throbber
Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 1 of 14
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`SOUTHERN DISTRICT OF NEW YORK
`
`
`FINCO SERVICES, INC.,
`
`
`Plaintiff,
`
`
`v.
`
`FACEBOOK, INC., CALIBRA, INC.,
`JLV, LLC and CHARACTER SF, LLC,
`
`
`Defendants.
`
`
`
`
`
`
`
`
`
`CASE NO. 1:19-cv-09410 (PKC) (KHP)
`
`
`JOINT STIPULATION AND [PROPOSED]
`ORDER RE: DISCOVERY OF
`ELECTRONICALLY STORED
`INFORMATION
`
`1.
`PURPOSE
`This Order will govern discovery of electronically stored information (“ESI”) in this case
`as a supplement to the Federal Rules of Civil Procedure, and any other applicable orders and rules.
`The parties and the Court recognize that this Joint Stipulation and [Proposed] Order is based on
`facts and circumstances as they are currently known to each party, that the electronic discovery
`process is iterative, and that additions and modifications to this Joint Stipulation and [Proposed]
`Order may become necessary as more information becomes known to the parties.
`For the avoidance of doubt, this stipulation is limited to e-discovery; nothing herein shall
`relieve the parties of the duty to conduct a reasonable search for hard copy documents in response
`to a requesting party’s discovery requests in accordance with the Federal Rules of Civil Procedure.
`And nothing in this ESI stipulation shall waive in whole or in part any objection raised by a party
`in connection with specific discovery requests served in this action.
`
`
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 2 of 14
`
`
`
`2.
`COOPERATION AND PROPORTIONALITY
`The parties are aware of the importance the Court places on cooperation and commit to
`cooperate in good faith throughout the matter consistent with this Court’s Guidelines for the
`Discovery of ESI to promote the “just, speedy, and inexpensive determination” of this action, as
`required by Fed. R. Civ. P. 1. The parties are expected to use reasonable, good faith and
`proportional efforts to preserve, identify and produce relevant and discoverable information
`consistent with Fed. R. Civ. P. 26(b)(1). This includes identifying appropriate limits to discovery,
`including limits on custodians, identification of relevant and discoverable subject matter, time
`periods for discovery, and other parameters to limit and guide preservation and discovery issues.
`The failure of counsel or the parties to cooperate in facilitating and reasonably limiting discovery
`requests and responses will be considered in cost-shifting determinations.
`3.
`LIAISON
`Each party shall designate an individual or individuals as e-discovery liaison(s) who must:
`(a)
`be prepared to meet and confer on discovery-related matters and to participate in
`discovery dispute resolution;
`be knowledgeable about the party’s discovery efforts; and
`be, or have reasonable access to those who are, familiar with the party’s electronic
`systems and capabilities in order to explain those systems and answer relevant
`questions; and be, or have reasonable access to those who are, knowledgeable about
`the technical aspects of e-discovery, including electronic document storage,
`organization, and format issues, and relevant information retrieval technology,
`including search methodology.
`4.
`PRESERVATION
`Each party is responsible for taking reasonable and proportionate steps to preserve relevant
`and discoverable ESI within its possession, custody or control consistent with Sedona Conference
`Principle 6 which instructs that “[r]esponding parties are best situated to evaluate the procedures,
`methodologies, and technologies appropriate for preserving and producing their own electronically
`
`(b)
`(c)
`
`
`
`2
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 3 of 14
`
`
`
`(b)
`
`(c)
`
`stored information.”1 The parties have discussed their preservation obligations and needs and agree
`that preservation of potentially relevant ESI will be reasonable and proportionate. To reduce the
`costs and burdens of preservation and to ensure proper ESI is preserved, the parties agree that:
`(a)
`Parties shall preserve non-duplicative, discoverable information
` in their
`possession, custody or control. Parties, however, shall not be required to modify
`the procedures used by them in the usual course of business to back-up and archive
`data, such as automatic email back-up or other archival systems.
`Subject to and without waiving any protection described in Section 4(a) above, the
`parties agree that:
`1.
`Only ESI created or received after June 1, 2018 will be preserved;
`2.
`The parties shall agree on the custodians for whom they believe ESI should
`be preserved, including the addition of additional custodians as necessary;
`These data sources are not reasonably accessible because of undue burden or cost
`pursuant to Fed. R. Civ. P. 26(b)(2)(B) and ESI from these sources will be
`preserved pursuant to normal business retention, but not searched, reviewed, or
`produced, unless otherwise ordered by the Court upon a motion of a party:
`1.
`backup systems and/or tapes used for disaster recovery; and
`2.
`systems no longer in use that cannot be accessed.
`Among the sources of data the parties agree are not reasonably accessible, based on
`mutual representation of the parties’ counsel, the parties agree not to preserve,
`collect, process, review and/or produce the following:
`1.
`Deleted, slack, fragmented, or unallocated data only accessible by forensics.
`2.
`Random access memory (RAM), temporary files, or other ephemeral data
`that are difficult to preserve without disabling the operating system.
`
`(d)
`
`
`1 The Sedona Principles, Third Edition: Best Practices, Recommendations & Principles for Addressing Electronic
`Document Production, 19 SEDONA CONF. J. 118 (2018).
`
`
`
`3
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 4 of 14
`
`
`
`3.
`
`4.
`
`5.
`
`6.
`7.
`
`On-line data such as temporary internet files, history, cache, cookies, and
`the like.
`Data in metadata fields that are frequently updated automatically, such as
`last-opened dates.
`Back-up data that are substantially duplicative of data that are more
`accessible elsewhere.
`Voice messages.
`Instant messages and chats that are not chronicled to an email archive
`system.
`Sound recordings, including, without limitation, .mp3 and .wav files
`Video recordings
`Electronic data (e.g. email, calendars, contact data, and notes) sent to or
`from mobile devices (e.g., iPhone, iPad, Android, and Blackberry devices),
`provided that a copy of all such electronic data is routinely saved elsewhere
`(such as on a server, laptop, desktop computer, or “cloud” storage).
`11. Mobile device activity logs
`12.
`Server, system, or network logs.
`13.
`Dynamic fields in databases or log files not stored or retained in the usual
`course of business.
`Data remaining from systems no longer in use that is unintelligible on the
`systems in use.
`Information created or copied incidental to the deployment, maintenance,
`retirement, and/or disposition of computer equipment by the party, such as
`incidental copies of a hard drive made when information is transferred from
`an old, retired device to a new device.
`
`8.
`9.
`10.
`
`14.
`
`15.
`
`
`
`4
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 5 of 14
`
`
`
`16.
`
`requires unreasonable,
`forms of ESI whose preservation
`Other
`disproportionate, and/or non-routine, affirmative measures that are not
`utilized in the ordinary course of business.
`SEARCH
`The parties agree that in responding to an initial Fed. R. Civ. P. 34 request, or earlier
`if appropriate, they will meet and confer about methods to search ESI in order to
`identify ESI that is subject to production in discovery and filter out ESI that is not
`subject to discovery.
`Nothing in this Order shall be construed or interpreted as precluding a producing
`party from performing a responsiveness review to determine if documents captured
`by search terms are in fact relevant to the requesting party’s request. Further,
`nothing in this Order shall be construed or interpreted as requiring the production
`of all documents captured by any search term if that document is in good faith and
`reasonably deemed not relevant to the requesting party’s request.
`Each party will use its best efforts to filter out common system files and application
`executable files by using a commercially reasonable hash identification process.
`Hash values that may be filtered out during this process are located in the National
`Software Reference Library (“NSRL”) NIST hash set list.
`De-Duplication. Each party is required to produce only a single copy of a
`responsive document and each party may de-duplicate responsive ESI (based on
`MD5 hash values at the document level) across Custodians. For emails with
`attachments, the hash value is generated based on the parent/child document
`grouping. To the extent that de-duplication through MD5 hash values is not
`possible, the parties shall meet and confer to discuss any other proposed method of
`de-duplication.
`Email Threading. Where multiple email messages are part of a single chain or
`“thread,” a party is only required to produce the most inclusive message (“Last In
`
`5.
`(a)
`
`(b)
`
`(c)
`
`(d)
`
`(e)
`
`
`
`5
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 6 of 14
`
`
`
`6.
`
`7.
`
`8.
`(a)
`
`Time Email”) and need not produce earlier, less inclusive email messages or
`“thread members” that are fully contained, including attachments and including
`identical senders and recipients, within the Last In Time Email. Only email
`messages for which the parent document and all attachments are contained in the
`Last In Time Email will be considered less inclusive email messages that need not
`be produced
`PRODUCTION FORMATS
`The parties agree to produce documents in the formats described in Appendix 1 to
`this Order. If particular documents warrant a different format, the parties will
`cooperate to arrange for the mutually acceptable production of such documents.
`The parties agree not to degrade the searchability of documents as part of the
`document production process.
`PHASING
`When a party propounds discovery requests pursuant to Fed. R. Civ. P. 34, the
`parties agree to phase the production of ESI. Following the initial production, the
`parties will continue to prioritize the order of subsequent productions.
`DOCUMENTS PROTECTED FROM DISCOVERY
`Pursuant to Fed. R. Evid. 502(d) and (e), the production of a privileged or work-
`product-protected document, whether inadvertent or otherwise, is not a waiver of
`privilege or protection from discovery in the pending case or in any other federal
`or state proceeding. Disclosures among defendants’ attorneys of work product or
`other communications relating to issues of common interest shall not affect or be
`deemed a waiver of any applicable privilege or protection from disclosure. For
`example, the mere production of privileged or work-product-protected documents
`in this case as part of a mass production is not itself a waiver in this case or in any
`other federal or state proceeding. A producing party may assert privilege or
`protection over produced documents at any time by notifying the receiving party in
`
`
`
`6
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 7 of 14
`
`
`
`writing of the assertion of privilege or protection. Information that contains
`privileged matter or attorney work product shall be returned immediately or
`destroyed if such information appears on its face to have been inadvertently
`produced, or if requested. The receiving party must return, sequester, or destroy
`ESI that the producing party claims is privileged or work product protected as
`provided in Rule 26(b)(5)(B) and may use such ESI only to challenge the claim of
`privilege or protection.
`Activities undertaken in compliance with the duty to preserve information are
`protected from disclosure and discovery under Fed. R. Civ. P. 26(b)(3)(A) and (B).
`The parties agree to furnish logs that comply with Fed. R. Civ. P. 26(b)(5) and any
`other legal requirements for all documents withheld or redacted on the basis of
`privilege, attorney work product, or similar doctrines. Privilege logs may be
`produced on a rolling basis or after all productions are complete, but prior to the
`close of discovery.
`Communications and documents that post-date the filing of the complaint need not
`be placed on a privilege log.
`Parties agree to log only the Last In Time Emails in a thread and need not log earlier,
`less inclusive email messages or “thread members” that are fully contained within
`the Last In Time Email.
`Communications may be identified on a privilege log by category, rather than
`individually, if appropriate.
`Nothing in this Order shall be interpreted to require disclosure of irrelevant
`information or relevant information protected by the attorney-client privilege,
`work-product doctrine, or any other applicable privilege or immunity. The parties
`do not waive any objections to the production, discoverability, admissibility, or
`confidentiality of documents and ESI.
`
`(b)
`
`(c)
`
`(d)
`
`(e)
`
`(f)
`
`(g)
`
`
`
`7
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 8 of 14
`
`
`
`9.
`MODIFICATION
`This Stipulated Order may be modified by a Stipulated Order of the parties or by the Court
`for good cause shown.
`
`
`SO STIPULATED AND AGREED.
`
`
`
`
`
`
`
`Dated: March 30, 2020
`
` /s/ Dale M. Cendali
`Dale M. Cendali
`Johanna Schmitt
`Jordan Romanoff
`KIRKLAND & ELLIS LLP
`601 Lexington Avenue
`New York, NY 10022
`(212) 446-4800
`dale.cendali@kirkland.com
`johanna.schmitt@kirkland.com
`jordan.romanoff@kirkland.com
`
`Counsel for Defendants Facebook, Inc.,
`Calibra, Inc. and JLV, LLC
`
`Dated: March 30, 2020
`
` /s/ Kandis M. Koustenis (with permission)
`Kandis M. Koustenis
`BEAN KINNEY & KORMAN PC
`2311 Wilson Boulevard, Suite 500
`Arlington, VA 22201
`(703) 525-4000
`(703) 525-2207 (fax)
`kkoustenis@beankinney.com
`
`Ethan Horwitz
`CARLTON FIELDS P.A.
`405 Lexington Avenue, 36th Floor
`New York, New York 10174
`(212) 380-9617
`(212) 785-5203 (fax)
`ehorwitz@carltonfields.com
`
`Counsel for Plaintiff Finco Services, Inc.
`
`
`
`
`
`
`SO ORDERED.
`
`
`Dated: __________________________
`New York, New York
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`______________________________________
`P. Kevin Castel, U.S. District Judge
`Katherine H. Parker, U.S. Magistrate Judge
`
`
`
`8
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 9 of 14
`
`
`
`1.
`
`APPENDIX 1: PRODUCTION FORMAT
`Production Components. Except as otherwise provided below, ESI shall be
`produced in accordance with the following specifications:
`
`(a) an ASCII delimited data file (.DAT) using standard delimiters;
`
`(b) an image load file (.OPT) that can be loaded into commercially acceptable
`production software (e.g. Concordance);
`
`2.
`
`(c) page level TIFF images;
`
`(d) and document level .TXT files for all documents containing extracted full text
`or OCR text.
`If a particular document warrants a different production format, the parties
`will cooperate in good faith to arrange for a mutually acceptable production
`format.
`
`Production Media and Access Controls. Documents shall be encrypted and
`produced through electronic means, such as secure file sharing methods (e.g.
`FTP), or on CD, DVD, flash drive or external hard drive (“Production Media”).
`Each piece of Production Media shall identify a production number corresponding
`to the production volume (e.g. “VOL001”). Each piece of Production Media shall
`also identify: (a) the producing party’s name; (2) the production date; (3) the
`Bates Number range of the materials contained on the Production Media.
`Nothing in this Order will preclude or impair any and all protections provided the
`parties by any Protective Order(s) agreed and entered into by the parties. Any data
`produced by the producing party must be protected in transit, in use, and at rest by
`all in receipt of such data. Parties will use best efforts to avoid the unnecessary
`copying or transmittal of produced documents. Any copies made of produced data
`
`
`
`9
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 10 of 14
`
`
`
`3.
`
`4.
`
`must be kept on media or hardware employing whole-disk or folder level
`encryption or otherwise secured on information systems and networks in a manner
`consistent with the best practices for data protection. If questions arise, Parties will
`meet and confer to ensure security concerns are addressed prior to the exchange of
`any documents.
`Data Load Files/Image Load Files. Each TIFF in a production must be
`referenced in the corresponding image load file. The total number of documents
`referenced in a production’s data load file should match the total number of
`designated document breaks in the image load file(s) in the production. The total
`number of pages referenced in a production’s image load file should match the
`total number of TIFF files in the production. All images must be assigned a
`unique Bates number that is sequential within a given document and across the
`production sets. The Bates Numbers in the image load file must match the
`corresponding documents’ beginning Bates numbers in the data load file. The
`total number of documents in a production should match the total number of
`records in the data load file. Load files shall not vary in format or structure within
`a production, or from one production to another.
`Metadata Fields. Each of the metadata and coding fields set forth below that can
`be extracted shall be produced for each document. The parties are not obligated to
`populate manually any of the fields below if such fields cannot be extracted from
`a document, with the exception of the following: (a) BEGBATES, (b)
`ENDBATES, (c) BEGATTACH, (d) ENDATTACH, (e) CUSTODIAN, (f)
`DEDUPED_CUSTODIAN, (g) CONFIDENTIALITY, (h) REDACTIONS, (i)
`NATIVEFILEPATH, (j) TEXTFILEPATH, and (k) HASHVALUE, which should
`be populated by the party or the party’s vendor. The parties will make reasonable
`efforts to ensure that metadata fields automatically extracted from the documents
`
`
`
`10
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 11 of 14
`
`
`
`correspond directly to the information that exists in the original documents.
`
`Field Name
`
`BEGBATES
`
`ENDBATES
`
`BEGATTACH
`
`ENDATTACH
`
`CUSTODIAN
`
`Field Description
`Beginning Bates number as stamped on the production
`image
`Ending Bates number as stamped on the production image
`First production Bates number of the first document in a
`family
`Last production Bates number of the last document in a
`family
`
`Individual from whom the documents originated
`
`CONFIDENTIALITY
`
`Confidentiality designation assigned to document
`
`NATIVEFILEPATH
`
`Native File Link (Native Files only)
`
`TEXTFILEPATH
`
`HASHVALUE
`
`AUTHOR
`
`DOCDATE
`
`DATEMODIFIED
`
`FROM
`
`TO
`
`CC
`
`BCC
`
`Path to extracted text/OCR file for document
`
`MD5 hash value of document
`Any value populated in the Author field of the document
`properties (Edoc or attachment only)
`Date the document was created (format: MM/DD/YYYY)
`(Edoc or attachment only)
`Date when document was last modified according to
`filesystem information (format: MM/DD/YYYY) (Edoc or
`attachment only)
`The name and email address of the sender of the email
`All recipients that were included on the “To” line of the
`email
`
`All recipients that were included on the “CC” line of the
`email
`
`All recipients that were included on the “BCC” line of the
`email
`
`DATRECEIVED
`
`DATESENT
`
`Date email was received (format: MM/DD/YYYY)
`
`Date email was sent (format: MM/DD/YYYY)
`
`
`
`11
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 12 of 14
`
`
`
`Field Name
`FILESIZE
`
`Field Description
`The original file size of the produced document
`
`5.
`
`6.
`
`7.
`
`8.
`
`TIFFs. Documents that exist only in hard copy format shall be scanned and
`produced as TIFFs. Documents that exist as ESI shall be converted and produced
`as TIFFs, except as provided below. The parties shall take reasonable efforts to
`process presentations (e.g. MS PowerPoint) with hidden slides and speaker’s
`notes unhidden, and to show both the slide and the speaker’s notes on the TIFF
`image. Unless excepted below, single page, black and white, Group IV TIFFs
`should be provided, at least 300 dots per inch (dpi) for all documents. Each TIFF
`image shall be named according to a unique corresponding Bates number
`associated with the document. Each image shall be branded according to the
`Bates number and the agreed upon confidentiality designation. Original document
`orientation should be maintained (i.e., portrait to portrait and landscape to
`landscape). Where the TIFF image is unreadable or has materially degraded the
`quality of the original, the producing party shall provide a higher quality TIFF
`image or the native or original file.
`Color. The parties may request color copies of a limited number of documents
`where color is necessary to accurately interpret the document.
`Text Files. A single multi-page text file shall be provided for each document, and
`the filename should match its respective TIFF filename. When possible, the text
`of native files should be extracted directly from the native file. Text files will not
`contain the redacted portions of the documents. A commercially acceptable
`technology for optical character recognition “OCR” shall be used for all scanned,
`hard copy documents and for documents with redactions.
`Native files. Spreadsheets (e.g. MS Excel) will be produced in native format
`unless redacted, in which instance, spreadsheets shall be produced in TIFF with
`
`
`
`12
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 13 of 14
`
`
`
`OCR Text Files. Presentation files (e.g. MS PowerPoint) may also be produced in
`native format if necessary for the most legible production of the information
`contained in those files. To the extent that they are produced in this action, audio,
`video, and multi-media files will be produced in native format. Native files shall
`be produced with a link in the NATIVEFILEPATH field, along with extracted
`text (where extracted text is available) and applicable metadata fields set forth in
`paragraph 4 above. A Bates numbered TIFF placeholder indicating that the
`document was provided in native format must accompany every native file. If
`good cause exists to request production of files, other than those specifically set
`forth above, in native format, the requesting party may request such production
`and provide an explanation of the need for native file review, which request shall
`not unreasonably be denied. The parties agree to work out a protocol for use of
`native files at depositions, hearings, or trial.
`Confidentiality Designation. Responsive documents in TIFF format will be
`stamped with the appropriate confidentiality designations in accordance with the
`protective order entered in this matter. Each responsive document produced in
`native format will have its confidentiality designation identified in the filename of
`the native file and indicated on its corresponding TIFF placeholder.
`Databases and Other Structured Data. The parties shall meet and confer
`regarding the production format and scope of data contained in databases in order
`to ensure that any information produced is reasonably usable by the receiving
`party and that its production does not impose an undue burden on the producing
`party, by, for example, requiring development of reports and/or software code to
`extract the information. To avoid doubt, information will be considered
`reasonably usable when produced in CSV format, tab-delimited text format,
`Microsoft Excel format, or Microsoft Access format. To the extent a party is
`constrained from producing responsive ESI because of a third party license or
`
`9.
`
`10.
`
`
`
`13
`
`

`

`Case 1:19-cv-09410-PKC Document 70 Filed 03/30/20 Page 14 of 14
`
`because software necessary to view the ESI is hardware-dependent, the parties
`shall meet and confer to reach an agreement on alternative methods to enable the
`requesting party to view the ESI.
`
`
`
`
`
`
`
`14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket