chevron-down Created with Sketch Beta.

ARTICLE

Clawing Your Way to the Top in the Age of Computer-Assisted Review

Robert Ernest Sumner IV and Joel Berly

Summary

  • Managing vast volumes of electronically stored information necessitates technology-assisted review (TAR) or computer-assisted review (CAR) to replace traditional manual document review, which is impractical for large datasets.
  • Despite the benefits, TAR and CAR are not foolproof, leading to potential inadvertent disclosures of privileged information.
  • Clawing back such information is governed by Fed. R. Evid. 502(b), which involves complex and potentially costly disputes over inadvertence and reasonableness of preventive measures.
  • Best practices include submitting a 502(d) order jointly or separately from protective orders to clearly address claw-back procedures and dispute resolution.
Clawing Your Way to the Top in the Age of Computer-Assisted Review
gremlin via Getty Images

Have you ever tried to personally review 15 million pages of electronic documents for privilege and relevance? There comes a time in the discovery process when manual, human review of documents is not only inefficient, but a practical impossibility. The management of large volumes of electronically stored information (ESI), including emails with attachments and families, Word documents, PDFs, Excel spreadsheets, PowerPoints, photos, and texts, has forced lawyers and law firms to implement technology-assisted review (TAR) or computer-assisted review (CAR) protocols in lieu of the traditional document review process.

The benefits of TAR and CAR review are countless, but there are unavoidable downsides to an objective review process that lacks human intuition and judgment. Stated simply, the problem is that TAR and CAR are not perfect and there are still scenarios in which privileged information can be missed and inadvertently produced to opposing counsel.

With this backdrop, the issue of clawing back inadvertently-produced privileged or sensitive information has emerged at the top of most litigators’ list of worries. Under ordinary circumstances, claw-back questions are governed by Fed. R. Evid. 502(b). In order to show that a disclosure does not constitute a waiver of attorney-client privilege under Rule 502(b), the party who made the disclosure must demonstrate: (1) the disclosure was inadvertent; (2) the holder of the privilege took reasonable steps to prevent disclosure; and (3) the holder of the privilege took reasonable steps to rectify the error. But the Rule 502(b) matrix creates uncertainties that are ripe for argument, including what constitutes inadvertence, reasonableness, and reasonable measures to cure the disclosure problem. The only certainty under this matrix is that a claw-back request can easily become time-intensive and expensive.

The uncertainties and unpleasantness of a Rule 502(b) dispute can be avoided, however, with the use of a Rule 502(d) order. Rule 502(d) provides that “[a] federal court may order that the privilege or protection is not waived by disclosure connected with litigation pending before the court—in which event the disclosure is also not a waiver in any other federal or state proceeding.” In other words, Rule 502(d) gives the court the authority to issue an order declaring that an inadvertent disclosure of documents does not constitute a waiver of privilege.

502(d) orders are not a novel concept. Case law research reveals that 502(d) orders have been employed across the country, particularly in U.S. district courts in New York, West Virginia, Florida, and South Carolina since as early as 2012. In fact, the Advisory Committee Notes for Rule 502(d) state: “The rule provides a party with a predictable protection from a court order—predictability that is needed to allow the party to plan in advance to limit the prohibitive costs of privilege and work product review and retention.”

There are a few practices that will increase the likelihood of a court entering a 502(d) order. First, it is recommended that the parties confer and submit a proposed 502(d) order jointly or by consent. Second, it is recommended that the 502(d) order be submitted as a separate and freestanding document from the consent protective order. While there is nothing to prevent the inclusion of Rule 502(d) protections within a protective order, utilizing a separate order helps to identify and highlight the preemptory effect of the order. Finally, while there is no “magic language” required in a 502(d) order, it is recommended that counsel include sufficient details to address handling of a claw-back dispute and to ensure efficient dispute resolution under the order.

The ability to use a 502(d) order to preempt a prolonged fight over an inadvertent disclosure and the factors listed under 502(b) is an invaluable resource to lawyers, their clients, and the judicial system. The practice increases judicial efficiency and provides an added layer of protection that is becoming ever more important with the evolution of ESI. In light of the complexities of modern discovery and ESI management, innovative litigators across all jurisdictions should employ 502(d) orders to protect themselves and their clients from the ill-effects of protracted claw-back proceedings. Don’t let complacency or prior good fortune distract you; get on board with 502(d) orders before you inadvertently disclose a privileged document and it is too late.

    Author