Amit P. Mehta, United States District Judge.
Anthem, Inc., a health benefits and health insurance company, suffered a massive cyberattack on its computer systems sometime between December 2014 and January 2015. The hackers stole personally identifiable information and personal health information of approximately 80 million people. Amongst those whose information was compromised were federal employees who receive their health insurance through the Federal Employee Health Benefits Program. Some individuals whose information was compromised filed suit against Anthem, Inc., its affiliates, and involved third-party corporations, ultimately leading to consolidation of those cases in the form of a class-action, multidistrict litigation in the United States District Court for the Northern District of California.
On May 13, 2016, Lead Plaintiffs in the multidistrict litigation issued a subpoena for documents to the United States Office of Personnel Management ("OPM"), the agency responsible for negotiating and administering the federal government's health insurance contracts with Anthem, Inc., and its affiliates. Those contracts authorize OPM to conduct audits of the insurance carriers' information technology systems ("IT systems"). Lead Plaintiffs' subpoena seeks records relating to OPM's IT systems audits of Anthem, Inc., and its affiliates, both before and after the cyberattack. The agency released a portion of the documents responsive to the subpoena but withheld others, claiming that the deliberative process privilege protected all the withheld documents from disclosure and the law enforcement privilege also protected certain of those documents. Lead Plaintiffs then filed, in this court, a Motion to Compel OPM to disclose the withheld records.
After the benefit of substantial briefing, oral argument, and in camera review of the documents in question, the court finds
Anthem, Inc. ("Anthem") provides health benefits and health insurance services to millions of individuals through a nationwide network of affiliate and third-party entities.
Amongst those Anthem serves are federal employees. The United States Office of Personnel Management ("OPM") negotiates and administers the federal government's contracts with insurance providers, including Anthem. See Non-Party Resp't's Mem. in Opp'n to Pls.' Mot. to Compel, ECF No. 5 [hereinafter Gov't's Opp'n], at 2. By statute, OPM's Office of the Inspector General ("OIG") has authority to periodically conduct audits of entities receiving OPM funds or benefits, such as insurance carriers that contract to provide services to federal employees. See 5 U.S.C. app. 3 § 2(1); Gov't's Opp'n at 2-3; Gov't's Opp'n, Decl. of Norbert E. Vint, ECF No. 5-2 [hereinafter Vint Decl.], ¶ 3. Consistent with that statute, Anthem's contract with OPM authorizes OIG to audit Anthem's IT systems. See Pls.' Mot. at 3.
OIG's IT systems audits benefit both OPM and the audited entity. The audits "are designed to identify weaknesses [in the audited entity's IT systems] so that the audited entity may institute appropriate safeguards against threats." Gov't's Opp'n, Decl. of Nicholas Hoyle, ECF No.
OIG's audit takes several steps to complete. The process begins with two on-site investigations, after which OIG discusses its "preliminary concerns" with the audited entity and ensures it has all the information it needs to proceed with the audit. See id. ¶¶ 11-12. Next, equipped with the necessary information, OIG analyzes vulnerabilities in the IT system and produces a draft audit report, which it releases to the audited entity for response and factual corrections. See id. ¶¶ 13, 21; Vint Decl. ¶ 7. Finally, OIG publishes a final audit report, which takes account of any corrections the audited entity made to the draft audit report, the audited entity's written response to the draft audit report, and OIG's "final determination regarding its findings and recommendations." Hoyle Decl. ¶ 13; accord Vint Decl. ¶ 7.
In 2013, OIG audited Anthem's IT systems ("the 2013 Audit") and generated a report with findings and recommendations for addressing identified weaknesses in Anthem's systems. See Pls.' Mot. at 3; Gov't's Opp'n at 3; Pls.' Mot., Ex. D [hereinafter 2013 Final Audit Report]. OPM's internal discussions regarding Anthem continued after the 2013 Audit concluded. OPM's Audit Resolution Branch reviewed the recommendations in the 2013 Final Audit Report and evaluated whether Anthem had appropriately implemented them — a process known as "closing out" a recommendation. See Gov't's Opp'n at 3-4.
One of the key issues that arose during the 2013 Audit was that Anthem, citing company policy, refused to allow OIG auditors to connect their equipment to Anthem's network to conduct a configuration compliance test. See 2013 Final Audit Report at 9-10; see also Pls.' Mot. at 4. As a result, the auditors were prevented from conducting as thorough an audit as they had planned and believed necessary. Consequently, after the 2013 Audit concluded, OPM staff discussed whether and in what ways to amend Anthem's federal contract "to ensure that OIG audit staff has sufficient access to contractor systems and materials, to prevent a recurrence of issues encountered by OIG during the 2013 Audit." Gov't's Opp'n at 3-4; accord Gov't's Opp'n, Decl. of Alan Spielman, ECF No. 5-1 [hereinafter Spielman Decl.], at 2.
In February 2015, Anthem announced that its centralized database had been hacked, compromising the security of approximately 80 million individuals' sensitive personal information. See Pls.' Mot. at 3; Gov't's Opp'n at 2; Pls.' Mot., Ex. C. Following the cyberattack, OIG conducted another audit of Anthem's IT systems, including preparation of draft and final audit reports. See Gov't's Opp'n at 4. Although the 2015 Final Audit Report is now complete and OPM has shared that report with Anthem, OPM has not yet made the report available to the public. See id. (stating that the 2015 Final Audit Report has
Following the cyberattack, a number of Anthem customers filed class action claims in various jurisdictions, generally asserting that Anthem and other involved entities "(1) fail[ed] to adequately protect Anthem's data systems, (2) fail[ed] to disclose to customers that Anthem did not have adequate security practices, and (3) fail[ed] to timely notify customers of the data breach." In re Anthem, Inc. Data Breach Litig., 162 F.Supp.3d 953, 968 (N.D. Cal. 2016). Shortly thereafter, several plaintiffs moved to consolidate the cases, and the United States Judicial Panel on Multidistrict Litigation transferred all cases "arising out of the Anthem data breach" to the Northern District of California to proceed as a single action before The Honorable Lucy H. Koh. See id.
On May 13, 2016, Lead Plaintiffs' counsel in the multidistrict litigation submitted a request to OPM's General Counsel for 17 categories of documents related to the agency's 2013 and 2015 audits of Anthem. Pls.' Mot. at 9; see also 5 C.F.R. § 295.203. Counsel simultaneously served OPM with a subpoena, demanding production of the same 17 categories of documents. See Pls.' Mot. at 9; Pls. Mot., Ex. A [hereinafter Subpoena]. Pursuant to Rule 45 of the Federal Rules of Civil Procedure, the Department of Justice, acting on OPM's behalf, objected to the subpoena. Pls.' Mot., Ex. M; see Fed. R. Civ. P. 45(d)(2)(B).
After several discussions between Lead Plaintiffs' counsel and the Department of Justice, Lead Plaintiffs narrowed their demand for documents, and OPM released various documents but continued to withhold others. See Pls.' Mot. at 11-12. OPM asserts that the documents it has not released to Lead Plaintiffs are protected under the deliberate process and law enforcement privileges. See Pls.' Mot. at 12; Gov't's Opp'n at 4-5. The withheld documents fall into three categories:
See Gov't's Opp'n at 5; Pls.' Mot. at 12-23; see also Pls.' Reply at 1.
Lead Plaintiffs' counsel subsequently filed a Motion to Compel Compliance with the Subpoena, which the Government opposed. The court held oral argument on the motion and subsequently ordered OPM to submit the withheld materials to the court for in camera inspection. See Minute Order (Jan. 9, 2017). OPM provided an unredacted, Bates-stamped copy of the withheld documents to the court.
The Government may object to a subpoena for records on the basis that the materials sought are protected from disclosure. See Tuite v. Henry, 98 F.3d 1411, 1416-17 (D.C. Cir. 1996). In doing so, however, the Government bears the burden of proving each element of the privilege it asserts. See In re Sealed Case, 737 F.2d 94, 99 (D.C. Cir. 1984). If the Government raises a qualified privilege, then the burden shifts to the party seeking disclosure to show that its need for the privileged material outweighs the Government's interest in withholding it. See Hinckley v. United States, 140 F.3d 277, 285-86 (D.C. Cir. 1998); In re Sealed Case, 121 F.3d 729, 737-38 (D.C. Cir. 1997) (per curiam).
The deliberative process privilege permits the Executive Branch to shields from disclosure those materials "that would reveal advisory opinions, recommendations[,] and deliberations comprising part of a process by which governmental decisions and policies are formulated." See In re Sealed Case, 121 F.3d at 737 (internal quotation marks omitted). The privilege embodies "the commonsense notion that agencies craft better rules when their employees can spell out in writing the pitfalls as well as strengths of policy options, coupled with the understanding that employees would be chilled from such rigorous deliberation if they feared it might become public." Judicial Watch, Inc. v. U.S. Dep't of Def., 847 F.3d 735, 739, 2017 WL 490417, at *3 (D.C. Cir. 2017) (citing N.L.R.B. v. Sears, Roebuck & Co., 421 U.S. 132, 150, 95 S.Ct. 1504, 44 L.Ed.2d 29 (1975)). Additionally, it guards against "premature disclosure of ideas that are not — or not yet — final policy." Judicial Watch, 847 F.3d at 739, 2017 WL 490417, at *3.
That a document falls within the scope of the deliberative process privilege is not dispositive of whether the Government ultimately can withhold that document in full or in part. The privileged is qualified. Otherwise privileged materials may be ordered disclosed if the court concludes the private need for disclosure outweighs the public interest in non-disclosure. In re Sealed Case, 121 F.3d at 737. When balancing those interests, the court must consider such factors as "the relevance of the evidence, the availability of other evidence, the seriousness of the litigation, the role of the government, and the possibility of future timidity by government employees" should the materials be released. Id. at 737-38 (internal quotation marks omitted). The party seeking the documents bears the burden of demonstrating that the balance of interests tips in his or her favor. See id. at 737. However, even when the court concludes the scales do not tilt towards disclosure, factual material in privileged documents must be disclosed unless that material is "so inextricably intertwined with the deliberative sections of documents that its disclosure would inevitably reveal the government's deliberations." Id.
The Executive Branch may raise the law enforcement privilege to prevent disclosure of materials that are part of law enforcement investigations. This privilege aims to protect the integrity of law enforcement techniques, sources, and investigations — disclosure of which would be "contrary to the public interest in the effective functioning of law enforcement." See Tuite v. Henry, 181 F.R.D. 175, 176-77 (D.D.C. 1998), aff'd per curiam, 203 F.3d 53 (D.C. Cir. 1999). To prevent a document's disclosure under this privilege, the Executive Branch must establish that (1) the head of the department, who had some control over the information, made a formal claim of privilege; (2) that individual had personally considered the basis for raising the privilege; and (3) the information for which the privilege is claimed, described in detail, properly falls within the scope of the privilege. In re Sealed Case, 856 F.2d 268, 271 (D.C. Cir. 1988).
This privilege, too, is qualified. In determining whether to order disclosure of privileged materials, the court must weigh the public interest in non-disclosure against the private need for the information. Id. at 272. The D.C. Circuit has identified a number of factors for the court to consider when assessing these competing interests:
Id. (quoting Frankenhauser v. Rizzo, 59 F.R.D. 339, 344 (E.D. Pa. 1973)). No single factor is dispositive. Additionally, in the context of the law enforcement privilege, "need" is "an elastic concept that does not turn only on the availability of the information from an alternative source." Tuite, 98 F.3d at 1417.
The Government submits that the deliberative process privilege protects all three categories of documents withheld from disclosure — the audit workpapers, meeting write-ups, and e-mails. See Gov't's Opp'n at 8, 16. Further, according to the Government, none of the factual material within the audit workpapers and meeting write-ups can be disclosed without revealing OIG's deliberative process. See id. at 12. Additionally, the Government contends that the law enforcement privilege protects the audit workpapers and meeting write-ups from disclosure. See id. at 22. Lead Plaintiffs respond that neither the deliberative process privilege nor the law enforcement privilege applies to any document currently withheld, but even if one or both privileges apply, Lead Plaintiffs' need for the materials outweighs any interest the Government has in withholding them. See Pls.' Mot. at 28-29, 38.
The court begins its analysis by determining which documents are eligible for protection under the deliberate process privilege and assessing whether the balance of interests weighs in favor of allowing the Government to withhold those documents. Next, the court evaluates whether those documents ineligible for protection under the deliberative process privilege are eligible for protection under the law enforcement privilege. Lastly, the court weighs the competing interests to determine whether the Government should be required to disclose those documents otherwise covered by the law enforcement privilege.
After carefully reviewing the documents in camera, the court concludes that all the withheld e-mails, but only a portion of the audit workpapers and meeting write-ups, are subject to the deliberative process privilege.
The parties disagree as to whether the withheld materials are "predecisional" and whether they are "deliberative." The Government believes that the audit workpapers, meeting write-ups, and e-mails are predecisional because they "contain[] specific analysis and recommendations regarding vulnerabilities" in Anthem's IT systems that informed the content of the 2013 Final Audit Report, modifications to Anthem's contract, and conclusions regarding Anthem's compliance with OPM's recommendations. See Gov't's Opp'n at 8, 16.
The court concludes that Lead Plaintiffs' conception of predecisional materials is far too narrow. Predecisional materials are those that predate an agency's decision or adoption of a policy and which comprise part of a process by which the Government reached that decision or policy. See Judicial Watch, 449 F.3d at 151; In re Sealed Case, 121 F.3d at 737. There can be little doubt that the audit workpapers and meeting write-ups are predecisional in nature. The Government represents that OPM's final "decision" with respect to the audit workpapers and meeting write-ups is its 2013 Final Audit Report, which results from the collection and review of the interim materials the audit team generates in the process of making its findings and recommendations. See Oral Argument Tr. (rough draft), at 25.
The withheld emails are equally predecisional. "Developing a `position' on actions that another decision-maker might take is workaday agency business, not nefarious government activity, and opinions meant to contribute towards that deliberative process" are privileged. ICM Registry, LLC v. U.S. Dep't of Commerce, 538 F.Supp.2d 130, 135 (D.D.C. 2008). The withheld e-mails document "workaday agency business" concerning (1) whether and how to modify OPM's contracts with Anthem and other health insurers, and (2) whether to close out audit recommendations made in connection with the 2013 Audit. The former category of e-mails comprises part of OPM's process of amending carrier contracts to ensure that auditors are able to carry out their statutory duties by optimizing their access to health insurers' systems. The latter category of e-mails comprises part of OPM's process of evaluating whether Anthem has the ability to comply and is complying with its federal contract. See Spielman Decl. at 2 (explaining that the e-mails and their attachments "are utilized to make complicated and sensitive decisions related to OPM's contracts with health benefits carriers"); cf. Hoyle Decl. ¶ 4 (explaining that the very purpose of the audit is to "evaluate the effectiveness of the entity's preventive measures and recommend remedies as needed"). These are precisely the types of agency decision-making
Consequently, the audit workpapers, meeting write-ups, and e-mails comprise a part of the decisional processes that resulted in the 2013 Final Audit Report and inform whether and under what terms the Government contracts with Anthem and others in the future. Accordingly, those materials are "predecisional" within the meaning of the deliberative process privilege.
Predecisional materials are not inherently "deliberative." To be "deliberative," a document must reflect "part of the agency give-and-take by which the decision itself is made." Hinckley, 140 F.3d at 284 (internal quotation marks omitted). The Government submits that the materials it has withheld are deliberative because they contain federal employees' preliminary notes, thoughts, and opinions regarding the content in the 2013 Final Audit Report, modifications to health insurers' contracts, and Anthem's compliance with OPM's recommendations. See Gov't's Opp'n at 11-12, 16-17. Lead Plaintiffs fundamentally disagree that the withheld materials relate to the agency's ultimate adoption of any policy or implicate any high-level decisions and, accordingly, contend that the withheld documents cannot be considered deliberative. Pls.' Mot. at 34-35.
Two pages of the audit workpapers qualify as "deliberative." The withheld materials include two computer screenshots (Anthem_00023, Anthem_00024) that reveal specific sub-components of OIG's audit procedure, convey auditors' progress in their audit of Anthem, and contain notes and preliminary recommendations concerning the Anthem audit. These materials plainly reflect sensitive, internal deliberations that are quintessentially "deliberative" within the meaning of the privilege. Cf. Hamilton Secs. Grp., 106 F.Supp.2d at 32 (holding draft audit report was deliberative because it "d[id] not merely involve the collection and compilation of publicly available data," but rather, "judgments about what to collect, how to collect, and how to present it"); Moye, 376 F.3d at 1279 (holding that audit workpapers that "document the entire body of collaborative work performed by the auditors" in the process of performing the audit are deliberative).
The remaining pages of the audit workpapers, however, do not qualify as "deliberative." The withheld materials contain two sign-in sheets for meetings conducted in connection with the 2013 Audit (Anthem_00005, Anthem_00017). These pages reflect only who attended the meeting, the topic of the meeting, and the date and time of the meeting; not the productive content of the meeting. Those materials are not deliberative. See, e.g., MacNamara v. City of New York, 249 F.R.D. 70, 81 (S.D.N.Y. 2008) (holding that documents listing individuals in attendance at meetings of the municipal Civil Disturbance Subcommittee were not deliberative). Additionally, the Government withheld an e-mail chain containing OPM's request for Anthem's official policy statement as to why OPM was not permitted to perform its own vulnerability
The court finds that portions of three of the five meeting write-ups are "deliberative" within the meaning of the deliberative process privilege.
The other three reports — on configuration management (Anthem_00001-Anthem_00004), network security (Anthem_00011-Anthem_00016), and special investigations and fraud (Anthem_00021-Anthem_00022) — contain mostly factual information, but also include some subjective impressions of the auditors regarding pertinent points raised at the meetings and subsequent steps to be taken in response to meeting discussions. The auditors' subjective impressions reflect the agency's internal thoughts and considerations and are protected by the privilege. See id. The factual information contained adjacent to those subjective impressions, however, is plainly separate from those subjective impressions. The court is satisfied that the factual material is not presented in a way that "distill[s] or highlight[s] particular facts," but rather, simply reflects information that Anthem provided OPM as part of
Lastly, the court concludes that the withheld e-mails (Anthem_00025-Anthem_00267) between and amongst federal employees are uniformly deliberative. These e-mails present written evidence of agency "brainstorming," encompassing a wide range of suggestions, opinions, productive disagreements, and preliminary conclusions involving revisions to OPM's standard federal contracts; recommendations for modifications to Anthem's contract following the cyberattack; and discussions over whether to accept Anthem's responses to audit recommendations. These materials are, at their core, the back-and-forth deliberative process required for an agency to reach a decision. See id.; see also Moye, 376 F.3d at 1278 (explaining that "materials embodying officials' opinions are ordinarily exempt from disclosure"). They do not contain segregable factual information. Accordingly, the withheld e-mails are "deliberative" within the meaning of the deliberative process privilege.
In sum, only a portion of the withheld materials are subject to the deliberative process privilege. Of the audit workpapers, only the two screenshots (Anthem_000023, Anthem_00024) are subject to the deliberative process privilege. In contrast, the sign-in sheets (Anthem_00005, Anthem_00017); e-mail request for a policy statement from Anthem (Anthem_00018-Anthem_00020); and information request memoranda between OPM and Anthem (Anthem_00007, Anthem_00008) are not subject to the deliberative process privilege. With respect to the meeting write-ups, the enterprise security and logical access reports (Anthem_00006, Anthem_00009-10) contain only factual material and are not subject to the privilege, but the configuration management, network security, and special investigations and fraud reports (Anthem_00001-Anthem_00004, Anthem_00011-Anthem-00016, Anthem_00021-Anthem-00022) contain certain material that is both predecisional and deliberative, rendering those portions of the documents subject to the privilege. Lastly, all the withheld electronic correspondence between and amongst government actors (Anthem_00025-Anthem_00267) is subject to the deliberative process privilege.
Documents, or portions thereof, that are subject to the deliberative process privilege may nonetheless be disclosed if Lead Plaintiffs' demonstrated need for the document outweighs the Government's interest in withholding it. Lead Plaintiffs assert that they need all the withheld materials in order to effectively support their position in the multidistrict litigation in California. See Pls.' Mot. at 38-39. They contend that the materials are not only relevant to that serious litigation, but also that OPM is the only source on which they can depend to obtain the materials. Id. at 38-40. Moreover, they submit, these materials were intended to
The court agrees with the Government. Lead Plaintiffs have not sufficiently shown that their need to use documents and portions of documents protected by the deliberative process privilege outweighs the Government's interest in withholding those documents.
The only audit workpapers the deliberative privilege process protects in full — the two screenshots — reveal information at the center of the audit process and the auditor's notations. Lead Plaintiffs' need to understand the audit process does not logically extend to an image of the software used to conduct that audit. Moreover, the screenshots contain auditors' subjective impressions that, if disclosed, would risk chilling the critical eye with which auditors must perform their duties. Indeed, the honesty and forthrightness of the entire audit process could be compromised or diminished if government employees undertook the steps of an audit believing their contemporaneous annotations would be subject to disclosure in later litigation.
Similar considerations lead the court to conclude that the internal agency e-mails concerning audit close-out issues and potential contract modifications, as well as those portions of the meeting write-ups subject to the deliberative process privilege, also should not be disclosed. While these categories of documents may be available only from OPM, see Pls.' Mot. at 39, their disclosure too greatly risks thwarting employees' ability to freely communicate and exchange ideas. See Judicial Watch, 847 F.3d at 739-40, 2017 WL 490417, at *3. Furthermore, substantial portions of the withheld e-mails regarding contract modification are of limited or no relevance to the underlying multidistrict litigation. Many pertain to OPM's development of future federal benefits and insurance contracts, generally, without any reference to Anthem, specifically. These e-mails are of no obvious relevance in the underlying litigation, but are of great importance to the Government, given that they reflect employees' back-and-forth discussions over the proper character and content of federal contracts. To the extent other e-mails are specific to Anthem, either regarding contract modification or the closing out of particular recommendations, none pertain specifically to the data breach or its causes. Therefore, what minimal interest, if any, Lead Plaintiffs have in those records is still outweighed by the substantial risk of chilling government actors' ability
Overall, although the scope and allegations of the underlying litigation plainly are serious, maintaining the confidentiality of the withheld information is of equal, if not greater, import. Under these circumstances, on the record presented and with the benefit of having reviewed the materials in camera, the court cannot say Lead Plaintiffs have carried their burden of proving the balance of interests tips in favor of disclosure.
Because the court concludes that several audit workpapers, two meeting write-ups, and portions of three other meeting write-ups are not subject to the deliberative process privilege, the court must reach the Government's secondary argument that those materials are protected from disclosure under the law enforcement privilege. The Government bears the burden of proving the information for which the law enforcement privilege is claimed falls within the scope of the privilege. See In re Sealed Case, 856 F.2d at 271.
Lead Plaintiffs maintain that the privilege cannot apply to the audit workpapers and meeting write-ups because these materials were not created for and do not otherwise relate to an ongoing criminal investigation — rather, in Lead Plaintiffs' view, the audit was a routine government act. See Pls.' Mot. at 28-29. The Government submits that OPM's audits are conducted, in part, for law enforcement purposes, as part of the OIG's statutory duty to "prevent and detect fraud and abuse." See Gov't's Opp'n at 20 (alterations omitted) (quoting 5 U.S.C. app. 3 § 2). Consequently, the Government's argument continues, the audit workpapers and meeting write-ups at issue here are subject to the privilege because they are written evidence of law enforcement techniques the agency uses "to uncover weaknesses and potential violations of law or practice, should they exist," and, therefore, are protected from disclosure by the law enforcement privilege. Id. at 21; see also id. at 20-22.
The Government advances three additional arguments against disclosure. First, the Government represents that revelation of these materials would impair OPM's ability to conduct future investigations because companies would become aware of how OPM conducts its audits. See id. at 22. Second, and relatedly, the Government believes disclosing the audit workpapers and meeting write-ups would inappropriately make public what federal auditors found significant about Anthem's audit, thereby encouraging companies to tailor their responses to OIG audits and, correlatively, jeopardizing the accuracy of OIG's audit findings and recommendations. See id. at 23. Third, the Government fears that disclosing these materials will also have the effect of chilling auditors' candidness in describing the issues they encounter. See id.
The court assumes, without deciding, that the law enforcement privilege applies to these materials because the court ultimately finds that the balance of interests tips in favor of disclosing them to Lead Plaintiffs. First and foremost, these audit workpapers and meeting write-ups do not pertain to an ongoing or closed criminal or civil investigation of a particular law violation and, therefore, fall outside the heartland of the types of records the privilege is
Furthermore, disclosure of these materials simply does not carry the risks the Government anticipates. First and foremost, all the materials to be disclosed will be covered by the protective order in the underlying litigation. See Proposed Stipulated Protective Order, In re Anthem, No. 15-2617 (N.D. Cal. Sept. 18, 2015), ECF No. 292; Order Granting Stipulated Protective Order, In re Anthem, No. 15-2617 (N.D. Cal. Sept. 21, 2015), ECF No. 293. Additionally, with respect to the Government's fears that disclosure will cause companies like Anthem to be less candid with OIG auditors in the future, those fears are mitigated by the fact that the companies are contractually obligated to cooperate during OIG's IT systems audits. The companies also are incentivized to supply requested information to auditors to promote renewal of their federal contract. Moreover, given that OPM posts redacted final audit reports on OIG's website, see Vint Decl. ¶ 9, companies are further incentivized to cooperate with government auditors to avoid the public embarrassment of their non-cooperation coming to light.
Therefore, the court concludes that, even assuming the law enforcement privilege is broad enough to encompass the materials in this litigation that are not protected by the deliberative process privilege, the balance of interests warrants disclosure.
In light of the foregoing, the court grants in part and denies in part Lead Plaintiffs' Motion to Compel. The court concludes the audit workpapers that are screenshots of internal auditing procedures (Anthem_000023, Anthem_00024) and the e-mails between and amongst OPM employees (Anthem_00025-Anthem_00267) are privileged and shall not be disclosed. The court orders partial disclosure, in accordance with the Order accompanying this Memorandum Opinion, of the three meeting write-ups pertaining to Anthem's configuration management (Anthem_00001-Anthem_00004), network security (Anthem_00011-Anthem_00016), and special investigations and fraud (Anthem_00021-Anthem_00022). Further, the Government shall disclose in full the written reports pertaining to meetings on Anthem's "enterprise security" and "logical access" (Anthem_00006, Anthem_00009-10). Lastly, the court orders disclosure in full of the audit workpapers comprising the sign-in sheets (Anthem_00005, Anthem_00017); e-mail request for a policy statement from Anthem (Anthem_00018-Anthem_00020); and information request memoranda between OPM and Anthem (Anthem_00007, Anthem_00008).
A separate Order accompanies this Memorandum Opinion.
Anthem provides its services through a number of affiliate and third-party entities. The Third Consolidated Amended Class Action Complaint in the multidistrict litigation named as defendants not only Anthem, but also 27 Anthem affiliates, the Blue Cross Blue Shield Association, and 14 non-Anthem Blue Cross Blue Shield companies. See Redacted Version of Third Am. Compl., In re Anthem, Inc. Data Breach Litig., No. 15-2617 (N.D. Cal. July 11, 2016), ECF No. 537-3, ¶¶ 123-51, 153-66. Lead Plaintiffs' subpoena directed OPM to release documents pertaining to its audit of "Anthem," which the subpoena defined to include Anthem and the 27 Anthem affiliates. See Pls. Mot., Ex. A [hereinafter Subpoena], Sched. A, at 1-2. This opinion's use of "Anthem" collectively refers to Anthem, Inc., and all those affiliated entities directed to respond to Lead Plaintiffs' subpoena; it does not encompass any entity not listed in the subpoena, even if a party to the multidistrict litigation.