Shotwell v. Zillow Group, Inc et al

Filing 77

STIPULATED ESI Agreement re parties' 73 Stipulation signed by U.S. District Judge John C Coughenour. (TH)

Download PDF
THE HONORABLE JOHN C. COUGHENOUR 1 2 3 4 5 6 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 7 8 9 JAMES SHOTWELL, et al., 10 Plaintiff, ORDER v. 11 12 CASE NO. C17-1387-JCC ZILLOW GROUP INC., et al., 13 Defendant. 14 15 Pursuant to the parties’ stipulation and proposed order (Dkt. No. 73), the Court ENTERS 16 the following order regarding the discovery of electronically stored information (“ESI”): 17 A. General Principles 18 1. An attorney’s zealous representation of a client is not compromised by conducting 19 discovery in a cooperative manner. The failure of counsel or the parties to litigation to cooperate 20 in facilitating and reasonably limiting discovery requests and responses raises litigation costs and 21 contributes to the risk of sanctions. 22 2. 23 case when formulating a discovery plan. To further the application of the proportionality standard 24 in discovery, requests for production of electronically stored information (“ESI”) and related 25 responses should be reasonably targeted, clear, and as specific as possible. 26 The proportionality standard set forth in Fed. R. Civ. P. 26(b)(1) must be applied in each // ORDER C17-1387-JCC PAGE - 1 1 B. ESI Disclosures 2 Within thirty (30) days after the Fed. R. Civ. P. 26(f) conference, or at a later time if agreed to by 3 the parties, each party shall disclose: 4 1. 5 custody or control. The custodians shall be identified by name, title, connection to the instant 6 litigation, and the type of the information under his/her control. 7 2. 8 servers, etc.), if any, likely to contain discoverable ESI. 9 3. Custodians. The five custodians most likely to have discoverable ESI in their possession, Non-custodial Data Sources. A list of non-custodial data sources (e.g., shared drives, Third-Party Data Sources. A list of third-party data sources, if any, likely to contain 10 discoverable ESI (e.g., third-party email and/or mobile device providers, “cloud” storage, etc.) 11 and, for each source, the extent to which a party is (or is not) able to preserve information stored 12 in the third-party data source. 13 4. 14 type, date, custodian, electronic system or other criteria sufficient to specifically identify the data 15 source) that a party asserts is not reasonable accessible under Fed. R. Civ. P. 26(b)(2)(B). 16 C. 17 The parties acknowledge that they have a common law obligation to take reasonable and 18 proportional steps to preserve discoverable information in the party’s possession, custody or 19 control. With respect to preservation of ESI, the parties agree as follows: 20 1. 21 to modify the procedures used by them in the ordinary course of business to back-up and archive 22 data; provided, however, that the parties shall preserve all discoverable ESI in their possession, 23 custody or control. 24 2. 25 need not be preserved: 26 Inaccessible Data. A list of data sources, if any, likely to contain discoverable ESI (by Preservation of ESI Absent a showing of good cause by the requesting party, the parties shall not be required Absent a showing of good cause by the requesting party, the following categories of ESI a. ORDER C17-1387-JCC PAGE - 2 Deleted, slack, fragmented, or other data only accessible by forensics. 1 b. 2 Random access memory (RAM), temporary files, or other ephemeral data that are difficult to preserve without disabling the operating system. 3 c. 4 On-line access data such as temporary internet files, history, cache, cookies, and the like. 5 d. 6 Data in metadata fields that are frequently updated automatically, such as lastopened dates. 7 e. 8 Back-up data that are substantially duplicative of data that are more accessible elsewhere. 9 f. Server, system or network logs. 10 g. Data remaining from systems no longer in use that is unintelligible on the systems 11 in use. 12 h. Electronic data (e.g., email calendars, contact data, and notes) sent to or from 13 mobile devices (e.g, iPhone, iPad, Android, and BlackBerry devices), provided that 14 a copy of all such electronic data is routinely saved elsewhere (such as on a server, 15 laptop, desktop computer, or “cloud” storage). 16 D. Privilege 17 The parties should confer regarding the nature and scope of privilege logs for the case, including 18 whether categories of information may be excluded from any logging requirements and whether 19 alternatives to document-by-document logs can be exchanged. 20 1. 21 complaint, the parties are not required to include any such information in privilege logs. 22 2. 23 from disclosure and discovery under Fed. R. Civ. P. 26(b)(3)(A) and (B). 24 3. 25 immediately returned to the producing party, and its production shall not constitute a waiver of 26 such protection, if: (i) such information appears on its face to have been inadvertently produced or With respect to privileged or work-product information generated after the filing of the Activities undertaken in compliance with the duty to preserve information are protected Information produced in discovery that is protected as privileged or work product shall be ORDER C17-1387-JCC PAGE - 3 1 (ii) the producing party provides notice within 15 days of discovery by the producing party of the 2 inadvertent production. 3 4. 4 unique identification number for each document and the basis for the claim (attorney-client 5 privileged or work product protection). For ESI, the privilege log may be generated using available 6 metadata, including author/recipient or to/from/cc/bcc names; the subject matter or title and date 7 created. Should the available metadata provide insufficient information for the purpose of 8 evaluating the privilege claim asserted, the producing party shall include such additional 9 information as required by the Federal Rules of Civil Procedure. Privilege Logs Based on Metadata. The parties agree that privilege logs shall include a 10 E. ESI Discovery Procedures 11 1. As used herein, the term “third party” means any person or entity that is served with a 12 subpoena pursuant to Fed. R. Civ. P. 45. 13 2. 14 (collectively “discovery material”) in this litigation. 15 3. 16 produced under its terms is relevant or admissible in this litigation or in any other litigation. 17 4. 18 Technology Assisted Review (“TAR”) they will provide notice with ample time to allow parties 19 to meet and confer in good faith regarding creation of a mutually agreeable protocol for their use. 20 5. 21 produce is legible to the same extent as it is maintained in the ordinary course of business. 22 6. 23 litigation pending before the Court, including discovery material disclosed prior or subsequent to 24 the entry of this agreement. The parties will comply with this agreement in producing any ESI or other documents By agreeing to this agreement, the parties do not admit that any discovery material The parties agree that if any additional productions will be made that use search terms or The parties will make reasonable efforts to ensure that all ESI and other material they The terms of this agreement shall apply to all discovery material disclosed during the 25 // 26 // ORDER C17-1387-JCC PAGE - 4 1 7. “Native File(s)” means ESI in the electronic format of the application in which such ESI is 2 created, viewed, and/or modified in the ordinary course of business. Native Files are a subset of 3 ESI. 4 8. 5 viewable or printable from the application that generated, edited, or modified such Native File; 6 and (ii) information generated automatically by the operation of a computer or other information 7 technology system when a Native File is created, modified, transmitted, deleted, or otherwise 8 manipulated by a user of such system. Metadata is a subset of ESI. 9 9. “Metadata” means: (i) information embedded in a Native File that is not ordinarily “Static Image(s)” means a representation of ESI produced by converting a Native File into 10 a standard image format capable of being viewed and printed on standard computer systems. 11 10. 12 shall be included that provides: (i) the document number for each image; (ii) the full path name(s) 13 of each TIFF that represents an image; and (iii) the document boundaries for each document. The 14 load file also shall be in the order that appropriately corresponds with each image file. The 15 following represents the format of a standard .opt or .log image load/unitization file: Bates, 16 Volume, Path_to_image, Document Break, Folder Break, Box Break, Total_Pages. 17 11. 18 backup data is maintained in a party’s normal or allowed processes, including but not limited to 19 backup tapes, disks, SAN, and other forms of media, to comply with its discovery obligations. 20 12. 21 documents in single-page TIFF image format named according to Bates number accompanied by 22 document-level optical character recognition (“OCR”) text files. The parties also agree to provide 23 load files linking the TIFFs with their associated text. The database load file should contain the 24 following fields: “BEGBATES,” ENDBATES,” “PAGE COUNT,” “VOLUME,” and 25 “CUSTODIAN.” The documents should be logically unitized (i.e., contain correct document An image load/unitization file in a standard .opt or .log litigation support image load format Absent a showing of good cause, no party need restore any form of media upon which Production of Hard-Copy Documents. 26 ORDER C17-1387-JCC PAGE - 5 The parties agree to produce hard-copy 1 breaks: for instance, a five-page document consisting of a cover page and a four-page report should 2 be unitized as a five-page document). 3 a. The parties will scan hard-copy documents such that the images appear the 4 same as the documents that are kept in the ordinary course of business. Reducing image size may 5 be necessary to fit page size or display production numbers and confidentiality designations 6 without obscuring text. 7 b. If a folder with hard copy documents is produced, the label of that folder 8 should be scanned and produced along with the documents in the folder. The foldering relationship 9 among the documents in the folder should be produced, either by use of a parent-child relationship 10 or otherwise. 11 c. Hard copy documents containing color need not be produced in color in the 12 first instance. However, if good cause exists for the receiving party to request production of 13 specific documents in color, the receiving party may request production of such documents in color 14 by providing (i) a list of the Bates numbers of documents it requests to be produced in color format; 15 and (ii) an explanation of the need for production in color format. The producing party shall not 16 unreasonably deny such requests, but need not make such production until the parties reach 17 agreement regarding the additional costs associated with the production of documents in color. 18 d. If any original hard-copy document has notes affixed thereto or 19 attachments, the parties will scan and produce copies of the notes or attachments in the same 20 manner as other documents. 21 13. 22 page Group IV TIFF image format using at least 300 DPI print setting, with the exception of items 23 listed in Paragraph 13(a) below. Each image shall have a unique file name, which is the Bates 24 number of the document. Original documentation shall be maintained (i.e., portrait to portrait and 25 landscape to landscape). TIFFs will show any and all text and images which would be visible to 26 the reader using the native software that created the document. Additionally, the parties agree to Production of ESI. For the production of ESI, the parties agree to produce ESI in single- ORDER C17-1387-JCC PAGE - 6 1 deliver extracted text corresponding to each imaged document as individual text files named for 2 the Bates number of the document. The path to the text files will be referenced in the Full Text 3 field in the .dat file. An .opt image cross reference file will also be provided for all TIFF images. 4 a. 5 Exceptions: i. Excel files, spreadsheet files, .CSV files, source code, audio, and 6 video shall be produced in native format with a placeholder TIFF image in accordance with the 7 production format set forth above. Each native file should be named according to the Bates number 8 it has been assigned, and should be linked directly to its corresponding record in the load file using 9 the NATIVE FILE PATH field. The exception will be for redacted Excel files which will be 10 produced in TIFF format as specified in Paragraph 13. Images for the redacted Excel files will 11 display the content in the same manner as if such files were printed. The extractable metadata and 12 text shall be produced in the same manner as other documents that originated in electronic form. 13 To the extent that either party believes that native files should be produced for a specific document 14 or class of documents not required to be produced in native format pursuant to this Paragraph, the 15 parties agree to meet and confer on the issue in good faith. 16 ii. Image Not Readable. Where TIFF images of certain documents are 17 not readable, or do not represent the files as maintained in the ordinary course, the parties will 18 produce such documents in native format or in hard copy. To the extent the receiving party obtains 19 through discovery a file or document that the receiving party believes is not adequately represented 20 in TIFF image format, the receiving party may request that file or document be produced in native 21 format, the production of which shall not be unreasonably withheld. 22 iii. Non-Convertible Files. Certain types of files such as video and 23 sound files are not amenable to conversion into TIFF format. Such files will not be converted into 24 TIFF format but will be represented in the form of a placeholder TIFF image. These files will be 25 provided in native format with the source file path provided, or in a reasonably usable form by 26 agreement of the parties. For example, if the native format is not playable using Windows Media ORDER C17-1387-JCC PAGE - 7 1 Player, then the file may be produced in an alternate format (for example, recorded telephone calls 2 may be produced in a .wav format). 3 14. 4 the subject of the redaction, and provide OCR text for the produced image as redacted. 5 15. 6 in the manner set forth in this Paragraph, to the extent reasonably available for a particular 7 document. Database information shall be provided in a “.dat” file extension, which contains the 8 metadata fields provided below as a delimited database load file. For the Relativity.dat, the parties 9 should use Relativity standard delimiters (ASCII 020 corresponding to a comma, ASCII 254 10 corresponding to a double quote, ASCII 174 corresponding to a new line, and a semicolon used to 11 separate multiple values within a single field). The fielded data should include all the below 12 metadata fields for a file in addition to the unitization (including the production number of the first 13 and last page of each document), and attachments (including information sufficient to identify the 14 parent and child relationships of all documents and ESI that are or have attachments). The first 15 line of the data load file should contain the field headers indicating the contents of each field, and 16 each subsequent line should contain the fielded data for each document. The parties are not 17 obligated to populate manually any of the following fields with the exception of the CUSTODIAN 18 and VOLUME fields, which must be populated by the producing party. For any document that is redacted, the producing party may withhold any metadata that is The parties agree that all ESI shall be produced with the metadata in the table below and 19 // 20 // 21 // 22 // 23 // 24 // 25 // 26 // ORDER C17-1387-JCC PAGE - 8 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Production Metadata Fields Field Description BegBates Beginning Bates number EndBates Ending Bates number BegAttach Beginning Bates number of the last document in an attachment range EndAttach Ending Bates number of the last document in an attachment range Custodian Name of the custodian the file was sourced from Name(s) of any custodian of any deduplicated version(s) of DuplicateCustodian the document FileName File name of the original file name SourceFilePath Path and file name in the ordinary course of business FileSize Size of the file in bytes DocExt Native File extension EmailSubject Subject line extracted from an email message Title Title field extracted from the metadata of a non-email document Author Author field extracted from the metadata of a non-email document From From field extracted from an email message To To field extracted from an email message CC CC field extracted from an email message BCC BCC field extracted from an email message DateReceived Received date of an email message TimeReceived Received time of an email message DateSent Sent date of an email message TimeSent Sent time of an email message DateCreated Date that a file was created TimeCreated Time that a file was created DateLastModified Date that a file was last modified TimeLastModified Time that a file was last modified SHA-1 or MD5 SHA-1 or MD5 value for the document FileDescription File type of the document Native File Path Path to native file as produced Page Count Number of TIFF pages produced Volume The name of the CD, DVD, or hard drive Full Text Path to the full extracted text of the document 23 24 25 26 16. To reduce the unnecessary costs of reviewing and producing exact duplicate documents, each party will remove duplicate ESI prior to producing documents. Global de-duplication is executed at the document family level. Stand-alone files will de-duplicate against other stand- ORDER C17-1387-JCC PAGE - 9 1 alone files, but not against attachments contained in document families. Deduplication shall be 2 done on exact duplicate documents based on MD5 or SHA-1 hash values at the document level. 3 Each party shall make reasonable efforts to remove exact duplicate ESI across custodians and to 4 produce searchable metadata in a “Duplicate Custodian” field for each produced document 5 sufficient for the receiving party to identify all custodians of the produced document. If such a 6 process is not possible, each party will conduct deduplication only within a source (e.g., within a 7 custodian). The producing party will disclose which method of deduplication has been utilized. 8 If during the course of its review, the producing party identifies a large number of duplicate 9 documents, the parties can confer regarding a custom deduplication protocol. No custom 10 deduplication method will be implemented without the consent of the receiving party, and such 11 consent shall not be unreasonably withheld. 12 17. 13 attachment and its parent document) should be preserved. For example, if a party produces a 14 printout of an email with its attachments, such attachments should be produced behind the email 15 in the order in which they were attached and identified as child documents to the parent email. If 16 a party withholds as privileged any document or portion of a document, any parent-child 17 relationship must be similarly maintained. For example, if a party withholds an attachment to an 18 email as privileged, the email will be produced with a child file stating that an attachment has been 19 withheld, and stating the grounds for the withholding. Similarly, if a party withholds an email as 20 privileged while producing the attachment, the parent-child relationship will be similarly 21 maintained and the grounds for withholding of the email will be similarly stated. 22 18. 23 a constant length across the entire production (i.e., ABC00000001—with no space between the 24 prefix and the number, padded to the same number of characters); (iii) contain no special 25 characters; and (iv) be sequential within a given document. If a Bates number or set of Bates For all forms of production, parent-child relationships (i.e., the association between an Each Bates number will: (i) be unique across the entire document production; (ii) maintain 26 ORDER C17-1387-JCC PAGE - 10 1 numbers is skipped in a production, the producing party will so note in a cover letter or production 2 log accompanying the production. 3 19. 4 agreement with the subpoena and request that the third party produce documents in accordance 5 with the specification set forth herein. If a party issued a third-party subpoena prior to the 6 execution of this agreement, that party shall promptly forward a copy of this agreement to the third 7 party and request that the nonparty produce documents in accordance with the specifications set 8 forth herein. The Issuing Party is responsible for producing any documents obtained pursuant to 9 a subpoena to all other parties. No party shall be required to reformat or re-Bates stamp any 10 documents are data produced by a third party in this litigation. In the event that a third party 11 produces documents without Bates numbers, then the party who sought discovery from the third 12 party shall produce the reproduction or production with a unique Bates number in accordance with 13 Paragraph 18. Nothing in this agreement is intended or should be interpreted as narrowing, 14 expanding, or otherwise affecting the rights of the parties or third party to object to a subpoena. 15 F. Miscellaneous 16 1. If there is a conflict between the provisions of this agreement and the Stipulated Protective 17 Order (the “Protective Order”), the Protective Order shall control. 18 2. 19 material that a Party contends are protected from disclosure by the attorney-client privilege, work- 20 product doctrine, or any other applicable privilege or protection, nor shall this agreement require 21 the production of ESI or other documents that are not discoverable under applicable law. 22 3. 23 parties under Fed. R. Evid. 502(d). 24 4. 25 concerning compliance with this agreement. 26 A party that issues a third-party subpoena (“Issuing Party”) shall include a copy of this Nothing in this agreement shall be interpreted to require the disclosure of any discovery Moreover, nothing in this agreement shall waive or limit any protections afforded the The parties shall make their best efforts to comply with and resolve any differences // ORDER C17-1387-JCC PAGE - 11 1 2 IT IS SO STIPULATED, THROUGH COUNSEL OF RECORD. Dated: September 26, 2019 3 4 5 6 7 8 /s/ Colin M. George Colin M. George ARDENT LAW GROUP, PLLC 2003 Western Avenue, Suite 345 Seattle, WA 98121 cgeorge@ardentlaw.com 9 14 Laurence M. Rosen Jonathan Stern THE ROSEN LAW FIRM, P.A. 275 Madison Avenue, 34th Floor New York, NY 10016 (212) 686-1060 lrosen@rosenlegal.com jstern@rosenlegal.com 15 Sean C. Knowles, WSBA No. 39893 PERKINS COIE LLP 1201 Third Avenue, Suite 4900 Seattle, WA 98101 (206) 359-8000 sknowles@perkinscoie.com Local Counsel for Lead Plaintiffs 10 /s/ Sean C. Knowles Lead Counsel for Lead Plaintiffs 11 12 13 /s/ Matthew D. Ingber Matthew D. Ingber (pro hac vice) Joseph De Simone (pro hac vice) MAYER BROWN LLP 1221 Avenue of the Americas New York, New York 10020 (212) 506-2500 mingber@mayerbrown.com jdesimone@mayerbrown.com Kelly Kramer (pro hac vice) Stephanie C. Robinson (pro hac vice) MAYER BROWN LLP 1999 K Street N.W. Washington, D.C. 20006 (202) 263-3000 16 17 18 19 Counsel for Defendants 20 21 22 23 24 25 26 ORDER C17-1387-JCC PAGE - 12 1 PURSUANT TO STIPULATION, IT IS SO ORDERED. 2 DATED this 7th day of November 2019. A 3 4 5 John C. Coughenour UNITED STATES DISTRICT JUDGE 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ORDER C17-1387-JCC PAGE - 13

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?