United States v. Broadcast Music, Inc
Filing
155
ELECTRONIC DISCOVERY PROTOCOL: The Parties (as defined below) mutually agree to the following protocol (the "Protocol") relating to the Production of Documents (as defined below) and electronically stored information ("ESI") for the above-captioned action. SO ORDERED, with the further caveat that nothing in this Protocol excuses the parties from their obligation to comply with Rule 4 of the Court's Individual Rules and Practices in Civil Cases, which governs redacted and sealed filings and further set forth in this Order. (Signed by Judge John P. Cronan on 1/11/2024) (rro)
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
RADIO MUSIC LICENSE COMMITTEE, INC.,
Petitioner,
1:22-cv-05023 (JPC)
Related to United States v. Broadcast
Music, Inc., 64 Civ. 3787 (LLS)
v.
BROADCAST MUSIC, INC.
Respondent.
ELECTRONIC DISCOVERY PROTOCOL
The Parties (as defined below) mutually agree to the following protocol (the “Protocol”)
relating to the Production of Documents (as defined below) and electronically stored information
(“ESI”) for the above-captioned action.
I.
GENERAL PROVISIONS
Nothing in this Protocol affects the Parties’ discovery obligations under the Southern
District of New York’s prevailing rules except as stated herein. The obligations hereunder are not
intended to abrogate or diminish any discovery obligations governed by any other order or rule.
A.
Scope. The procedures and protocols outlined herein govern the production of ESI
and paper Documents (collectively “Discoverable Information”) by all Parties to these
proceedings, whether they currently are involved or become so in the future. For any other
materials, the Parties shall meet and confer regarding the identification, location, collection,
search, form, and format of production for specific items or categories of items.
All disclosures and productions made pursuant to this Protocol are subject to all orders
entered by this Court in this matter. Nothing in this Protocol shall limit a Party’s right to seek or
object to discovery as set out in applicable rules or to object to the authenticity or admissibility of
any Discoverable Information produced in accordance with this Protocol.
1
B.
Limitations and No Waiver. The Parties and their attorneys do not intend by this
Protocol to waive their rights to the production, discoverability, confidentiality, attorney-client
privilege, or attorney-work product protection as to any Discoverable Information addressed in
this Protocol. All Parties preserve their attorney-client privileges, work product protections, and
other relevant privileges, and there is no intent by the Protocol or the production of Discoverable
Information pursuant to the Protocol to in any way waive or weaken these privileges or suggest
their inapplicability in any respect to Discoverable Information in these proceedings. Nothing in
this Protocol addresses, limits, or determines the relevance, discoverability, or admission into
evidence of any Discoverable Information.
C.
Cooperation.
The Parties shall conduct discovery in a cooperative manner,
including without limitation, by reasonably drafting discovery requests and responses in
accordance with Federal Rules of Civil Procedure 1 and 26(b)(1); and producing ESI in accordance
with Federal Rule of Civil Procedure 34; and by meeting and conferring in good faith on topics
such as identification of key custodians, potentially relevant data sources, search methodologies,
and such other issues as may arise during the course of discovery. Prior to bringing any discovery
dispute to the Court, the Parties must attempt to resolve the dispute on their own, in good faith,
and in accordance with the Local Rules of the Southern District of New York and any orders
entered by this Court.
D.
Definitions
1.
“Custodian” means an individual employed or formerly employed by a
party that is likely to have responsive Documents or ESI
2.
“Respondent” means Cumulus Media, Inc.
3.
The definition of “Documents” and ESI is the same as the definitions found
in Fed. R. Civ. P. 34(a).
4.
“Parties” shall mean the named Claimant and named Respondent in the
above-captioned proceeding.
5.
“Producing Party” shall mean the Party responsible for compiling and
2
Producing Discoverable Information in accordance with the terms of this Protocol in response to
a request for production of Documents.
6.
“Requesting Party” or “Requesting Parties” shall mean the Party or Parties
serving the requests for production of Documents.
II.
SOURCES OF DISCOVERY MATERIALS
The Parties agree to the following:
A.
Initial Identification of Custodians. Producing Parties shall provide a list of the
proposed Custodians for production of ESI in response to the Requesting Party’s discovery
requests. The initial list of Custodians shall be reasonable and proportional and should contain the
following information for each Custodian: name and job title.
B.
Additional Custodians. After providing the initial list of proposed Custodians,
the Parties will work together in good faith to determine if additional Custodians should be
included in the list of reasonable and proportional Custodians whose ESI and Documents will be
collected to respond to the Requesting Parties’ discovery requests.
III.
SEARCH AND RETRIEVAL OF ESI
The Parties recognize that discovery is an iterative process. The Parties will endeavor to
agree to a method or methods for the search and retrieval of ESI for purposes of production. The
Parties will discuss the method or methods for the search for ESI as part of the meet-and-confer
process pursuant to this Protocol.
3
A.
Defining Search Terms. The Parties agree that search terms may be used to collect
and filter ESI. Upon request, the Producing Party shall provide to the Requesting Party a list of
reasonable and proportional search terms it intends to use to capture responsive ESI it has agreed
to produce, or otherwise specify the manner in which the Producing Party intends to locate and
produce documents in response to any particular document request. In connection with proposing
such search terms, the Producing Party shall make a reasonable inquiry of client employees to
identify relevant terminology, including nicknames, code words, euphemisms, acronyms, slang,
terms of art, and other language likely to be contained in responsive Documents. A Producing
Party may test its search terms to identify terms that are unreasonably overbroad and/or that fail to
sufficiently capture information responsive to document requests. . A Producing Party may modify
its list of search terms as a result of the aforementioned testing process.
The Parties also
recognize that even though a document contains one or more of the search terms, such
document may not be responsive to any document request and, under these circumstances,
the Producing Party is not required to produce such document(s). Parties may review
documents that hit upon search terms for responsiveness prior to production.
B.
Additional Search Terms. Upon receipt of the search terms and disclosures set
forth above, if the Requesting Parties have any additions or modifications to the search terms, they
must communicate the additional or modified search terms to the Producing Party within three (3)
days of receiving the initial list. To the extent a Producing Party does not agree to a search term
proposed by the Requesting Parties, the Producing Party will suggest alternative search terms,
testing or validation methods, or provide a good faith explanation for its refusal to use the search
term proposed by the Requesting Parties. The Parties may then meet and confer regarding the
appropriateness of the proposed search term and, where applicable, information regarding the
impact of the proposed search term. If the Parties are unable to agree on search terms after meeting
4
and conferring in good faith, any Party may notify the Court of the unresolved dispute(s) and seek
resolution from the Court.
C.
Other Search Methodologies. If a Producing Party intends to use a methodology
for the search of relevant ESI for purposes of Production other than, or in addition to, the use of
search terms, it must disclose sufficient information to the Requesting Parties for them to make a
reasonable determination as to the efficacy and efficiency of such proposed search methodology.
If a Producing Party intends to use a review process that relies on AI-assisted review to exclude
documents from review, the Parties agree to meet and confer to determine an appropriate protocol
for the AI-assisted review.
If the Requesting Party objects to the use of other search
methodologies, the Parties agree to meet and confer in good faith to resolve the dispute. The
Parties shall attempt to resolve any objections before seeking relief from the Court.
D.
Follow-up Discovery. A Party may for good cause shown request that ESI for
additional Custodians be collected and searched and/or that additional search terms be applied.
When such a request is made, the Parties will promptly meet and confer and attempt in good faith
to reach agreement as to the additional Custodians or search terms requested. The Parties reserve
all rights and objections with respect to adding Custodians or search terms. If the Parties cannot
reach agreement, such dispute may be presented to the Court for resolution.
IV.
FILTERING OF ESI
A.
Email Threading.
1.
Email threads are email communications that contain prior or lesser-
included email communications that also may exist separately in the Party’s electronic files. A
most inclusive email thread is one that contains all the prior or lesser-included emails, including
attachments, for that branch of the email thread. Each Party may produce (or list on any required
privilege log) only the most inclusive email threads as long as the most inclusive email thread
includes all non-produced emails that are part of the same string.
2.
Following production of the most-inclusive email threads, a Requesting
Party may make reasonable requests for production of individual prior or lesser-included emails
5
within the identified most-inclusive email threads. The Producing Party shall cooperate reasonably
in responding to any such requests.
B.
De-Duplication.
1.
“Duplicate ESI” means files that are exact duplicates using an industry-
accepted file hash algorithm. The Producing Party need produce only a single copy of responsive
Duplicate ESI. A Producing Party shall take reasonable steps to de-duplicate ESI globally (i.e.,
both within a particular custodian’s files and across all custodians). Entire Document families may
constitute Duplicate ESI. De-duplication shall not break apart families.
2.
No Party may de-duplicate near duplicates (i.e., Documents containing
handwriting or other alterations will not be considered duplicates). The Parties will de-duplicate
exact duplicates according to the following requirements:
a.
All custodians who were in possession of a de-duplicated Document
must be identified in the CUSTODIAN-DUPE metadata field specified in Section VI.H.1.;
b.
The Parties further agree that an email that includes content in the
BCC or other blind copy field will not be treated as a duplicate of an email that does not
include content in the BCC or other blind copy field, even if all remaining content in the
email is identical; and
c.
If a Producing Party becomes aware of any file that was incorrectly
filtered during the de-duplication process and that should have been produced, the
Producing Party shall promptly produce the Document to the Requesting Parties.
C.
De-NISTing.
Electronic file collections will be DE-NISTed, removing
commercially available operating system and application file information contained on the current
NIST file list.
D.
Zero-byte Files. The Parties may filter out stand-alone files identified as zero-
bytes in size.
E.
The Parties may meet and confer about additional filtering techniques.
6
V.
PRODUCTION OF HARD-COPY DOCUMENTS
A Party will produce Documents that exist only in hardcopy form scanned and produced
in TIFF form as set out in Section VI.A & VI.C-E. The scanning must be done such that the
resulting image includes all information on the original hardcopy Document. The production of
original hardcopy Documents in TIFF form does not otherwise require that the scanned images
be treated as ESI. For all hardcopy Documents produced in *.tif format, the following fields, if
available, shall be provided in the data load file: (a) BEGDOC; (b) ENDDOC; (c) CUSTODIAN;
(d) REDACTION; and (e) CONFDESG.
VI.
PRODUCTION OF ESI
A.
Document Image Format. The Producing Party shall produce Documents in
single-page Group IV “TIFF” format.
If ESI has hidden text (e.g., track changes, hidden columns, comments, notes, markups, etc.)
associated with it, the Parties shall produce the ESI in a form showing such hidden text to the
extent reasonably practicable.
B.
Native File Format. A party shall have the option to produce ESI in native format;
provided, however, that all Excel spreadsheets, similar spreadsheet files, or data sets must be
produced in native format, unless any such Documents are available only in hard-copy format. All
Excel spreadsheets, similar spreadsheet files, or data sets produced in native format without
redactions should retain all formulae, macros, and VBA code. Any redaction applied to a native
Excel spreadsheet, similar spreadsheet file, or data set shall be performed by freezing the original
values of all cells and replacing removed content with “REDACTED” and a brief description of
the reason for the redaction.
All Documents produced solely in Native format should (i) have an assigned Document
level Bates number, (ii) include a placeholder image for each file that identifies the Bates number,
(iii) be renamed according to the assigned Bates number and include an appropriate confidentiality
provision if the Document qualifies for confidential treatment pursuant to the terms of any
confidentiality and protective order ordered by the Court, and (iv) have a “nativepath” populated
7
along with the metadata load file pursuant to the guidelines outlined in paragraph VI.H and
Appendix A attached hereto.
The Producing Party will honor reasonable requests made in good faith for production of
Documents or particular file types in native format where the Requesting Parties have a particular
need to review these Documents or types of files in native format.
C.
Document Unitization. For files produced as TIFF images, each page of a
Document shall be electronically saved as an image file. If a Document consists of more than one
page, the unitization of the Document and any attachments and/or affixed notes shall be maintained
as it existed in the original when creating the image files. The Producing Party shall produce a
unitization file (.OPT file) (“load file”) for all produced Documents in accordance with paragraph
VI.L.
D.
Color. Hard copy Documents and Documents reduced to TIFF may be produced in
black and white in the first instance unless the Producing Party believes that production in color is
reasonably necessary for a Document to be understood, in which case such Document will be
produced in color. In addition, the Producing Party will honor reasonable requests made in good
faith for copying or production of a color image of the Document (and, in the case of a hard copy
Document, a color hard copy) where a Requesting Party explains why the color is reasonably
necessary to decipher the meaning, context, or content of the Document.
E.
Bates Numbering and Other Unique Identifiers. For files produced in the
Document image format agreed to pursuant to paragraph VI.A., each page of a produced
Document, shall have a legible, unique page identifier (“Bates Number”) electronically “burned”
onto the image in such a manner that information from the source Document is not obliterated,
concealed, or interfered with. There shall be no other legend or stamp placed on the Document
image unless a Document qualifies for confidential treatment pursuant to the terms of any
confidentiality and protective order entered by the Court in this action, or has been redacted in
accordance with applicable law or order. In the case of any confidentiality or other designation
applicable to a Document, or materials redacted in accordance with applicable law or order, a
8
designation may be “burned” onto the Document’s image at a location that does not obliterate or
obscure any information from the source Document. Any Party producing ESI in a Native format
shall produce the Document in the format agreed to pursuant to paragraph VI.B.
F.
Production Media. The Producing Party shall produce Documents by secure FTP
or comparable secure electronic transfer means, unless the quantity of data produced makes it more
efficient to produce Documents on external hard drive (with standard PC compatible interface)
(the “Production Media”). Documents produced on external hard drive shall be encrypted; the
password shall be provided to the Requesting Parties under separate cover.
G.
Electronic Text Files. Where Documents maintained in the ordinary course of
business contain searchable text, text files shall be produced reflecting the full text that has been
electronically extracted from the Documents (“Extracted Text”), including any hidden text. In the
event a Document is not text searchable, for instance when original files exist in paper format and
were scanned to create a digital copy, or when redactions have been applied to a document, the
producing Party shall provide OCR text files. With respect to emails, the Extracted Text shall
include email header information, including to, from, cc, bcc, subject, date, and the names of
attachment files. The text files shall be produced in multi-page text file format and will be named
in such a way that they can be associated with their corresponding Static Images in databases
utilized by commercially available Document management or litigation support software.
H.
Metadata.
1.
The Parties are not obligated to populate manually any metadata fields, except for
the CUSTODIAN, CUSTODIAN-DUPE, and SOURCE fields, if such fields cannot automatically
be extracted from a Document. To the extent any ESI contains information subject to a claim of
privilege or any other applicable protection, its respective metadata may be redacted or withheld.
If metadata is redacted or withheld, the Producing Party will so inform the Requesting Parties and
record the redaction on any privilege log prepared by the Producing Party. Redacted metadata will
be preserved.
2.
Each Party will produce metadata fields associated with each electronic Document
9
produced in TIFF format (to the extent such metadata exists in the collected Documents) listed in
Appendix A attached hereto.
3.
The Parties must produce all files attached to each email they produce to the extent
the attachments are reasonably accessible, unless the Parties agree otherwise or the Court orders
otherwise. To the extent a Party produces electronic Documents attached to emails, a Party will
produce the metadata for those attached electronic Documents to the extent possible.
I.
Attachments. Email attachments and embedded files or links must be mapped to
their parent by the Document or Production number. If attachments and embedded files are
combined with their parent Documents, then “BeginAttach” and “EndAttach” fields (or the
functional equivalent, depending on the production format chosen) listing the unique beginning
and end number for each attachment or embedded Document must be included, when possible.
Bates numbering for any Attachments must sequentially follow the Bates number(s) for the parent
record.
J.
Load Files. The Producing Party shall produce (a) a data load file, which will
contain the bates-number range, attachment range and associated metadata, if any, for each
Document; and (b) an image load file which shall cross reference the TIFF images with the location
path. The load files should be provided as DAT files (CONCORDANCE). If in a particular
instance the above steps are not reasonably possible, then the Producing Party will disclose the
nature and extent of the difficulties and the Parties will seek to agree on an alternate means of
production. The Producing Party shall also produce a image load file (.OPT file) to facilitate the
use of the produced images by a Document management or litigation support database system.
K.
Password-protected files. The Producing Party will make reasonable efforts to
open and access password-protected files that are identified during processing, or otherwise
provide such passwords.
VII.
ASSERTIONS OF PRIVILEGE
A.
Nothing in this Protocol is intended to or should be interpreted as narrowing,
expanding, or otherwise affecting the rights of the Parties to object to a Requesting Party’s
10
document requests.
B.
Privilege Log. If a Producing Party withholds Discoverable Information based on
a claim of privilege, the Producing Party will provide a metadata privilege log, with each entry to
include the following metadata fields: Document ID/Bates Number, Attachment ID/Bates
Number, Date, Document Type, Sender/From, Recipient/To, CC Recipient, BCCRecipient,
Subject, File Name, Basis for Withholding (e.g. Attorney-Client, Work Product) The Parties
recognize that Production of Discoverable Information will likely occur on a rolling basis. Within
30 days of each document production, the producing party will produce a metadata privilege log
identifying documents withheld from that production.. Requesting Parties can make reasonable
requests for additional information on certain documents on the metadata logs. The parties are to
meet and confer regarding requests for additional information.
C.
No Waiver. A Producing Party’s failure to log specific privileged ESI on the
privilege log shall not be deemed a waiver of the privilege.
Inadvertent production of privileged Documents shall be governed by any confidentiality
and protective order ordered by the Court.
D.
Email Thread. A single document containing multiple e-mails in an e-mail chain
may be logged as a single entry containing the information from the most recent email in the
chain. A Producing Party may not withhold embedded or related emails within a thread based
solely on a claim of privilege to a separate email within the same thread. In other words, any
individual email within a thread withheld on a claim of privilege must have its own basis for
privilege.
E.
Documents Redacted for Privilege. As an initial production matter, redacted
Documents need not be logged as long as (i) for emails, the bibliographic information (i.e. to,
from, cc, bcc, recipients, date and time) is not redacted, and the nature of the privilege asserted
(i.e., attorney-client privilege; work product doctrine) is noted on the face of the Document; and
(ii) for non-email Documents, the nature of the privilege asserted (i.e., attorney-client privilege;
work product doctrine) is noted on the face of the Document. Documents that are redacted shall
11
be identified as such in a “redaction” field in the accompanying data load file. After receipt of
the production, a Requesting Party may request in good faith that the Producing Party create a
privilege log for some, any, or all redacted Documents. Upon receipt of such a request, the Parties
shall meet and confer regarding the need for a log and if one is agreed to, the format of such log.
If the Parties cannot agree on the need for or format of a log of redacted Documents, any Party
may seek the assistance of the Court.
VIII. PROCESSING OF NON-PARTY DOCUMENTS
A.
A Party that issues a non-party subpoena (“Issuing Party”) shall include a copy of
this Protocol with the subpoena and request that the non-party produce Documents in accordance
with the specifications set forth herein.
B.
The Issuing Party is responsible for producing to all other Parties any Documents
obtained pursuant to a subpoena to any non-party. To the extent practical given the data volume,
productions by a non-party should be produced by the Issuing Party to all other Parties within
three (3) business days of the non-party’s production to the Issuing Party.
C.
Nothing in this Protocol is intended to or should be interpreted as narrowing,
expanding, or otherwise affecting the rights of the Parties or non-parties to object to a subpoena.
IX.
IMPLEMENTATION AND MODIFICATION OF PROTOCOL
Counsel for the Parties agree to meet and confer if any Party believes this Protocol should
be modified, and the Parties may negotiate and agree in writing to any reasonable exception to or
modification of this Protocol. If such negotiation does not lead to an agreed upon modification,
the Party may apply to this Court for an exception to or modification of this Protocol.
12
Dated: New York, New York
January 10, 2024
KING & SPALDING LLP
By: /s/ Kenneth Steinthal___
Kenneth L. Steinthal
50 California Street
Suite 3300
San Francisco, CA 94111
Phone: (415) 318-1200
Fax: (415) 318-1300
ksteinthal@kslaw.com
David P. Mattern
Dara M. Kurlancheek
1700 Pennsylvania Avenue, NW
Suite 900
Washington, DC 20006-4707
Phone: (202) 737-0500
Fax: (202) 626-3737
dmattern@kslaw.com
dkurlancheek@kslaw.com
MILBANK LLP
By: /s/ Scott Edelman__
Scott A. Edelman
Atara Miller
Andrew L. Porter
Katie Cassidy-Ginsberg
55 Hudson Yards
New York, New York 10001
Telephone: 212-530-5000
Facsimile: 212-530-5219
sedelman@milbank.com
amiller@milbank.com
aporter@milbank.com
kcassidy-ginsberg@milbank.com
Attorneys for Broadcast Music, Inc.
Counsel for Radio Music License Committee
SO ORDERED
SO ORDERED, with the further caveat that nothing in this
Protocol excuses the parties from their obligation to comply
with Rule 4 of the Court’s Individual Rules and Practices in
Civil Cases, which governs redacted and sealed filings.
__________________________
Hon. John P. Cronan
United States District Judge
Dated: January 11, 2024
New York, New York
13
APPENDIX A: ESI METADATA
FIELD
DESCRIPTION
BegBates
Bates number of the first page of the document
EndBates
Bates number of the last page of the document
BegAttach
Beginning Bates number of the first page of the first document of
the document family
Bates number of the last page of the last document of the
document family
Total number of pages in the document
EndAttach
Page Count
Custodian
All Custodians
Original File
Path
File Size
NativeLink
Natural person, group, department, entity, database, etc. in whose
possession the document was found. Custodian names, including
those within the “All Custodians” field, should be uniform and
unambiguous per Custodian
All natural person(s), group(s), department(s) entity(ies), etc. in
whose possession the document was found if duplicate versions
of the document are not produced
The original file path for the document
Size in kilobytes (KB) of the document
Hash Value
Relative file path to each native document in the production
(Produced with all native ESI)
The relative path to the corresponding OCR or extracted text file
included with a production volume
MD5 or SHA-1 value, unique document identifier
Author
Author field extracted from the metadata of the native file
From
Email sender
To
Person to whom and email is addressed
CC
Recipient(s) of electronic “carbon copies” of the email message
BCC
Recipient(s) of electronic “blind carbon copies” of the email
message
TextPath
Subject
Date
Time Sent
Date Received
Time Received
TimeZone
Processed
File Type
File Extension
File Name
Title
Date Created
Date Modified
Date Accessed
Last Modified
By
Confidentiality
Has
Redactions
ProdVolume
Hidden Text
Subject field extracted from the metadata of the native email or
native file
Date the email message was sent (produced in MM/DD/YYYY
format)
Time the email message was sent (produced in HH:MM AM/PM
format in UTC time zone)
Date the email message was received (produced in
MM/DD/YYYY format)
Time the email message was received (produced in HH:MM
AM/PM format in UTC time zone)
Time zone format for produced documents
Email, attachment, individual file, paper, etc.
File extension of document (.msg, .doc, .xls, etc.)
Name of original file
Title of a non-email document (Microsoft Title)
For non-emails (Produced in MM/DD/YYYY format)
For non-emails (Produced in MM/DD/YYYY format)
For non-emails (Produced in MM/DD/YYYY format)
Person who last modified a document
Confidentiality designation
For documents that have redactions
The production volume number
For documents with hidden text
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?