SlideShare uma empresa Scribd logo
1 de 11
FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
Does Relevance Always Matter? Yes 2
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party?  See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract.  Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006)  A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998)  8
The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
Thank You! Please visit www.daegis.com for more eDiscovery resources.

Mais conteúdo relacionado

Destaque

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015Amine Saadouni
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalanWindi Andrianita
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentesJhanira Guerra
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyVibhay Pareek
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Brad Kremer
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakartawisnuwms
 

Destaque (8)

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalan
 
Papan nama gugus depan
Papan nama gugus depanPapan nama gugus depan
Papan nama gugus depan
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentes
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomy
 
Tax loss expiration
Tax loss expirationTax loss expiration
Tax loss expiration
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
 

Mais de Daegis

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITDaegis
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to AvoidDaegis
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & ArchivingDaegis
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted ArchiveDaegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDaegis
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Daegis
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best DefenseDaegis
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewDaegis
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...Daegis
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery ProcessDaegis
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesDaegis
 

Mais de Daegis (12)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Frcp 45 20110721

  • 1. FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
  • 2. Does Relevance Always Matter? Yes 2
  • 3. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
  • 4. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party? See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
  • 5. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
  • 6. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract. Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
  • 7. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
  • 8. The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006) A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998) 8
  • 9. The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
  • 10. Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
  • 11. Thank You! Please visit www.daegis.com for more eDiscovery resources.