Shotwell v. Zillow Group, Inc et al
Filing
77
STIPULATED ESI Agreement re parties' 73 Stipulation signed by U.S. District Judge John C Coughenour. (TH)
THE HONORABLE JOHN C. COUGHENOUR
1
2
3
4
5
6
UNITED STATES DISTRICT COURT
WESTERN DISTRICT OF WASHINGTON
AT SEATTLE
7
8
9
JAMES SHOTWELL, et al.,
10
Plaintiff,
ORDER
v.
11
12
CASE NO. C17-1387-JCC
ZILLOW GROUP INC., et al.,
13
Defendant.
14
15
Pursuant to the parties’ stipulation and proposed order (Dkt. No. 73), the Court ENTERS
16
the following order regarding the discovery of electronically stored information (“ESI”):
17
A.
General Principles
18
1.
An attorney’s zealous representation of a client is not compromised by conducting
19
discovery in a cooperative manner. The failure of counsel or the parties to litigation to cooperate
20
in facilitating and reasonably limiting discovery requests and responses raises litigation costs and
21
contributes to the risk of sanctions.
22
2.
23
case when formulating a discovery plan. To further the application of the proportionality standard
24
in discovery, requests for production of electronically stored information (“ESI”) and related
25
responses should be reasonably targeted, clear, and as specific as possible.
26
The proportionality standard set forth in Fed. R. Civ. P. 26(b)(1) must be applied in each
//
ORDER
C17-1387-JCC
PAGE - 1
1
B.
ESI Disclosures
2
Within thirty (30) days after the Fed. R. Civ. P. 26(f) conference, or at a later time if agreed to by
3
the parties, each party shall disclose:
4
1.
5
custody or control. The custodians shall be identified by name, title, connection to the instant
6
litigation, and the type of the information under his/her control.
7
2.
8
servers, etc.), if any, likely to contain discoverable ESI.
9
3.
Custodians. The five custodians most likely to have discoverable ESI in their possession,
Non-custodial Data Sources. A list of non-custodial data sources (e.g., shared drives,
Third-Party Data Sources. A list of third-party data sources, if any, likely to contain
10
discoverable ESI (e.g., third-party email and/or mobile device providers, “cloud” storage, etc.)
11
and, for each source, the extent to which a party is (or is not) able to preserve information stored
12
in the third-party data source.
13
4.
14
type, date, custodian, electronic system or other criteria sufficient to specifically identify the data
15
source) that a party asserts is not reasonable accessible under Fed. R. Civ. P. 26(b)(2)(B).
16
C.
17
The parties acknowledge that they have a common law obligation to take reasonable and
18
proportional steps to preserve discoverable information in the party’s possession, custody or
19
control. With respect to preservation of ESI, the parties agree as follows:
20
1.
21
to modify the procedures used by them in the ordinary course of business to back-up and archive
22
data; provided, however, that the parties shall preserve all discoverable ESI in their possession,
23
custody or control.
24
2.
25
need not be preserved:
26
Inaccessible Data. A list of data sources, if any, likely to contain discoverable ESI (by
Preservation of ESI
Absent a showing of good cause by the requesting party, the parties shall not be required
Absent a showing of good cause by the requesting party, the following categories of ESI
a.
ORDER
C17-1387-JCC
PAGE - 2
Deleted, slack, fragmented, or other data only accessible by forensics.
1
b.
2
Random access memory (RAM), temporary files, or other ephemeral data that are
difficult to preserve without disabling the operating system.
3
c.
4
On-line access data such as temporary internet files, history, cache, cookies, and
the like.
5
d.
6
Data in metadata fields that are frequently updated automatically, such as lastopened dates.
7
e.
8
Back-up data that are substantially duplicative of data that are more accessible
elsewhere.
9
f.
Server, system or network logs.
10
g.
Data remaining from systems no longer in use that is unintelligible on the systems
11
in use.
12
h.
Electronic data (e.g., email calendars, contact data, and notes) sent to or from
13
mobile devices (e.g, iPhone, iPad, Android, and BlackBerry devices), provided that
14
a copy of all such electronic data is routinely saved elsewhere (such as on a server,
15
laptop, desktop computer, or “cloud” storage).
16
D.
Privilege
17
The parties should confer regarding the nature and scope of privilege logs for the case, including
18
whether categories of information may be excluded from any logging requirements and whether
19
alternatives to document-by-document logs can be exchanged.
20
1.
21
complaint, the parties are not required to include any such information in privilege logs.
22
2.
23
from disclosure and discovery under Fed. R. Civ. P. 26(b)(3)(A) and (B).
24
3.
25
immediately returned to the producing party, and its production shall not constitute a waiver of
26
such protection, if: (i) such information appears on its face to have been inadvertently produced or
With respect to privileged or work-product information generated after the filing of the
Activities undertaken in compliance with the duty to preserve information are protected
Information produced in discovery that is protected as privileged or work product shall be
ORDER
C17-1387-JCC
PAGE - 3
1
(ii) the producing party provides notice within 15 days of discovery by the producing party of the
2
inadvertent production.
3
4.
4
unique identification number for each document and the basis for the claim (attorney-client
5
privileged or work product protection). For ESI, the privilege log may be generated using available
6
metadata, including author/recipient or to/from/cc/bcc names; the subject matter or title and date
7
created. Should the available metadata provide insufficient information for the purpose of
8
evaluating the privilege claim asserted, the producing party shall include such additional
9
information as required by the Federal Rules of Civil Procedure.
Privilege Logs Based on Metadata. The parties agree that privilege logs shall include a
10
E.
ESI Discovery Procedures
11
1.
As used herein, the term “third party” means any person or entity that is served with a
12
subpoena pursuant to Fed. R. Civ. P. 45.
13
2.
14
(collectively “discovery material”) in this litigation.
15
3.
16
produced under its terms is relevant or admissible in this litigation or in any other litigation.
17
4.
18
Technology Assisted Review (“TAR”) they will provide notice with ample time to allow parties
19
to meet and confer in good faith regarding creation of a mutually agreeable protocol for their use.
20
5.
21
produce is legible to the same extent as it is maintained in the ordinary course of business.
22
6.
23
litigation pending before the Court, including discovery material disclosed prior or subsequent to
24
the entry of this agreement.
The parties will comply with this agreement in producing any ESI or other documents
By agreeing to this agreement, the parties do not admit that any discovery material
The parties agree that if any additional productions will be made that use search terms or
The parties will make reasonable efforts to ensure that all ESI and other material they
The terms of this agreement shall apply to all discovery material disclosed during the
25
//
26
//
ORDER
C17-1387-JCC
PAGE - 4
1
7.
“Native File(s)” means ESI in the electronic format of the application in which such ESI is
2
created, viewed, and/or modified in the ordinary course of business. Native Files are a subset of
3
ESI.
4
8.
5
viewable or printable from the application that generated, edited, or modified such Native File;
6
and (ii) information generated automatically by the operation of a computer or other information
7
technology system when a Native File is created, modified, transmitted, deleted, or otherwise
8
manipulated by a user of such system. Metadata is a subset of ESI.
9
9.
“Metadata” means: (i) information embedded in a Native File that is not ordinarily
“Static Image(s)” means a representation of ESI produced by converting a Native File into
10
a standard image format capable of being viewed and printed on standard computer systems.
11
10.
12
shall be included that provides: (i) the document number for each image; (ii) the full path name(s)
13
of each TIFF that represents an image; and (iii) the document boundaries for each document. The
14
load file also shall be in the order that appropriately corresponds with each image file. The
15
following represents the format of a standard .opt or .log image load/unitization file: Bates,
16
Volume, Path_to_image, Document Break, Folder Break, Box Break, Total_Pages.
17
11.
18
backup data is maintained in a party’s normal or allowed processes, including but not limited to
19
backup tapes, disks, SAN, and other forms of media, to comply with its discovery obligations.
20
12.
21
documents in single-page TIFF image format named according to Bates number accompanied by
22
document-level optical character recognition (“OCR”) text files. The parties also agree to provide
23
load files linking the TIFFs with their associated text. The database load file should contain the
24
following fields: “BEGBATES,” ENDBATES,” “PAGE COUNT,” “VOLUME,” and
25
“CUSTODIAN.” The documents should be logically unitized (i.e., contain correct document
An image load/unitization file in a standard .opt or .log litigation support image load format
Absent a showing of good cause, no party need restore any form of media upon which
Production of Hard-Copy Documents.
26
ORDER
C17-1387-JCC
PAGE - 5
The parties agree to produce hard-copy
1
breaks: for instance, a five-page document consisting of a cover page and a four-page report should
2
be unitized as a five-page document).
3
a.
The parties will scan hard-copy documents such that the images appear the
4
same as the documents that are kept in the ordinary course of business. Reducing image size may
5
be necessary to fit page size or display production numbers and confidentiality designations
6
without obscuring text.
7
b.
If a folder with hard copy documents is produced, the label of that folder
8
should be scanned and produced along with the documents in the folder. The foldering relationship
9
among the documents in the folder should be produced, either by use of a parent-child relationship
10
or otherwise.
11
c.
Hard copy documents containing color need not be produced in color in the
12
first instance. However, if good cause exists for the receiving party to request production of
13
specific documents in color, the receiving party may request production of such documents in color
14
by providing (i) a list of the Bates numbers of documents it requests to be produced in color format;
15
and (ii) an explanation of the need for production in color format. The producing party shall not
16
unreasonably deny such requests, but need not make such production until the parties reach
17
agreement regarding the additional costs associated with the production of documents in color.
18
d.
If any original hard-copy document has notes affixed thereto or
19
attachments, the parties will scan and produce copies of the notes or attachments in the same
20
manner as other documents.
21
13.
22
page Group IV TIFF image format using at least 300 DPI print setting, with the exception of items
23
listed in Paragraph 13(a) below. Each image shall have a unique file name, which is the Bates
24
number of the document. Original documentation shall be maintained (i.e., portrait to portrait and
25
landscape to landscape). TIFFs will show any and all text and images which would be visible to
26
the reader using the native software that created the document. Additionally, the parties agree to
Production of ESI. For the production of ESI, the parties agree to produce ESI in single-
ORDER
C17-1387-JCC
PAGE - 6
1
deliver extracted text corresponding to each imaged document as individual text files named for
2
the Bates number of the document. The path to the text files will be referenced in the Full Text
3
field in the .dat file. An .opt image cross reference file will also be provided for all TIFF images.
4
a.
5
Exceptions:
i.
Excel files, spreadsheet files, .CSV files, source code, audio, and
6
video shall be produced in native format with a placeholder TIFF image in accordance with the
7
production format set forth above. Each native file should be named according to the Bates number
8
it has been assigned, and should be linked directly to its corresponding record in the load file using
9
the NATIVE FILE PATH field. The exception will be for redacted Excel files which will be
10
produced in TIFF format as specified in Paragraph 13. Images for the redacted Excel files will
11
display the content in the same manner as if such files were printed. The extractable metadata and
12
text shall be produced in the same manner as other documents that originated in electronic form.
13
To the extent that either party believes that native files should be produced for a specific document
14
or class of documents not required to be produced in native format pursuant to this Paragraph, the
15
parties agree to meet and confer on the issue in good faith.
16
ii.
Image Not Readable. Where TIFF images of certain documents are
17
not readable, or do not represent the files as maintained in the ordinary course, the parties will
18
produce such documents in native format or in hard copy. To the extent the receiving party obtains
19
through discovery a file or document that the receiving party believes is not adequately represented
20
in TIFF image format, the receiving party may request that file or document be produced in native
21
format, the production of which shall not be unreasonably withheld.
22
iii.
Non-Convertible Files. Certain types of files such as video and
23
sound files are not amenable to conversion into TIFF format. Such files will not be converted into
24
TIFF format but will be represented in the form of a placeholder TIFF image. These files will be
25
provided in native format with the source file path provided, or in a reasonably usable form by
26
agreement of the parties. For example, if the native format is not playable using Windows Media
ORDER
C17-1387-JCC
PAGE - 7
1
Player, then the file may be produced in an alternate format (for example, recorded telephone calls
2
may be produced in a .wav format).
3
14.
4
the subject of the redaction, and provide OCR text for the produced image as redacted.
5
15.
6
in the manner set forth in this Paragraph, to the extent reasonably available for a particular
7
document. Database information shall be provided in a “.dat” file extension, which contains the
8
metadata fields provided below as a delimited database load file. For the Relativity.dat, the parties
9
should use Relativity standard delimiters (ASCII 020 corresponding to a comma, ASCII 254
10
corresponding to a double quote, ASCII 174 corresponding to a new line, and a semicolon used to
11
separate multiple values within a single field). The fielded data should include all the below
12
metadata fields for a file in addition to the unitization (including the production number of the first
13
and last page of each document), and attachments (including information sufficient to identify the
14
parent and child relationships of all documents and ESI that are or have attachments). The first
15
line of the data load file should contain the field headers indicating the contents of each field, and
16
each subsequent line should contain the fielded data for each document. The parties are not
17
obligated to populate manually any of the following fields with the exception of the CUSTODIAN
18
and VOLUME fields, which must be populated by the producing party.
For any document that is redacted, the producing party may withhold any metadata that is
The parties agree that all ESI shall be produced with the metadata in the table below and
19
//
20
//
21
//
22
//
23
//
24
//
25
//
26
//
ORDER
C17-1387-JCC
PAGE - 8
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Production Metadata Fields
Field Description
BegBates
Beginning Bates number
EndBates
Ending Bates number
BegAttach
Beginning Bates number of the last document in an
attachment range
EndAttach
Ending Bates number of the last document in an attachment
range
Custodian
Name of the custodian the file was sourced from
Name(s) of any custodian of any deduplicated version(s) of
DuplicateCustodian
the document
FileName
File name of the original file name
SourceFilePath
Path and file name in the ordinary course of business
FileSize
Size of the file in bytes
DocExt
Native File extension
EmailSubject
Subject line extracted from an email message
Title
Title field extracted from the metadata of a non-email
document
Author
Author field extracted from the metadata of a non-email
document
From
From field extracted from an email message
To
To field extracted from an email message
CC
CC field extracted from an email message
BCC
BCC field extracted from an email message
DateReceived
Received date of an email message
TimeReceived
Received time of an email message
DateSent
Sent date of an email message
TimeSent
Sent time of an email message
DateCreated
Date that a file was created
TimeCreated
Time that a file was created
DateLastModified
Date that a file was last modified
TimeLastModified
Time that a file was last modified
SHA-1 or MD5
SHA-1 or MD5 value for the document
FileDescription
File type of the document
Native File Path
Path to native file as produced
Page Count
Number of TIFF pages produced
Volume
The name of the CD, DVD, or hard drive
Full Text
Path to the full extracted text of the document
23
24
25
26
16.
To reduce the unnecessary costs of reviewing and producing exact duplicate documents,
each party will remove duplicate ESI prior to producing documents. Global de-duplication is
executed at the document family level. Stand-alone files will de-duplicate against other stand-
ORDER
C17-1387-JCC
PAGE - 9
1
alone files, but not against attachments contained in document families. Deduplication shall be
2
done on exact duplicate documents based on MD5 or SHA-1 hash values at the document level.
3
Each party shall make reasonable efforts to remove exact duplicate ESI across custodians and to
4
produce searchable metadata in a “Duplicate Custodian” field for each produced document
5
sufficient for the receiving party to identify all custodians of the produced document. If such a
6
process is not possible, each party will conduct deduplication only within a source (e.g., within a
7
custodian). The producing party will disclose which method of deduplication has been utilized.
8
If during the course of its review, the producing party identifies a large number of duplicate
9
documents, the parties can confer regarding a custom deduplication protocol.
No custom
10
deduplication method will be implemented without the consent of the receiving party, and such
11
consent shall not be unreasonably withheld.
12
17.
13
attachment and its parent document) should be preserved. For example, if a party produces a
14
printout of an email with its attachments, such attachments should be produced behind the email
15
in the order in which they were attached and identified as child documents to the parent email. If
16
a party withholds as privileged any document or portion of a document, any parent-child
17
relationship must be similarly maintained. For example, if a party withholds an attachment to an
18
email as privileged, the email will be produced with a child file stating that an attachment has been
19
withheld, and stating the grounds for the withholding. Similarly, if a party withholds an email as
20
privileged while producing the attachment, the parent-child relationship will be similarly
21
maintained and the grounds for withholding of the email will be similarly stated.
22
18.
23
a constant length across the entire production (i.e., ABC00000001—with no space between the
24
prefix and the number, padded to the same number of characters); (iii) contain no special
25
characters; and (iv) be sequential within a given document. If a Bates number or set of Bates
For all forms of production, parent-child relationships (i.e., the association between an
Each Bates number will: (i) be unique across the entire document production; (ii) maintain
26
ORDER
C17-1387-JCC
PAGE - 10
1
numbers is skipped in a production, the producing party will so note in a cover letter or production
2
log accompanying the production.
3
19.
4
agreement with the subpoena and request that the third party produce documents in accordance
5
with the specification set forth herein. If a party issued a third-party subpoena prior to the
6
execution of this agreement, that party shall promptly forward a copy of this agreement to the third
7
party and request that the nonparty produce documents in accordance with the specifications set
8
forth herein. The Issuing Party is responsible for producing any documents obtained pursuant to
9
a subpoena to all other parties. No party shall be required to reformat or re-Bates stamp any
10
documents are data produced by a third party in this litigation. In the event that a third party
11
produces documents without Bates numbers, then the party who sought discovery from the third
12
party shall produce the reproduction or production with a unique Bates number in accordance with
13
Paragraph 18. Nothing in this agreement is intended or should be interpreted as narrowing,
14
expanding, or otherwise affecting the rights of the parties or third party to object to a subpoena.
15
F.
Miscellaneous
16
1.
If there is a conflict between the provisions of this agreement and the Stipulated Protective
17
Order (the “Protective Order”), the Protective Order shall control.
18
2.
19
material that a Party contends are protected from disclosure by the attorney-client privilege, work-
20
product doctrine, or any other applicable privilege or protection, nor shall this agreement require
21
the production of ESI or other documents that are not discoverable under applicable law.
22
3.
23
parties under Fed. R. Evid. 502(d).
24
4.
25
concerning compliance with this agreement.
26
A party that issues a third-party subpoena (“Issuing Party”) shall include a copy of this
Nothing in this agreement shall be interpreted to require the disclosure of any discovery
Moreover, nothing in this agreement shall waive or limit any protections afforded the
The parties shall make their best efforts to comply with and resolve any differences
//
ORDER
C17-1387-JCC
PAGE - 11
1
2
IT IS SO STIPULATED, THROUGH COUNSEL OF RECORD.
Dated: September 26, 2019
3
4
5
6
7
8
/s/ Colin M. George
Colin M. George
ARDENT LAW GROUP, PLLC
2003 Western Avenue, Suite 345
Seattle, WA 98121
cgeorge@ardentlaw.com
9
14
Laurence M. Rosen
Jonathan Stern
THE ROSEN LAW FIRM, P.A.
275 Madison Avenue, 34th Floor
New York, NY 10016
(212) 686-1060
lrosen@rosenlegal.com
jstern@rosenlegal.com
15
Sean C. Knowles, WSBA No. 39893
PERKINS COIE LLP
1201 Third Avenue, Suite 4900
Seattle, WA 98101
(206) 359-8000
sknowles@perkinscoie.com
Local Counsel for Lead Plaintiffs
10
/s/ Sean C. Knowles
Lead Counsel for Lead Plaintiffs
11
12
13
/s/ Matthew D. Ingber
Matthew D. Ingber (pro hac vice)
Joseph De Simone (pro hac vice)
MAYER BROWN LLP
1221 Avenue of the Americas
New York, New York 10020
(212) 506-2500
mingber@mayerbrown.com
jdesimone@mayerbrown.com
Kelly Kramer (pro hac vice)
Stephanie C. Robinson (pro hac vice)
MAYER BROWN LLP
1999 K Street N.W.
Washington, D.C. 20006
(202) 263-3000
16
17
18
19
Counsel for Defendants
20
21
22
23
24
25
26
ORDER
C17-1387-JCC
PAGE - 12
1
PURSUANT TO STIPULATION, IT IS SO ORDERED.
2
DATED this 7th day of November 2019.
A
3
4
5
John C. Coughenour
UNITED STATES DISTRICT JUDGE
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
ORDER
C17-1387-JCC
PAGE - 13
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?