SlideShare a Scribd company logo
FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
Does Relevance Always Matter? Yes 2
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party?  See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract.  Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006)  A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998)  8
The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
Thank You! Please visit www.daegis.com for more eDiscovery resources.

More Related Content

Viewers also liked

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015Amine Saadouni
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalan
Windi Andrianita
 
Papan nama gugus depan
Papan nama gugus depanPapan nama gugus depan
Papan nama gugus depan
Felicia Rumbekwan
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentes
Jhanira Guerra
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomy
Vibhay Pareek
 
Tax loss expiration
Tax loss expirationTax loss expiration
Tax loss expiration
Financial Modelling Handbook
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4
Brad Kremer
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
wisnuwms
 

Viewers also liked (8)

CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015CV Amine Saadouni Fr 2015
CV Amine Saadouni Fr 2015
 
Sejarah pengukuhan ambalan
Sejarah pengukuhan ambalanSejarah pengukuhan ambalan
Sejarah pengukuhan ambalan
 
Papan nama gugus depan
Papan nama gugus depanPapan nama gugus depan
Papan nama gugus depan
 
Toma de decisiones para adolescentes
Toma de decisiones para adolescentesToma de decisiones para adolescentes
Toma de decisiones para adolescentes
 
Radiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomyRadiological Imaging in Head and Neck and relevant anatomy
Radiological Imaging in Head and Neck and relevant anatomy
 
Tax loss expiration
Tax loss expirationTax loss expiration
Tax loss expiration
 
Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4Atmosphere and climate science - MYP Year 4
Atmosphere and climate science - MYP Year 4
 
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 JakartaMakalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
Makalah Evaluasi Program Kerja OSIS/PK VIP SMAN 68 Jakarta
 

More from Daegis

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
Daegis
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
Daegis
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
Daegis
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
Daegis
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
Daegis
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
Daegis
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
Daegis
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Daegis
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Daegis
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
Daegis
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
Daegis
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
Daegis
 

More from Daegis (12)

Finding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for ITFinding the Right Information Governance Solution for IT
Finding the Right Information Governance Solution for IT
 
5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid5 Information Governance Budgeting Pitfalls to Avoid
5 Information Governance Budgeting Pitfalls to Avoid
 
Office 365 Emails & Archiving
Office 365 Emails & ArchivingOffice 365 Emails & Archiving
Office 365 Emails & Archiving
 
The Benefits of Hosted Archive
The Benefits of Hosted ArchiveThe Benefits of Hosted Archive
The Benefits of Hosted Archive
 
Demystifying Predictive Coding Technology
Demystifying Predictive Coding TechnologyDemystifying Predictive Coding Technology
Demystifying Predictive Coding Technology
 
Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)Judicial Acceptance of Technology Assisted Review (TAR)
Judicial Acceptance of Technology Assisted Review (TAR)
 
Technology is the Best Defense
Technology is the Best DefenseTechnology is the Best Defense
Technology is the Best Defense
 
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted ReviewLearning from Big Data – Simplify Your Workflow Using Technology Assisted Review
Learning from Big Data – Simplify Your Workflow Using Technology Assisted Review
 
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...Technology Assisted Review (TAR):  Opening, Exploring and Bringing Transparen...
Technology Assisted Review (TAR): Opening, Exploring and Bringing Transparen...
 
Effective Internal Investigations
Effective Internal InvestigationsEffective Internal Investigations
Effective Internal Investigations
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
Native eDiscovery for Lotus Notes
Native eDiscovery for Lotus NotesNative eDiscovery for Lotus Notes
Native eDiscovery for Lotus Notes
 

Recently uploaded

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 

Recently uploaded (20)

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 

Frcp 45 20110721

  • 1. FRCP 45 Subpoenas and Non-Party Productions: Avoiding the Pitfalls
  • 2. Does Relevance Always Matter? Yes 2
  • 3. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Control Corporate structure, The non-party’s connection to the litigation, Whether the related party and non-party exchange information in the ordinary course of business, The non-party’s stake in the outcome, and Whether the non-party has participated in the litigation. SeeSteele Software Systems v. Dataquick Information Systems, 237 F.R.D. 561 (D. Md. 2006). 3
  • 4. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Indicia of Legal Authority Is the non-party an agent or independent contractor? See Goodman v. Praxair Services, Inc., 2009 WL 1955805 (D. Md., July 7, 2009). Does the party retain the legal right to access documents via a contract with the non-party? See Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D. Cal., Sept. 2, 2008). 4
  • 5. Possession, Custody or Control Does the party retain the legal right to or practical control over documents in the possession of the legally related non-party? Avoiding Pitfalls:  Legally Related Entities Discovery response plan: Assess the relationship with any legally related entities. Does the organization have practical control over ESI in the possession of such entities? 5
  • 6. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena 9 Moore’s Federal Practice §45.02[1] (Matthew Bender 3d. ed.) Preserve per the scope of the subpoena. Preserve more broadly if required by contract. Preserve more broadly if the non-party anticipates becoming a party in the current or a future litigation: See, e.g., Phillip M. Adams & Assocs. v. Dell, 621 F.Supp.2d 1173 (D. Del. 2009) (“sensitivity” to industry issues triggered duty to preserve). 6
  • 7. A Non-Party’s Preservation Duty Arises… …with Service of the Subpoena The Sedona Conference® suggests: The parties may wish to discuss at the meet and confer how and when to notify non-parties as to whether they may resume routine document destruction. A non-party asserting that it has fulfilled its preservation obligations may wish to notify the issuing party in writing. Once the issuing party has received that notice, the non-party should continue to preserve for an agreed-upon “review period” while the receiving party reviews and authenticates the production and, Absent further request or objection by either party, the non-party’s obligation to preserve should terminate at the conclusion of the specified “review period.” 7
  • 8. The Standing of a Party to Move to Quash a Rule 45 Subpoena A motion to quash, or for a protective order, should generally be made by the person from whom the documents or things are requested.  9A Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure §2459 (2d. ed. 1995); Kiger v. Plaisance Dragline, Civ.  A.  04-3453, 2006 WL 3228289, at *1 (E.D. La. Nov. 2, 2006) A party generally lacks standing to challenge a subpoena issued to a non-party absent a claim of privilege, proprietary interest, or personal interest in the subpoenaed matter.  United States v. Nachamie, 91 F.Supp. 2d. 552, 559 (S.D.N.Y. 2000); Chiperas v. Rubin, No. CIV.A 96-130, 1998 WL 765126 (D.D.C. Nov. 3, 1998) 8
  • 9. The Standing of a Party to Move to Quash a Rule 45 Subpoena  A “personal interest” in the subpoenaed ESI may arise where a non-party’s computer was used by the non-party to send information on behalf of a party, or the party itself used the computer.  See, e.g. Hoover v. Florida Hydro, Inc., 2008 WL 4467661 (E.D. La. Oct. 1, 2008) (Where the plaintiff had standing to move to quash a subpoena issued to his mother because he and his mother both sent information relevant to the litigation from her computer.) 9
  • 10. Tracking Costs Number of Custodians Data Volume Resources Tools Business Disruption 10
  • 11. Thank You! Please visit www.daegis.com for more eDiscovery resources.