U.S. v. Electron Hydro LLC
U.S. v. Electron Hydro LLC
2021 WL 1909800 (W.D. Wash. 2021)
May 12, 2021
Coughenor, John C., United States District Judge
Summary
The parties agreed to a stipulated motion for an order regarding discovery procedure for the consolidated cases. This order outlined the revised case schedule and procedures for producing documents and ESI, including de-NISTing, deduplication, and Technology Assisted Review. It also included limits on written discovery and depositions, expert discovery, and miscellaneous provisions.
UNITED STATES OF AMERICA, et al., Plaintiffs,
v.
ELECTRON HYDRO LLC, Defendant
v.
ELECTRON HYDRO LLC, Defendant
CASE NO. C20-1746-JCC
United States District Court, W.D. Washington
Signed May 12, 2021
Counsel
Helen Y. Li, John Broderick, Sarah Ann Buckley, U.S. Department of Justice, Washington, DC, for Plaintiff United States of America.Paul August Kampmeier, Kampmeier & Knutsen, Seattle, WA, for Plaintiff Citizens For A. Healthy Bay.
Katelyn J. Kinn, Puget Soundkeeper, Paul August Kampmeier, Kampmeier & Knutsen, Seattle, WA, for Plaintiff Puget Soundkeeper Alliance.
Cheerful Catunao, Svend A. Brandt-Erichsen, Nossaman LLP, Seattle, WA, for Defendant.
Coughenor, John C., United States District Judge
ORDER
*1 This matter comes before the Court on the parties’ stipulated motion for an order regarding discovery procedure (Dkt. No. 20). The parties seek entry of the following order:
In accordance with this Court's case scheduling order (Docket No. 19), Plaintiffs the United States of America, Citizens for a Healthy Bay, and Puget Soundkeeper Alliance (collectively, “Plaintiffs”), and Defendant Electron Hydro, LLC, (collectively, “the Parties”), propose the following revised case schedule for the cases consolidated at case number 2:20-cv-1746-JCC:
WHEREAS, Rule 26(f) of the Federal Rules of Civil Procedure states that the Parties must develop a proposed discovery plan that states the Parties’ views and proposals on, among other things, “any issues about disclosure, discovery, or preservation of electronically stored information, including the form or forms in which it should be produced,” Fed. R. Civ. P. 26(f)(3)(C);
WHEREAS, the Parties mutually seek to reduce the time, expense and other burdens of discovery of certain electronically stored information (“ESI”) and privileged materials, as described further below, and to better define the scope of their obligations with respect to preserving such information and materials;
WHEREAS, under LCR 26(f), the Parties have reviewed the “Model Agreement Regarding Discovery of Electronically Stored Information in Civil Litigation” found under “Forms” on the Court's website to ensure that this Order and Stipulation covers the same topics as the Model;
WHEREAS, as provided in LCR 26(f), the proportionality standard set forth in Fed. R. Civ. P. 26(b)(1) must be applied in each case when formulating a discovery plan. To further the application of the proportionality standard in discovery, requests for production of ESI and related responses should be reasonably targeted, clear, and as specific as possible;
WHEREAS, an attorney's zealous representation of a client is not compromised by conducting discovery in a cooperative manner. The failure of counsel or the parties to litigation to cooperate in facilitating and reasonably limiting discovery requests and responses raises litigation costs and contributes to the risk of sanctions; and
WHEREAS, the Parties therefore are entering into this Stipulation with the request that the Court enter it as an Order;
NOW THEREFORE, it is hereby STIPULATED and ORDERED:
I. DEFINITIONS
1. The terms used in this stipulation and order that are also used in the Federal Rules of Civil Procedure and the Local Rules of Practice for civil proceedings before the United States District Court for the Western District of Washington (“Local Rules”) have the same meaning that they have under the Federal Rules and Local Rules, unless otherwise provided in this stipulation and order. Whenever the terms set forth below are used in this stipulation and order, the following definitions apply:
(a) “Draft,” when used to describe either an electronic or hard copy document, means “a preliminary version of a document that has been shared by the author with another person (by e-mail, print, or otherwise) or that the author no longer intends to finalize or to share with another person.”
*2 (b) “Document Family” means a group of related documents including parent and child documents. A parent document is an electronic file that has at least one other electronic file attached to it or embedded within it. A child document is an electronic file that is attached to or embedded within another electronic file.
(c) “Duplicate,” when used to describe either an electronic or hard copy document, means that the document does not show any facial differences, such as the inclusion of highlights, underlining, marginalia, total pages, attachments, markings, revisions, or the inclusion of tracked changes. Differences in system metadata fields, such as date created or modified, that do not affect the face of the document, are not relevant to determining whether the document is a duplicate.
(d) “Gigabyte” means one billion bytes or 1,000 megabytes.
(e) “Parties” means the parties to this litigation, including their employees and agents.
(f) “Policy” means a regular practice at an entity that managers know about and expect to be carried out.
II. PRESERVATION
2. ESI That Is Not Reasonably Accessible. The following categories of ESI listed below are not reasonably accessible in this litigation:
(a) Data stored in a backup system for the purpose of system recovery or information restoration, including but not limited to, disaster recovery backup tapes, continuity of operations systems, and data or system mirrors or shadows, if such data are routinely deleted or written over in accordance with an established routine system maintenance practice;
(b) Voice-mail messages;
(c) Instant messages, such as messages sent on AOL Instant Messenger or Microsoft Communicator, but not text messages;
(d) Electronic mail sent to or from a smartphone (e.g., BlackBerry, iPhone), tablet (e.g., iPad) provided that a copy of such e-mail is routinely saved elsewhere;
(e) Other electronic data stored on a smartphone or tablet, such as calendar or contact data or notes, provided that a copy of such information is routinely saved elsewhere;
(f) Logs of calls made from cellular phones;
(g) Deleted computer files, whether fragmented or whole (nothing in this order authorizes the intentional deletion of ESI after the duty arose to preserve such ESI);
(h) Data stored in random access memory (“RAM”), cache memory, or in temporary or cache files, including internet history, web browser cache and cookie files, wherever located;
(i) Data that is not accessible through the operating system installed on a device;
(j) Data stored on photocopiers, scanners, and fax machines;
(k) Server, system, or network logs;
(l) Electronic data temporarily stored by scientific equipment or attached devices, provided that the data that is ordinarily preserved as part of a laboratory report is, in fact, preserved in its ordinary location and form; and
(m) Data stored on electronic systems that were no longer in use five years before the complaint was filed.
3. Nothing in this Stipulation and Order prevents any Party from asserting, in accordance with the Federal Rules of Civil Procedure, that other categories of ESI are not reasonably accessible.
4. The Parties need not preserve, for this litigation, the categories of ESI listed in paragraph 2 unless, on the date that this stipulation and order is entered by the Court, either Party has a Policy that results in the routine preservation of such ESI, in which case such Party shall continue to preserve such ESI in accordance with its Policy.
*3 5. No Discovery of Material Not Required To Be Preserved. The Parties shall not seek discovery of items that need not be preserved pursuant to paragraph 2 above. If any discovery request is susceptible of a construction that calls for the production of items that need not be preserved pursuant to paragraph 2, such items need not be searched for, produced, or identified on a privilege log pursuant to Fed. R. Civ. P. 26(b)(5).
6. Use of Documents During Litigation. Notwithstanding any other provision of this Order, the Parties may take any of the following actions with respect to documents and ESI without breaching their duty to preserve documents and ESI:
(a) The Parties may continue to work, in the ordinary course of business, on documents that do not meet the definition of Draft in paragraph 1. However, the Parties shall preserve Draft documents for discovery.
(b) The Parties may move unfiled documents or ESI into files or folders that adhere to an organizational scheme that was created before the complaint was filed in this matter. Nothing in this paragraph prevents the Parties from implementing an organizational scheme that applies only to documents or ESI created after the complaint was filed in this matter.
(c) The Parties may delete, overwrite, or wipe ESI from devices that are being replaced, upgraded, reimaged, disposed of, or returned at the end of lease, provided that the potentially relevant ESI is first copied to a new location in a manner that preserves the data, including metadata, that must be produced pursuant to Section VI of this Order.
(d) The Parties may move data from one device to another, or from one location to another, provided that a copy of the ESI remains accessible in the first location or the new copy is created in a manner that preserves the data, including metadata, that must be produced pursuant to Section VI of this Order.
(e) The Parties may load loose ESI into an enterprise content management system, provided that: (1) the enterprise content management system captures all of the metadata fields that must be produced under this order and does not convert the format of the ESI in a way that makes it significantly less accessible; or (2) the Parties maintain a copy of the ESI in its native format and make their production from this native file collection.
(f) The Parties may upgrade, patch, reprogram, or customize software that stores relevant data, even if such actions alter the way data is maintained, stored, or viewed, provided that the relevant data itself is not altered.
(g) The Parties may take any of the following actions with respect to data in a database provided that it is part of the routine use of the database: input additional data; access data; update the software running the database; append new data; and modify existing data.
(h) The Parties may edit or take down any data on a publicly accessible internet site.
(i) The Parties may add data to an intranet or private website. The Parties may edit or take down any data on an intranet or private website, provided that a copy of the data is made before the change and is preserved for discovery.
(j) The Parties may compress, decompress, encrypt, or decrypt data subject to preservation in this matter provided that any data losses during such processes do not result in loss of the metadata required to be produced under this Order or significantly degrade the quality of the data.
*4 (k) The Parties may update social media sites, but may not take affirmative steps to delete relevant data posted before the filing of the Complaint.
7. Preservation Does Not Affect Discoverability or Claims of Privilege. By preserving documents or ESI for the purpose of this litigation, the Parties are not conceding that such material is discoverable, nor are they waiving any claim of privilege.
8. Other Preservation Obligations Not Affected. Nothing in this agreement affects any obligations of the Parties to preserve documents or information for purposes other than this litigation, such as pursuant to court order, administrative order, statute, or in response to other anticipated litigation.
III. COLLECTION
9. Filtering.
(a) The Parties may de-NIST electronic files, removing known, traceable software applications in the National Software Reference Library (“NIST List”), available at https://www.nist.gov/itl/ssd/software-quality-group/nsrl-download.
(b) If a Producing Party proposes to apply other filters to limit ESI that is collected for processing and review (e.g., that identify system files, non-user generated files, or zero-byte files), the Producing Party shall provide information to the other Parties regarding the filters, how they work, and what impact they will have on the collections or productions. The Parties shall meet and confer regarding such additional filters. The Parties may agree upon additional filters in writing without further action from the Court. If the Parties cannot agree, the Party seeking to apply the filter may file a motion for a protective order.
10. Deduplication.
(a) Deduplication of e-mail. The United States of America and Electron Hydro, LLC must deduplicate e-mail by:
(1) comparing the MessageID or UNID metadata fields; or
(2) calculating and comparing the MD5, SHA-1, or SHA-256 hash value based on: for Plaintiff, the following fields: to, from, cc, bcc, subject, body, the number of attachments and attachment names; for Defendant, the message body, header (message date & time, subject, author's name and e-mail), recipients, and the combined hash value of individual hash values for each attachment.
(b) The Parties hereby stipulate and agree that in this matter there is a rebuttable presumption of evidence that an e-mail correctly addressed to a recipient was actually delivered to that recipient's e-mail inbox. This stipulation does not apply to draft e-mails.
(c) Deduplication of ESI other than e-mail. The United States of America and Electron Hydro, LLC shall identify, based on MD5, SHA-1, or SHA-256 hash values, exact duplicates of electronic files other than e-mails that are larger than zero bytes and smaller than two gigabytes. The Parties shall, to the extent practicable, produce only one copy for each custodian that has possession or custody of the file.
(d) Custodians and File Paths for deduplicated material. The custodians and file paths of all documents removed as duplicates may be recorded in “All Custodians” and “All Paths” fields provided for the non-deduplicated document, delimited with semicolons.
11. Search Technology.
(a) If a Party intends to use search terms to limit its collection, review, or production of ESI, it shall include in its response to a request for production a table describing: (i) the collections of ESI for which it proposes to use search terms; (ii) the search terms that it proposes to use for each collection; and (iii) the computer software or technologies it proposes to use to carry out the search in each collection. If the requesting Party wishes to obtain more information about the proposed search or objects to some or all of the proposed search protocol, it must notify the producing Party within 30 days.
*5 (b) Nothing in this paragraph obligates any Party to agree to perform an electronic search or to accept the results of an electronic search as a sufficient response to a discovery request.
12. Third-Party Data. The Parties shall meet and confer before serving any subpoenas in this matter on commercial e-mail providers, such as Google™ or Microsoft™, or any social media companies such as Facebook™ or Twitter™.
13. Privileged Materials Located in the Offices of Counsel. The Parties agree that, in response to general discovery requests, the Parties need not collect any privileged or work product material that is located in the offices, electronic devices, and electronic accounts of the U.S. Department of Justice, U.S. EPA, Kampmeier & Knutsen PLLC, Katelyn Kinn or other staff attorney for Puget Soundkeeper Alliance, or Nossaman, LLP (collectively, “Offices of Counsel”). The Parties understand that such materials will not be produced or placed on a privilege log. This paragraph does not apply to any documents, ESI, or tangible things located outside of the Offices of Counsel, even if they are duplicates of materials located inside the Offices of Counsel. For example, if an attorney sends a privileged e-mail to an employee of a party, the copy of the e-mail located in Offices of Counsel need not be collected, but the copy of the e-mail received by the employee, along with any attachments, must be collected and placed on a privilege log (unless it falls into one of the categories exempt from privilege logging pursuant to Paragraph 34).
IV. PROCESSING
14. The Parties shall use reasonable efforts to process ESI for production in accordance with Section VI of this Stipulation and Order. If a party identifies ESI that may be responsive but that cannot be processed with reasonable effort, e.g., corrupt files or password-protected files for which the password is not known, it shall promptly identify such ESI to the requesting Party in a table that includes the following information: custodian name, filename, and file path.
15. The Parties need not extract and process embedded files as though they were separate files, if the Parties are technically able to suppress the extraction of embedded files during processing. After production, a receiving Party may request that native files be produced for documents and ESI that appear to contain embedded files but for which the embedded files are not fully viewable.
V. REVIEW
A. Technology Assisted Review.
16. As of the date of this Stipulation, neither Party intends to use Technology Assisted Review, such as predictive coding. If any Party wishes to use Technology Assisted Review to determine whether documents are responsive or otherwise to limit the documents that it produces, it shall notify the other Parties and provide to them a proposed TAR protocol. The Parties shall then meet and confer in an attempt to negotiate an agreed-upon protocol. Unless otherwise ordered by the Court, the Parties shall not use TAR to determine whether documents are responsive or otherwise to limit the documents that it produces except in conformance with a written, agreed-upon protocol signed by counsel for the Parties.
B. 502(d) Order.
*6 17. This Order invokes Rules 16(b) and 26(c) of the Federal Rules of Civil Procedure, and Local Rule 26(f)(1)(H) of the Local Rules of Practice for civil proceedings before the United States District Court for the Western District of Washington, as well as the protections afforded by Rule 502(d) of the Federal Rules of Evidence. Accordingly, the provisions in Rule 502(b) do not apply to the disclosure of communications or information in discovery in this matter.
18. The prosecution and defense of this action will require each Party to review and to disclose large quantities of information and documents, including electronically stored information, through the discovery process. As a result, page-by-page preproduction privilege review would likely impose an undue burden on the Parties’ resources.
19. Each party is entitled to decide the appropriate degree of care to exercise in reviewing materials for privilege, taking into account the volume and sensitivity of the materials, the demands of the litigation, and the resources that the party can make available. Irrespective of the care that is actually exercised in reviewing materials for privilege, the Court hereby orders pursuant to Rule 502(d) of the Federal Rules of Evidence that disclosure of privileged or protected information or documents in connection with this litigation will not constitute or be deemed a waiver or forfeiture—in this or any other federal or state proceeding—of any claims of attorney-client privilege or work product protection that the disclosing Party would otherwise be entitled to assert with respect to the information or documents and their subject matter.
20. The Court further orders that because expedited or truncated privilege review is likely necessary for the just, speedy, and inexpensive resolution of this matter, the disclosure of privileged or protected information or documents in discovery conducted in this litigation will be deemed unintentional, inadvertent, and compelled by order of this Court. Such disclosure will not constitute a waiver of the disclosing party's right to claim any privilege or protection, including without limitation the deliberative process privilege, that would have applied to the information or documents or their subject matter but for the disclosure, provided only that the party disclaiming waiver employed procedures reasonably designed to screen out privileged materials.
21. Regardless of whether the procedures to screen out privileged materials were reasonable, the Parties shall not argue, in this forum or any other, that any privileges were waived as a result of disclosures in this litigation.
22. If a Party determines that it has produced a document upon which it wishes to make a claim of privilege, the producing Party shall, within 14 days of making such determination, give all counsel of record notice of the claim of privilege. The notice must identify each such document and the date it was produced. If the producing Party claims that only a portion of a document is privileged, the producing Party shall provide, along with the notice of the claim of privilege, a new copy of the document with the allegedly privileged portions redacted. Any party that complies with this paragraph will be deemed to have taken reasonable steps to rectify disclosures of privileged or protected information or materials.
*7 23. If a Party identifies a document that appears on its face or in light of facts known to the Party to be subject to another Party's claim of privilege, the Party identifying the potential claim of privilege is under a good-faith obligation to notify the Party holding the potential claim of privilege. Such notification will not waive the identifying Party's ability to subsequently challenge any assertion of privilege with respect to the identified document. If the Party holding the potential claim of privilege wishes to assert a claim of privilege, it shall provide notice in accordance with Paragraph 22 above within five business days of receiving notice from the identifying Party.
24. Upon receiving notice of a claim of privilege on a produced document, the receiving Party shall, in accordance with Fed. R. Civ. P. 26(b)(5)(B), promptly sequester the specified information and any copies it has and shall not use or disclose the information, except as provided by Fed. R. Civ. P. 26(b)(5)(B), until the claim is resolved. Copies of privileged documents or information that have been stored on electronic media that is not reasonably accessible, such as disaster recovery backup media, are adequately sequestered as long as they are not restored; if such data is restored, the receiving Party shall take steps to re-sequester the restored information. If the receiving Party disclosed the information before being notified, it shall take reasonable steps to prevent further use of such information until the claim is resolved.
25. Notwithstanding the duties under Rule 26(b)(5)(B), absent an order expressly stating otherwise, a party may make derivative use of, and may pursue leads suggested by, any inadvertently produced privileged information known to the party before duty arose to return, sequester, or destroy the privileged information. The receipt of inadvertently disclosed privileged information shall not be the basis for disqualifying counsel from this action absent a showing of bad faith in receiving the information.
26. If a Party wishes to dispute a claim of privilege asserted under this Order, after the Parties have met and conferred under L. R. Civ. P. 37 and Order regarding FRCP 26(f) conference, initial disclosures, and joint status report ¶ 6, December 28, 2020, ECF No. 10, such Party shall, within 14 days after the end the meet and confer, move the Court for an order compelling disclosure of the information. The Party shall follow the procedures described in Fed. R. Civ. P. 26(b)(5)(B) and shall not assert, as a ground for compelling disclosure, the fact or circumstances of the disclosure. Pending resolution of the motion, the Parties shall not use the challenged information for any other purpose and shall not disclose it to any person other than those required by law to be served with a copy of the sealed motion.
27. The Parties may stipulate to extend the time periods specified in Paragraphs 22, 23, or 26 above.
28. Nothing in this order overrides any attorney's ethical responsibilities to refrain from examining or disclosing materials that the attorney knows or reasonably should know to be privileged and to inform the disclosing party that such materials have been produced.
29. The Party wishing to assert a claim of privilege retains the burden, upon challenge pursuant to Paragraph 26, of establishing the applicability of the claimed privilege.
30. This Order does not preclude a Party from voluntarily waiving any claims of privilege. The provisions of Rule 502(a) of the Federal Rules of Evidence apply when a Party uses privileged information to support a claim or defense.
C. Document Families
31. The Parties may withhold small image files or extracted embedded files that are unresponsive or irrelevant, even if other documents in the same Document Family are responsive.
*8 32. The Parties shall not withhold documents or ESI on a claim of privilege merely because other documents or ESI in the same Document Family are privileged.
D. Privilege Log
33. Embedded e-mails.
(a) An e-mail requires only one entry on the privilege log regardless of the number of embedded e-mails contained within the message body of the e-mail in question. For any e-mail that appears on the privilege log, the author, recipient(s), subject, and date fields may be populated with the metadata from the top-level message and is not required to include metadata from any e-mail embedded in the message body.
(b) If an e-mail contains both privileged and non-privileged communications, the non-privileged communications must be produced, either by separately producing a copy of the non-privileged communications embedded in the privileged communication, or by producing a copy of the entire communication string with the privileged portions redacted.
(c) If an e-mail is withheld or any part of it is redacted for privilege, the privilege description on the privilege log must include the basis for withholding each embedded e-mail and the basis for each redaction.
(d) If an e-mail is produced with redactions, the redactions must not obscure the headers (from, to, subject, sent date) of any embedded e-mails, unless the identity or contact information of a person is the information that is privileged or protected.
34. The obligation to provide a log of privileged or work product materials pursuant to Rule 26(b)(5)(A) presumptively does not apply to:
(a) Communications exclusively between a party and its Offices of Counsel;
(b) Work product created after November 25, 2020 by (i) Offices of Counsel; or (ii) by an agent of Offices of Counsel other than a party or an employee of a party; or
(c) Internal communications within (i) a law firm, (ii) a legal assistance organization, (iii) a governmental law office, or (iv) a legal department of a corporation or another organization.
35. Deliberative Process Privilege Claims. The Parties agree that the United States’ assertion of deliberative process privilege may be made by first identifying documents withheld as deliberative process privileged on the privilege log and, second, providing a declaration supporting that assertion within 45 days after service of the privilege log.
VI. PRODUCTION
36. Procedures for Production: Unless stated otherwise in a written agreement signed by two or more of the Parties to this litigation, the following procedures apply to producing documents or ESI. Compliance with these procedures constitutes compliance with Federal Rule of Civil Procedure 34(b)(2)(E) for this matter.
(a) TIFF Plus Text Productions. Except as stated otherwise below, ESI being produced by a Party shall be converted to 300 dpi, single-page, black-and-white (no shades of gray) TIFF images using CCITT Group IV compression. Where color images are required by this order, the images shall be in the form of .JPG images. Each page must be branded with a unique Bates number, which must not be an overlay of the image. Unless otherwise agreed by the Parties, the TIFF images must be produced within a container file encrypted with the AES-256 encryption algorithm and sent via the Box.com web-based file sharing service or a USB hard drive, accompanied by: (1) an Opticon™ or IPRO® “cross reference file” which associates each Bates number with its corresponding single-page TIFF image file (or JPG image file for color images); and (2) a “text load file” containing each of the applicable metadata fields described in Appendix A in UTF-8 encoding. The text load file must contain Concordance® delimited text that will populate fields in a searchable flat database environment, containing one line for each document. Nothing in this stipulation requires a Party to manually populate a metadata field in Appendix A (other than “Custodian” and “MD5Hash”) if such fields cannot be extracted from a document. The password for the encrypted production must be provided within a separate e-mail from the encrypted data.
*9 (b) Paper documents:
(1) Documents printed on paper that is larger than 11 × 17 inches may, at the Producing Party's discretion, be produced on paper. Documents produced on paper must be produced as they are kept in the ordinary course of business or must be organized and labeled to correspond to the categories in the request.
(2) Documents printed on paper that is 11 × 17 inches or smaller must be scanned and produced using the same means of encryption and method of transfer as described in 36(a) above.
(c) Word, WordPerfect, and PDF files.
(1) For Word, WordPerfect, and PDF files, the text load file must contain a field that identifies the file path of a text file containing the full extracted text from the document, unless the document has been redacted during privilege review, in which case the text file may contain OCR text. Text files must be provided in UTF-8 encoding.
(2) For Word, WordPerfect, and PDF files that contain comments, tracked changes, or hidden content that are not part of the ordinary text, the TIFF images must be generated based on how the document appears when first opened using view settings contained in the file. The receiving party has the option, after reviewing the produced TIFF image, to request the native file. A separate field must be produced that indicates whether a document contains comments, tracked changes, or hidden content, as referenced in Appendix A.
(d) Microsoft PowerPoint files must be must be produced in native file format in a separate folder on the production media. The text load file must contain a field that identifies the file path of the native file corresponding to each document, and the Parties must provide a placeholder TIFF image that shows the name of the native file and has a Bates number.
(e) E-mail.
(1) If the producing party redacts any part of an e-mail before producing it, OCR text may be provided in place of extracted text.
(2) E-mail attachments must be processed as though they were separate documents, and the text load file must include a field in which the producing Party identifies, for each e-mail, the Bates range of any attachment;
(f) Microsoft Excel files and other spreadsheets must be produced in native file format in a separate folder on the production media. The text load file must contain a field that identifies the file path of the native file corresponding to each document, and the Parties must provide a placeholder TIFF image that shows the name of the native file and has a Bates number. If an MS Excel or other spreadsheet file contains privileged text that must be redacted before production, the producing party will image the redacted spreadsheet showing all non-privileged visible and hidden columns, and provide OCR text for the file, or will use an industry standard native redaction tool, such as Blackout or Exolution and produce the native redacted file along with the metadata of the original, non-redacted file, and will provide a list of such native-redacted files to the receiving party.
(g) Digital photographs that are .JPG image files must be produced in native file format in a separate folder on the production media. The text load file must contain a field that identifies the file path of the native file corresponding to each document, and the Parties must provide a placeholder TIFF image that shows the name of the native file and has a Bates number. Digital photographs that are non-.JPG image files may be produced in native file format on request, provided that the United States possesses the original native file and that it has not been converted and maintained at some point prior to collection in PDF format.
*10 (h) Microsoft OneNote files may be converted to PDF files prior to processing, review, and production. The Parties need not collect or produce an entire OneNote notebook if only certain sections or pages in the notebook are responsive.
(i) GIS maps that are contained in a folder (with or without subfolders) may, at the Producing Party's discretion, be converted to a single ZIP file that contains all of the contents of that folder, even if the folder contains certain files types (e.g., JPG images) that would ordinarily be produced using different procedures pursuant to this Paragraph. The Producing Party must provide a placeholder TIFF image that shows the name of the ZIP file and has a Bates number. After production of the ZIP file, the receiving party may initiate a meet and confer about whether any files contained with the ZIP file should be produced as separate documents with their own Bates numbers.
(j) With respect to any other kinds of electronic data, including data from databases, CAD drawings, GIS data, videos, etc., the Producing Party may produce the ESI in native format or a reasonably usable form, or may initiate a meet-and-confer to determine a reasonably useable form for the production. If the file is not one of the types described above, the Producing Party must provide a placeholder TIFF image that shows the name of the file and has a Bates number. If the Parties have not agreed on a production format for the ESI prior to the production, then Rule 34(b)(2)(E)(iii) shall not apply to the production.
37. The receiving party has the option, after reviewing a black-and-white TIFF image, to enquire whether the original document contained color and, if so, to request color .JPG images.
38. Except as stated above, a Party need not produce the same electronically stored information in more than one form.
VII. DISCOVERY LIMITATIONS
39. All limits on written discovery and depositions set forth in the Federal Rules of Civil Procedure, in local rules, or in orders of this Court remain in effect in this litigation, except as stated in this Order.
40. For the purposes of Rule 26(d)(2)(B), the first 26(f) conference in United States of America v. Electron Hydro, LLC took place on February 25, 2021 and the first 26(f) conference and initial disclosures in consolidated case Citizens for a Healthy Bay, et al. v. Electron Hydro, LLC will take place in June 2021 unless those deadlines are later moved. The Parties to this Stipulation and Order hereby acknowledge that because discovery planning in Citizens for a Healthy Bay's and Puget Soundkeeper Alliance's case against Electron Hydro, LLC will take place later, some Parties to this Order may need to revisit some of the provisions of this Order at that time; the Parties agree to meet and confer to resolve any discovery concerns that arise as a result.
41. Depositions.
(a) Unless otherwise stipulated by the Parties, a party must obtain leave of Court before taking a deposition if it would result in more than 14 depositions being taken under Rule 30 or 31 by the plaintiffs, or by the defendants. Depositions of witnesses providing a report pursuant to Rule 26(a)(2)(B) will not be counted for purposes of this subparagraph.
(b) Regardless of whether there is a request before the deposition is completed, a deponent must be allowed 30 days after being notified by the officer that the transcript or recording is available in which: (1) to review the transcript or recording; and (2) if there are changes in form or substance, to sign a statement listing the changes and the reasons for making them.
VIII. EXPERT DISCOVERY
*11 42. Each Party shall not pursue through discovery, trial subpoena or otherwise:
(a) Notes taken by a witness required to provide a report under Fed. R. Civ. P. 26(a)(2)(B);
(b) Communications between a witness required to provide a report under Fed. R. Civ. P. 26(a)(2)(B) and a Party's representative—including, but not limited to, another witness required to provide a report under Fed. R. Civ. P. 26(a)(2)(B)—regardless of the form of the communications, except to the extent that the communications:
(1) Relate to compensation for an expert's study or testimony;
(2) Identify facts or data that a Party provided and that the expert considered in forming the opinions to be expressed; or
(3) Identify assumptions that a Party provided and that the expert relied upon in forming the opinions to be expressed.
43. Expert Depositions. Except as provided in 33 U.S.C. § 1365(d), notwithstanding Fed. R. Civ. P. 26(b)(4)(E), the Parties shall bear the costs of their own testifying experts in responding to discovery, and shall not require the Party seeking discovery to pay the other Party's testifying expert any fee for the time spent in responding to discovery.
44. Expert Productions.
(a) Documents collected or created by a retained expert are within the possession, custody, or control of the Party that has retained the expert. If documents collected by an expert, and not created by or for that expert in connection with this matter, are responsive to a request for production served during fact discovery, such documents must be produced during fact discovery unless privileged. Documents created by or for an expert may be withheld, without providing a privilege log, until the deadline described in subparagraph (c) below.
(b) Documents “considered” by expert for the purposes of Fed. R. Civ. P. 26(a)(2)(B)(ii) means those documents that have been received, read, reviewed, or created by the expert for the purposes of forming the opinions set forth in the expert's report but only if the expert actually relies upon in forming his or her opinion.
(c) Documents considered by a witness required to provide a report under Fed. R. Civ. P. 26(a)(2)(B) shall be produced within seven days after producing the witness's report. Such documents shall be produced in accordance with the requirements of Section VI of this order, except that the Parties shall identify which witness(es) considered each document either in the load file produced along with the documents or in the witness’ report. However, the Parties do not need to produce: (1) copies of documents that were previously produced in this matter, provided that the Party identifies the documents by Bates number before the expiration of the seven-day period described in this subparagraph; (2) copies of documents considered by experts that are publicly available (e.g., published materials one might find in a library), unless it would be less burdensome for the producing party to obtain a copy than it would be for the receiving party, and the receiving party requests a copy after receiving the expert report. All such requests shall be fulfilled within 10 days.
*12 (d) Notwithstanding the provision of Fed. R. Civ. P. 26(a)(2)(B)(iii), the experts’ disclosures under Rule 26(a)(2) need not include demonstrative exhibits the expert may use at trial, provided that the facts and data supporting such trial demonstrative exhibits have been disclosed in the experts’ report or in the documents considered by that witness. Each party agrees to provide the other parties with copies of any demonstrative exhibits before they are used at trial. The parties will seek to reach agreement on how long before trial demonstrative exhibits must be exchanged. If the parties are unable to reach agreement, one or more parties may ask the Court to set a deadline for exchanging copies of demonstrative exhibits.
IX. MISCELLANEOUS PROVISIONS.
45. In the event that a non-party produces documents or ESI in response to a subpoena, the Party serving the subpoena shall make reasonable provision for prompt access to the produced materials by other parties.
46. Before filing any motion with the Court regarding electronic discovery or evidence, the Parties shall meet and confer in a good faith attempt to resolve such disputes.
47. Costs of Document Production. Except as provided in 33 U.S.C. § 1365(d), each Party shall bear the costs of collecting, processing, reviewing, and producing its own documents.
48. Effect of Order. The Parties’ agreement to this Order is without prejudice to the right of any Party to seek an order from the Court to rescind or amend this Order for good cause shown. Nothing in this Order abridges the rights of any person to seek judicial review or to pursue other appropriate judicial action with respect to any discovery ruling made by the Court in this matter.
49. Integration/Appendices. The following documents is incorporated herein by reference: “Appendix A” is a table describing the fields to be included in the databases produced by each Party.
It is so ORDERED this 12th day of May 2021.
Appendix A:
Suggested Fields to Exchange in Databases of Discovery Materials





