Total Safety U.S., Inc. v. Rowland

Filing 174

ORDERED that 103 Second Motion to Compel Compliance with the Protocol is GRANTED as stated herein. Signed by Magistrate Judge Karen Wells Roby. (cml)

Download PDF
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF LOUISIANA TOTAL SAFETY U.S., INC. CIVIL ACTION VERSUS NO: GARY ROWLAND, ET AL. SECTION: "B" (4) 13-6109 ORDER Before the Court is Plaintiff, Total Safety U.S., Inc.’s (“Total Safety”) Plaintiff’s Second Motion to Compel Compliance with the Protocol (R. Doc. 103). The motion is opposed. See R. Doc. 119 & 121. A reply was filed. See R. Doc. 130. A sur-opposition was also filed. See R. Doc. 140. The motion was filed on February 18, 2014, and referred to the undersigned on April 7, 2014. See R. Doc. 144. The matter was rescheduled to be heard with oral argument on April 23, 2014. I. Background This case arises from Defendant Gary Rowland’s (“Rowland”) decision to leave his employment with Plaintiff, Total Safety (“Total Safety”) for that of 24 Hour Safety in October of 2013. See R. Doc. 1, p. 1. Rowland resigned on October 6, 2013, and Total Safety initiated this suit four days later, asserting a single claim for breach of an employment agreement and seeking injunctive relief restraining Rowland from working for 24 Hour Safety in certain regards. Id. at 10-13. The employment agreement was originally signed in 2005 and contained restrictive covenants under which Rowland agreed to refrain from certain competitive activities (hereinafter referred to as the “Employment Agreement”) Id. at 2-7. Generally, those covenants provided that Rowland would neither work for Total Safety's competitors nor solicit its employees to the same within certain geographical areas, which were mostly defined in terms of Louisiana Parishes. Id. Calcasieu Parish was not within those geographical areas. After a telephone hearing, the Court granted Plaintiff's TRO request on October 11, 2013. See R. Doc. 7. Ten days later, on Rowland's motion and with his consent, the Court extended the TRO by two weeks and continued a previously scheduled preliminary injunction hearing by roughly the same period. See R. Doc. 17. On October 21, 2013, just two days after the TRO was extended, Total Safety filed a First Amended Complaint, alleging that Rowland not only breached his Employment Agreement, but that he acted in concert with 24 Hour Safety to steal valuable trade secrets and confidential information before his October resignation. See R. Doc. 18. The Amended Complaint added 24 Hour Safety as a defendant and asserted claims for (i) Breach of Employment Agreement, (ii) Misappropriation of Confidential Information and Trade Secrets, (iii) Unfair Trade Practices, (iv) Conversion, (v) Breach of Fiduciary Duty, (vi) Conspiracy, (vii) Violation of the Computer Fraud and Abuse Act, and (viii) Violation of the Federal Stored Communications Act. Id. The Amended Complaint was also accompanied by a Motion for renewed and expanded injunctive relief restricting Rowland from competing in any way with Total Safety. See R. Doc. 19. Concurrent with the Amended Complaint, Total Safety also filed a Motion for Contempt, contending that Rowland violated the TRO then in place by working for 24 Hour Safety and soliciting Total Safety's customers within restricted areas. See R. Doc. 20. Thereafter, on October 28, 2013, after a second telephonic hearing, the Court granted the new TRO request in part and 2 enjoined Rowland from working in geographic areas covered by the Employment Agreement and from soliciting Total Safety's customers within the same area, but denied it to the extent it sought injunctions on a national or company-wide level. See R. Docs. 30 & 33. On December 18, 2013, the Court entered a Preliminary Injunction against Rowland, limited in scope to the terms set forth in the 2005 Employment Agreement, and granted Total Safety’s motion for contempt as to Rowland, but denied it as to 24 Hour Safety. See R. Docs. 84, 95, & 96. Thereafter, on February 12, 2014, the Court issued a “Preliminary Injunction Order” prohibiting Rowland from rendering any services to or for 24 Hour Safety or any competing business in areas the Court found to be “restricted areas” and prohibited a host of other actions on behalf of Rowland. See R. Doc. 95-96. Also on February 12, 2014, the Court issued an Order for Contempt and Appointing Special Master Monitor Compliance with the Preliminary Injunction Order, appointing Brian Roux, to act as a special master to monitor Rowland’s compliance with this Court’s preliminary injunction. See R. Doc. 96. As to the instant motion, on February 18, 2014, Total Safety filed its second motion to compel compliance with the protocol, contending that on October 28, 2013, this Court granted their request for forensic examinations and ordered the parties to submit a corresponding protocol by October 29, 2013. See R. Doc. 103. After negotiating the terms, the parties agreed upon the protocol that Total Safety filed with the Court. Id., at p. 1; citing R. Doc. 31-1, pp. 28-37. Total Safety contends that the “Protocol” reflects the agreed-upon scope and procedures for the Court ordered forensic examinations, which identified the digital forensic company, RVM, Inc., as Total Safety’s Forensic Vendor, to which both Rowland and 24 HR Safety had “no objection.” See R. Doc. 103-1, p. 2, citing R. Doc. 31- 1, p. 26 ¶ 1. Total Safety contends that Rowland and 24 3 HR Safety retained its own digital forensic company, Avansic, to oversee RVM’s examinations and assist with Rowland’s and 24 HR Safety’s review/production of the forensic files. Id. at p. 3. Total Safety contends that the parties agreed that RVM would meet with Rowland and 24 Hour Safety on November 1, 2013, so that RVM could create forensic images of certain computers, devices, and email accounts for various custodians. Total Safety contends that the initial examinations occurred simultaneously at two different locations: one in Deer Park, Texas, (“Deer Park”) and in Geismar, Louisiana (“Geismar”). See R. Doc. 103-1, p. 3. However, after conducting these examinations, Total Safety argues that Defendants allegedly failed to comply with some of their production requests. See R. Doc. 103, p. 1. Therefore, on February 18, 2014, after conferring in accordance with Fed. R. Civ. P. 37, Total Safety filed the instant motion, alleging the following deficiencies with Defendants responses: (a) 24 HR Safety failed to provide Todd Dartez’s iPhone for forensic imaging during the initial collection and has not allowed Total Safety to re-image it; (b) 24 HR Safety has not allowed Total Safety to conduct a full examination of Amy Hains’s iPhone; (c) 24 HR Safety has produced none of the files collected from Hains’s external devices; (d) 24 HR Safety withheld at least 3,600 files from the email accounts of Trent Smith, Lamoine Reyes, and Jeff Ellenberg because they pre-date July 1, 2013; (e) 24 HR Safety withheld several thousand files based on relevance; (f) 24 HR Safety produced no log detailing which files were withheld—and the reasons why—from its employees’ computers and devices; and (g) Rowland and 24 HR Safety produced two privilege logs relating to files from email 4 accounts and Rowland’s devices—minus his discarded iPhone—without adequate descriptions that would allow Total Safety or this Court to access the privilege claim. As such, Total Safety requests that this Court order Defendants, 24 Hour Safety and Rowland to comply with the ESI protocol as follows: (a) Provide a time/place for RVM, Inc., to conduct forensic examinations of Dartez’s and Hains’s iPhones within five days of this Court’s order; (b) Produce all non-privileged files from Hains’s devices within 5 days of this Court’s order; (c) Produce all non-privileged files from the email accounts of Smith, Reyes, and Ellenberg that pre-date July 1, 2013 within five days of this Court’s order; (d) Produce all files withheld for relevance within five days of this Court’s order; (e) Produce all outstanding privilege logs within five days of this Court’s order; and (f) Amend the current privilege logs to provide adequate descriptions within 5 days of this Court’s order and further ensure that any outstanding privilege logs contain sufficient descriptions. II. Standard of Review Federal Rule of Civil Procedure (“Rule”) 26(b)(1) provides that “[p]arties may obtain discovery regarding any non-privileged matter that is relevant to any party’s claim or defense.” Fed. R. Civ. P. 26(b)(1). The Rule specifies that “[r]elevant information need not be admissible at the trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence.” Id. The discovery rules are accorded a broad and liberal treatment to achieve their purpose of adequately informing litigants in civil trials. Herbert v. Lando, 441 U.S. 153, 176 (1979). Nevertheless, discovery 5 does have “ultimate and necessary boundaries.” Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340, 351 (1978) (quoting Hickman v. Taylor, 329 U.S. 495, 507 (1947)). Furthermore, “it is well established that the scope of discovery is within the sound discretion of the trial court.” Coleman v. American Red Cross, 23 F.3d 1091, 1096 (6th Cir.1994). Under Rule 26(b)(2)(C), discovery may be limited if: (1) the discovery sought is unreasonably cumulative or duplicative, or is obtainable from another, more convenient, less burdensome, or less expensive source; (2) the party seeking discovery has had ample opportunity to obtain the discovery sought; or (3) the burden or expense of the proposed discovery outweighs its likely benefit. Id. In assessing whether the burden of the discovery outweighs its benefit, a court must consider: (1) the needs of the case; (2) the amount in controversy; (3) the parties’ resources; (4) the importance of the issues at stake in the litigation; and (5) the importance of the proposed discovery in resolving the issues. Id. at 26(b)(2)(C)(iii). Rule 26(b)(3) provides that “[o]rdinarily, a party may not discover documents and tangible things that are prepared in anticipation of litigation or for trial by or for another party in its representative (including the other party's attorney, consultant, surety, indemnitor, insurer, or agent).” Id. However, such materials may be discoverable when either allowed by Rule 26(b)(1), or when a party shows a “substantial need” for the information and that obtaining the information by another means would pose an “undue hardship.” Id. Rule 34 provides that a party may request another party to produce “any designated documents or electronically stored information ... stored in any medium from which information can be obtained.” Id. at 34(a)(1)(A). This request “must describe with reasonable particularity each item or category of items to be inspected.” Id. at 34(b)(1)(A). “The party to whom the request is directed must respond in writing within 30 days after being served.” Id. at 34(b)(2)(A). “For each 6 item or category, the response must either state that inspection ... will be permitted as requested or state an objection to the request, including the reasons.” Id. at 34(b)(2)(B). Although Rule 34 does not provide that untimely objections are waived, the Fifth Circuit has found that the waiver provision applies equally to Rule 34. See In re United States, 864 F.2d 1153, 1156 (5th Cir. 1989). III. Analysis Total Safety seeks this Court compel Defendants to produce (a) Todd Dartez’s iPhone for forensic imaging (b) Amy Hains’s iPhone; (c) files withheld based on 24 Hour Safety’s objections based on relevance and privilege and (d) privilege logs as to the documents which privilege has been claimed. The Court shall address each of Total Safety’s issues as set forth in its motion. A. Todd Dartez’s iPhone Total Safety contends that the first deficiencies in production occurred in violation of paragraph 3 of the protocol, which provided that “any computer, handheld device (like BlackBerries, iPhones, and iPads), external hard drive, and any other storage device utilized by Rowland, Dartez, or Hains after July 1, 2013, (collectively, the “Computers and Devices”) are subject to the Protocol. See R. Doc. 103-1, p. 3; citing R. Doc. 31-1, pp. 26-27, ¶ 3. Total Safety contends however that when the Deer Park team met Rowland, Dartez, Tony Aube - 24 Hour Safety’s IT officer, Kindall James - Rowland’s attorney, and Joel Sallee - an Avansic representative, they were only provided access to the following computers and devices: (1) Dartez’s C5120 Milano flip-phone; (2) Dartez’s 24 HR Safety computer; (3) Rowland’s iPhone 4s, for which Total Safety contends was discarded on November 10; (4) Rowland’s iPad; and (5) Rowland’s 24 Hour Safety computer. Therefore, Total Safety contends that it did not receive access to (1) Dartez’s iPhone and (2) could not collect usable images from Rowland’s iPhone 4S because 7 it was encrypted. See R. Doc. 103-1, p. 4. Total Safety contends that Dartez’s iPhone is relevant because it was used by Dartez after the July 1, 2013 relevancy date, which was defined by the parties. Therefore, Total Safety contends that the phone is subject to the Protocol. See R. Doc. 103-1, p. 8. As such, Total Safety contends that on October 30, 2014, counsel for 24 Hour Safety indicated that Dartez uses two phones, one of which is his iPhone. Id. However, RVM was not provided the iPhone for imaging at the inspection, nor has it since been provided the iPhone for inspection. Therefore, Total Safety seeks an Order from this Court to compel the inspection and production of Dartez’s iPhone 5s.1 In opposition, 24 Hour Safety contends that it should not have to produce Dartez’s iPhone for imaging because on October 30-31, 2013, email communications between the parties evidence that Total Safety was aware of the existence of Dartez’s iPhone, and its availability to be collected on November 1, 2013. See R. Doc. 121, p. 6. However, RVM, Total Safety’s forensic imaging experts failed to image the phone on November 1, 2013. As such, 24 Hour Safety contends that it should not be required to reproduce the phone for imaging when it was the fault of Total Safety’s forensic imaging expert that the phone was not properly imaged. During oral argument counsel for the Defendants indicated that Dartez had two phones, and during the inspection, their representative only imaged one of the phones but was unable to image the iPhone. As such, Dartez’s iPhone was never imaged or produced to Total Safety. Because the parties identified Dartez as one of the owner’s of 24 Hour Safety, and thus is a key player in this action, the Court found that Dartez’s iPhone is relevant and encompassed by the 1 \As to Rowland’s iPhone, Total Safety contends its team alerted everyone at the Deer Park site, including Rowland, James and Sallee about the encryption issue. Id. Total Safety filed a separate motion for sanctions on the encryption issue, which has since been denied as premature by the presiding District Judge. See id., citing R. Docs. 101, 144. 8 parties agreed upon protocol as a discoverable computer device. As such, Total Safety’s request to inspect the phone is granted. The inspection is to take place at the Deer Park site. The date of this examination will be confirmed in the Court’s Discovery Conference Order, which will be issued at a later date. B. Hains’s iPhone 5 Total Safety contends that at the Geismar inspection, its team met with Hains and 24 Hour Safety’s counsel, Eric Miller, and an Avansic representative, where RVM was provided the following computers and devices: (1) Hains’s iPhone, (2) Hains’s 24 Hour Safety Computer and (3) Hains’s external hard-drives. See R. Doc. 103-1, p. 4. However, upon inspection, Total Safety contends that its team was unable to collect usable images from Hains’s iPhone because it was corrupted. Id. at p. 8. Total Safety contends that it also notified the Avansic representative and sent them the exact images that RVM collected from Hains’s iPhone. Id. at 9, n. 5. However, Total Safety contends that as of yet, neither Avansic, nor 24 Hour Safety has provided usable files for production to Total Safety for this device. Id. at 9. Total Safety contends that it also requested that 24 Hour Safety re-produce Hains’s iPhone for imaging, but that they have failed to allow the requested imaging. Id. As such, Total Safety seeks an Order from this Court compelling usable images of Hains’s iPhone. In opposition, 24 Hour Safety contends that it has since produced all data from Amy Hains’s cell phone and computer, except for privileged communications, from July 1, 2013 to date. See R. Doc. 121, p. 1. It also contends that it is unsure why RVM was unable to obtain an uncorrputed image of Hains’ phone, as no issue with the imaging of the phone was reported until approximately three months after the initial image collection was performed. See R. Doc. 121, p. 7. Thus it 9 contends that it should not be required to produce information (1) which it has already produced and (2) which is due to an error of Total Safety’s expert. Id. During oral argument, counsel for Total Safety represented that its expert imaged Hains’s iPhone on site, but that once he went back to the computer lab to image the files, it realized that the data was corrupted and not readable. Counsel for Total Safety indicated that neither he, his client, or the IT personnel who imaged the phone knew the underlying reason why the file was corrupted. Counsel for Total Safety also sites to the affidavit of Evan Fuest, the forensic engineer for RVM, who imaged Hains’s iPhone. See R. Doc. 103-3, pp. 2-3. In his affidavit, Fuest testified that he uploaded Hains’s phone onto his forensic equipment, and the equipment indicated that the image upload had been completed without error. However, upon his arrival back in his New York office, Fuest testified that he placed all the images from the phone into a program developed by one of their forensic equipment manufacturers to analyze and report on the collected images, where it was then revealed that the image files from Hains’s collection were corrupt. Id. at 3, ¶ 14-16. He testified that he then communicated with a forensic equipment manufacturer, but neither he nor the manufacturer were able to conclude why the files were corrupt. Upon further questioning, Total Safety, much like Fuest’s affidavit, could not attest to the specific reasoning why the imaging first seemed to have successfully uploaded but then later was corrupted. Furthermore, counsel for 24 Hour Safety indicated that he had seen the images before from those captured by his own expert, Avansic, and that there did not seem to be any corruption therein. Based on the conflicting evidence, as well as the potential that it was an error on the part of Total Safety’s expert, the Court was not persuaded by the affidavit of Fuest or the argument of Total Safety as to why the corruption occurred, and deferred its ruling on this issue until Total 10 Safety’s expert could provide the Court with assurance that if the phone and / or data were reproduced for imaging, the encryption error would not reoccur. During a discovery conference that occurred on April 24, 2014 with the undersigned, counsel for Total Safety provided the Court with an additional affidavit of Gregory Cancilla, the Director of Forensics for RVM, Inc. In his affidavit, Cancilla stated that RVM intends to change the process within which it imaged Hains’s iPhone the first time, by performing the full examination on site, rather than completing the analysis at RVM’s laboratory in New York. See attached Affidavit, at ¶¶ 4-6. Therefore, he suggests that RVM will be able to confirm on the site of the examination whether a usable image can be extracted from the iPhone. Id. During the discovery conference, which will be addressed in full detail in a subsequent order to be issued by the Court, 24 Hour Safety indicated to the Court that Hains’s iPhone was no longer in her possession, as she allegedly lost it while aboard a boat on Folse River, as it went overboard. Counsel for 24 Hour Safety did however represent that the device had been “backed up” as of March 2014, and that the back up information would be available for re-imaging. However the format of the back up was unable to be confirmed by counsel for 24 Hour Safety. During the conference, Total Safety also indicated that it sought for its lawyers to be present on site when its expert re-images the phone. 24 Hour Safety expressed concerns since the previous imaging did not produce readable results. As a result, the Court suggested the use of the Special Master, Brian Roux, who had been previously agreed to by the parties and appointed by the Court. The Court also ordered Total Safety to bear the costs of the Special Master’s re-imaging of Hains’s iPhone. The Court further agreed to contact Special Master Brian Roux and request that he select three (3) days he would be available to conduct the re-imaging of Hains’s iPhone. As such, Total 11 Safety’s request was granted. C. 24 Hour Safety Production Total Safety contends that Paragraphs 4-7 of the Protocol explained the process within which RVM must process the images collected during the forensic examinations, which included an agreed upon set of search terms, that RVM would use the terms to run targeted searches across all the collected forensic images. See R. Doc. 103-1, pp. 5-6; citing R. Doc. 31-1, p. 27, ¶¶ 4-7. Total Safety contended that RVM would then take all the files that contained a search term, run a de-duplication program to remove duplicates, and then would produce the de-duplicated files to Avansic. Id. Then, Rowland and 24 Hour Safety had five days to review the files for privilege and create a privilege log with descriptions for any withheld files. Id. citing R. Doc. 31-1, at ¶8. Total Safety contends that not only did 24 Hour Safety and Rowland fail to meet the five day production deadline, but that they also allegedly withheld approximately 15,000 files. See R. Doc. 103-1, p. 6. In opposition, 24 Hour Safety contends that even though there was a protocol in place, it never agreed to produce irrelevant and immaterial information outside of the time of the solicitation and hiring of Rowland, or after July 1, 2013. See R. Doc. 121, p. 7. Furthermore, 24 Hour Safety contends that Total Safety agreed that this date was a reasonable and relevant cut off date, and that it did not agree that the production of collected date would be unlimited in time. Id. at 7-8. Thus, 24 Hour Safety contends that it did not waive its objection to relevancy and immaterial requests or production of files outside the relevant time period of July 1, 2013. Id. at 8. As such, it contends that Total Safety’s requests should be denied. The Court will address the alleged production failures as set forth in Total Safety’s motion: 1. Several thousand files improperly withheld for “relevance” 12 Total Safety contends that 24 Hour Safety has improperly withheld thousands of files based on relevance, which is not supported by the terms set forth in the Protocol. Specifically, Total Safety contends that the Protocol, does not allow files containing the agreed-upon search terms to be withheld for “relevance,” and unambiguously states that “Rowland and 24 Hour Safety can only withhold documents based on ‘privilege’.” See R. Doc. 103-1, p. 10; citing R. Doc. 31-1, pp. 27-28, ¶¶ 5, 8. Therefore, Total Safety contends that no where in the protocol is there a provision which allows for the unilateral withholding of files containing the agreed-upon search terms based on relevancy. As such, Total Safety seeks an Order from this Court compelling 24 Hour Safety to comply with the protocol by producing all non-privileged documents being withheld for “relevance.” During oral argument, counsel for Total Safety represented to the Court that the parties had agreed in their protocol that files would only be withheld based on a party’s assertion that these documents were privileged. As such, Total Safety contends that 24 Hour Safety now improperly asserted relevance as a basis for withholding documents. Upon questioning by the Court, counsel for 24 Hour Safety conceded on the record that he agreed to the protocol, limiting the withholding of documents to only those which are based on privilege. See R. Doc. 31-1, pp. 27-28, ¶¶ 5-8.Therefore, the Court found that because the parties agreed to limit the withholding of documents to only files which may be considered privileged by the parties, 24 Hour Safety had to produce the documents as agreed to in the protocol. As such, Total Safety’s request as to production of documents withheld based on relevance is granted. 24 Hour Safety has until May 8, 2014, to produce those files. 2. Several Thousand Files Improperly Withheld Based on Date Restriction Total Safety contends that 24 Hour Safety withheld approximately 3,600 files from the 13 accounts of Smith, Reyes, and Ellenburg because the files pre-dated July 1, 2013, which is in violation of the protocol. Total Safety contends that Paragraph 5 of the Protocol sets forth 24 Hour Safety’s obligation to provide access to its employees’ email accounts, which included providing their employees with temporary passwords to RVM, so that they could access the email accounts to create the forensic images. See R. Doc. 103-1, p. 4; citing R. Doc. 31-1, p. 27, ¶5. However, paragraph 5 contains no date restriction. Id. at p. 12. Paragraphs 7-8 of the protocol then set forth the procedure for producing 24 Hour Safety email account files containing the agreed-upon search terms. Id. These paragraphs do not state however, that Rowland or 24 Hour Safety can withhold documents based on any date restriction. Total Safety contends that the only date restriction is contained in Paragraph 13, and concerns Rowland’s personal Yahoo! Email Account, which indicates that RVM must run the agreed-upon search terms and then apply a date restriction to the files containing those terms. Id. at 13. As such, Total Safety seeks an Order from this Court compelling 24 Hour Safety to comply with the protocol by producing all non-privileged documents being withheld that pre-date July 1, 2013. During oral argument, counsel for 24 Hour Safety conceded that the parties agreed upon protocol did not include a limitation date. However, upon further questioning by the Court, he indicated that during several depositions, including that of Hains as well as Dartez, it was revealed that communications between 24 Hour Safety and Rowland did not formally begin until July 1, 2013. The Court therein questioned the parties as to when the earliest communication showing any interest, including preliminary discussions, between Rowland and 24 Hour Safety began, so as to 14 determine a date within which to restrict the search. In response, Total Safety argued that Rowland first showed interest in 24 Hour Safety over a year before his resignation from Total Safety, on or around October 6, 2013. Counsel for Total Safety also indicated that based on some of the documents produced in response to the undersigned’s Order denying in part and granting in part Defendants’ Motion to Quash Subpoenas, as well as in some of the deposition testimony already taken, informal conversations and / or communications with Hains’ and Dartez, both owners of 24 Hour Safety began in early 2012. See R. Docs. 60, 65, 66. Counsel for Total Safety also stated that the “more serious” discussions about Rowland moving over to 24 Hour Safety began in May and June of 2013. Upon further questioning by the Court, however, Total Safety argued that based on the parties agreed upon protocol, counsel for 24 Hour Safety did not object to there being no date restriction, and therefore the agreement signed between the parties should be binding as to whether or not there would a date restriction on the discoverable information. Total Safety also informed the undersigned that this issue had been discussed in the presiding District Judge’s hearing on the parties second temporary restraining order (“TRO”), which occurred on October 28, 2013. See e.g., R. Doc. 30, 57. Upon limited review of the transcript from the second TRO hearing, during oral argument, the undersigned noticed that the presiding District Judge Ivan B. Lemelle, also stated his concerns regarding the scope of the search of the home and business computers, as well as emails of the identified key players in this action. In the transcript, Judge Lemelle, in response to counsel for 24 Hour Safety’s question regarding Total Safety’s ability “to search all the emails and home and business computers of all the individuals,” indicated that he believed “it should be limited . . . and 15 not something that goes over bounds for the purposes of . . . the hearing.” See R. Doc. 57, p. 31-32. Thus, the undersigned recognized that even the presiding district judge believed that there should be some date limitation so as to prevent a wide open, unlimited examination, in an effort to protect the parties from conducting discovery which would likely produce irrelevant and or immaterial information to the instant action. Furthermore, upon questioning by the Court, Total Safety could not point to any specific evidence or any specific date, other than “early 2012” which it would have identified as the first date which Rowland and 24 Hour Safety began informal communications regarding an employment change. Instead, Total Safety contended that they did not want a date limitation as to the files identified by the search terms so that they could find all files, even those which they contend may have been altered by date by Rowland before any negotiations began. The Court however was unpersuaded by this argument. Therefore, the Court questioned counsel for Rowland as to when any preliminary negotiations began, and he stated that the “real discussions began in June or July of 2013.” However, he also indicated in response to the Court’s question as to if any questions occurred before, that “nothing more than informal . . .” which the Court interpreted as a concession that some communications, may have begun in 2012. Furthermore, counsel for Total Safety stated that they had seen text messages sometime in 2012 between Rowland and Dartez and / or Hains. Neither side however could pinpoint a month or date in 2012 within which the discussions began. Therefore, the Court found that it would limit the date restriction on the discovery material. As such, Total Safety’s request was granted, but the scope of the production is limited to the period of January 2012 to October 2013. 16 D. Privilege Logs and Descriptions Total Safety contends that Rowland and 24 Hour Safety failed to produce logs for each production. See R. Doc. 103-1, p. 13. Total Safety also contends that as for the two logs that were produced by Rowland and 24 Hour Safety, the logs that were produced contain inadequate descriptions regarding the basis for the claimed privilege, and thus should be supplemented. Id. 1. Privilege Logs Not Provided Total Safety contends that Paragraph 8 of the Protocol states that, “[f]or all documents withheld, the privilege log must include (at a minimum): 1) unique identification number; 2) the date of the document; 3) the parties to any communications; 4) a brief description of the subject matter of the document; and 5) the reason the document was withheld.” See R. Doc. 103-1, p. 13-14; citing R. Doc. 31-1, pp. 27-29, ¶8. As such, Total Safety contends that it requested privilege logs multiple times, but that as of yet, 24 Hour Safety has failed to produce them for the files withheld from Hains’s, Dartez’s, Justin’s, and Bercegeay’s computers and devices. Id. at p. 14. Thus, Total Safety contends that 24 Hour Safety has failed to comply with the Protocol. Thus, Total Safety seeks an Order from this Court compelling 24 Hour Safety to produce all outstanding privilege logs. Id. During oral argument, counsel for 24 Hour Safety contended that it had not produced these files because of the previously referred to date restriction of July 1, 2013. However, he conceded that based on the Court’s ruling as to the January 1, 2012 date, he would review the data and files withheld from Hains’s, Dartez’s, Justin’s, and Bercegeay’s computers and devices, and provide Total Safety with all data that is not subject to a privilege. As to any data and or files within which a privilege is claimed, the Court ordered that a privilege log, with an adequate description of the 17 document over which the privilege is being claimed be provided to Total Safety in order for them to ascertain whether any privileges apply to a particular document and or file in question. As such, Total Safety’s request was granted. 24 Hour Safety has no later than fifteen (15) days from oral argument, or by May 8, 2014, to produce the documents and the privilege logs associated therewith. 2. Inadequate Privilege Descriptions Total Safety contends that Paragraph 8 of the protocol states that, “[i]f Plaintiff objects to a privilege designation, then the parties agree that the court can inspect the documents in camera and decide whether the document should be produced.” See R. Doc. 103-1, p. 14. However, Total Safety cannot determine whether to object based on the descriptions in the two privilege logs that Rowland and 24 Hour Safety provided, as the descriptions contain no information for Total Safety or the Court to determine whether the claimed privilege actually protects the file from disclosure. Id. For example, Total Safety contends that one of Rowland and 24 Hour Safety’s most recent log contains descriptions, such as “E-mail string containing attorney-client privileged communication and sent in defense of pending litigation.” Id. Total Safety contends that these descriptions have been routinely found by this Court to be insufficient, citing Talyor Energy Co., LILAC. v. Underwriters at Lloyd’s London Subscribing, No. 09-6383, 2010 WL 3952208, *2 (E.D. La. Oct. 7, 2010)(“Here, the Court finds that the Second Amended Privilege Log does not set forth facts that suffice to establish that each element of the privilege claimed is applicable. Document descriptions such as ‘Email forwarding attorney client communication,’ ‘Email regarding attorney input and advice regarding anticipated litigation issues,’ and ‘Email forwarding attorney report’ fail to set forth adequate facts for this Court—and for plaintiff—to determine whether the claimed privilege protects the document from disclosure.”). Id. at p. 14-15. 18 Total Safety contends that it raised this issue to counsel for both Rowland and 24 Hour Safety on February 3, 2014, but that as of yet, neither counselors have indicated whether they intend on amending these logs or provide more sufficient descriptions in their outstanding logs. Therefore, Total Safety seeks an Order from this Court compelling them to amend their current logs by providing sufficient descriptions to determine whether the claimed privilege protects the files from disclosure. Id. In opposition, Rowland contends that the only issue in Total Safety’s motion applicable to him is the sufficiency of one of the privilege logs. See R. Doc. 119. Specifically, Rowland contends that there is no issue with the privilege logs submitted on his behalf, as the Protocol only required a “brief” description of the privileged nature of the document. See id., at p. 3. Furthermore, Rowland contends that the one case that Total Safety sites in support of its argument that the privilege logs are insufficient does not apply to post-litigation documents, as does this log. Id. at p. 3-4. Specifically, Rowland contends that some courts across the country have determined that the requirements for privilege logs describing post-litigation documents and communications are different than those for pre-litigation documents and communications. Id. In fact, Rowland contends that some courts have suggested that privilege logs are not required for post-litigation documents and communications. Id. citing U.S. v. Bouchard Transp., 2010 U.S. Dist. LEXIS 37438, at *2 (E.D.N.Y. 2010) (“Privilege logs are commonly limited to documents created before the date litigation was initiated….[because] it can be assumed that all documents created after…a lawsuit has been filed and withheld on the grounds of privilege were created because of the pending litigation.”); Prism Technologies, LLC v. Adobe Sys., Inc., 2011 U.S. Dist. LEXIS 131321 (D. Neb. 2011) (same); Ryan Inv. Corp. v. Pedregal De Cabo San Lucas, 2009 U.S. Dist. LEXIS 118337, at 19 *9 (N.D. Cal. 2009) (denying plaintiff’s motion to compel “to the extent it seeks to require a log of post-litigation counsel communications and work product….”). During oral argument, the Court reviewed the privilege log, and indicated that based on the brief descriptions, the log was unsatisfactory, as the descriptions did not provide enough of an explanation as to the content of the material over which the claim is being asserted. Therefore, counsel for Rowland was required to amend the privilege log to provide a better description of those documents on which privileges are being claimed so that Total Safety may be able to ascertain whether the privilege applies. As such, Total Safety’s request to amend the logs was granted. IV. Conclusion IT IS ORDERED that Plaintiff, Total Safety U.S., Inc.’s (“Total Safety”) Plaintiff’s Second Motion to Compel Compliance with the Protocol (R. Doc. 103) is GRANTED as set forth below: IT IS GRANTED as to Total Safety’s request to image Hains’s iPhone and Dartez’s iPhone. IT IS FURTHER GRANTED as to Total Safety’s request for 24 Hour Safety to produce files which were withheld based on relevance and date restriction. However, Total Safety’s request as to those files is limited from January 1, 2012, to the October 2013 date already designated by the parties, no later than fifteen (15) days from the oral argument on this motion, or by May 8, 2014. IT IS FURTHER GRANTED as to Total Safety’s request for Rowland and 24 Hour Safety to amend the current privilege logs and produce logs which have yet to be produced, to provide adequate descriptions of the files over which a privilege is being claims no later than fifteen (15) days from the oral argument on this motion, or by May 8, 2014. New Orleans, Louisiana, this 29th day of April 2014 KAREN WELLS ROBY UNITED STATES MAGISTRATE JUDGE 20

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?