Rockstar Consortium US LP et al v. Google Inc
Filing
95
ORDER REGARDING E-DISCOVERY. Signed by Magistrate Judge Roy S. Payne on 6/24/2014. (ch, )
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
ROCKSTAR CONSORTIUM US LP
AND NETSTAR TECHNOLOGIES
LLC,
Civil Action No. 2:13-cv-893
Plaintiffs,
v.
JURY TRIAL DEMANDED
GOOGLE INC.,
Defendant.
PROPOSED
ORDER REGARDING E-DISCOVERY
The Court ORDERS as follows:
1.
This order supplements all other discovery rules and orders. It streamlines Electronically
Stored Information (“ESI”) production to promote a “just, speedy, and inexpensive
determination” of this action, as required by Federal Rule of Civil Procedure 1.
2.
The parties will make reasonable efforts to prepare responsive and nonprivileged data for
production in accordance with the agreed-upon specifications set forth below. These
specifications apply to hard copy documents or electronically stored information (“ESI”) which
are to be produced in this litigation.
3.
A party’s meaningful compliance with this order and efforts to promote efficiency and
reduce costs will be considered in cost-shifting determinations.
4.
Absent a showing of good cause, general ESI production requests under Federal Rules of
Civil Procedure 34 and 45, or compliance with a mandatory disclosure requirement of this Court,
shall not include metadata with the exception of the following: (a) BEGBATES, (b)
ENDBATES, (c) BEGATTACH, (d) ENDATTACH, (e) CUSTODIAN, and (f)
CONFIDENTIALITY DESIGNATION, which should be populated by the party or the party’s
vendor. However, fields showing the date and time that the document was sent and received, as
well as the complete distribution list, shall generally be included in the production if such fields
exist. The above also applies to hard copy documents. The parties will make reasonable efforts
to ensure that metadata fields automatically extracted from the documents are correct, however,
the parties acknowledge that such metadata may not always be accurate and might instead
contain irrelevant or incorrect information generated during the collection process.
5.
Absent agreement of the parties or further order of this court, the following parameters
shall apply to ESI production:
A.
General Document Image Format. Each electronic document shall be produced
in single-page Tagged Image File Format (“TIFF”) format. TIFF files shall be
single page and shall be named with a unique production number followed by the
appropriate file extension. Single page Group IV TIFFs should be provided, at
least 300 dots per inch (dpi). Each TIFF image shall be named according to a
unique corresponding bates number associated with the document. Each image
shall be branded according to the bates number and the appropriate confidentiality
designation. Original document orientation should be maintained (i.e., portrait to
portrait and landscape to landscape). If a document is more than one page, the
unitization of the document and any attachments and/or affixed notes shall be
maintained as they existed in the original document.
1
Documents that exist only in hard copy format shall be scanned and produced as
single page Group IV TIFFs, with at least 300 dots per inch (dpi). Each TIFF
image shall be named according to a unique corresponding bates number
associated with the document. Each image shall be branded according to the bates
number and the agreed upon confidentiality designation. TIFFs shall show all text
and images that would be visible to a user of the hard copy documents.
In scanning hard copy documents, distinct documents should not be merged into a
single record, and single documents should not be split into multiple records (i.e.,
hard copy documents should be logically unitized).
The parties will use
reasonable efforts to unitize documents correctly.
B.
OCR. A commercially acceptable technology for optical character recognition
“OCR” shall be used for all scanned, hard copy documents. OCR text shall be
provided as a single multi-page text file for each document, and the filename
should match its respective TIFF filename. The text files will not contain the
redacted portions of the documents.
C.
Database Load Files/Cross-Reference Files. Productions shall include, in
addition to single page TIFFs and Text Files, (a) an ASCII delimited data file
(.txt, .dat, or .csv), and (b) an image load file that can be loaded into commercially
acceptable production software (e.g., Concordance, Summation). The image load
file shall contain the following comma-delimited fields: BEGBATES, VOLUME,
IMAGE FILE PATH, DOCUMENT BREAK, FOLDER BREAK, PAGE
COUNT. The metadata load file shall be delimited according to the following
characters: Delimiter = D (ASCII: 0020); Text-Qualifer = þ (ASCII:00254). Each
2
TIFF in a production must be referenced in the corresponding image load file.
The total number of pages referenced in a production’s image load file should
match the total number of TIFF files in the production. The total number of
documents referenced in a production’s data load file should match the total
number of designated document breaks in the Image Load file(s) in the
production.
D.
Footer. Each document image shall contain a footer with a sequentially ascending
bates number.
E.
Native Files. To the extent that the term “native” is used in this agreement, it
means either in native or otherwise comparable format. Thus, for example, if a
Google slide presentation is to be produced in native format, producing the
document as a .ppt file would be appropriate. A party that receives a document
produced in a format specified above may make a reasonable request to receive
the document in its native format, and upon receipt of such a request, the
producing party shall produce the document in its native format. Excel files and
files failing to generate TIFF images (executables, multi-media, etc.) shall be
produced in native file format. Each document produced in native format will
have its production number and confidentiality designation identified in the file
name of the native file, for example, bates_designation.file extension (E.G.
RSNETTX0000001_HIGHLY_CONFIDENTIAL_OUTSIDE_COUNSEL_ONL
Y.xls). Any native files that are produced shall be produced with a link in the
NativeLink field. A TIFF placeholder indicating that the document was provided
in native format should accompany the database record. If a file has been
3
redacted, TIFF images and OCR text of the redacted document will suffice in lieu
of a native file and extracted text.
F.
Presentations. The parties shall take reasonable efforts to process presentations
(MS PowerPoint, Google Presently) with hidden slides and speaker’s notes
unhidden, and to show both the slide and the speaker’s notes on the TIFF image.
Spreadsheets. TIFF images of spreadsheets (MS Excel, Google Trix) need not
be produced unless redacted, in which instance, spreadsheets shall be produced in
TIFF with OCR Text Files. Native copies of spreadsheets shall be produced with
a link in the NativeLink field, along with extracted text and applicable metadata.
A TIFF placeholder indicating that the document was provided in native format
should accompany the database record. If a spreadsheet has been redacted, TIFF
images and OCR text of the redacted document will suffice in lieu of a native file
and extracted text. The parties will make reasonable efforts to ensure that any
spreadsheets that are produced only as TIFF images are formatted so as to be
readable.
G.
Proprietary Software. To the extent a response to discovery requires production
of ESI accessible only through proprietary software, the parties should continue to
preserve each version of such information. The parties shall meet and confer to
finalize the appropriate production format.
H.
Source Code. To the extent relevant to the Litigation, source code will be made
available for inspection pursuant to the terms of the Protective Order. The parties
agree that search terms will not be applied to source code.
4
I.
No Backup Restoration Required. Absent a showing of good cause, no party
need restore any form of media upon which backup data is maintained in a party’s
normal or allowed processes, including but not limited to backup tapes, disks,
SAN, and other forms of media, to comply with its discovery obligations in the
present case.
J.
Production Media. Documents shall be produced on external hard drives,
readily accessible computer(s) or other electronic media (“Production Media”).
Each piece of Production Media shall identify a production number corresponding
to the production volume (e.g., “VOL001,” “VOL002”), as well as the volume of
the material in that production (e.g. “-001,” “-002”). Each piece of production
media shall also identify: (1) the producing party’s name; (2) the production date;
(3) the bates number range of the materials contained on the Production Media;
and (4) whether the media contains Designated Material under the Protective
Order in this case.
6.
Data Processing
A.
Keyword Searching. To the extent that keyword or other methodologies are
used to identify the universe of potentially responsive documents to be processed
for review, the parties shall meet and confer to try to develop a mutually
agreeable list of search terms and protocols prior to the production of documents.
Any search methodology employed must open compound and nested files and decompress archived files. The search utilities employed must support the use of
stemmed searches (e.g. using ~ to include variations on a keyword), wildcard
searches, Boolean searches, and proximity searching.
5
B.
Culling/Filtering. Each party will use its best efforts to filter out common system
files and application executable files by using a commercially reasonable hash
identification process. Hash values that may be filtered out during this process are
located in the National Software Reference Library (“NSRL”) NIST hash set list.
Additional culling of system file types based on file extension may include, but
are not limited to: WINNT, LOGS, DRVS, MP3, MP4, C++ Program File (c),
C++ Builder 6 (cpp), Channel Definition Format (cdf), Creatures Object Sources
(cos), Dictionary file (dic), Executable (exe), Hypertext Cascading Style Sheet
(css), JavaScript Source Code (js), Label Pro Data File (IPD), Office Data File
(NICK), Office Profile Settings (ops), Outlook Rules Wizard File (rwz), Scrap
Object, System File (dll), Temporary File (tmp), Windows Error Dump (dmp),
Windows Media Player Skin Package (wmz), Windows NT/2000 Event View
Log file (evt), Python Script files (.py, .pyc, .pud, .pyw), Program Installers.
C.
Deduplication. A party is required to produce only a single copy of a responsive
document and a party may de-duplicate responsive ESI (based on MD5 or SHA-1
hash values at the document level) across Custodians. For emails with
attachments, the hash value is generated based on the parent/child document
grouping. A party may also de-duplicate “near-duplicate” email threads as
follows: In an email thread, only the final-in-time document need be produced,
assuming that all previous emails in the thread are contained within the final
message. Where a prior email contains an attachment, that email and attachment
shall not be removed as a “near-duplicate.” To the extent that de-duplication
6
through MD5 or SHA-1 hash values is not possible, the parties shall meet and
confer to discuss any other proposed method of de-duplication
7.
General ESI production requests under Federal Rules of Civil Procedure 34 and 45, or
compliance with a mandatory disclosure order of this court, shall not include e-mail or other
forms of electronic correspondence (collectively “e-mail”). To obtain e-mail parties must
propound specific e-mail production requests.
8.
E-mail production requests shall be phased to occur timely after the parties have
exchanged initial disclosures, a specific listing of likely custodians, a specific identification of
the twenty most significant listed e-mail custodians in view of the pleaded claims and defenses,1
infringement contentions and accompanying documents pursuant to P.R. 3-1 and 3-2, invalidity
contentions and accompanying documents pursuant to P.R. 3-3 and 3-4, and preliminary
information relevant to damages. The exchange of this information shall occur at the time
required under the Federal Rules of Civil Procedure, Local Rules, or by order of the court. The
parties shall provide the specific identification of the twenty most significant listed custodians on
or before June 30, 2014.
9.
E-mail production requests shall identify the custodian, search terms, and time frame of
e-mail sought. The parties shall cooperate to identify the proper custodians, proper search terms,
and proper time frame. Each requesting party shall limit its e-mail production requests to a total
of twelve custodians per producing party for all such requests. The parties recognize that this
proceeding is still in a preliminary stage and that discovery has not yet commenced. As such, the
parties may jointly agree to modify this limit without the court’s leave. Accordingly, the parties
agree to meet and confer in good faith about reasonable adjustments to any of the preceding
1
A “specific identification” requires a short description of why the custodian is believed to be
significant.
7
limits as discovery progresses. Furthermore, to the extent the parties are unable to reach
agreement, the court shall consider contested requests for additional or fewer custodians per
producing party, upon showing a distinct need based on the size, complexity, and issues of this
specific case.
10.
Each requesting party shall limit its custodial production requests to a total of twenty
search terms per custodian. The parties recognize that this proceeding is still in a preliminary
stage and that discovery has not yet commenced. As such, the parties may jointly agree to
modify this limit without the court’s leave. Accordingly, the parties agree to meet and confer in
good faith about reasonable adjustments to any of the preceding limits as discovery progresses.
Furthermore, to the extent the parties are unable to reach agreement, the court shall consider
contested requests for additional or fewer search terms, upon showing a distinct need based on
the size, complexity, and issues of this specific case. The search terms shall be narrowly tailored
to particular issues. Indiscriminate terms, such as the producing company’s name or its product
name, are inappropriate unless combined with narrowing search criteria that sufficiently reduce
the risk of overproduction. A conjunctive combination of multiple words or phrases (e.g.,
“computer” and “system”) narrows the search and shall count as a single search term. A
disjunctive combination of multiple words or phrases (e.g., “computer” or “system”) broadens
the search, and thus each word or phrase shall count as a separate search term unless they are
variants of the same word. Use of narrowing search criteria (e.g., “and,” “but not,” “w/x”) is
encouraged to limit the production and shall be considered when determining whether to shift
costs for disproportionate discovery.
11.
In response to the email production requests, the parties will search any e-mails,
electronic files or folders, or other parts of media, including any internal and external hard drives
8
and other ESI venues (including, but not limited to, recordable optical media, media cards,
thumb drives, non-volatile memory, floppy disks, work desktop and laptop computers, email
servers, intranet servers, network shares, public data shares and/or database servers) for each
identified custodian that the custodian reasonably anticipates may contain non-duplicative
responsive e-mail.
12.
The following sources will not be searched under any circumstances, and as such need
not be preserved: automated disaster recovery backup systems and/or disaster recovery backup
tapes; RAM or temporary files; temporary internet files; history, cache, cookies and other on-line
access data; data in metadata fields that are updated automatically such as last-opened dates;
server, system, or network logs. In addition, the parties agree that absent a showing of good
cause, voicemails, PDAs, mobile phones, instant messages and instant messaging logs, and data
remaining from systems no longer in use that is unintelligible on the systems in use, are deemed
not reasonably accessible and need not be collected and preserved. In addition, the parties agree
that only sent and received custodial emails as well as final versions of drafts of custodial emails
that were not sent and received will be searched and that, with respect to documents that
automatically saved, only the most recent version of such documents existing at the time of
collection need be searched. Notwithstanding the foregoing, the parties agree that responsive
documents that a custodian indicates are stored on an archival storage medium that the custodian
can readily identify and locate, that cannot be located in any other repository of information, and
that can reasonably be searched, will be searched. In addition, nothing in this paragraph shall
limit a receiving party’s right to request from a producing party more information about the
nature of and burden associated with obtaining documents from a particular source. The parties
further recognize their obligations to preserve any potentially relevant sources of data, whether
9
live or in archival form, for purposes of this litigation. The parties further agree that the parties
to this action and their subsidiaries need not search documents or ESI created after the filing of
the complaint.
13.
The mere production of ESI in a litigation as part of a mass production shall not itself
constitute a waiver for any purpose. A producing party may assert privilege or protection over
produced documents at any time by notifying the receiving party in writing of the assertion of
privilege protection. In addition, information that contains privileged matter or attorney work
product shall be immediately returned if such information appears on its face to have been
inadvertently produced pursuant to Fed. R. Evid. 502(b).
14.
Processing of Third-Party Documents
A.
A party that issues a non-party subpoena (“Issuing Party”) shall include a copy of
this Stipulation with the subpoena and state that the parties to the litigation have
requested that third-parties produce documents in accordance with the
specifications set forth herein.
B.
The Issuing Party shall produce any documents obtained pursuant to a non-party
subpoena to the opposing party.
C.
If the non-party production is not Bates-stamped, the Issuing Party will endorse
the non-party production with unique prefixes and Bates numbers prior to
producing them to the opposing party.
D.
Nothing in this stipulation is intended to or should be interpreted as narrowing,
expanding, or otherwise affecting the rights of the parties or third-parties to object
to a subpoena
10
15.
.
Except as expressly stated, nothing in this order affects the parties’ discovery obligations
under the Federal or Local Rules.
16.
Nothing in this protocol shall be interpreted to require disclosure of irrelevant
information or relevant information protected by the attorney-client privilege, work-product
doctrine, or any other applicable privilege or immunity. The parties do not waive any objections
as to the production, discoverability, admissibility, or confidentiality of documents and ESI.
17.
Nothing in this Agreement shall affect, in any way, a producing party’s right to seek
reimbursement for costs associated with collection, review, and/or production of documents or
ESI.
SIGNED this 3rd day of January, 2012.
SIGNED this 24th day of June, 2014.
____________________________________
ROY S. PAYNE
UNITED STATES MAGISTRATE JUDGE
11
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?