FJC - Managing Discovery of Electronic Information
FJC - Managing Discovery of Electronic Information
Electronic Information:
A Pocket Guide for Judges
Preface, v
Introduction, 1
What Is Electronically Stored Information and How Does It Differ
from Conventional Information? 2
Early Consideration of ESI—Rules 26(f) and 16, 4
ESI and Rule 26(a)(1) Disclosures, 5
ESI and Scope of Discovery Under Rules 26(b)(1) and 26(b)(2), 6
Allocation of Costs, 10
Discovery from Nonparties, 12
Form of Production, 13
Waiver of Privilege or Work-Product Protection, 14
Preservation of ESI, 16
Spoliation and Sanctions, 18
Conclusion, 20
Glossary, 22
iii
Blank page for correct double-sided printing.
Preface
This pocket guide is designed to help federal judges manage the
discovery of electronically stored information (ESI). It encourages
judges to actively manage those cases involving ESI, raising points
for consideration by the parties rather than awaiting the parties’
identification and argument of the matters. The guide covers issues
unique to the discovery of ESI, including its scope, the allocation
of costs, the form of production, the waiver of privilege and work-
product protection, and the preservation of data and spoliation. As
you are reading, you may encounter some unfamiliar terms. Many
of these terms are defined in a glossary at the end of the guide. A
note of appreciation goes to Judge Lee H. Rosenthal (S.D. Tex.), Ken
Withers (the Sedona Conference), and John Rabiej (Administrative
Office of the U.S. Courts) for their suggestions, which improved
this publication. I hope you find the guide useful in meeting the
challenges presented by the discovery of ESI.
Blank page for correct double-sided printing.
Introduction
It is a fact of modern life that an enormous volume of information is
created, exchanged, and stored electronically. Conventional docu-
ments originate as computer files, e-mail is taking the place of both
telephone calls and postal letters, and many, if not most, commer-
cial activities are transacted using computer-based business pro-
cesses. Electronically stored information (ESI) is commonplace in
our personal lives and in the operation of businesses, public enti-
ties, and private organizations.
In the past decade, discovery involving word-processed docu-
ments, spreadsheets, e-mail, and other electronically stored infor-
mation has become more routine: Once seen only in large cases
involving sophisticated entities, it is now seen in routine civil cases
and in many criminal cases. In some cases, ESI does not raise any
issue, or it is converted to paper and is exchanged in the traditional
manner. In other cases, disputes arise as to the scope of discovery,
the form in which ESI is produced, whether inadvertent production
of ESI will lead to waiver of attorney–client privilege or work-prod-
uct protection, the shifting of costs from producing to requesting
parties, and the preservation of ESI and related spoliation allega-
tions. For example, in some cases a dispute may surface when one
party finds that digital files have been delivered in a format that is
not readily usable. In other cases, technology issues may remain
submerged until later in the pretrial process when one side accus-
es the other of spoliation because routine digital file management
practices remained in place after the complaint was filed, resulting
in the deletion of computer files.
The court may minimize such disputes by encouraging lawyers
and parties to identify, in the earliest stages of litigation, potential
problems in the discovery of ESI and possible resolutions to those
problems, and by intervening before misunderstandings and dis-
putes lead to significant delay and costs. Case law addressing con-
ventional discovery and ESI-related discovery, the Federal Rules
of Civil Procedure, local rules, the Manual for Complex Litigation,
. See, e.g., U.S. Dist. Ct. Rules E.D. & W.D. Ark., L. R. 26.1; U.S. Dist. Ct. Rules
D.N.J., L. Civ. R. 26.1; U.S. Dist. Ct. Rules M.D. Pa., L. Civ. R. 26.1; and U.S. Dist.
Ct. Rules D. Wyo., L. Civ. R. 26.1, App. D. See also Ad Hoc Committee for Elec-
tronic Discovery of the United States District Court for the District of Delaware,
Default Standard for Discovery of Electronic Documents (http://www.ded.uscourts.
gov/OrdersMain.htm); U.S. District Court for the District of Kansas, Guidelines for
Managing Discovery of Electronic Information
Managing Discovery of Electronic Information
. Microsoft, Survey Finds Workers Average Only Three Productive Days Per
Week (Mar. 15, 2005) <http://www.microsoft.com/presspass/press/2005/mar05/
03-15ThreeProductiveDaysPr.mspx> (visited Jan. 3, 2007) (U.S. workers reported
they receive an average of 56 e-mail messages per day).
Managing Discovery of Electronic Information
Managing Discovery of Electronic Information
Managing Discovery of Electronic Information
Managing Discovery of Electronic Information
Managing Discovery of Electronic Information
. See also Zubulake v. UBS Warburg LLC, 217 F.R.D. 309, 318–19 (S.D.N.Y.
2003) (describing the media on which ESI is maintained, and distinguishing online,
active data, nearline data, offline storage/archives, and backup tapes).
10. See McPeek v. Ashcroft, 202 F.R.D. 31 (D.D.C. 2001); McPeek v. Ashcroft, 212
F.R.D. 33 (D.D.C. 2003); Hagemeyer N. Am., Inc. v. Gateway Data Sciences Corp., 222
F.R.D. 594 (E.D. Wis. 2004) (all supporting the use of sampling to tailor the scope of
further discovery).
Managing Discovery of Electronic Information
Managing Discovery of Electronic Information
Allocation of Costs
In cases involving vast amounts of ESI, or ESI that is not available
from reasonably accessible sources, the cost to the producing
party in locating the information, reviewing it for privilege, and
otherwise preparing it for production may be much greater than
in conventional discovery. At the same time, the cost of copying
and transporting the information is practically eliminated and the
cost to the requesting party of searching the information may be
reduced because it can be done electronically.
In such cases, it may be appropriate to shift at least some of
the production costs from the producing party to the requesting
party. Two major cases—Rowe Entertainment, Inc. v. William Morris
Agency, Inc.11 and Zubulake v. UBS Warburg LLC 12—have introduced
multifactor tests to determine when cost shifting is appropriate.
In Rowe, a racial discrimination case, the defendants objected
to the production of e-mail information from backup media on the
grounds that such discovery was unlikely to provide relevant in-
formation and would invade the privacy of nonparties, and they
requested that the plaintiffs bear the costs if production was never-
theless required. The court concluded that the e-mail information
sought by the plaintiffs was relevant and that a blanket order pre-
cluding its discovery was unjustified. However, balancing eight fac-
tors derived from case law, the court required the plaintiffs to pay
for the recovery and production of the e-mail backups, except for
the cost of screening for relevance and privilege. The eight Rowe
factors were (1) the specificity of the discovery requests; (2) the
likelihood of discovering critical information; (3) the availability of
such information from other sources; (4) the purposes for which
the responding party maintains the requested data; (5) the relative
benefit to the parties of obtaining the information; (6) the total cost
associated with production; (7) the relative ability of each party to
control costs and its incentive to do so; and (8) the resources avail-
able to each party.13
Zubulake, a gender discrimination case, also involved the pro-
duction of e-mails that existed only on backup tapes and other ar-
chived media. After concluding that the plaintiff’s request was rel-
11. 205 F.R.D. 421 (S.D.N.Y.), aff’d, 53 Fed. R. Serv. 3d 296 (S.D.N.Y. 2002).
12. 217 F.R.D. 309 (S.D.N.Y. 2003).
13. Rowe, 205 F.R.D. at 428–29.
10
Managing Discovery of Electronic Information
evant to her claims, the court held that the usual rules of discovery
generally apply when the data are in accessible format, but that
cost shifting could be considered when data were relatively inac-
cessible, such as on backup tapes, and substituted seven factors
for the Rowe factors. The Zubulake factors, in order of importance,
were (1) the extent to which the request is specifically tailored to
discover relevant information; (2) the availability of such informa-
tion from other sources; (3) the total cost of production, compared
to the amount in controversy; (4) the total cost of production, com-
pared to the resources available to each party; (5) the relative abil-
ity of each party to control costs and its incentive to do so; (6) the
importance of the issues at stake in the litigation; and (7) the rela-
tive benefits to the parties of obtaining the information. The court
emphasized that the factors should not be applied mechanistically
and should be weighted according to their importance.
Other courts have adopted or modified the Rowe and Zubulake
formulations.14 Moreover, the Committee Note to Rule 26(b)(2)(B)
makes explicit the authority to shift costs when information that is
not reasonably accessible is being produced.
Zubulake also set forth a sensible approach for assessing costs
when a large number of backup tapes are involved. Following the
order in the above case, the defendants restored and reviewed 5 of
the 77 backup tapes of interest; they found approximately 600 mes-
sages deemed to be responsive at a cost of about $19,000. Based
on this work, the defendants were able to estimate the cost of re-
storing and reviewing the entire 77-tape collection. Considering
the seven factors, the court determined that the balance tipped
14. See Wiginton v. CB Richard Ellis, Inc., 2004 U.S. Dist. LEXIS 15722, *13 (N.D.
Ill. Aug. 10, 2004) (adds the importance of the requested discovery in resolving the
issues of the litigation to the Zubulake factors); Multitechnology Servs., L.P. v. Veri-
zon Southwest, 2004 WL 1553480 (N.D. Tex. July 12, 2004) (analyzes application to
shift costs for “relevant and discoverable” electronic information under Rule 26(c)
and apparently rejects Zubulake’s applicability and concludes that “requiring the
parties to evenly shoulder the expense is the most effective resolution because it
balances the benefit of the discovery . . . and provides . . . [an] incentive to manage
costs it incurs”; also held that “it is appropriate to classify the expense as court
costs that can be recovered by the prevailing party”); Hagemeyer N. Am., Inc. v.
Gateway Data Sciences Corp., 222 F.R.D. 594, 599–603 (E.D. Wis. 2004) (analyzes cost-
shifting tests and concludes that “Zubulake brought the cost-shifting analysis clos-
est to the Rule 26(b)(2) proportionality test” and adopts it).
11
Managing Discovery of Electronic Information
15. This case is commonly referred to as Zubulake III, 216 F.R.D. 280 (S.D.N.Y
2003). Zubulake II, 230 F.R.D. 290 (S.D.N.Y. 2003), addressed the plaintiff’s request to
release a sealed transcript. Zubulake IV, 220 F.R.D. 212 (S.D.N.Y. 2003), addressed the
plaintiff’s request for sanctions (including an adverse inference instruction) arising
out of the failure to preserve backup tapes and deletion of isolated e-mails. In ruling
on the request, the court considered the obligation of a party to preserve digital in-
formation. In Zubulake V, 229 F.R.D. 422 (S.D.N.Y. 2004), the court imposed sanctions
for deleting relevant e-mail. In Zubulake VI, 231 F.R.D. 159 (S.D.N.Y. 2005), the court
denied a defense motion (brought by new counsel) to assert an affirmative defense.
In Zubulake VII, 382 F. Supp. 2d 536 (S.D.N.Y. 2005), the court addressed in limine
motions. On April 6, 2005, a jury awarded the plaintiff $9.1 million in compensatory
damages and $20.1 million in punitive damages.
12
Managing Discovery of Electronic Information
Form of Production
Electronically stored information can be produced in a variety of
forms or formats, each with distinctive advantages and disadvan-
tages. The form may have important implications for how easily, if
at all, the information can be electronically searched, whether rel-
evant information is obscured or sensitive information is revealed,
and how the information can be used in later stages of the litigation.
For example, ESI may be produced as a TIFF or PDF file, which is
essentially a photograph of an electronic document. Alternatively,
ESI may be produced in “native format,” that is, the form in which
the information was created and is used in the normal course of
operations. Part Two of Effective Use of Courtroom Technology16
reviews in depth the various digital formats in which documents,
photographs, videos, and other materials can be produced and the
related issues of cost and usability.17 Recent decisions, including
Hagenbuch v. Sistemi Elettronici Industriali S.R.L.18 and Williams v.
Sprint/United Management Co.,19 have addressed the form of pro-
duction.
Rule 34 was amended to provide a procedure for addressing
the form of ESI because this issue simply did not arise with respect
to paper discovery. The rule permits the requesting party to des-
ignate the form or forms in which it wants ESI produced, and it re-
quires the responding party to identify the form in which it intends
to produce the information if the requesting party does not specify
a form or if the responding party objects to a form that the request-
ing party specifies. It also requires the parties to meet and confer if
there is a dispute about form of production and provides that in the
absence of a party agreement or court order, the responding party
must produce electronically stored information either in a form or
13
Managing Discovery of Electronic Information
Waiver of Privilege or
Work-Product Protection
The volume of ESI searched and produced in response to a discov-
ery request can be enormous, and characteristics of certain types
of ESI (e.g., embedded data, metadata, threads of e-mail commu-
nications and e-mail attachments) make it difficult to review for
privilege and work-product protection. Thus, the inadvertent dis-
closure of privileged or protected material during production is a
substantial risk that persists even if expensive and time-consuming
steps are taken to identify and segregate it. To facilitate discovery,
parties have entered into agreements that help minimize the risk
of waiver. Under what is commonly called a “quick peek” agree-
ment, the responding party provides requested material without
a thorough review for privilege or protection, but with the explicit
understanding that its production does not waive any privilege or
protection. The requesting party then designates via Rule 34 the
specific documents it would like produced. The responding party
then has the opportunity to review the documents that have been
specifically requested and withhold those that are privileged or
protected. Alternatively, under “claw back” agreements, the par-
ties typically review the material for privilege or protection before
14
Managing Discovery of Electronic Information
20. Some early decisions have refused to enforce such agreements (MCL 4th,
supra note 5, § 11.431). Other opinions and commentary have raised concerns or
limitations about the use of such agreements. See R.J. Hedges, “A Critical Appraisal
of Proposed Amendment to Federal Rule of Civil Procedure 26(b)(5)(B),” vol. 5, no.
2, Digital Discovery & e-Evidence 4 (Mar. 2005) (will production of privileged mate-
rials under an agreement be deemed a waiver vis-à-vis a third party?); Maldonado
v. New Jersey, 225 F.R.D. 120, 141 (D.N.J. 2004) (such agreements may lead to the
disqualification of attorneys if, even after a privileged document is returned, the at-
torneys’ temporary possession of the document “creates a substantial taint on any
future proceedings”). Also see The Sedona Principles, supra note 2, Comment 10.d,
regarding concerns raised by claw back or quick peek agreements.
21. See Hopson v. Mayor and City Council of Baltimore, 232 F.R.D. 228 (D. Md.
2005) (reviewing the conflicting case law about whether an inadvertent disclosure
of privileged or protected information constitutes a waiver and whether a confiden-
tiality order binds third parties in parallel or future litigation, and describing the
benefits of embodying any waiver agreement in a court order).
15
Managing Discovery of Electronic Information
Preservation of ESI
As noted above, amended Rule 26(f) and the accompanying Com-
mittee Note direct parties to discuss issues regarding the preserva-
22. A proposed new Federal Rule of Evidence 502 was published for comment
in August 2006. It (1) provides that inadvertent disclosure of privileged or protected
information in connection with a federal proceeding constitutes a waiver only if the
party did not take reasonable precautions to prevent disclosure and did not make
reasonable and prompt efforts to rectify the error; (2) provides that when a confi-
dentiality order governing disclosure is entered in a federal proceeding, according
to terms agreed to by the parties, the order’s terms are enforceable against nonpar-
ties in any other federal or state proceedings; and (3) codifies the proposition that
parties can enter an agreement to limit the effect of waiver by disclosure between or
among themselves, and makes clear that if the parties want protection from a find-
ing of waiver by disclosure in separate litigation, the agreement must be made part
of a court order. The proposed rule also limits the circumstances in which a subject-
matter waiver should be found and includes a provision on selective waiver.
16
Managing Discovery of Electronic Information
23. This list is based on the discussion in Zubulake V, 229 F.R.D. 422 (S.D.N.Y.
2004).
24. Treppel v. Biovail Corp., 2006 WL 278170, *5 (S.D.N.Y. Feb. 6, 2006) (describ-
ing the benefits of preservation orders).
25. MCL 4th, supra note 5, § 11.442.
26. For an example of a broad data-preservation order, see Pueblo of Laguna v.
United States, 60 Fed. Cl. 133, 141–43 (Ct. Cl. 2004).
17
Managing Discovery of Electronic Information
discuss with the parties whether an order is needed and, if so, the
scope, duration, method of data preservation, and other terms that
will preserve relevant matter without imposing undue burdens.27
In crafting the order, it is important to know from the respond-
ing party what data-management systems are routinely used, the
volume of data affected, and the costs and technical feasibility of
implementing the order. Preservation orders should ordinarily in-
clude provisions permitting the destruction of information under
specified circumstances. Preservation orders may, for example, ex-
clude from preservation specified categories of documents or data
whose cost of preservation substantially outweighs their relevance
in the litigation, particularly if the information can be obtained
from other sources. Moreover, as issues in the case are narrowed,
the court should reduce the scope of the order.
A closing note about preservation orders: Courts are divid-
ed as to the standard for issuance of preservation orders. One
line of cases holds that preservation orders are, in effect, case-
management orders and are governed by Rule 16(b).28 A few cases
have handled preservation orders as injunctions.29
27. A court may be asked to issue an ex parte preservation order, but such
orders should rarely be entered. The court is unlikely to have sufficient information
about the responding party’s computer system to be able to strike the correct bal-
ance between preservation and continued operation.
28. See, e.g., Treppel, 2006 WL 278170, *7; Capricorn Power Co. v. Siemens
Westinghouse Power Corp., 220 F.R.D. 429, 433–34 (W.D. Pa. 2004); Pueblo of Laguna,
60 Fed. Cl. at 138 n.8.
29. See In re African-American Slave Descendants’ Litig., 2003 U.S. Dist. LEXIS
12016, *7–8 (N.D. Ill. July 15, 2003).
30. Silvestri v. General Motors Corp., 271 F.3d 583, 590 (4th Cir. 2001).
31. Zubulake v. UBS Warburg, Inc. (Zubulake IV), 220 F.R.D. 212, 216 (S.D.N.Y.
2003).
18
Managing Discovery of Electronic Information
32. Stevenson v. Union Pac. R.R. Co., 354 F.3d 739 (8th Cir. 2004); Morris v.
Union Pac. R.R., 373 F.3d 896 (8th Cir. 2004).
33. Mosaid Techs. Inc. v. Samsung Electronics Co., 348 F. Supp. 2d 332 (D.N.J.
2004).
34. Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99, 108 (2d Cir.
2002).
35. See the Advisory Committee Note to the 1970 amendment to Rule 37 as it
then existed (discussing Societe Internationale v. Rogers, 357 U.S. 197 (1958), and
concluding that under Rule 37 “willfulness was relevant only to the selection of
sanctions, if any, to be imposed”).
19
Managing Discovery of Electronic Information
tion, recycling backup tapes, and purging e-mails). Rule 37(f), ef-
fective December 1, 2006, acknowledges such record-management
policies, stating that “absent exceptional circumstances, a court may
not impose sanctions under these rules on a party for failing to pro-
vide electronically stored information lost as a result of the routine,
good-faith operation of an electronic information system” (empha-
sis added). Good faith may require, among other things, a party to
modify or suspend certain features of the electronic information
system to prevent the loss of information subject to preservation,
and it may preclude a party from exploiting the routine operation
of the system to thwart the party’s discovery obligations. The lead-
in phrase of the rule, “absent exceptional circumstances,” provides
the court with additional flexibility for dealing with rare, complex
situations by allowing for sanctions in extraordinary circumstanc-
es even if evidence was destroyed as a result of routine, good-faith
operation of the system.
Conclusion
Discovery of ESI presents unique issues regarding the scope of dis-
covery, the allocation of costs, the form of production, the waiver
of privilege and work-product protection, and the preservation
of data and spoliation. To effectively manage these issues, judges
must understand the relevant technology at a level that allows ef-
fective communication with attorneys, parties, and experts. The
information in this guide is a start, and additional resources can be
found on the Center’s intranet site.
More specifically, judges must require attorneys to take seri-
ously their obligation to meet and confer under Rule 26(f) and to
submit a meaningful discovery plan that addresses ESI issues, and
judges must ensure that adequate disclosures are made pursuant
to Rule 26(a)(1). Judges must also encourage parties to narrowly
target requests for ESI and to make these as early as possible in
the litigation. Judges must evaluate whether the costs of comply-
ing with the requests are proportional to their benefit. To this end,
judges may need to encourage or order tiered discovery and sam-
pling to determine the relevance, need, and cost of more expan-
sive discovery, and may shift costs from the producing party to
the requesting party, particularly when information that is not rea-
20
Managing Discovery of Electronic Information
36. See MCL 4th, supra note 5, § 11.446, and The Sedona Principles, supra note 2,
Comment 10.c.
21
Managing Discovery of Electronic Information
Glossary
Note: Most entries in this glossary were derived, with permission, from a glossary
prepared by the Sedona Conference. That extensive glossary, often with fuller defi-
nitions than presented here, is updated periodically and is available for download
at www.thesedonaconference.org.
backup data (disaster recovery data): An exact copy of data that serves
as a source for recovery in the event of a system problem or disaster. Gen-
erally stored separately from active data on, for example, tapes or remov-
able disk drives, and often without indexes or other information and, as
a result, in a form that makes it difficult to identify, access, or retrieve
individual records or files.
backup tape recycling: A process in which backup data tapes are overwrit-
ten with new backup data, usually on a fixed schedule determined jointly
by records-management, legal, and information technology (IT) sources.
22
Managing Discovery of Electronic Information
deleted data: Data that once existed on a computer as active data, but
have been marked as deleted by computer programs or user activity. De-
leted data may remain on the storage media in whole or in part until they
are overwritten or “wiped.” Even after the data have been wiped, directory
entries, pointers, or other information relating to the deleted data may
remain on the computer.
23
Managing Discovery of Electronic Information
unique (and proprietary) formats for their data (e.g., WordPerfect docu-
ment file format). Files with unique formats may only be viewed or printed
by using their originating application or an application designed to work
with compatible formats. These formats are also called the “native” for-
mat. Computer systems commonly identify files by a naming conven-
tion that denotes the native format (and therefore the probable originat-
ing application). For example, a WordPerfect document could be named
document.wpd, where .wpd denotes a WordPerfect file format. Other com-
mon formats are .xls for Microsoft Excel spreadsheet files, .txt for ASCII
text files, .ppt for Microsoft PowerPoint files, .jpg for photographs or other
images, and .pdf for Adobe Acrobat documents.
24
Managing Discovery of Electronic Information
offline storage: The storage of electronic records, often for long-term ar-
chival purposes, on removable media (e.g., CDs, removable disk drives)
or magnetic tape that is not connected to a computer or network. Acces-
sibility to off-line media usually requires manual intervention and is much
slower than online or nearline storage, depending on how and where the
media are stored.
residual data (ambient data): Data that are not active on a computer sys-
tem and that are not visible without use of “undelete” or other special
data-recovery techniques. May contain copies of deleted files, Internet
files, and file fragments.
25
Managing Discovery of Electronic Information
systems data: Information about a computer system that includes, for ex-
ample, when people logged on and off a computer or network, the applica-
tions and passwords they used, and what websites they visited.
26
The Federal Judicial Center
Board
The Chief Justice of the United States, Chair
Judge Bernice B. Donald, U.S. District Court for the Western District of Tennessee
Judge Terence T. Evans, U.S. Court of Appeals for the Seventh Circuit
Magistrate Judge Karen Klein, U.S. District Court for the District of North Dakota
Judge James A. Parker, U.S. District Court for the District of New Mexico
Judge Stephen Raslavich, U.S. Bankruptcy Court for the Eastern District of
Pennsylvania
Judge Sarah S. Vance, U.S. District Court for the Eastern District of Louisiana
Judge Karen J. Williams, U.S. Court of Appeals for the Fourth Circuit
James C. Duff, Director of the Administrative Office of the U.S. Courts
Director
Judge Barbara J. Rothstein
Deputy Director
John S. Cooke