Kewazinga Corp. v. Google LLC
Filing
43
STIPULATED DISCOVERY PLAN AND ORDER FOR ELECTRONICALLY STORED INFORMATION...regarding procedures to be followed that shall govern the handling of confidential material...Electronically stored information ("ESI") will be part of the discove rable material in this case and the parties agree to cooperatively exchange discoverable material and use reasonable, good faith and proportional efforts to identify, preserve, collect, and produce information relevant to a party's claim or d efense and proportional to the needs of the case, considering the importance of the issues at stake in the action, the amount in controversy, the parties' relative access to relevant information, the parties' resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit. (As further set forth in this Order.) (Signed by Judge Lorna G. Schofield on 5/5/2020) (cf)
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 1 of 15
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
KEWAZINGA CORP.,
Plaintiff,
Case No. 1:20-cv-1106-LGS
v.
GOOGLE LLC,
Defendant.
STIPULATED DISCOVERY PLAN AND XXXXXXXXXXXX ORDER
[PROPOSED]
FOR ELECTRONICALLY STORED INFORMATION
The Parties to this action, by and through their undersigned attorneys, hereby agree and
stipulate to the following:
1.
This Stipulated Discovery Plan for Electronically Stored Information shall apply
to this case in all respects.
2.
Electronically stored information (“ESI”) will be part of the discoverable material
in this case and the parties agree to cooperatively exchange discoverable material and use
reasonable, good faith and proportional efforts to identify, preserve, collect, and produce
information relevant to a party’s claim or defense and proportional to the needs of the case,
considering the importance of the issues at stake in the action, the amount in controversy, the
parties’ relative access to relevant information, the parties’ resources, the importance of the
discovery in resolving the issues, and whether the burden or expense of the proposed discovery
outweighs its likely benefit.
-1-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 2 of 15
Sources of and Limitations on ESI
3.
Parties are expected to use reasonable, good faith and proportional efforts to
preserve, identify and produce relevant information consistent with Fed. R. Civ. P. 26(b)(1).1
This includes identifying appropriate limits to discovery, including limits on custodians,
identification of relevant subject matter, time periods for discovery and other parameters to limit
and guide preservation and discovery issues. A party’s meaningful compliance with this order
and efforts to promote efficiency and reduce costs will be considered in cost-shifting
determinations.
4.
As in all cases, costs may be shifted for disproportionate ESI production requests
pursuant to Federal Rule of Civil Procedure 26. Likewise, a party’s nonresponsive or dilatory
discovery tactics are cost-shifting considerations.
5.
The parties recognize the obligation to take reasonable and proportional steps to
identify and preserve discoverable information within the party’s possession, custody and
control, and agree to identify and preserve ESI only from the following data sources:
a.
b.
PC or laptop hard drives and/or storage that are reasonably accessible;
c.
6.
Electronic mail;
Network file servers and archives that are reasonably accessible.
These data sources are not reasonably accessible because of undue burden or cost
pursuant to Fed. R. Civ. P. 26(b)(2)(B) and ESI from these sources will be preserved pursuant to
normal business retention, but not searched, reviewed, or produced:
a. backup systems and/or tapes used for disaster recovery; and
1
Information can originate in any form, including ESI and paper, and is not limited to information created or stored
electronically.
-2-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 3 of 15
b. systems, server and network logs; and
c. systems no longer in use that cannot be accessed.
7.
The parties generally agree that discovery should be guided by Judge Schofield’s
Individual Rule II(A)(1)(b), but acknowledge that some of the claims and defenses raised in the
litigation implicate facts and interactions from 2015 and earlier. Accordingly, the parties agree
that Judge Schofield’s Individual Rule II(A)(1)(b) should not limit discovery in this case, to the
extent discovery still exists and is reasonably accessible.
8.
Absent a showing of good cause by the requesting party, the parties shall not
modify, on a going-forward basis, their internal procedures used by them in the ordinary course
of business to backup, archive, store or manage information systems and ESI, except that the
parties will preserve non-duplicative discoverable information currently in their possession,
custody or control.
9.
Each party shall identify the ten custodians most likely to have discoverable
material in this case and collect ESI from same.
10.
The parties generally agree that discovery should be guided by Judge Schofield’s
Individual Rule II(A)(1)(d), but agree that it should not limit discovery in this case given the
complexity of the litigation and the number of claims and defenses at issue.
11.
Absent a showing of good cause the following categories of ESI need not be
searched, preserved or collected and are considered inaccessible due to undue burden and/or
expense, or because the information is more reasonably available elsewhere:
a.
Unallocated, slack space, deleted data, file fragments or other data
accessible by use of computer forensics;
-3-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 4 of 15
b.
Random access memory (RAM), temporary files, or other
ephemeral data that is difficult to preserve without disabling the operating
system;
c.
Data relating to online access, such as temporary Internet files,
browser history, file or memory caches and cookies;
d.
Data in metadata fields that are frequently updated automatically
as part of the usual operation of a software application, operating system or
network (e.g., date last opened or printed);
e.
Backup or archived data that is substantially duplicative of data
that is more reasonably accessible elsewhere;
f.
Dynamic fields of databases or log files that are not retained in the
usual course of business;
g.
Video and audio recordings;
h.
Voice messages;
i.
Automatically saved versions of documents and emails;
j.
Instant messaging and chat application data;
k.
Text messages sent to or from cell phones;
l.
Other data stored on handsets, mobile devices, cell phones,
personal digital assistants, tablets, or blackberry devices, such as calendar,
contact or notes, provided that copies of such information is routinely saved or
stored elsewhere;
m.
Logs of calls made from mobile devices, cell phones or
blackberries;
-4-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 5 of 15
n.
Operating system files, executable files, network, server or system
logs, other than accused instrumentalities;
o.
Data from systems that are no longer in use (“Legacy Data”) that
is unreadable or unintelligible on current systems, other than accused
instrumentalities.
p.
Electronic data temporarily stored by laboratory equipment or
attached electronic equipment.
q.
Any other source of ESI not listed in paragraph 5, above.
Search
12.
The parties agree that in responding to an initial Fed. R. Civ. P. 34 request, or
earlier if appropriate, they will meet and confer about methods to search ESI in order to identify
ESI that is subject to production in discovery and filter out ESI that is not subject to discovery.
13.
Each party will use its best efforts to filter out common system files and
application executable files by using a commercially reasonable hash identification
process. Hash values that may be filtered out during this process are located in the National
Software Reference Library (“NSRL”) NIST hash set list. Additional culling of file types based
on file header information may include, but are not limited to: Application Package File, Backup
Files, Batch Files, Binary Disc Image, C++ File Formats, Cascading Style Sheet, Configuration
File, Database File, Dictionary Files, Dynamic Link Library, Event Log Files, Executable Files,
Hypertext Cascading Stylesheet, Java Archive Files, JavaScript files, JavaScript Source Code
and Class Files, Macintosh Resource Fork Files, MP3 Files, MP4 Files, Package Manager Files,
Program Files, Program Installers, Python Script Files, Quicktime Files, Shell Script Files,
System or Temporary Files, Thumbnail Cache Files, Troff Files, TrueType Font Files, Video
-5-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 6 of 15
Media Files, Waveform Audio File Format, Windows Cabinet File, Windows Command Files,
Windows File Shortcut, Windows Help Files, Windows Metafiles and Enhanced Metafiles,
Windows Spool Files, Windows System File. Source code files will be provided according to the
Protective Order and not included in custodial data productions.
General Production Format
14.
The parties will produce ESI in TIFF image format provided that the documents
do not become illegible or unusable when converted to TIFF image format. Certain documents
that become illegible or unusable when converted to TIFF image format (Microsoft Excel files,
other similar spreadsheet application files, Microsoft Access and Microsoft Project), must be
produced in native format. The parties reserve their rights to reasonably seek additional
electronic documents in their native format.
15.
Documents originating in paper form will be scanned at 300 DPI and undergo
Optical Character Recognition (OCR). These documents will be produced in single-page TIFF
image format as indicated below together with document-level text files. Paper documents will
be logically unitized to reflect correct document boundaries for each document.
16.
All production documents will be produced with image load files, the data fields
provided in Table 1, below, and either extracted text or text generated using OCR that render
documents searchable. In those instances where redaction is used, OCR text will be provided in
lieu of the extracted text to allow for removal of the redacted text from production. For
documents produced in native format, in addition to producing extracted text and the data fields
in Table 1 below, the producing party will provide slip sheets endorsed with the production
number and level of confidentiality pursuant to any applicable protective orders in this case.
-6-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 7 of 15
17.
ESI will be processed and produced with all hidden text (e.g., track changes,
speaker’s notes, hidden rows or columns, comments, markups, notes, etc.) and formulas exposed,
expanded and extracted and rendered in the TIFF image.
18.
ESI and documents originally in paper form shall be produced as kept in the usual
course of business. A producing party need not include in its production any indication of the
document request(s) to which a document may be responsive.
Image Format
19.
Documents that are converted to TIFF or JPEG image format will be produced in
accordance with the following technical specifications:
a.
Single-page, 1-bit, group IV TIFF image files at 300 dpi;
b.
Image file names cannot contain embedded spaces;
c.
Bates numbers should be endorsed on the lower right corner of all
TIFF or JPEG images and will be a unique, consistently formatted identifier,
i.e. alpha prefix along with a fixed length number (e.g., ABC0000001). The
number of digits in the numeric portion of the bates number format should not
change in subsequent productions;
d.
Confidential designations, if any, will be endorsed on the lower
left corner of all TIFF or JPEG images;
e.
Presentations, including PowerPoint slides, should be rendered to
TIFF in full slide image format, with any speaker notes following the
appropriate slide image;
f.
Drawings, photographs and any other graphical files, including 2-
D and 3-D drawings, engineering drawings, AutoCAD and SolidWorks,
-7-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 8 of 15
should be rendered to single-page TIFF image format. The format may be
adjusted (e.g., drawing copied onto more than one page).
g.
Excel spreadsheets will only be rendered to TIFF image format if
(1) the file can be fully viewed, meaning that all hidden information in the
Excel file (e.g., rows, columns and comments) will be rendered to TIFF; or (2)
the Excel file has undergone redaction. If a native Excel file is to be produced
in place of TIFF images, a slipsheet TIFF image placeholder containing the
native file name will be produced.
h.
Images will be delivered with an image load file in the Opticon
(.OPT) format as follows:
REL00001,REL001,D:\IMAGES\001\REL00001.TIF,Y,,,3
Column One (REL00001) –the page identifier
Column Two (REL001) –volume identifier; not required, but a space is required
in each line of the load file for this field as illustrated below:
REL00001, ,D:\IMAGES\001\REL00001.TIF,Y,,,3
REL00002, ,D:\IMAGES\001\REL00002.TIF,,,,
Column Three (D:\IMAGES\001\REL00001.TIF) –path to the image to be loaded
Column Four (Y) – Document marker –indicates the start of a unique document.
Column Five (blank) –can be used to indicate box
Column Six (blank) –can be used to indicate folder
Column Seven (3) –often used to store page count, but unused in Relativity
20.
The parties agree to respond to reasonable and specific requests for the production
of higher resolution or color images. Nothing in this Stipulation shall preclude a producing party
from objecting to such requests as unreasonable in number, timing or scope, provided that a
producing party shall not object if the document as originally produced is illegible, difficult to
read, or color provides substantive additional information in the document. The producing party
-8-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 9 of 15
shall have the option of responding by producing a native-file version of the document. If a
dispute arises with regard to requests for higher resolution or color images, the parties will meet
and confer in good faith to try and resolve it.
Data Format
21.
Extracted data, including the data fields listed in Table 1 below, will be produced
in a delimited .DAT file in accordance with the following technical specifications:
a.
The first line of the .DAT file must be a header row identifying
the field names;
b.
The .DAT file must use the following default delimiters:
i.
ii.
iii.
iv.
Comma
Quote
Newline
Multi-value
¶
þ
®
;
ASCII character 020
ASCII character 254
ASCII character 174
ASCII character 059
c.
Date fields should be provided in the format: mm/dd/yyyy;
d.
All attachments should sequentially follow the parent
document/email;
e.
The metadata of email, attachments and application files should
be extracted and produced in a .DAT file using the fields and formatting in
Table 1 below:
Field Name
PRODBEG (or
BEGBATES)
PRODEND (or
ENDBATES)
BEGATTACH
ENDATTACH
CUSTODIAN
TABLE 1: Metadata Field List
Description
First Bates number of each document being produced
Last Bates number of each document being produced
First Bates number of attachment range
Last Bates number of attachment range
Email: User mailbox where the email resided
Application File: Individual from whom the document originated
Includes the Individual (Custodian) from whom the documents
-9-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 10 of 15
FROM
TO
CC
BCC
SUBJECT
DATESENT
TIMESENT
AUTHOR
DATECREATED
DATELASTMOD (or
DATEMOD)
FILESIZE
FILETYPE
FILEEXT
FILENAME
PAGECOUNT
DESIGNATION
NATIVE_FILE
HASHVALUE
OTHER
CUSTODIANS (if
used as an alternative
to identifying DeDuped Custodians in
the CUSTODIAN
field)
TEXT
originated and all Individual(s) whose documents de-duplicated out
(De-Duped Custodian)
Alternatively, De-Duped Custodians can be included in the OTHER
CUSTODIANS field
Email: Sender of an email
Application File: (empty)
**semi colon should be used to separate multiple entries
Recipient(s) of an email
**semi colon should be used to separate multiple entries
Recipient(s) copied on an email
**semi colon should be used to separate multiple entries
Recipients blind copied on an email
**semi colon should be used to separate multiple entries
Email: Subject line of the email
Email: Date the email was sent
Application File: (empty)
Email: Time the email was sent
Application File: (empty)
**This data must be a separate field and cannot be combined with the
DATESENT field
Email: (empty)
Application File: Author of document
Email: (empty)
Application File: Date the document was created
Email: (empty)
Application File: Date the document was last modified
Size of application file document/email in KB
Email, attachment or loose application file
The file extension of the native file
The name of the application file, including file extension (if the
information is easily extractable without undue burden on the parties)
The number of pages of each individual document
The confidentiality designation assigned to the document pursuant to
any confidentiality/protective order in the case
Link to the native email or application file
** The link must be named per the production Bates number
Hash value of each email or application file
Additional custodians who possessed a duplicate copy of an email or
application file (if de-duping across custodians)
The extracted text or OCR text of the application file or email
-10-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 11 of 15
f.
The .DAT file for scanned paper documents must contain, at a
minimum, the following fields: PRODBEG, PRODEND and CUSTODIAN.
22.
In addition to the metadata fields set forth in Table 1, any party may
request, on a case-by-case basis, the producing party to provide additional metadata for
specific files if the party reasonably believes the information may be relevant.
Searchable Text
23.
Searchable text of entire documents will be produced either as extracted text for
all documents that originate in electronic format, or, for paper documents and any document
from which text cannot be extracted, as text generated using Optical Character Recognition
(OCR) technology. For redacted documents, the full text of the redacted version of the
document will be produced.
24.
Searchable text will be produced as a document-level multi-page ASCII text file
with the text file named the same as the PRODBEG field, placed in a separate folder. The full
path of the text file must be provided in the .DAT file for the TEXT field.
Native Files
25.
Native file documents may be included with the electronic production using the
below criteria:
a.
Native file documents must be named the same as the PRODBEG
number;
b.
The full path of the native file must be provided in the .DAT file
for the NATIVE_FILE field;
c.
When native files are produced because rendering the file to TIFF
would not result in viewable images, a TIFF image slipsheet placeholder will
-11-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 12 of 15
be produced endorsed with the file name and the legend “Document Produced
in Native Format” (or something similar);
d.
The confidentiality designation under the Protective Order to be
entered in this action will be produced in the load file in the DESIGNATION
field.
26.
If documents produced in native format are printed for use in deposition, motion
or hearing, the party printing the document must label the front page of the file that is printed
with the corresponding production number and a sequencing page number and, if applicable, the
confidentiality designation assigned by the producing party to that file under an applicable
protective order to be entered in this action.
De-Duplication
27.
A party is required to produce only a single copy of a responsive document, and a
party may de-duplicate responsive ESI across Custodians. A party may also de-duplicate email
threads and attachments as follows: In an email thread, only the most evolved responsive email
in a thread will be produced. Where an earlier-in-thread email has a responsive attachment not
contained within the most evolved responsive email, the most evolved earlier-in-thread email
containing the attachment will also be produced along with its attachment.
28.
Should a producing party de-duplicate any documents in accordance with the
procedure outlined above, the producing party waives any objection as to the authenticity of the
version of the document produced and the fields of data associated with such copy.
29.
Should a producing party de-duplicate any documents in accordance with the
procedure outlined above, the producing party agrees to produce in the CUSTODIAN (or
-12-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 13 of 15
OTHER CUSTODIANS) data field listed in Table 1 the name of each custodian who possessed
or controlled a duplicate copy of any such documents.
30.
The parties agree that an email that includes content in the BCC or other blind
copy field shall not be treated as a duplicate of an email that does not include content in the BCC
field, even if all remaining content in the email is identical.
31.
If applicable, no provision of this Order affects the inspection or production of
source code which will be collected and made available consistent with the Protective Order
governing this case.
32.
For good cause shown, the receiving party shall have the right to request all
duplicates of a produced document consistent with the limitations and procedures in Federal
Rule of Civil Procedure 26(b)(2)(B).
Privileged Documents and Logs
33.
The parties agree under Rule 502 of the Federal Rules of Evidence that any
document containing privileged information or attorney work product that is inadvertently
produced shall be returned to the producing party immediately and that production of such
document or documents shall not constitute a waiver of privilege or protection in this or any
other action. The procedures for addressing inadvertent production of privileged or otherwise
protected material will be set forth in the Protective Order governing this case.
34.
Nothing contained herein is intended to or shall serve to limit a party’s right to
conduct a review of documents, ESI or information (including metadata) for relevance,
responsiveness and/or segregation of privileged and/or protected information before production.
35.
Activities undertaken in compliance with the duty to preserve information are
protected from discovery under Fed. R. Civ. P. 26(b)(3)(A) and (B).
-13-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 14 of 15
36.
With respect to privilege logs:
a.
The parties are not required to include in their privilege logs any
information generated after the filing of the complaint.
b.
For email threaded conversations including the same authors and
recipients, the parties are required to log only the most inclusive and most
recent email thread.
Miscellaneous
37.
The parties agree to meet and confer in good faith as to any discovery dispute
prior to bringing any such dispute to the attention of the court.
38.
This stipulation relates solely to the protocol in this case for identifying,
collecting, and producing ESI. Any party may bring a motion to modify or clarify the
application of this Stipulation.
39.
This stipulation will be approved and adopted as an order of the court in this
action.
So Ordered.
Dated: May 5, 2020
New York, New York
SO STIPULATED AND AGREED
Dated: May 1, 2020
Dated: May 1, 2020
/s/ Ian G. DiBernardo
Ian G. DiBernardo
Timothy K. Gilman
Kenneth L. Stein
Saunak K. Desai
Gregory R. Springsted
STROOCK & STROOCK & LAVAN LLP
/s/ Elizabeth Weyl
John M. Desmarais
Ameet A. Modi
Steven M. Balcof
Elizabeth Weyl
DESMARAIS LLP
230 Park Avenue
-14-
Case 1:20-cv-01106-LGS Document 43 Filed 05/06/20 Page 15 of 15
180 Maiden Lane
New York, NY 10038
Tel: (212) 806-5400
Fax: (212) 806-6006
Email: idibernardo@stroock.com
Email: tgilman@stroock.com
Email: kstein@stroock.com
Email: sdesai@stroock.com
Email: gspringsted@stroock.com
Counsel for Plaintiff Kewazinga Corp.
New York, New York 10169
T: 212-351-3400
F: 212-351-3401
jdesmarais@desmaraisllp.com
amodi@desmaraisllp.com
sbalcof@desmaraisllp.com
eweyl@desmaraisllp.com
Emily H. Chen (pro hac vice)
DESMARAIS LLP
101 California Street
San Francisco, California 94111
T: (415) 573-1900
F: (415) 573-1901
echen@desmaraisllp.com
Counsel for Defendant Google LLC
-15-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?