presents Metadata: PDFs, Electronic Redaction and Track Changes g Managing Legal and Ethical Risks When Removing Sensitive Information A Li Live 90-Minute 90 Mi t T Teleconference/Webinar l f /W bi with ith Interactive I t ti Q&A Today's panel features: Robert D. Brownstone, Law and Technology Director; Chair, EIM Group, Fenwick & West, Mountain View, Calif. William Hoffman,, Law Offices of Will Hoffman,, Pacific Palisades,, Calif. Thursday, August 5, 2010 The conference begins at: 1 pm Eastern 12 pm Central 11 am Mountain 10 am Pacific You can access the audio portion of the conference on the telephone or by using your computer's speakers. Please refer to the dial in/ log in instructions emailed to registrations. For CLE purposes, please let us know how many people are listening at your y location by • closing the notification box • and typing in the chat box your company name and the number of attendees. attendees • Then click the blue icon beside the box to send send. For live event only. • If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality lit off your iinternet t t connection. ti • If the sound quality is not satisfactory and you are listening li t i via i your computer t speakers, k please dial 1-888-450-9970 and enter your PIN when e p prompted. o p ed O Otherwise, e se, p please ease se send d us a chat or e-mail [email protected] immediately so we can address the problem. • If you dialed in and have any difficulties during the call, press *0 for assistance. Metadata: Track Changes, PDFs, Electronic Redaction Managing Legal and Ethical Risks Webinar – August 5, 2010 Robert D. Brownstone William E. Hoffman © 2010 by the respective presenters and their firms To Scrub or Not To Scrub? 2 Agenda I. Three Key Metadata Threats Problems, cautionary tales & risk mitigation for each of: A. Tracked Changes B. Conversions to .pdf C. Electronic redaction II. Ethical Obligations A. Sending Lawyer B. Receiving Lawyer C. Discovery is Different – Usually 3 I. Metadata – Introduction Data about data Information describing the history, tracking, or management of an electronic document File System Data = atmospherics (incl. fields in Windows Explorer) Document (Embedded) Data = results of revisions in drafts of a file 4 I. Metadata Intro (c’t’d) – Embedded Data Generally embedded/ document data can yield more surprises, including: inserted comments white text text in very small font 5 I. Key Threats – A. Tracked Changes 1. The Problem Embedded data can track/capture: changes made reviewers’ name order in which changes made Especially in Word when creator/modifier did not accept/reject tracked changes 6 I(A)(1). Tracked Changes (c’t’d) – Dangers for Lawyers Embedded data’s biggest threat – "90[%] of documents in circulation began as something else" <http://news.com.com/2102-7344 3-5170073.html?tag=st.util.print> (citing Vanson Bourne study, "Cost of Sharing") Hot button issue because recipient can manipulate files to peel back onion layers by using either: • 1) low-tech • 2) higher-tech • basic tools (drop-down-menus & tabs) in Word, Excel, PowerPoint and/or Adobe Acrobat scrubbing/cleaning software, by clicking on "analyze" 3) highest-tech eDiscovery software to extract – from one file or a batch of files – metadata in searchable form 7 I(A)(1). Tracked Changes – Lawyers (c’t’d) LAWYER-created files . . . concerns: • Documents drafted by one side • Documents drafted by both sides Proposed Order e-mailed to Judge in Word or WordPerfect format Written discovery and/or discovery responses might (HAVE TO BE) be exchanged in Word or WordPerfect 8 I(A)(1). Tracked Changes – Lawyers (c’t’d) E-mail attachment to client Draft of pleading or agreement Bill for services rendered Confidentiality Concerns for Legal and Sales: Identity of other client/buyer/seller Fees charged other client/buyer Municipalities Publicly posted Agenda, Minutes or Ordinance 9 I(A). Tracked Changes (c’t’d) – 2. Cautionary Tales UN (Lebanese PM assassination), British PM’s Office ("Downing Street Memo"), Republican Social Security Administration, Democratic National Committee, California AG’s Office, MPAA and SCO Group. . . Gene Koprowski, Networking: Not-so-secret documents, UPI (2/6/06) <http://www.physorg.com/news10567.html> Brian Bergstein, Bigger efforts made against embarrassing 'metadata', AP (2/3/06) <http://Bergstein-2-3-06.notlong.com> Dennis Kennedy, et al., Mining the Value from Metadata, (1/1/06) <http://www.discoveryresources.org/featured-articles/fromthe-experts/thinking-e-discovery-mining-the-value-frommetadata/print/> Tom Zeller Jr., "Beware Your Trail of Digital Fingerprints," NYT (11/7/05) <http://Metadata-NYT-11-7-05.notlong.com> (quoting <http://www.un.org/news/dh/docs/mehlisreport>) 10 I(A)(2). Tracked Changes – Cautionary Tales (c’t’d) Litigators representing SCO chagrined when metadata (tracked changes) in Word version of Complaint revealed thought process re: which Linux users to target as Δ’s Stephen Shankland, Hidden text shows SCO prepped lawsuit against BofA (c/net 3/18/04) <http://news.com.com/2102-7344 3-5170073.html?tag=st.util.print> 11 I(A). Tracked Changes (c’t’d) – 3. Mitigating Risks DO any or all of these steps: properly accept/reject tracked changes one by one or all at once use metadata scrubbing software scrub before or during conversion to portable document format (.pdf) DON’T hide them by choosing "Final" from Word’s "Display for Review" toolbar 12 I(A)(3). Tracked Changes – Mitigating Risks (c’t’d) Microsoft menus and the like are inadequate See Appendix A, Brownstone Bibliography, § A So, especially for e-mail attachments, use software that works for tracked changes and other metadata. Examples: Payne Consulting Group's (PCG's) Metadata Assistant <www.payneconsulting.com/products> Workshare Professional 5.2 suite; or Workshare Protect 6.0 <www.workshare.com/products/wsprofessional> Esq Inc.’s Iscrub <esqinc.com/section/products/2/iscrub.html> Litera’s Metadact <www.litera.com/products/metadact.html> 13 I(A)(3). Mitigating Risks (c’t’d) – Other Soft-/Hard- ware Macs 3BView’s 3BClean <www.3bview.com/index.php?option=com content&view=article&id= 62:technical-overview&catid=6:product-articles&Itemid=93> Sharon D. Nelson, SCRUBBING A MAC'S METADATA: A BIT OF A PUZZLER, Ride the Lightning (7/23/09) <ridethelightning.senseient.com/2009/07/scrubbing -a-macs-metadata-a-bit-of-a-puzzler.html> WordPerfect’s built-in features Laura Acklen, Saving WordPerfect Files Without Metadata, Corel (last visited 7/28/10) <http://www.corel.com/servlet/Satellite?pagename=Corel3/Section/Disp lay&sid=1047024315119&gid=1047024331836&cid=1144159894033> Richard M. Georges, Saving WordPerfect Files Without Metadata, FutureLawyer (7/23/10) <http://futurelawyer.typepad.com/futurelawyer/2010/07/savingwordperfect-files-without-metadata.html> 14 I(A)(3). Tracked Changes – Mitigating Risks (c’t’d) Goalkeeper Prompts – Examples: 15 I(A)(3). Mitigating Risks Goalie Prompts (c’t’d) – (c’t’d) Also, “Reply to All” warnings See, e.g., <www.sperrysoftware.com/outlook/Reply-To-All-Monitor.asp> 16 I(A)(3). Tracked Changes – Mitigating Risks (c’t’d) CAVEAT: "Mind the [Mobile] Gap" Attachments created and sent – or forwarded – via: web access to email system, e.g., Outlook Web Access (OWA); OR smartphones/PDA’s See generally these Microsystems items: Filling the Metadata Gap; The Next Generation of Metadata Risks & Solutions (3/31/10) Cathy Brode, The Often Overlooked Mobile Security Gap, 3BView (12/15/09) See also Neil Squillante, Workshare Protect Server: Read Our Exclusive Report, TechnoLawyer Blog (4/15/10) 17 I(A)(3). Tracked Changes – Mitigating Risks (c’t’d) For law firms and others, far better to scrub outgoing copies day to day than to try to batch-scrub after the fact Technological limitations Ethical issues See, e.g., State Bar of Calif. Standing Comm. on Prof’l Resp. & Conduct, Formal Op. No. 2007-174 (8/4/07) <ethics.calbar.ca.gov/LinkClick.aspx?fileticket=kiSRjKqnMBg%3d&tabid=838 > Public records issues Lake v. City of Phoenix ("Lake II"), 2009 Ariz. LEXIS 257 (Ariz. 10/29/09) <www.supreme.state.az.us/opin/pdf2009/CV090036PR.pdf> Other pertinent decisions – including one from 2010 – in Bibliography, § B 18 I. B. Conversions Into .PDF 1. The Problem • Some metadata migrates • Just press Ctrl+D to see pre-conversion: Title Author, etc. . . . . • For court warnings, see, e.g., Sharon D. Nelson, Court Warns Lawyers to Scrub Metadata Before PDF Conversion, Ride The Lightning (2/25/10) <ridethelightning.senseient.com/2010/02/court-warnslawyers-to-scrub-metadata-before-pdf-conversion.html > 19 I(B). Conversions Into .PDF – 2. Cautionary Tales Alabama Ethics Opinion <www.alabar.org/ogc/PDF/2007-02.pdf> Corn Growers letter <http://politechbot.com/docs/corn.growers.google.congress.061008.pdf> • Declan McCullough, Corn farmers take anti-Google fight to Washington, c/net (6/11/08) <http://news.cnet.com/830113578 3-9965555-38.html?hhTest=1> • Declan McCullagh, Secretive D.C. firm says corn growers‘ anti-Google letter is legit, c/net (6/12/08) <http://news.cnet.com/8301-13578 39966971-38.html?hhTest=1> • CNET, Daily Debrief: Corn farmers vs. Google (video re: "Farm lobbyist [sic] oppose Yahoo-Google ad deal") <http://video.techrepublic.com.com/242213792 11-205590.html> 20 I(B). Conversions (c’t’d) – 3. Risk Mitigation Best to scrub metadata BEFORE or DURING conversion to .PDF Or AFTER. Some help is here in Adobe 8 & 9 ("Examine Document") • <http://blogs.adobe.com/acrolaw/met adata issues/> • <www.adobe.com/products/acrobat/so lutions/legal/productinfo/features/> • <http://help.adobe.com/en US/Acroba t/9.0/3D/WS7E9FA147-10E3-43919CB6-6E44FBDA8856.w.html> 21 I. C. Electronic Redactions 1. The Problem • When is redaction needed? Protective Order (incl. multi-tier/AEO) Government inquiry responses ECF/CM . . . PERSONAL DATA IDENTIFIERS: Now nationwide . . . via FRCP 5.2 (eff. 12/1/07) 22 <www.law.cornell.edu/rules/frcp/Rule5 2.htm> I(C)(1). Redactions— The Problem (c’t’d) Out of sight . . . out of mind? May just be an overlay "Hidden" text may be searchable and copy-able for pasting into another document "Under seal" information or PII may be exposed by a friend, foe or neutral (court, e.g.) 23 I(C). Redactions (c’t’d) – 2. Cautionary Tales NEW! TSA redaction gaffe • PDF Itself with black boxes removed <http://cryptome.org/tsa-screening.zip> • Articles: <http://www.betanews.com/article/The-PDF-redactionproblem-TSA-may-have-been-using-oldsoftware/1260466899> <www.computerworld.com/s/article/print/9142141/Anal ysis TSA document release show pitfalls of electronic redaction?taxonomyName=Security&taxonomyId=17> <www.wanderingaramean.com/search/label/Screening% 20Management%20SOP> (linking to related posts) • Satirical Video: <www.thedailyshow.com/watch/wed-december-92009/theory-v--practice---tsa-leak> 24 I(C)(2). Redactions – SNAFUS (c’t’d) 25 Things Facebook Couldn't Keep Secret In Court, Information Week (2/12/09) <www.informationweek.com/shared/printableArticle.jhtml;jsessioni d=PVULRFVJRLOT0QSNDLRSKHSCJUNN2JVN?articleID=214000046> • linking to <http://docs.justia.com/cases/federal/districtcourts/california/candce/5:2007cv01389/189975/474/0.pdf> [may not open in Internet Explorer; will open in Mozilla Firefox] GE Suffers a Redaction Disaster, Conn. L. Trib. (5/28/08) ("sensitive information easy to access behind black veil") <www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202421717785> Error by FTC Reveals Whole Foods' Trade Secrets, AP (8/15/07) <www.washingtonpost.com/wpdyn/content/article/2007/08/14/AR2007081401784 pf.html> 25 I(C)(2). Redactions – SNAFUS (c’t’d) AT&T leaks sensitive info in NSA suit, c/net (5/30/06) <http://news.com.com/2102-1028 36077353.html?tag=st.util.print> Linking to <www.politechbot.com/docs/att.not.redacted.brief.052606.pdf> IRONY . . . . 26 See <www.nsa.gov/ia/ files/support/I733-028R-2008.pdf> I(C)(2). Redactions – SNAFUS (c’t’d) More PDF Blackout Follies, Slashdot (6/22/06) <http://it.slashdot.org/article.pl?no d2=1&sid=06/06/22/138210> linking to <www.sfgate.com/c/acrobat/2006/06/22/BALCO quash subpoena sfchronicle.pdf> Copy, Paste and Reveal, Legal Times (1/30/06) (U.S. report re: fatal shooting of Italian intelligence officer; secret details revealed re: manning of security checkpoints) <http://Lesemann-1-30-06.notlong.com> See R. Brownstone, et al., Exposing Redaction, 9 No. 10 E-Commerce L. Rep. 7 (West Oct. 2007) <www.fenwick.com/docstore/Publications/IP/IP bulletins/IP Bulletin Fall 2007.pdf> • Expanded version – Secrets Easily Leaked by Friend or Foe In Publicly Filed .PDF Documents, 13 No. 1 Cyberspace Lawyer 1 (West Jan./Feb. 2008) – available from presenter 27 I(C). Redactions (c’t’d) – 3. Risk Mitigation DO’s: High Tech: MS Word redaction tool; OR Acrobat Pro 8.0 or 9.0 redaction tool Low Tech: print then black-out (or vice versa) then scan then OCR 28 I(C)(3). Redaction – Mitigating Risks (c’t’d) DON’T’s: Microsoft Word’s borders/shading Microsoft Word’s highlighter [UNLESS YOU THEN PRINT, SCAN & OCR] 29 I(C)(3). Redaction – Mitigating Risks (c’t’d) TO LEARN MORE: Rick Borstein, Acrobat for Legal Professionals, Redaction segment (last updated 6/27/10) <http://blogs.adobe.com/acrolaw/redaction/> Kim Walker, How to Keep Sensitive Data Blacked Out, Pa. Legal Intelligencer (3/19/10) <http://www.law.com/jsp/lawtechnologynews/ PubArticleFriendlyLTN.jsp?id=1202446452557> Free White Paper: PDF redaction: what every business should know, DocsCorp (12/11/09) <http://www.docscorp.com/public/downloadTri al/RedactionWhitepaperPDFT.cfm> Summary of changes from Acrobat 7; Top Features for Legal Professionals, Adobe (9/8/08) <http://blogs.adobe.com/acrolaw/A9 7-8-9-comparison.pdf> 30 II. Ethical Obligations – Inadvertent Disclosure of Confidential Metadata Metadata ethics = subset of broader area of inadvertent disclosure in general . . . Overview chart of nationwide metadata ethics opinions: • <abanet.org/tech/ltrc/fyidocs/metadatachart.html> 31 II. Ethical Obligations – Inadvertent Disclosure (c’t’d) A lawyer’s ethical duty varies whether the lawyer has: • sent confidential metadata; • received confidential metadata; or • disclosed confidential metadata as part of discovery N.B. The jurisdiction governing a lawyer’s conduct may provide a different rule re metadata as distinct from other ESI 32 II. Ethics – A. Sending Lawyer – Basic Rules – Confidentiality ABA Model Rules of Professional Conduct [virtually all states have the same or similar rules as the following] • Rule 1.6 Confidentiality of Information "(a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation or the disclosure is permitted by [certain specific exceptions, e.g., to prevent death or substantial bodily harm]." 33 II(A). Sending – Basic Rules – Confidentiality (c’t’d) A lawyer has a duty "[t]o maintain inviolate the confidence, and at every peril to himself or herself to preserve the secrets, of his or her client." • Cal. Bus. & Prof. Code § 6068(e)(1). A lawyer’s duty under Rule 1.6 "includes taking care . . . to employ reasonably available technical means to remove [confidential] metadata before sending the document." • D.C. Bar Opinion 341 (Sept. 2007) 34 II(A). Sending – Basic Rules – Duty of Competence "Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation." • ABA MRPC Rule 1.1 Competence "[A] lawyer . . . [must] avoid improper disclosure of confidential and privileged information in metadata in electronic documents." • Minnesota Lawyers Professional Responsibility Board Opinion No. 22 (Mar. 26, 2010) ("Minn. # 22") 35 II(A). Sending – Basic Rules – Competence (c’t’d) Competence requires that lawyers understand that: • metadata is created in the generation of electronic documents, • transmission of electronic documents will include transmission of metadata, • recipients of the documents can access metadata, and • actions can be taken to prevent or minimize the transmission of metadata." Minn. # 22 36 II(A). Sending – Basic Rules – Related Rules ABA Rule 5.1 Responsibilities Of Partners, Managers, And Supervisory Lawyers requires those with managerial authority to ensure that the firm and its lawyers follow the Rules of Professional Conduct. • See also Rule 5.3 Responsibilities Regarding Nonlawyer Assistants Hence, a lawyer must become knowledgeable about metadata, and a firm must provide for the acquisition of such knowledge. 37 II(A). Sending – Basic Rules – Related Rules (c’t’d) Rule 5.1 may require the implementation of a firm-wide application to scrub certain outgoing e-mail to remove metadata. "[L]awyers must either acquire sufficient understanding of the software that they use or ensure that their office employs safeguards to minimize the risk of inadvertent disclosures." D.C. Bar Opinion 341 (Sept. 2007) (emphasis added) 38 II(A). Sending – Bottom Line Same basic rules generally applicable to ESI . . . • "[A] lawyer must use reasonable care to prevent the disclosure of confidential client information hidden in metadata when [sending e-mail] . . . ." • North Carolina State Bar 2009 Formal Ethics Op. 1 (Jan. 15, 2010) • "Lawyers must exercise reasonable care to prevent the disclosure of confidences and secrets contained in ‘metadata’ in documents they transmit electronically . . .." • New York State Bar Association Opinion 782 (Dec. 8, 2004) 39 II. Ethics – B. Receiving Lawyer – Different Standards Unlike rules prohibiting the disclosure of confidential metadata, the rules regarding the receipt of ESI containing metadata may differ by jurisdiction. The most controversial state ethics opinions prohibit a lawyer who has received ESI to examine that ESI for metadata, often called "data mining." Generally, any such prohibition applies in the context of a lawyer’s receipt of materials outside discovery. 40 II(B). Receiving – Different Standards (c’t’d) Example: A lawyer who receives an e-mail from another party or another party's lawyer must refrain from searching for and using confidential information found in the metadata embedded in the document.” N.C. 2009 Formal Ethics Opinion 1(emphasis added). 41 II(B). Receiving – The General Rule For each jurisdiction, the action required of a lawyer who receives confidential metadata through inadvertence is the same as the case in which he/she has received any other type of confidential ESI through inadvertence. 42 II(B). Receiving – The General Rule (c’t’d) For example, if a rule prohibits a lawyer from continuing to read a document once he/she has ascertained it is privileged, a lawyer may not continue to read metadata once he/she has ascertained it is privileged. 43 II(B). Receiving – The General Rule (c’t’d) Similarly, if a rule requires a lawyer who has received a privileged document to notify the sender, the same rule also requires the lawyer to notify the sender if she/he has received privileged metadata. 44 II(B). Receiving – Specific States’ Rules on Reading Metadata Prohibited • Lawyer examination of received ESI for metadata prohibited by: Alabama Arizona Florida Maine New Hampshire New York North Carolina 45 II(B). Receiving – Reading Metadata – Prohibited (c’t’d) "A lawyer may not make use of computer software applications to surreptitiously ‘get behind’ visible documents or to trace e-mail." • Conclusion, New York State Bar Association Opinion 749 (Dec. 14, 2001) 46 II(B). Receiving – Reading Metadata – Allowed Absent Actual Knowledge Lawyer examination of received ESI for metadata prohibited only if the receiving lawyer has actual knowledge that he/she has received confidential metadata through inadvertence: • Colorado • D.C. • West Virginia [should it be with the "prohibited" group?] 47 II(B). Receiving – Reading Metadata – Allowed Absent Knowledge (c’t’d) "[I]f a lawyer has received electronic documents and has actual knowledge that metadata was inadvertently sent, the receiving lawyer should not review the metadata before consulting with the sending lawyer to determine whether the metadata includes work-product or confidences." West Virginia State Bar Ethics Opinion L.E.O. 2009-01 (June 10, 2009) 48 II(B). Receiving – Reading Metadata – Allowed Absent Knowledge (c’t’d) But . . . "The [W. Va.] Board finds . . . there is a burden on a lawyer receiving inadvertently provided metadata to consult with the sender and abide by the sender's instructions before reviewing such metadata." Id. 49 II(B). Receiving – Reading Metadata – Case-by-Case Basis A lawyer must determine whether to use metadata on a case-by-case basis • Pennsylvania 50 II(B). Receiving – Reading Metadata – No Prohibition Generally no prohibition: • Maryland • Vermont • Minnesota (but a fact specific question) This is also the ABA’s position 51 II(B). Receiving – Reading Metadata – No Prohibition "Opinion 22 is not meant to suggest there is an ethical obligation on a receiving lawyer to look or not to look for metadata in an electronic document. Whether and when a lawyer may be advised to look or not to look for such metadata is a fact specific question beyond the scope of this Opinion." • Minn. # 22 52 II(B). Receiving – Reading Metadata – Broad Rule Consider the breadth of Maryland’s rule: • "Subject to any legal standards or requirements (case law, statutes, rules of procedure, administrative rules, etc.), . . . there is no ethical violation if the recipient attorney . . . reviews or makes use of the metadata without first ascertaining whether the sender intended to include such metadata." Maryland State Bar Association - Committee on Ethics, Ethics Docket No. 2007-09 53 II(B). Receiving – Reading Metadata – Other Jurisdictions Look for guidance to the jurisdiction’s rules regarding a lawyer’s duty on receipt of any confidential ESI and treat those rules as a minimum duty. No jurisdiction has a more lenient rule for confidential metadata than it does for other confidential ESI. 54 II(B). Receiving – Reading Metadata – Wrinkles One must carefully read any pertinent opinion for the particular application to one’s immediate circumstances. As noted above, some opinions presume that searching for metadata is, per se, searching for confidential information. • See, e.g., New York and Alabama. 55 II(B). Receiving – Reading Metadata – Wrinkles Other opinions, however, more precisely prohibit the lawyer from searching for confidential information in the metadata. • A “lawyer must refrain from searching for and using confidential information found in the metadata embedded in the document.” N.C. 2009 Formal Ethics Opinion 1 (emphasis added). A minimum rule of thumb is that one cannot go looking for metadata with a bad intent, i.e., to discover another’s confidences. 56 II(B). Receiving – Other Duties Upon Discovering Confidential Info. Most jurisdictions require the recipient to notify the sender when the recipient knows or should know he/she has received confidential metadata through inadvertence. Some also prohibit use of the received metadata until the matter is resolved between the parties or by a court. • ABA MRPC Rule 4.4(b) • Minn. # 22 57 II(B). Receiving (c’t’d) – Professional Judgment Even in those jurisdictions allowing free exploration of confidential metadata, the ABA comments: • “Where a lawyer is not required by applicable law to do so, the decision to voluntarily return such a document is a matter of professional judgment . . . .” ABA MRPC Rule 4.4 Comment [3]. 58 II(B). Receiving – Professional Judgment (c’t’d) Also ask in such circumstances: • What is required by the duty of diligent representation? • Should one consult with one’s client before returning a document? 59 II. C. Discovery is Different – Usually Quick Intro to Discoverability of Metadata in Client-Created eDocs: Inadvertent Disclosure Law Preservation/Spoliation Scope-of-Production stipulations/agreements For an overview of case-law re: metadata discoverability, see Appendix B, eDiscovery Slides 60 II. C. Discovery is Different – Usually A lawyer must ensure he/she does not produce confidential information to another not entitled to see it. A receiving lawyer, however, is generally allowed to search for and examine any produced metadata. 61 II(C). Discovery (c’t’d) – Basic Rule Same rule re producing metadata as re ESI generally Exercise reasonable care to prevent disclosure of confidential client information hidden in metadata. 62 II(C). Discovery (c’t’d) – Redact Responsive Confidential Info. If a document/ESI contains responsive confidential information, the producing lawyer must redact such information and detail the confidentiality claim on a privilege log. If a responsive document is otherwise not privileged while part of the metadata may be, the producing party must redact the privileged metadata and detail the claim on a privilege log. 63 II(C). Discovery – Redaction (c’t’d) Instances in which only part of the metadata is privileged. If other non-privileged metadata is responsive, such metadata must not be redacted. Other metadata, while not privileged, may be either non-responsive or of de minimis importance. 64 II(C). Discovery – Redaction (c’t’d) Depending at least in part on content of prior stipulation, if any, as to format(s)of-production (at CMC or later): • Appropriate, and perhaps necessary, to remove all non-responsive metadata. • Metadata integral to a document that is responsive, however, should probably be deemed responsive on that basis. • Metadata that evidences a document’s integrity generally should not be removed. 65 II(C). Discovery – Do Not Delete Responsive Metadata If one reasonably anticipates litigation, one must be very careful regarding routine deletion of certain metadata. For example, one must not delete tracked changes if the changes show contract negotiations between business people if the contract is the subject of likely litigation. Such deletion may be spoliation. 66 II(C). Discovery – Do Not Delete Responsive Metadata (c’t’d) “[A] lawyer must be careful in situations where electronic documents constitute tangible evidence. Rule 3.4(a) prohibits altering, destroying or concealing material having potential evidentiary value. . . .” “[R]emoval of metadata may be prohibited and must be produced when requested and not objected to. However, any metadata that is privileged can still be protected and exempt from discovery, upon proper assertion of a privilege.” W. Va. State Bar Ethics Op. L.E.O. 2009-01 (June 10, 2009) 67 II(C). Discovery – Do Not Delete Responsive Metadata (c’t’d) “Removing metadata from evidentiary documents in the context of litigation or in certain other circumstances may be impermissible or illegal.” Minn. # 22 68 II(C). Discovery – Metadata Receiving Side –Basic Rule Same as the case in which a lawyer has received any other type of ESI in discovery. Jurisdictions that prohibit the examination of metadata received outside the discovery context generally allow the examination of metadata embedded in ESI produced in discovery. Some opinions use overbroad language, but careful reading suggests broad rule against even searching for metadata inapplicable to ESI and metadata received in discovery. 69 II(C). Discovery Is Different . . . “Absent express authorization from a court, it is ethically impermissible for an attorney to mine metadata from an electronic document he or she inadvertently or improperly receives from another party.” Alabama State Bar Ethics Op. RO2007-02 (March 14, 2007) 70 II(C). Discovery Is Different . . . (c’t’d) But . . . “One possible exception to the prohibition against the mining of metadata involves electronic discovery. . . . [P]arties may be sanctioned for failing to provide metadata along with electronic discovery submissions. . . . [T]he mining of an email may be vital . . .. In Enron type litigation, the mining of metadata may be a valuable tool in tracking the history of accounting decisions and financial transactions.” • Id. 71 II(C). Discovery – Duty of Competence As part of a lawyer’s duty of competence (including diligence), a lawyer should examine all produced metadata to the same extent the lawyer would examine similar information in non-metadata ESI. A lawyer may also use metadata, for example, in “automatic” computer triaging a set of documents for further consideration, as the lawyer would be entitled to do with similar ESI. 72 II(C). Discovery – Receiving Side – Additional Action Required For each jurisdiction, in discovery, the action required of a lawyer who receives inadvertently produced confidential metadata is the same as the case in which he/she has received any other type of inadvertently produced confidential ESI. 73 II(C). Discovery – Receiving – Additional Action (c’t’d) Hence, if one has a duty to notify the producing lawyer if one has received any type of confidential information through inadvertence, the fact that the confidential information is metadata does not change the duty. 74 II(C). Discovery – Receiving – Additional Action (c’t’d) N.B. Typical procedural rules, including the F.R.C.P., only require the receiving lawyer to act after notice from the producing lawyer. “A lawyer may be subject to a number of obligations other than those provided by the MRPC in connection with the transmission and receipt of metadata, including obligations under the Federal Rules of Civil Procedure and the Minnesota Rules of Civil Procedure.” Minn. # 22 75 Conclusion/ Questions One last scary thought: “alternate data streams (ADS)” See, e.g., <informit.com/articles/article.aspx?p=413685> Robert D. Brownstone William E. Hoffman Fenwick & West LLP Will Hoffman Document/ESI Specialist <[email protected]> <[email protected] > <fenwick.com/attorneys/4.2.1.asp?aid=544> <willhoffman.com/willbio.aspx> 76 Appendix A – Robert D. Brownstone, Esq. – Metadata & Electronic Redaction – Supplemental Bibliography (7/27/10) A. Articles as to Microsoft Office Deficiencies 1. NSA, Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF (3/18/08) <http://www.nsa.gov/ia/ files/support/I733-028R-2008.pdf>. See also older version (2/2/06) <www.fas.org/sgp/othergov/dod/nsa-redact.pdf> 2. Appligent, Correcting the Record: A Response to Redacting with Confidence (Feb. 2, 2006) <web.archive.org/ web/20070324173116/http://www.aiimexpo.com/exbdata/2834/brochures/Correcting the record.pdf> 3. Randall Farrar, 10 Reasons Why Microsoft Office’s Document Inspector is Not an Enterprise Metadata Management Tool, Esquire Innovations, Inc. (Sep. 24, 2008) <http://randallfarrar.com/?p=34#/cat=1> B. Public Records Decisions (some; there are MANY more on privacy, back-ups, etc.) • Irwin v. Onondaga County Resource Recovery Agency, 72 A.D. 3d 314, 895 N.Y.S. 2d 262 (4th Dep’t Feb. 11, 2010) (ordering system metadata to be included in response to FOIL request for electronic photographs) <http://www.nycourts.gov/ad4/court/Decisions/2010/02-11-10/PDF/1420.pdf> • Lake v. City of Phoenix (“Lake II”), 2009 Ariz. LEXIS 257 (Oct. 20, 2009) (“if a public entity maintains a public record in an electronic format, then the electronic version, including any embedded metadata, is subject to disclosure under our public records laws”) <www.supreme.state.az.us/opin/pdf2009/CV090036PR.pdf> • O'Neill v. City of Shoreline, 145 Wash. App. 913, 187 P.3d 822 (July 21, 2008) (“metadata associated with the e-mail . . . discussed at [the relevant] meeting, or some portion of it, is . . . a public record[; w]e do not rule on the more general question whether e-mail or metadata . . . transmitted to personal e-mail accounts, without more, is” a public record) <mrsc.org/mc/courts/appellate/145wnapp/145wnapp0913.htm>, review granted, 208 P.3d 554 (Wash. Apr. 28, 2009) • Burnett v. County of Bergen, 198 N.J. 408, 968 A.2d 1151 (Apr. 27, 2009) (requiring requestor to pay costs of redacting Social Security Numbers – from land title records) <http://lawlibrary.rutgers.edu/courts/supreme/a-43-08.doc.html> • Wiredata, Inc. v. Village of Sussex, 298 Wis. 2d 743, 729 N.W.2d 757 (Ct. App. Jan. 3, 2007) (finding violation of open records law via disclosure of .pdf image files instead of provision of database access) <http://www.wicourts.gov/ca/opinion/DisplayDocument.pdf?content=pdf&seqNo=27629> C. Presentations by Brownstone 1. - 9. NCC national broadcasts/webinars – 4/10; 8/09; 3/09; 9/08; 5/08; 2/08; 10/07; 4/07 & 11/06 10. Rossdale Group & Miami Legal Resources national broadcast co-presenter – 3/10 11. - 13. Lorman Education Services nationally broadcast webinars – 2/10; 8/09; and 2/09 14. - 25. Strafford Publications national broadcast co-presenter – 12/09; 5/09; 10/08; 5/08; 12/07; 9/07; 3/07; 11/06; 3/06; 12/05; 9/05 and 7/05 26. - 27. Legal Services Corporation (LSC) conferences – 10/09 (St. Louis); 9/08 (San Antonio) 28. San Diego Cty. Bar Ass’n webinar – 6/09 29. - 30. Blue Cross Blue Shield Ass’n Attys. – webinar (7/08) & conf. (5/08, Glendale, AZ) 31. California State Bar Annual Meeting – 9/07 (Anaheim, CA) 32. Santa Clara County Bar Association (SCCBA) panel – 9/07 (San Jose, CA) A-1 Appendix A – Robert D. Brownstone, Esq. – Metadata & Electronic Redaction – Supplemental Bibliography (7/27/10) D. Publications by Brownstone 1. Robert D. Brownstone, Electronic Redaction– Be a Do-Bee, not a Don't-Bee, Cal. State Bar Sections E-NEWS (Mar. 30, 2010) (copy available from author) 2. Robert D. Brownstone, eFiling: Conversions, Redactions and Uploads, Oh My!, 30 The Bottom Line No. 5, at 3-8 (Oct. 2009), <www.calbar.org/members only/lpmt/pdfs/the-bottom-line 2009 vol-30 no-5.pdf#page=3> (Cal. State Bar LPMT Section membership may be required to use URL; or available from author) 3. Robert D. Brownstone, Cal. Guide to Opening & Managing a Law Office, Ch. 6, Technology, Cal. State Bar (2009): Computer Security, Privacy & Ethics Concerns, pp. 268-90 (co-author); eFiling, pp. 291309, purchase at <http://sections.calbar.ca.gov/About/SectionsBookstore.aspx> 4. Robert D. Brownstone, Metadata: To Scrub or Not To Scrub; That is the Ethical Question, Cal. B.J. (Feb. 2008) <http://apps.calbar.ca.gov/mcleselfstudy/mcle home.aspx?testID=27> 5. Robert D. Brownstone and Gideon Grunfeld, Saying Goodbye Just Got More Expensive; Complying With New Ethics Opinion Regarding Returning Electronic Data to Client at End of Representation, 29 The Bottom Line, No. 2 (Feb. 2008) <http://lawfirmdevelopment.com/newsite/wpcontent/uploads/2009/01/complying-with-coprac-decision.pdf> 6. Robert D. Brownstone, Todd R. Gregorian and Michael A. Sands, Secrets Easily Leaked by Friend or Foe In Publicly Filed .PDF Documents, 13 No. 1 Cyberspace Lawyer 1 (West Jan./Feb. 2008) (co-author) (longer version of Exposing Redaction below), available upon request from the authors or by subscription at <http://west.thomson.com/store/product.aspx?r=127062&product id=37005132> 7. Robert D. Brownstone, Todd R. Gregorian and Michael A. Sands, Exposing Redaction, L.A.D.J. & S.F.D.J. (Oct. 15, 2007), available at <http://www.fenwick.com/docstore/Publications/IP/IP bulletins/IP Bulletin Fall 2007.pdf> 8. Robert D. Brownstone, Redaction Reaction; Do’s and Don’ts, 28 The Bottom Line, No. 3, at 7, 24 (June 2007) <http://members.calbar.ca.gov/sections/lpmt/bottomline/pdfs/the-bottom-line 2007 vol-28 no3.pdf#page=7> (Cal. State Bar LPMT membership required to use URL; available from author) 9. Robert D. Brownstone, Preserve or Perish; Destroy or Drown – eDiscovery Morphs Into EIM, 8 N.C.J. L. & Tech. (N.C. JOLT), No. 1, at 1, 2, 9-11, 42, 44-50, 53, 57 (Fall 2006) <http://jolt.unc.edu/sites/default/files/8 nc jl tech 1.pdf> 10. Robert D. Brownstone, The Complexity of Metadata, EDRM (May 2006) <http://Metadata-EDRM.notlong.com> 11. Robert D. Brownstone, Collaborative Navigation of the Stormy e-Discovery Seas, 10 Rich. J.L. & Tech. 53, (2004) <http://law.richmond.edu/jolt/v10i5/article53.pdf>, at 1, 2, 8, 12, 20. 12. Lisa M. Arent, Robert D. Brownstone and William A. Fenwick, EDiscovery: Preserving, Requesting & Producing Electronic Information, 19 Santa Clara Computer & High Tech. L.J. 131 (2002) <http://www.fenwick.com/docstore/publications/Litigation/ediscovery.pdf>, at 3, 14 (.pdf pp. 17, 28) Full Brownstone Bio & Bibliography available at <fenwick.com/attorneys/4.2.1.asp?aid=544> A-2 Strafford August 5, 2010 Appendix B Metadata – Bonus Slides – eDiscovery Producibility & Privilege Claw-backs Robert D. Brownstone, Esq. THESE MATERIALS ARE MEANT TO ASSIST IN A GENERAL UNDERSTANDING OF CURRENT LAW AND PRACTICES. THEY ARE NOT TO BE REGARDED AS LEGAL ADVICE. THOSE WITH PARTICULAR QUESTIONS SHOULD SEEK ADVICE OF COUNSEL. Fenwick & West LLP Silicon Valley Center 801 California Street Mountain View, CA 94041 Phone: 650.988.8500 www.fenwick.com © B-1 eDiscovery of Client-Created Docs. – Metadata Disclosed EIM GROUP A. Discoverability of Metadata The Discovery Context – Overview Preservation/Spoliation Inadvertent disclosure law Scope-of-Production © stipulations/agreements B-2 A. Discoverability (c’t’d) – Prior Case Law When needed/relevant: EIM GROUP Ex: definitive eEvidence regarding alleged fabrication or back-dating Munshani v. Signal Lake Venture Fund II, 2001 Mass. Super. LEXIS 496 (10/9/01) <www.signallake.com/litigation/ma order munhshani.pdf>, aff’d, 2004 Mass. App. LEXIS 323 (3/26/04) <www.signallake.com/litigation/Dismissal-of-Munshani-Appeal.pdf> Premier Homes & Land v. Cheswell, Inc., 240 F. Supp. 2d 97 (D. Mass. 2002) <http://pacer.mad.uscourts.gov/dc/opinions/neiman /pdf/premierhomes%2012%2002.pdf> See also In re Pemstar, Inc. Secs. Litig., Civ. No. 02-1821 (D. Minn. 4/23/04) © B-3 A. Discoverability (c’t’d) – Prior Case Law (c’t’d) More recent trend, e.g. in patent cases . . . if particularized need shown . . . EIM GROUP Nova Measuring Instrs. v. Nanometrics, 417 F. Supp. 2d 1121 (N.D. Cal. 3/23/06) <http://Nova-Nanometrics.notlong.com> (Westlaw password needed) Hagenbuch v. 3B6 Sistemi Elettronici Industriali S.R.I., 2006 U.S. Dist. LEXIS 10838, 2006 WL 665005 (N.D. Ill. 3/8/06) (free via PACER) © <https://ecf.ilnd.uscourts.gov/cgibin/show case doc?99,147207,,,,,7676829> B-4 A. Discoverability FRCP = Vague (c’t’d) – FRCP Committee, in deliberating re: 12/1/06 “not reasonably EIM GROUP accessible” change to 26(b)(2)(B) did not resolve metadata issue As of 12/1/06, new FRCP 34(b) for © RFP’s – and new 45(d)(1) re: subpoenas non-conclusive but do enable requestor to ID desired format B-5 A. Discoverability (c’t’d) – FRCP’s impacts FRCP 34 & FRCP 45 DO enable requestor to specify desired format EIM GROUP © Michigan First Credit Union v. Cumis Ins. Society, 2007 WL 4098213 (E.D. Mich. 11/16/07) (.pdf and paper sufficient; no request – or need – for native, let alone with metadata intact) <http://MFCU-CIS-EDMich-11-16-07.notlong.com> IF NOT specified, then what, under FRCP 34 & 45 ? “. . . ordinarily maintained . . .” OR “ . . . reasonably useable . . .” Same: CCP §§ § 2031.280(d) (parties) and 1985.8(c)(1) (non-parties) B-6 A. Discoverability (c’t’d) – FRCP’s impacts Sedona Principles: EIM GROUP Pre-12/1/06: absent materiality, presumption against production Post-12/1/06: “taking into account the need to produce reasonably accessible metadata that will enable the receiving party © to have the same ability . . .” B-7 A. Discoverability Later Cases (c’t’d) – One Pre-12/1/06 FRCP Decision: "AS EIM GROUP MAINTAINED IN ORDINARY COURSE OF BUSINESS" = "METADATA INTACT" • absent timely objection or contrary stipulation • once parties had agreed to “native” production of Excel files late in case Williams v. Sprint/United Mgmt., 230 F.R.D. 640 (D. Kan. 9/29/05) © (analyzing 12/1/06 version of FRCP; contrasting FRCP 26(b)(2)(B)) <http://Williams-9-29-05.notlong.com> (free via PACER) B-8 A. Discoverability Williams (c’t’d) – Williams FACTS EIM GROUP (c’t’d) Day 1 allegation: Δ re-worked pools to improve distribution to pass adverse-impact analysis No prior stip re: scrubbing metadata from, or locking cells/data in, Excel spreadsheets © Age discrimination (R.I.F.) case B-9 A. Discoverability Williams (c’t’d) – Williams HELD EIM GROUP (c’t’d) Spectrum of word-processing files to spreadsheets to databases Presumption that metadata to be produced even if not requested specifically in RFP Contrast post-12/1/06 FRCP 26(b)(2)(B) © Up to producing party to object; no unilateral action allowed here B-10 A. Discoverability (c’t’d) – Post-12/1/06 Cases Need to Show Need © EIM GROUP “follow[ing] general presumption against metadata production” “[h]owever, if cause is shown (e.g., metadata associated with a spreadsheet), Plaintiffs may file another motion to compel production, to the extent that the meet and confer process does not yield a resolution to the issue” Repligen v. Bristol-Myers Squibb, No. 06-004 (TJW), Order, at 2 (E. D. Texas 1/12/07) <https://ecf.txed.uscourts.gov/cgibin/show case doc?54,94380,,,,,182,1> B-11 A. Discoverability (c’t’d) – Post-12/1/06 Cases NO “DO-OVERS” See In re Payment Card Interchange Fee EIM GROUP & Merchant Discount Antitrust Litig., 2007 U.S. Dist. LEXIS 2650 (E.D.N.Y. 1/12/07) <http://Payment-Card-Antitrust-1-12-07.notlong.com> declining to order second/native production of data already produced via scanning-plus-OCR but distinguishing prospective productions See also Covad Commc'ns Co. v. Revonet, Inc., 267 F.R.D. 14 (D.D.C. Mar. 31, 2010) <https://ecf.dcd.uscourts.gov/cgi- © bin/show public doc?2006cv1892-171> B-12 A. Discoverability (c’t’d) – No “Do-overs” (c’t’d) Ky. Speedway v. NASCAR, 2006 U.S. Dist. LEXIS 92028 (E.D. Ky. 12/18/06) EIM GROUP relying on 12/1/06 FRCP amendments as basis for refusing to order Δ to produce metadata for documents already produced <https://ecf.kyed.uscourts.gov/cgi-bin/show case doc?147,46018,,,,,576,1> Williams v. Sprint, 2006 WL 3691604 (D. Kan. 12/12/06) increased time and effort required for hardcopy review insufficient to justify re-production in native format <http://Williams-12-12-06.notlong.com> © Wyeth v. Impax Labs., 2006 WL 3091331 (D. Del. 10/26/06) Δ had moved to compel native production with complete metadata under Del.’s Default Standard, upholding prior TIFF production because: no agreement otherwise; and no showing of particularized need for native <http://Wyeth-Impax-10-26-06.notlong.com> B-13 A. Discoverability (c’t’d) – More Post-12/1/06 Some “Native” Decisions . . . EIM GROUP © Aguilar v. U.S. ICE Div., 2008 WL 5062700 (S.D.N.Y. 11/21/08) White v. Graceland College Center for Prof’l Dev. & Lifelong Learning, Inc., 2008 U.S. Dist. LEXIS 63088 (D. Kan. 8/7/08) Autotech Techs. Ltd. P’ship v. Automationdirect.com, 248 F.R.D. 556 (N.D. Ill. 4/2/08) D'Onofrio v. SFX Sports Group, Inc., 247 F.R.D. 43 (D.D.C. 1/23/08) Peacock v. Merrill, 2008 WL 176375 (S.D. Ala. 1/17/08) Ryan v. Gifford, 2007 Del. Ch. LEXIS 168 (Del. Ch. 11/30/07) Celerity, Inc. v. Ultra Clean Holding, Inc., 476 F. Supp. 2d 1159 (N.D. Cal. 2/28/07) B-14 A. Discoverability (c’t’d) – Some 2009-10 Decisions Irwin v. Onondaga County Resource Recovery Agency, 72 A.D. 3d 314, 895 N.Y.S. 2d 262 (4th Dep’t 2/11/10) <nycourts.gov/ad4/court/Decisions/2010/02-11-10/PDF/1420.pdf> EIM GROUP See also ARMA, Court Orders Production of Electronically Stored Photos, Associated Metadata, Newswire (4/28/10) <http://www.arma.org/news/enewsletters/index.cfm?ID=4273> Lake v. City of Phoenix (“Lake II”), 2009 Ariz. LEXIS 257 (Ariz. 10/29/09) <www.supreme.state.az.us/opin/pdf2009/CV090036PR.pdf> FSP Stallion 1 LLC v. Luce, 2009 U.S. Dist. LEXIS 68460 (D. Nev. 7/21/09) (in part, apparently ordering reproduction of docs. exchanged via initial disclosure) <https://ecf.nvd.uscourts.gov/doc1/11512112850> © Dahl v. Bain Capital Partners, LLC, 2009 U.S. Dist. LEXIS 2551 (D. Mass. 6/22/09) (“[r]ather than a sweeping request for metadata, the [requesting parties” should tailor their requests”) <https://ecf.mad.uscourts.gov/doc1/09503189087> B-15 A. Discoverability (c’t’d) – Case Law Developing TO LEARN MORE EIM GROUP <applieddiscovery.com/ws display.asp?filter= Native%20Production%20Required> <www.krollontrack.com/case-summaries/> <https://extranet1.klgates.com/ediscovery/> NOTE Each of those sites offers a free e-newsletter © B-16 eDiscovery/Metadata (c’t’d) – B. Inadvertent Disclosure Clawbacks 1. Claw-Back Procedure in FRCP as of 12/1/06 ESI-Driven Goals of 12/1/06 FRCP Amendments: EIM GROUP 26(b)(5)(B) – “[D]oes not address the substantive questions whether privilege or work product protection . . . waived or forfeited. Instead . . . sets up a procedure to allow the responding party to assert a claim of privilege or of work-product protection after production.” Rules Report at App. C-54 <uscourts.gov/uscourts/RulesAndPolicies/rules/Reports/ST092005.pdf#page=139> 45(d)(2)(B) – same for non-party subpoenas Id. at App. C-91 <uscourts.gov/uscourts/RulesAndPolicies/rules/Reports/ST092005.pdf#page=176> © • 26(b)(5)(B) itself <uscourts.gov/uscourts/RulesAndPolicies/rules/EDiscovery w Notes.pdf#page=9>, at 9-10 • STATE ANALOGUES AS WELL B-17 B(1). FRCP Claw-Back Procedure (c’t’d) Pre-FRCP-Amendment Grimm Warnings: EIM GROUP UNLESS IN SCHEDULING or PROTECTIVE ORDER, non-waiver stipulation (clawback or quick peek) risky & maybe not enforceable states’ laws and circuits’ views differ subject-matter and “selective” waivers Hopson v. Mayor and City Council of Baltimore, 232 F.R.D. 228 (D. Md. Nov. 22, 2005) © <www.doar.com/apps/uploads/literature33 Hopson v.Baltimore City.pdf> B-18 B. 2. F.R.E. 502 – Substantive EIM GROUP Goals = Gap-Filling & Protection To address some of those Grimmtype concerns, F.R.E. 502 became law on September 19, 2008 Cf. Proposed Wash. R. Evid. 502 <www.wsba.org/lawyers/groups/courtrules/october192009cou rtrulesproceduresmeetingmaterials.pdf>, at 24-28 Comment period expired 4/30/10 Highlights: “middle ground” approach <uscourts.gov/uscourts/RulesAndPolicies/rules/Reports/EV052006.pdf#page=12> © Rejected strict-liability approach, i.e., inadvertent disclosure CANNOT BE automatic subject-matter waiver B-19 B. 2. FRE 502 (c’t’d) – Elements FRE 502(b) Waiver Determination Elements EIM GROUP Inadvertent disclosure. When made in a Federal proceeding or to a Federal office or agency, the disclosure does not operate as a waiver in a Federal or State proceeding if: (1) disclosure is inadvertent (begs the question?!) (2) holder of privilege or protection took reasonable steps to prevent disclosure; and (3) holder promptly took reasonable steps to rectify the error, including (if applicable) following FRCP 26(b)(5)(B) © B-20 (B)(2). FRE 502 (c’t’d) – Estoppel EIM GROUP No-Waiver Finding Collaterally Estops Future Waiver Contentions Applies to both future state and federal proceedings Applies to non-parties to case # 1 IF stip. in a court order Does Congress have authority to bind state court proceedings in this way? © Due-process challenge possible . . . <law.wlu.edu/deptimages/Law%20Review/66-2Noyes.pdf> B-21 (B)(2). FRE 502 (c’t’d) – Practical Tips EIM GROUP Three ways to exert best efforts to try to avoid a waiver finding: Stipulated Protective Orders QC/QA Claw-Backs For analysis and sample stips, see: © Moore, Allan B. et al., ‘Oops, I Want That Back:’ Clawing Back Privileged Documents And New Federal Rule Of Evidence 502, 23 MEALEY’S LITIGATION REPORT: Ins., #20 (3/26/09) (available on LEXIS) Gregory P. Joseph, The Impact of Rule 502(d) on Protective Orders, Nat’l L.J. (11/17/08) B-22 (B)(2). FRE 502 (c’t’d) – “Selective Waiver” Rules Committee: EIM GROUP Initially added in something on it but then pulled it out Punted but then did sent Congress a draft provision See pp. 65-69 of <uscourts.gov/uscourts/RulesAndPolicies/rules/ Reports/EV05-2007.pdf#page=65> Congress: © Did not address the issue Did not add “selective waiver” provision before adopting 502 But HR 4326 now pending B-23 Conclusion/ Questions Q+A – Robert D. Brownstone <www.fenwick.com/attorneys/4.2.1.asp?aid=544> 650.335.7912 or <[email protected]> Please visit F&W EIM <www.fenwick.com/services/2.23.0.asp?s=1055> <www.fenwick.com/services/2.23.4.asp?s=1055> © EIM GROUP B-24
© Copyright 2026 Paperzz