top of page

While Federal Rule of Evidence 502 allows for quick peek agreements as an alternative to clawback agreements, parties rarely reach an agreement that allows a requesting party to review a complete data set to determine which documents it decides are responsive. This is what makes the decision of the United States Federal Court of Claims in Fairholme Funds, Inc. v. United States, No. 13-465, so interesting. Judge Margaret M. Sweeney granted the plaintiff's motion to compel 1500 documents pursuant to the FRE 502(d) quick peek procedure.

The defendants in this case argued that the purpose of the procedure is to lessen a producing party's burden to review ESI for privileged information. They cited to The Sedona Conference's Commentary on Protection of Privileged ESI, as support for the position that Rule 502 cannot be used to compel the production of privileged information and ring a bell that cannot be un-rung.

The court nevertheless decided that it should grant the plaintiffs' request to review the documents withheld on the basis of deliberative process and bank examination privilege, even if the defendant did not consent, and had already conducted a comprehensive review. In making its decision, the court cited the following factors:

1. defendant's piecemeal production

2. a trial court's board discretion to issue discovery orders

3. a quick peek review would avoid a motion by the plaintiffs to conduct an in camera review which would be burdensome to the court.

4. a Rule 502(d) protective order provides greater protections than a Rule 26(c) protective order.

5. only individuals subject to the protective order will have access to the documents.

Judge Sweeney concluded that, "the court's use of the quick peek procedure in the case at bar is not motivated by a need to (1) protect inadvertently disclosed materials, (2) address the high cost of discovery in cases involving large quantities of ESI, or (3) punish defendant. The court's sole purpose in utilizing the procedure is to bring jurisdictional discovery to an end so that the case may move forward. Given the court's wide discretion to manage discovery pursuant to RCFC 26, and given the mutually agreed-to protective order already entered in this case, the court's use of the quick peek procedure is eminently appropriate."


 
 

In 2006, the United States Senate ratified the Budapest Convention on Cybercrime. In addition to criminalizing hacking, the Convention also provides a basis for law enforcement authorities to compel internal service providers to monitor an individual's internet activities in realtime. Article 20 states that:

Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to:

a. collect or record through the application of technical means on the territory of that Party, and

b. compel a service provider, within its existing technical capability:

i. to collect or record through the application of technical means on the territory of that Party; or

ii. to co-operate and assist the competent authorities in the collection or recording of,

traffic data, in real-time, associated with specified communications in its territory transmitted by means of a computer system.


 
 

On February 27, 2018, oral argument took place before the Supreme Court of the United States in United States v. Microsoft Corp.. You can hear the audio of the argument and read the transcript here. As mentioned in the Tip of the Night for February 26, 2018, the case concerns whether or not the Stored Communications Act allows the government to issue a warrant to compel American companies to produce data it has stored in servers located in foreign countries. These are my notes on what I found most interesting about the argument.

Justice Sotomayor referred to a bill, called the CLOUD Act, being considered in Congress which would allow for such cross border discovery but also provide for certain restrictions that would avoid international conflicts. She wondered if the Court should bother changing the status quo when new legislation was imminent.

The government argued that the Budapest Cybercrime Treaty provides for courts to require to providers to produce data even if it's stored in a foreign jurisdiction, a position that Justice Sotomayor did not accept.

The government noted that Google and other data providers use algorithms to move information between different countries to maximize their data systems.

Justice Kennedy asked whether the focus should be on the location of data, or where the owner of data resides or the service provider has its business headquarters.

Justice Alito discussed a hypothetical in which the government had probable cause that there was evidence of a crime in emails stored by an American internet service provider:

"But the provider has chosen to store the data overseas and, in fact, in some instances, has actually broken it up into shards so that it's stored not just in one foreign country but in a number of foreign countries. Now what -- what happens in that situation? There is no way in which the information can be obtained except by pursuing MLATs [Mutual Legal Assistance Treaties] against multiple countries, a process that could -- that will take many months, maybe years? What happens?" [Tr. at p. 36-37].

Microsoft countered that neither it (nor Google) breaks emails into shards.

n response to a question from Justice Sotomayor, the Microsoft attorney discussed the actions it would need to take to comply with a warrant for data on its servers located in Ireland. A remote control hardware mechanism reads data off a hard drive, and then the data is sent in a package across hard wires to the United States. This Microsoft contends is a distinctly extraterritorial act and characterized it as a, "physical manifestations. Human intervention ti not required to access the data in Ireland. Microsoft actually referred to the use of robot. "A human being doesn't have to do it. It is a robot. And if you -­ if you sent a robot into a foreign land to seize evidence, it would certainly implicate foreign interests." [Tr. at 44-45]. Microsoft also noted that only 54 of the 60,000 data requests it receives from the U.S. government concern emails stored abroad.

In response to a question from Chief Justice Roberts about whether or not its position on the SCA would prevent the Government from getting a warrant for emails sent from one person in the United States to someone across the street that happened to be stored abroad, Microsoft emphasized that users who wanted to prevent the government from having access to their messages would use tools or apps that scramble communications.

Justtice Alito argued that the ability of service providers to move data around at will, and the fact that data does not really consist of a physical object caused the concept of territoriality to be strained.


 
 

Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page