United States District Court, W.D. Washington, Seattle
Michael C. Subit, Steven B. Frank, Frank Freed Subit & Thomas LLP, Seattle, WA, Attorneys for Plaintiff.
Patrick M. Madden, Stephanie Wright Pickett, Seattle, WA, Attorneys for Defendants.
MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION AND ORDER
RICHARD A. JONES, District Judge.
The parties hereby stipulate to the following provisions regarding the discovery of electronically stored information ("ESI") in this matter:
A. General Principles
1. An attorney's zealous representation of a client is not compromised by conducting discovery in a cooperative manner. The failure of counsel or the parties to litigation to cooperate in facilitating and reasonably limiting discovery requests and responses raises litigation costs and contributes to the risk of sanctions.
2. The proportionality standard set forth in Fed.R.Civ.P. 26(b)(2)(C) must be applied in each case when formulating a discovery plan. To further the application of the proportionality standard in discovery, requests for production of ESI and related responses should be reasonably targeted, clear, and as specific as possible.
B. ESI Disclosures
At a time agreed to by the parties, each party shall disclose:
1. Custodians. The five custodians most likely to have discoverable ESI in their possession, custody or control. The custodians shall be identified by name, title, connection to the instant litigation, and the general subject matter of the information believed to be under his/her control.
2. Non-custodial Data Sources. A list of non-custodial data sources (e.g. shared drives, servers, etc.), if any, likely to contain discoverable ESI.
3. Third-Party Data Sources. A list of third-party data sources, if any, likely to contain discoverable ESI (e.g. third-party email and/or mobile device providers, "cloud" storage, etc.) and, for each such source, the extent to which a party is (or is not) able to preserve information stored in the third-party data source.
4. Inaccessible Data. A list of data sources, if any, likely to contain discoverable ESI (by type, date, custodian, electronic system or other criteria sufficient to specifically identify the data source) that a party asserts is ...