\u00a0<\/span><\/em><\/p>\nI have never been a fan of agreeing to the use of predictive coding in ESI Protocols. I do not believe such agreements are\u00a0required at all by the Federal Rules of Civil Procedure. The issue is whether or not a production is adequate. That requires the requesting party offering evidence that the production is somehow delinquent with facts. That discussion does not happen without first having a production.<\/p>\n
Parties do not have a veto power over which review application is used by a reviewing party and what features they may or may not use. \u00a0The requesting party should not attack a review methodology, unless there is a production to challenge. The entire discussion is premature and the issue is not ripe for the Court.<\/p>\n
In the case at bar, the original dataset was narrowed by search terms to 565,000 “hits” from the original 1.8 million dataset. This search term methodology had been agreed to in an ESI Protocol by the parties. After one month of document review, the producing party realized that it could take 6 to 8 months to manually review the narrowed dataset for responsiveness or privilege. The party unilaterally decided to use predictive coding instead. Moreover, after telling the other side about their change in technology, motion practice followed.\u00a0Progressive Cas. Ins. Co. v. Delaney<\/em>,<\/em> 2014 U.S. Dist. LEXIS 69166.<\/p>\nThe Requesting Party wanted the Producing Party to 1) produce\u00a0the 565,000 culled from\u00a0the 1.8 million data set using the parties’ agreed-upon search terms subject to a clawback for\u00a0privileged documents, or 2) the Producing Party apply the predictive coding methodology to the entire 1.8 million record dataset.\u00a0Progressive,<\/em>\u00a0at *12 and *15.<\/p>\nThe Producing Party did not want to do either approach, specifically concerned that searching the entire dataset would result in a larger privilege review.<\/p>\n
The Court noted what has been judge-made law on using technology assisted review:\u00a0Courts\u00a0require the producing party to provide the requesting party with “full disclosure about the\u00a0technology used, the process, and the methodology, including the documents used to “train” the\u00a0computer.”\u00a0Progressive,<\/em> at *27-28, citing Da Silva Moore<\/em>\u00a02012 U.S. Dist. LEXIS 23550 (S.D.N.Y. Feb. 24, 2012).<\/p>\nThe Court ordered the producing party to follow the original agreed to protocol and\u00a0produce the “hit”\u00a0documents to the Requesting Party\u00a0within fourteen days without further review.\u00a0Progressive,<\/em>\u00a0at *30.<\/p>\nThe Court stated that following the Requesting Party’s protocol, the cost of review would be shifted to them.\u00a0Progressive,<\/em>\u00a0at *31. Moreover, the Requesting Party believed they had the manpower to complete the review within one month. Id.\u00a0<\/em><\/p>\nThe Requesting Party could apply privilege filters before production and produce a privilege log. Id.\u00a0<\/em><\/p>\nBow Tie Thoughts<\/strong><\/p>\nI do\u00a0not\u00a0encourage clients to have ESI Protocols that limit their ability to review discovery efficiently. I also strongly argue against the idea you need approval from the opposing party on what search methodology you can use to identify responsive discovery. It is the producing party’s right to use keywords, concept search, visual analytics, email threading, clustering, find similar, or any other form of technology-assisted review. That includes predictive coding. The requesting party does not get a veto power over what technology the producing party can use. The requesting party has \u201cthe burden of proving that a discovery response is inadequate.”\u00a0<\/em>Abt v. Jewell,<\/em> 2014 U.S. Dist. LEXIS 50766, 12-14 (D.D.C. Apr. 11, 2014), citing Barnes v. D.C.<\/em>, 289 F.R.D. 1, 6 (D.D.C. 2012) and Equal Rights Ctr. v. Post Props., Inc.,<\/em> 246 F.R.D. 29, 32 (D.D.C. 2007).<\/p>\nYou cannot prove a discovery response is inadequate if you do not have a discovery response. The entire idea of attacking the use of predictive coding is premature if there is no production to be reviewed.<\/p>\n
The ugly wrinkle in this case is the search and production methodology mandated in the ESI Protocol agreed to by the parties. I strongly encourage parties to not agree to actual technological steps to be used, because it limits the ability to conduct discovery in a cost effective manner. These agreements are often enacted without the advice of an eDiscovery Consultant who knows how the actual technology works.<\/p>\n
What parties should discuss and codify in an ESI Protocol is the subject matter of the lawsuit. Who are the key players? What are the relevant date ranges? What are the terms of art used by the parties? What is the data actually making up the case? Those, and many others, are the topics parties need to agree to, not whether you can use\u00a0visual analytics to identify date ranges or data clustering to determine what was relevant.<\/p>\n
The use of predictive coding has been twisted because lawyers think they need permission to use it. They do not. The burden is on the opposing side to prove a production was inadequate, not the fact the producing party used one form of technology-assisted review over another.<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Fighting over discovery search methodology makes me think of President Richard Nixon’s resignation speech: “Always remember, there are those who hate you. And the only way to keep them from winning is to hate them right back. And then you destroy yourself.” Attacking a party who used predictive coding to[…]<\/p>\n","protected":false},"author":2,"featured_media":6834,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[36,40,140,100,124],"tags":[217,225,229],"class_list":["post-6828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-document-review","category-e-discovery","category-predictive-coding-technology-assisted-review","category-privilege-review","category-technology-assisted-review","tag-predictive-coding","tag-request-for-production","tag-search-terms"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/bowtielaw.com\/wp-content\/uploads\/2014\/05\/richardnixonstamp.jpg?fit=564%2C851&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7kqH7-1M8","jetpack-related-posts":[],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/posts\/6828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/comments?post=6828"}],"version-history":[{"count":1,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/posts\/6828\/revisions"}],"predecessor-version":[{"id":8118,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/posts\/6828\/revisions\/8118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/media\/6834"}],"wp:attachment":[{"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/media?parent=6828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/categories?post=6828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bowtielaw.com\/wp-json\/wp\/v2\/tags?post=6828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}