CBF Industria De Gusa S/A et al v. Amci Holdings,Inc., et al

Filing 530

MEMORANDUM ORDER : For the foregoing reasons, the Court grants defendants' requests for redactions except those at pages 12, 16, 17, 18, 36, 37, 40, 41, and 49, as discussed in this Memorandum Order. By September 15, 2021, defendants are dir ected to submit to the Court, by email, a redacted version of the Opinion and Order consistent with this Memorandum Order. The Court will, in turn, docket that version, and then submit it to Westlaw and Lexis for publication. (Signed by Magistrate Judge James L. Cott on 9/10/2021) (ate)

Download PDF
Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 1 of 15 9/10/2021 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ---------------------------------------------------------------X CBF INDUSTRIA DE GUSA S/A, et al., : : Plaintiffs, : : -against: : AMCI HOLDINGS, INC., et al., : : Defendants. : ---------------------------------------------------------------X MEMORANDUM ORDER 13-CV-2581 (PKC) (JLC) JAMES L. COTT, United States Magistrate Judge. Defendants have requested that portions of the Court’s Opinion and Order dated August 18, 2021 be redacted. For the reasons explained below, the request is granted in part and denied in part. I. BACKGROUND On August 18, 2021, the Court issued its Opinion and Order on plaintiffs’ motion for sanctions temporarily under seal and directed the parties to advise the Court of any proposed redactions for the Court’s review. Dkt. No. 526 at 54. The Court reminded the parties to “be mindful of the presumption of public access to judicial documents in proposing any redactions.” Id. (citing Brown v. Maxwell, 929 F.3d 41, 47–48 (2d Cir. 2019) and Lugosch v. Pyramid Co. of Onondaga, 435 F.3d 110, 119–20 (2d Cir. 2006)). On August 23, 2021, defendants filed a letter with their proposed redactions, which they claim “relate exclusively to [d]efendants’ IT infrastructure.” Dkt. No. 527 at 1. In their letter, defendants request that the Court redact “information regarding [their] server locations, vendors, data storage 1 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 2 of 15 practices, and their use of specific hardware or software.” Id. Plaintiffs have not responded to defendants’ request. 1 II. DISCUSSION A. Legal Standard “There is a long-established ‘general presumption in favor of public access to judicial documents.’” Beverly Hills Teddy Bear Co. v. Best Brands Consumer Prod., Inc., No. 19-CV-3766 (GHW), 2020 WL 7706741, at *2 (S.D.N.Y. Dec. 29, 2020) (quoting Collado v. City of New York, 193 F. Supp. 3d 286, 288 (S.D.N.Y. 2016)). “The presumption of access is ‘based on the need for federal courts . . . to have a measure of accountability and for the public to have confidence in the administration of justice.’” Id. (quoting United States v. Amodeo, 71 F.3d 1044, 1048 (2d Cir. 1995)). Given this presumption, the Second Circuit has articulated a three-part test for evaluating whether documents (or certain information within those documents) may be sealed: First, the court must determine whether the documents at issue are judicial documents. Second, it must assess the weight of the presumption of public access that attaches to those documents. Third, the court must ‘balance competing considerations against’ the As defendants note in their letter, an unredacted copy of the Opinion and Order is available via a link contained in an August 19, 2021 article appearing on Law 360. Dkt. No. 527 at 1, n.1. While the Court understands that the Opinion was briefly filed on the public docket in the morning on August 19 due to human error in the docketing process, it has not been able to determine why the version that appeared in the Law 360 article was different from the one originally filed on ECF. In any event, the fact that the Opinion apparently remains publicly available would appear to render this application academic. Nevertheless, because defendants, while acknowledging this fact, have still requested that the Court approve their proposed redactions – and because the issues presented in this application are somewhat novel – the Court is issuing this Memorandum Order. 1 2 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 3 of 15 presumption of access, such as ‘the danger of impairing law enforcement or judicial efficiency and the privacy interests of those resisting disclosure.’ Sylvania v. Ledvance LLC, No. 20-CV-9858 (RA), 2021 WL 412241, at *1 (S.D.N.Y. Feb. 5, 2021) (internal citations omitted) (quoting Lugosch, 435 F.3d at 120). “[T]he proponent of sealing must ‘demonstrat[e] that closure is essential to preserve higher values and is narrowly tailored to serve that interest.’” Bernstein v. Bernstein Litowitz Berger & Grossmann LLP, 814 F.3d 132, 144 (2d Cir. 2016) (quoting In re N.Y. Times Co., 828 F.2d 110, 116 (2d Cir. 1987)). “‘Broad and general findings’ and ‘conclusory assertion[s]’ are insufficient to justify deprivation of public access to the record; ‘specific, on-the-record findings’ are required.” Id. at 144–45 (internal citation omitted) (quoting United States v. Erie Cnty., 763 F.3d 235, 243 (2d Cir. 2014)). Thus, “[t]o meet its heavy burden, the moving party ‘must offer specific facts demonstrating that closure is essential to preserve higher values and is narrowly tailored to serve that interest.’” Beverly Hills Teddy Bear Co., 2020 WL 7706741, at *2 (quoting Wells Fargo Bank, N.A. v. Wales LLC, 993 F. Supp. 2d 409, 413 (S.D.N.Y. 2014)). “[T]he decision as to access [to judicial records] is one best left to the sound discretion of the trial court, a discretion to be exercised in light of the relevant facts and circumstances of the particular case.” Id. (quoting Nixon v. Warner Commc’ns, 435 U.S. 589, 599 (1978)). 3 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 4 of 15 B. Application 1. Judicial Documents “A ‘judicial document’ or ‘judicial record’ is a filed item that is ‘relevant to the performance of the judicial function and useful in the judicial process.’” Bernstein, 814 F.3d at 139 (quoting Lugosch, 435 F.3d at 119). Because the information defendants wish to redact was submitted for the Court’s consideration in response to plaintiffs’ motion for sanctions and was related to the Court’s decision, the information is plainly included as part of judicial documents. See, e.g., Valassis Commc’ns, Inc. v. News Corp., No. 17-CV-7378 (PKC), 2020 WL 2190708, at *2 (S.D.N.Y. May 5, 2020) (“[A]ll the documents at issue were submitted to the Court in support of and so would reasonably have the tendency to influence the Court’s decision on the outstanding motions . . . for sanctions. . . . As such, all documents submitted in support of these motions are judicial documents . . .”); Capricorn Mgmt. Sys., Inc. v. Gov’t Emps. Ins. Co., No. 15-CV-2926 (DRH) (SIL), 2019 WL 5694256, at *22 (E.D.N.Y. July 22, 2019) (documents in support of Rule 37(e) sanctions motion are judicial documents), adopted by 2020 WL 1242616 (Mar. 16, 2020). 2. Weight of Presumption of Public Access “The weight of the presumption is a function of (1) ‘the role of the material at issue in the exercise of Article III judicial power’ and (2) ‘the resultant value of such information to those monitoring the federal courts,’ balanced against ‘competing considerations’ such as ‘the privacy interests of those resisting disclosure.’” 4 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 5 of 15 Bernstein, 814 F.3d at 142 (quoting Lugosch, 435 F.3d at 119–20). “The presumption attached to . . . non-dispositive motions ‘is generally somewhat lower than the presumption applied to material introduced at trial, or in connection with dispositive motions such as motions for dismissal or summary judgment.” Valassis Commc’ns, Inc., 2020 WL 2190708, at *2 (quoting Brown, 929 F.3d at 50). Thus, the information defendants seek to redact is “subject to a lesser—but still substantial— presumption of public access.’” Id. (quoting Brown, 929 F.3d at 53). While the presumption of public access is lower given the non-dispositive nature of the motion at issue here, at least some of the information defendants seek to redact was used as part of the Court’s analysis and “the public would likely need access to the information . . . in order to understand the issues before the Court and evaluate the Court’s reasoning.” Anderson v. New York City Health & Hosps. Corp., No. 16-CV-1051 (GBD) (KHP), 2020 WL 1047054, at *3 (S.D.N.Y. Mar. 4, 2020) (citing Bernstein, 814 F.3d at 141). For example, as discussed in more detail below, defendants seek to redact details regarding the inconsistences in AMCI Holdings’ document preservation practice on page 12 of the Court’s Opinion and Order. However, this information was integral to the Court’s analysis in determining the extent of defendants’ dereliction of their duty to preserve ESI and whether email was actually lost. Accordingly, there is a strong presumption of public access to some of the information, at least to the extent the Court used it to shape and inform its analysis. See, e.g., In re SunEdison, Inc. Sec. Litig., No. 16-CV-7917 (PKC), 2019 WL 12043498, at *2 (S.D.N.Y. Sept. 25, 2019) (“underlying materials [were] 5 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 6 of 15 afforded a high presumption of public access” because they were “an important part of defendants’ opposition . . . that was discussed in detail by the Court”); Bernsten v. O’Reilly, 307 F. Supp. 3d 161, 170 (S.D.N.Y. 2018) (“In order to evaluate that claim, the Court would need to review and analyze the [proposed redacted information]; thereafter, the public should be able to see what the Court relied on in issuing its Opinion. The public would have no way to make sense of the Court’s analysis testing this claim with only partial or limited access to the [proposed redacted information].”). However, the inquiry does not end there. Rather, “[a]gainst the applicable presumption of public access,” the Court must next “consider whether countervailing factors or higher values dictate” redacting the proposed information. Valassis Commc’ns, Inc., 2020 WL 2190708, at *1. 3. Competing Considerations “Although the term [‘higher values’] has not been comprehensively defined, courts have identified particular examples of ‘higher values.’” E.E.O.C. v. Kelley Drye & Warren LLP, No. 10-CV-655 (LTS) (MHD), 2012 WL 691545, at *2 (S.D.N.Y. Mar. 2, 2012) (collecting cases). “Established factors and values that can outweigh the presumption of public access include legal privilege, business secrecy, and privacy interests.” Echo Bay, LLC v. Torrent Pharma, Inc., No. 20-CV-6345 (PKC), 2020 WL 5543070, at *2 (S.D.N.Y. Sept. 16, 2020) (internal citations omitted). Defendants argue that “information regarding server location, vendors, data storage practices, and use of specific hardware or software can be used to facilitate 6 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 7 of 15 unauthorized access, particularly where such information is gathered in a single source,” based on advice apparently provided to them from information security consultants, although they did not submit affidavits from their consultants detailing the extent of the harm or how the information could specifically be used by hackers. 2 They “further note that, ‘[c]ourts have concluded that concerns about hackers and a cyber attack justified sealing information about a company’s IT systems.’” Dkt. No. 527 at 1 (quoting OneAmerica Fin. Partners, Inc. v. T-Sys. N. Am., Inc., No. 15-CV-1534, 2016 WL 891349, at *4 (S.D. Ind. Mar. 9, 2016)). The one case they quote from, in turn, cites three cases from the Northern District of California and a case from the Eastern District of Wisconsin, all of which found that concerns regarding cyber attacks could justify the sealing of certain information. For example, in Music Group Macao Commercial Offshore Limited v. Foote, the court described how certain categories of information can be used to “perpetuate a cyber attack including: (1) identification of a particular vulnerability in a company’s systems or software; (2) knowledge of the software or vendor of security software used; and (3) ‘social engineering’—i.e., gaining the trust of a company insider to, in turn, gain access to the company’s software.” No. 14-CV-3078 (JSC), 2015 WL 3993147, at *5 (N.D. Cal. June 30, 2015). The court then reasoned that “[p]ublic It would have been preferable for defendants to have submitted affidavits from their consultants in support of their application. In the normal course, the Court would expect such evidence in support of the redactions that are being sought here. However, plaintiffs do not oppose defendants’ application, and the Court believes the record is sufficiently developed, especially given the expert reports submitted as part of the motion papers, to rule on defendants’ requests without further submissions. 2 7 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 8 of 15 release of this information could therefore cause [defendant] harm by contributing to [a] cyber attack.” Id. Courts in the Second Circuit have not specifically addressed whether protecting a company from the threat of a “cyber attack” is a “higher value” or “countervailing factor” that can prevail over the presumption of public access. 3 However, protecting a company’s IT information fits comfortably within other “higher values” consistently recognized by courts in this Circuit, such as the protection of “sensitive business information,” Hanks v. Voya Ret. Ins. & Annuity Co., No. 16-CV-6399 (PKC), 2020 WL 5813448, at *2 (S.D.N.Y. Sept. 30, 2020) (collecting cases); the protection of “proprietary business information, such as internal analyses, business strategies, or customer negotiations;” Sec. & Exch. Comm’n v. Telegram Grp. Inc., No. 19-CV-9439 (PKC), 2020 WL 3264264, at *3 (S.D.N.Y. June 17, 2020) (collecting cases); and “the prevention of potential fraud.” Dollar Phone Corp. v. Dun & Bradstreet Corp., No. 09-CV-3645 (ILG) (SMG), 2012 The court in Saint-Jean v. Emigrant Mortg. Co. redacted information related to “cyber security and password setting,” but did not provide its reasoning for doing so. No. 11-CV-2122 (SJ) (RLM), 2016 WL 11430775, at *5 n.11 (E.D.N.Y. May 24, 2016). However, releasing documents related to a company’s “password setting,” would seem to be inherently riskier than making public, for example, the type of email defendants use. Regardless, if “password setting” and the types of information defendants seek to redact produce similar cybersecurity risks, defendants have not met their burden through “a particular and specific demonstration of fact.” T-Jat Sys. 2006 Ltd. v. Amdocs Software Sys. Ltd., No. 13CV-5356 (JMF), 2015 WL 394075, at *6 (S.D.N.Y. Jan. 29, 2015) (“[T]o justify sealing business information, a party must ‘make a particular and specific demonstration of fact showing that disclosure would result in an injury sufficiently serious to warrant protection; broad allegations of harm unsubstantiated by specific examples or articulated reasoning fail to satisfy the test.’” (quoting Lytle v. JPMorgan Chase, 810 F. Supp. 2d 616, 630 (S.D.N.Y. 2011)). 3 8 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 9 of 15 WL 13195012, at *2 (E.D.N.Y. May 10, 2012). See also Kewazinga Corp. v. Microsoft Corp., No. 18-CV-4500 (GHW), 2021 WL 1222122, at *3 (S.D.N.Y. Mar. 31, 2021) (“Courts commonly find that documents that contain trade secrets, confidential research and development information, marketing plans, revenue information, pricing information, and the like satisfy the sealing standard.” (quoting Rensselaer Polytechnic Inst. v. Amazon.com, Inc., No. 18-CV-549 (BKS) (CFH), 2019 WL 2918026, at *2 (N.D.N.Y. June 18, 2019))); In re Am. Realty Cap. Properties, Inc. Litig., No. 15-CV-307 (AKH), 2019 WL 11863704, at *1 (S.D.N.Y. Mar. 25, 2019) (“Screenshots and any other information about . . . software that could be used to copy the program’s structure or functions are more deserving of protection . . . .”). In this vein, at least one court has grouped “IT information,” within the umbrella of “business information,” warranting redactions. See Ramirez v. Temin & Co., Inc., No. 20-CV-6258 (ER), 2020 WL 6781222, at *6 (S.D.N.Y. Nov. 18, 2020) (“The Document also has several sections that include the Firm’s business information. Specifically, the categories of business information include: . . . IT information. The Court has established that business information constitutes confidential information . . . when it is ‘sufficiently valuable and secret to afford an actual or potential economic advantage over others.’” (internal citations omitted) (quoting In re Parmalat Sec. Litig., 258 F.R.D. 236, 245 (S.D.N.Y. 2009))). Accordingly, the need to protect a party from a cyber security attack may be a legitimate basis to rebut the public’s presumption of access to judicial documents, 9 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 10 of 15 where the threat of a cyber security attack outweighs the extent to which the particular information was used to inform the Court’s opinion. With these principles in mind, the Court will now turn to defendants’ proposed redactions. 4. Categories of Redactions Rather than going through each proposed redaction individually, the Court has grouped the redactions into the following eight categories: (1) the nature of defendant companies’ IT infrastructure (Dkt. No. 526 at 7); (2) the names of the companies that handle their IT and the employees affiliated with those companies (id. at 7, 8, 11 n.6, 14, 17, 40, 50, 51); (3) the providers of certain services related to email and document retention (id. at 7, 17, 30); (4) the location of a physical server (id. at 9, 12, 15, 20, 29); (5) descriptions of forensic digital files (id. at 8 n.4, 14 n.8, 15–21, 25, 26, 29, 31, 41, 49, 50); (6) Hans Mende’s, Fritz Kundrun’s, and Hans Fleskes’ specific preservation practices (id. at 9, 11, 18, 29, 30); (7) AMCI Holdings’ document retention policies (id. at 12, 16, 17, 40); and (8) details regarding specific document retention (id. at 18, 37). The specific information redacted within the first four categories was not required to shape the Court’s analysis and the public would not need access to this information to understand the Court’s Opinion. See, e.g., Oliver Wyman, Inc. v. Eielson, 282 F. Supp. 3d 684, 707 (S.D.N.Y. 2017) (“The remaining categories of information [plaintiff] hopes to seal all carry a low presumption of access to public records because they are collateral to the Court’s resolution of the parties’ . . . motions.”). The Court therefore grants defendants’ 10 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 11 of 15 request to redact the information within those categories. The next four categories are more difficult to resolve. As such, the Court will discuss them in more detail. First, defendants seek to redact descriptions of forensic digital files, which includes much of the information the Court examined in determining whether emails were permanently destroyed. For example, defendants seek to redact significant portions of the Court’s descriptions of the parties’ expert reports (Dkt. No. 526 at 16–20). The descriptions, if unsealed, would reveal the type of software defendants use to keep and store emails because they relate to the programs that defendants use for emails, which they contend “can be used to facilitate unauthorized access.” Dkt. No. 527 at 1. While defendants propose to redact much of the information in the description of the expert reports, they do not seek to redact similarly large portions of the Court’s corresponding analysis. In particular, even with defendants’ proposed redactions, the parts of the Court’s Opinion and Order discussing whether the missing ESI could be restored through additional discovery remains largely intact. Dkt. No. 526 at 41–42. The presumption of public access is weaker then because the public would still be able to understand the Court’s rationale for its decision without the specific details of defendants’ email infrastructure. The Court therefore grants the redactions related to the descriptions of forensic digital files at Dkt. No. 526 at 8 n.4, 14 n.8, 15–21, 25, 26, 29, 31, 41, 49, 50. 4 The Court notes that on page 20, on the sixth line of the last paragraph, defendants did not redact a phrase that was otherwise redacted throughout. That phrase should also be redacted to be consistent with the other redactions. 4 11 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 12 of 15 Next, defendants seek to redact information related to Hans Mende’s, Fritz Kundrun’s, and Hans Fleskes’ specific preservation practices. While the specific preservation practices of Mende and Kundrun are crucial to the Court’s analysis on defendants’ duty to preserve ESI (Dkt. No. 526 at 37–38), defendants only seek to redact specific references related to IT practices. 5 Defendants have thus narrowly tailored the proposed redactions without significantly affecting the public’s access to understanding the Court’s Opinion. The Court therefore grants the redactions related to Mende, Kundrun, and Fleskes’ preservation practices at Dkt. No. 526 at 9, 11, 18, 29, 30. Defendants also seek to redact information related to AMCI Holdings’ document retention policies. Beginning at page 12 of the Court’s Opinion and Order, defendants request that the specific references to the contradictions in AMCI Holdings’ preservation practices and policies be redacted. On page 17, defendants similarly attempt to redact a comment that archiving at the AMCI Holdings office was done on an “ad hoc” basis. On pages 16 and 40, defendants wish to redact two sentences that refer to preservation practices and also detail how defendants’ IT personnel archive information, both of which begin with the phrase “[defendants] archived emails ‘at will.’” Many of these references lie at the heart of the Court’s analysis in finding that sanctions were warranted because it was those inconsistencies that led the Court to its conclusions that AMCI Holdings failed to Fleskes was not identified as a custodian in the case and the Court therefore did not discuss his ESI as part of its analysis on lost ESI when determining when defendants’ duty to preserve ESI was triggered. Dkt. No. 526 at 10, 29. 5 12 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 13 of 15 take reasonable steps to preserve ESI and that ESI was ultimately lost. See, e.g., Dkt. No. 526 at 40. Specifically, those references detail how defendants’ counsel failed to “become fully familiar with [their] client’s document retention policies, as well as the client[s’] data retention architecture.” Zubulake v. UBS Warburg LLC, 229 F.R.D. 422, 432 (S.D.N.Y. 2004). The presumption of public access is thus higher, and the threat of a cyber attack must be greater to justify redacting the information. See, e.g., Anderson, 2020 WL 1047054, at *3 (“[T]he public would likely need access to the information . . . in order to understand the issues before the Court and evaluate the Court’s reasoning.”). Defendants have not met their burden to show that the threat of a cyber attack outweighs the public access to the following sentences on page 12: AMCI Holdings “does not have a written record retention policy;” it was AMCI Holdings’ policy to “retain everything indefinitely;” it was “[t]he general practice of AMCI and AMCI Holdings . . . to delete, maintain and/or archive emails and documents at their discretion;” and AMCI Holdings “had no standard practice of preserving employee’s emails.” 6 Defendants have not offered “a particular and specific demonstration of fact,” T-Jat Sys. 2006 Ltd., 2015 WL 394075, at *6 (quotation omitted), that this information can be used by hackers, nor is it apparent to the Court. The same applies to the Court’s reference on page 17 that archiving at the AMCI Holdings office was done on an “ad hoc” basis. However, weighing the factors References to the physical location of servers and employee names, as already discussed, can be redacted and were not included in the excerpts cited herein. 6 13 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 14 of 15 for the sentences on pages 16 and 40 produces a different conclusion. In particular, although the part of the sentences that mention that email archiving was done “at will” was important to the Court’s analysis, the rest of each sentence offers details regarding defendants’ IT practices, which are not as integral to the Court’s analysis, and potentially offer details that could be used maliciously by hackers. Accordingly, the Court will permit redaction of the latter half of each sentence (following the phrase “at will”) on pages 16 and 40. Lastly, defendants seek to redact details regarding specific document retention at pages 18 and 37 of the Court’s Opinion and Order and references to “Tata Emails” on pages 16, 18, 36, 41, and 49. Both sentences refer to the fact that part of the missing emails were “archived on Defendants’ systems” that were recovered from a company called “Tata” in 2012. This fact was crucial to the Court’s determination that emails were lost after 2012, i.e., after defendants’ duty to preserve ESI was triggered. Dkt. No. 526 at 36–37. Consequently, these references ultimately led to the Court’s conclusion that sanctions were warranted. Thus, there is far greater weight of a presumption of public access to these two sentences. Defendants have not provided “a particular and specific demonstration of fact,” that a hacker could use knowledge that email was archived in 2012 to infiltrate defendants’ current information systems. Defendants add that the threat of a cyber attack is greater where “information is gathered in a single source.” Dkt. No. 527 at 1. However, because the Court has granted the majority of defendants’ proposed redactions, the extent to which this particular information may be useful to a 14 Case 1:13-cv-02581-PKC-JLC Document 530 Filed 09/10/21 Page 15 of 15 hacker, without the other information, is less likely. Accordingly, the Court denies the request to redact these two sentences as well as the Court’s references to the “Tata Emails.” III. CONCLUSION For the foregoing reasons, the Court grants defendants’ requests for redactions except those at pages 12, 16, 17, 18, 36, 37, 40, 41, and 49, as discussed in this Memorandum Order. By September 15, 2021, defendants are directed to submit to the Court, by email, a redacted version of the Opinion and Order consistent with this Memorandum Order. The Court will, in turn, docket that version, and then submit it to Westlaw and Lexis for publication. SO ORDERED. Dated: September 10, 2021 New York, New York 15

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?