SlideShare a Scribd company logo
1 of 11
FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
Does Relevance Always Matter? Yes 2
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party?  See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract.  Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006)  A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998)  8
The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
Thank You! Please visit www.daegis.com for more eDiscovery resources.

More Related Content

Viewers also liked

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015
Amine Saadouni
 

Viewers also liked (8)

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalan
 
Papan nama gugus depan
Papan nama gugus depanPapan nama gugus depan
Papan nama gugus depan
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentes
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomy
 
Tax loss expiration
Tax loss expirationTax loss expiration
Tax loss expiration
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
 

More from Daegis

5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
Daegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
Daegis
 

More from Daegis (12)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Frcp 45 20110721

  • 1. FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
  • 2. Does Relevance Always Matter? Yes 2
  • 3. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
  • 4. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party? See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
  • 5. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
  • 6. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract. Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
  • 7. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
  • 8. The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006) A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998) 8
  • 9. The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
  • 10. Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
  • 11. Thank You! Please visit www.daegis.com for more eDiscovery resources.