United States v. Broadcast Music, Inc

Filing 155

ELECTRONIC DISCOVERY PROTOCOL: The Parties (as defined below) mutually agree to the following protocol (the "Protocol") relating to the Production of Documents (as defined below) and electronically stored information ("ESI") for the above-captioned action. SO ORDERED, with the further caveat that nothing in this Protocol excuses the parties from their obligation to comply with Rule 4 of the Court's Individual Rules and Practices in Civil Cases, which governs redacted and sealed filings and further set forth in this Order. (Signed by Judge John P. Cronan on 1/11/2024) (rro)

Download PDF
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK RADIO MUSIC LICENSE COMMITTEE, INC., Petitioner, 1:22-cv-05023 (JPC) Related to United States v. Broadcast Music, Inc., 64 Civ. 3787 (LLS) v. BROADCAST MUSIC, INC. Respondent. ELECTRONIC DISCOVERY PROTOCOL The Parties (as defined below) mutually agree to the following protocol (the “Protocol”) relating to the Production of Documents (as defined below) and electronically stored information (“ESI”) for the above-captioned action. I. GENERAL PROVISIONS Nothing in this Protocol affects the Parties’ discovery obligations under the Southern District of New York’s prevailing rules except as stated herein. The obligations hereunder are not intended to abrogate or diminish any discovery obligations governed by any other order or rule. A. Scope. The procedures and protocols outlined herein govern the production of ESI and paper Documents (collectively “Discoverable Information”) by all Parties to these proceedings, whether they currently are involved or become so in the future. For any other materials, the Parties shall meet and confer regarding the identification, location, collection, search, form, and format of production for specific items or categories of items. All disclosures and productions made pursuant to this Protocol are subject to all orders entered by this Court in this matter. Nothing in this Protocol shall limit a Party’s right to seek or object to discovery as set out in applicable rules or to object to the authenticity or admissibility of any Discoverable Information produced in accordance with this Protocol. 1 B. Limitations and No Waiver. The Parties and their attorneys do not intend by this Protocol to waive their rights to the production, discoverability, confidentiality, attorney-client privilege, or attorney-work product protection as to any Discoverable Information addressed in this Protocol. All Parties preserve their attorney-client privileges, work product protections, and other relevant privileges, and there is no intent by the Protocol or the production of Discoverable Information pursuant to the Protocol to in any way waive or weaken these privileges or suggest their inapplicability in any respect to Discoverable Information in these proceedings. Nothing in this Protocol addresses, limits, or determines the relevance, discoverability, or admission into evidence of any Discoverable Information. C. Cooperation. The Parties shall conduct discovery in a cooperative manner, including without limitation, by reasonably drafting discovery requests and responses in accordance with Federal Rules of Civil Procedure 1 and 26(b)(1); and producing ESI in accordance with Federal Rule of Civil Procedure 34; and by meeting and conferring in good faith on topics such as identification of key custodians, potentially relevant data sources, search methodologies, and such other issues as may arise during the course of discovery. Prior to bringing any discovery dispute to the Court, the Parties must attempt to resolve the dispute on their own, in good faith, and in accordance with the Local Rules of the Southern District of New York and any orders entered by this Court. D. Definitions 1. “Custodian” means an individual employed or formerly employed by a party that is likely to have responsive Documents or ESI 2. “Respondent” means Cumulus Media, Inc. 3. The definition of “Documents” and ESI is the same as the definitions found in Fed. R. Civ. P. 34(a). 4. “Parties” shall mean the named Claimant and named Respondent in the above-captioned proceeding. 5. “Producing Party” shall mean the Party responsible for compiling and 2 Producing Discoverable Information in accordance with the terms of this Protocol in response to a request for production of Documents. 6. “Requesting Party” or “Requesting Parties” shall mean the Party or Parties serving the requests for production of Documents. II. SOURCES OF DISCOVERY MATERIALS The Parties agree to the following: A. Initial Identification of Custodians. Producing Parties shall provide a list of the proposed Custodians for production of ESI in response to the Requesting Party’s discovery requests. The initial list of Custodians shall be reasonable and proportional and should contain the following information for each Custodian: name and job title. B. Additional Custodians. After providing the initial list of proposed Custodians, the Parties will work together in good faith to determine if additional Custodians should be included in the list of reasonable and proportional Custodians whose ESI and Documents will be collected to respond to the Requesting Parties’ discovery requests. III. SEARCH AND RETRIEVAL OF ESI The Parties recognize that discovery is an iterative process. The Parties will endeavor to agree to a method or methods for the search and retrieval of ESI for purposes of production. The Parties will discuss the method or methods for the search for ESI as part of the meet-and-confer process pursuant to this Protocol. 3 A. Defining Search Terms. The Parties agree that search terms may be used to collect and filter ESI. Upon request, the Producing Party shall provide to the Requesting Party a list of reasonable and proportional search terms it intends to use to capture responsive ESI it has agreed to produce, or otherwise specify the manner in which the Producing Party intends to locate and produce documents in response to any particular document request. In connection with proposing such search terms, the Producing Party shall make a reasonable inquiry of client employees to identify relevant terminology, including nicknames, code words, euphemisms, acronyms, slang, terms of art, and other language likely to be contained in responsive Documents. A Producing Party may test its search terms to identify terms that are unreasonably overbroad and/or that fail to sufficiently capture information responsive to document requests. . A Producing Party may modify its list of search terms as a result of the aforementioned testing process. The Parties also recognize that even though a document contains one or more of the search terms, such document may not be responsive to any document request and, under these circumstances, the Producing Party is not required to produce such document(s). Parties may review documents that hit upon search terms for responsiveness prior to production. B. Additional Search Terms. Upon receipt of the search terms and disclosures set forth above, if the Requesting Parties have any additions or modifications to the search terms, they must communicate the additional or modified search terms to the Producing Party within three (3) days of receiving the initial list. To the extent a Producing Party does not agree to a search term proposed by the Requesting Parties, the Producing Party will suggest alternative search terms, testing or validation methods, or provide a good faith explanation for its refusal to use the search term proposed by the Requesting Parties. The Parties may then meet and confer regarding the appropriateness of the proposed search term and, where applicable, information regarding the impact of the proposed search term. If the Parties are unable to agree on search terms after meeting 4 and conferring in good faith, any Party may notify the Court of the unresolved dispute(s) and seek resolution from the Court. C. Other Search Methodologies. If a Producing Party intends to use a methodology for the search of relevant ESI for purposes of Production other than, or in addition to, the use of search terms, it must disclose sufficient information to the Requesting Parties for them to make a reasonable determination as to the efficacy and efficiency of such proposed search methodology. If a Producing Party intends to use a review process that relies on AI-assisted review to exclude documents from review, the Parties agree to meet and confer to determine an appropriate protocol for the AI-assisted review. If the Requesting Party objects to the use of other search methodologies, the Parties agree to meet and confer in good faith to resolve the dispute. The Parties shall attempt to resolve any objections before seeking relief from the Court. D. Follow-up Discovery. A Party may for good cause shown request that ESI for additional Custodians be collected and searched and/or that additional search terms be applied. When such a request is made, the Parties will promptly meet and confer and attempt in good faith to reach agreement as to the additional Custodians or search terms requested. The Parties reserve all rights and objections with respect to adding Custodians or search terms. If the Parties cannot reach agreement, such dispute may be presented to the Court for resolution. IV. FILTERING OF ESI A. Email Threading. 1. Email threads are email communications that contain prior or lesser- included email communications that also may exist separately in the Party’s electronic files. A most inclusive email thread is one that contains all the prior or lesser-included emails, including attachments, for that branch of the email thread. Each Party may produce (or list on any required privilege log) only the most inclusive email threads as long as the most inclusive email thread includes all non-produced emails that are part of the same string. 2. Following production of the most-inclusive email threads, a Requesting Party may make reasonable requests for production of individual prior or lesser-included emails 5 within the identified most-inclusive email threads. The Producing Party shall cooperate reasonably in responding to any such requests. B. De-Duplication. 1. “Duplicate ESI” means files that are exact duplicates using an industry- accepted file hash algorithm. The Producing Party need produce only a single copy of responsive Duplicate ESI. A Producing Party shall take reasonable steps to de-duplicate ESI globally (i.e., both within a particular custodian’s files and across all custodians). Entire Document families may constitute Duplicate ESI. De-duplication shall not break apart families. 2. No Party may de-duplicate near duplicates (i.e., Documents containing handwriting or other alterations will not be considered duplicates). The Parties will de-duplicate exact duplicates according to the following requirements: a. All custodians who were in possession of a de-duplicated Document must be identified in the CUSTODIAN-DUPE metadata field specified in Section VI.H.1.; b. The Parties further agree that an email that includes content in the BCC or other blind copy field will not be treated as a duplicate of an email that does not include content in the BCC or other blind copy field, even if all remaining content in the email is identical; and c. If a Producing Party becomes aware of any file that was incorrectly filtered during the de-duplication process and that should have been produced, the Producing Party shall promptly produce the Document to the Requesting Parties. C. De-NISTing. Electronic file collections will be DE-NISTed, removing commercially available operating system and application file information contained on the current NIST file list. D. Zero-byte Files. The Parties may filter out stand-alone files identified as zero- bytes in size. E. The Parties may meet and confer about additional filtering techniques. 6 V. PRODUCTION OF HARD-COPY DOCUMENTS A Party will produce Documents that exist only in hardcopy form scanned and produced in TIFF form as set out in Section VI.A & VI.C-E. The scanning must be done such that the resulting image includes all information on the original hardcopy Document. The production of original hardcopy Documents in TIFF form does not otherwise require that the scanned images be treated as ESI. For all hardcopy Documents produced in *.tif format, the following fields, if available, shall be provided in the data load file: (a) BEGDOC; (b) ENDDOC; (c) CUSTODIAN; (d) REDACTION; and (e) CONFDESG. VI. PRODUCTION OF ESI A. Document Image Format. The Producing Party shall produce Documents in single-page Group IV “TIFF” format. If ESI has hidden text (e.g., track changes, hidden columns, comments, notes, markups, etc.) associated with it, the Parties shall produce the ESI in a form showing such hidden text to the extent reasonably practicable. B. Native File Format. A party shall have the option to produce ESI in native format; provided, however, that all Excel spreadsheets, similar spreadsheet files, or data sets must be produced in native format, unless any such Documents are available only in hard-copy format. All Excel spreadsheets, similar spreadsheet files, or data sets produced in native format without redactions should retain all formulae, macros, and VBA code. Any redaction applied to a native Excel spreadsheet, similar spreadsheet file, or data set shall be performed by freezing the original values of all cells and replacing removed content with “REDACTED” and a brief description of the reason for the redaction. All Documents produced solely in Native format should (i) have an assigned Document level Bates number, (ii) include a placeholder image for each file that identifies the Bates number, (iii) be renamed according to the assigned Bates number and include an appropriate confidentiality provision if the Document qualifies for confidential treatment pursuant to the terms of any confidentiality and protective order ordered by the Court, and (iv) have a “nativepath” populated 7 along with the metadata load file pursuant to the guidelines outlined in paragraph VI.H and Appendix A attached hereto. The Producing Party will honor reasonable requests made in good faith for production of Documents or particular file types in native format where the Requesting Parties have a particular need to review these Documents or types of files in native format. C. Document Unitization. For files produced as TIFF images, each page of a Document shall be electronically saved as an image file. If a Document consists of more than one page, the unitization of the Document and any attachments and/or affixed notes shall be maintained as it existed in the original when creating the image files. The Producing Party shall produce a unitization file (.OPT file) (“load file”) for all produced Documents in accordance with paragraph VI.L. D. Color. Hard copy Documents and Documents reduced to TIFF may be produced in black and white in the first instance unless the Producing Party believes that production in color is reasonably necessary for a Document to be understood, in which case such Document will be produced in color. In addition, the Producing Party will honor reasonable requests made in good faith for copying or production of a color image of the Document (and, in the case of a hard copy Document, a color hard copy) where a Requesting Party explains why the color is reasonably necessary to decipher the meaning, context, or content of the Document. E. Bates Numbering and Other Unique Identifiers. For files produced in the Document image format agreed to pursuant to paragraph VI.A., each page of a produced Document, shall have a legible, unique page identifier (“Bates Number”) electronically “burned” onto the image in such a manner that information from the source Document is not obliterated, concealed, or interfered with. There shall be no other legend or stamp placed on the Document image unless a Document qualifies for confidential treatment pursuant to the terms of any confidentiality and protective order entered by the Court in this action, or has been redacted in accordance with applicable law or order. In the case of any confidentiality or other designation applicable to a Document, or materials redacted in accordance with applicable law or order, a 8 designation may be “burned” onto the Document’s image at a location that does not obliterate or obscure any information from the source Document. Any Party producing ESI in a Native format shall produce the Document in the format agreed to pursuant to paragraph VI.B. F. Production Media. The Producing Party shall produce Documents by secure FTP or comparable secure electronic transfer means, unless the quantity of data produced makes it more efficient to produce Documents on external hard drive (with standard PC compatible interface) (the “Production Media”). Documents produced on external hard drive shall be encrypted; the password shall be provided to the Requesting Parties under separate cover. G. Electronic Text Files. Where Documents maintained in the ordinary course of business contain searchable text, text files shall be produced reflecting the full text that has been electronically extracted from the Documents (“Extracted Text”), including any hidden text. In the event a Document is not text searchable, for instance when original files exist in paper format and were scanned to create a digital copy, or when redactions have been applied to a document, the producing Party shall provide OCR text files. With respect to emails, the Extracted Text shall include email header information, including to, from, cc, bcc, subject, date, and the names of attachment files. The text files shall be produced in multi-page text file format and will be named in such a way that they can be associated with their corresponding Static Images in databases utilized by commercially available Document management or litigation support software. H. Metadata. 1. The Parties are not obligated to populate manually any metadata fields, except for the CUSTODIAN, CUSTODIAN-DUPE, and SOURCE fields, if such fields cannot automatically be extracted from a Document. To the extent any ESI contains information subject to a claim of privilege or any other applicable protection, its respective metadata may be redacted or withheld. If metadata is redacted or withheld, the Producing Party will so inform the Requesting Parties and record the redaction on any privilege log prepared by the Producing Party. Redacted metadata will be preserved. 2. Each Party will produce metadata fields associated with each electronic Document 9 produced in TIFF format (to the extent such metadata exists in the collected Documents) listed in Appendix A attached hereto. 3. The Parties must produce all files attached to each email they produce to the extent the attachments are reasonably accessible, unless the Parties agree otherwise or the Court orders otherwise. To the extent a Party produces electronic Documents attached to emails, a Party will produce the metadata for those attached electronic Documents to the extent possible. I. Attachments. Email attachments and embedded files or links must be mapped to their parent by the Document or Production number. If attachments and embedded files are combined with their parent Documents, then “BeginAttach” and “EndAttach” fields (or the functional equivalent, depending on the production format chosen) listing the unique beginning and end number for each attachment or embedded Document must be included, when possible. Bates numbering for any Attachments must sequentially follow the Bates number(s) for the parent record. J. Load Files. The Producing Party shall produce (a) a data load file, which will contain the bates-number range, attachment range and associated metadata, if any, for each Document; and (b) an image load file which shall cross reference the TIFF images with the location path. The load files should be provided as DAT files (CONCORDANCE). If in a particular instance the above steps are not reasonably possible, then the Producing Party will disclose the nature and extent of the difficulties and the Parties will seek to agree on an alternate means of production. The Producing Party shall also produce a image load file (.OPT file) to facilitate the use of the produced images by a Document management or litigation support database system. K. Password-protected files. The Producing Party will make reasonable efforts to open and access password-protected files that are identified during processing, or otherwise provide such passwords. VII. ASSERTIONS OF PRIVILEGE A. Nothing in this Protocol is intended to or should be interpreted as narrowing, expanding, or otherwise affecting the rights of the Parties to object to a Requesting Party’s 10 document requests. B. Privilege Log. If a Producing Party withholds Discoverable Information based on a claim of privilege, the Producing Party will provide a metadata privilege log, with each entry to include the following metadata fields: Document ID/Bates Number, Attachment ID/Bates Number, Date, Document Type, Sender/From, Recipient/To, CC Recipient, BCCRecipient, Subject, File Name, Basis for Withholding (e.g. Attorney-Client, Work Product) The Parties recognize that Production of Discoverable Information will likely occur on a rolling basis. Within 30 days of each document production, the producing party will produce a metadata privilege log identifying documents withheld from that production.. Requesting Parties can make reasonable requests for additional information on certain documents on the metadata logs. The parties are to meet and confer regarding requests for additional information. C. No Waiver. A Producing Party’s failure to log specific privileged ESI on the privilege log shall not be deemed a waiver of the privilege. Inadvertent production of privileged Documents shall be governed by any confidentiality and protective order ordered by the Court. D. Email Thread. A single document containing multiple e-mails in an e-mail chain may be logged as a single entry containing the information from the most recent email in the chain. A Producing Party may not withhold embedded or related emails within a thread based solely on a claim of privilege to a separate email within the same thread. In other words, any individual email within a thread withheld on a claim of privilege must have its own basis for privilege. E. Documents Redacted for Privilege. As an initial production matter, redacted Documents need not be logged as long as (i) for emails, the bibliographic information (i.e. to, from, cc, bcc, recipients, date and time) is not redacted, and the nature of the privilege asserted (i.e., attorney-client privilege; work product doctrine) is noted on the face of the Document; and (ii) for non-email Documents, the nature of the privilege asserted (i.e., attorney-client privilege; work product doctrine) is noted on the face of the Document. Documents that are redacted shall 11 be identified as such in a “redaction” field in the accompanying data load file. After receipt of the production, a Requesting Party may request in good faith that the Producing Party create a privilege log for some, any, or all redacted Documents. Upon receipt of such a request, the Parties shall meet and confer regarding the need for a log and if one is agreed to, the format of such log. If the Parties cannot agree on the need for or format of a log of redacted Documents, any Party may seek the assistance of the Court. VIII. PROCESSING OF NON-PARTY DOCUMENTS A. A Party that issues a non-party subpoena (“Issuing Party”) shall include a copy of this Protocol with the subpoena and request that the non-party produce Documents in accordance with the specifications set forth herein. B. The Issuing Party is responsible for producing to all other Parties any Documents obtained pursuant to a subpoena to any non-party. To the extent practical given the data volume, productions by a non-party should be produced by the Issuing Party to all other Parties within three (3) business days of the non-party’s production to the Issuing Party. C. Nothing in this Protocol is intended to or should be interpreted as narrowing, expanding, or otherwise affecting the rights of the Parties or non-parties to object to a subpoena. IX. IMPLEMENTATION AND MODIFICATION OF PROTOCOL Counsel for the Parties agree to meet and confer if any Party believes this Protocol should be modified, and the Parties may negotiate and agree in writing to any reasonable exception to or modification of this Protocol. If such negotiation does not lead to an agreed upon modification, the Party may apply to this Court for an exception to or modification of this Protocol. 12 Dated: New York, New York January 10, 2024 KING & SPALDING LLP By: /s/ Kenneth Steinthal___ Kenneth L. Steinthal 50 California Street Suite 3300 San Francisco, CA 94111 Phone: (415) 318-1200 Fax: (415) 318-1300 ksteinthal@kslaw.com David P. Mattern Dara M. Kurlancheek 1700 Pennsylvania Avenue, NW Suite 900 Washington, DC 20006-4707 Phone: (202) 737-0500 Fax: (202) 626-3737 dmattern@kslaw.com dkurlancheek@kslaw.com MILBANK LLP By: /s/ Scott Edelman__ Scott A. Edelman Atara Miller Andrew L. Porter Katie Cassidy-Ginsberg 55 Hudson Yards New York, New York 10001 Telephone: 212-530-5000 Facsimile: 212-530-5219 sedelman@milbank.com amiller@milbank.com aporter@milbank.com kcassidy-ginsberg@milbank.com Attorneys for Broadcast Music, Inc. Counsel for Radio Music License Committee SO ORDERED SO ORDERED, with the further caveat that nothing in this Protocol excuses the parties from their obligation to comply with Rule 4 of the Court’s Individual Rules and Practices in Civil Cases, which governs redacted and sealed filings. __________________________ Hon. John P. Cronan United States District Judge Dated: January 11, 2024 New York, New York 13 APPENDIX A: ESI METADATA FIELD DESCRIPTION BegBates Bates number of the first page of the document EndBates Bates number of the last page of the document BegAttach Beginning Bates number of the first page of the first document of the document family Bates number of the last page of the last document of the document family Total number of pages in the document EndAttach Page Count Custodian All Custodians Original File Path File Size NativeLink Natural person, group, department, entity, database, etc. in whose possession the document was found. Custodian names, including those within the “All Custodians” field, should be uniform and unambiguous per Custodian All natural person(s), group(s), department(s) entity(ies), etc. in whose possession the document was found if duplicate versions of the document are not produced The original file path for the document Size in kilobytes (KB) of the document Hash Value Relative file path to each native document in the production (Produced with all native ESI) The relative path to the corresponding OCR or extracted text file included with a production volume MD5 or SHA-1 value, unique document identifier Author Author field extracted from the metadata of the native file From Email sender To Person to whom and email is addressed CC Recipient(s) of electronic “carbon copies” of the email message BCC Recipient(s) of electronic “blind carbon copies” of the email message TextPath Subject Date Time Sent Date Received Time Received TimeZone Processed File Type File Extension File Name Title Date Created Date Modified Date Accessed Last Modified By Confidentiality Has Redactions ProdVolume Hidden Text Subject field extracted from the metadata of the native email or native file Date the email message was sent (produced in MM/DD/YYYY format) Time the email message was sent (produced in HH:MM AM/PM format in UTC time zone) Date the email message was received (produced in MM/DD/YYYY format) Time the email message was received (produced in HH:MM AM/PM format in UTC time zone) Time zone format for produced documents Email, attachment, individual file, paper, etc. File extension of document (.msg, .doc, .xls, etc.) Name of original file Title of a non-email document (Microsoft Title) For non-emails (Produced in MM/DD/YYYY format) For non-emails (Produced in MM/DD/YYYY format) For non-emails (Produced in MM/DD/YYYY format) Person who last modified a document Confidentiality designation For documents that have redactions The production volume number For documents with hidden text

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?