RICHARD SEEBORG, District Judge.
IT IS HEREBY STIPULATED AND AGREED, by and between the parties and by their respective undersigned counsel, subject to the approval of the Court, that the following provisions shall govern procedures for discovery of electronically-stored information ("ESI") in the above-captioned action.
In addition, for good cause shown, a requesting party may request additional search terms outside of the 10-day period. The parties will meet and confer within 5 days of the request to discuss any such additional search terms. If the parties cannot agree to the additional search terms, either party shall have the option of moving the Court for resolution of the outstanding issues. With respect to the additional terms, focused terms, rather than over-broad terms shall be employed. The additional search terms shall be narrowly tailored to particular issues. Indiscriminate terms, such as the producing company's name or its product name, are inappropriate unless combined with narrowing search criteria that sufficiently reduce the risk of overproduction. A conjunctive combination of multiple words or phrases (e.g., "computer" and "system") narrows the search and shall count as a single search term. A disjunctive combination of multiple words or phrases (e.g., "computer" or "system") broadens the search, and thus each word or phrase shall count as a separate search term unless they are variants or up to 3 synonyms (e.g. "automobile" or "auto" or "car") of the same word. Use of narrowing search criteria (e.g., "and," "but not," "w/x") is encouraged to limit the production and shall be considered when determining whether to shift costs for disproportionate discovery. If the additional search terms result in an unreasonable number of documents to be reviewed and/or produced, the parties shall confer in order to revise the additional search terms.
For each custodian, the parties shall collect from all reasonably accessible data sources within the party's possession, custody or control specifically associated with that custodian, including, without limitation, the custodian's email files (whether located on an email server, the custodian's local hard drive, or in other archive or server locations), electronic files from the custodian's hard drive(s), and electronic files from any server location(s) specifically assigned for use by the custodian. Absent a showing of good cause by the requesting party, the parties shall not be obligated to conduct enterprise-wide searches for all emails to or from any of their identified custodians. Absent a showing of good cause by the requesting party, the parties shall not be obligated to collect ESI from backup tapes, but shall be obligated to maintain such non-duplicative backup tapes in the event a showing of good cause is made.
Each party shall inquire with its identified custodians about the existence of any general company document sources or repositories (both electronic and hardcopy) that may contain relevant documents. With respect to any such source identified, the party shall collect and produce documents from those sources in conformance with the provisions herein. Absent a showing of good cause by the requesting party, the parties are not obligated to collect from shared ESI sources that are accessible to the custodian and other employees (such as shared directories or company databases to which the custodian has access) if the custodian does not identify the shared source as one that may contain relevant documents.
Once collected, ESI may be de-duplicated prior to keyword searching. De-duplication may include (1) de-duplication across the data set without regard to custodian ("exact de-duplication"), and (2) de-duplication of email files that are portions of longer email chains ("near de-duplication"). If a party employs near de-duplication, it will (i) review all portions of any email chain for responsiveness and privilege, (ii) produce all non-privileged portions of an email chain if any embedded email contained in the chain is responsive, and (iii) redact only those portions of a responsive email chain that are privileged or otherwise subject to redaction under the terms of this agreement.
I, Craig R. Kaufman, am the ECF User whose identification and password are being used to file this STIPULATION AND ORDER GOVERNING E-DISCOVERY. In compliance with General Order 45.X.B, I hereby attest that counsel for Plaintiff and Counterclaim Defendants concur in this filing.
SO ORDERED.
1. Deleted, slack, fragmented, or other data only accessible by forensics.
2. Random access memory (RAM), temporary files, or other ephemeral data that are difficult to preserve without disabling the operating system.
3. On-line access data such as temporary internet files, history, cache, cookies, and the like.
4. Data in metadata fields that are frequently updated automatically, such as last-opened dates.
5. Back-up data that are substantially duplicative of data that are more accessible elsewhere.
6. Voice messages.
7. Instant messages that are not ordinarily printed or maintained in a server dedicated to instant messaging.
8. Electronic mail or pin-to-pin messages sent to or from mobile devices (e.g., iPhone and Blackberry devices), provided that a copy of such mail is routinely saved elsewhere.
9. Other electronic data stored on a mobile device, such as calendar or contact data or notes, provided that a copy of such information is routinely saved elsewhere.
10. Logs of calls made from mobile devices.
11. Server, system or network logs.
12. System-generated files or other file types not containing end user-created data.
13. Electronic data temporarily stored by laboratory equipment or attached electronic equipment, provided that such data is not ordinarily preserved as part of a laboratory report.
14. Data remaining from systems no longer in use that is unintelligible on the systems in use.