SlideShare uma empresa Scribd logo
1 de 11
FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
Does Relevance Always Matter? Yes 2
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party?  See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract.  Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006)  A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998)  8
The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
Thank You! Please visit www.daegis.com for more eDiscovery resources.

Mais conteúdo relacionado

Destaque

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015Amine Saadouni
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalanWindi Andrianita
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentesJhanira Guerra
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyVibhay Pareek
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Brad Kremer
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakartawisnuwms
 

Destaque (8)

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalan
 
Papan nama gugus depan
Papan nama gugus depanPapan nama gugus depan
Papan nama gugus depan
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentes
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomy
 
Tax loss expiration
Tax loss expirationTax loss expiration
Tax loss expiration
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
 

Mais de Daegis

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITDaegis
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to AvoidDaegis
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & ArchivingDaegis
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted ArchiveDaegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDaegis
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Daegis
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best DefenseDaegis
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewDaegis
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...Daegis
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal InvestigationsDaegis
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery ProcessDaegis
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesDaegis
 

Mais de Daegis (12)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Último

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Último (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Frcp 45 20110721

  • 1. FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
  • 2. Does Relevance Always Matter? Yes 2
  • 3. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
  • 4. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party? See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
  • 5. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
  • 6. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract. Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
  • 7. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
  • 8. The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006) A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998) 8
  • 9. The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
  • 10. Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
  • 11. Thank You! Please visit www.daegis.com for more eDiscovery resources.