Aronstein et al v. Thompson Creek Metals Company Inc. et al

Filing 77

STIPULATION AND ORDER REGARDING DISCOVERY OF ELECTRONICALLY-STORED INFORMATION by Magistrate Judge Nina Y. Wang on 10/15/15. (bsimm, )

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. 1:15-cv-00204-RM-NYW DAVID ARONSTEIN and LESLEY STROLL, Plaintiffs, v. THOMPSON CREEK METALS COMPANY INC., KEVIN LOUGHREY, PAMELA SAXTON, PAMELA SOLLY, JAMES L. FREER, JAMES P. GEYER, TIMOTHY J. HADDON, CAROL T. BANDUCCI, THOMAS J. ONEIL, DENIS C. ARSENAULT, AND WENDY CASSITY Defendants. STIPULATION AND [PROPOSED] ORDER REGARDING DISCOVERY OF ELECTRONICALLY-STORED INFORMATION Plaintiffs and Defendants submit this e-discovery protocol in accordance with the Court’s orders dated April 3, 2015 (Dkt. 47) and April 28, 2015 (Dkt. 52). [Defendants would include the following (Plaintiffs object to this language): This Stipulation and Proposed Order will does not independently require specific actions by either party to identify, gather and prepare specific ESI for production to the opposing party. Such obligations will not be required unless the Court authorizes discovery to proceed in this case, and until the Court rules on Defendants’ objection, under proportionality principles, to the cost of producing ESI based on consideration of: a) the potential relevance of ESI (including email production) to the legal and factual issues Plaintiffs have raised in their complaint, in comparison to b) the estimated cost of retrieving the information. Defendants request that the Court require Plaintiffs to share in the cost of Defendants’ production of ESI to give them an incentive to avoid placing unnecessary burden and expense on Defendants.] [Plaintiffs would include the following additional language: By the Court’s ORDER (Doc 47), “Parties will be REQUIRED to submit an e-discovery protocol at the time of the Status Conference”. This Stipulation and Proposed Order Regarding Discovery of Electronically Stored Information stands alone as a Document REQUIRED to be produced by the Court. It exists in and of itself and need not speak at all to Defendants’ request for a Stay of Discovery, which is pending before the Court, and due to be additionally briefed at Oral Argument on May 11, 2015. Plaintiffs do not believe that the arguments advanced by Defendants in the preceding paragraph, at all belong within this document.] This Stipulation and Proposed Order Regarding Discovery of Electronically Stored Information shall be the governing document by which the parties and the Court manage the production of electronically stored information ("ESI") in this action. All parties shall be under an obligation to take reasonable steps to comply with this Stipulation and Proposed Order. This Stipulation and Proposed Order does not constitute an agreement on what cost-sharing from Plaintiffs, if any, will be appropriate for Defendants’ production of ESI. The parties will seek guidance from the Court in the future on that issue if they cannot reach agreement between themselves. The parties and the Court recognize that this Stipulation and Proposed Order is based on facts and circumstances as they are currently known to each party, that the discovery process is iterative, and that additions and modifications to this Stipulation and Proposed Order may become necessary as more information becomes known to the parties. Nothing in this Stipulation 2 and Proposed Order will be interpreted to require disclosure of documents or information protected from disclosure by the attorney-client privilege, work-product doctrine or any other applicable privilege or immunity. All parties preserve such privileges and there is no intent through either this Stipulation and Proposed Order or the production of documents or information hereunder to waive or weaken such privileges. I. Definitions. A. “Meta-Data” means: (i) information embedded in a Native File that is not ordinarily viewable or printable from the application that generated, edited, or modified such Native File; and (ii) information generated automatically by the operation of a computer or other information technology system when a Native File is created, modified, transmitted, deleted or otherwise manipulated by a user of such system. Meta-Data is a subset of ESI. B. “Native File(s)” means ESI in the electronic format of the application in which such ESI is normally created, viewed and/or modified. Native Files are a subset of ESI. C. “Static Image(s)” means a representation of ESI produced by converting a Native File into a standard image format capable of being viewed and printed on standard computer systems. In the absence of agreement of the parties or order of the Court, a Static Image should be provided in either Tagged Image File Format (TIFF, or .TIF files) or Portable Document Format (PDF). If load files were created in the process of converting Native Files to Static Images, or if load files may be created without undue burden or cost, load files should be produced together with Static Images. 3 II. ESI Retention and Identification Protocol. 1. Custodians: The parties will collect potentially responsive ESI from the following custodians: a. For Plaintiffs: David Aronstein and Lesley Stroll. b. For Defendants: Each of the defendants who has entered an appearance in this case: Defendants Thompson Creek Metals Company Inc. (“TCM”), Kevin Loughrey, Pamela Saxton, Pamela Solly, James L. Freer, Timothy J. Haddon, and Wendy Cassity, and the following two additional people: Scott Shellhaas (former President and COO) and Mark Wilson (current Chief Commercial Officer). Defendants object to the cost and burden of including as additional custodians anyone who was involved with accounting or project management for the Mt. Milligan Mine project—that goes beyond the allegations in Plaintiffs’ Amended Complaint. [Plaintiffs would include the following (Defendants object to this language): Other ESI custodians for Defendants will include: any other persons that may subsequently be identified, as having been materially involved in the creation, dissemination and vetting of TCM’s Investor Presentations, or accounting and project management, as specifically related to the development of the Mt Milligan Mine, whose construction and financing is at the core of Plaintiffs Complaint.] 2. Description of Information Systems: a. For Plaintiffs: Plaintiffs maintain control over three servers that were used in the day to day trading operations of Tri-State Modeling LLC, the entity through which Plaintiffs purchased and sold 4 their shares in Thompson Creek Metals. A hard copy of the source code for Plaintiff Aronstein’s valuation model has been created. Additionally, an electronic copy still exists. Plaintiffs’ email accounts were all maintained by third party providers and accessible through the Internet. Those accounts remain open. Those accounts were key word searched, and all emails that were possibly relevant to the complaint have been converted to hard copy. The original electronic versions of those emails remain. Plaintiffs have maintained copies of TCM’s Investor Presentations that were in their possession at the time Plaintiffs sent their demand letter to TCM. Plaintiffs have requested, from Lime Brokerage, and have received, documents reflecting all the trading activity in TCM during the period. b. For Defendants: (information as of 2012 when Plaintiffs’ demand letter was received and the Company took actions to preserve potentially relevant documents): Thompson Creek had approximately 50 people working in its Colorado headquarters during 2011 and 2012. Those employees used the Microsoft suite of computer applications (Outlook, Word, Excel, PowerPoint). Most employees keep their older emails. Therefore, older information generally is stored on currently accessible computer files. Thompson Creek sent out a document hold memo to its employees on May 30, 2012 (after receiving Plaintiffs’ May 17, 2012 demand letter), with an updated document hold memo sent on February 25, 2014 (after Plaintiffs filed this lawsuit). Those memos advised employees to retain, and not discard, categories of documents potentially relating to Plaintiffs’ allegations and claims. 5 i. Word, Excel, PowerPoint documents: The Company encourages employees to keep computer files such as Word, Excel, or PowerPoint documents on a central document server. Some employees who travel frequently store some of their documents on the local hard drive of their Company-issued computer so the current version of the file is easily accessible when traveling. ii. Emails: As of 2012, Thompson Creek used a Microsoft “Exchange” email server hosted by a third-party vendor, and Windows Outlook software to store emails sent to, and received by, company employees. There was no automatic delete function in place. Each employee managed retention of his or her own emails. To preserve emails in existence as of the time Thompson Creek received Plaintiffs’ demand letter, the Company’s information technology department created a hard-drive file with a copy of Company emails for certain employees with responsibility for the matters alleged in the complaint in existence as of May 2012. If emails are produced in this case, they would be produced either from individual employees’ Outlook files, or, if necessary, from the copy of email files stored on that hard-drive, or any other repository, from which responsive emails can be gathered, that is ‘Reasonably Accessible.’ iii. Disaster recovery back-up system: Thompson Creek’s information technology group performs a daily full back-up of nonemail files on shared computer drives (it has a de-duplicating function so that it only picks up new or revised documents each day). This back-up is a disk-to-disk process and the backup is 6 stored on a server device. This is a disaster recovery back-up only; the stored data are not readable but they can be restored at significant expense if necessary. The Company does not regard its disaster recovery “back-up” file as reasonably accessible for purposes of Fed. R. Civ. P. 26(b)(2)(B), and objects to the large cost and burden of producing files from that system. That system is maintained for the purpose of disaster recovery and is not intended to function as a server from which documents can be routinely retrieved. Nevertheless, to preserve a copy of all the non-email documents and data that were being held as of the date Plaintiffs filed this lawsuit in Connecticut in February 2014, Thompson Creek’s information technology department restored the documents that were saved in this system as February 2013 (one year before), and copied those restored files into a separate secure folder on a company server. If non-email ESI is produced in this case, it will be drawn from shared computer servers or individual employees’ computer folders, or any other repository, from which responsive emails can be gathered, that is ‘Reasonably Accessible.’ Thompson Creek’s Canadian office also keeps disaster recovery computer back-ups that reach back ten years. Those files could be accessed, at significant expense, if necessary. Thompson Creek does not regard those back-up files maintained by its Canadian office as reasonably accessible for purposes of Fed. R. Civ. P. 26(b)(2)(B), and objects to the large cost and burden of producing files from that system. That system is maintained for the purpose of disaster recovery and is not intended to function as a server from which documents can be routinely retrieved. 7 iv. Computer files from departing employees: During 2011 and 2012, when employees left Thompson Creek, the Company made a copy onto a network drive of all the local files on a that person’s hard drive to preserve a copy of those files, and then gave the computer to the employee as a departing gift. The Company also has created a “pst” archive file of a departing employee’s emails and saved that archived file. Kevin Loughrey retired from the company in October 2013, before this lawsuit was filed. Because Mr. Loughrey used an Apple computer (with a different operating system than Windows computers), his hard-drive files were not copied to a company server when he retired. Therefore, when Plaintiffs filed this lawsuit in February 2014, the company directed Mr. Loughrey to retain and preserve any potentially relevant files that were stored on the hard drive of the Thompson Creek computer that he took with him when he retired. [Plaintiffs would include the following (Defendants are checking on this question): Plaintiffs request that Defendants provide information about how Defendant Loughrey moved data to and from his Apple computer during his course of employment, and furthermore, what steps if any were taken at the time of Plaintiffs’ demand letter, to preserve any relevant information contained on that computer.] 4. Keyword Search Terms: Plaintiffs are not seeking to begin the process concerning Keyword Search Terms described in this section at this time, and may delay that process until after other initial discovery work is completed. a. The parties shall exchange lists of keyword search terms they propose to use to search for responsive documents. The parties agree to limit such terms to those likely to yield 8 information relevant to the claims and defenses in this litigation, based on the allegations in Plaintiffs’ Amended Complaint and Defendants’ Motion to Dismiss (Dkt. 22). b. The parties agree to meet and confer (by telephone) to discuss the use of agreed- upon keyword search terms. c. Within 14 days of meeting and conferring to discuss the use of agreed-upon key word searches, as referenced in paragraph 4.b. above, the parties shall exchange any proposed edits and/or additions to the proposed lists of search terms. The parties shall endeavor to come to an agreement regarding proposed keyword search terms. If the parties are unable to do so, they may present any issues for resolution by Magistrate Judge Wang in accordance with Local Rule 7.1. 5. Document Requests seeking ESI: The parties shall meet and confer (by telephone) when they are ready to discuss with respect to particular discovery requests, whether, or to what extent, the obligation to conduct a reasonable search for ESI documents in response to propounded discovery requests shall be deemed to be satisfied by producing responsive, non-privileged documents that are captured by using the agreed-upon keyword search terms, applied to agreed-upon custodians and agreedupon computer systems and/or servers, augmented by manual review as the parties may deem appropriate. Nothing in this Order shall be construed to waive the parties’ right to object to the scope of particular discovery requests or to review their own documents for responsiveness or privilege. The parties also further agree to undertake reasonable efforts to produce identifiable 9 categories of responsive, non-privileged documents not captured by the search terms, subject to the meet and confer described at the beginning of this paragraph. III. ESI Production Protocol. The parties will produce any ESI to each other in digital form according to the specifications in Exhibit A below. IV. Privilege Logs. The parties agree that isolation, review, redaction and logging of privileged communications can be costly and time-consuming. To limit the cost of a privilege review and make document production more efficient, the parties agree to use the protocols described below with respect to handling responsive documents that may include privileged information. The parties need not identify, on any privilege or work product log in response to document requests, privileged documents constituting: a. communications between any party, and counsel for that party (other than between Thompson Creek employees, and in house counsel for Thompson Creek), that (a) were for the purposes of litigating this case, or were in anticipation of litigation regarding the allegations made by the Plaintiffs in this litigation; (b) post-date the establishment of an attorney-client relationship between counsel and the party; and (c) were not disclosed to anyone who, at the time of the disclosure, was a third party to the attorney-client relationship; b. communications solely between counsel for Plaintiffs, or communications solely between counsel for Defendants, that post-date the establishment of an attorneyclient relationship between each such attorney and his or her client(s)); 10 c. communications between attorneys or their agents and litigation experts or consultants; and d. documents created by then-current counsel (or by any employee or agent of then-current counsel) for the purpose of litigating this case, or in anticipation of litigation relating to Plaintiffs’ allegations in this case, and not disclosed to anybody who, at the time of the disclosure, was not a client of the firm creating the document at issue, an attorney for aligned parties in this case or those attorneys’ employees, or a consultant or expert described in sub-paragraph (c) above. Neither party will treat the failure to log such documents as a waiver of any privilege or protection. Privilege or protection claims as to communications between a party and counsel may initially be logged by category, provided that the log includes sufficient information to evaluate or challenge any claim of privilege or protection. If any party disagrees that the log provides sufficient information to evaluate or challenge the claim of privilege or protection, that party may request further information, and the party claiming the privilege or protection must provide the information required by Rule 26(b)(5) or other applicable law. The parties request that the Court approve as an order of the Court under Fed. R. Evid. 502(d) & (e) the following agreement concerning inadvertent production of privileged documents: 1. Under Federal Rule of Evidence 502(d), the disclosure of a communication or information covered by the attorney-client privilege or work-product protection does not operate as a waiver of any such privilege or protection as to the disclosed communication or information, 11 nor does it operate as a waiver with respect to disclosed or undisclosed communications or information concerning the same or similar subject matter. 2. The parties agree to be governed by Federal Rule of Civil Procedure 26(b)(5)(B) with respect to claims of privilege and Federal Rule of Evidence 502(b) with respect to inadvertent production of privileged materials. The parties will abide by the following procedure in connection with any inadvertent production of privileged materials: A. If a producing party has a good faith belief that a privileged document has been inadvertently produced, it shall notify the receiving party of the producing party’s claim of privilege within sixty (60) days after the producing party actually discovers that such inadvertent production was made. B. Upon receipt of any notice claiming privilege with respect to a produced document, all other parties (regardless of whether they agree with the producing party’s claim of privilege) shall promptly: 1). Use reasonable efforts to destroy or sequester all copies of the inadvertently produced documents or material in such parties’ possession, custody, or control, and notify the disclosing party that they have done so; and 2). Notify the producing party that they have taken reasonable steps to retrieve and destroy or sequester the inadvertently produced documents or material from other persons, if any, to whom such documents or material have been provided, consistent with Rule 26(b)(5)(B). C. To the extent a receiving party disputes the producing party’s claim of privilege, the receiving party shall notify the producing party of its position within ten 12 (10) business days of receiving the producing party’s notice (the “Dispute Notification”). Within ten (10) business days of receiving the Dispute Notification, the parties shall meet and confer in an effort to resolve their disagreement. If the parties are unable to resolve their disagreement, the parties may submit the issue to the Court for a determination, submitting any document(s) in dispute under seal in compliance with Rule 26(b)(5)(B), and any relevant agreements or Court orders. See Fed. R. Evid. 502(d)-(e). [Plaintiffs would include the following (Defendants object to this language): V. Reasonably Accessible. No party should object to the discovery of ESI pursuant to Fed.R.Civ.P. 26(b)(2)(B) on the basis that it is not reasonably accessible because of undue burden or cost unless the objection has been stated with particularity, and not in conclusory or boilerplate language. Wherever the term “reasonably accessible” is used in this Protocol, the party asserting that ESI is not reasonably accessible should be prepared to specify facts that support its contention. VI. Limitations. Nothing in this Stipulation and Proposed Order shall prohibit a party from seeking modification of any of its terms either by stipulation or by application to the Court. Should any party subsequently determine that it cannot in good faith proceed as required herein or without undue burden and cost, the parties will meet and confer to attempt to resolve any dispute before seeking intervention by the Court. 13 This Stipulation and Proposed Order relates to the general protocol of identifying and producing ESI, and is not otherwise intended to alter the parties’ respective rights and obligations under the Federal Rules of Civil Procedure. The parties may stipulate or any party may bring a motion to modify or clarify the application of this Stipulation and Proposed Order to a particular document or set of documents, particular set of ESI, or otherwise. DATED: October 15, 2015 BY THE COURT: s/ Nina Y. Wang United States Magistrate Judge APPROVED: Dated: May 4, 2015. Respectfully submitted, s/ Gregory J. Kerwin Gregory J. Kerwin Allison K. Kostecka GIBSON, DUNN & CRUTCHER LLP 1801 California Street, Suite 4200 Denver, CO 80202 Telephone: (303) 298-5700 FAX: (303) 313-2829 Email: gkerwin@gibsondunn.com Email: akostecka@gibsondunn.com Attorneys for Defendants Thompson Creek Metals Company Inc., Kevin Loughrey, Pamela Saxton, Pamela Solly, James L. Freer, Timothy J. Haddon, and Wendy Cassity. s/ Michael M. Strage Michael M. Strage LAW OFFICE OF MICHAEL STRAGE 14 730 Fifth Avenue, Suite 1901 New York, New York 10019 Telephone: (646) 642-0701 Email: michaelstrageesq@gmail.com Attorneys for Plaintiffs David Aronstein and Lesley Stroll. 15 EXHIBIT A Format for digital production of ESI The parties are discussing whether to produce documents to each other as scanned pdf files (except for spreadsheets, and any Documents that have previously been transmitted to unaffiliated third parties, that would be produced as Native Files), rather than go to the expense of producing images and load files in the manner described below. They may be able to reach agreement to forego the procedures for digital document production as described in the paragraphs below. A. TIFF Image Files: Except for all SpreadSheets, or, any Documents that have previously been transmitted to unaffiliated third parties, the parties agree that all Documents will be produced as single-page black and white Group IV TIFF image files of at least 300 dpi resolution, except as provided in section B. Page size shall be 8.5 x 11 inches unless, in the reasonable judgment of the producing party, a particular item requires a different page size. Each image file will use the Bates number of the page as its unique file name. Original document orientation as displayed in the native file should be maintained in the TIFF image (e.g., portrait to portrait and landscape to landscape). For all SpreadSheets, or, any Documents that have previously been transmitted to unaffiliated third parties, parties agree that they will be provided as Native Files. B. Text Files: Each Document produced under this order shall be accompanied by a single, multipage text file containing all of the text for that item, not one text file per page. Each text file shall be named using the Bates number of the first page of the corresponding production item. i. OCR: The text for each hard copy document shall be generated by applying optical character recognition (OCR) technology to the scanned image of the document. The parties will endeavor to generate accurate OCR and will utilize quality OCR processes and technology. The parties acknowledge, however, that due to poor quality of the originals, not all documents lend themselves to the generation of accurate OCR. ii. ESI: The text of each ESI item shall be extracted directly from the ESI native file. To the extent that is not technically possible (e.g., the underlying native file is an image file), the text for each ESI item shall be generated by applying OCR to the native file under the provision above. For contacts and calendars collected and/or processed, user modifiable fields should be extracted and produced as text. iii. Redacted Text: The text file corresponding to a redacted document may be generated by applying OCR to the redacted TIFF file under the provision above. iv. Foreign Language Text: The parties will make reasonable efforts to ensure that all technologies and processes used to collect, process and produce the text of any Document- including all TIFF conversion and OCR processes, and the extraction of text from native files - preserves all foreign language text, punctuation and other characteristics as they exist in the source native file. C. Bates Numbering: i. Each TIFF image produced under this order must be assigned a Bates number that must always: (1) be unique across the entire document production; (2) maintain a constant length of nine numeric digits (including 0-padding) across the entire production; (3) contain only alphanumeric characters, no special characters or embedded spaces; and (4) be sequential within a given document. ii. If a producing party skips a Bates number or set of Bates numbers in a production, the producing party will identify any such gap within 14 days of each production or 14 days after noticing the gap, whichever is later. The producing party need not provide a placeholder (e.g., gap sheet, dummy image) within the production. iii. The producing party will brand all TIFF images with its corresponding Bates number, using a consistent font type and size. Parties will make reasonable efforts to avoid obscuring any part of the underlying image with the Bates number. D. Color: If a receiving party finds the black and white version of a Document insufficient, the receiving party may request that the producing party provide a color image. The producing party will not unreasonably deny a request to provide a color image after the requesting party demonstrates good cause for requesting a color image. If a producing party converts a document to color image in response to a request from a receiving party, the producing party shall do so in JPEG, TIFF or such other format as agreed with the receiving party. E. Confidentiality Designations: If a particular Document has a confidentiality designation, the designation shall be stamped on the face of all TIFF images pertaining to the Document. The confidentiality designation should also be reflected in the “Confidentiality” field. F. Load Files: All productions will be provided with Concordance image and data load files. The image load file must reference each TIFF file in the corresponding production, and the total number of TIFF files referenced in the load file must match the total number of image files in the production. The total number of documents referenced in a production’s data load file should match the total number of designated document breaks in the corresponding image load file for that production. [Plaintiffs would include the following provision (Defendants object to this provision and believe both Plaintiffs and Defendants can retain vendors to prepare ESI images and load files based on this Protocol): 2 Plaintiffs do not have access to any kind of software to enable the production of Concordance image or data load files. Plaintiffs are willing to forward electronic copies of relevant emails, their valuation model, and or trading records as have been provided by Lime Brokerage] G. Fields: i. Documents shall be produced with the following fields regardless of whether the fields may be populated automatically from the native file or created using an automated process: (a) BegBates, (b) EndBates, (c) BegAttach, (d) EndAttach, (e) Custodian, (f) SourceParty, (g) NativeFileLink (for ESI only), (h) AttachRange, (i) Confidentiality, G) RecordType, and (k) Redacted. ii. ESI shall be processed to reflect the date and time standardized for the UTC/GMT time zone. 3

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?