Richmond Journal of Law and Technology

The first exclusively online law review.

Inspection or Detention

 

border-searches.jpg.size.custom.crop.1086x724

By: Eleanor Faust,

 

Reports have surfaced that in the days preceding President Trump’s executive order effectuating an immigration ban, the Center for American-Islamic Relations (CAIR) filed legal complaints concerning hostile interrogations by Customs and Border Patrol agents.[1] The complaints allege that the agents demanded the travelers unlock their phones and provide them with social media account names and passwords.[2] Courts have held that customs agents have the authority to manually search devices at the border as long as the searches are not made solely on the basis of race or national origin.[3] This does not mean that travelers are required to unlock their phones but if they refuse, they run the risk of being detained for hours for not complying with the agent’s request.[4]

When returning home from a trip abroad, you expect to feel welcomed upon arrival but that has not been the case for many recently. When Sidd Bikkannavar got off the plane in Houston from a personal trip to South America, he was detained by the U.S. Customs and Border Patrol.[5] Bikkannavar is not a foreign traveler visiting the United States. He is a natural born U.S. citizen who works at NASA’s Jet Propulsion Laboratory. He has also undergone a background check and is enrolled in Global Entry to allow expedited entry into the United States.[6] While he was detained the customs agents demanded his phone and access PIN without giving him any information as to why he was being questioned.[7] A major concern is that Bikkannavar had a NASA issued phone that very well could have contained sensitive information that should not have been shared.[8] For a number of different professionals, these types of border searches compromise the confidentiality of information.[9] For example, searching the phone of a doctor or lawyer can reveal private doctor-patient or attorney-client information.[10]

Although there is no legal mechanism to make individuals unlock their phone, the customs agent’s have broad authority to detain travelers which can often be intimidating enough to make a person unlock their phone to avoid being in trouble.[11] Homeland Security Secretary John Kelly is looking to expand customs agent’s authority and is pushing to be able to obtain all international visitor’s social media passwords and financial records upon their arrival into the country.[12] At a meeting with Congress, Kelly told the House Homeland Security Committee, “We want to get on their social media, with passwords: What do you do, what do you say? If they don’t want to cooperate then you don’t come in.”[13] In the meantime, Hassan Shibly, the director of CAIR’s FL branch, advises American citizens to remember that, “you must be allowed entrance to the country. Absolutely don’t unlock the phone, don’t provide social media accounts, and don’t answer questions about your political or religious beliefs. It’s not helpful and it’s not legal.”[14]

 

 

 

[1] See Russell Brandom, Trump’s executive order spurs Facebook and Twitter checks at the border, Verge (Jan. 30, 2017, 9:55 AM), http://www.theverge.com/2017/1/30/14438280/trump-border-agents-search-social-media-instagram.

[2] See id.

[3] See Loren Grush, A US-born NASA scientist was detained at the border until he unlocked his phone, Verge (Feb. 12, 2017, 12:37 PM), http://www.theverge.com/2017/2/12/14583124/nasa-sidd-bikkannavar-detained-cbp-phone-search-trump-travel-ban.

[4] See id.

[5] See id.

[6] See id.

[7] See Seth Schoen, Marcia Hofmann, and Rowan Reynolds, Defending Privacy at the US Border: A Guide for Travelers Carrying Digital Devices, Electronic Frontier Foundation (Dec. 2011), https://www.eff.org/wp/defending-privacy-us-border-guide-travelers-carrying-digital-devices.

[8] Id.

[9] See id.

[10] See id.

[11] See Brandom, supra note 1.

[12] See Alexander Smith, US Visitors May Have to Hand Over Social Media Passwords: DHS, NBC News (Feb. 8, 2017, 7:51 AM), http://www.nbcnews.com/news/us-news/us-visitors-may-have-hand-over-social-media-passwords-kelly-n718216.

[13] See id.

[14] See Grush, supra note 3.

Image Source: https://www.thestar.com/content/dam/thestar/news/canada/2017/02/18/are-us-border-agents-allowed-to-search-phones-and-other-devices/border-searches.jpg.size.custom.crop.1086×724.jpg.

FAA Regulation Delays Rollout of Amazon Prime Air

 

Amazon-Prime-Air

By: Sophie Brasseux,

 

Along with Super Bowl LI came typical array of Super Bowl ads. One ad that got a lot of attention this year belonged to Amazon. Amazon’s ad featured a woman ordering Doritos using her Amazon Echo.[i] As a Prime Air drone shows up with her delivery, a disclaimer airs stating “Prime Air is not available in some states. Yet.” [ii]

After announcing the development of their drone delivery system this past July, Amazon completed their first test of the drones in December in the UK. [iii]

Amazon advertises Prime Air as a system in which drones would be able to get you your package in thirty minutes or less. [iv] Prime Air would be able to deliver packages up to five pounds and would include “sense and avoid” technology for improved safety and reliability.[v] These drones will have vertical take off and landing skills with the ability of reach altitudes of 100 meters and speeds of 100 kph.[vi] Given the costs required to use these drones, they are designed as a “last resort” in Amazon’s “delivery hierarchy.” [vii] So far, Amazon’s website includes videos of these drones as well as a FAQ section mostly about their testing in the UK. [viii]

One might wonder why this U.S. company is testing in the UK. Back in June 2016, The Federal Aviation Administration published new rules, which took effect in late August. [ix] The new FAA rules replaced the temporary restrictions on drone use by companies, which had previously required companies to apply for a special permit in order to use a drone for their business.[x] The rules allow companies to use drones, but include the requirement that the drone be kept within the line of sight of the operator during use. [xi] Another major restriction is that drones are prohibited from being over individuals not involved with the drone operation. [xii] These restrictions directly effect the way in which Amazon had intended to use their Prime Air service, thus they have moved their testing to the UK where there are currently no such restrictions. [xiii]

Regulations also restrict the times of day commercial drones can be used, flight patterns, and height restrictions. [xiv] Additionally, in order to operate a commercial drone, the FAA requires a remote pilot certificate or a student private pilot’s license, neither of which are required to use a drone for personal use. [xv] One notable benefit of the new FAA rules is that commercial operators do not have to go through a legal procedure to obtain FAA permission to operate anymore. [xvi] The Consumer Technology Association has stated the FAA has struck “an appropriate balance of innovation and safety” with their new rules, but “additional steps are needed such as addressing ‘beyond-line-of-sight’ operations, which will be a true game changer.”[xvii]

At this time, it is unclear what next steps Amazon or the FAA plan to take in order to get Air Prime and other commercial drones to be permitted in the United States. Given the current regulations, it is doubtful we will be seeing these drones in the near future, however, given that the technology has already been developed, it simply does seem to be a matter of time until your packages will be delivered via drone.

 

 

 

[i] See Michelle Castillo, One of Amazon’s delivery drones showed up in a Super Bowl ad, CNBC (Feb. 6, 2017), available at http://www.cnbc.com/2017/02/06/amazon-prime-delivery-drone-gets-super-bowl-li-spotlight.html

[ii] See id.

[iii] See id; see also Luke Johnson, 9 things you need to know about the Amazon Prime Air delivery service, Digital Spy (Feb. 7, 2017), available at http://www.digitalspy.com/tech/feature/a820748/amazon-prime-air-drone-delivery-service/.

[iv] Amazon.com, Prime Air, available at https://www.amazon.com/Amazon-Prime-Air/b?ie=UTF8&node=8037720011.

[v] See id.

[vi] See supra note 3.

[vii] See id.

[viii] See supra note 4.

[ix] See Martyn Williams, New FAA rules means you won’t get Amazon drone delivery anytime soon, PCWord, (Jun 21, 2016), available at http://www.pcworld.com/article/3086790/legal/new-faa-rules-mean-you-wont-get-amazon-drone-delivery-anytime-soon.html.

[x] See id.

[xi] See id.

[xii] See id.

[xiii] See id; see supra note 3.

[xiv] See supra note 9.

[xv] See id.

[xvi] See id.

[xvii] See Nat Levy & Todd Bishop, FAA issues final commercial drone rules, restricting flights in setback for Amazon’s delivery ambitions, GeekWire (Jun 21, 2016), available at http://www.geekwire.com/2016/faa-issues-final-commercial-drone-rules-restricting-flights-setback-amazons-delivery-ambitions/.

Image Source: http://www.droneflit.com/wp-content/uploads/2016/07/Amazon-Prime-Air.jpg.

Putting Words in your Mouth: The Evidentiary Impact of Emerging Voice Editing Software

adobe voco

By: Nick Mirra,

 

All you have in this life is your word. The human voice serves as the carrier for our words, thoughts, and feelings. Each of us is imparted with unique voice which allows us to be identified amongst a group.[1] Our voice is our vocal finger print. Every word which departs from our lips carries our exclusive trademark assigning words as our own.[2] Because uniqueness of voice is a phenomenon implicitly understood by all humans, our words have become intertwined with our identity. As a result of this interconnection between voice and identity, voice recordings have become easily introducible into evidence, and they serve to relay information in any given case through our own words.

Technology has confounded the reliability of vocal identification. For example, Alexander Graham Bell’s revolutionary invention of the telephone has impacted the use of vocal evidence in court.[3] Upon the advent of the telephone, testimony based on voice recognition has been even further complicated because vocal communication was made possible over long distances while providing relative clarity of voice. Even though the correspondents may be miles apart, the parties are able to communicate with each other effectively.

The next hurdle to vocal evidence since the telephone looms on the horizon. What would it be like if a proponent of a piece of evidence could introduce a voice recording that was clearly the voice of their opponent, but in reality, the opponent wasn’t the one speaking at all? Even further, what if the opponent himself was convinced that it was in fact their voice, but they hotly contest that they ever said the words uttered on the recording? There is a new software program being developed which allows the user to put words in your mouth. Through this program, your own unique and identifiable voice becomes the marionette bending at the will of the puppeteer.

When Adobe unveiled its Project VoCo software in a live press release in November 2016, it shocked the audience.[4] On a stage in front of spectators, an Adobe representative showed the true power of the company’s newest technology.[5] VoCo is a software which enables the user to make a computer say anything the user types into it.[6] This program is not akin to mere text-to-speech conversion software. VoCo can take typed text, and convert it into human speech spoken by anyone’s voice that the user has on file.[7] It can take a recording of a voice, and change one or more words in a spoken sentence, or even create novel sentences altogether.[8] More specifically, VoCo records a 20 minute audio sample, and then anything the user types after that will be read back by the program in the speaker’s own voice.[9] Essentially, the software is Photoshop for the human voice.[10] As the software evolves, the length of the voice sample required for the software to function will exponentially shorten, and the ease of manipulating another’s voice will become increasingly more simple.[11]

The courts will soon be faced with this software which will shake the principles of earwitness evidence. It is important for practitioners to be made aware of Project VoCo so that they can react competently to falsified evidence. The issues will be hard to detect, but VoCo is a plausible explanation for how someone is putting unfavorable words in their opponent’s mouth.

 

 

 

[1] See Sophie Scott, Why do Human Voices Sound the Way they do, BBC, (Dec. 1, 2009) https://www.law.georgetown.edu/academics/academic-programs/legal-writing-scholarship/writing-center/upload/rule18.pdf.

[2] See Gilbert v. Cal., 388 U.S. 263, 266 (1967).

[3] See e.g. F.M. English, Annotation, Admissibility of sound recordings in evidence, 71 A.L.R.2d 1024 (enumerating instances where telephone calls and voice recordings appear in American Law Reports).

[4] See Adobe Creative Cloud, #VoCo. Adobe MAX 2016 (Sneak Peeks), YouTube (Nov. 4, 2016)

[5] See id.  

[6] See id.

[7] See Nick Statt, Adobe is Working on an Audio App that Lets You Add Words Someone Never Said, The Verge (Nov. 3, 2016) http://www.theverge.com/2016/11/3/13514088/adobe-photoshop-audio-project-voco.

[8] See Id.

[9] See Id.

[10] See Id.

[11] See Id.

Image Source: https://cdn.arstechnica.net/wp-content/uploads/2016/11/voco-demoed-on-stage-760×380.jpg.

Dial “A” for Alexa

alexa-911

By: Victoria Linney

Amazon Echo is a hands free speaker that is controlled by your voice.[1] Echo answers to the name Alexa, and plays music, reads audiobooks aloud, gives headlines, and does so much more.[2] But, is one of Alexa’s “skills” the ability to help solve a murder?

This question is being asked in connection with a murder investigation in Bentonville, Arkansas.[3] Police have issued a warrant asking Amazon to produce the transcripts, voice recordings, and other information that an Echo speaker may have recorded the night of the murder.[4] But, the chances of Alexa being helpful in solving the murder are slim. This is because Echo is not recording everything that you say in your home.[5] Instead, the Echo is listening for “hot words” like the word “Alexa.”[6] While the Echo’s microphone is always on,[7] only upon hearing the word “Alexa” does the device begin recording for the amount of time it would take to make a request, and then it sends that audio to Amazon.[8] These recordings are then stored “until the user deletes them through the Echo smartphone app or on Amazon’s website.”[9] The user knows when Echo is sending audio for Amazon to store because the ring on top of the Echo illuminates and turns blue.[10]

Even though there is only a slim chance that the Echo could help solve the murder, Amazon has refused to turn over the data to the prosecutor.[11] Amazon released a statement stating “Amazon will not release customer information without a valid and binding legal demand properly served on us. Amazon objects to overbroad or otherwise inappropriate demands as a matter of course.”[12]

The prosecutor’s request for the Echo data has brought the privacy implications of voice activated speakers and other smart technology to the forefront of legal discussions.[13] Even though police have historically taken other electronics such as computers and cell phones to help solve crimes, the question remains whether new devices with built in microphones that are theoretically always listening should be subjected to the same standard as computers and cell phones.[14] Rather, the question becomes “is there a difference in the reasonable expectation of privacy one should have when dealing with a device that is ‘always on’ in one’s own home?”[15]

The Fourth Amendment provides people the right “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”[16] In order to assert a claim under the Fourth Amendment, you must have a “reasonable expectation of privacy, which contains both an objective standpoint and a subjective standpoint.”[17] On one hand, the argument can be made that there is a reasonable expectation of privacy because even though one chooses to put this technology in their home, they are not necessarily consenting to having their private conversations broadcasted to the world. However, in Smith v. Maryland, the Supreme Court held that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.”[18] Therefore, since the Alexa requests are sent to Amazon (a third party), it may also be argued that one does not have a reasonable expectation of privacy when it comes to these recordings.

While it is unclear how the courts will deal with the privacy issues that smart devices with always on microphones like Alexa pose, there are avenues for purchasers of these devices to protect themselves. In addition to deleting the recordings in the Alexa app, users are also able to turn off the microphone on the device, by pushing “the microphone button on top of the Echo” and then waiting for the button and the ring to “illuminate bright red to let you know it is not listening.”[19] But, until the answer to the privacy level question for these devices has been determined by courts, turning off the microphone when not in use and deleting requests from the app is probably the safest avenue for purchasers of Alexa to protect their privacy.

 

 

 

[1] See Amazon Echo – Black, Amazon, https://www.amazon.com/Amazon-Echo-Bluetooth-Speaker-with-WiFi-Alexa/dp/B00X4WHP5E (last visited Feb. 8, 2017).

[2] See James Kendrick, How to Use the Amazon Echo and Why You Should Get One, Mobile News (Feb. 9, 2016), http://www.zdnet.com/article/how-to-use-the-amazon-echo-and-why-you-should-get-one/.

[3] See Jake Swearingen, Can an Amazon Echo Testify Against You?, N.Y. Mag. (Dec. 27, 2016), http://nymag.com/selectall/2016/12/can-an-amazon-echo-testify-against-you.html.

[4] See Janko Roettgers, Relax: Your Amazon Echo Isn’t Recording Everything You Say, Boston Herald (Dec. 28, 2016), http://www.bostonherald.com/business/technology/2016/12/relax_your_amazon_echo_isnt_recording_everything_you_say.

[5] See id.

[6] Id.

[7] See Times Editorial Board, The Smart Home Has Ears, And it Can’t Keep a Secret, L.A. Times (Jan. 4, 2017), http://www.latimes.com/opinion/editorials/la-ed-amazon-echo-surveillance-20170104-story.html.

[8] Swearingen, supra note 3.

[9] Times Editorial Board, supra note 7.

[10] See Tony Bradley, How Amazon Echo Users Can Control Privacy, Forbes (Jan. 5, 2017), http://www.forbes.com/sites/tonybradley/2017/01/05/alexa-is-listening-but-amazon-values-privacy-and-gives-you-control/#2550510e5eed.

[11] See CNN Wire, Data Recorded on Voice-Activated Amazon Echo Sought by Prosecutor in Arkansas Murder Trial, KLTA (Dec. 28, 2016), http://ktla.com/2016/12/28/data-on-amazon-echo-sought-by-prosecutor-in-arkansas-murder-trial/.

[12] Id.

[13] See Roettgers, supra note 4.

[14] See Amy Wang, Can Alexa Help Solve a Murder? Police Think So – But Amazon Won’t Give Up Her Data, Wash. Post (Dec. 28, 2016), https://www.washingtonpost.com/news/the-switch/wp/2016/12/28/can-alexa-help-solve-a-murder-police-think-so-but-amazon-wont-give-up-her-data/?utm_term=.cd95df5221fd.

[15] Id.

[16] U.S. Const. amend. IV.

[17] Andrew L. Rossow, Amazon Echo May Be Sending Its Sound Waves into the Courtroom As Out First ‘Smart Witness’, Huff. Post (Dec. 29, 2016) http://www.huffingtonpost.com/entry/amazons-echo-may-be-sending-its-sound-waves-into-the_us_58656ceae4b04d7df167d377.

[18] Smith v. Maryland, 442 U.S. 735, 743-44 (1979).

[19] Bradley, supra note 10.

Image Source: https://kfiretv-cn396iwnnfhyi.netdna-ssl.com/wp-content/uploads/2016/12/alexa-911.jpg.

Your Personal Web History Could Soon Be for Sale

WASHINGTON, DC - OCTOBER 29:  Speaker-elect of the House Paul Ryan (R-WI) delivers remarks before being sworn in on the floor of the House chamber at the U.S. Capitol October 29, 2015 in Washington, DC. Ryan was elected the 62nd speaker of the House with 236 votes and will attempt to steer that chaotic legislative body following the resignation of former Speaker John Boehner (R-OH).  (Photo by Chip Somodevilla/Getty Images)

By: Brad Stringfellow,

Voting down strict party lines, the Republican-majority Senate recently threw out FCC rules which would have provided consumers with more privacy from Internet Service Providers (ISPs).1 As it stands, ISPs such as Comcast are on an even playing field with free services such as Google or Facebook who are able to capture, package, and sell your activity. The reason the FCC sought to put harsher restrictions on ISPs is that consumers have the choice of whether or not to use free services such as Google or Facebook, but there is little consumers can do to escape an ISP’s oversight: using the internet in almost any capacity is accomplished through an always-watching ISP.

The FCC was unhappy with this lucrative opportunity ISPs have to exploit and sell consumer browsing data, especially since consumers must pay ISPs for internet service. In 2016, the FCC passed a new set of rules entitled Protecting the Privacy of Customers of Broadband and Other Telecommunication Services in 2016.2 The new rules were meant to increase consumer privacy by forcing ISPs to increase data security and privacy measures as well as a measure which would only allow the sale of browsing history if the consumer opted-in.3

The FCC explained their view of ISPs by saying that “ ISPs are in a position to develop highly detailed and comprehensive profiles of their customers – and to do so in a manner that may be completely invisible.”4 In justifying the proposed rules, the FCC explained, “[W]ell-functioning commercial marketplaces rest on informed consent.”5 ISPs were not happy about these new rules as it would cost them significantly to upgrade their infrastructure for the security requirements and lost revenue from selling consumer browsing history.6

Stay petitions on the new rules were filed by organizations composed of advertisers, telecom, broadband, ISPs, and other commercial groups sympathetic to ISPs. The FCC granted the stay on March 1, 2017.7 The Commissioner of the FCC, Michael O’Rielly, noted that “there has been no evidence of any privacy harms, and “no benefit to be gained from increased regulations,” while the new rules “place substantial, unjustified costs on businesses and consumers.”8

On March 23, 2017, the Senate passed a vote disapproving the stayed rules. Congress has the power to overturn agency rules with a simple majority through Chapter 8 Title 5 of the US Code.9 The vote was 50-48, with 50 Republican votes to overturn the rules against 48 Democratic votes to approve the rules, with two absent Republican Senators not voting.10 The vote will now go to the majority-Republican House where it will likely follow suit and throw the rules out.

Speaking of the vote’s outcome, Senator Edward Markey, a Democrat from Massachussets, said, “President Trump may be outraged by fake violations of his own privacy, but every American should be alarmed by the very real violation of privacy that will result of the Republican roll-back of broadband privacy protections. With today’s vote, Senate Republicans have just made it easier for American’s sensitive information about their health, finances and families to be used, shared, and sold to the highest bidder without their permission. The American public wants us to strengthen privacy protections, not weaken them. We should not have to forgo our fundamental right to privacy just because our homes and phones are connected to the internet.”11

After winning the vote, Senate Majority Leader Mitch McConnell justified overturning the regulation as it “makes the internet an uneven playing field, increases complexity, discourages competition, innovation, and infrastructure investment.”12

It is curious to note how strictly the vote the went by party lines. Republicans have been supporters of individual rights and privacy in some regards, but here the desire to let big business work things out amongst themselves seems to won out. From the 2016 Republican Platform, they give a statement on internet privacy:

“We intend to advance policies that protect data privacy while fostering innovation and growth and ensuring the free flow of data across borders…We intend to facilitate access to spectrum by paving the way for high-speed, next-generation broadband deployment and competition on the internet and for internet services.”13

Protecting data privacy is balanced with the need to foster innovation and growth: in this case it seems the need to foster innovation and growth won out. In other elements of the Republican Platform, the party is protective of individual rights against big business, such as medical records and farmers’ data.14 The medical records position is stated, “We applaud the advance of technology in electronic medical records while affirming patient privacy and ownership of personal health information.”15 On farmers’ rights, it reads “   We will advance policies to protect the security, privacy, and most of all, the private ownership of individual farmers’ and ranchers’ data.”16 Additionally, the Republican Platform generally opposes aerial surveillance on US soil, with the exception of observation over borders.17

It seems the Republican Party has some intentions to protect individual privacy rights, and even goes so far as to partly acknowledge it, so it is certainly surprising that not one Republican Senator was willing to vote against such a sweeping grant of ISP power.

Since it seems as though this will inevitably pass through the House, what can be done to protect privacy? Virtual Private Networks (VPNs) are perhaps the easiest way to circumvent ISPs, but there are some downsides. VPNs are completely unregulated, and can just easily sell your browsing history as an ISP if careful scrutiny and selection is not applied.18 One VPN company, Private Internet Access, is jumping on the opportunity by taking a full page ad out in the New York Times calling out the 50 Senators who voted to disapprove the rules, and the potential consequences of increased ISP access to private data.19

This is an unsavory turn which grants sweeping power to ISPs to monitor, package, and sell consumers’ browsing history and activity. Hopefully, some Republicans in the House will be more protective of their constituents’ privacy. Contacting your House Representative may help. If things continue along the same path, internet privacy is about to be substantially changed for the worse.

 

 

 

 

1 David Shepardson, U.S. Senate Votes to Overturn Obama Broadband Privacy Rules, Reuters (Mar. 23, 2017, 1:50 PM), http://www.reuters.com/article/us-usa-internet-idUSKBN16U2ER.

2 Protecting the Privacy of Customers of Broadband and Other Telecommunications Services, FCC 2500 (Mar. 31, 2016), https://apps.fcc.gov/edocs_public/attachmatch/FCC-16-39A1_Rcd.pdf

3 Id. at 2502.

4 Id.

5 Id. at 2506.

6 Thorin Klosowski, The Senate Just Voted to Let Internet Sell Your Web History, Life Hacker (Mar. 23, 2017, 1:30 PM), http://lifehacker.com/senate-votes-to-let-internet-providers-sell-your-web-hi-1793574677.

7 Order Granting Stay Petition in the Matter of Protecting the Privacy of Customers of Broadband and Other Telecommunications Services, FCC 1 (Mar. 1, 2017), http://transition.fcc.gov/Daily_Releases/Daily_Business/2017/db0301/FCC-17-19A1.pdf.

8 Id. at 5.

9 5 U.S.C § 8.

10https://www.senate.gov/legislative/LIS/roll_call_lists/roll_call_vote_cfm.cfm?congress=115&session=1&vote=00094.

11 Edward J. Markey, Senator Markey Blasts GOP Roll-back of Broadband Privacy Protections, (Mar. 23, 2017), https://www.markey.senate.gov/news/press-releases/senator-markey-blasts-gop-roll-back-of-broadband-privacy-protections.

12 Shepardson, supra note 1.

13 Republican Platform 2016 6, https://prod-cdn-static.gop.com/static/home/data/platform.pdf.

14 Id. at 18, 36.

15 Id. at 36.

16 Id. at 18.

17 Id. at 13.

18 Klosowski, supra note 6.

19 Private Internet Access, A VPN Provider, Takes Out A Full Page Ad in the New York Times Calling Out 50 Senators, https://i.redditmedia.com/0kc4jJDVgLGbOI0TSY8hwQfcCPoY6ADX-MtA2vilf2s.jpg?w=576&s=f65699ffabac82dbdaf8e6fe8482e133.

Image Source: https://cdn.arstechnica.net/wp-content/uploads/2017/03/getty-house-of-representatives-800×534.jpg.

Snapchat IPO: A Cautionary Tale

snapchat-ipo_exchanges

By: Courtney Gilmore,

 

The much-anticipated public offering has finally been filed as of February 2.[1] Snapchat, formally known as Snap Inc., has officially requested a spot on the New York Stock Exchange under the ticker symbol SNAP.[2] The company took advantage of the JOBS Act (Jumpstart Our Business Startups), which allows companies with less than $1 billion of annual revenue to file for IPOs in secret.[3] The friendly ghost will likely go public in March of this year.[4]

While this is an exciting new endeavor for the everyday social media guru, it may be better suited for the high-risk tolerance investors only. Proceed with caution.

Facebook and Twitter aside, Snapchat boasts itself as a camera company, “giving people the power to express themselves and live in the moment.”[5] On the other hand, “Facebook says its mission is connecting everyone, while Google’s is to organize the world’s information.”[6]

Sure, this sounds like an attractive label for any millennial or investor out there, but beyond this, there is not much out there to lay a stable foundation for Snapchat’s future. For instance, Snapchat has an extremely short financial history.[7] Moreover, the company is labeled as secretive by outsiders and employees alike.[8] Evan Spiegel, Snapchat’s Chief Executive Officer, said in a 2015 note to employees, “‘[k]eeping secrets gives you space to change your mind, until you’re really sure that you’re right.’”[9] So, if Snapchat is unable to be transparent with even its own employees, how will prospective investors be able to keep track of their investments?

Snapchat’s founders are seemingly resistant to give up any control whatsoever. While this is a natural instinct for any sensible businessman or woman, Snapchat’s founders Evan Spiegel and Bobby Murphy, maintain that the shares issued to the public will carry no votes.[10] There are three classes of stock in Snapchat: Class A, Class B, and Class C. Only Spiegel and Murphy will control Class C shares, whereby each share receives 10 votes.[11] Class B shares receive one vote per share and are issued to venture capitalists and those investors that have poured capital into the company before its initial public offering.[12] Finally, the Class A shares will be issued to the public.[13] In addition to no vote shares, Snapchat reportedly has no intention of paying out cash dividends to its investors.[14] Without much control, investors must turn to other factors to weigh their risks and rewards.

In 2016, Snapchat recorded revenue of $404.5 million, but losses amounted to $514.6 million.[15] Although its revenue increased by 600% between 2015 and 2016, Snapchat’s current losses exceed Twitter’s at the time of its own IPO, while Facebook had revenue of $3.7 billion at the same point in its life cycle.[16] This begs the question of whether Snapchat will suffer the same fate that Twitter did when it went public. “‘To me, Snap is Twitter 2.0 – a company with a good growth rate that is losing a ton of cash, coupled w/ a massive valuation.’”[17] Snapchat is seeking a $25 billion valuation, which is sixty-two times its revenue.[18] On the other hand, GoPro, comparable to Snapchat’s “camera company” self-description, trades at one times GoPro sales.[19] Twitter trades at five times its revenue, and Facebook trades at fourteen times its revenue.[20]

Another important factor for investors to consider is the slowing in growth that Snapchat has experienced more recently.[21] Since Facebook’s attempt at similar products to Snapchat’s Stories, Snapchat views have allegedly declined between fifteen and forty percent since August.[22] Instagram’s version of Stories can also be attributed to Snapchat’s recent decline in user status.[23] Of Snapchat’s 158 million users, the majority consists of subscribers ranging between the ages of 18 and 34 years old.[24]

Hosting costs are another concern. Snapchat just signed a deal with Google to host Snapchat’s cloud space for $400 million per year.[25] On the surface this doesn’t seem like anything to get hung up on, except that Snapchat’s revenue last year was just about $400 million.[26] Snapchat’s hosting costs are so large because of the many video features Snapchat offers to consumers.[27] Expenses are also growing by employees.[28] Snapchat has tripled its number of employees to total 1,859 in 2016.[29]

On the upside, Snapchat is in the market of offering new, innovative products (like any logical tech company would). For example, Snapchat added its geofilter options in July 2014.[30] The company went on to release the Spectacles in September 2016.[31] Snapchat’s “foray into hardware and its new identity as a ‘camera company’ could cause investors to value it differently than a pure-play company, where profit margins are typically higher.”[32] Snapchat is also expected to bring in close to $1 billion in revenue by the end of this year.[33]

Moral of the story: while the risks are high, the rewards will likely be higher. Snapchat’s video features certainly distinguish the company from its competitors, as do Snapchat’s endeavors with the Spectacles and more products to hit the market. While the company may be secretive, experiencing minimal user decline, and racking up steep payment obligations, there is still a plethora of innovation to look forward to, and Snapchat remains at the cutting edge of it all. Perhaps Snapchat will not offer stock suitable for the novice investor’s portfolio, but it certainly has the potential to evince high reward for those that are even able to buy in initially. This young company has plenty of room to grow and plenty of buzz to live up to.

 

 

 

[1] See Barbara Ortutay, Snap, Maker of the Teen Social App Snapchat, Files for IPO, The Washington Post (Feb. 2, 2017), https://www.washingtonpost.com/national/snap-maker-of-the-teen-social-app-snapchat-files-for-ipo/2017/02/02/794c3b92-e9a4-11e6-903d-9b11ed7d8d2a_story.html?utm_term=.54565215b4ae.

[2] See id.

[3] See Seth Fiegerman & Matt Egan, Snapchat Files for $3 Billion IPO, CNN (Feb. 2, 2017), http://money.cnn.com/2017/02/02/technology/snapchat-ipo-filing/.

[4] See id.

[5] Sarah Frier & Alex Barinka, Can Snapchat’s Culture of Secrecy Survive an IPO?, Bloomberg (Jan. 17, 2017), https://www.bloomberg.com/news/features/2017-01-17/can-snapchat-s-culture-of-secrecy-survive-an-ipo.

[6] Id.

[7] See id.

[8] See id.

[9] See id.

[10] See Tom Zanki, 4 Takeaways From Snap’s IPO Filing, Law360 (Feb. 3, 2017), https://www.law360.com/technology/articles/888278/4-takeaways-from-snap-s-ipo-filing?nl_pk=a6f0df19-c127-4444-8e8b-a4c34dfadf0b&utm_source=newsletter&utm_medium=email&utm_campaign=technology.

[11] See Fiegerman & Egan, supra note 3.

[12] See id.

[13] See id.

[14] See Jen Wieczner, Here How Insanely Expensive Snap’s IPO Will Be, Fortune (Feb. 2, 2017), http://fortune.com/2017/02/02/snapchat-ipo-snap-stock/.

[15] See Victoria Woollaston, How Snapchat Turned Dick Pics into a Potentially Multi-Billion Dollar IPO, Wired (Feb. 3, 2017), http://www.wired.co.uk/article/snapchat-ipo-cameras.

[16] See Wieczner, supra note 13; Maya Kosoff, Will the Snapchat I.P.O. Be a Flop?, Vanity Fair (Feb. 2, 2017), http://www.vanityfair.com/news/2017/02/will-the-snapchat-ipo-be-a-flop.

[17] See Fiegerman & Egan, supra note 3.

[18] See Wieczner, supra note 14.

[19] See id.

[20] See Eric Jackson, 4 Reasons to Be Wary of the Snapchat IPO, Forbes (Feb. 7, 2017), http://www.forbes.com/sites/ericjackson/2017/02/07/4-reasons-to-be-wary-of-the-snapchat-ipo/#2abf5745339b.

[21] See Kosoff, supra note 16.

[22] See id.

[23] See Vikram Nagarkar, Snapchat IPO: The Pros and Cons of Buying Into Snap Stock Right Now, amigobulls (Feb. 6, 2017), http://amigobulls.com/articles/snapchat-ipo-the-pros-and-cons-of-buying-into-snap-stock-right-now.

[24] See Woollaston, supra note 15.

[25] See Jackson, supra note 20.

[26] See id.

[27] See id.

[28] See Wieczner, supra note 14.

[29] See id.

[30] See Woollaston, supra note 15.

[31] See id.

[32] Portia Crowe, Snap Files for its IPO, Revealing Surging Sales Growth and Huge Losses, Business Insider (Feb. 2, 2017), http://www.businessinsider.com/snap-to-list-on-nyse-report-2017-1.

[33] See Nagarkar, supra note 23.

Image Source: https://i2.wp.com/thenypost.files.wordpress.com/2017/01/snapchat-ipo_exchanges.jpg?quality=90&strip=all&ssl=1.

Put Your Money Where Your Mouth Is

LOS ANGELES, CA - JANUARY 29:  A protester holds a sign during a demonstration against the immigration ban that was imposed by U.S. President Donald Trump at Los Angeles International Airport on January 29, 2017 in Los Angeles, California. Thousands of protesters gathered outside of the Tom Bradley International Terminal at Los Angeles International Airport to denounce the travel ban imposed by President Trump. Protests are taking place at airports across the country.  (Photo by Justin Sullivan/Getty Images)

By: Lindsey McLeod

 

“Put your money where your mouth is” realized a modern meaning in this past week as individuals concerned about President Trump’s travel ban donated to the American Civil Liberties Union (ACLU) as a means of voicing their objection.[1] The ACLU reportedly received $24 million in online donations in the week following the immigration ban, totaling over six-times the ACLU’s yearly donation average.[2] Most of these donations occurred via online portals, flooding the website with donations from 356,306 people. This isn’t the first time that President Trump has sparked an influx of online donations to the ACLU, as the organization received nearly fifteen million dollars in the weeks following Trump’s election.

This online-centric donation model is consistent with millennial behaviors, as millennials tend to donate online, a realm that has dominated millennial financial tendencies.[3] Such innovative and effective online fundraising campaigns are a trademark of the millennial generation, and the ACLU is getting on board. The start-up business model is commonly associated with trendy work environments, invoking images of Ping-Pong tables and office kegs and tech-obsessed millennials. This start-up model, however, has begun to branch beyond the confines of the tech and app environment and into the realm of civil liberties.

The “Y Combinator” provides a new model for funding early stage startups in which the Y Combinator invests “a small amount of money (120k) in a large number of start ups (105),” these startups then move to Silicon Valley for three months where they are able to work with professionals who are familiar with investment pitches and facilitate a business model that effectively reaches target consumers.[4] Because the Y Combinator is typically associated with its graduates such as Airbnb, Dropbox, and similar start-up model consumer products, the ACLU is seemingly out of place in the market, yet the Y Combinator president, Sam Altman, is interested in the potential success that a collaboration between the two groups may have. Although the ACLU is far from a “start up”, having been established in the early 1900s, the ACLU has a history of working with modern, tech-savvy businesses, such as Twitter, to invoke rapid fundraising participation, and thus a more thorough examination of how to improve the business-model may rapidly expand the ACLU’s national and international presence.[5]

This decision by ACLU to partner with Y Combinator is significant in the impact it may have on the expansion of the ACLU and the services that the ACLU is able to offer. Two significant characteristic of the millennial generation, as noted in Leigh Buchanan’s book entitled Meet the Millennials is that they are “masters of digital communication…[and] are primed to do well by doing good. Almost 70 percent say that giving back and being civically engaged are their highest priorities.”[6] Thus, the decision by the ACLU and Y Combinator represents a decision to engage a civic-minded generation on their turf, so to speak. This move is particularly pertinent at a time in American politics in which millennials are seemingly rejecting the current president.[7] The stronger presence that the ACLU may gain upon completion of the three-month Silicon Valley program may prove to ignite a generation of civically engaged individuals, and perhaps future ACLU lawyers.

 

 

 

[1] Katie Mettler, The ACLU says it got $24 million in online donations this weekend, six times its yearly average, The Washington Post (Jan. 30, 2017)

https://www.washingtonpost.com/news/morning-mix/wp/2017/01/30/the-aclu-says-it-got-24-million-in-donations-this-weekend-six-times-its-yearly-average/?utm_term=.77e7a5afb276.

[2] See id.

[3] See Randy Hawthornw, Understanding What Motivates Millennials to Give to Your NPO, NonProfitHub.org http://nonprofithub.org/fundraising/understanding-motivates-millennials-give-npo/ (last visited Feb. 3, 2017).

[4] Y Combinator, https://www.ycombinator.com/.

[5] See Sarah Ashley O’Brien, ACLU is participating in elete Silicon Velley accelerator, CNN Tech (Jan. 31, 2017) http://money.cnn.com/2017/01/31/technology/aclu-ycombinator/index.html.

[6] Jay Gilbert, The Millennials: A new generation of employees, a new set of engagement policies, Ivey Business Journal (Sept. 2011) http://iveybusinessjournal.com/publication/the-millennials-a-new-generation-of-employees-a-new-set-of-engagement-policies/.

[7] See Cody Boteler, Students plan demonstrations and walkouts to protest Trump’s inauguration, USA Today (Jan. 19, 2017), http://college.usatoday.com/2017/01/19/students-plan-demonstrations-and-walkouts-to-protest-trumps-inauguration/.

Image Source: http://thehill.com/sites/default/files/styles/thumb_small_article/public/blogs/protest_1.jpg?itok=ZUbOBxAB.

JOLT Announcement

We’re excited to announce the migration of the JOLT website to a new more secure server.  All of our existing content will be migrated to our new website, featuring: Issue II to be published this week, our ongoing blog posts regarding the most topical subjects on the intersection of law and technology, and our past Issues and Symposium materials. You will also soon be able to view the most recent recordings of our Symposium sessions.  As our most recent Symposium highlighted, ransomware and malware attacks can occur through a variety of platforms and varied levels of sophistication. To enhance our site’s own cyber security, we are in the process of migrating the entire journal site to a new server with enhanced features to increase stability and preventative safety measures. For more details regarding the breadth of cyber attacks, see our upcoming Survey Issue, to be published in the coming weeks, with several articles addressing cyber breaches. We hope you regularly visit the JOLT site to find and discover scholarship on law and technology.

Calling an End to Culling: Predictive Coding and the New Federal Rules of Civil Procedure

pdf_icon Serhan Publication Version PDF

Cite as: Stephanie Serhan, Calling an End to Culling: Predictive Coding and the New Federal Rules of Civil Procedure, 23 Rich. J.L. & Tech. 5 (2016), http://jolt.richmond.edu/index.php/volume23_issue2_serhan/.

Stephanie Serhan*

Table of Contents

I.     Introduction. 2

II.     Why Timing Matters in Predictive Coding. 4

A.      The Technical Difference Between the Two Methods. 5

B.     The Practical Implications in Applying the Two Methods. 6

III.     Court Decisions and the New Federal Rules. 11

A.     Court Decisions under the Old Rules. 11

1.      Ex-Ante Permissibility of Predictive Coding. 11

2.     Ex-Post Permissibility of Keyword Culling. 15

B.     Reinforcement of Court Decisions under the New Rules. 21

1.     Recent Amendments to the Rules. 21

2.     Subsequent Reactions to the New Rules. 25

IV.     Encouraging Predictive Coding Ex Ante. 28

A.     Why Predictive Coding Ex Ante is Preferable. 28

B.     How Parties and Courts Should Proceed. 30

V.     Conclusion. 35

I. Introduction 

[1]       In corporate litigation and dispute resolution, discovery is often a significant undertaking for both the producing and requesting parties. Each party’s approach during discovery is usually guided by considerations regarding efficiency and accuracy during the process. One area of discovery in which parties prioritize these considerations is the implementation of predictive coding. Several studies have proven that the method of predictive coding is substantially more efficient and accurate than traditional methods of conducting discovery.[1]

[2]       The method of predictive coding begins with a senior attorney who is intimately familiar with the case identifying relevant and irrelevant documents to create a “seed set.”[2] This seed set is then fed into the predictive coding software, which trains the software to determine which documents are relevant, while suggesting other documents that may also be relevant.[3] Additionally, the attorney might review a random sample of documents;[4] or the attorney could feed in words, phrases, and concepts that are appropriate to the case, and the software can subsequently find similar phrases, with linguistic or sociological relevance.[5] The aim of the method is to identify the most relevant documents to produce to the requesting party.

[3]       Within predictive coding, tension between efficiency and accuracy frequently arises in deciding the appropriate time at which to apply predictive coding. This timing concern has sparked numerous debates, as well as a split between court opinions. The issue parties and courts address is whether predictive coding should be applied at the outset of discovery to an entire universe of documents, or if it should be applied after keyword culling.

[4]       This issue has become increasingly addressed in virtually every important case that has large volumes of documents in discovery. Addressing this issue is important to the parties involved because it has profound implications regarding efficiency and accuracy. Courts have also been asked to address this question, but have offered little guidance regarding the time at which to implement predictive coding in a case. Rule 1 of the Federal Rules of Civil Procedure addresses this exact balance as a trade-off between the just resolution and the efficiency of a case, which has often arisen in issues concerning discovery.[6] The recent amendments to the Federal Rules of Civil Procedure further emphasize this trade-off.[7]

[5]       This paper examines the impact of the most recent amendments to the Federal Rules of Civil Procedure on the current split between courts about whether predictive coding should be applied at the outset or to a set of keyword-culled documents. Since the new Rules explicitly implement the concept of proportionality and a new set of standards in Rule 26, I argue that applying predictive coding at the outset is more compliant with the Federal Rules of Civil Procedure. Part II will explain the difference in timing between applying predictive coding after keyword culling or prior to it, and discuss the implications of accuracy and efficiency. Part III will first discuss the split between courts regarding the two methods prior to the recent amendments to the Rules, and subsequently, it will discuss reactions by courts and scholars regarding the applicability after the amendments to the Rules. Part IV will argue that the method of applying predictive coding at the outset is more compliant with the new amendments to the Rules since it is more accurate, and it will suggest that parties and courts should begin to implement these changes. Ultimately, this proposal will improve accuracy, without jeopardizing efficiency, with the goal of achieving the just resolution of a case.

II. Why Timing Matters in Predictive Coding

[6]       During the process of discovery, parties often face a choice regarding which method to use on large volumes of documents. Predictive coding has recently become a predominant method through which attorneys and parties alike may narrow down the universe of documents in an efficient and accurate manner.[8] However, parties differ over the appropriate time at which predictive coding should be used in the discovery process, which has created two methods that differ only in timing. The two methods are: (i) the use of predictive coding at the outset, or (ii) the use of predictive coding after keyword culling documents. This Part explains the technical difference between these two methods, as well as the practical implications in applying each of these methods.

            A. The Technical Difference Between the Two Methods

[7]       Regarding the timing of when to apply predictive coding, the two methods are: (i) the use of predictive coding at the outset, or (ii) the use of predictive coding after keyword culling. The first method involves applying predictive coding at the beginning of the discovery phase; the second method involves keyword culling documents first, and subsequently applying predictive coding to the keyword-culled documents. Each of these methods will be explained separately.

[8]       The first method provides the option of applying predictive coding to the entire universe of documents at the beginning of the discovery phase. All documents are gathered, and the predictive coding technology is applied to all of the documents at the outset as a whole.[9] Applying predictive coding to all documents means there is no previous method, such as keyword culling, to narrow down the universe of documents. The use of predictive coding will narrow down the universe of documents based on which documents are relevant, or predicted to be relevant, through a programmed algorithm.[10] Alternatively, the second method allows a party to apply predictive coding to a set of documents that has already been reduced in size by keyword search techniques. These techniques are frequently referred to as “keyword culling.” In order to perform keyword culling on documents, a party would begin with the entire universe of documents that pertain to a case, and narrow down the universe of documents by searching for keywords. Through this method, documents are identified as relevant or irrelevant based on those search terms. The relevant documents remain, and these are a much smaller set of documents. These relevant documents are referred to as the keyword-culled documents, and predictive coding is subsequently applied only to these keyword-culled documents.[11]

            B. The Practical Implications in Applying the Two Methods

[9]       These two methods have significant implications regarding a party’s monetary expenditures and time spent, which relates to important concerns of accuracy and efficiency in choosing between these two methods. Regarding accuracy, the use of predictive coding at the outset provides a much more accurate return of relevant documents than keyword culling.[12] Applying predictive coding on the entire set of documents is the most accurate method in identifying relevant documents because it is applied to all documents, rather than the ones selected by keyword culling.[13] Keyword culling is not as accurate because the party may lose many relevant documents if the documents do not contain the specified search terms, have typographical errors, or use alternative phraseologies.[14] The relevant documents removed by keyword culling would likely have been identified using predictive coding at the outset instead.[15] Therefore, keyword culling is not as accurate as predictive coding when used on the entire set of documents at the outset.

[10]     Regarding efficiency, both methods provide efficient returns, depending on how efficiency is defined. The use of predictive coding at the outset can be beneficial in narrowing down documents based on even “‘linguistic’ or ‘sociological’” relevance.[16] Another efficient benefit is that the technology is programmed at the outset and can identify the most relevant documents.[17] Keyword culling, on the other hand, narrows down the universe of documents by conducting a keyword search that does not identify other potentially-relevant documents, but simply searches through the documents using the keywords that are chosen.[18] The keyword search can be quickly applied to a set of documents to determine which documents to keep and which to remove.[19] Keyword culling can be useful since it narrows down the universe of documents to a much smaller number, as it does not predict other potentially-relevant documents.[20] It may be quicker for the technology to simply apply keyword searches prior to predictive coding to limit the number of documents that need to be coded, but once again, it comes at the cost of accuracy in revealing responsive documents.[21]

[11]     Furthermore, prior to keyword culling, the parties often spend significant amounts of time discussing which keywords to employ in the search.[22] This back and forth between the parties frequently results in disagreement.[23] The danger is that the inputted terms for searching might be “over- or underinclusive, either returning large amounts of irrelevant documents or failing to capture relevant ones.”[24] Consequently, “…the requesting party may ask for additional search terms or request that the producing party takes steps to verify the completeness of production.”[25]

[12]     Since predictive coding would be employed under each of the two methods, the costs associated with each are not significantly different. The majority of costs associated with predictive coding come from: the time of a senior attorney who is intimately familiar with the case, the cost of employing a company that has the available technology and software to run predictive coding, and the time associated with training the software to identify relevant documents.[26] These three categories of costs will be incurred regardless of which of the two methods is employed.

[13]     The point at which the monetary costs and time spent may vary between the two methods is a senior attorney’s identification of potentially relevant documents or training of the software on a larger universe of documents. In predictive coding, there may be a larger universe of potentially relevant documents, simply because the software is more accurate in predicting which documents may be potentially relevant.[27] Keyword culling, on the other hand, eliminates many documents, even if they may be potentially relevant.[28] The reason is that the method of searching by keywords does not have that “predictive” feature; it merely eliminates any documents that do not contain the inputted words and phrases.[29] Accordingly, the cost differential between these two methods is not in the cost of the technology of predictive coding, but in the time it takes to identify the potentially relevant documents, as well as the resulting production of those documents.

[14]     In sum, both methods employ predictive coding but at different stages in the discovery process. Predictive coding at the outset is abundantly more accurate than applying predictive coding after keyword culling.[30] The main costs associated with predictive coding will be the same, but since predictive coding at the outset is applied to more documents than keyword-culled documents, there may be additional time spent in training the software.[31] Therefore, the actual cost of predictive coding will likely be substantially equal in both methods since the majority of the costs will be incurred in both methods.

[15]     The remainder of this paper will discuss how this trade-off between accuracy and efficiency has been approached by several courts, litigating parties, and the Federal Rules of Civil Procedure in choosing the appropriate time to apply predictive coding.

III. Court Decisions and the New Federal Rules

[16]     This Part will first address how courts have dealt with the issue, which developed a split in court decisions between applying predictive coding at the outset versus applying it on keyword-culled documents. Second, this Part will describe the recent amendments to the Federal Rules of Civil Procedure, as well as the subsequent reactions of courts and scholars.

            A. Court Decisions under the Old Rules

[17]     Prior to the recent amendments to the Federal Rules of Civil Procedure, parties and courts were aware of the concept of proportionality, but there have been various outcomes in different cases. In the past few years, the split in authority regarding the timing of predictive coding has spurred important realizations of accuracy and efficiency. The discussion below will reveal that some courts encouraged predictive coding at the outset, while some have allowed defendants to employ keyword culling first. These perspectives often depend on what the parties had mutually agreed on, what the parties had already accomplished, and the specific issue in the case. The arguments for each method are usually party-driven, as requesting parties argue for a broader scope of discovery to find the maximum amount of relevant documents, whereas producing parties tend to argue for a narrower scope of discovery to produce fewer documents.[32]

1. Ex-Ante Permissibility of Predictive Coding

[18]     Courts have routinely found that the application of predictive coding at the outset is appropriate. For example, in the 2012 landmark decision of Da Silva Moore v. Publicis Groupe SA, the court of the Southern District of New York found that predictive coding at the outset was appropriate.[33] The discovery issue in this case was whether predictive coding should be used at the outset, compared to other methods of discovery, including keyword culling.[34] The defendants had gathered approximately three million emails, a sizable amount of documents.[35]

[19]     The defendants sought to use predictive coding, and although the plaintiffs voiced their concerns, the plaintiffs were not opposed to predictive coding.[36] Magistrate Judge Peck allowed the use of predictive coding and emphasized the concept of proportionality from the Federal Rules of Civil Procedure.[37] Subsequently, the plaintiffs raised objections, which fell under the purview of the district judge.[38] The district judge found that the magistrate judge’s decision was not clearly erroneous, denied the plaintiffs’ objections, and accordingly adopted the magistrate judge’s opinion.[39] The district judge noted that “the use of the predictive coding software as specified in the ESI protocol is more appropriate than keyword searching.”[40] In this case, the defendants used, and the court allowed, predictive coding at the outset instead of keyword culling.

[20]     A circuit court in Virginia upheld a similar ruling in Global Aerospace, Inc. v. Landow Aviation, L.P. in the same year. [41] The court addressed whether the defendants would be permitted to use predictive coding at the outset instead of keyword culling. The defendants urged for the application of predictive coding at the outset instead of keyword culling.[42] Although the plaintiffs objected to the use of predictive coding at the outset,[43] the judge allowed it, stating that the defendants “shall be allowed to proceed with the use of predictive coding for purposes of the processing and production of electronically stored information.”[44]

[21]     Similar to the rulings in Da Silva Moore and Global Aerospace, Inc., the court in In Re Actos (Pioglitazone) Products Liability Litigation also allowed the parties to employ predictive coding at the outset.[45] The parties worked together and collaborated in choosing which method to employ. The high level of transparency and cooperation between the parties enabled the successful implementation of predictive coding at the outset on the entire universe of documents.[46] The parties agreed to review document samples collaboratively, meet and confer, and reveal their respective methodologies to each other.[47] The court allowed the parties to proceed in this manner because it was a mutually agreed upon method and proportional under the Rules.[48]

[22]     A slightly different case reveals a court’s hesitation in applying simplistic keyword searches. In McNabb v. City of Overland Park, the defendant produced about 20,000 e-mails after it unilaterally redacted the information that it thought was “confidential or irrelevant.”[49] The plaintiff also submitted a list of about thirty-five search terms for the defendant to use, but the defendant argued that the requests were “overly broad and would encompass a significant number of documents.”[50] The court agreed with the defendant and denied the plaintiff’s motion, on grounds of proportionality. In other words, the court denied the implementation of these broad, general keyword searches.[51] The motion papers in this case indicate “that the parties considered using predictive coding[,]” but the defendant decided not to.[52] The outcome may have been different if the parties agreed to employ predictive coding at the outset because the plaintiff may have received more of the relevant data it was searching for, and the defendant may have been able to protect other documents as well.[53]

[23]    Overall, when presented with the issue at the outset, courts have routinely held that predictive coding is appropriate. The courts in Da Silva Moore v. Publicis Groupe SA, Global Aerospace, Inc. v. Landow Aviation, L.P., and In Re Actos all allowed the parties to proceed with the application of predictive coding at the outset.[54] The judge’s reluctance and refusal to allow simplistic keyword searches in McNabb also points in the same direction, suggestive of the possibility that predictive coding may have been an appropriate approach from the outset.[55] Accordingly, parties and courts have been supportive of the use of predictive coding at the outset.

2. Ex-Post Permissibility of Keyword Culling

[24]     Courts have only permitted the use of predictive coding on previously keyword-culled documents after the fact, meaning after the documents had already been culled. In one example, the Northern District of Illinois court allowed the defendants to first employ keyword culling in Kleen Products, LLC v. Packaging Corporation of America in 2012.[56] The defendants had already produced “more than three million pages of documents” through keyword culling,[57] but plaintiffs requested the judge to order redoing discovery by employing predictive coding at the outset instead.[58] After several months of disputing these discovery issues, the parties reached an agreement.[59] The plaintiffs withdrew their demand to restart and apply predictive coding at the outset on the entire universe of documents in the case.[60] In other words, the defendants kept the documents that were already culled down using keyword searches and were not required to restart the discovery process with predictive coding.[61] The magistrate judge approved their agreement to employ keyword culling at the outset and restated Sedona Principle 6, “responding parties are best situated to evaluate” the appropriate method, with deference to the producing party.[62]

[25]     In the same year, the court in In Re Biomet M2a Magnum Hip Implant Products Liability Litigation also permitted keyword culling prior to the application of predictive coding.[63] The party had already employed keyword culling and reduced the universe of documents from “19.5 million to 3.9 million.”[64] The court stated that if the party was ordered to restart and apply predictive coding on the entire universe of documents, it would not have been proportional under the previous version of Rule 26.[65] The court said this approach was reasonable under the circumstances.[66] The judge stated that the issue is not whether predictive coding is better than keyword culling, but whether the party satisfied its discovery obligations.[67] Furthermore, the judge stated that regardless of the other proportionality factors, the additional cost of going back to do the predictive coding on all documents would have outweighed the benefit of potentially finding more relevant documents.[68]

[26]     In a related line of cases, two courts have allowed keyword culling after the parties had agreed to it, but courts and parties have disagreed as to the proper approach after keyword culling. For example, in Progressive Casualty Insurance Company v. Delaney, the parties agreed to use keyword culling at the outset.[69] The producing party employed keyword culling which reduced the amount of documents from 1.8 million to 565,000.[70] For the remaining 565,000 documents, after employing keyword culling, the parties disagreed as to the appropriate method that should be used.[71] The producing party found that subsequently performing manual review would take a significant amount of time and money. [72] To circumvent these costs, the producing party unilaterally chose to employ predictive coding instead of manual review on the remaining 565,000 documents.[73] After the producing party made this decision, it informed the requesting party, and the requesting party filed a motion to compel.[74] The court did not allow this change from manual review to predictive coding because it was not originally agreed upon by the parties, and it would result in more disputes and delays.[75] This case demonstrates that other disputes may arise after keyword culling is used because it calls into question the accuracy of subsequent methods. Predictive coding is contemplated but disagreed upon after keyword culling since the parties had already agreed upon manual review, although it is a time-consuming approach.[76] Instead, when predictive coding is used at the outset, these disputes are eliminated.

[27]     Another example in which keyword culling was permitted at the outset is in Bridgestone Americas, Inc. v. International Business Machines Corp.[77] The plaintiff had already employed keyword culling and wanted to proceed to use predictive coding. The defendant argued it would be unfair for the plaintiff to use predictive coding after documents had already been keyword culled, relying on Progressive Casualty Insurance Company.[78] However, because of concerns regarding proportionality and efficiency, the judge allowed the use of predictive coding on the previously keyword-culled documents.[79] This case also stands for the proposition that the parties should be the ones to try to resolve this issue.[80] The court believed that the use of keyword culling prior to predictive coding can be appropriate under Rule 26, but it depends on many factors, including “the type of data, the value of the case juxtaposed to the cost of using advanced analytics, and other factors that are matter specific.”[81]

[28]     As demonstrated by Bridgestone Americas, Inc. and Progressive Casualty Insurance Company, when parties agree on keyword culling at the outset, parties and courts are left confused as to the appropriate method to use going forward to review the remaining documents. The reason is that the accuracy of the remaining relevant documents is already called into question since keyword culling is not as accurate as predictive coding.[82] Furthermore, concerns of time, cost, and efficiency going forward in deciding between manual review and predictive coding become prominent issues for the parties.

[29]     All four of these cases share a common denominator of one part of their holding regarding the discovery issue.[83] All four courts in Kleen Products, LLC, In Re Biomet, Progressive Casualty Insurance Company, and Bridgestone Americas, Inc. permitted the parties to employ keyword culling at the outset only after they had already performed keyword culling, or after it was already agreed upon by the parties.[84] Although the parties disagreed as to the proper method to apply after keyword culling was employed,[85] the courts found that ordering the parties to restart discovery and employ predictive coding would have been disproportional under the Rules.[86]

            B. Reinforcement of Court Decisions under the New Rules

[30]     Recently, the drafters of the Federal Rules of Civil Procedure and the Supreme Court rebalanced the priorities of discovery and set a legislative-like answer in the amendments to the Rules. This Part discusses those amendments, as well as the subsequent reactions of courts and scholars.

            1. Recent Amendments to the Rules

[31]     The Federal Rules of Civil Procedure were recently amended and deemed effective as of December 1, 2015. The new revisions can be found in the 2016 edition of the Federal Rules of Civil Procedure.[87] Many rules were amended, but the revisions to Rules 1 and 26 directly impact this discussion. Through these revisions, the rule drafters and the Supreme Court chose to highlight proportionality, as well as the responsibility of parties and courts in making these decisions.

[32]     Rule 1 was amended to emphasize that parties are just as responsible as courts in applying the Federal Rules of Civil Procedure to ensure the efficiency of every action in a case.[88] The previous version of Rule 1 stated that the rules “should be construed and administered to secure the just, speedy, and inexpensive determination of every action and proceeding.”[89] The new version of Rule 1 states that the rules “should be construed, administered, and employed by the court and the parties to secure the just, speedy, and inexpensive determination of every action and proceeding.”[90]

[33]     Rule 26 was amended to emphasize factors of proportionality in defining the scope of discovery.[91] The previous version of Rule 26(b)(1) stated:

Scope in General. Unless otherwise limited by court order, the scope of discovery is as follows: Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense—including the existence, description, nature, custody, condition, and location of any documents or other tangible things and the identity and location of persons who know of any discoverable matter. For good cause, the court may order discovery of any matter relevant to the subject matter involved in the action. Relevant information need not be admissible at the trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence. All discovery is subject to the limitations imposed by Rule 26(b)(2)(C).[92]

[34]     The amended version of Rule 26(b)(1) now states: 

Scope in General. Unless otherwise limited by court order, the scope of discovery is as follows: Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense and proportional to the needs of the case, considering the importance of the issues at stake in the action, the amount in controversy, the parties’ relative access to relevant information, the parties’ resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit. Information within this scope of discovery need not be admissible in evidence to be discoverable.[93]

[35]     The concept of proportionality appeared in Rule 26(b)(2)(C) in the previous version and has always been present; however, it now appears at the beginning of Rule 26(b)(1), which makes it more explicitly applicable to the entire scope of discovery.[94] Specifically, the proportionality factors moved from Rule 26(b)(2)(C)(iii) to the new location at the beginning of Rule 26(b)(1).[95] The Committee’s intention in moving these factors is to “make them an explicit component of the scope of discovery, requiring parties and courts alike to consider them when pursuing discovery and resolving discovery disputes.”[96]

[36]     It is important to note that the Committee made revisions to the actual factors that pertain to proportionality as well. They amended the order of the factors; the “importance of the issues at stake” now precedes the “amount in controversy” which places an emphasis on proportionality related to the issues, not only the dollar amount.[97] They also added one additional factor: “the parties’ relative access to relevant information.”[98]

[37]     The other change to Rule 26 is the removal of the language “reasonably calculated to lead to the discovery of admissible evidence.”[99] This means that the previous guidance in discovery, to find evidence that might lead to admissible evidence, has been taken out. Since it is no longer a requirement to potentially lead to admissible evidence, there may be a push from attorneys to narrow the scope of discovery.[100] The reason is that the previous requirement did not require a direct nexus to the case as discoverable evidence only had to potentially lead to other admissible evidence. In this application, it might be a call to highlight the most relevant evidence in discovery.

[38]     In sum, Rule 1 now explicitly makes it the priority of parties and courts to ensure that a case proceeds in a just and expedient manner. Rule 26 now explicitly prioritizes proportionality to dictate the scope of discovery. Both of these rules impact the decision of when it is the right time to apply predictive coding for several reasons. Predictive coding and keyword culling, as discussed above, have important implications regarding the accuracy and efficiency of the discovery process.

2. Subsequent Reactions to the New Rules

[39]     Courts have begun to apply these recent amendments of the Federal Rules of Civil Procedure, and there has not been a drastic change in the past few months. Many courts are finding that the priority of proportionality has been present since the prior version of the Rules, but the courts are able to more easily point to this priority as it is explicitly referred to first in Rule 26 regarding the scope of discovery.

[40]     For instance, just six days after the amendments went into effect, the court in Carr v. State Farm Mutual Automobile Insurance Co. found that the burdens on the parties have not fundamentally changed.[101] In that case, the defendant’s motion to compel was granted since the burden on the plaintiff to resist the motion to compel had not changed under the new rules, as evidenced by the Committee’s notes on the amendments.[102] Another court has concluded the application of predictive coding was disproportional under the new rules in Gilead Sciences, Inc. v. Merck & Co., Inc., but it stated that the result would have been the same even under the prior version of the Rules.[103] In that patent infringement case, the defendant’s motion to compel additional discovery was denied because the plaintiff would have needed to produce an excessive amount of information regarding the contents of tubes of compounds that were not at issue in the case.[104]

[41]     The court stated that the amendments now first require an inquiry into whether the additional discovery would be proportional, rather than whether it might lead to something admissible.[105]

[42]     Similarly, the court of the Southern District of Florida allowed the defendants to redact information that was irrelevant from documents that were considered responsive.[106] The court based its opinion on the concept of proportionality in Rule 26.[107]

[43]     The Year-End Report of the Federal Judiciary argues that the amendments have had a profound impact on the expected efficiency of parties and courts.[108] Magistrate Judge John M. Facciola believes the Rules were significantly modified in that the scope of discovery does not regard whether an item is “reasonably calculated to lead to the discovery of admissible evidence,”[109] but rather regards the issues at stake and proportionality concerns.[110] Because of this, lawyers may argue to narrow the scope of discovery.[111]

[44]     The courts that have begun to apply the new amendments to the Rules are finding that the outcome would have been similar even under the old Rules. The courts are only able to more easily point to the primary concerns of proportionality, justness, and expediency through the new amendments.

IV. Encouraging Predictive Coding Ex Ante 

[45]     In light of the court decisions and recent amendments to the Federal Rules of Civil Procedure, predictive coding should be encouraged at the outset of the discovery process to be applied on the entire universe of documents in a case. This Part will first explain the reasons why predictive coding should be used at the outset, and second, it will suggest how parties and courts should proceed in implementing this method.

            A. Why Predictive Coding Ex Ante is Preferable

[46]     Employing predictive coding at the outset provides significantly more accurate results in identifying relevant documents than keyword culling.[112] Predictive coding employs sophisticated technology which can more accurately predict relevant documents, beyond the simplistic search terms used in keyword culling.[113] The method of keyword culling is not as accurate because many relevant documents slip through the cracks when keyword searches are employed.[114] In terms of accuracy, predictive coding is significantly more accurate than keyword culling when used on the entire set of documents at the outset.

[47]     Since predictive coding would be employed under each of the two methods, the costs associated with either method are not significantly different. The majority of costs associated with predictive coding come from the time of a senior attorney who is intimately familiar with the case training the software, and the cost of employing a company that has the available technology and software to run predictive coding.[115] However, these costs will be expended in both methods since predictive coding is used in both methods. The point at which the monetary costs and time spent may vary between the two methods is in the senior attorney identifying potentially relevant documents and training the software on a larger volume of documents.[116] Accordingly, the cost differential between these two methods is in the time it takes to identify these potentially relevant documents, as well as the resulting production of documents. There has not been enough empirical research done on this inquiry, but no courts have held, and no parties have argued, that predictive coding would cost more at the outset. Although there is currently no proof that the costs are steeper, even if that were the case, it is likely not substantial enough to outweigh the benefit of accuracy in identifying relevant documents.

[48]     Furthermore, as discussed in Part III.A, courts have routinely upheld and encouraged the use of predictive coding at the outset. The courts that held keyword culling is permissible at the outset only found it permissible after the documents had already been keyword culled, and found it too burdensome and costly to restart discovery.[117]

[49]     The recent amendments to the Federal Rules of Civil Procedure further reinforce the concepts of proportionality and the responsibilities of the parties and courts to ensure the just and efficient resolution of a case. Rule 1 now mandates that the rules “should be construed, administered, and employed by the court and the parties to secure the just, speedy, and inexpensive determination of every action and proceeding.”[118] There is now an explicit emphasis on both courts and the parties to work justly and efficiently all throughout a case from the beginning to the end, which includes the discovery phase. More specifically, Rule 26(b) now highlights that the scope of discovery must begin with an inquiry of proportionality.[119] The Rule mandates that the parties and courts consider several factors of proportionality, including “the importance of the issues at stake in the action, the amount in controversy, the parties’ relative access to relevant information, the parties’ resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit.”[120]

[50]     The Rules explicitly emphasize proportionality with a list of many factors. This legislative-like answer set by the rules’ drafters and the Supreme Court was a deliberate decision to refocus the attention of discovery to the issues at stake as well as the importance of discovery in finding a resolution to those issues. As discussed above, the cost differential between both methods is likely insignificant. Proportionality, as applied in a discovery issue, concerns both accuracy and efficiency because it impacts time, cost, and the just resolution of a case. Since cost is not a determinative factor, the parties will gain accuracy in employing predictive coding at the outset, which is particularly proportional in the scope of discovery under the Rules. In this way, the parties gain accuracy without sacrificing efficiency.

            B. How Parties and Courts Should Proceed

[51]     At the beginning of discovery, parties should opt to employ predictive coding on the entire universe of documents in a case, in light of the benefits regarding accuracy and proportionality. Even under the previous version of the Rules, parties were encouraged to collaborate regarding discovery methods and to consider each step of predictive coding at the outset.[121] This collaboration is essential because the parties are usually the ones that are in the best position to initially evaluate the method rather than courts.[122]

[52]     The ideal protocol is that which was employed by the parties in In Re Actos.[123] In that case, the parties cooperated and collaborated at the beginning of the discovery phase and were able to successfully implement predictive coding.[124] At the opposite end of the spectrum, the parties in Kleen Products, demonstrated how destructive it was to dispute the methodology of discovery for several months, wasting both time and money on the dispute.[125] Further, the plaintiffs withdrew their demand which allowed the defendants to keep their previously keyword-culled documents.[126] This end result of accepting the keyword-culled documents was not a judicial decision, nor was it a collaborative effort by the parties. Rather, it was the easier solution after several months of dispute, and a result that was brought on by the plaintiffs’ withdrawal of the demand.[127] If parties are encouraged to collaborate at the outset and practice transparency by sharing the predictive coding methodology with the other party, there is little left for the other party to object to.[128] The reason is that costs are already being saved by employing predictive coding regardless of the time at which it is applied, and the method of employing predictive coding is overwhelmingly more accurate in producing relevant documents than keyword culling.[129]

[53]     Subsequently, all that is left that the parties may dispute is the input to the predictive coding software. Parties may disagree about the inputs in training the software, but it does not have to be a daunting task, as the parties in In Re Actos planned for that and allowed options to work together on the inputs and scheduled for times to meet and confer.[130] Therefore, it is more proportional and worthwhile to start with predictive coding at the outset.[131]

[54]     The courts in McNabb and Progressive Casualty Insurance Company also teach an important lesson about the importance of collaboration between the parties at the outset.[132] Since the court in McNabb rejected the plaintiff’s motion to compel and employ further keyword searches,[133] the parties could have both benefitted from predictive coding at the outset. The producing party in Progressive Casualty Insurance Company unilaterally decided to switch to predictive coding, which instigated a motion to compel from the requesting party.[134] These situations could have been avoided if there were collaborative efforts at the outset, as well as transparency throughout the process.

[55]     As discussed in Part III.A.2, courts allowed predictive coding to be used after keyword culling, primarily because keyword culling had already been employed by the producing party, and it would have been costly to start over with predictive coding on the entire universe of documents in the case. The judges reasoned that it would have been highly inefficient and disproportional to require that party to start over at the beginning, especially if the parties agreed on the use of the keyword search method at the outset.[135] In Kleen Products, LLC v. Packaging Corporation of America, the “defendants [had] [already] produced more than three million pages of documents” through keyword culling,[136] but plaintiffs requested the judge to order redoing discovery using predictive coding.[137] The parties eventually reached an agreement, with the plaintiffs withdrawing their demand.[138] The court in In Re Biomet M2a Magnum Hip Implant Products Liability Litigation allowed keyword culling prior to the application of predictive coding because if the party was ordered to restart and apply predictive coding on the raw data, it would have been expensive and disproportional under Rule 26.[139]

[56]     As shown by these cases, producing parties continually employ keyword culling at the outset, possibly because it is quicker or because it produces a smaller amount of documents.[140] Regardless of the motive, once this discovery issue is before the courts and the producing party has already employed keyword culling, courts have been hesitant to order the party to start the discovery process again. In effect, the producing parties are permitted to retain their keyword culling methods.

[57]     Courts need to lead the change. If the parties do not begin to employ predictive coding at the outset and continue to employ keyword culling, courts should suggest the use of predictive coding at the outset. It will be relatively simple for courts to encourage or mandate predictive coding at the outset, as the courts discussed in Part III.A did. Courts may be more reluctant to order a producing party to abandon its keyword culling and restart the discovery process to employ predictive coding at the outset, but at this point, it is necessary. Proportionality is a primary concern under the Federal Rules of Civil Procedure. When predictive coding will be used in a case, it should be used at the outset in order to obtain the most accurate documents. It may only take one court in one case to capture the attention of parties and other courts, in order to lead the change for a more accurate and proportional discovery process in the cases to come.

V. Conclusion

[58]     Predictive coding has been proven to be more accurate and efficient than traditional methods of discovery. There has been a split in authority as to the point at which predictive coding should be applied. The issue that courts have been facing is whether predictive coding should be applied at the outset to the entire universe of documents, or if it should be applied to keyword-culled documents. Courts have gone both ways on this issue, but as of December 1, 2015, the drafters of the Federal Rules of Civil Procedure and the Supreme Court approved amendments to the Rules. Primarily, the amendments to Rules 1 and 26(b)(1) directly impact this discussion, as these rules emphasize the responsibility of parties and courts to ensure that a case proceeds justly and efficiently, while highlighting the importance of proportionality in the scope of discovery. Considering these amendments, predictive coding should be applied at the outset on the entire universe of documents in a case. The reason is that it is far more accurate, and is not more costly or time-consuming, especially when the parties collaborate at the outset. As seen in prior cases, this is the best method to identify more relevant documents. The point at which it becomes costly and inefficient is if a party had already used keyword culling and must restart the discovery process to employ predictive coding. However, if parties collaborate and participate in transparency at the outset, they will often find that it is significantly more effective and in the interest of both parties to employ predictive coding to identify the most relevant documents. If parties cannot agree or fall back on old ways of keyword culling, courts can and should lead the change by encouraging predictive coding at the outset of the discovery process, with the recent amendments to the Federal Rules of Civil Procedure on their side.

*J.D. Candidate 2017, University of Richmond School of Law. B.A., 2012, American University of Beirut. The author gratefully acknowledges Professor Jessica Erickson for her mentorship in the organization and articulation of arguments in this article, as well as Ms. Meghan Podolny for her assistance in the primary research phase of this topic. The author would also like to thank the editors and staff of the Richmond Journal of Law & Technology for their efforts in editing this article.

[1] See, e.g., Maura R. Grossman & Gordon V. Cormack, Technology-Assisted Review in E-Discovery Can Be More Effective and More Efficient Than Exhaustive Manual Review, 17 Rich. J.L. & Tech. 1, 43, 48 (2011) (discussing benefits of predictive coding when conducting discovery); see also Joe Palazzolo, Why Hire a Lawyer? Computers are Cheaper, Wall Street J., (June 18, 2012, 2:06 PM), http://www.wsj.com/articles/SB10001424052702303379204577472633591769336, archived at https://perma.cc/FRN2-BTMW (noting that predictive coding is one subset of technology-assisted review (TAR) processes); see Andrew Peck, Search, Forward; Will Manual Document Review and Keyword Searches be Replaced by Computer-Assisted Coding?, Law Tech. News (Oct. 2011), https://law.duke.edu/sites/default/files/centers/judicialstudies/TAR_conference/Panel_1-Background_Paper.pdf, archived at https://perma.cc/7DDK-3HL5.

[2] Covington & Burling LLP, The Duty to Produce ESI, in Litigating Securities Class Actions § 13.04(2)(c) (Jonathan Eisenberg ed., 2016).

[3] See Tonia Hap Murphy, Mandating Use of Predictive Coding in Electronic Discovery: An Ill-Advised Judicial Intrusion, 50 Am. Bus. L.J. 609, 618 (2013) (noting that predictive coding uses sophisticated technology to narrow down documents that are most relevant to a case).

[4] See id.

[5] See id. at 617.

[6] See Fed. R. Civ. P. 1.

[7] See discussion infra Part III.B.1.

[8] See Da Silva Moore v. Publicis Groupe & MSL Group, 287 F.R.D. 182, 193 (S.D.N.Y. 2012). The Da Silva Moore case has received a significant amount of attention, since it was the first case in which predictive coding was judicially approved. See also Bennett B. Borden & Jason R. Baron, Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice, 20 Rich. J.L. & Tech. 1, 7, 16 (2014) (providing an in-depth statistical analysis finding that predictive coding is abundantly more accurate and efficient than traditional methods of discovery); see generally Grossman & Cormack, supra note 1, at 3 (discussing the efficiency and effectiveness of predictive coding).

[9] See Most Important Documents Get Looked at First: Using Predictive Coding to Prioritize & Expedite Review, Consilio (2016), http://www.consilio.com/wp-content/uploads/2016/01/Using-Predictive-Coding-to-Expedite-Review.pdf, archived at https://perma.cc/8R9L-6N5V (noting that if predictive coding were used at the outset it would have saved 70% of the time it took to conduct manual review).

[10] See Murphy, supra note 3, at 621–22.

[11] See Jim Eidelman, Best Practices in Predictive Coding: When are Pre-Culling and Keyword Searching Defensible?, Catalyst, Jan. 9, 2012, http://catalystsecure.com/blog/2012/01/best-practices-in-predictive-coding-when-are-pre-culling-and-keyword-searching-defensible/, archived at https://perma.cc/GG8K-3MMF.

[12] See id.; see also Barry Kazan & David Wilson, Technology-Assisted Review Is a Promising Tool for Document Production, N.Y. L.J. Online, Mar. 18, 2013, http://www.newyorklawjournal.com/id=1202592178481/TechnologyAssisted-Review-Is-a-Promising-Tool–for-Document-Production, archived at https://perma.cc/QZ6J-BVD6 (citing a case in which one party found that keyword culling only produces 20% of relevant documents, whereas predictive coding would be sufficient even when finding at a 75% responsive rate).

[13] See Eidelman, supra note 11.

[14] See Kazan & Wilson, supra note 12.

[15] See John Hopkins, Large Data and Document Production – Keyword Search and Predictive Coding, Searcy L. Blog, May 31, 2013, https://www.searcylaw.com/large-data-and-document-production-keyword-search-and-predictive-coding/, archived at https://perma.cc/VA9V-HJXM.

[16] Murphy, supra note 3, at 617.

[17] See id. at 620.

[18] See id. at 614–16, 620.

[19] The traditional way to employ keyword culling is run keywords through documents to retain the documents, which contain those keywords. See Ralph C. Losey, Predictive Coding and the Proportionality Doctrine: A Marriage Made in Big Data, 26 Regent U. L. Rev. 7, 58–59 (2013) (arguing that keyword culling could instead be used to cull documents out that are least likely to be relevant).

[20] See Jacob Tingen, Technologies-That-Must-Not-Be-Named: Understanding and Implementing Advanced Search Technologies in E-Discovery, 19 Rich. J.L. & Tech. 1, 33, 37 (2012); see Kate Mortensen, E-discovery Best Practices for Your Practice, Step 4: Search and Review, Inside Counsel, May 20, 2014, http://www.insidecounsel.com/2014/05/20/e-discovery-best-practices-for-your-practice-step, archived at https://perma.cc/Q7JW-XTTZ.

[21] See Joseph H. Looby, E-Discovery – Taking Predictive Coding Out of the Black Box, FTI J. (Nov. 2012), http://ftijournal.com/article/taking-predictive-coding-out-of-the-black-box-deleted, archived at https://perma.cc/4T49-CRTS.

[22] See Mark F. Foley, Expert Testimony May Be Needed for E-Discovery Keyword Searches, vonBreisen, Mar. 1, 2008, http://www.vonbriesen.com/legal-news/2098/expert-testimony-may-be-needed-for-e-discovery-keyword-searches, archived at https://perma.cc/2TGW-9KV9.

[23] See Murphy, supra note 3, at 614.

[24] Id. at 615–16.

[25] Id. at 614–15.

[26] See Matt Miller, Making Sure Your Predictive Coding Solution Doesn’t Cost More, DiscoverReady Blog, Apr. 30, 2013, http://discoverready.com/blog/making-sure-your-predictive-coding-solution-doesnt-cost-more/, archived at https://perma.cc/ZH6T-CZFN.

[27] See id.

[28] See Eidelman, supra note 11.

[29] Id.

[30] See id.

[31] See Miller, supra note 26.

[32] See, e.g., In Re Biomet M2a Magnum Hip Implant Prods. Liab. Litig., No. 3:12MD2391, 2013 U.S. Dist. LEXIS 84440, at *1 (N.D. Ind. Apr. 18, 2013) (Order Regarding Discovery of ESI) (noting that the requesting party expected about 10 million documents, but the producing party only produced 2.5 million documents).

[33] See Da Silva Moore v. Publicis Groupe & MSL Group, 287 F.R.D. 182, 193 (S.D.N.Y. 2012).

[34] See id. at 184–85.

[35] See id. at 184.

[36] See id. at 184–86.

[37] See id. at 186, 188.

[38] See Da Silva Moore v. Publicis Groupe SA, No. 11 Civ. 1279, 2012 U.S. Dist. LEXIS 58742, at *2 (S.D.N.Y. Apr. 25, 2012).

[39] See id. at *8–9.

[40] Id. at *8.

[41] See Global Aerospace Inc. v. Landow Aviation, L.P., No. CL 61040, 2012 Va. Cir. LEXIS 50, at *2 (Va. Cir. Ct. Apr. 23, 2012).

[42] See Brief in Opposition of Plaintiffs, Motion for Protective Order Regarding Electronic Documents and “Predictive Coding” at 2, Global Aerospace Inc. v. Landow Aviation, L.P., No. CL 61040, 2012 Va. Cir. LEXIS 50 (Va. Cir. Ct. Apr. 16, 2012), 2012 WL 1419848, at *1–2.

[43] See id. at *2–3.

[44] Global Aerospace Inc., 2012 Va. Cir. LEXIS 50, at *2.

[45] See In re Actos (Pioglitazone) Prods. Liab. Litig., No. 6:11-MD-2299, 2012 U.S. Dist. LEXIS 187519, at *20, *34 (W.D. La. July 27, 2012).

[46] See id. at *20.

[47] See id. at *21.

[48] See id. at *43.

[49] See McNabb v. City of Overland Park, No. 12-CV-2331 CM/TJJ, 2014 U.S. Dist. LEXIS 37312, at *5 (D. Kan. Mar. 21, 2014).

[50] See id. at *2.

[51] See Adam Kuhn, The Interplay Between Proportionality and Predictive Coding in e-Discovery, Recommind, June 12, 2014, http://www.recommind.com/blog/interplay-proportionality-predictive-coding-ediscovery, archived at https://perma.cc/LQX8-HYQM [hereinafter Interplay Between Proportionality and Predictive Coding].

[52] Id.

[53] See id.

[54] See Da Silva Moore v. Publicis Groupe SA, 287 F.R.D. 182, 193 (S.D.N.Y. 2012); see Global Aerospace Inc. v. Landow Aviation, L.P., No. CL 61040, 2012 Va. Cir. LEXIS 50, at *2 (Va. Cir. Ct. Apr. 23, 2012); In re Actos (Pioglitazone) Prods. Liab. Litig., No. 6:11-MD-2299, 2014 U.S. Dist. LEXIS 187519, at *12, *20 (W.D. La. July 27, 2012) (Case Management Order: Protocol Relating to the Production of Electronically Stored Information).

[55] See McNabb v. City of Overland Park, No. 12-CV-2331 CM/TJJ, 2014 U.S. Dist. LEXIS 52534, at *7, *9 (D. Kan. Apr. 16, 2014).

[56] See Murphy, supra note 3, at 629 (noting that the district judge allowed the discovery issue to be decided separately by the magistrate judge).

[57] Id. at 629–30 (citing the Joint Status Conference Report No. 3, at 3, Kleen Prods., LLC v. Packaging Corp. of Am., Civil Case No. 1:10–cv–05711 (N.D. Ill. May 17, 2012)).

[58] See id. at 630 (quoting Defendants’ Brief on Discovery Issues at 1, Kleen Prods., LLC v. Packaging Corp. of Am., No. 1:10–cv–05711 (N.D. Ill. Feb. 6, 2012).

[59] See id.

[60] See id.

[61] See Murphy, supra note 3, at 630–31.

[62] See Matthew Verga, Predictive Coding Cases, Part 2 – Kleen Products, Modus, Mar. 5, 2015, http://discovermodus.com/blog/predictive-coding-cases-2-kleen-products/, archived at https://perma.cc/6PHG-D49Z.

[63] See In Re Biomet M2a Magnum Hip Implant Prods. Liab. Litig., No. 3:12MD2391, 2013 U.S. Dist. LEXIS 84440, at *1 (N.D. Ind. Apr. 18, 2013) (Order Regarding Discovery of ESI).

[64] Bob Ambrogi, In Praise of Proportionality: Judge OKs Predictive Coding After Keyword Search, Catalyst, Apr. 29, 2013, http://www.catalystsecure.com/blog/2013/04/in-praise-of-proportionality-judge-oks-predictive-coding-after-keyword-search/, archived at https://perma.cc/2W7M-ZNHM.

[65] See Citing Proportionality, Court Declines to Require Defendant to Redo Discovery Utilizing Only Predictive Coding, K&L Gates, Apr. 23, 2013, https://www.ediscoverylaw.com/2013/04/citing-proportionality-court-declines-to-require-defendant-to-redo-discovery-utilizing-only-predictive-coding/, archived at https://perma.cc/5YUM-U6CY (citing Order Regarding Discovery of ESI, In Re Biomet M2a Magnum Hip Implant Prods. Liab. Litig.) [hereinafter Citing Proportionality].

 [66] See Keyword Filtering Prior to Predictive Coding Deemed Reasonable, EDiscovery Wire, Dec. 6, 2013, http://www.ediscoverywire.com/keyword-filtering-prior-to-predictive-coding-deemed-reasonable/, archived at https://perma.cc/P8S8-2WQZ.

[67] See Ambrogi, supra note 64.

[68] See id.

[69] See Progressive Cas. Ins. Co. v. Delaney, No. 2:11-CV-00678-LRH-PAL, 2014 U.S. Dist. LEXIS 69166, at *5 (D. Nev. May 20, 2014).

[70] See id. at *6-7.

[71] See id.

[72] See id. at *6.

[73] See id.

[74] See Progressive Cas. Ins. Co., 2014 U.S. Dist. LEXIS 69166, at *3–4.

[75] See id. at *31.

[76] See id.

[77] See Bridgestone Ams., Inc. v. Int’l Bus. Machs. Corp., No. 3:13-1196, 2014 U.S. Dist. LEXIS 142525, at *3 (M.D. Tenn., July 24, 2014) (Order Regarding use of Predictive Codes in Discovery) (explaining that the Magistrate Judge may permit the Plaintiff to use predictive coding on the documents).

[78] See Adam Kuhn, Bridgestone v. IBM Approves Predictive Coding Use, Rejects Progressive, Recommind, Aug. 12, 2014, http://www.recommind.com/blog/bridgestone-v-ibm-approves-predictive-coding-use-rejects-progressive, archived at https://perma.cc/NXY6-JX64.

[79] See Bridgestone Ams., Inc., 2014 U.S. Dist. LEXIS 142525, at *3.

[80] See Gilbert S. Keteltas, Predictive Coding After Keyword Screening!? Don’t Miss the Point of Bridgestone Americas, BakerHostetler: Discovery Advocate, Aug. 21, 2014, http://www.discoveryadvocate.com/2014/08/21/predictive-coding-after-keyword-screening-dont-miss-the-point-of-bridgestone-americas/, archived at https://perma.cc/YTR5-9UGX.

[81] Jason Bonk, Reasonableness and Proportionality Win Another Fight for Predictive Coding, E-Discovery L. Rev. (Sept. 17, 2014), http://www.ediscoverylawreview.com/2014/09/17/reasonableness-and-proportionality-win-another-fight-for-predictive-coding/, archived at https://perma.cc/98EY-ASU4 (quoting Eric Seggebruch).

[82] See discussion supra Part II.B.

[83] See Edward Schoenecker Jr., Nine Cases on Predictive Coding from Modus, LinkedIn, April 14, 2015, https://www.linkedin.com/pulse/nine-cases-predictive-coding-from-modus-edward-schoenecker, archived at https://perma.cc/N4ZY-VCRW.

[84] See Bridgestone Ams., Inc. v. Int’l Bus. Machs. Corp., No. 3:13-1196, 2014 U.S. Dist. LEXIS 142525, at *1–2 (M.D. Tenn., July 24, 2014) (Order Regarding use of Predictive Codes in Discovery); see also Progressive Cas. Ins. Co. v. Delaney, No. 2:11-CV-00678-LRH-PAL, 2014 U.S. Dist. LEXIS 69166, at *31 (D. Nev. May 20, 2014); see In Re Biomet M2a Magnum Hip Implant Prods. Liab. Litig., No. 3:12MD2391, 2013 U.S. Dist. LEXIS 84440, at *1 (N.D. Ind. Apr. 18, 2013) (Order Regarding Discovery of ESI); see Kleen Prods. LLC v. Packaging Corp. of Am., No. 10 C 5711, 2012 U.S. Dist. LEXIS 139632, at *14–19 (N.D. Ill. Sept. 28, 2012).

[85] See Bridgestone Ams., Inc., 2014 U.S. Dist. LEXIS 142525, at *1–2; see Progressive Cas. Ins. Co., 2014 U.S. Dist. LEXIS 69166, at *31.

[86] See Bridgestone Ams., Inc., 2014 U.S. Dist. LEXIS 142525, at *5; see Kleen Prods., LLC, 2012 U.S. Dist. LEXIS 139632, at *28.

[87] See 2015-2016 Federal Rules of Civil Procedure Amendments Released, Federal Rules of Civil Procedure Updates, May 13, 2015, https://www.federalrulesofcivilprocedure.org/2015-2016-federal-rules-of-civil-procedure-amendments-released/, archived at https://perma.cc/54GY-2XKK [hereinafter 2015-2016 Federal Rules Amendments]

[88] Id.; see also Federal Rule Changes Affecting E-Discovery Are Almost Here – Are You Ready This Time?, K&L Gates, Oct. 1, 2015, http://www.ediscoverylaw.com/wp-content/uploads/2015/10/Rules-Amendment-Alert-100115.pdf, archived at https://perma.cc/H7A3-2C7T [hereinafter Rule Changes].

[89] Fed. R. Civ. P. 1 (2014) (amended 2015).

[90] Fed. R. Civ. P. 1 (emphasis added).

[91] See 2015-2016 Federal Rules Amendments, supra note 87.

[92] Fed. R. Civ. P. 26(b)(1) (2014) (amended 2015).

[93] Fed. R. Civ. P. 26(b)(1) (emphasis added).

[94] See Just Follow the Rules! FRCP Amendments Could be E-Discovery Game Changer, Metropolitan Corporate Counsel (July 17, 2015, 11:49 PM), http://www.metrocorpcounsel.com/articles/32726/just-follow-rules-frcp-amendments-could-be-e-discovery-game-changer, archived at https://perma.cc/A9U7-3CHY [hereinafter Just Follow the Rules!].

[95] See E-Discovery Update: Federal Rules of Civil Procedure Amendments Go into Effect, McGuireWoods, Dec. 1, 2015, https://www.mcguirewoods.com/Client-Resources/Alerts/2015/12/E-Discovery-Update.aspx, archived at https://perma.cc/J5H6-4XET.

[96] Rule Changes, supra note 88, at 2 (quoting The Committee on Rules of Practice and Procedure, Report of the Judicial Conference Committee on Rules of Practice and Procedure to the Chief Justice of the United States and Members of the Judicial Conference of the United States app. at B–8 (2014), http://www.uscourts.gov/rules-policies/archives/committee-reports/reports-judicial-conferenceseptember-2014).

[97] Just Follow the Rules!, supra note 94 (arguing that although a case may not have an amount in controversy, it could still be a significant issue that deserves the concern of proportionality, such as discrimination or First Amendment cases).

[98] Rule Changes, supra note 88, at 2.

[99] Fed. R. Civ. P. 26(b)(1).

[100] See Just Follow the Rules!, supra note 94.

[101] See Court Applies Amended Rule 26 Concludes Burdens on Parties Resisting Discovery have not Fundamentally Changed, K&L Gates, Dec. 17, 2015, http://www.ediscoverylaw.com/2015/12/court-applies-amended-rule-26-concludes-burdens-on-parties-resisting-discovery-have-not-fundamentally-changed/, archived at https://perma.cc/A8W8-QQRK.

[102] See Carr v. State Farm Mut. Auto. Ins. Co., No.3:15-CV-1026-M, 2015 U.S. Dist. LEXIS 163444, at *1517 (N.D. Tex. Dec. 7, 2015).

[103] See Court Concludes Defendant’s Request was “Precisely the Kind of Disproportionate Discovery That Rule 26—Old Or New—Was Intended to Preclude,” K&L Gates, Jan. 19, 2016, https://www.ediscoverylaw.com/2016/01/court-concludes-defendants-request-was-precisely-the-kind-of-disproportionate-discovery-that-rule-26-old-or-new-was-intended-to-preclude/, archived at https://perma.cc/V8T8-WJHG (citing Gilead Sciences, Inc. v. Merck & Co., Inc., No. 5:13-CV-04057-BLF, 2016 U.S. Dist. LEXIS 5616 (N.D. Cal. Jan. 13, 2016)) [hereinafter Court Concludes].

[104] Gilead Sciences, Inc. v. Merck & Co., Inc., No. 5:13-CV-04057-BLF, 2016 U.S. Dist. LEXIS 5616, at *7 (N.D. Cal. Jan. 13, 2016).

[105] See Court Concludes, supra note 103 (citing Gilead Sciences, Inc. v. Merck & Co., Inc., No. 5:13-CV-04057-BLF, 2016 U.S. Dist. LEXIS 5616 (N.D. Cal. Jan. 13, 2016)).

[106] See Court Approves Proposal to Redact or Withhold Irrelevant Information from Responsive Documents and Document Families, K&L Gates, Mar. 3, 2016, http://www.ediscoverylaw.com/2016/03/court-approves-proposal-to-redact-or-withhold-irrelevant-information-from-responsive-documents-and-document-families/, archived at https://perma.cc/26E4-UXLH (citing In re Takata Airbag Prods. Liab. Litig., 2016 U.S. Dist. LEXIS 131746 (S.D. Fla. Mar. 1, 2016)).

[107] See id.

[108] See 2015 Year-End Report on the Federal Judiciary, SupremeCourt.Gov 1, 6, 9 (Dec. 31, 2015), http://www.supremecourt.gov/publicinfo/year-end/2015year-endreport.pdf, archived at https://perma.cc/5RU7-DCF7.

[109] Just Follow the Rules!, supra note 94.

[110] See id.

[111] See id.

[112] See Eidelman, supra note 11; see also Kazan & Wilson, supra note 12.

[113] See Eidelman, supra note 11; see also Kazan & Wilson, supra note 12.

[114] See Eidelman, supra note 11; see also Kazan & Wilson, supra note 12.

[115] See Miller, supra note 26.

[116] See id.

[117] See discussion, supra Part III.A.

[118] Fed. R. Civ. P. 1 (emphasis added).

[119] See Fed. R. Civ. P. 26(b)(1).

[120] Id.

[121] See Karl Schieneman & Thomas C. Gricks III, The Implications of Rule 26(g) on the Use of Technology-Assisted Review, 7 Fed. Cts. L. Rev. 239, 273–74 (2013) (noting that even under the old Rules, counsel was encouraged to consider each step of technology-assisted review under Rule 26(g) and 26(b)(2)(C)(iii)).

[122] See Charles Yablon & Nick Landsman-Roos, Predictive Coding: Emerging Questions and Concerns, 64 S.C. L. Rev. 633, 674 (2013) (citing Sedona Principle 6).

[123] See In re Actos (Pioglitazone) Prods. Liab. Litig., No. 6:11-MD-2299, 2012 U.S. Dist. LEXIS 187519, at *27 (W.D. La. July 27, 2012).

[124] See id. at *27.

[125] See Kleen Prods. LLC v. Packaging Corp. of Am., No. 10-C-5711, 2012 U.S. Dist. LEXIS 139632, at *60–62 (N.D. Ill. Sept. 28, 2012).

[126] See id. at *62–63.

[127] See id. at *58, *62.

[128] See id. at *58.

[129] See Grossman & Cormack, supra note 1, at 44, 48.

[130] See In re Actos (Pioglitazone) Prods. Liab. Litig., No. 6:11-MD-2299, 2014 U.S. Dist. LEXIS 86101, at *20–34 (W.D. La. June 23, 2014).

[131] See Interplay Between Proportionality and Predictive Coding, supra note 51 (“[A] party who unilaterally decides later on in discovery that its search tactics were too imprecise could find that proportionality standards prevent the use of more advanced, accurate, and targeted searches with predictive coding technologies.”).

[132] See, e.g., McNabb v. City of Overland Park, No. 12-CV-2331 CM/TJJ, 2014 U.S. Dist. LEXIS 37312, at *2–14 (D. Kan. Mar. 21, 2014); see also Progressive Cas. Ins. Co. v. Delaney, No. 2:11-CV-00678-LRH-PAL, 2014 U.S. Dist. LEXIS 69166, at *30–32 (D. Nev. May 20, 2014).

[133] See McNabb, 2014 U.S. Dist. LEXIS 37312, at *5.

[134] See Progressive Casualty, 2014 U.S. Dist. LEXIS 69166, at *2, *30–32.

[135] See id. at *30–32.

[136] Murphy, supra note 3, at 629–30.

[137] See id. at 630.

[138] See id.

[139] See Citing Proportionality, supra note 65 (discussing the court’s decision in Kleen regarding ESI searches).

 [140] See Eidelman, supra note 11.

Page 58 of 84

Powered by WordPress & Theme by Anders Norén