FTC v. Amazon.com, Inc.
FTC v. Amazon.com, Inc.
Case No. 2:23-cv-0932 (W.D. Wash. 2023)
November 30, 2023

Chun, John H.,  United States District Judge

Cooperation of counsel
Possession Custody Control
Email Threading
Attorney-Client Privilege
Attorney Work-Product
Proportionality
Form of Production
ESI Protocol
Scope of Preservation
Native Format
Metadata
Search Terms
Privacy
Download PDF
To Cite List
Summary
The FTC and Amazon.com, Inc. agreed to certain provisions regarding the discovery of ESI in order to facilitate a cooperative and efficient process. These provisions included guidelines for the disclosure, search, and production of ESI, as well as the use of technology-assisted review and de-duplication. The Parties also agreed to apply the proportionality standard and engage in a meet and confer process before including custodians or data sources subject to foreign data privacy laws in any ESI request.
Additional Decisions
FEDERAL TRADE COMMISSION, Plaintiff,
v.
AMAZON.COM, INC., et al., Defendants
No. 2:23-cv-0932-JHC
United States District Court, W.D. Washington
Filed November 30, 2023
Chun, John H., United States District Judge

AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION AND ORDER

The Federal Trade Commission and Amazon.com, Inc. (together, the “Parties”), hereby stipulate to the following provisions regarding the discovery of electronically stored information (“ESI”) in this matter:

'A. General Principles

1. An attorney’s zealous representation of a client is not compromised by conducting discovery in a cooperative manner. The failure of counsel or the Parties to litigation to cooperate in facilitating and reasonably limiting discovery requests and responses raises litigation costs and contributes to the risk of sanctions.

2. As provided in LCR 26(f), the proportionality standard set forth in Fed. R. Civ. P. 26(b)(1) must be applied in each case when formulating a discovery plan. To further the application of the proportionality standard in discovery, requests for production of ESI and related responses should be reasonably targeted, clear, and as specific as possible.

B. ESI Disclosures

Within 30 days of entry of this Order, or at a later time if agreed to by the parties, each party shall disclose:

1. Non-custodial Data Sources. A list of non-custodial data sources (e.g., shared drives, servers), if any, likely to contain discoverable ESI.

2. Foreign data privacy laws. Nothing in this Order is intended to prevent either party from complying with the requirements of a foreign country’s data privacy laws, e.g., the European Union’s General Data Protection Regulation (GDPR) (EU) 2016/679. The Parties agree to meet and confer before including custodians or data sources subject to such laws in any ESI or other discovery request.

C. ESI Discovery Procedures

1. On-site inspection of electronic media. Such an inspection shall not be required absent a demonstration by the requesting party of specific need and good cause or by agreement of the Parties.

2. Search methodology. The Parties shall timely confer to attempt to reach agreement on appropriate search terms and queries, file type and date restrictions, data sources (including custodians), and other appropriate computer- or technology-aided methodologies. The Parties shall continue to cooperate in revising the appropriateness of the search methodology.

i. The producing party shall disclose the data sources (including custodians), search terms and queries, any file type and date restrictions, and the use of technology-assisted review. The producing party shall provide unique hit counts for each search query.

ii. After disclosure, the parties will engage in a meet and confer process regarding additional terms sought by the non-producing party.

iii. The following provisions apply to search terms / queries of the requesting party. Focused terms and queries should be employed; broad terms or queries, such as product and company names, generally should be avoided. A conjunctive combination of multiple words or phrases (e.g., “computer” and “system”) narrows the search and shall count as a single search term. A disjunctive combination of multiple words or phrases (e.g., “computer” or “system”) broadens the search, and thus each word or phrase shall count as a separate search term unless they are variants of the same word. The producing party may identify each search term or query returning overbroad results demonstrating the overbroad results and a counter proposal correcting the overbroad search or query.

3. Format.

a. ESI will be produced to the requesting party with searchable text, in a format to be decided between the Parties. Acceptable formats include, but are not limited to, native files or single-page TIFFs (with load files for e-discovery software that includes metadata fields identifying natural document breaks and also includes companion OCR and/or extracted text files).

b. Unless otherwise agreed to by the Parties, files that are not easily converted to image format, such as spreadsheets, databases, and drawing files, will be produced in native format with extracted text and metadata. Unless otherwise agreed to by the Parties, for all other files, natives shall be produced upon reasonable request where images are insufficient to properly review the document.

c. Each document image file shall be named with a unique number (Bates Number).

d. Unless otherwise agreed to by the Parties, the full text of each electronic document shall be extracted (“Extracted Text”) and produced in a text file. The Extracted Text shall be provided in searchable ASCII text format (or Unicode text format if the text is in a foreign language) and shall be named with a unique Bates Number (e.g., the unique Bates Number of the first page of the corresponding production version of the document followed by its file extension).

4. De-duplication. The Parties may de-duplicate their ESI production across custodial and non-custodial data sources on a family basis, and the duplicate custodian information removed during the de-duplication process shall be tracked in a duplicate/other custodian field in the database load file.

5. Email Threading. The Parties may use analytics technology to identify email threads and need only produce the unique most inclusive copy and related family members and may exclude lesser inclusive copies, except if the lesser inclusive copies include unique family members, in which case the lesser inclusive copies and related family members shall also be produced. Upon reasonable request, the producing party will produce a less inclusive copy.

6. Metadata fields. The Parties agree that only the following metadata fields need be produced, and only to the extent it is reasonably accessible and non-privileged: File Path; TextPath; Custodian; AllCustodians; Filename; File Size; File Extensions; MD5 Hash; PRODUCTION_VOLUME; PRODBEG; PRODEND; PRODBEG_ATTACH; PRODEND_ATTACH; Page Count; From; To; CC; BCC; EmailSubject; Date Sent; Time Sent; Date Received; Time Received; Author; Title; Subject; Date Created; Time Created; Date Modified; Time Modified; and confidentiality status (indicating whether the producing party has designated a document “confidential”).

7. Hard-Copy Documents. Hard-copy documents will be scanned using Optical Character Recognition technology and searchable ASCII text files will be produced (or Unicode text format if the text is in a foreign language), unless it will not result in accurate or reasonably useable/searchable ESI, like handwritten documents. Each file will be named with a unique Bates Number (e.g., the unique Bates Number of the first page of the corresponding production version of the document followed by its file extension). These documents will be unitized following scanning into appropriate segments and custodial information will be provided in the load files.

D. Preservation of ESI

The Parties acknowledge that they have a common law obligation, as expressed in Fed. R. Civ. P. 37(e), to take reasonable and proportional steps to preserve discoverable information in the party’s possession, custody, or control. With respect to preservation of ESI, the Parties agree as follows:'

1. Absent a showing of good cause by the requesting party, the Parties shall not be required to modify the procedures used by them in the ordinary course of business to back-up and archive data; provided, however, that the Parties shall take reasonable and proportional steps to preserve all discoverable ESI in their possession, custody, or control.

2. The Parties agree that only unique, non-duplicative sources of relevant Documents need to be preserved.

3. Absent a showing of good cause by the requesting party, the categories of ESI that need not be preserved include, but are not limited to:

a. Deleted, slack, fragmented, or other data only accessible by forensics.

b. Random access memory (RAM), temporary files, or other ephemeral data that are difficult to preserve without disabling the operating system.

c. On-line access data such as temporary internet files, history, cache, cookies, and the like.

d. Data in metadata fields that are frequently updated automatically, such as last-opened dates.

e. Interim automatically saved drafts.

f. Back-up data that are duplicative of data that are more accessible elsewhere.

g. Server, system or network logs.

h. Data remaining from systems no longer in use that is unintelligible on the systems in use.

i. Electronic data (e.g., email, calendars, contact data, and notes) sent to or from mobile devices (e.g., iPhone, iPad, Android devices), provided that a copy of all such electronic data is automatically saved in real time elsewhere (such as on a server, laptop, desktop computer, or “cloud” storage).

E. Privilege

1. The Parties will discuss in good faith the production of privilege logs.

2. With respect to privileged or work-product information generated after the filing of the complaint, the Parties are not required to include any such information in privilege logs.

3. Activities undertaken in compliance with the duty to preserve information are protected from disclosure and discovery under Fed. R. Civ. P. 26(b)(3)(A) and (B).

4. The Parties stipulated to a non-waiver order under Fed. R. Evid. 502(d), which the Court entered on November 14, 2023 (Dkt. #123).

Based on the foregoing, IT IS SO ORDERED.