United States ex rel. Carter v. Bridgepoint Education, Inc.
United States ex rel. Carter v. Bridgepoint Education, Inc.
Opinion of the Court
ORDER ON RELATORS’ RESPONSE TO COURT’S ORDER FOR ADDITIONAL BRIEFING ABOUT ELECTRONIC FORMAT DISPUTE, DEFENDANTS’ SUPPLEMENTAL BRIEF RE: PRODUCTION OF DOCUMENTS FROM BACKUP TAPES AND THE FORMAT USED IN THE PRODUCTION OF EMAIL, AND RE-LATORS’ RESPONSE TO COURT’S ORDER FOR ADDITIONAL BRIEFING ABOUT BACKUP TAPES DISPUTE
I. INTRODUCTION
Before the Court are the Relators’ Response to Court’s Order for Additional Brief
For the Parties’ arguments to be fully understood, this Court first clarifies some essential linguistic ambiguity.
Plaintiffs’ demands for three discrete subsets of ESI—databases archived on backup tapes (“Backup Databases”), active emails (“Active Emails”),
Although the case law regarding ESI is continuously evolving, certain definite tenets have emerged. Critically, they have been written into the Rules both before and after their 2006 emendation; critically, despite contrary applications, specific standards have gained the judiciary’s wide support. In accordance with these standards and the decided weight of precedent, as explained more fully below, this Court DENIES without prejudice Plaintiffs’ demand for the Backup Data’s production in any form, Native production of Active Data to the extent that ESI has already been provided by Defendants, and the provision of metadata already deleted and rendered inaccessible during Defendants’ regular operations.
II. BACKGROUND
A. Relevant Facts
Bridgepoint Education, Inc. (“Bridge-point”), a publicly traded company incorporated under Delaware law in May 1999 with its headquarters in San Diego, California, operates two brands: Ashford University (“Ashford”), purchased by Bridgepoint in March 2005, and the University of the Rockies, acquired by Bridgepoint in September 2007.
The Plaintiffs’ relationship with Bridge-point’s Ashford subsidiary dates to 2008. Prom March 2008 through at least May 10, 2013, Mr. James Carter (“Carter”) worked as an “enrollment advisor” on Ashford’s “San Diego campus”
B. Relevant Statutes
Passed in 1863, the False Claims Act (“FCA”), also known as the “Abraham Lincoln Act,” “Qui Tam Act,”
In its present form, the FCA allows “[a] person may bring a civil action for a violation of section 3729 for the person and for the United States Government,” 31 U.S.C. § 3730(b)(1), and deems such persons “a relator,” Vt. Agency of Natural Res. v. United States ex rel. Stevens, 529 U.S. 765, 769, 120 S.Ct. 1858, 1860, 146 L.Ed.2d 836 (2000). Section 3729, in turn, subjects any person who “knowingly presents, or causes to be presented, a false or fraudulent claim for payment or approval” or “knowingly makes, uses, or causes to be made or used, a false record or statement material to a false or fraudulent claim” to liability under the FCA. 31 U.S.C. § 3729(a)(1)(A), (B); United States ex rel. Spicer v. Westbrook, 751 F.3d 354, 360 n. 6 (5th Cir. 2014) (31 U.S.C. § 3729(a)(1)(B)); United States ex rel. Gre-nadyor v. Ukrainian Vill. Pharm., Inc., 772 F.3d 1102, 1105 (7th Cir. 2014) (citing 31 U.S.C. § 3729(a)(1)(A)). Once a person commences a suit under § 3729 and if the federal government, having received a copy of the complaint and supporting documentation, declines to intervene, the relator gains the exclusive right to conduct the action. 31 U.S.C. § 3730(b)(2), (4), (c)(3); United States ex rel. Grynberg v. Praxair, Inc., 389 F.3d 1038, 1041 (10th Cir. 2004) (discussing this statutory framework). The federal government is permitted to subsequently intervene only upon a showing of “good cause.” 31 U.S.C. § 3730(c)(3). In the absence of such intervention, a relator “shall” receive a “reasonable” amount that “shall be not less than 25 percent and not more than 30 percent of the proceeds of the action or settlement,” attorneys’ fees and costs to be separately ascertained. Id. § 3730(d)(2); United States ex rel. Sharma v. Univ. of S. Cal., 217 F.3d 1141,1143-44 (9th Cir. 2000).
The fraud at issue here arises from Defendants’ purported violation of a particular encoded prohibition. Under the auspices of Title IV, the federal court dispenses funds to institutions to assist students with the costs of higher education. To participate in this generous program, such entities must enter into a Program Participation Agreement with the Department of Education, binding these schools to a “panoply of statutory, regulatory, and contractual requirements.” United States ex rel. Hendow v. Univ. of Phoenix, 461 F.3d 1166, 1168 (9th Cir. 2006). Among the many such constraints, Section 1094(a)(20) of the United States Code’s twentieth title (“Incentive Compensation Ban”) forbids “an institution of higher education” from “provid[ing] any commission, bonus, or other incentive payment based directly or indirectly on success in securing enrollment or financial aid to any persons or entities engaged in any student recruiting or admission activities____” 20 U.S.C. § 1094(a)(20); United States ex rel. Lee v. Corinthian Colleges, 655 F.3d 984, 989 (9th Cir. 2011). One court has eloquently explained this proscription’s aim: “The underlying concern here is that institutions ... will recruit unqualified students who will then find themselves unable to repay these loans, causing a significant loss to the U.S. government.” United States ex rel. Lopez v. Strayer Educ., Inc., 698 F.Supp.2d 633, 635 (E.D.Va. 2010).
In ascertaining whether a violation of the Incentive Compensation Ban has occurred, the critical question is not whether an institution has crafted a written policy proclaiming fealty to its technical requirements. Rather, it is “the [the school’s] implementation of its policy ... that bears scrutiny,” and this ban will be violated whenever “despite [a] Compensation Program’s purported or documented reliance on something other than recruitment numbers, [] salary increases are in practice determined in the sole basis of recruitment numbers.” Lee, 655 F.3d at 996. As a consequence, when institutions of higher education, for profit or nonprofit, engage in this kind of verboten conduct yet nonetheless, either implicitly or explicitly, certify
C. Summary of Disputes ## 1, 2, 3, and 4
As discovery began in earnest, four interrelated disputes implicating the production of Defendants’ myriad ESI arose. Stated briefly, the Parties disagreed over the custodians to be searched (“Dispute # 1”), the time periods for which Defendants were obligated to provide their business records (“Dispute # 2”), the number of databases to be queried and their content produced by Defendants for Plaintiffs’ examination (“Dispute # 3”), and the production format of any and all ESI (“Dispute # 4”). (Doc. No. 63 at 2.) A fifth one—the production of ESI with its metadata intact—arose as well, one referenced in the Plaintiffs’ Response.
The genesis of Dispute # 1 was Plaintiffs’ request for all documents “in the possession, custody, or control of Bridgepoint, including its officers, management, employees, agents, representatives, attorneys, insurers, any persons acting on its behalf, and affiliates and departments.”
Dispute # 2 involved the relevant time period for production. Plaintiffs demanded “production of documents from 2005 to present”; Defendants refused. (Id. at 4.) Defendants argued that the factual events allegedly underlying Plaintiff claims, as embodied in the unsealed complaint, had transpired between 2005 and 2011. (Id. at 5.) Pursuant to their own complaint, therefore, Defendants contended that Plaintiffs were not entitled to any ESI from before 2005 or after 2011. In response, Plaintiffs emphasized, “[A]ny current documents would be relevant to prior company actions,” and added, “The Complaint alleges claims extending ‘through the present date’.” (Id. at 5.) Defendants countered: “[T]he ‘present date’ is the date of filing, July 2, 2010, and therefore could not have related to any post-filing allegations.” (Id. at 6.)
Dispute # 4 arose from Plaintiffs’ instruction to Defendants “to produce each original document with all non-identical copies and drafts of that document.” (Id. at 11.) As to ESI, Defendants promised to produce the requested material in “single-branded TIFF images.” (Id.) Plaintiffs then objected, demanding that Native be used for even those emails- stored on Defendants’ backup tapes. (Id.) As Plaintiffs again echoed, by doing so, Defendants have refused to satisfy Rule 34(b)(2)(E)(ii), as TIFF is not the form in which the backup tapes’ ESI is “ordinarily maintained or in a reasonably useable form.”
To deal with this quartet, at an informal teleconference held in the late afternoon of December 2, 2014, this Court resolved Dispute # 1, requiring production of emails from managerial employees and a sampling of recruiters.
D. First Two Subjects of this Order: Disputes ## 3 and 4
At this conference’s end, therefore, two controversies—Disputes ##3 and 4—were left undetermined, scheduled for briefing by the Parties as December and January unfolded: the specific format in which Defendants’ backup tape-stored ESI would be produced. Defendants have insisted on the use of TIFF; Plaintiffs have demanded that Native be utilized for “all electronically stored information.” (Doe. No. 67, at 2-3; Doc. No. 68, at 2-3.) The Parties’ Papers articulate each
Having delineated the relevant standard for ESI discovery, Defendants initially explain their process for storing ESI. “Active,” currently utilized emails and documents are stored on readily available servers, but all other electronic data, defined in the negative, is automatically stored on backup tapes. (Doe. No. 68 at 4-5.) Intended to be used in case of disaster recovery, these backup tapes “are encrypted,” and one alone “can exceed one terabyte.” (Id.). Thereupon, Defendants propound six reasons for opposing Plaintiffs’ demand for Native production. First, as much precedent attests, “disaster recovery backup tapes—such as those at issue here—are generally considered inaccessible and not subject to required review or production.” (Id. at 5 (citing Rowe Entm’t, Inc. v. The William Morris Agency, Inc., 205 F.R.D. 421, 431 (S.D.N.Y. 2002)).) In Defendants’ view, this case’s peculiar circumstances strengthen this presumption, as the information will only be accessible via a unique restoration process (“one environment”) that will allow indexing of, at most, one tape per day. (Id.) Conservatively estimated, “[t]he total time for production” will be “months” at “substantial costs and effort.” (Id. at 6.) For these reasons, Native production will be “unduly burdensome.” (Id. at 6, 7.) Second and relatedly, the cost will allegedly be astronomical, (Doc. No. 68 at 5), a conclusion supported by an expert’s declaration, (Doc. No. 68-1). While it will cost $560,607 for the restoration, review and production of a backup tape encompassing ESI produced by 140 defendants identified from Plaintiffs’ parameters and the 80 managers ordered for sampling by this Court, adding just one more set of tapes will increase the cost by $147,752 to $708,359, and completing the restoration of every backup tape to Native, as requested by Plaintiffs, will total $2,255,633. (Doc No. 68 at 6.) Third, this storage procedure has been Defendants’ longstanding practice. (Id. at 4-5.) Indeed, in 2010, it actually made more ESI available for potential search and recovery, as it did not even commence regular backups of emails until December 2010. (Id. at 4-5.) Fourth, “[djespite Relators’ unsupported accusation to the contrary,” Defendants deny they engaged in “intentional spoliation”; in other words, they did not purposefully render data normally stored in Native inaccessible with the intent of hindering such data’s future discovery (Id. at 7.) This is so for two discrete reasons: first, as Defendants had already explained, their data retention policies predated this suit’s unsealing,
Both in their first and second filing, Plaintiffs present seven arguments in their favor. First, they stress the formats’ relative utility and cost of production, deriding TIFF as “extremely expensive to produce, containing] no metadata, and ... not searchable by electronic means without extensive and expensive additional processing” and the “creation of additional layers of ‘searchable’ data (with inherent risks of errors and omissions).”(Doe. No. 67 at 2.) Its request, when considered overall, is “cheaper.” (Id.) Sec
Plaintiffs’ most disconcerting reason, as expounded in several motions, are the sundry malefactions that it accuses Defendant of committing. These include “refusing to answer basic questions regarding how its system for storing electronic documents works” and delivering only “vague, confusing and contradictory” explanations. (Id. at 3.) As a result, Plaintiffs have been deprived of their ability both “to evaluate any alleged cost of restoring the backup tapes or to make any reasonable alternative proposal,” concocting “absurd” stories “that [it] would take years and millions of dollars to restore” the relevant data, and possibly using figures that blend the costs of attorney review and redaction. (Id. at 4-5.) In this vein, Plaintiffs describe the ESI’s relative inaccessibility to be a result of Defendants’ own deliberate obstruction: “Bridgepoint made these documents both inaccessible and far more costly than necessary to access, when it should reasonably have known it would need to provide such documents in the course of litigation, including this lawsuit.” (Id.) Having fail to append any expert declaration, Plaintiffs Second Response concludes: “Disputes regarding the scope and cost of electronic discovery, including the production of electronic data stored on backup tapes, should never be resolved based on assumptions and guesswork.” (Id. at 5 (relying on Zubulake v. UBS Warburg LLC, 217 F.R.D. 309 (S.D.N.Y. 2003)).)
E. Final Subject of this Order: Dispute #5
In the course of this back-and-forth, a fifth dispute suddenly emerged. Notably, Dispute #5 was never clearly summarized in the Parties’ original statements to this Court; notably, Dispute # 5 involves a form of ESI that both Parties subsumed into their conflict over Native and TIFF. Thus, in pushing for Native production, Plaintiffs asseverated that one of this format’s benefits was its preservation of metadata. (Doc. No. 67 at 2-3). Indeed, Plaintiffs demanded all ESI—both the Backup Data and the Active Emails—be produced in Native due to metadata’s general, but not case-specific, importance. (Id. at 2 (“Sometimes, the metadata may be essential to a full understanding of the document.” (Internal quotation marks omitted))). Defendants did not expressly counter Plaintiffs’ demands for metadata; instead, by insisting on TIFF’s benefits, they implicitly argued for its non-production as to active data. (Doe. No. 68 at 7-8.) Because metadata is actually a distinct form of ESI, this Court considers Plaintiffs’ capacious request for all “documents” and Defendants’ implicit opposition to metadata’s manufacture to have created a fifth dispute.
III. DISCUSSION
A. Standard
1. ESI’s Discoverability and the Expense of Its Production
Rule 34(a) permits any party to serve on any other party requests to pro
Per the Rules’ plain text, for accessible or inaccessible ESI to be discoverable, the relevance test set in Rule 26(b) must be satisfied. Both broadly written and expansively construed, Rule 26(b)(1) allows the discovery of “[r]elevant information,” even if inadmissible at trial, “if the discovery appears reasonably calculated to lead to the discovery of admissible evidence.” Fed. R. Crv.P. 26(b)(1). “Discovery is not limited to the issues raised by the pleadings” or “to the merits of the ease.” Henderson v. Holiday CVS, L.L.C., 269 F.R.D. 682, 685 (S.D.Fla. 2010) (relying on Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340, 352, 98 S. Ct. 2380, 2389, 57 L.Ed.2d 253 (1978)). As a matter of custom, “the presumption is that the responding party must bear the expense of complying with discovery requests.” Oppenheimer, 437 U.S. at 358, 98 S.Ct. 2380;
2. Constraints on Discovery
Even if evidence is discoverable and relevant under Rules 34 and 26, the Rules contain some express constraints, boundaries both “ultimate and necessary,” Hickman v. Taylor, 329 U.S. 495, 506, 67 S.Ct. 385, 392, 91 L.Ed. 451 (1947), on discovery’s otherwise sprawling reach. Most significantly, per Rule 26(b)(2)(C), on its own initiative or at a party’s request, for example, a court may limit discovery for any one of three reasons: “the discovery sought is unreasonably cumulative or duplicative”; it is “obtainable from some other source that is more convenient, less burdensome, or less expensive”; or “the burden or expense of the proposed discovery outweighs the likely benefit.” Fed.R.CivP. 26(b)(2)(C)(i)—(iii); see also, e.g., Nicholas v. Wyndham Int’l, Inc., 373 F.3d 537, 543 (4th Cir. 2004) (citing the factors enumerated in Rule 26(b)(2) and adding, “[t]he simple fact that requested information is discoverable under Rule 26(a) does not mean that discovery must be had”); Am-eristar Jet Charter v. Signal Composites, Inc., 244 F.3d 189, 193 (1st Cir. 2001) (once more quoting Rule 26(b)(2) and adding, “[t]he district court has the discretion to limit discovery”). In determining whether an “undue burden” exists, a court must consider “the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.” Fed.R.Civ.P. 26(b)(2)(C); Crosby v. La. Health Serv. & Indem. Co., 647 F.3d 258, 264 (5th Cir. 2011). Rule 26(c) also authorizes strictures on discovery’s extent for “good cause” and so as “to protect a party from annoyance, embarrassment, oppression, or undue burden or expense.” Fed.R.Civ.P. 26(e)(1). “Rule 26(b) has never been a license to engage in an unwieldy, burdensome, and speculative fishing expedition.” Murphy v. Deloitte & Touche Grp. Ins. Plan, 619 F.3d 1151, 1163 (10th Cir. 2010). To wit, while many documents may be discoverable, “in determining whether a [particular] discovery request is overly costly or burdensome in light of its benefits, ... [a] court ... [must] ... consider the necessity of discovery,” Crosby, 647 F.3d at 258, “properly encouraged to weigh the expected benefits and burdens posed by particular discovery requests (electronic other otherwise),” Regan-Touhy v. Walgreen Co., 526 F.3d 641, 649 (10th Cir. 2008); see also S. Ute Indian Tribe v. Amoco Prod. Co., 2 F.3d 1023, 1029-30 (10th Cir. 1993) (discussing both the old presumption and the courts’ powers to grant protection against “undue burden and expense” by shifting costs of discovery to the requesting party as a condition of discovery). The balancing approach encoded in Rule 26(b)(2) thus applies regardless of a document’s original medium, whether it be code or pulp.
It was the modern proliferation and prevalence of ESI over hard copy
As such, from Rowe and Zubulake, as extrapolated in an ever growing count of cases and the Sedona Conference thereafter,
In contrast, when “backup tapes and erased, fragmented, or damaged data” is requested, such ESI is generally defined as “inaccessible.” Quinby v. WestLB AG, 245 F.R.D. 94, 101-02 (S.D.N.Y. 2006) (nicely differentiating between “accessible” and “inaccessible data,” again by citing to the Zubulake line of cases); see also Jessica Lynn Repa, Adjudicating Beyond the Scope of Ordinary Business: Why the Inaccessibility Test in Zubulake Unduly Stifles Cost-Shifting During Electronic Discovery, 54 Am. U.L.Rev. 257, 275 & n. 113 (2004) (outlining the Zubulake test and characterizing it as “contain[ing] both a rigid rule of accessibility and flexible standards when dealing with cost-shifting”). As employed in this jurisprudence, the term “inaccessible” does not necessarily indicate the relevant ESI is physically damaged or written in an obscure format; rather, “inaccessible” simply means that expenditure of resources required to access the contents is itself unreasonable. See, e.g., Best Buy Stores, L.P. v. Developers Diversified Realty Corp., No. 05-2310 (DCD/JJG), 2007 U.S. Dist. LEXIS 7580, at *2, 2007 WL 333987, at *1 (D.Min. Feb. 1, 2007) (affirming magistrate judge’s decision that ESI sought by plaintiff was not “reasonably accessible” because of undue burden and cost). If data is so found, shifting the cost of production to the requesting party has been considered appropriate. Zubulake, 216 F.R.D. at 284; accord, e.g., Dahl v. Bain Capital Partners, LLC, 655 F.Supp.2d 146, 148 (D.Mass. 2009) (adopting the general principle, though declining to shift costs at the same time); OpenTV v. Liberate Technologies, 219 F.R.D. 474, 477-78 (N.D.Cal. 2003) (relying on Zubulake, 216 F.R.D. at 284). To obtain this ESI at the other’s expense, the requesting party must demonstrate need and relevance that outweigh the costs and burdens of retrieving and processing this provably inaccessible information. The Sedona Principles at 139; accord, e.g., Wiginton v. CB Richard Ellis, Inc., 229 F.R.D. 568, 577 (N.D.Ill. 2004) (splitting costs, with plaintiffs responsible for 75% of the discovery cost of restoring the tapes, searching the data, and transferring it to an electronic data viewer); Hagemeyer N. Am., Inc. v. Gateway Data Scis. Corp., 222 F.R.D. 594, 601 (E.D.Wis. 2004) (“A number of district courts have recognized the unique burden of producing documents stored on backup tapes and, by invoking Rule 26(e) to fashion orders to protect parties from undue burden or expense, have conditioned production on payment by the requesting party.”); McPeek, 202 F.R.D. at 34 (“The more likely it is that the backup tape contains information that is relevant to a claim or defense, the fairer it is that ... [the requested party] search at its own expense.”).
Even as it has gained in prominence, this preference for cost-shifting has been extended beyond merely inaccessible ESI. As Zubulake’s own author has observed, such balancing is proper even as to accessible data so long as the factors set forth in Rule 26(b)(2)(C) evidence cost-shifting’s suitability. Shira A. Scheindlin & Daniel J. Capa, Electronic Discovery and Digital Evidence 314 (2009) (“Cost-shifting is available even for accessible data based on the proportionality factors set forth in Rule 26(b)(2)(C).”); accord, e.g., Zeller v. S. Cent. Emergency Med. Servs., No. 1:13-CV-2584, 2014 U.S. Dist. LEXIS 68940, at *25 n. 6, 2014 WL 2094340, at *9 n. 6 (M.D.Pa. May 20, 2014); Cochran v. Caldera Med., Inc., 2014 U.S. Dist. LEXIS 55447, at *8, 2014 WL 1608664, at *3 (E.D.Pa. Apr. 22, 2014). As such, so long as “the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues,” Fed. R.Crv.P. 26(b)(2)(C)(iii), the cost of even accessible ESI’s production may be shifted to a party that has not shown its peculiar relevance to the claims and defenses at hand.
B. Application: Backup Databases
As precedent compels, this Court will apply the prevailing framework embedded in Rules 34(b)(2)(E)(ii) and 26(b)(2)(B) and construed in the Zubulake and Rowe jurisprudence to determine whether the ESI stored on Defendants’ backup tapes must be produced in Native at Defendants’ expense. Accordingly, this Court will first consider the Backup Data’s discoverability and then their apparent inaccessibility. It will thereupon decide the extent, if any, the costs must be shifted for the kind of production (Native) Plaintiffs have now demanded.
1. Discoverability
As a threshold matter, this Court deems the Backup Databases to be discoverable ESI under Rule 34 and regards Defendants as having been responsible for its preservation. Fed.R.Civ.P. 34(a); Zubulake, 217 F.R.D. at 324; Simon Prop. Grp. v. mySimon, Inc., 194 F.R.D. 639, 640 (S.D.Ind. 2000); Anti-Monopoly, Inc. v. Hasbro, Inc., No. 94-CV-2120 (LMM)(AJB), 1995 U.S. Dist. LEXIS 16355, at *1-2, 1995 WL 649934, at *2 (S.D.N.Y. Nov. 3, 1995); see also The Sedona Principles at 19. This determination, however, does not obviate this Court’s obligation to weigh the data’s inaccessibility and then consider, if it must, whether Plaintiffs have properly shown their need for this production in the format they now seek: Native. (Doc. No. 67 at 2-3.) This Court now does so.
2. Inaccessibility of ESI Stored on Backup Tapes
Consideration of ESI’s aecessability involves two discrete determination: first, the extent to which the data at issue is actually inaccessible, and second, the apparent reasons for this status. In general, inaccessible ESI “is not readily useable and must be restored to an accessible state before the data is usable.”
Applying the foregoing precepts, this Court finds that Defendant has met its burden of showing this particular ESI’s inaccessibility. Again and again, “district courts have recognized the unique burden of producing documents stored on backup tapes and, by invoking Rule 26(c) to fashion orders to protect parties from undue burden or expense, have conditioned production on payment by the requesting party.” Hagemeyer N. Am., Inc., 222 F.R.D. at 601. Indeed, the Defendant’s own description of its storage system (Doc. No. 68 at 4-5) makes it impossible to deem this ESI as anything but inaccessible. As Defendant writes, they have only “used backup tapes for storage of email for a potion of the time period at issue in this case”; “they did not begin regular backups of email until December 2010.” (Doc. No. 68 at 4.) Whatever the wisdom of this policy, “[b]ackup tapes are [generally] ... an inaccessible format.” Quinby, 245 F.R.D. at 101-02.
To this fact, Plaintiffs only unleash a torrent of eonelusory—and inapposite—allega-tions. “Bridgepoint scrambled to make its emails legally inaccessible,” they write. (Doc. No. 69 at 4.) Even in making this accusation, Plaintiff acknowledge that this ESI has been placed onto “backup tapes,” (id.), thereby accepting Defendants’ own description of the relevant ESI as “inaccessible.” Dangerously, Plaintiffs have chosen to describe this storage system as adopted “under the pretext or excuse of a business purpose,” (id.), even though the use of backup tapes for non-active ESI has become standard business practice. Isom, Electronic Discovery Primer for Judges, at 41-42 (discussing the various reasons business use backup tapes). Plaintiffs may feel free to decry Defendants’ contentions that it will take years and millions to restore this ESI to Native form, but these declamations do not disprove Defendants’ assertion that the Backup Data has become inaccessible as part of their typical data retention schematic.
3. A Showing of Particular Need and an Absence of Special Relevance
Having found the Backup Data to be inaccessible, this Court turns to the Zubulake factors to ascertain which party must bear the expense of its production. The famed seven read: (1) “[t]he extent to which the request is specifically tailored to discover relevant information”; (2) “[t]he availability of such information from other sources”; (3) “[t]he total costs of production, compared to the amount in controversy”; (4) “[t]he total costs of production, compared to the resources available to each party”; (5) “[t]he relative ability of each party to control costs and its incentive to do so”; (6) “[t]he importance of the issues at stake in the litigation”; and (7) “[t]he relative benefits to the parties of obtaining the information.” Zubulake, 217 F.R.D. at 322. Notably, the list should be read in descending order of importance. Id. at 323. More generally, under Zubulake and per Rule 26(b)(2)(C), when balancing the cost, burden, and need for ESI in a particular format, a court should consider the technological feasibility and realistic cost of preserving, retrieving, reviewing, and producing ESI as well as the nature of the litigation and amount in controversy. The Sedona Principles at 35. Logically, if the ESI is provided in some usable form, even if it is not the one most desperately sought by the requesting party, this balance favors shifting cost of production in the desired format to the latter. In utilizing the Zubulake factors, “the central question must be[:] ... how important is the sought-after evidence in comparison to the cost of production?” Zubulake, 217 F.R.D. at 309.
In looking at these factors, the balance here favors cost-shifting as to any ESI from additional backup tapes based on both the Backup Data’s minimal apparent relevance and Defendants’ adherence to a common ESI policies. First, during this litigation and pursuant to this Court’s prior dictates, Defendants have restored the contents of one backup tape to Native form and thereby afforded Plaintiffs access to every email between enrollment advisors and their managerial superiors. The only ESI presently excluded from Plaintiffs’ embrace at Defendants’ expense are those emails exchanged by recruiters amongst themselves and with third parties. It is thus overwhelmingly certain that Plaintiffs now have or will soon obtain an unfettered ability to examine almost every potentially relevant quantum of ESI; at best, the as-of-yet unproduced emails will divulge varied recruiters’ subjective, even if accurate, impressions regarding Defendants’ compensation structure, but those emails will not evidence a fraud if unsupported by the statements of directors and managers. To the latter persons’ missives, as this order has already stressed, Plaintiffs have already been granted access, leaving the relevance of the undiscovered data at best dubious. Second, while TIFF may not be as easy to scan or search as Native in Plaintiffs’ eyes, TIFF is still a widely used ESI format. Kyle C. Bisceg-lie, Lexisnexis Practice Guide: New York E-Discovery and Evidence § 3:10 (2012). In light of this apparent verity, even though Defendants is obligated to produce the ESI requested in the format in which it is regularly stored, Plaintiffs now also demand that Defendants undertake the burden of restoring the Backup Data to its unnatural format: Native. They must do this, Plaintiff insist, despite two likelihoods never actually discounted in Plaintiffs’ filings: first, Defendants’ storage practices accord with much of corporate America’s approach to storage of non-active data for business purposes, and second, pursuant to this Court’s prior orders and in accordance with Defendants’ previous offers, almost every bit of probably relevant ESI will still be provided to Plaintiffs in a commonly utilized electronic form. In spite of Plaintiffs’ belief to the contrary, the Rules do not compel Defendants to produce inaccessible ESI in the form most helpful for Plaintiffs’ ease at Defendants’ expense. No, the Rules compel no more than production of ESI in its usual form, with Plaintiffs themselves obligated to pay for the production of inaccessible ESI in an accessible form.
Finally, having examined the Parties’ Papers, the Court notes the inherent vagueness in the Plaintiffs’ requests for “documents” and “databases.” (Doc. No. 63 at 7, 11.) As numerous courts have ruled, if a party fails to identify the form or forms in which it wishes ESI to be produced and any particular fields or types of metadata sought, the non-requesting party may rightly provide the ESI sought in the form in which it is regularly maintained. With Plaintiffs’ request ambiguous as to form and format, Defendants were certainly reasonable in refusing to provide reasonably in accessible ESI.
To meet their burden, Plaintiffs propounded a slew of reasons, but none convince this Court. First, to base their demand for Native production on Defendants’ purported misdeeds, allegations that Plaintiffs have yet to prove in a court of law, in defiance of the Rules’ plain text would require this Court to permit extraordinary discovery based merely on unproven accusations. Because Defendants may be guilty of a host of federal violations, Plaintiffs essentially contend, this Court must impose upon them a burden greater than thrust on parties generally. Neutrally worded, the Rules are not so written as to permit a court to adjudicate guilt by the surreptitious means of onerous discovery obligations’ imposition. Repeatedly, Plaintiffs rest much of their insistence on forcing Defendants to bear the cost of resorting the backup ESI to Native on wild accusations, unsupported by credible evidence, that Defendants used a commonly employed method of storage with the intent of preventing this data’s discovery in subsequent litigation. (Doc. No. 69 at 4.) To show intentional spoili-ation, they do not explain how Defendants’ storage process is unusual or even how this ESI is uniquely inaccessible, the Defendants having adopted a procedure few businesses have themselves endorsed. Nor do they show that Defendants, even if aware of their potential liability, deliberately created a policy of storing ESI that would make particularly relevant emails suddenly inaccessible to any and all potential litigants. Indeed, even if ligation was threatened, Plaintiffs would have to provide some indicia of any such purpose for cost-shifting to be foreclosed and spoliation to be found. To wit, whether their accusations are true or not, they must be supported by some credible evidence, not implications and innuendo, for a defendant remains free to operate their business in its ordinary course in the absence of the reasonable probability of a certain lawsuit and so long as it does not render data inaccessible purely with the intent of stymying such legal action. Plaintiffs needed something more to shift the balance; littered with unproven and unknowable assertions, their two motions do not do so. Just as maddeningly, Plaintiffs labels Defendants’ projections “absurd,” (Doc. No. 69 at 4), yet it was they who failed to provide an expert’s declaration to substantiate this assertion.
C. Application: Native versus TIFF
The Parties’ dispute over the proper format for active emails is governed by a similar cost-shifting analysis. While Native and TIFF both exhibit notable weaknesses and strengths, “[i]n current practice, many parties, local rules and courts have endorsed the use of image production formats, principally ... TIFF and Adobe Portable Document Format (“PDF”) formats.” The Sedona Principles at 190; see also Osborne v. C.H. Robinson Co., No. 08 C 50165, 2011 U.S. Dist. LEXIS 123168, at *19, 2011 WL 5076267, at *7 (N.D.Ill. Oct. 25, 2011). The reasons for the widespread utilization of this static format are threefold: (1) TIFF documents can be Bates numbered and (2) redacted, and (3) it is harder, albeit not impossible, to alter data presented in TIFF inadvertently or deliberately. The Sedona Principles at 190-91. In short, for all its acknowledged shortcomings, TIFF can be considered a reasonable form of production, see Melian Labs, Inc. v. Triology LLC, No. 13-cv-04791-SBA (KAW), 2014 U.S. Dist. LEXIS 124343, at *5, 2014 WL 4386439, at *2 (N.D.Cal. Sept. 4, 2014) (after requested party produced documents in “paper, PDF or TIFF” format, commenting “[t]hat producing the documents in a [more] searchable format [i.e. Native] would ease Triology’s review does not render Melian’s production deficient”), and it can even “be converted to word textsearchable images using an Optical Character Recognition software program,” thereby obviating one of its more obvious weaknesses, Fed.R.Civ.P. 34 advisory committee’s note. As to this very issue, the United States Court of Appeals for the Third Circuit has quoted The Sedona Principles: considered a “near-native” format, EEOC v. SVT, LLC, No. 2:13-CV-245-RLM-PRC, 2014 U.S. Dist. LEXIS 50114, at *8, 2014 WL 1411775, at *3 (N.D.Ind. Apr. 10, 2014), TIFF “is a widely used and supported graphic file format for storing bit-mapped images, with many different compression formats and resolutions,” Race Tires Am., Inv. v. Hoosier Racing Tire Corp., 674 F.3d 158, 161 n. 2 (3d Cir. 2012) (quoting The Sedona Conference Glossary). Critically, moreover, Rule 34(b)(2)(ii) allows its use in the absence of a request that does not specify a particular form. Fed.R.Civ.P. 34(b)(2)(h); Anderson Living Trust v, WPX Energy Prod., LLC, 298 F.R.D. 514, 526 (D.N.M. 2014) (reminding that “[i]t is only if the requesting party declines to specify a form that the producing party is offered a choice between producing in the form in which it is ordinary maintained—native format—or in a reasonably useful form or form”). Subparagraph (iii) adds: “A party need not produce the same electronically stored information in more than one form.” Fed.R.Civ.P. 34(b)(2)(iii). In such cases, “court[s] should consider shifting some or all of the cost of the second production to the requesting party.”
The language utilized in Plaintiffs’ filings makes clear it did not make a specific request for Native production. In describing its position regarding Dispute #4, titled “format of emails to be produced,” Plaintiffs described its initial request in the following terms: “Plaintiff instructed Bridgepoint to ‘produce each original document with all nonidentical copies and drafts of that documents’.” (Doc. No. 63 at 11.) The term “original” is certainly not sufficiently precise, as much case law demands, for Defendants to have volunteered Native production at their own initiative. Cf. Johns v. Bayer Corp., No. 09-CV 1935 DMS JMA, 2014 U.S. Dist. LEXIS 126879, at *4-5 (S.D.Cal. Dee. 1, 2010) (ordering production of “original docu-mentes]” in TIFF). In fact, this conclusion is buttressed by Plaintiffs’ reliance on Rule 34(b)(2)(E)(ii) to support their request for Native production, as this subparagraph is only triggered “[i]f a request does not specify a form for producing electronically stored information.” (Doc. No. 63 at 11.) Logically, then, Plaintiffs have impliedly conceded they did not “specify” a format when they first proffered their document requests.
Because Plaintiffs did not demand Native production with express precision, this Court must then consider who must bear the cost of Native production, if ordered. See, e.g., Cen-veo Corp. v. S. Graphic Sys., No. 08-5521 (JRT/AJB), 2009 U.S. Dist. LEXIS 108623, at *6-7, 2009 WL 4042898, at *2 (D.Minn. Nov. 18, 2009). Per Rule 26(b)(2)(C), the relevant factors include “the burden or expense of the proposed discovery outweighs its likely benefit, considering the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the action, and the importance of the discovery in resolving the issues.” Fed. R.Civ.P. 26(b)(2)(C). As with the backup databases, the balance here favors Defendants’ usage of TIFF for three reasons. First, being a reasonably useable form whose content is searchable with, at most, relatively minor modifications, TIFF, even if regarded as an alternative form, is a suitable and proper response to a generic request for “original documents,” especially absent an explicit reference to ESI. Second, Plaintiffs have yet to show how this kind of production had denuded Defendants’ ESI of data invaluable for the prosecution of a single claim or defense in this proceeding. Instead, they have merely asserted the general importance of the extirpated metadata, not its specific import, and have made assertions contradicted by at least one authoritative source, The Sedona Principles at 190-91 (enumerating some of the benefits of TIFF production). Finally, pursuant to Rule 34, “[a] party need not produce the same electronically stored information in more than one form.” Fed. R.Civ.P. 34(b)(2)(iii). Defendants have promised to present active emails in TIFF; even if that production is not the one Plaintiffs prefer, it is a reasonable format for the production of active ESI.
D. Application: Metadata
Metadata, as Plaintiff correctly insist, is discoverable. Doe. No. 67 at 2; see, e.g., United States v. Rubin/Chambers, Dunhill Ins. Servs., 825 F.Supp.2d 451, 453 (S.D.N.Y. 2011); FSP Stallion 1, LLC v. Luce, No. 2:08-cv-01155-PMP-PAL, 2009 U.S. Dist. LEXIS 68460, at *12, 2009 WL 2177107, at *3 (D.Nev. July 21, 2009). Despite this fact, courts have generally only ordered “the production of metadata when it is sought in the initial document request and the producing party has not yet produced the documents in any form.” Aguilar, 255 F.R.D. at 357; see also, e.g., In re Prosche Cars N. Am., Inc., Plastic Coolant Prods. Litig., 279 F.R.D. 447, 449 n. 5 (S.D.Ohio 2012) (“If the requesting party does not specify a form, therefore, the producing party is within its right to produce the ESI in static image form (TIFF or PDF) with no metadata.”); R.F.M.A.S. Inc. v. So, 271 F.R.D. 13, 45 (S.D.N.Y. 2010) (observing that even “if we assume that defendants were obligated to
For two reasons, this Court will not order Defendant to produce any active ESI’s full metadata. First, in defiance of present custom, Plaintiffs never specifically submitted detailed and express requests for any ESI’s Metadata. Such specificity, as the very case they cite makes clear, is often an essential prerequisite for a court to order metadata’s production at the requested party’s expense. Aguilar, 255 F.R.D. at 357, cited in Doc. No. 67 at 2. Second, Plaintiffs have not yet articulated any precise reason why the metadata of any ESI is specifically relevant to a claim or a defense in this proceeding. Indeed, while they cite to Moore’s Federal Practice (“Moore’s”), a most authoritative treatise, they quote its self-evidently general statements regarding metadata’s value—“Sometimes, metadata can be essential to a full understanding of the document,” (Doc. No. 67 at 2 (emphasis added) (quoting 6 James Wm. Moore et al„ Moore’s Federal Practice § 37A.03))—without addressing these words’ central import: quite simply, while metadata can occasionally be relevant, that relevance must be determined on a “case by case basis,” based on the facts and evidence presented by the requesting party as to the sought metadata’s significance for its very case. Stating, as Plaintiffs have done, why this case implicates important national interests or why the emails’ content may be relevant does not establish why this active ESI’s metadata is uniquely important to understanding its import. In fact, Moore’s itself discounts Plaintiffs’ only apparent reason as insufficient to prove the kind of essential
IV. CONCLUSION
Having waded through this case law, this Court is driven to one conclusion: had the Parties adhered to the spirit of Rule 26(f)(3)(C), nearly every dispute dissected in this lengthy order may have been avoided. Unfortunately, they did not strive to avoid later difficulties or ease their resolution via compromise and accommodation; unfortunately, access to ESI that may have been more broadly available based on compromise and mutual understanding of the costs and complexities involved will now be delimitated by court order rather than these adversaries’ agreement. Accordingly, based on the preceding analysis, this Court orders as follows:
Plaintiffs’ requests for the production of the Backup Databases, the Active Emails in Native, and the Metadata are DENIED without prejudice.
As to all ESI, whether accessible or inaccessible, post-dating this suit’s unsealing in January 1, 2013, Plaintiffs will bear the cost of searching and recovery. Defendants, however, will bear the cost of production.
IT IS SO ORDERED.
. Two other orders shall be released within days of this order’s docketing.
. Unless otherwise noted, "Rule” refers to the Federal Rules of Civil Procedure throughout this order.
. These definitions appear in a number of authoritative sources. See, e.g., The Sedona Conference, The Sedona Conference Glossary: E-Discovery & Digital Information Management (4th ed. Apr. 2014); Barbara J. Rothstein, Ronald J. Hedges & Elizabeth C. Wiggins, Managing Discovery in Electronic Information: A Pocket Guide for Judges 23-24 (2007); Fed. Jud. Ctr., Manual for Complex Litigation § 11.446 (4th ed. 2004).
. Seemingly, since stray emails may reside within the relevant databases, the two categories may effectively overlap. As such, any non-active email can only now be found on Defendants’ backup tapes.
. In this order and in accordance with Defendants’ regular business practices, (Doc. No. 68 at 4-6), inactive emails are subsumed within the latter category of ESI: "Backup Databases.”
. By virtue of metadata’s uncertain relevance to a particular action and generally enormous cost of reproduction, precision in explaining this data’s importance in an initial discovery request is often critical and occasionally dispositive. This general, albeit recent, rule of thumb figures in this Court’s later explication.
. For more on these entities’ controversial history, see Maj. Staff of S. Comm, on Health, Educ., Labor & Pensions, 1 12th Cong , Is the New G.I. Bill Working?: For-Profit Colleges Increasing Veteran Enrollment and Federal Funds 293-314 (Comm. Print 2014). For uncertain reasons, Plaintiffs heavily cite this report in their response. (Doc. No. 69 at 3-4.) This reliance, however, ignores a critical fact. However accurate it may be, a congressional report is not a finding of fact or proof of a wrong committed as a matter of law, regardless of what it may be as "a matter of public record.” (Id.) As this particular document's title indicates, moreover it is not even the formal congressional report accompanying an enacted bill, one of the rare pieces of legislative history occasionally worthy of some judicial solicitude.
. Filings with the Securities and Exchange Commission ("SEC”) are "matters of public record of which ... [a] court can take judicial notice.” Schmidt v. Skolas, 770 F.3d 241, 249 (3d Cir. 2014); Yates v. Mun. Mortg. & Equity LLC, 744 F.3d 874, 881 (4th Cir. 2014); Fed.R.Evid. 201(b).
. The program’s name arises from its origins in Title IV of the Higher Education Act of 1965 ("HEA”) as part of President Lyndon B. Johnson’s Great Society. 20 U.S.C. § 1070 et seq. Its purpose "to assist in making available the benefits of postsecondary education to eligible students,” Id. § 1070(a), the statute "was intended to benefit the student, and not the institution,” Bowling Green Jr. Coll. v. U.S. Dep't of Educ., 687 F.Supp. 293, 296 (W.D.Ky. 1988).
. The accuracy of this particular statement is hard to gauge. Technically, Ashford has one physical location in Clinton, Iowa, and the University of the Rockies has its one physical campus in Colorado Springs, Colorado. Ashford's corporate headquarters is, however, in San Diego. This fact suggests that Carter worked not on the "San Diego campus” but at Ashford's corporate center in San Diego.
. From 2002 to 2010, the period of this lawsuit, consideration of this data was permitted so long as recruitment numbers were not the sole determinant of an advisor’s pay. See infra Part II.B.
. For a more detailed elucidation of the relevant statute and regulation, see infra Part II.B.
. That appellation traces its roots to the common law term for such actions: qui tam pro domino rege, quam pro se ipso in hoc parte sequi-tur, meaning "he who uses for the king as well as for himself.” Little v. Shell Exploration & Prod. Co., No. H-07-871, 2011 U.S. Dist. LEXIS 41566, at *2-3, 2011 WL 1370565, at *1 (S.D.Tex. Apr. 8, 2011); Black’s Law Dictionary 1262 (7th ed. 1999) (defining the phrase).
. As this suit covers actions that allegedly transpired between 2004 and 2010, this safety harbor was in force during the relevant time period. (Doc. No. 41 at 3.)
. Both Parties seem to overlook a critical fact: TIFF production can still contain metadata, depending on the software and process involved.
. Though not particularly relevant at this stage, it is notable that this original request was remarkably broad. The same can be said about the demand that spawned Dispute # 3. See infra Part II.C-D.
. Technically, Plaintiffs employ the word "thus.” (Doc. No. 63 at 8.) Because this adverb, as a linguistic matter, equates to "accordingly” or "consequently” in denotation, the Plaintiffs' own motion effectively contends that these investigations are the reason why the referenced ESI should not be deemed inaccessible. How this can be known, rather than inferred, is unclear.
. Beyond the legal weaknesses in this contention, later to be detailed, this statement is factually and logically incorrect. TIFF, as numerous sources recognize, is a "reasonably usable form,” and by definition ESI placed in inaccessible backup tapes in the regular course of business is "ordinarily maintained” in inaccessible form. To wit, regardless of the production format demanded, already inaccessible data is by definition inaccessible. These defects are further explored below. See infra Part III.
. This denial is the focus of Document Numbers 72 and 73, as Plaintiffs have petitioned for this order’s reconsideration in the former motion.
. Despite the Court’s briefing schedule, a cascade of papers continued unabated. Not only did this torrent hopelessly confuse the issues but it also eventually devolved into attacks of a peculiarly personal nature. This troubling pattern will be the subject of a separate order.
. Once the government declined to intervene, the suit was unsealed on January 2, 2013. (Doc. No. 41 at 3.) Defendants claim to have been generally unaware of their potential legal liability until that precise date; Plaintiffs seem to mock this position. (Doc. No. 63 at 7-8; Doc. No. 72 at 4-8.)
. Whatever one’s thoughts regarding qui tam actions, this statements strike the Court as needlessly dramatic. Plaintiffs—and their counsel— will earn much if this action succeeds, and since a portion of the recovery goes to Plaintiffs, the sum of which the United States has been defrauded will not be entirely remitted to the Treasury.
. "The overwhelming majority of information today is created and stored electronically ... Information that historically would have been kept in 'hard copy’ in a filing cabinet, now originates and largely remains in electronic format, perhaps never reduced to paper.” Francis F.X. Pileggi, Kevin F. Brady & Jill Agro, Inspecting the Corporate “Books and Records" in a Digital World: The Role of Electronically Stored Information, 37 Del. J. Corp. L. 163, 165 (2012). This fact was already true more than a decade ago. For example, according to one estimate, 93% of all information created in 1999 was done so electronically. Philip J. Favro, A New Frontier in Electronic Discovery: Preserving and Obtaining Metadata, 1 B.U.J. Sci & Tech. L. 1, 2 (2007).
. While the Rules were altered in 2006, the substantive rules to discovery of ESI articulated in these cases and their progeny were left undisturbed.
. The Sedona Conference has created a framework for the best electronic discovery practices that attempts to account for both this evolving case law and new technologies. See Larson v. AT & T Mobility LLC, 687 F.3d 109, 130 n. 33 (3d Cir. 2012). The Conference itself and its publications have been described as "the leading authorities on electronic document retrieval and production.” Ford Motor Co. v. Edgewood Props., Inc., 257 F.R.D. 418, 424 (D.NJ. 2009).
. For this reason, even inaccessible ESI may be deemed "active,” so long as it is currently and regularly used.
. Significantly, the dangerous incentives created by this division for certain defendants to render more data inaccessible than they would normally do so was recognized prior to the Rules’ formal adoption of the Zubulake approach. Nonetheless, the Committee on Rules of Practice and Procedure recognized that the possibility of sanctions would take care of this "gaming” concern. Comm, on Rules of Practice & Procedure of the Judicial Conference of the U.S., Summary of the Report of the Judicial Conference on the Committee on Rules of Practice and Procedure 32 (2005); Craig Ball, What Judges Should Know About Discovery From Backup Tapes 4 (2007). Thus, so long as the ESI’s inaccessibility occurs in the ordinary course of business and in the absence of any imputation of malicious intent, the modern era’s cost shifting paradigm should be applied.
. As previously noted, see supra Part I, the distinction between "accessible" and “inaccessible” formats tends to "correspondí] closely to the expense of production." Zubulake, 217 F.R.D. at 318.
. Conversely, destruction of the resulting backup tapes themselves would be grounds for an adverse inference.
. Plaintiffs ask the Court for more time to depose a person in Defendant’s employ who is most
. The Court, however, will grant one exception. As to any ESI produced after this suit’s unsealing, this Court will split the costs, for it can be reasonably presumed that at that point in time Defendants were surely aware of their legal liability and future plaintiffs’ likely need for active data. See infra Part IV.
. This finding would not affect the Court’s subsequent analysis. Even if Plaintiffs’ requests had been detailed and precise, this cost-shifting analysis in this order’s next two parts would remain mostly unchanged.
. Williams factored in the Aguilar decision upon which Plaintiffs rely. (Doc. No. 67 at 2.)
Reference
- Full Case Name
- UNITED STATES of America ex rel. James CARTER and Roger Lengyel v. BRIDGEPOINT EDUCATION, INC., Ashford University LLC, and Does 1-500, Inclusive
- Cited By
- 24 cases
- Status
- Published