MEMORANDUM OPINION AND ORDER
Plaintiffs, Drew Heriot (“Heriot”) and Drew Pictures Pty Ltd. (“Drew Pictures”) (collectively “Plaintiffs”), sued defendants Rhonda Byrne, The Secret LLC (a/k/a TS Holdings LLC), Prime Time U.S. Inc., TS Production Holdings LLC, TS Production LLC, and TS Merchandising Ltd. (collectively “Defendants”). Currently before this Court are Defendants’ Motion to Compel Production of Documents Plaintiffs Contend are Privileged (“Defendants’ Motion”) and Plaintiffs’ Motion to Compel Production of Documents Concerning Joan Kaufman, Martin Goodrich and Cheryl Durham (“Plaintiffs’ Motion”). This Court rules on these Motions under Judge Suzanne B. Conlon’s referral of this case for discovery supervision pursuant to Local Rule 72.1. For the reasons stated below, this Court denies in part and grants in part Defendants’ Motion. This Court also denies in part Plaintiffs’ Motion and withholds its ruling on the remainder of Plaintiffs’ Motion until after Defendants comply with this Order.
I. Background
This Court has limited the procedural and factual history to the information relevant to the disputes involving Plaintiffs’ and Defendants’ Motions. For the sake of brevity, this section omits some facts discussed in later sections of this Order. The two separate sections below deal with the facts concerning each Motion. Before reaching those sections, however, this Court recounts the basic facts underlying this lawsuit.
This case involves a controversy over The Secret, a made-for-television documentary that purports to reveal the “most powerful law in the universe.” The Secret, http:// www.thesecret.tv/ (last visited Mar. 17, 2009). As if that declaration was not grandiose enough, the website further claims that, “[b]y applying the knowledge of this law, you can change every aspect of your life.” Id. Heriot is an Australian citizen who directed The Secret. (Compl. ¶ 1; Answer ¶ 1). Drew Pictures is an organization organized under the laws of Australia (Answer ¶ 2), and allegedly employs Heriot and holds the rights to his works (Compl.t 2). Defendants are various individuals and entities involved in The Secret’s development. (Answer at ¶¶3-9.)
Plaintiffs sued Defendants on April 21, 2008, in the United States District Court for Northern District of Illinois. (Comply 1.) In their complaint, Plaintiffs sought a declaratory judgment of copyright ownership (which, they claim, results in Defendants’ “duty to account”) and an equitable accounting. (Id. at ¶¶ 60-75.) Plaintiffs also claimed Defendant infringed their copyrights and were unjustly enriched. (Id. at ¶¶ 76-84.) Defendants answered the complaint on August 4, 2008, denying Plaintiffs’ claims and asserting affirmative defenses. (See Answer.) Additionally, in the answer, defendant TS Production LLC asserted a counterclaim, which prayed for a declaratory judgment that TS Production LLC was the sole owner of the copyright in the disputed works Defendants claimed “Drew Pictures wrongfully registered with the United States Copyright Office on September 10, 2007.” (Answer 1 at ¶ 2,14 at ¶¶ 1-10.) Discovery ensued.
A. Facts Concerning Defendants’ Motion
Defendants’ Motion concerns documents Plaintiffs produced pursuant to Defendants’ request. On July 25, 2008, Defendants
First, the Vendor created a database of the documents provided to it by Plaintiffs (“Master Database”), which Plaintiffs then could review. (Id. at 3^1) Second, during April and May of 2008, Plaintiffs “had paralegals and other non-lawyers conduct a preliminary review [of] the documents in the Master Database,” assigning documents “general, pretrial discovery codes.” (Id. at 4.) One general code was “hnmigration,” which Plaintiffs “used to flag documents (primarily e[-]mails) that had anything to do with Mr. Heriot’s immigration to the United States.” (Id.)
Third, Plaintiffs searched for responsive documents in their Master Database. (Id.) Fourth, once identified, these responsive documents would be “coded for subsequent copying and inclusion in the Production Database.” (Id.) Additionally, Plaintiffs would mark responsive documents “as either Confidential or Highly Confidential under the Stipulated Protective Order.”
To comply with Defendants request regarding Heriot’s immigration visa, Plaintiffs requested and received a paper copy of the visa from Heriot’s immigration lawyer. (Id at 5.) On or around August 22, 2008, Plaintiffs gave the Vendor Heriot’s visa application “with instructions to (1) scan and add it to the Master Database, (2) copy the scanned versions to the Production Database, ... (3) electronically stamp the application as ‘Highly Confidential’ for production^] ... [ (4) ] Bates Stamp all documents in the Production Database, and ... [ (5) ] include Mr. Heriot’s visa application and other sensitive material at the front of the production.” (Id. at 5-6.) Unfortunately, the Vendor imported Heriot’s visa application into the Master Database, assigning it the general “immigration” code. (Id. at 6.) The Vendor then made another mistake, copying all the documents with the “immigration” code from the Master Database to the Production Database, stamping them all “Highly Confidential.” (Id.) This mistake resulted in the Vendor unintentionally including additional e-mails marked as “Highly Confidential” in the production. (Id.)
On August 25, 2008, after completing this process, Plaintiffs produced around 1499 documents comprised of 6952 pages. (Defs.’ Mem. in Supp. of Defs.’ Mot. 1; Pls.’ Resp. to Defs.’ Mot 6.) On October 17, 2008, Defendants’ counsel, David Elkins, asked Plaintiffs if they had withheld any documents on the basis of privilege, to which Plaintiffs responded in the negative. (Pls.’ Resp. to Defs.’ Mot. 6-7.) On October 22, 2008, apparently in preparation for a deposition scheduled to take place on October 24, 2008, Plaintiffs learned of the allegedly inadvertently disclosed documents. (Id. at 7.) The next day, October 23, 2008, Plaintiffs sent Defendants a letter in which Plaintiffs stated that they had inadvertently disclosed several documents protected by the attorney-client privilege, identified those documents (the “Sequestered Documents”), and requested their destruction. (Id., Ex. B at ¶ 14; Defs.’ Mem. in Supp. of Defs.’ Mot. 6.) Defendants complied with Plaintiffs’ request, directing their “e-discovery vendor to seal off all access to,” and destroying all but one set of copies
Defendants then filed their Motion currently before this Court on November 14, 2008. In their memorandum supporting this Motion, Defendants argued that this Court
B. Facts Concerning Plaintiffs’ Motion
Plaintiffs’ Motion, like Defendants’ Motion, concerns documents, albeit different ones. Sometime in or before October 2008, Plaintiffs propounded on Defendants requests for documents, to which Defendants responded on October 24, 2008, by producing a Privilege Log (“Log”). (Pls.’ Mot. 2.) The Log identified 998 documents that Defendants wit h held on the basis of privilege. (Id., Ex. A.) Eleven days later, on November 4, 2008, Defendants produced a Supplemental Privilege Log (“Supplemental Log”), which identified a total of 1467 documents, including those disclosed in the Log, withheld based on privilege. (Id., Ex. B.)
In response, on November 11, 2008, Plaintiffs identified over 132 documents (“Identified Documents”) in Defendants Log and Supplement Log (collectively “Logs”) that Plaintiffs contended involved communications with three non-privileged third parties: Joan Kaufman (“Kaufman”), Martin Goodrich (“Goodrich”), and Cheryl Durham (“Durham”). (Id., Ex. C.) Plaintiffs contended that Kauffman was Prime Time’s outside bookkeeper, Goodrich was Prime Time’s outside accountant, and Durham was Goodrich’s assistant. (Id. at 2.)
That same day, Plaintiffs requested the Identified Documents from Defendants, asking Defendants to respond no later than November 14, 2008. (Id., Ex. C.) One day prior to the deadline, Defendants responded that, “[w]hile [Plaintiffs] state that ‘at least 132 entries’ in Defendants’ ... [Logs] appear challengeable ..., [Plaintiffs’] e[-]mails actually identify 248 separate production ranges-almost twice that amount.” (Id., Ex. D.) Defendants further stated that they were re-reviewing the Identified Documents and could not comply with the request by November 14, 2008. (Id.) They did, however, state that they would eventually comply with the request and would be “prepared to explain further why [the] [Identified [D]ocuments are privileged ... or promptly produce any erroneously designated as privilege (if any).” (Id.)
Later, Defendants noticed the depositions of, among others, Goodrich and Kaufman. Plaintiffs filed a motion for a protective order and a motion to quash the deposition notices on November 21, 2008.
That same day, Plaintiffs received Defendants’ response to its November 14, 2008, demand for documents. (Id. at 3, Ex. I.) In that response, Defendants explained why the Identified Documents were privileged. (Id. at 3, Ex. I. at 1-6) Defendants asserted that the attorney-client privilege protected communications with Goodrich because “[he] worked closely with Prime Time and its counsel on many matters over several years.” (Id. at 3, Ex. I. at 2.) Defendants also stated that “Goodrich was asked to provide and provided facts and analysis to assist Defendants’ lawyers in rendering legal services.” (Id.) Defendants further asserted that “Goodrich essentially acted as Prime Time’s Chief Financial Officer ... [because he] was intimately involved in certain maters involving The Secret entities and was treated in many instances as if he was Defendants’ trusted
Defendants stated that “[t]he attorney-client privilege extends to disclosures made to ... Durham for the same reasons it extends to ... Goodrich.” (Pis.’ Mot., Ex. I at 4.) In other words, the privilege applied because Durham, as Goodrich’s assistant, acted on Goodrich’s behalf; therefore, her conversations were privileged. (Defs.’ Mem. in Opp’n 3.)
As to Kaufman, Defendants stated that she “was Prime Time’s agent and provided accounting services to Prime Time for approximately nine years.” (Pls.’ Mot., Ex. I at 4.) As a result, Defendants contended, her communications were privileged. (Id.; Defs.’ Mem. in Opp’n 2.)
Shortly thereafter, on November 26, 2008, Plaintiffs filed their Motion to compel production of these documents. Specifically, Plaintiffs requested the following numbered documents: 2, 8, 193, 195, 196, 199, 203, 204, 215, 219, 220, 221, 230, 231, 232, 233, 234, 236, 240, 241, 242, 254, 257, 269, 279, 281, 282, 283, 285, 604, 620, 621, 622, 628, 629, 630, 639, 640, 641, 642, 643, 644, 855, 1235, 1272, 1273, 1274, 1275, 1276, 1289, 1290, 1291, 1292, 1293, 1294, 1295, 1296, 1314, 1322, 1323, 1324, 1325, 1326, 1327, 1329, 1330, 1332, 1333, 1344, 1345, 1346, 1347, 1348, 1349, 1350, 1351, 1352, 1353, 1354, 1355, 1356, 1357, 1358, 1359, 1360, 1361, 1362, 1363, 1367, 1368, 1369, 1370, 1372, 1373, 1375, 1376, 1377, 1378, 1379, 1380, 1381, 1382, 1383, 1441, and 1442. (Pls.’ Mot. 1-2.)
On December 8, 2008, Defendants filed a Memorandum in Opposition to Plaintiffs’ Motion. In that memorandum, Defendants listed with specificity which privilege applied to which documents. First, Defendants asserted work-product privilege over six doeuments: 622, 630, 639, 640, 1441, and 1442. (Defs.’ Mem. in Opp’n 5 n. 12.) Second, Defendants asserted attorney-client privilege over the following numbered documents: 2, 8, 193, 195, 196, 199, 203, 204, 215, 219, 220, 221, 230, 231, 232, 233, 234, 236, 240, 241, 242, 254, 257, 269, 279, 281, 282, 283, 285, 604, 620, 622, 628, 630, 639, 640, 644, 855, 1235, 1272, 1273, 1274, 1275, 1276, 1289, 1290, 1291, 1292, 1293, 1294, 1295, 1296, 1314, 1322, 1323, 1324, 1325, 1326, 1327, 1329, 1330, 1332, 1333, 1344, 1345, 1346, 1347, 1348, 1349, 1350, 1351, 1352, 1353, 1354, 1355, 1356, 1357, 1358, 1359, 1360, 1361, 1362, 1363, 1367, 1368, 1369, 1370, 1372, 1373, 1375, 1376, 1377, 1378, 1379, 1380, 1381, 1382, 1383, 1441, and 1442. (Id. at 2-3 nn. 2-10.)
Finally, Defendants contended that this Court should deny Plaintiffs’ Motion as it pertains to documents 641, 642, and 643 because “Defendants’ privilege log inadvertently listed Goodrich and Durham as recipients of these e[-]mails[, and t]hey were not.” (Defs.’ Mem. in Opp’n 1 n. 1.) Defendants also asserted that this Court should deny Plaintiffs’ Motion as to documents 621 and 629 because they are identical, and because Defendants “produced” them to Plaintiffs.
On December 9, 2008, Judge Conlon referred Plaintiffs’ Motion to this Court, again expanding the scope of the July 24, 2008, referral. Plaintiffs filed their reply to Defendants’ Memorandum in Opposition to Plaintiffs’ Motion on December 11, 2008.
The parties appeared and this Court made several rulings on December 12, 2008, but continued Plaintiffs’ and Defendants’ Motions until January for a settlement conference. In the interim, the parties filed a flurry of motions that are not relevant to this matter. After an unsuccessful settlement conference on January 9, 2009, the parties appeared before this Court to argue their respective motions on February 5, 2009.
Because this case involves two different Motions, one by each party, this Court deals with each separately.
A. Defendants’ Motion to Compel
1. Federal Rule of Evidence 502
As an initial matter, the parties dispute whether Federal Rule of Evidence 502 (“FRE 502”) applies, and. if it does, whether it supercedes the test quoted in Judson Atkinson Candies, Inc., v. Latini-Hohberger Dhimantec,
Congress amended FRE 502 on September 19, 2008, stating that “[t]he amendments made by this Act shall apply in all proceedings commenced after ... [September 19, 2008], and insofar as is just and practicable, in all proceedings pending on .... [September 19, 2008].” Act of Sept. 19, 2008, Pub.L. No. 110-322, § 1, 122 Stat. 3537, 3538 (amending the Federal Rules of Evidence to address the waiver of the attorney-client privilege and the work-product doctrine) (codified as Fed.R.Evid. 502). The newly amended FRE 502 applies when communications or documents covered by the attorney-client or work-product privileges are disclosed during a federal proceeding. Id.
Ordinarily, disclosure of confidential information to an unprotected third party operates as a waiver. See U.S. v. Hamilton,
Plaintiffs argue that “[FRE] 502 is applicable to this case[,] and Defendants offer no reason why it would not be ‘just and practicable’ to apply [FRE] 502 to this case as in every other case.” (Pis.’ Resp. to Defs.’ Mot. 8.) Defendants argue that this Court should apply the three-part inquiry quoted in Judson,
There is no question that FRE 502 applies to this case.
The resolution of that issue, however, does not automatically dispose of Defendants’ argument that Judson applies. Both Judson and Sanner were decided prior to the enactment of amended FRE 502, making the effect of FRE 502 an issue of first impression for this Court. To properly assess whether FRE 502(b) overrides Judson, this Court examines each step of the Judson test.
Defendants also urge this Court to adopt Judson’s third step, which requires the court to determine, using a “balancing approach,” whether a waiver occurred despite the inadvertent disclosure of privileged information.
That tack, however, has been at least partially foreclosed by Congressional action. FRE 502 specifically states that inadvertent disclosure “does not operate as a waiver in a Federal ... proceeding.” Fed.R.Evid. 502(b). In other words, the second and third steps of the Judson test have been folded into the entire FRE- 502(b) inquiry. See Fed.R.Evid. 502(b)(l)-(3). FRE 502 does not, however, prohibit the use of the Judson factors. Fed.R.Evid. 502(b) advisory committee’s note (noting that the non-dispositive factors a court may consider “are the reasonableness of precautions taken, the time taken to rectify the error, the scope of discovery, the extent of disclosure and the overriding issue of fairness”). Thus, while “[FRE 502(b) ] is flexible enough to accommodate any of those listed factors,” it “does not explicitly codify [the Judson ] test[ ] because [the factors it uses are] a set of non-determinative guidelines that vary from case to case.” Id. Therefore, the court may, but need not, use some or all of the Judson factors to assess whether FRE 502(b)’s requirements have been satisfied.
This Court therefore adopts the following test. First, a court determines whether the disclosed material is privileged. If it is not, the inquiry ends. If the material is privileged, the court applies FRE 502(b). If the court concludes that disclosing party satisfied all of the elements in FRE 502(b), the privilege is not waived. If, however, the disclosing party fails to satisfy any of the FRE 502 elements, the privilege is waived. In applying FRE 502(b), the court is free to consider any or all of the five Judson factors, provided they are relevant, to evaluate whether each element of FRE 502(b) has been satisfied.
2. Privileged Information
i. Privileged Information Generally
Before this Court can apply FRE 502(b), it must determine whether the mate-
Defendants emphasize that Plaintiffs recalled the Sequestered Documents based on attorney-client privilege by merely stating those documents constituted privileged communications between Heriot and his immigration lawyer. (Defs.’ Mem. in Supp. of Defs.’ Mot. 7.) That “conclusory assertion,” Defendants argue, “does not demonstrate that the privilege actually exists.” (Id.)
That statement is a truism-but to ask Defendants to state with specificity why the attorney-client privilege applies could force them to disclose privileged information, something which the Federal Rules of Civil Procedure do not require. See Fed.R.Evid. P. 26(b)(5) (requiring the party asserting privilege to “expressly make the claim[ ] and ... describe the nature of the documents, communications, or tangible things not produced or disclosed ... in a manner that, mthout revealing information itself privileged or protected, will enable the other parties to assess the claim”) (emphasis added). It is this Court’s responsibility, and certainly not Plaintiffs’ or Defendants’, to determine whether privilege exists. Am. Nat’l Bank & Trust Co. of Chicago v. Equitable Life Assurance Soc’y of the U.S.,
After a document-by-document review, Am. Nat’l Bank & Trust Co. of Chicago v. Equitable Life Assurance Soc’y of the US.,
Not all of the documents, however, are privileged. Documents DREW002797 and DREW002798 are not privileged because they contain communications between Heriot and his employer, Miki Willis (“Willis”). Nevertheless, Plaintiffs may redact the text of document DREW002797 above the line entitled, “Original Message,” below which is an e-mail from Willis to Heriot.
The following documents also are not privileged because they involve Leni Mex (“Leni”), an unprotected third party:
DREW002290-DREW002294, DREW002312-DREW002316, DREW002397-DREW002401, DREW002901-DREW002902, DREW002913-DREW002923, DREW002925, and DREW002928-DREW002931. Plaintiffs, however, may redact documents DREW002397 and DREW002312 to exclude the first e-mail on each of those pages, which Heriot sent to his attorney. The remaining portions of documents DREW002397 and DREW002312 must be produced un-redacted.
Because the party asserting the privilege must prove that the privilege exists, the law required Plaintiffs to inform this Court why the privilege applied to the communications involving Leni or Willis. Plaintiffs fail
ii. The Crime-Fraud Exception
Defendants do not, however, give in so easily. They argue that, even if the attorney-client privilege adheres, Plaintiffs forfeited that privilege because the crime-fraud exception applies. (Defs.’ Mem. in Supp. of Defs.’ Mot. 8-9.) Plaintiffs resist this contention and argue that they have committed no crime or fraud. (Pis.’ Resp. to Defs.’ Mot. 10-13.)
Although communications subject to the attorney-client privilege are protected, that protection can be forfeited when, for example, “ ‘the attorney ... assist[s] his client to commit a crime or a fraud.’ ” U.S. v. Al-Shahin,
Twenty years ago, the United States Supreme Court clarified when a court may review materials in camera to determine whether the crime-fraud exception applies. Zolin,
In arguing that the crime-fraud exception applies, Defendants contend that Heriot’s deposition testimony shows that he fabricated projects, stating that “Heriot perpetrated a fraud on the U.S. Department of Homeland Security by soliciting fake deal memos to trick the government into issuing him an O-Visa.” (Defs.’ Mem. in Supp. of Defs.’ Mot. 8.) Plaintiffs counter that Defendants presented Heriot’s statements out of context. (Pls.’ Resp. to Defs.’ Mot. 10-13.)
On this point, this Court agrees with Plaintiffs. Although Heriot’s deposition testimony reveals that he told the businesses with whom he had discussed employment that they could “just make up a project” (Pls.’ Resp. to Defs.’ Mot. 11, Ex. D at 304), to Heriot, “make up” meant “create,” as his following statement relating to a project entitled “Star Power” reveals: “we made up the project, [and] it turned into a pretty interesting project” (Pls.’ Resp. to Defs.’ Mot. 11, Ex. D at 304-05). Moreover, Heriot explicitly stated in his deposition that, when he discussed projects, “[he] ... intended] to come up with some ideas that were feasible that we could make. [He] was not trying to be false [sic].” (Pis.’ Resp. to Defs.’ Mot. 11, Ex. D at 305.) Furthermore, what Defendants allege to be “fake deal memos” are no such tiling (Defs.’ Mem. in Supp. of Defs.’ Mot. 8); in fact, the record reveals that some of these deal memos came to fruition, resulting in full-fledged projects (Pls.’ Resp., Ex. C at DREW000058-DREW000059; Pls.’ Supplemental Mem. in Resp. to Defs.’ Mot., Ex. 1 at ¶ 5-11).
Defendants’ argument that Heriot tried to “weave Australia in[to]” the deal memos sole
None of these statements resemble any countenance of fraud. If anything, they show that Heriot, who was legally in the country on an I-Visa (Pls.’ Resp. to Defs.’ Mot., Ex. C), actively sought work in the United States. Contrary to Defendants’ contention (Defs.’ Mem. in Supp. of Defs.’ Mot. 8-9), it is irrelevant that some of the deal memos were not binding, especially in light of the fact that other deal memos produced full-fledged projects (Pls.’ Resp., Ex. C at DREW000058-DREW000059; Pls.’ Supplemental Mem. in Resp. to Defs.’ Mot., Ex. 1 at ¶ 5-11). Based on the materials presented, this Court finds that Defendants have not shown a “ ‘factual basis adequate to support a good faith belief by a reasonable person’ ... that in camera review of the materials may reveal evidence to establish the claim that the crime-fraud exception applies.” Zolin,
Nevertheless, this Court already has reviewed the Sequestered Documents in camera to determine whether they are privileged. From this review the Court concludes that none of the communications between Heriot and his lawyer show that “Heriot perpetrated a fraud on the U.S. Department of Homeland Security by soliciting fake deal memos to trick the government into issuing him an O-Visa.” (Defs.’ Mem. in Supp. of Defs.’ Mot. 8.) Therefore, the crime-fraud exception does not apply.
3. Inadvertent Disclosure Under FRE 502
Having determined that the Sequestered Documents are protected by the attorney-client privilege, this Court applies FRE 502(b). Prior to the 2008 amendment of FRE 502, “the burden of proving inadvertent disclosure [was] on the party asserting the privilege.” In re Sulfuric Acid Antitrust Litig.,
i. Inadvertent Disclosure
The first requirement of FRE 502(b) is that the disclosure of confidential material must have been inadvertent Fed. R.Evid. 502(b)(1). To determine whether a disclosure was inadvertent, “this Court has ... look[ed] to factors such as the total number of documents reviewed, the proce
Additionally, this Court considers “the extent of the disclosure” and “the scope of discovery.” Fed.R.Evid. 502(b) advisory committee’s note; see Harmony Gold,
Defendants’ primary argument is that “Plaintiffs’ counsel ... [was] asleep at the switch” and should have examined the documents after turning them over to the Vendor. (Defs.’ Reply Mem. 6.) In particular, Defendants place great weight on the amount of materials disclosed, a matter both parties contest.
Since the latter point goes to the extent of disclosure and the scope of discovery, this Court starts the analysis there. As a preliminary matter, this Court examines the total number of documents reviewed. Here, Plaintiffs reviewed and produced 1499 documents comprised of 6952 pages. (Defs.’ Mem. in Supp. of Defs.’ Mot. 1; Pis.’ Resp. to Defs.’ Mot. 6.) This amount is neither apologetically large nor astonishingly small. See Wunderlic-Malec II,
Plaintiffs and Defendants dispute the percentage of confidential documents inadvertently disclosed. Plaintiffs compute the percentage based on the total number of pages disclosed, stating that only “357 pages 5% of the total production were inadvertently produced and contained privileged attorney[-]client communications.” (Pis.’ Resp. to Defs.’ Mot. 6.) Defendants, on the other hand, use the total number of documents to compute the percentage, stating that “Plaintiffs ... declared that ... 196 documents, comprising 13% of Plaintiffs’ production, were inadvertently produced attorney-client communications.” (Defs.’ Mem. in Supp. of Defs.’ Mot. 1.)
Using either calculation, the extent of disclosure in this ease was broad, and the error-regardless of the computational method chosen-not insignificant. See Wunderlich-Ma-lec II,
The action of the producing party after discovering the disclosure, for example, carries more weight in this case. Here, Plaintiffs discovered their disclosure on October 23, 2008. Within twenty-four hours of this discovery, Plaintiffs sent a letter to Defendants that claimed attorney-client privilege, identified the Sequestered Documents, and requested that Defendants destroy the Documents. (Pis.’ Resp. to Defs.’ Mot. 7, Ex. B at ¶ 14; Defs.’ Mem. in Supp. of Defs.’ Mot. 6, Elkins Decl. at ¶ 6.) Those actions can be described only as responsible. For that reason, this factor weighs in favor of finding inadvertent disclosure.
Defendants suggest that Plaintiffs knowingly disclosed the Sequestered Documents they have asserted were privileged. (Defs.’ Reply Mem. 6.) Defendants argued that, if Plaintiffs’ “counsel [had] made a reasonable inquiry” “[w]hen Defendants inquired [as to] whether Plaintiffs were withholding any documents on the ground of privilege,” “[Plaintiffs’ counsel] would have discovered the supposedly accidental disclosure.” (Id. 6.)
That argument, however, must yield to FRE 502, which “does not require the producing party to engage in a post-production review to determine whether any protected communication or information has been produced by mistake.” Fed.R.Evid. 502(b) advisory committee’s note. Plaintiffs had no duty to re-review the documents after providing them to the Vendor. Id. That would be duplicative, wasteful, and against the spirit of FRE 502. Additionally, imposing on disclosing parties a duty to re-review would chill the use of e-vendors, which parties commonly employ to comply with onerous electronic discovery. Against this grain the Court cannot cut.
Moreover, there were no “obvious indications that a protected communication or information has been produced inadvertently.” Fed.R.Evid. 502(b) advisory committee’s note. The mere fact that Defendants asked Plaintiffs if they “were ... withholding any documents on the ground of privilege” does not make the inadvertent production “obvious.” (Defs.’ Mem. in Supp. of Defs.’ Mot. 6, Elkins Decl. at ¶ 6.) Plaintiffs relied, and should be able to rely, on their Vendor to faithfully carry out the instructions it has been given. Defendants’ cursory inquiry did not, nor should it have, alerted Plaintiffs to any inadvertently disclosed documents.
In sum, although Plaintiffs disclosed 13 percent of their privileged documents, the weight of the factors tips the balance in favor of inadvertent disclosure. First, Plaintiffs used reasonable procedures to review the Sequestered Documents and, after this review, the Vendor erroneously disclosed privileged documents. Plaintiffs had no reason to suspect the Vendor would inadvertently produce documents that Plaintiffs had already designated as privileged. Furthermore, there were no signs or indications after production that the Vendor made any inadvertent disclosure. Finally, upon learning of the disclosure, Plaintiffs immediately contacted Defendants, claimed attorney-client privilege, identified the privileged documents, and requested their destruction.
ii. Reasonable Steps to Prevent Disclosure
The second element of FRE 502(b) requires the disclosing party to take reasonable steps to prevent the disclosure. Fed. R.Evid. 502(b)(2). The committee’s note helps guide this Court in determining what constitute reasonable steps to prevent disclosure. The note states that a court, in making this determination, may consider several factors, including “the number of documents to be reviewed and the time constraints for production”; whether “a party that use[d] advanced analytical software applications and linguistic tools in screening for privilege and work product”; and whether “[t]he implementation of an efficient system of records management before litigation.” Fed.R.Evid. 502(b) advisory committee’s note. The note also makes clear that FRE 502(b) does not require the producing party to review docu
The dearth of cases addressing this issue is no surprise considering its newness. The cases that do confront this issue, however, are useful reference points. In one ease, the court found that a disclosing party had taken reasonable steps to prevent disclosure where, prior to disclosure, documents underwent an “inspect and copy” procedure. Laethem, Equip. Co. v. Deere and Co. (Lae-them II), No. 05-10113,
Defendants assert that “Plaintiffs did not take reasonable [precautions to prevent the disclosure” because “Plaintiffs needed only review [sic] the documents in their initial production to locate” any privileged documents. (Defs.’ Mem. in Supp. of Defs.’ Mot. 11.) “Their failure to do so,” Defendants argue, “shows that their precautions were not reasonable.” (Id.) With these statements this Court cannot agree.
As noted earlier, FRE 502(b) does not require a post-production review. Fed.R.Evid. 502(b) advisory committee’s note. In other words, if the procedures in place prior to turning the documents over to the Vendor were reasonable, then this requirement is satisfied. This Court finds that the multi-step process Plaintiffs used to produce the Sequestered Documents, like procedure in Laethem II, entailed reasonable precautions to prevent disclosure. Although the parties in Laethem II agreed to a review procedure that took place after copying had been completed, a pre-copy review procedure is not per se unreasonable. The procedure used here — where Plaintiffs reviewed the documents and then provided them to the Vendor for production — was reasonable; no disclosure would have occurred but for the Vendor’s error. Additionally, here, unlike in B-Y Water District — where the privileged information had been redacted, but the disclosing party accidentally produced the un-redacted copy — the culpability lies not with Plaintiffs, but the Vendor.
Finally, as to the other factors not yet discussed, we note that Plaintiffs did not use analytical software to screen the documents; instead non-lawyers reviewed them prior to production. The Vendor used software to produce, not to “screen,” the documents. Moreover, the parties briefs did not address how Plaintiffs kept their records prior to litigation; therefore, both of these factors are neutral.
Based on the foregoing analysis, this Court finds that Plaintiffs used reasonable procedures when they reviewed the documents, assigned them codes, and provided them to the Vendor to properly disclose.
in. Prompt Steps to Rectify the Inadvertent Disclosure
The final element under FRE 502(b) requires the disclosing party to take prompt steps to rectify the inadvertent disclosure. Fed.R.Evid. 502(b)(3). According to Defendants, Plaintiffs’ statements that they were not withholding any privileged documents “suggest that they reviewed their production and[,] ... over that two-month period[, verified] that no privileged documents were inadvertently disclosed.” (Defs.’ Mem. in Supp. of Defs.’ Mot. 12.)
The case law this Court unearthed is directly on point and disposes of Defendants’ argument. In Laethem II, the first time “Plaintiffs’ counsel ... discovered the inadvertent disclosure [was] at the January 31, 2008, deposition of plaintiffs’ expert,” Lae-
Similarly, in B-Y Water District, the plaintiffs counsel “immediately asserted its privilege when the two privileged documents were referenced during a deposition on July 15, 2008, the first time that counsel for [defendant] realized he may have accidentally produced the privileged information.”
These cases illustrate that how the disclosing party discovers and rectifies the disclosure is more important than when after the inadvertent disclosure the discovery occurs. In B-Y and Laethem II, the parties discovered the disclosure at the deposition where the privileged documents became a topic of discussion, and they immediately asserted privilege. B-Y Water Dist.,
In this case, Plaintiffs’ counsel discovered the inadvertent disclosure before the deposition. That demonstrates that Plaintiffs’ counsel displayed greater diligence than the attorneys in B-Y Water District and Lae-them II where the courts found that the attorneys acted reasonably. Unlike the attorney in Harmony Gold, Plaintiffs’ counsel did wait to notify Defendants; he, like the attorneys in B-Y Water District and Lae-them II, notified Defendants of the disclosure within twenty-four hours of discovering the Vendor’s error. (Pis.’ Resp. to Defs.’ Mot. 7, Ex. B at ¶ 14; Defs.’ Mem. in Supp. of Defs.’ Mot. 6.) In that notification, Plaintiffs’ counsel asserted attorney-client privilege, identified the documents subject to that privilege, and requested that Defendants destroy those documents. (Id.) Therefore, this Court finds that Plaintiffs took prompt steps to rectify their inadvertent disclosure.
To summarize, this Court has found that Sequestered Documents are privileged, and that Plaintiffs have satisfied all three elements of FRE 502. For that reason, this Court holds that Plaintiffs’ disclosure was inadvertent and therefore did not waive the attorney-client privilege as to the Sequestered Documents. In making this finding, this Court also considered the unfairness of penalizing Plaintiffs for an error that it neither caused nor anticipated. Fed.R.Evid. 502(b) advisory committee’s note. Therefore, if Defendants have any remaining copies of the Sequestered Documents, they must destroy them or return them to Plaintiffs.
B. Plaintiffs’ Motion to Compel Production of Documents
Plaintiffs argue that none of the documents they have requested from Defendants are privileged. Defendants make two arguments in response to Plaintiffs’ Motion. First, Defendants contend that documents 622, 630, 639, 640,1441, and 1442 are protected work product. Second, regardless of the Court’s holding as to those documents, Defendants argue that the attorney-client privilege protects all of the documents at issue.
1. Work-Product Privilege
Defendants claim that “[t]he work[-]product privilege applies to communications in
The Federal Rules of Civil Procedure offer protection for work product: “[o]rdinarily, a party may not discover documents and tangible things that are prepared in anticipation of litigation or for trial by or for another party or its representative (including the other party’s attorney, consultant, surety, indemnitor, insurer, or agent).” Fed.R.Evid. P. 26(b)(3)(A) (“Rule 26(b)”). Stated another way, materials produced in the ordinary course of business are not protected work product. Equity Residential v. Kendall Risk Mgmt., Inc.,
With these guiding principles in mind, this Court’s determination of whether the documents are protected work product can be described as a two-part inquiry. First, were the individuals who created the documents at issue “representatives” of Prime Time? Id.; Fed. R. Crv. P. 26(b)(3)(A). Second, if so, were the “representatives” motivated to create those documents primarily by an anticipation of litigation? Id.
Plaintiffs’ first argument takes issue with the initial question, essentially contending that none of these three individuals are “representatives” of Prime Time because Defendants referred to Goodrich and Durham as “third parties.” (Id, Ex. H at 1-3, 7.) This Court finds spurious Plaintiffs’ suggestion, which resembles an estoppel argument, that Defendants’ previous references to Goodrich and Durham as “third-parties” prevents the privilege from attaching to their work product. The context in which Defendants made these statements reveals that Defendants used the term “third party” and its iterations as shorthand for “non-parties.” (Defs.’ Resp. to Pis.’ Mot. 3-4; Pis.’ Mot., Ex. H, 1-3, 7.)
Regardless of the terminology used, Plaintiffs’ argument that Equity,
Because this Court finds that Defendants’ references to Goodrich and Durham as “third parties” do not affect the work-product argument, it must next determine whether these
This Court has little trouble concluding that both Goodrich and Durham were Defendants’ “representatives” under Rule 26(b). Defendants state, and this Court finds no reason to doubt, that Goodrich, as Prime Time’s accountant, rendered advice at the behest of Defendants’ lawyers. (Pis.’ Mot., Ex. I at 2-4.) Defendants also assert that Goodrich acted as Prime Time’s Chief Financial Officer. (Id.) Goodrich communicated with Defendants “for the purpose of providing or obtaining legal services regarding the current litigation with Plaintiffs, a commercial lease, an intellectual property transaction related to The Secret, the structure of business related to The Secret, various corporate agreements, corporate documentation, and a tax matter.” (Defs.’ Mem. in Opp’n 2 (footnotes omitted).) Durham, as Goodrich’s assistant, acted on his behalf when conducting business, “communicating] ... with Defendants’ counsel for the purpose of providing or obtaining legal services regarding the current litigation with Plaintiffs.” (Id. at 3 (footnote omitted).) Therefore, both Goodrich and Durham are “representatives” under Rule 26(b).
The next stop in this Court’s journey through Rule 26(b) is determining whether Goodrich and Durham prepared these documents in anticipation of litigation. Only Plaintiffs broach this subject, arguing that “it is not evident from Defendants’ ... [Logs] that the documents over which Defendants’ are claiming work[-]product privilege ... contain communications ‘in anticipation of litigation.’ ” (Pis.’ Reply 6.) To be clear, the rules do not require “communications in anticipation of litigation.” See Fed. R. Crv. P. 26(b)(3)(A) (“Ordinarily, a party may not discover documents and tangible things that are prepared in anticipation of litigation or for trial----”). As noted above, the primary motivating factor in preparing the document must be the anticipation of litigation, which may, but need not, include a communication. See Allendale,
These facts also undercut Plaintiffs’ argument that the documents are not protected work product because no lawyer was involved, or only tangentially involved, in the communications with Goodrich and Durham. (Pis.’ Mot. 7-9.) First, it appears a lawyer was the primary agent directing the inquiry in response to which Goodrich or Durham created documents. Second, even if a lawyer did not direct the production of the document, the text of Rule 26(b) makes clear that the work product privilege covers any documents or tangible things created in anticipation of litigation “by or for another party or its representative. ” Fed. R. Civ. P. 26(b)(3)(A) (emphasis added). The rules do not require a lawyer to be involved at all. Id. Therefore, documents 622, 630, 639, 1441, and 1442 are protected work product under Rule 26(b).
2. Attorney-Client Privilege
i. Agency of Goodrich, Durham, and Kaufman
Next, Defendants contend that the attorney-client privilege applies to nearly all the documents requested by Plaintiffs.
Similar to the work-product doctrine, the attorney-client privilege applies to third parties who are agents of either the lawyer or the client.
In so finding, this Court rejects Plaintiffs’ argument that Goodrich’s self-asserted status as an “external advisor” and not an employee shows he is not Prime Time’s agent. (Pis.’ Supplemental Br. in Supp. of Pis.’ Motion 2-4, Ex. 1 at 2.) The appellation that Goodrich ascribes to himself does not determine his legal status; that is this Court’s task.
As to Kaufman, the Court finds that he also was Prime Time’s agent for the same reasons that Goodrich and Durham were Prime Time’s agents. Kaufman “was a contractor of Prime Time Australia as its accountant and bookkeeper ... for about nine years,” a relationship of sufficient depth and duration to make Kaufman Prime Time’s agent. (Defs.’ Mem. in Opp’n 1.; Pis.’ Mot. 2, Ex. I at 4.) Therefore, Kaufman, Goodrich, and Durham are all Prime Time’s agents, and their status as such does not, by itself, destroy the attorney-client privilege.
ii. Involvement of Attorneys and Accountant-Client Privilege
Additionally, Plaintiffs contend that the six communications involving Kaufman, and the remainder involving Goodrich and Durham, are not privileged because “no attorney [was] involved in the communication[s]” (Pis.’ Mot. 7, 8-9.), and because “ ‘there is no such thing’ as an ‘accountant-client privilege’ ” (Pis.’ Mot. 5 (quoting In re Grand Jury Proceedings,
The attorney-client privilege can extend to communications between non-lawyer employees of a company. Equity,
The attorney-client privilege also can apply to third parties, including, in some circumstances, accountants. In re Grand Jury Proceedings,
Moreover, since In re Grand Jury Proceedings, this Court has adopted a “balanced approach” to the application of the attorney-client privilege to third parties. Stafford Trading,
This Court holds, consistent with Arthur Young and Stafford Trading, that the attorney-client privilege applies to an accountant who performs services (i) that are not required by federal law or do not otherwise make him an individual acting on the public’s behalf; (ii) on behalf of a party; (iii) for the purposes of rendering legal advice; and (iv) that make “the accountant ... necessary, or at least highly useful, for the effective consultation between the client and the lawyer.”
Therefore, this Court rejects, only insofar as it conflicts with this analysis, Plaintiffs’ argument that the attorney-client privilege cannot apply to communications involving Prime Time, Goodrich, or Kaufman because they are accountants, or to communications involving Prime Time and Durham because she is Goodrich’s agent.
iii. Whether the Documents are Privileged
The foregoing discussion has not answered the main question presented by Plaintiffs’ Motion: are Defendants’ documents privileged? This Court will now undertake that task, but before doing so, it notes that, “in cases involving allegedly privileged communications by third parties, courts determine whether the attorney-client privilege applies on a document[-]by[-]document basis.” Stafford Trading,
This Court has reviewed the documents over which Plaintiffs have asserted attorney-client privilege. After an exhaustive page-by-page review of these documents and an entry-by-entry review of the privilege log, the Court reserves its ruling on whether they are protected by the attorney-client privilege.
Many of the documents contain multiple emails and forwarded e-mails, an incestuous intermingling of privileged and unprivileged documents. Some of these e-mails are entirely unprotected and can nowise be claimed as covered by the attorney-client privilege. One document, for example, contained an email that stated nothing more than an individual’s Christmas wishes. Forcing the Court to read individuals’ good tidings may have salutary effects, but efficiency and clarity are not among them.
Because Defendants failed to accomplish this task, the Court will withhold its ruling on whether the documents are protected by the attorney-client privilege until after Defendants submit an amended privilege log and a revised compilation of documents for in camera review. The revised compilation of documents should be separated chronologically on a e-mail-by-e-mail basis — such that each listed “document” contains only one email — and labeled so the Court can efficiently rule on each. If a series of e-mails belong together in a “chain,” Defendants should group and label those e-mails accordingly. Defendants should also place Bates numbers or other means of identification on each page, something they failed to do on the documents they submitted to this Court. Additionally, the amended privilege log, which is to be submitted under seal (along with the revised compilation of documents), should describe, in sufficient detail, the circumstances surrounding each e-mail and Defendants’ argument as to why it should be considered privileged. Finally, the amended privilege log must “comport[ ] with the this district’s case law.” In re Morgan Chase & Co. Sec. Litig., No. 06-4674,
Finally, as to documents 621, 629, 641, 642, and 643, this Court does not entirely understand why, as Defendants claim, these “[fjive challenged documents [should] be eliminated from consideration .... ” (Defs.’ Mem. in Opp’n 1 n. 1.) Defendants failed submit to these documents to Court and did not include these documents in their in camera privilege log. As a result, this Court cannot rule on whether those documents are privileged. Therefore, Defendants revised compilation of documents and amended privilege log should contain these documents unless Defendants no longer claim them as privileged. If Defendants no longer assert that these documents are privileged, they should include a statement to that effect in their amended privilege log and disclose those documents to Plaintiffs if they have not done so already.
In the interim, this Court suggests that Defendants reassess their privilege claims as to all portions of every submitted document. If Defendants conclude that some of the documents, or portions of the documents, are not privileged, they should notify this Court and produce those documents to Plaintiffs. Within fourteen days, Defendants shall file a revised compilation of documents and an amended privilege log consistent with this Order.
III. Conclusion
With respect to Defendants’ Motion, the Court makes the following conclusions:
A. Defendants’ Motion
1. The attorney-client privilege applies to the Sequestered Documents except for documents DREW002290-DREW002294, DREW002312-DREW002316, DREW002397-DREW002401, DREW002797-DREW002798, DREW002901-DREW002902, DREW002913-DREW002923, DREW002925, and DREW002928-DREW002931. Plaintiff must disclose these non-privileged documents to Defendants. Plaintiffs, however, may redact documents DREW002397 and DREW002312 to exclude the first e-mail on each of those pages, which Heriot sent to his attorney. Plaintiffs must produce the remaining portions of documents DREW002397 and DREW002312 un-redacted. Plaintiffs also may redact the text of document DREW002797 above the line entitled, “Original Message,” below which is an e-mail from Willis to Heriot.
*669 2. Although Plaintiffs disclosed the Sequestered Documents found by Ms Court to be privileged, Plaintiffs satisfied all of the elements of inadvertent disclosure under FRE 502(b); therefore, Plaintiffs did not waive the attorney-client privilege as to the Sequestered Documents the Court found to be privileged. Therefore, Defendants’ Motion is denied as to these documents.
3. If Defendants have remaining copies, electronic or otherwise, of the Sequestered Documents found by this Court to be privileged, they must destroy them or return them to Plaintiffs.
B. Plaintiffs’ Motion
With respect to Plaintiffs’ Motion, the Court makes the following conclusions:
1. Documents 622, 630, 639, 640, 1441, and 1442 are Defendants’ protected work product. Plaintiffs’ Motion is therefore denied with respect to these numbered documents.
2. Based on the information Defendants provided, this Court cannot determine whether the attorney-client privilege applies to the remaining documents Defendants’ identified as privileged. To enable this Court to make this determination, this Order set forth conditions with which Defendants must comply within fourteen days. Accordingly, this Court withholds its judgment on that issue until after Defendants comply with this Order.
For the aforementioned reasons, this Court denies in part and grants in part Defendants’ Motion. This Court also denies in part Plaintiffs’ Motion and wit h holds its ruling on the remainder of Plaintiffs’ Motion until after Defendants comply with this Order.
Notes
. On September 5, 2008, Judge Cordon entered a Stipulated Protective Order. Under this order, the parties could mark documents as either “CONFIDENTIAL” or "HIGHLY CONFIDENTIAL-ATTORNEYS’ EYES ONLY."
. The Defendants kept one set of copies to file under seal with this Court. (Defs.’ Mem. in Supp. of Defs.' Mot. 6.)
. On December 2, 2008, this Court granted, without prejudice, Plaintiffs' motion to Quash Deposition Notices of James Armstrong, Joan Kaufman, Martin Goodrich, and Marc Golden-fein.
. Defendants did not include documents 621, 629, 641, 642, or 643 in the privilege log they submitted to this Court.
. Even assuming that the Judson test applies, this Court’s decision remains unchanged under such an approach.
. Inadvertence under FRE 502(b) is not necessarily the same as, and does not necessarily mirror the case law describing, inadvertence under Judson.
. One court has applied FRE 502(b) in a rather peculiar fashion, choosing to adopt the factors articulated in the committee’s note as a wholesale test of inadvertent disclosure. Rhoads Indus., Inc. v. Bldg. Materials Corp. of Am.,
. For the remaining part of this of Order, the term “Sequestered Documents” refers to all of the documents, or portions thereof, that this Court determined were protected by the attorney-client privilege. This term does not include any of the documents, or portions thereof, that this court determined were not protected by the attorney-client privilege.
. It is appropriate to point out the tension that exists between the determination of privilege and the determination of the crime-fraud exception. On the one hand, this Court must engage in a document-by-document review to determine whether the attorney-client privilege applies. Am. Nat’l Bank & Trust Co. of Chicago,
. This factor may be relevant if, for example, the initial review by non-lawyers resulted in the inadvertent disclosure. Nevertheless, this Court declines to hold that a procedure is unreasonable in every case that a paralegal or non-lawyer reviews documents for privilege.
. Any reference to documents in this section is limited to these numbered documents. Also, at oral argument, Defendants intimated, but did not clearly argue, that all the documents over which they asserted privilege were protected work product. This Court, however, addresses arguments stated explicitly in the briefs, not the intimations made at oral argument. Therefore, this Court addresses whether the work-product privilege applies to documents 622, 630, 639, 640, 1441, and 1442 only.
. As already noted, these documents are the following: 2, 8, 193, 195, 196, 199, 203, 204,
. Because this Opinion has previously discussed the attorney-client privilege, it will, in this and the remaining sections, explicate that privilege only insofar as the law differs with respect to "third party” communications.
. There is some uncertainty as to whether the communications must relate directly to the legal advice given by a lawyer, or whether an indirect relationship is sufficient, for the privilege to attach. Compare Equity,
. Of course, the reverse must also be true: information transmitted by accountants in response to lawyer's privileged communication must be protected by the attorney-client privilege. Jaffee v. Redmond,
. This proposition already has been adopted by the Second Circuit. Kovel,
. This approach dovetails with the case law addressing this topic. See Lawrence E. Jaffe Pension Plan v. Household Int'l,
