Point 4 Data Corporation et al v. Tri-State Surgical Supply And Equipment, LTD. et al

Filing 242

MEMORANDUM AND ORDER granting in part and denying in part 234 Motion for Discovery. For the reasons set forth in the attached Memorandum & Order, the Court declines, in large part, to grant the discovery requested by plaintiffs in the August 8, 2012 joint status report, as supplemented by their August 15, 2012 letter 240 . Ordered by Magistrate Judge Roanne L. Mann on 8/27/2012. (Williams, Jennifer)

Download PDF
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK ------------------------------------------------------------x POINT 4 DATA CORP., et al., Plaintiffs, -against- MEMORANDUM AND ORDER 11-CV-726 (CBA) TRI-STATE SURGICAL SUPPLY & EQUIPMENT, LTD., et al., Defendants. ------------------------------------------------------------x ROANNE L. MANN, UNITED STATES MAGISTRATE JUDGE: The Court is in receipt of the parties’ joint status report dated August 8, 2012, as well as their supplemental submissions relating thereto; once again, they have failed to reach agreement over the scope of further discovery. See Joint Status Report (“8/8/12 Let.”), Electronic Case Filing (“ECF”) Docket Entry (“DE”) #234.1 This latest round of discovery disputes arises out of plaintiffs’ request for documents reflecting the number of times employees of defendant Tri-State Surgical Supply & Equipment, Ltd. (“Tri-State”) logged into plaintiffs’ Genesys software during the period from July 11, 2010 to March 7, 2011 (the “Login Request”).2 1 Indeed, the parties cannot even agree as to what should be contained in a “joint” status report. See Letter to Judge Mann (Aug. 9, 2012), DE #236 (objecting to Tri-State’s August 8, 2012 joint status report); see also Plaintiffs’ Letter Addressed to Judge Mann (Aug. 15, 2012) (“Pl. 8/15/12 Let.”), DE #240 (responding to outstanding issues identified in August 8, 2012 joint status report); Tri-State’s Response to Plaintiffs’ August 15, 2012 Letter, DE #241 (responding to plaintiffs’ response to joint status report). 2 Although, strictly speaking, plaintiffs made four separate but related requests for documents reflecting the number of Genesys log-ins, the parties generally use the singular in referring to plaintiffs’ requests for “log-in information.” See Tri-State’s Responses & Objections to Plaintiffs’ Third Request for Production of Documents, DE #191-7 (Requests No. 38–41). For ease of reference, this Memorandum and Order will similarly refer to the four requests, collectively, as For the reasons set forth below, the Court declines, in large part, to grant the discovery requested by plaintiffs. BACKGROUND3 Genesys is an accounting software program, distributed by plaintiff Point 4 Data Corporation, that operates on a computer development platform called UniBasic,4 which was created by plaintiff Dynamic Concepts, Inc. See 6/13/12 R&R at 2. In this action, plaintiffs allege that Tri-State unlawfully circumvented security protections embedded in their software, in violation of the Digital Millennium Copyright Act, 17 U.S.C. § 1201 et seq. (“DMCA”), which allows for statutory damages “per act of circumvention.” See 17 U.S.C. § 1203(c)(3); see also 6/13/12 R&R at 22-30. Plaintiffs’ legal theory in this matter is that each time a TriState employee logged into Genesys, a separate “act of circumvention” occurred for purposes of statutory damages.5 Thus, plaintiffs’ Log-In Request seeks information relevant to their demand for damages.6 the “Log-In Request.” 3 A detailed history of this case is contained in this Court’s June 13, 2012 report and recommendation on Tri-State’s motion for partial summary judgment. See generally Report and Recommendation (June 13, 2012) (“6/13/12 R&R”), DE #196, adopted by Memorandum and Order (Aug. 13, 2012), DE #238. Only those facts relevant to the instant dispute are recounted herein. 4 UniBasic is a platform used in conjunction with a Unix operating system. See Declaration of Douglas Chadwick (Feb. 10, 2011) ¶ 2, DE #135. The parties and the Court sometimes refer to UniBasic and Unix files and log-ins interchangeably. 5 Although plaintiffs’ Log-In Request relates only to documents evidencing the number of log-ins into Genesys, plaintiffs equate a log-in to UniBasic/Unix with a log-in to Genesys. See Transcript (June 18, 2012) at 17, DE #200. Tri-State disputes that the aforesaid log-ins are equivalent. See id. at 13-14. Without ruling on plaintiffs’ theory, this Court allowed discovery as to the UniBasic log-ins. See id. at 21. 6 Despite the obvious importance of this information to their DMCA claim, plaintiffs waited until nearly the end of discovery to request this information. -2- I. Identifying the Files Responsive to the Log-in Request On June 8, 2012, plaintiffs moved this Court to compel Tri-State to, inter alia, respond to their Log-In Request. See Letter to Judge Mann re Discovery Issues (June 8, 2012) at 2, DE #191. In response, Tri-State argued that plaintiffs’ motion with respect to the Log-In Request should be denied as moot, as Tri-State was not aware of any documents reflecting this information and plaintiffs reportedly had acknowledged to Tri-State that they were not aware that any responsive documents existed. See Letter in Response to Plaintiffs’ June 8, 2012 Letter (June 14, 2012) at 1, DE #197. On June 18, 2012, this Court held a telephone conference to discuss the Log-In Request, as well as to address other disputed issues. See Transcript (June 18, 2012) (“6/18/12 Tr.”), DE #200. During the conference, the Court, as an initial matter, questioned plaintiffs’ need for the requested log-in information, as plaintiffs had previously included in their discovery responses a very specific damage calculation based on a precise number of log-ins. See 6/18/12 Tr. at 3-4; see also Dynamic Concepts Incorporated’s Amended Responses to Interrogatories (Dec. 30, 2011) at 8, DE #132-18 (plaintiffs asserted that there were 17,393 separate acts of circumvention). In response to the Court’s query, plaintiffs explained that they had obtained three days’ worth of responsive log-in data from Tri-State’s previously produced image drive, and that, by using a “simple command,” they were able to call up the log-in data for those three days, from which they then extrapolated the log-ins for the entire time period. See 6/18/12 Tr. at 4. During the conference, plaintiffs conceded that this extrapolation technique was “a perfectly legitimate way to go,” but that it was “always nice to have more days of data and that data should be there.” 6/18/12 Tr. at 5. Responding to plaintiffs’ desire for additional data, Tri-State repeatedly objected on the ground that plaintiffs had refused to specifically identify the name of the file containing the data or where the file could be located. See 6/18/12 Tr. at 7-8, 13, 22. Plaintiffs then explained that the responsive “document” was actually a “command” that would call up a “simple text file” that contained the log-in data and that plaintiffs were “perfectly happy to just get the file” containing the log-in data. See id. at 6, 10. After the Court compelled Tri-State, on the record, to “produce information regarding the number of [UniBasic] log-ins for the reference[d] period,” Tri-State requested that plaintiffs provide them with a file name. See id. at 21. The Court directed plaintiffs’ counsel to provide Tri-State’s counsel with a file name. See id. at 23; see also Minute Entry (June 18, 2012), DE #199. The next day, plaintiffs emailed Tri-State information identifying the two directory paths or “folders” from which plaintiffs had previously extracted relevant log-in data. See Email from Jason Koral (June 19, 2012) (“6/19/12 Koral Email”), DE #212-A.7 In addition, they stated that additional log-in information may be located “in the etc/password file.” See id. II. Technical Issues with Computer Storage Devices to Be Searched While attempting to clarify what computer files would reflect the requested log-ins, the parties also conferred on what computer storage devices (e.g., hard drives, servers) might contain the files. Three storage devices relevant to the current dispute are (1) the hard drive of a 2007 server used by Tri-State during the relevant time period (the “Hard Drive”); (2) a forensic copy of the Hard Drive, made by Tri-State’s third-party consultant Driven (the 7 The two folders were “/var/opt/K/SCO/Unix/5.0.7Hw/etc/wtmp” and “/var/opt/K/SCO/Unix/5.0.7Hw/etc/wtmpx.” See 6/19/12 Koral Email. Although plaintiffs claim that they provided specific file names, the 6/19/12 Koral Email does not appear to disclose anything other than locations for files. -4- “Driven Copy”); and (3) a “mirror-image” of the Hard Drive (the “Second Disk Drive”). See generally Letter to Judge Mann re Motion to Compel (July 9, 2012), DE #212. In attempting to comply with this Court’s June 18, 2012 Order concerning the Log-In Request, Tri-State discovered that its Hard Drive had failed, and that the data contained on the Driven Copy could not be read. See id. at 1. The parties eventually agreed that Tri-State would, at its expense, send the Hard Drive and the Driven Copy to a third-party computer specialist, Drive Savers, Inc. (“Drive Savers”), to determine if either could be restored. See Minute Entry (July 24, 2012), DE #229. Drive Savers thereafter reported that it was “very pleased to have accomplished a successful recovery from both of [the drives],” given their “damaged state.” See Email from Dave Falzone (Aug. 2, 2012), DE #234-1. Drive Savers then sent the restored Hard Drive and Driven Copy (as well as imaged copies of both) to Driven, so that Driven could search for log-in data in the file locations identified by plaintiffs. See 8/8/12 Let. at 1. During its review, Driven confirmed that the Hard Drive had been restored. Driven also confirmed that the files “[p]laintiffs are seeking (i.e. Unix wtmp and wrmpx files from February 17, 2011 - March 7, 2011) [were] not present on the Hard Drive – [and that] the only Unix wtmp and wtmpx files present on the restored Hard Drive are all from after March 7, 2011.” Declaration of Robert Hook (“Hook Decl.”) ¶ 5, DE #234-2 (emphasis added). In contrast to its review of the Hard Drive, Driven was not able to read the Driven Copy, and so it could not be searched for responsive data. See id. ¶ 6.8 8 Although it seems counterintuitive that a “restored” drive would be unreadable, Tri-State explains that Drive Savers was responsible for the logical recovery of the drives and that Driven -5- DISCUSSION Not satisfied with the outcome of the Drive Savers restoration and Driven search, plaintiffs now request (1) that they and their expert, Steve Moritsugu (“Moritsugu”), be allowed to access and examine the Hard Drive and Driven Copy, as well as the Second Disk Drive; and (2) that Tri-State be required to provide an affidavit listing (a) the servers and media it used during the time period of the Log-In Request, and (b) “the specific steps taken by Tri-State to locate log-in information.” See Pl. 8/15/12 Let. at 4. I. Access to Tri-State’s Computer Equipment A. Inspection of the Hard Drive and Driven Copy Characterizing as “sketchy” the information provided by Tri-State and the two thirdparty consultants, plaintiffs request that the Hard Drive and Driven Copy be “sent to [p]laintiffs for analysis.” See 8/8/12 Let. at 6.9 Pointing to an earlier order by the Honorable Carol B. Amon denying a prior request by plaintiffs for access to other Tri-State servers, see Order (Nov. 14, 2011) (“11/14/11 Order”), DE #102, Tri-State counters that, if plaintiffs wish to conduct further testing and searching of the Hard Drive and the Driven Copy, then plaintiffs should be required to hire, at their expense, a neutral third-party expert for that purpose. See id. Plaintiffs oppose that proposal. See Pl. 8/15/12 Let. at 1-2. Neither party cites any case then was responsible for “mounting” the drives, which in turn reveals whether a drive is readable. See 8/8/12 Let. at 2 n.2. Plaintiff does not dispute Tri-State’s explanation for the apparent contradiction in terms. See generally Pl. 8/15/12 Let. 9 Plaintiffs clarify, in a later submission, that they would have their expert, Moritsugu, “identify the files to extract and the commands for extraction.” Pl. 8/15/12 Let. at 2. An employee of plaintiff Dynamic Concepts, Inc., Tom Marrs, would then “carry out the actual extraction work.” Id. -6- law in support of their respective positions. In particular, plaintiffs state that they seek access to these drives in order to “(a) analyze the file list and file structure to check for the existence of additional log-in information and to determine which files were restorable (and which not); (b) verify that the recovered drives are fully bootable and contain a functional [operating system] as per Tri-State’s representation that the restoration was complete and forensically sound; and (c) analyze system files to help verify the identity of the server or servers with which that drive was associated.” Pl. 8/15/12 Let. at 2. As is evident from the litany of data analyses plaintiffs plan to undertake if granted access to the Hard Drive and Driven Copy, plaintiffs’ request far exceeds the “simple text file” reflecting log-ins that they claimed they needed during the June 18, 2012 telephone conference with the Court. For example, plaintiffs do not attempt to justify in any way how understanding which servers are associated with which hard drives is germane to documents responsive to their Log-In Request. This Court declines to indulge plaintiffs’ attempts to belatedly shoehorn unrelated discovery into its Log-In Request. As for their desire to search for additional log-in data, although plaintiffs claimed to be able to provide a command that would access a simple text file, they instead disclosed to TriState three folders where the relevant data files might be located. Driven has submitted a declaration that the only Unix twmp and twmpx files on the Hard Drive are all from after March 7, 2011, regardless of their folder location. Driven’s declaration does not, however, state whether this addresses plaintiffs’ reference to “etc/password file” as a possible location for the log-in data. See Pl. 8/15/12 Let. at 2. Therefore, Tri-State is directed to submit a -7- supplemental Driven declaration by September 5, 2012, confirming whether it was able to locate “etc/password files” on the Hard Drive and, if so, whether those files contained any data responsive to the Log-In Request. Plaintiffs claim that having access to the Hard Drive might allow them to uncover additional log-in data because the location and/or name of the data depend on how Tri-State structured its files on the Hard Drive. The Court, however, will not allow plaintiffs to embark on a fishing expedition for information, particularly where plaintiffs are unable to provide an actual file name or command for retrieving the additional log-in data. See Trilegiant Corp. v. Sitel Corp., 275 F.R.D. 428, 435-36 (S.D.N.Y. 2011) (denying motion to compel, where party seeking discovery did not specifically identify any withheld documents responsive to its request and the existence of additional documents was “[m]ere speculation”); Croom v. Western Conn. State Univ., No. Civ. 3:00CV1805(PCD), 2002 WL 32503667, at *2 (D. Conn. Mar. 20, 2002) (denying motion to compel production of entire personnel file, where plaintiff failed to identify the specific information contained in her personnel file that she was seeking). Such unfettered access to Tri-State’s drives is especially inappropriate, where, as here, there is less need for the data inasmuch as plaintiffs have already conceded that proceeding with an extrapolation of the three days’ worth of log-in data is “a perfectly legitimate way to go.” See 6/18/12 Tr. at 5.10 Furthermore, in similar circumstances, the District Court refused to grant plaintiffs’ request to explore at will Tri-State’s electronic files. 10 Indeed, as part of negotiations concerning other discovery, Tri-State was willing to stipulate to the extrapolation of the three-days’ worth of data, thereby suggesting that the methodology was not unreasonable. See Joint Status Report (Aug. 1, 2012) at 2, DE #232. -8- See 11/14/11 Order. Finally, there is nothing in the record, apart from sheer speculation, to suggest that the quality of work undertaken by Drive Savers and Driven was incompetent or less than thorough. For the reasons identified above, if plaintiffs wish to duplicate the restoration and search efforts of the Drive Savers and Driven, plaintiffs may retain, at their expense, a neutral third-party expert to do so. Any searching of the Hard Drive and Driven Copy shall be limited to the three folders/files previously identified by plaintiffs. Plaintiffs’ request to personally access and examine Tri-State’s Hard Drive and Driven Copy is denied. B. Inspection of the Second Disk Drive Plaintiffs became aware of the Second Disk Drive as early as February 2011, when their retained investigators discovered it at Tri-State’s headquarters. See 8/8/12 Let. at 3. Their investigators ultimately reported that the Second Disk Drive had “failed” and that the there was “[n]o suspicion of tampering or destruction” associated with the failure. See id.; Threat Management and Protection, Inc. Report (Feb. 24, 2011) at 15, DE #235. Following this report, the parties drafted and the Court approved an electronically stored information (“ESI”) protocol, in which it was agreed “that information . . . recoverable only by forensic means [is] not reasonably accessible.” See Stipulation and Order re ESI Protocol (June 14, 2011) at 1, DE #47. Pursuant to Rule 26(b)(2) of the Federal Rules of Civil Procedure, there is no obligation to provide “discovery of electronically stored information from sources that the parties identifies as not reasonably accessible . . . .” Fed. R. Civ. P. 26(b)(2)(B). Plaintiffs now seek to recover data from the currently inoperable Second Disk Drive — almost a year and a half after learning of its existence. Specifically, in the event the Second -9- Disk Drive can be restored, plaintiffs want to personally search that drive for the requested log-in data. See 8/8/12 Let. at 3.11 Tri-State objects because (1) the Second Disk Drive is outside the scope of the ESI protocol and (2) the request is untimely. See id. at 4. Plaintiffs plainly were aware of the Second Disk Drive and its inoperative state as early as February 2011. When the parties drafted an ESI protocol four months later, plaintiffs could have carved out an exception for the Second Disk Drive, but chose not to do so. In addition, as explained above, plaintiffs’ need for the data is lessened by their reliance on the three-day extrapolation of log-in data currently available to them. The strength of that reliance is confirmed by the fact that they did not see fit to make the Log-In Request until near the close of discovery, and did not request to search the Second Disk Drive until after discovery ended. Given plaintiffs’ reliance on the extrapolated log-in data and their failure to create an exception for the Second Disk Drive in the parties’ ESI protocol, the Court would be amply justified in denying their request to compel discovery of the Second Disk Drive. Nevertheless, as an exercise of its discretion, the Court adopts Tri-State’s fallback position, see 8/8/12 Let. at 4, and will allow plaintiffs to pay for a neutral third-party consultant to restore the Second Disk Drive and perform a limited review for the previously identified log-in files. III. Tri-State Affidavits A. Tri-State Equipment in Use During the Unlawful Circumventions Plaintiffs request that Tri-State provide a detailed affidavit “that lists the servers and 11 According to the August 8, 2012 joint status letter, plaintiffs purportedly wanted to send the Second Disk Drive to Drive Savers for restoration, at Tri-State’s expense. See 8/8/12 Let. at 3. The fact that plaintiffs considered sending the Second Disk Drive to Drive Savers undermines their dubious claim that the work done by Drive Savers was unreliable. -10- media in use at any time during the period from and including July 2010, to and including March 2011.” See 8/8/12 Let. at 6. Tri-State objects to their request. See id. at 4. Essentially, plaintiffs seek information that they should have elicited in an interrogatory response or at a deposition. But discovery ended June 8, 2012, and plaintiffs have not established good cause for reopening discovery to allow plaintiffs to fill the gaps in the information they obtained during the period for discovery. See generally Fed. R. Civ. P. 16(b)(4). Moreover, the requested affidavit appears to be overbroad, as it would apparently require identification of servers and media that were not capable of running plaintiffs’ software. See 8/8/12 Let. at 4. Therefore, the Court denies plaintiffs’ requested relief. B. Tri-State’s Search Efforts Finally, plaintiffs seek an additional affidavit from Tri-State that would set forth “the specific steps taken by Tri-State to locate log-in information, and to preserve such data.” Pl. 8/15/12 Let. at 4. As an initial matter, disclosure of the steps taken to preserve the log-in data is outside the scope of the Log-In Request. As for steps taken to locate the log-in information, Tri-State initially claimed it knew of no documents responsive to the Log-In Request. See 8/8/12 Let. at 5. Plaintiffs then identified relevant file locations. Tri-State had its vendor, Driven, search for the data based on plaintiffs’ criteria, but Driven was unable to locate responsive documents. See id. The Declaration of Robert Hook confirms Tri-State’s assertion. See Hook Decl. Still not satisfied, plaintiffs now seek a play-by-play of Tri-State’s efforts. Plaintiffs’ speculation that the data must exist elsewhere does not warrant the creation of the affidavit requested. In Rusk v. New York State Thruway Authority, the plaintiff, who was not satisfied -11- when the defendant claimed that it had only 22 pages of responsive emails, requested an affidavit addressing, among other things, who conducted the search, what search terms were employed, and the databases searched. See Rusk, No. 10-CV-544A (Sr), 2011 WL 6936344, at *1 (W.D.N.Y. Dec. 29, 2011). The court denied the plaintiff’s motion, finding that the plaintiff’s speculation that additional emails existed was insufficient to overcome a declaration that the defendant searched for responsive documents and that all responsive documents had been produced. See id. at *2. So too here, plaintiffs, like the plaintiff in Rusk, base their request for an affidavit on speculation that additional log-in data may exist. That meager showing is not sufficient to overcome the Hook Declaration and Tri-State’s counsel’s representations that they were unable to locate any documents responsive to the Log-In Request. However, because there was some initial confusion over whether plaintiffs were seeking log-in information related to Genesys, versus log-in information related to UniBasic/Unix, see n. 5 supra p. 2, Tri-State is directed to submit a declaration by September 5, 2012, confirming that Tri-State is not aware of any documents in its possession, custody or control reflecting either Genesys or UniBasic/Unix log-ins. The Court denies plaintiffs’ request in all other respects. CONCLUSION For the reasons stated above, the Court denies plaintiffs’ request to personally access and examine the Tri-State Hard Drive, Driven Copy and Second Image Drive. Plaintiffs may, at their expense, retain a neutral third-party expert to conduct a limited review of the Hard Drive and Driven Copy for the three folders/files previously identified by plaintiffs, and to restore and conduct a similarly limited review of the Second Disk Drive. In addition, the -12- Court denies plaintiffs’ request that Tri-State provide an affidavit listing all servers and media in use while the alleged unlawful circumvention was taking place. The Court does grant, in very limited part, plaintiffs’ request for an affidavit concerning Tri-State’s search efforts: TriState shall provide a declaration by September 5, 2012, clarifying whether it is aware of any documents in its possession, custody or control reflecting the number of Genesys or UniBasic/Unix log-ins. Finally, Tri-State is directed to file a supplemental Hook Declaration by September 5, 2012, addressing what, if any, efforts Driven made to search for responsive files located in the “etc/password files” referenced in the 6/19/12 Koral Email. Any objections to the rulings contained in this Memorandum and Order must be filed with the Honorable Carol B. Amon on or before September 13, 2012. Failure to file objections in a timely manner may waive a right to appeal the District Court order. SO ORDERED. Dated: Brooklyn, New York August 27, 2012 ROANNE L. MANN UNITED STATES MAGISTRATE JUDGE -13-

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?