Is a $2.7 Million Dollar E-Discovery Sanction Appropriate In a Lawsuit Valued at $20,000?  The Second Circuit Says, Yes. In 2012, Klipsch Group Inc. (“Klipsch”), a manufacturer of sound equipment, filed a complaint against ePRO E-Commerce Ltd. (“ePRO”), alleging an ePRO subsidiary was selling counterfeit headphones.  Through discovery demands, Klipsch called for the production of information relevant to the sale of the allegedly infringing product, including emails and specific sales data.    View Full Post
A Cooperative Discovery Process Promotes Efficient Advocacy In Youngevity Intl’s Corp. v. Smith (No: 16-cv-00704 [SD CA December 21, 2017]), defendants sought an Order pursuant to Federal Rules of Civil Procedure 26(g) and 37.  The Order required Plaintiffs to remediate an improper discovery production to pay for Defendants’ costs for bringing the motion to compel and for the cost to review various improper prior productions.  View Full Post
You are involved in litigation and faced with a document review need, what now? Naturally you need to find attorneys to review these documents. To this end, depending on the volume of data at issue, many firms will either: (1) staffing the document review with firm attorneys, or (2) will work with a vendor to retain a review team comprised of contract attorneys. View Full Post
The Perks and Perils of Self-Destructing Messages What do applications like Snapchat, Telegram, Wickr, Cover Me, Speak On, and Whisper have in common? They are all self-destructing message (“SDM”) applications. What exactly does this mean, you ask? Self-destructing messaging applications transmit information with end-to-end encryption, and auto destruct after a set time period of time, or after receipt and access by the intended recipient.  View Full Post
Earlier this year, I wrote about the then-proposed changes to the Federal Rules, and how those changes (if implemented), could impact electronic discovery. (February 15, 2017 blog)  Well, the time has come — effective December 1, 2017, the amendments to Federal Rule of Evidence 902 “Evidence That is Self Authenticating” went live. View Full Post
If Evidence in its Original Form Is No Longer Available – But a Copy of that Evidence Is – Are Spoliation Sanctions Appropriate? In Barcroft Media, Ltd. et al. v. Coed Media Grp., LLC, No. 16-CV-7634 (JMF) (S.D.N.Y. Sept. 28, 2017), Plaintiffs – providers of entertainment-related photojournalism and owners of celebrity photographs – interposed various intellectual property claims against Defendant Coed Media Group, LLC (“CMG”).  View Full Post
Cooperation and Competence are Critical, Concludes One Court This case, which arises from allegations of pay discrimination by New Mexico State University (“NMSU”) based on gender, in violation of Title VII, serves as an important reminder that all counsel – irrespective of one’s computer know-how – understand their ESI obligations and cooperate in good faith with opposing counsel when engaging in the process of retrieving electronically stored information (“ESI”). View Full Post
Litigation Hold Notices Should Not Cloak the Recipient With Discretion Over What Documents to Preserve In past blogs, I have discussed the importance of issuing a litigation hold notice (“Hold”), as soon as a litigation is reasonably anticipated. I have also written about various best practices when drafting one’s Hold. [See Practical Tips For an Effective Litigation Hold Notice and Your Litigation Hold Must be Generally Broad And Specifically Tailored]. View Full Post
In this case, the Southern District of New York imposed an adverse inference against defendants for their failure to preserve text messages that were in the possession of a non-party.  Specifically, Judge Sweet imposed an adverse inference against defendants based upon the spoliation of non-party text messages after concluding that as a result of the non-party’s: close working relationship with the defendants; his prior production of documents in the litigation; and his financial interest in the at-issue film, defendants had the practical ability to obtain the text messages, irrespective of any legal right to those messages. View Full Post