Richmond Journal of Law and Technology

The first exclusively online law review.

Social Media Evidence in Government Investigations and Criminal Proceedings: A Frontier of New Legal Issues

pdf_iconDownload PDF

Cite as: Justin P. Murphy & Adrian Fontecilla, Social Media Evidence in Government Investigations and Criminal Proceedings: A Frontier of New Legal Issues, 19 RICH. J.L. & TECH 11 (2013), available at http://jolt.richmond.edu/v19i3/article11.pdf.

 

By Justin P. Murphy and Adrian Fontecilla*

I.  Introduction

[1]        As the newest pillar of communication in today’s society, social media is revolutionizing how the world does business, discovers and shares news, and instantly engages with friends and family.  Not surprisingly, because social media factors into the majority of cases in some respect, this exploding medium significantly affects government investigations and criminal litigation.  Social media evidence includes, among other things, photographs, status updates, a person’s location at a certain time, and direct communications to or from a defendant’s social media account.  This Article will examine the importance of social media in government investigations and criminal litigation, including access to and use of social media evidence, constitutional issues that social media evidence raises, the authentication and admissibility of such evidence, in addition to the impact of social media on jurors.

 

II.  The Importance of Social Media

[2]        Social media use is widespread.  Ninety-one percent of today’s online adults use social media regularly, which has become the number one activity on the web.[1]  “People continue to spend more time on social networks than any other category of [web]sites,” accounting for “20% of their time spent on PCs and 30% of their mobile [use] time.”[2]  Social media use in the United States alone has increased by 356% since 2006.[3]  52% of Americans now have at least one social media profile,[4] more than one billion people use Facebook actively each month,[5] and 32% of all Internet users are now using Twitter.[6]  Notably, some of the largest growth in the last year has been among forty-five to fifty-four year old Americans, 55% of whom now have a profile on a social networking site.[7]

[3]        There are hundreds of social networking websites with each catering to a different demographic and providing a different type of content.[8]  Moreover, their users are constantly creating massive amounts of data.  “Twitter users send [one] billion tweets every two and a half days,”[9] Instagram users upload forty million images every day,[10] Facebook users share 684,478 pieces of content every minute, and YouTube users upload forty-eight hours of new video every minute.[11]  Social media users create more than just photos, videos, and tweets.  They share other information, such as their location as well.  “As of 2012, [seventeen] billion location-tagged posts and check-ins were logged.”[12]  The myriad and continually changing ways to share information via social media has resulted in a digital goldmine of potential evidence, such as profiles, lists of friends, group memberships, messages, chat logs, tweets, photos, videos, tags, GPS locations, likes, check-ins, and login timetables.[13]

[4]        The information that social media providers make available is staggering.  When a phone company responds to a government subpoena or search warrant, it may provide call or message logs.  In contrast, when a social media company like Facebook responds to a government subpoena, it could provide the user’s profile, wall posts, photos that the user uploaded, photos in which the user was tagged, a comprehensive list of the user’s friends with their Facebook IDs, and a long table of login and IP data.[14]  In addition, with the advent of location-based services that social media companies like Facebook, Twitter, and FourSquare offer, precise location information will be increasingly maintained in the ordinary course of business and subject to the same subpoenas and search warrants.[15]  One newsworthy example demonstrating the amount of information available to law enforcement from a simple photograph is that of John McAfee, the antivirus company founder who was recently on the run from law enforcement authorities investigating the murder of his neighbor.  McAfee was forced out of hiding when it was found that a photo of him published on a blog was embedded with GPS metadata pinpointing his exact location in Guatemala.[16]  Not surprisingly, each social media request can yield admissions or incriminating photos in addition to other evidence.[17]

 

III.  Accessing Publicly Available Social Media Evidence

[5]        It is no secret that government agencies mine social networking websites for evidence.  Even without having to seek a warrant from the court or issue a subpoena, there are troves of social media evidence publicly available.[18]  For example, the New York Police Department has a social media unit that mines Facebook, Twitter, and other social media sites for evidence of crimes and potential criminal activity.[19]  Moreover, a majority of government agencies are active participants who contribute content and solicit information through social media.[20]  Given the amount of information publicly available and the avenues that the government has to seek out such information, usually the government does not need a search warrant, subpoena, or court order to obtain social media evidence.

[6]        There are countless cases involving defendants who are arrested because of information, photos, or admissions posted to social media sites.  For example, a defendant in Kentucky was jailed after he posted a photo of himself siphoning gas from a police car onto Facebook.[21]  Another defendant broke into a Washington, D.C. home to steal a coat, a laptop, and cash, subsequently using the victim’s laptop to post a picture of himself wearing the stolen coat and holding up the stolen cash to the victim’s Facebook page.[22]  The photo was used later to secure a guilty plea from the defendant.[23]  While some sites allow users to control what content the public can access, many users do not make use of such tools.  In fact, twenty five percent of Facebook users do not use any type of privacy controls.[24]

[7]        In addition to searching for publicly available evidence, government agents are allowed to go further than defense counsel in pursuing social media evidence for a criminal proceeding.  To bypass the need for a search warrant, government agents may pierce the privacy settings of a person’s social media account by creating fake online identities or by securing cooperating witnesses to grant them access to information.[25]  For example, in United States v. Meregildo, the defendant adjusted the privacy settings on his Facebook account so that only his Facebook “friends” could view his postings.[26]  The government obtained the incriminating evidence against the defendant through a cooperating witness who happened to be Facebook “friends” with the defendant.[27]  The defendant moved to suppress the evidence seized from his Facebook account, arguing that the government had violated his Fourth Amendment rights.[28]  The court found:

Where Facebook privacy settings allow viewership of postings by “friends,” the Go
vernment may access them through a cooperating witness who is a “friend” without violating the Fourth Amendment. . . . While [the defendant] undoubtedly believed that his Facebook profile would not be shared with law enforcement, he had no justifiable expectation that his “friends” would keep his profile private.  And the wider his circle of “friends,” the more likely [the defendant’s] posts would be viewed by someone he never expected to see them.  [The Defendant’s] legitimate expectation of privacy ended when he disseminated posts to his “friends” because those “friends” were free to use the information however they wanted—including sharing it with the Government.[
29]

[8]        Recently, federal authorities relied heavily on social media to build their case against four defendants who were allegedly involved in an Al Qaeda inspired terrorist cell based in California.[30]  The criminal complaint, which included a section titled “Defendants’ Social Media,” provides a glimpse into the various ways that law enforcement uses social media in its investigations.[31]  The investigators used an “online covert employee” who posed as a terrorism sympathizer to elicit damaging statements from the defendants, recorded Skype conversations between a confidential informant and the defendants, and relied on the social media content that each defendant “liked,” “shared,” or on which the defendant commented.[32]

[9]        The Securities and Exchange Commission also recently issued a Wells Notice for the first time based on a social media communication.[33]  On December 5, 2012, Netflix disclosed that it had received a Wells Notice from the SEC Enforcement Staff for allegedly violating public disclosure rules when its CEO, Reed Hastings, posted onto his Facebook with more than 200,000 followers that, “Netflix monthly viewing exceeded one billion hours for the first time ever in June [2012].”[34]  After receiving the notice, Hastings noted in a letter to shareholders that, “[W]e think posting to over 200,000 people is very public, especially because many of my subscribers are reporters and bloggers;” nevertheless, the SEC has provided no formal guidance concerning the use of social media, Regulation FD, and communications with the investing public. [35]

 

IV.  Social Media Companies, Subpoenas, and Warrants

[10]      Given the digital goldmine of potential evidence available from social media companies, it is not surprising that they are increasingly targeted in search warrants and government subpoenas in criminal matters.  For example, Twitter “received more government requests” for user information in the “first half of 2012 . . . than in the entirety of 2011.”[36]  In addition, approximately 80% of those requests were from authorities in the United States.[37]  Google, which operates social networking sites including YouTube and Google+, continues to receive subpoenas and search warrants in criminal matters at a rapidly accelerating pace.  Statistics published by Google, which “primarily cover requests in criminal matters,”[38] show that the number of Google user data requests received from government authorities in the United States more than doubled from 2009 to 2012 and that the United States accounts for over 39% of user data requests received from government authorities around the world.[39]

[11]      Moreover, the prevalence of social media evidence in criminal proceedings will continue to proliferate as government agencies continue to formally train their personnel to search for and collect social media evidence.  A recent survey of over 1,200 federal, state, and local law enforcement professionals reveals that social media is widely used to assist in investigations, few learned how to use social media for investigations through formal training, and “74% of those not currently using it . . . intend to start using it.”[40]  Moreover, the case law is already replete with instances in which the government obtained social media evidence through a warrant or subpoena directed at a social media company.[41]  Social media evidence is the new frontier of criminal proceedings and it raises unique legal challenges, including issues of admissibility and a defendant’s constitutional rights in material that social media companies maintain.

 

V.  Accounting for the Stored Communications Act

[12]      Federal law provides that in some circumstances, the government may compel social media companies to produce social media evidence without a warrant.  The Stored Communications Act (“SCA”) governs the ability of governmental entities to compel service providers, such as Twitter and Facebook, to produce content (e.g., posts and tweets) and non-content customer records (e.g., name and address) in certain circumstances.[42]  Passed in 1986, the SCA has not been amended to reflect society’s heavy use of new technologies and electronic services, such as social media, which have evolved since the SCA’s original enactment.[43]  Consequently, courts will continue to play a critical role in defining how and whether the SCA applies to the varying features of different social media services by applying precedent from older technologies, such as text messaging pager services or electronic bulletin boards.[44]

[13]      The SCA provides that non-content records can be compelled through a warrant or court order.[45]  With regard to the compelled disclosure of communication content, the SCA provides different levels of statutory privacy protection depending on how long the content has been in electronic storage.[46]  The government may obtain content that has been in electronic storage for 180 days or less “only pursuant to a warrant.”[47]  “The government has three options for obtaining communications . . . that have been in electronic storage with an electronic service provider for more than 180 days: (1) obtain a warrant; (2) use an administrative subpoena; or (3) obtain a court order under § 2703(d).”[48]

[14]      At least one Circuit Court of Appeals has called into question the constitutionality of the SCA.[49]  In United States v. Warshak, the Sixth Circuit held that “the government agents violated the Fourth Amendment when they obtained the contents of [defendant’s] e-mails” without a warrant and added that, “to the extent that the SCA purports to permit the government to obtain such e-mails warrantlessly, the SCA is unconstitutional.”[50]  The court reasoned that “[o]ver the last decade, e-mail has become ‘so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification’” and that therefore, “e-mail requires strong protection under the Fourth Amendment.”[51]  Noting that e-mail was analogous to a phone call or letter and that the internet service provider was the intermediary who made e-mail communication possible, the functional equivalent of a post office or telephone company, the court concluded that given “the fundamental similarities between e-mail and traditional forms of communication, it would defy common sense to afford e-mails lesser Fourth Amendment protection.”[52]  However, Congress made clear that changing the law will require extended consideration when, on December 24, 2012, the Senate removed from proposed legislation an amendment to the SCA that would have prevented authorities from viewing a person’s e-mail messages without obtaining a warrant.[53]  In the meantime, courts will play a key role in clarifying how the SCA applies not only to e-mails, but also to the social media that has rapidly become as pervasive and important to people as e-mail.

 

VI.  Defining a Defendant’s Constitutional Rights Regarding Social Media Evidence

[15]      Courts have also star
ted grappling with novel issues relating to the constitutionality of the government’s use of information obtained from social media companies in criminal proceedings.[54]  For example, a New York appellate court will soon issue an opinion regarding Twitter’s appeal of two court orders in the prosecution of an Occupy Wall Street protestor in People v. Harris.[55]  The trial court held that the defendant lacked standing to move to quash the government’s third-party subpoena to Twitter for his account records and that the Fourth Amendment did not protect his tweets.[56]  The trial court similarly denied Twitter’s motion to quash the government’s subpoenas for the defendant’s Twitter records for the same reasons.[57]  Although Twitter’s appeal is pending, Twitter turned over the data after the trial judge threatened the company with civil contempt and fines, which led to the defendant’s guilty plea in December 2012.[58]

[16]      Notably, the defendant was only able to move to quash the subpoena because “Twitter’s policy is to notify users of requests for their information prior to disclosure,”[59] a policy which is becoming more common among social media companies.[60]  Not only does Twitter notify its users that the company has received a government-issued information request for the user’s data, but it also protects its business by litigating against such third-party government subpoenas.[61]

[17]      On appeal, Twitter argued that the defendant has standing to quash the government’s subpoena because he has a proprietary interest in his tweets, pointing to the express language of Twitter’s Terms of Service.[62]  Moreover, Twitter claimed that the Fourth Amendment protects the defendant’s tweets, primarily because the government concedes that the defendant did not make public the tweets that it sought.[63]  If a defendant has a reasonable expectation of privacy under the Fourth Amendment in his or her non-public e-mails,[64] refusing to afford that same protection to users’ non-public tweets would create “arbitrary line drawing.”[65]  Finally, even assuming that the tweets in question were public, Twitter argued that the government still requires a search warrant under the federal and New York constitutions.[66]  Notwithstanding Twitter’s pending appeal, Twitter complied with a court order requiring it to promptly submit the defendant’s tweets under seal.[67]

[18]      The line-drawing concerns that Twitter expressed in its People v. Harris brief, that a defendant’s reasonable expectation of privacy under the Fourth Amendment in his or her social media records depends on the privacy settings for the particular account in question, were implicated in United States v. Meregildo, a case in which the court held that “[w]here Facebook privacy settings allow viewership of postings by ‘friends,’ the Government may access them through a cooperating witness who is a ‘friend’ without violating the Fourth Amendment.”[68]

[19]      Some courts have concluded that individuals have “a reasonable expectation of privacy to [their] private Facebook information and messages.”[69]  Those courts, while recognizing the importance of properly understanding how Facebook works, distinguished between “private messaging” and posts to a user’s Facebook wall.[70]  Using privacy setting distinctions to determine social media users’ constitutional rights may result in arbitrary line drawing that might evaporate as social media evolves.  Indeed, with Facebook’s customizable and post-specific privacy settings, a person who shares a message by posting it on another user’s wall can actually make it as private as information shared via a Facebook message.[71]

[20]      In addition, it remains uncertain whether, given the sheer breadth of information available in any particular social media account, one can successfully challenge search warrants for entire social media accounts for lacking sufficient limits or boundaries that would enable the government-authorized reviewing agent to ascertain which information the agent is authorized to review.[72]  Ultimately, because an expectation of privacy under the Fourth Amendment is partly a function of whether “society [is] willing to recognize that expectation as reasonable,” social media’s rapid proliferation through today’s society may influence the privacy protections afforded to social media evidence in the future.[73]

 

VII.  Defending a Criminal Case with Social Media Evidence

[21]      Defendants face more significant obstacles than the government when seeking exculpatory evidence from social media companies.[74]  First, defendants and their counsel do not share the government’s freedom to sleuth for publicly available social media evidence, although counsel should have free access to anything his or her client produced or can access.[75]  Ethics opinions issued to lawyers in various states have established that a defendant’s lawyer may not “friend” or direct a third person to “friend” another party or witness in litigation in order to search for impeachment material or exculpatory evidence.[76]

[22]      Second, defendants face additional hurdles when seeking to issue a third party subpoena.[77]  Defendants may seek to subpoena social media companies for user information regarding the victim, the complaining witness, or another witness.[78]  In those instances, in federal criminal proceedings, defendants must pursue such non-party discovery pursuant to Federal Rule of Criminal Procedure 17 and seek a court order allowing such a subpoena.[79]  Among other hurdles in seeking such an order, the court may find that the evidence maintained by a social media website is “private,” in which case the SCA prohibits a non-governmental entity, such as Facebook and MySpace, from disclosing that information without the consent of the owner of the account or a government order.[80]  In one high profile example of a defendant clearing such hurdles, on October 19, 2012, the court presiding over the Trayvon Martin murder trial granted the defendant’s motion seeking permission to subpoena Facebook and Twitter for the records of Trayvon Martin’s social media accounts in addition to Mr. Martin’s girlfriend’s Twitter account.[81]  Notwithstanding the order, Facebook and Twitter may challenge the subpoenas as Twitter so did in People v. Harris.

[23]      Despite these challenges, criminal defendants may attempt to use novel methods of obtaining exculpatory social media evidence.  For example, under Brady v. Maryland or Giglio v. United States, one may obtain a law enforcement officer’s social media account records.[82]  Moreover, courts may order jurors, witnesses, or third parties to produce or manipulate their social media information in unique and unprecedented ways.  For example, courts have: (1) ordered a juror to “execute a consent form sufficient to satisfy the exception” in the SCA to allow Facebook to produce the juror’s wall posts to defense counsel;[83] (2) ordered a party to briefly change his Facebook profile to include a prior photograph so that his Facebook pages could be printed as they existed at a prior time;[84] (3) recommended that an individual “friend” the judge on Facebook in order to facilitate an in camera review of Facebook photos and comments;[85] and (4) ordered parties to exchange social media account user names and passwords.[86]  Such novel avenues of access to social media evidence may be considered when the defendant subpoenas a social media provider for certain records of a witness or victim and the social media company objects to the subpoena pursuant to the SCA or is unable to produce the evidence as it previously existed.

 

VIII.  Admissibility of Social Media Evidence

[24]      Social media is subject to the same rules of evid
ence as paper documents or other electronically stored information, but the unique nature of social media as well as the ease with which it can be manipulated or falsified creates hurdles to admissibility not faced with other evidence.[87]  The challenges surrounding social media evidence demand that one consider admissibility when social media is preserved, collected, and produced.  It is important for counsel to memorialize each step of the collection and production process in addition to considering how counsel will authenticate a tweet, Facebook posting, or photograph.  Methods of authentication include presenting a witness with personal knowledge of the information (they wrote it, they received it, or they copied it), searching the computer itself to see if it was used to post or create the information, or attempting to obtain the information in question from the actual social media company that maintained the information the ordinary course of their business.

[25]      Notably, these same challenges face the government who must also consider the admissibility of social media when they conduct their investigation.  In United States v. Stirling, the government seized the defendant’s computer pursuant to a search warrant and provided the defendant with a forensic copy of the hard drive.[88]  The government also performed a forensic examination of the hard drive and extracted 214 pages of Skype chats downloaded from the defendant’s computer, which were not “readily available by opening the folders appearing on the hard drive,” but did not provide this information to the defense until the morning of its expert’s testimony near the end of trial.[89]  The logs “had a devastating impact” on the defendant because they contradicted many of his statements made during his testimony and he was convicted.[90]  In a short but stinging opinion ordering a new trial, the court found:

[If a defendant] needs to hire a computer forensics expert and obtain a program to retrieve information not apparent by reading what appears in a disk or hard drive, then such a defendant should so be informed by the Government, which knows of the existence of the non-apparent information.  In such instance, and without the information or advice to search metadata or apply additional programs to the disk or hard drive, production has not been made in a reasonably usable form.  Rather, it has been made in a manner that disguises what is available, and what the Government knows it has in its arsenal of evidence that it intends to use at trial.[91]

[26]      While both government and defense attorneys continue to grapple with addressing and authenticating social media sources of evidence, courts largely seem to be erring on the side of admissibility and leaving any concerns about the evidence itself, such as who authored the evidence or whether the evidence is legitimate, to jurors to decide what weight to give that evidence.  For example, courts have ruled social media evidence as admissible where the content of the evidence contains sufficient indicia that it is the authentic creation of the purported user.[92]  In Tienda v. State, the appellant was convicted of murder based in part on evidence that the prosecutors obtained after subpoenaing MySpace. [93]  Specifically, “the State was permitted to admit into evidence the names and account information associated with [the defendant’s MySpace.com profiles], photos posted on the profiles, comments and instant messages linked to the accounts, and two music links posted to the profile pages.”[94]  The Court of Criminal Appeals affirmed the trial judge’s decision and concluded that the MySpace profile exhibits used at trial were admissible because they were a sufficient “indicia of authenticity” that “the exhibits were what they purported to be—MySpace pages for which the appellant was responsible for” the content.[95]

[27]      In another recent case, a defendant was convicted of aggravated assault following a domestic dispute with his girlfriend.[96]  At trial, the prosecution introduced Facebook messages sent from the defendant’s account in which he indicated that he regretted striking his girlfriend and asked for her forgiveness.[97]  The defendant denied sending the Facebook messages and argued that both he and his girlfriend had access to each other’s Facebook accounts.[98]  On appeal, the court, acknowledging that “electronic communications are susceptible to fabrication and manipulation,” affirmed the trial court’s ruling that allowed the state to authenticate the messages through circumstantial evidence, most notably that they were sent from the defendant’s account and that the girlfriend testified that she did not send the messages.[99]  In another instance, a federal court found that photographs of a defendant from his MySpace page, which depicted him holding cash, were relevant in his criminal trial for possession of firearms and drugs, but it withheld ruling on the admissibility of the photos and whether they presented a risk of unfair prejudice.[100]

[28]      Given the proliferation of social media, the increasing sophistication of technology, and the potential challenges relating to the reliability or authentication of social media, the authentication and admissibility of such evidence will likely continue to be the subject of vigorous disputes between parties that may mean the difference between ultimate guilt and innocence.

 

IX.  Juries and Social Media

[29]      Admissibility is just one challenge that the Internet and social media pose at trial.  Another difficult issue relates to what information may be gathered about prospective jurors.  At least one bar association has determined that attorneys may use social media websites to conduct juror research as long as no communication occurs between the lawyer and the juror as a result of the research.[101]  However, attorneys may not research jurors if that research results in the juror receiving a communication.[102]  Third parties working for the benefit of or on behalf of an attorney must comport with the same restrictions as that attorney and, similarly to other ethical restrictions on defense counsel’s ability to use social media as an investigative tool discussed supra, an attorney cannot use deception to gain access to a juror’s website or to obtain information.[103]

[30]      One of the most recent and challenging social media trends relates to jurors using wireless communication devices to look up a defendant’s criminal record, conduct their own investigation into a case, post their opinions about the case on social media websites, or attempt to “friend” parties, lawyers, witnesses, or judges.  In some instances, this conduct has resulted in mistrials and overturned convictions.[104]  In other instances, such conduct has caused courts to conduct lengthy hearings to determine the impact of the juror’s actions.  For example, in Sluss v. Commonwealth, a defendant appealed his murder, assault, and evidence tampering convictions on the grounds that two members of the jury, including one who served as the jury foreperson, failed to indicate during voir dire that they had each “friended” the victim’s mother through Facebook.[105]  The Supreme Court of Kentucky, noting that being a “friend” on Facebook was not enough by itself to prove bias for disqualification as those “friendships” may be superficial, reversed and remanded the case with instructions to hold a hearing on whether the jurors should have been struck from the jury panel on the basis of their alleged social networking activity.[106]  Finally, the inappropriate use of social media has led to stiff penalties for both jurors and attorneys.[107]

[31]      Both legislatures and courts have attempted to respond to these trends.  For example, California adopted a new statute clarifying that jurors may not use social media and the Internet, such a
s texting, Twitter, Facebook, and Internet searches, to research or disseminate information about cases, and they can be held in criminal or civil contempt for violating these restrictions.[108]  On August 21, 2012, a Judicial Conference Committee announced that it had created an updated model set of jury instructions to help judges discourage jurors from conducting research or communicating about their cases through social media.[109]  The model instructions state:

I know that many of you use cell phones, Blackberries, the Internet and other tools of technology. . . . You may not communicate with anyone about the case on your cell phone, through e-mail, Blackberry, iPhone, text messaging, or on Twitter, through any blog or website, including Facebook, Google+, My Space, LinkedIn, or YouTube.  You may not use any similar technology of social media, even if I have not specifically mentioned it here.[110]

[32]      The chair of the Conference Committee who provided the updated rules stressed that:

The judges recommended that jurors frequently be reminded about the prohibition on social media before the trial, at the close of a case, at the end of each day before jurors return home, and other times, as appropriate.  Jurors should be told why refraining from use of social media promotes a fair trial.  Finally, jurors should know the consequences of violations during trial, such as mistrial and wasted time.  Those recommendations are now part of the guidelines.[111]

 

X.  Conclusion

[33]      Social media evidence is undeniably a critical new frontier of government investigations and criminal proceedings.  Social media has rapidly become so pervasive that while users are creating warehouses of data every day and social media companies roll out new communication features, courts, government agencies, practitioners, and the social media companies themselves are struggling to understand how this information fits into existing legal paradigms of constitutional protections, the SCA, and rules of evidence.  Despite this uncertainty, one thing is clear.  The government has a deep and largely one-sided set of tools for seeking out and obtaining social media evidence that plays an ever-increasing critical role in their investigations and litigation.

 

* Justin P. Murphy is a counsel in Crowell & Moring’s Washington, D.C. office where he practices in the firm’s White Collar & Regulatory Enforcement Group and E-Discovery and Information Management Group.  Adrian Fontecilla is an associate in Crowell & Moring’s Washington, D.C. office where he practices in the firm’s Antitrust Group.  Both are contributors to Crowell & Moring’s E-Discovery Law Insights blog – http://www.ediscoverylawinsights.com/.

 

[1] Experian Marketing Services, The 2012 Digital Marketer: Benchmark and Trend Report 79 (2012), available at http://www.experian.com/simmons-research/register-2012-digital-marketer.html.

[2] Nielsen, State of the Media: Social Media Report 2012, at 4 (2012), available at http://blog.nielsen.com/nielsenwire/social/2012/ (last visited Dec. 31, 2012).

[3] Connect: Social Media Madness U.S. 2012, Netpop Research (April 2012), available at http://netpopresearch.com/social-media-madness.

[4] Tom Webster, The Social Habit 2011, Edison Research (May 29, 2011), http://www.edisonresearch.com/home/archives/2011/05/the_social_habit_2011.php.

[5] Aaron Smith, Laurie Segall & Stacy Cowley, Facebook Reaches One Billion Users, Cnn Money (Oct. 4, 2012, 9:50 AM), http://money.cnn.com/2012/10/04/technology/facebook-billion-users/index.html.

[6] Brian Honigman, 100 Fascinating Social Media Statistics and Figures From 2012, Huffington Post (Nov. 11, 2012, 7:32 PM), http://www.huffingtonpost.com/brian-honigman/100-fascinating-social-me_b_2185281.html.

[7] Erik Qualman, 10 New 2012 Social Media Stats = WOW!, Socialnomics, http://www.socialnomics.net/2012/06/06/10-new-2012-social-media-stats-wow/ (last visited Dec. 31, 2012).

[8] See Pingdom, Social Network Demographics in 2012 (2012), available at http://royal.pingdom.com/2012/08/21/report-social-network-demographics-in-2012/.

[9] Nielsen and Twitter Establish Social TV Rating, nielsen (Dec. 17, 2012), http://www.nielsen.com/us/en/insights/press-room/2012/nielsen-and-twitter-establish-social-tv-rating.html.

[10] Instagram Press Center, Instagram, http://instagram.com/press/ (last visited Feb. 1, 2013).

[11] Josh James, How Much Data Is Created Every Minute?, Domo (June 8, 2012), http://www.domo.com/blog/2012/06/how-much-data-is-created-every-minute/.

[12] Honigman, supra note 6.

[13] See Quagliarello v. Dewees, No. 09-4870, 2011 WL 3438090, at *2 (E.D. Pa. Aug. 4, 2011) (“As the use of social media such as Myspace and Facebook has proliferated, so too has the value of these websites as a source of evidence for litigants.”).

[14] See, e.g., Carly Carioli, When the Cops Subpoena Your Facebook Information, Here’s What Facebook Sends the Cops, The Phoenix (Apr. 6, 2012, 8:30 AM), http://blog.thephoenix.com/blogs/phlog/archive/2012/04/06/when-police-subpoena-your-facebook-information-heres-what-facebook-sends-cops.aspx (noting the breadth of information Facebook provided in response to a subpoena from the Boston Police Department).

[15] Cf. Marcia Hofmann et al., Elec. Frontier Found., 2012: When the Government Comes Knocking, Who Has Your Back? 7 (2012), available at https://www.eff.org/sites/default/files/who-has-your-back-2012_0_0.pdf (discussing issues arising from government access to location data and the companies that collect data).

[16] Eyder Peralta, Betrayed By Metadata: John McAfee Admits He’s Really in Guatemala, NPR (Dec. 4, 2012, 12:24 PM), http://www.npr.org/blogs/thetwo-way/2012/12/04/166487197/betrayed-by-metadata-john-mcafee-admits-hes-really-in-guatemala.

[17] See, e.g., United States v. Anderson, 664 F.3d 758, 761-62 (8th Cir. 2012) (affirming the conviction of a defendant sentenced to 12 years in prison based in part on over 800 private chats with adolescent girls and inappropriate pictures that were obtained through a search warrant for defendant’s Facebook account).

[18] See, e.g., U.S. Dep’t of Homeland Sec., Privacy Impact Assessment for the Office of Operations Coordination and Planning: Publicly Available Social Media Monitoring and Situational Awareness Initiative 3 (2010), available at http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_ops_publiclyavailablesocialmedia.pdf (noting that the National Operations Center will use publicly available search engines and content aggregators to monitor activities on social media sites); see also Role of Social Media in Law Enforcement Significant and Growing, LexisNexis (July 18, 2012), http://www.lexisnexis.com/media/press-release.aspx?id=1342623085481181 (stating that, according to the results of a comprehensive survey, over eighty percent of local and federal agencies use social media during investigations).

[19] Rocco Parascandola, NYPD Forms New Social Media Unit to Mine Facebook and Twitter for Mayhem, NY Daily News (Aug. 10, 2011, 4:00 AM), http://www.nydailynews.com/new-york/nypd-forms-new-social-media-unit-facebook-twitter-mayhem-article-1.945242.

[20] New Study Shows 66% of Government Organizations Have Adopted Social Networking, Collaboration Tools, saba (Jan. 14, 2010), http://www.saba.com/company/press-releases/2010/s
aba-and-hci-publish-study-of-social-networking-in-government/.

[21] See generally Eric Larson, 8 Dumb Criminals Caught Through Facebook, Mashable (Dec. 12, 2012), http://mashable.com/2012/12/12/crime-social-media/.

[22] Id.

[23] Id.

[24] See Shea Bennett, Facebook, Twitter, Pinterest, Instagram – Social Media Statistics and Facts 2012, All Twitter (Nov. 1, 2012, 6:00 AM), http://www.mediabistro.com/alltwitter/social-media-stats-2012_b30651.

[25] See, e.g., United States v. Robison, No. 11CR380 DWF/TNL, 2012 WL 1110086, at *1-2 (D. Minn. Mar. 16, 2012) (noting that law enforcement created fake online identity and became Facebook friends with defendant, “which permitted [the government] to view [the defendant’s] name and photo on his Facebook account”); United States v. Phillips, Criminal No. 3:06–CR–47, 2009 WL 1918931, at *7 (N.D. W. Va. July 1, 2009) (noting that the government “created an undercover user profile on www.myspace.com”).

[26] United States v. Meregildo, No. 11 Cr. 576(WHP), 2012 WL 3264501, at *2 (S.D.N.Y. Aug. 10, 2012).

[27] Id.

[28] Id. at *1.

[29] Id. at *2 (internal citations omitted).

[30] Ryan Gallagher, Feds Monitor Facebook “Likes,” Infiltrate Skype Chats To Build Terrorism Case, Slate (Nov. 29, 2012, 4:33 PM), http://mobile.slate.com/blogs/future_tense/2012/11/29/facebook_likes_skype_used_to_build_fbi_case_against_california_terrorism.html.

[31] Complaint at ¶¶ 26-28, United States v. Kabir, No. ED12-0431M (C.D. Cal. Nov. 16, 2012), 2012 WL 6576560.

[32] Gallagher, supra note 30.

[33] See Netflix Form 8-K filed Dec. 5, 2012; Christopher Garcia & Melanie Conroy, Reg FD Alert: Applying Securities Laws to Social Media Communications 1 (2012), available at http://www.weil.com/files/upload/Weil_Alert_Sec_Lit_Enforcement_Dec_21_2012.pdf.

[34] Id. at 2.

[35] See Netflix CEO’s Facebook Post Triggered SEC Wells Notice, CNBC (Dec. 7, 2012, 7:10 AM), http://www.cnbc.com/id/100289227/Netflix_CEO039s_Facebook_Post_Triggered_SEC_Wells_Notice; Garcia & Conroy, supra note 33, at 1.

[36] Twitter Transparency Report, Twitter Blog (July 2, 2012), http://blog.twitter.com/2012/07/twitter-transparency-report.html.

[37] Id.

[38] Transparency Report—FAQ, Google, http://www.google.com/transparencyreport/userdatarequests/faq/ (last visited Jan.15, 2013).

[39] Transparency Report—User Data Requests, Google, http://www.google.com/transparencyreport/userdatarequests/US/ (last visited Jan. 16, 2013) (demonstrating that requests increased from 3,580 in a period between July to December 2009 to 8,438 in a period from July to December 2012); Transparency Report—User Data Requests, Google, http://www.google.com/transparencyreport/userdatarequests/countries/?t=table (last visited Feb. 8, 2013) (demonstrating that the United States accounts for 8,438 of the 21, 389 user data requests Google received from July to December 2012).

[40] Role of Social Media in Law Enforcement Significant and Growing, supra note 18.

[41] See, e.g., United States v. Anderson, 664 F.3d 758, 762 (8th Cir. 2012) (noting hundreds of Facebook private chats obtained through a search warrant); United States v. Kearney, 672 F.3d 81, 84 (1st Cir. 2012) (noting that law enforcement used account and IP address information obtained from MySpace via an administrative subpoena to subpoena defendant’s Internet provider for his name and address); In re Grand Jury Subpoena No. 11116275, 846 F. Supp. 2d 1, 2 (D.D.C. 2012) (denying anonymous intervenor’s motion to quash a subpoena issued to Twitter by a federal grand jury for records pertaining to the intervenor’s identity); United States v. Sayer, Criminal No. 2:11 cr 113 DBH, 2012 WL 2180577, at *3 (D. Me. June 13, 2012) (using subpoenas to obtain evidence from Facebook and MySpace); United States v. Meregildo, No. 11 Cr. 576(WHP), 2012 WL 3264501, at *2 (S.D.N.Y. Aug. 10, 2012) (obtaining evidence through warrant issued to Facebook); People v. Harris, 949 N.Y.S.2d 590, 597 (N.Y. Crim. Ct. 2012) (observing that state sent Twitter a subpoena seeking to obtain defendant’s user information and Tweets).

[42] See United States v. Warshak, 631 F.3d 266, 282 (6th Cir. 2010) (citing 18 U.S.C. §§ 2701-2711); see also Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965, 977 (C.D. Cal. 2010) (applying the SCA to subpoenas issued to Facebook and MySpace while recognizing that no courts “have addressed whether social-networking sites fall within the ambit of the statute”).

[43] See Rudolph J. Burshnic, Note, Applying the Stored Communications Act to the Civil Discovery of Social Networking Sites, 69 Wash. & Lee L. Rev. 1259, 1261-64 (2012).

[44] See, e.g., Hubbard v. MySpace, Inc., 788 F. Supp. 2d 319, 321-27 (S.D.N.Y. 2011) (holding that search warrant served by state authorities on MySpace to produce, among other things, the account IP address, the contents of the account user’s inbox, and sent email was sufficient to satisfy the requirements of the Stored Communications Act); Crispin, 717 F. Supp. 2d at 991 (acknowledging the privacy settings of the user, the court quashed subpoenas seeking private messages on Facebook and MySpace as they were protected under the Stored Communications Act).

[45] See 18 U.S.C. § 2703(c)(1)(a)-(b) (2006).

[46] See Warshak, 631 F.3d at 283.

[47] Id.

[48] Id. (citation omitted).  Since Warshak, most major providers state that they require a search warrant to compel the stored contents of any account.  See, e.g., Information for Law Enforcement Authorities, Facebook, https://www.facebook.com/safety/groups/law/guidelines/ (last visited Jan. 2, 2012) (“A search warrant issued under the procedures described in the Federal Rules of Criminal Procedure or equivalent state warrant procedures upon a showing of probable cause is required to compel the disclosure of the stored contents of any account, which may include messages, photos, videos, wall posts, and location information.”).

[49] See Warshak, 631 F.3d at 288.

[50] Id.

[51] Id. at 286 (citations omitted).

[52] Id. at 285-86.

[53] See Noel Brinkerhoff, Congress, at Last Minute, Drops Requirement to Obtain Warrant to Monitor Email, AllGov (Dec. 25, 2012), http://www.allgov.com/news/top-stories/congress-at-last-minute-drops-requirement-to-obtain-warrant-to-monitor-email-121225?news=846578.

[54] See Warshak, 631 F.3d at 288 (holding that warrantless seizure of emails from ISP pursuant to SCA violated Fourth Amendment); see also Nathan Petrashek, Comment, The Fourth Amendment and the Brave New World of Online Social Networking, 93 Marq. L. Rev. 1495, 1513-32 (2010) (arguing that individuals should have Fourth Amendments rights in their privately shared information on social networking platforms).

[55] As of the date of publication, the appeal had not been decided.

[56] People v. Harris, 945 N.Y.S.2d 505, 510 (N.Y. Crim. Ct. 2012).

[57] See People v. Harris, 949 N.Y.S.2d 590, 598 (N.Y. Crim. Ct. 2012) (granting in part and denying in part the motion to quash).  The court found in favor of the government for all non-content information and content information from September 15, 2011, to December 30, 2011.  Content information less
than 180 days old (tweeted on December 31, 2011) could only be disclosed pursuant to a search warrant.

[58] See Russ Buettner, A Brooklyn Protester Pleads Guilty After His Twitter Posts Sink His Case, N.Y. Times, Dec. 12, 2012, at A31, available at http://www.nytimes.com/2012/12/13/nyregion/malcolm-harris-pleads-guilty-over-2011-march.html.

[59] Guidelines for Law Enforcement, Twitter, http://support.twitter.com/entries/41949-guidelines-for-law-enforcement#section9 (last visited Jan, 15, 2013).

[60] See Hofmann et al, supra note 15, at 8-9 (“Dropbox, LinkedIn, Sonic.net and SpiderOak have now joined Twitter in promising to notify their users when possible about government attempts to seek information about them.”).

[61] See Somini Sengupta, Twitter’s Free Speech Defender, N.Y. Times, Sept. 3, 2012, at B1, available at http://www.nytimes.com/2012/09/03/technology/twitter-chief-lawyer-alexander-macgillivray-defender-free-speech.html?pagewanted=all&_r=0.

[62] Brief for Non-Party Movant-Appellant at *12-14, People v. Harris, No. 2011-080152, 2012 WL 3867233 (N.Y. App. Div. Aug. 27, 2012) (noting Twitter’s Terms of Service state, “You retain your rights to any Content you submit, post or display on or through the Services” (internal citation omitted)).

[63] See id. at *16, 19.

[64] See id. at *18-19 (citing United States v. Warshak, 631 F.3d 266, 288 (6th Cir. 2010)).

[65] See id. at *20-21.

[66] See id. at *21-22 (citing People v. Weaver, 12 N.Y.3d 433, 441-45 (2009); United States v. Jones, 132 S. Ct. 945, 949 (2012)).

[67] Doug Austin, Twitter Turns Over Tweets in People v. Harris, eDiscovery Daily blog (Oct. 3, 2012), http://www.ediscoverydaily.com/2012/10/twitter-turns-over-tweets-in-people-v-harris-ediscovery-case-law.html.

[68] United States v. Meregildo, No. 11 Cr. 576(WHP), 2012 WL 3264501, at *2 (S.D.N.Y. Aug. 10, 2012).

[69] See, e.g., R.S. v. Minnewaska Area Sch. Dist. No. 2149, Civ. No. 12-588 (MJD/LIB), 2012 WL 3870868, at *12 (D. Minn. Sept. 6, 2012) (finding that sixth grader had reasonable expectation of privacy in private messages exchanged via her password-protected Facebook account); see also Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965, 991 (C.D. Cal. 2010) (holding that “webmail and private messaging [are] . . .  inherently private”).

[70] Minnewaska Area Sch. Dist. No. 2149, 2012 WL 3870868, at *11; Crispin, 717 F. Supp. 2d at 991.

[71] See Timeline Privacy, Facebook, http://www.facebook.com/help/393920637330807/#!/help/393920637330807/ (last visited Jan. 20, 2013).

[72] See In re Applications for Search Warrants for Info. Assoc. with Target Email Address, No. 2:12-mj-08119-JPO, 2012 WL 4383917, at *5 (D. Kan. Sept. 21, 2012) (holding that an individual has a Fourth Amendment right of privacy to emails and online faxes stored with, sent to, or received through third-party internet service providers).

[73] See United States v. Warshak, 631 F.3d 266, 284-85 (6th Cir. 2010) (“[T]he Fourth Amendment must keep pace with the inexorable march of technological progress, or its guarantees will wither and perish.”).

[74] See Daniel K. Gelb, Defending a Criminal Case from the Ground to the Cloud, 27 Crim. Just. 28, 29 (2012).

[75] See Zach Winnick, Social Media an Ethical Minefield for Attorneys, Law360 (Apr. 13, 2012, 9:55 PM), http://www.law360.com/articles/329795/social-media-an-ethical-minefield-for-attorneys (noting ethical concerns regarding private counsel’s use of social networking sites in connection with litigation that are generally not shared by government authorities in investigations).

[76] See, e.g., Phila. Bar Ass’n Prof’l Guidance Comm., Op. 2009-02, at 1-3 (2009), available at 2009 WL 934623 (concluding that a social media friend request to a witness in the litigation by a third party for the purpose of gathering social media evidence is “deceptive” and in violation of ethical rules); N.Y. State Bar Ass’n, Comm. on Prof’l Ethics, Op. 843, at 2 (2010), available at 2010 WL 3961381 (noting that accessing publicly available social media evidence is permissible but ‘friending” another party to do so is not); San Diego Cnty. Bar Legal Ethics Comm., Op. 2011-02 (2011), available at http://www.sdcba.org/index.cfm?pg=LEC2011-2 (stating that ethics rules bar attorneys from making ex parte friend request of a represented party or ‘deceptive’ friend requests of unrepresented witnesses).

[77] In criminal litigation, the majority of evidence, electronic or otherwise, is collected by the government prior to trial, and Federal Rule of Criminal Procedure 16 does not require the government to produce such evidence unless it is being used in the government’s case-in-chief.  See Warshak, 631 F.3d at 327 (citing Fed. R. Crim. P. 16).

[78] See Fed. R. Crim. P. 17(c)(1).

[79] See Fed. R. Crim. P. 17(a), (c)(3).

[80] See 18 U.S.C. § 2703(a), (c) (2006).

[81] Erin Fuchs, A Jury Will Likely Scrutinize Trayvon Martin’s Deleted Facebook and Twitter Accounts, Business Insider (Oct.19, 2012, 2:56 PM), http://www.businessinsider.com/zimmerman-can-subpoena-social-media-2012-10.

[82] See Brady v. Maryland, 373 U.S. 83, 87 (1963) (holding that “the suppression by the prosecution of evidence favorable to an accused upon request violates due process where the evidence is material”); Giglio v. United States, 405 U.S. 150, 153-54 (1972) (“When the ‘reliability of a given witness may well be determinative of guilt or innocence,’ nondisclosure of evidence affecting credibility falls within this general rule [under Brady].” (citation omitted)) .

[83] Juror No. One v. Cal., No. CIV. 2:11397 WBS JFM, 2011 WL 567356, at *1 (E.D. Cal. Feb. 14, 2011).

[84] Katiroll Co. v. Kati Roll & Platters, Inc., Civil Action No. 10 3620 (GEB), 2011 WL 3583408, at *4 (D.N.J. Aug. 3, 2011).

[85] Barnes v. CUS Nashville, LLC, No. 3:09cv00764, 2010 WL 2265668, at *1 (M.D. Tenn. June 3, 2010).

[86] See, e.g., Gallion v. Gallion, No. FA114116955S, 2011 WL 4953451, at *1 (Conn. Super. Ct. Sept. 30, 2011) (ordering parties to exchange passwords to Facebook and a dating website); McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 WL 4403285 (Pa. Ct. Com. Pl. Sept. 9, 2010) (ordering plaintiff to produce Facebook and MySpace login credentials to opposing counsel for “read-only access”).

[87] See, e.g., Griffin v. State, 19 A.3d 415, 424 (Md. 2011) (recognizing “[t]he potential for abuse and manipulation of a social networking site by someone other than its purported creator”).

[88] United States v. Stirling, No. 1:11-cr-20792-CMA, at 2 (S.D. Fla. June 5, 2012), available at http://www.fuerstlaw.com/wp/wp-content/uploads/2012/06/altonaga-order-granting-new-trial1.pdf; see U.S. District Court in Miami Orders New Trial Based on Discovery Violation for Electronically Stored Information, Fuerst Ittleman David & Joseph PL (June 25, 2012, 12:24 PM), http://www.fuerstlaw.com/wp/index.php/25/u-s-district-court-in-miami-orders-new-trial-based-on-discovery-violation-for-electronically-stored-information/.

[89] Id. at 2.

[90] Id.

[91] Id. at 4-5.

[92] See, e.g., People v. Lesser, No. H034189, 2011 WL 193460, at *4, *6 (Cal. Ct. App. Jan. 21, 2011
) (finding officer’s testimony that he cut and pasted portions of Internet chat transcript was sufficient for admissibility); People v. Valdez, 135 Cal. Rptr. 3d 628, 632-33, 635 (Cal. Ct. App. 2011) (upholding conviction where the court correctly admitted a trial exhibit consisting of printouts of defendant’s MySpace page, which the prosecution’s gang expert relied on in forming his opinion that defendant was an active gang member); People v. Fielding, No. C06022, 2010 WL 2473344, at *4-5 (Cal. Ct. App. June 18, 2010) (finding incriminating MySpace messages sent by defendant authenticated by victim who testified he believed defendant had sent them; inconsistencies and conflicting inferences regarding authenticity goes to weight of evidence, not its authenticity).

[93] Tienda v. State, 358 S.W.3d 633, 634-35 (Tex. Crim. App. 2012).

[94] Id. at 635.

[95] Id. at 647.

[96] Campbell v. Texas, 382 S.W.3d 545, 546 (Tex. App. 2012).

[97] Id. at 551.

[98] Id.

[99] Id. at 549-50, 552.

[100] United States v. Drummond, No. 1:09-cr-00159, 2010 WL 1329059, at *2-3 (M.D. Pa. Mar. 29, 2010).  The defendant ultimately entered a guilty plea, and the court did not make a final ruling on the admissibility of the photographs.  Plea Agreement, Drummond, No. 1:09-cr-00159, 2010 WL7367722 (M.D. Pa. Nov. 29, 2010).

[101] See N.Y. State Bar Ass’n Comm. on Prof’l Ethics, Formal Op. 2012-2, at 5 (2012) available at 2012 WL 2304271; see also N.Y. Cnty. Lawyers’ Ass’n Comm. on Prof’l Ethics, Formal Op. 743 (2011), available at http://www.nycla.org/siteFiles/Publications/Publications1450_0.pdf (advising that it is ethical for lawyers to vet potential jurors by monitoring social network activity provided there is no contact or communication with the prospective jurors, and the lawyer does not seek to friend jurors, subscribe to Twitter accounts, send jurors tweets, or act in any way that alerts the jurors to the monitoring); Sluss v. Commonwealth, 381 S.W.3d 215, 227-28 (Ky. 2012) (adopting the model established by the New York County Lawyers Association).

[102] N.Y. State Bar Ass’n Comm. on Prof’l Ethics, Formal Op. 2012-2, supra note 101, at 5 (noting that even if an attorney unknowingly or inadvertently causes a communication with a juror, such conduct may run afoul of the Rules of Professional Conduct).

[103] Id. at 6-7.

[104] See Dimas-Martinez v. State, 385 S.W.3d 238, 246, 247, 249 (Ark. 2011) (reversing appellant’s murder conviction and calling for a new trial when a juror tweeted several times during court proceedings, writing in one tweet, “Choices to be made. Hearts to be broken. We each define the great line,” and later tweeting “Its [sic] over” before the jury announced its verdict).

[105] Sluss, 381 S.W.3d at 220-22.

[106] Id. at 223, 228-29; see also U.S. v. Ganias, Crim No. 3:08CR224(EBB), 2011 WL 4738684, (D. Conn. Oct. 5, 2011).  In Ganias, the defendant filed a motion for a new trial on the eve of sentencing based on alleged juror improprieties.  Id.  at *1.  The juror posted a variety of comments on the Facebook page, ranging from “Jury duty 2morrow. I may get to hang someone … can’t wait …” before the presentation of the evidence, to “Guinness for lunch break.  Jury duty ok today” during the three-week trial.  Id. at *2.  On the day of the verdict he posted “Guilty :),” and he also added a fellow juror as one of his Facebook friends.  Id.  Taken together, the defendant argued that the comments showed his Sixth Amendment rights were offended due to a biased juror.  Id. at *1.  When questioned, the juror assured the judge that he was merely “joking,” and that he “absolutely was an impartial and fair juror.”  U.S. v. Ganias, Crim No. 3:08-CR-00224-EBB, 2011 WL 4738684, *3 (D. Conn. Oct. 5, 2011).  The court found those statements presumptively honest, and denied the defendant’s motion.  See id. at *4.

[107] See John Barry, Hillsborough Judge Vows to Send Prospective Juror to Jail, Tampa Bay Times, Oct. 11, 2012, available at http://www.tampabay.com/news/courts/criminal/hillsborough-judge-vows-to-send-prospective-juror-to-jail/1255802 (noting that prospective juror faces jail time for researching case and discussing it with the other jurors even after Tampa Bay court provided each member of the jury pool with a written order not to research or discuss the case and admonished and warned the jurors about the order at each break); Robert Eckhart, Juror Jailed Over Facebook Friend Request, Herald-Tribune, Feb. 16, 2012, available at http://www.heraldtribune.com/article/20120216/ARTICLE/120219626 (reporting that a court sentenced a juror to three days in jail for sending a Facebook message to the defendant and then posting “Score…I got dismissed!!  apparently they frown upon sending a friend request to the defendant…haha,” on Facebook after his dismissal from the jury); David Ovalle, Lawyer’s Facebook Photo Causes Mistrial in Miami-Dade Murder Case, Miami Herald, Sept. 13, 2012, available at http://www.miamiherald.com/2012/09/12/2999630/lawyers-facebook-photo-causes.html (reporting that a Miami judge declared a mistrial in a murder case after the public defender posted a photo of her client’s leopard-print underwear on Facebook, which also led to the attorney’s firing).

[108] See 2011 Cal. Stat. 181.

[109] See Revised Jury Instructions Hope to Deter Juror Use of Social Media During Trial, United States Courts (Aug. 21, 2012), http://news.uscourts.gov/revised-jury-instructions-hope-deter-juror-use-social-media-during-trial.

[110] Judicial Conf. Comm. on Court Admin. & Case Mgmt., Proposed Model Jury Instructions:  The Use of Electronic Technology to Conduct Research on or Communicate about a Case 1 (2012), available at http://www.uscourts.gov/uscourts/News/2012/jury-instructions.pdf.

[111] United States Courts, supra note 109.

Local Rules, Standing Orders, and Model Protocols: Where the Rubber Meets the (e-Discovery) Road

pdf_iconDownload PDF

 Cite as: Thomas Y. Allman, Local Rules, Standing Orders, and Model Protocols: Where the Rubber Meets the (E-Discovery) Road, 19 RICH. J. L. & TECH 8 (2013), available at http://jolt.richmond.edu/v19i3/article8.pdf.

By Thomas Y. Allman*

[District Courts], impatient with the failure of the national system to solve pressing, indeed urgent, procedural problems, utilize local rules in an effort to shape pragmatic solutions . . . . [as] one route to procedural change.[1]

 

I.  Introduction

[1]        In late 2012, the U.S. District Courts for the Western District of Washington,[2] the Northern District of California,[3] and the District of Oregon[4] all announced, in close proximity with one another, local initiatives that deal with e-Discovery issues that the 2006 E-Discovery Federal Rules Amendments (the “2006 Amendments” or the “Amendments”) largely ignored.  These proposals are part of a second wave of local rulemaking, which is more focused on pragmatic solutions than earlier efforts.

[2]        A large number of federal districts have undertaken local initiatives to deal with e-Discovery.[5]  Some merely make passing reference to e-Discovery in local rules while others explicitly describe topics deemed worthy of attention or mandate specific measures to resolve open e-discovery issues.  However, many districts have yet to make such special accommodations.

[3]        Less visible but equally important efforts have been made to accommodate e-Discovery by amendments to standard forms.  For example, there are now many useful forms available for Rule 26(f) reports and discovery plans, as well as for joint or individualized proffers of scheduling orders or case management orders.

[4]        Section II of this Article describes the legal context for local initiatives.[6]  Section III explores the types of local responses to the 2006 Amendments.[7]  In Section IV, the efficacy of key components emerging from the variety of approaches described is evaluated.  The author concludes that concerns over a lack of procedural uniformity among the districts are largely overblown and that some initiatives serve as welcome harbingers of national rulemaking.  The author also expresses concerns about over-reaching in some of the measures studied.

 

II.  The Legal Context

[5]        This Article turns first to the general description of rulemaking at the local level, focusing first on the statutory and rule-based framework.

A.  Local Rules

[6]        The authority to enact local rules flows from 28 U.S.C. § 2071 and Rule 83 of the Federal Rules of Civil Procedure.  A local rule “must be consistent with—but not duplicate—federal statutes and rules adopted under 28 U.S.C. §§ 2072 and 2075.”[8]  Local rules typically “supplement the applicable Federal Rules”[9] and have the force of law.[10]  The mere fact that a federal rule is not fully comprehensive, such when the rule is “silent” on a topic, does not bar otherwise permissible local initiatives.[11]

[7]        Unless a majority of the district judges approve the local rules after “giving appropriate public notice and an opportunity for comment,” they are ineffective.[12]  Districts must use Local Rules Advisory Committees to assist in developing suggestions for and reviewing potential changes in the rules.[13]  The rules are available on district websites and in legal research databases.[14]  Numbering must conform to a uniform national system based on the Federal Rules.[15]  In Hollingsworth v. Perry, the Supreme Court confirmed that local rules enacted without meeting these procedural requirements risk invalidity.[16]

[8]        Not all districts rely on extensive local rules.[17]  Some also use “Administrative,” “Standing,” or “General” orders, typically to provide administrative detail.[18]  In most districts, they are also available on the district website.[19]  When used to provide procedural mandates, however, they are subject to the same consistency requirements as local rules.[20]  In 2009, the Standing Committee issued helpful guidelines on the topic.[21]

B.  Individual Judicial Practices

[9]        Rule 83(b) acknowledges that individual district judges may “regulate [their] practice in any manner consistent with” federal and local rules or statutes.[22]  These preferences are often expressed in “practice guidelines” or in case management forms reflecting the preferences of individual judges.[23]  Many districts provide easy access on websites,[24] but in some instances, they can be difficult to locate.

[10]      District judges play an active role in tailoring e-Discovery to the needs of individual cases through case management.  This is consistent with an inherent right to manage individual cases,[25] which trumps mandates of the national and local rules.  It has been observed that individual judicial practices may introduce more disuniformity into the civil litigation process than do varying local rules.[26]  Not surprisingly, commentators universally advocate paying close attention to such local practices.[27]

C.  Standardized Forms

[11]      Standardized forms are provided in many districts for reports under Rule 26(f), discovery plans, scheduling orders, and the like, to conform to national or local requirements.  In some districts, the forms may be an integral part of the local rules.  In others, their adoption, modification, and implementation constitute an ad hoc process.  The ease of access varies with some districts doing better than others.[28]

[12]      The Administrative Office of the Judicial Conference (the “AO”) makes national forms relating to discovery available but none relate to case management.[29]  The Federal Judicial Center (the “FJC”) has collected some sample forms in connection with its Civil Litigation Management Manual.[30]

D.  Consistency

[13]      The consistency of a local rule with the Federal Rules can present subtle issues.  If a local initiative is challenged, the test is “whether the two rules are textually inconsistent or whether the local rule subverts the overall purpose of the federal rule.”[31]  When a specific amendment is at issue, reliance on the intent expressed in relevant Committee Reports is one of the factors used to assess the intended effect.[32]  In Colgrove v. Battin, for example, the Court tolerated local rules that reduced the minimum jury size despite what appeared to be an inconsistent federal rule.[33]

[14]      Congress has from time to time authorized the development of local initiatives without regard to consistency.[34]  One can attribute the current diversity in case management regimes in many districts to measures adopted because of the 1990 Civil Justice Reform Act, under which districts were directed to address cost and delay in civil litigation from “the bottom up.”[35]

[15]      Local districts are expected to act consistently with the Federal Rules.[36]  Copies of local
rules must be furnished to the Administrative Office and to the relevant Circuit Judicial Council.[37]  The Judicial Councils have the primary responsibility to ensure “consistency [of Local Rules] with [existing Federal Rules],” and the power to “modify or abrogate any such rule.”[38]  Historically, Circuit Councils have not taken an active role,[39] although there are current signs to the contrary.[40]  As recently as 2004, an ad hoc committee of the Standing Committee studied a subset of the local rules for consistency and made recommendations to the district courts involved.[41]

E.  “Pilot Programs”

[16]      The Judicial Conference and Congress utilize formal pilot projects to test procedural innovations.  For example, “[f]ourteen federal district courts have been selected to participate in a 10-year pilot project . . . to enhance expertise in patent cases among U.S. district judges,” which will involve the generation of sample local rules and forms.[42]  In addition, a pilot project designed to standardize early disclosures in employment litigation has been undertaken[43] for use by individual judicial officers or as a model for a local rule.[44]

[17]      The Federal Rules do not, however, explicitly authorize experimental or “pilot projects” to test innovative local rules or procedures.  Indeed, the Rules Committee refused to proceed with such proposals in 1983[45] and 1991.[46]  Nonetheless, the District of Colorado recently amended its local rules to authorize pilot programs or special projects by general order.[47]

[18]      There is a history of reliance on local experimentation before adopting a measure as a uniform federal procedural rule.[48]  It is far less risky to experiment with potential solutions at the local level, which are “inspired by a belief that the [national] rulemakers got it wrong.”[49]  District courts “are willing to try [solutions] because others have confidence in them.”[50]  Consistency with the Federal Rules is rarely perceived as a barrier under those circumstances.[51]

 

III.  Local E-Discovery Initiatives

[19]      At their core, the 2006 Amendments responded to the need to enhance the discovery of electronically stored information.[52] They became effective in December 2006 when, after several years of study, it was apparent that the differences between electronic data and traditional documents justified rule amendments.[53]

[20]      In their final version,[54] changes to Rules 16(b), 26(a), and 26(f) were coupled with broadly worded amendments authorizing the discovery of electronically stored information (“ESI”), dealing with its form or forms of production, and providing in Rule 26(b)(2), a vague presumption against the production of ESI from inaccessible sources.[55]  No meaningful standards for preservation were included and cost shifting was ignored.  The Amendments were largely silent as to the role, if any, of local rules and standardized forms.

[21]      As noted, federal district courts have reacted in a wide variety of ways, ranging from total avoidance of the subject to an assortment of actions involving local rules, informal guidelines, and standardized forms.

A.  Early Enactments

[22]      Before the 2006 Amendments took effect, few districts addressed the unique issues that e-Discovery presents.  The Eastern and Western Districts of Arkansas were the first to act when they adopted an “Outline For [FRCP] 26(f) Report” for use in their districts.[56]  At the 2004 conference held at Fordham Law School, an involved judicial officer reported that the experience under the rule to date had been that “most attorneys work out these issues at the onset of litigation and make a report.”[57]

[23]      District courts in Wyoming,[58] New Jersey,[59] and the Middle District of Pennsylvania[60] also adopted local rules that utilize a similar approach, with an added focus on counsel undertaking preparatory investigation of client systems.[61]  In addition, the District of Delaware issued a “Default Standard,” which required, inter alia, that parties appoint “retention coordinators” and consult with an eye towards reaching binding preservation agreements.[62]

[24]      The Northern District of Ohio[63] and the Middle[64] and Western[65] Districts of Tennessee quickly adopted Delaware’s Default Standard.  Those provisions remain in effect, although the Delaware standard has been significantly updated since then.

B.  Post Amendment Activity

[25]      After the Amendments came into effect in late 2006, additional districts acted to highlight e-Discovery issues.[66]  The primary emphasis was on preservation, form of production, and presumptive limits on production from inaccessible sources of ESI.  Some districts merely referenced ESI as a topic for discussion.[67]  Others provided extensive checklists of the items identified in the Federal Rules.[68]  Yet, other districts, such as those in Mississippi,[69] Pennsylvania,[70] and New York,[71] provided substantive guidance in mandatory terms.

[26]      The bulk of the changes were reflected in the standard forms in use for case management.  Many districts simply incorporated references to the topics referenced in Rules 26(f) and 16(b).[72]  Other districts went further[73] and used “speaking forms,” which include substantive instructions on how to handle the issues.[74]

[27]      A few districts, such as the District Court of Kansas, provided informal “guidelines.”[75]  The Central District of Illinois posted the Sedona Conference® Principles along with its local rules and orders.[76]  Perhaps the most ambitious effort was the twenty-eight-page “Suggested Protocol for Discovery of [ESI]”[77] adopted for use before courts in the District of Maryland that blends suggestions with mandatory elements.[78]

[28]      There has also been a revival of case differentiation under which e-Discovery guidance is tied to the type of litigation.[79]  The Southern District of New York is currently testing the impact of an enhanced model order applied on a case-by-case basis in cases deemed to be complex.[80]

[29]      A similar differentiation process is occurring with respect to patent litigation.  In the Districts of Maryland[81] and Massachusetts,[82] for example, the only mention of ESI in the district rules relates to patent litigation.  Similarly, a subcommittee of the Federal Circuit advocates the use of targeted rules for e-mail production in patent cases.[83]  As noted, the District of Oregon has recently proposed to adopt the model order as a local rule.[84]

C.  The Second Wave

[30]      Since roughly 2009, local initiatives have increasingly focused on pragmatic solutions for issues emphasizing the role of proportionality and cooperation.  A leading example is the Seventh Circuit E-Discovery Pilot Program, a comprehensive approach implemented by Standing Orders adopted in individual cases.[85]  The pilot program is based on “principles” designed to encourage cooperative resolution of disputes while emphasizing guidance on the underlying issues.[86]

[31]      Principle 2.04 (Scope of Preservation), for example, mandates the taking of “reasonable and proportionate steps to preserve relevant and discoverable ESI” within a party’s possession, custody, or control.[87]  This articulation, a first among rules, echoes the Sedona Conference® Proportionality Principles[88] and helps to fill the gap in the 2006 Amendments.  Another innovative feature is the inclusion of a list of categories of ESI which are “generally not discoverable in most cases” and whose possible preservation must be raised “at the meet and confer or as soon ther
eafter as practicable.”[89]  These proportionally based distinctions also correspond to the recommendations found in the Sedona Conference® Best Practice Principles.[90]

[32]      The Northern District of Illinois has recently proposed a local patent rule oriented towards guidance along similar lines.[91]  Presumptive limitations were also incorporated into the revised Delaware Default Standard,[92] whose categories of ESI in its appendix echo those of Principle 2.04.[93]  Similarly, the model protocol proposed for use in the Western District of Washington also lists categories of ESI that do not need to be preserved.[94]

[33]      The Federal Circuit has also introduced a “Model Order” for patent cases that addresses the number of custodians from whom production of e-mail may be sought in patent litigation as well as the number of search terms that can be introduced without agreement or court order.[95]  The model protocol was adapted for use in the Eastern District of Texas[96] and proposed for  the Oregon District as a local rule.[97]

 

IV.  Evaluation

[34]      In this Section, the local initiatives enacted to guide e-Discovery are assessed.  The Section first deals with the pros and cons of the emphasis on early agreement before discussing specific elements of interest—and possible shortcomings—that have emerged.

[35]      Promotion of early agreement by parties and active judicial involvement of the judiciary in the management of discovery has been encouraged since at least 1983, but the emphasis on the “meet and confer” process is of more recent vintage.[98]  To some, the 2006 Amendments bring the process to its ultimate intended use.[99]

[36]      The emphasis is on the preparation of a detailed “discovery plan” to be furnished to the court before the initial pretrial conference, coupled with encouragement to courts to include reference to ESI agreements in the scheduling order.  Parties are expected to discuss any preservation issues and disclosure and discovery issues.  Rule 16(b) makes it clear that any scheduling orders can “provide for the disclosure or discovery of [ESI].”

A.  The Scorecard

[37]      Many of the ninety-four federal district courts studied,  including a number located in major urban districts, have ignored e-Discovery, at least on district-wide basis.[100]  This even includes some districts that have only recently adopted other amendments to their local rules governing the Rule 26(f) process.[101]

[38]      At least thirty-two districts, however, have acknowledged the discovery of electronically stored information in civil litigation.[102]  Of these districts, seven merely make passing reference to e-Discovery in their local rules.[103]  Another twelve districts[104] emphasize e-Discovery topics deemed most worthy of attention at Rule 26(f) conferences.  Nine districts,[105] as well as others using model orders,[106] have adopted pragmatic solutions that address gaps in the Amendments more aggressively.  At least five additional districts have released non-binding guidance for parties on the topic of e-Discovery.[107]

[39]      Many of these efforts center on use of standardized forms for Rule 26(f) reports and discovery plans, as well as for scheduling orders or case management orders.  This has implications for the future.  With the possible consignment of Official Form 52 to oblivion, it will be important for the Administrative Office of the Judicial Conference to make more of an effort to collect the best extant forms and make them readily available to all districts on its national website.[108]

B.  Early Attention

[40]      It is not terribly surprising that many districts have not yet formally addressed e-Discovery.  Busy courts and practitioners may feel that individualized accommodations can be made in cases where e-discovery plays an important role.  In addition, some may have concluded that the 2006 Amendments and emerging case law suffice to place parties and their counsel on notice of the need to address e-Discovery.

[41]      However, there is another possibility.  It may be that the assumed efficacy of early attention to ESI discovery is overstated.  Most Rule 26(f) conferences last for short periods and rarely involve ESI issues.[109]  The conferences may be poorly timed.[110]  Preservation decisions, for example, must often be made before Rule 26(f) conferences.[111]  Moreover, the idea that busy judges can resolve meaningful disputes about the scope of discovery before requests have even been served may be wishful thinking.  There are also avoidable costs that may be wasted if expended too early on e-discovery.[112]  After all, most cases settle.[113]

[42]      Accordingly, it is not clear that front-loading the process by intense and expensive preparations is the most effective means of reducing costs and encouraging cooperation.   Other solutions may be required, such as presumptive “hard limits” or cost shifting, which provide assurance of fairness.  The advantage of experimentation with such measures at the local level is that adjustments can be made as experience mounts, with the best of them slated for national rulemaking.

C Assessment:  The Core Initiatives

[43]      Local initiatives have been prompted by the gaps in the 2006 Amendments, especially as to the onset and scope of preservation obligations, variances in culpability for sanctions, the lack of cost-shifting, and the vagueness of the application of the “accessibility” doctrine to preservation.

i.  Preservation

[44]      The 2006 Amendments ducked preservation issues.[114]  Instead, drafters added Rule 26(b)(2)(B), a presumptive limitation on production of ESI based on “accessibility” subject to overriding for “good cause.”[115]  No attempt was made to deal with its implications for preservation, despite an understanding of the issue.[116]

[45]      The Seventh Circuit Pilot Principles and other local initiatives address this shortcoming directly.  Principle 2.04 provides that “[e]very party to litigation and its counsel are responsible for taking reasonable and proportionate steps to preserve relevant and discoverable ESI within its possession, custody or control.”[117]  In addition, the Seventh Circuit Principle limits the need to preserve specific forms of ESI[118] absent agreement, thus removing incentives to “sand-bag” an opponent by not mentioning the preservation issue earlier.

[46]      The revised Delaware Default Standard[119] also notes that parties need not modify “on a going-forward basis” the backup or archive procedures in place provided that they preserve non-duplicable discoverable material.  Proposals from the Western District of Washington[120] and the Northern District of Illinois[121] also incorporate adopted elements of this approach, as do examples from best practice agreements of parties.[122]

[47]      Professor Stephen Subrin has noted that firm limits are often the best way of “providing constraint, focus, and predictability to the unruly aspects of the federal rule[s].”[123]  They provide a useful “starting point to allow parties and district courts to tailor discovery plans as appropriate”[124] and help deal with “over-preservation,” an abiding problem identified at the 2010 Duke Litigation Conference and the Dallas Conference of 2011.[125]

[48]      Given that specific limitations already exist on the use of interrogatories[126] and depositions,[127] it seems unlikely that limits on preservation efforts exceed permissible consistency boundaries.  The limits are subject to the discretion of the court, applied on a case-by
-case basis, and are not textually inconsistent with any existing rule or statute.

[49]      It would be preferable, however, to adopt these presumptive limitations as a national rule.  The Civil Rules Advisory Committee (the “Rules Committee”) is considering recommending the amendment of Rule 26(b)(1) to limit discovery to information “relevant to any party’s claim or defense and proportional to the needs of the case considering [the factors transferred from (b)(2)(C)(iii)].”[128]  That approach could be combined with other pending proposals to provide “default limitations on discovery of [ESI],” which are “useful referents for preservation decisions,” given that preservation is limited to “‘discoverable’ information.”[129]

ii.  Cooperation

[50]      The Federal Rules do not currently mandate a “duty to cooperate,” having explicitly rejected proposals to do so in former times.[130]  Instead, the Rules require participation by counsel and parties in “good faith” in preparing discovery plans and attending case management conferences.[131]

[51]      Many local rules, however, invoke cooperation as an aspirational standard.[132]  Thus, the Delaware Standard[133] provides that the court expects parties to cooperate with each other in arranging and conducting discovery.[134]  Similar expectations are found in certain ESI Guidelines[135] as well as individualized judicial instructions.[136]  The model order recommended for use in the Northern District of California recites that “[t]he parties are aware of the importance the Court places on cooperation and commit to cooperate in good in good faith throughout the [litigation covered by the Order].”[137]

[52]      Some districts emphasize that this involves “voluntary” action of counsel through “informal, cooperative discovery practices.”[138]  Local Rule 26.4 for the Southern and Eastern Districts of New York also provides that cooperation of counsel must be “consistent with the interests of their clients.”[139]  An open-ended mandate for cooperation, however,  is a slippery slope.[140]  A court has no authority to force a party to compromise a position that it does not wish to take.[141]  Placing that burden on counsel can put counsel in an impossible position with her client.[142]  There is also the problem of interference with the primary source of counsel responsibility, the state licensing activities.[143]

[53]      It is clear, however, that the judicial enthusiasm for cooperation is widespread and growing.  One can safely assume that this will continue given the enthusiasm for the call to change the “culture of discovery from adversarial conduct to [one of] cooperation.”[144]  There seems to be no fundamental inconsistency between the Federal Rules and a call for “cooperation” under local initiatives.[145]

[54]      The Rules Committee has been asked to consider adding cooperation to Rule 1.  At the November 2012 meeting, the Duke Subcommittee appeared to step back from earlier support for requiring that “parties [should] cooperate to achieve” the ends of Rule 1 because of the open-ended nature of the commitment.[146]  However, no vote was taken on the proposal, which remains open.[147]

iii.  Cost Shifting

[55]      The 2006 Amendments avoided dealing with allocation of excessive costs attributable to preservation or production of ESI.  A number of local initiatives identify cost shifting as an option.  New Jersey local rules, for example, require parties to discuss “[w]ho will bear the costs of preservation, production, and restoration (if necessary) of any digital discovery.”[148]  Wyoming does the same.[149]  The Northern District of Ohio Default Standard provides that while “costs of discovery shall be [generally] borne by each party,” the court “will apportion the costs of electronic discovery upon a showing of good cause.”[150]

[56]      While some argue that rules “should require courts to consider cost shifting whenever a party seeks electronic discovery,”[151] a better approach would require cost-shifting for additional costs of preservation and production beyond a core of basic information.[152]  The Model Order for the Federal Circuit, for example, requires that “[c]osts will be shifted for disproportionate ESI production requests pursuant to [FRCP] 26.”[153]  Thus, e-mail production requests are limited “to a total of five custodians per producing party” with costs shifted for additional requests.[154]

[57]      The Duke Subcommittee of the Rules Committee, while stating that it “is not enthusiastic about cost-shifting,” has endorsed an amendment to Rule 26(c) that makes the availability of cost shifting a more “prominent feature of Rule 26(c).”[155]  Those provisions could be “fine-tuned” to differentiate between costs related to core information and those which exceed presumptive limitations.

[58]      Congress is currently taking a “watch and see” attitude, but is clearly interested in the issue.[156]

iv.  Production Formats

[59]      Rules 34 and 45 provide that ESI is to be produced, absent agreement or court order, in the form in which it was maintained or in a “reasonably usable form.”[157]  The clear preference is for parties to reach agreements without involving the courts.[158]  The Rules Committee apparently anticipated that local rules would “pick up the slack.”[159]  That appears to be exactly what has happened.

[60]      By an overwhelming consensus, local rules and guidelines favor the use of text searchable “imaged” formats, such as PDF, TIFF, or JPEG files for production of e-mail and other document like images.[160]  Parties are free, of course, to vary requirements and to specify the fields of metadata to be included in load files to accomplish these goals.[161]  Native production is used only for files “not easily converted to image format, such as Excel, Access files, and drawing files.”[162]

[61]      As explained by a leading case, “even if native files are requested, it is sufficient to produce memoranda, emails, and electronic records in PDF or TIFF format accompanied by a load file containing searchable text and selected metadata.”[163]  Given the consistency of this approach with the intent of the 2006 Amendments, there is no need to further address this by amendments to the national rules.

v.  Search Methodology

[62]      A number of local rules require parties to discuss search methodology, including an exchange of information about any keywords employed,[164] and favor “dialogue to discuss the search terms, as required by Rules 26 and 34.”[165]  The Delaware Default Standard suggests that “a requesting party may request no more than 10 additional search terms to be used in connection with an electronic search.”[166]

[63]      More recently, “predictive coding” and other types of “latent semantic indexing”[167] began to raise similar issues.  One challenge is that parties who seek to utilize these techniques may be required to make a copy of the set of responsive and non-responsive materials used to “train” the mathematical models employed available.[168]

[64]      However, while measures supporting discussions are consistent with the Federal Rules, one cannot reasonably read Rule 16 or Rule 26(f) to support mandating the choice.[169]  As emphasized in Sedona Conference® Principle Six, “[r]esponding parties are best situated to evaluate” and choose the “procedures, methodologies, and technologies” most appropriate to preserve and produce their own ESI.[170]  Compelling a particular choice without regard to individualized proof that a party would not otherwise meet its discovery obl
igations[171] would improperly intrude on “private primary activity”[172] because it affects “behavior at the planning as distinguished from the disputative stage of activity.”[173]

[65]      It is one thing to require, for example, designation of a contact person or “liaison” to coordinate with the court and parties on technical e-Discovery issues.[174]  It is quite another to reach out beyond the litigation context and compel a party to use a particular methodology in carrying out its obligations.[175]  Any such basic change requires national authorization.[176]

vi.  Disclosures Without Discovery

[66]      Some local rules impose affirmative obligations on counsel to become knowledgeable about client information management systems[177] and requires counsel to share that information during the Rule 26(f) process.  According to one local drafting committee, these types of rules are intended to “express the obligations of counsel as articulated in case law beginning with the Zubulake cases.”[178]

[67]      In a broad sense, this is consistent with the observation in the Committee Note to Rule 26(f) that “[i]t may be important for the parties to discuss [information systems] and accordingly important for counsel to become familiar with those systems before the conference.”[179]  However, these comments in the Committee Note are not sufficient to supersede the limitations on disclosures without discovery so carefully expressed in Rule 26(a).[180]

[68]      Rule 26(a) limits early disclosures to information that a party “may use to support its claims or defenses.”[181]  The 2006 Amendments did not expand its scope.  Parties are not required to undertake an open-ended, costly, and ultimately premature effort to locate and review information.[182]

[69]      The issue arose at the 2004 Fordham Conference prior to the adoption of the amendments to Rule 26(a).  While noting that the local rules in New Jersey and Wyoming mandated that counsel acquire information about client systems, one speaker noted that “it may be that, for national rules, such a directive would be viewed as too intrusive.”[183]

[70]      The former chair of the Standing Committee has also noted that a “local rule that require[s] parties to provide an information system ‘map’ at the Rule 26(f) conference” would go “beyond [the] national rules.”[184]  Absent further amendments to the Federal Rules, therefore, local rules and guidelines should seek to accomplish these goals by voluntary, not mandatory, compliance.  Under the case law, the act of requiring a party through its counsel to “furnish more information than is required” is barred.[185]

vii.  Rule 502 Orders

[71]      The 2006 Amendments included a “clawback” mechanism in Rules 26 and 45 to deal with post-production claims of privilege or work-product production, but made no attempt to establish the conditions under which “waiver” by such production could occur.[186]  In 2008, Congress enacted Federal Evidence Rule 502 (“FRE 502”),[187] limiting privilege waiver for “inadvertent” disclosures when the holder “took reasonable steps to prevent disclosure” as well as prompt and reasonable steps to rectify the error.  The Rule also authorized court-adopted agreements that bind parties and non-parties in federal and state cases, even over objection, to waiver-free production without proof of reasonable precautions.[188]

[72]      Surprisingly few districts have emphasized Rule 502 in local rules, guidelines, or amended forms.  Many forms simply ask whether a court order “will be requested, either on stipulation or otherwise” to address the manner in which ESI subject to claims or work product protection will be handled.[189]  However, more recently adopted local rules and model protocols routinely deal with the issue.[190]  It should also be addressed in any new standardized forms that the Administrative Office develops to supplement or replace Official Form 52.

 

IV.  Conclusion

[73]      There has been a healthy proliferation of local e-Discovery initiatives for use in district courts in the federal judicial system.  There is no obvious pattern emerging as the dominant approach.

[74]      Unfortunately, there is very limited empirical evidence on which one can base a conclusion as to the most effective type of local initiative.  The topic has received very little attention[191] and only the Seventh Circuit pilot program has attempted to survey its users.[192]  Hopefully, other districts will put more effort into such surveys.  As demonstrated by the evolution of the Delaware Default Standard, trial and error is useful.

[75]      There is substantial anecdotal evidence, however, that early attention to ESI can play an important role in reducing unnecessary disputes.[193]  Certainly, that effort is preferable to ignoring potential disputes that can be avoided.  The trick seems to be to find the right balance, blending a “light touch” with avoidance of unnecessary costs that produce no gain.  Ultimately, however, the choice between doing nothing and jumping in with both feet is a matter of style that reflects the culture of the district and the degree to which it can be seen as appropriate.[194]

[76]      In the main, the ninety-four districts present the reassuring conclusion that the local rules and forms in current use are largely consistent with the 2006 Amendments.  Moreover, the local initiatives do not appear to be the problem that the Standing Committee originally feared.[195]  There is no drumbeat of complaints, aside from one comment in an ABA journal,[196] that the diversity of local e-discovery procedure has had an adverse impact.  There is no need for drastic action reining in local rulemaking, even if that were somehow possible.

[77]      However, as noted, procedural uniformity could be enhanced by converting some of the local initiatives into national rules.  After six years, the tentative approach of the 2006 Amendments, can safely give way to a more confident and aggressive attempt to improve predictability and address the exploding costs of e-Discovery.

 


* Thomas Allman practiced law as a Partner at Taft, Stettinius & Hollister LLP in Cincinnati until joining BASF Corporation as Vice President, Litigation, in 1993.  He retired in 2004 as Senior Vice President, General Counsel, and Chief Compliance Officer at BASF and thereafter spent three years as Special Counsel to Mayer Brown LLP in Chicago.  Mr. Allman is co-editor of the PLI Electronic Discovery Deskbook and an Adjunct Professor at the University of Cincinnati College of Law.  He is also Chair Emeritus and an active member of the Steering Committee of The Sedona Conference® Working Group 1 on Electronic Document Retention and Production.

 

[1] A. Leo Levin, Local Rules as Experiments: A Study in the Division of Power, 139 U. Pa. L. Rev. 1567, 1579 (1991).

[2] W.D. Wash. LCR 26 (2012).

[3] The initiatives adopted in the Northern District of California blend general guidelines with Model orders designed to educate practitioners on court preferences.  See Court Adopts New E-Discovery Guidelines Effective November 27, 2012, U.S. District Ct. N.D. Cal., http://cand.uscourts.gov/news/101 (last visited Jan. 13, 2013).

[4] See Notice of Proposed Local Rule Changes and Opportunity for Public Comment – November 2012, U.S. District Ct. D. Or., http://ord.uscourts.gov/en/proposed-local-rules/notice-of-proposed-local-rule-changes-and-opportunity-for-public-comment-november-2012 (last updated Nov. 6, 2012).

[5] See generall
y
K&L Gates, Local Rules, Forms and Guidelines of United States District Courts Addressing E-Discovery Issues, Electronic Discovery Law, http://www.ediscoverylaw.com/promo/current-listing-of-states-that/ (last visited Jan. 13, 2013) (noting that “many individual judges and magistrate judges have created their own forms or have crafted their own preferred protocols for e-discovery”).

[6] The focus here is on civil litigation, as distinct from criminal, bankruptcy and admiralty cases.

[7] See generally Letter from Chief Justice John Roberts to J. Dennis Hastert, Speaker of the House of Representatives (Apr. 12, 2006), available at http://www.supremecourt.gov/orders/courtorders/frcv06p.pdf (setting forth the amendments to the Federal Rules of Civil Procedure).

[8] Fed. R. Civ. P. 83(a)(1); see also 28 U.S.C. § 2071(a) (2006) (“[A]ll courts established by Act of Congress may from time to time prescribe rules for the conduct of their business.  Such rules shall be consistent with Acts of Congress and rules and practice prescribed under section 2072 . . . .”).

[9] N.D. Cal. Civil L.R. 1-2(b).

[10] Many Local Rules authorize sanctions for their violation.  See, e.g., C.D. Cal. L.R. 83-7 (relating to “violation of or failure to conform to any of these Local Rules”).

[11] See Whitehouse v. U.S. Dist. Court, 53 F.3d 1349, 1363 (1st Cir. 1995) (“[S]ilence in the federal rules should not be interpreted as a prohibition on local rule-making authority.”).

[12] 28 U.S.C. § 2071(b) (2006); see also Fed. R. Civ. P. 83 (a)(1) (stating that rules shall be prescribed  “after giving appropriate public notice and an opportunity for comment”).

[13] The 1988 Judicial Improvements Act (“JIA”) added a requirement that the district courts use local advisory committees in enacting their rules.  28 U.S.C. § 2077(b); see, e.g., U.S. District Ct. W.D. VA., Standing Order No. 2010-7, available at http://www.vawd.uscourts.gov/storders/Establishment_of_Local_Rules_Advisory_Committee.pdf.

[14] WESTLAW indexes Local Rules by state (e.g., insert “KS-ST-ANN” in “Search for database,” then go to “Table of Contents” and select Local Rules for Civil or Bankruptcy; to retrieve individual Rules, insert “KS-RULES” in “Find this document,” scroll to bottom and insert the desired LR number).  See also Court Websites, U.S. Courts, http://www.uscourts.gov/Court_Locator/CourtWebsites.aspx (last visited Jan. 13, 2013) (linking to the district courts’ websites).

[15] See Fed. R. Civ. P. 83; see also Memorandum from Leonidas Mecham, Director, Administrative Office of the United States Courts, to the Chief Judges and Clerks of the United States District Courts and the United Sates Bankruptcy Courts (Apr. 29, 1996), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Local_Rules_Uniform_Numbering.pdf.

[16] 130 S. Ct. 705, 710 (2010) (concluding that “the District Court likely violated a federal statute in revising its local rules” by failing to give public notice and an opportunity for comment under 28 US.C. § 2071(b) and Rule 83(a)).

[17] The Northern District of Texas has a pithy set of Local Rules, but the Western District of Wisconsin sets the record: it has only five Local Rules and eight Administrative Orders.  Compare N.D. Tex. L.R., available at http://www.txnd.uscourts.gov/rules/localrules/lr_civil.html, with W.D. Wis.  L.R., available at http://www.wiwd.uscourts.gov/local-rules-and-administrative-orders.

[18] See D. Kan. Rule 83.1.2 (“By vote of a majority of the judges, the court may from time to time issue standing orders dealing with administrative concerns or with matters of temporary or local significance.”).

[19] See, e.g., Local Rules, U.S. District Ct. D. Kan., http://www.ksd.uscourts.gov/flex/?fc=1 (last visited Jan. 13, 2013).

[20] See In re Dorner, 343 F.3d 910, 913 (7th Cir. 2003).

[21] See Comm. on Rules of Practice and Procedure, Report and Recommended Guidelines On Standing Orders In District and Bankruptcy Courts (2009), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/jc09-2009/2009-09-Appendix-F.pdf.

[22] See Fed. R. Civ. P. 83(b).

[23] See, e.g., Practice Guidelines for Judge Robert H. Cleland, U.S. District Ct. E.D. Mich., http://www.mied.uscourts.gov/judges/guidelines/index.cfm?judgeID=12.

[24] The Eastern District of Pennsylvania does a particularly good job in making them available.  See Judges’ Procedures, U.S. District Ct. E.D. Pa., http://www.paed.uscourts.gov/us08001.asp (last visited Jan. 13, 2012).

[25] See In re Atl. Pipe Corp., 304 F.3d 135, 145 (1st Cir. 2002) (finding it within the inherent power of the district court to order non-binding mediation, despite the lack of a local rule on the topic).

[26] See Glenn S. Koppel, Toward A New Federalism in State Civil Justice: Developing a Uniform Code of State Civil Procedure Through a Collaborative Rule-Making Process, 58 Vand. L. Rev. 1167, 1180 (2005) (observing that “the proliferation of local rule-making as a result of the ‘exercise of individualized discretion’ by federal judges” significantly contributes to disuniformity among local discovery practices); see also Richard Marcus, Confessions of a Federal “Bureaucrat”: The Possibilities of Perfecting Procedural Reform, 35 W. St. U. L. Rev. 103, 119 (2007) (suggesting that procedural outcomes are unlikely to be uniform because “local (and individual) variation is quite likely among American judges”).

[27] See Anne Shea Gaza & Jason J. Rawnsley, Local Practices for Electronic Discovery, Fed. Law., Feb. 2011, at 32.

[28] In many Districts, it can be a real challenge to locate the forms; however, the Southern District of West Virginia’s website serves as a good example of a jurisdiction providing easy online access to the forms referenced in its local rules.  See Forms Referenced in the Local Rules, U.S. District Ct. S.D. W. Va., http://www.wvsd.uscourts.gov/rules/local/forms.html (last visited Jan. 13, 2012).

[29] See Forms & Fees, U.S. Courts, http://www.uscourts.gov/FormsAndFees.aspx (last visited Jan. 13, 2012) (providing a general index of AO forms).

[30] See, e.g., Rule 16(b) Scheduling Order, Sample Form 21, Fed. Jud. Center, http://www.fjc.gov/public/pdf.nsf/lookup/CivLit2D_Form21.pdf/$file/CivLit2D_Form21.pdf (last visited Jan. 13, 2013); see also Civil Litigation Management Manual, Second Edition, Fed. Jud. Center, http://www.fjc.gov/public/home.nsf/pages/1245 (last visited Jan. 21, 2013) (providing links to the Civil Litigation Management Manual and sample forms).

[31] Whitehouse v. U.S. Dist. Court, 53 F.3d 1349, 1363 (1st Cir. 1995).

[32] See, e.g., Miss. Pub. Corp. v. Murphee, 326 U.S. 438, 444 (1946) (noting that construction by the Advisory Committee is of weight in assessing “rules formulated and recommended” by them).  But see, e.g., Krupski v. Costa Crociere S.p.A., 130 S. Ct. 2485, 2598-99 (2010) (Scalia, J., concurring) (asserting the primacy of textual comparisons).

[33] 413 U.S. 149, 163-64 (1973) (denying mandamus with regard to local rule permitting juries of six in civil cases where the rule was not in conflict with the applicable federal rule).  At least one commentator criticizes this use of inherent power to “bypass” local rulemaking as “troublesome” because it “exacerbates procedural di
suniformity in the federal system.”  See Samuel P. Jordan, Situating Inherent Power Within a Rules Regime, 87 Denv. U. L. Rev. 311, 318 (2010).

[34] See Charles Alan Wright et al., 12 Federal Practice and Procedure § 3152 (2d ed. 1997) (stating that the Civil Justice Reform Act of 1990 “clouded the evaluation of local rules because this legislation arguably authorized district courts to disregard Civil Rules in their plans for reducing cost and delay”).

[35] Differentiated case management involving “tracks” remains a part of the Local Rules of many courts.  See, e.g., Robert M. Landis et al., Civil Justice Expense and Delay Reduction Plan 5-8 (1991), available at http://www.paed.uscourts.gov/documents/cjraplan/cjraplan.pdf; see also E.D. Pa. L.R.C.P. 1.1.1(f) (citing an Order adopting the Civil Justice Expense and Delay Reduction Plan).

[36] See, e.g., D. Ariz. LRCiv 83.9(a)(2)(A) (assigning duty to assure “consistency” to Rules of Practice Advisory Committee).

[37] See 28 U.S.C. § 2071(d) (2006); see also Fed. R. Civ. P. 83(a).

[38] 28 U.S.C. § 332(d)(4); see also 28 U.S.C. § 331.

[39] See Myron J. Bromberg & Jonathan M. Korn, Individual Judges’ Practices: An Inadvertent Subversion of the Federal Rules of Civil Procedure, 68 St. John’s L. Rev. 1, 9 (1994).

[40] The cover page of the Local Rules effective in March, 2012 in the Eastern and Southern Districts of New York bear the legend “[a]pproved by the Judicial Council of the Second Circuit.”  Local Rules of the United States District Courts for the Southern and Eastern Districts of New York, U.S. District Ct. E.D.N.Y. 1 (Mar. 2, 2012), available at http://www.nyed.uscourts.gov/sites/default/files/local_rules/localrules.pdf.

[41] Standing Comm. on Rules of Practice & Procedure, Report on Local Rules 1 (2004), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Final_Local_Rules_Report_March_%202004.pdf.

[42] See District Courts Selected for Patent Pilot Program, U.S. Courts (June 7, 2011), http://www.uscourts.gov/News/NewsView/11-06-07/District_Courts_Selected_for_Patent_Pilot_Program.aspx.

[43] See J. John Koeltl  et al., Pilot Project Regarding Initial Discovery Protocols for Employment Cases Alleging Adverse Action 11 (2011), available at http://www.fjc.gov/public/pdf.nsf/lookup/DiscEmpl.pdf/$file/DiscEmpl.pdf (recommending adoption of District wide Standing Order whose requirements “supersedes” obligations to disclose under F.R.C.P. 26(a)(1)).

[44] See Proposed D. Or. LR 26-7 (proposed Nov. 2012), available at http://ord.uscourts.gov/index.php?option=com_phocadownload&view=category&download=298%3Anovember-2012-proposed-new-and-amended-rules&id=60%3A2013-proposed-local-rules&lang=en.

[45] J. Edward T. Gignoux et al., Preliminary Draft of Proposed Amendments to the Federal Rules of Civil Procedure, Federal Rules of Criminal Procedure, Rules Governing Section 2254 Cases in the United States District Courts, and Rules Governing Section 2255 Proceedings in the United States District Courts, 98 F.R.D. 337, 371 (1983) (“When authorized by the judicial council, a district court may adopt on an experimental basis for no longer than two years a local rule that may not be challenged for inconsistency with these rules, after giving appropriate public notice and an opportunity to comment.”).

[46] J. Robert E. Keeton et al., Preliminary Draft of Proposed Amendments to the Federal Rules of Civil Procedure and the Federal Rules of Evidence, 137 F.R.D. 53, 153. (1991) (recommending that an experimental rule be “limited in its period of effectiveness to five years or less”).

[47] D.C. COLO. LCivR 1.1(I), available at http://www.cod.uscourts.gov/Portals/0/Documents/LocalRules/2012-LR/2012-Approved-Local-Rules.pdf.

[48] See Charles Alan Wright et al., supra note 34, at § 3153 (collecting examples of discovery innovations adopted in Federal Rules 33 and 37(a) that surfaced first in local rules).

[49] Lauren Robel, Fractured Procedure: The Civil Justice Reform Act of 1990, 46 Stan. L. Rev. 1447, 1484 (1994) (“Local court tinkering with the Federal Rules is rarely inspired by the disutility of a Rule under local conditions.  Rather, it is inspired by a belief that the rulemakers got it wrong.”).

[50] Levin, supra note 1, at 1579 (“Local rules offer the most expeditious means of experimenting.”).

[51] See id. at 1583 (“Consistency with the national rules was not to be required of rules that were avowedly experimental.”).

[52] See Thomas Y. Allman, The Need for Federal Standards Regarding Electronic Discovery, 68 Def. Couns. J. 206, 208 (2001).

[53] See id. (stating that “amendments to the Federal Rules are necessary”).

[54] An initial version was issued in the summer of 2004 for Public Comment.  See Advisory Comm. on Fed. Rules of Civil Procedure, Revised Report Of The Civil Rules Advisory Committee (2004), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/comment2005/CVAug04.pdf.

[55] See Adoption and Amendment to Civil Rules, 234 F.R.D. 219, 279, 312-13 (2006).

[56] E.D. Ark. & W.D. Ark . L.R. 26.1 (whether anticipated requests exceeded “reasonably available [information] in the ordinary course of business;” if so, the costs of going further; the format and media of production; whether reasonable preservation measures had been taken to preserve; any other problems).

[57] See Panel Discussions, Panel Five: E-Discovery Under State Court Rules and United States District Court Rules, 73 Fordham L. Rev. 85, 93-94 (2004) (apart from issue of whether or not the Arkansas Rule produces “balkanization of the Federal Rules through Local Rules”).

[58] D. Wyo. U.S.D.C.L.R. 26.1(d)(1) & App. D (requiring discussion of listed aspects of  “computer data discovery”).

[59] D.N.J. L.Civ.R. 26.1(b)(2), (d) (listing required topics for Rule 26(f) discovery plan and imposing duty to “investigate and disclose” on counsel).

[60] M.D. Pa. L.R. 26.1 (duty to investigate by attorneys; also emphasizing email issues such as search protocols and the need to restore deleted information from backups or archives; advocating allocation of costs for disclosures “beyond what is reasonable available in the ordinary course of business”).

[61] The Middle District of Florida also issued a handbook that references electronic discovery issues.  See U.S. Dist. Court Middle Dist. Fla., Middle District Discovery 21-22 (2001), available at  http://www.flmd.uscourts.gov/Forms/Civil/Discovery_Practice_Manual.pdf.

[62] The District of Delaware adopted major revisions in 2011, reacting to concerns that the Default Standards “[was] basic, a bit scattershot, and meant to be a punishment to parties who failed to cooperate.”  Delaware District Court’s Revised Default eDiscovery Standard is Horrible-Electronic Discovery, ElectronicDiscovery (May 7, 2012), http://electronicdiscovery.info/delaware-district-courts-revised-default-ediscovery-standard-is-horrible-electronic-discovery/.

[63] N.D. Ohio LR 16.3 & App. K.

[64] See Administrative Order No. 174 Regarding Default Standard for Discovery of Electronically Stored Information (M.D. Tenn., July 9, 2007), available at http://www.tnmd.uscourts.gov/files/AO_174_E-Discovery.pdf.

[65] W.D. Tenn. LR 26.1.

[66] See Thomas
Y. Allman, Addressing State E-Discovery Issues Through Rulemaking: The Case for Adopting the 2006 Federal Amendments, 74 Def. Couns. J. 233, 239 (2007).

[67] See, e.g., D. Vt. L.R. 26(a)(4)(B) (“deadlines for discovery of [ESI]”).

[68] See, e.g., E.D. Wis. L.R. 26(a)(1)-(5) (“reasonable accessibility” and burdens and expense; format and media for production; measures taken to preserve; procedures for asserting post-production claims of privilege or work product; other issues relating to e-discovery).

[69] See D. Miss. L.U.Civ.R. 26(e)(2)(B)(i)-(xi) (providing a comprehensive list of ESI related topics for discussion by parties for the Northern and Southern Districts of Mississippi).  Alone among the studied local rules, D. Miss. L.U.Civ.R. 45(d) (Non-Party ESI) also extends the duty to meet and confer to non-parties (or their counsel, if represented) when a subpoena duces tecum is issued for ESI.

[70] See W.D. Pa. LCvR 26.2 (requiring designation of a “resource” person, and speaking of allocation of “costs of preservation [and] production” of ESI).

[71] See W.D.N.Y.  L.R. Civ. P. 26(f)(1)-(6) (requiring phased search for ESI not reasonably accessible with possible payment of costs of “search, retrieval, review, and production;” specifying that metadata need not be produced absent agreement or good cause; providing for production as imaged files (PDF or TIFF) absent particularized need for native production).

[72] See, e.g., D. Conn. Civ. Report Form 26(f), available at http://www.ctd.uscourts.gov/sites/default/files/local_rules/Revised%20Local%20Rules%20%2011-15-2012.pdf (included as Appendix to Local Rules).

[73] See, e.g., D. Neb. Rule 26(f) Report  ¶ IV(E)(3)(b)(i)-(xi), available at http://www.ned.uscourts.gov/internetDocs/forms/form35.pdf (listing 11 topics which parties have discussed  and requiring parties to either agree that no “special” provisions are required or, if they are, to list the agreements to be followed).

[74] The Model Joint Electronic Discovery Submission and Order used in the S.D.N.Y. Pilot project discussed below is a classic example of this approach.  See infra note 80.

[75] See Guidelines for Discovery of Electronically Stored Information (ESI), U.S. District Ct. D. Kan., http://www.ksd.uscourts.gov/wp-content/uploads/2010/03/electronicdiscoveryguidelines.pdf (last visited Jan. 23, 2013).

[76] The Sedona Principles Addressing Electronic Document Production, U.S. Dist. Ct. C.D. Ill., http://www.ilcd.uscourts.gov/sites/ilcd/files/local_rules/Sedona%20Principles.pdf (last visited Jan. 23, 2013); Local Rules and Orders, U.S. District Ct. C.D. Ill., http://www.ilcd.uscourts.gov/court-info/local-rules-and-orders/local-rules (last visited Jan. 12, 2013).

[77] Suggested Protocol for Discovery of Electronically Stored Information, U.S. District Ct. D. Md., http://www.mdd.uscourts.gov/news/news/esiprotocol.pdf [hereinafter D. Md. Suggested Protocol] (last visited Jan. 23, 2013).  The Protocol was applied by order in O’Bar v. Lowe’s Home Ctrs., No. 5:04-cv-00019-W, 2007 WL 1299180, at *4 n.2 (W.D.N.C. May 2, 2007).

[78] See Mezu v. Morgan State Univ., 269 F.R.D. 565, 570-71 (D. Md. 2010) (implying that violations of e-Discovery Protocol will result in sanctions that may include case-dispositive sanctions including contempt of court).

[79] See, e.g., Pretrial Order No. 1, available at http://www.paed.uscourts.gov/documents/procedures/shapole.pdf.

[80] See Judicial Improvements Comm., Report On Pilot Project Regarding Case Management Techniques For Complex Civil Cases 18-29 (Oct. 2011), available at http://www.nysd.uscourts.gov/rules/Complex_Civil_Rules_Pilot.pdf.

[81] See D. Md. LAR 802(h).

[82] See D. Mass. LR 16.6 (7)(a)-(d).

[83] Fed. Circuit Advisory Council, Model Order Regarding E-Discovery in Patent Cases (2011) [hereinafter Model Patent Order], available at http://www.cafc.uscourts.gov/images/stories/the-court/Ediscovery_Model_Order.pdf.

[84] See Proposed D. Or. LR 26-6 (proposed Nov. 2012), available at http://ord.uscourts.gov/index.php?option=com_phocadownload&view=category&download=298%3Anovember-2012-proposed-new-and-amended-rules&id=60%3A2013-proposed-local-rules&lang=en.

[85] Statement of Purpose and Preparation of Principles, Seventh Circuit Electronic Discovery Pilot Program, http://www.discoverypilot.com/ (last visited Jan. 12, 2013).

[86] Id. (providing links to Principles and to Model Standing Order).

[87] Principles Relating to the Discovery of Electronically Stored Information, Seventh Circuit Electronic Discovery Pilot Program, 3-4 (Aug. 1, 2010), http://www.discoverypilot.com/sites/default/files/Principles8_10.pdf [hereinafter Seventh Circuit Principles].

[88] See The Sedona Conference®, The Sedona Conference Commentary on Proportionality in Electronic Discovery, 11 Sedona Conf. J. 289, 292 (2010).

[89] Seventh Circuit Principles, supra note 87, at 4; see also Thomas Y. Allman, Preservation Rulemaking After the 2010 Litigation Conference, 11 Sedona Conf. J. 217, 218-19 (2010).

[90] See The Sedona Conference®, The Sedona Principles: Second Edition Best Practices Recommendations & Principles for Addressing Electronic Document Production 28 (Jonathan M. Redgrave et al. eds., 2d ed. 2007), available at http://www.sos.mt.gov/Records/committees/erim_resources/A%20-%20Sedona%20Principles%20Second%20Edition.pdf (“[I]t is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant [ESI]”); id. at 45 (Noting that the primary source should be “active data” absent demonstrable “need and relevance that outweigh the costs and burdens” including the “disruption of business and [IT] activities”); id. at 49 (Stating that there is no need to preserve or produce “deleted, shadowed, fragmented, or residual” ESI).

[91] See Proposed N.D. Ill. LPR ESI 2.3(d) (proposed Sept. 27, 2012), available at http://www.ilnd.uscourts.gov/_assets/_documents/Rules/LPR12.pdf.

[92] D. Del. Default Standard For Discovery, Including Discovery of Electronically Stored Information (revised Dec. 8, 2011), available at http://www.ded.uscourts.gov/sites/default/files/Chambers/SLR/Misc/EDiscov.pdf [hereinafter D. Del. Default Standard].

[93] Id. at Schedule A.

[94] W.D. Wash. Model Protocol For Discovery Of Electronically Stored Information in Civil Litigation § II(C)(2), available at http://www.wawd.uscourts.gov/sites/wawd/files/61412ModeleDiscoveryProtocol.pdf [hereinafter W.D. Wash. Model Protocol] (listing categories of ESI which “need not be preserved” absent a showing of good cause by the requesting party).

[95] See Model Patent Order, supra note 83, at ¶¶ 10-11 (limiting email production requests “to a total of five custodians per producing party” and shifting costs for additional requests; also limiting “contested requests” for additional search terms under same conditions).

[96] See E.D. Tex. Local Civil Rules App. P. ¶¶ 8-9, available at http://www.txed.uscourts.gov/page1.shtml?location=rules (limiting discovery to eight custodians and ten search terms).

[97] See Proposed D. Or. LR 26-6 (proposed Nov. 2012), available at http://ord.uscourts.gov/en/proposed-local-rules/notice-of-proposed-local-r
ule-changes-and-opportunity-for-public-comment-november-2012  (adopting the Model Order “in all cases in which a claim of patent infringement is asserted”).

[98] See Moze Cowper & John Rosenthal, Not Your Mother’s Rule 26(f) Conference Anymore, 8 Sedona Conf. J. 261, 262 (2007).

[99] See Steven S. Gensler, Some Thoughts on the Lawyer’s E-Volving Duties in Discovery, 36 N. Ky. L. Rev. 521, 525-38 (2009) (describing the “front-loading” effect of the 2006 Amendments).

[100] See also K&L Gates, supra note 5 (listing e-discovery initiatives in effect as of late 2011).  While there is evidence of activity in most major urban districts, it is not evident in those which include Cincinnati, Dallas, Detroit, the District of Columbia, Los Angeles, Miami, New Orleans, San Diego, or St. Louis.

[101] See, e.g., C.D. Cal. L.R. 26-1 (“At the conference of parties held pursuant to F.R.Civ.P. 26(f), the parties shall discuss the following matters in addition to those noted in F.R.Civ.P. 26(f)” [without mention of ESI-related issues]).

[102] See generally K&L Gates, supra note 5.

[103] See S.D. Fla. L.R. 26.1; LR 16.2, NDGa; E.D.Mo. L.R. 26-3.01; M.D.N.C. LR 16.1; W.D.N.C. LCvR 16.1; D.P.R. L.Cv.R. 16; D. Vt. L.R. 26.

[104] See E.D. & W.D. Ark. R. 26.1(4)(a)-(e); D. Mass  LR 16.6(A)(7)(a)-(d).;  D. Miss. L.U.Civ.R. 26(e)(2)(B);  D.N.J. L.Civ.R. 26.1(d); W.D.N.Y. L.R. Civ. P. 26(f); M.D. Pa. R. 26.1(c); W.D. Pa. LCvR 26.2; Local Rules W.D. Wash. CR 26(f)(1)(I)-(J); E.D. Wis. L.R. 26(a)(1)-(5); D. Wyo. U.S.D.C.L.R. 26.1(e).

[105] N.D. Cal., [Model] Stipulated Order Re: Discovery of Electronically Stored Information for Standard Litigation, available at http://www.cand.uscourts.gov/eDiscoveryGuidelines; N.D. Ill., General Order 09-0022, available at http://www.ilnd.uscourts.gov/home/_assets/_documents/Rules/09022%20Patent%20Rules.pdf; D. Del. Default Standard, supra note 92; S.D.N.Y. Standing Order M10-468, available at http://www.nysd.uscourts.gov/rules/Complex_Civil_Rules_Pilot.pdf; N.D. Ohio LR App. K; D. Or., Model E-Discovery Order, available at http://www.ord.uscourts.gov/en/proposed-local-rules/notice-of-proposed-local-rule-changes-and-opportunity-for-public-comment-november-2012; Administrative Order No. 174 Regarding Default Standard for Discovery of Electronically Stored Information (M.D. Tenn., July 9, 2007), available at http://www.tnmd.uscourts.gov/files/AO_174_E-Discovery.pdf; W.D. Tenn. LR 26.1; E.D Tex. Local Civil Rules App. P.

[106] The Seventh Circuit Pilot Project and the Federal Circuit Model Order advocate use of this approach in individual cases, a topic beyond the scope of this analysis.  See Statement of Purpose and Preparation of Principles, supra note 85; Model Patent Order, supra note 83.

[107] N.D. Cal., Guidelines for the Discovery of Electronically Stored Information, available at http://www.cand.uscourts.gov/eDiscoveryGuidelines; S.D. Fla. L.R. App. A; D. Kan., Guidelines for Discovery of Electronically Stored Information, available at http://www.ksd.uscourts.gov/wp-content/uploads/2010/03/electronicdiscoveryguidelines.pdf (last visited Jan. 24, 2013); D. Md. Suggested Protocol, supra note 77; Local Rules, U.S. District Ct. C.D. Ill., http://www.ilcd.uscourts.gov/court-info/local-rules-and-orders/local-rules (last visited Jan. 24, 2013) (J. John A. Gorman adopting the Sedona Principles).

[108] A Rule 84 Subcommittee of the Civil Rules Committee is considering (as of November, 2012) recommending the abrogation of Rule 84 (and most Official forms) in deference to the forms issued by the Administrative Office.  See Advisory Committee on Civ. Rules, Reporter’s Memorandum Regarding Rule 84, in Meeting on November 1‑2, 2012 of the Advisory Committee on Civil Rules 407, 407-25 (2012), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Civil/CV2012-10.pdf.  The forms available on the AO website do not relate to the Rule 26(f) and Rule 16(b) processes.  See Courts Forms by Number, U.S. Courts, http://www.uscourts.gov/FormsAndFees/Forms/CourtForms.aspx (last visited Jan. 24, 2012).

[109] See Emery G. Lee III, Fed. Judicial Ctr., Early Stages of Litigation Attorney Survey 5 (2012), available at http://www.fjc.gov/public/pdf.nsf/lookup/leeearly.pdf/$file/leeearly.pdf (“[J]ust 25% of all respondents discussed electronic discovery issues at a Rule 26(f) meeting, and only 13% of all respondents discussed preservation obligations.”).

[110] See, e.g., Christopher Boehning & Daniel J. Toal, Are Meet, Confer Efforts Doing More Harm Than Good?, N.Y. L.J., July 31, 2012 (“Forcing lawyers to discuss in detail issues they would otherwise skip over at the outset of a litigation may not be the best way to reduce disagreement and foster cooperation.”).

[111] See generally Douglas L. Rogers, A Search for Balance in the Discovery of ESI Since December 1, 2006, 14 Rich. J.L. & Tech. 8, at ¶ 5 (2008), http://jolt.richmond.edu/v14i3/article8.pdf (pointing out the common law obligations to preserve information, which push parties to make unilateral preservation decisions when litigation is “reasonably likely”).

[112] See Gensler, supra note 99, at 536 (“[L]awyers will spend many hours engaging in the range of activities contemplated by the Advisory Committee Note to Rules 26(f) and recommended by the Sedona Conference. . . . [and] parties will also incur internal costs . . . to assist the lawyers . . . .”).

[113] See John H. Langbein, The Disappearance of Civil Trial in the United States, 122 Yale L.J. 522, 524 (2012) (“Thus, in American civil justice, we have gone from a world in which trials, typically jury trials, were routine, to a world in which trials have become ‘vanishingly rare.’”).

[114] See Thomas Y. Allman, Managing Preservation Obligations After the 2006 Federal E-Discovery Amendments, 13 Rich. J. L. & Tech. 9, at ¶¶ 12-13 (2007), http://jolt.richmond.edu/v13i3/article9.pdf (the Committee was urged to “deal directly with the ambiguities of preservation obligations in the ESI context,” but did not do so).

[115] See Fed. R. Civ. P. 26(b)(2)(B).

[116] See Adoption and Amendment to Civil Rules, 234 F.R.D. 219, 331, 336-37 (2006)(listing “[e]xamples [of inaccessible sources] from current technology” whose preservation and production would not normally be warranted).

[117] Seventh Circuit Principles, supra note 87; see also Final Report on Phase Two, Seventh Circuit Electronic Discovery Pilot Program, 9 (May 2012), http://www.discoverypilot.com/sites/default/files/Phase-Two-Final-Report-Appendix.pdf.

[118] Seventh Circuit Principles, supra note 87 (“deleted” or “unallocated” data on hard drives, RAM, temporary files, frequently updated metadata, duplicative backup data and other forms of ESI requiring “extraordinary affirmative measures”).

[119] D. Del. Default Standard, supra note 92, at ¶ 1(c).

[120] See W.D. Wash. Model Protocol, supra note 94, at ¶ C(2)(a)-(h) (listing types of ESI similar to those in the Default Standard).

[121] See Proposed N.D. Ill. LPR ESI 2.3(d) (proposed Sept. 27, 2012), available at http://www.ilnd.uscourts.gov/_assets/_documents/Rules/LPR12.pdf.

[122] See Chad Everingham, Practical E-Discovery Issues, 51 The Advoc. 37, 37 (2010) (recommending stipulation under which
parties provide a list of no more than 15 custodians, which can be modified  by the other side and custodians added by title; the same with search terms).

[123] Stephen N. Subrin, Uniformity in Procedural Rules and the Attributes of a Sound Procedural System: The Case for Presumptive Limits, 49 Ala. L. Rev. 79, 101 (1997).

[124] Steven R. Trybus & Sara Tonnies Horton, A Model Order Regarding E-Discovery in Patent (and Other?) Cases, 20 ABA Sec. of Litig., no. 2, Winter 2012, at 2, available at http://jenner.com/system/assets/publications/8846/original/AModelOrderRegardingEDiscoveryinPatent.pdf?1328818478.

[125] See Notes from the Mini-Conference on Preservation and Sanctions, Jud. Conf. Subcommittee on Discovery 24 (Sept. 9, 2011), http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/DallasMiniConf_Materials/Notes%20from%20the%20Mini-Conference%20on%20Preservation%20and%20Sanctions.pdf.

[126] Fed. R. Civ. P. 33(a) (no more than 25 written interrogatories, “including all discrete subparts”).

[127] Fed. R. Civ. P. 30(d)(2) (“a deposition is limited to 1 day of 7 hours”).

[128] Initial Rules Sketches, Duke Conference Subcommittee, 19-20 (Oct. 2012), http://law.duke.edu/sites/default/files/images/centers/judicialstudies/Panel_4-Background_Paper.pdf.

[129] Advisory Committee on Civ. Rules, Memo Regarding Sanctions/Preservation Issues, in Meeting on March 22‑23, 2012 of the Advisory Committee on Civil Rules 249, 274-76 (2012), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Civil/CV2012-03.pdf (proposing, inter alia, that discovery “need not be provided” from nine sources of ESI, nor from “key custodians” and that search terms may be used).

[130] See Gensler, supra note 99, at 547 (A 1978 proposal requiring cooperation was deleted “in light of objections that it was too broad,” and the requirement to participate in “good faith” was substituted).

[131] See, e.g., Fed. R. Civ. P. 16(f); Fed. R. Civ. P. 37(f).

[132] S.D. Cal. CivLR 16.1(d) (encouraging development of a “cooperative discovery schedule”).

[133] Del. Default Standard, supra note 95, at ¶ 1(a) (“[p]arties are expected to reach agreements cooperatively on how to conduct discovery under [Rules] 26-36”).

[134] N.D. Ohio LR 16.3, available at http://www.ohnd.uscourts.gov/assets/Rules_and_Orders/Local_Civil_Rules/CoverSheet.htm (applying Appendix K absent agreement, which provides that the court expects parties to “cooperatively reach agreement” on how to conduct discovery).

[135] See, e.g., M.D. Ala. Guidelines to Civil Discovery Practice § I(A), available at http://www.almd.uscourts.gov/docs/GUIDCVDS.pdf (“discovery in this district is normally practiced with a spirit of ordinary civil courtesy and honesty”).

[136] See, e.g., J. Robert H. Cleldan, Discovery Practices and Expectations, U.S. District Ct. E.D. Mich., 1 (Apr. 2003), http://www.mied.uscourts.gov/judges/practices/Cleland/PDF%20Files/DiscoveryPrac.pdf (“The court expects parties and counsel to conduct discovery in a cooperative way, consistent with Fed.R.Civ.P. 1.”).

[137] N.D. Cal., [Model] Stipulated Order Re: Discovery of Electronically Stored Information for Standard Litigation, available at http://www.cand.uscourts.gov/eDiscoveryGuidelines.

[138] See, e.g., D. Mass. LR 26.l(a)(1).

[139] E.D.N.Y. & S.D.N.Y. L.R. 26.4.

[140] See Steven S. Gensler, A Bull’s Eye View of Cooperation in Discovery, 10 Sedona Conf. J. 363, 374 (2009) (“[T]o the extent local rules are construed as ordering parties to disclose information that would otherwise be the subject of formal discovery, or as mandating that the parties reach discovery agreements when there is a genuine dispute, they likely go too far . . . .present[ing] serious questions of validity in terms of inconsistency with the Federal Rules.”).

[141] See Goss Graphics Sys., Inc. v. DEV Indus., Inc., 267 F.3d 624, 627 (7th Cir. 2001).

[142] See Thomas Y. Allman, Achieving an Appropriate Balance: The Use of Counsel Sanctions In Connection with the Resolution of E-Discovery Misconduct, 15 Rich. J.L. & Tech. 9,  at ¶ 2 (2009), http://jolt.richmond.edu/v15i3/article9.pdf (a client has the ethical right to direct its counsel as it desires, and overly demanding local rules may impose unnecessary burdens on counsel with unforeseen consequences).

[143] See Joan C. Rogers, Ethics 20/20 Rule Changes Approved by ABA Delegates With Little Opposition, Bloomberg BNA (Aug. 15, 2012), http://www.bna.com/ethics-2020-rule-n12884911245/.

[144] The Sedona Conference,® The Sedona Conference Cooperation Proclamation, 10 Sedona Conf. J. 331, 331 (2009) (“an exercise in economy and logic” because “[i]t is not in anyone’s interest to waste resources on unnecessary disputes, and the legal system is strained by ‘gamesmanship’ or ‘hiding the ball’ to no practical effect”).

[145] See Bd. of Regents v. BASF Corp., No. 4:04CV3356, 2007 WL 3342423, at *5 (D. Neb. Nov. 5, 2007) (“Compliance with [the 2006 Amendments] has placed—on counsel—the affirmative duties to work with clients to . . . cooperatively plan discovery with opposing counsel, Rule 26(f) . . . .”).

[146] See Initial Rules Sketches, supra note 128, at 42 (noting that opposition was based on “concern that cooperation is an open-ended concept that, if embraced in rule text, could easily lead to less cooperation and an increase in disputes in which every party accuses every other party of failing to cooperate”).

[147] The Sedona Conference® on behalf of its drafting teams and Steering Committee, suggested addition of the phrase “complied with” in Rule 1 to convey the value of cooperation, to which reference would be made in the Committee Note.  See Letter from Steering Committee of WG1 to J. David G. Campbell et al., Unites States District Court Justices (Oct. 3, 2012) (on file with author).

[148] D.N.J. L.Civ.R. 26.1(d)(3)(b).

[149] D. Wyo. U.S.D.C.L.R. 26.1(e)(2); see also D. Wyo. U.S.D.C.L.R. 26.2 (“cost sharing” should be discussed at Rule 26(f) conference).

[150] N.D. Ohio LR App. K.

[151] John H. Beisner, Discovering a Better Way: The Need for Effective Civil Litigation Reform, 60 Duke L.J. 547, 585 (2010).

[152] See, e.g., Boeynaems v. LA Fitness Int’l, LLC, 285 F.R.D. 331, 341 (E.D. Pa. 2012) (requiring additional discovery to be at the cost of the requesting party since “a very large set” of documents had already been amassed “mostly at [producing party’s expense]”).

[153] Model Patent Order, supra note 85, at ¶ 3 (“Likewise, a party’s nonresponsive or dilatory discovery tactics will be cost-shifting considerations”).

[154] Id. at 10.

[155] Initial Rules Sketches, supra note 128, at 37 (providing alternative formulations to emphasize that Rule 26(c) authorizes cost allocation).

[156] See Costs and Burdens of Civil Discovery: Hearing Before the H. Subcomm. on the Constitution of the H. Comm. on the Judiciary, 112th Cong. 9 (2011) (statement of Tony West, Assistant Att’y Gen. of the United States).

[157] Fed. R. Civ. P. 34(b)(2)(E)(ii); Fed. R. Civ. P. 45(d)(1)(B).

[158] See Kentucky Speedway, LLC v. NASCAR, No. 05-138-WOB, 2006 WL 5097354, at *8
(E.D. Ky. Dec. 18, 2006) (“The issue of whether metadata is relevant or should be produced is one which ordinarily should be addressed by the parties in a Rule 26(f) conference.”).

[159] See Dahl v. Bain Capital Partners, LLC, 655 F. Supp. 2d 146, 148 (D. Mass. 2009) (addressing format of production because “the Local Rules of this court have yet to provide any guidance on electronic discovery”).

[160] See D. Md. Suggested Protocol, supra note 79, at 17 (“ESI should be produced to the Requesting Party as Static Images,” with any subsequent production in Native File format requiring a showing of “particularized need for that production”).

[161] See D. Del. Default Standard, supra note 92, at ¶ 5(c)&(e) (listing metadata fields).

[162] W.D. Wash. Model Protocol, supra note 94, at § II(E)(3)-(4).  The Model Protocol also provides alternative instructions for more complex cases, including such details as appropriate software files for use with Concordance® or Summation® review platforms.  See id., at § III(E)(2).  Also discussed is the use of OCR technology for scanning of hard copy documents, with appropriate cross-reference files.  See id., at § III(2)-(4).

[163] Aguilar v. Immigration & Customs Enforcement Div., 255 F.R.D. 350, 353 n.2 (S.D.N.Y. 2008) (defining TIFF and PDF, load files and native formats); id. at 356 (citing to Sedona Conference Principle 12, Comment 12b Illus. i).

[164] See, e.g., W.D.N.Y. L.R. Civ. P. 26(f) (describing need to agree on search methodology).

[165] In re Seroquel Prods. Liab. Litig., 244 F.R.D. 650, 664 (M.D. Fla. 2007).

[166] D. Del. Default Standard, supra note 92, at ¶ 5.

[167] Jason R. Baron, Law in the Age of Exabytes: Some Further Thoughts on ‘Information Inflation’ and Current Issues in E-Discovery Search, 17 Rich. J.L. & Tech. 9, at ¶ 32 (2011), http://jolt.richmond.edu/v17i3/article9.pdf (describing variations of techniques based on “latent semantic indexing,” such as “‘predictive coding,’ ‘clustering’ technologies, ‘content analytics,’ and ‘auto-categorization,’ among many others”).

[168] See Ronni Solomon, Are Corporations Ready to Be Transparent And Share Irrelevant Documents With Opposing Counsel to Obtain Substantial Cost Savings Through the Use of Predictive Coding?, The Metropolitan Corp. Couns., Nov. 2012, at 26, available at http://www.metrocorpcounsel.com/pdf/2012/November/26.pdf (collecting relevant cases).

[169] See J.F. Edwards Constr. Co. v. Anderson Safeway Guard Rail Corp., 542 F.2d 1318, 1323-25 (7th Cir. 1976) (neither Rule 16 nor the “circumscribed area of power” authorize a judge to compel compliance under facts of case); see also Identiseal Corp. of Wis. v. Positive Identification Sys., Inc., 560 F.2d 298, 302 (7th Cir. 1977) (parties, rather than the court, should determine litigation strategy).

[170] The Sedona Conference®, The Sedona Conference Database Principles: Addressing & Production of Databases & Database Information in Civil Litigation 12 (Conrad J. Jacoby et al. eds., Mar. 2011 Public Comment ed.), available at https://thesedonaconference.org/system/files/sites/sedona.civicactions.net/files/private/drupal/filesys/publications/Database_Principles.pdf.

[171] See, e.g., SEC v. Collins & Aikman Corp., 256 F.R.D. 403, 414 (S.D.N.Y. 2009) (compelling negotiations for a “workable search protocol” because party and its counsel acted unreasonably).

[172] Hanna v. Plumer, 380 U.S. 460, 477 (1965) (Harlan, J., concurring).

[173] Olin Guy Wellborn III, The Federal Rules of Evidence and the Application of State Law in the Federal Courts, 55 Tex. L. Rev. 371, 403-04 (1977) (a rule which affects “primary—nonlitigation related—conduct” is prohibited by the Enabling Act).

[174] See, e.g., W.D. Pa. LCvR 26.2(B).

[175] A classic example of overreaching is the requirement in some early local initiatives that “retention coordinators” be appointed  and charged with ensuring that relevant information was not deleted by individual custodians.  See, e.g., J. Timothy J. Savage, Order Governing Electronic Discovery, at ¶ 8, http://www.paed.uscourts.gov/documents/procedures/savpold.pdf (last visited Dec. 29, 2012); see also N.D. Ohio LR App. K, at ¶ 7; Administrative Order No. 174 Regarding Default Standard for Discovery of Electronically Stored Information (M.D. Tenn., July 9, 2007), available at http://www.tnmd.uscourts.gov/files/AO_174_E-Discovery.pdf.

[176] See Miner v. Atlass, 363 U.S. 641, 650 (1960) (invalidating basic innovations which should have been addressed at the national level).

[177] D. Kan., Guidelines for Discovery of Electronically Stored Information (ESI) ¶ 1 (2007) (“counsel should [also] make a reasonable attempt to review their clients’ ESI to ascertain the contents, including backup, archival and legacy data (outdated formats or media)”), available at http://www.ksd.uscourts.gov/wp-content/uploads/2010/03/electronicdiscoveryguidelines.pdf.

[178] Susan Ardisson & Joseph Decker, Western District Adopts New Local Rule on Electronic Discovery, 11 Law. J. 4, 4 (2009).

[179] Fed. R. Civ. P. 26(f) advisory committee’s note 2006.

[180] To date, the Federal Rules have been quite precise in regard to compliance obligations of counsel, which are mainly found in Rule 11 and 26(g), apart from obligations of good faith in several specific instances.  See generally Fed. R. Civ. P 11; Fed. R. Civ. P. 26(g).

[181] Fed. R. Civ. P. 26(a)(1)(A)(ii).

[182] Adoption and Amendments to Civil Rules, 234 F.R.D. 219, 312 (2006).

[183] Richard Marcus, Only Yesterday: Reflections on Rulemaking Responses to E-Discovery, 73 Fordham L. Rev. 1, 16-17 (2004) (citing D.N.J. L.Civ.R. 26.1(d)(1) and Wyo. U.S.D.C.L.R. 26(1)(d)(3)).

[184] Lee H. Rosenthal, Electronic Discovery—Is the System Broken? Can It Be Fixed?, 51 The Advoc. 8, 13 (2010).

[185] Commercial Cleaning Servs., L.L.C. v. Colin Serv. Sys., Inc., 271 F.3d 374, 386 (2d Cir. 2001) (invalidating use of standing order to require party to furnish information not required by law).

[186] The Comments to the ABA Model Rule 4.4(b) and the related ABA Opinions  take the position that whether the return of privileged information is required is committed to the receiving lawyer’s discretion, subject to procedural and evidentiary law.  See Model Rules of Prof’l Conduct R. 4.4(b) (2012); ABA Comm. on Ethics & Prof’l Responsibility, Formal Op. 06-440 (2006); ABA Comm. on Ethics & Prof’l Responsibility, Formal Op. 05-437 (2005).

[187] See Act of Sept. 19, 2008, Pub. L. No. 110-322, 122 Stat. 3537.

[188] See, e.g., Rajala v. McGuire Woods, LLP, No. 08-2638-CM-DJW, 2010 WL 2949582, at *7 (D. Kan. July 22, 2010).

[189] N.D.N.Y., Civil Case Management Plan ¶ 12(G) (2007), available at http://www.nynd.uscourts.gov/documents/CivilCaseMgmtPlanFILLABLE_000.pdf.

[190] See, e.g., Local Rules W.D. Wash. CR 26(f)(1)(H) (requiring discussion of “procedures” for handling inadvertent production “pursuant to Rule 502(d)or (e) of the Federal Rules of Evidence”).

[191] See, e.g., Gaza & Rawnsley, supra note 27, at 34 (district courts have adopted a “wide variety of methods” to see that “discovery proceeds in a fair and orderly manner”).

[192] See
John M. Barkett, The 7th Circuit E-Discovery Pilot Project:  What We Might Learn and Why It Matters to Every Litigant in America 3-4 (2011), available at http://apps.americanbar.org/litigation/litigationnews/civil_procedure/docs/barkett.december11.pdf.

[193] See generally J. Joy Flowers Conti & Richard N. Lettieri, In re ESI: Local Rules Enhance the Value of Rule 26(f) “Meet and Confer”, 49 Judges’ J. 29 (2010).

[194] To the author, it would appear that this can best be accomplished making appropriate use of standardized forms coupled with some form of minimal rulemaking, along with a judicious (limited) amount of ad hoc guidelines.

[195] See Adoption and Amendment to Civil Rules, 234 F.R.D. 219, 273 (2006) (explaining that “inconsistencies [due to varying local rules] are particularly confusing and debilitating [to large entities], the uncertainty, expense, delays, and burdens of such discovery also affect small organizations and even individual litigants”).

[196] See Charles S. Fax, Does Federalism Work for the Federal Rules?, ABA Litig. News, (Feb. 8, 2012), http://apps.americanbar.org/litigation/litigationnews/civil_procedure/012512-federalism-federal-rules.html (noting adverse impact on efficiency, costs and the “risk of sanctions due to unfamiliarity with, or negligent failure to adhere to, local norms that differ from a lawyer’s home jurisdiction”).

Sedona Conference to use JOLT article in 2013 Conference Materials

The Sedona Conference® is hosting the 7th Annual “Staying Ahead of the e-discovery Curve Conference” from  March 21 to 22, 2013 in San Diego, CA.  This conference of approximately 200 attendees brings together a faculty of seasoned e-discovery litigators, in-house counsel and federal judges.

The Conference requested permission to include a JOLT article as part of the materials that are handed out for the panel on Technology Assisted Review (TAR). The article requested was included in Vol. XVII, Issue 3 , and titled  Technology-Assisted Review in E-Discovery Can Be More Effective and More Efficient Than Exhaustive Manual Review by Maura R. Grossman and Gordon V. Cormack.

The Sedona Conference® is a nonprofit, 501(c)(3) research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual property rights.  The Sedona Conference’s mission is to drive the reasoned and just advancement of law and policy by stimulating ongoing dialogue amongst leaders of the bench and bar to achieve consensus on critical issues.

sedona

Blog: The New Cybersecurity Executive Order

By Airen Adamonis, Copy Editor          

The United States is currently at war with China.  However, this war is not taking place on any battlefields.  It’s taking place in cyberspace.  According to a recent article published by the Washington Post, the United States has been the target of an immense “cyber-espionage campaign” that is threatening the country’s economic competitiveness.

            Just days after a private security firm released a study accusing the Chinese military of carrying out numerous cyber-attacks against U.S. businesses, the Obama Administration released a long-awaited Executive Order on cybersecurity measures.  The Executive Order on Improving Critical Infrastructure Cybersecurity (the “Order”), released on February 12, 2013, has a goal to address cyber threats through a strengthened partnership between the U.S. Government and critical infrastructure owners.  To accomplish this goal, the Order:

  •   Requires the development of new information sharing programs to provide both classified and unclassified threat and attack information to U.S. companies;
  •   Requires the NIST’s creation of a Framework of cybersecurity practices (“Cybersecurity Framework”) to reduce cyber risks to critical infrastructure;
  •   Compels agencies to conduct regular assessments of privacy and civil liberties impacts of their activities and to make such assessments available to the public;
  •   Establishes a voluntary program to promote the adoption of the Cybersecurity Framework, which will provide incentives for companies to comply; and
  •   Calls for a review of existing cybersecurity regulation.

 

What does all of this mean for businesses?  For now, it does not mean much since none of the industries covered by the order will actually have to meet the completely voluntary standards.  According to Hunton & Williams’ Privacy Blog, the Order could potentially impact businesses in the following ways:

(1)   Businesses in the private sector will receive a surge of notifications from the government concerning cyber threats and recommended ways to respond to threats based on a process developed by the Department of Homeland Security (“DHS”).  The current DHS process mainly shares classified cyber threats only with defense companies, but under the new Order, information will be shared with other critical infrastructure companies, such as energy companies.

(2)   Critical infrastructure companies and secondary actors (i.e. insurance companies) will be able to voluntarily use the new Cybersecurity Framework to address potential risks.  Since participation is completely voluntary, it is likely that DHS will create incentives for companies to comply.  An example included in the Order is the call for a review of the federal procurement process to create a preference for vendors who meet the Cybersecurity Framework standards.

(3)   Certain private sector companies, who if targeted would have a devastating effect, will be named on a list of “Critical Infrastructure at Greater Risk.”  If added onto the list, companies can request reconsideration of their inclusion on the list.  However, this list does not change the fact that compliance with the Framework remains completely voluntary.

Although the new Order appears to be a positive step in the right direction by encouraging information sharing between the public and private sectors, it is unlikely that it is enough to prevent what seems like an inevitable national cybersecurity catastrophe.  Congress needs to make the next move fast.

 

 

Additional Sources:

 

http://www.huntonprivacyblog.com/2013/02/articles/obama-signs-presidential-policy-directive-on-critical-infrastructure-security-and-resilience/

http://www.huntonprivacyblog.com/2013/02/articles/observations-on-the-cybersecurity-executive-order-and-presidential-policy-directive/

http://www.bna.com/president-obama-signs-n17179872423/

http://www.whitehouse.gov/sites/default/files/uploads/07_eo_quotes_02132013.pdf

2013 Symposium

Despite the unexpected rain and sleet, the 2013 JOLT Symposium on E-discovery was a great success.  Attorneys from around Virginia braved the elements to hear the latest news and analysis on E-discovery topics.  Check out some of our pictures!

Some of our cheery 2L staff members at check in

Some of our cheery 2L staff members at check in

A shot of this year's poster

A shot of this year’s poster

 

A view of the Moot Courtroom during Justin P. Murphy's presentation

A view of the Moot Courtroom during Justin P. Murphy’s presentation

 

IMAG0122

The beginning of the afternoon session

 

 

Exposing Latent Patent Infringement

Keeping the “Free” in Teacher Speech Rights: Protecting Teachers and their Use of Social Media to Communicate with Students Beyond the Schoolhouse Gates

Taking Note: On Copyrighting Students’ Lecture Notes

pdf_iconDownload PDF

Cite as: Matthew M. Pagett, Taking Note: On Copyrighting Students’ Lecture Notes, 19 RICH. J. L .& TECH 6 (2013), available at http://jolt.richmond.edu/v19i2/article6.pdf

 

by Matthew M. Pagett*

 

An essential element of individual property is the legal right to exclude others from enjoying it.  If the property is private, the right of exclusion may be absolute; if the property is affected with a public interest, the right of exclusion is qualified.  But the fact that a product of the mind has cost its producer money and labor, and has a value for which others are willing to pay, is not sufficient to ensure to it this legal attribute of property.  The general rule of law is, that the noblest of human productions—knowledge, truths ascertained, conceptions, and ideas—become, after voluntary communication to others, free as the air to common use.  Upon these incorporeal productions the attribute of property is continued after such communication only in certain classes of cases where public policy has seemed to demand it.  These exceptions are confined to productions which, in some degree, involve creations, invention, or discovery.[1]

– Justice Louis D. Brandeis  

 

I.  Introduction

[1]        According to The Orion, “an independent, student-run newspaper at California State University, Chico” (“CSU”),[2] two students at CSU were reported to their school’s Judicial Affairs office on November 16, 2011, for selling class notes from a lecture through the online note-selling service, Notehall.com.[3]  Notehall.com solicited the students, including Ms. Kelsey Goishi, a junior majoring in communications studies, through the university’s e-mail client.[4]  Through that medium, the service offered the students semester-long positions as professional note-takers, which could garner each student up to $450 per semester.[5]  In order to fulfill their duties for this position, Ms. Goishi and the student-employees were required to upload weekly lecture notes and, more importantly, “study guides,” which contained “explanations of all the information that [the students would] be tested on.”[6]

[2]        After performing these tasks, the student-employees were expected to inform their classmates about the study guides by sending out a class-wide e-mail.[7]  Ms. Goishi’s professor was “made aware” of the study guide for his class, which was then on sale for $5, after a student sent out such an e-mail.  Afterward, Ms. Goishi was required to meet with both the office for Judicial Affairs and her instructor.[8]  Though the personal consequences of this meeting for Ms. Goishi are unknown,[9] CSU sent Notehall.com a cease-and-desist letter a few months after the incident, citing both state law and university policy forbidding the sale, distribution, and publication of class notes for commercial purposes.[10]  As a result, Notehall.com no longer allows students from CSU or other University of California campuses to upload notes through their system.[11]  Interestingly, however, the company never acknowledged the validity of CSU’s legal claim, simply noting that it was refusing service to these schools “[o]ut of respect for this policy.”[12]

[3]        While it has been asserted that Ms. Goishi’s actions and the Notehall.com procedures for selling notes are a “clear violation” of California state law and broadly speaking, “illegal,”[13] the extent to which this may be true and the circumstances under which either California law or U.S. copyright law may be violated is unclear.  This article will review the relevant law on the question of whether a student owns the copyright in her or his own notes and attempt to answer that question.  Part II addresses: (1) the primary elements of a copyrightable work under the Copyright Act of 1976, (2) the Fair Use Doctrine, (3) whether classroom notes constitute protected compilations, and (4) whether classroom notes could be considered “derivative works.”  Part III discusses the federal preemption doctrine, whether states have the authority to legislate ownership of copyrighted works, and, if so, the effect of that authority, with special emphasis on California law.  In Part IV, this article will address the particular factual circumstances discussed in Part I and evaluate whether Ms. Goishi and Notehall.com were in “clear violation” of state or federal law.  Lastly, the author will postulate as to the certain circumstances that may or may not create a copyright or allow for the infringement of that right with regard to students’ lecture notes.

 

II.  Background

A.  Fixation and Originality Under the Copyright Act of 1976

[4]        Congress’s authority to protect individuals’ intellectual property comes from the United States Constitution, which states that “Congress shall have the Power . . . [t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.”[14]  The statute currently exercising this Congressional power is the Copyright Act of 1976 (“the Act”).[15]

[5]        In pertinent part, the Act states that copyright protection is granted to “original works of authorship fixed in a tangible medium of expression,” including, but not limited to: (1) literary works; (2) musical works; (3) dramatic works; (4) pantomimes and choreographic works; (5) pictorial, graphic, and sculptural works; (6) motion pictures and other audiovisual works; (7) sound recordings; and (8) architectural works.[16]  A work of originality is considered “fixed” when it is written down or captured in such a way that it becomes “sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration.”[17]

[6]        With regard to academia, the fixation language has been interpreted to exclude material presented orally in courses.[18]  In Fritz v. Arthur D. Little, Inc., the plaintiff taught leadership training seminars and sued the defendant for stealing his trade secrets by taking “copious notes” during those seminars.[19]  The district court dismissed the plaintiff’s copyright claim, however, reasoning that that “[o]riginal words spoken aloud can be copied (and independently copyrighted) by all, if they have not previously been fixed in a tangible medium of expression.”[20]  Pulling from Justice Holmes’s opinion in Bleistein v. Donaldson Lithographing Co., the Court relied on the aphorism that “[o]thers are free to copy the original[, but t]hey are not free to copy the copy.”[21]

[7]        Under that rationale, the question of “fixation” is brought to the forefront when considering whether a professor’s lecture may be subject to copyright protection.  Pursuant to the language in Fritz, a professor or university must be able to show that the students’ notes were not copies of an original, extemporaneous expression in order to have a valid copyright claim; rather she, he, or it must show that the notes were copies of methodically planned, outlined, and notated predeterminations.  Thus, when evaluating whether a professor’s lecture is “fixed,” you must first ask whether the students’ notes are copies of an original, spontaneous statement on the part of the professor or whether the students’ notes are copie
s of the professor’s “copy,” i.e., her or his uniquely prepared presentation of original material.[22]

[8]        This question speaks to the other major requirement for a work to be considered copyrightable under the Act, whether the presumptively copyrighted work is “original.”[23]  A prospective plaintiff can generally meet the originality requirement with little effort, simply showing that the work “possess some creative spark, ‘no matter how crude, humble or obvious’ it might be.”[24]  Because a professor is likely to organize his or her lecture with some modicum of creativity and thoughtfulness,[25] such a presentation would probably satisfy the originality requirement.[26]

[9]        In order for a plaintiff to demonstrate a proper claim of copyright infringement, one must prove: “(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.”[27]  To establish ownership of a valid copyright, the plaintiff must show both fixation and originality under the terms of the Act.[28]  In addition, the work must be of a sort that is qualified to be considered for copyright protection.[29]  While lectures are not explicitly protected under the Act, they are neither explicitly denied such protection.  Under the standard discussed in this article, it seems likely that such expressions would meet the originality requirement.[30]  There is a question, however, as to whether a lecture presented vocally and without visual aids is “fixed in a tangible medium” for the purposes of Section 102.  While there seems to be support for the idea that fixity could occur given sufficient preparation on the professor’s part, it is unclear without delving more fully into the facts of a particular case.[31]

B.  The Fair Use Doctrine

[10]      When a work is protected under the Act, use may be immune from an action of copyright infringement on the grounds that it is a “fair use” of the author’s protected expression.[32]  The fair use exception is codified in Section 107 of the Act and states that the reproduction of a copyrighted work “for purposes of criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.”[33]  In determining whether the fair use doctrine applies to any one particular situation, the statute directs courts to consider the following factors:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.[34]

[11]      The fair use doctrine has been referred to as “the most important defense to infringement,”[35] and the Supreme Court has interpreted the doctrine to “permit[] courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which the law is designed to foster.”[36]  While there is an argument to be made that the use and sale of a student’s lectures notes constitutes a “fair use,” many factors weigh against such a defense.[37]

[12]      The first factor, “purpose and character,” turns on whether the use is “of a commercial nature.”[38]  If the use is of a commercial nature, less weight is typically given to the argument that the use is acceptable under the fair use defense.[39]  Even if a court determines that a particular use is “of a commercial nature,” however, such a determination does not fully exclude the possibility of utilizing the fair use defense.[40]  For instance, in Ms. Goishi’s situation—where she and other student-employees sold their notes for a moderate profit—a court might find that the other three factors taken together weigh more heavily in favor of a finding that, despite its commercial nature, the sale of the students’ notes was a “fair use.”

[13]      It is unclear whether the second fair-use factor, “the nature of the copyrighted work,” would lend itself, along with the other factors, to a finding that a student’s notes are a “fair use” of a professor’s lecture.  The second factor is broad, but it has been interpreted in such a way that those works which are “intended” to have more copyright protection receive it.[41]  Thus, under the intention standard, works that are original (as opposed to derivative), creative (as opposed to factual), and unpublished (as opposed to published) are generally considered to “merit greater protection.”[42]  Such factors cut in favor of and against a student-employee who is working for an organization like Notehall.com.  On one hand, the “unpublished”[43] nature of the transcribed lecture notes[44] is often a factor weighing against a finding of fair use.[45]  On the other, classroom lectures typically constitute a mix of factors, including (a) originality, (b) derivation, (c) creativity, and (d) basis in fact.  While factors (a) and (c) generally weigh against a finding of fair use, factors (b) and (d) typically weigh in favor of such a finding.  Thus, such a mixture of factors would likely obfuscate the application of a clear precedential rule as to whether the “nature” of a classroom lecture protects that lecture against the affirmative defense of “fair use.”

[14]      The third factor asks for the relative “amount and substantiality of the portion used” in the class notes when compared with the lecture as a whole.[46]  Generally speaking, “[t]he more has been taken, the harder it is to justify as fair use . . . [because] fair use should as a rule take no more than is necessary to achieve the legitimate aims of the user.”[47]  In this case, the students working for Notehall.com were expected to upload class notes at least once a week and to create a study guide for their class’s exam.[48]  Thus, it was necessary for them to “take” something constituting almost the entirety of the lecture, at least with regard to substantive content.  There may be a question as to whether a student truly “takes” the professor’s lecture when she or he takes that information and processes it in a new form; if one assumes that a lecture is copyrighted in the first place, however, fair use is probably less likely to succeed as an affirmative defense to copying and selling the lecture notes.

[15]      The last factor that courts measure when determining whether the fair use defense is applicable is “the effect of the use upon the potential market for or value of the copyrighted work.”[49]  While each factor is typically given equal weight today,[50] the fourth factor was at one time considered the predominate factor in any court’s consideration.[51]  As a part of that consideration, the operative question for any court is: “Does the use reduce the money the copyright holder has received for the work or is likely to receive from the work?”[52]  If so, then the fair use defense is unlikely to succeed.[53]

[16]      At first blush, it would seem that this factor, which was once considered the most important of the four, cuts in favor of a student-employee who sells her class notes online.  While the availability of class notes might affect the overall “grading curve” of a course, that availability is narrowly tailored for the purpose of helping those students who are enrolled in a certain course.  The notes are rarely seen by individuals other than the students themselves and are not necessarily valuable beyond the life of the course.  Taken in that light, the negative economic effect on either the professor or the university would seem to be slight, bolstering the idea that a student-defendant might be able to utili
ze the fair use defense after all.

[17]      Such a reading of the Act fails to consider how a professor might use his or her lecture material outside of class, however.  It may be inferred from the language of the Act that the value of the fourth factor turns on whether the professor’s work is “unpublished.”[54]  Thus, if a professor discusses a topic about which she or he intends to publish, and her or his theories and conclusions are “leaked” to the public before they are fully prepared for publication, there may yet be some negative economic effect for the professor.  The extent to which such a leak would be damaging is unclear, however.  Because commercial note-sharing services are typically oriented toward a specific audience and used for a specific purpose (i.e., students seeking to gain a degree), it seems unlikely that a leak would cause more damage to the lecturer than that person’s practice of discussing her or his theories and conclusions during a classroom lecture already does.

[18]      Thus, while certain “fair use” factors may cut in favor of the idea that a student-employee and note-taker might be able to assert the fair use defense, the greater weight of the evidence would seem to support the idea that a professor’s lecture, if copyrightable, could withstand such an assertion.

C.  Compilations and Derivative Works

[19]      When evaluating factual scenarios like those surrounding class lectures, it is also important to determine whether the lecture itself, the resulting student notes, or a portion of those notes, could be protected as compilations or derivative works.[55]  Section 101 of the Act defines a protected “compilation” as “a work formed by the collection and assembling of preexisting materials . . . that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship.”[56]  The same section defines a “derivative work” as:

“a work based upon one or more preexisting works, such as . . . any . . . form in which a work may be recast, transformed, or adapted. A work consisting of . . . elaborations[] or other modifications which, as a whole, represent an original work of authorship . . . .”[57]

It is important to note that, for both definitions, the language of the Act focuses on the fact that such works must be so different from preexisting works that they constitute an “original work of authorship.”[58]  A compilation sufficient to be considered an original work of authorship is created when the preexisting works are selected and arranged in an original way.[59]  For derivative works, this happens when the preexisting work is “recast, transformed, or adapted” in such a way that the derivation becomes an original work in and of itself.[60]

1.  Compilations

[20]      Little case law exists on the narrow issue of whether a student’s class notes or a professor’s lectures constitutes a protected compilation.  Generally speaking, the Supreme Court of the United States has stated that, while “facts are not copyrightable[,] compilations of facts generally are.”[61]  In Feist Publications, Inc. v. Rural Telephone Service Company, Inc., the Court addressed whether a telephone utility’s listing of names, towns, and telephone numbers was copyrightable.[62]  Noting that the listings “could not be more obvious,” the Court determined that they were not sufficiently original to merit copyright protection.[63]  The Court reasoned that, in order for a compilation of facts to be sufficiently original to merit copyright protection, it must be “selected, coordinated, or arranged” in an original way.[64]  Thus, because the telephone utility’s listing was “entirely typical” and “devoid of even the slightest trace of creativity,” lacking “more than a de minimis quantum of creativity,” it was not copyrightable.[65]

[21]      Although the Supreme Court has not answered the question of whether a student’s lecture notes constitute a copyrightable compilation, one federal district court has held that a professor’s pre-prepared practice questions were copyrighted works.[66]  Because a compilation must be the result of an original selection, coordination, or arrangement of facts,[67] the contents of an in-class lecture could reasonably meet the criteria for this standard as long as the fixation requirements are met.[68]  If those requirements are not met, and a professor’s lecture is not considered a copyrightable work, it is still possible that a student’s own class notes, capturing that work, could constitute a protected compilation.

[22]      To address that question, it is helpful to look at the statutory language, discussed at length in Feist, which requires the selection, coordination, or arrangement of facts in an original way.[69]  That mandate strikes at the very heart of this article.  While “facts are never original,” in and of themselves, they can become so when they are selected, coordinated, or arranged in an original way.[70]  With regard to student notes, it is important to consider the fact that the Feist standard does not require a piece be original in its selection, coordination, and arrangement.[71]  Rather, originality is required in only one of these areas.[72]  Thus, it is likely difficult, though not impossible, for a student to show that the contents of her class notes are the result of originality in their selection and organization (as they are likely the result of the professor’s selections, not the student’s). However, that student may be able to argue that she has arranged the professor’s lecture in a way that is sufficiently original to warrant copyright protection.  In addition, a student who supplements her professor’s lecture notes with her own notes (taken from her independent research, for example), could probably show original selection as well.  Her success would depend, in large part, on the particular factual circumstances surrounding her notes and how those notes were created and amended during the studying process.  Such an showing is discussed in greater detail infra Part V.

2.  Derivative Works

[23]      If a professor’s lecture is able to qualify for copyright protection, it is also possible that a student’s notes, which are based on that lecture, could be considered a copyrightable derivative work of the professor’s lecture.  In such a case, a student would have to show that his or her class notes have “recast, adapted, or transformed” the professor’s lecture in an original way[73] and, further, that the professor or the institution (i.e., the copyright holder) gave the student permission to prepare such a work.[74]  While it has been argued that students’ class notes cannot be considered protected compilations or derivative works “because the student is not adding any creativity to the process,” that argument is premised on the idea that “[it is] the student’s job is to take down the professor’s words, exactly from the lecture itself.”[75]

[24]      When determining whether a student might own the copyright in his or her class notes, as a derivative work, the first question is whether the student has the permission of the copyright holder, either the professor or the institution, to make the derivative work.[76]  Section 106(2) of the Act confers on the author of an original work the right to “prepare derivative works” and Section 103(a) further notes that unlawfully procured copyrighted works are not given protection as derivative works.[77]  In interpreting the word “unlawfully” from Section 103, the Seventh Circuit has noted that “[it] means only . . . that the right to make a derivative work does not authorize the maker to incorpo
rate into it materials that infringe someone else’s copyright.”[78]  That is to say, one party cannot use another’s copyrighted material without a “right to obtain [it].”[79]  This rule does not translate well in the context of class notes, however.

[25]      In the classroom, a professor is presumably well aware of the fact that his or her students are taking notes. Indeed, the value of any classroom experience is the conveyance of information from teacher to student and the retention of that information over time.[80]  Since the classroom environment is not often visited in U.S. copyright law, however, it is unclear whether taking notes is sufficient to constitute implicit “permission” for the creation of a derivative work, despite the implicit permission that seems to flow from this activity.[81]  Such an inference would depend, in part, on both (1) the professor’s own understanding of the students’ right to the lecture material and the extent to which that understanding is communicated to the students, and (2) if one exists, the school’s policy on the matter.[82]

[26]      When determining the likelihood that a student’s class notes might constitute a derivative work, the second question that a court must ask is whether the student’s notes are sufficiently original.[83]  Although the Feist Court stated that “[t]he standard for originality is low,”[84] some courts have applied a slightly higher standard to derivative works.[85]  In Entertainment Research Group, Inc. v. Genesis Creative Group, Inc. (“ERG”), the Ninth Circuit employed a test which required derivative works to exhibit a level of originality that: (1) is more than trivial, and (2) “reflect[s] the degree to which [the work] relies on preexisting material” unrelated to the scope of “any copyright protection in that preexisting material.”[86]  The court explained that the second prong is meant to ensure copyright protection is not given to derivative works which are “virtually identical” to the original work.[87]  Applying that test, the court held that three-dimensional inflatable costumes, which are based on copyrighted, two-dimensional cartoon designs,[88] are not sufficiently different from the cartoons to survive the second prong, despite the complexities that come with creating a three-dimensional object out of a two-dimensional drawing.[89]

[27]      The Ninth Circuit’s reasoning in ERG, focusing on the way in which a derivative work is created, can be applied in this factual scenario as well.  If a student is selling her notes (or an outline based on those notes) through an organization like Notehall.com, the issue of whether that student has a copyright in her notes (or her outline) will depend on the extent to which the student has “recast, transformed, or adapted” the professor’s lecture in a way that is both (1) more than trivial, and (2) not virtually identical to the professor’s work.[90]  Much of this determination turns on the particular facts in any one case.  For instance, if the student takes the time and effort to substantially alter the way in which the information from her lecture is presented, then the new, altered form would be more likely to garner its own copyright protection.  Such a possibility is discussed in more detail infra Part V.

 

III.  State Law & Federal Preemption

[28]      Much of this article is premised on the idea that a professor’s class lecture must meet Section 101’s standard for fixation in order to be protected under the Act.  In certain instances, however, it is possible for an “unfixed” class lecture be protected from copyright infringement under the laws of the several states.

[29]      Section 301 of the Act provides that “all legal or equitable rights . . . in works of authorship that are fixed in a tangible medium of expression . . . are governed exclusively by this title.”[91]  That is to say, federal copyright law preempts all copyright laws concerning works that are fixed in a tangible medium of expression.  Thus, no state law that attempts to create copyright protection for such works will be valid.  However, the Act carves out an exception for those works of authorship that “do[] not come within the subject matter of copyright as specified by sections 102 and 103, including works of authorship not fixed in any tangible medium of expression.”[92]  Therefore, a state law providing copyright protection for “non-fixed” or unfixed works of authorship would not be preempted by the Act, despite the fact that the law would have to do with the subject matter of copyrights.[93]

A.  California Civil Code §§ 980-89

[30]      As of this writing, only California has taken advantage of the “fixity exception” to the Act.[94]  In California Civil Code Section 980 (“Section 980”), the California State Legislature mandates that “[t]he author of any original work of authorship that is not fixed in any tangible medium of expression has an exclusive ownership in the representation or expression thereof.”[95]  Thus, in California—unlike anywhere else—lack of fixation is not a bar to copyright protection.

[31]      The California Court of Appeals addressed Section 980 briefly in 1969—before the implementation of the U.S. Copyright Act of 1976—in Williams v. Weisser, where it considered a set of facts somewhat reflective of those described here in Part I.[96]  In that case, the defendant-company (“the Company”) published and sold notes from the plaintiff-professor’s (“the Professor”) course in Anthropology at the University of California at Los Angeles.[97]  The Company paid one of the Professor’s students to attend the Professor’s class, take notes based on his lectures, type up those notes, and deliver them to the Company for publication and sale.[98]  After the California Superior Court granted the Professor’s motion to enjoin the Company’s actions on the grounds that its actions were prohibited, inter alia, for violating the Professor’s “common law copyright in his lectures,” the case went before the California Court of Appeals.[99]

[32]      Given the Professor’s reliance on “common law copyright,”[100] the court focused its analysis primarily on whether the Professor or the university owned the copyright in his lecture.  In addition, the court asked whether the professor had a right to preclude the defendant from distributing the notes resulting from that lecture, on privacy grounds.[101]  The court first determined that the professor owned the copyright in his lecture.[102]  Second, on the privacy issue, the court found that the Professor did in fact have a privacy interest in prohibiting the Company from disseminating a product that could be associated with him, especially given the fact that the product was not a fully accurate representation of the professor’s lecture.[103]  More importantly, for the purposes of this article, the court of appeals held that Section 980(a), which provides copyright protection for “unfixed works,” was not implicated because the Professor’s lecture “consist[ed] of the extensive notes which he had compiled before the beginning of the course . . . includ[ing] charts and diagrams placed on the classroom blackboard,” all of which were prepared before the beginning of the course.[104]  Thus, the court concluded, Williams was “not a case where the concrete expression of the ‘composition’ consist[ed] solely of an intangible oral presentation.”[105]

[33]      The broad, national implication that one may draw from the court’s determination in Williams is that there is a greater likelihood that a court might consider a professor’s lecture to be “fixed” when the notes informing it were pre
pared before the beginning of the semester and when the lecture relies on charts and diagrams to communicate to the students.[106]  Further, the inference is that, in order for Section 980 to be implicated, a professor’s lecture must be entirely unfixed.[107]  In other words, the lecture must be an extemporaneous presentation without notes, diagrams, and significant pre-semester preparation in order to qualify for protection under Section 980.[108]

B.  California Civil Code §§ 66450-52

[34]      Perhaps due to the fact that one could interpret Sections 980 through 982 of the California Civil Code to protect only classroom lectures that are poorly prepared or un-prepared, or the fact that student notes could be considered uniquely original compilations or derivative works in their own right, the California State Legislature passed another amendment to the California Civil Code on August 30, 2000.[109]  The amendment, which is located in Sections 66450 through 66452 of the Code, provides, inter alia:

“(a) Except as authorized by policies developed by the University in accordance with subdivision (a) of Section 66452, no business, agency, or person, including . . . an enrolled student, shall prepare, cause to be prepared, give, sell, transfer, or otherwise distribute or publish, for any commercial purpose, any contemporaneous recording of an academic presentation in a classroom or equivalent site of instruction by an instructor of record.”[110]

The Code further stipulates that “[t]his prohibition applies to a recording made in any medium,” including “handwritten or typewritten class notes.”[111]  Thus, students in California are prohibited from selling or publishing their class notes, regardless of copyright ownership, without the express permission of the university.

[35]      In accordance with the language of Section 66450, which allows for properly constructed university policies to preempt the prohibition forbidding the sale of class notes, many universities in California have set out specific policies clarifying their respective positions.[112]  For instance, the University of California at Berkeley has adopted a policy generally in accordance with the state’s prescriptions, proclaiming that professors own the copyright in their own lectures, pursuant to Section 980(a). However, the school asserts that students are prohibited from selling their notes “[e]xcept as approved in advance by the instructor . . . .”[113]  Additionally, and importantly, the University has also established a “Campus Class Note Subscription Service” through which notes may be sold, but only with the authorization of the University, the Academic Senate, and the course instructor.[114]  That utility circumvents the privacy issue discussed in Williams by providing instructors with the right to “review and approve the notes prior to their distribution and sale.”[115]

[36]      While California is the only state to have proclaimed that instructors have a copyright in unfixed works existing within its borders,[116] universities in other states have set similar policies.[117]  For example, the University of North Carolina at Chapel Hill (“UNC-CH”) has stated in its Copyright Policy: “[s]tudent [w]orks that constitute notes of classroom and laboratory lectures and exercises shall not be used for commercial purposes by the student generating such notes.”[118]  Of course, if a student were to own the copyright in her or his own notes, regardless of the UNC-CH policy on the matter, federal copyright laws and the concomitant rights of authorship that come with them would preempt any such prohibition.[119]  On the other hand, if a student were not able to meet the requirements of fixation and originality, then a non-California-based university’s policy might control.

 

IV.  Analysis

[37]      Though Ms. Goishi’s dilemma is a recent one, it is not an uncommon occurrence for students to be rebuked or punished because of their attempts to publish, disseminate, or sell their class notes online—as the Williams case shows.[120]  In fact, the issue was recently litigated in one of the few modern-day cases addressing the narrow issue of whether a student or professor owns the copyright in their respective lecture notes.[121]  Though the case was largely litigated in connection to the Digital Millennium Copyright Act (“DMCA”), which proved to be inapplicable to the students’ notes, the case provides a helpful starting point for evaluating the viability of a copyright infringement claim relating to the dissemination and sale of a student’s lecture notes today.[122]

[38]      In Faulkner Press L.L.C. v. Class Notes L.L.C., the plaintiff, a professor[123] who owned the properly registered copyrights in both his lecture notes and the textbooks which he authored,[124] filed a copyright infringement suit against a note-selling company that had “hir[ed] student note takers as independent contractors to provide lecture summaries and study materials” at the university.[125]  The professor alleged that the company’s student-employees had taken notes that improperly included certain practice questions from his textbooks as well as other materials from the lecture, including an outline that the professor showed during class.[126]

[39]      The court acknowledged that the professor’s pre-prepared practice questions were protected by copyright, but found that the student’s lecture summaries could be excepted from enforcement of the Act on grounds of fair use.[127]  Thus, the court remanded the case back to the jury to determine the exact nature of the notes taken.[128]  The court’s decision speaks to the heart of the issue courts outside of California must resolve when determining the validity of a copyright infringement claim made by a professor or institution against a student.  Based on the court’s determination in Faulkner Press, the way in which the student takes her or his notes may affect a court’s determination as to the notes’ ability to continue to be sold.

[40]      In the Terms & Conditions section of the Notehall.com website,  the company states that all of its content must be “independently created, transformative, and non-derivative.”[129]  It goes on to say that a student’s notes:

“[S]hould not be a transcript or recording of another”s [sic] independent efforts . . . . It should go beyond simply summarizing material covered in class or in written or recorded materials, but include information raised by students in or outside of class, and independent thought, analysis and commentary.  Class notes, for example, must be substantially rewritten after class and include independent thought and analysis, research and information; notes that use a lecturer”s [sic] words or that are not carefully reviewed, rethought and rewritten after class are not useful to or appreciated by students, and not permitted on Chegg sites.”[130]

Under these terms, a student’s study guide created based on those facts discussed in the professor’s lecture and even a student’s class notes would likely meet the standard required for a work to qualify as a uniquely original piece of authorship that has been captured in the fixed medium of a student’s class notes.  Therefore, if a student is able to “transform” his or her work in such a way that they are no longer what they were during the lecture, then the student would have created his or her own original work of authorship.  In either case, there would likely be a factual issue, just as there was in Faulkner Press, as to the extent of the “transformation” of the student’s notes.[131]

[41]      It may also be helpful to consider the way in which a court might address a situation like the one
described in Part I.  If a student were sued for copyright infringement by her professor or university, a court might address that case in the following way:

[42]      First, it is important to determine whether the professor’s lecture would merit copyright protection at all.  One can make that determination by looking at whether the lecture is fixed and, further, whether it constitutes an “original work.”[132]  It is presently unclear whether an orally transmitted lecture can be considered “fixed.”  However, given the court’s ruling in Williams, fixation may exist if the professor is able to show sufficient evidence that her or his lectures were well-planned before their delivery and that they were based on extensive notes.[133]  If the lecture notes are not fixed, but the lecture was presented within the jurisdiction of California, then a copyright would exist under Section 980 of the California Civil Code, which provides protection for unfixed works.[134]  In addition, the sale of the class notes would be prohibited, regardless of fixation, under Section 66452 of the Code.[135]  It is unclear, however, as to whether a professor’s lecture would also satisfy the originality requirement.  Given that the requirement has been found to be generous, it seems likely that a student’s lecture notes would meet it, even if only as a compilation.[136]

[43]      The second question that a court might ask, when addressing this issue, is whether the professor or university owns the copyright.  Given the traditional exception to the “work made for hire” doctrine,[137] there is a strong argument that a court would determine ownership in favor of the professor.  In either case, the court would also need to address whether the student’s notes are excepted from copyright liability under the fair use defense, weighing each of the four factors against one another.  Though it is perhaps unlikely, the court might determine in the alternative that the students had the professor’s or university’s implicit permission to create a derivative work from the professor’s lecture, and, thus, that the work was protected.

[44]      Third and finally—regardless of whether a professor’s lecture is found to be copyrightable under the Act—a court would need to determine whether the student had sufficiently transformed the lecture.  A court could so find on the grounds that the student work is a compilation or simply an original creation.[138]  In such an instance, the question would remain the same: whether the student work is fixed and, further, whether it is original.[139]  While the fixation requirement would likely be met with little effort—since class notes meant for transference and sale are necessarily fixed in a medium—it is unclear whether the student’s work would be considered sufficiently original.  Again, this would likely turn on the particular factual circumstances surrounding any one case.

 

V.  Conclusion

[45]      As a student in California, Ms. Goishi likely has little legal recourse.[140]  By passing sections 980 and 66450, the California legislature has made it exceedingly difficult for students to use their class notes for anything other than studying without the permission of the professor or university.[141]  Still, Ms. Goishi’s particular situation is not the only case of a student attempting to sell her professor’s lecture notes in the several states. Thus, it is important to address the legality of doing so outside of California as well.

[46]      If Ms. Goishi were a student outside of California, it seems that the copyrightable nature of her lecture notes would largely depend on the quality of those notes and the extent to which they were revised after class.  In particular, the study guide that Ms. Goishi created may be more likely to achieve protection under U.S. copyright law as an original work of authorship. As long as the guide constituted more than a simple pasting of her notes from the lecture (i.e., she thoughtfully worked to develop it as an original source of information), it should be considered a copyrightable derivative work.

[47]      The quote at the beginning of this article is excerpted from Justice Brandeis’s dissenting opinion in the 1918 Supreme Court decision International News Service v. Associated Press.[142]  In that case, the Associated Press brought suit against an organization called the International News Service for the fraudulent obtainment of information that the plaintiff gathered and its use for its own news service.[143]  The majority held in favor of the plaintiff, relying on the commercial value of the information to that person.[144]  That holding prompted Justice Brandeis to note that, “the noblest of human productions—knowledge, truths ascertained, conceptions, and ideas . . . [are] free as the air to common use” once they have been voluntarily communicated, with the exception of instances of “creation, invention, or discovery.”[145]

[48]      The “Brandeis Rule” should be given effect in the broader context of student classroom notes.  Largely speaking, a professor’s lectures are communicated “free as the air” without being fixed in any permanent form.  In addition, they often constitute transmissions of facts already known in particularly lucid or helpful ways by the general public, and they rarely “creat[e], invent[], or discover[]” in and of themselves.[146]  Thus, excepting those instances in which a professor’s lecture proves to be original or inventive in-and-of itself, student notes should be transmitted among students free as the air.  This would allow students to have greater access to the information that they need to succeed.  Finally, in accordance with the Brandeis Rule, student note-selling services like Notehall.com should give way to free note-selling services provided by the universities themselves, which would facilitate quality scholarship and sharing among all of the institutions’ inhabitants.[147]

 


* Law Clerk to the Honorable Judge Linda Stephens, North Carolina Court of Appeals.  J.D., Wake Forest University School of Law, 2012; B.A., University of North Carolina at Chapel Hill, 2008.  [1] Int’l News Serv. v. Assoc. Press, 248 U.S. 215, 250 (1918) (Brandeis, J., dissenting).

 

 

[2] About the Orion, the Orion, http://theorion.com/site/about/ (last visited Mar. 14, 2012).

[3] Molly Rose Livingston & Ashley Nakano, Notehall Allows Students to Commit Academic Dishonesty, the Orion (Nov. 28, 2011), http://theorion.com/features/article_4d317be4-1a47-11e1-a2e4-001a4bcf6878.html.

[4] Id.

[5] Id.  The e-mail itself reportedly proclaimed: “Being a Note-Taker means making money just being a good student!”  Id.

[6] Id.

[7] Id.

[8] Livingston & Nakano, supra note 3.

[9] Id.

[10] See Erica Perez, Colleges Crack Down on Selling, Sharing Notes, Calif. watch (Feb. 3, 2012), http://californiawatch.org/dailyreport/colleges-crack-down-selling-sharing-notes-14744.

[11] Id.  When a student attempts to upload notes from CSU or a school associated with the University of California, they are met with the following error message (or one like it):”Unfortunately, No More Notes! . . . The California State University Student Conduct Code prohibits students from selling class notes, and subjects violators to potential disciplinary actions. Out of respect for this policy, Notehall does not offer its note taking services at your school.  We apologize for the inconvenience, and share your disappointment with this CSU policy decision.” Id. (emphasis added).

[12] Id.

[13] Livingston & Nakano, supra note 3.

[14] U.S. Const. art. I, § 8, cl. 8.

[15] David Mirchin & William S. Strong, Copyright Lawin Massachusetts Continuing Legal Education, Intellectual Property Practice § 7.1.8 (Jerry Cohen ed., 2011) (“The first statute to provide copyright protection, enacted in 1790, protected only maps, charts, and books.  The Copyright Act of 1909 broadened available copyright protection.  This act was replaced by the Copyright Act of 1976, which took effect on January 1, 1978, and . . . is the current copyright law.”).

[16] Copyright Act of 1976, 17 U.S.C. § 102(a) (2006).  It should be noted that academic “lectures” are not included in the list of possibly copyrightable material.  This omission is not sufficient to defeat a professor’s claim of copyright, however, as the statutory list is only inclusive, not exclusive, merely providing examples of likely copyrightable works.  The idea that lecture notes may fall within the realm of copyrightable subject matter is bolstered by the fact that lecture notes are neither explicitly excluded by the administering agency as among those materials not covered by the Copyright Act.  Such excluded works include: “(a) words and short phrases such as names, titles, and slogans . . . (b) [i]deas plans, methods, systems, or devices . . . (c) [b]lank forms, such as time cards, graph paper, account books, diaries, bank checks, scorecards, address books, report forms, order forms and the like . . . (d) [w]orks consisting entirely of information that is common property containing no original authorship, such as, for example: Standard calendars, height and weight charts, tape measures and rulers, schedules of sporting events, and lists or tables taken from public documents or other common sources.”Material Not Subject to Copyright, 37 C.F.R. § 202.1 (2012); see also Stephanie L. Seeley, Are Classroom Lectures Protected by Copyright Laws? The Case for Professors’ Intellectual Property Rights, 51 Syracuse L. Rev. 163, 171 (2001) (“It seems contradictory to deny professors copyright protection in their expression of ideas conveyed through a lecture since ‘the requirements for copyright protection are minimal . . . .’”).

[17] 17 U.S.C. § 101.

[18] Fritz v. Arthur D. Little, Inc., 944 F. Supp. 95, 100 (D. Mass. 1996).

[19] Id. at 96, 100-01 (determining that “there is not a strong likelihood that plaintiffs will succeed on the merits of their copyright infringement claims”).

[20] Id. at 100 (emphasis added).

[21] Id. (quoting Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 249 (1903)) (internal quotation marks omitted).

[22] Fritz, 944 F. Supp. at 99.  It may be that this question can only be properly answered after an extensive factual inquiry to determine exactly which parts of a professor’s lecture are unique and spontaneous representations, which parts were pre-prepared presentations, and, concurrently, which parts of the students’ notes come from which parts of the professor’s lecture. See generally Bleistein, 188 U.S. at 249-50 (referring to the process of “copy[ing] a copy” versus “copy[ing] an original,” and noting that “the [first] copy is the personal reaction of an individual upon nature. . . . [p]ersonality always contains something unique. . . . [i]t expresses its singularity even in handwriting, and a very modest grade of art has in it something irreducible, which is one man’s alone”).

[23] 17 U.S.C. § 102(a) (2006).

[24] Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345 (1991) (noting that “[o]riginality does not signify novelty; a work may be original even though it closely resembles other works so long as the similarity is fortuitous, not the result of copying”).

[25] Preparing to Teach the Large Lecture Course, Univ. of Ark. Wally Cordes Teaching and Faculty Support Ctr., http://tfsc.uark.edu/118.php (“Organize the topics in a meaningful sequence.  Lurching from one topic to another makes it difficult for students to assimilate and retain the material . . . Arrange the course topics thematically, chronologically spatially, in ascending or descending order, by cause and effect or problem and solution, or according to some other conceptual rationale.”); see Barbara Gross Davis, Tools for Teaching 137 (2d ed., 2009) (explaining the importance of lecture organization).

[26] See Feist, 499 U.S. at 345 (“[I]t is beyond dispute that compilations of facts are within the subject matter of copyright.”).  Interestingly, while the originality with which a professor organizes her or his lecture speaks to the copyrightability of a certain lecture, the ingenuity and originality with which a student takes his or her notes also speaks to the extent to which the student notes are a separate, unique creation—and not just a copy—warranting copyright protection in and of themselves.

[27] Id. at 361.

[28] See id. at 355 (“The two fundamental criteria of copyright protection are originality and fixation in tangible form.”) (quoting H.R. Rep. No. 94-1476, at 51 (1976)).

[29] See generally supra note 16; 17 U.S.C. § 102(a).

[30] It is helpful when thinking about whether a lecture should be considered a work subject to the Act to look to the “Idea/Expression” doctrine.  This principle declares that only an individual’s particular “expression” of an idea is protected by copyright law, not the idea itself.  Thus, the way in which a professor presented his material would be more relevant for purposes of the Act than the mere fact that he presented the material at all.  See Eldred v. Ashcroft, 537 U.S. 186, 219 (2003) (“[Copyright law] distinguishes between ideas and expression and makes only the latter eligible for copyright protection.”).

[31] Parts of a lecture that are specifically planned out by a professor may be more likely to be considered “fixed.”  Any part of a lecture that it could be reproduced would likely meet the fixation requirement (e.g., PowerPoint presentations, sound recordings, and outlines created by the professor and then published to the class).

[32] 17 U.S.C. § 107.  Unlike the reactionary defenses discussed in the section above (e.g., lack of originality, etc.), the fair use doctrine is an affirmative defense to a claim of copyright infringement.  Id.

[33] Id. (emphasis added).

[34] Id. (emphasis added).

[35] Mirchin & Strong, supra note 15, § 7.11.1.

[36] Stewart v. Abend, 495 U.S. 207, 236 (1990) (quoting Iowa State Univ. Research Found., Inc. v. Am. Broad. Cos., 621 F.2d 57, 60 (2d Cir. 1980)).

[37] But see Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 566 (1985) (noting that “the single most important element of fair use” is the factor concerning the “Effect on the Market”).  If a court were to rely most heavily on the market-effect factor, it might find that the commercial sale of student notes does fall within the fair use exception, largely because the professor and university would likely continue to generate the same level of revenue despite the proliferation of the professor’s lecture notes among his or her students.  This rationale is discussed in more detail in paragraphs 15-17, infra.

[38] 17 U.S.C. § 107(1).

[39] Harper & Row, 471 U.S. at 566-67 (quoting M. Nimmer, Copyright §1.10[D] 1-87 (1st ed. 1984)).

[40] Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 584 (1994) (“In giving virtually dispositive weight to the commercial nature of the parody, the Court of Appeals erred.  The language of the statute makes it clear that the commercial or nonprofit education purpose of a work is only one element 
of the first factor enquiry into its purpose and character.”) (emphasis added).

[41] Id. at 586.

[42] Peter Letterese & Assocs., Inc. v. World Inst. Scientology Enters., Int’l, 533 F.3d 1287, 1312, 1319 (11th Cir. 2008) (holding that a church organization’s dissemination of a book on sales techniques to train its members for positions within the church constituted a fair use of the book).

[43] 17 U.S.C. § 107.  In this scenario, another interesting factual question that may need to be asked is not whether the actual lecture is unpublished (as most lectures are), but whether the lecture’s content has previously been published.  A particular lecture’s class material might be more protected if the professor were to discuss a topic about which she or he intends (or has begun) to publish, but has not yet disseminated.

[44] It is presumed the copying of the lecture notes is sufficiently fixed to bestow copyright protection.  Whether a particular student copies down a professor’s lecture word-for-word or merely takes notes on the general topics discussed is likely to play an important role in any such copyright infringement case.

[45] See Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 555 (1985) (“The obvious benefit to author and public alike of assuring authors the leisure to develop their ideas from fear of expropriation outweighs any short-term ‘news value’ to be gained from premature publication of the author’s expression.”).  Under that standard, a professor’s lecture may be more likely to survive a fair use defense when it includes information that the professor intends to publish at a later date to the larger academic community (e.g., a study or project on which the professor is currently working).

[46] 17 U.S.C. § 107(3).

[47] Mirchin & Strong, supra note 15, § 7.11.1(j).

[48] See Livingston & Nakano, supra note 3.

[49] 17 U.S.C. § 107(4).

[50] See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 578 (1994) (“All [four statutory factors] are to be explored, and the results weighed together, in light of the purposes of copyright.”) (citing William F. Patry & Shira Perlmutter, Fair Use Misconstrued: Profit Presumptions, and Parody, 11 Cardozo Arts & Ent. L.J. 667, 685-87 (1993)).

[51] See Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 602 (1985) (Brennan, J., dissenting).

[52] Mirchin & Strong, supra note 15, § 7.11.1(k).

[53] Id.

[54] See 17 U.S.C. § 107 (“The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.”).

[55] See id. at § 103(b) (noting that “derivative works” and compilations are encompassed within the penumbra of copyrighted works, but only regarding “the material contributed by the author of such work[s], as distinguished from the preexisting material employed in the work”).

[56] Id. at § 101 (emphasis added).

[57] Id. (emphasis added).

[58] See id.

[59] See id.

[60] Id.

[61] Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 344-45, 348 (1991) (distinguishing between “nothing but raw data—i.e., wholly factual information not accompanied by an original written expression,” which is not copyrightable, and works “possess[ing] some minimal degree of creativity,” which are protected by copyright law).

[62] See id. at 342-44.

[63] Id. at 362-63 (“We conclude that the names, towns, and telephone numbers copied by Feist were not original to Rural and therefore were not protected by the copyright in Rural’s combined white and yellow pages directory.”).

[64] See id. at 358 (“The key to the statutory definition is the second requirement. It instructs courts that, in determining whether a fact-based work is an original work of authorship, they should focus on the manner in which the collected works have been ‘selected, coordinated, and arranged.’”).

[65] Id. at 362-63.

[66] See Faulkner Press, L.L.C. v. Class Notes, L.L.C., 756 F. Supp. 2d. 1352, 1360 (N.D. Fla. 2010).

[67] See Feist, 499 U.S. at 360.

[68] The practice questions had previously been written down in the professor’s textbook, helping meet the fixation requirement.  See Faulkner Press, 756 F. Supp. 2d at 1356.

[69] See Feist, 499 U.S. at 358.

[70] See id. (“Facts are never original, so the compilation author can claim originality, if at all, only in the way the facts are presented.”).

[71] See generally 17 U.S.C. § 101 (2006) (“A ‘compilation’ is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. The term ‘compilation’ includes collective works.”) (emphasis added).

[72] See Faulkner Press, 756 F. Supp. 2d at 1357.

[73] See 17 U.S.C. §§ 101, 103.

[74] See id. at §103(a) (“[P]rotection for a work employing pre-existing material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.”); see also id. at § 106(2); Gracen v. Bradford Exch., 698 F.2d 300, 302 (7th Cir. 1983) (“[E]ven if [Defendant’s] painting and drawings had enough originality to be copyrightable as derivative works she could not copyright them unless she had authority to use copyrighted materials from the movie. ‘[P]rotection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.’”) (quoting 17 U.S.C. § 103(a)).

[75] See Seeleysupra note 16, at 187 (“Accordingly, due to the student’s lack of creativity, there is not enough originality to assert that the lecture is significantly different from the class notes . . . .”).

[76] See Gracen, 698 F.2d at 302.

[77] 17 U.S.C. §§ 103(a), 106(2).

[78] Pickett v. Prince, 207 F.3d 402, 406 (7th Cir. 2000).

[79] Id.

[80] See, e.g.The Collegiate University: Building Exceptional Faculty-Student Engagement, Wake Forest U. (Dec. 8, 2008), strategicplan.wfu.edu/whitepaper.html  (last visited Nov. 2, 2012).

[81] It should be noted that a lawsuit would be highly unlikely if the copyright holder were to provide the student with explicit permission to create a derivative work.

[82] Some schools have set explicit policies proclaiming that students do not have a copyright interest in the notes that those students take during class.  See, e.g., Course Note-Taking and Materials, Policy Statement, Univ. Cal. Berkeley (Dec. 5, 2011)available at http://campuspol.chance.berkeley.edu/policies/coursenotes.pdf (noting that instructors retain the right to prohibit students from taking notes in class and, further, stating that “[e]xcept as approved in advance by the instructor, students may not more broadly share their notes or other Class Materials. Furthermore, except as authorized . . . students may not reproduce, share, or distribute notes or other Class Materials made available by an instructor for commercial purposes or compensation”).  This is discussed in more detail in the Preemption and Analysis sections, infra Parts III & IV.

[83] See Pickett, 207 F.3d at 405 (“[O]riginality is required for a derivative work.”).

[84] Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 362 (1991) (“[O]riginality is not a stringent stand
ard; it does not require that facts be presented in an innovative or surprising way.”).

[85]  Compare Picket, 207 F.3d at 405 (expressing disbelief that the “requisite incremental originality . . . slight as it need be” could not be shown), and Feist, 499 U.S. at 345 (“Original . . . means only that the work was independently created by the author . . . and that it possesses at least some minimal degree of creativity. . . . [T]he requisite level of creativity is extremely low”), with Entm’t Research Grp. v. Genesis Creative Grp., 122 F.3d 1211, 1220 (9th Cir. 1997) (“[T]o support a copyright the original aspects of a derivative work must be more than trivial.  Second, the original aspects of a derivative work must reflect the degree to which it relies on preexisting material and must not in any way affect the scope of any copyright protection in that preexisting material.”) (citing Durham Indus., Inc. v. Tomy Corp., 630 F.2d 905, 909 (2d Cir. 1980)), cert. denied, 523 U.S. 1021 (1998) [hereinafter ERG].

[86] ERG, 122 F.3d at 1220.

[87] Id.

[88] Id. at 1214 n.2 (“For example, Pillsbury purchased ‘Pillsbury Doughboy’ costumes, Toys ‘R’ Us purchased ‘Geoffrey the Giraffe’ costumes, and Quaker Oats purchased ‘Cap’n Crunch’ costumes.”).

[89] Id. at 1224 (noting that “granting [the plaintiff costume designer] a copyright in its costumes would have the practical effect of providing ERG with a de facto monopoly on all inflatable costumes depicting the copyrighted characters”).

[90] See 17 U.S.C. §101 (2006); ERG, 122 F.3d at 1220.

[91] Copyright Act of 1976, 90 Stat. 2541 (current version codified at 17 U.S.C. § 301(a)) (emphasis added).

[92] Copyright Act of 1976, 90 Stat. 2541 (current version at 17 U.S.C. § 301(b)(1)) (emphasis added).

[93] See Trenton v. Infinity Broad. Corp., 865 F. Supp. 1416, 1427 (C.D. Cal. 1994) (noting that a California state law, which provides copyright protection for unfixed works, “steers clear of any legal or equitable rights created under federal law, and thereby avoids federal preemption under [the Act]”).

[94] Stephen Fishman, The Copyright Handbook: What Every Writer Needs to Know 112 (Ilona Bray ed., 11th ed. 2011) (“California has a law that broadly recognizes rights in unfixed original works of authorship[, while o]ther states don’t have such laws . . . .”) (citation omitted).

[95] Cal. Civ. Code § 980 (West 2012).

[96] Williams v. Weisser, 78 Cal. Rptr. 542, 543 (Ct. App. 1969).

[97] Id.

[98] Id.

[99] Id.

[100] At that time, state copyright law—if any—governed protection for unpublished works unless those works had been specifically registered with the U.S. Copyright Office.  See U.S. Copyright Office, Copyright Basics 6 (2012), available at www.copyright.gov/circs/circ01.pdf (“Under the law in effect before 1978, copyright was secured either on the date a work was published with a copyright notice or on the date of registration if the work was registered in unpublished form.”).

[101] Williams, 78 Cal. Rptr. at 550-51.

[102] Id. at 545-50.  Although the court could not address the statutory causes of action available under the Copyright Act of 1976, which did not exist at that time, its holding is consistent with the still generally accepted exception to the “Works Made for Hire” section of the Act.  The Act defines a “work made for hire” as “a work prepared by an employee within the scope of his or her employment.”  17 U.S.C. § 101 (2006).  The copyright in such works is generally considered to reside with the employer, here the University.  Id. at § 201(b).  However, courts have crafted an exception for professors because, “[a]lthough college and university teachers do academic writing as a part of their employment responsibilities and use their employer’s paper, copier, secretarial staff, and (often) computer facilities in that writing, the universal assumption and practice [is] that (in the absence of an explicit agreement as to who had the right to copyright) the right to copyright such writing belong[s] to the teacher rather than to the college or university.”  Hays v. Sony Corp. of Am., 847 F.2d 412, 416 (7th Cir. 1988) (discussing the historical teacher exception and noting that “[t]he reasons for a presumption against finding academic writings to be work made for hire are as forceful today as they ever were.”) (emphasis added), abrogated on other grounds by Cooter & Gell v. Hartmarx Corp., 496 U.S. 384 (1990).  But see Rochelle Cooper Dreyfuss, The Creative Employee and the Copyright Act of 1976, 54 U. Chi. L. Rev. 590, 599 (1987) (“The dispositive issue is whether production of scholarly material is ‘within the scope of employment,’ that is, a part of the job.  Since scholarship clearly is a factor in decisions regarding tenure, promotion, salary increases, sabbatical leaves, and reduced teaching loads, scholarly works should now belong to universities rather than to faculty members.”).

[103] Williams, 78 Cal. Rptr. at 550-51.

[104] Id. at 543.

[105] Id. (citations omitted).

[106] See id.

[107] Cal. Civ. Code § 980 (West 2012).

[108] Balt. Orioles, Inc. v. Major League Baseball Players Ass’n, 805 F.2d 663, 675 (7th Cir. 1986).

[109] See Charles P. Nash, On the Ownership of Academic Presentations: The Evolution of California Education Code Sections 66450-66452, 35 McGeorge L. Rev. 205, 218 (2004).  Nash provides a fascinating history of the proposal and eventual passing of sections 664050-52 of the California Civil Code, which prohibit the sale of students’ lecture notes, and notes that the bill was originally put forth to “curb unauthorized note taking in California.”  Id. at 206.

[110] Cal. Ed. Code § 66450 (2012).

[111] Id. (emphasis added).

[112] Perez, supra note 10.

[113]Course Note-Taking and Materials, Policy Statement, Univ. Cal. Berkeley, supra note 82, at 1.

[114] Id. at 2.

[115] Id.

[116] Fishman, supra note 94.

[117] See, e.g., Office of University Counsel, Copyright Policy of the University of North Carolina at Chapel Hill, (Jan. 1, 2009), available at http://www.unc.edu/campus/policies/copyright%20policy%2000008319.pdf.

[118] Id. at 14.

[119] See, e.g., 17 U.S.C. § 101 et seq. (2006).

[120] See, e.g., Spencer H. Hardwick, Finalsclub.org Passes Punch, The Harv. Crimson (Feb. 18, 2009), http://www.thecrimson.com/article/2009/2/18/finalscluborg-passes-punch-span-stylefont-weight-boldcorrection/ (discussing a “growing course preparatory Web site . . . which allows students to share notes, create study groups, and blog about lectures and sections,” reporting that one Harvard professor had forced a student to remove a blog concerning his course, and noting that the Harvard University Office of the General Counsel had determined that “a lecture is automatically copyrighted as long as the professor prepared some tangible expression of the content—notes, an outline, a script, a video, or audio recording”); see also Ryan Singel, Lawsuit Claim: Students’ Lecture Notes Infringe on Professor’s Copyright, WIRED (Apr. 4, 2008), http://www.wired.com/threatlevel/ 2008/04/prof-sues-note/.

[121] See Faulkner Press L.L.C. v. Class Notes L.L.C., 756 F. Supp. 2d. 1352, 1355-58 (N.D. Fla. 2010).

[122] See id. at 1356, 1359.

[123] The professor was joined in this action by the company that published his textbooks.  See id. at 1355.

[124] These te
xtbooks were required reading for the course.  See id. at 1361 n.1.

[125] Id. at 1355.

[126] Faulkner Press, 756 F. Supp. 2d at 1356.  The professor also brought claims against the note-selling company for improperly using information in the professor’s textbooks under the Digital Millennium Copyright Act. However, the Northern District of Florida determined that the act of taking notes during a professor’s class did not violate the Act.  See id. at 1359-60.

[127] Id. at 1358-59.

[128] Id. at 1359.

[129] Chegg.com Terms of Use, Notehall (last updated Oct. 22, 2012), http://www.notehall.com/index/termsofuse.

[130] Id.

[131] Faulkner Press, 756 F. Supp. 2d at 1358-59.

[132] See discussion supra Part II.A.

[133] See Williams v. Weisser, 78 Cal. Rptr. 542, 545 n.4 (Ct. App. 1969).

[134] See discussion supra Part III.A.

[135] See discussion supra Part III.B.

[136] L. Batlin & Son, Inc. v. Snyder, 536 F.2d 487, 490 (2d Cir. 1976) (“The test of originality is concededly one with a low threshold . . . .”) (citing Alfred Bell & Co. v. Catalda Fine Arts, Inc., 191 F.2d 100, 103 (2d Cir. 1951)).

[137] See 17 U.S.C. § 101 (2006).

[138] See 17 U.S.C. § 103(b); Feist Publ’n, Inc. v. Rural Tel. Co., 499 U.S. 342, 355-59 (1991) (discussing the requirements for a compilation that is copyrightable).

[139] Feist, 499 U.S. at 354 (stating that fixation and originality are the two fundamental requirements for a copyright).

[140] See Cal. Educ. Code § 66450 (West 2012).

[141] See Cal. Civ. Code § 980(a)(1) (West 2012); Cal. Educ. Code § 66450(a) (prohibiting the use of handwritten class notes for any commercial purpose).

[142] Int’l News Serv. v. Assoc. Press, 248 U.S. 215, 250 (1918) (Brandeis, J., dissenting).

[143] Id. at 231 (majority opinion).

[144] Id. at 245-46.

[145] Id. at 250 (Brandeis, J., dissenting).

[146] Id.

[147] See, e.g., Course Note-Taking and Materials, Policy Statement, Univ. Cal. Berkeley, supra note 82, at 2.

 

 

Blog: DNA Profiling: An Invaluable Tool or a 4th Amendment Violation?

By: Kevin McCann, Associate Tech Editor

While technological innovation undoubtedly makes lives easier, that is not always the case for the justices of the Supreme Court when it comes to interpreting the Constitution. From arising 1st amendment issues with the introduction of online social media to 2nd amendment debates over the development of new firearms, the Supreme Court is routinely challenged to figure out how new technology should fit into legal doctrines and constitutional provisions drafted hundreds of years ago. Next month, the Supreme Court will have to yet again determine how a technological innovation should be applied to constitutional law.

 

The Supreme Court will hear oral arguments on whether the law enforcement practice of collecting DNA samples from individuals, who are arrested for but not yet convicted of violent crimes and other felonies, violates the 4th amendment. The samples are collected through a cheek swab of the arrestee’s mouth and then compiled into a national police database. With this database, law enforcement agencies can then attempt to match the DNA of the current arrestee with DNA collected in previous unsolved crimes.

 

This action arose in Maryland, where a man named Alonzo King was arrested in 2009 on charges of assault. Due to the severity of King’s felony charges, under Maryland Statute, King was required to have a DNA swab taken. Once the DNA profile was uploaded to the database, the law enforcement agency learned that King’s DNA matched evidence from an unsolved rape in 2003. The victim in the 2003 crime was unable to identify her attacker. However, with this new DNA match, a grand jury indicted King. After trying unsuccessfully to suppress evidence of the original DNA swab from his 2009 arrest, King was convicted of the rape charges and sentenced to life in prison.

 

Prior to this case came another situation in 2004 where the Maryland Statute’s cheek swab requirement was challenged. In Maryland v. Raines, an incarcerated felon was required to submit to the DNA cheek swab test. He was also matched in the criminal database and was charged with a prior unsolved sexual assault. When he sought to suppress the DNA cheek swab, the Maryland Court of Appeals founded that as an incarcerated individual, Raines “enjoy[ed] less liberty than that of ordinary citizens”, and therefore his 4th amendment rights were not violated.

 

However, King can be distinguished from Raines because the individual seeking to suppress evidence stemming from an unreasonable search and seizure in King was not incarcerated but rather only arrested. The Supreme Court has stated that the key to analyzing whether a search is appropriate under the Fourth Amendment is to take into consideration whether an individual has a ‘reasonable expectation of privacy’ as to the focus of the search and whether the government’s interest outweighs that expectation. Therefore the question emerges as to whether an arrested individual would be reasonable to expect a higher level of privacy over an individual that is already incarcerated, and whether that higher expectation level is enough to render the DNA swab an unreasonable search under the 4th amendment. Oral Arguments will be held on February 26.

 

Additional Sources:

–          http://www.cnn.com/2012/11/09/justice/court-dna/index.html

–          http://www.scotusblog.com/?p=157481

–          http://epic.org/amicus/dna-act/maryland/

–          Maryland v. Raines, 857 A.2d 19 (Md. 2004)

Page 84 of 86

Powered by WordPress & Theme by Anders Norén