GAGNE TECHNICAL SERVICES, INC. v. PRESUTTI et al
Filing
55
MEMORANDUM ORDER granting 42 MOTION to Compel Compliance with ESI Protocol by GAGNE TECHNICAL SERVICES, INC. as more fully described in said Order. Signed by Magistrate Judge Patricia L. Dodge on 3/11/2025. (mqe)
IN THE UNITED STATES DISTRICT COURT
FOR THE WESTERN DISTRICT OF PENNSYLVANIA
GAGNE TECHNICAL SERVICES, INC.
d/b/a ELCON TECHNOLOGIES,
Plaintiff,
v.
JOSHUA PRESUTTI, RAM INDUSTRIAL
SERVICES, LLC d/b/a INDUSTRIAL
SERVICE SOLUTIONS,
Defendants.
)
)
)
)
)
)
)
)
)
)
)
)
)
)
Civil Action No. 2:24-cv-71
Magistrate Judge Patricia L. Dodge
MEMORADUM ORDER
In this action, Plaintiff Gagne Technical Services, Inc. (“Elcon”) alleges that a former
employee, Defendant Josh Presutti (“Presutti”), took proprietary information and trade secrets
from Elcon and transferred them to his new employer, Defendant RAM Industrial Services, LLC
(“RAM”), a competitor of Elcon.
Elcon has moved to compel compliance with an ESI Protocol between Elcon and
Defendants. (ECF 42.) The parties’ ongoing e-discovery dispute has been the subject of two
conferences before the Court (ECF 47, 49), during which the parties were provided with
opportunities to explain their respective positions. The issues have also been fully briefed (ECF
44, 51, 52).
I.
Relevant Background
The parties advised the Court in their May 23, 2024 Rule 26(f) Report that they intended
to seek the discovery of ESI and had agreed upon an ESI Protocol (ECF 28-1) and a Stipulated
Confidentiality Agreement and Protective Order (“Protective Order”) (ECF 28-2). 1
1
The Court entered the Protective Order on May 30, 2024. (ECF 32.)
The ESI Protocol requires the parties to select a mutually agreed upon vendor 2 to
investigate devices, accounts, and networks potentially containing Elcon information. Once
identified, the ESI Protocol requires Defendants to deliver all devices and provide access to all
accounts and networks to the vendor for collection and processing of ESI. (ECF 28-1 ¶ 3.)
The parties identified the following devices, accounts, and network locations to be
searched:
a. RAM-issued laptops of Joshua Presutti (2) and Michael Presutti (1);
b. Joshua Presutti’s personal email inboxes (2);
c. Joshua Presutti’s external hard drive (1);
d. RAM-issued cellular phones of Joshua Presutti (1) and Michael Presutti (1);
e. RAM-issued email accounts for Joshua Presutti (1) and Michael Presutti (1);
f. RAM network shared folders housed on RAM’s server:
i.
ii.
iii.
\\iss.lcl\engineering\Corporate_Engineering
\\iss.lcl\rotating\Ram\RMCS\Pittsburgh
\\iss.lcl\Corporate Share\corporate shares\Marketing
Under the ESI Protocol, Elcon was to send Defendants a list of proposed search terms for
review and comment. The parties would then endeavor in good faith to resolve any objections to
Elcon’s proposed terms. Once finalized, the vendor would conduct the search of the devices,
accounts, and networks for the date range 10/30/17 to present. (Id. ¶ 5.)
Initially, the parties agreed to use Precise Discovery (“Precise”) as the e-discovery vendor
and conduct a search pursuant to the ESI Protocol. However, after Defendants objected to the quote
2
The ESI Protocol refers to the selected vendor as “the Consultant.” See ECF 32.
2
provided by Precise, even though Elcon initially offered to split the cost, 3 they agreed that
ArcherHall would be used as the e-discovery vendor after reviewing its proposal.
A month later, despite having received ArcherHall’s estimate of total costs before agreeing
to using it as the vendor, Defendants objected that ArcherHall’s costs were also too high and took
the position that Elcon was responsible for the entire cost of the search. At the first status
conference regarding the parties’ dispute, the Court advised Defendants that they would be
required to pay for the services of the vendor but would not be precluded from later seeking to
shift these costs.
Elcon states that its proposed search terms are based on the files accessed by Presutti before
his departure from Elcon as identified in a preliminary report from bit-x-bit and the projects to
which Presutti had access while at Elcon. Defendants have argued that Elcon’s 75 proposed search
terms 4 are burdensome as they are not narrowly tailored and would likely yield “an unknown
volume of documents[.]” (ECF 44 ¶ 35.) At a status conference on January 31, 2025, the Court
directed Defendants to provide alternative search terms and indicated that if the parties could not
agree, the Court would determine the search terms to be used. Defendants subsequently provided
Elcon with alternate search terms that proposed striking 36 of Elcon’s terms. 5 The parties did not
reach agreement on the search terms.
Another status conference was held on February 18, 2025. While the purpose of the
conference was to discuss whether agreement had been reached on search terms, Defendants raised
several new issues for the first time. Defendants claimed that execution of the ESI Protocol to
3
Elcon has since rescinded its offer to bear half the cost of e-discovery.
Elcon represents to have sent its proposed search terms to Defendants in August of 2024. (ECF
No. 52 at 1.)
5
See ECF No. 51-3.
4
3
which they agreed would violate preexisting confidentiality provisions in contacts between RAM
and third parties. Defendants have been unable to identify, however, the number of RAM’s
contracts that contain confidentiality provisions or what such agreements require, as “[t]here is no
central repository or database housing all of RAM’s contracts at issue, so each contract would need
to be individually located and examined.” (ECF No. 51 at 2.) They suggest that in order to avoid
any potential breach of confidentiality, Joshua Presutti and Michael Presutti’s RAM-issued email
accounts and the RAM network shared folders housed on RAM’s server be searched internally by
RAM rather than by ArcherHall, the approved vendor. 6
Defendants argued that “only the relevant electronically stored information housed on
RAM’s Network was the subject of the ESI Protocol.” (ECF No. 51 at 6) (emphasis in original).
Defendants analogize RAM’s server to “a giant filing cabinet that stores everything in the same
place[,]” arguing that it would be “oppressive and unduly burdensome” to allow the vendor access
to irrelevant information that exceeds the scope of the ESI Protocol. In connection with the
proposed internal search, Defendants offered to have Elcon select the software RAM used to
perform the search of RAM’s Network; broadcast live to Elcon RAM’s search of RAM’s Network;
or record RAM’s search of RAM’s Network for Elcon’s later viewing.
All of these options were rejected by Elcon based on its position that the ESI Protocol
should govern the search. Elcon objects to the in-house search of RAM’s servers or the use of the
software proposed by Defendants. It asserts that documents without machine readable text, such
as common PDF files and drawing files, will not be searchable by Defendants’ software, and these
documents are central to its claims. Further, Elcon argues that Defendants’ suggestion that it
6
At the same time, Defendants agree that ArcherHall could perform the search of all other
identified devices, accounts, and networks.
4
identify alternative software not only shifts the burden to it but also is a further effort to skirt the
parties’ agreement, negotiated many months ago, to use an e-discovery vendor.
On the issue of confidentiality, Elcon argues that the Protective Order in this case addresses
Defendants’ concerns as it relates to confidentiality provisions in contracts with third parties. The
Protective Order provides that the parties can designate any confidential information, documents,
or other material produced during discovery as either “CONFIDENTIAL” or “CONFIDENTIALATTORNEYS’ EYES ONLY.” (ECF 32.) Thus, the parties already contemplated and negotiated
a layer of protection for third parties and for any discoverable confidential materials that may be
produced during discovery.
The ESI Protocol also acknowledges that:
The Parties further stipulate and agree that analysis of the Accounts, Devices, and
Network by a neutral electronically stored information forensic expert/vendor to be
mutually agreed upon by the Parties (“Consultant”) may involve the collection,
exposition, viewing, and assessment of information that may be sensitive,
confidential, personal, proprietary, irrelevant, and/or protected by statutory or other
legal privileges. The Parties agree, therefore, that this Protocol shall govern
Consultant’s analysis, as well as any subsequent treatment, observation, collection,
discussion, production, and destruction of ESI contained in the Accounts, Devices,
and Network.
(ECF 28-1 at 2.) Further, the parties agreed that other than as set forth in the protocol or subject to
a stipulation, the vendor “shall not, directly or indirectly, make available, disclose, or otherwise
share with Elcon, its counsel or other representative, or any other third party, any ESI that resides
in the Accounts and on the Devices and Network.” Id. at 4.
II.
Discussion
A. Search Terms
In response to Elcon’s list of search terms, Defendants suggested that projects that were
not awarded to RAM should be eliminated. As Elcon points out, however, whether RAM was
5
ultimately awarded a project is not material nor dispositive because Elcon is entitled to discover
what information may have been taken by Presutti and provided to RAM.
As to the search terms “Elcon,” “@elcontech.com,” and “Gagne,” Defendants contend that
an additional limiting term must be used in conjunction to narrow the search. But even assuming
these three terms would yield a substantial number of results, Defendants have not proposed any
such limiting terms, and therefore have given no guidance to the Court on how they may be limited.
Further, Defendants’ contention that some of the ESI that includes these terms may already be on
Elcon’s servers is also unavailing, as “Elcon wants to identify forwarded Elcon emails and
documents that circulated within RAM.” (ECF No. 52 at 8) (emphasis added).
For these reasons, the Court will order that the ESI search be accomplished using the search
terms proposed by Elcon.
B. Use of ESI Protocol
In May of 2024, the parties agreed to the terms of an ESI Protocol for the search of
Defendants’ ESI. Among other things, the protocol called for the use of a third-party vendor to
conduct the search and required the identification of the devices, accounts, and network locations
to be searched. As reflected in the protocol, the parties understood that an ESI search might yield
confidential or proprietary information.
The parties subsequently agreed on custodians and devices, accounts, and network
locations to be searched.
Since then, however, Defendants’ shifting positions have created significant delays in
effectuating the ESI Protocol. First, after agreeing to an ESI vendor, they protested the resulting
expense. After agreeing to an alternative vendor who provided an up-front proposal of the cost of
implementing the protocol, they then attempted to shift the entire cost to Elcon. It was only after
6
being advised by the Court that they would be required to incur these expenses, at least initially,
that they raised for the first time that confidentiality provisions in certain, but unidentified,
contracts with third parties would necessitate conducting the ESI search internally.
The Court rejects Defendants’ proposal to conduct an internal search of RAM’s server.
When Defendants entered into the ESI Protocol, they agreed that it would be conducted by an
outside vendor. The Court certainly understands that the use of an ESI vendor will result in certain
costs, but Defendants were made aware of the cost estimates before selecting the vendor, and
consistent with the ESI Protocol, agreed to select ArcherHall. Having done so, Defendants cannot
now object to the costs and may at a later point seek to shift some or all of the costs to Elcon.
After delays, the parties agreed on an outside vendor and identified the devices, accounts,
and networks to be searched. Clearly, as they also acknowledged in the protocol, they understood
that the ESI search could yield confidential documents. Presumably they considered their business
practices, including the existence of contracts with third parties, as well as their methods of storing
ESI, before agreeing to the protocol. Even if they did not do so, however, Defendants’ belated
raising of this issue is unavailing.
The fact that Defendants possess an unidentified number of contracts with third parties that
may have confidentiality provisions of an unknown nature is not sufficient to require the ESI
search to be done internally. According to Elcon, the software Defendants intend to use will not
yield all potentially relevant documents. Even if this can be remedied, both the ESI Protocol and
Protective Order have certain protections in place for confidential information. The Court
recognizes that these protections may or may not completely satisfy whatever agreements
Defendants may have made with third parties about protecting disclosure of confidential
information, but Defendants’ concerns can be obviated by an appropriate order from this Court.
7
Therefore, this 11th day of March, 2025, it is ORDERED that Elcon’s Motion to Compel
Compliance with ESI Protocol is GRANTED as follows:
1. ESI discovery shall proceed forthwith pursuant to the terms of the ESI Protocol.
2. Defendants shall make available their devices, accounts, and network locations
notwithstanding the existence of a contractual provision with a third party that
otherwise limits or precludes the search contemplated in the ESI Protocol and in this
Order.
3. The search terms proposed by Plaintiff shall be applied to search the following devices,
accounts, and network locations:
a.
b.
c.
d.
e.
f.
RAM-issued laptops of Joshua Presutti (2) and Michael Presutti (1);
Joshua Presutti’s personal email inboxes (2);
Joshua Presutti’s external hard drive (1);
RAM-issued cellular phones of Joshua Presutti (1) and Michael Presutti (1);
RAM-issued email accounts for Joshua Presutti (1) and Michael Presutti (1);
RAM network shared folders housed on RAM’s server:
i.
\\iss.lcl\engineering\Corporate_Engineering
ii.
\\iss.lcl\rotating\Ram\RMCS\Pittsburgh
iii.
\\iss.lcl\Corporate Share\corporate shares\Marketing
4. Defendant shall bear the cost associated with performing the searches of all identified
devices, accounts, and network locations in accordance with the term of the ESI
Protocol but may subsequently seek to shift some or all of this cost.
BY THE COURT:
/s/ Patricia L. Dodge
PATRICIA L. DODGE
UNITED STATES MAGISTRATE JUDGE
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?