The first exclusively online law review.

Category: Article Page 6 of 8

The Compliance Case for Information Governance

Not-So-Open Access to Legal Scholarship: Balancing Stakeholder Interests with Copyright Principles

pdf_iconDownload PDF

Cite as: Christopher J. Ryan, Jr., Not-So-Open Access to Legal Scholarship: Balancing Stakeholder Interests with Copyright Principles, 20 Rich. J.L. & Tech. 1 (2013), http://jolt.richmond.edu/v20i1/article1.pdf.

 

By Christopher J. Ryan, Jr.*

 

I.  Introduction

A.  Recent Developments in the Case for Open Access to Scholarly Research

[1]        Last February, John P. Holdren, director of the White House Office of Science and Technology Policy, issued a new policy designed to increase open access to federally-financed research.[1]  The memorandum, covering federal agencies with annual expenditures in excess of $100 million for scientific research and development, requires, inter alia, that: (1) agencies develop “clear and coordinated policies” to make federally-funded studies freely available to the public within one year of publication, and (2) researchers account for and manage the digital data resulting from federally-funded scientific research.[2]  In addition, the policy requires data from publicly-funded research to be stored for “long-term preservation and [be] publicly accessible to search, retrieve, and analyze in ways that maximize the impact and accountability of the Federal research investment.”[3]  The policy also encourages agencies to collaborate with each other as well as with private entities to accomplish these important goals.[4]

[2]        This new policy marks an important step toward open access and appears to have satisfied both publishers and most open access advocates.[5]  The policy’s purpose is clear: it rests upon the proposition that citizens deserve easy access to the results of scientific research funded by their tax dollars.[6]  The Office of Science and Technology Policy has examined the issue at length by soliciting stakeholder input and convening an interagency work-group to develop a policy that would balance these often divergent interests.[7]  Among the stakeholders considered were “scientists and scientific organizations, publishers, members of Congress, and other members of the public,” all of whom recognize the importance of meeting the demand for expanded access to the results of publicly-funded research.[8]

[3]        The policy inspired congressional interest, resulting in the Fair Access to Science and Technology Research Act of 2013—bipartisan companion bills in the House and Senate.  The companion bills’ aim is to make having the results of federally-financed research publicly available within six months of publication the law of the land rather than the precedent of one presidential administration.[9]  Between the policy and the legislation, the timelines for open access after publication differ by six months.[10]  That said, the functional effect of the policy and legislation is identical: providing a temporal window in which publishers and researchers may capture the value of the publication of new studies while also allowing for public use once these economic interests have been realized.

[4]        Though both the policy and legislation explicitly cover scientific data, research, and journal articles, each course of action also has the potential to impact scholarship broadly, including federal agencies in the humanities and social sciences.[11]  Moreover, both documents specifically contemplate the significance of public digital access to all academic scholarship, without simply confining its importance to the sciences.[12]  Also, anticipating the end result of recent digital publication trends, both the policy and legislation underscore the effectiveness of digital documentation as a superior medium for storing, archiving, and transmitting data, while acknowledging the limitations of paper as a medium for the same purposes.[13]

[5]        The policy and the legislation correspond to a rising wave of broad interest in digital access to all scholarship, not simply federally-funded, scientific scholarship.  It is conceivable, then, that this regime may have opened the door to requiring open access in all academic scholarship, regardless of discipline—particularly considering that the federal government awards more than $40 billion each year to American universities for research purposes.[14]  Should the legislation or a similar statute pass into law, it would necessitate clear guidance for all academic scholarship, carefully balancing publishers’ interests with those of authors, institutions, and the public.

B.  The Open Access Movement and the Internet

[6]        The Open Access Movement promotes robust public digital access, via the Internet, to peer-reviewed scholarly work—usually free of charge.[15]  The low cost of digitally publishing and disseminating scholarship, when compared with the average cost of publishing scholarship in print, has been a significant boon to the argument for open access.[16]  Additionally, Open Access Movement advocates point to the practicality of the Internet as a more convenient, if not increasingly more popular, source for publishing, disseminating, and accessing scholarly work.[17]  After all, the expediency of immediately downloading scholarship free of charge from a centralized digital repository—not to mention from the convenience of the reader’s computer, tablet, or smart phone—objectively trumps traveling to a research library to perform a lengthy search for the desired scholarly article.[18]

[7]        But the Open Access Movement, which has itself benefitted greatly from the rise of Internet, also benefits the average user across a multitude of digital media platforms.[19] This is because public digital access to scholarship makes the public’s vast storehouse of “knowledge”—Wikipedia, which, importantly, services the search functions for much of Apple’s Siri and Google—more reliable.[20]  Although secondary and tertiary source sites and programs currently underutilize existing digital scholarly repositories,[21] there is “a potential symbiosis between Wikipedia and academic research in institutional repositories,”[22] because as open-access repositories become more comprehensive, they ensure that the highest caliber of research becomes the primary source for online bloggers, editors, and even the casual Siri query.[23]

[8]        At its core, open access, particularly public access to scholarly research, is grounded in considerations of transparency, accountability, democratic legitimacy, and the fulfillment of perhaps the most fundamental function of academia—providing educational service for the public.[24]  This Article seeks to address the varied stakeholder interests in academic scholarship—specifically legal scholarship.  In Part II, this Article presents a current picture of legal academe and explains the process by which academic scholarship is accessed.  Part III explores the scholarship incentive scheme and evolution of policy and case law defining copyright and ownership interests in scholarship, and applies these principles to the modern employment relationship between faculty member and university.  In Part IV, this Article addresses concerns that an author’s interests are hampered by the university’s ownership of copyrighted works and discusses the economic and social implications of open access to legal scholarship.  Finally, Part V endeavors to recommend considerations for model policy impacting open access to scholarship.

 

II. Academic Scholarship Today 

A.  A Snapshot of the Current State of Legal Academe 

[9]        When U.S. News & World Report began publishing law school rankings in 1987,[25] a new era of insularity, competition for new students, and fixation on standings relative to peer institutions took hold of legal academe.[26]  Pierced by a combination of “U.S. News-driven ranking mania, law schools’ insatiable hunger for growth, and huge law firms’ obsession with profit above all else,” the bubble burst.[27]  In January 2013, the Law School Admission Council reported that law school admission applications were headed for a thirty-year low, in part, because of “increased concern over soaring tuition, crushing student debt, and diminishing prospects of lucrative employment upon graduation.”[28]  The number of law school applicants this year—54,000—is nearly half of what it was in 2004.[29]

[10]      As the volume of law school applications rose in the last quarter of the twentieth century, universities increasingly treated their law schools as profit centers: while data from private law schools is virtually inaccessible, a 2010 report from the University of Baltimore School of Law corroborates a widely held view that universities appropriate between twenty and twenty-five percent of their law schools’ gross revenues.[30]  Dwindling applications and enrollment in the last few months has prompted law schools to layoff and buyout valuable employees.[31]  Many have attacked the U.S. News methodology for compiling its law school rankings as a source of fuel for the conflagration that has engulfed legal education in recent months,[32] even suggesting that faculty production of scholarship is so vital to legal academe that SSRN output should be the measure of a law school’s faculty.[33]  Whatever the cause of these problems, the landscape of legal academe—a historically immutable field[34]—is incontrovertibly changed and must adapt to the modern market to reestablish its relevancy.  Doing so requires reclaiming the primary public functions of legal academe: (1) keeping up with the needs of the profession and the public,[35] and (2) educating the profession and the public on legal affairs.[36]

B.  Access to Legal Scholarship

[11]      Academic scholarship is subject to the practices of the proprietary publishing industry, which, for both academicians and universities, places certain restrictions on scholarship: from access policies and subscription fees to the copyright assignment requirement of several scholarly journals.[37]  In the last decade, university libraries have been forced to choose between purchasing monographs and journal subscriptions, or undergoing complete deaccession of non-essential materials; in contrast, the proprietary publishing industry has continued to enjoy considerable profit margins.[38]  This is not to say the proprietary publishing industry is the villain in this story; it does, however, account for publishing the lion’s share of academic scholarship to the exclusion of resources that promote open access.[39]

[12]      The publication of American legal scholarship, on the other hand, follows somewhat of a different model from that of the other academic disciplines; it is lacking in many of the complications that are commonplace in, for example, publishing scientific scholarship.[40]  While commercial law journals,[41] learned law society journals,[42] refereed law journals,[43] and peer-reviewed law journals[44] do exist, their market share is overshadowed by law journals published by or affiliated with American law schools.[45]  Outside grants rarely fund the production of legal research; in many ways legal publishing already employs open access funding initiatives, similar to how universities encourage open access publishing of scholarship from the other academic disciplines, such as underwriting the “author pays” approach to open-access publishing,[46] and instituting policies to promote faculty contributions to open repositories or journals.[47]

[13]      Critics suggest that an open-access publishing model is unrealistic, ignores vital market factors, and is premised on a deficient understanding of business.[48]  Because open-access publishing methods are largely untested, do not enjoy the same readership, and have not as yet developed a financially viable model, these same critics caution that authors and publishers should be wary of open access publishing—after all, someone must pay the costs associated with publishing scholarship.[49]  These arguments, however, are considerably less convincing in their application to legal scholarship.

[14]      Legal scholarship presents the most straightforward case for open-access publishing because of its unique independence from market factors and reduced reliance on the commercial publishers relative to its peer academic disciplines.[50]  The cost of publishing legal scholarship in law journals is substantially underwritten by the universities with which the law schools are associated, “to an extent that dwarfs both the mailing and printing costs that make up law journals’ chief budgeted expenditures and the subscription and royalty payments that account for their chief budgeted revenues.”[51]  Furthermore, the majority of American law journals rely on unpaid law students to select and edit legal scholarship, and no one participating in the law journal publishing process—from research, writing, selecting, editing, and publication—does so because of copyright incentives.[52]  Perhaps the investment of the law students and their institutions in the production and dissemination of legal scholarship through their law journals—possibly even the very purpose of legal academe—is enhanced by open access publishing.[53]

 

III. The Misaligned Incentive Scheme in Academic Scholarship

[15]     Incentives to encourage academic scholarship in legal academe vary slightly from other disciplines.  However, across all disciples, the majority of publishers of academic scholarship charge expensive subscription fees and limit access by conditioning publication on the scholar’s transfer of copyright interests.[54]  Scholars’ willingness to transfer their copyright interests to publishers is the product of a system that lacks sufficient incentives for the scholars.[55]  In academia, the credo is, and may always be, “publish or perish;” a faculty member’s growing curriculum vitae and publication record is often the measure of his or her professional performance.[56]

[16]      Not only is a large quantity of scholarship publication an important proxy for a successful career as an academic, universities also incentivize scholars to publish in the most prestigious journals.[57]  The problem is a vicious cycle: the perceived reputation of the publication enables its publisher to require scholars to transfer their copyright interests to the publisher, and the publisher’s ownership of these interests, in turn, enables the publisher to restrict access and charge expensive fees.[58]  While duly according the importance of publication reputation, the current incentive scheme that is effectively stripping important copyrights from scholars represents a departure from the recognition of important cultural, social, and institutional dimensions of faculty-produced scholarship.[59]

[17]      When the Constitutional Convention of 1787 was convened to discuss what would become the Copyright Clause, it decided against the Hegelian option written by Charles Pinckney in favor of a clause combining proposals from both Pinckney and James Madison, which is now enshrined in Article I of our Constitution.[60]  The Copyright Clause reads: “The Congress shall have the Power . . . To promote the Progress of Science and useful Arts, by securing for limited times to Authors and Inventors the exclusive Right to their respective
Writings and Discoveries.”[61]  The plain language of the Clause’s prefatory language reveals the drafters’ aspirational intent: scholarship and invention were meant to educate and benefit the citizens of the new republic.  Recalibrating the measure of professional performance in academe in favor of incentivizing relevant, accessible publication that promotes the goodwill of the university, regardless of the source of publication, may retract the problem of self-reinforcing incentives and realign the creation of scholarship with our nation’s founding copyright principles.

A.  Legal Treatment of Ownership Interests in Scholarship

[18]      Ownership of the copyright interests in scholarship is somewhat ambiguous and is the subject of considerable debate.[62]  Under federal statute, a copyright in a work attaches first to the author of the work.[63]  Accordingly, the long-standing tradition of the academy affords scholars most, if not all, the copyright interests in their work.[64]  However, the practical application of university copyright policies circumvents the traditional rule.[65]  In fact, for the most part, universities claim ownership in the copyright interests of works created by their faculty under the “works made for hire” exception.[66]  Under the Copyright Act, absent a written and signed instrument in which the parties have expressly agreed otherwise, works made for hire are considered to be the property of the employer or person for whom the work was prepared, for purposes of copyright.[67]  The statutory hook of works made for hire contemplates the following arrangements: (1) works prepared by an employee in the scope of his or her employment, or (2) works specially ordered under one of nine statutory classifications[68] where the parties have also expressly agreed in a signed writing that the work is made for hire.[69]

[19]      Few, if any, faculty works are specially ordered or subject to a signed agreement between university and faculty member categorizing scholarship as a work made for hire; in fact, such an arrangement would be both inefficient and burdensome. Judicial guidance responsive to the question of whether faculty-created works are considered to be “prepared by an employee within the scope of his or her employment”[70] has been relatively scarce, but does provide some, albeit complicating, direction.[71] In considering this issue with regard to copyright interests, the Supreme Court’s multi-factored test in Community for Creative Non-Violence v. Reid[72] represents the standard for resolving the question of whether an employment relationship exists.[73]

[20]      The factors to be considered are: (1) the hiring party’s right to control the manner and means by which the product is accomplished; (2) the skill required; (3) the source of the instrumentalities and tools; (4) the location of the work; (5) the duration of the relationship between the parties; (6) whether the hiring party has the right to assign additional projects to the hired party; (7) the extent of the hired party’s discretion over when and how long to work; (8) the method of payment; (9) the hired party’s role in hiring and paying assistants; (10) whether the work is part of the regular business of the hiring party; (11) whether the hiring party is in business; (12) the provision of employee benefits; and (13) the tax treatment of the hired party.[74] Sealed with ambiguity, the true hallmark of a balancing test handed down from on high, the Court’s decision specifically noted that “[n]o one of these factors is determinative,” and that “the extent of control the hiring party exercises over the details of the product is not dispositive.”[75] While this balancing test only reveals the fact that copyright interests are not decisively settled, it does articulate the criteria that establishes an employment relationship between faculty members and their employer institutions, as well as the ownership of copyright interests in faculty-created works.

B.  The Application of Copyright Interests in the Modern Academic Employment Relationship

[21]      Applying the trappings of copyright law as articulated through statutes and case law discussed above, faculty members are almost certainly employees—as opposed to independent contractors—for purposes of the works made for hire doctrine. Universities tend to hire faculty members who hold terminal degrees and are thus expected to possess refined knowledge and skill in their field; however, a faculty member’s level of skill is distinguishable from that of a project-oriented, independent contractor.[76] Furthermore, the fact that a university chooses not to wield control over the manner and means of faculty-created works does not itself indicate that the university does not possess rights to control faculty creations.[77] Also, while universities serve a multitude of functions, their business is irreducibly that of education and research; thus, faculty-created works, whether manifested as scholarship, service, or teaching, form an essential part of universities’ regular activities.[78]

[22]      Despite this seemingly clear relationship, not every court has characterized the association between a university and faculty member in the same light for purposes of copyright law. Such cases predate the Community for Creative Non-Violence decision, the new authoritative precedent on the issue, but do also cite academic tradition and the fact that scholarship is the result of highly-skilled expertise and creativity as support for deciding that such faculty-created works should fall outside the scope of employment.[79] Certainly this position has its merits; however, unlike common law traditions, which occasionally become codified as the law of the land, academic traditions are nonbinding.

[23]      Finally, a faculty member’s motivations for creating a work should have little bearing on this analysis. The jurisprudence in this area only requires that the work be actuated, in some part, by a purpose to serve the university—a very low threshold to cross.[80] Self-motivation to create a work is not dispositive of whether the work was undertaken to serve, at least in part, the interests of the employer.[81] Unless a work is made “with no intention to [create the work] as a part of or incident to” employment as a university faculty member,[82] the work falls within the scope of employment.[83]  Thus, nearly all faculty-created works are: (1) made within the scope of employment; (2) of a nature for which faculty are employed to perform; and (3) actuated, at least in part, by a purpose to serve the university.[84]  There exists a strong, nearly irrefutable presumption, then, that faculty members are employees of the university for copyright purposes under the works made for hire doctrine; therefore, copyright in faculty-created works vests initially in the university.[85]

 

IV.  Concerns, Benefits, and Applications of University Copyright Interests in Faculty-Produced Scholarship

A.  Addressing the Concern That the “Monopoly” of University Copyright Interests in Scholarship Is a Fetter to Faculty Creativity and the Educational Function of the University

[24]      From academe’s inception, its uniquely creative environment has been its defining feature. Critics argue that a university’s exercise of copyright ownership over faculty-created works undermines faculty innovation by drastically altering this environment.[86]  Further, opponents of vesting the copyright interests of faculty-created work in the university argue that universities should not enforce ownership over these copyright interests at the risk of degrading long-held academic principles and traditions.[87]  Additionally, there are those with concerns that, in practice, the pecuniary interests of the institution will supplant the non-pec
uniary motivations of the faculty member.[88]  However, the current copyright regime’s treatment of ownership interests in the copyright of scholarship has neither stunted faculty creativity nor encumbered the production of scholarship. These concerns, while valid, have yet to come to fruition since the Copyright Act was revised in 1976 and construed to vest copyright interests in universities in their faculty-created scholarship.[89]

[25]      To date, attempts have been unsuccessful to circumvent the default position that the works made for hire doctrine applies to scholarship produced by faculty member employees of a university because they fail to satisfy the requirements of the Copyright Act.[90]  Though the failure of such policies may negatively impact the proprietary scholarly publishing industry, such detrimental impact on this industry also remains to be seen.[91]  It is worth noting that, despite these ownership rights vesting first in the university, in practice universities rarely enforce them as against their faculty members; to do so could diminish what is perhaps a university’s greatest asset—its goodwill.[92]  A university, not unlike other collective groups, is the sum of its parts. Thus, in place of exercising ownership rights in scholarship to the exclusion of its faculty member creator, it is in the best interest of the university, in fulfilling its educational function, to support the public’s interest in open access to scholarly works.[93]

B.  The Implications of Open Access to Legal Scholarship

[26]      Believe it or not, the seeds of change—from purely proprietary publishing to open-access publishing—have been sown at the very top of legal academe for over five years.  In 2008, the Harvard Law School faculty voted to offer their scholarship “freely available in an online repository.”[94]  Later that year, the directors of the law libraries at eleven of the most elite law schools met at Duke Law School to draft what became the Durham Statement on Open Access to Legal Scholarship.[95]  Ushering in the open access era, the Durham Statement called for all law schools to move toward electronic publication of scholarship, to commit to making available and storing electronic versions of scholarship in stable, open, digital formats, and, eventually, to stop publishing journals.[96]  The principal argument for a movement toward open access in legal academe is an easy case to make: in addition to the philosophical principles advanced by open access, on a practical level it supports a vital professional goal of the faculty members by maximizing the impact of their work.[97]  After all, what attorney does not appreciate recognition in his or her field?  Not surprisingly, “[f]ew commentators have objected to the Durham Statement’s call for open access publication of law journals.”[98]

[27]      Apart from these elite schools, however, few schools have followed suit and very few United States law reviews are registered with the Directory of Open Access Journals.[99]  That being said, a growing number of schools post some scholarship content on their publicly-accessible journal websites, despite the risks of reducing revenue from print subscriptions and royalty income from proprietary online aggregators.[100]  This small gesture may expose legal academe’s less than ostensible belief that scholarship fulfills a public good.[101]

[28]      While this Article recognizes the strong policy considerations for applying open-access principles to legal scholarship, the discussion should also be approached from an economic perspective. Perhaps legal academe has tarried in adopting open access publishing because of the absence of any demand to explore low-cost alternatives to the traditional subscription model.[102]  Legal scholarship publishing costs are modest when compared with scholarly publishing in other academic disciplines.[103]  “Law journal subscription prices are low, and have risen at less than the rate of inflation for a generation.”[104]  At the same time, law faculty members enjoy virtually free access to electronic versions of published law review articles through proprietary outlets, such as HeinOnline, Lexis, and Westlaw, all of which require subscriptions.[105]  The driving force for open access in legal publishing comes almost entirely from the perspective of supplying scholarship: law school faculty members who want to increase readership of their research outside of legal academe cannot reach this audience through HeinOnline, Lexis, and Westlaw.[106]  The latter two resources have made vast fortunes from material that is mostly in the public domain, by making it available subject to useful search functionality, but are expensive and  functionally irrelevant to academics outside legal academe.[107]  While these powerful search tools are not without value, reliance on them diminishes when law journals and their parent institutions develop resources to publicly access and archive legal scholarship—an idea with the potential to transform legal scholarship as it currently exists.[108]

 

V. A Recommendation for Ensuring Open Access to Legal Scholarship

[29]      Universities, the holders of copyright in academic scholarship, are uniquely situated to achieve their public, educational function, as well as to reduce reliance on the proprietary scholarly publishing industry, and empower faculty while promoting open access.[109]  In legal academe, many universities already underwrite the cost of submitting scholarship for publication and should extend their support one small step further by providing faculty with financial assistance to cover the associated costs of publication in open-access journals and repositories. [110]  Given that many universities, particularly research universities, are the recipients of federal funds derived from public tax dollars, it is in the universities’ best interest to reinvest some portion of these funds in relevant and publicly accessible scholarship to benefit not only the profession but also local, regional, and national communities.[111]

[30]      With these changes, academe should prioritize the development of a viable alternative method of peer review.[112]  Internally, universities must shift the focus of the existing academic incentive system, and its reliance on the proprietary publishing industry, to examine the ways in which faculty accumulate goodwill for employer institutions.[113] Open-access journals, open educational resources, and open archival repositories serve the important interests of the public that are often ignored in the context of the debate over copyright interest in academic scholarship.[114]  The language of the Copyright Clause could not be clearer in stating that creation of copyrightable works inures to the benefit of the public.[115] Academe’s support of open-access resources is essential; however, it is not necessary for academe to completely emancipate itself from proprietary publishers, many of whom serve an important role in the profession and possess their own stakeholder interests in copyright.[116]  

[31]      The reality is that proprietary scholarly publishers currently exert a disproportionate amount of control over scholarly works.[117]  Perhaps the best elements of existing solutions proffer the best foundation for the application of open access to scholarly publication. The temporal solution put forth by the White House Office of Science and Technology Policy appears to handle the interests of each stakeholder—the scholar, the institution, the publisher, and the public—most fairly.[118]  The open-access repository of faculty scholarship chartered by Harvard presents the ideal access portal and archive of publicly accessible scholarship.[119]   Finally, when compared with individual faculty members, universities have a substantially stronger bargaining position to help reclaim the broad copyright interes
ts that scholars transfer to their publishers as of right. [120]  By exercising ownership of copyright interests in scholarship, universities have the ability to profoundly influence the relevancy and public access of academic scholarship, promoting both the constitutional invocation of the Copyright Clause and the primary public function of the university—education.   

 


*CJ Ryan received an A.B. from Dartmouth College, a M.Ed. degree from the University of Notre Dame, and a J.D. degree from the University of Kentucky College of Law, where he was Notes Editor on Volume 101 of the Kentucky Law Journal.  In July 2012, Kentucky Governor Steven L. Beshear appointed CJ to serve a one-year term on the Kentucky Council on Postsecondary Education, the Commonwealth’s higher education policy and regulation board.  CJ would like to thank Professor Brian L. Frye, of the University of Kentucky College of Law, for his contributions to this article.

 

[1] See Memorandum from John P. Holdren, Director, Exec. Office of the President, Office of Sci. and Tech. Policy, to the Heads of Exec. Dep’ts and Agencies 1 (Feb. 22, 2013), available at http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf.

[2] See id. at 1-6.

[3] Id. at 3.

[4] See id. at 4.

[5] Scholarly Publishing and Academic Resources Coalition (SPARC), a leader in the open access movement, and the Association of Research Libraries “celebrated the news, calling the new policy ‘historic.’ . . . [T]he Association of American Publishers, which has often clashed with open-access advocates. . . . issued a statement calling the policy a ‘reasonable, balanced resolution.’”  Jennifer Howard, Activists and Publishers Cheer Policy on Open Access but Look to Next Battle, Chron. Higher Educ., Mar. 8, 2013, at A6; see The Fair Access to Science and Technology Research Act (FASTR), Am. Libr. Ass’n, http://www.ala.org/advocacy/access/legislation/fastr (last visited Nov. 6, 2013). For more information on SPARC, such as its Author Addendum and discussion of author rights, see SPARC Author Addendum to Publication Agreement, SPARC, www.sparc.arl.org/resources/authors/addendum-2007 (last visited Nov. 17, 2013).

[6] See Memorandum from John P. Holdren, supra note 1, at 1 (“The Administration is committed to ensuring that, to the greatest extent and with the fewest constraints possible and consistent with law and the objectives set out below, the direct results of federally funded scientific research are made available to and useful for the public, industry, and the scientific community.” ).

[7] Michael Stebbins, Expanding Public Access to the Results of Federally Funded Research, Off. Sci. & Tech. Pol’y (Feb. 22, 2013, 12:04 PM), http://www.whitehouse.gov/blog/2013/02/22/expanding-public-access-results-federally-funded-research.

[8] Id.  To wit, “over [sixty-five] thousand of [these stakeholders] recently signed a We the People petition asking for expanded public access to the results of taxpayer-funded research.”  Id.

[9] See Howard, supra note 5, at A6; see also Fair Access to Science and Technology Research Act of 2013, H.R. 708, 113th Cong. (1st Sess. 2013); Fair Access to Science and Technology Research Act of 2013, S. 350, 113th Cong. (1st Sess. 2013).  It should be noted that presenting companion bills—of any kind—in the House and Senate with bipartisan support in the 113th Congress is no small feat.

[10] Compare Memorandum from John P. Holdren, supra note 1, at 3 (“[E]ach agency plan shall . . . use a twelve-month post-publication embargo period as a guideline for making research papers publicly available . . . .”), with Fair Access to Science and Technology Research Act of 2013, H.R. 708, 113th Cong. § 4(b)(4) (1st Sess. 2013), and Fair Access to Science and Technology Research Act of 2013, S. 350, 113th Cong. (1st Sess. 2013) (“Each Federal research public access policy shall provide for . . . free online public access to such final peer-reviewed manuscripts or published versions as soon as practicable, but not later than [six] months after publication in peer-reviewed journals.”).

[11] See Howard, supra note 5, at A6 (noting that the policy may impact agencies such as the Smithsonian Institution or the National Endowment for the Humanities). 

[12] See generally H.R. 708; S. 350; Memorandum from John P. Holdren, supra note 1, at 1.

[13] See Timothy K. Armstrong, Crowdsourcing and Open Access: Collaborative Techniques for Disseminating Legal Materials and Scholarship, 26 Santa Clara Computer & High Tech. L.J. 591, 592 (2010) (“A wealth of knowledge, including legal knowledge, remains effectively trapped inside paper records, where it can be used only by those with access to the physical medium in which it is contained.  The movement to digitize paper records and make them freely available online promises to liberate information, including legal information, from these physical constraints and make it accessible around the globe.”).  For example, the Library of Congress has undertaken the digitizing of historical American documents and source texts for its American Memory Project.  See id. at 606 n.69.  In addition, the Google Books project, which aimed to increase open access to scholarship, was the recent subject of copyright litigation.  See Authors Guild v. Google, Inc., 770 F. Supp. 2d 666, 669-70 (S.D.N.Y. 2011) (denying Google’s settlement agreement with plaintiff authors and publishers who alleged copyright infringement of digitally copied books and writings without authorization).  However, with vast reserves of knowledge in print, the trouble with digitizing extant scholarship is the enormity of the task; even the most organized and well-funded efforts simply cannot make appreciable progress in this regard.  In fact, the Library of Congress estimated that, at its current pace, it would take “almost two thousand years to digitize the nine billion text records it presently holds in its collection.”  Armstrong, supra at 592-93.; see Katie Hafner, History, Digitized (and Abridged), N.Y. Times (Mar. 10, 2007), http://www.nytimes.com/2007/03/10/business/yourmoney/11archive.html?pagewanted=all&_r=0.  But see Stacey Patton, Group Advocates Option of Longer Embargoes on Digital Dissertations, Chron. Higher Educ., Aug. 2, 2013, at A9 (“The American Historical Association has published a new policy statement that ‘strongly encourages’ graduate programs and university libraries to allow new Ph.D.’s to extend embargoes on their dissertations in digital form for as many as six years.  The association says its stance seeks to balance the competing ideals of the profession: timely dissemination of new historical knowledge and the ability of young historians to choose when to release their research without jeopardizing a future publishing contract or tenure. . . . ‘History has been and remains a book-based discipline,’ the statement says, ‘and the requirement that dissertations be published online poses a tangible threat to the interest and careers of junior scholars in particular.’”).

[14] See H.R. 708; S. 350; Memorandum from John P. Holdren, supra note 1, at 3-6; see also Christine M. Matthews, Cong. Research Serv., R41895, Federal Support for Academic Research 9 (2012), available at http://www.fas.org/sgp/crs/misc/R41895.pdf; 24/7 Wall St., 10 Universities that Receive the Most Government Money, Huffington Post (Apr. 29, 2013, 3:57 PM), http://www.huffingtonp
ost.com/2013/04/27/universities-government-money_n_3165186.html.  See generally  John V. Lombardi, et al., Ctr. for Measuring U. Performance, The Top American Research Universities: 2011 Annual Report (2011), available at http://mup.asu.edu/research2011.pdf (analyzing research expenditures and different standards of achievement for universities throughout the United States).

[15] See Peter Suber, Open Access Overview, Earlham Coll., http://legacy.earlham.edu/~peters/fos/overview.htm (last visited Nov. 8, 2013) [hereinafter Open Access Overview].  This is particularly the case with a flavor of open access known as “gratis open access.”  See Peter Suber, Gratis and Libre Open Access, SPARC, http://www.sparc.arl.org/resource/gratis-and-libre-open-access (last visited Nov. 8, 2013);see also Sean Burns, et al., Lecture for the University of Kentucky Open Access Week, #Altmetrics: Demystifying the Link between Research Impact and Social Media (Oct. 22, 2013) (supporting the use of scholarly blogs and gratis open-access publications for consideration by tenure committees in academic portfolios)).  For a strong explanation and apology of the Open Access Movement by the former national president of the Association of University Professors, see Cary Nelson, Open Access and Academic Freedom, Inside Higher Ed (Nov. 15, 2013), http://www.insidehighered.com/views/2013/11/15/essay-impact-open-access-requirements-academic-freedom.

[16] See Open Access Overview, supra note 15. Primarily, the two vehicles for delivering open access to research articles to the public are open-access journals and open-access archives or repositories.  See id.; see also Burns, et al., supra note 15.

[17] See Robinson Meyer, How Open-Access Scholarship Improves the Internet, Atlantic (Aug. 5, 2013, 2:43 PM), http://www.theatlantic.com/technology/archive/2013/08/how-open-access-scholarship-improves-the-internet/278371/.

[18] See id.

[19] See id.

[20] See id.; see, e.g., Frederic Lardinois, Apple Updates Siri with Twitter, Wikipedia, Bing Integration, New Commands and Male and Female Voices, Tech Crunch (June 10, 2013), http://techcrunch.com/2013/06/10/apple-updates-siri-with-twitter-wikipedia-bing-integration-new-commands-and-male-and-female-voice/.

[21] For example, Wikipedia cites to less than one percent of any digital repository’s articles.  See Meyer, supra note 17; see also Alistair G. Smith, Wikipedia and Institutional Repositories: An Academic Symbiosis?, in Proceedings of the ISSI 2011 Conference: International Conference of the International Society for Scientometrics & Informetrics 794, 797 (2011), available at http://www.vuw.ac.nz/staff/alastair_smith/publns/SmithAG2011_ISSI_paper.pdf.

[22] Smith, supra note 21, at 800.

[23] See Meyer, supra note 17.

[24] See Armstrong, supra note 13, at 593, 597.

[25] Paul L. Caron & Rafael Gely, What Law Schools Can Learn from Billy Beane and the Oakland Athletics, 82 Tex L. Rev. 1483, 1510 (2004).  For a concise history of the U.S. News & World Report law school rankings, see id. at 1509-11.  At the time of this article’s publication, the most recent U.S. News law school rankings are available at USnews.com.  Best Law School Rankings 2014, US News, http://grad-schools.usnews.rankingsandreviews.com/best-graduate-schools/top-law-schools/law-rankings (last visited Oct. 9, 2013).

[26] See Steven J. Harper, Pop Goes the Law, Chron. Rev., Mar. 15, 2013, at B6-B7 (blaming “the bursting of the law bubble” on, among other things, “decades of greed and grandiosity[,] . . . the profession’s darker side, including the recession’s exacerbation of the attorney glut, . . . [and the fact that] law schools and the American Bar Association [] abdicated their responsibilities in . . . an effort to satisfy the mindless criteria underlying law-school rankings, especially U.S. News & World Report’s annual list”).  In reality, the decline in law schools is more nuanced, but is inextricably tied to the decline of the economy during the Great Recession and the resulting decline in demand for law jobs. 

[27] Id. at B6; see Ronald G. Ehrenberg, American Law Schools in a Time of Transition, 63 J. Legal Educ. 98, 98 (2013) (“The economic model for law schools is breaking down because of the collapse of the job market for new lawyers, making it difficult to justify ever increasing tuition levels.”); Genevieve Blake Tung, Academic Law Libraries and the Crisis in Legal Education, 105 L. Libr. J. 275, 275 (2013); Ethan Bronner, Law School Applications Fall as Costs Rise and Jobs Are Cut, N.Y. Times (Jan. 30, 2013), http://www.nytimes.com/2013/01/31/education/law-schools-applications-fall-as-costs-rise-and-jobs-are-cut.html?_r=0 (“‘We are going through a revolution in law with a time bomb on our admissions books,’ said William D. Henderson, a professor of law at Indiana University, who has written extensively on the issue.  ‘Thirty years ago if you were looking to get on the escalator to upward mobility, you went to business or law school.  Today, the law school escalator is broken.’”).

[28] Bronner, supra note 27; see also Staci Zaretsky, Law School Applications Plummet, Above the Law (Aug. 20, 2013, 11:08 AM), http://abovethelaw.com/2013/08/law-school-applications-continue-to-tumble/.  This could well be a response to the bleak marketplace for full time, permanent attorney jobs available to recent law graduates.  See Joe Palazzolo, Law Grads Face Brutal Job Market, Wall Street J. (June 25, 2012, 10:18 AM), http://online.wsj.com/news/articles/SB10001424052702304458604577486623469958142. Worse yet for the future of the legal profession, significantly less “qualified” prospective law school applicants sat for the LSAT in 2012 than did in 2011, suggesting that the wrong students—the top performers—have written off their plan to pursue a law degree. See Jordan Weissmann, The Wrong People Have Stopped Applying to Law School, Atlantic (April 10, 2012, 10:37 AM), http://www.theatlantic.com/business/archive/2012/04/the-wrong-people-have-stopped-applying-to-law-school/255685/.

[29] See id.; see also Harper, supra note 26, at B6.

[30] See Harper, supra note 26, at B7.  Perhaps, for this very reason, a respected two-year law degree—or at least an optional third year—is a pipe dream.  See Matt Barnum, The Two-Year Law Degree: A Great Idea That Will Never Come to Be, Atlantic (Nov. 12, 2013, 8:53 AM), http://www.theatlantic.com/education/archive/2013/11/the-two-year-law-degree-a-great-idea-that-will-never-come-to-be/281341/.

[31] See, e.g., David Lat, A Law School’s Possible Purge of Its Junior Faculty Ranks, Above the Law (July 1, 2013, 4:05 PM), http://abovethelaw.com/2013/07/a-law-schools-possible-purge-of-its-junior-faculty-ranks/; Debra Cassens Weiss, ‘Massive Layoffs’ Predicted in Law Schools Due to Big Drop in Applicants, A.B.A. J. (Jan. 31, 2013, 6:37 AM), http://www.abajournal.com/news/article/massive_layoffs_predicted_in_law_schools_due_to_big_drop_in_applicants; Jon Wolper, Vermont Law School Gives Buyouts to Ten Workers, Valley News (Jan. 18, 2013), http://www.vnews.com/news/3896880-95/buyouts-laid-law-members; Staci Zaretsky, Much-Maligned Law School Conducts Faculty and Staff Layoffs, Above the Law (Aug. 16, 2013, 12:09 PM), http://abovethelaw.com/2013/08/much-maligned-law-school-conducts-faculty-and-staff-layoffs/ (referencing extensive
layoffs at Thomas Jefferson School of Law).  See generally Erin Fuchs, The Law School Crisis Could Crush ‘Stand-Alone’ Schools, Bus. Insider (Jan. 31, 2013, 5:33 PM), http://www.businessinsider.com/which-law-schools-might-fail-2013-1.

[32] Professor Harper argues that “[f]lawed methodology infects each category—quality assessment, selectively, placement, and resources.”  Harper, supra note 26, at B7.  For example,

[q]uality assessment is the biggest contributor to a law school’s U.S. News ranking, accounting for [forty] percent of its total score.  The category itself is a misnomer because it doesn’t reflect quality at all.  Rather, using statistically suspect samples of scholars and practicing lawyers, it’s a superficial and unreliable assessment of a school’s reputation.

Id.  At the same time, Professors Black and Caron recognize that

legal scholars can neither cede to a news magazine the task of measuring our performance, nor pretend that the U.S. News rankings do not matter, nor simply complain about their weaknesses and hope they will improve over time.  Instead, we need to produce our own measures that capture attributes that U.S. News misses. 

Bernard S. Black & Paul L. Caron, Ranking Law Schools: Using SSRN to Measure Scholarly Performance, 81 Ind. L.J. 83, 84 (2006).  For a discussion of U.S. News’ rankings methodology, see Sam Flanigan & Robert Morse, Methodology: Best Law School Rankings, U.S. News & World Rep. (Mar. 11, 2013), http://www.usnews.com/education/best-graduate-schools/top-law-schools/articles/2013/03/11/methodology-best-law-schools-rankings.

[33] See Black & Caron, supra note 32, at 84-85 (“The methods for ranking the scholarly performance of law faculties include reputation surveys . . .[,] publication counts . . .[,] and citation counts . . . .  Each offers a useful but partial picture of faculty performance.  Our modest claim is that SSRN-based measures can offer a different, also useful, albeit also partial, picture that has its own set of limits and biases, but at the same time can address some of the deficiencies in other measures.”).  See generally Richard A. Danner et al., The Durham Statement Two Years Later: Open Access in the Law School Journal Environment, 103 Law Libr. J. 39 (2011), available at http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=2988&context=faculty_scholarship; James M. Donovan & Carol A. Watson, Citation Advantage of Open Access Legal Scholarship, 103 Law Libr. J. 553 (2011), available at http://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1026&context=law_lib_artchop.

[34] See, e.g., Laurence A. Weinstein, Moving a Battleship with Your Bare Hands: Governing a University System 4, 6 (1993) (comparing, hyperbolically, effecting change in academic institutions to “moving a battleship with your bare hands”); Neil R. Kestner, The Changing Landscape of Academics as Affected by New Communications Technology, in The Transition from Paper: Where Are We Going and How Will We Get There? (R. Stephen Berry & Anne Simon Moffat eds., 2001), available at https://www.amacad.org/content/publications/pubContent.aspx?d=562.  As an aside, I would like to include a paraphrased joke told to me by a former-state-supreme-court-justice-turned-law-school dean, who shall remain nameless: “If you took an architecture professor from fifty years ago and placed him in an architecture classroom today, he wouldn’t have the foggiest idea where he is.  However, if you took a law professor from the last century and put him at the front of a classroom today, he would be right at home lecturing on Palsgraf.”

[35] See Bronner, supra note 27.

[36] “[E]xploring whether data about papers posted on the Social Science Research Network (SSRN) can supplement existing methods for ranking law school faculties,” Professors Black and Caron believe that the result will inure to the benefit of the public as well as create a more transparent and objective picture of legal academe.  Black & Caron, supra note 32, at 84-85.

[37] Especially given that articles are submitted and peer-reviewed virtually free of charge to scholarly journals, these practices lack justification and “seem fundamentally unfair.”  Alissa Centivany, Paper Tigers: Rethinking the Relationship Between Copyright and Scholarly Publishing, 17 Mich. Telecomm. & Tech. L. Rev. 385, 385-86 (2011), available at http://www.mttlr.org/volseventeen/centivany.pdf; see also Columbia University Senate Endorses Resolution on Open Access and Scholarly Communication, Colum. U. Libr./Info. Services (Apr. 4, 2005), http://library.columbia.edu/news/libraries/2005/20050421_open_access.html (“[T]echnological, legal[,] and economic barriers continue to be erected to obstruct . . . open access  . . . .”); Jennifer Howard, U. of California Tries Just Saying No to Rising Journal Costs, Chron. Higher Educ. (June 8, 2010), http://chronicle.com/article/U-of-California-Tries-Just/65823/.

[38] See Centivany, supra note 37, at 386; Karla Hahn, ALR Statement to Scholarly Publishers on the Global Economic Crisis, Res. Libr. Issues, Feb. 2009, at 6, 6-11, available at http://publications.arl.org/n8218.pdf ; MLA Ad Hoc Comm. on Future of Scholarly Publ’g, The Future of Scholarly Publishing, in Profession 2002, at 172, 172-75 (Phyllis Franklin ed. 2002).

[39] See Centivany, supra note 37, at 411-12.

[40] See Jessica Litman, The Economics of Open Access Law Publishing, 10 Lewis & Clark L. Rev. 779, 782-83 (2006), available at http://law.lclark.edu/live/files/9593-lcb104litmanpdf.

[41] A number of proprietary legal publishers operate commercial journals, such as Thomson West’s Intellectual Property Law Review.  See generally Intellectual Property Law Review, Legal Solutions, http://legalsolutions.thomsonreuters.com/law-products/Law-Reviews-and-Journals/Intellectual-Property-Law-Review/p/100027780 (last visited Nov. 8, 2013).  Since the days of the early republic, commercial publishing of legal scholarship was a dubious business prospect. For an intriguing history of legal scholarship publication in America, see Ross E. Davies, The Original Law Journals, 12 Green Bag 2d 187, 187-90 (2009).

[42] For example, the American Bar Association, the Copyright Society of the U.S.A. and the American Intellectual Property Association also operate their own journals.  See generally ABA JOURNAL, http://www.abajournal.com (last visited Nov. 8, 2013); Copyright Soc’y U.S.A., http://www.csusa.org/?page=Journal (last visited Nov. 8, 2013); AIPLA, http://www.aipla.org/learningcenter/library/books/qj/Pages/default.aspx (last visited Nov. 8, 2013).

[43] See, e.g., Journal of College and University Law, Univ. Notre Dame http://www3.nd.edu/~jcul/ (last visited Nov. 8, 2013).

[44] See, e.g., J.L. Tech & Pol’y, http://www.illinoisjltp.com/journal/ (last visited Nov. 8, 2013); J. Phil. Sci. & L., http://www.jpsl.org (last visited Nov. 8, 2013).

[45] See LexisNexis, 2005 Directory of Law Reviews vii (Michael H. Hoffheimer comp., 2004) (listing American law schools’ law reviews).  See generally Law Journals: Submissions and Ranking, 2005-2012, Wash. & Lee U. Sch. L. Libr., http://lawlib.wlu.edu/LJ/index.aspx (last visited Nov. 8, 2013) (choose journals published in the “US”; narrow to “student-edited” journals).

[46] One such example is the Compact for Open-Access Publishing Equity, committing its signatories to un
derwrite the costs associated with “author-pays” models of open access scholarly publishing.  Compact for Open-Access Publishing Equity, OACompact.org, http://www.oacompact.org/compact/ (last visited Nov. 8, 2013).  Using this method of open-access publishing, the costs associated with publication are often paid by the author or the institution with which the author is affiliated.  See, e.g., Berkeley Research Impact Initiative: Advancing the Impact of UC Berkeley Research, U.C. Berkeley Libr., http://www.lib.berkeley.edu/brii/ (last updated Apr. 24, 2013); JH Libraries Open Access Promotion Fund, Johns Hopkins Sheridan Libr., http://guides.library.jhu.edu/content.php?pid=315747&sid=2802982 (last visited Nov. 8, 2013).

[47] Universities that have instituted such policies include Cambridge neighbors, Harvard University and the Massachusetts Institute of Technology.  See MIT Faculty Open Access Policy, Scholarly Publ’g MIT Libr., http://libraries.mit.edu/scholarly/mit-open-access/open-access-at-mit/mit-open-access-policy/ (last visited Nov. 8, 2013); Open Access Policies, Harv. U. Libr., http://osc.hul.harvard.edu/policies (last visited Nov. 8, 2013).

[48] See Litman, supra note 40, at 780 (“Nobody, [critics] insist, has yet demonstrated that open access publishing can generate profits, or even support a nonprofit periodical as a going concern.”); see also David Tempest, Open Access: Developing New Publishing Models, Editor’s Update, Elsevier (Mar. 18, 2012), http://editorsupdate.elsevier.com/issue-35-march-2012/a-focus-on-open-access-development-of-new-publishing-models/ (“Blind adherence to open-access idealism is untenable from an economic perspective, even with an all-digital publishing model.”).

[49] See Litman, supra note 40, at 782-83; see also Memorandum on Creative Commons Licenses, Ass’n Litteraire et Artistique Internationale (Jan. 22, 2006),  http://www.alai-usa.org/recent_developments.htm (follow “Memorandum from ALAI” hyperlink) (“Caveat auctor!  Let the author beware before she chooses!  A [Creative Commons] license may be appropriate and desirable for some authors, particularly academics, but, given the dangers the license poses to authors’ prospects for control over and compensation for their works, the decision to license should be made with a full appreciation of the possible consequences.”).

[50] See Dan Hunter, Walled Gardens, 62 Wash. & Lee L. Rev. 607, 623-24 (2005).  That being the case, in law schools around the country the tide is only now finally turning so that electronic sources are more widely accepted in legal writing.  See Ellie Margolis, It’s Time to Embrace the New—Untangling the Uses of Electronic Sources in Legal Writing, 23 Alb. L.J. Sci. & Tech. 191, 191-93 (2013).

[51] Litman, supra note 40, at 783.

[52] Id. (“[C]opyright is sufficiently irrelevant that legal scholars, the institutions that employ them, and the journals that publish their research tolerate considerable uncertainty about who owns the copyright to the works in question, without engaging in serious efforts to resolve it.”).

[53] See id.

[54] Centivany, supra note 37, at 387; see, e.g., Retain Certain Copyrights, U. Cal., http://osc.universityofcalifornia.edu/manage/retain_copyrights.html (last visited Nov. 8, 2013) (“Traditionally[,] . . . publishers require the transfer of the entire bundle of rights as a condition of publication.”).  As described above, some universities encourage open-access publishing with explicit policies; however, these policies often waive the requirement to the extent that it conflicts with the terms of a publisher’s copyright transfer agreement.  See, e.g., Open Access Policy Guidelines, Harv. U. Libr., http://osc.hul.harvard.edu/authors/policy_guide (last visited Nov. 8, 2013); Request a Waiver, Harv. U. Libr., http://osc.hul.harvard.edu/authors/waiver (last visited Nov. 8, 2013).

[55] See Centivany, supra note 37, at 387-88.

[56] Ushma S. Neill, Publish or Perish, But at What Cost?, 118 J. Clinical Investigation 2368 (2008); see, e.g., Diane Harley et al., Assessing the Future Landscape of Scholarly Communication: An Exploration of Faculty Values and Needs in Seven Disciplines ii (2010), available at http://escholarship.org/uc/item/0kr8s78v.pdf (“Advancement in research universities is often described as a ‘three-legged stool,’ with a ‘research’ leg that is far more important than the ‘teaching’ or ‘service’ legs. . . . The advice given to pre-tenure scholars was consistent across all fields: focus on publishing in the right venues and avoid spending too much time on public engagement, committee work, writing op-ed pieces, developing websites, blogging, and other non-traditional forms of electronic dissemination (including online course activities).”).  But cf. Jennifer Howard, Rise of ‘Altmetrics’ Revives Questions About How to Measure Impact of Research, Chron. Higher Educ., June 7, 2013, at A6 (“Adding altmetrics [a portmanteau of ‘alternative metrics’] to CVs and dossiers may not be common yet. But interest in altmetrics is growing fast, as scholars begin to realize that it’s possible to track and share evidence of online impact, and publishers and new start-up companies rush to develop altmetric services to help them document that impact.”); Jennifer Howard, New Metrics Providers Help Keep Libraries in the Research-Tracking Game, Chron. Higher Educ., June 7, 2013, at A6 (“As access to scholarly content online gets easier, librarians feel more pressure to be ‘central to the research process again,’ and altmetrics can help . . . .”).

[57] See Harley et al., supra note 56.

[58] Centivany, supra note 37, at 387-88; see also Jake New, Journal’s Editors Resign, Citing ‘Restrictive’ Authors Policy, Chron. Higher Educ., Apr. 5, 2013, at A22 (“The editor and the entire editorial board of the Journal of Library Administration have resigned in response to a conflict with the journal’s publisher over an author agreement that they say is ‘too restrictive and out of step with the expectations of authors.’”).

[59] Centivany, supra note 37, at 388 n.13 (“[S]ignificant changes to scholarly publishing will require more than a revised understanding of copyright law.”).

[60] See 1 William F. Patry, Copyright Law and Practice 22-25 (1994).

[61] U.S. Const., art. I, § 8, cl. 8.

[62] Faculty scholarship practices are far more varied and abstruse than this article (or its traditional treatment by copyright law regimes) allows.  See id.

[63] 17 U.S.C. § 201(a) (2006); cf. Cmty. for Creative Non-Violence v. Reid, 490 U.S. 730, 737 (1989) (citing 17 U.S.C. § 102) (“As a general rule, the author is the party who actually creates the work, that is, the person who translates an idea into a fixed, tangible expression entitled to copyright protection.”); Centivany, supra note 37, at 389 (“Determining authorship is typically not difficult because, in most cases, the person who creates the work is also considered the author for purposes of copyright ownership.”).

[64] See Centivany, supra note 37, at 389.

[65] Note that prior to 1976, a common law “teacher exception” existed to exempt teachers from the operation of the works for hire doctrine; however, Congress failed to codify the exception in the 1976 revisions to the Copyright Act, extinguishing the exception provided by the common law rule.  Id. at 388-89.

[66] See 17 U.S.C. § 201(b).  This statute codifies a principle first recognized by the Supreme Court of the United States in Bleistein v. Donaldson Lithographing CoSee Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 248 (1903); Craig Joyce et al., Copyright Law 272 (8th ed. 2010); see also Cmty. for Creative Non-Violence, 490 U.S. at 737 (“Classifying a work as ‘made for hire’ determines not only the initial ownership of its copyright, but also the copyright’s duration, § 302(c), and the owners’ renewal rights, §304(a), termination rights, § 203(a), and right to import certain goods bearing the copyright, § 601(b)(1).”); Centivany, supra note 37, at 389.

[67] This rule is particularly well acknowledged throughout federal court jurisprudence over the last one hundred twenty-five years.  See Cmty. for Creative Non-Violence, 490 U.S. at 737.  See generally Bleistein, 188 U.S. at 248; Gill v. United States, 160 U.S. 426 (1896); Colliery Eng’r Co. v. United Correspondence Sch. Co., 94 F. 152, 153 (C.C.S.D.N.Y. 1899); Carte v. Evans, 27 F. 861 (C.C.D. Mass. 1886) .

[68] These include works made for use as a contribution to “a collective work, as a part of a motion picture or other audiovisual work, as a translation, as a supplementary work, as a compilation, as an instructional text, as a test, as answer material for a test, or as an atlas.”  17 U.S.C. § 101 (2006).

[69] Id.; see also Centivany, supra note 37, at 389.

[70] The Restatement of Agency explicitly contemplates the employment relationship as well.  Compare Restatement (Second) of Agency § 228 (1958) with Restatement (Third) of Agency § 7.07(2)-(3) (2006).

[71] In one such case, in which the district court attempted to establish clarity regarding the issue, the legatee of a dancer—who had also been the “employee” of her eponymous dance school—sought to prove the dancer’s copyright interest in dances she helped create.  Martha Graham Sch. & Dance Found., Inc. v. Martha Graham Ctr. of Contemporary Dance, Inc., 224 F. Supp. 2d 567, 569-70 (S.D.N.Y. 2002).  The Court of Appeals for the Second Circuit, however, had other ideas.  See Martha Graham Sch. & Dance Found., Inc. v. Martha Graham Ctr. of Contemporary Dance, Inc., 380 F.3d 624, 647 (2d Cir. 2004) (affirming in part, reversing in part and vacating in part the decision—and the settling of the rule to the extent it existed—in the lower court).  Having said that, the Second Circuit did preserve an important element of works made for hire jurisprudence, concluding that Graham, the dancer, individually owned the dances she created during the first ten years of her employment, because she worked only “one-third of her professional time” and choreography was not within the scope of her employment responsibilities as Program Director.  Id. at 637-38.  However, when Graham signed a new employment contract with the Center, doing so “altered both the nature and extent of her employment from part-time dance instructor to full-time choreographer,” and thus the dances she created during this period of her employment belonged to the Center as works made for hire.  Id. at 639-41.

[72] See Cmty. for Creative Non-Violence, 490 U.S. at 751-53.  For a concise recitation of the facts of the case, see Centivany, supra note 37, at 390-91.

In that case, a non-profit organization, the Community for Creative Non-Violence (CCNV), hired James Earl Reid, to create a sculpture dramatizing the plight of the homeless . . . . CCNV provided Reid with a concept and a fairly detailed description of what they wanted, and after negotiating price and cost of materials, Reid created the sculpture. . . . [When] CCNV planned to take the statue on a tour of several cities to raise money for the homeless[,] Reid objected, arguing that the material the statue was cast in rendered it too weak to withstand CCNV’s ambitious itinerary. . . . Reid [then] refused to return the sculpture to CCNV, registered copyright for the sculpture in his name, and planned a more modest tour of his own. CCNV then sued to establish copyright ownership in the sculpture.

The central issue before the court was whether the sculpture was a work-for-hire.

Id.  Using the multi-factor test, the Court held that Reid was an independent contractor and not an employee of CCNV.  Id. at 391-92.

[73] In proposing its balancing test, the Court retreated from the “control test,” specifically holding that “employee” should not be interpreted exclusively in terms of whether the hiring party retains the right to control the product, nor in terms of whether the hiring party has actually exercised control over the creation of the work.  See Cmty. for Creative Non-Violence, 490 U.S. at 742-43.

[74] Id. at 751-52.

[75] Id. at 752.

[76] See Martha Graham Sch. & Dance Found., Inc., 224 F. Supp. 2d at 592.  A clear indicator of the existence of an employment relationship is the fact that universities typically pay their employees salaries, as well as offer employee benefits, and withhold taxes, whereas such an arrangement is uncommon in a hiring party’s relationship with an independent contractor.  Centivany, supra note 37, at 396.  In addition, the

duration of the relationship between a university and its faculty is typically for one or more academic years with the possibility of renewal, rather than being limited to a short period of time or to a project with a clearly defined scope, as is generally the case with an independent contractor.

Id. at 397. In the case of tenured faculty, renewal is the presumption.  Id. at 397 n.77.

[77] Centivany, supra note 37 at 396; see Martha Graham Sch. & Dance Found., Inc., 224 F. Supp. 2d at 592.

 [78] Centivany, supra note 37, at 397.

As part of their employment responsibilities, university faculty are generally expected to carry out duties consisting of some combination of teaching students, conducting research, and partaking in various service-orientated tasks.  Works of authorship resulting from these activities, including scholarly books and articles, course materials, and departmental committee reports, are of the kind faculty are employed to perform and thus will typically fall within the scope of employment.

Id. at 399.

[79] See Hays v. Sony Corp. of Am., 847 F.2d 412, 416 (7th Cir. 1988) (“Although [faculty members produce scholarship] as part of their employment responsibilities . . . the . . . assumption . . . was that  . . . the right to copyright such writing belonged to the [faculty member] rather than to the . . . university.”), abrogated by Cooter & Gell v. Hartmarx Corp., 496 U.S. 384 (1990); Weinstein v. Univ. of Ill., 811 F.2d 1091, 1094 (7th Cir. 1987) (“[A] professor . . . who proves a new theorem in the course of his employment will own the copyright to his article containing the proof.  This has been the academic tradition since copyright law began.”); see also Centivany, supra note 37, at 399.  It must be noted that Community for Creative Non-Violence arguably rejects the assumptions taken by the Seventh Circuit in these cases.

[80] See Centivany, supra note 37, at 400-01.

[T]he extent to which a faculty work is actuated by a purpose to serve the university depends to some degree on the category of work in question and the intent of the particular faculty member.
Some faculty members may create works that are fully actuated by a purpose to serve the university and would not have created the works but for their employment obligation. However, many faculty members may be internally motivated to conduct research, teach, or participate in service-related activities; they may even feel that they would create works associated with these activities regardless of whether it was their job to do so.

Id.

[81] See Martha Graham Sch. & Dance Found., Inc., 389 F.3d at 640 (“Graham was a self-motivator, and perhaps she would have choreographed her dances without the salary of Artistic Director, without the Center’s support and encouragement, and without the existence of the Center at all, but all that is beside the point.  The fact is that the Center did employ her to do the work, and she did the work in the course of her regular employment with the Center.”); Restatement (Second) of Agency § 236 (1958) (“Conduct may be within the scope of employment, although done in part to serve the purposes of the servant or of a third person.”).

[82] Restatement (Second) of Agency § 235 (1958).  “An act . . . is not within the scope of employment if it is done with no intention to perform it as a part of or incident to a service on account of which [the employee] is employed.”  Id.

[83] Centivany, supra note 37, at 401.

[84] Id. at 398 (citing Restatement (Second) of Agency § 228 (1958)).

[85] Id. at 401.

[86] Rochelle Cooper Dreyfuss, The Creative Employee and the Copyright Act of 1976, 54 U. Chi. L. Rev. 590, 591-92 (1987).  In her article, Professor Dreyfuss expresses a concern that the works made for hire doctrine hampers employee creativity, especially among university faculty, because of the 1976 Act’s elimination of the teacher exception.  Id.; cf. Centivany, supra note 37, at 407-08 (discussing how universities own the copyrights in faculty-created works under the works made for hire doctrine and that policies purporting to transfer these rights, either back to the faculty member or a third party, are unlikely to meet the signed writing requirement under Section 204 of the 1976 Copyright Act).  But see SPARC, Author Rights: Using the SPARC Author Addendum to Secure Your Rights as the Author of a Journal Article (2006). http://www.sparc.arl.org/sites/default/files/SPARC_AuthorRights2006_0.pdf.  “As the author of a work you are the copyright holder unless and until you transfer the copyright to someone else in a signed agreement” (original emphasis removed).  Id. at 3.  However, the ability of a university policy to establish a default position that the university owns all copyright rights in faculty created work is insufficient to meet the signed writing requirement, and this finding has been consistently applied by courts.  See, e.g., Foraste v. Brown Univ., 290 F. Supp. 2d 234, 236 (D.R.I. 2003); see also Jennifer E. Rothman, The Questionable Use of Custom in Intellectual Property, 93 Va. L. Rev. 1899, 1926 (2007).

[87] Dreyfuss, supra note 86, at 638 (“In exchange for a modest chance of pecuniary gain, the university risks fundamental alterations in the environment it creates for its student body and professional staff.”).

[88] Id. at 590-91.

[89] See Centivany, supra note 37, at 409-13 (analyzing Professor Dreyfuss’ concerns in light of over two decades of experiences and discussing the implications for the scholarly publishing industry as a whole).  “Due to its express policies, the university may be estopped from subsequently attempting to enforce its copyrights against the faculty-creator.” Id. at 411; see 4 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.07(A) (2013).  A university has a duty to act in agreement with the terms of the contracts between it and its faculty.  Restatement (Third) of Agency § 8.13 (2006).  To contravene this duty would be a serious blunder, not just legally, but perhaps more damningly, for brand and public relations of the university.

[90] See Centivany, supra note 37 at 408.

[91] See id. at 412-13.

[92] Cf. id. at 401 (noting that “while copyright initially vests in universities under work-for-hire, university policies effectively transfer those rights to the faculty-creators” (emphasis added)).

[93] See, e.g., Jennifer Howard, Open Access Gains Major Support in U. of California’s Systemwide Move, Chron. Higher Educ. (Aug. 2, 2013), http://chronicle.com/article/Open-Access-Gains-Major/140851/.

[T]he University of California’s Academic Senate has adopted an open-access policy that will make research articles freely available to the public through eSchoalrship, California’s open digital repository. . . . More than 175 universities have preceded California in endorsing open access, but the huge research footprint of the California system gives its action extra significance. . . . The new mandate ‘signals to scholarly publishers that open access, in terms defined by faculty and not by publishers, must be part of any future scholarly-publishing system,’ the statement says.

Id.

[94] Harvard Law Votes Yes on Open Access, Berkman Ctr. for Internet & Soc’y (May 7, 2008), http://cyber.law.harvard.edu/node/4273.

[95] The universities represented were: the University of Chicago, Columbia University, Cornell University, Duke University, Georgetown University, Harvard University, New York University, Northwestern University, the University of Pennsylvania, Stanford University, the University of Texas, and Yale University.  Perhaps an homage to the Declaration of Independence, the Durham Statement stored on Harvard University’s Berkman Center for Internet and Society website a list of signatories.  Durham Statement on Open Access to Legal Scholarship, Berkman Ctr. for Internet & Soc’y, http://cyber.law.harvard.edu/publications/durhamstatement (last updated Feb. 1, 2012).

[96] Id.; see Danner et al., supra note 33, at 40 (noting that the Durham Statement calls for open access publication and an end to print publication of law journals); Donovan & Watson, supra note 32, at 554 (discussing the aims of the Durham Statement).

[97] Donovan & Watson, supra note 33, at 560.

[98] Danner et al., supra note 33, at 40.  This may be because the biggest impact of the Durham Statement manifests itself as organizing principle for the future of its signatory law libraries.  See id.

[99] See DOAJ Members, Directory Open Access J., http://www.doaj.org/doaj?func=loadTempl&templ=members&uiLanguage=en (last visited Nov. 8, 2013) (listing only twenty-four libraries, universities, and research centers in the United States that are registered with the Directory).

[100] See Danner et al., supra note 33, at 41.

[101] See id. (quoting Richard Edwards & David Shulenburger, The High Cost of Scholarly Journals (And What to Do About It), CHANGE, Nov./Dec. 2003, at 10, 13.  Danner et al. go on to posit that “in the age of the Internet, a commitment to research and scholarship carries with it a responsibility to circulate one’s work as widely as possible.”  Id. (citing John Willinsky, The Access Principle xii (2005)).

[102] See Litman, supra note 40, at 791.

[103] See Paul George et al., The Future Gate to Scholarly Legal Information, AALL SPECTRUM, Apr. 2005, at 1,1, available at http://www.aallnet.org/products/pub_sp050
4/pub_sp0504_MB.pdf.

[104] Litman, supra note 40, at 791.

[105] Id.  It should be noted that legal research and scholarship require access not only to other legal scholarship, but also to primary sources of law; thus, “open access to legal scholarship must be discussed within the context of electronic access to other types of legal information.”  Danner et al., supra note 33, at 41.

[106] See Litman, supra note 40, at 791.

[107] See id. at 792.

[108] See id. at 792-93.

[109] See Centivany, supra note 37, at 388-89.

[110] Litman, supra note 40, at 793; see Centivany, supra note 37, at 414.

[111] See Memorandum from the John P. Holdren, supra note 1, at 1-3, 5, 6; George et al., supra note 103, at 2.

[112] With the advent of altmetrics, digital media is increasing a feasible source of disseminating knowledge.  Thus, the process for peer and tenure review to reflect this modern reality may already be underway.  See Howard, supra note 5, at A6; see also Leonard Cassuto, The Rise of the Mini-Monograph, Chron. Higher Educ., Aug. 16, 2013, at A31 (“Fewer advisers now imagine their graduate students’ dissertations necessarily as books in the making.  While the book still remains the absolute standard in many departments, the group that thinks that way is getting smaller.”).

[113] See Centivany, supra note 37, at 386, 413.

[114] See Donovan & Watson, supra note 33, at 558-59.

[115]  U.S. Const., art. I, § 8, cl. 8.

[116] See Litman, supra note 40, at 781-82.  In fact, the original copyright protection, the Statute of Anne, was designed to protect the interests of publishers. Act for the Encouragement of Learning, 1710, 8 Ann., c. 19 (Eng.), available at http://avalon.law.yale.edu/18th_century/anne_1710.asp.

[117] SeeLitman, supra note 40, at 784; see also Mridu Khullar Relph, In India, Academics Defend Photocopying of Textbooks for Course Packs, Chron. Higher Educ., July 15, 2013, at A15 (chronicling the legal battle by the world’s three largest academic publishers—Cambridge University Press, Oxford University Press, and Taylor & Francis—with the University of Delhi and Rameshwari Photocopying Services over the photocopying of short excerpts of books to create curricular course packs for use in university classrooms).  See generally Centivany, supra note 37 (discussing, in greater detail, the extent of the control exercised by publishers in the publication of academic scholarship in America.)

[118]  See Memorandum from John P. Holdren, supra note 1, at 2-3.

[119]  See Centivany, supra note 37, at 387 (citing Open Access Policies, supra note 47).

[120] See id. at 401.

 

Inviting Scrutiny: How Technologies Are Eroding the Attorney-Client Privilege

When Autonomous Vehicles Take over the Road: Rethinking the Expansion of the Fourth Amendment in a Technology-Driven World

Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials

pdf_iconDownload PDF

Cite as: Nicole A. Poltash, Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials, 19 Rich. J.L. & Tech. 14 (2013), available at http://jolt.richmond.edu/v19i4/article14.pdf. 

by Nicole A. Poltash*

 

I.  Introduction

[1]        The usurpation of personal pictures posted on social media websites is not uncommon.  Cheryl Smith was unknowingly made the face of a dating website.[1]  A headshot of popular blogger Sara Pinnix was used “to promote an overseas Tarot card reader named Cristal.”[2]  And eighteen-year-old Arielle Goldfinch’s pictures were used on Tagged, a website “aimed at meeting people for sexual relationships.”[3]  

[2]        Such potential for misuse is particularly unsettling in light of the fact that three hundred million photos are uploaded to Facebook every day.[4]  Yet a careful reading of Facebook’s privacy policy dispels any notion that information a person chooses to share will not be disclosed to anybody else—even if shared with only one friend.[5]  Communications can be disseminated “by the friends with whom [users] share it, or even by Facebook at its discretion.”[6]  Indeed, Facebook recently sent its users notice of a pending class action which claims that “Facebook unlawfully used the names, profile pictures, photographs, likenesses, and identities of Facebook users in the United States to advertise or sell products and services . . . without obtaining those users’ consent.”[7]

[3]        Enter Snapchat, a mobile phone application that sends self-destructing messages.[8]  The company touts: “[S]imply set the timer up to ten seconds and send.  [Recipients will] have that long to view your message and then it disappears forever.”[9]  And disappear it does.  “[T]he company deletes any videos or photos off its servers after the content has been viewed. . . . [T]he data is completely deleted and could not be recalled even if law enforcement came looking for [it].”[10]  Unsurprisingly, this has led to the use of Snapchat for sexting[11] since its launch in September 2011.[12]      

[4]        This comment explores sexting between minors and its inseparable link to Snapchat.  Part II provides background information on the practice and prevalence of sexting.  Part III explains the Snapchat application and its various uses.  Part IV discusses the implications of sexting, legal and otherwise.  Part V examines how Snapchat directly conflicts with current law.[13]  Lastly, Part VI proposes possible solutions.

 

II.  Background

[5]        Sexting has been defined as “[t]he practice of sending or posting sexually suggestive text messages and images, including nude or semi-nude photographs, via cellular phones . . . or over the Internet.”[14]  Typically, a person takes a digital photo of himself or herself and sends it via mobile phone as a text message.[15]  Children as young as twelve years old have engaged in the practice.[16]

 [6]       Between 2004 and 2009 the portion of teenagers[17] who owned cell phones increased from forty-five to seventy-five percent.[18]  Of those teens, four percent admitted to having sent a sext to another person and fifteen percent said they had received a sext of someone they know.[19]  Those figures nearly parallel the percentage of adults who have sent and received sexts,[20] and have increased significantly since 2009.[21]

[7]        A 2012 survey of over six hundred private high school students revealed that nearly twenty percent of students had sent a sext via cell phone, and nearly twice as many had received a sext.[22]  Over a third of those who had sent a sext had done so “despite believing that there could be serious consequences.”[23]  More than a quarter had forwarded a sext that they had received to others.[24]

[8]        The National Campaign to Prevent Teen and Unplanned Pregnancy sponsored a similar survey of 1,280 teenagers and young adults, which largely uncovered the same figures.[25]  Nearly twenty percent of teenagers found nothing wrong with text messages containing images of full nudity, while forty percent considered being topless acceptable.[26]  In addition, “[s]ending and posting nude or semi-nude photos or videos starts at a young age and becomes even more frequent as teens become young adults.”[27]

[9]        Sexting itself is strongly linked to sexual behavior.[28]  According to the Archives of Pediatrics and Adolescent Medicine, “[a]bout 77% of girls aged 14 to 19 who had sent a sext reported having had intercourse, compared with 42% of those who hadn’t sexted.  For boys, 82% of those who had sexted had had sex, while 46% of non-sexters had done so.”[29]  Finally, girls who sext are also more likely to engage in unsafe sex.[30] 

 

III.  Snapchat

A.  Application, Terms, and Loopholes

[10]      Snapchat was born in the spring of 2011 in a Kappa Sigma fraternity house.[31]  Stanford alum Bobby Murphy and Stanford dropout Evan Spiegel created the picture and video messaging application as a project for a product design class.[32]  The company’s description of the application, which is rated for users twelve and older, is short:

Snapchat is the fastest way to share a moment with friends.  You control how long your friends can view your message—simply set the timer up to ten seconds and send.  They’ll have that long to view your message and then it disappears forever.  We’ll let you know if they take a screenshot!  Build relationships, collect points, and view your best friends.  Snapchat is instantly fun and insanely playful.  Show your friends how clever you can be and enjoy the lightness of being![33]

[11]      Once Snapchat is downloaded from Apple’s iTunes or Google Play, a user must register a username and set a password.[34]  Snapchat then “accesses your contacts on your cell phone to load friends to the application, or you can add other friends beyond your contact list.”[35]  After two users approve each other, they can begin messaging.[36]

[12]      Pictures and videos are sent the same way: “by taking the picture or video, setting a timer from 1-10 seconds for the content to disappear after the user opens it, and sending it to another user.”[37]  Messages can be sent to one or more persons at a time.[38]  But with pictures, there are  additional options; they can be edited with captions or doodles, saved to a user’s phone, or uploaded directly to Instagram.[39]  Snapchat also tracks who each person messages, creating a “best friends” group for those messaged most,[40] with the top three people listed in order on each user’s public Snapchat profile.[41]

[13]      What makes the application so unique, however, is what happens to messages after they are viewed.  Pictures and videos sent via Snapchat are not just deleted from the recipient’s phone, but also from Snapchat’s network.[42]  “[T]he company deletes any videos or photos off of its servers after the content has been viewed. . . . [T]he data is completely deleted and could not be recalled even if law enforcement came looking for the information.”[43] 

[14]      But Snapchat does not and cannot entirely live up to this claim, giving users a false sense of security.  Indeed, the company’s privacy policy acknowledges a
s much:

Although we attempt to delete image data as soon as possible after the message is received and opened by the recipient . . . we cannot guarantee that the message contents will be deleted in every case. . . . Messages, therefore, are sent at the risk of the user.[44]          

[15]      There are additional loopholes.  For example, recipients can simply take a screenshot of the message, although this will notify the sender.[45]  Alternatively, recipients can take a picture of their phone, thereby circumventing the screenshot notification.  Even then, a more complicated approach exists.  “Snapchat saves [videos] on the phone’s local memory, which you can then recall by installing a file browser, such as iFunBox, and plugging the phone into a computer.  You then search through the file browser, copy and save the content to a computer, and you’re done.”[46]

[16]      Nevertheless, Snapchat has risen rapidly in popularity since its launch in September 2011.[47]  By the end of December 2012, the application was being used fifty million times a day,[48] up from thirty million in November and ten million in October.[49]  In 2012 alone, more than five billion messages were sent through Snapchat.[50]  In February 2013, the application “was the second-most popular free photo and video app for the iPhone . . . just behind YouTube and ahead of Instagram.”[51]  Snapchat is especially popular among individuals under twenty-five, and in December 2012 the company received eight million dollars from Benchmark Capital, the financial backer behind Instagram.[52] 

[17]      The application’s success has led other companies to copy the concept.[53]  In December 2012, for example, Facebook created the Poke app, which allows users to “send self-destructing photos, videos, and Facebook messages.”[54]  Unlike Snapchat, however, Facebook “keeps data you’ve deleted for a certain amount of time on its servers.”[55]  The new Facebook application has been largely unsuccessful, even being derided as “an obvious ripoff,” and appears to have launched Snapchat to new heights.[56]

 

 B.  Uses

[18]      Snapchat is meant to bring fun and spontaneity back into the digital world.  “People are living with this massive burden of managing a digital version of themselves,” co-founder Evan Spiegel explained.[57]  “It’s taken all of the fun out of communicating.”[58]  The application gives users a strong sense of inconsequentiality to their actions, enabling them to take “the ugliest, silliest, most compromising photos they want.”[59]  But emphasis should be placed on compromising.  The company’s deletion of messages from its servers has led to a widespread alternative use for Snapchat: sexting.[60]

[19]      Snapchat has been recognized as a sexting application since its inception.[61]  Because messages are ultimately deleted from the company’s servers, Snapchat has even been dubbed “the greatest tool for sexting since the front-facing camera.”[62]  The New York Times put it aptly: “All of this sexting . . . creates an opening for technology that might make the photos less likely to end up in wide circulation.  This is where a free and increasingly popular iPhone app called Snapchat comes in.”[63] 

[20]      Spiegel is unpersuaded, saying, “I’m not convinced that the whole sexting thing is as big as the media makes it out to be. . . . I just don’t know people who do that.  It doesn’t seem that fun when you can have real sex.”[64]  Yet the application is rated for users twelve years of age and older due, in part, to “suggestive themes” and “mild sexual content or nudity.”[65]

[21]      Proof of Snapchat’s use for sexting is found in “Snapchat Sluts,” a website featuring photos of naked women that were taken using Snapchat.[66]  The website was created in early December 2012 by party photographer Kirill Bichutsky and was “born from an open call for submissions posted on Bichutsky’s Twitter account.”[67]  All participants submitted pictures willingly and were over eighteen.[68]  The photos have since been removed, but the website clearly demonstrates that Snapchat “is being used in ways not intended by its creators.”[69]

[22]      Snapchat is also used for other improper purposes, such as for “crude drawings” and “to flaunt underage drinking.”[70]  In addition, “a growing number of teens [are] using Snapchat for cheating on tests.”[71] 

 

IV.  Implications of Sexting

A.  Legal Implications

[23]      In New York v. Ferber, the Supreme Court held that “[s]tates are entitled to greater leeway in the regulation of pornographic depictions of children.”[72]  Because the child pornography laws of most states classify a child as someone under the age of eighteen, a teenager who sexts may commit four different crimes: solicitation, production, distribution, and possession of child pornography.[73]  In effect, such laws criminalize a large fraction of American teenagers’ behavior.

[24]      The nature of sexting, however, makes “typical legal questions about the action, the actors, and the consequences difficult if not impossible to answer.”[74]  Thus state legislatures, while not ignoring the problem, have been slow to make progress.[75]  States have taken a variety of approaches to regulating teenagers who sext.[76]  Vermont, for example, created a total exception for consensual sexting between teenagers of specific ages.[77]  Vermont Senate Bill 125 amended child pornography laws to exclude persons “less than 19 years old, [when] the child is at least 13 years old, and the child knowingly and voluntarily and without threat of coercion used an electronic communication device to transmit an image of himself or herself to the person.”[78]

[25]      Other states established entirely new sex offender laws in response to sexting.  In February 2012, South Dakota criminalized a minor’s intentional creation, transmission, possession, or distribution of “any visual depiction of a minor in any condition of nudity . . . or involved in any prohibited sexual act.”[79]  With the exception of two affirmative defenses, any violation constitutes the offense of juvenile sexting, which is a class one misdemeanor.[80]

[26]      Diversionary programs are an alternative approach.  New York Assembly Bill 8131 “[d]irects the attorney general to establish a 2 year juvenile sexting and cyberbullying education demonstration program in not less than 3 counties as a diversionary program for persons under 16 who have engaged in cyberbullying or sexting, in lieu of juvenile delinquency or criminal proceedings.”[81]

[27]      Many state laws, however, do not adequately address the problem of sexting and how to punish it.  Illinois’ sexting law, for example, does not punish persons who repeatedly request sexts nor does it provide persons who receive unwanted sexts with a means to stop the sender.[82]  Further, the law fails to “go far enough to punish minors who recklessly send sext images on to unintended third parties and . . . to prevent the images from being created in the first place.”[83]  

[28]      In those states without  sexting laws, prosecutors are left to follow the laws already in place.  These laws are “mainly child pornography or obscenity laws, and some legislators have followed in turn with sex offender punishment guidelines. . . . [A] conviction . . . could result in teens being labeled sex offenders and subject to lifetime registration and reporting requirements.”[84]

[29]      Section 2256(8) of the Protection of Children Against Sexual Exploitation Act of 1977, for example, provides that child pornography “is any visual depiction of sexually explicit conduct when the visu
al depiction is a digital image, computer image, or computer-generated image of a minor engaging in sexually explicit conduct.”[85]  Although many sexts do not fall within the purview of “sexually explicit,”[86] teenagers across the United States have been charged with child pornography offenses.[87]  Such teenagers may face a difficult choice: “either mount a case-by-case ‘as applied’ challenge to a prima facie valid law (and risk decades in jail) or plead guilty to a lesser charge.”[88]

 

B.  Non-Legal Implications

[30]      Sexting also has non-legal implications, such as damaging careers and future job prospects.[89]  “According to a recent survey by Microsoft, 75 percent of U.S. recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants—including. . . photo- and video-sharing sites.”[90]  Further, “[s]eventy percent of U.S. recruiters report that they have rejected candidates because of information found online.”[91]

[31]      More importantly, the distribution of pictures and videos depicting juveniles engaged in sexual activity is “intrinsically related to the sexual abuse of children” in two notable ways.[92]  “First, the materials produced are a permanent record of the children’s participation and the harm to the child is exacerbated by their circulation.  Second, the distribution network for child pornography must be closed if the production of [such] material   . . . is to be effectively controlled.”[93]

[32]      Sexting may also lead to bullying.[94]  Eighteen-year-old Jessica Logan of Cincinnati, for example, was harassed after an ex-boyfriend forwarded nude pictures of her to other high school girls.[95]  A few months later, Logan took her own life.[96]

 

V.  Conflicts with the Law

[33]      With all the risks associated with the application’s improper use, Snapchat has added limited liability and indemnification clauses.[97]  Its limitation of liability states, in relevant part, that the company will not be held liable for any damages resulting from “the conduct of other users of the application, even if Snapchat has been advised of the possibility of such damages.  You assume total responsibility for your use of the application.”[98]

[34]      Damages aside, Snapchat itself may be illegal because it functions as a distribution network for child pornography.  The Supreme Court has held that a state’s interest in “safeguarding the physical and psychological well-being of a minor” is “compelling.”[99]  “A democratic society rests, for its continuance, upon the healthy, well-rounded growth of young people into full maturity as citizens . . . .”[100]  Accordingly, the Court has “sustained legislation aimed at protecting the physical and emotional well-being of youth even when the laws have operated in the sensitive area of constitutionally protected rights.”[101]

[35]      One concern articulated in Ferber applies directly to teen sexting: the creation of a “permanent record.”[102]  As explained in Osbourne v. Ohio, “pornography’s continued existence causes the child victims continuing harm by haunting the children in years to come.”[103]  This “haunting” presupposes underlying sexual abuse, but abuse is not required:

[P]ornography poses an even greater threat to the child victim than does sexual abuse or prostitution.  Because the child’s actions are reduced to a recording, the pornography may haunt him in future years . . . . A child who has posed for a camera must go through life knowing that the recording is [or could be] circulate[ed] . . . .[104]

[36]      Similarly, “it is the fear of exposure and the tension of keeping the act secret that seems to have the most profound emotional repercussions.”[105]  Sexting itself is also harmful to teenagers.[106]  These harms justify the suppression of self-made pornography, even if it interferes with teenagers’ interest in expressing themselves as they wish. 

[37]      In practice, however, courts treat sexting differently than traditional child pornography.  Between 2008 and 2009, for example:

nearly 3,500 cases of sexual images produced by teens came to the attention of law enforcement agencies in the U.S. . . . . Two-thirds of these cases, however, had “aggravating” factors — such as involvement of an adult or use of the images by a teen to harass, bully or intimidate the victim.  Teens were arrested in 18% of cases where there was no aggravating factor, and registration as a sex offender occurred in only 10 cases, nine of which involved actual sexual assault . . . .[107] 

Forty-five-year-old Randy T. Davis Jr., by contrast, was sentenced to almost fourteen years in federal prison for downloading traditional child pornography from the Internet. [108]

[38]      Even if sexting by minors is distinguishable from traditional child pornography,[109] it is still illegal under prima facie valid law.[110]  Snapchat’s self-destructing messages make users feel immune from repercussions.  This has encouraged and led directly to the application’s widespread use for sexting.  Thus, Snapchat is “directed to inciting or producing imminent lawless action and is likely to incite or produce such action.”[111] 

[39]      But the application adds an additional layer of complexity.  Because Snapchat deletes photos and videos from senders’ phones, recipients’ phones, and its servers,[112] there is no “permanent record of the children’s participation.”[113]  On the one hand, Snapchat functions like contraception, protecting teenagers who are going to sext regardless of the consequences.[114]  On the other hand, it is used to both distribute child pornography and destroy the evidence.

[40]      Once deleted from Snapchat’s network, messages cannot be recovered, putting them beyond the reach of any subsequent investigation.[115]  Thus, short of real-time interception by law enforcement, Snapchat’s use deprives victims of recourse, even when aggravating factors are present.[116] 

[41]      Such aggravating factors are becoming increasingly common.  One reason is trends like “revenge porn,” in which males post naked pictures of their ex-girlfriends online to websites such as PinkMeth.[117]  Again, these harms greatly outweigh the benefits of freely taking “the ugliest, silliest, most compromising photos.”[118]

 

VI.  Conclusion

[42]      All states should create educational programs for teenagers about sexting.[119]  These programs should be taught using “gist”-based reasoning because “teens who are taught to focus on potential catastrophic, negative outcomes, rather than the odds, make fewer risky [ ] decisions.”[120]  These outcomes should include, among other things, bullying and career implications.  The curriculum can be incorporated into both Family Life Education and rehabilitation programs.

[43]      In addition, applications such as Snapchat must be made less readily available to minors.  Accordingly, Snapchat should be restricted to adults age eighteen and older, and the application’s content rating should be changed on Apple’s iTunes and Google Play.  As to the former, Snapchat should implement a customer protection block until a user confirms that he or she is eighteen years of age or older.[121]  As to the latter, a changed rating will put parents on alert on the front end, decreasing the need to look through their children’s phone records to unearth red flags. 

[44]      States should also pass legislation imposing fines on minors who use Snapchat.[122]  Authorities can uncover the age and identity of many Snapchat users simply through their usernames: “[s]ince Sn
apchat presents itself as private—basically offline—many people use the same username as they use for other social media accounts. . . . [A] quick Google search of [people’s] usernames pulled their Instagram and Twitter accounts right up.”[123]  A user’s operation of the application can then be monitored in part through his or her public Snapchat profile.[124]  Over time, such fines would reduce Snapchat’s network effect and use amongst minors.[125]

[45]      Alternatively, Snapchat could be ordered to implement nudity detection software such as Snitch[126] or PORNsweeper.[127]  Such software searches files “for the color of human pigmentation in the pixels, since nude or pornographic images contain more skin pixels than other images where skin is present.”[128]  This would detect most sexts, though the software may also flag “[b]aby pictures and pictures of people on vacation at the beach . . . because they contain large amounts of skin.”[129]

[46]      Once a message is flagged as containing nudity, Snapchat can do one of three things: delete the message, pixelate the message, or forward the message to authorities.[130]  Of these three options, deletion is the most practical.[131]  Moreover, deletion would allow teenagers to continue to use Snapchat while simultaneously reducing its ability to be used for sexting.[132]

[47]      In conclusion, many legislatures are failing to keep pace with sexting amongst minors.  The legal implications are problematic, and are only compounded by applications like Snapchat.  The above steps to prevent the baring of one’s bare essentials via Snapchat are not exclusive or exhaustive.  But they are steps in the right direction.


* B.S. Commerce and B.A. German Language and Literature, University of Virginia, J.D. Candidate, University of Richmond School of Law.  I would like to thank Michael Poltash, Spencer Martin, and Tina Hoellerer for the invaluable roles they played in the publishing of this comment.

 

[1] Riva Richmond, Can You Protect Your Image While on Facebook?, N.Y. Times (July 24, 2009, 7:17 PM), http://gadgetwise.blogs.nytimes.com/2009/07/24/can-you-protect-your-image-while-on-facebook/; Lee Mathews, Facebook Sez, “Don’t Mind Us, We’re Just Whoring Out Your Photos”, Huffington Post Tech (July 16, 2009, 9:00 PM), http://downloadsquad.switched.com/2009/07/16/facebook-sez-dont-mind-us-were-just-whoring-out-your-photos?icid=sphere_blogsmith_inpage_downloadsquad.

[2] David Griner, Mom Blogger Shocked to See Her Photo in Ad for Spanish Psychic, Adweek (Nov. 12, 2012, 9:23 AM), http://www.adweek.com/adfreak/mom-blogger-shocked-see-her-photo-ad-spanish-psychic-145134.

[3] Chloe Johnson, Teen’s Pictures Stolen for Site, New Zealand Herald (Dec. 8, 2012, 5:30 AM), http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10852809.

[4] Casey Chan, What Facebook Deals with Everyday: 2.7 Billion Likes, 300 Million Photos Uploaded and 500 Terabytes of Data, Gizmodo (Aug. 22, 2012, 10:30 PM), http://gizmodo.com/5937143/what-facebook-deals-with-everyday-27-billion-likes-300-million-photos-uploaded-and-500-terabytes-of-data.

[5] Data Use Policy, Facebook (Dec. 11, 2012), http://www.facebook.com/full_data_use_policy (“[I]nformation you share on Facebook can be re-shared.  This means that if you share something on Facebook, anyone who can see it can share it with others.”).

[6] McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 Pa. Dist. & Cnty. Dec. LEXIS 270, at *7  (Pa. Cnty. Ct. 2010).

[7] Christina Warren, Facebook Starts Sending Out Notices for Sponsored Stories Settlement, Mashable (Jan. 3, 2013), http://mashable.com/2013/01/03/facebook-settlement-email/; Kashmir Hill, Yes, That Legal Notice You Got From Facebook Is Real, Yahoo Fin. (Jan. 28, 2013), http://finance.yahoo.com/news/yes–that-legal-notice-you-got-from-facebook-is-real-190343914.html.

[8] See generally Snapchat, Inc., Snapchat: Description, Google Play (Dec. 17, 2012), https://play.google.com/store/apps/details?id=com.snapchat.android.

[9] Id.

[10] Meghan Kelly, Sorry, Guys—Snapchat Videos Can be Saved (Updated), Venture Beat (Dec. 28, 2012, 7:52 AM), http://venturebeat.com/2012/12/28/save-snapchat-content/.

[11] See Nick Bilton, Disruptions: Indiscreet Photos, Glimpsed Then Gone, N.Y. Times (May 6, 2012, 5:24 PM), http://bits.blogs.nytimes.com/2012/05/06/disruptions-indiscreet-photos-glimpsed-then-gone/ (“All of this sexting . . . creates an opening for technology that might make the photos less likely to end up in wide circulation.  This is where a free and increasingly popular iPhone app called Snapchat comes in.”); see also Kate Knibbs, What’s So Special (and So Dangerous) About Snapchat, Digital Trends (Dec. 12, 2012), http://www.digitaltrends.com/mobile/whats-so-special-and-so-dangerous-about-snapchat/ (noting Snapchat is “the greatest tool for sexting since the front-facing camera”).

[12] See, e.g., J.J. Colao, Snapchat: The Biggest No-Revenue Mobile App Since Instagram, Forbes (Nov. 27, 2012), http://www.forbes.com/sites/jjcolao/2012/11/27/snapchat-the-biggest-no-revenue-mobile-app-since-instagram/.

[13] Snapchat touches many areas of law, including intellectual property, contract, tort, and constitutional law.  The scope of this Comment is limited to Snapchat’s relationship to sexting.

[14] Complaint 7, Miller v. Skumanick, 605 F. Supp. 2d 634 (M.D. Pa. 2009) (No. 3:09cv540).

[15] See id. ¶¶ 8-9.

[16] Sexting Occurring as Young as 5th Grade (CBS television broadcast Aug. 1, 2012), available at http://health.usnews.com/health-news/articles/2012/09/17/health-buzz-sexting-teens-more-likely-to-have-risky-sex.

[17] A teenager has been defined as a person between the ages of twelve and seventeen.  See Amanda Lenhart et al., Teens, Adults & Sexting: Data on Sending & Receipt of Sexually Suggestive Nude or Nearly Nude Images by American Adolescents & Adults, Pew Internet & Am. Life Project 1, 2 (Oct. 23, 2010), available at http://www.pewinternet.org/Presentations/2010/Oct/Teens-Adults-and-Sexting.aspx.

[18] Id. at 3.

[19] Id. at 6.

[20] Six percent of adults have sent a sext and fifteen percent of adults have received a sext.  Id. at 7.

[21] Cf. id. at 3.

[22] Donald Strassburg & Valoree Dowell, U Study Finds ‘Sexting’ More Common Among Teens Than You Might Think, U News Center: The U. of Utah (June 14, 2012), http://unews.utah.edu/news_releases/u-study-finds-sending-sexually-explicit-photos-by-cell-phone-more-common-among-teen-than-you-might-think/.

 

[23] Id.

[24] Id.

[25] See Cosmogirl.com & The Nat’l Campaign to Prevent Teen and Unplanned Pregnancy, Sex and Tech, Results from a Survey of Teens and Young Adults 1-2 (2008), available at http://www.thenationalcampaign.org/sextech/pdf/sextech_summary.pdf [hereinafter Cosmogirl Survey].  This survey defines a teenager and young adult as ages 13-19 and 20-26, respectively.  Id. at 1.

[26] Glenda Cooper, Sexting: A New Teen Cyber-Bullying ‘Epidemic’, The Telegraph  (Apr. 12, 2012), http://www.telegraph.co.uk/technology/facebook/9199126/Sexting-a-new-teen-cyber-bullying-epidemic.html.

[27] Cosmogirl Survey, supra note 25, at 1.

[28] Laura McMullen, Health Buzz: Sexting Teens More Likely to H
ave Risky Sex
, U.S. News & World Rep. Health (Sept. 17. 2012), http://health.usnews.com/health-news/articles/2012/09/17/health-buzz-sexting-teens-more-likely-to-have-risky-sex.

[29] Maia Szalavitz, Nearly 1 in 3 Teens Sext, Study Says. Is This Cause for Worry?, Time (July 2, 2012), http://healthland.time.com/2012/07/02/nearly-1-in-3-teens-sext-study-says-is-this-cause-for-worry/?.

[30] See id. (including unprotected sex, more sexual partners, and using drugs or alcohol before sex); see also McMullen, supra note 28. 

[31] Felix Gillette, Snapchat and the Erasable Future of Social Media, Bus. Wk. (Feb. 7, 2013), available at http://www.businessweek.com/articles/2013-02-07/snapchat-and-the-erasable-future-of-social-media.

[32] Colao, supra note 12.

[33] Snapchat Inc., supra note 8; iTunes Preview: Snapchat, Apple, https://itunes.apple.com/us/app/snapchat/id447188370?mt=8 (last visited Mar. 28, 2013).

[34] Wayne Parker, Snapchat – A Popular App for Teens but with a Dark Side, About.com, http://fatherhood.about.com/od/fathers-social-media/p/Snapchat.htm (last visited Mar. 26, 2013).

[35] Id.

[36] J.J. Colao, Snapchat Adds Video, Now Seeing 50 Million Photos a Day, Forbes (Dec. 14, 2012), available at http://www.forbes.com/sites/jjcolao/2012/12/14/snapchat-adds-video-now-seeing-50-million-photos-a-day/ (“The update introduces a new ‘friending’ process that requires users to approve each other before exchanging photos.”) .

[37] Billy Gallagher, Snapchat Releases Video Sharing, Is Prototyping Monetization Features (Oh, and It’s Still Not for Sexting), TechCrunch (Dec. 14, 2012), http://techcrunch.com/2012/12/14/snapchat-does-video/. 

[38] Joey Creighton, What Is Snapchat?, Infospace (Nov. 29, 2012), http://infospace.ischool.syr.edu/2012/11/29/what-is-snapchat/.

[39] Id.

[40] Id.

[41] Katie Notopoulos, The Snapchat Feature That Will Ruin Your Life, BuzzFeed  (Dec. 2012), http://www.buzzfeed.com/katienotopoulos/the-snapchat-feature-that-will-ruin-your-life.

[42] Kelly, supra note 10.

[43] Id; see also How Snaps Are Stored and Deleted, Snapchat (May 9, 2013, 7:23 P.M.), blog.snapchat.com (“When a snap is viewed and the timer runs out, the app notifies our servers, which in turn notify the sender that the snap has been opened.  Once we’ve been notified that a snap has been opened by all of its recipients, it is deleted from our servers.  If a snap is still unopened after 30 days, it too is deleted from our servers.”).

[44] Privacy Policy, Snapchat, http://www.snapchat.com/privacy (last updated Feb. 20, 2013).

[45] Id.

[46] Kelly, supra note 10 (“A hole in its iPhone version . . . lets you grab video content before it’s viewed.”); see also Katie Notopoulos, How Anybody Can Secretly Save Your Snapchat Videos Forever, BuzzFeed (Dec. 27, 2012, 6:22 PM), http://www.buzzfeed.com/katienotopoulos/how-anybody-can-secretly-save-your-snapchat-videos (providing the exact steps on how to save Snapchat videos).

[47] Colao, supra note 12.

[48] Our Biggest Update Yet: v4.0 Phantom!, Snapchat (Dec. 14, 2012: 12:54 PM), blog.snapchat.com/post/37898594536/our-biggest-update-yet-v4-0-phantom; Laurie Segall, Snapchat’s ‘Disappearing’ Videos Don’t Actually Vanish, CNN Money (Dec. 28, 2012, 3:27 PM),  http://money.cnn.com/2012/12/28/technology/security/snapchat-security-flaw/index.html.

[49] Colao, supra note 12.

[50] Willard Foxton, Revenge Porn and Snapchat: How Young Women Are Being Lured into Sharing Naked Photos and Videos With Strangers, The Telegraph (Feb. 13, 2013), http://blogs.telegraph.co.uk/technology/willardfoxton2/100008808/revenge-porn-and-snapchat-how-young-women-are-being-lured-into-sharing-naked-photos-and-videos-with-strangers/.

[51] Gillette, supra note 31.

[52] Knibbs, supra note 11.

[53] Jared Keller, Facebook’s Poke Is a Wild Success—for Rival Snapchat, Bus. Wk. (Dec. 28, 2012), available at http://www.businessweek.com/articles/2012-12-28/facebooks-poke-is-a-wild-success-for-rival-snapchat.

[54] Id.

[55] Meghan Kelly, This Snapchat Video Will Destruct in 5… 4… 3… 2… Haha Took a Screenshot, VentureBeat (Dec. 14, 2012, 2:53 PM), http://venturebeat.com/2012/12/14/snapchat-video/.

[56] Keller, supra note 53.

[57] Colao, supra note 12.

[58] Id.

[59] Id.

[60] See generally Billy Gallagher, No, Snapchat Isn’t About Sexting, Says Co-Founder Evan Spiegel, Tech Crunch (May 12, 2012), http://techcrunch.com/2012/05/12/snapchat-not-sexting/.

[61] See, e.g., Kashmir Hill, ‘This Sext Message Will Self Destruct in Five Seconds, Forbes (May 7, 2012, 12:51 PM), http://www.forbes.com/sites/kashmirhill/2012/05/07/

fantastic-theres-a-quick-erase-app-for-sending-your-nude-photos/; Katie Heaney, Snapchat Adding Video To Allow Longer Sexts, BuzzFeed (Dec. 14, 2012, 12:54 PM), http://www.buzzfeed.com/katieheaney/snapchat-adding-video-to-allow-longer-sexts.

[62] Knibbs, supra note 11.

[63] See, e.g., Bilton, supra note 11.

[64] Gallagher, supra note 60 (internal citations omitted).

[65] iTunes Preview: Snapchat, Apple, https://itunes.apple.com/us/app/snapchat/id447188370?mt=8 (last visited Mar. 28, 2013).

[66] See Max Read, ‘Snapchat Sluts’ Shows Why Snapchat Isn’t the Consequence-Free Sexting App We’d All Hoped For, Gawker (Dec. 10, 2012, 6:30PM), http://gawker.com/5967303/snap

chat-sluts-shows-why-snapchat-isnt-the-consequence+free-sexting-app-wed-all-hoped-for (describing Snapchat as “a new way for teens to send each other nudes”); Andrew Couts, Terms & Conditions: Snapchat’s Privacy Policy Has Too Many Secrets, Digital Trends (Dec. 16, 2012), http://www.digitaltrends.com/mobile/terms-conditions-snapchat/.

[67] ‘Snapchat Sluts’ Hit the Internet on New Website, The Inquisitr (Dec. 11, 2012), http://www.inquisitr.com/433154/snapchat-sluts-hit-the-internet-on-new-website/.

[68] Id.

[69] Id.; see also Couts, supra note 66.

[70] Grace Jensen, Snapchat Screenshots Reveal Teens Acting Like Teens, BuzzFeed (Dec. 3, 2012, 5:02PM), http://www.buzzfeed.com/googlegracie/snapchat-screenshots-reveal-teens-acting-like-teen-7d2i.

[71] Snapchat: Online Photos that Self-Destruct, Your Teen for Parents (Mar. 25, 2013), http://yourteenmag.com/2013/snapchat-teens-photos/ (“Students quickly take pictures of their test answers and snapchat it to other students in the class.”).  On the extreme end, Snapchat could also be used in the commission of crimes and terrorism.

[72] 458 U.S. 747, 756 (1982).

[73] Carrie L. M. Thompson, Let’s Talk About Sext: Illinois’ Legislative Response to Sexting, 24 DCBA Brief 22, 22-23 (2011); see, e.g., Child Pornography, 720 Ill. Comp. Stat. 5/11-20.1(a) (2009).

[74] Thompson, supra note 73, at 23.

[75] Cf. 2012 Sexting Legislation, Nat’l Conf. of St. Legislatures (Dec. 14, 2012), http://ncsl.org/issues-research/telecom/sexting-legislation-2012.aspx.

[76] See generally id.

[77] S. 125, 2009 Leg., Reg. Sess. (Vt. 2009), available at http://www.leg.state.vt.us/docs/2010/Acts/ACT058.pdf.

[78] Id.

[79] S. 183, 2012 Leg., 87th Sess. (S.D. 2012), available at http://legis.state.sd.us/sessions/2012/Bill.aspx?File=SB183P.htm.

[80] Id.  (“It is an affirmative defense to the offense of juvenile sexting that the minor has not solicited the visual depiction, that the minor does not subsequently distribute, present, transmit, post, print, disseminate, or exchange the visual depiction, and that the minor deletes or destroys the visual depiction upon receipt.  It is an affirmative defense . . . that the visual depiction is of a single minor, created by that minor, who does not subsequently distribute, present, transmit, post, print, disseminate, or exchange the visual depiction.”).

[81] See Assemb. B. No. A08131, 2011 Leg., Reg. Sess. (N.Y. 2012), available at http://assembly.state.ny.us/leg/?default_fld=&bn=A08131&term=2011&Summary=Y&Text=Y.

[82] See Thompson, supra note 73, at 25.

[83] Id.

[84] Id. at 22-23.

[85] Isaac A. McBeth, Prosecute the Cheerleader, Save the World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through “Sexting”, 44 U. Rich. L. Rev. 1327, 1330 (2012).

[86] “Sexually explicit conduct includes (1) all forms of sexual intercourse (including oral or anal) where the genitals, breasts, or pubic area of any person is exhibited; (2) bestiality; (3) masturbation; (4) sadistic or masochistic abuse; and (5) lascivious exhibition of the genitals or pubic area.”  Id.

[87] See, e.g., John A. Humbach, ‘Sexting’ and the First Amendment, 37 Hastings Const. L.Q. 433, 433-35 (2010) (“Two Florida teenagers took over one hundred photographs of themselves engaging in unspecified but lawful ‘sexual behavior.’  The two were subsequently charged with ‘promoting a sexual performance of a child,’ a second degree felony under Florida law . . . . In Ohio, a fifteen-year-old girl used her cell phone to send nude photos of herself and was charged with ‘illegal use of a minor in nudity-oriented material.’ . . . Factual situations like these are not isolated.”).

[88] Id. at 451.

[89] See Jeffrey Rosen, The Web Means the Ending of Forgetting, N.Y. Times (July 21, 2010), http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all&_r=0.

[90] Id.

[91] Id.

[92] New York v. Ferber, 458 U.S. 747, 759 (1982).

[93] Id.

[94] See Cooper, supra note 26.

 [95] Mike Celizic, Her Teen Committed Suicide Over ‘Sexting’, Today (Mar. 6, 2009, 9:26 AM), http://today.msnbc.msn.com/id/29546030/ns/today-parenting_and_family/t/her-teen-committed-suicide-over-sexting/#.UN8jHInjn_V; Phuong Ly, The Lowdown on Sexting, GreatSchools, http://www.greatschools.org/parenting/behavior-discipline/2079-sexting.gs (last visited June 3, 2013).

[96] Id.

[97] See Terms of Use, snapchat, www.snapchat.com/# (last updated Feb. 20, 2013) (under the “Terms” tab).

[98] Id.

[99] Globe Newspaper Co. v. Superior Court, 457 U.S. 596, 607 (1982).

[100] Prince v. Massachusetts, 321 U.S. 158, 168 (1944).

[101] New York v. Ferber, 458 U.S. 747, 757 (1982) (denying child pornography films constitutional protection); see also FCC v. Pacifica Found., 438 U.S. 726, 749-50 (1978) (holding that the government’s interest in the youths’ well-being justified special treatment of indecent broadcasting received by both adults and children); Prince, 321 U.S. at 167-70 (holding valid a statute prohibiting the use of a child to distribute literature on the street despite its effect on a First Amendment activity).

[102] 458 U.S. at 759; see also Ashcroft v. Free Speech Coal., 535 U.S. 234, 249 (2002).

[103] 495 U.S. 103, 111 (1990).

[104] Ferber, 458 U.S. at 759 n.10 (quoting David P. Shouvlin, Preventing the Sexual Exploitation of Children: A Model Act, 17 Wake Forest L. Rev. 535, 545 (1981)).

[105] Ulrich C. Schoettle, Child Exploitation: A Study of Child Pornography, 19 J. Am. Acad. Child Psychiatry 289, 292 (1980)).

[106] See supra Part IV.B.

[107] Szalavitz, supra note 29.

[108] Man Gets Nearly 14 Years for Downloading Child Porn, Journal Star (Jan. 10, 2013, 9:30 PM), http://www.pjstar.com/news/x1671799911/Man-gets-nearly-14-years-for-downloading-child-porn.

[109] See Szalavitz, supra note 29 (“In an adolescent period characterized by identity development and formation, sexting should not be considered equivalent to childhood sexual assault, molestation and date rape.”).  See generally, Humbach, supra note 87 (arguing that sexting and autopornography should not be categorically excluded from First Amendment protection).

[110] See, e.g., Child Pornography, 720 Ill. Comp. Stat. 5/11-20.1(a) (2009);

S. 125, 2009 Leg., Reg. Sess. (Vt. 2009), available at http://www.leg.state.vt.us/docs/2010/Acts/ACT058.pdf.  As noted previously, sexting may induce four different crimes: solicitation, production, distribution, and possession of child pornography. 

[111] Ashcroft v. Free Speech Coal., 535 U.S. 234, 253 (2002) (citing Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (per curiam)).

[112] Kelly, supra note 10.

[113] New York v. Ferber, 458 U.S. 747, 759 (1982).

[114] See Nicholas Carlson, Sexting with Snapchat, Teenagers Prove They Aren’t as Dumb as We Thought, Bus. Insider (Dec. 31, 2012, 8:25 AM), http://www.businessinsider.com/sexting-with-snapchat-teenagers-prove-they-arent-as-dumb-as-we-thought-2012-12.

[115] Kelly, supra note 10.

[116] Szalavitz, supra note 29.  This is also true in cases involving an adult who sexually exploits a minor.  For example, someone can set up a group to which persons subscribe via their Snapchat username.  These users are then sent multiple, short child pornography videos. 

[117] Foxton, supra note 50 (“[H]osted in the US, [sites like PinkMeth] are protected by laws which state that companies cannot be prosecuted for user-generated content. Only the (usually anonymous) individual who posted the pictures can be fined.  So, if the woman wanted her pictures removed from the site, she would have to work out who shared her pictures, then prosecute them. The site owners won’t lift a finger—and they are making millions of dollars from young women’s pain.”).

[118] Colao, supra note 12.

[119] The primary purpose of this comment is to draw attention to the legal issues Snapchat poses.  This section introduces possible solutions to the sexting problem, but is not intended to be exclusive or exhaustive.

[120] Maia Szalavitz , Why the Teen Brain Is Drawn to Risk, Time (Oct. 2, 2012), http://healthland.time.com/2012/10/02/why-the-teen-brain-is-drawn-to-risk/.

[121] Practically speaking, a customer protection block is unlikely to have a great impact on restricting Snapchat’s use by minors.

[122] The fines should be significant enough to act as a deterrent, but not so substantial that parents must come to their child’s assistance in paying them (i.e., minors will pay the fines using their own money).  

[123] Notopoulos,
supra
note 41.

[124] This also eliminates the need for real-time interception and monitoring of the messages.

[125] Network Effect, Investopedia, http://www.investopedia.com/terms/n/network-effect.asp#axzz2IHv0IokI (last visited Mar. 29, 2013) (network effect is “a phenomenon whereby a good or service becomes more valuable when more people use it”).

[126] Snitch, Hyperdyne Software, http://www.hyperdynesoftware.com (last visited Mar. 20, 2013).

[127] Software Blocks Nudity: Content Technologies’ Software Detects Nude Photos on E-Mails, Blocks E-Mails, CNN Money (Sept. 20, 2000, 12:41 PM), http://money.cnn.com/2000/09/20/technology/porn_sweep/.

[128] Id.

[129] Id.

[130] Only one of the alternatives should be implemented, and once implemented should be automatic. 

[131] Notifying authorities would have the most profound impact, but also carries the risk of tying up valuable executive and judicial resources.  Pixilation is similar to deletion, but pixilated messages may still possess an allure similar to sexts.

[132] The implementing of nudity detection software would interfere with adults’ right to use Snapchat for sexting, but this comment does not address that issue.

No Implied Effect: The “Safe” FCC Cell Phone Radiation Standard and Tort Immunity by Implied Conflict Preemption

Information Governance: It's a Duty and It's Smart Business

Databases Lie! Successfully Managing Structured Data, the Oft-Overlooked ESI

pdf_iconDownload PDF

Cite as: Conrad Jacoby, Jim Vint & Michael Simon, Databases Lie! Successfully Managing Structured Data, The Oft-Overlooked ESI, 19 RICH. J.L. & TECH 9 (2013), available at http://jolt.richmond.edu/v19i3/article9.pdf.

 

By Conrad Jacoby,* Jim Vint,** & Michael Simon***

 

[1]        Legal professionals regularly advise clients to ensure that the storage, retention, and accessibility of their Electronically-Stored Information (“ESI”) is in full compliance with all legal and regulatory requirements in the event this information becomes relevant in civil, criminal, or regulatory disputes.  However, what many practitioners may not realize is that the ESI that clients are required to produce for e-discovery includes both “unstructured” and “structured” data.  Searching and producing only one of these types of ESI may well not fully satisfy a client’s full discovery obligations.  Even worse, it might not present a full understanding of the factual issues in the matter and how to best prove them to the legal team.

 

I.  What Is “Structured Data?”

[2]        Most legal professionals are extremely familiar with “unstructured” or “loose” data, even if they do not necessarily know it by these terms.  Simply put, unstructured data refers to e-mail messages, word processing documents, spreadsheets, and presentations, among other things—in other words, human-readable information that is commonly sought as potentially relevant ESI in discovery.[1]  Structured data, on the other hand, refers to information residing in electronic repositories or silos, such as transactional and financial databases.[2]  Unlike unstructured data, which typically exists as static and self-contained files that are preserved, collected, processed, reviewed, authenticated, and admitted into evidence as stand alone documents, structured data exists as segments of information inside a larger system, one that is often quite complex and contains many parts.[3]  A database record, the closest analog that structured data has to a “document,” may not actually exist until a user performs some action through the database system to assemble a number of separate fields that could reside in many different parts of the system.  For this reason, information stored in a database cannot be placed into a standard e-discovery review system that has been optimized to view and categorize unstructured data.

[3]        The ESI stored in databases and other structured data repositories is every bit as relevant and discoverable as the loose files that are more commonly requested.  Federal Rule of Civil Procedure (“FRCP”) 34 is clear and unambiguous on this point:

Rule 34.  Producing Documents, Electronically Stored Information, and Tangible Things, or Entering onto Land, for Inspection and Other Purposes

(a) In General.  A party may serve on any other party a request within the scope of Rule 26(b):

(1) to produce and permit the requesting party or its representative to inspect, copy, test, or sample the following items in the responding party’s possession, custody, or control:

(A) any designated documents or electronically stored information—including writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations—stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form[.][4]

[4]        Unlike the discovery of unstructured data, for which a number of best practices have emerged, it has been difficult for the legal industry to develop best practices for the treatment of structured data in civil discovery due to the vast diversity of size, scope, and features found in different database systems.  The Sedona Conference®, a non-partisan legal think-tank founded in 1997, formed a group in early 2009 to study the issues surrounding the discovery of structured data—culminating in the publication of The Sedona Conference® Database Principles Addressing the Preservation and Production of Databases and Database Information in Civil Litigation (hereinafter the “Sedona Database Principles”) in April 2011.[5]  The Sedona Database Principles expand upon the original publication, The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production (hereinafter the “Sedona Principles”),[6] as they specifically apply to databases and set out six additional precepts that provide practical suggestions for simplifying the discovery of structured data and clarifying the obligations of both the requesting and producing parties.[7]  An overarching theme of the Sedona Database Principles is that better communication between parties, their legal advisors and agents, and information technology professionals will substantially improve the management of this type of specialized ESI in legal disputes.[8]  To that end, the Sedona Database Principles specifically reference many of the precepts of the Sedona Principles that address and encourage cooperation between the parties.[9]

 

II.  How Does Structured Data Become Relevant?

[5]        Databases frequently record historical transactions and information that is relevant in litigation and investigations.  One would certainly expect that enterprise-level systems like Oracle and SAP, not to mention financial and transactional systems, human resource tracking systems, data warehouses, and content management systems (“CRM”), would all contain structured data.  However, other commonly used systems, including Cloud-based “Software-As-A-Service” (“SaaS”) systems, also feature the same back-end structured data systems as more obvious “database” systems.  Thus, structured data has largely replaced loose documents for tracking information for these and other similar functions: accident/incident reporting systems, call center records and associated data analytics, world wide web servers, point of sale systems, and social media.

[6]        The cumulative volume of data in business-related structured data repositories is immense and is projected to grow at an estimated annual rate of nearly twenty percent.[10]  Perhaps even more important to e-discovery practitioners, a recent survey about the state of discovery in civil litigation has shown that e-mail, the central focus of e-discovery requests for over fifteen years, is no longer the leading requested item.[11]  Instead, database and application data are now more often requested.[12]

[7]        An increasing number of litigation disputes involving “high profile” companies have made demands upon litigants to review, disclose, and produce at least portions of their databases.  Several examples are explored below.

[8]        The plaintiffs in In re eBay Seller Antitrust Litigation, an antitrust class action, sought production of transactional data from defendant eBay.[13]  The court granted the motion in part and eBay objected, claiming that the information sought did not already exist in easily compiled form, requiring eBay “to spend hundreds of thousands of dollars to dedicate a highly specialized engineering resource for a period of more than six months to create new data
” solely for the matter.[14]  However, eBay’s own submissions in support of the objection contained three different estimates, ranging from a low of $179,000 to a high of $300,000.[15]  Moreover, eBay’s employee in charge of data warehouse development declared that the provided estimate could vary “by as much as five hundred percent.”[16]  The court first disposed of eBay’s argument that it could not be required to create anything new, finding that FRCP 34(a)(1)(A) supported the magistrate’s finding that the technical burden of creating the new material did not excuse production.[17]  In light of the hundreds of millions of dollars at stake in the action involving a defendant with billions of dollars in annual gross profits, and considering that the magistrate had already scaled back the scope of discovery, the court found no clear error in the magistrate’s determination that the potential costs and technical requirements were not unduly burdensome.[18]

[9]        In another case, a plaintiff injured by a sink that fell from a high storeroom shelf sought production of the database that the defendant, Lowe’s, used to record and track accident and injury claims.[19]  The trial court ordered Lowe’s to present a witness with knowledge and access to the system and to print out all requests for accidents occurring before the date of the plaintiff’s injury.[20]  Notably, Lowe’s objected that: (1) it had already produced a printout from the database of all falling merchandise claims for its stores within the state for the last five years; (2) the remaining portions of the database were not relevant; (3) the manner in which accident information was gathered and stored was a trade secret; (4) the purpose of the database was not for safety-related information; and (5) there was no way to restrict production of privileged or non-relevant information.[21]  The appellate court agreed with Lowe’s in part and limited the plaintiffs from accessing data without limitation as to time, place, or subject matter.[22]

[10]      In Procter & Gamble v. Haugen a plaintiff appealed from the dismissal of his Lanham Act and tortious interference claims which resulted in part from the court sanctioning it for failing to preserve relevant database information.[23]  Procter & Gamble (“P&G”) claimed that agents of a competitor spread false rumors that the company supported Satanism, using the profits from forty-three products to do so.[24]  P&G and its expert witnesses used the services of a third party vendor, Information Resources Incorporated (“IRI”), to track potential lost sales of the forty-three involved products.[25]  IRI used a database that gathered purchase information from retail stores into electronic market share databases.[26]  IRI’s databases stored data on a “rolling” basis so that data was kept only for a period of time before it was deleted from the system to make room for more data.[27]  Defendants requested production of all of the information that P&G used from the IRI databases and when P&G was unable to produce all of this information, the court found that P&G had spoliated the data and dismissed the matter as a sanction.[28]  On appeal, P&G focused on the fact that it was only a subscriber to the IRI database, did not own or control the system, and therefore could not have practicably provided the information to defendants.[29]  P&G could have provided direct access to the system to defendants, but this would not have covered all of the information they sought.[30]  P&G would have had to pay over thirty million dollars to obtain all of the information from IRI and even if it had, it would not have had sufficient storage capacity for the data.[31]  The court of appeals found that the district court had failed to address the fact that P&G did not “possess” the data and along with the defendants’ failure to prove prejudice, reversed the sanctions order.[32]

[11]      In another case involving a Lanham Act claim, a plaintiff sought discovery about the defendants’ sales of an alleged infringing product. [33]  One of those defendants, Wal-Mart, responded with 1,771 pages of Bates-stamped documents that represented a print-out of the tabular view of the raw data within its sales database.[34]  Plaintiff claimed that the printouts, with line item data arranged by columns and UPC codes, was “indecipherable” and thereby an insufficient response.[35]  The court was “convinced” that Wal-Mart’s burden in deriving the information from the database was “significantly less” than on the plaintiff since Wal-Mart controlled the system.[36]  For this reason, the court granted plaintiff’s motion to compel a more sufficient response from Wal-Mart.[37]

[12]      Finally, in an Americans with Disabilities Act claim, the Equal Employment Opportunity Commission (“EEOC”) sought to compel production of portions of the human resources database of a Supervalu and Jewel-Osco, major national food retailers.[38]  The EEOC originally sought broad production of information from the human resources database, but narrowed its requests after a meet and confer session to employee hiring, transfer, and termination records, along with job postings for the subject time period.[39]  The EEOC premised its request on the defendants’ own FRCP 30(b)(6) testimony that “this sort of analysis could be completed” and that defendants’ “types of database are designed for this sort of production at minimal expense.”[40]  Defendants first claimed that they did not have the particular database tool activated in their system to allow them to provide the information requested by the EEOC.[41]  Defendants then objected to the scope and burden of the request, claiming that the information would cover over 180 locations and 100,000 employees (when there were only 108 claimants) and that it would take their IT personnel over a week to write the code necessary to obtain the data.[42]  The court found that the EEOC had not established that the relevance or benefit of the information outweighed the burden and expense of producing it and thus denied the motion to compel.[43]

 

III.  Can a Party Wait to Deal with Structured Data until that Information Has Been Requested?

[13]      The information contained in databases can make the difference between winning and losing a case.  The Sedona Database Principles makes this statement as a matter of
plain fact: “Information contained in databases may be the best source for establishing certain facts in a legal dispute.  Information stored in this format also may be useful, if not essential, for analyses such as sorting, calculating, and linking to answer quantitative questions presented in a case.”[44]

[14]      It is a simple matter to move from the abstract language of the Sedona Database Principles to concrete situations.  Unstructured data, particularly e-mail, instant messages (“IM”), and typical “office” documents (i.e., Microsoft Word, Excel, and PowerPoint) provides evidence of the communication of activities—who knew what and when.  People will write e-mail and text messages to others concerning what they did.  Similarly, they will draft documents to memorialize actions that they have taken.  In contrast, the structured data in transactional and financial databases provides direct evidence of the action—how, how much, and how often.  The financial system will show that money was moved and the time and accounts involved.  A transactional application will record the supervisor’s approval of the money transfer.  Thus, the database systems provide a way to “follow the money” and recreate what happened, even if the communications record is incomplete or, in the case of fraud or shady dealing, deliberately obscured.  For this reason, some have called structured data “forgotten data”—“perhaps the single biggest missed opportunity for de
fense in e-discovery.”[45]

 

IV.  Planning for Discovery of Structured Data

[15]      Databases, especially major, enterprise, or department-level systems, are often highly complex and highly customized.  The discovery of structured data typically requires specific expertise with experience in deciphering data structures, relationships, and connections to other systems.  The Sedona Database Principles is filled with warnings about the need for expert assistance,[46] and it likens the act of trying to handle discovery requests involving structured data without such knowledge as “akin to seeing a thousand-piece jigsaw puzzle without an illustration that shows the final completed puzzle.”[47]

[16]      Seeking information stored in structured data repositories also requires more planning—and often more efforts at cooperation between the parties—than traditional e-discovery.  Parties that do not meet and confer before commencing structured data requests may well find that the court sends them back to square one.[48]  Many reasons exist for this heightened need for additional proactive planning and discussion, but none may be more pressing than the fact that downstream production requirements will control the early stage EDRM work conducted in Preservation, Collection, and Processing, and even potentially as far back as the critical Identification phase of e-discovery.

[17]      It should come as no surprise that the Sedona Database Principles places particular emphasis on one of the core principles from the original Sedona Principles:

Sedona Principle 3: The Early “Meet and Confer”

“Parties should confer early in discovery regarding the preservation and production of electronically stored information when these matters are at issue in the litigation and seek to agree on the scope of each party’s rights and responsibilities.”

Sedona Principle 3 is especially applicable in the context of database discovery because of the complicated technical and logistical questions raised by the storage of information in databases.  Database discovery may entail some of the most expensive and complex discovery in a litigation matter, and meaningful conversations between the parties early in the litigation can substantially reduce confusion and waste of resources.[49]

[18]      Challenges to the discovery of information stored in structured data repositories can occur from both opposing parties and litigants.  Many of the solutions for best using data from databases require the creation of a new view or analysis that differs from the way that the information is used in the ordinary course of business.  Responding to structured data requests is likely to require new reports, new extracts directly from the systems, or even entirely new systems to analyze data.  Attorneys are often not comfortable with this process, especially since information about how these new views of structured data were created may have to be disclosed to the other side if challenges arise as to the adequacy of the proffered discovery response.  Thus, it is critical to complete a full and frank discussion, between all stakeholders—each side and each role (Legal, IT, outside expert)—that clearly sets out all expectations before any work begins.

[19]      The first issue that practitioners are likely to confront during the e-discovery process involves the specific elements that will be extracted from the database.  In some situations, it may be necessary to preserve and collect elements that would not normally be considered “content,” such as reports, formulas, pick lists, reports, queries, and the like.[50]  For example, FLSA class action litigation often revolves around issues of how companies determined which employees were exempt from overtime and which were non-exempt; formulas within the HR and payroll systems applying these standards become critical.[51]  Fraud cases that center around who knew what and when could require the recreation of standard reports and views that were used at the time of the alleged suspicious activity.[52]  Such elements will almost certainly require rigorous preservation and collection methods, such as a complete database copy or a restored full back up, as outlined below.

[20]      In most cases, practitioners will need to focus solely on database content: the fields and records.  With this approach, legal teams must anticipate potential issues as they either use or produce this information.  Concerns include: (1) a need for completeness and usability of the data set; (2) availability of the data and technical feasibility of any planned search and retrieval Methods; and (3) cost.  Each concern is explored in turn below.

A.  A Need for Completeness and Usability of the Data Set

[21]      The fact that some of the data within a database may be relevant does not mean that the entire database must be produced.  Sedona Database Principle 1: Scope of Discovery clearly speaks to this point: “Absent a specific showing of need or relevance, a requesting party is entitled only to database fields that contain relevant information, not the entire database in which the information resides or the underlying database application or database engine.”[53]

[22]      Will legal teams require a complete set of data or merely an extensive subset of potentially relevant records?  For a small subset of data, a surgical approach will likely suffice.  However, if a complete dataset will be required for further analysis, the scope of database preservation, collection, and production will be much more extensive.  Date ranges for activity or database information creation may be helpful at this stage.

[23]      Does the team require a picture of the information present at a particular point in time?  If so, a snapshot of the data or the system will likely accomplish these objectives.  To create a historical record, a trend line, or to illustrate changes over time, more comprehensive preservation and collection will be required.

B.  Availability of the Data and Technical Feasibility of any Planned Search and Retrieval Methods

[24]      Structured data systems have a variety of capabilities and technical capacity.  Many of the older legacy systems can be very limited in how one can manipulate and export data.  Thus, before making any plans—or worse, commit to a regulator or the other side in litigation as to a methodology or deliverable data—it is critical to determine whether the target system includes the necessary capabilities.  The answer to this question will vary by the circumstances of each case, but some of the questions highlighted in Comment 2B of the Sedona Database Principles[54] provide a good starting point:

Can a user run searches within the system, other than those built specifically for the intended business uses of the database?[55]

Will the searches bring back complete information (i.e., all the requested data)?[56]

Is there information stored outside of  fielded tables?[57]

Does the producing party have custody and control of the database, such that it can access the “back end” of the system to export data, create custom reports, or otherwise access the system outside of normal business use?[58]

Does the system support third party tools that might be more efficient at querying the data?[59]

Does the system have reporting capabilities?[60]

Does the system support the creation of custom reports?

[25]      The answers to these and other questions will directly impact the extent to which a case team can preserve, collect, and ultimately produce the data stored w
ithin a database system.  It is crucial that qualified personnel correctly provide this essential foundational information.  It may be necessary to support such statements with documented expert evidence.  Given a lesser evidentiary showing, the courts have shown little sympathy for such claims, particularly when made by sophisticated corporations.[61]

C.  Cost

[26]      Structured data discovery has the potential to be more costly than “standard” requests.  It is imperative that parties have a strong understanding of the potential costs associated with structured data discovery.  Courts have become particularly sensitive over recent years to knee-jerk undue burden and cost claims under FRCP 26(b)(2)(B) that lack concrete documented support.[62]  This concern is yet one more reason why retaining experienced experts, who can attest to costs encountered in similar situations, may be critical to adequately educate both courts and requesting parties.

 

V.  Handling Structured Data within the EDRM

[27]      The Electronic Discovery Reference Model (“EDRM”) has come to provide an industry-accepted workflow for e-discovery across the litigation lifecycle.  Discovery of structured data can generally proceed within the EDRM framework, though a number of modifications may be required because of the unique requirements inherent in handling this type of ESI.  Virtually all structured data projects will require the application of an IT concept known as “ETL,” which is the acronym for Extract, Transform, and Load.  A good working definition for ETL is:

ETL is short for extract, transform, load, three database functions that are combined into one tool to pull data out of one database and place it into another database.  [Extract] is the process of reading data from a database.  [Transform] is the process of converting the extracted data from its previous form into the form it needs to be in so that it can be placed into another database.  Transformation occurs by using rules or lookup tables or by combining the data with other data.  [Load] is the process of writing the data into the target database.[63]

[28]      ETL is required in e-discovery for the simple reason that most business-oriented database systems (e.g., Peoplesoft, Cognos, Oracle Financials, specialized procurement software, and SQL databases) are designed to meet specific business needs and do not inherently “speak” to each other.  Hence, ETL permits different data formats to be assimilated or aggregated in a unified source for analysis.  This saves time querying multiple databases in various coding languages to try to quantify an impact, establishing relationships with the data across systems, and providing meaningful results to counsel and client.

[29]      For structured data, a typical workflow involves an ETL overlay of several EDRM phases, beginning with Identification and typically running through Preservation and Collection, and at times into the Processing phase.  This process is illustrated in the figure reproduced in the Appendix.

A.  Identification

[30]      The Identification phase for structured data is likely to require substantially more experience than it normally would for unstructured data systems.  Large-scale enterprise database systems, such as Oracle, SAP and PeopleSoft, are highly complicated and customized, requiring advisors with specialized expertise to understand them.  This complexity may even be considered a trade secret and thus protected by the software vendor.[64]  Even small-scale systems as simple as Microsoft Access databases are often customized and connected to other systems in ways that are both unexpected and poorly documented.  Older structured data repositories that fall into the categories of legacy data, obsolete hardware, and retired systems may present particular concerns since the documentation that existed at one time may no longer be available or accurate.  Further, the employees who created and maintained these systems may be long gone from the company, having taken with them any institutional knowledge about these systems.

[31]      For all of the above reasons, Sedona Principle 6: Responsibilities of Responding Parties is particularly applicable to and significant for the discovery of structured data.  Sedona Principle 6 reads: “Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information.”[65]  The Sedona Database Principles further apply this guidance to the discovery of structured data in Database Principle 2: Accessibility and Proportionality, which states: “Due to the differences in the way that information is stored or programmed into a database, not all information in a database may be equally accessible, and a party’s request for such information must be analyzed for relevance and proportionality.”[66]

[32]      However, the fact that a producing party is generally better situated to evaluate methodologies and burdens does not mean that the responding party can and should examine and evaluate such information unilaterally.  In accord with the Sedona Database Principles’ focus on cooperation between the parties, Database Principle 3: Use of Test Queries and Pilot Projects recommends that the parties work together, starting with the sharing of database and system documentation or even going so far as to create test queries and pilot projects.  It states: “Requesting and responding parties should use empirical information, such as that generated from test queries and pilot projects, to ascertain the burden to produce information stored in databases and to reach consensus on the scope of discovery.”[67]

[33]      Key goals in the identification phase should include:

Determining which systems are likely to include data that might need to be used or produced;

Establishing the current status and availability of the data, such as whether it is still within live data systems, in legacy systems, in archives, on backup media, offline, legacy or retired systems;[68]

Locating the data, as many database systems have parts spread out among many physical locations, often in remote server farms or co-location facilities;[69]

Ascertaining who controls those systems (a vendor, such as SalesForce or other third party, rather than the client/litigant, may actually have possession and day-to-day control over the database itself);

Understanding the functional purpose of those systems, both for which they were created and potentially for any later purpose or purposes for which they may be currently used;[70]

Determining the capabilities and limitations of the current system or media holding the data—an important step that will set practical boundaries for how data can be preserved, collected and processed;

Assessing the costs and burdens of obtaining—and if necessary restoring—the data from its current storage repository; and

Evaluating the potential benefit of obtaining the data.

[34]      Data flow and entity relationship diagrams can be particularly useful in tracking down database connections, assuming the company has taken the time to create such documentation.  This documentation augments the more technical documentation involved with data mapping and a data dictionary or schema.  Data mapping, which is a list of how enterprise systems interconnect (sometimes prepared as a list, but sometimes created as an actual graphical map),[71] can make the difference between the success and failure of the project.  Structured data systems connect to other systems within
the enterprise, often to many systems and in surprising ways.  Missing those connections can mean missing necessary inputs, outputs, and related or relevant data.

[35]      A data dictionary or schema shows the type of data that is in a system, how it is organized and named, and the relationships between that data as it sits in fields and tables.[72]  Since structured data systems are often complicated and expensive, these tools tend to have long lives and may have changed purpose or focus over time.  As it can be burdensome to modify an underlying data table structure, newer data may be stored in repurposed fields or tables that may not be properly named or intended for the current use.  Such informal modifications are rarely fully documented unless a conscious (and recent) effort has been made to build a schema.  However, as underscored by Comment 1B of the Sedona Database Principles, data that could initially appear to be irrelevant may in fact be relevant because of its relationship and connection to other data fields.[73]  Thus, it is no surprise that the Sedona Database Principles propose that the responding party has a duty to provide the requestor with the information needed to convey a “basic understanding” of the database system.[74]

[36]      A final challenge in the identification phase is that the most common users of these structured data systems, the end-users or “customers” who query the substantive information stored in the database, are unlikely to be experienced IT professionals.  These users rarely have the time, knowledge, or ability to wade through technically confusing scenarios that a legal case team may pose.  A case team must take this into account and plan to interview a mix of end-users and database-knowledgeable IT professionals in order to build a reasonable understanding of a complex structured data repository in active use.

B.  Preservation and Collection

[37]      One of the most troubling aspects of e-discovery is that ESI has a tendency to disappear unless properly preserved.  Backup tapes get recycled, e-mail servers are purged of ex-employee accounts, and hard drives from the laptops of ex-employees are reformatted and reused.  Depending on the specific system at issue, some structured data repositories may be even worse in this regard.  While much unstructured data is lost due to human action, certain types of common structured data systems are specifically designed to eliminate or overwrite data regularly and automatically, without anyone’s direction or oversight.

[38]      These repositories stand in contrast to databases comprised of historical information, such as customer relationship management systems, complaint or incident databases, and financial systems used to determine trends, which are typically designed to log all inputted information.  In these systems, where one of their intended uses is long-term “data mining” for analytical purposes, the danger that information will disappear is appreciably less.

[39]      High volume transactional systems tend to overwrite data or regularly purge old data as the need for historical data is often limited and the volume of data that would build up over time would become prohibitively expensive to store.[75]  This problem is well known and the drafters of the 2006 FRCP Amendments who added the rules on ESI specifically noted that “many database programs automatically create, discard, or update information” and “that suspending or interrupting these features can be prohibitively expensive and burdensome.”[76]  Thus, practitioners assisting in a matter that touches these types of data systems will need to act quickly to preserve this type of system to avoid being left with incomplete data or none at all.[77]

[40]      Another unique wrinkle to the discovery of structured data is that the lines between the Preservation and Collection phases tend to blur.  For structured data, the information that is preserved is often exactly what is collected.  Most unstructured formats include potentially responsive files that are moved from at-risk locations (laptop hard drives, USB flash drives, unsecured network file stores, e-mail inboxes, etc.) to secure, locked down media or formats, pending further analysis.  In contrast, non-purging structured data typically needs to be collected from the underlying system to be preserved.  Thus, an already deadline-intensive e-discovery process can become more fraught with difficult-to-make and far-ranging early decisions.

[41]      It is important, however, to reemphasize that the fact that a database contains relevant information does not mean that the entire system must be locked down under a legal hold.  Sedona Conference Principle 5: Duty of Preservation places a practical limit on the expectations of the parties: “The obligation to preserve electronically stored information requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation.  However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant electronically stored information.”[78]  Thus, parties can use a number of different methods to collect and preserve structured data; the choice will be driven not by the impossible expectation of perfection, but by the circumstances of the case and the project scope questions previously discussed in “Planning for Discovery of Structured Data.”[79]  Each of these collection methodologies has advantages and disadvantages.  Improperly applied, some methodologies have the potential to harm the information integrity of the underlying database and therefore, need to be used carefully or may need to be discussed more fully with the requesting party before moving forward.

1.  Forensic Collection of the Live Database

[42]      Some disputes may require preservation and production of a complete copy of the database system.  For example, this may be necessary where questions exist about the integrity or functionality of the database as a whole or if there is a need to manipulate the data in some way other than just as a historical record.

[43]      Collecting an entire database has some advantages, such as in situations where the complete dataset or evidence must be preserved.  This method presents the path of least resistance to key issues of data verification and authentication in that data can be verified through MD5 or SHA-1 hash codes to authenticate it as the basis for its admissibility as factual evidence.  Complete collection also presents the safest route against spoliation as any changes to a database in active service will not impact the version that was collected and is now out of tinkering hands.

[44]      That said, copying an entire structured data repository also has disadvantages when compared to other information collection methodologies.  The first disadvantage is cost.  Unless the system is small (e.g., desktop computer-based), the sheer size of a data repository may require large amounts of storage media, significant IT investment, and costly disruption to corporate operations.  In addition, accessing a collected data repository may require building a comparable hardware and software environment to load, search, and otherwise manipulate the data.  Enterprise-level infrastructure for this task is likely to be quite costly, even on a short-term leased basis.  For older legacy systems, it might not even be possible to copy the system and even if were possible, duplicating the computer systems on which the information resides might have long become unavailable.  Contractual rights may prevent this collection methodology.  In the case of databases accessed over “the Cloud,” copying the database as a whole is strictly forbidden both by license and deliberately-created technical constraints.[80]

[45]      It is im
portant to note that the preservation and collection of an entire database is rarely required for most legal disputes.  Most e-discovery requests involve only a subset of structured data.  Thus, collecting an entire database to preserve only a small amount of information within it incurs additional time and expense to search, cull, and select data, all of which will have to be done outside of the easy confines of an e-discovery review tool.

2.  Restoration of Backups from the Database

[46]      Similar in outcome, but potentially less burdensome, disaster recovery backups of a structured data repository may be used to preserve and collect databases.  Most organizations have regular business continuity backups of their key systems and it may be less onerous to divert one of these data snapshots than it would be to make a full copy of the live database.  However, the same disadvantages apply as making a copy of the system, along with some additional challenges that may make this potential methodology inappropriate in many situations.

[47]      Backup media may contain not just data regarding the database at issue, but also data from completely different systems as well.  Separating this information will require additional time and expense and may be complicated by data privacy requirements, such as HIPAA, that require the enactment of significant security measures for the removal of data.[81]  In addition to these costs, backup media must be restored, again requiring time, IT expertise, and suitable hardware to which the system image can be restored.[82]  Finally, backup systems are far from perfect and failure rates, while not as high as they have been even in the recent past, are still in the words of a highly-respected industry analyst, “not acceptable.”[83]

3.  Extracting Select Information from the Database

i.  All Fields/Data

[48]      A more selective and thus more efficient alternative to collecting an entire repository is extracting the substantive data from the system and exporting it into a generic data format that can be read by multiple databases.  The success of data collection using this methodology is relatively simple to test, using one of several established techniques.  In addition, if the extraction process is handled according to IT industry standard practices and properly documented, authentication should also be relatively straightforward.  Capturing a full set of the underlying data permits a case team to defer filtering and culling decisions to a later date, pushing back some expense until it is truly necessary.

[49]      Collecting database information through data extraction has some drawbacks.  As with other techniques that capture the entire data set, much of what is collected will be irrelevant and will need to be filtered out before any review or production.  This can be a lengthy, disruptive, and expensive process.  It is important to note that extracting the complete data set does not mean that all of the capabilities of the original database will be available.  Much of the value of many database systems stems from the computed values and analysis obtained by applying algorithms to source data.  Capturing raw data alone is often not adequate to collect this high-value relational information as well.[84]  The full extract, transform, and load process may be required to derive potentially critical information.

ii.  Selected Fields

[50]      Because databases typically track much more information than is relevant to a particular legal matter, it may be possible to extract select information stored within it.  Such selection can be applied along two axes: (1) limiting data extraction to a subset of database records and selecting them through an appropriate search query; and (2) limiting data extraction to only a subset of fields within a database record.  Often, both limitations are applied in the same export.  This approach has clear advantages in terms of cost, data volume, and amount of time required to complete the requested data extraction.  However, by the same token, leaving behind some of the validating information found in a database field may make the extracted information more difficult to authenticate.

[51]      Identifying and extracting the relevant data depends on three things: (1) knowledge of the system; (2) understanding of the matter; and (3) skill at creating queries.  Deficiencies in any one of these areas may complicate this effort.  In addition, because not all of the data in a database is collected using this methodology, there is some risk if the database has an information purging function built into it.  It may not be possible to fix mistakes if the initial selection criteria turn out to be incomplete.  Fortunately, when cooperation exists between all participants and parties in the process, this collection methodology can be both efficient and cost-effective for everyone.

iii.  Sample Fields (and Potentially Reiterations as Needed)

[52]      When the existence or non-existence of potentially relevant information is an open question, a final form of data extraction is to export sample database records.  The process can be repeated reiteratively, even incorporating suggestions from the requesting parties.  Properly conducted, this approach may permit a structured data repository to be dismissed as a source of potentially relevant information or it may hone the criteria required to identify and extract appropriate information.  Either way, approaching such an investigation cooperatively, rather than unilaterally, may enhance the defensibility of this approach.[85]

[53]      Selected sampling incorporates the risk factors that arise when extracting only select information from a database.  This approach adds a fourth potential failure point: the need for competence in generating appropriate sample sets and testing them for potential relevance.  Because of the highly selective nature of this approach, rigorous documentation is required to answer questions that may arise later as to the adequacy of how this methodology was applied.

4.  Reports

i.  Using Existing Reports

[54]      Existing (i.e., “canned”) database reports that are used for business purposes can be a useful first step for collecting structured data.  First, the total data volume will be much lower than other methods unless the reports are themselves massive.  However, as Comment 1F of the Sedona Database Principles highlights, even voluminous reports may still be appropriate to produce even with the inclusion of additional non-responsive information, as this could be the easiest, least expensive, and least burdensome way to obtain and produce the information so long as the producing party is not doing so for any improper purpose.[86]  Second, existing reports were created and generated for business purposes and thus have typically been “pre-validated.”  The accuracy of the information presented has been accepted as accurate and reliable as the basis for business decisions.[87]  This can greatly simplify post-production validation and authentication.  Third, these reports are typically minimally intrusive for an organization.  The report templates and underlying queries have already been created and used in the ordinary course of business so no custom workflow must be developed.  Fourth, especially with respect to Cloud-based/SaaS type proprietary systems, reports may be the only way to retrieve data from a system.

[55]      Unfortunately, the use of existing reports is not a perfect collection solution.  These reports were designed for specific business needs, not the needs specific to a legal dispute.  For this reason, existing reports rare
ly provide the information that is specifically requested.  They typically provide too much or too little.  A troubling problem, and one that is less well understood, is the fact that reports tend to not be “pure” output from the system.  Many database reports are compilations and aggregations of information that are more than raw information output from stored information.  Instead, this raw information may be added, reformatted, or otherwise “tweaked” from the pure source information in the database, sometimes to the point of showing significant deviation from source information.  For purposes of validation and authentication, this can create obvious problems.

[56]      Often, requesting parties do not automatically accept database reports in lieu of direct discovery of the source database.  In addition, it would be unwise to assume that the courts will side with the producing party over this issue without first examining the underlying facts leading to the creation of specific reports.[88]

ii.  Creating Customized Reports

[57]      Another option for data extraction from structured data repositories is to design a custom report.  Custom reports provide greater flexibility than existing reports due to their ability to be limited to relevant data, data fields, and time periods.  Custom reports also help to limit inadvertent disclosure of irrelevant data and can even be used on privileged, confidential, or protected personally identifiable information.

[58]      As a word of caution, not every system allows for the creation of custom reports, and even when this functionality is available, it may be difficult or expensive to use.  Custom reports may face a greater evidentiary hurdle than canned reports used in day-to-day business operations.  However, courts have been somewhat more sympathetic to production objections based on the undue burden of creating expensive custom database reports to comply with incoming discovery requests.[89]

5.  TIFF Image Snapshots

[59]      An older, and now less commonly accepted, way to produce structured data is to capture database output sent to the monitor or to reports and to render these “snapshots” to TIFF image.  This creates an easily preserved form that can be Bates-stamped and for which authenticity can easily be stipulated.[90]  While appropriate in some situations, this production method has fallen out of favor compared to other alternatives since it tends to reduce the fielded nature of the underlying data, thereby turning structured data into flat, inflexible unstructured documents that may or may not contain searchable text.  That being said, certain database systems have such limited data output capabilities that capture of data in this manner may be one of the only options currently available.

6.  Direct Access to the System

[60]      A final method for producing information from a database is to simply let the requesting party or its expert have direct access to that system to run its own queries or reports.  However, most litigants highly disfavor this method as it allows the opposing party potential access to privileged and confidential information within the database.  Courts that have addressed this situation have tended to be receptive to such concerns, requiring that limits be set.[91]  This direct access approach also has significant potential to disrupt in-house IT infrastructure and staff who are likely to be unhappy at opening a controlled organization’s asset to interlopers.  Indeed, the Committee Notes to the 2006 Amendments to FRCP 34 make it quite clear:

The addition of testing and sampling to Rule 34(a) with regard to documents and electronically stored information is not meant to create a routine right of direct access to a party’s electronic information system, although such access might be justified in some circumstances.  Courts should guard against undue intrusiveness resulting from inspecting or testing such systems.[92]

[61]      In addition, granting outsiders access to data repositories containing certain personally identifiable information may violate data privacy laws and create significant (albeit unrelated) liability for the producing party.  For these reasons, direct access to databases and other such systems tends to be granted over objection “only in extraordinary circumstances.” [93]

[62]      No matter what process is used to preserve and collect a database, proper documentation and testing is critical as many of these processes are complicated and mistakes can occur.  Proper documentation and a record of testing will help to demonstrate good faith efforts if these procedures are later called into question.[94]

C.  ECA and Processing

[63]      Once the data has been extracted from its repository, it typically undergoes further transformation so that it can be used in the investigation or litigation context prior to attorneys’ review for substance.  For loose documents, litigants typically apply early case assessment techniques, such as key word or concept filtering, to reduce the data volume.[95]  Unfortunately, such techniques do not apply well to structured data, as this information is largely centered around transactions rather than words and phrases.  Properly processing and limiting the volume of such systems can instead profile the transactions using specific fields, dates, and general ledger codes.  A strong understanding of the system at hand becomes even more important in such situations.

[64]      Traditional culling methods may be more helpful when the extracted data includes free-form text entry fields such as “comment” fields.  Even here, though, because the unified extracted data exists as a single mass of (fielded) information, culling this glob of information can raise evidentiary challenges unless all changes are well documented and ideally, negotiated at least in principle with the requesting party.

D.  Review and Analysis

[65]      Once the data has been processed and preliminary analytics have been applied, it may still need to be reviewed for responsiveness and privilege.  Some structured data can be managed within standard review platforms, especially flat-file reports and data tables rendered as Microsoft Excel spreadsheets.  On the other hand, data extracted from enterprise-grade relational databases cannot be loaded into a review platform with any genuine hope of validly reviewing this information.  As described in the Sedona Database Principles:

Analyzing email messages and discrete electronic files typically involves a team (sometimes a large team) of reviewers and takes place through a document review platform.  Such review and analytical tools, however, are a poor fit for the matrices of information found in tables of extracted database information.  Instead, review of this information may require technically sophisticated analysts to query the data and extract the meaning of its aggregated information.[96]

[66]      A more straightforward approach to reviewing structured data looks not to the data’s abstract relevance, but instead to the significance of its data values.  Certain field information, such as protected private information, may be redacted or stripped, but this is the closest analogy to the parallel review process that takes place in a document review platform.  Otherwise, extracted data is manipulated, queried, and explored.  In addition, once protected and privileged data fields are removed from extracted structured data, no further attorney review of individual data fields is typically required.

[67]      When the content of individual data fields, such as notes or memo fields, require attorney review, the review par
adigm must be further adjusted.  Such a review is complicated by the fact that the information that requires review tends to be stored in a structured manner, but contains unstructured data, such as free text that lacks parameter constraints on length or format.  Technical specialists are typically enlisted to develop secure web-based database review tools that present this information in a reviewable format for redaction purposes.  Certain profiling and culling methods can be employed to reduce the overall volume of information that requires attorney review, but generally, some “eyes-on” attorney review will be required.

E.  Production

[68]      Extraction and Transformation processes largely set the production of structured data.  Information that has been shed as a by-product of transformation processes may now be non-replicable since many forms of extraction do not allow conversion back “upstream.”  You cannot, for example, extract data as reports and then reconstitute the data to produce it as a complete database.  Such is the reason that Sedona Database Principle 6: Form of Production reminds us that: “The way in which a requesting party intends to use database information is an important factor in determining an appropriate format of production.[97]  Comment 6A of the Sedona Database Principles takes this even further by underscoring that “it may be impossible for a responding party to take appropriate steps to provide database information in a reasonably useful format if it has no idea how the requesting party intends to use it.”[98]

[69]      Even if the parties do not avail themselves of the warnings of the Sedona Principles and the Sedona Database Principles and decline to work together to determine a reasonably usable production format, this lack of agreement does not mean that parties are free to produce data in any format they choose.  FRCP 34(b)(2)(E) requires:

(E) Producing the Documents or Electronically Stored Information.  Unless otherwise stipulated or ordered by the court, these procedures apply to producing documents or electronically stored information:

(i) A party must produce documents as they are kept in the usual course of business or must organize and label them to correspond to the categories in the request;

(ii) If a request does not specify a form for producing electronically stored information, a party must produce it in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms; and

(iii) A party need not produce the same electronically stored information in more than one form.[99]

[70]      Courts have shown that they will be alert to production formats that are not usable.[100]  Courts can also order parties to produce data in particular formats even if it requires the creation of entirely new data sets.[101]  However, at the same time, the full cost of producing structured data does not always fall entirely on the producing party.  In some circumstances, a requesting party may be required to bear the burden and expense of some degree of transformation of the data from the producing party so long as the format of the production was in fact reasonable.[102]

[71]      The Sedona Principles echo the concerns of the courts in Principle 12: Form of Production and Metadata:

Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and needs of the case.[103]

[72]      Difficulties can arise when an opposing party requests that structured data be produced in “native format”—that is, the original file format in which producing party keeps the ESI.  Courts have sometimes shown an un-nuanced willingness to enforce general demands for native format production if it is properly and timely requested, or even if that is lacking, if good cause can be shown[104] or absent a showing of undue burden or hardship.[105]  At times, the courts have even required such native file productions from database systems.[106]  Many parties indirectly request this by requesting production of “the entire database.”[107]

[73]      Unfortunately, a “native file” production for structured data can present a number of difficult and unique problems.  First, and most obvious, the proprietary database format in which relevant data is stored may not be readable and thus, not “reasonably usable” to the requesting party.  Handing over to the other side a complete copy of a database system, particularly a world-class enterprise system, is also not a sufficient solution.  The recipient may well need to obtain a licensed copy of the system—a potentially very expensive proposition in the case of high-end database systems—or a near impossible proposition in the case of legacy or obsolete systems that are no longer commercially available (even as they remain protected by copyright and license restrictions from free copying).  Even if a license for the system can be obtained, installation of the system could take weeks or months and success is not always a given.[108]  Finally, even once such hurdles are successfully overcome, the very first use or view of a copied database system is likely to change the information therein, as such systems typically have tracking capabilities that are difficult or even impossible to turn off, making the copy no longer an accurate copy.[109]

[74]      For all of these reasons, more transformative production formats, which change the data from the way it is stored in the ordinary course of business, have become a commonly accepted discovery practice.[110]  In addition, a strong argument can be made that the fielded nature of the raw data, not the proprietary container in which it is stored, is the essential element that provides “native format” flexibility to this information.  If this argument is accepted, further transformation of the data may provide increased accessibility without compromising essential functionality.

 

VI.  Issues Beyond the EDRM

[75]      Because structured data does not fit squarely within an EDRM that was implicitly designed for unstructured data types, it should come as no surprise that additional issues often arise in working with structured data in discovery.

A.  Custody and Control

[76]      A respondent in discovery is only required to turn over what is in their possession, custody, and control.[111]  This obligation extends to traditional materials and ESI alike as well as to unstructured and structured data alike.  Complex databases, however, can challenge the issue of where data is stored and the extent to which it is “owned” by the content creator.  For example, a database may be housed entirely within a corporation and serviced by company IT professionals, so there would be no possession, custody, or control issue.  However, when the database is provided by a service provider, questions about information ownership can and do arise.  The licensing provisions for many Cloud-based SaaS providers hold that while information entered into the outsourced database may be the exclusive property of the database service client, many of the internal database elements that create relationships between this client provided data are proprietary to the point that a client does not have permission to view these
relationships, much less export them in response to a discovery request.[112]  As a consequence, the “owner” of information in these systems—the SaaS client—may not have custody or control over a portion of the ESI that it would have to provide if it hosted the database itself.

B.  Verifying that the Data Collected is Accurate

[77]      Structured data has the unusual property of appearing accurate and precise, even if the substantive information that the database reports is riddled with errors.  This issue can occur because the precision of a database search query or report is separate and distinct from the way in which the source data was created or entered into the system.  For example, operators at a call center may be asked to enter their recollections and remarks about customer questions and complaints.  This information is likely entered quickly as the operators focus on handling as many calls as possible during their shift and it may contain errors.  Yet, when this same information appears in a database report, it is likely to have the appearance of an accurate and truthful statement.

[78]      Sedona Database Principle 5: Data Integrity, Authenticity, and Admissibility considers this issue: “Verifying information that has been correctly exported from a larger database or repository is a separate analysis from establishing the accuracy, authenticity, or admissibility of the substantive information contained within the data.”[113]  Thus, in working with structured data, many practitioners have found it useful to separate these two competing questions about “accuracy.”  It is possible to validate the accuracy of a mechanical data export.  For example, certain reference fields or reference values can be exported with the substantive data and those values verified against the source information in the database itself.  Even something as simple as comparing the number of database records exported against the number of database records returned by a search query is a step in this direction.

[79]      Conversely, practitioners can reserve the right to further challenge the accuracy of the information contained within a structured data repository.  In evidentiary terms, the authenticity of the information—that is to say, the information was accurately exported from a database—can be the subject of a stipulation, but the truthful nature of the information remains subject to standard challenges as to hearsay and general reliability.[114]

C.  Validating Structured Data so that It Can Be Admissible as Substantive Evidence

[80]      Validating structured data is an important consideration when working with this form of ESI.  As noted previously, many practitioners are able to find common ground and negotiate a stipulation that ESI has been accurately exported or copied from the source database.  Authenticity can be mechanically established even though the exported form of the data is unlikely to be identical to the way that the structured data was maintained inside a larger database.  The Sedona Database Principles recognize and address this problem, in Principle 4: Validation: “A responding party must use reasonable measures to validate ESI collected from database systems to ensure completeness and accuracy of the data acquisition.”[115]

[81]      The larger issue, though, is finding a consistent workflow for establishing the reliability of structured data so that it may be admissible for the truth of the information contained therein.  Because structured data is typically exchanged in the form of data exports or reports, at least one court has found that the business record exception to the hearsay rule is inapplicable as grounds for admitting this information for the truth of the matter asserted.[116]  In the case of Vinhee, the court required a detailed showing of how information was entered into a database, including all efforts to identify and correct errors.[117]  The court further required additional foundation about how the underlying database was managed.[118]

[82]      A majority of other courts have imposed a less onerous set of requirements to admit extracted structured data for the truth of the matter concerned.[119]  A key point of argument remains the degree to which substantive information entered into a database has been validated as accurate near or at the time of its creation as structured data.  Systems that include such validation will have their information more easily ruled admissible than more open and less regulated databases.  In such cases, courts may begin to look at some of the Vinhee factors as additional extrinsic evidence required to lay a sufficient evidentiary foundation.

D.  Privacy

[83]      There are many types of database systems that contain vast amounts of private and personally-identifiable information (“PII”) such as HR systems, financial systems, healthcare systems, and customer transaction systems to name a few.  PII resides in some unexpected databases that most would not expect to contain confidential PII.  Web-logging systems, for example, capture unique IP addresses that could be used to track down the identity and location of users.  Such protected information will need to be identified and redacted prior to release of this data to a requesting party.  On the plus side, the same analytical measures that can assist with the extraction of the data can often also be used to locate and redact the confidential data, whether by removing it or replacing it with dummy data.  However, while such systems cannot always be perfect, many privacy laws are written with such perfection in mind so as to be rather unforgiving even as towards minor violations.  Thus, the parties are advised to carefully discuss putting into place protocols, potentially including protective orders, against the possibility of the inadvertent disclosure of PII.[120]

[84]      Unfortunately, that is not the end to the potential problems.  Because database systems tend to be distributed, portions of a system or systems to which it connects may well physically be located across jurisdictions, such as the European Union, that have strict privacy regulations.[121]  Other jurisdictions may not be concerned with the physical location of the data, but instead as to whether the data subjects—those whose information has been collected and stored—live within that jurisdiction.[122]  The penalties for violations of these laws and regulations can be severe, so careful legal consideration of the issues before taking action is well advised.[123]

 

VII.  Conclusion

[85]      Dealing with structured data in e-discovery is something that should neither be ignored nor treated lightly.  A case team may be required to handle structured data because an investigator, regulator or the opposing party requests it, or a case team may need to deal with it just to try to understand and prove its case.  Situations will arise where the proper expert use of structured data is the best or the only way “to follow the money” and figure out what actually happened.  When that situation arises, case teams are likely to need expert assistance to handle the myriad of issues both technical and legal, within the EDRM, and without.

 

Appendix

ETL As Applied to the EDRM Model

 Simon Appendix

*Derived from the Electronic Discovery Reference Model v 2.0, which are used under See Creative Commons Attribution 3.0 United States License. | © 2005-2012 EDRM, LLC.


The Sedona Conference® Database Principles Addressing the Preservation and Production of Databases and Database Information in Civil Litigation[124]

Principle 1: Scope of Discovery

Absent a specific showing of need or relevance, a requesting party is entitled only to database fields that contain relevant information, not the entire database in which the information resides or the underlying database application or database engine.

Principle 2: Accessibility and Proportionality

Due to the differences in the way that information is stored or programmed into a database, not all information in a database may be equally accessible, and a party’s request for such information must be analyzed for relevance and proportionality.

Principle 3: Use of Test Queries and Pilot Projects

Requesting and responding parties should use empirical information, such as that generated from test queries and pilot projects, to ascertain the burden to produce information stored in databases and to reach consensus on the scope of discovery.

Principle 4: Validation

A responding party must use reasonable measures to validate ESI collected from database systems to ensure completeness and accuracy of the data acquisition.

Principle 5: Data Integrity, Authenticity, and Admissibility

Verifying information that has been correctly exported from a larger database or repository is a separate analysis from establishing the accuracy, authenticity, or admissibility of the substantive information contained within the data.

Principle 6: Form of Production

The way in which a requesting party intends to use database information is an important factor in determining an appropriate format of production.

 


* Conrad Jacoby is a Senior Attorney at Winston & Strawn LLP, where his practice focuses on e-discovery issues and litigation information management.  Since 2009, he has served as the founding Editor-in-Chief of The Sedona Conference® Database Principles: Addressing the Preservation & Production of Databases & Database Information in Civil Litigation.  The opinions expressed are those of the authors and do not necessarily reflect the views of their respective firms or clients. This article is for general information purposes and is not intended to be and should not be taken as legal advice

** Jim Vint is a Managing Director at Navigant Consulting, Inc. and runs the Structured Data and Development team within the Technology Solutions group.  He focuses on discovery and disclosure of non-traditional ESI data sources including structured databases.  His clients include global organizations facing regulatory investigations, cross border discovery issues, and general commercial disputes.

*** Michael Simon is Director of Strategic Development for Navigant Consulting, Inc.  Michael, a former practicing attorney, has worked with and counseled clients regarding e-discovery issues and best practices for over a decade.  He frequently lectures on e-discovery, legal technology and Internet law in venues across the United States, including Tufts University, where he has taught as a visiting lecturer.

 

[1] See The Sedona Conference®, The Sedona Conference® Glossary: E-Discovery and Information Management 52 (Sherry B. Harris ed., 3d ed. 2010) [hereinafter Sedona Glossary].

[2] See id. at 49.

[3] See id. at 13, 49, 52 (definitions of “database,” “database management system,” “structured data,” and “unstructured data”).

[4] Fed. R. Civ. P. 34(a)(1)(A) (emphasis added).

[5] See The Sedona Conference®, The Sedona Conference® Database Principles: Addressing the Preservation & Production of Databases & Database Information in Civil Litigation 21 (Conrad J. Jacoby et al. eds., 2011) [hereinafter Sedona Database Principles].

[6] See The Sedona Conference®, The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production 30 (Jonathan M. Redgrave et. al ed., 2d eds. 2007) [hereinafter Sedona Principles].

[7] See Sedona Database Principles, supra note 5, at ii, 8.

[8] See id. at ii.

[9] See id at ii, 8-9.

[10] Nexsan Corp., Registration Statement (Form S-1), at 61 (Jan. 25, 2011), available at http://www.sec.gov/Archives/edgar/data/1133448/000104746911000283/a2200385zex-99_2.htm.

[11] See Information Retention and eDiscovery Survey Global Findings, Symantec 1, 8 (2011), https://www4.symantec.com/mktginfo/whitepaper/InfoRetention_eDiscovery_Survey_Report_cta54646.pdf.

[12] Id.

[13] In re eBay Seller Antitrust Litig., No. C 07-1882 JF (RS), 2009 WL 3613511, at *1 (N.D. Cal. Oct. 28, 2009).

[14] Id.

[15] Id. at *2.

[16] Id.

[17] See id.

[18] See In re eBay Seller Antitrust Litig., 2009 WL 3613511, at *3.

[19] In re Lowe’s Cos., 134 S.W.3d 876, 877 (Tex. App. 2004).

[20] See id. at 877.

[21] Id. at 878.

[22] See id. at 880.

[23] Procter & Gamble Co. v. Haugen, 427 F.3d 727, 730, 732-37 (10th Cir. 2005).

[24] Id. at 731.

[25] Id. at 731-32.

[26] Id. at 731.

[27] Id.

[28] See Procter & Gamble Co., 427 F.3d at 732-33, 735-37.

[29] See id. at 739.

[30] See id.

[31] See id.  In 2013, it may seem unbelievable that a major corporation, like P&G would be unable to afford sufficient storage capacity for this data.  However, when this case was decided in 1995, the court recognized $30 million as a prohibitive storage cost.  See id.

[32] Id. at 739-41.

[33] See Powerhouse Marks, L.L.C. v. Chi Hsin Impex, Inc., No. Civ.A.04CV73923DT, 2006 WL 83477, at *1-2 (E.D. Mich. Jan. 12, 2006).

[34] See id. at *1, *3.

[35] Id. at *3.

[36] Id.

[37] See id. at *4.

[38] EEOC v. Supervalu, Inc., No. 09 CV 5637, 2010 WL 5071196, at *1 (N.D. Ill. Dec. 7, 2010).

[39] Id. at *6-7.

[40] Id. at *6.

[41] Id. at *7.

[42] Id.

[43] Supervalu, Inc., 2010 WL 5071196, at *8, *12.

[44] Sedona Database Principles, supra note 5, at 4.

[45] Courtney Fletcher & Liam Ferguson, E-Discovery: Remembering Forgotten Data, Wall Street & Tech. (Oct. 21, 2009), http://www.wallstreetandtech.com/regulatory-compliance/e-discovery-remembering-forgotten-data/220900032.

[46] See Sedona Database Principles, supra note 5, at 2, 6, 12, 17; see also Douglas Herman, Digital Investigations – Where You Forgot To Look: Why Databases Often Are Overlooked When It Comes Time To Harvest Electronic Data, Metro. Corp. Couns., (Aug. 2006), http://www.metrocorpcounsel.com/pdf/2006/August/22.pdf (“To extract data from a relational structure[,] such as a CRM or ERP database, requires specific expertise and a solid understanding
of the underlying bases of how these databases work.”).

[47] Sedona Database Principles, supra note 5, at 2.

[48] See Rebman v. Follet Higher Educ. Grp., Inc., No. 6:06-CV-1476-ORL-28KRS, 2007 WL 1303031, at *3 (M.D. Fla. May 3, 2007) (Plaintiff’s broad request for data from a database with over 200 million records denied by the court as overbroad; court ordered parties to meet and confer under Rule 26(f) to narrow the request and determine the need versus the burden on the defendant).

[49] Sedona Database Principles, supra note 5, at 8 (quoting Sedona Principles, supra note 6, at 21).

[50] See id. at 24.

[51] See, e.g., Ojeda-Sanchez v. Bland Farms, LLC, No. CV608-096, 2009 WL 2365976, at *3 (S.D. Ga. July 31, 2009) (requiring production of entire database as “metadata” where the formulas within the system were relevant to the issues in a wage and hour class action); see also Sedona Database Principles, supra note 5, at 25 illus. iii.

[52] See, e.g., Goshawk Dedicated Ltd. v. Am. Viatical Servs., LLC, No. 1:05CV2343-RWS, 2007 WL 3492762, at *1 (N.D. Ga. Nov. 5, 2007) (requiring production of database in fraud and truth in lending case required despite respondent’s claim that it was confidential and “the single greatest asset” of the party because the accuracy of the data and algorithms therein was highly relevant to the claims and defenses of the case).

[53] Sedona Database Principles, supra note 5, at 21.

[54] See id. at 27-30.

[55] See id. at 28.  The problem of database systems designed for particular purposes, which are not accessible in the ways required for discovery, was specifically recognized by the Standing Committee of the Judicial Conference in its September 2005 Report Recommending the Adoption of the 2006 Amendments, as a potential form or not “readily accessible” ESI under Rule 26(b): “[D]atabases that were designed to create certain information in certain ways and that cannot readily create very different kinds or forms of information.”  Report of Judicial Conference of the United States on Rules of Practice and Procedure C-42 (Sept. 2005), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Reports/ST09-2005.pdf [hereinafter Judicial Conference Report].

[56] To optimize database performance, some database systems will only index portions of long, free-form text fields—such as the first few hundred characters—so that search results from such systems may not be complete.  See Sedona Database Principles, supra note 5, at 17, 28.

[57] Some database systems use “look up” tables or “drop down” menus to create pre-defined data entry fields which contain information hard-coded into the system itself, not in any searchable fields.  See id. at 28.

[58] See id. at 29.  With the increasing popularity of SaaS systems, such as Salesforce.com, the business user of a system may no longer have any access to a system beyond their usual user interface.  Id.

[59] See id. at 6 (IT departments are likely to require extensive and time-consuming testing of any third-party system that would be installed inside the corporation, especially if it would connect to a mission-critical system).

[60] See id. at 29.

[61] See, e.g., Zurich Am. Ins. Co. v. Ace Am. Reinsurance Co., No. 05 Civ. 9170 RMB JCF, 2006 WL 3771090 (S.D.N.Y. Dec. 22, 2006); Static Control Components, Inc. v. Lexmark Int’l, Inc., No. 04-84-KSF, 2006 WL 897218 (E.D. Ky. Apr. 5, 2006).  However, this does not mean that the courts will necessarily unreasonable requests.  See, e.g., In re Ex Parte Application of Apotex Inc., No. M12-160, 2009 WL 618243 (S.D.N.Y. Mar. 9, 2009) (two weeks before scheduled trial, a party in patent litigation sent a broad subpoena for data to a competitor, involving data from over 30 years ago; court denied the request after the competitor demonstrated the difficulty of obtaining the data).

[62] See, e.g., Cartel Asset Mgmt. v. Ocwen Fin. Corp., No. 01-cv-01644-REB-CBS, 2010 WL 502721 (D. Colo. Feb. 8, 2010) (rejecting claim that ESI was inaccessible due to burdensomeness after respondents failed to provide specific information regarding their storage practices, the number of storage systems that they would need to search, and their capability to retrieve information from those systems).

[63] What is ETL (Extract, Transform, and Reload)?, Webopedia, http://www.webopedia.com/TERM/E/ETL.html (last visited Mar. 12, 2013).

[64] See Sedona Principles, supra note 6, at 30.

[65] Id. at 38.

[66] Sedona Database Principles, supra note 5, at 26.

[67] Id. at 31.

[68] Legacy and retired systems are commonly found in corporate acquisitions, where an acquired company’s IT systems tend to be, at best only partially migrated over to the acquiring company or simply taken offline.  There may be no current users or administrators of such systems at the current company.  See id. at 14; Herman, supra note 46 (“Some systems, especially those that are older, may have been grouped together as a result of certain corporate mergers and acquisitions and may not be operating efficiently or may not be stable . . . .”).

[69] See Sedona Database Principles, supra note 5, at 13.

[70] See id. at 12.

[71] See Sedona Glossary, supra note 1, at 13.

[72] See Data dictionary, Dictonary.com, http://www.dictionary.reference.com/browse/data+dictionary (last visited Mar. 16, 2013).

[73] Sedona Database Principles, supra note 5, at 23.

[74] Id. at 25.

[75] See, e.g., Procter & Gamble Co. v. Haugen, 427 F.3d 727, 739 (10th Cir. 2005) (finding that the responding party would have to purchase a mainframe computer to download and archive the data at its own facilities or purchase the archival data from the third-party at a great cost).

[76] Judicial Conference Report, supra note 55, at C-83.

[77] However, even if portions of the data from such overwriting systems have disappeared by the time respondent acts, the court may still require production of what remains.  See, e.g., Burkybile v. Mitsubishi Motors Corp., No. 04 C 4932, 2006 WL 3191541, at *4 (N.D. Ill. Oct. 17, 2006).

[78] Sedona Principles, supra note 6, at 28.

[79] See supra Part IV.

[80] See, e.g., Conditions of Use, Sorenson Molecular Genealogy Foundation, http://www.smgf.org/terms/jspx (last visited Mar. 11, 2013); Copyright Information, HyperGeertz, http://hypergeertz.jku.at/Geertzcopyrightinformation.htm (last visited March 11, 2013); Terms of Use, massinvestor, http://www.massinvestordatabase.com/terms.php (last visited Mar. 11, 2013).

[81] See infra Part VI.D.

[82] For these reasons, the Sedona Database Principles actively discourage the use of backup tapes as a methodology.  See Sedona Database Principles, supra note 5, at 11.

[83] Dave Russell, The Broken State of Backup, Gartner, 1, 5-6, http://www.cornerstonetelephone.com/sites/default/files/resources/Gartner_-_The_Broken_State_of_Backup_(6-09).pdf (last visited Mar. 23, 2013).

[
84] See Sedona Database Principles, supra note 5, at 20.

[85] See id. at 31.

[86] Id. at 26.

[87] Id. at 19.

[88] See, e.g., Margel v. E.G.L. Gem Lab Ltd., No. 04 Civ. 1514(PAC)(HBP), 2008 WL 2224288, at *4-6 (S.D.N.Y. May 29, 2008) (ordering respondent to produce the database as well as the reports from the database because the database was not in the same form, under FRCP 34, as the reports).  But see, e.g., EEOC v. Supervalu, Inc., No. 09 CV 5637, 2010 WL 5071196, at *8 (N.D. Ill. Dec. 7, 2010) (rejecting a request that would have required creation of custom report that would have taken two weeks work where requestor could not prove that the relevancy of the data to be obtained was greater than the burden on the respondent).

[89] See, e.g., Soto v. Genentech, Inc., No. 08-60331-CIV, 2008 WL 4621832, at *12 (S.D. Fla. Oct. 17, 2008) (allowing responding party to produce detailed log of data contents in lieu of creation of custom reports that would have required approximately 64 hours of work); see also Getty Props. Corp. v. Raceway Petroleum, Inc., No. Civ. A. 99-CV-4395DMC, 2005 WL 1412134, at *4 (D.N.J. June 14, 2005).

[90] This method was originally suggested by Thomas Allman in an early and seminal review of the then brand-new 2006 ESI FRCP Amendments.  See Thomas Y. Allman, Managing Preservation Obligations After The 2006 Federal E-Discovery Amendments, 13 Rich. J.L. & Tech.. 9, 48 (2007), available at http://law.richmond.edu/jolt/v13i3/article9.pdf.

[91] See, e.g., In re Ford Motor Co., 345 F.3d 1315, 1316-17 (11th Cir. 2003); In re Lowe’s Cos., Inc., 134 S.W.3d 876, 879-80 (Tex. App. 2004).

[92] Fed. R. Civ. P. 34(a) advisory committee’s note.

[93] Sedona Database Principles, supra note 5, at 16.

[94] Id. at 17.

[95] See id. at 3.

[96] Id. at 10.

[97] Id. at 36.

[98] Sedona Database Principles, supra note 5, at 36.

[99] Fed. R. Civ. P. 34(b)(2)(E).

[100] See, e.g., Powerhouse Marks, L.L.C. v. Chi Hsin Impex, Inc., No. Civ.A.04CV73923DT, 2006 WL 83477 (E.D. Mich. Jan. 12, 2006) (showing that the defendant produced financial database by delivering 1,771 Bates stamped pages of print outs of the raw field data).

[101] See, e.g., In re eBay Seller Antitrust Litig., No. C 07–1882 JF, 2009 WL 2524502, at *2 (N.D. Cal. Aug. 17, 2009) (ordering eBay to create a new data set to produce additional responsive documents, despite its Senior Director of Data Warehouse Development’s representation that “it would take an engineer forty-eight hours to format a query, at a cost of $7,200” in order to do so).

[102] See Sedona Database Principles, supra note 5, at 37.

[103] Sedona Principles, supra note 6, at 60.

[104] See, e.g., In re Netbank Sec. Litig., 259 F.R.D. 656, 681-82, 683 (N.D. Ga. 2009); Hagenbuch v. 3B6 Sistemi Elettronici Industriali S.R.L., No. 04 C 3109, 2006 WL 665005, at *3-4 (N.D. Ill. Mar. 8, 2006).

[105] See, e.g., Camesi v. Univ. Pittsburgh Med. Ctr., No. 09–85J, 2010 WL 2104639, at *7 (W.D. Pa. May 24, 2010); see also, e.g., Chevron Corp. v. Stratus Consulting, Inc., No. 10–cv–00047-MSK-MEH, 2010 WL 3489922, at *2-4 (D. Colo. Aug. 31, 2010).

[106] See, e.g., Ojeda-Sanchez v. Bland Farms, LLC, No. CV608-096, 2009 WL 2365976, at *3 (S.D. Ga. July 31, 2009); Perez-Farias v. Global Horizons, Inc., No. CV-05-3061-MWL, 2007 WL 991747, at *3 (E.D. Wash. Mar. 30, 2007).

[107] Michael Spencer & Diana Fasching, Less Production Can be More in Database Discovery, L. Tech. News, Oct. 26, 2012.

[108] Even highly sophisticated corporations have at times experienced disastrous failures in attempting to install and use high-end database systems.  See Ericka Chickowski, Five ERP Disasters Explained, Baseline Mag., Apr. 4, 2009, available at http://www.baselinemag.com/c/a/ERP/Five-ERP-Disasters-Explained-878312/.

[109] See Sedona Principles, supra note 6, at 5.

[110] See id. at 7.

[111] See Tomlinson v. El Paso Corp., 245 F.R.D. 474, 477 (D. Colo. 2007) (requiring a party to turn over data from third-party database of ERISA information because ERISA created clear duties for the employer that negated any claim that such third party data could not be within its possession, custody or control).

[112] See Alberto G. Araiza, Electronic Discovery in the Cloud, 2011 Duke L. & Tech. Rev. 8, 33 (2011).

[113] Sedona Database Principles, supra note 5, at 34.

[114] See Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534, 538 (D. Md. 2007).

[115] Sedona Database Principles, supra note 5, at 32.

[116] See, e.g., In re Vee Vinhee, 336 B.R. 437, 447-49 (B.A.P. 9th Cir. 2005).

[117] Id. at 448-49.

[118] Id. at 448.

[119] Compare R.I. Managed Eye Care, Inc. v. Blue Cross & Blue Shield of R.I., 996 A.2d 684, 691 (R.I. 2010) (reiterating a four part test for determining the admissibility of business records under the hearsay rule), with In re Vee Vinhee, 336 B.R. at 446 (defining an eleven part test for determining the admissibility of electronic records under the hearsay rule).

[120] See Sedona Database Principles, supra note 5, at 8-9.

[121] See generally Council Directive 90/46/EC, 1995 O.J. (L 281) 39-45 (defining specific privacy protections to be afforded to personal information).

[122] See, e.g., U.S. Dept. of Commerce, Safe Harbor Privacy Principles, export.gov (July 21, 2000), http://export.gov/safeharbor/eu/eg_main_018475.asp (defining protections for U.S. citizens’ data exported to the European Union); see also Commission Decision 2000/520/EC, 2000 O.J. (L 215) 7-9 (accepting U.S. Safe Harbor Privacy Principles).

[123] See, e.g., Datenschutzgesetz 2000 [DSG 2000] Bundesgesetzblatt [BGBl] No. 165/1999, §§ 51-52 (Austria) (imposing up to a year in prison and 25,000 Euro fine per violation).

[124] Sedona Database Principles, supra note 5, 21-38.

E-Discovery as Quantum Law: Clash of Cultures-What the Future Portends

pdf_iconDownload PDF

Cite as: Michael Yager, E-Discovery as Quantum Law: Clash of Cultures—What the Future Portends, 19 RICH. J.L. & TECH 10 (2013), available at http://jolt.richmond.edu/v19i3/article10.pdf.

 

By Michael Yager*

I.  Introduction

[1]        Early in the twentieth century, the phenomenon that is the “quantum”[1] stormed the fortress of classical physics, causing Albert Einstein, one of science’s greatest thinkers, to opine, “[i]t was as if the ground had been pulled out from under one, with no firm foundation to be seen anywhere, upon which one could have built.”[2]  The theoretical laws associated with looking at reality on the quantum level violently collided with those related to looking at the same reality on the macro level.  The application of quantum theory to the mathematically pure and proven classical laws of physics introduced a cultural clash in the world of theoretical physics, which caused many physicists to doubt their very sanity.  This Article argues that developments in the law related to the phenomenon of “e-discovery”[3] have been no less shattering to those practitioners in the classical practice of law than the introduction of quantum theory in physics.  The introduction of “electronically stored information” or “ESI” using the procedural rules designed to govern the classical practice of law created an identifiable shift in jurisprudence related to e-discovery.[4]  Indeed, the introduction of this category of discoverable information caused a cultural explosion within a segment of the legal profession not seen in any other profession since those great thinkers of physics nearly a century ago.

[2]        This Article provides an overview of the clash of cultures extant in the practice of e-discovery related law today along with an entertaining comparative perspective from the viewpoint of a similar clash that occurred in the physical sciences.  The author hopes that by understanding more fully some of the causes of practitioner angst in managing e-discovery obligations, along with a glimpse of what trends can be expected in the future, this phenomenon can be better confronted and managed.

 

II.  Discussion

[3]        Changes in the law are most often driven by reasoned debate over a period of some time and carefully, if not cautiously, embraced by the bench.  Drama is by and large a stranger to the doorstep of the law, except for those moments that attend some social or economic issue with political import, and for the most part is incompatible with the plodding evolution of jurisprudence.  With complete awareness of and respect for the reality comprising the beautifully crafted portrait of the law, which was accomplished over hundreds of years by the many practitioners and judges using the most considerate strokes of the brush, this Article introduces a moment of drama.

[4]        Cultural explosions come in many colors and stripes.  In Europe, the French Revolution comes to mind.  In America, the emergence of an anti-government, anti-authority culture reflected in unprecedented massive national demonstrations across the landscape during the Vietnam War comes to mind.  Few would argue that these two examples do not reflect the clash of cultures between two different worlds of values and beliefs.

[5]        In the classical practice of law, one would expect to find a more subtle representation of such a clash aside from the guillotine of the French Revolution or the Kent State tragedy that captured the culture clash of noble protectors of freedom and dirty hippies protesting without a permit.  While a single image may not express the violence that often accompanies socio-cultural explosions within a nation’s history, its representation of the clash of worldviews can be no less dramatic.  The graphic presented as part of the article “Sanctions for E-Discovery Violations: By the Numbers” published in the Duke Law Journal in 2010 is one such representation. [5]  This graphic, reproduced in the Appendix, shows the increase in the number of cases in which e-discovery related sanctions were sought.[6]  Like the recording instruments of the first experiments in the early days of quantum physics, the explosion documented by this graphic, although not representative of physical violence, paints a portrait of an earth-shattering cultural clash within the realms of classical law and quantum law.

 

III.  A Clash of Cultures

[6]        The classical culture and practice of law are best captured in the days before the FRCP and the 2006 Amendments brought ESI to life.  As with isolated early experimental results in quantum physics, there are instances where courts acted on discovery abuses relating to ESI before those now hallowed amendments found their way onto the pages of the FRCP.[7]  Just like the early theories and experiments in quantum physics, these decisions were mere drops of rain on a landscape that was soon to experience the torrent of a flash flood running beyond the banks of a reasoned river of e-discovery related jurisprudence.

[7]        In “classical law,” discovery was something most often managed down the road after litigators were convinced that a relatively swift resolution of the merits by settlement would not take place short of moving on to more serious stages of the litigation life cycle.  E-discovery was often viewed as one of the steps toward the more deliberate moments of litigation, carrying with it a classical gravity of a sort.  While the FRCP and many state rules before the advent of ESI spoke to the duty of evidence preservation, one is hard pressed to identify more than a handful of litigation hold letters or memoranda from an attorney to a client amongst the tens of thousands of cases litigated before the year 2000.[8]  As the Duke Law Journal graphic indicates, a culture clash surrounding discovery motions practice emerges with ESI and the development of jurisprudence related to discovery preservation and spoliation, the phenomenon of “quantum law.”[9]  The graphic, however, is telling in that with the introduction of ESI into the FRCP, there was a brilliant clash of cultures between classical law and quantum law.  History will determine whether quantum law finds its etiology in the bench, the bar, or a combination of the two, but something continues to drive it in ample measure in the present.

[8]        Indeed, while conducting e-discovery CLEs, references to the Duke Law Journal graphic are accompanied with a simple question: “Why?”[10]  Why, on this graphic of discovery motions practice is over a quarter of a century of relatively flat, nearly negligible bars followed by an explosion of sanctions in the last six to eight years?  If the FRCP were amended, for example, to change the number of days allowed for mailing a response to discovery, or for the filing of an answer to a complaint, would we witness similar widespread non-compliance by attorneys?

[9]        The clash of cultures related to the phenomenon of quantum law has not escaped notice.  As with the introduction of quantum theory in physics, jurisprudence related to e-discovery has slowly begun to spawn incredulous observations.  This incredulity of the present clash is well captured in some of the comments fr
om its historical counterpart in physics.  “The more I think about the physical portion of the Schrödinger theory, the more repulsive I find it,” Werner Heisenberg fulminated.[11]  Indeed, Schrödinger seemed to agree with him, exclaiming at one point that, “[i]f all this damned quantum jumping were really here to stay, I should be sorry I ever got involved with quantum theory.”[12]  Today, running on a course parallel to those esteemed scientists’ remarks, one can almost sense the same level of abject disbelief in the words of numerous court decisions resulting from the clash of cultures between classical law and quantum law.  One is particularly poignant:

Once again, this Court is required to rule on an e-discovery issue that could have been avoided had the parties had the good sense to “meet and confer,” “cooperate” and generally make every effort to “communicate” as to the form in which ESI would be produced.  The quoted words are found in opinion after opinion and yet lawyers fail to take the necessary steps to fulfill their obligations to each other and to the court.[13]

[10]      Certain words in these decisions seem to reflect judicial rumination on the quantum law phenomenon and point to a biting and unflattering analysis.  “[L]awyers—even highly respected private lawyers . . . need to make greater efforts to comply with the expectations that courts now demand of counsel with respect to expensive and time-consuming document production.  Lawyers are all too ready to point the finger at the courts and the Rules . . . .”[14]  In the title of his article, “‘Do I Really Have To Do That?’ Rule 26(a)(1) Disclosures and Electronic Information,” United States Magistrate Judge David J. Waxse succinctly captured the attitude of practitioners of classical law who continue to be buffeted by the requirements and impact of ESI.[15]  So widespread is this crash of clashing of cultures that Judge Waxse observed that such disbelief “echo[ed] around the litigation world.”[16]  Practitioners are also taking notice.

[11]      Ralph Losey, an attorney who phased out his general trial practice to fully engage in the e-discovery world, “quickly noticed something [he] had not seen before in any other field of law. . . . case law is dominated by sanctions cases involving spoliation of evidence. . . . [and] attorneys are often directly implicated in this spoliation.”[17]  Losey expressed early wonderment at the world of quantum law, “wonder[ing] if [he] had stepped into a crazy zone of the law.”[18]  Brad Harris and Craig Ball—the former an expert practitioner and the latter an attorney and one of the foremost national experts on e-discovery law—suggest that “[t]he growing urgency of this matter . . . touched off a flurry of rulings in the area of legal holds in 2010, with several major court decisions redrawing the map in what had been virtual terra incognita.”[19]

[12]      In the laboratory of quantum law, the results of the “experiments” in the form of an exploding ESI-related motions practice and resulting sanctions were often so bizarre that practitioners of classical law simply refused to accept what was before them.  Up seems to become down and far away now seems too close to bear.  The world of classical law is askew as if stretching to the forces of some unseen black hole.[20]  Simple basic tenets of law steeped in tradition are becoming seemingly meaningless in the world of quantum law.  The bedrock principles of stare decisis and the influence of nonbinding precedence hold no sway in this clash of cultures.  Practitioners now hear that an e-discovery spoliation decision made by a judge in New York’s Southern District might bear on how they should manage discovery in their district in the Fourth or Ninth Circuit.[21]  Respected counsel from respected firms, albeit of the newly emerging practitioner class of quantum law, write things about a single decision by a single judge “promis[ing] to significantly affect the way e-discovery is practiced and litigated in the federal courts.”[22]  Classical law practitioners’ reactions are deep seated and visceral.

[13]      I recall a dear friend a well-seasoned litigator summoning me to a lunch one day shortly after the release of the FRCP 2006 Amendments and the resulting written and reported smatterings of happenings from the world of quantum law began to appear.[23]  My friend inquired: “Do you believe this is something here to stay or just the latest judicial fad?”  I opined that perhaps what we were seeing belonged to the former rather than the latter category, which was answered by a look of despondency. With a panic stricken countenance in stark dissonance to
the once confident and charismatic litigator I had known for many years, my friend exclaimed: “I don’t care what a federal judge tells me to do about this so-called e-discovery.  I am simply not going to do it.  They cannot make my client incur all of these ridiculous costs!”  This was a response that well reflects the anguish that the simple term “ESI” introduced to the world of classical law.  Many classical practitioners felt, for the first time in perhaps storied careers, that the legal landscape over which they had exercised such command and control assumed a foreign and threatening shape.  Their refusal to acknowledge and accept what was fast becoming a new force in litigation to be reckoned with, I suggest, contributed to the phenomenon so well captured by the Duke Law Journal graphic.  It certainly did not escape notice of the editors of the Federal Judicial Center, who noted in the preface to Managing Discovery of Electronic Information: A Pocket Guide for Judges that:

This second edition of the pocket guide on the discovery of electronically stored information (ESI) follows the first—and the related 2006 amendments to the Federal Rules—by more than five years.  These intervening years have seen an explosion of civil case law on ESI.[24]

[14]      While there is room for debate as to the etiology behind this explosion and the reasons behind such wholesale resistance of one culture to another, there can be little doubt that regardless of what we can, tongue in cheek, term the “uncertainty principle”[25] as to a precise description of the cause of the phenomenon before us, before us it is.  Before us, it remains.

[15]      Notwithstanding some observations that suggest even a hint of reconciliation between classical law and quantum law, such reconciliation remains much sought after.  Its elusiveness caused Magistrate Judge John M. Facciola of the United States District Court of the District of Columbia to opine that, “[w]hen the dust settles 10 years from now and the scholars sit down cooperation will be seen as the most significant development from e-discovery.”[26]  Obviously, Judge Facciola believes that cooperation among counsel will resolve the effects that the clash of cultures caused and restore some sense of balance to what has been a tumultuous world of litigation since the advent of ESI.  This sentiment echoes a law firm blog entry a few years ago entitled “Sanctions Down; Cooperation Up; Preservation, Privacy and Social Media Remain Challenging.”[27]  In this blog entry, the authors draw a silver lining around a drop in the number of requests for sanctions in 2010 as compared with 2009, believing it “reflects greater adeptness by litigants and counsel in e-discovery practice and broader acceptance of cooperation and openness in the e-discovery process.”[28]  The statistics, however, carry with them that seemingly contradictory component typified by the clash of theories in classical and quantum physics.  Any hint of resolution or cooperation between the classical and quantum worlds always seems to leave a statistical “outlier”[29] that defies ultimate peace between the two different approaches of looking at th
e same world.[30]

[16]      While noting the drop, albeit slight, in requests for sanctions and the corresponding sanction decisions, a statistical anomaly that challenges what seems to be on the surface some promising data confronts the authors of the blog on the theme of cooperation increasing in e-discovery.[31]  “Although requests for sanctions decreased, motions to compel more than doubled in 2010, being filed in 43% of all e-discovery cases as opposed to 20% in 2009.”[32]  Like their counterparts in theoretical physics grappling with a bothersome experimental result to a hoped for theory, the blog authors suggest an explanation consistent with the proposed model of cooperation.[33]  To paraphrase, court intervention was sought on only a small number of e-discovery issues in which counsel could not agree with the intimation because this occurred after much cooperation.[34]

[17]      But to some observers, these “laboratory results” from the world of quantum law which indicate a doubling in motions to compel in 2010 with motions filed in “43% of all e-discovery cases” may not be as accommodating or optimistic. [35]  Indeed, it is a difficult argument to make that the spirit of cooperation between counsel, the suggested cause of the decreased number of sanctions, is more strongly attached to attorney behavior than perhaps a growing judicial discretion at the bench in meting them out. [36]  It would seem that the same spirit of cooperation which led to a fewer number of requests for sanctions might be expected to play out at the motions practice level, which is driven solely by attorneys.  It might be a stretch to attribute the doubling in the number of motions to compel in e-discovery cases to counsel who were doing their best to cooperate but got hung up on the narrow technicalities of an e-discovery agreement, otherwise known as a “gosh, we all just missed that” moment.  Filing a motion to compel was simply their last resort.  The data suggest otherwise.[37]

[18]      To attribute a significant learning curve in the ranks of counsel to a decrease in the number of sanctions requested and sanctions ordered would be an understandable rush to judgment in the hope of some promising sign that the tide of the cultural clash is beginning to recede.  One might similarly be impressed by the Equal Employment Opportunity Commission (“EEOC”) Performance and Accountability Report for the 2012 fiscal year, which indicates that the federal government is filing fewer lawsuits against companies.[38]  One could infer from this statistic alone that companies are learning how to better comply with the EEOC requirements for establishing non-discriminatory work environments.  As with the 2010 decrease in the number of e-discovery sanctions, there is an outlier to the decreasing number of lawsuits filed by the EEOC.  “[T]he number of systemic discrimination investigations has increased four-fold.”[39]  At the recent Georgetown Law Advanced E-Discovery Institute annual conference held in November 2012, one observer noted that frustration among the bench with lack of attorney cooperation continues:

Collectively, the group [of Judges] expressed frustration that lawyers were not taking the lead in EDD disputes, and thus, in essence, forcing the judges—rather than the parties themselves—to determine protocols and strategies.  The judges pushed several dominant themes: the need for lawyers to take the “meet and confer” obligations seriously; to educate themselves on technology options; and to be reasonable and realistic about e-discovery protocols . . . .[40]

[19]      This hardly sounds like growing sophistication and cooperation in the world of quantum law.  Rather, it is as if the clash of cultures is still in its infancy, reflecting the reality captured a few years ago in a Federal Judicial Center survey, that “only one in three respondents reported that their 26(f) conference to plan discovery included a discussion of ESI.  More than half of all respondents reported that the conference did not include discussion of ESI.”[41]

 

IV.  What the Future Portends

[20]      In discussing alternative explanations for the conflicting e-discovery data referenced above, it is possible in some measure to argue what the immediate future portends with regard to the practice of the e-discovery component of law and the continuing clash of cultures.  The following loom on the horizon:

A.  A Continuing Increase in E-Discovery Motions Practice 

[21]      A growing number of attorneys, particularly at larger firms or with more sophisticated practices, are becoming increasingly adept at the practice of e-discovery and learning how to better comply with court expectations.  Various federal circuits have initiated programs or local rules which, for the first time, set forth standardized expectations required of counsel.  This had led to an appearance of greater cooperation.  The Suggested Protocol for Discovery of Electronically Stored Information in the U.S. District Court, District of Maryland, and the Seventh Circuit’s Electronic Discovery Pilot Program are two such examples.[42]  More attorneys are attempting to comply with local rules and procedures with regard to e-discovery simply because some now exist where before there were none.

[22]      Litigation practitioners are putting to good use the resulting learning curve among attorneys indexed to increased participation in the e-discovery agreements required by local rules.  But far from meaningful cooperation in resolving e-discovery issues, the doubling of motions practice from 2009 to 2010 and from 2011 to 2012 speaks volumes about what is really occurring.[43]  Practitioners are becoming increasingly skilled and savvy in attempting to leverage the e-discovery advantage to tip the scales in their clients’ favor.[44]  It is much more likely that the doubling of motions to compel reflects this reality of the litigation process.[45]  As participants in an adversarial process, litigators realize that they are advocating on behalf of their client and were not retained to enter the calmer waters of mediation practice.  The future will carry this trend forward as more practitioners become aware that many federal and state courts will impose sanctions against adversaries vulnerable to the dynamic ESI legal environment.  Moreover, the trending of an increase in the imposition of sanctions will result in growing attempts by counsel to leverage this potential tactical advantage in the courtroom.[46]

B.  Double-Dip Inflation in E-Discovery Practice 

[23]      While the American economy is haunted by the threat of double dipping back into a recessionary spiral, e-discovery practice is poised to experience the opposite economic effect.  Indeed, e-discovery is poised to double-dip back into the inflationary spiral that the first clash of quantum law caused, which is a clash that saw the early and memorable monolithic sanctions dispensed in such cases as Qualcomm and Zubulake.[47]  Many of the largest law firms and major e-discovery vendors cut their teeth on these magnificently large and complex cases.  This was the playing field of much of the early e-discovery law.  The practitioners involved in these types of cases are those that experienced the greatest knowledge building within the often-intimidating world of law associated with e-discovery practice.

[24]      As quantum law has made itself known as a practice, there is a growing awareness on the part of many counsel in how to leverage what can be termed the patterns of exposure characterizing e-discovery law.  “Patterns of exposure” have to do with the breadth and depth of e-discovery law on a variety of issues.  As an example, the law relating to the issuance of written litigation finds a hom
e in many federal circuits and thus the pattern of exposure in litigation practice in any circuit is enormous.  Whereas, more specific and narrowly detailed opinions such as Phillip M. Adams & Associates, L.L.C. v. Winbond Electronics Corp., in which the court stated that one of the parties should have anticipated litigation based on other lawsuits happening in the industry, cannot be said to have created a significant exposure footprint; despite being bothersome, the exposure pattern is more slight.[48]

[25]      Newly enlightened practitioners in the art of e-discovery leveraging will see to it that the attendant motions practice and sanctions that confronted early practitioners will bleed down to the small or medium practices and cases.[49]

C.  Growth of the Pool of E-Discovery Victims 

[26]      As the bleed down phenomenon of e-discovery cases runs more quickly from the mountains of large firms and practices to the surrounding hills of the smaller litigation landscape, the borders of e-discovery motions practice will expand beyond those large firms and large cases to include many more victims.  The pool of law firms confronting the exponentially growing world of ESI and its permeation into every corner of litigation of every conceivable size is growing.[50]  Indeed, for every law firm that is developing an acute awareness of the nuances of e-discovery law and of the expertise, both legal and practical, with which to navigate these arguably treacherous waters, there are others that have not.  This is a victim pool.  During the introduction of quantum theories, the scientific method required that the same phenomenon tested in a different laboratory setting must yield the same results.  Results that were incompatible with classical physics eventually overwhelmed it.  Similarly, the early cycle of quantum law will find new life and live again with the growth of the e-discovery victim pool, foreshadowing a growing motions practice and number of associated sanctions with this expanding pool of smaller firms and cases.

D.  An Eventual Flattening of the E-Discovery Motions Practice and Sanctions 

[27]      The relatively recent pushback against rising e-discovery costs by companies of all sizes is a pushback against and a modifying force to the clash of quantum law.  As with the downstream effect of growing e-discovery motions practice, this pushback will reach the newer practitioners who attempt to leverage this power as well.  This reality will be more responsible for cooperation among counsel than the hope that litigators reach some mythic plateau of altruism as noble officers of the court.  Also, as the next cycle of e-discovery practice bleeds down to a larger “victim pool” and runs its course, it should result in a certain equilibrium among practitioners who will know how to better manage the patterns of exposure attendant to ESI and the resulting portrait in jurisprudence related to e-discovery. 

 

V.  Conclusion 

[28]      Rather than doubting intuition, practitioners should heed the lessons of the introduction of quantum physics while observing the changing landscape in e-discovery that results from the clash of cultures between classical law and quantum law.  It may be comforting to classical practitioners that although quantum physics has yet to find a permanent home within the world of its classical counterpart, both now work side by side in what is seen as a quest of mutual interest of explaining the physical universe.  Each acknowledges the other’s legitimate role in the total picture and many of the early conflicts have been resolved.  In time, quantum law will reach equilibrium with classical law and e-discovery practices will become as predictable and acceptable as the filing of a motion in limine or a motion for summary judgment.

Appendix: Figure 1

appendix Figure 1[51]


*Michael Yager is the Director of e-Discovery for Spotts Fain, PC located in Richmond, Virginia.  The author would like to acknowledge with thanks the contributions of Robert H. Chappell, III, and Robert D. Michaux, for applying their considerable editing skills to the manuscript.

[1] “Quantum” is a term introduced by physicist Max Planck in 1900 to describe individual packets of energy as he worked on an equation which represented energy loss in his famous blackbody radiation experiments.  While physics historians spend much effort on the precise etiology of the term as used by physicists, it is widely agreed among them that Planck is best tagged as the father of the quantum.  See David Thyberg, Max Plank’s Quantum Theory, eHow, http://www.ehow.com/about_5439341_max-plancks-quantum-theory.html (last visited Feb. 4, 2013).

[2] Manjit Kumar, Quantum: Einstein, Bohr and the Great Debate About the Nature of Reality 1 (Icon Books Ltd. 2009) (2008).

[3] The term “e-discovery” is shorthand for “electronic discovery.”  For a phenomenon not far out of its infancy, it is not unusual to see a variety of terms come and go.  “EDD” was an early favorite of many, standing for “electronic data discovery.”  Both terms broadly refer to all of the elements of discovery which attend electronically stored information.

[4] The Federal Rules of Civil Procedure (“FRCP”) were amended in 2006 to introduce this new category, “electronically stored information,” as material to be preserved as part of a party’s discovery obligations.  See K&L Gates, E-Discovery Amendments to the Federal Rules of Civil Procedure go into Effect Today, Elec. Discovery L. (Dec. 1, 2006, 2:27 PM), http://www.ediscoverylaw.com/2006/12/articles/news-updates/ediscovery-amendments-to-the-federal-rules-of-civil-procedure-go-into-effect-today/.

[5] Dan H. Willoughby, Jr. et al., Sanctions for E-Discovery Violations: By the Numbers, 60 Duke L. J. 789, 795 fig.1 (2010).

[6] See infra Appendix: Figure 1.

[7] Compare Ill. Tool Works, Inc. v. Metro Mark Prods., Ltd., 43 F. Supp. 2d 951, 953, 960-61 (N.D. Ill. 1999) (holding that sanctions against defendants in misappropriation of trade secrets action were warranted for violation of discovery order by tampering with computer that had been ordered to be produced), with Koken v. Black & Veatch Constr., Inc., 426 F.3d 39, 53 (1st Cir. 2005) (finding that the district court did not abuse its discretion by refusing to impose monetary sanctions for party’s alleged failure to timely provide documents, particularly electronic documents, during discovery).

[8] Litigation hold letters, also known as legal holds, are instruments, most often an email or correspondence, issued from counsel and/or company management to individuals identified as likely custodians of potentially relevant ESI (as well as paper documents) in an action, or an anticipated action.  Each custodian will have numerous potential data locations that must be preserved and the litigation hold speaks to this in general and specific terms.

[9] See Willoughby et al., supra note 5.

[10] The author is the instructor of The E-Discovery Challenge: Practice and Ethics, Virginia Mandatory Continuing Legal Education, Course No. JAA0017, in which he discusses this graphic
.

[11] Kumar, supra note 2, at 155.

[12] Id.

[13] Nat’l Day Laborer Org. Network v. U.S. Immigration & Customs Enforcement Agency, No. 10 Civ. 3488(SAS), at 25 (S.D.N.Y. Feb. 7, 2011), available at http://ccrjustice.org/files/Doc%2041%202-7-11%20Opinion%20and%20Order%20re%20Form%20of%20Production.pdf, withdrawn, 2011 WL 381625 (June 17, 2011).

[14] Id.

[15] David J. Waxse, “Do I Really Have To Do That?” Rule 26(a)(1) Disclosures and Electronic Information, 10 Rich. J.L. & Tech. 50 (2004), at http://law.richmond.edu/jolt/v10i5/article50.pdf.

[16] Id. at ¶ 8.

[17] Ralph Losey, Ethics of Electronic Discovery – Part One, e-Discovery Team (Mar. 4, 2012, 9:18 PM), http://e-discoveryteam.com/2012/03/04/ethics-of-electronic-discovery-part-one/.

[18] Id.

[19] Brad Harris & Craig Ball, What’s There to Hold On To? An Enlightened Approach to Data Preservation in the Era of the Legal Hold, Corp. Couns., Feb. 14, 2011.

[20] “Black holes” are phenomena known in physics which describe an area of space in which the gravity is so great that all matter around it literally swirls down it into nothingness.  Not even light can escape. See generally Stephen W. Hawking, A Brief History of Time: From the Big Bang to Black Holes 81-82 (1988) (discussing this marvel of science).

[21] See, e.g., Philip Yannella & Abraham Rein, Zubulake Revisited: Pension Committee Decision Offers Spoliation Guidance, Dechert LLP, http://www.dechert.com/files/Publication/aa5656f7-126b-404d-8f1d-d4905fe60d7f/Presentation/PublicationAttachment/04cbec1f-b3b5-435a-8085-dd7bee3d5ee7/2-10_PROD-LIAB_Yannella_Rein_Zubulake_Revisited.pdf (last visited Feb. 4, 2013) (discussing Pension Comm. of the Univ. of Montreal Pension Plan v. Banc of Am. Sec., L.L.C., 685 F. Supp. 2d 456, 464-69 (S.D.N.Y. 2010), abrogated by Chin v. Port Auth. of N.Y. & N.J., 685 F.3d 135 (2d Cir. 2012)).

[22] Yannella & Rein, supra note 21.

[23] See Victor Stanley, Inc. v. Creative Pipe, Inc., 250 F.R.D. 251, 253 (D. Md. 2008); In re Subpoena Duces Tecum to AOL, L.L.C., 550 F. Supp. 2d 606, 608-09 (E.D. Va. 2008); Nucor Corp. v. Bell, 251 F.R.D. 191, 192 (D.S.C. 2008); Qualcomm Inc. v. Broadcom Corp., No. 05cv1958-B (BLM), 2008 WL 66932, at *2-3 (S.D. Cal. Jan. 7, 2008); PSEG Power N.Y., Inc. v. Alberici Constructors, Inc., No. 1:05-CV-657 (DNH/RFT), 2007 WL 2687670, at *1 (N.D.N.Y. Sept. 7, 2007); Modern Eng’g, Inc. v. Peterson, No. 07-CV-1055, 2007 WL 2680563, at *2 (C.D. Ill. July 16, 2007); Strauss v. Credit Lyonnais, S.A., 242 F.R.D. 199, 205 (E.D.N.Y. May 25, 2007); Calyon v. Mizuho Sec. USA Inc., No. 07CIV02241RODF, 2007 WL 1468889, at *1 (S.D.N.Y. May 18, 2007); Hagenbuch v. 3B6 Sistemi Elettronici, No. 04 C 3109, 2005 WL 6246195, at *1 (N.D. Ill. Sept. 12, 2005); Zubulake v. UBS Warburg, L.L.C., 229 F.R.D. 422, 424 (S.D.N.Y. 2004).

[24] Barbara J. Rothstein, Ronald J. Hedges & Elizabeth C. Wiggins, Managing Discovery of Electronic Information: A Pocket Guide for Judges 1 (2012), available at http://www.fjc.gov/public/pdf.nsf/lookup/eldscpkt2d_eb.pdf/$file/eldscpkt2d_eb.pdf.

[25] See generally Kumar, supra note 2, at 232.  The “uncertainty principle” was developed by one of quantum physics’ great contributors, Werner Heisenberg, who postulated the theory that quantum mechanics “forbids, at any given moment, the precise determination of both the position and the momentum of a particle.”  Id.  It was not possible to know one, without increasing the uncertainty in knowledge about the other.  Id.

[26] Michael Roach, Judge Facciola Addresses Competency, Ethics, and E-Discovery, L. Tech. News, June 22, 2012.

[27] Bennett B. Borden et al., Sanctions down; Cooperation up; Preservation, Privacy and Social Media Remain Challenging, Williams Mullen (Dec. 17, 2010), http://www.williamsmullen.com/news/sanctions-down-cooperation-preservation-privacy-and-social-media-remain-challenging.

[28] Id.

[29] An “outlier” is a statistical anomaly outside a group of otherwise patterned observation. See Webster’s Third New International Dictionary 1602 (Philip Babcock Gove ed., Merriam-Webster Inc. 2002) (defining “outlier” as “something that . . . is situated . . . away from a main or related body: as . . . a statistical observation not homogeneous in value with others of a sample”).

[30] See Sue Reisinger, Kroll Study Sees Dramatic Drop in E-discovery Sanctions, Corp. Couns., Dec. 6, 2012, http://www.law.com/corporatecounsel/PubArticleCC.jsp?id=1202580414356&Kroll_Study_Sees_Dramatic_Drop_in_Ediscovery_Sanctions.  Reisinger seems to make a similar stretch by suggesting that an attorney “learning curve is evident because the percent of prominent cases that imposed sanctions on parties, which had been on the rise, actually declined a whopping 10 percent in 2012, according to Kroll. . . . The [Kroll] survey, which used a non-scientific sampling of 70 major cases, found that the number of procedural disputes more than doubled over last year’s figures.”  Id.  Again, the outlier.  It is interesting that the statistics for Reisinger’s 2011-2012 comparison mirror the results of the Borden article two years earlier.  See Borden et al., supra note 27.  Thus, a more than doubling of e-discovery motions practice from 2009 to 2010, and again from 2011 to 2012.

[31] See Borden et al., supra note 27.

[32] Id.

[33] See id.

[34] See id.

[35] Id.

[36] See Borden et al., supra note 27.

[37] See id.

[38] See Sue Reisinger, EEOC 2012 Report Shows Fewer Discrimination Suits, More Investigations, Corp. Couns., Nov. 30, 2012, http://www.law.com/corporatecounsel/PubArticleCC.jsp?id=1202579787314&EEOC_2012_Report_Shows_Fewer_Discrimination_Suits_More_Investigations&slreturn=20130014154033.

[39] Id.

[40] Monica Bay, Impatient Judges Push Lawyers to Dive into E-Discovery, L. Tech. News, Dec. 7, 2012, http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202580623520&Impatient_Judges_Push_Lawyers_to_Dive_Into_Ediscovery.

[41] Patrick Oot, Anne Kershaw & Herbert L. Roitblat, Mandating Reasonableness in a Reasonable Inquiry, 87 Denv. U. L. Rev. 533, 539 (2010) (citing Emery G. Lee III & Thomas E. Willging, Federal Judicial Center National, Case-Based Civil Rules Survey: Preliminary Report to the Judicial Conference Advisory Committee on Civil Rules, Fed. Jud. Center 1, 15 (Oct. 2009), http://www.fjc.gov/public/pdf.nsf/lookup/dissurv1.pdf/$file/dissurv1.pdf).

[42] See, e.g., Suggested Protocol for Discovery of Electronically Stored Information (“ESI”), United States District Court for the District of Maryland, available at http://www.mdd.uscourts.gov/news/news/ESIProtocol.pdf (last visited Feb. 4, 2013); Principles Relating to the Discovery of Electronically Stored Information, 7th Circuit Electronic Discovery Committee (Aug. 1, 201
0), available at http://www.discoverypilot.com/sites/default/files/Principles8_10.pdf.

[43] See Borden et al., supra note 27; Reisinger, supra note 30.

[44] See Ralph Losey, E-Discovery Gamers: Join Me in Stopping Them, e-Discovery Team (June 3, 2012, 6:01 AM), http://e-discoveryteam.com/2012/06/03/e-discovery-gamers-join-me-in-stopping-them/.

[45] See 2011 Mid-Year E-Discovery Update, Gibson Dunn 1-2 (July 22, 2011), http://www.gibsondunn.com/publications/Documents/2011Mid-YearE-DiscoveryUpdate.pdf.

[46] The author has personally witnessed settlements ensuing quickly after a party realizes, often too late to be cured, that a potentially costly, if not fatal, e-discovery mishap yielded the adverse party a trump card.

[47] Qualcomm Inc. v. Broadcom Corp., No. 05CV1958-B (BLM), 2008 WL 66932 (S.D. Cal. Jan. 7, 2008), vacated in part, No. 05CV1958-RMB (BLM), 2008 WL 638108, 88 U.S.P.Q.2d (BNA) 1169 (S.D. Cal. Mar. 5, 2008); Zubulake v. UBS Warburg, L.L.C., 229 F.R.D. 422 (S.D.N.Y. 2004).

[48] Phillip M. Adams & Assocs., L.L.C. v. Winbond Elecs. Corp., No. 1:05-CV-64 TS, 2010 U.S. Dist. LEXIS 85120, at *12-13, *15-16 (D. Utah Aug. 17, 2010).

[49] Broadly speaking, practitioners at small and medium sized firms have escaped confronting the challenge that is quantum law in their practices while their colleagues at larger firms managing mega cases bore the brunt of this phenomenon in its early days. See generally Richard N. Lettieri, Mid-to-Small Law Firm Alert: Overcoming the Growing E-Discovery “Skill Gap”, The Advocate, Feb. 2012, at 12-14, available at http://www.lettierilaw.com/documents/the_advocate_02_2012.pdf.

[50] See id. at 13-14.

[51] Willoughby et al., supra note 5.

Page 6 of 8

Powered by WordPress & Theme by Anders Norén