Vision Point of Sale, Inc. v. Haas
Vision Point of Sale, Inc. v. Haas
2004 WL 5326424 (Ill. Cir. 2004)
September 27, 2004
Summary
The court ordered Legacy to obtain new computers and for VPOS' experts to observe the copying and transfer of files to determine if any VPOS data was present. The court also determined that Legacy must bear the costs of implementing the injunction, including the reasonable charges of VPOS' experts, and that the cost of VPOS' discovery of the “old” Legacy computers would be split 75%/25%. This case highlights the differences between paper-discovery and e-discovery, and the need to take into account the cost of retrieving ESI when determining who should bear the cost of discovery.
VISION POINT OF SALE, INC., Plaintiff,
v.
Ginger HAAS and Legacy Inc., Defendants
v.
Ginger HAAS and Legacy Inc., Defendants
No. 04 CH 2387
Circuit Court of Illinois, County Department, Chancery Division. Cook County
Signed September 27, 2004
Per Curiam
Order
This cause comes before the Court on plaintiff's Renewed Motion to Compel Inspection. After reviewing the parties' motion papers, the Court conducted an evidentiary hearing concerning the various proposals for inspection of the computers located on the premises of defendant Legacy. The Court has heard argument from counsel.
THE COURT FINDS AND CONCLUDES:
Background
A. Plaintiff VPOS and defendant Legacy both deal in used computer equipment for “POS” (point of sale) computer systems, such as cash registers and terminals linked to a central processing facility. VPOS asserts that success in that market depends on in-depth knowledge concerning both the businesses from which VPOS and Legacy acquire used equipment for resale, and the businesses to which VPOS and Legacy resell.
B. In July 2003, defendant Haas left VPOS for a job with Legacy. Months later, VPOS filed this suit, complaining of defendants' alleged taking and use of VPOS' proprietary information. Legacy does not seriously dispute that some information from VPOS' computer system was copied and installed on one or more of Legacy's computers. After an evidentiary hearing, on May 13, 2004 the Court granted VPOS a preliminary injunction, ordering Legacy to purge from its computer system all information obtained from VPOS. Legacy itself says it does not want to keep that information. But the purging has not yet been done, due largely to VPOS.' desire to keep Legacy's system intact for purposes of discovery.
C. VPOS has tendered two proposals for “inspection” (i.e., forensic discovery) of Legacy's system. Neither addresses at all implementing the preliminary injunction. In contrast, Legacy's counterproposal focuses on purging VPOS information, without really addressing the discovery issues. The cost of VPOS' proposed inspection heightens the parties' dispute. Based on the testimony that Legacy has approximately 30 computers:
• VPOS' expert, who prepared the proposals, estimated that effecting VPOS' Proposal No. 1 for 30 computers would probably cost $60,000; it might, depending on the time involved, cost as much as $150,000. These amounts are only for the experts' work; they do not include Legacy downtime or other ancillary costs.
• VPOS' Proposal No. 2 will probably cost roughly the same as Proposal No. 1. The major difference is that Proposal No. 2 would move some of the file examination offsite. That might lessen Legacy downtime; on the other hand, the initial onsite copying process entailed by Proposal No. 2 will require considerably more time than under Proposal No. 1.
D. If adopted, Legacy's counterproposal will arguably lessen the amount of data which must be examined. It will, however, entail replacing all of Legacy's computers. But Legacy's approach is aimed at purging data, not at forensic discovery. See Defts' Mem. in Opp. to Pltff's Renewed Mtn. to Compel Inspection (8/12/04) (hereafter “Legacy Mem.”), at 11. Replacing Legacy's computers does not fully address the discovery issue, and may not fully address the injunctive issue:
• As to discovery, VPOS wants to examine (and, in effect, mine information from) Legacy's system before any purging occurs. Examining post-data-transfer new computers is largely useless for that purpose. In theory, examining the old computers after data has been copied and transferred to new computers is also less than ideal; the possibility of tampering during the transfer process exists.
• As to implementing the injunction Order, VPOS' expert testified that Legacy's proposal would not guarantee that no VPOS information made its way to the new computers, “even if we were watching them do it.” On the other hand, VPOS' expert may have told Legacy personnel that “that'll work” when the idea was originally suggested. Also, VPOS' emphasis on the difficulty of being certain that data has been wholly deleted from a computer, tends to support Legacy's argument that new computers would be a better (even if not perfect) verification technique.
E. One may assume (though there is no specific evidence) that Legacy's computers could be replaced at an average cost of $1,000 each. But as Legacy concedes, VPOS' experts will need to have an oversight role in the data-transfer process. Thus, it is unclear whether Legacy's proposal will ultimately cost significantly less than the $60,000 projected for VPOS' Proposal No. 1.
F. What is the appropriate scope of electronic discovery (“e-discovery”) here? What level of verification is called for in connection with Legacy's purging its system of VPOS data? Who should pay what part of the discovery and verification costs (which may overlap)?
Discussion
G. “Electronic documents are no less subject to [discovery] disclosure than paper records.” Rowe Entertainment, Inc. v. William Morris Agency, Inc., 205 F.R.D. 421,428 (S.D.N.Y. 2002), citing cases. But the analogy to paper discovery breaks down quickly. For example:
• Paper discovery does not ordinarily extend to “dumpster diving” (as one writer puts it, see Rowe, supra, 205 F.R.D. at 431); but most cases hold that “deleted computer files, whether they be e-mails or otherwise, are discoverable.” Antioch Co. v. Scrapbook Borders, Inc., 210 F.R.D. 645, 652 (D. Minn. 2003).
• Paper discovery is not ordinarily conducted by third-party document retrieval experts. But because of its potentially huge volume and how it is stored, e-discovery may require not just experts, but expensive hardware and software.
• Paper discovery of a business does not ordinarily extend to workers' personal files, or to their homes. But because of the way electronic “documents” are kept, e-discovery often turns up highly personal information,[1] and because of the ease with which large volumes can be transported, one can argue that e-discovery limited to workplace computers is incomplete.
H. There are few cut-and-dried rules in this developing area. The parties have not provided much authority. The Court has found helpful Rowe, supra;THE SEDONA PRINCIPLES: BEST PRACTICES RECOMMENDATIONS & PRINCIPLES FOR ADDRESSING ELECTRONIC DOCUMENT PRODUCTION (2004) (hereafter “Sedona Principles”), a thoughtful and thorough examination; and several of Judge Sheindlin's Zubulake opinions, in particular Zubulake v. UBS Warburg LLC, 217 F.R.D. 309 (S.D.N.Y. 2003) (Zubulake I), and Zubulake v. UBS Warburg LLC, 216 F.R.D. 280 (S.D.N.Y. 2003) (Zubulake II).
I. F.R.Civ.P. 26(b)(2)'s “proportionality test,” see Zubulake I, 217 F.R.D. at 316 -- a principle similarly, if more tersely, embodied in Illinois Supreme Court Rules 201(c)(1) and 218(a)(5) -- applies to e-discovery. Just as the Internet has raised privacy concerns about government records by eliminating the physical “inconvenience factor” which served to lessen casual snooping, so electronic document storage and retrieval has expanded the volume of a business' stored documents, while reducing the extent to which time and physical inconvenience impose practical limits on discovery overreaching. But electronic information is often retained “not because it is expected to be used,” but rather because “the costs of storage are virtually nil” and thus “there is no compelling reason to discard it.” Rowe, supra, 205 F.R.D. at 429. It may make little sense to spend a lot of money uncovering data which is kept only because throwing it out is too much trouble.
J. Thus, expensive e-discovery processes should not blindly be invoked just because they are technically feasible. Here as with paper discovery, some functional level of trust is necessary to the system's efficient functioning. In paper discovery, for example, we do not routinely assume that a party's document production is incomplete; rather, we accept the party's completeness affidavit under Supreme Court Rule 214, relying on professional obligations and the requirement of supplementation (and, ultimately, the specter of sanctions) to deal with inadvertent omissions. VPOS' experts' proposed inspection protocol seems, in contrast, to assume that Legacy will attempt to conceal information, whether by deletion or by transfer to a different (perhaps offsite) repository.
K. The functional trust issue here is controverted. In addition to the disputes over Ms. Newmes' testimony, the preliminary injunction hearing record raises the possibility that both Mr. Floro and Mr. Krizka had VPOS computer information during their employment by Legacy. Though there is no actual evidence of spoliation, the unexplained circumstances surrounding Mr. Floro's testimony make it difficult to say that VPOS' concern is altogether unfounded.
L. On the other hand, Legacy will stipulate “that at least some of Vision's business information was, at some point, on Legacy's computer system.” Legacy Mem. at 11. No one has suggested that the information was obtained much before or after July 2003. Nevertheless, the parties vehemently disagree about exactly what happened. The issue has more than academic importance, given, inter alia, Legacy's claim that VPOS manufactured evidence via Ms. Newmes.
M. Like deleted documents, the availability of electronic metadata goes beyond the equivalent range of normal paper discovery. Ordinarily, neither metadata nor deleted documents should fall within the ambit of e-discovery. See Sedona Principles, supra, Principles 9, 12, at pages 34-35, 41. As suggested by Id., Comment 9.b, Illus. ii, and paragraphs K and L above, however, this case falls outside the ordinary range. In this case, both metadata and deleted documents (or the absence of deleted documents) may bear significantly on both sides' credibility.
N. Deleting a document does not necessarily make accessing it impossible, or even inconvenient. See, e.g., Zubulake II, supra (backup tapes); Rowe, supra (backup tapes and hard drives). “[M]ost computer systems will have a plethora of data that could be ‘mined.’ ” Sedona Principles, supra,Comment 9.b. The preceding discussion focused on “mining” by VPOS. Here, the focus shifts to potential future “mining” by Legacy, in a hypothetical attempt to comply with the Court's injunction Order without actually depriving itself of the deleted material.
O. It is easy enough to delete VPOS material from Legacy's computers, as the Court's injunction requires. The difficulty lies in verifying that the deletion was done, and cannot later be undone. VPOS' expert suggests that if Legacy merely purges data from its existing computers, verification is all but impossible, because of the theoretical possibility of recovering “deleted” data. Further, purging the compiled, readily accessible forms of VPOS' material may not reach stray bits of data on one or more computers. Finally, VPOS' expert suggests that Legacy might secrete VPOS information on portable media, re-installing it after any verification process has been completed.
P. These considerations favor Legacy's proposal to copy Legacy files, net of VPOS data, to new computers. That approach has the added benefit of leaving the old computers intact for forensic e-discovery. Despite the theoretical possibility of skulduggery during the transfer process, common sense and “proportionality” caution against verification overkill. Significantly, the VPOS information on Legacy's computers is now over a year old. Its usefulness degrades over time.
Q. The Court concludes that an appropriate process is as follows:
(1) Legacy will obtain new computers of its choice. Legacy will determine which files (other than identifiable VPOS files) will be transferred to the new computers. Legacy will advise VPOS' experts of how the copying and transfer will be effected. VPOS' experts will observe the copying and transfer.
(2) After the transfer, the old computers will be stored at a place of the parties' choosing. They will remain available for forensic discovery pendente lite. As to the new computers:
(b) One, three, and six months after the transfer, VPOS' experts will examine the new computers for any then-present or deleted assemblage (as opposed to stray remnants) of VPOS data:
R. As shown by the differing approaches of Magistrate Judge Francis in Rowe, supra, arid District Judge Sheindlin in Zubulake, supra, there is still room for debate about how to allocate the costs of e-discovery. Here again the paper discovery analogy breaks down. For example, in paper discovery the respondent typically pays the cost of seeking out the responsive information or documents. But in paper discovery that is often a “soft” labor cost; in e-discovery it is typically a cash outlay to a third-party expert. In paper discovery, the requester pays for “inspection and copying” of documents; but those costs may be hard to disaggregate in e-discovery.
S. Even though costs are not wholly one-sided in paper discovery, see paragraph R supra, “cost-shifting” in the e-discovery context usually means “forcing the requesting party, rather than the answering party, to bear the cost of discovery.” Zubulake I, supra, 217 F.R.D. at 316. In Rowe, supra,Magistrate Judge Francis articulated a “balancing approach” for determining whether, and how far, to shift costs, using an eight-factor analysis (Rowe, supra, 205 F.R.D. at 429):
“... (1) the specificity of the discovery requests; (2) the likelihood of discovering critical information; (3) the availability of such information from other sources; (4) the purposes for which the responding party maintains the requested data; (5) the relative benefit to the parties of obtaining the information; (6) the total cost associated with production; (7) the relative ability of each party to control costs and its incentive to do so; and (8) the resources available to each party.”
T. Judge Sheindlin acknowledges that Judge Francis' eight-factor cost-shifting test in Rowe has been “[b]y far, the most influential response to the problem of cost-shifting relating to [e-] discovery,” Zubulake I, supra, 217 F.R.D. at 316 -- indeed, “the gold standard,” Id. at 320. But she suggests that “there is little doubt that the Rowe factors will generally favor cost-shifting.” Id.[3] She disagrees, because she prefers a “presumption that the responding party pays.” Id.; see generally Id. at 321 ff. This Court is not persuaded that such a presumption is necessarily appropriate. It is drawn from the realm of paper discovery, which is a doubtful and sometimes false analogy. It assumes a priori that the party who wants information should be able to make the other party pay the cost of providing it -- a view which forgets that in the interest of “full disclosure” (see SCR 201(b)(1)) we often authorize discovery of marginal relevance, if not indeed “fishing expeditions.”[4] Further, it fails to take account of the difference between paper-discovery “soft” labor costs and e-discovery “hard” dollar costs for retrieval of the more recondite forms of stored data.
U. The Sedona Principles suggest a sensible pragmatic balance between the Rowe and Zubulake approaches. See Sedona Principles, supra, Principle 13:
“Absent a specific objection, agreement of the parties or order of the court, the reasonable costs of retrieving and reviewing electronic information should be borne by the responding party unless the information sought is not reasonably available to the responding party in the ordinary course of business. If the data or formatting of the information sought is not reasonably available to the responding party in the ordinary course of business, then, absent special circumstances, the costs of retrieving and reviewing such electronic information should be shifted to the requesting party.”
V. Here, that “reasonably available in the ordinary course” demarcation must be viewed in light of three further, partially conflicting considerations:
• VPOS' stated position in this case is that it “is entitled to discover every single document Legacy has relating to all of its customers.” Plaintiff's Reply in Support of Motion to Compel Discovery, 8/31/04; at 5. As will be seen from the Order entered this date on VPOS' Supplemental Requests for Production, the Court takes a narrower approach. See also Sedona Principles, supra, Comment 13.b: “Cost-shifting cannot replace reasonable limits on the scope of discovery.” Nevertheless, it is pertinent to observe that “[w]here a party multiplies litigation costs by seeking expansive rather than targeted discovery, that party should bear the expense,” Rowe, supra, 205 F.RD. at 430. At least in part, the idea is to force the requesting party to perform a cost-benefit analysis. See Id. at 429, and see also Sedona Principles, supra, Comment 13.b, citing Stallings-Daniel v. Northern Trust Co., 2002 WL 385566 (N.D. Ill. March 12, 2002).
• On the other hand, in this case Legacy's own conduct is to some extent responsible for the breadth of VPOS' requested discovery. See paragraph K supra. By way of particularly pertinent example, even though metadata are not routinely producible, Sedona Principles; supra, Principle 12, here the circumstances tend to support VPOS' interest in discovery of metadata, aimed not at unearthing information per se but rather at determining how and when the information got to Legacy's system. See Id., Comment 12.a.
• Also, it is Legacy which must bear (at least initially; see paragraph W(2) infra) the cost of implementing the Court's injunction. There may be some overlap between that process and VPOS' discovery requests. As VPOS' experts oversee the process of purging data and verifying its removal, they can also, to some degree, undertake the sort of discovery VPOS seeks. Of course the overlap is by no means complete; that is why Legacy's old computers must be preserved after the purging (by means of transferring non-VPOS data to new computers) is completed.
W. Balancing all of the relevant factors, including (i) VPOS's focus on metadata rather than “ordinary” data, (ii) the degree of Legacy's responsibility for that focus, (iii) the diminishing competitive utility of the “ordinary” data itself, (iv) the desirability of giving VPOS an incentive to minimize costs, and (v) the need to implement the Court's injunction, the Court concludes:
(1) Legacy must bear the costs of implementing the injunction, including the reasonable charges of VPOS' experts for overseeing that process and for undertaking the post-transfer checks contemplated by paragraph Q(b)(ii) supra.
(2) However, the Court notes the possibility that Legacy will be entitled to recover those costs (as damages for the wrongful issuance of the injunction, see Buzz Barton & Associates, Inc. v. Giannone, 108 Ill.2d 373, 382-83 (1985)), if Legacy prevails on its argument that the entire problem was caused by VPOS via Ms. Newmes. Accordingly, VPOS must post an injunction bond in the sum of $50,000.
(3) The cost of VPOS' discovery of the “old” Legacy computers (which appears to be largely forensic e-discovery aimed at unearthing metadata) will be borne 75% by Legacy and 25% by VPOS, except that VPOS' expert costs to date will be borne 50% by each party. Depending on the ultimate outcome of this case, the Court may reallocate those costs and/or require complete or partial reimbursement.
(4) The problem of protecting privileged information during the course of e-discovery is not, in this case, amenable to the “clawback” approach described in Zubulake II, supra, 216 F.R.D. at 290 & n.81. See Sedona Principles, supra, Comment 10.d. As is usual, therefore (see Id., Principle 10, and Rowe, supra, 205 F.R.D. at 432), Legacy must bear the cost of any privilege review it deems necessary.
Accordingly, IT IS HEREBY ORDERED as follows:
1. The parties shall proceed forthwith to implement this Court's May 13, 2004 injunction Order as follows: Legacy shall obtain new computers of its choice, at its expense, to replace all of its 30 existing computers and 2 servers. Legacy shall determine which files (other than identifiable VPOS files) will be transferred to the new computers. Legacy shall advise VPOS' experts of how the copying and transfer will be effected. VPOS' experts will observe the copying and transfer. The copying and transfer shall be completed, at Legacy's expense (which shall include the reasonable fees of VPOS' experts for overseeing the process, as described in subparagraphs (a) and (b) infra), no later than December 1, 2004. After the transfer, and at Legacy's expense:
(a) Immediately following the transfer, VPOS' experts shall examine the new computers to determine whether they contain any compiled, readily accessible assemblage of VPOS data; and
(b) One, three, and six months after the transfer, VPOS' experts shall re-examine the new computers for any then-present or deleted assemblage (as opposed to stray remnants) of VPOS data.
2. After the transfer (see (1) supra), Legacy's old computers will be stored at a place of the parties' choosing. They shall remain available for forensic discovery. The storage cost, and the other costs of VPOS' forensic discovery as to those computers, will be borne 75% by Legacy and 25% by VPOS, provided, that VPOS' expert fees to date shall be divided evenly between VPOS and Legacy, each paying 50% thereof.
3. As a condition of implementing the injunctive relief provided in (1) hereof, VPOS shall post (and present for approval on notice) an injunction bond in the sum of $50,000.
4. Notwithstanding the foregoing provisions of this Order, the Court may reallocate discovery costs (including requiring reimbursement, if necessary) depending on the ultimate outcome of this case on the merits. Further, the Court retains jurisdiction to enter such other or further orders, whether or not consistent with the foregoing, as may be warranted pursuant to SCR 219(c).
5. The Calendar 4 Court Coordinator shall notify all counsel of the entry of this Order.
Footnotes
Perhaps because relevancy screening is more difficult in e-discovery than in paper discovery, courts have been somewhat cavalier about protecting privacy in e-discovery. See, e.g., Rowe, supra, 205 F.R.D. at 428: “... an employee who uses his or her employer's computer for personal communications [i.e., e-mails] assumes some risk that they will be accessed by the employer or by others.” The same general risk of employer access presumably exists as to files (rather than e-mails). But vis-á-vis third parties, it is hard to see why a personal, non-network, non-Internet file on a desktop computer should be any less private than the contents of one's desk drawer.
This is so because they are not readily accessible in one place. That affects both discovery -- cf. Rowe, supra, 205 F.R.D. at 429 (back-up tapes “are not archives from which documents may easily be retrieved”), and Zubulake II, 216 F.R.D. at 291 (same; “The cost of accessing those documents may be onerous”) -- and the potential competitive utility of such data in Legacy's hands.
For paper discovery, we address these concerns by paying attention to “burdensomeness” objections. But in that context, our usual assumption -- that, other things being equal, the responding party should bear the burden -- rests at least partly on the view that the responding party (i) keeps the sought-after information in a form accessible to that party in the normal course of business, and (ii) can therefore unearth it more cheaply, in labor terms, than the requesting party. That is usually accurate for paper discovery. It may not be for e-discovery. See Rowe, supra, 205 F.R.D. at 429.