Meet and Confer - American Bar Association

Fall 2009
Committee on Pretrial Practice & Discovery
Slaying the E-Discovery Beast Through an
Effective Rule 26(f) “Meet and Confer”
By Brad H. Sysol & Kendra Huff
O
ne of the most significant changes resulting from the
2006 amendments to the Federal Rules of Civil Procedure
was the addition of Rule 26(f), which requires the parties’ counsel to “meet and confer” in advance of the scheduling conference to discuss a wide range of issues, including the
preservation of potentially relevant evidence, the disclosure and
exchange of electronically stored information (ESI), the form in
which such information should be produced, and the protection
of privileged information and materials. In today’s age of ediscovery, this early meeting between counsel is even more critical as a means by which to manage and control certain aspects
of the case, such that the cost of e-discovery or the failure to
preserve a key piece of evidence—rather than the merits of the
claims and defenses—becomes the paramount consideration
in deciding whether to settle, when, and for what amount.
Accordingly, counsel should use the Rule 26(f) “meet and confer”
to engage in an in-depth discussion of the following topics with
the goal of developing a discovery plan that makes sense in terms
of burden and cost in relation to the amount at stake.
Scope of Data Preservation and
Production Plans
The duty to preserve evidence arises when a party knows, or
reasonably should know, that litigation is imminent.1 The importance of the duty to preserve cannot be understated. Magistrate
Judge Sidney I. Schenkier of the U.S. District Court for the
Northern District of Illinois observed that “when a charge is
made that relevant information has been destroyed, and especially
when a charge is made of intentional destruction, it is a charge
that strikes at the core of our civil litigation system.”2 The failure to preserve relevant evidence can lead to dire consequences
including default judgments, monetary sanctions, and/or adverse
inference instructions. For example, in a landmark electronic discovery case, a jury awarded a $29 million verdict to the plaintiff,
in part, due to an adverse inference instruction given as a result of
a party’s failure to satisfy its duty to preserve.3
The Rule 26(f) meeting provides an opportunity for counsel
to discuss issues concerning the preservation of potentially
relevant ESI, which is critical due to the substantial cost
associated with maintaining large volumes of ESI and the risk
of losing such information (or rendering it accessible only at
a much higher cost) due to automatic deletion and routine
overwriting of backup tapes. Accordingly, one of the primary
goals of the Rule 26 “meet and confer” should be to lessen the
client’s cost to preserve voluminous ESI and to reduce the risk
Brad H. Sysol ([email protected]) is a principal and Kendra
Huff ([email protected]) is an associate with Miller, Canfield,
Paddock and Stone in Kalamazoo, Michigan.
of sanctions by reaching an agreement with opposing counsel
on potentially relevant ESI that must be preserved. Failing to
narrow the preservation obligation with respect to ESI can
result in excessive costs to the client, and in some cases, may
paralyze the company’s business operations.
So how should counsel go about lessening their client’s
preservation burden with respect to ESI? During the Rule 26(f)
conference, counsel should seek to narrow the scope of their
preservation plan by: (1) narrowing the list of custodians of
potentially relevant records, (2) limiting the relevant time
frame, (3) agreeing on a narrow list of search terms to harvest
potentially relevant ESI for relevancy review, and (4) excluding
irrelevant computer systems. In short, counsel’s goal should
be to narrow the focus to what is truly relevant to the case
so that instead of providing a costly and burdensome blanket
preservation plan, it can target with precision the ESI that has
any bearing on the case. If a reasonable preservation plan in
relation to the value of the case cannot be reached, counsel
should discuss the option of cost shifting at the “meet and
confer” before turning to the court for a preservation order.
It is also important to recognize that before committing
your client to a preservation plan for ESI, counsel should have
a clear understanding of the client’s information technology
infrastructure and the likely costs associated with preservation
requirements. In most cases involving a corporate client, counsel
should consult with the client’s IT personnel to understand the
limitations of the client’s document-retention system, determine
what is accessible versus inaccessible data, and evaluate the size
and scope of potentially relevant information. Failing to do so
may result in counsel agreeing to a binding preservation plan
under which the client must incur substantial costs. Underscoring
the importance of this point, an attorney in a recent case agreed
to use search terms to locate potentially responsive emails on his
client’s backup tapes. The attorney apparently did not understand
the magnitude of the agreement and/or the client’s IT system.
The result was a $6 million bill for his client to process, review,
and produce the data containing the search terms.4 In short,
know the potential cost of the preservation plan before advising
your client to agree.
Format for Production of ESI
Rule 34(b) requires a party requesting ESI to specify the format
in which the information should be produced. If the format
for production is not specified by party agreement, Rule 34(b)
permits the responding party to produce ESI either in the
form in which it is ordinarily maintained or in a form that is
reasonably usable.
Rule 26(f)(3) explicitly directs counsel to discuss during the
“meet and confer” the form or format in which ESI should be
Published in Pretrial Practice, Volume 18, Number 1, Fall 2009. © 2009 by the American Bar Association. Reproduced with permission. All rights reserved.
This information or any portion thereof may not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system
without the express written consent of the American Bar Association.
PPnD_Fall09.indd 7
11/24/09 9:47:18 AM
Committee on Pretrial Practice & Discovery
produced. Doing so not only facilitates the application of Rule
34(b), but also forces counsel to begin thinking strategically as
to the types of ESI that their client may need from an opposing
party, and the most effective and efficient way to review and utilize such data. These discussions will also help avoid the expense
or delay in producing documents in inappropriate forms. Some
suggested topics for discussions on production formats during a
Rule 26(f) conference include the review application or platform a party intends to use and the production and the load files
required, metadata field specifications, the types of files that will
be produced, and whether the production will include searchable documents.
Review Platforms and Load Files
A review application platform allows a party to manage the
documents (both hard copy and ESI) it collects and produces
as well as those produced by the opposing party. It provides the
tools for a party to search and review data, to designate and
produce data, and to organize data so that it can be efficiently
and effectively used throughout the course of litigation.
Counsel will need to be cognizant of the type of review
platform they will use to specify in a discovery plan the format
in which opposing counsel is required to produce documents.
This issue does not arise if parties exchange documents in
hard copy. However, in today’s legal environment and given
the proliferation of ESI, even very small litigation matters
tend to include the collection of ESI and raise the issue
of what application or platform will be used to work with
the data produced that, in turn, dictates the particular load
files. Parties should therefore include in their discovery plan
the requirement that opposing counsel produce documents
with load files compatible with the chosen review platform.
Otherwise, parties may spend time dealing with and correcting
file formats that the review application cannot accommodate.
In addition, the parties should include in their discussion
the types of files that will be included in the production. For
example, if the production will include a file type that does
not typically display well in a static TIFF or PDF image format
such as large Microsoft Excel spreadsheets, the parties should
discuss whether the production should include any native files
and how this impacts the load file requirements.
Metadata Specifications
As electronic data is processed, the underlying data associated
with a document or metadata can be outputted to specific data
fields. Metadata is essentially data about data. It describes the
attributes and contents of an original document including the
who, what, when, where, and why questions about the data.
Different metadata exists for email than for “loose” electronic
documents such as Microsoft Word or other office electronic
documents. Just a few examples of metadata fields include
the document’s author, recipients, date sent, date created, file
name, and file path. Parties should discuss during a Rule 26(f)
conference which metadata should be included in the load file
when documents are produced, along with the field naming
protocol for the data file. The parties should exchange a list of
requested metadata fields and a description of each field during
the conference. Counsel may find it beneficial to request the
Fall 2009
same standard metadata fields for all litigation, but the merits
of each case will influence which additional fields should be
requested. If a party is silent with respect to field specifications,
the party may receive only basic fields such as a document’s
production beginning and end numbers and custodian.
Searchable Document Content
The parties should include in their discovery plan whether hard
copy and electronic documents will be produced in a searchable
format. Hard copy documents that are scanned and produced
with optical character recognition (OCR) in the load files
are searchable. OCR translates images of text into actual text
characters, which makes it possible to search the text. ESI is
produced as searchable if either extracted text or OCR is produced
along with the static images. A file produced natively, such as a
Microsoft Excel spreadsheet, is also searchable.
Most attorneys faced with the prospect of reviewing documents
electronically will include the requirement that produced
documents include OCR and/or extracted text. The cost for
processing and obtaining OCR and/or extracted text should be
explored and evaluated in light of the efficiency brought by being
able to easily search, identify, and manage key documents during
the course of the litigation.
Privileged Information and Privilege Logs
The cost and burden of performing a privilege review and
creating a privilege log can be significant in any case, but
especially in a large e-discovery case. With approximately 210
billion emails sent per day,5 it is no coincidence that the cost
to conduct a privilege review of ESI has and continues to rise
dramatically, such that it may influence a party’s settlement
strategy more than the merits of the claims and defenses
at issue. The enormous costs potentially associated with
the review of ESI are illustrated by a case in which Verizon
Communications spent over $14 million reviewing and logging
2.4 million documents for relevancy and privilege.6 Rule 26(f)
(d)’s requirement that counsel discuss privilege issues at the
“meet and confer” provides an opportunity to avoid having the
strategy of your case dictated by the cost of a privilege review
or preparation of a privilege log where large amounts of emails
or other electronic documents are involved. Counsel should
consider the following issues.
Rule 502(d) Order
Recently passed Rule 502(d) of the Federal Rules of Evidence
authorizes a federal court to enter a non-waiver order. Rule
502(d) provides that the disclosure of privileged information,
even where intentional, does not constitute a waiver of the
attorney-client privilege in that proceeding or in any other state
or federal proceeding, and as to all parties and nonparties. In
federal court proceedings, counsel should make it a matter of
routine to discuss with opposing counsel whether the parties
should stipulate to entry of a Rule 502(d) order at the Rule 26(f)
meeting so as to protect against the inadvertent disclosure of a
privileged document. Particularly during large-scale document
reviews, it is often inevitable that some privileged documents are
inadvertently produced. The 502(d) order will enable the parties
to use technology in conjunction with a standard document
Published in Pretrial Practice, Volume 18, Number 1, Fall 2009. © 2009 by the American Bar Association. Reproduced with permission. All rights reserved.
This information or any portion thereof may not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system
without the express written consent of the American Bar Association.
PPnD_Fall09.indd 8
11/24/09 9:47:19 AM
Fall 2009
review to reduce the time and cost associated with a privilege
review without the fear of waiving the privilege.
Arrange a “Quick Peek”
A Rule 502(d) order also allows the parties to enter into a
“quick peek” agreement whereby (1) the responding party
makes potentially relevant information available to opposing
counsel for review; (2) opposing counsel flags which information
is relevant to its requests; and (3) the responding party then
conducts a responsiveness and privilege review of only the flagged
information. The “quick peek” agreement allows the parties to
avoid the heavy costs of a privilege review—without waiving any
privileges. While this type of agreement will not work in every
case or every matter, and may be wholly unacceptable to some
clients or inadvisable for good reasons, it is worthy of serious
consideration as a way to control the cost of discovery. A word
of caution: A “quick peek” arrangement should never be used
without a Rule 502(d) order in place. Without such an order, the
parties run the risk of waiving the privilege as to nonparties to the
suit or as to subsequent or collateral proceedings.
Privilege Log Protocols
When it comes to privilege logs today, emails and email strings
are the bane of litigators in e-discovery-intensive cases. Preparing
a privilege log in a large e-discovery case is extremely costly and
presents many thorny issues. For instance, should each segment
of an email string be identified on the log? Should the log
identify blind-copy recipients? How specifically should the log
describe the communication? The answer to these questions has
a direct impact on the cost of preparing a privilege log, and also
potentially on whether a privilege has been waived by failing to
adequately assert the privilege.
To avoid these issues, and to minimize the cost of preparing
the privilege log, counsel should use the “meet and confer”
to negotiate the methodology the parties will use to create
privilege logs, as well as their contents. Approaches to
both issues can vary greatly. An agreed-upon protocol will
often help both parties reduce the burden associated with
creating privilege logs. For example, the parties may agree
to a protocol where a search term list of attorney names and
Committee on Pretrial Practice & Discovery
other common litigation terms (e.g., “deposition”) is run
against the raw ESI data. Any documents where such terms
are found is then automatically set aside and withheld for
privilege and does not need to be reviewed or placed on a log.
The parties may also agree to exchange an initial privilege log
generated solely by technology using the metadata fields in
the documents, eliminating the time and cost associated with
human preparation of a log. After reviewing these “computergenerated” logs, the parties can then exchange a list of specific
documents that they want to see on a traditional log. Such
agreements will reduce the time spent creating a privilege log
and minimize delays in the production of documents.
Conclusion
In today’s age of e-discovery, the Rule 26(f) “meet and confer”
should not be viewed as an uneventful, meaningless, or even
simple event in the litigation process. Instead, it is a strategically
critical point where counsel must protect their client from the
risk of spoliation of evidence and a discovery process that can
be both unduly burdensome and costly. Early and successful
negotiation of the issues mentioned above can be the catalyst
to a reasonable discovery process and, in the end, a successful
result for your client.
Endnotes
1. Mosaid Techs. Inc. v. Samsung Elecs. Co., 348 F. Supp.2d 332,
336 (D. N.J. 2004); Quinby v. West LB AB, 245 F.R.D. 94 (S.D.N.Y.
2006) (quoting Fujitsu Ltd. v. Fed. Express Corp., 247 F.3d 423, 436 (2d
Cir. 2001).
2. Danis v. USN Comm, 2000 WL 1694325 (N.D. Ill. Oct 23,
2000).
3. Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003);
Zubulake v. UBS Warburg, 229 F.R.D. 422 (S.D.N.Y. 2004).
4. In re Fannie Mae Securities Litig., 552 F.3d 814 (D.C. Cir. 2009).
5. See David Allen, Emails Reach 210 Billion Per Day, available at
www.techwatch.co.uk/2009/01/26/emails-reach-210-billion-per-day (last
visited Jan. 26, 2009).
6. See Adreas Kluth, The Big Data Dump, The Economist,
August 28, 2008, available at www.economist.com/businessfinance/
displayStory.cfm?story_id=12010377. See also, Daniel Fisher, The Data
Explosion,. Forbes, October 1, 2007, available at www.forbes.com/
forbes/2007/1001/072.html.
Published in Pretrial Practice, Volume 18, Number 1, Fall 2009. © 2009 by the American Bar Association. Reproduced with permission. All rights reserved.
This information or any portion thereof may not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system
without the express written consent of the American Bar Association.
PPnD_Fall09.indd 9
11/24/09 9:47:21 AM