactions. The term “Scanned Docs” refers to documents that are in 19 hard copy form at the time of collection and have been scanned into *.tif 20 images. The term “Email and E-Docs” refers to files that are in electronic 21 form at the time of their collection. 22 23 24 / / / 25 / / / 26 / / / 27 / / / 28 / / / 4 ATTACHMENT A 1 Field Sample Data Scanned Docs Email and E-Docs Comment ABC00000001 Yes Yes Beginning production number 2 PRODBEG [Key Value] PRODEND ABC00000008 Yes Yes Ending production number 3 PRODBEGATT ABC00000009 Yes Yes 4 PRODENDATT ABC00001005 Yes Yes 5 PRODCOUNTATT 2 Yes Yes 6 CUSTODIAN Smith, John Yes Yes OTHER_CUSTODIANS Doe, Jane; Jones, James Yes Yes NATIVEFILE N/A Yes Beginning production number of parent in a family Ending production number of last page of the last attachment in a family The number of attachments associated with a family Custodian(s) that possessed the document or electronic file— multiple custodians separated by semicolon When global de-duplication is used, these are custodians whose file has been deduplicated Path and file name for native file on production media N/A Yes N/A Yes N/A Yes 7 8 TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 9 11 FILEDESC 12 FOLDER 13 FILENAME Natives\001\001\ ABC 00000001.xls Microsoft Office 2007 Document \My Documents\Docu ment1.doc Document1.doc 14 DOCEXT DOC N/A Yes 15 PAGES 2 Yes Yes AUTHOR John Smith N/A Yes DATECREATED 10/09/2005 N/A Yes DATELASTMOD 10/09/2005 N/A Yes NAMELASTMOD John Smith No Yes 22 SUBJECT Changes to Access Database N/A Yes 23 FROM John Beech N/A Yes 24 TO Janice Birch N/A Yes 25 CC Frank Maple N/A Yes 26 BCC John Oakwood N/A Yes 27 DATESENT 10/10/2005 N/A Yes 28 TIMESENT 10:33 am N/A Yes 10 16 17 18 19 20 21 5 ATTACHMENT A Description of the type file for the produced record. Original source folder for the record produced. Name of original electronic file as collected. File extension for email or edoc Number of pages in the produced document or electronic file (not applicable to native file productions). Author information as derived from the properties of the document. Date that non-email file was created as extracted from file system metadata Date that non-email file was modified as extracted from file system metadata Last author of non-email file as extracted from file system metadata “Subject” field extracted from email message or metadata properties of the document “From” field extracted from email message “To” field extracted from email message “Cc” or “carbon copy” field extracted from email message “Bcc” or “blind carbon copy” field extracted from email message Sent date of email message (mm/dd/yyyy format) Sent time of email message, time zone set to GMT 1 DATERCVD 10/10/2005 N/A Yes 2 TIMERCVD 10:33 am N/A Yes 3 HASHVALUE No Yes 4 e4d909c290d 0fb1ca068ff addf22cbd0 CONFIDENTIALITY Yes Yes 5 TEXTPATH Yes Yes 6 PRODVOL HIGHLY CONFIDENTIAL Text\001\001\ ABC00000001.txt VOL001 Yes Yes 7 A15. Received date of email message (mm/dd/yyyyformat) Received time of email message, time zone set to GMT MD5 or SHA-1 hash value Text of confidentiality designation, if any Path to *.txt file containing extracted or OCR text Name of the Production Volume Files Produced in Native Format. Any electronic file produced in native file format shall TUCKER ELLIS LLP Cleveland ♦ Columbus ♦ Denver ♦ Los Angeles ♦ San Francisco 8 be given a file name consisting of a unique Bates number and, as applicable, a confidentiality 9 designation; for example, “ABC00000002_[Original File Name]_Confidential.” For each native file 10 produced, the production will include a *.tif image slipsheet indicating the production number of the 11 native file and the confidentiality designation, and stating “File Provided Natively”. To the extent that it 12 is available, the original file text shall be provided in a file-level multi-page UTF-8 text file with a text 13 path provided in the *.dat file; otherwise the text contained on the slipsheet shall be provided in the *.txt 14 file with the text path provided in the *.dat file. 15 A16. Production Media. Unless otherwise agreed, documents and ESI will be produced on 16 optical media (CD/DVD), external hard drive, secure FTP site, or similar electronic format. Such media 17 should have an alphanumeric volume name; if a hard drive contains multiple volumes, each volume 18 should be contained in an appropriately named folder at the root of the drive. Volumes should be 19 numbered consecutively (ABC001, ABC002, etc.). Deliverable media should be labeled with the name 20 of this action, the identity of the producing Party, and the following information: Volume name, 21 production range(s), and date of delivery. 22 A17. Encryption of Production Media. To maximize the security of information in transit, any 23 media on which documents or electronic files are produced may be encrypted by the producing party. In 24 such cases, the producing party shall transmit the encryption key or password to the requesting party, 25 under separate cover, contemporaneously with sending the encrypted media. The receiving parties in this 26 matter are on notice that certain data produced may originate from custodians in the European Union 27 and the receiving parties therefore agree to follow the strictest security standards in guarding access to 28 said data. 6 ATTACHMENT A

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?