Gokhale v. Dolby Laboratories, Inc. et al
Filing
31
STIPULATION AND ORDER re 30 STIPULATION WITH PROPOSED ORDER FOR THE DISCOVERY OF ELECTRONICALLY STORED INFORMATION filed by Conroy Shum, Jeffrey Fehervari, Dolby Laboratories, Inc. Signed by Judge Jon S. Tigar on July 9, 2018. (wsn, COURT STAFF) (Filed on 7/9/2018)
1
2
3
4
5
6
7
Anton N. Handal (Bar No. 113812)
tony.handal@gmlaw.com
Gabriel G. Hedrick (Bar No. 220649)
gabriel.hedrick@gmlaw.com
Lauren G. Kane (Bar No. 286212)
lauren.kane@gmlaw.com
GREENSPOON MARDER LLP
401 West A Street, Suite 1150
San Diego, California 92101
Tel: 619.544.6400
Fax: 619.696.0323
SEYFARTH SHAW LLP
Laura Maechtlen (SBN 224923)
E-mail: lmaechtlen@seyfarth.com
Chantelle C. Egan (SBN 257938)
E-mail: cegan@seyfarth.com
Pritee K. Thakarsey (SBN 266168)
E-mail: pthakarsey@seyfarth.com
560 Mission Street, 31st Floor
San Francisco, California 94105
Telephone:
(415) 397-2823
Facsimile:
(415) 397-8549
Attorneys for Plaintiff
SUSHAMA GOKHALE
Dana L. Peterson (SBN 178499)
E-mail: dpeterson@seyfarth.com
2029 Century Park East, Suite 3500
Los Angeles, California 90067-3021
Telephone:
(310) 277-7200
Facsimile:
(310) 201-5219
8
9
10
Attorneys for Defendants
DOLBY LABORATORIES, INC.;
JEFFREY FEHERVARI and CONROY
SHUM
11
12
13
14
UNITED STATES DISTRICT COURT
15
NORTHERN DISTRICT OF CALIFORNIA
16
SUSHAMA GOKHALE, an individual;
Plaintiff,
17
18
19
20
21
v.
CASE NO.: 3:17-cv-03845-JST
STIPULATED ORDER FOR THE
DISCOVERY OF ELECTRONICALLY
STORED INFORMATION
DOLBY LABORATORIES, INC., a California
corporation; JEFFREY FEHERVARI, an
individual; CONROY SHUM, an individual;
and DOES 1 to 10, inclusive,
Defendants.
22
23
1. PURPOSE
24
This Order will govern discovery of electronically stored information (“ESI”) in this
25
case as a supplement to the Federal Rules of Civil Procedure, this Court’s Guidelines for the
26
Discovery of Electronically Stored Information, and any other applicable orders and rules.
27
28
2. COOPERATION
The parties are aware of the importance the Court places on cooperation and commit to
-1STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
cooperate in good faith throughout the matter consistent with this Court’s Guidelines for the
2
Discovery of ESI.
3
3. LIAISON
4
The parties shall identify liaisons to each other who are and will be knowledgeable
5
about and responsible for discussing their respective ESI. Each e-discovery liaison will be, or
6
have access to those who are, knowledgeable about the technical aspects of e-discovery,
7
including the location, nature, accessibility, format, collection, search methodologies, and
8
production of ESI in this matter. The parties will rely on the liaisons, as needed, to confer
9
about ESI and to help resolve disputes without court intervention.
10
4. PRESERVATION
11
The parties have discussed their preservation obligations and needs and agree that
12
preservation of potentially relevant ESI will be reasonable and proportionate. To reduce the
13
costs and burdens of preservation and to ensure proper ESI is preserved, the parties agree that:
14
15
a. Only ESI created or received between January 1, 2011 and December 31, 2017 will
be preserved;
16
b. The Parties agree to limit the number of custodians for preservation purposes to
17
those identified in Exhibit A. The parties further agree that there will be no
18
obligation to search and collect from each and every custodian identified for
19
preservation. The parties shall add or remove custodians as reasonably necessary
20
and will meet and confer regarding the same;
21
22
23
c. Among the sources of data the parties agree are not reasonably accessible, the
parties agree not to preserve the following:
1.
Deleted, shadowed, fragmented, residual, or cached data, temporary files,
24
random access memory (“RAM”), or ESI that would only be accessible by
25
taking a forensic (bit stream) image of a device.
26
2.
27
28
Data in metadata fields that are frequently updated automatically, such as
last-opened dates.
3.
Voicemails or instant messages.
-2STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
4.
Server, system, or network logs.
2
5.
Information stored on cellular telephones, including but not limited to text
3
messages, voicemails, and telephone call history.
4
6.
Corrupted data or data containing viruses.
5
7.
Back up tapes or other storage media used for disaster recovery purposes.
6
d. Additional data sources that are not reasonably accessible may be identified as a
7
result of investigation. The parties will meet and confer regarding any disagreement
8
about the accessibility of such additional data sources. Nothing herein shall prevent a
9
party from subsequently requesting that ESI identified above be preserved and
10
produced if specific facts demonstrate a particular need for such evidence that
11
justifies the burden of preservation and retrieval. Further, nothing herein shall
12
prevent a party from requesting and receiving additional detail and explanation from
13
the producing party regarding any of the above items that would allow the requesting
14
party to further evaluate the substance of the information and the burden and costs of
15
retrieving and providing this information.
16
5. SEARCH
17
The parties agree that in responding to an initial Fed. R. Civ. P. 34 request, or earlier if
18
appropriate, they will meet and confer about methods to search ESI in order to identify ESI
19
that is subject to production in discovery and filter out ESI that is not subject to discovery. The
20
parties further agree to meet and confer to identify the proper custodians, proper search terms
21
and proper timeframe for email production requests as set forth in this District’s E-Discovery
22
Guidelines. Nothing herein shall limit a party’s right to use technology assisted review tools to
23
reasonably assist its review and production.
24
6. PRODUCTION FORMATS
25
The parties agree to produce documents in the formats described below. The parties
26
agree not to degrade the searchability of documents as part of the document production
27
process.
28
a. Images. The parties will produce images in Group IV Single Page Tiff format,
-3STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
scanned at 300 DPI, with Bates numbers stamped on the bottom right.
2
Confidentiality designations will be stamped on the bottom left. Both stamps to be
3
situated so as to not block or obliterate underlying text. Files shall be named by
4
BegBates. All hidden text (e.g., track changes, hidden columns, mark-ups, notes)
5
shall be expanded and rendered in the image file.
6
b. Native Files. The parties will produce spreadsheets (e.g., Excel, CSV, and other
7
delimited text files) and multimedia files in native format where reasonably
8
available, with the exception of native files that correspond to produced documents
9
that have been redacted. Where documents are produced in native format, the
10
Parties shall rename the file to the BegBates Number and include any
11
confidentiality designation therein as well. The Parties shall provide placeholder
12
images with Bates and confidentiality branding for each natively produced
13
document.
14
c. Parent-Child Relationships. Parent-child relationships (e.g., the association
15
between emails and attachments) will be preserved. Email attachments will be
16
consecutively produced with the parent email, and families will be associated using
17
attachment range metadata as specified in Exhibit B.
18
d. Bates Numbering. All documents produced in image format will include a legible,
19
unique page identifier (“Bates Number”) electronically embossed onto each page at
20
a location that is reasonably intended to not obliterate, conceal, or interfere with any
21
information in the document. No other legend or stamp will be placed on the
22
images other than a confidentiality legend (where applicable), redactions (consistent
23
with any other protective orders or applicable law), and if desired by a party, a
24
document control number separate from the Bates Number. With respect to the
25
identification of files produced in their native format, the parties shall identify each
26
file produced using the BegBates Number as the name, and link in the applicable
27
load file.
28
e. File Naming Conventions. Each TIFF Image shall be named with the unique Bates
-4STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
Number of the page of document. Each corresponding text file shall also be named
2
with the BegBates Number of the document. In the event the Bates Number
3
contains a symbol and/or character that cannot be included in a file name, the
4
symbol and/or character will be omitted from the file name.
5
f. Load Files. The parties shall produce a Concordance
load file with each
6
production. Each load file shall include the metadata fields provided in Exhibit B
7
to the extent that they are available as a part of standard processing. The parties
8
shall meet and confer to the extent reasonably necessary to facilitate the import and
9
use of the produced materials with commercially available document management
10
or litigation support software.
11
g. Extracted Text/OCRed Text. The parties shall produce extracted text in ASCII
12
format, or OCR files reflecting the full text that has been electronically extracted
13
from each produced document, whether its original from is hard copy or electronic.
14
The OCR and extracted text files shall be produced in a manner suitable for
15
importing the information into commercially available document management or
16
litigation support software.
17
h. Privileged Information. Any document falling within the scope of any request for
18
production or subpoena that is withheld on the basis of a claim of attorney-client
19
privilege, work-product, or any other claim of privilege or immunity from
20
discovery shall be identified by the producing party in a privilege log, which the
21
producing party shall produce in an electronic format that allows text searching and
22
organization of data. An e-mail thread contained within a single document need
23
only be recorded once on the producing party’s privilege log, even if a privilege is
24
asserted over multiple portions of the thread. Privilege log identification is not
25
required for communications exchanged between the producing party and their
26
litigation counsel or among counsel for the producing party after the date of filing
27
of this action.
28
i. Privilege Log. For each responsive document for which a producing party asserts
-5STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
that a privilege applies, the producing party must include in the privilege log the
2
information required by Federal Rule of Civil Procedure 26(b)(5). Notwithstanding
3
a claim of privilege, any purportedly privileged document containing non-
4
privileged matter must be: (i) produced with the purportedly privileged portion
5
redacted, with the redacted portion indicated on the document itself, and (ii) listed
6
on the privilege log to be provided above. A privilege log shall be provided by the
7
producing party to the receiving party within 45 days following the delivery of any
8
applicable production, unless there is good cause for delay.
9
j. Production of Privileged Materials (“Claw-back”). In the event that a producing
10
party claims that it failed to designate or withhold any production materials or other
11
information as privileged or work-product materials, it shall promptly notify, in
12
writing, all parties to whom such privileged material was produced or disclosed of
13
the producing party’s intent to assert a claim of privilege or work-product over such
14
materials (“Privileged Material”). Upon such notice, the receiving party shall not
15
review or use the disclosed Privileged Material in any respect, except to the
16
17
18
19
20
minimal extent necessary to confirm the appropriateness of the designation or to
otherwise challenge the designation pursuant to the procedures set forth below. The
receiving party shall within 14 days return, sequester, and delete or destroy all
copies of the disclosed Privileged Material (including any and all work-product
containing such Privileged Material); and shall take reasonable steps to retrieve
such Privileged Material if the receiving party disclosed it before being notified;
21
and shall make no further use of such Privileged Material (or work product
22
23
24
25
26
27
28
containing such Privileged Material). In the event the receiving party challenges
the designation pursuant to the procedures set forth below, the receiving party’s
obligation to sequester remains, except to the minimal extent necessary to challenge
the designation, if so elected, pursuant to the procedures set forth below.
The receiving party may object to the Producing Party’s designation of
disclosed information as Privileged Material by providing written notice of such
objection within 14 days of its receipt of a written demand for the return of the
-6STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
disclosed Privileged Material. Any such objection shall be resolved as described in
2
the model protective order.by the Court in an in camera review. The receiving
3
party agrees not to argue in connection with a dispute over Privileged Material that
4
the information may not have been reviewed by the producing party prior to its
5
disclosure or that the producing party did not take reasonable steps to prevent
6
disclosure.
7
Pending resolution of any such dispute by the Court, the receiving party shall
8
sequester and shall not use the disclosed Privileged Material in any respect except
9
as required by the model protective order necessary to submit to the Court for in
10
camera review. Where the parties agree, or the Court orders, that a document is
11
protected by the attorney-client, work-product, or other privilege, and such
12
document was originally produced in electronic format on media containing
13
production materials that are not subject to any exemption from production, the
14
producing party shall promptly provide replacement production to the receiving
15
party.
16
Pursuant to Fed. R. Evid. 502(d), the production of a privileged or work-product
17
protected document, whether inadvertent or otherwise, is not a waiver of privilege
18
or protection from discovery in this case or in any other federal or state proceeding.
19
The production by any producing party, whether in this action or in any other
20
proceedings, of materials subject to a claim of privilege or work-product shall not
21
result in a waiver of any such protection in this action for the produced materials or
22
for any other privileged or immune materials containing the same or similar subject
23
matter. For example, the mere production of privileged or work-product-protected
24
documents in this case as part of a mass production is not itself a waiver in this case
25
or in any other federal or state proceeding. Nor shall the fact of production by any
26
producing party in this action be used as a basis for arguing that a claim of privilege
27
or work-product has been waived in any other proceeding.
28
k. Receipt of Privileged Information. Nothing in this Order shall relieve counsel for
-7STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
any receiving party of any existing duty or obligation, whether established by case
2
law, rule of court, regulation or other source, to return, and not to review, any
3
privileged or work-product materials without being requested by the producing
4
party to do so. Rather, in the event a receiving party becomes aware that it is in
5
possession of what appears to be a privileged document, then counsel for the
6
receiving party shall immediately: (i) cease any further review of that document; (ii)
7
promptly sequester the potentially privileged material; and (iii) notify the producing
8
party of the production, requesting whether the producing party intended for the
9
document to be produced. In the event the producing party confirms the production
10
of the privileged document, the receiving party shall promptly return or destroy all
11
copies of the produced privileged document in its possession and take reasonable
12
steps to retrieve all copies of the produced privileged documents distributed to other
13
counsel or non-parties.
14
l. Redactions. Redacted files should be produced as PDFs or TIFFs in redacted form,
15
with applicable text files, or PDF text layers, containing extracted or OCRed text
16
acquired after redaction. A party may employ native redaction techniques so long
17
as the method of redaction employed does not significantly impair the usability or
18
searchability of the non-redacted portions of the redacted item and the fact of
19
alteration is disclosed. To the extent redactions are made on the basis of privilege,
20
such redactions must be logged in the manner of any other responsive material
21
withheld on claims of privilege. For the avoidance of doubt, redactions made on
22
the basis of privacy (such as, e.g., social security or taxpayer-identification
23
numbers, names of minor children, financial account numbers, etc.) and/or
24
confidentiality need not be logged.
25
7. PHASING
26
When a party propounds discovery requests pursuant to Fed. R. Civ. P. 34, the parties
27
agree to phase the production of ESI and the initial production will be from the following
28
sources and custodians: the emails of Xaviera Aviles, Abby Evans, Jeff Fehervari, Sushama
-8STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
Gokhale, Dan Young, and Conroy Shum. Following the initial production, the parties will
2
continue to prioritize the order of subsequent productions, if any.
3
8. NO WAIVER
4
Nothing contained herein is intended to or shall serve to limit a party’s right to review
5
and withhold documents, ESI, or information (including metadata) as permitted by the Federal
6
Rules of Civil Procedure and applicable case law.
7
9. RELIEF FROM COURT
8
If the parties are unable to agree, need further clarification on any issue relating to the
9
preservation, collection, or production of electronically stored information, or require
10
modification of this Order, any party may seek appropriate relief from the Court as described
11
in the model protective order.
12
13
14
15
16
17
18
19
10. PROTECTIVE ORDER
Nothing in this Stipulation shall be deemed to limit, modify, or override any provision
of any otherwise applicable Protective Order.
11. MODIFICATION
This Stipulated Order may be modified by a Stipulated Order of the parties or by the
Court for good cause shown.
IT IS SO STIPULATED, through Counsel of Record.
Dated: July 6, 2018
GREENSPOON MARDER LLP
20
By:
21
22
/s/ Gabriel G. Hedrick
Gabriel G. Hedrick
Attorneys for Plaintiff
SUSHAMA GOKHALE
23
24
Dated: July 6, 2018
SEYFARTH SHAW LLP
25
26
27
28
By:
/s/ Chantelle C. Egan
Chantelle C. Egan
Attorneys for Defendants
DOLBY LABORATORIES, INC.; JEFFREY
FEHERVARI and CONROY SHUM
-9STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
2
ATTESTATION OF E-FILED SIGNATURE
Pursuant to Civil Local Rule 5-1(i)(3) and Section 2(f)(4) of the Electronic Case Filing
3
Administrative Policies and Procedures Manual, I, Chantelle C. Egan, attest that above signatory,
4
Gabriel G. Hedrick, has read and approved the foregoing and consent to its filing in this action.
5
/s/ Chantelle C. Egan
6
Chantelle C. Egan
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-10STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
IT IS ORDERED that the forgoing Agreement is approved.
2
3
Dated: July 9, 2018
4
Hon. Jon S. Tigar
5
UNITED STATES DISTRICT JUDGE
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-11STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
EXHIBIT A
2
Custodian List for Preservation
3
4
I.
1.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
PLAINTIFF
II.
Sushama Gokhale
DEFENDANT
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
Abby Evans
Allison Jacobs
Ally Li
Amy Kim
Amy Skryja
Andrew Dahlkemper
Andy Sherman
Aysel Akdeniz
Bonnie Adell
Brian Satterley
Carole Vandermeyde
Cole Rathje
Conroy Shum
Curtis Hodge
Dan Young
Ed Swift
Elaine Dull
Elizabeth Miller
Emilio Daireaux
Faith Ng
Harry Cole
Heath Hoglund
Jason Dea
Jeff Fehervari
Kiersten Bautista
Leo Spooner
Linda Rogers
Marshall Feldman
Mary Wand
Mike Goldsmith
Mike Okada
Moonbong Jang
Penelope Cruz
Rachel Goodman
Randy Dela Cruz
Sabina Polnar
Scott A. Sullivan
-12STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
1
2
3
4
38.
39.
40.
41.
42.
43.
44.
Stephanie Hirasawa
Subroto Bose
Sushama Gokhale
Tony Fox
Vivian Vassallo
Winona Ou
Xaviera Aviles
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-13STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
EXHIBIT B
1
Metadata Fields for Production
2
Note: Metadata Field names may vary depending on the application which generates
3
4
them. For example, Microsoft Outlook creates different Metadata Field names than does Lotus
5
Notes. Accordingly, the chart below describes the Metadata Fields to be produced in generic,
6
7
commonly used terms which the producing party is to adapt to the specific types of ESI it is
producing.
8
9
Loose
Files/
10
11
12
Field Name
Description
StartBates
The Bates number for the first page of
the document.
EndBates
The Bates number for the last page of
the document.
Start
The first Bates number of the first
attachment to an email.
13
14
15
16
Email
17
Attachment
18
End
19
Attachment
20
ParentBates
First bates number of the parent
document for each attachment record.
From
The reported sender of an Email
message.
To
The reported recipient(s) of an Email
message contained in the “To” field.
CC
The reported recipient(s) of an Email
message contained in the “CC” field.
BCC
Att.
The reported recipient(s) of an Email
message contained in the “BCC” field.
21
22
23
24
25
26
27
The ending Bates number of the last
page of the last attachment to an Email.
28
-14STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
Loose
Files/
1
2
Field Name
Description
Email
SentDate
The date on which an Email was sent
by the user’s Email software (if
available) in Pacific time.
SentTime
The time at which an Email was sent by
the user’s Email software (if not
included in SentDate) in Pacific time.
8
EmailSubject
The Subject Line of an Email.
9
Attachment
Count
The number of attachments to an Email
11
FileName
The file name.
12
FileExt
The file extension.
13
Author
The author of the file as extracted from
the file metadata.
CreatedDate
The date the file was created as
extracted from the file metadata.
CreatedTime
The time the file was created as
extracted from the file metadata.
LastModDat
e
The date on which the file was last
modified as extracted from the file
metadata.
LastModTi
me
The time at which the file was last
modified as extracted from the file
metadata.
MD5Hash
The MD-5 hash value of the file.
Custodian
All custodian(s) or source(s) associated
with the record.
TEXTPATH
Att.
The path to the extracted text for the
file (if needed).
3
4
5
6
7
10
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-15STIPULATED ORDER FOR THE DISCOVERY OF ESI
Case No. 3:17-cv-03845-JST
Loose
Files/
1
2
Field Name
Description
Email
NATIVE
PATH
Att.
The path to the native document on the
production media (where native file is
produced).
3
4
5
6
47558506v.1
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-16STIPULATED ORDER FOR THE DISCOVERY OF ESI
46985451v.1
Case No. 3:17-cv-03845-JST
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?