The Regents of the University of California et al v. Affymetrix, Inc. et al

Filing 85

ORDER Granting Joint Motion for an Order Governing Discovery of Electronically Stored Information [Doc. No. 80 ]. Signed by Judge Marilyn L. Huff on 12/22/2017. (jjg)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 SOUTHERN DISTRICT OF CALIFORNIA 10 11 12 13 THE REGENTS OF THE UNIVERSITY OF CALIFORNIA; and BECTON, DICKINSON and COMPANY, Case No.: 17-cv-01394-H-NLS ORDER GRANTING JOINT MOTION FOR AN ORDER GOVERNING DISCOVERY OF ELETRONICALLY STORED INFORMATION Plaintiffs, 14 15 v. 16 AFFYMETRIX, INC.; and LIFE TECHNOLOGIES CORP., 17 [Doc. No. 80.] Defendants. 18 19 On December 18, 2017, the parties filed a joint motion for an order governing the 20 discovery of electronically stored information. (Doc. No. 80.) For good cause shown, the 21 Court grants the parties’ joint motion and enters the following order: 22 1. This Order supplements all other discovery rules and orders, including the 23 Protective Order in this case. It streamlines ESI collection and searching to promote a 24 “just, speedy, and inexpensive determination” of this action, as required by Federal Rule 25 of Civil Procedure 1. 26 2. This Order may be modified in the Court’s discretion or by agreement of the 27 parties. If the parties cannot resolve their disagreements regarding such modifications, the 28 parties shall submit their competing proposals to the Court in accordance with the Court’s 1 17-cv-01394-H-NLS 1 2 discovery dispute procedures. 3. Proportionality: Parties are expected to use reasonable, good faith and 3 proportional efforts to preserve, identify and produce relevant information. This includes 4 identifying appropriate limits to discovery, including limits on custodians, identification of 5 relevant subject matter, phased discovery, time periods for discovery and other parameters 6 to limit and guide preservation and discovery issues. 7 4. Search Terms: Focused terms, rather than over-broad terms, shall be 8 employed to search custodial data, e.g. email and other ESI collected from named 9 custodians. The parties shall timely attempt to reach agreement on search terms, or a 10 computer- or technology-aided methodology, and shall continue to cooperate in revisiting 11 the search terms or computer or technology-aided methodology. The parties’ development 12 and negotiation of search terms for custodial e-mail and other ESI shall not be grounds for 13 a party to delay review, collection, or production of non-custodial or other documents (e.g., 14 network shared documents, laboratory notebooks, development files, etc.) that the 15 producing party is able to, and without undue burden, identify and locate without the use 16 of search terms. The parties shall also make reasonable efforts to engage in collection 17 efforts prior to the finalization of search terms. 18 a. Each Producing Party shall be responsible for generating a searching protocol 19 that it will apply to its custodial data that it believes in good faith will return a reasonably 20 high proportion of responsive documents. Within fourteen (14) days of the entry of this 21 Order or within such time as the Parties agree, the Parties will exchange proposed search 22 terms that each Producing Party proposes to use to identify its responsive email or other 23 custodial ESI. A Producing Party need not apply the same search terms to all custodians, 24 but must disclose if it is applying some search terms to some custodians but not others. 25 b. A Producing Party is not limited to searches using the disclosed terms and 26 may conduct broader searches using other terms, at the Producing Party’s discretion, 27 without disclosing those additional or broader searches to the Requesting Party. A 28 Producing Party need not disclose search terms or strategies that will reveal privileged or 2 17-cv-01394-H-NLS 1 work product information. 2 c. The Requesting Party, within 7 days of the receiving the Producing Party’s 3 proposed terms, may request revisions to the Producing Party’s proposed terms and may 4 request no more than twenty (20) additional search terms per side to be used in connection 5 with the search of email or other ESI that the Requesting Party in good faith believes will 6 return a reasonably high proportion of responsive documents without overbreadth or undue 7 burden. The foregoing limit assumes that the Producing Party has made good faith efforts 8 to develop a robust initial set of proposed search terms, and the Court may consider the 9 scope and reasonableness of the initial proposed search in considering requests for further 10 searches. Notwithstanding this limit, the parties shall cooperate to minimize and narrow 11 disputes, and meet and confer as necessary, to ensure that their search proposals identify 12 responsive documents while avoiding overbreadth or undue burden, including agreeing to 13 increase the limit on search terms if needed without Court leave. The Court may consider 14 and grant contested requests for additional search terms, upon a showing that additional 15 search terms are likely to identify relevant and responsive documents without overbreadth 16 or undue burden and in view of the adequacy of the Producing Party’s initial proposed 17 terms. 18 d. Upon receipt of the Requesting Party’s search terms, the Producing Party shall 19 use the search terms proposed by the Requesting Party unless the Producing Party objects 20 to the use of a given term within 7 days and explains the basis of its objection. Where 21 possible, the Producing Party shall propose with its objection revisions to the search terms 22 or other computer or technology-aided methodology in an effort to resolve or narrow its 23 objections. 24 e. The parties shall meet and confer in good faith to resolve any disputes that 25 may arise over the search terms and/or the use of other technology-aided methodology and 26 to ensure the terms are sufficiently tailored to capture documents relevant to the above- 27 captioned litigation. The parties shall work cooperatively to minimize and narrow disputes 28 and ensure that their respective searches identify responsive documents while avoiding 3 17-cv-01394-H-NLS 1 overbreadth or undue burden. If the parties cannot resolve their dispute regarding search 2 terms and/or the use of other computer- or technology-aided methodology after reasonable, 3 thorough good faith negotiations, the Requesting Party may seek relief from the Court in 4 accordance with the Court’s discovery dispute procedures. 5 f. A Producing Party may amend its search terms at any time if any term in good 6 faith appears to be overly broad, either in general or as applied to a particular custodian or 7 custodial data source. The Producing Party shall notify the Requesting Party of its 8 amendment and whether the amendment will apply to searches of all custodians or only 9 with respect to particular custodians or custodial data sources. The parties agree to the 10 same dispute resolution procedures set forth in paragraph (e) above with respect to any 11 such amendment. 12 g. The parties recognize that discovery is an iterative process. A Requesting 13 Party may therefore request the use of supplemental search terms (up to a cumulative total 14 limit of fifteen (15) supplemental search terms for each side) at any time prior to thirty (30) 15 days before the date set by the Court for substantial completion of document discovery if 16 i) discovery reveals information that in good faith indicates supplemental term(s) will 17 capture relevant, responsive documents and are not cumulative of previous searches or ii) 18 the Requesting Party serves additional noncumulative discovery requests necessitating 19 additional searches. The Requesting Party must identify the specific custodians and time 20 periods it requests be searched using the supplemental search term(s). The parties may 21 jointly agree to modify this limit without the Court’s leave. The foregoing limitation does 22 not modify each party’s existing independent obligations under Fed. R. Civ. P. 26(e) to 23 ensure that its discovery disclosures are not incomplete or incorrect in any material respect, 24 including by conducting additional searches as necessary. The Court may consider and 25 grant contested requests for additional supplemental search terms, upon a showing that 26 relevance or materiality of such search terms could not have been reasonably known when 27 the parties negotiated their initial search terms and are likely to identify noncumulative 28 relevant and responsive documents without overbreadth or undue burden, taking into 4 17-cv-01394-H-NLS 1 account the progress of discovery and the proximity of the request to discovery deadlines. 2 The same dispute resolution procedures set forth in paragraph (e) above applies with 3 respect to supplemental terms or if a Requesting Party seeks Court approval of additional 4 supplemental search terms beyond the limit as to number of terms or time of request set 5 forth above. 6 5. Custodian Collection: The parties will negotiate in good faith to identify and 7 limit the number of custodians whose data (both email and user-generated data) is 8 collected. The Requesting Parties can request collection and search of data from up to a 9 total of ten custodians per side from the Producing Parties. The parties may jointly agree 10 to modify this limit without the Court’s leave. The Court may consider contested requests 11 for additional custodians per side, upon showing a distinct need based on the size, 12 complexity and issues of this specific case. 13 6. Non-Custodial ESI Collection: Nothing in this Order shall require a 14 producing party to utilize any particular collection protocol for any particular source of 15 Non-Custodial ESI. For avoidance of doubt, targeted collection may be used to collect 16 potentially relevant documents from any Non-Custodial ESI data source. 17 7. System File Filtering: The parties will use their best efforts to filter out 18 common system files and application executable files by using a commercially reasonable 19 hash identification process. Hash values that may be filtered out during this process are 20 located in the National Software Reference Library (“NSRL”) NIST hash set list. 21 8. Deduplication: A party is only required to produce one copy of each 22 responsive document and a party may de-duplicate responsive ESI (based on MD5 or SHA- 23 1 hash values at the document level) on a global scale as long as the Producing Party has 24 the ability to, and does, provide information identifying the other custodians who possessed 25 any given record or ESI, for example in a “custodian” meta data field. Alternatively, a 26 party may elect to de-duplicate each custodian’s responsive ESI and may de-duplicate the 27 party’s non-custodial ESI (based on MD5 or SHA-1 hash values at the document level). 28 To the extent emails are produced, the following procedures shall apply. For emails with 5 17-cv-01394-H-NLS 1 attachments, the hash value is generated based on the parent/child document grouping. To 2 the extent that de-duplication through MD5 or SHA-1 hash values is not possible, the 3 parties shall meet and confer to discuss any other proposed method of de-duplication. 4 9. Production Specifications and Format: The parties have agreed to produce 5 documents using the format described in the ESI Protocol attached to the Joint Discovery 6 Plan. To the extent that circumstances require a party to produce documents in a format 7 other than the format described in the ESI Protocol, e.g. prior or to or during a deposition 8 or other proceeding, the Producing Party will produce the documents in the agreed format 9 shortly thereafter. 10 10. Preservation of Discoverable Information: A party has a common law 11 obligation to take reasonable and proportional steps to preserve discoverable information 12 in the party’s possession, custody or control. Absent a showing of good cause, the parties 13 shall not be required to modify, on a going-forward basis, the procedures used by them in 14 the ordinary course of business to back-up and archive data; provided, however, that the 15 parties shall preserve discoverable information currently in their possession, custody or 16 control. 17 11. The parties agree that, absent good cause, the following categories of 18 information need not be preserved nor searched: (1) deleted, slack, fragmented, or other 19 data only accessible by forensics; (2) random access memory (RAM), temporary files, or 20 other ephemeral data that are difficult to preserve without disabling the operating system; 21 (3) on-line access data such as temporary internet files, history, cache, cookies, and the 22 like; (4) data in metadata fields that are frequently updated automatically, such as last- 23 opened dates; (5) data stored on disaster recovery tapes, back-up tapes or other back-up 24 data not otherwise accessed in the normal and ordinary course of business; (6) voice 25 messages; (7) instant messages that are not ordinarily printed or maintained in a server 26 dedicated to instant messaging; (8) electronic mail or pin-to-pin messages sent to or from 27 mobile devices (e.g., smart phones), provided that a copy of such mail is routinely saved 28 elsewhere; (9) other electronic data stored on a mobile device, such as calendar or contact 6 17-cv-01394-H-NLS 1 data or notes, provided that a copy of such information is routinely saved elsewhere; (10) 2 logs of calls made from mobile devices; (11) server, system or network logs; (12) electronic 3 data temporarily stored by laboratory equipment or attached electronic equipment, 4 provided that such data is not ordinarily preserved in the ordinary course of business or as 5 part of a laboratory report; (13) unindexed electronic data generated by laboratory 6 equipment and kept in a proprietary / non-standard file format provided that such data is 7 not ordinarily preserved in the ordinary course of business or as part of a laboratory report; 8 or (14) data remaining from systems no longer in use that is unintelligible on the systems 9 in use. Nothing in this section shall limit a Requesting Party’s right to request from a 10 Producing Party more information about the nature of and burden associated with obtaining 11 documents from a particular location. 12 12. Third-Party Confidentiality Obligations: To the extent that relevant ESI or 13 other documents sought for production implicate confidentiality obligations owed to third- 14 parties (“Protected Third-party Information”), the Producing Party will negotiate with 15 those third-parties in good faith to secure the third-party’s approval for production of the 16 Protected Third-party Information. To the extent that the Producing Party is unable to 17 secure approval from the third-party, the Producing Party will promptly inform the 18 Requesting Party of the existence of the Protected Third-party Information and the contact 19 information for the third party such that the Requesting Party is able to negotiate with the 20 third-party and, if necessary, seek appropriate relief from the Court. 21 IT IS SO ORDERED. 22 DATED: December 22, 2017 23 24 MARILYN L. HUFF, District Judge UNITED STATES DISTRICT COURT 25 26 27 28 7 17-cv-01394-H-NLS

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?